deskom Публикувано Април 27, 2010 Report Share Публикувано Април 27, 2010 При старт на РС се появява съобщение: ms visual c++Runtime Library C:\\windows\Explorer.exe, което не мога да го изтрия.Моля, помогнете! Deskom Цитирай Link to comment Сподели другаде More sharing options...
Night_Raven Публикувано Април 28, 2010 Report Share Публикувано Април 28, 2010 Ще може ли по-подробно относно проблема и евентуално с някоя друга снимчица, че на фона на тази информация няма как да получиш никаква адекватна помощ? Цитирай Link to comment Сподели другаде More sharing options...
deskom Публикувано Април 28, 2010 Author Report Share Публикувано Април 28, 2010 Ще може ли по-подробно относно проблема и евентуално с някоя друга снимчица, че на фона на тази информация няма как да получиш никаква адекватна помощ? Пращам още веднъж:При старт на РС се появява съобщение: ms visual c++Runtime Library Runtime errorC:\\windows\Explorer.exe, което не мога да го изтрия. Deskom При старт на РС се появява съобщение: ms visual c++Runtime Library Runtime errorC:\\windows\Explorer.exe, ОК. Давам ОК и РС се рестартира и отново същотосъобщение.Параграф 22!!! Цитирай Link to comment Сподели другаде More sharing options...
deskom Публикувано Април 28, 2010 Author Report Share Публикувано Април 28, 2010 public/style_images/master/snapback.pngNight_Raven Цитирай Link to comment Сподели другаде More sharing options...
Night_Raven Публикувано Април 28, 2010 Report Share Публикувано Април 28, 2010 Сканирай с Malwarebytes' Anti-Malware и SUPERAntiSpyware Free. Ако вече имаш програмите, провери дали имаш последните версии и ако нямаш, премахни твоите и инсталирай най-новите. Ако тепърва инсталираш програмите, след инсталацията те ще предложат да се обновят автоматично, съгласи се. В противен случай обнови дефинициите им ръчно. За Malwarebytes' Anti-Malware:- стартирай програмата;- избери Perform quick scan (Бързо сканиране) и кликни бутон Scan (Сканиране);- след като приключи сканирането, ако не са открити заплахи, ще се отвори автоматично текстов файл (който можеш да затвориш) и програмата ще те уведоми, че не е открила нищо, след което можеш да кликнеш бутон OK и да я затвориш;- ако са открити заплахи, кликни бутон OK и после Show results (Покажи резултатите);- кликни бутон Remove Selected (Премахни избраните);- ще се появи текстов файл (дневник/лог), копирай съдържанието му тук. За SUPERAntiSpyware:- стартирай програмата;- кликни бутон Scan your Computer (Сканиране на компютъра);- вляво избери само дял C:, а вдясно избери Perform Complete Scan (Извърши пълно сканиране);- кликни Next и изчакай програмата да сканира;- кликни OK на съобщението;- ако има засечени заплахи, кликни Next, за да се премахнат гадинките, OK на потвърждението и накрая Finish;- кликни бутон Preferences... (Настройки) и иди на подпрозорец Statistics/Logs (Дневници), маркирай последния лог по дата и кликни бутон View Log... (Покажи дневника);- копирай съдържанието му тук. Ако е нужен рестарт при някое от сканиранията, се съгласи и рестартирай веднага. Цитирай Link to comment Сподели другаде More sharing options...
deskom Публикувано Април 29, 2010 Author Report Share Публикувано Април 29, 2010 Всичко се оправи. Благодаря!Deskom Цитирай Link to comment Сподели другаде More sharing options...
