Удаление вирусов и троянов. Защита компьютера. › Помощь в удалении вирусов, троянов, рекламы и других зловредов › Удалить PC Defender помогитье
- This topic has 2 ответа, 2 участника, and was last updated 14 years, 2 months назад by R.
-
АвторСообщения
-
11 сентября, 2010 в 8:20 дп #18716
Logfile of Trend Micro HijackThis v2.0.4
Scan saved at 14:07:10, on 11.09.2010
Platform: Windows XP SP3 (WinNT 5.01.2600)
MSIE: Internet Explorer v7.00 (7.00.6000.16791)
Boot mode: NormalRunning processes:
C:WINDOWSSystem32smss.exe
C:WINDOWSsystem32winlogon.exe
C:WINDOWSsystem32services.exe
C:WINDOWSsystem32lsass.exe
C:WINDOWSsystem32svchost.exe
C:WINDOWSSystem32svchost.exe
C:Program FilesDef GroupPC Defenderpcdef.exe
C:WINDOWSExplorer.EXE
C:Program FilesDef GroupPC Defenderproccheck.exe
C:Program FilesDef GroupPC Defenderprockill32.exe
C:WINDOWSsystem32spoolsv.exe
C:Program FilesDef GroupPC Defenderprockill32.exe
C:WINDOWSsystem32ctfmon.exe
C:WINDOWSRTHDCPL.EXE
C:Program FilesCyberLinkPCM4EverioEverioService.exe
C:WINDOWSsystem32PROMon.exe
C:WINDOWSsystem32RUNDLL32.EXE
C:Program FilesProcess Killerprkiller.exe
C:Program FilesCommon FilesUlead SystemsAutoDetectormonitor.exe
C:WINDOWSsystem32rundll32.exe
C:Program FilesHPHP Software UpdateHPWuSchd2.exe
C:PROGRA~1ALWILS~1Avast5avastUI.exe
C:Program FilesTuneUp Utilities 2009MemOptimizer.exe
L:Download Masterdmaster.exe
C:Program FilesHPDigital Imagingbinhpqtra08.exe
C:Program Files2gisUpdateClientWin32UpdateClientService.exe
C:WINDOWSsystem32svchost.exe
C:Program FilesCommon FilesMicrosoft SharedVS7DEBUGMDM.EXE
C:WINDOWSSystem32svchost.exe
E:Program FilesCDBurnerXPNMSAccessU.exe
C:WINDOWSsystem32NMSSvc.exe
C:WINDOWSsystem32nvsvc32.exe
C:WINDOWSSystem32svchost.exe
C:Program FilesCyberLinkShared filesRichVideo.exe
C:WINDOWSsystem32svchost.exe
C:WINDOWSSystem32TUProgSt.exe
C:Program FilesHPDigital ImagingbinhpqSTE08.exe
C:Program FilesHPDigital Imagingbinhpqbam08.exe
C:Program FilesHPDigital Imagingbinhpqgpc01.exe
C:Program FilesHPDigital ImagingSmart Web Printinghpswp_clipbook.exe
C:Program FilesMicrosoft OfficeOFFICE11OUTLOOK.EXE
C:Program FilesMicrosoft OfficeOFFICE11WINWORD.EXE
C:Documents and SettingsМаринаРабочий столHijackThis.exeR1 — HKCUSoftwareMicrosoftInternet ExplorerMain,Default_Page_URL = http://search.qip.ru
R1 — HKCUSoftwareMicrosoftInternet ExplorerMain,Default_Search_URL = http://search.qip.ru
R1 — HKCUSoftwareMicrosoftInternet ExplorerMain,Search Bar = http://search.qip.ru/ie
R1 — HKCUSoftwareMicrosoftInternet ExplorerMain,Search Page = http://search.qip.ru
R0 — HKCUSoftwareMicrosoftInternet ExplorerMain,Start Page = http://www.yandex.ru/
R1 — HKLMSoftwareMicrosoftInternet ExplorerMain,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
R1 — HKLMSoftwareMicrosoftInternet ExplorerMain,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
R1 — HKLMSoftwareMicrosoftInternet ExplorerMain,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
