Hello I keep getting redirected to different sites when I click on links when on any search engine. I can't for the life of me figure out what is wrong. Here is the Hijack this file Logfile of Trend Micro HijackThis v2.0.2 Scan saved at 10:40:51 PM, on 5/26/2008 Platform: Windows XP SP2 (WinNT 5.01.2600) MSIE: Internet Explorer v7.00 (7.00.6000.16640) Boot mode: Normal Running processes: C:\WINDOWS\System32\smss.exe C:\WINDOWS\system32\winlogon.exe C:\WINDOWS\system32\services.exe C:\WINDOWS\system32\lsass.exe C:\WINDOWS\system32\svchost.exe C:\WINDOWS\System32\svchost.exe C:\WINDOWS\system32\svchost.exe C:\WINDOWS\Explorer.EXE C:\WINDOWS\system32\svchost.exe C:\PROGRA~1\AVG\AVG8\avgwdsvc.exe C:\PROGRA~1\AVG\AVG8\avgam.exe C:\PROGRA~1\AVG\AVG8\avgrsx.exe C:\PROGRA~1\AVG\AVG8\avgnsx.exe C:\WINDOWS\system32\wuauclt.exe C:\WINDOWS\Mixer.exe C:\PROGRA~1\AVG\AVG8\avgtray.exe C:\Program Files\Internet Explorer\iexplore.exe C:\Program Files\Trend Micro\HijackThis\HijackThis.exe R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896 R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?LinkId=69157 R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157 R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896 R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896 R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?LinkId=69157 R0 - HKLM\Software\Microsoft\Internet Explorer\Search,SearchAssistant = R0 - HKLM\Software\Microsoft\Internet Explorer\Search,CustomizeSearch = R1 - HKCU\Software\Microsoft\Internet Explorer\Main,First Home Page = http://go.microsoft.com/fwlink/?LinkId=54843 O4 - HKLM\..\Run: [C-Media Mixer] Mixer.exe /startup O4 - HKLM\..\Run: [AVG8_TRAY] C:\PROGRA~1\AVG\AVG8\avgtray.exe O4 - HKCU\..\Run: [OM2_Monitor] "C:\Program Files\OLYMPUS\OLYMPUS Master 2\MMonitor.exe" -NoStart O4 - .DEFAULT User Startup: AutoTBar.exe (User 'Default user') O4 - .DEFAULT User Startup: mod_sm.lnk = C:\hp\bin\cloaker.exe (User 'Default user') O18 - Protocol: linkscanner - {F274614C-63F8-47D5-A4D1-FBDDE494F8D1} - C:\Program Files\AVG\AVG8\avgpp.dll O20 - AppInit_DLLs: wbsys.dll,avgrsstx.dll O23 - Service: AVG8 WatchDog (avg8wd) - AVG Technologies CZ, s.r.o. - C:\PROGRA~1\AVG\AVG8\avgwdsvc.exe O23 - Service: Zune Bus Enumerator (ZuneBusEnum) - Unknown owner - c:\WINDOWS\system32\ZuneBusEnum.exe (file missing) -- End of file - 2552 bytes and the Fixwareout file Username "Owner" - 05/26/2008 22:19:26 [Fixwareout edited 9/01/2007] ~~~~~ Prerun check Successfully flushed the DNS Resolver Cache. System was rebooted successfully. ~~~~~ Postrun check HKLM\SOFTWARE\~\Winlogon\ "System"="" .... .... ~~~~~ Misc files. .... ~~~~~ Checking for older varients. .... ~~~~~ Current runs (hklm hkcu "run" Keys Only) [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] "C-Media Mixer"="Mixer.exe /startup" "AVG8_TRAY"="C:\\PROGRA~1\\AVG\\AVG8\\avgtray.exe" [HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] "OM2_Monitor"="\"C:\\Program Files\\OLYMPUS\\OLYMPUS Master 2\\MMonitor.exe\" -NoStart" .... Hosts file was reset, If you use a custom hosts file please replace it... ~~~~~ End report ~~~~~ Any help would be appreciated
Hi karns As for your problem, I would have pointed out a hosts file problem, but apparently fixwareout has reset the hosts file, so it shouldn't be a problem anymore. But if it still is, perhaps it isn't a hosts file problem. However, I cannot spot any trouble within your hijack this log, and as there are many malware which can redirect sites, there is absolutely no way to immediately pinpoint the problem. Can you possibly rule out a DNS/ISP problem? Have you tried with another computer connected to the same DNS/ISP? Also, I don't know if you want to take the trouble, but as I wouldn't recommend AVG as a good antivirus, could you download Antivir Free v8 and scan with that? Or, as the case might be, spyware could be the culprit, and possibly A-squared can be useful for that. If you do not want to download these files, it is fine, and we can work around AVG if possible. There is a variant of Vundo which avoids hijack this as a process, so I would also recommend changing the name of your hijack this scanner to something like "scannerhjt" or something. Scan with the renamed hijack this file in safe mode, and also do a AVG (or any other scanner) scan in safe mode as well. Best Regards Edit: Also download a rootkit scanner (I recommend GMER) and scan with it. (If you use GMER, scan only for hidden files, registry keys, and processes)
ok so I renamed my Hijack this file and ran it in safe mode and I also used the GMER while in safe mode MER 1.0.14.14205 - http://www.gmer.net Rootkit scan 2008-05-28 21:21:40 Windows 5.1.2600 Service Pack 2 ---- System - GMER 1.0.14 ---- Code E17B1B5E ZwQueryDirectoryFile Code E17B1B5D NtQueryDirectoryFile ---- Kernel code sections - GMER 1.0.14 ---- PAGE ntoskrnl.exe!NtQueryDirectoryFile 80573515 5 Bytes JMP E17B1B62 ---- User code sections - GMER 1.0.14 ---- ? C:\WINDOWS\system32\svchost.exe[576] image checksum mismatch; number of sections mismatch; time/date stamp mismatch; unknown module: baserom32.dll .text C:\WINDOWS\system32\svchost.exe[576] ntdll.dll!LdrLoadDll 7C9161CA 10 Bytes JMP 00403B1D C:\WINDOWS\system32\svchost.exe (Generic Host Process for Win32 Services/Microsoft Corporation) ---- User IAT/EAT - GMER 1.0.14 ---- IAT