باائع السعاده

زيزوومي جديد
إنضم
21 فبراير 2012
المشاركات
9
مستوى التفاعل
0
النقاط
0
الإقامة
قنا
غير متصل
السلام عليكم
باختصار ولن اطيل عليكم انا من اسبوعين حذفت افاست من الجهاز وخلال الفتره الماضيه كان الجهاز بدون برنامج حمايه.بعد فتره بدات تظهر لى مفكره عند تشغيل الجهاز سطبت كاسبر 7 وبرنامج للفلاش ميمورى وللاسف جيت اشغلهم تظهر لى مفكره كل ما احاول افتحهم او لما اشغل الجهاز
الفيروسات فى الجهاز تخلخلت لدرجه انى مش قادر افتح روابط تحميل البرامج الموجوده على الموقع
غيرت النسخه ولقيت نفس المشكله موجوده وفكرت اعمل فورمات للهرد لكن حبيت اشوف هتقدروا تحلوا المشكله انتم الاول ولا لا
ده تقرير الهاىجاك حاولت اعمل احذف الفيروس اللى لقيته مش راضى يتحذف
Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 09:52:01 م, on 22/02/2012
Platform: Windows XP SP3 (WinNT 5.01.2600)
MSIE: Internet Explorer v8.00 (8.00.6001.18702)
Boot mode: Normal

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\explorer.exe
C:\WINDOWS\system32\RUNDLL32.EXE
C:\WINDOWS\RTHDCPL.EXE
C:\Program Files\Real\RealPlayer\update\realsched.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\Windows Live\Messenger\msnmsgr.exe
C:\Program Files\Internet Download Manager\IDMan.exe
C:\DOCUME~1\SPEEDE~1\LOCALS~1\Temp\svchost.com
C:\DOCUME~1\SPEEDE~1\LOCALS~1\Temp\svchost.com
C:\Program Files\Internet Download Manager\IEMonitor.exe
C:\Program Files\Java\jre6\bin\jqs.exe
C:\WINDOWS\system32\nvsvc32.exe
C:\WINDOWS\System32\svchost.exe
G:\HiJack\Zyzoom_HijackThis.exe

R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page =
يجب عليك تسجيل الدخول او تسجيل لمشاهدة الرابط المخفي

R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page =
يجب عليك تسجيل الدخول او تسجيل لمشاهدة الرابط المخفي

R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL =
يجب عليك تسجيل الدخول او تسجيل لمشاهدة الرابط المخفي

R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL =
يجب عليك تسجيل الدخول او تسجيل لمشاهدة الرابط المخفي

R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page =
يجب عليك تسجيل الدخول او تسجيل لمشاهدة الرابط المخفي

R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page =
يجب عليك تسجيل الدخول او تسجيل لمشاهدة الرابط المخفي

