Your system was infected by an unknown trojan
julia68310
Messages postés
33
Date d'inscription
Statut
Membre
Dernière intervention
-
g!rly Messages postés 18215 Date d'inscription Statut Contributeur Dernière intervention -
g!rly Messages postés 18215 Date d'inscription Statut Contributeur Dernière intervention -
Salut...,
J'ai eu il y a 2 jours un virus trojan..., le message disait "your system was infected by an unknown trojan"
J'ai suivi des conseils en téléchargeant SmitFraudfix et le rapport m'a donné :
SmitFraudFix v2.308
Rapport fait à 13:39:03,17, 25/03/2008
Executé à partir de C:\Program Files\Mozilla Firefox\SmitfraudFix
OS: Microsoft Windows XP [version 5.1.2600] - Windows_NT
Le type du système de fichiers est NTFS
Fix executé en mode normal
»»»»»»»»»»»»»»»»»»»»»»»» Process
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\Analog Devices\SoundMAX\SMAgent.exe
C:\Program Files\Analog Devices\SoundMAX\SMax4PNP.exe
C:\WINDOWS\AGRSMMSG.exe
C:\Program Files\Apoint2K\Apoint.exe
C:\WINDOWS\system32\igfxtray.exe
C:\WINDOWS\system32\hkcmd.exe
C:\Program Files\Hp\HP Software Update\HPWuSchd2.exe
C:\Program Files\QuickTime\qttask.exe
C:\Program Files\HPQ\Quick Launch Buttons\EabServr.exe
C:\Program Files\Java\jre1.5.0_02\bin\jusched.exe
C:\Program Files\hpq\HP Wireless Assistant\HP Wireless Assistant.exe
C:\Program Files\Neuf\Kit\WiFi\9wifi.exe
C:\Program Files\Messenger\msmsgs.exe
C:\Program Files\Apoint2K\Apntex.exe
C:\WINDOWS\system32\wscntfy.exe
C:\Program Files\HPQ\shared\hpqwmi.exe
C:\WINDOWS\system32\wuauclt.exe
C:\Program Files\Mozilla Firefox\firefox.exe
C:\Program Files\Ares\Ares.exe
C:\WINDOWS\system32\cmd.exe
»»»»»»»»»»»»»»»»»»»»»»»» hosts
»»»»»»»»»»»»»»»»»»»»»»»» C:\
»»»»»»»»»»»»»»»»»»»»»»»» C:\WINDOWS
»»»»»»»»»»»»»»»»»»»»»»»» C:\WINDOWS\system
»»»»»»»»»»»»»»»»»»»»»»»» C:\WINDOWS\Web
»»»»»»»»»»»»»»»»»»»»»»»» C:\WINDOWS\system32
»»»»»»»»»»»»»»»»»»»»»»»» C:\Documents and Settings\Julia.JULIA
»»»»»»»»»»»»»»»»»»»»»»»» C:\Documents and Settings\Julia.JULIA\Application Data
»»»»»»»»»»»»»»»»»»»»»»»» Menu Démarrer
»»»»»»»»»»»»»»»»»»»»»»»» C:\DOCUME~1\JULIA~1.JUL\Favoris
»»»»»»»»»»»»»»»»»»»»»»»» Bureau
»»»»»»»»»»»»»»»»»»»»»»»» C:\Program Files
C:\Program Files\Helper\ PRESENT !
C:\Program Files\NetProject\ PRESENT !
»»»»»»»»»»»»»»»»»»»»»»»» Clés corrompues
»»»»»»»»»»»»»»»»»»»»»»»» Eléments du bureau
[HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Desktop\Components\0]
"Source"="About:Home"
"SubscribedURL"="About:Home"
"FriendlyName"="Ma page d'accueil"
»»»»»»»»»»»»»»»»»»»»»»»» IEDFix
!!!Attention, les clés qui suivent ne sont pas forcément infectées!!!
IEDFix
Credits: Malware Analysis & Diagnostic
Code: S!Ri
»»»»»»»»»»»»»»»»»»»»»»»» VACFix
!!!Attention, les clés qui suivent ne sont pas forcément infectées!!!
VACFix
Credits: Malware Analysis & Diagnostic
Code: S!Ri
»»»»»»»»»»»»»»»»»»»»»»»» Sharedtaskscheduler
!!!Attention, les clés qui suivent ne sont pas forcément infectées!!!
SrchSTS.exe by S!Ri
Search SharedTaskScheduler's .dll
»»»»»»»»»»»»»»»»»»»»»»»» AppInit_DLLs
!!!Attention, les clés qui suivent ne sont pas forcément infectées!!!
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows]
"AppInit_DLLs"=""
»»»»»»»»»»»»»»»»»»»»»»»» Winlogon
!!!Attention, les clés qui suivent ne sont pas forcément infectées!!!
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon]
"Userinit"="C:\\WINDOWS\\system32\\userinit.exe,"
"System"=""
»»»»»»»»»»»»»»»»»»»»»»»» Rustock
»»»»»»»»»»»»»»»»»»»»»»»» DNS
Description: Broadcom 802.11b/g WLAN - Miniport d'ordonnancement de paquets
DNS Server Search Order: 192.168.1.1
HKLM\SYSTEM\CCS\Services\Tcpip\..\{CE76B905-EFA7-49A1-B39D-789434C92BBF}: DhcpNameServer=192.168.1.1
HKLM\SYSTEM\CS1\Services\Tcpip\..\{CE76B905-EFA7-49A1-B39D-789434C92BBF}: DhcpNameServer=192.168.1.1
HKLM\SYSTEM\CS2\Services\Tcpip\..\{CE76B905-EFA7-49A1-B39D-789434C92BBF}: DhcpNameServer=192.168.1.1
HKLM\SYSTEM\CCS\Services\Tcpip\Parameters: DhcpNameServer=192.168.1.1
HKLM\SYSTEM\CS1\Services\Tcpip\Parameters: DhcpNameServer=192.168.1.1
HKLM\SYSTEM\CS2\Services\Tcpip\Parameters: DhcpNameServer=192.168.1.1
»»»»»»»»»»»»»»»»»»»»»»»» Recherche infection wininet.dll
»»»»»»»»»»»»»»»»»»»»»»»» Fin
J'aimerais que vous me disiez quoi faire
Avant que je fasse cela, quand j'ai eu le virus, j'ai formater mon ordinateur (bizarrement mes dossiers sont rester sur l'ordinateur, mais j'ai perdu certains accessoires de mon pc comme "longhorn inspirat" pour améliorer l'aspect de mon ordinateur...bref, le formatage terminer, je n'arrive pas à accéder à plusieurs dossiers dans windows, comme "cookies"..., puis plusieurs dossiers de musiques que j'avais... je n'arrive pas à supprimer, ni ouvrir... il m'est impossible aussi de telecharger une nouvelle version de msn car j'ai un problème lors du déroulement de l'installation, alors j'ai la toute première version déjà installé surl'ordinateur...bref je ne peux pas faire grand chose avec mon ordinateur, et j'aurais besoin d'aide...
Je sais pas du tout quoi faire...
J'espère que vous pourrez m'aider...
Merci
J'ai eu il y a 2 jours un virus trojan..., le message disait "your system was infected by an unknown trojan"
J'ai suivi des conseils en téléchargeant SmitFraudfix et le rapport m'a donné :
SmitFraudFix v2.308
Rapport fait à 13:39:03,17, 25/03/2008
Executé à partir de C:\Program Files\Mozilla Firefox\SmitfraudFix
OS: Microsoft Windows XP [version 5.1.2600] - Windows_NT
Le type du système de fichiers est NTFS
Fix executé en mode normal
»»»»»»»»»»»»»»»»»»»»»»»» Process
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\Analog Devices\SoundMAX\SMAgent.exe
C:\Program Files\Analog Devices\SoundMAX\SMax4PNP.exe
C:\WINDOWS\AGRSMMSG.exe
C:\Program Files\Apoint2K\Apoint.exe
C:\WINDOWS\system32\igfxtray.exe
C:\WINDOWS\system32\hkcmd.exe
C:\Program Files\Hp\HP Software Update\HPWuSchd2.exe
C:\Program Files\QuickTime\qttask.exe
C:\Program Files\HPQ\Quick Launch Buttons\EabServr.exe
C:\Program Files\Java\jre1.5.0_02\bin\jusched.exe
C:\Program Files\hpq\HP Wireless Assistant\HP Wireless Assistant.exe
C:\Program Files\Neuf\Kit\WiFi\9wifi.exe
C:\Program Files\Messenger\msmsgs.exe
C:\Program Files\Apoint2K\Apntex.exe
C:\WINDOWS\system32\wscntfy.exe
C:\Program Files\HPQ\shared\hpqwmi.exe
C:\WINDOWS\system32\wuauclt.exe
C:\Program Files\Mozilla Firefox\firefox.exe
C:\Program Files\Ares\Ares.exe
C:\WINDOWS\system32\cmd.exe
»»»»»»»»»»»»»»»»»»»»»»»» hosts
»»»»»»»»»»»»»»»»»»»»»»»» C:\
»»»»»»»»»»»»»»»»»»»»»»»» C:\WINDOWS
»»»»»»»»»»»»»»»»»»»»»»»» C:\WINDOWS\system
»»»»»»»»»»»»»»»»»»»»»»»» C:\WINDOWS\Web
»»»»»»»»»»»»»»»»»»»»»»»» C:\WINDOWS\system32
»»»»»»»»»»»»»»»»»»»»»»»» C:\Documents and Settings\Julia.JULIA
»»»»»»»»»»»»»»»»»»»»»»»» C:\Documents and Settings\Julia.JULIA\Application Data
»»»»»»»»»»»»»»»»»»»»»»»» Menu Démarrer
»»»»»»»»»»»»»»»»»»»»»»»» C:\DOCUME~1\JULIA~1.JUL\Favoris
»»»»»»»»»»»»»»»»»»»»»»»» Bureau
»»»»»»»»»»»»»»»»»»»»»»»» C:\Program Files
C:\Program Files\Helper\ PRESENT !
C:\Program Files\NetProject\ PRESENT !
»»»»»»»»»»»»»»»»»»»»»»»» Clés corrompues
»»»»»»»»»»»»»»»»»»»»»»»» Eléments du bureau
[HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Desktop\Components\0]
"Source"="About:Home"
"SubscribedURL"="About:Home"
"FriendlyName"="Ma page d'accueil"
»»»»»»»»»»»»»»»»»»»»»»»» IEDFix
!!!Attention, les clés qui suivent ne sont pas forcément infectées!!!
IEDFix
Credits: Malware Analysis & Diagnostic
Code: S!Ri
»»»»»»»»»»»»»»»»»»»»»»»» VACFix
!!!Attention, les clés qui suivent ne sont pas forcément infectées!!!
VACFix
Credits: Malware Analysis & Diagnostic
Code: S!Ri
»»»»»»»»»»»»»»»»»»»»»»»» Sharedtaskscheduler
!!!Attention, les clés qui suivent ne sont pas forcément infectées!!!
SrchSTS.exe by S!Ri
Search SharedTaskScheduler's .dll
»»»»»»»»»»»»»»»»»»»»»»»» AppInit_DLLs
!!!Attention, les clés qui suivent ne sont pas forcément infectées!!!
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows]
"AppInit_DLLs"=""
»»»»»»»»»»»»»»»»»»»»»»»» Winlogon
!!!Attention, les clés qui suivent ne sont pas forcément infectées!!!
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon]
"Userinit"="C:\\WINDOWS\\system32\\userinit.exe,"
"System"=""
»»»»»»»»»»»»»»»»»»»»»»»» Rustock
»»»»»»»»»»»»»»»»»»»»»»»» DNS
Description: Broadcom 802.11b/g WLAN - Miniport d'ordonnancement de paquets
DNS Server Search Order: 192.168.1.1
HKLM\SYSTEM\CCS\Services\Tcpip\..\{CE76B905-EFA7-49A1-B39D-789434C92BBF}: DhcpNameServer=192.168.1.1
HKLM\SYSTEM\CS1\Services\Tcpip\..\{CE76B905-EFA7-49A1-B39D-789434C92BBF}: DhcpNameServer=192.168.1.1
HKLM\SYSTEM\CS2\Services\Tcpip\..\{CE76B905-EFA7-49A1-B39D-789434C92BBF}: DhcpNameServer=192.168.1.1
HKLM\SYSTEM\CCS\Services\Tcpip\Parameters: DhcpNameServer=192.168.1.1
HKLM\SYSTEM\CS1\Services\Tcpip\Parameters: DhcpNameServer=192.168.1.1
HKLM\SYSTEM\CS2\Services\Tcpip\Parameters: DhcpNameServer=192.168.1.1
»»»»»»»»»»»»»»»»»»»»»»»» Recherche infection wininet.dll
»»»»»»»»»»»»»»»»»»»»»»»» Fin
J'aimerais que vous me disiez quoi faire
Avant que je fasse cela, quand j'ai eu le virus, j'ai formater mon ordinateur (bizarrement mes dossiers sont rester sur l'ordinateur, mais j'ai perdu certains accessoires de mon pc comme "longhorn inspirat" pour améliorer l'aspect de mon ordinateur...bref, le formatage terminer, je n'arrive pas à accéder à plusieurs dossiers dans windows, comme "cookies"..., puis plusieurs dossiers de musiques que j'avais... je n'arrive pas à supprimer, ni ouvrir... il m'est impossible aussi de telecharger une nouvelle version de msn car j'ai un problème lors du déroulement de l'installation, alors j'ai la toute première version déjà installé surl'ordinateur...bref je ne peux pas faire grand chose avec mon ordinateur, et j'aurais besoin d'aide...
Je sais pas du tout quoi faire...
J'espère que vous pourrez m'aider...
Merci
A voir également:
- Your system was infected by an unknown trojan
- Reboot system now - Guide
- Your device ran into a problem and needs to restart - Forum Windows 10
- Cette action ne peut pas être réalisée car le fichier est ouvert dans system - Guide
- Usb\unknown - Télécharger - Optimisation
- Fichier ouvert dans system ✓ - Forum Windows
63 réponses
salut julia,
fais ceci :
Redémarre le PC en mode sans échec : tu tapotes sur la touche F8 de ton clavier (ou F5 ) dès le démarrage et tu choisis le mode sans échec)
- Ouvre le dossier "SmitfraudFix" et double clique sur "Smitfraudfix.cmd", choisit l 'option 2 et tu réponds oui à tout.
Enregistre le rapport puis Copie/colle le rapport sur le forum stp.
puis
Télécharge HijackThis ici :
-> http://www.commentcamarche.net/telecharger/telecharger 159 hijackthis
Tutoriel d´instalation : (Merci a Balltrap34 pour cette réalisation)
-> http://pageperso.aol.fr/balltrap34/Hijenr.gif
Tutoriel d´utilisation (video) : (Merci a Balltrap34 pour cette réalisation)
-> http://perso.orange.fr/rginformatique/section%20virus/demohijack.htm
Post les rapports générés ici stp...
@+
fais ceci :
Redémarre le PC en mode sans échec : tu tapotes sur la touche F8 de ton clavier (ou F5 ) dès le démarrage et tu choisis le mode sans échec)
- Ouvre le dossier "SmitfraudFix" et double clique sur "Smitfraudfix.cmd", choisit l 'option 2 et tu réponds oui à tout.
Enregistre le rapport puis Copie/colle le rapport sur le forum stp.
puis
Télécharge HijackThis ici :
-> http://www.commentcamarche.net/telecharger/telecharger 159 hijackthis
Tutoriel d´instalation : (Merci a Balltrap34 pour cette réalisation)
-> http://pageperso.aol.fr/balltrap34/Hijenr.gif
Tutoriel d´utilisation (video) : (Merci a Balltrap34 pour cette réalisation)
-> http://perso.orange.fr/rginformatique/section%20virus/demohijack.htm
Post les rapports générés ici stp...
@+
SmitFraudFix v2.308
Rapport fait à 19:20:18,18, 25/03/2008
Executé à partir de C:\Documents and Settings\Julia.JULIA\Bureau\SmitfraudFix
OS: Microsoft Windows XP [version 5.1.2600] - Windows_NT
Le type du système de fichiers est NTFS
Fix executé en mode sans echec
»»»»»»»»»»»»»»»»»»»»»»»» SharedTaskScheduler Avant SmitFraudFix
!!!Attention, les clés qui suivent ne sont pas forcément infectées!!!
SrchSTS.exe by S!Ri
Search SharedTaskScheduler's .dll
»»»»»»»»»»»»»»»»»»»»»»»» Arret des processus
»»»»»»»»»»»»»»»»»»»»»»»» hosts
127.0.0.1 localhost
»»»»»»»»»»»»»»»»»»»»»»»» VACFix
VACFix
Credits: Malware Analysis & Diagnostic
Code: S!Ri
»»»»»»»»»»»»»»»»»»»»»»»» Winsock2 Fix
S!Ri's WS2Fix: LSP not Found.
