Jump to content

Препоръчан пост

Здравейте,

Никак не рабирам от компютри и за това предварително се извинявам ако не изпълнявам правилата за описване на проблема.

 

С win.XP professional 2002 - от около седмица компютъра ми непрекъснато забива, в опитите си да го оправя включвам диспечера на задачи и там всеки път ми се показва една програма "L6mN", не знам каква е и как се включва, но смятам че тя е причината за проблемите ми с компютъра.

Въпроса ми е как да я намерия, за да я деинсталирам и изтрия.

 

Благодаря предварително, ако е нужно да опиша или направя нещо друго само кажете !

Link to comment
Сподели другаде

Като за начало ще е добре да пуснеш по едно профилактично сканиране с Malwarebytes' Anti-Malware и SUPERAntiSpyware Free. Ако вече имаш програмите, провери дали имаш последните версии и ако нямаш, премахни твоите и инсталирай най-новите. Ако тепърва инсталираш програмите, след инсталацията те ще предложат да се обновят автоматично, съгласи се. В противен случай обнови дефинициите им ръчно.

 

За Malwarebytes' Anti-Malware:

- стартирай програмата;

- избери Perform quick scan (Бързо сканиране) и кликни бутон Scan (Сканиране);

- след като приключи сканирането, ако не са открити заплахи, ще се отвори автоматично текстов файл (който можеш да затвориш) и програмата ще те уведоми, че не е открила нищо, след което можеш да кликнеш бутон OK и да я затвориш;

- ако са открити заплахи, кликни бутон OK и после Show results (Покажи резултатите);

- кликни бутон Remove Selected (Премахни избраните);

- ще се появи текстов файл (дневник/лог), копирай съдържанието му тук.

 

За SUPERAntiSpyware:

- стартирай програмата;

- кликни бутон Scan your Computer (Сканиране на компютъра);

- вляво избери само дял C:, а вдясно избери Perform Complete Scan (Извърши пълно сканиране);

- кликни Next и изчакай програмата да сканира;

- кликни OK на съобщението;

- ако има засечени заплахи, кликни Next, за да се премахнат гадинките, OK на потвърждението и накрая Finish;

- кликни бутон Preferences... (Настройки) и иди на подпрозорец Statistics/Logs (Дневници), маркирай последния лог по дата и кликни бутон View Log... (Покажи дневника);

- копирай съдържанието му тук.

 

Ако е нужен рестарт при някое от сканиранията, се съгласи и рестартирай веднага.

Link to comment
Сподели другаде

Оуу ужас... явно доста вирусчета са влезли в моето компютърче.... а до вчера нищо не ми засичаше антивирусната.

Ето какво ми даде Malwarebytes' Anti-Malware:

Malwarebytes' Anti-Malware 1.46

www.malwarebytes.org

 

Версия на базата от данни: 4326

 

Windows 5.1.2600 Service Pack 3

Internet Explorer 8.0.6001.18702

 

19.7.2010 г. 21:04:44

mbam-log-2010-07-19 (21-04-44).txt

 

Тип сканиране: Бързо сканиране

Сканирани обекти: 129977

Изминало време: 12 минута(и), 9 секунда(и)

 

Заразени процеси в паметта: 2

Заразени модули в паметта: 1

Заразени ключове в регистратурата: 3

Заразени стойности в регистратурата: 5

Заразени информационни обекти в регистратурата: 1

Заразени папки: 0

Заразени файлове: 54

 

Заразени процеси в паметта:

C:\WINDOWS\system32\csrcs.exe (Trojan.Agent) -> No action taken.

C:\WINDOWS\jusched.exe (Worm.Palevo) -> No action taken.

 

Заразени модули в паметта:

C:\WINDOWS\system32\jrnh.aso (Backdoor.Bot) -> No action taken.

 

Заразени ключове в регистратурата:

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\erzcjjlw (Trojan.Agent) -> No action taken.

HKEY_CLASSES_ROOT\idid (Trojan.Sasfix) -> No action taken.

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\DRM\amty (Worm.Autorun) -> No action taken.

