Problème fenetre CiD - Page 2
Résolu
Précédent
- 1
- 2
Avira AntiVir Personal
Report file date: mercredi 4 juin 2008 23:30
Scanning for 1310153 virus strains and unwanted programs.
Licensed to: Avira AntiVir PersonalEdition Classic
Serial number: 0000149996-ADJIE-0001
Platform: Windows XP
Windows version: (Service Pack 2) [5.1.2600]
Boot mode: Save mode
Username: LE BLEIS
Computer name: ROMAIN_VAIO
Version information:
BUILD.DAT : 8.1.00.295 16479 Bytes 09/04/2008 16:24:00
AVSCAN.EXE : 8.1.2.12 311553 Bytes 18/03/2008 09:02:56
AVSCAN.DLL : 8.1.1.0 53505 Bytes 07/02/2008 08:43:37
LUKE.DLL : 8.1.2.9 151809 Bytes 28/02/2008 08:41:23
LUKERES.DLL : 8.1.2.1 12033 Bytes 21/02/2008 08:28:40
ANTIVIR0.VDF : 6.40.0.0 11030528 Bytes 18/07/2007 10:33:34
ANTIVIR1.VDF : 7.0.3.2 5447168 Bytes 07/03/2008 13:08:58
ANTIVIR2.VDF : 7.0.4.120 2206720 Bytes 01/06/2008 21:15:09
ANTIVIR3.VDF : 7.0.4.143 92672 Bytes 04/06/2008 21:15:11
Engineversion : 8.1.0.51
AEVDF.DLL : 8.1.0.5 102772 Bytes 25/02/2008 09:58:21
AESCRIPT.DLL : 8.1.0.37 270715 Bytes 04/06/2008 21:15:33
AESCN.DLL : 8.1.0.20 119157 Bytes 04/06/2008 21:15:32
AERDL.DLL : 8.1.0.20 418165 Bytes 04/06/2008 21:15:31
AEPACK.DLL : 8.1.1.5 364918 Bytes 04/06/2008 21:15:28
AEOFFICE.DLL : 8.1.0.18 192890 Bytes 04/06/2008 21:15:26
AEHEUR.DLL : 8.1.0.29 1253750 Bytes 04/06/2008 21:15:24
AEHELP.DLL : 8.1.0.15 115063 Bytes 04/06/2008 21:15:18
AEGEN.DLL : 8.1.0.25 307573 Bytes 04/06/2008 21:15:16
AEEMU.DLL : 8.1.0.6 430451 Bytes 04/06/2008 21:15:14
AECORE.DLL : 8.1.0.30 168311 Bytes 04/06/2008 21:15:12
AVWINLL.DLL : 1.0.0.7 14593 Bytes 23/01/2008 17:07:53
AVPREF.DLL : 8.0.0.1 25857 Bytes 18/02/2008 10:37:50
AVREP.DLL : 7.0.0.1 155688 Bytes 16/04/2007 13:26:47
AVREG.DLL : 8.0.0.0 30977 Bytes 23/01/2008 17:07:49
AVARKT.DLL : 1.0.0.23 307457 Bytes 12/02/2008 08:29:23
AVEVTLOG.DLL : 8.0.0.11 114945 Bytes 28/02/2008 08:31:31
SQLITE3.DLL : 3.3.17.1 339968 Bytes 22/01/2008 17:28:02
SMTPLIB.DLL : 1.2.0.19 28929 Bytes 23/01/2008 17:08:39
NETNT.DLL : 8.0.0.1 7937 Bytes 25/01/2008 12:05:10
RCIMAGE.DLL : 8.0.0.35 2371841 Bytes 10/03/2008 14:37:25
RCTEXT.DLL : 8.0.32.0 86273 Bytes 06/03/2008 12:02:11
Configuration settings for the scan:
Jobname..........................: Complete system scan
Configuration file...............: c:\program files\avira\antivir personaledition classic\sysscan.avp
Logging..........................: low
Primary action...................: interactive
Secondary action.................: ignore
Scan master boot sector..........: on
Scan boot sector.................: on
Boot sectors.....................: C:, D:,
Scan memory......................: on
Process scan.....................: on
Scan registry....................: on
Search for rootkits..............: on
Scan all files...................: All files
Scan archives....................: on
Recursion depth..................: 20
Smart extensions.................: on
Macro heuristic..................: on
File heuristic...................: medium
Start of the scan: mercredi 4 juin 2008 23:30
Starting search for hidden objects.
The driver could not be initialized.
The scan of running processes will be started
Scan process 'avscan.exe' - '1' Module(s) have been scanned
Scan process 'avcenter.exe' - '1' Module(s) have been scanned
Scan process 'explorer.exe' - '1' Module(s) have been scanned
Scan process 'svchost.exe' - '1' Module(s) have been scanned
Scan process 'svchost.exe' - '1' Module(s) have been scanned
Scan process 'svchost.exe' - '1' Module(s) have been scanned
Scan process 'lsass.exe' - '1' Module(s) have been scanned
Scan process 'services.exe' - '1' Module(s) have been scanned
Scan process 'winlogon.exe' - '1' Module(s) have been scanned
Scan process 'csrss.exe' - '1' Module(s) have been scanned
Scan process 'smss.exe' - '1' Module(s) have been scanned
11 processes with 11 modules were scanned
Starting master boot sector scan:
Master boot sector HD0
[INFO] No virus was found!
Start scanning boot sectors:
Boot sector 'C:\'
[INFO] No virus was found!
Boot sector 'D:\'
[INFO] No virus was found!
Starting to scan the registry.
The registry was scanned ( '44' files ).
Starting the file scan:
Begin scan in 'C:\' <VAIO>
C:\pagefile.sys
[WARNING] The file could not be opened!
C:\QUARANTINE\7d861161b1bcb0.bup
[DETECTION] Contains detection pattern of the exploits EXP/Office.Dropper.Gen
[NOTE] The file was moved to '487f9b42.qua'!
C:\QUARANTINE\7d861161b2f1770.bup
[DETECTION] Contains detection pattern of the exploits EXP/Office.Dropper.Gen
[NOTE] The file was moved to '487f9b4d.qua'!
C:\QUARANTINE\7d861161c121090.bup
[DETECTION] Contains detection pattern of the exploits EXP/Office.Dropper.Gen
[NOTE] The file was moved to '487f9b55.qua'!
