Op deze website gebruiken we cookies om content en advertenties te personaliseren, om functies voor social media te bieden en om ons websiteverkeer te analyseren. Ook delen we informatie over uw gebruik van onze site met onze partners voor social media, adverteren en analyse. Deze partners kunnen deze gegevens combineren met andere informatie die u aan ze heeft verstrekt of die ze hebben verzameld op basis van uw gebruik van hun services. Meer informatie.

Akkoord

Vraag & Antwoord

Beveiliging & privacy

data van zwaar besmette pc te redden ???

blob
12 antwoorden
  • Pc -na mislukte update SP2- vol met malware en virussen.
    Eigenlijk niet te verwijderen.
    (Meerdere) virusscanner kunnen niet eens geinstalleerd. (oa. foutmelding over veranderd bestand)

    Met mailwarebytes komen er steeds weer nieuwe (?) trojans en dialers etc. boven water.

    In het begin ( alleen maar blauwe schermen en alleen af en toe toegang in veilige modus. Toen was alle belangrijke data al weg. ) Reparatie XP gedaan.
    Enkele mappen zijn toen overschreven enkele niet.
    ( Wat onbelangrijke gebleven , wat belangrijke overschreven..)

    Ik hoopte met een goed recoveryprogramma nog wat terug te halen maar zonder succes tot nu toe. Ik kan kan geen gevegevens meet lezen ( oa de bootsector kapot )

    Wat is de beste manier van aanpakken ???
  • Begin eens met een hijackhtis logje te plaatsen aub.

    * Download [b:1b2142282e]Trend Micro Hijack This™[/b:1b2142282e]
    Dubbelklik [b:1b2142282e]HJTInstall.exe[/b:1b2142282e] om HijackThis te installeren.
    Standaard zal HijackThis in de Program Files\Trendmicro map geïnstalleerd worden en een snelkoppeling zal op je bureaublad komen te staan.
    HijackThis zal openen na het installeren.
    Klik de [b:1b2142282e]Scan[/b:1b2142282e] knop onderaan.
    Dit zal de scan starten en een log openen.
    Kopieer en plak deze log in je volgende post
  • Geen foutmeldingen.

    wel blijken alle exe bestanden bsmet.
    (heb scan van de externe HD op een andere computer gedaan)
    Kan geen image en of recoverysoftware op de besmette PC installen.
    (foutmeldingen)

    Dus geen idee meer hoe event. data nog eraf te halen…

    Malwarebytes' Anti-Malware 1.36
    Database version: 1945
    Windows 5.1.2600 Service Pack 1

    22-4-2009 13:31:27
    mbam-log-2009-04-22 (13-31-27).txt

    Scan type: Full Scan (C:\|E:\|G:\|)
    Objects scanned: 72959
    Time elapsed: 5 minute(s), 9 second(s)

    Memory Processes Infected: 0
    Memory Modules Infected: 0
    Registry Keys Infected: 0
    Registry Values Infected: 0
    Registry Data Items Infected: 0
    Folders Infected: 0
    Files Infected: 0

    Memory Processes Infected:
    (No malicious items detected)

    Memory Modules Infected:
    (No malicious items detected)

    Registry Keys Infected:
    (No malicious items detected)

    Registry Values Infected:
    (No malicious items detected)

    Registry Data Items Infected:
    (No malicious items detected)

    Folders Infected:
    (No malicious items detected)

    Files Infected:
    (No malicious items detected)
  • misschien ook interessant:
    logje Trojan Remover:

    ***** NORMAL SCAN FOR ACTIVE MALWARE *****
    Trojan Remover Ver 6.7.8.2575. For information, email support@simplysup.com
    [Unregistered version]
    Scan started at: 14:58:33 22 apr 2009
    Using Database v7318
    Operating System: Windows XP Professional (SP1) [Build: 5.1.2600]
    File System: FAT32
    UserData directory: C:\Documents and Settings\a\Application Data\Simply Super Software\Trojan Remover\
    Database directory: C:\Documents and Settings\All Users\Application Data\Simply Super Software\Trojan Remover\Data\
    Logfile directory: C:\Documents and Settings\a\Mijn documenten\Simply Super Software\Trojan Remover Logfiles\
    Program directory: g:\Program Files\Trojan Remover\
    Running with Administrator privileges

