Se connecter / S'enregistrer
Votre question

infection carte SD par worm

Tags :
  • Worms
  • Sécurité
Dernière réponse : dans Sécurité et virus
5 Février 2013 09:27:15

Bonjour,
Ma carte SD de mon appareil photo est infectée par worm, en ouvrant les dossiers, les fichiers apparaissent sous un autre logiciel et en crée un bizarre .porn exe
j'ai telechargé adwcleaner
ci dessous le rapport
merci pour votre aide!!
# AdwCleaner v2.110 - Rapport créé le 05/02/2013 à 09:20:49
# Mis à jour le 03/02/2013 par Xplode
# Système d'exploitation : Windows 7 Starter Service Pack 1 (32 bits)
# Nom d'utilisateur : Hak et Rach - HAKETRACH-PC
# Mode de démarrage : Normal
# Exécuté depuis : C:\Users\Hak et Rach\Downloads\adwcleaner.exe
# Option [Recherche]


***** [Services] *****


***** [Fichiers / Dossiers] *****

Dossier Présent : C:\Program Files\Nosibay
Dossier Présent : C:\Users\Hak et Rach\AppData\Roaming\Nosibay

***** [Registre] *****

Clé Présente : HKCU\Software\Nosibay
Clé Présente : HKCU\Software\Softonic
Clé Présente : HKLM\SOFTWARE\Classes\CLSID\{66EEF543-A9AC-4A9D-AA3C-1ED148AC8EEE}
Clé Présente : HKLM\SOFTWARE\Classes\CLSID\{826D7151-8D99-434B-8540-082B8C2AE556}
Clé Présente : HKLM\SOFTWARE\Classes\Interface\{66EEF543-A9AC-4A9D-AA3C-1ED148AC8EEE}
Clé Présente : HKLM\SOFTWARE\Classes\TypeLib\{11549FE4-7C5A-4C17-9FC3-56FC5162A994}
Clé Présente : HKLM\SOFTWARE\Microsoft\Tracing\ConduitInstaller_RASAPI32
Clé Présente : HKLM\SOFTWARE\Microsoft\Tracing\ConduitInstaller_RASMANCS
Clé Présente : HKLM\Software\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\063A857434EDED11A893800002C0A966
Clé Présente : HKLM\Software\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\0FF2AEFF45EEA0A48A4B33C1973B6094
Valeur Présente : HKCU\Software\Microsoft\Windows\CurrentVersion\Run [Bubble Dock]

***** [Navigateurs] *****

-\\ Internet Explorer v8.0.7601.17514

[OK] Le registre ne contient aucune entrée illégitime.

-\\ Mozilla Firefox v [Impossible d'obtenir la version]

Fichier : C:\Users\Hak et Rach\AppData\Roaming\Mozilla\Firefox\Profiles\yurznphj.default\prefs.js

Présente : user_pref("extensions.illimitux.ilx_pref_pt_veoh", true);

-\\ Google Chrome v24.0.1312.57

Fichier : C:\Users\Hak et Rach\AppData\Local\Google\Chrome\User Data\Default\Preferences

[OK] Le fichier ne contient aucune entrée illégitime.

*************************

AdwCleaner[R1].txt - [2036 octets] - [05/02/2013 09:20:49]

########## EOF - C:\AdwCleaner[R1].txt - [2096 octets] ##########

Autres pages sur : infection carte worm

5 Février 2013 10:01:10

LE RAPPORT DE LA CARTE SD PARDON, JE ME SUIS TROMPEE:
:/ 


Avira AntiVir Personal
Report file date: mardi 5 février 2013 09:52

Scanning for 4924148 virus strains and unwanted programs.

The program is running as an unrestricted full version.
Online services are available:

Licensee : Avira AntiVir Personal - Free Antivirus
Serial number : 0000149996-ADJIE-0000001
Platform : Windows 7
Windows version : (Service Pack 1) [6.1.7601]
Boot mode : Normally booted
Username : Hak et Rach
Computer name : HAKETRACH-PC

