Rezultaty skanowania Farbar Recovery Scan Tool (FRST) (x64) Wersja: 17-09-2016 Uruchomiony przez Milosz (administrator) MILOSZ-KOMPUTER (18-09-2016 12:29:19) Uruchomiony z C:\Users\Milosz\Downloads Załadowane profile: Milosz (Dostępne profile: Milosz) Platform: Windows 7 Ultimate Service Pack 1 (X64) Język: Polski (Polska) Internet Explorer Wersja 8 (Domyślna przeglądarka: Chrome) Tryb startu: Normal Instrukcja obsługi Farbar Recovery Scan Tool: http://www.geekstogo.com/forum/topic/335081-frst-tutorial-how-to-use-farbar-recovery-scan-tool/ ==================== Procesy (filtrowane) ================= (Załączenie wejścia w fixlist spowoduje zamknięcie procesu. Powiązany plik nie zostanie przeniesiony.) (IDT, Inc.) C:\Windows\System32\DriverStore\FileRepository\stwrt64.inf_amd64_neutral_38986e29a8b510a2\stacsv64.exe (ASUS) C:\Program Files (x86)\ASUS\ATK Package\ATK Hotkey\AsLdrSrv.exe (ASUS) C:\Program Files (x86)\ASUS\ATK Package\ATKGFNEX\GFNEXSrv.exe (McAfee, Inc.) C:\Program Files (x86)\McAfee\SiteAdvisor\mcsacore.exe (McAfee, Inc.) C:\Program Files\Common Files\McAfee\SystemCore\mfemms.exe (McAfee, Inc.) C:\Windows\System32\mfevtps.exe () C:\ProgramData\MobileBrServ\mbbService.exe (McAfee, Inc.) C:\Windows\System32\mfevtps.exe (McAfee, Inc.) C:\Program Files\Common Files\McAfee\AMCore\mcshield.exe (Microsoft Corporation) C:\Windows\SysWOW64\rundll32.exe (Microsoft Corporation) C:\Windows\System32\rundll32.exe (McAfee, Inc.) C:\Program Files\Common Files\McAfee\SystemCore\mfefire.exe (McAfee, Inc.) C:\Program Files\McAfee\MSC\McAPExe.exe (McAfee, Inc.) C:\Program Files\Common Files\McAfee\SystemCore\mfefire.exe (McAfee, Inc.) C:\Program Files\Common Files\McAfee\Platform\McSvcHost\McSvHost.exe (ASUS) C:\Program Files (x86)\ASUS\ATK Package\ATK Hotkey\HControl.exe (IDT, Inc.) C:\Program Files\IDT\WDM\sttray64.exe (ASUS) C:\Program Files (x86)\ASUS\ATK Package\ATK Hotkey\ATKOSD.exe (ASUS) C:\Program Files (x86)\ASUS\ATK Package\ATK Hotkey\WDC.exe (Microsoft Corporation) C:\Windows\WindowsMobile\wmdcBase.exe (McAfee, Inc.) C:\Program Files\Common Files\McAfee\Platform\McUICnt.exe (ASUS) C:\Program Files (x86)\ASUS\ATK Package\ATKOSD2\ATKOSD2.exe (ASUS) C:\Program Files (x86)\ASUS\ATK Package\ATK Media\DMedia.exe (ASUS) C:\Program Files (x86)\ASUS\ATK Package\ATK Hotkey\HControlUser.exe (Piriform Ltd) C:\Program Files\CCleaner\CCleaner64.exe (Google Inc.) C:\Program Files (x86)\Google\Chrome\Application\chrome.exe (Google Inc.) C:\Program Files (x86)\Google\Chrome\Application\chrome.exe (Advanced Micro Devices Inc.) C:\Program Files (x86)\ATI Technologies\ATI.ACE\Core-Static\MOM.exe (Google Inc.) C:\Program Files (x86)\Google\Chrome\Application\chrome.exe (Google Inc.) C:\Program Files (x86)\Google\Chrome\Application\chrome.exe (ATI Technologies Inc.) C:\Program Files (x86)\ATI Technologies\ATI.ACE\Core-Static\CCC.exe (Microsoft Corporation) C:\Windows\Microsoft.NET\Framework64\v3.0\WPF\PresentationFontCache.exe (McAfee, Inc.) C:\Program Files\Common Files\McAfee\CSP\1.5.450.0\McCSPServiceHost.exe ==================== Rejestr (filtrowane) =========================== (Załączenie wejścia w fixlist spowoduje usunięcie obiektu z rejestru lub przywrócenie jego domyślnej postaci. Powiązany plik nie zostanie przeniesiony.) HKLM\...