Pomocy

To jest log z Ad-aware co mam usunąc i jak to usunąc bo juz nie wyrabiam?

Lavasoft Ad-aware Personal Build 6.181

Logfile created on :25 września 2004 10:06:20

Created with Ad-aware Personal, free for private use.

Using reference-file :01R341 14.09.2004

______________________________________________________

Ad-aware Settings

=========================

Set : Activate in-depth scan (Recommended)

Set : Safe mode (always request confirmation)

Set : Scan active processes

Set : Scan registry

Set : Deep scan registry

Set : Scan my IE Favorites for banned URLs

Set : Scan within archives

Set : Scan my Hosts file

2004-09-25 10:06:20 - Scan started. (Smart mode)

Listing running processes

ŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻ

#:1 [smss.exe]

FilePath : \SystemRoot\System32\

ThreadCreationTime : 2004-09-25 08:05:44

BasePriority : Normal

#:2 [winlogon.exe]

FilePath : ??\C:\WINDOWS\system32\

ThreadCreationTime : 2004-09-25 08:05:46

BasePriority : High

#:3 [services.exe]

FilePath : C:\WINDOWS\system32\

ThreadCreationTime : 2004-09-25 08:05:46

BasePriority : Normal

FileSize : 99 KB

FileVersion : 5.1.2600.0 (xpclient.010817-1148)

ProductVersion : 5.1.2600.0

CompanyName : Microsoft Corporation

FileDescription : Us

InternalName : services.exe

OriginalFilename : services.exe

ProductName : System operacyjny Microsoft

Created on : 2001-10-26 15:30:02

Last accessed : 2004-09-24 22:00:00

Last modified : 2001-10-26 15:30:02

#:4 [lsass.exe]

FilePath : C:\WINDOWS\system32\

ThreadCreationTime : 2004-09-25 08:05:46

BasePriority : Normal

FileSize : 11 KB

FileVersion : 5.1.2600.1106 (xpsp1.020828-1920)

ProductVersion : 5.1.2600.1106

CompanyName : Microsoft Corporation

FileDescription : LSA Shell (Export Version)

InternalName : lsass.exe

OriginalFilename : lsass.exe

ProductName : Microsoft

Created on : 2001-10-26 15:29:56

Last accessed : 2004-09-24 22:00:00

Last modified : 2002-09-20 16:05:32

#:5 [svchost.exe]

FilePath : C:\WINDOWS\system32\

ThreadCreationTime : 2004-09-25 08:05:46

BasePriority : Normal

FileSize : 12 KB

FileVersion : 5.1.2600.0 (xpclient.010817-1148)

ProductVersion : 5.1.2600.0

CompanyName : Microsoft Corporation

FileDescription : Generic Host Process for Win32 Services

InternalName : svchost.exe

OriginalFilename : svchost.exe

ProductName : Microsoft

Created on : 2001-10-26 15:30:02

Last accessed : 2004-09-24 22:00:00

Last modified : 2001-10-26 15:30:02

#:6 [svchost.exe]

FilePath : C:\WINDOWS\System32\

ThreadCreationTime : 2004-09-25 08:05:46

BasePriority : Normal

FileSize : 12 KB

FileVersion : 5.1.2600.0 (xpclient.010817-1148)

ProductVersion : 5.1.2600.0

CompanyName : Microsoft Corporation

FileDescription : Generic Host Process for Win32 Services

InternalName : svchost.exe

OriginalFilename : svchost.exe

ProductName : Microsoft

Created on : 2001-10-26 15:30:02

Last accessed : 2004-09-24 22:00:00

Last modified : 2001-10-26 15:30:02

#:7 [userinit.exe]

FilePath : C:\WINDOWS\system32\

ThreadCreationTime : 2004-09-25 08:05:47

BasePriority : Normal

FileSize : 22 KB

FileVersion : 5.1.2600.1106 (xpsp1.020828-1920)