Version information:
BUILD.DAT : 10.2.0.719 Bytes 10/25/2012 10:40:00
AVSCAN.EXE : 10.3.0.7 484008 Bytes 7/4/2011 17:47:21
AVSCAN.DLL : 10.0.5.0 47464 Bytes 7/4/2011 17:47:21
LUKE.DLL : 10.3.0.5 45416 Bytes 7/4/2011 17:47:22
LUKERES.DLL : 10.0.0.1 12648 Bytes 2/10/2010 15:40:49
AVSCPLR.DLL : 10.3.0.7 119656 Bytes 7/4/2011 17:47:24
AVREG.DLL : 10.3.0.9 88833 Bytes 7/13/2011 19:04:40
VBASE000.VDF : 7.10.0.0 19875328 Bytes 11/6/2009 01:05:36
VBASE001.VDF : 7.11.0.0 13342208 Bytes 12/14/2010 11:41:05
VBASE002.VDF : 7.11.19.170 14374912 Bytes 12/20/2011 09:38:28
VBASE003.VDF : 7.11.21.238 4472832 Bytes 2/1/2012 23:09:27
VBASE004.VDF : 7.11.26.44 4329472 Bytes 3/28/2012 06:56:35
VBASE005.VDF : 7.11.34.116 4034048 Bytes 6/29/2012 09:34:05
VBASE006.VDF : 7.11.41.250 4902400 Bytes 9/6/2012 22:27:33
VBASE007.VDF : 7.11.50.230 3904512 Bytes 11/22/2012 12:08:04
VBASE008.VDF : 7.11.55.142 2214912 Bytes 1/3/2013 20:31:15
VBASE009.VDF : 7.11.55.143 2048 Bytes 1/3/2013 20:31:15
VBASE010.VDF : 7.11.55.144 2048 Bytes 1/3/2013 20:31:15
VBASE011.VDF : 7.11.55.145 2048 Bytes 1/3/2013 20:31:15
VBASE012.VDF : 7.11.55.146 2048 Bytes 1/3/2013 20:31:15
VBASE013.VDF : 7.11.55.196 260096 Bytes 1/4/2013 20:31:16
VBASE014.VDF : 7.11.56.23 206848 Bytes 1/7/2013 10:29:04
VBASE015.VDF : 7.11.56.83 186880 Bytes 1/8/2013 10:29:04
VBASE016.VDF : 7.11.56.145 135168 Bytes 1/9/2013 10:29:05
VBASE017.VDF : 7.11.56.211 139776 Bytes 1/11/2013 15:41:04
VBASE018.VDF : 7.11.57.11 153088 Bytes 1/13/2013 16:47:31
VBASE019.VDF : 7.11.57.75 165888 Bytes 1/15/2013 22:40:34
VBASE020.VDF : 7.11.57.163 190976 Bytes 1/17/2013 13:40:12
VBASE021.VDF : 7.11.57.219 119808 Bytes 1/18/2013 13:40:12
VBASE022.VDF : 7.11.58.7 167936 Bytes 1/21/2013 13:40:13
VBASE023.VDF : 7.11.58.49 140288 Bytes 1/22/2013 13:40:13
VBASE024.VDF : 7.11.58.119 137728 Bytes 1/24/2013 10:39:53
VBASE025.VDF : 7.11.58.175 132608 Bytes 1/25/2013 22:29:51
VBASE026.VDF : 7.11.58.213 116736 Bytes 1/27/2013 22:29:56
VBASE027.VDF : 7.11.59.68 1887744 Bytes 1/31/2013 12:06:52
VBASE028.VDF : 7.11.59.69 2048 Bytes 1/31/2013 12:06:52
VBASE029.VDF : 7.11.59.70 2048 Bytes 1/31/2013 12:06:52
VBASE030.VDF : 7.11.59.71 2048 Bytes 1/31/2013 12:06:52
VBASE031.VDF : 7.11.59.150 412672 Bytes 2/4/2013 12:48:55
Engineversion : 8.2.10.246
AEVDF.DLL : 8.1.2.10 102772 Bytes 7/11/2012 17:03:21
AESCRIPT.DLL : 8.1.4.86 467323 Bytes 2/3/2013 12:07:15
AESCN.DLL : 8.1.10.0 131445 Bytes 12/21/2012 16:34:57
AESBX.DLL : 8.2.5.12 606578 Bytes 7/5/2012 09:34:17
AERDL.DLL : 8.2.0.88 643444 Bytes 1/12/2013 15:41:12
AEPACK.DLL : 8.3.1.2 819574 Bytes 12/21/2012 16:34:57
AEOFFICE.DLL : 8.1.2.50 201084 Bytes 11/13/2012 22:27:48
AEHEUR.DLL : 8.1.4.194 5710199 Bytes 2/3/2013 12:07:14
AEHELP.DLL : 8.1.25.2 258423 Bytes 11/13/2012 22:27:43
AEGEN.DLL : 8.1.6.16 434549 Bytes 1/25/2013 10:39:54
AEEXP.DLL : 8.3.0.18 188789 Bytes 2/3/2013 12:07:16
AEEMU.DLL : 8.1.3.2 393587 Bytes 7/11/2012 17:03:19
AECORE.DLL : 8.1.30.0 201079 Bytes 12/21/2012 16:34:39
AEBB.DLL : 8.1.1.4 53619 Bytes 11/13/2012 22:27:42
AVWINLL.DLL : 10.0.0.0 19304 Bytes 1/14/2010 04:03:38
AVPREF.DLL : 10.0.3.2 44904 Bytes 7/4/2011 17:47:21
AVREP.DLL : 10.0.0.10 174120 Bytes 5/29/2011 11:41:16
AVARKT.DLL : 10.0.26.1 255336 Bytes 7/4/2011 17:47:20
AVEVTLOG.DLL : 10.0.0.9 203112 Bytes 7/4/2011 17:47:20
SQLITE3.DLL : 3.6.19.0 355688 Bytes 1/28/2010 04:57:58
AVSMTP.DLL : 10.0.0.17 63848 Bytes 3/16/2010 07:38:56
NETNT.DLL : 10.0.0.0 11624 Bytes 2/19/2010 06:41:00
RCIMAGE.DLL : 10.0.0.35 2589544 Bytes 7/4/2011 17:47:18
RCTEXT.DLL : 10.0.64.0 97640 Bytes 7/4/2011 17:47:18