C:\WINDOWS\system32\svchost.exe[576] @ C:\WINDOWS\system32\svchost.exe [ADVAPI32.dll!RegQueryValueExW] FBFEF5D9 IAT C:\WINDOWS\system32\svchost.exe[576] @ C:\WINDOWS\system32\svchost.exe [ADVAPI32.dll!SetSecurityDescriptorDacl] BFE6EFFD IAT C:\WINDOWS\system32\svchost.exe[576] @ C:\WINDOWS\system32\svchost.exe [ADVAPI32.dll!SetEntriesInAclW] E6FCD2BF IAT C:\WINDOWS\system32\svchost.exe[576] @ C:\WINDOWS\system32\svchost.exe [ADVAPI32.dll!SetSecurityDescriptorGroup] E7FCFAF2 IAT C:\WINDOWS\system32\svchost.exe[576] @ C:\WINDOWS\system32\svchost.exe [ADVAPI32.dll!SetSecurityDescriptorOwner] E0F2B8E1 IAT C:\WINDOWS\system32\svchost.exe[576] @ C:\WINDOWS\system32\svchost.exe [ADVAPI32.dll!InitializeSecurityDescriptor] 000000FC IAT C:\WINDOWS\system32\svchost.exe[576] @ C:\WINDOWS\system32\svchost.exe [ADVAPI32.dll!GetTokenInformation] ECE0F4F2 IAT C:\WINDOWS\system32\svchost.exe[576] @ C:\WINDOWS\system32\svchost.exe [ADVAPI32.dll!OpenProcessToken] A6F3F5EA IAT C:\WINDOWS\system32\svchost.exe[576] @ C:\WINDOWS\system32\svchost.exe [ADVAPI32.dll!OpenThreadToken] 00EEF2EC IAT C:\WINDOWS\system32\svchost.exe[576] @ C:\WINDOWS\system32\svchost.exe [ADVAPI32.dll!SetServiceStatus] 696B6B74 IAT C:\WINDOWS\system32\svchost.exe[576] @ C:\WINDOWS\system32\svchost.exe [ADVAPI32.dll!RegisterServiceCtrlHandlerW] 66783268 IAT C:\WINDOWS\system32\svchost.exe[576] @ C:\WINDOWS\system32\svchost.exe [ADVAPI32.dll!RegCloseKey] 0000007A IAT C:\WINDOWS\system32\svchost.exe[576] @ C:\WINDOWS\system32\svchost.exe [ADVAPI32.dll!RegOpenKeyExW] F4F8EAC3 IAT C:\WINDOWS\system32\svchost.exe[576] @ C:\WINDOWS\system32\svchost.exe [ADVAPI32.dll!StartServiceCtrlDispatcherW] ECF8FAE8 IAT C:\WINDOWS\system32\svchost.exe[576] @ C:\WINDOWS\system32\svchost.exe [KERNEL32.dll!WideCharToMultiByte] C5C3D9C3 IAT C:\WINDOWS\system32\svchost.exe[576] @ C:\WINDOWS\system32\svchost.exe [KERNEL32.dll!lstrlenW] 0000D4CA IAT C:\WINDOWS\system32\svchost.exe[576] @ C:\WINDOWS\system32\svchost.exe [KERNEL32.dll!LocalFree] F1EAECC1 IAT C:\WINDOWS\system32\svchost.exe[576] @ C:\WINDOWS\system32\svchost.exe [KERNEL32.dll!GetCurrentProcess] A4FCE9E3 IAT C:\WINDOWS\system32\svchost.exe[576] @ C:\WINDOWS\system32\svchost.exe [KERNEL32.dll!GetCurrentThread] EAE2EEC6 IAT C:\WINDOWS\system32\svchost.exe[576] @ C:\WINDOWS\system32\svchost.exe [KERNEL32.dll!GetProcAddress] 00AAE7FA IAT C:\WINDOWS\system32\svchost.exe[576] @ C:\WINDOWS\system32\svchost.exe [KERNEL32.dll!LoadLibraryExW] B7B1B1B7 IAT C:\WINDOWS\system32\svchost.exe[576] @ C:\WINDOWS\system32\svchost.exe [KERNEL32.dll!LCMapStringW] C6DFD5C8 IAT C:\WINDOWS\system32\svchost.exe[576] @ C:\WINDOWS\system32\svchost.exe [KERNEL32.dll!FreeLibrary] D9F89489 IAT C:\WINDOWS\system32\svchost.exe[576] @ C:\WINDOWS\system32\svchost.exe [KERNEL32.dll!lstrcpyW] D6D5D1CD IAT C:\WINDOWS\system32\svchost.exe[576] @ C:\WINDOWS\system32\svchost.exe [KERNEL32.dll!ExpandEnvironmentStringsW] 908993DA IAT C:\WINDOWS\system32\svchost.exe[576] @ C:\WINDOWS\system32\svchost.exe [KERNEL32.dll!lstrcmpiW] A1E9E08F IAT C:\WINDOWS\system32\svchost.exe[576] @ C:\WINDOWS\system32\svchost.exe [KERNEL32.dll!ExitProcess] A7B5A9AC IAT C:\WINDOWS\system32\svchost.exe[576] @ C:\WINDOWS\system32\svchost.exe [KERNEL32.dll!GetCommandLineW] A6ABA1B3 IAT C:\WINDOWS\system32\svchost.exe[576] @ C:\WINDOWS\system32\svchost.exe [KERNEL32.dll!InitializeCriticalSection] 83EDF7AE IAT C:\WINDOWS\system32\svchost.exe[576] @ C:\WINDOWS\system32\svchost.exe [KERNEL32.dll!GetProcessHeap] F294999C IAT C:\WINDOWS\system32\svchost.exe[576] @ C:\WINDOWS\system32\svchost.exe [KERNEL32.dll!SetErrorMode] E6E5FAE6 IAT C:\WINDOWS\system32\svchost.exe[576] @ C:\WINDOWS\system32\svchost.exe [KERNEL32.dll!SetUnhandledExceptionFilter] B38EF8EC IAT C:\WINDOWS\system32\svchost.exe[576] @ C:\WINDOWS\system32\svchost.exe [KERNEL32.dll!RegisterWaitForSingleObject] A9B2B8B5 IAT C:\WINDOWS\system32\svchost.exe[576] @ C:\WINDOWS\system32\svchost.exe [KERNEL32.dll!InterlockedCompareExchange] DAD8C0AC IAT C:\WINDOWS\system32\svchost.exe[576] @ C:\WINDOWS\system32\svchost.exe [KERNEL32.dll!LoadLibraryA] 000000CA IAT C:\WINDOWS\system32\svchost.exe[576] @ C:\WINDOWS\system32\svchost.exe [KERNEL32.dll!QueryPerformanceCounter] 898893FA IAT C:\WINDOWS\system32\svchost.exe[576] @ C:\WINDOWS\system32\svchost.exe [KERNEL32.dll!GetTickCount] CFD1F08E IAT C:\WINDOWS\system32\svchost.exe[576] @ C:\WINDOWS\system32\svchost.exe [KERNEL32.dll!GetCurrentThreadId] ADEEEED3 IAT C:\WINDOWS\system32\svchost.exe[576] @ C:\WINDOWS\system32\svchost.exe [KERNEL32.dll!GetCurrentProcessId] D39C9489 IAT C:\WINDOWS\system32\svchost.exe[576] @ C:\WINDOWS\system32\svchost.exe [KERNEL32.dll!GetSystemTimeAsFileTime] 000000CA IAT C:\WINDOWS\system32\svchost.exe[576] @ C:\WINDOWS\system32\svchost.exe [KERNEL32.dll!TerminateProcess] A3D6C4C7 IAT C:\WINDOWS\system32\svchost.exe[576] @ C:\WINDOWS\system32\svchost.exe [KERNEL32.dll!UnhandledExceptionFilter] 000000AB IAT C:\WINDOWS\system32\svchost.exe[576] @ C:\WINDOWS\system32\svchost.exe [KERNEL32.dll!LocalAlloc] 62656467 IAT C:\WINDOWS\system32\svchost.exe[576] @ C:\WINDOWS\system32\svchost.exe [KERNEL32.dll!lstrcmpW] 613A3B29 IAT C:\WINDOWS\system32\svchost.exe[576] @ C:\WINDOWS\system32\svchost.exe [KERNEL32.dll!DelayLoadFailureHook] 7D376F60 IAT C:\WINDOWS\system32\svchost.exe[576] @ C:\WINDOWS\system32\svchost.exe [ntdll.dll!NtQuerySecurityObject] 