J'ai moi aussi un cheval de troie
galaxy87
-
Regis59 Messages postés 21143 Date d'inscription Statut Contributeur sécurité Dernière intervention -
Regis59 Messages postés 21143 Date d'inscription Statut Contributeur sécurité Dernière intervention -
Bonjour à tous,
Je ne vais pas être trés originale, mon ordi est infecté par un cheval de troie et forcément je n'y comprends rien car je suis nulle en informatique c'est pourquoi je demande votre aide...
Voici une chronologie des évênements:
Il y a quelques jours une fille que je connais via un site de mariage m'envoie un fichier sur msn genre :"regarde l'album que j'ai préparé pour toi", je me suis dit chouette des photos de son mariage et hop je clique, ça télécharge et plus rien pas de photos donc dans le doute j'annule tout.
Trois minutes aprés elle affiche ce message :"N'OUVREZ PAS CE FICHIER SVP", trop tard j'étais tombée dans le panneau!
Bref, quelques jours plus tard, ma soeur reçoit de ma part un message avec: "c'est toi sur ces tofs", maligne la petite elle m'appelle et me demande si c'est moi sur msn, et bien non ce n'était pas moi, j'étais connectée mais pas devant le PC, j'ai donc compris que j'étais piégée!!!
J'ai scanné mon PC avec avast et il me note:
FIchier: j'en ai plusieurs d'infectés
Nom du fichier malveillant: Win32:Agent-ITI [Trj]
Type de logiciel malveillant: Cheval de Troie
action recommandée: mettre en quarantaine
ce que j'ai fait mais ça sert à rien.
J'ai changé mon mot de passe et ma question secrète, c'était nickel pendant quelques jours et hop ça recommence.
Je sais que nous sommes trés trés nombreux à être dans le même cas mais je vous remercie de la patience dont vous feriez preuve en m'aidant.
A bientôt
galaxy87
Je ne vais pas être trés originale, mon ordi est infecté par un cheval de troie et forcément je n'y comprends rien car je suis nulle en informatique c'est pourquoi je demande votre aide...
Voici une chronologie des évênements:
Il y a quelques jours une fille que je connais via un site de mariage m'envoie un fichier sur msn genre :"regarde l'album que j'ai préparé pour toi", je me suis dit chouette des photos de son mariage et hop je clique, ça télécharge et plus rien pas de photos donc dans le doute j'annule tout.
Trois minutes aprés elle affiche ce message :"N'OUVREZ PAS CE FICHIER SVP", trop tard j'étais tombée dans le panneau!
Bref, quelques jours plus tard, ma soeur reçoit de ma part un message avec: "c'est toi sur ces tofs", maligne la petite elle m'appelle et me demande si c'est moi sur msn, et bien non ce n'était pas moi, j'étais connectée mais pas devant le PC, j'ai donc compris que j'étais piégée!!!
J'ai scanné mon PC avec avast et il me note:
FIchier: j'en ai plusieurs d'infectés
Nom du fichier malveillant: Win32:Agent-ITI [Trj]
Type de logiciel malveillant: Cheval de Troie
action recommandée: mettre en quarantaine
ce que j'ai fait mais ça sert à rien.
J'ai changé mon mot de passe et ma question secrète, c'était nickel pendant quelques jours et hop ça recommence.
Je sais que nous sommes trés trés nombreux à être dans le même cas mais je vous remercie de la patience dont vous feriez preuve en m'aidant.
A bientôt
galaxy87
A voir également:
- J'ai moi aussi un cheval de troie
- Comment supprimer cheval de troie gratuitement - Télécharger - Antivirus & Antimalwares
- Ordinateur bloqué cheval de troie - Accueil - Arnaque
- Cheval de troie virus - Accueil - Virus
- Jeux de petit chevaux gratuit à télécharger - Télécharger - Jeux vidéo
- Comment se débarrasser d'un cheval de troie ✓ - Forum Virus
53 réponses
ok dis moi demain quel pare feu tu me conseille car tu as bien deviné et c'est windows!!!
Bonne nuit
Bonne nuit
Bonjour!
J'ai dormi comme un bébé, je viens que de me réveiller, j'ai honte lol j'ai regardé l'île de la tentation, c'est n'importe quoi, faut être tordu pour y emmener son mec! lol
Faut il que je désinstalle le pare feu de windows chef lol?
A+
Do
J'ai dormi comme un bébé, je viens que de me réveiller, j'ai honte lol j'ai regardé l'île de la tentation, c'est n'importe quoi, faut être tordu pour y emmener son mec! lol
Faut il que je désinstalle le pare feu de windows chef lol?
A+
Do
j'ai installé et puis désinstallé Zone Alarm parce qu'il me désactive antivir!!! Ils sont peut être pas compatibles?
En plus il m'empêchait l'accés internet ?!?!
En plus il m'empêchait l'accés internet ?!?!
Vous n’avez pas trouvé la réponse que vous recherchez ?
Posez votre question
j'avais pas fait attention qu'on pouvait voir le profil ! par contre je peux pas voir la photo y'a une croix ! C'est normal?
Antivir a fait un petit scanne. A priori il a trouvé des "intrus", voici le rapport:
AntiVir PersonalEdition Classic
Report file date: mercredi 11 juillet 2007 11:37
Scanning for 879305 virus strains and unwanted programs.
Licensed to: Avira AntiVir PersonalEdition Classic
Serial number: 0000149996-ADJIE-0001
Platform: Windows XP
Windows version: (Service Pack 2) [5.1.2600]
Username: FERREIRA GARCEZ
Computer name: NELSON
Version information:
BUILD.DAT : 247 14437 Bytes 10/05/2007 11:55:00
AVSCAN.EXE : 7.0.4.15 282664 Bytes 20/04/2007 11:37:16
AVSCAN.DLL : 7.0.4.4 33832 Bytes 27/03/2007 11:31:56
LUKE.DLL : 7.0.4.11 143400 Bytes 27/03/2007 11:26:06
LUKERES.DLL : 7.0.4.0 10280 Bytes 19/03/2007 11:19:00
ANTIVIR0.VDF : 6.35.0.1 7371264 Bytes 31/05/2006 13:08:58
ANTIVIR1.VDF : 6.38.1.170 5569024 Bytes 21/05/2007 14:53:04
ANTIVIR2.VDF : 6.39.0.115 1186304 Bytes 08/07/2007 14:53:04
ANTIVIR3.VDF : 6.39.0.128 133120 Bytes 10/07/2007 14:53:04
AVEWIN32.DLL : 7.4.0.39 2482688 Bytes 10/07/2007 14:53:04
AVWINLL.DLL : 1.0.0.7 14376 Bytes 26/02/2007 09:36:28
AVPREF.DLL : 7.0.2.1 24616 Bytes 27/03/2007 11:31:52
AVREP.DLL : 7.0.0.1 155688 Bytes 16/04/2007 12:16:24
AVPACK32.DLL : 7.3.0.13 360488 Bytes 10/07/2007 14:53:06
AVREG.DLL : 7.0.1.2 31784 Bytes 15/03/2007 08:05:10
AVEVTLOG.DLL : 7.0.0.18 86056 Bytes 27/03/2007 11:16:06
AVARKT.DLL : 1.0.0.17 278568 Bytes 02/05/2007 10:32:28
NETNT.DLL : 7.0.0.0 7720 Bytes 08/03/2007 10:09:44
RCIMAGE.DLL : 7.0.1.15 2228264 Bytes 13/03/2007 09:46:20
RCTEXT.DLL : 7.0.45.0 86056 Bytes 19/03/2007 11:42:44
Configuration settings for the scan:
Jobname..........................: Local Drives
