Virus Warning Security report

nini80 Messages postés 7 Statut Membre -  
darkest Messages postés 2238 Statut Membre -
Bonjour,

Depuis hier mon ordi note en bas de l'écran Warning Security Report, de plus j'ai une fenêtre ouverte sur mon bureau qui me dit "Warning Dangerous Spyware" qu rame , qui clignote en rouge et noir .

Spybot, mon anti virus ett tools cleaner ne détecte rien.

De plus le pc rame, il m'est quasiment impossible de me connecter sur le net ... 2 fois sur 3 ça plante..

Si quelqu'un a une solution a me proposer !!!

Merci de votre aide
A voir également:

7 réponses

darkest Messages postés 2238 Statut Membre 459
 
0
nini80 Messages postés 7 Statut Membre
 
merci de ta réponse ....
je vais suivre ce topo.... (ça rique d'être long, mon pc plante des que je vais sur le net
0
nini80 Messages postés 7 Statut Membre
 
voila le rapport :

SmitFraudFix v2.414

Rapport fait à 10:27:07,26, 06/05/2009
Executé à partir de D:\Documents and Settings\Nico\Bureau\SmitfraudFix
OS: Microsoft Windows XP [version 5.1.2600] - Windows_NT
Le type du système de fichiers est NTFS
Fix executé en mode normal

»»»»»»»»»»»»»»»»»»»»»»»» Process

D:\WINDOWS\System32\smss.exe
D:\WINDOWS\system32\winlogon.exe
D:\WINDOWS\system32\services.exe
D:\WINDOWS\system32\lsass.exe
D:\WINDOWS\system32\svchost.exe
D:\WINDOWS\System32\svchost.exe
D:\Program Files\Ad-Aware\aawservice.exe
D:\WINDOWS\system32\userinit.exe
D:\WINDOWS\Explorer.EXE
D:\WINDOWS\RTHDCPL.EXE
D:\WINDOWS\system32\spoolsv.exe
D:\Program Files\Unlocker\UnlockerAssistant.exe
D:\Program Files\Fichiers communs\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
D:\Program Files\Roxio\Easy CD Creator 5\DirectCD\DirectCD.exe
D:\WINDOWS\system32\devldr32.exe
D:\WINDOWS\system32\LVCOMSX.EXE
D:\Program Files\Bonjour\mDNSResponder.exe
D:\Program Files\Java\jre6\bin\jusched.exe
D:\Program Files\F-Secure\Common\FSM32.EXE
D:\Program Files\F-Secure\Anti-Virus\fsgk32st.exe
D:\Program Files\F-Secure\Anti-Virus\FSGK32.EXE
D:\Program Files\F-Secure\Common\FSMA32.EXE
D:\WINDOWS\system32\RUNDLL32.EXE
D:\Program Files\Java\jre6\bin\jqs.exe
D:\WINDOWS\system32\frmwrk32.exe
D:\WINDOWS\system32\rundll32.exe
D:\Program Files\F-Secure\Common\FSMB32.EXE
D:\WINDOWS\system32\ctfmon.exe
D:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe
D:\WINDOWS\system32\nvsvc32.exe
D:\documents and settings\nico\local settings\application data\wgyau.exe
D:\WINDOWS\system32\PnkBstrA.exe
D:\Program Files\F-Secure\Common\FCH32.EXE
D:\WINDOWS\system32\PnkBstrB.exe
D:\WINDOWS\System32\svchost.exe
D:\Program Files\F-Secure\Common\FAMEH32.EXE
D:\Program Files\F-Secure\Anti-Virus\fsqh.exe
D:\Program Files\F-Secure\FSGUI\fsguidll.exe
D:\Program Files\F-Secure\Common\FNRB32.EXE
D:\Program Files\F-Secure\Anti-Virus\fssm32.exe
D:\Program Files\F-Secure\Common\FIH32.EXE
D:\Program Files\F-Secure\FSAUA\program\fsaua.exe
D:\Program Files\F-Secure\FWES\Program\fsdfwd.exe
D:\WINDOWS\System32\wbem\wmiapsrv.exe
D:\WINDOWS\system32\ntdll64.exe
D:\Program Files\F-Secure\Anti-Virus\fsav32.exe
D:\WINDOWS\system32\drwtsn32.exe
D:\WINDOWS\system32\drwtsn32.exe
D:\Program Files\Internet Explorer\iexplore.exe
D:\Documents and Settings\Nico\Bureau\SmitfraudFix\Policies.exe
D:\WINDOWS\system32\cmd.exe