R0 - HKLM\Software\Microsoft\Internet Explorer\Search,SearchAssistant =
R0 - HKLM\Software\Microsoft\Internet Explorer\Search,CustomizeSearch =
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Window Title = m_bedaiwy Internet Explorer
R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyServer = :8181
F2 - REG:system.ini: Shell=explorer.exe C:\WINDOWS\system32\fdisk.com
F3 - REG:win.ini: load=C:\DOCUME~1\SPEEDE~1\LOCALS~1\Temp\svchost.com
F3 - REG:win.ini: run=C:\DOCUME~1\SPEEDE~1\LOCALS~1\Temp\svchost.com
F2 - REG:system.ini: UserInit=C:\WINDOWS\system32\userinit.exe,C:\WINDOWS\system32\fdisk.com
O2 - BHO: IDM Helper - {0055C089-8582-441B-A0BF-17B458C2A3A8} - C:\Program Files\Internet Download Manager\IDMIECC.dll
O2 - BHO: IEVkbdBHO - {59273AB4-E7D3-40F9-A1A8-6FA9CCA1862C} - C:\Program Files\Kaspersky Lab\Kaspersky Internet Security 2010\ievkbd.dll
O2 - BHO: Java(tm) Plug-In SSV Helper - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre6\bin\ssv.dll
O2 - BHO: Windows Live Sign-in Helper - {9030D464-4C02-4ABF-8ECC-5164760863C6} - C:\Program Files\Common Files\Microsoft Shared\Windows Live\WindowsLiveLogin.dll
O2 - BHO: Java(tm) Plug-In 2 SSV Helper - {DBC80044-A445-435b-BC74-9C25C1C588A9} - C:\Program Files\Java\jre6\bin\jp2ssv.dll
O2 - BHO: link filter bho - {E33CF602-D945-461A-83F0-819F76A199F8} - C:\Program Files\Kaspersky Lab\Kaspersky Internet Security 2010\klwtbbho.dll
O2 - BHO: JQSIEStartDetectorImpl - {E7E6F031-17CE-4C07-BC86-EABFE594F69C} - C:\Program Files\Java\jre6\lib\deploy\jqs\ie\jqs_plugin.dll
O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE C:\WINDOWS\system32\NvCpl.dll,NvStartup
O4 - HKLM\..\Run: [nwiz] nwiz.exe /install
O4 - HKLM\..\Run: [NvMediaCenter] RUNDLL32.EXE C:\WINDOWS\system32\NvMcTray.dll,NvTaskbarInit
O4 - HKLM\..\Run: [RTHDCPL] RTHDCPL.EXE
O4 - HKLM\..\Run: [Alcmtr] ALCMTR.EXE
O4 - HKLM\..\Run: [TkBellExe] "C:\Program Files\Real\RealPlayer\update\realsched.exe" -osboot
O4 - HKLM\..\Run: [HotKey] C:\Documents and Settings\SpEeDeR Sp3\Templates\cache\SFCsrvc.pif
O4 - HKLM\..\Run: [User Agent] C:\WINDOWS\system32\fdisk.com
O4 - HKLM\..\Run: [AVP] "C:\Program Files\Kaspersky Lab\Kaspersky Internet Security 2010\avp.exe"
O4 - HKCU\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\ctfmon.exe
O4 - HKCU\..\Run: [msnmsgr] "C:\Program Files\Windows Live\Messenger\msnmsgr.exe" /background
O4 - HKCU\..\Run: [IDMan] C:\Program Files\Internet Download Manager\IDMan.exe /onboot
O4 - HKCU\..\Run: [HotKey] C:\Documents and Settings\SpEeDeR Sp3\Templates\cache\SFCsrvc.pif
O4 - HKCU\..\Run: [User Agent] C:\DOCUME~1\SPEEDE~1\LOCALS~1\Temp\svchost.com
O4 - HKUS\S-1-5-19\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'LOCAL SERVICE')
O4 - HKUS\S-1-5-19\..\RunOnce: [_nltide_3] rundll32 advpack.dll,LaunchINFSectionEx nLite.inf,C,,4,N (User 'LOCAL SERVICE')
O4 - HKUS\S-1-5-20\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'NETWORK SERVICE')
O4 - HKUS\S-1-5-20\..\RunOnce: [_nltide_3] rundll32 advpack.dll,LaunchINFSectionEx nLite.inf,C,,4,N (User 'NETWORK SERVICE')
O4 - HKUS\S-1-5-18\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'SYSTEM')
O4 - HKUS\S-1-5-18\..\RunOnce: [_nltide_3] rundll32 advpack.dll,LaunchINFSectionEx nLite.inf,C,,4,N (User 'SYSTEM')
O4 - HKUS\.DEFAULT\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'Default user')
O4 - HKUS\.DEFAULT\..\RunOnce: [_nltide_3] rundll32 advpack.dll,LaunchINFSectionEx nLite.inf,C,,4,N (User 'Default user')
O4 - Startup: sndvol32.exe
O4 - Global Startup: sndvol32.exe
O7 - HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System, DisableRegedit=1
O8 - Extra context menu item: تحميل الكل بواسطة Internet Download Manager - C:\Program Files\Internet Download Manager\IEGetAll.htm
O8 - Extra context menu item: تحميل بواسطة Internet Download Manager - C:\Program Files\Internet Download Manager\IEExt.htm
O9 - Extra button: &Virtual keyboard - {4248FE82-7FCB-46AC-B270-339F08212110} - C:\Program Files\Kaspersky Lab\Kaspersky Internet Security 2010\klwtbbho.dll
O9 - Extra button: URLs c&heck - {CCF151D8-D089-449F-A5A4-D9909053F20F} - C:\Program Files\Kaspersky Lab\Kaspersky Internet Security 2010\klwtbbho.dll
O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O13 - Gopher Prefix:
O23 - Service: Java Quick Starter (JavaQuickStarterService) - Sun Microsystems, Inc. - C:\Program Files\Java\jre6\bin\jqs.exe
O23 - Service: NVIDIA Display Driver Service (NVSvc) - NVIDIA Corporation - C:\WINDOWS\system32\nvsvc32.exe