Night_Raven Публикувано Април 29, 2010 Report Share Публикувано Април 29, 2010 Ще може ли да пуснеш съдържанието на логовете все пак? Цитирай Link to comment Сподели другаде More sharing options...
deskom Публикувано Април 30, 2010 Author Report Share Публикувано Април 30, 2010 Ще може ли да пуснеш съдържанието на логовете все пак? ДА! SUPERAntiSpyware Scan Log http://www.superantispyware.com Generated 03/03/2003 at 04:07 PM Application Version : 4.35.1002 Core Rules Database Version : 4866 Trace Rules Database Version: 2678 Scan type : Quick Scan Total Scan Time : 00:12:26 Memory items scanned : 355 Memory threats detected : 1 Registry items scanned : 330 Registry threats detected : 143 File items scanned : 4517 File threats detected : 156 Adware.BetterInternet C:\WINDOWS\BOLGER.DLL C:\WINDOWS\BOLGER.DLL HKU\S-1-5-21-1757981266-1078145449-1060284298-1003\Software\aurora C:\DOCUMENTS AND SETTINGS\USER\LOCAL SETTINGS\TEMP\DRTEMP\PYNUPG.EXE C:\DOCUMENTS AND SETTINGS\USER\LOCAL SETTINGS\TEMP\DRTEMP\BHO_PROB.EXE C:\DOCUMENTS AND SETTINGS\USER\LOCAL SETTINGS\TEMP\DRTEMP\INTLRECO.EXE C:\DOCUMENTS AND SETTINGS\USER\LOCAL SETTINGS\TEMP\DRTEMP\MM_RECO.EXE Installed (reportedly) with eBaysMoMoneyMaker [farmmext] C:\WINDOWS\FARMMEXT.EXE C:\WINDOWS\FARMMEXT.EXE C:\DOCUMENTS AND SETTINGS\USER\LOCAL SETTINGS\TEMP\THI18D.TMP\FARMMEXT.EXE Adware.Bolger HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{302A3240-4805-4a34-97D7-1645A0B08410} HKCR\CLSID\{302A3240-4805-4A34-97D7-1645A0B08410} HKCR\CLSID\{302A3240-4805-4A34-97D7-1645A0B08410} HKCR\CLSID\{302A3240-4805-4A34-97D7-1645A0B08410}\InprocServer32 HKCR\CLSID\{302A3240-4805-4A34-97D7-1645A0B08410}\InprocServer32#ThreadingModel HKCR\CLSID\{302A3240-4805-4A34-97D7-1645A0B08410}\ProgID HKCR\CLSID\{302A3240-4805-4A34-97D7-1645A0B08410}\Programmable HKCR\CLSID\{302A3240-4805-4A34-97D7-1645A0B08410}\TypeLib HKCR\CLSID\{302A3240-4805-4A34-97D7-1645A0B08410}\VersionIndependentProgID HKCR\Bolger.BolgerObj.1 HKCR\Bolger.BolgerObj HKCR\TypeLib\{92daf5c1-2135-4e0c-b7a0-259abfcd3904} HKCR\TypeLib\{92daf5c1-2135-4e0c-b7a0-259abfcd3904}\1.1 HKCR\TypeLib\{92daf5c1-2135-4e0c-b7a0-259abfcd3904}\1.1\0 HKCR\TypeLib\{92daf5c1-2135-4e0c-b7a0-259abfcd3904}\1.1\0\win32 HKCR\TypeLib\{92daf5c1-2135-4e0c-b7a0-259abfcd3904}\1.1\FLAGS HKCR\TypeLib\{92daf5c1-2135-4e0c-b7a0-259abfcd3904}\1.1\HELPDIR HKCR\Interface\{BB0D5ADC-028D-4185-9288-722DDCE2C757} HKCR\Interface\{BB0D5ADC-028D-4185-9288-722DDCE2C757}\ProxyStubClsid HKCR\Interface\{BB0D5ADC-028D-4185-9288-722DDCE2C757}\ProxyStubClsid32 HKCR\Interface\{BB0D5ADC-028D-4185-9288-722DDCE2C757}\TypeLib HKCR\Interface\{BB0D5ADC-028D-4185-9288-722DDCE2C757}\TypeLib#Version Adware.Aurora/Nail HKLM\System\ControlSet001\Services\SvcProc C:\WINDOWS\SVCPROC.EXE HKLM\System\ControlSet001\Enum\Root\LEGACY_SvcProc HKLM\System\ControlSet002\Services\SvcProc