\Run: [SysTrayApp] => C:\Program Files\IDT\WDM\sttray64.exe [487424 2009-11-27] (IDT, Inc.) HKLM\...\Run: [Windows Mobile-based device management] => C:\Windows\WindowsMobile\wmdcBase.exe [660360 2007-05-31] (Microsoft Corporation) HKLM-x32\...\Run: [StartCCC] => C:\Program Files (x86)\ATI Technologies\ATI.ACE\Core-Static\CLIStart.exe [336384 2011-03-10] (Advanced Micro Devices, Inc.) HKLM-x32\...\Run: [mcpltui_exe] => C:\Program Files\Common Files\McAfee\Platform\mcuicnt.exe [719272 2015-04-02] (McAfee, Inc.) HKLM-x32\...\Run: [ATKOSD2] => C:\Program Files (x86)\ASUS\ATK Package\ATKOSD2\ATKOSD2.exe [6998656 2009-10-26] (ASUS) HKLM-x32\...\Run: [ATKMEDIA] => C:\Program Files (x86)\ASUS\ATK Package\ATK Media\DMedia.exe [170624 2009-08-19] (ASUS) HKLM-x32\...\Run: [HControlUser] => C:\Program Files (x86)\ASUS\ATK Package\ATK Hotkey\HControlUser.exe [105016 2009-06-19] (ASUS) HKLM-x32\...\Run: [GrooveMonitor] => C:\Program Files (x86)\Microsoft Office\Office12\GrooveMonitor.exe [31016 2006-10-27] (Microsoft Corporation) HKU\S-1-5-21-410550195-1196533998-280330643-1000\...\Run: [CCleaner Monitoring] => C:\Program Files\CCleaner\CCleaner64.exe [8641240 2016-02-12] (Piriform Ltd) HKU\S-1-5-21-410550195-1196533998-280330643-1000\...\MountPoints2: {f88dfe6c-74e9-11e6-b082-20cf303392f8} - F:\AutoRun.exe ==================== Internet (filtrowane) ==================== (Załączenie wejścia w fixlist, w przypadku gdy jest to obiekt rejestru, spowoduje usunięcie go z rejestru lub przywrócenie jego domyślnej postaci.) Tcpip\Parameters: [DhcpNameServer] 192.168.1.254 Tcpip\..\Interfaces\{847A970C-ECC8-4D49-994F-EE07F45D7064}: [DhcpNameServer] 192.168.8.1 192.168.8.1 Tcpip\..\Interfaces\{86088512-BDF7-4233-89C4-C6564093B7D6}: [DhcpNameServer] 192.168.1.254 Internet Explorer: ================== HKU\S-1-5-21-410550195-1196533998-280330643-1000\Software\Microsoft\Internet Explorer\Main,Start Page = about:blank SearchScopes: HKLM -> DefaultScope {0633EE93-D776-472f-A0FF-E1416B8B2E3A} URL = Handler: dssrequest - {5513F07E-936B-4E52-9B00-067394E91CC5} - c:\Program Files (x86)\McAfee\SiteAdvisor\x64\McIEPlg.dll [2016-02-12] (McAfee, Inc.) Handler-x32: dssrequest - {5513F07E-936B-4E52-9B00-067394E91CC5} - c:\Program Files (x86)\McAfee\SiteAdvisor\McIEPlg.dll [2016-02-12] (McAfee, Inc.) Handler: sacore - {5513F07E-936B-4E52-9B00-067394E91CC5} - c:\Program Files (x86)\McAfee\SiteAdvisor\x64\McIEPlg.dll [2016-02-12] (McAfee, Inc.) Handler-x32: sacore - {5513F07E-936B-4E52-9B00-067394E91CC5} - c:\Program Files (x86)\McAfee\SiteAdvisor\McIEPlg.dll [2016-02-12] (McAfee, Inc.) Filter: application/x-mfe-ipt - {3EF5086B-5478-4598-A054-786C45D75692} - c:\Program Files\McAfee\MSC\McSnIePl64.dll [2015-09-03] (McAfee, Inc.) Filter-x32: application/x-mfe-ipt - {3EF5086B-5478-4598-A054-786C45D75692} - c:\Program Files (x86)\McAfee\MSC\McSnIePl.dll [2015-09-03] (McAfee, Inc.) Filter: deflate - {8f6b0360-b80d-11d0-a9b3-006097942311} - C:\Windows\system32\urlmon.dll [2010-11-20] (Microsoft Corporation) Filter-x32: deflate - {8f6b0360-b80d-11d0-a9b3-006097942311} - C:\Windows\SysWOW64\urlmon.dll [2010-11-20] (Microsoft Corporation) Filter: gzip - {8f6b0360-b80d-11d0-a9b3-006097942311} - C:\Windows\system32\urlmon.dll [2010-11-20] (Microsoft Corporation) Filter-x32: gzip - {8f6b0360-b80d-11d0-a9b3-006097942311} - C:\Windows\SysWOW64\urlmon.dll [2010-11-20] (Microsoft Corporation) Chrome: ======= CHR Profile: C:\Users\Milosz\AppData\Local\Google\Chrome\User Data\Profile 1 [2016-09-18] CHR Extension: (Prezentacje Google) - C:\Users\Milosz\AppData\Local\Google\Chrome\User Data\Profile 1\Extensions\aapocclcgogkmnckokdopfmhonfmgoek [2016-09-17] CHR Extension: (Dokumenty Google) - C:\Users\Milosz\AppData\Local\Google\Chrome\User Data\Profile 1\Extensions\aohghmighlieiainnegkcijnfilokake [2016-09-17] CHR Extension: (Dysk Google) - C:\Users\Milosz\AppData\Local\Google\Chrome\User Data\Profile 1\Extensions\apdfllckaahabafndbhieahigkjlhalf [2016-09-17] CHR Extension: (YouTube) - C:\Users\Milosz\AppData\Local\Google\Chrome\User Data\Profile 1\Extensions\blpcfgokakmgnkcojhhkbfbldkacnbeo [2016-09-17] CHR Extension: (Arkusze Google) - C:\Users\Milosz\AppData\Local\Google\Chrome\User Data\Profile 1\Extensions\felcaaldnbdncclmgdcncolpebgiejap [2016-09-17] CHR Extension: (Dokumenty Google offline) - C:\Users\Milosz\AppData\Local\Google\Chrome\User Data\Profile 1\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi [2016-09-17] CHR Extension: (Płatności w sklepie Chrome Web Store) - C:\Users\Milosz\AppData\Local\Google\Chrome\User Data\Profile 1\Extensions\nmmhkkegccagdldgiimedpiccmgmieda [2016-09-17] CHR Extension: (Gmail) - C:\Users\Milosz\AppData\Local\Google\Chrome\User Data\Profile 1\Extensions\pjkljhegncpnkpknbcohdijeoejaedia [2016-09-17] CHR Extension: (Chrome Media Router) - C:\Users\Milosz\AppData\Local\Google\Chrome\User Data\Profile 1\Extensions\pkedcjkdefgpdelpbcmbmeomcjbeemfm [2016-09-17] ==================== Usługi (filtrowane) ======================== (Załączenie wejścia w fixlist spowoduje jego usunięcie z rejestru. Powiązany plik nie zostanie przeniesiony, o ile nie zostanie załączony z osobna.) R2 McAfee SiteAdvisor Service; c:\Program Files (x86)\McAfee\SiteAdvisor\mcsacore.exe [154856 2016-02-12] (McAfee, Inc.) R2 McAPExe; C:\Program Files\McAfee\MSC\McAPExe.exe [754792 2015-09-03] (McAfee, Inc.) R2 mccspsvc; C:\Program Files\Common Files\McAfee\CSP\1.5.450.0\McCSPServiceHost.exe [207344 2015-04-08] (McAfee, Inc.) R2 McMPFSvc; C:\Program Files\Common Files\McAfee\Platform\McSvcHost\McSvHost.exe [340744 2015-04-02] (McAfee, Inc.) R2 McNaiAnn; C:\Program Files\Common Files\McAfee\Platform\McSvcHost\McSvHost.exe [340744 2015-04-02] (McAfee, Inc.) S3 McODS; C:\Program Files\McAfee\VirusScan\mcods.exe [612688 2015-04-09] (McAfee, Inc.) R2 mcpltsvc; C:\Program Files\Common Files\McAfee\Platform\McSvcHost\McSvHost.exe [340744 2015-04-02] (McAfee, Inc.) R2 McProxy; C:\Program Files\Common