R0 — HKLMSoftwareMicrosoftInternet ExplorerMain,Start Page = http://lonerd.dreamprogs.net
R1 — HKCUSoftwareMicrosoftInternet ExplorerSearch,SearchAssistant = http://search.qip.ru/ie
R1 — HKCUSoftwareMicrosoftInternet ExplorerSearchURL,(Default) = Root: HKCU; Subkey: SoftwareMicrosoftInternet ExplorerSearchUrl; ValueType: string; ValueName: ‘; ValueData: ‘; Flags: createvalueifdoesntexist noerror; Tasks: AddSearchQip
R1 — HKCUSoftwareMicrosoftInternet ExplorerMain,Window Title = Internet Explorer 7 сборка Loner-XP
R0 — HKCUSoftwareMicrosoftInternet ExplorerToolbar,LinksFolderName =
R3 — URLSearchHook: Rambler-Ассистент — {468CD8A9-7C25-45FA-969E-3D925C689DC4} — C:Program FilesRambler AssistantramblertoolbarU0.dll
R3 — URLSearchHook: (no name) — {95289393-33EA-4F8D-B952-483415B9C955} — (no file)
R3 — URLSearchHook: (no name) — {9CB65206-89C4-402c-BA80-02D8C59F9B1D} — C:Program FilesAskTBarSrchAstt3.binA5SRCHAS.DLL
R3 — URLSearchHook: (no name) — — (no file)
F2 — REG:system.ini: UserInit=C:WINDOWSsystem32userinit.exe,»C:Program FilesDef GroupPC Defenderpcdef.exe»
O2 — BHO: HP Print Enhancer — {0347C33E-8762-4905-BF09-768834316C61} — C:Program FilesHPDigital ImagingSmart Web Printinghpswp_printenhancer.dll
O2 — BHO: AcroIEHlprObj Class — {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} — C:Program FilesAdobeAcrobat 7.0ActiveXAcroIEHelper.dll
O2 — BHO: SSVHelper Class — {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} — C:Program FilesJavajre1.5.0_11binssv.dll
O2 — BHO: IE 4.x-6.x BHO for Download Master — {9961627E-4059-41B4-8E0E-A7D6B3854ADF} — L:DOWNLO~1dmiehlp.dll
O2 — BHO: Ask Search Assistant BHO — {9CB65201-89C4-402c-BA80-02D8C59F9B1D} — C:Program FilesAskTBarSrchAstt3.binA5SRCHAS.DLL
O2 — BHO: MS Media Module — {E2D5238B-F1DF-A9B6-4279-71F99FE76DD1} — C:LxDLtASwfS26z_.dll
O2 — BHO: Ask Toolbar BHO — {FE063DB1-4EC0-403e-8DD8-394C54984B2C} — C:Program FilesAskTBarbar3.binASKTBAR.DLL
O2 — BHO: HP Smart BHO Class — {FFFFFFFF-CF4E-4F2B-BDC2-0E72E116A856} — C:Program FilesHPDigital ImagingSmart Web Printinghpswp_BHO.dll
O3 — Toolbar: Rambler-Ассистент — {468CD8A9-7C25-45FA-969E-3D925C689DC4} — C:Program FilesRambler AssistantramblertoolbarU0.dll
O3 — Toolbar: PROMT — {FF284F5C-7CF9-4682-8701-D467C1DBB99F} — C:PRMTIEprmtie.dll
O3 — Toolbar: DM Bar — {0E1230F8-EA50-42A9-983C-D22ABC2EED3C} — L:Download Masterdmbar.dll
O3 — Toolbar: Ask Toolbar — {FE063DB9-4EC0-403e-8DD8-394C54984B2C} — C:Program FilesAskTBarbar3.binASKTBAR.DLL
O4 — HKLM..Run: [RTHDCPL] RTHDCPL.EXE
O4 — HKLM..Run: [Alcmtr] ALCMTR.EXE
O4 — HKLM..Run: [EverioService] «C:Program FilesCyberLinkPCM4EverioEverioService.exe»
O4 — HKLM..Run: [PROMon.exe] PROMon.exe
O4 — HKLM..Run: [NvCplDaemon] RUNDLL32.EXE C:WINDOWSsystem32NvCpl.dll,NvStartup
O4 — HKLM..Run: [nwiz] nwiz.exe /install
O4 — HKLM..Run: [NvMediaCenter] RUNDLL32.EXE C:WINDOWSsystem32NvMcTray.dll,NvTaskbarInit