 

Заразени стойности в регистратурата:

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\csrcs (Trojan.Agent) -> No action taken.

HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\java developer script browse (Worm.Palevo) -> No action taken.

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\java developer script browse (Worm.Palevo) -> No action taken.

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Terminal Server\Install\Software\Microsoft\Windows\CurrentVersion\Run\java developer script browse (Trojan.Agent) -> No action taken.

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunServices\csrcs (Trojan.Agent) -> No action taken.

 

Заразени информационни обекти в регистратурата:

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell (Hijack.Shell) -> Bad: (Explorer.exe rundll32.exe jrnh.aso ldsgtn) Good: (Explorer.exe) -> No action taken.

 

Заразени папки:

(Не бяха открити зловредни обекти)

 

Заразени файлове:

C:\WINDOWS\system32\jrnh.aso (Backdoor.Bot) -> No action taken.

C:\Documents and Settings\Eli i Nini\Desktop\2548965.JPG-www.facebook.exe (Worm.Palevo) -> No action taken.

C:\sdfsdf.exe (Trojan.Agent) -> No action taken.

C:\WINDOWS\system32\drivers\erzcjjlw.sys (Trojan.Agent) -> No action taken.

C:\Documents and Settings\Eli i Nini\Local Settings\Temp\4E.tmp (Trojan.Proxy) -> No action taken.

C:\Documents and Settings\Eli i Nini\Local Settings\Temp\7B.tmp (Trojan.Proxy) -> No action taken.

C:\Documents and Settings\Eli i Nini\Local Settings\Temp\8.tmp (Backdoor.Bot) -> No action taken.

C:\Documents and Settings\Eli i Nini\Local Settings\Temp\83.tmp (Trojan.Proxy) -> No action taken.

C:\Documents and Settings\Eli i Nini\Local Settings\Temp\84.tmp (Trojan.Proxy) -> No action taken.

C:\Documents and Settings\Eli i Nini\Local Settings\Temp\A1.tmp (Trojan.Proxy) -> No action taken.

C:\Documents and Settings\Eli i Nini\Local Settings\Temp\A7.tmp (Backdoor.Bot) -> No action taken.

C:\Documents and Settings\Eli i Nini\Local Settings\Temp\A8.tmp (Trojan.Proxy) -> No action taken.

C:\Documents and Settings\Eli i Nini\Local Settings\Temp\A9.tmp (Trojan.Proxy) -> No action taken.

C:\Documents and Settings\Eli i Nini\Local Settings\Temp\AA.tmp (Backdoor.Bot) -> No action taken.

C:\Documents and Settings\Eli i Nini\Local Settings\Temp\AB.tmp (Trojan.Proxy) -> No action taken.

C:\Documents and Settings\Eli i Nini\Local Settings\Temp\AC.tmp (Trojan.Proxy) -> No action taken.

C:\Documents and Settings\Eli i Nini\Local Settings\Temp\AD.tmp (Trojan.Proxy) -> No action taken.

C:\Documents and Settings\Eli i Nini\Local Settings\Temp\128.tmp (Trojan.Proxy) -> No action taken.

C:\Documents and Settings\Eli i Nini\Local Settings\Temp\131.tmp (Trojan.Proxy) -> No action taken.

C:\Documents and Settings\Eli i Nini\Local Settings\Temp\173.tmp (Trojan.Proxy) -> No action taken.

C:\Documents and Settings\Eli i Nini\Local Settings\Temp\17C.tmp (Trojan.Proxy) -> No action taken.

C:\Documents and Settings\Eli i Nini\Local Settings\Temp\185.tmp (Trojan.Proxy) -> No action taken.

C:\Documents and Settings\Eli i Nini\Local Settings\Temp\192.tmp (Trojan.Proxy) -> No action taken.

C:\Documents and Settings\Eli i Nini\Local Settings\Temp\195.tmp (Trojan.Proxy) -> No action taken.

C:\Documents and Settings\Eli i Nini\Local Settings\Temp\196.tmp (Trojan.Proxy) -> No action taken.

