Firewalll писал(а):
Drozd, любопытно а каков общий результат теста на вашем компе?
Avira AntiVir Personal
Report file date: 12 октября 2008 г. 00:24
Scanning for 1677110 virus strains and unwanted programs.
Licensed to: Avira AntiVir PersonalEdition Classic
Serial number: 0000149996-ADJIE-0001
Platform: Windows XP
Windows version: (Service Pack 2) [5.1.2600]
Boot mode: Normally booted
Username: SYSTEM
Computer name: USER
Version information:
BUILD.DAT : 8.1.0.331 16934 Bytes 12.08.2008 11:46:00
AVSCAN.EXE : 8.1.4.7 315649 Bytes 26.06.2008 06:57:53
AVSCAN.DLL : 8.1.4.0 40705 Bytes 26.05.2008 05:56:40
LUKE.DLL : 8.1.4.5 164097 Bytes 12.06.2008 10:44:19
LUKERES.DLL : 8.1.4.0 12033 Bytes 26.05.2008 05:58:52
ANTIVIR0.VDF : 6.40.0.0 11030528 Bytes 18.07.2007 08:33:34
ANTIVIR1.VDF : 7.0.5.1 8182784 Bytes 24.06.2008 11:54:15
ANTIVIR2.VDF : 7.0.7.12 4066816 Bytes 08.10.2008 20:08:56
ANTIVIR3.VDF : 7.0.7.28 120320 Bytes 11.10.2008 20:09:11
Engineversion : 8.1.1.35
AEVDF.DLL : 8.1.0.5 102772 Bytes 25.02.2008 07:58:21
AESCRIPT.DLL : 8.1.0.76 319867 Bytes 11.10.2008 20:09:47
AESCN.DLL : 8.1.0.23 119156 Bytes 10.07.2008 10:44:49
AERDL.DLL : 8.1.1.2 438644 Bytes 11.10.2008 20:09:40
AEPACK.DLL : 8.1.2.3 364918 Bytes 11.10.2008 20:09:35
AEOFFICE.DLL : 8.1.0.25 196986 Bytes 11.10.2008 20:09:31
AEHEUR.DLL : 8.1.0.59 1438071 Bytes 11.10.2008 20:09:28
AEHELP.DLL : 8.1.0.15 115063 Bytes 10.07.2008 10:44:48
AEGEN.DLL : 8.1.0.36 315764 Bytes 11.10.2008 20:09:20
AEEMU.DLL : 8.1.0.7 430452 Bytes 31.07.2008 06:33:21
AECORE.DLL : 8.1.1.11 172406 Bytes 11.10.2008 20:09:18
AEBB.DLL : 8.1.0.1 53617 Bytes 10.07.2008 10:44:48
AVWINLL.DLL : 1.0.0.12 15105 Bytes 09.07.2008 06:40:05
AVPREF.DLL : 8.0.2.0 38657 Bytes 16.05.2008 07:28:01
AVREP.DLL : 8.0.0.2 98344 Bytes 11.10.2008 20:09:14
AVREG.DLL : 8.0.0.1 33537 Bytes 09.05.2008 09:26:40
AVARKT.DLL : 1.0.0.23 307457 Bytes 12.02.2008 06:29:23
AVEVTLOG.DLL : 8.0.0.16 119041 Bytes 12.06.2008 10:27:49
SQLITE3.DLL : 3.3.17.1 339968 Bytes 22.01.2008 15:28:02
SMTPLIB.DLL : 1.2.0.23 28929 Bytes 12.06.2008 10:49:40
NETNT.DLL : 8.0.0.1 7937 Bytes 25.01.2008 10:05:10
RCIMAGE.DLL : 8.0.0.51 2371841 Bytes 12.06.2008 11:48:07
RCTEXT.DLL : 8.0.52.0 86273 Bytes 27.06.2008 11:34:37
Configuration settings for the scan:
Jobname..........................: Complete system scan
Configuration file...............: c:\program files\avira\antivir personaledition classic\sysscan.avp
Logging..........................: low
Primary action...................: interactive
Secondary action.................: ignore
Scan master boot sector..........: on
Scan boot sector.................: on
Boot sectors.....................: C:, E:,
Process scan.....................: on
Scan registry....................: on
Search for rootkits..............: off
Scan all files...................: Intelligent file selection
Scan archives....................: on
Recursion depth..................: 20
Smart extensions.................: on
Macro heuristic..................: on
File heuristic...................: medium
