Созданные ответы форума
-
АвторСообщения
-
И все-таки удалось 😀
Смогла зайти на сайт http://www.comss.ru/list.php?c=utils , загрузить Каспера 11, просканировала и убила 18 троянов, по рекомендации разработчиков просканила еще раз, убилось еще 15 😮 , после чего по старому проверенному методу зашла в реестр и удалила, наконец, все лишнее. Перезагрузилась и они больше не появились!!!! Проверила на сайтах Доктора и Каспера — усё ОК.
Если будут какие-нибудь рекомендации — буду рада выполнить 😉
А вообще ваш сайт — в закладках, желаю удачи и спасибо оргомное за вашу помощь!!!Добрый день!
Проблема так и не решена. Есть ли еще какие-нибудь идеи, как убить эту заразу?
Попыталась зайти на Др.Вэб и Касперский — не пущает 👿
Valeri, вот что у меня получилось:
ComboFix 10-08-05.07 — Lara 06.08.2010 20:12:20.1.2 — x86
Microsoft Windows XP Professional 5.1.2600.3.1251.7.1049.18.2029.1426 [GMT 4:00]
Running from: h:скачалаComboFixComboFix.exe
FW: Doctor Web Firewall *disabled* {3454C8F1-ECBC-4181-A7F4-04632FBA762B}WARNING -THIS MACHINE DOES NOT HAVE THE RECOVERY CONSOLE INSTALLED !!
.((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.h:documents and settingsAll UsersРабочий столИгpай весело.lnk
h:documents and settingsAll UsersApplication DataMicrosoftNetworkDownloaderqmgr0.dat
h:documents and settingsAll UsersApplication DataMicrosoftNetworkDownloaderqmgr1.dat
h:documents and settingsLaraApplication DataDesktopicon
h:documents and settingsLaraApplication DataDesktopiconeBay.ico
h:documents and settingsLaraApplication DataDesktopiconuninst.exe
h:program filesAskSearchbinDeFAultsearch.dll
h:program filesCommon Fileskeylog.txt
h:windowssystem32gfbaksm.dat
h:windowssystem32svchost.t__
h:windowssystem32winlogon.bak
BITS: Possible infected sites
hxxp://soft.export.yandex.ru
.
((((((((((((((((((((((((((((((((((((((( Drivers/Services )))))))))))))))))))))))))))))))))))))))))))))))))
.
Legacy_FCI
Legacy_GOOGLE_ONLINE_SERVICES((((((((((((((((((((((((( Files Created from 2010-07-06 to 2010-08-06 )))))))))))))))))))))))))))))))
.2010-07-28 06:56 . 2010-07-28 06:56 107520 —-a-w- h:windowssystem32zeszmk.exe
2010-07-16 10:54 . 2010-07-16 10:54 101888 —-a-w- h:windowssystem32znafay.exe.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2010-07-28 20:16 . 2010-03-19 10:26
d
w- h:program filestrend micro
2010-07-15 13:58 . 2008-06-06 12:11
d
w- h:program filesBeholdTV
2010-06-29 19:19 . 2010-06-29 19:19 122880 —-a-w- h:windowssystem32CVY8Fti.exe
2010-06-28 19:35 . 2010-06-28 19:35 119808 —-a-w- h:windowssystem322SurcN3.exe
2010-06-28 11:26 . 2010-06-28 11:26 119808 —-a-w- h:windowssystem32u3UJiWB.exe
2010-06-22 20:45 . 2010-06-22 20:45 116224 —-a-w- h:windowssystem328KQFucS.exe
2010-06-21 19:55 . 2010-06-21 19:55 106496 —-a-w- h:windowssystem32FyDClq2.exe
2010-06-15 15:29 . 2010-06-15 15:29 105472 —-a-w- h:windowssystem32FybJELG.exe
2010-06-08 09:20 . 2010-06-08 09:20 110592 —-a-w- h:windowssystem32KrSUuVD.exe
2010-06-02 08:23 . 2010-06-02 08:23 106496 —-a-w- h:windowssystem32JDNKoA7.exe
2010-06-02 08:22 . 2010-06-02 08:22 37888 —-a-w- h:windowssystem32Z1iaRRY.exe
.((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4[HKEY_LOCAL_MACHINE~Browser Helper Objects{201f27d4-3704-41d6-89c1-aa35e39143ed}]
2008-08-26 06:32 279944 —-a-w- h:program filesAskBarDisbarbinaskBar.dll[HKEY_LOCAL_MACHINESOFTWAREMicrosoftInternet ExplorerToolbar]
«{3041d03e-fd4b-44e0-b742-2d9b88305f98}»= «h:program filesAskBarDisbarbinaskBar.dll» [2008-08-26 279944]
«{91397D20-1446-11D4-8AF4-0040CA1127B6}»= «h:program filesYandexYandexBarIEyndbar.dll» [2009-07-24 5586208][HKEY_CLASSES_ROOTclsid{3041d03e-fd4b-44e0-b742-2d9b88305f98}]
[HKEY_CLASSES_ROOTTypeLib{4b1c1e16-6b34-430e-b074-5928eca4c150}][HKEY_CLASSES_ROOTclsid{91397d20-1446-11d4-8af4-0040ca1127b6}]
[HKEY_CLASSES_ROOTYandex.Toolbar.1]
[HKEY_CLASSES_ROOTTypeLib{91397D13-1446-11D4-8AF4-0040CA1127B6}]
[HKEY_CLASSES_ROOTYandex.Toolbar][HKEY_CURRENT_USERSoftwareMicrosoftInternet ExplorerToolbarWebbrowser]
«{91397D20-1446-11D4-8AF4-0040CA1127B6}»= «h:program filesYandexYandexBarIEyndbar.dll» [2009-07-24 5586208]
«{3041D03E-FD4B-44E0-B742-2D9B88305F98}»= «h:program filesAskBarDisbarbinaskBar.dll» [2008-08-26 279944][HKEY_CLASSES_ROOTclsid{91397d20-1446-11d4-8af4-0040ca1127b6}]
[HKEY_CLASSES_ROOTYandex.Toolbar.1]
[HKEY_CLASSES_ROOTTypeLib{91397D13-1446-11D4-8AF4-0040CA1127B6}]
[HKEY_CLASSES_ROOTYandex.Toolbar][HKEY_CLASSES_ROOTclsid{3041d03e-fd4b-44e0-b742-2d9b88305f98}]
[HKEY_CLASSES_ROOTTypeLib{4b1c1e16-6b34-430e-b074-5928eca4c150}][HKEY_CURRENT_USERSOFTWAREMicrosoftWindowsCurrentVersionRun]
«swg»=»h:program filesGoogleGoogleToolbarNotifierGoogleToolbarNotifier.exe» [2008-07-10 68856]
«DAEMON Tools Lite»=»h:program filesDAEMON Tools Litedaemon.exe» [2008-07-24 490952]
«EA Core»=»h:program filesElectronic ArtsEADMCore.exe» [2008-07-22 2772992][HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionRun]
«WinampAgent»=»h:program filesWinampwinampa.exe» [2008-04-01 36352]
«NeroFilterCheck»=»h:windowssystem32NeroCheck.exe» [2001-07-09 155648]
«RTHDCPL»=»RTHDCPL.EXE» [2007-09-17 16132608]
«NvMediaCenter»=»h:windowssystem32NvMcTray.dll» [2009-11-20 110184]
«NvCplDaemon»=»h:windowssystem32NvCpl.dll» [2009-11-20 12669544][HKEY_USERS.DEFAULTSoftwareMicrosoftWindowsCurrentVersionRun]
«CTFMON.EXE»=»h:windowssystem32CTFMON.EXE» [2008-04-15 15360]h:documents and settingsLaraѓ« ў®Ґ ¬ҐоЏа®Ја ¬¬лЂўв®§ Јаг§Є
Need for SpeedT Undercover — ॣЁбва жЁп.lnk — h:program filesEA GamesNeed for Speed UndercoverSupportEAregister.exe [2008-10-23 4369408]h:documents and settingsAll Usersѓ« ў®Ґ ¬ҐоЏа®Ја ¬¬лЂўв®§ Јаг§Є
InterVideo WinCinema Manager.lnk — h:program filesInterVideoCommonBinWinCinemaMgr.exe [2009-12-5 131072][HKEY_LOCAL_MACHINEsoftwaremicrosoftwindows ntcurrentversionwinlogon]
«Userinit»=»h:windowssystem32userinit.exe,\?globalrootsystemrootsystem32fdqc89l.exe,\?globalrootsystemrootsystem32Z1iaRRY.exe,\?globalrootsystemrootsystem32JDNKoA7.exe,»[HKEY_LOCAL_MACHINEsystemcurrentcontrolsetcontrollsa]
Authentication Packages REG_MULTI_SZ msv1_0 nwprovau[HKEY_LOCAL_MACHINEsoftwaremicrosoftwindowscurrentversionrun-]
«Adobe Reader Speed Launcher»=»h:program filesAdobeReader 8.0ReaderReader_sl.exe»[HKEY_LOCAL_MACHINEsoftwaremicrosoftsecurity center]
«FirewallOverride»=dword:00000001[HKLM~servicessharedaccessparametersfirewallpolicystandardprofileAuthorizedApplicationsList]
«%windir%\system32\sessmgr.exe»=
«%windir%\Network Diagnostic\xpnetdiag.exe»=
«h:\Program Files\ICQ6.5\ICQ.exe»=
«h:\Program Files\Electronic Arts\EADM\Core.exe»=[HKLM~servicessharedaccessparametersfirewallpolicystandardprofileGloballyOpenPortsList]
«59916:TCP»= 59916:TCP
«26628:TCP»= 26628:TCPR3 SAA713x;Behold TV WDM Capture (SAA713x);h:windowssystem32driverssaa713x.sys [06.06.2008 16:14 186512]
S0 sptd;sptd;h:windowssystem32driverssptd.sys [05.12.2008 23:27 717296]
.
Contents of the ‘Scheduled Tasks’ folder2010-08-06 h:windowsTasks1-Click Maintenance.job
— h:program filesTuneUp Utilities 2008OneClickStarter.exe [2008-06-20 05:09]2010-08-06 h:windowsTasksWGASetup.job
— h:windowssystem32KB905474wgasetup.exe [2010-03-25 19:18]
.
.
Supplementary Scan
.
uStart Page = hxxp://www.yandex.ru/?clid=135293
uSearchMigratedDefaultURL = hxxp://www.google.com/search?q={searchTerms}&sourceid=ie7&rls=com.microsoft:en-US&ie=utf8&oe=utf8
uInternet Settings,ProxyServer = 192.168.0.1:8080
uSearchAssistant = hxxp://www.google.com/ie
uSearchURL,(Default) = hxxp://www.google.com/search?q=%s
IE: &Экспорт в Microsoft Excel — h:progra~1MICROS~2OFFICE11EXCEL.EXE/3000
IE: Найти с помощью Рамблера — h:program filesRambler AssistantramblertoolbarU5090.dll/search.htm
IE: Перевести с помощью словарей Рамблера — h:program filesRambler AssistantramblertoolbarU5090.dll/dic.htm
FF — ProfilePath — h:documents and settingsLaraApplication DataMozillaFirefoxProfiles9vf96daw.default
FF — prefs.js: browser.search.selectedEngine — Rambler
FF — prefs.js: browser.startup.homepage — hxxp://www.rambler.ru/ri7
.
— — — — ORPHANS REMOVED — — — —AddRemove-eBay Icon — h:documents and settingsLaraApplication DataDesktopiconuninst.exe
**************************************************************************
catchme 0.3.1398 W2K/XP/Vista — rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2010-08-06 20:17
Windows 5.1.2600 Service Pack 3 NTFSscanning hidden processes …
scanning hidden autostart entries …
scanning hidden files …
scan completed successfully
hidden files: 0**************************************************************************
.
DLLs Loaded Under Running Processes
— — — — — — — > ‘explorer.exe'(2340)
h:windowssystem32WININET.dll
h:windowssystem32WPDShServiceObj.dll
h:windowssystem32PortableDeviceTypes.dll
h:windowssystem32PortableDeviceApi.dll
.
Other Running Processes
.
h:windowssystem32nvsvc32.exe
h:windowsRTHDCPL.EXE
h:windowssystem32RUNDLL32.EXE
h:windowssystem32PnkBstrA.exe
h:windowssystem32wscntfy.exe
h:windowsSystem32rundll32.exe
.
**************************************************************************
.
Completion time: 2010-08-06 20:19:31 — machine was rebooted
ComboFix-quarantined-files.txt 2010-08-06 16:19Pre-Run: 180 200 001 536 байт свободно
Post-Run: 180 905 816 064 байт свободно— — End Of File — — 1F7E9C3E79C85AA4541D6071ED8FCB2B
Valeri, спасибо огромное за оперативный ответ, инструкцию выполнила, вот что получилось
Logfile of random’s system information tool 1.06 (written by random/random)
Run by Lara at 2010-07-29 00:16:54
Microsoft Windows XP Professional Service Pack 3
System drive H: has 172 GB (72%) free of 238 GB
Total RAM: 2029 MB (82% free)Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 0:16:56, on 29.07.2010
Platform: Windows XP SP3 (WinNT 5.01.2600)
MSIE: Internet Explorer v7.00 (7.00.6000.17055)
Boot mode: NormalRunning processes:
H:WINDOWSSystem32smss.exe
H:WINDOWSsystem32winlogon.exe
H:WINDOWSsystem32services.exe
H:WINDOWSsystem32lsass.exe
H:WINDOWSsystem32nvsvc32.exe
H:WINDOWSsystem32svchost.exe
H:WINDOWSSystem32svchost.exe
H:WINDOWSsystem32spoolsv.exe
H:WINDOWSExplorer.EXE
H:Program FilesWinampwinampa.exe
H:WINDOWSRTHDCPL.EXE
H:WINDOWSsystem32RUNDLL32.EXE
H:WINDOWSsystem32ctfmon.exe
H:Program FilesGoogleGoogleToolbarNotifierGoogleToolbarNotifier.exe
H:Program FilesElectronic ArtsEADMCore.exe
H:Program FilesInterVideoCommonBinWinCinemaMgr.exe
H:WINDOWSsystem32PnkBstrA.exe
H:WINDOWSsystem32svchost.exe
H:WINDOWSsystem32wuauclt.exe
H:WINDOWSsystem32wscntfy.exe
H:СкачалаPSIT (сканер)RSIT.exe
H:Program Filestrend microLara.exeR0 — HKCUSoftwareMicrosoftInternet ExplorerMain,Start Page = http://www.yandex.ru/?clid=135293
R1 — HKLMSoftwareMicrosoftInternet ExplorerMain,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
R1 — HKLMSoftwareMicrosoftInternet ExplorerMain,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
R1 — HKLMSoftwareMicrosoftInternet ExplorerMain,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
R0 — HKLMSoftwareMicrosoftInternet ExplorerMain,Start Page = http://go.microsoft.com/fwlink/?LinkId=69157
R0 — HKCUSoftwareMicrosoftInternet ExplorerToolbar,LinksFolderName = Ссылки
R3 — URLSearchHook: DefaultSearchHook Class — {C94E154B-1459-4A47-966B-4B843BEFC7DB} — H:Program FilesAskSearchbinDefaultSearch.dll
F2 — REG:system.ini: UserInit=h:windowssystem32userinit.exe,\?globalrootsystemrootsystem32fdqc89l.exe,\?globalrootsystemrootsystem32Z1iaRRY.exe,\?globalrootsystemrootsystem32JDNKoA7.exe,
O2 — BHO: AskBar BHO — {201f27d4-3704-41d6-89c1-aa35e39143ed} — H:Program FilesAskBarDisbarbinaskBar.dll
O2 — BHO: Google Toolbar Notifier BHO — {AF69DE43-7D58-4638-B6FA-CE66B5AD205D} — H:Program FilesGoogleGoogleToolbarNotifier5.4.4525.1752swg.dll
O3 — Toolbar: Ask Toolbar — {3041d03e-fd4b-44e0-b742-2d9b88305f98} — H:Program FilesAskBarDisbarbinaskBar.dll
O3 — Toolbar: Яндекс.Бар — {91397D20-1446-11D4-8AF4-0040CA1127B6} — H:Program FilesYandexYandexBarIEyndbar.dll
O3 — Toolbar: Rambler-Ассистент — {468CD8A9-7C25-45FA-969E-3D925C689DC4} — H:Program FilesRambler AssistantramblertoolbarU5090.dll
O4 — HKLM..Run: [WinampAgent] «H:Program FilesWinampwinampa.exe»
O4 — HKLM..Run: [NeroFilterCheck] H:WINDOWSsystem32NeroCheck.exe
O4 — HKLM..Run: [RTHDCPL] RTHDCPL.EXE
O4 — HKLM..Run: [Alcmtr] ALCMTR.EXE
O4 — HKLM..Run: [NvMediaCenter] RUNDLL32.EXE H:WINDOWSsystem32NvMcTray.dll,NvTaskbarInit
O4 — HKLM..Run: [NvCplDaemon] RUNDLL32.EXE H:WINDOWSsystem32NvCpl.dll,NvStartup
O4 — HKCU..Run: [CTFMON.EXE] H:WINDOWSsystem32ctfmon.exe
O4 — HKCU..Run: [swg] «H:Program FilesGoogleGoogleToolbarNotifierGoogleToolbarNotifier.exe»
O4 — HKCU..Run: [DAEMON Tools Lite] «H:Program FilesDAEMON Tools Litedaemon.exe» -autorun
O4 — HKCU..Run: [EA Core] H:Program FilesElectronic ArtsEADMCore.exe -silent
O4 — HKUSS-1-5-19..Run: [CTFMON.EXE] H:WINDOWSsystem32CTFMON.EXE (User ‘LOCAL SERVICE’)
O4 — HKUSS-1-5-20..Run: [CTFMON.EXE] H:WINDOWSsystem32CTFMON.EXE (User ‘NETWORK SERVICE’)
O4 — HKUSS-1-5-18..Run: [CTFMON.EXE] H:WINDOWSsystem32CTFMON.EXE (User ‘SYSTEM’)
O4 — HKUS.DEFAULT..Run: [CTFMON.EXE] H:WINDOWSsystem32CTFMON.EXE (User ‘Default user’)
O4 — Startup: Need for Speed™ Undercover — регистрация.lnk = H:Program FilesEA GamesNeed for Speed UndercoverSupportEAregister.exe
O4 — Global Startup: InterVideo WinCinema Manager.lnk = H:Program FilesInterVideoCommonBinWinCinemaMgr.exe
O8 — Extra context menu item: &Экспорт в Microsoft Excel — res://H:PROGRA~1MICROS~2OFFICE11EXCEL.EXE/3000
O8 — Extra context menu item: Найти с помощью Рамблера — res://H:Program FilesRambler AssistantramblertoolbarU5090.dll/search.htm
O8 — Extra context menu item: Перевести с помощью словарей Рамблера — res://H:Program FilesRambler AssistantramblertoolbarU5090.dll/dic.htm
O9 — Extra button: (no name) — {e2e2dd38-d088-4134-82b7-f2ba38496583} — H:WINDOWSNetwork Diagnosticxpnetdiag.exe
O9 — Extra ‘Tools’ menuitem: @xpsp3res.dll,-20001 — {e2e2dd38-d088-4134-82b7-f2ba38496583} — H:WINDOWSNetwork Diagnosticxpnetdiag.exe
O9 — Extra button: ICQ6 — {E59EB121-F339-4851-A3BA-FE49C35617C2} — H:Program FilesICQ6.5ICQ.exe
O9 — Extra ‘Tools’ menuitem: ICQ6 — {E59EB121-F339-4851-A3BA-FE49C35617C2} — H:Program FilesICQ6.5ICQ.exe
O9 — Extra button: Messenger — {FB5F1910-F110-11d2-BB9E-00C04F795683} — H:Program FilesMessengermsmsgs.exe
O9 — Extra ‘Tools’ menuitem: Windows Messenger — {FB5F1910-F110-11d2-BB9E-00C04F795683} — H:Program FilesMessengermsmsgs.exe
O10 — Unknown file in Winsock LSP: h:windowssystem32nwprovau.dll
O16 — DPF: {CF40ACC5-E1BB-4AFF-AC72-04C2F616BCA7} (get_atlcom Class) — http://www.adobe.com/products/acrobat/nos/gp.cab
O23 — Service: Журнал событий (Eventlog) — Корпорация Майкрософт — H:WINDOWSsystem32services.exe
O23 — Service: Google Updater Service (gusvc) — Google — H:Program FilesGoogleCommonGoogle UpdaterGoogleUpdaterService.exe
O23 — Service: InstallDriver Table Manager (IDriverT) — Macrovision Corporation — H:Program FilesCommon FilesInstallShieldDriver11Intel 32IDriverT.exe