Configuration file...............: C:\Program Files\AntiVir PersonalEdition Classic\alldrives.avp
Logging..........................: low
Primary action...................: interactive
Secondary action.................: ignore
Scan master boot sector..........: off
Scan boot sector.................: on
Boot sectors.....................: E:,
Scan memory......................: on
Process scan.....................: on
Scan registry....................: on
Search for rootkits..............: off
Scan all files...................: Intelligent file selection
Scan archives....................: on
Recursion depth..................: 20
Smart extensions.................: on
Macro heuristic..................: on
File heuristic...................: medium
Start of the scan: mercredi 11 juillet 2007 11:37
The scan of running processes will be started
Scan process 'avscan.exe' - '1' Module(s) have been scanned
Scan process 'avcenter.exe' - '1' Module(s) have been scanned
Scan process 'WLLoginProxy.exe' - '1' Module(s) have been scanned
Scan process 'IEXPLORE.EXE' - '1' Module(s) have been scanned
Scan process 'wuauclt.exe' - '1' Module(s) have been scanned
Scan process 'ALG.EXE' - '1' Module(s) have been scanned
Scan process 'WZQKPICK.EXE' - '1' Module(s) have been scanned
Scan process 'BlueSoleil.exe' - '1' Module(s) have been scanned
Scan process 'SERVIC~1.EXE' - '1' Module(s) have been scanned
Scan process 'NMIndexStoreSvr.exe' - '1' Module(s) have been scanned
Scan process 'WLANUTL.EXE' - '1' Module(s) have been scanned
Scan process 'GoogleToolbarNotifier.exe' - '1' Module(s) have been scanned
Scan process 'MSMSGS.EXE' - '1' Module(s) have been scanned
Scan process 'MSNMSGR.EXE' - '1' Module(s) have been scanned
Scan process 'SVCHOST.EXE' - '1' Module(s) have been scanned
Scan process 'NMBgMonitor.exe' - '1' Module(s) have been scanned
Scan process 'AVGNT.EXE' - '1' Module(s) have been scanned
Scan process 'QTTASK.EXE' - '1' Module(s) have been scanned
Scan process 'LAUNCH~1.EXE' - '1' Module(s) have been scanned
Scan process 'AGRSMMSG.EXE' - '1' Module(s) have been scanned
Scan process 'BTNtService.exe' - '1' Module(s) have been scanned
Scan process 'SOUNDMAN.EXE' - '1' Module(s) have been scanned
Scan process 'SCHED.EXE' - '1' Module(s) have been scanned
Scan process 'AVGUARD.EXE' - '1' Module(s) have been scanned
Scan process 'SPOOLSV.EXE' - '1' Module(s) have been scanned
Scan process 'EXPLORER.EXE' - '1' Module(s) have been scanned
Scan process 'SVCHOST.EXE' - '1' Module(s) have been scanned
Scan process 'SVCHOST.EXE' - '1' Module(s) have been scanned
Scan process 'SVCHOST.EXE' - '1' Module(s) have been scanned
Scan process 'SVCHOST.EXE' - '1' Module(s) have been scanned
Scan process 'SVCHOST.EXE' - '1' Module(s) have been scanned
Scan process 'LSASS.EXE' - '1' Module(s) have been scanned
Scan process 'SERVICES.EXE' - '1' Module(s) have been scanned
Scan process 'WINLOGON.EXE' - '1' Module(s) have been scanned
Scan process 'CSRSS.EXE' - '1' Module(s) have been scanned
Scan process 'SMSS.EXE' - '1' Module(s) have been scanned
36 processes with 36 modules were scanned
Start scanning boot sectors:
Boot sector 'C:\'
[NOTE] No virus was found!
Boot sector 'D:\'
[NOTE] No virus was found!
Boot sector 'F:\'
[NOTE] In the drive 'F:\' no data medium is inserted!
Boot sector 'G:\'
[NOTE] In the drive 'G:\' no data medium is inserted!
Boot sector 'H:\'
[NOTE] In the drive 'H:\' no data medium is inserted!
Boot sector 'I:\'
[NOTE] In the drive 'I:\' no data medium is inserted!
Starting to scan the registry.
The registry was scanned ( '21' files ).
Starting the file scan:
Begin scan in 'C:\'
C:\hiberfil.sys
[WARNING] The file could not be opened!
C:\pagefile.sys
[WARNING] The file could not be opened!
C:\install\install.exe
[DETECTION] Is the Trojan horse TR/VB.aqc
[INFO] The file was moved to '4707a678.qua'!
C:\WINDOWS\myalbum2007.zip
[DETECTION] Contains signature of the worm WORM/IRCBot.ACD
[INFO] The file was moved to '46f5a698.qua'!
C:\Documents and Settings\FERREIRA GARCEZ\anopry.exe
[DETECTION] Contains a signature of the (dangerous) backdoor program BDS/Bifrose.NU Backdoor server programs
[INFO] The file was moved to '4703a9f4.qua'!
C:\Documents and Settings\FERREIRA GARCEZ\lehubo.exe
[DETECTION] Contains signature of the dropper DR/Dldr.IstBar.124756
[INFO] The file was moved to '46fca9f4.qua'!
C:\Documents and Settings\FERREIRA GARCEZ\jkgael.exe
[DETECTION] Contains a signature of the (dangerous) backdoor program BDS/Bifrose.NU Backdoor server programs
[INFO] The file was moved to '46fbaa00.qua'!
C:\Documents and Settings\FERREIRA GARCEZ\xcmysx.exe
[DETECTION] Is the Trojan horse TR/Crypt.ULPM.Gen
[INFO] The file was moved to '4701a9fd.qua'!
C:\Documents and Settings\FERREIRA GARCEZ\lngijt.exe
[DETECTION] Is the Trojan horse TR/Crypt.ULPM.Gen
[INFO] The file was moved to '46fbaa0b.qua'!
C:\Documents and Settings\FERREIRA GARCEZ\xcjigj.exe
[DETECTION] Is the Trojan horse TR/Crypt.ULPM.Gen
[INFO] The file was moved to '46feaa02.qua'!
C:\Documents and Settings\FERREIRA GARCEZ\bjquwd.exe
[DETECTION] Is the Trojan horse TR/Crypt.ULPM.Gen
[INFO] The file was moved to '4705aa0c.qua'!
C:\Documents and Settings\FERREIRA GARCEZ\fwyhda.exe
[DETECTION] Is the Trojan horse TR/Crypt.ULPM.Gen
[INFO] The file was moved to '470daa1c.qua'!
C:\Documents and Settings\FERREIRA GARCEZ\sqtdmc.exe
[DETECTION] Contains signature of the dropper DR/Dldr.IstBar.124756
[INFO] The file was moved to '4708aa19.qua'!
C:\Documents and Settings\FERREIRA GARCEZ\dxggia.exe
[DETECTION] Contains signature of the dropper DR/Dldr.IstBar.124756
[INFO] The file was moved to '46fbaa23.qua'!
C:\Documents and Settings\FERREIRA GARCEZ\xfkjzu.exe
[DETECTION] Is the Trojan horse TR/Crypt.ULPM.Gen
[INFO] The file was moved to '46ffaa13.qua'!
C:\Documents and Settings\FERREIRA GARCEZ\csasgj.exe
[DETECTION] Is the Trojan horse TR/Crypt.ULPM.Gen
[INFO] The file was moved to '46f5aa22.qua'!
C:\Documents and Settings\FERREIRA GARCEZ\xtsbbh.exe
[DETECTION] Is the Trojan horse TR/Crypt.ULPM.Gen
[INFO] The file was moved to '4707aa25.qua'!
C:\Documents and Settings\FERREIRA GARCEZ\azjfwg.exe
[DETECTION] Is the Trojan horse TR/Crypt.ULPM.Gen
[INFO] The file was moved to '46feaa2d.qua'!
