Précédent
- 1
- 2
- 3
- 4
- 5
- 6
- 7
Suivant
c tout que j'ai eu comme rapport j'ai relance la machine en mode echec
mais redemarre tjrs en mode normal
je vous repond avec un autre pc
dois je refaire l'operation avec SmitfraudFix
mais redemarre tjrs en mode normal
je vous repond avec un autre pc
dois je refaire l'operation avec SmitfraudFix
j'ai ça aussi, si ça peut aider
SmitFraudFix v2.398
Rapport fait à 12:11:08,64, 24/02/2009
Executé à partir de C:\Documents and Settings\CKS Andre SNEYAERT\Bureau\SmitfraudFix
OS: Microsoft Windows XP [version 5.1.2600] - Windows_NT
Le type du système de fichiers est NTFS
Fix executé en mode normal
»»»»»»»»»»»»»»»»»»»»»»»» Process
SmitFraudFix v2.398
Rapport fait à 12:11:08,64, 24/02/2009
Executé à partir de C:\Documents and Settings\CKS Andre SNEYAERT\Bureau\SmitfraudFix
OS: Microsoft Windows XP [version 5.1.2600] - Windows_NT
Le type du système de fichiers est NTFS
Fix executé en mode normal
»»»»»»»»»»»»»»»»»»»»»»»» Process
Vous n’avez pas trouvé la réponse que vous recherchez ?
Posez votre question
Re,
Relance le programme Smitfraud,
Cette fois choisit l’option 2, répond oui a tous ;
Sauvegarde le rapport, Redémarre en mode normal, copie/colle le rapport sauvegardé sur le forum
fais attention à bien sauvegarder la totalité du rapport, pas seulement le début.
Ensuite,
Télécharge Toolbar-S&D (Team IDN) sur ton Bureau :
https://77b4795d-a-62cb3a1a-s-sites.googlegroups.com/site/eric71mespages/ToolBarSD.exe?attachauth=ANoY7cqJWPphpudyTqv7TRo5RQ3nm_Sx8JluVMO59X5E9cyE3j3LqKlmStIqiDqJdIgMJLi7MXn2nKVajQfoWuVvZZ2wIx_vkqO4k4P0K9jh-ra9jaKPXdZcoaVF2UqJZNH8ubL_42uIwh6f35xJ2GJMuzddVj2Qth1DgZ839lxEIFGkgWz3TdfvNMy-YtxfA3gqBUrj4U4LFeAPiWr3ClmjIP0t_Xs5PQ%3D%3D&attredirects=2
* Lance l'installation du programme en exécutant le fichier téléchargé.
* Double-clique maintenant sur le raccourci de Toolbar-S&D.
* Sélectionne la langue souhaitée en tapant la lettre de ton choix puis en validant avec la touche Entrée.
* Choisis maintenant l'option "2" puis valide en appuyant sur "Entrée".
! Ne ferme pas la fenêtre lors de la suppression !
Un rapport sera généré, poste son contenu ici.
Je te prépare une manip, mais il me faut faire des vérifs.
Relance le programme Smitfraud,
Cette fois choisit l’option 2, répond oui a tous ;
Sauvegarde le rapport, Redémarre en mode normal, copie/colle le rapport sauvegardé sur le forum
fais attention à bien sauvegarder la totalité du rapport, pas seulement le début.
Ensuite,
Télécharge Toolbar-S&D (Team IDN) sur ton Bureau :
https://77b4795d-a-62cb3a1a-s-sites.googlegroups.com/site/eric71mespages/ToolBarSD.exe?attachauth=ANoY7cqJWPphpudyTqv7TRo5RQ3nm_Sx8JluVMO59X5E9cyE3j3LqKlmStIqiDqJdIgMJLi7MXn2nKVajQfoWuVvZZ2wIx_vkqO4k4P0K9jh-ra9jaKPXdZcoaVF2UqJZNH8ubL_42uIwh6f35xJ2GJMuzddVj2Qth1DgZ839lxEIFGkgWz3TdfvNMy-YtxfA3gqBUrj4U4LFeAPiWr3ClmjIP0t_Xs5PQ%3D%3D&attredirects=2
* Lance l'installation du programme en exécutant le fichier téléchargé.
* Double-clique maintenant sur le raccourci de Toolbar-S&D.
* Sélectionne la langue souhaitée en tapant la lettre de ton choix puis en validant avec la touche Entrée.
* Choisis maintenant l'option "2" puis valide en appuyant sur "Entrée".
! Ne ferme pas la fenêtre lors de la suppression !
Un rapport sera généré, poste son contenu ici.
Je te prépare une manip, mais il me faut faire des vérifs.
bonjour lyonnais92
J'ai lancer le programme Smitfraud,
après rien sur l'ecran : black out total
plus aucune icone sur l'ecran et ne se passe rien depuis 15 mn....
J'ai lancer le programme Smitfraud,
après rien sur l'ecran : black out total
plus aucune icone sur l'ecran et ne se passe rien depuis 15 mn....
Re,
à faire dans l'ordre
fais redémarrer l'ordi.
Exécute Toolbar S&D comme dit plus haut.
Ensuite :
Copie ou imprime les instructions avant
Déconnecte toi d'internet et ferme toutes tes applications.
Désactive tes protections (antivirus, parefeu, garde en temps réel de l'antispyware)
Crée un nouveau document texte : clic droit de souris sur le bureau > Nouveau > Document Texte, et copie dedans les lignes suivantes :
KillAll::
Rootkit::
c:\program files\MediaChannel\Navvy 5.2\NavvyUp.exe
c:\windows\system32\msexe.exe
c:\windows\system32\zxexe.exe
c:\windows\system32\kdexe.exe
c:\windows\Fonts\wuauclt.exe
c:\docume~1\CKSAND~1\LOCALS~1\Temp\502514
c:\program files\Internet Explorer\PowerJo.ase
c:\program files\Internet Explorer\PowerJv.ask
c:\windows\system32\odgildpe.dll
c:\windows\system32\ebhpliad.dll
c:\windows\system32\homegdpk.dll
c:\windows\system32\cockgddc.dll
c:\windows\system32\ojdnnlnf.dll
c:\windows\system32\aldoiilk.dll
c:\windows\system32\heifeado.dll
c:\windows\system32\ambiojfn.dll
c:\windows\system32\kdkdfeln.dll
c:\windows\system32\ooaddion.dll
c:\windows\system32\ndaelgfl.dll
c:\windows\system32\ccbficfi.dll
c:\windows\system32\gajdpnec.dll
c:\windows\system32\ikdapmcm.dll
c:\windows\system32\dbfkipbd.dll
c:\windows\system32\ogcmfdaf.dll
c:\windows\system32\lkknkgnk.dll
c:\windows\system32\kffoogac.dll
c:\windows\system32\akolkhck.dll
c:\windows\system32\oojlpcib.dll
c:\windows\system32\eojpchpn.dll
c:\windows\system\rund1132.exe
c:\windows\system32\drivers\pnpmem.sys
c:\windows\winsscoo.exe
c:\windows\system32\drivers\winyyy.sys
c:\windows\system32\drivers\ati4twxx.sys
c:\windows\system32\drivers\ati8quxx.sys
c:\windows\system32\drivers\ethcjxre.sys
c:\windows\fonts\alsk.sys
c:\windows\fonts\naks.sys
c:\windows\system32\dllcache\spoolsv.exe
c:\windows\system32\WanPacket.dll
c:\windows\WinShell.\daemon.exe
c:\windows\smss.exe
c:\windows\Fonts\TIMPIatform.exe
c:\windows\system32\waubfe.exe
c:\program files\bccd.pif
C:\WINDOWSupdate.dll
c:\windows\system32\kdexe.exe
c:\windows\system32\waubfe.exe
c:\windows\winsscoo.exe
c:\windows\system32\drivers\winyyy.sys
c:\windows\system32\1957817A.dll
c:\windows\system32\1957817A.cfg
c:\windows\system32\zxexe.exe
c:\windows\system32\198FF3D8.dll
c:\windows\system32\198FF3D8.cfg
c:\windows\system32\msexe.exe
c:\windows\system32\asdfasdf
c:\windows\system32\registryboosterppcg15.exe
c:\windows\system32\wauafe.exe
c:\windows\system32\dfln.dll
c:\windows\sysinfo.tmp
c:\windows\system32\waunafe.exe
c:\windows\system32\dafln.dll
c:\windows\system32\MSPolicyAgent.dll
c:\windows\system32\types.tmp
c:\windows\system32\waumafe.exe
c:\windows\system32\waulafe.exe
c:\windows\system32\fasadf.dll
c:\windows\system32\somspring.dat
c:\windows\system32\romarshal.dat
c:\windows\system32\drivers\pnpmem.sys
c:\windows\system32\ormsgse.axz
c:\windows\system32\waukafe.exe
c:\windows\system32\flzaitian.dll
c:\windows\system32\exlds.ini
C:\FINE CRUSH LTD.doc
c:\windows\system32\drivers\52438666.txt
c:\program files\cacmchc
c:\program files\Fichiers communs\qybabiqylo.dl
c:\program files\Fichiers communs\vexomigaga._sy
c:\program files\Fichiers communs\vodeqet.ban
c:\documents and settings\All Users\Application Data\288537758
c:\windows\system32\alimoto32.exe
c:\windows\system32\RamrtwC.dll
Registry::
[-HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{5419706F-9AD1-49BB-A91F-EE6B62E2881E}]
[-HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{912F6837-CCB6-424B-BC9C-8BB5541AFB54}]
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"NavvyUp"=-
"msexe.exe"=-
"zxexe.exe"=-
"kdexe.exe"=-
[HKEY_LOCAL_MACHINE\software\microsoft\windows\Currentversion\policies\explorer\Run]
"svchstt"=-
"360safe"=-
[hkey_local_machine\software\microsoft\windows\currentversion\explorer\ShellExecuteHooks]
"{5419706F-9AD1-49BB-A91F-EE6B62E2881E}"=-
"{912F6837-CCB6-424B-BC9C-8BB5541AFB54}"=-
"8D025D9E"=-
"EB1952AD"=-
"186E0D94"=-
"C8C40DDC"=-
"83D7757F"=-
"A5D82254"=-
"1E2FEAD8"=-
"A6B283F7"=-
"4D4DFE57"=-
"88ADD287"=-
"7DAE50F5"=-
"CCBF2CF2"=-
"0A3D97EC"=-
"24DA96C6"=-
"DBF429BD"=-
"80C6FDAF"=-
"54474074"=-
"4FF880AC"=-
"A48541C4"=-
"88359C2B"=-
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad]
"8D025D9E"=-
"EB1952AD"=-
"186E0D94"=-
"C8C40DDC"=-
"83D7757F"=-
"A5D82254"=-
"1E2FEAD8"=-
"A6B283F7"=-
"4D4DFE57"=-
"88ADD287"=-
"7DAE50F5"=-
"CCBF2CF2"=-
"0A3D97EC"=-
"24DA96C6"=-
"DBF429BD"=-
"80C6FDAF"=-
"54474074"=-
"4FF880AC"=-
"A48541C4"=-
"88359C2B"=-
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon]
"Userinit"="c:\windows\system32\userinit.exe,"
[HKEY_CURRENT_USER\software\microsoft\windows nt\currentversion\windows]
"load"=-
[-HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\360rpt.EXE]
[-HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\360safe.EXE]
[-HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\360safebox.EXE]
[-HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\360tray.EXE]
[-HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\ANTIARP.EXE]
[-HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\ArSwp.EXE]
[-HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\Ast.EXE]
[-HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\AutoRun.EXE]
[-HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\AutoRunKiller.EXE]
[-HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\AvMonitor.EXE]
[-HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\AVP.COM]
[-HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\AVP.EXE]
[-HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\CCenter.EXE]
[-HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\Frameworkservice.EXE]
[-HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\GFUpd.EXE]
[-HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\GuardField.EXE]
[-HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\IceSword.EXE]
[-HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\Iparmor.EXE]
[-HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\KASARP.EXE]
[-HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\kav32.EXE]
[-HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\KAVPFW.EXE]
[-HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\kavstart.EXE]
[-HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\kissvc.EXE]
[-HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\kmailmon.EXE]
[-HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\KPfwSvc.EXE]
[-HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\KRegEx.EXE]
[-HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\KVMonxp.KXP]
[-HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\KVSrvXP.EXE]
[-HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\KVWSC.EXE]
[-HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\kwatch.EXE]
[-HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\Mmsk.EXE]
[-HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\Navapsvc.EXE]
[-HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\nod32krn.EXE]
[-HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\Nod32kui.EXE]
[-HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\PFW.EXE]
[-HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\QQDoctor.EXE]
[-HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\RAV.EXE]
[-HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\RavMon.EXE]
[-HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\RavMonD.EXE]
[-HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\Ravservice.EXE]
[-HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\RavStub.EXE]
[-HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\RavTask.EXE]
[-HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\RAVTRAY.EXE]
[-HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\Regedit.EXE]
[-HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\rfwmain.EXE]
[-HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\rfwProxy.EXE]
[-HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\rfwsrv.EXE]
[-HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\Rfwstub.EXE]
[-HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\RsAgent.EXE]
[-HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\Rsaupd.EXE]
[-HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\RsMain.EXE]
[-HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\rsnetsvr.EXE]
[-HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\RSTray.EXE]
[-HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\Runiep.EXE]
[-HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\safeboxTray.EXE]
[-HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\ScanFrm.EXE]
[-HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\SREngLdr.EXE]
[-HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\TrojanDetector.EXE]
[-HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\Trojanwall.EXE]
[-HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\TrojDie.KXP]
[-HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\VPC32.EXE]
[-HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\VPTRAY.EXE]
[-HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\WOPTILITIES.EXE]
driver::
pnpmem
WinSSCOM
MyProt
ati4twxx
ati8quxx
ethcjxre
alsk
naks
Enregistre ce fichier sous le nom CFscript
Fait un glisser/déposer de ce fichier CFscript sur le fichier ComboFix.exe
Clique sur le fichier CFscript, maintient le doigt enfoncé et glisse la souris pour que l'icône du CFscrïpt vienne recouvrir l'icône de Combofix. Relache la souris. Combofix va démarrer.
Patiente le temps du scan.Le bureau va disparaître à plusieurs reprises: c'est normal!
Ne touche à rien tant que le scan n'est pas terminé.
Réactive ton parefeu, ton antivirus, la garde de ton antispyware
Une fois le scan achevé, un rapport va s'afficher: poste son contenu.
Si le fichier ne s'ouvre pas, il se trouve ici > C:\ComboFix.txt
Attention : cette manip a été fait pour cet ordi. Tout réutilisation peut endommager sévèrement le système d'exploitation.
===============
Après avoir posté le rapport de Combofix, essaye de redémarrer en mode sans échec.
En mode sans échec ou en mode normal, relance Smitfraudfix option 2 et poste le rapport.
===============
Ton infection date d'août 2008.
Sais tu ce qu'est CC.pif qui est sur un support externe (E:) (clé USB ou disque dur externe).
Ne cherche pas à l'ouvrir ni même à insérer ce support, dis seulement si tu sais.
A demain.
à faire dans l'ordre
fais redémarrer l'ordi.
Exécute Toolbar S&D comme dit plus haut.
Ensuite :
Copie ou imprime les instructions avant
Déconnecte toi d'internet et ferme toutes tes applications.
Désactive tes protections (antivirus, parefeu, garde en temps réel de l'antispyware)
Crée un nouveau document texte : clic droit de souris sur le bureau > Nouveau > Document Texte, et copie dedans les lignes suivantes :
KillAll::
Rootkit::
c:\program files\MediaChannel\Navvy 5.2\NavvyUp.exe
c:\windows\system32\msexe.exe
c:\windows\system32\zxexe.exe
c:\windows\system32\kdexe.exe
c:\windows\Fonts\wuauclt.exe
c:\docume~1\CKSAND~1\LOCALS~1\Temp\502514
c:\program files\Internet Explorer\PowerJo.ase
c:\program files\Internet Explorer\PowerJv.ask
c:\windows\system32\odgildpe.dll
c:\windows\system32\ebhpliad.dll
c:\windows\system32\homegdpk.dll
c:\windows\system32\cockgddc.dll
c:\windows\system32\ojdnnlnf.dll
c:\windows\system32\aldoiilk.dll
c:\windows\system32\heifeado.dll
c:\windows\system32\ambiojfn.dll
c:\windows\system32\kdkdfeln.dll
c:\windows\system32\ooaddion.dll
c:\windows\system32\ndaelgfl.dll
c:\windows\system32\ccbficfi.dll
c:\windows\system32\gajdpnec.dll
c:\windows\system32\ikdapmcm.dll
c:\windows\system32\dbfkipbd.dll
c:\windows\system32\ogcmfdaf.dll
c:\windows\system32\lkknkgnk.dll
c:\windows\system32\kffoogac.dll
c:\windows\system32\akolkhck.dll
c:\windows\system32\oojlpcib.dll
c:\windows\system32\eojpchpn.dll
c:\windows\system\rund1132.exe
c:\windows\system32\drivers\pnpmem.sys
c:\windows\winsscoo.exe
c:\windows\system32\drivers\winyyy.sys
c:\windows\system32\drivers\ati4twxx.sys
c:\windows\system32\drivers\ati8quxx.sys
c:\windows\system32\drivers\ethcjxre.sys
c:\windows\fonts\alsk.sys
c:\windows\fonts\naks.sys
c:\windows\system32\dllcache\spoolsv.exe
c:\windows\system32\WanPacket.dll
c:\windows\WinShell.\daemon.exe
c:\windows\smss.exe
c:\windows\Fonts\TIMPIatform.exe
c:\windows\system32\waubfe.exe
c:\program files\bccd.pif
C:\WINDOWSupdate.dll
c:\windows\system32\kdexe.exe
c:\windows\system32\waubfe.exe
c:\windows\winsscoo.exe
c:\windows\system32\drivers\winyyy.sys
c:\windows\system32\1957817A.dll
c:\windows\system32\1957817A.cfg
c:\windows\system32\zxexe.exe
c:\windows\system32\198FF3D8.dll
c:\windows\system32\198FF3D8.cfg
c:\windows\system32\msexe.exe
c:\windows\system32\asdfasdf
c:\windows\system32\registryboosterppcg15.exe
c:\windows\system32\wauafe.exe
c:\windows\system32\dfln.dll
c:\windows\sysinfo.tmp
c:\windows\system32\waunafe.exe
c:\windows\system32\dafln.dll
c:\windows\system32\MSPolicyAgent.dll
c:\windows\system32\types.tmp
c:\windows\system32\waumafe.exe
c:\windows\system32\waulafe.exe
c:\windows\system32\fasadf.dll
c:\windows\system32\somspring.dat
c:\windows\system32\romarshal.dat
c:\windows\system32\drivers\pnpmem.sys
c:\windows\system32\ormsgse.axz
c:\windows\system32\waukafe.exe
c:\windows\system32\flzaitian.dll
c:\windows\system32\exlds.ini
C:\FINE CRUSH LTD.doc
c:\windows\system32\drivers\52438666.txt
c:\program files\cacmchc
c:\program files\Fichiers communs\qybabiqylo.dl
c:\program files\Fichiers communs\vexomigaga._sy
c:\program files\Fichiers communs\vodeqet.ban
c:\documents and settings\All Users\Application Data\288537758
c:\windows\system32\alimoto32.exe
c:\windows\system32\RamrtwC.dll
Registry::
[-HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{5419706F-9AD1-49BB-A91F-EE6B62E2881E}]
[-HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{912F6837-CCB6-424B-BC9C-8BB5541AFB54}]
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"NavvyUp"=-
"msexe.exe"=-
"zxexe.exe"=-
"kdexe.exe"=-
[HKEY_LOCAL_MACHINE\software\microsoft\windows\Currentversion\policies\explorer\Run]
"svchstt"=-
"360safe"=-
[hkey_local_machine\software\microsoft\windows\currentversion\explorer\ShellExecuteHooks]
"{5419706F-9AD1-49BB-A91F-EE6B62E2881E}"=-
"{912F6837-CCB6-424B-BC9C-8BB5541AFB54}"=-
"8D025D9E"=-
"EB1952AD"=-
"186E0D94"=-
"C8C40DDC"=-
"83D7757F"=-
"A5D82254"=-
"1E2FEAD8"=-
"A6B283F7"=-
"4D4DFE57"=-
"88ADD287"=-
"7DAE50F5"=-
"CCBF2CF2"=-
"0A3D97EC"=-
"24DA96C6"=-
"DBF429BD"=-
"80C6FDAF"=-
"54474074"=-
"4FF880AC"=-
"A48541C4"=-
"88359C2B"=-
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad]
"8D025D9E"=-
"EB1952AD"=-
"186E0D94"=-
"C8C40DDC"=-
"83D7757F"=-
"A5D82254"=-
"1E2FEAD8"=-
"A6B283F7"=-
"4D4DFE57"=-
"88ADD287"=-
"7DAE50F5"=-
"CCBF2CF2"=-
"0A3D97EC"=-
"24DA96C6"=-
"DBF429BD"=-
"80C6FDAF"=-
"54474074"=-
"4FF880AC"=-
"A48541C4"=-
"88359C2B"=-
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon]
"Userinit"="c:\windows\system32\userinit.exe,"
[HKEY_CURRENT_USER\software\microsoft\windows nt\currentversion\windows]
"load"=-
[-HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\360rpt.EXE]
[-HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\360safe.EXE]
[-HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\360safebox.EXE]
[-HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\360tray.EXE]
[-HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\ANTIARP.EXE]
[-HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\ArSwp.EXE]
[-HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\Ast.EXE]
[-HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\AutoRun.EXE]
[-HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\AutoRunKiller.EXE]
[-HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\AvMonitor.EXE]
[-HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\AVP.COM]
[-HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\AVP.EXE]
[-HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\CCenter.EXE]
[-HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\Frameworkservice.EXE]
[-HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\GFUpd.EXE]
[-HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\GuardField.EXE]
[-HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\IceSword.EXE]
[-HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\Iparmor.EXE]
[-HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\KASARP.EXE]
[-HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\kav32.EXE]
[-HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\KAVPFW.EXE]
[-HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\kavstart.EXE]
[-HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\kissvc.EXE]
[-HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\kmailmon.EXE]
[-HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\KPfwSvc.EXE]
[-HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\KRegEx.EXE]
[-HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\KVMonxp.KXP]
[-HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\KVSrvXP.EXE]
[-HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\KVWSC.EXE]
[-HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\kwatch.EXE]
[-HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\Mmsk.EXE]
[-HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\Navapsvc.EXE]
[-HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\nod32krn.EXE]
[-HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\Nod32kui.EXE]
[-HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\PFW.EXE]
[-HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\QQDoctor.EXE]
[-HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\RAV.EXE]
[-HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\RavMon.EXE]
[-HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\RavMonD.EXE]
[-HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\Ravservice.EXE]
[-HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\RavStub.EXE]
[-HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\RavTask.EXE]
[-HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\RAVTRAY.EXE]
[-HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\Regedit.EXE]
[-HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\rfwmain.EXE]
[-HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\rfwProxy.EXE]
[-HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\rfwsrv.EXE]
[-HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\Rfwstub.EXE]
[-HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\RsAgent.EXE]
[-HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\Rsaupd.EXE]
[-HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\RsMain.EXE]
[-HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\rsnetsvr.EXE]
[-HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\RSTray.EXE]
[-HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\Runiep.EXE]
[-HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\safeboxTray.EXE]
[-HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\ScanFrm.EXE]
[-HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\SREngLdr.EXE]
[-HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\TrojanDetector.EXE]
[-HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\Trojanwall.EXE]
[-HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\TrojDie.KXP]
[-HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\VPC32.EXE]
[-HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\VPTRAY.EXE]
[-HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\WOPTILITIES.EXE]
driver::
pnpmem
WinSSCOM
MyProt
ati4twxx
ati8quxx
ethcjxre
alsk
naks
Enregistre ce fichier sous le nom CFscript
Fait un glisser/déposer de ce fichier CFscript sur le fichier ComboFix.exe
Clique sur le fichier CFscript, maintient le doigt enfoncé et glisse la souris pour que l'icône du CFscrïpt vienne recouvrir l'icône de Combofix. Relache la souris. Combofix va démarrer.
Patiente le temps du scan.Le bureau va disparaître à plusieurs reprises: c'est normal!
Ne touche à rien tant que le scan n'est pas terminé.
Réactive ton parefeu, ton antivirus, la garde de ton antispyware
Une fois le scan achevé, un rapport va s'afficher: poste son contenu.
Si le fichier ne s'ouvre pas, il se trouve ici > C:\ComboFix.txt
Attention : cette manip a été fait pour cet ordi. Tout réutilisation peut endommager sévèrement le système d'exploitation.
===============
Après avoir posté le rapport de Combofix, essaye de redémarrer en mode sans échec.
En mode sans échec ou en mode normal, relance Smitfraudfix option 2 et poste le rapport.
===============
Ton infection date d'août 2008.
Sais tu ce qu'est CC.pif qui est sur un support externe (E:) (clé USB ou disque dur externe).
Ne cherche pas à l'ouvrir ni même à insérer ce support, dis seulement si tu sais.
A demain.
je poste le rapport de TooBar S&D, le reste suivra
par contre pour ta question concernant CC.pif, je en sais pas ce que c'est
ça peut être une clé USB parce que j'ai pas de disque dur externe
-----------\\ ToolBar S&D 1.2.8 XP/Vista
Microsoft Windows XP Édition familiale ( v5.1.2600 ) Service Pack 3
X86-based PC ( Uniprocessor Free : Intel(R) Pentium(R) 4 CPU 3.06GHz )
BIOS : Phoenix - AwardBIOS v6.00PG
USER : CKS Andre SNEYAERT ( Administrator )
BOOT : Normal boot
C:\ (Local Disk) - NTFS - Total:176 Go (Free:142 Go)
D:\ (CD or DVD)
F:\ (USB)
G:\ (USB)
H:\ (USB)
I:\ (USB)
J:\ (USB)
"C:\ToolBar SD" ( MAJ : 21-12-2008|20:47 )
Option : [2] ( 20/02/2009|22:59 )
-----------\\ SUPPRESSION
Supprime! - C:\DOCUME~1\CKSAND~1\MENUDM~1\PROGRA~1\PlayMP3z
Supprime! - C:\DOCUME~1\CKSAND~1\Cookies\cks_andre_sneyaert@surfaccuracy[1].txt
Supprime! - C:\DOCUME~1\CKSAND~1\LOCALS~1\Temp\tem1F.tmp.exe
Supprime! - C:\DOCUME~1\CKSAND~1\LOCALS~1\Temp\nsh21.tmp
Supprime! - C:\DOCUME~1\CKSAND~1\LOCALS~1\Temp\nsk2A.tmp
Supprime! - C:\DOCUME~1\CKSAND~1\LOCALS~1\Temp\nsz13B.tmp
Supprime! - C:\DOCUME~1\CKSAND~1\LOCALS~1\Temp\nsz1EF.tmp
-----------\\ Recherche de Fichiers / Dossiers ...
