Virus msn
Résolu
caramela59
Messages postés
13
Statut
Membre
-
Yas -
Yas -
Bonjour,
MSNFix 1.633
C:\Documents and Settings\Administrateur\Bureau\MSNFix
Fix exécuté le 17/01/2008 - 19:45:48,34 By Administrateur
mode normal
************************ Recherche les fichiers présents
... C:\WINDOWS\17PHolmes1148.exe
... C:\WINDOWS\mrofinu*.exe.tmp
************************ MSNCHK ***** /!\ beta test /!\
************************ Recherche les dossiers présents
Aucun dossier trouvé
************************ Suppression des fichiers
.. OK ... C:\WINDOWS\17PHolmes1148.exe
.. OK ... C:\WINDOWS\mrofinu*.exe.tmp
************************ Nettoyage du registre
************************ Fichiers suspects
Aucun Fichier trouvé
Les fichiers et clés de registre supprimés ont été sauvegardés dans le fichier 17012008_19464050.zip
------------------------------------------------------------------------
Auteur : !aur3n7 Contact: https://www.ionos.fr/
------------------------------------------------------------------------
--------------------------------------------- END ---------------------------------------------
voici le rapport apres que j ai utilise msn fix merci de m aider
MSNFix 1.633
C:\Documents and Settings\Administrateur\Bureau\MSNFix
Fix exécuté le 17/01/2008 - 19:45:48,34 By Administrateur
mode normal
************************ Recherche les fichiers présents
... C:\WINDOWS\17PHolmes1148.exe
... C:\WINDOWS\mrofinu*.exe.tmp
************************ MSNCHK ***** /!\ beta test /!\
************************ Recherche les dossiers présents
Aucun dossier trouvé
************************ Suppression des fichiers
.. OK ... C:\WINDOWS\17PHolmes1148.exe
.. OK ... C:\WINDOWS\mrofinu*.exe.tmp
************************ Nettoyage du registre
************************ Fichiers suspects
Aucun Fichier trouvé
Les fichiers et clés de registre supprimés ont été sauvegardés dans le fichier 17012008_19464050.zip
------------------------------------------------------------------------
Auteur : !aur3n7 Contact: https://www.ionos.fr/
------------------------------------------------------------------------
--------------------------------------------- END ---------------------------------------------
voici le rapport apres que j ai utilise msn fix merci de m aider
A voir également:
- Virus msn
- Virus mcafee - Accueil - Piratage
- Telecharger msn - Télécharger - Messagerie
- Msn messenger - Télécharger - Messagerie
- Virus facebook demande d'amis - Accueil - Facebook
- Virus informatique - Guide
16 réponses
BOnsoir,
Aucun virus ne semble avoir été trouvé !
Sinon, installes le très bon antivirus gratuit Antivir Personal Classic Edition téléchargeable à l'adresse suivante : http://www.antivir-pe.com/freet/index.php?id=25&domain=free-av.com
et lances un scan. S'il ne trouves rien, je pense que tu n'as plus à t'en faire.
Aucun virus ne semble avoir été trouvé !
Sinon, installes le très bon antivirus gratuit Antivir Personal Classic Edition téléchargeable à l'adresse suivante : http://www.antivir-pe.com/freet/index.php?id=25&domain=free-av.com
et lances un scan. S'il ne trouves rien, je pense que tu n'as plus à t'en faire.
il y a 2jour j ai ouvert un fichier qu un contact m a envoyer et c etai un virus je veu savoir comment le supprimer...
Vous n’avez pas trouvé la réponse que vous recherchez ?
Posez votre question
bonjlour j ai donc fait un scan avec antivir et il m a trouvé le virus:Trojan horse TR/Crypt.ulpm.gen
AntiVir PersonalEdition Classic
Report file date: vendredi 18 janvier 2008 10:59
Scanning for 835736 virus strains and unwanted programs.
Licensed to: Avira AntiVir PersonalEdition Classic
Serial number: 0000149996-ADJIE-0001
Platform: Windows XP
Windows version: (Service Pack 2) [5.1.2600]
Username: SYSTEM
Computer name: DEPAN-INFO
Version information:
BUILD.DAT : 270 15603 Bytes 19/09/2007 13:32:00
AVSCAN.EXE : 7.0.6.1 290856 Bytes 23/08/2007 13:16:29
AVSCAN.DLL : 7.0.6.0 49192 Bytes 16/08/2007 12:23:51
LUKE.DLL : 7.0.5.3 147496 Bytes 14/08/2007 15:32:47
LUKERES.DLL : 7.0.6.1 10280 Bytes 21/08/2007 12:35:20
ANTIVIR0.VDF : 6.40.0.0 11030528 Bytes 18/07/2007 14:27:15
ANTIVIR1.VDF : 7.0.0.0 1640448 Bytes 13/09/2007 14:26:55
ANTIVIR2.VDF : 7.0.0.1 2048 Bytes 13/09/2007 14:27:04
ANTIVIR3.VDF : 7.0.0.2 2048 Bytes 13/09/2007 14:27:13
AVEWIN32.DLL : 7.6.0.15 2806272 Bytes 17/09/2007 17:43:56
AVWINLL.DLL : 1.0.0.7 14376 Bytes 26/02/2007 10:36:26
AVPREF.DLL : 7.0.2.2 25640 Bytes 18/07/2007 07:39:17
AVREP.DLL : 7.0.0.1 155688 Bytes 16/04/2007 13:16:24
AVPACK32.DLL : 7.3.0.15 360488 Bytes 03/08/2007 08:46:00
AVREG.DLL : 7.0.1.6 30760 Bytes 18/07/2007 07:17:06
AVARKT.DLL : 1.0.0.20 278568 Bytes 28/08/2007 12:26:33
AVEVTLOG.DLL : 7.0.0.20 86056 Bytes 18/07/2007 07:10:18
NETNT.DLL : 7.0.0.0 7720 Bytes 08/03/2007 11:09:42
RCIMAGE.DLL : 7.0.1.30 2342952 Bytes 07/08/2007 12:38:13
RCTEXT.DLL : 7.0.62.0 86056 Bytes 21/08/2007 12:50:37