4D420E7A IAT C:\WINDOWS\system32\svchost.exe[576] @ C:\WINDOWS\system32\svchost.exe [ntdll.dll!RtlFreeHeap] 00000B4E IAT C:\WINDOWS\system32\svchost.exe[576] @ C:\WINDOWS\system32\svchost.exe [ntdll.dll!NtOpenKey] 642ECDCD IAT C:\WINDOWS\system32\svchost.exe[576] @ C:\WINDOWS\system32\svchost.exe [ntdll.dll!wcscat] 0000667A IAT C:\WINDOWS\system32\svchost.exe[576] @ C:\WINDOWS\system32\svchost.exe [ntdll.dll!wcscpy] 5870467F IAT C:\WINDOWS\system32\svchost.exe[576] @ C:\WINDOWS\system32\svchost.exe [ntdll.dll!RtlAllocateHeap] 0052455A IAT C:\WINDOWS\system32\svchost.exe[576] @ C:\WINDOWS\system32\svchost.exe [ntdll.dll!RtlCompareUnicodeString] FEF5E4E1 IAT C:\WINDOWS\system32\svchost.exe[576] @ C:\WINDOWS\system32\svchost.exe [ntdll.dll!RtlInitUnicodeString] FAF19AFF IAT C:\WINDOWS\system32\svchost.exe[576] @ C:\WINDOWS\system32\svchost.exe [ntdll.dll!RtlInitializeSid] 000000FB IAT C:\WINDOWS\system32\svchost.exe[576] @ C:\WINDOWS\system32\svchost.exe [ntdll.dll!RtlLengthRequiredSid] 7A62552B IAT C:\WINDOWS\system32\svchost.exe[576] @ C:\WINDOWS\system32\svchost.exe [ntdll.dll!RtlSubAuthoritySid] 48796F7F IAT C:\WINDOWS\system32\svchost.exe[576] @ C:\WINDOWS\system32\svchost.exe [ntdll.dll!NtClose] 00006261 IAT C:\WINDOWS\system32\svchost.exe[576] @ C:\WINDOWS\system32\svchost.exe [ntdll.dll!RtlSubAuthorityCountSid] E1E4F0C7 IAT C:\WINDOWS\system32\svchost.exe[576] @ C:\WINDOWS\system32\svchost.exe [ntdll.dll!RtlGetDaclSecurityDescriptor] F7DEEBFD IAT C:\WINDOWS\system32\svchost.exe[576] @ C:\WINDOWS\system32\svchost.exe [ntdll.dll!RtlQueryInformationAcl] 0000A0F0 IAT C:\WINDOWS\system32\svchost.exe[576] @ C:\WINDOWS\system32\svchost.exe [ntdll.dll!RtlGetAce] 0A03053C IAT C:\WINDOWS\system32\svchost.exe[576] @ C:\WINDOWS\system32\svchost.exe [ntdll.dll!RtlImageNtHeader] 00020700 IAT C:\WINDOWS\system32\svchost.exe[576] @ C:\WINDOWS\system32\svchost.exe [ntdll.dll!wcslen] 00000000 IAT C:\WINDOWS\system32\svchost.exe[576] @ C:\WINDOWS\system32\svchost.exe [ntdll.dll!RtlUnhandledExceptionFilter] F7EADCD1 IAT C:\WINDOWS\system32\svchost.exe[576] @ C:\WINDOWS\system32\svchost.exe [ntdll.dll!RtlCopySid] E6E7E1F8 IAT C:\WINDOWS\system32\svchost.exe[576] @ C:\WINDOWS\system32\svchost.exe [RPCRT4.dll!RpcServerUnregisterIfEx] F2F2F2FA IAT C:\WINDOWS\system32\svchost.exe[576] @ C:\WINDOWS\system32\svchost.exe [RPCRT4.dll!RpcMgmtWaitServerListen] F9CCC2F8 IAT C:\WINDOWS\system32\svchost.exe[576] @ C:\WINDOWS\system32\svchost.exe [RPCRT4.dll!RpcMgmtSetServerStackSize] E9E6F6F2 IAT C:\WINDOWS\system32\svchost.exe[576] @ C:\WINDOWS\system32\svchost.exe [RPCRT4.dll!RpcServerUnregisterIf] DAD2E5F9 IAT C:\WINDOWS\system32\svchost.exe[576] @ C:\WINDOWS\system32\svchost.exe [RPCRT4.dll!RpcServerListen] D8C5CFDB IAT C:\WINDOWS\system32\svchost.exe[576] @ C:\WINDOWS\system32\svchost.exe [RPCRT4.dll!RpcServerUseProtseqEpW] C4C1C1EE IAT C:\WINDOWS\system32\svchost.exe[576] @ C:\WINDOWS\system32\svchost.exe [RPCRT4.dll!RpcServerRegisterIf] E7DFDDC3 IAT C:\WINDOWS\system32\svchost.exe[576] @ C:\WINDOWS\system32\svchost.exe [RPCRT4.dll!I_RpcMapWin32Status] FBEBC2D0 IAT C:\WINDOWS\system32\svchost.exe[576] @ C:\WINDOWS\system32\svchost.exe [RPCRT4.dll!RpcMgmtStopServerListening] CECFD4D6 ---- Modules - GMER 1.0.14 ---- Module \??\globalroot\systemroot\system32\drivers\clbdriver.sys (*** hidden *** ) F896B000-F896E000 (12288 bytes) ---- Processes - GMER 1.0.14 ---- Library C:\WINDOWS\system32\CLBCATQ.DLL (*** hidden *** ) @ C:\WINDOWS\system32\winlogon.exe [212] 0x76FD0000 Library C:\WINDOWS\system32\CLBCATQ.DLL (*** hidden *** ) @ C:\WINDOWS\system32\svchost.exe [456] 0x76FD0000 Library C:\WINDOWS\system32\CLBCATQ.DLL (*** hidden *** ) @ C:\WINDOWS\system32\svchost.exe [540] 0x76FD0000 Library C:\WINDOWS\system32\CLBCATQ.DLL (*** hidden *** ) @ C:\WINDOWS\system32\svchost.exe [608] 0x76FD0000 Library C:\WINDOWS\system32\CLBCATQ.DLL (*** hidden *** ) @ C:\WINDOWS\Explorer.EXE [1012] 0x76FD0000 Library C:\WINDOWS\system32\CLBCATQ.DLL (*** hidden *** ) @ C:\Program Files\Trend Micro\HijackThis\HijackThis.exe [1268] 0x76FD0000 ---- Services - GMER 1.0.14 ---- Service C:\WINDOWS\System32\drivers\afd.sys (*** hidden *** ) [SYSTEM] AFD <-- ROOTKIT !!! ---- Registry - GMER 1.0.14 ---- Reg HKLM\SYSTEM\CurrentControlSet\Services\AFD@Type 1 Reg HKLM\SYSTEM\CurrentControlSet\Services\AFD@Start 1 Reg HKLM\SYSTEM\CurrentControlSet\Services\AFD@ErrorControl 1 Reg HKLM\SYSTEM\CurrentControlSet\Services\AFD@ImagePath \SystemRoot\System32\drivers\afd.sys Reg HKLM\SYSTEM\CurrentControlSet\Services\AFD@DisplayName AFD Networking Support Environment Reg HKLM\SYSTEM\CurrentControlSet\Services\AFD@Group TDI Reg HKLM\SYSTEM\CurrentControlSet\Services\AFD@Description AFD Networking Support Environment Reg HKLM\SYSTEM\CurrentControlSet\Services\AFD\Parameters Reg HKLM\SYSTEM\CurrentControlSet\Services\AFD\Security Reg HKLM\SYSTEM\CurrentControlSet\Services\AFD\Security@Security 0x01 0x00 0x14 0x80 ... ---- Files - GMER 1.0.14 ---- File C:\WINDOWS\$hf_mig$\KB902400\SP2QFE\clbcatex.dll 110080 bytes File C:\WINDOWS\$hf_mig$\KB902400\SP2QFE\clbcatq.dll 498688 bytes File C:\WINDOWS\system32\clb.dll 10752 bytes File C:\WINDOWS\system32\clbcatex.dll 110080 bytes File C:\WINDOWS\system32\clbcatq.dll 498688 bytes File C:\WINDOWS\system32\clbdll.dll 45056 bytes File C:\WINDOWS\system32\clbinit.dll 1695 bytes File C:\WINDOWS\system32\dllcache\clb.dll 10752 bytes File C:\WINDOWS\system32\drivers\clbdriver.sys 5632 bytes File C:\WINDOWS\$NtServicePackUninstall$\clbcatex.dll 110080 bytes File C:\WINDOWS\$NtServicePackUninstall$\clbcatq.dll 499712 bytes File C:\WINDOWS\$NtUninstallKB828741$\clbcatex.dll 100864 bytes File C:\WINDOWS\$NtUninstallKB828741$\clbcatq.dll 468480 bytes File C:\WINDOWS\ServicePackFiles\i386\clbcatex.dll 110080 bytes File C:\WINDOWS\ServicePackFiles\i386\clbcatq.dll 501248 bytes File C:\WINDOWS\$NtUninstallKB902400$\clbcatex.dll 110080 bytes File C:\WINDOWS\$NtUninstallKB902400$\clbcatq.dll 501248 bytes ---- EOF - GMER 1.0.14 ----
