offline
- srdjos
- Zaslužni građanin
- Pridružio: 27 Sep 2005
- Poruke: 678
|
evo ga report.txt:
SDFix: Version 1.129
Run by srdjos on 21.01.2008 at 22:09
Microsoft Windows XP [Version 5.1.2600]
Running From: C:\DOCUME~1\srdjos\Desktop\SDFix
Safe Mode:
Checking Services:
Name:
Microsoft register shield
Path:
"C:\WINDOWS\Mrshield.exe"
Microsoft register shield - Deleted
C:\WINDOWS\system32\Microsoft\backup.ftp Found
C:\WINDOWS\system32\Microsoft\backup.tftp Found
Checking files:
Genuine:
C:\WINDOWS\system32\Microsoft\backup.ftp
C:\WINDOWS\system32\Microsoft\backup.tftp
Dummy:
C:\WINDOWS\system32\ftp.exe
C:\WINDOWS\system32\tftp.exe
C:\WINDOWS\system32\dllcache\ftp.exe
C:\WINDOWS\system32\dllcache\tftp.exe
Files copied to SDFix\Backups
Restoring files if backups are found
Final Check:
Genuine:
C:\WINDOWS\system32\Microsoft\backup.ftp
C:\WINDOWS\system32\Microsoft\backup.tftp
C:\WINDOWS\system32\ftp.exe
C:\WINDOWS\system32\tftp.exe
C:\WINDOWS\system32\dllcache\ftp.exe
C:\WINDOWS\system32\dllcache\tftp.exe
Restoring Windows Registry Values
Restoring Windows Default Hosts File
Rebooting...
Normal Mode:
Checking Files:
Trojan Files Found:
C:\WINDOWS\system32\Microsoft\backup.ftp - Deleted
C:\WINDOWS\system32\Microsoft\backup.tftp - Deleted
Removing Temp Files...
ADS Check:
C:\WINDOWS
No streams found.
C:\WINDOWS\system32
No streams found.
C:\WINDOWS\system32\svchost.exe
No streams found.
C:\WINDOWS\system32\ntoskrnl.exe
No streams found.
Final Check:
catchme 0.3.1344.2 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2008-01-21 22:46:36
Windows 5.1.2600 Service Pack 2 NTFS
scanning hidden processes ...
scanning hidden services & system hive ...
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\sptd\Cfg]
"s1"=dword:2df9c43f
"s2"=dword:110480d0
"h0"=dword:00000002
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\sptd\Cfg\14919EA49A8F3B4AA3CF1058D9A64CEC]
"p0"="C:\Program Files\DAEMON Tools Pro\"
"h0"=dword:00000001
"hdf12"=hex:a6,79,9d,f0,ff,f0,d5,3d,a6,6e,bd,43,36,d8,19,9c,9c,32,88,d3,ad,..
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\sptd\Cfg\14919EA49A8F3B4AA3CF1058D9A64CEC\00000001]
"a0"=hex:20,01,00,00,f4,a0,ff,2f,9a,c7,ed,7a,14,af,7c,43,08,cc,46,39,9a,..
"hdf12"=hex:86,2f,ff,aa,dd,63,df,15,b6,91,77,a8,e3,b7,3d,b1,1c,04,99,d3,26,..
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\sptd\Cfg\14919EA49A8F3B4AA3CF1058D9A64CEC\00000001\gdq0]
"hdf12"=hex:29,86,23,ea,69,b8,74,69,91,14,83,ac,93,9a,95,e0,e9,6e,f9,29,1e,..
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4]
"h0"=dword:00000000
"khjeh"=hex:36,ae,32,39,4a,2d,c7,be,5a,2f,70,f6,11,f0,0b,a2,f8,9a,bb,6f,36,..
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\sptd\Cfg\14919EA49A8F3B4AA3CF1058D9A64CEC]
"p0"="C:\Program Files\DAEMON Tools Pro\"
"h0"=dword:00000001
"hdf12"=hex:a6,79,9d,f0,ff,f0,d5,3d,a6,6e,bd,43,36,d8,19,9c,9c,32,88,d3,ad,..
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\sptd\Cfg\14919EA49A8F3B4AA3CF1058D9A64CEC\00000001]
"a0"=hex:20,01,00,00,f4,a0,ff,2f,9a,c7,ed,7a,14,af,7c,43,08,cc,46,39,9a,..
"hdf12"=hex:86,2f,ff,aa,dd,63,df,15,b6,91,77,a8,e3,b7,3d,b1,1c,04,99,d3,26,..
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\sptd\Cfg\14919EA49A8F3B4AA3CF1058D9A64CEC\00000001\gdq0]
"hdf12"=hex:29,86,23,ea,69,b8,74,69,91,14,83,ac,93,9a,95,e0,e9,6e,f9,29,1e,..
