Trojan js fake av-a

Fermé
christian - 3 janv. 2009 à 22:48
DeNisCoOl Messages postés 2802 Date d'inscription vendredi 19 août 2005 Statut Membre Dernière intervention 28 février 2011 - 29 mars 2009 à 18:59
Bonjour,

Comme un certain nombre d'internautes, j'ai choppé un trojan (js fake av-a). L'ouverture des pages web est ralentie, des fenêtres de pub apparaissent, mon antivirus avast me prévient que les mises à jour sont suspendues. Les alertes se déclenchent chaque fois que je me connecte, et je suis dirigé vers le téléchargement d'un antivirus (2009).

Je suis sous XP édition familiale.

Comment faire pour remédier à tout ça ?

Merci.

7 réponses

DeNisCoOl Messages postés 2802 Date d'inscription vendredi 19 août 2005 Statut Membre Dernière intervention 28 février 2011 224
3 janv. 2009 à 23:04
salut christian,


**********
* Suivre les instructions pour télécharger et exécuter MalwareBytes_AntiMalware:
https://www.malekal.com/tutoriel-malwarebyte-anti-malware/
Après installation fermer vos programmes et votre navigateur:
* MBAM se met automatiquement à jour en fin d'installation

Pour une plus grand efficacité il parfois préférable d’exécuter l’analyse en mode sans échec:
> Démarre en mode sans échec : après le bip et avant le logo windows tapoter sur la touche F8 (ou F5): menu M.S.E..
Si problème voir Tutoriel Symantec.
Choisir son compte, pas celui de l'Administrateur ou autre.

* Dans l'onglet analyse, s’assurer de cocher "Exécuter une analyse complète" et cliquer sur le bouton Rechercher pour démarrer l'analyse.

* Si des malwares ont été détectés, leur liste s'affiche.
En cliquant sur Suppression (?) , MBAM va détruire les fichiers et clés de registre et en mettre une copie dans la quarantaine.

* MBAM va ouvrir le bloc-notes et y copier le rapport d'analyse. Ferme le bloc-note. (Le rapport peut être retrouvé sous l'onglet Rapports/logs)

*Le coller dans le prochain message

* Pour terminer le nettoyage tu auras peut être besoin de redémarrer.


----------
- Ensuite
Cliquer sur HiJackThis pour télécharger (la dernière version) sur votre bureau :
- Le tutoriel pour Vista et XP (2 pages) : https://blog.sosordi.net/category/articles

- Installer le sur un répertoire dédié (pas un dossier temporaire).
- Double-clic sur Hijackthis.exe.
- Cliquer sur Do a scan and save log file.
- Le rapport s'ouvre sur le Bloc-Note , tout sélectionner (Ctrl+A).
- Copier (Ctrl+C) et Coller (Ctrl+V) le rapport dans le prochain message.


A+


Denis
0
kristian43380 Messages postés 2 Date d'inscription samedi 3 janvier 2009 Statut Membre Dernière intervention 4 janvier 2009
4 janv. 2009 à 11:56
Bonjour,

J'ai fait comme m'a dit Denis dans la première partie de la réponse.

1714 dossiers infectés ! Suppression et redémarrage.

Voici le rapport ; dois-je passer à la seconde étape ?

Malwarebytes' Anti-Malware 1.31
Version de la base de données: 1609
Windows 5.1.2600 Service Pack 3

04/01/2009 11:42:44
mbam-log-2009-01-04 (11-42-42).txt

Type de recherche: Examen complet (C:\|D:\|)
Eléments examinés: 182400
Temps écoulé: 1 hour(s), 46 minute(s), 49 second(s)

Processus mémoire infecté(s): 0
Module(s) mémoire infecté(s): 4
Clé(s) du Registre infectée(s): 35
Valeur(s) du Registre infectée(s): 1
Elément(s) de données du Registre infecté(s): 3
Dossier(s) infecté(s): 746
Fichier(s) infecté(s): 925

Processus mémoire infecté(s):
(Aucun élément nuisible détecté)

Module(s) mémoire infecté(s):
C:\WINDOWS\system32\yaywVmKc.dll (Trojan.Vundo.H) -> Delete on reboot.
C:\WINDOWS\system32\zqoasq.dll (Trojan.Vundo) -> Delete on reboot.
C:\WINDOWS\system32\aszgxo.dll (Trojan.Vundo) -> Delete on reboot.
C:\WINDOWS\system32\ddcArQif.dll (Trojan.Vundo) -> Delete on reboot.

Clé(s) du Registre infectée(s):
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{3cb25a57-3994-460e-afe5-51ca6314ff7b} (Trojan.Vundo.H) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{3cb25a57-3994-460e-afe5-51ca6314ff7b} (Trojan.Vundo.H) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{6d794cb4-c7cd-4c6f-bfdc-9b77afbdc02c} (Trojan.Vundo.H) -> Delete on reboot.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\ddcarqif (Trojan.Vundo.H) -> Delete on reboot.
HKEY_CLASSES_ROOT\CLSID\{6d794cb4-c7cd-4c6f-bfdc-9b77afbdc02c} (Trojan.Vundo.H) -> Delete on reboot.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{e51eb5c9-2414-474b-8d75-ec8088f8d593} (Trojan.Vundo.H) -> Delete on reboot.
HKEY_CLASSES_ROOT\CLSID\{e51eb5c9-2414-474b-8d75-ec8088f8d593} (Trojan.Vundo.H) -> Delete on reboot.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{77ab5974-55a3-4737-9fd5-b93c64307f78} (Trojan.Vundo.H) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{77ab5974-55a3-4737-9fd5-b93c64307f78} (Trojan.Vundo.H) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{ddc6267e-9044-480a-a52a-cc868c1faa3c} (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{ddc6267e-9044-480a-a52a-cc868c1faa3c} (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{3cb25a57-3994-460e-afe5-51ca6314ff7b} (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{6d794cb4-c7cd-4c6f-bfdc-9b77afbdc02c} (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{82fc4503-8459-4239-9b85-0617beaa950a} (Dialer) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{0878f049-d33e-45e0-a157-c36a6683cf25} (Adware.EGDAccess) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{1cd4e2dc-2da0-4154-8723-38cb04fb6a58} (Adware.EGDAccess) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{87c1805d-c5ae-4455-ab39-e245bb516136} (Adware.EGDAccess) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{af7410c1-fba3-415e-800a-4110ced40536} (Adware.EGDAccess) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{82fc4503-8459-4239-9b85-0617beaa950a} (Dialer) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{0878f049-d33e-45e0-a157-c36a6683cf25} (Adware.EGDAccess) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{1cd4e2dc-2da0-4154-8723-38cb04fb6a58} (Adware.EGDAccess) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{af7410c1-fba3-415e-800a-4110ced40536} (Adware.EGDAccess) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Code Store Database\Distribution Units\{82fc4503-8459-4239-9b85-0617beaa950a} (Dialer) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Code Store Database\Distribution Units\{0878f049-d33e-45e0-a157-c36a6683cf25} (Adware.EGDAccess) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Code Store Database\Distribution Units\{1cd4e2dc-2da0-4154-8723-38cb04fb6a58} (Adware.EGDAccess) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Code Store Database\Distribution Units\{af7410c1-fba3-415e-800a-4110ced40536} (Adware.EGDAccess) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{77ab5974-55a3-4737-9fd5-b93c64307f78} (Trojan.Vundo.H) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Instant Access (Adware.InstantAccess) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\MS Juan (Malware.Trace) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\contim (Trojan.Vundo) -> Delete on reboot.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\instkey (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\MS Track System (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\rdfa (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\FCOVM (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\RemoveRP (Trojan.Vundo) -> Quarantined and deleted successfully.

Valeur(s) du Registre infectée(s):
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\ShellExecuteHooks\{6d794cb4-c7cd-4c6f-bfdc-9b77afbdc02c} (Trojan.Vundo) -> Delete on reboot.

Elément(s) de données du Registre infecté(s):
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\LSA\Notification Packages (Trojan.Vundo.H) -> Data: c:\windows\system32\yaywvmkc -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\LSA\Authentication Packages (Trojan.Vundo.H) -> Data: c:\windows\system32\yaywvmkc -> Delete on reboot.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\StartMenuLogOff (Hijack.StartMenu) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.

