jest to infekcja z pendriva, podłącz więc wszystkie urządzenia typu pen, ( to co podłączasz do kompa)
Uruchom OTL i w sekcji
własne opcje skanowania / skrypt wklej:
:OTL
O4 - HKU\S-1-5-21-1417001333-1993962763-1343024091-1004..\Run: [api32] C:\Documents and Settings\Hubi\Ustawienia lokalne\Temp\apiqq.exe ()
O4 - HKU\S-1-5-21-1417001333-1993962763-1343024091-1004..\Run: [cdoosoft] C:\Documents and Settings\Hubi\Ustawienia lokalne\Temp\herss.exe ()
O4 - HKU\S-1-5-21-1417001333-1993962763-1343024091-1004..\Run: [dso32] C:\Documents and Settings\Hubi\Ustawienia lokalne\Temp\dsoqq.exe ()
O4 - HKU\S-1-5-21-1417001333-1993962763-1343024091-1004..\Run: [nod32] C:\Documents and Settings\Hubi\Ustawienia lokalne\Temp\nodqq.exe ()
O32 - AutoRun File - [2010-11-06 23:47:17 | 000,000,063 | RHS- | M] () - C:\autorun.inf -- [ NTFS ]
O32 - AutoRun File - [2010-11-06 23:47:17 | 000,000,063 | RHS- | M] () - D:\autorun.inf -- [ NTFS ]
O32 - AutoRun File - [2010-11-06 23:47:17 | 000,000,063 | RHS- | M] () - E:\autorun.inf -- [ NTFS ]
O33 - MountPoints2\{6f0c0210-d1f2-11de-8adf-00e04caeb388}\Shell\AutoRun\command - "" = H:\wyskq6lt.exe -- File not found
O33 - MountPoints2\{6f0c0210-d1f2-11de-8adf-00e04caeb388}\Shell\open\Command - "" = H:\wyskq6lt.exe -- File not found
O33 - MountPoints2\{73eddec0-a794-11df-8ed7-00e04caeb388}\Shell\AutoRun\command - "" = H:\wyskq6lt.exe -- File not found
O33 - MountPoints2\{73eddec0-a794-11df-8ed7-00e04caeb388}\Shell\open\Command - "" = H:\wyskq6lt.exe -- File not found
O33 - MountPoints2\{897fc910-c95d-11de-8abb-4d6564696130}\Shell\AutoRun\command - "" = H:\wyskq6lt.exe -- File not found
O33 - MountPoints2\{897fc910-c95d-11de-8abb-4d6564696130}\Shell\open\Command - "" = H:\wyskq6lt.exe -- File not found
O33 - MountPoints2\{897fc911-c95d-11de-8abb-4d6564696130}\Shell\AutoRun\command - "" = I:\wyskq6lt.exe -- File not found
O33 - MountPoints2\{897fc911-c95d-11de-8abb-4d6564696130}\Shell\open\Command - "" = I:\wyskq6lt.exe -- File not found
O33 - MountPoints2\{d5d92f42-c59a-11de-93e8-806d6172696f}\Shell\AutoRun\command - "" = C:\wyskq6lt.exe -- [2010-04-15 10:25:08 | 000,126,976 | RHS- | M] ()
O33 - MountPoints2\{d5d92f42-c59a-11de-93e8-806d6172696f}\Shell\open\Command - "" = C:\wyskq6lt.exe -- [2010-04-15 10:25:08 | 000,126,976 | RHS- | M] ()
O33 - MountPoints2\{d5d92f43-c59a-11de-93e8-806d6172696f}\Shell\AutoRun\command - "" = D:\wyskq6lt.exe -- [2010-04-15 10:25:08 | 000,126,976 | RHS- | M] ()
O33 - MountPoints2\{d5d92f43-c59a-11de-93e8-806d6172696f}\Shell\open\Command - "" = D:\wyskq6lt.exe -- [2010-04-15 10:25:08 | 000,126,976 | RHS- | M] ()
O33 - MountPoints2\{d5d92f44-c59a-11de-93e8-806d6172696f}\Shell\AutoRun\command - "" = E:\wyskq6lt.exe -- [2010-04-15 10:25:08 | 000,126,976 | RHS- | M] ()
O33 - MountPoints2\{d5d92f44-c59a-11de-93e8-806d6172696f}\Shell\open\Command - "" = E:\wyskq6lt.exe -- [2010-04-15 10:25:08 | 000,126,976 | RHS- | M] ()
@Alternate Data Stream - 146 bytes -> C:\Documents and Settings\All Users\Dane aplikacji\TEMP:6900017D
@Alternate Data Stream - 120 bytes -> C:\Documents and Settings\All Users\Dane aplikacji\TEMP:B3D74A13
:Files
C:\Documents and Settings\Hubi\Ustawienia lokalne\Temp\cvasds0.dll
C:\Documents and Settings\Hubi\Ustawienia lokalne\Temp\cvasds1.dll
C:\Qoobox
albkpq3.exe /alldrives
b9v.exe /alldrives
lpl.exe /alldrives
r3q63rok.exe /alldrives
9d6resf.exe /alldrives
jofk1wf.exe /alldrives
o1o.exe /alldrives
wq.exe /alldrives
kyme.exe /alldrives
h3wp9.exe /alldrives
io3yalc.exe /alldrives
autorun.inf /alldrives
:Reg
[-HKEY_CURRENT_USER\software\microsoft\windows\currentversion\explorer\mountpoints2]
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced]
"SuperHidden"=dword:00000001
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced]
"Hidden"=dword:00000001
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced]
"ShowSuperHidden"=dword:00000001
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Folder\Hidden\SHOWALL]
"CheckedValue"=dword:00000001
[-HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Folder\SuperHidden\Policy\DontShowSuperHidden]
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Folder\SuperHidden\Policy\DontShowSuperHidden]
@=""
:Commands
[emptytemp]
[emptyflash]
[clearallrestorepoints]
Kliknij wykonaj skrypt. I potwierdź reset komputera .
Następnie uruchamiasz OTL z opcją skanuj. Pokazujesz nowy log OTL.txt
oraz raport z czyszczenia (zawartość notatnika, która otworzy się po restarcie). oraz Przy podpiętym urządzeniu przenośnym (pendrive itp) , uruchom
USBFIX z opcji Listing i pokaż raport na forum.