    ************************************************************

    ************************************************************
    14:58:33: —– SCANNING FOR ROOTKIT SERVICES —–
    Hidden Service Keyname: ovfsthxwwyksibe
    Hidden Service: \systemroot\system32\drivers\ovfsthxvxjcbxhe.sys
    C:\WINDOWS\system32\drivers\ovfsthxvxjcbxhe.sys
    83456 bytes
    Modified: 19-4-2009 21:52
    Company: Microsoft Corporation
    File appears to be hidden using rootkit techniques
    Entry has been scheduled for deletion when the PC is restarted
    C:\WINDOWS\system32\drivers\ovfsthxvxjcbxhe.sys - file backed up to C:\WINDOWS\system32\drivers\ovfsthxvxjcbxhe.sys.vir
    C:\WINDOWS\system32\drivers\ovfsthxvxjcbxhe.sys - file has been erased using RAW erasure
    ———-

    ************************************************************
    14:59:11: Scanning —–WINDOWS REGISTRY—–
    ——————–
    Checking HKCU\SOFTWARE\Microsoft\Windows NT\CurrentVersion\WinLogon
    ——————–
    Checking HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\WinLogon
    This key's "Shell" value calls the following program(s):
    Key value: [Explorer.exe]
    File: Explorer.exe
    C:\WINDOWS\Explorer.exe
    1024000 bytes
    Created: 9-9-2002 13:08
    Modified: 9-9-2002 13:08
    Company: Microsoft Corporation
    ———-
    This key's "Userinit" value calls the following program(s):
    Key value: [C:\WINDOWS\system32\userinit.exe,]
    File: C:\WINDOWS\system32\userinit.exe
    C:\WINDOWS\system32\userinit.exe
    33280 bytes
    Created: 9-9-2002 13:08
    Modified: 9-9-2002 13:08
    Company: Microsoft Corporation
    C:\WINDOWS\system32\userinit.exe - this userinit.exe file is either the wrong size, or has missing/incorrect version information
    C:\WINDOWS\system32\userinit.exe - cannot restore a good copy of this file
    ———-
    This key's "System" value appears to be blank
    ———-
    This key's "UIHost" value calls the following program:
    Key value: [logonui.exe]
    File: logonui.exe
    C:\WINDOWS\System32\logonui.exe
    548864 bytes
    Created: 9-9-2002 13:08
    Modified: 9-9-2002 13:08
    Company: Microsoft Corporation
    ———-
    ——————–
    Checking HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows
    ——————–
    Checking HKCU\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows
    ——————–
    Checking HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
    Value Name: TrojanScanner
    Value Data: g:\Program Files\Trojan Remover\Trjscan.exe /boot
    g:\Program Files\Trojan Remover\Trjscan.exe
    1206664 bytes
    Created: 22-4-2009 14:44
    Modified: 18-4-2009 18:45
    Company: Simply Super Software
    ——————–
    ——————–
    Checking HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce
    This Registry Key appears to be empty
    ——————–
    Checking HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunServices
    This Registry Key appears to be empty
    ——————–
    Checking HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunServicesOnce
    This Registry Key appears to be empty
    ——————–
    Checking HKCU\Software\Microsoft\Windows\CurrentVersion\Run
    This Registry Key appears to be empty
    ——————–
    Checking HKCU\Software\Microsoft\Windows\CurrentVersion\RunOnce
    This Registry Key appears to be empty
    ——————–
    Checking HKCU\Software\Microsoft\Windows\CurrentVersion\RunServices
    This Registry Key appears to be empty
    ——————–
    Checking HKCU\Software\Microsoft\Windows\CurrentVersion\RunServicesOnce
    This Registry Key appears to be empty
    ——————–
    Checking HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run
    This Registry Key appears to be empty

    ************************************************************
    15:03:00: Scanning —–SHELLEXECUTEHOOKS—–
    ValueName: {AEB6717E-7E19-11d0-97EE-00C04FD91972}
    File: shell32.dll - this file is expected and has been left in place
    ———-

    ************************************************************
    15:03:00: Scanning —–HIDDEN REGISTRY ENTRIES—–
    Taskdir check completed
    ———-
    No Hidden File-loading Registry Entries found
    ———-

    ************************************************************
    15:03:00: Scanning —–ACTIVE SCREENSAVER—–
    No active ScreenSaver found to scan.