HKLM\System\ControlSet002\Enum\Root\LEGACY_SvcProc HKLM\System\ControlSet003\Services\SvcProc HKLM\System\ControlSet003\Enum\Root\LEGACY_SvcProc HKLM\System\CurrentControlSet\Services\SvcProc HKLM\System\CurrentControlSet\Enum\Root\LEGACY_SvcProc C:\WINDOWS\NAIL.EXE C:\DOCUMENTS AND SETTINGS\USER\LOCAL SETTINGS\TEMP\GRI\AURARECO.EXE C:\DOCUMENTS AND SETTINGS\USER\LOCAL SETTINGS\TEMP\QTU\AURARECO.EXE C:\DOCUMENTS AND SETTINGS\USER\LOCAL SETTINGS\TEMP\EHM\AURARECO.EXE C:\WINDOWS\Prefetch\NAIL.EXE-25042152.pf Adware.Tracking Cookie C:\Documents and Settings\User\Cookies\user@statcounter[6].txt C:\Documents and Settings\User\Cookies\user@iacas.adbureau[3].txt C:\Documents and Settings\User\Cookies\user@versiontracker[2].txt C:\Documents and Settings\User\Cookies\user@offeroptimizer[19].txt C:\Documents and Settings\User\Cookies\user@gobleni.themes.medianet[2].txt C:\Documents and Settings\User\Cookies\user@search.mywebsearch[2].txt C:\Documents and Settings\User\Cookies\user@cgi-bin[3].txt C:\Documents and Settings\User\Cookies\user@yadro[3].txt C:\Documents and Settings\User\Cookies\user@indextools[2].txt C:\Documents and Settings\User\Cookies\user@ads.addynamix[3].txt C:\Documents and Settings\User\Cookies\user@cgi-bin[9].txt C:\Documents and Settings\User\Cookies\user@server.iad.liveperson[2].txt C:\Documents and Settings\User\Cookies\user@landing.hitfarm[2].txt C:\Documents and Settings\User\Cookies\user@serving-sys[2].txt C:\Documents and Settings\User\Cookies\user@ads.ibox[1].txt C:\Documents and Settings\User\Cookies\user@fastclick[3].txt C:\Documents and Settings\User\Cookies\user@AdServer[5].txt C:\Documents and Settings\User\Cookies\user@xiti[1].txt C:\Documents and Settings\User\Cookies\user@ad.z5x[1].txt C:\Documents and Settings\User\Cookies\user@z1.adserver[1].txt C:\Documents and Settings\User\Cookies\user@www.burstnet[1].txt C:\Documents and Settings\User\Cookies\user@spylog[2].txt C:\Documents and Settings\User\Cookies\user@2o7[3].txt C:\Documents and Settings\User\Cookies\user@adtech[1].txt C:\Documents and Settings\User\Cookies\user@list[6].txt C:\Documents and Settings\User\Cookies\user@adserver[1].txt C:\Documents and Settings\User\Cookies\user@adrevolver[1].txt C:\Documents and Settings\User\Cookies\user@adrevolver[2].txt C:\Documents and Settings\User\Cookies\user@www.tns-counter[1].txt C:\Documents and Settings\User\Cookies\user@rambler[1].txt C:\Documents and Settings\User\Cookies\user@a[19].txt C:\Documents and Settings\User\Cookies\user@ad.pyce[1].txt C:\Documents and Settings\User\Cookies\user@ads.teleint[1].txt C:\Documents and Settings\User\Cookies\user@webstat[1].txt C:\Documents and Settings\User\Cookies\user@apmebf[4].txt C:\Documents and Settings\User\Cookies\user@revenue[3].txt C:\Documents and Settings\User\Cookies\user@weborama[2].txt