ANALYSE RAPPORT AD-REMOVER
Fermé
Isaure
-
8 sept. 2010 à 11:35
moment de grace Messages postés 29042 Date d'inscription samedi 6 décembre 2008 Statut Contributeur sécurité Dernière intervention 18 juillet 2013 - 9 sept. 2010 à 10:52
moment de grace Messages postés 29042 Date d'inscription samedi 6 décembre 2008 Statut Contributeur sécurité Dernière intervention 18 juillet 2013 - 9 sept. 2010 à 10:52
A voir également:
- ANALYSE RAPPORT AD-REMOVER
- Trojan remover - Télécharger - Antivirus & Antimalwares
- Analyse disque dur - Télécharger - Informations & Diagnostic
- Analyse performance pc - Guide
- Plan rapport de stage - Guide
- Analyse composant pc - Guide
21 réponses
moment de grace
Messages postés
29042
Date d'inscription
samedi 6 décembre 2008
Statut
Contributeur sécurité
Dernière intervention
18 juillet 2013
2 274
8 sept. 2010 à 11:36
8 sept. 2010 à 11:36
bonjour
1)
relances Ad Remover
option NETTOYAGE
poster le rapport
...............
2)
Télécharge ZHPDiag ( de Nicolas coolman ).
ftp://zebulon.fr/ZHPDiag.exe
(outil de diagnostic)
Double clique sur le fichier d'installation, puis installe le avec les paramètres par défaut ( N'oublie pas de cocher " Créer une icône sur le bureau " )
Lance ZHPDiag en double cliquant sur l'icône présente sur ton bureau (Clique droit -> Executer en tant qu'admin pour vista )
Clique sur la loupe en haut à gauche, puis laisse l'outil scanner.
Une fois le scan terminé, clique sur l'icône en forme de disquette et enregistre le fichier sur ton bureau.
Rend toi sur Cjoint : http://www.cijoint.fr/
Clique sur "Parcourir " dans la partie " Joindre un fichier[...] "
Sélectionne le rapport ZHPdiag.txt qui se trouve sur ton bureau
Clique ensuite sur "Cliquez ici pour déposer le fichier " et copie/colle le lien dans ton prochain message
si soucis avec ci joint. fr
=> utiliser https://www.cjoint.com/
=> utiliser http://ww38.toofiles.com/fr/oip/documents/txt/av.html
1)
relances Ad Remover
option NETTOYAGE
poster le rapport
...............
2)
Télécharge ZHPDiag ( de Nicolas coolman ).
ftp://zebulon.fr/ZHPDiag.exe
(outil de diagnostic)
Double clique sur le fichier d'installation, puis installe le avec les paramètres par défaut ( N'oublie pas de cocher " Créer une icône sur le bureau " )
Lance ZHPDiag en double cliquant sur l'icône présente sur ton bureau (Clique droit -> Executer en tant qu'admin pour vista )
Clique sur la loupe en haut à gauche, puis laisse l'outil scanner.
Une fois le scan terminé, clique sur l'icône en forme de disquette et enregistre le fichier sur ton bureau.
Rend toi sur Cjoint : http://www.cijoint.fr/
Clique sur "Parcourir " dans la partie " Joindre un fichier[...] "
Sélectionne le rapport ZHPdiag.txt qui se trouve sur ton bureau
Clique ensuite sur "Cliquez ici pour déposer le fichier " et copie/colle le lien dans ton prochain message
si soucis avec ci joint. fr
=> utiliser https://www.cjoint.com/
=> utiliser http://ww38.toofiles.com/fr/oip/documents/txt/av.html
moment de grace
Messages postés
29042
Date d'inscription
samedi 6 décembre 2008
Statut
Contributeur sécurité
Dernière intervention
18 juillet 2013
2 274
8 sept. 2010 à 11:58
8 sept. 2010 à 11:58
ok
bien infecté..pas que du Eorezo
fais ceci dans cet ordre et poste les rapport au fur et à mesure
1)
relances Ad Remover
option NETTOYAGE
poster le rapport
.................
2)
Téléchargez USBFIX de El Desaparecido, C_xx
http://pagesperso-orange.fr/NosTools/Chiquitine29/UsbFix.exe
ou
https://www.ionos.fr/?affiliate_id=77097
/!\ Utilisateur de vista et windows 7 :
ne pas oublier de désactiver Le contrôle des comptes utilisateurs
https://www.commentcamarche.net/faq/8343-vista-desactiver-l-uac
/!\ Branche tes sources de données externes à ton PC, (clé USB, disque dur externe, etc...) susceptible d'avoir été infectées sans les ouvrir
* Double clic sur le raccourci UsbFix présent sur le bureau .
* Choisir l'option suppression
(d'autres options disponibles, voir le tutoriel).
* Laissez travailler l'outil.
Le menu démarrer et les icônes vont disparaître.. c'est normal.
Si un message te demande de redémarrer l'ordinateur fais le ...
? Au redémarrage, le fix se relance... laisses l'opération s'effectuer.
? Le bloc note s'ouvre avec un rapport, envoies le dans la prochaine réponse
* Note : Le rapport UsbFix.txt est sauvegardé a la racine du disque. ( C:\UsbFix.txt )
( CTRL+A Pour tout sélectionner , CTRL+C pour copier et CTRL+V pour coller )
* Note : "Process.exe", une composante de l'outil, est détecté par certains antivirus (AntiVir, Dr.Web, Kaspersky Anti-Virus) comme étant un RiskTool.
Il ne s'agit pas d'un virus, mais d'un utilitaire destiné à mettre fin à des processus.
Mis entre de mauvaises mains, cet utilitaire pourrait arrêter des logiciels de sécurité (Antivirus, Firewall...) d'où l'alerte émise par ces antivirus.
* Tuto : http://pagesperso-orange.fr/NosTools/usbfix.html
UsbFix peut te demander d'uploader un dossier compressé à cette adresse : https://www.ionos.fr/?affiliate_id=77097
Il est enregistré sur ton bureau.
Merci de l'envoyer à l'adresse indiquée afin d'aider l'auteur de UsbFix dans ses recherches.
.....................
3)
Téléchargez MalwareByte's Anti-Malware (que tu pourras garder)
https://www.commentcamarche.net/telecharger/securite/14361-malwarebytes-anti-malware/
. Enregistres le sur le bureau
. Double cliques sur le fichier téléchargé pour lancer le processus d'installation.
. Dans l'onglet "mise à jour", cliques sur le bouton Recherche de mise à jour
. Si le pare-feu demande l'autorisation de se connecter pour malwarebytes, accepte
. Une fois la mise à jour terminé
. Rend-toi dans l'onglet, Recherche
. Sélectionnes Exécuter un examen complet (examen assez long)
. Cliques sur Rechercher
. Le scan démarre.
. A la fin de l'analyse, un message s'affiche : L'examen s'est terminé normalement. Cliquez sur 'Afficher les résultats' pour afficher tous les objets trouvés.
. Cliques sur Ok pour poursuivre.
. Si des malwares ont été détectés, clique sur Afficher les résultats
. Sélectionnes tout (ou laisses cochés) et cliques sur Supprimer la sélection Malwarebytes va détruire les fichiers et clés de registre et en mettre une copie dans la quarantaine.
. Malwarebytes va ouvrir le bloc-notes et y copier le rapport d'analyse.
. Rends toi dans l'onglet rapport/log
. Tu cliques dessus pour l'afficher, une fois affiché
. Tu cliques sur edition en haut du boc notes, et puis sur sélectionner tous
. Tu recliques sur edition et puis sur copier et tu reviens sur le forum et dans ta réponse
. tu cliques droit dans le cadre de la reponse et coller
Si tu as besoin d'aide regarde ces tutoriels :
Aide: https://www.malekal.com/tutoriel-malwarebyte-anti-malware/
http://www.infos-du-net.com/forum/278396-11-tuto-malwarebytes-anti-malware-mbam
.......................
4)
Fais un nouveau rapport ZHPdiag stp
Rend toi sur Cjoint : http://www.cijoint.fr/
Clique sur "Parcourir " dans la partie " Joindre un fichier[...] "
Sélectionne le rapport ZHPdiag.txt qui se trouve sur ton bureau
Clique ensuite sur "Cliquez ici pour déposer le fichier " et copie/colle le lien dans ton prochain message
si soucis avec ci joint. fr
=> utiliser https://www.cjoint.com/
=> utiliser http://ww38.toofiles.com/fr/oip/documents/txt/av.html
bien infecté..pas que du Eorezo
fais ceci dans cet ordre et poste les rapport au fur et à mesure
1)
relances Ad Remover
option NETTOYAGE
poster le rapport
.................
2)
Téléchargez USBFIX de El Desaparecido, C_xx
http://pagesperso-orange.fr/NosTools/Chiquitine29/UsbFix.exe
ou
https://www.ionos.fr/?affiliate_id=77097
/!\ Utilisateur de vista et windows 7 :
ne pas oublier de désactiver Le contrôle des comptes utilisateurs
https://www.commentcamarche.net/faq/8343-vista-desactiver-l-uac
/!\ Branche tes sources de données externes à ton PC, (clé USB, disque dur externe, etc...) susceptible d'avoir été infectées sans les ouvrir
* Double clic sur le raccourci UsbFix présent sur le bureau .
* Choisir l'option suppression
(d'autres options disponibles, voir le tutoriel).
* Laissez travailler l'outil.
Le menu démarrer et les icônes vont disparaître.. c'est normal.
Si un message te demande de redémarrer l'ordinateur fais le ...
? Au redémarrage, le fix se relance... laisses l'opération s'effectuer.
? Le bloc note s'ouvre avec un rapport, envoies le dans la prochaine réponse
* Note : Le rapport UsbFix.txt est sauvegardé a la racine du disque. ( C:\UsbFix.txt )
( CTRL+A Pour tout sélectionner , CTRL+C pour copier et CTRL+V pour coller )
* Note : "Process.exe", une composante de l'outil, est détecté par certains antivirus (AntiVir, Dr.Web, Kaspersky Anti-Virus) comme étant un RiskTool.
Il ne s'agit pas d'un virus, mais d'un utilitaire destiné à mettre fin à des processus.
Mis entre de mauvaises mains, cet utilitaire pourrait arrêter des logiciels de sécurité (Antivirus, Firewall...) d'où l'alerte émise par ces antivirus.
* Tuto : http://pagesperso-orange.fr/NosTools/usbfix.html
UsbFix peut te demander d'uploader un dossier compressé à cette adresse : https://www.ionos.fr/?affiliate_id=77097
Il est enregistré sur ton bureau.
Merci de l'envoyer à l'adresse indiquée afin d'aider l'auteur de UsbFix dans ses recherches.
.....................
3)
Téléchargez MalwareByte's Anti-Malware (que tu pourras garder)
https://www.commentcamarche.net/telecharger/securite/14361-malwarebytes-anti-malware/
. Enregistres le sur le bureau
. Double cliques sur le fichier téléchargé pour lancer le processus d'installation.
. Dans l'onglet "mise à jour", cliques sur le bouton Recherche de mise à jour
. Si le pare-feu demande l'autorisation de se connecter pour malwarebytes, accepte
. Une fois la mise à jour terminé
. Rend-toi dans l'onglet, Recherche
. Sélectionnes Exécuter un examen complet (examen assez long)
. Cliques sur Rechercher
. Le scan démarre.
. A la fin de l'analyse, un message s'affiche : L'examen s'est terminé normalement. Cliquez sur 'Afficher les résultats' pour afficher tous les objets trouvés.
. Cliques sur Ok pour poursuivre.
. Si des malwares ont été détectés, clique sur Afficher les résultats
. Sélectionnes tout (ou laisses cochés) et cliques sur Supprimer la sélection Malwarebytes va détruire les fichiers et clés de registre et en mettre une copie dans la quarantaine.
. Malwarebytes va ouvrir le bloc-notes et y copier le rapport d'analyse.
. Rends toi dans l'onglet rapport/log
. Tu cliques dessus pour l'afficher, une fois affiché
. Tu cliques sur edition en haut du boc notes, et puis sur sélectionner tous
. Tu recliques sur edition et puis sur copier et tu reviens sur le forum et dans ta réponse
. tu cliques droit dans le cadre de la reponse et coller
Si tu as besoin d'aide regarde ces tutoriels :
Aide: https://www.malekal.com/tutoriel-malwarebyte-anti-malware/
http://www.infos-du-net.com/forum/278396-11-tuto-malwarebytes-anti-malware-mbam
.......................
4)
Fais un nouveau rapport ZHPdiag stp
Rend toi sur Cjoint : http://www.cijoint.fr/
Clique sur "Parcourir " dans la partie " Joindre un fichier[...] "
Sélectionne le rapport ZHPdiag.txt qui se trouve sur ton bureau
Clique ensuite sur "Cliquez ici pour déposer le fichier " et copie/colle le lien dans ton prochain message
si soucis avec ci joint. fr
=> utiliser https://www.cjoint.com/
=> utiliser http://ww38.toofiles.com/fr/oip/documents/txt/av.html
Ok
je suis au travail je reviens dans une demi heure et je fais tout ca!
merci beaucoup pour ton aide!
isaure
je suis au travail je reviens dans une demi heure et je fais tout ca!
merci beaucoup pour ton aide!
isaure
Vous n’avez pas trouvé la réponse que vous recherchez ?
Posez votre question
voici le rapport nettoyage ad remover:
======= RAPPORT D'AD-REMOVER 2.0.0.1,E | UNIQUEMENT XP/VISTA/7 =======
Mis à jour par C_XX le 06/09/10 à 15:20
Contact: AdRemover.contact[AT]gmail.com
Site web: http://www.teamxscript.org
C:\Program Files\Ad-Remover\main.exe (CLEAN [1]) -> Lancé à 12:50:49 le 08/09/2010, Mode normal
Microsoft Windows XP Édition familiale Service Pack 3 (X86)
Annick@NOM-EB85C523610 ( )
============== ACTION(S) ==============
0,Dossier supprimé: C:\Documents and Settings\Annick\Application Data\EoRezo
0,Dossier supprimé: C:\Documents and Settings\Annick\Local Settings\Application Data\EoRezo
0,Dossier supprimé: C:\Program Files\EoRezo
(!) -- Fichiers temporaires supprimés.
