CPU 100% et Wintems persistant
Résolu
alienismail
-
alienismail -
alienismail -
Bonjour,
Mon ordinateur est infecté depuis quelques jours par le virus wintems.exe et parfois flec006.exe. Je n'arrive plus à jouer sur FR3, le jeu est devenu trop lent. Mon CPU est tj la barre en haut. J'ai essayé la défragmentation et des antispywares, mais le problème persiste encore.
Merci d'avoir m'offrir de l'aide.
Mon ordinateur est infecté depuis quelques jours par le virus wintems.exe et parfois flec006.exe. Je n'arrive plus à jouer sur FR3, le jeu est devenu trop lent. Mon CPU est tj la barre en haut. J'ai essayé la défragmentation et des antispywares, mais le problème persiste encore.
Merci d'avoir m'offrir de l'aide.
A voir également:
- CPU 100% et Wintems persistant
- Temperature cpu - Guide
- Cpu burner - Télécharger - Optimisation
- Cpu stress - Télécharger - Informations & Diagnostic
- Cpu z - Télécharger - Informations & Diagnostic
- Formate pour taxer client 100€ - Forum Vos droits sur internet
23 réponses
...Suite:
D:\System Volume Information\_restore{5F3C7E24-AD0D-44B2-9A6E-8D3F3C18DC10}\RP52\A0055836.exe
[DETECTION] Is the Trojan horse TR/Bagle.Gen.B
[NOTE] The file was moved to '486ec3fc.qua'!
D:\System Volume Information\_restore{5F3C7E24-AD0D-44B2-9A6E-8D3F3C18DC10}\RP52\A0055888.exe
[DETECTION] Contains detection pattern of the worm WORM/Bagle.Gen
[NOTE] The file was moved to '486ec3ff.qua'!
D:\System Volume Information\_restore{5F3C7E24-AD0D-44B2-9A6E-8D3F3C18DC10}\RP52\A0055889.exe
[DETECTION] Contains detection pattern of the worm WORM/Bagle.Gen
[NOTE] The file was moved to '49e746e8.qua'!
D:\System Volume Information\_restore{5F3C7E24-AD0D-44B2-9A6E-8D3F3C18DC10}\RP52\A0055890.exe
[DETECTION] Is the Trojan horse TR/Bagle.Gen.B
[NOTE] The file was moved to '486ec400.qua'!
D:\System Volume Information\_restore{5F3C7E24-AD0D-44B2-9A6E-8D3F3C18DC10}\RP52\A0055891.exe
[DETECTION] Contains detection pattern of the worm WORM/Bagle.Gen
[NOTE] The file was moved to '49e746e9.qua'!
D:\System Volume Information\_restore{5F3C7E24-AD0D-44B2-9A6E-8D3F3C18DC10}\RP52\A0055892.exe
[DETECTION] Is the Trojan horse TR/Bagle.Gen.B
[NOTE] The file was moved to '486ec401.qua'!
D:\System Volume Information\_restore{5F3C7E24-AD0D-44B2-9A6E-8D3F3C18DC10}\RP52\A0055895.exe
[DETECTION] Contains detection pattern of the worm WORM/Bagle.Gen
[NOTE] The file was moved to '49e746ea.qua'!
D:\System Volume Information\_restore{5F3C7E24-AD0D-44B2-9A6E-8D3F3C18DC10}\RP52\A0055897.exe
[DETECTION] Is the Trojan horse TR/Bagle.Gen.B
[NOTE] The file was moved to '486ec402.qua'!
D:\System Volume Information\_restore{5F3C7E24-AD0D-44B2-9A6E-8D3F3C18DC10}\RP52\A0055899.exe
[DETECTION] Contains detection pattern of the worm WORM/Bagle.Gen
[NOTE] The file was moved to '49e746eb.qua'!
D:\System Volume Information\_restore{5F3C7E24-AD0D-44B2-9A6E-8D3F3C18DC10}\RP52\A0055900.exe
[DETECTION] Is the Trojan horse TR/Bagle.Gen.B
[NOTE] The file was moved to '486ec403.qua'!
D:\System Volume Information\_restore{5F3C7E24-AD0D-44B2-9A6E-8D3F3C18DC10}\RP52\A0055901.exe
[DETECTION] Is the Trojan horse TR/Bagle.Gen.B
[NOTE] The file was moved to '49e746ec.qua'!
D:\System Volume Information\_restore{5F3C7E24-AD0D-44B2-9A6E-8D3F3C18DC10}\RP52\A0055902.exe
[DETECTION] Contains detection pattern of the worm WORM/Bagle.Gen
[NOTE] The file was moved to '486ec404.qua'!
D:\System Volume Information\_restore{5F3C7E24-AD0D-44B2-9A6E-8D3F3C18DC10}\RP52\A0055904.exe
[DETECTION] Is the Trojan horse TR/Bagle.Gen.B
[NOTE] The file was moved to '49e746ed.qua'!
D:\System Volume Information\_restore{5F3C7E24-AD0D-44B2-9A6E-8D3F3C18DC10}\RP52\A0055907.exe
[DETECTION] Contains detection pattern of the worm WORM/Bagle.Gen
[NOTE] The file was moved to '486ec406.qua'!