SQLITE3.DLL : 3.3.17.1 339968 Bytes 23/07/2007 09:37:21
Configuration settings for the scan:
Jobname..........................: Complete system scan
Configuration file...............: c:\program files\avira\antivir personaledition classic\sysscan.avp
Logging..........................: low
Primary action...................: interactive
Secondary action.................: ignore
Scan master boot sector..........: off
Scan boot sector.................: on
Boot sectors.....................: D:,
Scan memory......................: on
Process scan.....................: on
Scan registry....................: on
Search for rootkits..............: off
Scan all files...................: Intelligent file selection
Scan archives....................: on
Recursion depth..................: 20
Smart extensions.................: on
Macro heuristic..................: on
File heuristic...................: medium
Start of the scan: vendredi 18 janvier 2008 10:59
The scan of running processes will be started
Scan process 'avscan.exe' - '1' Module(s) have been scanned
Scan process 'avcenter.exe' - '1' Module(s) have been scanned
Scan process 'iexplore.exe' - '1' Module(s) have been scanned
Scan process 'usnsvc.exe' - '1' Module(s) have been scanned
Scan process 'eb.exe' - '1' Module(s) have been scanned
Scan process 'hpqtra08.exe' - '1' Module(s) have been scanned
Scan process 'wmpnscfg.exe' - '1' Module(s) have been scanned
Scan process 'Dot1XCfg.exe' - '1' Module(s) have been scanned
Scan process 'GoogleToolbarNotifier.exe' - '1' Module(s) have been scanned
Scan process 'Lyc_SysTray.exe' - '1' Module(s) have been scanned
Scan process 'ctfmon.exe' - '1' Module(s) have been scanned
Scan process 'avgnt.exe' - '1' Module(s) have been scanned
Scan process 'nod32kui.exe' - '1' Module(s) have been scanned
Scan process 'ashDisp.exe' - '1' Module(s) have been scanned
Scan process 'rundll32.exe' - '1' Module(s) have been scanned
Scan process 'jusched.exe' - '1' Module(s) have been scanned
Scan process 'KiddyWeb.exe' - '1' Module(s) have been scanned
Scan process 'hpcmpmgr.exe' - '1' Module(s) have been scanned
Scan process 'hpwuSchd.exe' - '1' Module(s) have been scanned
Scan process 'LVCOMSX.EXE' - '1' Module(s) have been scanned
Scan process 'soundman.exe' - '1' Module(s) have been scanned
Scan process 'explorer.exe' - '1' Module(s) have been scanned
Scan process 'WgaTray.exe' - '1' Module(s) have been scanned
Scan process 'ati2evxx.exe' - '1' Module(s) have been scanned
Scan process 'alg.exe' - '1' Module(s) have been scanned
Scan process 'wmpnetwk.exe' - '1' Module(s) have been scanned
Scan process 'ArServer.exe' - '1' Module(s) have been scanned
Scan process 'ArServerDaemon.exe' - '1' Module(s) have been scanned
Scan process 'svchost.exe' - '1' Module(s) have been scanned
Scan process 'nod32krn.exe' - '1' Module(s) have been scanned
Scan process 'svchost.exe' - '1' Module(s) have been scanned
Scan process 'svchost.exe' - '1' Module(s) have been scanned
Scan process 'sched.exe' - '1' Module(s) have been scanned
Scan process 'avguard.exe' - '1' Module(s) have been scanned
Scan process 'spoolsv.exe' - '1' Module(s) have been scanned
Scan process 'ashServ.exe' - '1' Module(s) have been scanned
Scan process 'aswUpdSv.exe' - '1' Module(s) have been scanned
Scan process 'svchost.exe' - '1' Module(s) have been scanned
Scan process 'svchost.exe' - '1' Module(s) have been scanned
Scan process 'svchost.exe' - '1' Module(s) have been scanned
Scan process 'svchost.exe' - '1' Module(s) have been scanned
Scan process 'svchost.exe' - '1' Module(s) have been scanned
Scan process 'ati2evxx.exe' - '1' Module(s) have been scanned
Scan process 'lsass.exe' - '1' Module(s) have been scanned
Scan process 'services.exe' - '1' Module(s) have been scanned
Scan process 'winlogon.exe' - '1' Module(s) have been scanned
Scan process 'csrss.exe' - '1' Module(s) have been scanned
Scan process 'smss.exe' - '1' Module(s) have been scanned
48 processes with 48 modules were scanned
Start scanning boot sectors:
Boot sector 'C:\'
[NOTE] No virus was found!
Boot sector 'D:\'
[NOTE] No virus was found!
Starting to scan the registry.
The registry was scanned ( '22' files ).
Starting the file scan:
Begin scan in 'C:\' <Windows>
C:\pagefile.sys
[WARNING] The file could not be opened!
C:\System Volume Information\_restore{B40886BB-272E-48FB-9A82-31C2AC4FFA09}\RP250\A0138878.exe
[DETECTION] Is the Trojan horse TR/Crypt.ULPM.Gen
[INFO] The file was moved to '47c18440.qua'!
C:\System Volume Information\_restore{B40886BB-272E-48FB-9A82-31C2AC4FFA09}\RP250\A0138880.exe
[DETECTION] Is the Trojan horse TR/Crypt.ULPM.Gen
[WARNING] The file was ignored!
C:\System Volume Information\_restore{B40886BB-272E-48FB-9A82-31C2AC4FFA09}\RP250\A0138881.exe
[DETECTION] Is the Trojan horse TR/Crypt.ULPM.Gen
[INFO] The file was moved to '47c184b4.qua'!