Configuration settings for the scan:
Jobname.............................: ShlExt
Configuration file..................: C:\Users\HAKETR~1\AppData\Local\Temp\acd06b31.avp
Logging.............................: Default
Primary action......................: interactive
Secondary action....................: ignore
Scan master boot sector.............: on
Scan boot sector....................: on
Boot sectors........................: G:,
Process scan........................: off
Scan registry.......................: off
Search for rootkits.................: off
Integrity checking of system files..: off
Scan all files......................: Intelligent file selection
Scan archives.......................: on
Recursion depth.....................: 20
Smart extensions....................: on
Macro heuristic.....................: on
File heuristic......................: Advanced

Start of the scan: mardi 5 février 2013 09:52

Starting the file scan:

Begin scan in 'G:\'
G:\PRIVATE\AVCHD .scr
[DETECTION] Contains recognition pattern of the WORM/VB.CZ.14.A worm
G:\PRIVATE\AVCHD\BDMV .scr
[DETECTION] Contains recognition pattern of the WORM/VB.CZ.14.A worm
G:\PRIVATE\AVCHD\AVCHDTN .scr
[DETECTION] Contains recognition pattern of the WORM/VB.CZ.14.A worm
G:\PRIVATE\AVCHD\IISVPL .scr
[DETECTION] Contains recognition pattern of the WORM/VB.CZ.14.A worm
G:\PRIVATE\AVCHD\BDMV\PLAYLIST .scr
[DETECTION] Contains recognition pattern of the WORM/VB.CZ.14.A worm
G:\PRIVATE\AVCHD\BDMV\CLIPINF .scr
[DETECTION] Contains recognition pattern of the WORM/VB.CZ.14.A worm
G:\PRIVATE\AVCHD\BDMV\STREAM .scr
[DETECTION] Contains recognition pattern of the WORM/VB.CZ.14.A worm
G:\FOUND.000\FILE0000.CHK
[DETECTION] Contains recognition pattern of the WORM/VB.CZ.14.A worm

