Peut être un virus.
Résolu/Fermé
cristof77
Messages postés
135
Date d'inscription
samedi 7 juillet 2007
Statut
Membre
Dernière intervention
20 juillet 2020
-
31 déc. 2014 à 16:17
Utilisateur anonyme - 4 janv. 2015 à 08:46
Utilisateur anonyme - 4 janv. 2015 à 08:46
A voir également:
- Peut être un virus.
- Youtu.be virus - Accueil - Guide virus
- Svchost.exe virus - Guide
- Faux message virus ordinateur - Accueil - Arnaque
- Softonic virus ✓ - Forum Virus
- Virus mcafee - Accueil - Piratage
15 réponses
Utilisateur anonyme
31 déc. 2014 à 17:13
31 déc. 2014 à 17:13
bonjour,
/!\ à lire :
de plus en plus de programmes proposent l'installation des barres d'outils (Toolbars, case précochée), donc n'oublie pas d'utiliser le mode d'installation personnalisé et décocher la/les cases correspondantes pendant l'installation.
De plus de ceci, évite fortement les sites comme 01net (en voie de guérison !), CNET, Clubic, BrotherSoft ou Softonic, les logiciels gratuits et libres sont repackés avec leurs barres d'outils ou ajouter des extensions à ton navigateur !
Pour les tuto diffusés par Tuto4pc, Eorezo, Agence exclusif .. etc (quelque soit son nom puisqu'on le change sans arrêt !
Il faut bien lire le contrat de licence d'utilisation avant l'installation !!!
https://forum.security-x.fr/securite-generale/tuto4pc-et-accord-de-licence/
pour t'entrainer et ne plus ta faire avoir, regarde cette page :
https://forum.security-x.fr/tutoriels-317/s
Télécharge et enregistre Zhpcleaner sur ton bureau :
https://nicolascoolman.eu
[*] Fais un clique droit dessus, lance le en tant qu'administrateur !
[*] Accepte le contrat de licence d'utilisation finale (CLUF),
[*] Clique sur "réparation"
[*] Clique sur rapport (normalement le rapport s'affiche)
[*] Enregistre le rapport sur ton bureau
[*] Héberge son rapport de modification qui se trouve sur le Bureau :
https://www.cjoint.com/ à lire => https://www.commentcamarche.net/faq/29493-utiliser-cjoint-pour-heberger-des-fichiers
, puis copie/colle le lien fourni dans ta prochaine réponse sur le forum </gras>
Note :
- Cet outil ne nécessite pas d'installation !
- Le rapport se trouve également dans ce répertoire "%AppData%".
/!\ à lire :
de plus en plus de programmes proposent l'installation des barres d'outils (Toolbars, case précochée), donc n'oublie pas d'utiliser le mode d'installation personnalisé et décocher la/les cases correspondantes pendant l'installation.
De plus de ceci, évite fortement les sites comme 01net (en voie de guérison !), CNET, Clubic, BrotherSoft ou Softonic, les logiciels gratuits et libres sont repackés avec leurs barres d'outils ou ajouter des extensions à ton navigateur !
Pour les tuto diffusés par Tuto4pc, Eorezo, Agence exclusif .. etc (quelque soit son nom puisqu'on le change sans arrêt !
Il faut bien lire le contrat de licence d'utilisation avant l'installation !!!
https://forum.security-x.fr/securite-generale/tuto4pc-et-accord-de-licence/
pour t'entrainer et ne plus ta faire avoir, regarde cette page :
https://forum.security-x.fr/tutoriels-317/s
Télécharge et enregistre Zhpcleaner sur ton bureau :
https://nicolascoolman.eu
[*] Fais un clique droit dessus, lance le en tant qu'administrateur !
[*] Accepte le contrat de licence d'utilisation finale (CLUF),
[*] Clique sur "réparation"
[*] Clique sur rapport (normalement le rapport s'affiche)
[*] Enregistre le rapport sur ton bureau
[*] Héberge son rapport de modification qui se trouve sur le Bureau :
https://www.cjoint.com/ à lire => https://www.commentcamarche.net/faq/29493-utiliser-cjoint-pour-heberger-des-fichiers
, puis copie/colle le lien fourni dans ta prochaine réponse sur le forum </gras>
Note :
- Cet outil ne nécessite pas d'installation !
- Le rapport se trouve également dans ce répertoire "%AppData%".
cristof77
Messages postés
135
Date d'inscription
samedi 7 juillet 2007
Statut
Membre
Dernière intervention
20 juillet 2020
4
1 janv. 2015 à 17:42
1 janv. 2015 à 17:42
Merci pour ton aide électricien 69 !
Le rapport zhp:
~ ZHPCleaner v2014.12.31.281 by Nicolas Coolman (31/12/2014)
~ Run by christophe (Administrator) (01/01/2015 17:37:35)
~ Forum : https://nicolascoolman.eu
~ Facebook : https://www.facebook.com/nicolascoolman1
~ State version : Version OK
~ Type : Réparer
~ Report : C:\Users\christophe\Desktop\ZHPCleaner.txt
~ Quarantine : C:\Users\christophe\AppData\Roaming\ZHP\ZHPCleaner_Quarantine.txt
~ UAC : Activate
~ Windows 7, 64-bit Service Pack 1 (Build 7601)
---\\ Service. (0)
~ Aucun élément malicieux trouvé.
---\\ Navigateur internet. (1)
SUPPRIMÉ Chrome: gebbadcnkcgcfgpbmcdleckpejgopimf [cacaoweb] (PUP.CacaoWeb)
---\\ Fichier hôte. (1)
~ Le fichier hôte est légitime. (21)
---\\ Tâche planifiée. (0)
~ Aucun élément malicieux trouvé.
---\\ Explorateur ( Dossiers, Fichiers ). (11)
DEPLACÉ dossier: C:\Users\christophe\AppData\Roaming\cacaoweb (PUP.CacaoWeb)
DEPLACÉ dossier: C:\Users\christophe\AppData\Roaming\cacaoweb\cacaoweb.exe [ - ] (PUP.CacaoWeb)
DEPLACÉ dossier: C:\Users\christophe\AppData\Roaming\cacaoweb\npdfile.dat [ - ] (PUP.CacaoWeb)
DEPLACÉ dossier: C:\Users\christophe\AppData\Roaming\cacaoweb\replicating0E0EEF947B68843A76B797172A74B663.cacao [ - ] (PUP.CacaoWeb)
DEPLACÉ dossier: C:\Users\christophe\AppData\Roaming\cacaoweb\replicating261A94BB220A32842C99F9388D19235A.cacao [ - ] (PUP.CacaoWeb)
DEPLACÉ dossier: C:\Users\christophe\AppData\Roaming\cacaoweb\replicating3F28239B1BAED764A93A60F7285833DB.cacao [ - ] (PUP.CacaoWeb)
DEPLACÉ dossier: C:\Users\christophe\AppData\Roaming\cacaoweb\replicatingAAFDE2813EE0CD48FA8F6C0581F8D669.cacao [ - ] (PUP.CacaoWeb)
DEPLACÉ dossier: C:\Users\christophe\AppData\Roaming\cacaoweb\replicatingB500C62BDD8896B1DA548B72B0969D82.cacao [ - ] (PUP.CacaoWeb)
DEPLACÉ dossier: C:\Users\christophe\AppData\Roaming\cacaoweb\replicatingB7FD9CFE2ECF29A875B163A77B51AF12.cacao [ - ] (PUP.CacaoWeb)
DEPLACÉ dossier: C:\Users\christophe\AppData\Roaming\cacaoweb\replicatingEE68D6DB9C7874FF656B6671CFB56AF6.cacao [ - ] (PUP.CacaoWeb)
DEPLACÉ dossier: C:\Users\christophe\AppData\Roaming\cacaoweb\storage.db [ - ] (PUP.CacaoWeb)
---\\ Base de Registres ( Clés, Valeurs, Données ). (2)
SUPPRIMÉ valeur: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\\cacaoweb ["C:\Users\christophe\AppData\Roaming\cacaoweb\cacaoweb.exe" -noplayer] (PUP.cacaoweb)
SUPPRIMÉ clé: HKCU\Software\cacaoweb [] (PUP.CacaoWeb)
---\\ Bilan de la réparation
~ Réparation réalisée avec succès.
~ Ce navigateur est absent (Mozilla Firefox)
~ Ce navigateur est absent (Opera Software)
---\\ Statistiques
~ Items scannés : 49248
~ Items trouvés : 0
~ Items réparés : 14
End of clean at 17:39:18
===================
ZHPCleaner-[R]-01012015-17_39_18.txt
Le rapport zhp:
~ ZHPCleaner v2014.12.31.281 by Nicolas Coolman (31/12/2014)
~ Run by christophe (Administrator) (01/01/2015 17:37:35)
~ Forum : https://nicolascoolman.eu
~ Facebook : https://www.facebook.com/nicolascoolman1
~ State version : Version OK
~ Type : Réparer
~ Report : C:\Users\christophe\Desktop\ZHPCleaner.txt
~ Quarantine : C:\Users\christophe\AppData\Roaming\ZHP\ZHPCleaner_Quarantine.txt
~ UAC : Activate
~ Windows 7, 64-bit Service Pack 1 (Build 7601)
---\\ Service. (0)
~ Aucun élément malicieux trouvé.
---\\ Navigateur internet. (1)
SUPPRIMÉ Chrome: gebbadcnkcgcfgpbmcdleckpejgopimf [cacaoweb] (PUP.CacaoWeb)
---\\ Fichier hôte. (1)
~ Le fichier hôte est légitime. (21)
---\\ Tâche planifiée. (0)
~ Aucun élément malicieux trouvé.
---\\ Explorateur ( Dossiers, Fichiers ). (11)
DEPLACÉ dossier: C:\Users\christophe\AppData\Roaming\cacaoweb (PUP.CacaoWeb)
DEPLACÉ dossier: C:\Users\christophe\AppData\Roaming\cacaoweb\cacaoweb.exe [ - ] (PUP.CacaoWeb)
DEPLACÉ dossier: C:\Users\christophe\AppData\Roaming\cacaoweb\npdfile.dat [ - ] (PUP.CacaoWeb)
DEPLACÉ dossier: C:\Users\christophe\AppData\Roaming\cacaoweb\replicating0E0EEF947B68843A76B797172A74B663.cacao [ - ] (PUP.CacaoWeb)
DEPLACÉ dossier: C:\Users\christophe\AppData\Roaming\cacaoweb\replicating261A94BB220A32842C99F9388D19235A.cacao [ - ] (PUP.CacaoWeb)
DEPLACÉ dossier: C:\Users\christophe\AppData\Roaming\cacaoweb\replicating3F28239B1BAED764A93A60F7285833DB.cacao [ - ] (PUP.CacaoWeb)
DEPLACÉ dossier: C:\Users\christophe\AppData\Roaming\cacaoweb\replicatingAAFDE2813EE0CD48FA8F6C0581F8D669.cacao [ - ] (PUP.CacaoWeb)
DEPLACÉ dossier: C:\Users\christophe\AppData\Roaming\cacaoweb\replicatingB500C62BDD8896B1DA548B72B0969D82.cacao [ - ] (PUP.CacaoWeb)
DEPLACÉ dossier: C:\Users\christophe\AppData\Roaming\cacaoweb\replicatingB7FD9CFE2ECF29A875B163A77B51AF12.cacao [ - ] (PUP.CacaoWeb)
DEPLACÉ dossier: C:\Users\christophe\AppData\Roaming\cacaoweb\replicatingEE68D6DB9C7874FF656B6671CFB56AF6.cacao [ - ] (PUP.CacaoWeb)
DEPLACÉ dossier: C:\Users\christophe\AppData\Roaming\cacaoweb\storage.db [ - ] (PUP.CacaoWeb)
---\\ Base de Registres ( Clés, Valeurs, Données ). (2)
SUPPRIMÉ valeur: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\\cacaoweb ["C:\Users\christophe\AppData\Roaming\cacaoweb\cacaoweb.exe" -noplayer] (PUP.cacaoweb)
SUPPRIMÉ clé: HKCU\Software\cacaoweb [] (PUP.CacaoWeb)
---\\ Bilan de la réparation
~ Réparation réalisée avec succès.
~ Ce navigateur est absent (Mozilla Firefox)
~ Ce navigateur est absent (Opera Software)
---\\ Statistiques
~ Items scannés : 49248
~ Items trouvés : 0
~ Items réparés : 14
End of clean at 17:39:18
===================
ZHPCleaner-[R]-01012015-17_39_18.txt
Utilisateur anonyme
1 janv. 2015 à 17:56
1 janv. 2015 à 17:56
ok,
* Télécharge et enregistre ZHPDiag sur ton bureau :
https://nicolascoolman.eu
ou :
https://www.commentcamarche.net/telecharger/utilitaires/24803-zhpdiag/
* Laisse toi guider lors de l'installation, il se lancera automatiquement à la fin.
/!\Utilisateur de Vista, Seven et W8 :
* Clique droit sur le logo de ZHPdiag, « exécuter en tant qu'Administrateur »
=> L'icône est sous forme de parchemin.
* Clique sur « complet »
* Laisse travailler l'outil, même s'il semble bloqué !
* Enregistre le rapport sur ton Bureau à l'aide de l'icône représentant une disquette
* Héberge le rapport ZHPDiag.txt sur :
https://www.cjoint.com/ à lire => https://www.commentcamarche.net/faq/29493-utiliser-cjoint-pour-heberger-des-fichiers
, puis copie/colle le lien fourni dans ta prochaine réponse sur le forum
tuto zhpdiag :
https://nicolascoolman.eu
* Télécharge et enregistre ZHPDiag sur ton bureau :
https://nicolascoolman.eu
ou :
https://www.commentcamarche.net/telecharger/utilitaires/24803-zhpdiag/
* Laisse toi guider lors de l'installation, il se lancera automatiquement à la fin.
/!\Utilisateur de Vista, Seven et W8 :
* Clique droit sur le logo de ZHPdiag, « exécuter en tant qu'Administrateur »
=> L'icône est sous forme de parchemin.
* Clique sur « complet »
* Laisse travailler l'outil, même s'il semble bloqué !
* Enregistre le rapport sur ton Bureau à l'aide de l'icône représentant une disquette
* Héberge le rapport ZHPDiag.txt sur :
https://www.cjoint.com/ à lire => https://www.commentcamarche.net/faq/29493-utiliser-cjoint-pour-heberger-des-fichiers
, puis copie/colle le lien fourni dans ta prochaine réponse sur le forum
tuto zhpdiag :
https://nicolascoolman.eu
cristof77
Messages postés
135
Date d'inscription
samedi 7 juillet 2007
Statut
Membre
Dernière intervention
20 juillet 2020
4
1 janv. 2015 à 19:38
1 janv. 2015 à 19:38
Ok, voilà le rapport zhp diag:
https://www.cjoint.com/?0AbtKw1Bhah
https://www.cjoint.com/?0AbtKw1Bhah
Vous n’avez pas trouvé la réponse que vous recherchez ?
Posez votre question
Utilisateur anonyme
1 janv. 2015 à 19:50
1 janv. 2015 à 19:50
vire µtorrent du démarrage de pc, il se lance même quand tu ne le vois pas !
le ralentissement du pc est du au lancement des logiciels comme (à part µtorrent) :
- SkyDrive
- Spotify
- DAEMON Tools Lite
tes 4 go de ram passent dedans !
il ne te reste plus que 29 % / 4 go de libre !
* /!\ Avertissement /!\,
* ce script est seulement valable pour ce pc, en cours du nettoyage, à ne pas utiliser sur un autre pc, risque de plantage !
