• بادئ الموضوع بادئ الموضوع asdco2
  • تاريخ البدء تاريخ البدء
  • المشاهدات 2,082

asdco2

زيزوومي جديد
إنضم
4 يوليو 2011
المشاركات
87
مستوى التفاعل
0
النقاط
80
غير متصل
بسم الله الرحمان الرحيم
السلام عليكم ورحمة الله وبركتة

اما بعد من غير ما اطول عليكوم
المشكله بختصار بسيط ان انا شكك ان النسخه او الجهاز بتاعي
مخترق لانه فيه بعض البرنامج بتتحذف لوحده ودة الي خلانا اشك
ولا كمان شكك ان الانتي فيروس عندي بيهيس

الانتي فيروس عندي هوااااا

كاسبر " سكيورتي 2012 "

ودة تقرير

يجب عليك تسجيل الدخول او تسجيل لمشاهدة الرابط المخفي


Logfile of Trend Micro HijackThis v2.0.4
Scan saved at 08:41:56 ص, on 07/01/2011
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)
Boot mode: Normal

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\nvsvc32.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\RTHDCPL.EXE
C:\WINDOWS\system32\RUNDLL32.EXE
C:\Program Files\Kaspersky Lab\Kaspersky Internet Security 2012\avp.exe
C:\Program Files\Real\RealPlayer\update\realsched.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\Windows Live\Messenger\msnmsgr.exe
C:\AppServ\Apache\Apache.exe
C:\Program Files\Kaspersky Lab\Kaspersky Internet Security 2012\avp.exe
C:\Program Files\Bonjour\mDNSResponder.exe
C:\Program Files\Hotspot Shield\bin\openvpnas.exe
C:\AppServ\Apache\Apache.exe
C:\Program Files\Hotspot Shield\HssWPR\hsssrv.exe
C:\Program Files\Hotspot Shield\bin\hsswd.exe
C:\AppServ\mysql\bin\mysqld-nt.exe
C:\WINDOWS\system32\wscntfy.exe
C:\Program Files\Yahoo!\Messenger\ymsgr_tray.exe
C:\Program Files\Hotspot Shield\bin\openvpntray.exe
C:\WINDOWS\system32\svchost.exe
C:\Documents and Settings\All Users\Application Data\Mozilla Firefox\firefox.exe
C:\Documents and Settings\All Users\Application Data\Mozilla Firefox\plugin-container.exe
C:\AppServ\mysql\bin\winmysqladmin.exe
C:\Documents and Settings\All Users\Application Data\Mozilla Firefox\plugin-container.exe
C:\Zyzoom_Forum_Tools\zyzoom.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Program Files\Kaspersky Lab\Kaspersky Internet Security 2012\klwtblfs.exe
C:\Zyzoom_Forum_Tools\zHijak.com

R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page =
يجب عليك تسجيل الدخول او تسجيل لمشاهدة الرابط المخفي

R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyOverride = *.local
O2 - BHO: RealPlayer Download and Record Plugin for Internet Explorer - {3049C3E9-B461-4BC5-8870-4C09146192CA} - C:\Documents and Settings\All Users\Application Data\Real\RealPlayer\BrowserRecordPlugin\IE\rpbrowserrecordplugin.dll
O2 - BHO: IEVkbdBHO - {59273AB4-E7D3-40F9-A1A8-6FA9CCA1862C} - C:\Program Files\Kaspersky Lab\Kaspersky Internet Security 2012\ievkbd.dll
O2 - BHO: مساعد تسجيل الدخول إلى Windows Live - {9030D464-4C02-4ABF-8ECC-5164760863C6} - C:\Program Files\Common Files\Microsoft Shared\Windows Live\WindowsLiveLogin.dll
O2 - BHO: link filter bho - {E33CF602-D945-461A-83F0-819F76A199F8} - C:\Program Files\Kaspersky Lab\Kaspersky Internet Security 2012\klwtbbho.dll
O2 - BHO: Hotspot Shield Class - {F9E4A054-E9B1-4BC3-83A3-76A1AE736170} - C:\Program Files\Hotspot Shield\HssIE\HssIE.dll
O4 - HKLM\..\Run: [RTHDCPL] RTHDCPL.EXE
O4 - HKLM\..\Run: [Alcmtr] ALCMTR.EXE
O4 - HKLM\..\Run: [NvMediaCenter] RUNDLL32.EXE C:\WINDOWS\system32\NvMcTray.dll,NvTaskbarInit
O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE C:\WINDOWS\system32\NvCpl.dll,NvStartup
O4 - HKLM\..\Run: [IMJPMIG8.1] "C:\WINDOWS\IME\imjp8_1\IMJPMIG.EXE" /Spoil /RemAdvDef /Migration32
O4 - HKLM\..\Run: [MSPY2002] C:\WINDOWS\system32\IME\PINTLGNT\ImScInst.exe /SYNC
O4 - HKLM\..\Run: [PHIME2002ASync] C:\WINDOWS\system32\IME\TINTLGNT\TINTSETP.EXE /SYNC
O4 - HKLM\..\Run: [PHIME2002A] C:\WINDOWS\system32\IME\TINTLGNT\TINTSETP.EXE /IMEName
O4 - HKLM\..\Run: [AVP] "C:\Program Files\Kaspersky Lab\Kaspersky Internet Security 2012\avp.exe"
O4 - HKLM\..\Run: [TkBellExe] "C:\Program Files\Real\RealPlayer\update\realsched.exe" -osboot
O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
O4 - HKCU\..\Run: [Messenger (Yahoo!)] "C:\Program Files\Yahoo!\Messenger\YahooMessenger.exe" -quiet
O4 - HKCU\..\Run: [msnmsgr] "C:\Program Files\Windows Live\Messenger\msnmsgr.exe" /background
O4 - HKUS\S-1-5-18\..\Run: [ctfmon.exe] C:\WINDOWS\system32\CTFMON.EXE (User 'SYSTEM')
O4 - HKUS\.DEFAULT\..\Run: [ctfmon.exe] C:\WINDOWS\system32\CTFMON.EXE (User 'Default user')
O4 - Global Startup: Microsoft Office.lnk = C:\Program Files\Microsoft Office\Office10\OSA.EXE
O8 - Extra context menu item: &تصدير إلى Microsoft Excel - res://C:\PROGRA~1\MICROS~2\Office10\EXCEL.EXE/3000
O8 - Extra context menu item: Ajouter à l'Anti-bannière - C:\Program Files\Kaspersky Lab\Kaspersky Internet Security 2012\ie_banner_deny.htm
O9 - Extra button: Clavier &virtuel - {4248FE82-7FCB-46AC-B270-339F08212110} - C:\Program Files\Kaspersky Lab\Kaspersky Internet Security 2012\ievkbd.dll
O9 - Extra button: Analyse des &liens - {CCF151D8-D089-449F-A5A4-D9909053F20F} - C:\Program Files\Kaspersky Lab\Kaspersky Internet Security 2012\klwtbbho.dll
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O17 - HKLM\System\CCS\Services\Tcpip\..\{9C4C66BF-51AF-48E1-AE0B-461D2450C728}: NameServer = 10.81.32.1
O22 - SharedTaskScheduler: Browseui preloader - {438755C2-A8BA-11D1-B96B-00A0C90312E1} - C:\WINDOWS\system32\browseui.dll
O22 - SharedTaskScheduler: Component Categories cache daemon - {8C7461EF-2B13-11d2-BE35-3078302C2030} - C:\WINDOWS\system32\browseui.dll
O23 - Service: Apache - Unknown owner - C:\AppServ\Apache\Apache.exe
O23 - Service: Kaspersky Anti-Virus Service (AVP) - Kaspersky Lab ZAO - C:\Program Files\Kaspersky Lab\Kaspersky Internet Security 2012\avp.exe
O23 - Service: ##Id_String1.6844F930_1628_4223_B5CC_5BB94B879762## (Bonjour Service) - Apple Computer, Inc. - C:\Program Files\Bonjour\mDNSResponder.exe
O23 - Service: FLEXnet Licensing Service - Macrovision Europe Ltd. - C:\Program Files\Common Files\Macrovision Shared\FLEXnet Publisher\FNPLicensingService.exe
O23 - Service: Hotspot Shield Service (HotspotShieldService) - Unknown owner - C:\Program Files\Hotspot Shield\bin\openvpnas.exe
O23 - Service: Hotspot Shield Routing Service (HssSrv) - AnchorFree Inc. - C:\Program Files\Hotspot Shield\HssWPR\hsssrv.exe
O23 - Service: Hotspot Shield Tray Service (HssTrayService) - Unknown owner - C:\Program Files\Hotspot Shield\bin\HssTrayService.EXE
O23 - Service: Hotspot Shield Monitoring Service (HssWd) - Unknown owner - C:\Program Files\Hotspot Shield\bin\hsswd.exe
O23 - Service: MySQL - Unknown owner - C:\AppServ\mysql\bin\mysqld-nt.exe
O23 - Service: NVIDIA Display Driver Service (nvsvc) - NVIDIA Corporation - C:\WINDOWS\system32\nvsvc32.exe

--
End of file - 6586 bytes

********************************************************************

تقرير البرامج المثبته




====== معلومات نظام التشغيل ======

X86 WIN_XP 2600 Service Pack 2


====== قائمة البرامج المثبتة ======

Adobe Anchor Service CS3
Adobe Asset Services CS3
Adobe Bridge CS3
Adobe Bridge Start Meeting
Adobe Camera Raw 4.0
Adobe CMaps
Adobe Color - Photoshop Specific
Adobe Color Common Settings
Adobe Color EU Extra Settings
Adobe Color JA Extra Settings
Adobe Color NA Recommended Settings
Adobe Default Language CS3
Adobe Device Central CS3
Adobe ExtendScript Toolkit 2
Adobe Flash Player 10 Plugin
Adobe Fonts All
Adobe Help Viewer CS3
Adobe Linguistics CS3
Adobe PDF Library Files
Adobe Photoshop CS3
Adobe Photoshop CS3
Adobe Setup
Adobe Stock Photos CS3
Adobe Type Support
Adobe Update Manager CS3
Adobe Version Cue CS3 Client
Adobe WinSoft Linguistics Plugin
Adobe XMP Panels CS3
Alien Skin Xenofex 2.0
AppServ v2.4.3
BSPlayer
CamStudio
DVB Dream Stardvb Edition V1.7a
High Definition Audio Driver Package - KB888111
Hotspot Shield 1.57
Kaspersky Internet Security 2012
Kaspersky Internet Security 2012
K-Lite Mega Codec Pack 6.2.0
Kodak DIGITAL GEM Airbrush Professional Plug-In 2.0.0
Microsoft .NET Framework 2.0 Service Pack 2
Microsoft Office XP Professional with FrontPage
Microsoft Visual C++ 2005 Redistributable
Mozilla Firefox 9.0.1 (x86 en-US)
MSVCRT
NVIDIA Display Control Panel
NVIDIA Drivers
NVIDIA nView Desktop Manager
NVIDIA PureVideo Decoder
Opera 11.51
PDF Settings
RealNetworks - Microsoft Visual C++ 2008 Runtime
RealPlayer
REALTEK GbE & FE Ethernet PCI NIC Driver
Realtek High Definition Audio Driver
RealUpgrade 1.1
VC80CRTRedist - 8.0.50727.4053
Vertus Fluid Mask 3 3.0.10
WebFldrs XP
Windows Installer 3.1 (KB893803)
Windows Live Communications Platform
Windows Live Essentials
Windows Live Essentials
Windows Live Messenger
Windows XP Hotfix - KB885354
WinRAR archiver
WinSoftMEsti
Yahoo! Messenger
أداة التحميل Windows Live Upload Tool
مساعد تسجيل الدخول إلى Windows Live


