Zamieszczam raport po skanowaniu dysków:
__________________________________________________
ewido anti-spyware online scanner
http://www.ewido.net
__________________________________________________
Name: TrackingCookie.Adocean
Path: C:\Documents and Settings\Lake\Cookies\lake@ad.adocean[1].txt
Risk: Medium
Name: TrackingCookie.Yieldmanager
Path: C:\Documents and Settings\Lake\Cookies\lake@ad.yieldmanager[2].txt
Risk: Medium
Name: TrackingCookie.Adbrite
Path: C:\Documents and Settings\Lake\Cookies\lake@adbrite[2].txt
Risk: Medium
Name: TrackingCookie.Adtech
Path: C:\Documents and Settings\Lake\Cookies\lake@adtech[2].txt
Risk: Medium
Name: TrackingCookie.Atdmt
Path: C:\Documents and Settings\Lake\Cookies\lake@atdmt[2].txt
Risk: Medium
Name: TrackingCookie.Bluestreak
Path: C:\Documents and Settings\Lake\Cookies\lake@bluestreak[1].txt
Risk: Medium
Name: TrackingCookie.Casalemedia
Path: C:\Documents and Settings\Lake\Cookies\lake@casalemedia[1].txt
Risk: Medium
Name: TrackingCookie.Doubleclick
Path: C:\Documents and Settings\Lake\Cookies\lake@doubleclick[1].txt
Risk: Medium
Name: TrackingCookie.2o7
Path: C:\Documents and Settings\Lake\Cookies\lake@edsa.122.2o7[1].txt
Risk: Medium
Name: TrackingCookie.Hitbox
Path: C:\Documents and Settings\Lake\Cookies\lake@ehg-kingstontechnology.hitbox[1].txt
Risk: Medium
Name: TrackingCookie.Hitbox
Path: C:\Documents and Settings\Lake\Cookies\lake@ehg-nokiafin.hitbox[1].txt
Risk: Medium
Name: TrackingCookie.Adocean
Path: C:\Documents and Settings\Lake\Cookies\lake@gde.adocean[2].txt
Risk: Medium
Name: TrackingCookie.Hitbox
Path: C:\Documents and Settings\Lake\Cookies\lake@hitbox[1].txt
Risk: Medium
Name: TrackingCookie.Hotlog
Path: C:\Documents and Settings\Lake\Cookies\lake@hotlog[1].txt
Risk: Medium
Name: TrackingCookie.Adocean
Path: C:\Documents and Settings\Lake\Cookies\lake@idg.adocean[2].txt
Risk: Medium
Name: TrackingCookie.Itrack
Path: C:\Documents and Settings\Lake\Cookies\lake@ilead.itrack[1].txt
Risk: Medium
Name: TrackingCookie.Ivwbox
Path: C:\Documents and Settings\Lake\Cookies\lake@ivwbox[2].txt
Risk: Medium
Name: TrackingCookie.Mediaplex
Path: C:\Documents and Settings\Lake\Cookies\lake@mediaplex[1].txt
Risk: Medium
Name: TrackingCookie.2o7
Path: C:\Documents and Settings\Lake\Cookies\lake@microsoftwga.112.2o7[1].txt
Risk: Medium
Name: TrackingCookie.Adocean
Path: C:\Documents and Settings\Lake\Cookies\lake@my.adocean[1].txt
Risk: Medium
Name: TrackingCookie.Popularix
Path: C:\Documents and Settings\Lake\Cookies\lake@ppms.popularix[1].txt
Risk: Medium
Name: TrackingCookie.Adocean
Path: C:\Documents and Settings\Lake\Cookies\lake@pracuj.adocean[1].txt
Risk: Medium
Name: TrackingCookie.Spylog
Path: C:\Documents and Settings\Lake\Cookies\lake@spylog[1].txt
Risk: Medium
Name: TrackingCookie.Onestat
Path: C:\Documents and Settings\Lake\Cookies\lake@stat.onestat[2].txt
Risk: Medium
Name: TrackingCookie.Webtrendslive
Path: C:\Documents and Settings\Lake\Cookies\lake@statse.webtrendslive[2].txt
Risk: Medium
Name: TrackingCookie.Tradedoubler
Path: C:\Documents and Settings\Lake\Cookies\lake@tradedoubler[2].txt
Risk: Medium
Name: TrackingCookie.Smartadserver
Path: C:\Documents and Settings\Lake\Cookies\lake@www.smartadserver[2].txt
Risk: Medium
Name: TrackingCookie.Yadro
Path: C:\Documents and Settings\Lake\Cookies\lake@yadro[1].txt
Risk: Medium
Name: Trojan.Copier
Path: C:\System Volume Information_restore{DFB8C65B-A3B6-4638-B454-E7BBEFD6FC46}\RP44\A0009113.exe
