SDFix: Version 1.240 Run by User on 2007-01-01 at 15:37
Microsoft Windows XP [Wersja 5.1.2600]
Running From: C:\SDFix
Checking Services :
Restoring Default Security Values
Restoring Default Hosts File
Rebooting
Checking Files :
Trojan Files Found:
C:\autorun.inf - Deleted
Removing Temp Files
ADS Check :
Final Check :
catchme 0.3.1361.2 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2007-01-01 15:43:42
Windows 5.1.2600 Dodatek Service Pack 3 NTFS
scanning hidden processes ...
scanning hidden services & system hive ...
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4]
"p0"="C:\Program Files\DAEMON Tools Lite\"
"h0"=dword:00000000
"khjeh"=hex:9e,81,70,95,f4,fc,ea,16,17,e3,7a,f9,43,f5,4d,70,0a,e2,6e,c1,20,..
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4\00000001]
"a0"=hex:20,01,00,00,7f,c6,15,73,85,c1,02,2e,5b,c3,1d,a4,41,c7,1a,c1,e1,..
"khjeh"=hex:71,ec,b7,89,88,b2,74,74,e8,3e,0c,1e,5f,cd,53,e9,2a,bb,1a,c2,b6,..
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4\00000001\0Jf40]
"khjeh"=hex:a5,27,f5,cc,4b,d4,b5,24,c3,84,5f,a7,1d,0c,c5,87,b3,ce,5c,fb,91,..
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\sptd\Cfg]
"s1"=dword:2df9c43f
"s2"=dword:110480d0
"h0"=dword:00000001
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4]
"p0"="C:\Program Files\DAEMON Tools Lite\"
"h0"=dword:00000000
"khjeh"=hex:9e,81,70,95,f4,fc,ea,16,17,e3,7a,f9,43,f5,4d,70,0a,e2,6e,c1,20,..
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4\00000001]
"a0"=hex:20,01,00,00,7f,c6,15,73,85,c1,02,2e,5b,c3,1d,a4,41,c7,1a,c1,e1,..
"khjeh"=hex:71,ec,b7,89,88,b2,74,74,e8,3e,0c,1e,5f,cd,53,e9,2a,bb,1a,c2,b6,..
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4\00000001\0Jf40]
"khjeh"=hex:a5,27,f5,cc,4b,d4,b5,24,c3,84,5f,a7,1d,0c,c5,87,b3,ce,5c,fb,91,..
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet003\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4]
"p0"="C:\Program Files\DAEMON Tools Lite\"
"h0"=dword:00000000
"khjeh"=hex:9e,81,70,95,f4,fc,ea,16,17,e3,7a,f9,43,f5,4d,70,0a,e2,6e,c1,20,..
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet003\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4\00000001]
"a0"=hex:20,01,00,00,7f,c6,15,73,85,c1,02,2e,5b,c3,1d,a4,41,c7,1a,c1,e1,..
"khjeh"=hex:71,ec,b7,89,88,b2,74,74,e8,3e,0c,1e,5f,cd,53,e9,2a,bb,1a,c2,b6,..
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet003\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4\00000001\0Jf40]
"khjeh"=hex:a5,27,f5,cc,4b,d4,b5,24,c3,84,5f,a7,1d,0c,c5,87,b3,ce,5c,fb,91,..
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet004\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4]
"p0"="C:\Program Files\DAEMON Tools Lite\"
"h0"=dword:00000000
"khjeh"=hex:9e,81,70,95,f4,fc,ea,16,17,e3,7a,f9,43,f5,4d,70,0a,e2,6e,c1,20,..
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet004\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4\00000001]
"a0"=hex:20,01,00,00,7f,c6,15,73,85,c1,02,2e,5b,c3,1d,a4,41,c7,1a,c1,e1,..
"khjeh"=hex:71,ec,b7,89,88,b2,74,74,e8,3e,0c,1e,5f,cd,53,e9,2a,bb,1a,c2,b6,..
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet004\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4\00000001\0Jf40]
"khjeh"=hex:a5,27,f5,cc,4b,d4,b5,24,c3,84,5f,a7,1d,0c,c5,87,b3,ce,5c,fb,91,..
scanning hidden registry entries ...
scanning hidden files ...
scan completed successfully
hidden processes: 0
hidden services: 0
hidden files: 0
Remaining Services :
Authorized Application Key Export:
[HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\standardprofile\authorizedapplications\list]
"%windir%\\system32\\sessmgr.exe"="%windir%\\system32\\sessmgr.exe:*:enabled:@xpsp2res.dll,-22019"
"%windir%\\Network Diagnostic\\xpnetdiag.exe"="%windir%\\Network Diagnostic\\xpnetdiag.exe:*:Enabled:@xpsp3res.dll,-20000"
[HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\domainprofile\authorizedapplications\list]
"%windir%\\system32\\sessmgr.exe"="%windir%\\system32\\sessmgr.exe:*:enabled:@xpsp2res.dll,-22019"
"%windir%\\Network Diagnostic\\xpnetdiag.exe"="%windir%\\Network Diagnostic\\xpnetdiag.exe:*:Enabled:@xpsp3res.dll,-20000"
Remaining Files :
File Backups: - C:\SDFix\backups\backups.zip
Files with Hidden Attributes :
Mon 14 Apr 2008 1,695,232 ..SH. --- "C:\Program Files\Messenger\msmsgs.exe"
Fri 19 Dec 2008 4,348 A.SH. --- "C:\Documents and Settings\All Users\DRM\DRMv1.bak"
Mon 23 Feb 2009 3,648,000 ...H. --- "C:\Documents and Settings\User\Pulpit\~WRL0163.tmp"
Tue 24 Feb 2009 4,363,776 ...H. --- "C:\Documents and Settings\User\Dane aplikacji\Microsoft\Word\~WRL0085.tmp"
Tue 24 Feb 2009 4,363,776 ...H. --- "C:\Documents and Settings\User\Dane aplikacji\Microsoft\Word\~WRL3125.tmp"
Tue 23 Oct 2007 3,350,528 A..H. --- "C:\Documents and Settings\User\Dane aplikacji\U3\temp\Launchpad Removal.exe"
Finished!