Tak tady je ten report.txt...ted budu pokracovat dale v postupu, zatim ale stale nemam prava administratora
SDFix: Version 1.208 Run by Administrator on p 25.07.2008 at 09:27
Microsoft Windows XP [Verze 5.1.2600]
Running From: C:\DOCUME~1\ADMINI~1\Plocha\Dowland\SDFix
Checking Services :
Restoring Default Security Values
Restoring Default Hosts File
Restoring Default HomePage Value
Restoring Default Desktop Components Value
Restoring Windows ProductId To Remove Fake Virus Alert
Restoring Time Format To Remove Fake Virus Alert
Rebooting
Checking Files :
Trojan Files Found:
C:\WINDOWS\ERFB.EXE - Deleted
C:\Documents and Settings\Administrator\Data aplikacˇ\Macromedia\Flash Player\macromedia.com\support\flashplayer\sys\#www.redtube.com\settings.sol - Deleted
C:\Documents and Settings\Administrator\Local Settings\Temp\ubi90.tmp.exe - Deleted
C:\Program Files\VirusRemover2008\Viruses.bdt - Deleted
C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\bindsrv2.exe.bat - Deleted
C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\vistasp1.exe.bat - Deleted
C:\WINDOWS\nfavxwdbpgs.dll - Deleted
C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\bindsrv2.exe - Deleted
C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\bindsrv2.exe.bat - Deleted
C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\s1265.php.bat - Deleted
C:\WINDOWS\eqvwamkl.dll - Deleted
C:\WINDOWS\fdkowvbp.dll - Deleted
C:\WINDOWS\grswptdl.exe - Deleted
C:\WINDOWS\wnslvxtf.dll - Deleted
Folder C:\Documents and Settings\Administrator\Data aplikacˇ\Macromedia\Flash Player\macromedia.com\support\flashplayer\sys\#www.redtube.com - Removed
Folder C:\Program Files\VirusRemover2008 - Removed
Removing Temp Files
ADS Check :
Final Check :
catchme 0.3.1361.2 W2K/XP/Vista - rootkit/stealth malware detector by Gmer,
http://www.gmer.netRootkit scan 2008-07-25 09:31:40
Windows 5.1.2600 Service Pack 2 NTFS
scanning hidden processes ...
scanning hidden services & system hive ...
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\sptd\Cfg]
"s1"=dword:2df9c43f
"s2"=dword:110480d0
"h0"=dword:00000001
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4]
"h0"=dword:00000000
"khjeh"=hex:01,77,76,95,0c,af,bb,7b,86,c1,b6,9e,7b,6e,d3,84,d0,c5,fb,f2,9d,..
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\vdrv9000]
"ServiceBinary"="C:\WINDOWS\system32\drivers\VDRV9000.SYS"
"Group"="SCSI Miniport"
"ImagePath"=str(2):"system32\DRIVERS\vdrv9000.sys"
"ErrorControl"=dword:00000001
"Start"=dword:00000001
"Type"=dword:00000001
"Tag"=dword:00000043
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\vdrv9000\Enum]
"Count"=dword:00000001
"NextInstance"=dword:00000001
"INITSTARTFAILED"=dword:00000001
"0"="Root\SCSIADAPTER\0000"
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\vdrv9000\parameters]
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\vdrv9000\security]
"Security"=hex:01,00,14,80,90,00,00,00,9c,00,00,00,14,00,00,00,30,00,00,00,02,..
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4]
"h0"=dword:00000000
"khjeh"=hex:01,77,76,95,0c,af,bb,7b,86,c1,b6,9e,7b,6e,d3,84,d0,c5,fb,f2,9d,..
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\vdrv9000]
"ServiceBinary"="C:\WINDOWS\system32\drivers\VDRV9000.SYS"
"Group"="SCSI Miniport"
"ImagePath"=str(2):"system32\DRIVERS\vdrv9000.sys"
"ErrorControl"=dword:00000001
"Start"=dword:00000001
"Type"=dword:00000001
"Tag"=dword:00000043
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\vdrv9000\Enum]
"Count"=dword:00000001
"NextInstance"=dword:00000001
"INITSTARTFAILED"=dword:00000001
"0"="Root\SCSIADAPTER\0000"
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\vdrv9000\parameters]
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\vdrv9000\security]
"Security"=hex:01,00,14,80,90,00,00,00,9c,00,00,00,14,00,00,00,30,00,00,00,02,..
scanning hidden registry entries ...