Beginning disinfection:
G:\FOUND.000\FILE0000.CHK
[DETECTION] Contains recognition pattern of the WORM/VB.CZ.14.A worm
[NOTE] The file was moved to the quarantine directory under the name '55cf6533.qua'.
G:\PRIVATE\AVCHD\BDMV\STREAM .scr
[DETECTION] Contains recognition pattern of the WORM/VB.CZ.14.A worm
[NOTE] The file was moved to the quarantine directory under the name '4d664a9f.qua'.
G:\PRIVATE\AVCHD\BDMV\CLIPINF .scr
[DETECTION] Contains recognition pattern of the WORM/VB.CZ.14.A worm
[NOTE] The file was moved to the quarantine directory under the name '1f02107f.qua'.
G:\PRIVATE\AVCHD\BDMV\PLAYLIST .scr
[DETECTION] Contains recognition pattern of the WORM/VB.CZ.14.A worm
[NOTE] The file was moved to the quarantine directory under the name '793d5fbd.qua'.
G:\PRIVATE\AVCHD\IISVPL .scr
[DETECTION] Contains recognition pattern of the WORM/VB.CZ.14.A worm
[NOTE] The file was moved to the quarantine directory under the name '3c8b7280.qua'.
G:\PRIVATE\AVCHD\AVCHDTN .scr
[DETECTION] Contains recognition pattern of the WORM/VB.CZ.14.A worm
[NOTE] The file was moved to the quarantine directory under the name '43a040ec.qua'.
G:\PRIVATE\AVCHD\BDMV .scr
[DETECTION] Contains recognition pattern of the WORM/VB.CZ.14.A worm
[NOTE] The file was moved to the quarantine directory under the name '0f166cb0.qua'.
G:\PRIVATE\AVCHD .scr
[DETECTION] Contains recognition pattern of the WORM/VB.CZ.14.A worm
[NOTE] The file was moved to the quarantine directory under the name '73002cf6.qua'.


End of the scan: mardi 5 février 2013 09:52
Used time: 00:07 Minute(s)

The scan has been done completely.

14 Scanned directories
229 Files were scanned
8 Viruses and/or unwanted programs were found
0 Files were classified as suspicious
0 files were deleted
0 Viruses and unwanted programs were repaired
8 Files were moved to quarantine
0 Files were renamed
0 Files cannot be scanned
221 Files not concerned
0 Archives were scanned
0 Warnings
8 Notes


m
0
l
5 Février 2013 10:01:11

LE RAPPORT DE LA CARTE SD PARDON, JE ME SUIS TROMPEE:
:/ 


Avira AntiVir Personal
Report file date: mardi 5 février 2013 09:52

Scanning for 4924148 virus strains and unwanted programs.

The program is running as an unrestricted full version.
Online services are available:

Licensee : Avira AntiVir Personal - Free Antivirus
Serial number : 0000149996-ADJIE-0000001
Platform : Windows 7
Windows version : (Service Pack 1) [6.1.7601]
Boot mode : Normally booted
Username : Hak et Rach
Computer name : HAKETRACH-PC