ProductVersion : 5.1.2600.1106

CompanyName : Microsoft Corporation

FileDescription : Aplikacja Userinit Logon

InternalName : userinit

OriginalFilename : USERINIT.EXE

ProductName : System operacyjny Microsoft

Created on : 2001-10-26 15:30:04

Last accessed : 2004-09-24 22:00:00

Last modified : 2002-09-20 16:05:48

#:8 [explorer.exe]

FilePath : C:\WINDOWS\

ThreadCreationTime : 2004-09-25 08:05:47

BasePriority : Normal

FileSize : 982 KB

FileVersion : 6.00.2800.1106 (xpsp1.020828-1920)

ProductVersion : 6.00.2800.1106

CompanyName : Microsoft Corporation

FileDescription : Eksplorator Windows

InternalName : explorer

OriginalFilename : EXPLORER.EXE

ProductName : System operacyjny Microsoft

Created on : 2003-12-30 14:17:43

Last accessed : 2004-09-24 22:00:00

Last modified : 2002-09-20 16:05:24

#:9 [spoolsv.exe]

FilePath : C:\WINDOWS\system32\

ThreadCreationTime : 2004-09-25 08:05:47

BasePriority : Normal

FileSize : 50 KB

FileVersion : 5.1.2600.0 (XPClient.010817-1148)

ProductVersion : 5.1.2600.0

CompanyName : Microsoft Corporation

FileDescription : Spooler SubSystem App

InternalName : spoolsv.exe

OriginalFilename : spoolsv.exe

ProductName : Microsoft

Created on : 2001-10-26 15:30:02

Last accessed : 2004-09-24 22:00:00

Last modified : 2001-10-26 15:30:02

#:10 [ccevtmgr.exe]

FilePath : C:\Program Files\Common Files\Symantec Shared\

ThreadCreationTime : 2004-09-25 08:05:48

BasePriority : Normal

FileSize : 313 KB

FileVersion : 1.03.4

ProductVersion : 1.03.4

Copyright : Copyright © 2000-2002 Symantec Corporation. All rights reserved.

CompanyName : Symantec Corporation

FileDescription : Event Manager Service

InternalName : ccEvtMgr

OriginalFilename : ccEvtMgr.exe

ProductName : Event Manager

Created on : 2002-12-10 17:23:48

Last accessed : 2004-09-24 22:00:00

Last modified : 2002-12-10 17:23:48

#:11 [navapsvc.exe]

FilePath : C:\Program Files\Norton AntiVirus\

ThreadCreationTime : 2004-09-25 08:05:48

BasePriority : Normal

FileSize : 113 KB

FileVersion : 9.05.1015

ProductVersion : 9.05.1015

Copyright : Copyright © 2000-2002 Symantec Corporation. All rights reserved.

CompanyName : Symantec Corporation

FileDescription : Norton AntiVirus Auto-Protect Service

InternalName : NAVAPSVC

OriginalFilename : NAVAPSVC.EXE

ProductName : Norton AntiVirus

Created on : 2002-12-10 17:23:24

Last accessed : 2004-09-24 22:00:00

Last modified : 2002-12-10 17:23:24

#:12 [nvsvc32.exe]

FilePath : C:\WINDOWS\System32\

ThreadCreationTime : 2004-09-25 08:05:48

BasePriority : Normal

FileSize : 108 KB

FileVersion : 6.14.10.5672

ProductVersion : 6.14.10.5672

Copyright : © NVIDIA Corporation. All rights reserved.