C:\System Volume Information\_restore{B40886BB-272E-48FB-9A82-31C2AC4FFA09}\RP250\A0138882.exe
[DETECTION] Is the Trojan horse TR/Crypt.ULPM.Gen
[INFO] The file was moved to '47c184c0.qua'!
C:\System Volume Information\_restore{B40886BB-272E-48FB-9A82-31C2AC4FFA09}\RP250\A0138883.exe
[DETECTION] Is the Trojan horse TR/Crypt.ULPM.Gen
[INFO] A backup was created as '47c184c9.qua' ( QUARANTINE )
[INFO] The file was deleted!
C:\System Volume Information\_restore{B40886BB-272E-48FB-9A82-31C2AC4FFA09}\RP250\A0138884.exe
[DETECTION] Is the Trojan horse TR/Crypt.ULPM.Gen
[INFO] The file was deleted!
C:\System Volume Information\_restore{B40886BB-272E-48FB-9A82-31C2AC4FFA09}\RP250\A0138885.exe
[DETECTION] Is the Trojan horse TR/Crypt.ULPM.Gen
[INFO] The file was deleted!
C:\System Volume Information\_restore{B40886BB-272E-48FB-9A82-31C2AC4FFA09}\RP250\A0138886.exe
[DETECTION] Is the Trojan horse TR/Crypt.ULPM.Gen
[INFO] The file was deleted!
C:\System Volume Information\_restore{B40886BB-272E-48FB-9A82-31C2AC4FFA09}\RP250\A0138887.exe
[DETECTION] Is the Trojan horse TR/Crypt.ULPM.Gen
[INFO] The file was deleted!
C:\System Volume Information\_restore{B40886BB-272E-48FB-9A82-31C2AC4FFA09}\RP250\A0138888.exe
[DETECTION] Is the Trojan horse TR/Crypt.ULPM.Gen
[INFO] The file was deleted!
C:\System Volume Information\_restore{B40886BB-272E-48FB-9A82-31C2AC4FFA09}\RP250\A0138889.exe
[DETECTION] Is the Trojan horse TR/Crypt.ULPM.Gen
[INFO] The file was deleted!
C:\System Volume Information\_restore{B40886BB-272E-48FB-9A82-31C2AC4FFA09}\RP250\A0138890.exe
[DETECTION] Is the Trojan horse TR/Crypt.ULPM.Gen
[INFO] The file was deleted!
C:\System Volume Information\_restore{B40886BB-272E-48FB-9A82-31C2AC4FFA09}\RP250\A0138892.exe
[DETECTION] Is the Trojan horse TR/Crypt.ULPM.Gen
[INFO] The file was deleted!
C:\System Volume Information\_restore{B40886BB-272E-48FB-9A82-31C2AC4FFA09}\RP250\A0138955.exe
[DETECTION] Is the Trojan horse TR/Crypt.ULPM.Gen
[INFO] The file was deleted!
Begin scan in 'D:\' <Documents>
End of the scan: vendredi 18 janvier 2008 12:51
Used time: 1:52:05 min
The scan has been done completely.
4603 Scanning directories
222551 Files were scanned
14 viruses and/or unwanted programs were found
0 Files were classified as suspicious:
10 files were deleted
0 files were repaired
4 files were moved to quarantine
0 files were renamed
1 Files cannot be scanned
222537 Files not concerned
2716 Archives were scanned
2 Warnings
0 Notes
Report file date: vendredi 18 janvier 2008 10:59
Scanning for 835736 virus strains and unwanted programs.
Licensed to: Avira AntiVir PersonalEdition Classic
Serial number: 0000149996-ADJIE-0001
Platform: Windows XP
Windows version: (Service Pack 2) [5.1.2600]
Username: SYSTEM
Computer name: DEPAN-INFO
Version information:
BUILD.DAT : 270 15603 Bytes 19/09/2007 13:32:00
AVSCAN.EXE : 7.0.6.1 290856 Bytes 23/08/2007 13:16:29
AVSCAN.DLL : 7.0.6.0 49192 Bytes 16/08/2007 12:23:51
LUKE.DLL : 7.0.5.3 147496 Bytes 14/08/2007 15:32:47
LUKERES.DLL : 7.0.6.1 10280 Bytes 21/08/2007 12:35:20
ANTIVIR0.VDF : 6.40.0.0 11030528 Bytes 18/07/2007 14:27:15
ANTIVIR1.VDF : 7.0.0.0 1640448 Bytes 13/09/2007 14:26:55
ANTIVIR2.VDF : 7.0.0.1 2048 Bytes 13/09/2007 14:27:04
ANTIVIR3.VDF : 7.0.0.2 2048 Bytes 13/09/2007 14:27:13
AVEWIN32.DLL : 7.6.0.15 2806272 Bytes 17/09/2007 17:43:56
AVWINLL.DLL : 1.0.0.7 14376 Bytes 26/02/2007 10:36:26
AVPREF.DLL : 7.0.2.2 25640 Bytes 18/07/2007 07:39:17
AVREP.DLL : 7.0.0.1 155688 Bytes 16/04/2007 13:16:24
AVPACK32.DLL : 7.3.0.15 360488 Bytes 03/08/2007 08:46:00
AVREG.DLL : 7.0.1.6 30760 Bytes 18/07/2007 07:17:06
AVARKT.DLL : 1.0.0.20 278568 Bytes 28/08/2007 12:26:33
AVEVTLOG.DLL : 7.0.0.20 86056 Bytes 18/07/2007 07:10:18
NETNT.DLL : 7.0.0.0 7720 Bytes 08/03/2007 11:09:42
RCIMAGE.DLL : 7.0.1.30 2342952 Bytes 07/08/2007 12:38:13
RCTEXT.DLL : 7.0.62.0 86056 Bytes 21/08/2007 12:50:37
SQLITE3.DLL : 3.3.17.1 339968 Bytes 23/07/2007 09:37:21
Configuration settings for the scan:
Jobname..........................: Complete system scan
Configuration file...............: c:\program files\avira\antivir personaledition classic\sysscan.avp
Logging..........................: low
Primary action...................: interactive
Secondary action.................: ignore
Scan master boot sector..........: off
Scan boot sector.................: on
Boot sectors.....................: D:,
Scan memory......................: on
Process scan.....................: on
