Avira antivirus problem

Avira antivirus problem

offline
  • Pridružio: 22 Dec 2007
  • Poruke: 20

Poz, skenirao sam kompijuter i nasao mi je 21 virus ali mi se nigde nije pojavilo da obrisem...

ne razumem se bas mnogo pa bih molio za pomoc
evo izvestaj od skeniranja:




Avira AntiVir Personal
Report file date: Monday, December 20, 2010 13:14

Scanning for 2264596 virus strains and unwanted programs.

Licensee : Avira AntiVir Personal - FREE Antivirus
Serial number : 0000149996-ADJIE-0000001
Platform : Windows XP
Windows version : (Service Pack 2) [5.1.2600]
Boot mode : Normally booted
Username : SYSTEM
Computer name : DACHA

Version information:
BUILD.DAT : 9.0.0.429 21701 Bytes 10/6/2010 10:04:00
AVSCAN.EXE : 9.0.3.10 466689 Bytes 2/18/2010 05:15:59
AVSCAN.DLL : 9.0.3.0 40705 Bytes 2/27/2009 23:58:24
LUKE.DLL : 9.0.3.2 209665 Bytes 2/21/2009 00:35:49
LUKERES.DLL : 9.0.2.0 12033 Bytes 2/27/2009 23:58:52
VBASE000.VDF : 7.10.0.0 19875328 Bytes 11/6/2009 21:43:12
VBASE001.VDF : 7.11.0.0 13342208 Bytes 12/14/2010 10:49:42
VBASE002.VDF : 7.11.0.1 2048 Bytes 12/14/2010 10:49:42
VBASE003.VDF : 7.11.0.2 2048 Bytes 12/14/2010 10:49:42
VBASE004.VDF : 7.11.0.3 2048 Bytes 12/14/2010 10:49:43
VBASE005.VDF : 7.11.0.4 2048 Bytes 12/14/2010 10:49:43
VBASE006.VDF : 7.11.0.5 2048 Bytes 12/14/2010 10:49:43
VBASE007.VDF : 7.11.0.6 2048 Bytes 12/14/2010 10:49:43
VBASE008.VDF : 7.11.0.7 2048 Bytes 12/14/2010 10:49:43
VBASE009.VDF : 7.11.0.8 2048 Bytes 12/14/2010 10:49:43
VBASE010.VDF : 7.11.0.9 2048 Bytes 12/14/2010 10:49:43
VBASE011.VDF : 7.11.0.10 2048 Bytes 12/14/2010 10:49:43
VBASE012.VDF : 7.11.0.11 2048 Bytes 12/14/2010 10:49:43
VBASE013.VDF : 7.11.0.52 128000 Bytes 12/16/2010 10:47:30
VBASE014.VDF : 7.11.0.53 2048 Bytes 12/16/2010 10:47:30
VBASE015.VDF : 7.11.0.54 2048 Bytes 12/16/2010 10:47:30
VBASE016.VDF : 7.11.0.55 2048 Bytes 12/16/2010 10:47:30
VBASE017.VDF : 7.11.0.56 2048 Bytes 12/16/2010 10:47:30
VBASE018.VDF : 7.11.0.57 2048 Bytes 12/16/2010 10:47:30
VBASE019.VDF : 7.11.0.58 2048 Bytes 12/16/2010 10:47:30
VBASE020.VDF : 7.11.0.59 2048 Bytes 12/16/2010 10:47:30
VBASE021.VDF : 7.11.0.60 2048 Bytes 12/16/2010 10:47:31
VBASE022.VDF : 7.11.0.61 2048 Bytes 12/16/2010 10:47:31
VBASE023.VDF : 7.11.0.62 2048 Bytes 12/16/2010 10:47:31
VBASE024.VDF : 7.11.0.63 2048 Bytes 12/16/2010 10:47:31
VBASE025.VDF : 7.11.0.64 2048 Bytes 12/16/2010 10:47:31
VBASE026.VDF : 7.11.0.65 2048 Bytes 12/16/2010 10:47:31
VBASE027.VDF : 7.11.0.66 2048 Bytes 12/16/2010 10:47:31
VBASE028.VDF : 7.11.0.67 2048 Bytes 12/16/2010 10:47:31
VBASE029.VDF : 7.11.0.68 2048 Bytes 12/16/2010 10:47:31
VBASE030.VDF : 7.11.0.69 2048 Bytes 12/16/2010 10:47:31
VBASE031.VDF : 7.11.0.84 79872 Bytes 12/19/2010 10:47:36
Engineversion : 8.2.4.126
AEVDF.DLL : 8.1.2.1 106868 Bytes 7/30/2010 10:33:39
AESCRIPT.DLL : 8.1.3.48 1286524 Bytes 12/3/2010 10:51:24
AESCN.DLL : 8.1.7.2 127349 Bytes 11/23/2010 10:50:54
AESBX.DLL : 8.1.3.2 254324 Bytes 11/23/2010 10:50:58
AERDL.DLL : 8.1.9.2 635252 Bytes 9/22/2010 11:55:32
AEPACK.DLL : 8.2.4.5 512375 Bytes 12/17/2010 10:47:46
AEOFFICE.DLL : 8.1.1.10 201084 Bytes 11/23/2010 10:50:53
AEHEUR.DLL : 8.1.2.57 3142008 Bytes 12/17/2010 10:47:44
AEHELP.DLL : 8.1.16.0 246136 Bytes 12/3/2010 10:50:53
AEGEN.DLL : 8.1.5.0 397685 Bytes 12/3/2010 10:50:52
AEEMU.DLL : 8.1.3.0 393589 Bytes 11/23/2010 10:50:38
AECORE.DLL : 8.1.19.0 196984 Bytes 12/3/2010 10:50:49
AEBB.DLL : 8.1.1.0 53618 Bytes 4/25/2010 03:31:52
AVWINLL.DLL : 9.0.0.3 18177 Bytes 12/12/2008 21:47:59
AVPREF.DLL : 9.0.3.0 44289 Bytes 2/18/2010 05:15:59
AVREP.DLL : 8.0.0.7 159784 Bytes 2/18/2010 05:15:59
AVREG.DLL : 9.0.0.0 36609 Bytes 12/5/2008 23:32:09
AVARKT.DLL : 9.0.0.3 292609 Bytes 3/25/2009 04:05:41
AVEVTLOG.DLL : 9.0.0.7 167169 Bytes 1/30/2009 23:37:08
SQLITE3.DLL : 3.6.1.0 326401 Bytes 1/29/2009 04:03:49
SMTPLIB.DLL : 9.2.0.25 28417 Bytes 2/2/2009 21:21:33
NETNT.DLL : 9.0.0.0 11521 Bytes 12/5/2008 23:32:10
RCIMAGE.DLL : 9.0.0.25 2438913 Bytes 5/16/2009 04:39:58
RCTEXT.DLL : 9.0.73.0 86785 Bytes 2/18/2010 05:15:59

