Kliknij w Wykonaj Skrypt. Zatwierdź restart komputera. Zapisz raport, który pokaże się po restarcie.:OTL
[2012-09-12 10:39:19 | 000,070,656 | ---- | C] () -- C:\WINDOWS\System32\drivers\11df87ef6c405e25.sys
[2012-09-12 06:32:20 | 000,108,544 | ---- | C] () -- C:\Documents and Settings\ja\tiddiszagtor.exe
[2012-09-15 20:03:03 | 000,054,016 | ---- | M] () -- C:\WINDOWS\System32\drivers\hcmf.sys
O33 - MountPoints2\{540d8ea9-181e-11e0-aeff-0024813f3938}\Shell\AutoRun\command - "" = D:\w9.exe
O33 - MountPoints2\{540d8ea9-181e-11e0-aeff-0024813f3938}\Shell\open\Command - "" = D:\w9.exe
O33 - MountPoints2\{6376601c-8e31-11de-ae5d-0024813f3938}\Shell\AutoRun\command - "" = E:\ktly.exe
O33 - MountPoints2\{6376601c-8e31-11de-ae5d-0024813f3938}\Shell\open\Command - "" = E:\ktly.exe
O33 - MountPoints2\{c9ad138c-4f05-11de-ae40-0024813f3938}\Shell\AutoRun\command - "" = D:\eexyv.exe
O33 - MountPoints2\{c9ad138c-4f05-11de-ae40-0024813f3938}\Shell\open\Command - "" = D:\eexyv.exe
O33 - MountPoints2\{ccc6dbfa-8e36-11de-ae5e-002100ae76c1}\Shell\AutoRun\command - "" = E:\ktly.exe
O33 - MountPoints2\{ccc6dbfa-8e36-11de-ae5e-002100ae76c1}\Shell\open\Command - "" = E:\ktly.exe
O33 - MountPoints2\{d4deeb52-d179-11df-ae8b-0024813f3938}\Shell\AutoRun\command - "" = D:\io3yalc.exe
O33 - MountPoints2\{d4deeb52-d179-11df-ae8b-0024813f3938}\Shell\open\Command - "" = D:\io3yalc.exe
O33 - MountPoints2\{df839f3c-dc7b-11df-aea3-0024813f3938}\Shell\AutoRun\command - "" = D:\jofk1wf.exe
O33 - MountPoints2\{df839f3c-dc7b-11df-aea3-0024813f3938}\Shell\open\Command - "" = D:\jofk1wf.exe
O33 - MountPoints2\{ea20b9e0-9945-11de-ae61-0024813f3938}\Shell\AutoRun\command - "" = E:\o9bxu.exe
O33 - MountPoints2\{ea20b9e0-9945-11de-ae61-0024813f3938}\Shell\open\Command - "" = E:\o9bxu.exe
O4 - Startup: C:\Documents and Settings\ja\Menu Start\Programy\Autostart\PowerReg Scheduler.exe ()
O4 - HKCU..\Run: [tiddiszagtor] C:\Documents and Settings\ja\tiddiszagtor.exe ()
O4 - HKLM..\Run: [Regedit32] C:\WINDOWS\system32\regedit.exe File not found
DRV - [2012-09-15 20:03:03 | 000,054,016 | ---- | M] () [Kernel | Boot | Unknown] -- C:\WINDOWS\system32\drivers\hcmf.sys -- (ljeisl)
:Commands
[emptytemp]
Następnie uruchom OTL ponownie, tym razem kliknij Skanuj.
Pokaż nowy log OTL.txt oraz raport z usuwania Skryptem.
Wprawdzie w logach nie widzę usługi, ale, tak na wszelki wypadek, użyj tego ESET Necurs Remover.




Moja zawartość
Nie podano