Start of the scan: 12 октября 2008 г. 00:24
The scan of running processes will be started
Scan process 'avscan.exe' - '1' Module(s) have been scanned
Scan process 'avcenter.exe' - '1' Module(s) have been scanned
Scan process 'avgnt.exe' - '1' Module(s) have been scanned
Scan process 'avguard.exe' - '1' Module(s) have been scanned
Scan process 'sched.exe' - '1' Module(s) have been scanned
Scan process 'run.exe' - '1' Module(s) have been scanned
Scan process 'firefox.exe' - '1' Module(s) have been scanned
Scan process 'ntvdm.exe' - '1' Module(s) have been scanned
Scan process 'Skype.exe' - '1' Module(s) have been scanned
Scan process 'Maxthon.exe' - '1' Module(s) have been scanned
Scan process 'thebat.exe' - '1' Module(s) have been scanned
Scan process 'MPAPI3s.exe' - '1' Module(s) have been scanned
Scan process 'ServiceLayer.exe' - '1' Module(s) have been scanned
Scan process 'BlueSoleil.exe' - '1' Module(s) have been scanned
Scan process 'PcSync2.exe' - '1' Module(s) have been scanned
Scan process 'yupdate.exe' - '1' Module(s) have been scanned
Scan process 'punto.exe' - '1' Module(s) have been scanned
Scan process 'dmaster.exe' - '1' Module(s) have been scanned
Scan process 'ctfmon.exe' - '1' Module(s) have been scanned
Scan process 'zlclient.exe' - '0' Module(s) have been scanned
Scan process 'winampa.exe' - '1' Module(s) have been scanned
Scan process 'nod32kui.exe' - '1' Module(s) have been scanned
Scan process 'rundll32.exe' - '1' Module(s) have been scanned
Scan process 'hkcmd.exe' - '1' Module(s) have been scanned
Scan process 'igfxtray.exe' - '1' Module(s) have been scanned
Scan process 'wdfmgr.exe' - '1' Module(s) have been scanned
Scan process 'svchost.exe' - '1' Module(s) have been scanned
Scan process 'nod32krn.exe' - '1' Module(s) have been scanned
Scan process 'spoolsv.exe' - '1' Module(s) have been scanned
Scan process 'vsmon.exe' - '0' Module(s) have been scanned
Scan process 'explorer.exe' - '1' Module(s) have been scanned
Scan process 'svchost.exe' - '1' Module(s) have been scanned
Scan process 'svchost.exe' - '1' Module(s) have been scanned
Scan process 'svchost.exe' - '1' Module(s) have been scanned
Scan process 'svchost.exe' - '1' Module(s) have been scanned
Scan process 'svchost.exe' - '1' Module(s) have been scanned
Scan process 'lsass.exe' - '1' Module(s) have been scanned
Scan process 'services.exe' - '1' Module(s) have been scanned
Scan process 'winlogon.exe' - '1' Module(s) have been scanned
Scan process 'csrss.exe' - '1' Module(s) have been scanned
Scan process 'smss.exe' - '1' Module(s) have been scanned
39 processes with 39 modules were scanned
Starting master boot sector scan:
Master boot sector HD0
[INFO] No virus was found!
Start scanning boot sectors:
Boot sector 'C:\'
[INFO] No virus was found!
Boot sector 'E:\'
[INFO] No virus was found!
Starting to scan the registry.
The registry was scanned ( '52' files ).
Starting the file scan:
Begin scan in 'C:\'
C:\pagefile.sys
[WARNING] The file could not be opened!
