Dodaj do ulubionych

CD-Rom a wirusy....

10.11.04, 09:22
Otoz nagle przestla mi dzialac cd rom (kod 39) i np jak uruchamiam kompa i
mam jakas plytke np z windowsem to botuje i sie uruchamia ale juz w windowsie
kicha:(.Moze to przez wirusy ostatnio mialem ich sporo?
Obserwuj wątek
    • netsec Re: CD-Rom a wirusy.... 10.11.04, 09:46
      Uruchom komputer normalnie i wklej log z Startuplist.
      W tym celu uruchom ponownie HiJackThis przejdź do Config później do Misc Tools i
      kliknij Generate StartupList log.
      Program zapyta czy wygenerować listę, potwierdź a zawartość listy wklej na forum.

      Dla porównania w oddzielnym poście wklej również nowy log z HiJackThis.
      • osiolek4 Re: CD-Rom a wirusy.... 10.11.04, 13:42
        Oto moj log z start list(co dziwne gdy uruchamiam kompa to cd rom dzial bo
        botuje plyte z win)

        StartupList report, 2004-11-10, 13:40:32
        StartupList version: 1.52.2
        Started from : C:\Program Files\Hijackthis\HijackThis.EXE
        Detected: Windows XP Dodatek SP2 (WinNT 5.01.2600)
        Detected: Internet Explorer v6.00 SP2 (6.00.2900.2180)
        * Using default options
        ==================================================

        Running processes:

        C:\WINDOWS\System32\smss.exe
        C:\WINDOWS\system32\winlogon.exe
        C:\WINDOWS\system32\services.exe
        C:\WINDOWS\system32\lsass.exe
        C:\WINDOWS\system32\svchost.exe
        C:\WINDOWS\System32\svchost.exe
        C:\WINDOWS\system32\spoolsv.exe
        C:\Program Files\AntiVirenKit\AVKService.exe
        C:\Program Files\AntiVirenKit\AVKWCtl.exe
        C:\WINDOWS\System32\CTSvcCDA.exe
        C:\Program Files\Common Files\Microsoft Shared\VS7Debug\mdm.exe
        C:\WINDOWS\System32\nvsvc32.exe
        C:\WINDOWS\Explorer.EXE
        C:\WINDOWS\system32\wscntfy.exe
        C:\WINDOWS\System32\svchost.exe
        C:\WINDOWS\htpatch.exe
        C:\windows\system32\csmss.exe
        C:\Program Files\Win Comm\WinComm.exe
        C:\Program Files\Messenger\msmsgs.exe
        C:\Program Files\Win Comm\WinLock.exe
        C:\Programy\FlashGet\flashget.exe
        C:\Program Files\Gadu-Gadu\gg.exe
        C:\Program Files\Internet Explorer\iexplore.exe
        C:\Program Files\Hijackthis\HijackThis.exe

        --------------------------------------------------

        Listing of startup folders:

        Shell folders Common Startup:
        [C:\Documents and Settings\All Users\Menu Start\Programy\Autostart]
        Microsoft Office.lnk = D:\Program Files\Microsoft Office\Office10\OSA.EXE

        --------------------------------------------------

        Checking Windows NT UserInit:

        [HKLM\Software\Microsoft\Windows NT\CurrentVersion\Winlogon]
        UserInit = C:\WINDOWS\system32\userinit.exe,

        --------------------------------------------------

        Autorun entries from Registry:
        HKCU\Software\Microsoft\Windows\CurrentVersion\Run

        Gadu-Gadu = "C:\Program Files\Gadu-Gadu\gg.exe" /tray
        MSMSGS = "C:\Program Files\Messenger\msmsgs.exe" /background

        --------------------------------------------------

        Shell & screensaver key from C:\WINDOWS\SYSTEM.INI:

        Shell=*INI section not found*
        SCRNSAVE.EXE=*INI section not found*
        drivers=*INI section not found*

        Shell & screensaver key from Registry:

        Shell=Explorer.exe
        SCRNSAVE.EXE=C:\WINDOWS\System32\logon.scr
        drivers=*Registry value not found*