O23 — Service: Служба COM записи компакт-дисков IMAPI (ImapiService) — Корпорация Майкрософт — H:WINDOWSsystem32imapi.exe
O23 — Service: NetMeeting Remote Desktop Sharing (mnmsrvc) — Корпорация Майкрософт — H:WINDOWSsystem32mnmsrvc.exe
O23 — Service: NVIDIA Display Driver Service (NVSvc) — NVIDIA Corporation — H:WINDOWSsystem32nvsvc32.exe
O23 — Service: Plug and Play (PlugPlay) — Корпорация Майкрософт — H:WINDOWSsystem32services.exe
O23 — Service: PnkBstrA — Unknown owner — H:WINDOWSsystem32PnkBstrA.exe
O23 — Service: Диспетчер сеанса справки для удаленного рабочего стола (RDSessMgr) — Корпорация Майкрософт — H:WINDOWSsystem32sessmgr.exe
O23 — Service: Смарт-карты (SCardSvr) — Корпорация Майкрософт — H:WINDOWSSystem32SCardSvr.exe
O23 — Service: Журналы и оповещения производительности (SysmonLog) — Корпорация Майкрософт — H:WINDOWSsystem32smlogsvc.exe
O23 — Service: TuneUp Drive Defrag Service (TuneUp.Defrag) — TuneUp Software GmbH — H:WINDOWSSystem32TuneUpDefragService.exe
O23 — Service: Теневое копирование тома (VSS) — Корпорация Майкрософт — H:WINDOWSSystem32vssvc.exe
O23 — Service: Адаптер производительности WMI (WmiApSrv) — Корпорация Майкрософт — H:WINDOWSsystem32wbemwmiapsrv.exe—
End of file — 6947 bytes======Scheduled tasks folder======
H:WINDOWStasks1-Click Maintenance.job
H:WINDOWStasksWGASetup.job======Registry dump======
[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionExplorerBrowser Helper Objects{201f27d4-3704-41d6-89c1-aa35e39143ed}]
AskBar BHO — H:Program FilesAskBarDisbarbinaskBar.dll [2008-08-26 279944][HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionExplorerBrowser Helper Objects{AF69DE43-7D58-4638-B6FA-CE66B5AD205D}]
Google Toolbar Notifier BHO — H:Program FilesGoogleGoogleToolbarNotifier5.4.4525.1752swg.dll [2010-03-31 764912][HKEY_LOCAL_MACHINESOFTWAREMicrosoftInternet ExplorerToolbar]
{3041d03e-fd4b-44e0-b742-2d9b88305f98} — Ask Toolbar — H:Program FilesAskBarDisbarbinaskBar.dll [2008-08-26 279944]
{91397D20-1446-11D4-8AF4-0040CA1127B6} — Яндекс.Бар — H:Program FilesYandexYandexBarIEyndbar.dll [2009-07-24 5586208]
{468CD8A9-7C25-45FA-969E-3D925C689DC4} — Rambler-Ассистент — H:Program FilesRambler AssistantramblertoolbarU5090.dll [2007-07-30 804336][HKEY_LOCAL_MACHINESoftwareMicrosoftWindowsCurrentVersionRun]
«WinampAgent»=H:Program FilesWinampwinampa.exe [2008-04-01 36352]
«NeroFilterCheck»=H:WINDOWSsystem32NeroCheck.exe [2001-07-09 155648]
«RTHDCPL»=H:WINDOWSRTHDCPL.EXE [2007-09-17 16132608]
«Alcmtr»=H:WINDOWSALCMTR.EXE [2007-09-17 69632]
«NvMediaCenter»=H:WINDOWSsystem32NvMcTray.dll [2009-11-20 110184]
«NvCplDaemon»=H:WINDOWSsystem32NvCpl.dll [2009-11-20 12669544][HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionRun]
«CTFMON.EXE»=H:WINDOWSsystem32ctfmon.exe [2008-04-15 15360]
«swg»=H:Program FilesGoogleGoogleToolbarNotifierGoogleToolbarNotifier.exe [2008-07-10 68856]
«DAEMON Tools Lite»=H:Program FilesDAEMON Tools Litedaemon.exe [2008-07-24 490952]
«EA Core»=H:Program FilesElectronic ArtsEADMCore.exe [2008-07-22 2772992]H:Documents and SettingsAll UsersГлавное менюПрограммыАвтозагрузка
InterVideo WinCinema Manager.lnk — H:Program FilesInterVideoCommonBinWinCinemaMgr.exeH:Documents and SettingsLaraГлавное менюПрограммыАвтозагрузка
Need for Speed™ Undercover — регистрация.lnk — H:Program FilesEA GamesNeed for Speed UndercoverSupportEAregister.exe[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionShellServiceObjectDelayLoad]
WPDShServiceObj — {AAA288BA-9A4C-45B0-95D7-94D524869DB5} — H:WINDOWSsystem32WPDShServiceObj.dll [2006-10-18 133632][HKEY_LOCAL_MACHINESYSTEMCurrentControlSetControlLsa]
«authentication packages»=msv1_0
nwprovau[HKEY_LOCAL_MACHINESoftwareMicrosoftWindowsCurrentVersionPoliciesSystem]
«dontdisplaylastusername»=0
«legalnoticecaption»=
«legalnoticetext»=
«shutdownwithoutlogon»=1
«undockwithoutlogon»=1
«DisableTaskMgr»=0
«NoDispCPL»=0[HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionPoliciesexplorer]
«NoDriveTypeAutoRun»=145[HKEY_LOCAL_MACHINESoftwareMicrosoftWindowsCurrentVersionPoliciesexplorer]
«HonorAutoRunSetting»=[HKEY_LOCAL_MACHINEsystemcurrentcontrolsetservicessharedaccessparametersfirewallpolicystandardprofileauthorizedapplicationslist]
«%windir%system32sessmgr.exe»=»%windir%system32sessmgr.exe:*:enabled:@xpsp2res.dll,-22019»
«H:Program FilesICQ6ICQ.exe»=»H:Program FilesICQ6ICQ.exe:*:Enabled:ICQ6»
«H:WINDOWSsystem32rundll32.exe»=»H:WINDOWSsystem32rundll32.exe:*:Enabled:rundll32»
«??H:WINDOWSsystem32winlogon.exe»=»??H:WINDOWSsystem32winlogon.exe:*:Enabled:rundll32″
«%windir%Network Diagnosticxpnetdiag.exe»=»%windir%Network Diagnosticxpnetdiag.exe:*:Enabled:@xpsp3res.dll,-20000»
«H:Program FilesICQ6.5ICQ.exe»=»H:Program FilesICQ6.5ICQ.exe:*:Enabled:ICQ6»[HKEY_LOCAL_MACHINEsystemcurrentcontrolsetservicessharedaccessparametersfirewallpolicydomainprofileauthorizedapplicationslist]
«%windir%system32sessmgr.exe»=»%windir%system32sessmgr.exe:*:enabled:@xpsp2res.dll,-22019»
«%windir%Network Diagnosticxpnetdiag.exe»=»%windir%Network Diagnosticxpnetdiag.exe:*:Enabled:@xpsp3res.dll,-20000»[HKEY_CURRENT_USERsoftwaremicrosoftwindowscurrentversionexplorermountpoints2{51f7a0ae-33be-11dd-b6fc-001cc031ef11}]
shellAutoRuncommand — D:LaunchU3.exe -a======List of files/folders created in the last 1 months======
2010-07-28 10:56:22 —-A—- H:WINDOWSsystem32zeszmk.exe
2010-07-16 14:54:39 —-A—- H:WINDOWSsystem32znafay.exe======List of files/folders modified in the last 1 months======
2010-07-29 00:16:55 —-D—- H:Program Filestrend micro
2010-07-29 00:15:05 —-A—- H:WINDOWSSchedLgU.Txt
2010-07-28 23:54:31 —-D—- H:WINDOWSTemp
2010-07-28 16:23:44 —-A—- H:Program FilesCommon Fileskeylog.txt
2010-07-28 15:44:55 —-D—- H:rsit
2010-07-28 15:44:26 —-D—- H:WINDOWSPrefetch
2010-07-28 14:10:47 —-D—- H:WINDOWS
2010-07-28 14:10:41 —-SHD—- H:System Volume Information
2010-07-28 14:10:41 —-D—- H:WINDOWSsystem32Restore
2010-07-28 14:01:47 —-D—- H:Config.Msi
2010-07-28 14:01:46 —-D—- H:Program Files
2010-07-28 14:01:45 —-HD—- H:WINDOWSinf
2010-07-28 14:01:45 —-D—- H:WINDOWSsystem32drivers
2010-07-28 14:01:23 —-D—- H:WINDOWSsystem32CatRoot2
2010-07-28 14:01:20 —-SHD—- H:WINDOWSInstaller
2010-07-28 10:56:23 —-D—- H:WINDOWSsystem32
2010-07-15 17:58:45 —-D—- H:Program FilesBeholdTV======List of drivers (R=Running, S=Stopped, 0=Boot, 1=System, 2=Auto, 3=Demand, 4=Disabled)======
R1 intelppm;Драйвер Intel процессора; H:WINDOWSsystem32DRIVERSintelppm.sys [2008-04-15 40704]
R1 StarOpen;StarOpen; H:WINDOWSsystem32driversStarOpen.sys [2008-06-30 5632]
R2 NwlnkIpx;NWLink IPX/SPX/NetBIOS-совместимый транспортный протокол; H:WINDOWSsystem32DRIVERSnwlnkipx.sys [2008-04-15 88320]
R2 NwlnkNb;NWLink NetBIOS; H:WINDOWSsystem32DRIVERSnwlnknb.sys [2008-04-15 63232]
R2 NwlnkSpx;Протокол NWLink SPX/SPXII; H:WINDOWSsystem32DRIVERSnwlnkspx.sys [2008-04-15 55936]
R3 Arp1394;Протокол клиента 1394 ARP; H:WINDOWSsystem32DRIVERSarp1394.sys [2008-04-15 60800]
R3 e1express;Intel(R) PRO/1000 PCI Express Network Connection Driver; H:WINDOWSsystem32DRIVERSe1e5132.sys [2007-09-17 254872]
R3 HDAudBus;Драйвер шины Microsoft UAA для High Definition Audio; H:WINDOWSsystem32DRIVERSHDAudBus.sys [2008-04-15 144384]
R3 HECI;Intel(R) Management Engine Interface; H:WINDOWSsystem32DRIVERSHECI.sys [2007-03-13 44672]
R3 IntcAzAudAddService;Service for Realtek HD Audio (WDM); H:WINDOWSsystem32driversRtkHDAud.sys [2007-09-17 4402176]
R3 NIC1394;Сетевой драйвер 1394; H:WINDOWSsystem32DRIVERSnic1394.sys [2008-04-15 61824]
R3 nv;nv; H:WINDOWSsystem32DRIVERSnv4_mini.sys [2009-11-21 10235968]
R3 NWRDR;NetWare Rdr; H:WINDOWSsystem32DRIVERSnwrdr.sys [2008-04-15 163584]
R3 pfc;Padus ASPI Shell; H:WINDOWSsystem32driverspfc.sys [2003-01-22 9856]
R3 SAA713x;Behold TV WDM Capture (SAA713x); H:WINDOWSsystem32DRIVERSsaa713x.sys [2007-04-10 186512]
R3 usbehci;Драйвер минипорта Microsoft USB 2.0 расширенного хост-контроллера; H:WINDOWSsystem32DRIVERSusbehci.sys [2008-04-15 30208]
R3 usbhub;USB2 концентратор; H:WINDOWSsystem32DRIVERSusbhub.sys [2008-04-15 59520]
R3 usbstor;Драйвер запоминающих устройств для USB; H:WINDOWSsystem32DRIVERSUSBSTOR.SYS [2008-04-15 26368]
R3 usbuhci;Драйвер минипорта Microsoft USB универсального хост-контроллера; H:WINDOWSsystem32DRIVERSusbuhci.sys [2008-04-15 20608]
S3 CCDECODE;Closed Caption декодер; H:WINDOWSsystem32DRIVERSCCDECODE.sys [2008-04-14 17024]
S3 MSTEE;Преобразователь потоков Tee/Sink-to-Sink Microsoft; H:WINDOWSsystem32driversMSTEE.sys [2008-04-14 5504]
S3 NABTSFEC;NABTS/FEC VBI кодек; H:WINDOWSsystem32DRIVERSNABTSFEC.sys [2008-04-14 85248]
S3 NdisIP;Microsoft видео или ТВ подключение; H:WINDOWSsystem32DRIVERSNdisIP.sys [2008-04-15 10880]
S3 SLIP;BDA Slip De-Framer; H:WINDOWSsystem32DRIVERSSLIP.sys [2008-04-15 11136]
S3 ss_bus;SAMSUNG Mobile USB Device 1.0 driver (WDM); H:WINDOWSsystem32DRIVERSss_bus.sys [2005-08-30 58320]
S3 ss_mdfl;SAMSUNG Mobile USB Modem 1.0 Filter; H:WINDOWSsystem32DRIVERSss_mdfl.sys [2005-08-30 8304]
S3 ss_mdm;SAMSUNG Mobile USB Modem 1.0 Drivers; H:WINDOWSsystem32DRIVERSss_mdm.sys [2005-08-30 94000]
S3 streamip;BDA IPSink; H:WINDOWSsystem32DRIVERSStreamIP.sys [2008-04-15 15232]
S3 usbscan;Драйвер USB-сканера; H:WINDOWSsystem32DRIVERSusbscan.sys [2008-04-14 15104]
S3 WSTCODEC;World Standard Teletext кодек; H:WINDOWSsystem32DRIVERSWSTCODEC.SYS [2008-04-14 19200]
S3 WudfPf;Windows Driver Foundation — User-mode Driver Framework Platform Driver; H:WINDOWSsystem32DRIVERSWudfPf.sys [2006-09-28 77568]
S3 WudfRd;Windows Driver Foundation — User-mode Driver Framework Reflector; H:WINDOWSsystem32DRIVERSwudfrd.sys [2006-09-28 82944]
S4 dwshd;dwshd; H:WINDOWSSystem32driversdwshd.sys []
S4 IntelIde;IntelIde; H:WINDOWSsystem32driversIntelIde.sys []
S4 WS2IFSL;Среда Windows Socket 2.0 поддержки поставщиков не-IFS служб; H:WINDOWSSystem32driversws2ifsl.sys [2008-04-15 12032]======List of services (R=Running, S=Stopped, 0=Boot, 1=System, 2=Auto, 3=Demand, 4=Disabled)======
R2 NVSvc;NVIDIA Display Driver Service; H:WINDOWSsystem32nvsvc32.exe [2009-11-20 154216]
R2 NWCWorkstation;Клиент для сетей NetWare; H:WINDOWSsystem32svchost.exe [2010-02-02 14336]
R2 PnkBstrA;PnkBstrA; H:WINDOWSsystem32PnkBstrA.exe [2008-12-06 66872]
S2 UxTuneUp;TuneUp Theme Extension; H:WINDOWSSystem32svchost.exe [2010-02-02 14336]
S3 gusvc;Google Updater Service; H:Program FilesGoogleCommonGoogle UpdaterGoogleUpdaterService.exe [2008-06-06 138168]
S3 IDriverT;InstallDriver Table Manager; H:Program FilesCommon FilesInstallShieldDriver11Intel 32IDriverT.exe [2005-04-04 69632]
S3 ose;Office Source Engine; H:Program FilesCommon FilesMicrosoft SharedSource EngineOSE.EXE [2003-07-28 89136]
S3 TuneUp.Defrag;TuneUp Drive Defrag Service; H:WINDOWSSystem32TuneUpDefragService.exe [2008-07-08 355584]
S3 WMPNetworkSvc;Служба общих сетевых ресурсов проигрывателя Windows Media; H:Program FilesWindows Media PlayerWMPNetwk.exe [2006-11-03 914944]
S3 WudfSvc;Windows Driver Foundation — User-mode Driver Framework; H:WINDOWSsystem32svchost.exe [2010-02-02 14336]
EOF
Отчет Malwarebytes’ Anti-Malware 1.46, Позднее удалила в карантине все обнаруженные зараженные записи в реестре, после перезагрузки компа они вернулись на прежнее место 🙁
Malwarebytes’ Anti-Malware 1.46
http://www.malwarebytes.orgВерсия базы данных: 4362
Windows 5.1.2600 Service Pack 3
Internet Explorer 7.0.5730.1328.07.2010 14:50:00
mbam-log-2010-07-28 (14-50-00).txtТип сканирования: Полное сканирование (H:|)
Просканированные объекты: 191166
Времени прошло: 16 минут, 22 секундЗараженные процессы в памяти: 0
Зараженные модули в памяти: 0
Зараженные ключи в реестре: 1
Зараженные параметры в реестре: 200
Объекты реестра заражены: 0
Зараженные папки: 0
Зараженные файлы: 0Зараженные процессы в памяти:
(Вредоносных программ не обнаружено)Зараженные модули в памяти:
(Вредоносных программ не обнаружено)Зараженные ключи в реестре:
HKEY_CLASSES_ROOTidid (Trojan.Sasfix) -> Quarantined and deleted successfully.Зараженные параметры в реестре:
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTcpipParametersPersistentRoutes128.111.48.0,255.255.255.0,192.168.1.0,1 (TCPRoute.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTcpipParametersPersistentRoutes128.130.56.0,255.255.255.0,192.168.1.0,1 (TCPRoute.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTcpipParametersPersistentRoutes128.130.60.0,255.255.255.0,192.168.1.0,1 (TCPRoute.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTcpipParametersPersistentRoutes139.91.222.0,255.255.255.0,192.168.1.0,1 (TCPRoute.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTcpipParametersPersistentRoutes141.202.248.0,255.255.255.0,192.168.1.0,1 (TCPRoute.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTcpipParametersPersistentRoutes149.101.225.0,255.255.255.0,192.168.1.0,1 (TCPRoute.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTcpipParametersPersistentRoutes150.70.93.0,255.255.255.0,192.168.1.0,1 (TCPRoute.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTcpipParametersPersistentRoutes155.35.248.0,255.255.255.0,192.168.1.0,1 (TCPRoute.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTcpipParametersPersistentRoutes162.40.10.0,255.255.255.0,192.168.1.0,1 (TCPRoute.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTcpipParametersPersistentRoutes165.160.15.0,255.255.255.0,192.168.1.0,1 (TCPRoute.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTcpipParametersPersistentRoutes166.70.98.0,255.255.255.0,192.168.1.0,1 (TCPRoute.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTcpipParametersPersistentRoutes174.120.184.0,255.255.255.0,192.168.1.0,1 (TCPRoute.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTcpipParametersPersistentRoutes174.120.185.0,255.255.255.0,192.168.1.0,1 (TCPRoute.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTcpipParametersPersistentRoutes174.120.186.0,255.255.255.0,192.168.1.0,1 (TCPRoute.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTcpipParametersPersistentRoutes174.133.38.0,255.255.255.0,192.168.1.0,1 (TCPRoute.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTcpipParametersPersistentRoutes18.85.2.0,255.255.255.0,192.168.1.0,1 (TCPRoute.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTcpipParametersPersistentRoutes188.40.74.0,255.255.255.0,192.168.1.0,1 (TCPRoute.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTcpipParametersPersistentRoutes188.93.8.0,255.255.255.0,192.168.1.0,1 (TCPRoute.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTcpipParametersPersistentRoutes192.150.94.0,255.255.255.0,192.168.1.0,1 (TCPRoute.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTcpipParametersPersistentRoutes193.0.6.0,255.255.255.0,192.168.1.0,1 (TCPRoute.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTcpipParametersPersistentRoutes193.1.193.0,255.255.255.0,192.168.1.0,1 (TCPRoute.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTcpipParametersPersistentRoutes193.110.109.0,255.255.255.0,192.168.1.0,1 (TCPRoute.