and here is the Hijack this report Logfile of Trend Micro HijackThis v2.0.2 Scan saved at 6:34:44 PM, on 5/28/2008 Platform: Windows XP SP2 (WinNT 5.01.2600) MSIE: Internet Explorer v7.00 (7.00.6000.16640) Boot mode: Safe mode Running processes: C:\WINDOWS\System32\smss.exe C:\WINDOWS\system32\winlogon.exe C:\WINDOWS\system32\services.exe C:\WINDOWS\system32\lsass.exe C:\WINDOWS\system32\svchost.exe C:\WINDOWS\system32\svchost.exe C:\WINDOWS\system32\svchost.exe C:\WINDOWS\Explorer.EXE C:\Program Files\Trend Micro\HijackThis\HijackThis.exe R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896 R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?LinkId=69157 R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157 R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896 R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896 R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?LinkId=69157 R0 - HKLM\Software\Microsoft\Internet Explorer\Search,SearchAssistant = R0 - HKLM\Software\Microsoft\Internet Explorer\Search,CustomizeSearch = R1 - HKCU\Software\Microsoft\Internet Explorer\Main,First Home Page = http://go.microsoft.com/fwlink/?LinkId=54843 O4 - HKLM\..\Run: [C-Media Mixer] Mixer.exe /startup O4 - HKLM\..\Run: [AVG8_TRAY] C:\PROGRA~1\AVG\AVG8\avgtray.exe O4 - HKLM\..\Run: [MSConfig] C:\WINDOWS\PCHealth\HelpCtr\Binaries\MSConfig.exe /auto O4 - HKCU\..\Run: [OM2_Monitor] "C:\Program Files\OLYMPUS\OLYMPUS Master 2\MMonitor.exe" -NoStart O4 - .DEFAULT User Startup: AutoTBar.exe (User 'Default user') O4 - .DEFAULT User Startup: mod_sm.lnk = C:\hp\bin\cloaker.exe (User 'Default user') O18 - Protocol: linkscanner - {F274614C-63F8-47D5-A4D1-FBDDE494F8D1} - C:\Program Files\AVG\AVG8\avgpp.dll O20 - AppInit_DLLs: wbsys.dll,avgrsstx.dll -- End of file - 2112 bytes
I'm terribly sorry that I said to run Hijack This in safe mode. I was wrong. You should rename the file(I see that you did not rename it from its original name of "HijackThis.exe"), then run it in normal mode. And no, your GMER log does not show any unusual activity or rootkit. This may require more analysis. Have you scanned with scanners such as Spybot, A-squared, and Antivir? If not, I recommend you do so, but with A-squared, do not remove what it detects, but rather, post the log here. Best Regards
Thank you very much here is the hijack this run in normal mode Logfile of Trend Micro HijackThis v2.0.2 Scan saved at 8:46:49 PM, on 5/29/2008 Platform: Windows XP SP2 (WinNT 5.01.2600) MSIE: Internet Explorer v7.00 (7.00.6000.16640) Boot mode: Normal Running processes: C:\WINDOWS\System32\smss.exe C:\WINDOWS\system32\winlogon.exe C:\Program Files\AVG\AVG8\avgrsx.exe C:\WINDOWS\system32\services.exe C:\WINDOWS\system32\lsass.exe C:\WINDOWS\system32\svchost.exe C:\WINDOWS\System32\svchost.exe C:\WINDOWS\system32\svchost.exe C:\WINDOWS\system32\svchost.exe C:\WINDOWS\Explorer.EXE C:\WINDOWS\Mixer.exe C:\PROGRA~1\AVG\AVG8\avgtray.exe C:\Program Files\Internet Explorer\iexplore.exe C:\WINDOWS\system32\wuauclt.exe C:\Program Files\Trend Micro\HijackThis\xxHijackThisxx.exe R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896 R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?LinkId=69157 R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157 R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896 R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896 R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?LinkId=69157 R0 - HKLM\Software\Microsoft\Internet Explorer\Search,SearchAssistant = R0 - HKLM\Software\Microsoft\Internet Explorer\Search,CustomizeSearch = R1 - HKCU\Software\Microsoft\Internet Explorer\Main,First Home Page = http://go.microsoft.com/fwlink/?LinkId=54843 O4 - HKLM\..\Run: [C-Media Mixer] Mixer.exe /startup O4 - HKLM\..\Run: [AVG8_TRAY] C:\PROGRA~1\AVG\AVG8\avgtray.exe O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime O4 - HKCU\..\Run: [OM2_Monitor] "C:\Program Files\OLYMPUS\OLYMPUS Master 2\MMonitor.exe" -NoStart O4 - .DEFAULT User Startup: AutoTBar.exe (User 'Default user') O4 - .DEFAULT User Startup: mod_sm.lnk = C:\hp\bin\cloaker.exe (User 'Default user') O18 - Protocol: linkscanner - {F274614C-63F8-47D5-A4D1-FBDDE494F8D1} - C:\Program Files\AVG\AVG8\avgpp.dll O20 - AppInit_DLLs: wbsys.dll,avgrsstx.dll -- End of file - 2324 bytes