1,Clé supprimée: HKLM\Software\Classes\CLSID\{C10DC1F4-CCDF-4224-A24D-B23AFC3573C8}
1,Clé supprimée: HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{C10DC1F4-CCDF-4224-A24D-B23AFC3573C8}
1,Clé supprimée: HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Settings\{C10DC1F4-CCDF-4224-A24D-B23AFC3573C8}
1,Clé supprimée: HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{C10DC1F4-CCDF-4224-A24D-B23AFC3573C8}
1,Clé supprimée: HKLM\Software\Classes\Interface\{DF76E9B7-35EC-46FC-AF56-5B79DED9D64F}
1,Clé supprimée: HKLM\Software\Classes\TypeLib\{18AF7201-4F14-4BCF-93FE-45617CF259FF}
0,Clé supprimée: HKLM\Software\Classes\EoEngineBHO.EOBHO
0,Clé supprimée: HKLM\Software\Classes\EoEngineBHO.EOBHO.1
0,Clé supprimée: HKLM\Software\Classes\AppID\EoEngineBHO.DLL
1,Clé supprimée: HKLM\Software\Classes\AppID\{AFBB7970-789A-4264-BA70-E8127DECE400}
0,Clé supprimée: HKLM\Software\EoRezo
0,Clé supprimée: HKCU\Software\EoRezo
0,Clé supprimée: HKLM\Software\Microsoft\Windows\CurrentVersion\Uninstall\EoRezo_is1
0,Clé supprimée: HKLM\Software\Microsoft\Windows\CurrentVersion\Uninstall\SoftwareUpdate_is1
0,Valeur supprimée: HKLM\Software\Microsoft\Windows\CurrentVersion\Run|Eorezo
0,Valeur supprimée: HKLM\Software\Microsoft\Windows\CurrentVersion\Run|Softwarehelper
0,Valeur supprimée: HKCU\Software\Microsoft\Windows\CurrentVersion\Run|spidermessenger
============== SCAN ADDITIONNEL ==============
** Mozilla Firefox Version [Impossible d'obtenir la version] **
-- C:\Documents and Settings\Annick\Application Data\Mozilla\FireFox\Profiles\8wisvhd6.default\Prefs.js --
browser.download.lastDir, C:\\Documents and Settings\\Annick\\Bureau
browser.startup.homepage, google.fr
browser.startup.homepage_override.mstone, rv:1.9.0.19
-- C:\Documents and Settings\améruche\Application Data\Mozilla\FireFox\Profiles\ifv6yoix.default\Prefs.js --
browser.startup.homepage_override.mstone, rv:1.9.0.19
-- C:\Documents and Settings\Denis\Application Data\Mozilla\FireFox\Profiles\sjcque8k.default\Prefs.js --
browser.download.lastDir, C:\\Documents and Settings\\Denis\\Mes documents\\Mes images
browser.startup.homepage, hxxp://www.google.fr
browser.startup.homepage_override.mstone, rv:1.9.0.19
-- C:\Documents and Settings\HP_Propriétaire\Application Data\Mozilla\FireFox\Profiles\6hw219y0.default\Prefs.js --
browser.startup.homepage_override.mstone, rv:1.9.0.19
-- C:\Documents and Settings\KARINE\Application Data\Mozilla\FireFox\Profiles\p91e55pn.default\Prefs.js --
browser.startup.homepage_override.mstone, rv:1.8.1.20
-- C:\Documents and Settings\renaud\Application Data\Mozilla\FireFox\Profiles\rimodi3q.default\Prefs.js --
browser.download.lastDir, C:\\Documents and Settings\\renaud\\Bureau
browser.startup.homepage_override.mstone, rv:1.9.0.19
========================================
** Internet Explorer Version [8.0.6001.18702] **
[HKCU\Software\Microsoft\Internet Explorer\Main]
AutoHide: yes
Default_Page_URL: hxxp://www.microsoft.com/isapi/redir.dll?prd=ie&pver=6&ar=msnhome
Default_Search_URL: hxxp://www.microsoft.com/isapi/redir.dll?prd=ie&ar=iesearch
Do404Search: 0x01000000
Enable Browser Extensions: yes
Local Page: C:\WINDOWS\system32\blank.htm
Search bar: hxxp://go.microsoft.com/fwlink/?linkid=54896
Show_ToolBar: yes
Start Page: hxxp://fr.msn.com/
[HKLM\Software\Microsoft\Internet Explorer\Main]
Default_Page_URL: hxxp://go.microsoft.com/fwlink/?LinkId=54896
Default_Search_URL: hxxp://www.microsoft.com/isapi/redir.dll?prd=ie&ar=iesearch
Delete_Temp_Files_On_Exit: yes
Local Page: C:\WINDOWS\system32\blank.htm
Search bar: hxxp://search.msn.com/spbasic.htm
Search Page: hxxp://www.microsoft.com/isapi/redir.dll?prd=ie&ar=iesearch
Start Page: hxxp://fr.msn.com/
[HKLM\Software\Microsoft\Internet Explorer\ABOUTURLS]
Tabs: res://ieframe.dll/tabswelcome.htm
Blank: res://mshtml.dll/blank.htm
========================================
C:\Program Files\Ad-Remover\Quarantine: 54 Fichier(s)
C:\Program Files\Ad-Remover\Backup: 13 Fichier(s)
C:\Ad-Report-CLEAN[1].txt - 08/09/2010 (1628 Octet(s))
C:\Ad-Report-SCAN[1].txt - 08/09/2010 (4646 Octet(s))
Fin à: 12:53:35, 08/09/2010
============== E.O.F ==============
======= RAPPORT D'AD-REMOVER 2.0.0.1,E | UNIQUEMENT XP/VISTA/7 =======
Mis à jour par C_XX le 06/09/10 à 15:20
Contact: AdRemover.contact[AT]gmail.com
Site web: http://www.teamxscript.org
C:\Program Files\Ad-Remover\main.exe (CLEAN [1]) -> Lancé à 12:50:49 le 08/09/2010, Mode normal
Microsoft Windows XP Édition familiale Service Pack 3 (X86)
Annick@NOM-EB85C523610 ( )
============== ACTION(S) ==============
0,Dossier supprimé: C:\Documents and Settings\Annick\Application Data\EoRezo
0,Dossier supprimé: C:\Documents and Settings\Annick\Local Settings\Application Data\EoRezo
0,Dossier supprimé: C:\Program Files\EoRezo
(!) -- Fichiers temporaires supprimés.
1,Clé supprimée: HKLM\Software\Classes\CLSID\{C10DC1F4-CCDF-4224-A24D-B23AFC3573C8}
1,Clé supprimée: HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{C10DC1F4-CCDF-4224-A24D-B23AFC3573C8}
1,Clé supprimée: HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Settings\{C10DC1F4-CCDF-4224-A24D-B23AFC3573C8}
1,Clé supprimée: HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{C10DC1F4-CCDF-4224-A24D-B23AFC3573C8}
1,Clé supprimée: HKLM\Software\Classes\Interface\{DF76E9B7-35EC-46FC-AF56-5B79DED9D64F}
1,Clé supprimée: HKLM\Software\Classes\TypeLib\{18AF7201-4F14-4BCF-93FE-45617CF259FF}
0,Clé supprimée: HKLM\Software\Classes\EoEngineBHO.EOBHO
0,Clé supprimée: HKLM\Software\Classes\EoEngineBHO.EOBHO.1
0,Clé supprimée: HKLM\Software\Classes\AppID\EoEngineBHO.DLL
1,Clé supprimée: HKLM\Software\Classes\AppID\{AFBB7970-789A-4264-BA70-E8127DECE400}
0,Clé supprimée: HKLM\Software\EoRezo
0,Clé supprimée: HKCU\Software\EoRezo
0,Clé supprimée: HKLM\Software\Microsoft\Windows\CurrentVersion\Uninstall\EoRezo_is1
0,Clé supprimée: HKLM\Software\Microsoft\Windows\CurrentVersion\Uninstall\SoftwareUpdate_is1
0,Valeur supprimée: HKLM\Software\Microsoft\Windows\CurrentVersion\Run|Eorezo
0,Valeur supprimée: HKLM\Software\Microsoft\Windows\CurrentVersion\Run|Softwarehelper
0,Valeur supprimée: HKCU\Software\Microsoft\Windows\CurrentVersion\Run|spidermessenger
============== SCAN ADDITIONNEL ==============
** Mozilla Firefox Version [Impossible d'obtenir la version] **
-- C:\Documents and Settings\Annick\Application Data\Mozilla\FireFox\Profiles\8wisvhd6.default\Prefs.js --
browser.download.lastDir, C:\\Documents and Settings\\Annick\\Bureau
browser.startup.homepage, google.fr
browser.startup.homepage_override.mstone, rv:1.9.0.19
-- C:\Documents and Settings\améruche\Application Data\Mozilla\FireFox\Profiles\ifv6yoix.default\Prefs.js --
browser.startup.homepage_override.mstone, rv:1.9.0.19
-- C:\Documents and Settings\Denis\Application Data\Mozilla\FireFox\Profiles\sjcque8k.default\Prefs.js --
browser.download.lastDir, C:\\Documents and Settings\\Denis\\Mes documents\\Mes images
browser.startup.homepage, hxxp://www.google.fr
browser.startup.homepage_override.mstone, rv:1.9.0.19
-- C:\Documents and Settings\HP_Propriétaire\Application Data\Mozilla\FireFox\Profiles\6hw219y0.default\Prefs.js --
browser.startup.homepage_override.mstone, rv:1.9.0.19
-- C:\Documents and Settings\KARINE\Application Data\Mozilla\FireFox\Profiles\p91e55pn.default\Prefs.js --
browser.startup.homepage_override.mstone, rv:1.8.1.20
-- C:\Documents and Settings\renaud\Application Data\Mozilla\FireFox\Profiles\rimodi3q.default\Prefs.js --
browser.download.lastDir, C:\\Documents and Settings\\renaud\\Bureau
browser.startup.homepage_override.mstone, rv:1.9.0.19
========================================
** Internet Explorer Version [8.0.6001.18702] **
[HKCU\Software\Microsoft\Internet Explorer\Main]
AutoHide: yes
Default_Page_URL: hxxp://www.microsoft.com/isapi/redir.dll?prd=ie&pver=6&ar=msnhome
Default_Search_URL: hxxp://www.microsoft.com/isapi/redir.dll?prd=ie&ar=iesearch
Do404Search: 0x01000000
Enable Browser Extensions: yes
Local Page: C:\WINDOWS\system32\blank.htm
Search bar: hxxp://go.microsoft.com/fwlink/?linkid=54896
Show_ToolBar: yes
Start Page: hxxp://fr.msn.com/
[HKLM\Software\Microsoft\Internet Explorer\Main]
Default_Page_URL: hxxp://go.microsoft.com/fwlink/?LinkId=54896
Default_Search_URL: hxxp://www.microsoft.com/isapi/redir.dll?prd=ie&ar=iesearch
Delete_Temp_Files_On_Exit: yes
Local Page: C:\WINDOWS\system32\blank.htm
Search bar: hxxp://search.msn.com/spbasic.htm
Search Page: hxxp://www.microsoft.com/isapi/redir.dll?prd=ie&ar=iesearch
Start Page: hxxp://fr.msn.com/
[HKLM\Software\Microsoft\Internet Explorer\ABOUTURLS]
Tabs: res://ieframe.dll/tabswelcome.htm
Blank: res://mshtml.dll/blank.htm
========================================
C:\Program Files\Ad-Remover\Quarantine: 54 Fichier(s)
C:\Program Files\Ad-Remover\Backup: 13 Fichier(s)
C:\Ad-Report-CLEAN[1].txt - 08/09/2010 (1628 Octet(s))
C:\Ad-Report-SCAN[1].txt - 08/09/2010 (4646 Octet(s))
Fin à: 12:53:35, 08/09/2010
============== E.O.F ==============
moment de grace
Messages postés
29042
Date d'inscription
samedi 6 décembre 2008
Statut
Contributeur sécurité
Dernière intervention
18 juillet 2013
2 274
Modifié par moment de grace le 8/09/2010 à 13:07
Modifié par moment de grace le 8/09/2010 à 13:07
vu
=> usbfix (lui il va avoir du travail !)
CONTRIBUTEUR SECURITE
Désinfection = diagnostic + traitement + finalisation
"Restez" jusqu'au bout...merci
=> usbfix (lui il va avoir du travail !)
CONTRIBUTEUR SECURITE
Désinfection = diagnostic + traitement + finalisation
"Restez" jusqu'au bout...merci
etape 2:
usb fixe
############################## | UsbFix 7.023 | [Suppression]
Utilisateur: Annick (Administrateur) # NOM-EB85C523610 [ ]
Mis à jour le 02/09/10 par El Desaparecido / C_XX
Lancé à 12:57:57 | 08/09/2010
Site Web: http://www.teamxscript.org
Contact: FindyKill.Contact@gmail.com
CPU: Intel(R) Pentium(R) 4 CPU 3.06GHz
Microsoft Windows XP Édition familiale (5.1.2600 32-Bit) # Service Pack 3
Internet Explorer 8.0.6001.18702
Pare-feu Windows: Activé
Antivirus: Trend Micro OfficeScan Client 7.3 [Enabled | Updated]
Firewall: Pare-feu pour client - version d'entreprise Trend Micro OfficeScan 7.3 [Enabled]
RAM -> 503 Mo
C:\ (%systemdrive%) -> Disque fixe # 227 Go (213 Go libre(s) - 94%) [HP_PAVILION] # NTFS
D:\ -> Disque fixe # 6 Go (2 Go libre(s) - 32%) [HP_RECOVERY] # FAT32
E:\ -> CD-ROM
Y:\ -> Disque amovible # 4 Go (2 Go libre(s) - 61%) [] # FAT32
################## | Éléments infectieux |
################## | Registre |
Non supprimé ! HKLM\SYSTEM\ControlSet001\Enum\Root\LEGACY_KAVSYS
Non supprimé ! HKLM\SYSTEM\ControlSet002\Enum\Root\LEGACY_KAVSYS
Non supprimé ! HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_KAVSYS
################## | Mountpoints2 |
Supprimé! HKCU\.\.\.\.\Explorer\MountPoints2\{0b2b6d5d-73be-11db-bb91-0013d3d4ede5}
Supprimé! HKCU\.\.\.\.\Explorer\MountPoints2\{18690ac2-50cc-11de-bd0e-0013d3d4ede5}
Supprimé! HKCU\.\.\.\.\Explorer\MountPoints2\{3d045a2a-e4bb-11de-bd6f-0013d3d4ede5}
Supprimé! HKCU\.\.\.\.\Explorer\MountPoints2\{67370b4a-38ad-11df-bda7-0013d3d4ede5}
Supprimé! HKCU\.\.\.\.\Explorer\MountPoints2\{9530678f-6180-11df-bdc0-0013d3d4ede5}
Supprimé! HKCU\.\.\.\.\Explorer\MountPoints2\{b76c546a-33c1-11de-bcf6-0013d3d4ede5}
Supprimé! HKCU\.\.\.\.\Explorer\MountPoints2\{d7dc2b34-3d5d-11df-bda9-0013d3d4ede5}
Supprimé! HKCU\.\.\.\.\Explorer\MountPoints2\{ee048c9a-eedb-11da-bb44-0013d3d4ede5}
################## | Listing |
[08/09/2010 - 12:53:36 | A | 4974] C:\Ad-Report-CLEAN[1].txt
[08/09/2010 - 11:30:40 | A | 4646] C:\Ad-Report-SCAN[1].txt
[02/01/2005 - 13:14:18 | A | 50] C:\AUTOEXEC.BAT
[08/09/2010 - 12:46:22 | RASHD ] C:\Autorun.inf
[18/01/2006 - 20:22:07 | RASH | 218] C:\BOOT.BAK
[19/01/2006 - 11:04:41 | RASH | 298] C:\boot.ini
[05/08/2004 - 14:00:00 | RASH | 4952] C:\Bootfont.bin
[19/01/2006 - 11:04:41 | RSHD ] C:\cmdcons
[05/08/2004 - 14:00:00 | RSH | 263488] C:\cmldr
[30/05/2006 - 12:25:20 | AS | 12] C:\CONFIG.SYS
[08/09/2010 - 11:43:59 | D ] C:\Documents and Settings
[20/01/2006 - 10:13:40 | HD ] C:\hp
[23/11/2004 - 23:21:48 | RASH | 0] C:\IO.SYS