-----------\\ Extensions
(All Users) - {3112ca9c-de6d-4884-a869-9855de68056c} => google-toolbar
(CKS Andre SNEYAERT) - {3112ca9c-de6d-4884-a869-9855de68056c} => google-toolbar
-----------\\ [..\Internet Explorer\Main]
[HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main]
"Local Page"="C:\\WINDOWS\\system32\\blank.htm"
"Search Page"="https://www.google.com/?gws_rd=ssl"
"Start Page"="http://luck114.com"
"Search Bar"="http://www.google.com/toolbar/ie8/sidebar.html"
"SearchMigratedDefaultURL"="https://www.google.com/webhp?gws_rd=ssl{searchTerms}&sourceid=ie7&rls=com.microsoft:en-US&ie=utf8&oe=utf8"
[HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\Main]
"Default_Page_URL"="https://www.msn.com/fr-fr/?ocid=iehp"
"Default_Search_URL"="http://www.google.com/toolbar/ie8/sidebar.html"
"Search Page"="https://www.google.com/?gws_rd=ssl"
"Start Page"="https://www.google.com/?gws_rd=ssl"
--------------------\\ Recherche d'autres infections
C:\WINDOWS\Tasks\At1.job
C:\WINDOWS\Tasks\At10.job
C:\WINDOWS\Tasks\At11.job
C:\WINDOWS\Tasks\At12.job
C:\WINDOWS\Tasks\At13.job
C:\WINDOWS\Tasks\At14.job
C:\WINDOWS\Tasks\At15.job
C:\WINDOWS\Tasks\At16.job
C:\WINDOWS\Tasks\At17.job
C:\WINDOWS\Tasks\At18.job
C:\WINDOWS\Tasks\At19.job
C:\WINDOWS\Tasks\At2.job
C:\WINDOWS\Tasks\At20.job
C:\WINDOWS\Tasks\At21.job
C:\WINDOWS\Tasks\At22.job
C:\WINDOWS\Tasks\At23.job
C:\WINDOWS\Tasks\At24.job
C:\WINDOWS\Tasks\At25.job
C:\WINDOWS\Tasks\At26.job
C:\WINDOWS\Tasks\At27.job
C:\WINDOWS\Tasks\At28.job
C:\WINDOWS\Tasks\At29.job
C:\WINDOWS\Tasks\At3.job
C:\WINDOWS\Tasks\At30.job
C:\WINDOWS\Tasks\At31.job
C:\WINDOWS\Tasks\At32.job
C:\WINDOWS\Tasks\At33.job
C:\WINDOWS\Tasks\At34.job
C:\WINDOWS\Tasks\At35.job
C:\WINDOWS\Tasks\At36.job
C:\WINDOWS\Tasks\At37.job
C:\WINDOWS\Tasks\At38.job
C:\WINDOWS\Tasks\At39.job
C:\WINDOWS\Tasks\At4.job
C:\WINDOWS\Tasks\At40.job
C:\WINDOWS\Tasks\At41.job
C:\WINDOWS\Tasks\At42.job
C:\WINDOWS\Tasks\At43.job
C:\WINDOWS\Tasks\At44.job
C:\WINDOWS\Tasks\At45.job
C:\WINDOWS\Tasks\At46.job
C:\WINDOWS\Tasks\At47.job
C:\WINDOWS\Tasks\At48.job
C:\WINDOWS\Tasks\At49.job
C:\WINDOWS\Tasks\At5.job
C:\WINDOWS\Tasks\At50.job
C:\WINDOWS\Tasks\At51.job
C:\WINDOWS\Tasks\At52.job
C:\WINDOWS\Tasks\At53.job
C:\WINDOWS\Tasks\At54.job
C:\WINDOWS\Tasks\At55.job
C:\WINDOWS\Tasks\At56.job
C:\WINDOWS\Tasks\At57.job
C:\WINDOWS\Tasks\At58.job
C:\WINDOWS\Tasks\At59.job
C:\WINDOWS\Tasks\At6.job
C:\WINDOWS\Tasks\At60.job
C:\WINDOWS\Tasks\At61.job
C:\WINDOWS\Tasks\At62.job
C:\WINDOWS\Tasks\At63.job
C:\WINDOWS\Tasks\At64.job
C:\WINDOWS\Tasks\At65.job
C:\WINDOWS\Tasks\At66.job
C:\WINDOWS\Tasks\At67.job
C:\WINDOWS\Tasks\At68.job
C:\WINDOWS\Tasks\At69.job
C:\WINDOWS\Tasks\At7.job
C:\WINDOWS\Tasks\At70.job
C:\WINDOWS\Tasks\At71.job
C:\WINDOWS\Tasks\At72.job
C:\WINDOWS\Tasks\At8.job
C:\WINDOWS\Tasks\At9.job
--------------------\\ ROGUES ..
C:\DOCUME~1\CKSAND~1\MENUDM~1\PROGRA~1\XP_Antispyware
--------------------\\ Cracks & Keygens ..
C:\DOCUME~1\CKSAND~1\Cookies\cks_andre_sneyaert@captaincrackwhore[2].txt
C:\DOCUME~1\CKSAND~1\Cookies\cks_andre_sneyaert@likecrack[1].txt
C:\DOCUME~1\CKSAND~1\Cookies\cks_andre_sneyaert@www.captaincrackwhore[1].txt
1 - "C:\ToolBar SD\TB_1.txt" - 20/02/2009|22:26 - Option : [1]
2 - "C:\ToolBar SD\TB_2.txt" - 20/02/2009|23:00 - Option : [2]
-----------\\ Fin du rapport a 23:00:04,82
par contre pour ta question concernant CC.pif, je en sais pas ce que c'est
ça peut être une clé USB parce que j'ai pas de disque dur externe
-----------\\ ToolBar S&D 1.2.8 XP/Vista
Microsoft Windows XP Édition familiale ( v5.1.2600 ) Service Pack 3
X86-based PC ( Uniprocessor Free : Intel(R) Pentium(R) 4 CPU 3.06GHz )
BIOS : Phoenix - AwardBIOS v6.00PG
USER : CKS Andre SNEYAERT ( Administrator )
BOOT : Normal boot
C:\ (Local Disk) - NTFS - Total:176 Go (Free:142 Go)
D:\ (CD or DVD)
F:\ (USB)
G:\ (USB)
H:\ (USB)
I:\ (USB)
J:\ (USB)
"C:\ToolBar SD" ( MAJ : 21-12-2008|20:47 )
Option : [2] ( 20/02/2009|22:59 )
-----------\\ SUPPRESSION
Supprime! - C:\DOCUME~1\CKSAND~1\MENUDM~1\PROGRA~1\PlayMP3z
Supprime! - C:\DOCUME~1\CKSAND~1\Cookies\cks_andre_sneyaert@surfaccuracy[1].txt
Supprime! - C:\DOCUME~1\CKSAND~1\LOCALS~1\Temp\tem1F.tmp.exe
Supprime! - C:\DOCUME~1\CKSAND~1\LOCALS~1\Temp\nsh21.tmp
Supprime! - C:\DOCUME~1\CKSAND~1\LOCALS~1\Temp\nsk2A.tmp
Supprime! - C:\DOCUME~1\CKSAND~1\LOCALS~1\Temp\nsz13B.tmp
Supprime! - C:\DOCUME~1\CKSAND~1\LOCALS~1\Temp\nsz1EF.tmp
-----------\\ Recherche de Fichiers / Dossiers ...
-----------\\ Extensions
(All Users) - {3112ca9c-de6d-4884-a869-9855de68056c} => google-toolbar
(CKS Andre SNEYAERT) - {3112ca9c-de6d-4884-a869-9855de68056c} => google-toolbar
-----------\\ [..\Internet Explorer\Main]
[HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main]
"Local Page"="C:\\WINDOWS\\system32\\blank.htm"
"Search Page"="https://www.google.com/?gws_rd=ssl"
"Start Page"="http://luck114.com"
"Search Bar"="http://www.google.com/toolbar/ie8/sidebar.html"
"SearchMigratedDefaultURL"="https://www.google.com/webhp?gws_rd=ssl{searchTerms}&sourceid=ie7&rls=com.microsoft:en-US&ie=utf8&oe=utf8"
[HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\Main]
"Default_Page_URL"="https://www.msn.com/fr-fr/?ocid=iehp"
"Default_Search_URL"="http://www.google.com/toolbar/ie8/sidebar.html"
"Search Page"="https://www.google.com/?gws_rd=ssl"
"Start Page"="https://www.google.com/?gws_rd=ssl"
--------------------\\ Recherche d'autres infections
C:\WINDOWS\Tasks\At1.job
C:\WINDOWS\Tasks\At10.job
C:\WINDOWS\Tasks\At11.job
C:\WINDOWS\Tasks\At12.job
C:\WINDOWS\Tasks\At13.job
C:\WINDOWS\Tasks\At14.job
C:\WINDOWS\Tasks\At15.job
C:\WINDOWS\Tasks\At16.job
C:\WINDOWS\Tasks\At17.job
C:\WINDOWS\Tasks\At18.job
C:\WINDOWS\Tasks\At19.job
C:\WINDOWS\Tasks\At2.job
C:\WINDOWS\Tasks\At20.job
C:\WINDOWS\Tasks\At21.job
C:\WINDOWS\Tasks\At22.job
C:\WINDOWS\Tasks\At23.job
C:\WINDOWS\Tasks\At24.job
C:\WINDOWS\Tasks\At25.job
C:\WINDOWS\Tasks\At26.job
C:\WINDOWS\Tasks\At27.job
C:\WINDOWS\Tasks\At28.job
C:\WINDOWS\Tasks\At29.job
C:\WINDOWS\Tasks\At3.job
C:\WINDOWS\Tasks\At30.job
C:\WINDOWS\Tasks\At31.job
C:\WINDOWS\Tasks\At32.job
C:\WINDOWS\Tasks\At33.job
C:\WINDOWS\Tasks\At34.job
C:\WINDOWS\Tasks\At35.job
C:\WINDOWS\Tasks\At36.job
C:\WINDOWS\Tasks\At37.job
C:\WINDOWS\Tasks\At38.job
C:\WINDOWS\Tasks\At39.job
C:\WINDOWS\Tasks\At4.job
C:\WINDOWS\Tasks\At40.job
C:\WINDOWS\Tasks\At41.job
C:\WINDOWS\Tasks\At42.job
C:\WINDOWS\Tasks\At43.job
C:\WINDOWS\Tasks\At44.job
C:\WINDOWS\Tasks\At45.job
C:\WINDOWS\Tasks\At46.job
C:\WINDOWS\Tasks\At47.job
C:\WINDOWS\Tasks\At48.job
C:\WINDOWS\Tasks\At49.job
C:\WINDOWS\Tasks\At5.job
C:\WINDOWS\Tasks\At50.job
C:\WINDOWS\Tasks\At51.job
C:\WINDOWS\Tasks\At52.job
C:\WINDOWS\Tasks\At53.job
C:\WINDOWS\Tasks\At54.job
C:\WINDOWS\Tasks\At55.job
C:\WINDOWS\Tasks\At56.job
C:\WINDOWS\Tasks\At57.job
C:\WINDOWS\Tasks\At58.job
C:\WINDOWS\Tasks\At59.job
C:\WINDOWS\Tasks\At6.job
C:\WINDOWS\Tasks\At60.job
C:\WINDOWS\Tasks\At61.job
C:\WINDOWS\Tasks\At62.job
C:\WINDOWS\Tasks\At63.job
C:\WINDOWS\Tasks\At64.job
C:\WINDOWS\Tasks\At65.job
C:\WINDOWS\Tasks\At66.job
C:\WINDOWS\Tasks\At67.job
C:\WINDOWS\Tasks\At68.job
C:\WINDOWS\Tasks\At69.job
C:\WINDOWS\Tasks\At7.job
C:\WINDOWS\Tasks\At70.job
C:\WINDOWS\Tasks\At71.job
C:\WINDOWS\Tasks\At72.job
C:\WINDOWS\Tasks\At8.job
C:\WINDOWS\Tasks\At9.job
--------------------\\ ROGUES ..
C:\DOCUME~1\CKSAND~1\MENUDM~1\PROGRA~1\XP_Antispyware
--------------------\\ Cracks & Keygens ..
C:\DOCUME~1\CKSAND~1\Cookies\cks_andre_sneyaert@captaincrackwhore[2].txt
C:\DOCUME~1\CKSAND~1\Cookies\cks_andre_sneyaert@likecrack[1].txt
C:\DOCUME~1\CKSAND~1\Cookies\cks_andre_sneyaert@www.captaincrackwhore[1].txt
1 - "C:\ToolBar SD\TB_1.txt" - 20/02/2009|22:26 - Option : [1]
2 - "C:\ToolBar SD\TB_2.txt" - 20/02/2009|23:00 - Option : [2]
-----------\\ Fin du rapport a 23:00:04,82
ci-après rapport ComboFix
je continue les autres manip.
ComboFix 09-02-21.01 - CKS Andre SNEYAERT 2009-02-24 18:25:19.3 - NTFSx86
Microsoft Windows XP Édition familiale 5.1.2600.3.1252.1.1036.18.894.392 [GMT 1:00]
Lancé depuis: c:\documents and settings\CKS Andre SNEYAERT\Bureau\Combo-Fix.exe
Commutateurs utilisés :: c:\documents and settings\CKS Andre SNEYAERT\Bureau\CFscript.txt
* Un nouveau point de restauration a été créé
.
(((((((((((((((((((((((((((((((((((( Autres suppressions ))))))))))))))))))))))))))))))))))))))))))))))))
.
c:\program files\bccd.pif
c:\program files\Fichiers communs\PushWare
c:\program files\Fichiers communs\PushWare\cpush0.dll
c:\program files\Fichiers communs\PushWare\Uninst.exe
c:\program files\Fichiers communs\qybabiqylo.dl
c:\program files\Fichiers communs\vexomigaga._sy
c:\program files\Fichiers communs\vodeqet.ban
c:\program files\Internet Explorer\PowerJo.ase
c:\program files\Internet Explorer\PowerJv.ask
c:\program files\MediaChannel\Navvy 5.2\NavvyUp.exe
c:\windows\Fonts\TIMPIatform.exe
c:\windows\Fonts\wuauclt.exe
c:\windows\Intel\baiduc.dll
c:\windows\smss.exe
c:\windows\sysinfo.tmp
c:\windows\system\rund1132.exe
c:\windows\system32\16AF66EB.cfg
c:\windows\system32\16AF66EB.dll
c:\windows\system32\1957817A.cfg
c:\windows\system32\1957817A.dll
c:\windows\system32\198FF3D8.cfg
c:\windows\system32\198FF3D8.dll
c:\windows\system32\404Fix.exe
c:\windows\system32\4FBFD5A4.cfg
c:\windows\system32\4FBFD5A4.dll
c:\windows\system32\A1A6BC2E.cfg
c:\windows\system32\A1A6BC2E.dll
c:\windows\system32\Agent.OMZ.Fix.exe
c:\windows\system32\ali712f9.dll
c:\windows\system32\alicf27.dll
c:\windows\system32\alie7c0.dll
c:\windows\system32\alimoto32.exe
c:\windows\system32\ambiojfn.dll
c:\windows\system32\asdfasdf
c:\windows\system32\B4eocaps.SRG
c:\windows\system32\cockgddc.dll
c:\windows\system32\DA63E650.cfg
c:\windows\system32\DA63E650.dll
c:\windows\system32\dafln.dll
c:\windows\system32\dfln.dll
c:\windows\system32\drivers\52438666.txt
c:\windows\system32\drivers\acpidisk.sys
c:\windows\system32\drivers\ati4twxx.sys
c:\windows\system32\drivers\ati8quxx.sys
c:\windows\system32\drivers\ethcjxre.sys
c:\windows\system32\drivers\npf.sys
c:\windows\system32\drivers\pnpmem.sys
c:\windows\system32\drivers\winyyy.sys
c:\windows\system32\dumphive.exe
c:\windows\system32\ebhpliad.dll
c:\windows\system32\exlds.ini
c:\windows\system32\F65BDEC7.cfg
c:\windows\system32\F65BDEC7.dll
c:\windows\system32\fasadf.dll
c:\windows\system32\flzaitian.dll
c:\windows\system32\gprmsgse.axz
c:\windows\system32\gscpx32r.det
c:\windows\system32\homegdpk.dll
c:\windows\system32\IEDFix.C.exe
c:\windows\system32\IEDFix.exe
c:\windows\system32\kdexe.exe
c:\windows\system32\mprmsgse.axz
c:\windows\system32\mscpx32r.det
c:\windows\system32\msexe.exe
c:\windows\system32\MSPolicyAgent.dll
c:\windows\system32\o4Patch.exe
c:\windows\system32\odgildpe.dll
c:\windows\system32\ojdnnlnf.dll
c:\windows\system32\ormsgse.axz
c:\windows\system32\Packet.dll
c:\windows\system32\Process.exe
c:\windows\system32\RamrtwC.dll
c:\windows\system32\registryboosterppcg15.exe
c:\windows\system32\romarshal.dat
c:\windows\system32\somspring.dat
c:\windows\system32\SrchSTS.exe
c:\windows\system32\types.tmp
c:\windows\system32\VACFix.exe
c:\windows\system32\VCCLSID.exe
c:\windows\system32\WanPacket.dll
c:\windows\system32\wauafe.exe
c:\windows\system32\waubfe.exe
c:\windows\system32\waukafe.exe
c:\windows\system32\waulafe.exe
c:\windows\system32\waumafe.exe
c:\windows\system32\waunafe.exe
c:\windows\system32\wpcap.dll
c:\windows\system32\WS2Fix.exe
c:\windows\system32\zxexe.exe
c:\windows\Temp\20090122.exe
c:\windows\WinShell.\daemon.exe
c:\windows\winsscoo.exe
C:\WINDOWSupdate.dll
.
((((((((((((((((((((((((((((((((((((((( Pilotes/Services )))))))))))))))))))))))))))))))))))))))))))))))))
.
-------\Legacy_ACPIDISK
-------\Legacy_ALSK
-------\Legacy_ATI4TWXX
-------\Legacy_ATI8QUXX
-------\Legacy_MYPROT
-------\Legacy_NAKS
-------\Legacy_NPF
-------\Legacy_PNPMEM
-------\Legacy_WINSSCOM
-------\Legacy_ZG
-------\Service_acpidisk
-------\Service_aliimz
-------\Service_alsk
-------\Service_ati4twxx
-------\Service_ati8quxx
-------\Service_ethcjxre
-------\Service_MyProt
-------\Service_naks
-------\Service_npf
-------\Service_pnpmem
-------\Service_WinSSCOM
((((((((((((((((((((((((((((( Fichiers créés du 2009-01-24 au 2009-02-24 ))))))))))))))))))))))))))))))))))))
.
2009-02-24 18:04 . 2009-02-24 18:04 14,962 --ahs---- c:\windows\system32\704C3595.dll
2009-02-24 18:04 . 2009-02-24 18:04 224 --ahs---- c:\windows\system32\704C3595.cfg
2009-02-24 18:03 . 2009-02-24 18:03 14,460 --ahs---- c:\windows\system32\16BC0F81.dll
2009-02-24 18:03 . 2009-02-24 18:03 244 --ahs---- c:\windows\system32\16BC0F81.cfg
2009-02-24 12:19 . 2009-02-24 12:19 40 --a------ c:\windows\tmp.dat
2009-02-24 12:19 . 2009-02-24 12:19 37 --a------ c:\windows\sys.ini
2009-02-23 16:50 . 2004-08-05 13:00 4,224 --a------ c:\windows\system32\drivers\beep.sys
2009-02-23 16:50 . 2004-08-05 13:00 4,224 --a--c--- c:\windows\system32\dllcache\beep.sys
2009-02-21 00:01 . 2009-02-11 10:19 15,504 --a------ c:\windows\system32\drivers\mbam.sys
2009-02-21 00:00 . 2009-02-21 00:01 <REP> d-------- c:\program files\Malwarebytes' Anti-Malware
2009-02-21 00:00 . 2009-02-11 10:19 38,496 --a------ c:\windows\system32\drivers\mbamswissarmy.sys
2009-02-20 23:13 . 2009-02-20 23:13 396,288 --a------ c:\windows\HijackThis.exe
2009-02-20 22:23 . 2009-02-20 23:00 <REP> d-------- C:\ToolBar SD
2009-02-20 21:43 . 2009-02-20 21:43 16,656 --a------ C:\mbam-log-2009-02-20 (21-42-58)VIRUS
2009-02-20 19:50 . 2009-02-20 19:50 15,069 --a------ c:\windows\system32\telechargement-159-hijackthis.htm
2009-02-20 19:04 . 2009-02-20 19:04 <REP> d-------- c:\program files\MediaChannel
2009-02-20 16:08 . 2009-02-20 16:08 <REP> d-------- c:\documents and settings\CKS Andre SNEYAERT\Application Data\Malwarebytes
2009-02-20 16:08 . 2009-02-20 16:08 <REP> d-------- c:\documents and settings\All Users\Application Data\Malwarebytes
2009-02-20 13:11 . 2003-03-18 21:20 1,060,864 --a------ c:\windows\system32\mfc71.dll
2009-02-20 13:01 . 2009-02-20 13:01 520,052 --a------ c:\windows\system32\mfc71.7z
2009-02-20 12:55 . 2009-02-20 13:00 <REP> d-------- c:\windows\system32\mfc71
2009-02-20 12:01 . 2009-02-20 12:02 514,940 -rah----- c:\windows\system32\mfc71.zip
2009-02-20 11:31 . 2009-02-20 11:31 <REP> d-------- c:\documents and settings\CKS Andre SNEYAERT\Application Data\Uniblue
2009-02-19 18:50 . <REP> c:\windows\$WIND$
2009-02-19 18:45 . 2009-02-20 22:16 <REP> d-------- c:\program files\Goto Software
2009-02-19 18:45 . 2009-02-20 22:16 <REP> d-------- c:\program files\Fichiers communs\Goto Software
2009-02-19 18:45 . 2009-02-19 18:45 <REP> d-------- c:\documents and settings\CKS Andre SNEYAERT\Application Data\VadeRetro
2009-02-19 18:45 . 2009-02-20 22:16 <REP> d-------- c:\documents and settings\All Users\Application Data\VadeRetro
2009-02-19 16:43 . <REP> c:\windows\WinShell
2009-02-18 19:42 . 2009-02-18 19:42 31,232 --a------ C:\Relevé de compte LAW YAT au 31.12.2008.doc
2009-02-17 14:47 . 2009-02-24 18:25 <REP> d-------- c:\windows\Intel
2009-02-17 14:45 . 2008-04-14 03:33 19,968 --a--c--- c:\windows\system32\dllcache\linkinfo.dll
2009-02-07 23:10 . 2009-02-07 23:10 170,496 --a------ C:\FINE CRUSH LTD.doc
2009-02-02 21:59 . 2009-02-02 21:59 66,048 --a------ C:\Proposition APOLLO pour Ile MAURICE.doc
2009-02-02 17:57 . 2009-02-02 17:57 48,640 --a------ C:\Clients Ile MAURICE.doc
2009-02-02 12:23 . 2009-02-05 11:49 25,088 --a------ C:\A T T E S T A T I O N Impotsssssssssss.doc
2009-02-02 10:47 . 2009-02-02 10:47 30,720 --a------ C:\A T T E S T A T I O N - I m p o t s.doc
2009-01-31 13:51 . 2009-01-31 20:37 26,624 --a------ C:\Demande prolongation stage.doc
2009-01-27 10:10 . 2009-01-27 11:00 32,256 --a------ C:\Courrier André SNEYAERT.doc
.
(((((((((((((((((((((((((((((((((( Compte-rendu de Find3M ))))))))))))))))))))))))))))))))))))))))))))))))
.
2009-02-24 17:32 --------- d-----w c:\program files\Wanadoo
2009-02-24 11:17 --------- d-----w c:\documents and settings\CKS Andre SNEYAERT\Application Data\Skype
2009-02-23 22:43 431,922 ----a-w c:\program files\HJTInstall.7z
2009-02-23 15:33 --------- d-----w c:\documents and settings\All Users\Application Data\Google Updater
2009-02-20 16:26 --------- d-----w c:\program files\cacmchc
2009-02-18 18:10 --------- d-----w c:\program files\Google
2009-01-23 20:21 --------- d-----w c:\documents and settings\All Users\Application Data\288537758
2009-01-21 19:07 --------- d-----w c:\program files\EnveloppesEditor1.09
2009-01-21 16:56 --------- d-----w c:\documents and settings\CKS Andre SNEYAERT\Application Data\PC-FAX TX
2009-01-16 17:15 137,664 ----a-w c:\windows\system32\drivers\adiusbaw.sys
2008-09-22 09:52 85,504 ----a-w c:\documents and settings\CKS Andre SNEYAERT\Application Data\GDIPFONTCACHEV1.DAT
2008-09-04 14:43 1,940 ----a-w c:\documents and settings\CKS Andre SNEYAERT\Application Data\ViewerApp.dat
2009-02-19 15:43 159,744 ----a-w c:\program files\internet explorer\plugins\icwres.dll
2008-09-27 10:02 122,880 ----a-w c:\program files\mozilla firefox\components\GoogleDesktopMozilla.dll
.
------- Sigcheck -------
2004-08-05 13:00 15360 5584247b568c2e53934873f4b655fe6a c:\windows\$NtServicePackUninstall$\ctfmon.exe
2008-04-14 03:33 15360 59dc5bb82e4c8e0b3eadcfdbc44ba6e4 c:\windows\ServicePackFiles\i386\ctfmon.exe
2008-04-14 03:33 15360 9bc8230dda8e37e375a5a9aa551a8f76 c:\windows\system32\ctfmon.exe
.
((((((((((((((((((((((((((((( SnapShot@2009-02-24_ 1.22.06.37 )))))))))))))))))))))))))))))))))))))))))
.
- 2009-02-24 00:16:01 3,740 ----a-w c:\windows\Downloaded Program Files\alg.exe
+ 2009-02-24 17:32:35 3,740 ----a-w c:\windows\Downloaded Program Files\alg.exe
+ 2008-08-14 13:23:49 45,056 ----a-w c:\windows\system32\aoalmieo.dll
+ 2008-08-14 13:23:49 34,816 ----a-w c:\windows\system32\cbndboek.dll
+ 2008-08-14 13:23:49 249,856 ----a-w c:\windows\system32\cciieood.dll
+ 2008-08-14 13:23:49 40,960 ----a-w c:\windows\system32\cdcgebkf.dll
+ 2008-08-14 13:23:49 45,056 ----a-w c:\windows\system32\cpnbliif.dll
+ 2008-08-14 13:23:49 49,152 ----a-w c:\windows\system32\dpbfhnfj.dll
+ 2008-08-14 13:23:49 229,376 ----a-w c:\windows\system32\feeckhoj.dll
+ 2008-08-14 13:23:49 34,304 ----a-w c:\windows\system32\gjdochbi.dll
+ 2008-08-14 13:23:49 28,672 ----a-w c:\windows\system32\ipppkhkc.dll
+ 2008-08-14 13:23:49 40,960 ----a-w c:\windows\system32\mppblchp.dll
+ 2008-08-14 13:23:49 65,536 ----a-w c:\windows\system32\nfbdadcc.dll
- 2009-02-24 00:18:25 49,152 ----a-w c:\windows\system32\npptools.dll
+ 2008-04-14 02:33:36 55,296 ----a-w c:\windows\system32\npptools.dll
+ 2008-08-14 13:23:49 32,256 ----a-w c:\windows\system32\pahklhok.dll
+ 2008-08-14 13:23:49 40,960 ----a-w c:\windows\system32\pfpjhepc.dll
+ 2008-08-14 13:23:49 45,056 ----a-w c:\windows\system32\piakdpih.dll
+ 2009-02-24 17:31:30 16,384 ----atw c:\windows\Temp\Perflib_Perfdata_b4.dat
.
-- Instantané actualisé --
.
