• بادئ الموضوع بادئ الموضوع CH3ST3R
  • تاريخ البدء تاريخ البدء
  • المشاهدات 1,415
الحالة
مغلق و غير مفتوح للمزيد من الردود.

CH3ST3R

زيزوومي نشيط
إنضم
29 مايو 2010
المشاركات
158
مستوى التفاعل
5
النقاط
200
الإقامة
Umbrella Cop.
غير متصل
السلام عليكم ورحمة الله وبركاته

منذ الأمس ظهر مستند نصي على سطح المكتب

فتحته فوجدت كلام (إنجليزي طبعا)

وكل اللي فهمته هو حدث انهيار
انا ما اعرف حدث تعارض بين البرامج او شيء ثاني

هذا الكلام الموجود في المستند

#
# A fatal error has been detected by the Java Runtime Environment:
#
# EXCEPTION_ACCESS_VIOLATION (0xc0000005) at pc=0x7c969af2, pid=212, tid=468
#
# JRE version: 6.0_29-b11
# Java VM: Java HotSpot(TM) Client VM (20.4-b02 mixed mode, sharing windows-x86 )
# Problematic frame:
# C [ntdll.dll+0x19af2]
#
# If you would like to submit a bug report, please visit:
#
يجب عليك تسجيل الدخول او تسجيل لمشاهدة الرابط المخفي

# The crash happened outside the Java Virtual Machine in native code.
# See problematic frame for where to report the bug.
#

--------------- T H R E A D ---------------

Current thread (0x032ba000): JavaThread "AWT-Windows" daemon [_thread_in_native, id=468, stack(0x00ab0000,0x00bb0000)]

siginfo: ExceptionCode=0xc0000005, writing address 0x00000010

Registers:
EAX=0x00000000, EBX=0x00000000, ECX=0x00001580, EDX=0x03318a10
ESP=0x00bafa50, EBP=0x00bafac4, ESI=0x03318a00, EDI=0x00000000
EIP=0x7c969af2, EFLAGS=0x00010246

Top of Stack: (sp=0x00bafa50)
0x00bafa50: 03318a00 033188d0 00000001 002e002c
0x00bafa60: 6d0c76d4 000104d8 0000982c 00bafa5c
0x00bafa70: 00000000 0000c025 00bafa48 00000000
0x00bafa80: 00bafb00 7c839ad8 7c830c98 ffffffff
0x00bafa90: 7c830c90 7c834ed8 6d062a8c 6d062b18
0x00bafaa0: 6d102d8c 6d102d6c 6d102d70 6d06426c
0x00bafab0: 77ced312 033188d0 77cd8b8c 00000000
0x00bafac0: 00001580 00bafb0c 7c951046 00318a00

Instructions: (pc=0x7c969af2)
0x7c969ad2: 9c 7c f6 d8 57 1b c0 f7 d0 25 e0 e1 9c 7c 8b f8
0x7c969ae2: 8b 46 10 3b c3 89 45 fc 0f 84 9e 00 00 00 8b 06
0x7c969af2: ff 40 10 8b 45 fc 83 e0 01 89 45 e8 8b 06 ff 40
0x7c969b02: 14 f6 05 f0 02 fe 7f 01 0f 85 16 9d 02 00 39 5d


Register to memory mapping:

EAX=0x00000000 is an unknown value
EBX=0x00000000 is an unknown value
ECX=0x00001580 is an unknown value
EDX=0x03318a10 is an unknown value
ESP=0x00bafa50 is pointing into the stack for thread: 0x032ba000
EBP=0x00bafac4 is pointing into the stack for thread: 0x032ba000
ESI=0x03318a00 is an unknown value
EDI=0x00000000 is an unknown value


