Mon ordi tourne au ralentie

Fermé
yannick44 - 18 févr. 2009 à 20:18
ep44 Messages postés 7393 Date d'inscription samedi 10 novembre 2007 Statut Contributeur Dernière intervention 11 novembre 2010 - 19 févr. 2009 à 20:36
Bonjour,

mon ordinateur tourne beaucoup plus lentement, les pages internet s ouvrent plus lentement, quelque fois quand je le lance, internet explorer se bloque et la page web ne s ouvre pas.
je precise que je suis chez Neuf et que j ai avira comme antivirus qui n a rien detecté comme virus

merci d avance pour votre aide
A voir également:

6 réponses

ep44 Messages postés 7393 Date d'inscription samedi 10 novembre 2007 Statut Contributeur Dernière intervention 11 novembre 2010 3
18 févr. 2009 à 20:23
Bonsoir

As tu procédé à des nettoyage, défragmenté ?

Je vais vérifier si ton PC n'est pas infecté

Télécharge Random's System Information Tool (RSIT) par random/random et sauvegarde-le sur ton Bureau.
http://images.malwareremoval.com/random/RSIT.exe
* Double-clique sur RSIT.exe afin de lancer RSIT.
* Clique sur Continue à l'écran Disclaimer.
* Si l'outil HijackThis (version à jour) n'est pas présent ou non détecté sur l'ordinateur, RSIT le téléchargera et tu devras accepter la licence.
* Lorsque l'analyse sera terminée, deux fichiers texte s'ouvriront.

--> Poste le contenu de log.txt (<<qui sera affiché) ainsi que de info.txt (<<qui sera réduit dans la Barre des Tâches).

Note : Les deux rapports sont également sauvegardés C:\rsit

0
Logfile of random's system information tool 1.05 (written by random/random)
Run by yj at 2009-02-18 20:30:07
Microsoft Windows XP Édition familiale Service Pack 3
System drive C: has 95 GB (81%) free of 117 GB
Total RAM: 767 MB (30% free)

Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 20:31:19, on 18/02/2009
Platform: Windows XP SP3 (WinNT 5.01.2600)
MSIE: Internet Explorer v7.00 (7.00.6000.16791)
Boot mode: Normal

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\Program Files\Windows Defender\MsMpEng.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\Avira\AntiVir PersonalEdition Classic\sched.exe
C:\Program Files\Avira\AntiVir PersonalEdition Classic\avguard.exe
C:\PROGRA~1\FICHIE~1\France Telecom\Shared Modules\FTRTSVC\0\FTRTSVC.exe
C:\Program Files\Google\Common\Google Updater\GoogleUpdaterService.exe
C:\Program Files\Java\jre6\bin\jqs.exe
C:\WINDOWS\system32\nvsvc32.exe
C:\WINDOWS\system32\HPZipm12.exe
C:\Program Files\Microsoft\Search Enhancement Pack\SeaPort\SeaPort.exe
C:\WINDOWS\system32\slserv.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\System32\UAService7.exe
C:\WINDOWS\Explorer.EXE
C:\Program Files\Adobe\Photoshop Album Edition Découverte\3.2\Apps\apdproxy.exe
C:\Program Files\Java\jre6\bin\jusched.exe
C:\Program Files\Avira\AntiVir PersonalEdition Classic\avgnt.exe
C:\WINDOWS\SOUNDMAN.EXE
C:\Program Files\QuickTime\qttask.exe
C:\Program Files\HP\HP Software Update\HPWuSchd2.exe
C:\WINDOWS\TBPanel.exe
C:\Program Files\Neuf\Kit\WiFi\9wifi.exe
C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe
C:\Program Files\Neuf\Media Center\MediaCenter.exe
C:\Program Files\Messenger\msmsgs.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe
C:\Program Files\TomTom HOME 2\HOMERunner.exe
C:\WINDOWS\System32\wbem\wmiapsrv.exe
C:\Program Files\Neuf\Media Center\httpd\httpd.exe
C:\Program Files\Neuf\Media Center\httpd\httpd.exe
C:\Program Files\Windows Live\Messenger\msnmsgr.exe
C:\Program Files\Windows Live\Contacts\wlcomm.exe
C:\Program Files\Windows Live\Toolbar\wltuser.exe
C:\Program Files\Internet Explorer\IEXPLORE.EXE
C:\Program Files\Windows Defender\MSASCui.exe
C:\Program Files\Internet Explorer\IEXPLORE.EXE
C:\Documents and Settings\yj\Local Settings\Temporary Internet Files\Content.IE5\RI35LYM3\RSIT[1].exe
C:\Program Files\trend micro\yj.exe