C:\Documents and Settings\FERREIRA GARCEZ\dwjbtc.exe
[DETECTION] Contains signature of the dropper DR/Dldr.IstBar.124756
[INFO] The file was moved to '46feaa2c.qua'!
C:\Documents and Settings\FERREIRA GARCEZ\mcitlz.exe
[DETECTION] Contains signature of the dropper DR/Dldr.IstBar.124756
[INFO] The file was moved to '46fdaa1b.qua'!
C:\Documents and Settings\FERREIRA GARCEZ\qlmtps.exe
[DETECTION] Contains signature of the dropper DR/Dldr.IstBar.124756
[INFO] The file was moved to '4701aa26.qua'!
C:\Documents and Settings\FERREIRA GARCEZ\teqycy.exe
[DETECTION] Contains signature of the dropper DR/Dldr.IstBar.124756
[INFO] The file was moved to '4705aa21.qua'!
C:\Documents and Settings\FERREIRA GARCEZ\humzzi.exe
[DETECTION] Contains signature of the dropper DR/Dldr.IstBar.124756
[INFO] The file was moved to '4701aa34.qua'!
C:\Documents and Settings\FERREIRA GARCEZ\sgkhzj.exe
[DETECTION] Contains signature of the dropper DR/Dldr.IstBar.124756
[INFO] The file was moved to '46ffaa28.qua'!
C:\Documents and Settings\FERREIRA GARCEZ\uswnts.exe
[DETECTION] Contains signature of the dropper DR/Dldr.IstBar.124756
[INFO] The file was moved to '470baa36.qua'!
C:\Documents and Settings\FERREIRA GARCEZ\anqpwo.exe
[DETECTION] Contains signature of the dropper DR/Dldr.IstBar.124756
[INFO] The file was moved to '4705aa34.qua'!
C:\Documents and Settings\FERREIRA GARCEZ\yqmwxl.exe
[DETECTION] Contains signature of the dropper DR/Dldr.IstBar.124756
[INFO] The file was moved to '4701aa39.qua'!
C:\Documents and Settings\FERREIRA GARCEZ\rqmolc.exe
[DETECTION] Contains signature of the dropper DR/Dldr.IstBar.124756
[INFO] The file was moved to '4701aa3b.qua'!
C:\Documents and Settings\FERREIRA GARCEZ\yujfcg.exe
[DETECTION] Contains signature of the dropper DR/Dldr.IstBar.124756
[INFO] The file was moved to '46feaa43.qua'!
C:\Documents and Settings\FERREIRA GARCEZ\mtqqwh.exe
[DETECTION] Contains signature of the dropper DR/Dldr.IstBar.124756
[INFO] The file was moved to '4705aa45.qua'!
C:\Documents and Settings\FERREIRA GARCEZ\wlwzmv.exe
[DETECTION] Contains signature of the dropper DR/Dldr.IstBar.124756
[INFO] The file was moved to '470baa3f.qua'!
C:\Documents and Settings\FERREIRA GARCEZ\pckbrn.exe
[DETECTION] Contains signature of the dropper DR/Dldr.IstBar.124756
[INFO] The file was moved to '46ffaa38.qua'!
C:\Documents and Settings\FERREIRA GARCEZ\somfvv.exe
[DETECTION] Contains signature of the dropper DR/Dldr.IstBar.124756
[INFO] The file was deleted!
C:\Documents and Settings\FERREIRA GARCEZ\Mes documents\Mes fichiers reçus\myalbum2007.zip
[DETECTION] Contains signature of the worm WORM/IRCBot.ACD
[INFO] The file was deleted!
C:\System Volume Information\_restore{1A329E54-0689-4F2C-B0F8-A0B20A7B0829}\RP504\A0112481.exe
[DETECTION] Is the Trojan horse TR/VB.aqc
[INFO] The file was deleted!
C:\System Volume Information\_restore{1A329E54-0689-4F2C-B0F8-A0B20A7B0829}\RP504\A0113498.dll
[DETECTION] Contains signature of the worm WORM/IRCBot.24040
[INFO] The file was moved to '46c5ad86.qua'!
C:\System Volume Information\_restore{1A329E54-0689-4F2C-B0F8-A0B20A7B0829}\RP505\A0114601.exe
[DETECTION] Is the Trojan horse TR/Dldr.Swizzor.Gen
[INFO] The file was moved to '46c5ad8b.qua'!
C:\System Volume Information\_restore{1A329E54-0689-4F2C-B0F8-A0B20A7B0829}\RP505\A0114602.exe
[DETECTION] Is the Trojan horse TR/Dldr.Swizzor.Gen
[INFO] The file was moved to '46c5ad8d.qua'!
C:\System Volume Information\_restore{1A329E54-0689-4F2C-B0F8-A0B20A7B0829}\RP505\A0114603.exe
[DETECTION] Is the Trojan horse TR/Dldr.Swizzor.Gen
[INFO] The file was moved to '46c5ad90.qua'!
C:\System Volume Information\_restore{1A329E54-0689-4F2C-B0F8-A0B20A7B0829}\RP505\A0114604.exe
[DETECTION] Is the Trojan horse TR/Dldr.Swizzor.Gen
[INFO] The file was moved to '46c5ad92.qua'!
C:\System Volume Information\_restore{1A329E54-0689-4F2C-B0F8-A0B20A7B0829}\RP505\A0114605.exe
[DETECTION] Is the Trojan horse TR/Dldr.Swizzor.Gen
[INFO] The file was moved to '46c5ad94.qua'!
C:\System Volume Information\_restore{1A329E54-0689-4F2C-B0F8-A0B20A7B0829}\RP505\A0114606.exe
[DETECTION] Is the Trojan horse TR/Dldr.Swizzor.Gen
[INFO] The file was moved to '46c5ad96.qua'!
C:\System Volume Information\_restore{1A329E54-0689-4F2C-B0F8-A0B20A7B0829}\RP505\A0114607.exe
[DETECTION] Is the Trojan horse TR/Dldr.Swizzor.Gen
[INFO] The file was moved to '46c5ad98.qua'!
C:\System Volume Information\_restore{1A329E54-0689-4F2C-B0F8-A0B20A7B0829}\RP505\A0114608.exe
[DETECTION] Is the Trojan horse TR/Dldr.Swizzor.Gen
[INFO] The file was moved to '46c5ad9a.qua'!
C:\System Volume Information\_restore{1A329E54-0689-4F2C-B0F8-A0B20A7B0829}\RP506\A0114929.exe
[DETECTION] Is the Trojan horse TR/VB.aqc
[INFO] The file was moved to '46c5ada5.qua'!
C:\System Volume Information\_restore{1A329E54-0689-4F2C-B0F8-A0B20A7B0829}\RP506\A0114930.exe
[DETECTION] Contains a signature of the (dangerous) backdoor program BDS/Bifrose.NU Backdoor server programs
[INFO] The file was moved to '46c5ada7.qua'!
C:\System Volume Information\_restore{1A329E54-0689-4F2C-B0F8-A0B20A7B0829}\RP506\A0114931.exe
[DETECTION] Contains signature of the dropper DR/Dldr.IstBar.124756
[INFO] The file was moved to '46c5ada9.qua'!
C:\System Volume Information\_restore{1A329E54-0689-4F2C-B0F8-A0B20A7B0829}\RP506\A0114932.exe
[DETECTION] Contains a signature of the (dangerous) backdoor program BDS/Bifrose.NU Backdoor server programs
[INFO] The file was moved to '46c5adab.qua'!