Stack: [0x00ab0000,0x00bb0000], sp=0x00bafa50, free space=1022k
Native frames: (J=compiled Java code, j=interpreted, Vv=VM code, C=native code)
C [ntdll.dll+0x19af2] RtlpWaitForCriticalSection+0x5b
C [ntdll.dll+0x1046] RtlEnterCriticalSection+0x46
C [USER32.dll+0x8734] GetDC+0x6d
C [USER32.dll+0x8816] GetDC+0x14f
C [USER32.dll+0x89cd] GetWindowLongW+0x127
C [USER32.dll+0x8a10] DispatchMessageW+0xf

Java frames: (J=compiled Java code, j=interpreted, Vv=VM code)
j sun.awt.windows.WToolkit.eventLoop()V+0
j sun.awt.windows.WToolkit.run()V+52
v ~StubRoutines::call_stub

--------------- P R O C E S S ---------------

Java Threads: ( => current thread )
0x03498400 JavaThread "Thread-3" daemon [_thread_in_native, id=4288, stack(0x03730000,0x03780000)]
0x03336c00 JavaThread "Thread-13" [_thread_blocked, id=4220, stack(0x03c20000,0x03c70000)]
0x032d2c00 JavaThread "Timer-2" [_thread_blocked, id=4212, stack(0x037d0000,0x03820000)]
0x03319400 JavaThread "thread applet-doook.DoookNetApplet-1" [_thread_blocked, id=1276, stack(0x039d0000,0x03a20000)]
0x03307400 JavaThread "JVM[id=0]-Heartbeat" daemon [_thread_blocked, id=3648, stack(0x03a20000,0x03a70000)]
0x03304000 JavaThread "Browser Side Object Cleanup Thread" [_thread_blocked, id=2792, stack(0x03980000,0x039d0000)]
0x032f6400 JavaThread "CacheCleanUpThread" daemon [_thread_blocked, id=808, stack(0x03870000,0x038c0000)]
0x032d9000 JavaThread "CacheMemoryCleanUpThread" daemon [_thread_blocked, id=3716, stack(0x03820000,0x03870000)]
0x02e98000 JavaThread "SysExecutionTheadCreator" daemon [_thread_blocked, id=3192, stack(0x03590000,0x035e0000)]
0x032cec00 JavaThread "AWT-EventQueue-0" [_thread_blocked, id=3136, stack(0x03780000,0x037d0000)]
=>0x032ba000 JavaThread "AWT-Windows" daemon [_thread_in_native, id=468, stack(0x00ab0000,0x00bb0000)]
0x02e9f800 JavaThread "AWT-Shutdown" [_thread_blocked, id=3860, stack(0x03680000,0x036d0000)]
0x02e9e400 JavaThread "Java2D Disposer" daemon [_thread_blocked, id=2968, stack(0x03630000,0x03680000)]
0x032c9c00 JavaThread "Java Plug-In Pipe Worker Thread (Client-Side)" daemon [_thread_in_native, id=1052, stack(0x035e0000,0x03630000)]
0x02e97400 JavaThread "Timer-0" [_thread_blocked, id=4080, stack(0x03540000,0x03590000)]
0x032bd800 JavaThread "traceMsgQueueThread" daemon [_thread_blocked, id=2544, stack(0x034b0000,0x03500000)]
0x02e09c00 JavaThread "Low Memory Detector" daemon [_thread_blocked, id=192, stack(0x03080000,0x030d0000)]
0x02e03c00 JavaThread "C1 CompilerThread0" daemon [_thread_blocked, id=1172, stack(0x03030000,0x03080000)]
0x02e02400 JavaThread "Attach Listener" daemon [_thread_blocked, id=3700, stack(0x02fe0000,0x03030000)]
0x02e0c400 JavaThread "Signal Dispatcher" daemon [_thread_blocked, id=3788, stack(0x02f90000,0x02fe0000)]
0x02df9400 JavaThread "Finalizer" daemon [_thread_blocked, id=2616, stack(0x02f40000,0x02f90000)]
0x02df7c00 JavaThread "Reference Handler" daemon [_thread_blocked, id=2580, stack(0x02ef0000,0x02f40000)]
0x009b8000 JavaThread "main" [_thread_in_native, id=2916, stack(0x00a40000,0x00a90000)]

