Pozostałości po dialerze Connessione Predefinita

Witam! Proszę o sprawdzenie loga,ponieważ miałem dialera o nazwie Connessione Predefinita i podejrzewam że jeszcze gdzieś jest gdyż została mi “ikonka połączenia” jak otworzę “Mój komputer” pod partycjami dysków,czy spotkał się ktoś z czymś takim.Proszę o pomoc i mam nadzieję,że obejdzie się bez formatowania kompa.W załączeniu podaję loga:

Logfile of Trend Micro HijackThis v2.0.2

Scan saved at 20:50:29, on 2007-10-30

Platform: Windows XP Dodatek SP2 (WinNT 5.01.2600)

MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)

Boot mode: Normal

Running processes:

C:\WINDOWS\System32\smss.exe

C:\WINDOWS\system32\csrss.exe

C:\WINDOWS\system32\winlogon.exe

C:\WINDOWS\system32\services.exe

C:\WINDOWS\system32\lsass.exe

C:\WINDOWS\System32\Ati2evxx.exe

C:\WINDOWS\system32\svchost.exe

C:\WINDOWS\system32\svchost.exe

C:\WINDOWS\System32\svchost.exe

C:\WINDOWS\System32\svchost.exe

C:\WINDOWS\System32\svchost.exe

C:\WINDOWS\system32\Ati2evxx.exe

C:\WINDOWS\Explorer.EXE

D:\Program Files\Alwil Software\Avast4\aswUpdSv.exe

D:\Program Files\Alwil Software\Avast4\ashServ.exe

C:\WINDOWS\system32\spoolsv.exe

C:\PROGRA~1\Symantec\NORTON~1\GHOSTS~2.EXE

C:\WINDOWS\system32\sstray.exe

C:\Program Files\ABIT\ABIT uGuru\uGuru.exe

C:\Program Files\ATI Technologies\ATI Control

Panel\atiptaxx.exe

D:\PROGRA~1\ALWILS~1\Avast4\ashDisp.exe

C:\Program Files\Symantec\Norton Ghost

2003\GhostStartTrayApp.exe

D:\Program Files\Spyware Doctor\svcntaux.exe

D:\Program Files\Spyware Doctor\SDTrayApp.exe

C:\WINDOWS\NCLAUNCH.EXe

D:\Program Files\Spyware Doctor\swdsvc.exe

C:\WINDOWS\System32\svchost.exe

C:\WINDOWS\system32\wscntfy.exe

D:\Program Files\Alwil Software\Avast4\ashMaiSv.exe

D:\Program Files\Alwil Software\Avast4\ashWebSv.exe

C:\WINDOWS\System32\alg.exe

C:\Program Files\Internet Explorer\iexplore.exe

D:\Program Files\Trend Micro\HijackThis\HijackThis.exe

C:\WINDOWS\System32\wbem\wmiprvse.exe

R0 - HKCU\Software\Microsoft\Internet

Explorer\Main,Start Page = http://www.interia.pl/

R1 -

HKCU\Software\Microsoft\Windows\CurrentVersion\Interne

t Settings,ProxyOverride = localhost

R0 - HKCU\Software\Microsoft\Internet

Explorer\Toolbar,LinksFolderName = Łącza

R3 - URLSearchHook: Yahoo! Toolbar -

{EF99BD32-C1FB-11D2-892F-0090271D4F88} - (no file)

O4 - HKLM…\Run: [nForce Tray Options] sstray.exe /r

O4 - HKLM…\Run: [ABIT uGuru] C:\Program

Files\ABIT\ABIT uGuru\uGuru.exe

O4 - HKLM…\Run: [ATIPTA] C:\Program Files\ATI

Technologies\ATI Control Panel\atiptaxx.exe

O4 - HKLM…\Run: [avast!]