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTcpipParametersPersistentRoutes193.17.85.0,255.255.255.0,192.168.1.0,1 (TCPRoute.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTcpipParametersPersistentRoutes193.193.194.0,255.255.255.0,192.168.1.0,1 (TCPRoute.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTcpipParametersPersistentRoutes193.24.237.0,255.255.255.0,192.168.1.0,1 (TCPRoute.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTcpipParametersPersistentRoutes193.66.251.0,255.255.255.0,192.168.1.0,1 (TCPRoute.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTcpipParametersPersistentRoutes193.69.114.0,255.255.255.0,192.168.1.0,1 (TCPRoute.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTcpipParametersPersistentRoutes193.71.68.0,255.255.255.0,192.168.1.0,1 (TCPRoute.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTcpipParametersPersistentRoutes194.0.200.0,255.255.255.0,192.168.1.0,1 (TCPRoute.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTcpipParametersPersistentRoutes194.109.142.0,255.255.255.0,192.168.1.0,1 (TCPRoute.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTcpipParametersPersistentRoutes194.112.106.0,255.255.255.0,192.168.1.0,1 (TCPRoute.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTcpipParametersPersistentRoutes194.206.126.0,255.255.255.0,192.168.1.0,1 (TCPRoute.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTcpipParametersPersistentRoutes194.33.180.0,255.255.255.0,192.168.1.0,1 (TCPRoute.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTcpipParametersPersistentRoutes195.137.160.0,255.255.255.0,192.168.1.0,1 (TCPRoute.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTcpipParametersPersistentRoutes195.146.235.0,255.255.255.0,192.168.1.0,1 (TCPRoute.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTcpipParametersPersistentRoutes195.2.240.0,255.255.255.0,192.168.1.0,1 (TCPRoute.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTcpipParametersPersistentRoutes195.210.42.0,255.255.255.0,192.168.1.0,1 (TCPRoute.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTcpipParametersPersistentRoutes195.55.72.0,255.255.255.0,192.168.1.0,1 (TCPRoute.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTcpipParametersPersistentRoutes195.64.225.0,255.255.255.0,192.168.1.0,1 (TCPRoute.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTcpipParametersPersistentRoutes195.70.37.0,255.255.255.0,192.168.1.0,1 (TCPRoute.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTcpipParametersPersistentRoutes198.6.49.0,255.255.255.0,192.168.1.0,1 (TCPRoute.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTcpipParametersPersistentRoutes199.203.243.0,255.255.255.0,192.168.1.0,1 (TCPRoute.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTcpipParametersPersistentRoutes203.160.188.0,255.255.255.0,192.168.1.0,1 (TCPRoute.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTcpipParametersPersistentRoutes204.14.90.0,255.255.255.0,192.168.1.0,1 (TCPRoute.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTcpipParametersPersistentRoutes205.178.145.0,255.255.255.0,192.168.1.0,1 (TCPRoute.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTcpipParametersPersistentRoutes205.227.136.0,255.255.255.0,192.168.1.0,1 (TCPRoute.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTcpipParametersPersistentRoutes206.204.52.0,255.255.255.0,192.168.1.0,1 (TCPRoute.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTcpipParametersPersistentRoutes207.44.154.0,255.255.255.0,192.168.1.0,1 (TCPRoute.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTcpipParametersPersistentRoutes207.44.254.0,255.255.255.0,192.168.1.0,1 (TCPRoute.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTcpipParametersPersistentRoutes207.46.18.0,255.255.255.0,192.168.1.0,1 (TCPRoute.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTcpipParametersPersistentRoutes207.46.20.0,255.255.255.0,192.168.1.0,1 (TCPRoute.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTcpipParametersPersistentRoutes207.46.232.0,255.255.255.0,192.168.1.0,1 (TCPRoute.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTcpipParametersPersistentRoutes207.66.0.0,255.255.255.0,192.168.1.0,1 (TCPRoute.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTcpipParametersPersistentRoutes208.43.44.0,255.255.255.0,192.168.1.0,1 (TCPRoute.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTcpipParametersPersistentRoutes208.43.71.0,255.255.255.0,192.168.1.0,1 (TCPRoute.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTcpipParametersPersistentRoutes208.79.250.0,255.255.255.0,192.168.1.0,1 (TCPRoute.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTcpipParametersPersistentRoutes209.124.55.0,255.255.255.0,192.168.1.0,1 (TCPRoute.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTcpipParametersPersistentRoutes209.157.69.0,255.255.255.0,192.168.1.0,1 (TCPRoute.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTcpipParametersPersistentRoutes209.160.22.0,255.255.255.0,192.168.1.0,1 (TCPRoute.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTcpipParametersPersistentRoutes209.216.46.0,255.255.255.0,192.168.1.0,1 (TCPRoute.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTcpipParametersPersistentRoutes209.51.167.0,255.255.255.0,192.168.1.0,1 (TCPRoute.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTcpipParametersPersistentRoutes209.62.112.0,255.255.255.0,192.168.1.0,1 (TCPRoute.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTcpipParametersPersistentRoutes209.62.68.0,255.255.255.0,192.168.1.0,1 (TCPRoute.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTcpipParametersPersistentRoutes209.87.209.0,255.255.255.0,192.168.1.0,1 (TCPRoute.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTcpipParametersPersistentRoutes212.47.219.0,255.255.255.0,192.168.1.0,1 (TCPRoute.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTcpipParametersPersistentRoutes212.67.88.0,255.255.255.0,192.168.1.0,1 (TCPRoute.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTcpipParametersPersistentRoutes212.72.62.0,255.255.255.0,192.168.1.0,1 (TCPRoute.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTcpipParametersPersistentRoutes212.8.79.0,255.255.255.0,192.168.1.0,1 (TCPRoute.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTcpipParametersPersistentRoutes213.133.34.0,255.255.255.0,192.168.1.0,1 (TCPRoute.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTcpipParametersPersistentRoutes213.171.218.0,255.255.255.0,192.168.1.0,1 (TCPRoute.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTcpipParametersPersistentRoutes213.198.89.0,255.255.255.0,192.168.1.0,1 (TCPRoute.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTcpipParametersPersistentRoutes213.220.100.0,255.255.255.0,192.168.1.0,1 (TCPRoute.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTcpipParametersPersistentRoutes213.31.172.0,255.255.255.0,192.168.1.0,1 (TCPRoute.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTcpipParametersPersistentRoutes216.10.192.0,255.255.255.0,192.168.1.0,1 (TCPRoute.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTcpipParametersPersistentRoutes216.12.145.0,255.255.255.0,192.168.1.0,1 (TCPRoute.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTcpipParametersPersistentRoutes216.239.122.0,255.255.255.0,192.168.1.0,1 (TCPRoute.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTcpipParametersPersistentRoutes216.246.90.0,255.255.255.0,192.168.1.0,1 (TCPRoute.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTcpipParametersPersistentRoutes216.49.88.0,255.255.255.0,192.168.1.0,1 (TCPRoute.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTcpipParametersPersistentRoutes216.49.94.0,255.255.255.0,192.168.1.0,1 (TCPRoute.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTcpipParametersPersistentRoutes216.55.183.0,255.255.255.0,192.168.1.0,1 (TCPRoute.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTcpipParametersPersistentRoutes216.99.133.0,255.255.255.0,192.168.1.0,1 (TCPRoute.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTcpipParametersPersistentRoutes217.106.234.0,255.255.255.0,192.168.1.0,1 (TCPRoute.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTcpipParametersPersistentRoutes217.16.16.0,255.255.255.0,192.168.1.0,1 (TCPRoute.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTcpipParametersPersistentRoutes217.170.21.0,255.255.255.0,192.168.1.0,1 (TCPRoute.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTcpipParametersPersistentRoutes217.174.103.0,255.255.255.0,192.168.1.0,1 (TCPRoute.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTcpipParametersPersistentRoutes38.113.1.0,255.255.255.0,192.168.1.0,1 (TCPRoute.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTcpipParametersPersistentRoutes62.14.249.0,255.255.255.0,192.168.1.0,1 (TCPRoute.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTcpipParametersPersistentRoutes62.146.210.0,255.255.255.0,192.168.1.0,1 (TCPRoute.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTcpipParametersPersistentRoutes62.146.66.0,255.255.255.0,192.168.1.0,1 (TCPRoute.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTcpipParametersPersistentRoutes62.189.194.0,255.255.255.0,192.168.1.0,1 (TCPRoute.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTcpipParametersPersistentRoutes62.213.110.0,255.255.255.0,192.168.1.0,1 (TCPRoute.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTcpipParametersPersistentRoutes62.75.163.0,255.255.255.0,192.168.1.0,1 (TCPRoute.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTcpipParametersPersistentRoutes62.75.216.0,255.255.255.0,192.168.1.0,1 (TCPRoute.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTcpipParametersPersistentRoutes63.85.36.0,255.255.255.0,192.168.1.0,1 (TCPRoute.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTcpipParametersPersistentRoutes64.128.133.0,255.255.255.0,192.168.1.0,1 (TCPRoute.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTcpipParametersPersistentRoutes64.13.134.0,255.255.255.0,192.168.1.0,1 (TCPRoute.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTcpipParametersPersistentRoutes64.202.189.0,255.255.255.0,192.168.1.0,1 (TCPRoute.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTcpipParametersPersistentRoutes64.246.4.0,255.255.255.0,192.168.1.0,1 (TCPRoute.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTcpipParametersPersistentRoutes64.41.142.0,255.255.255.0,192.168.1.0,1 (TCPRoute.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTcpipParametersPersistentRoutes64.41.151.0,255.255.255.0,192.168.1.0,1 (TCPRoute.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTcpipParametersPersistentRoutes64.66.190.0,255.255.255.0,192.168.1.0,1 (TCPRoute.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTcpipParametersPersistentRoutes64.78.182.0,255.255.255.0,192.168.1.0,1 (TCPRoute.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTcpipParametersPersistentRoutes65.175.38.0,255.255.255.0,192.168.1.0,1 (TCPRoute.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTcpipParametersPersistentRoutes65.55.184.0,255.255.255.0,192.168.1.0,1 (TCPRoute.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTcpipParametersPersistentRoutes65.55.240.0,255.255.255.0,192.168.1.0,1 (TCPRoute.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTcpipParametersPersistentRoutes66.223.50.0,255.255.255.0,192.168.1.0,1 (TCPRoute.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTcpipParametersPersistentRoutes66.249.17.0,255.255.255.0,192.168.1.0,1 (TCPRoute.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTcpipParametersPersistentRoutes66.77.70.0,255.255.255.0,192.168.1.0,1 (TCPRoute.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTcpipParametersPersistentRoutes67.134.208.0,255.255.255.0,192.168.1.0,1 (TCPRoute.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTcpipParametersPersistentRoutes67.15.103.0,255.255.255.0,192.168.1.0,1 (TCPRoute.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTcpipParametersPersistentRoutes67.15.231.0,255.255.255.0,192.168.1.0,1 (TCPRoute.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTcpipParametersPersistentRoutes67.19.34.0,255.255.255.0,192.168.1.0,1 (TCPRoute.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTcpipParametersPersistentRoutes67.192.135.0,255.255.255.0,192.168.1.0,1 (TCPRoute.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTcpipParametersPersistentRoutes67.225.206.0,255.255.255.0,192.168.1.0,1 (TCPRoute.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTcpipParametersPersistentRoutes67.227.172.0,255.255.255.0,192.168.1.0,1 (TCPRoute.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTcpipParametersPersistentRoutes68.177.102.0,255.255.255.0,192.168.1.0,1 (TCPRoute.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTcpipParametersPersistentRoutes69.162.79.0,255.255.255.0,192.168.1.0,1 (TCPRoute.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTcpipParametersPersistentRoutes69.18.148.0,255.255.255.0,192.168.1.0,1 (TCPRoute.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTcpipParametersPersistentRoutes69.20.104.0,255.255.255.0,192.168.1.0,1 (TCPRoute.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTcpipParametersPersistentRoutes69.57.142.0,255.255.255.0,192.168.1.0,1 (TCPRoute.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTcpipParametersPersistentRoutes69.93.226.0,255.255.255.0,192.168.1.0,1 (TCPRoute.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTcpipParametersPersistentRoutes70.84.211.0,255.255.255.0,192.168.1.0,1 (TCPRoute.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTcpipParametersPersistentRoutes72.232.246.0,255.255.255.0,192.168.1.0,1 (TCPRoute.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTcpipParametersPersistentRoutes72.3.254.0,255.255.255.0,192.168.1.0,1 (TCPRoute.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTcpipParametersPersistentRoutes72.32.125.0,255.255.255.0,192.168.1.0,1 (TCPRoute.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTcpipParametersPersistentRoutes72.32.149.0,255.255.255.0,192.168.1.0,1 (TCPRoute.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTcpipParametersPersistentRoutes72.32.70.0,255.255.255.0,192.168.1.0,1 (TCPRoute.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTcpipParametersPersistentRoutes74.125.77.0,255.255.255.0,192.168.1.0,1 (TCPRoute.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTcpipParametersPersistentRoutes74.208.158.0,255.255.255.0,192.168.1.0,1 (TCPRoute.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTcpipParametersPersistentRoutes74.208.20.0,255.255.255.0,192.168.1.0,1 (TCPRoute.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTcpipParametersPersistentRoutes74.50.0.0,255.255.255.0,192.168.1.0,1 (TCPRoute.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTcpipParametersPersistentRoutes74.52.233.0,255.255.255.0,192.168.1.0,1 (TCPRoute.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTcpipParametersPersistentRoutes74.53.201.0,255.255.255.0,192.168.1.0,1 (TCPRoute.