Strict Standards: Non-static method utf_normalizer::nfkc() should not be called statically in /home/mati/domains/forum.programosy.pl/public_html/includes/utf/utf_tools.php on line 1663

Strict Standards: Non-static method utf_normalizer::nfkc() should not be called statically in /home/mati/domains/forum.programosy.pl/public_html/includes/utf/utf_tools.php on line 1663

Strict Standards: Non-static method utf_normalizer::nfkc() should not be called statically in /home/mati/domains/forum.programosy.pl/public_html/includes/utf/utf_tools.php on line 1663

Strict Standards: Non-static method utf_normalizer::nfkc() should not be called statically in /home/mati/domains/forum.programosy.pl/public_html/includes/utf/utf_tools.php on line 1663

Strict Standards: Non-static method utf_normalizer::nfkc() should not be called statically in /home/mati/domains/forum.programosy.pl/public_html/includes/utf/utf_tools.php on line 1663

Strict Standards: Non-static method utf_normalizer::nfkc() should not be called statically in /home/mati/domains/forum.programosy.pl/public_html/includes/utf/utf_tools.php on line 1663

Strict Standards: Non-static method utf_normalizer::nfkc() should not be called statically in /home/mati/domains/forum.programosy.pl/public_html/includes/utf/utf_tools.php on line 1663

Strict Standards: Non-static method utf_normalizer::nfkc() should not be called statically in /home/mati/domains/forum.programosy.pl/public_html/includes/utf/utf_tools.php on line 1663

Deprecated: preg_replace(): The /e modifier is deprecated, use preg_replace_callback instead in /home/mati/domains/forum.programosy.pl/public_html/includes/bbcode.php on line 483

Deprecated: preg_replace(): The /e modifier is deprecated, use preg_replace_callback instead in /home/mati/domains/forum.programosy.pl/public_html/includes/bbcode.php on line 483

Deprecated: preg_replace(): The /e modifier is deprecated, use preg_replace_callback instead in /home/mati/domains/forum.programosy.pl/public_html/includes/bbcode.php on line 483

Deprecated: preg_replace(): The /e modifier is deprecated, use preg_replace_callback instead in /home/mati/domains/forum.programosy.pl/public_html/includes/bbcode.php on line 483

Deprecated: preg_replace(): The /e modifier is deprecated, use preg_replace_callback instead in /home/mati/domains/forum.programosy.pl/public_html/includes/bbcode.php on line 483

Deprecated: preg_replace(): The /e modifier is deprecated, use preg_replace_callback instead in /home/mati/domains/forum.programosy.pl/public_html/includes/bbcode.php on line 483

Deprecated: preg_replace(): The /e modifier is deprecated, use preg_replace_callback instead in /home/mati/domains/forum.programosy.pl/public_html/includes/bbcode.php on line 483

Deprecated: preg_replace(): The /e modifier is deprecated, use preg_replace_callback instead in /home/mati/domains/forum.programosy.pl/public_html/includes/bbcode.php on line 483

Deprecated: preg_replace(): The /e modifier is deprecated, use preg_replace_callback instead in /home/mati/domains/forum.programosy.pl/public_html/includes/bbcode.php on line 483

Deprecated: preg_replace(): The /e modifier is deprecated, use preg_replace_callback instead in /home/mati/domains/forum.programosy.pl/public_html/includes/bbcode.php on line 483

Deprecated: preg_replace(): The /e modifier is deprecated, use preg_replace_callback instead in /home/mati/domains/forum.programosy.pl/public_html/includes/bbcode.php on line 483

Deprecated: preg_replace(): The /e modifier is deprecated, use preg_replace_callback instead in /home/mati/domains/forum.programosy.pl/public_html/includes/bbcode.php on line 483

Deprecated: preg_replace(): The /e modifier is deprecated, use preg_replace_callback instead in /home/mati/domains/forum.programosy.pl/public_html/includes/bbcode.php on line 483

Deprecated: preg_replace(): The /e modifier is deprecated, use preg_replace_callback instead in /home/mati/domains/forum.programosy.pl/public_html/includes/bbcode.php on line 483

Deprecated: preg_replace(): The /e modifier is deprecated, use preg_replace_callback instead in /home/mati/domains/forum.programosy.pl/public_html/includes/bbcode.php on line 483

Deprecated: preg_replace(): The /e modifier is deprecated, use preg_replace_callback instead in /home/mati/domains/forum.programosy.pl/public_html/includes/bbcode.php on line 483

Deprecated: preg_replace(): The /e modifier is deprecated, use preg_replace_callback instead in /home/mati/domains/forum.programosy.pl/public_html/includes/bbcode.php on line 483

Deprecated: preg_replace(): The /e modifier is deprecated, use preg_replace_callback instead in /home/mati/domains/forum.programosy.pl/public_html/includes/bbcode.php on line 483

Deprecated: preg_replace(): The /e modifier is deprecated, use preg_replace_callback instead in /home/mati/domains/forum.programosy.pl/public_html/includes/bbcode.php on line 483

Deprecated: preg_replace(): The /e modifier is deprecated, use preg_replace_callback instead in /home/mati/domains/forum.programosy.pl/public_html/includes/bbcode.php on line 483

Deprecated: preg_replace(): The /e modifier is deprecated, use preg_replace_callback instead in /home/mati/domains/forum.programosy.pl/public_html/includes/bbcode.php on line 483

Deprecated: preg_replace(): The /e modifier is deprecated, use preg_replace_callback instead in /home/mati/domains/forum.programosy.pl/public_html/includes/bbcode.php on line 483

Deprecated: preg_replace(): The /e modifier is deprecated, use preg_replace_callback instead in /home/mati/domains/forum.programosy.pl/public_html/includes/bbcode.php on line 483

Deprecated: preg_replace(): The /e modifier is deprecated, use preg_replace_callback instead in /home/mati/domains/forum.programosy.pl/public_html/includes/bbcode.php on line 483

Deprecated: preg_replace(): The /e modifier is deprecated, use preg_replace_callback instead in /home/mati/domains/forum.programosy.pl/public_html/includes/bbcode.php on line 483

Deprecated: preg_replace(): The /e modifier is deprecated, use preg_replace_callback instead in /home/mati/domains/forum.programosy.pl/public_html/includes/bbcode.php on line 483

Strict Standards: Non-static method utf_normalizer::nfkc() should not be called statically in /home/mati/domains/forum.programosy.pl/public_html/includes/utf/utf_tools.php on line 1663

Strict Standards: Non-static method utf_normalizer::nfkc() should not be called statically in /home/mati/domains/forum.programosy.pl/public_html/includes/utf/utf_tools.php on line 1663

Deprecated: preg_replace(): The /e modifier is deprecated, use preg_replace_callback instead in /home/mati/domains/forum.programosy.pl/public_html/includes/bbcode.php on line 112

Strict Standards: Non-static method utf_normalizer::nfkc() should not be called statically in /home/mati/domains/forum.programosy.pl/public_html/includes/utf/utf_tools.php on line 1663

Deprecated: preg_replace(): The /e modifier is deprecated, use preg_replace_callback instead in /home/mati/domains/forum.programosy.pl/public_html/includes/bbcode.php on line 112

Strict Standards: Non-static method utf_normalizer::nfkc() should not be called statically in /home/mati/domains/forum.programosy.pl/public_html/includes/utf/utf_tools.php on line 1663

Deprecated: preg_replace(): The /e modifier is deprecated, use preg_replace_callback instead in /home/mati/domains/forum.programosy.pl/public_html/includes/bbcode.php on line 112

Strict Standards: Non-static method utf_normalizer::nfkc() should not be called statically in /home/mati/domains/forum.programosy.pl/public_html/includes/utf/utf_tools.php on line 1663

Deprecated: preg_replace(): The /e modifier is deprecated, use preg_replace_callback instead in /home/mati/domains/forum.programosy.pl/public_html/includes/bbcode.php on line 112

Strict Standards: Non-static method utf_normalizer::nfkc() should not be called statically in /home/mati/domains/forum.programosy.pl/public_html/includes/utf/utf_tools.php on line 1663

Deprecated: preg_replace(): The /e modifier is deprecated, use preg_replace_callback instead in /home/mati/domains/forum.programosy.pl/public_html/includes/bbcode.php on line 112

Strict Standards: Non-static method utf_normalizer::nfkc() should not be called statically in /home/mati/domains/forum.programosy.pl/public_html/includes/utf/utf_tools.php on line 1663
[phpBB Debug] PHP Notice: in file /includes/functions.php on line 3900: Cannot modify header information - headers already sent by (output started at /includes/bbcode.php:483)
[phpBB Debug] PHP Notice: in file /includes/functions.php on line 3902: Cannot modify header information - headers already sent by (output started at /includes/bbcode.php:483)
[phpBB Debug] PHP Notice: in file /includes/functions.php on line 3903: Cannot modify header information - headers already sent by (output started at /includes/bbcode.php:483)
[phpBB Debug] PHP Notice: in file /includes/functions.php on line 3904: Cannot modify header information - headers already sent by (output started at /includes/bbcode.php:483)
proszę o sprawdzenie mojego loga..serdeczne dzięki...pomocy • programosy.pl

  • Ogłoszenie:

proszę o sprawdzenie mojego loga..serdeczne dzięki...pomocy

Bezpieczeństwo systemów, usuwanie wirusów, dobieranie programów antywirusowych. Obowiązkowe logi w tym dziale: trzy z FRST + Gmer.

PROSZĘ O SPRAWDZENIE MOJEGO LOGA..SERDECZNE DZIĘKI...POMOCY

Postprzez oskar33 07 Gru 2005, 18:32

reklama
Mam bardzo wiele problemów z komputerem moim... zaśmiecenia, samoistne restarty , wirusy..i innego typu sprawyPROSZĘ o sprawdzenie mojego loga

Logfile of HijackThis v1.99.1
Scan saved at 17:18:36, on 2005-12-07
Platform: Windows XP (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 (6.00.2600.0000)

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\System32\Ati2evxx.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\System32\RunDll32.exe
C:\PROGRA~1\ALWILS~1\Avast4\ashDisp.exe
C:\WINDOWS\System32\mswupdate32.exe
C:\Program Files\D-Tools\daemon.exe
C:\Program Files\ATI Technologies\ATI Control Panel\atiptaxx.exe
C:\Program Files\Java\jre1.5.0_05\bin\jusched.exe
C:\WINDOWS\System32\winservices.exe
C:\WINDOWS\System32\lsasss.exe
C:\WINDOWS\System32\gxpcqaaa.exe
C:\WINDOWS\System32\winsec.exe
C:\Program Files\Alwil Software\Avast4\aswUpdSv.exe
C:\WINDOWS\System32\winsec.exe
C:\WINDOWS\System32\lsasss.exe
C:\windows\adtech2006.exe
C:\WINDOWS\System32\ctfmon.exe
C:\Program Files\Messenger\msmsgs.exe
C:\Program Files\Alwil Software\Avast4\ashServ.exe
C:\Program Files\Gadu-Gadu\gg.exe
C:\Program Files\Steganos Internet Trace Destructor 7\ITD7.exe
C:\Program Files\Alwil Software\Avast4\ashWebSv.exe
C:\WINDOWS\system32\cmd.exe
C:\WINDOWS\system32\ftp.exe
C:\totalcmd\TOTALCMD.EXE
C:\Program Files\Mozilla Firefox\firefox.exe
C:\Program Files\DVD Decrypter\DVDDecrypter.exe
C:\DOCUME~1\ANIAIP~1\USTAWI~1\Temp\_tc\HijackThis.exe

