Navigation qui se bloque au bout de 10minutes
Fermé
lou467
-
8 mars 2009 à 19:12
jlpjlp Messages postés 51580 Date d'inscription vendredi 18 mai 2007 Statut Contributeur sécurité Dernière intervention 3 mai 2022 - 13 mars 2009 à 14:04
jlpjlp Messages postés 51580 Date d'inscription vendredi 18 mai 2007 Statut Contributeur sécurité Dernière intervention 3 mai 2022 - 13 mars 2009 à 14:04
A voir également:
- Navigation qui se bloque au bout de 10minutes
- Code puk bloqué - Guide
- Navigation privée - Guide
- Pavé tactile bloqué - Guide
- Compte gmail bloqué - Guide
- Effacer les données de navigation - Guide
15 réponses
jlpjlp
Messages postés
51580
Date d'inscription
vendredi 18 mai 2007
Statut
Contributeur sécurité
Dernière intervention
3 mai 2022
5 040
8 mars 2009 à 19:24
8 mars 2009 à 19:24
slt
Télécharge ici :
http://images.malwareremoval.com/random/RSIT.exe
random's system information tool (RSIT) par andom/random et sauvegarde-le sur le Bureau.
Double-clique sur RSIT.exe afin de lancer RSIT.
Clique Continue à l'écran Disclaimer.
Si l'outil HijackThis (version à jour) n'est pas présent ou non détecté sur l'ordinateur, RSIT le téléchargera (autorise l'accès dans ton pare-feu, si demandé) et tu devras accepter la licence.
Lorsque l'analyse sera terminée, deux fichiers texte s'ouvriront.
Poste le contenu de log.txt (<<qui sera affiché)
ainsi que de info.txt (<<qui sera réduit dans la Barre des Tâches).
NB : Les rapports sont sauvegardés dans le dossier C:\rsit
Télécharge ici :
http://images.malwareremoval.com/random/RSIT.exe
random's system information tool (RSIT) par andom/random et sauvegarde-le sur le Bureau.
Double-clique sur RSIT.exe afin de lancer RSIT.
Clique Continue à l'écran Disclaimer.
Si l'outil HijackThis (version à jour) n'est pas présent ou non détecté sur l'ordinateur, RSIT le téléchargera (autorise l'accès dans ton pare-feu, si demandé) et tu devras accepter la licence.
Lorsque l'analyse sera terminée, deux fichiers texte s'ouvriront.
Poste le contenu de log.txt (<<qui sera affiché)
ainsi que de info.txt (<<qui sera réduit dans la Barre des Tâches).
NB : Les rapports sont sauvegardés dans le dossier C:\rsit
Voilà c'est fait donc voici le premier log:
Logfile of random's system information tool 1.05 (written by random/random)
Run by Baudry Ludmilla at 2009-03-08 21:43:14
Microsoft Windows XP Édition familiale Service Pack 3
System drive C: has 35 GB (30%) free of 116 GB
Total RAM: 958 MB (48% free)
Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 21:43:21, on 08/03/2009
Platform: Windows XP SP3 (WinNT 5.01.2600)
MSIE: Internet Explorer v7.00 (7.00.6000.16762)
Boot mode: Normal
Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\Acer\Acer eConsole\MediaServerService.exe
C:\WINDOWS\Explorer.EXE
C:\Acer\Empowering Technology\ePerformance\MemCheck.exe
C:\WINDOWS\VM_STI.EXE
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\Windows Live\Messenger\msnmsgr.exe
C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe
C:\Program Files\Acer TV-FM\Kernel\TV\CLCapSvc.exe
C:\Program Files\Acer TV-FM\Kernel\CLML_NTService\CLMLServer.exe
C:\Acer\Empowering Technology\Acer.Empowering.Framework.Launcher.exe
C:\WINDOWS\system32\nvsvc32.exe
C:\Program Files\Microsoft\Search Enhancement Pack\SeaPort\SeaPort.exe
C:\Program Files\Acer WLAN 11g USB Dongle\ZDWlan.exe
C:\WINDOWS\system32\svchost.exe
C:\Program Files\3M\PSNLite\PsnLite.exe
C:\PROGRA~1\3M\PSNLite\PSNGive.exe
C:\Program Files\Acer TV-FM\Kernel\TV\CLSched.exe
C:\WINDOWS\system32\wbem\wmiapsrv.exe
C:\Program Files\Windows Live\Contacts\wlcomm.exe
C:\WINDOWS\system32\wuauclt.exe
C:\PROGRA~1\MOZILL~1\FIREFOX.EXE
C:\Documents and Settings\Baudry Ludmilla\Bureau\RSIT.exe
C:\Documents and Settings\Baudry Ludmilla\Bureau\Baudry Ludmilla.exe
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Bar = https://www.bing.com/?cc=fr&toHttps=1&redig=55729C844D6A45819CAD368B3E178C9F
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = https://www.google.fr/?gws_rd=ssl
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = https://www.msn.com/fr-fr/?ocid=iehp
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = https://www.bing.com/?toHttps=1&redig=5FC791212101479BAFBE1A679848B1AF
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = https://www.msn.com/fr-fr/?ocid=iehp
R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName = Liens
O2 - BHO: AcroIEHelperStub - {18DF081C-E8AD-4283-A596-FA578C2EBDC3} - C:\Program Files\Fichiers communs\Adobe\Acrobat\ActiveX\AcroIEHelperShim.dll
O2 - BHO: Spybot-S&D IE Protection - {53707962-6F74-2D53-2644-206D7942484F} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O2 - BHO: (no name) - {5C255C8A-E604-49b4-9D64-90988571CECB} - (no file)
O2 - BHO: EoRezoBHO - {64F56FC1-1272-44CD-BA6E-39723696E350} - C:\Program Files\eoRezo\EoAdv\EoRezoBHO.dll (file missing)
O2 - BHO: Search Helper - {6EBF7485-159F-4bff-A14F-B9E3AAC4465B} - C:\Program Files\Microsoft\Search Enhancement Pack\Search Helper\SearchHelper.dll
O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre1.6.0_07\bin\ssv.dll
O2 - BHO: Programme d'aide de l'Assistant de connexion Windows Live - {9030D464-4C02-4ABF-8ECC-5164760863C6} - C:\Program Files\Fichiers communs\Microsoft Shared\Windows Live\WindowsLiveLogin.dll
O2 - BHO: Windows Live Toolbar Helper - {E15A8DC0-8516-42A1-81EA-DC94EC1ACF10} - C:\Program Files\Windows Live\Toolbar\wltcore.dll
O2 - BHO: EpsonToolBandKicker Class - {E99421FB-68DD-40F0-B4AC-B7027CAE2F1A} - C:\Program Files\EPSON\EPSON Web-To-Page\EPSON Web-To-Page.dll
O3 - Toolbar: EPSON Web-To-Page - {EE5D279F-081B-4404-994D-C6B60AAEBA6D} - C:\Program Files\EPSON\EPSON Web-To-Page\EPSON Web-To-Page.dll
O3 - Toolbar: &Windows Live Toolbar - {21FA44EF-376D-4D53-9B0F-8A89D3229068} - C:\Program Files\Windows Live\Toolbar\wltcore.dll
O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE C:\WINDOWS\system32\NvCpl.dll,NvStartup
O4 - HKLM\..\Run: [BigDogPath] C:\WINDOWS\VM_STI.EXE Vimicro USB PC Camera (ZC0301PL)
O4 - HKLM\..\Run: [Adobe Reader Speed Launcher] "C:\Program Files\Adobe\Reader 9.0\Reader\Reader_sl.exe"
O4 - HKCU\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\ctfmon.exe
O4 - HKCU\..\Run: [MsnMsgr] "C:\Program Files\Windows Live\Messenger\msnmsgr.exe" /background
O4 - HKCU\..\Run: [SpybotSD TeaTimer] C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe
O4 - HKCU\..\RunOnce: [FlashPlayerUpdate] C:\WINDOWS\system32\Macromed\Flash\NPSWF32_FlashUtil.exe -p
O4 - HKUS\S-1-5-18\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'SYSTEM')
O4 - HKUS\.DEFAULT\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'Default user')
O4 - Global Startup: Acer Empowering Technology.lnk = ?
O4 - Global Startup: Acer WLAN 11g USB Dongle.lnk = C:\Program Files\Acer WLAN 11g USB Dongle\ZDWlan.exe
O4 - Global Startup: Microsoft Office.lnk = C:\Program Files\Microsoft Office\Office10\OSA.EXE
O4 - Global Startup: Post-it® Software Notes Lite.lnk = C:\Program Files\3M\PSNLite\PsnLite.exe
O8 - Extra context menu item: E&xporter vers Microsoft Excel - res://C:\PROGRA~1\MICROS~2\Office10\EXCEL.EXE/3000
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_07\bin\ssv.dll
O9 - Extra 'Tools' menuitem: Console Java (Sun) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_07\bin\ssv.dll
O9 - Extra button: Ajout Direct - {219C3416-8CB2-491a-A3C7-D9FCDDC9D600} - C:\Program Files\Windows Live\Writer\WriterBrowserExtension.dll
O9 - Extra 'Tools' menuitem: &Ajout Direct dans Windows Live Writer - {219C3416-8CB2-491a-A3C7-D9FCDDC9D600} - C:\Program Files\Windows Live\Writer\WriterBrowserExtension.dll
O9 - Extra button: (no name) - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O9 - Extra 'Tools' menuitem: Spybot - Search & Destroy Configuration - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O16 - DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} (WUWebControl Class) - http://www.update.microsoft.com/...
O16 - DPF: {6E32070A-766D-4EE6-879C-DC1FA91D2FC3} (MUWebControl Class) - http://www.update.microsoft.com/...
O16 - DPF: {C3F79A2B-B9B4-4A66-B012-3EE46475B072} (MessengerStatsClient Class) - http://messenger.zone.msn.com/binary/MessengerStatsPAClient.cab56907.cab
O23 - Service: Acer Media Server - Acer Inc. - C:\Program Files\Acer\Acer eConsole\MediaServerService.exe
O23 - Service: Memory Check Service (AcerMemUsageCheckService) - Acer Inc. - C:\Acer\Empowering Technology\ePerformance\MemCheck.exe
O23 - Service: CyberLink Background Capture Service (CBCS) (CLCapSvc) - Unknown owner - C:\Program Files\Acer TV-FM\Kernel\TV\CLCapSvc.exe
O23 - Service: CyberLink Task Scheduler (CTS) (CLSched) - Unknown owner - C:\Program Files\Acer TV-FM\Kernel\TV\CLSched.exe
O23 - Service: CyberLink Media Library Service - Cyberlink - C:\Program Files\Acer TV-FM\Kernel\CLML_NTService\CLMLServer.exe
O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Fichiers communs\InstallShield\Driver\1050\Intel 32\IDriverT.exe
O23 - Service: NVIDIA Display Driver Service (NVSvc) - NVIDIA Corporation - C:\WINDOWS\system32\nvsvc32.exe
Logfile of random's system information tool 1.05 (written by random/random)
Run by Baudry Ludmilla at 2009-03-08 21:43:14
Microsoft Windows XP Édition familiale Service Pack 3
System drive C: has 35 GB (30%) free of 116 GB
Total RAM: 958 MB (48% free)
Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 21:43:21, on 08/03/2009
Platform: Windows XP SP3 (WinNT 5.01.2600)
MSIE: Internet Explorer v7.00 (7.00.6000.16762)
Boot mode: Normal
Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\Acer\Acer eConsole\MediaServerService.exe
C:\WINDOWS\Explorer.EXE
C:\Acer\Empowering Technology\ePerformance\MemCheck.exe
C:\WINDOWS\VM_STI.EXE
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\Windows Live\Messenger\msnmsgr.exe
C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe
C:\Program Files\Acer TV-FM\Kernel\TV\CLCapSvc.exe
C:\Program Files\Acer TV-FM\Kernel\CLML_NTService\CLMLServer.exe
C:\Acer\Empowering Technology\Acer.Empowering.Framework.Launcher.exe
C:\WINDOWS\system32\nvsvc32.exe
C:\Program Files\Microsoft\Search Enhancement Pack\SeaPort\SeaPort.exe
C:\Program Files\Acer WLAN 11g USB Dongle\ZDWlan.exe
C:\WINDOWS\system32\svchost.exe
C:\Program Files\3M\PSNLite\PsnLite.exe
C:\PROGRA~1\3M\PSNLite\PSNGive.exe
C:\Program Files\Acer TV-FM\Kernel\TV\CLSched.exe
C:\WINDOWS\system32\wbem\wmiapsrv.exe
C:\Program Files\Windows Live\Contacts\wlcomm.exe
C:\WINDOWS\system32\wuauclt.exe
C:\PROGRA~1\MOZILL~1\FIREFOX.EXE
C:\Documents and Settings\Baudry Ludmilla\Bureau\RSIT.exe
C:\Documents and Settings\Baudry Ludmilla\Bureau\Baudry Ludmilla.exe
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Bar = https://www.bing.com/?cc=fr&toHttps=1&redig=55729C844D6A45819CAD368B3E178C9F
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = https://www.google.fr/?gws_rd=ssl
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = https://www.msn.com/fr-fr/?ocid=iehp
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = https://www.bing.com/?toHttps=1&redig=5FC791212101479BAFBE1A679848B1AF
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = https://www.msn.com/fr-fr/?ocid=iehp
R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName = Liens
O2 - BHO: AcroIEHelperStub - {18DF081C-E8AD-4283-A596-FA578C2EBDC3} - C:\Program Files\Fichiers communs\Adobe\Acrobat\ActiveX\AcroIEHelperShim.dll
O2 - BHO: Spybot-S&D IE Protection - {53707962-6F74-2D53-2644-206D7942484F} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O2 - BHO: (no name) - {5C255C8A-E604-49b4-9D64-90988571CECB} - (no file)
O2 - BHO: EoRezoBHO - {64F56FC1-1272-44CD-BA6E-39723696E350} - C:\Program Files\eoRezo\EoAdv\EoRezoBHO.dll (file missing)
O2 - BHO: Search Helper - {6EBF7485-159F-4bff-A14F-B9E3AAC4465B} - C:\Program Files\Microsoft\Search Enhancement Pack\Search Helper\SearchHelper.dll
O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre1.6.0_07\bin\ssv.dll
O2 - BHO: Programme d'aide de l'Assistant de connexion Windows Live - {9030D464-4C02-4ABF-8ECC-5164760863C6} - C:\Program Files\Fichiers communs\Microsoft Shared\Windows Live\WindowsLiveLogin.dll
O2 - BHO: Windows Live Toolbar Helper - {E15A8DC0-8516-42A1-81EA-DC94EC1ACF10} - C:\Program Files\Windows Live\Toolbar\wltcore.dll
O2 - BHO: EpsonToolBandKicker Class - {E99421FB-68DD-40F0-B4AC-B7027CAE2F1A} - C:\Program Files\EPSON\EPSON Web-To-Page\EPSON Web-To-Page.dll
O3 - Toolbar: EPSON Web-To-Page - {EE5D279F-081B-4404-994D-C6B60AAEBA6D} - C:\Program Files\EPSON\EPSON Web-To-Page\EPSON Web-To-Page.dll
O3 - Toolbar: &Windows Live Toolbar - {21FA44EF-376D-4D53-9B0F-8A89D3229068} - C:\Program Files\Windows Live\Toolbar\wltcore.dll
O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE C:\WINDOWS\system32\NvCpl.dll,NvStartup
O4 - HKLM\..\Run: [BigDogPath] C:\WINDOWS\VM_STI.EXE Vimicro USB PC Camera (ZC0301PL)
O4 - HKLM\..\Run: [Adobe Reader Speed Launcher] "C:\Program Files\Adobe\Reader 9.0\Reader\Reader_sl.exe"
O4 - HKCU\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\ctfmon.exe
O4 - HKCU\..\Run: [MsnMsgr] "C:\Program Files\Windows Live\Messenger\msnmsgr.exe" /background
O4 - HKCU\..\Run: [SpybotSD TeaTimer] C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe
O4 - HKCU\..\RunOnce: [FlashPlayerUpdate] C:\WINDOWS\system32\Macromed\Flash\NPSWF32_FlashUtil.exe -p
O4 - HKUS\S-1-5-18\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'SYSTEM')
O4 - HKUS\.DEFAULT\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'Default user')
O4 - Global Startup: Acer Empowering Technology.lnk = ?
O4 - Global Startup: Acer WLAN 11g USB Dongle.lnk = C:\Program Files\Acer WLAN 11g USB Dongle\ZDWlan.exe
O4 - Global Startup: Microsoft Office.lnk = C:\Program Files\Microsoft Office\Office10\OSA.EXE
O4 - Global Startup: Post-it® Software Notes Lite.lnk = C:\Program Files\3M\PSNLite\PsnLite.exe
O8 - Extra context menu item: E&xporter vers Microsoft Excel - res://C:\PROGRA~1\MICROS~2\Office10\EXCEL.EXE/3000
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_07\bin\ssv.dll
O9 - Extra 'Tools' menuitem: Console Java (Sun) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_07\bin\ssv.dll
O9 - Extra button: Ajout Direct - {219C3416-8CB2-491a-A3C7-D9FCDDC9D600} - C:\Program Files\Windows Live\Writer\WriterBrowserExtension.dll
O9 - Extra 'Tools' menuitem: &Ajout Direct dans Windows Live Writer - {219C3416-8CB2-491a-A3C7-D9FCDDC9D600} - C:\Program Files\Windows Live\Writer\WriterBrowserExtension.dll
O9 - Extra button: (no name) - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O9 - Extra 'Tools' menuitem: Spybot - Search & Destroy Configuration - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O16 - DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} (WUWebControl Class) - http://www.update.microsoft.com/...
O16 - DPF: {6E32070A-766D-4EE6-879C-DC1FA91D2FC3} (MUWebControl Class) - http://www.update.microsoft.com/...