Configuration settings for the scan:
Jobname.............................: Complete system scan
Configuration file..................: c:\program files\avira\antivir desktop\sysscan.avp
Logging.............................: low
Primary action......................: delete
Secondary action....................: ignore
Scan master boot sector.............: on
Scan boot sector....................: on
Boot sectors........................: C:, D:,
Process scan........................: on
Scan registry.......................: on
Search for rootkits.................: on
Integrity checking of system files..: off
Scan all files......................: All files
Scan archives.......................: on
Recursion depth.....................: 20
Smart extensions....................: on
Macro heuristic.....................: on
File heuristic......................: medium

Start of the scan: Monday, December 20, 2010 13:14

Starting search for hidden objects.
'62713' objects were checked, '0' hidden objects were found.

The scan of running processes will be started
Scan process 'chrome.exe' - '1' Module(s) have been scanned
Scan process 'chrome.exe' - '1' Module(s) have been scanned
Scan process 'chrome.exe' - '1' Module(s) have been scanned
Scan process 'wmiprvse.exe' - '1' Module(s) have been scanned
Scan process 'chrome.exe' - '1' Module(s) have been scanned
Scan process 'chrome.exe' - '1' Module(s) have been scanned
Scan process 'chrome.exe' - '1' Module(s) have been scanned
Scan process 'avscan.exe' - '1' Module(s) have been scanned
Scan process 'avcenter.exe' - '1' Module(s) have been scanned
Scan process 'svchost.exe' - '1' Module(s) have been scanned
Scan process 'alg.exe' - '1' Module(s) have been scanned
Scan process 'svchost.exe' - '1' Module(s) have been scanned
Scan process 'SeaPort.exe' - '1' Module(s) have been scanned
Scan process 'RichVideo.exe' - '1' Module(s) have been scanned
Scan process 'PsiService_2.exe' - '1' Module(s) have been scanned
Scan process 'nvsvc32.exe' - '1' Module(s) have been scanned
Scan process 'jqs.exe' - '1' Module(s) have been scanned
Scan process 'avguard.exe' - '1' Module(s) have been scanned
Scan process 'GoogleCrashHandler.exe' - '1' Module(s) have been scanned
Scan process 'cacaoweb.exe' - '1' Module(s) have been scanned
Scan process 'daemon.exe' - '1' Module(s) have been scanned
Scan process 'svchost.exe' - '1' Module(s) have been scanned
Scan process 'ctfmon.exe' - '1' Module(s) have been scanned
Scan process 'MWSOEMON.EXE' - '1' Module(s) have been scanned
Scan process 'realsched.exe' - '1' Module(s) have been scanned
Scan process 'DivXUpdate.exe' - '1' Module(s) have been scanned
Scan process 'jusched.exe' - '1' Module(s) have been scanned
Scan process 'rundll32.exe' - '1' Module(s) have been scanned
Scan process 'avgnt.exe' - '1' Module(s) have been scanned
Scan process 'RTHDCPL.EXE' - '1' Module(s) have been scanned
Scan process 'sched.exe' - '1' Module(s) have been scanned
Scan process 'spoolsv.exe' - '1' Module(s) have been scanned
Scan process 'explorer.exe' - '1' Module(s) have been scanned
Scan process 'svchost.exe' - '1' Module(s) have been scanned
Scan process 'svchost.exe' - '1' Module(s) have been scanned
Scan process 'svchost.exe' - '1' Module(s) have been scanned
Scan process 'svchost.exe' - '1' Module(s) have been scanned
Scan process 'svchost.exe' - '1' Module(s) have been scanned
Scan process 'lsass.exe' - '1' Module(s) have been scanned
Scan process 'services.exe' - '1' Module(s) have been scanned
Scan process 'winlogon.exe' - '1' Module(s) have been scanned
Scan process 'csrss.exe' - '1' Module(s) have been scanned
Scan process 'smss.exe' - '1' Module(s) have been scanned
43 processes with 43 modules were scanned

Starting master boot sector scan:
Master boot sector HD0
[INFO] No virus was found!

Start scanning boot sectors:
Boot sector 'C:\'
[INFO] No virus was found!
Boot sector 'D:\'
[INFO] No virus was found!

Starting to scan executable files (registry).
The registry was scanned ( '61' files ).


Starting the file scan:

Begin scan in 'C:\'
C:\pagefile.sys
[WARNING] The file could not be opened!
[NOTE] This file is a Windows system file.
[NOTE] This file cannot be opened for scanning.
C:\Documents and Settings\Administrator\Local Settings\Application Data\Softonic-Eng7\plugins\{5E1360DC-8FA8-40df-A8CD-FC3831B3634B}\{5E1360DC-8FA8-40df-A8CD-FC3831B3634B}.cpi
[0] Archive type: CAB (Microsoft)
--> 3.1.1\bin\PriceGong_16.png
[WARNING] No further files can be extracted from this archive. The archive will be closed
[WARNING] No further files can be extracted from this archive. The archive will be closed
C:\Documents and Settings\Administrator\Local Settings\Application Data\Softonic_English\plugins\{5E1360DC-8FA8-40df-A8CD-FC3831B3634B}\{5E1360DC-8FA8-40df-A8CD-FC3831B3634B}.cpi
[0] Archive type: CAB (Microsoft)
--> 3.1.1\bin\PriceGong_16.png
[WARNING] No further files can be extracted from this archive. The archive will be closed
[WARNING] No further files can be extracted from this archive. The archive will be closed
C:\Documents and Settings\Administrator\Local Settings\Temp\+ccFZ_Pz.exe.part
[0] Archive type: NSIS
--> ProgramFilesDir/vlc-1.0.1-win32.exe
[1] Archive type: NSIS
--> ProgramFilesDir/AUTHORS.txt
[WARNING] No further files can be extracted from this archive. The archive will be closed
--> ProgramFilesDir/GraboidClient.exe
[WARNING] No further files can be extracted from this archive. The archive will be closed
[WARNING] No further files can be extracted from this archive. The archive will be closed
C:\Documents and Settings\Administrator\Local Settings\Temp\jar_cache4702548365328186982.tmp
[0] Archive type: ZIP
--> MessageManager.class
[DETECTION] Contains recognition pattern of the JAVA/Agent.AJ.3 Java virus
--> WWWManager.class
[DETECTION] Contains recognition pattern of the EXP/CVE-2009-3867.JP exploit
[NOTE] The file was deleted!
C:\Documents and Settings\Administrator\Local Settings\Temp\jar_cache5115673456502667410.tmp
[0] Archive type: ZIP
--> 0264c034
[DETECTION] Contains recognition pattern of the EXP/CVE-2010-0094.A exploit
--> CustomClass.class
[DETECTION] Contains recognition pattern of the JAVA/Rowindal.I Java virus
--> evilPolicy.class
[DETECTION] Contains recognition pattern of the EXP/CVE-2008-5353.SV exploit
--> mosdef.class
[DETECTION] Contains recognition pattern of the EXP/CVE-2008-5353.VZ exploit
[NOTE] The file was deleted!
C:\Documents and Settings\Administrator\Local Settings\Temp\jar_cache5429575396459292426.tmp
[0] Archive type: ZIP
--> JavaUpdateApplication.class
[DETECTION] Contains recognition pattern of the EXP/CVE-2009-3867.IY exploit
--> JavaUpdateManager.class
[DETECTION] Contains recognition pattern of the EXP/CVE-2009-3867.LV exploit
[NOTE] The file was deleted!
C:\Documents and Settings\Administrator\Local Settings\Temp\jar_cache6100436473117809418.tmp
[0] Archive type: ZIP
--> a3ea10778bc.class
[DETECTION] Contains recognition pattern of the EXP/CVE-2008-5353.VH exploit
--> a6e69525d5c.class
[DETECTION] Contains recognition pattern of the JAVA/Agent.AL.2 Java virus