[08/07/2009 - 10:03:27 | A | 38400] C:\Liste Mat Dangereux TP 05-09-1.xls
[23/11/2004 - 23:21:48 | RASH | 0] C:\MSDOS.SYS
[11/10/2006 - 07:53:09 | D ] C:\MWASPI
[05/08/2004 - 14:00:00 | RASH | 47564] C:\NTDETECT.COM
[13/02/2009 - 14:38:31 | RASH | 252240] C:\ntldr
[29/02/2004 - 17:44:34 | A | 52576] C:\orange.bmp
[08/09/2010 - 12:54:23 | ASH | 792723456] C:\pagefile.sys
[08/09/2010 - 12:53:28 | D ] C:\Program Files
[02/01/2005 - 12:36:21 | HD ] C:\Python22
[08/09/2010 - 13:00:19 | SHD ] C:\RECYCLER
[01/04/2010 - 11:31:03 | D ] C:\spoolerlogs
[18/01/2006 - 20:21:27 | SHD ] C:\System Volume Information
[02/01/2005 - 12:36:01 | HD ] C:\system.sav
[16/03/2009 - 12:03:25 | D ] C:\SystemRoot
[07/12/2006 - 17:29:34 | D ] C:\temp
[04/12/2008 - 12:39:03 | A | 21] C:\tmuninst.ini
[08/09/2010 - 13:00:19 | D ] C:\UsbFix
[08/09/2010 - 13:00:20 | A | 962] C:\UsbFix.txt
[08/09/2010 - 12:46:24 | A | 10887871] C:\UsbFix_Upload_Me_NOM-EB85C523610.zip
[08/09/2010 - 12:46:10 | D ] C:\WINDOWS
[28/07/2001 - 07:07:38 | SH | 0] D:\AUTOEXEC.BAT
[08/09/2010 - 12:46:24 | RASHD ] D:\Autorun.inf
[23/11/2004 - 17:48:32 | SH | 6] D:\BLOCK.RIN
[09/01/2002 - 20:52:30 | SH | 244] D:\BOOT.INI
[17/08/2001 - 10:26:26 | SH | 237728] D:\CMLDR
[28/07/2001 - 07:07:38 | SH | 0] D:\CONFIG.SYS
[10/09/2002 - 00:14:14 | SH | 100] D:\Desktop.ini
[10/09/2002 - 17:21:08 | SH | 7850] D:\Folder.htt
[30/04/2001 - 21:16:46 | SH | 14] D:\Graph
[25/01/2002 - 19:21:24 | SH | 0] D:\GRAPH16
[30/11/2004 - 12:01:50 | SH | 73728] D:\Info.exe
[28/07/2001 - 07:07:38 | SH | 0] D:\IO.SYS
[16/05/2006 - 11:22:32 | SH | 906] D:\MASTER.LOG
[28/07/2001 - 07:07:38 | SH | 0] D:\MSDOS.SYS
[25/07/2001 - 23:00:00 | SH | 45124] D:\NTDETECT.COM
[17/08/2001 - 16:32:24 | SH | 0] D:\NTFS
[25/07/2001 - 23:00:00 | SH | 222880] D:\NTLDR
[10/09/2002 - 14:58:12 | SH | 181616] D:\protect.ed
[23/11/2004 - 17:39:42 | SH | 36] D:\SaveFile.Dir
[30/04/2001 - 21:16:46 | SH | 14] D:\SVGA
[02/01/2005 - 05:12:10 | ASH | 900] D:\USER
[08/02/2002 - 16:44:24 | SH | 88038] D:\Warning.bmp
[18/08/2001 - 16:00:00 | SH | 10] D:\WIN51
[22/01/2001 - 16:00:00 | SH | 11] D:\WIN51.B2
[25/07/2001 - 16:00:00 | SH | 11] D:\WIN51.RC1
[25/07/2001 - 21:47:04 | SH | 11] D:\WIN51.RC2
[18/08/2001 - 16:00:00 | SH | 10] D:\WIN51IC
[20/03/2001 - 16:00:00 | SH | 11] D:\WIN51IC.B2
[25/07/2001 - 16:00:00 | SH | 11] D:\WIN51IC.RC1
[25/07/2001 - 16:00:00 | SH | 11] D:\WIN51IC.RC2
[17/08/2001 - 16:00:00 | SH | 10] D:\WIN51IP
[22/01/2001 - 16:00:00 | SH | 11] D:\WIN51IP.B2
[25/07/2001 - 21:47:04 | SH | 11] D:\WIN51IP.RC2
[17/08/2001 - 14:17:02 | SH | 184] D:\WINBOM.INI
[02/01/2005 - 05:11:58 | SHD ] D:\cmdcons
[02/01/2005 - 05:11:58 | SHD ] D:\hp
[02/01/2005 - 05:11:58 | SHD ] D:\I386
[02/01/2005 - 05:12:50 | SHD ] D:\MiniNT
[02/01/2005 - 05:37:52 | SHD ] D:\PRELOAD
[24/02/2004 - 17:38:52 | A | 498] D:\BATCH.OLD
[24/11/2004 - 21:55:24 | RD ] D:\Réinstallation Système
[30/03/1999 - 18:17:54 | SHD ] D:\SYSTEM.SAV
[02/01/2005 - 05:11:58 | SHD ] D:\TOOLS
[01/02/2005 - 00:41:48 | ASH | 1552] D:\BATCH.LOG
[02/01/2005 - 04:37:12 | SHD ] D:\System Volume Information
[02/01/2005 - 05:11:58 | SHD ] D:\RECOVERY
[02/01/2005 - 05:36:48 | SHD ] D:\Recycled
[16/05/2006 - 11:22:34 | RSH | 26] D:\RCBoot.sys
[05/02/2009 - 08:20:54 | RSH | 105624] D:\3dohrt.com
[04/02/2009 - 08:06:26 | RSH | 104882] D:\r120.bat
[24/08/2009 - 10:27:40 | RSH | 116655] D:\g1.bat
[01/01/1995 - 02:00:02 | R | 44] E:\Track01.cda
[01/01/1995 - 02:02:15 | R | 44] E:\Track02.cda
[01/01/1995 - 02:04:43 | R | 44] E:\Track03.cda
[01/01/1995 - 02:08:02 | R | 44] E:\Track04.cda
[01/01/1995 - 02:10:45 | R | 44] E:\Track05.cda
[01/01/1995 - 02:13:28 | R | 44] E:\Track06.cda
[01/01/1995 - 02:15:26 | R | 44] E:\Track07.cda
[01/01/1995 - 02:19:22 | R | 44] E:\Track08.cda
[01/01/1995 - 02:22:28 | R | 44] E:\Track09.cda
[01/01/1995 - 02:25:34 | R | 44] E:\Track10.cda
[01/01/1995 - 02:27:36 | R | 44] E:\Track11.cda
[01/01/1995 - 02:29:47 | R | 44] E:\Track12.cda
[01/01/1995 - 02:32:51 | R | 44] E:\Track13.cda
[01/01/1995 - 02:35:12 | R | 44] E:\Track14.cda
[01/01/1995 - 02:38:59 | R | 44] E:\Track15.cda
[01/01/1995 - 02:41:53 | R | 44] E:\Track16.cda
[01/01/1995 - 02:46:07 | R | 44] E:\Track17.cda
[01/01/1995 - 02:51:02 | R | 44] E:\Track18.cda
[01/01/1995 - 02:55:38 | R | 44] E:\Track19.cda
[01/01/1995 - 02:00:28 | R | 44] E:\Track20.cda
[01/01/1995 - 02:03:55 | R | 44] E:\Track21.cda
[01/01/1995 - 02:07:35 | R | 44] E:\Track22.cda
################## | Vaccin |
C:\Autorun.inf -> Dossier créé par UsbFix (El Desaparecido & C_XX)
D:\Autorun.inf -> Dossier créé par UsbFix (El Desaparecido & C_XX)
################## | Upload |
Veuillez envoyer le fichier: C:\UsbFix_Upload_Me_NOM-EB85C523610.zip
https://www.ionos.fr/?affiliate_id=77097
Merci de votre contribution.
################## | E.O.F |
usb fixe
############################## | UsbFix 7.023 | [Suppression]
Utilisateur: Annick (Administrateur) # NOM-EB85C523610 [ ]
Mis à jour le 02/09/10 par El Desaparecido / C_XX
Lancé à 12:57:57 | 08/09/2010
Site Web: http://www.teamxscript.org
Contact: FindyKill.Contact@gmail.com
CPU: Intel(R) Pentium(R) 4 CPU 3.06GHz
Microsoft Windows XP Édition familiale (5.1.2600 32-Bit) # Service Pack 3
Internet Explorer 8.0.6001.18702
Pare-feu Windows: Activé
Antivirus: Trend Micro OfficeScan Client 7.3 [Enabled | Updated]
Firewall: Pare-feu pour client - version d'entreprise Trend Micro OfficeScan 7.3 [Enabled]
RAM -> 503 Mo
C:\ (%systemdrive%) -> Disque fixe # 227 Go (213 Go libre(s) - 94%) [HP_PAVILION] # NTFS
D:\ -> Disque fixe # 6 Go (2 Go libre(s) - 32%) [HP_RECOVERY] # FAT32
E:\ -> CD-ROM
Y:\ -> Disque amovible # 4 Go (2 Go libre(s) - 61%) [] # FAT32
################## | Éléments infectieux |
################## | Registre |
Non supprimé ! HKLM\SYSTEM\ControlSet001\Enum\Root\LEGACY_KAVSYS
Non supprimé ! HKLM\SYSTEM\ControlSet002\Enum\Root\LEGACY_KAVSYS
Non supprimé ! HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_KAVSYS
################## | Mountpoints2 |
Supprimé! HKCU\.\.\.\.\Explorer\MountPoints2\{0b2b6d5d-73be-11db-bb91-0013d3d4ede5}
Supprimé! HKCU\.\.\.\.\Explorer\MountPoints2\{18690ac2-50cc-11de-bd0e-0013d3d4ede5}
Supprimé! HKCU\.\.\.\.\Explorer\MountPoints2\{3d045a2a-e4bb-11de-bd6f-0013d3d4ede5}
Supprimé! HKCU\.\.\.\.\Explorer\MountPoints2\{67370b4a-38ad-11df-bda7-0013d3d4ede5}
Supprimé! HKCU\.\.\.\.\Explorer\MountPoints2\{9530678f-6180-11df-bdc0-0013d3d4ede5}
Supprimé! HKCU\.\.\.\.\Explorer\MountPoints2\{b76c546a-33c1-11de-bcf6-0013d3d4ede5}
Supprimé! HKCU\.\.\.\.\Explorer\MountPoints2\{d7dc2b34-3d5d-11df-bda9-0013d3d4ede5}
Supprimé! HKCU\.\.\.\.\Explorer\MountPoints2\{ee048c9a-eedb-11da-bb44-0013d3d4ede5}
################## | Listing |
[08/09/2010 - 12:53:36 | A | 4974] C:\Ad-Report-CLEAN[1].txt
[08/09/2010 - 11:30:40 | A | 4646] C:\Ad-Report-SCAN[1].txt
[02/01/2005 - 13:14:18 | A | 50] C:\AUTOEXEC.BAT
[08/09/2010 - 12:46:22 | RASHD ] C:\Autorun.inf
[18/01/2006 - 20:22:07 | RASH | 218] C:\BOOT.BAK
[19/01/2006 - 11:04:41 | RASH | 298] C:\boot.ini
[05/08/2004 - 14:00:00 | RASH | 4952] C:\Bootfont.bin
[19/01/2006 - 11:04:41 | RSHD ] C:\cmdcons
[05/08/2004 - 14:00:00 | RSH | 263488] C:\cmldr
[30/05/2006 - 12:25:20 | AS | 12] C:\CONFIG.SYS
[08/09/2010 - 11:43:59 | D ] C:\Documents and Settings
[20/01/2006 - 10:13:40 | HD ] C:\hp
[23/11/2004 - 23:21:48 | RASH | 0] C:\IO.SYS
[08/07/2009 - 10:03:27 | A | 38400] C:\Liste Mat Dangereux TP 05-09-1.xls
[23/11/2004 - 23:21:48 | RASH | 0] C:\MSDOS.SYS
[11/10/2006 - 07:53:09 | D ] C:\MWASPI
[05/08/2004 - 14:00:00 | RASH | 47564] C:\NTDETECT.COM
[13/02/2009 - 14:38:31 | RASH | 252240] C:\ntldr
[29/02/2004 - 17:44:34 | A | 52576] C:\orange.bmp
[08/09/2010 - 12:54:23 | ASH | 792723456] C:\pagefile.sys
[08/09/2010 - 12:53:28 | D ] C:\Program Files
[02/01/2005 - 12:36:21 | HD ] C:\Python22
[08/09/2010 - 13:00:19 | SHD ] C:\RECYCLER
[01/04/2010 - 11:31:03 | D ] C:\spoolerlogs
[18/01/2006 - 20:21:27 | SHD ] C:\System Volume Information
[02/01/2005 - 12:36:01 | HD ] C:\system.sav
[16/03/2009 - 12:03:25 | D ] C:\SystemRoot
[07/12/2006 - 17:29:34 | D ] C:\temp
[04/12/2008 - 12:39:03 | A | 21] C:\tmuninst.ini
[08/09/2010 - 13:00:19 | D ] C:\UsbFix
[08/09/2010 - 13:00:20 | A | 962] C:\UsbFix.txt
[08/09/2010 - 12:46:24 | A | 10887871] C:\UsbFix_Upload_Me_NOM-EB85C523610.zip
[08/09/2010 - 12:46:10 | D ] C:\WINDOWS
[28/07/2001 - 07:07:38 | SH | 0] D:\AUTOEXEC.BAT
[08/09/2010 - 12:46:24 | RASHD ] D:\Autorun.inf
[23/11/2004 - 17:48:32 | SH | 6] D:\BLOCK.RIN
[09/01/2002 - 20:52:30 | SH | 244] D:\BOOT.INI
[17/08/2001 - 10:26:26 | SH | 237728] D:\CMLDR
[28/07/2001 - 07:07:38 | SH | 0] D:\CONFIG.SYS
[10/09/2002 - 00:14:14 | SH | 100] D:\Desktop.ini
[10/09/2002 - 17:21:08 | SH | 7850] D:\Folder.htt
[30/04/2001 - 21:16:46 | SH | 14] D:\Graph
[25/01/2002 - 19:21:24 | SH | 0] D:\GRAPH16
[30/11/2004 - 12:01:50 | SH | 73728] D:\Info.exe
[28/07/2001 - 07:07:38 | SH | 0] D:\IO.SYS
[16/05/2006 - 11:22:32 | SH | 906] D:\MASTER.LOG
[28/07/2001 - 07:07:38 | SH | 0] D:\MSDOS.SYS
[25/07/2001 - 23:00:00 | SH | 45124] D:\NTDETECT.COM
[17/08/2001 - 16:32:24 | SH | 0] D:\NTFS
[25/07/2001 - 23:00:00 | SH | 222880] D:\NTLDR
[10/09/2002 - 14:58:12 | SH | 181616] D:\protect.ed
[23/11/2004 - 17:39:42 | SH | 36] D:\SaveFile.Dir
[30/04/2001 - 21:16:46 | SH | 14] D:\SVGA
[02/01/2005 - 05:12:10 | ASH | 900] D:\USER
[08/02/2002 - 16:44:24 | SH | 88038] D:\Warning.bmp
[18/08/2001 - 16:00:00 | SH | 10] D:\WIN51
[22/01/2001 - 16:00:00 | SH | 11] D:\WIN51.B2
[25/07/2001 - 16:00:00 | SH | 11] D:\WIN51.RC1
[25/07/2001 - 21:47:04 | SH | 11] D:\WIN51.RC2
[18/08/2001 - 16:00:00 | SH | 10] D:\WIN51IC
[20/03/2001 - 16:00:00 | SH | 11] D:\WIN51IC.B2
[25/07/2001 - 16:00:00 | SH | 11] D:\WIN51IC.RC1
[25/07/2001 - 16:00:00 | SH | 11] D:\WIN51IC.RC2
[17/08/2001 - 16:00:00 | SH | 10] D:\WIN51IP
[22/01/2001 - 16:00:00 | SH | 11] D:\WIN51IP.B2
[25/07/2001 - 21:47:04 | SH | 11] D:\WIN51IP.RC2
[17/08/2001 - 14:17:02 | SH | 184] D:\WINBOM.INI
[02/01/2005 - 05:11:58 | SHD ] D:\cmdcons
[02/01/2005 - 05:11:58 | SHD ] D:\hp
[02/01/2005 - 05:11:58 | SHD ] D:\I386
[02/01/2005 - 05:12:50 | SHD ] D:\MiniNT
[02/01/2005 - 05:37:52 | SHD ] D:\PRELOAD
[24/02/2004 - 17:38:52 | A | 498] D:\BATCH.OLD
[24/11/2004 - 21:55:24 | RD ] D:\Réinstallation Système
[30/03/1999 - 18:17:54 | SHD ] D:\SYSTEM.SAV
[02/01/2005 - 05:11:58 | SHD ] D:\TOOLS
[01/02/2005 - 00:41:48 | ASH | 1552] D:\BATCH.LOG
[02/01/2005 - 04:37:12 | SHD ] D:\System Volume Information
[02/01/2005 - 05:11:58 | SHD ] D:\RECOVERY
[02/01/2005 - 05:36:48 | SHD ] D:\Recycled
[16/05/2006 - 11:22:34 | RSH | 26] D:\RCBoot.sys
[05/02/2009 - 08:20:54 | RSH | 105624] D:\3dohrt.com
[04/02/2009 - 08:06:26 | RSH | 104882] D:\r120.bat
[24/08/2009 - 10:27:40 | RSH | 116655] D:\g1.bat
[01/01/1995 - 02:00:02 | R | 44] E:\Track01.cda
[01/01/1995 - 02:02:15 | R | 44] E:\Track02.cda
[01/01/1995 - 02:04:43 | R | 44] E:\Track03.cda
[01/01/1995 - 02:08:02 | R | 44] E:\Track04.cda
[01/01/1995 - 02:10:45 | R | 44] E:\Track05.cda
[01/01/1995 - 02:13:28 | R | 44] E:\Track06.cda
[01/01/1995 - 02:15:26 | R | 44] E:\Track07.cda
[01/01/1995 - 02:19:22 | R | 44] E:\Track08.cda
[01/01/1995 - 02:22:28 | R | 44] E:\Track09.cda
[01/01/1995 - 02:25:34 | R | 44] E:\Track10.cda
[01/01/1995 - 02:27:36 | R | 44] E:\Track11.cda
[01/01/1995 - 02:29:47 | R | 44] E:\Track12.cda
[01/01/1995 - 02:32:51 | R | 44] E:\Track13.cda
[01/01/1995 - 02:35:12 | R | 44] E:\Track14.cda
[01/01/1995 - 02:38:59 | R | 44] E:\Track15.cda
[01/01/1995 - 02:41:53 | R | 44] E:\Track16.cda
[01/01/1995 - 02:46:07 | R | 44] E:\Track17.cda
[01/01/1995 - 02:51:02 | R | 44] E:\Track18.cda
[01/01/1995 - 02:55:38 | R | 44] E:\Track19.cda
[01/01/1995 - 02:00:28 | R | 44] E:\Track20.cda
[01/01/1995 - 02:03:55 | R | 44] E:\Track21.cda
[01/01/1995 - 02:07:35 | R | 44] E:\Track22.cda
################## | Vaccin |
C:\Autorun.inf -> Dossier créé par UsbFix (El Desaparecido & C_XX)
D:\Autorun.inf -> Dossier créé par UsbFix (El Desaparecido & C_XX)
################## | Upload |
Veuillez envoyer le fichier: C:\UsbFix_Upload_Me_NOM-EB85C523610.zip
https://www.ionos.fr/?affiliate_id=77097
Merci de votre contribution.