R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Bar = http://recherche.neuf.fr/ie/default.html
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = http://recherche.neuf.fr/
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://home.neuf.fr/
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://recherche.neuf.fr/
R0 - HKLM\Software\Microsoft\Internet Explorer\Search,SearchAssistant = http://recherche.neuf.fr/ie/default.html
R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName = Liens
O2 - BHO: Aide pour le lien d'Adobe PDF Reader - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Fichiers communs\Adobe\Acrobat\ActiveX\AcroIEHelper.dll
O2 - BHO: Spybot-S&D IE Protection - {53707962-6F74-2D53-2644-206D7942484F} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O2 - BHO: (no name) - {5C255C8A-E604-49b4-9D64-90988571CECB} - (no file)
O2 - BHO: Search Helper - {6EBF7485-159F-4bff-A14F-B9E3AAC4465B} - C:\Program Files\Microsoft\Search Enhancement Pack\Search Helper\SearchHelper.dll
O2 - BHO: Java(tm) Plug-In SSV Helper - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre6\bin\ssv.dll
O2 - BHO: Programme d'aide de l'Assistant de connexion Windows Live - {9030D464-4C02-4ABF-8ECC-5164760863C6} - C:\Program Files\Fichiers communs\Microsoft Shared\Windows Live\WindowsLiveLogin.dll
O2 - BHO: Google Toolbar Helper - {AA58ED58-01DD-4d91-8333-CF10577473F7} - C:\Program Files\Google\Google Toolbar\GoogleToolbar.dll
O2 - BHO: Google Toolbar Notifier BHO - {AF69DE43-7D58-4638-B6FA-CE66B5AD205D} - C:\Program Files\Google\GoogleToolbarNotifier\5.0.926.3450\swg.dll
O2 - BHO: Java(tm) Plug-In 2 SSV Helper - {DBC80044-A445-435b-BC74-9C25C1C588A9} - C:\Program Files\Java\jre6\bin\jp2ssv.dll
O2 - BHO: Windows Live Toolbar Helper - {E15A8DC0-8516-42A1-81EA-DC94EC1ACF10} - C:\Program Files\Windows Live\Toolbar\wltcore.dll
O2 - BHO: JQSIEStartDetectorImpl - {E7E6F031-17CE-4C07-BC86-EABFE594F69C} - C:\Program Files\Java\jre6\lib\deploy\jqs\ie\jqs_plugin.dll
O3 - Toolbar: &Windows Live Toolbar - {21FA44EF-376D-4D53-9B0F-8A89D3229068} - C:\Program Files\Windows Live\Toolbar\wltcore.dll
O3 - Toolbar: &Google Toolbar - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - C:\Program Files\Google\Google Toolbar\GoogleToolbar.dll
O4 - HKLM\..\Run: [Adobe Photo Downloader] "C:\Program Files\Adobe\Photoshop Album Edition Découverte\3.2\Apps\apdproxy.exe"
O4 - HKLM\..\Run: [SunJavaUpdateSched] "C:\Program Files\Java\jre6\bin\jusched.exe"
O4 - HKLM\..\Run: [avgnt] "C:\Program Files\Avira\AntiVir PersonalEdition Classic\avgnt.exe" /min
O4 - HKLM\..\Run: [SoundMan] SOUNDMAN.EXE
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
O4 - HKLM\..\Run: [ORAHSSStartup] "C:\Program Files\OrangeHSS\Launcher\Launcher.exe" -appid connectivityapp
O4 - HKLM\..\Run: [nwiz] nwiz.exe /install
O4 - HKLM\..\Run: [NvMediaCenter] RUNDLL32.EXE C:\WINDOWS\system32\NvMcTray.dll,NvTaskbarInit
O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE C:\WINDOWS\system32\NvCpl.dll,NvStartup
O4 - HKLM\..\Run: [NeroFilterCheck] C:\WINDOWS\system32\NeroCheck.exe
O4 - HKLM\..\Run: [HP Software Update] C:\Program Files\HP\HP Software Update\HPWuSchd2.exe
O4 - HKLM\..\Run: [Gainward] C:\WINDOWS\TBPanel.exe /A
O4 - HKLM\..\Run: [Autoconfigurateur WiFi Neuf] "C:\Program Files\Neuf\Kit\WiFi\9wifi.exe"
O4 - HKLM\..\Run: [Adobe Reader Speed Launcher] "C:\Program Files\Adobe\Reader 8.0\Reader\Reader_sl.exe"
O4 - HKCU\..\Run: [SpybotSD TeaTimer] C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe
O4 - HKCU\..\Run: [Neuf Media Center] "C:\Program Files\Neuf\Media Center\MediaCenter.exe"