Other Threads:
0x02dbbc00 VMThread [stack: 0x02ea0000,0x02ef0000] [id=1572]
0x02e1a800 WatcherThread [stack: 0x030d0000,0x03120000] [id=1424]

VM state:not at safepoint (normal execution)

VM Mutex/Monitor currently owned by a thread: None

Heap
def new generation total 5760K, used 97K [0x229f0000, 0x23020000, 0x253f0000)
eden space 5184K, 1% used [0x229f0000, 0x22a08508, 0x22f00000)
from space 576K, 0% used [0x22f00000, 0x22f00000, 0x22f90000)
to space 576K, 0% used [0x22f90000, 0x22f90000, 0x23020000)
tenured generation total 12488K, used 7491K [0x253f0000, 0x26022000, 0x2a7f0000)
the space 12488K, 59% used [0x253f0000, 0x25b40c60, 0x25b40e00, 0x26022000)
compacting perm gen total 12288K, used 3790K [0x2a7f0000, 0x2b3f0000, 0x2e7f0000)
the space 12288K, 30% used [0x2a7f0000, 0x2aba3b28, 0x2aba3c00, 0x2b3f0000)
ro space 10240K, 51% used [0x2e7f0000, 0x2ed1d0b8, 0x2ed1d200, 0x2f1f0000)
rw space 12288K, 54% used [0x2f1f0000, 0x2f889570, 0x2f889600, 0x2fdf0000)

Code Cache [0x00c30000, 0x00d38000, 0x02c30000)
total_blobs=524 nmethods=298 adapters=162 free_code_cache=32502592 largest_free_block=0