C:\Documents and Settings\Eli i Nini\Local Settings\Temp\198.tmp (Trojan.Proxy) -> No action taken.

C:\Documents and Settings\Eli i Nini\Local Settings\Temp\1B0.tmp (Trojan.Proxy) -> No action taken.

C:\Documents and Settings\Eli i Nini\Local Settings\Temp\1E8.tmp (Trojan.Proxy) -> No action taken.

C:\Documents and Settings\Eli i Nini\Local Settings\Temp\22A.tmp (Trojan.Proxy) -> No action taken.

C:\Documents and Settings\Eli i Nini\Local Settings\Temp\E9.tmp (Trojan.Proxy) -> No action taken.

C:\Documents and Settings\Eli i Nini\Local Settings\Temp\EA.tmp (Trojan.Proxy) -> No action taken.

C:\Documents and Settings\Eli i Nini\Local Settings\Temp\B.tmp (Backdoor.Bot) -> No action taken.

C:\Documents and Settings\Eli i Nini\Local Settings\Temp\B6.tmp (Trojan.Proxy) -> No action taken.

C:\Documents and Settings\Eli i Nini\Local Settings\Temp\B7.tmp (Backdoor.Bot) -> No action taken.

C:\Documents and Settings\Eli i Nini\Local Settings\Temp\CD.tmp (Trojan.Proxy) -> No action taken.

C:\Documents and Settings\Eli i Nini\lte.exe (Backdoor.Cetorp) -> No action taken.

C:\Documents and Settings\Eli i Nini\Local Settings\Temporary Internet Files\Content.IE5\KR4V7TKU\decc[1] (Trojan.Oficla) -> No action taken.

C:\Documents and Settings\Eli i Nini\Local Settings\Temporary Internet Files\Content.IE5\NFHVZL0W\decc[1] (Trojan.Oficla) -> No action taken.

C:\Documents and Settings\Eli i Nini\Local Settings\Temporary Internet Files\Content.IE5\Q37IXIP4\decc[1] (Trojan.Oficla) -> No action taken.

C:\Documents and Settings\Eli i Nini\Local Settings\Temporary Internet Files\Content.IE5\SVJ3QC1D\decc[1] (Trojan.Oficla) -> No action taken.

C:\Documents and Settings\Eli i Nini\Local Settings\Temporary Internet Files\Content.IE5\Y13GP0JQ\decc[1] (Trojan.Oficla) -> No action taken.

C:\WINDOWS\system32\csrcs.exe (Trojan.Agent) -> No action taken.

C:\WINDOWS\system32\Drivers\ndisvvan.sys (Rootkit.Agent) -> No action taken.

C:\WINDOWS\system32\secupdat.dat (Backdoor.Bot) -> No action taken.

C:\Documents and Settings\Eli i Nini\Local Settings\Temp\OPR2007-2013Sandanski-1.doc (Trojan.Agent) -> No action taken.

C:\Documents and Settings\Eli i Nini\Local Settings\Temp\OPR2007-2013Sandanski-3.doc (Trojan.Agent) -> No action taken.

C:\Documents and Settings\Eli i Nini\Local Settings\Temp\OPR2007-2013Sandanski.doc (Trojan.Agent) -> No action taken.

C:\Documents and Settings\All Users\secupdat.dat (Worm.Autorun) -> No action taken.

C:\Documents and Settings\Default User\secupdat.dat (Worm.Autorun) -> No action taken.

C:\Documents and Settings\Eli i Nini\secupdat.dat (Worm.Autorun) -> No action taken.

C:\Documents and Settings\LocalService\secupdat.dat (Worm.Autorun) -> No action taken.

C:\Documents and Settings\NetworkService\secupdat.dat (Worm.Autorun) -> No action taken.

C:\WINDOWS\system32\config\systemprofile\secupdat.dat (Worm.Autorun) -> No action taken.

C:\WINDOWS\jusched.exe (Worm.Palevo) -> No action taken.

Link to comment
Сподели другаде

ето още нещо:)

 

аз пуснах и другата програмка SUPERAntiSpyware, но вече много ми се спинка и утре ще проверя какъв е резултата....

