Jump to content


Photo

HijackThis Log


  • Please log in to reply
5 replies to this topic

#1 Radical SystemZ

Radical SystemZ

    Member

  • New Member
  • Pip
  • 4 posts

Posted 25 June 2004 - 04:44 PM

I am working on a comp that has been hijacked, I am enclosing the log from Hijackthis, any help would be greatly appreciated.

==============log==============

Logfile of HijackThis v1.97.7
Scan saved at 4:41:32 PM, on 6/25/2004
Platform: Windows XP SP1 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP1 (6.00.2800.1106)

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\Common Files\Symantec Shared\ccEvtMgr.exe
C:\PROGRA~1\COMMON~1\AOL\ACS\acsd.exe
C:\Program Files\Microsoft SQL Server\MSSQL$ALLDATASC\Binn\sqlservr.exe
C:\WINDOWS\Explorer.EXE
C:\Program Files\Norton AntiVirus\navapsvc.exe
C:\WINDOWS\System32\nvsvc32.exe
C:\WINDOWS\wanmpsvc.exe
C:\WINDOWS\mfcia32.exe
C:\WINDOWS\System32\DSentry.exe
C:\Program Files\Common Files\Dell\EUSW\Support.exe
C:\Program Files\Dell\Support\Alert\bin\NotifyAlert.exe
C:\WINDOWS\system32\msib.exe
C:\Program Files\Common Files\Symantec Shared\ccApp.exe
C:\Program Files\Messenger\msmsgs.exe
C:\ALLDATAW\ServiceCenter\Tools\ServiceCenterAutoAdmin.exe
C:\Documents and Settings\DELL\Desktop\HijackThis.exe

R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = res://C:\WINDOWS\sebim.dll/sp.html#96676
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = res://sebim.dll/index.html#96676
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://www.dell4me.com/myway
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = res://sebim.dll/index.html#96676
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = res://C:\WINDOWS\sebim.dll/sp.html#96676
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = res://sebim.dll/index.html#96676
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = res://C:\WINDOWS\sebim.dll/sp.html#96676
R1 - HKCU\Software\Microsoft\Internet Connection Wizard,Shellnext = http://www.dell4me.com/myway
O2 - BHO: (no name) - {043F02AD-CD1E-97CC-ADFC-0D6EFF6BCAC5} - C:\WINDOWS\system32\sysis.dll
O2 - BHO: NAV Helper - {BDF3E430-B101-42AD-A544-FADC6B084872} - C:\Program Files\Norton AntiVirus\NavShExt.dll
O3 - Toolbar: &Radio - {8E718888-423F-11D2-876E-00A0C9082467} - C:\WINDOWS\System32\msdxm.ocx
O3 - Toolbar: Norton AntiVirus - {42CDD1BF-3FFB-4238-8AD1-7859DF00B1D6} - C:\Program Files\Norton AntiVirus\NavShExt.dll
O4 - HKLM\..\Run: [ATIModeChange] Ati2mdxx.exe
O4 - HKLM\..\Run: [ATIPTA] C:\Program Files\ATI Technologies\ATI Control Panel\atiptaxx.exe
O4 - HKLM\..\Run: [DVDSentry] C:\WINDOWS\System32\DSentry.exe
O4 - HKLM\..\Run: [DwlClient] C:\Program Files\Common Files\Dell\EUSW\Support.exe
O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE C:\WINDOWS\System32\NvCpl.dll,NvStartup
O4 - HKLM\..\Run: [nwiz] nwiz.exe /install
O4 - HKLM\..\Run: [sysis.exe] C:\WINDOWS\system32\sysis.exe
O4 - HKLM\..\Run: [msib.exe] C:\WINDOWS\system32\msib.exe
O4 - HKLM\..\Run: [ccApp] "C:\Program Files\Common Files\Symantec Shared\ccApp.exe"
O4 - HKLM\..\Run: [ccRegVfy] "C:\Program Files\Common Files\Symantec Shared\ccRegVfy.exe"
O4 - HKCU\..\Run: [MSMSGS] "C:\Program Files\Messenger\msmsgs.exe" /background
O4 - HKLM\..\RunOnce: [addih.exe] C:\WINDOWS\addih.exe
O4 - Global Startup: ALLDATASC MSDE Server.lnk = C:\Program Files\Microsoft SQL Server\80\Tools\Binn\scm.exe
O4 - Global Startup: Auto Admin Utility.lnk = ?
O9 - Extra 'Tools' menuitem: Sun Java Console (HKLM)
O9 - Extra button: Real.com (HKLM)
O9 - Extra button: Messenger (HKLM)
O9 - Extra 'Tools' menuitem: Messenger (HKLM)
O16 - DPF: {74D05D43-3236-11D4-BDCD-00C04F9A3B61} (HouseCall Control) - http://a840.g.akamai...all/xscan53.cab

========================================

I tried manually deleting the registry references for everything pertaining too: sebim.dll/sp.html#96676 however it just recreated itself.

Thanks in advance

Edited by Radical SystemZ, 25 June 2004 - 04:46 PM.


#2 Radical SystemZ

Radical SystemZ

    Member

  • New Member
  • Pip
  • 4 posts

Posted 26 June 2004 - 02:24 PM

BUMP

#3 Radical SystemZ

Radical SystemZ

    Member

  • New Member
  • Pip
  • 4 posts

Posted 27 June 2004 - 02:12 PM

BUMP

#4 Rasman

Rasman

    Member

  • Full Member
  • Pip
  • 7 posts

Posted 27 June 2004 - 03:00 PM

This one solved a similar problem for me: http://hsremove.bravehost.com - seams to be a tool made just for this type of hijacking

#5 Rasman

Rasman

    Member

  • Full Member
  • Pip
  • 7 posts

Posted 28 June 2004 - 12:45 PM

Correction - Site Moved to http://www.hsremove.com

#6 Radical SystemZ

Radical SystemZ

    Member

  • New Member
  • Pip
  • 4 posts

Posted 28 June 2004 - 01:58 PM

Correction - Site Moved to http://www.hsremove.com

One has to wonder why if that is there to remove malware after running it, it attempts to hijack your browser. Fruthermore it does not create a log of its actions, simply gives a summary, I am a bit skeptical of it.

Edited by Radical SystemZ, 28 June 2004 - 01:59 PM.





0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users

Member of ASAP and UNITE
Support SpywareInfo Forum - click the button