Version information:
BUILD.DAT : 10.2.0.719 Bytes 10/25/2012 10:40:00
AVSCAN.EXE : 10.3.0.7 484008 Bytes 7/4/2011 17:47:21
AVSCAN.DLL : 10.0.5.0 47464 Bytes 7/4/2011 17:47:21
LUKE.DLL : 10.3.0.5 45416 Bytes 7/4/2011 17:47:22
LUKERES.DLL : 10.0.0.1 12648 Bytes 2/10/2010 15:40:49
AVSCPLR.DLL : 10.3.0.7 119656 Bytes 7/4/2011 17:47:24
AVREG.DLL : 10.3.0.9 88833 Bytes 7/13/2011 19:04:40
VBASE000.VDF : 7.10.0.0 19875328 Bytes 11/6/2009 01:05:36
VBASE001.VDF : 7.11.0.0 13342208 Bytes 12/14/2010 11:41:05
VBASE002.VDF : 7.11.19.170 14374912 Bytes 12/20/2011 09:38:28
VBASE003.VDF : 7.11.21.238 4472832 Bytes 2/1/2012 23:09:27
VBASE004.VDF : 7.11.26.44 4329472 Bytes 3/28/2012 06:56:35
VBASE005.VDF : 7.11.34.116 4034048 Bytes 6/29/2012 09:34:05
VBASE006.VDF : 7.11.41.250 4902400 Bytes 9/6/2012 22:27:33
VBASE007.VDF : 7.11.50.230 3904512 Bytes 11/22/2012 12:08:04
VBASE008.VDF : 7.11.55.142 2214912 Bytes 1/3/2013 20:31:15
VBASE009.VDF : 7.11.55.143 2048 Bytes 1/3/2013 20:31:15
VBASE010.VDF : 7.11.55.144 2048 Bytes 1/3/2013 20:31:15
VBASE011.VDF : 7.11.55.145 2048 Bytes 1/3/2013 20:31:15
VBASE012.VDF : 7.11.55.146 2048 Bytes 1/3/2013 20:31:15
VBASE013.VDF : 7.11.55.196 260096 Bytes 1/4/2013 20:31:16
VBASE014.VDF : 7.11.56.23 206848 Bytes 1/7/2013 10:29:04
VBASE015.VDF : 7.11.56.83 186880 Bytes 1/8/2013 10:29:04
VBASE016.VDF : 7.11.56.145 135168 Bytes 1/9/2013 10:29:05
VBASE017.VDF : 7.11.56.211 139776 Bytes 1/11/2013 15:41:04
VBASE018.VDF : 7.11.57.11 153088 Bytes 1/13/2013 16:47:31
VBASE019.VDF : 7.11.57.75 165888 Bytes 1/15/2013 22:40:34
VBASE020.VDF : 7.11.57.163 190976 Bytes 1/17/2013 13:40:12
VBASE021.VDF : 7.11.57.219 119808 Bytes 1/18/2013 13:40:12
VBASE022.VDF : 7.11.58.7 167936 Bytes 1/21/2013 13:40:13
VBASE023.VDF : 7.11.58.49 140288 Bytes 1/22/2013 13:40:13
VBASE024.VDF : 7.11.58.119 137728 Bytes 1/24/2013 10:39:53
VBASE025.VDF : 7.11.58.175 132608 Bytes 1/25/2013 22:29:51
VBASE026.VDF : 7.11.58.213 116736 Bytes 1/27/2013 22:29:56
VBASE027.VDF : 7.11.59.68 1887744 Bytes 1/31/2013 12:06:52
VBASE028.VDF : 7.11.59.69 2048 Bytes 1/31/2013 12:06:52
VBASE029.VDF : 7.11.59.70 2048 Bytes 1/31/2013 12:06:52
VBASE030.VDF : 7.11.59.71 2048 Bytes 1/31/2013 12:06:52
VBASE031.VDF : 7.11.59.150 412672 Bytes 2/4/2013 12:48:55
Engineversion : 8.2.10.246
AEVDF.DLL : 8.1.2.10 102772 Bytes 7/11/2012 17:03:21
AESCRIPT.DLL : 8.1.4.86 467323 Bytes 2/3/2013 12:07:15
AESCN.DLL : 8.1.10.0 131445 Bytes 12/21/2012 16:34:57
AESBX.DLL : 8.2.5.12 606578 Bytes 7/5/2012 09:34:17
AERDL.DLL : 8.2.0.88 643444 Bytes 1/12/2013 15:41:12
AEPACK.DLL : 8.3.1.2 819574 Bytes 12/21/2012 16:34:57
AEOFFICE.DLL : 8.1.2.50 201084 Bytes 11/13/2012 22:27:48
AEHEUR.DLL : 8.1.4.194 5710199 Bytes 2/3/2013 12:07:14
AEHELP.DLL : 8.1.25.2 258423 Bytes 11/13/2012 22:27:43
AEGEN.DLL : 8.1.6.16 434549 Bytes 1/25/2013 10:39:54
AEEXP.DLL : 8.3.0.18 188789 Bytes 2/3/2013 12:07:16
AEEMU.DLL : 8.1.3.2 393587 Bytes 7/11/2012 17:03:19
AECORE.DLL : 8.1.30.0 201079 Bytes 12/21/2012 16:34:39
AEBB.DLL : 8.1.1.4 53619 Bytes 11/13/2012 22:27:42
AVWINLL.DLL : 10.0.0.0 19304 Bytes 1/14/2010 04:03:38
AVPREF.DLL : 10.0.3.2 44904 Bytes 7/4/2011 17:47:21
AVREP.DLL : 10.0.0.10 174120 Bytes 5/29/2011 11:41:16
AVARKT.DLL : 10.0.26.1 255336 Bytes 7/4/2011 17:47:20
AVEVTLOG.DLL : 10.0.0.9 203112 Bytes 7/4/2011 17:47:20
SQLITE3.DLL : 3.6.19.0 355688 Bytes 1/28/2010 04:57:58
AVSMTP.DLL : 10.0.0.17 63848 Bytes 3/16/2010 07:38:56
NETNT.DLL : 10.0.0.0 11624 Bytes 2/19/2010 06:41:00
RCIMAGE.DLL : 10.0.0.35 2589544 Bytes 7/4/2011 17:47:18
RCTEXT.DLL : 10.0.64.0 97640 Bytes 7/4/2011 17:47:18

