Удаление вирусов и троянов. Защита компьютера. › Помощь в удалении вирусов, троянов, рекламы и других зловредов › PCAntispyware2010 и braviax.exe Нод 32 видит но удалить не может
- This topic has 1 ответ, 2 участника, and was last updated 16 years, 1 month назад by
Admin.
-
АвторСообщения
-
3 сентября, 2009 в 9:49 дп #17058
Добрий день!
Антивирусы не помагают,Нод 32 видит но удалить не может,тоже самое с AVZ.Решил боротса вручную.Сначала попробывал Malwarebytes’ Anti-Malware .После перегрузки не помогло.Попробывал повторно для полного сохранения резултатов.Вот что получил- Malwarebytes’ Anti-Malware 1.40
Версия базы данных: 2734
Windows 5.1.2600 Service Pack 203.09.2009 12:08:05
mbam-log-2009-09-03 (12-08-05).txtТип проверки: Полная (C:|)
Проверено объектов: 131130
Прошло времени: 32 minute(s), 4 second(s)Заражено процессов в памяти: 1
Заражено модулей в памяти: 0
Заражено ключей реестра: 0
Заражено значений реестра: 7
Заражено параметров реестра: 6
Заражено папок: 0
Заражено файлов: 13Заражено процессов в памяти:
C:WINDOWSsystem32braviax.exe (Trojan.FakeAlert) -> Unloaded process successfully.Заражено модулей в памяти:
(Вредоносные программы не обнаружены)Заражено ключей реестра:
(Вредоносные программы не обнаружены)Заражено значений реестра:
HKEY_CURRENT_USERControl Paneldon’t loadscui.cpl (Hijack.SecurityCenter) -> Quarantined and deleted successfully.
HKEY_CURRENT_USERControl Paneldon’t loadwscui.cpl (Hijack.SecurityCenter) -> Quarantined and deleted successfully.
HKEY_CURRENT_USERSOFTWAREMicrosoftWindowsCurrentVersionPoliciesExplorerForceClassicControlPanel (Hijack.ControlPanelStyle) -> Quarantined and deleted successfully.
HKEY_CURRENT_USERSOFTWAREMicrosoftWindowsCurrentVersionRunbraviax (Trojan.Downloader) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionRunbraviax (Trojan.Downloader) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionRunPC AntiSpyware 2010 (Rogue.PC_AntiSpyware2010) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionRunRegedit32 (Trojan.Agent) -> Delete on reboot.Заражено параметров реестра:
HKEY_CURRENT_USERSOFTWAREMicrosoftSecurity CenterAntiVirusDisableNotify (Disabled.SecurityCenter) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.
HKEY_CURRENT_USERSOFTWAREMicrosoftSecurity CenterFirewallDisableNotify (Disabled.SecurityCenter) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.
HKEY_CURRENT_USERSOFTWAREMicrosoftSecurity CenterUpdatesDisableNotify (Disabled.SecurityCenter) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESOFTWAREMicrosoftSecurity CenterAntiVirusDisableNotify (Disabled.SecurityCenter) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESOFTWAREMicrosoftSecurity CenterFirewallDisableNotify (Disabled.SecurityCenter) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESOFTWAREMicrosoftSecurity CenterUpdatesDisableNotify (Disabled.SecurityCenter) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.Заражено папок:
(Вредоносные программы не обнаружены)Заражено файлов:
C:Documents and SettingsTom JoadLocal Settingstempmsupd_2.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:Documents and SettingsTom JoadLocal SettingsTemporary Internet FilesContent.IE5H62T4WJCInstall[1].exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:QooboxQuarantineCWINDOWSsystem32wisdstr.exe.vir (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:WINDOWSsystem32wisdstr.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:WINDOWSsystem32dllcachebeep.sys (Trojan.KillAV) -> Quarantined and deleted successfully.
C:WINDOWSsystem32driversbeep.sys (Trojan.KillAV) -> Quarantined and deleted successfully.
C:WINDOWSsystem32braviax.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:WINDOWStempBN11.tmp (Trojan.Agent) -> Quarantined and deleted successfully.
C:Documents and SettingsTom JoadLocal SettingstempBN1.tmp (Trojan.Agent) -> Quarantined and deleted successfully.
C:Documents and SettingsTom Joadoashdihasidhasuidhiasdhiashdiuasdhasd (Malware.Trace) -> Quarantined and deleted successfully.
C:Documents and SettingsTom JoadLocal Settingstemptmpwr2 (Rogue.Installer) -> Quarantined and deleted successfully.
C:Documents and SettingsTom JoadLocal Settingstemptmpwr3 (Rogue.Installer) -> Quarantined and deleted successfully.