»»»»»»»»»»»»»»»»»»»»»»»» Generic Renos Fix
GenericRenosFix by S!Ri
»»»»»»»»»»»»»»»»»»»»»»»» Suppression des fichiers infectés
C:\Program Files\Helper\ supprimé
C:\Program Files\NetProject\ supprimé
»»»»»»»»»»»»»»»»»»»»»»»» IEDFix
IEDFix
Credits: Malware Analysis & Diagnostic
Code: S!Ri
»»»»»»»»»»»»»»»»»»»»»»»» DNS
HKLM\SYSTEM\CCS\Services\Tcpip\..\{CE76B905-EFA7-49A1-B39D-789434C92BBF}: DhcpNameServer=192.168.1.1
HKLM\SYSTEM\CS1\Services\Tcpip\..\{CE76B905-EFA7-49A1-B39D-789434C92BBF}: DhcpNameServer=192.168.1.1
HKLM\SYSTEM\CS2\Services\Tcpip\..\{CE76B905-EFA7-49A1-B39D-789434C92BBF}: DhcpNameServer=192.168.1.1
HKLM\SYSTEM\CCS\Services\Tcpip\Parameters: DhcpNameServer=192.168.1.1
HKLM\SYSTEM\CS1\Services\Tcpip\Parameters: DhcpNameServer=192.168.1.1
HKLM\SYSTEM\CS2\Services\Tcpip\Parameters: DhcpNameServer=192.168.1.1
»»»»»»»»»»»»»»»»»»»»»»»» Suppression Fichiers Temporaires
»»»»»»»»»»»»»»»»»»»»»»»» Winlogon.System
!!!Attention, les clés qui suivent ne sont pas forcément infectées!!!
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon]
"System"=""
»»»»»»»»»»»»»»»»»»»»»»»» Nettoyage du registre
Nettoyage terminé.
»»»»»»»»»»»»»»»»»»»»»»»» SharedTaskScheduler Après SmitFraudFix
!!!Attention, les clés qui suivent ne sont pas forcément infectées!!!
SrchSTS.exe by S!Ri
Search SharedTaskScheduler's .dll
»»»»»»»»»»»»»»»»»»»»»»»» Fin
Merci beaucoup
Je vais faire la suite de ce que tu m'as dit
Rapport fait à 19:20:18,18, 25/03/2008
Executé à partir de C:\Documents and Settings\Julia.JULIA\Bureau\SmitfraudFix
OS: Microsoft Windows XP [version 5.1.2600] - Windows_NT
Le type du système de fichiers est NTFS
Fix executé en mode sans echec
»»»»»»»»»»»»»»»»»»»»»»»» SharedTaskScheduler Avant SmitFraudFix
!!!Attention, les clés qui suivent ne sont pas forcément infectées!!!
SrchSTS.exe by S!Ri
Search SharedTaskScheduler's .dll
»»»»»»»»»»»»»»»»»»»»»»»» Arret des processus
»»»»»»»»»»»»»»»»»»»»»»»» hosts
127.0.0.1 localhost
»»»»»»»»»»»»»»»»»»»»»»»» VACFix
VACFix
Credits: Malware Analysis & Diagnostic
Code: S!Ri
»»»»»»»»»»»»»»»»»»»»»»»» Winsock2 Fix
S!Ri's WS2Fix: LSP not Found.
»»»»»»»»»»»»»»»»»»»»»»»» Generic Renos Fix
GenericRenosFix by S!Ri
»»»»»»»»»»»»»»»»»»»»»»»» Suppression des fichiers infectés
C:\Program Files\Helper\ supprimé
C:\Program Files\NetProject\ supprimé
»»»»»»»»»»»»»»»»»»»»»»»» IEDFix
IEDFix
Credits: Malware Analysis & Diagnostic
Code: S!Ri
»»»»»»»»»»»»»»»»»»»»»»»» DNS
HKLM\SYSTEM\CCS\Services\Tcpip\..\{CE76B905-EFA7-49A1-B39D-789434C92BBF}: DhcpNameServer=192.168.1.1
HKLM\SYSTEM\CS1\Services\Tcpip\..\{CE76B905-EFA7-49A1-B39D-789434C92BBF}: DhcpNameServer=192.168.1.1
HKLM\SYSTEM\CS2\Services\Tcpip\..\{CE76B905-EFA7-49A1-B39D-789434C92BBF}: DhcpNameServer=192.168.1.1
HKLM\SYSTEM\CCS\Services\Tcpip\Parameters: DhcpNameServer=192.168.1.1
HKLM\SYSTEM\CS1\Services\Tcpip\Parameters: DhcpNameServer=192.168.1.1
HKLM\SYSTEM\CS2\Services\Tcpip\Parameters: DhcpNameServer=192.168.1.1
»»»»»»»»»»»»»»»»»»»»»»»» Suppression Fichiers Temporaires
»»»»»»»»»»»»»»»»»»»»»»»» Winlogon.System
!!!Attention, les clés qui suivent ne sont pas forcément infectées!!!
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon]
"System"=""
»»»»»»»»»»»»»»»»»»»»»»»» Nettoyage du registre
Nettoyage terminé.
»»»»»»»»»»»»»»»»»»»»»»»» SharedTaskScheduler Après SmitFraudFix
!!!Attention, les clés qui suivent ne sont pas forcément infectées!!!
SrchSTS.exe by S!Ri
Search SharedTaskScheduler's .dll
»»»»»»»»»»»»»»»»»»»»»»»» Fin
Merci beaucoup
Je vais faire la suite de ce que tu m'as dit
Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 19:31:00, on 25/03/2008
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)
Boot mode: Normal
Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\Analog Devices\SoundMAX\SMAgent.exe
C:\Program Files\Analog Devices\SoundMAX\SMax4PNP.exe
C:\WINDOWS\AGRSMMSG.exe
C:\Program Files\Apoint2K\Apoint.exe
C:\WINDOWS\system32\igfxtray.exe
C:\WINDOWS\system32\hkcmd.exe
C:\Program Files\Hp\HP Software Update\HPWuSchd2.exe
C:\Program Files\QuickTime\qttask.exe
C:\Program Files\HPQ\Quick Launch Buttons\EabServr.exe
C:\Program Files\Java\jre1.5.0_02\bin\jusched.exe
C:\Program Files\hpq\HP Wireless Assistant\HP Wireless Assistant.exe
C:\Program Files\Neuf\Kit\WiFi\9wifi.exe
C:\Program Files\Apoint2K\Apntex.exe
C:\Program Files\Messenger\msmsgs.exe
C:\Program Files\Ares\Ares.exe
C:\WINDOWS\system32\wscntfy.exe
C:\Program Files\HPQ\shared\hpqwmi.exe
C:\Program Files\Mozilla Firefox\firefox.exe
C:\WINDOWS\system32\wuauclt.exe
C:\WINDOWS\system32\wuauclt.exe
C:\Program Files\Trend Micro\HijackThis\HijackThis.exe
\?\C:\WINDOWS\system32\WBEM\WMIADAP.EXE
R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName = Liens
O2 - BHO: AcroIEHlprObj Class - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 6.0\Reader\ActiveX\AcroIEHelper.dll
O4 - HKLM\..\Run: [IMJPMIG8.1] "C:\WINDOWS\IME\imjp8_1\IMJPMIG.EXE" /Spoil /RemAdvDef /Migration32
O4 - HKLM\..\Run: [PHIME2002ASync] C:\WINDOWS\system32\IME\TINTLGNT\TINTSETP.EXE /SYNC
O4 - HKLM\..\Run: [PHIME2002A] C:\WINDOWS\system32\IME\TINTLGNT\TINTSETP.EXE /IMEName
O4 - HKLM\..\Run: [MSPY2002] C:\WINDOWS\system32\IME\PINTLGNT\ImScInst.exe /SYNC
O4 - HKLM\..\Run: [SoundMAXPnP] C:\Program Files\Analog Devices\SoundMAX\SMax4PNP.exe
O4 - HKLM\..\Run: [SoundMAX] C:\Program Files\Analog Devices\SoundMAX\Smax4.exe /tray
O4 - HKLM\..\Run: [AGRSMMSG] AGRSMMSG.exe
O4 - HKLM\..\Run: [Apoint] C:\Program Files\Apoint2K\Apoint.exe
O4 - HKLM\..\Run: [IgfxTray] C:\WINDOWS\system32\igfxtray.exe
O4 - HKLM\..\Run: [HotKeysCmds] C:\WINDOWS\system32\hkcmd.exe
O4 - HKLM\..\Run: [Cpqset] C:\Program Files\HPQ\Default Settings\cpqset.exe
O4 - HKLM\..\Run: [HP Software Update] C:\Program Files\Hp\HP Software Update\HPWuSchd2.exe
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
O4 - HKLM\..\Run: [eabconfg.cpl] C:\Program Files\HPQ\Quick Launch Buttons\EabServr.exe /Start
O4 - HKLM\..\Run: [SunJavaUpdateSched] C:\Program Files\Java\jre1.5.0_02\bin\jusched.exe
O4 - HKLM\..\Run: [hpWirelessAssistant] C:\Program Files\hpq\HP Wireless Assistant\HP Wireless Assistant.exe
O4 - HKLM\..\Run: [Autoconfigurateur WiFi Neuf] "C:\Program Files\Neuf\Kit\WiFi\9wifi.exe"
O4 - HKCU\..\Run: [MSMSGS] "C:\Program Files\Messenger\msmsgs.exe" /background
O4 - HKCU\..\Run: [MsnMsgr] "C:\Program Files\MSN Messenger\MsnMsgr.Exe" /background
O4 - HKCU\..\Run: [ares] "C:\Program Files\Ares\Ares.exe" -h
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_02\bin\npjpi150_02.dll
O9 - Extra 'Tools' menuitem: Console Java (Sun) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_02\bin\npjpi150_02.dll
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O16 - DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} (WUWebControl Class) - http://www.update.microsoft.com/...
O23 - Service: HP WMI Interface (hpqwmi) - Hewlett-Packard Development Company, L.P. - C:\Program Files\HPQ\shared\hpqwmi.exe
O23 - Service: SoundMAX Agent Service (SoundMAX Agent Service (default)) - Analog Devices, Inc. - C:\Program Files\Analog Devices\SoundMAX\SMAgent.exe
Scan saved at 19:31:00, on 25/03/2008
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)
Boot mode: Normal
Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\Analog Devices\SoundMAX\SMAgent.exe
C:\Program Files\Analog Devices\SoundMAX\SMax4PNP.exe
C:\WINDOWS\AGRSMMSG.exe
C:\Program Files\Apoint2K\Apoint.exe
C:\WINDOWS\system32\igfxtray.exe
C:\WINDOWS\system32\hkcmd.exe
C:\Program Files\Hp\HP Software Update\HPWuSchd2.exe
C:\Program Files\QuickTime\qttask.exe
C:\Program Files\HPQ\Quick Launch Buttons\EabServr.exe
C:\Program Files\Java\jre1.5.0_02\bin\jusched.exe
C:\Program Files\hpq\HP Wireless Assistant\HP Wireless Assistant.exe
C:\Program Files\Neuf\Kit\WiFi\9wifi.exe
C:\Program Files\Apoint2K\Apntex.exe
C:\Program Files\Messenger\msmsgs.exe
C:\Program Files\Ares\Ares.exe
C:\WINDOWS\system32\wscntfy.exe
C:\Program Files\HPQ\shared\hpqwmi.exe
C:\Program Files\Mozilla Firefox\firefox.exe
C:\WINDOWS\system32\wuauclt.exe
C:\WINDOWS\system32\wuauclt.exe
C:\Program Files\Trend Micro\HijackThis\HijackThis.exe
\?\C:\WINDOWS\system32\WBEM\WMIADAP.EXE
R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName = Liens
O2 - BHO: AcroIEHlprObj Class - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 6.0\Reader\ActiveX\AcroIEHelper.dll
O4 - HKLM\..\Run: [IMJPMIG8.1] "C:\WINDOWS\IME\imjp8_1\IMJPMIG.EXE" /Spoil /RemAdvDef /Migration32
O4 - HKLM\..\Run: [PHIME2002ASync] C:\WINDOWS\system32\IME\TINTLGNT\TINTSETP.EXE /SYNC
O4 - HKLM\..\Run: [PHIME2002A] C:\WINDOWS\system32\IME\TINTLGNT\TINTSETP.EXE /IMEName
O4 - HKLM\..\Run: [MSPY2002] C:\WINDOWS\system32\IME\PINTLGNT\ImScInst.exe /SYNC
O4 - HKLM\..\Run: [SoundMAXPnP] C:\Program Files\Analog Devices\SoundMAX\SMax4PNP.exe
O4 - HKLM\..\Run: [SoundMAX] C:\Program Files\Analog Devices\SoundMAX\Smax4.exe /tray
O4 - HKLM\..\Run: [AGRSMMSG] AGRSMMSG.exe
O4 - HKLM\..\Run: [Apoint] C:\Program Files\Apoint2K\Apoint.exe
O4 - HKLM\..\Run: [IgfxTray] C:\WINDOWS\system32\igfxtray.exe
O4 - HKLM\..\Run: [HotKeysCmds] C:\WINDOWS\system32\hkcmd.exe
O4 - HKLM\..\Run: [Cpqset] C:\Program Files\HPQ\Default Settings\cpqset.exe
O4 - HKLM\..\Run: [HP Software Update] C:\Program Files\Hp\HP Software Update\HPWuSchd2.exe
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
O4 - HKLM\..\Run: [eabconfg.cpl] C:\Program Files\HPQ\Quick Launch Buttons\EabServr.exe /Start
O4 - HKLM\..\Run: [SunJavaUpdateSched] C:\Program Files\Java\jre1.5.0_02\bin\jusched.exe
O4 - HKLM\..\Run: [hpWirelessAssistant] C:\Program Files\hpq\HP Wireless Assistant\HP Wireless Assistant.exe
O4 - HKLM\..\Run: [Autoconfigurateur WiFi Neuf] "C:\Program Files\Neuf\Kit\WiFi\9wifi.exe"
O4 - HKCU\..\Run: [MSMSGS] "C:\Program Files\Messenger\msmsgs.exe" /background
O4 - HKCU\..\Run: [MsnMsgr] "C:\Program Files\MSN Messenger\MsnMsgr.Exe" /background
O4 - HKCU\..\Run: [ares] "C:\Program Files\Ares\Ares.exe" -h
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_02\bin\npjpi150_02.dll
O9 - Extra 'Tools' menuitem: Console Java (Sun) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_02\bin\npjpi150_02.dll
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O16 - DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} (WUWebControl Class) - http://www.update.microsoft.com/...
