Wątek zamknięty

Wirus w pliku explorer.exe

 
Illidan
Ekspert

Liczba postów: 1.024
Post: #7

RE: Wirus w pliku explorer.exe


W "OTL" w "Własne opcje skanowania/skrypt" wklej dokładnie to co znajduje się poniżej w ramce:

Kod:
: OTL
DRV - File not found [Kernel | On_Demand | Stopped] --  -- (VGPU)
DRV - File not found [Kernel | On_Demand | Stopped] --  -- (tsusbhub)
DRV - File not found [Kernel | Boot | Stopped] --  -- (TFSysMon)
DRV - File not found [Kernel | On_Demand | Stopped] --  -- (TfNetMon)
DRV - File not found [Kernel | Boot | Stopped] --  -- (TfFsMon)
DRV - File not found [Kernel | On_Demand | Stopped] --  -- (Synth3dVsc)
DRV - File not found [Kernel | On_Demand | Stopped] --  -- (EagleNT)
DRV - File not found [Kernel | On_Demand | Stopped] --  -- (cpuz126)
DRV - File not found [Kernel | On_Demand | Stopped] --  -- (catchme)
IE - HKLM\SOFTWARE\Microsoft\Internet Explorer\Main,Default_Page_URL = about: blank
IE - HKLM\SOFTWARE\Microsoft\Internet Explorer\Main,Start Page = about: blank
IE - HKLM\..\URLSearchHook:  {fcbf663e-8530-46f8-a880-ac5abe9d2b23} - D: \Program Files\mobilewitch\prxtbmob0.dll (Conduit Ltd.)
IE - HKLM\..\SearchScopes,DefaultScope = {afdbddaa-5d3f-42ee-b79c-185a7020515b}
IE - HKLM\..\SearchScopes\{afdbddaa-5d3f-42ee-b79c-185a7020515b}:  "URL" = http: //search.conduit.com/ResultsExt.aspx?q={searchTerms}&SearchSource=4&ctid=CT1605787
IE - HKLM\..\SearchScopes\{EEE6C360-6118-11DC-9C72-001320C79847}:  "URL" = http: //search.sweetim.com/search.asp?src=6&q={searchTerms}
IE - HKCU\SOFTWARE\Microsoft\Internet Explorer\Main,Default_Page_URL = about: blank
IE - HKCU\SOFTWARE\Microsoft\Internet Explorer\Main,Start Page = https: //isearch.avg.com/?cid={67A614FC-4B1B-4107-8ED0-328E10A9E58E}&mid=6179f2fc5b6047d19704d15dc36b3b13-06ce4fc639803a2e3563922518183d8e94088cb9&lang=pl&ds=ts026&pr=sa&d=2012-08-17 15: 43: 59&v=12.2.0.5&sap=hp
IE - HKCU\..\SearchScopes,DefaultScope = {95B7759C-8C7F-4BF1-B163-73684A933233}
IE - HKCU\..\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}:  "URL" = http: //startsear.ch/?aff=1&src=sp&cf=e6afde62-4219-11e1-8fef-0014858fd2e0&q={searchTerms}
IE - HKCU\..\SearchScopes\{0ECDF796-C2DC-4d79-A620-CCE0C0A66CC9}:  "URL" = http: //search.babylon.com/?q={searchTerms}&affID=113480&tt=3012_5&babsrc=SP_ss&mntrId=d07a14c10000000000000014858fd2e0
IE - HKCU\..\SearchScopes\{154C0812-CB71-4754-9304-9190B850F8C5}:  "URL" = http: //www.bing.com/search?FORM=VE3D01&q={searchTerms}&src={referrer: source?}
IE - HKCU\..\SearchScopes\{171DEBEB-C3D4-40b7-AC73-056A5EBA4A7E}:  "URL" = http: //websearch.ask.com/redirect?client=ie&tb=NRO&o=&src=crm&q={searchTerms}&locale=
IE - HKCU\..\SearchScopes\{26352FA9-A76F-4227-B21F-75EA372E02B9}:  "URL" = http: //mp3tubetoolbarsearch.com/?tmp=nemo_results_removelink2&keywords={searchTerms}
IE - HKCU\..\SearchScopes\{6B88561F-2B6C-4FA2-AD40-DD5766E2399F}:  "URL" = http: //search.yahoo.com/search?fr=chr-greentree_ie&ei=utf-8&ilc=12&type=685749&p={searchTerms}
IE - HKCU\..\SearchScopes\{7A16FDC1-7903-461C-851F-C51420E4AE40}:  "URL" = http: //www.google.com/search?hl=pl&q={searchTerms}
IE - HKCU\..\SearchScopes\{7F4EFF06-7032-458e-AE16-1C1D8255C28A}:  "URL" = http: //search.speedbit.com/search.aspx?aff=svd_VA&q={searchTerms}
IE - HKCU\..\SearchScopes\{86F14831-D88C-4BC8-B871-C8FB24D95D9B}:  "URL" = http: //www.questbasic.com/?prt=qbdantasdns&keywords={searchTerms}
IE - HKCU\..\SearchScopes\{95B7759C-8C7F-4BF1-B163-73684A933233}:  "URL" = https: //isearch.avg.com/search?cid={67A614FC-4B1B-4107-8ED0-328E10A9E58E}&mid=6179f2fc5b6047d19704d15dc36b3b13-06ce4fc639803a2e3563922518183d8e94088cb9&lang=pl&ds=ts026&pr=sa&d=2012-08-17 15: 43: 59&v=12.2.5.32&sap=dsp&q={searchTerms}
IE - HKCU\..\SearchScopes\{AD22EBAF-0D18-4fc7-90CC-5EA0ABBE9EB8}:  "URL" = http: //www.daemon-search.com/search?q={searchTerms}
IE - HKCU\..\SearchScopes\{E88E0043-C9D4-4e33-8555-FEE4F5B63060}:  "URL" = http: //go.mail.ru/search?q={searchTerms}&utf8in=1&fr=ietb
IE - HKCU\..\SearchScopes\{EEE6C360-6118-11DC-9C72-001320C79847}:  "URL" = http: //search.sweetim.com/search.asp?src=6&q={searchTerms}
IE - HKCU\..\SearchScopes\{F305CAC3-A1A0-4927-8FAC-C6EF93384ACE}:  "URL" = http: //search.softonic.com/MON00085/tb_v1?q={searchTerms}&SearchSource=4&cc=
FF - user.js - File not found
FF - HKLM\Software\MozillaPlugins\@microsoft.com/GENUINE:  disabled File not found
FF - HKEY_LOCAL_MACHINE\software\mozilla\Firefox\Extensions\\searchpredict@speedbit.com:  
O2 - BHO:  (no name) - {59273AB4-E7D3-40F9-A1A8-6FA9CCA1862C} - No CLSID value found.
O2 - BHO:  (no name) - {E33CF602-D945-461A-83F0-819F76A199F8} - No CLSID value found.
O3 - HKLM\..\Toolbar:  (no name) - Locked - No CLSID value found.
O3 - HKCU\..\Toolbar\WebBrowser:  (no name) - {0329E7D6-6F54-462D-93F6-F5C3118BADF2} - No CLSID value found.
O3 - HKCU\..\Toolbar\WebBrowser:  (no name) - {09900DE8-1DCA-443F-9243-26FF581438AF} - No CLSID value found.
O3 - HKCU\..\Toolbar\WebBrowser:  (no name) - {32099AAC-C132-4136-9E9A-4E364A424E17} - No CLSID value found.
O3 - HKCU\..\Toolbar\WebBrowser:  (no name) - {472734EA-242A-422B-ADF8-83D1E48CC825} - No CLSID value found.
O3 - HKCU\..\Toolbar\WebBrowser:  (mobilewitch Toolbar) - {FCBF663E-8530-46F8-A880-AC5ABE9D2B23} - D: \Program Files\mobilewitch\prxtbmob0.dll (Conduit Ltd.)
O9 - Extra Button:  &Klawiatura wirtualna - {4248FE82-7FCB-46AC-B270-339F08212110} - Reg Error:  Key error. File not found
O9 - Extra Button:  &Sprawdzanie adresów internetowych - {CCF151D8-D089-449F-A5A4-D9909053F20F} - Reg Error:  Key error. File not found
O18 - Protocol\Handler\skype-ie-addon-data {91774881-D725-4E58-B298-07617B9B86A8} - Reg Error:  Value error. File not found
O20 - HKLM Winlogon:  VMApplet - (/pagefile) -  File not found
O32 - HKLM CDRom:  AutoRun - 1