D:\System Volume Information\_restore{5F3C7E24-AD0D-44B2-9A6E-8D3F3C18DC10}\RP52\A0055910.exe
[DETECTION] Contains detection pattern of the worm WORM/Bagle.Gen
[NOTE] The file was moved to '486ec405.qua'!
D:\System Volume Information\_restore{5F3C7E24-AD0D-44B2-9A6E-8D3F3C18DC10}\RP52\A0055911.exe
[DETECTION] Is the Trojan horse TR/Bagle.Gen.B
[NOTE] The file was moved to '49e746ef.qua'!
D:\System Volume Information\_restore{5F3C7E24-AD0D-44B2-9A6E-8D3F3C18DC10}\RP52\A0055916.exe
[DETECTION] Is the Trojan horse TR/Bagle.Gen.B
[NOTE] The file was moved to '486ec418.qua'!
D:\System Volume Information\_restore{5F3C7E24-AD0D-44B2-9A6E-8D3F3C18DC10}\RP52\A0055919.exe
[DETECTION] Is the Trojan horse TR/Bagle.Gen.B
[NOTE] The file was moved to '486ec407.qua'!
D:\System Volume Information\_restore{5F3C7E24-AD0D-44B2-9A6E-8D3F3C18DC10}\RP52\A0055923.exe
[DETECTION] Is the Trojan horse TR/Bagle.Gen.B
[NOTE] The file was moved to '49e746e0.qua'!
D:\System Volume Information\_restore{5F3C7E24-AD0D-44B2-9A6E-8D3F3C18DC10}\RP52\A0055930.exe
[DETECTION] Is the Trojan horse TR/Bagle.Gen.B
[NOTE] The file was moved to '486ec408.qua'!
D:\System Volume Information\_restore{5F3C7E24-AD0D-44B2-9A6E-8D3F3C18DC10}\RP52\A0055931.exe
[DETECTION] Contains detection pattern of the worm WORM/Bagle.Gen
[NOTE] The file was moved to '486ec409.qua'!
D:\System Volume Information\_restore{5F3C7E24-AD0D-44B2-9A6E-8D3F3C18DC10}\RP52\A0055932.exe
[DETECTION] Contains detection pattern of the worm WORM/Bagle.Gen
[NOTE] The file was moved to '49e746e2.qua'!
D:\System Volume Information\_restore{5F3C7E24-AD0D-44B2-9A6E-8D3F3C18DC10}\RP52\A0055936.exe
[DETECTION] Contains detection pattern of the worm WORM/Bagle.Gen
[NOTE] The file was moved to '486ec40a.qua'!
D:\System Volume Information\_restore{5F3C7E24-AD0D-44B2-9A6E-8D3F3C18DC10}\RP52\A0055938.exe
[DETECTION] Contains detection pattern of the worm WORM/Bagle.Gen
[NOTE] The file was moved to '49e746e3.qua'!
D:\System Volume Information\_restore{5F3C7E24-AD0D-44B2-9A6E-8D3F3C18DC10}\RP52\A0055939.exe
[DETECTION] Is the Trojan horse TR/Bagle.Gen.B
[NOTE] The file was moved to '486ec40b.qua'!
D:\System Volume Information\_restore{5F3C7E24-AD0D-44B2-9A6E-8D3F3C18DC10}\RP52\A0055944.exe
[DETECTION] Is the Trojan horse TR/Bagle.Gen.B
[NOTE] The file was moved to '49e746e4.qua'!
D:\System Volume Information\_restore{5F3C7E24-AD0D-44B2-9A6E-8D3F3C18DC10}\RP52\A0055949.exe
[DETECTION] Is the Trojan horse TR/Bagle.Gen.B
[NOTE] The file was moved to '486ec40c.qua'!
D:\System Volume Information\_restore{5F3C7E24-AD0D-44B2-9A6E-8D3F3C18DC10}\RP52\A0055965.exe
[DETECTION] Is the Trojan horse TR/Bagle.Gen.B
[NOTE] The file was moved to '486ec40d.qua'!
D:\System Volume Information\_restore{5F3C7E24-AD0D-44B2-9A6E-8D3F3C18DC10}\RP52\A0055982.exe
[DETECTION] Is the Trojan horse TR/Bagle.Gen.B
[NOTE] The file was moved to '486ec40e.qua'!
D:\System Volume Information\_restore{5F3C7E24-AD0D-44B2-9A6E-8D3F3C18DC10}\RP52\A0055983.exe
[DETECTION] Is the Trojan horse TR/Dldr.Bagle.PV
[NOTE] The file was moved to '486ec40f.qua'!
D:\System Volume Information\_restore{5F3C7E24-AD0D-44B2-9A6E-8D3F3C18DC10}\RP52\A0055985.dll
[DETECTION] Is the Trojan horse TR/Crypt.XPACK.Gen
[NOTE] The file was moved to '49e746f8.qua'!
D:\System Volume Information\_restore{5F3C7E24-AD0D-44B2-9A6E-8D3F3C18DC10}\RP52\A0055986.dll
[DETECTION] Is the Trojan horse TR/Crypt.XPACK.Gen
[NOTE] The file was moved to '486ec411.qua'!