лека и мерси за отговорите:)

 

 

Malwarebytes' Anti-Malware 1.46

www.malwarebytes.org

 

Версия на базата от данни: 4326

 

Windows 5.1.2600 Service Pack 3

Internet Explorer 8.0.6001.18702

 

19.7.2010 г. 23:02:12

mbam-log-2010-07-19 (23-02-12).txt

 

Тип сканиране: Бързо сканиране

Сканирани обекти: 129827

Изминало време: 15 минута(и), 59 секунда(и)

 

Заразени процеси в паметта: 1

Заразени модули в паметта: 0

Заразени ключове в регистратурата: 3

Заразени стойности в регистратурата: 6

Заразени информационни обекти в регистратурата: 2

Заразени папки: 1

Заразени файлове: 52

 

Заразени процеси в паметта:

C:\WINDOWS\system32\csrcs.exe (Trojan.Agent) -> Unloaded process successfully.

 

Заразени модули в паметта:

(Не бяха открити зловредни обекти)

 

Заразени ключове в регистратурата:

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\erzcjjlw (Trojan.Agent) -> Delete on reboot.

HKEY_CLASSES_ROOT\idid (Trojan.Sasfix) -> Quarantined and deleted successfully.

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\DRM\amty (Worm.Autorun) -> Quarantined and deleted successfully.

 

Заразени стойности в регистратурата:

HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fredg application (Worm.AutoRun) -> Quarantined and deleted successfully.

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\csrcs (Trojan.Agent) -> Quarantined and deleted successfully.

HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\shell (Worm.AutoRun) -> Delete on reboot.

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Terminal Server\Install\Software\Microsoft\Windows\CurrentVersion\Run\java developer script browse (Trojan.Agent) -> Quarantined and deleted successfully.

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\taskman (Trojan.Agent) -> Quarantined and deleted successfully.

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunServices\csrcs (Trojan.Agent) -> Quarantined and deleted successfully.

 

Заразени информационни обекти в регистратурата:

HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell (Hijack.Shell) -> Bad: (explorer.exe,C:\RECYCLER\S-1-5-21-0243556031-888888379-781863308-1455\fredg.exe) Good: (Explorer.exe) -> Quarantined and deleted successfully.

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell (Hijack.Shell) -> Bad: (Explorer.exe csrcs.exe) Good: (Explorer.exe) -> Quarantined and deleted successfully.

 

Заразени папки:

C:\RECYCLER\S-1-5-21-0243556031-888888379-781863308-1455 (Worm.AutoRun) -> Quarantined and deleted successfully.

 

Заразени файлове:

C:\WINDOWS\system32\drivers\erzcjjlw.sys (Trojan.Agent) -> Delete on reboot.

C:\Documents and Settings\Eli i Nini\Local Settings\Temp\4E.tmp (Trojan.Proxy) -> Quarantined and deleted successfully.

C:\Documents and Settings\Eli i Nini\Local Settings\Temp\7B.tmp (Trojan.Proxy) -> Quarantined and deleted successfully.

C:\Documents and Settings\Eli i Nini\Local Settings\Temp\8.tmp (Backdoor.Bot) -> Quarantined and deleted successfully.

C:\Documents and Settings\Eli i Nini\Local Settings\Temp\83.tmp (Trojan.Proxy) -> Quarantined and deleted successfully.

C:\Documents and Settings\Eli i Nini\Local Settings\Temp\84.tmp (Trojan.Proxy) -> Quarantined and deleted successfully.

C:\Documents and Settings\Eli i Nini\Local Settings\Temp\A1.tmp (Trojan.Proxy) -> Quarantined and deleted successfully.

C:\Documents and Settings\Eli i Nini\Local Settings\Temp\A7.tmp (Backdoor.Bot) -> Quarantined and deleted successfully.

C:\Documents and Settings\Eli i Nini\Local Settings\Temp\A8.tmp (Trojan.Proxy) -> Quarantined and deleted successfully.