        Policies Shell key:

        HKCU\..\Policies: Shell=*Registry key not found*
        HKLM\..\Policies: Shell=*Registry value not found*

        --------------------------------------------------


        Enumerating Browser Helper Objects:

        (no name) - C:\Program Files\Adobe\Acrobat 6.0
        CE\Reader\ActiveX\AcroIEHelper.dll - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3}
        (no name) - C:\WINDOWS\System32\drmclieo.dll - {475FF0D1-01EC-C504-050D-
        992111004794}
        (no name) - C:\PROGRA~1\SPYBOT~1\SDHelper.dll - {53707962-6F74-2D53-2644-
        206D7942484F}
        (no name) - C:\Programy\FlashGet\jccatch.dll - {A5366673-E8CA-11D3-9CD9-
        0090271D075B}

        --------------------------------------------------

        Enumerating Download Program Files:

        [FilePlanet Download Control Class]
        InProcServer32 = C:\WINDOWS\Downloaded Program Files\FilePlanetDownloadCtrl.dll
        CODEBASE = http://www.fileplanet.com/fpdlmgr/cabs/FPDC_1_0_0_44.cab

        [WUWebControl Class]
        InProcServer32 = C:\WINDOWS\System32\wuweb.dll
        CODEBASE =
        http://v5.windowsupdate.microsoft.com/v5consumer/V5Controls/en/x86/client/wuweb_
        site.cab?1100073916406

        [Shockwave Flash Object]
        InProcServer32 = C:\WINDOWS\System32\macromed\flash\Flash.ocx
        CODEBASE = http://download.macromedia.com/pub/shockwave/cabs/flash/swflash.cab

        [MainControl Class]
        InProcServer32 = C:\WINDOWS\System32\SkanerOnline.dll
        CODEBASE = http://skaner.mks.com.pl/SkanerOnline.cab

        --------------------------------------------------

        Enumerating ShellServiceObjectDelayLoad items:

        PostBootReminder: C:\WINDOWS\system32\SHELL32.dll
        CDBurn: C:\WINDOWS\system32\SHELL32.dll
        WebCheck: C:\WINDOWS\System32\webcheck.dll
        SysTray: C:\WINDOWS\System32\stobject.dll

        --------------------------------------------------
        End of report, 4 659 bytes
        Report generated in 0,281 seconds

        Command line options:
        /verbose - to add additional info on each section
        /complete - to include empty sections and unsuspicious data
        /full - to include several rarely-important sections
        /force9x - to include Win9x-only startups even if running on WinNT
        /forcent - to include WinNT-only startups even if running on Win9x
        /forceall - to include all Win9x and WinNT startups, regardless of platform
        /history - to list version history only


        A oto moj log z hijackthis


        Logfile of HijackThis v1.98.2
        Scan saved at 13:41:51, on 2004-11-10
        Platform: Windows XP Dodatek SP2 (WinNT 5.01.2600)
        MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)

        Running processes:
        C:\WINDOWS\System32\smss.exe
        C:\WINDOWS\system32\winlogon.exe
        C:\WINDOWS\system32\services.exe
        C:\WINDOWS\system32\lsass.exe
        C:\WINDOWS\system32\svchost.exe
        C:\WINDOWS\System32\svchost.exe
        C:\WINDOWS\system32\spoolsv.exe
        C:\Program Files\AntiVirenKit\AVKService.exe
        C:\Program Files\AntiVirenKit\AVKWCtl.exe
        C:\WINDOWS\System32\CTSvcCDA.exe
        C:\Program Files\Common Files\Microsoft Shared\VS7Debug\mdm.exe
        C:\WINDOWS\System32\nvsvc32.exe
        C:\WINDOWS\Explorer.EXE
        C:\WINDOWS\system32\wscntfy.exe
        C:\WINDOWS\System32\svchost.exe
        C:\WINDOWS\htpatch.exe
        C:\windows\system32\csmss.exe
        C:\Program Files\Win Comm\WinComm.exe
        C:\Program Files\Messenger\msmsgs.exe
        C:\Program Files\Win Comm\WinLock.exe
        C:\Programy\FlashGet\flashget.exe
        C:\Program Files\Gadu-Gadu\gg.exe
        C:\Program Files\Internet Explorer\iexplore.exe
        C:\WINDOWS\system32\notepad.exe
        C:\Program Files\Hijackthis\HijackThis.exe