O4 - HKCU\..\Run: [MSMSGS] "C:\Program Files\Messenger\msmsgs.exe" /background
O4 - HKCU\..\Run: [HijackThis startup scan] C:\Program Files\Trend Micro\HijackThis\HijackThis.exe /startupscan
O4 - HKCU\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\ctfmon.exe
O4 - HKCU\..\Run: [swg] C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe
O4 - HKCU\..\Run: [TomTomHOME.exe] "C:\Program Files\TomTom HOME 2\HOMERunner.exe"
O4 - HKUS\S-1-5-19\..\Run: [CTFMON.EXE] C:\WINDOWS\System32\CTFMON.EXE (User 'SERVICE LOCAL')
O4 - HKUS\S-1-5-20\..\Run: [CTFMON.EXE] C:\WINDOWS\System32\CTFMON.EXE (User 'SERVICE RÉSEAU')
O4 - HKUS\S-1-5-18\..\Run: [CTFMON.EXE] C:\WINDOWS\System32\CTFMON.EXE (User 'SYSTEM')
O4 - HKUS\.DEFAULT\..\Run: [CTFMON.EXE] C:\WINDOWS\System32\CTFMON.EXE (User 'Default user')
O4 - Global Startup: Démarrage rapide de HP Photosmart Premier.lnk = C:\Program Files\HP\Digital Imaging\bin\hpqthb08.exe
O4 - Global Startup: HP Digital Imaging Monitor.lnk = C:\Program Files\HP\Digital Imaging\bin\hpqtra08.exe
O4 - Global Startup: Microsoft Office.lnk = C:\Program Files\Microsoft Office\Office10\OSA.EXE
O8 - Extra context menu item: E&xporter vers Microsoft Excel - res://C:\PROGRA~1\MICROS~3\Office10\EXCEL.EXE/3000
O9 - Extra button: Ajout Direct - {219C3416-8CB2-491a-A3C7-D9FCDDC9D600} - C:\Program Files\Windows Live\Writer\WriterBrowserExtension.dll
O9 - Extra 'Tools' menuitem: &Ajout Direct dans Windows Live Writer - {219C3416-8CB2-491a-A3C7-D9FCDDC9D600} - C:\Program Files\Windows Live\Writer\WriterBrowserExtension.dll
O9 - Extra button: (no name) - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O9 - Extra 'Tools' menuitem: Spybot - Search & Destroy Configuration - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O12 - Plugin for .spop: C:\Program Files\Internet Explorer\Plugins\NPDocBox.dll
O16 - DPF: {7F8C8173-AD80-4807-AA75-5672F22B4582} (ICSScanner Class) - http://download.zonelabs.com/bin/promotions/spywaredetector/ICSScanner37600.cab
O16 - DPF: {B38870E4-7ECB-40DA-8C6A-595F0A5519FF} (MsnMessengerSetupDownloadControl Class) - http://messenger.msn.com/download/MsnMessengerSetupDownloader.cab
O18 - Protocol: skype4com - {FFC8B962-9B40-4DFF-9458-1830C7DD7F5D} - C:\PROGRA~1\FICHIE~1\Skype\SKYPE4~1.DLL
O23 - Service: Avira AntiVir Personal - Free Antivirus Scheduler (AntiVirScheduler) - Avira GmbH - C:\Program Files\Avira\AntiVir PersonalEdition Classic\sched.exe
O23 - Service: Avira AntiVir Personal - Free Antivirus Guard (AntiVirService) - Avira GmbH - C:\Program Files\Avira\AntiVir PersonalEdition Classic\avguard.exe
O23 - Service: France Telecom Routing Table Service (FTRTSVC) - France Telecom SA - C:\PROGRA~1\FICHIE~1\France Telecom\Shared Modules\FTRTSVC\0\FTRTSVC.exe
O23 - Service: Google Updater Service (gusvc) - Google - C:\Program Files\Google\Common\Google Updater\GoogleUpdaterService.exe
O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Fichiers communs\InstallShield\Driver\11\Intel 32\IDriverT.exe
O23 - Service: Java Quick Starter (JavaQuickStarterService) - Sun Microsystems, Inc. - C:\Program Files\Java\jre6\bin\jqs.exe
O23 - Service: NVIDIA Display Driver Service (NVSvc) - NVIDIA Corporation - C:\WINDOWS\system32\nvsvc32.exe
O23 - Service: Pml Driver HPZ12 - HP - C:\WINDOWS\system32\HPZipm12.exe
O23 - Service: SmartLinkService (SLService) - - C:\WINDOWS\SYSTEM32\slserv.exe
O23 - Service: SecuROM User Access Service (V7) (UserAccess7) - Unknown owner - C:\WINDOWS\System32\UAService7.exe
0
ep44 Messages postés 7393 Date d'inscription samedi 10 novembre 2007 Statut Contributeur Dernière intervention 11 novembre 2010 3
18 févr. 2009 à 21:00
Ok pas grand chose mais pour commencer