* Lance ZHPFix via le raccourci sur ton Bureau, l'icône est sous forme de seringue.
/!\Utilisateur de Vista, Seven et W8 :
* Clique droit sur le logo de ZHPfix, « exécuter en tant qu'Administrateur »
Clique sur « importer »
Tu vas voir apparaitre un message d'avertissement, clique sur Ok.
* * Copie ( Ctrl + C ) et colle ( Ctrl + V ) les lignes suivantes en gras dans la fenêtre de Zhpfix :
---------------------------------------------------------
Script Zhpfix
[MD5.00000000000000000000000000000000] [APT] [{C4492319-015A-4CB3-B9F1-EBC15F267DB2}] (...) -- C:\Users\christophe\Desktop\DAMN_NFO_Viewer_v2-10-0032-RC3.exe (.not file.) [0]
O43 - CFD: 12/10/2014 - 15:04:03 - [] ----D C:\ProgramData\boost_interprocess
O61 - LFC: 31/12/2014 - 19:22:27 ---A- . (...) -- C:\Users\christophe\AppData\Local\Temp\dropbox_sqlite_ext.{5f3e3153-5bce-5766-8f84-3e3e7ecf0d81}.tmpyx0ekp.dll [43008]
EmptyPrefetch
ShortcutFix
Emptytemp
EmptyClsid
----------------------------------------------------------
- Clique sur le bouton « GO » pour lancer le nettoyage,
- confirme le nettoyage
- Héberge le rapport ZHPFIX.txt sur
https://www.cjoint.com/
puis copie/colle le lien fourni dans ta prochaine réponse sur le forum.
le ralentissement du pc est du au lancement des logiciels comme (à part µtorrent) :
- SkyDrive
- Spotify
- DAEMON Tools Lite
tes 4 go de ram passent dedans !
il ne te reste plus que 29 % / 4 go de libre !
* /!\ Avertissement /!\,
* ce script est seulement valable pour ce pc, en cours du nettoyage, à ne pas utiliser sur un autre pc, risque de plantage !
* Lance ZHPFix via le raccourci sur ton Bureau, l'icône est sous forme de seringue.
/!\Utilisateur de Vista, Seven et W8 :
* Clique droit sur le logo de ZHPfix, « exécuter en tant qu'Administrateur »
Clique sur « importer »
Tu vas voir apparaitre un message d'avertissement, clique sur Ok.
* * Copie ( Ctrl + C ) et colle ( Ctrl + V ) les lignes suivantes en gras dans la fenêtre de Zhpfix :
---------------------------------------------------------
Script Zhpfix
[MD5.00000000000000000000000000000000] [APT] [{C4492319-015A-4CB3-B9F1-EBC15F267DB2}] (...) -- C:\Users\christophe\Desktop\DAMN_NFO_Viewer_v2-10-0032-RC3.exe (.not file.) [0]
O43 - CFD: 12/10/2014 - 15:04:03 - [] ----D C:\ProgramData\boost_interprocess
O61 - LFC: 31/12/2014 - 19:22:27 ---A- . (...) -- C:\Users\christophe\AppData\Local\Temp\dropbox_sqlite_ext.{5f3e3153-5bce-5766-8f84-3e3e7ecf0d81}.tmpyx0ekp.dll [43008]
EmptyPrefetch
ShortcutFix
Emptytemp
EmptyClsid
----------------------------------------------------------
- Clique sur le bouton « GO » pour lancer le nettoyage,
- confirme le nettoyage
- Héberge le rapport ZHPFIX.txt sur
https://www.cjoint.com/
puis copie/colle le lien fourni dans ta prochaine réponse sur le forum.
cristof77
Messages postés
135
Date d'inscription
samedi 7 juillet 2007
Statut
Membre
Dernière intervention
20 juillet 2020
4
1 janv. 2015 à 20:11
1 janv. 2015 à 20:11
Ok merci.
j'ai désinstallé onedrive que je n'utilise pas. Dommage pour spotify et utorrent, j'aime qu'ils soit lancés en arrière plan, va falloir que je me trouve un peu de ram supplémentaire alors!
Le rapport:
Rapport de ZHPFix 2014.10.24.12 par Nicolas Coolman, Update du 24/10/2014
Fichier d'export Registre :
Run by christophe at 01/01/2015 20:04:00
High Elevated Privileges : OK
Windows 7 Home Premium Edition, 64-bit Service Pack 1 (Build 7601)
Corbeille vidée (00mn 02s)
Dossier Prefetcher vidé
Réparation des raccourcis navigateur
========== Dossiers ==========
Aucun dossiers CLSID Local utilisateur vide
========== Fichiers ==========
SUPPRIMÉS Temporaires Windows (31) (3 553 201 octets)
========== Tache planifiée ==========
SUPPRIMÉ: {C4492319-015A-4CB3-B9F1-EBC15F267DB2}
========== Récapitulatif ==========
1 : Dossiers
1 : Fichiers
1 : Tache planifiée
End of clean in 00mn 04s
========== Chemin de fichier rapport ==========
C:\Users\christophe\AppData\Roaming\ZHP\ZHPFix[R1].txt - 01/01/2015 20:04:02 [769]
j'ai désinstallé onedrive que je n'utilise pas. Dommage pour spotify et utorrent, j'aime qu'ils soit lancés en arrière plan, va falloir que je me trouve un peu de ram supplémentaire alors!
Le rapport:
Rapport de ZHPFix 2014.10.24.12 par Nicolas Coolman, Update du 24/10/2014
Fichier d'export Registre :
Run by christophe at 01/01/2015 20:04:00
High Elevated Privileges : OK
Windows 7 Home Premium Edition, 64-bit Service Pack 1 (Build 7601)
Corbeille vidée (00mn 02s)
Dossier Prefetcher vidé
Réparation des raccourcis navigateur
========== Dossiers ==========
Aucun dossiers CLSID Local utilisateur vide
========== Fichiers ==========
SUPPRIMÉS Temporaires Windows (31) (3 553 201 octets)
========== Tache planifiée ==========
SUPPRIMÉ: {C4492319-015A-4CB3-B9F1-EBC15F267DB2}
========== Récapitulatif ==========
1 : Dossiers
1 : Fichiers
1 : Tache planifiée
End of clean in 00mn 04s
========== Chemin de fichier rapport ==========
C:\Users\christophe\AppData\Roaming\ZHP\ZHPFix[R1].txt - 01/01/2015 20:04:02 [769]
Utilisateur anonyme
1 janv. 2015 à 20:25
1 janv. 2015 à 20:25
au cas ou, vérifie la propreté du pc pour qu'il ne chauffe pas !!
tu peux enlever ces logiciels tout simplement du démarrage depuis leurs panneaux d'options ou Msconfig !
redémarre le pc pour voir s'il fonctionne normalement !
tu peux enlever ces logiciels tout simplement du démarrage depuis leurs panneaux d'options ou Msconfig !
redémarre le pc pour voir s'il fonctionne normalement !
cristof77
Messages postés
135
Date d'inscription
samedi 7 juillet 2007
Statut
Membre
Dernière intervention
20 juillet 2020
4
1 janv. 2015 à 22:45
1 janv. 2015 à 22:45
Ok j'ai enlevé quelques programmes au démarrage, et j'avais laissé un disque virtuel monté pour rien que j'ai enlevé aussi.
J'ai passé un petit coup d'aspi dans le ventre de la bête.
Toujours quelques ralentissements sur de la vidéo youtube hd, j'ai aussi pas mal d'onglets ouverts dans chrome.. Le processeur tourne fort.
Sinon ça va bien mieux!
J'ai passé un petit coup d'aspi dans le ventre de la bête.
Toujours quelques ralentissements sur de la vidéo youtube hd, j'ai aussi pas mal d'onglets ouverts dans chrome.. Le processeur tourne fort.
Sinon ça va bien mieux!
Utilisateur anonyme
1 janv. 2015 à 23:56
1 janv. 2015 à 23:56
n'oublie pas de nettoyer le ventirad de la carte graphique aussi !
pour monter la vitesse de ton navigateur, désactive les modules complémentaires !
tu verras qu'il sera plus fluide :-)
redémarre ensuite le pc
on continue là dessus demain :-)
@ +
pour monter la vitesse de ton navigateur, désactive les modules complémentaires !
tu verras qu'il sera plus fluide :-)
redémarre ensuite le pc
on continue là dessus demain :-)
@ +
cristof77
Messages postés
135
Date d'inscription
samedi 7 juillet 2007
Statut
Membre
Dernière intervention
20 juillet 2020
4
3 janv. 2015 à 16:04
3 janv. 2015 à 16:04
Raa mais ils me manquent trop quand je les enlève les modules complémentaires!!!!
ça tourne pas trop mal comme ça j'ai l'impression pour l'instant.
Encore merci :)
ça tourne pas trop mal comme ça j'ai l'impression pour l'instant.
Encore merci :)
Utilisateur anonyme
3 janv. 2015 à 18:14
3 janv. 2015 à 18:14
tu peux voir qu'il est plus rapide sans :-)
Télécharge Delfix sur ton bureau :
https://toolslib.net/downloads/viewdownload/2-delfix/
ou
Coche les cases suivantes :
* Clique ensuite sur Exécuter puis patiente pendant le processus de suppression.
* Lorsque les procédures seront terminées, l'outil va se fermer et disparaître du bureau
* Un rapport est sauvegardé dans le presse-papier : il te suffit de faire un clic droit et "coller" dans ta prochaine réponse pour me poster le rapport
** le rapport est stocké à cet emplacement : C:\DelFix.txt
Attention : Le rapport est unique et est supprimé à chaque fois que l'on ré-exécute une ou plusieurs options de DelFix.
Note :
Delfix ne désinstalle pas MBAM, à toi de voir si tu souhaites le conserver ou désinstaller.
* fais une mise à jour de ton antivirus, lance un scan complet de ton pc, tiens moi au courant du résultat :-)
Télécharge Delfix sur ton bureau :
https://toolslib.net/downloads/viewdownload/2-delfix/
ou
Coche les cases suivantes :
=> Réactive l'Uac (juste pour Vista, Seven et W8)
=> Supprimer les outils de désinfection (coché par défaut)
=> Purger la restauration système
* Clique ensuite sur Exécuter puis patiente pendant le processus de suppression.
* Lorsque les procédures seront terminées, l'outil va se fermer et disparaître du bureau
* Un rapport est sauvegardé dans le presse-papier : il te suffit de faire un clic droit et "coller" dans ta prochaine réponse pour me poster le rapport
** le rapport est stocké à cet emplacement : C:\DelFix.txt
Attention : Le rapport est unique et est supprimé à chaque fois que l'on ré-exécute une ou plusieurs options de DelFix.
Note :
Delfix ne désinstalle pas MBAM, à toi de voir si tu souhaites le conserver ou désinstaller.
* fais une mise à jour de ton antivirus, lance un scan complet de ton pc, tiens moi au courant du résultat :-)
cristof77
Messages postés
135
Date d'inscription
samedi 7 juillet 2007
Statut
Membre
Dernière intervention
20 juillet 2020
4
3 janv. 2015 à 21:57
3 janv. 2015 à 21:57
le log delfix:
# DelFix v10.8 - Rapport créé le 03/01/2015 à 19:09:32
# Mis à jour le 29/07/2014 par Xplode
# Nom d'utilisateur : christophe - CHRISTOPHE-PC
# Système d'exploitation : Windows 7 Home Premium Service Pack 1 (64 bits)
~ Activation de l'UAC ... OK
~ Suppression des outils de désinfection ...
Supprimé : C:\Users\christophe\AppData\Roaming\ZHP
Supprimé : C:\ProgramData\Microsoft\Windows\Start Menu\Programs\ZHP
Supprimé : C:\Program Files (x86)\ZHPDiag
Supprimé : C:\PhysicalDisk0_MBR.bin
Supprimé : C:\Users\christophe\Desktop\ZHPCleaner.exe
Supprimé : C:\Users\christophe\Desktop\ZHPCleaner.txt
Supprimé : C:\Users\christophe\Desktop\ZHPDiag.lnk
Supprimé : C:\Users\christophe\Desktop\ZHPDiag.txt
Supprimé : C:\Users\christophe\Desktop\ZHPFix.lnk
Supprimé : C:\Users\christophe\Desktop\ZHPFixReport.txt
Supprimée : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\ZHPDiag_is1
~ Purge de la restauration système ...
Supprimé : RP #118 [Windows Update | 12/30/2014 23:19:24]
Nouveau point de restauration créé !
########## - EOF - ##########
OMG je viens de me rendre compte que j'avais désinstallé mon antivirus.
ça m'était complètement sorti de la tête, j'aurais commencé par là sinon désolé :/
J'ai réinstallé avira et fais un scan:
Avira Free Antivirus
Report file date: samedi 3 janvier 2015 19:29
The program is running as an unrestricted full version.
Online services are available.