Files\McAfee\Platform\McSvcHost\McSvHost.exe [340744 2015-04-02] (McAfee, Inc.) R3 mfefire; C:\Program Files\Common Files\McAfee\SystemCore\\mfefire.exe [232656 2015-02-17] (McAfee, Inc.) R2 mfemms; C:\Program Files\Common Files\McAfee\SystemCore\\mfemms.exe [380896 2016-01-21] (McAfee, Inc.) R3 mfevtp; C:\Windows\system32\mfevtps.exe [275368 2015-11-18] (McAfee, Inc.) R2 Mobile Broadband HL Service; C:\ProgramData\MobileBrServ\mbbservice.exe [242264 2014-11-20] () R2 MSK80Service; C:\Program Files\Common Files\McAfee\Platform\McSvcHost\McSvHost.exe [340744 2015-04-02] (McAfee, Inc.) R2 STacSV; C:\Windows\System32\DriverStore\FileRepository\stwrt64.inf_amd64_neutral_38986e29a8b510a2\STacSV64.exe [243712 2009-11-27] (IDT, Inc.) S3 WinDefend; C:\Program Files\Windows Defender\mpsvc.dll [1011712 2009-07-14] (Microsoft Corporation) ===================== Sterowniki (filtrowane) ========================== (Załączenie wejścia w fixlist spowoduje jego usunięcie z rejestru. Powiązany plik nie zostanie przeniesiony, o ile nie zostanie załączony z osobna.) R3 cfwids; C:\Windows\System32\drivers\cfwids.sys [68784 2015-02-17] (McAfee, Inc.) S3 ebdrv; C:\Windows\system32\DRIVERS\evbda.sys [3286016 2009-06-10] (Broadcom Corporation) S3 HipShieldK; C:\Windows\System32\drivers\HipShieldK.sys [197704 2013-09-23] (McAfee, Inc.) R0 iaStorF; C:\Windows\System32\DRIVERS\iaStorF.sys [30960 2015-05-29] (Intel Corporation) R3 int0800; C:\Windows\System32\DRIVERS\flashud.sys [51712 2009-09-09] (Intel Corporation) R3 L1C; C:\Windows\System32\DRIVERS\L1C62x64.sys [129224 2016-02-27] (Qualcomm Atheros Co., Ltd.) R3 mfeaack; C:\Windows\System32\drivers\mfeaack.sys [419624 2015-11-25] (McAfee, Inc.) R3 mfeavfk; C:\Windows\System32\drivers\mfeavfk.sys [351144 2015-11-25] (McAfee, Inc.) R0 mfedisk; C:\Windows\System32\DRIVERS\mfedisk.sys [101872 2015-02-17] (McAfee, Inc.) R3 mfefirek; C:\Windows\System32\drivers\mfefirek.sys [488000 2015-02-17] (McAfee, Inc.) R0 mfehidk; C:\Windows\System32\drivers\mfehidk.sys [846080 2015-11-25] (McAfee, Inc.) R3 mfencbdc; C:\Windows\System32\DRIVERS\mfencbdc.sys [482600 2015-01-16] (McAfee, Inc.) S3 mfencrk; C:\Windows\System32\DRIVERS\mfencrk.sys [100720 2015-01-16] (McAfee, Inc.) R0 mfewfpk; C:\Windows\System32\drivers\mfewfpk.sys [340448 2015-02-17] (McAfee, Inc.) R3 MTsensor64; C:\Windows\System32\DRIVERS\PuAcpi64.sys [15880 2009-06-04] () R3 SNP2UVC; C:\Windows\System32\DRIVERS\snp2uvc.sys [1800832 2010-09-07] (Sonix Technology Co., Ltd.) S3 Synth3dVsc; System32\drivers\synth3dvsc.sys [X] S3 tsusbhub; system32\drivers\tsusbhub.sys [X] S3 VGPU; System32\drivers\rdvgkmd.sys [X] ==================== NetSvcs (filtrowane) =================== (Załączenie wejścia w fixlist spowoduje jego usunięcie z rejestru. Powiązany plik nie zostanie przeniesiony, o ile nie zostanie załączony z osobna.) ==================== Jeden miesiąc - utworzone pliki i foldery ======== (Załączenie wejścia w fixlist spowoduje przeniesienie pliku/folderu.) 