Configuration settings for the scan:
Jobname.............................: ShlExt
Configuration file..................: C:\Users\HAKETR~1\AppData\Local\Temp\acd06b31.avp
Logging.............................: Default
Primary action......................: interactive
Secondary action....................: ignore
Scan master boot sector.............: on
Scan boot sector....................: on
Boot sectors........................: G:,
Process scan........................: off
Scan registry.......................: off
Search for rootkits.................: off
Integrity checking of system files..: off
Scan all files......................: Intelligent file selection
Scan archives.......................: on
Recursion depth.....................: 20
Smart extensions....................: on
Macro heuristic.....................: on
File heuristic......................: Advanced

Start of the scan: mardi 5 février 2013 09:52

Starting the file scan:

Begin scan in 'G:\'
G:\PRIVATE\AVCHD .scr
[DETECTION] Contains recognition pattern of the WORM/VB.CZ.14.A worm
G:\PRIVATE\AVCHD\BDMV .scr
[DETECTION] Contains recognition pattern of the WORM/VB.CZ.14.A worm
G:\PRIVATE\AVCHD\AVCHDTN .scr
[DETECTION] Contains recognition pattern of the WORM/VB.CZ.14.A worm
G:\PRIVATE\AVCHD\IISVPL .scr
[DETECTION] Contains recognition pattern of the WORM/VB.CZ.14.A worm
G:\PRIVATE\AVCHD\BDMV\PLAYLIST .scr
[DETECTION] Contains recognition pattern of the WORM/VB.CZ.14.A worm
G:\PRIVATE\AVCHD\BDMV\CLIPINF .scr
[DETECTION] Contains recognition pattern of the WORM/VB.CZ.14.A worm
G:\PRIVATE\AVCHD\BDMV\STREAM .scr
[DETECTION] Contains recognition pattern of the WORM/VB.CZ.14.A worm
G:\FOUND.000\FILE0000.CHK
[DETECTION] Contains recognition pattern of the WORM/VB.CZ.14.A worm

Beginning disinfection:
G:\FOUND.000\FILE0000.CHK
[DETECTION] Contains recognition pattern of the WORM/VB.CZ.14.A worm
[NOTE] The file was moved to the quarantine directory under the name '55cf6533.qua'.
G:\PRIVATE\AVCHD\BDMV\STREAM .scr
[DETECTION] Contains recognition pattern of the WORM/VB.CZ.14.A worm
[NOTE] The file was moved to the quarantine directory under the name '4d664a9f.qua'.
G:\PRIVATE\AVCHD\BDMV\CLIPINF .scr
[DETECTION] Contains recognition pattern of the WORM/VB.CZ.14.A worm
[NOTE] The file was moved to the quarantine directory under the name '1f02107f.qua'.
G:\PRIVATE\AVCHD\BDMV\PLAYLIST .scr
[DETECTION] Contains recognition pattern of the WORM/VB.CZ.14.A worm
[NOTE] The file was moved to the quarantine directory under the name '793d5fbd.qua'.
G:\PRIVATE\AVCHD\IISVPL .scr
[DETECTION] Contains recognition pattern of the WORM/VB.CZ.14.A worm
[NOTE] The file was moved to the quarantine directory under the name '3c8b7280.qua'.
G:\PRIVATE\AVCHD\AVCHDTN .scr
[DETECTION] Contains recognition pattern of the WORM/VB.CZ.14.A worm
[NOTE] The file was moved to the quarantine directory under the name '43a040ec.qua'.
G:\PRIVATE\AVCHD\BDMV .scr
[DETECTION] Contains recognition pattern of the WORM/VB.CZ.14.A worm
[NOTE] The file was moved to the quarantine directory under the name '0f166cb0.qua'.
G:\PRIVATE\AVCHD .scr
[DETECTION] Contains recognition pattern of the WORM/VB.CZ.14.A worm
[NOTE] The file was moved to the quarantine directory under the name '73002cf6.qua'.


End of the scan: mardi 5 février 2013 09:52
Used time: 00:07 Minute(s)

The scan has been done completely.

14 Scanned directories
229 Files were scanned
8 Viruses and/or unwanted programs were found
0 Files were classified as suspicious
0 files were deleted
0 Viruses and unwanted programs were repaired
8 Files were moved to quarantine
0 Files were renamed
0 Files cannot be scanned
221 Files not concerned
0 Archives were scanned
0 Warnings
8 Notes


m
0
l
Tom's guide dans le monde
  • Allemagne
  • Italie
  • Irlande
  • Royaume Uni
  • Etats Unis
Suivre Tom's Guide
Inscrivez-vous à la Newsletter
  • ajouter à twitter
  • ajouter à facebook
  • ajouter un flux RSS