Licensee : Avira Antivirus Free
Serial number : 0000149996-AVHOE-0000001
Platform : Windows 7 Home Premium
Windows version : (Service Pack 1) [6.1.7601]
Boot mode : Normally booted
Username : Système
Computer name : CHRISTOPHE-PC
Version information:
BUILD.DAT : 14.0.7.468 91859 Bytes 24/11/2014 10:23:00
AVSCAN.EXE : 14.0.7.462 1015544 Bytes 24/11/2014 09:23:24
AVSCANRC.DLL : 14.0.7.308 54576 Bytes 24/11/2014 09:23:24
LUKE.DLL : 14.0.7.462 60664 Bytes 24/11/2014 09:23:29
AVSCPLR.DLL : 14.0.7.440 93488 Bytes 24/11/2014 09:23:24
REPAIR.DLL : 14.0.7.412 366328 Bytes 24/11/2014 09:23:24
REPAIR.RDF : 1.0.2.30 596694 Bytes 24/11/2014 09:23:33
AVREG.DLL : 14.0.7.310 264952 Bytes 24/11/2014 09:23:23
AVLODE.DLL : 14.0.7.440 561456 Bytes 24/11/2014 09:23:23
AVLODE.RDF : 14.0.4.50 76508 Bytes 24/11/2014 09:23:23
XBV00012.VDF : 8.11.165.190 2048 Bytes 07/08/2014 09:23:33
XBV00013.VDF : 8.11.165.190 2048 Bytes 07/08/2014 09:23:33
XBV00014.VDF : 8.11.165.190 2048 Bytes 07/08/2014 09:23:33
XBV00015.VDF : 8.11.165.190 2048 Bytes 07/08/2014 09:23:33
XBV00016.VDF : 8.11.165.190 2048 Bytes 07/08/2014 09:23:33
XBV00017.VDF : 8.11.165.190 2048 Bytes 07/08/2014 09:23:33
XBV00018.VDF : 8.11.165.190 2048 Bytes 07/08/2014 09:23:34
XBV00019.VDF : 8.11.165.190 2048 Bytes 07/08/2014 09:23:34
XBV00020.VDF : 8.11.165.190 2048 Bytes 07/08/2014 09:23:34
XBV00021.VDF : 8.11.165.190 2048 Bytes 07/08/2014 09:23:34
XBV00022.VDF : 8.11.165.190 2048 Bytes 07/08/2014 09:23:34
XBV00023.VDF : 8.11.165.190 2048 Bytes 07/08/2014 09:23:34
XBV00024.VDF : 8.11.165.190 2048 Bytes 07/08/2014 09:23:34
XBV00025.VDF : 8.11.165.190 2048 Bytes 07/08/2014 09:23:34
XBV00026.VDF : 8.11.165.190 2048 Bytes 07/08/2014 09:23:34
XBV00027.VDF : 8.11.165.190 2048 Bytes 07/08/2014 09:23:34
XBV00028.VDF : 8.11.165.190 2048 Bytes 07/08/2014 09:23:34
XBV00029.VDF : 8.11.165.190 2048 Bytes 07/08/2014 09:23:34
XBV00030.VDF : 8.11.165.190 2048 Bytes 07/08/2014 09:23:34
XBV00031.VDF : 8.11.165.190 2048 Bytes 07/08/2014 09:23:34
XBV00032.VDF : 8.11.165.190 2048 Bytes 07/08/2014 09:23:34
XBV00033.VDF : 8.11.165.190 2048 Bytes 07/08/2014 09:23:34
XBV00034.VDF : 8.11.165.190 2048 Bytes 07/08/2014 09:23:34
XBV00035.VDF : 8.11.165.190 2048 Bytes 07/08/2014 09:23:34
XBV00036.VDF : 8.11.165.190 2048 Bytes 07/08/2014 09:23:34
XBV00037.VDF : 8.11.165.190 2048 Bytes 07/08/2014 09:23:34
XBV00038.VDF : 8.11.165.190 2048 Bytes 07/08/2014 09:23:34
XBV00039.VDF : 8.11.165.190 2048 Bytes 07/08/2014 09:23:34
XBV00040.VDF : 8.11.165.190 2048 Bytes 07/08/2014 09:23:34
XBV00041.VDF : 8.11.165.190 2048 Bytes 07/08/2014 09:23:34
XBV00103.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00104.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00105.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00106.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00107.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00108.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00109.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00110.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00111.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00112.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00113.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00114.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00115.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00116.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00117.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00118.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00119.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00120.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00121.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00122.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00123.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00124.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00125.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00126.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00127.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00128.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00129.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00130.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00131.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00132.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00133.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00134.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00135.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00136.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00137.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00138.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00139.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00140.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00141.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00142.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00143.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00144.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00145.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00146.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00147.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00148.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00149.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00150.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00151.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00152.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00153.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00154.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00155.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00156.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00157.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00158.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00159.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00160.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00161.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00162.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00163.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00164.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00165.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00166.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00167.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00168.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00169.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00170.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00171.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00172.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00173.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00174.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00175.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00176.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00177.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00178.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00179.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00180.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00181.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00182.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00183.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00184.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00185.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00186.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00187.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00188.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00189.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00190.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00191.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00192.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00193.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00194.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00195.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00196.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00197.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00198.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00199.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00200.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00201.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00202.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00203.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00204.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00205.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00206.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00207.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00208.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00209.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00210.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00211.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00212.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00213.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00214.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00215.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00216.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00217.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00218.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00219.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00220.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00221.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00222.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00223.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00224.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00225.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00226.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00227.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00228.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00229.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00230.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00231.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00232.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00233.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00234.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00235.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00236.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00237.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00238.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00239.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00240.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00241.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00242.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00243.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00244.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00245.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00246.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00247.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00248.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00249.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00250.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00251.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00252.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00253.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00254.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00255.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00000.VDF : 7.11.70.0 66736640 Bytes 04/04/2013 09:23:33
XBV00001.VDF : 7.11.74.226 2201600 Bytes 30/04/2013 09:23:33
XBV00002.VDF : 7.11.80.60 2751488 Bytes 28/05/2013 09:23:33
XBV00003.VDF : 7.11.85.214 2162688 Bytes 21/06/2013 09:23:33
XBV00004.VDF : 7.11.91.176 3903488 Bytes 23/07/2013 09:23:33
XBV00005.VDF : 7.11.98.186 6822912 Bytes 29/08/2013 09:23:33
XBV00006.VDF : 7.11.139.38 15708672 Bytes 27/03/2014 09:23:33
XBV00007.VDF : 7.11.152.100 4193792 Bytes 02/06/2014 09:23:33
XBV00008.VDF : 8.11.165.192 4251136 Bytes 07/08/2014 09:23:33
XBV00009.VDF : 8.11.172.30 2094080 Bytes 15/09/2014 09:23:33
XBV00010.VDF : 8.11.178.32 1581056 Bytes 14/10/2014 09:23:33
XBV00011.VDF : 8.11.184.50 2178560 Bytes 11/11/2014 09:23:33
XBV00042.VDF : 8.11.184.74 2048 Bytes 11/11/2014 09:23:34
XBV00043.VDF : 8.11.184.98 37376 Bytes 11/11/2014 09:23:34
XBV00044.VDF : 8.11.184.124 20992 Bytes 11/11/2014 09:23:34
XBV00045.VDF : 8.11.184.126 2048 Bytes 11/11/2014 09:23:34
XBV00046.VDF : 8.11.184.152 17920 Bytes 11/11/2014 09:23:34
XBV00047.VDF : 8.11.184.154 12288 Bytes 11/11/2014 09:23:34
XBV00048.VDF : 8.11.184.156 5632 Bytes 12/11/2014 09:23:34
XBV00049.VDF : 8.11.184.160 6656 Bytes 12/11/2014 09:23:34
XBV00050.VDF : 8.11.184.182 8704 Bytes 12/11/2014 09:23:34
XBV00051.VDF : 8.11.184.202 6144 Bytes 12/11/2014 09:23:34
XBV00052.VDF : 8.11.184.204 10752 Bytes 12/11/2014 09:23:34
XBV00053.VDF : 8.11.184.224 28160 Bytes 12/11/2014 09:23:34
XBV00054.VDF : 8.11.184.246 34304 Bytes 12/11/2014 09:23:34
XBV00055.VDF : 8.11.184.250 15360 Bytes 12/11/2014 09:23:34
XBV00056.VDF : 8.11.184.252 11776 Bytes 12/11/2014 09:23:34
XBV00057.VDF : 8.11.185.18 35840 Bytes 13/11/2014 09:23:34
XBV00058.VDF : 8.11.185.38 35840 Bytes 13/11/2014 09:23:34
XBV00059.VDF : 8.11.185.58 10240 Bytes 13/11/2014 09:23:34
XBV00060.VDF : 8.11.185.60 2048 Bytes 13/11/2014 09:23:34
XBV00061.VDF : 8.11.185.62 7168 Bytes 13/11/2014 09:23:34
XBV00062.VDF : 8.11.185.82 9216 Bytes 13/11/2014 09:23:34
XBV00063.VDF : 8.11.185.102 29696 Bytes 13/11/2014 09:23:34
XBV00064.VDF : 8.11.185.104 2048 Bytes 13/11/2014 09:23:34
XBV00065.VDF : 8.11.185.108 20480 Bytes 13/11/2014 09:23:34
XBV00066.VDF : 8.11.185.110 4608 Bytes 13/11/2014 09:23:34
XBV00067.VDF : 8.11.185.112 26112 Bytes 14/11/2014 09:23:34
XBV00068.VDF : 8.11.185.132 9216 Bytes 14/11/2014 09:23:34
XBV00069.VDF : 8.11.185.150 4608 Bytes 14/11/2014 09:23:34
XBV00070.VDF : 8.11.185.168 15360 Bytes 14/11/2014 09:23:34
XBV00071.VDF : 8.11.185.186 17920 Bytes 14/11/2014 09:23:34
XBV00072.VDF : 8.11.185.204 8192 Bytes 14/11/2014 09:23:34
XBV00073.VDF : 8.11.185.224 203264 Bytes 14/11/2014 09:23:34
XBV00074.VDF : 8.11.185.226 5120 Bytes 14/11/2014 09:23:34
XBV00075.VDF : 8.11.185.228 2048 Bytes 14/11/2014 09:23:34
XBV00076.VDF : 8.11.186.8 34304 Bytes 14/11/2014 09:23:34
XBV00077.VDF : 8.11.186.26 41472 Bytes 15/11/2014 09:23:34
XBV00078.VDF : 8.11.186.44 2048 Bytes 15/11/2014 09:23:34
XBV00079.VDF : 8.11.186.62 18432 Bytes 15/11/2014 09:23:34
XBV00080.VDF : 8.11.186.88 20480 Bytes 15/11/2014 09:23:34
XBV00081.VDF : 8.11.186.106 2048 Bytes 15/11/2014 09:23:34
XBV00082.VDF : 8.11.186.108 69632 Bytes 16/11/2014 09:23:34
XBV00083.VDF : 8.11.186.110 2048 Bytes 16/11/2014 09:23:34
XBV00084.VDF : 8.11.186.112 2048 Bytes 16/11/2014 09:23:34
XBV00085.VDF : 8.11.186.128 5120 Bytes 16/11/2014 09:23:34
XBV00086.VDF : 8.11.186.130 56320 Bytes 16/11/2014 09:23:34
XBV00087.VDF : 8.11.186.146 67584 Bytes 17/11/2014 09:23:34
XBV00088.VDF : 8.11.186.162 108032 Bytes 17/11/2014 09:23:34
XBV00089.VDF : 8.11.186.164 2048 Bytes 17/11/2014 09:23:34
XBV00090.VDF : 8.11.186.180 8704 Bytes 17/11/2014 09:23:34
XBV00091.VDF : 8.11.186.196 16896 Bytes 17/11/2014 09:23:34
XBV00092.VDF : 8.11.186.214 19968 Bytes 17/11/2014 09:23:34
XBV00093.VDF : 8.11.186.218 25088 Bytes 17/11/2014 09:23:34
XBV00094.VDF : 8.11.186.222 41984 Bytes 18/11/2014 09:23:34
XBV00095.VDF : 8.11.186.224 10240 Bytes 18/11/2014 09:23:34
XBV00096.VDF : 8.11.186.226 9728 Bytes 18/11/2014 09:23:34
XBV00097.VDF : 8.11.186.230 2048 Bytes 18/11/2014 09:23:34
XBV00098.VDF : 8.11.186.246 27648 Bytes 18/11/2014 09:23:34
XBV00099.VDF : 8.11.187.4 2048 Bytes 18/11/2014 09:23:34
XBV00100.VDF : 8.11.187.22 22528 Bytes 18/11/2014 09:23:34
XBV00101.VDF : 8.11.187.36 2048 Bytes 18/11/2014 09:23:34
XBV00102.VDF : 8.11.187.50 18432 Bytes 18/11/2014 09:23:34
LOCAL000.VDF : 8.11.187.50 114932224 Bytes 18/11/2014 18:27:55
Engine version : 8.3.26.16
AEVDF.DLL : 8.3.1.6 133992 Bytes 24/11/2014 09:23:20
AESCRIPT.DLL : 8.2.2.22 526248 Bytes 24/11/2014 09:23:20
AESCN.DLL : 8.3.2.2 139456 Bytes 24/11/2014 09:23:20
AESBX.DLL : 8.2.20.24 1409224 Bytes 24/11/2014 09:23:20
AERDL.DLL : 8.2.1.16 743328 Bytes 24/11/2014 09:23:20
AEPACK.DLL : 8.4.0.54 788392 Bytes 24/11/2014 09:23:20
AEOFFICE.DLL : 8.3.1.6 350120 Bytes 24/11/2014 09:23:20
AEHEUR.DLL : 8.1.4.1396 7772072 Bytes 24/11/2014 09:23:20
AEHELP.DLL : 8.3.1.0 278728 Bytes 24/11/2014 09:23:20
AEGEN.DLL : 8.1.7.34 453480 Bytes 24/11/2014 09:23:20
AEEXP.DLL : 8.4.2.44 251808 Bytes 24/11/2014 09:23:20
AEEMU.DLL : 8.1.3.4 399264 Bytes 24/11/2014 09:23:20
AEDROID.DLL : 8.4.2.248 812968 Bytes 24/11/2014 09:23:20
AECORE.DLL : 8.3.2.6 243712 Bytes 24/11/2014 09:23:20
AEBB.DLL : 8.1.2.0 60448 Bytes 24/11/2014 09:23:20
AVWINLL.DLL : 14.0.7.308 25904 Bytes 24/11/2014 09:23:25
AVPREF.DLL : 14.0.7.308 52016 Bytes 24/11/2014 09:23:23
AVREP.DLL : 14.0.7.308 220976 Bytes 24/11/2014 09:23:24
AVARKT.DLL : 14.0.7.308 227632 Bytes 24/11/2014 09:23:21
AVEVTLOG.DLL : 14.0.7.440 184112 Bytes 24/11/2014 09:23:21
SQLITE3.DLL : 14.0.7.308 453936 Bytes 24/11/2014 09:23:32
AVSMTP.DLL : 14.0.7.308 79096 Bytes 24/11/2014 09:23:24
NETNT.DLL : 14.0.7.308 15152 Bytes 24/11/2014 09:23:29
RCIMAGE.DLL : 14.0.7.308 4866808 Bytes 24/11/2014 09:23:30
RCTEXT.DLL : 14.0.7.318 75568 Bytes 24/11/2014 09:23:31
Configuration settings for the scan:
Jobname.............................: Complete system scan
Configuration file..................: C:\Program Files (x86)\Avira\AntiVir Desktop\sysscan.avp
Reporting...........................: default
Primary action......................: Interactive
Secondary action....................: Ignore
Scan master boot sector.............: on
Scan boot sector....................: on
Boot sectors........................: C:, D:, E:, F:, G:,
Process scan........................: on
Extended process scan...............: on
Scan registry.......................: on
Search for rootkits.................: on
Integrity checking of system files..: off
Scan all files......................: All files
Scan archives.......................: on
Limit recursion depth...............: 20
Smart extensions....................: on
Macrovirus heuristic................: on
File heuristic......................: extended
Start of the scan: samedi 3 janvier 2015 19:29
Start scanning boot sectors:
Boot sector 'HDD0(C:)'
[INFO] No virus was found!
Boot sector 'HDD1(D:, F:)'
[INFO] No virus was found!
Boot sector 'HDD2(E:, G:)'
[INFO] No virus was found!
Starting search for hidden objects.