--
End of file - 6483 bytes
 

توقيع : stoooooop
بعد الفحص تم الحذف
اثناء الحذف كانت يظهر لى مربع به هذه الجمله
the system cannot find the path specified
وخلفها المفكره الملعونه وكنت اقفلها كذا مره حتى تم الحذف تماما وهذا هو التقرير
Malwarebytes' Anti-Malware 1.51.2.1300
يجب عليك تسجيل الدخول او تسجيل لمشاهدة الرابط المخفي


Database version: 7622

Windows 5.1.2600 Service Pack 3
Internet Explorer 8.0.6001.18702

22/02/2012 11:05:43 م
mbam-log-2012-02-22 (23-05-43).txt

Scan type: Full scan (C:\|D:\|E:\|F:\|G:\|)
Objects scanned: 284217
Time elapsed: 41 minute(s), 24 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 10
Registry Values Infected: 7
Registry Data Items Infected: 11
Folders Infected: 0
Files Infected: 40

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ashdisp.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AVGNT.EXE (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AVP.EXE (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mmc.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msconfig.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\pctsgui.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\pctstray.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regedit.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\VPTRAY.EXE (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_AMSINT32 (Virus.Sality) -> Quarantined and deleted successfully.

Registry Values Infected:
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\User Agent (Trojan.Dropper) -> Value: User Agent -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HotKey (Trojan.Dropper) -> Value: HotKey -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HotKey (Trojan.Dropper) -> Value: HotKey -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\User Agent (Trojan.Dropper) -> Value: User Agent -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows\Load (Worm.AutoRun) -> Value: Load -> Delete on reboot.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows\Run (Worm.AutoRun) -> Value: Run -> Delete on reboot.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NofolderOptions (Hijack.FolderOptions) -> Value: NofolderOptions -> Quarantined and deleted successfully.

Registry Data Items Infected:
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows\Load (Trojan.Dropper) -> Bad: (C:\DOCUME~1\SPEEDE~1\LOCALS~1\Temp\svchost.com) Good: () -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows\Run (Trojan.Dropper) -> Bad: (C:\DOCUME~1\SPEEDE~1\LOCALS~1\Temp\svchost.com) Good: () -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit (Trojan.Dropper) -> Bad: (C:\WINDOWS\system32\fdisk.com) Good: () -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell (Trojan.Dropper) -> Bad: (C:\WINDOWS\system32\fdisk.com) Good: () -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableTaskMgr (PUM.Hijack.TaskManager) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools (PUM.Hijack.Regedit) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\AntiVirusDisableNotify (PUM.Disabled.SecurityCenter) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\FirewallDisableNotify (PUM.Disabled.SecurityCenter) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\UpdatesDisableNotify (PUM.Disabled.SecurityCenter) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell (Hijack.Shell) -> Bad: (explorer.exe C:\WINDOWS\system32\fdisk.com) Good: (Explorer.exe) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit (Hijack.Userinit) -> Bad: (C:\WINDOWS\system32\userinit.exe,C:\WINDOWS\system32\fdisk.com) Good: (Userinit.exe) -> Quarantined and deleted successfully.

