Security system ou apparenté
heyou
-
heyou -
heyou -
Bonjour,
en mon absence, quelqu'un a fait je ne sais quoi sur mon ordi (ne s'y connaissant pas en informatique, elle ne peut pas me le dire) et j'ai plein de saloperies qui ressemblent à une infection par Security system.
Mon log Hijack this
Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 20:21:57, on 27/09/2009
Platform: Windows XP SP3 (WinNT 5.01.2600)
MSIE: Internet Explorer v7.00 (7.00.6000.16876)
Boot mode: Normal
Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\svchost.exe
C:\Program Files\Lavasoft\Ad-Aware\aawservice.exe
C:\WINDOWS\Explorer.EXE
C:\Program Files\Alwil Software\Avast4\aswUpdSv.exe
C:\Program Files\Alwil Software\Avast4\ashServ.exe
C:\WINDOWS\system32\LEXBCES.EXE
C:\WINDOWS\system32\LEXPPS.EXE
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
C:\Program Files\Bonjour\mDNSResponder.exe
C:\Program Files\WIDCOMM\Bluetooth Software\bin\btwdins.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\ZONELABS\vsmon.exe
C:\WINDOWS\system32\wuauclt.exe
C:\PROGRA~1\Lexmark\PHOTOC~1\LXBLKsk.exe
C:\Program Files\Lexmark\Lexmark Photo Center\MemoryCardManager.exe
C:\Program Files\Zone Labs\ZoneAlarm\zlclient.exe
C:\WINDOWS\system32\rundll32.exe
C:\Program Files\Java\jre1.6.0_07\bin\jusched.exe
C:\WINDOWS\system32\LVCOMSX.EXE
C:\Program Files\Common Files\Real\Update_OB\realsched.exe
C:\Program Files\Logitech\Video\LogiTray.exe
C:\Program Files\Adobe\Photoshop Album Starter Edition\3.0\Apps\apdproxy.exe
C:\Program Files\ScanSoft\OmniPageSE4.0\OpwareSE4.exe
C:\PROGRA~1\ALWILS~1\Avast4\ashDisp.exe
C:\Program Files\iTunes\iTunesHelper.exe
C:\WINDOWS\Temp\wpv981254007820.exe
C:\WINDOWS\system32\restorer32_a.exe
C:\WINDOWS\Temp\_ex-08.exe
C:\Documents and Settings\All Users\Application Data\19656104\19656104.exe
C:\WINDOWS\System32\svchost.exe
C:\Program Files\Logitech\Desktop Messenger\8876480\Program\LogitechDesktopMessenger.exe
C:\Program Files\Windows Live\Messenger\msnmsgr.exe
C:\Program Files\Messenger\msmsgs.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Documents and Settings\Reda\restorer32_a.exe
C:\WINDOWS\System32\svchost.exe
C:\Program Files\WIDCOMM\Bluetooth Software\BTTray.exe
C:\Program Files\Adobe\Acrobat 7.0\Reader\reader_sl.exe
C:\Program Files\SAGEM WiFi manager\WLANUTL.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\WINDOWS\system32\svchost.exe
C:\Program Files\Logitech\Video\FxSvr2.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\wuauclt.exe
C:\Program Files\iPod\bin\iPodService.exe
C:\Program Files\HijackThis\HijackThis.exe
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = https://www.google.fr/?gws_rd=ssl
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = https://www.msn.com/fr-fr/?ocid=iehp
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = https://www.bing.com/?toHttps=1&redig=5FC791212101479BAFBE1A679848B1AF
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = https://www.bing.com/?toHttps=1&redig=5FC791212101479BAFBE1A679848B1AF
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = https://www.msn.com/fr-fr/?ocid=iehp
R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyOverride = *.local
O2 - BHO: Adobe PDF Reader Link Helper - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 7.0\ActiveX\AcroIEHelper.dll
O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre1.6.0_07\bin\ssv.dll