C:\QUARANTINE\7d861161c212800.bup
[DETECTION] Contains detection pattern of the exploits EXP/Office.Dropper.Gen
[NOTE] The file was moved to '487f9b5d.qua'!
C:\QUARANTINE\7d861161c23a90.bup
[DETECTION] Contains detection pattern of the exploits EXP/Office.Dropper.Gen
[NOTE] The file was moved to '4909fb66.qua'!
C:\QUARANTINE\7d861161c3423b0.bup
[DETECTION] Contains detection pattern of the exploits EXP/Office.Dropper.Gen
[NOTE] The file was moved to '487f9b5e.qua'!
C:\QUARANTINE\7d861161d173640.bup
[DETECTION] Contains detection pattern of the exploits EXP/Office.Dropper.Gen
[NOTE] The file was moved to '4909fb67.qua'!
C:\QUARANTINE\7d861161d27a50.bup
[DETECTION] Contains detection pattern of the exploits EXP/Office.Dropper.Gen
[NOTE] The file was moved to '487f9b50.qua'!
C:\QUARANTINE\7d861161d362d70.bup
[DETECTION] Contains detection pattern of the exploits EXP/Office.Dropper.Gen
[NOTE] The file was moved to '487f9b5f.qua'!
C:\QUARANTINE\7d861161d73b20.bup
[DETECTION] Contains detection pattern of the exploits EXP/Office.Dropper.Gen
[NOTE] The file was moved to '4909fb58.qua'!
C:\QUARANTINE\7d861161e19d40.bup
[DETECTION] Contains detection pattern of the exploits EXP/Office.Dropper.Gen
[NOTE] The file was moved to '487f9b60.qua'!
C:\QUARANTINE\7d861161e281dd0.bup
[DETECTION] Contains detection pattern of the exploits EXP/Office.Dropper.Gen
[NOTE] The file was moved to '4909fb59.qua'!
C:\QUARANTINE\7d861161e372f70.bup
[DETECTION] Contains detection pattern of the exploits EXP/Office.Dropper.Gen
[NOTE] The file was moved to '487f9b61.qua'!
C:\QUARANTINE\7d861161e93d10.bup
[DETECTION] Contains detection pattern of the exploits EXP/Office.Dropper.Gen
[NOTE] The file was moved to '4909fb5a.qua'!
C:\QUARANTINE\7d861161f1a1120.bup
[DETECTION] Contains detection pattern of the exploits EXP/Office.Dropper.Gen
[NOTE] The file was moved to '487f9b63.qua'!
C:\QUARANTINE\7d861161f2926a0.bup
[DETECTION] Contains detection pattern of the exploits EXP/Office.Dropper.Gen
[NOTE] The file was moved to '487f9b62.qua'!
C:\QUARANTINE\7d861161f383d10.bup
[DETECTION] Contains detection pattern of the exploits EXP/Office.Dropper.Gen
[NOTE] The file was moved to '4909fb5b.qua'!
C:\QUARANTINE\7d861161fb180.bup
[DETECTION] Contains detection pattern of the exploits EXP/Office.Dropper.Gen
[NOTE] The file was moved to '4909fb5c.qua'!
C:\QUARANTINE\7d86116201c660.bup
[DETECTION] Contains detection pattern of the exploits EXP/Office.Dropper.Gen
[NOTE] The file was moved to '487f9b64.qua'!
C:\QUARANTINE\7d86116202b22c0.bup
[DETECTION] Contains detection pattern of the exploits EXP/Office.Dropper.Gen
[NOTE] The file was moved to '4909fb5d.qua'!
C:\QUARANTINE\7d86116203a3640.bup
[DETECTION] Contains detection pattern of the exploits EXP/Office.Dropper.Gen
[NOTE] The file was moved to '487f9b65.qua'!
C:\QUARANTINE\7d8611620c3540.bup
[DETECTION] Contains detection pattern of the exploits EXP/Office.Dropper.Gen
[NOTE] The file was moved to '4909fb5e.qua'!
C:\QUARANTINE\7d86116211d19f0.bup
[DETECTION] Contains detection pattern of the exploits EXP/Office.Dropper.Gen
[NOTE] The file was moved to '487f9b66.qua'!
C:\QUARANTINE\7d86116212c2b80.bup
[DETECTION] Contains detection pattern of the exploits EXP/Office.Dropper.Gen
[NOTE] The file was moved to '4909fb5f.qua'!
C:\QUARANTINE\7d86116213b3a30.bup
[DETECTION] Contains detection pattern of the exploits EXP/Office.Dropper.Gen
[NOTE] The file was moved to '487f9b58.qua'!
C:\QUARANTINE\7d8611621e760.bup
[DETECTION] Contains detection pattern of the exploits EXP/Office.Dropper.Gen
[NOTE] The file was moved to '487f9b67.qua'!
C:\QUARANTINE\7d86116221e1be0.bup
[DETECTION] Contains detection pattern of the exploits EXP/Office.Dropper.Gen
[NOTE] The file was moved to '4909fb50.qua'!
C:\QUARANTINE\7d86116222d2b80.bup
[DETECTION] Contains detection pattern of the exploits EXP/Office.Dropper.Gen
[NOTE] The file was moved to '487f9b68.qua'!
C:\QUARANTINE\7d8611622fc40.bup
[DETECTION] Contains detection pattern of the exploits EXP/Office.Dropper.Gen
[NOTE] The file was moved to '4909fb51.qua'!
C:\QUARANTINE\7d861162303d10.bup
[DETECTION] Contains detection pattern of the exploits EXP/Office.Dropper.Gen
[NOTE] The file was moved to '487f9b69.qua'!
C:\QUARANTINE\7d861162310d40.bup
[DETECTION] Contains detection pattern of the exploits EXP/Office.Dropper.Gen
[NOTE] The file was moved to '4909fb52.qua'!
C:\QUARANTINE\7d86116231f1dd0.bup
[DETECTION] Contains detection pattern of the exploits EXP/Office.Dropper.Gen
[NOTE] The file was moved to '487f9b6a.qua'!
C:\QUARANTINE\7d86116232f2990.bup
[DETECTION] Contains detection pattern of the exploits EXP/Office.Dropper.Gen
[NOTE] The file was moved to '4909fb53.qua'!
C:\QUARANTINE\7d8611624131320.bup
[DETECTION] Contains detection pattern of the exploits EXP/Office.Dropper.Gen
[NOTE] The file was moved to '487f9b6b.qua'!