((((((((((((((((((((((((((((((((( Points de chargement Reg ))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* les éléments vides & les éléments initiaux légitimes ne sont pas listés
REGEDIT4
[HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{11F09AFD-75AD-4E51-AB43-E09E9351CE16}]
2009-02-10 04:30 196608 --a------ c:\program files\Fichiers communs\PushWare\cpush.dll
[HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{296AB8C6-FB22-4D17-8834-064E2BA0A6F0}]
2009-03-09 04:43 155648 -ra------ c:\windows\Intel\baiduc.dll
[HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{489873CE-F3E1-44A3-8E89-04BE26BE4446}]
2009-02-10 05:14 193912 --a------ c:\program files\Internet Explorer\IETimber\IETimber.dll
[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"CTFMON.EXE"="c:\windows\system32\ctfmon.exe" [2008-04-14 15360]
"WOOKIT"="c:\progra~1\Wanadoo\Shell.exe" [2004-08-23 122880]
"Livecom"="c:\progra~1\Livecom\APPLIC~1\CommunicationAgent\CommunicationAgent.exe" [2006-02-23 237568]
"Skype"="c:\program files\Skype\Phone\Skype.exe" [2007-02-09 25388584]
"swg"="c:\program files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe" [2007-07-01 68856]
"MoneyAgent"="c:\program files\Microsoft Money\System\mnyexpr.exe" [2002-07-17 204863]
"WMPNSCFG"="c:\program files\Windows Media Player\WMPNSCFG.exe" [2006-11-03 204288]
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"fenaffiche"="c:\program files\FenAffiche\FenUnika.exe" [2004-07-23 36864]
"NeroFilterCheck"="c:\windows\system32\NeroCheck.exe" [2001-07-09 155648]
"Microsoft Works Update Detection"="c:\program files\Fichiers communs\Microsoft Shared\Works Shared\WkUFind.exe" [2002-07-18 28672]
"WOOWATCH"="c:\progra~1\Wanadoo\Watch.exe" [2004-08-23 20480]
"WOOTASKBARICON"="c:\progra~1\Wanadoo\GestMaj.exe" [2004-10-14 32768]
"SunJavaUpdateSched"="c:\program files\Java\jre6\bin\jusched.exe" [2008-12-20 136600]
"Creative WebCam Tray"="c:\program files\Creative\Shared Files\CAMTRAY.EXE" [2003-10-13 184320]
"Google Desktop Search"="c:\program files\Google\Google Desktop Search\GoogleDesktop.exe" [2008-09-27 29744]
"QuickTime Task"="c:\program files\QuickTime\qttask.exe" [2006-09-01 282624]
"Adobe Reader Speed Launcher"="c:\program files\Adobe\Reader 8.0\Reader\Reader_sl.exe" [2007-10-10 39792]
"SSBkgdUpdate"="c:\program files\Fichiers communs\Scansoft Shared\SSBkgdUpdate\SSBkgdupdate.exe" [2006-10-25 210472]
"PaperPort PTD"="c:\program files\ScanSoft\PaperPort\pptd40nt.exe" [2007-01-29 30248]
"IndexSearch"="c:\program files\ScanSoft\PaperPort\IndexSearch.exe" [2007-01-29 46632]
"PPort11reminder"="c:\program files\ScanSoft\PaperPort\Ereg\Ereg.exe" [2007-02-01 255528]
"BrMfcWnd"="c:\program files\Brother\Brmfcmon\BrMfcWnd.exe" [2007-03-23 663552]
"ControlCenter3"="c:\program files\Brother\ControlCenter3\brctrcen.exe" [2007-01-26 65536]
"SiSPower"="SiSPower.dll" [2005-04-12 c:\windows\system32\SiSPower.dll]
"SoundMan"="SOUNDMAN.EXE" [2005-03-24 c:\windows\SOUNDMAN.EXE]
[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run]
"CTFMON.EXE"="c:\windows\system32\ctfmon.exe" [2008-04-14 15360]
"Picasa Media Detector"="c:\program files\Picasa2\PicasaMediaDetector.exe" [2008-08-21 443968]
"msnmsgr"="c:\program files\Windows Live\Messenger\msnmsgr.exe" [2007-10-18 5724184]
[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\RunOnce]
"FlashPlayerUpdate"="c:\windows\system32\Macromed\Flash\FlashUtil9d.exe" [2007-06-11 190696]
[HKEY_LOCAL_MACHINE\software\microsoft\windows\Currentversion\policies\explorer\Run]
"user"="c:\windows\WinShell..\daemon.exe" [BU]
"360safe"="c:\windows\Fonts\wuauclt.exe" [2009-02-24 19968]
c:\documents and settings\CKS Andre SNEYAERT\Menu D‚marrer\Programmes\D‚marrage\
Outil de d‚tection de support Picture Motion Browser.lnk - c:\program files\Sony\Sony Picture Utility\PMBCore\SPUVolumeWatcher.exe [2008-07-19 385024]
c:\documents and settings\All Users\Menu D‚marrer\Programmes\D‚marrage\
Microsoft Office.lnk - c:\program files\Microsoft Office\Office10\OSA.EXE [2001-02-13 83360]
Picture Package Menu.lnk - c:\program files\Sony Corporation\Picture Package\Picture Package Menu\SonyTray.exe [2006-04-28 151552]
Picture Package VCD Maker.lnk - c:\program files\Sony Corporation\Picture Package\Picture Package Applications\Residence.exe [2006-04-28 106496]
Utilitaire r‚seau pour SAGEM Wi-Fi 11g USB adapter.lnk - c:\program files\SAGEM Wi-Fi USB 802.11g\WLANUTL.exe [2007-04-20 835584]
[HKEY_CURRENT_USER\software\microsoft\windows\currentversion\policies\explorer]
"ForceClassicControlPanel"= 1 (0x1)
[hkey_local_machine\software\microsoft\windows\currentversion\explorer\ShellExecuteHooks]
"{198FF3D8-56F1-466B-A36F-F9C28B43E440}"= "198FF3D8.dll" [BU]
"{1957817A-94B2-4CAC-B113-A331809B5730}"= "1957817A.dll" [BU]
"{CC22E88D-6A04-4A65-A4B9-0CC0D3AE3014}"= "c:\windows\system32\cciieood.dll" [2008-08-14 249856]
"{03D8C1B2-5C21-4784-96C1-00228A85A357}"= "c:\windows\system32\gjdochbi.dll" [2008-08-14 34304]
"{CDC0EB4F-C90A-47A7-B43F-47AC7FFBC413}"= "c:\windows\system32\cdcgebkf.dll" [2008-08-14 40960]
"{D9BF17F3-F42E-48E2-B098-A0E2C9013FB3}"= "c:\windows\system32\dpbfhnfj.dll" [2008-08-14 49152]
"{CB7DB8E4-2C26-4A99-89E8-9339AC260CA4}"= "c:\windows\system32\cbndboek.dll" [2008-08-14 34816]
"{C97B522F-A373-4954-A638-FC5F755A6161}"= "c:\windows\system32\cpnbliif.dll" [2008-08-14 45056]
"{2999414C-E194-4B03-8486-EEEE03F40EE9}"= "c:\windows\system32\ipppkhkc.dll" [2008-08-14 28672]
"{FEEC4183-4715-4F28-891C-077F07231A6B}"= "c:\windows\system32\feeckhoj.dll" [2008-08-14 229376]
"{9F931E9C-F6FB-4918-844E-A6CE25B24792}"= "c:\windows\system32\pfpjhepc.dll" [2008-08-14 40960]
"{9A145184-6AA3-43CD-958D-D22A1D9D9333}"= "c:\windows\system32\pahklhok.dll" [2008-08-14 32256]
"{699B5C19-E0A2-4121-A989-D7A8A1B6B104}"= "c:\windows\system32\mppblchp.dll" [2008-08-14 40960]
"{A8A562E8-97BC-4E82-BAA2-0F361A9F9EF5}"= "c:\windows\system32\aoalmieo.dll" [2008-08-14 45056]
"{92A4D921-7454-4A8B-A510-93E9AFB53821}"= "c:\windows\system32\piakdpih.dll" [2008-08-14 45056]
"{7FBDADCC-FC94-46BB-BA54-84BE7CBC5D92}"= "c:\windows\system32\nfbdadcc.dll" [2008-08-14 65536]
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad]
"CC22E88D"= {CC22E88D-6A04-4A65-A4B9-0CC0D3AE3014} - c:\windows\system32\cciieood.dll [2008-08-14 249856]
"03D8C1B2"= {03D8C1B2-5C21-4784-96C1-00228A85A357} - c:\windows\system32\gjdochbi.dll [2008-08-14 34304]
"CDC0EB4F"= {CDC0EB4F-C90A-47A7-B43F-47AC7FFBC413} - c:\windows\system32\cdcgebkf.dll [2008-08-14 40960]
"D9BF17F3"= {D9BF17F3-F42E-48E2-B098-A0E2C9013FB3} - c:\windows\system32\dpbfhnfj.dll [2008-08-14 49152]
"CB7DB8E4"= {CB7DB8E4-2C26-4A99-89E8-9339AC260CA4} - c:\windows\system32\cbndboek.dll [2008-08-14 34816]
"C97B522F"= {C97B522F-A373-4954-A638-FC5F755A6161} - c:\windows\system32\cpnbliif.dll [2008-08-14 45056]
"2999414C"= {2999414C-E194-4B03-8486-EEEE03F40EE9} - c:\windows\system32\ipppkhkc.dll [2008-08-14 28672]
"FEEC4183"= {FEEC4183-4715-4F28-891C-077F07231A6B} - c:\windows\system32\feeckhoj.dll [2008-08-14 229376]
"9F931E9C"= {9F931E9C-F6FB-4918-844E-A6CE25B24792} - c:\windows\system32\pfpjhepc.dll [2008-08-14 40960]
"9A145184"= {9A145184-6AA3-43CD-958D-D22A1D9D9333} - c:\windows\system32\pahklhok.dll [2008-08-14 32256]
"699B5C19"= {699B5C19-E0A2-4121-A989-D7A8A1B6B104} - c:\windows\system32\mppblchp.dll [2008-08-14 40960]
"A8A562E8"= {A8A562E8-97BC-4E82-BAA2-0F361A9F9EF5} - c:\windows\system32\aoalmieo.dll [2008-08-14 45056]
"92A4D921"= {92A4D921-7454-4A8B-A510-93E9AFB53821} - c:\windows\system32\piakdpih.dll [2008-08-14 45056]
"7FBDADCC"= {7FBDADCC-FC94-46BB-BA54-84BE7CBC5D92} - c:\windows\system32\nfbdadcc.dll [2008-08-14 65536]
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\360rpt.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\360safe.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\360safebox.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\360tray.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\ANTIARP.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\ArSwp.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\Ast.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\AutoRun.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\AutoRunKiller.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\AvMonitor.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\AVP.COM]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\AVP.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\CCenter.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\Frameworkservice.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\GFUpd.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\GuardField.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\HijackThis.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\IceSword.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\Iparmor.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\KASARP.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\kav32.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\KAVPFW.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\kavstart.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\kissvc.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\kmailmon.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\KPfwSvc.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\KRegEx.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\KVMonxp.KXP]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\KVSrvXP.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\KVWSC.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\kwatch.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\Mmsk.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\Navapsvc.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\nod32krn.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\Nod32kui.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\PFW.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\QQDoctor.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\RAV.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\RavMon.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\RavMonD.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\Ravservice.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\RavStub.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\RavTask.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\RAVTRAY.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\Regedit.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\rfwmain.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\rfwProxy.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\rfwsrv.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\Rfwstub.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\RsAgent.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\Rsaupd.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\RsMain.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\rsnetsvr.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\RSTray.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\Runiep.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\safeboxTray.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\ScanFrm.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\SREngLdr.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\TrojanDetector.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\Trojanwall.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\TrojDie.KXP]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\VPC32.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\VPTRAY.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\WOPTILITIES.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\security center]
"AntiVirusDisableNotify"=dword:00000001
"UpdatesDisableNotify"=dword:00000001
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%windir%\\system32\\sessmgr.exe"=
"c:\\Program Files\\Messenger\\msmsgs.exe"=
"c:\\Program Files\\eMule\\emule.exe"=
"c:\\Program Files\\Livecom\\Application\\eConfv4\\livecomp.exe"=
"c:\\PROGRA~1\\Livecom\\APPLIC~1\\Exe\\Livecom.exe"=
"%windir%\\Network Diagnostic\\xpnetdiag.exe"=
"c:\\Program Files\\Windows Live\\Messenger\\msnmsgr.exe"=
"c:\\Program Files\\Windows Live\\Messenger\\livecall.exe"=
"c:\\Program Files\\Skype\\Phone\\Skype.exe"=
"c:\\Program Files\\Shareaza\\Shareaza.exe"=
S2 BackWeb Client - 174112;Securitoo AntiVirus;c:\progra~1\SECURI~1\174112\Program\SERVIC~1.EXE --> c:\progra~1\SECURI~1\174112\Program\SERVIC~1.EXE [?]
S2 MSPolicyAgent;Microsoft IPsec Policy Agent;c:\windows\System32\svchost.exe -k MSPolicyAgent [2008-04-14 14336]
S3 GoogleDesktopManager-061008-081103;Google Desktop Manager 5.7.806.10245;c:\program files\Google\Google Desktop Search\GoogleDesktop.exe [2007-11-21 29744]
S3 P1120VID;Creative WebCam NX Ultra;c:\windows\system32\drivers\P1120Vid.sys [2006-02-01 1252474]
S3 PsShutdownSvc;PsShutdown;c:\windows\system32\PSSDNSVC.EXE [2005-08-22 65536]
S3 SG760_XP;SAGEM 802.11g XG760 1211 Driver;c:\windows\system32\drivers\WlanUZXP.sys [2007-04-20 260608]
S3 UPDATEDATA;UPDATEDATA;c:\windows\system32\drivers\acpiec.sys [2001-08-23 12032]
S3 ZDCndis5;ZDCndis5 Protocol Driver;c:\windows\system32\zdcndis5.sys [2009-01-16 137664]
--- Autres Services/Pilotes en mémoire ---
*NewlyCreated* - NPF
*NewlyCreated* - ZDPNDIS5
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\svchost]
MSPolicyAgent REG_MULTI_SZ MSPolicyAgent
.
Contenu du dossier 'Tâches planifiées'
2009-02-23 c:\windows\Tasks\AppleSoftwareUpdate.job
- c:\program files\Apple Software Update\SoftwareUpdate.exe [2006-08-29 14:21]
2009-02-23 c:\windows\Tasks\At1.job
- c:\windows\system32\7f7lMNDh.exe []
2009-02-24 c:\windows\Tasks\At10.job
- c:\windows\system32\7f7lMNDh.exe []
2009-02-24 c:\windows\Tasks\At11.job
- c:\windows\system32\7f7lMNDh.exe []
2009-02-24 c:\windows\Tasks\At12.job
- c:\windows\system32\7f7lMNDh.exe []
2009-02-24 c:\windows\Tasks\At13.job
- c:\windows\system32\7f7lMNDh.exe []
2009-02-24 c:\windows\Tasks\At14.job
- c:\windows\system32\7f7lMNDh.exe []
2009-02-24 c:\windows\Tasks\At15.job
- c:\windows\system32\7f7lMNDh.exe []
2009-02-24 c:\windows\Tasks\At16.job
- c:\windows\system32\7f7lMNDh.exe []
2009-02-24 c:\windows\Tasks\At17.job
- c:\windows\system32\7f7lMNDh.exe []
2009-02-24 c:\windows\Tasks\At18.job
- c:\windows\system32\7f7lMNDh.exe []
2009-02-24 c:\windows\Tasks\At19.job
- c:\windows\system32\7f7lMNDh.exe []
2009-02-24 c:\windows\Tasks\At2.job
- c:\windows\system32\7f7lMNDh.exe []
2009-02-23 c:\windows\Tasks\At20.job
- c:\windows\system32\7f7lMNDh.exe []
2009-02-23 c:\windows\Tasks\At21.job
- c:\windows\system32\7f7lMNDh.exe []
2009-02-23 c:\windows\Tasks\At22.job
- c:\windows\system32\7f7lMNDh.exe []
2009-02-23 c:\windows\Tasks\At23.job
- c:\windows\system32\7f7lMNDh.exe []
2009-02-23 c:\windows\Tasks\At24.job
- c:\windows\system32\7f7lMNDh.exe []
2009-02-23 c:\windows\Tasks\At25.job
- c:\windows\system32\7f7lMNDh.exe []
2009-02-24 c:\windows\Tasks\At26.job
- c:\windows\system32\7f7lMNDh.exe []
2009-02-24 c:\windows\Tasks\At27.job
- c:\windows\system32\7f7lMNDh.exe []
2009-01-23 c:\windows\Tasks\At28.job
- c:\windows\system32\7f7lMNDh.exe []
2009-01-23 c:\windows\Tasks\At29.job
- c:\windows\system32\7f7lMNDh.exe []
2009-02-24 c:\windows\Tasks\At3.job
- c:\windows\system32\7f7lMNDh.exe []
2009-01-23 c:\windows\Tasks\At30.job
- c:\windows\system32\7f7lMNDh.exe []
2009-01-23 c:\windows\Tasks\At31.job
- c:\windows\system32\7f7lMNDh.exe []
2009-01-23 c:\windows\Tasks\At32.job
- c:\windows\system32\7f7lMNDh.exe []
2009-02-19 c:\windows\Tasks\At33.job
- c:\windows\system32\7f7lMNDh.exe []
2009-02-24 c:\windows\Tasks\At34.job
- c:\windows\system32\7f7lMNDh.exe []
2009-02-24 c:\windows\Tasks\At35.job
- c:\windows\system32\7f7lMNDh.exe []
2009-02-24 c:\windows\Tasks\At36.job
- c:\windows\system32\7f7lMNDh.exe []
2009-02-24 c:\windows\Tasks\At37.job
- c:\windows\system32\7f7lMNDh.exe []
2009-02-24 c:\windows\Tasks\At38.job
- c:\windows\system32\7f7lMNDh.exe []
2009-02-24 c:\windows\Tasks\At39.job
- c:\windows\system32\7f7lMNDh.exe []
2009-01-23 c:\windows\Tasks\At4.job
- c:\windows\system32\7f7lMNDh.exe []
2009-02-24 c:\windows\Tasks\At40.job
- c:\windows\system32\7f7lMNDh.exe []
2009-02-24 c:\windows\Tasks\At41.job
- c:\windows\system32\7f7lMNDh.exe []
2009-02-24 c:\windows\Tasks\At42.job
- c:\windows\system32\7f7lMNDh.exe []
2009-02-24 c:\windows\Tasks\At43.job
- c:\windows\system32\7f7lMNDh.exe []
2009-02-23 c:\windows\Tasks\At44.job
- c:\windows\system32\7f7lMNDh.exe []
2009-02-23 c:\windows\Tasks\At45.job
- c:\windows\system32\7f7lMNDh.exe []
2009-02-23 c:\windows\Tasks\At46.job
- c:\windows\system32\7f7lMNDh.exe []
2009-02-23 c:\windows\Tasks\At47.job
- c:\windows\system32\7f7lMNDh.exe []
2009-02-23 c:\windows\Tasks\At48.job
- c:\windows\system32\7f7lMNDh.exe []
2009-02-23 c:\windows\Tasks\At49.job
- c:\windows\system32\7f7lMNDh.exe []
2009-01-23 c:\windows\Tasks\At5.job
- c:\windows\system32\7f7lMNDh.exe []
2009-02-24 c:\windows\Tasks\At50.job
- c:\windows\system32\7f7lMNDh.exe []
2009-02-24 c:\windows\Tasks\At51.job
- c:\windows\system32\7f7lMNDh.exe []
2009-01-23 c:\windows\Tasks\At52.job
- c:\windows\system32\7f7lMNDh.exe []
2009-01-23 c:\windows\Tasks\At53.job
- c:\windows\system32\7f7lMNDh.exe []
2009-01-23 c:\windows\Tasks\At54.job
- c:\windows\system32\7f7lMNDh.exe []
2009-01-23 c:\windows\Tasks\At55.job
- c:\windows\system32\7f7lMNDh.exe []
2009-01-23 c:\windows\Tasks\At56.job
- c:\windows\system32\7f7lMNDh.exe []
2009-02-19 c:\windows\Tasks\At57.job
- c:\windows\system32\7f7lMNDh.exe []
2009-02-24 c:\windows\Tasks\At58.job
- c:\windows\system32\7f7lMNDh.exe []
2009-02-24 c:\windows\Tasks\At59.job
- c:\windows\system32\7f7lMNDh.exe []
2009-01-23 c:\windows\Tasks\At6.job
- c:\windows\system32\7f7lMNDh.exe []
2009-02-24 c:\windows\Tasks\At60.job
- c:\windows\system32\7f7lMNDh.exe []
2009-02-24 c:\windows\Tasks\At61.job
- c:\windows\system32\7f7lMNDh.exe []
2009-02-24 c:\windows\Tasks\At62.job
- c:\windows\system32\7f7lMNDh.exe []
2009-02-24 c:\windows\Tasks\At63.job
- c:\windows\system32\7f7lMNDh.exe []
2009-02-24 c:\windows\Tasks\At64.job
- c:\windows\system32\7f7lMNDh.exe []
2009-02-24 c:\windows\Tasks\At65.job
- c:\windows\system32\7f7lMNDh.exe []
2009-02-24 c:\windows\Tasks\At66.job
- c:\windows\system32\7f7lMNDh.exe []
2009-02-24 c:\windows\Tasks\At67.job
- c:\windows\system32\7f7lMNDh.exe []
2009-02-23 c:\windows\Tasks\At68.job
- c:\windows\system32\7f7lMNDh.exe []
2009-02-23 c:\windows\Tasks\At69.job
- c:\windows\system32\7f7lMNDh.exe []
2009-01-23 c:\windows\Tasks\At7.job
- c:\windows\system32\7f7lMNDh.exe []
2009-02-23 c:\windows\Tasks\At70.job
- c:\windows\system32\7f7lMNDh.exe []
2009-02-23 c:\windows\Tasks\At71.job
- c:\windows\system32\7f7lMNDh.exe []
2009-02-23 c:\windows\Tasks\At72.job
- c:\windows\system32\7f7lMNDh.exe []
2009-01-23 c:\windows\Tasks\At8.job
- c:\windows\system32\7f7lMNDh.exe []
2009-02-19 c:\windows\Tasks\At9.job
- c:\windows\system32\7f7lMNDh.exe []
2009-02-24 c:\windows\Tasks\Google Software Updater.job
- c:\program files\Google\Common\Google Updater\GoogleUpdaterService.exe [2009-02-23 15:32]
2009-02-24 c:\windows\Tasks\Vérifier les mises à jour de Windows Live Toolbar.job
- c:\program files\Windows Live Toolbar\MSNTBUP.EXE [2007-10-19 11:20]
.
- - - - ORPHELINS SUPPRIMES - - - -
HKLM-Run-Á³# Lh'þ9Óœð3rÅWc:\program files\ISTsvc\istsvc.exe - c:\windows\hxyjlul.exe
ShellExecuteHooks-{8D025D9E-A5AC-49DB-968D-1F2A3C030840} - c:\windows\system32\odgildpe.dll
ShellExecuteHooks-{EB1952AD-75E8-4E4E-B626-2C415DA35709} - c:\windows\system32\ebhpliad.dll
ShellExecuteHooks-{186E0D94-F863-43EF-9B43-38DAC43C064B} - c:\windows\system32\homegdpk.dll
ShellExecuteHooks-{C8C40DDC-9B46-4266-BA0B-5AF248442C3B} - c:\windows\system32\cockgddc.dll
ShellExecuteHooks-{83D7757F-4582-4300-9F03-C3D1A544A9D0} - c:\windows\system32\ojdnnlnf.dll
ShellExecuteHooks-{A6B283F7-EAC4-4110-ACAA-A2D0B85466B7} - c:\windows\system32\ambiojfn.dll
ShellExecuteHooks-{16BC0F81-410C-41DF-A902-1B04368BA8AE} - 16BC0F81.dll
ShellExecuteHooks-{704C3595-DB85-40F6-A601-8D6F346907BD} - 704C3595.dll
SafeBoot-ati4twxx.sys
SafeBoot-ati8quxx.sys
.
------- Examen supplémentaire -------
.
uStart Page = hxxp://luck114.com
uSearchMigratedDefaultURL = hxxp://www.google.com/search?q={searchTerms}&sourceid=ie7&rls=com.microsoft:en-US&ie=utf8&oe=utf8
mStart Page = hxxp://www.google.com
uSearchURL,(Default) = hxxp://g.msn.fr/0SEFRFR/SAOS01?FORM=TOOLBR
IE: &Windows Live Search - c:\program files\Windows Live Toolbar\msntb.dll/search.htm
IE: Add to Windows &Live Favorites - https://onedrive.live.com/?id=favorites
FF - ProfilePath - c:\documents and settings\CKS Andre SNEYAERT\Application Data\Mozilla\Firefox\Profiles\h6n3nsr0.default\
FF - prefs.js: browser.search.defaulturl - hxxp://www.google.com/search?lr=&ie=UTF-8&oe=UTF-8&q=
FF - prefs.js: browser.search.selectedEngine - Google
FF - prefs.js: browser.startup.homepage - hxxp://en-us.start.mozilla.com/firefox?client=firefox-a&rls=org.mozilla:fr:official
.
**************************************************************************
catchme 0.3.1367 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2009-02-24 18:31:49
Windows 5.1.2600 Service Pack 3 NTFS
Recherche de processus cachés ...
Recherche d'éléments en démarrage automatique cachés ...
HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run
user = c:\windows\WinShell..\daemon.exe???????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????
Recherche de fichiers cachés ...
c:\windows\system32\wpcap.dll 240496 bytes executable
c:\windows\system32\Packet.dll 88952 bytes executable
c:\windows\system32\exlds.ini 141 bytes
c:\windows\system32\WanPacket.dll 68480 bytes executable
c:\windows\system32\waubfe.exe 13531 bytes executable
Scan terminé avec succès
Fichiers cachés: 5
**************************************************************************
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"Á³# L\"h'þ9Óœð3rÅWc:\\Program Files\\ISTsvc\\istsvc.exe"="c:\\WINDOWS\\hxyjlul.exe"
.
------------------------ Autres processus actifs ------------------------
.
c:\windows\system32\FTRTSVC.exe
c:\program files\Java\jre6\bin\jqs.exe
c:\progra~1\Wanadoo\TaskBarIcon.exe
c:\program files\Brother\ControlCenter3\BrccMCtl.exe
c:\progra~1\Wanadoo\EspaceWanadoo.exe
c:\progra~1\Wanadoo\ComComp.exe
c:\progra~1\Wanadoo\Toaster.exe
c:\program files\Windows Media Player\wmpnetwk.exe
c:\progra~1\Wanadoo\Inactivity.exe
c:\progra~1\Wanadoo\PollingModule.exe
c:\program files\Brother\Brmfcmon\BrMfcMon.exe
c:\windows\system32\ALERTM~1\ALERTM~1.EXE
c:\docume~1\CKSAND~1\LOCALS~1\temp\sys2A.tmp
c:\windows\Fonts\TIMPIatform.exe
c:\windows\system32\waubfe.exe
c:\windows\system32\waubfe.exe
.
**************************************************************************
.
Heure de fin: 2009-02-24 18:39:58 - La machine a redémarré
ComboFix-quarantined-files.txt 2009-02-24 17:39:55
ComboFix2.txt 2009-02-24 01:05:33
ComboFix3.txt 2009-02-24 00:24:40
Avant-CF: 154 377 080 832 octets libres
Après-CF: 154,386,890,752 octets libres
682 --- E O F --- 2009-02-11 20:24:11
je continue les autres manip.