»»»»»»»»»»»»»»»»»»»»»»»» hosts


»»»»»»»»»»»»»»»»»»»»»»»» D:\


»»»»»»»»»»»»»»»»»»»»»»»» D:\WINDOWS


»»»»»»»»»»»»»»»»»»»»»»»» D:\WINDOWS\system


»»»»»»»»»»»»»»»»»»»»»»»» D:\WINDOWS\Web


»»»»»»»»»»»»»»»»»»»»»»»» D:\WINDOWS\system32

D:\WINDOWS\system32\ahtn.htm PRESENT !
D:\WINDOWS\system32\frmwrk32.exe PRESENT !
D:\WINDOWS\system32\warning.gif PRESENT !

»»»»»»»»»»»»»»»»»»»»»»»» D:\WINDOWS\system32\LogFiles


»»»»»»»»»»»»»»»»»»»»»»»» D:\Documents and Settings\Nico


»»»»»»»»»»»»»»»»»»»»»»»» D:\DOCUME~1\Nico\LOCALS~1\Temp


»»»»»»»»»»»»»»»»»»»»»»»» D:\Documents and Settings\Nico\Application Data


»»»»»»»»»»»»»»»»»»»»»»»» Menu Démarrer


»»»»»»»»»»»»»»»»»»»»»»»» D:\DOCUME~1\Nico\Favoris


»»»»»»»»»»»»»»»»»»»»»»»» Bureau


»»»»»»»»»»»»»»»»»»»»»»»» D:\Program Files

D:\Program Files\Google\googletoolbar1.dll PRESENT !

»»»»»»»»»»»»»»»»»»»»»»»» Clés corrompues


»»»»»»»»»»»»»»»»»»»»»»»» Eléments du bureau

[HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Desktop\Components\0]
"Source"="About:Home"
"SubscribedURL"="About:Home"
"FriendlyName"="Ma page d'accueil"


»»»»»»»»»»»»»»»»»»»»»»»» o4Patch
!!!Attention, les clés qui suivent ne sont pas forcément infectées!!!

o4Patch
Credits: Malware Analysis & Diagnostic
Code: S!Ri



»»»»»»»»»»»»»»»»»»»»»»»» IEDFix
!!!Attention, les clés qui suivent ne sont pas forcément infectées!!!

IEDFix
Credits: Malware Analysis & Diagnostic
Code: S!Ri



»»»»»»»»»»»»»»»»»»»»»»»» Agent.OMZ.Fix
!!!Attention, les clés qui suivent ne sont pas forcément infectées!!!

Agent.OMZ.Fix
Credits: Malware Analysis & Diagnostic
Code: S!Ri


»»»»»»»»»»»»»»»»»»»»»»»» VACFix
!!!Attention, les clés qui suivent ne sont pas forcément infectées!!!

VACFix
Credits: Malware Analysis & Diagnostic
Code: S!Ri


»»»»»»»»»»»»»»»»»»»»»»»» 404Fix
!!!Attention, les clés qui suivent ne sont pas forcément infectées!!!

404Fix
Credits: Malware Analysis & Diagnostic
Code: S!Ri


»»»»»»»»»»»»»»»»»»»»»»»» Sharedtaskscheduler
!!!Attention, les clés qui suivent ne sont pas forcément infectées!!!