C:\System Volume Information\_restore{1A329E54-0689-4F2C-B0F8-A0B20A7B0829}\RP506\A0114933.exe
[DETECTION] Is the Trojan horse TR/Crypt.ULPM.Gen
[INFO] The file was moved to '46c5adad.qua'!
C:\System Volume Information\_restore{1A329E54-0689-4F2C-B0F8-A0B20A7B0829}\RP506\A0114934.exe
[DETECTION] Is the Trojan horse TR/Crypt.ULPM.Gen
[INFO] The file was moved to '46c5adaf.qua'!
C:\System Volume Information\_restore{1A329E54-0689-4F2C-B0F8-A0B20A7B0829}\RP506\A0114935.exe
[DETECTION] Is the Trojan horse TR/Crypt.ULPM.Gen
[INFO] The file was moved to '46c5adb0.qua'!
C:\System Volume Information\_restore{1A329E54-0689-4F2C-B0F8-A0B20A7B0829}\RP506\A0114936.exe
[DETECTION] Is the Trojan horse TR/Crypt.ULPM.Gen
[INFO] The file was moved to '46c5adb2.qua'!
C:\System Volume Information\_restore{1A329E54-0689-4F2C-B0F8-A0B20A7B0829}\RP506\A0114937.exe
[DETECTION] Is the Trojan horse TR/Crypt.ULPM.Gen
[INFO] The file was moved to '46c5adb4.qua'!
C:\System Volume Information\_restore{1A329E54-0689-4F2C-B0F8-A0B20A7B0829}\RP506\A0114938.exe
[DETECTION] Contains signature of the dropper DR/Dldr.IstBar.124756
[INFO] The file was moved to '46c5adb5.qua'!
C:\System Volume Information\_restore{1A329E54-0689-4F2C-B0F8-A0B20A7B0829}\RP506\A0114939.exe
[DETECTION] Contains signature of the dropper DR/Dldr.IstBar.124756
[INFO] The file was moved to '46c5adb7.qua'!
C:\System Volume Information\_restore{1A329E54-0689-4F2C-B0F8-A0B20A7B0829}\RP506\A0114940.exe
[DETECTION] Is the Trojan horse TR/Crypt.ULPM.Gen
[INFO] The file was moved to '46c5adb9.qua'!
C:\System Volume Information\_restore{1A329E54-0689-4F2C-B0F8-A0B20A7B0829}\RP506\A0114941.exe
[DETECTION] Is the Trojan horse TR/Crypt.ULPM.Gen
[INFO] The file was moved to '46c5adba.qua'!
C:\System Volume Information\_restore{1A329E54-0689-4F2C-B0F8-A0B20A7B0829}\RP506\A0114942.exe
[DETECTION] Is the Trojan horse TR/Crypt.ULPM.Gen
[INFO] The file was moved to '46c5adbc.qua'!
C:\System Volume Information\_restore{1A329E54-0689-4F2C-B0F8-A0B20A7B0829}\RP506\A0114943.exe
[DETECTION] Is the Trojan horse TR/Crypt.ULPM.Gen
[INFO] The file was moved to '46c5adbd.qua'!
C:\System Volume Information\_restore{1A329E54-0689-4F2C-B0F8-A0B20A7B0829}\RP506\A0114944.exe
[DETECTION] Contains signature of the dropper DR/Dldr.IstBar.124756
[INFO] The file was moved to '46c5adbf.qua'!
C:\System Volume Information\_restore{1A329E54-0689-4F2C-B0F8-A0B20A7B0829}\RP506\A0114945.exe
[DETECTION] Contains signature of the dropper DR/Dldr.IstBar.124756
[INFO] The file was moved to '46c5adc1.qua'!
C:\System Volume Information\_restore{1A329E54-0689-4F2C-B0F8-A0B20A7B0829}\RP506\A0114946.exe
[DETECTION] Contains signature of the dropper DR/Dldr.IstBar.124756
[INFO] The file was moved to '46c5adc3.qua'!
C:\System Volume Information\_restore{1A329E54-0689-4F2C-B0F8-A0B20A7B0829}\RP506\A0114947.exe
[DETECTION] Contains signature of the dropper DR/Dldr.IstBar.124756
[INFO] The file was moved to '46c5adc5.qua'!
C:\System Volume Information\_restore{1A329E54-0689-4F2C-B0F8-A0B20A7B0829}\RP506\A0114948.exe
[DETECTION] Contains signature of the dropper DR/Dldr.IstBar.124756
[INFO] The file was moved to '46c5adc6.qua'!
C:\System Volume Information\_restore{1A329E54-0689-4F2C-B0F8-A0B20A7B0829}\RP506\A0114949.exe
[DETECTION] Contains signature of the dropper DR/Dldr.IstBar.124756
[INFO] The file was moved to '46c5adc8.qua'!
C:\System Volume Information\_restore{1A329E54-0689-4F2C-B0F8-A0B20A7B0829}\RP506\A0114950.exe
[DETECTION] Contains signature of the dropper DR/Dldr.IstBar.124756
[INFO] The file was moved to '46c5adca.qua'!
C:\System Volume Information\_restore{1A329E54-0689-4F2C-B0F8-A0B20A7B0829}\RP506\A0114951.exe
[DETECTION] Contains signature of the dropper DR/Dldr.IstBar.124756
[INFO] The file was moved to '46c5adcc.qua'!
C:\System Volume Information\_restore{1A329E54-0689-4F2C-B0F8-A0B20A7B0829}\RP506\A0114952.exe
[DETECTION] Contains signature of the dropper DR/Dldr.IstBar.124756
[INFO] The file was moved to '46c5adcd.qua'!
C:\System Volume Information\_restore{1A329E54-0689-4F2C-B0F8-A0B20A7B0829}\RP506\A0114953.exe
[DETECTION] Contains signature of the dropper DR/Dldr.IstBar.124756
[INFO] The file was moved to '46c5adcf.qua'!
C:\System Volume Information\_restore{1A329E54-0689-4F2C-B0F8-A0B20A7B0829}\RP506\A0114954.exe
[DETECTION] Contains signature of the dropper DR/Dldr.IstBar.124756
[INFO] The file was moved to '46c5add1.qua'!
C:\System Volume Information\_restore{1A329E54-0689-4F2C-B0F8-A0B20A7B0829}\RP506\A0114955.exe
[DETECTION] Contains signature of the dropper DR/Dldr.IstBar.124756
[INFO] The file was moved to '46c5add3.qua'!
C:\System Volume Information\_restore{1A329E54-0689-4F2C-B0F8-A0B20A7B0829}\RP506\A0114956.exe
[DETECTION] Contains signature of the dropper DR/Dldr.IstBar.124756
[INFO] The file was moved to '46c5add4.qua'!
C:\System Volume Information\_restore{1A329E54-0689-4F2C-B0F8-A0B20A7B0829}\RP506\A0114957.exe
[DETECTION] Contains signature of the dropper DR/Dldr.IstBar.124756
[INFO] The file was moved to '46c5add6.qua'!
C:\System Volume Information\_restore{1A329E54-0689-4F2C-B0F8-A0B20A7B0829}\RP506\A0114958.exe
[DETECTION] Contains signature of the dropper DR/Dldr.IstBar.124756
[INFO] The file was moved to '46c5addb.qua'!
C:\System Volume Information\_restore{1A329E54-0689-4F2C-B0F8-A0B20A7B0829}\RP421\A0086545.exe
[DETECTION] Is the Trojan horse TR/Dldr.Swizzor.Gen
[INFO] The file was moved to '46c4ade4.qua'!
C:\System Volume Information\_restore{1A329E54-0689-4F2C-B0F8-A0B20A7B0829}\RP421\A0086546.exe
[DETECTION] Is the Trojan horse TR/Dldr.Swizzor.Gen
[INFO] The file was moved to '46c4ade7.qua'!