ComboFix 09-02-21.01 - CKS Andre SNEYAERT 2009-02-24 18:25:19.3 - NTFSx86
Microsoft Windows XP Édition familiale 5.1.2600.3.1252.1.1036.18.894.392 [GMT 1:00]
Lancé depuis: c:\documents and settings\CKS Andre SNEYAERT\Bureau\Combo-Fix.exe
Commutateurs utilisés :: c:\documents and settings\CKS Andre SNEYAERT\Bureau\CFscript.txt
* Un nouveau point de restauration a été créé
.
(((((((((((((((((((((((((((((((((((( Autres suppressions ))))))))))))))))))))))))))))))))))))))))))))))))
.
c:\program files\bccd.pif
c:\program files\Fichiers communs\PushWare
c:\program files\Fichiers communs\PushWare\cpush0.dll
c:\program files\Fichiers communs\PushWare\Uninst.exe
c:\program files\Fichiers communs\qybabiqylo.dl
c:\program files\Fichiers communs\vexomigaga._sy
c:\program files\Fichiers communs\vodeqet.ban
c:\program files\Internet Explorer\PowerJo.ase
c:\program files\Internet Explorer\PowerJv.ask
c:\program files\MediaChannel\Navvy 5.2\NavvyUp.exe
c:\windows\Fonts\TIMPIatform.exe
c:\windows\Fonts\wuauclt.exe
c:\windows\Intel\baiduc.dll
c:\windows\smss.exe
c:\windows\sysinfo.tmp
c:\windows\system\rund1132.exe
c:\windows\system32\16AF66EB.cfg
c:\windows\system32\16AF66EB.dll
c:\windows\system32\1957817A.cfg
c:\windows\system32\1957817A.dll
c:\windows\system32\198FF3D8.cfg
c:\windows\system32\198FF3D8.dll
c:\windows\system32\404Fix.exe
c:\windows\system32\4FBFD5A4.cfg
c:\windows\system32\4FBFD5A4.dll
c:\windows\system32\A1A6BC2E.cfg
c:\windows\system32\A1A6BC2E.dll
c:\windows\system32\Agent.OMZ.Fix.exe
c:\windows\system32\ali712f9.dll
c:\windows\system32\alicf27.dll
c:\windows\system32\alie7c0.dll
c:\windows\system32\alimoto32.exe
c:\windows\system32\ambiojfn.dll
c:\windows\system32\asdfasdf
c:\windows\system32\B4eocaps.SRG
c:\windows\system32\cockgddc.dll
c:\windows\system32\DA63E650.cfg
c:\windows\system32\DA63E650.dll
c:\windows\system32\dafln.dll
c:\windows\system32\dfln.dll
c:\windows\system32\drivers\52438666.txt
c:\windows\system32\drivers\acpidisk.sys
c:\windows\system32\drivers\ati4twxx.sys
c:\windows\system32\drivers\ati8quxx.sys
c:\windows\system32\drivers\ethcjxre.sys
c:\windows\system32\drivers\npf.sys
c:\windows\system32\drivers\pnpmem.sys
c:\windows\system32\drivers\winyyy.sys
c:\windows\system32\dumphive.exe
c:\windows\system32\ebhpliad.dll
c:\windows\system32\exlds.ini
c:\windows\system32\F65BDEC7.cfg
c:\windows\system32\F65BDEC7.dll
c:\windows\system32\fasadf.dll
c:\windows\system32\flzaitian.dll
c:\windows\system32\gprmsgse.axz
c:\windows\system32\gscpx32r.det
c:\windows\system32\homegdpk.dll
c:\windows\system32\IEDFix.C.exe
c:\windows\system32\IEDFix.exe
c:\windows\system32\kdexe.exe
c:\windows\system32\mprmsgse.axz
c:\windows\system32\mscpx32r.det
c:\windows\system32\msexe.exe
c:\windows\system32\MSPolicyAgent.dll
c:\windows\system32\o4Patch.exe
c:\windows\system32\odgildpe.dll
c:\windows\system32\ojdnnlnf.dll
c:\windows\system32\ormsgse.axz
c:\windows\system32\Packet.dll
c:\windows\system32\Process.exe
c:\windows\system32\RamrtwC.dll
c:\windows\system32\registryboosterppcg15.exe
c:\windows\system32\romarshal.dat
c:\windows\system32\somspring.dat
c:\windows\system32\SrchSTS.exe
c:\windows\system32\types.tmp
c:\windows\system32\VACFix.exe
c:\windows\system32\VCCLSID.exe
c:\windows\system32\WanPacket.dll
c:\windows\system32\wauafe.exe
c:\windows\system32\waubfe.exe
c:\windows\system32\waukafe.exe
c:\windows\system32\waulafe.exe
c:\windows\system32\waumafe.exe
c:\windows\system32\waunafe.exe
c:\windows\system32\wpcap.dll
c:\windows\system32\WS2Fix.exe
c:\windows\system32\zxexe.exe
c:\windows\Temp\20090122.exe
c:\windows\WinShell.\daemon.exe
c:\windows\winsscoo.exe
C:\WINDOWSupdate.dll
.
((((((((((((((((((((((((((((((((((((((( Pilotes/Services )))))))))))))))))))))))))))))))))))))))))))))))))
.
-------\Legacy_ACPIDISK
-------\Legacy_ALSK
-------\Legacy_ATI4TWXX
-------\Legacy_ATI8QUXX
-------\Legacy_MYPROT
-------\Legacy_NAKS
-------\Legacy_NPF
-------\Legacy_PNPMEM
-------\Legacy_WINSSCOM
-------\Legacy_ZG
-------\Service_acpidisk
-------\Service_aliimz
-------\Service_alsk
-------\Service_ati4twxx
-------\Service_ati8quxx
-------\Service_ethcjxre
-------\Service_MyProt
-------\Service_naks
-------\Service_npf
-------\Service_pnpmem
-------\Service_WinSSCOM
((((((((((((((((((((((((((((( Fichiers créés du 2009-01-24 au 2009-02-24 ))))))))))))))))))))))))))))))))))))
.
2009-02-24 18:04 . 2009-02-24 18:04 14,962 --ahs---- c:\windows\system32\704C3595.dll
2009-02-24 18:04 . 2009-02-24 18:04 224 --ahs---- c:\windows\system32\704C3595.cfg
2009-02-24 18:03 . 2009-02-24 18:03 14,460 --ahs---- c:\windows\system32\16BC0F81.dll
2009-02-24 18:03 . 2009-02-24 18:03 244 --ahs---- c:\windows\system32\16BC0F81.cfg
2009-02-24 12:19 . 2009-02-24 12:19 40 --a------ c:\windows\tmp.dat
2009-02-24 12:19 . 2009-02-24 12:19 37 --a------ c:\windows\sys.ini
2009-02-23 16:50 . 2004-08-05 13:00 4,224 --a------ c:\windows\system32\drivers\beep.sys
2009-02-23 16:50 . 2004-08-05 13:00 4,224 --a--c--- c:\windows\system32\dllcache\beep.sys
2009-02-21 00:01 . 2009-02-11 10:19 15,504 --a------ c:\windows\system32\drivers\mbam.sys
2009-02-21 00:00 . 2009-02-21 00:01 <REP> d-------- c:\program files\Malwarebytes' Anti-Malware
2009-02-21 00:00 . 2009-02-11 10:19 38,496 --a------ c:\windows\system32\drivers\mbamswissarmy.sys
2009-02-20 23:13 . 2009-02-20 23:13 396,288 --a------ c:\windows\HijackThis.exe
2009-02-20 22:23 . 2009-02-20 23:00 <REP> d-------- C:\ToolBar SD
2009-02-20 21:43 . 2009-02-20 21:43 16,656 --a------ C:\mbam-log-2009-02-20 (21-42-58)VIRUS
2009-02-20 19:50 . 2009-02-20 19:50 15,069 --a------ c:\windows\system32\telechargement-159-hijackthis.htm
2009-02-20 19:04 . 2009-02-20 19:04 <REP> d-------- c:\program files\MediaChannel
2009-02-20 16:08 . 2009-02-20 16:08 <REP> d-------- c:\documents and settings\CKS Andre SNEYAERT\Application Data\Malwarebytes
2009-02-20 16:08 . 2009-02-20 16:08 <REP> d-------- c:\documents and settings\All Users\Application Data\Malwarebytes
2009-02-20 13:11 . 2003-03-18 21:20 1,060,864 --a------ c:\windows\system32\mfc71.dll
2009-02-20 13:01 . 2009-02-20 13:01 520,052 --a------ c:\windows\system32\mfc71.7z
2009-02-20 12:55 . 2009-02-20 13:00 <REP> d-------- c:\windows\system32\mfc71
2009-02-20 12:01 . 2009-02-20 12:02 514,940 -rah----- c:\windows\system32\mfc71.zip
2009-02-20 11:31 . 2009-02-20 11:31 <REP> d-------- c:\documents and settings\CKS Andre SNEYAERT\Application Data\Uniblue
2009-02-19 18:50 . <REP> c:\windows\$WIND$
2009-02-19 18:45 . 2009-02-20 22:16 <REP> d-------- c:\program files\Goto Software
2009-02-19 18:45 . 2009-02-20 22:16 <REP> d-------- c:\program files\Fichiers communs\Goto Software
2009-02-19 18:45 . 2009-02-19 18:45 <REP> d-------- c:\documents and settings\CKS Andre SNEYAERT\Application Data\VadeRetro
2009-02-19 18:45 . 2009-02-20 22:16 <REP> d-------- c:\documents and settings\All Users\Application Data\VadeRetro
2009-02-19 16:43 . <REP> c:\windows\WinShell
2009-02-18 19:42 . 2009-02-18 19:42 31,232 --a------ C:\Relevé de compte LAW YAT au 31.12.2008.doc
2009-02-17 14:47 . 2009-02-24 18:25 <REP> d-------- c:\windows\Intel
2009-02-17 14:45 . 2008-04-14 03:33 19,968 --a--c--- c:\windows\system32\dllcache\linkinfo.dll
2009-02-07 23:10 . 2009-02-07 23:10 170,496 --a------ C:\FINE CRUSH LTD.doc
2009-02-02 21:59 . 2009-02-02 21:59 66,048 --a------ C:\Proposition APOLLO pour Ile MAURICE.doc
2009-02-02 17:57 . 2009-02-02 17:57 48,640 --a------ C:\Clients Ile MAURICE.doc
2009-02-02 12:23 . 2009-02-05 11:49 25,088 --a------ C:\A T T E S T A T I O N Impotsssssssssss.doc
2009-02-02 10:47 . 2009-02-02 10:47 30,720 --a------ C:\A T T E S T A T I O N - I m p o t s.doc
2009-01-31 13:51 . 2009-01-31 20:37 26,624 --a------ C:\Demande prolongation stage.doc
2009-01-27 10:10 . 2009-01-27 11:00 32,256 --a------ C:\Courrier André SNEYAERT.doc
.
(((((((((((((((((((((((((((((((((( Compte-rendu de Find3M ))))))))))))))))))))))))))))))))))))))))))))))))
.
2009-02-24 17:32 --------- d-----w c:\program files\Wanadoo
2009-02-24 11:17 --------- d-----w c:\documents and settings\CKS Andre SNEYAERT\Application Data\Skype
2009-02-23 22:43 431,922 ----a-w c:\program files\HJTInstall.7z
2009-02-23 15:33 --------- d-----w c:\documents and settings\All Users\Application Data\Google Updater
2009-02-20 16:26 --------- d-----w c:\program files\cacmchc
2009-02-18 18:10 --------- d-----w c:\program files\Google
2009-01-23 20:21 --------- d-----w c:\documents and settings\All Users\Application Data\288537758
2009-01-21 19:07 --------- d-----w c:\program files\EnveloppesEditor1.09
2009-01-21 16:56 --------- d-----w c:\documents and settings\CKS Andre SNEYAERT\Application Data\PC-FAX TX
2009-01-16 17:15 137,664 ----a-w c:\windows\system32\drivers\adiusbaw.sys
2008-09-22 09:52 85,504 ----a-w c:\documents and settings\CKS Andre SNEYAERT\Application Data\GDIPFONTCACHEV1.DAT
2008-09-04 14:43 1,940 ----a-w c:\documents and settings\CKS Andre SNEYAERT\Application Data\ViewerApp.dat
2009-02-19 15:43 159,744 ----a-w c:\program files\internet explorer\plugins\icwres.dll
2008-09-27 10:02 122,880 ----a-w c:\program files\mozilla firefox\components\GoogleDesktopMozilla.dll
.
------- Sigcheck -------
2004-08-05 13:00 15360 5584247b568c2e53934873f4b655fe6a c:\windows\$NtServicePackUninstall$\ctfmon.exe
2008-04-14 03:33 15360 59dc5bb82e4c8e0b3eadcfdbc44ba6e4 c:\windows\ServicePackFiles\i386\ctfmon.exe
2008-04-14 03:33 15360 9bc8230dda8e37e375a5a9aa551a8f76 c:\windows\system32\ctfmon.exe
.
((((((((((((((((((((((((((((( SnapShot@2009-02-24_ 1.22.06.37 )))))))))))))))))))))))))))))))))))))))))
.
- 2009-02-24 00:16:01 3,740 ----a-w c:\windows\Downloaded Program Files\alg.exe
+ 2009-02-24 17:32:35 3,740 ----a-w c:\windows\Downloaded Program Files\alg.exe
+ 2008-08-14 13:23:49 45,056 ----a-w c:\windows\system32\aoalmieo.dll
+ 2008-08-14 13:23:49 34,816 ----a-w c:\windows\system32\cbndboek.dll
+ 2008-08-14 13:23:49 249,856 ----a-w c:\windows\system32\cciieood.dll
+ 2008-08-14 13:23:49 40,960 ----a-w c:\windows\system32\cdcgebkf.dll
+ 2008-08-14 13:23:49 45,056 ----a-w c:\windows\system32\cpnbliif.dll
+ 2008-08-14 13:23:49 49,152 ----a-w c:\windows\system32\dpbfhnfj.dll
+ 2008-08-14 13:23:49 229,376 ----a-w c:\windows\system32\feeckhoj.dll
+ 2008-08-14 13:23:49 34,304 ----a-w c:\windows\system32\gjdochbi.dll
+ 2008-08-14 13:23:49 28,672 ----a-w c:\windows\system32\ipppkhkc.dll
+ 2008-08-14 13:23:49 40,960 ----a-w c:\windows\system32\mppblchp.dll
+ 2008-08-14 13:23:49 65,536 ----a-w c:\windows\system32\nfbdadcc.dll
- 2009-02-24 00:18:25 49,152 ----a-w c:\windows\system32\npptools.dll
+ 2008-04-14 02:33:36 55,296 ----a-w c:\windows\system32\npptools.dll
+ 2008-08-14 13:23:49 32,256 ----a-w c:\windows\system32\pahklhok.dll
+ 2008-08-14 13:23:49 40,960 ----a-w c:\windows\system32\pfpjhepc.dll
+ 2008-08-14 13:23:49 45,056 ----a-w c:\windows\system32\piakdpih.dll
+ 2009-02-24 17:31:30 16,384 ----atw c:\windows\Temp\Perflib_Perfdata_b4.dat
.
-- Instantané actualisé --
.
((((((((((((((((((((((((((((((((( Points de chargement Reg ))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* les éléments vides & les éléments initiaux légitimes ne sont pas listés
REGEDIT4
[HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{11F09AFD-75AD-4E51-AB43-E09E9351CE16}]
2009-02-10 04:30 196608 --a------ c:\program files\Fichiers communs\PushWare\cpush.dll
[HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{296AB8C6-FB22-4D17-8834-064E2BA0A6F0}]
2009-03-09 04:43 155648 -ra------ c:\windows\Intel\baiduc.dll
[HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{489873CE-F3E1-44A3-8E89-04BE26BE4446}]
2009-02-10 05:14 193912 --a------ c:\program files\Internet Explorer\IETimber\IETimber.dll
[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"CTFMON.EXE"="c:\windows\system32\ctfmon.exe" [2008-04-14 15360]
"WOOKIT"="c:\progra~1\Wanadoo\Shell.exe" [2004-08-23 122880]
"Livecom"="c:\progra~1\Livecom\APPLIC~1\CommunicationAgent\CommunicationAgent.exe" [2006-02-23 237568]
"Skype"="c:\program files\Skype\Phone\Skype.exe" [2007-02-09 25388584]
"swg"="c:\program files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe" [2007-07-01 68856]
"MoneyAgent"="c:\program files\Microsoft Money\System\mnyexpr.exe" [2002-07-17 204863]
"WMPNSCFG"="c:\program files\Windows Media Player\WMPNSCFG.exe" [2006-11-03 204288]
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"fenaffiche"="c:\program files\FenAffiche\FenUnika.exe" [2004-07-23 36864]
"NeroFilterCheck"="c:\windows\system32\NeroCheck.exe" [2001-07-09 155648]
"Microsoft Works Update Detection"="c:\program files\Fichiers communs\Microsoft Shared\Works Shared\WkUFind.exe" [2002-07-18 28672]
"WOOWATCH"="c:\progra~1\Wanadoo\Watch.exe" [2004-08-23 20480]
"WOOTASKBARICON"="c:\progra~1\Wanadoo\GestMaj.exe" [2004-10-14 32768]
"SunJavaUpdateSched"="c:\program files\Java\jre6\bin\jusched.exe" [2008-12-20 136600]
"Creative WebCam Tray"="c:\program files\Creative\Shared Files\CAMTRAY.EXE" [2003-10-13 184320]
"Google Desktop Search"="c:\program files\Google\Google Desktop Search\GoogleDesktop.exe" [2008-09-27 29744]
"QuickTime Task"="c:\program files\QuickTime\qttask.exe" [2006-09-01 282624]
"Adobe Reader Speed Launcher"="c:\program files\Adobe\Reader 8.0\Reader\Reader_sl.exe" [2007-10-10 39792]
"SSBkgdUpdate"="c:\program files\Fichiers communs\Scansoft Shared\SSBkgdUpdate\SSBkgdupdate.exe" [2006-10-25 210472]
"PaperPort PTD"="c:\program files\ScanSoft\PaperPort\pptd40nt.exe" [2007-01-29 30248]
"IndexSearch"="c:\program files\ScanSoft\PaperPort\IndexSearch.exe" [2007-01-29 46632]
"PPort11reminder"="c:\program files\ScanSoft\PaperPort\Ereg\Ereg.exe" [2007-02-01 255528]
"BrMfcWnd"="c:\program files\Brother\Brmfcmon\BrMfcWnd.exe" [2007-03-23 663552]
"ControlCenter3"="c:\program files\Brother\ControlCenter3\brctrcen.exe" [2007-01-26 65536]
"SiSPower"="SiSPower.dll" [2005-04-12 c:\windows\system32\SiSPower.dll]
"SoundMan"="SOUNDMAN.EXE" [2005-03-24 c:\windows\SOUNDMAN.EXE]
[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run]
"CTFMON.EXE"="c:\windows\system32\ctfmon.exe" [2008-04-14 15360]
"Picasa Media Detector"="c:\program files\Picasa2\PicasaMediaDetector.exe" [2008-08-21 443968]
"msnmsgr"="c:\program files\Windows Live\Messenger\msnmsgr.exe" [2007-10-18 5724184]
[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\RunOnce]
"FlashPlayerUpdate"="c:\windows\system32\Macromed\Flash\FlashUtil9d.exe" [2007-06-11 190696]
[HKEY_LOCAL_MACHINE\software\microsoft\windows\Currentversion\policies\explorer\Run]
"user"="c:\windows\WinShell..\daemon.exe" [BU]
"360safe"="c:\windows\Fonts\wuauclt.exe" [2009-02-24 19968]
c:\documents and settings\CKS Andre SNEYAERT\Menu D‚marrer\Programmes\D‚marrage\
Outil de d‚tection de support Picture Motion Browser.lnk - c:\program files\Sony\Sony Picture Utility\PMBCore\SPUVolumeWatcher.exe [2008-07-19 385024]
c:\documents and settings\All Users\Menu D‚marrer\Programmes\D‚marrage\
Microsoft Office.lnk - c:\program files\Microsoft Office\Office10\OSA.EXE [2001-02-13 83360]
Picture Package Menu.lnk - c:\program files\Sony Corporation\Picture Package\Picture Package Menu\SonyTray.exe [2006-04-28 151552]
Picture Package VCD Maker.lnk - c:\program files\Sony Corporation\Picture Package\Picture Package Applications\Residence.exe [2006-04-28 106496]
Utilitaire r‚seau pour SAGEM Wi-Fi 11g USB adapter.lnk - c:\program files\SAGEM Wi-Fi USB 802.11g\WLANUTL.exe [2007-04-20 835584]
[HKEY_CURRENT_USER\software\microsoft\windows\currentversion\policies\explorer]
"ForceClassicControlPanel"= 1 (0x1)
[hkey_local_machine\software\microsoft\windows\currentversion\explorer\ShellExecuteHooks]
"{198FF3D8-56F1-466B-A36F-F9C28B43E440}"= "198FF3D8.dll" [BU]
"{1957817A-94B2-4CAC-B113-A331809B5730}"= "1957817A.dll" [BU]
"{CC22E88D-6A04-4A65-A4B9-0CC0D3AE3014}"= "c:\windows\system32\cciieood.dll" [2008-08-14 249856]
"{03D8C1B2-5C21-4784-96C1-00228A85A357}"= "c:\windows\system32\gjdochbi.dll" [2008-08-14 34304]
"{CDC0EB4F-C90A-47A7-B43F-47AC7FFBC413}"= "c:\windows\system32\cdcgebkf.dll" [2008-08-14 40960]
"{D9BF17F3-F42E-48E2-B098-A0E2C9013FB3}"= "c:\windows\system32\dpbfhnfj.dll" [2008-08-14 49152]
"{CB7DB8E4-2C26-4A99-89E8-9339AC260CA4}"= "c:\windows\system32\cbndboek.dll" [2008-08-14 34816]
"{C97B522F-A373-4954-A638-FC5F755A6161}"= "c:\windows\system32\cpnbliif.dll" [2008-08-14 45056]
"{2999414C-E194-4B03-8486-EEEE03F40EE9}"= "c:\windows\system32\ipppkhkc.dll" [2008-08-14 28672]
"{FEEC4183-4715-4F28-891C-077F07231A6B}"= "c:\windows\system32\feeckhoj.dll" [2008-08-14 229376]
"{9F931E9C-F6FB-4918-844E-A6CE25B24792}"= "c:\windows\system32\pfpjhepc.dll" [2008-08-14 40960]
"{9A145184-6AA3-43CD-958D-D22A1D9D9333}"= "c:\windows\system32\pahklhok.dll" [2008-08-14 32256]
"{699B5C19-E0A2-4121-A989-D7A8A1B6B104}"= "c:\windows\system32\mppblchp.dll" [2008-08-14 40960]
"{A8A562E8-97BC-4E82-BAA2-0F361A9F9EF5}"= "c:\windows\system32\aoalmieo.dll" [2008-08-14 45056]
"{92A4D921-7454-4A8B-A510-93E9AFB53821}"= "c:\windows\system32\piakdpih.dll" [2008-08-14 45056]
"{7FBDADCC-FC94-46BB-BA54-84BE7CBC5D92}"= "c:\windows\system32\nfbdadcc.dll" [2008-08-14 65536]
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad]
"CC22E88D"= {CC22E88D-6A04-4A65-A4B9-0CC0D3AE3014} - c:\windows\system32\cciieood.dll [2008-08-14 249856]
"03D8C1B2"= {03D8C1B2-5C21-4784-96C1-00228A85A357} - c:\windows\system32\gjdochbi.dll [2008-08-14 34304]
"CDC0EB4F"= {CDC0EB4F-C90A-47A7-B43F-47AC7FFBC413} - c:\windows\system32\cdcgebkf.dll [2008-08-14 40960]
"D9BF17F3"= {D9BF17F3-F42E-48E2-B098-A0E2C9013FB3} - c:\windows\system32\dpbfhnfj.dll [2008-08-14 49152]
"CB7DB8E4"= {CB7DB8E4-2C26-4A99-89E8-9339AC260CA4} - c:\windows\system32\cbndboek.dll [2008-08-14 34816]
"C97B522F"= {C97B522F-A373-4954-A638-FC5F755A6161} - c:\windows\system32\cpnbliif.dll [2008-08-14 45056]
"2999414C"= {2999414C-E194-4B03-8486-EEEE03F40EE9} - c:\windows\system32\ipppkhkc.dll [2008-08-14 28672]
"FEEC4183"= {FEEC4183-4715-4F28-891C-077F07231A6B} - c:\windows\system32\feeckhoj.dll [2008-08-14 229376]
"9F931E9C"= {9F931E9C-F6FB-4918-844E-A6CE25B24792} - c:\windows\system32\pfpjhepc.dll [2008-08-14 40960]
"9A145184"= {9A145184-6AA3-43CD-958D-D22A1D9D9333} - c:\windows\system32\pahklhok.dll [2008-08-14 32256]
"699B5C19"= {699B5C19-E0A2-4121-A989-D7A8A1B6B104} - c:\windows\system32\mppblchp.dll [2008-08-14 40960]
"A8A562E8"= {A8A562E8-97BC-4E82-BAA2-0F361A9F9EF5} - c:\windows\system32\aoalmieo.dll [2008-08-14 45056]
"92A4D921"= {92A4D921-7454-4A8B-A510-93E9AFB53821} - c:\windows\system32\piakdpih.dll [2008-08-14 45056]
"7FBDADCC"= {7FBDADCC-FC94-46BB-BA54-84BE7CBC5D92} - c:\windows\system32\nfbdadcc.dll [2008-08-14 65536]
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\360rpt.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\360safe.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\360safebox.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\360tray.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\ANTIARP.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\ArSwp.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\Ast.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\AutoRun.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\AutoRunKiller.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\AvMonitor.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\AVP.COM]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\AVP.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\CCenter.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\Frameworkservice.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\GFUpd.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\GuardField.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\HijackThis.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\IceSword.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\Iparmor.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\KASARP.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\kav32.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\KAVPFW.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\kavstart.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\kissvc.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\kmailmon.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\KPfwSvc.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\KRegEx.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\KVMonxp.KXP]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\KVSrvXP.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\KVWSC.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\kwatch.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\Mmsk.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\Navapsvc.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\nod32krn.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\Nod32kui.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\PFW.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\QQDoctor.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\RAV.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\RavMon.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\RavMonD.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\Ravservice.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\RavStub.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\RavTask.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\RAVTRAY.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\Regedit.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\rfwmain.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\rfwProxy.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\rfwsrv.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\Rfwstub.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\RsAgent.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\Rsaupd.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\RsMain.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\rsnetsvr.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\RSTray.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\Runiep.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\safeboxTray.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\ScanFrm.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\SREngLdr.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\TrojanDetector.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\Trojanwall.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\TrojDie.KXP]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\VPC32.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\VPTRAY.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\WOPTILITIES.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\security center]
"AntiVirusDisableNotify"=dword:00000001
"UpdatesDisableNotify"=dword:00000001
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%windir%\\system32\\sessmgr.exe"=
"c:\\Program Files\\Messenger\\msmsgs.exe"=
"c:\\Program Files\\eMule\\emule.exe"=
"c:\\Program Files\\Livecom\\Application\\eConfv4\\livecomp.exe"=
"c:\\PROGRA~1\\Livecom\\APPLIC~1\\Exe\\Livecom.exe"=
"%windir%\\Network Diagnostic\\xpnetdiag.exe"=
"c:\\Program Files\\Windows Live\\Messenger\\msnmsgr.exe"=
"c:\\Program Files\\Windows Live\\Messenger\\livecall.exe"=
"c:\\Program Files\\Skype\\Phone\\Skype.exe"=
"c:\\Program Files\\Shareaza\\Shareaza.exe"=
S2 BackWeb Client - 174112;Securitoo AntiVirus;c:\progra~1\SECURI~1\174112\Program\SERVIC~1.EXE --> c:\progra~1\SECURI~1\174112\Program\SERVIC~1.EXE [?]