Folders Infected:
(No malicious items detected)

Files Infected:
c:\Documents and Settings\SpEeDeR Sp3\Local Settings\Temp\svchost.com (Trojan.Dropper) -> Delete on reboot.
c:\Documents and Settings\SpEeDeR Sp3\Local Settings\Temp\nrshl.exe (Trojan.Dropper) -> Delete on reboot.
c:\Documents and Settings\SpEeDeR Sp3\Local Settings\Temp\winauhr.exe (Trojan.Downloader) -> Delete on reboot.
c:\documents and settings\speeder sp3\templates\cache\SFCsrvc.pif (Trojan.Dropper) -> Quarantined and deleted successfully.
c:\WINDOWS\system32\fdisk.com (Trojan.Dropper) -> Quarantined and deleted successfully.
c:\mjmr.exe (Malware.Packer.Gen) -> Quarantined and deleted successfully.
c:\Thumbs.db (Trojan.Dropper) -> Quarantined and deleted successfully.
c:\documents and settings\all users\start menu\Programs\Startup\sndvol32.exe (Trojan.Dropper) -> Quarantined and deleted successfully.
c:\documents and settings\speeder sp3\start menu\Programs\Startup\sndvol32.exe (Trojan.Dropper) -> Quarantined and deleted successfully.
c:\system volume information\_restore{1bcdef22-9bc6-4087-988e-c25d266d7f0b}\RP12\A0014869.exe (Trojan.Dropper) -> Quarantined and deleted successfully.
c:\system volume information\_restore{1bcdef22-9bc6-4087-988e-c25d266d7f0b}\RP12\A0015239.exe (Trojan.Dropper) -> Quarantined and deleted successfully.
c:\system volume information\_restore{1bcdef22-9bc6-4087-988e-c25d266d7f0b}\RP12\A0015408.com (Trojan.Dropper) -> Quarantined and deleted successfully.
c:\system volume information\_restore{1bcdef22-9bc6-4087-988e-c25d266d7f0b}\RP12\A0015416.pif (Trojan.Dropper) -> Quarantined and deleted successfully.
c:\system volume information\_restore{1bcdef22-9bc6-4087-988e-c25d266d7f0b}\RP12\A0015452.exe (Trojan.Dropper) -> Quarantined and deleted successfully.
c:\system volume information\_restore{1bcdef22-9bc6-4087-988e-c25d266d7f0b}\RP12\A0015550.COM (Trojan.Dropper) -> Quarantined and deleted successfully.
c:\system volume information\_restore{1bcdef22-9bc6-4087-988e-c25d266d7f0b}\RP12\A0015558.pif (Trojan.Dropper) -> Quarantined and deleted successfully.
c:\system volume information\_restore{1bcdef22-9bc6-4087-988e-c25d266d7f0b}\RP12\A0015573.exe (Trojan.Dropper) -> Quarantined and deleted successfully.
c:\system volume information\_restore{1bcdef22-9bc6-4087-988e-c25d266d7f0b}\RP12\A0015977.EXE (Trojan.Dropper) -> Quarantined and deleted successfully.
c:\system volume information\_restore{1bcdef22-9bc6-4087-988e-c25d266d7f0b}\RP12\A0016126.exe (Malware.Packer.Gen) -> Quarantined and deleted successfully.
c:\system volume information\_restore{1bcdef22-9bc6-4087-988e-c25d266d7f0b}\RP12\A0016320.COM (Trojan.Dropper) -> Quarantined and deleted successfully.
c:\system volume information\_restore{1bcdef22-9bc6-4087-988e-c25d266d7f0b}\RP12\A0016326.pif (Trojan.Dropper) -> Quarantined and deleted successfully.
c:\system volume information\_restore{1bcdef22-9bc6-4087-988e-c25d266d7f0b}\RP12\A0016333.exe (Trojan.Dropper) -> Quarantined and deleted successfully.
c:\system volume information\_restore{1bcdef22-9bc6-4087-988e-c25d266d7f0b}\RP12\A0016741.EXE (Trojan.Dropper) -> Quarantined and deleted successfully.
c:\system volume information\_restore{1bcdef22-9bc6-4087-988e-c25d266d7f0b}\RP12\A0016912.COM (Trojan.Dropper) -> Quarantined and deleted successfully.
c:\system volume information\_restore{1bcdef22-9bc6-4087-988e-c25d266d7f0b}\RP12\A0016918.pif (Trojan.Dropper) -> Quarantined and deleted successfully.
c:\system volume information\_restore{1bcdef22-9bc6-4087-988e-c25d266d7f0b}\RP12\A0016925.EXE (Trojan.Dropper) -> Quarantined and deleted successfully.
c:\system volume information\_restore{1bcdef22-9bc6-4087-988e-c25d266d7f0b}\RP12\A0016998.EXE (Trojan.Dropper) -> Quarantined and deleted successfully.
c:\Avenger\fdisk.com (Trojan.Dropper) -> Quarantined and deleted successfully.
c:\Avenger\Thumbs.db (Trojan.Dropper) -> Quarantined and deleted successfully.
c:\Avenger\sndvol32.exe-ren-150 (Trojan.Dropper) -> Quarantined and deleted successfully.
d:\Thumbs.db (Trojan.Dropper) -> Quarantined and deleted successfully.
d:\system volume information\_restore{1bcdef22-9bc6-4087-988e-c25d266d7f0b}\RP12\A0016287.exe (Malware.Packer.Gen) -> Quarantined and deleted successfully.
d:\system volume information\_restore{1bcdef22-9bc6-4087-988e-c25d266d7f0b}\RP12\A0017011.exe (Malware.Packer.Gen) -> Quarantined and deleted successfully.
e:\Thumbs.db (Trojan.Dropper) -> Quarantined and deleted successfully.
e:\system volume information\_restore{1bcdef22-9bc6-4087-988e-c25d266d7f0b}\RP12\A0016318.pif (Malware.Packer.Gen) -> Quarantined and deleted successfully.
e:\system volume information\_restore{1bcdef22-9bc6-4087-988e-c25d266d7f0b}\RP12\A0016910.pif (Malware.Packer.Gen) -> Quarantined and deleted successfully.
f:\Thumbs.db (Trojan.Dropper) -> Quarantined and deleted successfully.
f:\system volume information\_restore{1bcdef22-9bc6-4087-988e-c25d266d7f0b}\RP12\A0017056.pif (Malware.Packer.Gen) -> Quarantined and deleted successfully.
g:\Thumbs.db (Trojan.Dropper) -> Quarantined and deleted successfully.
g:\apnl.pif (Malware.Packer.Gen) -> Quarantined and deleted successfully.
 