Dossier(s) infecté(s):
C:\Program Files\Instant Access (Trojan.Dialer) -> Delete on reboot.
C:\Program Files\Instant Access\Center (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\1063158550 (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\1063158550\external-api.dlv4.com (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\1063158550\external-api.dlv4.com\js (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\1063158550\scripts.dlv4.com (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\1063158550\scripts.dlv4.com\Common (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\1063158550\scripts.dlv4.com\custom (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\1063158550\scripts.dlv4.com\custom\3262 (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\1063158550\scripts.dlv4.com\custom\3262\FR (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\1063158550\traffic.waypointcash.com (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\1063158550\traffic.waypointcash.com\hollywoodprivate.com (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\1063158550\traffic.waypointcash.com\hollywoodprivate.com\enter (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\1063158550\traffic.waypointcash.com\hollywoodprivate.com\enter\4 (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\1063158550\traffic.waypointcash.com\hollywoodprivate.com\enter\4\fr (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\1063158550\www.02KMKY1XGZBMSDFX.com (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\1063158550\www.02KMKY1XGZBMSDFX.com\Common (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\1063158550\www.rapid-pass.net (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\1063158550\www.waypointcash.com (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\1063158550\www.waypointcash.com\conversion (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\1068363739 (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\1068363739\external-api.dlv4.com (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\1068363739\external-api.dlv4.com\js (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\1068363739\media.rapid-pass.net (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\1068363739\media.rapid-pass.net\fullpages (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\1068363739\media.rapid-pass.net\fullpages\crz_v3_world (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\1068363739\media.rapid-pass.net\fullpages\crz_v3_world\fullpage16 (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\1068363739\media.rapid-pass.net\fullpages\crz_v3_world\fullpage16\images (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\1068363739\media.rapid-pass.net\fullpages\crz_v3_world\fullpage16\images\FR (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\1068363739\scripts.dlv4.com (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\1068363739\scripts.dlv4.com\Common (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\1068363739\scripts.dlv4.com\custom (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\1068363739\scripts.dlv4.com\custom\4273 (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\1068363739\scripts.dlv4.com\custom\4273\FR (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\1068363739\scripts.downloadv3.com (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\1068363739\scripts.downloadv3.com\Common (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\1068363739\www.epass-key.com (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\1068363739\www.rapid-pass.net (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\107004579 (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\107004579\external-api.dlv4.com (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\107004579\external-api.dlv4.com\js (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\107004579\media.rapid-pass.net (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\107004579\media.rapid-pass.net\fullpages (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\107004579\media.rapid-pass.net\fullpages\crz_v3_world (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\107004579\media.rapid-pass.net\fullpages\crz_v3_world\fullpage07 (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\107004579\media.rapid-pass.net\fullpages\crz_v3_world\fullpage07\images (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\107004579\media.rapid-pass.net\fullpages\crz_v3_world\fullpage07\images\FR (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\107004579\scripts.dlv4.com (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\107004579\scripts.dlv4.com\Common (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\107004579\scripts.dlv4.com\custom (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\107004579\scripts.dlv4.com\custom\4250 (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\107004579\scripts.dlv4.com\custom\4250\FR (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\107004579\scripts.downloadv3.com (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\107004579\scripts.downloadv3.com\Common (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\107004579\www.epass-key.com (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\107004579\www.rapid-pass.net (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\1151786506 (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\1151786506\external-api.dlv4.com (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\1151786506\external-api.dlv4.com\js (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\1151786506\fp.gad-network.com (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\1151786506\fp.gad-network.com\50007 (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\1151786506\fp.gad-network.com\50007\images (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\1151786506\fp.gad-network.com\50007\images\FR (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\1151786506\scripts.dlv4.com (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\1151786506\scripts.dlv4.com\Common (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\1151786506\scripts.dlv4.com\custom (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\1151786506\scripts.dlv4.com\custom\4297 (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\1151786506\scripts.dlv4.com\custom\4297\FR (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\1151786506\www.0texkax7c6hzuidk.com (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\1151786506\www.0texkax7c6hzuidk.com\Common (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\1151786506\www.rapid-pass.net (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\1166947414 (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\1166947414\external-api.dlv4.com (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\1166947414\external-api.dlv4.com\js (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\1166947414\media.rapid-pass.net (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\1166947414\media.rapid-pass.net\fullpages (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\1166947414\media.rapid-pass.net\fullpages\crz_v3_world (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\1166947414\media.rapid-pass.net\fullpages\crz_v3_world\fullpage17 (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\1166947414\media.rapid-pass.net\fullpages\crz_v3_world\fullpage17\images (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\1166947414\media.rapid-pass.net\fullpages\crz_v3_world\fullpage17\images\FR (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\1166947414\scripts.dlv4.com (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\1166947414\scripts.dlv4.com\Common (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\1166947414\scripts.dlv4.com\custom (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\1166947414\scripts.dlv4.com\custom\4274 (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\1166947414\scripts.dlv4.com\custom\4274\FR (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\1166947414\scripts.downloadv3.com (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\1166947414\scripts.downloadv3.com\Common (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\1166947414\www.epass-key.com (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\1175257271 (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\1175257271\external-api.dlv4.com (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\1175257271\external-api.dlv4.com\js (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\1175257271\media.rapid-pass.net (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\1175257271\media.rapid-pass.net\fullpages (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\1175257271\media.rapid-pass.net\fullpages\vzap_v3 (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\1175257271\media.rapid-pass.net\fullpages\vzap_v3\fullpage01 (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\1175257271\media.rapid-pass.net\fullpages\vzap_v3\fullpage01\images (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\1175257271\media.rapid-pass.net\fullpages\vzap_v3\fullpage01\images\FR (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\1175257271\scripts.dlv4.com (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\1175257271\scripts.dlv4.com\Common (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\1175257271\scripts.dlv4.com\custom (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\1175257271\scripts.dlv4.com\custom\4256 (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\1175257271\scripts.dlv4.com\custom\4256\FR (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\1175257271\scripts.downloadv3.com (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\1175257271\scripts.downloadv3.com\Common (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\1175257271\www.epass-key.com (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\1175257271\www.rapid-pass.net (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\1183678794 (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\1183678794\external-api.dlv4.com (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\1183678794\external-api.dlv4.com\js (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\1183678794\fp.gad-network.com (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\1183678794\fp.gad-network.com\50007 (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\1183678794\fp.gad-network.com\50007\images (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\1183678794\fp.gad-network.com\50007\images\FR (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\1183678794\scripts.dlv4.com (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\1183678794\scripts.dlv4.com\Common (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\1183678794\scripts.dlv4.com\custom (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\1183678794\scripts.dlv4.com\custom\4297 (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\1183678794\scripts.dlv4.com\custom\4297\FR (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\1183678794\www.0texkax7c6hzuidk.com (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\1183678794\www.0texkax7c6hzuidk.com\Common (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\133765088 (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\133765088\external-api.dlv4.com (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\133765088\external-api.dlv4.com\js (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\133765088\media.rapid-pass.net (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\133765088\media.rapid-pass.net\fullpages (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\133765088\media.rapid-pass.net\fullpages\ds_v3_chatsexy (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\133765088\media.rapid-pass.net\fullpages\ds_v3_chatsexy\fullpage03 (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\133765088\media.rapid-pass.net\fullpages\ds_v3_chatsexy\fullpage03\images (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\133765088\scripts.dlv4.com (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\133765088\scripts.dlv4.com\Common (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\133765088\scripts.dlv4.com\custom (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\133765088\scripts.dlv4.com\custom\4265 (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\133765088\scripts.dlv4.com\custom\4265\FR (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\133765088\scripts.downloadv3.com (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\133765088\scripts.downloadv3.com\Common (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\133765088\www.epass-key.com (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\133765088\www.rapid-pass.net (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\135650897 (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\135650897\external-api.dlv4.com (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\135650897\external-api.dlv4.com\js (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\135650897\media.rapid-pass.net (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\135650897\media.rapid-pass.net\fullpages (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\135650897\media.rapid-pass.net\fullpages\ds_v3_chatsexy (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\135650897\media.rapid-pass.net\fullpages\ds_v3_chatsexy\fullpage04 (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\135650897\media.rapid-pass.net\fullpages\ds_v3_chatsexy\fullpage04\images (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\135650897\scripts.dlv4.com (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\135650897\scripts.dlv4.com\Common (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\135650897\scripts.dlv4.com\custom (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\135650897\scripts.dlv4.com\custom\4275 (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\135650897\scripts.dlv4.com\custom\4275\FR (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\135650897\scripts.downloadv3.com (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\135650897\scripts.downloadv3.com\Common (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\135650897\www.epass-key.com (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\143971828 (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\143971828\external-api.dlv4.com (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\143971828\external-api.dlv4.com\js (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\143971828\fp.gad-network.com (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\143971828\fp.gad-network.com\50007 (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\143971828\fp.gad-network.com\50007\images (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\143971828\fp.gad-network.com\50007\images\FR (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\143971828\scripts.dlv4.com (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\143971828\scripts.dlv4.com\Common (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\143971828\scripts.dlv4.com\custom (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\143971828\scripts.dlv4.com\custom\4297 (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\143971828\scripts.dlv4.com\custom\4297\FR (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\143971828\www.0texkax7c6hzuidk.com (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\143971828\www.0texkax7c6hzuidk.com\Common (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\143971828\www.rapid-pass.net (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\145244451 (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\145244451\external-api.dlv4.com (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\145244451\external-api.dlv4.com\js (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\145244451\media.rapid-pass.net (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\145244451\media.rapid-pass.net\fullpages (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\145244451\media.rapid-pass.net\fullpages\crz_v3_world (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\145244451\media.rapid-pass.net\fullpages\crz_v3_world\fullpage15 (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\145244451\media.rapid-pass.net\fullpages\crz_v3_world\fullpage15\images (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\145244451\media.rapid-pass.net\fullpages\crz_v3_world\fullpage15\images\FR (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\145244451\scripts.dlv4.com (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\145244451\scripts.dlv4.com\Common (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\145244451\scripts.dlv4.com\custom (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\145244451\scripts.dlv4.com\custom\4270 (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\145244451\scripts.dlv4.com\custom\4270\FR (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\145244451\scripts.downloadv3.com (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\145244451\scripts.downloadv3.com\Common (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\145244451\www.epass-key.com (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\145244451\www.rapid-pass.net (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\148628916 (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\148628916\external-api.dlv4.com (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\148628916\external-api.dlv4.com\js (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\148628916\fp.gad-network.com (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\148628916\fp.gad-network.com\50007 (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\148628916\fp.gad-network.com\50007\images (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\148628916\fp.gad-network.com\50007\images\FR (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\148628916\scripts.dlv4.com (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\148628916\scripts.dlv4.com\Common (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\148628916\scripts.dlv4.com\custom (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\148628916\scripts.dlv4.com\custom\4297 (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\148628916\scripts.dlv4.com\custom\4297\FR (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\148628916\www.0texkax7c6hzuidk.com (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\148628916\www.0texkax7c6hzuidk.com\Common (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\154071119 (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\154071119\external-api.dlv4.com (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\154071119\external-api.dlv4.com\js (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\154071119\media.rapid-pass.net (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\154071119\media.rapid-pass.net\fullpages (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\154071119\media.rapid-pass.net\fullpages\crz_v3_world (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\154071119\media.rapid-pass.net\fullpages\crz_v3_world\fullpage05 (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\154071119\media.rapid-pass.net\fullpages\crz_v3_world\fullpage05\images (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\154071119\media.rapid-pass.net\fullpages\crz_v3_world\fullpage05\images\FR (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\154071119\scripts.dlv4.com (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\154071119\scripts.dlv4.com\Common (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\154071119\scripts.dlv4.com\custom (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\154071119\scripts.dlv4.com\custom\4239 (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\154071119\scripts.dlv4.com\custom\4239\FR (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\154071119\scripts.downloadv3.com (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\154071119\scripts.downloadv3.com\Common (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\154071119\www.epass-key.com (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\179032116 (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\179032116\external-api.dlv4.com (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\179032116\external-api.dlv4.com\js (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\179032116\media.rapid-pass.net (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\179032116\media.rapid-pass.net\fullpages (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\179032116\media.rapid-pass.net\fullpages\crz_v3_world (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\179032116\media.rapid-pass.net\fullpages\crz_v3_world\fullpage08 (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\179032116\media.rapid-pass.net\fullpages\crz_v3_world\fullpage08\images (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\179032116\scripts.dlv4.com (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\179032116\scripts.dlv4.com\Common (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\179032116\scripts.dlv4.com\custom (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\179032116\scripts.dlv4.com\custom\4253 (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\179032116\scripts.dlv4.com\custom\4253\FR (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\179032116\scripts.downloadv3.com (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\179032116\scripts.downloadv3.com\Common (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\179032116\www.epass-key.com (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\179032116\www.rapid-pass.net (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\193736022 (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\193736022\external-api.dlv4.com (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\193736022\external-api.dlv4.com\js (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\193736022\fp.gad-network.com (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\193736022\fp.gad-network.com\50007 (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\193736022\fp.gad-network.com\50007\images (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\193736022\fp.gad-network.com\50007\images\FR (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\193736022\scripts.dlv4.com (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\193736022\scripts.dlv4.com\Common (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\193736022\scripts.dlv4.com\custom (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\193736022\scripts.dlv4.com\custom\4297 (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\193736022\scripts.dlv4.com\custom\4297\FR (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\193736022\www.0texkax7c6hzuidk.com (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\193736022\www.0texkax7c6hzuidk.com\Common (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\193736022\www.rapid-pass.net (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\222238719 (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\222238719\external-api.dlv4.com (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\222238719\external-api.dlv4.com\js (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\222238719\fp.gad-network.com (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\222238719\fp.gad-network.com\50000 (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\222238719\fp.gad-network.com\50000\images (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\222238719\fp.gad-network.com\50000\images\FR (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\222238719\scripts.dlv4.com (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\222238719\scripts.dlv4.com\Common (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\222238719\scripts.dlv4.com\custom (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\222238719\scripts.dlv4.com\custom\4285 (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\222238719\scripts.dlv4.com\custom\4285\FR (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\222238719\www.0texkax7c6hzuidk.com (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\222238719\www.0texkax7c6hzuidk.com\Common (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\23309855 (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\23309855\external-api.dlv4.com (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\23309855\external-api.dlv4.com\js (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\23309855\media.rapid-pass.net (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\23309855\media.rapid-pass.net\fullpages (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\23309855\media.rapid-pass.net\fullpages\crz_v3_world (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\23309855\media.rapid-pass.net\fullpages\crz_v3_world\fullpage17 (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\23309855\media.rapid-pass.net\fullpages\crz_v3_world\fullpage17\images (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\23309855\media.rapid-pass.net\fullpages\crz_v3_world\fullpage17\images\FR (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\23309855\scripts.dlv4.com (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\23309855\scripts.dlv4.com\Common (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\23309855\scripts.dlv4.com\custom (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\23309855\scripts.dlv4.com\custom\4274 (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\23309855\scripts.dlv4.com\custom\4274\FR (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\23309855\scripts.downloadv3.com (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\23309855\scripts.downloadv3.com\Common (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\23309855\www.epass-key.com (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\26348984 (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\26348984\external-api.dlv4.com (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\26348984\external-api.dlv4.com\js (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\26348984\media.rapid-pass.net (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\26348984\media.rapid-pass.net\fullpages (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\26348984\media.rapid-pass.net\fullpages\crz_v3_world (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\26348984\media.rapid-pass.net\fullpages\crz_v3_world\fullpage16 (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\26348984\media.rapid-pass.net\fullpages\crz_v3_world\fullpage16\images (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\26348984\media.rapid-pass.net\fullpages\crz_v3_world\fullpage16\images\FR (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\26348984\scripts.dlv4.com (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\26348984\scripts.dlv4.com\Common (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\26348984\scripts.dlv4.com\custom (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\26348984\scripts.dlv4.com\custom\4273 (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\26348984\scripts.dlv4.com\custom\4273\FR (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\26348984\scripts.downloadv3.com (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\26348984\scripts.downloadv3.com\Common (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\26348984\www.epass-key.com (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\26348984\www.rapid-pass.net (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\266148609 (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\266148609\external-api.dlv4.com (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\266148609\external-api.dlv4.com\js (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\266148609\media.rapid-pass.net (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\266148609\media.rapid-pass.net\fullpages (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\266148609\media.rapid-pass.net\fullpages\crz_v3_world (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\266148609\media.rapid-pass.net\fullpages\crz_v3_world\fullpage11 (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\266148609\media.rapid-pass.net\fullpages\crz_v3_world\fullpage11\images (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\266148609\media.rapid-pass.net\fullpages\crz_v3_world\fullpage11\images\FR (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\266148609\scripts.dlv4.com (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\266148609\scripts.dlv4.com\Common (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\266148609\scripts.dlv4.com\custom (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\266148609\scripts.dlv4.com\custom\4261 (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\266148609\scripts.dlv4.com\custom\4261\FR (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\266148609\scripts.downloadv3.com (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\266148609\scripts.downloadv3.com\Common (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\266148609\www.epass-key.com (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\266148609\www.rapid-pass.net (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\332744906 (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\332744906\external-api.dlv4.com (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\332744906\external-api.dlv4.com\js (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\332744906\scripts.dlv4.com (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\332744906\scripts.dlv4.com\Common (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\332744906\scripts.dlv4.com\custom (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\332744906\scripts.dlv4.com\custom\3262 (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\332744906\scripts.dlv4.com\custom\3262\FR (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\332744906\traffic.waypointcash.com (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\332744906\traffic.waypointcash.com\hollywoodprivate.com (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\332744906\traffic.waypointcash.com\hollywoodprivate.com\enter (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\332744906\traffic.waypointcash.com\hollywoodprivate.com\enter\4 (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\332744906\traffic.waypointcash.com\hollywoodprivate.com\enter\4\fr (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\332744906\www.02KMKY1XGZBMSDFX.com (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\332744906\www.02KMKY1XGZBMSDFX.com\Common (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\332744906\www.rapid-pass.net (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\332744906\www.waypointcash.com (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\332744906\www.waypointcash.com\conversion (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\355040231 (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\355040231\external-api.dlv4.com (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\355040231\external-api.dlv4.com\js (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\355040231\media.rapid-pass.net (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\355040231\media.rapid-pass.net\fullpages (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\355040231\media.rapid-pass.net\fullpages\ds_v3_chatsexy (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\355040231\media.rapid-pass.net\fullpages\ds_v3_chatsexy\fullpage02 (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\355040231\media.rapid-pass.net\fullpages\ds_v3_chatsexy\fullpage02\images (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\355040231\scripts.dlv4.com (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\355040231\scripts.dlv4.com\Common (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\355040231\scripts.dlv4.com\custom (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\355040231\scripts.dlv4.com\custom\4255 (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\355040231\scripts.dlv4.com\custom\4255\FR (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\355040231\scripts.downloadv3.com (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\355040231\scripts.downloadv3.com\Common (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\355040231\www.epass-key.com (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\355040231\www.rapid-pass.net (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\442445887 (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\442445887\external-api.dlv4.com (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\442445887\external-api.dlv4.com\js (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\442445887\media.rapid-pass.net (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\442445887\media.rapid-pass.net\fullpages (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\442445887\media.rapid-pass.net\fullpages\ds_v3_chatsexy (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\442445887\media.rapid-pass.net\fullpages\ds_v3_chatsexy\fullpage02 (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\442445887\media.rapid-pass.net\fullpages\ds_v3_chatsexy\fullpage02\images (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\442445887\scripts.dlv4.com (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\442445887\scripts.dlv4.com\Common (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\442445887\scripts.dlv4.com\custom (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\442445887\scripts.dlv4.com\custom\4255 (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\442445887\scripts.dlv4.com\custom\4255\FR (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\442445887\scripts.downloadv3.com (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\442445887\scripts.downloadv3.com\Common (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\442445887\www.epass-key.com (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\442445887\www.rapid-pass.net (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\516328110 (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\516328110\external-api.dlv4.com (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\516328110\external-api.dlv4.com\js (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\516328110\media.rapid-pass.net (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\516328110\media.rapid-pass.net\fullpages (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\516328110\media.rapid-pass.net\fullpages\ds_v3_chatsexy (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\516328110\media.rapid-pass.net\fullpages\ds_v3_chatsexy\fullpage01 (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\516328110\media.rapid-pass.net\fullpages\ds_v3_chatsexy\fullpage01\images (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\516328110\scripts.dlv4.com (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\516328110\scripts.dlv4.com\Common (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\516328110\scripts.dlv4.com\custom (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\516328110\scripts.dlv4.com\custom\4252 (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\516328110\scripts.dlv4.com\custom\4252\FR (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\516328110\scripts.downloadv3.com (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\516328110\scripts.downloadv3.com\Common (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\516328110\www.epass-key.com (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\516328110\www.rapid-pass.net (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\529932410 (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\529932410\external-api.dlv4.com (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\529932410\external-api.dlv4.com\js (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\529932410\media.rapid-pass.net (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\529932410\media.rapid-pass.net\fullpages (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\529932410\media.rapid-pass.net\fullpages\crz_v3_world (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\529932410\media.rapid-pass.net\fullpages\crz_v3_world\fullpage16 (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\529932410\media.rapid-pass.net\fullpages\crz_v3_world\fullpage16\images (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\529932410\media.rapid-pass.net\fullpages\crz_v3_world\fullpage16\images\FR (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\529932410\scripts.dlv4.com (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\529932410\scripts.dlv4.com\Common (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\529932410\scripts.dlv4.com\custom (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\529932410\scripts.dlv4.com\custom\4273 (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\529932410\scripts.dlv4.com\custom\4273\FR (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\529932410\scripts.downloadv3.com (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\529932410\scripts.downloadv3.com\Common (Trojan.Dialer) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Dialer\529932410\www.epass-key.com (Troja
0
kristian43380 Messages postés 2 Date d'inscription samedi 3 janvier 2009 Statut Membre Dernière intervention 4 janvier 2009
4 janv. 2009 à 14:14
Re-bonjour,

