Aller au contenu

hasna_blad

Membres
  • Compteur de contenus

    6
  • Inscription

  • Dernière visite

Autres informations

  • Mes langues
    francais

hasna_blad's Achievements

Junior Member

Junior Member (3/12)

0

Réputation sur la communauté

  1. salut je viens de formater mon ordinateur mais je n'arrive pas à installer les drivers ou bien les logiciels. voici le message d'erreur:le point d'entree de procédure_except_handler4_common est introuvable dans la bibliothéque de laisons dynamique msvct.dll. je pense faire un nouveau formatage. mais je ne suis pas sure des resultats. j ai windows XP/ syslem32 j'ajoute que mon ordi a refusé l'analyse par Ma-Config IPB3. aidez moi.
  2. Salut mon problème est résolu. j ai reformaté mon pc. et il marche bien mnt. merci pour ton aide.
  3. je fais un click droit puis je click sur ouvrir avec puis sur aperçu des images télécopies windows. voila le message d'erreur qui s'affiche: erreur de chergement de C:/windows/system 32/shimgvm.dll l'accés à cet emplacement de mémoire n'est pas valide.
  4. c windows XP ok merci je vais essayer
  5. Bonjour

    Il serait intéressant de mettre ta configuration matérielle dans ton profil.

    Bonne journée

    ticlou

  6. slt tout le monde je viens de formater mon PC car il était très infecté. mais après ce formatage j'ai constaté que toutes mes images JPEG / BITMAP ne s'ouvrent pas avec la commande aperçu ou ouvrir. elles s'ouvrent uniquement avec la commande PAINT pour modification. J'ai essayé de modifier une image puis l'ouvrir mais cette solution ne marchait pas non plus. aussi mon bureau se bloque de temps en temps. je ne sais pas c'est quoi le problème exactement. Aidez-moi s'il vous plaît. merci
  7. slt je vx te remercie pour cette aide car je ss tombée dans le mm probleme et simplement j ai fait comme t as expliqué. voila mon rapport et j espere je te derange pas.merci encore 01:18:55 Administrateur MESSAGE Protection started successfully 01:19:06 Administrateur MESSAGE IP Protection started successfully 01:35:21 Administrateur MESSAGE Protection started successfully 01:35:28 Administrateur MESSAGE IP Protection started successfully 01:45:17 Administrateur MESSAGE Protection started successfully 01:45:25 Administrateur MESSAGE IP Protection started successfully Malwarebytes' Anti-Malware 1.51.1.1800 www.malwarebytes.org Version de la base de données: 7194 Windows 5.1.2600 Service Pack 2 Internet Explorer 6.0.2900.2180 19/07/2011 01:30:37 mbam-log-2011-07-19 (01-30-37).txt Type d'examen: Examen complet (C:\|D:\|E:\|F:\|) Elément(s) analysé(s): 151312 Temps écoulé: 6 minute(s), 57 seconde(s) Processus mémoire infecté(s): 0 Module(s) mémoire infecté(s): 0 Clé(s) du Registre infectée(s): 124 Valeur(s) du Registre infectée(s): 0 Elément(s) de données du Registre infecté(s): 0 Dossier(s) infecté(s): 0 Fichier(s) infecté(s): 56 Processus mémoire infecté(s): (Aucun élément nuisible détecté) Module(s) mémoire infecté(s): (Aucun élément nuisible détecté) Clé(s) du Registre infectée(s): HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360hotfix.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360rpt.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360Safe.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360safebox.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360tray.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\adam.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AgentSvr.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AntiArp.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AppSvc32.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\arvmon.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AutoGuarder.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\autoruns.exe (Trojan.Agent) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avgrssvc.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AvMonitor.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avp.com (Security.Hijack) -> Delete on reboot. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\CCenter.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ccSvcHst.exe (Trojan.Agent) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\FileDsty.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\findt2005.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\FTCleanerShell.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\HijackThis.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\IceSword.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\iparmo.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Iparmor.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\IsHelp.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\isPwdSvc.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kabaload.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KaScrScn.SCR (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KASMain.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KASTask.