The scan of running processes will be started:
Scan process 'svchost.exe' - '52' Module(s) have been scanned
Scan process 'svchost.exe' - '36' Module(s) have been scanned
Scan process 'atiesrxx.exe' - '26' Module(s) have been scanned
Scan process 'svchost.exe' - '104' Module(s) have been scanned
Scan process 'svchost.exe' - '122' Module(s) have been scanned
Scan process 'svchost.exe' - '79' Module(s) have been scanned
Scan process 'svchost.exe' - '160' Module(s) have been scanned
Scan process 'AUDIODG.EXE' - '49' Module(s) have been scanned
Scan process 'svchost.exe' - '28' Module(s) have been scanned
Scan process 'atieclxx.exe' - '43' Module(s) have been scanned
Scan process 'svchost.exe' - '78' Module(s) have been scanned
Scan process 'spoolsv.exe' - '77' Module(s) have been scanned
Scan process 'svchost.exe' - '61' Module(s) have been scanned
Scan process 'armsvc.exe' - '28' Module(s) have been scanned
Scan process 'Fuel.Service.exe' - '45' Module(s) have been scanned
Scan process 'dirmngr.exe' - '35' Module(s) have been scanned
Scan process 'MaConfigAgent.exe' - '48' Module(s) have been scanned
Scan process 'LDSvc.exe' - '45' Module(s) have been scanned
Scan process 'Dwm.exe' - '34' Module(s) have been scanned
Scan process 'Explorer.EXE' - '191' Module(s) have been scanned
Scan process 'taskhost.exe' - '55' Module(s) have been scanned
Scan process 'svchost.exe' - '44' Module(s) have been scanned
Scan process 'uTorrent.exe' - '112' Module(s) have been scanned
Scan process 'SpotifyWebHelper.exe' - '47' Module(s) have been scanned
Scan process 'TUSBAudioCpl.exe' - '35' Module(s) have been scanned
Scan process 'Dropbox.exe' - '115' Module(s) have been scanned
Scan process 'VDeck.exe' - '50' Module(s) have been scanned
Scan process 'MOM.exe' - '92' Module(s) have been scanned
Scan process 'GoogleCrashHandler.exe' - '34' Module(s) have been scanned
Scan process 'GoogleCrashHandler64.exe' - '29' Module(s) have been scanned
Scan process 'svchost.exe' - '37' Module(s) have been scanned
Scan process 'CCC.exe' - '260' Module(s) have been scanned
Scan process 'SearchIndexer.exe' - '59' Module(s) have been scanned
Scan process 'wmpnetwk.exe' - '119' Module(s) have been scanned
Scan process 'svchost.exe' - '61' Module(s) have been scanned
Scan process 'svchost.exe' - '59' Module(s) have been scanned
Scan process 'CCleaner64.exe' - '96' Module(s) have been scanned
Scan process 'Steam.exe' - '134' Module(s) have been scanned
Scan process 'steamwebhelper.exe' - '74' Module(s) have been scanned
Scan process 'SteamService.exe' - '40' Module(s) have been scanned
Scan process 'steamwebhelper.exe' - '47' Module(s) have been scanned
Scan process 'spotify.exe' - '130' Module(s) have been scanned
Scan process 'SpotifyHelper.exe' - '61' Module(s) have been scanned
Scan process 'SpotifyHelper.exe' - '61' Module(s) have been scanned
Scan process 'SpotifyHelper.exe' - '61' Module(s) have been scanned
Scan process 'SpotifyHelper.exe' - '81' Module(s) have been scanned
Scan process 'slsk.exe' - '100' Module(s) have been scanned
Scan process 'AAM Updates Notifier.exe' - '90' Module(s) have been scanned
Scan process 'chrome.exe' - '136' Module(s) have been scanned
Scan process 'chrome.exe' - '77' Module(s) have been scanned
Scan process 'chrome.exe' - '55' Module(s) have been scanned
Scan process 'chrome.exe' - '55' Module(s) have been scanned
Scan process 'chrome.exe' - '55' Module(s) have been scanned
Scan process 'chrome.exe' - '55' Module(s) have been scanned
Scan process 'chrome.exe' - '55' Module(s) have been scanned
Scan process 'chrome.exe' - '55' Module(s) have been scanned
Scan process 'chrome.exe' - '55' Module(s) have been scanned
Scan process 'chrome.exe' - '55' Module(s) have been scanned
Scan process 'chrome.exe' - '55' Module(s) have been scanned
Scan process 'chrome.exe' - '55' Module(s) have been scanned
Scan process 'chrome.exe' - '54' Module(s) have been scanned
Scan process 'chrome.exe' - '55' Module(s) have been scanned
Scan process 'chrome.exe' - '55' Module(s) have been scanned
Scan process 'NOTEPAD.EXE' - '25' Module(s) have been scanned
Scan process 'chrome.exe' - '54' Module(s) have been scanned
Scan process 'msiexec.exe' - '56' Module(s) have been scanned
Scan process 'Avira.OE.ServiceHost.exe' - '131' Module(s) have been scanned
Scan process 'Avira.OE.Systray.exe' - '158' Module(s) have been scanned
Scan process 'TrustedInstaller.exe' - '49' Module(s) have been scanned
Scan process 'wmiprvse.exe' - '51' Module(s) have been scanned
Scan process 'SpotifyHelper.exe' - '61' Module(s) have been scanned
Scan process 'avgnt.exe' - '102' Module(s) have been scanned
Scan process 'avguard.exe' - '140' Module(s) have been scanned
Scan process 'avshadow.exe' - '29' Module(s) have been scanned
Scan process 'sched.exe' - '63' Module(s) have been scanned
Scan process 'avcenter.exe' - '119' Module(s) have been scanned
Scan process 'avscan.exe' - '121' Module(s) have been scanned
Scan process 'vssvc.exe' - '47' Module(s) have been scanned
Scan process 'svchost.exe' - '28' Module(s) have been scanned
Scan process 'taskhost.exe' - '55' Module(s) have been scanned
Scan process 'smss.exe' - '2' Module(s) have been scanned
Scan process 'csrss.exe' - '18' Module(s) have been scanned
Scan process 'wininit.exe' - '26' Module(s) have been scanned
Scan process 'csrss.exe' - '18' Module(s) have been scanned
Scan process 'services.exe' - '33' Module(s) have been scanned
Scan process 'winlogon.exe' - '31' Module(s) have been scanned
Scan process 'lsass.exe' - '70' Module(s) have been scanned
Scan process 'lsm.exe' - '16' Module(s) have been scanned
Starting to scan executable files (registry):
The registry was scanned ( '3590' files ).
Starting the file scan:
Begin scan in 'C:\'
C:\Users\christophe\Downloads\Native.Instruments.Traktor.Pro.2.v2.6.2-Tracer\Reg-Patches (read nfo)\Traktor.Pro-DUO.exe
[DETECTION] Is the TR/Dropper.Gen Trojan
C:\Users\christophe\Downloads\Native.Instruments.Traktor.Pro.2.v2.6.2-Tracer\Reg-Patches (read nfo)\Traktor.Pro-LE.exe
[DETECTION] Is the TR/Dropper.Gen Trojan
C:\Users\christophe\Downloads\Native.Instruments.Traktor.Pro.2.v2.6.2-Tracer\Reg-Patches (read nfo)\Traktor.Pro-NUMARK.4TRACK.EDITION.exe
[DETECTION] Is the TR/Dropper.Gen Trojan
C:\Users\christophe\Downloads\Native.Instruments.Traktor.Pro.2.v2.6.2-Tracer\Reg-Patches (read nfo)\Traktor.Pro-PIONEER.DDJ-T1.EDITION .exe
[DETECTION] Is the TR/Dropper.Gen Trojan
C:\Users\christophe\Downloads\Native.Instruments.Traktor.Pro.2.v2.6.2-Tracer\Reg-Patches (read nfo)\Traktor.Pro-PRO.exe
[DETECTION] Is the TR/Dropper.Gen Trojan
C:\Users\christophe\Downloads\Native.Instruments.Traktor.Pro.2.v2.6.2-Tracer\Reg-Patches (read nfo)\Traktor.Pro-SCRATCH.DUO.exe
[DETECTION] Is the TR/Dropper.Gen Trojan
C:\Users\christophe\Downloads\Native.Instruments.Traktor.Pro.2.v2.6.2-Tracer\Reg-Patches (read nfo)\Traktor.Pro-SCRATCH.PRO.exe
[DETECTION] Is the TR/Dropper.Gen Trojan
C:\Users\christophe\Downloads\Native.Instruments.Traktor.Pro.2.v2.6.2-Tracer\Reg-Patches (read nfo)\Traktor.Pro-VELOCITY.MIDI.STATION.EDITION.exe
[DETECTION] Is the TR/Dropper.Gen Trojan
[0] Archive type: RSRC
--> C:\Users\christophe\AppData\Roaming\Dropbox\bin\Dropbox.exe
[1] Archive type: RSRC
--> C:\Users\christophe\AppData\Roaming\Dropbox\bin\Dropbox.exe
[2] Archive type: RSRC
--> C:\Users\christophe\Downloads\SUPERIOR DRUMMER 2.0 64 BITS COMPLETE\ToonTrack.Superior.Drummer.VSTi.RTAS.v2.2.3.x86.x64.UPDATE.Incl.Keygen-AiR.rar
[3] Archive type: RAR
--> ToonTrack.Superior.Drummer.VSTi.RTAS.v2.2.3.x86.x64.UPDATE.Incl.Keygen-AiR\Keygen.exe
[DETECTION] Is the TR/Gendal.191344 Trojan
[WARNING] Infected files in archives cannot be repaired
C:\Users\christophe\Downloads\SUPERIOR DRUMMER 2.0 64 BITS COMPLETE\ToonTrack.Superior.Drummer.VSTi.RTAS.v2.2.3.x86.x64.UPDATE.Incl.Keygen-AiR.rar
[DETECTION] Is the TR/Gendal.191344 Trojan
Begin scan in 'D:\' <500 Jeux>
D:\autre\2012_IGF_PIRATE_KART_1_2\data\games\Andrew Gray\Don't Pee Yourself!\gargoyle data\git.exe
[DETECTION] Is the TR/Diple.yxe Trojan
D:\autre\2012_IGF_PIRATE_KART_1_2\data\games\Andrew Gray\Go West\gargoyle data\git.exe
[DETECTION] Is the TR/Diple.yxe Trojan
D:\autre\2012_IGF_PIRATE_KART_1_2\data\games\Andrew Gray\Gourmet Gaffe\gargoyle data\git.exe
[DETECTION] Is the TR/Diple.yxe Trojan
D:\autre\2012_IGF_PIRATE_KART_1_2\data\games\Andrew Gray\Nudists Gone Wild\gargoyle data\git.exe
[DETECTION] Is the TR/Diple.yxe Trojan
Begin scan in 'E:\' <400 Vidéos>
Begin scan in 'F:\' <Données Perso>
F:\Jeux\FCE_Ultra_V2.12_win_Fr\fceux.exe
[DETECTION] Is the TR/Kazy.33257 Trojan
--> D:\autre\2012_IGF_PIRATE_KART_1_2\data\games\Jamey DeOrio\res\netpack.exe
[3] Archive type: RSRC
--> F:\utorrent L\SugarBytes.WOW.VST.v1.1.Incl.Keygen-AiR deposit files.rar
[4] Archive type: RAR
--> a-sbw11a.zip
[5] Archive type: ZIP
--> a-sbw11.rar
[6] Archive type: RAR
--> keygen.exe
[DETECTION] Is the TR/Agent.282624.K Trojan
[WARNING] Infected files in archives cannot be repaired
F:\utorrent L\SugarBytes.WOW.VST.v1.1.Incl.Keygen-AiR deposit files.rar
[DETECTION] Is the TR/Agent.282624.K Trojan
F:\utorrent L\AAS VSTi Plugins Pack-DrZM\Keygen.exe
[DETECTION] Is the TR/Gendal.2833596.1 Trojan
F:\utorrent L\AAS VSTi Plugins Pack-DrZM\Lounge Lizard EP-3 v3.1.4\Keygen.exe
[DETECTION] Is the TR/Gendal.2833596.1 Trojan
F:\utorrent L\AAS VSTi Plugins Pack-DrZM\String Studio VS-1 v1.1.3\Keygen.exe
[DETECTION] Is the TR/Gendal.2833596.1 Trojan
F:\utorrent L\AAS VSTi Plugins Pack-DrZM\Strum Acoustic GS-1 v1.0.2\Keygen.exe
[DETECTION] Is the TR/Gendal.2833596.1 Trojan
F:\utorrent L\AAS VSTi Plugins Pack-DrZM\Strum Electric GS-1 v1.0.2\Keygen.exe
[DETECTION] Is the TR/Gendal.2833596.1 Trojan
F:\utorrent L\AAS VSTi Plugins Pack-DrZM\Tassman v4.1.6\Keygen.exe
[DETECTION] Is the TR/Gendal.2833596.1 Trojan
F:\utorrent L\AAS VSTi Plugins Pack-DrZM\Ultra Analog VA-1 v1.1.4\Keygen.exe
[DETECTION] Is the TR/Gendal.2833596.1 Trojan
--> F:\utorrent L\Sugar Bytes_Effectrix v1.0.0_(diMi)\Keygen(dont worry its not a virus).zip
[4] Archive type: ZIP
--> keygen.exe
[DETECTION] Is the TR/Agent.282624.K Trojan
[WARNING] Infected files in archives cannot be repaired
F:\utorrent L\Sugar Bytes_Effectrix v1.0.0_(diMi)\Keygen(dont worry its not a virus).zip
[DETECTION] Is the TR/Agent.282624.K Trojan
--> F:\utorrent L\Waldorf Edition Plug-In Suite v1.7.3 WIN Incl. Keygen - AiR [deepstatus]\WIN_AiR_[deepstatus].rar
[4] Archive type: RAR
--> AiR\Keygen.exe
[DETECTION] Is the TR/Rogue.8211062 Trojan
[WARNING] Infected files in archives cannot be repaired
F:\utorrent L\Waldorf Edition Plug-In Suite v1.7.3 WIN Incl. Keygen - AiR [deepstatus]\WIN_AiR_[deepstatus].rar
[DETECTION] Is the TR/Rogue.8211062 Trojan
F:\utorrent L\Waldorf Edition Plug-In Suite v1.7.3 WIN Incl. Keygen - AiR [deepstatus]\AiR\Keygen.exe
[DETECTION] Is the TR/Rogue.8211062 Trojan
Begin scan in 'G:\' <500 Données Projets>
--> G:\install de softs son\AR_BL_V2.1_AIR.rar
[4] Archive type: RAR
--> AudioRealism.BassLine.VSTi.v2.1.0.Incl.Keygen-AiR\a-ab210a.zip
[5] Archive type: ZIP
--> a-ab210.rar
[6] Archive type: RAR
--> Keygen.exe
[DETECTION] Is the TR/Offend.evg.f.13 Trojan
[WARNING] Infected files in archives cannot be repaired
G:\install de softs son\AR_BL_V2.1_AIR.rar
[DETECTION] Is the TR/Offend.evg.f.13 Trojan
--> G:\install de softs son\AZ-OVR-B.rar
[4] Archive type: RAR
--> Overloud - BREVERB v1.5.15 [PC & OSX] + Keygen\multi-keygen.rar
[5] Archive type: RAR
--> Overload Multi-Keygen\Overload Multi-Keygen.exe
[DETECTION] Is the TR/Gendal.6017494.1 Trojan
[WARNING] Infected files in archives cannot be repaired
G:\install de softs son\AZ-OVR-B.rar
[DETECTION] Is the TR/Gendal.6017494.1 Trojan
--> G:\install de softs son\Overloud.BREVERB.v1.59-DYNAMiCS.rar
[4] Archive type: RAR
--> crack\BREVERB.exe
[5] Archive type: NSIS
[DETECTION] Is the TR/Dropper.Gen Trojan
[WARNING] Infected files in archives cannot be repaired
G:\install de softs son\Overloud.BREVERB.v1.59-DYNAMiCS.rar
[DETECTION] Is the TR/Dropper.Gen Trojan
G:\install de softs son\D16.Group.Drumazon.VSTi.v1.0.25.incl.KeyGen-BEAT\KeyGen.exe
[DETECTION] Is the TR/Swizzor.xna Trojan
G:\install de softs son\D16.Phoscyon.VSTi.v1.5.7.Incl.Keygen-AiR\keygen.exe
[DETECTION] Is the TR/Horse.SWX Trojan
G:\install de softs son\East West Quantum Leap - Symphonic Orchestra Gold\ewqlso_keygen.exe
[DETECTION] Is the TR/Agent.132256.C Trojan
--> G:\install de softs son\MARCHE PAS Overloud - BREVERB v1.5.15 [PC & OSX] + Keygen\multi-keygen.rar
[4] Archive type: RAR
--> Overload Multi-Keygen\Overload Multi-Keygen.exe
[DETECTION] Is the TR/Gendal.6017494.1 Trojan
[WARNING] Infected files in archives cannot be repaired
G:\install de softs son\MARCHE PAS Overloud - BREVERB v1.5.15 [PC & OSX] + Keygen\multi-keygen.rar
[DETECTION] Is the TR/Gendal.6017494.1 Trojan
G:\install de softs son\MARCHE PAS Overloud - BREVERB v1.5.15 [PC & OSX] + Keygen\Overload Multi-Keygen\Overload Multi-Keygen.exe
[DETECTION] Is the TR/Gendal.6017494.1 Trojan
--> G:\install de softs son\Overloud.BREVERB.v1.59-DYNAMiCS\crack\BREVERB.exe
[4] Archive type: NSIS
[DETECTION] Is the TR/Dropper.Gen Trojan
[WARNING] Infected files in archives cannot be repaired
G:\install de softs son\Overloud.BREVERB.v1.59-DYNAMiCS\crack\BREVERB.exe
[DETECTION] Is the TR/Dropper.Gen Trojan
G:\Sons\_ nouveau\Janet.Jackson.Acapellas.zip.exe
[DETECTION] Contains virus patterns of Adware ADWARE/InstallRex.Gen
--> G:\Sons\_ nouveau\PSP.SpringBox.VST.x86 x64.Cracked-Tracer.rar.crdownload
[4] Archive type: RAR
--> PSP.SpringBox.VST.x86 x64.Cracked-Tracer\Patch\32Bit\Psp.Generic.Uni-Patch.v1-32BIT.exe
[DETECTION] Is the TR/Agent.997376.8 Trojan
[WARNING] Infected files in archives cannot be repaired
--> PSP.SpringBox.VST.x86 x64.Cracked-Tracer\Patch\64Bit\Psp.Generic.Uni-Patch.v1-64BIT.exe
[DETECTION] Is the TR/Agent.997888.7 Trojan
[WARNING] Infected files in archives cannot be repaired
G:\Sons\_ nouveau\PSP.SpringBox.VST.x86 x64.Cracked-Tracer.rar.crdownload
[DETECTION] Is the TR/Agent.997888.7 Trojan
Beginning disinfection:
G:\Sons\_ nouveau\PSP.SpringBox.VST.x86 x64.Cracked-Tracer.rar.crdownload
[DETECTION] Is the TR/Agent.997888.7 Trojan
[NOTE] The file was moved to the quarantine directory under the name '528ff689.qua'!