O23 - Service: HP WMI Interface (hpqwmi) - Hewlett-Packard Development Company, L.P. - C:\Program Files\HPQ\shared\hpqwmi.exe
O23 - Service: SoundMAX Agent Service (SoundMAX Agent Service (default)) - Analog Devices, Inc. - C:\Program Files\Analog Devices\SoundMAX\SMAgent.exe
julia,
oui c´est bien ca ;-)
par contre la y a un probleme !
tu n´as aucune protection !!!!
instale : par feu :
Online armor :
http://www.commentcamarche.net/telecharger/telecharger 34055356 online armor personal firewall
tuto : https://forum.pcastuces.com/sujet.asp?f=25&s=35606
anti virus :
Telecharge et instales l'antivirus Antivir Personal Edition Classic :
->https://www.malekal.com/avira-free-security-antivirus-gratuit/
https://www.avira.com/en/prime
http://mickael.barroux.free.fr/securite/antivir.php
http://speedweb1.free.fr/frames2.php?page=tuto5
<- tutoriel configuration du scanner...
une fois antivir ouvert click surconfiguration et coche la case "expert mode" puis sur l´onglet scanner dans la fenetre du dessous tu va voir : rootkit search click sur le petit + pour deployer et coche la case a coté de ton disk dur
puis click sur configuration en haut a droite; dans la nouvelle fenetre a gauche >scanner > coche "scan all files" et en dessous >scanner priority = High
coche : allow stopping the scanner, comme cela tu peux faire une pause pendant le scan si tu le desir.
puis sur la droite coche les case suivantes :
scan boot sectors of selected drives
scan master boot sectors
scan memory
search foe rootkit before scan
decoche :
ignore off line files
toujours a gauche > scan > deploie > heuristique > macrovirus heuristic = coché et en dessous > win32 heuristic la case coché et high detection level
spywareblaster :
http://www.brightfort.com/spywareblaster.html
c´est un resident, il suffit de le mettre a jour de temps en temps car la version gratuite ne le fait pas toute seul , une fois installé et mis a jour tu mets toutes les protections sur "enable"
tuto : http://forum.telecharger.01net.com/forum/high-tech/PRODUITS/Questions-techniques/question-spywareblaser-sujet_174747_1.htm
tu surf avec internet explorer 6.0 = failles de securitées importantes
alors fais les mises a jour windows : tu veux la version 7.0
https://support.microsoft.com/en-US/topic/internet-explorer-downloads-d49e1f0d-571c-9a7b-d97e-be248806ca70
et pourquoi ne pas surfer avec firefox? = plus sur, tout en gardant ie 7.0 pour les mises a jour windows car impossible a effectuer sous firefox
http://www.mozilla-europe.org/fr/
plugins : ad block plus ect...
https://www.hugedomains.com/domain_profile.cfm?d=geckozone&e=org
regarde ce tutorial pour mettre ta console java a jour :
https://www.malekal.com/maintenir-java-adobe-reader-et-le-player-flash-a-jour/
ta version de acrobat reader n´est pas a jour, tu veux la version 8.1 derniere en date alors desinstale ta version par le panneau de configuration / ajoue et suppression de programme
et instale la derniere :
https://get2.adobe.com/reader/otherversions/
ou oublie completement acrobat reader et instales foxit plus léger a la place:
https://www.clubic.com/telecharger-fiche13808-foxit-reader.html
puis une fois tout ceci fais
performes un scan a l´aide d´antivir avec les reglages que je t´ai stipulés au dessus et post le rapport ici stp
@+
oui c´est bien ca ;-)
par contre la y a un probleme !
tu n´as aucune protection !!!!
instale : par feu :
Online armor :
http://www.commentcamarche.net/telecharger/telecharger 34055356 online armor personal firewall
tuto : https://forum.pcastuces.com/sujet.asp?f=25&s=35606
anti virus :
Telecharge et instales l'antivirus Antivir Personal Edition Classic :
->https://www.malekal.com/avira-free-security-antivirus-gratuit/
https://www.avira.com/en/prime
http://mickael.barroux.free.fr/securite/antivir.php
http://speedweb1.free.fr/frames2.php?page=tuto5
<- tutoriel configuration du scanner...
une fois antivir ouvert click surconfiguration et coche la case "expert mode" puis sur l´onglet scanner dans la fenetre du dessous tu va voir : rootkit search click sur le petit + pour deployer et coche la case a coté de ton disk dur
puis click sur configuration en haut a droite; dans la nouvelle fenetre a gauche >scanner > coche "scan all files" et en dessous >scanner priority = High
coche : allow stopping the scanner, comme cela tu peux faire une pause pendant le scan si tu le desir.
puis sur la droite coche les case suivantes :
scan boot sectors of selected drives
scan master boot sectors
scan memory
search foe rootkit before scan
decoche :
ignore off line files
toujours a gauche > scan > deploie > heuristique > macrovirus heuristic = coché et en dessous > win32 heuristic la case coché et high detection level
spywareblaster :
http://www.brightfort.com/spywareblaster.html
c´est un resident, il suffit de le mettre a jour de temps en temps car la version gratuite ne le fait pas toute seul , une fois installé et mis a jour tu mets toutes les protections sur "enable"
tuto : http://forum.telecharger.01net.com/forum/high-tech/PRODUITS/Questions-techniques/question-spywareblaser-sujet_174747_1.htm
tu surf avec internet explorer 6.0 = failles de securitées importantes
alors fais les mises a jour windows : tu veux la version 7.0
https://support.microsoft.com/en-US/topic/internet-explorer-downloads-d49e1f0d-571c-9a7b-d97e-be248806ca70
et pourquoi ne pas surfer avec firefox? = plus sur, tout en gardant ie 7.0 pour les mises a jour windows car impossible a effectuer sous firefox
http://www.mozilla-europe.org/fr/
plugins : ad block plus ect...
https://www.hugedomains.com/domain_profile.cfm?d=geckozone&e=org
regarde ce tutorial pour mettre ta console java a jour :
https://www.malekal.com/maintenir-java-adobe-reader-et-le-player-flash-a-jour/
ta version de acrobat reader n´est pas a jour, tu veux la version 8.1 derniere en date alors desinstale ta version par le panneau de configuration / ajoue et suppression de programme
et instale la derniere :
https://get2.adobe.com/reader/otherversions/
ou oublie completement acrobat reader et instales foxit plus léger a la place:
https://www.clubic.com/telecharger-fiche13808-foxit-reader.html
puis une fois tout ceci fais
performes un scan a l´aide d´antivir avec les reglages que je t´ai stipulés au dessus et post le rapport ici stp
@+
Vous n’avez pas trouvé la réponse que vous recherchez ?
Posez votre question
Oh yé c'est bien compliqué tout ce que tu m'as écrit :s
Je vais essayer de faire tout ça au mieux
Avant j'avais un antivirus et des pare feux, mais vu que j'ai formater mon ordinateur, j'ai plus..., j'ai plus rien sur mon ordi, c'est pour ça..., par contre je surfe avec mozilla, et je pense avoir les derniers version de acrobat reader, puis java, vu que j'ai tout installer y'a seulement 2 jours...
Pour le rapport à te donner, je dois donc le faire à partir de l'antivirus, c'est ça ?
Merci beaucoup de m'aider en tout cas... :)
Je vais essayer de faire tout ça au mieux
Avant j'avais un antivirus et des pare feux, mais vu que j'ai formater mon ordinateur, j'ai plus..., j'ai plus rien sur mon ordi, c'est pour ça..., par contre je surfe avec mozilla, et je pense avoir les derniers version de acrobat reader, puis java, vu que j'ai tout installer y'a seulement 2 jours...
Pour le rapport à te donner, je dois donc le faire à partir de l'antivirus, c'est ça ?
Merci beaucoup de m'aider en tout cas... :)
re,
ah oui je voie > formatage...
acrobat tu as la version 6.0 on en est a la 8.12
java tu as 1.5.0_02 on en est a la 1.6.0_05
oui une fois installé toutes les protections; performes un scan a l´aide de l´antivirus (antivir) et post le rapport ici ;-)
bon courrage
de rien`
@+
ah oui je voie > formatage...
acrobat tu as la version 6.0 on en est a la 8.12
java tu as 1.5.0_02 on en est a la 1.6.0_05
oui une fois installé toutes les protections; performes un scan a l´aide de l´antivirus (antivir) et post le rapport ici ;-)
bon courrage
de rien`
@+
je viens de faire un scan ou je sais pas quoi, quand j'ai installé l'anti virus, enfaite j'ai suivi les imprim écran de la page que tu m'a envoyé : https://www.malekal.com/avira-free-security-antivirus-gratuit/ et lors de l'opération de scan, au bout d'un certain moment y'a eu un petit bip et ça ma ecri sur le logiciel :
C:/Documents and Settings/julia/.../zfe1.exe
Is the Trojan horse TR/Zlob.IZA (surligne en bleu)
et il me demande quoi faire
"Move to quarantine"
"Delete"
"Rename"
"Ignore"
Je met quoi ?
et est ce que je coche la case "Apply selection to all flowing detections"?
(je suis très mauvaise en anglais :s)
J'attend ta réponse avec impatience
C:/Documents and Settings/julia/.../zfe1.exe
Is the Trojan horse TR/Zlob.IZA (surligne en bleu)
et il me demande quoi faire
"Move to quarantine"
"Delete"
"Rename"
"Ignore"
Je met quoi ?
et est ce que je coche la case "Apply selection to all flowing detections"?
(je suis très mauvaise en anglais :s)
J'attend ta réponse avec impatience
quand j'ai coché "delete"
Il me rajoute la case "backup to quarantine" je la coche ? et est ce que je coche alors "Apply selection to all following detections" ?
J'éspère que je te dérange pas :s
Il me rajoute la case "backup to quarantine" je la coche ? et est ce que je coche alors "Apply selection to all following detections" ?
J'éspère que je te dérange pas :s
non tu deranges pas ;-)
backup to quarantine veux dire qu´il va mettre le fichier en quarantaine, celui la tu ne veux pas, mais si il te demande pour apres egalement, dis oui, il faudras juste que tu vide la quarantaine apres, en clickant sur l´onglet quarantaine puis tu selectionne le fichier en question dans la liste et tu click sur l´icone corbeille.
@+
backup to quarantine veux dire qu´il va mettre le fichier en quarantaine, celui la tu ne veux pas, mais si il te demande pour apres egalement, dis oui, il faudras juste que tu vide la quarantaine apres, en clickant sur l´onglet quarantaine puis tu selectionne le fichier en question dans la liste et tu click sur l´icone corbeille.
@+
grr cette fois ile me trouve quelque chose ds
"documents and settings/.../SmitfraudFix.exe"
"Contains detection pattern of the dropper DR/Tool.Reboot.F.70"
et il m'a selectionner tout de suite "ignore", je laisse ignorer ?
PS/Avant il ma sorti plusieurs trucs, mais j'ai mis delete a chaque fois..., j'éspère que je fais pas de connerie :s
"documents and settings/.../SmitfraudFix.exe"
"Contains detection pattern of the dropper DR/Tool.Reboot.F.70"
et il m'a selectionner tout de suite "ignore", je laisse ignorer ?
PS/Avant il ma sorti plusieurs trucs, mais j'ai mis delete a chaque fois..., j'éspère que je fais pas de connerie :s
j'ai mis "ignore", je sais pas si il fallait...
maintenant il me ressorte autre chose encore dans SmitfraudFix, et ils me selectionne "access deny" , je sais pas ce que je dois faire...
maintenant il me ressorte autre chose encore dans SmitfraudFix, et ils me selectionne "access deny" , je sais pas ce que je dois faire...
j'ai continuer le scan..., j'ai mis a chaque fois ce qui était sélectionner en premier...
mais je pense pas que ce que j'ai fais est important puisque c'était à propos du logiciel SmitFraudFix..., au pire je referais le scan si jamais...
Je suis a 74% là du scan...
mais je pense pas que ce que j'ai fais est important puisque c'était à propos du logiciel SmitFraudFix..., au pire je referais le scan si jamais...
Je suis a 74% là du scan...
Voilà le résultat :
AntiVir PersonalEdition Classic
Report file date: mardi 25 mars 2008 20:55
Scanning for 1165923 virus strains and unwanted programs.
Licensed to: Avira AntiVir PersonalEdition Classic
Serial number: 0000149996-ADJIE-0001
Platform: Windows XP
Windows version: (Service Pack 2) [5.1.2600]
Username: SYSTEM
Computer name: JULIA
Version information:
BUILD.DAT : 270 15603 Bytes 19/09/2007 13:32:00
AVSCAN.EXE : 7.0.6.1 290856 Bytes 23/08/2007 13:16:29
AVSCAN.DLL : 7.0.6.0 49192 Bytes 16/08/2007 12:23:51
LUKE.DLL : 7.0.5.3 147496 Bytes 14/08/2007 15:32:47
LUKERES.DLL : 7.0.6.1 10280 Bytes 21/08/2007 12:35:20
ANTIVIR0.VDF : 6.40.0.0 11030528 Bytes 18/07/2007 14:27:15
ANTIVIR1.VDF : 7.0.3.2 5447168 Bytes 07/03/2008 19:53:19
ANTIVIR2.VDF : 7.0.3.62 337408 Bytes 21/03/2008 19:53:19
ANTIVIR3.VDF : 7.0.3.73 70656 Bytes 25/03/2008 19:53:19
AVEWIN32.DLL : 7.6.0.75 3334656 Bytes 25/03/2008 19:53:20
AVWINLL.DLL : 1.0.0.7 14376 Bytes 26/02/2007 10:36:26
AVPREF.DLL : 7.0.2.2 25640 Bytes 18/07/2007 07:39:17
AVREP.DLL : 7.0.0.1 155688 Bytes 16/04/2007 13:16:24
AVPACK32.DLL : 7.6.0.3 360488 Bytes 25/03/2008 19:53:20
AVREG.DLL : 7.0.1.6 30760 Bytes 18/07/2007 07:17:06
AVARKT.DLL : 1.0.0.20 278568 Bytes 28/08/2007 12:26:33
AVEVTLOG.DLL : 7.0.0.20 86056 Bytes 18/07/2007 07:10:18
NETNT.DLL : 7.0.0.0 7720 Bytes 08/03/2007 11:09:42
RCIMAGE.DLL : 7.0.1.30 2342952 Bytes 07/08/2007 12:38:13
RCTEXT.DLL : 7.0.62.0 86056 Bytes 21/08/2007 12:50:37
SQLITE3.DLL : 3.3.17.1 339968 Bytes 23/07/2007 09:37:21
Configuration settings for the scan:
Jobname..........................: Complete system scan
Configuration file...............: c:\program files\avira\antivir personaledition classic\sysscan.avp
Logging..........................: low
Primary action...................: interactive
Secondary action.................: ignore
Scan master boot sector..........: off
Scan boot sector.................: on
Boot sectors.....................: C:,
Scan memory......................: on
Process scan.....................: on
Scan registry....................: on
Search for rootkits..............: off
Scan all files...................: Intelligent file selection
Scan archives....................: on
Recursion depth..................: 20
Smart extensions.................: on
Macro heuristic..................: on
File heuristic...................: medium
Start of the scan: mardi 25 mars 2008 20:55
The scan of running processes will be started
Scan process 'avscan.exe' - '1' Module(s) have been scanned
Scan process 'avcenter.exe' - '1' Module(s) have been scanned
Scan process 'sched.exe' - '1' Module(s) have been scanned
Scan process 'avgnt.exe' - '1' Module(s) have been scanned
Scan process 'avguard.exe' - '1' Module(s) have been scanned
Scan process 'IEXPLORE.EXE' - '1' Module(s) have been scanned
Scan process 'notepad.exe' - '1' Module(s) have been scanned
Scan process 'HijackThis.exe' - '1' Module(s) have been scanned
Scan process 'wuauclt.exe' - '1' Module(s) have been scanned
Scan process 'firefox.exe' - '1' Module(s) have been scanned
Scan process 'hpqwmi.exe' - '1' Module(s) have been scanned
Scan process 'Ares.exe' - '1' Module(s) have been scanned
Scan process 'alg.exe' - '1' Module(s) have been scanned
Scan process 'msmsgs.exe' - '1' Module(s) have been scanned
Scan process 'wmiprvse.exe' - '1' Module(s) have been scanned
Scan process 'ApntEx.exe' - '1' Module(s) have been scanned
Scan process '9wifi.exe' - '1' Module(s) have been scanned
Scan process 'HP Wireless Assistant.exe' - '1' Module(s) have been scanned
Scan process 'jusched.exe' - '1' Module(s) have been scanned
Scan process 'eabservr.exe' - '1' Module(s) have been scanned
Scan process 'QTTask.exe' - '1' Module(s) have been scanned
Scan process 'hpwuSchd2.exe' - '1' Module(s) have been scanned
Scan process 'hkcmd.exe' - '1' Module(s) have been scanned
Scan process 'igfxtray.exe' - '1' Module(s) have been scanned
Scan process 'Apoint.exe' - '1' Module(s) have been scanned
Scan process 'AGRSMMSG.exe' - '1' Module(s) have been scanned
Scan process 'SMax4PNP.exe' - '1' Module(s) have been scanned
Scan process 'wdfmgr.exe' - '1' Module(s) have been scanned
Scan process 'SMAgent.exe' - '1' Module(s) have been scanned
Scan process 'spoolsv.exe' - '1' Module(s) have been scanned
Scan process 'explorer.exe' - '1' Module(s) have been scanned
Scan process 'svchost.exe' - '1' Module(s) have been scanned
Scan process 'svchost.exe' - '1' Module(s) have been scanned
Scan process 'svchost.exe' - '1' Module(s) have been scanned
Scan process 'svchost.exe' - '1' Module(s) have been scanned
Scan process 'svchost.exe' - '1' Module(s) have been scanned
Scan process 'lsass.exe' - '1' Module(s) have been scanned
Scan process 'services.exe' - '1' Module(s) have been scanned
Scan process 'winlogon.exe' - '1' Module(s) have been scanned
Scan process 'csrss.exe' - '1' Module(s) have been scanned
Scan process 'smss.exe' - '1' Module(s) have been scanned
41 processes with 41 modules were scanned
Start scanning boot sectors:
Boot sector 'C:\'
[NOTE] No virus was found!
Starting to scan the registry.
The registry was scanned ( '32' files ).
Starting the file scan:
Begin scan in 'C:\'
C:\hiberfil.sys
[WARNING] The file could not be opened!
C:\pagefile.sys
[WARNING] The file could not be opened!
C:\Documents and Settings\julia\Local Settings\Temp\zfe1.exe
[DETECTION] Is the Trojan horse TR/Zlob.IZA
[INFO] The file was deleted!