****************************************************
تقرير
يجب عليك تسجيل الدخول او تسجيل لمشاهدة الرابط المخفي
يجب عليك تسجيل الدخول او تسجيل لمشاهدة الرابط المخفي



يجب عليك تسجيل الدخول او تسجيل لمشاهدة الرابط المخفي



*******************************************************************

تقرير start up

"Silent Runners.vbs", revision 61,
يجب عليك تسجيل الدخول او تسجيل لمشاهدة الرابط المخفي

Operating System: Windows XP SP2
Output limited to non-default values, except where indicated by "{++}"


Startup items buried in registry:
---------------------------------

HKCU\Software\Microsoft\Windows\CurrentVersion\Run\ {++}
"ctfmon.exe" = "C:\WINDOWS\system32\ctfmon.exe" [MS]
"Messenger (Yahoo!)" = ""C:\Program Files\Yahoo!\Messenger\YahooMessenger.exe" -quiet" ["Yahoo! Inc."]
"msnmsgr" = ""C:\Program Files\Windows Live\Messenger\msnmsgr.exe" /background" [MS]

HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ {++}
"RTHDCPL" = "RTHDCPL.EXE" ["Realtek Semiconductor Corp."]
"Alcmtr" = "ALCMTR.EXE" ["Realtek Semiconductor Corp."]
"NvMediaCenter" = "RUNDLL32.EXE C:\WINDOWS\system32\NvMcTray.dll,NvTaskbarInit" [MS]
"NvCplDaemon" = "RUNDLL32.EXE C:\WINDOWS\system32\NvCpl.dll,NvStartup" [MS]
"IMJPMIG8.1" = ""C:\WINDOWS\IME\imjp8_1\IMJPMIG.EXE" /Spoil /RemAdvDef /Migration32" [MS]
"MSPY2002" = "C:\WINDOWS\system32\IME\PINTLGNT\ImScInst.exe /SYNC" [null data]
"PHIME2002ASync" = "C:\WINDOWS\system32\IME\TINTLGNT\TINTSETP.EXE /SYNC" [MS]
"PHIME2002A" = "C:\WINDOWS\system32\IME\TINTLGNT\TINTSETP.EXE /IMEName" [MS]
"AVP" = ""C:\Program Files\Kaspersky Lab\Kaspersky Internet Security 2012\avp.exe"" ["Kaspersky Lab ZAO"]
"TkBellExe" = ""C:\Program Files\Real\RealPlayer\update\realsched.exe" -osboot" ["RealNetworks, Inc."]

HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\

{3049C3E9-B461-4BC5-8870-4C09146192CA}\(Default) = (no title provided)
-> {HKLM...CLSID} = "RealPlayer Download and Record Plugin for Internet Explorer"
\InProcServer32\(Default) = "C:\Documents and Settings\All Users\Application Data\Real\RealPlayer\BrowserRecordPlugin\IE\rpbrowserrecordplugin.dll" ["RealPlayer"]

{59273AB4-E7D3-40F9-A1A8-6FA9CCA1862C}\(Default) = "IEVkbdBHO"
-> {HKLM...CLSID} = "IEVkbdBHO Class"
\InProcServer32\(Default) = "C:\Program Files\Kaspersky Lab\Kaspersky Internet Security 2012\ievkbd.dll" ["Kaspersky Lab ZAO"]

{9030D464-4C02-4ABF-8ECC-5164760863C6}\(Default) = (no title provided)
-> {HKLM...CLSID} = "مساعد تسجيل الدخول إلى Windows Live"
\InProcServer32\(Default) = "C:\Program Files\Common Files\Microsoft Shared\Windows Live\WindowsLiveLogin.dll" [MS]

{E33CF602-D945-461A-83F0-819F76A199F8}\(Default) = "link filter bho"
-> {HKLM...CLSID} = "FilterBHO Class"
\InProcServer32\(Default) = "C:\Program Files\Kaspersky Lab\Kaspersky Internet Security 2012\klwtbbho.dll" ["Kaspersky Lab ZAO"]

{F9E4A054-E9B1-4BC3-83A3-76A1AE736170}\(Default) = (no title provided)
-> {HKLM...CLSID} = "Hotspot Shield Class"
\InProcServer32\(Default) = "C:\Program Files\Hotspot Shield\HssIE\HssIE.dll" ["AnchorFree Inc."]

HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Approved\

"{42071714-76d4-11d1-8b24-00a0c9068ff3}" = "Display Panning CPL Extension"
-> {HKLM...CLSID} = "Display Panning CPL Extension"
\InProcServer32\(Default) = "deskpan.dll" [file not found]

"{88895560-9AA2-1069-930E-00AA0030EBC8}" = "HyperTerminal Icon Ext"
-> {HKLM...CLSID} = "HyperTerminal Icon Ext"
\InProcServer32\(Default) = "C:\WINDOWS\system32\hticons.dll" ["Hilgraeve, Inc."]

"{A70C977A-BF00-412C-90B7-034C51DA2439}" = "NvCpl DesktopContext Class"
-> {HKLM...CLSID} = "DesktopContext Class"
\InProcServer32\(Default) = "C:\WINDOWS\system32\nvcpl.dll" ["NVIDIA Corporation"]

"{FFB699E0-306A-11d3-8BD1-00104B6F7516}" = "Play on my TV helper"
-> {HKLM...CLSID} = "NVIDIA CPL Extension"
\InProcServer32\(Default) = "C:\WINDOWS\system32\nvcpl.dll" ["NVIDIA Corporation"]

"{B41DB860-8EE4-11D2-9906-E49FADC173CA}" = "WinRAR shell extension"
-> {HKLM...CLSID} = "WinRAR"
\InProcServer32\(Default) = "C:\Program Files\WinRAR\rarext.dll" ["Alexander Roshal"]

"{F0CB00CD-5A07-4D91-97F5-A8C92CDA93E4}" = "Shell Extensions for RealOne Player"
-> {HKLM...CLSID} = "RealOne Player Context Menu Class"
\InProcServer32\(Default) = "C:\Program Files\Real\RealPlayer\rpshell.dll" ["RealNetworks, Inc."]

"{0006F045-0000-0000-C000-000000000046}" = "Microsoft Outlook Custom Icon Handler"
-> {HKLM...CLSID} = "Outlook File Icon Extension"
\InProcServer32\(Default) = "C:\Program Files\Microsoft Office\Office10\OLKFSTUB.DLL" [MS]

"{42042206-2D85-11D3-8CFF-005004838597}" = "Microsoft Office HTML Icon Handler"
-> {HKLM...CLSID} = (no title provided)
\InProcServer32\(Default) = "C:\Program Files\Microsoft Office\Office10\msohev.dll" [MS]

HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\
<<!>> klogon\DLLName = "C:\WINDOWS\system32\klogon.dll" ["Kaspersky Lab ZAO"]

HKLM\SOFTWARE\Classes\PROTOCOLS\Handler\

<<!>> cdo\CLSID = "{CD00020A-8B95-11D1-82DB-00C04FB1625D}"
-> {HKLM...CLSID} = "Microsoft PKM KnowledgePluggable Class"
\InProcServer32\(Default) = "C:\Program Files\Common Files\Microsoft Shared\Web Folders\PKMCDO.DLL" [MS]

<<!>> livecall\CLSID = "{828030A1-22C1-4009-854F-8E305202313F}"
-> {HKLM...CLSID} = (no title provided)
\InProcServer32\(Default) = "C:\PROGRA~1\WINDOW~4\MESSEN~1\MSGRAP~1.DLL" [MS]

<<!>> msnim\CLSID = "{828030A1-22C1-4009-854F-8E305202313F}"
-> {HKLM...CLSID} = (no title provided)
\InProcServer32\(Default) = "C:\PROGRA~1\WINDOW~4\MESSEN~1\MSGRAP~1.DLL" [MS]

<<!>> mso-offdap\CLSID = "{3D9F03FA-7A94-11D3-BE81-0050048385D1}"
-> {HKLM...CLSID} = "Data Page Pluggable Protocol mso-offdap Handler"
\InProcServer32\(Default) = "C:\PROGRA~1\COMMON~1\MICROS~1\WEBCOM~1\10\OWC10.DLL" [MS]

HKLM\SOFTWARE\Classes\*\shellex\ContextMenuHandlers\

Kaspersky Anti-Virus\(Default) = "{dd230880-495a-11d1-b064-008048ec2fc5}"
-> {HKLM...CLSID} = (no title provided)
\InProcServer32\(Default) = "C:\Program Files\Kaspersky Lab\Kaspersky Internet Security 2012\shellex.dll" ["Kaspersky Lab ZAO"]

WinRAR\(Default) = "{B41DB860-8EE4-11D2-9906-E49FADC173CA}"
-> {HKLM...CLSID} = "WinRAR"
\InProcServer32\(Default) = "C:\Program Files\WinRAR\rarext.dll" ["Alexander Roshal"]

HKLM\SOFTWARE\Classes\Directory\shellex\ContextMenuHandlers\

Kaspersky Anti-Virus\(Default) = "{dd230880-495a-11d1-b064-008048ec2fc5}"
-> {HKLM...CLSID} = (no title provided)
\InProcServer32\(Default) = "C:\Program Files\Kaspersky Lab\Kaspersky Internet Security 2012\shellex.dll" ["Kaspersky Lab ZAO"]

WinRAR\(Default) = "{B41DB860-8EE4-11D2-9906-E49FADC173CA}"
-> {HKLM...CLSID} = "WinRAR"
\InProcServer32\(Default) = "C:\Program Files\WinRAR\rarext.dll" ["Alexander Roshal"]

HKLM\SOFTWARE\Classes\Directory\shellex\DragDropHandlers\

WinRAR\(Default) = "{B41DB860-8EE4-11D2-9906-E49FADC173CA}"
-> {HKLM...CLSID} = "WinRAR"
\InProcServer32\(Default) = "C:\Program Files\WinRAR\rarext.dll" ["Alexander Roshal"]

HKLM\SOFTWARE\Classes\Directory\Background\shellex\ContextMenuHandlers\

NvCplDesktopContext\(Default) = "{A70C977A-BF00-412C-90B7-034C51DA2439}"
-> {HKLM...CLSID} = "DesktopContext Class"
\InProcServer32\(Default) = "C:\WINDOWS\system32\nvcpl.dll" ["NVIDIA Corporation"]