    ************************************************************
    15:03:00: Scanning —– REGISTRY ACTIVE SETUP KEYS —–
    Key: {22d6f312-b0f6-11d0-94ab-0080c74c7e95}
    Path: rundll32.exe advpack.dll,LaunchINFSection C:\WINDOWS\INF\mplayer2.inf,PerUserStub.NT
    C:\WINDOWS\INF\mplayer2.inf
    37558 bytes
    Created: 7-9-2001 10:00
    Modified: 7-9-2001 10:00
    Company: [no info]
    ———-
    Key: {306D6C21-C1B6-4629-986C-E59E1875B8AF}
    Path: "C:\WINDOWS\System32\rundll32.exe" "C:\Program Files\Messenger\msgsc.dll",ShowIconsUser
    C:\WINDOWS\System32\rundll32.exe
    76288 bytes
    Created: 7-9-2001 10:00
    Modified: 7-9-2001 10:00
    Company: Microsoft Corporation
    ———-

    ************************************************************
    15:03:01: Scanning —– SERVICEDLL REGISTRY KEYS —–
    Key: BITS
    Path: %systemroot%\system32\qmgr.dll
    C:\WINDOWS\system32\qmgr.dll
    223232 bytes
    Created: 15-4-2009 18:15
    Modified: 9-9-2002 15:08
    Company: Microsoft Corporation
    ——————–
    Key: HidServ
    %SystemRoot%\System32\hidserv.dll - file is globally excluded (file cannot be found)
    ——————–
    Key: RpcSs
    Path: %SystemRoot%\System32\rpcss.dll
    C:\WINDOWS\System32\rpcss.dll
    260608 bytes
    Created: 9-9-2002 13:08
    Modified: 9-9-2002 13:08
    Company: Microsoft Corporation
    ——————–
    Key: WmdmPmSp
    Path: C:\WINDOWS\System32\mspmspsv.dll
    C:\WINDOWS\System32\mspmspsv.dll
    47104 bytes
    Created: 7-9-2001 10:00
    Modified: 7-9-2001 10:00
    Company: Microsoft Corporation
    ——————–
    Key: wuauserv
    Path: C:\WINDOWS\System32\wuauserv.dll
    C:\WINDOWS\System32\wuauserv.dll
    9216 bytes
    Created: 15-4-2009 18:13
    Modified: 9-9-2002 15:08
    Company: Microsoft Corporation
    ——————–