C:\QUARANTINE\7d861162431410.bup
[DETECTION] Contains detection pattern of the exploits EXP/Office.Dropper.Gen
[NOTE] The file was moved to '4909fb54.qua'!
C:\QUARANTINE\7d86116251921c0.bup
[DETECTION] Contains detection pattern of the exploits EXP/Office.Dropper.Gen
[NOTE] The file was moved to '487f9b6c.qua'!
C:\QUARANTINE\7d86116252b22c0.bup
[DETECTION] Contains detection pattern of the exploits EXP/Office.Dropper.Gen
[NOTE] The file was moved to '4909fb55.qua'!
C:\QUARANTINE\7d861162561be0.bup
[DETECTION] Contains detection pattern of the exploits EXP/Office.Dropper.Gen
[NOTE] The file was moved to '487f9b6d.qua'!
C:\QUARANTINE\7d861162611ce0.bup
[DETECTION] Contains detection pattern of the exploits EXP/Office.Dropper.Gen
[NOTE] The file was moved to '487f9b6e.qua'!
C:\QUARANTINE\7d8611626132990.bup
[DETECTION] Contains detection pattern of the exploits EXP/Office.Dropper.Gen
[NOTE] The file was moved to '4909fb57.qua'!
C:\QUARANTINE\7d8611626241220.bup
[DETECTION] Contains detection pattern of the exploits EXP/Office.Dropper.Gen
[NOTE] The file was moved to '487f9b6f.qua'!
C:\QUARANTINE\7d8611627153450.bup
[DETECTION] Contains detection pattern of the exploits EXP/Office.Dropper.Gen
[NOTE] The file was moved to '4909fb48.qua'!
C:\QUARANTINE\7d8611627261600.bup
[DETECTION] Contains detection pattern of the exploits EXP/Office.Dropper.Gen
[NOTE] The file was moved to '487f9b70.qua'!
C:\QUARANTINE\7d8611627371410.bup
[DETECTION] Contains detection pattern of the exploits EXP/Office.Dropper.Gen
[NOTE] The file was moved to '4909fb49.qua'!
C:\QUARANTINE\7d86116281f2f70.bup
[DETECTION] Contains detection pattern of the exploits EXP/Office.Dropper.Gen
[NOTE] The file was moved to '487f9b71.qua'!
C:\QUARANTINE\7d861162820570.bup
[DETECTION] Contains detection pattern of the exploits EXP/Office.Dropper.Gen
[NOTE] The file was moved to '4909fb4a.qua'!
C:\QUARANTINE\7d8611628d1320.bup
[DETECTION] Contains detection pattern of the exploits EXP/Office.Dropper.Gen
[NOTE] The file was moved to '487f9b73.qua'!
C:\QUARANTINE\7d8611629c370.bup
[DETECTION] Contains detection pattern of the exploits EXP/Office.Dropper.Gen
[NOTE] The file was moved to '487f9b72.qua'!
C:\QUARANTINE\7d8611629c570.bup
[DETECTION] Contains detection pattern of the exploits EXP/Office.Dropper.Gen
[NOTE] The file was moved to '4909fb4b.qua'!
C:\QUARANTINE\7d861162b122030.bup
[DETECTION] Contains detection pattern of the exploits EXP/Office.Dropper.Gen
[NOTE] The file was moved to '4909fb4c.qua'!
C:\QUARANTINE\7d861162b122610.bup
[DETECTION] Contains detection pattern of the exploits EXP/Office.Dropper.Gen
[NOTE] The file was moved to '487f9b74.qua'!
C:\QUARANTINE\7d861162b22bb0.bup
[DETECTION] Contains detection pattern of the exploits EXP/Office.Dropper.Gen
[NOTE] The file was moved to '4909fb4d.qua'!
C:\QUARANTINE\7d861162b312320.bup
[DETECTION] Contains detection pattern of the exploits EXP/Office.Dropper.Gen
[NOTE] The file was moved to '487f9b75.qua'!
C:\QUARANTINE\7d861162c2a1f0.bup
[DETECTION] Contains detection pattern of the exploits EXP/Office.Dropper.Gen
[NOTE] The file was moved to '4909fb4e.qua'!
C:\QUARANTINE\7d861162c2a8c0.bup
[DETECTION] Contains detection pattern of the exploits EXP/Office.Dropper.Gen
[NOTE] The file was moved to '487f9b76.qua'!
C:\QUARANTINE\7d861162c392de0.bup
[DETECTION] Contains detection pattern of the exploits EXP/Office.Dropper.Gen
[NOTE] The file was moved to '4909fb4f.qua'!
C:\QUARANTINE\7d861162c52ee0.bup
[DETECTION] Contains detection pattern of the exploits EXP/Office.Dropper.Gen
[NOTE] The file was moved to '487f9b77.qua'!
C:\QUARANTINE\7d861162d1c1960.bup
[DETECTION] Contains detection pattern of the exploits EXP/Office.Dropper.Gen
[NOTE] The file was moved to '4909fb40.qua'!
C:\QUARANTINE\7d861162d2b2bf0.bup
[DETECTION] Contains detection pattern of the exploits EXP/Office.Dropper.Gen
[NOTE] The file was moved to '487f9b78.qua'!
C:\QUARANTINE\7d861162dd5d0.bup
[DETECTION] Contains detection pattern of the exploits EXP/Office.Dropper.Gen
[NOTE] The file was moved to '4909fb41.qua'!
C:\QUARANTINE\7d861162f2a1770.bup
[DETECTION] Contains detection pattern of the exploits EXP/Office.Dropper.Gen
[NOTE] The file was moved to '487f9b79.qua'!
C:\QUARANTINE\7d86116312e3b90.bup
[DETECTION] Contains detection pattern of the exploits EXP/Office.Dropper.Gen
[NOTE] The file was moved to '4909fb42.qua'!
C:\QUARANTINE\7d8611632122610.bup
[DETECTION] Contains detection pattern of the exploits EXP/Office.Dropper.Gen
[NOTE] The file was moved to '487f9b7a.qua'!
C:\QUARANTINE\7d861163222af0.bup
[DETECTION] Contains detection pattern of the exploits EXP/Office.Dropper.Gen
[NOTE] The file was moved to '487f9b7b.qua'!
C:\QUARANTINE\7d8611633122e0.bup
[DETECTION] Contains detection pattern of the exploits EXP/Office.Dropper.Gen
[NOTE] The file was moved to '4909fb44.qua'!
