
Prosze o pomoc

sprawdz w biosie:
masz wlaczone ACPI, PnP i PM controlled by APM : enabled ?
Ew w managerze urzadzen: menu Widok->Pokaz ukryte urzadzenia, i sprawdz czy jest wyłączone "Obsługa NT APM/Legacy". Włącz. Restart.
ew dodac:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
"PowerdownAfterShutdown" = 1
i jeszcze "obsluga APM" na zakladnce zaawansowane, w opcjach zasilania, palnelu sterownia.
sprawdz w biosie:
masz wlaczone ACPI, PnP i PM controlled by APM : enabled ?
Ew w managerze urzadzen: menu Widok->Pokaz ukryte urzadzenia, i sprawdz czy jest wyłączone "Obsługa NT APM/Legacy". Włącz. Restart.
ew dodac:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
"PowerdownAfterShutdown" = 1
i jeszcze "obsluga APM" na zakladnce zaawansowane, w opcjach zasilania, palnelu sterownia.
W kluczu HKEY_LOCAL_MACHINE/System/ControlSet001/Control podswietlamy Control i szukamy wartosci WaitToKillServiceTimeOut
Jest to czas wyrazony w milisekundach (ms) Domyslna wartosc to 20000 - 20 sekund, zmniejszajac te liczbe skrocimy ten czas.
Wylacz indeksowanie plikow - szybsze wyszukiwanie kosztem wydajnosci. Wybierz Start > Uruchom > services.msc
Z listy wybierz usluge indeksowania, tryb uruchamiania - reczny
Buforowanie: PPM na Moj Komputer > Zarzadzaj/Menadzer urzadzen/Stacje dyskow/[nazwa dysku 2x klik]/Zasady/Wlacz buforowanie zapisu na dysku.
Logi masz czyste?
procesy i daj screena
Logfile of HijackThis v1.99.1
Scan saved at 14:10:26, on 2006-08-01
Platform: Windows XP Dodatek SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)
Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
D:\AntiVir PersonalEdition Classic\sched.exe
D:\AntiVir PersonalEdition Classic\avguard.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\Explorer.EXE
D:\AntiVir PersonalEdition Classic\avgnt.exe
D:\jetico\fwsrv.exe
D:\winpatrol\winpatrol.exe
D:\Spybot - Search & Destroy\TeaTimer.exe
C:\Program Files\SAGEM\SAGEM F@st 800-840\dslmon.exe
D:\trendmicro\Tmas.exe
D:\Tlen.pl\tlen.exe
D:\FIREFOX\FIREFOX.EXE
C:\WINDOWS\System32\svchost.exe
C:\Documents and Settings\Piotrek\Pulpit\skróty puliptu\hijackthis.com
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.google.pl/
R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName = Łącza
O2 - BHO: (no name) - {53707962-6F74-2D53-2644-206D7942484F} - D:\SPYBOT~1\SDHelper.dll
O2 - BHO: (no name) - {FFFFFEF0-5B30-21D4-945D-000000000000} - D:\PROGRA~1\Star Downloader\SDIEInt.dll
O4 - HKLM\..\Run: [autoclk] autoclk.exe
O4 - HKLM\..\Run: [adiras] adiras.exe
O4 - HKLM\..\Run: [avgnt] "D:\AntiVir PersonalEdition Classic\avgnt.exe" /min
O4 - HKLM\..\Run: [JeticoPFStartup] "D:\jetico\fwsrv.exe"
O4 - HKLM\..\Run: [WinPatrol] D:\winpatrol\winpatrol.exe
O4 - HKCU\..\Run: [SpybotSD TeaTimer] D:\Spybot - Search & Destroy\TeaTimer.exe
O4 - Global Startup: DSLMON.lnk = C:\Program Files\SAGEM\SAGEM F@st 800-840\dslmon.exe
O4 - Global Startup: Trend Micro Anti-Spyware.lnk = D:\trendmicro\Tmas.exe
O8 - Extra context menu item: Download with Star Downloader - D:\Program Files\Star Downloader\sdie.htm
O17 - HKLM\System\CCS\Services\Tcpip\..\{CB4B2971-BEA5-4016-8474-B79FD43AA61E}: NameServer = 194.204.152.34 217.98.63.164
O23 - Service: AntiVir PersonalEdition Classic Scheduler (AntiVirScheduler) - Avira GmbH - D:\AntiVir PersonalEdition Classic\sched.exe
O23 - Service: AntiVir PersonalEdition Classic Guard (AntiVirService) - AVIRA GmbH - D:\AntiVir PersonalEdition Classic\avguard.exe
HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer
NoClose - REG_DWORD - 00000001
Nie chce się dodać do rejestru
może on blokuje?
HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer
NoRun - REG_DWORD - 00000001
HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System
NoDevMgrPage - REG_DWORD - 00000001
HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer
NoRun - REG_DWORD - 00000001
HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System
NoDevMgrPage - REG_DWORD - 00000001
masz jakieś twakery,albo miałeś?
"Silent Runners.vbs", revision 46, http://www.silentrunners.org/
Operating System: Windows XP SP2
Output limited to non-default values, except where indicated by "{++}"
Startup items buried in registry:
---------------------------------
HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ {++}
"SpybotSD TeaTimer" = "D:\Spybot - Search & Destroy\TeaTimer.exe" ["Safer Networking Limited"]
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ {++}
"autoclk" = "autoclk.exe" [file not found]
"adiras" = "adiras.exe" [file not found]
"avgnt" = ""D:\AntiVir PersonalEdition Classic\avgnt.exe" /min" ["Avira GmbH"]
"JeticoPFStartup" = ""D:\jetico\fwsrv.exe"" ["Jetico, Inc."]
"WinPatrol" = "D:\winpatrol\winpatrol.exe" ["BillP Studios"]
HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\
{53707962-6F74-2D53-2644-206D7942484F}\(Default) = (no title provided)
-> {HKLM...CLSID} = (no title provided)
\InProcServer32\(Default) = "D:\SPYBOT~1\SDHelper.dll" ["Safer Networking Limited"]
{FFFFFEF0-5B30-21D4-945D-000000000000}\(Default) = (no title provided)
-> {HKLM...CLSID} = (no title provided)
\InProcServer32\(Default) = "D:\PROGRA~1\Star Downloader\SDIEInt.dll" [null data]
HKLM\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Approved\
"{42071714-76d4-11d1-8b24-00a0c9068ff3}" = "Rozszerzenie CPL kadrowania wyświetlania"
-> {HKLM...CLSID} = "Rozszerzenie CPL kadrowania wyświetlania"
\InProcServer32\(Default) = "deskpan.dll" [file not found]
"{88895560-9AA2-1069-930E-00AA0030EBC8}" = "Rozszerzenie ikony HyperTerminalu"
-> {HKLM...CLSID} = "HyperTerminal Icon Ext"
\InProcServer32\(Default) = "C:\WINDOWS\System32\hticons.dll" ["Hilgraeve, Inc."]
"{45AC2688-0253-4ED8-97DE-B5370FA7D48A}" = "Shell Extension for Malware scanning"
-> {HKLM...CLSID} = "Shell Extension for Malware scanning"
\InProcServer32\(Default) = "D:\AntiVir PersonalEdition Classic\shlext.dll" ["H+BEDV Datentechnik GmbH"]
"{B41DB860-8EE4-11D2-9906-E49FADC173CA}" = "WinRAR shell extension"
-> {HKLM...CLSID} = "WinRAR"
\InProcServer32\(Default) = "D:\winrar\rarext.dll" [null data]
"{03A80B1D-5C6A-42c2-9DFB-81B6005D8023}" = "Trend Micro Anti-Spyware Shell Extension"
-> {HKLM...CLSID} = "Trend Micro Anti-Spyware Shell Extension"
\InProcServer32\(Default) = "D:\trendmicro\sshook.dll" ["Trend Micro Incorporated"]
HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\ShellExecuteHooks\
INFECTION WARNING! "{03A80B1D-5C6A-42c2-9DFB-81B6005D8023}" = "Trend Micro Anti-Spyware Shell Extension"
-> {HKLM...CLSID} = "Trend Micro Anti-Spyware Shell Extension"
\InProcServer32\(Default) = "D:\trendmicro\sshook.dll" ["Trend Micro Incorporated"]
HKLM\System\CurrentControlSet\Control\Session Manager\
INFECTION WARNING! "BootExecute" = "autocheck autochk *" [file not found], [MS], [file not found]
HKLM\Software\Classes\*\shellex\ContextMenuHandlers\
Shell Extension for Malware scanning\(Default) = "{45AC2688-0253-4ED8-97DE-B5370FA7D48A}"
-> {HKLM...CLSID} = "Shell Extension for Malware scanning"