C:\Documents and Settings\Администратор\Local Settings\Temporary Internet Files\Content.IE5\5Y2PNQG3\index[2].htm
[DETECTION] Contains HEUR/HTML.Malware suspicious code
[NOTE] The detection was classified as suspicious.
[NOTE] The file was moved to '49550fc9.qua'!
C:\Documents and Settings\Администратор\Local Settings\Temporary Internet Files\Content.IE5\8SUCFOVJ\count[1].htm
[DETECTION] Contains recognition pattern of the HTML/Infected.WebPage.Gen HTML script virus
[NOTE] The file was moved to '49660ff6.qua'!
C:\Documents and Settings\Администратор\Local Settings\Temporary Internet Files\Content.IE5\8SUCFOVJ\load[1].exe
[DETECTION] Is the TR/Dldr.Mutant.azn Trojan
[NOTE] The file was moved to '49521003.qua'!
C:\Documents and Settings\Администратор\Local Settings\Temporary Internet Files\Content.IE5\8SUCFOVJ\t[1].htm
[DETECTION] Contains HEUR/HTML.Malware suspicious code
[NOTE] The detection was classified as suspicious.
[NOTE] The file was moved to '49220ffe.qua'!
C:\Documents and Settings\Администратор\Local Settings\Temporary Internet Files\Content.IE5\EUI4G30C\traff[1].htm
[DETECTION] Contains recognition pattern of the HTML/IFrame.99 HTML script virus
[NOTE] The file was moved to '49521083.qua'!
C:\Documents and Settings\Администратор\Local Settings\Temporary Internet Files\Content.IE5\EUI4G30C\V-Moskvu-priletel-gollandskii-rezhissjor-Ios-Stelling[1].htm
[DETECTION] Contains recognition pattern of the HTML/Infected.WebPage.Gen HTML script virus
[NOTE] The file was moved to '493e1043.qua'!
C:\Documents and Settings\Администратор\Local Settings\Temporary Internet Files\Content.IE5\TXULQ42U\count[1].htm
[DETECTION] Contains recognition pattern of the HTML/IFrame.106 HTML script virus
[NOTE] The file was moved to '4966119b.qua'!
C:\Documents and Settings\Администратор\Local Settings\Temporary Internet Files\Content.IE5\TXULQ42U\index[1].htm
[DETECTION] Contains HEUR/HTML.Malware suspicious code
[NOTE] The detection was classified as suspicious.
[NOTE] The file was moved to '495511b1.qua'!
C:\Documents and Settings\Администратор\Local Settings\Temporary Internet Files\Content.IE5\TXULQ42U\in[1].htm
[DETECTION] Contains recognition pattern of the HTML/IFrame.94 HTML script virus
[NOTE] The file was moved to '494c11b2.qua'!
C:\Documents and Settings\Администратор\Local Settings\Temporary Internet Files\Content.IE5\TXULQ42U\pdf[1].pdf
[0] Archive type: PDF Stream
--> Object
[DETECTION] Contains recognition pattern of the HTML/Rce.Gen HTML script virus
[NOTE] The file was moved to '495711ba.qua'!
C:\Program Files\ESET\infected\3TPOPWCA.NQF
[0] Archive type: HIDDEN
--> FIL\\\?\C:\Program Files\ESET\infected\3TPOPWCA.NQF
[DETECTION] Is the TR/Dropper.Gen Trojan
[NOTE] The file was moved to '4941150a.qua'!
C:\Program Files\ESET\infected\4IYA2VDA.NQF
[0] Archive type: HIDDEN
--> FIL\\\?\C:\Program Files\ESET\infected\4IYA2VDA.NQF
[DETECTION] Is the TR/Dropper.Gen Trojan
[NOTE] The file was moved to '494a1507.qua'!
C:\Program Files\ESET\infected\F5UIDUBA.NQF
[0] Archive type: HIDDEN
--> FIL\\\?\C:\Program Files\ESET\infected\F5UIDUBA.NQF
[DETECTION] Is the TR/Drop.Agent.VUD Trojan
[NOTE] The file was moved to '494614f7.qua'!