    ************************************************************
    15:03:03: Scanning —– SERVICES REGISTRY KEYS —–
    Key: apkf091
    ImagePath: \SystemRoot\System32\drivers\apkf091.sys
    C:\WINDOWS\System32\drivers\apkf091.sys - [file not found to scan]
    ———-
    Key: catchme
    ImagePath: \??\C:\ComboFix\catchme.sys - this file is globally excluded
    ———-
    Key: CnxEtP
    ImagePath: System32\DRIVERS\CnxEtP.sys
    C:\WINDOWS\System32\DRIVERS\CnxEtP.sys
    60288 bytes
    Created: 16-4-2009 23:48
    Modified: 16-4-2009 23:48
    Company: Conexant
    ———-
    Key: CnxEtU
    ImagePath: System32\DRIVERS\CnxEtU.sys
    C:\WINDOWS\System32\DRIVERS\CnxEtU.sys
    646400 bytes
    Created: 16-4-2009 23:48
    Modified: 16-4-2009 23:48
    Company: Conexant
    ———-
    Key: CnxTgN
    ImagePath: System32\DRIVERS\CnxTgN.sys
    C:\WINDOWS\System32\DRIVERS\CnxTgN.sys
    103622 bytes
    Created: 16-4-2009 23:48
    Modified: 16-4-2009 23:48
    Company: Conexant Systems Inc.
    ———-
    Key: hcr306d
    ImagePath: \SystemRoot\System32\drivers\hcr306d.sys
    C:\WINDOWS\System32\drivers\hcr306d.sys - [file not found to scan]
    ———-
    Key: iyqesms
    ImagePath: System32\drivers\rrjemkna.sys
    C:\WINDOWS\System32\drivers\rrjemkna.sys - [file not found to scan]
    ———-
    Key: Norman ZANDA
    ImagePath: "g:\VIRUSfighter\Bin\Zanda.exe"
    g:\VIRUSfighter\Bin\Zanda.exe - [file not found to scan]
    ———-
    Key: Secdrv
    ImagePath: System32\DRIVERS\secdrv.sys
    C:\WINDOWS\System32\DRIVERS\secdrv.sys - [file not found to scan]
    ———-
    Key: SwPrv
    ImagePath: C:\WINDOWS\System32\dllhost.exe /Processid:{52687FEC-8D71-4178-B5DC-D51CA0C6E816}
    C:\WINDOWS\System32\dllhost.exe
    147456 bytes
    Created: 7-9-2001 10:00
    Modified: 7-9-2001 10:00
    Company: Microsoft Corporation
    ———-
    Key: toj1b75
    ImagePath: \SystemRoot\System32\drivers\toj1b75.sys
    C:\WINDOWS\System32\drivers\toj1b75.sys - [file not found to scan]
    ———-
    Key: tojf054
    ImagePath: \SystemRoot\System32\drivers\tojf054.sys
    C:\WINDOWS\System32\drivers\tojf054.sys - [file not found to scan]
    ———-
    Key: trutil
    ImagePath: \??\C:\DOCUME~1\a\LOCALS~1\Temp\trutil.sys - this file is a Trojan Remover component
    ———-
    Key: viagfx
    ImagePath: System32\DRIVERS\vtmini.sys
    C:\WINDOWS\System32\DRIVERS\vtmini.sys
    -R- 265344 bytes
    Created: 16-4-2009 23:16
    Modified: 11-8-2003 8:09
    Company: Copyright (C) VIA/S3 Graphics, Inc.
    ———-

    ************************************************************
    15:03:05: Scanning —–VXD ENTRIES—–

    ************************************************************
    15:03:05: Scanning —– WINLOGON\NOTIFY DLLS —–

    ************************************************************
    15:03:05: Scanning —– CONTEXTMENUHANDLERS —–
    Key: ShellExtension
    CLSID: [empty]
    ———-
    Key: Trojan Remover
    CLSID: {52B87208-9CCF-42C9-B88E-069281105805}
    Path: g:\PROGRA~1\TROJAN~1\Trshlex.dll
    g:\PROGRA~1\TROJAN~1\Trshlex.dll
    467552 bytes
    Created: 22-4-2009 14:44
    Modified: 5-2-2007 20:26
    Company: Simply Super Software
    ———-

    ************************************************************
    15:03:05: Scanning —– FOLDER\COLUMNHANDLERS —–

    ************************************************************
    15:03:05: Scanning —– BROWSER HELPER OBJECTS —–
    No Browser Helper Objects found to scan

    ************************************************************
    15:03:05: Scanning —– SHELLSERVICEOBJECTS —–
    Key: WebCheck
    CLSID: {E6FB5E20-DE35-11CF-9C87-00AA005127ED}
    Path: %SystemRoot%\System32\webcheck.dll
    C:\WINDOWS\System32\webcheck.dll
    261120 bytes
    Created: 9-9-2002 13:08
    Modified: 9-9-2002 13:08
    Company: Microsoft Corporation
    ———-
    Key: SysTray
    CLSID: {35CEC8A3-2BE6-11D2-8773-92E220524153}
    Path: %systemroot%\system32\stobject.dll
    C:\WINDOWS\system32\stobject.dll
    118272 bytes
    Created: 9-9-2002 13:08
    Modified: 9-9-2002 13:08
    Company: Microsoft Corporation
    ———-

    ************************************************************
    15:03:06: Scanning —– SHAREDTASKSCHEDULER ENTRIES —–

    ************************************************************
    15:03:06: Scanning —– IMAGEFILE DEBUGGERS —–
    No "Debugger" entries found.