CompanyName : NVIDIA Corporation

FileDescription : NVIDIA Driver Helper Service, Version 56.72

InternalName : NVSVC

OriginalFilename : nvsvc32.exe

ProductName : NVIDIA Driver Helper Service, Version 56.72

Created on : 2004-03-24 08:04:00

Last accessed : 2004-09-24 22:00:00

Last modified : 2004-03-24 08:04:00

#:13 [mixer.exe]

FilePath : C:\WINDOWS\

ThreadCreationTime : 2004-09-25 08:05:48

BasePriority : Normal

FileSize : 1420 KB

FileVersion : 1.48b

ProductVersion : 1.48b

Copyright : Copyright © 1997-2002

CompanyName : C-Media Electronic Inc. (http://www.cmedia.com.tw)

FileDescription : Mixer

InternalName : Mixer

OriginalFilename : Mixer.EXE

ProductName : Mixer

Created on : 2003-01-10 14:45:58

Last accessed : 2004-09-24 22:00:00

Last modified : 2002-03-04 02:02:50

#:14 [tbpanel.exe]

FilePath : C:\WINDOWS\

ThreadCreationTime : 2004-09-25 08:05:48

BasePriority : Normal

FileSize : 1928 KB

FileVersion : 3.00

ProductVersion : 3.00

Copyright : Copyright © 2002

CompanyName : Gainward Co.

FileDescription : EXPERTool : Display Control Panel

InternalName : TBPanel

OriginalFilename : TBPanel

ProductName : EXPERTool : Display Control Panel

Created on : 2003-12-30 13:52:25

Last accessed : 2004-09-24 22:00:00

Last modified : 2002-07-22 09:28:04

#:15 [amoumain.exe]

FilePath : C:\PROGRA~1\A4Tech\Mouse\

ThreadCreationTime : 2004-09-25 08:05:48

BasePriority : Normal

FileSize : 144 KB

FileVersion : 7.42.0.0

ProductVersion : 7.42.0.0

Copyright : Copyright

CompanyName : A4Tech Co.,Ltd.

FileDescription : Amoumain

InternalName : Amoumain

OriginalFilename : Amoumain.exe

ProductName : A4Tech iWheelWorks Mouse Driver

Created on : 2003-08-09 08:41:41

Last accessed : 2004-09-24 22:00:00

Last modified : 2003-07-17 22:53:16

#:16 [ccapp.exe]

FilePath : C:\Program Files\Common Files\Symantec Shared\

ThreadCreationTime : 2004-09-25 08:05:48

BasePriority : Normal

FileSize : 53 KB

FileVersion : 1.08.01

ProductVersion : 1.08.01

Copyright : Copyright © 2000-2002 Symantec Corporation. All rights reserved.

CompanyName : Symantec Corporation

FileDescription : Common Client CC App

InternalName : ccApp

OriginalFilename : ccApp.exe

ProductName : Common Client

Created on : 2004-06-14 20:18:37

Last accessed : 2004-09-24 22:00:00

Last modified : 2003-09-23 08:56:36

#:17 [msnappau.exe]

FilePath : C:\Program Files\MSN Apps\Updater\01.02.3000.1001\en-us\

ThreadCreationTime : 2004-09-25 08:05:48

BasePriority : Normal

FileSize : 84 KB

FileVersion : 01.02.3000.1001

ProductVersion : 01.02.3000.1001

Copyright : Copyright

CompanyName : Microsoft Corporation

FileDescription : MSN Updater

InternalName : msnappau.exe

OriginalFilename : msnappau.exe

ProductName : MSN Updater

Created on : 2004-09-09 06:40:32

Last accessed : 2004-09-24 22:00:00

Last modified : 2004-08-13 15:41:26

#:18 [pdvdserv.exe]

FilePath : C:\Program Files\CyberLink\PowerDVD\

ThreadCreationTime : 2004-09-25 08:05:48

BasePriority : Normal

FileSize : 32 KB

FileVersion : 5.00.0000

ProductVersion : 5.00.0000

Copyright : Copyright © CyberLink Corp. 1997-2002

CompanyName : Cyberlink Corp.