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTcpipParametersPersistentRoutes74.53.70.0,255.255.255.0,192.168.1.0,1 (TCPRoute.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTcpipParametersPersistentRoutes74.54.130.0,255.255.255.0,192.168.1.0,1 (TCPRoute.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTcpipParametersPersistentRoutes74.54.139.0,255.255.255.0,192.168.1.0,1 (TCPRoute.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTcpipParametersPersistentRoutes74.54.46.0,255.255.255.0,192.168.1.0,1 (TCPRoute.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTcpipParametersPersistentRoutes74.55.40.0,255.255.255.0,192.168.1.0,1 (TCPRoute.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTcpipParametersPersistentRoutes74.55.74.0,255.255.255.0,192.168.1.0,1 (TCPRoute.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTcpipParametersPersistentRoutes74.86.125.0,255.255.255.0,192.168.1.0,1 (TCPRoute.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTcpipParametersPersistentRoutes74.86.232.0,255.255.255.0,192.168.1.0,1 (TCPRoute.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTcpipParametersPersistentRoutes75.125.185.0,255.255.255.0,192.168.1.0,1 (TCPRoute.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTcpipParametersPersistentRoutes75.125.189.0,255.255.255.0,192.168.1.0,1 (TCPRoute.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTcpipParametersPersistentRoutes75.125.212.0,255.255.255.0,192.168.1.0,1 (TCPRoute.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTcpipParametersPersistentRoutes75.125.29.0,255.255.255.0,192.168.1.0,1 (TCPRoute.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTcpipParametersPersistentRoutes75.125.43.0,255.255.255.0,192.168.1.0,1 (TCPRoute.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTcpipParametersPersistentRoutes75.125.82.0,255.255.255.0,192.168.1.0,1 (TCPRoute.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTcpipParametersPersistentRoutes78.108.86.0,255.255.255.0,192.168.1.0,1 (TCPRoute.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTcpipParametersPersistentRoutes78.137.164.0,255.255.255.0,192.168.1.0,1 (TCPRoute.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTcpipParametersPersistentRoutes78.47.87.0,255.255.255.0,192.168.1.0,1 (TCPRoute.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTcpipParametersPersistentRoutes79.125.5.0,255.255.255.0,192.168.1.0,1 (TCPRoute.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTcpipParametersPersistentRoutes80.153.193.0,255.255.255.0,192.168.1.0,1 (TCPRoute.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTcpipParametersPersistentRoutes80.190.130.0,255.255.255.0,192.168.1.0,1 (TCPRoute.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTcpipParametersPersistentRoutes80.190.154.0,255.255.255.0,192.168.1.0,1 (TCPRoute.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTcpipParametersPersistentRoutes80.237.132.0,255.255.255.0,192.168.1.0,1 (TCPRoute.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTcpipParametersPersistentRoutes80.86.107.0,255.255.255.0,192.168.1.0,1 (TCPRoute.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTcpipParametersPersistentRoutes81.176.66.0,255.255.255.0,192.168.1.0,1 (TCPRoute.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTcpipParametersPersistentRoutes81.176.67.0,255.255.255.0,192.168.1.0,1 (TCPRoute.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTcpipParametersPersistentRoutes81.177.31.0,255.255.255.0,192.168.1.0,1 (TCPRoute.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTcpipParametersPersistentRoutes81.24.35.0,255.255.255.0,192.168.1.0,1 (TCPRoute.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTcpipParametersPersistentRoutes82.117.238.0,255.255.255.0,192.168.1.0,1 (TCPRoute.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTcpipParametersPersistentRoutes82.151.107.0,255.255.255.0,192.168.1.0,1 (TCPRoute.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTcpipParametersPersistentRoutes82.165.103.0,255.255.255.0,192.168.1.0,1 (TCPRoute.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTcpipParametersPersistentRoutes82.98.86.0,255.255.255.0,192.168.1.0,1 (TCPRoute.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTcpipParametersPersistentRoutes83.102.130.0,255.255.255.0,192.168.1.0,1 (TCPRoute.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTcpipParametersPersistentRoutes83.202.175.0,255.255.255.0,192.168.1.0,1 (TCPRoute.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTcpipParametersPersistentRoutes83.222.23.0,255.255.255.0,192.168.1.0,1 (TCPRoute.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTcpipParametersPersistentRoutes83.222.31.0,255.255.255.0,192.168.1.0,1 (TCPRoute.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTcpipParametersPersistentRoutes83.223.117.0,255.255.255.0,192.168.1.0,1 (TCPRoute.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTcpipParametersPersistentRoutes84.40.30.0,255.255.255.0,192.168.1.0,1 (TCPRoute.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTcpipParametersPersistentRoutes85.12.57.0,255.255.255.0,192.168.1.0,1 (TCPRoute.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTcpipParametersPersistentRoutes85.17.210.0,255.255.255.0,192.168.1.0,1 (TCPRoute.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTcpipParametersPersistentRoutes85.214.106.0,255.255.255.0,192.168.1.0,1 (TCPRoute.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTcpipParametersPersistentRoutes85.255.19.0,255.255.255.0,192.168.1.0,1 (TCPRoute.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTcpipParametersPersistentRoutes85.31.222.0,255.255.255.0,192.168.1.0,1 (TCPRoute.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTcpipParametersPersistentRoutes87.106.242.0,255.255.255.0,192.168.1.0,1 (TCPRoute.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTcpipParametersPersistentRoutes87.106.254.0,255.255.255.0,192.168.1.0,1 (TCPRoute.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTcpipParametersPersistentRoutes87.230.79.0,255.255.255.0,192.168.1.0,1 (TCPRoute.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTcpipParametersPersistentRoutes87.238.48.0,255.255.255.0,192.168.1.0,1 (TCPRoute.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTcpipParametersPersistentRoutes87.242.72.0,255.255.255.0,192.168.1.0,1 (TCPRoute.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTcpipParametersPersistentRoutes87.242.74.0,255.255.255.0,192.168.1.0,1 (TCPRoute.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTcpipParametersPersistentRoutes87.242.75.0,255.255.255.0,192.168.1.0,1 (TCPRoute.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTcpipParametersPersistentRoutes87.242.79.0,255.255.255.0,192.168.1.0,1 (TCPRoute.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTcpipParametersPersistentRoutes88.221.119.0,255.255.255.0,192.168.1.0,1 (TCPRoute.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTcpipParametersPersistentRoutes89.108.66.0,255.255.255.0,192.168.1.0,1 (TCPRoute.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTcpipParametersPersistentRoutes89.111.176.0,255.255.255.0,192.168.1.0,1 (TCPRoute.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTcpipParametersPersistentRoutes89.202.149.0,255.255.255.0,192.168.1.0,1 (TCPRoute.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTcpipParametersPersistentRoutes89.202.157.0,255.255.255.0,192.168.1.0,1 (TCPRoute.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTcpipParametersPersistentRoutes90.156.159.0,255.255.255.0,192.168.1.0,1 (TCPRoute.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTcpipParametersPersistentRoutes90.183.101.0,255.255.255.0,192.168.1.0,1 (TCPRoute.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTcpipParametersPersistentRoutes91.121.97.0,255.255.255.0,192.168.1.0,1 (TCPRoute.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTcpipParametersPersistentRoutes91.199.212.0,255.255.255.0,192.168.1.0,1 (TCPRoute.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTcpipParametersPersistentRoutes91.209.196.0,255.255.255.0,192.168.1.0,1 (TCPRoute.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTcpipParametersPersistentRoutes92.123.155.0,255.255.255.0,192.168.1.0,1 (TCPRoute.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTcpipParametersPersistentRoutes92.53.106.0,255.255.255.0,192.168.1.0,1 (TCPRoute.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTcpipParametersPersistentRoutes93.184.71.0,255.255.255.0,192.168.1.0,1 (TCPRoute.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTcpipParametersPersistentRoutes93.191.13.0,255.255.255.0,192.168.1.0,1 (TCPRoute.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTcpipParametersPersistentRoutes94.23.206.0,255.255.255.0,192.168.1.0,1 (TCPRoute.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTcpipParametersPersistentRoutes94.236.0.0,255.255.255.0,192.168.1.0,1 (TCPRoute.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTcpipParametersPersistentRoutes95.140.225.0,255.255.255.0,192.168.1.0,1 (TCPRoute.Hijack) -> Quarantined and deleted successfully.Объекты реестра заражены:
(Вредоносных программ не обнаружено)Зараженные папки:
(Вредоносных программ не обнаружено)Зараженные файлы:
(Вредоносных программ не обнаружено)Прошу прощения, что «влезла» вместо администраторов. 🙂 Просто у меня была та же проблема (можно посмотреть в ветке мой вопрос), спас вот этот метод:
http://ac-u.ru/articles/notes/553/
Сейчас все грузится, антивир установлен 😀Спасибо за ответ, но уже справилась с проблемой. Помог вот этот метод:
http://ac-u.ru/articles/notes/553/
Выполнить Ваши инструкции все равно необходимо?Еще раз просканировала PRIT, выдал только 1 лог:
Logfile of random’s system information tool 1.06 (written by random/random)
Run by Lara at 2010-03-21 13:59:23
Microsoft Windows XP Professional Service Pack 3
System drive H: has 170 GB (71%) free of 238 GB
Total RAM: 2029 MB (74% free)Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 13:59:24, on 21.03.2010
Platform: Windows XP SP3 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP3 (6.00.2900.5512)
Boot mode: NormalRunning processes:
H:WINDOWSSystem32smss.exe
H:WINDOWSsystem32winlogon.exe
H:WINDOWSsystem32services.exe
H:WINDOWSsystem32lsass.exe
H:WINDOWSsystem32nvsvc32.exe
H:WINDOWSsystem32svchost.exe
H:WINDOWSSystem32svchost.exe
H:WINDOWSsystem32spoolsv.exe
H:WINDOWSExplorer.exe
H:Program FilesWinampwinampa.exe
H:WINDOWSRTHDCPL.EXE
H:WINDOWSsystem32RUNDLL32.EXE
H:WINDOWSsystem32ctfmon.exe
H:Program FilesGoogleGoogleToolbarNotifierGoogleToolbarNotifier.exe
H:Program FilesElectronic ArtsEADMCore.exe
H:Program FilesICQ6ICQ.exe
H:WINDOWSsystem32PnkBstrA.exe
H:WINDOWSsystem32svchost.exe
H:WINDOWSsystem32wscntfy.exe
H:Program FilesUniblueRegistryBoosterregistrybooster.exe
H:СкачалаPSIT (сканер)RSIT.exe
H:Program Filestrend microLara.exeR0 — HKCUSoftwareMicrosoftInternet ExplorerMain,Start Page = http://www.yandex.ru/?clid=135293
R0 — HKCUSoftwareMicrosoftInternet ExplorerToolbar,LinksFolderName = Ссылки
R3 — URLSearchHook: DefaultSearchHook Class — {C94E154B-1459-4A47-966B-4B843BEFC7DB} — H:Program FilesAskSearchbinDefaultSearch.dll
O2 — BHO: AskBar BHO — {201f27d4-3704-41d6-89c1-aa35e39143ed} — H:Program FilesAskBarDisbarbinaskBar.dll
O3 — Toolbar: Ask Toolbar — {3041d03e-fd4b-44e0-b742-2d9b88305f98} — H:Program FilesAskBarDisbarbinaskBar.dll
O3 — Toolbar: Яндекс.Бар — {91397D20-1446-11D4-8AF4-0040CA1127B6} — H:Program FilesYandexYandexBarIEyndbar.dll
O4 — HKLM..Run: [WinampAgent] «H:Program FilesWinampwinampa.exe»
O4 — HKLM..Run: [NeroFilterCheck] H:WINDOWSsystem32NeroCheck.exe
O4 — HKLM..Run: [RTHDCPL] RTHDCPL.EXE
O4 — HKLM..Run: [Alcmtr] ALCMTR.EXE
O4 — HKLM..Run: [NvMediaCenter] RUNDLL32.EXE H:WINDOWSsystem32NvMcTray.dll,NvTaskbarInit
O4 — HKLM..Run: [NvCplDaemon] RUNDLL32.EXE H:WINDOWSsystem32NvCpl.dll,NvStartup
O4 — HKLM..Run: [AVP] «H:Program FilesKaspersky LabKaspersky Internet Security 7.0avp.exe»
O4 — HKCU..Run: [CTFMON.EXE] H:WINDOWSsystem32ctfmon.exe
O4 — HKCU..Run: [swg] H:Program FilesGoogleGoogleToolbarNotifierGoogleToolbarNotifier.exe
O4 — HKCU..Run: [DAEMON Tools Lite] «H:Program FilesDAEMON Tools Litedaemon.exe» -autorun
O4 — HKCU..Run: [EA Core] H:Program FilesElectronic ArtsEADMCore.exe -silent
O4 — HKCU..Run: [ICQ] «H:Program FilesICQ6ICQ.exe» silent
O4 — HKCU..RunOnce: [UniblueRegistryBooster] «H:Program FilesUniblueRegistryBoosterlauncher.exe» delay 20000
O4 — HKUSS-1-5-19..Run: [CTFMON.EXE] H:WINDOWSsystem32CTFMON.EXE (User ‘LOCAL SERVICE’)
O4 — HKUSS-1-5-20..Run: [CTFMON.EXE] H:WINDOWSsystem32CTFMON.EXE (User ‘NETWORK SERVICE’)
O4 — HKUSS-1-5-18..Run: [CTFMON.EXE] H:WINDOWSsystem32CTFMON.EXE (User ‘SYSTEM’)
O4 — HKUS.DEFAULT..Run: [CTFMON.EXE] H:WINDOWSsystem32CTFMON.EXE (User ‘Default user’)
O4 — Startup: Need for Speed™ Undercover — регистрация.lnk = H:Program FilesEA GamesNeed for Speed UndercoverSupportEAregister.exe
O4 — Global Startup: InterVideo WinCinema Manager.lnk = H:Program FilesInterVideoCommonBinWinCinemaMgr.exe
O8 — Extra context menu item: &Экспорт в Microsoft Excel — res://H:PROGRA~1MICROS~2OFFICE11EXCEL.EXE/3000
O9 — Extra button: Cтатистика Веб-Антивируса — {1F460357-8A94-4D71-9CA3-AA4ACF32ED8E} — H:Program FilesKaspersky LabKaspersky Internet Security 7.0SCIEPlgn.dll
O9 — Extra button: (no name) — {e2e2dd38-d088-4134-82b7-f2ba38496583} — H:WINDOWSNetwork Diagnosticxpnetdiag.exe
O9 — Extra ‘Tools’ menuitem: @xpsp3res.dll,-20001 — {e2e2dd38-d088-4134-82b7-f2ba38496583} — H:WINDOWSNetwork Diagnosticxpnetdiag.exe
O9 — Extra button: Messenger — {FB5F1910-F110-11d2-BB9E-00C04F795683} — H:Program FilesMessengermsmsgs.exe
O9 — Extra ‘Tools’ menuitem: Windows Messenger — {FB5F1910-F110-11d2-BB9E-00C04F795683} — H:Program FilesMessengermsmsgs.exe
O10 — Unknown file in Winsock LSP: h:windowssystem32nwprovau.dll
O16 — DPF: {CF40ACC5-E1BB-4AFF-AC72-04C2F616BCA7} (get_atlcom Class) — http://www.adobe.com/products/acrobat/nos/gp.cab
O17 — HKLMSystemCCSServicesTcpip..{83BA463A-BA45-4AC5-8D4C-EB3B293904AB}: NameServer = 212.188.4.10 195.34.32.116
O17 — HKLMSystemCS2ServicesTcpipParameters: NameServer = 85.255.113.131 85.255.112.88
O20 — AppInit_DLLs: H:PROGRA~1KASPER~1KASPER~1.0adialhk.dll
O23 — Service: Kaspersky Internet Security 7.0 (AVP) — Kaspersky Lab — H:Program FilesKaspersky LabKaspersky Internet Security 7.0avp.exe
O23 — Service: Журнал событий (Eventlog) — Корпорация Майкрософт — H:WINDOWSsystem32services.exe
O23 — Service: Google Updater Service (gusvc) — Google — H:Program FilesGoogleCommonGoogle UpdaterGoogleUpdaterService.exe
O23 — Service: InstallDriver Table Manager (IDriverT) — Macrovision Corporation — H:Program FilesCommon FilesInstallShieldDriver11Intel 32IDriverT.exe
O23 — Service: Служба COM записи компакт-дисков IMAPI (ImapiService) — Корпорация Майкрософт — H:WINDOWSsystem32imapi.exe
O23 — Service: NetMeeting Remote Desktop Sharing (mnmsrvc) — Корпорация Майкрософт — H:WINDOWSsystem32mnmsrvc.exe