Scan registry....................: on
Search for rootkits..............: off
Scan all files...................: Intelligent file selection
Scan archives....................: on
Recursion depth..................: 20
Smart extensions.................: on
Macro heuristic..................: on
File heuristic...................: medium
Start of the scan: vendredi 18 janvier 2008 10:59
The scan of running processes will be started
Scan process 'avscan.exe' - '1' Module(s) have been scanned
Scan process 'avcenter.exe' - '1' Module(s) have been scanned
Scan process 'iexplore.exe' - '1' Module(s) have been scanned
Scan process 'usnsvc.exe' - '1' Module(s) have been scanned
Scan process 'eb.exe' - '1' Module(s) have been scanned
Scan process 'hpqtra08.exe' - '1' Module(s) have been scanned
Scan process 'wmpnscfg.exe' - '1' Module(s) have been scanned
Scan process 'Dot1XCfg.exe' - '1' Module(s) have been scanned
Scan process 'GoogleToolbarNotifier.exe' - '1' Module(s) have been scanned
Scan process 'Lyc_SysTray.exe' - '1' Module(s) have been scanned
Scan process 'ctfmon.exe' - '1' Module(s) have been scanned
Scan process 'avgnt.exe' - '1' Module(s) have been scanned
Scan process 'nod32kui.exe' - '1' Module(s) have been scanned
Scan process 'ashDisp.exe' - '1' Module(s) have been scanned
Scan process 'rundll32.exe' - '1' Module(s) have been scanned
Scan process 'jusched.exe' - '1' Module(s) have been scanned
Scan process 'KiddyWeb.exe' - '1' Module(s) have been scanned
Scan process 'hpcmpmgr.exe' - '1' Module(s) have been scanned
Scan process 'hpwuSchd.exe' - '1' Module(s) have been scanned
Scan process 'LVCOMSX.EXE' - '1' Module(s) have been scanned
Scan process 'soundman.exe' - '1' Module(s) have been scanned
Scan process 'explorer.exe' - '1' Module(s) have been scanned
Scan process 'WgaTray.exe' - '1' Module(s) have been scanned
Scan process 'ati2evxx.exe' - '1' Module(s) have been scanned
Scan process 'alg.exe' - '1' Module(s) have been scanned
Scan process 'wmpnetwk.exe' - '1' Module(s) have been scanned
Scan process 'ArServer.exe' - '1' Module(s) have been scanned
Scan process 'ArServerDaemon.exe' - '1' Module(s) have been scanned
Scan process 'svchost.exe' - '1' Module(s) have been scanned
Scan process 'nod32krn.exe' - '1' Module(s) have been scanned
Scan process 'svchost.exe' - '1' Module(s) have been scanned
Scan process 'svchost.exe' - '1' Module(s) have been scanned
Scan process 'sched.exe' - '1' Module(s) have been scanned
Scan process 'avguard.exe' - '1' Module(s) have been scanned
Scan process 'spoolsv.exe' - '1' Module(s) have been scanned
Scan process 'ashServ.exe' - '1' Module(s) have been scanned
Scan process 'aswUpdSv.exe' - '1' Module(s) have been scanned
Scan process 'svchost.exe' - '1' Module(s) have been scanned
Scan process 'svchost.exe' - '1' Module(s) have been scanned
Scan process 'svchost.exe' - '1' Module(s) have been scanned
Scan process 'svchost.exe' - '1' Module(s) have been scanned
Scan process 'svchost.exe' - '1' Module(s) have been scanned
Scan process 'ati2evxx.exe' - '1' Module(s) have been scanned
Scan process 'lsass.exe' - '1' Module(s) have been scanned
Scan process 'services.exe' - '1' Module(s) have been scanned
Scan process 'winlogon.exe' - '1' Module(s) have been scanned
Scan process 'csrss.exe' - '1' Module(s) have been scanned
Scan process 'smss.exe' - '1' Module(s) have been scanned
48 processes with 48 modules were scanned
Start scanning boot sectors:
Boot sector 'C:\'
[NOTE] No virus was found!
Boot sector 'D:\'
[NOTE] No virus was found!
Starting to scan the registry.
The registry was scanned ( '22' files ).
Starting the file scan:
Begin scan in 'C:\' <Windows>
C:\pagefile.sys
[WARNING] The file could not be opened!
C:\System Volume Information\_restore{B40886BB-272E-48FB-9A82-31C2AC4FFA09}\RP250\A0138878.exe
[DETECTION] Is the Trojan horse TR/Crypt.ULPM.Gen
[INFO] The file was moved to '47c18440.qua'!
C:\System Volume Information\_restore{B40886BB-272E-48FB-9A82-31C2AC4FFA09}\RP250\A0138880.exe
[DETECTION] Is the Trojan horse TR/Crypt.ULPM.Gen
[WARNING] The file was ignored!
C:\System Volume Information\_restore{B40886BB-272E-48FB-9A82-31C2AC4FFA09}\RP250\A0138881.exe
[DETECTION] Is the Trojan horse TR/Crypt.ULPM.Gen
[INFO] The file was moved to '47c184b4.qua'!
C:\System Volume Information\_restore{B40886BB-272E-48FB-9A82-31C2AC4FFA09}\RP250\A0138882.exe
[DETECTION] Is the Trojan horse TR/Crypt.ULPM.Gen
[INFO] The file was moved to '47c184c0.qua'!