        R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Default_Page_URL =
        http://213.159.117.134/index.php
        R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Bar = http://find-on-
        the-net.com/search.htm
        R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page =
        http://www.onet.pl/
        R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName = Łącza
        O2 - BHO: AcroIEHlprObj Class - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} -
        C:\Program Files\Adobe\Acrobat 6.0 CE\Reader\ActiveX\AcroIEHelper.dll
        O2 - BHO: drmclieo - {475FF0D1-01EC-C504-050D-992111004794} -
        C:\WINDOWS\System32\drmclieo.dll
        O2 - BHO: (no name) - {53707962-6F74-2D53-2644-206D7942484F} - C:\PROGRA~1
        \SPYBOT~1\SDHelper.dll
        O2 - BHO: IeCatch2 Class - {A5366673-E8CA-11D3-9CD9-0090271D075B} -
        C:\Programy\FlashGet\jccatch.dll
        O3 - Toolbar: FlashGet Bar - {E0E899AB-F487-11D5-8D29-0050BA6940E3} -
        C:\Programy\FlashGet\fgiebar.dll
        O4 - HKLM\..\Run: [HTpatch] C:\WINDOWS\htpatch.exe
        O4 - HKLM\..\Run: [SiSUSBRG] C:\WINDOWS\SiSUSBrg.exe
        O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE C:\WINDOWS\System32
        \NvCpl.dll,NvStartup
        O4 - HKLM\..\Run: [NvMediaCenter] RUNDLL32.EXE C:\WINDOWS\System32
        \NvMcTray.dll,NvTaskbarInit
        O4 - HKLM\..\Run: [Disc Detector] C:\Program
        Files\Creative\ShareDLL\CtNotify.exe
        O4 - HKLM\..\Run: [Cmaudio] RunDll32 cmicnfg.cpl,CMICtrlWnd
        O4 - HKLM\..\Run: [spoolsvr32] c:\windows\system32\csmss.exe
        O4 - HKLM\..\Run: [Win Comm] C:\Program Files\Win Comm\WinComm.exe
        O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -
        atboottime
        O4 - HKCU\..\Run: [Gadu-Gadu] "C:\Program Files\Gadu-Gadu\gg.exe" /tray
        O4 - HKCU\..\Run: [MSMSGS] "C:\Program Files\Messenger\msmsgs.exe" /background
        O4 - Global Startup: Microsoft Office.lnk = D:\Program Files\Microsoft
        Office\Office10\OSA.EXE
        O8 - Extra context menu item: Download All by FlashGet -
        C:\Programy\FlashGet\jc_all.htm
        O8 - Extra context menu item: Download using FlashGet -
        C:\Programy\FlashGet\jc_link.htm
        O8 - Extra context menu item: E&ksport do programu Microsoft Excel -
        res://D:\PROGRA~1\MICROS~1\Office10\EXCEL.EXE/3000
        O9 - Extra button: FlashGet - {D6E814A0-E0C5-11d4
        • osiolek4 Re: CD-Rom a wirusy.... 10.11.04, 14:09
          Ewewntualnei mozna prosic o jakas stronke z sterownikami?
        • netsec Re: Hijack + startuplist 10.11.04, 15:28
          Ściagnij CWShredder ale starą wersje 1.59.1
          www.idg.pl/ftp/pc_3824/CWShredder.1.59.1.html
          Masz przynajmniej dwa trojany :)

          Wyłącz przywracanie systemu. Uruchom kompa w trybie awaryjnym.
          Uwaga! Przy starcie do awaryjnego dostaniesz pytanie o wybór konta. NIE wybieraj
          konta Administratora tylko swoje własne imienne, bo na tym profilu jest syf. Po
          uruchomieniu komputera w trybie awaryjnym, nie otwieraj Internet Explorera.