R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://searchbar.findthewebsiteyouneed.com
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Bar = http://searchbar.findthewebsiteyouneed.com
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = http://searchbar.findthewebsiteyouneed.com
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.google.pl/
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://searchbar.findthewebsiteyouneed.com
R0 - HKLM\Software\Microsoft\Internet Explorer\Search,SearchAssistant = http://searchbar.findthewebsiteyouneed.com
R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName = Łącza
O1 - Hosts: 255.255.255.255 ar.atwola.com atdmt.com avp.ch avp.com avp.ru awaps.net ca.com dispatch.mcafee.com download.mcafee.com download.microsoft.com downloads.microsoft.com engine.awaps.net f-secure.com ftp.f-secure.com ftp.sophos.com go.microsoft.com liveupdate.symantec.com mast.mcafee.com mcafee.com msdn.microsoft.com my-etrust.com nai.com networkassociates.com office.microsoft.com phx.corporate-ir.net secure.nai.com securityresponse.symantec.com service1.symantec.com sophos.com spd.atdmt.com support.microsoft.com symantec.com update.symantec.com updates.symantec.com us.mcafee.com vil.nai.com viruslist.ru windowsupdate.microsoft.com www.avp.ch www.avp.com www.avp.ru www.awaps.net www.ca.com www.f-secure.com www.kaspersky.ru www.mcafee.com www.my-etrust.com www.nai.com www.networkassociates.com www.sophos.com www.symantec.com www.trendmicro.com www.viruslist.com www.viruslist.ru www3.ca.com
O2 - BHO: AcroIEHlprObj Class - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 6.0 CE\Reader\ActiveX\AcroIEHelper.dll
O3 - Toolbar: &Radio - {8E718888-423F-11D2-876E-00A0C9082467} - C:\WINDOWS\System32\msdxm.ocx
O4 - HKLM\..\Run: [Generic Host Process2 System Backup] scvhost2.exe
O4 - HKLM\..\Run: [Explorer] explore.exe
O4 - HKLM\..\Run: [Generic Host Process9 System Backup] scvhost9.exe
O4 - HKLM\..\Run: [Application Layer Gateway Service] C:\WINDOWS\System32\algs.exe
O4 - HKLM\..\Run: [Mirsft sdce] servs.exe
O4 - HKLM\..\Run: [Windows Svshost Service Update 32] svcsshost32.exe
O4 - HKLM\..\Run: [Cmaudio] RunDll32 cmicnfg.cpl,CMICtrlWnd
O4 - HKLM\..\Run: [avast!] C:\PROGRA~1\ALWILS~1\Avast4\ashDisp.exe
O4 - HKLM\..\Run: [NhwdiZwWwNqN] C:\WINDOWS\System32\duquoxjv.exe
O4 - HKLM\..\Run: [microsft windows updates] mswupdate32.exe
O4 - HKLM\..\Run: [Windows DLL Loader] C:\WINDOWS\System32\bvlyuov.exe
O4 - HKLM\..\Run: [DAEMON Tools-1033] "C:\Program Files\D-Tools\daemon.exe" -lang 1045
O4 - HKLM\..\Run: [KernelFaultCheck] %systemroot%\system32\dumprep 0 -k
O4 - HKLM\..\Run: [ATIPTA] C:\Program Files\ATI Technologies\ATI Control Panel\atiptaxx.exe
O4 - HKLM\..\Run: [SunJavaUpdateSched] C:\Program Files\Java\jre1.5.0_05\bin\jusched.exe
O4 - HKLM\..\Run: [MS-patch333] winservices.exe
O4 - HKLM\..\Run: [windowndater] lsasss.exe
O4 - HKLM\..\Run: [gxpcqaaa] C:\WINDOWS\System32\gxpcqaaa.exe
O4 - HKLM\..\Run: [Winupdate] winsec.exe
O4 - HKLM\..\Run: [WindowsUpdatewinsec] winsec.exe
O4 - HKLM\..\Run: [WindowsUpdatelsasss] lsasss.exe
O4 - HKLM\..\Run: [timessquare] C:\windows\timessquare.exe
O4 - HKLM\..\Run: [adtech2006] C:\windows\adtech2006.exe
O4 - HKLM\..\RunServices: [Generic Host Process2 System Backup] scvhost2.exe
O4 - HKLM\..\RunServices: [Explorer] explore.exe
O4 - HKLM\..\RunServices: [Generic Host Process9 System Backup] scvhost9.exe
O4 - HKLM\..\RunServices: [Mirsft sdce] servs.exe
O4 - HKLM\..\RunServices: [Windows Svshost Service Update 32] svcsshost32.exe
O4 - HKLM\..\RunServices: [NhwdiZwWwNqN] C:\WINDOWS\System32\duquoxjv.exe
O4 - HKLM\..\RunServices: [microsft windows updates] mswupdate32.exe
O4 - HKLM\..\RunServices: [MS-patch333] winservices.exe
O4 - HKCU\..\Run: [CTFMON.EXE] C:\WINDOWS\System32\ctfmon.exe
O4 - HKCU\..\Run: [MSMSGS] "C:\Program Files\Messenger\msmsgs.exe" /background
O4 - HKCU\..\Run: [Generic Host Process9 System Backup] scvhost9.exe
O4 - HKCU\..\Run: [Generic Host Process2 System Backup] scvhost2.exe
O4 - HKCU\..\Run: [Windows Svshost Service Update 32] svcsshost32.exe
O4 - HKCU\..\Run: [Gadu-Gadu] "C:\Program Files\Gadu-Gadu\gg.exe" /tray
O4 - HKCU\..\Run: [ITD7] "C:\Program Files\Steganos Internet Trace Destructor 7\ITD7.exe" -boot
O4 - HKCU\..\Run: [gxpcqaaa] C:\WINDOWS\System32\gxpcqaaa.exe
O4 - HKCU\..\Run: [zzrz] C:\Program Files\Common Files\zzrz\zzrzm.exe
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_05\bin\npjpi150_05.dll
O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_05\bin\npjpi150_05.dll
O9 - Extra button: Related - {c95fe080-8f5d-11d2-a20b-00aa003c157a} - C:\WINDOWS\web\related.htm
O9 - Extra 'Tools' menuitem: Show &Related Links - {c95fe080-8f5d-11d2-a20b-00aa003c157a} - C:\WINDOWS\web\related.htm
O16 - DPF: {92ECE6FA-AC2E-4042-BFAE-0C8608E52A43} (SignActivX Control) - https://www.bph.pl/pi/components/SignActivX.cab
O17 - HKLM\System\CCS\Services\Tcpip\..\{1AF48FAF-7378-4E78-BDEA-5A68CB6FE780}: NameServer = 217.30.129.149,217.30.137.200
O17 - HKLM\System\CS1\Services\Tcpip\..\{1AF48FAF-7378-4E78-BDEA-5A68CB6FE780}: NameServer = 217.30.129.149,217.30.137.200
O17 - HKLM\System\CS2\Services\Tcpip\..\{1AF48FAF-7378-4E78-BDEA-5A68CB6FE780}: NameServer = 217.30.129.149,217.30.137.200
O23 - Service: avast! iAVS4 Control Service (aswUpdSv) - Unknown owner - C:\Program Files\Alwil Software\Avast4\aswUpdSv.exe
O23 - Service: Ati HotKey Poller - Unknown owner - C:\WINDOWS\System32\Ati2evxx.exe
O23 - Service: ATI Smart - Unknown owner - C:\WINDOWS\system32\ati2sgag.exe
O23 - Service: avast! Antivirus - Unknown owner - C:\Program Files\Alwil Software\Avast4\ashServ.exe
O23 - Service: avast! Mail Scanner - Unknown owner - C:\Program Files\Alwil Software\Avast4\ashMaiSv.exe" /service (file missing)
O23 - Service: avast! Web Scanner - Unknown owner - C:\Program Files\Alwil Software\Avast4\ashWebSv.exe" /service (file missing)
O23 - Service: Service Hosts (ServiceHost) - Unknown owner - C:\WINDOWS\shost.exe (file missing)

[quote][/quote]
Pozdrawiam wszystkich użytkowników tego serwisu...
oskar33
~user
 
Posty: 34
Dołączenie: 24 Cze 2005, 20:01
Miejscowość: Bielsko Biała



Postprzez Tom@szek 07 Gru 2005, 18:37

Przeskanuj system antywirem on-line - może być mks. Spybot Search&Destroy i zapodaj ponownie log-a.
Umieść go w tagach CODE
Tom@szek
 



Postprzez stary* 07 Gru 2005, 18:49

Tryb awaryjny i bez przywracania systemu:
:arrow:
C:\WINDOWS\System32\mswupdate32.exe
C:\WINDOWS\System32\winservices.exe
C:\WINDOWS\System32\lsasss.exe
C:\WINDOWS\System32\gxpcqaaa.exe
C:\WINDOWS\System32\winsec.exe
C:\WINDOWS\System32\winsec.exe
C:\WINDOWS\System32\lsasss.exe
C:\windows\adtech2006.exe
(Powyższe procesy wywalasz Pocket Killboxem, podając do pola tekstowego ścieżki tych wszystkich powyższych plików i kolejno klikając Delete On Reboot i YES, lub OK)

Potem:
:arrow:
O1 - Hosts: 255.255.255.255 ar.atwola.com atdmt.com avp.ch avp.com avp.ru awaps.net ca.com dispatch.mcafee.com download.mcafee.com download.microsoft.com downloads.microsoft.com engine.awaps.net f-secure.com ftp.f-secure.com ftp.sophos.com go.microsoft.com liveupdate.symantec.com mast.mcafee.com mcafee.com msdn.microsoft.com my-etrust.com nai.com networkassociates.com office.microsoft.com phx.corporate-ir.net secure.nai.com securityresponse.symantec.com service1.symantec.com sophos.com spd.atdmt.com support.microsoft.com symantec.com update.symantec.com updates.symantec.com us.mcafee.com vil.nai.com viruslist.ru windowsupdate.microsoft.com www.avp.ch www.avp.com www.avp.ru www.awaps.net www.ca.com www.f-secure.com www.kaspersky.ru www.mcafee.com www.my-etrust.com www.nai.com www.networkassociates.com www.sophos.com www.symantec.com www.trendmicro.com www.viruslist.com www.viruslist.ru www3.ca.com
O4 - HKLM\..\Run: [Generic Host Process2 System Backup] scvhost2.exe
O4 - HKLM\..\Run: [Explorer] explore.exe
O4 - HKLM\..\Run: [Generic Host Process9 System Backup] scvhost9.exe
O4 - HKLM\..\Run: [Application Layer Gateway Service] C:\WINDOWS\System32\algs.exe
O4 - HKLM\..\Run: [Mirsft sdce] servs.exe
O4 - HKLM\..\Run: [Windows Svshost Service Update 32] svcsshost32.exe
O4 - HKLM\..\Run: [NhwdiZwWwNqN] C:\WINDOWS\System32\duquoxjv.exe
O4 - HKLM\..\Run: [microsft windows updates] mswupdate32.exe
O4 - HKLM\..\Run: [Windows DLL Loader] C:\WINDOWS\System32\bvlyuov.exe
O4 - HKLM\..\Run: [MS-patch333] winservices.exe
O4 - HKLM\..\Run: [windowndater] lsasss.exe
O4 - HKLM\..\Run: [gxpcqaaa] C:\WINDOWS\System32\gxpcqaaa.exe
O4 - HKLM\..\Run: [Winupdate] winsec.exe
O4 - HKLM\..\Run: [WindowsUpdatewinsec] winsec.exe
O4 - HKLM\..\Run: [WindowsUpdatelsasss] lsasss.exe
O4 - HKLM\..\Run: [timessquare] C:\windows\timessquare.exe
O4 - HKLM\..\Run: [adtech2006] C:\windows\adtech2006.exe
O4 - HKLM\..\RunServices: [Generic Host Process2 System Backup] scvhost2.exe
O4 - HKLM\..\RunServices: [Explorer] explore.exe
O4 - HKLM\..\RunServices: [Generic Host Process9 System Backup] scvhost9.exe
O4 - HKLM\..\RunServices: [Mirsft sdce] servs.exe
O4 - HKLM\..\RunServices: [Windows Svshost Service Update 32] svcsshost32.exe
O4 - HKLM\..\RunServices: [NhwdiZwWwNqN] C:\WINDOWS\System32\duquoxjv.exe
O4 - HKLM\..\RunServices: [microsft windows updates] mswupdate32.exe
O4 - HKLM\..\RunServices: [MS-patch333] winservices.exe
O4 - HKCU\..\Run: [Generic Host Process9 System Backup] scvhost9.exe
O4 - HKCU\..\Run: [Generic Host Process2 System Backup] scvhost2.exe
O4 - HKCU\..\Run: [Windows Svshost Service Update 32] svcsshost32.exe
O4 - HKCU\..\Run: [gxpcqaaa] C:\WINDOWS\System32\gxpcqaaa.exe
O4 - HKCU\..\Run: [zzrz] C:\Program Files\Common Files\zzrz\zzrzm.exe
O9 - Extra button: Related - {c95fe080-8f5d-11d2-a20b-00aa003c157a} - C:\WINDOWS\web\related.htm
O9 - Extra 'Tools' menuitem: Show &Related Links - {c95fe080-8f5d-11d2-a20b-00aa003c157a} - C:\WINDOWS\web\related.htm
O23 - Service: Service Hosts (ServiceHost) - Unknown owner - C:\WINDOWS\shost.exe (file missing)