FileDescription : PowerDVD RC Service

InternalName : PowerDVD RC Service

OriginalFilename : PDVDSERV.EXE

ProductName : PowerDVD

Created on : 2004-09-11 13:51:22

Last accessed : 2004-09-24 22:00:00

Last modified : 2003-10-31 17:42:40

#:19 [msmsgsvc.exe]

FilePath : C:\WINDOWS\System\

ThreadCreationTime : 2004-09-25 08:05:49

BasePriority : Normal

FileSize : 28 KB

Created on : 2004-09-24 20:48:55

Last accessed : 2004-09-24 22:00:00

Last modified : 2004-09-24 20:48:54

#:20 [raconfig.exe]

FilePath : C:\WINDOWS\system32\

ThreadCreationTime : 2004-09-25 08:05:49

BasePriority : Normal

FileSize : 372 KB

FileVersion : 1, 2, 0, 0

ProductVersion : 1, 2, 0, 0

Copyright : © Copyright 2002, Ralink Technology, Inc. All rights reserved.

CompanyName : Ralink Technology, Corp.

FileDescription : RaConfig Utility

InternalName : RaConfig

OriginalFilename : RaConfig.exe

ProductName : Ralink RaConfig

Created on : 2004-06-08 16:36:23

Last accessed : 2004-09-24 22:00:00

Last modified : 2003-09-25 12:11:44

#:21 [getright.exe]

FilePath : C:\Program Files\GetRight\

ThreadCreationTime : 2004-09-25 08:05:49

BasePriority : Normal

FileSize : 2072 KB

FileVersion : 5.1

ProductVersion : 5.1

Copyright : Copyright

CompanyName : Headlight Software, Inc.

FileDescription : GetRight

InternalName : GETRIGHT

OriginalFilename : GETRIGHT.EXE

ProductName : GetRight

Created on : 2004-06-15 13:58:48

Last accessed : 2004-09-24 22:00:00

Last modified : 2004-03-24 10:34:56

#:22 [getright.exe]

FilePath : C:\Program Files\GetRight\

ThreadCreationTime : 2004-09-25 08:05:50

BasePriority : Normal

FileSize : 2072 KB

FileVersion : 5.1

ProductVersion : 5.1

Copyright : Copyright

CompanyName : Headlight Software, Inc.

FileDescription : GetRight

InternalName : GETRIGHT

OriginalFilename : GETRIGHT.EXE

ProductName : GetRight

Created on : 2004-06-15 13:58:48

Last accessed : 2004-09-24 22:00:00

Last modified : 2004-03-24 10:34:56

#:23 [msmsgs.exe]

FilePath : C:\Program Files\Messenger\

ThreadCreationTime : 2004-09-25 08:05:51

BasePriority : Normal

FileSize : 1456 KB

FileVersion : 4.7.2009

ProductVersion : Version 4.7

Copyright : Copyright © Microsoft Corporation 1997-2003

CompanyName : Microsoft Corporation

FileDescription : Messenger

InternalName : msmsgs

OriginalFilename : msmsgs.exe

ProductName : Messenger

Created on : 2003-04-14 17:30:14

Last accessed : 2004-09-24 22:00:00

Last modified : 2003-04-14 17:30:14

#:24 [ad-aware.exe]

FilePath : C:\PROGRA~1\LAVASOFT\AD-AWA~1\

ThreadCreationTime : 2004-09-25 08:06:17

BasePriority : Normal

FileSize : 668 KB

FileVersion : 6.0.1.181

ProductVersion : 6.0.0.0

Copyright : Copyright

CompanyName : Lavasoft Sweden

FileDescription : Ad-aware 6 core application

InternalName : Ad-aware.exe

OriginalFilename : Ad-aware.exe

ProductName : Lavasoft Ad-aware Plus

Created on : 2004-07-25 09:14:01

Last accessed : 2004-09-24 22:00:00

Last modified : 2003-07-12 19:00:20

Memory scan result :

ŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻ

New objects : 0

Objects found so far: 0

Started registry scan

ŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻ

CoolWebSearch Object recognized!

Type : RegKey

Data :

Rootkey : HKEY_CLASSES_ROOT

Object : analyzeie.dompeek

CoolWebSearch Object recognized!