2016-09-18 12:17 - 2016-09-18 12:23 - 00010195 _____ C:\Users\Milosz\Downloads\Fixlog.txt 2016-09-18 11:06 - 2016-09-18 11:06 - 312128895 _____ C:\Windows\MEMORY.DMP 2016-09-18 11:06 - 2016-09-18 11:06 - 00277688 _____ C:\Windows\Minidump\091816-17004-01.dmp 2016-09-18 10:51 - 2016-09-18 10:51 - 00016020 _____ C:\Users\Milosz\Downloads\Downloads.rar 2016-09-18 10:49 - 2016-09-18 10:49 - 00031710 _____ C:\Users\Milosz\Downloads\Shortcut.txt 2016-09-18 10:48 - 2016-09-18 10:49 - 00020299 _____ C:\Users\Milosz\Downloads\Addition.txt 2016-09-18 10:48 - 2016-09-18 10:48 - 00380928 _____ C:\Users\Milosz\Downloads\22gzxdq5.exe 2016-09-18 10:46 - 2016-09-18 12:30 - 00012282 _____ C:\Users\Milosz\Downloads\FRST.txt 2016-09-18 10:45 - 2016-09-18 12:29 - 00000000 ____D C:\FRST 2016-09-18 10:44 - 2016-09-18 10:44 - 02399232 _____ (Farbar) C:\Users\Milosz\Downloads\FRST64.exe 2016-09-17 21:14 - 2016-09-17 21:14 - 00002274 _____ C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Google Chrome.lnk 2016-09-17 21:14 - 2016-09-17 21:14 - 00002262 _____ C:\Users\Public\Desktop\Google Chrome.lnk 2016-09-17 21:12 - 2016-09-18 12:25 - 00001044 _____ C:\Windows\Tasks\GoogleUpdateTaskMachineCore.job 2016-09-17 21:12 - 2016-09-18 12:17 - 00001048 _____ C:\Windows\Tasks\GoogleUpdateTaskMachineUA.job 2016-09-17 21:12 - 2016-09-17 21:12 - 00004044 _____ C:\Windows\System32\Tasks\GoogleUpdateTaskMachineUA 2016-09-17 21:12 - 2016-09-17 21:12 - 00003792 _____ C:\Windows\System32\Tasks\GoogleUpdateTaskMachineCore 2016-09-17 19:11 - 2016-09-17 19:11 - 00000000 ____D C:\Users\Milosz\Desktop\BLS 2016-09-11 23:59 - 2016-09-11 23:59 - 00000000 ___HD C:\$Windows.~WS 2016-09-11 22:47 - 2016-09-11 23:38 - 00000000 ____D C:\ESD 2016-09-11 22:30 - 2016-09-11 22:30 - 00000000 ____D C:\$WINDOWS.~BT 2016-09-09 10:15 - 2016-09-17 20:43 - 00000000 ____D C:\AdwCleaner 2016-09-07 19:34 - 2016-09-07 19:35 - 00000000 ____D C:\ProgramData\MobileBrServ 2016-09-06 13:59 - 2016-09-06 13:59 - 00324449 _____ C:\Users\Milosz\Downloads\Generated by IAI-Shop.pdf 2016-09-02 22:47 - 2016-09-02 22:47 - 00000000 ____D C:\Windows\system32\appmgmt 2016-09-02 21:54 - 2016-09-02 21:54 - 00000000 ____H C:\Windows\system32\Drivers\Msft_User_WpdRapi2_01_00_00.Wdf 2016-09-02 21:49 - 2016-09-02 22:51 - 00000000 ____D C:\Windows\WindowsMobile 2016-08-26 13:42 - 2016-09-09 10:17 - 00002962 __RSH C:\Users\Milosz\ntuser.pol ==================== Jeden miesiąc - zmodyfikowane pliki i foldery ======== (Załączenie wejścia w fixlist spowoduje przeniesienie pliku/folderu.) 2016-09-18 12:25 - 2009-07-14 07:08 - 00000006 ____H C:\Windows\Tasks\SA.DAT 2016-09-18 12:23 - 2016-03-05 13:56 - 00000000 ____D C:\Users\Milosz\AppData\LocalLow\Temp 2016-09-18 12:14 - 2016-06-24 10:34 - 00000000 ____D C:\Users\Milosz\AppData\Roaming\Notepad++ 2016-09-18 12:13 - 2016-03-07 15:31 - 00000000 ____D C:\Program Files (x86)\Adobe 2016-09-18 11:23 - 2009-07-14 06:45 - 00010208 ____H C:\Windows\system32\7B296FB0-376B-497e-B012-9C450E1B7327-5P-1.C7483456-A289-439d-8115-601632D005A0 2016-09-18 11:23 - 2009-07-14 06:45 - 00010208 ____H C:\Windows\system32\7B296FB0-376B-497e-B012-9C450E1B7327-5P-0.C7483456-A289-439d-8115-601632D005A0 