: Commands
[emptytemp]

"Wykonaj skrypt" ,po czym po restarcie zamieść raport z usuwania do wglądu i zamieść jeszcze też log "Extras".


(Ten post był ostatnio modyfikowany: 29.08.2012 09:39 przez Illidan.)

29.08.2012 09:37

Znajdź wszystkie posty użytkownika
Wątek zamknięty


Wiadomości w tym wątku
Wirus w pliku explorer.exe - mich2633 - 14.08.2012, 15:55
RE: Wirus w pliku explorer.exe - Illidan - 29.08.2012 09:37
Podobne wątki
Wątek: Autor Odpowiedzi: Wyświetleń: Ostatni post
Zmiana właściciela pliku - brak zakładki zabezpieczenia djwebber 1 1.370 12.09.2019 19:43
Ostatni post: LadyInBlue
Czy to wirus? mariusz2808 0 1.196 05.02.2017 14:26
Ostatni post: mariusz2808
Wirus Brontok.a? Jak się pozbyć Lort533 2 1.952 10.10.2016 19:16
Ostatni post: Lort533
Błąd systemu (explorer.exe), brak pliku hccutils Adveris 1 1.955 23.11.2015 20:28
Ostatni post: trefl
wirus rdsrv.com vendigo 2 2.560 11.04.2015 22:14
Ostatni post: Arcadus
Błąd Explorer.exe- "dane tego typu nie są obsługiwane" maco997 13 3.177 15.02.2015 21:25
Ostatni post: GamerPL
« Starszy wątek | Nowszy wątek »

Temat został oceniony na 0 w skali 1-5 gwiazdek.
Zebrano 1 głosów.