C:\QUARANTINE\7d8611633211570.bup
[DETECTION] Contains detection pattern of the exploits EXP/Office.Dropper.Gen
[NOTE] The file was moved to '487f9b7d.qua'!
C:\QUARANTINE\7d861163321d40.bup
[DETECTION] Contains detection pattern of the exploits EXP/Office.Dropper.Gen
[NOTE] The file was moved to '487f9b7c.qua'!
C:\QUARANTINE\7d861163322030.bup
[DETECTION] Contains detection pattern of the exploits EXP/Office.Dropper.Gen
[NOTE] The file was moved to '4909fb45.qua'!
C:\QUARANTINE\7d8611639192510.bup
[DETECTION] Contains detection pattern of the exploits EXP/Office.Dropper.Gen
[NOTE] The file was moved to '4909fb46.qua'!
C:\QUARANTINE\7d8611639283d80.bup
[DETECTION] Contains detection pattern of the exploits EXP/Office.Dropper.Gen
[NOTE] The file was moved to '487f9b7f.qua'!
C:\QUARANTINE\7d8611639381280.bup
[DETECTION] Contains detection pattern of the exploits EXP/Office.Dropper.Gen
[NOTE] The file was moved to '487f9b7e.qua'!
C:\QUARANTINE\7d861163a342af0.bup
[DETECTION] Contains detection pattern of the exploits EXP/Office.Dropper.Gen
[NOTE] The file was moved to '4909fb47.qua'!
C:\QUARANTINE\7d861163ab3d80.bup
[DETECTION] Contains detection pattern of the exploits EXP/Office.Dropper.Gen
[NOTE] The file was moved to '4909fb61.qua'!
C:\QUARANTINE\7d861163b1831c0.bup
[DETECTION] Contains detection pattern of the exploits EXP/Office.Dropper.Gen
[NOTE] The file was moved to '487f9b5a.qua'!
C:\QUARANTINE\7d861163b312320.bup
[DETECTION] Contains detection pattern of the exploits EXP/Office.Dropper.Gen
[NOTE] The file was moved to '4909fbb8.qua'!
C:\QUARANTINE\7d861163b92030.bup
[DETECTION] Contains detection pattern of the exploits EXP/Office.Dropper.Gen
[NOTE] The file was moved to '487f9b81.qua'!
C:\QUARANTINE\7d8611791a3980.bup
[DETECTION] Contains detection pattern of the exploits EXP/Office.Dropper.Gen
[NOTE] The file was moved to '487f9b82.qua'!
Begin scan in 'D:\' <VAIO>
End of the scan: jeudi 5 juin 2008 11:45
Used time: 12:15:14 min
The scan has been done completely.
7269 Scanning directories
381454 Files were scanned
77 viruses and/or unwanted programs were found
0 Files were classified as suspicious:
0 files were deleted
0 files were repaired
77 files were moved to quarantine
0 files were renamed
1 Files cannot be scanned
381377 Files not concerned
13562 Archives were scanned
1 Warnings
77 Notes
Report file date: mercredi 4 juin 2008 23:30
Scanning for 1310153 virus strains and unwanted programs.
Licensed to: Avira AntiVir PersonalEdition Classic
Serial number: 0000149996-ADJIE-0001
Platform: Windows XP
Windows version: (Service Pack 2) [5.1.2600]
Boot mode: Save mode
Username: LE BLEIS
Computer name: ROMAIN_VAIO
Version information:
BUILD.DAT : 8.1.00.295 16479 Bytes 09/04/2008 16:24:00
AVSCAN.EXE : 8.1.2.12 311553 Bytes 18/03/2008 09:02:56
AVSCAN.DLL : 8.1.1.0 53505 Bytes 07/02/2008 08:43:37
LUKE.DLL : 8.1.2.9 151809 Bytes 28/02/2008 08:41:23
LUKERES.DLL : 8.1.2.1 12033 Bytes 21/02/2008 08:28:40
ANTIVIR0.VDF : 6.40.0.0 11030528 Bytes 18/07/2007 10:33:34
ANTIVIR1.VDF : 7.0.3.2 5447168 Bytes 07/03/2008 13:08:58
ANTIVIR2.VDF : 7.0.4.120 2206720 Bytes 01/06/2008 21:15:09
ANTIVIR3.VDF : 7.0.4.143 92672 Bytes 04/06/2008 21:15:11
Engineversion : 8.1.0.51
AEVDF.DLL : 8.1.0.5 102772 Bytes 25/02/2008 09:58:21
AESCRIPT.DLL : 8.1.0.37 270715 Bytes 04/06/2008 21:15:33
AESCN.DLL : 8.1.0.20 119157 Bytes 04/06/2008 21:15:32
AERDL.DLL : 8.1.0.20 418165 Bytes 04/06/2008 21:15:31
AEPACK.DLL : 8.1.1.5 364918 Bytes 04/06/2008 21:15:28
AEOFFICE.DLL : 8.1.0.18 192890 Bytes 04/06/2008 21:15:26
AEHEUR.DLL : 8.1.0.29 1253750 Bytes 04/06/2008 21:15:24
AEHELP.DLL : 8.1.0.15 115063 Bytes 04/06/2008 21:15:18
AEGEN.DLL : 8.1.0.25 307573 Bytes 04/06/2008 21:15:16
AEEMU.DLL : 8.1.0.6 430451 Bytes 04/06/2008 21:15:14
AECORE.DLL : 8.1.0.30 168311 Bytes 04/06/2008 21:15:12
AVWINLL.DLL : 1.0.0.7 14593 Bytes 23/01/2008 17:07:53
AVPREF.DLL : 8.0.0.1 25857 Bytes 18/02/2008 10:37:50
AVREP.DLL : 7.0.0.1 155688 Bytes 16/04/2007 13:26:47
AVREG.DLL : 8.0.0.0 30977 Bytes 23/01/2008 17:07:49
AVARKT.DLL : 1.0.0.23 307457 Bytes 12/02/2008 08:29:23
AVEVTLOG.DLL : 8.0.0.11 114945 Bytes 28/02/2008 08:31:31
SQLITE3.DLL : 3.3.17.1 339968 Bytes 22/01/2008 17:28:02
SMTPLIB.DLL : 1.2.0.19 28929 Bytes 23/01/2008 17:08:39
NETNT.DLL : 8.0.0.1 7937 Bytes 25/01/2008 12:05:10
RCIMAGE.DLL : 8.0.0.35 2371841 Bytes 10/03/2008 14:37:25
RCTEXT.DLL : 8.0.32.0 86273 Bytes 06/03/2008 12:02:11
Configuration settings for the scan:
Jobname..........................: Complete system scan
Configuration file...............: c:\program files\avira\antivir personaledition classic\sysscan.avp
Logging..........................: low
Primary action...................: interactive
Secondary action.................: ignore
Scan master boot sector..........: on
Scan boot sector.................: on
Boot sectors.....................: C:, D:,
Scan memory......................: on
Process scan.....................: on
Scan registry....................: on
Search for rootkits..............: on
Scan all files...................: All files
Scan archives....................: on
Recursion depth..................: 20
Smart extensions.................: on
Macro heuristic..................: on
File heuristic...................: medium
Start of the scan: mercredi 4 juin 2008 23:30
Starting search for hidden objects.