J'ai téléchargé Hijackthis, je l'ai exécuté ; voici le rapport :

Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 14:12:27, on 04/01/2009
Platform: Windows XP SP3 (WinNT 5.01.2600)
MSIE: Internet Explorer v7.00 (7.00.6000.16762)
Boot mode: Normal

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\Ati2evxx.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\Ati2evxx.exe
C:\WINDOWS\Explorer.EXE
C:\Program Files\Alwil Software\Avast4\aswUpdSv.exe
C:\Program Files\Alwil Software\Avast4\ashServ.exe
C:\WINDOWS\system32\LEXBCES.EXE
C:\WINDOWS\system32\LEXPPS.EXE
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\Netropa\Multimedia Keyboard\nhksrv.exe
C:\Program Files\Google\Common\Google Updater\GoogleUpdaterService.exe
C:\Program Files\Java\jre6\bin\jqs.exe
C:\Program Files\Fichiers communs\Microsoft Shared\VS7Debug\mdm.exe
C:\WINDOWS\system32\svchost.exe
C:\Program Files\Java\jre6\bin\jusched.exe
C:\windows\system\hpsysdrv.exe
C:\Program Files\Alwil Software\Avast4\ashMaiSv.exe
C:\Program Files\Alwil Software\Avast4\ashWebSv.exe
C:\Program Files\ATI Technologies\ATI Control Panel\atiptaxx.exe
C:\HP\KBD\KBD.EXE
C:\Program Files\iTunes\iTunesHelper.exe
C:\WINDOWS\ALCXMNTR.EXE
C:\WINDOWS\System32\spool\DRIVERS\W32X86\3\printray.exe
C:\Program Files\Netropa\Multimedia Keyboard\MMKeybd.exe
C:\Program Files\Hewlett-Packard\HP Software Update\HPWuSchd.exe
C:\Program Files\Pinnacle\InstantCDDVD\InstantWrite\iwctrl.exe
C:\WINDOWS\system32\spool\drivers\w32x86\3\hpztsb09.exe
C:\PROGRA~1\LEXMAR~1\ACMonitor_X73.exe
C:\Program Files\Netropa\Multimedia Keyboard\TrayMon.exe
C:\PROGRA~1\LEXMAR~1\AcBtnMgr_X73.exe
C:\Program Files\QuickTime\qttask.exe
C:\WINDOWS\system32\wbem\wmiapsrv.exe
C:\Program Files\Netropa\Onscreen Display\OSD.exe
C:\Program Files\Fichiers communs\InstallShield\UpdateService\issch.exe
C:\PROGRA~1\ALWILS~1\Avast4\ashDisp.exe
C:\Program Files\iPod\bin\iPodService.exe
C:\Program Files\Fichiers communs\ACD Systems\FR\DevDetect.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe
C:\Program Files\Windows Live\Messenger\msnmsgr.exe
C:\Program Files\HP\Digital Imaging\bin\hpqtra08.exe
C:\Program Files\Sony Corporation\Image Transfer\SonyTray.exe
C:\WINDOWS\system32\rundll32.exe
C:\WINDOWS\system32\wuauclt.exe
C:\Program Files\Internet Explorer\IEXPLORE.EXE
C:\Program Files\Trend Micro\HijackThis\HijackThis.exe

R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Bar = https://actus.sfr.fr
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = https://actus.sfr.fr
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = https://www.google.fr/webhp?sourceid=navclient&hl=fr&ie=UTF-8&gws_rd=ssl
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = https://www.msn.com/fr-fr/?ocid=iehp
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = https://actus.sfr.fr
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = https://www.bing.com/?toHttps=1&redig=5FC791212101479BAFBE1A679848B1AF
R0 - HKLM\Software\Microsoft\Internet Explorer\Search,SearchAssistant = https://actus.sfr.fr
R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName = Liens
O2 - BHO: Spybot-S&D IE Protection - {53707962-6F74-2D53-2644-206D7942484F} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O2 - BHO: Java(tm) Plug-In SSV Helper - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre6\bin\ssv.dll
O2 - BHO: Programme d'aide de l'Assistant de connexion Windows Live - {9030D464-4C02-4ABF-8ECC-5164760863C6} - C:\Program Files\Fichiers communs\Microsoft Shared\Windows Live\WindowsLiveLogin.dll
O2 - BHO: {bd5da02b-d9db-4c5b-cea4-f7b98719fad9} - {9daf9178-9b7f-4aec-b5c4-bd9db20ad5db} - C:\WINDOWS\system32\dsnfuf.dll
O2 - BHO: Google Toolbar Helper - {AA58ED58-01DD-4d91-8333-CF10577473F7} - C:\Program Files\Google\Google Toolbar\GoogleToolbar.dll
O2 - BHO: Google Toolbar Notifier BHO - {AF69DE43-7D58-4638-B6FA-CE66B5AD205D} - C:\Program Files\Google\GoogleToolbarNotifier\5.0.926.3450\swg.dll
O2 - BHO: Java(tm) Plug-In 2 SSV Helper - {DBC80044-A445-435b-BC74-9C25C1C588A9} - C:\Program Files\Java\jre6\bin\jp2ssv.dll
O3 - Toolbar: &Google Toolbar - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - C:\Program Files\Google\Google Toolbar\GoogleToolbar.dll
O4 - HKLM\..\Run: [SunJavaUpdateSched] "C:\Program Files\Java\jre6\bin\jusched.exe"
O4 - HKLM\..\Run: [hpsysdrv] c:\windows\system\hpsysdrv.exe
O4 - HKLM\..\Run: [ATIPTA] C:\Program Files\ATI Technologies\ATI Control Panel\atiptaxx.exe
O4 - HKLM\..\Run: [HPHUPD08] c:\Program Files\HP\Digital Imaging\{33D6CC28-9F75-4d1b-A11D-98895B3A3729}\hphupd08.exe
O4 - HKLM\..\Run: [KBD] C:\HP\KBD\KBD.EXE
O4 - HKLM\..\Run: [iTunesHelper] "C:\Program Files\iTunes\iTunesHelper.exe"
O4 - HKLM\..\Run: [Recguard] C:\WINDOWS\SMINST\RECGUARD.EXE
O4 - HKLM\..\Run: [AlcxMonitor] ALCXMNTR.EXE
O4 - HKLM\..\Run: [PS2] C:\WINDOWS\system32\ps2.exe
O4 - HKLM\..\Run: [LSBWatcher] c:\hp\drivers\hplsbwatcher\lsburnwatcher.exe
O4 - HKLM\..\Run: [PrinTray] C:\WINDOWS\System32\spool\DRIVERS\W32X86\3\printray.exe
O4 - HKLM\..\Run: [MULTIMEDIA KEYBOARD] C:\Program Files\Netropa\Multimedia Keyboard\MMKeybd.exe
O4 - HKLM\..\Run: [HP Software Update] "C:\Program Files\Hewlett-Packard\HP Software Update\HPWuSchd.exe"
O4 - HKLM\..\Run: [IW_ControlCenter] C:\Program Files\Pinnacle\InstantCDDVD\InstantWrite\iwctrl.exe
O4 - HKLM\..\Run: [PinnacleDriverCheck] C:\WINDOWS\system32\PSDrvCheck.exe
O4 - HKLM\..\Run: [VOBID] C:\Program Files\Pinnacle\InstantCDDVD\\InstantDrive\InstantDrive.exe /remount
O4 - HKLM\..\Run: [HP Component Manager] "C:\Program Files\HP\hpcoretech\hpcmpmgr.exe"
O4 - HKLM\..\Run: [HPDJ Taskbar Utility] C:\WINDOWS\system32\spool\drivers\w32x86\3\hpztsb09.exe
O4 - HKLM\..\Run: [Lexmark X73 Button Monitor] C:\PROGRA~1\LEXMAR~1\ACMonitor_X73.exe
O4 - HKLM\..\Run: [Lexmark X73 Button Manager] C:\PROGRA~1\LEXMAR~1\AcBtnMgr_X73.exe
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
O4 - HKLM\..\Run: [ISUSPM Startup] C:\PROGRA~1\FICHIE~1\INSTAL~1\UPDATE~1\ISUSPM.exe -startup
O4 - HKLM\..\Run: [ISUSScheduler] "C:\Program Files\Fichiers communs\InstallShield\UpdateService\issch.exe" -start
O4 - HKLM\..\Run: [avast!] C:\PROGRA~1\ALWILS~1\Avast4\ashDisp.exe
O4 - HKLM\..\Run: [Device Detector] DevDetect.exe -autorun
O4 - HKLM\..\Run: [NeroFilterCheck] C:\WINDOWS\system32\NeroCheck.exe
O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
O4 - HKCU\..\Run: [swg] C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe
O4 - HKCU\..\Run: [msnmsgr] "C:\Program Files\Windows Live\Messenger\msnmsgr.exe" /background
O4 - HKUS\S-1-5-19\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'SERVICE LOCAL')
O4 - HKUS\S-1-5-20\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'SERVICE RÉSEAU')
O4 - Global Startup: Adobe Gamma Loader.exe.lnk = C:\Program Files\Fichiers communs\Adobe\Calibration\Adobe Gamma Loader.exe
O4 - Global Startup: HP Digital Imaging Monitor.lnk = C:\Program Files\HP\Digital Imaging\bin\hpqtra08.exe
O4 - Global Startup: Image Transfer.lnk = ?
O4 - Global Startup: Lancement rapide d'Adobe Reader.lnk = C:\Program Files\Adobe\Acrobat 7.0\Reader\reader_sl.exe
O4 - Global Startup: Microsoft Office.lnk = C:\Program Files\Microsoft Office\Office10\OSA.EXE
O8 - Extra context menu item: E&xporter vers Microsoft Excel - res://C:\PROGRA~1\MICROS~3\Office10\EXCEL.EXE/3000
O9 - Extra button: Run WinHTTrack - {36ECAF82-3300-8F84-092E-AFF36D6C7040} - C:\Program Files\WinHTTrack\WinHTTrackIEBar.dll
O9 - Extra 'Tools' menuitem: Launch WinHTTrack - {36ECAF82-3300-8F84-092E-AFF36D6C7040} - C:\Program Files\WinHTTrack\WinHTTrackIEBar.dll
O9 - Extra button: (no name) - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O9 - Extra 'Tools' menuitem: Spybot - Search & Destroy Configuration - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O9 - Extra button: Aide à la connexion - {E2D4D26B-0180-43a4-B05F-462D6D54C789} - C:\WINDOWS\PCHEALTH\HELPCTR\Vendors\CN=Hewlett-Packard,L=Cupertino,S=Ca,C=US\IEButton\support.htm
O9 - Extra 'Tools' menuitem: Aide à la connexion - {E2D4D26B-0180-43a4-B05F-462D6D54C789} - C:\WINDOWS\PCHEALTH\HELPCTR\Vendors\CN=Hewlett-Packard,L=Cupertino,S=Ca,C=US\IEButton\support.htm
O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O16 - DPF: {4F1E5B1A-2A80-42CA-8532-2D05CB959537} (MSN Photo Upload Tool) - http://gfx2.hotmail.com/mail/w2/resources/MSNPUpld.cab
O16 - DPF: {C771B05E-E725-4516-97A5-4CE5EB163CFB} - http://acces-direct.net/15671/Choc-fetish.exe
O16 - DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} (Shockwave Flash Object) - http://fpdownload2.macromedia.com/get/shockwave/cabs/flash/swflash.cab
O20 - AppInit_DLLs: zqoasq.dll dsnfuf.dll
O23 - Service: avast! iAVS4 Control Service (aswUpdSv) - ALWIL Software - C:\Program Files\Alwil Software\Avast4\aswUpdSv.exe
O23 - Service: Ati HotKey Poller - ATI Technologies Inc. - C:\WINDOWS\system32\Ati2evxx.exe
O23 - Service: avast! Antivirus - ALWIL Software - C:\Program Files\Alwil Software\Avast4\ashServ.exe
O23 - Service: avast! Mail Scanner - ALWIL Software - C:\Program Files\Alwil Software\Avast4\ashMaiSv.exe
O23 - Service: avast! Web Scanner - ALWIL Software - C:\Program Files\Alwil Software\Avast4\ashWebSv.exe
O23 - Service: Google Updater Service (gusvc) - Google - C:\Program Files\Google\Common\Google Updater\GoogleUpdaterService.exe
O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Fichiers communs\InstallShield\Driver\1050\Intel 32\IDriverT.exe
O23 - Service: iPod Service (iPodService) - Apple Computer, Inc. - C:\Program Files\iPod\bin\iPodService.exe
O23 - Service: Java Quick Starter (JavaQuickStarterService) - Sun Microsystems, Inc. - C:\Program Files\Java\jre6\bin\jqs.exe
O23 - Service: LexBce Server (LexBceS) - Lexmark International, Inc. - C:\WINDOWS\system32\LEXBCES.EXE
O23 - Service: Netropa NHK Server (nhksrv) - Unknown owner - C:\Program Files\Netropa\Multimedia Keyboard\nhksrv.exe
0
DeNisCoOl Messages postés 2802 Date d'inscription vendredi 19 août 2005 Statut Membre Dernière intervention 28 février 2011 224
4 janv. 2009 à 20:18
Re,

Tu étais bien infecté.