O4 — HKLM..Run: [exflashservice] «C:Program FilesEPOXEFSEZ_FLASH_SERVICE.exe» «5000»
O4 — HKLM..Run: [Process Killer] C:Program FilesProcess Killerprkiller.exe
O4 — HKLM..Run: [Ulead AutoDetector v2] C:Program FilesCommon FilesUlead SystemsAutoDetectormonitor.exe
O4 — HKLM..Run: [BluetoothAuthenticationAgent] rundll32.exe bthprops.cpl,,BluetoothAuthenticationAgent
O4 — HKLM..Run: [HP Software Update] C:Program FilesHPHP Software UpdateHPWuSchd2.exe
O4 — HKLM..Run: [KernelFaultCheck] %systemroot%system32dumprep 0 -k
O4 — HKLM..Run: [avast5] C:PROGRA~1ALWILS~1Avast5avastUI.exe /nogui
O4 — HKCU..Run: [UIWatcher] E:Program FilesAshampooAshampoo UnInstaller Platinum SuiteUIWatcher.exe
O4 — HKCU..Run: [ctfmon.exe] C:WINDOWSsystem32ctfmon.exe
O4 — HKCU..Run: [TuneUp MemOptimizer] «C:Program FilesTuneUp Utilities 2009MemOptimizer.exe» autostart
O4 — HKCU..Run: [Download Master] L:Download Masterdmaster.exe -autorun
O4 — HKCU..Run: [amva] C:WINDOWSsystem32amvo.exe
O4 — HKUSS-1-5-19..Run: [CTFMON.EXE] C:WINDOWSsystem32CTFMON.EXE (User ‘LOCAL SERVICE’)
O4 — HKUSS-1-5-20..Run: [CTFMON.EXE] C:WINDOWSsystem32CTFMON.EXE (User ‘NETWORK SERVICE’)
O4 — HKUSS-1-5-18..Run: [CTFMON.EXE] C:WINDOWSsystem32CTFMON.EXE (User ‘SYSTEM’)
O4 — HKUS.DEFAULT..Run: [CTFMON.EXE] C:WINDOWSsystem32CTFMON.EXE (User ‘Default user’)
O4 — Startup: Adobe Gamma.lnk = C:Program FilesCommon FilesAdobeCalibrationAdobe Gamma Loader.exe
O4 — Startup: ЎЎЎЎЎЎ.lnk = C:WINDOWSsystem32XP-5665C19D.EXE
O4 — Global Startup: HP Digital Imaging Monitor.lnk = C:Program FilesHPDigital Imagingbinhpqtra08.exe
O8 — Extra context menu item: &Найти в Каталоге Рефератов — http://ref.by/s.html
O8 — Extra context menu item: &Экспорт в Microsoft Excel — res://C:PROGRA~1MICROS~2OFFICE11EXCEL.EXE/3000
O8 — Extra context menu item: Google ВикиКомментарии… — res://C:Program FilesGoogleGoogle ToolbarComponentGoogleToolbarDynamic_mui_en_89D8574934B26AC4.dll/cmsidewiki.html
O8 — Extra context menu item: Добавить в Rambler-Закладки — res://C:Program FilesRambler AssistantramblertoolbarU0.dll/zakladki.htm
O8 — Extra context menu item: Закачать ВСЕ при помощи Download Master — L:Download Masterdmieall.htm
O8 — Extra context menu item: Закачать при помощи Download Master — L:Download Masterdmie.htm
O8 — Extra context menu item: Найти с помощью Рамблера — res://C:Program FilesRambler AssistantramblertoolbarU0.dll/search.htm
O8 — Extra context menu item: Перевести с помощью словарей Рамблера — res://C:Program FilesRambler AssistantramblertoolbarU0.dll/dic.htm
O8 — Extra context menu item: Передать на удаленную закачку DM — L:Download Masterremdown.htm
O9 — Extra button: (no name) — {08B0E5C0-4FCB-11CF-AAA5-00401C608501} — C:Program FilesJavajre1.5.0_11binssv.dll
O9 — Extra ‘Tools’ menuitem: Sun Java Console — {08B0E5C0-4FCB-11CF-AAA5-00401C608501} — C:Program FilesJavajre1.5.0_11binssv.dll