طبق هذا الفحص

يجب عليك تسجيل الدخول او تسجيل لمشاهدة الرابط المخفي


قبل الفحص اقطع الاتصال بالانترنت
 
توقيع : stoooooop
انا عملت فحص بالامس كان التقرير كبير جدا بحيث تخطى الحد الاقصى
اليوم عملت فحص تانى وده التقرير الاخير



SUPERAntiSpyware Scan Log
يجب عليك تسجيل الدخول او تسجيل لمشاهدة الرابط المخفي


Generated 02/23/2012 at 10:23 AM

Application Version : 5.0.1144

Core Rules Database Version : 8266
Trace Rules Database Version: 6078

Scan type : Complete Scan
Total Scan Time : 00:51:37

Operating System Information
Windows XP Professional 32-bit, Service Pack 3 (Build 5.01.2600)
Administrator

Memory items scanned : 371
Memory threats detected : 1
Registry items scanned : 32272
Registry threats detected : 30
File items scanned : 23449
File threats detected : 5

Disabled.SecurityCenterOption
HKLM\SOFTWARE\MICROSOFT\SECURITY CENTER#ANTIVIRUSDISABLENOTIFY
HKLM\SOFTWARE\MICROSOFT\SECURITY CENTER#FIREWALLDISABLENOTIFY
HKLM\SOFTWARE\MICROSOFT\SECURITY CENTER#UPDATESDISABLENOTIFY

Disabled.TaskManager
HKU\S-1-5-21-746137067-412668190-682003330-500\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\POLICIES\SYSTEM#DISABLETASKMGR
HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System#DisableTaskMgr