C:\Documents and Settings\Eli i Nini\Local Settings\Temp\A9.tmp (Trojan.Proxy) -> Quarantined and deleted successfully.

C:\Documents and Settings\Eli i Nini\Local Settings\Temp\AA.tmp (Backdoor.Bot) -> Quarantined and deleted successfully.

C:\Documents and Settings\Eli i Nini\Local Settings\Temp\AB.tmp (Trojan.Proxy) -> Quarantined and deleted successfully.

C:\Documents and Settings\Eli i Nini\Local Settings\Temp\AC.tmp (Trojan.Proxy) -> Quarantined and deleted successfully.

C:\Documents and Settings\Eli i Nini\Local Settings\Temp\AD.tmp (Trojan.Proxy) -> Quarantined and deleted successfully.

C:\Documents and Settings\Eli i Nini\Local Settings\Temp\128.tmp (Trojan.Proxy) -> Quarantined and deleted successfully.

C:\Documents and Settings\Eli i Nini\Local Settings\Temp\131.tmp (Trojan.Proxy) -> Quarantined and deleted successfully.

C:\Documents and Settings\Eli i Nini\Local Settings\Temp\173.tmp (Trojan.Proxy) -> Quarantined and deleted successfully.

C:\Documents and Settings\Eli i Nini\Local Settings\Temp\17C.tmp (Trojan.Proxy) -> Quarantined and deleted successfully.

C:\Documents and Settings\Eli i Nini\Local Settings\Temp\185.tmp (Trojan.Proxy) -> Quarantined and deleted successfully.

C:\Documents and Settings\Eli i Nini\Local Settings\Temp\192.tmp (Trojan.Proxy) -> Quarantined and deleted successfully.

C:\Documents and Settings\Eli i Nini\Local Settings\Temp\195.tmp (Trojan.Proxy) -> Quarantined and deleted successfully.

C:\Documents and Settings\Eli i Nini\Local Settings\Temp\196.tmp (Trojan.Proxy) -> Quarantined and deleted successfully.

C:\Documents and Settings\Eli i Nini\Local Settings\Temp\198.tmp (Trojan.Proxy) -> Quarantined and deleted successfully.

C:\Documents and Settings\Eli i Nini\Local Settings\Temp\1B0.tmp (Trojan.Proxy) -> Quarantined and deleted successfully.

C:\Documents and Settings\Eli i Nini\Local Settings\Temp\1E8.tmp (Trojan.Proxy) -> Quarantined and deleted successfully.

C:\Documents and Settings\Eli i Nini\Local Settings\Temp\22A.tmp (Trojan.Proxy) -> Quarantined and deleted successfully.

C:\Documents and Settings\Eli i Nini\Local Settings\Temp\E9.tmp (Trojan.Proxy) -> Quarantined and deleted successfully.

C:\Documents and Settings\Eli i Nini\Local Settings\Temp\EA.tmp (Trojan.Proxy) -> Quarantined and deleted successfully.

C:\Documents and Settings\Eli i Nini\Local Settings\Temp\B.tmp (Backdoor.Bot) -> Quarantined and deleted successfully.

C:\Documents and Settings\Eli i Nini\Local Settings\Temp\B6.tmp (Trojan.Proxy) -> Quarantined and deleted successfully.

C:\Documents and Settings\Eli i Nini\Local Settings\Temp\B7.tmp (Backdoor.Bot) -> Quarantined and deleted successfully.

C:\Documents and Settings\Eli i Nini\Local Settings\Temp\CD.tmp (Trojan.Proxy) -> Quarantined and deleted successfully.

C:\Documents and Settings\Eli i Nini\lte.exe (Backdoor.Cetorp) -> Quarantined and deleted successfully.

C:\Documents and Settings\Eli i Nini\Local Settings\Temporary Internet Files\Content.IE5\KR4V7TKU\decc[1] (Trojan.Oficla) -> Quarantined and deleted successfully.

C:\Documents and Settings\Eli i Nini\Local Settings\Temporary Internet Files\Content.IE5\NFHVZL0W\decc[1] (Trojan.Oficla) -> Quarantined and deleted successfully.