SrchSTS.exe by S!Ri
Search SharedTaskScheduler's .dll

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler]
"{C2BA40A1-74F3-42BD-F434-12345A2C8953}"="sdfsefsfdvdubgiungfuyd"

[HKEY_CLASSES_ROOT\CLSID\{C2BA40A1-74F3-42BD-F434-12345A2C8953}\InProcServer32]
@="D:\WINDOWS\system32\afnoinkdsfe.dll"

[HKEY_LOCAL_MACHINE\Software\Classes\CLSID\{C2BA40A1-74F3-42BD-F434-12345A2C8953}\InProcServer32]
@="D:\WINDOWS\system32\afnoinkdsfe.dll"


[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler]
"{EC43E3FD-5C60-46a6-97D7-E0B85DBDD6C4}"="STS"

[HKEY_CLASSES_ROOT\CLSID\{EC43E3FD-5C60-46a6-97D7-E0B85DBDD6C4}\InProcServer32]
@="d:\windows\system32\tufolili.dll"

[HKEY_LOCAL_MACHINE\Software\Classes\CLSID\{EC43E3FD-5C60-46a6-97D7-E0B85DBDD6C4}\InProcServer32]
@="d:\windows\system32\tufolili.dll"



»»»»»»»»»»»»»»»»»»»»»»»» AppInit_DLLs
!!!Attention, les clés qui suivent ne sont pas forcément infectées!!!

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows]
"AppInit_DLLs"="d:\\windows\\system32\\tufolili.dll,D:\\WINDOWS\\system32\\harupeza.dll"
"LoadAppInit_DLLs"=dword:00000001


»»»»»»»»»»»»»»»»»»»»»»»» Winlogon
!!!Attention, les clés qui suivent ne sont pas forcément infectées!!!

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon]
"Userinit"="D:\\WINDOWS\\system32\\userinit.exe,"

»»»»»»»»»»»»»»»»»»»»»»»» RK

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon]
"System"=""




»»»»»»»»»»»»»»»»»»»»»»»» DNS

Description: Realtek RTL8168/8111 PCI-E Gigabit Ethernet NIC - Miniport d'ordonnancement de paquets
DNS Server Search Order: 212.27.40.240
DNS Server Search Order: 212.27.40.241

HKLM\SYSTEM\CCS\Services\Tcpip\..\{8A4FD4FD-239A-4566-8866-253A8B42ED46}: DhcpNameServer=212.27.40.240 212.27.40.241
HKLM\SYSTEM\CS1\Services\Tcpip\..\{8A4FD4FD-239A-4566-8866-253A8B42ED46}: DhcpNameServer=212.27.40.240 212.27.40.241
HKLM\SYSTEM\CCS\Services\Tcpip\Parameters: DhcpNameServer=212.27.40.240 212.27.40.241
HKLM\SYSTEM\CS1\Services\Tcpip\Parameters: DhcpNameServer=212.27.40.240 212.27.40.241


»»»»»»»»»»»»»»»»»»»»»»»» Recherche infection wininet.dll


»»»»»»»»»»»»»»»»»»»»»»»» Fin
0
darkest Messages postés 2238 Statut Membre 459
 
Maintenant il faut faire la suite.
0

Vous n’avez pas trouvé la réponse que vous recherchez ?

Posez votre question
nini80 Messages postés 7 Statut Membre
 
voila le 2 eme rapport

Malwarebytes' Anti-Malware 1.36
Version de la base de données: 2081
Windows 5.1.2600 Service Pack 3

06/05/2009 11:11:40
mbam-log-2009-05-06 (11-11-40).txt

Type de recherche: Examen complet (C:\|D:\|G:\|)
Eléments examinés: 207213
Temps écoulé: 31 minute(s), 13 second(s)

Processus mémoire infecté(s): 3
Module(s) mémoire infecté(s): 7
Clé(s) du Registre infectée(s): 14
Valeur(s) du Registre infectée(s): 10
Elément(s) de données du Registre infecté(s): 11
Dossier(s) infecté(s): 0
Fichier(s) infecté(s): 34

Processus mémoire infecté(s):
D:\documents and settings\Nico\local settings\application data\wgyau.exe (Adware.Navipromo.H) -> Unloaded process successfully.
D:\WINDOWS\system32\ntdll64.exe (Trojan.Agent) -> Unloaded process successfully.
D:\WINDOWS\system32\frmwrk32.exe (Trojan.FakeAlert) -> Unloaded process successfully.