D:\PROGRA~1\ALWILS~1\Avast4\ashDisp.exe

O4 - HKLM…\Run: [sunJavaRuntimeEnvironment]

C:\WINDOWS\java.exe

O4 - HKLM…\Run: [GhostStartTrayApp] C:\Program

Files\Symantec\Norton Ghost 2003\GhostStartTrayApp.exe

O4 - HKLM…\Run: [sDTray] "D:\Program Files\Spyware

Doctor\SDTrayApp.exe"

O4 - HKLM…\Run: [NeroFilterCheck]

C:\WINDOWS\system32\NeroCheck.exe

O4 - HKLM…\Run: [WinampAgent] D:\Program

Files\Winamp\wianmpa.exe

O4 - HKCU…\Run: [NCLaunch] C:\WINDOWS\NCLAUNCH.EXe

O4 - HKCU…\Run: [Active@ Eraser] C:\Documents and

Settings\Artur\Pulpit\EraserD.exe

O4 - HKUS\S-1-5-19…\Run: [CTFMON.EXE]

C:\WINDOWS\System32\CTFMON.EXE (User ‘USŁUGA LOKALNA’)

O4 - HKUS\S-1-5-20…\Run: [CTFMON.EXE]

C:\WINDOWS\System32\CTFMON.EXE (User 'USŁUGA

SIECIOWA’)

O4 - HKUS\S-1-5-18…\Run: [CTFMON.EXE]

C:\WINDOWS\System32\CTFMON.EXE (User ‘SYSTEM’)

O4 - HKUS.DEFAULT…\Run: [CTFMON.EXE]

C:\WINDOWS\System32\CTFMON.EXE (User ‘Default user’)

O9 - Extra button: Messenger -

{FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program

Files\Messenger\msmsgs.exe

O9 - Extra ‘Tools’ menuitem: Windows Messenger -

{FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program

Files\Messenger\msmsgs.exe

O16 - DPF: {68282C51-9459-467B-95BF-3C0E89627E55}

(MksSkanerOnline Class) -

http://www.mks.com.pl/skaner/SkanerOnline.cab

O16 - DPF: {9A9307A0-7DA4-4DAF-B042-5009F29E09E1}

(ActiveScan Installer Class) -

http://acs.pandasoftware.com/activescan/as5free/asinst

.cab

O17 -

HKLM\System\CCS\Services\Tcpip…{C19C5DAA-6E89-40D7-

B11A-C8E0ACAE42DA}: NameServer =

217.30.129.139,217.30.137.200

O23 - Service: avast! iAVS4 Control Service (aswUpdSv)

  • ALWIL Software - D:\Program Files\Alwil

Software\Avast4\aswUpdSv.exe

O23 - Service: Ati HotKey Poller - Unknown owner -

C:\WINDOWS\System32\Ati2evxx.exe

O23 - Service: ATI Smart - Unknown owner -

C:\WINDOWS\system32\ati2sgag.exe

O23 - Service: avast! Antivirus - ALWIL Software -

D:\Program Files\Alwil Software\Avast4\ashServ.exe

O23 - Service: avast! Mail Scanner - ALWIL Software -

D:\Program Files\Alwil Software\Avast4\ashMaiSv.exe

O23 - Service: avast! Web Scanner - ALWIL Software -

D:\Program Files\Alwil Software\Avast4\ashWebSv.exe

O23 - Service: GhostStartService - Symantec

Corporation -

C:\PROGRA~1\Symantec\NORTON~1\GHOSTS~2.EXE

O23 - Service: PC Tools Auxiliary Service

(sdAuxService) - PC Tools - D:\Program Files\Spyware

Doctor\svcntaux.exe

O23 - Service: PC Tools Security Service

(sdCoreService) - PC Tools - D:\Program Files\Spyware

Doctor\swdsvc.exe

End of file - 4731 bytes

Dołanczam log z Combo fix:

ComboFix 07-10-29.1** - Artur 2007-10-30 22:58:49.1 - NTFSx86

Microsoft Windows XP Professional 5.1.2600.2.1250.1.1045.18.73 [GMT 1:00]

Running from: C:\Documents and Settings\Artur\Pulpit\ComboFix.exe

* Created a new restore point

.