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4]
"h0"=dword:00000000
"khjeh"=hex:36,ae,32,39,4a,2d,c7,be,5a,2f,70,f6,11,f0,0b,a2,f8,9a,bb,6f,36,..
scanning hidden registry entries ...
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\System]
"OODEFRAG10.00.00.01WORKSTATION"="3A2C600C2BBA106D52AFAC80C3195BB1773B9F4BC31B080791FC039B7E8D429F7B98FEBC9E127BECC74CFEBC9E127BECC74
CFEBC9E127BECC74CFEBC9E127BECC74CFEBC9E127BECC74CFEBC9E127BECC74CA6A0AC4980AC7933BA7FD869164D6794A6171C11EC38DE3DFEBC9E127BECC74CE
E0E632074DB9FACEA7012FAE7AFDFEB96F97F948E376836C416AD0DFACC795CCA82B88D3F1C712C0F130F9AE8AA27D16F8277FACDF8A0C4F9D46AAEA8240DC5EAC93E
F406281B7085621962022596D5B6EE3F89CF3E58AD8B34A8AF1DFE0A94709C69123759B158CEFEEB408EB096D76967777DFE726FF492860CBC6CBF650CB39805A431AC5
E879FEC96A2DA0327FD367C961833A459DE5C830F0A9EF026B23D3B30EF4B42DEE6DC187D802BF55831039FE29DBD071DF66CC7804E313DEAD4CBEADC3CCEDF05A3A
34CD850B387D39D68A67A5A60F2568B765081C29274E180526FD3D377EE34AB433B34909F59D0B533CC4E1AD1DF33ADE3020727288AD1897876AD8876FA6835BF7A6FC
00CB11F2E62AF22AF3F6EF8B35425DB3D49181087170E5AAB70B42CB7CF833EE60BF9A000AB52106FC5627C3817E29DCC41D78954BC2D9C960073A2EDDE33278AA3C04
CE7F61B04337820AA99324DBD1F502AC08FADAA0AA331AC80D98C4B87384FB8AAE762D3BEDA5FB581F860D50284AB13471EDEC28FB304800EBFADF08E817C355C443C
ABD5C5F4CF96BD0E5304CE7A3BC724FA96E92AEF2E2B26482E40F98B3312870B34B15928418E12DC03335458EC7C8FE0AA2D6EDA1A46D918F0733BD44D12FD06658D80
5C82A663A2044E6FD699B68CA3E63F6C25CE666C8D8856E021C836B81A187C2968AD2DE2E8D86E0078D4D91288185C131DF7A4B04BACE50D2E88EE0DE68AE24396818
5886C697B6835D4DFD38BED12D60AE6AD3E29747763AE98BC1443617845A6E0A70E1F01338EFA77534E5A7DC22F23904272335F328CC7A637AA3521C9AA4CD29DF027C
EA7DDA7BC5542573FA597968DB96C284D91B5958386727A3339ED2D8287F3DDE6BEC410471AAF190F460F051B7B117B05678E24A5EA5003687A93E53E199CD0BFB2B57
C5E6A60EA2D821A031A8509D52FD4CC752635ED7472161F83F89736403611A6A870A05D4ABE0DC0998F69BF9158D22801C44DB7A7E5E91B8B4BE04E23083A93C40D307
8EA4D6E0EC6A34B653E73AD5EAEE2AB5FA6BF2615726D6336A35966FA75E59A423142FE91FAA3E46DA05504AE5E85DF5934DC509FA4BF21859C321D5ED1D379923A70EE
DF9A028591AD37CA5F62560CDFC380BECE8145B295227CBD46E5537885D38AC08F80D08B4D15B6C8387F24E6EEFE50A13D5A24C2837989783BB104D7F97EAACBBBF74
BED60B1559A06EF60B8C840D7F60878A891341A8BD44D2A2AEC1273CC3985424CB44E9A78AF996122"
scanning hidden files ...
scan completed successfully
hidden processes: 0
hidden services: 0
hidden files: 0
Remaining Services:
------------------
Authorized Application Key Export:
[HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\standardprofile\authorizedapplications\list]
"C:\\Program Files\\Skype\\Phone\\Skype.exe"="C:\\Program Files\\Skype\\Phone\\Skype.exe:*:Enabled:Skype"
[HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\domainprofile\authorizedapplications\list]
Remaining Files:
---------------
File Backups: - C:\DOCUME~1\srdjos\Desktop\SDFix\backups\backups.zip
Files with Hidden Attributes:
Wed 13 Oct 2004 1,694,208 ..SH. --- "C:\Program Files\Messenger\msmsgs.exe"
Sun 5 Aug 2007 6,466 ..SH. --- "C:\WINDOWS\system32\stutv.bak1"
Wed 8 Aug 2007 741,725 ..SH. --- "C:\WINDOWS\system32\stutv.bak2"
Thu 16 Aug 2007 0 A.SH. --- "C:\Documents and Settings\All Users\DRM\Cache\Indiv01.tmp"
Finished!
