hoku, после проверки
1.
c:\WINDOWS.1\system32\sfcfiles.dll замените чистым с дистрибутива или скопируйте с аналогичной системы
2.
Удалите в МВАМ
Код:
![Выделить весь код](images/misc/selectcode.png)
Заражённые папки:
c:\program files\common files\wm\keys (Trojan.KeyLog) -> No action taken.
c:\program files\seekservice (Adware.SeekService) -> No action taken.
Заражённые файлы:
c:\system volume information\_restore{93de3ebd-1c15-41b0-af26-ed599f6a035a}\RP10\A0012559.dll (Trojan.Patch) -> No action taken.
c:\system volume information\_restore{93de3ebd-1c15-41b0-af26-ed599f6a035a}\RP11\A0013023.dll (Trojan.Patch) -> No action taken.
c:\system volume information\_restore{93de3ebd-1c15-41b0-af26-ed599f6a035a}\RP13\A0014085.dll (Trojan.Patch) -> No action taken.
c:\system volume information\_restore{93de3ebd-1c15-41b0-af26-ed599f6a035a}\RP14\A0014137.dll (Trojan.Patch) -> No action taken.
c:\system volume information\_restore{93de3ebd-1c15-41b0-af26-ed599f6a035a}\RP15\A0015074.dll (Trojan.Patch) -> No action taken.
c:\system volume information\_restore{93de3ebd-1c15-41b0-af26-ed599f6a035a}\RP4\A0009023.dll (Trojan.Patch) -> No action taken.
c:\system volume information\_restore{93de3ebd-1c15-41b0-af26-ed599f6a035a}\RP4\A0011012.exe (Spyware.Passwords.XGen) -> No action taken.
c:\system volume information\_restore{93de3ebd-1c15-41b0-af26-ed599f6a035a}\RP4\A0012092.dll (Trojan.Patch) -> No action taken.
c:\system volume information\_restore{93de3ebd-1c15-41b0-af26-ed599f6a035a}\RP5\A0012169.dll (Trojan.Patch) -> No action taken.
c:\system volume information\_restore{93de3ebd-1c15-41b0-af26-ed599f6a035a}\RP6\A0012231.dll (Trojan.Patch) -> No action taken.
c:\system volume information\_restore{93de3ebd-1c15-41b0-af26-ed599f6a035a}\RP7\A0012239.dll (Trojan.Patch) -> No action taken.
c:\system volume information\_restore{93de3ebd-1c15-41b0-af26-ed599f6a035a}\RP8\A0012320.dll (Trojan.Patch) -> No action taken.
c:\system volume information\_restore{93de3ebd-1c15-41b0-af26-ed599f6a035a}\RP9\A0012552.dll (Trojan.Patch) -> No action taken.
c:\Users\hoku\рабочий стол\ПРОГИ\avz4\avz4\quarantine\2011-03-17\avz00002.dta (Malware.Packer.Gen) -> No action taken.
c:\Users\hoku\рабочий стол\ПРОГИ\avz4\avz4\quarantine\2011-03-17\avz00008.dta (Malware.Packer.Gen) -> No action taken.
c:\Users\networkservice\local settings\temporary internet files\Content.IE5\S77ZGSBA\jiegzwt[1].bmp (Extension.Mismatch) -> No action taken.
c:\program files\common files\keylog.txt (Malware.Trace) -> No action taken.
c:\documents and settings\hunter.hunter_computer\главное меню\программы\автозагрузка\chkntfs.exe (Trojan.Downloader) -> No action taken.