O23 — Service: NVIDIA Display Driver Service (NVSvc) — NVIDIA Corporation — H:WINDOWSsystem32nvsvc32.exe
O23 — Service: Plug and Play (PlugPlay) — Корпорация Майкрософт — H:WINDOWSsystem32services.exe
O23 — Service: PnkBstrA — Unknown owner — H:WINDOWSsystem32PnkBstrA.exe
O23 — Service: Диспетчер сеанса справки для удаленного рабочего стола (RDSessMgr) — Корпорация Майкрософт — H:WINDOWSsystem32sessmgr.exe
O23 — Service: Смарт-карты (SCardSvr) — Корпорация Майкрософт — H:WINDOWSSystem32SCardSvr.exe
O23 — Service: Журналы и оповещения производительности (SysmonLog) — Корпорация Майкрософт — H:WINDOWSsystem32smlogsvc.exe
O23 — Service: TuneUp Drive Defrag Service (TuneUp.Defrag) — TuneUp Software GmbH — H:WINDOWSSystem32TuneUpDefragService.exe
O23 — Service: Теневое копирование тома (VSS) — Корпорация Майкрософт — H:WINDOWSSystem32vssvc.exe
O23 — Service: Адаптер производительности WMI (WmiApSrv) — Корпорация Майкрософт — H:WINDOWSsystem32wbemwmiapsrv.exe—
End of file — 6378 bytes======Scheduled tasks folder======
H:WINDOWStasks1-Click Maintenance.job
======Registry dump======
[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionExplorerBrowser Helper Objects{201f27d4-3704-41d6-89c1-aa35e39143ed}]
AskBar BHO — H:Program FilesAskBarDisbarbinaskBar.dll [2008-08-26 279944][HKEY_LOCAL_MACHINESOFTWAREMicrosoftInternet ExplorerToolbar]
{3041d03e-fd4b-44e0-b742-2d9b88305f98} — Ask Toolbar — H:Program FilesAskBarDisbarbinaskBar.dll [2008-08-26 279944]
{91397D20-1446-11D4-8AF4-0040CA1127B6} — Яндекс.Бар — H:Program FilesYandexYandexBarIEyndbar.dll [2009-07-24 5586208][HKEY_LOCAL_MACHINESoftwareMicrosoftWindowsCurrentVersionRun]
«WinampAgent»=H:Program FilesWinampwinampa.exe [2008-04-01 36352]
«NeroFilterCheck»=H:WINDOWSsystem32NeroCheck.exe [2001-07-09 155648]
«RTHDCPL»=H:WINDOWSRTHDCPL.EXE [2007-09-17 16132608]
«Alcmtr»=H:WINDOWSALCMTR.EXE [2007-09-17 69632]
«NvMediaCenter»=H:WINDOWSsystem32NvMcTray.dll [2009-11-20 110184]
«NvCplDaemon»=H:WINDOWSsystem32NvCpl.dll [2009-11-20 12669544]
«AVP»=H:Program FilesKaspersky LabKaspersky Internet Security 7.0avp.exe [2007-06-28 218376][HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionRun]
«CTFMON.EXE»=H:WINDOWSsystem32ctfmon.exe [2008-04-15 15360]
«swg»=H:Program FilesGoogleGoogleToolbarNotifierGoogleToolbarNotifier.exe [2008-07-10 68856]
«DAEMON Tools Lite»=H:Program FilesDAEMON Tools Litedaemon.exe [2008-07-24 490952]
«EA Core»=H:Program FilesElectronic ArtsEADMCore.exe [2008-07-22 2772992]
«ICQ»=H:Program FilesICQ6ICQ.exe [2008-09-01 173304][HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionRunOnce]
«UniblueRegistryBooster»=H:Program FilesUniblueRegistryBoosterlauncher.exe [2010-03-16 60208]H:Documents and SettingsAll UsersГлавное менюПрограммыАвтозагрузка
InterVideo WinCinema Manager.lnk — H:Program FilesInterVideoCommonBinWinCinemaMgr.exeH:Documents and SettingsLaraГлавное менюПрограммыАвтозагрузка
Need for Speed™ Undercover — регистрация.lnk — H:Program FilesEA GamesNeed for Speed UndercoverSupportEAregister.exe[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionWindows]
«AppInit_DLLS»=»H:PROGRA~1KASPER~1KASPER~1.0adialhk.dll»[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionWinlogonNotifyklogon]
H:WINDOWSsystem32klogon.dll [2007-06-28 206088][HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionShellServiceObjectDelayLoad]
WPDShServiceObj — {AAA288BA-9A4C-45B0-95D7-94D524869DB5} — H:WINDOWSsystem32WPDShServiceObj.dll [2006-10-18 133632][HKEY_LOCAL_MACHINESYSTEMCurrentControlSetControlLsa]
«authentication packages»=msv1_0
nwprovau[HKEY_LOCAL_MACHINESoftwareMicrosoftWindowsCurrentVersionPoliciesSystem]
«dontdisplaylastusername»=0
«legalnoticecaption»=
«legalnoticetext»=
«shutdownwithoutlogon»=1
«undockwithoutlogon»=1[HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionPoliciesexplorer]
«NoDriveTypeAutoRun»=145[HKEY_LOCAL_MACHINEsystemcurrentcontrolsetservicessharedaccessparametersfirewallpolicystandardprofileauthorizedapplicationslist]
«%windir%system32sessmgr.exe»=»%windir%system32sessmgr.exe:*:enabled:@xpsp2res.dll,-22019»
«H:Program FilesICQ6ICQ.exe»=»H:Program FilesICQ6ICQ.exe:*:Enabled:ICQ6»
«H:WINDOWSsystem32rundll32.exe»=»H:WINDOWSsystem32rundll32.exe:*:Enabled:rundll32»
«??H:WINDOWSsystem32winlogon.exe»=»??H:WINDOWSsystem32winlogon.exe:*:Enabled:rundll32″
«%windir%Network Diagnosticxpnetdiag.exe»=»%windir%Network Diagnosticxpnetdiag.exe:*:Enabled:@xpsp3res.dll,-20000»[HKEY_LOCAL_MACHINEsystemcurrentcontrolsetservicessharedaccessparametersfirewallpolicydomainprofileauthorizedapplicationslist]
«%windir%system32sessmgr.exe»=»%windir%system32sessmgr.exe:*:enabled:@xpsp2res.dll,-22019»
«%windir%Network Diagnosticxpnetdiag.exe»=»%windir%Network Diagnosticxpnetdiag.exe:*:Enabled:@xpsp3res.dll,-20000»[HKEY_CURRENT_USERsoftwaremicrosoftwindowscurrentversionexplorermountpoints2{51f7a0ae-33be-11dd-b6fc-001cc031ef11}]
shellAutoRuncommand — D:LaunchU3.exe -a======List of files/folders created in the last 1 months======
2010-03-21 13:42:41 —-D—- H:Documents and SettingsLaraApplication DataUniblue
2010-03-21 13:42:34 —-D—- H:Program FilesUniblue
2010-03-21 12:32:28 —-D—- H:Documents and SettingsLaraApplication DataMalwarebytes
2010-03-21 12:32:24 —-D—- H:Program FilesMalwarebytes’ Anti-Malware
2010-03-21 12:32:24 —-D—- H:Documents and SettingsAll UsersApplication DataMalwarebytes
2010-03-19 13:26:16 —-D—- H:rsit
2010-03-19 13:26:16 —-D—- H:Program Filestrend micro
2010-03-19 12:47:12 —-D—- H:Program FilesKaspersky Lab
2010-03-19 12:47:12 —-D—- H:Documents and SettingsAll UsersApplication DataKaspersky Lab
2010-03-19 12:46:40 —-D—- H:Documents and SettingsAll UsersApplication DataKaspersky Lab Setup Files
2010-03-18 20:26:29 —-D—- H:Documents and SettingsLaraApplication DataArcaBit
2010-03-18 12:59:54 —-D—- H:Documents and SettingsLaraApplication DataeAcceleration
2010-03-18 12:59:35 —-D—- H:Program FilesAcceleration Software
2010-03-18 12:58:49 —-D—- H:Program FilesCommon FileseAcceleration
2010-03-18 12:58:49 —-D—- H:Documents and SettingsAll UsersApplication DataeAcceleration
2010-03-18 12:58:47 —-D—- H:Program FileseAcceleration
2010-03-18 12:58:45 —-D—- H:Program FilesStopSign
2010-03-18 12:02:09 —-D—- H:Documents and SettingsLaraApplication DataOnlineArmor
2010-03-18 12:02:09 —-D—- H:Documents and SettingsAll UsersApplication DataOnlineArmor
2010-03-18 12:01:53 —-D—- H:Program FilesTall Emu
2010-03-18 11:02:10 —-D—- H:Program FilesSkanerOnline======List of files/folders modified in the last 1 months======
2010-03-21 13:42:34 —-RD—- H:Program Files
2010-03-21 13:41:07 —-D—- H:Скачала
2010-03-21 13:02:36 —-D—- H:WINDOWSTemp
2010-03-21 13:01:54 —-D—- H:WINDOWStwain_32
2010-03-21 13:01:54 —-D—- H:WINDOWSsystem32drivers
2010-03-21 13:01:54 —-D—- H:WINDOWSsystem32
2010-03-21 13:01:14 —-A—- H:WINDOWSSchedLgU.Txt
2010-03-21 12:53:58 —-D—- H:WINDOWSPrefetch
2010-03-21 12:53:58 —-D—- H:WINDOWS
2010-03-19 12:47:39 —-SHD—- H:WINDOWSInstaller
2010-03-19 12:47:39 —-D—- H:Config.Msi
2010-03-19 12:47:26 —-HD—- H:WINDOWSinf
2010-03-19 12:47:23 —-D—- H:WINDOWSsystem32CatRoot2
2010-03-18 21:09:16 —-D—- H:Program FilesMozilla Firefox
2010-03-18 19:50:32 —-D—- H:WINDOWSWinSxS
2010-03-18 19:50:32 —-D—- H:Program FilesCommon FilesMicrosoft Shared
2010-03-18 14:59:17 —-A—- H:WINDOWSntbtlog.txt
2010-03-18 13:28:44 —-RSHDC—- H:WINDOWSsystem32dllcache
2010-03-18 13:28:38 —-A—- H:WINDOWSexplorer.exe
2010-03-18 13:17:03 —-D—- H:WINDOWSsystem32CatRoot
2010-03-18 13:14:06 —-D—- H:WINDOWSsystem32config
2010-03-18 13:13:55 —-D—- H:WINDOWSsystem32wbem
2010-03-18 13:13:55 —-D—- H:WINDOWSRegistration
2010-03-18 12:58:49 —-D—- H:Program FilesCommon Files
2010-03-18 11:44:30 —-A—- H:WINDOWSexplorer(2)(2).exe
2010-03-18 11:02:10 —-SD—- H:WINDOWSDownloaded Program Files
2010-03-18 10:15:32 —-A—- H:WINDOWSexplorer(2).exe======List of drivers (R=Running, S=Stopped, 0=Boot, 1=System, 2=Auto, 3=Demand, 4=Disabled)======
R1 intelppm;Драйвер Intel процессора; H:WINDOWSsystem32DRIVERSintelppm.sys [2008-04-15 40704]
R1 klif;Klif; ??H:WINDOWSsystem32driversklif.sys []
R1 StarOpen;StarOpen; H:WINDOWSsystem32driversStarOpen.sys [2008-06-30 5632]
R2 NwlnkIpx;NWLink IPX/SPX/NetBIOS-совместимый транспортный протокол; H:WINDOWSsystem32DRIVERSnwlnkipx.sys [2008-04-15 88320]
R2 NwlnkNb;NWLink NetBIOS; H:WINDOWSsystem32DRIVERSnwlnknb.sys [2008-04-15 63232]
R2 NwlnkSpx;Протокол NWLink SPX/SPXII; H:WINDOWSsystem32DRIVERSnwlnkspx.sys [2008-04-15 55936]
R3 Arp1394;Протокол клиента 1394 ARP; H:WINDOWSsystem32DRIVERSarp1394.sys [2008-04-15 60800]
R3 e1express;Intel(R) PRO/1000 PCI Express Network Connection Driver; H:WINDOWSsystem32DRIVERSe1e5132.sys [2007-09-17 254872]
R3 HDAudBus;Драйвер шины Microsoft UAA для High Definition Audio; H:WINDOWSsystem32DRIVERSHDAudBus.sys [2008-04-15 144384]
R3 HECI;Intel(R) Management Engine Interface; H:WINDOWSsystem32DRIVERSHECI.sys [2007-03-13 44672]
R3 IntcAzAudAddService;Service for Realtek HD Audio (WDM); H:WINDOWSsystem32driversRtkHDAud.sys [2007-09-17 4402176]
R3 klim5;Kaspersky Anti-Virus NDIS Filter; H:WINDOWSsystem32DRIVERSklim5.sys [2007-04-04 24344]
R3 NIC1394;Сетевой драйвер 1394; H:WINDOWSsystem32DRIVERSnic1394.sys [2008-04-15 61824]
R3 nv;nv; H:WINDOWSsystem32DRIVERSnv4_mini.sys [2009-11-21 10235968]
R3 NWRDR;NetWare Rdr; H:WINDOWSsystem32DRIVERSnwrdr.sys [2008-04-15 163584]
R3 pfc;Padus ASPI Shell; H:WINDOWSsystem32driverspfc.sys [2003-01-22 9856]
R3 SAA713x;Behold TV WDM Capture (SAA713x); H:WINDOWSsystem32DRIVERSsaa713x.sys [2007-04-10 186512]
R3 usbehci;Драйвер минипорта Microsoft USB 2.0 расширенного хост-контроллера; H:WINDOWSsystem32DRIVERSusbehci.sys [2008-04-15 30208]
R3 usbhub;USB2 концентратор; H:WINDOWSsystem32DRIVERSusbhub.sys [2008-04-15 59520]
R3 usbstor;Драйвер запоминающих устройств для USB; H:WINDOWSsystem32DRIVERSUSBSTOR.SYS [2008-04-15 26368]
R3 usbuhci;Драйвер минипорта Microsoft USB универсального хост-контроллера; H:WINDOWSsystem32DRIVERSusbuhci.sys [2008-04-15 20608]
S3 CCDECODE;Closed Caption декодер; H:WINDOWSsystem32DRIVERSCCDECODE.sys [2008-04-14 17024]
S3 MSTEE;Преобразователь потоков Tee/Sink-to-Sink Microsoft; H:WINDOWSsystem32driversMSTEE.sys [2008-04-14 5504]
S3 NABTSFEC;NABTS/FEC VBI кодек; H:WINDOWSsystem32DRIVERSNABTSFEC.sys [2008-04-14 85248]
S3 NdisIP;Microsoft видео или ТВ подключение; H:WINDOWSsystem32DRIVERSNdisIP.sys [2008-04-15 10880]
S3 SLIP;BDA Slip De-Framer; H:WINDOWSsystem32DRIVERSSLIP.sys [2008-04-15 11136]
S3 ss_bus;SAMSUNG Mobile USB Device 1.0 driver (WDM); H:WINDOWSsystem32DRIVERSss_bus.sys [2005-08-30 58320]
S3 ss_mdfl;SAMSUNG Mobile USB Modem 1.0 Filter; H:WINDOWSsystem32DRIVERSss_mdfl.sys [2005-08-30 8304]
S3 ss_mdm;SAMSUNG Mobile USB Modem 1.0 Drivers; H:WINDOWSsystem32DRIVERSss_mdm.sys [2005-08-30 94000]
S3 streamip;BDA IPSink; H:WINDOWSsystem32DRIVERSStreamIP.sys [2008-04-15 15232]
S3 usbscan;Драйвер USB-сканера; H:WINDOWSsystem32DRIVERSusbscan.sys [2008-04-14 15104]
S3 WSTCODEC;World Standard Teletext кодек; H:WINDOWSsystem32DRIVERSWSTCODEC.SYS [2008-04-14 19200]
S3 WudfPf;Windows Driver Foundation — User-mode Driver Framework Platform Driver; H:WINDOWSsystem32DRIVERSWudfPf.sys [2006-09-28 77568]
S3 WudfRd;Windows Driver Foundation — User-mode Driver Framework Reflector; H:WINDOWSsystem32DRIVERSwudfrd.sys [2006-09-28 82944]
S4 dwshd;dwshd; H:WINDOWSSystem32driversdwshd.sys []
S4 IntelIde;IntelIde; H:WINDOWSsystem32driversIntelIde.sys []
S4 WS2IFSL;Среда Windows Socket 2.0 поддержки поставщиков не-IFS служб; H:WINDOWSSystem32driversws2ifsl.sys [2008-04-15 12032]======List of services (R=Running, S=Stopped, 0=Boot, 1=System, 2=Auto, 3=Demand, 4=Disabled)======
R2 NVSvc;NVIDIA Display Driver Service; H:WINDOWSsystem32nvsvc32.exe [2009-11-20 154216]
R2 NWCWorkstation;Клиент для сетей NetWare; H:WINDOWSsystem32svchost.exe [2010-02-01 14336]
R2 PnkBstrA;PnkBstrA; H:WINDOWSsystem32PnkBstrA.exe [2008-12-05 66872]
S2 AVP;Kaspersky Internet Security 7.0; H:Program FilesKaspersky LabKaspersky Internet Security 7.0avp.exe [2007-06-28 218376]
S2 UxTuneUp;TuneUp Theme Extension; H:WINDOWSSystem32svchost.exe [2010-02-01 14336]
S3 gusvc;Google Updater Service; H:Program FilesGoogleCommonGoogle UpdaterGoogleUpdaterService.exe [2008-06-06 138168]
S3 IDriverT;InstallDriver Table Manager; H:Program FilesCommon FilesInstallShieldDriver11Intel 32IDriverT.exe [2005-04-04 69632]
S3 ose;Office Source Engine; H:Program FilesCommon FilesMicrosoft SharedSource EngineOSE.EXE [2003-07-28 89136]
S3 TuneUp.Defrag;TuneUp Drive Defrag Service; H:WINDOWSSystem32TuneUpDefragService.exe [2008-07-08 355584]
S3 WMPNetworkSvc;Служба общих сетевых ресурсов проигрывателя Windows Media; H:Program FilesWindows Media PlayerWMPNetwk.exe [2006-11-02 914944]
S3 WudfSvc;Windows Driver Foundation — User-mode Driver Framework; H:WINDOWSsystem32svchost.exe [2010-02-01 14336]
EOF
Удалось скачать Malwarebytes Anti-Malware на этом сайте
http://www.softportal.com/get-8038-malwarebytes-anti-malware.html
Открывает только вторую и третью ссылки, после установки обновился до версии 3890, при сканировании найдено 45 вирусов, вот отчет:
Malwarebytes’ Anti-Malware 1.44
Версия базы данных: 3890
Windows 5.1.2600 Service Pack 3
Internet Explorer 6.0.2900.551221.03.2010 12:50:15
mbam-log-2010-03-21 (12-49-45).txtТип проверки: Полная (H:|)
Проверено объектов: 183202
Прошло времени: 14 minute(s), 55 second(s)Заражено процессов в памяти: 0
Заражено модулей в памяти: 1
Заражено ключей реестра: 5
Заражено значений реестра: 14
Заражено параметров реестра: 12
Заражено папок: 5
Заражено файлов: 17Заражено процессов в памяти:
(Вредоносные программы не обнаружены)Заражено модулей в памяти:
H:WINDOWSsystem32ijao.wto (Backdoor.Bot) -> No action taken.Заражено ключей реестра:
HKEY_CURRENT_USERSOFTWAREMicrosoftWindowsCurrentVersionExtStats{fffc57db-1de3-4303-b24d-cee6dcdd3d86} (Adware.MyCentria) -> No action taken.
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionFci (Rootkit.Agent) -> No action taken.
HKEY_LOCAL_MACHINESOFTWAREMyCentria (Adware.MyCentria) -> No action taken.
HKEY_LOCAL_MACHINESystemCurrentControlSetServicesfci (Rootkit.Agent) -> No action taken.
HKEY_CLASSES_ROOTidid (Trojan.Sasfix) -> No action taken.Заражено значений реестра:
HKEY_USERS.DEFAULTSOFTWAREMicrosoftWindowsCurrentVersionExplorer{02ffac45-0b10-5633-4296-1801f1a36678} (Trojan.Agent) -> No action taken.
HKEY_USERS.DEFAULTSOFTWAREMicrosoftWindowsCurrentVersionExplorer{f710fa10-2031-3106-8872-93a2b5c5c620} (Trojan.Agent) -> No action taken.
HKEY_USERSS-1-5-18SOFTWAREMicrosoftWindowsCurrentVersionExplorer{02ffac45-0b10-5633-4296-1801f1a36678} (Trojan.Agent) -> No action taken.
HKEY_USERSS-1-5-18SOFTWAREMicrosoftWindowsCurrentVersionExplorer{f710fa10-2031-3106-8872-93a2b5c5c620} (Trojan.Agent) -> No action taken.
HKEY_LOCAL_MACHINESOFTWAREMicrosoftoption_1 (Rootkit.Agent) -> No action taken.
HKEY_LOCAL_MACHINESOFTWAREMicrosoftoption_2 (Rootkit.Agent) -> No action taken.
