Brisanje virusa sa Avirom

Brisanje virusa sa Avirom

offline
  • Pridružio: 22 Dec 2007
  • Poruke: 20

Poz, skenirao sam kompijuter i nasao mi je 21 virus ali mi se nigde nije pojavilo da obrisem...

ne razumem se bas mnogo pa bih molio za pomoc
evo izvestaj od skeniranja:




Avira AntiVir Personal
Report file date: Monday, December 20, 2010 13:14

Scanning for 2264596 virus strains and unwanted programs.

Licensee : Avira AntiVir Personal - FREE Antivirus
Serial number : 0000149996-ADJIE-0000001
Platform : Windows XP
Windows version : (Service Pack 2) [5.1.2600]
Boot mode : Normally booted
Username : SYSTEM
Computer name : DACHA

Version information:
BUILD.DAT : 9.0.0.429 21701 Bytes 10/6/2010 10:04:00
AVSCAN.EXE : 9.0.3.10 466689 Bytes 2/18/2010 05:15:59
AVSCAN.DLL : 9.0.3.0 40705 Bytes 2/27/2009 23:58:24
LUKE.DLL : 9.0.3.2 209665 Bytes 2/21/2009 00:35:49
LUKERES.DLL : 9.0.2.0 12033 Bytes 2/27/2009 23:58:52
VBASE000.VDF : 7.10.0.0 19875328 Bytes 11/6/2009 21:43:12
VBASE001.VDF : 7.11.0.0 13342208 Bytes 12/14/2010 10:49:42
VBASE002.VDF : 7.11.0.1 2048 Bytes 12/14/2010 10:49:42
VBASE003.VDF : 7.11.0.2 2048 Bytes 12/14/2010 10:49:42
VBASE004.VDF : 7.11.0.3 2048 Bytes 12/14/2010 10:49:43
VBASE005.VDF : 7.11.0.4 2048 Bytes 12/14/2010 10:49:43
VBASE006.VDF : 7.11.0.5 2048 Bytes 12/14/2010 10:49:43
VBASE007.VDF : 7.11.0.6 2048 Bytes 12/14/2010 10:49:43
VBASE008.VDF : 7.11.0.7 2048 Bytes 12/14/2010 10:49:43
VBASE009.VDF : 7.11.0.8 2048 Bytes 12/14/2010 10:49:43
VBASE010.VDF : 7.11.0.9 2048 Bytes 12/14/2010 10:49:43
VBASE011.VDF : 7.11.0.10 2048 Bytes 12/14/2010 10:49:43
VBASE012.VDF : 7.11.0.11 2048 Bytes 12/14/2010 10:49:43
VBASE013.VDF : 7.11.0.52 128000 Bytes 12/16/2010 10:47:30
VBASE014.VDF : 7.11.0.53 2048 Bytes 12/16/2010 10:47:30
VBASE015.VDF : 7.11.0.54 2048 Bytes 12/16/2010 10:47:30
VBASE016.VDF : 7.11.0.55 2048 Bytes 12/16/2010 10:47:30
VBASE017.VDF : 7.11.0.56 2048 Bytes 12/16/2010 10:47:30
VBASE018.VDF : 7.11.0.57 2048 Bytes 12/16/2010 10:47:30
VBASE019.VDF : 7.11.0.58 2048 Bytes 12/16/2010 10:47:30
VBASE020.VDF : 7.11.0.59 2048 Bytes 12/16/2010 10:47:30
VBASE021.VDF : 7.11.0.60 2048 Bytes 12/16/2010 10:47:31
VBASE022.VDF : 7.11.0.61 2048 Bytes 12/16/2010 10:47:31
VBASE023.VDF : 7.11.0.62 2048 Bytes 12/16/2010 10:47:31
VBASE024.VDF : 7.11.0.63 2048 Bytes 12/16/2010 10:47:31
VBASE025.VDF : 7.11.0.64 2048 Bytes 12/16/2010 10:47:31
VBASE026.VDF : 7.11.0.65 2048 Bytes 12/16/2010 10:47:31
VBASE027.VDF : 7.11.0.66 2048 Bytes 12/16/2010 10:47:31
VBASE028.VDF : 7.11.0.67 2048 Bytes 12/16/2010 10:47:31
VBASE029.VDF : 7.11.0.68 2048 Bytes 12/16/2010 10:47:31
VBASE030.VDF : 7.11.0.69 2048 Bytes 12/16/2010 10:47:31
VBASE031.VDF : 7.11.0.84 79872 Bytes 12/19/2010 10:47:36
Engineversion : 8.2.4.126
AEVDF.DLL : 8.1.2.1 106868 Bytes 7/30/2010 10:33:39
AESCRIPT.DLL : 8.1.3.48 1286524 Bytes 12/3/2010 10:51:24
AESCN.DLL : 8.1.7.2 127349 Bytes 11/23/2010 10:50:54
AESBX.DLL : 8.1.3.2 254324 Bytes 11/23/2010 10:50:58
AERDL.DLL : 8.1.9.2 635252 Bytes 9/22/2010 11:55:32
AEPACK.DLL : 8.2.4.5 512375 Bytes 12/17/2010 10:47:46
AEOFFICE.DLL : 8.1.1.10 201084 Bytes 11/23/2010 10:50:53
AEHEUR.DLL : 8.1.2.57 3142008 Bytes 12/17/2010 10:47:44
AEHELP.DLL : 8.1.16.0 246136 Bytes 12/3/2010 10:50:53
AEGEN.DLL : 8.1.5.0 397685 Bytes 12/3/2010 10:50:52
AEEMU.DLL : 8.1.3.0 393589 Bytes 11/23/2010 10:50:38
AECORE.DLL : 8.1.19.0 196984 Bytes 12/3/2010 10:50:49
AEBB.DLL : 8.1.1.0 53618 Bytes 4/25/2010 03:31:52
AVWINLL.DLL : 9.0.0.3 18177 Bytes 12/12/2008 21:47:59
AVPREF.DLL : 9.0.3.0 44289 Bytes 2/18/2010 05:15:59
AVREP.DLL : 8.0.0.7 159784 Bytes 2/18/2010 05:15:59
AVREG.DLL : 9.0.0.0 36609 Bytes 12/5/2008 23:32:09
AVARKT.DLL : 9.0.0.3 292609 Bytes 3/25/2009 04:05:41
AVEVTLOG.DLL : 9.0.0.7 167169 Bytes 1/30/2009 23:37:08
SQLITE3.DLL : 3.6.1.0 326401 Bytes 1/29/2009 04:03:49
SMTPLIB.DLL : 9.2.0.25 28417 Bytes 2/2/2009 21:21:33
NETNT.DLL : 9.0.0.0 11521 Bytes 12/5/2008 23:32:10
RCIMAGE.DLL : 9.0.0.25 2438913 Bytes 5/16/2009 04:39:58
RCTEXT.DLL : 9.0.73.0 86785 Bytes 2/18/2010 05:15:59