Malware.Sality
HKLM\SYSTEM\CurrentControlSet\Services\amsint32
HKLM\SYSTEM\CurrentControlSet\Services\amsint32#Type
HKLM\SYSTEM\CurrentControlSet\Services\amsint32#Start
HKLM\SYSTEM\CurrentControlSet\Services\amsint32#ErrorControl
HKLM\SYSTEM\CurrentControlSet\Services\amsint32#ImagePath
HKLM\SYSTEM\CurrentControlSet\Services\amsint32#DisplayName
HKLM\SYSTEM\CurrentControlSet\Services\amsint32\Security
HKLM\SYSTEM\CurrentControlSet\Services\amsint32\Security#Security
HKLM\SYSTEM\CurrentControlSet\Services\amsint32\Enum
HKLM\SYSTEM\CurrentControlSet\Services\amsint32\Enum#0
HKLM\SYSTEM\CurrentControlSet\Services\amsint32\Enum#Count
HKLM\SYSTEM\CurrentControlSet\Services\amsint32\Enum#NextInstance
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_AMSINT32
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_AMSINT32#NextInstance
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_AMSINT32\0000
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_AMSINT32\0000#Service
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_AMSINT32\0000#Legacy
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_AMSINT32\0000#ConfigFlags
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_AMSINT32\0000#Class
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_AMSINT32\0000#ClassGUID
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_AMSINT32\0000#DeviceDesc
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_AMSINT32\0000#Capabilities
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_AMSINT32\0000\Control
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_AMSINT32\0000\Control#ActiveService

Trojan.Agent/Gen-Packed[LordPE]
G:\THUMBS.DB
G:\THUMBS.DB
C:\THUMBS.DB
C:\WINDOWS\Prefetch\THUMBS.DB-2F0AC7CF.pf

Trojan.Agent/Gen
C:\DOCUMENTS AND SETTINGS\SPEEDER SP3\LOCAL SETTINGS\TEMP\WINBDDFJ.EXE

Trojan.Agent/Gen-MailDrop/Spammer
C:\DOCUMENTS AND SETTINGS\SPEEDER SP3\LOCAL SETTINGS\TEMP\WINQKCBP.EXE

Disabled.RegistryEditor
HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System#DisableRegistryTools
 
حمل اداة الدكتور ويب من الرابط التالي

يجب عليك تسجيل الدخول او تسجيل لمشاهدة الرابط المخفي

واتبع الشرح لتنظيف جهازك وحفظ التقرير
شغل الاداة بدبل كلك ثم​

b5dab16e5de5db4c417d7e1ab6b709b3.png

847eae702c34ef1d29a04af1298e7b03.png

ecc038b9c85d240b50a43862cb30e207.png

43466e8c885decc132292f4775ab5406.png

7a64850e491bc4a0cfde49fe6ce2b732.png

d94825bc8efd42d3ebe27b9355384552.png

c087a58c8977afc70982b0d4c8dfbb5f.png

94801656e22a41fb257a588985ae63ad.png

d292894cb52978fa70594a666ef6ffcc.png

5897a14b095fe829ee3920215b50dc38.png

قم بضغط التقارير >>>
يجب عليك تسجيل الدخول او تسجيل لمشاهدة الرابط المخفي

وارفع الملف هنا

يجب عليك تسجيل الدخول او تسجيل لمشاهدة الرابط المخفي

 
توقيع : format
تم التحميل والفحص وبعد انتظار 18 ساعه البرنامج وقف والفيروسات حذفته من على الجهاز
جربت احمل كاسبر مش قادر حتى ادخل على روابط التحميل
جربت احمل نورتن التحميل وقف فى النص
انا بدات امل ويجينى احباط بصراحه
 
ادخل الموقع التالي لتحميل الأداة
يجب عليك تسجيل الدخول او تسجيل لمشاهدة الرابط المخفي


ونتابع شرح التحميل وطريقة الفحص بأداة الكاسبر
أولاً بعد الدخول للموقع سيتطلب تسجيل بيانات الإيميل
وهنا ليس بالضرورة وضع معلومات صحيحه فيمكن استخدام إيميل وهمي وأيضاً اسم وهمي كالتالي

