Who hijacked URL?

problem description

Chrome and Edge browsers under the Win10 system visit a certain east website, and then enter the URL directly and then jump to a link with a lot of parameters, which can be judged to be the parameters of the promotion website:

https://www.jd.com/?cu=true&utm_source=hao.wabudian.com&utm_medium=tuiguang&utm_campaign=t_53287198_&utm_term=d9d7165b5aa645029a6805f8f1466ddb

it also happened once before. At that time, it was found that a plug-in JSONView in Chrome was installed as a copycat version, and then the system was reinstalled. Now there is a problem not only with Chrome,Edge. Search is said to be hijacked by ISP, but other people on the same network do not have this phenomenon. Trying to stop all stoppable services is also invalid. Antivirus software is also ineffective in comprehensive antivirus. Only entering the safe mode is normal. Seek a solution!

Mar.25,2022

the answer has been found through my own unremitting efforts. The culprit is that a fake Office Activator (may actually activate). The original file name is office10_13_16_act.exe . After running, there is no interface, and eventually a prompt of "activate successfully" will pop up. After running, mkms.dat and vkms.dll files will be generated in the path C:\ Program Files (x86)\ Common Files\ system\ msadc . However, after each boot, there will be a "process" without a name, and viewing the details of the process will be transferred to a Windows service (the specific service name is forgotten, in short, it is about KMS activation and so on).

solution:

  1. Ctrl+Alt+Del opens the task manager and ends the process
  2. Open the Windows service and stop it (fast, otherwise it will be turned on automatically)
  3. Command Line sc delete {service_name} remove this service
  4. Delete two files of the above C:\ Program Files (x86)\ Common Files\ system\ msadc\
Menu