Il te reste une infection type Vundo.

Télécharger Combofix.exe (par sUBs) à partir d’un de ces liens :
http://download.bleepingcomputer.com/sUBs/ComboFix.exe
https://forospyware.com
http://www.geekstogo.com/forum/files/file/197-combofix-by-subs/

Important, enregistre le sur le bureau.

Bien suivre le tutoriel officiel en français : https://www.bleepingcomputer.com/combofix/fr/comment-utiliser-combofix

► Déconnecte toi d'Internet et referme les fenêtres de tous les programmes en cours.

► Désactive provisoirement et seulement le temps de l'utilisation de ComboFix,
la protection en temps réel de ton Antivirus et de tes Antispywares, qui peuvent gêner fortement la procédure de recherche et de nettoyage de l'outil.

Double clique combofix.exe et suivre les invites.
Attention, n'utilise pas ta souris ni ton clavier (ni un autre système de pointage) pendant que le programme tourne. Cela pourrait faire figer l'ordinateur.

Lorsque le scan sera complété, un rapport apparaîtra.

Sélectionner tout le rapport (Ctrl+A), puis Copier (Ctrl+C)/ Coller (Ctrl+V) ce rapport dans la prochaine réponse
- Si le fichier ne s'ouvre pas, il se trouve ici ==> C:\ComboFix.txt)


► Réactive la protection en temps réel de ton Antivirus et de tes Antispywares, avant de te reconnecter à internet.


A+


Denis
0
J'ai fait comme tu as dit, voila le rapport :


ComboFix 09-01-13.03 - HP_Propriétaire 2009-01-13 21:24:29.1 - NTFSx86
Microsoft Windows XP Édition familiale 5.1.2600.3.1252.1.1036.18.446.136 [GMT 1:00]
Lancé depuis: c:\documents and settings\HP_Propriétaire\Bureau\ComboFix.exe
Commutateurs utilisés :: c:\documents and settings\HP_Propriétaire\Bureau\WindowsXP-KB310994-SP2-Home-BootDisk-FRA.exe
AV: avast! antivirus 4.8.1296 [VPS 090113-0] *On-access scanning disabled* (Outdated)
FW: Norton Internet Worm Protection *disabled*
* Un nouveau point de restauration a été créé
.

(((((((((((((((((((((((((((((((((((( Autres suppressions ))))))))))))))))))))))))))))))))))))))))))))))))
.

C:\msn.exe
c:\windows\IE4 Error Log.txt
c:\windows\system32\boqusuux.ini
c:\windows\system32\ecojok.dll
c:\windows\system32\fftjwpyb.ini
c:\windows\system32\haanvexm.dll
c:\windows\system32\nidyjhiv.dll
c:\windows\system32\psioyabe.ini
c:\windows\system32\tppawnjw.ini
c:\windows\system32\unugobud.ini
c:\windows\system32\vihjydin.ini
c:\windows\system32\xfhrqqsq.ini
c:\windows\system32\xtbfehrx.dll
D:\Autorun.inf

.
((((((((((((((((((((((((((((( Fichiers créés du 2008-12-13 au 2009-01-13 ))))))))))))))))))))))))))))))))))))
.

2100-02-23 17:55 . 2001-04-02 15:30 821 --a------ c:\windows\Lexmark_ICM.ini
2100-02-23 13:35 . 2001-02-22 08:54 768 --a------ c:\windows\x73_lut.dat
2100-02-23 13:35 . 2001-02-22 08:54 768 --a------ c:\program files\x73_lut.dat
2100-02-08 14:53 . 2009-01-06 20:58 1,437 --a------ c:\windows\GtX73.ini
2100-02-08 14:03 . 2001-05-11 09:39 53,248 --a------ c:\program files\ACMonitor_X73.exe
2009-01-13 21:05 . 2009-01-13 21:05 129 --a------ c:\windows\system32\MRT.INI
2009-01-04 15:22 . 2009-01-04 15:22 <REP> d-------- C:\u torrent
2009-01-04 15:22 . 2009-01-04 15:22 <REP> d-------- c:\program files\uTorrent
2009-01-04 15:04 . 2009-01-04 15:09 <REP> d-------- c:\program files\uTorrent.lng
2009-01-04 14:31 . 2009-01-12 22:41 <REP> d-------- c:\documents and settings\HP_Propriétaire\Application Data\uTorrent
2009-01-04 14:11 . 2009-01-04 14:11 <REP> d-------- c:\program files\Trend Micro
2009-01-04 14:10 . 2009-01-04 14:11 812,344 --a------ C:\HJTInstall.exe
2009-01-04 09:52 . 2009-01-04 09:52 <REP> d-------- c:\program files\Malwarebytes' Anti-Malware
2009-01-04 09:52 . 2009-01-04 09:52 <REP> d-------- c:\documents and settings\HP_Propriétaire\Application Data\Malwarebytes
2009-01-04 09:52 . 2009-01-04 09:52 <REP> d-------- c:\documents and settings\All Users\Application Data\Malwarebytes
2009-01-04 09:52 . 2008-12-03 19:52 38,496 --a------ c:\windows\system32\drivers\mbamswissarmy.sys
2009-01-04 09:52 . 2008-12-03 19:52 15,504 --a------ c:\windows\system32\drivers\mbam.sys
2009-01-04 09:42 . 2009-01-04 09:42 2,539,400 --a------ C:\mbam-setup.exe
2008-12-25 21:35 . 2008-12-25 21:42 <REP> d-------- c:\program files\Spybot - Search & Destroy
2008-12-25 21:35 . 2008-12-25 22:17 <REP> d-------- c:\documents and settings\All Users\Application Data\Spybot - Search & Destroy
2008-12-22 20:28 . 2008-12-22 20:27 410,984 --a------ c:\windows\system32\deploytk.dll
2008-12-21 23:00 . 2008-12-21 23:00 <REP> d-------- c:\program files\Microsoft CAPICOM 2.1.0.2
2008-12-21 19:09 . 2008-10-16 14:06 268,648 --a------ c:\windows\system32\mucltui.dll
2008-12-21 19:09 . 2008-10-16 14:06 208,744 --a------ c:\windows\system32\muweb.dll
2008-12-21 19:09 . 2008-10-16 14:06 27,496 --a------ c:\windows\system32\mucltui.dll.mui
2008-12-21 00:00 . 2009-01-13 21:11 <REP> d-------- c:\documents and settings\HP_Propriétaire\Tracing
2008-12-21 00:00 . 2009-01-13 21:11 <REP> d-------- c:\documents and settings\HP_Propriétaire\Tracing
2008-12-20 23:58 . 2008-12-20 23:58 <REP> d-------- c:\program files\Windows Live SkyDrive
2008-12-20 23:58 . 2008-12-20 23:59 <REP> d-------- c:\program files\Windows Live
2008-12-20 23:58 . 2008-12-20 23:58 <REP> d-------- c:\program files\Microsoft
2008-12-20 23:47 . 2008-12-20 23:47 <REP> d-------- c:\program files\Fichiers communs\Windows Live

.
(((((((((((((((((((((((((((((((((( Compte-rendu de Find3M ))))))))))))))))))))))))))))))))))))))))))))))))
.
2009-01-12 19:48 --------- d-----w c:\documents and settings\All Users\Application Data\Google Updater
2009-01-01 21:37 --------- d-----w c:\program files\Google
2008-12-25 21:22 123,544 ----a-w c:\documents and settings\HP_Propriétaire\Application Data\GDIPFONTCACHEV1.DAT
2008-12-22 19:27 --------- d-----w c:\program files\Java
2008-12-11 10:57 333,952 ----a-w c:\windows\system32\drivers\srv.sys
2008-12-02 20:35 1,035,178 ----a-w C:\dvdshrink_3.2_CSS-Free_for_ImgBurn_Fr.exe
2001-07-26 14:58 47 ----a-w c:\program files\ACMonitor_X73.ini
2001-07-05 10:46 8,116 ----a-w c:\program files\OSLO3071b2.USB
2001-06-12 12:28 8,154 ----a-w c:\program files\OsloD3069.usb
2001-05-08 13:36 114,688 ----a-w c:\program files\lxarscan.dll
2001-04-23 12:22 1,437 ----a-w c:\program files\gtx73.ini
2006-02-03 19:13 22 --sha-w c:\windows\SMINST\HPCD.sys
.

((((((((((((((((((((((((((((((((( Points de chargement Reg ))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* les éléments vides & les éléments initiaux légitimes ne sont pas listés
REGEDIT4

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"ctfmon.exe"="c:\windows\system32\ctfmon.exe" [2008-04-14 15360]
"swg"="c:\program files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe" [2007-07-27 68856]
"msnmsgr"="c:\program files\Windows Live\Messenger\msnmsgr.exe" [2008-12-02 3882312]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"SunJavaUpdateSched"="c:\program files\Java\jre6\bin\jusched.exe" [2008-12-22 136600]
"hpsysdrv"="c:\windows\system\hpsysdrv.exe" [1998-05-07 52736]
"ATIPTA"="c:\program files\ATI Technologies\ATI Control Panel\atiptaxx.exe" [2005-06-08 344064]
"HPHUPD08"="c:\program files\HP\Digital Imaging\{33D6CC28-9F75-4d1b-A11D-98895B3A3729}\hphupd08.exe" [2005-06-02 49152]
"KBD"="c:\hp\KBD\KBD.EXE" [2005-02-03 61440]
"iTunesHelper"="c:\program files\iTunes\iTunesHelper.exe" [2005-05-05 278528]
"Recguard"="c:\windows\SMINST\RECGUARD.EXE" [2004-04-14 233472]
"PS2"="c:\windows\system32\ps2.exe" [2004-10-25 90112]
"LSBWatcher"="c:\hp\drivers\hplsbwatcher\lsburnwatcher.exe" [2005-05-11 253952]
"PrinTray"="c:\windows\System32\spool\DRIVERS\W32X86\3\printray.exe" [2001-10-12 36864]
"MULTIMEDIA KEYBOARD"="c:\program files\Netropa\Multimedia Keyboard\MMKeybd.exe" [2002-06-19 180224]
"HP Software Update"="c:\program files\Hewlett-Packard\HP Software Update\HPWuSchd.exe" [2003-06-25 49152]
"IW_ControlCenter"="c:\program files\Pinnacle\InstantCDDVD\InstantWrite\iwctrl.exe" [2003-03-12 836096]
"PinnacleDriverCheck"="c:\windows\system32\PSDrvCheck.exe" [2003-03-10 393728]
"VOBID"="c:\program files\Pinnacle\InstantCDDVD\\InstantDrive\InstantDrive.exe" [2003-03-10 147968]
"HP Component Manager"="c:\program files\HP\hpcoretech\hpcmpmgr.exe" [2004-05-12 241664]
"HPDJ Taskbar Utility"="c:\windows\system32\spool\drivers\w32x86\3\hpztsb09.exe" [2003-11-08 188416]
"Lexmark X73 Button Monitor"="c:\progra~1\LEXMAR~1\ACMonitor_X73.exe" [2001-05-11 53248]
"Lexmark X73 Button Manager"="c:\progra~1\LEXMAR~1\AcBtnMgr_X73.exe" [2001-06-11 53248]
"QuickTime Task"="c:\program files\QuickTime\qttask.exe" [2005-01-02 98304]
"ISUSPM Startup"="c:\progra~1\FICHIE~1\INSTAL~1\UPDATE~1\ISUSPM.exe" [2004-07-27 221184]
"ISUSScheduler"="c:\program files\Fichiers communs\InstallShield\UpdateService\issch.exe" [2004-07-27 81920]
"avast!"="c:\progra~1\ALWILS~1\Avast4\ashDisp.exe" [2008-11-26 81000]
"NeroFilterCheck"="c:\windows\system32\NeroCheck.exe" [2001-07-09 155648]
"AlcxMonitor"="ALCXMNTR.EXE" [2004-09-07 c:\windows\ALCXMNTR.EXE]

c:\documents and settings\All Users\Menu D‚marrer\Programmes\D‚marrage\
Adobe Gamma Loader.exe.lnk - c:\program files\Fichiers communs\Adobe\Calibration\Adobe Gamma Loader.exe [2006-02-04 110592]
HP Digital Imaging Monitor.lnk - c:\program files\HP\Digital Imaging\bin\hpqtra08.exe [2005-05-12 282624]
Image Transfer.lnk - c:\program files\Sony Corporation\Image Transfer\SonyTray.exe [2006-06-09 73728]
Lancement rapide d'Adobe Reader.lnk - c:\program files\Adobe\Acrobat 7.0\Reader\reader_sl.exe [2008-04-23 29696]
Microsoft Office.lnk - c:\program files\Microsoft Office\Office10\OSA.EXE [2001-02-13 83360]

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\windows]
"AppInit_DLLs"=zqoasq.dll dsnfuf.dll

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\drivers32]
"VIDC.ACDV"= ACDV.dll

[HKEY_LOCAL_MACHINE\software\microsoft\security center]
"AntiVirusDisableNotify"=dword:00000001

[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\SymantecFirewall]
"DisableMonitoring"=dword:00000001

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%windir%\\system32\\sessmgr.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpqtra08.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpqste08.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpofxm08.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\bin\\hposfx08.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\bin\\hposid01.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpqscnvw.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpqkygrp.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpqCopy.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpfccopy.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpzwiz01.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\Unload\\HpqPhUnl.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\Unload\\HpqDIA.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpoews01.exe"=
"c:\\Program Files\\iTunes\\iTunes.exe"=
"%windir%\\Network Diagnostic\\xpnetdiag.exe"=
"c:\\WINDOWS\\system32\\mshta.exe"=
"c:\\Program Files\\Windows Live\\Messenger\\wlcsdk.exe"=
"c:\\Program Files\\Windows Live\\Messenger\\msnmsgr.exe"=
"c:\\Program Files\\Messenger\\msmsgs.exe"=
"c:\\Program Files\\uTorrent\\uTorrent.exe"=
"c:\\Program Files\\uTorrent.lng\\uTorrent.exe"=

R0 VOBID;VOBID;c:\windows\system32\drivers\vobid.sys [2003-02-20 26679]
R1 aswSP;avast! Self Protection;c:\windows\system32\drivers\aswSP.sys [2008-04-05 111184]
R1 msikbd2k;Multimedia Keyboard Filter Driver;c:\windows\system32\drivers\Msikbd2k.sys [2006-02-02 6656]
R1 vobcom;vobcom;c:\windows\system32\drivers\vobcom.sys [2001-10-04 9728]
R1 vobiw;vobiw;c:\windows\system32\drivers\vobIW.sys [2003-03-06 186368]
R3 Cdrdrv;Cdrdrv;c:\windows\system32\drivers\Cdrdrv.sys [2002-12-13 64000]
R4 aswFsBlk;aswFsBlk;c:\windows\system32\drivers\aswFsBlk.sys [2008-04-05 20560]
R4 nhksrv;Netropa NHK Server;c:\program files\Netropa\Multimedia Keyboard\nhksrv.exe [2006-02-02 28672]
S3 HSFHWCD2;HSFHWCD2;c:\windows\system32\drivers\HSFHWCD2.sys [2006-07-31 201728]
.
Contenu du dossier 'Tâches planifiées'

2009-01-13 c:\windows\Tasks\rxbwzwuo.job
- c:\windows\system32\rundll32.exe [2008-04-14 03:34]
.
- - - - ORPHELINS SUPPRIMES - - - -

HKLM-Run-PCDrProfiler - (no file)
HKLM-Run-Device Detector - DevDetect.exe


.
------- Examen supplémentaire -------
.
uStart Page = hxxp://www.google.fr/webhp?sourceid=navclient&hl=fr&ie=UTF-8
uSearchMigratedDefaultURL = hxxp://www.google.com/search?q={searchTerms}&sourceid=ie7&rls=com.microsoft:en-US&ie=utf8&oe=utf8
uSearchURL,(Default) = hxxp://www.google.com/search?q=%s
IE: E&xporter vers Microsoft Excel - c:\progra~1\MICROS~3\Office10\EXCEL.EXE/3000
.