and here is the a-squared report this is the deep scan report a-squared Anti-Malware - Version 3.5 Last update: 5/29/2008 9:09:50 PM Scan settings: Objects: Memory, Traces, Cookies, C:\, D:\ Scan archives: On Heuristics: On ADS Scan: On Scan start: 5/30/2008 12:18:55 AM c:\windows\system32\swrt01.dll detected: Trace.File.AdDestroyer Value: HKEY_USERS\S-1-5-21-1395713349-4222255101-3498602251-1003\Software\Illysoft\SNM\Settings --> IEProtection detected: Trace.Registry.SpyNoMore Value: HKEY_USERS\S-1-5-21-1395713349-4222255101-3498602251-1003\Software\Illysoft\SNM\Settings --> ProcProtection detected: Trace.Registry.SpyNoMore Value: HKEY_USERS\S-1-5-21-1395713349-4222255101-3498602251-1003\Software\Illysoft\SNM\Settings --> RegProtection detected: Trace.Registry.SpyNoMore c:\program files\advanceddvdplayer detected: Trace.Directory.AdvancedDVDPlayer c:\program files\advanceddvdplayer\~myplaylist~ detected: Trace.File.AdvancedDVDPlayer c:\program files\advanceddvdplayer\advanceddvdplayer.exe detected: Trace.File.AdvancedDVDPlayer c:\program files\advanceddvdplayer\default playlist.m3u detected: Trace.File.AdvancedDVDPlayer Value: HKEY_USERS\S-1-5-21-1395713349-4222255101-3498602251-1003\Software\AdvancedDVDPlayer\Directory --> CurrentPath detected: Trace.Registry.AdvancedDVDPlayer Value: HKEY_USERS\S-1-5-21-1395713349-4222255101-3498602251-1003\Software\AdvancedDVDPlayer\Directory --> TempPath detected: Trace.Registry.AdvancedDVDPlayer C:\Documents and Settings\Owner\Cookies\owner@advertising[2].txt detected: Trace.TrackingCookie C:\Documents and Settings\Owner\Cookies\owner@atdmt[2].txt detected: Trace.TrackingCookie C:\Documents and Settings\Owner\Cookies\owner@bluestreak[2].txt detected: Trace.TrackingCookie C:\Documents and Settings\Owner\Cookies\owner@doubleclick[1].txt detected: Trace.TrackingCookie C:\Documents and Settings\Owner\Cookies\owner@media.adrevolver[1].txt detected: Trace.TrackingCookie C:\Documents and Settings\Owner\Cookies\owner@questionmarket[1].txt detected: Trace.TrackingCookie C:\Documents and Settings\Owner\Cookies\owner@tribalfusion[2].txt detected: Trace.TrackingCookie C:\Documents and Settings\Owner\Desktop\SDFix.exe/Process.exe detected: Riskware.RiskTool.Win32.Processor.20 C:\Documents and Settings\Owner\Local Settings\Application Data\Mozilla\Firefox\Profiles\betvnft7.default\Cache\EEA4540Ed01 detected: Adware.Win32.Agent.zk C:\hp\bin\KillWind.exe detected: Riskware.RiskTool.Win32.PsKill.p C:\Program Files\Trend Micro\HijackThis\backups\backup-20080507-200703-537.dll detected: Adware.Win32.E404.an C:\Program Files\Updates from HP\137903\Program\BackWeb-137903.exe detected: Adware.BackWeb.a C:\SDFix\apps\Process.exe detected: Riskware.RiskTool.Win32.Processor.20 C:\SDFix\backups\backups.zip/~.exe detected: Trojan.Win32.SubSys.dr C:\SDFix\backups_old\backups.zip/527631.dll detected: Adware.Win32.E404.an C:\SDFix\backups_old\backups.zip/zfe1.exe detected: Hoax.Win32.Renos.cdh C:\SDFix.exe/Process.exe detected: Riskware.RiskTool.Win32.Processor.20 C:\System Volume Information\_restore{F2681A7D-91E5-401A-AC8B-015335799DC0}\RP672\A0089273.dll detected: Adware.Win32.E404.an C:\System Volume Information\_restore{F2681A7D-91E5-401A-AC8B-015335799DC0}\RP672\A0089277.dll detected: Adware.Win32.E404.an C:\System Volume Information\_restore{F2681A7D-91E5-401A-AC8B-015335799DC0}\RP672\A0089281.exe detected: Hoax.Win32.Renos.cdh C:\System Volume Information\_restore{F2681A7D-91E5-401A-AC8B-015335799DC0}\RP679\A0089713.exe detected: Riskware.RiskTool.Win32.Processor.20 C:\System Volume Information\_restore{F2681A7D-91E5-401A-AC8B-015335799DC0}\RP681\A0090057.exe detected: Riskware.RiskTool.Win32.Processor.20 C:\System Volume Information\_restore{F2681A7D-91E5-401A-AC8B-015335799DC0}\RP681\A0090111.exe detected: Trojan.Win32.SubSys.dr C:\System Volume Information\_restore{F2681A7D-91E5-401A-AC8B-015335799DC0}\RP681\A0090118.exe detected: Trojan.Win32.SubSys.dr C:\System Volume Information\_restore{F2681A7D-91E5-401A-AC8B-015335799DC0}\RP692\A0092892.exe detected: Trojan.Win32.Agent.duu C:\System Volume Information\_restore{F2681A7D-91E5-401A-AC8B-015335799DC0}\RP692\A0092893.EXE detected: Trojan.Win32.Agent.duu C:\System Volume Information\_restore{F2681A7D-91E5-401A-AC8B-015335799DC0}\RP692\A0092894.EXE detected: Trojan.Win32.Agent.duu C:\WINDOWS\system32\rtmipr.dll detected: Hoax.Win32.Agent.ct C:\WINDOWS\system32\SWRT01.dll detected: Adware.Win32.VirtualBouncer.g Scanned Files: 223958 Traces: 406297 Cookies: 315 Processes: 21 Found Files: 22 Traces: 10 Cookies: 7 Processes: 0 Registry keys: 0 Scan end: 5/30/2008 2:09:07 AM Scan time: 1:50:12 once again thanks a lot for your help so far
Hi karns! Aha!!! I thought I smelled a rat. Here are some files you can remove within A-squared safely. c:\windows\system32\swrt01.dll detected: Trace.File.AdDestroyer C:\Documents and Settings\Owner\Cookies\owner@advertising[2].txt detected: Trace.TrackingCookie C:\Documents and Settings\Owner\Cookies\owner@atdmt[2].txt detected: Trace.TrackingCookie C:\Documents and Settings\Owner\Cookies\owner@bluestreak[2].txt detected: Trace.TrackingCookie C:\Documents and Settings\Owner\Cookies\owner@doubleclick[1].txt detected: Trace.TrackingCookie C:\Documents and Settings\Owner\Cookies\owner@media.adrevolver[1].txt detected: Trace.TrackingCookie C:\Documents and Settings\Owner\Cookies\owner@questionmarket[1].txt detected: Trace.TrackingCookie C:\Documents and Settings\Owner\Cookies\owner@tribalfusion[2].txt detected: Trace.TrackingCookie C:\Documents and Settings\Owner\Local Settings\Application Data\Mozilla\Firefox\Profiles\betvnft7.default\Cache\EEA4540Ed01 detected: Adware.Win32.Agent.zk C:\Program Files\Trend Micro\HijackThis\backups\backup-20080507-200703-537.dll detected: Adware.Win32.E404.an C:\System