################## | E.O.F |
moment de grace
Messages postés
29042
Date d'inscription
samedi 6 décembre 2008
Statut
Contributeur sécurité
Dernière intervention
18 juillet 2013
2 274
8 sept. 2010 à 13:25
8 sept. 2010 à 13:25
vu
peux tu refaire la même manip mais en mode sans echec
https://www.micro-astuce.com/depannage/demarrer-mode-sans-echec.php
peux tu refaire la même manip mais en mode sans echec
https://www.micro-astuce.com/depannage/demarrer-mode-sans-echec.php
mode sans echec:
############################## | UsbFix 7.023 | [Suppression]
Utilisateur: Administrateur (Administrateur) # NOM-EB85C523610 [ ]
Mis à jour le 02/09/10 par El Desaparecido / C_XX
Lancé à 13:37:47 | 08/09/2010
Site Web: http://www.teamxscript.org
Contact: FindyKill.Contact@gmail.com
CPU: Intel(R) Pentium(R) 4 CPU 3.06GHz
Microsoft Windows XP Édition familiale (5.1.2600 32-Bit) # Service Pack 3
Internet Explorer 8.0.6001.18702
Antivirus: Trend Micro OfficeScan Client 7.3 [Enabled | Updated]
Firewall: Pare-feu pour client - version d'entreprise Trend Micro OfficeScan 7.3 [Enabled]
RAM -> 503 Mo
C:\ (%systemdrive%) -> Disque fixe # 227 Go (213 Go libre(s) - 94%) [HP_PAVILION] # NTFS
D:\ -> Disque fixe # 6 Go (2 Go libre(s) - 32%) [HP_RECOVERY] # FAT32
E:\ -> CD-ROM
Y:\ -> Disque amovible # 4 Go (2 Go libre(s) - 61%) [] # FAT32
################## | Éléments infectieux |
Supprimé! Y:\Autorun.inf
Supprimé! Y:\9fo3ar0j.exe
Supprimé! Y:\sdfqh.exe
Supprimé! Y:\ysyjq1bs.exe
################## | Registre |
Non supprimé ! HKLM\SYSTEM\ControlSet001\Enum\Root\LEGACY_KAVSYS
Non supprimé ! HKLM\SYSTEM\ControlSet002\Enum\Root\LEGACY_KAVSYS
Non supprimé ! HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_KAVSYS
################## | Mountpoints2 |
################## | Listing |
[08/09/2010 - 12:53:36 | A | 4974] C:\Ad-Report-CLEAN[1].txt
[08/09/2010 - 11:30:40 | A | 4646] C:\Ad-Report-SCAN[1].txt
[02/01/2005 - 13:14:18 | A | 50] C:\AUTOEXEC.BAT
[08/09/2010 - 13:00:25 | RASHD ] C:\Autorun.inf
[18/01/2006 - 20:22:07 | RASH | 218] C:\BOOT.BAK
[19/01/2006 - 11:04:41 | RASH | 298] C:\boot.ini
[05/08/2004 - 14:00:00 | RASH | 4952] C:\Bootfont.bin
[19/01/2006 - 11:04:41 | RSHD ] C:\cmdcons
[05/08/2004 - 14:00:00 | RSH | 263488] C:\cmldr
[30/05/2006 - 12:25:20 | AS | 12] C:\CONFIG.SYS
[08/09/2010 - 13:34:30 | D ] C:\Documents and Settings
[20/01/2006 - 10:13:40 | HD ] C:\hp
[23/11/2004 - 23:21:48 | RASH | 0] C:\IO.SYS
[08/07/2009 - 10:03:27 | A | 38400] C:\Liste Mat Dangereux TP 05-09-1.xls
[23/11/2004 - 23:21:48 | RASH | 0] C:\MSDOS.SYS
[11/10/2006 - 07:53:09 | D ] C:\MWASPI
[05/08/2004 - 14:00:00 | RASH | 47564] C:\NTDETECT.COM
[13/02/2009 - 14:38:31 | RASH | 252240] C:\ntldr
[29/02/2004 - 17:44:34 | A | 52576] C:\orange.bmp
[08/09/2010 - 13:33:56 | ASH | 792723456] C:\pagefile.sys
[08/09/2010 - 13:25:06 | D ] C:\Program Files
[02/01/2005 - 12:36:21 | HD ] C:\Python22
[08/09/2010 - 13:41:33 | SHD ] C:\RECYCLER
[01/04/2010 - 11:31:03 | D ] C:\spoolerlogs
[08/09/2010 - 13:06:35 | SHD ] C:\System Volume Information
[02/01/2005 - 12:36:01 | HD ] C:\system.sav
[16/03/2009 - 12:03:25 | D ] C:\SystemRoot
[07/12/2006 - 17:29:34 | D ] C:\temp
[04/12/2008 - 12:39:03 | A | 21] C:\tmuninst.ini
[08/09/2010 - 13:41:33 | D ] C:\UsbFix
[08/09/2010 - 13:41:38 | A | 1250] C:\UsbFix.txt
[08/09/2010 - 13:00:28 | A | 10886851] C:\UsbFix_Upload_Me_NOM-EB85C523610.zip
[08/09/2010 - 13:34:05 | D ] C:\WINDOWS
[28/07/2001 - 07:07:38 | SH | 0] D:\AUTOEXEC.BAT
[08/09/2010 - 13:00:26 | RASHD ] D:\Autorun.inf
[23/11/2004 - 17:48:32 | SH | 6] D:\BLOCK.RIN
[09/01/2002 - 20:52:30 | SH | 244] D:\BOOT.INI
[17/08/2001 - 10:26:26 | SH | 237728] D:\CMLDR
[28/07/2001 - 07:07:38 | SH | 0] D:\CONFIG.SYS
[10/09/2002 - 00:14:14 | SH | 100] D:\Desktop.ini
[10/09/2002 - 17:21:08 | SH | 7850] D:\Folder.htt
[30/04/2001 - 21:16:46 | SH | 14] D:\Graph
[25/01/2002 - 19:21:24 | SH | 0] D:\GRAPH16
[30/11/2004 - 12:01:50 | SH | 73728] D:\Info.exe
[28/07/2001 - 07:07:38 | SH | 0] D:\IO.SYS
[16/05/2006 - 11:22:32 | SH | 906] D:\MASTER.LOG
[28/07/2001 - 07:07:38 | SH | 0] D:\MSDOS.SYS
[25/07/2001 - 23:00:00 | SH | 45124] D:\NTDETECT.COM
[17/08/2001 - 16:32:24 | SH | 0] D:\NTFS
[25/07/2001 - 23:00:00 | SH | 222880] D:\NTLDR
[10/09/2002 - 14:58:12 | SH | 181616] D:\protect.ed
[23/11/2004 - 17:39:42 | SH | 36] D:\SaveFile.Dir
[30/04/2001 - 21:16:46 | SH | 14] D:\SVGA
[02/01/2005 - 05:12:10 | ASH | 900] D:\USER
[08/02/2002 - 16:44:24 | SH | 88038] D:\Warning.bmp
[18/08/2001 - 16:00:00 | SH | 10] D:\WIN51
[22/01/2001 - 16:00:00 | SH | 11] D:\WIN51.B2
[25/07/2001 - 16:00:00 | SH | 11] D:\WIN51.RC1
[25/07/2001 - 21:47:04 | SH | 11] D:\WIN51.RC2
[18/08/2001 - 16:00:00 | SH | 10] D:\WIN51IC
[20/03/2001 - 16:00:00 | SH | 11] D:\WIN51IC.B2
[25/07/2001 - 16:00:00 | SH | 11] D:\WIN51IC.RC1
[25/07/2001 - 16:00:00 | SH | 11] D:\WIN51IC.RC2
[17/08/2001 - 16:00:00 | SH | 10] D:\WIN51IP
[22/01/2001 - 16:00:00 | SH | 11] D:\WIN51IP.B2
[25/07/2001 - 21:47:04 | SH | 11] D:\WIN51IP.RC2
[17/08/2001 - 14:17:02 | SH | 184] D:\WINBOM.INI
[02/01/2005 - 05:11:58 | SHD ] D:\cmdcons
[02/01/2005 - 05:11:58 | SHD ] D:\hp
[02/01/2005 - 05:11:58 | SHD ] D:\I386
[02/01/2005 - 05:12:50 | SHD ] D:\MiniNT
[02/01/2005 - 05:37:52 | SHD ] D:\PRELOAD
[24/02/2004 - 17:38:52 | A | 498] D:\BATCH.OLD
[24/11/2004 - 21:55:24 | RD ] D:\Réinstallation Système
[30/03/1999 - 18:17:54 | SHD ] D:\SYSTEM.SAV
[02/01/2005 - 05:11:58 | SHD ] D:\TOOLS
[01/02/2005 - 00:41:48 | ASH | 1552] D:\BATCH.LOG
[02/01/2005 - 04:37:12 | SHD ] D:\System Volume Information
[02/01/2005 - 05:11:58 | SHD ] D:\RECOVERY
[02/01/2005 - 05:36:48 | SHD ] D:\Recycled
[16/05/2006 - 11:22:34 | RSH | 26] D:\RCBoot.sys
[05/02/2009 - 08:20:54 | RSH | 105624] D:\3dohrt.com
[04/02/2009 - 08:06:26 | RSH | 104882] D:\r120.bat
[24/08/2009 - 10:27:40 | RSH | 116655] D:\g1.bat
[01/01/1995 - 02:00:02 | R | 44] E:\Track01.cda
[01/01/1995 - 02:02:15 | R | 44] E:\Track02.cda
[01/01/1995 - 02:04:43 | R | 44] E:\Track03.cda
[01/01/1995 - 02:08:02 | R | 44] E:\Track04.cda
[01/01/1995 - 02:10:45 | R | 44] E:\Track05.cda
[01/01/1995 - 02:13:28 | R | 44] E:\Track06.cda
[01/01/1995 - 02:15:26 | R | 44] E:\Track07.cda
[01/01/1995 - 02:19:22 | R | 44] E:\Track08.cda
[01/01/1995 - 02:22:28 | R | 44] E:\Track09.cda
[01/01/1995 - 02:25:34 | R | 44] E:\Track10.cda
[01/01/1995 - 02:27:36 | R | 44] E:\Track11.cda
[01/01/1995 - 02:29:47 | R | 44] E:\Track12.cda
[01/01/1995 - 02:32:51 | R | 44] E:\Track13.cda
[01/01/1995 - 02:35:12 | R | 44] E:\Track14.cda
[01/01/1995 - 02:38:59 | R | 44] E:\Track15.cda
[01/01/1995 - 02:41:53 | R | 44] E:\Track16.cda
[01/01/1995 - 02:46:07 | R | 44] E:\Track17.cda
[01/01/1995 - 02:51:02 | R | 44] E:\Track18.cda
[01/01/1995 - 02:55:38 | R | 44] E:\Track19.cda
[01/01/1995 - 02:00:28 | R | 44] E:\Track20.cda
[01/01/1995 - 02:03:55 | R | 44] E:\Track21.cda
[01/01/1995 - 02:07:35 | R | 44] E:\Track22.cda
[06/09/2010 - 19:12:34 | AD ] Y:\Plants vs. Zombies
[18/01/2010 - 18:20:52 | AH | 4096] Y:\._Bilbiographie CPE.doc
[18/01/2010 - 18:20:54 | AH | 4096] Y:\._Intro Biblio.doc
[17/08/2009 - 18:27:48 | AH | 4096] Y:\._.Trashes
[17/08/2009 - 18:27:48 | HD ] Y:\.Trashes
[26/01/2010 - 22:12:32 | AH | 4096] Y:\._archive.doc
[17/08/2009 - 18:27:48 | HD ] Y:\.Spotlight-V100
[20/01/2010 - 00:19:24 | AH | 4096] Y:\._biblio source e tintro.doc
[26/01/2010 - 22:12:06 | AH | 4096] Y:\._Histoire 03.11.09 .doc
[26/01/2010 - 22:12:12 | AH | 4096] Y:\._Le langage télévisuel 1.doc
[26/01/2010 - 22:12:18 | AH | 4096] Y:\._Histoire à la télévision 2..doc
[26/01/2010 - 22:12:24 | AH | 4096] Y:\._Le langage télévisuel 1..doc
[28/01/2010 - 00:18:20 | AH | 4096] Y:\._4 Manière de filmé et d.doc
[28/01/2010 - 21:49:36 | AH | 4096] Y:\._Archive ok.docx
[28/01/2010 - 21:50:10 | AH | 4096] Y:\._Archive ok.doc
[14/05/2010 - 11:49:28 | D ] Y:\ASSASSIN
[05/04/2010 - 22:57:40 | AH | 4096] Y:\._synopsis.doc
[05/04/2010 - 20:23:24 | AH | 4134] Y:\._synopsis.docx
[05/04/2010 - 20:24:44 | HD ] Y:\.TemporaryItems
[25/06/2010 - 16:49:28 | D ] Y:\CPE
[05/04/2010 - 20:24:44 | AH | 4096] Y:\._.TemporaryItems
[06/04/2010 - 00:52:42 | AH | 4096] Y:\._Note d'intention.doc
[06/04/2010 - 00:54:24 | D ] Y:\Histoire de l'Islam Médiévale
[06/04/2010 - 00:54:30 | D ] Y:\Histoire Médievale
[08/06/2010 - 10:15:40 | D ] Y:\sortie fotainebleau 03.06.10 CFA 1ère
[06/08/2010 - 17:51:02 | D ] Y:\Ete 2010
################## | Vaccin |
C:\Autorun.inf -> Dossier créé par UsbFix (El Desaparecido & C_XX)
D:\Autorun.inf -> Dossier créé par UsbFix (El Desaparecido & C_XX)
Y:\Autorun.inf -> Dossier créé par UsbFix (El Desaparecido & C_XX)
################## | Upload |
Veuillez envoyer le fichier: C:\UsbFix_Upload_Me_NOM-EB85C523610.zip
https://www.ionos.fr/?affiliate_id=77097
Merci de votre contribution.
