SDFix: Version 1.136
Run by Marta on 2008-02-05 at 01:47
Microsoft Windows XP [Wersja 5.1.2600]
Running From: C:\SDFix
Safe Mode:
Checking Services:
Restoring Windows Registry Values
Restoring Windows Default Hosts File
Rebooting...
Normal Mode:
Checking Files:
No Trojan Files Found
Removing Temp Files...
ADS Check:
Final Check:
catchme 0.3.1344.2 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2008-02-05 01:53:01
Windows 5.1.2600 Dodatek Service Pack 2 NTFS
scanning hidden processes ...
scanning hidden services & system hive ...
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\sptd\Cfg]
"s1"=dword:78aa22e0
"s2"=dword:adaa6873
"h0"=dword:00000001
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4]
"p0"="C:\Program Files\DAEMON Tools\"
"h0"=dword:00000000
"khjeh"=hex:86,55,b5,18,af,ae,bd,06,9d,03,4e,08,6e,24,9b,7b,67,8c,69,e3,37,..
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4\00000001]
"a0"=hex:20,01,00,00,01,29,99,bc,ee,e3,21,7f,a1,d4,6b,a1,5f,bd,00,5d,47,..
"khjeh"=hex:6a,cf,df,5a,1e,6d,51,cd,43,77,1c,79,ff,ed,23,6a,bb,32,6e,27,12,..
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4\00000001\0Jf40]
"khjeh"=hex:f1,5e,7b,4d,f0,ee,66,c1,6e,31,81,15,b0,b9,37,82,07,15,d5,70,02,..
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4]
"p0"="C:\Program Files\DAEMON Tools\"
"h0"=dword:00000000
"khjeh"=hex:86,55,b5,18,af,ae,bd,06,9d,03,4e,08,6e,24,9b,7b,67,8c,69,e3,37,..
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4\00000001]
"a0"=hex:20,01,00,00,01,29,99,bc,ee,e3,21,7f,a1,d4,6b,a1,5f,bd,00,5d,47,..
"khjeh"=hex:6a,cf,df,5a,1e,6d,51,cd,43,77,1c,79,ff,ed,23,6a,bb,32,6e,27,12,..
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4\00000001\0Jf40]
"khjeh"=hex:f1,5e,7b,4d,f0,ee,66,c1,6e,31,81,15,b0,b9,37,82,07,15,d5,70,02,..
scanning hidden registry entries ...
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\System]
"OODEFRAG10.00.00.01WORKSTATION"="3AE29DA4240B7F5DAA86F8D49267FB8A25BADBCDDA26D040AAF419093734
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\MenuOrder\Favorites\A\1\5\1c]
"Order"=hex:08,00,00,00,02,00,00,00,b8,01,00,00,01,00,00,00,04,00,00,00,8c,..
scanning hidden files ...
scan completed successfully
hidden processes: 0
hidden services: 0
hidden files: 0
Remaining Services:
------------------
Authorized Application Key Export:
[HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\standardprofile\authorizedapplications\list]
"C:\\Program Files\\Valve\\hlds.exe"="C:\\Program Files\\Valve\\hlds.exe:*:Enabled:HLDS Launcher"
"C:\\Program Files\\Valve\\hl.exe"="C:\\Program Files\\Valve\\hl.exe:*:Enabled:Half-Life Launcher"
"C:\\Program Files\\eMule\\emule.exe"="C:\\Program Files\\eMule\\emule.exe:*:Enabled:eMule"
"C:\\Documents and Settings\\Marta\\Pulpit\\Diablo II + LoD\\Diablo II.exe"="C:\\Documents and Settings\\Marta\\Pulpit\\Diablo II + LoD\\Diablo II.exe:*:Enabled:Diablo II"
"C:\\Program Files\\THQ\\Dawn of War\\W40k.exe"="C:\\Program Files\\THQ\\Dawn of War\\W40k.exe:*:Enabled:W40k"
"C:\\Program Files\\Skype\\Phone\\Skype.exe"="C:\\Program Files\\Skype\\Phone\\Skype.exe:*:Enabled:Skype. Take a deep breath "
[HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\domainprofile\authorizedapplications\list]
Remaining Files:
---------------
Files with Hidden Attributes:
Sat 10 Nov 2007 4,348 ..SH. --- "C:\Documents and Settings\All Users\DRM\DRMv1.bak"
Sat 10 Nov 2007 4,348 ...H. --- "C:\Documents and Settings\Marta\Moje dokumenty\Moja muzyka\Kopia zapasowa licencji\drmv1key.bak"
Sat 10 Nov 2007 20 A..H. --- "C:\Documents and Settings\Marta\Moje dokumenty\Moja muzyka\Kopia zapasowa licencji\drmv1lic.bak"
Sat 10 Nov 2007 9,656 A.SH. --- "C:\Documents and Settings\Marta\Moje dokumenty\Moja muzyka\Kopia zapasowa licencji\drmv2key.bak"
Finished!