Brakujacy plik w tools
Witam.
Wyskoczyla mi ramka zaraz po zalaczeniu komputera.
C:\WINDOWS\System32\Tools\DelFolders.exe
System Windows nie może odnaleź pliku "C:\WINDOWS\System32\Tools\DelFolders.exe". Upewnij się, że wpisana nazwa jest poprawna i spróbuj ponownie. Aby wyszukac plik, kliknij przycisk Start, a nastepnie kliknij polecenie Wyszukaj.
Bardzo prosze o pomoc w znalezieniu pliku.
Probowalem wyszukac ten plik na plycie z Windowsem i niestety nie znalazlo tego.
Odpowiedzi: 6
Usuń HijackThisem wpis
[quote]O4 - Startup: Reboot.exe[/quote]
:lol:
Pomoze ktos czy nie? ;/
Przyklejam log z AVZ
Attention !!! The database was last updated 2007-04-17 - it is necessary to update the bases using automatic updates (File/Database update)
AVZ Antiviral Toolkit log; AVZ version is 4.25
Scanning started at 2007-09-09 09:55:04
Database loaded: 103395 signatures, 2 NN profile(s), 55 microprograms of healing, signature database released 17.04.2007 15:26
Heuristic microprograms loaded : 369
Digital signatures of system files loaded: 58493
Heuristic analyzer mode: Medium heuristics level
Healing mode: disabled
Windows version: 5.1.2600, Dodatek Service Pack 2 ; AVZ is launched with administrator rights
1. Searching for rootkits and programs intercepting API functions
1.1 Searching for user-mode API hooks
Analysis: kernel32.dll, export table found in section: .text
Analysis: ntdll.dll, export table found in section: .text
Analysis: user32.dll, export table found in section: .text
Analysis: advapi32.dll, export table found in section: .text
Analysis: ws2_32.dll, export table found in section: .text
Analysis: wininet.dll, export table found in section: .text
Analysis: rasapi32.dll, export table found in section: .text
Analysis: urlmon.dll, export table found in section: .text
Analysis: netapi32.dll, export table found in section: .text
1.2 Searching for kernel-mode API hooks
Driver loaded successfully
SDT found (RVA=0846E0)
Kernel ntkrnlpa.exe found in the memory at the address 804D7000
SDT = 8055B6E0
KiST = 80503940 (284)
Function NtClose (19) intercepted (805BAF64->F74C1028), hook C:\WINDOWS\system32\Drivers\a347bus.sys
Function NtCreateKey (29) intercepted (80622104->F74C0FE0), hook C:\WINDOWS\system32\Drivers\a347bus.sys
Function NtCreatePagingFile (2D) intercepted (805AA4C4->F74B4B00), hook C:\WINDOWS\system32\Drivers\a347bus.sys
Function NtEnumerateKey (47) intercepted (80622944->F74B55DC), hook C:\WINDOWS\system32\Drivers\a347bus.sys
Function NtEnumerateValueKey (49) intercepted (80622BAE->F74C1120), hook C:\WINDOWS\system32\Drivers\a347bus.sys
Function NtOpenFile (74) intercepted (80578FD0->F74B4B40), hook C:\WINDOWS\system32\Drivers\a347bus.sys
Function NtOpenKey (77) intercepted (8062349A->F74C0FA4), hook C:\WINDOWS\system32\Drivers\a347bus.sys
Function NtQueryKey (A0) intercepted (806237BE->F74B55FC), hook C:\WINDOWS\system32\Drivers\a347bus.sys
Function NtQueryValueKey (B1) intercepted (806201BE->F74C1076), hook C:\WINDOWS\system32\Drivers\a347bus.sys
Function NtSetSystemPowerState (F1) intercepted (80650E26->F74C0550), hook C:\WINDOWS\system32\Drivers\a347bus.sys