O9 — Extra button: (no name) — {7A2EFD41-E6B3-11D2-89E3-00E0292EE574} — C:PRMTIEprmtie5.htm
O9 — Extra ‘Tools’ menuitem: Перевести — {7A2EFD41-E6B3-11D2-89E3-00E0292EE574} — C:PRMTIEprmtie5.htm
O9 — Extra button: (no name) — {7A2EFD41-E6B3-11D2-89E3-00E0292EE575} — C:PRMTIEoptions.htm
O9 — Extra ‘Tools’ menuitem: Настройка параметров перевода — {7A2EFD41-E6B3-11D2-89E3-00E0292EE575} — C:PRMTIEoptions.htm
O9 — Extra button: Download Master — {8DAE90AD-4583-4977-9DD4-4360F7A45C74} — L:Download Masterdmaster.exe
O9 — Extra ‘Tools’ menuitem: &Download Master — {8DAE90AD-4583-4977-9DD4-4360F7A45C74} — L:Download Masterdmaster.exe
O9 — Extra button: Справочные материалы — {92780B25-18CC-41C8-B9BE-3C9C571A8263} — C:PROGRA~1MICROS~2OFFICE11REFIEBAR.DLL
O9 — Extra button: ICQ Lite — {B863453A-26C3-4e1f-A54D-A2CD196348E9} — C:Program FilesICQLiteICQLite.exe (file missing)
O9 — Extra ‘Tools’ menuitem: ICQ Lite — {B863453A-26C3-4e1f-A54D-A2CD196348E9} — C:Program FilesICQLiteICQLite.exe (file missing)
O9 — Extra button: (no name) — {CD67F990-D8E9-11d2-98FE-00C0F0318AFE} — (no file)
O9 — Extra button: Показать или скрыть HP Smart Web Printing — {DDE87865-83C5-48c4-8357-2F5B1AA84522} — C:Program FilesHPDigital ImagingSmart Web Printinghpswp_BHO.dll
O9 — Extra button: (no name) — {e2e2dd38-d088-4134-82b7-f2ba38496583} — C:WINDOWSNetwork Diagnosticxpnetdiag.exe
O9 — Extra ‘Tools’ menuitem: @xpsp3res.dll,-20001 — {e2e2dd38-d088-4134-82b7-f2ba38496583} — C:WINDOWSNetwork Diagnosticxpnetdiag.exe
O9 — Extra button: ICQ6 — {E59EB121-F339-4851-A3BA-FE49C35617C2} — C:Program FilesICQ6.5ICQ.exe
O9 — Extra ‘Tools’ menuitem: ICQ6 — {E59EB121-F339-4851-A3BA-FE49C35617C2} — C:Program FilesICQ6.5ICQ.exe
O9 — Extra button: eBay — Homepage — {EF79EAC5-3452-4E02-B8BD-BA4C89F1AC7A} — E:Program FilesIrfanViewEbayEbay.htm
O9 — Extra button: Messenger — {FB5F1910-F110-11d2-BB9E-00C04F795683} — C:Program FilesMessengermsmsgs.exe
O9 — Extra ‘Tools’ menuitem: Windows Messenger — {FB5F1910-F110-11d2-BB9E-00C04F795683} — C:Program FilesMessengermsmsgs.exe
O10 — Unknown file in Winsock LSP: c:windowssystem32nwprovau.dll
O16 — DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} (Shockwave Flash Object) — http://fpdownload2.macromedia.com/get/shockwave/cabs/flash/swflash.cab
O17 — HKLMSystemCCSServicesTcpip..{9338AC07-6B67-413C-B237-A2FBD00D2AB0}: NameServer = 212.33.224.136 212.33.225.212
O22 — SharedTaskScheduler: Предзагрузчик Browseui — {438755C2-A8BA-11D1-B96B-00A0C90312E1} — C:WINDOWSsystem32browseui.dll
O22 — SharedTaskScheduler: Демон кэша категорий компонентов — {8C7461EF-2B13-11d2-BE35-3078302C2030} — C:WINDOWSsystem32browseui.dll
O23 — Service: 2GIS UpdateClientService — ДубльГИС — C:Program Files2gisUpdateClientWin32UpdateClientService.exe
O23 — Service: Adobe LM Service — Adobe Systems — C:Program FilesCommon FilesAdobe Systems SharedServiceAdobelmsvc.exe