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KAV32.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KAVDX.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KAVPFW.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KAVSetup.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KAVStart.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\killhidepid.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KISLnchr.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KMailMon.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KMFilter.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KPFW32.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KPFW32X.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KPFWSvc.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KRepair.COM (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KsLoader.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KVCenter.kxp (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KvDetect.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kvfw.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KvfwMcl.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KVMonXP.kxp (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KVMonXP_1.kxp (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kvol.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kvolself.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KvReport.kxp (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KVScan.kxp (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KVSrvXP.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KVStub.kxp (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kvupload.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kvwsc.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KvXP.kxp (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KvXP_1.kxp (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KWatch.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KWatch9x.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KWatchX.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\LiveUpdate360.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\loaddll.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MagicSet.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mcconsol.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mmqczj.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mmsk.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\NAVSetup.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\nod32krn.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\nod32kui.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\PFW.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\PFWLiveUpdate.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\QHSET.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Ras.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Rav.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RavCopy.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RavMon.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RavMonD.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RavStore.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RavStub.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ravt08.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RavTask.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RegClean.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RegEx.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rfwcfg.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RfwMain.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rfwolusr.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rfwProxy.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rfwsrv.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RsAgent.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Rsaupd.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RsMain.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rsnetsvr.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RSTray.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\runiep.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\safebank.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\safeboxTray.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\safelive.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\scan32.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ScanFrm.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\shcfg32.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\smartassistant.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SmartUp.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SREng.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SREngPS.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\symlcsvc.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\syscheck.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Syscheck2.