C:\System Volume Information\_restore{B40886BB-272E-48FB-9A82-31C2AC4FFA09}\RP250\A0138883.exe
[DETECTION] Is the Trojan horse TR/Crypt.ULPM.Gen
[INFO] A backup was created as '47c184c9.qua' ( QUARANTINE )
[INFO] The file was deleted!
C:\System Volume Information\_restore{B40886BB-272E-48FB-9A82-31C2AC4FFA09}\RP250\A0138884.exe
[DETECTION] Is the Trojan horse TR/Crypt.ULPM.Gen
[INFO] The file was deleted!
C:\System Volume Information\_restore{B40886BB-272E-48FB-9A82-31C2AC4FFA09}\RP250\A0138885.exe
[DETECTION] Is the Trojan horse TR/Crypt.ULPM.Gen
[INFO] The file was deleted!
C:\System Volume Information\_restore{B40886BB-272E-48FB-9A82-31C2AC4FFA09}\RP250\A0138886.exe
[DETECTION] Is the Trojan horse TR/Crypt.ULPM.Gen
[INFO] The file was deleted!
C:\System Volume Information\_restore{B40886BB-272E-48FB-9A82-31C2AC4FFA09}\RP250\A0138887.exe
[DETECTION] Is the Trojan horse TR/Crypt.ULPM.Gen
[INFO] The file was deleted!
C:\System Volume Information\_restore{B40886BB-272E-48FB-9A82-31C2AC4FFA09}\RP250\A0138888.exe
[DETECTION] Is the Trojan horse TR/Crypt.ULPM.Gen
[INFO] The file was deleted!
C:\System Volume Information\_restore{B40886BB-272E-48FB-9A82-31C2AC4FFA09}\RP250\A0138889.exe
[DETECTION] Is the Trojan horse TR/Crypt.ULPM.Gen
[INFO] The file was deleted!
C:\System Volume Information\_restore{B40886BB-272E-48FB-9A82-31C2AC4FFA09}\RP250\A0138890.exe
[DETECTION] Is the Trojan horse TR/Crypt.ULPM.Gen
[INFO] The file was deleted!
C:\System Volume Information\_restore{B40886BB-272E-48FB-9A82-31C2AC4FFA09}\RP250\A0138892.exe
[DETECTION] Is the Trojan horse TR/Crypt.ULPM.Gen
[INFO] The file was deleted!
C:\System Volume Information\_restore{B40886BB-272E-48FB-9A82-31C2AC4FFA09}\RP250\A0138955.exe
[DETECTION] Is the Trojan horse TR/Crypt.ULPM.Gen
[INFO] The file was deleted!
Begin scan in 'D:\' <Documents>
End of the scan: vendredi 18 janvier 2008 12:51
Used time: 1:52:05 min
The scan has been done completely.
4603 Scanning directories
222551 Files were scanned
14 viruses and/or unwanted programs were found
0 Files were classified as suspicious:
10 files were deleted
0 files were repaired
4 files were moved to quarantine
0 files were renamed
1 Files cannot be scanned
222537 Files not concerned
2716 Archives were scanned
2 Warnings
0 Notes
Boinjour ,apparament il ya une présence de trojan sur ton ordinateur, ceci peut etre tres dangereux pour toi.Je te conseille vivement de télécharger un anti trojan que tu peux trouver en tapant sur google : anti trojan
En éspérant t'avoir aidé
En éspérant t'avoir aidé
bonjour, et tant que tu y est , télécharge RegSupreme , sa règlera certain problème sur ton registre
Bonsoir,
Comme le virus se trouve dans un répertoire utilisé par la restauration système (C:\System Volume Information) etc... Essaye de désactiver la restauration système :
* DESACTIVER LA RESTAURATION SYSTEME.
1. Clique sur Démarrer.
2. Pointe l'icône "Poste de travail", cliquez avec le bouton droit.
Si cette icône ne figure pas dans le menu démarrer, faites une recherche avec le texte "Poste de Travail", ensuite cliquez avec le bouton droit sur l'icône "Poste de travail".
3. Sélectionne "Propriétés."
4. Clique dans l'onglet "Restauration système"...
5. Clique sur la case "Activer la restauration système", si elle est cochée. Si elle est décochée, cochez-la, puis réexécutez les opérations 1 à 5 pour la décocher à nouveau.
6. Clique sur Appliquer puis sur OK.
Cette opération a pour but d'effacer les points de restauration, éliminant donc les virus se trouvant à l'intérieur (si il y en a).
7. Effectue un scan de votre ordinateur avec Antivir à nouveau.
Sinon télécharges Spybot Search & Destroy 1.5 (le meilleur antisypaware, adware...) à l'adresse : https://fileforum.com/download/Spybot_Search_and_Destroy/1043809773/1 et suis ce tuto : http://kerio.probb.fr/chasser-les-virus-et-spywares-de-votre-systeme-f1/tutoriel-pour-spybot-search-destroy-t540.htm
Comme le virus se trouve dans un répertoire utilisé par la restauration système (C:\System Volume Information) etc... Essaye de désactiver la restauration système :
* DESACTIVER LA RESTAURATION SYSTEME.
1. Clique sur Démarrer.
2. Pointe l'icône "Poste de travail", cliquez avec le bouton droit.
Si cette icône ne figure pas dans le menu démarrer, faites une recherche avec le texte "Poste de Travail", ensuite cliquez avec le bouton droit sur l'icône "Poste de travail".
3. Sélectionne "Propriétés."
4. Clique dans l'onglet "Restauration système"...
5. Clique sur la case "Activer la restauration système", si elle est cochée. Si elle est décochée, cochez-la, puis réexécutez les opérations 1 à 5 pour la décocher à nouveau.
6. Clique sur Appliquer puis sur OK.
Cette opération a pour but d'effacer les points de restauration, éliminant donc les virus se trouvant à l'intérieur (si il y en a).