G:\Sons\_ nouveau\Janet.Jackson.Acapellas.zip.exe
[DETECTION] Contains virus patterns of Adware ADWARE/InstallRex.Gen
[NOTE] The file was moved to the quarantine directory under the name '4bf6d93c.qua'!
G:\install de softs son\Overloud.BREVERB.v1.59-DYNAMiCS\crack\BREVERB.exe
[DETECTION] Is the TR/Dropper.Gen Trojan
[NOTE] The file was moved to the quarantine directory under the name '185283c5.qua'!
G:\install de softs son\MARCHE PAS Overloud - BREVERB v1.5.15 [PC & OSX] + Keygen\Overload Multi-Keygen\Overload Multi-Keygen.exe
[DETECTION] Is the TR/Gendal.6017494.1 Trojan
[NOTE] The file was moved to the quarantine directory under the name '7f85cc2b.qua'!
G:\install de softs son\MARCHE PAS Overloud - BREVERB v1.5.15 [PC & OSX] + Keygen\multi-keygen.rar
[DETECTION] Is the TR/Gendal.6017494.1 Trojan
[NOTE] The file was moved to the quarantine directory under the name '3a18e114.qua'!
G:\install de softs son\East West Quantum Leap - Symphonic Orchestra Gold\ewqlso_keygen.exe
[DETECTION] Is the TR/Agent.132256.C Trojan
[NOTE] The file was moved to the quarantine directory under the name '450ed377.qua'!
G:\install de softs son\D16.Phoscyon.VSTi.v1.5.7.Incl.Keygen-AiR\keygen.exe
[DETECTION] Is the TR/Horse.SWX Trojan
[NOTE] The file was moved to the quarantine directory under the name '098eff0f.qua'!
G:\install de softs son\D16.Group.Drumazon.VSTi.v1.0.25.incl.KeyGen-BEAT\KeyGen.exe
[DETECTION] Is the TR/Swizzor.xna Trojan
[NOTE] The file was moved to the quarantine directory under the name '7596bf5e.qua'!
G:\install de softs son\Overloud.BREVERB.v1.59-DYNAMiCS.rar
[DETECTION] Is the TR/Dropper.Gen Trojan
[NOTE] The file was moved to the quarantine directory under the name '58e09020.qua'!
G:\install de softs son\AZ-OVR-B.rar
[DETECTION] Is the TR/Gendal.6017494.1 Trojan
[NOTE] The file was moved to the quarantine directory under the name '4050ab80.qua'!
G:\install de softs son\AR_BL_V2.1_AIR.rar
[DETECTION] Is the TR/Offend.evg.f.13 Trojan
[NOTE] The file was moved to the quarantine directory under the name '2dde87a9.qua'!
F:\utorrent L\Waldorf Edition Plug-In Suite v1.7.3 WIN Incl. Keygen - AiR [deepstatus]\AiR\Keygen.exe
[DETECTION] Is the TR/Rogue.8211062 Trojan
[NOTE] The file was moved to the quarantine directory under the name '5c41be29.qua'!
F:\utorrent L\Waldorf Edition Plug-In Suite v1.7.3 WIN Incl. Keygen - AiR [deepstatus]\WIN_AiR_[deepstatus].rar
[DETECTION] Is the TR/Rogue.8211062 Trojan
[NOTE] The file was moved to the quarantine directory under the name '538c8ef3.qua'!
F:\utorrent L\Sugar Bytes_Effectrix v1.0.0_(diMi)\Keygen(dont worry its not a virus).zip
[DETECTION] Is the TR/Agent.282624.K Trojan
[NOTE] The file was moved to the quarantine directory under the name '1772f7ad.qua'!
F:\utorrent L\AAS VSTi Plugins Pack-DrZM\Ultra Analog VA-1 v1.1.4\Keygen.exe
[DETECTION] Is the TR/Gendal.2833596.1 Trojan
[NOTE] The file was moved to the quarantine directory under the name '1e79f306.qua'!
F:\utorrent L\AAS VSTi Plugins Pack-DrZM\Tassman v4.1.6\Keygen.exe
[DETECTION] Is the TR/Gendal.2833596.1 Trojan
[NOTE] The file was moved to the quarantine directory under the name '4638ea6f.qua'!
F:\utorrent L\AAS VSTi Plugins Pack-DrZM\Strum Electric GS-1 v1.0.2\Keygen.exe
[DETECTION] Is the TR/Gendal.2833596.1 Trojan
[NOTE] The file was moved to the quarantine directory under the name '6acc93a3.qua'!
F:\utorrent L\AAS VSTi Plugins Pack-DrZM\Strum Acoustic GS-1 v1.0.2\Keygen.exe
[DETECTION] Is the TR/Gendal.2833596.1 Trojan
[NOTE] The file was moved to the quarantine directory under the name '5432f379.qua'!
F:\utorrent L\AAS VSTi Plugins Pack-DrZM\String Studio VS-1 v1.1.3\Keygen.exe
[DETECTION] Is the TR/Gendal.2833596.1 Trojan
[NOTE] The file was moved to the quarantine directory under the name '373cd80a.qua'!
F:\utorrent L\AAS VSTi Plugins Pack-DrZM\Lounge Lizard EP-3 v3.1.4\Keygen.exe
[DETECTION] Is the TR/Gendal.2833596.1 Trojan
[NOTE] The file was moved to the quarantine directory under the name '11f49817.qua'!
F:\utorrent L\AAS VSTi Plugins Pack-DrZM\Keygen.exe
[DETECTION] Is the TR/Gendal.2833596.1 Trojan
[NOTE] The file was moved to the quarantine directory under the name '2360e3b2.qua'!
F:\utorrent L\SugarBytes.WOW.VST.v1.1.Incl.Keygen-AiR deposit files.rar
[DETECTION] Is the TR/Agent.282624.K Trojan
[NOTE] The file was moved to the quarantine directory under the name '290bc8fc.qua'!
F:\Jeux\FCE_Ultra_V2.12_win_Fr\fceux.exe
[DETECTION] Is the TR/Kazy.33257 Trojan
[NOTE] The file was moved to the quarantine directory under the name '165aac88.qua'!
D:\autre\2012_IGF_PIRATE_KART_1_2\data\games\Andrew Gray\Nudists Gone Wild\gargoyle data\git.exe
[DETECTION] Is the TR/Diple.yxe Trojan
[NOTE] The file was moved to the quarantine directory under the name '6867a091.qua'!
D:\autre\2012_IGF_PIRATE_KART_1_2\data\games\Andrew Gray\Gourmet Gaffe\gargoyle data\git.exe
[DETECTION] Is the TR/Diple.yxe Trojan
[NOTE] The file was moved to the quarantine directory under the name '3d1fa45a.qua'!
D:\autre\2012_IGF_PIRATE_KART_1_2\data\games\Andrew Gray\Go West\gargoyle data\git.exe
[DETECTION] Is the TR/Diple.yxe Trojan
[NOTE] The file was moved to the quarantine directory under the name '3089d572.qua'!
D:\autre\2012_IGF_PIRATE_KART_1_2\data\games\Andrew Gray\Don't Pee Yourself!\gargoyle data\git.exe
[DETECTION] Is the TR/Diple.yxe Trojan
[NOTE] The file was moved to the quarantine directory under the name '2cd4c17b.qua'!
C:\Users\christophe\Downloads\SUPERIOR DRUMMER 2.0 64 BITS COMPLETE\ToonTrack.Superior.Drummer.VSTi.RTAS.v2.2.3.x86.x64.UPDATE.Incl.Keygen-AiR.rar
[DETECTION] Is the TR/Gendal.191344 Trojan
[NOTE] The file was moved to the quarantine directory under the name '1d0c8cbe.qua'!
C:\Users\christophe\Downloads\Native.Instruments.Traktor.Pro.2.v2.6.2-Tracer\Reg-Patches (read nfo)\Traktor.Pro-VELOCITY.MIDI.STATION.EDITION.exe
[DETECTION] Is the TR/Dropper.Gen Trojan
[NOTE] The file was moved to the quarantine directory under the name '7144988d.qua'!
C:\Users\christophe\Downloads\Native.Instruments.Traktor.Pro.2.v2.6.2-Tracer\Reg-Patches (read nfo)\Traktor.Pro-SCRATCH.PRO.exe
[DETECTION] Is the TR/Dropper.Gen Trojan
[NOTE] The file was moved to the quarantine directory under the name '38debd8a.qua'!
C:\Users\christophe\Downloads\Native.Instruments.Traktor.Pro.2.v2.6.2-Tracer\Reg-Patches (read nfo)\Traktor.Pro-SCRATCH.DUO.exe
[DETECTION] Is the TR/Dropper.Gen Trojan
[NOTE] The file was moved to the quarantine directory under the name '634bb55b.qua'!
C:\Users\christophe\Downloads\Native.Instruments.Traktor.Pro.2.v2.6.2-Tracer\Reg-Patches (read nfo)\Traktor.Pro-PRO.exe
[DETECTION] Is the TR/Dropper.Gen Trojan
[NOTE] The file was moved to the quarantine directory under the name '05f9b9b2.qua'!
C:\Users\christophe\Downloads\Native.Instruments.Traktor.Pro.2.v2.6.2-Tracer\Reg-Patches (read nfo)\Traktor.Pro-PIONEER.DDJ-T1.EDITION .exe
[DETECTION] Is the TR/Dropper.Gen Trojan
[NOTE] The file was moved to the quarantine directory under the name '5277cb1a.qua'!
C:\Users\christophe\Downloads\Native.Instruments.Traktor.Pro.2.v2.6.2-Tracer\Reg-Patches (read nfo)\Traktor.Pro-NUMARK.4TRACK.EDITION.exe
[DETECTION] Is the TR/Dropper.Gen Trojan
[NOTE] The file was moved to the quarantine directory under the name '70079c6e.qua'!
C:\Users\christophe\Downloads\Native.Instruments.Traktor.Pro.2.v2.6.2-Tracer\Reg-Patches (read nfo)\Traktor.Pro-LE.exe
[DETECTION] Is the TR/Dropper.Gen Trojan
[NOTE] The file was moved to the quarantine directory under the name '1817e6f8.qua'!
C:\Users\christophe\Downloads\Native.Instruments.Traktor.Pro.2.v2.6.2-Tracer\Reg-Patches (read nfo)\Traktor.Pro-DUO.exe
[DETECTION] Is the TR/Dropper.Gen Trojan
[NOTE] The file was moved to the quarantine directory under the name '3861e27d.qua'!
End of the scan: samedi 3 janvier 2015 21:51
Used time: 2:10:14 Hour(s)
The scan has been done completely.
56485 Scanned directories
1242859 Files were scanned
47 Viruses and/or unwanted programs were found
0 Files were classified as suspicious
0 Files were deleted
0 Viruses and unwanted programs were repaired
36 Files were moved to quarantine
0 Files were renamed
0 Files cannot be scanned
1242812 Files not concerned
12257 Archives were scanned
11 Warnings
36 Notes
833148 Objects were scanned with rootkit scan
0 Hidden objects were found
# DelFix v10.8 - Rapport créé le 03/01/2015 à 19:09:32
# Mis à jour le 29/07/2014 par Xplode
# Nom d'utilisateur : christophe - CHRISTOPHE-PC
# Système d'exploitation : Windows 7 Home Premium Service Pack 1 (64 bits)
~ Activation de l'UAC ... OK
~ Suppression des outils de désinfection ...
Supprimé : C:\Users\christophe\AppData\Roaming\ZHP
Supprimé : C:\ProgramData\Microsoft\Windows\Start Menu\Programs\ZHP
Supprimé : C:\Program Files (x86)\ZHPDiag
Supprimé : C:\PhysicalDisk0_MBR.bin
Supprimé : C:\Users\christophe\Desktop\ZHPCleaner.exe
Supprimé : C:\Users\christophe\Desktop\ZHPCleaner.txt
Supprimé : C:\Users\christophe\Desktop\ZHPDiag.lnk
Supprimé : C:\Users\christophe\Desktop\ZHPDiag.txt
Supprimé : C:\Users\christophe\Desktop\ZHPFix.lnk
Supprimé : C:\Users\christophe\Desktop\ZHPFixReport.txt
Supprimée : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\ZHPDiag_is1
~ Purge de la restauration système ...
Supprimé : RP #118 [Windows Update | 12/30/2014 23:19:24]
Nouveau point de restauration créé !
########## - EOF - ##########
OMG je viens de me rendre compte que j'avais désinstallé mon antivirus.
ça m'était complètement sorti de la tête, j'aurais commencé par là sinon désolé :/
J'ai réinstallé avira et fais un scan:
Avira Free Antivirus
Report file date: samedi 3 janvier 2015 19:29
The program is running as an unrestricted full version.
Online services are available.