Volume Information\_restore{F2681A7D-91E5-401A-AC8B-015335799DC0}\RP672\A0089273.dll detected: Adware.Win32.E404.an C:\System Volume Information\_restore{F2681A7D-91E5-401A-AC8B-015335799DC0}\RP672\A0089277.dll detected: Adware.Win32.E404.an C:\System Volume Information\_restore{F2681A7D-91E5-401A-AC8B-015335799DC0}\RP672\A0089281.exe detected: Hoax.Win32.Renos.cdh C:\System Volume Information\_restore{F2681A7D-91E5-401A-AC8B-015335799DC0}\RP679\A0089713.exe detected: Riskware.RiskTool.Win32.Processor.20 C:\System Volume Information\_restore{F2681A7D-91E5-401A-AC8B-015335799DC0}\RP681\A0090057.exe detected: Riskware.RiskTool.Win32.Processor.20 C:\System Volume Information\_restore{F2681A7D-91E5-401A-AC8B-015335799DC0}\RP681\A0090111.exe detected: Trojan.Win32.SubSys.dr C:\System Volume Information\_restore{F2681A7D-91E5-401A-AC8B-015335799DC0}\RP681\A0090118.exe detected: Trojan.Win32.SubSys.dr C:\System Volume Information\_restore{F2681A7D-91E5-401A-AC8B-015335799DC0}\RP692\A0092892.exe detected: Trojan.Win32.Agent.duu C:\System Volume Information\_restore{F2681A7D-91E5-401A-AC8B-015335799DC0}\RP692\A0092893.EXE detected: Trojan.Win32.Agent.duu C:\System Volume Information\_restore{F2681A7D-91E5-401A-AC8B-015335799DC0}\RP692\A0092894.EXE detected: Trojan.Win32.Agent.duu C:\WINDOWS\system32\rtmipr.dll detected: Hoax.Win32.Agent.ct C:\WINDOWS\system32\SWRT01.dll detected: Adware.Win32.VirtualBouncer.g Do you recognize Spynomore and Advanced Dvd Player as being installed on your system with your consent? If so, you can ignore these entries. If you do not recognize them as legitimate, you can remove them. Value: HKEY_USERS\S-1-5-21-1395713349-4222255101-3498602251-1003\Software\Illysoft\SNM\Settings --> IEProtection detected: Trace.Registry.SpyNoMore Value: HKEY_USERS\S-1-5-21-1395713349-4222255101-3498602251-1003\Software\Illysoft\SNM\Settings --> ProcProtection detected: Trace.Registry.SpyNoMore Value: HKEY_USERS\S-1-5-21-1395713349-4222255101-3498602251-1003\Software\Illysoft\SNM\Settings --> RegProtection detected: Trace.Registry.SpyNoMore c:\program files\advanceddvdplayer detected: Trace.Directory.AdvancedDVDPlayer c:\program files\advanceddvdplayer\~myplaylist~ detected: Trace.File.AdvancedDVDPlayer c:\program files\advanceddvdplayer\advanceddvdplayer.exe detected: Trace.File.AdvancedDVDPlayer c:\program files\advanceddvdplayer\default playlist.m3u detected: Trace.File.AdvancedDVDPlayer Value: HKEY_USERS\S-1-5-21-1395713349-4222255101-3498602251-1003\Software\AdvancedDVDPlayer\Directory --> CurrentPath detected: Trace.Registry.AdvancedDVDPlayer Value: HKEY_USERS\S-1-5-21-1395713349-4222255101-3498602251-1003\Software\AdvancedDVDPlayer\Directory --> TempPath detected: Trace.Registry.AdvancedDVDPlayer Can you confirm that you have ran SDFIx on your computer, and have files located in C:\SDFix and C:\Documents and Settings\Owner\Desktop\SDFix.exe? If you have ran SDFix and have it located on your desktop, you can ignore these following entries. If not, you can remove these entries. C:\Documents and Settings\Owner\Desktop\SDFix.exe/Process.exe detected: Riskware.RiskTool.Win32.Processor.20 C:\SDFix\apps\Process.exe detected: Riskware.RiskTool.Win32.Processor.20 C:\SDFix\backups\backups.zip/~.exe detected: Trojan.Win32.SubSys.dr C:\SDFix\backups_old\backups.zip/527631.dll detected: Adware.Win32.E404.an C:\SDFix\backups_old\backups.zip/zfe1.exe detected: Hoax.Win32.Renos.cdh C:\SDFix.exe/Process.exe detected: Riskware.RiskTool.Win32.Processor.20 Also, please do not remove these entries as they are part of HP, and are detected as riskware because of their functions. C:\hp\bin\KillWind.exe detected: Riskware.RiskTool.Win32.PsKill.p C:\Program Files\Updates from HP\137903\Program\BackWeb-137903.exe detected: Adware.BackWeb.a Remove all the entries above which I have told you to remove, restart, then scan again. If they are still present in your system or are undeletable, you may have to run it in safe mode. Also, running Spybot and Antivir may confirm more malware on your system. Best Regards
Sorry I was out of town for a couple of days. I thought I got it but it still redirects me also I now have no sound on my computer at all so I used this website http://www.kellys-korner-xp.com/xp_tweaks.htm which installed some of the registries. anyways here are my new logs Hijack this: Logfile of Trend Micro HijackThis v2.0.2 Scan saved at 7:33:23 PM, on 6/4/2008 Platform: Windows XP SP2 (WinNT 5.01.2600) MSIE: Internet Explorer v7.00 (7.00.6000.16640) Boot mode: Normal Running processes: C:\WINDOWS\System32\smss.exe C:\WINDOWS\system32\winlogon.exe C:\WINDOWS\system32\services.exe C:\WINDOWS\system32\lsass.exe C:\WINDOWS\system32\svchost.exe C:\WINDOWS\System32\svchost.exe C:\WINDOWS\system32\svchost.exe C:\WINDOWS\Explorer.EXE C:\WINDOWS\system32\svchost.exe C:\WINDOWS\Mixer.exe C:\Program Files\a-squared Anti-Malware\a2service.exe C:\Program Files\Internet Explorer\iexplore.exe C:\Program Files\Trend Micro\HijackThis\HijackThis.exe R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896 R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?LinkId=69157 R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157 R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896 R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896 R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?LinkId=69157 R0 - HKLM\Software\Microsoft\Internet Explorer\Search,SearchAssistant = R0 - HKLM\Software\Microsoft\Internet Explorer\Search,CustomizeSearch = R1 - HKCU\Software\Microsoft\Internet Explorer\Main,First Home Page = http://go.microsoft.com/fwlink/?LinkId=54843 O4 - HKLM\..