Télécharge OTMoveIt3 (de Old_Timer).
http://oldtimer.geekstogo.com/OTMoveIt3.exe
Enregistre-le sur ton Bureau.

- Double-clique sur OTMoveit3.exe pour le lancer.
( Si tu es sous Vista, click droit sur l'icone d'OTMoveIt3 --> exécuter en tant qu'administrateur pour le lancer )
- Vérifie que l'option Unregister Dll's and Ocx's est cochée.
- Copie la liste qui se trouve dans la zone code ci-dessous et colle-la dans le cadre de gauche de OTMoveIt sous Paste instructions for Items to be Moved.

Code
:Processes
explorer.exe

:Files
C:\WINDOWS\presf.txt
C:\WINDOWS\tasks\Symantec NetDetect.job

:Commands
[purity]
[emptytemp]
[Reboot]


- Clique sur MoveIt! pour lancer la suppression.
Le résultat apparaitra dans le cadre "Results".
- Copie toute la sélection apparaissant dans ce cadre Résults. Colle ce rapport dans ton prochain message.
- Clique sur Exit pour fermer.
- Si tu ne trouves plus le rapport,c'est un fichier .log qui se trouve en C:\_OTMoveIt\MovedFiles.

Remarque : Il est possible qu'il te soit demandé de redémarrer ton ordinateur pour supprimer les fichiers.
Accepte. Dans ce cas, après redémarrage, tu trouveras justement le rapport dans le dossier C:\_OTMoveIt\MovedFiles.


Ensuite

Télécharge CCleaner
https://filehippo.com/download_ccleaner/
=> Aide toi de ce tuto pour l'utiliser
http://www.swl1f.net/viewtopic.php?f=14&t=69


Ensuite


* Télécharge malwarebytes
http://www.malwarebytes.org/mbam/program/mbam-setup.exe
Une aide pour l'installation
http://www.swl1f.net/viewtopic.php?f=14&t=68


=> Installe le
=> Ensuite va en mode sans echec


Relance le Pc et tapote la touche F8 ( ou F5 pour certains) , jusqu’à l’apparition des inscriptions avec choix de démarrage
Avec les touches « flèches », sélectionne Mode sans échec ==> entrée ==>nom utilisateur habituel


=> Lance malwarebytes
=> Coche "Executer un examen complet"
=> Si tu es en présence d'une infection à la fin de l'examen clique sur "ok"
=> Clique sur Supprimer la sélection
=> Pour poster le rapport Clique sur l'onglet Rapports/Logs, sélectionne celui t'intéresse et clique sur Ouvrir
=> Fait copier coller et poste le rapport
0
Error: Unable to interpret <Code > in the current context!
========== PROCESSES ==========
Process explorer.exe killed successfully.
========== FILES ==========
C:\WINDOWS\presf.txt moved successfully.
C:\WINDOWS\tasks\Symantec NetDetect.job moved successfully.
========== COMMANDS ==========
File delete failed. C:\DOCUME~1\yj\LOCALS~1\Temp\MessengerCache\fIsEUnVZd0WRhFErNoXtDYygqss= scheduled to be deleted on reboot.
File delete failed. C:\DOCUME~1\yj\LOCALS~1\Temp\MessengerCache\tZW2FNJMnA7PAtrgLpuGer2F0doyU= scheduled to be deleted on reboot.
User's Temp folder emptied.
User's Temporary Internet Files folder emptied.
User's Internet Explorer cache folder emptied.
Local Service Temp folder emptied.
Local Service Temporary Internet Files folder emptied.
File delete failed. C:\WINDOWS\temp\Perflib_Perfdata_d0.dat scheduled to be deleted on reboot.
File delete failed. C:\WINDOWS\temp\TMP0000005275A25AA78E16202E scheduled to be deleted on reboot.
Windows Temp folder emptied.
Java cache emptied.
Temp folders emptied.