The driver could not be initialized.
The scan of running processes will be started
Scan process 'avscan.exe' - '1' Module(s) have been scanned
Scan process 'avcenter.exe' - '1' Module(s) have been scanned
Scan process 'explorer.exe' - '1' Module(s) have been scanned
Scan process 'svchost.exe' - '1' Module(s) have been scanned
Scan process 'svchost.exe' - '1' Module(s) have been scanned
Scan process 'svchost.exe' - '1' Module(s) have been scanned
Scan process 'lsass.exe' - '1' Module(s) have been scanned
Scan process 'services.exe' - '1' Module(s) have been scanned
Scan process 'winlogon.exe' - '1' Module(s) have been scanned
Scan process 'csrss.exe' - '1' Module(s) have been scanned
Scan process 'smss.exe' - '1' Module(s) have been scanned
11 processes with 11 modules were scanned
Starting master boot sector scan:
Master boot sector HD0
[INFO] No virus was found!
Start scanning boot sectors:
Boot sector 'C:\'
[INFO] No virus was found!
Boot sector 'D:\'
[INFO] No virus was found!
Starting to scan the registry.
The registry was scanned ( '44' files ).
Starting the file scan:
Begin scan in 'C:\' <VAIO>
C:\pagefile.sys
[WARNING] The file could not be opened!
C:\QUARANTINE\7d861161b1bcb0.bup
[DETECTION] Contains detection pattern of the exploits EXP/Office.Dropper.Gen
[NOTE] The file was moved to '487f9b42.qua'!
C:\QUARANTINE\7d861161b2f1770.bup
[DETECTION] Contains detection pattern of the exploits EXP/Office.Dropper.Gen
[NOTE] The file was moved to '487f9b4d.qua'!
C:\QUARANTINE\7d861161c121090.bup
[DETECTION] Contains detection pattern of the exploits EXP/Office.Dropper.Gen
[NOTE] The file was moved to '487f9b55.qua'!
C:\QUARANTINE\7d861161c212800.bup
[DETECTION] Contains detection pattern of the exploits EXP/Office.Dropper.Gen
[NOTE] The file was moved to '487f9b5d.qua'!
C:\QUARANTINE\7d861161c23a90.bup
[DETECTION] Contains detection pattern of the exploits EXP/Office.Dropper.Gen
[NOTE] The file was moved to '4909fb66.qua'!
C:\QUARANTINE\7d861161c3423b0.bup
[DETECTION] Contains detection pattern of the exploits EXP/Office.Dropper.Gen
[NOTE] The file was moved to '487f9b5e.qua'!
C:\QUARANTINE\7d861161d173640.bup
[DETECTION] Contains detection pattern of the exploits EXP/Office.Dropper.Gen
[NOTE] The file was moved to '4909fb67.qua'!
C:\QUARANTINE\7d861161d27a50.bup
[DETECTION] Contains detection pattern of the exploits EXP/Office.Dropper.Gen
[NOTE] The file was moved to '487f9b50.qua'!
C:\QUARANTINE\7d861161d362d70.bup
[DETECTION] Contains detection pattern of the exploits EXP/Office.Dropper.Gen
[NOTE] The file was moved to '487f9b5f.qua'!
C:\QUARANTINE\7d861161d73b20.bup
[DETECTION] Contains detection pattern of the exploits EXP/Office.Dropper.Gen
[NOTE] The file was moved to '4909fb58.qua'!
C:\QUARANTINE\7d861161e19d40.bup
[DETECTION] Contains detection pattern of the exploits EXP/Office.Dropper.Gen
[NOTE] The file was moved to '487f9b60.qua'!
C:\QUARANTINE\7d861161e281dd0.bup
[DETECTION] Contains detection pattern of the exploits EXP/Office.Dropper.Gen
[NOTE] The file was moved to '4909fb59.qua'!
C:\QUARANTINE\7d861161e372f70.bup
[DETECTION] Contains detection pattern of the exploits EXP/Office.Dropper.Gen
[NOTE] The file was moved to '487f9b61.qua'!
C:\QUARANTINE\7d861161e93d10.bup
[DETECTION] Contains detection pattern of the exploits EXP/Office.Dropper.Gen
[NOTE] The file was moved to '4909fb5a.qua'!
C:\QUARANTINE\7d861161f1a1120.bup
[DETECTION] Contains detection pattern of the exploits EXP/Office.Dropper.Gen
[NOTE] The file was moved to '487f9b63.qua'!
C:\QUARANTINE\7d861161f2926a0.bup
[DETECTION] Contains detection pattern of the exploits EXP/Office.Dropper.Gen
[NOTE] The file was moved to '487f9b62.qua'!
C:\QUARANTINE\7d861161f383d10.bup
[DETECTION] Contains detection pattern of the exploits EXP/Office.Dropper.Gen
[NOTE] The file was moved to '4909fb5b.qua'!
C:\QUARANTINE\7d861161fb180.bup
[DETECTION] Contains detection pattern of the exploits EXP/Office.Dropper.Gen
[NOTE] The file was moved to '4909fb5c.qua'!
C:\QUARANTINE\7d86116201c660.bup
[DETECTION] Contains detection pattern of the exploits EXP/Office.Dropper.Gen
[NOTE] The file was moved to '487f9b64.qua'!
C:\QUARANTINE\7d86116202b22c0.bup
[DETECTION] Contains detection pattern of the exploits EXP/Office.Dropper.Gen
[NOTE] The file was moved to '4909fb5d.qua'!
C:\QUARANTINE\7d86116203a3640.bup
[DETECTION] Contains detection pattern of the exploits EXP/Office.Dropper.Gen
[NOTE] The file was moved to '487f9b65.qua'!