HKLM\SOFTWARE\Classes\Folder\shellex\ContextMenuHandlers\

Kaspersky Anti-Virus\(Default) = "{dd230880-495a-11d1-b064-008048ec2fc5}"
-> {HKLM...CLSID} = (no title provided)
\InProcServer32\(Default) = "C:\Program Files\Kaspersky Lab\Kaspersky Internet Security 2012\shellex.dll" ["Kaspersky Lab ZAO"]

WinRAR\(Default) = "{B41DB860-8EE4-11D2-9906-E49FADC173CA}"
-> {HKLM...CLSID} = "WinRAR"
\InProcServer32\(Default) = "C:\Program Files\WinRAR\rarext.dll" ["Alexander Roshal"]

HKLM\SOFTWARE\Classes\Folder\shellex\DragDropHandlers\

WinRAR\(Default) = "{B41DB860-8EE4-11D2-9906-E49FADC173CA}"
-> {HKLM...CLSID} = "WinRAR"
\InProcServer32\(Default) = "C:\Program Files\WinRAR\rarext.dll" ["Alexander Roshal"]


Active Desktop and Wallpaper:
-----------------------------

Active Desktop may be disabled at this entry:
HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\ShellState

Displayed if Active Desktop enabled and wallpaper not set by Group Policy:
HKCU\Software\Microsoft\Internet Explorer\Desktop\General\
"Wallpaper" = "C:\WINDOWS\system32\config\systemprofile\Local Settings\Application Data\Microsoft\Wallpaper1.bmp"

Displayed if Active Desktop disabled and wallpaper not set by Group Policy:
HKCU\Control Panel\Desktop\
"Wallpaper" = "C:\Documents and Settings\Administrator\Local Settings\Application Data\Microsoft\Wallpaper1.bmp"


Enabled Screen Saver:
---------------------

HKCU\Control Panel\Desktop\
"SCRNSAVE.EXE" = "C:\WINDOWS\system32\logon.scr" [MS]


Windows Portable Device AutoPlay Handlers
-----------------------------------------

HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\Handlers\

BridgeCS3ImportMediaOnArrival\
"Provider" = "Adobe Bridge CS3"
"InvokeProgID" = "Adobe.adobebridge"
"InvokeVerb" = "launch"
HKLM\SOFTWARE\Classes\Adobe.adobebridge\shell\launch\command\(Default) = "C:\Program Files\Adobe\Adobe Bridge CS3\bridgeproxy.exe -v %1" ["Adobe Systems, Inc."]

BSplayerCDDA\
"Provider" = "BSplayer multimedia player"
"InvokeProgID" = "BSP.plist"
"InvokeVerb" = "play"
HKCU\Software\Classes\BSP.plist\shell\play\command\(Default) = "C:\Program Files\Webteh\BSplayerPro\bsplayer.exe "%L"" ["Webteh"]

BSplayerDVD\
"Provider" = "BSplayer multimedia player"
"InvokeProgID" = "BSP.plist"
"InvokeVerb" = "play"
HKCU\Software\Classes\BSP.plist\shell\play\command\(Default) = "C:\Program Files\Webteh\BSplayerPro\bsplayer.exe "%L"" ["Webteh"]

MPCPlayCDAudioOnArrival\
"Provider" = "Media Player Classic"
"InvokeProgID" = "MediaPlayerClassic.Autorun"
"InvokeVerb" = "PlayCDAudio"
HKLM\SOFTWARE\Classes\MediaPlayerClassic.Autorun\shell\PlayCDAudio\command\(Default) = ""C:\Program Files\K-Lite Codec Pack\Media Player Classic\mpc-hc.exe" %1 /cd" ["MPC-HC Team"]

MPCPlayDVDMovieOnArrival\
"Provider" = "Media Player Classic"
"InvokeProgID" = "MediaPlayerClassic.Autorun"
"InvokeVerb" = "PlayDVDMovie"
HKLM\SOFTWARE\Classes\MediaPlayerClassic.Autorun\shell\PlayDVDMovie\command\(Default) = ""C:\Program Files\K-Lite Codec Pack\Media Player Classic\mpc-hc.exe" %1 /dvd" ["MPC-HC Team"]

MPCPlayMusicFilesOnArrival\
"Provider" = "Media Player Classic"
"InvokeProgID" = "MediaPlayerClassic.Autorun"
"InvokeVerb" = "PlayMusicFiles"
HKLM\SOFTWARE\Classes\MediaPlayerClassic.Autorun\shell\PlayMusicFiles\command\(Default) = ""C:\Program Files\K-Lite Codec Pack\Media Player Classic\mpc-hc.exe" %1" ["MPC-HC Team"]

MPCPlayVideoFilesOnArrival\
"Provider" = "Media Player Classic"
"InvokeProgID" = "MediaPlayerClassic.Autorun"
"InvokeVerb" = "PlayVideoFiles"
HKLM\SOFTWARE\Classes\MediaPlayerClassic.Autorun\shell\PlayVideoFiles\command\(Default) = ""C:\Program Files\K-Lite Codec Pack\Media Player Classic\mpc-hc.exe" %1" ["MPC-HC Team"]

RPCDBurningOnArrival\
"Provider" = "RealPlayer"
"InvokeProgID" = "RealPlayer.CDBurn.6"
"InvokeVerb" = "open"
HKCU\Software\Classes\RealPlayer.CDBurn.6\shell\open\command\(Default) = ""C:\Program Files\Real\RealPlayer\RealPlay.exe" /burn "%1"" ["RealNetworks, Inc."]

RPDeviceOnArrival\
"Provider" = "RealPlayer"
"ProgID" = "RealPlayer.HWEventHandler"
HKLM\SOFTWARE\Classes\RealPlayer.HWEventHandler\CLSID\(Default) = "{67E76F1D-BDE2-4052-913C-2752366192D2}"
-> {HKLM...CLSID} = "RealNetworks Scheduler"
\LocalServer32\(Default) = ""C:\Program Files\Real\RealPlayer\Update\realsched.exe" -autoplay" ["RealNetworks, Inc."]

RPDVDBurningOnArrival\
"Provider" = "RealPlayer"
"InvokeProgID" = "RealPlayer.DVDBurn.6"
"InvokeVerb" = "open"
HKCU\Software\Classes\RealPlayer.DVDBurn.6\shell\open\command\(Default) = ""C:\Program Files\Real\RealPlayer\RealPlay.exe" /burndvd "%1"" ["RealNetworks, Inc."]

RPPlayCDAudioOnArrival\
"Provider" = "RealPlayer"
"InvokeProgID" = "RealPlayer.AudioCD.6"
"InvokeVerb" = "play"
HKCU\Software\Classes\RealPlayer.AudioCD.6\shell\play\command\(Default) = ""C:\Program Files\Real\RealPlayer\RealPlay.exe" /play %1 " ["RealNetworks, Inc."]

RPPlayDVDMovieOnArrival\
"Provider" = "RealPlayer"
"InvokeProgID" = "RealPlayer.DVD.6"
"InvokeVerb" = "play"
HKCU\Software\Classes\RealPlayer.DVD.6\shell\play\command\(Default) = ""C:\Program Files\Real\RealPlayer\RealPlay.exe" /dvd %1 " ["RealNetworks, Inc."]

RPPlayMediaOnArrival\
"Provider" = "RealPlayer"
"InvokeProgID" = "RealPlayer.AutoPlay.6"
"InvokeVerb" = "open"
HKCU\Software\Classes\RealPlayer.AutoPlay.6\shell\open\command\(Default) = ""C:\Program Files\Real\RealPlayer\RealPlay.exe" /autoplay "%1"" ["RealNetworks, Inc."]


Startup items in "Administrator" & "All Users" startup folders:
---------------------------------------------------------------

C:\Documents and Settings\All Users\Start Menu\Programs\Startup
"Microsoft Office" -> shortcut to: "C:\Program Files\Microsoft Office\Office10\OSA.EXE -b -l" [MS]


Enabled Scheduled Tasks:
------------------------

"RealUpgradeLogonTaskS-1-5-21-329068152-1220945662-725345543-500" -> launches: "C:\Program Files\Real\RealUpgrade\realupgrade.exe /logoncheck" ["RealNetworks, Inc."]
"RealUpgradeScheduledTaskS-1-5-21-329068152-1220945662-725345543-500" -> launches: "C:\Program Files\Real\RealUpgrade\realupgrade.exe /scheduledcheck" ["RealNetworks, Inc."]


Winsock2 Service Provider DLLs:
-------------------------------

Namespace Service Providers

HKLM\SYSTEM\CurrentControlSet\Services\Winsock2\Parameters\NameSpace_Catalog5\Catalog_Entries\ {++}
000000000001\LibraryPath = "%SystemRoot%\System32\mswsock.dll" [MS]
000000000002\LibraryPath = "%SystemRoot%\System32\winrnr.dll" [MS]
000000000003\LibraryPath = "%SystemRoot%\System32\mswsock.dll" [MS]
000000000004\LibraryPath = "C:\Program Files\Bonjour\mdnsNSP.dll" ["Apple Computer, Inc."]

Transport Service Providers

HKLM\SYSTEM\CurrentControlSet\Services\Winsock2\Parameters\Protocol_Catalog9\Catalog_Entries\ {++}
0000000000##\PackedCatalogItem (contains) DLL [Company Name], (at) ## range:
%SystemRoot%\system32\mswsock.dll [MS], 01 - 03, 06 - 13
%SystemRoot%\system32\rsvpsp.dll [MS], 04 - 05


Toolbars, Explorer Bars, Extensions:
------------------------------------

Extensions (Tools menu items, main toolbar menu buttons)

HKLM\SOFTWARE\Microsoft\Internet Explorer\Extensions\
{4248FE82-7FCB-46AC-B270-339F08212110}\
"ButtonText" = "Clavier &virtuel"
"CLSIDExtension" = "{4248FE82-7FCB-46AC-B270-339F08212110}"
-> {HKLM...CLSID} = "VirtualKeyboardButtonHandler Class"
\InProcServer32\(Default) = "C:\Program Files\Kaspersky Lab\Kaspersky Internet Security 2012\ievkbd.dll" ["Kaspersky Lab ZAO"]

{CCF151D8-D089-449F-A5A4-D9909053F20F}\
"ButtonText" = "Analyse des &liens"
"CLSIDExtension" = "{CCF151D8-D089-449F-A5A4-D9909053F20F}"
-> {HKLM...CLSID} = "FilterButtonHandler Class"
\InProcServer32\(Default) = "C:\Program Files\Kaspersky Lab\Kaspersky Internet Security 2012\klwtbbho.dll" ["Kaspersky Lab ZAO"]

{FB5F1910-F110-11D2-BB9E-00C04F795683}\
"ButtonText" = "Messenger"
"MenuText" = "Windows Messenger"
"Exec" = "C:\Program Files\Messenger\msmsgs.exe" [MS]


Running Services (Display Name, Service Name, Path {Service DLL}):
------------------------------------------------------------------

##Id_String1.6844F930_1628_4223_B5CC_5BB94B879762##, Bonjour Service, ""C:\Program Files\Bonjour\mDNSResponder.exe"" ["Apple Computer, Inc."]
Apache, Apache, ""C:\AppServ\Apache\Apache.exe" --ntservice" [null data]
Hotspot Shield Monitoring Service, HssWd, "C:\Program Files\Hotspot Shield\bin\hsswd.exe -product HSS" [null data]
Hotspot Shield Routing Service, HssSrv, "C:\Program Files\Hotspot Shield\HssWPR\hsssrv.exe" ["AnchorFree Inc."]
Hotspot Shield Service, HotspotShieldService, "C:\Program Files\Hotspot Shield\bin\openvpnas.exe" [null data]
Kaspersky Anti-Virus Service, AVP, ""C:\Program Files\Kaspersky Lab\Kaspersky Internet Security 2012\avp.exe" -r" ["Kaspersky Lab ZAO"]
MySQL, MySQL, "C:\AppServ\mysql\bin\mysqld-nt.exe MySQL" [null data]
NVIDIA Display Driver Service, nvsvc, "C:\WINDOWS\system32\nvsvc32.exe" ["NVIDIA Corporation"]


---------- (launch time: 2011-01-07 08:49:33)
<<!>>: Suspicious data at a malware launch point.