**************************************************************************

catchme 0.3.1367 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2009-01-13 21:30:46
Windows 5.1.2600 Service Pack 3 NTFS

Recherche de processus cachés ...

Recherche d'éléments en démarrage automatique cachés ...

Recherche de fichiers cachés ...

Scan terminé avec succès
Fichiers cachés: 0

**************************************************************************
.
--------------------- DLLs chargées dans les processus actifs ---------------------

- - - - - - - > 'winlogon.exe'(544)
c:\windows\system32\Ati2evxx.dll
.
Heure de fin: 2009-01-13 21:35:16
ComboFix-quarantined-files.txt 2009-01-13 20:34:12

Avant-CF: 93 927 190 528 octets libres
Après-CF: 94,335,840,256 octets libres

190 --- E O F --- 2009-01-13 20:06:40
0

Vous n’avez pas trouvé la réponse que vous recherchez ?

Posez votre question
DeNisCoOl Messages postés 2802 Date d'inscription vendredi 19 août 2005 Statut Membre Dernière intervention 28 février 2011 224
16 janv. 2009 à 01:01
salut,

Vous êtes un adepte des torrent semble t-il.
Il est rare que ceci soit utilisé pour échanger des fichiers libre de droits.
Mais bref surtout rien n'est gratuit et ces fichiers sont de fréquente source d'infection.


/!\ Manip crée spécialement pour cette infection, ne pas reproduire seul chez soi sans supervision... /!\

------------------------------
Créer un nouveau document texte : clic droit de souris sur le bureau > Nouveau > Document Texte, et y coller les lignes suivantes :


Registry::
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\windows]
"AppInit_DLLs"= " "


Enregistre ce fichier sous le nom CFScript

► Déconnecte toi d'Internet et referme les fenêtres de tous les programmes en cours.

► Désactive provisoirement et seulement le temps de l'utilisation de ComboFix,
la protection en temps réel de ton Antivirus et de tes Antispywares, qui peuvent gêner fortement la procédure de recherche et de nettoyage de l'outil.



* Faire un glisser/déposer de ce fichier CFScript sur le fichier ComboFix.exe comme montré sur ce lien :
http://img.photobucket.com/albums/v666/sUBs/CFScript.gif
* Une fenêtre bleue va apparaître: au message qui apparaît (Type 1 to continue, or 2 to abort) ,taper 1 puis valider.
* Patienter le temps du scan. Le bureau va disparaître à plusieurs reprises: c'est normal!
* Ne toucher à rien tant que le scan n'est pas terminé.
* Une fois le scan achevé, un rapport va s'afficher: poster son contenu, en précisant où en sont les soucis.

* Si le fichier ne s'ouvre pas, il se trouve ici ==> C:\ComboFix.txt



-Renvoyer ensuite un autre rapport HJThis



- Ou en sont les symptômes?


A+


Denis
0
J'ai fait comme tu as dit ; voila le rapport de combofix :

ComboFix 09-01-16.03 - HP_Propriétaire 2009-01-17 21:17:01.2 - NTFSx86
Microsoft Windows XP Édition familiale 5.1.2600.3.1252.1.1036.18.446.107 [GMT 1:00]
Lancé depuis: c:\documents and settings\HP_Propriétaire\Bureau\ComboFix.exe
Commutateurs utilisés :: c:\documents and settings\HP_Propriétaire\Bureau\CFScript.txt
AV: avast! antivirus 4.8.1296 [VPS 090117-0] *On-access scanning disabled* (Outdated)
FW: Norton Internet Worm Protection *disabled*
* Un nouveau point de restauration a été créé
.

((((((((((((((((((((((((((((( Fichiers créés du 2008-12-17 au 2009-01-17 ))))))))))))))))))))))))))))))))))))
.

2100-02-23 17:55 . 2001-04-02 15:30 821 --a------ c:\windows\Lexmark_ICM.ini
2100-02-23 13:35 . 2001-02-22 08:54 768 --a------ c:\windows\x73_lut.dat
2100-02-23 13:35 . 2001-02-22 08:54 768 --a------ c:\program files\x73_lut.dat
2100-02-08 14:53 . 2009-01-06 20:58 1,437 --a------ c:\windows\GtX73.ini
2100-02-08 14:03 . 2001-05-11 09:39 53,248 --a------ c:\program files\ACMonitor_X73.exe
2009-01-13 23:00 . 2003-11-08 01:56 278,528 --a------ c:\windows\system32\hpdj5100
2009-01-13 22:59 . 2006-03-09 20:56 229,415 --a------ c:\windows\hpdj5100.hi1
2009-01-13 22:59 . 2006-03-09 20:56 12,113 --a------ c:\windows\hpdj5100.bu1
2009-01-13 22:28 . 2009-01-13 22:28 <REP> d-------- c:\program files\CCleaner
2009-01-13 21:05 . 2009-01-13 21:05 129 --a------ c:\windows\system32\MRT.INI
2009-01-04 15:22 . 2009-01-04 15:22 <REP> d-------- C:\u torrent
2009-01-04 15:22 . 2009-01-04 15:22 <REP> d-------- c:\program files\uTorrent
2009-01-04 15:04 . 2009-01-04 15:09 <REP> d-------- c:\program files\uTorrent.lng
2009-01-04 14:31 . 2009-01-17 21:14 <REP> d-------- c:\documents and settings\HP_Propriétaire\Application Data\uTorrent
2009-01-04 14:11 . 2009-01-04 14:11 <REP> d-------- c:\program files\Trend Micro
2009-01-04 14:10 . 2009-01-04 14:11 812,344 --a------ C:\HJTInstall.exe
2009-01-04 09:52 . 2009-01-04 09:52 <REP> d-------- c:\program files\Malwarebytes' Anti-Malware
2009-01-04 09:52 . 2009-01-04 09:52 <REP> d-------- c:\documents and settings\HP_Propriétaire\Application Data\Malwarebytes
2009-01-04 09:52 . 2009-01-04 09:52 <REP> d-------- c:\documents and settings\All Users\Application Data\Malwarebytes
2009-01-04 09:52 . 2008-12-03 19:52 38,496 --a------ c:\windows\system32\drivers\mbamswissarmy.sys
2009-01-04 09:52 . 2008-12-03 19:52 15,504 --a------ c:\windows\system32\drivers\mbam.sys
2009-01-04 09:42 . 2009-01-04 09:42 2,539,400 --a------ C:\mbam-setup.exe
2008-12-25 21:35 . 2008-12-25 21:42 <REP> d-------- c:\program files\Spybot - Search & Destroy
2008-12-25 21:35 . 2009-01-17 21:09 <REP> d-------- c:\documents and settings\All Users\Application Data\Spybot - Search & Destroy
2008-12-22 20:28 . 2008-12-22 20:27 410,984 --a------ c:\windows\system32\deploytk.dll
2008-12-21 23:00 . 2008-12-21 23:00 <REP> d-------- c:\program files\Microsoft CAPICOM 2.1.0.2
2008-12-21 19:09 . 2008-10-16 14:06 268,648 --a------ c:\windows\system32\mucltui.dll
2008-12-21 19:09 . 2008-10-16 14:06 208,744 --a------ c:\windows\system32\muweb.dll
2008-12-21 19:09 . 2008-10-16 14:06 27,496 --a------ c:\windows\system32\mucltui.dll.mui
2008-12-21 00:00 . 2009-01-17 20:18 <REP> d-------- c:\documents and settings\HP_Propriétaire\Tracing
2008-12-21 00:00 . 2009-01-17 20:18 <REP> d-------- c:\documents and settings\HP_Propriétaire\Tracing
2008-12-20 23:58 . 2008-12-20 23:58 <REP> d-------- c:\program files\Windows Live SkyDrive
2008-12-20 23:58 . 2008-12-20 23:59 <REP> d-------- c:\program files\Windows Live
2008-12-20 23:58 . 2008-12-20 23:58 <REP> d-------- c:\program files\Microsoft
2008-12-20 23:47 . 2008-12-20 23:47 <REP> d-------- c:\program files\Fichiers communs\Windows Live

.
(((((((((((((((((((((((((((((((((( Compte-rendu de Find3M ))))))))))))))))))))))))))))))))))))))))))))))))
.
2009-01-16 22:00 111,344 ----a-w c:\documents and settings\HP_Propriétaire\Application Data\GDIPFONTCACHEV1.DAT
2009-01-16 20:51 --------- d-----w c:\documents and settings\All Users\Application Data\Google Updater
2009-01-13 22:13 --------- d--h--w c:\program files\InstallShield Installation Information
2009-01-13 22:01 --------- d-----w c:\program files\Hewlett-Packard
2009-01-13 21:58 --------- d-----w c:\program files\AutoCAD LT 97
2009-01-13 21:43 --------- d-----w c:\program files\Pinnacle
2009-01-01 21:37 --------- d-----w c:\program files\Google
2008-12-22 19:27 --------- d-----w c:\program files\Java
2008-12-11 10:57 333,952 ----a-w c:\windows\system32\drivers\srv.sys
2008-12-02 20:35 1,035,178 ----a-w C:\dvdshrink_3.2_CSS-Free_for_ImgBurn_Fr.exe
2001-07-26 14:58 47 ----a-w c:\program files\ACMonitor_X73.ini
2001-07-05 10:46 8,116 ----a-w c:\program files\OSLO3071b2.USB
2001-06-12 12:28 8,154 ----a-w c:\program files\OsloD3069.usb
2001-05-08 13:36 114,688 ----a-w c:\program files\lxarscan.dll
2001-04-23 12:22 1,437 ----a-w c:\program files\gtx73.ini
2006-02-03 19:13 22 --sha-w c:\windows\SMINST\HPCD.sys
.

((((((((((((((((((((((((((((( snapshot@2009-01-13_21.32.59,12 )))))))))))))))))))))))))))))))))))))))))
.
+ 2008-04-14 02:34:06 10,752 ----a-w c:\windows\system32\dllcache\hh.exe
- 2008-12-21 08:23:08 381,632 ----a-w c:\windows\system32\FNTCACHE.DAT
+ 2009-01-13 21:51:36 361,728 ----a-w c:\windows\system32\FNTCACHE.DAT
+ 2009-01-17 19:17:35 16,384 ----atw c:\windows\Temp\Perflib_Perfdata_478.dat
+ 2009-01-17 08:18:14 16,384 ----atw c:\windows\Temp\Perflib_Perfdata_5a8.dat
.
((((((((((((((((((((((((((((((((( Points de chargement Reg ))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* les éléments vides & les éléments initiaux légitimes ne sont pas listés
REGEDIT4

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"ctfmon.exe"="c:\windows\system32\ctfmon.exe" [2008-04-14 15360]
"swg"="c:\program files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe" [2007-07-27 68856]
"msnmsgr"="c:\program files\Windows Live\Messenger\msnmsgr.exe" [2008-12-02 3882312]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"SunJavaUpdateSched"="c:\program files\Java\jre6\bin\jusched.exe" [2008-12-22 136600]
"hpsysdrv"="c:\windows\system\hpsysdrv.exe" [1998-05-07 52736]
"ATIPTA"="c:\program files\ATI Technologies\ATI Control Panel\atiptaxx.exe" [2005-06-08 344064]
"KBD"="c:\hp\KBD\KBD.EXE" [2005-02-03 61440]
"Recguard"="c:\windows\SMINST\RECGUARD.EXE" [2004-04-14 233472]
"PS2"="c:\windows\system32\ps2.exe" [2004-10-25 90112]
"LSBWatcher"="c:\hp\drivers\hplsbwatcher\lsburnwatcher.exe" [2005-05-11 253952]
"PrinTray"="c:\windows\System32\spool\DRIVERS\W32X86\3\printray.exe" [2001-10-12 36864]
"MULTIMEDIA KEYBOARD"="c:\program files\Netropa\Multimedia Keyboard\MMKeybd.exe" [2002-06-19 180224]
"PinnacleDriverCheck"="c:\windows\system32\PSDrvCheck.exe" [2003-03-10 393728]
"HP Component Manager"="c:\program files\HP\hpcoretech\hpcmpmgr.exe" [2004-05-12 241664]
"Lexmark X73 Button Monitor"="c:\progra~1\LEXMAR~1\ACMonitor_X73.exe" [2001-05-11 53248]
"Lexmark X73 Button Manager"="c:\progra~1\LEXMAR~1\AcBtnMgr_X73.exe" [2001-06-11 53248]
"QuickTime Task"="c:\program files\QuickTime\qttask.exe" [2005-01-02 98304]
"ISUSPM Startup"="c:\progra~1\FICHIE~1\INSTAL~1\UPDATE~1\ISUSPM.exe" [2004-07-27 221184]
"ISUSScheduler"="c:\program files\Fichiers communs\InstallShield\UpdateService\issch.exe" [2004-07-27 81920]
"avast!"="c:\progra~1\ALWILS~1\Avast4\ashDisp.exe" [2008-11-26 81000]
"NeroFilterCheck"="c:\windows\system32\NeroCheck.exe" [2001-07-09 155648]
"AlcxMonitor"="ALCXMNTR.EXE" [2004-09-07 c:\windows\ALCXMNTR.EXE]

c:\documents and settings\All Users\Menu D‚marrer\Programmes\D‚marrage\
Adobe Gamma Loader.exe.lnk - c:\program files\Fichiers communs\Adobe\Calibration\Adobe Gamma Loader.exe [2006-02-04 110592]
HP Digital Imaging Monitor.lnk - c:\program files\HP\Digital Imaging\bin\hpqtra08.exe [2005-05-12 282624]
Lancement rapide d'Adobe Reader.lnk - c:\program files\Adobe\Acrobat 7.0\Reader\reader_sl.exe [2008-04-23 29696]
Microsoft Office.lnk - c:\program files\Microsoft Office\Office10\OSA.EXE [2001-02-13 83360]