C:Documents and SettingsTom JoadLocal Settingstemptmpwr4 (Rogue.Installer) -> Quarantined and deleted successfully.Повторно не помогло,решил попробывать SDFix ,результат
-
SDFix: Version 1.240
Run by Tom Joad on 03.09.2009 at 12:27Microsoft Windows XP [‚ҐабЁп 5.1.2600]
Running From: C:SDFixChecking Services :
Restoring Default Security Values
Restoring Default Hosts File
Resetting AppInit_DLLs valueRebooting
Infected beep.sys Found!
beep.sys File Locations:
«C:WINDOWSsystem32dllcachebeep.sys» 29184 03.09.2009 12:11
«C:WINDOWSsystem32driversbeep.sys» 29184 03.09.2009 12:11Infected File Listed Below:
C:WINDOWSsystem32dllcachebeep.sys
C:WINDOWSsystem32driversbeep.sysFile copied to Backups Folder
Attempting to replace beep.sys with original versionOriginal beep.sys Restored
«C:WINDOWSsystem32dllcachebeep.sys» 4224 07.08.2008 15:27
«C:WINDOWSsystem32driversbeep.sys» 4224 07.08.2008 15:27Checking Files :
Trojan Files Found:
C:DOCUME~1TOMJOA~1COOKIESUVUMEW._DL — Deleted
C:DOCUME~1TOMJOA~1COOKIESEMOXY.PIF — Deleted
C:WINDOWSbraviax.exe — Deleted
C:WINDOWScru629.dat — Deleted
C:WINDOWSsystem32braviax.exe — Deleted
C:WINDOWSsystem32cru629.dat — DeletedRemoving Temp Files
ADS Check :
Final Check :
catchme 0.3.1361.2 W2K/XP/Vista — rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2009-09-03 12:33:10
Windows 5.1.2600 Service Pack 2 NTFSscanning hidden processes …
scanning hidden services & system hive …
[HKEY_LOCAL_MACHINESYSTEMCurrentControlSetControlNetwork{4D36E972-E325-11CE-BFC1-08002BE10318}Descriptions]
«34484=484?4>4@4B4 ?W?A?N? ?(?L?2?T?P?)?»=str(7):»1 »
«34484=484?4>4@4B4 ?W?A?N? ?(?P?P?T?P?)?»=str(7):»1 »
«34484=484?4>4@4B4 ?W?A?N? ?(?P?P?P?o?E?)?»=str(7):»1 »
«374@4O4<4>494 ?? 0404@ 0404;4; 0454;4L4=4K494 ??4>4@4B4″=str(7):»1 »
«34484=484?4>4@4B4 ?W?A?N? ?(?I?P?)?»=str(7):»1 »
«34484=484?4>4@4B4 ??4; 0404=484@4> 0424I484: 0404 ?? 0404: 0454B4> 0424″=str(7):»1 002 »
[HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServiceslanmanserverShares]
«374@484=4B 0454@4″=str(7):»CSCFlags=0 MaxUses=4294967295 Path=Microsoft XPS Document Writer,LocalsplOnly Permissions=0 Remark=Microsoft XPS Document Writer Type=1 »
«374@484=4B 0454@ 042?»=str(7):»CSCFlags=0 MaxUses=4294967295 Path=Microsoft Office Document Image Writer,LocalsplOnly Permissions=0 Remark=Microsoft Office Document Image Writer Type=1 »
[HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicessptdCfg]
«s1″=dword:2df9c43f
«s2″=dword:110480d0
«h0″=dword:00000001[HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicessptdCfg19659239224E364682FA4BAF72C53EA4]
«p0″=»C:Program FilesDAEMON Tools»
«h0″=dword:00000000
«khjeh»=hex:50,bd,ed,49,ed,99,ca,7b,05,d3,ca,51,ba,7a,ca,ec,53,c7,06,e9,5a,..[HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicessptdCfg19659239224E364682FA4BAF72C53EA4 0000001]
«a0″=hex:20,01,00,00,90,d7,6d,e1,81,0a,a6,3e,08,cd,7c,04,44,50,b4,1f,c6,..
«khjeh»=hex:3a,b4,f1,47,99,9a,fc,1b,2b,e6,24,2d,78,1e,d9,61,1e,07,7d,37,25,..[HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicessptdCfg19659239224E364682FA4BAF72C53EA4 0000001 Jf40]
«khjeh»=hex:a7,34,f5,e9,8a,50,f1,9a,d2,3b,3c,c1,32,19,4f,75,01,12,27,5f,22,..
[HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesSysmonLogLog Queries{99aa6cce-4d9c-4285-a202-95bd8579dea9}]
«324>4A 042 0454=4=4K494 ?:4>4<4<