C:\Documents and Settings\User\Cookies\user@qnsr[1].txt C:\Documents and Settings\User\Cookies\user@perf.overture[1].txt C:\Documents and Settings\User\Cookies\user@adinterax[2].txt C:\Documents and Settings\User\Cookies\user@btg.btgrab[21].txt C:\Documents and Settings\User\Cookies\user@cgi-bin[7].txt C:\Documents and Settings\User\Cookies\user@ad.yieldmanager[9].txt C:\Documents and Settings\User\Cookies\user@ads.pimdesign[1].txt C:\Documents and Settings\User\Cookies\user@tribalfusion[3].txt C:\Documents and Settings\User\Cookies\user@keywordmax[1].txt C:\Documents and Settings\User\Cookies\user@revsci[1].txt C:\Documents and Settings\User\Cookies\user@tripod[2].txt C:\Documents and Settings\User\Cookies\user@cliks[14].txt C:\Documents and Settings\User\Cookies\user@a[9].txt C:\Documents and Settings\User\Cookies\user@cgi-bin[8].txt C:\Documents and Settings\User\Cookies\user@questionmarket[3].txt C:\Documents and Settings\User\Cookies\user@ads.lex[2].txt C:\Documents and Settings\User\Cookies\user@casalemedia[2].txt C:\Documents and Settings\User\Cookies\user@www.kissmycountryass[1].txt C:\Documents and Settings\User\Cookies\user@bluestreak[1].txt C:\Documents and Settings\User\Cookies\user@teenproblem[1].txt C:\Documents and Settings\User\Cookies\user@azjmp[2].txt C:\Documents and Settings\User\Cookies\user@partner2profit[2].txt C:\Documents and Settings\User\Cookies\user@bestoffersnetworks[12].txt C:\Documents and Settings\User\Cookies\user@windowsmedia[1].txt C:\Documents and Settings\User\Cookies\user@m1.webstats.motigo[2].txt C:\Documents and Settings\User\Cookies\user@ads.pointroll[2].txt C:\Documents and Settings\User\Cookies\user@cgi-bin[1].txt C:\Documents and Settings\User\Cookies\user@clickaider[2].txt C:\Documents and Settings\User\Cookies\user@server.cpmstar[1].txt C:\Documents and Settings\User\Cookies\user@ads.l-word[2].txt C:\Documents and Settings\User\Cookies\user@tradedoubler[2].txt C:\Documents and Settings\User\Cookies\user@bs.serving-sys[2].txt C:\Documents and Settings\User\Cookies\user@belnk[1].txt C:\Documents and Settings\User\Cookies\user@zedo[1].txt C:\Documents and Settings\User\Cookies\user@gostats[1].txt C:\Documents and Settings\User\Cookies\user@hotlog[1].txt C:\Documents and Settings\User\Cookies\user@rem.rezonmedia[2].txt C:\Documents and Settings\User\Cookies\user@mywebsearch[4].txt C:\Documents and Settings\User\Cookies\user@adopt.euroclick[3].txt C:\Documents and Settings\User\Cookies\user@specificclick[1].txt C:\Documents and Settings\User\Cookies\user@42435556[1].txt C:\Documents and Settings\User\Cookies\user@ad.orbitel[1].txt C:\Documents and Settings\User\Cookies\user@cgm.adbureau[2].txt C:\Documents and Settings\User\Cookies\user@qksrv[2].txt C:\Documents and Settings\User\Cookies\user@ads.gamesbannernet[2].txt C:\Documents and