+ This report excludes default entries except where indicated.
+ To see *everywhere* the script checks and *everything* it finds,
launch it from a command prompt or a shortcut with the -all parameter.
+ To search all directories of local fixed drives for DESKTOP.INI
DLL launch points, use the -supp parameter or answer "No" at the
first message box and "Yes" at the second message box.
---------- (total run time: 67 seconds, including 18 seconds for message boxes)

 

ارجووو الرد في اسرع وقت من الشباب بارك الله فيكوم
واســــــــــــف نـــــــــســـــــيــــــت اقول



كل سنه و الامه العربيه و الاسلاميه بالف خير وعافيه

 
حمل الملف التالي

يجب عليك تسجيل الدخول او تسجيل لمشاهدة الرابط المخفي


وبالماوس دبل كلك على الملف ... بعدها راح يفتح لك واجهة الاداة

اعمل كما بالشرح ...

f8fd92ac6c717d0f9c0f0cd8263f51ac.png


2a46f96f18e87bbcebb5807519efca1e.png


ce21e1edb408a7d086d16286d47c176a.png


ثم

يجب عليك تسجيل الدخول او تسجيل لمشاهدة الرابط المخفي


بعدها عطني تقرير هايجاك جديد والبرامج المثبتة
 
توقيع : الوفاء طبعي
حمل الملف التالي

يجب عليك تسجيل الدخول او تسجيل لمشاهدة الرابط المخفي


وبالماوس دبل كلك على الملف ... بعدها راح يفتح لك واجهة الاداة

اعمل كما بالشرح ...

f8fd92ac6c717d0f9c0f0cd8263f51ac.png


2a46f96f18e87bbcebb5807519efca1e.png


ce21e1edb408a7d086d16286d47c176a.png


ثم

يجب عليك تسجيل الدخول او تسجيل لمشاهدة الرابط المخفي


بعدها عطني تقرير هايجاك جديد والبرامج المثبتة


اسف علي عدم الرد سريع


الرابط لا يعمل معي و بيجيب ليه كلام كتير بلغه غربيه

ياريت تشوف ليه رابط تحمل اخر

:q:

في انتظارك
 
تم تحميل الاداه و العمل كما في الصورة + الفحص

اتفضل

تقرير
Hijack

Logfile of Trend Micro HijackThis v2.0.4
Scan saved at 10:42:33 ص, on 07/01/2011
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)
Boot mode: Normal

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\RTHDCPL.EXE
C:\Program Files\Kaspersky Lab\Kaspersky Internet Security 2012\avp.exe
C:\Program Files\Real\RealPlayer\update\realsched.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\Windows Live\Messenger\msnmsgr.exe
C:\AppServ\Apache\Apache.exe
C:\Program Files\Kaspersky Lab\Kaspersky Internet Security 2012\avp.exe
C:\Program Files\Bonjour\mDNSResponder.exe
C:\Program Files\Hotspot Shield\bin\openvpnas.exe
C:\AppServ\Apache\Apache.exe
C:\Program Files\Hotspot Shield\HssWPR\hsssrv.exe
C:\Program Files\Hotspot Shield\bin\hsswd.exe
C:\AppServ\mysql\bin\mysqld-nt.exe
C:\WINDOWS\system32\wscntfy.exe
C:\Program Files\Yahoo!\Messenger\ymsgr_tray.exe
C:\Program Files\Hotspot Shield\bin\openvpntray.exe
C:\Documents and Settings\All Users\Application Data\Mozilla Firefox\firefox.exe
C:\AppServ\mysql\bin\winmysqladmin.exe
C:\Documents and Settings\All Users\Application Data\Mozilla Firefox\plugin-container.exe
C:\WINDOWS\system32\svchost.exe
C:\Zyzoom_Forum_Tools\zyzoom.exe
C:\Zyzoom_Forum_Tools\zHijak.com

R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page =
يجب عليك تسجيل الدخول او تسجيل لمشاهدة الرابط المخفي

R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyOverride = *.local
O2 - BHO: RealPlayer Download and Record Plugin for Internet Explorer - {3049C3E9-B461-4BC5-8870-4C09146192CA} - C:\Documents and Settings\All Users\Application Data\Real\RealPlayer\BrowserRecordPlugin\IE\rpbrowserrecordplugin.dll
O2 - BHO: IEVkbdBHO - {59273AB4-E7D3-40F9-A1A8-6FA9CCA1862C} - C:\Program Files\Kaspersky Lab\Kaspersky Internet Security 2012\ievkbd.dll
O2 - BHO: مساعد تسجيل الدخول إلى Windows Live - {9030D464-4C02-4ABF-8ECC-5164760863C6} - C:\Program Files\Common Files\Microsoft Shared\Windows Live\WindowsLiveLogin.dll
O2 - BHO: link filter bho - {E33CF602-D945-461A-83F0-819F76A199F8} - C:\Program Files\Kaspersky Lab\Kaspersky Internet Security 2012\klwtbbho.dll
O2 - BHO: Hotspot Shield Class - {F9E4A054-E9B1-4BC3-83A3-76A1AE736170} - C:\Program Files\Hotspot Shield\HssIE\HssIE.dll
O4 - HKLM\..\Run: [RTHDCPL] RTHDCPL.EXE
O4 - HKLM\..\Run: [Alcmtr] ALCMTR.EXE
O4 - HKLM\..\Run: [NvMediaCenter] RUNDLL32.EXE C:\WINDOWS\system32\NvMcTray.dll,NvTaskbarInit
O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE C:\WINDOWS\system32\NvCpl.dll,NvStartup
O4 - HKLM\..\Run: [IMJPMIG8.1] "C:\WINDOWS\IME\imjp8_1\IMJPMIG.EXE" /Spoil /RemAdvDef /Migration32
O4 - HKLM\..\Run: [MSPY2002] C:\WINDOWS\system32\IME\PINTLGNT\ImScInst.exe /SYNC
O4 - HKLM\..\Run: [PHIME2002ASync] C:\WINDOWS\system32\IME\TINTLGNT\TINTSETP.EXE /SYNC
O4 - HKLM\..\Run: [PHIME2002A] C:\WINDOWS\system32\IME\TINTLGNT\TINTSETP.EXE /IMEName
O4 - HKLM\..\Run: [AVP] "C:\Program Files\Kaspersky Lab\Kaspersky Internet Security 2012\avp.exe"
O4 - HKLM\..\Run: [TkBellExe] "C:\Program Files\Real\RealPlayer\update\realsched.exe" -osboot
O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
O4 - HKCU\..\Run: [Messenger (Yahoo!)] "C:\Program Files\Yahoo!\Messenger\YahooMessenger.exe" -quiet
O4 - HKCU\..\Run: [msnmsgr] "C:\Program Files\Windows Live\Messenger\msnmsgr.exe" /background
O4 - HKUS\S-1-5-18\..\Run: [ctfmon.exe] C:\WINDOWS\system32\CTFMON.EXE (User 'SYSTEM')
O4 - HKUS\.DEFAULT\..\Run: [ctfmon.exe] C:\WINDOWS\system32\CTFMON.EXE (User 'Default user')
O4 - Global Startup: Microsoft Office.lnk = C:\Program Files\Microsoft Office\Office10\OSA.EXE
O8 - Extra context menu item: &تصدير إلى Microsoft Excel - res://C:\PROGRA~1\MICROS~2\Office10\EXCEL.EXE/3000
O8 - Extra context menu item: Ajouter à l'Anti-bannière - C:\Program Files\Kaspersky Lab\Kaspersky Internet Security 2012\ie_banner_deny.htm
O9 - Extra button: Clavier &virtuel - {4248FE82-7FCB-46AC-B270-339F08212110} - C:\Program Files\Kaspersky Lab\Kaspersky Internet Security 2012\ievkbd.dll
O9 - Extra button: Analyse des &liens - {CCF151D8-D089-449F-A5A4-D9909053F20F} - C:\Program Files\Kaspersky Lab\Kaspersky Internet Security 2012\klwtbbho.dll
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O17 - HKLM\System\CCS\Services\Tcpip\..\{9C4C66BF-51AF-48E1-AE0B-461D2450C728}: NameServer = 10.70.16.1
O22 - SharedTaskScheduler: Browseui preloader - {438755C2-A8BA-11D1-B96B-00A0C90312E1} - C:\WINDOWS\system32\browseui.dll
O22 - SharedTaskScheduler: Component Categories cache daemon - {8C7461EF-2B13-11d2-BE35-3078302C2030} - C:\WINDOWS\system32\browseui.dll
O23 - Service: Apache - Unknown owner - C:\AppServ\Apache\Apache.exe
O23 - Service: Kaspersky Anti-Virus Service (AVP) - Kaspersky Lab ZAO - C:\Program Files\Kaspersky Lab\Kaspersky Internet Security 2012\avp.exe
O23 - Service: ##Id_String1.6844F930_1628_4223_B5CC_5BB94B879762## (Bonjour Service) - Apple Computer, Inc. - C:\Program Files\Bonjour\mDNSResponder.exe
O23 - Service: FLEXnet Licensing Service - Macrovision Europe Ltd. - C:\Program Files\Common Files\Macrovision Shared\FLEXnet Publisher\FNPLicensingService.exe
O23 - Service: Hotspot Shield Service (HotspotShieldService) - Unknown owner - C:\Program Files\Hotspot Shield\bin\openvpnas.exe
O23 - Service: Hotspot Shield Routing Service (HssSrv) - AnchorFree Inc. - C:\Program Files\Hotspot Shield\HssWPR\hsssrv.exe
O23 - Service: Hotspot Shield Tray Service (HssTrayService) - Unknown owner - C:\Program Files\Hotspot Shield\bin\HssTrayService.EXE
O23 - Service: Hotspot Shield Monitoring Service (HssWd) - Unknown owner - C:\Program Files\Hotspot Shield\bin\hsswd.exe
O23 - Service: MySQL - Unknown owner - C:\AppServ\mysql\bin\mysqld-nt.exe
O23 - Service: NVIDIA Display Driver Service (nvsvc) - NVIDIA Corporation - C:\WINDOWS\system32\nvsvc32.exe