Dynamic libraries:
0x00400000 - 0x00424000 C:\Program Files\Java\jre6\bin\java.exe
0x7c950000 - 0x7c9fd000 C:\WINDOWS\system32\ntdll.dll
0x7c800000 - 0x7c950000 C:\WINDOWS\system32\kernel32.dll
0x77f50000 - 0x77ffb000 C:\WINDOWS\system32\ADVAPI32.dll
0x77d60000 - 0x77df3000 C:\WINDOWS\system32\RPCRT4.dll
0x77ed0000 - 0x77ee1000 C:\WINDOWS\system32\Secur32.dll
0x5cff0000 - 0x5d016000 C:\WINDOWS\system32\ShimEng.dll
0x715c0000 - 0x71639000 C:\WINDOWS\AppPatch\AcLayers.DLL
0x77cd0000 - 0x77d60000 C:\WINDOWS\system32\USER32.dll
0x77e00000 - 0x77e49000 C:\WINDOWS\system32\GDI32.dll
0x7ca00000 - 0x7d213000 C:\WINDOWS\system32\SHELL32.dll
0x77ba0000 - 0x77bf8000 C:\WINDOWS\system32\msvcrt.dll
0x77e50000 - 0x77ec6000 C:\WINDOWS\system32\SHLWAPI.dll
0x77470000 - 0x775ae000 C:\WINDOWS\system32\ole32.dll
0x76930000 - 0x769e4000 C:\WINDOWS\system32\USERENV.dll
0x72f50000 - 0x72f76000 C:\WINDOWS\system32\WINSPOOL.DRV
0x762e0000 - 0x762fd000 C:\WINDOWS\system32\IMM32.DLL
0x62eb0000 - 0x62eb9000 C:\WINDOWS\system32\LPK.DLL
0x74cd0000 - 0x74d3b000 C:\WINDOWS\system32\USP10.dll
0x10000000 - 0x1004d000 C:\WINDOWS\system32\guard32.dll
0x77b90000 - 0x77b98000 C:\WINDOWS\system32\VERSION.dll
0x003a0000 - 0x003a8000 C:\WINDOWS\system32\fltlib.dll
0x77360000 - 0x77463000 C:\WINDOWS\WinSxS\x86_Microsoft.Windows.Common-Controls_6595b64144ccf1df_6.0.2600.6028_x-ww_61e65202\comctl32.dll
0x7c340000 - 0x7c396000 C:\Program Files\Java\jre6\bin\msvcr71.dll
0x6d7f0000 - 0x6da9f000 C:\Program Files\Java\jre6\bin\client\jvm.dll
0x76ab0000 - 0x76add000 C:\WINDOWS\system32\WINMM.dll
0x6d7a0000 - 0x6d7ac000 C:\Program Files\Java\jre6\bin\verify.dll
0x6d320000 - 0x6d33f000 C:\Program Files\Java\jre6\bin\java.dll
0x6d000000 - 0x6d14c000 C:\Program Files\Java\jre6\bin\awt.dll
0x5b1f0000 - 0x5b228000 C:\WINDOWS\system32\uxtheme.dll
0x6d7e0000 - 0x6d7ef000 C:\Program Files\Java\jre6\bin\zip.dll
0x6d420000 - 0x6d426000 C:\Program Files\Java\jre6\bin\jp2native.dll
0x6d1d0000 - 0x6d1e3000 C:\Program Files\Java\jre6\bin\deploy.dll
0x779e0000 - 0x77a75000 C:\WINDOWS\system32\CRYPT32.dll
0x77a80000 - 0x77a92000 C:\WINDOWS\system32\MSASN1.dll
0x770b0000 - 0x7713b000 C:\WINDOWS\system32\OLEAUT32.dll
0x3f310000 - 0x3f3f6000 C:\WINDOWS\system32\WININET.dll
0x03120000 - 0x03129000 C:\WINDOWS\system32\Normaliz.dll
0x44c90000 - 0x44dc3000 C:\WINDOWS\system32\urlmon.dll
0x3f9b0000 - 0x3fb9b000 C:\WINDOWS\system32\iertutil.dll
0x6d6a0000 - 0x6d6e6000 C:\Program Files\Java\jre6\bin\regutils.dll
0x6d600000 - 0x6d613000 C:\Program Files\Java\jre6\bin\net.dll
0x719f0000 - 0x71a07000 C:\WINDOWS\system32\WS2_32.dll
0x719e0000 - 0x719e8000 C:\WINDOWS\system32\WS2HELP.dll
0x6d620000 - 0x6d629000 C:\Program Files\Java\jre6\bin\nio.dll
0x74660000 - 0x746ac000 C:\WINDOWS\system32\MSCTF.dll
0x771e0000 - 0x77202000 C:\WINDOWS\system32\apphelp.dll
0x753e0000 - 0x7540e000 C:\WINDOWS\system32\msctfime.ime
0x6d230000 - 0x6d27f000 C:\Program Files\Java\jre6\bin\fontmanager.dll
0x71990000 - 0x719cf000 C:\WINDOWS\System32\mswsock.dll
0x76eb0000 - 0x76ed7000 C:\WINDOWS\system32\DNSAPI.dll
0x76cf0000 - 0x76d09000 C:\WINDOWS\system32\iphlpapi.dll
0x76f40000 - 0x76f48000 C:\WINDOWS\System32\winrnr.dll
0x76ef0000 - 0x76f1c000 C:\WINDOWS\system32\WLDAP32.dll
0x76f50000 - 0x76f56000 C:\WINDOWS\system32\rasadhlp.dll
0x6d1a0000 - 0x6d1c3000 C:\Program Files\Java\jre6\bin\dcpr.dll
0x69830000 - 0x69887000 C:\WINDOWS\system32\hnetcfg.dll
0x719d0000 - 0x719d8000 C:\WINDOWS\System32\wshtcpip.dll
0x68000000 - 0x68036000 C:\WINDOWS\system32\rsaenh.dll
0x59550000 - 0x595a5000 C:\WINDOWS\system32\netapi32.dll
0x76b60000 - 0x76b6b000 C:\WINDOWS\system32\PSAPI.DLL