Functions checked: 284, intercepted: 10, restored: 0
1.3 Checking IDT and SYSENTER
Analysis for CPU 1
Analysis for CPU 2
Checking IDT and SYSENTER - complete
1.4 Searching for masking processes and drivers
The extended monitoring driver (AVZPM) is not installed, examination is not performed
2. Scanning memory
Number of processes found: 32
Number of modules loaded: 437
Memory checking - complete
3. Scanning disks
Direct reading C:\Documents and Settings\Właściciel\Ustawienia lokalne\Temp\~DFD71B.tmp
Direct reading C:\System Volume Information\_restore{C124FAE6-1FD3-488E-AD50-DB2919E88F56}\RP196\A0125256.exe
Direct reading C:\System Volume Information\_restore{C124FAE6-1FD3-488E-AD50-DB2919E88F56}\RP196\A0125258.sys
Direct reading C:\System Volume Information\_restore{C124FAE6-1FD3-488E-AD50-DB2919E88F56}\RP196\A0126259.exe
Direct reading C:\System Volume Information\_restore{C124FAE6-1FD3-488E-AD50-DB2919E88F56}\RP196\A0126260.sys
Direct reading C:\System Volume Information\_restore{C124FAE6-1FD3-488E-AD50-DB2919E88F56}\RP196\A0127256.exe
Direct reading C:\WINDOWS\system32\drivers\atapi.sys
4. Checking Winsock Layered Service Provider (SPI/LSP)
LSP settings checked. No errors detected
5. Searching for keyboard/mouse/windows events hooks (Keyloggers, Trojan DLLs)
C:\Program Files\Gadu-Gadu\ggwhook.dll --> Suspicion for a Keylogger or Trojan DLL
C:\Program Files\Gadu-Gadu\ggwhook.dll>>> Behavioral analysis:
1. Reacts to events: keyboard
C:\Program Files\Gadu-Gadu\ggwhook.dll>>> Neural net: file with probability of 99.91% like a typical keyboard/mouse events interceptor
Note: Do NOT delete suspicious files, send them for analysis (see FAQ for more details), because there are lots of useful hooking DLLs
6. Searching for opened TCP/UDP ports used by malicious programs
checking disabled by user
7. Heuristic system check
Checking complete
Files scanned: 122146, extracted from archives: 87114, malicious programs found 0
Scanning finished at 2007-09-09 10:11:30
Time of scanning: 00:16:26
If you have a suspicion on presence of viruses or questions on the suspected objects,
you can address http://virusinfo.info conference
co do O2 - BHO: BitComet ClickCapture - {39F7E362-828A-4B5A-BCAF-5B79BFDFEA60} - C:\Program Files\BitComet\tools\BitCometBHO_1.1.2.7.dll mam wątpliwości.mniejsza z tym to żółty powie.
skoro twierdzą że to jest syf, to znaczy że ten syf wszedł do kompa otworzył sobie klucz a samego pliku AVG nie wpuścił. można użyć albo spybota, albo SpywareDocktor albo spróbujmy [url=http://z-oleg.com/avz4en.zip]To[/url], otwórz archiwum kliknij na avz.exe . zaznacz wszystkie dyski .
skanuj i nie zamykaj go a przyklej tu jego logi, to co będzie w kwarantannie można wywalić. Kwarantanne znajdziesz w menu-> File->"Quarantane Folder Viwer".
P.S. zalecane podczas skanowania wyłączyć tymczasowo AVG.
Zrobilem krok po kroku tak jak tam pisalo i co? Nic... dalej to samo mi wyskakuje i przy zalaczaniu komputera jaki przy instalowaniu czego kolwiek... Wiec prosze o sprawdzenie loga jesli bylby ktos tak mily. Moze to cos pomoze.