HKEY_LOCAL_MACHINESOFTWAREMicrosoftoption_3 (Rootkit.Agent) -> No action taken.
HKEY_CURRENT_USERSOFTWAREMicrosoftWindowsCurrentVersionPoliciesExplorerRunuserini (Trojan.Agent) -> No action taken.
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionPoliciesExplorerRunuserini (Trojan.Agent) -> No action taken.
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionRunntfs_ext_drv (Trojan.Qhost) -> No action taken.
HKEY_CURRENT_USERSOFTWAREMicrosoftInternet ExplorerDesktophost (Malware.Trace) -> No action taken.
HKEY_CURRENT_USERSOFTWAREMicrosoftInternet ExplorerDesktopid (Malware.Trace) -> No action taken.
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionNetworkuid (Malware.Trace) -> No action taken.
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionServicesdel (Malware.Trace) -> No action taken.Заражено параметров реестра:
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionWinlogonSystem (Rootkit.DNSChanger.H) -> Data: kdegk.exe -> No action taken.
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionWinlogonShell (Hijack.Shell) -> Bad: (Explorer.exe rundll32.exe ijao.wto bqaoutd) Good: (Explorer.exe) -> No action taken.
HKEY_LOCAL_MACHINESOFTWAREMicrosoftSecurity CenterAntiVirusDisableNotify (Disabled.SecurityCenter) -> Bad: (1) Good: (0) -> No action taken.
HKEY_LOCAL_MACHINESOFTWAREMicrosoftSecurity CenterFirewallDisableNotify (Disabled.SecurityCenter) -> Bad: (1) Good: (0) -> No action taken.
HKEY_LOCAL_MACHINESOFTWAREMicrosoftSecurity CenterUpdatesDisableNotify (Disabled.SecurityCenter) -> Bad: (1) Good: (0) -> No action taken.
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTcpipParametersNameServer (Trojan.DNSChanger) -> Data: 85.255.113.131 85.255.112.88 -> No action taken.
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTcpipParametersInterfaces{71744d08-e001-4a19-a801-3d2c13ee65ee}DhcpNameServer (Trojan.DNSChanger) -> Data: 85.255.113.131,85.255.112.88 -> No action taken.
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTcpipParametersInterfaces{71744d08-e001-4a19-a801-3d2c13ee65ee}NameServer (Trojan.DNSChanger) -> Data: 85.255.113.131,85.255.112.88 -> No action taken.
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTcpipParametersInterfaces{93d59683-f6f9-46e0-8e7f-ad6a4bdc55e2}DhcpNameServer (Trojan.DNSChanger) -> Data: 85.255.113.131,85.255.112.88 -> No action taken.
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTcpipParametersInterfaces{9f2ba7ed-9cca-4224-9bd8-84901a0a5e6c}DhcpNameServer (Trojan.DNSChanger) -> Data: 85.255.113.131,85.255.112.88 -> No action taken.
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTcpipParametersInterfaces{9f2ba7ed-9cca-4224-9bd8-84901a0a5e6c}NameServer (Trojan.DNSChanger) -> Data: 85.255.113.131,85.255.112.88 -> No action taken.
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTcpipParametersInterfaces{eaa07340-8f9b-4c88-bd86-0522a8451ba3}NameServer (Trojan.DNSChanger) -> Data: 85.255.113.131,85.255.112.88 -> No action taken.Заражено папок:
H:Documents and SettingsAll UsersApplication Data11871254 (Rogue.Multiple) -> No action taken.
H:WINDOWSsystem32wsnpoem (Trojan.Agent) -> No action taken.
H:Program FilesMyCentria (Adware.MyCentria) -> No action taken.
H:Program FilesMyCentriaFirefox (Adware.MyCentria) -> No action taken.
H:Program FilesMyCentriaInfoBar (Adware.MyCentria) -> No action taken.Заражено файлов:
H:WINDOWSsystem32ijao.wto (Backdoor.Bot) -> No action taken.
H:Documents and SettingsLaraLocal SettingsTemporary Internet FilesContent.IE581KN81MPlol[1].exe (Trojan.Dropper) -> No action taken.
H:System Volume Information_restore{257E36A7-0651-404E-B57D-41363E2C9655}RP43A0005159.exe (Backdoor.Bot) -> No action taken.
H:WINDOWSsystem32loqk.pso (Backdoor.Bot) -> No action taken.
H:Documents and SettingsAll UsersApplication Data1187125411871254 (Rogue.Multiple) -> No action taken.
H:Documents and SettingsAll UsersApplication Data11871254pc11871254ins (Rogue.Multiple) -> No action taken.
H:WINDOWSsystem32wsnpoemaudio.dll (Trojan.Agent) -> No action taken.
H:WINDOWSsystem32wsnpoemvideo.dll (Trojan.Agent) -> No action taken.
H:Program FilesCommon Fileskeylog.txt (Malware.Trace) -> No action taken.
H:Documents and SettingsLaraApplication Datawiaserva.log (Malware.Trace) -> No action taken.
H:WINDOWSsystem32_id.dat (Malware.Trace) -> No action taken.
H:WINDOWSsystem32k86.bin (Fake.Dropped.Malware) -> No action taken.
H:WINDOWSsystem32svcp.csv (Malware.Trace) -> No action taken.
H:WINDOWSsystem32winsub.xml (Malware.Trace) -> No action taken.
H:WINDOWSmsvecurity.config (Worm.Zhelatin) -> No action taken.
H:WINDOWSPrefetchEXPLORER.EXE (Trojan.Agent) -> No action taken.
H:WINDOWSsystem32winlogon.Del (Heuristics.Reserved.Word.Exploit) -> No action taken.После удаления отчет выглядит следющим образом:
Malwarebytes’ Anti-Malware 1.44
Версия базы данных: 3890
Windows 5.1.2600 Service Pack 3
Internet Explorer 6.0.2900.551221.03.2010 12:53:58
mbam-log-2010-03-21 (12-53-58).txtТип проверки: Полная (H:|)
Проверено объектов: 183202
Прошло времени: 14 minute(s), 55 second(s)Заражено процессов в памяти: 0
Заражено модулей в памяти: 1
Заражено ключей реестра: 5
Заражено значений реестра: 14
Заражено параметров реестра: 12
Заражено папок: 5
Заражено файлов: 17Заражено процессов в памяти:
(Вредоносные программы не обнаружены)Заражено модулей в памяти:
H:WINDOWSsystem32ijao.wto (Backdoor.Bot) -> Delete on reboot.Заражено ключей реестра:
HKEY_CURRENT_USERSOFTWAREMicrosoftWindowsCurrentVersionExtStats{fffc57db-1de3-4303-b24d-cee6dcdd3d86} (Adware.MyCentria) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionFci (Rootkit.Agent) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESOFTWAREMyCentria (Adware.MyCentria) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESystemCurrentControlSetServicesfci (Rootkit.Agent) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOTidid (Trojan.Sasfix) -> Quarantined and deleted successfully.Заражено значений реестра:
HKEY_USERS.DEFAULTSOFTWAREMicrosoftWindowsCurrentVersionExplorer{02ffac45-0b10-5633-4296-1801f1a36678} (Trojan.Agent) -> Quarantined and deleted successfully.
HKEY_USERS.DEFAULTSOFTWAREMicrosoftWindowsCurrentVersionExplorer{f710fa10-2031-3106-8872-93a2b5c5c620} (Trojan.Agent) -> Quarantined and deleted successfully.
HKEY_USERSS-1-5-18SOFTWAREMicrosoftWindowsCurrentVersionExplorer{02ffac45-0b10-5633-4296-1801f1a36678} (Trojan.Agent) -> Quarantined and deleted successfully.
HKEY_USERSS-1-5-18SOFTWAREMicrosoftWindowsCurrentVersionExplorer{f710fa10-2031-3106-8872-93a2b5c5c620} (Trojan.Agent) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESOFTWAREMicrosoftoption_1 (Rootkit.Agent) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESOFTWAREMicrosoftoption_2 (Rootkit.Agent) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESOFTWAREMicrosoftoption_3 (Rootkit.Agent) -> Quarantined and deleted successfully.
HKEY_CURRENT_USERSOFTWAREMicrosoftWindowsCurrentVersionPoliciesExplorerRunuserini (Trojan.Agent) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionPoliciesExplorerRunuserini (Trojan.Agent) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionRunntfs_ext_drv (Trojan.Qhost) -> Quarantined and deleted successfully.
HKEY_CURRENT_USERSOFTWAREMicrosoftInternet ExplorerDesktophost (Malware.Trace) -> Quarantined and deleted successfully.
HKEY_CURRENT_USERSOFTWAREMicrosoftInternet ExplorerDesktopid (Malware.Trace) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionNetworkuid (Malware.Trace) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionServicesdel (Malware.Trace) -> Quarantined and deleted successfully.Заражено параметров реестра:
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionWinlogonSystem (Rootkit.DNSChanger.H) -> Data: kdegk.exe -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionWinlogonShell (Hijack.Shell) -> Bad: (Explorer.exe rundll32.exe ijao.wto bqaoutd) Good: (Explorer.exe) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESOFTWAREMicrosoftSecurity CenterAntiVirusDisableNotify (Disabled.SecurityCenter) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESOFTWAREMicrosoftSecurity CenterFirewallDisableNotify (Disabled.SecurityCenter) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESOFTWAREMicrosoftSecurity CenterUpdatesDisableNotify (Disabled.SecurityCenter) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTcpipParametersNameServer (Trojan.DNSChanger) -> Data: 85.255.113.131 85.255.112.88 -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTcpipParametersInterfaces{71744d08-e001-4a19-a801-3d2c13ee65ee}DhcpNameServer (Trojan.DNSChanger) -> Data: 85.255.113.131,85.255.112.88 -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTcpipParametersInterfaces{71744d08-e001-4a19-a801-3d2c13ee65ee}NameServer (Trojan.DNSChanger) -> Data: 85.255.113.131,85.255.112.88 -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTcpipParametersInterfaces{93d59683-f6f9-46e0-8e7f-ad6a4bdc55e2}DhcpNameServer (Trojan.DNSChanger) -> Data: 85.255.113.131,85.255.112.88 -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTcpipParametersInterfaces{9f2ba7ed-9cca-4224-9bd8-84901a0a5e6c}DhcpNameServer (Trojan.DNSChanger) -> Data: 85.255.113.131,85.255.112.88 -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTcpipParametersInterfaces{9f2ba7ed-9cca-4224-9bd8-84901a0a5e6c}NameServer (Trojan.DNSChanger) -> Data: 85.255.113.131,85.255.112.88 -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTcpipParametersInterfaces{eaa07340-8f9b-4c88-bd86-0522a8451ba3}NameServer (Trojan.DNSChanger) -> Data: 85.255.113.131,85.255.112.88 -> Quarantined and deleted successfully.Заражено папок:
H:Documents and SettingsAll UsersApplication Data11871254 (Rogue.Multiple) -> Quarantined and deleted successfully.
H:WINDOWSsystem32wsnpoem (Trojan.Agent) -> Quarantined and deleted successfully.
H:Program FilesMyCentria (Adware.MyCentria) -> Quarantined and deleted successfully.
H:Program FilesMyCentriaFirefox (Adware.MyCentria) -> Quarantined and deleted successfully.
H:Program FilesMyCentriaInfoBar (Adware.MyCentria) -> Quarantined and deleted successfully.Заражено файлов:
H:WINDOWSsystem32ijao.wto (Backdoor.Bot) -> Delete on reboot.
H:Documents and SettingsLaraLocal SettingsTemporary Internet FilesContent.IE581KN81MPlol[1].exe (Trojan.Dropper) -> Quarantined and deleted successfully.
H:System Volume Information_restore{257E36A7-0651-404E-B57D-41363E2C9655}RP43A0005159.exe (Backdoor.Bot) -> Quarantined and deleted successfully.
H:WINDOWSsystem32loqk.pso (Backdoor.Bot) -> Quarantined and deleted successfully.
H:Documents and SettingsAll UsersApplication Data1187125411871254 (Rogue.Multiple) -> Quarantined and deleted successfully.
H:Documents and SettingsAll UsersApplication Data11871254pc11871254ins (Rogue.Multiple) -> Quarantined and deleted successfully.
H:WINDOWSsystem32wsnpoemaudio.dll (Trojan.Agent) -> Quarantined and deleted successfully.
H:WINDOWSsystem32wsnpoemvideo.dll (Trojan.Agent) -> Quarantined and deleted successfully.
H:Program FilesCommon Fileskeylog.txt (Malware.Trace) -> Quarantined and deleted successfully.
H:Documents and SettingsLaraApplication Datawiaserva.log (Malware.Trace) -> Quarantined and deleted successfully.
H:WINDOWSsystem32_id.dat (Malware.Trace) -> Quarantined and deleted successfully.
H:WINDOWSsystem32k86.bin (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
H:WINDOWSsystem32svcp.csv (Malware.Trace) -> Quarantined and deleted successfully.
H:WINDOWSsystem32winsub.xml (Malware.Trace) -> Quarantined and deleted successfully.
H:WINDOWSmsvecurity.config (Worm.Zhelatin) -> Quarantined and deleted successfully.
H:WINDOWSPrefetchEXPLORER.EXE (Trojan.Agent) -> Quarantined and deleted successfully.