VM Arguments:
jvm_args: -D__jvm_launched=1046026738 -Xbootclasspath/a:C:\PROGRA~1\Java\jre6\lib\deploy.jar;C:\PROGRA~1\Java\jre6\lib\javaws.jar;C:\PROGRA~1\Java\jre6\lib\plugin.jar -Dsun.awt.warmup=true
java_command: sun.plugin2.main.client.PluginMain write_pipe_name=jpi2_pid3508_pipe3,read_pipe_name=jpi2_pid3508_pipe2
Launcher Type: SUN_STANDARD

Environment Variables:
PATH=C:\Program Files\Internet Explorer;;C:\WINDOWS\system32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
USERNAME=Saleem Bukhari
OS=Windows_NT
PROCESSOR_IDENTIFIER=x86 Family 6 Model 28 Stepping 2, GenuineIntel



--------------- S Y S T E M ---------------

OS: Windows XP Build 2600 Service Pack 3

CPU:total 2 (1 cores per cpu, 2 threads per core) family 6 model 28 stepping 2, cmov, cx8, fxsr, mmx, sse, sse2, sse3, ssse3, ht

Memory: 4k page, physical 513868k(56712k free), swap 1256424k(402644k free)

vm_info: Java HotSpot(TM) Client VM (20.4-b02) for windows-x86 JRE (1.6.0_29-b11), built on Oct 3 2011 01:01:08 by "java_re" with MS VC++ 7.1 (VS2003)

time: Sun Feb 05 01:17:00 2012
elapsed time: 117 seconds


وشكرا لكم مقدما
 

توقيع : CH3ST3R
حمل الاداة من هذا الموضوع

يجب عليك تسجيل الدخول او تسجيل لمشاهدة الرابط المخفي


واعمل تقرير هايجاك

------------------

3b3ce221851b60a78bfa55cbd704e323.jpg
 
توقيع : format
تقرير الهايجاك

Logfile of Trend Micro HijackThis v2.0.4
Scan saved at 03:06:23 م, on 05/02/2012
Platform: Windows XP SP3 (WinNT 5.01.2600)
MSIE: Internet Explorer v8.00 (8.00.6001.18702)
Boot mode: Normal

Running processes:
C:\WINDOWS\System32\smss.exe
C:\PROGRA~1\AVG\AVG2012\avgrsx.exe
C:\Program Files\AVG\AVG2012\avgcsrvx.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\Program Files\COMODO\COMODO Internet Security\cmdagent.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\Explorer.EXE
C:\Program Files\SUPERAntiSpyware\SASCORE.EXE
C:\Program Files\AVG\AVG2012\avgwdsvc.exe
C:\Program Files\Hotspot Shield\bin\openvpnas.exe
C:\Program Files\Hotspot Shield\HssWPR\hsssrv.exe
C:\Program Files\Hotspot Shield\bin\hsswd.exe
C:\Program Files\Java\jre6\bin\jqs.exe
C:\WINDOWS\System32\svchost.exe
C:\Program Files\AVG\AVG2012\avgnsx.exe
C:\Program Files\AVG\AVG2012\avgemcx.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\svchost.exe
C:\Program Files\AVG\AVG2012\AVGIDSAgent.exe
C:\WINDOWS\system32\igfxtray.exe
C:\WINDOWS\system32\hkcmd.exe
C:\WINDOWS\system32\igfxsrvc.exe
C:\WINDOWS\system32\igfxpers.exe
C:\WINDOWS\RTHDCPL.EXE
C:\program files\Real\realplayer\update\realsched.exe
C:\Program Files\AVG\AVG2012\avgtray.exe
C:\Program Files\COMODO\COMODO Internet Security\cfp.exe
C:\WINDOWS\system32\ctfmon.exe
C:\WINDOWS\System32\svchost.exe
C:\Zyzoom_Forum_Tools\zyzoom.exe
C:\Zyzoom_Forum_Tools\zHijak.com

R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL =
يجب عليك تسجيل الدخول او تسجيل لمشاهدة الرابط المخفي

R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL =
يجب عليك تسجيل الدخول او تسجيل لمشاهدة الرابط المخفي

R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page =
يجب عليك تسجيل الدخول او تسجيل لمشاهدة الرابط المخفي

