Ok did it and it looks as though its removed some stuff…however a quick check on google and its still there.
SDFix: Version 1.113
Run by Gordon on 02/11/2007 at 13:00
Microsoft Windows XP [Version 5.1.2600]
Running From: C:\SDFix
Safe Mode:
Checking Services:
Restoring Windows Registry Values
Restoring Windows Default Hosts File
Rebooting…
Normal Mode:
Checking Files:
Trojan Files Found:
C:\WINDOWS\SYSTEM32\ULTRA.DLL - Deleted
C:\WINDOWS\system32\plugin1.dat - Deleted
Removing Temp Files…
ADS Check:
C:\WINDOWS
No streams found.
C:\WINDOWS\system32
No streams found.
C:\WINDOWS\system32\svchost.exe
No streams found.
C:\WINDOWS\system32\ntoskrnl.exe
No streams found.
Final Check:
catchme 0.3.1253 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2007-11-02 13:05:27
Windows 5.1.2600 Service Pack 2 NTFS
detected NTDLL code modification:
ZwQueryDirectoryFile
scanning hidden processes …
scanning hidden services & system hive …
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\sptd\Cfg]
“s0”=dword:8276a6f2
“s1”=dword:12197488
“s2”=dword:45741743
“h0”=dword:00000001
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4]
“h0”=dword:00000000
“khjeh”=hex:bb,08,c3,6b,31,f6,bf,f4,fc,cf,0a,4b,7b,5c,99,c0,3d,1d,4e,f3,48,…
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4]
“h0”=dword:00000000
“khjeh”=hex:bb,08,c3,6b,31,f6,bf,f4,fc,cf,0a,4b,7b,5c,99,c0,3d,1d,4e,f3,48,…
scanning hidden registry entries …
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Approved{BECFD19F-B930-E776-B888-3EAFE509941F}]
“nanihcbmklnboaohpongmdagmkki”=hex:69,61,6c,66,69,6c,70,63,6b,61,67,62,6e,69,68,65,68,6b,00,00
“madijedlpnnlcflaelmcccpahn”=hex:69,61,6c,66,69,6c,70,63,6b,61,67,62,6e,69,68,65,68,6b,00,00
scanning hidden files …
C:\WINDOWS\System32\kdruq.exe 72204 bytes executable
scan completed successfully
hidden processes: 0
hidden services: 0
hidden files: 1
Remaining Services:
Authorized Application Key Export:
[HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\standardprofile\authorizedapplications\list]
“%windir%\system32\sessmgr.exe”=“%windir%\system32\sessmgr.exe::enabled:@xpsp2res.dll,-22019"
“C:\Program Files\Xfire\Xfire.exe”="C:\Program Files\Xfire\Xfire.exe::Enabled:Xfire”
“C:\Program Files\NovaLogic\Joint Operations Typhoon Rising\UPDATE.EXE”=“C:\Program Files\NovaLogic\Joint Operations Typhoon Rising\UPDATE.EXE::Enabled:UPDATE"
“C:\Program Files\NovaLogic\Joint Operations Typhoon Rising\Jointops.exe”="C:\Program Files\NovaLogic\Joint Operations Typhoon Rising\Jointops.exe::Enabled:Jointops”
“C:\Program Files\HLSW\hlsw.exe”=“C:\Program Files\HLSW\hlsw.exe::Enabled:HLSW"
“C:\Program Files\Azureus\Azureus.exe”="C:\Program Files\Azureus\Azureus.exe::Enabled:Azureus”
“C:\Program Files\Soulseek-Test\slsk.exe”=“C:\Program Files\Soulseek-Test\slsk.exe::Enabled:SoulSeek"
“C:\Program Files\Steam-Down\Steam-Down.exe”="C:\Program Files\Steam-Down\Steam-Down.exe::Enabled:Steam-Down”
“C:\Program Files\TVAnts\Tvants.exe”=“C:\Program Files\TVAnts\Tvants.exe::Enabled:TVAnts"
“C:\Program Files\Activision\Rome - Total War\RomeTW.exe”="C:\Program Files\Activision\Rome - Total War\RomeTW.exe::Enabled:Rome: Total War”