7. Effectue un scan de votre ordinateur avec Antivir à nouveau.
Sinon télécharges Spybot Search & Destroy 1.5 (le meilleur antisypaware, adware...) à l'adresse : https://fileforum.com/download/Spybot_Search_and_Destroy/1043809773/1 et suis ce tuto : http://kerio.probb.fr/chasser-les-virus-et-spywares-de-votre-systeme-f1/tutoriel-pour-spybot-search-destroy-t540.htm
voila g fai le scan avec a2 j ai mis en quarantaine car je neVersion - a-squared Anti-Malware 3.1
Dernière mise à jour: 18/01/2008 17:57:26
Réglages Scan:
Objets: Mémoire, Traces, Cookies, C:\WINDOWS\, C:\Program Files
Scan archives: Marche
Heuristiques: Marche
Scan ADS: Marche
Début du scan: 18/01/2008 17:57:57
c:\program files\lycos Détecter: Trace.Directory.LycosSidesearch
Key: HKEY_LOCAL_MACHINE\software\orl\winvnc3 Détecter: Trace.Registry.VNC.CommonComponents
Key: HKEY_LOCAL_MACHINE\system\currentcontrolset\services\winvnc Détecter: Trace.Registry.VNC.CommonComponents
Key: HKEY_LOCAL_MACHINE\software\realvnc Détecter: Trace.Registry.VNC
Key: HKEY_LOCAL_MACHINE\software\realvnc\winvnc4 Détecter: Trace.Registry.VNCServer
Value: HKEY_USERS\S-1-5-21-343818398-1645522239-725345543-500\Software\NirSoft\MessenPass --> Columns Détecter: Trace.Registry.MessenPass
Value: HKEY_USERS\S-1-5-21-343818398-1645522239-725345543-500\Software\NirSoft\MessenPass --> SaveFilterIndex Détecter: Trace.Registry.MessenPass
Value: HKEY_USERS\S-1-5-21-343818398-1645522239-725345543-500\Software\NirSoft\MessenPass --> ShowGridLines Détecter: Trace.Registry.MessenPass
Value: HKEY_USERS\S-1-5-21-343818398-1645522239-725345543-500\Software\NirSoft\MessenPass --> Sort Détecter: Trace.Registry.MessenPass
Value: HKEY_USERS\S-1-5-21-343818398-1645522239-725345543-500\Software\NirSoft\MessenPass --> WinPos Détecter: Trace.Registry.MessenPass
c:\program files\fichiers communs\artech Détecter: Trace.Directory.Big Mother
c:\program files\fichiers communs\artech\drconfig.exe Détecter: Trace.File.Big Mother
c:\program files\fichiers communs\artech\tupsoft.inf Détecter: Trace.File.Big Mother
Value: HKEY_CLASSES_ROOT\CLSID\{34136682-7AA2-4480-BC96-25B4EA81A4C9}\InprocServer32 --> ThreadingModel Détecter: Trace.Registry.Big Mother
Value: HKEY_CLASSES_ROOT\CLSID\{72966187-BEB4-43DD-9BAA-68CAA994C6B6}\InprocServer32 --> ThreadingModel Détecter: Trace.Registry.Big Mother
Value: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{34136682-7AA2-4480-BC96-25B4EA81A4C9}\InprocServer32 --> ThreadingModel Détecter: Trace.Registry.Big Mother
Value: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{72966187-BEB4-43DD-9BAA-68CAA994C6B6}\InprocServer32 --> ThreadingModel Détecter: Trace.Registry.Big Mother
Value: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\AnyRouter\Enum --> 0 Détecter: Trace.Registry.Big Mother
Value: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\AnyRouter\Enum --> Count Détecter: Trace.Registry.Big Mother
Value: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\AnyRouter\Enum --> NextInstance Détecter: Trace.Registry.Big Mother
Value: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\AnyRouter\Security --> Security Détecter: Trace.Registry.Big Mother
Value: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\AnyRouter --> DisplayName Détecter: Trace.Registry.Big Mother
Value: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\AnyRouter --> ErrorControl Détecter: Trace.Registry.Big Mother
Value: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\AnyRouter --> Group Détecter: Trace.Registry.Big Mother
Value: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\AnyRouter --> ImagePath Détecter: Trace.Registry.Big Mother
Value: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\AnyRouter --> Start Détecter: Trace.Registry.Big Mother
Value: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\AnyRouter --> Tag Détecter: Trace.Registry.Big Mother
Value: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\AnyRouter --> Type Détecter: Trace.Registry.Big Mother
Value: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\TupCaptureService\Enum --> 0 Détecter: Trace.Registry.Big Mother
Value: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\TupCaptureService\Enum --> Count Détecter: Trace.Registry.Big Mother
Value: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\TupCaptureService\Enum --> NextInstance Détecter: Trace.Registry.Big Mother
Value: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\TupCaptureService\Security --> Security Détecter: Trace.Registry.Big Mother
Value: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\TupCaptureService --> Description Détecter: Trace.Registry.Big Mother
Value: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\TupCaptureService --> DisplayName Détecter: Trace.Registry.Big Mother
Value: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\TupCaptureService --> ErrorControl Détecter: Trace.Registry.Big Mother
Value: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\TupCaptureService --> ImagePath Détecter: Trace.Registry.Big Mother
Value: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\TupCaptureService --> ObjectName Détecter: Trace.Registry.Big Mother
Value: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\TupCaptureService --> Start Détecter: Trace.Registry.Big Mother
Value: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\TupCaptureService --> Type Détecter: Trace.Registry.Big Mother
Value: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\AnyRouter\Enum --> 0 Détecter: Trace.Registry.Big Mother
Value: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\AnyRouter\Enum --> Count Détecter: Trace.Registry.Big Mother
Value: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\AnyRouter\Enum --> NextInstance Détecter: Trace.Registry.Big Mother