OTMoveIt3 by OldTimer - Version 1.0.8.0 log created on 02182009_210556

Files moved on Reboot...
C:\DOCUME~1\yj\LOCALS~1\Temp\MessengerCache\fIsEUnVZd0WRhFErNoXtDYygqss= moved successfully.
C:\DOCUME~1\yj\LOCALS~1\Temp\MessengerCache\tZW2FNJMnA7PAtrgLpuGer2F0doyU= moved successfully.
File move failed. C:\WINDOWS\temp\Perflib_Perfdata_d0.dat scheduled to be moved on reboot.
File C:\WINDOWS\temp\TMP0000005275A25AA78E16202E not found!
Error: Unable to interpret <Code > in the current context!
========== PROCESSES ==========
Process explorer.exe killed successfully.
========== FILES ==========
C:\WINDOWS\presf.txt moved successfully.
C:\WINDOWS\tasks\Symantec NetDetect.job moved successfully.
========== COMMANDS ==========
File delete failed. C:\DOCUME~1\yj\LOCALS~1\Temp\MessengerCache\fIsEUnVZd0WRhFErNoXtDYygqss= scheduled to be deleted on reboot.
File delete failed. C:\DOCUME~1\yj\LOCALS~1\Temp\MessengerCache\tZW2FNJMnA7PAtrgLpuGer2F0doyU= scheduled to be deleted on reboot.
User's Temp folder emptied.
User's Temporary Internet Files folder emptied.
User's Internet Explorer cache folder emptied.
Local Service Temp folder emptied.
Local Service Temporary Internet Files folder emptied.
File delete failed. C:\WINDOWS\temp\Perflib_Perfdata_d0.dat scheduled to be deleted on reboot.
File delete failed. C:\WINDOWS\temp\TMP0000005275A25AA78E16202E scheduled to be deleted on reboot.
Windows Temp folder emptied.
Java cache emptied.
Temp folders emptied.

OTMoveIt3 by OldTimer - Version 1.0.8.0 log created on 02182009_210556

Files moved on Reboot...
C:\DOCUME~1\yj\LOCALS~1\Temp\MessengerCache\fIsEUnVZd0WRhFErNoXtDYygqss= moved successfully.
C:\DOCUME~1\yj\LOCALS~1\Temp\MessengerCache\tZW2FNJMnA7PAtrgLpuGer2F0doyU= moved successfully.
File move failed. C:\WINDOWS\temp\Perflib_Perfdata_d0.dat scheduled to be moved on reboot.
File C:\WINDOWS\temp\TMP0000005275A25AA78E16202E not found!
0
ep44 Messages postés 7393 Date d'inscription samedi 10 novembre 2007 Statut Contributeur Dernière intervention 11 novembre 2010 3
18 févr. 2009 à 23:21
Très bien passe au reste

0
c est quoi le reste? j ai fais tout ce que tu mas indiqué
0

Vous n’avez pas trouvé la réponse que vous recherchez ?

Posez votre question
ep44 Messages postés 7393 Date d'inscription samedi 10 novembre 2007 Statut Contributeur Dernière intervention 11 novembre 2010 3
19 févr. 2009 à 08:36
Bonjour

je t'avais demandé de passer Ccleaner et Malwarebytes.
0
ANALYSE COMPLETE - (91.190 secs)
------------------------------------------------------------------------------------------
67,0MB ont été supprimés. (Taille approximative)
------------------------------------------------------------------------------------------

