براء
زيزوومي جديد
غير متصل
من فضلك قم بتحديث الصفحة لمشاهدة المحتوى المخفي
السلام عليكم ورحمة الله وبركاته
ارجو ان تفيدوني لانه ليس لدي خبرة بالفيروسات
وهذا تقرير الأفيرا وتقرير الهايجاك
الأفيرا
Version information:
BUILD.DAT : 9.0.0.367 29020 Bytes 25/04/1430 11:35:00
AVSCAN.EXE : 9.0.3.5 466689 Bytes 22/04/1430 16:57:30
AVSCAN.DLL : 9.0.3.0 40705 Bytes 03/03/1430 18:58:24
LUKE.DLL : 9.0.3.2 209665 Bytes 25/02/1430 19:35:49
LUKERES.DLL : 9.0.2.0 12033 Bytes 03/03/1430 18:58:52
ANTIVIR0.VDF : 7.1.0.0 15603712 Bytes 27/10/1429 20:30:36
ANTIVIR1.VDF : 7.1.2.12 3336192 Bytes 16/02/1430 04:33:26
ANTIVIR2.VDF : 7.1.2.105 513536 Bytes 07/03/1430 15:41:14
ANTIVIR3.VDF : 7.1.2.127 110592 Bytes 09/03/1430 22:58:20
Engineversion : 8.2.0.100
AEVDF.DLL : 8.1.1.0 106868 Bytes 02/02/1430 01:36:42
AESCRIPT.DLL : 8.1.1.56 352634 Bytes 03/03/1430 04:01:56
AESCN.DLL : 8.1.1.7 127347 Bytes 17/02/1430 19:44:25
AERDL.DLL : 8.1.1.3 438645 Bytes 01/11/1429 02:24:41
AEPACK.DLL : 8.1.3.10 397686 Bytes 08/03/1430 21:06:10
AEOFFICE.DLL : 8.1.0.36 196987 Bytes 03/03/1430 04:01:56
AEHEUR.DLL : 8.1.0.100 1618295 Bytes 01/03/1430 23:49:16
AEHELP.DLL : 8.1.2.2 119158 Bytes 03/03/1430 04:01:56
AEGEN.DLL : 8.1.1.24 336244 Bytes 08/03/1430 21:06:10
AEEMU.DLL : 8.1.0.9 393588 Bytes 09/10/1429 22:32:40
AECORE.DLL : 8.1.6.6 176501 Bytes 22/02/1430 22:22:44
AEBB.DLL : 8.1.0.3 53618 Bytes 09/10/1429 22:32:40
AVWINLL.DLL : 9.0.0.3 18177 Bytes 14/12/1429 16:47:59
AVPREF.DLL : 9.0.0.1 43777 Bytes 07/12/1429 18:32:15
AVREP.DLL : 8.0.0.3 155905 Bytes 24/01/1430 22:34:28
AVREG.DLL : 9.0.0.0 36609 Bytes 07/12/1429 18:32:09
AVARKT.DLL : 9.0.0.3 292609 Bytes 28/03/1430 23:05:41
AVEVTLOG.DLL : 9.0.0.7 167169 Bytes 04/02/1430 18:37:08
SQLITE3.DLL : 3.6.1.0 326401 Bytes 02/02/1430 23:03:49
SMTPLIB.DLL : 9.2.0.25 28417 Bytes 07/02/1430 16:21:33
NETNT.DLL : 9.0.0.0 11521 Bytes 07/12/1429 18:32:10
RCIMAGE.DLL : 9.0.0.22 2901249 Bytes 15/03/1430 22:47:13
RCTEXT.DLL : 9.0.37.0 90369 Bytes 22/04/1430 18:04:17
Configuration settings for the scan:
Jobname.............................: Complete system scan
Configuration file..................: c:\program files\avira\antivir desktop\sysscan.avp
Logging.............................: low
Primary action......................: interactive
Secondary action....................: ignore
Scan master boot sector.............: on
Scan boot sector....................: on
Boot sectors........................: C:, D:, E:,
Process scan........................: on
Scan registry.......................: on
Search for rootkits.................: on
Integrity checking of system files..: off
Scan all files......................: All files
Scan archives.......................: on
Recursion depth.....................: 20
Smart extensions....................: on
Macro heuristic.....................: on
File heuristic......................: medium
Deviating risk categories...........: +APPL,+GAME,+JOKE,+PCK,+SPR,
Start of the scan: Sunday, May 03, 2009 00:34
Starting search for hidden objects.
c:\windows\system32\0e6b4503f3cd38e98c0e90dd8a3a1829.sys
[INFO] The file is not visible.
[DETECTION] Contains recognition pattern of the RKIT/Agent.39936 root kit
[INFO] No SpecVir entry was found!
[NOTE] A backup was created as '4a334986.qua' ( QUARANTINE )
c:\windows\system32\twain_32\local.ds
[INFO] The file is not visible.
[NOTE] A backup was created as '4a604990.qua' ( QUARANTINE )
c:\windows\system32\twain_32\user.ds
[INFO] The file is not visible.
[NOTE] A backup was created as '4a624994.qua' ( QUARANTINE )
c:\windows\system32\twain_32\user.ds.cla
[INFO] The file is not visible.
[NOTE] A backup was created as '4b8fc11d.qua' ( QUARANTINE )
c:\windows\system32\twain_32
[INFO] The directory is not visible.
[NOTE] A backup was created as '4a5e4998.qua' ( QUARANTINE )
HKEY_LOCAL_MACHINE\System\ControlSet001\Services\0e6b4503f3cd38e98c0e90dd8a3a1829\c
[INFO] The registry entry is invisible.