C:\System Volume Information\_restore{1A329E54-0689-4F2C-B0F8-A0B20A7B0829}\RP421\A0086547.exe
[DETECTION] Is the Trojan horse TR/Dldr.Swizzor.Gen
[INFO] The file was moved to '46c4ade9.qua'!
C:\!KillBox\sysprinters.dll
[DETECTION] Contains signature of the worm WORM/IRCBot.24040
[INFO] The file was moved to '4707ae6c.qua'!
Begin scan in 'D:\'
Search path D:\ could not be opened!
Le volume ne contient pas de système de fichiers connu. Vérifiez si tous les pilotes de système
de fichiers nécessaires sont chargés et si le volume n'est pas endommagé.
Begin scan in 'F:\'
Search path F:\ could not be opened!
Le périphérique n'est pas prêt.
Begin scan in 'G:\'
Search path G:\ could not be opened!
Le périphérique n'est pas prêt.
Begin scan in 'H:\'
Search path H:\ could not be opened!
Le périphérique n'est pas prêt.
Begin scan in 'I:\'
Search path I:\ could not be opened!
Le périphérique n'est pas prêt.
Begin scan in 'E:\'
Search path E:\ could not be opened!
Le périphérique n'est pas prêt.
End of the scan: mercredi 11 juillet 2007 12:16
Used time: 38:55 min
The scan has been done completely.
3620 Scanning directories
156686 Files were scanned
76 viruses and/or unwanted programs were found
0 classified as suspicious:
3 files were deleted
0 files were repaired
73 files were moved to quarantine
0 files were renamed
2 Files cannot be scanned
156610 Files not concerned
6518 Archives were scanned
2 Warnings
0 Notes
0 Hidden objects were found
Qu'en pense tu?
Merci
(maintenant que je t'ai trouvé je vais pas te laché lol)
AntiVir PersonalEdition Classic
Report file date: mercredi 11 juillet 2007 11:37
Scanning for 879305 virus strains and unwanted programs.
Licensed to: Avira AntiVir PersonalEdition Classic
Serial number: 0000149996-ADJIE-0001
Platform: Windows XP
Windows version: (Service Pack 2) [5.1.2600]
Username: FERREIRA GARCEZ
Computer name: NELSON
Version information:
BUILD.DAT : 247 14437 Bytes 10/05/2007 11:55:00
AVSCAN.EXE : 7.0.4.15 282664 Bytes 20/04/2007 11:37:16
AVSCAN.DLL : 7.0.4.4 33832 Bytes 27/03/2007 11:31:56
LUKE.DLL : 7.0.4.11 143400 Bytes 27/03/2007 11:26:06
LUKERES.DLL : 7.0.4.0 10280 Bytes 19/03/2007 11:19:00
ANTIVIR0.VDF : 6.35.0.1 7371264 Bytes 31/05/2006 13:08:58
ANTIVIR1.VDF : 6.38.1.170 5569024 Bytes 21/05/2007 14:53:04
ANTIVIR2.VDF : 6.39.0.115 1186304 Bytes 08/07/2007 14:53:04
ANTIVIR3.VDF : 6.39.0.128 133120 Bytes 10/07/2007 14:53:04
AVEWIN32.DLL : 7.4.0.39 2482688 Bytes 10/07/2007 14:53:04
AVWINLL.DLL : 1.0.0.7 14376 Bytes 26/02/2007 09:36:28
AVPREF.DLL : 7.0.2.1 24616 Bytes 27/03/2007 11:31:52
AVREP.DLL : 7.0.0.1 155688 Bytes 16/04/2007 12:16:24
AVPACK32.DLL : 7.3.0.13 360488 Bytes 10/07/2007 14:53:06
AVREG.DLL : 7.0.1.2 31784 Bytes 15/03/2007 08:05:10
AVEVTLOG.DLL : 7.0.0.18 86056 Bytes 27/03/2007 11:16:06
AVARKT.DLL : 1.0.0.17 278568 Bytes 02/05/2007 10:32:28
NETNT.DLL : 7.0.0.0 7720 Bytes 08/03/2007 10:09:44
RCIMAGE.DLL : 7.0.1.15 2228264 Bytes 13/03/2007 09:46:20
RCTEXT.DLL : 7.0.45.0 86056 Bytes 19/03/2007 11:42:44
Configuration settings for the scan:
Jobname..........................: Local Drives
Configuration file...............: C:\Program Files\AntiVir PersonalEdition Classic\alldrives.avp
Logging..........................: low
Primary action...................: interactive
Secondary action.................: ignore
Scan master boot sector..........: off
Scan boot sector.................: on
Boot sectors.....................: E:,
Scan memory......................: on
Process scan.....................: on
Scan registry....................: on
Search for rootkits..............: off
Scan all files...................: Intelligent file selection
Scan archives....................: on
Recursion depth..................: 20
Smart extensions.................: on
Macro heuristic..................: on
File heuristic...................: medium
Start of the scan: mercredi 11 juillet 2007 11:37
The scan of running processes will be started
Scan process 'avscan.exe' - '1' Module(s) have been scanned
Scan process 'avcenter.exe' - '1' Module(s) have been scanned
Scan process 'WLLoginProxy.exe' - '1' Module(s) have been scanned
Scan process 'IEXPLORE.EXE' - '1' Module(s) have been scanned
Scan process 'wuauclt.exe' - '1' Module(s) have been scanned
Scan process 'ALG.EXE' - '1' Module(s) have been scanned
Scan process 'WZQKPICK.EXE' - '1' Module(s) have been scanned
Scan process 'BlueSoleil.exe' - '1' Module(s) have been scanned
Scan process 'SERVIC~1.EXE' - '1' Module(s) have been scanned
Scan process 'NMIndexStoreSvr.exe' - '1' Module(s) have been scanned
Scan process 'WLANUTL.EXE' - '1' Module(s) have been scanned
Scan process 'GoogleToolbarNotifier.exe' - '1' Module(s) have been scanned
Scan process 'MSMSGS.EXE' - '1' Module(s) have been scanned
Scan process 'MSNMSGR.EXE' - '1' Module(s) have been scanned
Scan process 'SVCHOST.EXE' - '1' Module(s) have been scanned
Scan process 'NMBgMonitor.exe' - '1' Module(s) have been scanned
Scan process 'AVGNT.EXE' - '1' Module(s) have been scanned
Scan process 'QTTASK.EXE' - '1' Module(s) have been scanned
Scan process 'LAUNCH~1.EXE' - '1' Module(s) have been scanned
Scan process 'AGRSMMSG.EXE' - '1' Module(s) have been scanned
Scan process 'BTNtService.exe' - '1' Module(s) have been scanned
Scan process 'SOUNDMAN.EXE' - '1' Module(s) have been scanned
Scan process 'SCHED.EXE' - '1' Module(s) have been scanned
Scan process 'AVGUARD.EXE' - '1' Module(s) have been scanned
Scan process 'SPOOLSV.EXE' - '1' Module(s) have been scanned
Scan process 'EXPLORER.EXE' - '1' Module(s) have been scanned
Scan process 'SVCHOST.EXE' - '1' Module(s) have been scanned
Scan process 'SVCHOST.EXE' - '1' Module(s) have been scanned
Scan process 'SVCHOST.EXE' - '1' Module(s) have been scanned
Scan process 'SVCHOST.EXE' - '1' Module(s) have been scanned
Scan process 'SVCHOST.EXE' - '1' Module(s) have been scanned
Scan process 'LSASS.EXE' - '1' Module(s) have been scanned
Scan process 'SERVICES.EXE' - '1' Module(s) have been scanned
Scan process 'WINLOGON.EXE' - '1' Module(s) have been scanned
Scan process 'CSRSS.EXE' - '1' Module(s) have been scanned
Scan process 'SMSS.EXE' - '1' Module(s) have been scanned
36 processes with 36 modules were scanned
Start scanning boot sectors:
Boot sector 'C:\'
[NOTE] No virus was found!