Détails des fichiers à supprimer (Note: AUCUN fichier n'a pour l'instant été supprimé)
------------------------------------------------------------------------------------------
Fichiers Temporaires d'Internet Explorer (fichiers 4094) 66,7MB
C:\Documents and Settings\yj\Cookies\yj@2o7[2].txt 400 bytes
C:\Documents and Settings\yj\Cookies\yj@9c.webmail.aol[1].txt 99 bytes
C:\Documents and Settings\yj\Cookies\yj@a2dfp[1].txt 547 bytes
C:\Documents and Settings\yj\Cookies\yj@accounts.pkr[1].txt 91 bytes
C:\Documents and Settings\yj\Cookies\yj@ad.yieldmanager[2].txt 477 bytes
C:\Documents and Settings\yj\Cookies\yj@adnext[1].txt 575 bytes
C:\Documents and Settings\yj\Cookies\yj@adopt.euroclick[1].txt 356 bytes
C:\Documents and Settings\yj\Cookies\yj@ads.nba[1].txt 95 bytes
C:\Documents and Settings\yj\Cookies\yj@adserver.aol[1].txt 98 bytes
C:\Documents and Settings\yj\Cookies\yj@adtech[1].txt 102 bytes
C:\Documents and Settings\yj\Cookies\yj@amgdgt[1].txt 515 bytes
C:\Documents and Settings\yj\Cookies\yj@animationpoker[1].txt 394 bytes
C:\Documents and Settings\yj\Cookies\yj@aolfr.122.2o7[1].txt 120 bytes
C:\Documents and Settings\yj\Cookies\yj@aol[1].txt 167 bytes
C:\Documents and Settings\yj\Cookies\yj@aol[2].txt 346 bytes
C:\Documents and Settings\yj\Cookies\yj@at.atwola[2].txt 200 bytes
C:\Documents and Settings\yj\Cookies\yj@atwola[1].txt 70 bytes
C:\Documents and Settings\yj\Cookies\yj@banners.victor[1].txt 214 bytes
C:\Documents and Settings\yj\Cookies\yj@c.live[1].txt 65 bytes
C:\Documents and Settings\yj\Cookies\yj@c.msn.co[1].txt 75 bytes
C:\Documents and Settings\yj\Cookies\yj@c.msn[1].txt 64 bytes
C:\Documents and Settings\yj\Cookies\yj@chinois.feeriksocial[2].txt 582 bytes
C:\Documents and Settings\yj\Cookies\yj@commentcamarche[2].txt 502 bytes
C:\Documents and Settings\yj\Cookies\yj@cybermonitor[1].txt 94 bytes
C:\Documents and Settings\yj\Cookies\yj@ebay[2].txt 148 bytes
C:\Documents and Settings\yj\Cookies\yj@edt02[2].txt 314 bytes
C:\Documents and Settings\yj\Cookies\yj@espaceclient.neuf[1].txt 78 bytes
C:\Documents and Settings\yj\Cookies\yj@estat[1].txt 85 bytes
C:\Documents and Settings\yj\Cookies\yj@ext.infos-du-net[1].txt 107 bytes
C:\Documents and Settings\yj\Cookies\yj@facebook[1].txt 901 bytes
C:\Documents and Settings\yj\Cookies\yj@feeriksocial[1].txt 148 bytes
C:\Documents and Settings\yj\Cookies\yj@fr.a2dfp[2].txt 96 bytes
C:\Documents and Settings\yj\Cookies\yj@fr.at.atwola[1].txt 109 bytes
C:\Documents and Settings\yj\Cookies\yj@france.meteofrance[1].txt 195 bytes
C:\Documents and Settings\yj\Cookies\yj@ftv-publicite[1].txt 181 bytes
C:\Documents and Settings\yj\Cookies\yj@generation-nt[1].txt 509 bytes
C:\Documents and Settings\yj\Cookies\yj@google[1].txt 322 bytes
C:\Documents and Settings\yj\Cookies\yj@google[2].txt 320 bytes
C:\Documents and Settings\yj\Cookies\yj@google[3].txt 131 bytes
C:\Documents and Settings\yj\Cookies\yj@govoyages[1].txt 386 bytes
C:\Documents and Settings\yj\Cookies\yj@hp[2].txt 203 bytes
C:\Documents and Settings\yj\Cookies\yj@infos-du-net[2].txt 611 bytes
C:\Documents and Settings\yj\Cookies\yj@intellitxt[1].txt 112 bytes
C:\Documents and Settings\yj\Cookies\yj@laredoute2009.solution.weborama[2].txt 421 bytes
C:\Documents and Settings\yj\Cookies\yj@leboost[2].txt 372 bytes
C:\Documents and Settings\yj\Cookies\yj@livefilestore[2].txt 260 bytes
C:\Documents and Settings\yj\Cookies\yj@live[1].txt 505 bytes
C:\Documents and Settings\yj\Cookies\yj@live[2].txt 242 bytes
C:\Documents and Settings\yj\Cookies\yj@login.live[2].txt 272 bytes
C:\Documents and Settings\yj\Cookies\yj@m.webtrends[2].txt 187 bytes
C:\Documents and Settings\yj\Cookies\yj@maman-seule.superforum[1].txt 266 bytes
C:\Documents and Settings\yj\Cookies\yj@megaporn[1].txt 337 bytes
C:\Documents and Settings\yj\Cookies\yj@messenger.msn[1].txt 102 bytes
C:\Documents and Settings\yj\Cookies\yj@meteof.highmetrics[2].txt 496 bytes
C:\Documents and Settings\yj\Cookies\yj@meteofrance[1].txt 78 bytes
C:\Documents and Settings\yj\Cookies\yj@microsoft[1].txt 495 bytes
C:\Documents and Settings\yj\Cookies\yj@msn.co[2].txt 101 bytes
C:\Documents and Settings\yj\Cookies\yj@msn[1].txt 237 bytes
C:\Documents and Settings\yj\Cookies\yj@msn[3].txt 501 bytes
C:\Documents and Settings\yj\Cookies\yj@my.screenname.aol[1].txt 365 bytes
C:\Documents and Settings\yj\Cookies\yj@nba[1].txt 285 bytes
C:\Documents and Settings\yj\Cookies\yj@neufportail[1].txt 94 bytes
C:\Documents and Settings\yj\Cookies\yj@presence-pc[2].txt 176 bytes
C:\Documents and Settings\yj\Cookies\yj@profile.live[2].txt 434 bytes
C:\Documents and Settings\yj\Cookies\yj@pubgnt.generation-nt[2].txt 505 bytes
C:\Documents and Settings\yj\Cookies\yj@quantserve[2].txt 201 bytes
C:\Documents and Settings\yj\Cookies\yj@rad.live[2].txt 700 bytes