C:\Documents and Settings\julia\Local Settings\Temp\zfe2.exe
[DETECTION] Is the Trojan horse TR/Dldr.Zlob.kbw
[INFO] The file was deleted!
C:\Documents and Settings\julia\Local Settings\Temp\zfe4.exe
[DETECTION] Contains detection pattern of the dropper DR/Dldr.Zlob.ABMP.3
[INFO] The file was deleted!
C:\Documents and Settings\Julia.JULIA\Bureau\SmitfraudFix.exe
[DETECTION] Contains detection pattern of the dropper DR/Tool.Reboot.F.70
[INFO] The file was moved to '48526901.qua'!
C:\System Volume Information\_restore{9419A740-A8CC-488D-BC7C-D16070BE7920}\RP31\A0001690.dll
[DETECTION] Is the Trojan horse TR/Dldr.Zlob.ABMP.7
[INFO] The file was deleted!
C:\System Volume Information\_restore{9419A740-A8CC-488D-BC7C-D16070BE7920}\RP31\A0001693.exe
[DETECTION] Is the Trojan horse TR/Dldr.Zlob.kbw
[INFO] The file was deleted!
C:\System Volume Information\_restore{9419A740-A8CC-488D-BC7C-D16070BE7920}\RP31\A0001694.exe
[DETECTION] Is the Trojan horse TR/Dldr.Zlob.kbw
[INFO] The file was deleted!
C:\System Volume Information\_restore{9419A740-A8CC-488D-BC7C-D16070BE7920}\RP31\A0001701.exe
[DETECTION] Is the Trojan horse TR/Zlob.10240.B
[INFO] The file was deleted!
C:\System Volume Information\_restore{9419A740-A8CC-488D-BC7C-D16070BE7920}\RP32\A0001727.exe
[DETECTION] Is the Trojan horse TR/Zlob.IZA
[INFO] The file was deleted!
C:\System Volume Information\_restore{9419A740-A8CC-488D-BC7C-D16070BE7920}\RP32\A0001728.exe
[DETECTION] Is the Trojan horse TR/Dldr.Zlob.kbw
[INFO] The file was deleted!
C:\System Volume Information\_restore{9419A740-A8CC-488D-BC7C-D16070BE7920}\RP32\A0001729.exe
[DETECTION] Contains detection pattern of the dropper DR/Dldr.Zlob.ABMP.3
[INFO] The file was deleted!
C:\System Volume Information\_restore{9419A740-A8CC-488D-BC7C-D16070BE7920}\RP32\A0001730.exe
[DETECTION] Contains detection pattern of the dropper DR/Tool.Reboot.F.70
[INFO] The file was deleted!
C:\System Volume Information\_restore{DF5A3BBF-77AF-4BA6-ACBB-73F9611931E8}\RP167\A0051259.exe
[DETECTION] Is the Trojan horse TR/Dldr.Zlob.kbw
[INFO] The file was deleted!
C:\System Volume Information\_restore{DF5A3BBF-77AF-4BA6-ACBB-73F9611931E8}\RP167\A0052259.exe
[DETECTION] Is the Trojan horse TR/Dldr.Zlob.kbw
[INFO] The file was deleted!
C:\System Volume Information\_restore{DF5A3BBF-77AF-4BA6-ACBB-73F9611931E8}\RP167\A0053259.exe
[DETECTION] Is the Trojan horse TR/Dldr.Zlob.kbw
[INFO] The file was deleted!
End of the scan: mardi 25 mars 2008 22:37
Used time: 1:41:33 min
The scan has been done completely.
5190 Scanning directories
194818 Files were scanned
15 viruses and/or unwanted programs were found
0 Files were classified as suspicious:
14 files were deleted
0 files were repaired
1 files were moved to quarantine
0 files were renamed
2 Files cannot be scanned
194803 Files not concerned
1541 Archives were scanned
2 Warnings
0 Notes
AntiVir PersonalEdition Classic
Report file date: mardi 25 mars 2008 20:55
Scanning for 1165923 virus strains and unwanted programs.
Licensed to: Avira AntiVir PersonalEdition Classic
Serial number: 0000149996-ADJIE-0001
Platform: Windows XP
Windows version: (Service Pack 2) [5.1.2600]
Username: SYSTEM
Computer name: JULIA
Version information:
BUILD.DAT : 270 15603 Bytes 19/09/2007 13:32:00
AVSCAN.EXE : 7.0.6.1 290856 Bytes 23/08/2007 13:16:29
AVSCAN.DLL : 7.0.6.0 49192 Bytes 16/08/2007 12:23:51
LUKE.DLL : 7.0.5.3 147496 Bytes 14/08/2007 15:32:47
LUKERES.DLL : 7.0.6.1 10280 Bytes 21/08/2007 12:35:20
ANTIVIR0.VDF : 6.40.0.0 11030528 Bytes 18/07/2007 14:27:15
ANTIVIR1.VDF : 7.0.3.2 5447168 Bytes 07/03/2008 19:53:19
ANTIVIR2.VDF : 7.0.3.62 337408 Bytes 21/03/2008 19:53:19
ANTIVIR3.VDF : 7.0.3.73 70656 Bytes 25/03/2008 19:53:19
AVEWIN32.DLL : 7.6.0.75 3334656 Bytes 25/03/2008 19:53:20
AVWINLL.DLL : 1.0.0.7 14376 Bytes 26/02/2007 10:36:26
AVPREF.DLL : 7.0.2.2 25640 Bytes 18/07/2007 07:39:17
AVREP.DLL : 7.0.0.1 155688 Bytes 16/04/2007 13:16:24
AVPACK32.DLL : 7.6.0.3 360488 Bytes 25/03/2008 19:53:20
AVREG.DLL : 7.0.1.6 30760 Bytes 18/07/2007 07:17:06
AVARKT.DLL : 1.0.0.20 278568 Bytes 28/08/2007 12:26:33
AVEVTLOG.DLL : 7.0.0.20 86056 Bytes 18/07/2007 07:10:18
NETNT.DLL : 7.0.0.0 7720 Bytes 08/03/2007 11:09:42
RCIMAGE.DLL : 7.0.1.30 2342952 Bytes 07/08/2007 12:38:13
RCTEXT.DLL : 7.0.62.0 86056 Bytes 21/08/2007 12:50:37
SQLITE3.DLL : 3.3.17.1 339968 Bytes 23/07/2007 09:37:21
Configuration settings for the scan:
Jobname..........................: Complete system scan
Configuration file...............: c:\program files\avira\antivir personaledition classic\sysscan.avp
Logging..........................: low
Primary action...................: interactive
Secondary action.................: ignore
Scan master boot sector..........: off
Scan boot sector.................: on
Boot sectors.....................: C:,
Scan memory......................: on
Process scan.....................: on
Scan registry....................: on
Search for rootkits..............: off
Scan all files...................: Intelligent file selection
Scan archives....................: on
Recursion depth..................: 20
Smart extensions.................: on
Macro heuristic..................: on
File heuristic...................: medium
Start of the scan: mardi 25 mars 2008 20:55
The scan of running processes will be started
Scan process 'avscan.exe' - '1' Module(s) have been scanned
Scan process 'avcenter.exe' - '1' Module(s) have been scanned
Scan process 'sched.exe' - '1' Module(s) have been scanned
Scan process 'avgnt.exe' - '1' Module(s) have been scanned
Scan process 'avguard.exe' - '1' Module(s) have been scanned
Scan process 'IEXPLORE.EXE' - '1' Module(s) have been scanned
Scan process 'notepad.exe' - '1' Module(s) have been scanned
Scan process 'HijackThis.exe' - '1' Module(s) have been scanned
Scan process 'wuauclt.exe' - '1' Module(s) have been scanned
Scan process 'firefox.exe' - '1' Module(s) have been scanned
Scan process 'hpqwmi.exe' - '1' Module(s) have been scanned
Scan process 'Ares.exe' - '1' Module(s) have been scanned
Scan process 'alg.exe' - '1' Module(s) have been scanned
Scan process 'msmsgs.exe' - '1' Module(s) have been scanned
Scan process 'wmiprvse.exe' - '1' Module(s) have been scanned
Scan process 'ApntEx.exe' - '1' Module(s) have been scanned
Scan process '9wifi.exe' - '1' Module(s) have been scanned
Scan process 'HP Wireless Assistant.exe' - '1' Module(s) have been scanned
Scan process 'jusched.exe' - '1' Module(s) have been scanned
Scan process 'eabservr.exe' - '1' Module(s) have been scanned
Scan process 'QTTask.exe' - '1' Module(s) have been scanned
Scan process 'hpwuSchd2.exe' - '1' Module(s) have been scanned
Scan process 'hkcmd.exe' - '1' Module(s) have been scanned
Scan process 'igfxtray.exe' - '1' Module(s) have been scanned
Scan process 'Apoint.exe' - '1' Module(s) have been scanned
Scan process 'AGRSMMSG.exe' - '1' Module(s) have been scanned
Scan process 'SMax4PNP.exe' - '1' Module(s) have been scanned
Scan process 'wdfmgr.exe' - '1' Module(s) have been scanned
Scan process 'SMAgent.exe' - '1' Module(s) have been scanned
Scan process 'spoolsv.exe' - '1' Module(s) have been scanned
Scan process 'explorer.exe' - '1' Module(s) have been scanned
Scan process 'svchost.exe' - '1' Module(s) have been scanned
Scan process 'svchost.exe' - '1' Module(s) have been scanned
Scan process 'svchost.exe' - '1' Module(s) have been scanned
Scan process 'svchost.exe' - '1' Module(s) have been scanned
Scan process 'svchost.exe' - '1' Module(s) have been scanned
Scan process 'lsass.exe' - '1' Module(s) have been scanned
Scan process 'services.exe' - '1' Module(s) have been scanned
Scan process 'winlogon.exe' - '1' Module(s) have been scanned
Scan process 'csrss.exe' - '1' Module(s) have been scanned
Scan process 'smss.exe' - '1' Module(s) have been scanned
41 processes with 41 modules were scanned
Start scanning boot sectors:
Boot sector 'C:\'
[NOTE] No virus was found!
Starting to scan the registry.
The registry was scanned ( '32' files ).
Starting the file scan:
Begin scan in 'C:\'
C:\hiberfil.sys
[WARNING] The file could not be opened!
C:\pagefile.sys
[WARNING] The file could not be opened!
C:\Documents and Settings\julia\Local Settings\Temp\zfe1.exe
[DETECTION] Is the Trojan horse TR/Zlob.IZA
[INFO] The file was deleted!
C:\Documents and Settings\julia\Local Settings\Temp\zfe2.exe
[DETECTION] Is the Trojan horse TR/Dldr.Zlob.kbw
[INFO] The file was deleted!
C:\Documents and Settings\julia\Local Settings\Temp\zfe4.exe
[DETECTION] Contains detection pattern of the dropper DR/Dldr.Zlob.ABMP.3
[INFO] The file was deleted!
C:\Documents and Settings\Julia.JULIA\Bureau\SmitfraudFix.exe
[DETECTION] Contains detection pattern of the dropper DR/Tool.Reboot.F.70
[INFO] The file was moved to '48526901.qua'!
C:\System Volume Information\_restore{9419A740-A8CC-488D-BC7C-D16070BE7920}\RP31\A0001690.dll
[DETECTION] Is the Trojan horse TR/Dldr.Zlob.ABMP.7
[INFO] The file was deleted!
C:\System Volume Information\_restore{9419A740-A8CC-488D-BC7C-D16070BE7920}\RP31\A0001693.exe
[DETECTION] Is the Trojan horse TR/Dldr.Zlob.kbw
[INFO] The file was deleted!
C:\System Volume Information\_restore{9419A740-A8CC-488D-BC7C-D16070BE7920}\RP31\A0001694.exe
[DETECTION] Is the Trojan horse TR/Dldr.Zlob.kbw
[INFO] The file was deleted!
C:\System Volume Information\_restore{9419A740-A8CC-488D-BC7C-D16070BE7920}\RP31\A0001701.exe
[DETECTION] Is the Trojan horse TR/Zlob.10240.B
[INFO] The file was deleted!
C:\System Volume Information\_restore{9419A740-A8CC-488D-BC7C-D16070BE7920}\RP32\A0001727.exe
[DETECTION] Is the Trojan horse TR/Zlob.IZA
[INFO] The file was deleted!
C:\System Volume Information\_restore{9419A740-A8CC-488D-BC7C-D16070BE7920}\RP32\A0001728.exe
[DETECTION] Is the Trojan horse TR/Dldr.Zlob.kbw
[INFO] The file was deleted!
C:\System Volume Information\_restore{9419A740-A8CC-488D-BC7C-D16070BE7920}\RP32\A0001729.exe
[DETECTION] Contains detection pattern of the dropper DR/Dldr.Zlob.ABMP.3
[INFO] The file was deleted!
C:\System Volume Information\_restore{9419A740-A8CC-488D-BC7C-D16070BE7920}\RP32\A0001730.exe
[DETECTION] Contains detection pattern of the dropper DR/Tool.Reboot.F.70
[INFO] The file was deleted!
C:\System Volume Information\_restore{DF5A3BBF-77AF-4BA6-ACBB-73F9611931E8}\RP167\A0051259.exe
[DETECTION] Is the Trojan horse TR/Dldr.Zlob.kbw
[INFO] The file was deleted!
C:\System Volume Information\_restore{DF5A3BBF-77AF-4BA6-ACBB-73F9611931E8}\RP167\A0052259.exe
[DETECTION] Is the Trojan horse TR/Dldr.Zlob.kbw
[INFO] The file was deleted!
C:\System Volume Information\_restore{DF5A3BBF-77AF-4BA6-ACBB-73F9611931E8}\RP167\A0053259.exe
[DETECTION] Is the Trojan horse TR/Dldr.Zlob.kbw
[INFO] The file was deleted!
End of the scan: mardi 25 mars 2008 22:37
Used time: 1:41:33 min
The scan has been done completely.
5190 Scanning directories
194818 Files were scanned
15 viruses and/or unwanted programs were found
0 Files were classified as suspicious:
14 files were deleted
0 files were repaired
1 files were moved to quarantine
0 files were renamed
2 Files cannot be scanned
194803 Files not concerned
1541 Archives were scanned
2 Warnings
0 Notes
re,
c´est embetant pour ces tojants zlob, pour smitfraudfix beaucoup moins, la restauration system est egalement touché; on la réparera a la fin...
maintenant, il va faloir executer un autre scan :
Telecharge malwarebytes
-> http://forum.telecharger.01net.com/forum/high-tech/PRODUITS/Questions-techniques/anti-malware-sujet_197382_1.htm
Tu l´instale; le programme va se mettre automatiquement a jour.
Une fois a jour, le programme va se lancer; click sur l´onglet parametre, et coche la case : "Arreter internet explorer pendant la suppression".
Click maintenant sur l´onglet recherche et coche la case : "executer un examun complet".
Puis click sur "rechercher".
Laisse le scanner le pc...
Si des elements on ete trouvés > click sur supprimer la selection.
si il t´es demandé de redemarrer > click sur "yes".
A la fin un rapport va s´ouvrir; sauvegarde le de maniere a le retrouver en vu de le poster sur le forum.
Copie et colle le rapport stp.
@+
c´est embetant pour ces tojants zlob, pour smitfraudfix beaucoup moins, la restauration system est egalement touché; on la réparera a la fin...
maintenant, il va faloir executer un autre scan :
Telecharge malwarebytes
-> http://forum.telecharger.01net.com/forum/high-tech/PRODUITS/Questions-techniques/anti-malware-sujet_197382_1.htm
Tu l´instale; le programme va se mettre automatiquement a jour.
Une fois a jour, le programme va se lancer; click sur l´onglet parametre, et coche la case : "Arreter internet explorer pendant la suppression".
Click maintenant sur l´onglet recherche et coche la case : "executer un examun complet".
Puis click sur "rechercher".
Laisse le scanner le pc...
Si des elements on ete trouvés > click sur supprimer la selection.
si il t´es demandé de redemarrer > click sur "yes".
A la fin un rapport va s´ouvrir; sauvegarde le de maniere a le retrouver en vu de le poster sur le forum.
Copie et colle le rapport stp.
@+
J'ai Malwarebyte qui tourne là, je sais pas combien de temps il va encore mettre mais il ma déjà trouvé 15 élements infectés :s
J'éspère que tout va s'arranger..., j'attend que tout fini de charger et je te posterais le rapport...
Mais après je vais devoir aller me coucher car j'ai cours demain, et je continuerais les manipulations demain...
En tout cas c'est gentil de m'aider, c'est bien qui à des personnes qui peuvent nous aider dans ces puta*n de virus...merci encore...;)
bon j'attend que ça fini de charger...