D:\System Volume Information\_restore{5F3C7E24-AD0D-44B2-9A6E-8D3F3C18DC10}\RP52\A0055992.exe
[DETECTION] Is the Trojan horse TR/Crypt.XPACK.Gen
[NOTE] The file was moved to '486ec410.qua'!
D:\System Volume Information\_restore{5F3C7E24-AD0D-44B2-9A6E-8D3F3C18DC10}\RP52\A0056074.exe
[DETECTION] Is the Trojan horse TR/Dldr.Bagle.QI
[NOTE] The file was moved to '486ec426.qua'!
D:\System Volume Information\_restore{5F3C7E24-AD0D-44B2-9A6E-8D3F3C18DC10}\RP52\A0056075.exe
[DETECTION] Is the Trojan horse TR/Dldr.Bagle.QI
[NOTE] The file was moved to '486ec427.qua'!
D:\System Volume Information\_restore{5F3C7E24-AD0D-44B2-9A6E-8D3F3C18DC10}\RP58\A0057195.com
[DETECTION] Is the Trojan horse TR/Crypt.XPACK.Gen
[NOTE] The file was moved to '486ec493.qua'!
D:\System Volume Information\_restore{5F3C7E24-AD0D-44B2-9A6E-8D3F3C18DC10}\RP58\A0057196.cmd
[DETECTION] Is the Trojan horse TR/Crypt.XPACK.Gen
[NOTE] The file was moved to '486ec494.qua'!
D:\WINDOWS\system32\drivers\sptd.sys
[WARNING] The file could not be opened!
End of the scan: jeudi 29 mai 2008 15:09
Used time: 2:31:03 min
The scan has been done completely.
9404 Scanning directories
375609 Files were scanned
298 viruses and/or unwanted programs were found
0 Files were classified as suspicious:
0 files were deleted
0 files were repaired
297 files were moved to quarantine
0 files were renamed
2 Files cannot be scanned
375311 Files not concerned
4075 Archives were scanned
3 Warnings
297 Notes
D:\System Volume Information\_restore{5F3C7E24-AD0D-44B2-9A6E-8D3F3C18DC10}\RP52\A0055836.exe
[DETECTION] Is the Trojan horse TR/Bagle.Gen.B
[NOTE] The file was moved to '486ec3fc.qua'!
D:\System Volume Information\_restore{5F3C7E24-AD0D-44B2-9A6E-8D3F3C18DC10}\RP52\A0055888.exe
[DETECTION] Contains detection pattern of the worm WORM/Bagle.Gen
[NOTE] The file was moved to '486ec3ff.qua'!
D:\System Volume Information\_restore{5F3C7E24-AD0D-44B2-9A6E-8D3F3C18DC10}\RP52\A0055889.exe
[DETECTION] Contains detection pattern of the worm WORM/Bagle.Gen
[NOTE] The file was moved to '49e746e8.qua'!
D:\System Volume Information\_restore{5F3C7E24-AD0D-44B2-9A6E-8D3F3C18DC10}\RP52\A0055890.exe
[DETECTION] Is the Trojan horse TR/Bagle.Gen.B
[NOTE] The file was moved to '486ec400.qua'!
D:\System Volume Information\_restore{5F3C7E24-AD0D-44B2-9A6E-8D3F3C18DC10}\RP52\A0055891.exe
[DETECTION] Contains detection pattern of the worm WORM/Bagle.Gen
[NOTE] The file was moved to '49e746e9.qua'!
D:\System Volume Information\_restore{5F3C7E24-AD0D-44B2-9A6E-8D3F3C18DC10}\RP52\A0055892.exe
[DETECTION] Is the Trojan horse TR/Bagle.Gen.B
[NOTE] The file was moved to '486ec401.qua'!
D:\System Volume Information\_restore{5F3C7E24-AD0D-44B2-9A6E-8D3F3C18DC10}\RP52\A0055895.exe
[DETECTION] Contains detection pattern of the worm WORM/Bagle.Gen
[NOTE] The file was moved to '49e746ea.qua'!
D:\System Volume Information\_restore{5F3C7E24-AD0D-44B2-9A6E-8D3F3C18DC10}\RP52\A0055897.exe
[DETECTION] Is the Trojan horse TR/Bagle.Gen.B
[NOTE] The file was moved to '486ec402.qua'!
D:\System Volume Information\_restore{5F3C7E24-AD0D-44B2-9A6E-8D3F3C18DC10}\RP52\A0055899.exe
[DETECTION] Contains detection pattern of the worm WORM/Bagle.Gen
[NOTE] The file was moved to '49e746eb.qua'!
D:\System Volume Information\_restore{5F3C7E24-AD0D-44B2-9A6E-8D3F3C18DC10}\RP52\A0055900.exe
[DETECTION] Is the Trojan horse TR/Bagle.Gen.B
[NOTE] The file was moved to '486ec403.qua'!
D:\System Volume Information\_restore{5F3C7E24-AD0D-44B2-9A6E-8D3F3C18DC10}\RP52\A0055901.exe
[DETECTION] Is the Trojan horse TR/Bagle.Gen.B
[NOTE] The file was moved to '49e746ec.qua'!
D:\System Volume Information\_restore{5F3C7E24-AD0D-44B2-9A6E-8D3F3C18DC10}\RP52\A0055902.exe
[DETECTION] Contains detection pattern of the worm WORM/Bagle.Gen
[NOTE] The file was moved to '486ec404.qua'!