Potem skanujesz TYM:
Skaner McAfee z silnikiem i bazą Kasperskiego
A potem TYM:

Skaner TrendMicro AntiSpyware WWW
No a potem log kontrolny:)
poZdRO :wink: :wink: :wink:
Awatar użytkownika
stary*
~user
 
Posty: 2181
Dołączenie: 15 Kwi 2005, 12:40
Miejscowość: Ruda Śląska
Pochwały: 145



Postprzez oskar33 07 Gru 2005, 23:09

A więc zrobiłem wszystko krok po kroku wg. podanej tutaj instrukcji. Przesyłam po zakończonych operacjach Logi...Czy dało to sens...czy jeszcze mi coś siedzi w komputerze?..Nadmienię jednak iż system bardzo powoli mi się uruchamia..czasem trzeba długo czekać na uruchomienie i pokazanie pulpitu..Może jeszcze tkwi gdzieś jakiś problem?....Pozatym nie wiem o który tak naprawdę log po wykonanych operacjach wkleić więc po prostu umieszczę 2 Logi z HiJacka oraz pracującego pod moim wrażeniem programu McAfee...Proszę, jeśli to możliwe o pomoc w dalszych kwestiach naprawy tego, co się namnożyło w tym komputerze...

LOG Z MCAFEE:

McAfee VirusScan for Win32 v4.40.0
Copyright (c) 1992-2004 Networks Associates Technology Inc. All rights reserved.
(408) 988-3832 LICENSED COPY - Sep 23 2004

Scan engine v4.4.00 for Win32.
Virus data file v4644 created Dec 06 2005
Scanning for 163504 viruses, trojans and variants.



12/07/2005 21:24:20


Options:
/ADL /ALL /ANALYSE /CLEAN /MAILBOX /MIME /NOEXPIRE /NORENAME /PANALYSE /PROGRAM /REPORT C:\MCAFEE.TXT /STREAMS /SUB /UNZIP /WINMEM