--
End of file - 6301 bytes

 
البرامج المثبتة



====== معلومات نظام التشغيل ======

X86 WIN_XP 2600 Service Pack 2


====== قائمة البرامج المثبتة ======

Adobe Anchor Service CS3
Adobe Asset Services CS3
Adobe Bridge CS3
Adobe Bridge Start Meeting
Adobe Camera Raw 4.0
Adobe CMaps
Adobe Color - Photoshop Specific
Adobe Color Common Settings
Adobe Color EU Extra Settings
Adobe Color JA Extra Settings
Adobe Color NA Recommended Settings
Adobe Default Language CS3
Adobe Device Central CS3
Adobe ExtendScript Toolkit 2
Adobe Flash Player 10 Plugin
Adobe Fonts All
Adobe Help Viewer CS3
Adobe Linguistics CS3
Adobe PDF Library Files
Adobe Photoshop CS3
Adobe Photoshop CS3
Adobe Setup
Adobe Stock Photos CS3
Adobe Type Support
Adobe Update Manager CS3
Adobe Version Cue CS3 Client
Adobe WinSoft Linguistics Plugin
Adobe XMP Panels CS3
Alien Skin Xenofex 2.0
AppServ v2.4.3
BSPlayer
CamStudio
DVB Dream Stardvb Edition V1.7a
High Definition Audio Driver Package - KB888111
Hotspot Shield 1.57
Kaspersky Internet Security 2012
Kaspersky Internet Security 2012
K-Lite Mega Codec Pack 6.2.0
Kodak DIGITAL GEM Airbrush Professional Plug-In 2.0.0
Microsoft .NET Framework 2.0 Service Pack 2
Microsoft Office XP Professional with FrontPage
Microsoft Visual C++ 2005 Redistributable
Mozilla Firefox 9.0.1 (x86 en-US)
MSVCRT
NVIDIA Display Control Panel
NVIDIA Drivers
NVIDIA nView Desktop Manager
NVIDIA PureVideo Decoder
Opera 11.51
PDF Settings
RealNetworks - Microsoft Visual C++ 2008 Runtime
RealPlayer
REALTEK GbE & FE Ethernet PCI NIC Driver
Realtek High Definition Audio Driver
RealUpgrade 1.1
VC80CRTRedist - 8.0.50727.4053
Vertus Fluid Mask 3 3.0.10
WebFldrs XP
Windows Installer 3.1 (KB893803)
Windows Live Communications Platform
Windows Live Essentials
Windows Live Essentials
Windows Live Messenger
Windows XP Hotfix - KB885354
WinRAR archiver
WinSoftMEsti
Yahoo! Messenger
أداة التحميل Windows Live Upload Tool
مساعد تسجيل الدخول إلى Windows Live


 
في انتظارك اخي الكريم وشكرا لك جدااااا

ملاحظه صغيووورا عند تنزل

" TFC "

برنامج الانتي فيروس عندي كاسبر سكيورتي 2012
لم يطلع ليه ايه انظار تنبيه


ولكن عند تنزيل

" Zyzoom_Reports-fixing_tools_001 "


طلع ليه تنبيه ولكن بوجود خطر محتمل

وليس فيروس

انا قولت اقولك بس لافاده
 
لانه في اداه فيها اداه يشتبه فيها الحماية بشكل عام ومنها الكاسبر
ام الاخرى لايوجد اشتباه فيها
اعمل التقرير
يجب عليك تسجيل الدخول او تسجيل لمشاهدة الرابط المخفي
 
توقيع : format
لانه في اداه فيها اداه يشتبه فيها الحماية بشكل عام ومنها الكاسبر
ام الاخرى لايوجد اشتباه فيها
اعمل التقرير
يجب عليك تسجيل الدخول او تسجيل لمشاهدة الرابط المخفي


ودة مش يتعارض مع الانتي فيروس

قصدي

مالوووير بااايت
 
وياريت لو تقول ليه اعمل اسكان بيه علي كل الدريفات عندي ولا قرص " C " فقط
 
لايتعارض ولكن ينصح باغلاق برنامج الحماية اثناء الفحص
وطبق كما في الشرح
يجب عليك تسجيل الدخول او تسجيل لمشاهدة الرابط المخفي

 
توقيع : format
جاري عمل الفحص علي كل الدريفات

C . D . F . E . L

ولحد الان عمل فحص علي نص الدريفات

وقفش 4 ملفات

والله ما انا عارف كان بيعمل اهي

الكاسبر عندي 2012 + اخر تحديث

وفي الاخر مش بيقفش


ههههههههههههه


ياريت لو تستني يا غالي لان شكالو كدة هيخد وقت خصوصا ان هوا دخل علي الالعاب الان
 
تمام انا بانتظارك بس .. ماتقطع الكهربا عندي لاني في غزة هههه

 
توقيع : format
اســـــــــف والله كان عندي مشكله في النت بسبب عدم دفع الاشتراك هههههههه

اتفضل التقرير

*************************************


Malwarebytes' Anti-Malware 1.51.2.1300
يجب عليك تسجيل الدخول او تسجيل لمشاهدة الرابط المخفي


Database version: 7622

Windows 5.1.2600 Service Pack 2
Internet Explorer 6.0.2900.2180

08/02/2012 11:57:05 م
mbam-log-2012-02-08 (23-57-05).txt

Scan type: Full scan (C:\|D:\|E:\|F:\|)
Objects scanned: 362425
Time elapsed: 3 hour(s), 20 minute(s), 0 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 194