C:\QUARANTINE\7d8611620c3540.bup
[DETECTION] Contains detection pattern of the exploits EXP/Office.Dropper.Gen
[NOTE] The file was moved to '4909fb5e.qua'!
C:\QUARANTINE\7d86116211d19f0.bup
[DETECTION] Contains detection pattern of the exploits EXP/Office.Dropper.Gen
[NOTE] The file was moved to '487f9b66.qua'!
C:\QUARANTINE\7d86116212c2b80.bup
[DETECTION] Contains detection pattern of the exploits EXP/Office.Dropper.Gen
[NOTE] The file was moved to '4909fb5f.qua'!
C:\QUARANTINE\7d86116213b3a30.bup
[DETECTION] Contains detection pattern of the exploits EXP/Office.Dropper.Gen
[NOTE] The file was moved to '487f9b58.qua'!
C:\QUARANTINE\7d8611621e760.bup
[DETECTION] Contains detection pattern of the exploits EXP/Office.Dropper.Gen
[NOTE] The file was moved to '487f9b67.qua'!
C:\QUARANTINE\7d86116221e1be0.bup
[DETECTION] Contains detection pattern of the exploits EXP/Office.Dropper.Gen
[NOTE] The file was moved to '4909fb50.qua'!
C:\QUARANTINE\7d86116222d2b80.bup
[DETECTION] Contains detection pattern of the exploits EXP/Office.Dropper.Gen
[NOTE] The file was moved to '487f9b68.qua'!
C:\QUARANTINE\7d8611622fc40.bup
[DETECTION] Contains detection pattern of the exploits EXP/Office.Dropper.Gen
[NOTE] The file was moved to '4909fb51.qua'!
C:\QUARANTINE\7d861162303d10.bup
[DETECTION] Contains detection pattern of the exploits EXP/Office.Dropper.Gen
[NOTE] The file was moved to '487f9b69.qua'!
C:\QUARANTINE\7d861162310d40.bup
[DETECTION] Contains detection pattern of the exploits EXP/Office.Dropper.Gen
[NOTE] The file was moved to '4909fb52.qua'!
C:\QUARANTINE\7d86116231f1dd0.bup
[DETECTION] Contains detection pattern of the exploits EXP/Office.Dropper.Gen
[NOTE] The file was moved to '487f9b6a.qua'!
C:\QUARANTINE\7d86116232f2990.bup
[DETECTION] Contains detection pattern of the exploits EXP/Office.Dropper.Gen
[NOTE] The file was moved to '4909fb53.qua'!
C:\QUARANTINE\7d8611624131320.bup
[DETECTION] Contains detection pattern of the exploits EXP/Office.Dropper.Gen
[NOTE] The file was moved to '487f9b6b.qua'!
C:\QUARANTINE\7d861162431410.bup
[DETECTION] Contains detection pattern of the exploits EXP/Office.Dropper.Gen
[NOTE] The file was moved to '4909fb54.qua'!
C:\QUARANTINE\7d86116251921c0.bup
[DETECTION] Contains detection pattern of the exploits EXP/Office.Dropper.Gen
[NOTE] The file was moved to '487f9b6c.qua'!
C:\QUARANTINE\7d86116252b22c0.bup
[DETECTION] Contains detection pattern of the exploits EXP/Office.Dropper.Gen
[NOTE] The file was moved to '4909fb55.qua'!
C:\QUARANTINE\7d861162561be0.bup
[DETECTION] Contains detection pattern of the exploits EXP/Office.Dropper.Gen
[NOTE] The file was moved to '487f9b6d.qua'!
C:\QUARANTINE\7d861162611ce0.bup
[DETECTION] Contains detection pattern of the exploits EXP/Office.Dropper.Gen
[NOTE] The file was moved to '487f9b6e.qua'!
C:\QUARANTINE\7d8611626132990.bup
[DETECTION] Contains detection pattern of the exploits EXP/Office.Dropper.Gen
[NOTE] The file was moved to '4909fb57.qua'!
C:\QUARANTINE\7d8611626241220.bup
[DETECTION] Contains detection pattern of the exploits EXP/Office.Dropper.Gen
[NOTE] The file was moved to '487f9b6f.qua'!
C:\QUARANTINE\7d8611627153450.bup
[DETECTION] Contains detection pattern of the exploits EXP/Office.Dropper.Gen
[NOTE] The file was moved to '4909fb48.qua'!
C:\QUARANTINE\7d8611627261600.bup
[DETECTION] Contains detection pattern of the exploits EXP/Office.Dropper.Gen
[NOTE] The file was moved to '487f9b70.qua'!
C:\QUARANTINE\7d8611627371410.bup
[DETECTION] Contains detection pattern of the exploits EXP/Office.Dropper.Gen
[NOTE] The file was moved to '4909fb49.qua'!
C:\QUARANTINE\7d86116281f2f70.bup
[DETECTION] Contains detection pattern of the exploits EXP/Office.Dropper.Gen
[NOTE] The file was moved to '487f9b71.qua'!
C:\QUARANTINE\7d861162820570.bup
[DETECTION] Contains detection pattern of the exploits EXP/Office.Dropper.Gen
[NOTE] The file was moved to '4909fb4a.qua'!
C:\QUARANTINE\7d8611628d1320.bup
[DETECTION] Contains detection pattern of the exploits EXP/Office.Dropper.Gen
[NOTE] The file was moved to '487f9b73.qua'!
C:\QUARANTINE\7d8611629c370.bup
[DETECTION] Contains detection pattern of the exploits EXP/Office.Dropper.Gen
[NOTE] The file was moved to '487f9b72.qua'!
C:\QUARANTINE\7d8611629c570.bup
[DETECTION] Contains detection pattern of the exploits EXP/Office.Dropper.Gen
[NOTE] The file was moved to '4909fb4b.qua'!
C:\QUARANTINE\7d861162b122030.bup
[DETECTION] Contains detection pattern of the exploits EXP/Office.Dropper.Gen
[NOTE] The file was moved to '4909fb4c.qua'!
C:\QUARANTINE\7d861162b122610.bup
[DETECTION] Contains detection pattern of the exploits EXP/Office.Dropper.Gen
[NOTE] The file was moved to '487f9b74.qua'!
C:\QUARANTINE\7d861162b22bb0.bup
[DETECTION] Contains detection pattern of the exploits EXP/Office.Dropper.Gen
[NOTE] The file was moved to '4909fb4d.qua'!