Scanning C: []
C:\drsmartload1.exe ... Found potentially unwanted program Adware-DollarRevenue.
The file or process has been deleted.
C:\api39.exe\WINAPI32.EXE\00001800.EXE ... Found potentially unwanted program Adware-Virtumundo.
The file or process has been deleted.
C:\stub_113_4_0_4_0.exe\stub_113_4_0_4_0.exe ... Found potentially unwanted program Uploader-R.
The file or process has been deleted.
C:\winapi32.exe\00001800.EXE ... Found potentially unwanted program Adware-Virtumundo.
The file or process has been deleted.
The archive has been deleted.
C:\binf32.exe ... Found the Generic Downloader.s trojan !!!
The file or process has been deleted.
Scanning C:\*.*
C:\WINDOWS\system32\config\systemprofile\Ustawienia lokalne\Temporary Internet Files\Content.IE5\LXOYQ2AO\w197[1].exe ... Found the W32/Bobax.worm.gen virus !!!
The file or process has been deleted.
C:\WINDOWS\system32\config\systemprofile\Ustawienia lokalne\Temporary Internet Files\Content.IE5\40ZSBJ5I\ucmoreiex[1].exe ... Found potentially unwanted program Adware-UCMore.
The file or process has been deleted.
C:\WINDOWS\system32\drivers\etc\hosts ... Found the QHosts-36 trojan !!!
The virus has been removed from the file.
Checking for another virus in the file ...
C:\WINDOWS\system32\i ... Found the W32/Sdbot.worm!ftp virus !!!
The file or process has been deleted.
C:\WINDOWS\system32\eraseme_15566.exe ... Found the W32/Sdbot.worm.gen.bd virus !!!
The file or process has been deleted.
C:\WINDOWS\system32\eraseme_44820.exe ... Found the W32/Sdbot.worm.gen.bd virus !!!
The file or process has been deleted.
C:\WINDOWS\system32\eraseme_61884.exe ... Found the W32/Sdbot.worm.gen.bd virus !!!
The file or process has been deleted.
C:\WINDOWS\system32\eraseme_53362.exe ... Found the W32/Sdbot.worm.gen.bd virus !!!
The file or process has been deleted.
C:\WINDOWS\system32\explore.exe ... Found trojan or variant New Malware.j !!!
Please send a copy of the file to McAfee
C:\WINDOWS\system32\eraseme_56765.exe ... Found the W32/Sdbot.worm.gen.bd virus !!!
The file or process has been deleted.
C:\WINDOWS\system32\bygkuib.exe ... Found the W32/Bobax.worm.gen virus !!!
The file or process has been deleted.
C:\WINDOWS\system32\uvcaw.exe ... Found virus or variant New Win32.g2 !!!
Please send a copy of the file to McAfee
C:\WINDOWS\system32\eraseme_24344.exe ... Found the W32/Sdbot.worm.gen.bd virus !!!
The file or process has been deleted.
C:\WINDOWS\system32\eraseme_15162.exe ... Found the W32/Sdbot.worm.gen.bd virus !!!
The file or process has been deleted.
C:\WINDOWS\system32\geedd.dll ... Found potentially unwanted program Adware-Virtumundo.
C:\WINDOWS\system32\eraseme_84078.exe ... Found the W32/Sdbot.worm.gen.bd virus !!!
The file or process has been deleted.
C:\WINDOWS\system32\pmnlk.dll ... Found potentially unwanted program Adware-Virtumundo.
The file or process has been deleted.
C:\WINDOWS\system32\eraseme_41877.exe ... Found the W32/Sdbot.worm.gen.bd virus !!!
The file or process has been deleted.
C:\WINDOWS\system32\eraseme_52546.exe ... Found the W32/Sdbot.worm.gen.bd virus !!!
The file or process has been deleted.
C:\WINDOWS\system32\tlbmacqhzixxq.exe ... Found the W32/Bobax.worm.gen virus !!!
The file or process has been deleted.
C:\WINDOWS\system32\eraseme_22101.exe ... Found the W32/Sdbot.worm.gen.bd virus !!!
The file or process has been deleted.
C:\WINDOWS\system32\eraseme_53111.exe ... Found the W32/Sdbot.worm.gen.bd virus !!!
The file or process has been deleted.
C:\WINDOWS\system32\eraseme_60273.exe ... Found the W32/Sdbot.worm.gen.bd virus !!!
The file or process has been deleted.
C:\WINDOWS\system32\eraseme_85231.exe ... Found the W32/Sdbot.worm.gen.bd virus !!!
The file or process has been deleted.
C:\WINDOWS\system32\eraseme_74848.exe ... Found the W32/Sdbot.worm.gen.bd virus !!!
The file or process has been deleted.
C:\WINDOWS\system32\eraseme_28112.exe ... Found the W32/Sdbot.worm.gen.bd virus !!!
The file or process has been deleted.
C:\WINDOWS\system32\eraseme_58214.exe ... Found the W32/Sdbot.worm.gen.bd virus !!!
The file or process has been deleted.
C:\WINDOWS\system32\eraseme_01811.exe ... Found the W32/Sdbot.worm.gen.bd virus !!!
The file or process has been deleted.
C:\WINDOWS\system32\.networkassociates.com www.sophos.com www.symantec.com www.trendmicro.com www.viruslist.com www.viruslist.ru www3.ca.com ... Found the Qhosts.apd trojan !!!
The virus has been removed from the file.
Checking for another virus in the file ...
C:\WINDOWS\system32\wisp.exe ... Found the W32/Sdbot.worm.gen.br virus !!!
The file or process has been deleted.
C:\WINDOWS\system32\pmkhi.dll ... Found potentially unwanted program Adware-Virtumundo.
The file or process has been deleted.
C:\WINDOWS\system32\svchostss.exe ... Found trojan or variant New Malware.j !!!
Please send a copy of the file to McAfee
C:\WINDOWS\dlhost.exe ... Found the W32/Sdbot.worm.gen.bd virus !!!
The file or process has been deleted.
C:\WINDOWS\timessquare.exe ... Found potentially unwanted program Adware-DCToolbar.
The file or process has been deleted.
C:\Documents and Settings\LocalService\Ustawienia lokalne\Temporary Internet Files\Content.IE5\CNKJIPOV\winapi[1].exe\WINAPI32.EXE\00001800.EXE ... Found potentially unwanted program Adware-Virtumundo.
The file or process has been deleted.
C:\Documents and Settings\ANIA I PIOTREK\Ustawienia lokalne\Temp\tsinstall_4_0_4_0_b4.exe ... Found potentially unwanted program Uploader-R.dr.
The file or process has been deleted.
C:\Documents and Settings\ANIA I PIOTREK\Ustawienia lokalne\Temporary Internet Files\Content.IE5\36CCIUCB\drsmartload252a[1].exe ... Found potentially unwanted program Adware-DollarRevenue.
The file or process has been deleted.
C:\Documents and Settings\ANIA I PIOTREK\Ustawienia lokalne\Temporary Internet Files\Content.IE5\36CCIUCB\stub_113_4_0_4_0[1].exe\stub_113_4_0_4_0[1].exe ... Found potentially unwanted program Uploader-R.
The file or process has been deleted.
C:\Documents and Settings\ANIA I PIOTREK\Ustawienia lokalne\Temporary Internet Files\Content.IE5\WP67OXIF\drsmartload[1].exe ... Found potentially unwanted program Adware-DollarRevenue.
The file or process has been deleted.
C:\Documents and Settings\ANIA I PIOTREK\Ustawienia lokalne\Temporary Internet Files\Content.IE5\8LUJC127\timessquare[1].exe ... Found potentially unwanted program Adware-DCToolbar.
The file or process has been deleted.
C:\Documents and Settings\ANIA I PIOTREK\Dane aplikacji\Sun\Java\Deployment\cache\javapi\v1.0\jar\java.jar-10015c94-5dd73d9f.zip\GETACCESS.CLASS ... Found the Exploit-ByteVerify trojan !!!
C:\Documents and Settings\ANIA I PIOTREK\Dane aplikacji\Sun\Java\Deployment\cache\javapi\v1.0\jar\java.jar-bae16f0-5f0cc4e9.zip\GETACCESS.CLASS ... Found the Exploit-ByteVerify trojan !!!
C:\Documents and Settings\ANIA I PIOTREK\meh.exe ... Found potentially unwanted program Adware-DollarRevenue.
The file or process has been deleted.
C:\Documents and Settings\ANIA I PIOTREK\.networkassociates.com www.sophos.com www.symantec.com www.trendmicro.com www.viruslist.com www.viruslist.ru www3.ca.com ... Found the Qhosts.apd trojan !!!
The virus has been removed from the file.
Checking for another virus in the file ...
C:\Program Files\Common Files\zzrz\zzrzl.exe\zzrzl.exe ... Found potentially unwanted program Uploader-R.
The file or process has been deleted.
C:\Program Files\Common Files\zzrz\zzrza.exe\zzrza.exe ... Found potentially unwanted program Uploader-R.
The file or process has been deleted.
C:\Program Files\Common Files\zzrz\zzrzp.exe\zzrzp.exe ... Found potentially unwanted program Uploader-R.
The file or process has been deleted.
C:\System Volume Information\_restore{4B8891FD-134C-4958-BDE4-2B78EBBD8CA8}\RP21\A0006793.exe ... Found potentially unwanted program Adware-DollarRevenue.
The file or process has been deleted.
C:\System Volume Information\_restore{4B8891FD-134C-4958-BDE4-2B78EBBD8CA8}\RP21\A0006797.exe\WINAPI32.EXE\00001800.EXE ... Found potentially unwanted program Adware-Virtumundo.
The file or process has been deleted.
C:\System Volume Information\_restore{4B8891FD-134C-4958-BDE4-2B78EBBD8CA8}\RP21\A0006802.exe\WINAPI32.EXE\00001800.EXE ... Found potentially unwanted program Adware-Virtumundo.
The file or process has been deleted.
C:\System Volume Information\_restore{4B8891FD-134C-4958-BDE4-2B78EBBD8CA8}\RP21\A0006821.exe ... Found potentially unwanted program Adware-DollarRevenue.
The file or process has been deleted.
C:\System Volume Information\_restore{4B8891FD-134C-4958-BDE4-2B78EBBD8CA8}\RP21\A0006844.exe ... Found potentially unwanted program Adware-DollarRevenue.
The file or process has been deleted.
C:\System Volume Information\_restore{4B8891FD-134C-4958-BDE4-2B78EBBD8CA8}\RP21\A0006866.exe\WINAPI32.EXE\00001800.EXE ... Found potentially unwanted program Adware-Virtumundo.
The file or process has been deleted.
C:\System Volume Information\_restore{4B8891FD-134C-4958-BDE4-2B78EBBD8CA8}\RP21\A0006870.exe ... Found potentially unwanted program Adware-DollarRevenue.
The file or process has been deleted.
C:\System Volume Information\_restore{4B8891FD-134C-4958-BDE4-2B78EBBD8CA8}\RP21\A0006883.exe ... Found the Generic Packed trojan !!!
The file or process has been deleted.
C:\System Volume Information\_restore{4B8891FD-134C-4958-BDE4-2B78EBBD8CA8}\RP21\A0006894.exe ... Found potentially unwanted program Adware-DollarRevenue.
The file or process has been deleted.
C:\System Volume Information\_restore{4B8891FD-134C-4958-BDE4-2B78EBBD8CA8}\RP21\A0006895.EXE\WINAPI32.EXE\00001800.EXE ... Found potentially unwanted program Adware-Virtumundo.
The file or process has been deleted.
C:\System Volume Information\_restore{4B8891FD-134C-4958-BDE4-2B78EBBD8CA8}\RP21\A0006896.exe\A0006896.exe ... Found potentially unwanted program Uploader-R.
The file or process has been deleted.
C:\System Volume Information\_restore{4B8891FD-134C-4958-BDE4-2B78EBBD8CA8}\RP21\A0006897.EXE\00001800.EXE ... Found potentially unwanted program Adware-Virtumundo.
The file or process has been deleted.
The archive has been deleted.
C:\System Volume Information\_restore{4B8891FD-134C-4958-BDE4-2B78EBBD8CA8}\RP21\A0006898.EXE ... Found the Generic Downloader.s trojan !!!
The file or process has been deleted.
C:\System Volume Information\_restore{4B8891FD-134C-4958-BDE4-2B78EBBD8CA8}\RP21\A0006899.exe ... Found the W32/Sdbot.worm.gen.bd virus !!!
The file or process has been deleted.
C:\System Volume Information\_restore{4B8891FD-134C-4958-BDE4-2B78EBBD8CA8}\RP21\A0006900.exe ... Found the W32/Sdbot.worm.gen.bd virus !!!
The file or process has been deleted.
C:\System Volume Information\_restore{4B8891FD-134C-4958-BDE4-2B78EBBD8CA8}\RP21\A0006901.exe ... Found the W32/Sdbot.worm.gen.bd virus !!!
The file or process has been deleted.
C:\System Volume Information\_restore{4B8891FD-134C-4958-BDE4-2B78EBBD8CA8}\RP21\A0006902.exe ... Found the W32/Sdbot.worm.gen.bd virus !!!
The file or process has been deleted.
C:\System Volume Information\_restore{4B8891FD-134C-4958-BDE4-2B78EBBD8CA8}\RP21\A0006903.exe ... Found the W32/Sdbot.worm.gen.bd virus !!!
The file or process has been deleted.
C:\System Volume Information\_restore{4B8891FD-134C-4958-BDE4-2B78EBBD8CA8}\RP21\A0006904.exe ... Found the W32/Bobax.worm.gen virus !!!
The file or process has been deleted.
C:\System Volume Information\_restore{4B8891FD-134C-4958-BDE4-2B78EBBD8CA8}\RP21\A0006905.exe ... Found the W32/Sdbot.worm.gen.bd virus !!!
The file or process has been deleted.
C:\System Volume Information\_restore{4B8891FD-134C-4958-BDE4-2B78EBBD8CA8}\RP21\A0006906.exe ... Found the W32/Sdbot.worm.gen.bd virus !!!
The file or process has been deleted.
C:\System Volume Information\_restore{4B8891FD-134C-4958-BDE4-2B78EBBD8CA8}\RP21\A0006907.exe ... Found the W32/Sdbot.worm.gen.bd virus !!!
The file or process has been deleted.
C:\System Volume Information\_restore{4B8891FD-134C-4958-BDE4-2B78EBBD8CA8}\RP21\A0006908.dll ... Found potentially unwanted program Adware-Virtumundo.
The file or process has been deleted.
C:\System Volume Information\_restore{4B8891FD-134C-4958-BDE4-2B78EBBD8CA8}\RP21\A0006909.exe ... Found the W32/Sdbot.worm.gen.bd virus !!!
The file or process has been deleted.
C:\System Volume Information\_restore{4B8891FD-134C-4958-BDE4-2B78EBBD8CA8}\RP21\A0006910.exe ... Found the W32/Sdbot.worm.gen.bd virus !!!
The file or process has been deleted.
C:\System Volume Information\_restore{4B8891FD-134C-4958-BDE4-2B78EBBD8CA8}\RP21\A0006911.exe ... Found the W32/Bobax.worm.gen virus !!!
The file or process has been deleted.
C:\System Volume Information\_restore{4B8891FD-134C-4958-BDE4-2B78EBBD8CA8}\RP21\A0006912.exe ... Found the W32/Sdbot.worm.gen.bd virus !!!
The file or process has been deleted.
C:\System Volume Information\_restore{4B8891FD-134C-4958-BDE4-2B78EBBD8CA8}\RP21\A0006913.exe ... Found the W32/Sdbot.worm.gen.bd virus !!!
The file or process has been deleted.
C:\System Volume Information\_restore{4B8891FD-134C-4958-BDE4-2B78EBBD8CA8}\RP21\A0006914.exe ... Found the W32/Sdbot.worm.gen.bd virus !!!
The file or process has been deleted.
C:\System Volume Information\_restore{4B8891FD-134C-4958-BDE4-2B78EBBD8CA8}\RP21\A0006915.exe ... Found the W32/Sdbot.worm.gen.bd virus !!!
The file or process has been deleted.
C:\System Volume Information\_restore{4B8891FD-134C-4958-BDE4-2B78EBBD8CA8}\RP21\A0006916.exe ... Found the W32/Sdbot.worm.gen.bd virus !!!
The file or process has been deleted.
C:\System Volume Information\_restore{4B8891FD-134C-4958-BDE4-2B78EBBD8CA8}\RP21\A0006917.exe ... Found the W32/Sdbot.worm.gen.bd virus !!!
The file or process has been deleted.
C:\System Volume Information\_restore{4B8891FD-134C-4958-BDE4-2B78EBBD8CA8}\RP21\A0006918.exe ... Found the W32/Sdbot.worm.gen.bd virus !!!
The file or process has been deleted.
C:\System Volume Information\_restore{4B8891FD-134C-4958-BDE4-2B78EBBD8CA8}\RP21\A0006919.exe ... Found the W32/Sdbot.worm.gen.bd virus !!!
The file or process has been deleted.
C:\System Volume Information\_restore{4B8891FD-134C-4958-BDE4-2B78EBBD8CA8}\RP21\A0006920.com ... Found the Qhosts.apd trojan !!!
The virus has been removed from the file.
Checking for another virus in the file ...
C:\System Volume Information\_restore{4B8891FD-134C-4958-BDE4-2B78EBBD8CA8}\RP21\A0006921.exe ... Found the W32/Sdbot.worm.gen.br virus !!!
The file or process has been deleted.
C:\System Volume Information\_restore{4B8891FD-134C-4958-BDE4-2B78EBBD8CA8}\RP21\A0006922.dll ... Found potentially unwanted program Adware-Virtumundo.
The file or process has been deleted.
C:\System Volume Information\_restore{4B8891FD-134C-4958-BDE4-2B78EBBD8CA8}\RP21\A0006923.exe ... Found the W32/Sdbot.worm.gen.bd virus !!!
The file or process has been deleted.
C:\System Volume Information\_restore{4B8891FD-134C-4958-BDE4-2B78EBBD8CA8}\RP21\A0006924.exe ... Found potentially unwanted program Adware-DCToolbar.
The file or process has been deleted.
C:\System Volume Information\_restore{4B8891FD-134C-4958-BDE4-2B78EBBD8CA8}\RP21\A0006925.exe ... Found potentially unwanted program Adware-DollarRevenue.
The file or process has been deleted.
C:\System Volume Information\_restore{4B8891FD-134C-4958-BDE4-2B78EBBD8CA8}\RP21\A0006926.com ... Found the Qhosts.apd trojan !!!
The virus has been removed from the file.
Checking for another virus in the file ...
C:\System Volume Information\_restore{4B8891FD-134C-4958-BDE4-2B78EBBD8CA8}\RP21\A0006927.exe\A0006927.exe ... Found potentially unwanted program Uploader-R.
The file or process has been deleted.
C:\System Volume Information\_restore{4B8891FD-134C-4958-BDE4-2B78EBBD8CA8}\RP21\A0006928.exe\A0006928.exe ... Found potentially unwanted program Uploader-R.
The file or process has been deleted.
C:\System Volume Information\_restore{4B8891FD-134C-4958-BDE4-2B78EBBD8CA8}\RP21\A0006929.exe\A0006929.exe ... Found potentially unwanted program Uploader-R.
The file or process has been deleted.
C:\!KillBox\api39.exe\WINAPI32.EXE\00001800.EXE ... Found potentially unwanted program Adware-Virtumundo.
The file or process has been deleted.
C:\!KillBox\mswupdate32.exe ... Found the Generic Packed trojan !!!
The file or process has been deleted.

A file(s) requires a reboot to complete the repair.
You are recommended to reboot the computer.

Summary report on C:\*.*
File(s)
Total files: ........... 56498
Clean: ................. 56413
Possibly Infected: ..... 55
Cleaned: ............... 5
Deleted: ............... 87
Non-critical Error(s): 1
Master Boot Record(s): ......... 1
Possibly Infected: ..... 0
Boot Sector(s): ................ 1
Possibly Infected: ..... 0
Scanning D: [PROMO MAX MIX]
Scanning D:\*.*

A file(s) requires a reboot to complete the repair.
You are recommended to reboot the computer.

Summary report on D:\*.*
File(s)
Total files: ........... 13
Clean: ................. 13
Possibly Infected: ..... 0
Cleaned: ............... 0
Master Boot Record(s): ......... 1
Possibly Infected: ..... 0
Boot Sector(s): ................ 1
Possibly Infected: ..... 0
Scanning E: [FILM DVD]
Scanning E:\*.*

A file(s) requires a reboot to complete the repair.
You are recommended to reboot the computer.

Summary report on E:\*.*
File(s)
Total files: ........... 20
Clean: ................. 20
Possibly Infected: ..... 0
Cleaned: ............... 0
Master Boot Record(s): ......... 1
Possibly Infected: ..... 0
Boot Sector(s): ................ 1
Possibly Infected: ..... 0
Scanning F: [TELEDYSKI]
Scanning F:\*.*

A file(s) requires a reboot to complete the repair.
You are recommended to reboot the computer.

Summary report on F:\*.*
File(s)
Total files: ........... 46
Clean: ................. 46
Possibly Infected: ..... 0
Cleaned: ............... 0
Master Boot Record(s): ......... 1
Possibly Infected: ..... 0
Boot Sector(s): ................ 1
Possibly Infected: ..... 0
Scanning G: [FOTKI I PIERDOŁY]
Scanning G:\*.*

A file(s) requires a reboot to complete the repair.
You are recommended to reboot the computer.