Value: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\AnyRouter\Security --> Security Détecter: Trace.Registry.Big Mother
Value: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\AnyRouter --> DisplayName Détecter: Trace.Registry.Big Mother
Value: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\AnyRouter --> ErrorControl Détecter: Trace.Registry.Big Mother
Value: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\AnyRouter --> Group Détecter: Trace.Registry.Big Mother
Value: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\AnyRouter --> ImagePath Détecter: Trace.Registry.Big Mother
Value: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\AnyRouter --> Start Détecter: Trace.Registry.Big Mother
Value: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\AnyRouter --> Tag Détecter: Trace.Registry.Big Mother
Value: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\AnyRouter --> Type Détecter: Trace.Registry.Big Mother
C:\Documents and Settings\Administrateur\Cookies\administrateur@adserver.aol[1].txt Détecter: Trace.TrackingCookie
C:\Documents and Settings\Administrateur\Cookies\administrateur@adserver.aol[2].txt Détecter: Trace.TrackingCookie
C:\Documents and Settings\Administrateur\Cookies\administrateur@adtech[1].txt Détecter: Trace.TrackingCookie
C:\Documents and Settings\Administrateur\Cookies\administrateur@adtech[2].txt Détecter: Trace.TrackingCookie
C:\Documents and Settings\Administrateur\Cookies\administrateur@commentcamarche[2].txt Détecter: Trace.TrackingCookie
C:\Documents and Settings\Administrateur\Cookies\administrateur@fl01.ct2.comclick[1].txt Détecter: Trace.TrackingCookie
C:\Documents and Settings\Administrateur\Cookies\administrateur@fl01.ct2.comclick[3].txt Détecter: Trace.TrackingCookie
C:\Documents and Settings\Administrateur\Cookies\administrateur@smartadserver[1].txt Détecter: Trace.TrackingCookie
C:\Documents and Settings\Administrateur\Cookies\administrateur@smartadserver[3].txt Détecter: Trace.TrackingCookie
C:\Documents and Settings\Administrateur\Cookies\administrateur@weborama[1].txt Détecter: Trace.TrackingCookie
C:\Documents and Settings\Administrateur\Cookies\administrateur@www.cibleclick[2].txt Détecter: Trace.TrackingCookie
C:\WINDOWS\system32\Process.exe Détecter: Riskware.RiskTool.Win32.Processor.20
Scanné
Fichiers: 87773
Traces: 362521
Cookies: 73
Processus: 51
Trouver
Fichiers: 1
Traces: 50
Cookies: 11
Processus: 0
Clés de Registre: 0
Fin du Scan: 18/01/2008 19:42:38
Temps du Scan: 1:44:41
savais pas s il fallait supprimer
Dernière mise à jour: 18/01/2008 17:57:26
Réglages Scan:
Objets: Mémoire, Traces, Cookies, C:\WINDOWS\, C:\Program Files
Scan archives: Marche
Heuristiques: Marche
Scan ADS: Marche
Début du scan: 18/01/2008 17:57:57
c:\program files\lycos Détecter: Trace.Directory.LycosSidesearch
Key: HKEY_LOCAL_MACHINE\software\orl\winvnc3 Détecter: Trace.Registry.VNC.CommonComponents
Key: HKEY_LOCAL_MACHINE\system\currentcontrolset\services\winvnc Détecter: Trace.Registry.VNC.CommonComponents
Key: HKEY_LOCAL_MACHINE\software\realvnc Détecter: Trace.Registry.VNC
Key: HKEY_LOCAL_MACHINE\software\realvnc\winvnc4 Détecter: Trace.Registry.VNCServer
Value: HKEY_USERS\S-1-5-21-343818398-1645522239-725345543-500\Software\NirSoft\MessenPass --> Columns Détecter: Trace.Registry.MessenPass
Value: HKEY_USERS\S-1-5-21-343818398-1645522239-725345543-500\Software\NirSoft\MessenPass --> SaveFilterIndex Détecter: Trace.Registry.MessenPass
Value: HKEY_USERS\S-1-5-21-343818398-1645522239-725345543-500\Software\NirSoft\MessenPass --> ShowGridLines Détecter: Trace.Registry.MessenPass
Value: HKEY_USERS\S-1-5-21-343818398-1645522239-725345543-500\Software\NirSoft\MessenPass --> Sort Détecter: Trace.Registry.MessenPass
Value: HKEY_USERS\S-1-5-21-343818398-1645522239-725345543-500\Software\NirSoft\MessenPass --> WinPos Détecter: Trace.Registry.MessenPass
c:\program files\fichiers communs\artech Détecter: Trace.Directory.Big Mother
c:\program files\fichiers communs\artech\drconfig.exe Détecter: Trace.File.Big Mother
c:\program files\fichiers communs\artech\tupsoft.inf Détecter: Trace.File.Big Mother
Value: HKEY_CLASSES_ROOT\CLSID\{34136682-7AA2-4480-BC96-25B4EA81A4C9}\InprocServer32 --> ThreadingModel Détecter: Trace.Registry.Big Mother
Value: HKEY_CLASSES_ROOT\CLSID\{72966187-BEB4-43DD-9BAA-68CAA994C6B6}\InprocServer32 --> ThreadingModel Détecter: Trace.Registry.Big Mother
Value: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{34136682-7AA2-4480-BC96-25B4EA81A4C9}\InprocServer32 --> ThreadingModel Détecter: Trace.Registry.Big Mother
Value: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{72966187-BEB4-43DD-9BAA-68CAA994C6B6}\InprocServer32 --> ThreadingModel Détecter: Trace.Registry.Big Mother
Value: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\AnyRouter\Enum --> 0 Détecter: Trace.Registry.Big Mother
Value: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\AnyRouter\Enum --> Count Détecter: Trace.Registry.Big Mother
Value: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\AnyRouter\Enum --> NextInstance Détecter: Trace.Registry.Big Mother
Value: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\AnyRouter\Security --> Security Détecter: Trace.Registry.Big Mother
Value: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\AnyRouter --> DisplayName Détecter: Trace.Registry.Big Mother
Value: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\AnyRouter --> ErrorControl Détecter: Trace.Registry.Big Mother
Value: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\AnyRouter --> Group Détecter: Trace.Registry.Big Mother
Value: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\AnyRouter --> ImagePath Détecter: Trace.Registry.Big Mother