((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))

.

C:\WINDOWS\system32_000000_.tmp.dll

.

((((((((((((((((((((((((( Files Created from 2007-09-28 to 2007-10-30 )))))))))))))))))))))))))))))))

.

2007-10-30 22:57 51,200 --a------ C:\WINDOWS\NirCmd.exe

2007-10-29 00:54

2007-10-28 07:51

2007-10-28 07:47 3,596,288 --a------ C:\WINDOWS\system32\qt-dx331.dll

2007-10-28 07:47 1,559,040 --a------ C:\WINDOWS\system32\xvidcore.dll

2007-10-28 07:47 739,840 --a------ C:\WINDOWS\system32\divx.dll

2007-10-28 07:47 282,624 --a------ C:\WINDOWS\system32\xvidvfw.dll

2007-10-28 07:47 217,088 --a------ C:\WINDOWS\system32\yv12vfw.dll

2007-10-28 07:47 164,352 --a------ C:\WINDOWS\system32\unrar.dll

2007-10-28 07:47 81,920 --a------ C:\WINDOWS\system32\dpl100.dll

2007-10-28 07:47 7,680 --a------ C:\WINDOWS\system32\ff_vfw.dll

2007-10-24 21:45 155,648 --a------ C:\WINDOWS\system32\NeroCheck.exe

2007-10-24 21:45 106,496 --a------ C:\WINDOWS\system32\TwnLib20.dll

2007-10-11 17:43

2007-10-11 17:43 82,248 --a------ C:\WINDOWS\system32\drivers\iksyssec.sys

2007-10-11 17:43 57,672 --a------ C:\WINDOWS\system32\drivers\iksysflt.sys

2007-10-11 17:43 40,264 --a------ C:\WINDOWS\system32\drivers\ikfilesec.sys

2007-10-11 17:43 29,000 --a------ C:\WINDOWS\system32\drivers\kcom.sys

2007-10-11 17:42 626,688 --a------ C:\WINDOWS\system32\msvcr80.dll

2007-10-03 23:12

2007-10-03 18:54

2007-10-02 21:29

2007-10-02 20:58 355,486 --a------ C:\WINDOWS\system32\prfh0415.dat

2007-10-02 20:58 49,492 --a------ C:\WINDOWS\system32\prfc0415.dat

2007-09-26 21:06

2007-09-07 21:11

2007-09-07 20:52

.

(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))

.

2007-10-24 20:45 --------- d-----w C:\Program Files\Common Files\Ahead

2007-10-05 21:34 --------- d–h--w C:\Program Files\InstallShield Installation Information

2007-10-04 18:38 --------- d-----w C:\Program Files\SkanerOnline

2007-09-06 10:05 94,416 ----a-w C:\WINDOWS\system32\drivers\aswmon2.sys

2007-09-06 10:05 92,848 -c–a-w C:\WINDOWS\system32\drivers\aswmon.sys

2007-09-06 10:03 23,152 ----a-w C:\WINDOWS\system32\drivers\aswRdr.sys

2007-09-06 10:02 42,912 ----a-w C:\WINDOWS\system32\drivers\aswTdi.sys

2007-09-06 10:00 26,624 ----a-w C:\WINDOWS\system32\drivers\aavmker4.sys

2007-07-02 22:07 720,896 -c–a-w C:\WINDOWS\iun6002.exe

2004-10-18 20:47 87 ----a-w C:\Program Files\Sound ForgeSFLAUNCH.INI

.

((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))

.

.