Type : RegKey

Data :

Rootkey : HKEY_CLASSES_ROOT

Object : analyzeie.dompeek.1

CoolWebSearch Object recognized!

Type : RegKey

Data :

Rootkey : HKEY_CLASSES_ROOT

Object : CLSID{834261e1-dd97-4177-853b-c907e5d5bd6e}

CoolWebSearch Object recognized!

Type : RegKey

Data :

Rootkey : HKEY_LOCAL_MACHINE

Object : SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects{834261e1-dd97-4177-853b-c907e5d5bd6e}

CoolWebSearch Object recognized!

Type : RegKey

Data :

Rootkey : HKEY_CLASSES_ROOT

Object : TYPELIB{bd0022a3-a43f-4f44-b64f-53ea7575f097}

Windows Object recognized!

Type : RegData

Data :

Rootkey : HKEY_LOCAL_MACHINE

Object : Software\Microsoft\Windows\CurrentVersion\URL\DefaultPrefix

Value :

Data :

Windows Object recognized!

Type : RegData

Data :

Rootkey : HKEY_LOCAL_MACHINE

Object : Software\Microsoft\Windows\CurrentVersion\URL\Prefixes

Value : www

Data :

Registry scan result :

ŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻ

New objects : 7

Objects found so far: 7

Started deep registry scan

ŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻ

Possible browser hijack attempt : Software\Microsoft\Internet Explorer\MainSearch Page%65%2d%66%69%6e%64%65%72%2e%63%63

Possible Browser Hijack attempt Object recognized!

Type : RegData

Data : “http://%68%6F%6D%65%70%61%67%65%2E%63%6F%6D%00@%77%77%77%2E%65%2D%66%69%6E%64%65%72%2E%63%63/%73%65%61%72%63%68/

Rootkey : HKEY_CURRENT_USER

Object : Software\Microsoft\Internet Explorer\Main

Value : Search Page

Data : “http://%68%6F%6D%65%70%61%67%65%2E%63%6F%6D%00@%77%77%77%2E%65%2D%66%69%6E%64%65%72%2E%63%63/%73%65%61%72%63%68/

Possible browser hijack attempt : Software\Microsoft\Internet Explorer\MainStart Page%65%2d%66%69%6e%64%65%72%2e%63%63

Possible Browser Hijack attempt Object recognized!

Type : RegData

Data : “http://%68%6F%6D%65%70%61%67%65%2E%63%6F%6D%00@%77%77%77%2E%65%2D%66%69%6E%64%65%72%2E%63%63/%68%70/

Rootkey : HKEY_CURRENT_USER

Object : Software\Microsoft\Internet Explorer\Main

Value : Start Page

Data : “http://%68%6F%6D%65%70%61%67%65%2E%63%6F%6D%00@%77%77%77%2E%65%2D%66%69%6E%64%65%72%2E%63%63/%68%70/

Possible browser hijack attempt : Software\Microsoft\Internet Explorer\MainSearch Bar%65%2d%66%69%6e%64%65%72%2e%63%63

Possible Browser Hijack attempt Object recognized!

Type : RegData

Data : “http://%68%6F%6D%65%70%61%67%65%2E%63%6F%6D%00@%77%77%77%2E%65%2D%66%69%6E%64%65%72%2E%63%63/%73%65%61%72%63%68/

Rootkey : HKEY_CURRENT_USER

Object : Software\Microsoft\Internet Explorer\Main

Value : Search Bar

Data : “http://%68%6F%6D%65%70%61%67%65%2E%63%6F%6D%00@%77%77%77%2E%65%2D%66%69%6E%64%65%72%2E%63%63/%73%65%61%72%63%68/

Possible browser hijack attempt : Software\Microsoft\Internet Explorer\MainDefault_Search_URL%65%2d%66%69%6e%64%65%72%2e%63%63

Possible Browser Hijack attempt Object recognized!