HKEY_LOCAL_MACHINE\System\ControlSet001\Services\0e6b4503f3cd38e98c0e90dd8a3a1829\type
[INFO] The registry entry is invisible.
HKEY_LOCAL_MACHINE\System\ControlSet001\Services\0e6b4503f3cd38e98c0e90dd8a3a1829\start
[INFO] The registry entry is invisible.
HKEY_LOCAL_MACHINE\System\ControlSet001\Services\0e6b4503f3cd38e98c0e90dd8a3a1829\errorcontrol
[INFO] The registry entry is invisible.
HKEY_LOCAL_MACHINE\System\ControlSet001\Services\0e6b4503f3cd38e98c0e90dd8a3a1829\tag
[INFO] The registry entry is invisible.
HKEY_LOCAL_MACHINE\System\ControlSet001\Services\0e6b4503f3cd38e98c0e90dd8a3a1829\imagepath
[INFO] The registry entry is invisible.
HKEY_LOCAL_MACHINE\System\ControlSet001\Services\0e6b4503f3cd38e98c0e90dd8a3a1829\displayname
[INFO] The registry entry is invisible.
HKEY_LOCAL_MACHINE\System\ControlSet001\Services\0e6b4503f3cd38e98c0e90dd8a3a1829\group
[INFO] The registry entry is invisible.
HKEY_LOCAL_MACHINE\System\ControlSet001\Services\0e6b4503f3cd38e98c0e90dd8a3a1829\Security\security
[INFO] The registry entry is invisible.
HKEY_LOCAL_MACHINE\System\ControlSet001\Enum\Root\LEGACY_0E6B4503F3CD38E98C0E90DD8A3A1829\nextinstance
[INFO] The registry entry is invisible.
HKEY_LOCAL_MACHINE\System\ControlSet001\Enum\Root\LEGACY_0E6B4503F3CD38E98C0E90DD8A3A1829\0000\service
[INFO] The registry entry is invisible.
HKEY_LOCAL_MACHINE\System\ControlSet001\Enum\Root\LEGACY_0E6B4503F3CD38E98C0E90DD8A3A1829\0000\legacy
[INFO] The registry entry is invisible.
HKEY_LOCAL_MACHINE\System\ControlSet001\Enum\Root\LEGACY_0E6B4503F3CD38E98C0E90DD8A3A1829\0000\configflags
[INFO] The registry entry is invisible.
HKEY_LOCAL_MACHINE\System\ControlSet001\Enum\Root\LEGACY_0E6B4503F3CD38E98C0E90DD8A3A1829\0000\class
[INFO] The registry entry is invisible.
HKEY_LOCAL_MACHINE\System\ControlSet001\Enum\Root\LEGACY_0E6B4503F3CD38E98C0E90DD8A3A1829\0000\classguid
[INFO] The registry entry is invisible.
HKEY_LOCAL_MACHINE\System\ControlSet001\Enum\Root\LEGACY_0E6B4503F3CD38E98C0E90DD8A3A1829\0000\devicedesc
[INFO] The registry entry is invisible.
HKEY_LOCAL_MACHINE\System\ControlSet001\Enum\Root\LEGACY_0E6B4503F3CD38E98C0E90DD8A3A1829\0000\capabilities
[INFO] The registry entry is invisible.
'42594' objects were checked, '22' hidden objects were found.
The scan of running processes will be started
Scan process 'avscan.exe' - '1' Module(s) have been scanned
Scan process 'wuauclt.exe' - '1' Module(s) have been scanned
Scan process 'avfwsvc.exe' - '1' Module(s) have been scanned
Scan process 'avwebgrd.exe' - '1' Module(s) have been scanned
Scan process 'avmailc.exe' - '1' Module(s) have been scanned
Scan process 'avguard.exe' - '1' Module(s) have been scanned
Scan process 'avcenter.exe' - '1' Module(s) have been scanned
Scan process 'avgnt.exe' - '1' Module(s) have been scanned
Scan process 'sched.exe' - '1' Module(s) have been scanned
Scan process 'IDMan.exe' - '1' Module(s) have been scanned
Scan process 'IEMonitor.exe' - '1' Module(s) have been scanned
Scan process 'iexplore.exe' - '1' Module(s) have been scanned
Scan process 'explorer.exe' - '1' Module(s) have been scanned
Scan process 'svchost.exe' - '1' Module(s) have been scanned
Scan process 'alg.exe' - '1' Module(s) have been scanned
Scan process 'YahooAUService.exe' - '1' Module(s) have been scanned
Scan process 'svchost.exe' - '1' Module(s) have been scanned
Scan process 'MDM.EXE' - '1' Module(s) have been scanned
Scan process 'svchost.exe' - '1' Module(s) have been scanned
Scan process 'ctfmon.exe' - '1' Module(s) have been scanned
Scan process 'spoolsv.exe' - '1' Module(s) have been scanned
Scan process 'svchost.exe' - '1' Module(s) have been scanned
Scan process 'svchost.exe' - '1' Module(s) have been scanned
Scan process 'svchost.exe' - '1' Module(s) have been scanned
Scan process 'svchost.exe' - '1' Module(s) have been scanned
Scan process 'svchost.exe' - '1' Module(s) have been scanned
Scan process 'lsass.exe' - '1' Module(s) have been scanned
Scan process 'services.exe' - '1' Module(s) have been scanned
Scan process 'winlogon.exe' - '1' Module(s) have been scanned
Scan process 'csrss.exe' - '1' Module(s) have been scanned
30 processes with 30 modules were scanned
Starting master boot sector scan:
Master boot sector HD0
[INFO] No virus was found!