Boot sector 'D:\'
[NOTE] No virus was found!
Boot sector 'F:\'
[NOTE] In the drive 'F:\' no data medium is inserted!
Boot sector 'G:\'
[NOTE] In the drive 'G:\' no data medium is inserted!
Boot sector 'H:\'
[NOTE] In the drive 'H:\' no data medium is inserted!
Boot sector 'I:\'
[NOTE] In the drive 'I:\' no data medium is inserted!
Starting to scan the registry.
The registry was scanned ( '21' files ).
Starting the file scan:
Begin scan in 'C:\'
C:\hiberfil.sys
[WARNING] The file could not be opened!
C:\pagefile.sys
[WARNING] The file could not be opened!
C:\install\install.exe
[DETECTION] Is the Trojan horse TR/VB.aqc
[INFO] The file was moved to '4707a678.qua'!
C:\WINDOWS\myalbum2007.zip
[DETECTION] Contains signature of the worm WORM/IRCBot.ACD
[INFO] The file was moved to '46f5a698.qua'!
C:\Documents and Settings\FERREIRA GARCEZ\anopry.exe
[DETECTION] Contains a signature of the (dangerous) backdoor program BDS/Bifrose.NU Backdoor server programs
[INFO] The file was moved to '4703a9f4.qua'!
C:\Documents and Settings\FERREIRA GARCEZ\lehubo.exe
[DETECTION] Contains signature of the dropper DR/Dldr.IstBar.124756
[INFO] The file was moved to '46fca9f4.qua'!
C:\Documents and Settings\FERREIRA GARCEZ\jkgael.exe
[DETECTION] Contains a signature of the (dangerous) backdoor program BDS/Bifrose.NU Backdoor server programs
[INFO] The file was moved to '46fbaa00.qua'!
C:\Documents and Settings\FERREIRA GARCEZ\xcmysx.exe
[DETECTION] Is the Trojan horse TR/Crypt.ULPM.Gen
[INFO] The file was moved to '4701a9fd.qua'!
C:\Documents and Settings\FERREIRA GARCEZ\lngijt.exe
[DETECTION] Is the Trojan horse TR/Crypt.ULPM.Gen
[INFO] The file was moved to '46fbaa0b.qua'!
C:\Documents and Settings\FERREIRA GARCEZ\xcjigj.exe
[DETECTION] Is the Trojan horse TR/Crypt.ULPM.Gen
[INFO] The file was moved to '46feaa02.qua'!
C:\Documents and Settings\FERREIRA GARCEZ\bjquwd.exe
[DETECTION] Is the Trojan horse TR/Crypt.ULPM.Gen
[INFO] The file was moved to '4705aa0c.qua'!
C:\Documents and Settings\FERREIRA GARCEZ\fwyhda.exe
[DETECTION] Is the Trojan horse TR/Crypt.ULPM.Gen
[INFO] The file was moved to '470daa1c.qua'!
C:\Documents and Settings\FERREIRA GARCEZ\sqtdmc.exe
[DETECTION] Contains signature of the dropper DR/Dldr.IstBar.124756
[INFO] The file was moved to '4708aa19.qua'!
C:\Documents and Settings\FERREIRA GARCEZ\dxggia.exe
[DETECTION] Contains signature of the dropper DR/Dldr.IstBar.124756
[INFO] The file was moved to '46fbaa23.qua'!
C:\Documents and Settings\FERREIRA GARCEZ\xfkjzu.exe
[DETECTION] Is the Trojan horse TR/Crypt.ULPM.Gen
[INFO] The file was moved to '46ffaa13.qua'!
C:\Documents and Settings\FERREIRA GARCEZ\csasgj.exe
[DETECTION] Is the Trojan horse TR/Crypt.ULPM.Gen
[INFO] The file was moved to '46f5aa22.qua'!
C:\Documents and Settings\FERREIRA GARCEZ\xtsbbh.exe
[DETECTION] Is the Trojan horse TR/Crypt.ULPM.Gen
[INFO] The file was moved to '4707aa25.qua'!
C:\Documents and Settings\FERREIRA GARCEZ\azjfwg.exe
[DETECTION] Is the Trojan horse TR/Crypt.ULPM.Gen
[INFO] The file was moved to '46feaa2d.qua'!
C:\Documents and Settings\FERREIRA GARCEZ\dwjbtc.exe
[DETECTION] Contains signature of the dropper DR/Dldr.IstBar.124756
[INFO] The file was moved to '46feaa2c.qua'!
C:\Documents and Settings\FERREIRA GARCEZ\mcitlz.exe
[DETECTION] Contains signature of the dropper DR/Dldr.IstBar.124756
[INFO] The file was moved to '46fdaa1b.qua'!
C:\Documents and Settings\FERREIRA GARCEZ\qlmtps.exe
[DETECTION] Contains signature of the dropper DR/Dldr.IstBar.124756
[INFO] The file was moved to '4701aa26.qua'!
C:\Documents and Settings\FERREIRA GARCEZ\teqycy.exe
[DETECTION] Contains signature of the dropper DR/Dldr.IstBar.124756
[INFO] The file was moved to '4705aa21.qua'!
C:\Documents and Settings\FERREIRA GARCEZ\humzzi.exe
[DETECTION] Contains signature of the dropper DR/Dldr.IstBar.124756
[INFO] The file was moved to '4701aa34.qua'!
C:\Documents and Settings\FERREIRA GARCEZ\sgkhzj.exe
[DETECTION] Contains signature of the dropper DR/Dldr.IstBar.124756
[INFO] The file was moved to '46ffaa28.qua'!
C:\Documents and Settings\FERREIRA GARCEZ\uswnts.exe
[DETECTION] Contains signature of the dropper DR/Dldr.IstBar.124756
[INFO] The file was moved to '470baa36.qua'!
C:\Documents and Settings\FERREIRA GARCEZ\anqpwo.exe
[DETECTION] Contains signature of the dropper DR/Dldr.IstBar.124756
[INFO] The file was moved to '4705aa34.qua'!
C:\Documents and Settings\FERREIRA GARCEZ\yqmwxl.exe
[DETECTION] Contains signature of the dropper DR/Dldr.IstBar.124756
[INFO] The file was moved to '4701aa39.qua'!
C:\Documents and Settings\FERREIRA GARCEZ\rqmolc.exe
[DETECTION] Contains signature of the dropper DR/Dldr.IstBar.124756
[INFO] The file was moved to '4701aa3b.qua'!
C:\Documents and Settings\FERREIRA GARCEZ\yujfcg.exe
[DETECTION] Contains signature of the dropper DR/Dldr.IstBar.124756
[INFO] The file was moved to '46feaa43.qua'!
C:\Documents and Settings\FERREIRA GARCEZ\mtqqwh.exe
[DETECTION] Contains signature of the dropper DR/Dldr.IstBar.124756
[INFO] The file was moved to '4705aa45.qua'!
C:\Documents and Settings\FERREIRA GARCEZ\wlwzmv.exe
[DETECTION] Contains signature of the dropper DR/Dldr.IstBar.124756
[INFO] The file was moved to '470baa3f.qua'!
C:\Documents and Settings\FERREIRA GARCEZ\pckbrn.exe
[DETECTION] Contains signature of the dropper DR/Dldr.IstBar.124756
[INFO] The file was moved to '46ffaa38.qua'!
C:\Documents and Settings\FERREIRA GARCEZ\somfvv.exe
[DETECTION] Contains signature of the dropper DR/Dldr.IstBar.124756
[INFO] The file was deleted!