3bc81c7a5dbffa89eb436c689c506b84.png


ثم ستظهر لنا روابط تحميل الأداة نطبق كما بالصورة للتحميل
نختار اللغة الإنقليزية

74725ec70ffd6b22fbb1514a7344adae.png


بعد الإنتهاء من التحميل نشغل الأداة ونتابع
هنا جاري التحضير للتثبيت

6a6819dcaef2f80c273f656bb81a4b1f.png


نوافق عالترخيص

0b67fcb195e75157def98e5d05098d7f.png


نطبق الإعدادات التالية قبل البدء بالفحص

29773e61bd744d07c62a1d430cfc0277.png


08a1aacc7312f520431aa38b0ee57203.png


نبدأ عملية الفحص

d3b568723f5299ccada6241650cfa0bb.png


جاري الفحص هنا وسيستغرق وقت طويل جداً لذلك نرجو التحلي بالصبر والإنتظار حتى يكتمل الفحص تماماً

ce239e2139c52cc5c1183690a7545b8f.png


انتهى الفحص ونتابع

2bd0367e8c96ad2c65b8fb0dae6d5730.png


الآن نعمل حفظ لتقرير الفحص

c6108761eb1967f8552183a29574b76b.png


7b30f33222f60ea879611211e437a370.png


لحظات وسيتم الحفظ

1a2d090348d1109359ff39653c3a4bc1.png


بعد ذلك يقدم التقرير لخبير الصيآنه في حال تم طلبه منك

--
 
توقيع : format
الرابط مش بييفتح واى رابط فيه برنامج حمايه مش بيفتح نهائيا
 
يا شباب فينكم مش معقول التجاهل ده مش قادرين تحلوا المشكله اقفلوا الموضوع وريحونا
 
توقيع : format
تم بحمد الله تثبيت برنامج نورتن 2011 وحل لى الكثير من المشاكل

عندى مشكله حاليا وهى التاسك منجر مش موجود اصلا
 
توقيع : format
حمل احدث اصدار من الرابط التالي

يجب عليك تسجيل الدخول او تسجيل لمشاهدة الرابط المخفي


نسخة محمولة محدثة لاخر اصدار دوما من موقع الشركة

ثم تابع شرح الفحص

fa33497a6dcbc00f7125a5e9c86b875f.png


1b26353b418be3416040fee21b21b01d.png


متوفر اللغة العربية ضمن الخيارات لمن يرغب

2b3141e312786215b6a60257f3d9dfe0.png


448c36b550c2236d07532f02624d2081.png


7f6dcf346a0abf125fbae716f1e13f15.png


59b265496c6617a722a5af31bffa4ff7.png


735f1ae4bd65702946a06ceb09197b84.png


3f2ac4c37775a1613d11553ca0ea8f3c.png


3dfb590f69fbd192e4ee43657e1ddd59.png


اختر اعادة التشغيل لاحقا حتى تتمكن من حفظ التقرير وعرضه على قسم الصيانة كما الشرح التالي

3711e467b86a834fd3db5a3504359c0d.png


18808771241b82993b5820aafa4b6e82.png


تخرج لك مفكرة تحتوي على التقرير .. انسخها كاملة وضعها بمشاركتك بقسم الصيانة

=============

التالي هو شرح استعادة ما اتلفته الفيروسات بواسطة البرنامج

274560a7f832e136a876de6177601748.png


400c6517cfd890124bf40bad5809ddef.png


5267f2c37ce4bced56bed98679e77fe9.png


ثم اغلق البرنامج .. سيطلب منك اعادة تشغيل الجهاز
وافق للضرورة حتى يكمل الاصلاح وتنظيف الاصابات

.
 
توقيع : format
بخصوص البرنامج الاول لم استطيع استعاده ال taskmanager
اما الثانى بجربته اكثر من مره هناك مجموعه فيروسات لا يستطيع حذفها اهمها الفيروس اللى اغلق task manager
 
عودة
أعلى