Module(s) mémoire infecté(s):
D:\WINDOWS\system32\bibedufu.dll (Trojan.Vundo.H) -> Delete on reboot.
D:\WINDOWS\system32\bemevaja.dll (Trojan.Vundo.H) -> Delete on reboot.
D:\WINDOWS\system32\majubilu.dll (Trojan.Vundo.H) -> Delete on reboot.
D:\WINDOWS\system32\harupeza.dll (Trojan.Vundo.H) -> Delete on reboot.
d:\WINDOWS\system32\tufolili.dll (Trojan.Vundo.H) -> Delete on reboot.
D:\WINDOWS\system32\afnoinkdsfe.dll (Trojan.Ertfor) -> Delete on reboot.
D:\WINDOWS\Temp\ntdll64.dll (Trojan.FakeAlert) -> Delete on reboot.

Clé(s) du Registre infectée(s):
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{95cc4bd1-c75e-40db-802e-fecc2b98af95} (Trojan.Vundo.H) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{95cc4bd1-c75e-40db-802e-fecc2b98af95} (Trojan.Vundo.H) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{c2ba40a1-74f3-42bd-f434-12345a2c8953} (Trojan.Zlob.H) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{95cc4bd1-c75e-40db-802e-fecc2b98af95} (Trojan.Vundo.H) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{ec43e3fd-5c60-46a6-97d7-e0b85dbdd6c4} (Trojan.Vundo.H) -> Delete on reboot.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{c2ba40a1-74f3-42bd-f434-12345a2c8953} (Trojan.Ertfor) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{c2ba40a1-74f3-42bd-f434-12345a2c8953} (Trojan.Ertfor) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\xpreapp (Malware.Trace) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\contim (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\dslcnnct (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\rdfa (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\fcn (Rogue.Residue) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Live-Player (Malware.Trace) -> Quarantined and deleted successfully.
KHKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\prnet (Trojan.Downloader) -> Quarantined and deleted successfully.

Valeur(s) du Registre infectée(s):
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\a40dae6f (Trojan.Vundo.H) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cpmeb4a1858 (Trojan.Vundo.H) -> Delete on reboot.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yedamafezi (Trojan.Vundo.H) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler\{c2ba40a1-74f3-42bd-f434-12345a2c8953} (Trojan.Zlob.H) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wgyau (Adware.Navipromo.H) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler\{ec43e3fd-5c60-46a6-97d7-e0b85dbdd6c4} (Trojan.Vundo.H) -> Delete on reboot.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\ssodl (Trojan.Vundo.H) -> Delete on reboot.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\prnet (Trojan.Downloader) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\prnet (Trojan.Downloader) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Framework Windows (Trojan.FakeAlert) -> Quarantined and deleted successfully.

Elément(s) de données du Registre infecté(s):
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows\AppInit_DLLs (Trojan.Vundo.H) -> Data: d:\windows\system32\harupeza.dll -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\LSA\Notification Packages (Trojan.Vundo.H) -> Data: d:\windows\system32\harupeza.dll -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows\AppInit_DLLs (Trojan.Vundo.H) -> Data: d:\windows\system32\tufolili.dll -> Delete on reboot.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit (Trojan.Agent) -> Data: d:\windows\system32\userinit.exe -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\ActiveDesktop\NoChangingWallpaper (Hijack.DisplayProperties) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\activedesktop\NoChangingWallpaper (Hijack.DisplayProperties) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoSetActiveDesktop (Hijack.DisplayProperties) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoActiveDesktopChanges (Hijack.DisplayProperties) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoSetActiveDesktop (Hijack.DisplayProperties) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoActiveDesktopChanges (Hijack.DisplayProperties) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\UpdatesDisableNotify (Disabled.SecurityCenter) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.