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
d:\hossam\Hos2\GAMS\كل ما يخص سرفر 5095\السورس\ZFserver\accserver\iext2.fne (Trojan.Flystudio) -> Quarantined and deleted successfully.
d:\hossam\Hos2\GAMS\كل ما يخص سرفر 5095\السورس\ZFserver\accserver\iext3.fne (Trojan.BHO) -> Quarantined and deleted successfully.
d:\hossam\Hos2\GAMS\كل ما يخص سرفر 5095\السورس\ZFserver\accserver\krnln.fnr (Trojan.FlyStudio) -> Quarantined and deleted successfully.
d:\hossam\Hos2\GAMS\كل ما يخص سرفر 5095\السورس\accserver\eacc1.03.exe (Trojan.Agent) -> Quarantined and deleted successfully.
d:\hossam\Hos2\GAMS\كل ما يخص سرفر 5095\السورس\accserver\iext2.fne (Trojan.Flystudio) -> Quarantined and deleted successfully.
d:\hossam\Hos2\GAMS\كل ما يخص سرفر 5095\السورس\accserver\iext3.fne (Trojan.BHO) -> Quarantined and deleted successfully.
d:\hossam\Hos2\GAMS\كل ما يخص سرفر 5095\السورس\accserver\krnln.fnr (Trojan.FlyStudio) -> Quarantined and deleted successfully.
d:\hossam\Hos2\GAMS\Hazm\gat12\pztrain.exe (Trojan.Dropper) -> Quarantined and deleted successfully.
d:\hossam\Hos2\GAMS\chicken invaders 4\chicken_invaders_4_plus8_trainer.exe (HackTool.GamesCheat.Gen) -> Quarantined and deleted successfully.
d:\system volume information\_restore{be542ff7-c06a-4a68-a9e5-3bf9227d4fb7}\RP7\A0001061.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
d:\system volume information\_restore{be542ff7-c06a-4a68-a9e5-3bf9227d4fb7}\RP7\A0001433.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
d:\system volume information\_restore{be542ff7-c06a-4a68-a9e5-3bf9227d4fb7}\RP7\A0001640.exe (Spyware.Passwords.XGen) -> Quarantined and deleted successfully.
d:\system volume information\_restore{be542ff7-c06a-4a68-a9e5-3bf9227d4fb7}\RP9\A0001929.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
d:\system volume information\_restore{be542ff7-c06a-4a68-a9e5-3bf9227d4fb7}\RP9\A0002408.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
d:\system volume information\_restore{be542ff7-c06a-4a68-a9e5-3bf9227d4fb7}\RP9\A0004709.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
d:\system volume information\_restore{be542ff7-c06a-4a68-a9e5-3bf9227d4fb7}\RP9\A0005016.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
d:\system volume information\_restore{6f811dc2-52ba-40dd-83b7-556dfb4c4043}\RP10\A0024131.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
d:\system volume information\_restore{6f811dc2-52ba-40dd-83b7-556dfb4c4043}\RP10\A0026356.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
d:\system volume information\_restore{6f811dc2-52ba-40dd-83b7-556dfb4c4043}\RP10\A0026796.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
d:\system volume information\_restore{6f811dc2-52ba-40dd-83b7-556dfb4c4043}\RP10\A0027934.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
d:\system volume information\_restore{37d7b65c-fe86-4313-8dd0-eda8dd2d4d27}\RP6\A0001113.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
d:\system volume information\_restore{37d7b65c-fe86-4313-8dd0-eda8dd2d4d27}\RP6\A0001668.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
d:\system volume information\_restore{37d7b65c-fe86-4313-8dd0-eda8dd2d4d27}\RP8\A0005020.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
d:\system volume information\_restore{37d7b65c-fe86-4313-8dd0-eda8dd2d4d27}\RP8\A0007368.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
d:\system volume information\_restore{93d89ecb-7f4f-4ee2-ac85-ee731b292300}\RP6\A0003060.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
d:\system volume information\_restore{93d89ecb-7f4f-4ee2-ac85-ee731b292300}\RP7\A0005092.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
d:\system volume information\_restore{a42ae030-3fb1-4389-b096-2070a746b5ea}\RP10\A0009418.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
d:\system volume information\_restore{a42ae030-3fb1-4389-b096-2070a746b5ea}\RP10\A0009875.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
d:\system volume information\_restore{a42ae030-3fb1-4389-b096-2070a746b5ea}\RP10\A0010875.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
d:\system volume information\_restore{a42ae030-3fb1-4389-b096-2070a746b5ea}\RP10\A0011310.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
d:\system volume information\_restore{a42ae030-3fb1-4389-b096-2070a746b5ea}\RP10\A0012928.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
d:\system volume information\_restore{a42ae030-3fb1-4389-b096-2070a746b5ea}\RP10\A0013821.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
d:\system volume information\_restore{3abe522d-3ce8-43e2-8416-29dcfff67635}\RP28\A0063104.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
d:\system volume information\_restore{e53afec3-9b36-4113-85e8-9afa11644906}\RP6\A0004075.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
d:\system volume information\_restore{aaff9767-f122-43e1-8a3a-838fab905dd7}\RP14\A0037186.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
d:\system volume information\_restore{aaff9767-f122-43e1-8a3a-838fab905dd7}\RP14\A0038186.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
d:\system volume information\_restore{aaff9767-f122-43e1-8a3a-838fab905dd7}\RP14\A0039274.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
d:\system volume information\_restore{f0119d65-775f-40f6-a84b-7a5214629aec}\RP6\A0003579.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
d:\system volume information\_restore{f0119d65-775f-40f6-a84b-7a5214629aec}\RP6\A0004223.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
d:\system volume information\_restore{f0119d65-775f-40f6-a84b-7a5214629aec}\RP6\A0004875.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
d:\system volume information\_restore{ecaea771-8994-437a-85c6-4b58eb1f07ef}\RP6\A0006101.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
d:\system volume information\_restore{ecaea771-8994-437a-85c6-4b58eb1f07ef}\RP6\A0007219.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
d:\system volume information\_restore{c09728e8-b59c-442d-b78d-4b08bcf0a439}\RP7\A0001353.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
d:\system volume information\_restore{18b30b04-d007-4a27-beaf-8855f18ddd55}\RP10\A0027811.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
d:\system volume information\_restore{18b30b04-d007-4a27-beaf-8855f18ddd55}\RP10\A0030215.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
d:\system volume information\_restore{18b30b04-d007-4a27-beaf-8855f18ddd55}\RP10\A0032219.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
d:\system volume information\_restore{18b30b04-d007-4a27-beaf-8855f18ddd55}\RP12\A0035772.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
d:\system volume information\_restore{29d285f8-1867-428c-b358-8135c08af133}\RP23\A0039312.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
d:\system volume information\_restore{29d285f8-1867-428c-b358-8135c08af133}\RP23\A0051106.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
d:\system volume information\_restore{29d285f8-1867-428c-b358-8135c08af133}\RP24\A0051429.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
d:\system volume information\_restore{cfa226ad-0d45-4642-b022-7bf5dac7b64a}\RP9\A0009079.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
d:\system volume information\_restore{15d835eb-86b6-4f97-81fa-037749c06d0d}\RP3\A0001304.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
d:\system volume information\_restore{af4ef33b-001e-4cb9-8de5-21577ecd379f}\RP50\A0152956.EXE (Spyware.Passwords.XGen) -> Quarantined and deleted successfully.
d:\system volume information\_restore{af4ef33b-001e-4cb9-8de5-21577ecd379f}\RP50\A0152957.exe (Spyware.Passwords.XGen) -> Quarantined and deleted successfully.
d:\system volume information\_restore{af4ef33b-001e-4cb9-8de5-21577ecd379f}\RP50\A0152959.EXE (Spyware.Passwords.XGen) -> Quarantined and deleted successfully.
d:\system volume information\_restore{af4ef33b-001e-4cb9-8de5-21577ecd379f}\RP50\A0152960.EXE (Spyware.Passwords.XGen) -> Quarantined and deleted successfully.
d:\system volume information\_restore{af4ef33b-001e-4cb9-8de5-21577ecd379f}\RP50\A0152988.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
d:\system volume information\_restore{af4ef33b-001e-4cb9-8de5-21577ecd379f}\RP53\A0154331.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
d:\system volume information\_restore{af4ef33b-001e-4cb9-8de5-21577ecd379f}\RP53\A0154370.EXE (Spyware.Passwords.XGen) -> Quarantined and deleted successfully.
d:\system volume information\_restore{af4ef33b-001e-4cb9-8de5-21577ecd379f}\RP53\A0154371.EXE (Spyware.Passwords.XGen) -> Quarantined and deleted successfully.
d:\system volume information\_restore{af4ef33b-001e-4cb9-8de5-21577ecd379f}\RP53\A0154373.exe (Spyware.Passwords.XGen) -> Quarantined and deleted successfully.
d:\system volume information\_restore{af4ef33b-001e-4cb9-8de5-21577ecd379f}\RP53\A0154374.EXE (Spyware.Passwords.XGen) -> Quarantined and deleted successfully.
d:\system volume information\_restore{83bd6e7b-8b22-46ca-ae80-bf5d05e1ba03}\RP41\A0063133.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
d:\system volume information\_restore{83bd6e7b-8b22-46ca-ae80-bf5d05e1ba03}\RP41\A0063150.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
d:\system volume information\_restore{83bd6e7b-8b22-46ca-ae80-bf5d05e1ba03}\RP41\A0063178.EXE (Spyware.Passwords.XGen) -> Quarantined and deleted successfully.
d:\system volume information\_restore{83bd6e7b-8b22-46ca-ae80-bf5d05e1ba03}\RP41\A0063179.EXE (Spyware.Passwords.XGen) -> Quarantined and deleted successfully.
d:\system volume information\_restore{83bd6e7b-8b22-46ca-ae80-bf5d05e1ba03}\RP41\A0063181.exe (Spyware.Passwords.XGen) -> Quarantined and deleted successfully.
d:\system volume information\_restore{83bd6e7b-8b22-46ca-ae80-bf5d05e1ba03}\RP41\A0063182.EXE (Spyware.Passwords.XGen) -> Quarantined and deleted successfully.
d:\system volume information\_restore{83bd6e7b-8b22-46ca-ae80-bf5d05e1ba03}\RP41\A0065509.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
d:\system volume information\_restore{83bd6e7b-8b22-46ca-ae80-bf5d05e1ba03}\RP41\A0065523.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
d:\system volume information\_restore{83bd6e7b-8b22-46ca-ae80-bf5d05e1ba03}\RP41\A0065552.EXE (Spyware.Passwords.XGen) -> Quarantined and deleted successfully.
d:\system volume information\_restore{83bd6e7b-8b22-46ca-ae80-bf5d05e1ba03}\RP41\A0065553.EXE (Spyware.Passwords.XGen) -> Quarantined and deleted successfully.
d:\system volume information\_restore{83bd6e7b-8b22-46ca-ae80-bf5d05e1ba03}\RP41\A0065555.exe (Spyware.Passwords.XGen) -> Quarantined and deleted successfully.
d:\system volume information\_restore{83bd6e7b-8b22-46ca-ae80-bf5d05e1ba03}\RP41\A0065556.EXE (Spyware.Passwords.XGen) -> Quarantined and deleted successfully.
d:\system volume information\_restore{83bd6e7b-8b22-46ca-ae80-bf5d05e1ba03}\RP41\A0068500.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
d:\system volume information\_restore{83bd6e7b-8b22-46ca-ae80-bf5d05e1ba03}\RP41\A0068516.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
d:\system volume information\_restore{83bd6e7b-8b22-46ca-ae80-bf5d05e1ba03}\RP41\A0068545.EXE (Spyware.Passwords.XGen) -> Quarantined and deleted successfully.
d:\system volume information\_restore{83bd6e7b-8b22-46ca-ae80-bf5d05e1ba03}\RP41\A0068546.EXE (Spyware.Passwords.XGen) -> Quarantined and deleted successfully.
d:\system volume information\_restore{83bd6e7b-8b22-46ca-ae80-bf5d05e1ba03}\RP41\A0068548.exe (Spyware.Passwords.XGen) -> Quarantined and deleted successfully.
d:\system volume information\_restore{83bd6e7b-8b22-46ca-ae80-bf5d05e1ba03}\RP41\A0068549.EXE (Spyware.Passwords.XGen) -> Quarantined and deleted successfully.
d:\system volume information\_restore{83bd6e7b-8b22-46ca-ae80-bf5d05e1ba03}\RP46\A0070257.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
d:\system volume information\_restore{83bd6e7b-8b22-46ca-ae80-bf5d05e1ba03}\RP46\A0070298.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
d:\system volume information\_restore{83bd6e7b-8b22-46ca-ae80-bf5d05e1ba03}\RP46\A0070329.EXE (Spyware.Passwords.XGen) -> Quarantined and deleted successfully.
d:\system volume information\_restore{83bd6e7b-8b22-46ca-ae80-bf5d05e1ba03}\RP46\A0070330.EXE (Spyware.Passwords.XGen) -> Quarantined and deleted successfully.
d:\system volume information\_restore{83bd6e7b-8b22-46ca-ae80-bf5d05e1ba03}\RP46\A0070332.exe (Spyware.Passwords.XGen) -> Quarantined and deleted successfully.
d:\system volume information\_restore{83bd6e7b-8b22-46ca-ae80-bf5d05e1ba03}\RP46\A0070333.EXE (Spyware.Passwords.XGen) -> Quarantined and deleted successfully.
d:\system volume information\_restore{012a2212-307c-45ea-9d55-baba9bb8b8b8}\RP22\A0005437.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
d:\system volume information\_restore{012a2212-307c-45ea-9d55-baba9bb8b8b8}\RP22\A0005465.EXE (Spyware.Passwords.XGen) -> Quarantined and deleted successfully.
d:\system volume information\_restore{012a2212-307c-45ea-9d55-baba9bb8b8b8}\RP22\A0005466.EXE (Spyware.Passwords.XGen) -> Quarantined and deleted successfully.
d:\system volume information\_restore{012a2212-307c-45ea-9d55-baba9bb8b8b8}\RP22\A0005468.exe (Spyware.Passwords.XGen) -> Quarantined and deleted successfully.
d:\system volume information\_restore{012a2212-307c-45ea-9d55-baba9bb8b8b8}\RP22\A0005469.EXE (Spyware.Passwords.XGen) -> Quarantined and deleted successfully.
d:\system volume information\_restore{012a2212-307c-45ea-9d55-baba9bb8b8b8}\RP22\A0005505.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
d:\system volume information\_restore{012a2212-307c-45ea-9d55-baba9bb8b8b8}\RP22\A0006163.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
d:\system volume information\_restore{012a2212-307c-45ea-9d55-baba9bb8b8b8}\RP22\A0006176.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
d:\system volume information\_restore{012a2212-307c-45ea-9d55-baba9bb8b8b8}\RP22\A0006204.EXE (Spyware.Passwords.XGen) -> Quarantined and deleted successfully.
d:\system volume information\_restore{012a2212-307c-45ea-9d55-baba9bb8b8b8}\RP22\A0006205.EXE (Spyware.Passwords.XGen) -> Quarantined and deleted successfully.
d:\system volume information\_restore{012a2212-307c-45ea-9d55-baba9bb8b8b8}\RP22\A0006207.exe (Spyware.Passwords.XGen) -> Quarantined and deleted successfully.
d:\system volume information\_restore{012a2212-307c-45ea-9d55-baba9bb8b8b8}\RP22\A0006208.EXE (Spyware.Passwords.XGen) -> Quarantined and deleted successfully.
d:\system volume information\_restore{012a2212-307c-45ea-9d55-baba9bb8b8b8}\RP22\A0007387.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