\Run: [C-Media Mixer] Mixer.exe /startup O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime O4 - HKCU\..\Run: [OM2_Monitor] "C:\Program Files\OLYMPUS\OLYMPUS Master 2\MMonitor.exe" -NoStart O4 - .DEFAULT User Startup: mod_sm.lnk = C:\hp\bin\cloaker.exe (User 'Default user') O23 - Service: a-squared Anti-Malware Service (a2AntiMalware) - Emsi Software GmbH - C:\Program Files\a-squared Anti-Malware\a2service.exe -- End of file - 2129 bytes and A2 a-squared Anti-Malware - Version 3.5 Last update: 6/4/2008 7:36:38 PM Scan settings: Objects: Memory, Traces, Cookies, C:\, D:\ Scan archives: On Heuristics: On ADS Scan: On Scan start: 6/4/2008 7:37:14 PM C:\Documents and Settings\Owner\Cookies\owner@2o7[1].txt detected: Trace.TrackingCookie C:\Documents and Settings\Owner\Cookies\owner@advertising[1].txt detected: Trace.TrackingCookie C:\Documents and Settings\Owner\Cookies\owner@com[1].txt detected: Trace.TrackingCookie C:\Documents and Settings\Owner\Cookies\owner@counter13.sextracker[1].txt detected: Trace.TrackingCookie C:\Documents and Settings\Owner\Cookies\owner@counter6.sextracker[1].txt detected: Trace.TrackingCookie C:\Documents and Settings\Owner\Cookies\owner@doubleclick[1].txt detected: Trace.TrackingCookie C:\Documents and Settings\Owner\Cookies\owner@findwhat[1].txt detected: Trace.TrackingCookie C:\Documents and Settings\Owner\Cookies\owner@media.adrevolver[1].txt detected: Trace.TrackingCookie C:\Documents and Settings\Owner\Cookies\owner@sextracker[2].txt detected: Trace.TrackingCookie C:\Documents and Settings\Owner\Cookies\owner@specificclick[2].txt detected: Trace.TrackingCookie C:\Documents and Settings\Owner\Desktop\SDFix.exe/Process.exe detected: Riskware.RiskTool.Win32.Processor.20 C:\hp\bin\KillWind.exe detected: Riskware.RiskTool.Win32.PsKill.p C:\SDFix\apps\Process.exe detected: Riskware.RiskTool.Win32.Processor.20 C:\SDFix.exe/Process.exe detected: Riskware.RiskTool.Win32.Processor.20 C:\System Volume Information\_restore{F2681A7D-91E5-401A-AC8B-015335799DC0}\RP672\A0089273.dll detected: Adware.Win32.E404.an C:\System Volume Information\_restore{F2681A7D-91E5-401A-AC8B-015335799DC0}\RP672\A0089277.dll detected: Adware.Win32.E404.an C:\System Volume Information\_restore{F2681A7D-91E5-401A-AC8B-015335799DC0}\RP672\A0089281.exe detected: Hoax.Win32.Renos.cdh C:\System Volume Information\_restore{F2681A7D-91E5-401A-AC8B-015335799DC0}\RP679\A0089713.exe detected: Riskware.RiskTool.Win32.Processor.20 C:\System Volume Information\_restore{F2681A7D-91E5-401A-AC8B-015335799DC0}\RP681\A0090057.exe detected: Riskware.RiskTool.Win32.Processor.20 C:\System Volume Information\_restore{F2681A7D-91E5-401A-AC8B-015335799DC0}\RP681\A0090111.exe detected: Trojan.Win32.SubSys.dr C:\System Volume Information\_restore{F2681A7D-91E5-401A-AC8B-015335799DC0}\RP681\A0090118.exe detected: Trojan.Win32.SubSys.dr C:\System Volume Information\_restore{F2681A7D-91E5-401A-AC8B-015335799DC0}\RP690\A0091833.sys detected: Rootkit.Win32.Agent.aol C:\System Volume Information\_restore{F2681A7D-91E5-401A-AC8B-015335799DC0}\RP692\A0092892.exe detected: Trojan.Win32.Agent.duu C:\System Volume Information\_restore{F2681A7D-91E5-401A-AC8B-015335799DC0}\RP692\A0092893.EXE detected: Trojan.Win32.Agent.duu C:\System Volume Information\_restore{F2681A7D-91E5-401A-AC8B-015335799DC0}\RP692\A0092894.EXE detected: Trojan.Win32.Agent.duu C:\System Volume Information\_restore{F2681A7D-91E5-401A-AC8B-015335799DC0}\RP694\A0094943.dll detected: Adware.Win32.VirtualBouncer.g C:\System Volume Information\_restore{F2681A7D-91E5-401A-AC8B-015335799DC0}\RP694\A0095940.dll detected: Hoax.Win32.Agent.ct C:\System Volume Information\_restore{F2681A7D-91E5-401A-AC8B-015335799DC0}\RP694\A0095941.exe detected: Adware.BackWeb.a C:\System Volume Information\_restore{F2681A7D-91E5-401A-AC8B-015335799DC0}\RP694\A0095942.dll detected: Adware.Win32.E404.an Scanned Files: 220100 Traces: 408349 Cookies: 353 Processes: 17 Found Files: 19 Traces: 0 Cookies: 10 Processes: 0 Registry keys: 0 Scan end: 6/4/2008 9:48:24 PM Scan time: 2:11:10
Hey karns. I see that your problem came back again. Sounds a whole lot like vundo. Please download both vundofix and virtumundebegone. Run both of them and see how it goes. As for your lack of sound, perhaps your sound driver is damaged. You can reinstall your driver by downloading it from your computer's manufacturer site or somewhere else. Best Regards