J'éspère que tout va s'arranger..., j'attend que tout fini de charger et je te posterais le rapport...
Mais après je vais devoir aller me coucher car j'ai cours demain, et je continuerais les manipulations demain...
En tout cas c'est gentil de m'aider, c'est bien qui à des personnes qui peuvent nous aider dans ces puta*n de virus...merci encore...;)
bon j'attend que ça fini de charger...
Voilà, ça fait 110 élements infécté :s c'est beaucoup...:(
Malwarebytes' Anti-Malware 1.09
Version de la base de données: 542
Type de recherche: Examen complet (C:\|)
Eléments examinés: 72093
Temps écoulé: 33 minute(s), 32 second(s)
Processus mémoire infecté(s): 0
Module(s) mémoire infecté(s): 0
Clé(s) du Registre infectée(s): 0
Valeur(s) du Registre infectée(s): 0
Elément(s) de données du Registre infecté(s): 0
Dossier(s) infecté(s): 26
Fichier(s) infecté(s): 84
Processus mémoire infecté(s):
(Aucun élément nuisible détecté)
Module(s) mémoire infecté(s):
(Aucun élément nuisible détecté)
Clé(s) du Registre infectée(s):
(Aucun élément nuisible détecté)
Valeur(s) du Registre infectée(s):
(Aucun élément nuisible détecté)
Elément(s) de données du Registre infecté(s):
(Aucun élément nuisible détecté)
Dossier(s) infecté(s):
C:\Program Files\Starware370 (Adware.Starware) -> No action taken.
C:\Program Files\Starware370\bin (Adware.Starware) -> No action taken.
C:\Program Files\Starware370\icons (Adware.Starware) -> No action taken.
C:\Documents and Settings\All Users\Application Data\Starware370 (Adware.Starware) -> No action taken.
C:\Documents and Settings\All Users\Application Data\Starware370\buttons (Adware.Starware) -> No action taken.
C:\Documents and Settings\All Users\Application Data\Starware370\contexts (Adware.Starware) -> No action taken.
C:\Documents and Settings\All Users\Application Data\Starware370\SimpleUpdate (Adware.Starware) -> No action taken.
C:\Program Files\Save (Adware.WhenUSave) -> No action taken.
C:\Documents and Settings\julia\Application Data\Starware370 (Adware.Starware) -> No action taken.
C:\Documents and Settings\julia\Application Data\Starware370\BrowserSearch (Adware.Starware) -> No action taken.
C:\Documents and Settings\julia\Application Data\Starware370\Button_6 (Adware.Starware) -> No action taken.
C:\Documents and Settings\julia\Application Data\Starware370\Button_7 (Adware.Starware) -> No action taken.
C:\Documents and Settings\julia\Application Data\Starware370\Button_8 (Adware.Starware) -> No action taken.
C:\Documents and Settings\julia\Application Data\Starware370\Configurator (Adware.Starware) -> No action taken.
C:\Documents and Settings\julia\Application Data\Starware370\ErrorSearch (Adware.Starware) -> No action taken.
C:\Documents and Settings\julia\Application Data\Starware370\Layouts (Adware.Starware) -> No action taken.
C:\Documents and Settings\julia\Application Data\Starware370\Manager (Adware.Starware) -> No action taken.
C:\Documents and Settings\julia\Application Data\Starware370\Paroles (Adware.Starware) -> No action taken.
C:\Documents and Settings\julia\Application Data\Starware370\Radio_FR (Adware.Starware) -> No action taken.
C:\Documents and Settings\julia\Application Data\Starware370\Recherche_de_musique (Adware.Starware) -> No action taken.
C:\Documents and Settings\julia\Application Data\Starware370\RelatedSearch (Adware.Starware) -> No action taken.
C:\Documents and Settings\julia\Application Data\Starware370\Telechargement (Adware.Starware) -> No action taken.
C:\Documents and Settings\julia\Application Data\Starware370\Toolbar (Adware.Starware) -> No action taken.
C:\Documents and Settings\julia\Application Data\Starware370\ToolbarLogo (Adware.Starware) -> No action taken.
C:\Documents and Settings\julia\Application Data\Starware370\ToolbarSearch (Adware.Starware) -> No action taken.
C:\Documents and Settings\julia\Application Data\Starware370\TravelSearch (Adware.Starware) -> No action taken.
Fichier(s) infecté(s):
C:\Program Files\Starware370\bin\Starware370.dll (Adware.Starware) -> No action taken.
C:\System Volume Information\_restore{9419A740-A8CC-488D-BC7C-D16070BE7920}\RP31\A0001692.dll (Trojan.Zlob) -> No action taken.
C:\System Volume Information\_restore{9419A740-A8CC-488D-BC7C-D16070BE7920}\RP31\A0001695.exe (Trojan.Zlob) -> No action taken.
C:\System Volume Information\_restore{9419A740-A8CC-488D-BC7C-D16070BE7920}\RP31\A0001696.exe (Trojan.Zlob) -> No action taken.
C:\System Volume Information\_restore{9419A740-A8CC-488D-BC7C-D16070BE7920}\RP31\A0001697.exe (Trojan.Zlob) -> No action taken.
C:\System Volume Information\_restore{9419A740-A8CC-488D-BC7C-D16070BE7920}\RP31\A0001698.exe (Trojan.Zlob) -> No action taken.
C:\System Volume Information\_restore{9419A740-A8CC-488D-BC7C-D16070BE7920}\RP31\A0001700.dll (Trojan.Zlob) -> No action taken.
C:\System Volume Information\_restore{DF5A3BBF-77AF-4BA6-ACBB-73F9611931E8}\RP150\A0041735.dll (Adware.WhenUSave) -> No action taken.
C:\System Volume Information\_restore{DF5A3BBF-77AF-4BA6-ACBB-73F9611931E8}\RP150\A0041736.exe (Adware.WhenUSave) -> No action taken.
C:\System Volume Information\_restore{DF5A3BBF-77AF-4BA6-ACBB-73F9611931E8}\RP167\A0051257.exe (Trojan.Zlob) -> No action taken.
C:\System Volume Information\_restore{DF5A3BBF-77AF-4BA6-ACBB-73F9611931E8}\RP167\A0051258.dll (Trojan.Zlob) -> No action taken.
C:\System Volume Information\_restore{DF5A3BBF-77AF-4BA6-ACBB-73F9611931E8}\RP167\A0052257.dll (Trojan.Zlob) -> No action taken.
C:\System Volume Information\_restore{DF5A3BBF-77AF-4BA6-ACBB-73F9611931E8}\RP167\A0052258.exe (Trojan.Zlob) -> No action taken.
C:\System Volume Information\_restore{DF5A3BBF-77AF-4BA6-ACBB-73F9611931E8}\RP167\A0053257.exe (Trojan.Zlob) -> No action taken.
C:\System Volume Information\_restore{DF5A3BBF-77AF-4BA6-ACBB-73F9611931E8}\RP167\A0053258.dll (Trojan.Zlob) -> No action taken.
C:\Program Files\Starware370\brand.bmp (Adware.Starware) -> No action taken.
C:\Program Files\Starware370\Starware370Config.xml (Adware.Starware) -> No action taken.
C:\Program Files\Starware370\Starware370Uninstall.exe (Adware.Starware) -> No action taken.
C:\Program Files\Starware370\Thumbs.db (Adware.Starware) -> No action taken.
C:\Program Files\Starware370\icons\star_16.ico (Adware.Starware) -> No action taken.
C:\Documents and Settings\All Users\Application Data\Starware370\buttons\563_button_1b_def.bmp (Adware.Starware) -> No action taken.
C:\Documents and Settings\All Users\Application Data\Starware370\buttons\563_button_1b_over.bmp (Adware.Starware) -> No action taken.
C:\Documents and Settings\All Users\Application Data\Starware370\buttons\572_button_1b_def.bmp (Adware.Starware) -> No action taken.
C:\Documents and Settings\All Users\Application Data\Starware370\buttons\572_button_1b_over.bmp (Adware.Starware) -> No action taken.
C:\Documents and Settings\All Users\Application Data\Starware370\buttons\573_button_1b_def.bmp (Adware.Starware) -> No action taken.
C:\Documents and Settings\All Users\Application Data\Starware370\buttons\573_button_1b_over.bmp (Adware.Starware) -> No action taken.
C:\Documents and Settings\All Users\Application Data\Starware370\buttons\Button_60.bmp (Adware.Starware) -> No action taken.
C:\Documents and Settings\All Users\Application Data\Starware370\buttons\Button_70.bmp (Adware.Starware) -> No action taken.
C:\Documents and Settings\All Users\Application Data\Starware370\buttons\Button_80.bmp (Adware.Starware) -> No action taken.
C:\Documents and Settings\All Users\Application Data\Starware370\buttons\FindIt.bmp (Adware.Starware) -> No action taken.
C:\Documents and Settings\All Users\Application Data\Starware370\buttons\FindItHot.bmp (Adware.Starware) -> No action taken.
C:\Documents and Settings\All Users\Application Data\Starware370\buttons\findithotxp.png (Adware.Starware) -> No action taken.
C:\Documents and Settings\All Users\Application Data\Starware370\buttons\finditxp.png (Adware.Starware) -> No action taken.
C:\Documents and Settings\All Users\Application Data\Starware370\buttons\logo.bmp (Adware.Starware) -> No action taken.
C:\Documents and Settings\All Users\Application Data\Starware370\buttons\logoxp.bmp (Adware.Starware) -> No action taken.
C:\Documents and Settings\All Users\Application Data\Starware370\contexts\error.xml (Adware.Starware) -> No action taken.
C:\Documents and Settings\All Users\Application Data\Starware370\contexts\Related.xml (Adware.Starware) -> No action taken.
C:\Documents and Settings\All Users\Application Data\Starware370\contexts\Travel.xml (Adware.Starware) -> No action taken.
C:\Documents and Settings\All Users\Application Data\Starware370\SimpleUpdate\ProductMessagingConfig.xml (Adware.Starware) -> No action taken.
C:\Documents and Settings\All Users\Application Data\Starware370\SimpleUpdate\ProductMessagingConfig.xml.backup (Adware.Starware) -> No action taken.
C:\Documents and Settings\All Users\Application Data\Starware370\SimpleUpdate\SimpleUpdateConfig.xml (Adware.Starware) -> No action taken.
C:\Documents and Settings\All Users\Application Data\Starware370\SimpleUpdate\SimpleUpdateConfig.xml.backup (Adware.Starware) -> No action taken.
C:\Documents and Settings\All Users\Application Data\Starware370\SimpleUpdate\TimerManagerConfig.xml (Adware.Starware) -> No action taken.
C:\Documents and Settings\All Users\Application Data\Starware370\SimpleUpdate\TimerManagerConfig.xml.backup (Adware.Starware) -> No action taken.
C:\Program Files\Save\SaveNowupdate.exe (Adware.WhenUSave) -> No action taken.
C:\Documents and Settings\julia\Application Data\Starware370\Tem138.tmp (Adware.Starware) -> No action taken.
C:\Documents and Settings\julia\Application Data\Starware370\Tem14C.tmp (Adware.Starware) -> No action taken.
C:\Documents and Settings\julia\Application Data\Starware370\BrowserSearch\BrowserSearch.xml (Adware.Starware) -> No action taken.
C:\Documents and Settings\julia\Application Data\Starware370\BrowserSearch\BrowserSearch.xml.backup (Adware.Starware) -> No action taken.
C:\Documents and Settings\julia\Application Data\Starware370\Button_6\Button_6Options.xml (Adware.Starware) -> No action taken.
C:\Documents and Settings\julia\Application Data\Starware370\Button_6\Button_6Options.xml.backup (Adware.Starware) -> No action taken.
C:\Documents and Settings\julia\Application Data\Starware370\Button_7\Button_7Options.xml (Adware.Starware) -> No action taken.
C:\Documents and Settings\julia\Application Data\Starware370\Button_7\Button_7Options.xml.backup (Adware.Starware) -> No action taken.
C:\Documents and Settings\julia\Application Data\Starware370\Button_8\Button_8Options.xml (Adware.Starware) -> No action taken.
C:\Documents and Settings\julia\Application Data\Starware370\Button_8\Button_8Options.xml.backup (Adware.Starware) -> No action taken.
C:\Documents and Settings\julia\Application Data\Starware370\Configurator\Configurator.xml (Adware.Starware) -> No action taken.
C:\Documents and Settings\julia\Application Data\Starware370\Configurator\Configurator.xml.backup (Adware.Starware) -> No action taken.
C:\Documents and Settings\julia\Application Data\Starware370\ErrorSearch\ErrorSearchOptions.xml (Adware.Starware) -> No action taken.
C:\Documents and Settings\julia\Application Data\Starware370\ErrorSearch\ErrorSearchOptions.xml.backup (Adware.Starware) -> No action taken.
C:\Documents and Settings\julia\Application Data\Starware370\Layouts\ToolbarLayout.xml (Adware.Starware) -> No action taken.
C:\Documents and Settings\julia\Application Data\Starware370\Layouts\ToolbarLayout.xml.backup (Adware.Starware) -> No action taken.
C:\Documents and Settings\julia\Application Data\Starware370\Manager\ManagerOptions.xml (Adware.Starware) -> No action taken.
C:\Documents and Settings\julia\Application Data\Starware370\Manager\ManagerOptions.xml.backup (Adware.Starware) -> No action taken.
C:\Documents and Settings\julia\Application Data\Starware370\Paroles\ParolesOptions.xml (Adware.Starware) -> No action taken.
C:\Documents and Settings\julia\Application Data\Starware370\Paroles\ParolesOptions.xml.backup (Adware.Starware) -> No action taken.
C:\Documents and Settings\julia\Application Data\Starware370\Radio_FR\Radio_FROptions.xml (Adware.Starware) -> No action taken.
C:\Documents and Settings\julia\Application Data\Starware370\Radio_FR\Radio_FROptions.xml.backup (Adware.Starware) -> No action taken.
C:\Documents and Settings\julia\Application Data\Starware370\Recherche_de_musique\Recherche_de_musiqueOptions.xml (Adware.Starware) -> No action taken.
C:\Documents and Settings\julia\Application Data\Starware370\Recherche_de_musique\Recherche_de_musiqueOptions.xml.backup (Adware.Starware) -> No action taken.
C:\Documents and Settings\julia\Application Data\Starware370\RelatedSearch\RelatedSearchOptions.xml (Adware.Starware) -> No action taken.
C:\Documents and Settings\julia\Application Data\Starware370\RelatedSearch\RelatedSearchOptions.xml.backup (Adware.Starware) -> No action taken.
C:\Documents and Settings\julia\Application Data\Starware370\Telechargement\TelechargementOptions.xml (Adware.Starware) -> No action taken.
C:\Documents and Settings\julia\Application Data\Starware370\Telechargement\TelechargementOptions.xml.backup (Adware.Starware) -> No action taken.
C:\Documents and Settings\julia\Application Data\Starware370\Toolbar\TBProductsOptions.xml (Adware.Starware) -> No action taken.
C:\Documents and Settings\julia\Application Data\Starware370\Toolbar\TBProductsOptions.xml.backup (Adware.Starware) -> No action taken.
C:\Documents and Settings\julia\Application Data\Starware370\ToolbarLogo\ToolbarLogoOptions.xml (Adware.Starware) -> No action taken.
C:\Documents and Settings\julia\Application Data\Starware370\ToolbarLogo\ToolbarLogoOptions.xml.backup (Adware.Starware) -> No action taken.
C:\Documents and Settings\julia\Application Data\Starware370\ToolbarSearch\ToolbarSearchOptions.xml (Adware.Starware) -> No action taken.
C:\Documents and Settings\julia\Application Data\Starware370\ToolbarSearch\ToolbarSearchOptions.xml.backup (Adware.Starware) -> No action taken.
C:\Documents and Settings\julia\Application Data\Starware370\TravelSearch\TravelSearchOptions.xml (Adware.Starware) -> No action taken.
C:\Documents and Settings\julia\Application Data\Starware370\TravelSearch\TravelSearchOptions.xml.backup (Adware.Starware) -> No action taken.
C:\Documents and Settings\All Users\Menu Démarrer\Online Security Guide.url (Rogue.Link) -> No action taken.
C:\Documents and Settings\All Users\Menu Démarrer\Security Troubleshooting.url (Rogue.Link) -> No action taken.
C:\Documents and Settings\julia\Favoris\Online Security Test.url (Rogue.Link) -> No action taken.