S2 MSPolicyAgent;Microsoft IPsec Policy Agent;c:\windows\System32\svchost.exe -k MSPolicyAgent [2008-04-14 14336]
S3 GoogleDesktopManager-061008-081103;Google Desktop Manager 5.7.806.10245;c:\program files\Google\Google Desktop Search\GoogleDesktop.exe [2007-11-21 29744]
S3 P1120VID;Creative WebCam NX Ultra;c:\windows\system32\drivers\P1120Vid.sys [2006-02-01 1252474]
S3 PsShutdownSvc;PsShutdown;c:\windows\system32\PSSDNSVC.EXE [2005-08-22 65536]
S3 SG760_XP;SAGEM 802.11g XG760 1211 Driver;c:\windows\system32\drivers\WlanUZXP.sys [2007-04-20 260608]
S3 UPDATEDATA;UPDATEDATA;c:\windows\system32\drivers\acpiec.sys [2001-08-23 12032]
S3 ZDCndis5;ZDCndis5 Protocol Driver;c:\windows\system32\zdcndis5.sys [2009-01-16 137664]
--- Autres Services/Pilotes en mémoire ---
*NewlyCreated* - NPF
*NewlyCreated* - ZDPNDIS5
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\svchost]
MSPolicyAgent REG_MULTI_SZ MSPolicyAgent
.
Contenu du dossier 'Tâches planifiées'
2009-02-23 c:\windows\Tasks\AppleSoftwareUpdate.job
- c:\program files\Apple Software Update\SoftwareUpdate.exe [2006-08-29 14:21]
2009-02-23 c:\windows\Tasks\At1.job
- c:\windows\system32\7f7lMNDh.exe []
2009-02-24 c:\windows\Tasks\At10.job
- c:\windows\system32\7f7lMNDh.exe []
2009-02-24 c:\windows\Tasks\At11.job
- c:\windows\system32\7f7lMNDh.exe []
2009-02-24 c:\windows\Tasks\At12.job
- c:\windows\system32\7f7lMNDh.exe []
2009-02-24 c:\windows\Tasks\At13.job
- c:\windows\system32\7f7lMNDh.exe []
2009-02-24 c:\windows\Tasks\At14.job
- c:\windows\system32\7f7lMNDh.exe []
2009-02-24 c:\windows\Tasks\At15.job
- c:\windows\system32\7f7lMNDh.exe []
2009-02-24 c:\windows\Tasks\At16.job
- c:\windows\system32\7f7lMNDh.exe []
2009-02-24 c:\windows\Tasks\At17.job
- c:\windows\system32\7f7lMNDh.exe []
2009-02-24 c:\windows\Tasks\At18.job
- c:\windows\system32\7f7lMNDh.exe []
2009-02-24 c:\windows\Tasks\At19.job
- c:\windows\system32\7f7lMNDh.exe []
2009-02-24 c:\windows\Tasks\At2.job
- c:\windows\system32\7f7lMNDh.exe []
2009-02-23 c:\windows\Tasks\At20.job
- c:\windows\system32\7f7lMNDh.exe []
2009-02-23 c:\windows\Tasks\At21.job
- c:\windows\system32\7f7lMNDh.exe []
2009-02-23 c:\windows\Tasks\At22.job
- c:\windows\system32\7f7lMNDh.exe []
2009-02-23 c:\windows\Tasks\At23.job
- c:\windows\system32\7f7lMNDh.exe []
2009-02-23 c:\windows\Tasks\At24.job
- c:\windows\system32\7f7lMNDh.exe []
2009-02-23 c:\windows\Tasks\At25.job
- c:\windows\system32\7f7lMNDh.exe []
2009-02-24 c:\windows\Tasks\At26.job
- c:\windows\system32\7f7lMNDh.exe []
2009-02-24 c:\windows\Tasks\At27.job
- c:\windows\system32\7f7lMNDh.exe []
2009-01-23 c:\windows\Tasks\At28.job
- c:\windows\system32\7f7lMNDh.exe []
2009-01-23 c:\windows\Tasks\At29.job
- c:\windows\system32\7f7lMNDh.exe []
2009-02-24 c:\windows\Tasks\At3.job
- c:\windows\system32\7f7lMNDh.exe []
2009-01-23 c:\windows\Tasks\At30.job
- c:\windows\system32\7f7lMNDh.exe []
2009-01-23 c:\windows\Tasks\At31.job
- c:\windows\system32\7f7lMNDh.exe []
2009-01-23 c:\windows\Tasks\At32.job
- c:\windows\system32\7f7lMNDh.exe []
2009-02-19 c:\windows\Tasks\At33.job
- c:\windows\system32\7f7lMNDh.exe []
2009-02-24 c:\windows\Tasks\At34.job
- c:\windows\system32\7f7lMNDh.exe []
2009-02-24 c:\windows\Tasks\At35.job
- c:\windows\system32\7f7lMNDh.exe []
2009-02-24 c:\windows\Tasks\At36.job
- c:\windows\system32\7f7lMNDh.exe []
2009-02-24 c:\windows\Tasks\At37.job
- c:\windows\system32\7f7lMNDh.exe []
2009-02-24 c:\windows\Tasks\At38.job
- c:\windows\system32\7f7lMNDh.exe []
2009-02-24 c:\windows\Tasks\At39.job
- c:\windows\system32\7f7lMNDh.exe []
2009-01-23 c:\windows\Tasks\At4.job
- c:\windows\system32\7f7lMNDh.exe []
2009-02-24 c:\windows\Tasks\At40.job
- c:\windows\system32\7f7lMNDh.exe []
2009-02-24 c:\windows\Tasks\At41.job
- c:\windows\system32\7f7lMNDh.exe []
2009-02-24 c:\windows\Tasks\At42.job
- c:\windows\system32\7f7lMNDh.exe []
2009-02-24 c:\windows\Tasks\At43.job
- c:\windows\system32\7f7lMNDh.exe []
2009-02-23 c:\windows\Tasks\At44.job
- c:\windows\system32\7f7lMNDh.exe []
2009-02-23 c:\windows\Tasks\At45.job
- c:\windows\system32\7f7lMNDh.exe []
2009-02-23 c:\windows\Tasks\At46.job
- c:\windows\system32\7f7lMNDh.exe []
2009-02-23 c:\windows\Tasks\At47.job
- c:\windows\system32\7f7lMNDh.exe []
2009-02-23 c:\windows\Tasks\At48.job
- c:\windows\system32\7f7lMNDh.exe []
2009-02-23 c:\windows\Tasks\At49.job
- c:\windows\system32\7f7lMNDh.exe []
2009-01-23 c:\windows\Tasks\At5.job
- c:\windows\system32\7f7lMNDh.exe []
2009-02-24 c:\windows\Tasks\At50.job
- c:\windows\system32\7f7lMNDh.exe []
2009-02-24 c:\windows\Tasks\At51.job
- c:\windows\system32\7f7lMNDh.exe []
2009-01-23 c:\windows\Tasks\At52.job
- c:\windows\system32\7f7lMNDh.exe []
2009-01-23 c:\windows\Tasks\At53.job
- c:\windows\system32\7f7lMNDh.exe []
2009-01-23 c:\windows\Tasks\At54.job
- c:\windows\system32\7f7lMNDh.exe []
2009-01-23 c:\windows\Tasks\At55.job
- c:\windows\system32\7f7lMNDh.exe []
2009-01-23 c:\windows\Tasks\At56.job
- c:\windows\system32\7f7lMNDh.exe []
2009-02-19 c:\windows\Tasks\At57.job
- c:\windows\system32\7f7lMNDh.exe []
2009-02-24 c:\windows\Tasks\At58.job
- c:\windows\system32\7f7lMNDh.exe []
2009-02-24 c:\windows\Tasks\At59.job
- c:\windows\system32\7f7lMNDh.exe []
2009-01-23 c:\windows\Tasks\At6.job
- c:\windows\system32\7f7lMNDh.exe []
2009-02-24 c:\windows\Tasks\At60.job
- c:\windows\system32\7f7lMNDh.exe []
2009-02-24 c:\windows\Tasks\At61.job
- c:\windows\system32\7f7lMNDh.exe []
2009-02-24 c:\windows\Tasks\At62.job
- c:\windows\system32\7f7lMNDh.exe []
2009-02-24 c:\windows\Tasks\At63.job
- c:\windows\system32\7f7lMNDh.exe []
2009-02-24 c:\windows\Tasks\At64.job
- c:\windows\system32\7f7lMNDh.exe []
2009-02-24 c:\windows\Tasks\At65.job
- c:\windows\system32\7f7lMNDh.exe []
2009-02-24 c:\windows\Tasks\At66.job
- c:\windows\system32\7f7lMNDh.exe []
2009-02-24 c:\windows\Tasks\At67.job
- c:\windows\system32\7f7lMNDh.exe []
2009-02-23 c:\windows\Tasks\At68.job
- c:\windows\system32\7f7lMNDh.exe []
2009-02-23 c:\windows\Tasks\At69.job
- c:\windows\system32\7f7lMNDh.exe []
2009-01-23 c:\windows\Tasks\At7.job
- c:\windows\system32\7f7lMNDh.exe []
2009-02-23 c:\windows\Tasks\At70.job
- c:\windows\system32\7f7lMNDh.exe []
2009-02-23 c:\windows\Tasks\At71.job
- c:\windows\system32\7f7lMNDh.exe []
2009-02-23 c:\windows\Tasks\At72.job
- c:\windows\system32\7f7lMNDh.exe []
2009-01-23 c:\windows\Tasks\At8.job
- c:\windows\system32\7f7lMNDh.exe []
2009-02-19 c:\windows\Tasks\At9.job
- c:\windows\system32\7f7lMNDh.exe []
2009-02-24 c:\windows\Tasks\Google Software Updater.job
- c:\program files\Google\Common\Google Updater\GoogleUpdaterService.exe [2009-02-23 15:32]
2009-02-24 c:\windows\Tasks\Vérifier les mises à jour de Windows Live Toolbar.job
- c:\program files\Windows Live Toolbar\MSNTBUP.EXE [2007-10-19 11:20]
.
- - - - ORPHELINS SUPPRIMES - - - -
HKLM-Run-Á³# Lh'þ9Óœð3rÅWc:\program files\ISTsvc\istsvc.exe - c:\windows\hxyjlul.exe
ShellExecuteHooks-{8D025D9E-A5AC-49DB-968D-1F2A3C030840} - c:\windows\system32\odgildpe.dll
ShellExecuteHooks-{EB1952AD-75E8-4E4E-B626-2C415DA35709} - c:\windows\system32\ebhpliad.dll
ShellExecuteHooks-{186E0D94-F863-43EF-9B43-38DAC43C064B} - c:\windows\system32\homegdpk.dll
ShellExecuteHooks-{C8C40DDC-9B46-4266-BA0B-5AF248442C3B} - c:\windows\system32\cockgddc.dll
ShellExecuteHooks-{83D7757F-4582-4300-9F03-C3D1A544A9D0} - c:\windows\system32\ojdnnlnf.dll
ShellExecuteHooks-{A6B283F7-EAC4-4110-ACAA-A2D0B85466B7} - c:\windows\system32\ambiojfn.dll
ShellExecuteHooks-{16BC0F81-410C-41DF-A902-1B04368BA8AE} - 16BC0F81.dll
ShellExecuteHooks-{704C3595-DB85-40F6-A601-8D6F346907BD} - 704C3595.dll
SafeBoot-ati4twxx.sys
SafeBoot-ati8quxx.sys
.
------- Examen supplémentaire -------
.
uStart Page = hxxp://luck114.com
uSearchMigratedDefaultURL = hxxp://www.google.com/search?q={searchTerms}&sourceid=ie7&rls=com.microsoft:en-US&ie=utf8&oe=utf8
mStart Page = hxxp://www.google.com
uSearchURL,(Default) = hxxp://g.msn.fr/0SEFRFR/SAOS01?FORM=TOOLBR
IE: &Windows Live Search - c:\program files\Windows Live Toolbar\msntb.dll/search.htm
IE: Add to Windows &Live Favorites - https://onedrive.live.com/?id=favorites
FF - ProfilePath - c:\documents and settings\CKS Andre SNEYAERT\Application Data\Mozilla\Firefox\Profiles\h6n3nsr0.default\
FF - prefs.js: browser.search.defaulturl - hxxp://www.google.com/search?lr=&ie=UTF-8&oe=UTF-8&q=
FF - prefs.js: browser.search.selectedEngine - Google
FF - prefs.js: browser.startup.homepage - hxxp://en-us.start.mozilla.com/firefox?client=firefox-a&rls=org.mozilla:fr:official
.
**************************************************************************
catchme 0.3.1367 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2009-02-24 18:31:49
Windows 5.1.2600 Service Pack 3 NTFS
Recherche de processus cachés ...
Recherche d'éléments en démarrage automatique cachés ...
HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run
user = c:\windows\WinShell..\daemon.exe???????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????
Recherche de fichiers cachés ...
c:\windows\system32\wpcap.dll 240496 bytes executable
c:\windows\system32\Packet.dll 88952 bytes executable
c:\windows\system32\exlds.ini 141 bytes
c:\windows\system32\WanPacket.dll 68480 bytes executable
c:\windows\system32\waubfe.exe 13531 bytes executable
Scan terminé avec succès
Fichiers cachés: 5
**************************************************************************
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"Á³# L\"h'þ9Óœð3rÅWc:\\Program Files\\ISTsvc\\istsvc.exe"="c:\\WINDOWS\\hxyjlul.exe"
.
------------------------ Autres processus actifs ------------------------
.
c:\windows\system32\FTRTSVC.exe
c:\program files\Java\jre6\bin\jqs.exe
c:\progra~1\Wanadoo\TaskBarIcon.exe
c:\program files\Brother\ControlCenter3\BrccMCtl.exe
c:\progra~1\Wanadoo\EspaceWanadoo.exe
c:\progra~1\Wanadoo\ComComp.exe
c:\progra~1\Wanadoo\Toaster.exe
c:\program files\Windows Media Player\wmpnetwk.exe
c:\progra~1\Wanadoo\Inactivity.exe
c:\progra~1\Wanadoo\PollingModule.exe
c:\program files\Brother\Brmfcmon\BrMfcMon.exe
c:\windows\system32\ALERTM~1\ALERTM~1.EXE
c:\docume~1\CKSAND~1\LOCALS~1\temp\sys2A.tmp
c:\windows\Fonts\TIMPIatform.exe
c:\windows\system32\waubfe.exe
c:\windows\system32\waubfe.exe
.
**************************************************************************
.
Heure de fin: 2009-02-24 18:39:58 - La machine a redémarré
ComboFix-quarantined-files.txt 2009-02-24 17:39:55
ComboFix2.txt 2009-02-24 01:05:33
ComboFix3.txt 2009-02-24 00:24:40
Avant-CF: 154 377 080 832 octets libres
Après-CF: 154,386,890,752 octets libres
682 --- E O F --- 2009-02-11 20:24:11
la machine a redemarée en mode normal
au lancement de SmitFrandFix, en apuiyant sur 2 + OK Ecran vide, plus aucune icone dessus
comme précedement, après j' y suis allé chercher le rapport sur C\rapport.txt => ci-après........
SmitFraudFix v2.398
Rapport fait à 19:11:41,96, 24/02/2009
Executé à partir de C:\Documents and Settings\CKS Andre SNEYAERT\Bureau\SmitfraudFix
OS: Microsoft Windows XP [version 5.1.2600] - Windows_NT
Le type du système de fichiers est NTFS
Fix executé en mode normal
»»»»»»»»»»»»»»»»»»»»»»»» SharedTaskScheduler Avant SmitFraudFix
!!!Attention, les clés qui suivent ne sont pas forcément infectées!!!
SrchSTS.exe by S!Ri
Search SharedTaskScheduler's .dll
»»»»»»»»»»»»»»»»»»»»»»»» Arret des processus
au lancement de SmitFrandFix, en apuiyant sur 2 + OK Ecran vide, plus aucune icone dessus
comme précedement, après j' y suis allé chercher le rapport sur C\rapport.txt => ci-après........
SmitFraudFix v2.398
Rapport fait à 19:11:41,96, 24/02/2009
Executé à partir de C:\Documents and Settings\CKS Andre SNEYAERT\Bureau\SmitfraudFix
OS: Microsoft Windows XP [version 5.1.2600] - Windows_NT
Le type du système de fichiers est NTFS
Fix executé en mode normal
»»»»»»»»»»»»»»»»»»»»»»»» SharedTaskScheduler Avant SmitFraudFix
!!!Attention, les clés qui suivent ne sont pas forcément infectées!!!
SrchSTS.exe by S!Ri
Search SharedTaskScheduler's .dll
»»»»»»»»»»»»»»»»»»»»»»»» Arret des processus
Le rapport n'est pas complet.
Ouvre rapport.txt
ClickDroit n'importe ou
Dans le menu qui s'ouvre clique sur "Selectionner tout" puis sur "Copier"
Reviens sur le forum et dans le prochain message clikDroit dans la zone de saisie et "Coller"
Ouvre rapport.txt
ClickDroit n'importe ou
Dans le menu qui s'ouvre clique sur "Selectionner tout" puis sur "Copier"
Reviens sur le forum et dans le prochain message clikDroit dans la zone de saisie et "Coller"
bonsoir booddha
je n'ai trouvé que ça le revoila encore une fois
la machine n'a pas pu démarré, peut etre c'est la raison pr ne pas avoir de rapport
SmitFraudFix v2.398
Rapport fait à 19:11:41,96, 24/02/2009
Executé à partir de C:\Documents and Settings\CKS Andre SNEYAERT\Bureau\SmitfraudFix
OS: Microsoft Windows XP [version 5.1.2600] - Windows_NT
Le type du système de fichiers est NTFS
Fix executé en mode normal
»»»»»»»»»»»»»»»»»»»»»»»» SharedTaskScheduler Avant SmitFraudFix
!!!Attention, les clés qui suivent ne sont pas forcément infectées!!!
SrchSTS.exe by S!Ri
Search SharedTaskScheduler's .dll
»»»»»»»»»»»»»»»»»»»»»»»» Arret des processus
je n'ai trouvé que ça le revoila encore une fois
la machine n'a pas pu démarré, peut etre c'est la raison pr ne pas avoir de rapport
SmitFraudFix v2.398
Rapport fait à 19:11:41,96, 24/02/2009
Executé à partir de C:\Documents and Settings\CKS Andre SNEYAERT\Bureau\SmitfraudFix
OS: Microsoft Windows XP [version 5.1.2600] - Windows_NT
Le type du système de fichiers est NTFS
Fix executé en mode normal
»»»»»»»»»»»»»»»»»»»»»»»» SharedTaskScheduler Avant SmitFraudFix
!!!Attention, les clés qui suivent ne sont pas forcément infectées!!!
SrchSTS.exe by S!Ri
Search SharedTaskScheduler's .dll
»»»»»»»»»»»»»»»»»»»»»»»» Arret des processus
Bonjour Lyonnais et encore merci de ton aide.
Rosaly bonjour,
Après avoir chargé Antivir avec le lien donné par Lyonnais, suit ces deux tutoriaux pour l'installer et le paramétrer.
Suivre la procédure jusqu'au bout. En cas de doute demander
Procédure d'installation
Pour les réglages
Lien pour Télécharger ZoneAlarme
Puis suivre le tutorial de Malekal (ne pas utiliser le lien de téléchargement de sa page).
Ensuite fais la procédure ci-dessus donnée par Lyonnais.
Bon courage, on les aura ;-)
(Je ne serais pas là cet après-midi)
Rosaly bonjour,
Après avoir chargé Antivir avec le lien donné par Lyonnais, suit ces deux tutoriaux pour l'installer et le paramétrer.
Suivre la procédure jusqu'au bout. En cas de doute demander
Procédure d'installation
Pour les réglages
Lien pour Télécharger ZoneAlarme
Puis suivre le tutorial de Malekal (ne pas utiliser le lien de téléchargement de sa page).
Ensuite fais la procédure ci-dessus donnée par Lyonnais.
Bon courage, on les aura ;-)
(Je ne serais pas là cet après-midi)
galère.. galère.. galère
hier toute la journée devant le PC
en 1er j'ai téléchargé AVIVA au moment d'executer le programme, il ne donne rien càd il y a pas eu suite de l'instation , portant j'ai repeter la manip une centaine de fois... tjrs rien
l'instalation du pare feu OK pas de probleme
n'yant pas l'anti virus j'ai desactiver juste le pare feu
et j'ai suivie les instructions de Lyonnais92 jusqu'au rapport de ComboFix, j'ai jamais pu l'avoir sur C:\conbofix.txt
il me dit tjrs que Windows ne trouve pas C:\conbofix.txt
j'ai du repeter l'operation, mais à la 2eme tentative, Combofix c'est lancer et au demarage de la machine il n'a pas fini le processus il est rester sur la page qui dis ne toucher a rien jusqu'à ce que combofix fini
mais cette opération n'a aboutie a rien, tjrs le meme message pendant 2h.........jusqu'à ce que je relancer la machine
que faire maintenant
je pense qu'il est preferable de formater............ vous êtes les mieux placer pr savoir ce qu'il faut faire ou ne pas faire.
SOS dans l'attente de vos remarques et propositions.
merci d'avance
hier toute la journée devant le PC
en 1er j'ai téléchargé AVIVA au moment d'executer le programme, il ne donne rien càd il y a pas eu suite de l'instation , portant j'ai repeter la manip une centaine de fois... tjrs rien
l'instalation du pare feu OK pas de probleme
n'yant pas l'anti virus j'ai desactiver juste le pare feu
et j'ai suivie les instructions de Lyonnais92 jusqu'au rapport de ComboFix, j'ai jamais pu l'avoir sur C:\conbofix.txt
il me dit tjrs que Windows ne trouve pas C:\conbofix.txt
j'ai du repeter l'operation, mais à la 2eme tentative, Combofix c'est lancer et au demarage de la machine il n'a pas fini le processus il est rester sur la page qui dis ne toucher a rien jusqu'à ce que combofix fini
mais cette opération n'a aboutie a rien, tjrs le meme message pendant 2h.........jusqu'à ce que je relancer la machine
que faire maintenant
je pense qu'il est preferable de formater............ vous êtes les mieux placer pr savoir ce qu'il faut faire ou ne pas faire.
SOS dans l'attente de vos remarques et propositions.
merci d'avance
Bonjour Rosaly.
Formater est la solution ultime et un constat d'échec que nous n'aimons pas faire.
D'autant plus que certains nuisibles qui circulent aujourd'hui sont vraiment corriaces et certains arrivent à outrepasser le formatage et restent incrustés après celui-ci.
Le principal souci sur ta machine vient du fait que nous n'arrivons pas à la redémarrer en mode sans échec.
Proposition pour Lyonnais, faire un CD de boot en mode sans échec incluant certains fixs dont Combo. Mais je sais pas faire.
Rosaly, prend ton mal en patience on devrait te trouver une solution du moins je l'espère. Lyonnais est un des tout meilleurs de ce site et au-delà. S'il faut formater, c'est lui qui te le dira.
J'avoue humblement que pour l'instant ton problème dépasse mon seuil de compétence. :-(
Formater est la solution ultime et un constat d'échec que nous n'aimons pas faire.
D'autant plus que certains nuisibles qui circulent aujourd'hui sont vraiment corriaces et certains arrivent à outrepasser le formatage et restent incrustés après celui-ci.
Le principal souci sur ta machine vient du fait que nous n'arrivons pas à la redémarrer en mode sans échec.
Proposition pour Lyonnais, faire un CD de boot en mode sans échec incluant certains fixs dont Combo. Mais je sais pas faire.
Rosaly, prend ton mal en patience on devrait te trouver une solution du moins je l'espère. Lyonnais est un des tout meilleurs de ce site et au-delà. S'il faut formater, c'est lui qui te le dira.
J'avoue humblement que pour l'instant ton problème dépasse mon seuil de compétence. :-(
bonjour Booddha
je te remercie pour ton soutien et ta franchise
je reste en attente des instructions de Lyonnais
autre chose....... ce matin je n'ai pas réussie à ouvrir Wanadoo, il me dit qu'il faut le réinstalé
je n'ose plus y toucher, heuresement que j'ai un portable, mais pas evident tout mes dossier, mails sont sur le PC principale...
Merci encore une fois à vous tous
je te remercie pour ton soutien et ta franchise
je reste en attente des instructions de Lyonnais
autre chose....... ce matin je n'ai pas réussie à ouvrir Wanadoo, il me dit qu'il faut le réinstalé
je n'ose plus y toucher, heuresement que j'ai un portable, mais pas evident tout mes dossier, mails sont sur le PC principale...
Merci encore une fois à vous tous
Bonjour,
pas de craintes pour tes données. On ira les sauvegarder si nécessaire.
Tu as un graveur sur ton portable ?
Réinstalle Wanadoo (je suppose pour rétablir ta connexion Internet).
Ouvre ce lien
http://www.assistepc.com/forum/reparer-le-mode-sans-echec-de-windows-vt867.html
choisis le fichier qui correspond à ton cas et exécute les instructions.
SP2 et SP3 sont identiques.
Réessaye le mode sans échec.(sans acharnement, ça ne marche pas tant pis).
Supprime ta version de Combofix et télécharge la dernière ici :
http://download.bleepingcomputer.com/sUBs/ComboFix.exe
Si cela ne marche pas, télécharge sur le portable et copie sur le fixe (au passage, tu recopies sous Fixfix sur le portable ).
Attention, le rapport s'appelle combofix (avec un m pas un n).
Il faut que tu sauvegardes tes données personnelles. Si j'ai bien compris, il faut que tu cherches tes données de courriels. Quel est ton logiciel de messagerie ? Outlook 2007 ?
Formatter n'est pas l'horreur, avec les infections actuelles, on aura de plus en plus pas d'autre solution.
Le tout est de bien préparer la maeuvre.
je suis chez moi samedi soir. a partir de Dimanche, ça me sera plus facile de te porter aide.
pas de craintes pour tes données. On ira les sauvegarder si nécessaire.
Tu as un graveur sur ton portable ?
Réinstalle Wanadoo (je suppose pour rétablir ta connexion Internet).
Ouvre ce lien
http://www.assistepc.com/forum/reparer-le-mode-sans-echec-de-windows-vt867.html
choisis le fichier qui correspond à ton cas et exécute les instructions.
SP2 et SP3 sont identiques.
Réessaye le mode sans échec.(sans acharnement, ça ne marche pas tant pis).
Supprime ta version de Combofix et télécharge la dernière ici :
http://download.bleepingcomputer.com/sUBs/ComboFix.exe
Si cela ne marche pas, télécharge sur le portable et copie sur le fixe (au passage, tu recopies sous Fixfix sur le portable ).
Attention, le rapport s'appelle combofix (avec un m pas un n).
Il faut que tu sauvegardes tes données personnelles. Si j'ai bien compris, il faut que tu cherches tes données de courriels. Quel est ton logiciel de messagerie ? Outlook 2007 ?
Formatter n'est pas l'horreur, avec les infections actuelles, on aura de plus en plus pas d'autre solution.