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SysSafe.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ToolsUp.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\TrojanDetector.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Trojanwall.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\TrojDie.kxp (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\UIHost.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\UmxAgent.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\UmxAttachment.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\UmxCfg.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\UmxFwHlp.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\UmxPol.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\UpLive.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WoptiClean.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\zxsweep.exe (Security.Hijack) -> Quarantined and deleted successfully. Valeur(s) du Registre infectée(s): (Aucun élément nuisible détecté) Elément(s) de données du Registre infecté(s): (Aucun élément nuisible détecté) Dossier(s) infecté(s): (Aucun élément nuisible détecté) Fichier(s) infecté(s): c:\WINDOWS\Fonts\xhuqc.dll (Malware.Packer.Gen) -> Quarantined and deleted successfully. c:\WINDOWS\Fonts\bjget.dll (Malware.Packer.Gen) -> Quarantined and deleted successfully. c:\WINDOWS\Fonts\johhh.dll (Malware.Packer.Gen) -> Quarantined and deleted successfully. c:\WINDOWS\Fonts\qbcib.dll (Malware.Packer.Gen) -> Quarantined and deleted successfully. c:\WINDOWS\Fonts\umbxh.dll (Malware.Packer.Gen) -> Quarantined and deleted successfully. c:\WINDOWS\Fonts\wluma.dll (Malware.Packer.Gen) -> Quarantined and deleted successfully. c:\WINDOWS\Fonts\pqind.dll (Malware.Packer.Gen) -> Quarantined and deleted successfully. c:\WINDOWS\Fonts\voirh.dll (Malware.Packer.Gen) -> Quarantined and deleted successfully. c:\WINDOWS\Fonts\mescr.dll (Malware.Packer.Gen) -> Quarantined and deleted successfully. c:\WINDOWS\Fonts\jjejc.dll (Malware.Packer.Gen) -> Quarantined and deleted successfully. c:\WINDOWS\Fonts\dpchs.dll (Malware.Packer.Gen) -> Quarantined and deleted successfully. c:\WINDOWS\Fonts\jxljx.dll (Malware.Packer.Gen) -> Quarantined and deleted successfully. c:\program files\common files\sysanti.exe.vir (Trojan.Downloader) -> Quarantined and deleted successfully. c:\system volume information\_restore{74c46b04-d95b-4cba-924e-430d12a4c772}\RP4\A0000369.exe (Trojan.Downloader) -> Quarantined and deleted successfully. c:\system volume information\_restore{74c46b04-d95b-4cba-924e-430d12a4c772}\RP6\A0000438.EXE (Trojan.FakeMS) -> Quarantined and deleted successfully. c:\system volume information\_restore{74c46b04-d95b-4cba-924e-430d12a4c772}\RP8\A0007443.exe (Trojan.Downloader) -> Quarantined and deleted successfully. c:\system volume information\_restore{74c46b04-d95b-4cba-924e-430d12a4c772}\RP10\A0009356.EXE (Trojan.FakeMS) -> Quarantined and deleted successfully. c:\system volume information\_restore{74c46b04-d95b-4cba-924e-430d12a4c772}\RP10\A0010356.EXE (Trojan.FakeMS) -> Quarantined and deleted successfully. c:\system volume information\_restore{74c46b04-d95b-4cba-924e-430d12a4c772}\RP10\A0011357.EXE (Trojan.FakeMS) -> Quarantined and deleted successfully. c:\system volume information\_restore{74c46b04-d95b-4cba-924e-430d12a4c772}\RP10\A0013407.EXE (Trojan.FakeMS) -> Quarantined and deleted successfully. c:\system volume information\_restore{74c46b04-d95b-4cba-924e-430d12a4c772}\RP10\A0015433.exe (Spyware.Passwords.XGen) -> Quarantined and deleted successfully. c:\system volume information\_restore{74c46b04-d95b-4cba-924e-430d12a4c772}\RP10\A0016354.EXE (Trojan.FakeMS) -> Quarantined and deleted successfully. c:\system volume information\_restore{74c46b04-d95b-4cba-924e-430d12a4c772}\RP10\A0017354.exe (Trojan.FakeMS) -> Quarantined and deleted successfully. c:\system volume information\_restore{74c46b04-d95b-4cba-924e-430d12a4c772}\RP10\A0017482.EXE (Trojan.FakeMS) -> Quarantined and deleted successfully. c:\system volume information\_restore{74c46b04-d95b-4cba-924e-430d12a4c772}\RP10\A0018476.EXE (Trojan.FakeMS) -> Quarantined and deleted successfully. c:\system volume information\_restore{74c46b04-d95b-4cba-924e-430d12a4c772}\RP12\A0020380.EXE (Trojan.FakeMS) -> Quarantined and deleted successfully. c:\system volume information\_restore{74c46b04-d95b-4cba-924e-430d12a4c772}\RP12\A0021405.EXE (Trojan.FakeMS) -> Quarantined and deleted successfully. c:\system volume information\_restore{74c46b04-d95b-4cba-924e-430d12a4c772}\RP12\A0021514.EXE (Trojan.FakeMS) -> Quarantined and deleted successfully. c:\system volume information\_restore{74c46b04-d95b-4cba-924e-430d12a4c772}\RP12\A0022507.EXE (Trojan.FakeMS) -> Quarantined and deleted successfully. d:\system volume information\_restore{74c46b04-d95b-4cba-924e-430d12a4c772}\RP10\A0009337.exe (PUP.RemoveWGA) -> Quarantined and deleted successfully. d:\system