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Control Panel\Cursors\Schemes]
"\f\1e?r?n?é? ?u?k?a?z?a?t?e?l?e? ?"="C:\WINDOWS\cursors\arrow_r.cur,C:\WINDOWS\cursors\help_r.cur,C:\WINDOWS\cursors\wait_r.cur,C:\WINDOWS\cursors\busy_r.cur,C:\WINDOWS\cursors\cross_r.cur,C:\WINDOWS\cursors\beam_r.cur,C:\WINDOWS\cursors\pen_r.cur,C:\WINDOWS\cursors\no_r.cur,C:\WINDOWS\cursors\size4_r.cur,C:\WINDOWS\cursors\size3_r.cur,C:\WINDOWS\cursors\size2_r.cur,C:\WINDOWS\cursors\size1_r.cur,C:\WINDOWS\cursors\move_r.cur,C:\WINDOWS\cursors\up_r.cur"
"\f\1e?r?n?é? ?u?k?a?z?a?t?e?l?e? ?(?v?e?l?k?é?)?"="C:\WINDOWS\cursors\arrow_rm.cur,C:\WINDOWS\cursors\help_rm.cur,C:\WINDOWS\cursors\wait_rm.cur,C:\WINDOWS\cursors\busy_rm.cur,C:\WINDOWS\cursors\cross_rm.cur,C:\WINDOWS\cursors\beam_rm.cur,C:\WINDOWS\cursors\pen_rm.cur,C:\WINDOWS\cursors\no_rm.cur,C:\WINDOWS\cursors\size4_rm.cur,C:\WINDOWS\cursors\size3_rm.cur,C:\WINDOWS\cursors\size2_rm.cur,C:\WINDOWS\cursors\size1_rm.cur,C:\WINDOWS\cursors\move_rm.cur,C:\WINDOWS\cursors\up_rm.cur"
"\f\1e?r?n?é? ?u?k?a?z?a?t?e?l?e? ?(?n?e?j?v?\e\1t?a\1í?)?"="C:\WINDOWS\cursors\arrow_rl.cur,C:\WINDOWS\cursors\help_rl.cur,C:\WINDOWS\cursors\wait_rl.cur,C:\WINDOWS\cursors\busy_rl.cur,C:\WINDOWS\cursors\cross_rl.cur,C:\WINDOWS\cursors\beam_rl.cur,C:\WINDOWS\cursors\pen_rl.cur,C:\WINDOWS\cursors\no_rl.cur,C:\WINDOWS\cursors\size4_rl.cur,C:\WINDOWS\cursors\size3_rl.cur,C:\WINDOWS\cursors\size2_rl.cur,C:\WINDOWS\cursors\size1_rl.cur,C:\WINDOWS\cursors\move_rl.cur,C:\WINDOWS\cursors\up_rl.cur"
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\System]
"OODEFRAG10.00.00.01WORKSTATION"="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"
[HKEY_CURRENT_USER\Software\Microsoft\Windows\ShellNoRoam\MUICache]
"G:\Dole~ité\Tom Clancy\xb4s Rainbow Six Vegas CZ.exe"="Tom Clancy\xb4s Rainbow Six Vegas CZ"
scanning hidden files ...
scan completed successfully
hidden processes: 0
hidden services: 0
hidden files: 0
Remaining Services :
Authorized Application Key Export:
[HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\standardprofile\authorizedapplications\list]
"%windir%\\system32\\sessmgr.exe"="%windir%\\system32\\sessmgr.exe:*:enabled:@xpsp2res.dll,-22019"
"C:\\Program Files\\Electronic Arts\\Medal of Honor Airborne\\UnrealEngine3\\Binaries\\MOHA.exe"="C:\\Program Files\\Electronic Arts\\Medal of Honor Airborne\\UnrealEngine3\\Binaries\\MOHA.exe:*:Enabled:Medal of Honor Airborne"
[HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\domainprofile\authorizedapplications\list]
"%windir%\\system32\\sessmgr.exe"="%windir%\\system32\\sessmgr.exe:*:enabled:@xpsp2res.dll,-22019"
Remaining Files :
File Backups: - C:\DOCUME~1\ADMINI~1\Plocha\Dowland\SDFix\backups\backups.zip
Files with Hidden Attributes :
Fri 25 Jan 2008 0 A.SH. --- "C:\Documents and Settings\All Users\DRM\Cache\Indiv01.tmp"
Fri 11 Jul 2008 888 ...HR --- "C:\Documents and Settings\Administrator\Data aplikacˇ\SecuROM\UserData\securom_v7_01.bak"
Finished!