“C:\Program Files\Steam\SteamApps\lodtheweedman\counter-strike source\hl2.exe”=“C:\Program Files\Steam\SteamApps\lodtheweedman\counter-strike source\hl2.exe::Enabled:hl2"
“C:\Program Files\Wolfenstein - Enemy Territory\ET.exe”="C:\Program Files\Wolfenstein - Enemy Territory\ET.exe::Enabled:ET”
“C:\Program Files\Microsoft Office\OFFICE11\FRONTPG.EXE”=“C:\Program Files\Microsoft Office\OFFICE11\FRONTPG.EXE::Enabled:Microsoft Office FrontPage"
“C:\Program Files\Internet Explorer\IEXPLORE.EXE”="C:\Program Files\Internet Explorer\IEXPLORE.EXE::Enabled:Internet Explorer”
“C:\Program Files\THQ\Dawn of War\W40k.exe”=“C:\Program Files\THQ\Dawn of War\W40k.exe::Enabled:W40K"
“C:\Program Files\THQ\Dawn of War - Dark Crusade\DarkCrusade.exe”="C:\Program Files\THQ\Dawn of War - Dark Crusade\DarkCrusade.exe::Enabled:DarkCrusade”
“C:\WINDOWS\system32\PnkBstrA.exe”=“C:\WINDOWS\system32\PnkBstrA.exe::Enabled:PnkBstrA"
“C:\WINDOWS\system32\PnkBstrB.exe”="C:\WINDOWS\system32\PnkBstrB.exe::Enabled:PnkBstrB”
“C:\Program Files\SmartFTP Client 2.0\SmartFTP.exe”=“C:\Program Files\SmartFTP Client 2.0\SmartFTP.exe::Enabled:SmartFTP Client 2.5"
“C:\Program Files\id Software\Enemy Territory - QUAKE Wars\etqwded.exe”="C:\Program Files\id Software\Enemy Territory - QUAKE Wars\etqwded.exe::Enabled:etqwded.exe”
“C:\Program Files\id Software\Enemy Territory - QUAKE Wars\etqw.exe”=“C:\Program Files\id Software\Enemy Territory - QUAKE Wars\etqw.exe::Enabled:Enemy Territory - QUAKE Wars™ "
“C:\Program Files\Steam\Steam.exe”="C:\Program Files\Steam\Steam.exe::Enabled:Steam”
“C:\Program Files\SopCast\SopCast.exe”=“C:\Program Files\SopCast\SopCast.exe::Enabled:SopCast Main Application"
“C:\Documents and Settings\Gordon\Application Data\SopCast\adv\SopAdver.exe”="C:\Documents and Settings\Gordon\Application Data\SopCast\adv\SopAdver.exe::Enabled:SopCast Adver”
[HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\domainprofile\authorizedapplications\list]
“%windir%\system32\sessmgr.exe”=“%windir%\system32\sessmgr.exe:*:enabled:@xpsp2res.dll,-22019”
Remaining Files:
File Backups: - C:\SDFix\backups\backups.zip
Files with Hidden Attributes:
Sun 8 Apr 2007 4,348 A.SH. — “C:\Documents and Settings\All Users\DRM\DRMv1.bak”
Mon 18 Dec 2006 0 A.SH. — “C:\Documents and Settings\All Users\DRM\Cache\Indiv01.tmp”
Sat 13 Nov 2004 37,376 …H. — “C:\Program Files\Common Files\Adobe\ESD\DLMCleanup.exe”
Fri 5 Oct 2007 0 A…H. — “C:\WINDOWS\SoftwareDistribution\Download\8361ae28fcfac79271825a6b2935fdb6\BIT1.tmp”
Sat 23 Dec 2006 106,496 A…H. — “C:\Deckard\System Scanner\20071029225128\backup\DOCUME~1\Gordon\LOCALS~1\Temp~18.tmp”
Fri 1 Dec 2006 106,496 A…H. — “C:\Deckard\System Scanner\20071029225128\backup\DOCUME~1\Gordon\LOCALS~1\Temp~19.tmp”
Fri 27 Jul 2007 126,976 A…H. — “C:\Deckard\System Scanner\20071029225128\backup\DOCUME~1\Gordon\LOCALS~1\Temp~1B.tmp”
Sat 28 Jul 2007 126,976 A…H. — “C:\Deckard\System Scanner\20071029225128\backup\DOCUME~1\Gordon\LOCALS~1\Temp~38.tmp”
Fri 27 Jul 2007 126,976 A…H. — “C:\Deckard\System Scanner\20071029225128\backup\DOCUME~1\Gordon\LOCALS~1\Temp~5.tmp”
Finished!