Summary report on G:\*.*
File(s)
Total files: ........... 90
Clean: ................. 90
Possibly Infected: ..... 0
Cleaned: ............... 0
Master Boot Record(s): ......... 1
Possibly Infected: ..... 0
Boot Sector(s): ................ 1
Possibly Infected: ..... 0
Scanning H: [PROGRAMY]
Scanning H:\*.*

A file(s) requires a reboot to complete the repair.
You are recommended to reboot the computer.

Summary report on H:\*.*
File(s)
Total files: ........... 1519
Clean: ................. 879
Possibly Infected: ..... 0
Cleaned: ............... 0
Non-critical Error(s): 1
Master Boot Record(s): ......... 1
Possibly Infected: ..... 0
Boot Sector(s): ................ 1
Possibly Infected: ..... 0
Scanning I: [FILMY DIVIX NA DVD]
Scanning I:\*.*

A file(s) requires a reboot to complete the repair.
You are recommended to reboot the computer.

Summary report on I:\*.*
File(s)
Total files: ........... 4
Clean: ................. 4
Possibly Infected: ..... 0
Cleaned: ............... 0
Master Boot Record(s): ......... 1
Possibly Infected: ..... 0
Boot Sector(s): ................ 1
Possibly Infected: ..... 0
Scanning J: [FILMY DIVIX]
Scanning J:\*.*

A file(s) requires a reboot to complete the repair.
You are recommended to reboot the computer.

Summary report on J:\*.*
File(s)
Total files: ........... 55
Clean: ................. 55
Possibly Infected: ..... 0
Cleaned: ............... 0
Master Boot Record(s): ......... 1
Possibly Infected: ..... 0
Boot Sector(s): ................ 1
Possibly Infected: ..... 0
Scanning K: [MUZYKA]
Scanning K:\*.*

A file(s) requires a reboot to complete the repair.
You are recommended to reboot the computer.

Summary report on K:\*.*
File(s)
Total files: ........... 4716
Clean: ................. 4716
Possibly Infected: ..... 0
Cleaned: ............... 0
Master Boot Record(s): ......... 1
Possibly Infected: ..... 0
Boot Sector(s): ................ 1
Possibly Infected: ..... 0
Scanning L: [SHARED Z DC+]
Scanning L:\*.*

A file(s) requires a reboot to complete the repair.
You are recommended to reboot the computer.

Summary report on L:\*.*
File(s)
Total files: ........... 132
Clean: ................. 132
Possibly Infected: ..... 0
Cleaned: ............... 0
Master Boot Record(s): ......... 1
Possibly Infected: ..... 0
Boot Sector(s): ................ 1
Possibly Infected: ..... 0
Scanning M: [ŚCIĄGNIĘTE Z DC +]
Scanning M:\*.*

A file(s) requires a reboot to complete the repair.
You are recommended to reboot the computer.

Summary report on M:\*.*
File(s)
Total files: ........... 1537
Clean: ................. 1537
Possibly Infected: ..... 0
Cleaned: ............... 0
Master Boot Record(s): ......... 1
Possibly Infected: ..... 0
Boot Sector(s): ................ 1
Possibly Infected: ..... 0


Time: 00:18.12




ORAZ LOG Z HIJACKA....

Logfile of HijackThis v1.99.1
Scan saved at 21:45:19, on 2005-12-07
Platform: Windows XP (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 (6.00.2600.0000)

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\System32\Ati2evxx.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\Alwil Software\Avast4\aswUpdSv.exe
C:\WINDOWS\Explorer.EXE
C:\Program Files\Alwil Software\Avast4\ashServ.exe
C:\WINDOWS\System32\explore.exe
C:\WINDOWS\System32\RunDll32.exe
C:\PROGRA~1\ALWILS~1\Avast4\ashDisp.exe
C:\Program Files\D-Tools\daemon.exe
C:\Program Files\ATI Technologies\ATI Control Panel\atiptaxx.exe
C:\Program Files\Java\jre1.5.0_05\bin\jusched.exe
C:\WINDOWS\System32\svchostss.exe
C:\winapi64.exe
C:\WINDOWS\System32\ctfmon.exe
C:\Program Files\Messenger\msmsgs.exe
C:\Program Files\Gadu-Gadu\gg.exe
C:\Program Files\Common Files\Ahead\lib\NMBgMonitor.exe
C:\Program Files\Alwil Software\Avast4\ashWebSv.exe
C:\totalcmd\TOTALCMD.EXE
C:\DOCUME~1\ANIAIP~1\USTAWI~1\Temp\_tc\HijackThis.exe

R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://searchbar.findthewebsiteyouneed.com
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Bar = http://searchbar.findthewebsiteyouneed.com
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = http://searchbar.findthewebsiteyouneed.com
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.google.pl/
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://searchbar.findthewebsiteyouneed.com
R0 - HKLM\Software\Microsoft\Internet Explorer\Search,SearchAssistant = http://searchbar.findthewebsiteyouneed.com
R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName = Łącza
O2 - BHO: AcroIEHlprObj Class - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 6.0 CE\Reader\ActiveX\AcroIEHelper.dll
O3 - Toolbar: &Radio - {8E718888-423F-11D2-876E-00A0C9082467} - C:\WINDOWS\System32\msdxm.ocx
O4 - HKLM\..\Run: [Generic Host Process2 System Backup] scvhost2.exe
O4 - HKLM\..\Run: [Explorer] explore.exe
O4 - HKLM\..\Run: [Generic Host Process9 System Backup] scvhost9.exe
O4 - HKLM\..\Run: [Application Layer Gateway Service] C:\WINDOWS\System32\algs.exe
O4 - HKLM\..\Run: [Mirsft sdce] servs.exe
O4 - HKLM\..\Run: [Windows Svshost Service Update 32] svcsshost32.exe
O4 - HKLM\..\Run: [Cmaudio] RunDll32 cmicnfg.cpl,CMICtrlWnd
O4 - HKLM\..\Run: [avast!] C:\PROGRA~1\ALWILS~1\Avast4\ashDisp.exe
O4 - HKLM\..\Run: [NhwdiZwWwNqN] C:\WINDOWS\System32\duquoxjv.exe
O4 - HKLM\..\Run: [Windows DLL Loader] C:\WINDOWS\System32\bvlyuov.exe
O4 - HKLM\..\Run: [DAEMON Tools-1033] "C:\Program Files\D-Tools\daemon.exe" -lang 1045
O4 - HKLM\..\Run: [KernelFaultCheck] %systemroot%\system32\dumprep 0 -k
O4 - HKLM\..\Run: [ATIPTA] C:\Program Files\ATI Technologies\ATI Control Panel\atiptaxx.exe
O4 - HKLM\..\Run: [SunJavaUpdateSched] C:\Program Files\Java\jre1.5.0_05\bin\jusched.exe
O4 - HKLM\..\Run: [MS-patch333] winservices.exe
O4 - HKLM\..\Run: [windowndater] lsasss.exe
O4 - HKLM\..\Run: [gxpcqaaa] C:\WINDOWS\System32\gxpcqaaa.exe
O4 - HKLM\..\Run: [Winupdate] winsec.exe
O4 - HKLM\..\Run: [WindowsUpdatewinsec] winsec.exe
O4 - HKLM\..\Run: [WindowsUpdatelsasss] lsasss.exe
O4 - HKLM\..\Run: [adtech2006] C:\windows\adtech2006.exe
O4 - HKLM\..\Run: [NeroFilterCheck] C:\WINDOWS\System32\NeroCheck.exe
O4 - HKLM\..\Run: [WindowsUpdatesvchostss] svchostss.exe
O4 - HKLM\..\Run: [Services] C:\winapi64.exe
O4 - HKLM\..\RunServices: [Generic Host Process2 System Backup] scvhost2.exe
O4 - HKLM\..\RunServices: [Explorer] explore.exe
O4 - HKLM\..\RunServices: [Generic Host Process9 System Backup] scvhost9.exe
O4 - HKLM\..\RunServices: [Mirsft sdce] servs.exe
O4 - HKLM\..\RunServices: [Windows Svshost Service Update 32] svcsshost32.exe
O4 - HKLM\..\RunServices: [NhwdiZwWwNqN] C:\WINDOWS\System32\duquoxjv.exe
O4 - HKLM\..\RunServices: [MS-patch333] winservices.exe
O4 - HKCU\..\Run: [CTFMON.EXE] C:\WINDOWS\System32\ctfmon.exe
O4 - HKCU\..\Run: [MSMSGS] "C:\Program Files\Messenger\msmsgs.exe" /background
O4 - HKCU\..\Run: [Generic Host Process9 System Backup] scvhost9.exe
O4 - HKCU\..\Run: [Generic Host Process2 System Backup] scvhost2.exe
O4 - HKCU\..\Run: [Windows Svshost Service Update 32] svcsshost32.exe
O4 - HKCU\..\Run: [Gadu-Gadu] "C:\Program Files\Gadu-Gadu\gg.exe" /tray
O4 - HKCU\..\Run: [ITD7] "C:\Program Files\Steganos Internet Trace Destructor 7\ITD7.exe" -boot
O4 - HKCU\..\Run: [gxpcqaaa] C:\WINDOWS\System32\gxpcqaaa.exe
O4 - HKCU\..\Run: [zzrz] C:\Program Files\Common Files\zzrz\zzrzm.exe
O4 - HKCU\..\Run: [BgMonitor_{79662E04-7C6C-4d9f-84C7-88D8A56B10AA}] "C:\Program Files\Common Files\Ahead\lib\NMBgMonitor.exe"
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_05\bin\npjpi150_05.dll
O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_05\bin\npjpi150_05.dll
O9 - Extra button: Related - {c95fe080-8f5d-11d2-a20b-00aa003c157a} - C:\WINDOWS\web\related.htm
O9 - Extra 'Tools' menuitem: Show &Related Links - {c95fe080-8f5d-11d2-a20b-00aa003c157a} - C:\WINDOWS\web\related.htm
O16 - DPF: {2BC66F54-93A8-11D3-BEB6-00105AA9B6AE} (Symantec AntiVirus scanner) - http://security.symantec.com/sscv6/SharedContent/vc/bin/AvSniff.cab
O16 - DPF: {3D8700FB-86A4-4CB4-B738-6F0FC016AC7D} (MainControl Class) - http://arcaonline.arcabit.com/ArcaOnline.cab
O16 - DPF: {644E432F-49D3-41A1-8DD5-E099162EEEC5} (Symantec RuFSI Utility Class) - http://security.symantec.com/sscv6/SharedContent/common/bin/cabsa.cab
O16 - DPF: {92ECE6FA-AC2E-4042-BFAE-0C8608E52A43} (SignActivX Control) - https://www.bph.pl/pi/components/SignActivX.cab
O16 - DPF: {9A9307A0-7DA4-4DAF-B042-5009F29E09E1} (ActiveScan Installer Class) - http://acs.pandasoftware.com/activescan/as5free/asinst.cab
O17 - HKLM\System\CCS\Services\Tcpip\..\{1AF48FAF-7378-4E78-BDEA-5A68CB6FE780}: NameServer = 217.30.129.149,217.30.137.200
O17 - HKLM\System\CS1\Services\Tcpip\..\{1AF48FAF-7378-4E78-BDEA-5A68CB6FE780}: NameServer = 217.30.129.149,217.30.137.200
O17 - HKLM\System\CS2\Services\Tcpip\..\{1AF48FAF-7378-4E78-BDEA-5A68CB6FE780}: NameServer = 217.30.129.149,217.30.137.200
O20 - Winlogon Notify: geedd - C:\WINDOWS\SYSTEM32\geedd.dll
O23 - Service: avast! iAVS4 Control Service (aswUpdSv) - Unknown owner - C:\Program Files\Alwil Software\Avast4\aswUpdSv.exe
O23 - Service: Ati HotKey Poller - Unknown owner - C:\WINDOWS\System32\Ati2evxx.exe
O23 - Service: ATI Smart - Unknown owner - C:\WINDOWS\system32\ati2sgag.exe
O23 - Service: avast! Antivirus - Unknown owner - C:\Program Files\Alwil Software\Avast4\ashServ.exe
O23 - Service: avast! Mail Scanner - Unknown owner - C:\Program Files\Alwil Software\Avast4\ashMaiSv.exe" /service (file missing)
O23 - Service: avast! Web Scanner - Unknown owner - C:\Program Files\Alwil Software\Avast4\ashWebSv.exe" /service (file missing)
O23 - Service: Service Hosts (ServiceHost) - Unknown owner - C:\WINDOWS\shost.exe (file missing)