O16 - DPF: {C3F79A2B-B9B4-4A66-B012-3EE46475B072} (MessengerStatsClient Class) - http://messenger.zone.msn.com/binary/MessengerStatsPAClient.cab56907.cab
O23 - Service: Acer Media Server - Acer Inc. - C:\Program Files\Acer\Acer eConsole\MediaServerService.exe
O23 - Service: Memory Check Service (AcerMemUsageCheckService) - Acer Inc. - C:\Acer\Empowering Technology\ePerformance\MemCheck.exe
O23 - Service: CyberLink Background Capture Service (CBCS) (CLCapSvc) - Unknown owner - C:\Program Files\Acer TV-FM\Kernel\TV\CLCapSvc.exe
O23 - Service: CyberLink Task Scheduler (CTS) (CLSched) - Unknown owner - C:\Program Files\Acer TV-FM\Kernel\TV\CLSched.exe
O23 - Service: CyberLink Media Library Service - Cyberlink - C:\Program Files\Acer TV-FM\Kernel\CLML_NTService\CLMLServer.exe
O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Fichiers communs\InstallShield\Driver\1050\Intel 32\IDriverT.exe
O23 - Service: NVIDIA Display Driver Service (NVSvc) - NVIDIA Corporation - C:\WINDOWS\system32\nvsvc32.exe
jlpjlp
Messages postés
51580
Date d'inscription
vendredi 18 mai 2007
Statut
Contributeur sécurité
Dernière intervention
3 mai 2022
5 040
9 mars 2009 à 11:47
9 mars 2009 à 11:47
initialise internet explorer et firefox pour voir
http://www.commentcamarche.net/faq/sujet 9525 reinitialiser firefox reset
https://www.pcastuces.com/newsletter/adj/1943.htm
________________
Telecharge FindyKill sur ton bureau :
--> http://sd-1.archive-host.com/membres/up/116615172019703188/FindyKill.exe
--> Lance l installation avec les parametres par default
--> Double clic sur le raccourci FindyKill sur ton bureau
--> Au menu principal,choisi l option 1 (Recherche)
--> Post le rapport FindyKill.txt
Note : le rapport FindyKill.txt est sauvegardé a la racine du disque
http://www.commentcamarche.net/faq/sujet 9525 reinitialiser firefox reset
https://www.pcastuces.com/newsletter/adj/1943.htm
________________
Telecharge FindyKill sur ton bureau :
--> http://sd-1.archive-host.com/membres/up/116615172019703188/FindyKill.exe
--> Lance l installation avec les parametres par default
--> Double clic sur le raccourci FindyKill sur ton bureau
--> Au menu principal,choisi l option 1 (Recherche)
--> Post le rapport FindyKill.txt
Note : le rapport FindyKill.txt est sauvegardé a la racine du disque
Bonjour,
Alors voilà ce que ça a donné:
############################## [ FindyKill V4.719 ]
# User : Baudry Ludmilla (Administrateurs) # ACER-6DEC4164D2
# Update on 06/03/09 by Chiquitine29
# Start at: 16:34:56 | 09/03/2009
# AMD Athlon(tm) 64 X2 Dual Core Processor 4200+
# Microsoft Windows XP Édition familiale (5.1.2600 32-bit) # Service Pack 3
# Internet Explorer 7.0.5730.13
# Windows Firewall Status : Enabled
# FW : ZoneAlarm Firewall[ Enabled ]7.0.483.000
# C:\ # Disque fixe local # 113,76 Go (35,87 Go free) [ACER] # NTFS
# D:\ # Disque fixe local # 114,22 Go (114,22 Go free) [ACERDATA] # FAT32
# E:\ # Disque CD-ROM
# F:\ # Disque amovible # 979,72 Mo (796,89 Mo free) [USB] # FAT
# G:\ # Disque amovible
# H:\ # Disque amovible
# I:\ # Disque amovible
# J:\ # Disque amovible
############################## [ Processus actifs ]
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\csrss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\Acer\Acer eConsole\MediaServerService.exe
C:\WINDOWS\Explorer.EXE
C:\Acer\Empowering Technology\ePerformance\MemCheck.exe
C:\WINDOWS\VM_STI.EXE
C:\Program Files\Adobe\Reader 9.0\Reader\Reader_sl.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\Windows Live\Messenger\msnmsgr.exe
C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe
C:\Acer\Empowering Technology\Acer.Empowering.Framework.Launcher.exe
C:\Program Files\Acer WLAN 11g USB Dongle\ZDWlan.exe
C:\Program Files\Acer TV-FM\Kernel\TV\CLCapSvc.exe
C:\Program Files\Acer TV-FM\Kernel\CLML_NTService\CLMLServer.exe
C:\WINDOWS\system32\nvsvc32.exe
C:\Program Files\Microsoft\Search Enhancement Pack\SeaPort\SeaPort.exe
C:\WINDOWS\system32\svchost.exe
C:\Program Files\Acer TV-FM\Kernel\TV\CLSched.exe
C:\WINDOWS\system32\wbem\wmiapsrv.exe
C:\WINDOWS\system32\wbem\wmiprvse.exe
C:\WINDOWS\System32\alg.exe
C:\Program Files\Windows Live\Contacts\wlcomm.exe
C:\Program Files\Windows Live\Mail\wlmail.exe
C:\WINDOWS\system32\wuauclt.exe
C:\PROGRA~1\MOZILL~1\FIREFOX.EXE
C:\WINDOWS\system32\wbem\wmiprvse.exe
################## [ Fichiers / Dossiers infectieux C:\ ]
################## [ C:\WINDOWS ]
################## [ C:\WINDOWS\system32 ]
################## [ C:\WINDOWS\system32\drivers ]
################## [ C:\.. Application Data ... ]
Found ! - "C:\Documents and Settings\Baudry Ludmilla\Application Data\drivers"
################## [ Registre / Clés infectieuses ]
Found ! - HKEY_USERS\S-1-5-21-4222489996-1315135592-3599084046-1006\Software\Local AppWizard-Generated Applications\keygen
Found ! - HKEY_USERS\S-1-5-21-4222489996-1315135592-3599084046-1006\Software\Local AppWizard-Generated Applications\patch
Found ! - HKEY_USERS\S-1-5-21-4222489996-1315135592-3599084046-1006\Software\Local AppWizard-Generated Applications\winupgro
Found ! - HKEY_CURRENT_USER\Software\Local AppWizard-Generated Applications\keygen
Found ! - HKEY_CURRENT_USER\Software\Local AppWizard-Generated Applications\patch
Found ! - HKEY_CURRENT_USER\Software\Local AppWizard-Generated Applications\winupgro
################## [ Recherche dans supports amovibles]
# Presence des fichiers :
################## [ Registre / Mountpoint2 ]
# -> Not found !
################## [ ! Fin du rapport # FindyKill V4.719 ! ]
Merci, Et maintenant?
Alors voilà ce que ça a donné:
############################## [ FindyKill V4.719 ]
# User : Baudry Ludmilla (Administrateurs) # ACER-6DEC4164D2
# Update on 06/03/09 by Chiquitine29
# Start at: 16:34:56 | 09/03/2009
# AMD Athlon(tm) 64 X2 Dual Core Processor 4200+
# Microsoft Windows XP Édition familiale (5.1.2600 32-bit) # Service Pack 3
# Internet Explorer 7.0.5730.13
# Windows Firewall Status : Enabled
# FW : ZoneAlarm Firewall[ Enabled ]7.0.483.000
# C:\ # Disque fixe local # 113,76 Go (35,87 Go free) [ACER] # NTFS
# D:\ # Disque fixe local # 114,22 Go (114,22 Go free) [ACERDATA] # FAT32
# E:\ # Disque CD-ROM
# F:\ # Disque amovible # 979,72 Mo (796,89 Mo free) [USB] # FAT
# G:\ # Disque amovible
# H:\ # Disque amovible
# I:\ # Disque amovible
# J:\ # Disque amovible
############################## [ Processus actifs ]
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\csrss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\Acer\Acer eConsole\MediaServerService.exe
C:\WINDOWS\Explorer.EXE
C:\Acer\Empowering Technology\ePerformance\MemCheck.exe
C:\WINDOWS\VM_STI.EXE
C:\Program Files\Adobe\Reader 9.0\Reader\Reader_sl.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\Windows Live\Messenger\msnmsgr.exe
C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe
C:\Acer\Empowering Technology\Acer.Empowering.Framework.Launcher.exe
C:\Program Files\Acer WLAN 11g USB Dongle\ZDWlan.exe
C:\Program Files\Acer TV-FM\Kernel\TV\CLCapSvc.exe
C:\Program Files\Acer TV-FM\Kernel\CLML_NTService\CLMLServer.exe
C:\WINDOWS\system32\nvsvc32.exe
C:\Program Files\Microsoft\Search Enhancement Pack\SeaPort\SeaPort.exe
C:\WINDOWS\system32\svchost.exe
C:\Program Files\Acer TV-FM\Kernel\TV\CLSched.exe
C:\WINDOWS\system32\wbem\wmiapsrv.exe
C:\WINDOWS\system32\wbem\wmiprvse.exe
C:\WINDOWS\System32\alg.exe
C:\Program Files\Windows Live\Contacts\wlcomm.exe
C:\Program Files\Windows Live\Mail\wlmail.exe
C:\WINDOWS\system32\wuauclt.exe
C:\PROGRA~1\MOZILL~1\FIREFOX.EXE
C:\WINDOWS\system32\wbem\wmiprvse.exe
################## [ Fichiers / Dossiers infectieux C:\ ]
################## [ C:\WINDOWS ]
################## [ C:\WINDOWS\system32 ]
################## [ C:\WINDOWS\system32\drivers ]
################## [ C:\.. Application Data ... ]
Found ! - "C:\Documents and Settings\Baudry Ludmilla\Application Data\drivers"
################## [ Registre / Clés infectieuses ]
Found ! - HKEY_USERS\S-1-5-21-4222489996-1315135592-3599084046-1006\Software\Local AppWizard-Generated Applications\keygen
Found ! - HKEY_USERS\S-1-5-21-4222489996-1315135592-3599084046-1006\Software\Local AppWizard-Generated Applications\patch
Found ! - HKEY_USERS\S-1-5-21-4222489996-1315135592-3599084046-1006\Software\Local AppWizard-Generated Applications\winupgro
Found ! - HKEY_CURRENT_USER\Software\Local AppWizard-Generated Applications\keygen
Found ! - HKEY_CURRENT_USER\Software\Local AppWizard-Generated Applications\patch
Found ! - HKEY_CURRENT_USER\Software\Local AppWizard-Generated Applications\winupgro
################## [ Recherche dans supports amovibles]
# Presence des fichiers :
################## [ Registre / Mountpoint2 ]
# -> Not found !
################## [ ! Fin du rapport # FindyKill V4.719 ! ]
Merci, Et maintenant?
Vous n’avez pas trouvé la réponse que vous recherchez ?
Posez votre question
jlpjlp
Messages postés
51580
Date d'inscription
vendredi 18 mai 2007
Statut
Contributeur sécurité
Dernière intervention
3 mai 2022
5 040
9 mars 2009 à 17:09
9 mars 2009 à 17:09
ok il reste une infection bagle!
tu avais viré les cracks?
__________
vire tes cracks sinon l'infection revient
puis refais findykill option 2 et mets le rapport
____________
puis
telecharge combofix:
http://download.bleepingcomputer.com/sUBs/ComboFix.exe
Sauvegarde le sur ton bureau et pas ailleurs !
et colle un rapport avec
tu avais viré les cracks?
__________
vire tes cracks sinon l'infection revient
puis refais findykill option 2 et mets le rapport
____________
puis
telecharge combofix:
http://download.bleepingcomputer.com/sUBs/ComboFix.exe
Sauvegarde le sur ton bureau et pas ailleurs !
et colle un rapport avec
Pour répondre à ta question, je pense avoir déjà supprimé tous les cracks...
Donc voici le rapport findykill:
############################## [ FindyKill V4.719 ]
# User : Baudry Ludmilla (Administrateurs) # ACER-6DEC4164D2
# Update on 06/03/09 by Chiquitine29
# Start at: 19:04:59 | 09/03/2009
# AMD Athlon(tm) 64 X2 Dual Core Processor 4200+
# Microsoft Windows XP Édition familiale (5.1.2600 32-bit) # Service Pack 3
# Internet Explorer 7.0.5730.13
# Windows Firewall Status : Enabled
# FW : ZoneAlarm Firewall[ Enabled ]7.0.483.000
# C:\ # Disque fixe local # 113,76 Go (36,59 Go free) [ACER] # NTFS
# D:\ # Disque fixe local # 114,22 Go (114,22 Go free) [ACERDATA] # FAT32
# E:\ # Disque CD-ROM
# F:\ # Disque amovible # 979,72 Mo (796,89 Mo free) [USB] # FAT
# G:\ # Disque amovible
# H:\ # Disque amovible
# I:\ # Disque amovible
# J:\ # Disque amovible
############################## [ Active Processes ]
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\csrss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\Acer\Acer eConsole\MediaServerService.exe
C:\Acer\Empowering Technology\ePerformance\MemCheck.exe
C:\WINDOWS\VM_STI.EXE
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\Acer TV-FM\Kernel\TV\CLCapSvc.exe
C:\Program Files\Acer TV-FM\Kernel\CLML_NTService\CLMLServer.exe
C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe
C:\Acer\Empowering Technology\Acer.Empowering.Framework.Launcher.exe
C:\Program Files\Acer WLAN 11g USB Dongle\ZDWlan.exe
C:\WINDOWS\system32\nvsvc32.exe
C:\Program Files\Microsoft\Search Enhancement Pack\SeaPort\SeaPort.exe
C:\WINDOWS\system32\svchost.exe
C:\Program Files\Acer TV-FM\Kernel\TV\CLSched.exe
C:\WINDOWS\system32\wbem\wmiapsrv.exe
C:\WINDOWS\system32\wbem\wmiprvse.exe
C:\WINDOWS\System32\alg.exe
C:\Program Files\Windows Live\Contacts\wlcomm.exe
C:\Program Files\Windows Live\Mail\wlmail.exe
C:\WINDOWS\system32\wbem\wmiprvse.exe
################## [ Infected Files / Folders C:\ ]
################## [ C:\WINDOWS ]
################## [ C:\WINDOWS\system32 ]
################## [ C:\WINDOWS\system32\drivers ]
################## [ C:\.. Application Data ... ]
Deleted ! - "C:\Documents and Settings\Baudry Ludmilla\Application Data\drivers"
################## [ Registry / Infected keys ]
Deleted ! - HKEY_CURRENT_USER\Software\Local AppWizard-Generated Applications\keygen
Deleted ! - HKEY_CURRENT_USER\Software\Local AppWizard-Generated Applications\patch
Deleted ! - HKEY_CURRENT_USER\Software\Local AppWizard-Generated Applications\winupgro
################## [ Cleaning Removable drives ]
# Deleting files :
################## [ Registry / Mountpoint2 ]
# -> Not found !
################## [ Searching Other Infections ]
################## [ PEH Corrupted ]
C:\Program Files\Samsung\Samsung PC Studio 3\LiveUpdate.exe
C:\Program Files\Zone Labs\ZoneAlarm\zauninst.exe
C:\Program Files\Zone Labs\ZoneAlarm\zlclient.exe
C:\WINDOWS\system32\ZoneLabs\updclient.exe
C:\WINDOWS\system32\ZoneLabs\vsmon.exe
################## [ ! End of Report # FindyKill V4.719 ! ]
Ainsi que celui de Combofix:
ComboFix 09-03-06.02 - Baudry Ludmilla 2009-03-09 19:13:18.2 - NTFSx86
Microsoft Windows XP Édition familiale 5.1.2600.3.1252.1.1036.18.958.613 [GMT 1:00]
Lancé depuis: c:\documents and settings\Baudry Ludmilla\Bureau\ComboFix.exe
FW: ZoneAlarm Firewall *enabled*
* Un nouveau point de restauration a été créé
.
((((((((((((((((((((((((((((( Fichiers créés du 2009-02-09 au 2009-03-09 ))))))))))))))))))))))))))))))))))))
.
2009-03-09 16:34 . 2009-03-09 19:09 <REP> d-------- c:\program files\FindyKill
2009-03-08 21:43 . 2009-03-08 21:43 <REP> d-------- C:\rsit
2009-02-21 11:05 . 2009-03-09 00:40 <REP> d-------- c:\program files\Microsoft Silverlight
2009-02-21 11:05 . 2009-02-06 18:08 55,152 --a------ c:\windows\system32\drivers\fssfltr_tdi.sys
2009-02-21 11:04 . 2009-02-21 11:04 <REP> d-------- c:\program files\Microsoft Sync Framework
2009-02-15 17:48 . 2009-02-15 17:48 <REP> d-------- c:\program files\Spybot - Search & Destroy
2009-02-15 17:48 . 2009-02-21 11:03 <REP> d-------- c:\documents and settings\All Users\Application Data\Spybot - Search & Destroy
.
(((((((((((((((((((((((((((((((((( Compte-rendu de Find3M ))))))))))))))))))))))))))))))))))))))))))))))))
.
2009-02-21 10:05 --------- d-----w c:\program files\Windows Live
2009-02-21 10:05 --------- d-----w c:\program files\Microsoft
2009-02-06 18:39 308,600 ----a-w c:\windows\WLXPGSS.SCR
2009-02-06 17:52 49,504 ----a-w c:\windows\system32\sirenacm.dll
2009-01-29 21:51 --------- d-----w c:\program files\Windows Live SkyDrive
2009-01-27 20:18 --------- d-----w c:\program files\eMule
2009-01-25 19:15 --------- d-----w c:\program files\Google
2009-01-25 19:03 --------- d--h--w c:\program files\InstallShield Installation Information
2009-01-25 19:01 --------- d-----w c:\program files\muvee Technologies
2009-01-24 14:09 257,780 --sha-w c:\windows\system32\drivers\fidbox.idx
2009-01-24 14:09 21,905,440 --sha-w c:\windows\system32\drivers\fidbox.dat
2009-01-24 14:05 --------- d-----w c:\documents and settings\All Users\Application Data\nView_Profiles
2009-01-21 20:55 --------- d-----w c:\documents and settings\Baudry Ludmilla\Application Data\TomTom
2009-01-16 17:07 1,785,344 ----a-w c:\windows\Internet Logs\xDB3.tmp
2009-01-07 16:46 1,977,595 ----a-w c:\windows\Internet Logs\tvDebug.zip
2008-10-15 21:14 44,520 ----a-w c:\documents and settings\Baudry Ludmilla\Application Data\GDIPFONTCACHEV1.DAT
2008-12-17 23:04 67,688 ----a-w c:\program files\mozilla firefox\components\jar50.dll
2008-12-17 23:04 54,368 ----a-w c:\program files\mozilla firefox\components\jsd3250.dll
2008-12-17 23:04 34,944 ----a-w c:\program files\mozilla firefox\components\myspell.dll
2008-12-17 23:04 46,712 ----a-w c:\program files\mozilla firefox\components\spellchk.dll
2008-12-17 23:04 172,136 ----a-w c:\program files\mozilla firefox\components\xpinstal.dll
2008-10-13 16:21 32,768 --sha-w c:\windows\system32\config\systemprofile\Local Settings\Historique\History.IE5\MSHist012008101320081014\index.dat
.
((((((((((((((((((((((((((((( snapshot@2009-01-26_14.02.19.60 )))))))))))))))))))))))))))))))))))))))))
.