d:\system volume information\_restore{012a2212-307c-45ea-9d55-baba9bb8b8b8}\RP22\A0007400.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
d:\system volume information\_restore{012a2212-307c-45ea-9d55-baba9bb8b8b8}\RP22\A0007428.EXE (Spyware.Passwords.XGen) -> Quarantined and deleted successfully.
d:\system volume information\_restore{012a2212-307c-45ea-9d55-baba9bb8b8b8}\RP22\A0007429.EXE (Spyware.Passwords.XGen) -> Quarantined and deleted successfully.
d:\system volume information\_restore{012a2212-307c-45ea-9d55-baba9bb8b8b8}\RP22\A0007431.exe (Spyware.Passwords.XGen) -> Quarantined and deleted successfully.
d:\system volume information\_restore{012a2212-307c-45ea-9d55-baba9bb8b8b8}\RP22\A0007432.EXE (Spyware.Passwords.XGen) -> Quarantined and deleted successfully.
d:\system volume information\_restore{012a2212-307c-45ea-9d55-baba9bb8b8b8}\RP22\A0008347.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
d:\system volume information\_restore{012a2212-307c-45ea-9d55-baba9bb8b8b8}\RP22\A0008364.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
d:\system volume information\_restore{012a2212-307c-45ea-9d55-baba9bb8b8b8}\RP22\A0008392.EXE (Spyware.Passwords.XGen) -> Quarantined and deleted successfully.
d:\system volume information\_restore{012a2212-307c-45ea-9d55-baba9bb8b8b8}\RP22\A0008393.EXE (Spyware.Passwords.XGen) -> Quarantined and deleted successfully.
d:\system volume information\_restore{012a2212-307c-45ea-9d55-baba9bb8b8b8}\RP22\A0008395.exe (Spyware.Passwords.XGen) -> Quarantined and deleted successfully.
d:\system volume information\_restore{012a2212-307c-45ea-9d55-baba9bb8b8b8}\RP22\A0008396.EXE (Spyware.Passwords.XGen) -> Quarantined and deleted successfully.
d:\system volume information\_restore{012a2212-307c-45ea-9d55-baba9bb8b8b8}\RP22\A0008809.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
d:\system volume information\_restore{012a2212-307c-45ea-9d55-baba9bb8b8b8}\RP22\A0008822.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
d:\system volume information\_restore{012a2212-307c-45ea-9d55-baba9bb8b8b8}\RP22\A0008850.EXE (Spyware.Passwords.XGen) -> Quarantined and deleted successfully.
d:\system volume information\_restore{012a2212-307c-45ea-9d55-baba9bb8b8b8}\RP22\A0008851.EXE (Spyware.Passwords.XGen) -> Quarantined and deleted successfully.
d:\system volume information\_restore{012a2212-307c-45ea-9d55-baba9bb8b8b8}\RP22\A0008853.exe (Spyware.Passwords.XGen) -> Quarantined and deleted successfully.
d:\system volume information\_restore{012a2212-307c-45ea-9d55-baba9bb8b8b8}\RP22\A0008854.EXE (Spyware.Passwords.XGen) -> Quarantined and deleted successfully.
d:\system volume information\_restore{012a2212-307c-45ea-9d55-baba9bb8b8b8}\RP22\A0009232.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
d:\system volume information\_restore{012a2212-307c-45ea-9d55-baba9bb8b8b8}\RP22\A0009245.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
d:\system volume information\_restore{012a2212-307c-45ea-9d55-baba9bb8b8b8}\RP22\A0009273.EXE (Spyware.Passwords.XGen) -> Quarantined and deleted successfully.
d:\system volume information\_restore{012a2212-307c-45ea-9d55-baba9bb8b8b8}\RP22\A0009274.EXE (Spyware.Passwords.XGen) -> Quarantined and deleted successfully.
d:\system volume information\_restore{012a2212-307c-45ea-9d55-baba9bb8b8b8}\RP22\A0009276.exe (Spyware.Passwords.XGen) -> Quarantined and deleted successfully.
d:\system volume information\_restore{012a2212-307c-45ea-9d55-baba9bb8b8b8}\RP22\A0009277.EXE (Spyware.Passwords.XGen) -> Quarantined and deleted successfully.
d:\system volume information\_restore{012a2212-307c-45ea-9d55-baba9bb8b8b8}\RP23\A0009797.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
d:\system volume information\_restore{012a2212-307c-45ea-9d55-baba9bb8b8b8}\RP23\A0009810.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
d:\system volume information\_restore{012a2212-307c-45ea-9d55-baba9bb8b8b8}\RP23\A0009838.EXE (Spyware.Passwords.XGen) -> Quarantined and deleted successfully.
d:\system volume information\_restore{012a2212-307c-45ea-9d55-baba9bb8b8b8}\RP23\A0009839.EXE (Spyware.Passwords.XGen) -> Quarantined and deleted successfully.
d:\system volume information\_restore{012a2212-307c-45ea-9d55-baba9bb8b8b8}\RP23\A0009841.exe (Spyware.Passwords.XGen) -> Quarantined and deleted successfully.
d:\system volume information\_restore{012a2212-307c-45ea-9d55-baba9bb8b8b8}\RP23\A0009842.EXE (Spyware.Passwords.XGen) -> Quarantined and deleted successfully.
d:\system volume information\_restore{012a2212-307c-45ea-9d55-baba9bb8b8b8}\RP23\A0010213.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
d:\system volume information\_restore{012a2212-307c-45ea-9d55-baba9bb8b8b8}\RP23\A0010226.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
d:\system volume information\_restore{012a2212-307c-45ea-9d55-baba9bb8b8b8}\RP23\A0010254.EXE (Spyware.Passwords.XGen) -> Quarantined and deleted successfully.
d:\system volume information\_restore{012a2212-307c-45ea-9d55-baba9bb8b8b8}\RP23\A0010255.EXE (Spyware.Passwords.XGen) -> Quarantined and deleted successfully.
d:\system volume information\_restore{012a2212-307c-45ea-9d55-baba9bb8b8b8}\RP23\A0010257.exe (Spyware.Passwords.XGen) -> Quarantined and deleted successfully.
d:\system volume information\_restore{012a2212-307c-45ea-9d55-baba9bb8b8b8}\RP23\A0010258.EXE (Spyware.Passwords.XGen) -> Quarantined and deleted successfully.
d:\system volume information\_restore{fc499292-c6a1-4bd0-8475-cef74188c574}\RP4\A0004954.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
d:\system volume information\_restore{fc499292-c6a1-4bd0-8475-cef74188c574}\RP4\A0004979.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
d:\system volume information\_restore{fc499292-c6a1-4bd0-8475-cef74188c574}\RP4\A0005007.EXE (Spyware.Passwords.XGen) -> Quarantined and deleted successfully.
d:\system volume information\_restore{fc499292-c6a1-4bd0-8475-cef74188c574}\RP4\A0005008.EXE (Spyware.Passwords.XGen) -> Quarantined and deleted successfully.
d:\system volume information\_restore{fc499292-c6a1-4bd0-8475-cef74188c574}\RP4\A0005010.exe (Spyware.Passwords.XGen) -> Quarantined and deleted successfully.
d:\system volume information\_restore{fc499292-c6a1-4bd0-8475-cef74188c574}\RP4\A0005011.EXE (Spyware.Passwords.XGen) -> Quarantined and deleted successfully.
d:\system volume information\_restore{dce345dd-446e-4ce6-9198-ffea5422205d}\RP26\A0045465.exe (HackTool.GamesCheat.Gen) -> Quarantined and deleted successfully.
f:\system volume information\_restore{af4ef33b-001e-4cb9-8de5-21577ecd379f}\RP50\A0153077.exe (RiskWare.Tool.CK) -> Quarantined and deleted successfully.
f:\system volume information\_restore{af4ef33b-001e-4cb9-8de5-21577ecd379f}\RP50\A0153079.exe (PUP.Hacktool.Patcher) -> Quarantined and deleted successfully.
f:\system volume information\_restore{af4ef33b-001e-4cb9-8de5-21577ecd379f}\RP50\A0153080.exe (PUP.Hacktool.Patcher) -> Quarantined and deleted successfully.
f:\system volume information\_restore{af4ef33b-001e-4cb9-8de5-21577ecd379f}\RP50\A0153081.exe (RiskWare.Tool.CK) -> Quarantined and deleted successfully.
f:\system volume information\_restore{af4ef33b-001e-4cb9-8de5-21577ecd379f}\RP50\A0153082.exe (PUP.Hacktool.Patcher) -> Quarantined and deleted successfully.
f:\system volume information\_restore{af4ef33b-001e-4cb9-8de5-21577ecd379f}\RP50\A0153184.exe (RiskWare.Tool.CK) -> Quarantined and deleted successfully.
f:\system volume information\_restore{af4ef33b-001e-4cb9-8de5-21577ecd379f}\RP53\A0154183.exe (RiskWare.Tool.CK) -> Quarantined and deleted successfully.
f:\system volume information\_restore{af4ef33b-001e-4cb9-8de5-21577ecd379f}\RP53\A0155500.exe (RiskWare.Tool.CK) -> Quarantined and deleted successfully.
f:\system volume information\_restore{83bd6e7b-8b22-46ca-ae80-bf5d05e1ba03}\RP41\A0062876.exe (RiskWare.Tool.CK) -> Quarantined and deleted successfully.
f:\system volume information\_restore{83bd6e7b-8b22-46ca-ae80-bf5d05e1ba03}\RP41\A0062943.exe (PUP.Hacktool.Patcher) -> Quarantined and deleted successfully.
f:\system volume information\_restore{83bd6e7b-8b22-46ca-ae80-bf5d05e1ba03}\RP41\A0063314.exe (RiskWare.Tool.CK) -> Quarantined and deleted successfully.
f:\system volume information\_restore{83bd6e7b-8b22-46ca-ae80-bf5d05e1ba03}\RP41\A0063382.exe (PUP.Hacktool.Patcher) -> Quarantined and deleted successfully.
f:\system volume information\_restore{83bd6e7b-8b22-46ca-ae80-bf5d05e1ba03}\RP41\A0065393.exe (RiskWare.Tool.CK) -> Quarantined and deleted successfully.
f:\system volume information\_restore{83bd6e7b-8b22-46ca-ae80-bf5d05e1ba03}\RP41\A0065459.exe (PUP.Hacktool.Patcher) -> Quarantined and deleted successfully.
f:\system volume information\_restore{83bd6e7b-8b22-46ca-ae80-bf5d05e1ba03}\RP41\A0066385.exe (RiskWare.Tool.CK) -> Quarantined and deleted successfully.
f:\system volume information\_restore{83bd6e7b-8b22-46ca-ae80-bf5d05e1ba03}\RP41\A0068386.exe (RiskWare.Tool.CK) -> Quarantined and deleted successfully.
f:\system volume information\_restore{83bd6e7b-8b22-46ca-ae80-bf5d05e1ba03}\RP41\A0068452.exe (PUP.Hacktool.Patcher) -> Quarantined and deleted successfully.
f:\system volume information\_restore{83bd6e7b-8b22-46ca-ae80-bf5d05e1ba03}\RP44\A0070059.exe (RiskWare.Tool.CK) -> Quarantined and deleted successfully.
f:\system volume information\_restore{83bd6e7b-8b22-46ca-ae80-bf5d05e1ba03}\RP44\A0070129.exe (PUP.Hacktool.Patcher) -> Quarantined and deleted successfully.
f:\system volume information\_restore{83bd6e7b-8b22-46ca-ae80-bf5d05e1ba03}\RP46\A0070396.exe (RiskWare.Tool.CK) -> Quarantined and deleted successfully.
f:\system volume information\_restore{83bd6e7b-8b22-46ca-ae80-bf5d05e1ba03}\RP46\A0070479.exe (PUP.Hacktool.Patcher) -> Quarantined and deleted successfully.
f:\system volume information\_restore{83bd6e7b-8b22-46ca-ae80-bf5d05e1ba03}\RP46\A0070802.exe (RiskWare.Tool.CK) -> Quarantined and deleted successfully.
f:\system volume information\_restore{83bd6e7b-8b22-46ca-ae80-bf5d05e1ba03}\RP46\A0070866.exe (PUP.Hacktool.Patcher) -> Quarantined and deleted successfully.
f:\system volume information\_restore{83bd6e7b-8b22-46ca-ae80-bf5d05e1ba03}\RP46\A0072795.exe (RiskWare.Tool.CK) -> Quarantined and deleted successfully.
f:\system volume information\_restore{83bd6e7b-8b22-46ca-ae80-bf5d05e1ba03}\RP46\A0072885.exe (RiskWare.Tool.CK) -> Quarantined and deleted successfully.
f:\system volume information\_restore{83bd6e7b-8b22-46ca-ae80-bf5d05e1ba03}\RP46\A0072951.exe (PUP.Hacktool.Patcher) -> Quarantined and deleted successfully.
f:\system volume information\_restore{012a2212-307c-45ea-9d55-baba9bb8b8b8}\RP22\A0005693.exe (RiskWare.Tool.CK) -> Quarantined and deleted successfully.
f:\system volume information\_restore{012a2212-307c-45ea-9d55-baba9bb8b8b8}\RP22\A0005768.exe (PUP.Hacktool.Patcher) -> Quarantined and deleted successfully.
f:\system volume information\_restore{012a2212-307c-45ea-9d55-baba9bb8b8b8}\RP22\A0006047.exe (RiskWare.Tool.CK) -> Quarantined and deleted successfully.
f:\system volume information\_restore{012a2212-307c-45ea-9d55-baba9bb8b8b8}\RP22\A0006127.exe (PUP.Hacktool.Patcher) -> Quarantined and deleted successfully.
f:\system volume information\_restore{012a2212-307c-45ea-9d55-baba9bb8b8b8}\RP22\A0007274.exe (RiskWare.Tool.CK) -> Quarantined and deleted successfully.
f:\system volume information\_restore{012a2212-307c-45ea-9d55-baba9bb8b8b8}\RP22\A0007353.exe (PUP.Hacktool.Patcher) -> Quarantined and deleted successfully.
f:\system volume information\_restore{012a2212-307c-45ea-9d55-baba9bb8b8b8}\RP22\A0008235.exe (RiskWare.Tool.CK) -> Quarantined and deleted successfully.
f:\system volume information\_restore{012a2212-307c-45ea-9d55-baba9bb8b8b8}\RP22\A0008319.exe (PUP.Hacktool.Patcher) -> Quarantined and deleted successfully.
f:\system volume information\_restore{012a2212-307c-45ea-9d55-baba9bb8b8b8}\RP22\A0008681.exe (RiskWare.Tool.CK) -> Quarantined and deleted successfully.
f:\system volume information\_restore{012a2212-307c-45ea-9d55-baba9bb8b8b8}\RP22\A0008765.exe (PUP.Hacktool.Patcher) -> Quarantined and deleted successfully.
f:\system volume information\_restore{012a2212-307c-45ea-9d55-baba9bb8b8b8}\RP22\A0009108.exe (RiskWare.Tool.CK) -> Quarantined and deleted successfully.
f:\system volume information\_restore{012a2212-307c-45ea-9d55-baba9bb8b8b8}\RP22\A0009193.exe (PUP.Hacktool.Patcher) -> Quarantined and deleted successfully.
f:\system volume information\_restore{012a2212-307c-45ea-9d55-baba9bb8b8b8}\RP22\A0009534.exe (RiskWare.Tool.CK) -> Quarantined and deleted successfully.
f:\system volume information\_restore{012a2212-307c-45ea-9d55-baba9bb8b8b8}\RP22\A0009619.exe (PUP.Hacktool.Patcher) -> Quarantined and deleted successfully.
f:\system volume information\_restore{012a2212-307c-45ea-9d55-baba9bb8b8b8}\RP23\A0009684.exe (RiskWare.Tool.CK) -> Quarantined and deleted successfully.
f:\system volume information\_restore{012a2212-307c-45ea-9d55-baba9bb8b8b8}\RP23\A0009771.exe (PUP.Hacktool.Patcher) -> Quarantined and deleted successfully.
f:\system volume information\_restore{012a2212-307c-45ea-9d55-baba9bb8b8b8}\RP23\A0010089.exe (RiskWare.Tool.CK) -> Quarantined and deleted successfully.
f:\system volume information\_restore{012a2212-307c-45ea-9d55-baba9bb8b8b8}\RP23\A0010174.exe (PUP.Hacktool.Patcher) -> Quarantined and deleted successfully.
f:\system volume information\_restore{fc499292-c6a1-4bd0-8475-cef74188c574}\RP4\A0004832.exe (RiskWare.Tool.CK) -> Quarantined and deleted successfully.
f:\system volume information\_restore{fc499292-c6a1-4bd0-8475-cef74188c574}\RP4\A0004916.exe (PUP.Hacktool.Patcher) -> Quarantined and deleted successfully.
f:\خاص بسماح\program\internet download manager 6.07 build 8 final.arabseed.com\patch\internet.download.manager.6.xx.(2011)-patch.exe (PUP.Hacktool.Patcher) -> Quarantined and deleted successfully.
f:\programs\proggram\photoshop\السريل مع طريقة التثبيت\keygen_cs3\photoshop extended cs3 keygen.exe (RiskWare.Tool.CK) -> Quarantined and deleted successfully.
f:\programs\proggram\photoshop\السريل مع طريقة التثبيت\keygen_cs3\Keygen.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
f:\programs\proggram\internet download manager 6.07 build 8 final.arabseed.com\patch\internet.download.manager.6.xx.(2011)-patch.exe (PUP.Hacktool.Patcher) -> Quarantined and deleted successfully.
f:\programs\pc 2010\برنامج الترجمة\myegy.com.babylon pro 8.0.9 (r4).jxer\Crack\Patch.exe (PUP.Hacktool.Patcher) -> Quarantined and deleted successfully.
f:\programs\programs film\pc aflam 2011\myegy.com.bs player pro v2.35.985 multilangual.by.saysay2000\keygen.exe (Trojan.Dropper.PGen) -> Quarantined and deleted successfully.
f:\programs\no vieris\box_ntr2011.exe (RiskWare.Tool.CK) -> Quarantined and deleted successfully.