[code]
Pozdrawiam wszystkich użytkowników tego serwisu...
oskar33
~user
 
Posty: 34
Dołączenie: 24 Cze 2005, 20:01
Miejscowość: Bielsko Biała



Postprzez jeff 08 Gru 2005, 00:22

oskar33 napisał(a):[code]


chyba coś Ci nie wyszło z tagami dlatego zaedytowałem i poprawiłem. Na przyszłość poczytaj ten topik

http://www.forum.programosy.pl/hijackthis-gtobsuga-i-umieszczanie-loga-vt9452.html

a dokładniej mój post jak sie log-a obejmuje tagami

a co do samego log-a to na początek skan antywirusami on-line

Panda
Kaspersky
mks_vir

a natepnie skan w trybie awaryjnym tym

CWShredder 2.15
SpyBot - Search & Destroy v1.4 PL
Ad-aware SE Personal 1.06
PestPatrol

i wrzucasz ponownie log-a (z tagami) 8)
jeff
 



Postprzez oskar33 12 Gru 2005, 15:11

A więc co teraz?...Co Dalej?..czy jeszcze coś mi siedzi w komputerze?...Nadal mi się powoli odpala...juz nie wim co mam robić...?...Przesyłam jak n/n loga z hijacka po dokonanych operacjach oraz loga ze skanera online...jakie teraz mam jeszce z tym złomem problemy?... :(

LOG ZE SKANERA ONLINE:

Monday, December 12, 2005 11:43:09
System operacyjny: Microsoft Windows XP Professional, (Build 2600)
Kaspersky On-line Scanner wersja: 5.0.68.0
Ostatnia aktualizacja Kaspersky Anti-Virus: 12/12/2005
Liczba wpisów w bazie danych Kaspersky Anti-Virus: 154678


Ustawienia skanowania
Skanowanie przy użyciu następujących baz danych standardowe
Skanuj archiwa tak
Skanuj pocztowe bazy danych tak

Obszar skanowania Mój komputer
A:\
C:\
D:\
E:\
F:\
G:\
H:\
I:\
J:\
K:\
L:\
M:\
N:\
O:\
P:\
R:\
S:\
T:\

Statystyki skanowania
Liczba skanowanych obiektów 32863
Liczba wykrytych wirusów 11
Liczba zainfekowanych obiektów 29
Liczba podejrzanych obiektów 0
Czas trwania skanowania 00:18:07

Nazwa zainfekowanego obiektu Nazwa wirusa Ostatnie działanie
C:\WINDOWS\system32\i Zainfekowany: Trojan-Downloader.BAT.Ftp.ab pominięty

C:\WINDOWS\system32\explore.exe Zainfekowany: Backdoor.Win32.Rbot.ajp pominięty

C:\WINDOWS\system32\iosrnvll.exe Zainfekowany: Backdoor.Win32.PoeBot.d pominięty

C:\WINDOWS\system32\helperlsasss.exe Zainfekowany: Trojan-PSW.Win32.Agent.an pominięty

C:\WINDOWS\system32\eraseme_81001.exe Zainfekowany: Trojan.Win32.Pakes pominięty

C:\WINDOWS\system32\helperwinsec.exe Zainfekowany: Trojan-PSW.Win32.Agent.an pominięty

C:\WINDOWS\system32\helpersvchostss.exe Zainfekowany: Trojan-PSW.Win32.Agent.an pominięty

C:\WINDOWS\system32\svchostss.exe Zainfekowany: Trojan-PSW.Win32.Agent.an pominięty

C:\WINDOWS\dlhost.exe Zainfekowany: Backdoor.Win32.SdBot.xd pominięty

C:\WINDOWS\dcmhelp.exe Zainfekowany: Backdoor.Win32.SdBot.xd pominięty

C:\fixed.exe Zainfekowany: Trojan-PSW.Win32.Agent.an pominięty

C:\Documents and Settings\LocalService\Ustawienia lokalne\Temporary Internet Files\Content.IE5\69GTWZ2X\sk1571[1] Zainfekowany: Trojan-Proxy.Win32.Ranky.dg pominięty

C:\Documents and Settings\LocalService\Ustawienia lokalne\Temporary Internet Files\Content.IE5\EPGJ83A5\winapi[1].exe/winapi64.exe Zainfekowany: Trojan-Proxy.Win32.Ranky.dg pominięty

C:\Documents and Settings\LocalService\Ustawienia lokalne\Temporary Internet Files\Content.IE5\EPGJ83A5\winapi[1].exe RAR: 1 zainfekowanych pominięty

C:\Documents and Settings\ANIA I PIOTREK\Dane aplikacji\Sun\Java\Deployment\cache\javapi\v1.0\jar\java.jar-10015c94-5dd73d9f.zip/GetAccess.class Zainfekowany: Trojan-Downloader.Java.OpenConnection.aj pominięty

C:\Documents and Settings\ANIA I PIOTREK\Dane aplikacji\Sun\Java\Deployment\cache\javapi\v1.0\jar\java.jar-10015c94-5dd73d9f.zip/Installer.class Zainfekowany: Trojan-Downloader.Java.OpenConnection.aj pominięty

C:\Documents and Settings\ANIA I PIOTREK\Dane aplikacji\Sun\Java\Deployment\cache\javapi\v1.0\jar\java.jar-10015c94-5dd73d9f.zip ZIP: 2 zainfekowanych pominięty

C:\Documents and Settings\ANIA I PIOTREK\Dane aplikacji\Sun\Java\Deployment\cache\javapi\v1.0\jar\java.jar-bae16f0-5f0cc4e9.zip/GetAccess.class Zainfekowany: Trojan-Downloader.Java.OpenConnection.aj pominięty

C:\Documents and Settings\ANIA I PIOTREK\Dane aplikacji\Sun\Java\Deployment\cache\javapi\v1.0\jar\java.jar-bae16f0-5f0cc4e9.zip/Installer.class Zainfekowany: Trojan-Downloader.Java.OpenConnection.aj pominięty

C:\Documents and Settings\ANIA I PIOTREK\Dane aplikacji\Sun\Java\Deployment\cache\javapi\v1.0\jar\java.jar-bae16f0-5f0cc4e9.zip ZIP: 2 zainfekowanych pominięty

C:\System Volume Information\_restore{4B8891FD-134C-4958-BDE4-2B78EBBD8CA8}\RP25\A0007527.exe Zainfekowany: Trojan-Clicker.Win32.VB.kc pominięty

C:\System Volume Information\_restore{4B8891FD-134C-4958-BDE4-2B78EBBD8CA8}\RP26\A0007589.exe/winapi64.exe Zainfekowany: Trojan-Proxy.Win32.Ranky.dg pominięty

C:\System Volume Information\_restore{4B8891FD-134C-4958-BDE4-2B78EBBD8CA8}\RP26\A0007589.exe RAR: 1 zainfekowanych pominięty

C:\api39.exe/winapi64.exe Zainfekowany: Trojan-Proxy.Win32.Ranky.dg pominięty

C:\api39.exe RAR: 1 zainfekowanych pominięty

C:\!KillBox\winsec.exe Zainfekowany: Trojan-PSW.Win32.Agent.an pominięty

C:\!KillBox\winservices.exe Zainfekowany: Backdoor.Win32.Rbot.aka pominięty

C:\!KillBox\gxpcqaaa.exe Zainfekowany: Backdoor.Win32.Small.ht pominięty

C:\winapi64.exe Zainfekowany: Trojan-Proxy.Win32.Ranky.dg pominięty

Proces skanowania został zakończony.



LOG PO DOKONANYCH 4 KROKACH I UŻYWANIU CZTERECH W/W PROGRAMÓW:....


Logfile of HijackThis v1.99.1
Scan saved at 13:54:48, on 2005-12-12
Platform: Windows XP (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 (6.00.2600.0000)

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\System32\Ati2evxx.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\Explorer.EXE
C:\Program Files\Alwil Software\Avast4\aswUpdSv.exe
C:\Program Files\Alwil Software\Avast4\ashServ.exe
C:\WINDOWS\dcmhelp.exe
C:\WINDOWS\dlhost.exe
C:\WINDOWS\system32\cmd.exe
c:\winapi64.exe
C:\Program Files\Alwil Software\Avast4\ashWebSv.exe
C:\WINDOWS\System32\RunDll32.exe
C:\PROGRA~1\ALWILS~1\Avast4\ashDisp.exe
C:\Program Files\D-Tools\daemon.exe
C:\Program Files\ATI Technologies\ATI Control Panel\atiptaxx.exe
C:\Program Files\Java\jre1.5.0_05\bin\jusched.exe
C:\WINDOWS\System32\svchostss.exe
C:\PROGRA~1\PESTPA~1\PPControl.exe
C:\PROGRA~1\PESTPA~1\PPMemCheck.exe
C:\PROGRA~1\PESTPA~1\CookiePatrol.exe
C:\winapi64.exe
C:\WINDOWS\System32\ctfmon.exe
C:\Program Files\Messenger\msmsgs.exe
C:\Program Files\Gadu-Gadu\gg.exe
C:\Program Files\Steganos Internet Trace Destructor 7\ITD7.exe
C:\Program Files\Common Files\Ahead\lib\NMBgMonitor.exe
C:\totalcmd\TOTALCMD.EXE
C:\DOCUME~1\ANIAIP~1\USTAWI~1\Temp\_tc\HijackThis.exe