Z gory dziekuje
a o to log:
Logfile of HijackThis v1.99.1
Scan saved at 22:21:50, on 2007-09-07
Platform: Windows XP Dodatek SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v7.00 (7.00.6000.16512)
Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\Ati2evxx.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\Ati2evxx.exe
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\Explorer.EXE
C:\PROGRA~1\Grisoft\AVG7\avgamsvr.exe
C:\PROGRA~1\Grisoft\AVG7\avgupsvc.exe
C:\PROGRA~1\Grisoft\AVG7\avgemc.exe
C:\WINDOWS\system32\HPZipm12.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\SOUNDMAN.EXE
C:\PROGRA~1\Grisoft\AVG7\avgcc.exe
C:\Program Files\HP\HP Software Update\HPWuSchd2.exe
C:\Program Files\Gadu-Gadu\gg.exe
C:\Program Files\ATI Technologies\ATI.ACE\Core-Static\MOM.EXE
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\HP\Digital Imaging\bin\hpqtra08.exe
C:\Program Files\REALTEK RTL8185 Wireless LAN Driver and Utility\RtWLan.exe
C:\Program Files\ATI Technologies\ATI.ACE\Core-Static\ccc.exe
C:\Program Files\HP\Digital Imaging\bin\hpqSTE08.exe
C:\Program Files\HP\Digital Imaging\Product Assistant\bin\hprblog.exe
C:\Program Files\Mozilla Firefox\firefox.exe
H:\INSTALKI\NAPRAWIANIE\HijackThis.exe
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.onet.pl/
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?LinkId=69157
R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName = Łącza
O2 - BHO: Skype add-on (mastermind) - {22BF413B-C6D2-4d91-82A9-A0F997BA588C} - C:\Program Files\Skype\Toolbars\Internet Explorer\SkypeIEPlugin.dll
O2 - BHO: BitComet ClickCapture - {39F7E362-828A-4B5A-BCAF-5B79BFDFEA60} - C:\Program Files\BitComet\tools\BitCometBHO_1.1.2.7.dll
O4 - HKLM\..\Run: [SoundMan] SOUNDMAN.EXE
O4 - HKLM\..\Run: [AVG7_CC] C:\PROGRA~1\Grisoft\AVG7\avgcc.exe /STARTUP
O4 - HKLM\..\Run: [HP Software Update] C:\Program Files\HP\HP Software Update\HPWuSchd2.exe
O4 - HKLM\..\Run: [NeroFilterCheck] C:\WINDOWS\system32\NeroCheck.exe
O4 - HKCU\..\Run: [StartCCC] C:\Program Files\ATI Technologies\ATI.ACE\Core-Static\CLIStart.exe
O4 - HKCU\..\Run: [Gadu-Gadu] "C:\Program Files\Gadu-Gadu\gg.exe" /tray
O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
O4 - Startup: Reboot.exe
O4 - Global Startup: HP Digital Imaging Monitor.lnk = C:\Program Files\HP\Digital Imaging\bin\hpqtra08.exe
O4 - Global Startup: REALTEK RTL8185 Wireless LAN Utility.lnk = C:\Program Files\REALTEK RTL8185 Wireless LAN Driver and Utility\RtWLan.exe
O8 - Extra context menu item: Download all links using BitComet - res://C:\Program Files\BitComet\BitComet.exe/AddAllLink.htm
O8 - Extra context menu item: Download all videos using BitComet - res://C:\Program Files\BitComet\BitComet.exe/AddVideo.htm
O8 - Extra context menu item: Download link using &BitComet - res://C:\Program Files\BitComet\BitComet.exe/AddLink.htm
O9 - Extra button: Skype - {77BF5300-1474-4EC7-9980-D32B190E9B07} - C:\Program Files\Skype\Toolbars\Internet Explorer\SkypeIEPlugin.dll
O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - %windir%\Network Diagnostic\xpnetdiag.exe (file missing)
O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - %windir%\Network Diagnostic\xpnetdiag.exe (file missing)
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O11 - Options group: [INTERNATIONAL] International*
O16 - DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} (WUWebControl Class) - http://www.update.microsoft.com/windowsupdate/v6/V5Controls/en/x86/client/wuweb_site.cab?1188824969296
O16 - DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} (Shockwave Flash Object) - http://fpdownload2.macromedia.com/get/shockwave/cabs/flash/swflash.cab
O18 - Protocol: skype4com - {FFC8B962-9B40-4DFF-9458-1830C7DD7F5D} - C:\PROGRA~1\COMMON~1\Skype\SKYPE4~1.DLL
O23 - Service: Ati HotKey Poller - ATI Technologies Inc. - C:\WINDOWS\system32\Ati2evxx.exe
O23 - Service: ATI Smart - Unknown owner - C:\WINDOWS\system32\ati2sgag.exe
O23 - Service: AVG7 Alert Manager Server (Avg7Alrt) - GRISOFT, s.r.o. - C:\PROGRA~1\Grisoft\AVG7\avgamsvr.exe
O23 - Service: AVG7 Update Service (Avg7UpdSvc) - GRISOFT, s.r.o. - C:\PROGRA~1\Grisoft\AVG7\avgupsvc.exe
O23 - Service: AVG E-mail Scanner (AVGEMS) - GRISOFT, s.r.o. - C:\PROGRA~1\Grisoft\AVG7\avgemc.exe
O23 - Service: Pml Driver HPZ12 - HP - C:\WINDOWS\system32\HPZipm12.exe
http://forum.centrumxp.pl/Default.aspx?g=posts&m=414420
Strona 1 / 1