Le tout est de bien préparer la maeuvre.
je suis chez moi samedi soir. a partir de Dimanche, ça me sera plus facile de te porter aide.
bonjour Lyonnais
je te remercie pour les instructions
je fais le necessaire et je te tiens au courant
merci d'avance
je te remercie pour les instructions
je fais le necessaire et je te tiens au courant
merci d'avance
Re bonjour lyonnais92
en voici le Rapport de ComboFix fraichement réinstallé
après plusieures tentatives même en désactivant Zone alarm, au redemarage de la machine ComboFix ne pouvez pas continuer le scan, en le désinstalant j'ai réussie....... super
Pour Outlouk, franchement je ne esais pas exactement quelle version, mais tjrs est il, il marché aujourd'hui !!!! va s'avoir prkoi.......
dois-je reprendre les instructions de ton message n° 87
Je me dépêche de réinstaller Zonealarm
merci à toi
ComboFix 09-02-26.02 - CKS Andre SNEYAERT 2009-02-27 15:23:38.9 - NTFSx86
Microsoft Windows XP Édition familiale 5.1.2600.3.1252.1.1036.18.894.425 [GMT 1:00]
Lancé depuis: c:\documents and settings\CKS Andre SNEYAERT\Bureau\Fixfix.exe
* Un nouveau point de restauration a été créé
.
(((((((((((((((((((((((((((((((((((( Autres suppressions ))))))))))))))))))))))))))))))))))))))))))))))))
.
.
---- Exécution préalable -------
.
c:\docume~1\CKSAND~1\LOCALS~1\Temp\502514
c:\docume~1\CKSAND~1\LOCALS~1\temp\sys2A.tmp
C:\FINE CRUSH LTD.doc
c:\progra~1\SECURI~1\174112\Program\SERVIC~1.EXE
c:\program files\bccd.pif
c:\program files\cacmchc
c:\program files\Fichiers communs\PushWare
c:\program files\Fichiers communs\PushWare\cpush.dll
c:\program files\Fichiers communs\PushWare\cpush0.dll
c:\program files\Fichiers communs\PushWare\Uninst.exe
c:\program files\Fichiers communs\qybabiqylo.dl
c:\program files\Fichiers communs\vexomigaga._sy
c:\program files\Fichiers communs\vodeqet.ban
c:\program files\Internet Explorer\IETimber\IETimber.dll
c:\program files\internet explorer\plugins\icwres.dll
c:\program files\Internet Explorer\PowerJo.ase
c:\program files\Internet Explorer\PowerJv.ask
c:\program files\MediaChannel\Navvy 5.2\NavvyUp.exe
c:\windows\Downloaded Program Files\explorer.exe
c:\windows\fonts\alsk.sys
c:\windows\fonts\naks.sys
c:\windows\Fonts\TIMPIatform.exe
c:\windows\Fonts\wuauclt.exe
c:\windows\Intel\baiduc.dll
c:\windows\KB611311.log
c:\windows\smss.exe
c:\windows\spoolsv.exe
c:\windows\sys.ini
c:\windows\sysinfo.tmp
c:\windows\system\rund1132.exe
c:\windows\system32\16AF66EB.cfg
c:\windows\system32\16AF66EB.dll
c:\windows\system32\16BC0F81.cfg
c:\windows\system32\16BC0F81.dll
c:\windows\system32\1957817A.cfg
c:\windows\system32\1957817A.dll
c:\windows\system32\198FF3D8.cfg
c:\windows\system32\198FF3D8.dll
c:\windows\system32\404Fix.exe
c:\windows\system32\4FBFD5A4.cfg
c:\windows\system32\4FBFD5A4.dll
c:\windows\system32\704C3595.cfg
c:\windows\system32\704C3595.dll
c:\windows\system32\7f7lMNDh.exe
c:\windows\system32\A1A6BC2E.cfg
c:\windows\system32\A1A6BC2E.dll
c:\windows\system32\Agent.OMZ.Fix.exe
c:\windows\system32\akolkhck.dll
c:\windows\system32\aldoiilk.dll
c:\windows\system32\ali125a3.dll
c:\windows\system32\ali13ac2.dll
c:\windows\system32\ali13c19.dll
c:\windows\system32\ali13d52.dll
c:\windows\system32\ali142ff.dll
c:\windows\system32\ali14948.dll
c:\windows\system32\ali709f0.dll
c:\windows\system32\alia056e.dll
c:\windows\system32\alic236.dll
c:\windows\system32\alicfd3.dll
c:\windows\system32\alid09e.dll
c:\windows\system32\alide2b.dll
c:\windows\system32\alief22.dll
c:\windows\system32\alimoto32.exe
c:\windows\system32\ambiojfn.dll
c:\windows\system32\aoalmieo.dll
c:\windows\system32\asdfasdf
c:\windows\system32\B4eocaps.SRG
c:\windows\system32\cbndboek.dll
c:\windows\system32\ccbficfi.dll
c:\windows\system32\cciieood.dll
c:\windows\system32\cdcgebkf.dll
c:\windows\system32\cockgddc.dll
c:\windows\system32\cpnbliif.dll
c:\windows\system32\dafln.dll
c:\windows\system32\dbfkipbd.dll
c:\windows\system32\dfln.dll
c:\windows\system32\dllcache\spoolsv.exe
c:\windows\system32\dpbfhnfj.dll
c:\windows\system32\drivers\52438666.txt
c:\windows\system32\drivers\acpidisk.sys
c:\windows\system32\drivers\ati4twxx.sys
c:\windows\system32\drivers\ati8quxx.sys
c:\windows\system32\drivers\ethcjxre.sys
c:\windows\system32\drivers\npf.sys
c:\windows\system32\drivers\pnpmem.sys
c:\windows\system32\drivers\winyyy.sys
c:\windows\system32\drivers\winyyy.sys
c:\windows\system32\dumphive.exe
c:\windows\system32\ebhpliad.dll
c:\windows\system32\eojpchpn.dll
c:\windows\system32\exlds.ini
c:\windows\system32\F65BDEC7.cfg
c:\windows\system32\F65BDEC7.dll
c:\windows\system32\fasadf.dll
c:\windows\system32\feeckhoj.dll
c:\windows\system32\flzaitian.dll
c:\windows\system32\gajdpnec.dll
c:\windows\system32\gjdochbi.dll
c:\windows\system32\gprmsgse.axz
c:\windows\system32\gscpx32r.det
c:\windows\system32\heifeado.dll
c:\windows\system32\homegdpk.dll
c:\windows\system32\IEDFix.C.exe
c:\windows\system32\IEDFix.exe
c:\windows\system32\ikdapmcm.dll
c:\windows\system32\ipppkhkc.dll
c:\windows\system32\kdexe.exe
c:\windows\system32\kdkdfeln.dll
c:\windows\system32\keepSafe.exe
c:\windows\system32\kffoogac.dll
c:\windows\system32\lkknkgnk.dll
c:\windows\system32\mppblchp.dll
c:\windows\system32\mprmsgse.axz
c:\windows\system32\mscpx32r.det
c:\windows\system32\msexe.exe
c:\windows\system32\MSPolicyAgent.dll
c:\windows\system32\ndaelgfl.dll
c:\windows\system32\nfbdadcc.dll
c:\windows\system32\npptools.dll
c:\windows\system32\o4Patch.exe
c:\windows\system32\odgildpe.dll
c:\windows\system32\ogcmfdaf.dll
c:\windows\system32\ojdnnlnf.dll
c:\windows\system32\ooaddion.dll
c:\windows\system32\oojlpcib.dll
c:\windows\system32\ormsgse.axz
c:\windows\system32\Packet.dll
c:\windows\system32\pahklhok.dll
c:\windows\system32\pfpjhepc.dll
c:\windows\system32\piakdpih.dll
c:\windows\system32\Process.exe
c:\windows\system32\RamrtwC.dll
c:\windows\system32\registryboosterppcg15.exe
c:\windows\system32\romarshal.dat
c:\windows\system32\somspring.dat
c:\windows\system32\SrchSTS.exe
c:\windows\system32\types.tmp
c:\windows\system32\VACFix.exe
c:\windows\system32\VCCLSID.exe
c:\windows\system32\WanPacket.dll
c:\windows\system32\wauafe.exe
c:\windows\system32\waubfe.exe
c:\windows\system32\waukafe.exe
c:\windows\system32\waulafe.exe
c:\windows\system32\waumafe.exe
c:\windows\system32\waunafe.exe
c:\windows\system32\wpcap.dll
c:\windows\system32\WS2Fix.exe
c:\windows\system32\zxexe.exe
c:\windows\Tasks\At1.job
c:\windows\Tasks\At10.job
c:\windows\Tasks\At11.job
c:\windows\Tasks\At12.job
c:\windows\Tasks\At13.job
c:\windows\Tasks\At14.job
c:\windows\Tasks\At15.job
c:\windows\Tasks\At16.job
c:\windows\Tasks\At17.job
c:\windows\Tasks\At18.job
c:\windows\Tasks\At19.job
c:\windows\Tasks\At2.job
c:\windows\Tasks\At20.job
c:\windows\Tasks\At21.job
c:\windows\Tasks\At22.job
c:\windows\Tasks\At23.job
c:\windows\Tasks\At24.job
c:\windows\Tasks\At25.job
c:\windows\Tasks\At26.job
c:\windows\Tasks\At27.job
c:\windows\Tasks\At28.job
c:\windows\Tasks\At29.job
c:\windows\Tasks\At3.job
c:\windows\Tasks\At30.job
c:\windows\Tasks\At31.job
c:\windows\Tasks\At32.job
c:\windows\Tasks\At33.job
c:\windows\Tasks\At34.job
c:\windows\Tasks\At35.job
c:\windows\Tasks\At36.job
c:\windows\Tasks\At37.job
c:\windows\Tasks\At38.job
c:\windows\Tasks\At39.job
c:\windows\Tasks\At4.job
c:\windows\Tasks\At40.job
c:\windows\Tasks\At41.job
c:\windows\Tasks\At42.job
c:\windows\Tasks\At43.job
c:\windows\Tasks\At44.job
c:\windows\Tasks\At45.job
c:\windows\Tasks\At46.job
c:\windows\Tasks\At47.job
c:\windows\Tasks\At48.job
c:\windows\Tasks\At49.job
c:\windows\Tasks\At5.job
c:\windows\Tasks\At50.job
c:\windows\Tasks\At51.job
c:\windows\Tasks\At52.job
c:\windows\Tasks\At53.job
c:\windows\Tasks\At54.job
c:\windows\Tasks\At55.job
c:\windows\Tasks\At56.job
c:\windows\Tasks\At57.job
c:\windows\Tasks\At58.job
c:\windows\Tasks\At59.job
c:\windows\Tasks\At6.job
c:\windows\Tasks\At60.job
c:\windows\Tasks\At61.job
c:\windows\Tasks\At62.job
c:\windows\Tasks\At63.job
c:\windows\Tasks\At64.job
c:\windows\Tasks\At65.job
c:\windows\Tasks\At66.job
c:\windows\Tasks\At67.job
c:\windows\Tasks\At68.job
c:\windows\Tasks\At69.job
c:\windows\Tasks\At7.job
c:\windows\Tasks\At70.job
c:\windows\Tasks\At71.job
c:\windows\Tasks\At72.job
c:\windows\Tasks\At8.job
c:\windows\Tasks\At9.job
c:\windows\Temp\20090122.exe
c:\windows\Temp\Perflib_Perfdata_b4.dat
c:\windows\tmp.dat
c:\windows\WinShell.\daemon.exe
c:\windows\winsscoo.exe
c:\windows\winsys.exe
C:\WINDOWSupdate.dll
.
((((((((((((((((((((((((((((((((((((((( Pilotes/Services )))))))))))))))))))))))))))))))))))))))))))))))))
.
-------\Legacy_ACPIDISK
-------\Legacy_NPF
-------\Legacy_ZG
-------\Service_acpidisk
-------\Service_aliimz
-------\Service_npf
-------\Legacy_ACPIDISK
-------\Legacy_NPF
-------\Legacy_PNPMEM
-------\Legacy_WINSSCOM
-------\Legacy_ZG
-------\Service_acpidisk
-------\Service_aliimz
-------\Service_npf
-------\Service_pnpmem
-------\Service_WinSSCOM
-------\Legacy_ACPIDISK
-------\Legacy_NPF
-------\Legacy_PNPMEM
-------\Legacy_WINSSCOM
-------\Service_acpidisk
-------\Service_aliimz
-------\Service_npf
-------\Service_pnpmem
-------\Service_WinSSCOM
-------\Legacy_ACPIDISK
-------\Legacy_NPF
-------\Legacy_PNPMEM
-------\Legacy_WINSSCOM
-------\Legacy_ZG
-------\Service_aliimz
-------\Service_npf
-------\Service_pnpmem
-------\Service_WinSSCOM
((((((((((((((((((((((((((((( Fichiers créés du 2009-01-27 au 2009-02-27 ))))))))))))))))))))))))))))))))))))
.
2009-02-26 18:41 . 2009-02-26 18:41 21,248 --a------ c:\windows\winyyy.sys
2009-02-26 12:08 . 2009-02-26 16:38 249,344 --a------ c:\windows\smss.exe.vzr
2009-02-26 11:43 . 2009-02-26 11:43 40 --a------ c:\windows\tmp.dat
2009-02-26 11:43 . 2009-02-26 11:43 37 --a------ c:\windows\sys.ini
2009-02-25 23:29 . 2009-02-27 15:01 1,113 --a------ C:\rollback.ini
2009-02-25 20:49 . 2009-02-04 07:59 122,372 --a------ c:\windows\system32\drivers\pnpmem.sys
2009-02-25 20:49 . 2009-02-25 20:49 32 --a------ c:\windows\system32\ormsgse.axz
2009-02-25 20:26 . 2009-02-25 20:26 <REP> d-------- c:\program files\SonicWallES
2009-02-25 20:10 . 2009-02-25 20:10 133,120 --a------ c:\windows\winsscoo.exe.vzr
2009-02-25 20:08 . 2009-02-26 19:06 13,976 --a------ c:\windows\system32\1957817A.dll.vzr
2009-02-25 20:08 . 2009-02-25 20:08 300 --ahs---- c:\windows\system32\1957817A.cfg
2009-02-25 20:07 . 2009-02-25 20:07 14,962 --a------ c:\windows\system32\704C3595.dll.vzr
2009-02-25 20:07 . 2009-02-25 20:07 224 --ahs---- c:\windows\system32\704C3595.cfg
2009-02-25 20:06 . 2009-02-25 20:06 219,272 --a------ c:\windows\system32\4FBFD5A4.dll.vzr
2009-02-25 20:05 . 2009-02-25 20:05 14,460 --a------ c:\windows\system32\16BC0F81.dll.vzr
2009-02-25 20:05 . 2009-02-25 20:05 244 --ahs---- c:\windows\system32\16BC0F81.cfg
2009-02-25 20:02 . 2009-02-25 20:02 218,746 --a------ c:\windows\system32\16AF66EB.dll.vzr
2009-02-25 20:02 . 2009-02-25 20:02 13,462 --a------ c:\windows\system32\F65BDEC7.dll.vzr
2009-02-25 20:00 . 2009-02-25 20:00 16,632 --a------ c:\windows\system32\msexe.exe
2009-02-25 20:00 . 2009-02-26 11:27 1,249 --a------ c:\windows\system32\asdfasdf
2009-02-25 19:19 . 2009-02-26 00:38 141 --a------ c:\windows\system32\exlds.ini
2009-02-25 19:09 . 2009-02-25 19:26 <REP> d-------- C:\Combo-Fix
2009-02-25 18:43 . 2009-02-25 18:43 89,726 --a------ c:\windows\guid.exe
2009-02-25 17:25 . 2009-02-25 17:25 13,926 --ahs---- c:\windows\system32\72B29486.dll
2009-02-25 17:25 . 2009-02-25 17:25 200 --ahs---- c:\windows\system32\72B29486.cfg
2009-02-25 14:04 . 2009-02-27 15:26 35,022,944 --ahs---- c:\windows\system32\drivers\fidbox.dat
2009-02-25 14:04 . 2009-02-26 23:04 433,508 --ahs---- c:\windows\system32\drivers\fidbox.idx
2009-02-25 13:58 . 2009-02-27 15:19 <REP> d-------- c:\windows\system32\ZoneLabs
2009-02-25 13:58 . 2009-02-25 13:58 <REP> d-------- c:\program files\Zone Labs
2009-02-25 13:58 . 2009-02-25 14:01 4,212 --ah----- c:\windows\system32\zllictbl.dat
2009-02-25 13:56 . 2009-02-27 15:19 <REP> d-------- c:\windows\Internet Logs
2009-02-24 19:17 . 2009-02-26 19:06 2,681 --a------ c:\windows\winsys.inf
2009-02-24 18:55 . 2009-02-24 18:55 1,811 --a------ c:\windows\ACROREAD.INI
2009-02-23 16:50 . 2004-08-05 13:00 4,224 --a------ c:\windows\system32\drivers\beep.sys
2009-02-23 16:50 . 2004-08-05 13:00 4,224 --a--c--- c:\windows\system32\dllcache\beep.sys
2009-02-21 00:01 . 2009-02-11 10:19 15,504 --a------ c:\windows\system32\drivers\mbam.sys
2009-02-21 00:00 . 2009-02-21 00:01 <REP> d-------- c:\program files\Malwarebytes' Anti-Malware
2009-02-21 00:00 . 2009-02-11 10:19 38,496 --a------ c:\windows\system32\drivers\mbamswissarmy.sys
2009-02-20 23:13 . 2009-02-20 23:13 396,288 --a------ c:\windows\HijackThis.exe
2009-02-20 22:23 . 2009-02-20 23:00 <REP> d-------- C:\ToolBar SD
2009-02-20 21:43 . 2009-02-20 21:43 16,656 --a------ C:\mbam-log-2009-02-20 (21-42-58)VIRUS
2009-02-20 19:50 . 2009-02-20 19:50 15,069 --a------ c:\windows\system32\telechargement-159-hijackthis.htm
2009-02-20 19:04 . 2009-02-20 19:04 <REP> d-------- c:\program files\MediaChannel
2009-02-20 16:08 . 2009-02-20 16:08 <REP> d-------- c:\documents and settings\CKS Andre SNEYAERT\Application Data\Malwarebytes
2009-02-20 16:08 . 2009-02-20 16:08 <REP> d-------- c:\documents and settings\All Users\Application Data\Malwarebytes
2009-02-20 13:11 . 2003-03-18 21:20 1,060,864 --a------ c:\windows\system32\mfc71.dll
2009-02-20 13:01 . 2009-02-20 13:01 520,052 --a------ c:\windows\system32\mfc71.7z
2009-02-20 12:55 . 2009-02-20 13:00 <REP> d-------- c:\windows\system32\mfc71
2009-02-20 12:01 . 2009-02-20 12:02 514,940 -rah----- c:\windows\system32\mfc71.zip
2009-02-20 11:31 . 2009-02-20 11:31 <REP> d-------- c:\documents and settings\CKS Andre SNEYAERT\Application Data\Uniblue
2009-02-19 18:50 . <REP> c:\windows\$WIND$
2009-02-19 18:45 . 2009-02-20 22:16 <REP> d-------- c:\program files\Goto Software
2009-02-19 18:45 . 2009-02-20 22:16 <REP> d-------- c:\program files\Fichiers communs\Goto Software
2009-02-19 18:45 . 2009-02-19 18:45 <REP> d-------- c:\documents and settings\CKS Andre SNEYAERT\Application Data\VadeRetro
2009-02-19 18:45 . 2009-02-20 22:16 <REP> d-------- c:\documents and settings\All Users\Application Data\VadeRetro
2009-02-19 16:43 . <REP> c:\windows\WinShell
2009-02-18 19:42 . 2009-02-18 19:42 31,232 --a------ C:\Relevé de compte LAW YAT au 31.12.2008.doc
2009-02-17 14:47 . 2009-02-26 22:29 <REP> d-------- c:\windows\Intel
2009-02-17 14:45 . 2008-04-14 03:33 19,968 --a--c--- c:\windows\system32\dllcache\linkinfo.dll
2009-02-16 07:42 . 2009-02-16 07:42 69,888 --a------ c:\windows\battc.sys
2009-02-07 23:10 . 2009-02-07 23:10 170,496 --a------ C:\FINE CRUSH LTD.doc
2009-02-02 21:59 . 2009-02-02 21:59 66,048 --a------ C:\Proposition APOLLO pour Ile MAURICE.doc
2009-02-02 17:57 . 2009-02-02 17:57 48,640 --a------ C:\Clients Ile MAURICE.doc
2009-02-02 12:23 . 2009-02-05 11:49 25,088 --a------ C:\A T T E S T A T I O N Impotsssssssssss.doc
2009-02-02 10:47 . 2009-02-02 10:47 30,720 --a------ C:\A T T E S T A T I O N - I m p o t s.doc
2009-01-31 13:51 . 2009-01-31 20:37 26,624 --a------ C:\Demande prolongation stage.doc
2009-01-27 10:10 . 2009-01-27 11:00 32,256 --a------ C:\Courrier André SNEYAERT.doc
.
(((((((((((((((((((((((((((((((((( Compte-rendu de Find3M ))))))))))))))))))))))))))))))))))))))))))))))))
.
2009-02-27 14:13 --------- d-----w c:\program files\Wanadoo
2009-02-26 22:06 --------- d-----w c:\documents and settings\CKS Andre SNEYAERT\Application Data\Skype
2009-02-26 18:36 --------- d-----w c:\documents and settings\All Users\Application Data\Google Updater
2009-02-26 10:44 --------- d-----w c:\program files\FenAffiche
2009-02-25 17:50 --------- d-----w c:\program files\Common
2009-02-25 17:40 24,576 ----a-w c:\windows\TEMPIadHide3.dll
2009-02-25 17:06 49,152 ----a-w c:\windows\system32\npptools.dll.tmp
2009-02-23 22:43 431,922 ----a-w c:\program files\HJTInstall.7z
2009-02-18 18:10 --------- d-----w c:\program files\Google
2009-01-23 20:21 --------- d-----w c:\documents and settings\All Users\Application Data\288537758
2009-01-21 19:07 --------- d-----w c:\program files\EnveloppesEditor1.09
2009-01-21 16:56 --------- d-----w c:\documents and settings\CKS Andre SNEYAERT\Application Data\PC-FAX TX
2009-01-17 14:02 14,336 ----a-w c:\windows\system32\svchost.exe
2009-01-16 17:15 137,664 ----a-w c:\windows\system32\zdcndis5.sys
2009-01-16 17:15 137,664 ----a-w c:\windows\system32\pcandis5.sys
2009-01-16 17:15 137,664 ----a-w c:\windows\system32\drivers\adiusbaw.sys
2008-12-20 22:47 826,368 ----a-w c:\windows\system32\wininet.dll
2008-12-20 10:50 410,984 ----a-w c:\windows\system32\deploytk.dll
2008-09-22 09:52 85,504 ----a-w c:\documents and settings\CKS Andre SNEYAERT\Application Data\GDIPFONTCACHEV1.DAT
2008-09-04 14:43 1,940 ----a-w c:\documents and settings\CKS Andre SNEYAERT\Application Data\ViewerApp.dat
2008-09-27 10:02 122,880 ----a-w c:\program files\mozilla firefox\components\GoogleDesktopMozilla.dll
.
((((((((((((((((((((((((((((( SnapShot_2009-02-26_23.16.44.98 )))))))))))))))))))))))))))))))))))))))))
.
+ 2009-02-27 07:48:31 16,384 ----atw c:\windows\Temp\Perflib_Perfdata_204.dat
.
-- Instantané actualisé --
.