O23 — Service: Ati HotKey Poller — ATI Technologies Inc. — C:WINDOWSsystem32Ati2evxx.exe
O23 — Service: ATI Smart — Unknown owner — C:WINDOWSsystem32ati2sgag.exe
O23 — Service: avast! Antivirus — ALWIL Software — C:Program FilesAlwil SoftwareAvast5AvastSvc.exe
O23 — Service: avast! Mail Scanner — ALWIL Software — C:Program FilesAlwil SoftwareAvast5AvastSvc.exe
O23 — Service: avast! Web Scanner — ALWIL Software — C:Program FilesAlwil SoftwareAvast5AvastSvc.exe
O23 — Service: Журнал событий (Eventlog) — Корпорация Майкрософт — C:WINDOWSsystem32services.exe
O23 — Service: InstallDriver Table Manager (IDriverT) — Macrovision Corporation — C:Program FilesCommon FilesInstallShieldDriver11Intel 32IDriverT.exe
O23 — Service: Служба COM записи компакт-дисков IMAPI (ImapiService) — Корпорация Майкрософт — C:WINDOWSsystem32imapi.exe
O23 — Service: NetMeeting Remote Desktop Sharing (mnmsrvc) — Корпорация Майкрософт — C:WINDOWSsystem32mnmsrvc.exe
O23 — Service: NMSAccessU — Unknown owner — E:Program FilesCDBurnerXPNMSAccessU.exe
O23 — Service: Intel(R) NMS (NMSSvc) — Intel Corporation — C:WINDOWSsystem32NMSSvc.exe
O23 — Service: NVIDIA Display Driver Service (NVSvc) — NVIDIA Corporation — C:WINDOWSsystem32nvsvc32.exe
O23 — Service: Plug and Play (PlugPlay) — Корпорация Майкрософт — C:WINDOWSsystem32services.exe
O23 — Service: Диспетчер сеанса справки для удаленного рабочего стола (RDSessMgr) — Корпорация Майкрософт — C:WINDOWSsystem32sessmgr.exe
O23 — Service: Cyberlink RichVideo Service(CRVS) (RichVideo) — Unknown owner — C:Program FilesCyberLinkShared filesRichVideo.exe
O23 — Service: ServiceLayer — Nokia. — C:Program FilesPC Connectivity SolutionServiceLayer.exe
O23 — Service: Журналы и оповещения производительности (SysmonLog) — Корпорация Майкрософт — C:WINDOWSsystem32smlogsvc.exe
O23 — Service: TuneUp Drive Defrag Service (TuneUp.Defrag) — TuneUp Software — C:WINDOWSSystem32TuneUpDefragService.exe
O23 — Service: TuneUp Program Statistics Service (TuneUp.ProgramStatisticsSvc) — TuneUp Software — C:WINDOWSSystem32TUProgSt.exe
O23 — Service: Адаптер производительности WMI (WmiApSrv) — Корпорация Майкрософт — C:WINDOWSsystem32wbemwmiapsrv.exe—
End of file — 14200 bytes11 сентября, 2010 в 9:32 дп #31524По вашей инструкции в др.темах удалила вырус, это отчет
Malwarebytes’ Anti-Malware 1.46
http://www.malwarebytes.orgВерсия базы данных: 4594
Windows 5.1.2600 Service Pack 3
Internet Explorer 7.0.5730.1311.09.2010 14:43:09
mbam-log-2010-09-11 (14-43-09).txtТип сканирования: Быстрое сканирование
Просканированные объекты: 158208
Времени прошло: 5 минут, 18 секундЗараженные процессы в памяти: 0
Зараженные модули в памяти: 1
Зараженные ключи в реестре: 5
Зараженные параметры в реестре: 2
Объекты реестра заражены: 3
Зараженные папки: 3
Зараженные файлы: 42Зараженные процессы в памяти:
(Вредоносных программ не обнаружено)Зараженные модули в памяти:
C:WINDOWSsystem32amvo0.dll (Trojan.Agent) -> Delete on reboot.Зараженные ключи в реестре:
HKEY_CLASSES_ROOTCLSID{147a976f-eee1-4377-8ea7-4716e4cdd239} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionUninstall{456a3b12-8fe6-41ae-9e5c-5e55f0712c09} (Rogue.PCDefender) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOTCLSIDMADOWN (Worm.Magania) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionExplorerBrowser Helper Objects{e2d5238b-f1df-a9b6-4279-71f99fe76dd1} (Adware.AdRotator) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOTCLSID{e2d5238b-f1df-a9b6-4279-71f99fe76dd1} (Adware.AdRotator) -> Quarantined and deleted successfully.Зараженные параметры в реестре:
HKEY_CURRENT_USERSOFTWAREMicrosoftWindowsCurrentVersionRunamva (Trojan.Agent) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionWinlogontaskman (Trojan.Agent) -> Quarantined and deleted successfully.Объекты реестра заражены:
HKEY_LOCAL_MACHINESOFTWAREMicrosoftSecurity CenterAntiVirusDisableNotify (Disabled.SecurityCenter) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESOFTWAREMicrosoftSecurity CenterUpdatesDisableNotify (Disabled.SecurityCenter) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionExplorerAdvancedFolderHiddenSHOWALLCheckedValue (Hijack.System.Hidden) -> Bad: (0) Good: (1) -> Quarantined and deleted successfully.Зараженные папки:
C:Program FilesDef GroupPC Defender (Rogue.PCDefender) -> Quarantined and deleted successfully.
C:Documents and SettingsГостьLocal SettingsTempE_4 (Worm.AutoRun) -> Quarantined and deleted successfully.
C:Documents and SettingsМаринаLocal SettingsTempE_4 (Worm.AutoRun) -> Quarantined and deleted successfully.Зараженные файлы:
C:autorun.exe (Worm.AutoRun) -> Quarantined and deleted successfully.
C:RECYCLERS-1-5-21-6004524976-9351805784-864458492-1029MsMxEng.exe (Trojan.Inject) -> Delete on reboot.
C:WINDOWSsystem32shell.fne (Worm.AutoRun) -> Quarantined and deleted successfully.
C:WINDOWSsystem32eAPI.fne (Worm.AutoRun) -> Quarantined and deleted successfully.
C:WINDOWSsystem32com.run (Worm.AutoRun) -> Quarantined and deleted successfully.
C:WINDOWSsystem32RegEx.fne (Worm.Autorun) -> Quarantined and deleted successfully.
C:WINDOWSsystem32krnln.fnr (Trojan.Agent) -> Quarantined and deleted successfully.
C:WINDOWSsystem32dp1.fne (Worm.AutoRun) -> Quarantined and deleted successfully.
C:Documents and SettingsГостьLocal SettingsTempE_4com.run (Worm.AutoRun) -> Quarantined and deleted successfully.
C:Documents and SettingsГостьLocal SettingsTempE_4dp1.fne (Worm.AutoRun) -> Quarantined and deleted successfully.
C:Documents and SettingsГостьLocal SettingsTempE_4eAPI.fne (Worm.AutoRun) -> Quarantined and deleted successfully.
C:Documents and SettingsГостьLocal SettingsTempE_4krnln.fnr (Trojan.Agent) -> Quarantined and deleted successfully.
C:Documents and SettingsГостьLocal SettingsTempE_4RegEx.fne (Worm.Autorun) -> Quarantined and deleted successfully.