################## | E.O.F |
############################## | UsbFix 7.023 | [Suppression]
Utilisateur: Administrateur (Administrateur) # NOM-EB85C523610 [ ]
Mis à jour le 02/09/10 par El Desaparecido / C_XX
Lancé à 13:37:47 | 08/09/2010
Site Web: http://www.teamxscript.org
Contact: FindyKill.Contact@gmail.com
CPU: Intel(R) Pentium(R) 4 CPU 3.06GHz
Microsoft Windows XP Édition familiale (5.1.2600 32-Bit) # Service Pack 3
Internet Explorer 8.0.6001.18702
Antivirus: Trend Micro OfficeScan Client 7.3 [Enabled | Updated]
Firewall: Pare-feu pour client - version d'entreprise Trend Micro OfficeScan 7.3 [Enabled]
RAM -> 503 Mo
C:\ (%systemdrive%) -> Disque fixe # 227 Go (213 Go libre(s) - 94%) [HP_PAVILION] # NTFS
D:\ -> Disque fixe # 6 Go (2 Go libre(s) - 32%) [HP_RECOVERY] # FAT32
E:\ -> CD-ROM
Y:\ -> Disque amovible # 4 Go (2 Go libre(s) - 61%) [] # FAT32
################## | Éléments infectieux |
Supprimé! Y:\Autorun.inf
Supprimé! Y:\9fo3ar0j.exe
Supprimé! Y:\sdfqh.exe
Supprimé! Y:\ysyjq1bs.exe
################## | Registre |
Non supprimé ! HKLM\SYSTEM\ControlSet001\Enum\Root\LEGACY_KAVSYS
Non supprimé ! HKLM\SYSTEM\ControlSet002\Enum\Root\LEGACY_KAVSYS
Non supprimé ! HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_KAVSYS
################## | Mountpoints2 |
################## | Listing |
[08/09/2010 - 12:53:36 | A | 4974] C:\Ad-Report-CLEAN[1].txt
[08/09/2010 - 11:30:40 | A | 4646] C:\Ad-Report-SCAN[1].txt
[02/01/2005 - 13:14:18 | A | 50] C:\AUTOEXEC.BAT
[08/09/2010 - 13:00:25 | RASHD ] C:\Autorun.inf
[18/01/2006 - 20:22:07 | RASH | 218] C:\BOOT.BAK
[19/01/2006 - 11:04:41 | RASH | 298] C:\boot.ini
[05/08/2004 - 14:00:00 | RASH | 4952] C:\Bootfont.bin
[19/01/2006 - 11:04:41 | RSHD ] C:\cmdcons
[05/08/2004 - 14:00:00 | RSH | 263488] C:\cmldr
[30/05/2006 - 12:25:20 | AS | 12] C:\CONFIG.SYS
[08/09/2010 - 13:34:30 | D ] C:\Documents and Settings
[20/01/2006 - 10:13:40 | HD ] C:\hp
[23/11/2004 - 23:21:48 | RASH | 0] C:\IO.SYS
[08/07/2009 - 10:03:27 | A | 38400] C:\Liste Mat Dangereux TP 05-09-1.xls
[23/11/2004 - 23:21:48 | RASH | 0] C:\MSDOS.SYS
[11/10/2006 - 07:53:09 | D ] C:\MWASPI
[05/08/2004 - 14:00:00 | RASH | 47564] C:\NTDETECT.COM
[13/02/2009 - 14:38:31 | RASH | 252240] C:\ntldr
[29/02/2004 - 17:44:34 | A | 52576] C:\orange.bmp
[08/09/2010 - 13:33:56 | ASH | 792723456] C:\pagefile.sys
[08/09/2010 - 13:25:06 | D ] C:\Program Files
[02/01/2005 - 12:36:21 | HD ] C:\Python22
[08/09/2010 - 13:41:33 | SHD ] C:\RECYCLER
[01/04/2010 - 11:31:03 | D ] C:\spoolerlogs
[08/09/2010 - 13:06:35 | SHD ] C:\System Volume Information
[02/01/2005 - 12:36:01 | HD ] C:\system.sav
[16/03/2009 - 12:03:25 | D ] C:\SystemRoot
[07/12/2006 - 17:29:34 | D ] C:\temp
[04/12/2008 - 12:39:03 | A | 21] C:\tmuninst.ini
[08/09/2010 - 13:41:33 | D ] C:\UsbFix
[08/09/2010 - 13:41:38 | A | 1250] C:\UsbFix.txt
[08/09/2010 - 13:00:28 | A | 10886851] C:\UsbFix_Upload_Me_NOM-EB85C523610.zip
[08/09/2010 - 13:34:05 | D ] C:\WINDOWS
[28/07/2001 - 07:07:38 | SH | 0] D:\AUTOEXEC.BAT
[08/09/2010 - 13:00:26 | RASHD ] D:\Autorun.inf
[23/11/2004 - 17:48:32 | SH | 6] D:\BLOCK.RIN
[09/01/2002 - 20:52:30 | SH | 244] D:\BOOT.INI
[17/08/2001 - 10:26:26 | SH | 237728] D:\CMLDR
[28/07/2001 - 07:07:38 | SH | 0] D:\CONFIG.SYS
[10/09/2002 - 00:14:14 | SH | 100] D:\Desktop.ini
[10/09/2002 - 17:21:08 | SH | 7850] D:\Folder.htt
[30/04/2001 - 21:16:46 | SH | 14] D:\Graph
[25/01/2002 - 19:21:24 | SH | 0] D:\GRAPH16
[30/11/2004 - 12:01:50 | SH | 73728] D:\Info.exe
[28/07/2001 - 07:07:38 | SH | 0] D:\IO.SYS
[16/05/2006 - 11:22:32 | SH | 906] D:\MASTER.LOG
[28/07/2001 - 07:07:38 | SH | 0] D:\MSDOS.SYS
[25/07/2001 - 23:00:00 | SH | 45124] D:\NTDETECT.COM
[17/08/2001 - 16:32:24 | SH | 0] D:\NTFS
[25/07/2001 - 23:00:00 | SH | 222880] D:\NTLDR
[10/09/2002 - 14:58:12 | SH | 181616] D:\protect.ed
[23/11/2004 - 17:39:42 | SH | 36] D:\SaveFile.Dir
[30/04/2001 - 21:16:46 | SH | 14] D:\SVGA
[02/01/2005 - 05:12:10 | ASH | 900] D:\USER
[08/02/2002 - 16:44:24 | SH | 88038] D:\Warning.bmp
[18/08/2001 - 16:00:00 | SH | 10] D:\WIN51
[22/01/2001 - 16:00:00 | SH | 11] D:\WIN51.B2
[25/07/2001 - 16:00:00 | SH | 11] D:\WIN51.RC1
[25/07/2001 - 21:47:04 | SH | 11] D:\WIN51.RC2
[18/08/2001 - 16:00:00 | SH | 10] D:\WIN51IC
[20/03/2001 - 16:00:00 | SH | 11] D:\WIN51IC.B2
[25/07/2001 - 16:00:00 | SH | 11] D:\WIN51IC.RC1
[25/07/2001 - 16:00:00 | SH | 11] D:\WIN51IC.RC2
[17/08/2001 - 16:00:00 | SH | 10] D:\WIN51IP
[22/01/2001 - 16:00:00 | SH | 11] D:\WIN51IP.B2
[25/07/2001 - 21:47:04 | SH | 11] D:\WIN51IP.RC2
[17/08/2001 - 14:17:02 | SH | 184] D:\WINBOM.INI
[02/01/2005 - 05:11:58 | SHD ] D:\cmdcons
[02/01/2005 - 05:11:58 | SHD ] D:\hp
[02/01/2005 - 05:11:58 | SHD ] D:\I386
[02/01/2005 - 05:12:50 | SHD ] D:\MiniNT
[02/01/2005 - 05:37:52 | SHD ] D:\PRELOAD
[24/02/2004 - 17:38:52 | A | 498] D:\BATCH.OLD
[24/11/2004 - 21:55:24 | RD ] D:\Réinstallation Système
[30/03/1999 - 18:17:54 | SHD ] D:\SYSTEM.SAV
[02/01/2005 - 05:11:58 | SHD ] D:\TOOLS
[01/02/2005 - 00:41:48 | ASH | 1552] D:\BATCH.LOG
[02/01/2005 - 04:37:12 | SHD ] D:\System Volume Information
[02/01/2005 - 05:11:58 | SHD ] D:\RECOVERY
[02/01/2005 - 05:36:48 | SHD ] D:\Recycled
[16/05/2006 - 11:22:34 | RSH | 26] D:\RCBoot.sys
[05/02/2009 - 08:20:54 | RSH | 105624] D:\3dohrt.com
[04/02/2009 - 08:06:26 | RSH | 104882] D:\r120.bat
[24/08/2009 - 10:27:40 | RSH | 116655] D:\g1.bat
[01/01/1995 - 02:00:02 | R | 44] E:\Track01.cda
[01/01/1995 - 02:02:15 | R | 44] E:\Track02.cda
[01/01/1995 - 02:04:43 | R | 44] E:\Track03.cda
[01/01/1995 - 02:08:02 | R | 44] E:\Track04.cda
[01/01/1995 - 02:10:45 | R | 44] E:\Track05.cda
[01/01/1995 - 02:13:28 | R | 44] E:\Track06.cda
[01/01/1995 - 02:15:26 | R | 44] E:\Track07.cda
[01/01/1995 - 02:19:22 | R | 44] E:\Track08.cda
[01/01/1995 - 02:22:28 | R | 44] E:\Track09.cda
[01/01/1995 - 02:25:34 | R | 44] E:\Track10.cda
[01/01/1995 - 02:27:36 | R | 44] E:\Track11.cda
[01/01/1995 - 02:29:47 | R | 44] E:\Track12.cda
[01/01/1995 - 02:32:51 | R | 44] E:\Track13.cda
[01/01/1995 - 02:35:12 | R | 44] E:\Track14.cda
[01/01/1995 - 02:38:59 | R | 44] E:\Track15.cda
[01/01/1995 - 02:41:53 | R | 44] E:\Track16.cda
[01/01/1995 - 02:46:07 | R | 44] E:\Track17.cda
[01/01/1995 - 02:51:02 | R | 44] E:\Track18.cda
[01/01/1995 - 02:55:38 | R | 44] E:\Track19.cda
[01/01/1995 - 02:00:28 | R | 44] E:\Track20.cda
[01/01/1995 - 02:03:55 | R | 44] E:\Track21.cda
[01/01/1995 - 02:07:35 | R | 44] E:\Track22.cda
[06/09/2010 - 19:12:34 | AD ] Y:\Plants vs. Zombies
[18/01/2010 - 18:20:52 | AH | 4096] Y:\._Bilbiographie CPE.doc
[18/01/2010 - 18:20:54 | AH | 4096] Y:\._Intro Biblio.doc
[17/08/2009 - 18:27:48 | AH | 4096] Y:\._.Trashes
[17/08/2009 - 18:27:48 | HD ] Y:\.Trashes
[26/01/2010 - 22:12:32 | AH | 4096] Y:\._archive.doc
[17/08/2009 - 18:27:48 | HD ] Y:\.Spotlight-V100
[20/01/2010 - 00:19:24 | AH | 4096] Y:\._biblio source e tintro.doc
[26/01/2010 - 22:12:06 | AH | 4096] Y:\._Histoire 03.11.09 .doc
[26/01/2010 - 22:12:12 | AH | 4096] Y:\._Le langage télévisuel 1.doc
[26/01/2010 - 22:12:18 | AH | 4096] Y:\._Histoire à la télévision 2..doc
[26/01/2010 - 22:12:24 | AH | 4096] Y:\._Le langage télévisuel 1..doc
[28/01/2010 - 00:18:20 | AH | 4096] Y:\._4 Manière de filmé et d.doc
[28/01/2010 - 21:49:36 | AH | 4096] Y:\._Archive ok.docx
[28/01/2010 - 21:50:10 | AH | 4096] Y:\._Archive ok.doc
[14/05/2010 - 11:49:28 | D ] Y:\ASSASSIN
[05/04/2010 - 22:57:40 | AH | 4096] Y:\._synopsis.doc
[05/04/2010 - 20:23:24 | AH | 4134] Y:\._synopsis.docx
[05/04/2010 - 20:24:44 | HD ] Y:\.TemporaryItems
[25/06/2010 - 16:49:28 | D ] Y:\CPE
[05/04/2010 - 20:24:44 | AH | 4096] Y:\._.TemporaryItems
[06/04/2010 - 00:52:42 | AH | 4096] Y:\._Note d'intention.doc
[06/04/2010 - 00:54:24 | D ] Y:\Histoire de l'Islam Médiévale
[06/04/2010 - 00:54:30 | D ] Y:\Histoire Médievale
[08/06/2010 - 10:15:40 | D ] Y:\sortie fotainebleau 03.06.10 CFA 1ère
[06/08/2010 - 17:51:02 | D ] Y:\Ete 2010
################## | Vaccin |
C:\Autorun.inf -> Dossier créé par UsbFix (El Desaparecido & C_XX)
D:\Autorun.inf -> Dossier créé par UsbFix (El Desaparecido & C_XX)
Y:\Autorun.inf -> Dossier créé par UsbFix (El Desaparecido & C_XX)
################## | Upload |
Veuillez envoyer le fichier: C:\UsbFix_Upload_Me_NOM-EB85C523610.zip
https://www.ionos.fr/?affiliate_id=77097
Merci de votre contribution.
################## | E.O.F |
moment de grace
Messages postés
29042
Date d'inscription
samedi 6 décembre 2008
Statut
Contributeur sécurité
Dernière intervention
18 juillet 2013
2 274
8 sept. 2010 à 14:03
8 sept. 2010 à 14:03
ok
=> MBAM
=> MBAM
je laisse tourner MalwareByte's anti-Malware. Et je te transmet le rapport demain.
Merci bcp pour ton aide,
isaure
Merci bcp pour ton aide,
isaure
moment de grace
Messages postés
29042
Date d'inscription
samedi 6 décembre 2008
Statut
Contributeur sécurité
Dernière intervention
18 juillet 2013
2 274
8 sept. 2010 à 14:42
8 sept. 2010 à 14:42
(sourire)
@ demain donc...
@ demain donc...
Bonjour!
Voici le rapport:
Malwarebytes' Anti-Malware 1.46
www.malwarebytes.org
Version de la base de données: 4569
Windows 5.1.2600 Service Pack 3
Internet Explorer 8.0.6001.18702
09/09/2010 08:22:43
mbam-log-2010-09-09 (08-22-43).txt
Type d'examen: Examen complet (C:\|D:\|E:\|F:\|H:\|I:\|J:\|Y:\|)
Elément(s) analysé(s): 285972
Temps écoulé: 58 minute(s), 56 seconde(s)
Processus mémoire infecté(s): 0
Module(s) mémoire infecté(s): 0
Clé(s) du Registre infectée(s): 3
Valeur(s) du Registre infectée(s): 2
Elément(s) de données du Registre infecté(s): 0
Dossier(s) infecté(s): 0
Fichier(s) infecté(s): 151
Processus mémoire infecté(s):
(Aucun élément nuisible détecté)
Module(s) mémoire infecté(s):
(Aucun élément nuisible détecté)
Clé(s) du Registre infectée(s):
HKEY_CLASSES_ROOT\CLSID\{c5f43bef-ce2f-46d8-afe6-a647bacd1f09} (Spyware.OnlineGames) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{c5f43bef-ce2f-afe6-46d8-a647bacd1f09} (Spyware.OnlineGames) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\NOD32KVBIT (Trojan.Frethog) -> Quarantined and deleted successfully.
Valeur(s) du Registre infectée(s):
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\ShellExecuteHooks\{c5f43bef-ce2f-46d8-afe6-a647bacd1f09} (Spyware.OnlineGames) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\api32 (Spyware.OnlineGames) -> Quarantined and deleted successfully.
Elément(s) de données du Registre infecté(s):
(Aucun élément nuisible détecté)
Dossier(s) infecté(s):
(Aucun élément nuisible détecté)
Fichier(s) infecté(s):
C:\System Volume Information\_restore{F75EEC69-6E97-419B-93B4-6A3A275301C4}\RP923\A0092911.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{F75EEC69-6E97-419B-93B4-6A3A275301C4}\RP942\A0094700.exe (Spyware.AgenceExclusive) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{F75EEC69-6E97-419B-93B4-6A3A275301C4}\RP942\A0094835.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{F75EEC69-6E97-419B-93B4-6A3A275301C4}\RP942\A0094853.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{F75EEC69-6E97-419B-93B4-6A3A275301C4}\RP942\A0094871.bat (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{F75EEC69-6E97-419B-93B4-6A3A275301C4}\RP942\A0094826.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{F75EEC69-6E97-419B-93B4-6A3A275301C4}\RP942\A0094829.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{F75EEC69-6E97-419B-93B4-6A3A275301C4}\RP942\A0094830.com (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{F75EEC69-6E97-419B-93B4-6A3A275301C4}\RP942\A0094832.com (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{F75EEC69-6E97-419B-93B4-6A3A275301C4}\RP942\A0094834.com (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{F75EEC69-6E97-419B-93B4-6A3A275301C4}\RP942\A0094837.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{F75EEC69-6E97-419B-93B4-6A3A275301C4}\RP942\A0094840.com (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{F75EEC69-6E97-419B-93B4-6A3A275301C4}\RP942\A0094845.bat (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{F75EEC69-6E97-419B-93B4-6A3A275301C4}\RP942\A0094846.exe (Worm.Magania) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{F75EEC69-6E97-419B-93B4-6A3A275301C4}\RP942\A0094847.com (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{F75EEC69-6E97-419B-93B4-6A3A275301C4}\RP942\A0094848.com (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{F75EEC69-6E97-419B-93B4-6A3A275301C4}\RP942\A0094851.bat (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{F75EEC69-6E97-419B-93B4-6A3A275301C4}\RP942\A0094854.com (Trojan.Onlinegames) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{F75EEC69-6E97-419B-93B4-6A3A275301C4}\RP942\A0094855.com (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{F75EEC69-6E97-419B-93B4-6A3A275301C4}\RP942\A0094860.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{F75EEC69-6E97-419B-93B4-6A3A275301C4}\RP942\A0094861.exe (Trojan.OnLineGames) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{F75EEC69-6E97-419B-93B4-6A3A275301C4}\RP942\A0094862.bat (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{F75EEC69-6E97-419B-93B4-6A3A275301C4}\RP942\A0094864.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{F75EEC69-6E97-419B-93B4-6A3A275301C4}\RP942\A0094865.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{F75EEC69-6E97-419B-93B4-6A3A275301C4}\RP942\A0094869.exe (Spyware.OnLineGames) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{F75EEC69-6E97-419B-93B4-6A3A275301C4}\RP942\A0094872.com (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{F75EEC69-6E97-419B-93B4-6A3A275301C4}\RP942\A0094893.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{F75EEC69-6E97-419B-93B4-6A3A275301C4}\RP942\A0094896.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{F75EEC69-6E97-419B-93B4-6A3A275301C4}\RP942\A0094897.cmd (Worm.Magania) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{F75EEC69-6E97-419B-93B4-6A3A275301C4}\RP942\A0094898.cmd (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{F75EEC69-6E97-419B-93B4-6A3A275301C4}\RP942\A0094901.cmd (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{F75EEC69-6E97-419B-93B4-6A3A275301C4}\RP942\A0094902.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{F75EEC69-6E97-419B-93B4-6A3A275301C4}\RP942\A0094903.cmd (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{F75EEC69-6E97-419B-93B4-6A3A275301C4}\RP942\A0094904.cmd (Worm.Magania) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{F75EEC69-6E97-419B-93B4-6A3A275301C4}\RP942\A0094905.cmd (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{F75EEC69-6E97-419B-93B4-6A3A275301C4}\RP942\A0094907.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{F75EEC69-6E97-419B-93B4-6A3A275301C4}\RP942\A0094909.cmd (Trojan.Agent.Gen) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{F75EEC69-6E97-419B-93B4-6A3A275301C4}\RP942\A0095029.exe (Rogue.Eorezo) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{F75EEC69-6E97-419B-93B4-6A3A275301C4}\RP942\A0095030.exe (Rogue.Eorezo) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{F75EEC69-6E97-419B-93B4-6A3A275301C4}\RP942\A0095032.exe (Rogue.Eorezo) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{F75EEC69-6E97-419B-93B4-6A3A275301C4}\RP942\A0095033.dll (Rogue.Eorezo) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{F75EEC69-6E97-419B-93B4-6A3A275301C4}\RP901\A0092313.exe (Spyware.AgenceExclusive) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{F75EEC69-6E97-419B-93B4-6A3A275301C4}\RP910\A0092579.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{F75EEC69-6E97-419B-93B4-6A3A275301C4}\RP910\A0092593.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{F75EEC69-6E97-419B-93B4-6A3A275301C4}\RP913\A0092632.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\UsbFix\Quarantine\C\cgaqyi.exe.vir (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\UsbFix\Quarantine\C\e2.cmd.vir (Worm.Magania) -> Quarantined and deleted successfully.