((((((((((((((((((((((((((((((((( Points de chargement Reg ))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* les éléments vides & les éléments initiaux légitimes ne sont pas listés
REGEDIT4
[HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{912F6837-CCB6-424B-BC9C-8BB5541AFB54}]
c:\program files\Internet Explorer\PowerJv.ask [BU]
[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"CTFMON.EXE"="c:\windows\system32\ctfmon.exe" [2008-04-14 15360]
"WOOKIT"="c:\progra~1\Wanadoo\Shell.exe" [2004-08-23 122880]
"Livecom"="c:\progra~1\Livecom\APPLIC~1\CommunicationAgent\CommunicationAgent.exe" [2006-02-23 237568]
"Skype"="c:\program files\Skype\Phone\Skype.exe" [2007-02-09 25388584]
"swg"="c:\program files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe" [2007-07-01 68856]
"MoneyAgent"="c:\program files\Microsoft Money\System\mnyexpr.exe" [2002-07-17 204863]
"WMPNSCFG"="c:\program files\Windows Media Player\WMPNSCFG.exe" [2006-11-03 204288]
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"fenaffiche"="c:\program files\FenAffiche\FenUnika.exe" [BU]
"NeroFilterCheck"="c:\windows\system32\NeroCheck.exe" [2001-07-09 155648]
"Microsoft Works Update Detection"="c:\program files\Fichiers communs\Microsoft Shared\Works Shared\WkUFind.exe" [2002-07-18 28672]
"WOOWATCH"="c:\progra~1\Wanadoo\Watch.exe" [2004-08-23 20480]
"WOOTASKBARICON"="c:\progra~1\Wanadoo\GestMaj.exe" [2004-10-14 32768]
"SunJavaUpdateSched"="c:\program files\Java\jre6\bin\jusched.exe" [2008-12-20 136600]
"Creative WebCam Tray"="c:\program files\Creative\Shared Files\CAMTRAY.EXE" [2003-10-13 184320]
"Google Desktop Search"="c:\program files\Google\Google Desktop Search\GoogleDesktop.exe" [2008-09-27 29744]
"QuickTime Task"="c:\program files\QuickTime\qttask.exe" [2006-09-01 282624]
"Adobe Reader Speed Launcher"="c:\program files\Adobe\Reader 8.0\Reader\Reader_sl.exe" [2007-10-10 39792]
"SSBkgdUpdate"="c:\program files\Fichiers communs\Scansoft Shared\SSBkgdUpdate\SSBkgdupdate.exe" [2006-10-25 210472]
"PaperPort PTD"="c:\program files\ScanSoft\PaperPort\pptd40nt.exe" [2007-01-29 30248]
"IndexSearch"="c:\program files\ScanSoft\PaperPort\IndexSearch.exe" [2007-01-29 46632]
"PPort11reminder"="c:\program files\ScanSoft\PaperPort\Ereg\Ereg.exe" [2007-02-01 255528]
"BrMfcWnd"="c:\program files\Brother\Brmfcmon\BrMfcWnd.exe" [2007-03-23 663552]
"ControlCenter3"="c:\program files\Brother\ControlCenter3\brctrcen.exe" [2007-01-26 65536]
"msexe.exe"="c:\windows\system32\msexe.exe" [2009-02-25 16632]
"zxexe.exe"="c:\windows\system32\zxexe.exe" [BU]
"SiSPower"="SiSPower.dll" [2005-04-12 c:\windows\system32\SiSPower.dll]
"SoundMan"="SOUNDMAN.EXE" [2005-03-24 c:\windows\SOUNDMAN.EXE]
[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run]
"CTFMON.EXE"="c:\windows\system32\ctfmon.exe" [2008-04-14 15360]
"Picasa Media Detector"="c:\program files\Picasa2\PicasaMediaDetector.exe" [2008-08-21 443968]
"msnmsgr"="c:\program files\Windows Live\Messenger\msnmsgr.exe" [2007-10-18 5724184]
[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\RunOnce]
"FlashPlayerUpdate"="c:\windows\system32\Macromed\Flash\FlashUtil9d.exe" [2007-06-11 190696]
[HKEY_LOCAL_MACHINE\software\microsoft\windows\Currentversion\policies\explorer\Run]
"stup"="c:\docume~1\CKSAND~1\LOCALS~1\Temp\3010780" [X]
"user"="c:\windows\WinShell..\daemon.exe" [BU]
"360safe"="c:\windows\Fonts\wuauclt.exe" [BU]
c:\documents and settings\CKS Andre SNEYAERT\Menu D‚marrer\Programmes\D‚marrage\
Outil de d‚tection de support Picture Motion Browser.lnk - c:\program files\Sony\Sony Picture Utility\PMBCore\SPUVolumeWatcher.exe [2008-07-19 385024]
c:\documents and settings\All Users\Menu D‚marrer\Programmes\D‚marrage\
Microsoft Office.lnk - c:\program files\Microsoft Office\Office10\OSA.EXE [2001-02-13 83360]
Picture Package Menu.lnk - c:\program files\Sony Corporation\Picture Package\Picture Package Menu\SonyTray.exe [2006-04-28 151552]
Picture Package VCD Maker.lnk - c:\program files\Sony Corporation\Picture Package\Picture Package Applications\Residence.exe [2006-04-28 106496]
Utilitaire r‚seau pour SAGEM Wi-Fi 11g USB adapter.lnk - c:\program files\SAGEM Wi-Fi USB 802.11g\WLANUTL.exe [2007-04-20 835584]
[HKEY_CURRENT_USER\software\microsoft\windows\currentversion\policies\explorer]
"ForceClassicControlPanel"= 1 (0x1)
[hkey_local_machine\software\microsoft\windows\currentversion\explorer\ShellExecuteHooks]
"{8D025D9E-A5AC-49DB-968D-1F2A3C030840}"= "c:\windows\system32\odgildpe.dll" [BU]
"{EB1952AD-75E8-4E4E-B626-2C415DA35709}"= "c:\windows\system32\ebhpliad.dll" [BU]
"{186E0D94-F863-43EF-9B43-38DAC43C064B}"= "c:\windows\system32\homegdpk.dll" [BU]
"{C8C40DDC-9B46-4266-BA0B-5AF248442C3B}"= "c:\windows\system32\cockgddc.dll" [BU]
"{83D7757F-4582-4300-9F03-C3D1A544A9D0}"= "c:\windows\system32\ojdnnlnf.dll" [BU]
"{A6B283F7-EAC4-4110-ACAA-A2D0B85466B7}"= "c:\windows\system32\ambiojfn.dll" [BU]
"{16BC0F81-410C-41DF-A902-1B04368BA8AE}"= "16BC0F81.dll" [BU]
"{704C3595-DB85-40F6-A601-8D6F346907BD}"= "704C3595.dll" [BU]
"{72B29486-39B6-4241-B234-B57DEF78302F}"= "72B29486.dll" [BU]
"{1957817A-94B2-4CAC-B113-A331809B5730}"= "1957817A.dll" [BU]
"{B3DDF3DF-0A05-4BE9-B37D-7021BD501C7A}"= "c:\windows\system32\bjddfjdf.dll" [BU]
"{A9386267-1CF0-48EC-9DBA-412A44C76334}"= "c:\windows\system32\apjomimn.dll" [BU]
"{9B8978FE-5B0E-476D-8F15-3FB5119A42F3}"= "c:\windows\system32\pbopnofe.dll" [BU]
"{FE494031-756B-4865-99B4-4DE92DDCF609}"= "c:\windows\system32\fekpkgjh.dll" [BU]
"{46184B86-19FF-4A37-9167-4C538027CEBC}"= "c:\windows\system32\kmhokbom.dll" [BU]
"{AC9A4670-B0B6-4EC7-B6A5-B29FA3530420}"= "c:\windows\system32\acpakmng.dll" [BU]
"{9B3DC09A-2613-4613-96F8-F8E305BFF825}"= "c:\windows\system32\pbjdcgpa.dll" [BU]
"{C13945CA-D00B-4474-B105-3838809607EA}"= "c:\windows\system32\chjpklca.dll" [BU]
"{1BFB618F-82C7-45DE-A0B9-F76FACE92F32}"= "c:\windows\system32\hbfbmhof.dll" [2008-08-14 32256]
"{22EC45F3-1651-409E-8273-6D80E39B4549}"= "c:\windows\system32\iiecklfj.dll" [BU]
"{391597A0-67FF-4D4F-9AFF-8471E5D0D3C9}"= "c:\windows\system32\jphlpnag.dll" [BU]
"{BA9620A6-68E8-492D-9B28-7B7416F69673}"= "c:\windows\system32\bapmigam.dll" [BU]
"{04D3233B-EC1F-44B3-BBE4-9D76438EEC1E}"= "c:\windows\system32\gkdjijjb.dll" [BU]
"{51E74159-54A6-4355-A78F-55998328FC07}"= "c:\windows\system32\lhenkhlp.dll" [BU]
"{912F6837-CCB6-424B-BC9C-8BB5541AFB54}"= "c:\program files\Internet Explorer\PowerJv.ask" [BU]
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad]
"B3DDF3DF"= {B3DDF3DF-0A05-4BE9-B37D-7021BD501C7A} - c:\windows\system32\bjddfjdf.dll [BU]
"A9386267"= {A9386267-1CF0-48EC-9DBA-412A44C76334} - c:\windows\system32\apjomimn.dll [BU]
"9B8978FE"= {9B8978FE-5B0E-476D-8F15-3FB5119A42F3} - c:\windows\system32\pbopnofe.dll [BU]
"FE494031"= {FE494031-756B-4865-99B4-4DE92DDCF609} - c:\windows\system32\fekpkgjh.dll [BU]
"46184B86"= {46184B86-19FF-4A37-9167-4C538027CEBC} - c:\windows\system32\kmhokbom.dll [BU]
"AC9A4670"= {AC9A4670-B0B6-4EC7-B6A5-B29FA3530420} - c:\windows\system32\acpakmng.dll [BU]
"9B3DC09A"= {9B3DC09A-2613-4613-96F8-F8E305BFF825} - c:\windows\system32\pbjdcgpa.dll [BU]
"C13945CA"= {C13945CA-D00B-4474-B105-3838809607EA} - c:\windows\system32\chjpklca.dll [BU]
"1BFB618F"= {1BFB618F-82C7-45DE-A0B9-F76FACE92F32} - c:\windows\system32\hbfbmhof.dll [2008-08-14 32256]
"22EC45F3"= {22EC45F3-1651-409E-8273-6D80E39B4549} - c:\windows\system32\iiecklfj.dll [BU]
"391597A0"= {391597A0-67FF-4D4F-9AFF-8471E5D0D3C9} - c:\windows\system32\jphlpnag.dll [BU]
"BA9620A6"= {BA9620A6-68E8-492D-9B28-7B7416F69673} - c:\windows\system32\bapmigam.dll [BU]
"04D3233B"= {04D3233B-EC1F-44B3-BBE4-9D76438EEC1E} - c:\windows\system32\gkdjijjb.dll [BU]
"51E74159"= {51E74159-54A6-4355-A78F-55998328FC07} - c:\windows\system32\lhenkhlp.dll [BU]
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\windows]
"AppInit_DLLs"=hbfbmhof.dll
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\360rpt.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\360safe.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\360safebox.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\360tray.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\a.exe]
"Debugger"=c:\windows\system32\keepSafe.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\ANTIARP.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\ArSwp.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\Ast.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\AutoRun.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\AutoRunKiller.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\AvMonitor.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\AVP.COM]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\AVP.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\CCenter.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\Frameworkservice.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\GFUpd.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\GuardField.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\HijackThis.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\IceSword.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\Iparmor.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\KASARP.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\kav32.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\KAVPFW.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\kavstart.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\kissvc.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\kmailmon.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\KPfwSvc.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\KRegEx.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\KVMonxp.KXP]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\KVSrvXP.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\KVWSC.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\kwatch.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\Mmsk.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\Navapsvc.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\nod32krn.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\Nod32kui.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\PFW.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\QQDoctor.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\RAV.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\RavMon.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\RavMonD.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\Ravservice.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\RavStub.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\RavTask.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\RAVTRAY.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\Regedit.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\rfwmain.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\rfwProxy.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\rfwsrv.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\Rfwstub.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\RsAgent.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\Rsaupd.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\RsMain.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\rsnetsvr.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\RSTray.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\Runiep.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\safeboxTray.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\ScanFrm.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\SREngLdr.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\TrojanDetector.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\Trojanwall.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\TrojDie.KXP]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\VPC32.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\VPTRAY.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\WOPTILITIES.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\security center]
"AntiVirusDisableNotify"=dword:00000001
"UpdatesDisableNotify"=dword:00000001
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%windir%\\system32\\sessmgr.exe"=
"c:\\Program Files\\Messenger\\msmsgs.exe"=
"c:\\Program Files\\eMule\\emule.exe"=
"c:\\Program Files\\Livecom\\Application\\eConfv4\\livecomp.exe"=
"c:\\PROGRA~1\\Livecom\\APPLIC~1\\Exe\\Livecom.exe"=
"%windir%\\Network Diagnostic\\xpnetdiag.exe"=
"c:\\Program Files\\Windows Live\\Messenger\\msnmsgr.exe"=
"c:\\Program Files\\Windows Live\\Messenger\\livecall.exe"=
"c:\\Program Files\\Skype\\Phone\\Skype.exe"=
"c:\\Program Files\\Shareaza\\Shareaza.exe"=
R0 rnieys;rnieys;c:\windows\system32\drivers\jme.sys [2005-08-08 30368]
S2 MSPolicyAgent;Microsoft IPsec Policy Agent;c:\windows\System32\svchost.exe -k MSPolicyAgent [2008-04-14 14336]
S3 GoogleDesktopManager-061008-081103;Google Desktop Manager 5.7.806.10245;c:\program files\Google\Google Desktop Search\GoogleDesktop.exe [2007-11-21 29744]
S3 myprotector;myprotector;c:\windows\battc.sys [2009-02-16 69888]
S3 P1120VID;Creative WebCam NX Ultra;c:\windows\system32\drivers\P1120Vid.sys [2006-02-01 1252474]
S3 PsShutdownSvc;PsShutdown;c:\windows\system32\PSSDNSVC.EXE [2005-08-22 65536]
S3 SG760_XP;SAGEM 802.11g XG760 1211 Driver;c:\windows\system32\drivers\WlanUZXP.sys [2007-04-20 260608]
S3 UPDATEDATA;UPDATEDATA;c:\windows\system32\drivers\acpiec.sys [2001-08-23 12032]
S3 ZDCndis5;ZDCndis5 Protocol Driver;c:\windows\system32\zdcndis5.sys [2009-01-16 137664]
--- Autres Services/Pilotes en mémoire ---
*NewlyCreated* - ZDPNDIS5
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\svchost]
MSPolicyAgent REG_MULTI_SZ MSPolicyAgent
[HKEY_CURRENT_USER\software\microsoft\windows\currentversion\explorer\mountpoints2\{c984ab7c-e6f0-11dd-8d9e-00142a50775a}]
\shell\explore\command - E:\CC.PIF
\shell\open\Command - E:\CC.PIF
.
Contenu du dossier 'Tâches planifiées'
2009-02-23 c:\windows\Tasks\AppleSoftwareUpdate.job
- c:\program files\Apple Software Update\SoftwareUpdate.exe [2006-08-29 14:21]
2009-02-27 c:\windows\Tasks\Google Software Updater.job
- c:\program files\Google\Common\Google Updater\GoogleUpdaterService.exe [2009-02-23 15:32]
2009-02-27 c:\windows\Tasks\Vérifier les mises à jour de Windows Live Toolbar.job
- c:\program files\Windows Live Toolbar\MSNTBUP.EXE [2007-10-19 11:20]
.
- - - - ORPHELINS SUPPRIMES - - - -
HKLM-Run-Á³# Lh'þ9Óœð3rÅWc:\program files\ISTsvc\istsvc.exe - c:\windows\hxyjlul.exe
.
------- Examen supplémentaire -------
.
uSearchMigratedDefaultURL = hxxp://www.google.com/search?q={searchTerms}&sourceid=ie7&rls=com.microsoft:en-US&ie=utf8&oe=utf8
uStart Page = www.6700.cn?tn=1027251
mStart Page = hxxp://www.google.com
uSearchURL,(Default) = hxxp://g.msn.fr/0SEFRFR/SAOS01?FORM=TOOLBR
IE: &Windows Live Search - c:\program files\Windows Live Toolbar\msntb.dll/search.htm
IE: Add to Windows &Live Favorites - https://onedrive.live.com/?id=favorites
FF - ProfilePath - c:\documents and settings\CKS Andre SNEYAERT\Application Data\Mozilla\Firefox\Profiles\h6n3nsr0.default\
FF - prefs.js: browser.search.defaulturl - hxxp://www.google.com/search?lr=&ie=UTF-8&oe=UTF-8&q=
FF - prefs.js: browser.search.selectedEngine - Google
FF - prefs.js: browser.startup.homepage - hxxp://en-us.start.mozilla.com/firefox?client=firefox-a&rls=org.mozilla:fr:official
.
**************************************************************************
catchme 0.3.1367 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2009-02-27 15:26:18
Windows 5.1.2600 Service Pack 3 NTFS
Recherche de processus cachés ...
Recherche d'éléments en démarrage automatique cachés ...
HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run
user = c:\windows\WinShell..\daemon.exe???????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????
Recherche de fichiers cachés ...
Scan terminé avec succès
Fichiers cachés: 0
**************************************************************************
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"Á³# L\"h'þ9Óœð3rÅWc:\\Program Files\\ISTsvc\\istsvc.exe"="c:\\WINDOWS\\hxyjlul.exe"
.
Heure de fin: 2009-02-27 15:30:10
ComboFix-quarantined-files.txt 2009-02-27 14:30:02
ComboFix2.txt 2009-02-24 17:40:00
ComboFix3.txt 2009-02-24 01:05:33
ComboFix4.txt 2009-02-24 00:24:40
Avant-CF: 153,317,736,448 octets libres
Après-CF: 153,294,225,408 octets libres
680 --- E O F --- 2009-02-25 23:55:14
en voici le Rapport de ComboFix fraichement réinstallé
après plusieures tentatives même en désactivant Zone alarm, au redemarage de la machine ComboFix ne pouvez pas continuer le scan, en le désinstalant j'ai réussie....... super
Pour Outlouk, franchement je ne esais pas exactement quelle version, mais tjrs est il, il marché aujourd'hui !!!! va s'avoir prkoi.......
dois-je reprendre les instructions de ton message n° 87
Je me dépêche de réinstaller Zonealarm
merci à toi
ComboFix 09-02-26.02 - CKS Andre SNEYAERT 2009-02-27 15:23:38.9 - NTFSx86
Microsoft Windows XP Édition familiale 5.1.2600.3.1252.1.1036.18.894.425 [GMT 1:00]
Lancé depuis: c:\documents and settings\CKS Andre SNEYAERT\Bureau\Fixfix.exe
* Un nouveau point de restauration a été créé
.
(((((((((((((((((((((((((((((((((((( Autres suppressions ))))))))))))))))))))))))))))))))))))))))))))))))
.
.
---- Exécution préalable -------
.
c:\docume~1\CKSAND~1\LOCALS~1\Temp\502514
c:\docume~1\CKSAND~1\LOCALS~1\temp\sys2A.tmp
C:\FINE CRUSH LTD.doc
c:\progra~1\SECURI~1\174112\Program\SERVIC~1.EXE
c:\program files\bccd.pif
c:\program files\cacmchc
c:\program files\Fichiers communs\PushWare
c:\program files\Fichiers communs\PushWare\cpush.dll
c:\program files\Fichiers communs\PushWare\cpush0.dll
c:\program files\Fichiers communs\PushWare\Uninst.exe
c:\program files\Fichiers communs\qybabiqylo.dl
c:\program files\Fichiers communs\vexomigaga._sy
c:\program files\Fichiers communs\vodeqet.ban
c:\program files\Internet Explorer\IETimber\IETimber.dll
c:\program files\internet explorer\plugins\icwres.dll
c:\program files\Internet Explorer\PowerJo.ase
c:\program files\Internet Explorer\PowerJv.ask
c:\program files\MediaChannel\Navvy 5.2\NavvyUp.exe
c:\windows\Downloaded Program Files\explorer.exe
c:\windows\fonts\alsk.sys
c:\windows\fonts\naks.sys
c:\windows\Fonts\TIMPIatform.exe
c:\windows\Fonts\wuauclt.exe
c:\windows\Intel\baiduc.dll
c:\windows\KB611311.log
c:\windows\smss.exe
c:\windows\spoolsv.exe
c:\windows\sys.ini
c:\windows\sysinfo.tmp
c:\windows\system\rund1132.exe
c:\windows\system32\16AF66EB.cfg
c:\windows\system32\16AF66EB.dll
c:\windows\system32\16BC0F81.cfg
c:\windows\system32\16BC0F81.dll
c:\windows\system32\1957817A.cfg
c:\windows\system32\1957817A.dll
c:\windows\system32\198FF3D8.cfg
c:\windows\system32\198FF3D8.dll
c:\windows\system32\404Fix.exe
c:\windows\system32\4FBFD5A4.cfg
c:\windows\system32\4FBFD5A4.dll
c:\windows\system32\704C3595.cfg
c:\windows\system32\704C3595.dll
c:\windows\system32\7f7lMNDh.exe
c:\windows\system32\A1A6BC2E.cfg
c:\windows\system32\A1A6BC2E.dll
c:\windows\system32\Agent.OMZ.Fix.exe
c:\windows\system32\akolkhck.dll
c:\windows\system32\aldoiilk.dll
c:\windows\system32\ali125a3.dll
c:\windows\system32\ali13ac2.dll
c:\windows\system32\ali13c19.dll
c:\windows\system32\ali13d52.dll
c:\windows\system32\ali142ff.dll
c:\windows\system32\ali14948.dll
c:\windows\system32\ali709f0.dll
c:\windows\system32\alia056e.dll
c:\windows\system32\alic236.dll
c:\windows\system32\alicfd3.dll
c:\windows\system32\alid09e.dll
c:\windows\system32\alide2b.dll
c:\windows\system32\alief22.dll
c:\windows\system32\alimoto32.exe
c:\windows\system32\ambiojfn.dll
c:\windows\system32\aoalmieo.dll
c:\windows\system32\asdfasdf
c:\windows\system32\B4eocaps.SRG
c:\windows\system32\cbndboek.dll
c:\windows\system32\ccbficfi.dll
c:\windows\system32\cciieood.dll
c:\windows\system32\cdcgebkf.dll
c:\windows\system32\cockgddc.dll
c:\windows\system32\cpnbliif.dll
c:\windows\system32\dafln.dll
c:\windows\system32\dbfkipbd.dll
c:\windows\system32\dfln.dll
c:\windows\system32\dllcache\spoolsv.exe
c:\windows\system32\dpbfhnfj.dll
c:\windows\system32\drivers\52438666.txt
c:\windows\system32\drivers\acpidisk.sys
c:\windows\system32\drivers\ati4twxx.sys
c:\windows\system32\drivers\ati8quxx.sys
c:\windows\system32\drivers\ethcjxre.sys
c:\windows\system32\drivers\npf.sys
c:\windows\system32\drivers\pnpmem.sys
c:\windows\system32\drivers\winyyy.sys
c:\windows\system32\drivers\winyyy.sys
c:\windows\system32\dumphive.exe
c:\windows\system32\ebhpliad.dll
c:\windows\system32\eojpchpn.dll
c:\windows\system32\exlds.ini
c:\windows\system32\F65BDEC7.cfg
c:\windows\system32\F65BDEC7.dll
c:\windows\system32\fasadf.dll
c:\windows\system32\feeckhoj.dll
c:\windows\system32\flzaitian.dll
c:\windows\system32\gajdpnec.dll
c:\windows\system32\gjdochbi.dll
c:\windows\system32\gprmsgse.axz
c:\windows\system32\gscpx32r.det
c:\windows\system32\heifeado.dll
c:\windows\system32\homegdpk.dll
c:\windows\system32\IEDFix.C.exe
c:\windows\system32\IEDFix.exe
c:\windows\system32\ikdapmcm.dll
c:\windows\system32\ipppkhkc.dll
c:\windows\system32\kdexe.exe
c:\windows\system32\kdkdfeln.dll
c:\windows\system32\keepSafe.exe
c:\windows\system32\kffoogac.dll
c:\windows\system32\lkknkgnk.dll
c:\windows\system32\mppblchp.dll
c:\windows\system32\mprmsgse.axz
c:\windows\system32\mscpx32r.det
c:\windows\system32\msexe.exe
c:\windows\system32\MSPolicyAgent.dll
c:\windows\system32\ndaelgfl.dll
c:\windows\system32\nfbdadcc.dll
c:\windows\system32\npptools.dll
c:\windows\system32\o4Patch.exe
c:\windows\system32\odgildpe.dll
c:\windows\system32\ogcmfdaf.dll
c:\windows\system32\ojdnnlnf.dll
c:\windows\system32\ooaddion.dll
c:\windows\system32\oojlpcib.dll
c:\windows\system32\ormsgse.axz
c:\windows\system32\Packet.dll
c:\windows\system32\pahklhok.dll
c:\windows\system32\pfpjhepc.dll
c:\windows\system32\piakdpih.dll
c:\windows\system32\Process.exe
c:\windows\system32\RamrtwC.dll
c:\windows\system32\registryboosterppcg15.exe
c:\windows\system32\romarshal.dat
c:\windows\system32\somspring.dat
c:\windows\system32\SrchSTS.exe
c:\windows\system32\types.tmp
c:\windows\system32\VACFix.exe
c:\windows\system32\VCCLSID.exe
c:\windows\system32\WanPacket.dll
c:\windows\system32\wauafe.exe
c:\windows\system32\waubfe.exe
c:\windows\system32\waukafe.exe
c:\windows\system32\waulafe.exe
c:\windows\system32\waumafe.exe
c:\windows\system32\waunafe.exe
c:\windows\system32\wpcap.dll
c:\windows\system32\WS2Fix.exe
c:\windows\system32\zxexe.exe
c:\windows\Tasks\At1.job
c:\windows\Tasks\At10.job
c:\windows\Tasks\At11.job
c:\windows\Tasks\At12.job
c:\windows\Tasks\At13.job
c:\windows\Tasks\At14.job
c:\windows\Tasks\At15.job
c:\windows\Tasks\At16.job
c:\windows\Tasks\At17.job
c:\windows\Tasks\At18.job
c:\windows\Tasks\At19.job
c:\windows\Tasks\At2.job
c:\windows\Tasks\At20.job
c:\windows\Tasks\At21.job
c:\windows\Tasks\At22.job
c:\windows\Tasks\At23.job
c:\windows\Tasks\At24.job
c:\windows\Tasks\At25.job
c:\windows\Tasks\At26.job
c:\windows\Tasks\At27.job
c:\windows\Tasks\At28.job
c:\windows\Tasks\At29.job
c:\windows\Tasks\At3.job
c:\windows\Tasks\At30.job
c:\windows\Tasks\At31.job
c:\windows\Tasks\At32.job
c:\windows\Tasks\At33.job
c:\windows\Tasks\At34.job
c:\windows\Tasks\At35.job
c:\windows\Tasks\At36.job
c:\windows\Tasks\At37.job
c:\windows\Tasks\At38.job
c:\windows\Tasks\At39.job
c:\windows\Tasks\At4.job
c:\windows\Tasks\At40.job
c:\windows\Tasks\At41.job
c:\windows\Tasks\At42.job
c:\windows\Tasks\At43.job
c:\windows\Tasks\At44.job
c:\windows\Tasks\At45.job
c:\windows\Tasks\At46.job
c:\windows\Tasks\At47.job
c:\windows\Tasks\At48.job
c:\windows\Tasks\At49.job
c:\windows\Tasks\At5.job
c:\windows\Tasks\At50.job
c:\windows\Tasks\At51.job
c:\windows\Tasks\At52.job
c:\windows\Tasks\At53.job
c:\windows\Tasks\At54.job
c:\windows\Tasks\At55.job
c:\windows\Tasks\At56.job
c:\windows\Tasks\At57.job
c:\windows\Tasks\At58.job
c:\windows\Tasks\At59.job
c:\windows\Tasks\At6.job
c:\windows\Tasks\At60.job
c:\windows\Tasks\At61.job
c:\windows\Tasks\At62.job
c:\windows\Tasks\At63.job
c:\windows\Tasks\At64.job
c:\windows\Tasks\At65.job
c:\windows\Tasks\At66.job
c:\windows\Tasks\At67.job
c:\windows\Tasks\At68.job
c:\windows\Tasks\At69.job
c:\windows\Tasks\At7.job
c:\windows\Tasks\At70.job
c:\windows\Tasks\At71.job
c:\windows\Tasks\At72.job
c:\windows\Tasks\At8.job
c:\windows\Tasks\At9.job
c:\windows\Temp\20090122.exe
c:\windows\Temp\Perflib_Perfdata_b4.dat
c:\windows\tmp.dat
c:\windows\WinShell.\daemon.exe
c:\windows\winsscoo.exe
c:\windows\winsys.exe
C:\WINDOWSupdate.dll
.
((((((((((((((((((((((((((((((((((((((( Pilotes/Services )))))))))))))))))))))))))))))))))))))))))))))))))
.
-------\Legacy_ACPIDISK
-------\Legacy_NPF
-------\Legacy_ZG
-------\Service_acpidisk
-------\Service_aliimz
-------\Service_npf
-------\Legacy_ACPIDISK
-------\Legacy_NPF
-------\Legacy_PNPMEM
-------\Legacy_WINSSCOM
-------\Legacy_ZG
-------\Service_acpidisk
-------\Service_aliimz
-------\Service_npf
-------\Service_pnpmem
-------\Service_WinSSCOM
-------\Legacy_ACPIDISK
-------\Legacy_NPF
-------\Legacy_PNPMEM
-------\Legacy_WINSSCOM
-------\Service_acpidisk
-------\Service_aliimz
-------\Service_npf
-------\Service_pnpmem
-------\Service_WinSSCOM
-------\Legacy_ACPIDISK
-------\Legacy_NPF
-------\Legacy_PNPMEM
-------\Legacy_WINSSCOM
-------\Legacy_ZG
-------\Service_aliimz
-------\Service_npf
-------\Service_pnpmem
-------\Service_WinSSCOM
((((((((((((((((((((((((((((( Fichiers créés du 2009-01-27 au 2009-02-27 ))))))))))))))))))))))))))))))))))))
.