D:\System Volume Information\_restore{5F3C7E24-AD0D-44B2-9A6E-8D3F3C18DC10}\RP52\A0055904.exe
[DETECTION] Is the Trojan horse TR/Bagle.Gen.B
[NOTE] The file was moved to '49e746ed.qua'!
D:\System Volume Information\_restore{5F3C7E24-AD0D-44B2-9A6E-8D3F3C18DC10}\RP52\A0055907.exe
[DETECTION] Contains detection pattern of the worm WORM/Bagle.Gen
[NOTE] The file was moved to '486ec406.qua'!
D:\System Volume Information\_restore{5F3C7E24-AD0D-44B2-9A6E-8D3F3C18DC10}\RP52\A0055910.exe
[DETECTION] Contains detection pattern of the worm WORM/Bagle.Gen
[NOTE] The file was moved to '486ec405.qua'!
D:\System Volume Information\_restore{5F3C7E24-AD0D-44B2-9A6E-8D3F3C18DC10}\RP52\A0055911.exe
[DETECTION] Is the Trojan horse TR/Bagle.Gen.B
[NOTE] The file was moved to '49e746ef.qua'!
D:\System Volume Information\_restore{5F3C7E24-AD0D-44B2-9A6E-8D3F3C18DC10}\RP52\A0055916.exe
[DETECTION] Is the Trojan horse TR/Bagle.Gen.B
[NOTE] The file was moved to '486ec418.qua'!
D:\System Volume Information\_restore{5F3C7E24-AD0D-44B2-9A6E-8D3F3C18DC10}\RP52\A0055919.exe
[DETECTION] Is the Trojan horse TR/Bagle.Gen.B
[NOTE] The file was moved to '486ec407.qua'!
D:\System Volume Information\_restore{5F3C7E24-AD0D-44B2-9A6E-8D3F3C18DC10}\RP52\A0055923.exe
[DETECTION] Is the Trojan horse TR/Bagle.Gen.B
[NOTE] The file was moved to '49e746e0.qua'!
D:\System Volume Information\_restore{5F3C7E24-AD0D-44B2-9A6E-8D3F3C18DC10}\RP52\A0055930.exe
[DETECTION] Is the Trojan horse TR/Bagle.Gen.B
[NOTE] The file was moved to '486ec408.qua'!
D:\System Volume Information\_restore{5F3C7E24-AD0D-44B2-9A6E-8D3F3C18DC10}\RP52\A0055931.exe
[DETECTION] Contains detection pattern of the worm WORM/Bagle.Gen
[NOTE] The file was moved to '486ec409.qua'!
D:\System Volume Information\_restore{5F3C7E24-AD0D-44B2-9A6E-8D3F3C18DC10}\RP52\A0055932.exe
[DETECTION] Contains detection pattern of the worm WORM/Bagle.Gen
[NOTE] The file was moved to '49e746e2.qua'!
D:\System Volume Information\_restore{5F3C7E24-AD0D-44B2-9A6E-8D3F3C18DC10}\RP52\A0055936.exe
[DETECTION] Contains detection pattern of the worm WORM/Bagle.Gen
[NOTE] The file was moved to '486ec40a.qua'!
D:\System Volume Information\_restore{5F3C7E24-AD0D-44B2-9A6E-8D3F3C18DC10}\RP52\A0055938.exe
[DETECTION] Contains detection pattern of the worm WORM/Bagle.Gen
[NOTE] The file was moved to '49e746e3.qua'!
D:\System Volume Information\_restore{5F3C7E24-AD0D-44B2-9A6E-8D3F3C18DC10}\RP52\A0055939.exe
[DETECTION] Is the Trojan horse TR/Bagle.Gen.B
[NOTE] The file was moved to '486ec40b.qua'!
D:\System Volume Information\_restore{5F3C7E24-AD0D-44B2-9A6E-8D3F3C18DC10}\RP52\A0055944.exe
[DETECTION] Is the Trojan horse TR/Bagle.Gen.B
[NOTE] The file was moved to '49e746e4.qua'!
D:\System Volume Information\_restore{5F3C7E24-AD0D-44B2-9A6E-8D3F3C18DC10}\RP52\A0055949.exe
[DETECTION] Is the Trojan horse TR/Bagle.Gen.B
[NOTE] The file was moved to '486ec40c.qua'!
D:\System Volume Information\_restore{5F3C7E24-AD0D-44B2-9A6E-8D3F3C18DC10}\RP52\A0055965.exe
[DETECTION] Is the Trojan horse TR/Bagle.Gen.B
[NOTE] The file was moved to '486ec40d.qua'!
D:\System Volume Information\_restore{5F3C7E24-AD0D-44B2-9A6E-8D3F3C18DC10}\RP52\A0055982.exe
[DETECTION] Is the Trojan horse TR/Bagle.Gen.B
[NOTE] The file was moved to '486ec40e.qua'!
D:\System Volume Information\_restore{5F3C7E24-AD0D-44B2-9A6E-8D3F3C18DC10}\RP52\A0055983.exe
[DETECTION] Is the Trojan horse TR/Dldr.Bagle.PV
[NOTE] The file was moved to '486ec40f.qua'!