Malwarebytes' Anti-Malware 1.09
Version de la base de données: 542
Type de recherche: Examen complet (C:\|)
Eléments examinés: 72093
Temps écoulé: 33 minute(s), 32 second(s)
Processus mémoire infecté(s): 0
Module(s) mémoire infecté(s): 0
Clé(s) du Registre infectée(s): 0
Valeur(s) du Registre infectée(s): 0
Elément(s) de données du Registre infecté(s): 0
Dossier(s) infecté(s): 26
Fichier(s) infecté(s): 84
Processus mémoire infecté(s):
(Aucun élément nuisible détecté)
Module(s) mémoire infecté(s):
(Aucun élément nuisible détecté)
Clé(s) du Registre infectée(s):
(Aucun élément nuisible détecté)
Valeur(s) du Registre infectée(s):
(Aucun élément nuisible détecté)
Elément(s) de données du Registre infecté(s):
(Aucun élément nuisible détecté)
Dossier(s) infecté(s):
C:\Program Files\Starware370 (Adware.Starware) -> No action taken.
C:\Program Files\Starware370\bin (Adware.Starware) -> No action taken.
C:\Program Files\Starware370\icons (Adware.Starware) -> No action taken.
C:\Documents and Settings\All Users\Application Data\Starware370 (Adware.Starware) -> No action taken.
C:\Documents and Settings\All Users\Application Data\Starware370\buttons (Adware.Starware) -> No action taken.
C:\Documents and Settings\All Users\Application Data\Starware370\contexts (Adware.Starware) -> No action taken.
C:\Documents and Settings\All Users\Application Data\Starware370\SimpleUpdate (Adware.Starware) -> No action taken.
C:\Program Files\Save (Adware.WhenUSave) -> No action taken.
C:\Documents and Settings\julia\Application Data\Starware370 (Adware.Starware) -> No action taken.
C:\Documents and Settings\julia\Application Data\Starware370\BrowserSearch (Adware.Starware) -> No action taken.
C:\Documents and Settings\julia\Application Data\Starware370\Button_6 (Adware.Starware) -> No action taken.
C:\Documents and Settings\julia\Application Data\Starware370\Button_7 (Adware.Starware) -> No action taken.
C:\Documents and Settings\julia\Application Data\Starware370\Button_8 (Adware.Starware) -> No action taken.
C:\Documents and Settings\julia\Application Data\Starware370\Configurator (Adware.Starware) -> No action taken.
C:\Documents and Settings\julia\Application Data\Starware370\ErrorSearch (Adware.Starware) -> No action taken.
C:\Documents and Settings\julia\Application Data\Starware370\Layouts (Adware.Starware) -> No action taken.
C:\Documents and Settings\julia\Application Data\Starware370\Manager (Adware.Starware) -> No action taken.
C:\Documents and Settings\julia\Application Data\Starware370\Paroles (Adware.Starware) -> No action taken.
C:\Documents and Settings\julia\Application Data\Starware370\Radio_FR (Adware.Starware) -> No action taken.
C:\Documents and Settings\julia\Application Data\Starware370\Recherche_de_musique (Adware.Starware) -> No action taken.
C:\Documents and Settings\julia\Application Data\Starware370\RelatedSearch (Adware.Starware) -> No action taken.
C:\Documents and Settings\julia\Application Data\Starware370\Telechargement (Adware.Starware) -> No action taken.
C:\Documents and Settings\julia\Application Data\Starware370\Toolbar (Adware.Starware) -> No action taken.
C:\Documents and Settings\julia\Application Data\Starware370\ToolbarLogo (Adware.Starware) -> No action taken.
C:\Documents and Settings\julia\Application Data\Starware370\ToolbarSearch (Adware.Starware) -> No action taken.
C:\Documents and Settings\julia\Application Data\Starware370\TravelSearch (Adware.Starware) -> No action taken.
Fichier(s) infecté(s):
C:\Program Files\Starware370\bin\Starware370.dll (Adware.Starware) -> No action taken.
C:\System Volume Information\_restore{9419A740-A8CC-488D-BC7C-D16070BE7920}\RP31\A0001692.dll (Trojan.Zlob) -> No action taken.
C:\System Volume Information\_restore{9419A740-A8CC-488D-BC7C-D16070BE7920}\RP31\A0001695.exe (Trojan.Zlob) -> No action taken.
C:\System Volume Information\_restore{9419A740-A8CC-488D-BC7C-D16070BE7920}\RP31\A0001696.exe (Trojan.Zlob) -> No action taken.
C:\System Volume Information\_restore{9419A740-A8CC-488D-BC7C-D16070BE7920}\RP31\A0001697.exe (Trojan.Zlob) -> No action taken.
C:\System Volume Information\_restore{9419A740-A8CC-488D-BC7C-D16070BE7920}\RP31\A0001698.exe (Trojan.Zlob) -> No action taken.
C:\System Volume Information\_restore{9419A740-A8CC-488D-BC7C-D16070BE7920}\RP31\A0001700.dll (Trojan.Zlob) -> No action taken.
C:\System Volume Information\_restore{DF5A3BBF-77AF-4BA6-ACBB-73F9611931E8}\RP150\A0041735.dll (Adware.WhenUSave) -> No action taken.
C:\System Volume Information\_restore{DF5A3BBF-77AF-4BA6-ACBB-73F9611931E8}\RP150\A0041736.exe (Adware.WhenUSave) -> No action taken.
C:\System Volume Information\_restore{DF5A3BBF-77AF-4BA6-ACBB-73F9611931E8}\RP167\A0051257.exe (Trojan.Zlob) -> No action taken.
C:\System Volume Information\_restore{DF5A3BBF-77AF-4BA6-ACBB-73F9611931E8}\RP167\A0051258.dll (Trojan.Zlob) -> No action taken.
C:\System Volume Information\_restore{DF5A3BBF-77AF-4BA6-ACBB-73F9611931E8}\RP167\A0052257.dll (Trojan.Zlob) -> No action taken.
C:\System Volume Information\_restore{DF5A3BBF-77AF-4BA6-ACBB-73F9611931E8}\RP167\A0052258.exe (Trojan.Zlob) -> No action taken.
C:\System Volume Information\_restore{DF5A3BBF-77AF-4BA6-ACBB-73F9611931E8}\RP167\A0053257.exe (Trojan.Zlob) -> No action taken.
C:\System Volume Information\_restore{DF5A3BBF-77AF-4BA6-ACBB-73F9611931E8}\RP167\A0053258.dll (Trojan.Zlob) -> No action taken.
C:\Program Files\Starware370\brand.bmp (Adware.Starware) -> No action taken.
C:\Program Files\Starware370\Starware370Config.xml (Adware.Starware) -> No action taken.
C:\Program Files\Starware370\Starware370Uninstall.exe (Adware.Starware) -> No action taken.
C:\Program Files\Starware370\Thumbs.db (Adware.Starware) -> No action taken.
C:\Program Files\Starware370\icons\star_16.ico (Adware.Starware) -> No action taken.
C:\Documents and Settings\All Users\Application Data\Starware370\buttons\563_button_1b_def.bmp (Adware.Starware) -> No action taken.
C:\Documents and Settings\All Users\Application Data\Starware370\buttons\563_button_1b_over.bmp (Adware.Starware) -> No action taken.
C:\Documents and Settings\All Users\Application Data\Starware370\buttons\572_button_1b_def.bmp (Adware.Starware) -> No action taken.
C:\Documents and Settings\All Users\Application Data\Starware370\buttons\572_button_1b_over.bmp (Adware.Starware) -> No action taken.
C:\Documents and Settings\All Users\Application Data\Starware370\buttons\573_button_1b_def.bmp (Adware.Starware) -> No action taken.
C:\Documents and Settings\All Users\Application Data\Starware370\buttons\573_button_1b_over.bmp (Adware.Starware) -> No action taken.
C:\Documents and Settings\All Users\Application Data\Starware370\buttons\Button_60.bmp (Adware.Starware) -> No action taken.
C:\Documents and Settings\All Users\Application Data\Starware370\buttons\Button_70.bmp (Adware.Starware) -> No action taken.
C:\Documents and Settings\All Users\Application Data\Starware370\buttons\Button_80.bmp (Adware.Starware) -> No action taken.
C:\Documents and Settings\All Users\Application Data\Starware370\buttons\FindIt.bmp (Adware.Starware) -> No action taken.
C:\Documents and Settings\All Users\Application Data\Starware370\buttons\FindItHot.bmp (Adware.Starware) -> No action taken.
C:\Documents and Settings\All Users\Application Data\Starware370\buttons\findithotxp.png (Adware.Starware) -> No action taken.
C:\Documents and Settings\All Users\Application Data\Starware370\buttons\finditxp.png (Adware.Starware) -> No action taken.
C:\Documents and Settings\All Users\Application Data\Starware370\buttons\logo.bmp (Adware.Starware) -> No action taken.
C:\Documents and Settings\All Users\Application Data\Starware370\buttons\logoxp.bmp (Adware.Starware) -> No action taken.
C:\Documents and Settings\All Users\Application Data\Starware370\contexts\error.xml (Adware.Starware) -> No action taken.
C:\Documents and Settings\All Users\Application Data\Starware370\contexts\Related.xml (Adware.Starware) -> No action taken.
C:\Documents and Settings\All Users\Application Data\Starware370\contexts\Travel.xml (Adware.Starware) -> No action taken.
C:\Documents and Settings\All Users\Application Data\Starware370\SimpleUpdate\ProductMessagingConfig.xml (Adware.Starware) -> No action taken.
C:\Documents and Settings\All Users\Application Data\Starware370\SimpleUpdate\ProductMessagingConfig.xml.backup (Adware.Starware) -> No action taken.
C:\Documents and Settings\All Users\Application Data\Starware370\SimpleUpdate\SimpleUpdateConfig.xml (Adware.Starware) -> No action taken.
C:\Documents and Settings\All Users\Application Data\Starware370\SimpleUpdate\SimpleUpdateConfig.xml.backup (Adware.Starware) -> No action taken.
C:\Documents and Settings\All Users\Application Data\Starware370\SimpleUpdate\TimerManagerConfig.xml (Adware.Starware) -> No action taken.
C:\Documents and Settings\All Users\Application Data\Starware370\SimpleUpdate\TimerManagerConfig.xml.backup (Adware.Starware) -> No action taken.
C:\Program Files\Save\SaveNowupdate.exe (Adware.WhenUSave) -> No action taken.
C:\Documents and Settings\julia\Application Data\Starware370\Tem138.tmp (Adware.Starware) -> No action taken.
C:\Documents and Settings\julia\Application Data\Starware370\Tem14C.tmp (Adware.Starware) -> No action taken.
C:\Documents and Settings\julia\Application Data\Starware370\BrowserSearch\BrowserSearch.xml (Adware.Starware) -> No action taken.
C:\Documents and Settings\julia\Application Data\Starware370\BrowserSearch\BrowserSearch.xml.backup (Adware.Starware) -> No action taken.
C:\Documents and Settings\julia\Application Data\Starware370\Button_6\Button_6Options.xml (Adware.Starware) -> No action taken.
C:\Documents and Settings\julia\Application Data\Starware370\Button_6\Button_6Options.xml.backup (Adware.Starware) -> No action taken.
C:\Documents and Settings\julia\Application Data\Starware370\Button_7\Button_7Options.xml (Adware.Starware) -> No action taken.
C:\Documents and Settings\julia\Application Data\Starware370\Button_7\Button_7Options.xml.backup (Adware.Starware) -> No action taken.
C:\Documents and Settings\julia\Application Data\Starware370\Button_8\Button_8Options.xml (Adware.Starware) -> No action taken.
C:\Documents and Settings\julia\Application Data\Starware370\Button_8\Button_8Options.xml.backup (Adware.Starware) -> No action taken.
C:\Documents and Settings\julia\Application Data\Starware370\Configurator\Configurator.xml (Adware.Starware) -> No action taken.
C:\Documents and Settings\julia\Application Data\Starware370\Configurator\Configurator.xml.backup (Adware.Starware) -> No action taken.
C:\Documents and Settings\julia\Application Data\Starware370\ErrorSearch\ErrorSearchOptions.xml (Adware.Starware) -> No action taken.
C:\Documents and Settings\julia\Application Data\Starware370\ErrorSearch\ErrorSearchOptions.xml.backup (Adware.Starware) -> No action taken.
C:\Documents and Settings\julia\Application Data\Starware370\Layouts\ToolbarLayout.xml (Adware.Starware) -> No action taken.
C:\Documents and Settings\julia\Application Data\Starware370\Layouts\ToolbarLayout.xml.backup (Adware.Starware) -> No action taken.
C:\Documents and Settings\julia\Application Data\Starware370\Manager\ManagerOptions.xml (Adware.Starware) -> No action taken.
C:\Documents and Settings\julia\Application Data\Starware370\Manager\ManagerOptions.xml.backup (Adware.Starware) -> No action taken.
C:\Documents and Settings\julia\Application Data\Starware370\Paroles\ParolesOptions.xml (Adware.Starware) -> No action taken.
C:\Documents and Settings\julia\Application Data\Starware370\Paroles\ParolesOptions.xml.backup (Adware.Starware) -> No action taken.
C:\Documents and Settings\julia\Application Data\Starware370\Radio_FR\Radio_FROptions.xml (Adware.Starware) -> No action taken.
C:\Documents and Settings\julia\Application Data\Starware370\Radio_FR\Radio_FROptions.xml.backup (Adware.Starware) -> No action taken.
C:\Documents and Settings\julia\Application Data\Starware370\Recherche_de_musique\Recherche_de_musiqueOptions.xml (Adware.Starware) -> No action taken.
C:\Documents and Settings\julia\Application Data\Starware370\Recherche_de_musique\Recherche_de_musiqueOptions.xml.backup (Adware.Starware) -> No action taken.
C:\Documents and Settings\julia\Application Data\Starware370\RelatedSearch\RelatedSearchOptions.xml (Adware.Starware) -> No action taken.
C:\Documents and Settings\julia\Application Data\Starware370\RelatedSearch\RelatedSearchOptions.xml.backup (Adware.Starware) -> No action taken.
C:\Documents and Settings\julia\Application Data\Starware370\Telechargement\TelechargementOptions.xml (Adware.Starware) -> No action taken.
C:\Documents and Settings\julia\Application Data\Starware370\Telechargement\TelechargementOptions.xml.backup (Adware.Starware) -> No action taken.
C:\Documents and Settings\julia\Application Data\Starware370\Toolbar\TBProductsOptions.xml (Adware.Starware) -> No action taken.
C:\Documents and Settings\julia\Application Data\Starware370\Toolbar\TBProductsOptions.xml.backup (Adware.Starware) -> No action taken.
C:\Documents and Settings\julia\Application Data\Starware370\ToolbarLogo\ToolbarLogoOptions.xml (Adware.Starware) -> No action taken.
C:\Documents and Settings\julia\Application Data\Starware370\ToolbarLogo\ToolbarLogoOptions.xml.backup (Adware.Starware) -> No action taken.
C:\Documents and Settings\julia\Application Data\Starware370\ToolbarSearch\ToolbarSearchOptions.xml (Adware.Starware) -> No action taken.
C:\Documents and Settings\julia\Application Data\Starware370\ToolbarSearch\ToolbarSearchOptions.xml.backup (Adware.Starware) -> No action taken.
C:\Documents and Settings\julia\Application Data\Starware370\TravelSearch\TravelSearchOptions.xml (Adware.Starware) -> No action taken.
C:\Documents and Settings\julia\Application Data\Starware370\TravelSearch\TravelSearchOptions.xml.backup (Adware.Starware) -> No action taken.
C:\Documents and Settings\All Users\Menu Démarrer\Online Security Guide.url (Rogue.Link) -> No action taken.
C:\Documents and Settings\All Users\Menu Démarrer\Security Troubleshooting.url (Rogue.Link) -> No action taken.
C:\Documents and Settings\julia\Favoris\Online Security Test.url (Rogue.Link) -> No action taken.
J'ai supprimer la sélection, et après ça m'a ouvert le bloc note, avec ça : je te le copie colle quand même au cas où ...
Malwarebytes' Anti-Malware 1.09
Version de la base de données: 542
Type de recherche: Examen complet (C:\|)
Eléments examinés: 72093
Temps écoulé: 33 minute(s), 32 second(s)
Processus mémoire infecté(s): 0
Module(s) mémoire infecté(s): 0
Clé(s) du Registre infectée(s): 0
Valeur(s) du Registre infectée(s): 0
Elément(s) de données du Registre infecté(s): 0
Dossier(s) infecté(s): 26
Fichier(s) infecté(s): 84
Processus mémoire infecté(s):
(Aucun élément nuisible détecté)
Module(s) mémoire infecté(s):
(Aucun élément nuisible détecté)
Clé(s) du Registre infectée(s):
(Aucun élément nuisible détecté)
Valeur(s) du Registre infectée(s):
(Aucun élément nuisible détecté)
Elément(s) de données du Registre infecté(s):
(Aucun élément nuisible détecté)
Dossier(s) infecté(s):
C:\Program Files\Starware370 (Adware.Starware) -> Quarantined and deleted successfully.