C:\Documents and Settings\yj\Cookies\yj@rad.msn[2].txt 690 bytes
C:\Documents and Settings\yj\Cookies\yj@req.connect.wunderloop[2].txt 234 bytes
C:\Documents and Settings\yj\Cookies\yj@sdv[1].txt 83 bytes
C:\Documents and Settings\yj\Cookies\yj@smartadserver[1].txt 402 bytes
C:\Documents and Settings\yj\Cookies\yj@smartadserver[2].txt 400 bytes
C:\Documents and Settings\yj\Cookies\yj@spaces.live[2].txt 342 bytes
C:\Documents and Settings\yj\Cookies\yj@support.microsoft[1].txt 177 bytes
C:\Documents and Settings\yj\Cookies\yj@svmlemag[1].txt 552 bytes
C:\Documents and Settings\yj\Cookies\yj@swl1f[1].txt 257 bytes
C:\Documents and Settings\yj\Cookies\yj@t.msn[2].txt 334 bytes
C:\Documents and Settings\yj\Cookies\yj@tacoda[2].txt 542 bytes
C:\Documents and Settings\yj\Cookies\yj@technet.microsoft[1].txt 105 bytes
C:\Documents and Settings\yj\Cookies\yj@technet.microsoft[2].txt 232 bytes
C:\Documents and Settings\yj\Cookies\yj@tf1[2].txt 164 bytes
C:\Documents and Settings\yj\Cookies\yj@titanpoker[1].txt 482 bytes
C:\Documents and Settings\yj\Cookies\yj@tournois-poker[2].txt 377 bytes
C:\Documents and Settings\yj\Cookies\yj@unicast[1].txt 138 bytes
C:\Documents and Settings\yj\Cookies\yj@webmail.aol[1].txt 349 bytes
C:\Documents and Settings\yj\Cookies\yj@weborama[1].txt 91 bytes
C:\Documents and Settings\yj\Cookies\yj@windowsmarketplace[2].txt 264 bytes
C:\Documents and Settings\yj\Cookies\yj@windowsmarketplace[3].txt 263 bytes
C:\Documents and Settings\yj\Cookies\yj@wunderloop[1].txt 115 bytes
C:\Documents and Settings\yj\Cookies\yj@www.generation-nt[1].txt 113 bytes
C:\Documents and Settings\yj\Cookies\yj@www.i-tchat[1].txt 101 bytes
C:\Documents and Settings\yj\Cookies\yj@www.infos-du-net[1].txt 79 bytes
C:\Documents and Settings\yj\Cookies\yj@www.neufportail[1].txt 80 bytes
C:\Documents and Settings\yj\Cookies\yj@www8.addfreestats[1].txt 104 bytes
C:\Documents and Settings\yj\Cookies\yj@xiti[1].txt 106 bytes
C:\Documents and Settings\yj\Cookies\yj@xiti[2].txt 106 bytes
C:\Documents and Settings\yj\Cookies\yj@yahoo[1].txt 88 bytes
C:\Documents and Settings\yj\Cookies\yj@yourmedia[1].txt 99 bytes
C:\Documents and Settings\yj\Cookies\yj@youtube[1].txt 91 bytes
C:\Documents and Settings\yj\Cookies\yj@zune[2].txt 236 bytes
C:\Documents and Settings\yj\Cookies\yj@zune[3].txt 235 bytes
Marqué pour l'effacement: C:\Documents and Settings\yj\Local Settings\Temporary Internet Files\Content.IE5\index.dat
Marqué pour l'effacement: C:\Documents and Settings\yj\Cookies\index.dat
Marqué pour l'effacement: C:\Documents and Settings\yj\Local Settings\Historique\History.IE5\index.dat
C:\Documents and Settings\yj\Recent\02182009_210556.log.lnk 687 bytes
C:\Documents and Settings\yj\Recent\mbam-log-2009-02-18 (22-32-51).txt.lnk 579 bytes
C:\Documents and Settings\yj\Recent\mbam-log-2009-02-18 (22-33-54).txt.lnk 579 bytes
C:\Documents and Settings\yj\Recent\MovedFiles.lnk 489 bytes
C:\WINDOWS\system32\wbem\Logs\FrameWork.log 2,85KB
C:\WINDOWS\system32\wbem\Logs\wbemcore.log 30,58KB
C:\WINDOWS\system32\wbem\Logs\wbemess.log 34,82KB
C:\WINDOWS\system32\wbem\Logs\wmiprov.log 1,75KB
C:\WINDOWS\system32\wbem\Logs\wbemess.lo_ 64,05KB
C:\WINDOWS\0.log 0 bytes
C:\WINDOWS\setupapi.log 4,37KB
C:\WINDOWS\ntbtlog.txt 0,15MB
C:\Documents and Settings\yj\Application Data\Google\Local Search History\google%2Eweb.w 720 bytes
C:\Documents and Settings\yj\Application Data\Macromedia\Flash Player\#SharedObjects\6KYQJR7C\s.ytimg.com\soundData.sol 58 bytes
C:\Documents and Settings\yj\Application Data\Macromedia\Flash Player\#SharedObjects\6KYQJR7C\www.dailymotion.com\flash\dmplayer\dmplayer-fr.swf\dmplayer.sol 89 bytes
C:\Documents and Settings\yj\Application Data\Macromedia\Flash Player\#SharedObjects\6KYQJR7C\wwwstatic.megaporn.com\megavideouser.sol 65 bytes
C:\Documents and Settings\yj\Application Data\Macromedia\Flash Player\macromedia.com\support\flashplayer\sys\#s.ytimg.com\settings.sol 81 bytes
C:\Documents and Settings\yj\Application Data\Macromedia\Flash Player\macromedia.com\support\flashplayer\sys\#www.dailymotion.com\settings.sol 89 bytes
C:\Documents and Settings\yj\Application Data\Macromedia\Flash Player\macromedia.com\support\flashplayer\sys\#www.kewego.com\settings.sol 84 bytes
C:\Documents and Settings\yj\Application Data\Macromedia\Flash Player\macromedia.com\support\flashplayer\sys\#wwwstatic.megaporn.com\settings.sol 92 bytes
C:\Documents and Settings\yj\Application Data\Macromedia\Flash Player\macromedia.com\support\flashplayer\sys\settings.sol 501 bytes
C:\Documents and Settings\All Users.WINDOWS\Application Data\Spybot - Search & Destroy\Logs\Resident.log 512 bytes
------------------------------------------------------------------------------------------
Malwarebytes' Anti-Malware 1.34
Version de la base de données: 1776
Windows 5.1.2600 Service Pack 3