______________________



في انتظارك اخي الكريم واسف مره تانيه

 
حمل احدث اصدار من الرابط التالي

يجب عليك تسجيل الدخول او تسجيل لمشاهدة الرابط المخفي


نسخة محمولة محدثة لاخر اصدار دوما من موقع الشركة

ثم تابع شرح الفحص

fa33497a6dcbc00f7125a5e9c86b875f.png


1b26353b418be3416040fee21b21b01d.png


متوفر اللغة العربية ضمن الخيارات لمن يرغب

2b3141e312786215b6a60257f3d9dfe0.png


448c36b550c2236d07532f02624d2081.png


7f6dcf346a0abf125fbae716f1e13f15.png


59b265496c6617a722a5af31bffa4ff7.png


735f1ae4bd65702946a06ceb09197b84.png


3f2ac4c37775a1613d11553ca0ea8f3c.png


3dfb590f69fbd192e4ee43657e1ddd59.png


اختر اعادة التشغيل لاحقا حتى تتمكن من حفظ التقرير وعرضه على قسم الصيانة كما الشرح التالي

3711e467b86a834fd3db5a3504359c0d.png


18808771241b82993b5820aafa4b6e82.png


تخرج لك مفكرة تحتوي على التقرير .. انسخها كاملة وضعها بمشاركتك بقسم الصيانة

=============

التالي هو شرح استعادة ما اتلفته الفيروسات بواسطة البرنامج

274560a7f832e136a876de6177601748.png


400c6517cfd890124bf40bad5809ddef.png


5267f2c37ce4bced56bed98679e77fe9.png


ثم اغلق البرنامج .. سيطلب منك اعادة تشغيل الجهاز
وافق للضرورة حتى يكمل الاصلاح وتنظيف الاصابات

.
 
توقيع : format
حمل احدث اصدار من الرابط التالي

يجب عليك تسجيل الدخول او تسجيل لمشاهدة الرابط المخفي


نسخة محمولة محدثة لاخر اصدار دوما من موقع الشركة

ثم تابع شرح الفحص

fa33497a6dcbc00f7125a5e9c86b875f.png


1b26353b418be3416040fee21b21b01d.png


متوفر اللغة العربية ضمن الخيارات لمن يرغب

2b3141e312786215b6a60257f3d9dfe0.png


448c36b550c2236d07532f02624d2081.png


7f6dcf346a0abf125fbae716f1e13f15.png


59b265496c6617a722a5af31bffa4ff7.png


735f1ae4bd65702946a06ceb09197b84.png


3f2ac4c37775a1613d11553ca0ea8f3c.png


3dfb590f69fbd192e4ee43657e1ddd59.png


اختر اعادة التشغيل لاحقا حتى تتمكن من حفظ التقرير وعرضه على قسم الصيانة كما الشرح التالي

3711e467b86a834fd3db5a3504359c0d.png


18808771241b82993b5820aafa4b6e82.png


تخرج لك مفكرة تحتوي على التقرير .. انسخها كاملة وضعها بمشاركتك بقسم الصيانة

=============

التالي هو شرح استعادة ما اتلفته الفيروسات بواسطة البرنامج

274560a7f832e136a876de6177601748.png


400c6517cfd890124bf40bad5809ddef.png


5267f2c37ce4bced56bed98679e77fe9.png


ثم اغلق البرنامج .. سيطلب منك اعادة تشغيل الجهاز
وافق للضرورة حتى يكمل الاصلاح وتنظيف الاصابات

.


:er: الرابط لا يعمل عندي اخي الغالي :er:

:q:
 
فــــــــي انــــــظــــــارك اخــــــــي الـــــكـــــــريم

format

وياريت لو تقول ليه علي التحليل الاولي
شكك ان الكومبيوتر مخترق ام لا


وياريت لو مخترق تفضل معه لي الاخر حتي اقوم بتحصنه الجهاز و سد جميه الثغرات لو فيه


خصوصااااااااا لان
1 - نا مصمم استايلايت وعندي بيانات كتير مهمه

+

بقوم بستعمل الفيزاء و المستر الخاص بيه كتير بحكم شغله واخاف يتسرق بينات الفيزا او العملاء من بيانات و ارقم تلفون

 
اخوي جرب هالرابط لتحميل البرنامج الاخير اللي اعطاك اخوي فورمات

يجب عليك تسجيل الدخول او تسجيل لمشاهدة الرابط المخفي
 
توقيع : الوفاء طبعي
شكرا لك اخــــــي ولكن نفس المشكله

يـــــــــــاريـــــــــت رابط علي ميدا فاير ولا هوت فايل


 
توقيع : format
عودة
أعلى