Start scanning boot sectors:
Boot sector 'C:\'
[INFO] No virus was found!
Boot sector 'D:\'
[INFO] No virus was found!
Boot sector 'E:\'
[INFO] No virus was found!
Starting to scan executable files (registry).
The registry was scanned ( '54' files ).
Starting the file scan:
Begin scan in 'C:\'
C:\pagefile.sys
[WARNING] The file could not be opened!
[NOTE] This file is a Windows system file.
[NOTE] This file cannot be opened for scanning.
C:\System Volume Information\_restore{1780BE56-CD19-4A5C-910D-58F5DC50B778}\RP28\A0003014.exe
[DETECTION] Is the TR/Crypt.XPACK.Gen Trojan
C:\System Volume Information\_restore{1780BE56-CD19-4A5C-910D-58F5DC50B778}\RP31\A0003426.exe
[DETECTION] Is the TR/Crypt.XPACK.Gen Trojan
C:\System Volume Information\_restore{1780BE56-CD19-4A5C-910D-58F5DC50B778}\RP31\A0003427.exe
[DETECTION] Is the TR/Crypt.XPACK.Gen Trojan
C:\System Volume Information\_restore{1780BE56-CD19-4A5C-910D-58F5DC50B778}\RP37\A0009560.exe
[DETECTION] Contains recognition pattern of the APPL/HackAV.K application
C:\WINDOWS\system32\twex.exe
[WARNING] The file could not be opened!
Begin scan in 'D:\'
D:\System Volume Information\_restore{1780BE56-CD19-4A5C-910D-58F5DC50B778}\RP16\A0001232.exe
[0] Archive type: RAR SFX (self extracting)
--> findkey.exe
[DETECTION] Contains recognition pattern of the SPR/XP.Keyfinder program
--> xpkey.exe
[DETECTION] Contains recognition pattern of the SPR/PSW.RAS.A.2 program
--> officekey.exe
[DETECTION] Contains recognition pattern of the SPR/PSW.RAS.A.3 program
Begin scan in 'E:\'
E:\مجلد جديد\بسملة وسلام\0025051md0K.gif
[DETECTION] Is the TR/Click.HTML.IFrame.TB Trojan
E:\مجلد جديد\بسملة وسلام\2458241957_d305fd290a_o.gif
[DETECTION] Is the TR/Click.HTML.IFrame.TB.4 Trojan
E:\مجلد جديد\بسملة وسلام\2459539238_cdd1291bb0_o.gif
[DETECTION] Is the TR/Click.HTML.IFrame.TB.1 Trojan
E:\مجلد جديد\بسملة وسلام\mtzxluwndzgxeznynnyail3.gif
[DETECTION] Is the TR/Click.HTML.IFrame.TB.1 Trojan
Beginning disinfection:
C:\System Volume Information\_restore{1780BE56-CD19-4A5C-910D-58F5DC50B778}\RP28\A0003014.exe
[DETECTION] Is the TR/Crypt.XPACK.Gen Trojan
[NOTE] The file was moved to '4a2d4df5.qua'!
C:\System Volume Information\_restore{1780BE56-CD19-4A5C-910D-58F5DC50B778}\RP31\A0003426.exe
[DETECTION] Is the TR/Crypt.XPACK.Gen Trojan
[NOTE] The file was moved to '49fb11ce.qua'!
C:\System Volume Information\_restore{1780BE56-CD19-4A5C-910D-58F5DC50B778}\RP31\A0003427.exe
[DETECTION] Is the TR/Crypt.XPACK.Gen Trojan
[NOTE] The file was moved to '49f19e2e.qua'!
C:\System Volume Information\_restore{1780BE56-CD19-4A5C-910D-58F5DC50B778}\RP37\A0009560.exe
[DETECTION] Contains recognition pattern of the APPL/HackAV.K application
[NOTE] The file was moved to '4bf4fd5e.qua'!
D:\System Volume Information\_restore{1780BE56-CD19-4A5C-910D-58F5DC50B778}\RP16\A0001232.exe
[NOTE] The file was moved to '49f979ae.qua'!
E:\مجلد جديد\بسملة وسلام\0025051md0K.gif
[DETECTION] Is the TR/Click.HTML.IFrame.TB Trojan
[NOTE] The file was moved to '4a2f4df5.qua'!
E:\مجلد جديد\بسملة وسلام\2458241957_d305fd290a_o.gif
[DETECTION] Is the TR/Click.HTML.IFrame.TB.4 Trojan
[NOTE] The file was moved to '4a324df9.qua'!
E:\مجلد جديد\بسملة وسلام\2459539238_cdd1291bb0_o.gif
[DETECTION] Is the TR/Click.HTML.IFrame.TB.1 Trojan
[NOTE] The file was moved to '49e04182.qua'!
E:\مجلد جديد\بسملة وسلام\mtzxluwndzgxeznynnyail3.gif
[DETECTION] Is the TR/Click.HTML.IFrame.TB.1 Trojan
[NOTE] The file was moved to '4a774e39.qua'!
End of the scan: Sunday, May 03, 2009 00:54
Used time: 19:35 Minute(s)
The scan has been done completely.