D:\System Volume Information\_restore{5F3C7E24-AD0D-44B2-9A6E-8D3F3C18DC10}\RP52\A0055985.dll
[DETECTION] Is the Trojan horse TR/Crypt.XPACK.Gen
[NOTE] The file was moved to '49e746f8.qua'!
D:\System Volume Information\_restore{5F3C7E24-AD0D-44B2-9A6E-8D3F3C18DC10}\RP52\A0055986.dll
[DETECTION] Is the Trojan horse TR/Crypt.XPACK.Gen
[NOTE] The file was moved to '486ec411.qua'!
D:\System Volume Information\_restore{5F3C7E24-AD0D-44B2-9A6E-8D3F3C18DC10}\RP52\A0055992.exe
[DETECTION] Is the Trojan horse TR/Crypt.XPACK.Gen
[NOTE] The file was moved to '486ec410.qua'!
D:\System Volume Information\_restore{5F3C7E24-AD0D-44B2-9A6E-8D3F3C18DC10}\RP52\A0056074.exe
[DETECTION] Is the Trojan horse TR/Dldr.Bagle.QI
[NOTE] The file was moved to '486ec426.qua'!
D:\System Volume Information\_restore{5F3C7E24-AD0D-44B2-9A6E-8D3F3C18DC10}\RP52\A0056075.exe
[DETECTION] Is the Trojan horse TR/Dldr.Bagle.QI
[NOTE] The file was moved to '486ec427.qua'!
D:\System Volume Information\_restore{5F3C7E24-AD0D-44B2-9A6E-8D3F3C18DC10}\RP58\A0057195.com
[DETECTION] Is the Trojan horse TR/Crypt.XPACK.Gen
[NOTE] The file was moved to '486ec493.qua'!
D:\System Volume Information\_restore{5F3C7E24-AD0D-44B2-9A6E-8D3F3C18DC10}\RP58\A0057196.cmd
[DETECTION] Is the Trojan horse TR/Crypt.XPACK.Gen
[NOTE] The file was moved to '486ec494.qua'!
D:\WINDOWS\system32\drivers\sptd.sys
[WARNING] The file could not be opened!
End of the scan: jeudi 29 mai 2008 15:09
Used time: 2:31:03 min
The scan has been done completely.
9404 Scanning directories
375609 Files were scanned
298 viruses and/or unwanted programs were found
0 Files were classified as suspicious:
0 files were deleted
0 files were repaired
297 files were moved to quarantine
0 files were renamed
2 Files cannot be scanned
375311 Files not concerned
4075 Archives were scanned
3 Warnings
297 Notes
Salut,
Je viens de terminer un nouveau scan, le voilà son rapport:
Avira AntiVir Personal
Report file date: samedi 31 mai 2008 14:19
Scanning for 1302528 virus strains and unwanted programs.
Licensed to: Avira AntiVir PersonalEdition Classic
Serial number: 0000149996-ADJIE-0001
Platform: Windows XP
Windows version: (Service Pack 2) [5.1.2600]
Boot mode: Normally booted
Username: SYSTEM
Computer name: UNICORNI-299F79
Version information:
BUILD.DAT : 8.1.00.295 16479 Bytes 09/04/2008 16:24:00
AVSCAN.EXE : 8.1.2.12 311553 Bytes 18/03/2008 11:02:56
AVSCAN.DLL : 8.1.1.0 53505 Bytes 07/02/2008 10:43:37
LUKE.DLL : 8.1.2.9 151809 Bytes 28/02/2008 10:41:23
LUKERES.DLL : 8.1.2.1 12033 Bytes 21/02/2008 10:28:40
ANTIVIR0.VDF : 6.40.0.0 11030528 Bytes 18/07/2007 12:33:34
ANTIVIR1.VDF : 7.0.3.2 5447168 Bytes 07/03/2008 15:08:58
ANTIVIR2.VDF : 7.0.4.53 1848832 Bytes 17/05/2008 22:02:28
ANTIVIR3.VDF : 7.0.4.118 376832 Bytes 30/05/2008 22:02:42
Engineversion : 8.1.0.51
AEVDF.DLL : 8.1.0.5 102772 Bytes 25/02/2008 11:58:21
AESCRIPT.DLL : 8.1.0.37 270715 Bytes 30/05/2008 22:03:50
AESCN.DLL : 8.1.0.20 119157 Bytes 30/05/2008 22:03:46
AERDL.DLL : 8.1.0.20 418165 Bytes 30/05/2008 22:03:43
AEPACK.DLL : 8.1.1.5 364918 Bytes 30/05/2008 22:03:35
AEOFFICE.DLL : 8.1.0.18 192890 Bytes 30/05/2008 22:03:24
AEHEUR.DLL : 8.1.0.29 1253750 Bytes 30/05/2008 22:03:18
AEHELP.DLL : 8.1.0.15 115063 Bytes 30/05/2008 22:02:58
AEGEN.DLL : 8.1.0.25 307573 Bytes 30/05/2008 22:02:56
AEEMU.DLL : 8.1.0.6 430451 Bytes 30/05/2008 22:02:50
AECORE.DLL : 8.1.0.30 168311 Bytes 30/05/2008 22:02:45
AVWINLL.DLL : 1.0.0.7 14593 Bytes 23/01/2008 19:07:53
AVPREF.DLL : 8.0.0.1 25857 Bytes 18/02/2008 12:37:50
AVREP.DLL : 7.0.0.1 155688 Bytes 16/04/2007 15:26:47
AVREG.DLL : 8.0.0.0 30977 Bytes 23/01/2008 19:07:49
AVARKT.DLL : 1.0.0.23 307457 Bytes 12/02/2008 10:29:23
AVEVTLOG.DLL : 8.0.0.11 114945 Bytes 28/02/2008 10:31:31
SQLITE3.DLL : 3.3.17.1 339968 Bytes 22/01/2008 19:28:02