volume information\_restore{74c46b04-d95b-4cba-924e-430d12a4c772}\RP10\A0010360.exe (PUP.RemoveWGA) -> Quarantined and deleted successfully. d:\system volume information\_restore{74c46b04-d95b-4cba-924e-430d12a4c772}\RP10\A0011361.exe (PUP.RemoveWGA) -> Quarantined and deleted successfully. d:\system volume information\_restore{74c46b04-d95b-4cba-924e-430d12a4c772}\RP10\A0013358.exe (PUP.RemoveWGA) -> Quarantined and deleted successfully. d:\system volume information\_restore{74c46b04-d95b-4cba-924e-430d12a4c772}\RP2\A0000102.exe (PUP.RemoveWGA) -> Quarantined and deleted successfully. d:\system volume information\_restore{74c46b04-d95b-4cba-924e-430d12a4c772}\RP2\A0000106.exe (Trojan.Downloader) -> Quarantined and deleted successfully. d:\system volume information\_restore{74c46b04-d95b-4cba-924e-430d12a4c772}\RP3\A0000287.exe (PUP.RemoveWGA) -> Quarantined and deleted successfully. d:\system volume information\_restore{74c46b04-d95b-4cba-924e-430d12a4c772}\RP3\A0000291.exe (Trojan.Downloader) -> Quarantined and deleted successfully. d:\system volume information\_restore{74c46b04-d95b-4cba-924e-430d12a4c772}\RP4\A0000366.exe (Trojan.Downloader) -> Quarantined and deleted successfully. d:\system volume information\_restore{74c46b04-d95b-4cba-924e-430d12a4c772}\RP6\A0000425.exe (PUP.RemoveWGA) -> Quarantined and deleted successfully. d:\system volume information\_restore{74c46b04-d95b-4cba-924e-430d12a4c772}\RP6\A0000429.exe (Trojan.Downloader) -> Quarantined and deleted successfully. d:\system volume information\_restore{74c46b04-d95b-4cba-924e-430d12a4c772}\RP6\A0001386.exe (Trojan.Downloader) -> Quarantined and deleted successfully. d:\system volume information\_restore{74c46b04-d95b-4cba-924e-430d12a4c772}\RP6\A0002386.exe (Trojan.Downloader) -> Quarantined and deleted successfully. d:\system volume information\_restore{74c46b04-d95b-4cba-924e-430d12a4c772}\RP7\A0002418.exe (PUP.RemoveWGA) -> Quarantined and deleted successfully. d:\system volume information\_restore{74c46b04-d95b-4cba-924e-430d12a4c772}\RP7\A0002422.exe (Trojan.Downloader) -> Quarantined and deleted successfully. d:\system volume information\_restore{74c46b04-d95b-4cba-924e-430d12a4c772}\RP8\A0002481.exe (PUP.RemoveWGA) -> Quarantined and deleted successfully. d:\system volume information\_restore{74c46b04-d95b-4cba-924e-430d12a4c772}\RP8\A0002485.exe (Trojan.Downloader) -> Quarantined and deleted successfully. d:\system volume information\_restore{74c46b04-d95b-4cba-924e-430d12a4c772}\RP8\A0004441.exe (Trojan.Downloader) -> Quarantined and deleted successfully. d:\system volume information\_restore{74c46b04-d95b-4cba-924e-430d12a4c772}\RP8\A0005441.exe (Trojan.Downloader) -> Quarantined and deleted successfully. d:\system volume information\_restore{74c46b04-d95b-4cba-924e-430d12a4c772}\RP8\A0006438.exe (Trojan.Downloader) -> Quarantined and deleted successfully. d:\system volume information\_restore{74c46b04-d95b-4cba-924e-430d12a4c772}\RP8\A0006447.exe (PUP.RemoveWGA) -> Quarantined and deleted successfully. d:\system volume information\_restore{74c46b04-d95b-4cba-924e-430d12a4c772}\RP8\A0007440.exe (Trojan.Downloader) -> Quarantined and deleted successfully. d:\system volume information\_restore{74c46b04-d95b-4cba-924e-430d12a4c772}\RP8\A0007456.exe (PUP.RemoveWGA) -> Quarantined and deleted successfully. d:\system volume information\_restore{74c46b04-d95b-4cba-924e-430d12a4c772}\RP9\A0007514.exe (PUP.RemoveWGA) -> Quarantined and deleted successfully. d:\system volume information\_restore{74c46b04-d95b-4cba-924e-430d12a4c772}\RP9\A0008335.exe (PUP.RemoveWGA) -> Quarantined and deleted successfully. f:\hjuu.pif (Trojan.Agent) -> Quarantined and deleted successfully. f:\SysAnti.exe (Trojan.Downloader) -> Quarantined and deleted successfully. un 2eme scan Malwarebytes' Anti-Malware 1.51.1.1800 www.malwarebytes.org Version de la base de données: 7194 Windows 5.1.2600 Service Pack 2 Internet Explorer 6.0.2900.2180 19/07/2011 01:42:04 mbam-log-2011-07-19 (01-42-04).txt Type d'examen: Examen complet (C:\|D:\|E:\|F:\|) Elément(s) analysé(s): 151614 Temps écoulé: 6 minute(s), 0 seconde(s) Processus mémoire infecté(s): 0 Module(s) mémoire infecté(s): 0 Clé(s) du Registre infectée(s): 0 Valeur(s) du Registre infectée(s): 0 Elément(s) de données du Registre infecté(s): 0 Dossier(s) infecté(s): 0 Fichier(s) infecté(s): 1 Processus mémoire infecté(s): (Aucun élément nuisible détecté) Module(s) mémoire infecté(s): (Aucun élément nuisible détecté) Clé(s) du Registre infectée(s): (Aucun élément nuisible détecté) Valeur(s) du Registre infectée(s): (Aucun élément nuisible détecté) Elément(s) de données du Registre infecté(s): (Aucun élément nuisible détecté) Dossier(s) infecté(s): (Aucun élément nuisible détecté) Fichier(s) infecté(s): c:\system volume information\_restore{74c46b04-d95b-4cba-924e-430d12a4c772}\RP12\A0022615.EXE (Trojan.FakeMS) -> Quarantined and deleted successfully.
×
×
  • Créer...