C:\UsbFix\Quarantine\C\em8tqm.cmd.vir (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\UsbFix\Quarantine\C\i8ikdjwt.exe.vir (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\UsbFix\Quarantine\C\mk28sp.exe.vir (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\UsbFix\Quarantine\C\nu.cmd.vir (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\UsbFix\Quarantine\C\q9.cmd.vir (Worm.Magania) -> Quarantined and deleted successfully.
C:\UsbFix\Quarantine\C\uvsqfgwd.cmd.vir (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\UsbFix\Quarantine\C\x3xh.exe.vir (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\UsbFix\Quarantine\C\DOCUME~1\Annick\LOCALS~1\Temp\dsoqq.exe.vir (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\UsbFix\Quarantine\C\DOCUME~1\Annick\LOCALS~1\Temp\dsoqq2.dll.vir (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\UsbFix\Quarantine\C\DOCUME~1\Annick\LOCALS~1\Temp\nodqq0.dll.vir (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\UsbFix\Quarantine\C\WINDOWS\Temp\cvasds1.dll.vir (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\UsbFix\Quarantine\C\WINDOWS\Temp\cvasds2.dll.vir (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\UsbFix\Quarantine\C\WINDOWS\Temp\cvasds3.dll.vir (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\UsbFix\Quarantine\C\WINDOWS\Temp\cvasds4.dll.vir (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\UsbFix\Quarantine\C\WINDOWS\Temp\cvasds5.dll.vir (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\UsbFix\Quarantine\C\WINDOWS\Temp\cvasds6.dll.vir (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\UsbFix\Quarantine\C\WINDOWS\Temp\cvasds7.dll.vir (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\UsbFix\Quarantine\C\WINDOWS\Temp\cvasds8.dll.vir (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\UsbFix\Quarantine\C\WINDOWS\Temp\cvasds9.dll.vir (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\UsbFix\Quarantine\D\1gkbvsni.exe.vir (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\UsbFix\Quarantine\D\2.bat.vir (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\UsbFix\Quarantine\D\2bbi1ax.exe.vir (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\UsbFix\Quarantine\D\2nuk.com.vir (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\UsbFix\Quarantine\D\2ul.exe.vir (Worm.Magania) -> Quarantined and deleted successfully.
C:\UsbFix\Quarantine\D\6j2j.com.vir (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\UsbFix\Quarantine\D\6phx.com.vir (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\UsbFix\Quarantine\D\8gig0ofk.com.vir (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\UsbFix\Quarantine\D\8paf1d.com.vir (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\UsbFix\Quarantine\D\9fo3ar0j.exe.vir (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\UsbFix\Quarantine\D\9rfpp.exe.vir (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\UsbFix\Quarantine\D\ba.exe.vir (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\UsbFix\Quarantine\D\boyedt.com.vir (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\UsbFix\Quarantine\D\cgaqyi.exe.vir (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\UsbFix\Quarantine\D\chxnxyx.exe.vir (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\UsbFix\Quarantine\D\cobn8w3.exe.vir (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\UsbFix\Quarantine\D\dqm.exe.vir (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\UsbFix\Quarantine\D\e2.cmd.vir (Worm.Magania) -> Quarantined and deleted successfully.
C:\UsbFix\Quarantine\D\em8tqm.cmd.vir (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\UsbFix\Quarantine\D\eyruu.exe.vir (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\UsbFix\Quarantine\D\g6jk.exe.vir (Worm.Magania) -> Quarantined and deleted successfully.
C:\UsbFix\Quarantine\D\gyn.cmd.vir (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\UsbFix\Quarantine\D\hifdmgt.com.vir (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\UsbFix\Quarantine\D\i.com.vir (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\UsbFix\Quarantine\D\i8ikdjwt.exe.vir (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\UsbFix\Quarantine\D\icxpa.cmd.vir (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\UsbFix\Quarantine\D\j.cmd.vir (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\UsbFix\Quarantine\D\jm3cx96.bat.vir (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\UsbFix\Quarantine\D\kmj.exe.vir (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\UsbFix\Quarantine\D\krwyrv0d.exe.vir (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\UsbFix\Quarantine\D\luk1ylq.com.vir (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\UsbFix\Quarantine\D\mi9al8rs.exe.vir (Worm.Taterf) -> Quarantined and deleted successfully.
C:\UsbFix\Quarantine\D\mk28sp.exe.vir (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\UsbFix\Quarantine\D\ml.com.vir (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\UsbFix\Quarantine\D\o3n9k.com.vir (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\UsbFix\Quarantine\D\p3vwxx.exe.vir (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\UsbFix\Quarantine\D\q9.cmd.vir (Worm.Magania) -> Quarantined and deleted successfully.
C:\UsbFix\Quarantine\D\qhbfqx.exe.vir (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\UsbFix\Quarantine\D\ukvr.bat.vir (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\UsbFix\Quarantine\D\rfg.exe.vir (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\UsbFix\Quarantine\D\rhwhin.exe.vir (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\UsbFix\Quarantine\D\rpw.exe.vir (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\UsbFix\Quarantine\D\rxf.exe.vir (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\UsbFix\Quarantine\D\sdfqh.exe.vir (Spyware.OnLineGames) -> Quarantined and deleted successfully.
C:\UsbFix\Quarantine\D\upw.bat.vir (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\UsbFix\Quarantine\D\uvsqfgwd.cmd.vir (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\UsbFix\Quarantine\D\w.com.vir (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\UsbFix\Quarantine\D\x3xh.exe.vir (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\UsbFix\Quarantine\D\xcisvxl.com.vir (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\UsbFix\Quarantine\D\xcr.exe.vir (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\UsbFix\Quarantine\D\xsia.bat.vir (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\UsbFix\Quarantine\D\yh.cmd.vir (Trojan.Agent.Gen) -> Quarantined and deleted successfully.
C:\UsbFix\Quarantine\Y\9fo3ar0j.exe.vir (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\Program Files\Ad-Remover\Quarantine\C\Documents and Settings\Annick\Application Data\EoRezo\SoftwareUpdate\SoftwareUpdate.exe.vir (Rogue.Eorezo) -> Quarantined and deleted successfully.
C:\Program Files\Ad-Remover\Quarantine\C\Documents and Settings\Annick\Application Data\EoRezo\SoftwareUpdate\SoftwareUpdateHP.exe.vir (Rogue.Eorezo) -> Quarantined and deleted successfully.
C:\Program Files\Ad-Remover\Quarantine\C\Program Files\EoRezo\eorezo.exe.vir (Rogue.Eorezo) -> Quarantined and deleted successfully.
C:\Program Files\Ad-Remover\Quarantine\C\Program Files\EoRezo\EoRezoBHO.dll.vir (Rogue.Eorezo) -> Quarantined and deleted successfully.
C:\Documents and Settings\Denis\Local Settings\Temp\nodqq0.dll (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\Documents and Settings\Denis\Local Settings\Temp\nodqq1.dll (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Propriétaire\Local Settings\Temp\nodqq.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Propriétaire\Local Settings\Temp\nodqq0.dll (Spyware.OnlineGames) -> Quarantined and deleted successfully.
D:\System Volume Information\_restore{F75EEC69-6E97-419B-93B4-6A3A275301C4}\RP942\A0094912.cmd (Spyware.OnlineGames) -> Quarantined and deleted successfully.
D:\System Volume Information\_restore{F75EEC69-6E97-419B-93B4-6A3A275301C4}\RP942\A0094933.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.
D:\System Volume Information\_restore{F75EEC69-6E97-419B-93B4-6A3A275301C4}\RP942\A0094937.cmd (Worm.Magania) -> Quarantined and deleted successfully.
D:\System Volume Information\_restore{F75EEC69-6E97-419B-93B4-6A3A275301C4}\RP942\A0094938.cmd (Spyware.OnlineGames) -> Quarantined and deleted successfully.
D:\System Volume Information\_restore{F75EEC69-6E97-419B-93B4-6A3A275301C4}\RP942\A0094945.cmd (Spyware.OnlineGames) -> Quarantined and deleted successfully.
D:\System Volume Information\_restore{F75EEC69-6E97-419B-93B4-6A3A275301C4}\RP942\A0094947.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.
D:\System Volume Information\_restore{F75EEC69-6E97-419B-93B4-6A3A275301C4}\RP942\A0094948.cmd (Spyware.OnlineGames) -> Quarantined and deleted successfully.
D:\System Volume Information\_restore{F75EEC69-6E97-419B-93B4-6A3A275301C4}\RP942\A0094956.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.
D:\System Volume Information\_restore{F75EEC69-6E97-419B-93B4-6A3A275301C4}\RP942\A0094959.cmd (Spyware.OnlineGames) -> Quarantined and deleted successfully.
D:\System Volume Information\_restore{F75EEC69-6E97-419B-93B4-6A3A275301C4}\RP942\A0094964.cmd (Worm.Magania) -> Quarantined and deleted successfully.
D:\System Volume Information\_restore{F75EEC69-6E97-419B-93B4-6A3A275301C4}\RP942\A0094976.cmd (Spyware.OnlineGames) -> Quarantined and deleted successfully.
D:\System Volume Information\_restore{F75EEC69-6E97-419B-93B4-6A3A275301C4}\RP942\A0094979.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.
D:\System Volume Information\_restore{F75EEC69-6E97-419B-93B4-6A3A275301C4}\RP942\A0094985.cmd (Trojan.Agent.Gen) -> Quarantined and deleted successfully.
D:\System Volume Information\_restore{F75EEC69-6E97-419B-93B4-6A3A275301C4}\RP923\A0092913.EXE (Spyware.OnlineGames) -> Quarantined and deleted successfully.
D:\System Volume Information\_restore{F75EEC69-6E97-419B-93B4-6A3A275301C4}\RP910\A0092581.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.
D:\System Volume Information\_restore{F75EEC69-6E97-419B-93B4-6A3A275301C4}\RP910\A0092595.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.
D:\System Volume Information\_restore{F75EEC69-6E97-419B-93B4-6A3A275301C4}\RP913\A0092634.EXE (Spyware.OnlineGames) -> Quarantined and deleted successfully.
D:\System Volume Information\_restore{F75EEC69-6E97-419B-93B4-6A3A275301C4}\RP935\A0093416.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\Documents and Settings\renaud\Local Settings\Temp\apiqq0.dll (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\Documents and Settings\renaud\Local Settings\Temp\apiqq.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\Documents and Settings\Denis\Local Settings\Temp\dsoqq0.dll (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\Documents and Settings\Denis\Local Settings\Temp\dsoqq1.dll (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\Documents and Settings\renaud\Local Settings\Temp\dsoqq0.dll (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\Documents and Settings\renaud\Local Settings\Temp\dsoqq1.dll (Spyware.OnlineGames) -> Quarantined and deleted successfully.
Voici le rapport:
Malwarebytes' Anti-Malware 1.46
www.malwarebytes.org
Version de la base de données: 4569
Windows 5.1.2600 Service Pack 3
Internet Explorer 8.0.6001.18702
09/09/2010 08:22:43
mbam-log-2010-09-09 (08-22-43).txt
Type d'examen: Examen complet (C:\|D:\|E:\|F:\|H:\|I:\|J:\|Y:\|)
Elément(s) analysé(s): 285972
Temps écoulé: 58 minute(s), 56 seconde(s)
Processus mémoire infecté(s): 0
Module(s) mémoire infecté(s): 0
Clé(s) du Registre infectée(s): 3
Valeur(s) du Registre infectée(s): 2
Elément(s) de données du Registre infecté(s): 0
Dossier(s) infecté(s): 0
Fichier(s) infecté(s): 151
Processus mémoire infecté(s):
(Aucun élément nuisible détecté)
Module(s) mémoire infecté(s):
(Aucun élément nuisible détecté)
Clé(s) du Registre infectée(s):
HKEY_CLASSES_ROOT\CLSID\{c5f43bef-ce2f-46d8-afe6-a647bacd1f09} (Spyware.OnlineGames) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{c5f43bef-ce2f-afe6-46d8-a647bacd1f09} (Spyware.OnlineGames) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\NOD32KVBIT (Trojan.Frethog) -> Quarantined and deleted successfully.
Valeur(s) du Registre infectée(s):
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\ShellExecuteHooks\{c5f43bef-ce2f-46d8-afe6-a647bacd1f09} (Spyware.OnlineGames) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\api32 (Spyware.OnlineGames) -> Quarantined and deleted successfully.