--> a999fa61a07.class
[DETECTION] Contains recognition pattern of the JAVA/OpenConnecti.A Java virus
--> acd9d6c533d.class
[DETECTION] Contains recognition pattern of the EXP/CVE-2008-5353.TM exploit
--> ad565690c5c.class
[DETECTION] Contains recognition pattern of the EXP/CVE-2008-5353.SH exploit
[NOTE] The file was deleted!
C:\Documents and Settings\Administrator\Local Settings\Temp\jar_cache6484683258319788474.tmp
[0] Archive type: ZIP
--> MessageManager.class
[DETECTION] Contains recognition pattern of the JAVA/Agent.AJ.3 Java virus
--> WWWManager.class
[DETECTION] Contains recognition pattern of the EXP/CVE-2009-3867.JP exploit
[NOTE] The file was deleted!
C:\Documents and Settings\Administrator\Local Settings\Temp\jar_cache8163756011215821088.tmp
[0] Archive type: ZIP
--> a3ea10778bc.class
[DETECTION] Contains recognition pattern of the EXP/CVE-2008-5353.VH exploit
--> a6e69525d5c.class
[DETECTION] Contains recognition pattern of the JAVA/Agent.AL.2 Java virus
--> a999fa61a07.class
[DETECTION] Contains recognition pattern of the JAVA/OpenConnecti.A Java virus
--> acd9d6c533d.class
[DETECTION] Contains recognition pattern of the EXP/CVE-2008-5353.TM exploit
--> ad565690c5c.class
[DETECTION] Contains recognition pattern of the EXP/CVE-2008-5353.SH exploit
[NOTE] The file was deleted!
C:\Documents and Settings\Administrator\Local Settings\Temp\div37.tmp\div4A.tmp
[0] Archive type: NSIS
--> ProgramFilesDir/DPXBannerAdPlugin.xml
[WARNING] No further files can be extracted from this archive. The archive will be closed
[WARNING] No further files can be extracted from this archive. The archive will be closed
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\418ZSCVW\{5E1360DC-8FA8-40df-A8CD-FC3831B3634B}[1].cpi
[0] Archive type: CAB (Microsoft)
--> 3.1.1\bin\PriceGong_16.png
[WARNING] No further files can be extracted from this archive. The archive will be closed
[WARNING] No further files can be extracted from this archive. The archive will be closed
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\8NB2YYC3\Installer[4].exe
[0] Archive type: NSIS
--> ProgramFilesDir/DPXBannerAdPlugin.xml
[WARNING] No further files can be extracted from this archive. The archive will be closed
[WARNING] No further files can be extracted from this archive. The archive will be closed
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\EE7HLCSF\{5E1360DC-8FA8-40df-A8CD-FC3831B3634B}[1].cpi
[0] Archive type: CAB (Microsoft)
--> 3.1.1\bin\PriceGong_16.png
[WARNING] No further files can be extracted from this archive. The archive will be closed
[WARNING] No further files can be extracted from this archive. The archive will be closed
C:\WINDOWS\system32\drivers\sptd.sys
[WARNING] The file could not be opened!
Begin scan in 'D:\'
D:\stefan\Eat Pray Love (2010 Movie) DVDRip [Full Movie] XviD-DiAMOND\Eat Pray Love (2010 Movie) DVDRip [Full Movie] XviD-DiAMOND.avi
[DETECTION] Contains recognition pattern of the EXP/ASF.GetCodec.Gen exploit
[NOTE] The file was deleted!