Dossier(s) infecté(s):
(Aucun élément nuisible détecté)

Fichier(s) infecté(s):
D:\WINDOWS\system32\bibedufu.dll (Trojan.Vundo.H) -> Delete on reboot.
D:\WINDOWS\system32\ufudebib.ini (Trojan.Vundo.H) -> Quarantined and deleted successfully.
D:\WINDOWS\system32\yowokifo.dll (Trojan.Vundo.H) -> Quarantined and deleted successfully.
D:\WINDOWS\system32\ofikowoy.ini (Trojan.Vundo.H) -> Quarantined and deleted successfully.
d:\WINDOWS\system32\tufolili.dll (Trojan.Vundo.H) -> Delete on reboot.
D:\WINDOWS\system32\majubilu.dll (Trojan.Vundo.H) -> Delete on reboot.
D:\WINDOWS\system32\bemevaja.dll (Trojan.Vundo.H) -> Delete on reboot.
D:\WINDOWS\system32\afnoinkdsfe.dll (Trojan.Zlob.H) -> Delete on reboot.
D:\Documents and Settings\Nico\Local Settings\Application Data\wgyau_navps.dat (Adware.Navipromo.H) -> Quarantined and deleted successfully.
D:\Documents and Settings\Nico\Local Settings\Application Data\wgyau_nav.dat (Adware.Navipromo.H) -> Quarantined and deleted successfully.
D:\Documents and Settings\Nico\Local Settings\Application Data\wgyau.dat (Adware.Navipromo.H) -> Quarantined and deleted successfully.
D:\Documents and Settings\Nico\Local Settings\Application Data\wgyau.exe (Adware.Navipromo.H) -> Quarantined and deleted successfully.
D:\WINDOWS\system32\harupeza.dll (Trojan.Vundo.H) -> Delete on reboot.
D:\WINDOWS\system32\prnet.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\Programmes\Alcohol.120%.v1.9.7.6221.Multi.Incl.KeyGen\LoadeR_v3.1_by_GEGTER\manually\patch_ssc.exe (Trojan.Patch) -> Quarantined and deleted successfully.
D:\Documents and Settings\Nico\Local Settings\Temp\inx.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
D:\Documents and Settings\Nico\Local Settings\Temp\prun.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
D:\Documents and Settings\Nico\Local Settings\Temp\rasesnet.tmp (Trojan.Vundo) -> Quarantined and deleted successfully.
D:\Documents and Settings\Nico\Local Settings\Temp\winlognn.0xe (Trojan.Downloader) -> Quarantined and deleted successfully.
D:\Documents and Settings\Nico\Local Settings\Temp\xpre.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
D:\Program Files\spybot.exe (Adware.Navipromo) -> Quarantined and deleted successfully.
D:\WINDOWS\system32\sopikahu.dll (Trojan.Vundo.H) -> Quarantined and deleted successfully.
D:\WINDOWS\system32\ntdll64.exe (Trojan.Agent) -> Delete on reboot.
D:\Documents and Settings\Nico\Local Settings\Temp\mousehook.dll (Trojan.Agent) -> Delete on reboot.
D:\WINDOWS\Temp\mousehook.dll (Trojan.Agent) -> Quarantined and deleted successfully.
D:\WINDOWS\system32\p2hhr.bat (Malware.Trace) -> Quarantined and deleted successfully.
D:\WINDOWS\system32\warning.gif (Trojan.FakeAlert) -> Quarantined and deleted successfully.
D:\WINDOWS\system32\ahtn.htm (Trojan.FakeAlert) -> Quarantined and deleted successfully.
D:\WINDOWS\system32\frmwrk32.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
D:\Documents and Settings\Nico\Local Settings\Temp\ntdll64.dll (Trojan.FakeAlert) -> Quarantined and deleted successfully.
D:\WINDOWS\Temp\ntdll64.dll (Trojan.FakeAlert) -> Delete on reboot.
D:\WINDOWS\system32\win32hlp.cnf (Trojan.Agent) -> Quarantined and deleted successfully.
D:\WINDOWS\system32\ak1.exe (Virus.Virut) -> Quarantined and deleted successfully.
D:\WINDOWS\system32\loader49.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
0
nini80 Messages postés 7 Statut Membre
 
Voila le problème est résolu ...


Merci de ton aide

Bonne journée
0
darkest Messages postés 2238 Statut Membre 459
 
De rien, au plaisir. ;o)
0