Configuration settings for the scan:
Jobname.............................: Complete system scan
Configuration file..................: c:\program files\avira\antivir desktop\sysscan.avp
Logging.............................: low
Primary action......................: delete
Secondary action....................: ignore
Scan master boot sector.............: on
Scan boot sector....................: on
Boot sectors........................: C:, D:,
Process scan........................: on
Scan registry.......................: on
Search for rootkits.................: on
Integrity checking of system files..: off
Scan all files......................: All files
Scan archives.......................: on
Recursion depth.....................: 20
Smart extensions....................: on
Macro heuristic.....................: on
File heuristic......................: medium

Start of the scan: Monday, December 20, 2010 13:14

Starting search for hidden objects.
'62713' objects were checked, '0' hidden objects were found.

The scan of running processes will be started
Scan process 'chrome.exe' - '1' Module(s) have been scanned
Scan process 'chrome.exe' - '1' Module(s) have been scanned
Scan process 'chrome.exe' - '1' Module(s) have been scanned
Scan process 'wmiprvse.exe' - '1' Module(s) have been scanned
Scan process 'chrome.exe' - '1' Module(s) have been scanned
Scan process 'chrome.exe' - '1' Module(s) have been scanned
Scan process 'chrome.exe' - '1' Module(s) have been scanned
Scan process 'avscan.exe' - '1' Module(s) have been scanned
Scan process 'avcenter.exe' - '1' Module(s) have been scanned
Scan process 'svchost.exe' - '1' Module(s) have been scanned
Scan process 'alg.exe' - '1' Module(s) have been scanned
Scan process 'svchost.exe' - '1' Module(s) have been scanned
Scan process 'SeaPort.exe' - '1' Module(s) have been scanned
Scan process 'RichVideo.exe' - '1' Module(s) have been scanned
Scan process 'PsiService_2.exe' - '1' Module(s) have been scanned
Scan process 'nvsvc32.exe' - '1' Module(s) have been scanned
Scan process 'jqs.exe' - '1' Module(s) have been scanned
Scan process 'avguard.exe' - '1' Module(s) have been scanned
Scan process 'GoogleCrashHandler.exe' - '1' Module(s) have been scanned
Scan process 'cacaoweb.exe' - '1' Module(s) have been scanned
Scan process 'daemon.exe' - '1' Module(s) have been scanned
Scan process 'svchost.exe' - '1' Module(s) have been scanned
Scan process 'ctfmon.exe' - '1' Module(s) have been scanned
Scan process 'MWSOEMON.EXE' - '1' Module(s) have been scanned
Scan process 'realsched.exe' - '1' Module(s) have been scanned
Scan process 'DivXUpdate.exe' - '1' Module(s) have been scanned
Scan process 'jusched.exe' - '1' Module(s) have been scanned
Scan process 'rundll32.exe' - '1' Module(s) have been scanned
Scan process 'avgnt.exe' - '1' Module(s) have been scanned
Scan process 'RTHDCPL.EXE' - '1' Module(s) have been scanned
Scan process 'sched.exe' - '1' Module(s) have been scanned
Scan process 'spoolsv.exe' - '1' Module(s) have been scanned
Scan process 'explorer.exe' - '1' Module(s) have been scanned
Scan process 'svchost.exe' - '1' Module(s) have been scanned
Scan process 'svchost.exe' - '1' Module(s) have been scanned
Scan process 'svchost.exe' - '1' Module(s) have been scanned
Scan process 'svchost.exe' - '1' Module(s) have been scanned
Scan process 'svchost.exe' - '1' Module(s) have been scanned
Scan process 'lsass.exe' - '1' Module(s) have been scanned
Scan process 'services.exe' - '1' Module(s) have been scanned
Scan process 'winlogon.exe' - '1' Module(s) have been scanned
Scan process 'csrss.exe' - '1' Module(s) have been scanned
Scan process 'smss.exe' - '1' Module(s) have been scanned
43 processes with 43 modules were scanned

Starting master boot sector scan:
Master boot sector HD0
[INFO] No virus was found!

Start scanning boot sectors:
Boot sector 'C:\'
[INFO] No virus was found!
Boot sector 'D:\'
[INFO] No virus was found!

Starting to scan executable files (registry).
The registry was scanned ( '61' files ).


Starting the file scan:

Begin scan in 'C:\'
C:\pagefile.sys
[WARNING] The file could not be opened!
[NOTE] This file is a Windows system file.
[NOTE] This file cannot be opened for scanning.
C:\Documents and Settings\Administrator\Local Settings\Application Data\Softonic-Eng7\plugins\{5E1360DC-8FA8-40df-A8CD-FC3831B3634B}\{5E1360DC-8FA8-40df-A8CD-FC3831B3634B}.cpi
[0] Archive type: CAB (Microsoft)
--> 3.1.1\bin\PriceGong_16.png
[WARNING] No further files can be extracted from this archive. The archive will be closed
[WARNING] No further files can be extracted from this archive. The archive will be closed
C:\Documents and Settings\Administrator\Local Settings\Application Data\Softonic_English\plugins\{5E1360DC-8FA8-40df-A8CD-FC3831B3634B}\{5E1360DC-8FA8-40df-A8CD-FC3831B3634B}.cpi
[0] Archive type: CAB (Microsoft)
--> 3.1.1\bin\PriceGong_16.png
[WARNING] No further files can be extracted from this archive. The archive will be closed
[WARNING] No further files can be extracted from this archive. The archive will be closed
C:\Documents and Settings\Administrator\Local Settings\Temp\+ccFZ_Pz.exe.part
[0] Archive type: NSIS
--> ProgramFilesDir/vlc-1.0.1-win32.exe
[1] Archive type: NSIS
--> ProgramFilesDir/AUTHORS.txt
[WARNING] No further files can be extracted from this archive. The archive will be closed
--> ProgramFilesDir/GraboidClient.exe
[WARNING] No further files can be extracted from this archive. The archive will be closed
[WARNING] No further files can be extracted from this archive. The archive will be closed
C:\Documents and Settings\Administrator\Local Settings\Temp\jar_cache4702548365328186982.tmp
[0] Archive type: ZIP
--> MessageManager.class
[DETECTION] Contains recognition pattern of the JAVA/Agent.AJ.3 Java virus
--> WWWManager.class
[DETECTION] Contains recognition pattern of the EXP/CVE-2009-3867.JP exploit
[NOTE] The file was deleted!
C:\Documents and Settings\Administrator\Local Settings\Temp\jar_cache5115673456502667410.tmp
[0] Archive type: ZIP
--> 0264c034
[DETECTION] Contains recognition pattern of the EXP/CVE-2010-0094.A exploit
--> CustomClass.class
[DETECTION] Contains recognition pattern of the JAVA/Rowindal.I Java virus
--> evilPolicy.class
[DETECTION] Contains recognition pattern of the EXP/CVE-2008-5353.SV exploit
--> mosdef.class
[DETECTION] Contains recognition pattern of the EXP/CVE-2008-5353.VZ exploit
[NOTE] The file was deleted!
C:\Documents and Settings\Administrator\Local Settings\Temp\jar_cache5429575396459292426.tmp
[0] Archive type: ZIP
--> JavaUpdateApplication.class
[DETECTION] Contains recognition pattern of the EXP/CVE-2009-3867.IY exploit
--> JavaUpdateManager.class
[DETECTION] Contains recognition pattern of the EXP/CVE-2009-3867.LV exploit
[NOTE] The file was deleted!
C:\Documents and Settings\Administrator\Local Settings\Temp\jar_cache6100436473117809418.tmp
[0] Archive type: ZIP
--> a3ea10778bc.class
[DETECTION] Contains recognition pattern of the EXP/CVE-2008-5353.VH exploit
--> a6e69525d5c.class
[DETECTION] Contains recognition pattern of the JAVA/Agent.AL.2 Java virus