C:\Program Files\Starware370\bin (Adware.Starware) -> Quarantined and deleted successfully.
C:\Program Files\Starware370\icons (Adware.Starware) -> Quarantined and deleted successfully.
C:\Documents and Settings\All Users\Application Data\Starware370 (Adware.Starware) -> Quarantined and deleted successfully.
C:\Documents and Settings\All Users\Application Data\Starware370\buttons (Adware.Starware) -> Quarantined and deleted successfully.
C:\Documents and Settings\All Users\Application Data\Starware370\contexts (Adware.Starware) -> Quarantined and deleted successfully.
C:\Documents and Settings\All Users\Application Data\Starware370\SimpleUpdate (Adware.Starware) -> Quarantined and deleted successfully.
C:\Program Files\Save (Adware.WhenUSave) -> Quarantined and deleted successfully.
C:\Documents and Settings\julia\Application Data\Starware370 (Adware.Starware) -> Quarantined and deleted successfully.
C:\Documents and Settings\julia\Application Data\Starware370\BrowserSearch (Adware.Starware) -> Quarantined and deleted successfully.
C:\Documents and Settings\julia\Application Data\Starware370\Button_6 (Adware.Starware) -> Quarantined and deleted successfully.
C:\Documents and Settings\julia\Application Data\Starware370\Button_7 (Adware.Starware) -> Quarantined and deleted successfully.
C:\Documents and Settings\julia\Application Data\Starware370\Button_8 (Adware.Starware) -> Quarantined and deleted successfully.
C:\Documents and Settings\julia\Application Data\Starware370\Configurator (Adware.Starware) -> Quarantined and deleted successfully.
C:\Documents and Settings\julia\Application Data\Starware370\ErrorSearch (Adware.Starware) -> Quarantined and deleted successfully.
C:\Documents and Settings\julia\Application Data\Starware370\Layouts (Adware.Starware) -> Quarantined and deleted successfully.
C:\Documents and Settings\julia\Application Data\Starware370\Manager (Adware.Starware) -> Quarantined and deleted successfully.
C:\Documents and Settings\julia\Application Data\Starware370\Paroles (Adware.Starware) -> Quarantined and deleted successfully.
C:\Documents and Settings\julia\Application Data\Starware370\Radio_FR (Adware.Starware) -> Quarantined and deleted successfully.
C:\Documents and Settings\julia\Application Data\Starware370\Recherche_de_musique (Adware.Starware) -> Quarantined and deleted successfully.
C:\Documents and Settings\julia\Application Data\Starware370\RelatedSearch (Adware.Starware) -> Quarantined and deleted successfully.
C:\Documents and Settings\julia\Application Data\Starware370\Telechargement (Adware.Starware) -> Quarantined and deleted successfully.
C:\Documents and Settings\julia\Application Data\Starware370\Toolbar (Adware.Starware) -> Quarantined and deleted successfully.
C:\Documents and Settings\julia\Application Data\Starware370\ToolbarLogo (Adware.Starware) -> Quarantined and deleted successfully.
C:\Documents and Settings\julia\Application Data\Starware370\ToolbarSearch (Adware.Starware) -> Quarantined and deleted successfully.
C:\Documents and Settings\julia\Application Data\Starware370\TravelSearch (Adware.Starware) -> Quarantined and deleted successfully.
Fichier(s) infecté(s):
C:\Program Files\Starware370\bin\Starware370.dll (Adware.Starware) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{9419A740-A8CC-488D-BC7C-D16070BE7920}\RP31\A0001692.dll (Trojan.Zlob) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{9419A740-A8CC-488D-BC7C-D16070BE7920}\RP31\A0001695.exe (Trojan.Zlob) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{9419A740-A8CC-488D-BC7C-D16070BE7920}\RP31\A0001696.exe (Trojan.Zlob) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{9419A740-A8CC-488D-BC7C-D16070BE7920}\RP31\A0001697.exe (Trojan.Zlob) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{9419A740-A8CC-488D-BC7C-D16070BE7920}\RP31\A0001698.exe (Trojan.Zlob) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{9419A740-A8CC-488D-BC7C-D16070BE7920}\RP31\A0001700.dll (Trojan.Zlob) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{DF5A3BBF-77AF-4BA6-ACBB-73F9611931E8}\RP150\A0041735.dll (Adware.WhenUSave) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{DF5A3BBF-77AF-4BA6-ACBB-73F9611931E8}\RP150\A0041736.exe (Adware.WhenUSave) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{DF5A3BBF-77AF-4BA6-ACBB-73F9611931E8}\RP167\A0051257.exe (Trojan.Zlob) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{DF5A3BBF-77AF-4BA6-ACBB-73F9611931E8}\RP167\A0051258.dll (Trojan.Zlob) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{DF5A3BBF-77AF-4BA6-ACBB-73F9611931E8}\RP167\A0052257.dll (Trojan.Zlob) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{DF5A3BBF-77AF-4BA6-ACBB-73F9611931E8}\RP167\A0052258.exe (Trojan.Zlob) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{DF5A3BBF-77AF-4BA6-ACBB-73F9611931E8}\RP167\A0053257.exe (Trojan.Zlob) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{DF5A3BBF-77AF-4BA6-ACBB-73F9611931E8}\RP167\A0053258.dll (Trojan.Zlob) -> Quarantined and deleted successfully.
C:\Program Files\Starware370\brand.bmp (Adware.Starware) -> Quarantined and deleted successfully.
C:\Program Files\Starware370\Starware370Config.xml (Adware.Starware) -> Quarantined and deleted successfully.
C:\Program Files\Starware370\Starware370Uninstall.exe (Adware.Starware) -> Quarantined and deleted successfully.
C:\Program Files\Starware370\Thumbs.db (Adware.Starware) -> Quarantined and deleted successfully.
C:\Program Files\Starware370\icons\star_16.ico (Adware.Starware) -> Quarantined and deleted successfully.
C:\Documents and Settings\All Users\Application Data\Starware370\buttons\563_button_1b_def.bmp (Adware.Starware) -> Quarantined and deleted successfully.
C:\Documents and Settings\All Users\Application Data\Starware370\buttons\563_button_1b_over.bmp (Adware.Starware) -> Quarantined and deleted successfully.
C:\Documents and Settings\All Users\Application Data\Starware370\buttons\572_button_1b_def.bmp (Adware.Starware) -> Quarantined and deleted successfully.
C:\Documents and Settings\All Users\Application Data\Starware370\buttons\572_button_1b_over.bmp (Adware.Starware) -> Quarantined and deleted successfully.
C:\Documents and Settings\All Users\Application Data\Starware370\buttons\573_button_1b_def.bmp (Adware.Starware) -> Quarantined and deleted successfully.
C:\Documents and Settings\All Users\Application Data\Starware370\buttons\573_button_1b_over.bmp (Adware.Starware) -> Quarantined and deleted successfully.
C:\Documents and Settings\All Users\Application Data\Starware370\buttons\Button_60.bmp (Adware.Starware) -> Quarantined and deleted successfully.
C:\Documents and Settings\All Users\Application Data\Starware370\buttons\Button_70.bmp (Adware.Starware) -> Quarantined and deleted successfully.
C:\Documents and Settings\All Users\Application Data\Starware370\buttons\Button_80.bmp (Adware.Starware) -> Quarantined and deleted successfully.
C:\Documents and Settings\All Users\Application Data\Starware370\buttons\FindIt.bmp (Adware.Starware) -> Quarantined and deleted successfully.
C:\Documents and Settings\All Users\Application Data\Starware370\buttons\FindItHot.bmp (Adware.Starware) -> Quarantined and deleted successfully.
C:\Documents and Settings\All Users\Application Data\Starware370\buttons\findithotxp.png (Adware.Starware) -> Quarantined and deleted successfully.
C:\Documents and Settings\All Users\Application Data\Starware370\buttons\finditxp.png (Adware.Starware) -> Quarantined and deleted successfully.
C:\Documents and Settings\All Users\Application Data\Starware370\buttons\logo.bmp (Adware.Starware) -> Quarantined and deleted successfully.
C:\Documents and Settings\All Users\Application Data\Starware370\buttons\logoxp.bmp (Adware.Starware) -> Quarantined and deleted successfully.
C:\Documents and Settings\All Users\Application Data\Starware370\contexts\error.xml (Adware.Starware) -> Quarantined and deleted successfully.
C:\Documents and Settings\All Users\Application Data\Starware370\contexts\Related.xml (Adware.Starware) -> Quarantined and deleted successfully.
C:\Documents and Settings\All Users\Application Data\Starware370\contexts\Travel.xml (Adware.Starware) -> Quarantined and deleted successfully.
C:\Documents and Settings\All Users\Application Data\Starware370\SimpleUpdate\ProductMessagingConfig.xml (Adware.Starware) -> Quarantined and deleted successfully.
C:\Documents and Settings\All Users\Application Data\Starware370\SimpleUpdate\ProductMessagingConfig.xml.backup (Adware.Starware) -> Quarantined and deleted successfully.
C:\Documents and Settings\All Users\Application Data\Starware370\SimpleUpdate\SimpleUpdateConfig.xml (Adware.Starware) -> Quarantined and deleted successfully.
C:\Documents and Settings\All Users\Application Data\Starware370\SimpleUpdate\SimpleUpdateConfig.xml.backup (Adware.Starware) -> Quarantined and deleted successfully.
C:\Documents and Settings\All Users\Application Data\Starware370\SimpleUpdate\TimerManagerConfig.xml (Adware.Starware) -> Quarantined and deleted successfully.
C:\Documents and Settings\All Users\Application Data\Starware370\SimpleUpdate\TimerManagerConfig.xml.backup (Adware.Starware) -> Quarantined and deleted successfully.
C:\Program Files\Save\SaveNowupdate.exe (Adware.WhenUSave) -> Quarantined and deleted successfully.
C:\Documents and Settings\julia\Application Data\Starware370\Tem138.tmp (Adware.Starware) -> Quarantined and deleted successfully.
C:\Documents and Settings\julia\Application Data\Starware370\Tem14C.tmp (Adware.Starware) -> Quarantined and deleted successfully.
C:\Documents and Settings\julia\Application Data\Starware370\BrowserSearch\BrowserSearch.xml (Adware.Starware) -> Quarantined and deleted successfully.
C:\Documents and Settings\julia\Application Data\Starware370\BrowserSearch\BrowserSearch.xml.backup (Adware.Starware) -> Quarantined and deleted successfully.
C:\Documents and Settings\julia\Application Data\Starware370\Button_6\Button_6Options.xml (Adware.Starware) -> Quarantined and deleted successfully.
C:\Documents and Settings\julia\Application Data\Starware370\Button_6\Button_6Options.xml.backup (Adware.Starware) -> Quarantined and deleted successfully.
C:\Documents and Settings\julia\Application Data\Starware370\Button_7\Button_7Options.xml (Adware.Starware) -> Quarantined and deleted successfully.
C:\Documents and Settings\julia\Application Data\Starware370\Button_7\Button_7Options.xml.backup (Adware.Starware) -> Quarantined and deleted successfully.
C:\Documents and Settings\julia\Application Data\Starware370\Button_8\Button_8Options.xml (Adware.Starware) -> Quarantined and deleted successfully.
C:\Documents and Settings\julia\Application Data\Starware370\Button_8\Button_8Options.xml.backup (Adware.Starware) -> Quarantined and deleted successfully.
C:\Documents and Settings\julia\Application Data\Starware370\Configurator\Configurator.xml (Adware.Starware) -> Quarantined and deleted successfully.
C:\Documents and Settings\julia\Application Data\Starware370\Configurator\Configurator.xml.backup (Adware.Starware) -> Quarantined and deleted successfully.
C:\Documents and Settings\julia\Application Data\Starware370\ErrorSearch\ErrorSearchOptions.xml (Adware.Starware) -> Quarantined and deleted successfully.
C:\Documents and Settings\julia\Application Data\Starware370\ErrorSearch\ErrorSearchOptions.xml.backup (Adware.Starware) -> Quarantined and deleted successfully.
C:\Documents and Settings\julia\Application Data\Starware370\Layouts\ToolbarLayout.xml (Adware.Starware) -> Quarantined and deleted successfully.
C:\Documents and Settings\julia\Application Data\Starware370\Layouts\ToolbarLayout.xml.backup (Adware.Starware) -> Quarantined and deleted successfully.
C:\Documents and Settings\julia\Application Data\Starware370\Manager\ManagerOptions.xml (Adware.Starware) -> Quarantined and deleted successfully.
C:\Documents and Settings\julia\Application Data\Starware370\Manager\ManagerOptions.xml.backup (Adware.Starware) -> Quarantined and deleted successfully.
C:\Documents and Settings\julia\Application Data\Starware370\Paroles\ParolesOptions.xml (Adware.Starware) -> Quarantined and deleted successfully.
C:\Documents and Settings\julia\Application Data\Starware370\Paroles\ParolesOptions.xml.backup (Adware.Starware) -> Quarantined and deleted successfully.
C:\Documents and Settings\julia\Application Data\Starware370\Radio_FR\Radio_FROptions.xml (Adware.Starware) -> Quarantined and deleted successfully.
C:\Documents and Settings\julia\Application Data\Starware370\Radio_FR\Radio_FROptions.xml.backup (Adware.Starware) -> Quarantined and deleted successfully.
C:\Documents and Settings\julia\Application Data\Starware370\Recherche_de_musique\Recherche_de_musiqueOptions.xml (Adware.Starware) -> Quarantined and deleted successfully.
C:\Documents and Settings\julia\Application Data\Starware370\Recherche_de_musique\Recherche_de_musiqueOptions.xml.backup (Adware.Starware) -> Quarantined and deleted successfully.
C:\Documents and Settings\julia\Application Data\Starware370\RelatedSearch\RelatedSearchOptions.xml (Adware.Starware) -> Quarantined and deleted successfully.
C:\Documents and Settings\julia\Application Data\Starware370\RelatedSearch\RelatedSearchOptions.xml.backup (Adware.Starware) -> Quarantined and deleted successfully.
C:\Documents and Settings\julia\Application Data\Starware370\Telechargement\TelechargementOptions.xml (Adware.Starware) -> Quarantined and deleted successfully.
C:\Documents and Settings\julia\Application Data\Starware370\Telechargement\TelechargementOptions.xml.backup (Adware.Starware) -> Quarantined and deleted successfully.
C:\Documents and Settings\julia\Application Data\Starware370\Toolbar\TBProductsOptions.xml (Adware.Starware) -> Quarantined and deleted successfully.
C:\Documents and Settings\julia\Application Data\Starware370\Toolbar\TBProductsOptions.xml.backup (Adware.Starware) -> Quarantined and deleted successfully.
C:\Documents and Settings\julia\Application Data\Starware370\ToolbarLogo\ToolbarLogoOptions.xml (Adware.Starware) -> Quarantined and deleted successfully.
C:\Documents and Settings\julia\Application Data\Starware370\ToolbarLogo\ToolbarLogoOptions.xml.backup (Adware.Starware) -> Quarantined and deleted successfully.
C:\Documents and Settings\julia\Application Data\Starware370\ToolbarSearch\ToolbarSearchOptions.xml (Adware.Starware) -> Quarantined and deleted successfully.
C:\Documents and Settings\julia\Application Data\Starware370\ToolbarSearch\ToolbarSearchOptions.xml.backup (Adware.Starware) -> Quarantined and deleted successfully.
C:\Documents and Settings\julia\Application Data\Starware370\TravelSearch\TravelSearchOptions.xml (Adware.Starware) -> Quarantined and deleted successfully.
C:\Documents and Settings\julia\Application Data\Starware370\TravelSearch\TravelSearchOptions.xml.backup (Adware.Starware) -> Quarantined and deleted successfully.
C:\Documents and Settings\All Users\Menu Démarrer\Online Security Guide.url (Rogue.Link) -> Quarantined and deleted successfully.
C:\Documents and Settings\All Users\Menu Démarrer\Security Troubleshooting.url (Rogue.Link) -> Quarantined and deleted successfully.
C:\Documents and Settings\julia\Favoris\Online Security Test.url (Rogue.Link) -> Quarantined and deleted successfully.