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\windows]
"AppInit_DLLs"=

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\drivers32]
"VIDC.ACDV"= ACDV.dll

[HKLM\~\startupfolder\C:^Documents and Settings^All Users^Menu Démarrer^Programmes^Démarrage^Image Transfer.lnk]
path=c:\documents and settings\All Users\Menu Démarrer\Programmes\Démarrage\Image Transfer.lnk
backup=c:\windows\pss\Image Transfer.lnkCommon Startup

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\msnmsgr]
--a------ 2008-12-02 22:41 3882312 c:\program files\Windows Live\Messenger\msnmsgr.exe

[HKEY_LOCAL_MACHINE\software\microsoft\security center]
"AntiVirusDisableNotify"=dword:00000001

[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\SymantecFirewall]
"DisableMonitoring"=dword:00000001

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%windir%\\system32\\sessmgr.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpqtra08.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpqste08.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpofxm08.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\bin\\hposfx08.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\bin\\hposid01.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpqscnvw.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpqkygrp.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpqCopy.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpfccopy.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpzwiz01.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\Unload\\HpqPhUnl.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\Unload\\HpqDIA.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpoews01.exe"=
"%windir%\\Network Diagnostic\\xpnetdiag.exe"=
"c:\\WINDOWS\\system32\\mshta.exe"=
"c:\\Program Files\\Windows Live\\Messenger\\wlcsdk.exe"=
"c:\\Program Files\\Windows Live\\Messenger\\msnmsgr.exe"=
"c:\\Program Files\\Messenger\\msmsgs.exe"=
"c:\\Program Files\\uTorrent\\uTorrent.exe"=
"c:\\Program Files\\uTorrent.lng\\uTorrent.exe"=

R1 aswSP;avast! Self Protection;c:\windows\system32\drivers\aswSP.sys [2008-04-05 111184]
R1 msikbd2k;Multimedia Keyboard Filter Driver;c:\windows\system32\drivers\Msikbd2k.sys [2006-02-02 6656]
R4 aswFsBlk;aswFsBlk;c:\windows\system32\drivers\aswFsBlk.sys [2008-04-05 20560]
R4 nhksrv;Netropa NHK Server;c:\program files\Netropa\Multimedia Keyboard\nhksrv.exe [2006-02-02 28672]
.
Contenu du dossier 'Tâches planifiées'

2009-01-17 c:\windows\Tasks\rxbwzwuo.job
- c:\windows\system32\rundll32.exe [2008-04-14 03:34]
.
.
------- Examen supplémentaire -------
.
uStart Page = hxxp://www.google.fr/webhp?sourceid=navclient&hl=fr&ie=UTF-8
uSearchMigratedDefaultURL = hxxp://www.google.com/search?q={searchTerms}&sourceid=ie7&rls=com.microsoft:en-US&ie=utf8&oe=utf8
uSearchURL,(Default) = hxxp://www.google.com/search?q=%s
IE: E&xporter vers Microsoft Excel - c:\progra~1\MICROS~3\Office10\EXCEL.EXE/3000
.

**************************************************************************

catchme 0.3.1367 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2009-01-17 21:19:58
Windows 5.1.2600 Service Pack 3 NTFS

Recherche de processus cachés ...

Recherche d'éléments en démarrage automatique cachés ...

Recherche de fichiers cachés ...

Scan terminé avec succès
Fichiers cachés: 0

**************************************************************************
.
--------------------- DLLs chargées dans les processus actifs ---------------------

- - - - - - - > 'winlogon.exe'(532)
c:\windows\system32\Ati2evxx.dll
.
Heure de fin: 2009-01-17 21:23:47
ComboFix-quarantined-files.txt 2009-01-17 20:23:18
ComboFix2.txt 2009-01-13 20:35:18

Avant-CF: 95 756 337 152 octets libres
Après-CF: 95,743,979,520 octets libres

179 --- E O F --- 2009-01-13 20:06:40




Le rapport de hijackthis :

Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 21:38:03, on 17/01/2009
Platform: Windows XP SP3 (WinNT 5.01.2600)
MSIE: Internet Explorer v7.00 (7.00.6000.16762)
Boot mode: Normal

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\Ati2evxx.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\Ati2evxx.exe
C:\Program Files\Alwil Software\Avast4\aswUpdSv.exe
C:\Program Files\Alwil Software\Avast4\ashServ.exe
C:\Program Files\Java\jre6\bin\jusched.exe
C:\windows\system\hpsysdrv.exe
C:\Program Files\ATI Technologies\ATI Control Panel\atiptaxx.exe
C:\HP\KBD\KBD.EXE
C:\WINDOWS\system32\LEXBCES.EXE
C:\WINDOWS\system32\LEXPPS.EXE
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\ALCXMNTR.EXE
C:\WINDOWS\System32\spool\DRIVERS\W32X86\3\printray.exe
C:\Program Files\Netropa\Multimedia Keyboard\MMKeybd.exe
C:\PROGRA~1\LEXMAR~1\ACMonitor_X73.exe
C:\PROGRA~1\LEXMAR~1\AcBtnMgr_X73.exe
C:\Program Files\QuickTime\qttask.exe
C:\Program Files\Fichiers communs\InstallShield\UpdateService\issch.exe
C:\PROGRA~1\ALWILS~1\Avast4\ashDisp.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe
C:\Program Files\Netropa\Multimedia Keyboard\nhksrv.exe
C:\Program Files\Google\Common\Google Updater\GoogleUpdaterService.exe
C:\Program Files\Netropa\Multimedia Keyboard\TrayMon.exe
C:\Program Files\Java\jre6\bin\jqs.exe
C:\Program Files\Netropa\Onscreen Display\OSD.exe
C:\Program Files\Fichiers communs\Microsoft Shared\VS7Debug\mdm.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\system32\wbem\wmiapsrv.exe
C:\WINDOWS\system32\rundll32.exe
C:\WINDOWS\explorer.exe
C:\Program Files\Alwil Software\Avast4\ashMaiSv.exe
C:\Program Files\Alwil Software\Avast4\ashWebSv.exe
C:\Program Files\Trend Micro\HijackThis\HijackThis.exe

R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = https://www.google.fr/webhp?sourceid=navclient&hl=fr&ie=UTF-8&gws_rd=ssl
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = https://www.msn.com/fr-fr/?ocid=iehp
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = https://www.bing.com/?toHttps=1&redig=5FC791212101479BAFBE1A679848B1AF
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = https://www.bing.com/?toHttps=1&redig=5FC791212101479BAFBE1A679848B1AF
R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName = Liens
O2 - BHO: Spybot-S&D IE Protection - {53707962-6F74-2D53-2644-206D7942484F} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O2 - BHO: Java(tm) Plug-In SSV Helper - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre6\bin\ssv.dll
O2 - BHO: Programme d'aide de l'Assistant de connexion Windows Live - {9030D464-4C02-4ABF-8ECC-5164760863C6} - C:\Program Files\Fichiers communs\Microsoft Shared\Windows Live\WindowsLiveLogin.dll
O2 - BHO: Google Toolbar Helper - {AA58ED58-01DD-4d91-8333-CF10577473F7} - C:\Program Files\Google\Google Toolbar\GoogleToolbar.dll
O2 - BHO: Google Toolbar Notifier BHO - {AF69DE43-7D58-4638-B6FA-CE66B5AD205D} - C:\Program Files\Google\GoogleToolbarNotifier\5.0.926.3450\swg.dll
O2 - BHO: Java(tm) Plug-In 2 SSV Helper - {DBC80044-A445-435b-BC74-9C25C1C588A9} - C:\Program Files\Java\jre6\bin\jp2ssv.dll
O3 - Toolbar: &Google Toolbar - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - C:\Program Files\Google\Google Toolbar\GoogleToolbar.dll
O4 - HKLM\..\Run: [SunJavaUpdateSched] "C:\Program Files\Java\jre6\bin\jusched.exe"
O4 - HKLM\..\Run: [hpsysdrv] c:\windows\system\hpsysdrv.exe
O4 - HKLM\..\Run: [ATIPTA] C:\Program Files\ATI Technologies\ATI Control Panel\atiptaxx.exe
O4 - HKLM\..\Run: [KBD] C:\HP\KBD\KBD.EXE
O4 - HKLM\..\Run: [Recguard] C:\WINDOWS\SMINST\RECGUARD.EXE
O4 - HKLM\..\Run: [AlcxMonitor] ALCXMNTR.EXE
O4 - HKLM\..\Run: [PS2] C:\WINDOWS\system32\ps2.exe
O4 - HKLM\..\Run: [LSBWatcher] c:\hp\drivers\hplsbwatcher\lsburnwatcher.exe
O4 - HKLM\..\Run: [PrinTray] C:\WINDOWS\System32\spool\DRIVERS\W32X86\3\printray.exe
O4 - HKLM\..\Run: [MULTIMEDIA KEYBOARD] C:\Program Files\Netropa\Multimedia Keyboard\MMKeybd.exe
O4 - HKLM\..\Run: [PinnacleDriverCheck] C:\WINDOWS\system32\PSDrvCheck.exe
O4 - HKLM\..\Run: [HP Component Manager] "C:\Program Files\HP\hpcoretech\hpcmpmgr.exe"
O4 - HKLM\..\Run: [Lexmark X73 Button Monitor] C:\PROGRA~1\LEXMAR~1\ACMonitor_X73.exe
O4 - HKLM\..\Run: [Lexmark X73 Button Manager] C:\PROGRA~1\LEXMAR~1\AcBtnMgr_X73.exe
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
O4 - HKLM\..\Run: [ISUSPM Startup] C:\PROGRA~1\FICHIE~1\INSTAL~1\UPDATE~1\ISUSPM.exe -startup
O4 - HKLM\..\Run: [ISUSScheduler] "C:\Program Files\Fichiers communs\InstallShield\UpdateService\issch.exe" -start
O4 - HKLM\..\Run: [avast!] C:\PROGRA~1\ALWILS~1\Avast4\ashDisp.exe
O4 - HKLM\..\Run: [NeroFilterCheck] C:\WINDOWS\system32\NeroCheck.exe
O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
O4 - HKCU\..\Run: [swg] C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe
O4 - HKCU\..\Run: [msnmsgr] "C:\Program Files\Windows Live\Messenger\msnmsgr.exe" /background
O4 - Global Startup: Adobe Gamma Loader.exe.lnk = C:\Program Files\Fichiers communs\Adobe\Calibration\Adobe Gamma Loader.exe
O4 - Global Startup: HP Digital Imaging Monitor.lnk = C:\Program Files\HP\Digital Imaging\bin\hpqtra08.exe
O4 - Global Startup: Lancement rapide d'Adobe Reader.lnk = C:\Program Files\Adobe\Acrobat 7.0\Reader\reader_sl.exe
O4 - Global Startup: Microsoft Office.lnk = C:\Program Files\Microsoft Office\Office10\OSA.EXE
O8 - Extra context menu item: E&xporter vers Microsoft Excel - res://C:\PROGRA~1\MICROS~3\Office10\EXCEL.EXE/3000
O9 - Extra button: Run WinHTTrack - {36ECAF82-3300-8F84-092E-AFF36D6C7040} - C:\Program Files\WinHTTrack\WinHTTrackIEBar.dll
O9 - Extra 'Tools' menuitem: Launch WinHTTrack - {36ECAF82-3300-8F84-092E-AFF36D6C7040} - C:\Program Files\WinHTTrack\WinHTTrackIEBar.dll
O9 - Extra button: (no name) - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O9 - Extra 'Tools' menuitem: Spybot - Search & Destroy Configuration - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O9 - Extra button: Aide à la connexion - {E2D4D26B-0180-43a4-B05F-462D6D54C789} - C:\WINDOWS\PCHEALTH\HELPCTR\Vendors\CN=Hewlett-Packard,L=Cupertino,S=Ca,C=US\IEButton\support.htm
O9 - Extra 'Tools' menuitem: Aide à la connexion - {E2D4D26B-0180-43a4-B05F-462D6D54C789} - C:\WINDOWS\PCHEALTH\HELPCTR\Vendors\CN=Hewlett-Packard,L=Cupertino,S=Ca,C=US\IEButton\support.htm
O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O16 - DPF: {4F1E5B1A-2A80-42CA-8532-2D05CB959537} (MSN Photo Upload Tool) - http://gfx2.hotmail.com/mail/w2/resources/MSNPUpld.cab
O16 - DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} (Shockwave Flash Object) - http://fpdownload2.macromedia.com/get/shockwave/cabs/flash/swflash.cab
O20 - AppInit_DLLs:
O23 - Service: avast! iAVS4 Control Service (aswUpdSv) - ALWIL Software - C:\Program Files\Alwil Software\Avast4\aswUpdSv.exe
O23 - Service: Ati HotKey Poller - ATI Technologies Inc. - C:\WINDOWS\system32\Ati2evxx.exe
O23 - Service: avast! Antivirus - ALWIL Software - C:\Program Files\Alwil Software\Avast4\ashServ.exe
O23 - Service: avast! Mail Scanner - ALWIL Software - C:\Program Files\Alwil Software\Avast4\ashMaiSv.exe
O23 - Service: avast! Web Scanner - ALWIL Software - C:\Program Files\Alwil Software\Avast4\ashWebSv.exe
O23 - Service: Google Updater Service (gusvc) - Google - C:\Program Files\Google\Common\Google Updater\GoogleUpdaterService.exe
O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Fichiers communs\InstallShield\Driver\1050\Intel 32\IDriverT.exe
O23 - Service: Java Quick Starter (JavaQuickStarterService) - Sun Microsystems, Inc. - C:\Program Files\Java\jre6\bin\jqs.exe
O23 - Service: LexBce Server (LexBceS) - Lexmark International, Inc. - C:\WINDOWS\system32\LEXBCES.EXE
O23 - Service: Netropa NHK Server (nhksrv) - Unknown owner - C:\Program Files\Netropa\Multimedia Keyboard\nhksrv.exe
0
J'ai fait comme tu as dit ; voila le rapport de combofix :

ComboFix 09-01-16.03 - HP_Propriétaire 2009-01-17 21:17:01.2 - NTFSx86
Microsoft Windows XP Édition familiale 5.1.2600.3.1252.1.1036.18.446.107 [GMT 1:00]
Lancé depuis: c:\documents and settings\HP_Propriétaire\Bureau\ComboFix.exe
Commutateurs utilisés :: c:\documents and settings\HP_Propriétaire\Bureau\CFScript.txt
AV: avast! antivirus 4.8.1296 [VPS 090117-0] *On-access scanning disabled* (Outdated)
FW: Norton Internet Worm Protection *disabled*
* Un nouveau point de restauration a été créé
.