Elément(s) de données du Registre infecté(s):
(Aucun élément nuisible détecté)
Dossier(s) infecté(s):
(Aucun élément nuisible détecté)
Fichier(s) infecté(s):
C:\System Volume Information\_restore{F75EEC69-6E97-419B-93B4-6A3A275301C4}\RP923\A0092911.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{F75EEC69-6E97-419B-93B4-6A3A275301C4}\RP942\A0094700.exe (Spyware.AgenceExclusive) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{F75EEC69-6E97-419B-93B4-6A3A275301C4}\RP942\A0094835.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{F75EEC69-6E97-419B-93B4-6A3A275301C4}\RP942\A0094853.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{F75EEC69-6E97-419B-93B4-6A3A275301C4}\RP942\A0094871.bat (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{F75EEC69-6E97-419B-93B4-6A3A275301C4}\RP942\A0094826.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{F75EEC69-6E97-419B-93B4-6A3A275301C4}\RP942\A0094829.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{F75EEC69-6E97-419B-93B4-6A3A275301C4}\RP942\A0094830.com (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{F75EEC69-6E97-419B-93B4-6A3A275301C4}\RP942\A0094832.com (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{F75EEC69-6E97-419B-93B4-6A3A275301C4}\RP942\A0094834.com (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{F75EEC69-6E97-419B-93B4-6A3A275301C4}\RP942\A0094837.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{F75EEC69-6E97-419B-93B4-6A3A275301C4}\RP942\A0094840.com (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{F75EEC69-6E97-419B-93B4-6A3A275301C4}\RP942\A0094845.bat (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{F75EEC69-6E97-419B-93B4-6A3A275301C4}\RP942\A0094846.exe (Worm.Magania) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{F75EEC69-6E97-419B-93B4-6A3A275301C4}\RP942\A0094847.com (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{F75EEC69-6E97-419B-93B4-6A3A275301C4}\RP942\A0094848.com (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{F75EEC69-6E97-419B-93B4-6A3A275301C4}\RP942\A0094851.bat (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{F75EEC69-6E97-419B-93B4-6A3A275301C4}\RP942\A0094854.com (Trojan.Onlinegames) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{F75EEC69-6E97-419B-93B4-6A3A275301C4}\RP942\A0094855.com (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{F75EEC69-6E97-419B-93B4-6A3A275301C4}\RP942\A0094860.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{F75EEC69-6E97-419B-93B4-6A3A275301C4}\RP942\A0094861.exe (Trojan.OnLineGames) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{F75EEC69-6E97-419B-93B4-6A3A275301C4}\RP942\A0094862.bat (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{F75EEC69-6E97-419B-93B4-6A3A275301C4}\RP942\A0094864.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{F75EEC69-6E97-419B-93B4-6A3A275301C4}\RP942\A0094865.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{F75EEC69-6E97-419B-93B4-6A3A275301C4}\RP942\A0094869.exe (Spyware.OnLineGames) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{F75EEC69-6E97-419B-93B4-6A3A275301C4}\RP942\A0094872.com (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{F75EEC69-6E97-419B-93B4-6A3A275301C4}\RP942\A0094893.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{F75EEC69-6E97-419B-93B4-6A3A275301C4}\RP942\A0094896.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{F75EEC69-6E97-419B-93B4-6A3A275301C4}\RP942\A0094897.cmd (Worm.Magania) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{F75EEC69-6E97-419B-93B4-6A3A275301C4}\RP942\A0094898.cmd (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{F75EEC69-6E97-419B-93B4-6A3A275301C4}\RP942\A0094901.cmd (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{F75EEC69-6E97-419B-93B4-6A3A275301C4}\RP942\A0094902.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{F75EEC69-6E97-419B-93B4-6A3A275301C4}\RP942\A0094903.cmd (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{F75EEC69-6E97-419B-93B4-6A3A275301C4}\RP942\A0094904.cmd (Worm.Magania) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{F75EEC69-6E97-419B-93B4-6A3A275301C4}\RP942\A0094905.cmd (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{F75EEC69-6E97-419B-93B4-6A3A275301C4}\RP942\A0094907.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{F75EEC69-6E97-419B-93B4-6A3A275301C4}\RP942\A0094909.cmd (Trojan.Agent.Gen) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{F75EEC69-6E97-419B-93B4-6A3A275301C4}\RP942\A0095029.exe (Rogue.Eorezo) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{F75EEC69-6E97-419B-93B4-6A3A275301C4}\RP942\A0095030.exe (Rogue.Eorezo) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{F75EEC69-6E97-419B-93B4-6A3A275301C4}\RP942\A0095032.exe (Rogue.Eorezo) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{F75EEC69-6E97-419B-93B4-6A3A275301C4}\RP942\A0095033.dll (Rogue.Eorezo) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{F75EEC69-6E97-419B-93B4-6A3A275301C4}\RP901\A0092313.exe (Spyware.AgenceExclusive) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{F75EEC69-6E97-419B-93B4-6A3A275301C4}\RP910\A0092579.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{F75EEC69-6E97-419B-93B4-6A3A275301C4}\RP910\A0092593.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{F75EEC69-6E97-419B-93B4-6A3A275301C4}\RP913\A0092632.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\UsbFix\Quarantine\C\cgaqyi.exe.vir (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\UsbFix\Quarantine\C\e2.cmd.vir (Worm.Magania) -> Quarantined and deleted successfully.
C:\UsbFix\Quarantine\C\em8tqm.cmd.vir (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\UsbFix\Quarantine\C\i8ikdjwt.exe.vir (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\UsbFix\Quarantine\C\mk28sp.exe.vir (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\UsbFix\Quarantine\C\nu.cmd.vir (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\UsbFix\Quarantine\C\q9.cmd.vir (Worm.Magania) -> Quarantined and deleted successfully.
C:\UsbFix\Quarantine\C\uvsqfgwd.cmd.vir (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\UsbFix\Quarantine\C\x3xh.exe.vir (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\UsbFix\Quarantine\C\DOCUME~1\Annick\LOCALS~1\Temp\dsoqq.exe.vir (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\UsbFix\Quarantine\C\DOCUME~1\Annick\LOCALS~1\Temp\dsoqq2.dll.vir (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\UsbFix\Quarantine\C\DOCUME~1\Annick\LOCALS~1\Temp\nodqq0.dll.vir (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\UsbFix\Quarantine\C\WINDOWS\Temp\cvasds1.dll.vir (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\UsbFix\Quarantine\C\WINDOWS\Temp\cvasds2.dll.vir (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\UsbFix\Quarantine\C\WINDOWS\Temp\cvasds3.dll.vir (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\UsbFix\Quarantine\C\WINDOWS\Temp\cvasds4.dll.vir (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\UsbFix\Quarantine\C\WINDOWS\Temp\cvasds5.dll.vir (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\UsbFix\Quarantine\C\WINDOWS\Temp\cvasds6.dll.vir (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\UsbFix\Quarantine\C\WINDOWS\Temp\cvasds7.dll.vir (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\UsbFix\Quarantine\C\WINDOWS\Temp\cvasds8.dll.vir (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\UsbFix\Quarantine\C\WINDOWS\Temp\cvasds9.dll.vir (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\UsbFix\Quarantine\D\1gkbvsni.exe.vir (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\UsbFix\Quarantine\D\2.bat.vir (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\UsbFix\Quarantine\D\2bbi1ax.exe.vir (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\UsbFix\Quarantine\D\2nuk.com.vir (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\UsbFix\Quarantine\D\2ul.exe.vir (Worm.Magania) -> Quarantined and deleted successfully.
C:\UsbFix\Quarantine\D\6j2j.com.vir (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\UsbFix\Quarantine\D\6phx.com.vir (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\UsbFix\Quarantine\D\8gig0ofk.com.vir (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\UsbFix\Quarantine\D\8paf1d.com.vir (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\UsbFix\Quarantine\D\9fo3ar0j.exe.vir (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\UsbFix\Quarantine\D\9rfpp.exe.vir (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\UsbFix\Quarantine\D\ba.exe.vir (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\UsbFix\Quarantine\D\boyedt.com.vir (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\UsbFix\Quarantine\D\cgaqyi.exe.vir (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\UsbFix\Quarantine\D\chxnxyx.exe.vir (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\UsbFix\Quarantine\D\cobn8w3.exe.vir (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\UsbFix\Quarantine\D\dqm.exe.vir (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\UsbFix\Quarantine\D\e2.cmd.vir (Worm.Magania) -> Quarantined and deleted successfully.
C:\UsbFix\Quarantine\D\em8tqm.cmd.vir (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\UsbFix\Quarantine\D\eyruu.exe.vir (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\UsbFix\Quarantine\D\g6jk.exe.vir (Worm.Magania) -> Quarantined and deleted successfully.
C:\UsbFix\Quarantine\D\gyn.cmd.vir (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\UsbFix\Quarantine\D\hifdmgt.com.vir (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\UsbFix\Quarantine\D\i.com.vir (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\UsbFix\Quarantine\D\i8ikdjwt.exe.vir (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\UsbFix\Quarantine\D\icxpa.cmd.vir (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\UsbFix\Quarantine\D\j.cmd.vir (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\UsbFix\Quarantine\D\jm3cx96.bat.vir (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\UsbFix\Quarantine\D\kmj.exe.vir (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\UsbFix\Quarantine\D\krwyrv0d.exe.vir (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\UsbFix\Quarantine\D\luk1ylq.com.vir (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\UsbFix\Quarantine\D\mi9al8rs.exe.vir (Worm.Taterf) -> Quarantined and deleted successfully.
C:\UsbFix\Quarantine\D\mk28sp.exe.vir (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\UsbFix\Quarantine\D\ml.com.vir (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\UsbFix\Quarantine\D\o3n9k.com.vir (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\UsbFix\Quarantine\D\p3vwxx.exe.vir (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\UsbFix\Quarantine\D\q9.cmd.vir (Worm.Magania) -> Quarantined and deleted successfully.
C:\UsbFix\Quarantine\D\qhbfqx.exe.vir (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\UsbFix\Quarantine\D\ukvr.bat.vir (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\UsbFix\Quarantine\D\rfg.exe.vir (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\UsbFix\Quarantine\D\rhwhin.exe.vir (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\UsbFix\Quarantine\D\rpw.exe.vir (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\UsbFix\Quarantine\D\rxf.exe.vir (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\UsbFix\Quarantine\D\sdfqh.exe.vir (Spyware.OnLineGames) -> Quarantined and deleted successfully.
C:\UsbFix\Quarantine\D\upw.bat.vir (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\UsbFix\Quarantine\D\uvsqfgwd.cmd.vir (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\UsbFix\Quarantine\D\w.com.vir (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\UsbFix\Quarantine\D\x3xh.exe.vir (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\UsbFix\Quarantine\D\xcisvxl.com.vir (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\UsbFix\Quarantine\D\xcr.exe.vir (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\UsbFix\Quarantine\D\xsia.bat.vir (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\UsbFix\Quarantine\D\yh.cmd.vir (Trojan.Agent.Gen) -> Quarantined and deleted successfully.
C:\UsbFix\Quarantine\Y\9fo3ar0j.exe.vir (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\Program Files\Ad-Remover\Quarantine\C\Documents and Settings\Annick\Application Data\EoRezo\SoftwareUpdate\SoftwareUpdate.exe.vir (Rogue.Eorezo) -> Quarantined and deleted successfully.
C:\Program Files\Ad-Remover\Quarantine\C\Documents and Settings\Annick\Application Data\EoRezo\SoftwareUpdate\SoftwareUpdateHP.exe.vir (Rogue.Eorezo) -> Quarantined and deleted successfully.
C:\Program Files\Ad-Remover\Quarantine\C\Program Files\EoRezo\eorezo.exe.vir (Rogue.Eorezo) -> Quarantined and deleted successfully.
C:\Program Files\Ad-Remover\Quarantine\C\Program Files\EoRezo\EoRezoBHO.dll.vir (Rogue.Eorezo) -> Quarantined and deleted successfully.
C:\Documents and Settings\Denis\Local Settings\Temp\nodqq0.dll (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\Documents and Settings\Denis\Local Settings\Temp\nodqq1.dll (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Propriétaire\Local Settings\Temp\nodqq.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Propriétaire\Local Settings\Temp\nodqq0.dll (Spyware.OnlineGames) -> Quarantined and deleted successfully.
D:\System Volume Information\_restore{F75EEC69-6E97-419B-93B4-6A3A275301C4}\RP942\A0094912.cmd (Spyware.OnlineGames) -> Quarantined and deleted successfully.
D:\System Volume Information\_restore{F75EEC69-6E97-419B-93B4-6A3A275301C4}\RP942\A0094933.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.
D:\System Volume Information\_restore{F75EEC69-6E97-419B-93B4-6A3A275301C4}\RP942\A0094937.cmd (Worm.Magania) -> Quarantined and deleted successfully.
D:\System Volume Information\_restore{F75EEC69-6E97-419B-93B4-6A3A275301C4}\RP942\A0094938.cmd (Spyware.OnlineGames) -> Quarantined and deleted successfully.
D:\System Volume Information\_restore{F75EEC69-6E97-419B-93B4-6A3A275301C4}\RP942\A0094945.cmd (Spyware.OnlineGames) -> Quarantined and deleted successfully.
D:\System Volume Information\_restore{F75EEC69-6E97-419B-93B4-6A3A275301C4}\RP942\A0094947.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.
D:\System Volume Information\_restore{F75EEC69-6E97-419B-93B4-6A3A275301C4}\RP942\A0094948.cmd (Spyware.OnlineGames) -> Quarantined and deleted successfully.
D:\System Volume Information\_restore{F75EEC69-6E97-419B-93B4-6A3A275301C4}\RP942\A0094956.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.
D:\System Volume Information\_restore{F75EEC69-6E97-419B-93B4-6A3A275301C4}\RP942\A0094959.cmd (Spyware.OnlineGames) -> Quarantined and deleted successfully.
D:\System Volume Information\_restore{F75EEC69-6E97-419B-93B4-6A3A275301C4}\RP942\A0094964.cmd (Worm.Magania) -> Quarantined and deleted successfully.
D:\System Volume Information\_restore{F75EEC69-6E97-419B-93B4-6A3A275301C4}\RP942\A0094976.cmd (Spyware.OnlineGames) -> Quarantined and deleted successfully.
D:\System Volume Information\_restore{F75EEC69-6E97-419B-93B4-6A3A275301C4}\RP942\A0094979.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.
D:\System Volume Information\_restore{F75EEC69-6E97-419B-93B4-6A3A275301C4}\RP942\A0094985.cmd (Trojan.Agent.Gen) -> Quarantined and deleted successfully.
D:\System Volume Information\_restore{F75EEC69-6E97-419B-93B4-6A3A275301C4}\RP923\A0092913.EXE (Spyware.OnlineGames) -> Quarantined and deleted successfully.
D:\System Volume Information\_restore{F75EEC69-6E97-419B-93B4-6A3A275301C4}\RP910\A0092581.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.
D:\System Volume Information\_restore{F75EEC69-6E97-419B-93B4-6A3A275301C4}\RP910\A0092595.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.
D:\System Volume Information\_restore{F75EEC69-6E97-419B-93B4-6A3A275301C4}\RP913\A0092634.EXE (Spyware.OnlineGames) -> Quarantined and deleted successfully.
D:\System Volume Information\_restore{F75EEC69-6E97-419B-93B4-6A3A275301C4}\RP935\A0093416.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\Documents and Settings\renaud\Local Settings\Temp\apiqq0.dll (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\Documents and Settings\renaud\Local Settings\Temp\apiqq.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\Documents and Settings\Denis\Local Settings\Temp\dsoqq0.dll (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\Documents and Settings\Denis\Local Settings\Temp\dsoqq1.dll (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\Documents and Settings\renaud\Local Settings\Temp\dsoqq0.dll (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\Documents and Settings\renaud\Local Settings\Temp\dsoqq1.dll (Spyware.OnlineGames) -> Quarantined and deleted successfully.
moment de grace
Messages postés
29042
Date d'inscription
samedi 6 décembre 2008
Statut
Contributeur sécurité
Dernière intervention
18 juillet 2013
2 274
9 sept. 2010 à 08:42
9 sept. 2010 à 08:42
ok
vide la quarantaine de MBAM
puis
Fais un nouveau rapport ZHPdiag stp
Rend toi sur Cjoint : http://www.cijoint.fr/
Clique sur "Parcourir " dans la partie " Joindre un fichier[...] "
Sélectionne le rapport ZHPdiag.txt qui se trouve sur ton bureau
Clique ensuite sur "Cliquez ici pour déposer le fichier " et copie/colle le lien dans ton prochain message
si soucis avec ci joint. fr
=> utiliser https://www.cjoint.com/
=> utiliser http://ww38.toofiles.com/fr/oip/documents/txt/av.html
vide la quarantaine de MBAM
puis
Fais un nouveau rapport ZHPdiag stp
Rend toi sur Cjoint : http://www.cijoint.fr/
Clique sur "Parcourir " dans la partie " Joindre un fichier[...] "
Sélectionne le rapport ZHPdiag.txt qui se trouve sur ton bureau
Clique ensuite sur "Cliquez ici pour déposer le fichier " et copie/colle le lien dans ton prochain message
si soucis avec ci joint. fr
=> utiliser https://www.cjoint.com/
=> utiliser http://ww38.toofiles.com/fr/oip/documents/txt/av.html
moment de grace
Messages postés
29042
Date d'inscription
samedi 6 décembre 2008
Statut
Contributeur sécurité
Dernière intervention
18 juillet 2013
2 274
9 sept. 2010 à 10:17
9 sept. 2010 à 10:17
ok
1)
* Copie tout le texte présent en gras ci-dessous ( tu le selectionnes avec ta souris / Clique droit dessus et choisis "copier" ou fait Ctrl+C )
[HKCU\Software\SpiderMessenger]
O64 - Services: CurCS - (.not file.) - KAVsys (KAVsys) .(.Pas de propriétaire - Pas de description.) - LEGACY_KAVSYS
[MD5.4058D6D2E8FC6B115ECA8639C2B70EFB] - (.PC Tools - PC Tools GUI Application.) -- C:\Program Files\PC Tools Security\pctsGui.exe [1588184]
[MD5.9C5387F87E1299EDC7F73303F083C14B] - (.Pas de propriétaire - Pas de description.) -- C:\WINDOWS\TEMP\TOEB4E.EXE [172099]
O4 - HKLM\..\Run: [ISTray] . (.PC Tools - PC Tools GUI Application.) -- C:\Program Files\PC Tools Security\pctsGui.exe
Puis Lance ZHPFix depuis le raccourci du bureau .