3695 Scanned directories
374801 Files were scanned
12 Viruses and/or unwanted programs were found
0 Files were classified as suspicious
0 files were deleted
0 Viruses and unwanted programs were repaired
14 Files were moved to quarantine
0 Files were renamed
2 Files cannot be scanned
374787 Files not concerned
1373 Archives were scanned
2 Warnings
15 Notes
42594 Objects were scanned with rootkit scan
22 Hidden objects were found
الهايجاك
C:\WINDOWS\system32\csrss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\system32\ctfmon.exe
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\system32\svchost.exe
C:\Program Files\Avira\AntiVir Desktop\avfwsvc.exe
C:\Program Files\Avira\AntiVir Desktop\avguard.exe
C:\Program Files\Common Files\Microsoft Shared\VS7DEBUG\MDM.EXE
C:\WINDOWS\system32\svchost.exe
C:\Program Files\Yahoo!\SoftwareUpdate\YahooAUService.exe
C:\Program Files\Avira\AntiVir Desktop\avmailc.exe
C:\Program Files\Avira\AntiVir Desktop\AVWEBGRD.EXE
C:\WINDOWS\System32\alg.exe
C:\Program Files\Internet Download Manager\IEMonitor.exe
C:\Program Files\Avira\AntiVir Desktop\sched.exe
C:\Documents and Settings\winxp sp2\Desktop\HijackThis.exe
C:\WINDOWS\system32\wbem\wmiprvse.exe
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page =
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page =
R1 - HKCU\Software\Microsoft\Internet Connection Wizard,ShellNext =
F2 - REG:system.ini: UserInit=C:\WINDOWS\system32\userinit.exe,C:\WINDOWS\system32\drivers\services.exe,C:\WINDOWS\system32\twext.exe,C:\WINDOWS\system32\twex.exe,
O2 - BHO: IDM Helper - {0055C089-8582-441B-A0BF-17B458C2A3A8} - C:\Program Files\Internet Download Manager\IDMIECC.dll
O2 - BHO: MMklkl - {1428A472-5260-404E-9977-7ECDF1DAF936} - (no file)
O2 - BHO: RealPlayer Download and Record Plugin for Internet Explorer - {3049C3E9-B461-4BC5-8870-4C09146192CA} - C:\Program Files\Real\RealPlayer\rpbrowserrecordplugin.dll
O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre1.6.0\bin\ssv.dll
O2 - BHO: Windows Live Sign-in Helper - {9030D464-4C02-4ABF-8ECC-5164760863C6} - C:\Program Files\Common Files\Microsoft Shared\Windows Live\WindowsLiveLogin.dll
O4 - HKLM\..\Run: [avgnt] "C:\Program Files\Avira\AntiVir Desktop\avgnt.exe" /min
O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
O4 - HKCU\..\Run: [IDMan] C:\Program Files\Internet Download Manager\IDMan.exe /onboot
O4 - S-1-5-18 Startup: userinit.exe (User 'SYSTEM')
O4 - .DEFAULT Startup: userinit.exe (User 'Default user')
O6 - HKCU\Software\Policies\Microsoft\Internet Explorer\Control Panel present
O6 - HKLM\Software\Policies\Microsoft\Internet Explorer\Control Panel present
O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~2\OFFICE11\EXCEL.EXE/3000
O8 - Extra context menu item: تحميل الكل بواسطة Internet Download Manager - C:\Program Files\Internet Download Manager\IEGetAll.htm
O8 - Extra context menu item: تحميل بواسطة Internet Download Manager - C:\Program Files\Internet Download Manager\IEExt.htm
O8 - Extra context menu item: تحميل محتوى FLV بواسطة Internet Download Manager - C:\Program Files\Internet Download Manager\IEGetVL.htm
O9 - Extra button: (no name) - {85d1f590-48f4-11d9-9669-0800200c9a66} - C:\WINDOWS\bdoscandel.exe
O9 - Extra 'Tools' menuitem: Uninstall BitDefender Online Scanner v8 - {85d1f590-48f4-11d9-9669-0800200c9a66} - C:\WINDOWS\bdoscandel.exe
O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~2\OFFICE11\REFIEBAR.DLL
O9 - Extra button: Yahoo! Messenger - {E5D12C4E-7B4F-11D3-B5C9-0050045C3C96} - C:\Program Files\Yahoo!\Messenger\YahooMessenger.exe
O9 - Extra 'Tools' menuitem: Yahoo! Messenger - {E5D12C4E-7B4F-11D3-B5C9-0050045C3C96} - C:\Program Files\Yahoo!\Messenger\YahooMessenger.exe
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O16 - DPF: {5D86DDB5-BDF9-441B-9E9E-D4730F4EE499} (BDSCANONLINE Control) -
O23 - Service: Avira Firewall (AntiVirFirewallService) - Avira GmbH - C:\Program Files\Avira\AntiVir Desktop\avfwsvc.exe
O23 - Service: Avira AntiVir MailGuard (AntiVirMailService) - Avira GmbH - C:\Program Files\Avira\AntiVir Desktop\avmailc.exe
O23 - Service: Avira AntiVir Scheduler (AntiVirSchedulerService) - Avira GmbH - C:\Program Files\Avira\AntiVir Desktop\sched.exe
O23 - Service: Avira AntiVir Guard (AntiVirService) - Avira GmbH - C:\Program Files\Avira\AntiVir Desktop\avguard.exe
O23 - Service: Avira AntiVir WebGuard (AntiVirWebService) - Avira GmbH - C:\Program Files\Avira\AntiVir Desktop\AVWEBGRD.EXE