*Note* empty entries & legit default entries are not shown

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]

“nForce Tray Options”=“sstray.exe” [2003-10-23 14:13 C:\WINDOWS\system32\sstray.exe]

“ABIT uGuru”=“C:\Program Files\ABIT\ABIT uGuru\uGuru.exe” [2003-09-22 20:34]

“ATIPTA”=“C:\Program Files\ATI Technologies\ATI Control Panel\atiptaxx.exe” [2004-05-15 20:10]

“avast!”=“D:\PROGRA~1\ALWILS~1\Avast4\ashDisp.exe” [2007-09-06 11:06]

“SunJavaRuntimeEnvironment”=“C:\WINDOWS\java.exe” []

“GhostStartTrayApp”=“C:\Program Files\Symantec\Norton Ghost 2003\GhostStartTrayApp.exe” [2002-08-14 14:21]

“SDTray”=“D:\Program Files\Spyware Doctor\SDTrayApp.exe” [2007-08-14 16:02]

“NeroFilterCheck”=“C:\WINDOWS\system32\NeroCheck.exe” [2001-07-09 10:50]

“WinampAgent”=“D:\Program Files\Winamp\wianmpa.exe” []

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]

“NCLaunch”=“C:\WINDOWS\NCLAUNCH.EXe” [2007-03-10 22:30]

“Active@ Eraser”=“C:\Documents and Settings\Artur\Pulpit\EraserD.exe” []

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\sdauxservice"

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\sdcoreservice"

R0 AC2003;AC2003;C:\WINDOWS\system32\drivers\AC2003.sys

R1 GhPciScan;GhostPciScanner;??\C:\Program Files\Symantec\Norton Ghost 2003\ghpciscan.sys

S3 usb2vcom;USB Data Cable;C:\WINDOWS\system32\DRIVERS\usb2vcom.sys

.

**************************************************************************

catchme 0.3.1239 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net

Rootkit scan 2007-10-30 23:02:43

Windows 5.1.2600 Dodatek Service Pack 2 NTFS

scanning hidden processes …

scanning hidden autostart entries …

scanning hidden files …

scan completed successfully

hidden files: 0

**************************************************************************

.

Completion time: 2007-10-30 23:05:18 - machine was rebooted

.

— E O F —

Proszę zastosować się do tego Tematu i zmienić

tytuł tematu na konkretny oraz uzupełnić tagi - inaczej KOSZ

Log jest czysty.

Możesz dać jeszcze log z ComboFix (na dole tej strony z linku) -

Log wklej na http://wklej.org/, a w poście daj tylko link.(czyli skopiuj adres z paska adresów).

Widzę, że sobie nie radzisz z obejmowaniem tekstu tagami.

Zrób tak:

Zaznacz cały log i kliknij przycisk “Quote” znajdujący się nad postem.

jessi

Pobierz program SDFix

Raport wygląda tak:

SDFix: Version 1.112

Run by Artur on 2007-10-31 at 00:21

Microsoft Windows XP [Wersja 5.1.2600]

Running From: C:\SDFix

Safe Mode:

Checking Services:

Restoring Windows Registry Values

Restoring Windows Default Hosts File

Rebooting…

Normal Mode:

Checking Files:

No Trojan Files Found

Removing Temp Files…

ADS Check:

C:\WINDOWS

No streams found.

C:\WINDOWS\system32

No streams found.

C:\WINDOWS\system32\svchost.exe

No streams found.

C:\WINDOWS\system32\ntoskrnl.exe

No streams found.

Final Check:

Remaining Services:


Authorized Application Key Export:

[HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\standardprofile\authorizedapplications\list]

[HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\domainprofile\authorizedapplications\list]

Remaining Files:


Files with Hidden Attributes:

Wed 13 Oct 2004 1,694,208 …SH. — “C:\Program Files\Messenger\msmsgs.exe”

Sat 23 Sep 2006 4,348 …SH. — “C:\Documents and Settings\All Users\DRM\DRMv1.bak”

Finished!

SDFix także niczego nie wykrył. :slight_smile:

jessi