C:\Documents and Settings\FERREIRA GARCEZ\Mes documents\Mes fichiers reçus\myalbum2007.zip
[DETECTION] Contains signature of the worm WORM/IRCBot.ACD
[INFO] The file was deleted!
C:\System Volume Information\_restore{1A329E54-0689-4F2C-B0F8-A0B20A7B0829}\RP504\A0112481.exe
[DETECTION] Is the Trojan horse TR/VB.aqc
[INFO] The file was deleted!
C:\System Volume Information\_restore{1A329E54-0689-4F2C-B0F8-A0B20A7B0829}\RP504\A0113498.dll
[DETECTION] Contains signature of the worm WORM/IRCBot.24040
[INFO] The file was moved to '46c5ad86.qua'!
C:\System Volume Information\_restore{1A329E54-0689-4F2C-B0F8-A0B20A7B0829}\RP505\A0114601.exe
[DETECTION] Is the Trojan horse TR/Dldr.Swizzor.Gen
[INFO] The file was moved to '46c5ad8b.qua'!
C:\System Volume Information\_restore{1A329E54-0689-4F2C-B0F8-A0B20A7B0829}\RP505\A0114602.exe
[DETECTION] Is the Trojan horse TR/Dldr.Swizzor.Gen
[INFO] The file was moved to '46c5ad8d.qua'!
C:\System Volume Information\_restore{1A329E54-0689-4F2C-B0F8-A0B20A7B0829}\RP505\A0114603.exe
[DETECTION] Is the Trojan horse TR/Dldr.Swizzor.Gen
[INFO] The file was moved to '46c5ad90.qua'!
C:\System Volume Information\_restore{1A329E54-0689-4F2C-B0F8-A0B20A7B0829}\RP505\A0114604.exe
[DETECTION] Is the Trojan horse TR/Dldr.Swizzor.Gen
[INFO] The file was moved to '46c5ad92.qua'!
C:\System Volume Information\_restore{1A329E54-0689-4F2C-B0F8-A0B20A7B0829}\RP505\A0114605.exe
[DETECTION] Is the Trojan horse TR/Dldr.Swizzor.Gen
[INFO] The file was moved to '46c5ad94.qua'!
C:\System Volume Information\_restore{1A329E54-0689-4F2C-B0F8-A0B20A7B0829}\RP505\A0114606.exe
[DETECTION] Is the Trojan horse TR/Dldr.Swizzor.Gen
[INFO] The file was moved to '46c5ad96.qua'!
C:\System Volume Information\_restore{1A329E54-0689-4F2C-B0F8-A0B20A7B0829}\RP505\A0114607.exe
[DETECTION] Is the Trojan horse TR/Dldr.Swizzor.Gen
[INFO] The file was moved to '46c5ad98.qua'!
C:\System Volume Information\_restore{1A329E54-0689-4F2C-B0F8-A0B20A7B0829}\RP505\A0114608.exe
[DETECTION] Is the Trojan horse TR/Dldr.Swizzor.Gen
[INFO] The file was moved to '46c5ad9a.qua'!
C:\System Volume Information\_restore{1A329E54-0689-4F2C-B0F8-A0B20A7B0829}\RP506\A0114929.exe
[DETECTION] Is the Trojan horse TR/VB.aqc
[INFO] The file was moved to '46c5ada5.qua'!
C:\System Volume Information\_restore{1A329E54-0689-4F2C-B0F8-A0B20A7B0829}\RP506\A0114930.exe
[DETECTION] Contains a signature of the (dangerous) backdoor program BDS/Bifrose.NU Backdoor server programs
[INFO] The file was moved to '46c5ada7.qua'!
C:\System Volume Information\_restore{1A329E54-0689-4F2C-B0F8-A0B20A7B0829}\RP506\A0114931.exe
[DETECTION] Contains signature of the dropper DR/Dldr.IstBar.124756
[INFO] The file was moved to '46c5ada9.qua'!
C:\System Volume Information\_restore{1A329E54-0689-4F2C-B0F8-A0B20A7B0829}\RP506\A0114932.exe
[DETECTION] Contains a signature of the (dangerous) backdoor program BDS/Bifrose.NU Backdoor server programs
[INFO] The file was moved to '46c5adab.qua'!
C:\System Volume Information\_restore{1A329E54-0689-4F2C-B0F8-A0B20A7B0829}\RP506\A0114933.exe
[DETECTION] Is the Trojan horse TR/Crypt.ULPM.Gen
[INFO] The file was moved to '46c5adad.qua'!
C:\System Volume Information\_restore{1A329E54-0689-4F2C-B0F8-A0B20A7B0829}\RP506\A0114934.exe
[DETECTION] Is the Trojan horse TR/Crypt.ULPM.Gen
[INFO] The file was moved to '46c5adaf.qua'!
C:\System Volume Information\_restore{1A329E54-0689-4F2C-B0F8-A0B20A7B0829}\RP506\A0114935.exe
[DETECTION] Is the Trojan horse TR/Crypt.ULPM.Gen
[INFO] The file was moved to '46c5adb0.qua'!
C:\System Volume Information\_restore{1A329E54-0689-4F2C-B0F8-A0B20A7B0829}\RP506\A0114936.exe
[DETECTION] Is the Trojan horse TR/Crypt.ULPM.Gen
[INFO] The file was moved to '46c5adb2.qua'!
C:\System Volume Information\_restore{1A329E54-0689-4F2C-B0F8-A0B20A7B0829}\RP506\A0114937.exe
[DETECTION] Is the Trojan horse TR/Crypt.ULPM.Gen
[INFO] The file was moved to '46c5adb4.qua'!
C:\System Volume Information\_restore{1A329E54-0689-4F2C-B0F8-A0B20A7B0829}\RP506\A0114938.exe
[DETECTION] Contains signature of the dropper DR/Dldr.IstBar.124756
[INFO] The file was moved to '46c5adb5.qua'!
C:\System Volume Information\_restore{1A329E54-0689-4F2C-B0F8-A0B20A7B0829}\RP506\A0114939.exe
[DETECTION] Contains signature of the dropper DR/Dldr.IstBar.124756
[INFO] The file was moved to '46c5adb7.qua'!
C:\System Volume Information\_restore{1A329E54-0689-4F2C-B0F8-A0B20A7B0829}\RP506\A0114940.exe
[DETECTION] Is the Trojan horse TR/Crypt.ULPM.Gen
[INFO] The file was moved to '46c5adb9.qua'!
C:\System Volume Information\_restore{1A329E54-0689-4F2C-B0F8-A0B20A7B0829}\RP506\A0114941.exe
[DETECTION] Is the Trojan horse TR/Crypt.ULPM.Gen
[INFO] The file was moved to '46c5adba.qua'!
C:\System Volume Information\_restore{1A329E54-0689-4F2C-B0F8-A0B20A7B0829}\RP506\A0114942.exe
[DETECTION] Is the Trojan horse TR/Crypt.ULPM.Gen
[INFO] The file was moved to '46c5adbc.qua'!
C:\System Volume Information\_restore{1A329E54-0689-4F2C-B0F8-A0B20A7B0829}\RP506\A0114943.exe
[DETECTION] Is the Trojan horse TR/Crypt.ULPM.Gen
[INFO] The file was moved to '46c5adbd.qua'!
C:\System Volume Information\_restore{1A329E54-0689-4F2C-B0F8-A0B20A7B0829}\RP506\A0114944.exe
[DETECTION] Contains signature of the dropper DR/Dldr.IstBar.124756
[INFO] The file was moved to '46c5adbf.qua'!