O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Common Files\InstallShield\Driver\11\Intel 32\IDriverT.exe
O23 - Service: iPod Service - Apple Computer, Inc. - C:\Program Files\iPod\bin\iPodService.exe
O23 - Service: Yahoo! Updater (YahooAUService) - Yahoo! Inc. - C:\Program Files\Yahoo!\SoftwareUpdate\YahooAUService.exe
--
End of file - 5404 bytes
ومشكورين
ارجو ان تفيدوني لانه ليس لدي خبرة بالفيروسات
وهذا تقرير الأفيرا وتقرير الهايجاك
الأفيرا
Version information:
BUILD.DAT : 9.0.0.367 29020 Bytes 25/04/1430 11:35:00
AVSCAN.EXE : 9.0.3.5 466689 Bytes 22/04/1430 16:57:30
AVSCAN.DLL : 9.0.3.0 40705 Bytes 03/03/1430 18:58:24
LUKE.DLL : 9.0.3.2 209665 Bytes 25/02/1430 19:35:49
LUKERES.DLL : 9.0.2.0 12033 Bytes 03/03/1430 18:58:52
ANTIVIR0.VDF : 7.1.0.0 15603712 Bytes 27/10/1429 20:30:36
ANTIVIR1.VDF : 7.1.2.12 3336192 Bytes 16/02/1430 04:33:26
ANTIVIR2.VDF : 7.1.2.105 513536 Bytes 07/03/1430 15:41:14
ANTIVIR3.VDF : 7.1.2.127 110592 Bytes 09/03/1430 22:58:20
Engineversion : 8.2.0.100
AEVDF.DLL : 8.1.1.0 106868 Bytes 02/02/1430 01:36:42
AESCRIPT.DLL : 8.1.1.56 352634 Bytes 03/03/1430 04:01:56
AESCN.DLL : 8.1.1.7 127347 Bytes 17/02/1430 19:44:25
AERDL.DLL : 8.1.1.3 438645 Bytes 01/11/1429 02:24:41
AEPACK.DLL : 8.1.3.10 397686 Bytes 08/03/1430 21:06:10
AEOFFICE.DLL : 8.1.0.36 196987 Bytes 03/03/1430 04:01:56
AEHEUR.DLL : 8.1.0.100 1618295 Bytes 01/03/1430 23:49:16
AEHELP.DLL : 8.1.2.2 119158 Bytes 03/03/1430 04:01:56
AEGEN.DLL : 8.1.1.24 336244 Bytes 08/03/1430 21:06:10
AEEMU.DLL : 8.1.0.9 393588 Bytes 09/10/1429 22:32:40
AECORE.DLL : 8.1.6.6 176501 Bytes 22/02/1430 22:22:44
AEBB.DLL : 8.1.0.3 53618 Bytes 09/10/1429 22:32:40
AVWINLL.DLL : 9.0.0.3 18177 Bytes 14/12/1429 16:47:59
AVPREF.DLL : 9.0.0.1 43777 Bytes 07/12/1429 18:32:15
AVREP.DLL : 8.0.0.3 155905 Bytes 24/01/1430 22:34:28
AVREG.DLL : 9.0.0.0 36609 Bytes 07/12/1429 18:32:09
AVARKT.DLL : 9.0.0.3 292609 Bytes 28/03/1430 23:05:41
AVEVTLOG.DLL : 9.0.0.7 167169 Bytes 04/02/1430 18:37:08
SQLITE3.DLL : 3.6.1.0 326401 Bytes 02/02/1430 23:03:49
SMTPLIB.DLL : 9.2.0.25 28417 Bytes 07/02/1430 16:21:33
NETNT.DLL : 9.0.0.0 11521 Bytes 07/12/1429 18:32:10
RCIMAGE.DLL : 9.0.0.22 2901249 Bytes 15/03/1430 22:47:13
RCTEXT.DLL : 9.0.37.0 90369 Bytes 22/04/1430 18:04:17
Configuration settings for the scan:
Jobname.............................: Complete system scan
Configuration file..................: c:\program files\avira\antivir desktop\sysscan.avp
Logging.............................: low
Primary action......................: interactive
Secondary action....................: ignore
Scan master boot sector.............: on
Scan boot sector....................: on
Boot sectors........................: C:, D:, E:,
Process scan........................: on
Scan registry.......................: on
Search for rootkits.................: on
Integrity checking of system files..: off
Scan all files......................: All files
Scan archives.......................: on
Recursion depth.....................: 20
Smart extensions....................: on
Macro heuristic.....................: on
File heuristic......................: medium
Deviating risk categories...........: +APPL,+GAME,+JOKE,+PCK,+SPR,
Start of the scan: Sunday, May 03, 2009 00:34
Starting search for hidden objects.
c:\windows\system32\0e6b4503f3cd38e98c0e90dd8a3a1829.sys
[INFO] The file is not visible.
[DETECTION] Contains recognition pattern of the RKIT/Agent.39936 root kit
[INFO] No SpecVir entry was found!
[NOTE] A backup was created as '4a334986.qua' ( QUARANTINE )
c:\windows\system32\twain_32\local.ds
[INFO] The file is not visible.
[NOTE] A backup was created as '4a604990.qua' ( QUARANTINE )
c:\windows\system32\twain_32\user.ds
[INFO] The file is not visible.
[NOTE] A backup was created as '4a624994.qua' ( QUARANTINE )
c:\windows\system32\twain_32\user.ds.cla
[INFO] The file is not visible.
[NOTE] A backup was created as '4b8fc11d.qua' ( QUARANTINE )
c:\windows\system32\twain_32
[INFO] The directory is not visible.
[NOTE] A backup was created as '4a5e4998.qua' ( QUARANTINE )
HKEY_LOCAL_MACHINE\System\ControlSet001\Services\0e6b4503f3cd38e98c0e90dd8a3a1829\c
[INFO] The registry entry is invisible.
HKEY_LOCAL_MACHINE\System\ControlSet001\Services\0e6b4503f3cd38e98c0e90dd8a3a1829\type
[INFO] The registry entry is invisible.
HKEY_LOCAL_MACHINE\System\ControlSet001\Services\0e6b4503f3cd38e98c0e90dd8a3a1829\start
[INFO] The registry entry is invisible.