R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName = Łącza
O2 - BHO: AcroIEHlprObj Class - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 6.0 CE\Reader\ActiveX\AcroIEHelper.dll
O2 - BHO: (no name) - {53707962-6F74-2D53-2644-206D7942484F} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O3 - Toolbar: &Radio - {8E718888-423F-11D2-876E-00A0C9082467} - C:\WINDOWS\System32\msdxm.ocx
O4 - HKLM\..\Run: [Generic Host Process2 System Backup] scvhost2.exe
O4 - HKLM\..\Run: [Explorer] explore.exe
O4 - HKLM\..\Run: [Generic Host Process9 System Backup] scvhost9.exe
O4 - HKLM\..\Run: [Application Layer Gateway Service] C:\WINDOWS\System32\algs.exe
O4 - HKLM\..\Run: [Mirsft sdce] servs.exe
O4 - HKLM\..\Run: [Windows Svshost Service Update 32] svcsshost32.exe
O4 - HKLM\..\Run: [Cmaudio] RunDll32 cmicnfg.cpl,CMICtrlWnd
O4 - HKLM\..\Run: [avast!] C:\PROGRA~1\ALWILS~1\Avast4\ashDisp.exe
O4 - HKLM\..\Run: [NhwdiZwWwNqN] C:\WINDOWS\System32\duquoxjv.exe
O4 - HKLM\..\Run: [DAEMON Tools-1033] "C:\Program Files\D-Tools\daemon.exe" -lang 1045
O4 - HKLM\..\Run: [KernelFaultCheck] %systemroot%\system32\dumprep 0 -k
O4 - HKLM\..\Run: [ATIPTA] C:\Program Files\ATI Technologies\ATI Control Panel\atiptaxx.exe
O4 - HKLM\..\Run: [SunJavaUpdateSched] C:\Program Files\Java\jre1.5.0_05\bin\jusched.exe
O4 - HKLM\..\Run: [MS-patch333] winservices.exe
O4 - HKLM\..\Run: [windowndater] lsasss.exe
O4 - HKLM\..\Run: [gxpcqaaa] C:\WINDOWS\System32\gxpcqaaa.exe
O4 - HKLM\..\Run: [Winupdate] winsec.exe
O4 - HKLM\..\Run: [WindowsUpdatewinsec] winsec.exe
O4 - HKLM\..\Run: [WindowsUpdatelsasss] lsasss.exe
O4 - HKLM\..\Run: [NeroFilterCheck] C:\WINDOWS\System32\NeroCheck.exe
O4 - HKLM\..\Run: [WindowsUpdatesvchostss] svchostss.exe
O4 - HKLM\..\Run: [PestPatrol Control Center] c:\PROGRA~1\PESTPA~1\PPControl.exe
O4 - HKLM\..\Run: [PPMemCheck] c:\PROGRA~1\PESTPA~1\PPMemCheck.exe
O4 - HKLM\..\Run: [CookiePatrol] c:\PROGRA~1\PESTPA~1\CookiePatrol.exe
O4 - HKLM\..\Run: [Services] C:\winapi64.exe
O4 - HKLM\..\RunServices: [Generic Host Process2 System Backup] scvhost2.exe
O4 - HKLM\..\RunServices: [Explorer] explore.exe
O4 - HKLM\..\RunServices: [Generic Host Process9 System Backup] scvhost9.exe
O4 - HKLM\..\RunServices: [Mirsft sdce] servs.exe
O4 - HKLM\..\RunServices: [Windows Svshost Service Update 32] svcsshost32.exe
O4 - HKLM\..\RunServices: [NhwdiZwWwNqN] C:\WINDOWS\System32\duquoxjv.exe
O4 - HKLM\..\RunServices: [MS-patch333] winservices.exe
O4 - HKCU\..\Run: [CTFMON.EXE] C:\WINDOWS\System32\ctfmon.exe
O4 - HKCU\..\Run: [MSMSGS] "C:\Program Files\Messenger\msmsgs.exe" /background
O4 - HKCU\..\Run: [Generic Host Process9 System Backup] scvhost9.exe
O4 - HKCU\..\Run: [Generic Host Process2 System Backup] scvhost2.exe
O4 - HKCU\..\Run: [Windows Svshost Service Update 32] svcsshost32.exe
O4 - HKCU\..\Run: [Gadu-Gadu] "C:\Program Files\Gadu-Gadu\gg.exe" /tray
O4 - HKCU\..\Run: [ITD7] "C:\Program Files\Steganos Internet Trace Destructor 7\ITD7.exe" -boot
O4 - HKCU\..\Run: [gxpcqaaa] C:\WINDOWS\System32\gxpcqaaa.exe
O4 - HKCU\..\Run: [zzrz] C:\Program Files\Common Files\zzrz\zzrzm.exe
O4 - HKCU\..\Run: [BgMonitor_{79662E04-7C6C-4d9f-84C7-88D8A56B10AA}] "C:\Program Files\Common Files\Ahead\lib\NMBgMonitor.exe"
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_05\bin\npjpi150_05.dll
O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_05\bin\npjpi150_05.dll
O15 - Trusted Zone: http://arcaonline.arcabit.com
O16 - DPF: {0EB0E74A-2A76-4AB3-A7FB-9BD8C29F7F75} (CKAVWebScan Object) - http://kaspersky.pl/resources/virusscanner/kavwebscan_unicode.cab
O16 - DPF: {2BC66F54-93A8-11D3-BEB6-00105AA9B6AE} (Symantec AntiVirus scanner) - http://security.symantec.com/sscv6/SharedContent/vc/bin/AvSniff.cab
O16 - DPF: {3D8700FB-86A4-4CB4-B738-6F0FC016AC7D} (MainControl Class) - http://arcaonline.arcabit.com/ArcaOnline.cab
O16 - DPF: {644E432F-49D3-41A1-8DD5-E099162EEEC5} (Symantec RuFSI Utility Class) - http://security.symantec.com/sscv6/SharedContent/common/bin/cabsa.cab
O16 - DPF: {92ECE6FA-AC2E-4042-BFAE-0C8608E52A43} (SignActivX Control) - https://www.bph.pl/pi/components/SignActivX.cab
O16 - DPF: {9A9307A0-7DA4-4DAF-B042-5009F29E09E1} (ActiveScan Installer Class) - http://acs.pandasoftware.com/activescan/as5free/asinst.cab
O17 - HKLM\System\CCS\Services\Tcpip\..\{1AF48FAF-7378-4E78-BDEA-5A68CB6FE780}: NameServer = 217.30.129.149,217.30.137.200
O17 - HKLM\System\CS1\Services\Tcpip\..\{1AF48FAF-7378-4E78-BDEA-5A68CB6FE780}: NameServer = 217.30.129.149,217.30.137.200
O17 - HKLM\System\CS2\Services\Tcpip\..\{1AF48FAF-7378-4E78-BDEA-5A68CB6FE780}: NameServer = 217.30.129.149,217.30.137.200
O20 - Winlogon Notify: geedd - geedd.dll (file missing)
O23 - Service: avast! iAVS4 Control Service (aswUpdSv) - Unknown owner - C:\Program Files\Alwil Software\Avast4\aswUpdSv.exe
O23 - Service: Ati HotKey Poller - Unknown owner - C:\WINDOWS\System32\Ati2evxx.exe
O23 - Service: ATI Smart - Unknown owner - C:\WINDOWS\system32\ati2sgag.exe
O23 - Service: avast! Antivirus - Unknown owner - C:\Program Files\Alwil Software\Avast4\ashServ.exe
O23 - Service: avast! Mail Scanner - Unknown owner - C:\Program Files\Alwil Software\Avast4\ashMaiSv.exe" /service (file missing)
O23 - Service: avast! Web Scanner - Unknown owner - C:\Program Files\Alwil Software\Avast4\ashWebSv.exe" /service (file missing)
O23 - Service: DcomHelper Service (DcomHelper) - Unknown owner - C:\WINDOWS\dcmhelp.exe
O23 - Service: DynamicHost (DLHOST) - Unknown owner - C:\WINDOWS\dlhost.exe
O23 - Service: Service Hosts (ServiceHost) - Unknown owner - C:\WINDOWS\shost.exe (file missing)

A MOŻE POMOŻE JESZCE TEN JEDEN LOG W USTALENIU PRZYCZYNY?


**** Run Keys ****

RUN: [Generic Host Process2 System Backup] scvhost2.exe
RUN: [Explorer] explore.exe
RUN: [Generic Host Process9 System Backup] scvhost9.exe
RUN: [Application Layer Gateway Service] C:\WINDOWS\System32\algs.exe
RUN: [Mirsft sdce] servs.exe
RUN: [Windows Svshost Service Update 32] svcsshost32.exe
RUN: [Cmaudio] RunDll32 cmicnfg.cpl,CMICtrlWnd
RUN: [avast!] C:\PROGRA~1\ALWILS~1\Avast4\ashDisp.exe
RUN: [NhwdiZwWwNqN] C:\WINDOWS\System32\duquoxjv.exe
RUN: [Windows DLL Loader] C:\WINDOWS\System32\bvlyuov.exe
RUN: [DAEMON Tools-1033] "C:\Program Files\D-Tools\daemon.exe" -lang 1045
RUN: [KernelFaultCheck] %systemroot%\system32\dumprep 0 -k
RUN: [ATIPTA] C:\Program Files\ATI Technologies\ATI Control Panel\atiptaxx.exe
RUN: [SunJavaUpdateSched] C:\Program Files\Java\jre1.5.0_05\bin\jusched.exe
RUN: [MS-patch333] winservices.exe
RUN: [windowndater] lsasss.exe
RUN: [gxpcqaaa] C:\WINDOWS\System32\gxpcqaaa.exe
RUN: [Winupdate] winsec.exe
RUN: [WindowsUpdatewinsec] winsec.exe
RUN: [WindowsUpdatelsasss] lsasss.exe
RUN: [NeroFilterCheck] C:\WINDOWS\System32\NeroCheck.exe
RUN: [WindowsUpdatesvchostss] svchostss.exe
RUN: [Services] C:\winapi64.exe
RUN: [NWEReboot]
RUN: [CTFMON.EXE] C:\WINDOWS\System32\ctfmon.exe
RUN: [MSMSGS] "C:\Program Files\Messenger\msmsgs.exe" /background
RUN: [Generic Host Process9 System Backup] scvhost9.exe
RUN: [Generic Host Process2 System Backup] scvhost2.exe
RUN: [Windows Svshost Service Update 32] svcsshost32.exe
RUN: [Gadu-Gadu] "C:\Program Files\Gadu-Gadu\gg.exe" /tray
RUN: [ITD7] "C:\Program Files\Steganos Internet Trace Destructor 7\ITD7.exe" -boot
RUN: [gxpcqaaa] C:\WINDOWS\System32\gxpcqaaa.exe
RUN: [zzrz] C:\Program Files\Common Files\zzrz\zzrzm.exe
RUN: [BgMonitor_{79662E04-7C6C-4d9f-84C7-88D8A56B10AA}] "C:\Program Files\Common Files\Ahead\lib\NMBgMonitor.exe"


**** Browser Helper Objects ****

BHO: [AcroIEHlprObj Class] C:\Program Files\Adobe\Acrobat 6.0 CE\Reader\ActiveX\AcroIEHelper.dll
BHO: [] C:\PROGRA~1\SPYBOT~1\SDHelper.dll


**** IE Toolbars ****

TOOLBAR: [&Radio] C:\WINDOWS\System32\msdxm.ocx


**** IE Extensions ****

IEExt: []
IEExt: [@shdoclc.dll,-866]


**** Hosts File Entries ****

HOSTS: 127.0.0.1 localhost
HOSTS: 127.0.0.1 localhost


**** IE Settings ****

Default Page: http://www.microsoft.com/isapi/redir.dll?prd=ie&pver=6&ar=msnhome
Default Search: http://www.microsoft.com/isapi/redir.dll?prd=ie&ar=iesearch
Local Page: C:\WINDOWS\system32\blank.htm
Search Bar: http://searchbar.findthewebsiteyouneed.com
Search Page: http://searchbar.findthewebsiteyouneed.com


**** IE Context Menu (Right click) ****



**** Layered Service Providers ****

LSP: MSAFD Tcpip [TCP/IP]
LSP: MSAFD Tcpip [UDP/IP]
LSP: RSVP UDP Service Provider
LSP: RSVP TCP Service Provider
LSP: MSAFD NetBIOS [\Device\NetBT_Tcpip_{1AF48FAF-7378-4E78-BDEA-5A68CB6FE780}] SEQPACKET 0
LSP: MSAFD NetBIOS [\Device\NetBT_Tcpip_{1AF48FAF-7378-4E78-BDEA-5A68CB6FE780}] DATAGRAM 0
LSP: MSAFD NetBIOS [\Device\NetBT_Tcpip_{DC5809D8-1925-4F86-8CD6-EE878B8148CD}] SEQPACKET 1
LSP: MSAFD NetBIOS [\Device\NetBT_Tcpip_{DC5809D8-1925-4F86-8CD6-EE878B8148CD}] DATAGRAM 1
LSP: MSAFD NetBIOS [\Device\NetBT_Tcpip_{3DF196C1-4E10-4F1C-A6A4-AB28FDB4C98E}] SEQPACKET 2
LSP: MSAFD NetBIOS [\Device\NetBT_Tcpip_{3DF196C1-4E10-4F1C-A6A4-AB28FDB4C98E}] DATAGRAM 2


**** Blocked Control Panel Items ****

BLOCKED: [ncpa.cpl] No
BLOCKED: [odbccp32.cpl] No


**** Downloaded Program Files ****

{0EB0E74A-2A76-4AB3-A7FB-9BD8C29F7F75} [http://kaspersky.pl/resources/virusscanner/kavwebscan_unicode.cab]
{2BC66F54-93A8-11D3-BEB6-00105AA9B6AE} [http://security.symantec.com/sscv6/SharedContent/vc/bin/AvSniff.cab] C:\WINDOWS\Downloaded Program Files\ecmldr32.dll C:\WINDOWS\Downloaded Program Files\navapi.vxd C:\WINDOWS\Downloaded Program Files\navapi32.dll C:\WINDOWS\Downloaded Program Files\avsniffdlgs.dll C:\WINDOWS\Downloaded Program Files\avsniff.dll
{3D8700FB-86A4-4CB4-B738-6F0FC016AC7D} [http://arcaonline.arcabit.com/ArcaOnline.cab]
{644E432F-49D3-41A1-8DD5-E099162EEEC5} [http://security.symantec.com/sscv6/SharedContent/common/bin/cabsa.cab]
{8AD9C840-044E-11D1-B3E9-00805F499D93} [http://java.sun.com/update/1.5.0/jinstall-1_5_0_05-windows-i586.cab]
{92ECE6FA-AC2E-4042-BFAE-0C8608E52A43} [https://www.bph.pl/pi/components/SignActivX.cab]
{9A9307A0-7DA4-4DAF-B042-5009F29E09E1} [http://acs.pandasoftware.com/activescan/as5free/asinst.cab]
{CAFEEFAC-0015-0000-0005-ABCDEFFEDCBA} [http://java.sun.com/update/1.5.0/jinstall-1_5_0_05-windows-i586.cab]
{D27CDB6E-AE6D-11CF-96B8-444553540000} [http://download.macromedia.com/pub/shockwave/cabs/flash/swflash.cab]