Thanks I downloaded the vundofix however it didn't find anything. I ran smitfraudfix and here is the log SmitFraudFix v2.323 Scan done at 23:42:45.75, Mon 06/09/2008 Run from C:\Documents and Settings\Owner\Desktop\SmitfraudFix\SmitfraudFix OS: Microsoft Windows XP [Version 5.1.2600] - Windows_NT The filesystem type is NTFS Fix run in normal mode »»»»»»»»»»»»»»»»»»»»»»»» SharedTaskScheduler Before SmitFraudFix !!!Attention, following keys are not inevitably infected!!! SrchSTS.exe by S!Ri Search SharedTaskScheduler's .dll »»»»»»»»»»»»»»»»»»»»»»»» Killing process »»»»»»»»»»»»»»»»»»»»»»»» hosts »»»»»»»»»»»»»»»»»»»»»»»» VACFix VACFix Credits: Malware Analysis & Diagnostic Code: S!Ri »»»»»»»»»»»»»»»»»»»»»»»» Winsock2 Fix S!Ri's WS2Fix: LSP not Found. »»»»»»»»»»»»»»»»»»»»»»»» Generic Renos Fix GenericRenosFix by S!Ri »»»»»»»»»»»»»»»»»»»»»»»» Deleting infected files »»»»»»»»»»»»»»»»»»»»»»»» IEDFix IEDFix Credits: Malware Analysis & Diagnostic Code: S!Ri »»»»»»»»»»»»»»»»»»»»»»»» 404Fix 404Fix Credits: Malware Analysis & Diagnostic Code: S!Ri »»»»»»»»»»»»»»»»»»»»»»»» DNS Description: NVIDIA nForce MCP Networking Controller - Packet Scheduler Miniport DNS Server Search Order: 65.24.7.10 DNS Server Search Order: 65.24.7.11 HKLM\SYSTEM\CCS\Services\Tcpip\..\{B8E8917C-11E3-4CF2-915D-D9923917E4F7}: DhcpNameServer=65.24.7.10 65.24.7.11 HKLM\SYSTEM\CS1\Services\Tcpip\..\{B8E8917C-11E3-4CF2-915D-D9923917E4F7}: DhcpNameServer=65.24.7.10 65.24.7.11 HKLM\SYSTEM\CS2\Services\Tcpip\..\{B8E8917C-11E3-4CF2-915D-D9923917E4F7}: DhcpNameServer=65.24.7.10 65.24.7.11 HKLM\SYSTEM\CCS\Services\Tcpip\Parameters: DhcpNameServer=65.24.7.10 65.24.7.11 HKLM\SYSTEM\CS1\Services\Tcpip\Parameters: DhcpNameServer=65.24.7.10 65.24.7.11 HKLM\SYSTEM\CS2\Services\Tcpip\Parameters: DhcpNameServer=65.24.7.10 65.24.7.11 »»»»»»»»»»»»»»»»»»»»»»»» Deleting Temp Files »»»»»»»»»»»»»»»»»»»»»»»» Winlogon.System !!!Attention, following keys are not inevitably infected!!! [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon] "System"="" »»»»»»»»»»»»»»»»»»»»»»»» Registry Cleaning Registry Cleaning done. »»»»»»»»»»»»»»»»»»»»»»»» SharedTaskScheduler After SmitFraudFix !!!Attention, following keys are not inevitably infected!!! SrchSTS.exe by S!Ri Search SharedTaskScheduler's .dll »»»»»»»»»»»»»»»»»»»»»»»» End Here is a new Hijackthis scan Logfile of Trend Micro HijackThis v2.0.2 Scan saved at 12:01:47 AM, on 6/10/2008 Platform: Windows XP SP2 (WinNT 5.01.2600) MSIE: Internet Explorer v7.00 (7.00.6000.16640) Boot mode: Normal Running processes: C:\WINDOWS\System32\smss.exe C:\WINDOWS\system32\winlogon.exe C:\WINDOWS\system32\services.exe C:\WINDOWS\system32\lsass.exe C:\WINDOWS\system32\svchost.exe C:\WINDOWS\System32\svchost.exe C:\WINDOWS\system32\svchost.exe C:\WINDOWS\system32\svchost.exe C:\WINDOWS\Mixer.exe C:\WINDOWS\helloserv.exe C:\Program Files\a-squared Anti-Malware\a2service.exe C:\WINDOWS\explorer.exe C:\Program Files\Internet Explorer\iexplore.exe C:\Program Files\Trend Micro\HijackThis\HijackThis.exe O4 - HKLM\..\Run: [C-Media Mixer] Mixer.exe /startup O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime O4 - HKCU\..\Run: [OM2_Monitor] "C:\Program Files\OLYMPUS\OLYMPUS Master 2\MMonitor.exe" -NoStart O4 - HKCU\..\Run: [helloserv] C:\WINDOWS\helloserv.exe O4 - HKUS\S-1-5-18\..\Run: [Firewall auto setup] C:\WINDOWS\TEMP\winlogon.exe (User 'SYSTEM') O4 - HKUS\.DEFAULT\..\Run: [Firewall auto setup] C:\WINDOWS\TEMP\winlogon.exe (User 'Default user') O4 - .DEFAULT User Startup: mod_sm.lnk = C:\hp\bin\cloaker.exe (User 'Default user') O23 - Service: a-squared Anti-Malware Service (a2AntiMalware) - Emsi Software GmbH - C:\Program Files\a-squared Anti-Malware\a2service.exe -- End of file - 1463 bytes I am still getting redirected however it is now in a popup instead of the window that I am searching on. So when I click a link a popup comes up with something totally irellevant to what I clicked on while the main page stays the same. I also noticed that I have 3 winlogons. 2 of which were created on 2003 and 2004. The third is in my windows temp folder with a create date of June 6, 2008. Could this be something? Thanks again for all your help
Hey karns. Sorry for this bitter and possibly cruel piece of advice, but I would actually suggest a format. The choice is yours, and you are free to decide. However, if you decide to fight, I will be here. Firstly, please download Autoruns from Sysinternals, and take a screenshot of everything under the tabs Explorer and Winlogon. Also, using HijackThis Tools, please create a startup list log and post it here. Something has changed in your hijackthis log. Do you recognize the file C:\WINDOWS\helloserv.exe? If you do not, and have done nothing to invite any more malware, I suspect a trojan downloader in your case. Those can be hard to take care of, as they download more and more malware. Please look here: http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=WORM_ZHELATI.BHA&VSect=T for more information on your helloserv.exe file. As for your many winlogon problems, HijackThis does not detect a thing. It may be the problem, as there are not supposed to be multiple winlogon files, only one in the C:\Windows\system32. You may quarantine these files by isolating them into another folder on your drive and renaming them and their file extensions. This may also be another sympton of your downloader malware. Also, this can be a reason to promote the idea of formatting, as those hidden settings which downloaders make to be able to download malware may never be reversed, thus never fixing your computer. Have you run Virtumundebegone? If not, please download it from here: http://secured2k.home.comcast.net/tools/VirtumundoBeGone.exe I may be throwing pebbles at a wall, but Antivir Spybot might be worth a try. It digs deep, and is pretty good at downloaders. Best Regards PS: One more thing. Go to your C:\Windows\system32, and arrange all your files by date. Scroll down to the latest, and look for random-named dll or exe files. Post those files here.