          Uruchom ponownie HiJackThis wykonaj SCAN i zaznacz(haczykiem) te pozycje:

          R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Default_Page_URL =
          213.159.117.134/index.php
          R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Bar =
          find-on-the-net.com/search.htm
          O2 - BHO: drmclieo - {475FF0D1-01EC-C504-050D-992111004794} -
          C:\WINDOWS\System32\drmclieo.dll
          O4 - HKLM\..\Run: [Disc Detector] C:\Program Files\Creative\ShareDLL\CtNotify.exe
          O4 - HKLM\..\Run: [spoolsvr32] c:\windows\system32\csmss.exe
          O4 - HKLM\..\Run: [Win Comm] C:\Program Files\Win Comm\WinComm.exe
          O4 - HKCU\..\Run: [MSMSGS] "C:\Program Files\Messenger\msmsgs.exe" /background

          Po zaznaczeniu wykonaj FIX CHECKED i potwierdź TAK/OK.

          Uruchom CWShredder 1.59.1 i wykonaj FIX.

          Upewnij się, że opcja Pokaż wszystkie pliki w Eksploratorze Windows jest
          włączona.

          Usuń folder: C:\Program Files\Win Comm

          Po tym otwórz Mój Komputer wpisz w pasku adresu %TEMP%.
          Przejdziesz do folderu TEMP. Skasuj w nim wszystkie pliki, które uda się
          skasować.

          Uruchom komputer w normalnym trybie.

          Dodatkowo zainstaluj Jave Sun:
          java.sun.com/webapps/download/AutoDL?BundleId=9723
          Wklej nowy log z Startuplist i Hijack.
    • osiolek4 Re: CD-Rom a wirusy.... 10.11.04, 18:08
      Oto moja starlist po tym co zrobilem(jak mi kazales)

      StartupList report, 2004-11-10, 18:05:22
      StartupList version: 1.52.2
      Started from : C:\Program Files\Hijackthis\HijackThis.EXE
      Detected: Windows XP Dodatek SP2 (WinNT 5.01.2600)
      Detected: Internet Explorer v6.00 SP2 (6.00.2900.2180)
      * Using default options
      ==================================================

      Running processes:

      C:\WINDOWS\System32\smss.exe
      C:\WINDOWS\system32\winlogon.exe
      C:\WINDOWS\system32\services.exe
      C:\WINDOWS\system32\lsass.exe
      C:\WINDOWS\system32\svchost.exe
      C:\WINDOWS\System32\svchost.exe
      C:\WINDOWS\system32\spoolsv.exe
      C:\WINDOWS\Explorer.EXE
      C:\WINDOWS\htpatch.exe
      C:\Program Files\QuickTime\qttask.exe
      C:\windows\system32\csmss.exe
      C:\Program Files\Gadu-Gadu\gg.exe
      C:\Program Files\AntiVirenKit\AVKService.exe
      C:\Program Files\AntiVirenKit\AVKWCtl.exe
      C:\WINDOWS\System32\CTSvcCDA.exe
      C:\Program Files\Common Files\Microsoft Shared\VS7Debug\mdm.exe
      C:\WINDOWS\System32\nvsvc32.exe
      C:\WINDOWS\system32\wscntfy.exe
      C:\WINDOWS\System32\svchost.exe
      C:\WINDOWS\system32\wuauclt.exe
      C:\Program Files\Hijackthis\HijackThis.exe

      --------------------------------------------------

      Listing of startup folders:

      Shell folders Common Startup:
      [C:\Documents and Settings\All Users\Menu Start\Programy\Autostart]
      Microsoft Office.lnk = D:\Program Files\Microsoft Office\Office10\OSA.EXE

      --------------------------------------------------

      Checking Windows NT UserInit:

      [HKLM\Software\Microsoft\Windows NT\CurrentVersion\Winlogon]
      UserInit = C:\WINDOWS\system32\userinit.exe,

      --------------------------------------------------

      Autorun entries from Registry:
      HKCU\Software\Microsoft\Windows\CurrentVersion\Run