--> a999fa61a07.class
[DETECTION] Contains recognition pattern of the JAVA/OpenConnecti.A Java virus
--> acd9d6c533d.class
[DETECTION] Contains recognition pattern of the EXP/CVE-2008-5353.TM exploit
--> ad565690c5c.class
[DETECTION] Contains recognition pattern of the EXP/CVE-2008-5353.SH exploit
[NOTE] The file was deleted!
C:\Documents and Settings\Administrator\Local Settings\Temp\jar_cache6484683258319788474.tmp
[0] Archive type: ZIP
--> MessageManager.class
[DETECTION] Contains recognition pattern of the JAVA/Agent.AJ.3 Java virus
--> WWWManager.class
[DETECTION] Contains recognition pattern of the EXP/CVE-2009-3867.JP exploit
[NOTE] The file was deleted!
C:\Documents and Settings\Administrator\Local Settings\Temp\jar_cache8163756011215821088.tmp
[0] Archive type: ZIP
--> a3ea10778bc.class
[DETECTION] Contains recognition pattern of the EXP/CVE-2008-5353.VH exploit
--> a6e69525d5c.class
[DETECTION] Contains recognition pattern of the JAVA/Agent.AL.2 Java virus
--> a999fa61a07.class
[DETECTION] Contains recognition pattern of the JAVA/OpenConnecti.A Java virus
--> acd9d6c533d.class
[DETECTION] Contains recognition pattern of the EXP/CVE-2008-5353.TM exploit
--> ad565690c5c.class
[DETECTION] Contains recognition pattern of the EXP/CVE-2008-5353.SH exploit
[NOTE] The file was deleted!
C:\Documents and Settings\Administrator\Local Settings\Temp\div37.tmp\div4A.tmp
[0] Archive type: NSIS
--> ProgramFilesDir/DPXBannerAdPlugin.xml
[WARNING] No further files can be extracted from this archive. The archive will be closed
[WARNING] No further files can be extracted from this archive. The archive will be closed
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\418ZSCVW\{5E1360DC-8FA8-40df-A8CD-FC3831B3634B}[1].cpi
[0] Archive type: CAB (Microsoft)
--> 3.1.1\bin\PriceGong_16.png
[WARNING] No further files can be extracted from this archive. The archive will be closed
[WARNING] No further files can be extracted from this archive. The archive will be closed
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\8NB2YYC3\Installer[4].exe
[0] Archive type: NSIS
--> ProgramFilesDir/DPXBannerAdPlugin.xml
[WARNING] No further files can be extracted from this archive. The archive will be closed
[WARNING] No further files can be extracted from this archive. The archive will be closed
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\EE7HLCSF\{5E1360DC-8FA8-40df-A8CD-FC3831B3634B}[1].cpi
[0] Archive type: CAB (Microsoft)
--> 3.1.1\bin\PriceGong_16.png
[WARNING] No further files can be extracted from this archive. The archive will be closed
[WARNING] No further files can be extracted from this archive. The archive will be closed
C:\WINDOWS\system32\drivers\sptd.sys
[WARNING] The file could not be opened!
Begin scan in 'D:\'
D:\stefan\Eat Pray Love (2010 Movie) DVDRip [Full Movie] XviD-DiAMOND\Eat Pray Love (2010 Movie) DVDRip [Full Movie] XviD-DiAMOND.avi
[DETECTION] Contains recognition pattern of the EXP/ASF.GetCodec.Gen exploit
[NOTE] The file was deleted!