HKEY_LOCAL_MACHINE\System\ControlSet001\Services\0e6b4503f3cd38e98c0e90dd8a3a1829\errorcontrol
[INFO] The registry entry is invisible.
HKEY_LOCAL_MACHINE\System\ControlSet001\Services\0e6b4503f3cd38e98c0e90dd8a3a1829\tag
[INFO] The registry entry is invisible.
HKEY_LOCAL_MACHINE\System\ControlSet001\Services\0e6b4503f3cd38e98c0e90dd8a3a1829\imagepath
[INFO] The registry entry is invisible.
HKEY_LOCAL_MACHINE\System\ControlSet001\Services\0e6b4503f3cd38e98c0e90dd8a3a1829\displayname
[INFO] The registry entry is invisible.
HKEY_LOCAL_MACHINE\System\ControlSet001\Services\0e6b4503f3cd38e98c0e90dd8a3a1829\group
[INFO] The registry entry is invisible.
HKEY_LOCAL_MACHINE\System\ControlSet001\Services\0e6b4503f3cd38e98c0e90dd8a3a1829\Security\security
[INFO] The registry entry is invisible.
HKEY_LOCAL_MACHINE\System\ControlSet001\Enum\Root\LEGACY_0E6B4503F3CD38E98C0E90DD8A3A1829\nextinstance
[INFO] The registry entry is invisible.
HKEY_LOCAL_MACHINE\System\ControlSet001\Enum\Root\LEGACY_0E6B4503F3CD38E98C0E90DD8A3A1829\0000\service
[INFO] The registry entry is invisible.
HKEY_LOCAL_MACHINE\System\ControlSet001\Enum\Root\LEGACY_0E6B4503F3CD38E98C0E90DD8A3A1829\0000\legacy
[INFO] The registry entry is invisible.
HKEY_LOCAL_MACHINE\System\ControlSet001\Enum\Root\LEGACY_0E6B4503F3CD38E98C0E90DD8A3A1829\0000\configflags
[INFO] The registry entry is invisible.
HKEY_LOCAL_MACHINE\System\ControlSet001\Enum\Root\LEGACY_0E6B4503F3CD38E98C0E90DD8A3A1829\0000\class
[INFO] The registry entry is invisible.
HKEY_LOCAL_MACHINE\System\ControlSet001\Enum\Root\LEGACY_0E6B4503F3CD38E98C0E90DD8A3A1829\0000\classguid
[INFO] The registry entry is invisible.
HKEY_LOCAL_MACHINE\System\ControlSet001\Enum\Root\LEGACY_0E6B4503F3CD38E98C0E90DD8A3A1829\0000\devicedesc
[INFO] The registry entry is invisible.
HKEY_LOCAL_MACHINE\System\ControlSet001\Enum\Root\LEGACY_0E6B4503F3CD38E98C0E90DD8A3A1829\0000\capabilities
[INFO] The registry entry is invisible.
'42594' objects were checked, '22' hidden objects were found.
The scan of running processes will be started
Scan process 'avscan.exe' - '1' Module(s) have been scanned
Scan process 'wuauclt.exe' - '1' Module(s) have been scanned
Scan process 'avfwsvc.exe' - '1' Module(s) have been scanned
Scan process 'avwebgrd.exe' - '1' Module(s) have been scanned
Scan process 'avmailc.exe' - '1' Module(s) have been scanned
Scan process 'avguard.exe' - '1' Module(s) have been scanned
Scan process 'avcenter.exe' - '1' Module(s) have been scanned
Scan process 'avgnt.exe' - '1' Module(s) have been scanned
Scan process 'sched.exe' - '1' Module(s) have been scanned
Scan process 'IDMan.exe' - '1' Module(s) have been scanned
Scan process 'IEMonitor.exe' - '1' Module(s) have been scanned
Scan process 'iexplore.exe' - '1' Module(s) have been scanned
Scan process 'explorer.exe' - '1' Module(s) have been scanned
Scan process 'svchost.exe' - '1' Module(s) have been scanned
Scan process 'alg.exe' - '1' Module(s) have been scanned
Scan process 'YahooAUService.exe' - '1' Module(s) have been scanned
Scan process 'svchost.exe' - '1' Module(s) have been scanned
Scan process 'MDM.EXE' - '1' Module(s) have been scanned
Scan process 'svchost.exe' - '1' Module(s) have been scanned
Scan process 'ctfmon.exe' - '1' Module(s) have been scanned
Scan process 'spoolsv.exe' - '1' Module(s) have been scanned
Scan process 'svchost.exe' - '1' Module(s) have been scanned
Scan process 'svchost.exe' - '1' Module(s) have been scanned
Scan process 'svchost.exe' - '1' Module(s) have been scanned
Scan process 'svchost.exe' - '1' Module(s) have been scanned
Scan process 'svchost.exe' - '1' Module(s) have been scanned
Scan process 'lsass.exe' - '1' Module(s) have been scanned
Scan process 'services.exe' - '1' Module(s) have been scanned
Scan process 'winlogon.exe' - '1' Module(s) have been scanned
Scan process 'csrss.exe' - '1' Module(s) have been scanned
30 processes with 30 modules were scanned
Starting master boot sector scan:
Master boot sector HD0
[INFO] No virus was found!
Start scanning boot sectors:
Boot sector 'C:\'
[INFO] No virus was found!
Boot sector 'D:\'
[INFO] No virus was found!
Boot sector 'E:\'
[INFO] No virus was found!
Starting to scan executable files (registry).
The registry was scanned ( '54' files ).