R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page =
يجب عليك تسجيل الدخول او تسجيل لمشاهدة الرابط المخفي

R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Local Page =
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Local Page =
O2 - BHO: btorbit.com - {000123B4-9B42-4900-B3F7-F4B073EFC214} - C:\Program Files\Orbitdownloader\orbitcth.dll
O2 - BHO: RealPlayer Download and Record Plugin for Internet Explorer - {3049C3E9-B461-4BC5-8870-4C09146192CA} - C:\Documents and Settings\All Users\Application Data\Real\RealPlayer\BrowserRecordPlugin\IE\rpbrowserrecordplugin.dll
O2 - BHO: WormRadar.com IESiteBlocker.NavFilter - {3CA2F312-6F6E-4B53-A66E-4E65E497C8C0} - C:\Program Files\AVG\AVG2012\avgssie.dll
O2 - BHO: (no name) - {8E5E2654-AD2D-48bf-AC2D-D17F00898D06} - (no file)
O2 - BHO: مساعد تسجيل الدخول إلى Windows Live - {9030D464-4C02-4ABF-8ECC-5164760863C6} - C:\Program Files\Common Files\Microsoft Shared\Windows Live\WindowsLiveLogin.dll
O2 - BHO: Java(tm) Plug-In 2 SSV Helper - {DBC80044-A445-435b-BC74-9C25C1C588A9} - C:\Program Files\Java\jre6\bin\jp2ssv.dll
O2 - BHO: JQSIEStartDetectorImpl - {E7E6F031-17CE-4C07-BC86-EABFE594F69C} - C:\Program Files\Java\jre6\lib\deploy\jqs\ie\jqs_plugin.dll
O2 - BHO: Hotspot Shield Class - {F9E4A054-E9B1-4BC3-83A3-76A1AE736170} - C:\Program Files\Hotspot Shield\HssIE\HssIE.dll
O3 - Toolbar: Grab Pro - {C55BBCD6-41AD-48AD-9953-3609C48EACC7} - C:\Program Files\Orbitdownloader\GrabPro.dll
O3 - Toolbar: (no name) - {8E5E2654-AD2D-48bf-AC2D-D17F00898D06} - (no file)
O4 - HKLM\..\Run: [IgfxTray] C:\WINDOWS\system32\igfxtray.exe
O4 - HKLM\..\Run: [HotKeysCmds] C:\WINDOWS\system32\hkcmd.exe
O4 - HKLM\..\Run: [Persistence] C:\WINDOWS\system32\igfxpers.exe
O4 - HKLM\..\Run: [RTHDCPL] RTHDCPL.EXE
O4 - HKLM\..\Run: [Alcmtr] ALCMTR.EXE
O4 - HKLM\..\Run: [TkBellExe] "C:\program files\Real\realplayer\update\realsched.exe" -osboot
O4 - HKLM\..\Run: [AVG_TRAY] "C:\Program Files\AVG\AVG2012\avgtray.exe"
O4 - HKLM\..\Run: [COMODO Internet Security] "C:\Program Files\COMODO\COMODO Internet Security\cfp.exe" -h
O4 - HKCU\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\ctfmon.exe
O4 - HKCU\..\Run: [Google Update] "C:\Documents and Settings\Saleem Bukhari\Local Settings\Application Data\Google\Update\GoogleUpdate.exe" /c
O4 - HKUS\S-1-5-19\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'LOCAL SERVICE')
O4 - HKUS\S-1-5-20\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'NETWORK SERVICE')