H:WINDOWSsystem32winlogon.Del (Heuristics.Reserved.Word.Exploit) -> Quarantined and deleted successfully.При этом выдал информацию, что «все элементы, которые не могут быть далены добавлены в список удаления при перезегрузке. Отдет сохранен в папку отчетов: HWINDOWSsistem32ijao.wto
Однако, после перезагрузки система сообщила, что файл ijao.wto не найден. Проблема не решена, на сайты антивирусов, в т.ч. Malwarebytes Anti-Malware по Вашим ссылкам зайти по-прежнему не могу.Еще раз просканировала, вот отчет
Malwarebytes’ Anti-Malware 1.44
Версия базы данных: 3890
Windows 5.1.2600 Service Pack 3
Internet Explorer 6.0.2900.551221.03.2010 13:22:26
mbam-log-2010-03-21 (13-22-26).txtТип проверки: Полная (H:|)
Проверено объектов: 183270
Прошло времени: 14 minute(s), 33 second(s)Заражено процессов в памяти: 0
Заражено модулей в памяти: 0
Заражено ключей реестра: 0
Заражено значений реестра: 0
Заражено параметров реестра: 0
Заражено папок: 0
Заражено файлов: 0Заражено процессов в памяти:
(Вредоносные программы не обнаружены)Заражено модулей в памяти:
(Вредоносные программы не обнаружены)Заражено ключей реестра:
(Вредоносные программы не обнаружены)Заражено значений реестра:
(Вредоносные программы не обнаружены)Заражено параметров реестра:
(Вредоносные программы не обнаружены)Заражено папок:
(Вредоносные программы не обнаружены)Заражено файлов:
(Вредоносные программы не обнаружены)И следующий:
Logfile of random’s system information tool 1.06 (written by random/random)
Run by Lara at 2010-03-19 13:26:16
Microsoft Windows XP Professional Service Pack 3
System drive H: has 170 GB (71%) free of 238 GB
Total RAM: 2029 MB (75% free)Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 13:26:31, on 19.03.2010
Platform: Windows XP SP3 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP3 (6.00.2900.5512)
Boot mode: NormalRunning processes:
H:WINDOWSSystem32smss.exe
H:WINDOWSsystem32winlogon.exe
H:WINDOWSsystem32services.exe
H:WINDOWSsystem32lsass.exe
H:WINDOWSsystem32nvsvc32.exe
H:WINDOWSsystem32svchost.exe
H:WINDOWSSystem32svchost.exe
H:WINDOWSsystem32spoolsv.exe
H:WINDOWSExplorer.exe
H:Program FilesWinampwinampa.exe
H:WINDOWSsystem32svchost.exe
H:WINDOWSsystem32PnkBstrA.exe
H:WINDOWSsystem32svchost.exe
H:WINDOWSRTHDCPL.EXE
H:WINDOWSsystem32RUNDLL32.EXE
H:WINDOWSsystem32ctfmon.exe
H:Program FilesGoogleGoogleToolbarNotifierGoogleToolbarNotifier.exe
H:Program FilesElectronic ArtsEADMCore.exe
H:Program FilesICQ6ICQ.exe
H:Program FilesInterVideoCommonBinWinCinemaMgr.exe
H:Program FilesOperaopera.exe
H:СкачалаPSIT (сканер)RSIT.exe
H:Program Filestrend microLara.exeR0 — HKCUSoftwareMicrosoftInternet ExplorerMain,Start Page = http://www.yandex.ru/?clid=135293
R0 — HKCUSoftwareMicrosoftInternet ExplorerToolbar,LinksFolderName = Ссылки
R3 — URLSearchHook: DefaultSearchHook Class — {C94E154B-1459-4A47-966B-4B843BEFC7DB} — H:Program FilesAskSearchbinDefaultSearch.dll
F2 — REG:system.ini: Shell=Explorer.exe rundll32.exe ijao.wto bqaoutd
O2 — BHO: AskBar BHO — {201f27d4-3704-41d6-89c1-aa35e39143ed} — H:Program FilesAskBarDisbarbinaskBar.dll
O3 — Toolbar: Ask Toolbar — {3041d03e-fd4b-44e0-b742-2d9b88305f98} — H:Program FilesAskBarDisbarbinaskBar.dll
O3 — Toolbar: Яндекс.Бар — {91397D20-1446-11D4-8AF4-0040CA1127B6} — H:Program FilesYandexYandexBarIEyndbar.dll
O4 — HKLM..Run: [WinampAgent] «H:Program FilesWinampwinampa.exe»
O4 — HKLM..Run: [NeroFilterCheck] H:WINDOWSsystem32NeroCheck.exe
O4 — HKLM..Run: [NTFS_ext_drv] \?globalrootsystemrootsystem32ntfs_ext7.exe
O4 — HKLM..Run: [RTHDCPL] RTHDCPL.EXE
O4 — HKLM..Run: [Alcmtr] ALCMTR.EXE
O4 — HKLM..Run: [NvMediaCenter] RUNDLL32.EXE H:WINDOWSsystem32NvMcTray.dll,NvTaskbarInit
O4 — HKLM..Run: [NvCplDaemon] RUNDLL32.EXE H:WINDOWSsystem32NvCpl.dll,NvStartup
O4 — HKLM..Run: [AVP] «H:Program FilesKaspersky LabKaspersky Internet Security 7.0avp.exe»
O4 — HKCU..Run: [CTFMON.EXE] H:WINDOWSsystem32ctfmon.exe
O4 — HKCU..Run: [swg] H:Program FilesGoogleGoogleToolbarNotifierGoogleToolbarNotifier.exe
O4 — HKCU..Run: [DAEMON Tools Lite] «H:Program FilesDAEMON Tools Litedaemon.exe» -autorun
O4 — HKCU..Run: [EA Core] H:Program FilesElectronic ArtsEADMCore.exe -silent
O4 — HKCU..Run: [ICQ] «H:Program FilesICQ6ICQ.exe» silent
O4 — HKLM..PoliciesExplorerRun: [userini] H:WINDOWSsystem32userini.exe
O4 — HKCU..PoliciesExplorerRun: [userini] H:WINDOWSsystem32userini.exe
O4 — HKUSS-1-5-19..Run: [CTFMON.EXE] H:WINDOWSsystem32CTFMON.EXE (User ‘LOCAL SERVICE’)
O4 — HKUSS-1-5-20..Run: [CTFMON.EXE] H:WINDOWSsystem32CTFMON.EXE (User ‘NETWORK SERVICE’)
O4 — HKUSS-1-5-18..Run: [CTFMON.EXE] H:WINDOWSsystem32CTFMON.EXE (User ‘SYSTEM’)
O4 — HKUS.DEFAULT..Run: [CTFMON.EXE] H:WINDOWSsystem32CTFMON.EXE (User ‘Default user’)
O4 — Startup: Need for Speed™ Undercover — регистрация.lnk = H:Program FilesEA GamesNeed for Speed UndercoverSupportEAregister.exe
O4 — Global Startup: InterVideo WinCinema Manager.lnk = H:Program FilesInterVideoCommonBinWinCinemaMgr.exe
O8 — Extra context menu item: &Экспорт в Microsoft Excel — res://H:PROGRA~1MICROS~2OFFICE11EXCEL.EXE/3000
O9 — Extra button: Cтатистика Веб-Антивируса — {1F460357-8A94-4D71-9CA3-AA4ACF32ED8E} — H:Program FilesKaspersky LabKaspersky Internet Security 7.0SCIEPlgn.dll
O9 — Extra button: (no name) — {e2e2dd38-d088-4134-82b7-f2ba38496583} — H:WINDOWSNetwork Diagnosticxpnetdiag.exe
O9 — Extra ‘Tools’ menuitem: @xpsp3res.dll,-20001 — {e2e2dd38-d088-4134-82b7-f2ba38496583} — H:WINDOWSNetwork Diagnosticxpnetdiag.exe
O9 — Extra button: Messenger — {FB5F1910-F110-11d2-BB9E-00C04F795683} — H:Program FilesMessengermsmsgs.exe
O9 — Extra ‘Tools’ menuitem: Windows Messenger — {FB5F1910-F110-11d2-BB9E-00C04F795683} — H:Program FilesMessengermsmsgs.exe
O10 — Unknown file in Winsock LSP: h:windowssystem32nwprovau.dll
O16 — DPF: {CF40ACC5-E1BB-4AFF-AC72-04C2F616BCA7} (get_atlcom Class) — http://www.adobe.com/products/acrobat/nos/gp.cab
O17 — HKLMSystemCCSServicesTcpip..{71744D08-E001-4A19-A801-3D2C13EE65EE}: NameServer = 85.255.113.131,85.255.112.88
O17 — HKLMSystemCCSServicesTcpip..{83BA463A-BA45-4AC5-8D4C-EB3B293904AB}: NameServer = 212.188.4.10 195.34.32.116
O17 — HKLMSystemCCSServicesTcpip..{9F2BA7ED-9CCA-4224-9BD8-84901A0A5E6C}: NameServer = 85.255.113.131,85.255.112.88
O17 — HKLMSystemCCSServicesTcpip..{EAA07340-8F9B-4C88-BD86-0522A8451BA3}: NameServer = 85.255.113.131,85.255.112.88
O17 — HKLMSystemCS1ServicesTcpipParameters: NameServer = 85.255.113.131 85.255.112.88
O17 — HKLMSystemCS2ServicesTcpipParameters: NameServer = 85.255.113.131 85.255.112.88
O17 — HKLMSystemCS3ServicesTcpipParameters: NameServer = 85.255.113.131 85.255.112.88
O17 — HKLMSystemCCSServicesTcpipParameters: NameServer = 85.255.113.131 85.255.112.88
O20 — AppInit_DLLs: H:PROGRA~1KASPER~1KASPER~1.0adialhk.dll
O23 — Service: Kaspersky Internet Security 7.0 (AVP) — Kaspersky Lab — H:Program FilesKaspersky LabKaspersky Internet Security 7.0avp.exe
O23 — Service: Журнал событий (Eventlog) — Корпорация Майкрософт — H:WINDOWSsystem32services.exe
O23 — Service: FCI — Unknown owner — H:WINDOWSsystem32svchost.exe:ext.exe (file missing)
O23 — Service: Google Updater Service (gusvc) — Google — H:Program FilesGoogleCommonGoogle UpdaterGoogleUpdaterService.exe
O23 — Service: InstallDriver Table Manager (IDriverT) — Macrovision Corporation — H:Program FilesCommon FilesInstallShieldDriver11Intel 32IDriverT.exe
O23 — Service: Служба COM записи компакт-дисков IMAPI (ImapiService) — Корпорация Майкрософт — H:WINDOWSsystem32imapi.exe
O23 — Service: NetMeeting Remote Desktop Sharing (mnmsrvc) — Корпорация Майкрософт — H:WINDOWSsystem32mnmsrvc.exe
O23 — Service: NVIDIA Display Driver Service (NVSvc) — NVIDIA Corporation — H:WINDOWSsystem32nvsvc32.exe
O23 — Service: Plug and Play (PlugPlay) — Корпорация Майкрософт — H:WINDOWSsystem32services.exe
O23 — Service: PnkBstrA — Unknown owner — H:WINDOWSsystem32PnkBstrA.exe
O23 — Service: Диспетчер сеанса справки для удаленного рабочего стола (RDSessMgr) — Корпорация Майкрософт — H:WINDOWSsystem32sessmgr.exe
O23 — Service: Смарт-карты (SCardSvr) — Корпорация Майкрософт — H:WINDOWSSystem32SCardSvr.exe
O23 — Service: Журналы и оповещения производительности (SysmonLog) — Корпорация Майкрософт — H:WINDOWSsystem32smlogsvc.exe
O23 — Service: TuneUp Drive Defrag Service (TuneUp.Defrag) — TuneUp Software GmbH — H:WINDOWSSystem32TuneUpDefragService.exe
O23 — Service: Теневое копирование тома (VSS) — Корпорация Майкрософт — H:WINDOWSSystem32vssvc.exe
O23 — Service: Адаптер производительности WMI (WmiApSrv) — Корпорация Майкрософт — H:WINDOWSsystem32wbemwmiapsrv.exe—
End of file — 7341 bytes======Scheduled tasks folder======
H:WINDOWStasks1-Click Maintenance.job
======Registry dump======
[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionExplorerBrowser Helper Objects{201f27d4-3704-41d6-89c1-aa35e39143ed}]
AskBar BHO — H:Program FilesAskBarDisbarbinaskBar.dll [2008-08-26 279944][HKEY_LOCAL_MACHINESOFTWAREMicrosoftInternet ExplorerToolbar]
{3041d03e-fd4b-44e0-b742-2d9b88305f98} — Ask Toolbar — H:Program FilesAskBarDisbarbinaskBar.dll [2008-08-26 279944]
{91397D20-1446-11D4-8AF4-0040CA1127B6} — Яндекс.Бар — H:Program FilesYandexYandexBarIEyndbar.dll [2009-07-24 5586208][HKEY_LOCAL_MACHINESoftwareMicrosoftWindowsCurrentVersionRun]
«WinampAgent»=H:Program FilesWinampwinampa.exe [2008-04-01 36352]
«NeroFilterCheck»=H:WINDOWSsystem32NeroCheck.exe [2001-07-09 155648]
«NTFS_ext_drv»=\?globalrootsystemrootsystem32ntfs_ext7.exe []
«RTHDCPL»=H:WINDOWSRTHDCPL.EXE [2007-09-17 16132608]
«Alcmtr»=H:WINDOWSALCMTR.EXE [2007-09-17 69632]
«NvMediaCenter»=H:WINDOWSsystem32NvMcTray.dll [2009-11-20 110184]
«NvCplDaemon»=H:WINDOWSsystem32NvCpl.dll [2009-11-20 12669544]
«AVP»=H:Program FilesKaspersky LabKaspersky Internet Security 7.0avp.exe [2007-06-28 218376][HKEY_LOCAL_MACHINESoftwareMicrosoftWindowsCurrentVersionPoliciesExplorerRun]
«userini»=H:WINDOWSsystem32userini.exe [][HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionRun]
«CTFMON.EXE»=H:WINDOWSsystem32ctfmon.exe [2008-04-15 15360]
«swg»=H:Program FilesGoogleGoogleToolbarNotifierGoogleToolbarNotifier.exe [2008-07-10 68856]
«DAEMON Tools Lite»=H:Program FilesDAEMON Tools Litedaemon.exe [2008-07-24 490952]
«EA Core»=H:Program FilesElectronic ArtsEADMCore.exe [2008-07-22 2772992]
«ICQ»=H:Program FilesICQ6ICQ.exe [2008-09-01 173304][HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionPoliciesExplorerRun]
«userini»=H:WINDOWSsystem32userini.exe []H:Documents and SettingsAll UsersГлавное менюПрограммыАвтозагрузка
InterVideo WinCinema Manager.lnk — H:Program FilesInterVideoCommonBinWinCinemaMgr.exeH:Documents and SettingsLaraГлавное менюПрограммыАвтозагрузка
Need for Speed™ Undercover — регистрация.lnk — H:Program FilesEA GamesNeed for Speed UndercoverSupportEAregister.exe[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionWindows]
«AppInit_DLLS»=»H:PROGRA~1KASPER~1KASPER~1.0adialhk.dll»[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionWinlogonNotifyklogon]
H:WINDOWSsystem32klogon.dll [2007-06-28 206088][HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionShellServiceObjectDelayLoad]
WPDShServiceObj — {AAA288BA-9A4C-45B0-95D7-94D524869DB5} — H:WINDOWSsystem32WPDShServiceObj.dll [2006-10-18 133632]HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionWinlogon
«system»=kdegk.exe [][HKEY_LOCAL_MACHINESYSTEMCurrentControlSetControlLsa]
«authentication packages»=msv1_0
nwprovau[HKEY_LOCAL_MACHINESoftwareMicrosoftWindowsCurrentVersionPoliciesSystem]
«dontdisplaylastusername»=0
«legalnoticecaption»=
«legalnoticetext»=
«shutdownwithoutlogon»=1
«undockwithoutlogon»=1[HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionPoliciesexplorer]
«NoDriveTypeAutoRun»=145[HKEY_LOCAL_MACHINEsystemcurrentcontrolsetservicessharedaccessparametersfirewallpolicystandardprofileauthorizedapplicationslist]
«%windir%system32sessmgr.exe»=»%windir%system32sessmgr.exe:*:enabled:@xpsp2res.dll,-22019»
«H:Program FilesICQ6ICQ.exe»=»H:Program FilesICQ6ICQ.exe:*:Enabled:ICQ6»
«H:WINDOWSsystem32rundll32.exe»=»H:WINDOWSsystem32rundll32.exe:*:Enabled:rundll32»
«??H:WINDOWSsystem32winlogon.exe»=»??H:WINDOWSsystem32winlogon.exe:*:Enabled:rundll32″
«%windir%Network Diagnosticxpnetdiag.exe»=»%windir%Network Diagnosticxpnetdiag.exe:*:Enabled:@xpsp3res.dll,-20000»[HKEY_LOCAL_MACHINEsystemcurrentcontrolsetservicessharedaccessparametersfirewallpolicydomainprofileauthorizedapplicationslist]
«%windir%system32sessmgr.exe»=»%windir%system32sessmgr.exe:*:enabled:@xpsp2res.dll,-22019»
«%windir%Network Diagnosticxpnetdiag.exe»=»%windir%Network Diagnosticxpnetdiag.exe:*:Enabled:@xpsp3res.dll,-20000»[HKEY_CURRENT_USERsoftwaremicrosoftwindowscurrentversionexplorermountpoints2{51f7a0ae-33be-11dd-b6fc-001cc031ef11}]
shellAutoRuncommand — D:LaunchU3.exe -a======List of files/folders created in the last 1 months======
2010-03-19 13:26:16 —-D—- H:rsit
2010-03-19 13:26:16 —-D—- H:Program Filestrend micro
2010-03-19 12:47:24 —-D—- H:WINDOWSLastGood
2010-03-19 12:47:12 —-D—- H:Program FilesKaspersky Lab
2010-03-19 12:47:12 —-D—- H:Documents and SettingsAll UsersApplication DataKaspersky Lab
2010-03-19 12:46:40 —-D—- H:Documents and SettingsAll UsersApplication DataKaspersky Lab Setup Files
2010-03-18 20:26:29 —-D—- H:Documents and SettingsLaraApplication DataArcaBit
2010-03-18 12:59:54 —-D—- H:Documents and SettingsLaraApplication DataeAcceleration
2010-03-18 12:59:35 —-D—- H:Program FilesAcceleration Software
2010-03-18 12:58:49 —-D—- H:Program FilesCommon FileseAcceleration
2010-03-18 12:58:49 —-D—- H:Documents and SettingsAll UsersApplication DataeAcceleration
2010-03-18 12:58:47 —-D—- H:Program FileseAcceleration
2010-03-18 12:58:45 —-D—- H:Program FilesStopSign
2010-03-18 12:02:09 —-D—- H:Documents and SettingsLaraApplication DataOnlineArmor
2010-03-18 12:02:09 —-D—- H:Documents and SettingsAll UsersApplication DataOnlineArmor
2010-03-18 12:01:53 —-D—- H:Program FilesTall Emu
2010-03-18 11:02:10 —-D—- H:Program FilesSkanerOnline======List of files/folders modified in the last 1 months======
2010-03-19 13:26:16 —-RD—- H:Program Files
2010-03-19 13:25:26 —-D—- H:Скачала
2010-03-19 12:47:54 —-D—- H:WINDOWSTemp
2010-03-19 12:47:39 —-SHD—- H:WINDOWSInstaller
2010-03-19 12:47:39 —-D—- H:Config.Msi
2010-03-19 12:47:36 —-D—- H:WINDOWSsystem32drivers
2010-03-19 12:47:26 —-HD—- H:WINDOWSinf
2010-03-19 12:47:24 —-D—- H:WINDOWS
2010-03-19 12:47:23 —-D—- H:WINDOWSsystem32CatRoot2
2010-03-19 12:47:21 —-D—- H:WINDOWSsystem32
2010-03-18 21:28:45 —-A—- H:WINDOWSSchedLgU.Txt
2010-03-18 21:09:16 —-D—- H:Program FilesMozilla Firefox
2010-03-18 19:50:32 —-D—- H:WINDOWSWinSxS
2010-03-18 19:50:32 —-D—- H:Program FilesCommon FilesMicrosoft Shared
2010-03-18 14:59:17 —-A—- H:WINDOWSntbtlog.txt
2010-03-18 13:28:44 —-RSHDC—- H:WINDOWSsystem32dllcache
2010-03-18 13:28:38 —-A—- H:WINDOWSexplorer.exe
2010-03-18 13:17:03 —-D—- H:WINDOWSsystem32CatRoot
2010-03-18 13:14:06 —-D—- H:WINDOWSsystem32config
2010-03-18 13:13:55 —-D—- H:WINDOWSsystem32wbem
2010-03-18 13:13:55 —-D—- H:WINDOWSRegistration