+ 2008-06-17 19:04:03 8,518,144 ----a-w c:\windows\$hf_mig$\KB967715\SP3QFE\shell32.dll
+ 2008-07-09 07:40:22 18,296 ----a-w c:\windows\$hf_mig$\KB967715\spmsg.dll
+ 2008-07-09 07:40:24 234,872 ----a-w c:\windows\$hf_mig$\KB967715\spuninst.exe
+ 2008-07-09 07:40:22 26,488 ----a-w c:\windows\$hf_mig$\KB967715\update\spcustom.dll
+ 2008-07-09 07:40:26 767,352 ----a-w c:\windows\$hf_mig$\KB967715\update\update.exe
+ 2008-07-09 07:40:35 406,392 ----a-w c:\windows\$hf_mig$\KB967715\update\updspapi.dll
+ 2009-02-21 10:25:44 17,920 ----a-w c:\windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualC\f4b48a875c25324da420bd5336fad827\Microsoft.VisualC.ni.dll
+ 2009-02-21 10:25:48 167,936 ----a-w c:\windows\assembly\NativeImages_v2.0.50727_32\System.Configuratio#\649e6acff192b84ba52d8faa29b8aaae\System.Configuration.Install.ni.dll
+ 2009-02-21 10:25:47 1,179,648 ----a-w c:\windows\assembly\NativeImages_v2.0.50727_32\System.Data.OracleC#\9e1204954e0fe74492763b303d98aa89\System.Data.OracleClient.ni.dll
+ 2009-02-21 10:25:39 2,703,360 ----a-w c:\windows\assembly\NativeImages_v2.0.50727_32\System.Data.SqlXml\13ccadb6c0bc7e46b87d66f2a8accf5f\System.Data.SqlXml.ni.dll
+ 2009-02-21 10:25:45 815,104 ----a-w c:\windows\assembly\NativeImages_v2.0.50727_32\System.Runtime.Remo#\7f8f332619b526489be61daa90733bee\System.Runtime.Remoting.ni.dll
+ 2009-02-21 10:25:40 339,968 ----a-w c:\windows\assembly\NativeImages_v2.0.50727_32\System.Runtime.Seri#\7be60a78eea6904487d8a419be8952ff\System.Runtime.Serialization.Formatters.Soap.ni.dll
+ 2009-02-21 10:25:48 233,472 ----a-w c:\windows\assembly\NativeImages_v2.0.50727_32\System.ServiceProce#\ec90bed94da80c44abdc25f83e13d246\System.ServiceProcess.ni.dll
+ 2009-02-21 10:25:53 163,840 ----a-w c:\windows\assembly\NativeImages_v2.0.50727_32\WindowsLive.Client\db45e5be79638144aafc895084c842e0\WindowsLive.Client.ni.dll
+ 2009-02-21 10:25:53 929,792 ----a-w c:\windows\assembly\NativeImages_v2.0.50727_32\WindowsLive.Writer.#\[u]0/ue615f7e72312f4aaceb5ce00c2bf112\WindowsLive.Writer.BlogClient.ni.dll
+ 2009-02-21 10:25:42 335,872 ----a-w c:\windows\assembly\NativeImages_v2.0.50727_32\WindowsLive.Writer.#\1961dcf619c6e74f88bb13fb4b8be971\WindowsLive.Writer.Interop.ni.dll
+ 2009-02-21 10:25:51 1,163,264 ----a-w c:\windows\assembly\NativeImages_v2.0.50727_32\WindowsLive.Writer.#\28e7483ac146624ea07bf9b7e9c56568\WindowsLive.Writer.ApplicationFramework.ni.dll
+ 2009-02-21 10:25:43 335,872 ----a-w c:\windows\assembly\NativeImages_v2.0.50727_32\WindowsLive.Writer.#\2c33802e7c96214ca3ccd16fbcfb23ac\WindowsLive.Writer.Interop.Mshtml.ni.dll
+ 2009-02-21 10:25:51 143,360 ----a-w c:\windows\assembly\NativeImages_v2.0.50727_32\WindowsLive.Writer.#\2ea8254913c340449dfef5eab0c11132\WindowsLive.Writer.Extensibility.ni.dll
+ 2009-02-21 10:25:43 204,800 ----a-w c:\windows\assembly\NativeImages_v2.0.50727_32\WindowsLive.Writer.#\3c032db5ea08b74985741fecea9901e7\WindowsLive.Writer.BrowserControl.ni.dll
+ 2009-02-21 10:25:48 475,136 ----a-w c:\windows\assembly\NativeImages_v2.0.50727_32\WindowsLive.Writer.#\3c8d98a31e6ce44fb21fafeec5d30907\WindowsLive.Writer.Localization.ni.dll
+ 2009-02-21 10:25:49 135,168 ----a-w c:\windows\assembly\NativeImages_v2.0.50727_32\WindowsLive.Writer.#\4578d0151828784ab5a83bf98b7e944b\WindowsLive.Writer.Passport.ni.dll
+ 2009-02-21 10:25:44 176,128 ----a-w c:\windows\assembly\NativeImages_v2.0.50727_32\WindowsLive.Writer.#\52ead08fcc34cd44bbc0092fb771d442\WindowsLive.Writer.HtmlParser.ni.dll
+ 2009-02-21 10:25:52 114,688 ----a-w c:\windows\assembly\NativeImages_v2.0.50727_32\WindowsLive.Writer.#\6b935792a9cc774884db98a8a4292ba6\WindowsLive.Writer.Api.ni.dll
+ 2009-02-21 10:25:42 2,093,056 ----a-w c:\windows\assembly\NativeImages_v2.0.50727_32\WindowsLive.Writer.#\75ee07349433ac44bbbcd9d5f69091d9\WindowsLive.Writer.CoreServices.ni.dll
+ 2009-02-21 10:25:55 376,832 ----a-w c:\windows\assembly\NativeImages_v2.0.50727_32\WindowsLive.Writer.#\9c303fe5161c284299f40eca9b5ae99a\WindowsLive.Writer.SpellChecker.ni.dll
+ 2009-02-21 10:25:34 6,516,736 ----a-w c:\windows\assembly\NativeImages_v2.0.50727_32\WindowsLive.Writer.#\9f8e67718b1cef468e2d6550d02fa6a4\WindowsLive.Writer.PostEditor.ni.dll
+ 2009-02-21 10:25:43 352,256 ----a-w c:\windows\assembly\NativeImages_v2.0.50727_32\WindowsLive.Writer.#\b20e66fe784caf4492e6847d9668b4af\WindowsLive.Writer.Interop.SHDocVw.ni.dll
+ 2009-02-21 10:25:56 163,840 ----a-w c:\windows\assembly\NativeImages_v2.0.50727_32\WindowsLive.Writer.#\bbb249e5dffd124eb01d6992ae852b3e\WindowsLive.Writer.Instrumentation.ni.dll
+ 2009-02-21 10:25:54 643,072 ----a-w c:\windows\assembly\NativeImages_v2.0.50727_32\WindowsLive.Writer.#\cec337500edbe24f9fbcb2b26ee5992d\WindowsLive.Writer.HtmlEditor.ni.dll
+ 2009-02-21 10:25:55 139,264 ----a-w c:\windows\assembly\NativeImages_v2.0.50727_32\WindowsLive.Writer.#\d708787d6e42c644a1e0505bf3d5d2a4\WindowsLive.Writer.FileDestinations.ni.dll
+ 2009-02-21 10:25:36 876,544 ----a-w c:\windows\assembly\NativeImages_v2.0.50727_32\WindowsLive.Writer.#\e2b340261ff59444854fb15c1522ea9e\WindowsLive.Writer.Controls.ni.dll
+ 2009-02-21 10:25:49 286,720 ----a-w c:\windows\assembly\NativeImages_v2.0.50727_32\WindowsLive.Writer.#\f01be205262d254c92b34652cfdd4770\WindowsLive.Writer.Mshtml.ni.dll
+ 2009-02-21 10:25:56 638,976 ----a-w c:\windows\assembly\NativeImages_v2.0.50727_32\WindowsLiveLocal.Wr#\11fd6030b118d4459bb6517246a5a9c1\WindowsLiveLocal.WriterPlugin.ni.dll
+ 2009-02-21 10:25:25 49,152 ----a-w c:\windows\assembly\NativeImages_v2.0.50727_32\WindowsLiveWriter\3f11b0d1670abb4f9806d5e16f940639\WindowsLiveWriter.ni.exe
+ 2009-01-29 21:51:46 62,288 ----a-r c:\windows\Installer\{01523985-2098-43AF-9C97-12B07BE02A9B}\IconWlc.exe
+ 2009-02-21 10:03:26 80,395 ----a-r c:\windows\Installer\{059C042E-796A-4ACC-A81A-ECC2010BB78C}\MsblIco.Exe
+ 2009-02-21 10:04:43 132,096 ----a-r c:\windows\Installer\{44E54A81-9D91-4AA1-9417-80AFF134F5FF}\WLXPhotoGalleryIcon.exe
+ 2009-02-21 10:03:45 58,945 ----a-r c:\windows\Installer\{63DC2DA0-2A6C-4C38-9249-B75395458657}\wlmail.exe
+ 2009-02-21 10:02:49 62,304 ----a-r c:\windows\Installer\{82C7B308-0BDD-49D8-8EA5-9CD3A3F9DF41}\IconWlc.exe
+ 2008-06-17 19:02:15 8,517,632 -c----w c:\windows\system32\dllcache\shell32.dll
+ 2005-11-19 01:13:18 20,096 ----a-w c:\windows\system32\drivers\PCASp50.sys
+ 2009-02-06 17:08:42 55,152 -c--a-w c:\windows\system32\DRVSTORE\fssfltr_A1BAE7BA557F7F8ABCBF040E8C71D6B14223DCB0\fssfltr_tdi.sys
- 2008-04-14 02:33:41 8,517,632 ----a-w c:\windows\system32\shell32.dll
+ 2008-06-17 19:02:15 8,517,632 ----a-w c:\windows\system32\shell32.dll
- 2007-11-30 11:19:06 18,296 ------w c:\windows\system32\spmsg.dll
+ 2008-07-09 07:40:22 18,296 ------w c:\windows\system32\spmsg.dll
+ 2009-03-09 18:06:21 16,384 ----atw c:\windows\temp\Perflib_Perfdata_7c4.dat
+ 2007-12-03 17:58:42 479,232 ----a-w c:\windows\WinSxS\x86_Microsoft.VC80.CRT_1fc8b3b9a1e18e3b_8.0.50727.1801_x-ww_5eed8217\msvcm80.dll
+ 2007-12-04 01:56:54 558,080 ----a-w c:\windows\WinSxS\x86_Microsoft.VC80.CRT_1fc8b3b9a1e18e3b_8.0.50727.1801_x-ww_5eed8217\msvcp80.dll
+ 2007-12-04 01:56:56 635,904 ----a-w c:\windows\WinSxS\x86_Microsoft.VC80.CRT_1fc8b3b9a1e18e3b_8.0.50727.1801_x-ww_5eed8217\msvcr80.dll
+ 2007-11-06 19:23:58 224,768 ----a-w c:\windows\WinSxS\x86_Microsoft.VC90.CRT_1fc8b3b9a1e18e3b_9.0.21022.8_x-ww_d08d0375\msvcm90.dll
+ 2007-11-07 00:19:34 568,832 ----a-w c:\windows\WinSxS\x86_Microsoft.VC90.CRT_1fc8b3b9a1e18e3b_9.0.21022.8_x-ww_d08d0375\msvcp90.dll
+ 2007-11-07 00:19:34 655,872 ----a-w c:\windows\WinSxS\x86_Microsoft.VC90.CRT_1fc8b3b9a1e18e3b_9.0.21022.8_x-ww_d08d0375\msvcr90.dll
.
-- Instantané actualisé --
.
((((((((((((((((((((((((((((((((( Points de chargement Reg ))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* les éléments vides & les éléments initiaux légitimes ne sont pas listés
REGEDIT4
[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"CTFMON.EXE"="c:\windows\system32\ctfmon.exe" [2008-04-14 15360]
"MsnMsgr"="c:\program files\Windows Live\Messenger\msnmsgr.exe" [2009-02-06 3885408]
"SpybotSD TeaTimer"="c:\program files\Spybot - Search & Destroy\TeaTimer.exe" [2009-01-26 2144088]
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"NvCplDaemon"="c:\windows\system32\NvCpl.dll" [2006-01-24 7311360]
"BigDogPath"="c:\windows\VM_STI.EXE" [2005-02-28 53248]
"Adobe Reader Speed Launcher"="c:\program files\Adobe\Reader 9.0\Reader\Reader_sl.exe" [2008-06-12 34672]
[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run]
"CTFMON.EXE"="c:\windows\system32\CTFMON.EXE" [2008-04-14 15360]
c:\documents and settings\All Users\Menu D‚marrer\Programmes\D‚marrage\
Acer Empowering Technology.lnk - c:\acer\Empowering Technology\Acer.Empowering.Framework.Launcher.exe [2006-10-09 45056]
Acer WLAN 11g USB Dongle.lnk - c:\program files\Acer WLAN 11g USB Dongle\ZDWlan.exe [2005-11-16 745472]
Microsoft Office.lnk - c:\program files\Microsoft Office\Office10\OSA.EXE [2001-02-13 83360]
Post-it© Software Notes Lite.lnk - c:\program files\3M\PSNLite\PsnLite.exe [2004-10-15 2080768]
[HKEY_LOCAL_MACHINE\software\microsoft\security center]
"AntiVirusDisableNotify"=dword:00000001
[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\ZoneLabsFirewall]
"DisableMonitoring"=dword:00000001
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%windir%\\system32\\sessmgr.exe"=
"c:\\Program Files\\Acer TV-FM\\PowerCinema.exe"=
"c:\\Program Files\\Acer TV-FM\\PCMService.exe"=
"c:\\Program Files\\Messenger\\msmsgs.exe"=
"%windir%\\Network Diagnostic\\xpnetdiag.exe"=
"c:\documents and settings\Baudry Ludmilla\Application Data\Facebook\facebook.exe"= c:\documents and settings\Baudry Ludmilla\Application Data\Facebook\facebook.exe:127.0.0.1/255.255.255.255:Enabled:Facebook
"c:\\Program Files\\Mozilla Firefox\\firefox.exe"=
"c:\\Program Files\\Windows Live\\Messenger\\msnmsgr.exe"=
"c:\\Program Files\\Windows Live\\Sync\\WindowsLiveSync.exe"=
R2 fssfltr;FssFltr;c:\windows\system32\drivers\fssfltr_tdi.sys [2009-02-21 55152]
R2 SeaPort;SeaPort;c:\program files\Microsoft\Search Enhancement Pack\SeaPort\SeaPort.exe [2009-01-14 226656]
S3 fsssvc;Windows Live Contrôle parental;c:\program files\Windows Live\Family Safety\fsssvc.exe [2009-02-06 533360]
--- Autres Services/Pilotes en mémoire ---
*NewlyCreated* - EAPHOST
*NewlyCreated* - IP6FW
.
.
------- Examen supplémentaire -------
.
uStart Page = hxxp://www.google.fr/
uDefault_Search_URL = hxxp://www.google.com/ie
uSearchMigratedDefaultURL = hxxp://www.google.com/search?q={searchTerms}&sourceid=ie7&rls=com.microsoft:en-US&ie=utf8&oe=utf8
uSearchURL,(Default) = hxxp://www.google.com/search?q=%s
IE: E&xporter vers Microsoft Excel - c:\progra~1\MICROS~2\Office10\EXCEL.EXE/3000
FF - ProfilePath - c:\documents and settings\Baudry Ludmilla\Application Data\Mozilla\Firefox\Profiles\[u]0/u343ewk6.default\
FF - prefs.js: browser.startup.homepage - hxxp://www.google.fr/
FF - prefs.js: keyword.URL - hxxp://search.sweetim.com/search.asp?src=2&q=
FF - prefs.js: network.proxy.type - 4
FF - component: c:\program files\Mozilla Firefox\components\xpinstal.dll
.
**************************************************************************
catchme 0.3.1367 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2009-03-09 19:14:03
Windows 5.1.2600 Service Pack 3 NTFS
Recherche de processus cachés ...
Recherche d'éléments en démarrage automatique cachés ...
Recherche de fichiers cachés ...
Scan terminé avec succès
Fichiers cachés: 0
**************************************************************************
.
Heure de fin: 2009-03-09 19:15:00
ComboFix-quarantined-files.txt 2009-03-09 18:14:58
ComboFix2.txt 2009-01-26 13:06:06
Avant-CF: 39 248 257 024 octets libres
Après-CF: 39,587,102,720 octets libres
171 --- E O F --- 2009-03-08 23:39:19
Voilà...
Tout ceci me semble être du charabia, je ne sais pas comment l'interpréter ^^
Donc voici le rapport findykill:
############################## [ FindyKill V4.719 ]
# User : Baudry Ludmilla (Administrateurs) # ACER-6DEC4164D2
# Update on 06/03/09 by Chiquitine29
# Start at: 19:04:59 | 09/03/2009
# AMD Athlon(tm) 64 X2 Dual Core Processor 4200+
# Microsoft Windows XP Édition familiale (5.1.2600 32-bit) # Service Pack 3
# Internet Explorer 7.0.5730.13
# Windows Firewall Status : Enabled
# FW : ZoneAlarm Firewall[ Enabled ]7.0.483.000
# C:\ # Disque fixe local # 113,76 Go (36,59 Go free) [ACER] # NTFS
# D:\ # Disque fixe local # 114,22 Go (114,22 Go free) [ACERDATA] # FAT32
# E:\ # Disque CD-ROM
# F:\ # Disque amovible # 979,72 Mo (796,89 Mo free) [USB] # FAT
# G:\ # Disque amovible
# H:\ # Disque amovible
# I:\ # Disque amovible
# J:\ # Disque amovible
############################## [ Active Processes ]
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\csrss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\Acer\Acer eConsole\MediaServerService.exe
C:\Acer\Empowering Technology\ePerformance\MemCheck.exe
C:\WINDOWS\VM_STI.EXE
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\Acer TV-FM\Kernel\TV\CLCapSvc.exe
C:\Program Files\Acer TV-FM\Kernel\CLML_NTService\CLMLServer.exe
C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe
C:\Acer\Empowering Technology\Acer.Empowering.Framework.Launcher.exe
C:\Program Files\Acer WLAN 11g USB Dongle\ZDWlan.exe
C:\WINDOWS\system32\nvsvc32.exe
C:\Program Files\Microsoft\Search Enhancement Pack\SeaPort\SeaPort.exe
C:\WINDOWS\system32\svchost.exe
C:\Program Files\Acer TV-FM\Kernel\TV\CLSched.exe
C:\WINDOWS\system32\wbem\wmiapsrv.exe
C:\WINDOWS\system32\wbem\wmiprvse.exe
C:\WINDOWS\System32\alg.exe
C:\Program Files\Windows Live\Contacts\wlcomm.exe
C:\Program Files\Windows Live\Mail\wlmail.exe
C:\WINDOWS\system32\wbem\wmiprvse.exe
################## [ Infected Files / Folders C:\ ]
################## [ C:\WINDOWS ]
################## [ C:\WINDOWS\system32 ]
################## [ C:\WINDOWS\system32\drivers ]
################## [ C:\.. Application Data ... ]
Deleted ! - "C:\Documents and Settings\Baudry Ludmilla\Application Data\drivers"
################## [ Registry / Infected keys ]
Deleted ! - HKEY_CURRENT_USER\Software\Local AppWizard-Generated Applications\keygen
Deleted ! - HKEY_CURRENT_USER\Software\Local AppWizard-Generated Applications\patch
Deleted ! - HKEY_CURRENT_USER\Software\Local AppWizard-Generated Applications\winupgro
################## [ Cleaning Removable drives ]
# Deleting files :
################## [ Registry / Mountpoint2 ]
# -> Not found !
################## [ Searching Other Infections ]
################## [ PEH Corrupted ]
C:\Program Files\Samsung\Samsung PC Studio 3\LiveUpdate.exe
C:\Program Files\Zone Labs\ZoneAlarm\zauninst.exe
C:\Program Files\Zone Labs\ZoneAlarm\zlclient.exe
C:\WINDOWS\system32\ZoneLabs\updclient.exe
C:\WINDOWS\system32\ZoneLabs\vsmon.exe
################## [ ! End of Report # FindyKill V4.719 ! ]
Ainsi que celui de Combofix:
ComboFix 09-03-06.02 - Baudry Ludmilla 2009-03-09 19:13:18.2 - NTFSx86
Microsoft Windows XP Édition familiale 5.1.2600.3.1252.1.1036.18.958.613 [GMT 1:00]
Lancé depuis: c:\documents and settings\Baudry Ludmilla\Bureau\ComboFix.exe
FW: ZoneAlarm Firewall *enabled*
* Un nouveau point de restauration a été créé
.