O4 - HKUS\S-1-5-18\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'SYSTEM')
O4 - HKUS\.DEFAULT\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'Default user')
O8 - Extra context menu item: &Download by Orbit - res://C:\Program Files\Orbitdownloader\orbitmxt.dll/201
O8 - Extra context menu item: &Grab video by Orbit - res://C:\Program Files\Orbitdownloader\orbitmxt.dll/204
O8 - Extra context menu item: &تصدير إلى Microsoft Excel - res://C:\PROGRA~1\MICROS~2\OFFICE11\EXCEL.EXE/3000
O8 - Extra context menu item: Do&wnload selected by Orbit - res://C:\Program Files\Orbitdownloader\orbitmxt.dll/203
O8 - Extra context menu item: Down&load all by Orbit - res://C:\Program Files\Orbitdownloader\orbitmxt.dll/202
O9 - Extra button: بحث - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~2\OFFICE11\REFIEBAR.DLL
O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O18 - Protocol: linkscanner - {F274614C-63F8-47D5-A4D1-FBDDE494F8D1} - C:\Program Files\AVG\AVG2012\avgpp.dll
O20 - AppInit_DLLs: C:\WINDOWS\system32\guard32.dll
O20 - Winlogon Notify: !SASWinLogon - C:\Program Files\SUPERAntiSpyware\SASWINLO.DLL
O22 - SharedTaskScheduler: Browseui preloader - {438755C2-A8BA-11D1-B96B-00A0C90312E1} - C:\WINDOWS\system32\browseui.dll
O22 - SharedTaskScheduler: البرنامج الخفي لذاكرة التخزين المؤقت لفئات المكونات - {8C7461EF-2B13-11d2-BE35-3078302C2030} - C:\WINDOWS\system32\browseui.dll
O23 - Service: SAS Core Service (!SASCORE) - SUPERAntiSpyware.com - C:\Program Files\SUPERAntiSpyware\SASCORE.EXE
O23 - Service: AVGIDSAgent - AVG Technologies CZ, s.r.o. - C:\Program Files\AVG\AVG2012\AVGIDSAgent.exe
O23 - Service: AVG WatchDog (avgwd) - AVG Technologies CZ, s.r.o. - C:\Program Files\AVG\AVG2012\avgwdsvc.exe
O23 - Service: COMODO Internet Security Helper Service (cmdAgent) - COMODO - C:\Program Files\COMODO\COMODO Internet Security\cmdagent.exe
O23 - Service: Hotspot Shield Service (hshld) - Unknown owner - C:\Program Files\Hotspot Shield\bin\openvpnas.exe
O23 - Service: Hotspot Shield Routing Service (HssSrv) - AnchorFree Inc. - C:\Program Files\Hotspot Shield\HssWPR\hsssrv.exe
O23 - Service: Hotspot Shield Tray Service (HssTrayService) - Unknown owner - C:\Program Files\Hotspot Shield\bin\HssTrayService.EXE
O23 - Service: Hotspot Shield Monitoring Service (HssWd) - Unknown owner - C:\Program Files\Hotspot Shield\bin\hsswd.exe
O23 - Service: Java Quick Starter (JavaQuickStarterService) - Sun Microsystems, Inc. - C:\Program Files\Java\jre6\bin\jqs.exe