End of the scan: Monday, December 20, 2010 14:01
Used time: 47:11 Minute(s)

The scan has been done completely.

11843 Scanned directories
316032 Files were scanned
21 Viruses and/or unwanted programs were found
0 Files were classified as suspicious
7 files were deleted
0 Viruses and unwanted programs were repaired
0 Files were moved to quarantine
0 Files were renamed
2 Files cannot be scanned
316009 Files not concerned
2419 Archives were scanned
17 Warnings
8 Notes
62713 Objects were scanned with rootkit scan
0 Hidden objects were found



Registruj se da bi učestvovao u diskusiji. Registrovanim korisnicima se NE prikazuju reklame unutar poruka.
offline
  • Pridružio: 19 Dec 2010
  • Poruke: 1106
  • Gde živiš: Beograd

Mislim da bi trebao da otvoris temu u Ambulanti, da bi ti AMF tim resio eventualne probleme sa neotrkivenim i zaostalim pretnjama.



offline
  • Pridružio: 22 Dec 2007
  • Poruke: 20

malopre sam pokusao ali mi pisalo da mogu samo urednici da otvaraju teme.. sad sam uspeo...

izvinjavam se za spam.. delete

Ko je trenutno na forumu
 

Ukupno su 1080 korisnika na forumu :: 47 registrovanih, 10 sakrivenih i 1023 gosta   ::   [ Administrator ] [ Supermoderator ] [ Moderator ] :: Detaljnije

Najviše korisnika na forumu ikad bilo je 3466 - dana 01 Jun 2021 17:07

Korisnici koji su trenutno na forumu:
Korisnici trenutno na forumu: ajo baba, amaterSRB, avijacija, babaroga, Bluper, Bobrock1, bokisha253, cenejac111, cvrle312, darkangel, DeerHunter, Denaya, Dežurni pod palubom, Djokislav, Excalibur13, Frunze, Hans Gajger, ILGromovnik, Karla, Lord Nem, Lucije Kvint, Marko Marković, mercedesamg, Metanoja, Mi lao shu, milenko crazy north, milos.cbr, milutin134, mkukoleca, moldway, nemkea71, nenad81, pacika, pein, repac, RILE-NS, robertino, sasa87, stegonosa, theNedjeljko, tmanda323, tubular, Vlada78, voja64, wizzardone, YU-UKI, šumar bk2