((((((((((((((((((((((((((((( Fichiers créés du 2009-02-09 au 2009-03-09 ))))))))))))))))))))))))))))))))))))
.
2009-03-09 16:34 . 2009-03-09 19:09 <REP> d-------- c:\program files\FindyKill
2009-03-08 21:43 . 2009-03-08 21:43 <REP> d-------- C:\rsit
2009-02-21 11:05 . 2009-03-09 00:40 <REP> d-------- c:\program files\Microsoft Silverlight
2009-02-21 11:05 . 2009-02-06 18:08 55,152 --a------ c:\windows\system32\drivers\fssfltr_tdi.sys
2009-02-21 11:04 . 2009-02-21 11:04 <REP> d-------- c:\program files\Microsoft Sync Framework
2009-02-15 17:48 . 2009-02-15 17:48 <REP> d-------- c:\program files\Spybot - Search & Destroy
2009-02-15 17:48 . 2009-02-21 11:03 <REP> d-------- c:\documents and settings\All Users\Application Data\Spybot - Search & Destroy
.
(((((((((((((((((((((((((((((((((( Compte-rendu de Find3M ))))))))))))))))))))))))))))))))))))))))))))))))
.
2009-02-21 10:05 --------- d-----w c:\program files\Windows Live
2009-02-21 10:05 --------- d-----w c:\program files\Microsoft
2009-02-06 18:39 308,600 ----a-w c:\windows\WLXPGSS.SCR
2009-02-06 17:52 49,504 ----a-w c:\windows\system32\sirenacm.dll
2009-01-29 21:51 --------- d-----w c:\program files\Windows Live SkyDrive
2009-01-27 20:18 --------- d-----w c:\program files\eMule
2009-01-25 19:15 --------- d-----w c:\program files\Google
2009-01-25 19:03 --------- d--h--w c:\program files\InstallShield Installation Information
2009-01-25 19:01 --------- d-----w c:\program files\muvee Technologies
2009-01-24 14:09 257,780 --sha-w c:\windows\system32\drivers\fidbox.idx
2009-01-24 14:09 21,905,440 --sha-w c:\windows\system32\drivers\fidbox.dat
2009-01-24 14:05 --------- d-----w c:\documents and settings\All Users\Application Data\nView_Profiles
2009-01-21 20:55 --------- d-----w c:\documents and settings\Baudry Ludmilla\Application Data\TomTom
2009-01-16 17:07 1,785,344 ----a-w c:\windows\Internet Logs\xDB3.tmp
2009-01-07 16:46 1,977,595 ----a-w c:\windows\Internet Logs\tvDebug.zip
2008-10-15 21:14 44,520 ----a-w c:\documents and settings\Baudry Ludmilla\Application Data\GDIPFONTCACHEV1.DAT
2008-12-17 23:04 67,688 ----a-w c:\program files\mozilla firefox\components\jar50.dll
2008-12-17 23:04 54,368 ----a-w c:\program files\mozilla firefox\components\jsd3250.dll
2008-12-17 23:04 34,944 ----a-w c:\program files\mozilla firefox\components\myspell.dll
2008-12-17 23:04 46,712 ----a-w c:\program files\mozilla firefox\components\spellchk.dll
2008-12-17 23:04 172,136 ----a-w c:\program files\mozilla firefox\components\xpinstal.dll
2008-10-13 16:21 32,768 --sha-w c:\windows\system32\config\systemprofile\Local Settings\Historique\History.IE5\MSHist012008101320081014\index.dat
.
((((((((((((((((((((((((((((( snapshot@2009-01-26_14.02.19.60 )))))))))))))))))))))))))))))))))))))))))
.
+ 2008-06-17 19:04:03 8,518,144 ----a-w c:\windows\$hf_mig$\KB967715\SP3QFE\shell32.dll
+ 2008-07-09 07:40:22 18,296 ----a-w c:\windows\$hf_mig$\KB967715\spmsg.dll
+ 2008-07-09 07:40:24 234,872 ----a-w c:\windows\$hf_mig$\KB967715\spuninst.exe
+ 2008-07-09 07:40:22 26,488 ----a-w c:\windows\$hf_mig$\KB967715\update\spcustom.dll
+ 2008-07-09 07:40:26 767,352 ----a-w c:\windows\$hf_mig$\KB967715\update\update.exe
+ 2008-07-09 07:40:35 406,392 ----a-w c:\windows\$hf_mig$\KB967715\update\updspapi.dll
+ 2009-02-21 10:25:44 17,920 ----a-w c:\windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualC\f4b48a875c25324da420bd5336fad827\Microsoft.VisualC.ni.dll
+ 2009-02-21 10:25:48 167,936 ----a-w c:\windows\assembly\NativeImages_v2.0.50727_32\System.Configuratio#\649e6acff192b84ba52d8faa29b8aaae\System.Configuration.Install.ni.dll
+ 2009-02-21 10:25:47 1,179,648 ----a-w c:\windows\assembly\NativeImages_v2.0.50727_32\System.Data.OracleC#\9e1204954e0fe74492763b303d98aa89\System.Data.OracleClient.ni.dll
+ 2009-02-21 10:25:39 2,703,360 ----a-w c:\windows\assembly\NativeImages_v2.0.50727_32\System.Data.SqlXml\13ccadb6c0bc7e46b87d66f2a8accf5f\System.Data.SqlXml.ni.dll
+ 2009-02-21 10:25:45 815,104 ----a-w c:\windows\assembly\NativeImages_v2.0.50727_32\System.Runtime.Remo#\7f8f332619b526489be61daa90733bee\System.Runtime.Remoting.ni.dll
+ 2009-02-21 10:25:40 339,968 ----a-w c:\windows\assembly\NativeImages_v2.0.50727_32\System.Runtime.Seri#\7be60a78eea6904487d8a419be8952ff\System.Runtime.Serialization.Formatters.Soap.ni.dll
+ 2009-02-21 10:25:48 233,472 ----a-w c:\windows\assembly\NativeImages_v2.0.50727_32\System.ServiceProce#\ec90bed94da80c44abdc25f83e13d246\System.ServiceProcess.ni.dll
+ 2009-02-21 10:25:53 163,840 ----a-w c:\windows\assembly\NativeImages_v2.0.50727_32\WindowsLive.Client\db45e5be79638144aafc895084c842e0\WindowsLive.Client.ni.dll
+ 2009-02-21 10:25:53 929,792 ----a-w c:\windows\assembly\NativeImages_v2.0.50727_32\WindowsLive.Writer.#\[u]0/ue615f7e72312f4aaceb5ce00c2bf112\WindowsLive.Writer.BlogClient.ni.dll
+ 2009-02-21 10:25:42 335,872 ----a-w c:\windows\assembly\NativeImages_v2.0.50727_32\WindowsLive.Writer.#\1961dcf619c6e74f88bb13fb4b8be971\WindowsLive.Writer.Interop.ni.dll
+ 2009-02-21 10:25:51 1,163,264 ----a-w c:\windows\assembly\NativeImages_v2.0.50727_32\WindowsLive.Writer.#\28e7483ac146624ea07bf9b7e9c56568\WindowsLive.Writer.ApplicationFramework.ni.dll
+ 2009-02-21 10:25:43 335,872 ----a-w c:\windows\assembly\NativeImages_v2.0.50727_32\WindowsLive.Writer.#\2c33802e7c96214ca3ccd16fbcfb23ac\WindowsLive.Writer.Interop.Mshtml.ni.dll
+ 2009-02-21 10:25:51 143,360 ----a-w c:\windows\assembly\NativeImages_v2.0.50727_32\WindowsLive.Writer.#\2ea8254913c340449dfef5eab0c11132\WindowsLive.Writer.Extensibility.ni.dll
+ 2009-02-21 10:25:43 204,800 ----a-w c:\windows\assembly\NativeImages_v2.0.50727_32\WindowsLive.Writer.#\3c032db5ea08b74985741fecea9901e7\WindowsLive.Writer.BrowserControl.ni.dll
+ 2009-02-21 10:25:48 475,136 ----a-w c:\windows\assembly\NativeImages_v2.0.50727_32\WindowsLive.Writer.#\3c8d98a31e6ce44fb21fafeec5d30907\WindowsLive.Writer.Localization.ni.dll
+ 2009-02-21 10:25:49 135,168 ----a-w c:\windows\assembly\NativeImages_v2.0.50727_32\WindowsLive.Writer.#\4578d0151828784ab5a83bf98b7e944b\WindowsLive.Writer.Passport.ni.dll
+ 2009-02-21 10:25:44 176,128 ----a-w c:\windows\assembly\NativeImages_v2.0.50727_32\WindowsLive.Writer.#\52ead08fcc34cd44bbc0092fb771d442\WindowsLive.Writer.HtmlParser.ni.dll
+ 2009-02-21 10:25:52 114,688 ----a-w c:\windows\assembly\NativeImages_v2.0.50727_32\WindowsLive.Writer.#\6b935792a9cc774884db98a8a4292ba6\WindowsLive.Writer.Api.ni.dll
+ 2009-02-21 10:25:42 2,093,056 ----a-w c:\windows\assembly\NativeImages_v2.0.50727_32\WindowsLive.Writer.#\75ee07349433ac44bbbcd9d5f69091d9\WindowsLive.Writer.CoreServices.ni.dll
+ 2009-02-21 10:25:55 376,832 ----a-w c:\windows\assembly\NativeImages_v2.0.50727_32\WindowsLive.Writer.#\9c303fe5161c284299f40eca9b5ae99a\WindowsLive.Writer.SpellChecker.ni.dll
+ 2009-02-21 10:25:34 6,516,736 ----a-w c:\windows\assembly\NativeImages_v2.0.50727_32\WindowsLive.Writer.#\9f8e67718b1cef468e2d6550d02fa6a4\WindowsLive.Writer.PostEditor.ni.dll
+ 2009-02-21 10:25:43 352,256 ----a-w c:\windows\assembly\NativeImages_v2.0.50727_32\WindowsLive.Writer.#\b20e66fe784caf4492e6847d9668b4af\WindowsLive.Writer.Interop.SHDocVw.ni.dll
+ 2009-02-21 10:25:56 163,840 ----a-w c:\windows\assembly\NativeImages_v2.0.50727_32\WindowsLive.Writer.#\bbb249e5dffd124eb01d6992ae852b3e\WindowsLive.Writer.Instrumentation.ni.dll
+ 2009-02-21 10:25:54 643,072 ----a-w c:\windows\assembly\NativeImages_v2.0.50727_32\WindowsLive.Writer.#\cec337500edbe24f9fbcb2b26ee5992d\WindowsLive.Writer.HtmlEditor.ni.dll
+ 2009-02-21 10:25:55 139,264 ----a-w c:\windows\assembly\NativeImages_v2.0.50727_32\WindowsLive.Writer.#\d708787d6e42c644a1e0505bf3d5d2a4\WindowsLive.Writer.FileDestinations.ni.dll
+ 2009-02-21 10:25:36 876,544 ----a-w c:\windows\assembly\NativeImages_v2.0.50727_32\WindowsLive.Writer.#\e2b340261ff59444854fb15c1522ea9e\WindowsLive.Writer.Controls.ni.dll
+ 2009-02-21 10:25:49 286,720 ----a-w c:\windows\assembly\NativeImages_v2.0.50727_32\WindowsLive.Writer.#\f01be205262d254c92b34652cfdd4770\WindowsLive.Writer.Mshtml.ni.dll
+ 2009-02-21 10:25:56 638,976 ----a-w c:\windows\assembly\NativeImages_v2.0.50727_32\WindowsLiveLocal.Wr#\11fd6030b118d4459bb6517246a5a9c1\WindowsLiveLocal.WriterPlugin.ni.dll
+ 2009-02-21 10:25:25 49,152 ----a-w c:\windows\assembly\NativeImages_v2.0.50727_32\WindowsLiveWriter\3f11b0d1670abb4f9806d5e16f940639\WindowsLiveWriter.ni.exe
+ 2009-01-29 21:51:46 62,288 ----a-r c:\windows\Installer\{01523985-2098-43AF-9C97-12B07BE02A9B}\IconWlc.exe
+ 2009-02-21 10:03:26 80,395 ----a-r c:\windows\Installer\{059C042E-796A-4ACC-A81A-ECC2010BB78C}\MsblIco.Exe
+ 2009-02-21 10:04:43 132,096 ----a-r c:\windows\Installer\{44E54A81-9D91-4AA1-9417-80AFF134F5FF}\WLXPhotoGalleryIcon.exe
+ 2009-02-21 10:03:45 58,945 ----a-r c:\windows\Installer\{63DC2DA0-2A6C-4C38-9249-B75395458657}\wlmail.exe
+ 2009-02-21 10:02:49 62,304 ----a-r c:\windows\Installer\{82C7B308-0BDD-49D8-8EA5-9CD3A3F9DF41}\IconWlc.exe
+ 2008-06-17 19:02:15 8,517,632 -c----w c:\windows\system32\dllcache\shell32.dll
+ 2005-11-19 01:13:18 20,096 ----a-w c:\windows\system32\drivers\PCASp50.sys
+ 2009-02-06 17:08:42 55,152 -c--a-w c:\windows\system32\DRVSTORE\fssfltr_A1BAE7BA557F7F8ABCBF040E8C71D6B14223DCB0\fssfltr_tdi.sys
- 2008-04-14 02:33:41 8,517,632 ----a-w c:\windows\system32\shell32.dll
+ 2008-06-17 19:02:15 8,517,632 ----a-w c:\windows\system32\shell32.dll
- 2007-11-30 11:19:06 18,296 ------w c:\windows\system32\spmsg.dll
+ 2008-07-09 07:40:22 18,296 ------w c:\windows\system32\spmsg.dll
+ 2009-03-09 18:06:21 16,384 ----atw c:\windows\temp\Perflib_Perfdata_7c4.dat
+ 2007-12-03 17:58:42 479,232 ----a-w c:\windows\WinSxS\x86_Microsoft.VC80.CRT_1fc8b3b9a1e18e3b_8.0.50727.1801_x-ww_5eed8217\msvcm80.dll
+ 2007-12-04 01:56:54 558,080 ----a-w c:\windows\WinSxS\x86_Microsoft.VC80.CRT_1fc8b3b9a1e18e3b_8.0.50727.1801_x-ww_5eed8217\msvcp80.dll
+ 2007-12-04 01:56:56 635,904 ----a-w c:\windows\WinSxS\x86_Microsoft.VC80.CRT_1fc8b3b9a1e18e3b_8.0.50727.1801_x-ww_5eed8217\msvcr80.dll
+ 2007-11-06 19:23:58 224,768 ----a-w c:\windows\WinSxS\x86_Microsoft.VC90.CRT_1fc8b3b9a1e18e3b_9.0.21022.8_x-ww_d08d0375\msvcm90.dll
+ 2007-11-07 00:19:34 568,832 ----a-w c:\windows\WinSxS\x86_Microsoft.VC90.CRT_1fc8b3b9a1e18e3b_9.0.21022.8_x-ww_d08d0375\msvcp90.dll
+ 2007-11-07 00:19:34 655,872 ----a-w c:\windows\WinSxS\x86_Microsoft.VC90.CRT_1fc8b3b9a1e18e3b_9.0.21022.8_x-ww_d08d0375\msvcr90.dll
.
-- Instantané actualisé --
.
((((((((((((((((((((((((((((((((( Points de chargement Reg ))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* les éléments vides & les éléments initiaux légitimes ne sont pas listés
REGEDIT4
[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"CTFMON.EXE"="c:\windows\system32\ctfmon.exe" [2008-04-14 15360]
"MsnMsgr"="c:\program files\Windows Live\Messenger\msnmsgr.exe" [2009-02-06 3885408]
"SpybotSD TeaTimer"="c:\program files\Spybot - Search & Destroy\TeaTimer.exe" [2009-01-26 2144088]
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"NvCplDaemon"="c:\windows\system32\NvCpl.dll" [2006-01-24 7311360]
"BigDogPath"="c:\windows\VM_STI.EXE" [2005-02-28 53248]
"Adobe Reader Speed Launcher"="c:\program files\Adobe\Reader 9.0\Reader\Reader_sl.exe" [2008-06-12 34672]
[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run]
"CTFMON.EXE"="c:\windows\system32\CTFMON.EXE" [2008-04-14 15360]
c:\documents and settings\All Users\Menu D‚marrer\Programmes\D‚marrage\
Acer Empowering Technology.lnk - c:\acer\Empowering Technology\Acer.Empowering.Framework.Launcher.exe [2006-10-09 45056]
Acer WLAN 11g USB Dongle.lnk - c:\program files\Acer WLAN 11g USB Dongle\ZDWlan.exe [2005-11-16 745472]
Microsoft Office.lnk - c:\program files\Microsoft Office\Office10\OSA.EXE [2001-02-13 83360]
Post-it© Software Notes Lite.lnk - c:\program files\3M\PSNLite\PsnLite.exe [2004-10-15 2080768]
[HKEY_LOCAL_MACHINE\software\microsoft\security center]
"AntiVirusDisableNotify"=dword:00000001
[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\ZoneLabsFirewall]
"DisableMonitoring"=dword:00000001
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%windir%\\system32\\sessmgr.exe"=
"c:\\Program Files\\Acer TV-FM\\PowerCinema.exe"=
"c:\\Program Files\\Acer TV-FM\\PCMService.exe"=
"c:\\Program Files\\Messenger\\msmsgs.exe"=
"%windir%\\Network Diagnostic\\xpnetdiag.exe"=
"c:\documents and settings\Baudry Ludmilla\Application Data\Facebook\facebook.exe"= c:\documents and settings\Baudry Ludmilla\Application Data\Facebook\facebook.exe:127.0.0.1/255.255.255.255:Enabled:Facebook
"c:\\Program Files\\Mozilla Firefox\\firefox.exe"=
"c:\\Program Files\\Windows Live\\Messenger\\msnmsgr.exe"=
"c:\\Program Files\\Windows Live\\Sync\\WindowsLiveSync.exe"=
R2 fssfltr;FssFltr;c:\windows\system32\drivers\fssfltr_tdi.sys [2009-02-21 55152]
R2 SeaPort;SeaPort;c:\program files\Microsoft\Search Enhancement Pack\SeaPort\SeaPort.exe [2009-01-14 226656]
S3 fsssvc;Windows Live Contrôle parental;c:\program files\Windows Live\Family Safety\fsssvc.exe [2009-02-06 533360]
--- Autres Services/Pilotes en mémoire ---
*NewlyCreated* - EAPHOST
*NewlyCreated* - IP6FW
.