Licensee : Avira Antivirus Free
Serial number : 0000149996-AVHOE-0000001
Platform : Windows 7 Home Premium
Windows version : (Service Pack 1) [6.1.7601]
Boot mode : Normally booted
Username : Système
Computer name : CHRISTOPHE-PC
Version information:
BUILD.DAT : 14.0.7.468 91859 Bytes 24/11/2014 10:23:00
AVSCAN.EXE : 14.0.7.462 1015544 Bytes 24/11/2014 09:23:24
AVSCANRC.DLL : 14.0.7.308 54576 Bytes 24/11/2014 09:23:24
LUKE.DLL : 14.0.7.462 60664 Bytes 24/11/2014 09:23:29
AVSCPLR.DLL : 14.0.7.440 93488 Bytes 24/11/2014 09:23:24
REPAIR.DLL : 14.0.7.412 366328 Bytes 24/11/2014 09:23:24
REPAIR.RDF : 1.0.2.30 596694 Bytes 24/11/2014 09:23:33
AVREG.DLL : 14.0.7.310 264952 Bytes 24/11/2014 09:23:23
AVLODE.DLL : 14.0.7.440 561456 Bytes 24/11/2014 09:23:23
AVLODE.RDF : 14.0.4.50 76508 Bytes 24/11/2014 09:23:23
XBV00012.VDF : 8.11.165.190 2048 Bytes 07/08/2014 09:23:33
XBV00013.VDF : 8.11.165.190 2048 Bytes 07/08/2014 09:23:33
XBV00014.VDF : 8.11.165.190 2048 Bytes 07/08/2014 09:23:33
XBV00015.VDF : 8.11.165.190 2048 Bytes 07/08/2014 09:23:33
XBV00016.VDF : 8.11.165.190 2048 Bytes 07/08/2014 09:23:33
XBV00017.VDF : 8.11.165.190 2048 Bytes 07/08/2014 09:23:33
XBV00018.VDF : 8.11.165.190 2048 Bytes 07/08/2014 09:23:34
XBV00019.VDF : 8.11.165.190 2048 Bytes 07/08/2014 09:23:34
XBV00020.VDF : 8.11.165.190 2048 Bytes 07/08/2014 09:23:34
XBV00021.VDF : 8.11.165.190 2048 Bytes 07/08/2014 09:23:34
XBV00022.VDF : 8.11.165.190 2048 Bytes 07/08/2014 09:23:34
XBV00023.VDF : 8.11.165.190 2048 Bytes 07/08/2014 09:23:34
XBV00024.VDF : 8.11.165.190 2048 Bytes 07/08/2014 09:23:34
XBV00025.VDF : 8.11.165.190 2048 Bytes 07/08/2014 09:23:34
XBV00026.VDF : 8.11.165.190 2048 Bytes 07/08/2014 09:23:34
XBV00027.VDF : 8.11.165.190 2048 Bytes 07/08/2014 09:23:34
XBV00028.VDF : 8.11.165.190 2048 Bytes 07/08/2014 09:23:34
XBV00029.VDF : 8.11.165.190 2048 Bytes 07/08/2014 09:23:34
XBV00030.VDF : 8.11.165.190 2048 Bytes 07/08/2014 09:23:34
XBV00031.VDF : 8.11.165.190 2048 Bytes 07/08/2014 09:23:34
XBV00032.VDF : 8.11.165.190 2048 Bytes 07/08/2014 09:23:34
XBV00033.VDF : 8.11.165.190 2048 Bytes 07/08/2014 09:23:34
XBV00034.VDF : 8.11.165.190 2048 Bytes 07/08/2014 09:23:34
XBV00035.VDF : 8.11.165.190 2048 Bytes 07/08/2014 09:23:34
XBV00036.VDF : 8.11.165.190 2048 Bytes 07/08/2014 09:23:34
XBV00037.VDF : 8.11.165.190 2048 Bytes 07/08/2014 09:23:34
XBV00038.VDF : 8.11.165.190 2048 Bytes 07/08/2014 09:23:34
XBV00039.VDF : 8.11.165.190 2048 Bytes 07/08/2014 09:23:34
XBV00040.VDF : 8.11.165.190 2048 Bytes 07/08/2014 09:23:34
XBV00041.VDF : 8.11.165.190 2048 Bytes 07/08/2014 09:23:34
XBV00103.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00104.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00105.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00106.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00107.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00108.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00109.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00110.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00111.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00112.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00113.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00114.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00115.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00116.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00117.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00118.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00119.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00120.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00121.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00122.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00123.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00124.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00125.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00126.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00127.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00128.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00129.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00130.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00131.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00132.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00133.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00134.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00135.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00136.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00137.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00138.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00139.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00140.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00141.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00142.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00143.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00144.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00145.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00146.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00147.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00148.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00149.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00150.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00151.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00152.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00153.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00154.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00155.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00156.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00157.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00158.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00159.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00160.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00161.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00162.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00163.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00164.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00165.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00166.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00167.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00168.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00169.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00170.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00171.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00172.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00173.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00174.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00175.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00176.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00177.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00178.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00179.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00180.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00181.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00182.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00183.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00184.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00185.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00186.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00187.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00188.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00189.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00190.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00191.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00192.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00193.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00194.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00195.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00196.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00197.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00198.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00199.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00200.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00201.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00202.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00203.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00204.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00205.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00206.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00207.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00208.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00209.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00210.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00211.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00212.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00213.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00214.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00215.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00216.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00217.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00218.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00219.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00220.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00221.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00222.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00223.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00224.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00225.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00226.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00227.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00228.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00229.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00230.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00231.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00232.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00233.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00234.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00235.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00236.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00237.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00238.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00239.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00240.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00241.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00242.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00243.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00244.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00245.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00246.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00247.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00248.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00249.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00250.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00251.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00252.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00253.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00254.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00255.VDF : 8.11.184.50 2048 Bytes 11/11/2014 09:23:34
XBV00000.VDF : 7.11.70.0 66736640 Bytes 04/04/2013 09:23:33
XBV00001.VDF : 7.11.74.226 2201600 Bytes 30/04/2013 09:23:33
XBV00002.VDF : 7.11.80.60 2751488 Bytes 28/05/2013 09:23:33
XBV00003.VDF : 7.11.85.214 2162688 Bytes 21/06/2013 09:23:33
XBV00004.VDF : 7.11.91.176 3903488 Bytes 23/07/2013 09:23:33
XBV00005.VDF : 7.11.98.186 6822912 Bytes 29/08/2013 09:23:33
XBV00006.VDF : 7.11.139.38 15708672 Bytes 27/03/2014 09:23:33
XBV00007.VDF : 7.11.152.100 4193792 Bytes 02/06/2014 09:23:33
XBV00008.VDF : 8.11.165.192 4251136 Bytes 07/08/2014 09:23:33
XBV00009.VDF : 8.11.172.30 2094080 Bytes 15/09/2014 09:23:33
XBV00010.VDF : 8.11.178.32 1581056 Bytes 14/10/2014 09:23:33
XBV00011.VDF : 8.11.184.50 2178560 Bytes 11/11/2014 09:23:33
XBV00042.VDF : 8.11.184.74 2048 Bytes 11/11/2014 09:23:34
XBV00043.VDF : 8.11.184.98 37376 Bytes 11/11/2014 09:23:34
XBV00044.VDF : 8.11.184.124 20992 Bytes 11/11/2014 09:23:34
XBV00045.VDF : 8.11.184.126 2048 Bytes 11/11/2014 09:23:34
XBV00046.VDF : 8.11.184.152 17920 Bytes 11/11/2014 09:23:34
XBV00047.VDF : 8.11.184.154 12288 Bytes 11/11/2014 09:23:34
XBV00048.VDF : 8.11.184.156 5632 Bytes 12/11/2014 09:23:34
XBV00049.VDF : 8.11.184.160 6656 Bytes 12/11/2014 09:23:34
XBV00050.VDF : 8.11.184.182 8704 Bytes 12/11/2014 09:23:34
XBV00051.VDF : 8.11.184.202 6144 Bytes 12/11/2014 09:23:34
XBV00052.VDF : 8.11.184.204 10752 Bytes 12/11/2014 09:23:34
XBV00053.VDF : 8.11.184.224 28160 Bytes 12/11/2014 09:23:34
XBV00054.VDF : 8.11.184.246 34304 Bytes 12/11/2014 09:23:34
XBV00055.VDF : 8.11.184.250 15360 Bytes 12/11/2014 09:23:34
XBV00056.VDF : 8.11.184.252 11776 Bytes 12/11/2014 09:23:34
XBV00057.VDF : 8.11.185.18 35840 Bytes 13/11/2014 09:23:34
XBV00058.VDF : 8.11.185.38 35840 Bytes 13/11/2014 09:23:34
XBV00059.VDF : 8.11.185.58 10240 Bytes 13/11/2014 09:23:34
XBV00060.VDF : 8.11.185.60 2048 Bytes 13/11/2014 09:23:34
XBV00061.VDF : 8.11.185.62 7168 Bytes 13/11/2014 09:23:34
XBV00062.VDF : 8.11.185.82 9216 Bytes 13/11/2014 09:23:34
XBV00063.VDF : 8.11.185.102 29696 Bytes 13/11/2014 09:23:34
XBV00064.VDF : 8.11.185.104 2048 Bytes 13/11/2014 09:23:34
XBV00065.VDF : 8.11.185.108 20480 Bytes 13/11/2014 09:23:34
XBV00066.VDF : 8.11.185.110 4608 Bytes 13/11/2014 09:23:34
XBV00067.VDF : 8.11.185.112 26112 Bytes 14/11/2014 09:23:34
XBV00068.VDF : 8.11.185.132 9216 Bytes 14/11/2014 09:23:34
XBV00069.VDF : 8.11.185.150 4608 Bytes 14/11/2014 09:23:34
XBV00070.VDF : 8.11.185.168 15360 Bytes 14/11/2014 09:23:34
XBV00071.VDF : 8.11.185.186 17920 Bytes 14/11/2014 09:23:34
XBV00072.VDF : 8.11.185.204 8192 Bytes 14/11/2014 09:23:34
XBV00073.VDF : 8.11.185.224 203264 Bytes 14/11/2014 09:23:34
XBV00074.VDF : 8.11.185.226 5120 Bytes 14/11/2014 09:23:34
XBV00075.VDF : 8.11.185.228 2048 Bytes 14/11/2014 09:23:34
XBV00076.VDF : 8.11.186.8 34304 Bytes 14/11/2014 09:23:34
XBV00077.VDF : 8.11.186.26 41472 Bytes 15/11/2014 09:23:34
XBV00078.VDF : 8.11.186.44 2048 Bytes 15/11/2014 09:23:34
XBV00079.VDF : 8.11.186.62 18432 Bytes 15/11/2014 09:23:34
XBV00080.VDF : 8.11.186.88 20480 Bytes 15/11/2014 09:23:34
XBV00081.VDF : 8.11.186.106 2048 Bytes 15/11/2014 09:23:34
XBV00082.VDF : 8.11.186.108 69632 Bytes 16/11/2014 09:23:34
XBV00083.VDF : 8.11.186.110 2048 Bytes 16/11/2014 09:23:34
XBV00084.VDF : 8.11.186.112 2048 Bytes 16/11/2014 09:23:34
XBV00085.VDF : 8.11.186.128 5120 Bytes 16/11/2014 09:23:34
XBV00086.VDF : 8.11.186.130 56320 Bytes 16/11/2014 09:23:34
XBV00087.VDF : 8.11.186.146 67584 Bytes 17/11/2014 09:23:34
XBV00088.VDF : 8.11.186.162 108032 Bytes 17/11/2014 09:23:34
XBV00089.VDF : 8.11.186.164 2048 Bytes 17/11/2014 09:23:34
XBV00090.VDF : 8.11.186.180 8704 Bytes 17/11/2014 09:23:34
XBV00091.VDF : 8.11.186.196 16896 Bytes 17/11/2014 09:23:34
XBV00092.VDF : 8.11.186.214 19968 Bytes 17/11/2014 09:23:34
XBV00093.VDF : 8.11.186.218 25088 Bytes 17/11/2014 09:23:34
XBV00094.VDF : 8.11.186.222 41984 Bytes 18/11/2014 09:23:34
XBV00095.VDF : 8.11.186.224 10240 Bytes 18/11/2014 09:23:34
XBV00096.VDF : 8.11.186.226 9728 Bytes 18/11/2014 09:23:34
XBV00097.VDF : 8.11.186.230 2048 Bytes 18/11/2014 09:23:34
XBV00098.VDF : 8.11.186.246 27648 Bytes 18/11/2014 09:23:34
XBV00099.VDF : 8.11.187.4 2048 Bytes 18/11/2014 09:23:34
XBV00100.VDF : 8.11.187.22 22528 Bytes 18/11/2014 09:23:34
XBV00101.VDF : 8.11.187.36 2048 Bytes 18/11/2014 09:23:34
XBV00102.VDF : 8.11.187.50 18432 Bytes 18/11/2014 09:23:34
LOCAL000.VDF : 8.11.187.50 114932224 Bytes 18/11/2014 18:27:55
Engine version : 8.3.26.16
AEVDF.DLL : 8.3.1.6 133992 Bytes 24/11/2014 09:23:20
AESCRIPT.DLL : 8.2.2.22 526248 Bytes 24/11/2014 09:23:20
AESCN.DLL : 8.3.2.2 139456 Bytes 24/11/2014 09:23:20
AESBX.DLL : 8.2.20.24 1409224 Bytes 24/11/2014 09:23:20
AERDL.DLL : 8.2.1.16 743328 Bytes 24/11/2014 09:23:20
AEPACK.DLL : 8.4.0.54 788392 Bytes 24/11/2014 09:23:20
AEOFFICE.DLL : 8.3.1.6 350120 Bytes 24/11/2014 09:23:20
AEHEUR.DLL : 8.1.4.1396 7772072 Bytes 24/11/2014 09:23:20
AEHELP.DLL : 8.3.1.0 278728 Bytes 24/11/2014 09:23:20
AEGEN.DLL : 8.1.7.34 453480 Bytes 24/11/2014 09:23:20
AEEXP.DLL : 8.4.2.44 251808 Bytes 24/11/2014 09:23:20
AEEMU.DLL : 8.1.3.4 399264 Bytes 24/11/2014 09:23:20
AEDROID.DLL : 8.4.2.248 812968 Bytes 24/11/2014 09:23:20
AECORE.DLL : 8.3.2.6 243712 Bytes 24/11/2014 09:23:20
AEBB.DLL : 8.1.2.0 60448 Bytes 24/11/2014 09:23:20
AVWINLL.DLL : 14.0.7.308 25904 Bytes 24/11/2014 09:23:25
AVPREF.DLL : 14.0.7.308 52016 Bytes 24/11/2014 09:23:23
AVREP.DLL : 14.0.7.308 220976 Bytes 24/11/2014 09:23:24
AVARKT.DLL : 14.0.7.308 227632 Bytes 24/11/2014 09:23:21
AVEVTLOG.DLL : 14.0.7.440 184112 Bytes 24/11/2014 09:23:21
SQLITE3.DLL : 14.0.7.308 453936 Bytes 24/11/2014 09:23:32
AVSMTP.DLL : 14.0.7.308 79096 Bytes 24/11/2014 09:23:24
NETNT.DLL : 14.0.7.308 15152 Bytes 24/11/2014 09:23:29
RCIMAGE.DLL : 14.0.7.308 4866808 Bytes 24/11/2014 09:23:30
RCTEXT.DLL : 14.0.7.318 75568 Bytes 24/11/2014 09:23:31
Configuration settings for the scan:
Jobname.............................: Complete system scan
Configuration file..................: C:\Program Files (x86)\Avira\AntiVir Desktop\sysscan.avp
Reporting...........................: default
Primary action......................: Interactive
Secondary action....................: Ignore
Scan master boot sector.............: on
Scan boot sector....................: on
Boot sectors........................: C:, D:, E:, F:, G:,
Process scan........................: on
Extended process scan...............: on
Scan registry.......................: on
Search for rootkits.................: on
Integrity checking of system files..: off
Scan all files......................: All files
Scan archives.......................: on
Limit recursion depth...............: 20
Smart extensions....................: on
Macrovirus heuristic................: on
File heuristic......................: extended
Start of the scan: samedi 3 janvier 2015 19:29
Start scanning boot sectors:
Boot sector 'HDD0(C:)'
[INFO] No virus was found!