Type : RegData

Data : “http://%68%6F%6D%65%70%61%67%65%2E%63%6F%6D%00@%77%77%77%2E%65%2D%66%69%6E%64%65%72%2E%63%63/%73%65%61%72%63%68/

Rootkey : HKEY_CURRENT_USER

Object : Software\Microsoft\Internet Explorer\Main

Value : Default_Search_URL

Data : “http://%68%6F%6D%65%70%61%67%65%2E%63%6F%6D%00@%77%77%77%2E%65%2D%66%69%6E%64%65%72%2E%63%63/%73%65%61%72%63%68/

Possible browser hijack attempt : Software\Microsoft\Internet Explorer\SearchSearchAssistant%65%2d%66%69%6e%64%65%72%2e%63%63

Possible Browser Hijack attempt Object recognized!

Type : RegData

Data : “http://%68%6F%6D%65%70%61%67%65%2E%63%6F%6D%00@%77%77%77%2E%65%2D%66%69%6E%64%65%72%2E%63%63/%73%65%61%72%63%68/

Rootkey : HKEY_CURRENT_USER

Object : Software\Microsoft\Internet Explorer\Search

Value : SearchAssistant

Data : “http://%68%6F%6D%65%70%61%67%65%2E%63%6F%6D%00@%77%77%77%2E%65%2D%66%69%6E%64%65%72%2E%63%63/%73%65%61%72%63%68/

Possible browser hijack attempt : Software\Microsoft\Internet Explorer\SearchCustomizeSearch%65%2d%66%69%6e%64%65%72%2e%63%63

Possible Browser Hijack attempt Object recognized!

Type : RegData

Data : “http://%68%6F%6D%65%70%61%67%65%2E%63%6F%6D%00@%77%77%77%2E%65%2D%66%69%6E%64%65%72%2E%63%63/%73%65%61%72%63%68/

Rootkey : HKEY_CURRENT_USER

Object : Software\Microsoft\Internet Explorer\Search

Value : CustomizeSearch

Data : “http://%68%6F%6D%65%70%61%67%65%2E%63%6F%6D%00@%77%77%77%2E%65%2D%66%69%6E%64%65%72%2E%63%63/%73%65%61%72%63%68/

Possible browser hijack attempt : Software\Microsoft\Internet Explorer\Search%65%2d%66%69%6e%64%65%72%2e%63%63

Possible Browser Hijack attempt Object recognized!

Type : RegData

Data : “http://%68%6F%6D%65%70%61%67%65%2E%63%6F%6D%00@%77%77%77%2E%65%2D%66%69%6E%64%65%72%2E%63%63/%73%65%61%72%63%68/

Rootkey : HKEY_CURRENT_USER

Object : Software\Microsoft\Internet Explorer\Search

Value :

Data : “http://%68%6F%6D%65%70%61%67%65%2E%63%6F%6D%00@%77%77%77%2E%65%2D%66%69%6E%64%65%72%2E%63%63/%73%65%61%72%63%68/

Possible browser hijack attempt : Software\Microsoft\Internet Explorer\SearchURL%65%2d%66%69%6e%64%65%72%2e%63%63

Possible Browser Hijack attempt Object recognized!

Type : RegData

Data : “http://%68%6F%6D%65%70%61%67%65%2E%63%6F%6D%00@%77%77%77%2E%65%2D%66%69%6E%64%65%72%2E%63%63/%73%65%61%72%63%68/

Rootkey : HKEY_CURRENT_USER

Object : Software\Microsoft\Internet Explorer\SearchURL

Value :

Data : “http://%68%6F%6D%65%70%61%67%65%2E%63%6F%6D%00@%77%77%77%2E%65%2D%66%69%6E%64%65%72%2E%63%63/%73%65%61%72%63%68/

Possible browser hijack attempt : Software\Microsoft\Internet Explorer\MainSearch Page%65%2d%66%69%6e%64%65%72%2e%63%63

Possible Browser Hijack attempt Object recognized!