.
------- Examen supplémentaire -------
.
uStart Page = hxxp://www.google.fr/
uDefault_Search_URL = hxxp://www.google.com/ie
uSearchMigratedDefaultURL = hxxp://www.google.com/search?q={searchTerms}&sourceid=ie7&rls=com.microsoft:en-US&ie=utf8&oe=utf8
uSearchURL,(Default) = hxxp://www.google.com/search?q=%s
IE: E&xporter vers Microsoft Excel - c:\progra~1\MICROS~2\Office10\EXCEL.EXE/3000
FF - ProfilePath - c:\documents and settings\Baudry Ludmilla\Application Data\Mozilla\Firefox\Profiles\[u]0/u343ewk6.default\
FF - prefs.js: browser.startup.homepage - hxxp://www.google.fr/
FF - prefs.js: keyword.URL - hxxp://search.sweetim.com/search.asp?src=2&q=
FF - prefs.js: network.proxy.type - 4
FF - component: c:\program files\Mozilla Firefox\components\xpinstal.dll
.
**************************************************************************
catchme 0.3.1367 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2009-03-09 19:14:03
Windows 5.1.2600 Service Pack 3 NTFS
Recherche de processus cachés ...
Recherche d'éléments en démarrage automatique cachés ...
Recherche de fichiers cachés ...
Scan terminé avec succès
Fichiers cachés: 0
**************************************************************************
.
Heure de fin: 2009-03-09 19:15:00
ComboFix-quarantined-files.txt 2009-03-09 18:14:58
ComboFix2.txt 2009-01-26 13:06:06
Avant-CF: 39 248 257 024 octets libres
Après-CF: 39,587,102,720 octets libres
171 --- E O F --- 2009-03-08 23:39:19
Voilà...
Tout ceci me semble être du charabia, je ne sais pas comment l'interpréter ^^
jlpjlp
Messages postés
51580
Date d'inscription
vendredi 18 mai 2007
Statut
Contributeur sécurité
Dernière intervention
3 mai 2022
5 040
9 mars 2009 à 20:47
9 mars 2009 à 20:47
colle un scan rapide avec malwarebyte
https://www.malekal.com/tutoriel-malwarebyte-anti-malware/
_______________
tu as quel antivirus????
_______________
cela plante toujours???
_______________
Télécharges AD-Remover ( de Cyrildu17 / C_XX ) sur ton bureau :
http://sd-1.archive-host.com/membres/up/16506160323759868/AD-R.exe
/!\ Déconnectes toi et fermes toutes applications en cours
● Double clique sur le programme d'installation , et installe le dans son emplacement par défaut. ( C:\Program files )
● Double clique sur l'icône Ad-removersituée sur ton bureau
● Au menu principal choisi l'option "A"
● Postes le rapport qui apparait à la fin .
( le rapport est sauvegardé aussi sous C:\Ad-report(date).log )
(CTRL+A Pour tout selectionner , CTRL+C pour copier et CTRL+V pour coller )
Note :
"Process.exe", une composante de l'outil, est détecté par certains antivirus (AntiVir, Dr.Web, Kaspersky Anti-Virus) comme étant un RiskTool.
Il ne s'agit pas d'un virus, mais d'un utilitaire destiné à mettre fin à des processus.
Mis entre de mauvaises mains, cet utilitaire pourrait arrêter des logiciels de sécurité (Antivirus, Firewall...) d'où l'alerte émise par ces antivirus.
https://www.malekal.com/tutoriel-malwarebyte-anti-malware/
_______________
tu as quel antivirus????
_______________
cela plante toujours???
_______________
Télécharges AD-Remover ( de Cyrildu17 / C_XX ) sur ton bureau :
http://sd-1.archive-host.com/membres/up/16506160323759868/AD-R.exe
/!\ Déconnectes toi et fermes toutes applications en cours
● Double clique sur le programme d'installation , et installe le dans son emplacement par défaut. ( C:\Program files )
● Double clique sur l'icône Ad-removersituée sur ton bureau
● Au menu principal choisi l'option "A"
● Postes le rapport qui apparait à la fin .
( le rapport est sauvegardé aussi sous C:\Ad-report(date).log )
(CTRL+A Pour tout selectionner , CTRL+C pour copier et CTRL+V pour coller )
Note :
"Process.exe", une composante de l'outil, est détecté par certains antivirus (AntiVir, Dr.Web, Kaspersky Anti-Virus) comme étant un RiskTool.
Il ne s'agit pas d'un virus, mais d'un utilitaire destiné à mettre fin à des processus.
Mis entre de mauvaises mains, cet utilitaire pourrait arrêter des logiciels de sécurité (Antivirus, Firewall...) d'où l'alerte émise par ces antivirus.
Re,
Alors voilà c'est fait, ça m'a donné ça... 2fichiers de plus infectés...
Malwarebytes' Anti-Malware 1.34
Version de la base de données: 1829
Windows 5.1.2600 Service Pack 3
10/03/2009 00:41:53
mbam-log-2009-03-10 (00-41-53).txt
Type de recherche: Examen rapide
Eléments examinés: 62789
Temps écoulé: 2 minute(s), 9 second(s)
Processus mémoire infecté(s): 0
Module(s) mémoire infecté(s): 0
Clé(s) du Registre infectée(s): 1
Valeur(s) du Registre infectée(s): 0
Elément(s) de données du Registre infecté(s): 0
Dossier(s) infecté(s): 0
Fichier(s) infecté(s): 1
Processus mémoire infecté(s):
(Aucun élément nuisible détecté)
Module(s) mémoire infecté(s):
(Aucun élément nuisible détecté)
Clé(s) du Registre infectée(s):
HKEY_LOCAL_MACHINE\SOFTWARE\EoRezo (Rogue.Eorezo) -> Quarantined and deleted successfully.
Valeur(s) du Registre infectée(s):
(Aucun élément nuisible détecté)
Elément(s) de données du Registre infecté(s):
(Aucun élément nuisible détecté)
Dossier(s) infecté(s):
(Aucun élément nuisible détecté)
Fichier(s) infecté(s):
C:\Program Files\eoRezo (Rogue.Eorezo) -> Delete on reboot.
Et ça plante toujours...
Et pour répondre à ta question J'ai avast et spybot comme protections résidentes.
Alors voilà c'est fait, ça m'a donné ça... 2fichiers de plus infectés...
Malwarebytes' Anti-Malware 1.34
Version de la base de données: 1829
Windows 5.1.2600 Service Pack 3
10/03/2009 00:41:53
mbam-log-2009-03-10 (00-41-53).txt
Type de recherche: Examen rapide
Eléments examinés: 62789
Temps écoulé: 2 minute(s), 9 second(s)
Processus mémoire infecté(s): 0
Module(s) mémoire infecté(s): 0
Clé(s) du Registre infectée(s): 1
Valeur(s) du Registre infectée(s): 0
Elément(s) de données du Registre infecté(s): 0
Dossier(s) infecté(s): 0
Fichier(s) infecté(s): 1
Processus mémoire infecté(s):
(Aucun élément nuisible détecté)
Module(s) mémoire infecté(s):
(Aucun élément nuisible détecté)
Clé(s) du Registre infectée(s):
HKEY_LOCAL_MACHINE\SOFTWARE\EoRezo (Rogue.Eorezo) -> Quarantined and deleted successfully.
Valeur(s) du Registre infectée(s):
(Aucun élément nuisible détecté)
Elément(s) de données du Registre infecté(s):
(Aucun élément nuisible détecté)
Dossier(s) infecté(s):
(Aucun élément nuisible détecté)
Fichier(s) infecté(s):
C:\Program Files\eoRezo (Rogue.Eorezo) -> Delete on reboot.
Et ça plante toujours...
Et pour répondre à ta question J'ai avast et spybot comme protections résidentes.
jlpjlp
Messages postés
51580
Date d'inscription
vendredi 18 mai 2007
Statut
Contributeur sécurité
Dernière intervention
3 mai 2022
5 040
10 mars 2009 à 10:21
10 mars 2009 à 10:21
Télécharges AD-Remover ( de Cyrildu17 / C_XX ) sur ton bureau :
http://sd-1.archive-host.com/membres/up/16506160323759868/AD-R.exe
/!\ Déconnectes toi et fermes toutes applications en cours
● Double clique sur le programme d'installation , et installe le dans son emplacement par défaut. ( C:\Program files )
● Double clique sur l'icône Ad-removersituée sur ton bureau
● Au menu principal choisi l'option "A"
● Postes le rapport qui apparait à la fin .
( le rapport est sauvegardé aussi sous C:\Ad-report(date).log )
(CTRL+A Pour tout selectionner , CTRL+C pour copier et CTRL+V pour coller )
Note :
"Process.exe", une composante de l'outil, est détecté par certains antivirus (AntiVir, Dr.Web, Kaspersky Anti-Virus) comme étant un RiskTool.
Il ne s'agit pas d'un virus, mais d'un utilitaire destiné à mettre fin à des processus.
Mis entre de mauvaises mains, cet utilitaire pourrait arrêter des logiciels de sécurité (Antivirus, Firewall...) d'où l'alerte émise par ces antivirus.
http://sd-1.archive-host.com/membres/up/16506160323759868/AD-R.exe
/!\ Déconnectes toi et fermes toutes applications en cours
● Double clique sur le programme d'installation , et installe le dans son emplacement par défaut. ( C:\Program files )
● Double clique sur l'icône Ad-removersituée sur ton bureau
● Au menu principal choisi l'option "A"
● Postes le rapport qui apparait à la fin .
( le rapport est sauvegardé aussi sous C:\Ad-report(date).log )
(CTRL+A Pour tout selectionner , CTRL+C pour copier et CTRL+V pour coller )
Note :
"Process.exe", une composante de l'outil, est détecté par certains antivirus (AntiVir, Dr.Web, Kaspersky Anti-Virus) comme étant un RiskTool.
Il ne s'agit pas d'un virus, mais d'un utilitaire destiné à mettre fin à des processus.
Mis entre de mauvaises mains, cet utilitaire pourrait arrêter des logiciels de sécurité (Antivirus, Firewall...) d'où l'alerte émise par ces antivirus.
Bonjour,
Hier j'ai fini par faire une recherche minutieuse avec Malwarebyte qui a retrouvé 8 fichiers de plus infectés...
Je les ai supprimés.
Aujourdhui j'ai fait le scan comme indiqué qui m'a donné ceci:
------- LOGFILE OF AD-REMOVER 1.1.1.6 | ONLY XP/VISTA -------
Updated by C_XX on 09/03/2009 at 21:20
Start at: 18:37:52, Mar 10/03/2009 | Boot mode: Normal Boot
Option: SCAN | Executed from: C:\Program Files\Ad-remover\Ad-remover.bat
Operating System: Microsoft® Windows XP™ Service Pack 3 (version 5.1.2600)
Computer Name: ACER-6DEC4164D2
Current User: Baudry Ludmilla - Administrator
Drive(s):
- C:\ (File System: NTFS)
- D:\ (File System: FAT32)
- E:\ (File System: CDFS)
- F:\ (File System: FAT)
System Drive: C:\
Windows Directory: C:\WINDOWS\
System Directory: C:\WINDOWS\System32\
--- Running Processes: 34
+-----------------| Boonty/Boonty Games Elements Found:
.
.
+-----------------| Eorezo Elements Found:
HKCR\CLSID\{64F56FC1-1272-44CD-BA6E-39723696E350}
HKCR\EoRezoBHO.EoBho
HKCR\EoRezoBHO.EoBho.1
HKCR\Interface\{B0D071A1-36B3-4757-A126-14C89C56013A}
HKCR\Typelib\{B4C656C9-F2E9-4E77-B3F4-443DF2BD778F}
HKCU\Software\EoRezo
HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{64F56FC1-1272-44CD-BA6E-39723696E350}
HKLM\Software\Classes\CLSID\{64F56FC1-1272-44CD-BA6E-39723696E350}
HKLM\Software\Classes\EoRezoBHO.EoBho
HKLM\Software\Classes\EoRezoBHO.EoBho.1
HKLM\Software\Classes\TypeLib\{B4C656C9-F2E9-4E77-B3F4-443DF2BD778F}
HKLM\Software\Classes\Interface\{B0D071A1-36B3-4757-A126-14C89C56013A}
HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{64F56FC1-1272-44CD-BA6E-39723696E350}
.
C:\Documents and Settings\Baudry Ludmilla\Application Data\EoRezo
C:\Documents and Settings\Baudry Ludmilla\Cookies\baudry ludmilla@eorezo[1].txt
C:\Documents and Settings\Baudry Ludmilla\Cookies\baudry ludmilla@scache3.eorezo[1].txt
+-----------------| Infected Poker Softwares Elements Found:
HKCU\Software\Titan Poker
HKLM\Software\Titan Poker
HKU\S-1-5-21-4222489996-1315135592-3599084046-1006\Software\Titan Poker
.
+-----------------| FunWebProducts/MyWay/MyWebSearch Elements Found:
.
.
+-----------------| It's TV Elements Found:
HKCU\Software\ItsLabel
HKLM\Software\ItsLabel
HKU\S-1-5-21-4222489996-1315135592-3599084046-1006\Software\ItsLabel
.
C:\Documents and Settings\Baudry Ludmilla\Application Data\ItsLabel
+-----------------| Sweetim Elements Found:
HKCU\Software\SweetIM
HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{EEE6C35C-6118-11DC-9C72-001320C79847}
HKLM\Software\SweetIM
.
C:\Documents and Settings\Baudry Ludmilla\Application Data\Mozilla\Firefox\Profiles\0343ewk6.default\searchplugins\sweetim.xml
C:\Documents and Settings\Baudry Ludmilla\Application Data\Mozilla\Firefox\Profiles\0343ewk6.default\extensions\{EEE6C361-6118-11DC-9C72-001320C79847}
C:\Documents and Settings\Baudry Ludmilla\Application Data\Mozilla\Firefox\Profiles\0343ewk6.default\SweetIMToolbarData
C:\Documents and Settings\Baudry Ludmilla\Cookies\baudry_ludmilla@search.sweetim[1].txt
C:\Documents and Settings\Baudry Ludmilla\Cookies\baudry_ludmilla@sweetim[2].txt
+-----------------| Other Adwares Found:
.
.
C:\Documents and Settings\Baudry Ludmilla\Cookies\baudry ludmilla@atdmt[2].txt
C:\Documents and Settings\Baudry Ludmilla\Cookies\baudry_ludmilla@bs.serving-sys[1].txt
+-----------------| Added Scan:
---- Mozilla FireFox Version 2.0.0.20 ----
ProfilePath: 0343ewk6.default
.
.
(Prefs.js) FOUND: user_pref("keyword.URL", "https://search.sweetim.com/search.asp?src=2&q=");
(Prefs.js) FOUND: user_pref("sweetim.toolbar.highlight.colors", "#FFFF00,#00FFE4,#5AFF00,#0087FF,#FFCC00,#FF00F0");
(Prefs.js) FOUND: user_pref("sweetim.toolbar.logger.ConsoleHandler.MinReportLevel", "7");
(Prefs.js) FOUND: user_pref("sweetim.toolbar.logger.FileHandler.FileName", "ff-toolbar.log");
(Prefs.js) FOUND: user_pref("sweetim.toolbar.logger.FileHandler.MaxFileSize", "200000");
(Prefs.js) FOUND: user_pref("sweetim.toolbar.logger.FileHandler.MinReportLevel", "7");
(Prefs.js) FOUND: user_pref("sweetim.toolbar.mode.debug", "false");
(Prefs.js) FOUND: user_pref("sweetim.toolbar.previous.keyword.URL", "chrome://browser-region/locale/region.properties");
(Prefs.js) FOUND: user_pref("sweetim.toolbar.search.external", "<?xml version=\"1.0\"?><TOOLBAR><EXTERNAL_SEARCH engine=\"http://*google.*\" param=\"q=\" /><EXTERNAL_SEARCH engine=\"https://search.yahoo.com/*\" param=\"p=\" /><EXTERNAL_SEARCH engine=\"http://search.sweetim.*\" param=\"q=\" /><EXTERNAL_SEARCH engine=\"http://*.live.*/*\" param=\"q=\" /><EXTERNAL_SEARCH engine=\"http://*youtube.com/\" param=\"search_query=\" /><EXTERNAL_SEARCH engine=\"http://*.ebay.*/search/*\" param=\"satitle=\" /><EXTERNAL_SEARCH engine=\"http://*.amazon.com/s/*\" param=\"field-keywords=\" /></TOOLBAR>");
(Prefs.js) FOUND: user_pref("sweetim.toolbar.search.history.capacity", "10");
(Prefs.js) FOUND: user_pref("sweetim.toolbar.simapp_id", "{4E8072A0-8E33-11DD-B195-001556DD5D9C}");
(Prefs.js) FOUND: user_pref("sweetim.toolbar.version", "1.0.0.6");
.
.
.
.
---- Internet Explorer Version 7.0.5730.13 ----
+-[HKEY_CURRENT_USER\..\Internet Explorer\Main]
Default_Search_URL: hxxp://www.google.com/ie
Search bar: hxxp://g.msn.fr/0SEFRFR/SAOS02
Search Page: hxxp://home.microsoft.com/access/allinone.asp
Start page: hxxp://www.google.fr/
+-[HKEY_USERS\S-1-5-21-4222489996-1315135592-3599084046-1006\..\Internet Explorer\Main]
Default_Search_URL: hxxp://www.google.com/ie
Search bar: hxxp://g.msn.fr/0SEFRFR/SAOS02
Search Page: hxxp://home.microsoft.com/access/allinone.asp
Start page: hxxp://www.google.fr/
+-[HKEY_LOCAL_MACHINE\..\Internet Explorer\Main]
Default_Page_URL: hxxp://go.microsoft.com/fwlink/?LinkId=69157
Default_Search_URL: hxxp://www.microsoft.com/isapi/redir.dll?prd=ie&ar=iesearch
Search Page: hxxp://go.microsoft.com/fwlink/?LinkId=54896
Start page: hxxp://go.microsoft.com/fwlink/?LinkId=69157
+-[HKEY_LOCAL_MACHINE\..\Internet Explorer\ABOUTURLS]
Tabs: hxxp://ieframe.dll/tabswelcome.htm
+---------------------------------------------------------------------------+
6045 Byte(s) - C:\Ad-Report-Scan-10.03.2009.log
0 File(s) - C:\Program Files\Ad-remover\TOOLS\BACKUP
0 File(s) - C:\Program Files\Ad-remover\TOOLS\QUARANTINE
Before run: 39,714,238,464 Byte(s) free
After run: Byte(s) free
End at: 18:38:46 | 10/03/2009
.
