SDFix: Version 1.118 Run by Administrator on 07-12-16 at 21:53 Microsoft Windows XP [Wersja 5.1.2600] Running From: C:\SDFix Safe Mode: Checking Services: Restoring Windows Registry Values Restoring Windows Default Hosts File Rebooting… Normal Mode: Checking Files: No Trojan Files Found Removing Temp Files… ADS Check: C:\WINDOWS No streams found. C:\WINDOWS\system32 No streams found. C:\WINDOWS\system32\svchost.exe No streams found. C:\WINDOWS\system32\ntoskrnl.exe No streams found. Final Check: catchme 0.3.1262.1 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net Rootkit scan 2007-12-16 21:56:46 Windows 5.1.2600 Dodatek Service Pack 2 NTFS scanning hidden processes … scanning hidden services & system hive … [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4] “p0”=“C:\Program Files\DAEMON Tools” “h0”=dword:00000000 “khjeh”=hex:0f,fe,7f,b7,d7,d5,97,89,27,6e,70,9b,b3,02,ac,04,56,44,d6,ba,d3,… [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4\00000001] “a0”=hex:20,01,00,00,f6,57,1c,1b,1f,83,c6,db,22,1b,96,7e,a6,68,84,e5,f8,… “khjeh”=hex:b2,4d,96,3f,f3,03,84,01,c7,80,7e,f7,65,49,38,59,95,8a,c2,6b,e7,… [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4\00000001\0Jf40] “khjeh”=hex:9f,0e,7a,9f,87,98,ec,be,42,ce,79,7c,e3,18,14,12,da,54,5e,97,8c,… [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4] “p0”=“C:\Program Files\DAEMON Tools” “h0”=dword:00000000 “khjeh”=hex:0e,bc,39,0e,d0,f9,8a,54,f0,b1,b1,59,46,78,af,59,4d,22,9e,d8,bd,… [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4\00000001] “a0”=hex:20,01,00,00,f6,57,1c,1b,1f,83,c6,db,22,1b,96,7e,a6,68,84,e5,f8,… “khjeh”=hex:76,67,99,f2,e5,4d,f0,34,42,6f,0f,8b,3b,23,4f,3c,40,72,02,98,c4,… [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4\00000001\0Jf40] “khjeh”=hex:9f,0e,7a,9f,87,98,ec,be,42,ce,79,7c,e3,18,14,12,da,54,5e,97,8c,… [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4\00000001\0Jf41] “khjeh”=hex:9f,0e,7a,9f,87,98,ec,be,42,ce,79,7c,e3,18,14,12,da,54,5e,97,8c,… [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4] “p0”=“C:\Program Files\DAEMON Tools” “h0”=dword:00000000 “khjeh”=hex:0f,fe,7f,b7,d7,d5,97,89,27,6e,70,9b,b3,02,ac,04,56,44,d6,ba,d3,… [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4\00000001] “a0”=hex:20,01,00,00,f6,57,1c,1b,1f,83,c6,db,22,1b,96,7e,a6,68,84,e5,f8,… “khjeh”=hex:b2,4d,96,3f,f3,03,84,01,c7,80,7e,f7,65,49,38,59,95,8a,c2,6b,e7,… [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4\00000001\0Jf40] “khjeh”=hex:81,57,b7,d5,da,20,5e,8a,67,c0,8f,8c,11,31,8b,8a,a4,96,ff,b7,5c,… [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet004\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4] “p0”=“C:\Program Files\DAEMON Tools” “h0”=dword:00000000 “khjeh”=hex:0f,fe,7f,b7,d7,d5,97,89,27,6e,70,9b,b3,02,ac,04,56,44,d6,ba,d3,… [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet004\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4\00000001] “a0”=hex:20,01,00,00,f6,57,1c,1b,1f,83,c6,db,22,1b,96,7e,a6,68,84,e5,f8,… “khjeh”=hex:b2,4d,96,3f,f3,03,84,01,c7,80,7e,f7,65,49,38,59,95,8a,c2,6b,e7,… [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet004\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4\00000001\0Jf40] “khjeh”=hex:81,57,b7,d5,da,20,5e,8a,67,c0,8f,8c,11,31,8b,8a,a4,96,ff,b7,5c,… [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet005\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4] “p0”=“C:\Program Files\DAEMON Tools” “h0”=dword:00000000 “khjeh”=hex:0f,fe,7f,b7,d7,d5,97,89,27,6e,70,9b,b3,02,ac,04,56,44,d6,ba,d3,… [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet005\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4\00000001] “a0”=hex:20,01,00,00,f6,57,1c,1b,1f,83,c6,db,22,1b,96,7e,a6,68,84,e5,f8,… “khjeh”=hex:b2,4d,96,3f,f3,03,84,01,c7,80,7e,f7,65,49,38,59,95,8a,c2,6b,e7,… [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet005\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4\00000001\0Jf40] “khjeh”=hex:81,57,b7,d5,da,20,5e,8a,67,c0,8f,8c,11,31,8b,8a,a4,96,ff,b7,5c,… [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet006\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4] “p0”=“C:\Program Files\DAEMON Tools” “h0”=dword:00000000 “khjeh”=hex:0f,fe,7f,b7,d7,d5,97,89,27,6e,70,9b,b3,02,ac,04,56,44,d6,ba,d3,… [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet006\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4\00000001] “a0”=hex:20,01,00,00,f6,57,1c,1b,1f,83,c6,db,22,1b,96,7e,a6,68,84,e5,f8,… “khjeh”=hex:b2,4d,96,3f,f3,03,84,01,c7,80,7e,f7,65,49,38,59,95,8a,c2,6b,e7,… [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet006\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4\00000001\0Jf40] “khjeh”=hex:81,57,b7,d5,da,20,5e,8a,67,c0,8f,8c,11,31,8b,8a,a4,96,ff,b7,5c,… scanning hidden registry entries … [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\MenuOrder\Favorites\A\1\5\1c] “Order”=hex:08,00,00,00,02,00,00,00,b8,01,00,00,01,00,00,00,04,00,00,00,8c,… scanning hidden files … scan completed successfully hidden processes: 0 hidden services: 0 hidden files: 0 Remaining Services: ------------------ Authorized Application Key Export: [HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\standardprofile\authorizedapplications\list] [HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\domainprofile\authorizedapplications\list] Remaining Files: --------------- Files with Hidden Attributes: Tue 4 Sep 2007 0 A.SH. — “C:\Documents and Settings\All Users.WINDOWS\DRM\Cache\Indiv01.tmp” Sun 16 Dec 2007 0 A…H. — “C:\Documents and Settings\Rafal\Ustawienia lokalne\Temp\BIT1.tmp” Sun 16 Dec 2007 0 A…H. — “C:\Documents and Settings\Rafal\Ustawienia lokalne\Temp\BIT69.tmp” Sun 16 Dec 2007 0 A…H. — “C:\Documents and Settings\Rafal\Ustawienia lokalne\Temp\BIT82E.tmp” Sun 16 Dec 2007 0 A…H. — “C:\Documents and Settings\Rafal\Ustawienia lokalne\Temp\BIT8CD.tmp” Finished!