Type : RegData

Data : “http://%68%6F%6D%65%70%61%67%65%2E%63%6F%6D%00@%77%77%77%2E%65%2D%66%69%6E%64%65%72%2E%63%63/%73%65%61%72%63%68/

Rootkey : HKEY_LOCAL_MACHINE

Object : Software\Microsoft\Internet Explorer\Main

Value : Search Page

Data : “http://%68%6F%6D%65%70%61%67%65%2E%63%6F%6D%00@%77%77%77%2E%65%2D%66%69%6E%64%65%72%2E%63%63/%73%65%61%72%63%68/

Possible browser hijack attempt : Software\Microsoft\Internet Explorer\MainStart Page%65%2d%66%69%6e%64%65%72%2e%63%63

Possible Browser Hijack attempt Object recognized!

Type : RegData

Data : “http://%68%6F%6D%65%70%61%67%65%2E%63%6F%6D%00@%77%77%77%2E%65%2D%66%69%6E%64%65%72%2E%63%63/%68%70/

Rootkey : HKEY_LOCAL_MACHINE

Object : Software\Microsoft\Internet Explorer\Main

Value : Start Page

Data : “http://%68%6F%6D%65%70%61%67%65%2E%63%6F%6D%00@%77%77%77%2E%65%2D%66%69%6E%64%65%72%2E%63%63/%68%70/

Possible browser hijack attempt : Software\Microsoft\Internet Explorer\MainSearch Bar%65%2d%66%69%6e%64%65%72%2e%63%63

Possible Browser Hijack attempt Object recognized!

Type : RegData

Data : “http://%68%6F%6D%65%70%61%67%65%2E%63%6F%6D%00@%77%77%77%2E%65%2D%66%69%6E%64%65%72%2E%63%63/%73%65%61%72%63%68/

Rootkey : HKEY_LOCAL_MACHINE

Object : Software\Microsoft\Internet Explorer\Main

Value : Search Bar

Data : “http://%68%6F%6D%65%70%61%67%65%2E%63%6F%6D%00@%77%77%77%2E%65%2D%66%69%6E%64%65%72%2E%63%63/%73%65%61%72%63%68/

Possible browser hijack attempt : Software\Microsoft\Internet Explorer\MainDefault_Search_URL%65%2d%66%69%6e%64%65%72%2e%63%63

Possible Browser Hijack attempt Object recognized!

Type : RegData

Data : “http://%68%6F%6D%65%70%61%67%65%2E%63%6F%6D%00@%77%77%77%2E%65%2D%66%69%6E%64%65%72%2E%63%63/%73%65%61%72%63%68/

Rootkey : HKEY_LOCAL_MACHINE

Object : Software\Microsoft\Internet Explorer\Main

Value : Default_Search_URL

Data : “http://%68%6F%6D%65%70%61%67%65%2E%63%6F%6D%00@%77%77%77%2E%65%2D%66%69%6E%64%65%72%2E%63%63/%73%65%61%72%63%68/

Possible browser hijack attempt : Software\Microsoft\Internet Explorer\SearchSearchAssistant%65%2d%66%69%6e%64%65%72%2e%63%63

Possible Browser Hijack attempt Object recognized!

Type : RegData

Data : “http://%68%6F%6D%65%70%61%67%65%2E%63%6F%6D%00@%77%77%77%2E%65%2D%66%69%6E%64%65%72%2E%63%63/%73%65%61%72%63%68/

Rootkey : HKEY_LOCAL_MACHINE

Object : Software\Microsoft\Internet Explorer\Search

Value : SearchAssistant

Data : “http://%68%6F%6D%65%70%61%67%65%2E%63%6F%6D%00@%77%77%77%2E%65%2D%66%69%6E%64%65%72%2E%63%63/%73%65%61%72%63%68/

Possible browser hijack attempt : Software\Microsoft\Internet Explorer\SearchCustomizeSearch%65%2d%66%69%6e%64%65%72%2e%63%63

Possible Browser Hijack attempt Object recognized!