+-----------------| E.O.F - 106 Lines
.
Voilà...
Hier j'ai fini par faire une recherche minutieuse avec Malwarebyte qui a retrouvé 8 fichiers de plus infectés...
Je les ai supprimés.
Aujourdhui j'ai fait le scan comme indiqué qui m'a donné ceci:
------- LOGFILE OF AD-REMOVER 1.1.1.6 | ONLY XP/VISTA -------
Updated by C_XX on 09/03/2009 at 21:20
Start at: 18:37:52, Mar 10/03/2009 | Boot mode: Normal Boot
Option: SCAN | Executed from: C:\Program Files\Ad-remover\Ad-remover.bat
Operating System: Microsoft® Windows XP™ Service Pack 3 (version 5.1.2600)
Computer Name: ACER-6DEC4164D2
Current User: Baudry Ludmilla - Administrator
Drive(s):
- C:\ (File System: NTFS)
- D:\ (File System: FAT32)
- E:\ (File System: CDFS)
- F:\ (File System: FAT)
System Drive: C:\
Windows Directory: C:\WINDOWS\
System Directory: C:\WINDOWS\System32\
--- Running Processes: 34
+-----------------| Boonty/Boonty Games Elements Found:
.
.
+-----------------| Eorezo Elements Found:
HKCR\CLSID\{64F56FC1-1272-44CD-BA6E-39723696E350}
HKCR\EoRezoBHO.EoBho
HKCR\EoRezoBHO.EoBho.1
HKCR\Interface\{B0D071A1-36B3-4757-A126-14C89C56013A}
HKCR\Typelib\{B4C656C9-F2E9-4E77-B3F4-443DF2BD778F}
HKCU\Software\EoRezo
HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{64F56FC1-1272-44CD-BA6E-39723696E350}
HKLM\Software\Classes\CLSID\{64F56FC1-1272-44CD-BA6E-39723696E350}
HKLM\Software\Classes\EoRezoBHO.EoBho
HKLM\Software\Classes\EoRezoBHO.EoBho.1
HKLM\Software\Classes\TypeLib\{B4C656C9-F2E9-4E77-B3F4-443DF2BD778F}
HKLM\Software\Classes\Interface\{B0D071A1-36B3-4757-A126-14C89C56013A}
HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{64F56FC1-1272-44CD-BA6E-39723696E350}
.
C:\Documents and Settings\Baudry Ludmilla\Application Data\EoRezo
C:\Documents and Settings\Baudry Ludmilla\Cookies\baudry ludmilla@eorezo[1].txt
C:\Documents and Settings\Baudry Ludmilla\Cookies\baudry ludmilla@scache3.eorezo[1].txt
+-----------------| Infected Poker Softwares Elements Found:
HKCU\Software\Titan Poker
HKLM\Software\Titan Poker
HKU\S-1-5-21-4222489996-1315135592-3599084046-1006\Software\Titan Poker
.
+-----------------| FunWebProducts/MyWay/MyWebSearch Elements Found:
.
.
+-----------------| It's TV Elements Found:
HKCU\Software\ItsLabel
HKLM\Software\ItsLabel
HKU\S-1-5-21-4222489996-1315135592-3599084046-1006\Software\ItsLabel
.
C:\Documents and Settings\Baudry Ludmilla\Application Data\ItsLabel
+-----------------| Sweetim Elements Found:
HKCU\Software\SweetIM
HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{EEE6C35C-6118-11DC-9C72-001320C79847}
HKLM\Software\SweetIM
.
C:\Documents and Settings\Baudry Ludmilla\Application Data\Mozilla\Firefox\Profiles\0343ewk6.default\searchplugins\sweetim.xml
C:\Documents and Settings\Baudry Ludmilla\Application Data\Mozilla\Firefox\Profiles\0343ewk6.default\extensions\{EEE6C361-6118-11DC-9C72-001320C79847}
C:\Documents and Settings\Baudry Ludmilla\Application Data\Mozilla\Firefox\Profiles\0343ewk6.default\SweetIMToolbarData
C:\Documents and Settings\Baudry Ludmilla\Cookies\baudry_ludmilla@search.sweetim[1].txt
C:\Documents and Settings\Baudry Ludmilla\Cookies\baudry_ludmilla@sweetim[2].txt
+-----------------| Other Adwares Found:
.
.
C:\Documents and Settings\Baudry Ludmilla\Cookies\baudry ludmilla@atdmt[2].txt
C:\Documents and Settings\Baudry Ludmilla\Cookies\baudry_ludmilla@bs.serving-sys[1].txt
+-----------------| Added Scan:
---- Mozilla FireFox Version 2.0.0.20 ----
ProfilePath: 0343ewk6.default
.
.
(Prefs.js) FOUND: user_pref("keyword.URL", "https://search.sweetim.com/search.asp?src=2&q=");
(Prefs.js) FOUND: user_pref("sweetim.toolbar.highlight.colors", "#FFFF00,#00FFE4,#5AFF00,#0087FF,#FFCC00,#FF00F0");
(Prefs.js) FOUND: user_pref("sweetim.toolbar.logger.ConsoleHandler.MinReportLevel", "7");
(Prefs.js) FOUND: user_pref("sweetim.toolbar.logger.FileHandler.FileName", "ff-toolbar.log");
(Prefs.js) FOUND: user_pref("sweetim.toolbar.logger.FileHandler.MaxFileSize", "200000");
(Prefs.js) FOUND: user_pref("sweetim.toolbar.logger.FileHandler.MinReportLevel", "7");
(Prefs.js) FOUND: user_pref("sweetim.toolbar.mode.debug", "false");
(Prefs.js) FOUND: user_pref("sweetim.toolbar.previous.keyword.URL", "chrome://browser-region/locale/region.properties");
(Prefs.js) FOUND: user_pref("sweetim.toolbar.search.external", "<?xml version=\"1.0\"?><TOOLBAR><EXTERNAL_SEARCH engine=\"http://*google.*\" param=\"q=\" /><EXTERNAL_SEARCH engine=\"https://search.yahoo.com/*\" param=\"p=\" /><EXTERNAL_SEARCH engine=\"http://search.sweetim.*\" param=\"q=\" /><EXTERNAL_SEARCH engine=\"http://*.live.*/*\" param=\"q=\" /><EXTERNAL_SEARCH engine=\"http://*youtube.com/\" param=\"search_query=\" /><EXTERNAL_SEARCH engine=\"http://*.ebay.*/search/*\" param=\"satitle=\" /><EXTERNAL_SEARCH engine=\"http://*.amazon.com/s/*\" param=\"field-keywords=\" /></TOOLBAR>");
(Prefs.js) FOUND: user_pref("sweetim.toolbar.search.history.capacity", "10");
(Prefs.js) FOUND: user_pref("sweetim.toolbar.simapp_id", "{4E8072A0-8E33-11DD-B195-001556DD5D9C}");
(Prefs.js) FOUND: user_pref("sweetim.toolbar.version", "1.0.0.6");
.
.
.
.
---- Internet Explorer Version 7.0.5730.13 ----
+-[HKEY_CURRENT_USER\..\Internet Explorer\Main]
Default_Search_URL: hxxp://www.google.com/ie
Search bar: hxxp://g.msn.fr/0SEFRFR/SAOS02
Search Page: hxxp://home.microsoft.com/access/allinone.asp
Start page: hxxp://www.google.fr/
+-[HKEY_USERS\S-1-5-21-4222489996-1315135592-3599084046-1006\..\Internet Explorer\Main]
Default_Search_URL: hxxp://www.google.com/ie
Search bar: hxxp://g.msn.fr/0SEFRFR/SAOS02
Search Page: hxxp://home.microsoft.com/access/allinone.asp
Start page: hxxp://www.google.fr/
+-[HKEY_LOCAL_MACHINE\..\Internet Explorer\Main]
Default_Page_URL: hxxp://go.microsoft.com/fwlink/?LinkId=69157
Default_Search_URL: hxxp://www.microsoft.com/isapi/redir.dll?prd=ie&ar=iesearch
Search Page: hxxp://go.microsoft.com/fwlink/?LinkId=54896
Start page: hxxp://go.microsoft.com/fwlink/?LinkId=69157
+-[HKEY_LOCAL_MACHINE\..\Internet Explorer\ABOUTURLS]
Tabs: hxxp://ieframe.dll/tabswelcome.htm
+---------------------------------------------------------------------------+
6045 Byte(s) - C:\Ad-Report-Scan-10.03.2009.log
0 File(s) - C:\Program Files\Ad-remover\TOOLS\BACKUP
0 File(s) - C:\Program Files\Ad-remover\TOOLS\QUARANTINE
Before run: 39,714,238,464 Byte(s) free
After run: Byte(s) free
End at: 18:38:46 | 10/03/2009
.
+-----------------| E.O.F - 106 Lines
.
Voilà...
jlpjlp
Messages postés
51580
Date d'inscription
vendredi 18 mai 2007
Statut
Contributeur sécurité
Dernière intervention
3 mai 2022
5 040
10 mars 2009 à 20:14
10 mars 2009 à 20:14
refais ad remover option B , selectionne tout et supprime tout
et colle le rapport
ensuite dis si encore des soucis
et colle le rapport
ensuite dis si encore des soucis
Voilà le post que ad aware m'a envoyé une fois les fichiers supprimés:
------- LOGFILE OF AD-REMOVER 1.1.1.6 | ONLY XP/VISTA -------
Updated by C_XX on 09/03/2009 at 21:20
**** LIMITED TO ****
Boonty/BoontyGames
Eorezo
Infected Poker Softwares
FunWebProduct/MyWay/MyWebSearch
It's TV
Sweetim
Other Adwares
********************
Start at: 19:00:29, Mar 10/03/2009 | Boot mode: Normal Boot
Option: CLEAN | Executed from: C:\Program Files\Ad-remover\Ad-remover.bat
Operating System: Microsoft® Windows XP™ Service Pack 3 (version 5.1.2600)
Computer Name: ACER-6DEC4164D2
Current User: Baudry Ludmilla - Administrator
Drive(s):
- C:\ (File System: NTFS)
- D:\ (File System: FAT32)
- E:\ (File System: CDFS)
System Drive: C:\
Windows Directory: C:\WINDOWS\
System Directory: C:\WINDOWS\System32\
--- Running Processes: 37
(!) ---- IE start pages/Tabs reset
+-----------------| Boonty/Boonty Games Elements Deleted :
.
.
+-----------------| Eorezo Elements Deleted :
HKCR\CLSID\{64F56FC1-1272-44CD-BA6E-39723696E350}
HKCR\EoRezoBHO.EoBho
HKCR\EoRezoBHO.EoBho.1
HKCR\Interface\{B0D071A1-36B3-4757-A126-14C89C56013A}
HKCR\Typelib\{B4C656C9-F2E9-4E77-B3F4-443DF2BD778F}
HKCU\Software\EoRezo
HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{64F56FC1-1272-44CD-BA6E-39723696E350}
HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{64F56FC1-1272-44CD-BA6E-39723696E350}
.
C:\Documents and Settings\Baudry Ludmilla\Application Data\EoRezo
C:\Documents and Settings\Baudry Ludmilla\Cookies\baudry ludmilla@eorezo[1].txt
C:\Documents and Settings\Baudry Ludmilla\Cookies\baudry ludmilla@scache3.eorezo[1].txt
+-----------------| Infected Poker Softwares Elements Deleted :
HKCU\Software\Titan Poker
HKLM\Software\Titan Poker
.
+-----------------| FunWebProducts/MyWay/MyWebSearch Elements Deleted :
.
.
+-----------------| It's TV Elements Deleted :
HKCU\Software\ItsLabel
HKLM\Software\ItsLabel
.
C:\Documents and Settings\Baudry Ludmilla\Application Data\ItsLabel
+-----------------| Sweetim Elements Deleted :
HKCU\Software\SweetIM
HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{EEE6C35C-6118-11DC-9C72-001320C79847}
HKLM\Software\SweetIM
.
C:\Documents and Settings\Baudry Ludmilla\Application Data\Mozilla\Firefox\Profiles\0343ewk6.default\searchplugins\sweetim.xml
C:\Documents and Settings\Baudry Ludmilla\Application Data\Mozilla\Firefox\Profiles\0343ewk6.default\extensions\{EEE6C361-6118-11DC-9C72-001320C79847}
C:\Documents and Settings\Baudry Ludmilla\Application Data\Mozilla\Firefox\Profiles\0343ewk6.default\SweetIMToolbarData
C:\Documents and Settings\Baudry Ludmilla\Cookies\baudry_ludmilla@search.sweetim[1].txt
C:\Documents and Settings\Baudry Ludmilla\Cookies\baudry_ludmilla@sweetim[2].txt
+-----------------| Other Adwares Deleted:
.
.
C:\Documents and Settings\Baudry Ludmilla\Cookies\baudry ludmilla@atdmt[2].txt
C:\Documents and Settings\Baudry Ludmilla\Cookies\baudry_ludmilla@bs.serving-sys[1].txt
(!) ---- Temp files deleted.
(!) ---- Recycle bin emptied in all drives.
+-----------------| Added Scan :
---- Mozilla FireFox Version 2.0.0.20 ----
ProfilePath: 0343ewk6.default
.
.
(Prefs.js) REMOVED: user_pref("keyword.URL", "https://search.sweetim.com/search.asp?src=2&q=");
(Prefs.js) REMOVED: user_pref("sweetim.toolbar.highlight.colors", "#FFFF00,#00FFE4,#5AFF00,#0087FF,#FFCC00,#FF00F0");
(Prefs.js) REMOVED: user_pref("sweetim.toolbar.logger.ConsoleHandler.MinReportLevel", "7");
(Prefs.js) REMOVED: user_pref("sweetim.toolbar.logger.FileHandler.FileName", "ff-toolbar.log");
(Prefs.js) REMOVED: user_pref("sweetim.toolbar.logger.FileHandler.MaxFileSize", "200000");
(Prefs.js) REMOVED: user_pref("sweetim.toolbar.logger.FileHandler.MinReportLevel", "7");
(Prefs.js) REMOVED: user_pref("sweetim.toolbar.mode.debug", "false");
(Prefs.js) REMOVED: user_pref("sweetim.toolbar.previous.keyword.URL", "chrome://browser-region/locale/region.properties");
(Prefs.js) REMOVED: user_pref("sweetim.toolbar.search.external", "<?xml version=\"1.0\"?><TOOLBAR><EXTERNAL_SEARCH engine=\"http://*google.*\" param=\"q=\" /><EXTERNAL_SEARCH engine=\"https://search.yahoo.com/*\" param=\"p=\" /><EXTERNAL_SEARCH engine=\"http://search.sweetim.*\" param=\"q=\" /><EXTERNAL_SEARCH engine=\"http://*.live.*/*\" param=\"q=\" /><EXTERNAL_SEARCH engine=\"http://*youtube.com/\" param=\"search_query=\" /><EXTERNAL_SEARCH engine=\"http://*.ebay.*/search/*\" param=\"satitle=\" /><EXTERNAL_SEARCH engine=\"http://*.amazon.com/s/*\" param=\"field-keywords=\" /></TOOLBAR>");
(Prefs.js) REMOVED: user_pref("sweetim.toolbar.search.history.capacity", "10");
(Prefs.js) REMOVED: user_pref("sweetim.toolbar.simapp_id", "{4E8072A0-8E33-11DD-B195-001556DD5D9C}");
(Prefs.js) REMOVED: user_pref("sweetim.toolbar.version", "1.0.0.6");
.
.
.
.
---- Internet Explorer Version 7.0.5730.13 ----
+-[HKEY_CURRENT_USER\..\Internet Explorer\Main]
Default_Page_URL: hxxp://www.microsoft.com/isapi/redir.dll?prd=ie&pver=6&ar=msnhome
Default_Search_URL: hxxp://www.microsoft.com/isapi/redir.dll?prd=ie&ar=iesearch
Search bar: hxxp://go.microsoft.com/fwlink/?linkid=54896
Search Page: hxxp://home.microsoft.com/access/allinone.asp
Start page: hxxp://www.microsoft.com/isapi/redir.dll?prd=ie&pver=6&ar=msnhome
+-[HKEY_USERS\S-1-5-21-4222489996-1315135592-3599084046-1006\..\Internet Explorer\Main]
Default_Page_URL: hxxp://www.microsoft.com/isapi/redir.dll?prd=ie&pver=6&ar=msnhome
Default_Search_URL: hxxp://www.microsoft.com/isapi/redir.dll?prd=ie&ar=iesearch
Search bar: hxxp://go.microsoft.com/fwlink/?linkid=54896
Search Page: hxxp://home.microsoft.com/access/allinone.asp
Start page: hxxp://www.microsoft.com/isapi/redir.dll?prd=ie&pver=6&ar=msnhome
+-[HKEY_LOCAL_MACHINE\..\Internet Explorer\Main]
Default_Page_URL: hxxp://www.microsoft.com/isapi/redir.dll?prd=ie&pver=6&ar=msnhome
Default_Search_URL: hxxp://www.microsoft.com/isapi/redir.dll?prd=ie&ar=iesearch
Search bar: hxxp://search.msn.com/spbasic.htm
Search Page: hxxp://www.microsoft.com/isapi/redir.dll?prd=ie&ar=iesearch
Start page: hxxp://fr.msn.com/
+-[HKEY_LOCAL_MACHINE\..\Internet Explorer\ABOUTURLS]
Tabs: hxxp://ieframe.dll/tabswelcome.htm
+---------------------------------------------------------------------------+
6331 Byte(s) - C:\Ad-Report-Clean-10.03.2009.log
6361 Byte(s) - C:\Ad-Report-Scan-10.03.2009.log
1 File(s) - C:\Program Files\Ad-remover\TOOLS\BACKUP
7 File(s) - C:\Program Files\Ad-remover\TOOLS\QUARANTINE
Before run: 40,718,573,568 Byte(s) free
After run: Byte(s) free
End at: 19:02:25 | 10/03/2009
.
+-----------------| E.O.F - 113 Lines
.
Et ça bug toujours... :(
------- LOGFILE OF AD-REMOVER 1.1.1.6 | ONLY XP/VISTA -------
Updated by C_XX on 09/03/2009 at 21:20
**** LIMITED TO ****
Boonty/BoontyGames
Eorezo
Infected Poker Softwares
FunWebProduct/MyWay/MyWebSearch
It's TV
Sweetim
Other Adwares
********************
Start at: 19:00:29, Mar 10/03/2009 | Boot mode: Normal Boot
Option: CLEAN | Executed from: C:\Program Files\Ad-remover\Ad-remover.bat
Operating System: Microsoft® Windows XP™ Service Pack 3 (version 5.1.2600)
Computer Name: ACER-6DEC4164D2
Current User: Baudry Ludmilla - Administrator
Drive(s):
- C:\ (File System: NTFS)
- D:\ (File System: FAT32)
- E:\ (File System: CDFS)
System Drive: C:\
Windows Directory: C:\WINDOWS\
System Directory: C:\WINDOWS\System32\
--- Running Processes: 37
(!) ---- IE start pages/Tabs reset
+-----------------| Boonty/Boonty Games Elements Deleted :
.