Settings\User\Cookies\user@toplist[1].txt C:\Documents and Settings\User\Cookies\user@product[1].txt C:\Documents and Settings\User\Cookies\user@imusicdownloads4[1].txt C:\Documents and Settings\User\Cookies\user@hearstmagazines.112.2o7[1].txt C:\Documents and Settings\User\Cookies\user@edge.ru4[1].txt C:\Documents and Settings\User\Cookies\user@1025717725[1].txt C:\Documents and Settings\User\Cookies\user@1062516770[1].txt C:\Documents and Settings\User\Cookies\user@tv-seriali-sepphora.blogspot[1].txt C:\Documents and Settings\User\Cookies\user@ads.btv[3].txt C:\Documents and Settings\User\Cookies\user@ads.webground[2].txt C:\Documents and Settings\User\Cookies\user@insightexpressai[2].txt C:\Documents and Settings\User\Cookies\user@adbrite[1].txt C:\Documents and Settings\User\Cookies\user@1070128081[1].txt C:\Documents and Settings\User\Cookies\user@ad.zanox[2].txt C:\Documents and Settings\User\Cookies\user@1066763167[1].txt C:\Documents and Settings\User\Cookies\user@ak[1].txt C:\Documents and Settings\User\Cookies\user@1058036759[1].txt C:\Documents and Settings\User\Cookies\user@ads.mondogames[2].txt C:\Documents and Settings\User\Cookies\user@1032358201[1].txt C:\Documents and Settings\User\Cookies\user@tvguide.112.2o7[1].txt C:\Documents and Settings\User\Cookies\user@ad.investor[2].txt C:\Documents and Settings\User\Cookies\user@eas.apm.emediate[1].txt C:\Documents and Settings\User\Cookies\user@www.trafficmarket[1].txt C:\Documents and Settings\User\Cookies\user@media6degrees[2].txt C:\Documents and Settings\User\Cookies\user@content.yieldmanager[1].txt C:\Documents and Settings\User\Cookies\user@ads.standartnews[2].txt C:\Documents and Settings\User\Cookies\user@dynamic.media.adrevolver[2].txt C:\Documents and Settings\User\Cookies\user@etargetnet[2].txt C:\Documents and Settings\User\Cookies\user@tacoda[2].txt C:\Documents and Settings\User\Cookies\user@media.adrevolver[1].txt C:\Documents and Settings\User\Cookies\user@ads.mucunki[2].txt C:\Documents and Settings\User\Cookies\user@ads.hapcheto[2].txt C:\Documents and Settings\User\Cookies\user@1071821901[1].txt C:\Documents and Settings\User\Cookies\user@new.addfreestats[1].txt C:\Documents and Settings\User\Cookies\user@harpo.122.2o7[1].txt C:\Documents and Settings\User\Cookies\user@delivery.usermedia[2].txt C:\Documents and Settings\User\Cookies\user@1037738211[1].txt C:\Documents and Settings\User\Cookies\user@ads.onmedia[2].txt C:\Documents and Settings\User\Cookies\user@ad.httpool[1].txt C:\Documents and Settings\User\Cookies\user@cgi-bin[5].txt C:\Documents and Settings\User\Cookies\user@cbs.112.2o7[1].txt C:\Documents and Settings\User\Cookies\user@smartadserver[1].txt C:\Documents and Settings\User\Cookies\user@karti.bghotelite[2].txt C:\Documents and Settings\User\Cookies\user@ads.premiership[3].txt www.googleadservices.com [ C:\Documents