C:\System Volume Information\_restore{1A329E54-0689-4F2C-B0F8-A0B20A7B0829}\RP506\A0114945.exe
[DETECTION] Contains signature of the dropper DR/Dldr.IstBar.124756
[INFO] The file was moved to '46c5adc1.qua'!
C:\System Volume Information\_restore{1A329E54-0689-4F2C-B0F8-A0B20A7B0829}\RP506\A0114946.exe
[DETECTION] Contains signature of the dropper DR/Dldr.IstBar.124756
[INFO] The file was moved to '46c5adc3.qua'!
C:\System Volume Information\_restore{1A329E54-0689-4F2C-B0F8-A0B20A7B0829}\RP506\A0114947.exe
[DETECTION] Contains signature of the dropper DR/Dldr.IstBar.124756
[INFO] The file was moved to '46c5adc5.qua'!
C:\System Volume Information\_restore{1A329E54-0689-4F2C-B0F8-A0B20A7B0829}\RP506\A0114948.exe
[DETECTION] Contains signature of the dropper DR/Dldr.IstBar.124756
[INFO] The file was moved to '46c5adc6.qua'!
C:\System Volume Information\_restore{1A329E54-0689-4F2C-B0F8-A0B20A7B0829}\RP506\A0114949.exe
[DETECTION] Contains signature of the dropper DR/Dldr.IstBar.124756
[INFO] The file was moved to '46c5adc8.qua'!
C:\System Volume Information\_restore{1A329E54-0689-4F2C-B0F8-A0B20A7B0829}\RP506\A0114950.exe
[DETECTION] Contains signature of the dropper DR/Dldr.IstBar.124756
[INFO] The file was moved to '46c5adca.qua'!
C:\System Volume Information\_restore{1A329E54-0689-4F2C-B0F8-A0B20A7B0829}\RP506\A0114951.exe
[DETECTION] Contains signature of the dropper DR/Dldr.IstBar.124756
[INFO] The file was moved to '46c5adcc.qua'!
C:\System Volume Information\_restore{1A329E54-0689-4F2C-B0F8-A0B20A7B0829}\RP506\A0114952.exe
[DETECTION] Contains signature of the dropper DR/Dldr.IstBar.124756
[INFO] The file was moved to '46c5adcd.qua'!
C:\System Volume Information\_restore{1A329E54-0689-4F2C-B0F8-A0B20A7B0829}\RP506\A0114953.exe
[DETECTION] Contains signature of the dropper DR/Dldr.IstBar.124756
[INFO] The file was moved to '46c5adcf.qua'!
C:\System Volume Information\_restore{1A329E54-0689-4F2C-B0F8-A0B20A7B0829}\RP506\A0114954.exe
[DETECTION] Contains signature of the dropper DR/Dldr.IstBar.124756
[INFO] The file was moved to '46c5add1.qua'!
C:\System Volume Information\_restore{1A329E54-0689-4F2C-B0F8-A0B20A7B0829}\RP506\A0114955.exe
[DETECTION] Contains signature of the dropper DR/Dldr.IstBar.124756
[INFO] The file was moved to '46c5add3.qua'!
C:\System Volume Information\_restore{1A329E54-0689-4F2C-B0F8-A0B20A7B0829}\RP506\A0114956.exe
[DETECTION] Contains signature of the dropper DR/Dldr.IstBar.124756
[INFO] The file was moved to '46c5add4.qua'!
C:\System Volume Information\_restore{1A329E54-0689-4F2C-B0F8-A0B20A7B0829}\RP506\A0114957.exe
[DETECTION] Contains signature of the dropper DR/Dldr.IstBar.124756
[INFO] The file was moved to '46c5add6.qua'!
C:\System Volume Information\_restore{1A329E54-0689-4F2C-B0F8-A0B20A7B0829}\RP506\A0114958.exe
[DETECTION] Contains signature of the dropper DR/Dldr.IstBar.124756
[INFO] The file was moved to '46c5addb.qua'!
C:\System Volume Information\_restore{1A329E54-0689-4F2C-B0F8-A0B20A7B0829}\RP421\A0086545.exe
[DETECTION] Is the Trojan horse TR/Dldr.Swizzor.Gen
[INFO] The file was moved to '46c4ade4.qua'!
C:\System Volume Information\_restore{1A329E54-0689-4F2C-B0F8-A0B20A7B0829}\RP421\A0086546.exe
[DETECTION] Is the Trojan horse TR/Dldr.Swizzor.Gen
[INFO] The file was moved to '46c4ade7.qua'!
C:\System Volume Information\_restore{1A329E54-0689-4F2C-B0F8-A0B20A7B0829}\RP421\A0086547.exe
[DETECTION] Is the Trojan horse TR/Dldr.Swizzor.Gen
[INFO] The file was moved to '46c4ade9.qua'!
C:\!KillBox\sysprinters.dll
[DETECTION] Contains signature of the worm WORM/IRCBot.24040
[INFO] The file was moved to '4707ae6c.qua'!
Begin scan in 'D:\'
Search path D:\ could not be opened!
Le volume ne contient pas de système de fichiers connu. Vérifiez si tous les pilotes de système
de fichiers nécessaires sont chargés et si le volume n'est pas endommagé.
Begin scan in 'F:\'
Search path F:\ could not be opened!
Le périphérique n'est pas prêt.
Begin scan in 'G:\'
Search path G:\ could not be opened!
Le périphérique n'est pas prêt.
Begin scan in 'H:\'
Search path H:\ could not be opened!
Le périphérique n'est pas prêt.
Begin scan in 'I:\'
Search path I:\ could not be opened!
Le périphérique n'est pas prêt.
Begin scan in 'E:\'
Search path E:\ could not be opened!
Le périphérique n'est pas prêt.
End of the scan: mercredi 11 juillet 2007 12:16
Used time: 38:55 min
The scan has been done completely.
3620 Scanning directories
156686 Files were scanned
76 viruses and/or unwanted programs were found
0 classified as suspicious:
3 files were deleted
0 files were repaired
73 files were moved to quarantine
0 files were renamed
2 Files cannot be scanned
156610 Files not concerned
6518 Archives were scanned
2 Warnings
0 Notes
0 Hidden objects were found
Qu'en pense tu?
Merci
(maintenant que je t'ai trouvé je vais pas te laché lol)
Hello !
11h??? T as pas honte? lol
Pour l'ile de la tentation, ca c'est sur, je ne pense pas que tu vas envoyer le tient lol
Le pare feu windows est désactivé des que tu installes ZA.
Pour ZA; tu dois accepter certaines choses.
Lorsque ZA est installé, tu dois accepter certains programmes a acceder a internet, comme ton FAI internet, l'antivirus, MSN, Generic Host Process for win32...Tout les programmes que tu connais !
(Pour cela, tu peux aller dans zone alarm, clik sur controle des programmes, onglet programmes et tu coches a chaque fois pour donner toutes les autorisations).
Tu peux également vider la quarantaine d antivir !
Je vais regarder pour mon profil, je ne vois plus mon image non plus !!
A+
11h??? T as pas honte? lol
Pour l'ile de la tentation, ca c'est sur, je ne pense pas que tu vas envoyer le tient lol
Le pare feu windows est désactivé des que tu installes ZA.
Pour ZA; tu dois accepter certaines choses.
Lorsque ZA est installé, tu dois accepter certains programmes a acceder a internet, comme ton FAI internet, l'antivirus, MSN, Generic Host Process for win32...Tout les programmes que tu connais !
(Pour cela, tu peux aller dans zone alarm, clik sur controle des programmes, onglet programmes et tu coches a chaque fois pour donner toutes les autorisations).
Tu peux également vider la quarantaine d antivir !
Je vais regarder pour mon profil, je ne vois plus mon image non plus !!
A+