Boot sector 'HDD1(D:, F:)'
[INFO] No virus was found!
Boot sector 'HDD2(E:, G:)'
[INFO] No virus was found!
Starting search for hidden objects.
The scan of running processes will be started:
Scan process 'svchost.exe' - '52' Module(s) have been scanned
Scan process 'svchost.exe' - '36' Module(s) have been scanned
Scan process 'atiesrxx.exe' - '26' Module(s) have been scanned
Scan process 'svchost.exe' - '104' Module(s) have been scanned
Scan process 'svchost.exe' - '122' Module(s) have been scanned
Scan process 'svchost.exe' - '79' Module(s) have been scanned
Scan process 'svchost.exe' - '160' Module(s) have been scanned
Scan process 'AUDIODG.EXE' - '49' Module(s) have been scanned
Scan process 'svchost.exe' - '28' Module(s) have been scanned
Scan process 'atieclxx.exe' - '43' Module(s) have been scanned
Scan process 'svchost.exe' - '78' Module(s) have been scanned
Scan process 'spoolsv.exe' - '77' Module(s) have been scanned
Scan process 'svchost.exe' - '61' Module(s) have been scanned
Scan process 'armsvc.exe' - '28' Module(s) have been scanned
Scan process 'Fuel.Service.exe' - '45' Module(s) have been scanned
Scan process 'dirmngr.exe' - '35' Module(s) have been scanned
Scan process 'MaConfigAgent.exe' - '48' Module(s) have been scanned
Scan process 'LDSvc.exe' - '45' Module(s) have been scanned
Scan process 'Dwm.exe' - '34' Module(s) have been scanned
Scan process 'Explorer.EXE' - '191' Module(s) have been scanned
Scan process 'taskhost.exe' - '55' Module(s) have been scanned
Scan process 'svchost.exe' - '44' Module(s) have been scanned
Scan process 'uTorrent.exe' - '112' Module(s) have been scanned
Scan process 'SpotifyWebHelper.exe' - '47' Module(s) have been scanned
Scan process 'TUSBAudioCpl.exe' - '35' Module(s) have been scanned
Scan process 'Dropbox.exe' - '115' Module(s) have been scanned
Scan process 'VDeck.exe' - '50' Module(s) have been scanned
Scan process 'MOM.exe' - '92' Module(s) have been scanned
Scan process 'GoogleCrashHandler.exe' - '34' Module(s) have been scanned
Scan process 'GoogleCrashHandler64.exe' - '29' Module(s) have been scanned
Scan process 'svchost.exe' - '37' Module(s) have been scanned
Scan process 'CCC.exe' - '260' Module(s) have been scanned
Scan process 'SearchIndexer.exe' - '59' Module(s) have been scanned
Scan process 'wmpnetwk.exe' - '119' Module(s) have been scanned
Scan process 'svchost.exe' - '61' Module(s) have been scanned
Scan process 'svchost.exe' - '59' Module(s) have been scanned
Scan process 'CCleaner64.exe' - '96' Module(s) have been scanned
Scan process 'Steam.exe' - '134' Module(s) have been scanned
Scan process 'steamwebhelper.exe' - '74' Module(s) have been scanned
Scan process 'SteamService.exe' - '40' Module(s) have been scanned
Scan process 'steamwebhelper.exe' - '47' Module(s) have been scanned
Scan process 'spotify.exe' - '130' Module(s) have been scanned
Scan process 'SpotifyHelper.exe' - '61' Module(s) have been scanned
Scan process 'SpotifyHelper.exe' - '61' Module(s) have been scanned
Scan process 'SpotifyHelper.exe' - '61' Module(s) have been scanned
Scan process 'SpotifyHelper.exe' - '81' Module(s) have been scanned
Scan process 'slsk.exe' - '100' Module(s) have been scanned
Scan process 'AAM Updates Notifier.exe' - '90' Module(s) have been scanned
Scan process 'chrome.exe' - '136' Module(s) have been scanned
Scan process 'chrome.exe' - '77' Module(s) have been scanned
Scan process 'chrome.exe' - '55' Module(s) have been scanned
Scan process 'chrome.exe' - '55' Module(s) have been scanned
Scan process 'chrome.exe' - '55' Module(s) have been scanned
Scan process 'chrome.exe' - '55' Module(s) have been scanned
Scan process 'chrome.exe' - '55' Module(s) have been scanned
Scan process 'chrome.exe' - '55' Module(s) have been scanned
Scan process 'chrome.exe' - '55' Module(s) have been scanned
Scan process 'chrome.exe' - '55' Module(s) have been scanned
Scan process 'chrome.exe' - '55' Module(s) have been scanned
Scan process 'chrome.exe' - '55' Module(s) have been scanned
Scan process 'chrome.exe' - '54' Module(s) have been scanned
Scan process 'chrome.exe' - '55' Module(s) have been scanned
Scan process 'chrome.exe' - '55' Module(s) have been scanned
Scan process 'NOTEPAD.EXE' - '25' Module(s) have been scanned
Scan process 'chrome.exe' - '54' Module(s) have been scanned
Scan process 'msiexec.exe' - '56' Module(s) have been scanned
Scan process 'Avira.OE.ServiceHost.exe' - '131' Module(s) have been scanned
Scan process 'Avira.OE.Systray.exe' - '158' Module(s) have been scanned
Scan process 'TrustedInstaller.exe' - '49' Module(s) have been scanned
Scan process 'wmiprvse.exe' - '51' Module(s) have been scanned
Scan process 'SpotifyHelper.exe' - '61' Module(s) have been scanned
Scan process 'avgnt.exe' - '102' Module(s) have been scanned
Scan process 'avguard.exe' - '140' Module(s) have been scanned
Scan process 'avshadow.exe' - '29' Module(s) have been scanned
Scan process 'sched.exe' - '63' Module(s) have been scanned
Scan process 'avcenter.exe' - '119' Module(s) have been scanned
Scan process 'avscan.exe' - '121' Module(s) have been scanned
Scan process 'vssvc.exe' - '47' Module(s) have been scanned
Scan process 'svchost.exe' - '28' Module(s) have been scanned
Scan process 'taskhost.exe' - '55' Module(s) have been scanned
Scan process 'smss.exe' - '2' Module(s) have been scanned
Scan process 'csrss.exe' - '18' Module(s) have been scanned
Scan process 'wininit.exe' - '26' Module(s) have been scanned
Scan process 'csrss.exe' - '18' Module(s) have been scanned
Scan process 'services.exe' - '33' Module(s) have been scanned
Scan process 'winlogon.exe' - '31' Module(s) have been scanned
Scan process 'lsass.exe' - '70' Module(s) have been scanned
Scan process 'lsm.exe' - '16' Module(s) have been scanned
Starting to scan executable files (registry):
The registry was scanned ( '3590' files ).
Starting the file scan:
Begin scan in 'C:\'
C:\Users\christophe\Downloads\Native.Instruments.Traktor.Pro.2.v2.6.2-Tracer\Reg-Patches (read nfo)\Traktor.Pro-DUO.exe
[DETECTION] Is the TR/Dropper.Gen Trojan
C:\Users\christophe\Downloads\Native.Instruments.Traktor.Pro.2.v2.6.2-Tracer\Reg-Patches (read nfo)\Traktor.Pro-LE.exe
[DETECTION] Is the TR/Dropper.Gen Trojan
C:\Users\christophe\Downloads\Native.Instruments.Traktor.Pro.2.v2.6.2-Tracer\Reg-Patches (read nfo)\Traktor.Pro-NUMARK.4TRACK.EDITION.exe
[DETECTION] Is the TR/Dropper.Gen Trojan
C:\Users\christophe\Downloads\Native.Instruments.Traktor.Pro.2.v2.6.2-Tracer\Reg-Patches (read nfo)\Traktor.Pro-PIONEER.DDJ-T1.EDITION .exe
[DETECTION] Is the TR/Dropper.Gen Trojan
C:\Users\christophe\Downloads\Native.Instruments.Traktor.Pro.2.v2.6.2-Tracer\Reg-Patches (read nfo)\Traktor.Pro-PRO.exe
[DETECTION] Is the TR/Dropper.Gen Trojan
C:\Users\christophe\Downloads\Native.Instruments.Traktor.Pro.2.v2.6.2-Tracer\Reg-Patches (read nfo)\Traktor.Pro-SCRATCH.DUO.exe
[DETECTION] Is the TR/Dropper.Gen Trojan
C:\Users\christophe\Downloads\Native.Instruments.Traktor.Pro.2.v2.6.2-Tracer\Reg-Patches (read nfo)\Traktor.Pro-SCRATCH.PRO.exe
[DETECTION] Is the TR/Dropper.Gen Trojan
C:\Users\christophe\Downloads\Native.Instruments.Traktor.Pro.2.v2.6.2-Tracer\Reg-Patches (read nfo)\Traktor.Pro-VELOCITY.MIDI.STATION.EDITION.exe
[DETECTION] Is the TR/Dropper.Gen Trojan
[0] Archive type: RSRC
--> C:\Users\christophe\AppData\Roaming\Dropbox\bin\Dropbox.exe
[1] Archive type: RSRC
--> C:\Users\christophe\AppData\Roaming\Dropbox\bin\Dropbox.exe
[2] Archive type: RSRC
--> C:\Users\christophe\Downloads\SUPERIOR DRUMMER 2.0 64 BITS COMPLETE\ToonTrack.Superior.Drummer.VSTi.RTAS.v2.2.3.x86.x64.UPDATE.Incl.Keygen-AiR.rar
[3] Archive type: RAR
--> ToonTrack.Superior.Drummer.VSTi.RTAS.v2.2.3.x86.x64.UPDATE.Incl.Keygen-AiR\Keygen.exe
[DETECTION] Is the TR/Gendal.191344 Trojan
[WARNING] Infected files in archives cannot be repaired
C:\Users\christophe\Downloads\SUPERIOR DRUMMER 2.0 64 BITS COMPLETE\ToonTrack.Superior.Drummer.VSTi.RTAS.v2.2.3.x86.x64.UPDATE.Incl.Keygen-AiR.rar
[DETECTION] Is the TR/Gendal.191344 Trojan
Begin scan in 'D:\' <500 Jeux>
D:\autre\2012_IGF_PIRATE_KART_1_2\data\games\Andrew Gray\Don't Pee Yourself!\gargoyle data\git.exe
[DETECTION] Is the TR/Diple.yxe Trojan
D:\autre\2012_IGF_PIRATE_KART_1_2\data\games\Andrew Gray\Go West\gargoyle data\git.exe
[DETECTION] Is the TR/Diple.yxe Trojan
D:\autre\2012_IGF_PIRATE_KART_1_2\data\games\Andrew Gray\Gourmet Gaffe\gargoyle data\git.exe
[DETECTION] Is the TR/Diple.yxe Trojan
D:\autre\2012_IGF_PIRATE_KART_1_2\data\games\Andrew Gray\Nudists Gone Wild\gargoyle data\git.exe
[DETECTION] Is the TR/Diple.yxe Trojan
Begin scan in 'E:\' <400 Vidéos>
Begin scan in 'F:\' <Données Perso>
F:\Jeux\FCE_Ultra_V2.12_win_Fr\fceux.exe
[DETECTION] Is the TR/Kazy.33257 Trojan
--> D:\autre\2012_IGF_PIRATE_KART_1_2\data\games\Jamey DeOrio\res\netpack.exe
[3] Archive type: RSRC
--> F:\utorrent L\SugarBytes.WOW.VST.v1.1.Incl.Keygen-AiR deposit files.rar
[4] Archive type: RAR
--> a-sbw11a.zip
[5] Archive type: ZIP
--> a-sbw11.rar
[6] Archive type: RAR
--> keygen.exe
[DETECTION] Is the TR/Agent.282624.K Trojan
[WARNING] Infected files in archives cannot be repaired
F:\utorrent L\SugarBytes.WOW.VST.v1.1.Incl.Keygen-AiR deposit files.rar
[DETECTION] Is the TR/Agent.282624.K Trojan
F:\utorrent L\AAS VSTi Plugins Pack-DrZM\Keygen.exe
[DETECTION] Is the TR/Gendal.2833596.1 Trojan
F:\utorrent L\AAS VSTi Plugins Pack-DrZM\Lounge Lizard EP-3 v3.1.4\Keygen.exe
[DETECTION] Is the TR/Gendal.2833596.1 Trojan
F:\utorrent L\AAS VSTi Plugins Pack-DrZM\String Studio VS-1 v1.1.3\Keygen.exe
[DETECTION] Is the TR/Gendal.2833596.1 Trojan
F:\utorrent L\AAS VSTi Plugins Pack-DrZM\Strum Acoustic GS-1 v1.0.2\Keygen.exe
[DETECTION] Is the TR/Gendal.2833596.1 Trojan
F:\utorrent L\AAS VSTi Plugins Pack-DrZM\Strum Electric GS-1 v1.0.2\Keygen.exe
[DETECTION] Is the TR/Gendal.2833596.1 Trojan
F:\utorrent L\AAS VSTi Plugins Pack-DrZM\Tassman v4.1.6\Keygen.exe
[DETECTION] Is the TR/Gendal.2833596.1 Trojan
F:\utorrent L\AAS VSTi Plugins Pack-DrZM\Ultra Analog VA-1 v1.1.4\Keygen.exe
[DETECTION] Is the TR/Gendal.2833596.1 Trojan
--> F:\utorrent L\Sugar Bytes_Effectrix v1.0.0_(diMi)\Keygen(dont worry its not a virus).zip
[4] Archive type: ZIP
--> keygen.exe
[DETECTION] Is the TR/Agent.282624.K Trojan
[WARNING] Infected files in archives cannot be repaired
F:\utorrent L\Sugar Bytes_Effectrix v1.0.0_(diMi)\Keygen(dont worry its not a virus).zip
[DETECTION] Is the TR/Agent.282624.K Trojan
--> F:\utorrent L\Waldorf Edition Plug-In Suite v1.7.3 WIN Incl. Keygen - AiR [deepstatus]\WIN_AiR_[deepstatus].rar
[4] Archive type: RAR
--> AiR\Keygen.exe
[DETECTION] Is the TR/Rogue.8211062 Trojan
[WARNING] Infected files in archives cannot be repaired
F:\utorrent L\Waldorf Edition Plug-In Suite v1.7.3 WIN Incl. Keygen - AiR [deepstatus]\WIN_AiR_[deepstatus].rar
[DETECTION] Is the TR/Rogue.8211062 Trojan
F:\utorrent L\Waldorf Edition Plug-In Suite v1.7.3 WIN Incl. Keygen - AiR [deepstatus]\AiR\Keygen.exe
[DETECTION] Is the TR/Rogue.8211062 Trojan
Begin scan in 'G:\' <500 Données Projets>
--> G:\install de softs son\AR_BL_V2.1_AIR.rar
[4] Archive type: RAR
--> AudioRealism.BassLine.VSTi.v2.1.0.Incl.Keygen-AiR\a-ab210a.zip
[5] Archive type: ZIP
--> a-ab210.rar
[6] Archive type: RAR
--> Keygen.exe
[DETECTION] Is the TR/Offend.evg.f.13 Trojan
[WARNING] Infected files in archives cannot be repaired
G:\install de softs son\AR_BL_V2.1_AIR.rar
[DETECTION] Is the TR/Offend.evg.f.13 Trojan
--> G:\install de softs son\AZ-OVR-B.rar
[4] Archive type: RAR
--> Overloud - BREVERB v1.5.15 [PC & OSX] + Keygen\multi-keygen.rar
[5] Archive type: RAR
--> Overload Multi-Keygen\Overload Multi-Keygen.exe
[DETECTION] Is the TR/Gendal.6017494.1 Trojan
[WARNING] Infected files in archives cannot be repaired
G:\install de softs son\AZ-OVR-B.rar
[DETECTION] Is the TR/Gendal.6017494.1 Trojan
--> G:\install de softs son\Overloud.BREVERB.v1.59-DYNAMiCS.rar
[4] Archive type: RAR
--> crack\BREVERB.exe
[5] Archive type: NSIS
[DETECTION] Is the TR/Dropper.Gen Trojan
[WARNING] Infected files in archives cannot be repaired
G:\install de softs son\Overloud.BREVERB.v1.59-DYNAMiCS.rar
[DETECTION] Is the TR/Dropper.Gen Trojan
G:\install de softs son\D16.Group.Drumazon.VSTi.v1.0.25.incl.KeyGen-BEAT\KeyGen.exe
[DETECTION] Is the TR/Swizzor.xna Trojan
G:\install de softs son\D16.Phoscyon.VSTi.v1.5.7.Incl.Keygen-AiR\keygen.exe
[DETECTION] Is the TR/Horse.SWX Trojan
G:\install de softs son\East West Quantum Leap - Symphonic Orchestra Gold\ewqlso_keygen.exe
[DETECTION] Is the TR/Agent.132256.C Trojan
--> G:\install de softs son\MARCHE PAS Overloud - BREVERB v1.5.15 [PC & OSX] + Keygen\multi-keygen.rar
[4] Archive type: RAR
--> Overload Multi-Keygen\Overload Multi-Keygen.exe
[DETECTION] Is the TR/Gendal.6017494.1 Trojan
[WARNING] Infected files in archives cannot be repaired
G:\install de softs son\MARCHE PAS Overloud - BREVERB v1.5.15 [PC & OSX] + Keygen\multi-keygen.rar
[DETECTION] Is the TR/Gendal.6017494.1 Trojan
G:\install de softs son\MARCHE PAS Overloud - BREVERB v1.5.15 [PC & OSX] + Keygen\Overload Multi-Keygen\Overload Multi-Keygen.exe
[DETECTION] Is the TR/Gendal.6017494.1 Trojan
--> G:\install de softs son\Overloud.BREVERB.v1.59-DYNAMiCS\crack\BREVERB.exe
[4] Archive type: NSIS
[DETECTION] Is the TR/Dropper.Gen Trojan
[WARNING] Infected files in archives cannot be repaired
G:\install de softs son\Overloud.BREVERB.v1.59-DYNAMiCS\crack\BREVERB.exe
[DETECTION] Is the TR/Dropper.Gen Trojan
G:\Sons\_ nouveau\Janet.Jackson.Acapellas.zip.exe
[DETECTION] Contains virus patterns of Adware ADWARE/InstallRex.Gen
--> G:\Sons\_ nouveau\PSP.SpringBox.VST.x86 x64.Cracked-Tracer.rar.crdownload
[4] Archive type: RAR
--> PSP.SpringBox.VST.x86 x64.Cracked-Tracer\Patch\32Bit\Psp.Generic.Uni-Patch.v1-32BIT.exe
[DETECTION] Is the TR/Agent.997376.8 Trojan
[WARNING] Infected files in archives cannot be repaired
--> PSP.SpringBox.VST.x86 x64.Cracked-Tracer\Patch\64Bit\Psp.Generic.Uni-Patch.v1-64BIT.exe
[DETECTION] Is the TR/Agent.997888.7 Trojan
[WARNING] Infected files in archives cannot be repaired
G:\Sons\_ nouveau\PSP.SpringBox.VST.x86 x64.Cracked-Tracer.rar.crdownload
[DETECTION] Is the TR/Agent.997888.7 Trojan
Beginning disinfection:
G:\Sons\_ nouveau\PSP.SpringBox.VST.x86 x64.Cracked-Tracer.rar.crdownload
[DETECTION] Is the TR/Agent.997888.7 Trojan
[NOTE] The file was moved to the quarantine directory under the name '528ff689.qua'!