and Settings\User\Application Data\Mozilla\Profiles\default\dqgit9yp.slt\cookies.txt ] counter.search.bg [ C:\Documents and Settings\User\Application Data\Mozilla\Profiles\default\dqgit9yp.slt\cookies.txt ] Adware.MyWebSearch/FunWebProducts HKU\S-1-5-21-1757981266-1078145449-1060284298-1003\SOFTWARE\FunWebProducts HKCR\Interface\{07B18EAA-A523-4961-B6BB-170DE4475CCA} HKCR\Interface\{07B18EAA-A523-4961-B6BB-170DE4475CCA}\ProxyStubClsid HKCR\Interface\{07B18EAA-A523-4961-B6BB-170DE4475CCA}\ProxyStubClsid32 HKCR\Interface\{07B18EAA-A523-4961-B6BB-170DE4475CCA}\TypeLib HKCR\Interface\{07B18EAA-A523-4961-B6BB-170DE4475CCA}\TypeLib#Version HKCR\Interface\{07B18EAC-A523-4961-B6BB-170DE4475CCA} HKCR\Interface\{07B18EAC-A523-4961-B6BB-170DE4475CCA}\ProxyStubClsid HKCR\Interface\{07B18EAC-A523-4961-B6BB-170DE4475CCA}\ProxyStubClsid32 HKCR\Interface\{07B18EAC-A523-4961-B6BB-170DE4475CCA}\TypeLib HKCR\Interface\{07B18EAC-A523-4961-B6BB-170DE4475CCA}\TypeLib#Version HKCR\Interface\{1093995A-BA37-41D2-836E-091067C4AD17} HKCR\Interface\{1093995A-BA37-41D2-836E-091067C4AD17}\ProxyStubClsid HKCR\Interface\{1093995A-BA37-41D2-836E-091067C4AD17}\ProxyStubClsid32 HKCR\Interface\{1093995A-BA37-41D2-836E-091067C4AD17}\TypeLib HKCR\Interface\{1093995A-BA37-41D2-836E-091067C4AD17}\TypeLib#Version HKCR\Interface\{120927BF-1700-43BC-810F-FAB92549B390} HKCR\Interface\{120927BF-1700-43BC-810F-FAB92549B390}\ProxyStubClsid HKCR\Interface\{120927BF-1700-43BC-810F-FAB92549B390}\ProxyStubClsid32 HKCR\Interface\{120927BF-1700-43BC-810F-FAB92549B390}\TypeLib HKCR\Interface\{120927BF-1700-43BC-810F-FAB92549B390}\TypeLib#Version HKCR\Interface\{247A115F-06C2-4FB3-967D-2D62D3CF4F0A} HKCR\Interface\{247A115F-06C2-4FB3-967D-2D62D3CF4F0A}\ProxyStubClsid HKCR\Interface\{247A115F-06C2-4FB3-967D-2D62D3CF4F0A}\ProxyStubClsid32 HKCR\Interface\{247A115F-06C2-4FB3-967D-2D62D3CF4F0A}\TypeLib HKCR\Interface\{247A115F-06C2-4FB3-967D-2D62D3CF4F0A}\TypeLib#Version HKCR\Interface\{2E3537FC-CF2F-4F56-AF54-5A6A3DD375CC} HKCR\Interface\{2E3537FC-CF2F-4F56-AF54-5A6A3DD375CC}\ProxyStubClsid HKCR\Interface\{2E3537FC-CF2F-4F56-AF54-5A6A3DD375CC}\ProxyStubClsid32 HKCR\Interface\{2E3537FC-CF2F-4F56-AF54-5A6A3DD375CC}\TypeLib HKCR\Interface\{2E3537FC-CF2F-4F56-AF54-5A6A3DD375CC}\TypeLib#Version HKCR\Interface\{2E9937FC-CF2F-4F56-AF54-5A6A3DD375CC} HKCR\Interface\{2E9937FC-CF2F-4F56-AF54-5A6A3DD375CC}\ProxyStubClsid HKCR\Interface\{2E9937FC-CF2F-4F56-AF54-5A6A3DD375CC}\ProxyStubClsid32 HKCR\Interface\{2E9937FC-CF2F-4F56-AF54-5A6A3DD375CC}\TypeLib HKCR\Interface\{2E9937FC-CF2F-4F56-AF54-5A6A3DD375CC}\TypeLib#Version HKCR\Interface\{3E1656ED-F60E-4597-B6AA-B6A58E171495} HKCR\Interface\{3E1656ED-F60E-4597-B6AA-B6A58E171495}\ProxyStubClsid HKCR\Interface\{3E1656ED-F60E-4597-B6AA-B6A58E171495}\ProxyStubClsid32 HKCR\Interface\{3E1656ED-F60E-4597-B6AA-B6A58E171495}\TypeLib