2016-09-18 11:09 - 2009-07-14 05:20 - 00000000 ____D C:\Windows\inf 2016-09-18 11:06 - 2016-02-27 20:04 - 00000000 ____D C:\Windows\Minidump 2016-09-17 21:13 - 2016-03-04 11:49 - 00000000 ____D C:\Program Files (x86)\Google 2016-09-17 21:12 - 2016-03-04 11:48 - 00000000 ____D C:\Users\Milosz\AppData\Local\Deployment 2016-09-17 21:02 - 2016-02-27 16:51 - 00001452 _____ C:\Users\Milosz\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Internet Explorer.lnk 2016-09-17 19:23 - 2009-07-14 05:20 - 00000000 ____D C:\Windows\Cursors 2016-09-17 19:11 - 2016-04-24 19:26 - 00192216 _____ (Malwarebytes) C:\Windows\system32\Drivers\MBAMSwissArmy.sys 2016-09-16 11:41 - 2016-03-07 15:32 - 00004476 _____ C:\Windows\System32\Tasks\Adobe Acrobat Update Task 2016-09-12 21:11 - 2009-07-14 19:55 - 00739932 _____ C:\Windows\system32\perfh015.dat 2016-09-12 21:11 - 2009-07-14 19:55 - 00155474 _____ C:\Windows\system32\perfc015.dat 2016-09-12 21:11 - 2009-07-14 07:13 - 01668226 _____ C:\Windows\system32\PerfStringBackup.INI 2016-09-11 23:59 - 2016-02-27 16:42 - 00000000 ____D C:\Windows\Panther 2016-09-09 10:17 - 2016-02-27 16:49 - 00000000 ____D C:\Users\Milosz 2016-09-07 12:58 - 2009-07-14 07:32 - 00000000 ____D C:\Windows\Downloaded Program Files 2016-09-07 09:33 - 2009-07-14 05:20 - 00000000 ____D C:\Windows\PolicyDefinitions 2016-09-07 09:19 - 2016-05-10 21:06 - 00000000 ____D C:\Users\Milosz\Downloads\GoT 2016-09-03 18:10 - 2009-07-14 05:20 - 00000000 ____D C:\Windows\Vss 2016-09-03 18:07 - 2016-05-10 21:07 - 00000000 ____D C:\Users\Milosz\AppData\Roaming\uTorrent 2016-08-25 19:58 - 2009-07-14 05:20 - 00000000 ___HD C:\Windows\system32\GroupPolicy 2016-08-25 19:58 - 2009-07-14 05:20 - 00000000 ____D C:\Windows\SysWOW64\GroupPolicy ==================== Pliki w katalogu głównym wybranych folderów ======= 2016-08-08 12:59 - 2016-08-08 12:59 - 0000861 _____ () C:\Users\Milosz\AppData\Local\recently-used.xbel ==================== Bamital & volsnap ================= (Brak automatycznej naprawy dla plików które nie przeszły weryfikacji.) C:\Windows\system32\winlogon.exe => Plik podpisany cyfrowo C:\Windows\system32\wininit.exe => Plik podpisany cyfrowo C:\Windows\SysWOW64\wininit.exe => Plik podpisany cyfrowo C:\Windows\explorer.exe => Plik podpisany cyfrowo C:\Windows\SysWOW64\explorer.exe => Plik podpisany cyfrowo C:\Windows\system32\svchost.exe => Plik podpisany cyfrowo C:\Windows\SysWOW64\svchost.exe => Plik podpisany cyfrowo C:\Windows\system32\services.exe => Plik podpisany cyfrowo C:\Windows\system32\User32.dll => Plik podpisany cyfrowo C:\Windows\SysWOW64\User32.dll => Plik podpisany cyfrowo C:\Windows\system32\userinit.exe => Plik podpisany cyfrowo C:\Windows\SysWOW64\userinit.exe => Plik podpisany cyfrowo C:\Windows\system32\rpcss.dll => Plik podpisany cyfrowo C:\Windows\system32\dnsapi.dll => Plik podpisany cyfrowo C:\Windows\SysWOW64\dnsapi.dll => Plik podpisany cyfrowo C:\Windows\system32\Drivers\volsnap.sys => Plik podpisany cyfrowo LastRegBack: 2016-09-10 17:45 ==================== Koniec FRST.txt ============================