      Gadu-Gadu = "C:\Program Files\Gadu-Gadu\gg.exe" /tray

      --------------------------------------------------

      Shell & screensaver key from C:\WINDOWS\SYSTEM.INI:

      Shell=*INI section not found*
      SCRNSAVE.EXE=*INI section not found*
      drivers=*INI section not found*

      Shell & screensaver key from Registry:

      Shell=Explorer.exe
      SCRNSAVE.EXE=C:\WINDOWS\System32\logon.scr
      drivers=*Registry value not found*

      Policies Shell key:

      HKCU\..\Policies: Shell=*Registry key not found*
      HKLM\..\Policies: Shell=*Registry value not found*

      --------------------------------------------------


      Enumerating Browser Helper Objects:

      (no name) - C:\Program Files\Adobe\Acrobat 6.0
      CE\Reader\ActiveX\AcroIEHelper.dll - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3}
      (no name) - C:\WINDOWS\System32\drmclieo.dll - {475FF0D1-01EC-C504-050D-
      992111004794}
      (no name) - C:\PROGRA~1\SPYBOT~1\SDHelper.dll - {53707962-6F74-2D53-2644-
      206D7942484F}
      (no name) - C:\Programy\FlashGet\jccatch.dll - {A5366673-E8CA-11D3-9CD9-
      0090271D075B}

      --------------------------------------------------

      Enumerating Download Program Files:

      [FilePlanet Download Control Class]
      InProcServer32 = C:\WINDOWS\Downloaded Program Files\FilePlanetDownloadCtrl.dll
      CODEBASE = http://www.fileplanet.com/fpdlmgr/cabs/FPDC_1_0_0_44.cab

      [WUWebControl Class]
      InProcServer32 = C:\WINDOWS\System32\wuweb.dll
      CODEBASE =
      http://v5.windowsupdate.microsoft.com/v5consumer/V5Controls/en/x86/client/wuweb_
      site.cab?1100073916406

      [Shockwave Flash Object]
      InProcServer32 = C:\WINDOWS\System32\macromed\flash\Flash.ocx
      CODEBASE = http://download.macromedia.com/pub/shockwave/cabs/flash/swflash.cab

      [MainControl Class]
      InProcServer32 = C:\WINDOWS\System32\SkanerOnline.dll
      CODEBASE = http://skaner.mks.com.pl/SkanerOnline.cab

      --------------------------------------------------

      Enumerating ShellServiceObjectDelayLoad items:

      PostBootReminder: C:\WINDOWS\system32\SHELL32.dll
      CDBurn: C:\WINDOWS\system32\SHELL32.dll
      WebCheck: C:\WINDOWS\System32\webcheck.dll
      SysTray: C:\WINDOWS\System32\stobject.dll

      --------------------------------------------------
      End of report, 4 468 bytes
      Report generated in 0,031 seconds

      Command line options:
      /verbose - to add additional info on each section
      /complete - to include empty sections and unsuspicious data
      /full - to include several rarely-important sections
      /force9x - to include Win9x-only startups even if running on WinNT
      /forcent - to include WinNT-only startups even if running on Win9x
      /forceall - to include all Win9x and WinNT startups, regardless of platform
      /history - to list version history only


      a Oto muj log

      Logfile of HijackThis v1.98.2
      Scan saved at 18:06:53, on 2004-11-10
      Platform: Windows XP Dodatek SP2 (WinNT 5.01.2600)
      MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)

      Running processes:
      C:\WINDOWS\System32\smss.exe
      C:\WINDOWS\system32\winlogon.exe
      C:\WINDOWS\system32\services.exe
      C:\WINDOWS\system32\lsass.exe
      C:\WINDOWS\system32\svchost.exe
      C:\WINDOWS\System32\svchost.exe
      C:\WINDOWS\system32\spoolsv.exe
      C:\WINDOWS\Explorer.EXE
      C:\WINDOWS\htpatch.exe
      C:\Program Files\QuickTime\qttask.exe
      C:\windows\system32\csmss.exe
      C:\Program Files\Gadu-Gadu\gg.exe
      C:\Program Files\AntiVirenKit\AVKService.exe
      C:\Program Files\AntiVirenKit\AVKWCtl.exe
      C:\WINDOWS\System32\CTSvcCDA.exe
      C:\Program Files\Common Files\Microsoft Shared\VS7Debug\mdm.exe
      C:\WINDOWS\System32\nvsvc32.exe
      C:\WINDOWS\system32\wscntfy.exe
      C:\WINDOWS\System32\svchost.exe
      C:\WINDOWS\system32\wuauclt.exe
      C:\Program Files\Internet Explorer\iexplore.exe
      C:\Program Files\Hijackthis\HijackThis.exe