C:\QUARANTINE\7d861162b312320.bup
[DETECTION] Contains detection pattern of the exploits EXP/Office.Dropper.Gen
[NOTE] The file was moved to '487f9b75.qua'!
C:\QUARANTINE\7d861162c2a1f0.bup
[DETECTION] Contains detection pattern of the exploits EXP/Office.Dropper.Gen
[NOTE] The file was moved to '4909fb4e.qua'!
C:\QUARANTINE\7d861162c2a8c0.bup
[DETECTION] Contains detection pattern of the exploits EXP/Office.Dropper.Gen
[NOTE] The file was moved to '487f9b76.qua'!
C:\QUARANTINE\7d861162c392de0.bup
[DETECTION] Contains detection pattern of the exploits EXP/Office.Dropper.Gen
[NOTE] The file was moved to '4909fb4f.qua'!
C:\QUARANTINE\7d861162c52ee0.bup
[DETECTION] Contains detection pattern of the exploits EXP/Office.Dropper.Gen
[NOTE] The file was moved to '487f9b77.qua'!
C:\QUARANTINE\7d861162d1c1960.bup
[DETECTION] Contains detection pattern of the exploits EXP/Office.Dropper.Gen
[NOTE] The file was moved to '4909fb40.qua'!
C:\QUARANTINE\7d861162d2b2bf0.bup
[DETECTION] Contains detection pattern of the exploits EXP/Office.Dropper.Gen
[NOTE] The file was moved to '487f9b78.qua'!
C:\QUARANTINE\7d861162dd5d0.bup
[DETECTION] Contains detection pattern of the exploits EXP/Office.Dropper.Gen
[NOTE] The file was moved to '4909fb41.qua'!
C:\QUARANTINE\7d861162f2a1770.bup
[DETECTION] Contains detection pattern of the exploits EXP/Office.Dropper.Gen
[NOTE] The file was moved to '487f9b79.qua'!
C:\QUARANTINE\7d86116312e3b90.bup
[DETECTION] Contains detection pattern of the exploits EXP/Office.Dropper.Gen
[NOTE] The file was moved to '4909fb42.qua'!
C:\QUARANTINE\7d8611632122610.bup
[DETECTION] Contains detection pattern of the exploits EXP/Office.Dropper.Gen
[NOTE] The file was moved to '487f9b7a.qua'!
C:\QUARANTINE\7d861163222af0.bup
[DETECTION] Contains detection pattern of the exploits EXP/Office.Dropper.Gen
[NOTE] The file was moved to '487f9b7b.qua'!
C:\QUARANTINE\7d8611633122e0.bup
[DETECTION] Contains detection pattern of the exploits EXP/Office.Dropper.Gen
[NOTE] The file was moved to '4909fb44.qua'!
C:\QUARANTINE\7d8611633211570.bup
[DETECTION] Contains detection pattern of the exploits EXP/Office.Dropper.Gen
[NOTE] The file was moved to '487f9b7d.qua'!
C:\QUARANTINE\7d861163321d40.bup
[DETECTION] Contains detection pattern of the exploits EXP/Office.Dropper.Gen
[NOTE] The file was moved to '487f9b7c.qua'!
C:\QUARANTINE\7d861163322030.bup
[DETECTION] Contains detection pattern of the exploits EXP/Office.Dropper.Gen
[NOTE] The file was moved to '4909fb45.qua'!
C:\QUARANTINE\7d8611639192510.bup
[DETECTION] Contains detection pattern of the exploits EXP/Office.Dropper.Gen
[NOTE] The file was moved to '4909fb46.qua'!
C:\QUARANTINE\7d8611639283d80.bup
[DETECTION] Contains detection pattern of the exploits EXP/Office.Dropper.Gen
[NOTE] The file was moved to '487f9b7f.qua'!
C:\QUARANTINE\7d8611639381280.bup
[DETECTION] Contains detection pattern of the exploits EXP/Office.Dropper.Gen
[NOTE] The file was moved to '487f9b7e.qua'!
C:\QUARANTINE\7d861163a342af0.bup
[DETECTION] Contains detection pattern of the exploits EXP/Office.Dropper.Gen
[NOTE] The file was moved to '4909fb47.qua'!
C:\QUARANTINE\7d861163ab3d80.bup
[DETECTION] Contains detection pattern of the exploits EXP/Office.Dropper.Gen
[NOTE] The file was moved to '4909fb61.qua'!
C:\QUARANTINE\7d861163b1831c0.bup
[DETECTION] Contains detection pattern of the exploits EXP/Office.Dropper.Gen
[NOTE] The file was moved to '487f9b5a.qua'!
C:\QUARANTINE\7d861163b312320.bup
[DETECTION] Contains detection pattern of the exploits EXP/Office.Dropper.Gen
[NOTE] The file was moved to '4909fbb8.qua'!
C:\QUARANTINE\7d861163b92030.bup
[DETECTION] Contains detection pattern of the exploits EXP/Office.Dropper.Gen
[NOTE] The file was moved to '487f9b81.qua'!
C:\QUARANTINE\7d8611791a3980.bup
[DETECTION] Contains detection pattern of the exploits EXP/Office.Dropper.Gen
[NOTE] The file was moved to '487f9b82.qua'!
Begin scan in 'D:\' <VAIO>
End of the scan: jeudi 5 juin 2008 11:45
Used time: 12:15:14 min
The scan has been done completely.
7269 Scanning directories
381454 Files were scanned
77 viruses and/or unwanted programs were found
0 Files were classified as suspicious:
0 files were deleted
0 files were repaired
77 files were moved to quarantine
0 files were renamed
1 Files cannot be scanned
381377 Files not concerned
13562 Archives were scanned
1 Warnings
77 Notes
Vous n’avez pas trouvé la réponse que vous recherchez ?
Posez votre question
Niquel. ;)
* Je t'invite à lire ceci :
*https://www.malekal.com/proteger-pc-virus-pirates/
*http://forum.telecharger.01net.com/microhebdo/6/tuto-securite/mesures_preventives_avant_navigation_sinternet_et_entretien-346836/messages-1.html
*Utilise Windows Update
*Télécharge https://filehippo.com/windows/tuning-utilities/ tu l'installes et il te liste ce qu'il faut mettre à jour avec les liens correspondants.
*Télécharge ToolsCleaner (A.Rothstein) sur ton Bureau:
http://a-rothstein.changelog.fr/TC/ToolsCleaner2.exe
*Clique sur Recherche et laisse le scan se terminer.