evo ga hijack:
Logfile of HijackThis v1.99.1
Scan saved at 23:03:04, on 21.01.2008
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v7.00 (7.00.6000.16574)
Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\ESET\ESET NOD32 Antivirus\ekrn.exe
C:\WINDOWS\system32\inetsrv\inetinfo.exe
C:\PROGRA~1\MI6841~1\MSSQL\binn\sqlservr.exe
C:\WINDOWS\system32\oodag.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\system32\wscntfy.exe
C:\WINDOWS\system32\notepad.exe
C:\WINDOWS\vsnpstd.exe
C:\PROGRA~1\GENIUS~1\GNETMOUS.EXE
C:\Program Files\ESET\ESET NOD32 Antivirus\egui.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\Microsoft SQL Server\80\Tools\Binn\sqlmangr.exe
C:\WINDOWS\explorer.exe
C:\WINDOWS\system32\notepad.exe
C:\Program Files\Mozilla Firefox\firefox.exe
C:\Documents and Settings\srdjos\Desktop\HijackThis.exe
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://klik.nlb.si/
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?LinkId=69157
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Local Page =
O2 - BHO: (no name) - {5A7949A2-ADB3-4790-80C5-6AE2EA267E41} - (no file)
O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre1.6.0_03\bin\ssv.dll
O4 - HKLM\..\Run: [NVMixerTray] "C:\Program Files\NVIDIA Corporation\NvMixer\NVMixerTray.exe"
O4 - HKLM\..\Run: [snpstd] C:\WINDOWS\vsnpstd.exe
O4 - HKLM\..\Run: [mouseElf] C:\PROGRA~1\GENIUS~1\GNETMOUS.EXE
O4 - HKLM\..\Run: [egui] "C:\Program Files\ESET\ESET NOD32 Antivirus\egui.exe" /hide /waitservice
O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
O4 - Global Startup: Service Manager.lnk = C:\Program Files\Microsoft SQL Server\80\Tools\Binn\sqlmangr.exe
O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~2\OFFICE11\EXCEL.EXE/3000
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_03\bin\ssv.dll
O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_03\bin\ssv.dll
O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~2\OFFICE11\REFIEBAR.DLL
O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - %windir%\Network Diagnostic\xpnetdiag.exe (file missing)
O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - %windir%\Network Diagnostic\xpnetdiag.exe (file missing)
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O11 - Options group: [INTERNATIONAL] International*
O16 - DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} (WUWebControl Class) - http://www.update.microsoft.com/windowsupdate/v6/V.....6166671671
O17 - HKLM\System\CCS\Services\Tcpip\..\{94EBD337-F1FC-4C1D-A153-A3F73DED1943}: NameServer = 193.189.160.13 193.189.160.23
O18 - Protocol: livecall - {828030A1-22C1-4009-854F-8E305202313F} - C:\PROGRA~1\MSNMES~1\MSGRAP~1.DLL
O18 - Protocol: ms-help - {314111C7-A502-11D2-BBCA-00C04F8EC294} - C:\Program Files\Common Files\Microsoft Shared\Help\hxds.dll
O18 - Protocol: msnim - {828030A1-22C1-4009-854F-8E305202313F} - C:\PROGRA~1\MSNMES~1\MSGRAP~1.DLL
O18 - Protocol: skype4com - {FFC8B962-9B40-4DFF-9458-1830C7DD7F5D} - C:\PROGRA~1\COMMON~1\Skype\SKYPE4~1.DLL
O20 - Winlogon Notify: WgaLogon - C:\WINDOWS\SYSTEM32\WgaLogon.dll
O21 - SSODL: WPDShServiceObj - {AAA288BA-9A4C-45B0-95D7-94D524869DB5} - C:\WINDOWS\system32\WPDShServiceObj.dll
O23 - Service: Eset HTTP Server (EhttpSrv) - Unknown owner - C:\Program Files\ESET\ESET NOD32 Antivirus\EHttpSrv.exe
O23 - Service: Eset Service (ekrn) - ESET - C:\Program Files\ESET\ESET NOD32 Antivirus\ekrn.exe
O23 - Service: O&O Defrag - O&O Software GmbH - C:\WINDOWS\system32\oodag.exe
Dopuna: 21 Jan 2008 23:10
inače vidim da je našao i uklonio neka čudesa
može li koja reč o tome šta je to bilo ako je poznato
hvala puno za pomoć
srdjos
|