G:\Sons\_ nouveau\Janet.Jackson.Acapellas.zip.exe
[DETECTION] Contains virus patterns of Adware ADWARE/InstallRex.Gen
[NOTE] The file was moved to the quarantine directory under the name '4bf6d93c.qua'!
G:\install de softs son\Overloud.BREVERB.v1.59-DYNAMiCS\crack\BREVERB.exe
[DETECTION] Is the TR/Dropper.Gen Trojan
[NOTE] The file was moved to the quarantine directory under the name '185283c5.qua'!
G:\install de softs son\MARCHE PAS Overloud - BREVERB v1.5.15 [PC & OSX] + Keygen\Overload Multi-Keygen\Overload Multi-Keygen.exe
[DETECTION] Is the TR/Gendal.6017494.1 Trojan
[NOTE] The file was moved to the quarantine directory under the name '7f85cc2b.qua'!
G:\install de softs son\MARCHE PAS Overloud - BREVERB v1.5.15 [PC & OSX] + Keygen\multi-keygen.rar
[DETECTION] Is the TR/Gendal.6017494.1 Trojan
[NOTE] The file was moved to the quarantine directory under the name '3a18e114.qua'!
G:\install de softs son\East West Quantum Leap - Symphonic Orchestra Gold\ewqlso_keygen.exe
[DETECTION] Is the TR/Agent.132256.C Trojan
[NOTE] The file was moved to the quarantine directory under the name '450ed377.qua'!
G:\install de softs son\D16.Phoscyon.VSTi.v1.5.7.Incl.Keygen-AiR\keygen.exe
[DETECTION] Is the TR/Horse.SWX Trojan
[NOTE] The file was moved to the quarantine directory under the name '098eff0f.qua'!
G:\install de softs son\D16.Group.Drumazon.VSTi.v1.0.25.incl.KeyGen-BEAT\KeyGen.exe
[DETECTION] Is the TR/Swizzor.xna Trojan
[NOTE] The file was moved to the quarantine directory under the name '7596bf5e.qua'!
G:\install de softs son\Overloud.BREVERB.v1.59-DYNAMiCS.rar
[DETECTION] Is the TR/Dropper.Gen Trojan
[NOTE] The file was moved to the quarantine directory under the name '58e09020.qua'!
G:\install de softs son\AZ-OVR-B.rar
[DETECTION] Is the TR/Gendal.6017494.1 Trojan
[NOTE] The file was moved to the quarantine directory under the name '4050ab80.qua'!
G:\install de softs son\AR_BL_V2.1_AIR.rar
[DETECTION] Is the TR/Offend.evg.f.13 Trojan
[NOTE] The file was moved to the quarantine directory under the name '2dde87a9.qua'!
F:\utorrent L\Waldorf Edition Plug-In Suite v1.7.3 WIN Incl. Keygen - AiR [deepstatus]\AiR\Keygen.exe
[DETECTION] Is the TR/Rogue.8211062 Trojan
[NOTE] The file was moved to the quarantine directory under the name '5c41be29.qua'!
F:\utorrent L\Waldorf Edition Plug-In Suite v1.7.3 WIN Incl. Keygen - AiR [deepstatus]\WIN_AiR_[deepstatus].rar
[DETECTION] Is the TR/Rogue.8211062 Trojan
[NOTE] The file was moved to the quarantine directory under the name '538c8ef3.qua'!
F:\utorrent L\Sugar Bytes_Effectrix v1.0.0_(diMi)\Keygen(dont worry its not a virus).zip
[DETECTION] Is the TR/Agent.282624.K Trojan
[NOTE] The file was moved to the quarantine directory under the name '1772f7ad.qua'!
F:\utorrent L\AAS VSTi Plugins Pack-DrZM\Ultra Analog VA-1 v1.1.4\Keygen.exe
[DETECTION] Is the TR/Gendal.2833596.1 Trojan
[NOTE] The file was moved to the quarantine directory under the name '1e79f306.qua'!
F:\utorrent L\AAS VSTi Plugins Pack-DrZM\Tassman v4.1.6\Keygen.exe
[DETECTION] Is the TR/Gendal.2833596.1 Trojan
[NOTE] The file was moved to the quarantine directory under the name '4638ea6f.qua'!
F:\utorrent L\AAS VSTi Plugins Pack-DrZM\Strum Electric GS-1 v1.0.2\Keygen.exe
[DETECTION] Is the TR/Gendal.2833596.1 Trojan
[NOTE] The file was moved to the quarantine directory under the name '6acc93a3.qua'!
F:\utorrent L\AAS VSTi Plugins Pack-DrZM\Strum Acoustic GS-1 v1.0.2\Keygen.exe
[DETECTION] Is the TR/Gendal.2833596.1 Trojan
[NOTE] The file was moved to the quarantine directory under the name '5432f379.qua'!
F:\utorrent L\AAS VSTi Plugins Pack-DrZM\String Studio VS-1 v1.1.3\Keygen.exe
[DETECTION] Is the TR/Gendal.2833596.1 Trojan
[NOTE] The file was moved to the quarantine directory under the name '373cd80a.qua'!
F:\utorrent L\AAS VSTi Plugins Pack-DrZM\Lounge Lizard EP-3 v3.1.4\Keygen.exe
[DETECTION] Is the TR/Gendal.2833596.1 Trojan
[NOTE] The file was moved to the quarantine directory under the name '11f49817.qua'!
F:\utorrent L\AAS VSTi Plugins Pack-DrZM\Keygen.exe
[DETECTION] Is the TR/Gendal.2833596.1 Trojan
[NOTE] The file was moved to the quarantine directory under the name '2360e3b2.qua'!
F:\utorrent L\SugarBytes.WOW.VST.v1.1.Incl.Keygen-AiR deposit files.rar
[DETECTION] Is the TR/Agent.282624.K Trojan
[NOTE] The file was moved to the quarantine directory under the name '290bc8fc.qua'!
F:\Jeux\FCE_Ultra_V2.12_win_Fr\fceux.exe
[DETECTION] Is the TR/Kazy.33257 Trojan
[NOTE] The file was moved to the quarantine directory under the name '165aac88.qua'!
D:\autre\2012_IGF_PIRATE_KART_1_2\data\games\Andrew Gray\Nudists Gone Wild\gargoyle data\git.exe
[DETECTION] Is the TR/Diple.yxe Trojan
[NOTE] The file was moved to the quarantine directory under the name '6867a091.qua'!
D:\autre\2012_IGF_PIRATE_KART_1_2\data\games\Andrew Gray\Gourmet Gaffe\gargoyle data\git.exe
[DETECTION] Is the TR/Diple.yxe Trojan
[NOTE] The file was moved to the quarantine directory under the name '3d1fa45a.qua'!
D:\autre\2012_IGF_PIRATE_KART_1_2\data\games\Andrew Gray\Go West\gargoyle data\git.exe
[DETECTION] Is the TR/Diple.yxe Trojan
[NOTE] The file was moved to the quarantine directory under the name '3089d572.qua'!
D:\autre\2012_IGF_PIRATE_KART_1_2\data\games\Andrew Gray\Don't Pee Yourself!\gargoyle data\git.exe
[DETECTION] Is the TR/Diple.yxe Trojan
[NOTE] The file was moved to the quarantine directory under the name '2cd4c17b.qua'!
C:\Users\christophe\Downloads\SUPERIOR DRUMMER 2.0 64 BITS COMPLETE\ToonTrack.Superior.Drummer.VSTi.RTAS.v2.2.3.x86.x64.UPDATE.Incl.Keygen-AiR.rar
[DETECTION] Is the TR/Gendal.191344 Trojan
[NOTE] The file was moved to the quarantine directory under the name '1d0c8cbe.qua'!
C:\Users\christophe\Downloads\Native.Instruments.Traktor.Pro.2.v2.6.2-Tracer\Reg-Patches (read nfo)\Traktor.Pro-VELOCITY.MIDI.STATION.EDITION.exe
[DETECTION] Is the TR/Dropper.Gen Trojan
[NOTE] The file was moved to the quarantine directory under the name '7144988d.qua'!
C:\Users\christophe\Downloads\Native.Instruments.Traktor.Pro.2.v2.6.2-Tracer\Reg-Patches (read nfo)\Traktor.Pro-SCRATCH.PRO.exe
[DETECTION] Is the TR/Dropper.Gen Trojan
[NOTE] The file was moved to the quarantine directory under the name '38debd8a.qua'!
C:\Users\christophe\Downloads\Native.Instruments.Traktor.Pro.2.v2.6.2-Tracer\Reg-Patches (read nfo)\Traktor.Pro-SCRATCH.DUO.exe
[DETECTION] Is the TR/Dropper.Gen Trojan
[NOTE] The file was moved to the quarantine directory under the name '634bb55b.qua'!
C:\Users\christophe\Downloads\Native.Instruments.Traktor.Pro.2.v2.6.2-Tracer\Reg-Patches (read nfo)\Traktor.Pro-PRO.exe
[DETECTION] Is the TR/Dropper.Gen Trojan
[NOTE] The file was moved to the quarantine directory under the name '05f9b9b2.qua'!
C:\Users\christophe\Downloads\Native.Instruments.Traktor.Pro.2.v2.6.2-Tracer\Reg-Patches (read nfo)\Traktor.Pro-PIONEER.DDJ-T1.EDITION .exe
[DETECTION] Is the TR/Dropper.Gen Trojan
[NOTE] The file was moved to the quarantine directory under the name '5277cb1a.qua'!
C:\Users\christophe\Downloads\Native.Instruments.Traktor.Pro.2.v2.6.2-Tracer\Reg-Patches (read nfo)\Traktor.Pro-NUMARK.4TRACK.EDITION.exe
[DETECTION] Is the TR/Dropper.Gen Trojan
[NOTE] The file was moved to the quarantine directory under the name '70079c6e.qua'!
C:\Users\christophe\Downloads\Native.Instruments.Traktor.Pro.2.v2.6.2-Tracer\Reg-Patches (read nfo)\Traktor.Pro-LE.exe
[DETECTION] Is the TR/Dropper.Gen Trojan
[NOTE] The file was moved to the quarantine directory under the name '1817e6f8.qua'!
C:\Users\christophe\Downloads\Native.Instruments.Traktor.Pro.2.v2.6.2-Tracer\Reg-Patches (read nfo)\Traktor.Pro-DUO.exe
[DETECTION] Is the TR/Dropper.Gen Trojan
[NOTE] The file was moved to the quarantine directory under the name '3861e27d.qua'!
End of the scan: samedi 3 janvier 2015 21:51
Used time: 2:10:14 Hour(s)
The scan has been done completely.
56485 Scanned directories
1242859 Files were scanned
47 Viruses and/or unwanted programs were found
0 Files were classified as suspicious
0 Files were deleted
0 Viruses and unwanted programs were repaired
36 Files were moved to quarantine
0 Files were renamed
0 Files cannot be scanned
1242812 Files not concerned
12257 Archives were scanned
11 Warnings
36 Notes
833148 Objects were scanned with rootkit scan
0 Hidden objects were found
cristof77
Messages postés
135
Date d'inscription
samedi 7 juillet 2007
Statut
Membre
Dernière intervention
20 juillet 2020
4
4 janv. 2015 à 00:40
4 janv. 2015 à 00:40