.
+-----------------| Eorezo Elements Deleted :
HKCR\CLSID\{64F56FC1-1272-44CD-BA6E-39723696E350}
HKCR\EoRezoBHO.EoBho
HKCR\EoRezoBHO.EoBho.1
HKCR\Interface\{B0D071A1-36B3-4757-A126-14C89C56013A}
HKCR\Typelib\{B4C656C9-F2E9-4E77-B3F4-443DF2BD778F}
HKCU\Software\EoRezo
HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{64F56FC1-1272-44CD-BA6E-39723696E350}
HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{64F56FC1-1272-44CD-BA6E-39723696E350}
.
C:\Documents and Settings\Baudry Ludmilla\Application Data\EoRezo
C:\Documents and Settings\Baudry Ludmilla\Cookies\baudry ludmilla@eorezo[1].txt
C:\Documents and Settings\Baudry Ludmilla\Cookies\baudry ludmilla@scache3.eorezo[1].txt
+-----------------| Infected Poker Softwares Elements Deleted :
HKCU\Software\Titan Poker
HKLM\Software\Titan Poker
.
+-----------------| FunWebProducts/MyWay/MyWebSearch Elements Deleted :
.
.
+-----------------| It's TV Elements Deleted :
HKCU\Software\ItsLabel
HKLM\Software\ItsLabel
.
C:\Documents and Settings\Baudry Ludmilla\Application Data\ItsLabel
+-----------------| Sweetim Elements Deleted :
HKCU\Software\SweetIM
HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{EEE6C35C-6118-11DC-9C72-001320C79847}
HKLM\Software\SweetIM
.
C:\Documents and Settings\Baudry Ludmilla\Application Data\Mozilla\Firefox\Profiles\0343ewk6.default\searchplugins\sweetim.xml
C:\Documents and Settings\Baudry Ludmilla\Application Data\Mozilla\Firefox\Profiles\0343ewk6.default\extensions\{EEE6C361-6118-11DC-9C72-001320C79847}
C:\Documents and Settings\Baudry Ludmilla\Application Data\Mozilla\Firefox\Profiles\0343ewk6.default\SweetIMToolbarData
C:\Documents and Settings\Baudry Ludmilla\Cookies\baudry_ludmilla@search.sweetim[1].txt
C:\Documents and Settings\Baudry Ludmilla\Cookies\baudry_ludmilla@sweetim[2].txt
+-----------------| Other Adwares Deleted:
.
.
C:\Documents and Settings\Baudry Ludmilla\Cookies\baudry ludmilla@atdmt[2].txt
C:\Documents and Settings\Baudry Ludmilla\Cookies\baudry_ludmilla@bs.serving-sys[1].txt
(!) ---- Temp files deleted.
(!) ---- Recycle bin emptied in all drives.
+-----------------| Added Scan :
---- Mozilla FireFox Version 2.0.0.20 ----
ProfilePath: 0343ewk6.default
.
.
(Prefs.js) REMOVED: user_pref("keyword.URL", "https://search.sweetim.com/search.asp?src=2&q=");
(Prefs.js) REMOVED: user_pref("sweetim.toolbar.highlight.colors", "#FFFF00,#00FFE4,#5AFF00,#0087FF,#FFCC00,#FF00F0");
(Prefs.js) REMOVED: user_pref("sweetim.toolbar.logger.ConsoleHandler.MinReportLevel", "7");
(Prefs.js) REMOVED: user_pref("sweetim.toolbar.logger.FileHandler.FileName", "ff-toolbar.log");
(Prefs.js) REMOVED: user_pref("sweetim.toolbar.logger.FileHandler.MaxFileSize", "200000");
(Prefs.js) REMOVED: user_pref("sweetim.toolbar.logger.FileHandler.MinReportLevel", "7");
(Prefs.js) REMOVED: user_pref("sweetim.toolbar.mode.debug", "false");
(Prefs.js) REMOVED: user_pref("sweetim.toolbar.previous.keyword.URL", "chrome://browser-region/locale/region.properties");
(Prefs.js) REMOVED: user_pref("sweetim.toolbar.search.external", "<?xml version=\"1.0\"?><TOOLBAR><EXTERNAL_SEARCH engine=\"http://*google.*\" param=\"q=\" /><EXTERNAL_SEARCH engine=\"https://search.yahoo.com/*\" param=\"p=\" /><EXTERNAL_SEARCH engine=\"http://search.sweetim.*\" param=\"q=\" /><EXTERNAL_SEARCH engine=\"http://*.live.*/*\" param=\"q=\" /><EXTERNAL_SEARCH engine=\"http://*youtube.com/\" param=\"search_query=\" /><EXTERNAL_SEARCH engine=\"http://*.ebay.*/search/*\" param=\"satitle=\" /><EXTERNAL_SEARCH engine=\"http://*.amazon.com/s/*\" param=\"field-keywords=\" /></TOOLBAR>");
(Prefs.js) REMOVED: user_pref("sweetim.toolbar.search.history.capacity", "10");
(Prefs.js) REMOVED: user_pref("sweetim.toolbar.simapp_id", "{4E8072A0-8E33-11DD-B195-001556DD5D9C}");
(Prefs.js) REMOVED: user_pref("sweetim.toolbar.version", "1.0.0.6");
.
.
.
.
---- Internet Explorer Version 7.0.5730.13 ----
+-[HKEY_CURRENT_USER\..\Internet Explorer\Main]
Default_Page_URL: hxxp://www.microsoft.com/isapi/redir.dll?prd=ie&pver=6&ar=msnhome
Default_Search_URL: hxxp://www.microsoft.com/isapi/redir.dll?prd=ie&ar=iesearch
Search bar: hxxp://go.microsoft.com/fwlink/?linkid=54896
Search Page: hxxp://home.microsoft.com/access/allinone.asp
Start page: hxxp://www.microsoft.com/isapi/redir.dll?prd=ie&pver=6&ar=msnhome
+-[HKEY_USERS\S-1-5-21-4222489996-1315135592-3599084046-1006\..\Internet Explorer\Main]
Default_Page_URL: hxxp://www.microsoft.com/isapi/redir.dll?prd=ie&pver=6&ar=msnhome
Default_Search_URL: hxxp://www.microsoft.com/isapi/redir.dll?prd=ie&ar=iesearch
Search bar: hxxp://go.microsoft.com/fwlink/?linkid=54896
Search Page: hxxp://home.microsoft.com/access/allinone.asp
Start page: hxxp://www.microsoft.com/isapi/redir.dll?prd=ie&pver=6&ar=msnhome
+-[HKEY_LOCAL_MACHINE\..\Internet Explorer\Main]
Default_Page_URL: hxxp://www.microsoft.com/isapi/redir.dll?prd=ie&pver=6&ar=msnhome
Default_Search_URL: hxxp://www.microsoft.com/isapi/redir.dll?prd=ie&ar=iesearch
Search bar: hxxp://search.msn.com/spbasic.htm
Search Page: hxxp://www.microsoft.com/isapi/redir.dll?prd=ie&ar=iesearch
Start page: hxxp://fr.msn.com/
+-[HKEY_LOCAL_MACHINE\..\Internet Explorer\ABOUTURLS]
Tabs: hxxp://ieframe.dll/tabswelcome.htm
+---------------------------------------------------------------------------+
6331 Byte(s) - C:\Ad-Report-Clean-10.03.2009.log
6361 Byte(s) - C:\Ad-Report-Scan-10.03.2009.log
1 File(s) - C:\Program Files\Ad-remover\TOOLS\BACKUP
7 File(s) - C:\Program Files\Ad-remover\TOOLS\QUARANTINE
Before run: 40,718,573,568 Byte(s) free
After run: Byte(s) free
End at: 19:02:25 | 10/03/2009
.
+-----------------| E.O.F - 113 Lines
.
Et ça bug toujours... :(
jlpjlp
Messages postés
51580
Date d'inscription
vendredi 18 mai 2007
Statut
Contributeur sécurité
Dernière intervention
3 mai 2022
5 040
12 mars 2009 à 16:48
12 mars 2009 à 16:48
tu es connecté en wifi? ethernet? ...
__________
initialise firefox:
http://www.commentcamarche.net/faq/sujet 9525 reinitialiser firefox reset
___________
colle un scan avec bitdefender free:
https://www.01net.com/telecharger/windows/Securite/antivirus-antitrojan/fiches/29063.html
__________
initialise firefox:
http://www.commentcamarche.net/faq/sujet 9525 reinitialiser firefox reset
___________
colle un scan avec bitdefender free:
https://www.01net.com/telecharger/windows/Securite/antivirus-antitrojan/fiches/29063.html
Bonjour,
Alors j'ai fait un premier scan avec bitdefender qui n'a rien trouvé de suspect, puis un deuxième scan avec pandasecurity qui en a trouvé encore quelques uns. Voici le rapport:
;***********************************************************************************************************************************************************************************
ANALYSIS: 2009-03-12 19:03:09
PROTECTIONS: 1
MALWARE: 22
SUSPECTS: 0
;***********************************************************************************************************************************************************************************
PROTECTIONS
Description Version Active Updated
;===================================================================================================================================================================================
Zone Alarm Security Suite 7.0.483.000 No No
;===================================================================================================================================================================================
MALWARE
Id Description Type Active Severity Disinfectable Disinfected Location
;===================================================================================================================================================================================
00139061 Cookie/Doubleclick TrackingCookie No 0 Yes No C:\Documents and Settings\Baudry Ludmilla\Application Data\Mozilla\Firefox\Profiles\0343ewk6.default\cookies.txt[.doubleclick.net/]
00139064 Cookie/Atlas DMT TrackingCookie No 0 Yes No C:\Program Files\Ad-remover\TOOLS\QUARANTINE\baudry ludmilla@atdmt[2].txt.vir
00139064 Cookie/Atlas DMT TrackingCookie No 0 Yes No C:\Documents and Settings\Baudry Ludmilla\Application Data\Mozilla\Firefox\Profiles\0343ewk6.default\cookies.txt[.atdmt.com/]
00145393 Cookie/Tradedoubler TrackingCookie No 0 Yes No C:\Documents and Settings\Baudry Ludmilla\Application Data\Mozilla\Firefox\Profiles\0343ewk6.default\cookies.txt[.tradedoubler.com/]
00145393 Cookie/Tradedoubler TrackingCookie No 0 Yes No C:\Documents and Settings\Baudry Ludmilla\Application Data\Mozilla\Firefox\Profiles\0343ewk6.default\cookies.txt[.tradedoubler.com/]
00145393 Cookie/Tradedoubler TrackingCookie No 0 Yes No C:\Documents and Settings\Baudry Ludmilla\Application Data\Mozilla\Firefox\Profiles\0343ewk6.default\cookies.txt[.tradedoubler.com/]
00145738 Cookie/Mediaplex TrackingCookie No 0 Yes No C:\Documents and Settings\Baudry Ludmilla\Application Data\Mozilla\Firefox\Profiles\0343ewk6.default\cookies.txt[.mediaplex.com/]
00145738 Cookie/Mediaplex TrackingCookie No 0 Yes No C:\Documents and Settings\Baudry Ludmilla\Application Data\Mozilla\Firefox\Profiles\0343ewk6.default\cookies.txt[.mediaplex.com/]
00167704 Cookie/Xiti TrackingCookie No 0 Yes No C:\Documents and Settings\Baudry Ludmilla\Cookies\baudry ludmilla@xiti[1].txt
00167704 Cookie/Xiti TrackingCookie No 0 Yes No C:\Documents and Settings\Baudry Ludmilla\Application Data\Mozilla\Firefox\Profiles\0343ewk6.default\cookies.txt[.xiti.com/]
00168056 Cookie/YieldManager TrackingCookie No 0 Yes No C:\Documents and Settings\Baudry Ludmilla\Application Data\Mozilla\Firefox\Profiles\0343ewk6.default\cookies.txt[ad.yieldmanager.com/]
00168056 Cookie/YieldManager TrackingCookie No 0 Yes No C:\Documents and Settings\Baudry Ludmilla\Application Data\Mozilla\Firefox\Profiles\0343ewk6.default\cookies.txt[ad.yieldmanager.com/]
00168056 Cookie/YieldManager TrackingCookie No 0 Yes No C:\Documents and Settings\Baudry Ludmilla\Application Data\Mozilla\Firefox\Profiles\0343ewk6.default\cookies.txt[ad.yieldmanager.com/]
00168056 Cookie/YieldManager TrackingCookie No 0 Yes No C:\Documents and Settings\Baudry Ludmilla\Application Data\Mozilla\Firefox\Profiles\0343ewk6.default\cookies.txt[ad.yieldmanager.com/]
00168056 Cookie/YieldManager TrackingCookie No 0 Yes No C:\Documents and Settings\Baudry Ludmilla\Application Data\Mozilla\Firefox\Profiles\0343ewk6.default\cookies.txt[ad.yieldmanager.com/]
00168056 Cookie/YieldManager TrackingCookie No 0 Yes No C:\Documents and Settings\Baudry Ludmilla\Application Data\Mozilla\Firefox\Profiles\0343ewk6.default\cookies.txt[ad.yieldmanager.com/]
00168056 Cookie/YieldManager TrackingCookie No 0 Yes No C:\Documents and Settings\Baudry Ludmilla\Application Data\Mozilla\Firefox\Profiles\0343ewk6.default\cookies.txt[ad.yieldmanager.com/]
00168061 Cookie/Apmebf TrackingCookie No 0 Yes No C:\Documents and Settings\Baudry Ludmilla\Application Data\Mozilla\Firefox\Profiles\0343ewk6.default\cookies.txt[.apmebf.com/]
00168090 Cookie/Serving-sys TrackingCookie No 0 Yes No C:\Documents and Settings\Baudry Ludmilla\Application Data\Mozilla\Firefox\Profiles\0343ewk6.default\cookies.txt[.serving-sys.com/]
00168090 Cookie/Serving-sys TrackingCookie No 0 Yes No C:\Documents and Settings\Baudry Ludmilla\Application Data\Mozilla\Firefox\Profiles\0343ewk6.default\cookies.txt[.serving-sys.com/]
00168090 Cookie/Serving-sys TrackingCookie No 0 Yes No C:\Documents and Settings\Baudry Ludmilla\Application Data\Mozilla\Firefox\Profiles\0343ewk6.default\cookies.txt[.serving-sys.com/]
00168090 Cookie/Serving-sys TrackingCookie No 0 Yes No C:\Documents and Settings\Baudry Ludmilla\Cookies\baudry_ludmilla@serving-sys[2].txt
00168090 Cookie/Serving-sys TrackingCookie No 0 Yes No C:\Documents and Settings\Baudry Ludmilla\Application Data\Mozilla\Firefox\Profiles\0343ewk6.default\cookies.txt[.serving-sys.com/]
00168090 Cookie/Serving-sys TrackingCookie No 0 Yes No C:\Documents and Settings\Baudry Ludmilla\Application Data\Mozilla\Firefox\Profiles\0343ewk6.default\cookies.txt[.serving-sys.com/]
00168090 Cookie/Serving-sys TrackingCookie No 0 Yes No C:\Documents and Settings\Baudry Ludmilla\Application Data\Mozilla\Firefox\Profiles\0343ewk6.default\cookies.txt[.serving-sys.com/]
00168093 Cookie/Serving-sys TrackingCookie No 0 Yes No C:\Documents and Settings\Baudry Ludmilla\Application Data\Mozilla\Firefox\Profiles\0343ewk6.default\cookies.txt[.bs.serving-sys.com/]
00168093 Cookie/Serving-sys TrackingCookie No 0 Yes No C:\Program Files\Ad-remover\TOOLS\QUARANTINE\baudry_ludmilla@bs.serving-sys[1].txt.vir
00168106 Cookie/Weborama TrackingCookie No 0 Yes No C:\Documents and Settings\Baudry Ludmilla\Application Data\Mozilla\Firefox\Profiles\0343ewk6.default\cookies.txt[.weborama.fr/]
00168106 Cookie/Weborama TrackingCookie No 0 Yes No C:\Documents and Settings\Baudry Ludmilla\Application Data\Mozilla\Firefox\Profiles\0343ewk6.default\cookies.txt[.weborama.fr/]
00168106 Cookie/Weborama TrackingCookie No 0 Yes No C:\Documents and Settings\Baudry Ludmilla\Application Data\Mozilla\Firefox\Profiles\0343ewk6.default\cookies.txt[.weborama.fr/]
00168106 Cookie/Weborama TrackingCookie No 0 Yes No C:\Documents and Settings\Baudry Ludmilla\Cookies\baudry_ludmilla@weborama[1].txt
00168109 Cookie/Adtech TrackingCookie No 0 Yes No C:\Documents and Settings\Baudry Ludmilla\Application Data\Mozilla\Firefox\Profiles\0343ewk6.default\cookies.txt[.adtech.de/]
00168116 Cookie/Comclick TrackingCookie No 0 Yes No C:\Documents and Settings\Baudry Ludmilla\Application Data\Mozilla\Firefox\Profiles\0343ewk6.default\cookies.txt[fl01.ct2.comclick.com/]
00168116 Cookie/Comclick TrackingCookie No 0 Yes No C:\Documents and Settings\Baudry Ludmilla\Application Data\Mozilla\Firefox\Profiles\0343ewk6.default\cookies.txt[fl01.ct2.comclick.com/]
00168116 Cookie/Comclick TrackingCookie No 0 Yes No C:\Documents and Settings\Baudry Ludmilla\Application Data\Mozilla\Firefox\Profiles\0343ewk6.default\cookies.txt[fl01.ct2.comclick.com/]
00169190 Cookie/Advertising TrackingCookie No 0 Yes No C:\Documents and Settings\Baudry Ludmilla\Application Data\Mozilla\Firefox\Profiles\0343ewk6.default\cookies.txt[.advertising.com/]
00169190 Cookie/Advertising TrackingCookie No 0 Yes No C:\Documents and Settings\Baudry Ludmilla\Application Data\Mozilla\Firefox\Profiles\0343ewk6.default\cookies.txt[.advertising.com/]
00169190 Cookie/Advertising TrackingCookie No 0 Yes No C:\Documents and Settings\Baudry Ludmilla\Application Data\Mozilla\Firefox\Profiles\0343ewk6.default\cookies.txt[.advertising.com/]
00169190 Cookie/Advertising TrackingCookie No 0 Yes No C:\Documents and Settings\Baudry Ludmilla\Cookies\baudry ludmilla@advertising[1].txt
00169190 Cookie/Advertising TrackingCookie No 0 Yes No C:\Documents and Settings\Baudry Ludmilla\Application Data\Mozilla\Firefox\Profiles\0343ewk6.default\cookies.txt[.advertising.com/]
00170304 Cookie/WebtrendsLive TrackingCookie No 0 Yes No C:\Documents and Settings\Baudry Ludmilla\Application Data\Mozilla\Firefox\Profiles\0343ewk6.default\cookies.txt[statse.webtrendslive.com/]
00170554 Cookie/Overture TrackingCookie No 0 Yes No C:\Documents and Settings\Baudry Ludmilla\Cookies\baudry ludmilla@overture[2].txt
00173520 Cookie/Bluestreak TrackingCookie No 0 Yes No C:\Documents and Settings\Baudry Ludmilla\Application Data\Mozilla\Firefox\Profiles\0343ewk6.default\cookies.txt[.bluestreak.com/]
00207936 Cookie/Adviva TrackingCookie No 0 Yes No C:\Documents and Settings\Baudry Ludmilla\Application Data\Mozilla\Firefox\Profiles\0343ewk6.default\cookies.txt[.adviva.net/]
00273339 Cookie/Smartadserver TrackingCookie No 0 Yes No C:\Documents and Settings\Baudry Ludmilla\Cookies\baudry_ludmilla@smartadserver[2].txt
00273339 Cookie/Smartadserver TrackingCookie No 0 Yes No C:\Documents and Settings\Baudry Ludmilla\Application Data\Mozilla\Firefox\Profiles\0343ewk6.default\cookies.txt[.smartadserver.com/]
00273339 Cookie/Smartadserver TrackingCookie No 0 Yes No C:\Documents and Settings\Baudry Ludmilla\Application Data\Mozilla\Firefox\Profiles\0343ewk6.default\cookies.txt[.smartadserver.com/]
00273339 Cookie/Smartadserver TrackingCookie No 0 Yes No C:\Documents and Settings\Baudry Ludmilla\Application Data\Mozilla\Firefox\Profiles\0343ewk6.default\cookies.txt[.smartadserver.com/]
00273339 Cookie/Smartadserver TrackingCookie No 0 Yes No C:\Documents and Settings\Baudry Ludmilla\Application Data\Mozilla\Firefox\Profiles\0343ewk6.default\cookies.txt[.smartadserver.com/]
00590315 Rootkit/Agent.LNB HackTools No 0 Yes No C:\System Volume Information\_restore{C8FEF6CF-7413-44C4-93B7-CB60650EEAA5}\RP181\A0041494.sys
00590315 Rootkit/Agent.LNB HackTools No 0 Yes No C:\System Volume Information\_restore{C8FEF6CF-7413-44C4-93B7-CB60650EEAA5}\RP181\A0041527.sys
01185375 Application/Psexec.A HackTools No 0 Yes No C:\System Volume Information\_restore{C8FEF6CF-7413-44C4-93B7-CB60650EEAA5}\RP164\A0037127.EXE
02885963 Rootkit/Booto.C Virus/Worm No 0 Yes No C:\System Volume Information\_restore{C8FEF6CF-7413-44C4-93B7-CB60650EEAA5}\RP164\A0037108.sys
02885963 Rootkit/Booto.C Virus/Worm No 0 Yes No C:\System Volume Information\_restore{C8FEF6CF-7413-44C4-93B7-CB60650EEAA5}\RP164\A0036978.sys
02898935 W32/Bagle.RC.worm Virus/Worm No 0 Yes No C:\Qoobox\Quarantine\C\Documents and Settings\Baudry Ludmilla\Application Data\drivers\_wfsintwq_.sys.zip[wfsintwq.sys]
;===================================================================================================================================================================================
SUSPECTS
Sent Location
;===================================================================================================================================================================================
;===================================================================================================================================================================================
VULNERABILITIES
Id Severity Description
;===================================================================================================================================================================================
;===================================================================================================================================================================================
J'ai effacé ceux que j'ai retrouvé, mais il en reste encore...