HKCR\Interface\{3E1656ED-F60E-4597-B6AA-B6A58E171495}\TypeLib#Version HKCR\Interface\{3E53E2CB-86DB-4A4A-8BD9-FFEB7A64DF82} HKCR\Interface\{3E53E2CB-86DB-4A4A-8BD9-FFEB7A64DF82}\ProxyStubClsid HKCR\Interface\{3E53E2CB-86DB-4A4A-8BD9-FFEB7A64DF82}\ProxyStubClsid32 HKCR\Interface\{3E53E2CB-86DB-4A4A-8BD9-FFEB7A64DF82}\TypeLib HKCR\Interface\{3E53E2CB-86DB-4A4A-8BD9-FFEB7A64DF82}\TypeLib#Version HKCR\Interface\{3E720451-B472-4954-B7AA-33069EB53906} HKCR\Interface\{3E720451-B472-4954-B7AA-33069EB53906}\ProxyStubClsid HKCR\Interface\{3E720451-B472-4954-B7AA-33069EB53906}\ProxyStubClsid32 HKCR\Interface\{3E720451-B472-4954-B7AA-33069EB53906}\TypeLib HKCR\Interface\{3E720451-B472-4954-B7AA-33069EB53906}\TypeLib#Version HKCR\Interface\{3E720453-B472-4954-B7AA-33069EB53906} HKCR\Interface\{3E720453-B472-4954-B7AA-33069EB53906}\ProxyStubClsid HKCR\Interface\{3E720453-B472-4954-B7AA-33069EB53906}\ProxyStubClsid32 HKCR\Interface\{3E720453-B472-4954-B7AA-33069EB53906}\TypeLib HKCR\Interface\{3E720453-B472-4954-B7AA-33069EB53906}\TypeLib#Version HKCR\Interface\{63D0ED2B-B45B-4458-8B3B-60C69BBBD83C} HKCR\Interface\{63D0ED2B-B45B-4458-8B3B-60C69BBBD83C}\ProxyStubClsid HKCR\Interface\{63D0ED2B-B45B-4458-8B3B-60C69BBBD83C}\ProxyStubClsid32 HKCR\Interface\{63D0ED2B-B45B-4458-8B3B-60C69BBBD83C}\TypeLib HKCR\Interface\{63D0ED2B-B45B-4458-8B3B-60C69BBBD83C}\TypeLib#Version HKCR\Interface\{63D0ED2D-B45B-4458-8B3B-60C69BBBD83C} HKCR\Interface\{63D0ED2D-B45B-4458-8B3B-60C69BBBD83C}\ProxyStubClsid HKCR\Interface\{63D0ED2D-B45B-4458-8B3B-60C69BBBD83C}\ProxyStubClsid32 HKCR\Interface\{63D0ED2D-B45B-4458-8B3B-60C69BBBD83C}\TypeLib HKCR\Interface\{63D0ED2D-B45B-4458-8B3B-60C69BBBD83C}\TypeLib#Version HKCR\Interface\{6E74766C-4D93-4CC0-96D1-47B8E07FF9CA} HKCR\Interface\{6E74766C-4D93-4CC0-96D1-47B8E07FF9CA}\ProxyStubClsid HKCR\Interface\{6E74766C-4D93-4CC0-96D1-47B8E07FF9CA}\ProxyStubClsid32 HKCR\Interface\{6E74766C-4D93-4CC0-96D1-47B8E07FF9CA}\TypeLib HKCR\Interface\{6E74766C-4D93-4CC0-96D1-47B8E07FF9CA}\TypeLib#Version HKCR\Interface\{741DE825-A6F0-4497-9AA6-8023CF9B0FFF} HKCR\Interface\{741DE825-A6F0-4497-9AA6-8023CF9B0FFF}\ProxyStubClsid HKCR\Interface\{741DE825-A6F0-4497-9AA6-8023CF9B0FFF}\ProxyStubClsid32 HKCR\Interface\{741DE825-A6F0-4497-9AA6-8023CF9B0FFF}\TypeLib HKCR\Interface\{741DE825-A6F0-4497-9AA6-8023CF9B0FFF}\TypeLib#Version HKCR\Interface\{7473D291-B7BB-4F24-AE82-7E2CE94BB6A9} HKCR\Interface\{7473D291-B7BB-4F24-AE82-7E2CE94BB6A9}\ProxyStubClsid HKCR\Interface\{7473D291-B7BB-4F24-AE82-7E2CE94BB6A9}\ProxyStubClsid32 HKCR\Interface\{7473D291-B7BB-4F24-AE82-7E2CE94BB6A9}\TypeLib HKCR\Interface\{7473D291-B7BB-4F24-AE82-7E2CE94BB6A9}\TypeLib#Version HKCR\Interface\{90449521-D834-4703-BB4E-D3AA44042FF8} HKCR\Interface\{90449521-D834-4703-BB4E-D3AA44042FF8}\ProxyStubClsid