      R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page =
      http://www.onet.pl/
      R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName = Łącza
      O2 - BHO: AcroIEHlprObj Class - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} -
      C:\Program Files\Adobe\Acrobat 6.0 CE\Reader\ActiveX\AcroIEHelper.dll
      O2 - BHO: drmclieo - {475FF0D1-01EC-C504-050D-992111004794} -
      C:\WINDOWS\System32\drmclieo.dll
      O2 - BHO: (no name) - {53707962-6F74-2D53-2644-206D7942484F} - C:\PROGRA~1
      \SPYBOT~1\SDHelper.dll
      O2 - BHO: IeCatch2 Class - {A5366673-E8CA-11D3-9CD9-0090271D075B} -
      C:\Programy\FlashGet\jccatch.dll
      O3 - Toolbar: FlashGet Bar - {E0E899AB-F487-11D5-8D29-0050BA6940E3} -
      C:\Programy\FlashGet\fgiebar.dll
      O4 - HKLM\..\Run: [HTpatch] C:\WINDOWS\htpatch.exe
      O4 - HKLM\..\Run: [SiSUSBRG] C:\WINDOWS\SiSUSBrg.exe
      O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE C:\WINDOWS\System32
      \NvCpl.dll,NvStartup
      O4 - HKLM\..\Run: [NvMediaCenter] RUNDLL32.EXE C:\WINDOWS\System32
      \NvMcTray.dll,NvTaskbarInit
      O4 - HKLM\..\Run: [Cmaudio] RunDll32 cmicnfg.cpl,CMICtrlWnd
      O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -
      atboottime
      O4 - HKLM\..\Run: [spoolsvr32] c:\windows\system32\csmss.exe
      O4 - HKCU\..\Run: [Gadu-Gadu] "C:\Program Files\Gadu-Gadu\gg.exe" /tray
      O4 - Global Startup: Microsoft Office.lnk = D:\Program Files\Microsoft
      Office\Office10\OSA.EXE
      O8 - Extra context menu item: Download All by FlashGet -
      C:\Programy\FlashGet\jc_all.htm
      O8 - Extra context menu item: Download using FlashGet -
      C:\Programy\FlashGet\jc_link.htm
      O8 - Extra context menu item: E&ksport do programu Microsoft Excel -
      res://D:\PROGRA~1\MICROS~1\Office10\EXCEL.EXE/3000
      O9 - Extra button: FlashGet - {D6E814A0-E0C5-11d4-8D29-0050BA6940E3} -
      C:\Programy\FlashGet\flashget.exe
      O9 - Extra 'Tools' menuitem: &FlashGet - {D6E814A0-E0C5-11d4-8D29-
      0050BA6940E3} - C:\Programy\FlashGet\flashget.exe
      O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} -
      C:\Program Files\Messenger\msmsgs.exe
      O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-
      00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
      O15 - Trusted Zone: *.searchmiracle.com
      O15 - Trusted Zone: *.skoobidoo.com
      O15 - Trusted Zone: *.windupdates.com
      O16 - DPF: komentator - http://sport.onet.pl/komentator.cab
      O16 - DPF: {39B0684F-D7BF-4743-B050-FDC3F48F7E3B} (FilePlanet Download Control
      Class) - http://www.fileplanet.com/fpdlmgr/cabs/FPDC_1_0_0_44.cab
      O16 - DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} (WUWebContr

Nie masz jeszcze konta? Zarejestruj się


Nakarm Pajacyka