SDFix: Version 1.113 Run by Daniel on 2007-11-05 at 17:38 Microsoft Windows XP [Wersja 5.1.2600] Running From: F:\SDFix Safe Mode: Checking Services: Restoring Windows Registry Values Restoring Windows Default Hosts File Rebooting… Normal Mode: Checking Files: Trojan Files Found: F:\WINDOWS\system32\i - Deleted F:\WINDOWS\system32\TFTP2220 - Deleted F:\WINDOWS\system32\TFTP2324 - Deleted F:\WINDOWS\system32\TFTP2360 - Deleted F:\WINDOWS\system32\TFTP2524 - Deleted F:\WINDOWS\system32\TFTP2788 - Deleted F:\WINDOWS\system32\TFTP2872 - Deleted F:\WINDOWS\system32\TFTP2876 - Deleted F:\WINDOWS\system32\TFTP2912 - Deleted F:\WINDOWS\system32\TFTP3172 - Deleted F:\WINDOWS\system32\TFTP3184 - Deleted F:\WINDOWS\system32\TFTP3300 - Deleted F:\WINDOWS\system32\TFTP3384 - Deleted Removing Temp Files… ADS Check: F:\WINDOWS No streams found. F:\WINDOWS\system32 No streams found. F:\WINDOWS\system32\svchost.exe No streams found. F:\WINDOWS\system32\ntoskrnl.exe No streams found. Final Check: catchme 0.3.1253 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net Rootkit scan 2007-11-05 17:40:47 Windows 5.1.2600 NTFS scanning hidden processes … scanning hidden services & system hive … [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\sptd\Cfg] “s1”=dword:2df9c43f “s2”=dword:110480d0 “h0”=dword:00000001 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4] “p0”=“F:\Program Files\DAEMON Tools” “h0”=dword:00000000 “khjeh”=hex:49,76,bf,df,37,60,f8,3f,41,d7,c1,3b,ce,aa,4a,7f,b8,ff,51,87,1c,… [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4\00000001] “a0”=hex:20,01,00,00,94,62,e6,0d,55,92,d8,1e,f4,01,02,c1,68,ea,0f,84,7a,… “khjeh”=hex:98,61,ff,23,e9,3f,50,19,08,b6,56,04,41,e5,27,eb,7e,45,2d,be,2f,… [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4\00000001\0Jf40] “khjeh”=hex:08,94,ac,8d,b7,49,ad,b3,a6,24,1f,4f,03,df,ed,76,db,f8,e6,f2,d0,… [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4] “p0”=“F:\Program Files\DAEMON Tools” “h0”=dword:00000000 “khjeh”=hex:49,76,bf,df,37,60,f8,3f,41,d7,c1,3b,ce,aa,4a,7f,b8,ff,51,87,1c,… [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4\00000001] “a0”=hex:20,01,00,00,94,62,e6,0d,55,92,d8,1e,f4,01,02,c1,68,ea,0f,84,7a,… “khjeh”=hex:98,61,ff,23,e9,3f,50,19,08,b6,56,04,41,e5,27,eb,7e,45,2d,be,2f,… [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4\00000001\0Jf40] “khjeh”=hex:08,94,ac,8d,b7,49,ad,b3,a6,24,1f,4f,03,df,ed,76,db,f8,e6,f2,d0,… scanning hidden registry entries … [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\MenuOrder\Favorites\A\1\5\1c] “Order”=hex:08,00,00,00,02,00,00,00,b8,01,00,00,01,00,00,00,04,00,00,00,8c,… scanning hidden files … scan completed successfully hidden processes: 0 hidden services: 0 hidden files: 0 Remaining Services: ------------------ Authorized Application Key Export: [HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\standardprofile\authorizedapplications\list] “F:\Program Files\WapSter\AQQ\AQQ.exe”=“F:\Program Files\WapSter\AQQ\AQQ.exe:*:Enabled:P2P AQQ” [HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\domainprofile\authorizedapplications\list] Remaining Files: --------------- File Backups: - F:\SDFix\backups\backups.zip Files with Hidden Attributes: Wed 7 Mar 2001 311,296 …HR — “F:\WINDOWS\system32\Tools\AC2K.exe” Wed 21 Feb 2001 310,784 …HR — “F:\WINDOWS\system32\Tools\AC98.exe” Wed 21 Feb 2001 311,296 …HR — “F:\WINDOWS\system32\Tools\ACL98.exe” Wed 21 Feb 2001 311,808 …HR — “F:\WINDOWS\system32\Tools\ACLME.exe” Fri 27 Apr 2001 327,168 …HR — “F:\WINDOWS\system32\Tools\All.exe” Fri 24 Nov 2000 316,416 …HR — “F:\WINDOWS\system32\Tools\AutoClick.exe” Tue 16 Oct 2001 363,008 …HR — “F:\WINDOWS\system32\Tools\Change.exe” Thu 11 Apr 2002 547,840 …HR — “F:\WINDOWS\system32\Tools\CheckPath.exe” Fri 31 Aug 2001 381,440 …HR — “F:\WINDOWS\system32\Tools\Counter.exe” Mon 21 Jan 2002 360,960 …HR — “F:\WINDOWS\system32\Tools\DelDv.exe” Tue 20 Mar 2001 532,480 …HR — “F:\WINDOWS\system32\Tools\DeleteFiles.exe” Mon 21 Jan 2002 360,960 …HR — “F:\WINDOWS\system32\Tools\DelT2.exe” Mon 21 Jan 2002 360,960 …HR — “F:\WINDOWS\system32\Tools\DelT2Dv.exe” Wed 6 Mar 2002 360,960 …HR — “F:\WINDOWS\system32\Tools\DelTools.exe” Mon 11 Mar 2002 361,472 …HR — “F:\WINDOWS\system32\Tools\LostRun.exe” Tue 3 Apr 2001 296,960 …HR — “F:\WINDOWS\system32\Tools\RegClean.exe” Fri 8 Mar 2002 369,152 …HR — “F:\WINDOWS\system32\Tools\Regexe.exe” Fri 8 Mar 2002 382,464 …HR — “F:\WINDOWS\system32\Tools\Restart.exe” Fri 8 Mar 2002 374,784 …HR — “F:\WINDOWS\system32\Tools\RunAP.exe” Fri 8 Mar 2002 360,960 …HR — “F:\WINDOWS\system32\Tools\RunRegexe.exe” Fri 2 Nov 2001 379,392 …HR — “F:\WINDOWS\system32\Tools\SDW98ME.exe” Fri 9 Mar 2001 312,832 …HR — “F:\WINDOWS\system32\Tools\SoundDrv.exe” Finished!