2009-02-26 18:41 . 2009-02-26 18:41 21,248 --a------ c:\windows\winyyy.sys
2009-02-26 12:08 . 2009-02-26 16:38 249,344 --a------ c:\windows\smss.exe.vzr
2009-02-26 11:43 . 2009-02-26 11:43 40 --a------ c:\windows\tmp.dat
2009-02-26 11:43 . 2009-02-26 11:43 37 --a------ c:\windows\sys.ini
2009-02-25 23:29 . 2009-02-27 15:01 1,113 --a------ C:\rollback.ini
2009-02-25 20:49 . 2009-02-04 07:59 122,372 --a------ c:\windows\system32\drivers\pnpmem.sys
2009-02-25 20:49 . 2009-02-25 20:49 32 --a------ c:\windows\system32\ormsgse.axz
2009-02-25 20:26 . 2009-02-25 20:26 <REP> d-------- c:\program files\SonicWallES
2009-02-25 20:10 . 2009-02-25 20:10 133,120 --a------ c:\windows\winsscoo.exe.vzr
2009-02-25 20:08 . 2009-02-26 19:06 13,976 --a------ c:\windows\system32\1957817A.dll.vzr
2009-02-25 20:08 . 2009-02-25 20:08 300 --ahs---- c:\windows\system32\1957817A.cfg
2009-02-25 20:07 . 2009-02-25 20:07 14,962 --a------ c:\windows\system32\704C3595.dll.vzr
2009-02-25 20:07 . 2009-02-25 20:07 224 --ahs---- c:\windows\system32\704C3595.cfg
2009-02-25 20:06 . 2009-02-25 20:06 219,272 --a------ c:\windows\system32\4FBFD5A4.dll.vzr
2009-02-25 20:05 . 2009-02-25 20:05 14,460 --a------ c:\windows\system32\16BC0F81.dll.vzr
2009-02-25 20:05 . 2009-02-25 20:05 244 --ahs---- c:\windows\system32\16BC0F81.cfg
2009-02-25 20:02 . 2009-02-25 20:02 218,746 --a------ c:\windows\system32\16AF66EB.dll.vzr
2009-02-25 20:02 . 2009-02-25 20:02 13,462 --a------ c:\windows\system32\F65BDEC7.dll.vzr
2009-02-25 20:00 . 2009-02-25 20:00 16,632 --a------ c:\windows\system32\msexe.exe
2009-02-25 20:00 . 2009-02-26 11:27 1,249 --a------ c:\windows\system32\asdfasdf
2009-02-25 19:19 . 2009-02-26 00:38 141 --a------ c:\windows\system32\exlds.ini
2009-02-25 19:09 . 2009-02-25 19:26 <REP> d-------- C:\Combo-Fix
2009-02-25 18:43 . 2009-02-25 18:43 89,726 --a------ c:\windows\guid.exe
2009-02-25 17:25 . 2009-02-25 17:25 13,926 --ahs---- c:\windows\system32\72B29486.dll
2009-02-25 17:25 . 2009-02-25 17:25 200 --ahs---- c:\windows\system32\72B29486.cfg
2009-02-25 14:04 . 2009-02-27 15:26 35,022,944 --ahs---- c:\windows\system32\drivers\fidbox.dat
2009-02-25 14:04 . 2009-02-26 23:04 433,508 --ahs---- c:\windows\system32\drivers\fidbox.idx
2009-02-25 13:58 . 2009-02-27 15:19 <REP> d-------- c:\windows\system32\ZoneLabs
2009-02-25 13:58 . 2009-02-25 13:58 <REP> d-------- c:\program files\Zone Labs
2009-02-25 13:58 . 2009-02-25 14:01 4,212 --ah----- c:\windows\system32\zllictbl.dat
2009-02-25 13:56 . 2009-02-27 15:19 <REP> d-------- c:\windows\Internet Logs
2009-02-24 19:17 . 2009-02-26 19:06 2,681 --a------ c:\windows\winsys.inf
2009-02-24 18:55 . 2009-02-24 18:55 1,811 --a------ c:\windows\ACROREAD.INI
2009-02-23 16:50 . 2004-08-05 13:00 4,224 --a------ c:\windows\system32\drivers\beep.sys
2009-02-23 16:50 . 2004-08-05 13:00 4,224 --a--c--- c:\windows\system32\dllcache\beep.sys
2009-02-21 00:01 . 2009-02-11 10:19 15,504 --a------ c:\windows\system32\drivers\mbam.sys
2009-02-21 00:00 . 2009-02-21 00:01 <REP> d-------- c:\program files\Malwarebytes' Anti-Malware
2009-02-21 00:00 . 2009-02-11 10:19 38,496 --a------ c:\windows\system32\drivers\mbamswissarmy.sys
2009-02-20 23:13 . 2009-02-20 23:13 396,288 --a------ c:\windows\HijackThis.exe
2009-02-20 22:23 . 2009-02-20 23:00 <REP> d-------- C:\ToolBar SD
2009-02-20 21:43 . 2009-02-20 21:43 16,656 --a------ C:\mbam-log-2009-02-20 (21-42-58)VIRUS
2009-02-20 19:50 . 2009-02-20 19:50 15,069 --a------ c:\windows\system32\telechargement-159-hijackthis.htm
2009-02-20 19:04 . 2009-02-20 19:04 <REP> d-------- c:\program files\MediaChannel
2009-02-20 16:08 . 2009-02-20 16:08 <REP> d-------- c:\documents and settings\CKS Andre SNEYAERT\Application Data\Malwarebytes
2009-02-20 16:08 . 2009-02-20 16:08 <REP> d-------- c:\documents and settings\All Users\Application Data\Malwarebytes
2009-02-20 13:11 . 2003-03-18 21:20 1,060,864 --a------ c:\windows\system32\mfc71.dll
2009-02-20 13:01 . 2009-02-20 13:01 520,052 --a------ c:\windows\system32\mfc71.7z
2009-02-20 12:55 . 2009-02-20 13:00 <REP> d-------- c:\windows\system32\mfc71
2009-02-20 12:01 . 2009-02-20 12:02 514,940 -rah----- c:\windows\system32\mfc71.zip
2009-02-20 11:31 . 2009-02-20 11:31 <REP> d-------- c:\documents and settings\CKS Andre SNEYAERT\Application Data\Uniblue
2009-02-19 18:50 . <REP> c:\windows\$WIND$
2009-02-19 18:45 . 2009-02-20 22:16 <REP> d-------- c:\program files\Goto Software
2009-02-19 18:45 . 2009-02-20 22:16 <REP> d-------- c:\program files\Fichiers communs\Goto Software
2009-02-19 18:45 . 2009-02-19 18:45 <REP> d-------- c:\documents and settings\CKS Andre SNEYAERT\Application Data\VadeRetro
2009-02-19 18:45 . 2009-02-20 22:16 <REP> d-------- c:\documents and settings\All Users\Application Data\VadeRetro
2009-02-19 16:43 . <REP> c:\windows\WinShell
2009-02-18 19:42 . 2009-02-18 19:42 31,232 --a------ C:\Relevé de compte LAW YAT au 31.12.2008.doc
2009-02-17 14:47 . 2009-02-26 22:29 <REP> d-------- c:\windows\Intel
2009-02-17 14:45 . 2008-04-14 03:33 19,968 --a--c--- c:\windows\system32\dllcache\linkinfo.dll
2009-02-16 07:42 . 2009-02-16 07:42 69,888 --a------ c:\windows\battc.sys
2009-02-07 23:10 . 2009-02-07 23:10 170,496 --a------ C:\FINE CRUSH LTD.doc
2009-02-02 21:59 . 2009-02-02 21:59 66,048 --a------ C:\Proposition APOLLO pour Ile MAURICE.doc
2009-02-02 17:57 . 2009-02-02 17:57 48,640 --a------ C:\Clients Ile MAURICE.doc
2009-02-02 12:23 . 2009-02-05 11:49 25,088 --a------ C:\A T T E S T A T I O N Impotsssssssssss.doc
2009-02-02 10:47 . 2009-02-02 10:47 30,720 --a------ C:\A T T E S T A T I O N - I m p o t s.doc
2009-01-31 13:51 . 2009-01-31 20:37 26,624 --a------ C:\Demande prolongation stage.doc
2009-01-27 10:10 . 2009-01-27 11:00 32,256 --a------ C:\Courrier André SNEYAERT.doc
.
(((((((((((((((((((((((((((((((((( Compte-rendu de Find3M ))))))))))))))))))))))))))))))))))))))))))))))))
.
2009-02-27 14:13 --------- d-----w c:\program files\Wanadoo
2009-02-26 22:06 --------- d-----w c:\documents and settings\CKS Andre SNEYAERT\Application Data\Skype
2009-02-26 18:36 --------- d-----w c:\documents and settings\All Users\Application Data\Google Updater
2009-02-26 10:44 --------- d-----w c:\program files\FenAffiche
2009-02-25 17:50 --------- d-----w c:\program files\Common
2009-02-25 17:40 24,576 ----a-w c:\windows\TEMPIadHide3.dll
2009-02-25 17:06 49,152 ----a-w c:\windows\system32\npptools.dll.tmp
2009-02-23 22:43 431,922 ----a-w c:\program files\HJTInstall.7z
2009-02-18 18:10 --------- d-----w c:\program files\Google
2009-01-23 20:21 --------- d-----w c:\documents and settings\All Users\Application Data\288537758
2009-01-21 19:07 --------- d-----w c:\program files\EnveloppesEditor1.09
2009-01-21 16:56 --------- d-----w c:\documents and settings\CKS Andre SNEYAERT\Application Data\PC-FAX TX
2009-01-17 14:02 14,336 ----a-w c:\windows\system32\svchost.exe
2009-01-16 17:15 137,664 ----a-w c:\windows\system32\zdcndis5.sys
2009-01-16 17:15 137,664 ----a-w c:\windows\system32\pcandis5.sys
2009-01-16 17:15 137,664 ----a-w c:\windows\system32\drivers\adiusbaw.sys
2008-12-20 22:47 826,368 ----a-w c:\windows\system32\wininet.dll
2008-12-20 10:50 410,984 ----a-w c:\windows\system32\deploytk.dll
2008-09-22 09:52 85,504 ----a-w c:\documents and settings\CKS Andre SNEYAERT\Application Data\GDIPFONTCACHEV1.DAT
2008-09-04 14:43 1,940 ----a-w c:\documents and settings\CKS Andre SNEYAERT\Application Data\ViewerApp.dat
2008-09-27 10:02 122,880 ----a-w c:\program files\mozilla firefox\components\GoogleDesktopMozilla.dll
.
((((((((((((((((((((((((((((( SnapShot_2009-02-26_23.16.44.98 )))))))))))))))))))))))))))))))))))))))))
.
+ 2009-02-27 07:48:31 16,384 ----atw c:\windows\Temp\Perflib_Perfdata_204.dat
.
-- Instantané actualisé --
.
((((((((((((((((((((((((((((((((( Points de chargement Reg ))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* les éléments vides & les éléments initiaux légitimes ne sont pas listés
REGEDIT4
[HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{912F6837-CCB6-424B-BC9C-8BB5541AFB54}]
c:\program files\Internet Explorer\PowerJv.ask [BU]
[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"CTFMON.EXE"="c:\windows\system32\ctfmon.exe" [2008-04-14 15360]
"WOOKIT"="c:\progra~1\Wanadoo\Shell.exe" [2004-08-23 122880]
"Livecom"="c:\progra~1\Livecom\APPLIC~1\CommunicationAgent\CommunicationAgent.exe" [2006-02-23 237568]
"Skype"="c:\program files\Skype\Phone\Skype.exe" [2007-02-09 25388584]
"swg"="c:\program files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe" [2007-07-01 68856]
"MoneyAgent"="c:\program files\Microsoft Money\System\mnyexpr.exe" [2002-07-17 204863]
"WMPNSCFG"="c:\program files\Windows Media Player\WMPNSCFG.exe" [2006-11-03 204288]
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"fenaffiche"="c:\program files\FenAffiche\FenUnika.exe" [BU]
"NeroFilterCheck"="c:\windows\system32\NeroCheck.exe" [2001-07-09 155648]
"Microsoft Works Update Detection"="c:\program files\Fichiers communs\Microsoft Shared\Works Shared\WkUFind.exe" [2002-07-18 28672]
"WOOWATCH"="c:\progra~1\Wanadoo\Watch.exe" [2004-08-23 20480]
"WOOTASKBARICON"="c:\progra~1\Wanadoo\GestMaj.exe" [2004-10-14 32768]
"SunJavaUpdateSched"="c:\program files\Java\jre6\bin\jusched.exe" [2008-12-20 136600]
"Creative WebCam Tray"="c:\program files\Creative\Shared Files\CAMTRAY.EXE" [2003-10-13 184320]
"Google Desktop Search"="c:\program files\Google\Google Desktop Search\GoogleDesktop.exe" [2008-09-27 29744]
"QuickTime Task"="c:\program files\QuickTime\qttask.exe" [2006-09-01 282624]
"Adobe Reader Speed Launcher"="c:\program files\Adobe\Reader 8.0\Reader\Reader_sl.exe" [2007-10-10 39792]
"SSBkgdUpdate"="c:\program files\Fichiers communs\Scansoft Shared\SSBkgdUpdate\SSBkgdupdate.exe" [2006-10-25 210472]
"PaperPort PTD"="c:\program files\ScanSoft\PaperPort\pptd40nt.exe" [2007-01-29 30248]
"IndexSearch"="c:\program files\ScanSoft\PaperPort\IndexSearch.exe" [2007-01-29 46632]
"PPort11reminder"="c:\program files\ScanSoft\PaperPort\Ereg\Ereg.exe" [2007-02-01 255528]
"BrMfcWnd"="c:\program files\Brother\Brmfcmon\BrMfcWnd.exe" [2007-03-23 663552]
"ControlCenter3"="c:\program files\Brother\ControlCenter3\brctrcen.exe" [2007-01-26 65536]
"msexe.exe"="c:\windows\system32\msexe.exe" [2009-02-25 16632]
"zxexe.exe"="c:\windows\system32\zxexe.exe" [BU]
"SiSPower"="SiSPower.dll" [2005-04-12 c:\windows\system32\SiSPower.dll]
"SoundMan"="SOUNDMAN.EXE" [2005-03-24 c:\windows\SOUNDMAN.EXE]
[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run]
"CTFMON.EXE"="c:\windows\system32\ctfmon.exe" [2008-04-14 15360]
"Picasa Media Detector"="c:\program files\Picasa2\PicasaMediaDetector.exe" [2008-08-21 443968]
"msnmsgr"="c:\program files\Windows Live\Messenger\msnmsgr.exe" [2007-10-18 5724184]
[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\RunOnce]
"FlashPlayerUpdate"="c:\windows\system32\Macromed\Flash\FlashUtil9d.exe" [2007-06-11 190696]
[HKEY_LOCAL_MACHINE\software\microsoft\windows\Currentversion\policies\explorer\Run]
"stup"="c:\docume~1\CKSAND~1\LOCALS~1\Temp\3010780" [X]
"user"="c:\windows\WinShell..\daemon.exe" [BU]
"360safe"="c:\windows\Fonts\wuauclt.exe" [BU]
c:\documents and settings\CKS Andre SNEYAERT\Menu D‚marrer\Programmes\D‚marrage\
Outil de d‚tection de support Picture Motion Browser.lnk - c:\program files\Sony\Sony Picture Utility\PMBCore\SPUVolumeWatcher.exe [2008-07-19 385024]
c:\documents and settings\All Users\Menu D‚marrer\Programmes\D‚marrage\
Microsoft Office.lnk - c:\program files\Microsoft Office\Office10\OSA.EXE [2001-02-13 83360]
Picture Package Menu.lnk - c:\program files\Sony Corporation\Picture Package\Picture Package Menu\SonyTray.exe [2006-04-28 151552]
Picture Package VCD Maker.lnk - c:\program files\Sony Corporation\Picture Package\Picture Package Applications\Residence.exe [2006-04-28 106496]
Utilitaire r‚seau pour SAGEM Wi-Fi 11g USB adapter.lnk - c:\program files\SAGEM Wi-Fi USB 802.11g\WLANUTL.exe [2007-04-20 835584]
[HKEY_CURRENT_USER\software\microsoft\windows\currentversion\policies\explorer]
"ForceClassicControlPanel"= 1 (0x1)
[hkey_local_machine\software\microsoft\windows\currentversion\explorer\ShellExecuteHooks]
"{8D025D9E-A5AC-49DB-968D-1F2A3C030840}"= "c:\windows\system32\odgildpe.dll" [BU]
"{EB1952AD-75E8-4E4E-B626-2C415DA35709}"= "c:\windows\system32\ebhpliad.dll" [BU]
"{186E0D94-F863-43EF-9B43-38DAC43C064B}"= "c:\windows\system32\homegdpk.dll" [BU]
"{C8C40DDC-9B46-4266-BA0B-5AF248442C3B}"= "c:\windows\system32\cockgddc.dll" [BU]
"{83D7757F-4582-4300-9F03-C3D1A544A9D0}"= "c:\windows\system32\ojdnnlnf.dll" [BU]
"{A6B283F7-EAC4-4110-ACAA-A2D0B85466B7}"= "c:\windows\system32\ambiojfn.dll" [BU]
"{16BC0F81-410C-41DF-A902-1B04368BA8AE}"= "16BC0F81.dll" [BU]
"{704C3595-DB85-40F6-A601-8D6F346907BD}"= "704C3595.dll" [BU]
"{72B29486-39B6-4241-B234-B57DEF78302F}"= "72B29486.dll" [BU]
"{1957817A-94B2-4CAC-B113-A331809B5730}"= "1957817A.dll" [BU]
"{B3DDF3DF-0A05-4BE9-B37D-7021BD501C7A}"= "c:\windows\system32\bjddfjdf.dll" [BU]
"{A9386267-1CF0-48EC-9DBA-412A44C76334}"= "c:\windows\system32\apjomimn.dll" [BU]
"{9B8978FE-5B0E-476D-8F15-3FB5119A42F3}"= "c:\windows\system32\pbopnofe.dll" [BU]
"{FE494031-756B-4865-99B4-4DE92DDCF609}"= "c:\windows\system32\fekpkgjh.dll" [BU]
"{46184B86-19FF-4A37-9167-4C538027CEBC}"= "c:\windows\system32\kmhokbom.dll" [BU]
"{AC9A4670-B0B6-4EC7-B6A5-B29FA3530420}"= "c:\windows\system32\acpakmng.dll" [BU]
"{9B3DC09A-2613-4613-96F8-F8E305BFF825}"= "c:\windows\system32\pbjdcgpa.dll" [BU]
"{C13945CA-D00B-4474-B105-3838809607EA}"= "c:\windows\system32\chjpklca.dll" [BU]
"{1BFB618F-82C7-45DE-A0B9-F76FACE92F32}"= "c:\windows\system32\hbfbmhof.dll" [2008-08-14 32256]
"{22EC45F3-1651-409E-8273-6D80E39B4549}"= "c:\windows\system32\iiecklfj.dll" [BU]
"{391597A0-67FF-4D4F-9AFF-8471E5D0D3C9}"= "c:\windows\system32\jphlpnag.dll" [BU]
"{BA9620A6-68E8-492D-9B28-7B7416F69673}"= "c:\windows\system32\bapmigam.dll" [BU]
"{04D3233B-EC1F-44B3-BBE4-9D76438EEC1E}"= "c:\windows\system32\gkdjijjb.dll" [BU]
"{51E74159-54A6-4355-A78F-55998328FC07}"= "c:\windows\system32\lhenkhlp.dll" [BU]
"{912F6837-CCB6-424B-BC9C-8BB5541AFB54}"= "c:\program files\Internet Explorer\PowerJv.ask" [BU]
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad]
"B3DDF3DF"= {B3DDF3DF-0A05-4BE9-B37D-7021BD501C7A} - c:\windows\system32\bjddfjdf.dll [BU]
"A9386267"= {A9386267-1CF0-48EC-9DBA-412A44C76334} - c:\windows\system32\apjomimn.dll [BU]
"9B8978FE"= {9B8978FE-5B0E-476D-8F15-3FB5119A42F3} - c:\windows\system32\pbopnofe.dll [BU]
"FE494031"= {FE494031-756B-4865-99B4-4DE92DDCF609} - c:\windows\system32\fekpkgjh.dll [BU]
"46184B86"= {46184B86-19FF-4A37-9167-4C538027CEBC} - c:\windows\system32\kmhokbom.dll [BU]
"AC9A4670"= {AC9A4670-B0B6-4EC7-B6A5-B29FA3530420} - c:\windows\system32\acpakmng.dll [BU]
"9B3DC09A"= {9B3DC09A-2613-4613-96F8-F8E305BFF825} - c:\windows\system32\pbjdcgpa.dll [BU]
"C13945CA"= {C13945CA-D00B-4474-B105-3838809607EA} - c:\windows\system32\chjpklca.dll [BU]
"1BFB618F"= {1BFB618F-82C7-45DE-A0B9-F76FACE92F32} - c:\windows\system32\hbfbmhof.dll [2008-08-14 32256]
"22EC45F3"= {22EC45F3-1651-409E-8273-6D80E39B4549} - c:\windows\system32\iiecklfj.dll [BU]
"391597A0"= {391597A0-67FF-4D4F-9AFF-8471E5D0D3C9} - c:\windows\system32\jphlpnag.dll [BU]
"BA9620A6"= {BA9620A6-68E8-492D-9B28-7B7416F69673} - c:\windows\system32\bapmigam.dll [BU]
"04D3233B"= {04D3233B-EC1F-44B3-BBE4-9D76438EEC1E} - c:\windows\system32\gkdjijjb.dll [BU]
"51E74159"= {51E74159-54A6-4355-A78F-55998328FC07} - c:\windows\system32\lhenkhlp.dll [BU]
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\windows]
"AppInit_DLLs"=hbfbmhof.dll
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\360rpt.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\360safe.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\360safebox.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\360tray.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\a.exe]
"Debugger"=c:\windows\system32\keepSafe.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\ANTIARP.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\ArSwp.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\Ast.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\AutoRun.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\AutoRunKiller.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\AvMonitor.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\AVP.COM]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\AVP.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\CCenter.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\Frameworkservice.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\GFUpd.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\GuardField.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\HijackThis.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\IceSword.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\Iparmor.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\KASARP.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\kav32.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\KAVPFW.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\kavstart.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\kissvc.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\kmailmon.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\KPfwSvc.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\KRegEx.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\KVMonxp.KXP]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\KVSrvXP.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\KVWSC.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\kwatch.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\Mmsk.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\Navapsvc.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\nod32krn.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\Nod32kui.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\PFW.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\QQDoctor.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\RAV.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\RavMon.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\RavMonD.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\Ravservice.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\RavStub.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\RavTask.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\RAVTRAY.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\Regedit.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\rfwmain.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\rfwProxy.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\rfwsrv.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\Rfwstub.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\RsAgent.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\Rsaupd.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\RsMain.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\rsnetsvr.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\RSTray.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\Runiep.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\safeboxTray.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\ScanFrm.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\SREngLdr.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\TrojanDetector.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\Trojanwall.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\TrojDie.KXP]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\VPC32.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\VPTRAY.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\WOPTILITIES.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe
[HKEY_LOCAL_MACHINE\software\microsoft\security center]
"AntiVirusDisableNotify"=dword:00000001
"UpdatesDisableNotify"=dword:00000001
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%windir%\\system32\\sessmgr.exe"=
"c:\\Program Files\\Messenger\\msmsgs.exe"=
"c:\\Program Files\\eMule\\emule.exe"=
"c:\\Program Files\\Livecom\\Application\\eConfv4\\livecomp.exe"=
"c:\\PROGRA~1\\Livecom\\APPLIC~1\\Exe\\Livecom.exe"=
"%windir%\\Network Diagnostic\\xpnetdiag.exe"=
"c:\\Program Files\\Windows Live\\Messenger\\msnmsgr.exe"=
"c:\\Program Files\\Windows Live\\Messenger\\livecall.exe"=
"c:\\Program Files\\Skype\\Phone\\Skype.exe"=
"c:\\Program Files\\Shareaza\\Shareaza.exe"=
R0 rnieys;rnieys;c:\windows\system32\drivers\jme.sys [2005-08-08 30368]
S2 MSPolicyAgent;Microsoft IPsec Policy Agent;c:\windows\System32\svchost.exe -k MSPolicyAgent [2008-04-14 14336]
S3 GoogleDesktopManager-061008-081103;Google Desktop Manager 5.7.806.10245;c:\program files\Google\Google Desktop Search\GoogleDesktop.exe [2007-11-21 29744]
S3 myprotector;myprotector;c:\windows\battc.sys [2009-02-16 69888]
S3 P1120VID;Creative WebCam NX Ultra;c:\windows\system32\drivers\P1120Vid.sys [2006-02-01 1252474]
S3 PsShutdownSvc;PsShutdown;c:\windows\system32\PSSDNSVC.EXE [2005-08-22 65536]
S3 SG760_XP;SAGEM 802.11g XG760 1211 Driver;c:\windows\system32\drivers\WlanUZXP.sys [2007-04-20 260608]
S3 UPDATEDATA;UPDATEDATA;c:\windows\system32\drivers\acpiec.sys [2001-08-23 12032]
S3 ZDCndis5;ZDCndis5 Protocol Driver;c:\windows\system32\zdcndis5.sys [2009-01-16 137664]
--- Autres Services/Pilotes en mémoire ---
*NewlyCreated* - ZDPNDIS5
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\svchost]
MSPolicyAgent REG_MULTI_SZ MSPolicyAgent
[HKEY_CURRENT_USER\software\microsoft\windows\currentversion\explorer\mountpoints2\{c984ab7c-e6f0-11dd-8d9e-00142a50775a}]
\shell\explore\command - E:\CC.PIF
\shell\open\Command - E:\CC.PIF
.
Contenu du dossier 'Tâches planifiées'
2009-02-23 c:\windows\Tasks\AppleSoftwareUpdate.job
- c:\program files\Apple Software Update\SoftwareUpdate.exe [2006-08-29 14:21]
2009-02-27 c:\windows\Tasks\Google Software Updater.job
- c:\program files\Google\Common\Google Updater\GoogleUpdaterService.exe [2009-02-23 15:32]
2009-02-27 c:\windows\Tasks\Vérifier les mises à jour de Windows Live Toolbar.job
- c:\program files\Windows Live Toolbar\MSNTBUP.EXE [2007-10-19 11:20]
.
- - - - ORPHELINS SUPPRIMES - - - -
HKLM-Run-Á³# Lh'þ9Óœð3rÅWc:\program files\ISTsvc\istsvc.exe - c:\windows\hxyjlul.exe
.
------- Examen supplémentaire -------
.
uSearchMigratedDefaultURL = hxxp://www.google.com/search?q={searchTerms}&sourceid=ie7&rls=com.microsoft:en-US&ie=utf8&oe=utf8
uStart Page = www.6700.cn?tn=1027251
mStart Page = hxxp://www.google.com
uSearchURL,(Default) = hxxp://g.msn.fr/0SEFRFR/SAOS01?FORM=TOOLBR
IE: &Windows Live Search - c:\program files\Windows Live Toolbar\msntb.dll/search.htm
IE: Add to Windows &Live Favorites - https://onedrive.live.com/?id=favorites
FF - ProfilePath - c:\documents and settings\CKS Andre SNEYAERT\Application Data\Mozilla\Firefox\Profiles\h6n3nsr0.default\
FF - prefs.js: browser.search.defaulturl - hxxp://www.google.com/search?lr=&ie=UTF-8&oe=UTF-8&q=
FF - prefs.js: browser.search.selectedEngine - Google
FF - prefs.js: browser.startup.homepage - hxxp://en-us.start.mozilla.com/firefox?client=firefox-a&rls=org.mozilla:fr:official
.
**************************************************************************
catchme 0.3.1367 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2009-02-27 15:26:18
Windows 5.1.2600 Service Pack 3 NTFS
Recherche de processus cachés ...
Recherche d'éléments en démarrage automatique cachés ...
HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run
user = c:\windows\WinShell..\daemon.exe???????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????
Recherche de fichiers cachés ...
Scan terminé avec succès
Fichiers cachés: 0
**************************************************************************
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"Á³# L\"h'þ9Óœð3rÅWc:\\Program Files\\ISTsvc\\istsvc.exe"="c:\\WINDOWS\\hxyjlul.exe"
.
Heure de fin: 2009-02-27 15:30:10
ComboFix-quarantined-files.txt 2009-02-27 14:30:02
ComboFix2.txt 2009-02-24 17:40:00
ComboFix3.txt 2009-02-24 01:05:33
ComboFix4.txt 2009-02-24 00:24:40
Avant-CF: 153,317,736,448 octets libres
Après-CF: 153,294,225,408 octets libres
680 --- E O F --- 2009-02-25 23:55:14
Précédent
- 1
- 2
- 3
- 4
- 5
- 6
- 7
Suivant