**** Windows Services ****

[Alerter] %SystemRoot%\system32\svchost.exe -k LocalService
[ALG] %SystemRoot%\System32\alg.exe
[AppMgmt] %SystemRoot%\system32\svchost.exe -k netsvcs
[aswUpdSv] "C:\Program Files\Alwil Software\Avast4\aswUpdSv.exe"
[Ati HotKey Poller] %SystemRoot%\System32\Ati2evxx.exe
[ATI Smart] C:\WINDOWS\system32\ati2sgag.exe
[AudioSrv] %SystemRoot%\System32\svchost.exe -k netsvcs
[avast! Antivirus] "C:\Program Files\Alwil Software\Avast4\ashServ.exe"
[avast! Mail Scanner] "C:\Program Files\Alwil Software\Avast4\ashMaiSv.exe" /service
[avast! Web Scanner] "C:\Program Files\Alwil Software\Avast4\ashWebSv.exe" /service
[BITS] %SystemRoot%\System32\svchost.exe -k netsvcs
[Browser] %SystemRoot%\system32\svchost.exe -k netsvcs
[cisvc] %SystemRoot%\system32\cisvc.exe
[ClipSrv] %SystemRoot%\system32\clipsrv.exe
[COMSysApp] C:\WINDOWS\System32\dllhost.exe /Processid:{02D4B3F1-FD88-11D1-960D-00805FC79235}
[CryptSvc] %SystemRoot%\system32\svchost.exe -k netsvcs
[DcomHelper] "C:\WINDOWS\dcmhelp.exe"
[DcomLaunch] %SystemRoot%\system32\svchost -k DcomLaunch
[Dhcp] %SystemRoot%\system32\svchost.exe -k netsvcs
[DLHOST] "C:\WINDOWS\dlhost.exe"
[dmadmin] %SystemRoot%\System32\dmadmin.exe /com
[dmserver] %SystemRoot%\System32\svchost.exe -k netsvcs
[Dnscache] %SystemRoot%\system32\svchost.exe -k NetworkService
[ERSvc] %SystemRoot%\System32\svchost.exe -k netsvcs
[Eventlog] %SystemRoot%\system32\services.exe
[EventSystem] C:\WINDOWS\System32\svchost.exe -k netsvcs
[FastUserSwitchingCompatibility] %SystemRoot%\System32\svchost.exe -k netsvcs
[helpsvc] %SystemRoot%\System32\svchost.exe -k netsvcs
[HidServ] %SystemRoot%\System32\svchost.exe -k netsvcs
[HTTPFilter] %SystemRoot%\System32\svchost.exe -k HTTPFilter
[ImapiService] C:\WINDOWS\System32\imapi.exe
[lanmanserver] %SystemRoot%\system32\svchost.exe -k netsvcs
[lanmanworkstation] %SystemRoot%\system32\svchost.exe -k netsvcs
[LmHosts] %SystemRoot%\system32\svchost.exe -k LocalService
[Messenger] %SystemRoot%\system32\svchost.exe -k netsvcs
[mnmsrvc] C:\WINDOWS\System32\mnmsrvc.exe
[MSDTC] C:\WINDOWS\System32\msdtc.exe
[MSIServer] C:\WINDOWS\System32\msiexec.exe /V
[NetDDE] %SystemRoot%\system32\netdde.exe
[NetDDEdsdm] %SystemRoot%\system32\netdde.exe
[Netlogon] %SystemRoot%\system32\lsass.exe
[Netman] %SystemRoot%\System32\svchost.exe -k netsvcs
[Nla] %SystemRoot%\system32\svchost.exe -k netsvcs
[NtLmSsp] %SystemRoot%\system32\lsass.exe
[NtmsSvc] %SystemRoot%\system32\svchost.exe -k netsvcs
[PlugPlay] %SystemRoot%\system32\services.exe
[PolicyAgent] %SystemRoot%\system32\lsass.exe
[ProtectedStorage] %SystemRoot%\system32\lsass.exe
[RasAuto] %SystemRoot%\system32\svchost.exe -k netsvcs
[RasMan] %SystemRoot%\system32\svchost.exe -k netsvcs
[RDSessMgr] C:\WINDOWS\system32\sessmgr.exe
[RemoteAccess] %SystemRoot%\system32\svchost.exe -k netsvcs
[RemoteRegistry] %SystemRoot%\system32\svchost.exe -k LocalService
[RpcLocator] %SystemRoot%\system32\locator.exe
[RpcSs] %SystemRoot%\system32\svchost -k rpcss
[RSVP] %SystemRoot%\system32\rsvp.exe
[SamSs] %SystemRoot%\system32\lsass.exe
[SCardDrv] %SystemRoot%\System32\SCardSvr.exe
[SCardSvr] %SystemRoot%\System32\SCardSvr.exe
[Schedule] %SystemRoot%\System32\svchost.exe -k netsvcs
[seclogon] %SystemRoot%\System32\svchost.exe -k netsvcs
[SENS] %SystemRoot%\system32\svchost.exe -k netsvcs
[ServiceHost] "C:\WINDOWS\shost.exe"
[SharedAccess] %SystemRoot%\system32\svchost.exe -k netsvcs
[ShellHWDetection] %SystemRoot%\System32\svchost.exe -k netsvcs
[Spooler] %SystemRoot%\system32\spoolsv.exe
[srservice] %SystemRoot%\system32\svchost.exe -k netsvcs
[SSDPSRV] %SystemRoot%\System32\svchost.exe -k LocalService
[stisvc] %SystemRoot%\system32\svchost.exe -k imgsvc
[SwPrv] C:\WINDOWS\System32\dllhost.exe /Processid:{52665713-B912-4F2A-BABB-2DDF7AFD44BD}
[SysmonLog] %SystemRoot%\system32\smlogsvc.exe
[TapiSrv] %SystemRoot%\System32\svchost.exe -k netsvcs
[TermService] %SystemRoot%\System32\svchost.exe -k netsvcs
[Themes] %SystemRoot%\System32\svchost.exe -k netsvcs
[TlntSvr] C:\WINDOWS\System32\tlntsvr.exe
[TrkWks] %SystemRoot%\system32\svchost.exe -k netsvcs
[uploadmgr] %SystemRoot%\System32\svchost.exe -k netsvcs
[upnphost] %SystemRoot%\System32\svchost.exe -k LocalService
[UPS] %SystemRoot%\System32\ups.exe
[VSS] %SystemRoot%\System32\vssvc.exe
[W32Time] %SystemRoot%\System32\svchost.exe -k netsvcs
[WebClient] %SystemRoot%\system32\svchost.exe -k LocalService
[winmgmt] %systemroot%\system32\svchost.exe -k netsvcs
[WmdmPmSN] %SystemRoot%\System32\svchost.exe -k netsvcs
[WmdmPmSp] %SystemRoot%\System32\svchost.exe -k netsvcs
[Wmi] %SystemRoot%\System32\svchost.exe -k netsvcs
[WmiApSrv] C:\WINDOWS\System32\wbem\wmiapsrv.exe
[wscsvc] %SystemRoot%\System32\svchost.exe -k netsvcs
[wuauserv] %systemroot%\system32\svchost.exe -k netsvcs
[WZCSVC] %SystemRoot%\System32\svchost.exe -k netsvcs
[xmlprov] %SystemRoot%\System32\svchost.exe -k netsvcs


**** Custom IE Search Items ****

SEARCH: [SearchAssistant] http://ie.search.msn.com/{SUB_RFC1766}/srchasst/srchasst.htm
SEARCH: [CustomizeSearch] http://ie.search.msn.com/{SUB_RFC1766}/srchasst/srchcust.htm


**** Complete IE Options ****

IEOPT: [NoUpdateCheck]
IEOPT: [NoJITSetup]
IEOPT: [Disable Script Debugger] yes
IEOPT: [Show_ChannelBand] No
IEOPT: [Anchor Underline] yes
IEOPT: [Cache_Update_Frequency] Once_Per_Session
IEOPT: [Display Inline Images] yes
IEOPT: [Do404Search]
IEOPT: [Local Page] C:\WINDOWS\system32\blank.htm
IEOPT: [Save_Session_History_On_Exit] no
IEOPT: [Show_FullURL] no
IEOPT: [Show_StatusBar] yes
IEOPT: [Show_ToolBar] yes
IEOPT: [Show_URLinStatusBar] yes
IEOPT: [Show_URLToolBar] yes
IEOPT: [Start Page] about:blank
IEOPT: [Use_DlgBox_Colors] yes
IEOPT: [Search Page] http://searchbar.findthewebsiteyouneed.com
IEOPT: [Check_Associations] No
IEOPT: [FullScreen] no
IEOPT: [Window_Placement] ,
IEOPT: [Use FormSuggest] yes
IEOPT: [Error Dlg Displayed On Every Error] no
IEOPT: [Error Dlg Details Pane Open] no
IEOPT: [AddToFavoritesExpanded]
IEOPT: [NotifyDownloadComplete] no
IEOPT: [HistoryViewType]
IEOPT: [Use_Combobox_DlgBox_Colors_Complete] 3
IEOPT: [Use_Combobox_DlgBox_Colors_Failed] 11
IEOPT: [Use_Combobox_DlgBox_Colors_Error] 26
IEOPT: [HistoryTopNSitesView]
IEOPT: [ShowedCheckBrowser] Yes
IEOPT: [Search Bar] http://searchbar.findthewebsiteyouneed.com
IEOPT: [Default_Search_URL] http://searchbar.findthewebsiteyouneed.com
IEOPT: [FormSuggest Passwords] yes
IEOPT: [FormSuggest PW Ask] yes
IEOPT: [Default_Page_URL] http://www.microsoft.com/isapi/redir.dll?prd=ie&pver=6&ar=msnhome
IEOPT: [Default_Search_URL] http://www.microsoft.com/isapi/redir.dll?prd=ie&ar=iesearch
IEOPT: [Search Page]
IEOPT: [Enable_Disk_Cache] yes
IEOPT: [Cache_Percent_of_Disk]
IEOPT: [Delete_Temp_Files_On_Exit] yes
IEOPT: [Local Page] %SystemRoot%\system32\blank.htm
IEOPT: [Anchor_Visitation_Horizon]
IEOPT: [Use_Async_DNS] yes
IEOPT: [Placeholder_Width]
IEOPT: [Placeholder_Height]
IEOPT: [Start Page] http://www.microsoft.com/isapi/redir.dll?prd={SUB_PRD}&clcid={SUB_CLSID}&pver={SUB_PVER}&ar=home
IEOPT: [CompanyName] Microsoft Corporation
IEOPT: [Custom_Key] MICROSO
IEOPT: [Wizard_Version] 6.0.2600.0000
IEOPT: [FullScreen] no
[code][/code]
Pozdrawiam wszystkich użytkowników tego serwisu...
oskar33
~user
 
Posty: 34
Dołączenie: 24 Cze 2005, 20:01
Miejscowość: Bielsko Biała



Postprzez stary* 12 Gru 2005, 18:21

Przeskanuj moimi programami, a te wiry co skaner pominął wywal w KillBoxi-e...
poZdrO:D:D:D:D
Awatar użytkownika
stary*
~user
 
Posty: 2181
Dołączenie: 15 Kwi 2005, 12:40
Miejscowość: Ruda Śląska
Pochwały: 145




Powróć do Bezpieczeństwo

Kto jest na forum

Użytkownicy przeglądający to forum: Brak zarejestrowanych użytkowników oraz 2 gości