SMTPLIB.DLL : 1.2.0.19 28929 Bytes 23/01/2008 19:08:39
NETNT.DLL : 8.0.0.1 7937 Bytes 25/01/2008 14:05:10
RCIMAGE.DLL : 8.0.0.35 2371841 Bytes 10/03/2008 16:37:25
RCTEXT.DLL : 8.0.32.0 86273 Bytes 06/03/2008 14:02:11
Configuration settings for the scan:
Jobname..........................: Complete system scan
Configuration file...............: d:\program files\avira\antivir personaledition classic\sysscan.avp
Logging..........................: low
Primary action...................: interactive
Secondary action.................: ignore
Scan master boot sector..........: on
Scan boot sector.................: on
Boot sectors.....................: C:, D:,
Scan memory......................: on
Process scan.....................: on
Scan registry....................: on
Search for rootkits..............: off
Scan all files...................: Intelligent file selection
Scan archives....................: on
Recursion depth..................: 20
Smart extensions.................: on
Macro heuristic..................: on
File heuristic...................: medium
Start of the scan: samedi 31 mai 2008 14:19
The scan of running processes will be started
Scan process 'avscan.exe' - '1' Module(s) have been scanned
Scan process 'avcenter.exe' - '1' Module(s) have been scanned
Scan process 'alg.exe' - '1' Module(s) have been scanned
Scan process 'dslmon.exe' - '1' Module(s) have been scanned
Scan process 'sistray.exe' - '1' Module(s) have been scanned
Scan process 'ctfmon.exe' - '1' Module(s) have been scanned
Scan process 'avgnt.exe' - '1' Module(s) have been scanned
Scan process 'svchost.exe' - '1' Module(s) have been scanned
Scan process 'avguard.exe' - '1' Module(s) have been scanned
Scan process 'explorer.exe' - '1' Module(s) have been scanned
Scan process 'sched.exe' - '1' Module(s) have been scanned
Scan process 'svchost.exe' - '1' Module(s) have been scanned
Scan process 'svchost.exe' - '1' Module(s) have been scanned
Scan process 'svchost.exe' - '1' Module(s) have been scanned
Scan process 'svchost.exe' - '1' Module(s) have been scanned
Scan process 'svchost.exe' - '1' Module(s) have been scanned
Scan process 'lsass.exe' - '1' Module(s) have been scanned
Scan process 'services.exe' - '1' Module(s) have been scanned
Scan process 'winlogon.exe' - '1' Module(s) have been scanned
Scan process 'csrss.exe' - '1' Module(s) have been scanned
Scan process 'smss.exe' - '1' Module(s) have been scanned
21 processes with 21 modules were scanned
Starting master boot sector scan:
Master boot sector HD0
[INFO] No virus was found!
Start scanning boot sectors:
Boot sector 'C:\'
[INFO] No virus was found!
Boot sector 'D:\'
[INFO] No virus was found!
Starting to scan the registry.
The registry was scanned ( '16' files ).
Starting the file scan:
Begin scan in 'C:\' <System>
C:\System Volume Information\_restore{5F3C7E24-AD0D-44B2-9A6E-8D3F3C18DC10}\RP58\A0057194.sys
[DETECTION] Is the Trojan horse TR/Agent.11264.71
[NOTE] The file was deleted!
Begin scan in 'D:\' <Data center>
D:\pagefile.sys
[WARNING] The file could not be opened!
D:\WINDOWS\system32\drivers\sptd.sys
[WARNING] The file could not be opened!
End of the scan: samedi 31 mai 2008 16:34
Used time: 2:15:16 min
The scan has been done completely.
9347 Scanning directories
352448 Files were scanned
1 viruses and/or unwanted programs were found
0 Files were classified as suspicious:
1 files were deleted
0 files were repaired
0 files were moved to quarantine
0 files were renamed
2 Files cannot be scanned
352447 Files not concerned
3979 Archives were scanned
2 Warnings
1 Notes
Je viens de terminer un nouveau scan, le voilà son rapport:
Avira AntiVir Personal
Report file date: samedi 31 mai 2008 14:19
Scanning for 1302528 virus strains and unwanted programs.