Starting the file scan:
Begin scan in 'C:\'
C:\pagefile.sys
[WARNING] The file could not be opened!
[NOTE] This file is a Windows system file.
[NOTE] This file cannot be opened for scanning.
C:\System Volume Information\_restore{1780BE56-CD19-4A5C-910D-58F5DC50B778}\RP28\A0003014.exe
[DETECTION] Is the TR/Crypt.XPACK.Gen Trojan
C:\System Volume Information\_restore{1780BE56-CD19-4A5C-910D-58F5DC50B778}\RP31\A0003426.exe
[DETECTION] Is the TR/Crypt.XPACK.Gen Trojan
C:\System Volume Information\_restore{1780BE56-CD19-4A5C-910D-58F5DC50B778}\RP31\A0003427.exe
[DETECTION] Is the TR/Crypt.XPACK.Gen Trojan
C:\System Volume Information\_restore{1780BE56-CD19-4A5C-910D-58F5DC50B778}\RP37\A0009560.exe
[DETECTION] Contains recognition pattern of the APPL/HackAV.K application
C:\WINDOWS\system32\twex.exe
[WARNING] The file could not be opened!
Begin scan in 'D:\'
D:\System Volume Information\_restore{1780BE56-CD19-4A5C-910D-58F5DC50B778}\RP16\A0001232.exe
[0] Archive type: RAR SFX (self extracting)
--> findkey.exe
[DETECTION] Contains recognition pattern of the SPR/XP.Keyfinder program
--> xpkey.exe
[DETECTION] Contains recognition pattern of the SPR/PSW.RAS.A.2 program
--> officekey.exe
[DETECTION] Contains recognition pattern of the SPR/PSW.RAS.A.3 program
Begin scan in 'E:\'
E:\مجلد جديد\بسملة وسلام\0025051md0K.gif
[DETECTION] Is the TR/Click.HTML.IFrame.TB Trojan
E:\مجلد جديد\بسملة وسلام\2458241957_d305fd290a_o.gif
[DETECTION] Is the TR/Click.HTML.IFrame.TB.4 Trojan
E:\مجلد جديد\بسملة وسلام\2459539238_cdd1291bb0_o.gif
[DETECTION] Is the TR/Click.HTML.IFrame.TB.1 Trojan
E:\مجلد جديد\بسملة وسلام\mtzxluwndzgxeznynnyail3.gif
[DETECTION] Is the TR/Click.HTML.IFrame.TB.1 Trojan
Beginning disinfection:
C:\System Volume Information\_restore{1780BE56-CD19-4A5C-910D-58F5DC50B778}\RP28\A0003014.exe
[DETECTION] Is the TR/Crypt.XPACK.Gen Trojan
[NOTE] The file was moved to '4a2d4df5.qua'!
C:\System Volume Information\_restore{1780BE56-CD19-4A5C-910D-58F5DC50B778}\RP31\A0003426.exe
[DETECTION] Is the TR/Crypt.XPACK.Gen Trojan
[NOTE] The file was moved to '49fb11ce.qua'!
C:\System Volume Information\_restore{1780BE56-CD19-4A5C-910D-58F5DC50B778}\RP31\A0003427.exe
[DETECTION] Is the TR/Crypt.XPACK.Gen Trojan
[NOTE] The file was moved to '49f19e2e.qua'!
C:\System Volume Information\_restore{1780BE56-CD19-4A5C-910D-58F5DC50B778}\RP37\A0009560.exe
[DETECTION] Contains recognition pattern of the APPL/HackAV.K application
[NOTE] The file was moved to '4bf4fd5e.qua'!
D:\System Volume Information\_restore{1780BE56-CD19-4A5C-910D-58F5DC50B778}\RP16\A0001232.exe
[NOTE] The file was moved to '49f979ae.qua'!
E:\مجلد جديد\بسملة وسلام\0025051md0K.gif
[DETECTION] Is the TR/Click.HTML.IFrame.TB Trojan
[NOTE] The file was moved to '4a2f4df5.qua'!
E:\مجلد جديد\بسملة وسلام\2458241957_d305fd290a_o.gif
[DETECTION] Is the TR/Click.HTML.IFrame.TB.4 Trojan
[NOTE] The file was moved to '4a324df9.qua'!
E:\مجلد جديد\بسملة وسلام\2459539238_cdd1291bb0_o.gif
[DETECTION] Is the TR/Click.HTML.IFrame.TB.1 Trojan
[NOTE] The file was moved to '49e04182.qua'!
E:\مجلد جديد\بسملة وسلام\mtzxluwndzgxeznynnyail3.gif
[DETECTION] Is the TR/Click.HTML.IFrame.TB.1 Trojan
[NOTE] The file was moved to '4a774e39.qua'!
End of the scan: Sunday, May 03, 2009 00:54
Used time: 19:35 Minute(s)
The scan has been done completely.