C:Documents and SettingsГостьLocal SettingsTempE_4shell.fne (Worm.AutoRun) -> Quarantined and deleted successfully.
C:Documents and SettingsМаринаLocal SettingsTemp7eb4nf.dll (Worm.AutoRun) -> Quarantined and deleted successfully.
C:Documents and SettingsМаринаLocal SettingsTempE_4com.run (Worm.AutoRun) -> Quarantined and deleted successfully.
C:Documents and SettingsМаринаLocal SettingsTempE_4dp1.fne (Worm.AutoRun) -> Quarantined and deleted successfully.
C:Documents and SettingsМаринаLocal SettingsTempE_4eAPI.fne (Worm.AutoRun) -> Quarantined and deleted successfully.
C:Documents and SettingsМаринаLocal SettingsTempE_4krnln.fnr (Trojan.Agent) -> Quarantined and deleted successfully.
C:Documents and SettingsМаринаLocal SettingsTempE_4RegEx.fne (Worm.Autorun) -> Quarantined and deleted successfully.
C:Documents and SettingsМаринаLocal SettingsTempE_4shell.fne (Worm.AutoRun) -> Quarantined and deleted successfully.
C:Program FilesDef GroupPC Defenderpcdef.exe (Rogue.PCDefender) -> Quarantined and deleted successfully.
C:Program FilesDef GroupPC Defenderproccheck.exe (Rogue.PCDefender) -> Quarantined and deleted successfully.
C:Program FilesDef GroupPC Defenderprockill32.exe (Rogue.PCDefender) -> Quarantined and deleted successfully.
C:Program FilesDef GroupPC Defenderprockill64.exe (Rogue.PCDefender) -> Quarantined and deleted successfully.
C:Program FilesDef GroupPC Defenderrundelay.exe (Rogue.PCDefender) -> Quarantined and deleted successfully.
C:Program FilesDef GroupPC Defenderuninstall.bat (Rogue.PCDefender) -> Quarantined and deleted successfully.
C:Documents and SettingsГостьLocal SettingsTempE_4internet.fne (Worm.AutoRun) -> Quarantined and deleted successfully.
C:Documents and SettingsГостьLocal SettingsTempE_4spec.fne (Worm.AutoRun) -> Quarantined and deleted successfully.
C:Documents and SettingsМаринаLocal SettingsTempE_4internet.fne (Worm.AutoRun) -> Quarantined and deleted successfully.
C:Documents and SettingsМаринаLocal SettingsTempE_4spec.fne (Worm.AutoRun) -> Quarantined and deleted successfully.
C:autorun.inf (Trojan.Agent) -> Quarantined and deleted successfully.
C:x.com (Trojan.Agent) -> Quarantined and deleted successfully.
C:Documents and SettingsМаринаГлавное менюПрограммыАвтозагрузкаЎЎЎЎЎЎ.lnk (Worm.AutoRun) -> Quarantined and deleted successfully.
C:WINDOWSsystem32amvo.exe (Trojan.Agent) -> Quarantined and deleted successfully.
C:WINDOWSsystem32amvo0.dll (Trojan.Agent) -> Delete on reboot.
C:WINDOWSsystem32internet.fne (Worm.AutoRun) -> Quarantined and deleted successfully.
C:WINDOWSsystem32og.dll (Worm.AutoRun) -> Quarantined and deleted successfully.
C:WINDOWSsystem32og.edt (Worm.AutoRun) -> Quarantined and deleted successfully.
C:WINDOWSsystem32spec.fne (Worm.AutoRun) -> Quarantined and deleted successfully.
C:WINDOWSsystem32ul.dll (Worm.AutoRun) -> Quarantined and deleted successfully.
C:LxDLtASwfS26z_.dll (Adware.AdRotator) -> Quarantined and deleted successfully.11 сентября, 2010 в 11:33 дп #31523Здравствуйте!
Добро пожаловать на Spyware-ru форум.
Сделайте ещё сканирование системы программой RSIT:
Как вылечить компьютер, первые шаги. -
АвторСообщения
- Для ответа в этой теме необходимо авторизоваться.