((((((((((((((((((((((((((((( Fichiers créés du 2008-12-17 au 2009-01-17 ))))))))))))))))))))))))))))))))))))
.

2100-02-23 17:55 . 2001-04-02 15:30 821 --a------ c:\windows\Lexmark_ICM.ini
2100-02-23 13:35 . 2001-02-22 08:54 768 --a------ c:\windows\x73_lut.dat
2100-02-23 13:35 . 2001-02-22 08:54 768 --a------ c:\program files\x73_lut.dat
2100-02-08 14:53 . 2009-01-06 20:58 1,437 --a------ c:\windows\GtX73.ini
2100-02-08 14:03 . 2001-05-11 09:39 53,248 --a------ c:\program files\ACMonitor_X73.exe
2009-01-13 23:00 . 2003-11-08 01:56 278,528 --a------ c:\windows\system32\hpdj5100
2009-01-13 22:59 . 2006-03-09 20:56 229,415 --a------ c:\windows\hpdj5100.hi1
2009-01-13 22:59 . 2006-03-09 20:56 12,113 --a------ c:\windows\hpdj5100.bu1
2009-01-13 22:28 . 2009-01-13 22:28 <REP> d-------- c:\program files\CCleaner
2009-01-13 21:05 . 2009-01-13 21:05 129 --a------ c:\windows\system32\MRT.INI
2009-01-04 15:22 . 2009-01-04 15:22 <REP> d-------- C:\u torrent
2009-01-04 15:22 . 2009-01-04 15:22 <REP> d-------- c:\program files\uTorrent
2009-01-04 15:04 . 2009-01-04 15:09 <REP> d-------- c:\program files\uTorrent.lng
2009-01-04 14:31 . 2009-01-17 21:14 <REP> d-------- c:\documents and settings\HP_Propriétaire\Application Data\uTorrent
2009-01-04 14:11 . 2009-01-04 14:11 <REP> d-------- c:\program files\Trend Micro
2009-01-04 14:10 . 2009-01-04 14:11 812,344 --a------ C:\HJTInstall.exe
2009-01-04 09:52 . 2009-01-04 09:52 <REP> d-------- c:\program files\Malwarebytes' Anti-Malware
2009-01-04 09:52 . 2009-01-04 09:52 <REP> d-------- c:\documents and settings\HP_Propriétaire\Application Data\Malwarebytes
2009-01-04 09:52 . 2009-01-04 09:52 <REP> d-------- c:\documents and settings\All Users\Application Data\Malwarebytes
2009-01-04 09:52 . 2008-12-03 19:52 38,496 --a------ c:\windows\system32\drivers\mbamswissarmy.sys
2009-01-04 09:52 . 2008-12-03 19:52 15,504 --a------ c:\windows\system32\drivers\mbam.sys
2009-01-04 09:42 . 2009-01-04 09:42 2,539,400 --a------ C:\mbam-setup.exe
2008-12-25 21:35 . 2008-12-25 21:42 <REP> d-------- c:\program files\Spybot - Search & Destroy
2008-12-25 21:35 . 2009-01-17 21:09 <REP> d-------- c:\documents and settings\All Users\Application Data\Spybot - Search & Destroy
2008-12-22 20:28 . 2008-12-22 20:27 410,984 --a------ c:\windows\system32\deploytk.dll
2008-12-21 23:00 . 2008-12-21 23:00 <REP> d-------- c:\program files\Microsoft CAPICOM 2.1.0.2
2008-12-21 19:09 . 2008-10-16 14:06 268,648 --a------ c:\windows\system32\mucltui.dll
2008-12-21 19:09 . 2008-10-16 14:06 208,744 --a------ c:\windows\system32\muweb.dll
2008-12-21 19:09 . 2008-10-16 14:06 27,496 --a------ c:\windows\system32\mucltui.dll.mui
2008-12-21 00:00 . 2009-01-17 20:18 <REP> d-------- c:\documents and settings\HP_Propriétaire\Tracing
2008-12-21 00:00 . 2009-01-17 20:18 <REP> d-------- c:\documents and settings\HP_Propriétaire\Tracing
2008-12-20 23:58 . 2008-12-20 23:58 <REP> d-------- c:\program files\Windows Live SkyDrive
2008-12-20 23:58 . 2008-12-20 23:59 <REP> d-------- c:\program files\Windows Live
2008-12-20 23:58 . 2008-12-20 23:58 <REP> d-------- c:\program files\Microsoft
2008-12-20 23:47 . 2008-12-20 23:47 <REP> d-------- c:\program files\Fichiers communs\Windows Live

.
(((((((((((((((((((((((((((((((((( Compte-rendu de Find3M ))))))))))))))))))))))))))))))))))))))))))))))))
.
2009-01-16 22:00 111,344 ----a-w c:\documents and settings\HP_Propriétaire\Application Data\GDIPFONTCACHEV1.DAT
2009-01-16 20:51 --------- d-----w c:\documents and settings\All Users\Application Data\Google Updater
2009-01-13 22:13 --------- d--h--w c:\program files\InstallShield Installation Information
2009-01-13 22:01 --------- d-----w c:\program files\Hewlett-Packard
2009-01-13 21:58 --------- d-----w c:\program files\AutoCAD LT 97
2009-01-13 21:43 --------- d-----w c:\program files\Pinnacle
2009-01-01 21:37 --------- d-----w c:\program files\Google
2008-12-22 19:27 --------- d-----w c:\program files\Java
2008-12-11 10:57 333,952 ----a-w c:\windows\system32\drivers\srv.sys
2008-12-02 20:35 1,035,178 ----a-w C:\dvdshrink_3.2_CSS-Free_for_ImgBurn_Fr.exe
2001-07-26 14:58 47 ----a-w c:\program files\ACMonitor_X73.ini
2001-07-05 10:46 8,116 ----a-w c:\program files\OSLO3071b2.USB
2001-06-12 12:28 8,154 ----a-w c:\program files\OsloD3069.usb
2001-05-08 13:36 114,688 ----a-w c:\program files\lxarscan.dll
2001-04-23 12:22 1,437 ----a-w c:\program files\gtx73.ini
2006-02-03 19:13 22 --sha-w c:\windows\SMINST\HPCD.sys
.

((((((((((((((((((((((((((((( snapshot@2009-01-13_21.32.59,12 )))))))))))))))))))))))))))))))))))))))))
.
+ 2008-04-14 02:34:06 10,752 ----a-w c:\windows\system32\dllcache\hh.exe
- 2008-12-21 08:23:08 381,632 ----a-w c:\windows\system32\FNTCACHE.DAT
+ 2009-01-13 21:51:36 361,728 ----a-w c:\windows\system32\FNTCACHE.DAT
+ 2009-01-17 19:17:35 16,384 ----atw c:\windows\Temp\Perflib_Perfdata_478.dat
+ 2009-01-17 08:18:14 16,384 ----atw c:\windows\Temp\Perflib_Perfdata_5a8.dat
.
((((((((((((((((((((((((((((((((( Points de chargement Reg ))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* les éléments vides & les éléments initiaux légitimes ne sont pas listés
REGEDIT4

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"ctfmon.exe"="c:\windows\system32\ctfmon.exe" [2008-04-14 15360]
"swg"="c:\program files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe" [2007-07-27 68856]
"msnmsgr"="c:\program files\Windows Live\Messenger\msnmsgr.exe" [2008-12-02 3882312]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"SunJavaUpdateSched"="c:\program files\Java\jre6\bin\jusched.exe" [2008-12-22 136600]
"hpsysdrv"="c:\windows\system\hpsysdrv.exe" [1998-05-07 52736]
"ATIPTA"="c:\program files\ATI Technologies\ATI Control Panel\atiptaxx.exe" [2005-06-08 344064]
"KBD"="c:\hp\KBD\KBD.EXE" [2005-02-03 61440]
"Recguard"="c:\windows\SMINST\RECGUARD.EXE" [2004-04-14 233472]
"PS2"="c:\windows\system32\ps2.exe" [2004-10-25 90112]
"LSBWatcher"="c:\hp\drivers\hplsbwatcher\lsburnwatcher.exe" [2005-05-11 253952]
"PrinTray"="c:\windows\System32\spool\DRIVERS\W32X86\3\printray.exe" [2001-10-12 36864]
"MULTIMEDIA KEYBOARD"="c:\program files\Netropa\Multimedia Keyboard\MMKeybd.exe" [2002-06-19 180224]
"PinnacleDriverCheck"="c:\windows\system32\PSDrvCheck.exe" [2003-03-10 393728]
"HP Component Manager"="c:\program files\HP\hpcoretech\hpcmpmgr.exe" [2004-05-12 241664]
"Lexmark X73 Button Monitor"="c:\progra~1\LEXMAR~1\ACMonitor_X73.exe" [2001-05-11 53248]
"Lexmark X73 Button Manager"="c:\progra~1\LEXMAR~1\AcBtnMgr_X73.exe" [2001-06-11 53248]
"QuickTime Task"="c:\program files\QuickTime\qttask.exe" [2005-01-02 98304]
"ISUSPM Startup"="c:\progra~1\FICHIE~1\INSTAL~1\UPDATE~1\ISUSPM.exe" [2004-07-27 221184]
"ISUSScheduler"="c:\program files\Fichiers communs\InstallShield\UpdateService\issch.exe" [2004-07-27 81920]
"avast!"="c:\progra~1\ALWILS~1\Avast4\ashDisp.exe" [2008-11-26 81000]
"NeroFilterCheck"="c:\windows\system32\NeroCheck.exe" [2001-07-09 155648]
"AlcxMonitor"="ALCXMNTR.EXE" [2004-09-07 c:\windows\ALCXMNTR.EXE]

c:\documents and settings\All Users\Menu D‚marrer\Programmes\D‚marrage\
Adobe Gamma Loader.exe.lnk - c:\program files\Fichiers communs\Adobe\Calibration\Adobe Gamma Loader.exe [2006-02-04 110592]
HP Digital Imaging Monitor.lnk - c:\program files\HP\Digital Imaging\bin\hpqtra08.exe [2005-05-12 282624]
Lancement rapide d'Adobe Reader.lnk - c:\program files\Adobe\Acrobat 7.0\Reader\reader_sl.exe [2008-04-23 29696]
Microsoft Office.lnk - c:\program files\Microsoft Office\Office10\OSA.EXE [2001-02-13 83360]

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\windows]
"AppInit_DLLs"=

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\drivers32]
"VIDC.ACDV"= ACDV.dll

[HKLM\~\startupfolder\C:^Documents and Settings^All Users^Menu Démarrer^Programmes^Démarrage^Image Transfer.lnk]
path=c:\documents and settings\All Users\Menu Démarrer\Programmes\Démarrage\Image Transfer.lnk
backup=c:\windows\pss\Image Transfer.lnkCommon Startup

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\msnmsgr]
--a------ 2008-12-02 22:41 3882312 c:\program files\Windows Live\Messenger\msnmsgr.exe

[HKEY_LOCAL_MACHINE\software\microsoft\security center]
"AntiVirusDisableNotify"=dword:00000001

[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\SymantecFirewall]
"DisableMonitoring"=dword:00000001

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%windir%\\system32\\sessmgr.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpqtra08.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpqste08.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpofxm08.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\bin\\hposfx08.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\bin\\hposid01.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpqscnvw.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpqkygrp.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpqCopy.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpfccopy.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpzwiz01.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\Unload\\HpqPhUnl.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\Unload\\HpqDIA.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpoews01.exe"=
"%windir%\\Network Diagnostic\\xpnetdiag.exe"=
"c:\\WINDOWS\\system32\\mshta.exe"=
"c:\\Program Files\\Windows Live\\Messenger\\wlcsdk.exe"=
"c:\\Program Files\\Windows Live\\Messenger\\msnmsgr.exe"=
"c:\\Program Files\\Messenger\\msmsgs.exe"=
"c:\\Program Files\\uTorrent\\uTorrent.exe"=
"c:\\Program Files\\uTorrent.lng\\uTorrent.exe"=

R1 aswSP;avast! Self Protection;c:\windows\system32\drivers\aswSP.sys [2008-04-05 111184]
R1 msikbd2k;Multimedia Keyboard Filter Driver;c:\windows\system32\drivers\Msikbd2k.sys [2006-02-02 6656]
R4 aswFsBlk;aswFsBlk;c:\windows\system32\drivers\aswFsBlk.sys [2008-04-05 20560]
R4 nhksrv;Netropa NHK Server;c:\program files\Netropa\Multimedia Keyboard\nhksrv.exe [2006-02-02 28672]
.
Contenu du dossier 'Tâches planifiées'

2009-01-17 c:\windows\Tasks\rxbwzwuo.job
- c:\windows\system32\rundll32.exe [2008-04-14 03:34]
.
.
------- Examen supplémentaire -------
.
uStart Page = hxxp://www.google.fr/webhp?sourceid=navclient&hl=fr&ie=UTF-8
uSearchMigratedDefaultURL = hxxp://www.google.com/search?q={searchTerms}&sourceid=ie7&rls=com.microsoft:en-US&ie=utf8&oe=utf8
uSearchURL,(Default) = hxxp://www.google.com/search?q=%s
IE: E&xporter vers Microsoft Excel - c:\progra~1\MICROS~3\Office10\EXCEL.EXE/3000
.