HKCR\Interface\{90449521-D834-4703-BB4E-D3AA44042FF8}\ProxyStubClsid32 HKCR\Interface\{90449521-D834-4703-BB4E-D3AA44042FF8}\TypeLib HKCR\Interface\{90449521-D834-4703-BB4E-D3AA44042FF8}\TypeLib#Version HKCR\Interface\{991AAC62-B100-47CE-8B75-253965244F69} HKCR\Interface\{991AAC62-B100-47CE-8B75-253965244F69}\ProxyStubClsid HKCR\Interface\{991AAC62-B100-47CE-8B75-253965244F69}\ProxyStubClsid32 HKCR\Interface\{991AAC62-B100-47CE-8B75-253965244F69}\TypeLib HKCR\Interface\{991AAC62-B100-47CE-8B75-253965244F69}\TypeLib#Version HKCR\Interface\{BBABDC90-F3D5-4801-863A-EE6AE529862D} HKCR\Interface\{BBABDC90-F3D5-4801-863A-EE6AE529862D}\ProxyStubClsid HKCR\Interface\{BBABDC90-F3D5-4801-863A-EE6AE529862D}\ProxyStubClsid32 HKCR\Interface\{BBABDC90-F3D5-4801-863A-EE6AE529862D}\TypeLib HKCR\Interface\{BBABDC90-F3D5-4801-863A-EE6AE529862D}\TypeLib#Version HKCR\Interface\{D6FF3684-AD3B-48EB-BBB4-B9E6C5A355C1} HKCR\Interface\{D6FF3684-AD3B-48EB-BBB4-B9E6C5A355C1}\ProxyStubClsid HKCR\Interface\{D6FF3684-AD3B-48EB-BBB4-B9E6C5A355C1}\ProxyStubClsid32 HKCR\Interface\{D6FF3684-AD3B-48EB-BBB4-B9E6C5A355C1}\TypeLib HKCR\Interface\{D6FF3684-AD3B-48EB-BBB4-B9E6C5A355C1}\TypeLib#Version HKCR\Interface\{DE38C398-B328-4F4C-A3AD-1B5E4ED93477} HKCR\Interface\{DE38C398-B328-4F4C-A3AD-1B5E4ED93477}\ProxyStubClsid HKCR\Interface\{DE38C398-B328-4F4C-A3AD-1B5E4ED93477}\ProxyStubClsid32 HKCR\Interface\{DE38C398-B328-4F4C-A3AD-1B5E4ED93477}\TypeLib HKCR\Interface\{DE38C398-B328-4F4C-A3AD-1B5E4ED93477}\TypeLib#Version HKCR\Interface\{EB9E5C1C-B1F9-4C2B-BE8A-27D6446FDAF8} HKCR\Interface\{EB9E5C1C-B1F9-4C2B-BE8A-27D6446FDAF8}\ProxyStubClsid HKCR\Interface\{EB9E5C1C-B1F9-4C2B-BE8A-27D6446FDAF8}\ProxyStubClsid32 HKCR\Interface\{EB9E5C1C-B1F9-4C2B-BE8A-27D6446FDAF8}\TypeLib HKCR\Interface\{EB9E5C1C-B1F9-4C2B-BE8A-27D6446FDAF8}\TypeLib#Version Unclassified.Unknown Origin C:\WINDOWS\OARIXGJ.EXE C:\WINDOWS\WLGXTI.EXE C:\WINDOWS\CUVZZVX.EXE C:\WINDOWS\WBQIFS.EXE C:\WINDOWS\KGINZAE.EXE C:\WINDOWS\QMJUME.EXE C:\WINDOWS\WRPESDQ.EXE C:\WINDOWS\IGIGHRV.EXE C:\WINDOWS\GZXILD.EXE C:\WINDOWS\Prefetch\IGIGHRV.EXE-2D9B7E36.pf Adware.Best Offers Network C:\WINDOWS\IFBRDNNMY.EXE Trojan.Unclassified-Packed/Suspicious C:\WINDOWS\2_0_1BROWSERHELPER2.DLL Pynix Adware BHO C:\DOCUMENTS AND SETTINGS\USER\LOCAL SETTINGS\TEMP\THI509.TMP\PYNIX.DLL Unknown Process (WFYWBTZ.EXE) C:\DOCUMENTS AND SETTINGS\USER\LOCAL SETTINGS\TEMP\THI509.TMP\POLALL1P.EXE Trojan.Downloader-Gen/Suspicious C:\TEMP\WINADCTLINSTPACK.EXE Цитирай Link to comment Сподели другаде More sharing options...
Night_Raven Публикувано Април 30, 2010 Report Share Публикувано Април 30, 2010 На Malwarebytes' Anti-Malware? Цитирай Link to comment Сподели другаде More sharing options...
Препоръчан пост
Join the conversation
You can post now and register later. If you have an account, sign in now to post with your account.