Malwarebytes' Anti-Malware 1.09
Version de la base de données: 542
Type de recherche: Examen complet (C:\|)
Eléments examinés: 72093
Temps écoulé: 33 minute(s), 32 second(s)
Processus mémoire infecté(s): 0
Module(s) mémoire infecté(s): 0
Clé(s) du Registre infectée(s): 0
Valeur(s) du Registre infectée(s): 0
Elément(s) de données du Registre infecté(s): 0
Dossier(s) infecté(s): 26
Fichier(s) infecté(s): 84
Processus mémoire infecté(s):
(Aucun élément nuisible détecté)
Module(s) mémoire infecté(s):
(Aucun élément nuisible détecté)
Clé(s) du Registre infectée(s):
(Aucun élément nuisible détecté)
Valeur(s) du Registre infectée(s):
(Aucun élément nuisible détecté)
Elément(s) de données du Registre infecté(s):
(Aucun élément nuisible détecté)
Dossier(s) infecté(s):
C:\Program Files\Starware370 (Adware.Starware) -> Quarantined and deleted successfully.
C:\Program Files\Starware370\bin (Adware.Starware) -> Quarantined and deleted successfully.
C:\Program Files\Starware370\icons (Adware.Starware) -> Quarantined and deleted successfully.
C:\Documents and Settings\All Users\Application Data\Starware370 (Adware.Starware) -> Quarantined and deleted successfully.
C:\Documents and Settings\All Users\Application Data\Starware370\buttons (Adware.Starware) -> Quarantined and deleted successfully.
C:\Documents and Settings\All Users\Application Data\Starware370\contexts (Adware.Starware) -> Quarantined and deleted successfully.
C:\Documents and Settings\All Users\Application Data\Starware370\SimpleUpdate (Adware.Starware) -> Quarantined and deleted successfully.
C:\Program Files\Save (Adware.WhenUSave) -> Quarantined and deleted successfully.
C:\Documents and Settings\julia\Application Data\Starware370 (Adware.Starware) -> Quarantined and deleted successfully.
C:\Documents and Settings\julia\Application Data\Starware370\BrowserSearch (Adware.Starware) -> Quarantined and deleted successfully.
C:\Documents and Settings\julia\Application Data\Starware370\Button_6 (Adware.Starware) -> Quarantined and deleted successfully.
C:\Documents and Settings\julia\Application Data\Starware370\Button_7 (Adware.Starware) -> Quarantined and deleted successfully.
C:\Documents and Settings\julia\Application Data\Starware370\Button_8 (Adware.Starware) -> Quarantined and deleted successfully.
C:\Documents and Settings\julia\Application Data\Starware370\Configurator (Adware.Starware) -> Quarantined and deleted successfully.
C:\Documents and Settings\julia\Application Data\Starware370\ErrorSearch (Adware.Starware) -> Quarantined and deleted successfully.
C:\Documents and Settings\julia\Application Data\Starware370\Layouts (Adware.Starware) -> Quarantined and deleted successfully.
C:\Documents and Settings\julia\Application Data\Starware370\Manager (Adware.Starware) -> Quarantined and deleted successfully.
C:\Documents and Settings\julia\Application Data\Starware370\Paroles (Adware.Starware) -> Quarantined and deleted successfully.
C:\Documents and Settings\julia\Application Data\Starware370\Radio_FR (Adware.Starware) -> Quarantined and deleted successfully.
C:\Documents and Settings\julia\Application Data\Starware370\Recherche_de_musique (Adware.Starware) -> Quarantined and deleted successfully.
C:\Documents and Settings\julia\Application Data\Starware370\RelatedSearch (Adware.Starware) -> Quarantined and deleted successfully.
C:\Documents and Settings\julia\Application Data\Starware370\Telechargement (Adware.Starware) -> Quarantined and deleted successfully.
C:\Documents and Settings\julia\Application Data\Starware370\Toolbar (Adware.Starware) -> Quarantined and deleted successfully.
C:\Documents and Settings\julia\Application Data\Starware370\ToolbarLogo (Adware.Starware) -> Quarantined and deleted successfully.
C:\Documents and Settings\julia\Application Data\Starware370\ToolbarSearch (Adware.Starware) -> Quarantined and deleted successfully.
C:\Documents and Settings\julia\Application Data\Starware370\TravelSearch (Adware.Starware) -> Quarantined and deleted successfully.
Fichier(s) infecté(s):
C:\Program Files\Starware370\bin\Starware370.dll (Adware.Starware) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{9419A740-A8CC-488D-BC7C-D16070BE7920}\RP31\A0001692.dll (Trojan.Zlob) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{9419A740-A8CC-488D-BC7C-D16070BE7920}\RP31\A0001695.exe (Trojan.Zlob) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{9419A740-A8CC-488D-BC7C-D16070BE7920}\RP31\A0001696.exe (Trojan.Zlob) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{9419A740-A8CC-488D-BC7C-D16070BE7920}\RP31\A0001697.exe (Trojan.Zlob) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{9419A740-A8CC-488D-BC7C-D16070BE7920}\RP31\A0001698.exe (Trojan.Zlob) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{9419A740-A8CC-488D-BC7C-D16070BE7920}\RP31\A0001700.dll (Trojan.Zlob) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{DF5A3BBF-77AF-4BA6-ACBB-73F9611931E8}\RP150\A0041735.dll (Adware.WhenUSave) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{DF5A3BBF-77AF-4BA6-ACBB-73F9611931E8}\RP150\A0041736.exe (Adware.WhenUSave) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{DF5A3BBF-77AF-4BA6-ACBB-73F9611931E8}\RP167\A0051257.exe (Trojan.Zlob) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{DF5A3BBF-77AF-4BA6-ACBB-73F9611931E8}\RP167\A0051258.dll (Trojan.Zlob) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{DF5A3BBF-77AF-4BA6-ACBB-73F9611931E8}\RP167\A0052257.dll (Trojan.Zlob) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{DF5A3BBF-77AF-4BA6-ACBB-73F9611931E8}\RP167\A0052258.exe (Trojan.Zlob) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{DF5A3BBF-77AF-4BA6-ACBB-73F9611931E8}\RP167\A0053257.exe (Trojan.Zlob) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{DF5A3BBF-77AF-4BA6-ACBB-73F9611931E8}\RP167\A0053258.dll (Trojan.Zlob) -> Quarantined and deleted successfully.
C:\Program Files\Starware370\brand.bmp (Adware.Starware) -> Quarantined and deleted successfully.
C:\Program Files\Starware370\Starware370Config.xml (Adware.Starware) -> Quarantined and deleted successfully.
C:\Program Files\Starware370\Starware370Uninstall.exe (Adware.Starware) -> Quarantined and deleted successfully.
C:\Program Files\Starware370\Thumbs.db (Adware.Starware) -> Quarantined and deleted successfully.
C:\Program Files\Starware370\icons\star_16.ico (Adware.Starware) -> Quarantined and deleted successfully.
C:\Documents and Settings\All Users\Application Data\Starware370\buttons\563_button_1b_def.bmp (Adware.Starware) -> Quarantined and deleted successfully.
C:\Documents and Settings\All Users\Application Data\Starware370\buttons\563_button_1b_over.bmp (Adware.Starware) -> Quarantined and deleted successfully.
C:\Documents and Settings\All Users\Application Data\Starware370\buttons\572_button_1b_def.bmp (Adware.Starware) -> Quarantined and deleted successfully.
C:\Documents and Settings\All Users\Application Data\Starware370\buttons\572_button_1b_over.bmp (Adware.Starware) -> Quarantined and deleted successfully.
C:\Documents and Settings\All Users\Application Data\Starware370\buttons\573_button_1b_def.bmp (Adware.Starware) -> Quarantined and deleted successfully.
C:\Documents and Settings\All Users\Application Data\Starware370\buttons\573_button_1b_over.bmp (Adware.Starware) -> Quarantined and deleted successfully.
C:\Documents and Settings\All Users\Application Data\Starware370\buttons\Button_60.bmp (Adware.Starware) -> Quarantined and deleted successfully.
C:\Documents and Settings\All Users\Application Data\Starware370\buttons\Button_70.bmp (Adware.Starware) -> Quarantined and deleted successfully.
C:\Documents and Settings\All Users\Application Data\Starware370\buttons\Button_80.bmp (Adware.Starware) -> Quarantined and deleted successfully.
C:\Documents and Settings\All Users\Application Data\Starware370\buttons\FindIt.bmp (Adware.Starware) -> Quarantined and deleted successfully.
C:\Documents and Settings\All Users\Application Data\Starware370\buttons\FindItHot.bmp (Adware.Starware) -> Quarantined and deleted successfully.
C:\Documents and Settings\All Users\Application Data\Starware370\buttons\findithotxp.png (Adware.Starware) -> Quarantined and deleted successfully.
C:\Documents and Settings\All Users\Application Data\Starware370\buttons\finditxp.png (Adware.Starware) -> Quarantined and deleted successfully.
C:\Documents and Settings\All Users\Application Data\Starware370\buttons\logo.bmp (Adware.Starware) -> Quarantined and deleted successfully.
C:\Documents and Settings\All Users\Application Data\Starware370\buttons\logoxp.bmp (Adware.Starware) -> Quarantined and deleted successfully.
C:\Documents and Settings\All Users\Application Data\Starware370\contexts\error.xml (Adware.Starware) -> Quarantined and deleted successfully.
C:\Documents and Settings\All Users\Application Data\Starware370\contexts\Related.xml (Adware.Starware) -> Quarantined and deleted successfully.
C:\Documents and Settings\All Users\Application Data\Starware370\contexts\Travel.xml (Adware.Starware) -> Quarantined and deleted successfully.
C:\Documents and Settings\All Users\Application Data\Starware370\SimpleUpdate\ProductMessagingConfig.xml (Adware.Starware) -> Quarantined and deleted successfully.
C:\Documents and Settings\All Users\Application Data\Starware370\SimpleUpdate\ProductMessagingConfig.xml.backup (Adware.Starware) -> Quarantined and deleted successfully.
C:\Documents and Settings\All Users\Application Data\Starware370\SimpleUpdate\SimpleUpdateConfig.xml (Adware.Starware) -> Quarantined and deleted successfully.
C:\Documents and Settings\All Users\Application Data\Starware370\SimpleUpdate\SimpleUpdateConfig.xml.backup (Adware.Starware) -> Quarantined and deleted successfully.
C:\Documents and Settings\All Users\Application Data\Starware370\SimpleUpdate\TimerManagerConfig.xml (Adware.Starware) -> Quarantined and deleted successfully.
C:\Documents and Settings\All Users\Application Data\Starware370\SimpleUpdate\TimerManagerConfig.xml.backup (Adware.Starware) -> Quarantined and deleted successfully.
C:\Program Files\Save\SaveNowupdate.exe (Adware.WhenUSave) -> Quarantined and deleted successfully.
C:\Documents and Settings\julia\Application Data\Starware370\Tem138.tmp (Adware.Starware) -> Quarantined and deleted successfully.
C:\Documents and Settings\julia\Application Data\Starware370\Tem14C.tmp (Adware.Starware) -> Quarantined and deleted successfully.
C:\Documents and Settings\julia\Application Data\Starware370\BrowserSearch\BrowserSearch.xml (Adware.Starware) -> Quarantined and deleted successfully.
C:\Documents and Settings\julia\Application Data\Starware370\BrowserSearch\BrowserSearch.xml.backup (Adware.Starware) -> Quarantined and deleted successfully.
C:\Documents and Settings\julia\Application Data\Starware370\Button_6\Button_6Options.xml (Adware.Starware) -> Quarantined and deleted successfully.
C:\Documents and Settings\julia\Application Data\Starware370\Button_6\Button_6Options.xml.backup (Adware.Starware) -> Quarantined and deleted successfully.
C:\Documents and Settings\julia\Application Data\Starware370\Button_7\Button_7Options.xml (Adware.Starware) -> Quarantined and deleted successfully.
C:\Documents and Settings\julia\Application Data\Starware370\Button_7\Button_7Options.xml.backup (Adware.Starware) -> Quarantined and deleted successfully.
C:\Documents and Settings\julia\Application Data\Starware370\Button_8\Button_8Options.xml (Adware.Starware) -> Quarantined and deleted successfully.
C:\Documents and Settings\julia\Application Data\Starware370\Button_8\Button_8Options.xml.backup (Adware.Starware) -> Quarantined and deleted successfully.
C:\Documents and Settings\julia\Application Data\Starware370\Configurator\Configurator.xml (Adware.Starware) -> Quarantined and deleted successfully.
C:\Documents and Settings\julia\Application Data\Starware370\Configurator\Configurator.xml.backup (Adware.Starware) -> Quarantined and deleted successfully.
C:\Documents and Settings\julia\Application Data\Starware370\ErrorSearch\ErrorSearchOptions.xml (Adware.Starware) -> Quarantined and deleted successfully.
C:\Documents and Settings\julia\Application Data\Starware370\ErrorSearch\ErrorSearchOptions.xml.backup (Adware.Starware) -> Quarantined and deleted successfully.
C:\Documents and Settings\julia\Application Data\Starware370\Layouts\ToolbarLayout.xml (Adware.Starware) -> Quarantined and deleted successfully.
C:\Documents and Settings\julia\Application Data\Starware370\Layouts\ToolbarLayout.xml.backup (Adware.Starware) -> Quarantined and deleted successfully.
C:\Documents and Settings\julia\Application Data\Starware370\Manager\ManagerOptions.xml (Adware.Starware) -> Quarantined and deleted successfully.
C:\Documents and Settings\julia\Application Data\Starware370\Manager\ManagerOptions.xml.backup (Adware.Starware) -> Quarantined and deleted successfully.
C:\Documents and Settings\julia\Application Data\Starware370\Paroles\ParolesOptions.xml (Adware.Starware) -> Quarantined and deleted successfully.
C:\Documents and Settings\julia\Application Data\Starware370\Paroles\ParolesOptions.xml.backup (Adware.Starware) -> Quarantined and deleted successfully.
C:\Documents and Settings\julia\Application Data\Starware370\Radio_FR\Radio_FROptions.xml (Adware.Starware) -> Quarantined and deleted successfully.
C:\Documents and Settings\julia\Application Data\Starware370\Radio_FR\Radio_FROptions.xml.backup (Adware.Starware) -> Quarantined and deleted successfully.
C:\Documents and Settings\julia\Application Data\Starware370\Recherche_de_musique\Recherche_de_musiqueOptions.xml (Adware.Starware) -> Quarantined and deleted successfully.
C:\Documents and Settings\julia\Application Data\Starware370\Recherche_de_musique\Recherche_de_musiqueOptions.xml.backup (Adware.Starware) -> Quarantined and deleted successfully.
C:\Documents and Settings\julia\Application Data\Starware370\RelatedSearch\RelatedSearchOptions.xml (Adware.Starware) -> Quarantined and deleted successfully.
C:\Documents and Settings\julia\Application Data\Starware370\RelatedSearch\RelatedSearchOptions.xml.backup (Adware.Starware) -> Quarantined and deleted successfully.
C:\Documents and Settings\julia\Application Data\Starware370\Telechargement\TelechargementOptions.xml (Adware.Starware) -> Quarantined and deleted successfully.
C:\Documents and Settings\julia\Application Data\Starware370\Telechargement\TelechargementOptions.xml.backup (Adware.Starware) -> Quarantined and deleted successfully.
C:\Documents and Settings\julia\Application Data\Starware370\Toolbar\TBProductsOptions.xml (Adware.Starware) -> Quarantined and deleted successfully.
C:\Documents and Settings\julia\Application Data\Starware370\Toolbar\TBProductsOptions.xml.backup (Adware.Starware) -> Quarantined and deleted successfully.
C:\Documents and Settings\julia\Application Data\Starware370\ToolbarLogo\ToolbarLogoOptions.xml (Adware.Starware) -> Quarantined and deleted successfully.
C:\Documents and Settings\julia\Application Data\Starware370\ToolbarLogo\ToolbarLogoOptions.xml.backup (Adware.Starware) -> Quarantined and deleted successfully.
C:\Documents and Settings\julia\Application Data\Starware370\ToolbarSearch\ToolbarSearchOptions.xml (Adware.Starware) -> Quarantined and deleted successfully.
C:\Documents and Settings\julia\Application Data\Starware370\ToolbarSearch\ToolbarSearchOptions.xml.backup (Adware.Starware) -> Quarantined and deleted successfully.
C:\Documents and Settings\julia\Application Data\Starware370\TravelSearch\TravelSearchOptions.xml (Adware.Starware) -> Quarantined and deleted successfully.
C:\Documents and Settings\julia\Application Data\Starware370\TravelSearch\TravelSearchOptions.xml.backup (Adware.Starware) -> Quarantined and deleted successfully.
C:\Documents and Settings\All Users\Menu Démarrer\Online Security Guide.url (Rogue.Link) -> Quarantined and deleted successfully.
C:\Documents and Settings\All Users\Menu Démarrer\Security Troubleshooting.url (Rogue.Link) -> Quarantined and deleted successfully.
C:\Documents and Settings\julia\Favoris\Online Security Test.url (Rogue.Link) -> Quarantined and deleted successfully.