--
End of file - 7406 bytes

 
توقيع : CH3ST3R
حمل الاداة التالية وطبق الشرح للفحص

يجب عليك تسجيل الدخول او تسجيل لمشاهدة الرابط المخفي


شرح الاستخدام ,,,,,,
قم بتشغيل الملف SmitfraudFix.exe ,, وتابع الشرح كماا بهذه الصور

3f7cd4c7c175f0cb43be958123a8084d.png


683cff01a1c397e204f951dac600cd62.png


735ee6c13608ec1741b096d2a506b0ef.png


c8d8aa32dcb91176fd4d7d5012d42957.png


491008fe652b22485eb5015e3df47852.png


61129989873864c279dcd7dc95b9cd3e.png

 
توقيع : format
التقرير

SmitFraudFix v2.424

Scan done at 15:20:40.01, Sun 02/05/2012
Run from C:\downloads\SmitfraudFix
OS: Microsoft Windows XP [Version 5.1.2600] - Windows_NT
The filesystem type is NTFS
Fix run in normal mode

»»»»»»»»»»»»»»»»»»»»»»»» SharedTaskScheduler Before SmitFraudFix
!!!Attention, following keys are not inevitably infected!!!

SrchSTS.exe by S!Ri
Search SharedTaskScheduler's .dll

»»»»»»»»»»»»»»»»»»»»»»»» Killing process


»»»»»»»»»»»»»»»»»»»»»»»» hosts


127.0.0.1 localhost

»»»»»»»»»»»»»»»»»»»»»»»» VACFix

VACFix
Credits: Malware Analysis & Diagnostic
Code: S!Ri


»»»»»»»»»»»»»»»»»»»»»»»» Winsock2 Fix

S!Ri's WS2Fix: LSP not Found.


»»»»»»»»»»»»»»»»»»»»»»»» Generic Renos Fix

GenericRenosFix by S!Ri


»»»»»»»»»»»»»»»»»»»»»»»» Deleting infected files


»»»»»»»»»»»»»»»»»»»»»»»» IEDFix

IEDFix
Credits: Malware Analysis & Diagnostic
Code: S!Ri



»»»»»»»»»»»»»»»»»»»»»»»» Agent.OMZ.Fix

Agent.OMZ.Fix
Credits: Malware Analysis & Diagnostic
Code: S!Ri


»»»»»»»»»»»»»»»»»»»»»»»» 404Fix

404Fix
Credits: Malware Analysis & Diagnostic
Code: S!Ri


»»»»»»»»»»»»»»»»»»»»»»»» RK


»»»»»»»»»»»»»»»»»»»»»»»» DNS

Description: Realtek RTL8187 Wireless 802.11g 54Mbps USB 2.0 Network Adapter - منفذ مصغر لجدولة الحزم
DNS Server Search Order: 192.168.1.1

HKLM\SYSTEM\CCS\Services\Tcpip\..\{E32E3959-C1EF-4CA5-8A14-6ECA62230423}: DhcpNameServer=192.168.1.1
HKLM\SYSTEM\CS1\Services\Tcpip\..\{E32E3959-C1EF-4CA5-8A14-6ECA62230423}: DhcpNameServer=192.168.1.1
HKLM\SYSTEM\CS2\Services\Tcpip\..\{E32E3959-C1EF-4CA5-8A14-6ECA62230423}: DhcpNameServer=192.168.1.1
HKLM\SYSTEM\CCS\Services\Tcpip\Parameters: DhcpNameServer=192.168.1.1
HKLM\SYSTEM\CS1\Services\Tcpip\Parameters: DhcpNameServer=192.168.1.1
HKLM\SYSTEM\CS2\Services\Tcpip\Parameters: DhcpNameServer=192.168.1.1


»»»»»»»»»»»»»»»»»»»»»»»» Deleting Temp Files


»»»»»»»»»»»»»»»»»»»»»»»» Winlogon.System
!!!Attention, following keys are not inevitably infected!!!

"System"=""


»»»»»»»»»»»»»»»»»»»»»»»» RK.2



»»»»»»»»»»»»»»»»»»»»»»»» Registry Cleaning

Registry Cleaning done.

»»»»»»»»»»»»»»»»»»»»»»»» SharedTaskScheduler After SmitFraudFix
!!!Attention, following keys are not inevitably infected!!!

SrchSTS.exe by S!Ri
Search SharedTaskScheduler's .dll


»»»»»»»»»»»»»»»»»»»»»»»» End


 
توقيع : CH3ST3R
اصلاح جافا xp

حمل الاداة التالية

يجب عليك تسجيل الدخول او تسجيل لمشاهدة الرابط المخفي


شغلها ،، انتظر حتى تخرج رسالة تطلب اعادة تشغيل الجهاز ،، اضغط موافق واعد التشغيل
 
توقيع : format
طيب يا اخي الفاضل عملتها...ايش اسوي ثاني
 
توقيع : CH3ST3R
هل الجافا معطل لحتى الان؟؟
 
توقيع : format
يعطيك العافية اخي...الحمدلله اشتغل...ارجو الاغلاق
 
توقيع : CH3ST3R
الحالة
مغلق و غير مفتوح للمزيد من الردود.
عودة
أعلى