C:\Documents and Settings\Eli i Nini\Local Settings\Temporary Internet Files\Content.IE5\Q37IXIP4\decc[1] (Trojan.Oficla) -> Quarantined and deleted successfully.

C:\Documents and Settings\Eli i Nini\Local Settings\Temporary Internet Files\Content.IE5\SVJ3QC1D\decc[1] (Trojan.Oficla) -> Quarantined and deleted successfully.

C:\Documents and Settings\Eli i Nini\Local Settings\Temporary Internet Files\Content.IE5\Y13GP0JQ\decc[1] (Trojan.Oficla) -> Quarantined and deleted successfully.

C:\RECYCLER\S-1-5-21-0243556031-888888379-781863308-1455\Desktop.ini (Worm.AutoRun) -> Quarantined and deleted successfully.

C:\RECYCLER\S-1-5-21-0243556031-888888379-781863308-1455\fredg.exe (Worm.AutoRun) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\csrcs.exe (Trojan.Agent) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\Drivers\ndisvvan.sys (Rootkit.Agent) -> Delete on reboot.

C:\WINDOWS\system32\secupdat.dat (Backdoor.Bot) -> Delete on reboot.

C:\Documents and Settings\Eli i Nini\Local Settings\Temp\OPR2007-2013Sandanski-1.doc (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\Eli i Nini\Local Settings\Temp\OPR2007-2013Sandanski-3.doc (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\Eli i Nini\Local Settings\Temp\OPR2007-2013Sandanski.doc (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\All Users\secupdat.dat (Worm.Autorun) -> Delete on reboot.

C:\Documents and Settings\Default User\secupdat.dat (Worm.Autorun) -> Delete on reboot.

C:\Documents and Settings\Eli i Nini\secupdat.dat (Worm.Autorun) -> Delete on reboot.

C:\Documents and Settings\LocalService\secupdat.dat (Worm.Autorun) -> Delete on reboot.

C:\Documents and Settings\NetworkService\secupdat.dat (Worm.Autorun) -> Delete on reboot.

C:\WINDOWS\system32\config\systemprofile\secupdat.dat (Worm.Autorun) -> Delete on reboot.

Link to comment
Сподели другаде

да, първия път наистина бях прописнала последната част :*)

 

ето какво ми даде сега:

 

Malwarebytes' Anti-Malware 1.46

www.malwarebytes.org

 

Версия на базата от данни: 4326

 

Windows 5.1.2600 Service Pack 3

Internet Explorer 8.0.6001.18702

 

20.7.2010 г. 19:44:00

mbam-log-2010-07-20 (19-44-00).txt

 

Тип сканиране: Бързо сканиране

Сканирани обекти: 129953

Изминало време: 9 минута(и), 26 секунда(и)

 

Заразени процеси в паметта: 0

Заразени модули в паметта: 0

Заразени ключове в регистратурата: 0

Заразени стойности в регистратурата: 0

Заразени информационни обекти в регистратурата: 0

Заразени папки: 0

Заразени файлове: 0

 

Заразени процеси в паметта:

(Не бяха открити зловредни обекти)

 

Заразени модули в паметта:

(Не бяха открити зловредни обекти)

 

Заразени ключове в регистратурата:

(Не бяха открити зловредни обекти)

 

Заразени стойности в регистратурата:

(Не бяха открити зловредни обекти)

 

Заразени информационни обекти в регистратурата:

(Не бяха открити зловредни обекти)

 

 

 

май се оправиха нещата...

Много сте добри !!! Благодаря Ви !!!!

Link to comment
Сподели другаде

Погледни в инструкциите от Night_Raven.:)

- кликни бутон Preferences... (Настройки) и иди на подпрозорец Statistics/Logs (Дневници), маркирай последния лог по дата и кликни бутон View Log... (Покажи дневника);

- копирай съдържанието му тук.

Link to comment
Сподели другаде

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Гост
Отговори на тази тема

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   Не можете да качите директно снимка. Качете или добавете изображението от линк (URL)

Loading...
×
×
  • Създай ново...