18/02/2009 22:33:54
mbam-log-2009-02-18 (22-33-54).txt

Type de recherche: Examen complet (A:\|C:\|D:\|E:\|F:\|G:\|H:\|I:\|)
Eléments examinés: 161052
Temps écoulé: 55 minute(s), 26 second(s)

Processus mémoire infecté(s): 0
Module(s) mémoire infecté(s): 0
Clé(s) du Registre infectée(s): 7
Valeur(s) du Registre infectée(s): 0
Elément(s) de données du Registre infecté(s): 0
Dossier(s) infecté(s): 1
Fichier(s) infecté(s): 0

Processus mémoire infecté(s):
(Aucun élément nuisible détecté)

Module(s) mémoire infecté(s):
(Aucun élément nuisible détecté)

Clé(s) du Registre infectée(s):
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{f10587e9-0e47-4cbe-84ae-7dd20b8684bb} (Trojan.BHO) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{3aa42713-5c1e-48e2-b432-d8bf420dd31d} (Rogue.Antivirus2008) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{7d5dd829-6c90-42c5-b54c-2afa82f988ba} (Rogue.Installer) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{3ba4271e-5c1e-48e2-b432-d8bf420dd31d} (Rogue.DeusCleaner) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{e596df5f-4239-4d40-8367-ebadf0165917} (Rogue.Installer) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{b64f4a7c-97c9-11da-8bde-f66bad1e3f3a} (Rogue.WinAntivirus) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\The Weather Channel (Adware.Hotbar) -> Quarantined and deleted successfully.

Valeur(s) du Registre infectée(s):
(Aucun élément nuisible détecté)

Elément(s) de données du Registre infecté(s):
(Aucun élément nuisible détecté)

Dossier(s) infecté(s):
C:\Program Files\IE Extensions (Trojan.BHO) -> Quarantined and deleted successfully.

Fichier(s) infecté(s):
(Aucun élément nuisible détecté)
0
ep44 Messages postés 7393 Date d'inscription samedi 10 novembre 2007 Statut Contributeur Dernière intervention 11 novembre 2010 3
19 févr. 2009 à 20:36
Ok très bien ;)

Pour CCleaner il faut passer au nettoyage, suit le tutoriel pour t'aider des différentes option.

Ensuite

fait un scan en ligne

avec bitdefender et colle le rapport

https://www.bitdefender.com/toolbox/

Scan à faire sous Internet Explorer

un tuto
http://pageperso.aol.fr/rginformatique/mapage/defender.htm

ensuite reposte un nouveau rapport rsit
@+
0