Et ça bug toujours...
Sinon pandasecurity me conseillait de réparer les problèmes mais pour la maudique somme de 12€, etc
Alors j'ai fait un premier scan avec bitdefender qui n'a rien trouvé de suspect, puis un deuxième scan avec pandasecurity qui en a trouvé encore quelques uns. Voici le rapport:
;***********************************************************************************************************************************************************************************
ANALYSIS: 2009-03-12 19:03:09
PROTECTIONS: 1
MALWARE: 22
SUSPECTS: 0
;***********************************************************************************************************************************************************************************
PROTECTIONS
Description Version Active Updated
;===================================================================================================================================================================================
Zone Alarm Security Suite 7.0.483.000 No No
;===================================================================================================================================================================================
MALWARE
Id Description Type Active Severity Disinfectable Disinfected Location
;===================================================================================================================================================================================
00139061 Cookie/Doubleclick TrackingCookie No 0 Yes No C:\Documents and Settings\Baudry Ludmilla\Application Data\Mozilla\Firefox\Profiles\0343ewk6.default\cookies.txt[.doubleclick.net/]
00139064 Cookie/Atlas DMT TrackingCookie No 0 Yes No C:\Program Files\Ad-remover\TOOLS\QUARANTINE\baudry ludmilla@atdmt[2].txt.vir
00139064 Cookie/Atlas DMT TrackingCookie No 0 Yes No C:\Documents and Settings\Baudry Ludmilla\Application Data\Mozilla\Firefox\Profiles\0343ewk6.default\cookies.txt[.atdmt.com/]
00145393 Cookie/Tradedoubler TrackingCookie No 0 Yes No C:\Documents and Settings\Baudry Ludmilla\Application Data\Mozilla\Firefox\Profiles\0343ewk6.default\cookies.txt[.tradedoubler.com/]
00145393 Cookie/Tradedoubler TrackingCookie No 0 Yes No C:\Documents and Settings\Baudry Ludmilla\Application Data\Mozilla\Firefox\Profiles\0343ewk6.default\cookies.txt[.tradedoubler.com/]
00145393 Cookie/Tradedoubler TrackingCookie No 0 Yes No C:\Documents and Settings\Baudry Ludmilla\Application Data\Mozilla\Firefox\Profiles\0343ewk6.default\cookies.txt[.tradedoubler.com/]
00145738 Cookie/Mediaplex TrackingCookie No 0 Yes No C:\Documents and Settings\Baudry Ludmilla\Application Data\Mozilla\Firefox\Profiles\0343ewk6.default\cookies.txt[.mediaplex.com/]
00145738 Cookie/Mediaplex TrackingCookie No 0 Yes No C:\Documents and Settings\Baudry Ludmilla\Application Data\Mozilla\Firefox\Profiles\0343ewk6.default\cookies.txt[.mediaplex.com/]
00167704 Cookie/Xiti TrackingCookie No 0 Yes No C:\Documents and Settings\Baudry Ludmilla\Cookies\baudry ludmilla@xiti[1].txt
00167704 Cookie/Xiti TrackingCookie No 0 Yes No C:\Documents and Settings\Baudry Ludmilla\Application Data\Mozilla\Firefox\Profiles\0343ewk6.default\cookies.txt[.xiti.com/]
00168056 Cookie/YieldManager TrackingCookie No 0 Yes No C:\Documents and Settings\Baudry Ludmilla\Application Data\Mozilla\Firefox\Profiles\0343ewk6.default\cookies.txt[ad.yieldmanager.com/]
00168056 Cookie/YieldManager TrackingCookie No 0 Yes No C:\Documents and Settings\Baudry Ludmilla\Application Data\Mozilla\Firefox\Profiles\0343ewk6.default\cookies.txt[ad.yieldmanager.com/]
00168056 Cookie/YieldManager TrackingCookie No 0 Yes No C:\Documents and Settings\Baudry Ludmilla\Application Data\Mozilla\Firefox\Profiles\0343ewk6.default\cookies.txt[ad.yieldmanager.com/]
00168056 Cookie/YieldManager TrackingCookie No 0 Yes No C:\Documents and Settings\Baudry Ludmilla\Application Data\Mozilla\Firefox\Profiles\0343ewk6.default\cookies.txt[ad.yieldmanager.com/]
00168056 Cookie/YieldManager TrackingCookie No 0 Yes No C:\Documents and Settings\Baudry Ludmilla\Application Data\Mozilla\Firefox\Profiles\0343ewk6.default\cookies.txt[ad.yieldmanager.com/]
00168056 Cookie/YieldManager TrackingCookie No 0 Yes No C:\Documents and Settings\Baudry Ludmilla\Application Data\Mozilla\Firefox\Profiles\0343ewk6.default\cookies.txt[ad.yieldmanager.com/]
00168056 Cookie/YieldManager TrackingCookie No 0 Yes No C:\Documents and Settings\Baudry Ludmilla\Application Data\Mozilla\Firefox\Profiles\0343ewk6.default\cookies.txt[ad.yieldmanager.com/]
00168061 Cookie/Apmebf TrackingCookie No 0 Yes No C:\Documents and Settings\Baudry Ludmilla\Application Data\Mozilla\Firefox\Profiles\0343ewk6.default\cookies.txt[.apmebf.com/]
00168090 Cookie/Serving-sys TrackingCookie No 0 Yes No C:\Documents and Settings\Baudry Ludmilla\Application Data\Mozilla\Firefox\Profiles\0343ewk6.default\cookies.txt[.serving-sys.com/]
00168090 Cookie/Serving-sys TrackingCookie No 0 Yes No C:\Documents and Settings\Baudry Ludmilla\Application Data\Mozilla\Firefox\Profiles\0343ewk6.default\cookies.txt[.serving-sys.com/]
00168090 Cookie/Serving-sys TrackingCookie No 0 Yes No C:\Documents and Settings\Baudry Ludmilla\Application Data\Mozilla\Firefox\Profiles\0343ewk6.default\cookies.txt[.serving-sys.com/]
00168090 Cookie/Serving-sys TrackingCookie No 0 Yes No C:\Documents and Settings\Baudry Ludmilla\Cookies\baudry_ludmilla@serving-sys[2].txt
00168090 Cookie/Serving-sys TrackingCookie No 0 Yes No C:\Documents and Settings\Baudry Ludmilla\Application Data\Mozilla\Firefox\Profiles\0343ewk6.default\cookies.txt[.serving-sys.com/]
00168090 Cookie/Serving-sys TrackingCookie No 0 Yes No C:\Documents and Settings\Baudry Ludmilla\Application Data\Mozilla\Firefox\Profiles\0343ewk6.default\cookies.txt[.serving-sys.com/]
00168090 Cookie/Serving-sys TrackingCookie No 0 Yes No C:\Documents and Settings\Baudry Ludmilla\Application Data\Mozilla\Firefox\Profiles\0343ewk6.default\cookies.txt[.serving-sys.com/]
00168093 Cookie/Serving-sys TrackingCookie No 0 Yes No C:\Documents and Settings\Baudry Ludmilla\Application Data\Mozilla\Firefox\Profiles\0343ewk6.default\cookies.txt[.bs.serving-sys.com/]
00168093 Cookie/Serving-sys TrackingCookie No 0 Yes No C:\Program Files\Ad-remover\TOOLS\QUARANTINE\baudry_ludmilla@bs.serving-sys[1].txt.vir
00168106 Cookie/Weborama TrackingCookie No 0 Yes No C:\Documents and Settings\Baudry Ludmilla\Application Data\Mozilla\Firefox\Profiles\0343ewk6.default\cookies.txt[.weborama.fr/]
00168106 Cookie/Weborama TrackingCookie No 0 Yes No C:\Documents and Settings\Baudry Ludmilla\Application Data\Mozilla\Firefox\Profiles\0343ewk6.default\cookies.txt[.weborama.fr/]
00168106 Cookie/Weborama TrackingCookie No 0 Yes No C:\Documents and Settings\Baudry Ludmilla\Application Data\Mozilla\Firefox\Profiles\0343ewk6.default\cookies.txt[.weborama.fr/]
00168106 Cookie/Weborama TrackingCookie No 0 Yes No C:\Documents and Settings\Baudry Ludmilla\Cookies\baudry_ludmilla@weborama[1].txt
00168109 Cookie/Adtech TrackingCookie No 0 Yes No C:\Documents and Settings\Baudry Ludmilla\Application Data\Mozilla\Firefox\Profiles\0343ewk6.default\cookies.txt[.adtech.de/]
00168116 Cookie/Comclick TrackingCookie No 0 Yes No C:\Documents and Settings\Baudry Ludmilla\Application Data\Mozilla\Firefox\Profiles\0343ewk6.default\cookies.txt[fl01.ct2.comclick.com/]
00168116 Cookie/Comclick TrackingCookie No 0 Yes No C:\Documents and Settings\Baudry Ludmilla\Application Data\Mozilla\Firefox\Profiles\0343ewk6.default\cookies.txt[fl01.ct2.comclick.com/]
00168116 Cookie/Comclick TrackingCookie No 0 Yes No C:\Documents and Settings\Baudry Ludmilla\Application Data\Mozilla\Firefox\Profiles\0343ewk6.default\cookies.txt[fl01.ct2.comclick.com/]
00169190 Cookie/Advertising TrackingCookie No 0 Yes No C:\Documents and Settings\Baudry Ludmilla\Application Data\Mozilla\Firefox\Profiles\0343ewk6.default\cookies.txt[.advertising.com/]
00169190 Cookie/Advertising TrackingCookie No 0 Yes No C:\Documents and Settings\Baudry Ludmilla\Application Data\Mozilla\Firefox\Profiles\0343ewk6.default\cookies.txt[.advertising.com/]
00169190 Cookie/Advertising TrackingCookie No 0 Yes No C:\Documents and Settings\Baudry Ludmilla\Application Data\Mozilla\Firefox\Profiles\0343ewk6.default\cookies.txt[.advertising.com/]
00169190 Cookie/Advertising TrackingCookie No 0 Yes No C:\Documents and Settings\Baudry Ludmilla\Cookies\baudry ludmilla@advertising[1].txt
00169190 Cookie/Advertising TrackingCookie No 0 Yes No C:\Documents and Settings\Baudry Ludmilla\Application Data\Mozilla\Firefox\Profiles\0343ewk6.default\cookies.txt[.advertising.com/]
00170304 Cookie/WebtrendsLive TrackingCookie No 0 Yes No C:\Documents and Settings\Baudry Ludmilla\Application Data\Mozilla\Firefox\Profiles\0343ewk6.default\cookies.txt[statse.webtrendslive.com/]
00170554 Cookie/Overture TrackingCookie No 0 Yes No C:\Documents and Settings\Baudry Ludmilla\Cookies\baudry ludmilla@overture[2].txt
00173520 Cookie/Bluestreak TrackingCookie No 0 Yes No C:\Documents and Settings\Baudry Ludmilla\Application Data\Mozilla\Firefox\Profiles\0343ewk6.default\cookies.txt[.bluestreak.com/]
00207936 Cookie/Adviva TrackingCookie No 0 Yes No C:\Documents and Settings\Baudry Ludmilla\Application Data\Mozilla\Firefox\Profiles\0343ewk6.default\cookies.txt[.adviva.net/]
00273339 Cookie/Smartadserver TrackingCookie No 0 Yes No C:\Documents and Settings\Baudry Ludmilla\Cookies\baudry_ludmilla@smartadserver[2].txt
00273339 Cookie/Smartadserver TrackingCookie No 0 Yes No C:\Documents and Settings\Baudry Ludmilla\Application Data\Mozilla\Firefox\Profiles\0343ewk6.default\cookies.txt[.smartadserver.com/]
00273339 Cookie/Smartadserver TrackingCookie No 0 Yes No C:\Documents and Settings\Baudry Ludmilla\Application Data\Mozilla\Firefox\Profiles\0343ewk6.default\cookies.txt[.smartadserver.com/]
00273339 Cookie/Smartadserver TrackingCookie No 0 Yes No C:\Documents and Settings\Baudry Ludmilla\Application Data\Mozilla\Firefox\Profiles\0343ewk6.default\cookies.txt[.smartadserver.com/]
00273339 Cookie/Smartadserver TrackingCookie No 0 Yes No C:\Documents and Settings\Baudry Ludmilla\Application Data\Mozilla\Firefox\Profiles\0343ewk6.default\cookies.txt[.smartadserver.com/]
00590315 Rootkit/Agent.LNB HackTools No 0 Yes No C:\System Volume Information\_restore{C8FEF6CF-7413-44C4-93B7-CB60650EEAA5}\RP181\A0041494.sys
00590315 Rootkit/Agent.LNB HackTools No 0 Yes No C:\System Volume Information\_restore{C8FEF6CF-7413-44C4-93B7-CB60650EEAA5}\RP181\A0041527.sys
01185375 Application/Psexec.A HackTools No 0 Yes No C:\System Volume Information\_restore{C8FEF6CF-7413-44C4-93B7-CB60650EEAA5}\RP164\A0037127.EXE
02885963 Rootkit/Booto.C Virus/Worm No 0 Yes No C:\System Volume Information\_restore{C8FEF6CF-7413-44C4-93B7-CB60650EEAA5}\RP164\A0037108.sys
02885963 Rootkit/Booto.C Virus/Worm No 0 Yes No C:\System Volume Information\_restore{C8FEF6CF-7413-44C4-93B7-CB60650EEAA5}\RP164\A0036978.sys
02898935 W32/Bagle.RC.worm Virus/Worm No 0 Yes No C:\Qoobox\Quarantine\C\Documents and Settings\Baudry Ludmilla\Application Data\drivers\_wfsintwq_.sys.zip[wfsintwq.sys]
;===================================================================================================================================================================================
SUSPECTS
Sent Location
;===================================================================================================================================================================================
;===================================================================================================================================================================================
VULNERABILITIES
Id Severity Description
;===================================================================================================================================================================================
;===================================================================================================================================================================================
J'ai effacé ceux que j'ai retrouvé, mais il en reste encore...
Et ça bug toujours...
Sinon pandasecurity me conseillait de réparer les problèmes mais pour la maudique somme de 12€, etc
jlpjlp
Messages postés
51580
Date d'inscription
vendredi 18 mai 2007
Statut
Contributeur sécurité
Dernière intervention
3 mai 2022
5 040
13 mars 2009 à 14:04
13 mars 2009 à 14:04
Tu es connecté en wifi? ethernet? ...
_____________
pour panda :
les virus sont dans ta restauration: tu la désactive puis tu redémarre ton ordi puis tu la réactive:
http://service1.symantec.com/SUPPORT/INTER/tsgeninfointl.nsf/fdocid/20020830101856924
et pour virer les cookies: utilise regulierement ccleaner
https://www.malekal.com/tutoriel-ccleaner/
________
tu es sur que tu' n'as pas de souci de ligne? d'autre ordi sont branchés sur la box? ils ont des soucis?
___________
répare windows:
http://www.informatruc.com/reparer-windows-xp/
_____________
pour panda :
les virus sont dans ta restauration: tu la désactive puis tu redémarre ton ordi puis tu la réactive:
http://service1.symantec.com/SUPPORT/INTER/tsgeninfointl.nsf/fdocid/20020830101856924
et pour virer les cookies: utilise regulierement ccleaner
https://www.malekal.com/tutoriel-ccleaner/
________
tu es sur que tu' n'as pas de souci de ligne? d'autre ordi sont branchés sur la box? ils ont des soucis?
___________
répare windows:
http://www.informatruc.com/reparer-windows-xp/