Value: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\AnyRouter --> Start Détecter: Trace.Registry.Big Mother
Value: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\AnyRouter --> Tag Détecter: Trace.Registry.Big Mother
Value: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\AnyRouter --> Type Détecter: Trace.Registry.Big Mother
Value: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\TupCaptureService\Enum --> 0 Détecter: Trace.Registry.Big Mother
Value: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\TupCaptureService\Enum --> Count Détecter: Trace.Registry.Big Mother
Value: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\TupCaptureService\Enum --> NextInstance Détecter: Trace.Registry.Big Mother
Value: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\TupCaptureService\Security --> Security Détecter: Trace.Registry.Big Mother
Value: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\TupCaptureService --> Description Détecter: Trace.Registry.Big Mother
Value: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\TupCaptureService --> DisplayName Détecter: Trace.Registry.Big Mother
Value: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\TupCaptureService --> ErrorControl Détecter: Trace.Registry.Big Mother
Value: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\TupCaptureService --> ImagePath Détecter: Trace.Registry.Big Mother
Value: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\TupCaptureService --> ObjectName Détecter: Trace.Registry.Big Mother
Value: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\TupCaptureService --> Start Détecter: Trace.Registry.Big Mother
Value: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\TupCaptureService --> Type Détecter: Trace.Registry.Big Mother
Value: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\AnyRouter\Enum --> 0 Détecter: Trace.Registry.Big Mother
Value: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\AnyRouter\Enum --> Count Détecter: Trace.Registry.Big Mother
Value: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\AnyRouter\Enum --> NextInstance Détecter: Trace.Registry.Big Mother
Value: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\AnyRouter\Security --> Security Détecter: Trace.Registry.Big Mother
Value: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\AnyRouter --> DisplayName Détecter: Trace.Registry.Big Mother
Value: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\AnyRouter --> ErrorControl Détecter: Trace.Registry.Big Mother
Value: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\AnyRouter --> Group Détecter: Trace.Registry.Big Mother
Value: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\AnyRouter --> ImagePath Détecter: Trace.Registry.Big Mother
Value: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\AnyRouter --> Start Détecter: Trace.Registry.Big Mother
Value: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\AnyRouter --> Tag Détecter: Trace.Registry.Big Mother
Value: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\AnyRouter --> Type Détecter: Trace.Registry.Big Mother
C:\Documents and Settings\Administrateur\Cookies\administrateur@adserver.aol[1].txt Détecter: Trace.TrackingCookie
C:\Documents and Settings\Administrateur\Cookies\administrateur@adserver.aol[2].txt Détecter: Trace.TrackingCookie
C:\Documents and Settings\Administrateur\Cookies\administrateur@adtech[1].txt Détecter: Trace.TrackingCookie
C:\Documents and Settings\Administrateur\Cookies\administrateur@adtech[2].txt Détecter: Trace.TrackingCookie
C:\Documents and Settings\Administrateur\Cookies\administrateur@commentcamarche[2].txt Détecter: Trace.TrackingCookie
C:\Documents and Settings\Administrateur\Cookies\administrateur@fl01.ct2.comclick[1].txt Détecter: Trace.TrackingCookie
C:\Documents and Settings\Administrateur\Cookies\administrateur@fl01.ct2.comclick[3].txt Détecter: Trace.TrackingCookie
C:\Documents and Settings\Administrateur\Cookies\administrateur@smartadserver[1].txt Détecter: Trace.TrackingCookie
C:\Documents and Settings\Administrateur\Cookies\administrateur@smartadserver[3].txt Détecter: Trace.TrackingCookie
C:\Documents and Settings\Administrateur\Cookies\administrateur@weborama[1].txt Détecter: Trace.TrackingCookie
C:\Documents and Settings\Administrateur\Cookies\administrateur@www.cibleclick[2].txt Détecter: Trace.TrackingCookie
C:\WINDOWS\system32\Process.exe Détecter: Riskware.RiskTool.Win32.Processor.20
Scanné
Fichiers: 87773
Traces: 362521
Cookies: 73
Processus: 51
Trouver
Fichiers: 1
Traces: 50
Cookies: 11
Processus: 0
Clés de Registre: 0
Fin du Scan: 18/01/2008 19:42:38
Temps du Scan: 1:44:41
savais pas s il fallait supprimer
Pour ton information, ta base de registre indique qu'au moins deux logiciels d'administration réseau sont installé sur ta machine : VNC et Big Mother. Ces deux outils servent à administrer les réseaux (utile en général dans les entreprises) mais peuvent servir à prendre le contrôle de ton ordinateur à distance ou à espionner tous tes faits et gestes : emails, chat, consultation internet, capture écran à ton insu... etc...
Tu devrais vérifier si quelqu'un n'a pas installé cela sans t'en parler... si c'est le cas, c'est punissable par la loi.
A+
Yas
Tu devrais vérifier si quelqu'un n'a pas installé cela sans t'en parler... si c'est le cas, c'est punissable par la loi.
A+
Yas
bonjour , je te conseille virus keeper , c'est plus facile ,il élimine directement les fichiers nuisibles , et regsupreme pour les clés et les erreurs sur ton registre.Ainsi tu n'a plus besoin de faire le scan .Donc , tu peux telecharger viruskeeper2008 pro , et faire une analyse de virus approfondie , sa prend quelque heures.
En esperant t'avoit aidé
En esperant t'avoit aidé