    ************************************************************
    15:03:06: Scanning —– APPINIT_DLLS —–
    The AppInit_DLLs value is blank or does not exist

    ************************************************************
    15:03:06: Scanning —– SECURITY PROVIDER DLLS —–

    ************************************************************
    15:03:06: Scanning —— COMMON STARTUP GROUP ——
    [C:\Documents and Settings\All Users\Menu Start\Programma's\Opstarten]
    The Common Startup Group attempts to load the following file(s) at boot time:
    C:\Documents and Settings\All Users\Menu Start\Programma's\Opstarten\desktop.ini
    -HS- 84 bytes
    Created: 15-4-2009 17:58
    Modified: 15-4-2009 18:19
    Company: [no info]
    C:\Documents and Settings\All Users\Menu Start\Programma's\Opstarten\desktop.ini - no action taken on this file
    ——————–

    ************************************************************
    No User Startup Groups were located to check

    ************************************************************
    15:03:06: Scanning —– SCHEDULED TASKS —–
    No Scheduled Tasks found to scan

    ************************************************************
    15:03:06: Scanning —– SHELLICONOVERLAYIDENTIFIERS —–

    ************************************************************
    15:03:06: Scanning —– DEVICE DRIVER ENTRIES —–

    ************************************************************
    15:03:07: —– ADDITIONAL CHECKS —–
    PE386 rootkit checks completed
    ———-
    Winlogon registry rootkit checks completed
    ———-
    Heuristic checks for hidden files/drivers completed
    ———-
    Layered Service Provider entries checks completed
    ———-
    Windows Explorer Policies checks completed
    ———-
    Desktop Wallpaper: C:\WINDOWS\web\wallpaper\Ierland.bmp
    C:\WINDOWS\web\wallpaper\Ierland.bmp
    1440054 bytes
    Created: 15-4-2009 18:17
    Modified: 15-4-2009 18:17
    Company: [no info]
    ———-
    Web Desktop Wallpaper: %SystemRoot%\web\wallpaper\Ierland.bmp
    C:\WINDOWS\web\wallpaper\Ierland.bmp
    1440054 bytes
    Created: 15-4-2009 18:17
    Modified: 15-4-2009 18:17
    Company: [no info]
    ———-
    Checks for rogue DNS NameServers completed
    ———-
    ———-
    Additional checks completed

    ************************************************************
    15:03:08: Scanning —– RUNNING PROCESSES —–

    C:\WINDOWS\System32\smss.exe
    45568 bytes
    Created: 9-9-2002 13:08
    Modified: 9-9-2002 13:08
    Company: Microsoft Corporation
    ——————–
    C:\WINDOWS\system32\csrss.exe
    4096 bytes
    Created: 7-9-2001 10:00
    Modified: 7-9-2001 10:00
    Company: Microsoft Corporation
    ——————–
    C:\WINDOWS\system32\winlogon.exe
    519168 bytes
    Created: 9-9-2002 13:08
    Modified: 9-9-2002 13:08
    Company: Microsoft Corporation
    ——————–
    C:\WINDOWS\system32\services.exe
    101888 bytes
    Created: 7-9-2001 10:00
    Modified: 7-9-2001 10:00
    Company: Microsoft Corporation
    ——————–
    C:\WINDOWS\system32\lsass.exe
    11776 bytes
    Created: 9-9-2002 13:08
    Modified: 9-9-2002 13:08
    Company: Microsoft Corporation
    ——————–
    C:\WINDOWS\system32\svchost.exe
    12800 bytes
    Created: 7-9-2001 10:00
    Modified: 7-9-2001 10:00
    Company: Microsoft Corporation
    ——————–
    C:\WINDOWS\System32\svchost.exe - file already scanned
    ——————–
    C:\WINDOWS\System32\svchost.exe - file already scanned
    ——————–
    C:\WINDOWS\Explorer.EXE - file already scanned
    ——————–
    C:\WINDOWS\System32\svchost.exe - file already scanned
    ——————–
    C:\WINDOWS\system32\spoolsv.exe
    62464 bytes
    Created: 7-9-2001 10:00
    Modified: 7-9-2001 10:00
    Company: Microsoft Corporation
    ——————–
    C:\WINDOWS\System32\alg.exe
    53248 bytes
    Created: 9-9-2002 13:08
    Modified: 9-9-2002 13:08
    Company: Microsoft Corporation
    ——————–
    C:\WINDOWS\dhcp\svchost.exe
    311808 bytes
    Created: 21-4-2009 22:45
    Modified: 21-4-2009 22:46
    Company: [no info]
    ——————–
    C:\WINDOWS\System32\dllhost.exe
    147456 bytes
    Created: 7-9-2001 10:00
    Modified: 7-9-2001 10:00
    Company: Microsoft Corporation
    ——————–
    C:\WINDOWS\System32\msdtc.exe
    50176 bytes
    Created: 15-4-2009 18:13
    Modified: 7-9-2001 12:00
    Company: Microsoft Corporation
    ——————–
    C:\Documents and Settings\a\Application Data\Simply Super Software\Trojan Remover\glo3.exe
    FileSize: 2937720
    [This is a Trojan Remover component]
    ——————–