Licensed to: Avira AntiVir PersonalEdition Classic
Serial number: 0000149996-ADJIE-0001
Platform: Windows XP
Windows version: (Service Pack 2) [5.1.2600]
Boot mode: Normally booted
Username: SYSTEM
Computer name: UNICORNI-299F79
Version information:
BUILD.DAT : 8.1.00.295 16479 Bytes 09/04/2008 16:24:00
AVSCAN.EXE : 8.1.2.12 311553 Bytes 18/03/2008 11:02:56
AVSCAN.DLL : 8.1.1.0 53505 Bytes 07/02/2008 10:43:37
LUKE.DLL : 8.1.2.9 151809 Bytes 28/02/2008 10:41:23
LUKERES.DLL : 8.1.2.1 12033 Bytes 21/02/2008 10:28:40
ANTIVIR0.VDF : 6.40.0.0 11030528 Bytes 18/07/2007 12:33:34
ANTIVIR1.VDF : 7.0.3.2 5447168 Bytes 07/03/2008 15:08:58
ANTIVIR2.VDF : 7.0.4.53 1848832 Bytes 17/05/2008 22:02:28
ANTIVIR3.VDF : 7.0.4.118 376832 Bytes 30/05/2008 22:02:42
Engineversion : 8.1.0.51
AEVDF.DLL : 8.1.0.5 102772 Bytes 25/02/2008 11:58:21
AESCRIPT.DLL : 8.1.0.37 270715 Bytes 30/05/2008 22:03:50
AESCN.DLL : 8.1.0.20 119157 Bytes 30/05/2008 22:03:46
AERDL.DLL : 8.1.0.20 418165 Bytes 30/05/2008 22:03:43
AEPACK.DLL : 8.1.1.5 364918 Bytes 30/05/2008 22:03:35
AEOFFICE.DLL : 8.1.0.18 192890 Bytes 30/05/2008 22:03:24
AEHEUR.DLL : 8.1.0.29 1253750 Bytes 30/05/2008 22:03:18
AEHELP.DLL : 8.1.0.15 115063 Bytes 30/05/2008 22:02:58
AEGEN.DLL : 8.1.0.25 307573 Bytes 30/05/2008 22:02:56
AEEMU.DLL : 8.1.0.6 430451 Bytes 30/05/2008 22:02:50
AECORE.DLL : 8.1.0.30 168311 Bytes 30/05/2008 22:02:45
AVWINLL.DLL : 1.0.0.7 14593 Bytes 23/01/2008 19:07:53
AVPREF.DLL : 8.0.0.1 25857 Bytes 18/02/2008 12:37:50
AVREP.DLL : 7.0.0.1 155688 Bytes 16/04/2007 15:26:47
AVREG.DLL : 8.0.0.0 30977 Bytes 23/01/2008 19:07:49
AVARKT.DLL : 1.0.0.23 307457 Bytes 12/02/2008 10:29:23
AVEVTLOG.DLL : 8.0.0.11 114945 Bytes 28/02/2008 10:31:31
SQLITE3.DLL : 3.3.17.1 339968 Bytes 22/01/2008 19:28:02
SMTPLIB.DLL : 1.2.0.19 28929 Bytes 23/01/2008 19:08:39
NETNT.DLL : 8.0.0.1 7937 Bytes 25/01/2008 14:05:10
RCIMAGE.DLL : 8.0.0.35 2371841 Bytes 10/03/2008 16:37:25
RCTEXT.DLL : 8.0.32.0 86273 Bytes 06/03/2008 14:02:11
Configuration settings for the scan:
Jobname..........................: Complete system scan
Configuration file...............: d:\program files\avira\antivir personaledition classic\sysscan.avp
Logging..........................: low
Primary action...................: interactive
Secondary action.................: ignore
Scan master boot sector..........: on
Scan boot sector.................: on
Boot sectors.....................: C:, D:,
Scan memory......................: on
Process scan.....................: on
Scan registry....................: on
Search for rootkits..............: off
Scan all files...................: Intelligent file selection
Scan archives....................: on
Recursion depth..................: 20
Smart extensions.................: on
Macro heuristic..................: on
File heuristic...................: medium
Start of the scan: samedi 31 mai 2008 14:19
The scan of running processes will be started
Scan process 'avscan.exe' - '1' Module(s) have been scanned
Scan process 'avcenter.exe' - '1' Module(s) have been scanned
Scan process 'alg.exe' - '1' Module(s) have been scanned
Scan process 'dslmon.exe' - '1' Module(s) have been scanned
Scan process 'sistray.exe' - '1' Module(s) have been scanned
Scan process 'ctfmon.exe' - '1' Module(s) have been scanned
Scan process 'avgnt.exe' - '1' Module(s) have been scanned
Scan process 'svchost.exe' - '1' Module(s) have been scanned
Scan process 'avguard.exe' - '1' Module(s) have been scanned
Scan process 'explorer.exe' - '1' Module(s) have been scanned
Scan process 'sched.exe' - '1' Module(s) have been scanned
Scan process 'svchost.exe' - '1' Module(s) have been scanned
Scan process 'svchost.exe' - '1' Module(s) have been scanned
Scan process 'svchost.exe' - '1' Module(s) have been scanned
Scan process 'svchost.exe' - '1' Module(s) have been scanned
Scan process 'svchost.exe' - '1' Module(s) have been scanned
Scan process 'lsass.exe' - '1' Module(s) have been scanned
Scan process 'services.exe' - '1' Module(s) have been scanned
Scan process 'winlogon.exe' - '1' Module(s) have been scanned
Scan process 'csrss.exe' - '1' Module(s) have been scanned
Scan process 'smss.exe' - '1' Module(s) have been scanned
21 processes with 21 modules were scanned
Starting master boot sector scan:
Master boot sector HD0
[INFO] No virus was found!