Type : RegData

Data : “http://%68%6F%6D%65%70%61%67%65%2E%63%6F%6D%00@%77%77%77%2E%65%2D%66%69%6E%64%65%72%2E%63%63/%73%65%61%72%63%68/

Rootkey : HKEY_LOCAL_MACHINE

Object : Software\Microsoft\Internet Explorer\Search

Value : CustomizeSearch

Data : “http://%68%6F%6D%65%70%61%67%65%2E%63%6F%6D%00@%77%77%77%2E%65%2D%66%69%6E%64%65%72%2E%63%63/%73%65%61%72%63%68/

Possible browser hijack attempt : Software\Microsoft\Internet Explorer\Search%65%2d%66%69%6e%64%65%72%2e%63%63

Possible Browser Hijack attempt Object recognized!

Type : RegData

Data : “http://%68%6F%6D%65%70%61%67%65%2E%63%6F%6D%00@%77%77%77%2E%65%2D%66%69%6E%64%65%72%2E%63%63/%73%65%61%72%63%68/

Rootkey : HKEY_LOCAL_MACHINE

Object : Software\Microsoft\Internet Explorer\Search

Value :

Data : “http://%68%6F%6D%65%70%61%67%65%2E%63%6F%6D%00@%77%77%77%2E%65%2D%66%69%6E%64%65%72%2E%63%63/%73%65%61%72%63%68/

Possible browser hijack attempt : Software\Microsoft\Internet Explorer\SearchURL%65%2d%66%69%6e%64%65%72%2e%63%63

Possible Browser Hijack attempt Object recognized!

Type : RegData

Data : “http://%68%6F%6D%65%70%61%67%65%2E%63%6F%6D%00@%77%77%77%2E%65%2D%66%69%6E%64%65%72%2E%63%63/%73%65%61%72%63%68/

Rootkey : HKEY_LOCAL_MACHINE

Object : Software\Microsoft\Internet Explorer\SearchURL

Value :

Data : “http://%68%6F%6D%65%70%61%67%65%2E%63%6F%6D%00@%77%77%77%2E%65%2D%66%69%6E%64%65%72%2E%63%63/%73%65%61%72%63%68/

Deep registry scan result :

ŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻ

New objects : 16

Objects found so far: 23

ŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻ

ŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻ

Deep scanning and examining files (C:)

ŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻ

Scanning Hosts file(C:\WINDOWS\System32\drivers\etc\hosts)

ŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻ

Hosts file scan result:

ŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻ

1 entries scanned.

New objects :0

Objects found so far: 23

Performing conditional scans…

ŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻ

CoolWebSearch Object recognized!

Type : RegKey

Data :

Rootkey : HKEY_CLASSES_ROOT

Object : Interface{B1E68D42-02C4-465B-8368-5ED9B732E22D}

CoolWebSearch Object recognized!

Type : File

Data : hosts

Object : c:\windows\

Created on : 2004-09-25 08:06:13

Last accessed : 2004-09-24 22:00:00

Last modified : 2004-09-25 08:06:30

Conditional scan result:

ŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻ

New objects : 2

Objects found so far: 25

10:08:11 Scan complete

Summary of this scan

ŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻ

Total scanning time :00:01:50:859

Objects scanned :45709

Objects identified :25

Objects ignored :0

New objects :25

fiesta to jest oryginalny log z Ad-Aware !!

Evil wklej lepiej loga z Hijack’a :slight_smile:

ok wpis skasowany :slight_smile: :slight_smile: :slight_smile:

Pomyłka z logiem z Hijackthis :oops: :oops: :oops:

Najlepeij gdyby autor wziął go w formar [code]

  • tylko bez spacji :smiley:

Evil -> kasujesz WSZYSTKO co znajdzie ad aware po prpostu kilkając dalej ( lub next) po zakończeniu skanowania i zaznaczeniu wszystkich znalezionych pozycji