    ************************************************************
    15:03:18: Checking HOSTS file
    No malicious entries were found in the HOSTS file

    ************************************************************
    === CHANGES WERE MADE TO THE WINDOWS REGISTRY ===
    === ONE OR MORE FILES WERE RENAMED OR REMOVED ===
    Scan completed at: 15:03:18 22 apr 2009
    Total Scan time: 00:04:45
    ————————————————————————-
    One or more files could not be moved or renamed as requested.
    They may be in use by Windows, so Trojan Remover needs
    to restart the system in order to deal with these files.
    22-4-2009 15:03:23: restart commenced
    ************************************************************
  • Ga naar Kaspersky Online Scanner
    Je hebt hier Java Runtime Environment voor nodig.
    Deze kun je hier downloaden.[/color:139ed8344e]

    [list:139ed8344e][*:139ed8344e]Druk op [b:139ed8344e]Accept[/b:139ed8344e] bij de disclaimer.
    [*:139ed8344e]Er wordt gevraagd om een Java-applet te starten, klik hier op [b:139ed8344e]Run[/b:139ed8344e].
    [*:139ed8344e][i:139ed8344e]Er worden nu programma-onderdelen geïnstalleerd op uw uw computer, en de database wordt geüpdated.[/i:139ed8344e]
    [*:139ed8344e]Klik nu onder "Scan" op [b:139ed8344e]My Computer[/b:139ed8344e].
    [*:139ed8344e]Klik op [b:139ed8344e]View scan report[/b:139ed8344e] (OF [b:139ed8344e]Scan Report[/b:139ed8344e] in het linkermenu) als de scan klaar is.
    [*:139ed8344e]Klik nu op [b:139ed8344e]Save Report As…[/b:139ed8344e]
    [*:139ed8344e]Sla het bestand op op je bureaublad, met als naam [b:139ed8344e]kavscan.txt[/b:139ed8344e].[/list:u:139ed8344e]

    Post de inhoud van dit logje in je volgende bericht
  • werkt helaas niet met deze XP ( sp1 ? )
    Kan ook helaas niet op Internet…
  • Nog div Trojanscanners laten lopen.
    500 besmette bestanden.

    Met moeite gerepareerd..
    Kom ik XP niet meer in "logonui.exe" probleem.

    Nieuwe instal, nog steeds foutmeldingen…
  • mogenlijk is er ook hardware stuk.

    Je kan ( en daar had ik het kaspersky log voor nodig) een file infector aan boord hebben, en dat betekent een format C omdat er geen remedie tegen is.
  • ja daar ben ik ook bang voor .
    Ook Kaspersky draait niet..

    Zal format c worden.
    heel jammer van de bestanden..

    dank voor het meedenken !
  • Je kunt de schijf eruit halen en inlezen in een andere pc. Met name de map "documents and settings" moet je kopiëren. De schijf kan als 2e schijf in een andere pc of je koopt een usb behuizing van 19 euro. Er zijn IDE versies en SATA versies.

    Daarna pas format c , dat gaat stukken sneller dan duizend trojans verwijderden.
  • Poging gedaan met de Acer Laptop, maar om bij die Hardisk te komen is weer een hele andere vorm van geduld nodig..
    Daar was geen tijd meer voor..

    In elk geval draait de datarecory software weer normaal, dus ik doe ( vermoedelijk tegen beter weten in) nog 1 poging.
  • De meeste hardeschijven in laptops zitten met 1 schroef vast. Maar, succes!

Beantwoord deze vraag

Dit is een gearchiveerde pagina. Antwoorden is niet meer mogelijk.