Start scanning boot sectors:
Boot sector 'C:\'
[INFO] No virus was found!
Boot sector 'D:\'
[INFO] No virus was found!
Starting to scan the registry.
The registry was scanned ( '16' files ).
Starting the file scan:
Begin scan in 'C:\' <System>
C:\System Volume Information\_restore{5F3C7E24-AD0D-44B2-9A6E-8D3F3C18DC10}\RP58\A0057194.sys
[DETECTION] Is the Trojan horse TR/Agent.11264.71
[NOTE] The file was deleted!
Begin scan in 'D:\' <Data center>
D:\pagefile.sys
[WARNING] The file could not be opened!
D:\WINDOWS\system32\drivers\sptd.sys
[WARNING] The file could not be opened!
End of the scan: samedi 31 mai 2008 16:34
Used time: 2:15:16 min
The scan has been done completely.
9347 Scanning directories
352448 Files were scanned
1 viruses and/or unwanted programs were found
0 Files were classified as suspicious:
1 files were deleted
0 files were repaired
0 files were moved to quarantine
0 files were renamed
2 Files cannot be scanned
352447 Files not concerned
3979 Archives were scanned
2 Warnings
1 Notes
Re,
OK.
* Télécharge Toolscleaner de A.Rothstein sur ton Bureau : http://a-rothstein.changelog.fr/TC/ToolsCleaner2.exe
* Double-clique sur ToolsCleaner2.exe>Recherche puis Suppression,
* Ton Bureau va peut-être disparaître. Ceci est normal.
* S'il ne réapparait pas, fais ceci : CTRL+ALT+SUP pour faire apparaître le gestionnaire de tâches.
Rends-toi à l'onglet Processus, clique en haut à gauche sur "Fichiers" et choisis "Exécuter". Tape "explorer" et valide. Cela te fera ré-apparaître ton Bureau.
/!\ Maintenant que ton PC n'est plus infecté, désactive la "Restauration du système" afin de créer un point de restauration sain.
Pour désactiver ou activer la Restauration du système, vous devez ouvrir une session Administrateur sous Windows XP.
Désactivation:
Clique droit sur le "Poste de travail" > Propriétés > onglet "Restauration du système" > coche la case "Désactiver la Restauration du système sur tous les lecteurs"
> Appliquer et Ok.
Activation:
Suivre le même chemin ; décoche la case "Désactiver la Restauration du système sur tous les lecteurs"
> Appliquer et Ok. Redémarre l'ordinateur.
Comment faire pour...: https://forum.pcastuces.com/desactiver_la_restauration_systeme-f31s7.htm
=========================================================================
Pour améliorer la sécurité de ton PC prend quelques instants pour lire:
Sécuriser son PC +WIFI (versions "hot" & "light") : https://forum.pcastuces.com/default.asp
Prévention et protection - Comment vous prémunir : https://forum.pcastuces.com/sujet.asp?f=25&s=36131
.Le P2P et ses conséquences - Journal d'une infection attendue
https://forum.zebulon.fr/topic/85544-pr%C3%A9vention-le-p2p-et-ses-cons%C3%A9quences/
Je te conseille en particulier de ne plus utiliser de cracks. Tu vois le résultat !
Comment se porte le pc sinon ?
FillPCA
OK.
* Télécharge Toolscleaner de A.Rothstein sur ton Bureau : http://a-rothstein.changelog.fr/TC/ToolsCleaner2.exe
* Double-clique sur ToolsCleaner2.exe>Recherche puis Suppression,
* Ton Bureau va peut-être disparaître. Ceci est normal.
* S'il ne réapparait pas, fais ceci : CTRL+ALT+SUP pour faire apparaître le gestionnaire de tâches.
Rends-toi à l'onglet Processus, clique en haut à gauche sur "Fichiers" et choisis "Exécuter". Tape "explorer" et valide. Cela te fera ré-apparaître ton Bureau.
/!\ Maintenant que ton PC n'est plus infecté, désactive la "Restauration du système" afin de créer un point de restauration sain.
Pour désactiver ou activer la Restauration du système, vous devez ouvrir une session Administrateur sous Windows XP.
Désactivation:
Clique droit sur le "Poste de travail" > Propriétés > onglet "Restauration du système" > coche la case "Désactiver la Restauration du système sur tous les lecteurs"
> Appliquer et Ok.
Activation:
Suivre le même chemin ; décoche la case "Désactiver la Restauration du système sur tous les lecteurs"
> Appliquer et Ok. Redémarre l'ordinateur.
Comment faire pour...: https://forum.pcastuces.com/desactiver_la_restauration_systeme-f31s7.htm
=========================================================================
Pour améliorer la sécurité de ton PC prend quelques instants pour lire:
Sécuriser son PC +WIFI (versions "hot" & "light") : https://forum.pcastuces.com/default.asp
Prévention et protection - Comment vous prémunir : https://forum.pcastuces.com/sujet.asp?f=25&s=36131
.Le P2P et ses conséquences - Journal d'une infection attendue
https://forum.zebulon.fr/topic/85544-pr%C3%A9vention-le-p2p-et-ses-cons%C3%A9quences/
Je te conseille en particulier de ne plus utiliser de cracks. Tu vois le résultat !
Comment se porte le pc sinon ?
FillPCA