Risk: High
Name: Backdoor.Small.lo
Path: C:\System Volume Information_restore{DFB8C65B-A3B6-4638-B454-E7BBEFD6FC46}\RP44\A0009114.exe
Risk: High
Name: Trojan.Copyself
Path: C:\System Volume Information_restore{DFB8C65B-A3B6-4638-B454-E7BBEFD6FC46}\RP44\A0009118.exe
Risk: High
Name: Dropper.Small.apl
Path: C:\System Volume Information_restore{DFB8C65B-A3B6-4638-B454-E7BBEFD6FC46}\RP44\A0009119.exe
Risk: High
Name: Dropper.Small.apl
Path: C:\System Volume Information_restore{DFB8C65B-A3B6-4638-B454-E7BBEFD6FC46}\RP44\A0009120.exe
Risk: High
Name: Trojan.Copyself
Path: C:\System Volume Information_restore{DFB8C65B-A3B6-4638-B454-E7BBEFD6FC46}\RP44\A0009121.exe
Risk: High
Name: Trojan.Copier
Path: C:\WINDOWS\system32\temp1.exe
Risk: High
Name: Backdoor.Small.lo
Path: C:\WINDOWS\system32\temp2.exe
Risk: High
Name: Worm.VB.dw
Path: D:\System Volume Information_restore{CF105AAE-02FC-4A88-B6FA-53662ADA2C4E}\RP18\A0001979.exe
Risk: High
Name: Backdoor.IRCBot.qc
Path: D:\System Volume Information_restore{CF105AAE-02FC-4A88-B6FA-53662ADA2C4E}\RP18\A0001980.exe
Risk: High
Name: Backdoor.IRCBot.qc
Path: D:\System Volume Information_restore{CF105AAE-02FC-4A88-B6FA-53662ADA2C4E}\RP36\A0006153.exe
Risk: High
Name: Downloader.IstBar.nj
Path: D:\System Volume Information_restore{D6B0561B-398B-462A-BD34-1A3E9515FC14}\RP30\A0008509.exe
Risk: High
Name: Downloader.IstBar.no
Path: D:\System Volume Information_restore{D6B0561B-398B-462A-BD34-1A3E9515FC14}\RP30\A0008510.exe
Risk: High
Name: Not-A-Virus.HackTool.Win32.WwwHack.a
Path: D:\System Volume Information_restore{D6B0561B-398B-462A-BD34-1A3E9515FC14}\RP31\A0023715.exe
Risk: Low
Name: Not-A-Virus.HackTool.Win32.WwwHack.a
Path: D:\System Volume Information_restore{D6B0561B-398B-462A-BD34-1A3E9515FC14}\RP31\A0023717.exe
Risk: Low
Name: Not-A-Virus.HackTool.Win32.WwwHack.a
Path: D:\System Volume Information_restore{D6B0561B-398B-462A-BD34-1A3E9515FC14}\RP31\A0024710.exe
Risk: Low
Name: Not-A-Virus.HackTool.Win32.WwwHack.a
Path: D:\System Volume Information_restore{D6B0561B-398B-462A-BD34-1A3E9515FC14}\RP31\A0024712.exe
Risk: Low
Name: Not-A-Virus.PSWTool.Win32.Brutus
Path: D:\System Volume Information_restore{D6B0561B-398B-462A-BD34-1A3E9515FC14}\RP31\A0024714.exe
Risk: Low
Name: Trojan.Copyself
Path: D:\System Volume Information_restore{DFB8C65B-A3B6-4638-B454-E7BBEFD6FC46}\RP44\A0009122.exe
Risk: High
Name: Dropper.Small.apl
Path: D:\System Volume Information_restore{DFB8C65B-A3B6-4638-B454-E7BBEFD6FC46}\RP44\A0009123.exe
Risk: High
Name: Worm.VB.an
Path: E:\Programy\METASTOCK Professional 8.0(1).zip/Setup.exe
Risk: High
Name: Worm.VB.an
Path: E:\System Volume Information_restore{12B5DD68-048D-4535-AB5C-15075B7B96E0}\RP23\A0015199.exe
Risk: High
Name: Trojan.Copyself
Path: E:\System Volume Information_restore{DFB8C65B-A3B6-4638-B454-E7BBEFD6FC46}\RP44\A0009126.exe
Risk: High
Name: Dropper.Small.apl
Path: E:\System Volume Information_restore{DFB8C65B-A3B6-4638-B454-E7BBEFD6FC46}\RP44\A0009127.exe
Risk: High
Name: Trojan.Copyself
Path: F:\System Volume Information_restore{DFB8C65B-A3B6-4638-B454-E7BBEFD6FC46}\RP44\A0009124.exe
Risk: High
Name: Dropper.Small.apl
Path: F:\System Volume Information_restore{DFB8C65B-A3B6-4638-B454-E7BBEFD6FC46}\RP44\A0009125.exe
Risk: High
Jeżeli chodzi o logi, to nie mam zainstalowanego programu oraz nigdy tego nie robiłem. Postaram się zapoznać z tym zagadnieniem i przesłać jeszcze logi, jeżeli tylko mi sięto uda.
Dziękuje i czekam na pomoc.