* Une fois l'outil ZHPFix ouvert , clique sur le bouton [ H ] ( "coller les lignes Helper" ) .
* Dans l'encadré principal tu verras donc les lignes que tu as copié précédemment apparaitrent .
Vérifie que toutes les lignes que je t'ai demandé de copier (et seulement elles) sont dans la fenêtre.
Clique sur " Ok " , puis " Tous " et enfin " Nettoyer ".
Copie/Colle le rapport à l'écran dans ton prochain message
( ce rapport est sauvegardé dans ce dossier C:\Program files\ZHPDiag\ZHPFixReport.txt )
.............................
2)
Rends toi sur ce site :
https://www.virustotal.com/gui/
Clique sur parcourir et cherche ce fichier :
C:\WINDOWS\UDB.zip
Clique sur Send File.
Un rapport va s'élaborer ligne à ligne.
Attends la fin. Il doit comprendre la taille du fichier envoyé.
Sauvegarde le rapport avec le bloc-note.
Copie le dans ta réponse.
Si tu ne trouves pas le fichier alors
Affiche tous les fichiers et dossiers :
Pour cela :
Clique sur démarrer/panneau de configuration/option des dossiers/affichage
Cocher afficher les dossiers cachés
Décoche la case "Masquer les fichiers protégés du système d'exploitation (recommandé)"
Décocher masquer les extensions dont le type est connu
Puis fais «appliquer» pour valider les changements.
Et OK
.............................
3)
un périphérique nommé G et absent pendant USBfix est infecté
il faudrait refaire USBfix avec lui
1)
* Copie tout le texte présent en gras ci-dessous ( tu le selectionnes avec ta souris / Clique droit dessus et choisis "copier" ou fait Ctrl+C )
[HKCU\Software\SpiderMessenger]
O64 - Services: CurCS - (.not file.) - KAVsys (KAVsys) .(.Pas de propriétaire - Pas de description.) - LEGACY_KAVSYS
[MD5.4058D6D2E8FC6B115ECA8639C2B70EFB] - (.PC Tools - PC Tools GUI Application.) -- C:\Program Files\PC Tools Security\pctsGui.exe [1588184]
[MD5.9C5387F87E1299EDC7F73303F083C14B] - (.Pas de propriétaire - Pas de description.) -- C:\WINDOWS\TEMP\TOEB4E.EXE [172099]
O4 - HKLM\..\Run: [ISTray] . (.PC Tools - PC Tools GUI Application.) -- C:\Program Files\PC Tools Security\pctsGui.exe
Puis Lance ZHPFix depuis le raccourci du bureau .
* Une fois l'outil ZHPFix ouvert , clique sur le bouton [ H ] ( "coller les lignes Helper" ) .
* Dans l'encadré principal tu verras donc les lignes que tu as copié précédemment apparaitrent .
Vérifie que toutes les lignes que je t'ai demandé de copier (et seulement elles) sont dans la fenêtre.
Clique sur " Ok " , puis " Tous " et enfin " Nettoyer ".
Copie/Colle le rapport à l'écran dans ton prochain message
( ce rapport est sauvegardé dans ce dossier C:\Program files\ZHPDiag\ZHPFixReport.txt )
.............................
2)
Rends toi sur ce site :
https://www.virustotal.com/gui/
Clique sur parcourir et cherche ce fichier :
C:\WINDOWS\UDB.zip
Clique sur Send File.
Un rapport va s'élaborer ligne à ligne.
Attends la fin. Il doit comprendre la taille du fichier envoyé.
Sauvegarde le rapport avec le bloc-note.
Copie le dans ta réponse.
Si tu ne trouves pas le fichier alors
Affiche tous les fichiers et dossiers :
Pour cela :
Clique sur démarrer/panneau de configuration/option des dossiers/affichage
Cocher afficher les dossiers cachés
Décoche la case "Masquer les fichiers protégés du système d'exploitation (recommandé)"
Décocher masquer les extensions dont le type est connu
Puis fais «appliquer» pour valider les changements.
Et OK
.............................
3)
un périphérique nommé G et absent pendant USBfix est infecté
il faudrait refaire USBfix avec lui
Rapport de ZHPFix v1.12.3147 par Nicolas Coolman, Update du 07/09/2010
Fichier d'export Registre : C:\ZHPExportRegistry-09-09-2010-10-28-33.txt
Run by Annick at 09/09/2010 10:28:33
Web site : http://www.premiumorange.com/zeb-help-process/zhpfix.html
Contact : nicolascoolman@yahoo.fr
========== Processus mémoire ==========
C:\WINDOWS\TEMP\TOEB4E.EXE [172099] => Supprimé et mis en quarantaine
========== Clé(s) du Registre ==========
HKCU\Software\SpiderMessenger => Clé absente
O64 - Services: CurCS - (.not file.) - KAVsys (KAVsys) .(.Pas de propriétaire - Pas de description.) - LEGACY_KAVSYS => Clé supprimée avec succès
========== Valeur(s) du Registre ==========
O4 - HKLM\..\Run: [ISTray] . (.PC Tools - PC Tools GUI Application.) -- C:\Program Files\PC Tools Security\pctsGui.exe => Valeur supprimée avec succès
========== Récapitulatif ==========
1 : Processus mémoire
2 : Clé(s) du Registre
1 : Valeur(s) du Registre
End of the scan
Fichier d'export Registre : C:\ZHPExportRegistry-09-09-2010-10-28-33.txt
Run by Annick at 09/09/2010 10:28:33
Web site : http://www.premiumorange.com/zeb-help-process/zhpfix.html
Contact : nicolascoolman@yahoo.fr
========== Processus mémoire ==========
C:\WINDOWS\TEMP\TOEB4E.EXE [172099] => Supprimé et mis en quarantaine
========== Clé(s) du Registre ==========
HKCU\Software\SpiderMessenger => Clé absente
O64 - Services: CurCS - (.not file.) - KAVsys (KAVsys) .(.Pas de propriétaire - Pas de description.) - LEGACY_KAVSYS => Clé supprimée avec succès
========== Valeur(s) du Registre ==========
O4 - HKLM\..\Run: [ISTray] . (.PC Tools - PC Tools GUI Application.) -- C:\Program Files\PC Tools Security\pctsGui.exe => Valeur supprimée avec succès
========== Récapitulatif ==========
1 : Processus mémoire
2 : Clé(s) du Registre
1 : Valeur(s) du Registre
End of the scan
rapport virus total:
0 VT Community user(s) with a total of 0 reputation credit(s) say(s) this sample is goodware. 0 VT Community user(s) with a total of 0 reputation credit(s) say(s) this sample is malware.
File name: UDB.zip
Submission date: 2010-09-09 08:32:15 (UTC)
Current status: finished
Result: 0/ 43 (0.0%)
VT Community
not reviewed
Safety score: -
Compact
Print results
Antivirus Version Last Update Result
AhnLab-V3 2010.09.09.00 2010.09.09 -
AntiVir 8.2.4.50 2010.09.09 -
Antiy-AVL 2.0.3.7 2010.09.09 -
Authentium 5.2.0.5 2010.09.08 -
Avast 4.8.1351.0 2010.09.08 -
Avast5 5.0.594.0 2010.09.08 -
AVG 9.0.0.851 2010.09.08 -
BitDefender 7.2 2010.09.09 -
CAT-QuickHeal 11.00 2010.09.09 -
ClamAV 0.96.2.0-git 2010.09.09 -
Comodo 6021 2010.09.09 -
DrWeb 5.0.2.03300 2010.09.09 -
Emsisoft 5.0.0.37 2010.09.09 -
eSafe 7.0.17.0 2010.09.07 -
eTrust-Vet 36.1.7844 2010.09.09 -
F-Prot 4.6.1.107 2010.09.01 -
F-Secure 9.0.15370.0 2010.09.09 -
Fortinet 4.1.143.0 2010.09.08 -
GData 21 2010.09.09 -
Ikarus T3.1.1.88.0 2010.09.09 -
Jiangmin 13.0.900 2010.09.09 -
K7AntiVirus 9.63.2470 2010.09.08 -
Kaspersky 7.0.0.125 2010.09.09 -
McAfee 5.400.0.1158 2010.09.09 -
McAfee-GW-Edition 2010.1B 2010.09.09 -
Microsoft 1.6103 2010.09.09 -
NOD32 5435 2010.09.08 -
Norman 6.06.05 2010.09.08 -
nProtect 2010-09-09.03 2010.09.09 -
Panda 10.0.2.7 2010.09.08 -
PCTools 7.0.3.5 2010.09.09 -
Prevx 3.0 2010.09.09 -
Rising 22.64.03.01 2010.09.09 -
Sophos 4.57.0 2010.09.09 -
Sunbelt 6850 2010.09.09 -
SUPERAntiSpyware 4.40.0.1006 2010.09.09 -
Symantec 20101.1.1.7 2010.09.09 -
TheHacker 6.7.0.0.012 2010.09.09 -
TrendMicro 9.120.0.1004 2010.09.09 -
TrendMicro-HouseCall 9.120.0.1004 2010.09.09 -
VBA32 3.12.14.0 2010.09.08 -
ViRobot 2010.9.8.4031 2010.09.09 -
VirusBuster 12.64.24.0 2010.09.08 -
Additional informationShow all
MD5 : 9b8179250728489cf45fde50505b6431
SHA1 : f8236edfdfe090076f1d684f6fdfccc8697026e7
SHA256: 21a293353817ab2f4ade89f6fa1d3a407144291f7b9f11d5e8da8c64b991304f
ssdeep: 48:9stqB+qhehvAPe+0WNZ3qO/3SA5iKHrPQg8n1NRai9CdxEGX:ytChy4RT6AgKHT8nPRai9eq
GX
File size : 2074 bytes
First seen: 2010-09-09 08:32:15
Last seen : 2010-09-09 08:32:15
TrID:
ZIP compressed archive (100.0%)
sigcheck:
publisher....: n/a
copyright....: n/a
product......: n/a
description..: n/a
original name: n/a
internal name: n/a
file version.: n/a
comments.....: n/a
signers......: -
signing date.: -
verified.....: Unsigned
VT Community
This file has never been reviewed by any VT Community member. Be the first one to comment on it!
VirusTotal Team
0 VT Community user(s) with a total of 0 reputation credit(s) say(s) this sample is goodware. 0 VT Community user(s) with a total of 0 reputation credit(s) say(s) this sample is malware.
File name: UDB.zip
Submission date: 2010-09-09 08:32:15 (UTC)
Current status: finished
Result: 0/ 43 (0.0%)
VT Community
not reviewed
Safety score: -
Compact
Print results
Antivirus Version Last Update Result
AhnLab-V3 2010.09.09.00 2010.09.09 -
AntiVir 8.2.4.50 2010.09.09 -
Antiy-AVL 2.0.3.7 2010.09.09 -
Authentium 5.2.0.5 2010.09.08 -
Avast 4.8.1351.0 2010.09.08 -
Avast5 5.0.594.0 2010.09.08 -
AVG 9.0.0.851 2010.09.08 -
BitDefender 7.2 2010.09.09 -
CAT-QuickHeal 11.00 2010.09.09 -
ClamAV 0.96.2.0-git 2010.09.09 -
Comodo 6021 2010.09.09 -
DrWeb 5.0.2.03300 2010.09.09 -
Emsisoft 5.0.0.37 2010.09.09 -
eSafe 7.0.17.0 2010.09.07 -
eTrust-Vet 36.1.7844 2010.09.09 -
F-Prot 4.6.1.107 2010.09.01 -
F-Secure 9.0.15370.0 2010.09.09 -
Fortinet 4.1.143.0 2010.09.08 -
GData 21 2010.09.09 -
Ikarus T3.1.1.88.0 2010.09.09 -
Jiangmin 13.0.900 2010.09.09 -
K7AntiVirus 9.63.2470 2010.09.08 -
Kaspersky 7.0.0.125 2010.09.09 -
McAfee 5.400.0.1158 2010.09.09 -
McAfee-GW-Edition 2010.1B 2010.09.09 -
Microsoft 1.6103 2010.09.09 -
NOD32 5435 2010.09.08 -
Norman 6.06.05 2010.09.08 -
nProtect 2010-09-09.03 2010.09.09 -
Panda 10.0.2.7 2010.09.08 -
PCTools 7.0.3.5 2010.09.09 -
Prevx 3.0 2010.09.09 -
Rising 22.64.03.01 2010.09.09 -
Sophos 4.57.0 2010.09.09 -
Sunbelt 6850 2010.09.09 -
SUPERAntiSpyware 4.40.0.1006 2010.09.09 -
Symantec 20101.1.1.7 2010.09.09 -
TheHacker 6.7.0.0.012 2010.09.09 -
TrendMicro 9.120.0.1004 2010.09.09 -
TrendMicro-HouseCall 9.120.0.1004 2010.09.09 -
VBA32 3.12.14.0 2010.09.08 -
ViRobot 2010.9.8.4031 2010.09.09 -
VirusBuster 12.64.24.0 2010.09.08 -
Additional informationShow all
MD5 : 9b8179250728489cf45fde50505b6431
SHA1 : f8236edfdfe090076f1d684f6fdfccc8697026e7
SHA256: 21a293353817ab2f4ade89f6fa1d3a407144291f7b9f11d5e8da8c64b991304f
ssdeep: 48:9stqB+qhehvAPe+0WNZ3qO/3SA5iKHrPQg8n1NRai9CdxEGX:ytChy4RT6AgKHT8nPRai9eq
GX
File size : 2074 bytes
First seen: 2010-09-09 08:32:15
Last seen : 2010-09-09 08:32:15
TrID:
ZIP compressed archive (100.0%)
sigcheck:
publisher....: n/a
copyright....: n/a
product......: n/a
description..: n/a
original name: n/a
internal name: n/a
file version.: n/a
comments.....: n/a
signers......: -
signing date.: -
verified.....: Unsigned
VT Community
This file has never been reviewed by any VT Community member. Be the first one to comment on it!
VirusTotal Team
moment de grace
Messages postés
29042
Date d'inscription
samedi 6 décembre 2008
Statut
Contributeur sécurité
Dernière intervention
18 juillet 2013
2 274
9 sept. 2010 à 10:37
9 sept. 2010 à 10:37
ok
reste ce G, ca te parle ?
reste ce G, ca te parle ?
Rapport de ZHPFix v1.12.3147 par Nicolas Coolman, Update du 07/09/2010
Fichier d'export Registre : C:\ZHPExportRegistry-09-09-2010-10-28-33.txt
Run by Annick at 09/09/2010 10:28:33
Web site : http://www.premiumorange.com/zeb-help-process/zhpfix.html
Contact : nicolascoolman@yahoo.fr
========== Processus mémoire ==========
C:\WINDOWS\TEMP\TOEB4E.EXE [172099] => Supprimé et mis en quarantaine
========== Clé(s) du Registre ==========
HKCU\Software\SpiderMessenger => Clé absente
O64 - Services: CurCS - (.not file.) - KAVsys (KAVsys) .(.Pas de propriétaire - Pas de description.) - LEGACY_KAVSYS => Clé supprimée avec succès
========== Valeur(s) du Registre ==========
O4 - HKLM\..\Run: [ISTray] . (.PC Tools - PC Tools GUI Application.) -- C:\Program Files\PC Tools Security\pctsGui.exe => Valeur supprimée avec succès
========== Récapitulatif ==========
1 : Processus mémoire
2 : Clé(s) du Registre
1 : Valeur(s) du Registre
End of the scan
Fichier d'export Registre : C:\ZHPExportRegistry-09-09-2010-10-28-33.txt
Run by Annick at 09/09/2010 10:28:33
Web site : http://www.premiumorange.com/zeb-help-process/zhpfix.html
Contact : nicolascoolman@yahoo.fr
========== Processus mémoire ==========
C:\WINDOWS\TEMP\TOEB4E.EXE [172099] => Supprimé et mis en quarantaine
========== Clé(s) du Registre ==========
HKCU\Software\SpiderMessenger => Clé absente
O64 - Services: CurCS - (.not file.) - KAVsys (KAVsys) .(.Pas de propriétaire - Pas de description.) - LEGACY_KAVSYS => Clé supprimée avec succès
========== Valeur(s) du Registre ==========
O4 - HKLM\..\Run: [ISTray] . (.PC Tools - PC Tools GUI Application.) -- C:\Program Files\PC Tools Security\pctsGui.exe => Valeur supprimée avec succès
========== Récapitulatif ==========
1 : Processus mémoire
2 : Clé(s) du Registre
1 : Valeur(s) du Registre
End of the scan