End of the scan: Monday, December 20, 2010 14:01
Used time: 47:11 Minute(s)

The scan has been done completely.

11843 Scanned directories
316032 Files were scanned
21 Viruses and/or unwanted programs were found
0 Files were classified as suspicious
7 files were deleted
0 Viruses and unwanted programs were repaired
0 Files were moved to quarantine
0 Files were renamed
2 Files cannot be scanned
316009 Files not concerned
2419 Archives were scanned
17 Warnings
8 Notes
62713 Objects were scanned with rootkit scan
0 Hidden objects were found

offline
  • Pridružio: 02 Feb 2008
  • Poruke: 14018
  • Gde živiš: Nish

Pozdrav, dachatzr!





Arrow

U ovom delu foruma postoje neka pravila kojih se svi drzimo, pa bi pozeljno bilo da prvo procitas sledecu temu:

Kako otvoriti temu u Ambulanti


Postavi potrebne log-ove dijagnostickih alata.






goran9888 (AMF Tim)

Ko je trenutno na forumu
 

Ukupno su 939 korisnika na forumu :: 51 registrovanih, 10 sakrivenih i 878 gosta   ::   [ Administrator ] [ Supermoderator ] [ Moderator ] :: Detaljnije

Najviše korisnika na forumu ikad bilo je 3466 - dana 01 Jun 2021 17:07

Korisnici koji su trenutno na forumu:
Korisnici trenutno na forumu: aleksajjovanovic, Apok, babaroga, Brana01, darcaud, Denaya, Dimitrise93, djboj, DragoslavS, Georgius, gzoki, havoc995, helen1, ivan1973, ivicasimo, krkalon, kunktator, kybonacci, Levi, lord sir giga, marsovac 2, Maschinekalibar, milenko crazy north, Milometer, MiroslavD, Mixelotti, mkukoleca, mnn2, moldway, mrav pesadinac, nebkv, nemkea71, novator, ObelixSRB, ostoja, panzerwaffe, Petarvu, Polemarchoi, raptorsi, RJ, ruma, S-lash, Shinobi, Singidunumac, stegonosa, StepskiVuk, tubular, uruk, vathra, vlajkox, wizzardone