2010-03-18 12:58:55 —-D—- H:WINDOWSPrefetch
2010-03-18 12:58:49 —-D—- H:Program FilesCommon Files
2010-03-18 11:44:30 —-A—- H:WINDOWSexplorer(2)(2).exe
2010-03-18 11:02:10 —-SD—- H:WINDOWSDownloaded Program Files
2010-03-18 10:15:32 —-A—- H:WINDOWSexplorer(2).exe
2010-02-21 11:59:48 —-A—- H:WINDOWSexplorer(7).exe======List of drivers (R=Running, S=Stopped, 0=Boot, 1=System, 2=Auto, 3=Demand, 4=Disabled)======
R1 intelppm;Драйвер Intel процессора; H:WINDOWSsystem32DRIVERSintelppm.sys [2008-04-15 40704]
R1 klif;Klif; ??H:WINDOWSsystem32driversklif.sys []
R1 StarOpen;StarOpen; H:WINDOWSsystem32driversStarOpen.sys [2008-06-30 5632]
R2 NwlnkIpx;NWLink IPX/SPX/NetBIOS-совместимый транспортный протокол; H:WINDOWSsystem32DRIVERSnwlnkipx.sys [2008-04-15 88320]
R2 NwlnkNb;NWLink NetBIOS; H:WINDOWSsystem32DRIVERSnwlnknb.sys [2008-04-15 63232]
R2 NwlnkSpx;Протокол NWLink SPX/SPXII; H:WINDOWSsystem32DRIVERSnwlnkspx.sys [2008-04-15 55936]
R3 Arp1394;Протокол клиента 1394 ARP; H:WINDOWSsystem32DRIVERSarp1394.sys [2008-04-15 60800]
R3 e1express;Intel(R) PRO/1000 PCI Express Network Connection Driver; H:WINDOWSsystem32DRIVERSe1e5132.sys [2007-09-17 254872]
R3 HDAudBus;Драйвер шины Microsoft UAA для High Definition Audio; H:WINDOWSsystem32DRIVERSHDAudBus.sys [2008-04-15 144384]
R3 HECI;Intel(R) Management Engine Interface; H:WINDOWSsystem32DRIVERSHECI.sys [2007-03-13 44672]
R3 IntcAzAudAddService;Service for Realtek HD Audio (WDM); H:WINDOWSsystem32driversRtkHDAud.sys [2007-09-17 4402176]
R3 klim5;Kaspersky Anti-Virus NDIS Filter; H:WINDOWSsystem32DRIVERSklim5.sys [2007-04-04 24344]
R3 NIC1394;Сетевой драйвер 1394; H:WINDOWSsystem32DRIVERSnic1394.sys [2008-04-15 61824]
R3 nv;nv; H:WINDOWSsystem32DRIVERSnv4_mini.sys [2009-11-21 10235968]
R3 NWRDR;NetWare Rdr; H:WINDOWSsystem32DRIVERSnwrdr.sys [2008-04-15 163584]
R3 pfc;Padus ASPI Shell; H:WINDOWSsystem32driverspfc.sys [2003-01-22 9856]
R3 SAA713x;Behold TV WDM Capture (SAA713x); H:WINDOWSsystem32DRIVERSsaa713x.sys [2007-04-10 186512]
R3 usbehci;Драйвер минипорта Microsoft USB 2.0 расширенного хост-контроллера; H:WINDOWSsystem32DRIVERSusbehci.sys [2008-04-15 30208]
R3 usbhub;USB2 концентратор; H:WINDOWSsystem32DRIVERSusbhub.sys [2008-04-15 59520]
R3 usbstor;Драйвер запоминающих устройств для USB; H:WINDOWSsystem32DRIVERSUSBSTOR.SYS [2008-04-15 26368]
R3 usbuhci;Драйвер минипорта Microsoft USB универсального хост-контроллера; H:WINDOWSsystem32DRIVERSusbuhci.sys [2008-04-15 20608]
S3 CCDECODE;Closed Caption декодер; H:WINDOWSsystem32DRIVERSCCDECODE.sys [2008-04-14 17024]
S3 MSTEE;Преобразователь потоков Tee/Sink-to-Sink Microsoft; H:WINDOWSsystem32driversMSTEE.sys [2008-04-14 5504]
S3 NABTSFEC;NABTS/FEC VBI кодек; H:WINDOWSsystem32DRIVERSNABTSFEC.sys [2008-04-14 85248]
S3 NdisIP;Microsoft видео или ТВ подключение; H:WINDOWSsystem32DRIVERSNdisIP.sys [2008-04-15 10880]
S3 SLIP;BDA Slip De-Framer; H:WINDOWSsystem32DRIVERSSLIP.sys [2008-04-15 11136]
S3 ss_bus;SAMSUNG Mobile USB Device 1.0 driver (WDM); H:WINDOWSsystem32DRIVERSss_bus.sys [2005-08-30 58320]
S3 ss_mdfl;SAMSUNG Mobile USB Modem 1.0 Filter; H:WINDOWSsystem32DRIVERSss_mdfl.sys [2005-08-30 8304]
S3 ss_mdm;SAMSUNG Mobile USB Modem 1.0 Drivers; H:WINDOWSsystem32DRIVERSss_mdm.sys [2005-08-30 94000]
S3 streamip;BDA IPSink; H:WINDOWSsystem32DRIVERSStreamIP.sys [2008-04-15 15232]
S3 usbscan;Драйвер USB-сканера; H:WINDOWSsystem32DRIVERSusbscan.sys [2008-04-14 15104]
S3 WSTCODEC;World Standard Teletext кодек; H:WINDOWSsystem32DRIVERSWSTCODEC.SYS [2008-04-14 19200]
S3 WudfPf;Windows Driver Foundation — User-mode Driver Framework Platform Driver; H:WINDOWSsystem32DRIVERSWudfPf.sys [2006-09-28 77568]
S3 WudfRd;Windows Driver Foundation — User-mode Driver Framework Reflector; H:WINDOWSsystem32DRIVERSwudfrd.sys [2006-09-28 82944]
S4 dwshd;dwshd; H:WINDOWSSystem32driversdwshd.sys []
S4 IntelIde;IntelIde; H:WINDOWSsystem32driversIntelIde.sys []
S4 WS2IFSL;Среда Windows Socket 2.0 поддержки поставщиков не-IFS служб; H:WINDOWSSystem32driversws2ifsl.sys [2008-04-15 12032]======List of services (R=Running, S=Stopped, 0=Boot, 1=System, 2=Auto, 3=Demand, 4=Disabled)======
R2 NVSvc;NVIDIA Display Driver Service; H:WINDOWSsystem32nvsvc32.exe [2009-11-20 154216]
R2 NWCWorkstation;Клиент для сетей NetWare; H:WINDOWSsystem32svchost.exe [2010-02-01 14336]
R2 PnkBstrA;PnkBstrA; H:WINDOWSsystem32PnkBstrA.exe [2008-12-05 66872]
S2 AVP;Kaspersky Internet Security 7.0; H:Program FilesKaspersky LabKaspersky Internet Security 7.0avp.exe [2007-06-28 218376]
S2 FCI;FCI; H:WINDOWSsystem32svchost.exe [2010-02-01 14336]
S2 UxTuneUp;TuneUp Theme Extension; H:WINDOWSSystem32svchost.exe [2010-02-01 14336]
S3 gusvc;Google Updater Service; H:Program FilesGoogleCommonGoogle UpdaterGoogleUpdaterService.exe [2008-06-06 138168]
S3 IDriverT;InstallDriver Table Manager; H:Program FilesCommon FilesInstallShieldDriver11Intel 32IDriverT.exe [2005-04-04 69632]
S3 ose;Office Source Engine; H:Program FilesCommon FilesMicrosoft SharedSource EngineOSE.EXE [2003-07-28 89136]
S3 TuneUp.Defrag;TuneUp Drive Defrag Service; H:WINDOWSSystem32TuneUpDefragService.exe [2008-07-08 355584]
S3 WMPNetworkSvc;Служба общих сетевых ресурсов проигрывателя Windows Media; H:Program FilesWindows Media PlayerWMPNetwk.exe [2006-11-02 914944]
S3 WudfSvc;Windows Driver Foundation — User-mode Driver Framework; H:WINDOWSsystem32svchost.exe [2010-02-01 14336]
EOF
Ну дайте же ответ, пожалуйста, как быть в моей ситуации? Вчера единственное что получилось, это просканировать комп польским сканером, нашел 10 вирусов, трояны и еще что-то, удалил, но проблема так и остается. Ни на страничку Каспера, ни Веба и пр. не пускает, это же относится и к MalwareBytes Anti-malware, пишет соединение закрыто удаленным сервером. Неужели надо все переустанавливать??!!
Кстати, а где сохраняются записи Блокнота? Не помню какой еще вирус был найден, может где то сохранилась иформация?
Уфф, хоть удалось PSIT скачать 😀
Вот данные из Блокнота:
info.txt logfile of random’s system information tool 1.06 2010-03-19 13:26:32======Uninstall list======
—>MsiExec /X{C5C1C0F0-D62F-4DBF-81D4-D7EF397C228B}
—>MsiExec.exe /I{403EF592-953B-4794-BCEF-ECAB835C2095}
—>rundll32.exe setupapi.dll,InstallHinfSection DefaultUninstall 132 H:WINDOWSINFPCHealth.inf
Adobe Acrobat and Reader 8.1.2 Security Update 1 (KB403742)—>MsiExec.exe /X{6846389C-BAC0-4374-808E-B120F86AF5D7}
Adobe Flash Player ActiveX—>H:WINDOWSsystem32MacromedFlashuninstall_activeX.exe
Adobe Flash Player Plugin—>H:WINDOWSsystem32MacromedFlashuninstall_plugin.exe
Adobe Reader 8.1.2—>MsiExec.exe /I{AC76BA86-7AD7-1033-7B44-A81200000003}
Ask Toolbar—>»H:Program FilesAskBarDisunins000.exe»
Behold TV v4.97—>H:Program FilesBeholdTVBhUninst.exe
DAEMON Tools Toolbar—>H:Program FilesDAEMON Tools Toolbaruninst.exe
EA Download Manager—>H:PROGRA~1COMMON~1INSTAL~1Driver11INTEL3~1IDriver.exe /M{EF7E931D-DC84-471B-8DB6-A83358095474} /l1049
eBay Icon—>H:Documents and SettingsLaraApplication DataDesktopiconuninst.exe
Free Audio CD Burner version 1.2—>»H:Program FilesDVDVideoSoftFree Audio CD Burnerunins000.exe»
Free DVD Video Burner version 1.2—>»H:Program FilesDVDVideoSoftFree DVD Video Burnerunins000.exe»
Free Video to DVD Converter version 1.2—>»H:Program FilesDVDVideoSoftFree Video to DVD Converterunins000.exe»
Free Video to Mp3 Converter version 3.1—>»H:Program FilesDVDVideoSoftFree Video to Mp3 Converterunins000.exe»
Free YouTube Download 2.3—>»H:Program FilesDVDVideoSoftFree YouTube Downloadunins000.exe»
Free YouTube to MP3 Converter version 3.2—>»H:Program FilesDVDVideoSoftFree YouTube to MP3 Converterunins000.exe»
GetFLV Pro 8.65—>»H:Program FilesGetFLVunins000.exe»
getPlus(R)_ocx—>rundll32.exe advpack.dll,LaunchINFSection H:WINDOWSinfGETPLUSo.INF, DefaultUninstall
Google Toolbar for Internet Explorer—>MsiExec.exe /I{DBEA1034-5882-4A88-8033-81C4EF0CFA29}
Google Toolbar for Internet Explorer—>regsvr32 /u /s «h:program filesgooglegoogletoolbar1.dll»
HijackThis 2.0.2—>»H:Program Filestrend microHijackThis.exe» /uninstall
ICQ6—>»H:Program FilesInstallShield Installation Information{60DE4033-9503-48D1-A483-7846BD217CA9}setup.exe» -runfromtemp -l0x0009 -removeonly
Intel(R) Management Engine Interface—>H:WINDOWSsystem32heciudlg.exe -uninstall
Intel(R) PRO Network Connections 12.1.12.0—>MsiExec.exe /i{777CA40C-0206-4EF6-A0FC-618BF06BF8D0} ARPREMOVE=1
InterVideo WinDVD Creator—>»H:Program FilesInstallShield Installation Information{9933F0EE-DFCD-4829-B979-3C56C367CB1A}setup.exe» REMOVEALL
Kaspersky Internet Security 7.0—>MsiExec.exe /I{C774410D-3EF9-4DE7-AC01-332613163ECF}
Kaspersky Internet Security 7.0—>MsiExec.exe /I{C774410D-3EF9-4DE7-AC01-332613163ECF}
K-Lite Codec Pack 5.2.0 (Standard)—>»H:Program FilesK-Lite Codec Packunins000.exe»
Microsoft Office — профессиональный выпуск версии 2003—>MsiExec.exe /I{90110419-6000-11D3-8CFE-0150048383C9}
Microsoft Visual C++ 2005 Redistributable—>MsiExec.exe /X{7299052b-02a4-4627-81f2-1818da5d550d}
Mozilla Firefox (3.5)—>H:Program FilesMozilla Firefoxuninstallhelper.exe
MSXML 4.0 SP2 Parser and SDK—>MsiExec.exe /I{716E0306-8318-4364-8B8F-0CC4E9376BAC}
Need for Speed™ Undercover—>MsiExec.exe /X{E6D22FE1-AB5F-42CA-9480-6F70B96DDD88}
Nero 6 Ultra Edition—>H:СкачалаNeronerouninstallUNNERO.exe /UNINSTALL
NevoSoft Luxor (remove only)—>»H:СкачалаЛуксорLuxoruninstall.exe»
NVIDIA Drivers—>H:WINDOWSsystem32nvuninst.exe UninstallGUI
NVIDIA nView Desktop Manager—>H:Program FilesNVIDIA CorporationnViewnViewSetup.exe -uninstall
NVIDIA PhysX—>MsiExec.exe /X{C5C1C0F0-D62F-4DBF-81D4-D7EF397C228B}
Opera 9.51—>MsiExec.exe /X{179624B1-2683-45ED-965A-B72189EB5820}
PhotoScape—>»H:Program FilesPhotoScapeuninstall.exe»
Realtek High Definition Audio Driver—>RtlUpd.exe -r -m
SAMSUNG CDMA Modem Driver Set—>H:WINDOWSsystem32Samsung_USB_Drivers3SSCDUninstall.exe
Samsung Mobile phone USB driver Software—>H:WINDOWSsystem32Samsung_USB_Drivers5SSSDUninstall.exe
SAMSUNG Mobile USB Modem 1.0 Software—>H:WINDOWSsystem32Samsung_USB_Drivers1SS_Uninstall.exe
SAMSUNG Mobile USB Modem Software—>H:WINDOWSsystem32Samsung_USB_Drivers2SSM_Uninstall.exe
Samsung PC Studio 3 USB Driver Installer—>RunDll32 H:PROGRA~1COMMON~1INSTAL~1PROFES~1RunTime1050Intel32Ctor.dll,LaunchSetup «H:Program FilesInstallShield Installation Information{EBA29752-DDD2-4B62-B2E3-9841F92A3E3A}setup.exe» -l0x19 -removeonly
Samsung PC Studio—>RunDll32 H:PROGRA~1COMMON~1INSTAL~1PROFES~1RunTime1050Intel32Ctor.dll,LaunchSetup «H:Program FilesInstallShield Installation Information{C4A4722E-79F9-417C-BD72-8D359A090C97}setup.exe» -l0x19 -removeonly
Samsung Samples Installer—>RunDll32 H:PROGRA~1COMMON~1INSTAL~1PROFES~1RunTime1050Intel32Ctor.dll,LaunchSetup «H:Program FilesInstallShield Installation Information{7AC15160-A49B-4A89-B181-D4619C025FFF}setup.exe» -l0x19 -removeonly
TuneUp Utilities 2008—>MsiExec.exe /I{5888428E-699C-4E71-BF71-94EE06B497DA}
Uninstall 1.0.0.1—>»H:Program FilesCommon FilesDVDVideoSoftunins000.exe»
Winamp—>»H:Program FilesWinampUninstWA.exe»
Windows Media Format 11 runtime—>»H:Program FilesWindows Media Playerwmsetsdk.exe» /UninstallAll
Windows Media Format 11 runtime—>»H:WINDOWS$NtUninstallWMFDist11$spuninstspuninst.exe»
Windows Media Player 11—>»H:WINDOWS$NtUninstallwmp11$spuninstspuninst.exe»
Архиватор WinRAR—>H:Program FilesWinRARuninstall.exe
Луксор—>H:Program FilesAlawarЛуксорUninstall.exe
Проигрыватель Windows Media 11—>»H:Program FilesWindows Media PlayerSetup_wm.exe» /Uninstall
Яндекс.Бар 4.2 для Internet Explorer—>MsiExec.exe /X{6740F9E3-1353-47DD-9765-BA49FC4C3479}======Hosts File======
127.0.0.1 localhost
0.0.0.0 um00.eset.com
0.0.0.0 um01.eset.com
0.0.0.0 um02.eset.com
0.0.0.0 um03.eset.com
0.0.0.0 um04.eset.com
0.0.0.0 um05.eset.com
0.0.0.0 um06.eset.com
0.0.0.0 um07.eset.com
0.0.0.0 um08.eset.com======Security center information======
AV: Kaspersky Internet Security (disabled)
FW: Kaspersky Internet Security (disabled)======System event log======
Computer Name: LARISA
Event Code: 7
Message: Неверный блок на устройстве DeviceCdRom0.Record Number: 2619
Source Name: Cdrom
Time Written: 20100104213039.000000+180
Event Type: ошибка
User:Computer Name: LARISA
Event Code: 7
Message: Неверный блок на устройстве DeviceCdRom0.Record Number: 2618
Source Name: Cdrom
Time Written: 20100104213039.000000+180
Event Type: ошибка
User:Computer Name: LARISA
Event Code: 7
Message: Неверный блок на устройстве DeviceCdRom0.Record Number: 2617
Source Name: Cdrom
Time Written: 20100104213038.000000+180
Event Type: ошибка
User:Computer Name: LARISA
Event Code: 7
Message: Неверный блок на устройстве DeviceCdRom0.Record Number: 2616
Source Name: Cdrom
Time Written: 20100104213038.000000+180
Event Type: ошибка
User:Computer Name: LARISA
Event Code: 7
Message: Неверный блок на устройстве DeviceCdRom0.Record Number: 2615
Source Name: Cdrom
Time Written: 20100104213038.000000+180
Event Type: ошибка
User:=====Application event log=====
Computer Name: LARISA
Event Code: 1000
Message: Счетчики производительности для службы TermService (Службы терминалов) загружены успешно.
Данные записи содержат новые значение индекса,
назначенного этой службе.Record Number: 5
Source Name: LoadPerf
Time Written: 20091117213624.000000+180
Event Type: информация
User:Computer Name: LARISA
Event Code: 1001
Message: Счетчики производительности для службы TermService (Службы терминалов) успешно удалены.
Данные записи содержат новые значения разделов системного реестра Last Counter
и Last Help.Record Number: 4
Source Name: LoadPerf
Time Written: 20091117213624.000000+180
Event Type: информация
User:Computer Name: LARISA
Event Code: 1002
Message: Счетчики производительности для службы RSVP (QoS RSVP) уже записаны в
реестр, повторная установка не требуется.Record Number: 3
Source Name: LoadPerf
Time Written: 20091117213543.000000+180
Event Type: информация
User:Computer Name: LARISA
Event Code: 1002
Message: Счетчики производительности для службы PSched (Планировщик пакетов QoS) уже записаны в
реестр, повторная установка не требуется.Record Number: 2
Source Name: LoadPerf
Time Written: 20091117213541.000000+180
Event Type: информация
User:Computer Name: LARISA
Event Code: 1002
Message: Счетчики производительности для службы RemoteAccess (Маршрутизация и удаленный доступ) уже записаны в
реестр, повторная установка не требуется.Record Number: 1
Source Name: LoadPerf
Time Written: 20091117213533.000000+180
Event Type: информация
User:======Environment variables======
«ComSpec»=%SystemRoot%system32cmd.exe
«Path»=%SystemRoot%system32;%SystemRoot%;%SystemRoot%system32WBEM;H:Program FilesIntelDMIX;H:Program FilesSamsungSamsung PC Studio 3
«windir»=%SystemRoot%
«FP_NO_HOST_CHECK»=NO
«OS»=Windows_NT
«PROCESSOR_ARCHITECTURE»=x86
«PROCESSOR_LEVEL»=6
«PROCESSOR_IDENTIFIER»=x86 Family 6 Model 23 Stepping 6, GenuineIntel
«PROCESSOR_REVISION»=1706
«NUMBER_OF_PROCESSORS»=2
«PATHEXT»=.COM;.EXE;.BAT;.CMD;.VBS;.VBE;.JS;.JSE;.WSF;.WSH
«TEMP»=%SystemRoot%TEMP
«TMP»=%SystemRoot%TEMP
EOF
-
АвторСообщения