C:\Program Files\ESET\infected\FQLXMXBA.NQF
[0] Archive type: HIDDEN
--> FIL\\\?\C:\Program Files\ESET\infected\FQLXMXBA.NQF
[DETECTION] Is the TR/Dropper.Gen Trojan
[NOTE] The file was moved to '493d1514.qua'!
C:\Program Files\ESET\infected\FWI3QQCA.NQF
[0] Archive type: HIDDEN
--> FIL\\\?\C:\Program Files\ESET\infected\FWI3QQCA.NQF
[DETECTION] Is the TR/Vundo.Gen Trojan
[NOTE] The file was moved to '493a151b.qua'!
C:\Program Files\ESET\infected\GUOFJWAA.NQF
[0] Archive type: HIDDEN
--> FIL\\\?\C:\Program Files\ESET\infected\GUOFJWAA.NQF
[DETECTION] Is the TR/Dropper.Gen Trojan
[NOTE] The file was moved to '4940151b.qua'!
C:\Program Files\ESET\infected\JYJJCFBA.NQF
[0] Archive type: HIDDEN
--> FIL\\\?\C:\Program Files\ESET\infected\JYJJCFBA.NQF
[DETECTION] Is the TR/Dropper.Gen Trojan
[NOTE] The file was moved to '493b1521.qua'!
C:\Program Files\ESET\infected\NZ5VUUCA.NQF
[0] Archive type: HIDDEN
--> FIL\\\?\C:\Program Files\ESET\infected\NZ5VUUCA.NQF
[DETECTION] Is the TR/Dropper.Gen Trojan
[NOTE] The file was moved to '49261524.qua'!
C:\Program Files\ESET\infected\OBK4G1CA.NQF
[0] Archive type: HIDDEN
--> FIL\\\?\C:\Program Files\ESET\infected\OBK4G1CA.NQF
[DETECTION] Is the TR/Cutwail.D Trojan
[NOTE] The file was moved to '493c150c.qua'!
C:\Program Files\ESET\infected\TKNAPNBA.NQF
[0] Archive type: HIDDEN
--> FIL\\\?\C:\Program Files\ESET\infected\TKNAPNBA.NQF
[DETECTION] Is the TR/Drop.Agent.leb Trojan
[NOTE] The file was moved to '493f1516.qua'!
C:\System Volume Information\_restore{4A04DADE-E2C6-4433-B09B-F4A26FA7EE69}\RP187\A0030044.exe
[DETECTION] Is the TR/Dldr.Mutant.azn Trojan
[NOTE] The file was moved to '4921191d.qua'!
Begin scan in 'E:\'
E:\Program Files\Opera\profile\cache4\opr11C3O
[0] Archive type: PDF Stream
--> Object
[DETECTION] Contains recognition pattern of the JS/Dldr.Small.CR.2 Java script virus
[NOTE] The file was moved to '496329ff.qua'!
E:\Program Files\Opera\profile\cache4\opr11C2J
[0] Archive type: GZ
--> unkwn
[1] Archive type: PDF Stream
--> Object
[DETECTION] Contains recognition pattern of the JS/Dldr.Small.CR.2 Java script virus
[NOTE] The file was moved to '49632a4f.qua'!
E:\Program Files\ACD Systems\ACDSee\8.0\ACDSee8.exe
[DETECTION] Is the TR/Agent.3166103 Trojan
[NOTE] The file was moved to '49352bd6.qua'!
End of the scan: 12 октября 2008 г. 03:21
Used time: 2:57:13 Hour(s)
The scan has been done completely.
5472 Scanning directories
333648 Files were scanned
21 viruses and/or unwanted programs were found
3 Files were classified as suspicious:
0 files were deleted
0 files were repaired
24 files were moved to quarantine
0 files were renamed
1 Files cannot be scanned
333623 Files not concerned
1700 Archives were scanned
1 Warnings
24 Notes