\InProcServer32\(Default) = "D:\AntiVir PersonalEdition Classic\shlext.dll" ["H+BEDV Datentechnik GmbH"]
WinRAR\(Default) = "{B41DB860-8EE4-11D2-9906-E49FADC173CA}"
-> {HKLM...CLSID} = "WinRAR"
\InProcServer32\(Default) = "D:\winrar\rarext.dll" [null data]
HKLM\Software\Classes\Directory\shellex\ContextMenuHandlers\
WinRAR\(Default) = "{B41DB860-8EE4-11D2-9906-E49FADC173CA}"
-> {HKLM...CLSID} = "WinRAR"
\InProcServer32\(Default) = "D:\winrar\rarext.dll" [null data]
HKLM\Software\Classes\Folder\shellex\ContextMenuHandlers\
Shell Extension for Malware scanning\(Default) = "{45AC2688-0253-4ED8-97DE-B5370FA7D48A}"
-> {HKLM...CLSID} = "Shell Extension for Malware scanning"
\InProcServer32\(Default) = "D:\AntiVir PersonalEdition Classic\shlext.dll" ["H+BEDV Datentechnik GmbH"]
WinRAR\(Default) = "{B41DB860-8EE4-11D2-9906-E49FADC173CA}"
-> {HKLM...CLSID} = "WinRAR"
\InProcServer32\(Default) = "D:\winrar\rarext.dll" [null data]
Active Desktop and Wallpaper:
-----------------------------
Active Desktop is disabled at this entry:
HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\ShellState
HKCU\Control Panel\Desktop\
"Wallpaper" = "C:\Documents and Settings\Piotrek\Ustawienia lokalne\Dane aplikacji\Microsoft\Wallpaper1.bmp"
Enabled Screen Saver:
---------------------
HKCU\Control Panel\Desktop\
"SCRNSAVE.EXE" = "C:\WINDOWS\system32\logon.scr" [MS]
Startup items in "Piotrek" & "All Users" startup folders:
---------------------------------------------------------
C:\Documents and Settings\All Users\Menu Start\Programy\Autostart
"DSLMON" -> shortcut to: "C:\Program Files\SAGEM\SAGEM F@st 800-840\dslmon.exe /W" [empty string]
"Trend Micro Anti-Spyware" -> shortcut to: "D:\trendmicro\Tmas.exe -autostart" ["Trend Micro Incorporated"]
Winsock2 Service Provider DLLs:
-------------------------------
Namespace Service Providers
HKLM\System\CurrentControlSet\Services\Winsock2\Parameters\NameSpace_Catalog5\Catalog_Entries\ {++}
000000000001\LibraryPath = "%SystemRoot%\System32\mswsock.dll" [MS]
000000000002\LibraryPath = "%SystemRoot%\System32\winrnr.dll" [MS]
000000000003\LibraryPath = "%SystemRoot%\System32\mswsock.dll" [MS]
Transport Service Providers
HKLM\System\CurrentControlSet\Services\Winsock2\Parameters\Protocol_Catalog9\Catalog_Entries\ {++}
0000000000##\PackedCatalogItem (contains) DLL [Company Name], (at) ## range:
%SystemRoot%\system32\mswsock.dll [MS], 01 - 03, 06 - 13
%SystemRoot%\system32\rsvpsp.dll [MS], 04 - 05
Running Services (Display Name, Service Name, Path {Service DLL}):
------------------------------------------------------------------
AntiVir PersonalEdition Classic Guard, AntiVirService, "D:\AntiVir PersonalEdition Classic\avguard.exe" ["AVIRA GmbH"]
AntiVir PersonalEdition Classic Scheduler, AntiVirScheduler, "D:\AntiVir PersonalEdition Classic\sched.exe" ["Avira GmbH"]
----------
+ This report excludes default entries except where indicated.
+ To see *everywhere* the script checks and *everything* it finds,
launch it from a command prompt or a shortcut with the -all parameter.
+ The search for DESKTOP.INI DLL launch points on all local fixed drives
took 40 seconds.
+ The search for all Registry CLSIDs containing dormant Explorer Bars
took 13 seconds.
---------- (total run time: 80 seconds)
Użytkownicy przeglądający to forum: Brak zarejestrowanych użytkowników oraz 4 gości