**************************************************************************

catchme 0.3.1367 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2009-01-17 21:19:58
Windows 5.1.2600 Service Pack 3 NTFS

Recherche de processus cachés ...

Recherche d'éléments en démarrage automatique cachés ...

Recherche de fichiers cachés ...

Scan terminé avec succès
Fichiers cachés: 0

**************************************************************************
.
--------------------- DLLs chargées dans les processus actifs ---------------------

- - - - - - - > 'winlogon.exe'(532)
c:\windows\system32\Ati2evxx.dll
.
Heure de fin: 2009-01-17 21:23:47
ComboFix-quarantined-files.txt 2009-01-17 20:23:18
ComboFix2.txt 2009-01-13 20:35:18

Avant-CF: 95 756 337 152 octets libres
Après-CF: 95,743,979,520 octets libres

179 --- E O F --- 2009-01-13 20:06:40




Le rapport de hijackthis :

Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 21:38:03, on 17/01/2009
Platform: Windows XP SP3 (WinNT 5.01.2600)
MSIE: Internet Explorer v7.00 (7.00.6000.16762)
Boot mode: Normal

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\Ati2evxx.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\Ati2evxx.exe
C:\Program Files\Alwil Software\Avast4\aswUpdSv.exe
C:\Program Files\Alwil Software\Avast4\ashServ.exe
C:\Program Files\Java\jre6\bin\jusched.exe
C:\windows\system\hpsysdrv.exe
C:\Program Files\ATI Technologies\ATI Control Panel\atiptaxx.exe
C:\HP\KBD\KBD.EXE
C:\WINDOWS\system32\LEXBCES.EXE
C:\WINDOWS\system32\LEXPPS.EXE
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\ALCXMNTR.EXE
C:\WINDOWS\System32\spool\DRIVERS\W32X86\3\printray.exe
C:\Program Files\Netropa\Multimedia Keyboard\MMKeybd.exe
C:\PROGRA~1\LEXMAR~1\ACMonitor_X73.exe
C:\PROGRA~1\LEXMAR~1\AcBtnMgr_X73.exe
C:\Program Files\QuickTime\qttask.exe
C:\Program Files\Fichiers communs\InstallShield\UpdateService\issch.exe
C:\PROGRA~1\ALWILS~1\Avast4\ashDisp.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe
C:\Program Files\Netropa\Multimedia Keyboard\nhksrv.exe
C:\Program Files\Google\Common\Google Updater\GoogleUpdaterService.exe
C:\Program Files\Netropa\Multimedia Keyboard\TrayMon.exe
C:\Program Files\Java\jre6\bin\jqs.exe
C:\Program Files\Netropa\Onscreen Display\OSD.exe
C:\Program Files\Fichiers communs\Microsoft Shared\VS7Debug\mdm.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\system32\wbem\wmiapsrv.exe
C:\WINDOWS\system32\rundll32.exe
C:\WINDOWS\explorer.exe
C:\Program Files\Alwil Software\Avast4\ashMaiSv.exe
C:\Program Files\Alwil Software\Avast4\ashWebSv.exe
C:\Program Files\Trend Micro\HijackThis\HijackThis.exe

R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = https://www.google.fr/webhp?sourceid=navclient&hl=fr&ie=UTF-8&gws_rd=ssl
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = https://www.msn.com/fr-fr/?ocid=iehp
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = https://www.bing.com/?toHttps=1&redig=5FC791212101479BAFBE1A679848B1AF
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = https://www.bing.com/?toHttps=1&redig=5FC791212101479BAFBE1A679848B1AF
R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName = Liens
O2 - BHO: Spybot-S&D IE Protection - {53707962-6F74-2D53-2644-206D7942484F} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O2 - BHO: Java(tm) Plug-In SSV Helper - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre6\bin\ssv.dll
O2 - BHO: Programme d'aide de l'Assistant de connexion Windows Live - {9030D464-4C02-4ABF-8ECC-5164760863C6} - C:\Program Files\Fichiers communs\Microsoft Shared\Windows Live\WindowsLiveLogin.dll
O2 - BHO: Google Toolbar Helper - {AA58ED58-01DD-4d91-8333-CF10577473F7} - C:\Program Files\Google\Google Toolbar\GoogleToolbar.dll
O2 - BHO: Google Toolbar Notifier BHO - {AF69DE43-7D58-4638-B6FA-CE66B5AD205D} - C:\Program Files\Google\GoogleToolbarNotifier\5.0.926.3450\swg.dll
O2 - BHO: Java(tm) Plug-In 2 SSV Helper - {DBC80044-A445-435b-BC74-9C25C1C588A9} - C:\Program Files\Java\jre6\bin\jp2ssv.dll
O3 - Toolbar: &Google Toolbar - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - C:\Program Files\Google\Google Toolbar\GoogleToolbar.dll
O4 - HKLM\..\Run: [SunJavaUpdateSched] "C:\Program Files\Java\jre6\bin\jusched.exe"
O4 - HKLM\..\Run: [hpsysdrv] c:\windows\system\hpsysdrv.exe
O4 - HKLM\..\Run: [ATIPTA] C:\Program Files\ATI Technologies\ATI Control Panel\atiptaxx.exe
O4 - HKLM\..\Run: [KBD] C:\HP\KBD\KBD.EXE
O4 - HKLM\..\Run: [Recguard] C:\WINDOWS\SMINST\RECGUARD.EXE
O4 - HKLM\..\Run: [AlcxMonitor] ALCXMNTR.EXE
O4 - HKLM\..\Run: [PS2] C:\WINDOWS\system32\ps2.exe
O4 - HKLM\..\Run: [LSBWatcher] c:\hp\drivers\hplsbwatcher\lsburnwatcher.exe
O4 - HKLM\..\Run: [PrinTray] C:\WINDOWS\System32\spool\DRIVERS\W32X86\3\printray.exe
O4 - HKLM\..\Run: [MULTIMEDIA KEYBOARD] C:\Program Files\Netropa\Multimedia Keyboard\MMKeybd.exe
O4 - HKLM\..\Run: [PinnacleDriverCheck] C:\WINDOWS\system32\PSDrvCheck.exe
O4 - HKLM\..\Run: [HP Component Manager] "C:\Program Files\HP\hpcoretech\hpcmpmgr.exe"
O4 - HKLM\..\Run: [Lexmark X73 Button Monitor] C:\PROGRA~1\LEXMAR~1\ACMonitor_X73.exe
O4 - HKLM\..\Run: [Lexmark X73 Button Manager] C:\PROGRA~1\LEXMAR~1\AcBtnMgr_X73.exe
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
O4 - HKLM\..\Run: [ISUSPM Startup] C:\PROGRA~1\FICHIE~1\INSTAL~1\UPDATE~1\ISUSPM.exe -startup
O4 - HKLM\..\Run: [ISUSScheduler] "C:\Program Files\Fichiers communs\InstallShield\UpdateService\issch.exe" -start
O4 - HKLM\..\Run: [avast!] C:\PROGRA~1\ALWILS~1\Avast4\ashDisp.exe
O4 - HKLM\..\Run: [NeroFilterCheck] C:\WINDOWS\system32\NeroCheck.exe
O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
O4 - HKCU\..\Run: [swg] C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe
O4 - HKCU\..\Run: [msnmsgr] "C:\Program Files\Windows Live\Messenger\msnmsgr.exe" /background
O4 - Global Startup: Adobe Gamma Loader.exe.lnk = C:\Program Files\Fichiers communs\Adobe\Calibration\Adobe Gamma Loader.exe
O4 - Global Startup: HP Digital Imaging Monitor.lnk = C:\Program Files\HP\Digital Imaging\bin\hpqtra08.exe
O4 - Global Startup: Lancement rapide d'Adobe Reader.lnk = C:\Program Files\Adobe\Acrobat 7.0\Reader\reader_sl.exe
O4 - Global Startup: Microsoft Office.lnk = C:\Program Files\Microsoft Office\Office10\OSA.EXE
O8 - Extra context menu item: E&xporter vers Microsoft Excel - res://C:\PROGRA~1\MICROS~3\Office10\EXCEL.EXE/3000
O9 - Extra button: Run WinHTTrack - {36ECAF82-3300-8F84-092E-AFF36D6C7040} - C:\Program Files\WinHTTrack\WinHTTrackIEBar.dll
O9 - Extra 'Tools' menuitem: Launch WinHTTrack - {36ECAF82-3300-8F84-092E-AFF36D6C7040} - C:\Program Files\WinHTTrack\WinHTTrackIEBar.dll
O9 - Extra button: (no name) - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O9 - Extra 'Tools' menuitem: Spybot - Search & Destroy Configuration - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O9 - Extra button: Aide à la connexion - {E2D4D26B-0180-43a4-B05F-462D6D54C789} - C:\WINDOWS\PCHEALTH\HELPCTR\Vendors\CN=Hewlett-Packard,L=Cupertino,S=Ca,C=US\IEButton\support.htm
O9 - Extra 'Tools' menuitem: Aide à la connexion - {E2D4D26B-0180-43a4-B05F-462D6D54C789} - C:\WINDOWS\PCHEALTH\HELPCTR\Vendors\CN=Hewlett-Packard,L=Cupertino,S=Ca,C=US\IEButton\support.htm
O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O16 - DPF: {4F1E5B1A-2A80-42CA-8532-2D05CB959537} (MSN Photo Upload Tool) - http://gfx2.hotmail.com/mail/w2/resources/MSNPUpld.cab
O16 - DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} (Shockwave Flash Object) - http://fpdownload2.macromedia.com/get/shockwave/cabs/flash/swflash.cab
O20 - AppInit_DLLs:
O23 - Service: avast! iAVS4 Control Service (aswUpdSv) - ALWIL Software - C:\Program Files\Alwil Software\Avast4\aswUpdSv.exe
O23 - Service: Ati HotKey Poller - ATI Technologies Inc. - C:\WINDOWS\system32\Ati2evxx.exe
O23 - Service: avast! Antivirus - ALWIL Software - C:\Program Files\Alwil Software\Avast4\ashServ.exe
O23 - Service: avast! Mail Scanner - ALWIL Software - C:\Program Files\Alwil Software\Avast4\ashMaiSv.exe
O23 - Service: avast! Web Scanner - ALWIL Software - C:\Program Files\Alwil Software\Avast4\ashWebSv.exe
O23 - Service: Google Updater Service (gusvc) - Google - C:\Program Files\Google\Common\Google Updater\GoogleUpdaterService.exe
O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Fichiers communs\InstallShield\Driver\1050\Intel 32\IDriverT.exe
O23 - Service: Java Quick Starter (JavaQuickStarterService) - Sun Microsystems, Inc. - C:\Program Files\Java\jre6\bin\jqs.exe
O23 - Service: LexBce Server (LexBceS) - Lexmark International, Inc. - C:\WINDOWS\system32\LEXBCES.EXE
O23 - Service: Netropa NHK Server (nhksrv) - Unknown owner - C:\Program Files\Netropa\Multimedia Keyboard\nhksrv.exe
0
DeNisCoOl Messages postés 2802 Date d'inscription vendredi 19 août 2005 Statut Membre Dernière intervention 28 février 2011 224
18 janv. 2009 à 02:12
salut,

Relancer HiJackthis cliquer sur Do a scan only et cocher les lignes en gras:


O4 - HKLM\..\Run: [AlcxMonitor] ALCXMNTR.EXE


Comment fixer une ligne: (Merci a Balltrap34 pour cette réalisation vidéo)
http://pagesperso-orange.fr/rginformatique/section%20virus/demohijack.htm
Fermer toutes tes applications et ton navigateur puis fix checked.


---------------------------------
• Désinstaller ComboFix en copiant/collant la ligne en gras ci dessous dans le menu windows démarrer/ exécuter et valider la:
ComboFix /u


---------------------------------
Je vous conseillerais Firefox, plus sure, plus rapide et plus souple que IExplorer : http://www.mozilla-europe.org/fr/products/firefox/

* Pour les cookies s'assurer de tout est correctement configurer, Outils / Options / Vie privée >
* Cookies / Les conserver jusqu'à : la fermeture de firefox.
* Vie privée cocher : Toujours effacer mes informations personnelles à la fermeture de Firefox.

Voici un lien pour encore mieux optimiser la vitesse de navigation:
http://www.commentcamarche.net/faq/sujet 852 firefox optimisation ameliorer les performances
ou automatiquement regarder ici:
https://www.01net.com/telecharger/windows/Internet/navigateur/fiches/31802.html


---------------------------------
Mises à jours en particulier Adobe, Flash, et autres programmes.
Updatechecker : https://filehippo.com/windows/tuning-utilities/
Quelques détails ici pour l’installation en particulier de Framework:
http://www.commentcamarche.net/faq/sujet 9908 update checker vos logiciels sont ils a jour#update checker la solution

Ou encore pour les mises à Jour Java en particulier ici une version online de Secunia en anglais, mais il y a juste 1 ou 2 boutons à cliquer :
https://www.flexera.com/products/operations/software-vulnerability-management.html
Une petite explication dans ce lien (merci malekal).
Supprimer toutes les versions précédentes (elles représentent souvent 100Mo chacune).

Et bien entendu windows update:
http://www.update.microsoft.com/microsoftupdate/v6/default.aspx?ln=fr

Tous les drivers, faire une analyse, appuyer sur le bouton Lancer la détection:
https://www.touslesdrivers.com/index.php?v_page=29
Choisir le pilote du périphérique qui pose problème, ne pas toucher aux autres tant que ceux ci fonctionnent c’est inutile de tout mettre à jour.


- Un dernier conseil, méfiez vous des messages non sollicités, dans le doute toujours faire une recherche sur internet.


Si tout vas bien vous pourrez cocher le problème comme résolu.

A+


Denis
0
kristian43380
29 mars 2009 à 11:29
Bonjour,

Toutes mes excuses pour ne pas avoir répondu plus tôt ! J'utilise à présent Firefox comme tu me l'as recommandé.

Tout va bien.

Un grand merci pour avoir résolu mes difficultés.

ET BRAVO ET LONGUE VIE AU FORUM !
0
DeNisCoOl Messages postés 2802 Date d'inscription vendredi 19 août 2005 Statut Membre Dernière intervention 28 février 2011 224
29 mars 2009 à 18:59
salut,

Vaut mieux tard que jamais :-)

Mais pour résumer, faire les mises à jour régulièrement de TOUT, faire attention à son comportement sur internet, 1 AV + 1AS et une aide pour naviguer WOT (Web O Trust)

Bon week end.

Denis
0