3695 Scanned directories
374801 Files were scanned
12 Viruses and/or unwanted programs were found
0 Files were classified as suspicious
0 files were deleted
0 Viruses and unwanted programs were repaired
14 Files were moved to quarantine
0 Files were renamed
2 Files cannot be scanned
374787 Files not concerned
1373 Archives were scanned
2 Warnings
15 Notes
42594 Objects were scanned with rootkit scan
22 Hidden objects were found
الهايجاك
C:\WINDOWS\system32\csrss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\system32\ctfmon.exe
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\system32\svchost.exe
C:\Program Files\Avira\AntiVir Desktop\avfwsvc.exe
C:\Program Files\Avira\AntiVir Desktop\avguard.exe
C:\Program Files\Common Files\Microsoft Shared\VS7DEBUG\MDM.EXE
C:\WINDOWS\system32\svchost.exe
C:\Program Files\Yahoo!\SoftwareUpdate\YahooAUService.exe
C:\Program Files\Avira\AntiVir Desktop\avmailc.exe
C:\Program Files\Avira\AntiVir Desktop\AVWEBGRD.EXE
C:\WINDOWS\System32\alg.exe
C:\Program Files\Internet Download Manager\IEMonitor.exe
C:\Program Files\Avira\AntiVir Desktop\sched.exe
C:\Documents and Settings\winxp sp2\Desktop\HijackThis.exe
C:\WINDOWS\system32\wbem\wmiprvse.exe
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page =
يجب عليك
تسجيل الدخول
او
تسجيل لمشاهدة الرابط المخفي
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page =
يجب عليك
تسجيل الدخول
او
تسجيل لمشاهدة الرابط المخفي
R1 - HKCU\Software\Microsoft\Internet Connection Wizard,ShellNext =
يجب عليك
تسجيل الدخول
او
تسجيل لمشاهدة الرابط المخفي
F2 - REG:system.ini: UserInit=C:\WINDOWS\system32\userinit.exe,C:\WINDOWS\system32\drivers\services.exe,C:\WINDOWS\system32\twext.exe,C:\WINDOWS\system32\twex.exe,
O2 - BHO: IDM Helper - {0055C089-8582-441B-A0BF-17B458C2A3A8} - C:\Program Files\Internet Download Manager\IDMIECC.dll
O2 - BHO: MMklkl - {1428A472-5260-404E-9977-7ECDF1DAF936} - (no file)
O2 - BHO: RealPlayer Download and Record Plugin for Internet Explorer - {3049C3E9-B461-4BC5-8870-4C09146192CA} - C:\Program Files\Real\RealPlayer\rpbrowserrecordplugin.dll
O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre1.6.0\bin\ssv.dll
O2 - BHO: Windows Live Sign-in Helper - {9030D464-4C02-4ABF-8ECC-5164760863C6} - C:\Program Files\Common Files\Microsoft Shared\Windows Live\WindowsLiveLogin.dll
O4 - HKLM\..\Run: [avgnt] "C:\Program Files\Avira\AntiVir Desktop\avgnt.exe" /min
O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
O4 - HKCU\..\Run: [IDMan] C:\Program Files\Internet Download Manager\IDMan.exe /onboot
O4 - S-1-5-18 Startup: userinit.exe (User 'SYSTEM')
O4 - .DEFAULT Startup: userinit.exe (User 'Default user')
O6 - HKCU\Software\Policies\Microsoft\Internet Explorer\Control Panel present
O6 - HKLM\Software\Policies\Microsoft\Internet Explorer\Control Panel present
O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~2\OFFICE11\EXCEL.EXE/3000
O8 - Extra context menu item: تحميل الكل بواسطة Internet Download Manager - C:\Program Files\Internet Download Manager\IEGetAll.htm
O8 - Extra context menu item: تحميل بواسطة Internet Download Manager - C:\Program Files\Internet Download Manager\IEExt.htm
O8 - Extra context menu item: تحميل محتوى FLV بواسطة Internet Download Manager - C:\Program Files\Internet Download Manager\IEGetVL.htm
O9 - Extra button: (no name) - {85d1f590-48f4-11d9-9669-0800200c9a66} - C:\WINDOWS\bdoscandel.exe
O9 - Extra 'Tools' menuitem: Uninstall BitDefender Online Scanner v8 - {85d1f590-48f4-11d9-9669-0800200c9a66} - C:\WINDOWS\bdoscandel.exe
O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~2\OFFICE11\REFIEBAR.DLL
O9 - Extra button: Yahoo! Messenger - {E5D12C4E-7B4F-11D3-B5C9-0050045C3C96} - C:\Program Files\Yahoo!\Messenger\YahooMessenger.exe
O9 - Extra 'Tools' menuitem: Yahoo! Messenger - {E5D12C4E-7B4F-11D3-B5C9-0050045C3C96} - C:\Program Files\Yahoo!\Messenger\YahooMessenger.exe
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O16 - DPF: {5D86DDB5-BDF9-441B-9E9E-D4730F4EE499} (BDSCANONLINE Control) -
يجب عليك
تسجيل الدخول
او
تسجيل لمشاهدة الرابط المخفي
O23 - Service: Avira Firewall (AntiVirFirewallService) - Avira GmbH - C:\Program Files\Avira\AntiVir Desktop\avfwsvc.exe
O23 - Service: Avira AntiVir MailGuard (AntiVirMailService) - Avira GmbH - C:\Program Files\Avira\AntiVir Desktop\avmailc.exe
O23 - Service: Avira AntiVir Scheduler (AntiVirSchedulerService) - Avira GmbH - C:\Program Files\Avira\AntiVir Desktop\sched.exe
O23 - Service: Avira AntiVir Guard (AntiVirService) - Avira GmbH - C:\Program Files\Avira\AntiVir Desktop\avguard.exe
O23 - Service: Avira AntiVir WebGuard (AntiVirWebService) - Avira GmbH - C:\Program Files\Avira\AntiVir Desktop\AVWEBGRD.EXE
O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Common Files\InstallShield\Driver\11\Intel 32\IDriverT.exe
O23 - Service: iPod Service - Apple Computer, Inc. - C:\Program Files\iPod\bin\iPodService.exe
O23 - Service: Yahoo! Updater (YahooAUService) - Yahoo! Inc. - C:\Program Files\Yahoo!\SoftwareUpdate\YahooAUService.exe
--
End of file - 5404 bytes
ومشكورين