*Clique sur Suppression pour finaliser.
*Tu peux, si tu le souhaites, te servir des Options facultatives.
*Clique sur Quitter, pour que le rapport puisse se créer.
*Poste le rapport C:\TCleaner.txt
-------------------------------------------------------------------------------------------------------------------
1.Ouvre le Menu Démarrer
2.Clique-droit sur Poste de travail
3.Clique sur Propriétés
4.Positionne-toi dans l'onglet Restauration du système
5.Coche Désactiver la restauration système
6.Valide par Ok
7.Redémarre
8.Reproduis les manipulations 1 à 3
9.Décoche Désactiver la restauration système
10.Valide par Ok
-------------------------------------------------------------------------------------------------------------------
*Télécharge Ccleaner :
https://www.ccleaner.com/ccleaner/download
Clique sur le premier Download now > Choisis la version Slim
Installe Ccleaner.
Nettoie Windows et la base de registre en suivant ce tuto :
https://www.malekal.com/tutoriel-ccleaner/#mozTocId223895
-------------------------------------------------------------------------------------------------------------------
* Je t'invite à lire ceci :
*https://www.malekal.com/proteger-pc-virus-pirates/
*http://forum.telecharger.01net.com/microhebdo/6/tuto-securite/mesures_preventives_avant_navigation_sinternet_et_entretien-346836/messages-1.html
*Utilise Windows Update
*Télécharge https://filehippo.com/windows/tuning-utilities/ tu l'installes et il te liste ce qu'il faut mettre à jour avec les liens correspondants.
*Télécharge ToolsCleaner (A.Rothstein) sur ton Bureau:
http://a-rothstein.changelog.fr/TC/ToolsCleaner2.exe
*Clique sur Recherche et laisse le scan se terminer.
*Clique sur Suppression pour finaliser.
*Tu peux, si tu le souhaites, te servir des Options facultatives.
*Clique sur Quitter, pour que le rapport puisse se créer.
*Poste le rapport C:\TCleaner.txt
-------------------------------------------------------------------------------------------------------------------
1.Ouvre le Menu Démarrer
2.Clique-droit sur Poste de travail
3.Clique sur Propriétés
4.Positionne-toi dans l'onglet Restauration du système
5.Coche Désactiver la restauration système
6.Valide par Ok
7.Redémarre
8.Reproduis les manipulations 1 à 3
9.Décoche Désactiver la restauration système
10.Valide par Ok
-------------------------------------------------------------------------------------------------------------------
*Télécharge Ccleaner :
https://www.ccleaner.com/ccleaner/download
Clique sur le premier Download now > Choisis la version Slim
Installe Ccleaner.
Nettoie Windows et la base de registre en suivant ce tuto :
https://www.malekal.com/tutoriel-ccleaner/#mozTocId223895
-------------------------------------------------------------------------------------------------------------------
-->- Recherche:
C:\Documents and Settings\LE BLEIS\Bureau\HijackThis.exe: trouvé !
C:\Documents and Settings\LE BLEIS\Bureau\MsnFix: trouvé !
C:\Documents and Settings\LE BLEIS\Bureau\GenProc: trouvé !
C:\UBCD4Win\BartPE\I386\SYSTEM32\tar.exe: trouvé !
C:\UBCD4Win\BartPE\I386\SYSTEM32\gzip.exe: trouvé !
C:\UBCD4Win\BartPE\PROGRAMS\HijackThis: trouvé !
C:\UBCD4Win\BartPE\PROGRAMS\HijackThis\HijackThis.exe: trouvé !
C:\UBCD4Win\plugin\AntiSpyware\HijackThis: trouvé !
C:\UBCD4Win\plugin\AntiSpyware\hijackthis\HijackThis.exe: trouvé !
---------------------------------
-->- Suppression:
C:\Documents and Settings\LE BLEIS\Bureau\HijackThis.exe: supprimé !
C:\UBCD4Win\BartPE\I386\SYSTEM32\tar.exe: supprimé !
C:\UBCD4Win\BartPE\I386\SYSTEM32\gzip.exe: supprimé !
C:\UBCD4Win\BartPE\PROGRAMS\HijackThis\HijackThis.exe: supprimé !
C:\UBCD4Win\plugin\AntiSpyware\hijackthis\HijackThis.exe: supprimé !
C:\Documents and Settings\LE BLEIS\Bureau\MsnFix: supprimé !
C:\Documents and Settings\LE BLEIS\Bureau\GenProc: supprimé !
C:\UBCD4Win\BartPE\PROGRAMS\HijackThis: supprimé !
C:\UBCD4Win\plugin\AntiSpyware\HijackThis: supprimé !
C:\Documents and Settings\LE BLEIS\Bureau\HijackThis.exe: trouvé !
C:\Documents and Settings\LE BLEIS\Bureau\MsnFix: trouvé !
C:\Documents and Settings\LE BLEIS\Bureau\GenProc: trouvé !
C:\UBCD4Win\BartPE\I386\SYSTEM32\tar.exe: trouvé !
C:\UBCD4Win\BartPE\I386\SYSTEM32\gzip.exe: trouvé !
C:\UBCD4Win\BartPE\PROGRAMS\HijackThis: trouvé !
C:\UBCD4Win\BartPE\PROGRAMS\HijackThis\HijackThis.exe: trouvé !
C:\UBCD4Win\plugin\AntiSpyware\HijackThis: trouvé !
C:\UBCD4Win\plugin\AntiSpyware\hijackthis\HijackThis.exe: trouvé !
---------------------------------
-->- Suppression:
C:\Documents and Settings\LE BLEIS\Bureau\HijackThis.exe: supprimé !
C:\UBCD4Win\BartPE\I386\SYSTEM32\tar.exe: supprimé !
C:\UBCD4Win\BartPE\I386\SYSTEM32\gzip.exe: supprimé !
C:\UBCD4Win\BartPE\PROGRAMS\HijackThis\HijackThis.exe: supprimé !
C:\UBCD4Win\plugin\AntiSpyware\hijackthis\HijackThis.exe: supprimé !
C:\Documents and Settings\LE BLEIS\Bureau\MsnFix: supprimé !
C:\Documents and Settings\LE BLEIS\Bureau\GenProc: supprimé !
C:\UBCD4Win\BartPE\PROGRAMS\HijackThis: supprimé !
C:\UBCD4Win\plugin\AntiSpyware\HijackThis: supprimé !
Précédent
- 1
- 2