O2 - BHO: (no name) - {7E853D72-626A-48EC-A868-BA8D5E23E045} - (no file)
O2 - BHO: Windows Live Sign-in Helper - {9030D464-4C02-4ABF-8ECC-5164760863C6} - C:\Program Files\Common Files\Microsoft Shared\Windows Live\WindowsLiveLogin.dll
O2 - BHO: IeCatch2 Class - {A5366673-E8CA-11D3-9CD9-0090271D075B} - C:\PROGRA~1\FLASHGET\jccatch.dll
O3 - Toolbar: FlashGet Bar - {E0E899AB-F487-11D5-8D29-0050BA6940E3} - C:\PROGRA~1\FLASHGET\fgiebar.dll
O4 - HKLM\..\Run: [LXBLKsk] C:\PROGRA~1\Lexmark\PHOTOC~1\LXBLKsk.exe
O4 - HKLM\..\Run: [MemoryCardManager] C:\Program Files\Lexmark\Lexmark Photo Center\MemoryCardManager.exe -startup
O4 - HKLM\..\Run: [NeroCheck] C:\WINDOWS\system32\NeroCheck.exe
O4 - HKLM\..\Run: [Zone Labs Client] C:\Program Files\Zone Labs\ZoneAlarm\zlclient.exe
O4 - HKLM\..\Run: [BluetoothAuthenticationAgent] rundll32.exe bthprops.cpl,,BluetoothAuthenticationAgent
O4 - HKLM\..\Run: [SunJavaUpdateSched] "C:\Program Files\Java\jre1.6.0_07\bin\jusched.exe"
O4 - HKLM\..\Run: [LVCOMSX] C:\WINDOWS\system32\LVCOMSX.EXE
O4 - HKLM\..\Run: [TkBellExe] "C:\Program Files\Common Files\Real\Update_OB\realsched.exe" -osboot
O4 - HKLM\..\Run: [LogitechVideoRepair] C:\Program Files\Logitech\Video\ISStart.exe
O4 - HKLM\..\Run: [LogitechVideoTray] C:\Program Files\Logitech\Video\LogiTray.exe
O4 - HKLM\..\Run: [Adobe Photo Downloader] "C:\Program Files\Adobe\Photoshop Album Starter Edition\3.0\Apps\apdproxy.exe"
O4 - HKLM\..\Run: [SSBkgdUpdate] "C:\Program Files\Common Files\Scansoft Shared\SSBkgdUpdate\SSBkgdupdate.exe" -Embedding -boot
O4 - HKLM\..\Run: [OpwareSE4] "C:\Program Files\ScanSoft\OmniPageSE4.0\OpwareSE4.exe"
O4 - HKLM\..\Run: [avast!] C:\PROGRA~1\ALWILS~1\Avast4\ashDisp.exe
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
O4 - HKLM\..\Run: [iTunesHelper] "C:\Program Files\iTunes\iTunesHelper.exe"
O4 - HKLM\..\Run: [sysgif32] C:\WINDOWS\Temp\wpv981254007820.exe
O4 - HKLM\..\Run: [restorer32_a] C:\WINDOWS\system32\restorer32_a.exe
O4 - HKLM\..\Run: [PromoReg] C:\WINDOWS\Temp\_ex-08.exe
O4 - HKLM\..\Run: [19656104] C:\Documents and Settings\All Users\Application Data\19656104\19656104.exe
O4 - HKCU\..\Run: [MessengerPlus3] "C:\Program Files\MessengerPlus! 3\MsgPlus.exe" /WinStart
O4 - HKCU\..\Run: [LDM] C:\Program Files\Logitech\Desktop Messenger\8876480\Program\LogitechDesktopMessenger.exe
O4 - HKCU\..\Run: [LogitechSoftwareUpdate] "C:\Program Files\Logitech\Video\ManifestEngine.exe" boot
O4 - HKCU\..\Run: [WOOKIT] C:\PROGRA~1\WANADOO\Shell.exe appLaunchClientZone.shl|PARAM= cnx
O4 - HKCU\..\Run: [msnmsgr] "C:\Program Files\Windows Live\Messenger\msnmsgr.exe" /background
O4 - HKCU\..\Run: [MSMSGS] "C:\Program Files\Messenger\msmsgs.exe" /background
O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
O4 - HKCU\..\Run: [restorer32_a] C:\Documents and Settings\Reda\restorer32_a.exe
O4 - Startup: ikowin32.exe
O4 - Global Startup: Microsoft Office.lnk = C:\Program Files\Microsoft Office\Office10\OSA.EXE
O4 - Global Startup: BTTray.lnk = ?
O4 - Global Startup: Logitech Desktop Messenger.lnk = C:\Program Files\Logitech\Desktop Messenger\8876480\Program\LogitechDesktopMessenger.exe
O4 - Global Startup: Adobe Reader Speed Launch.lnk = C:\Program Files\Adobe\Acrobat 7.0\Reader\reader_sl.exe
O4 - Global Startup: Utilitaire réseau pour SAGEM Wi-Fi 11g USB adapter.lnk = C:\Program Files\SAGEM WiFi manager\WLANUTL.exe
O8 - Extra context menu item: Download All by FlashGet - C:\PROGRA~1\FLASHGET\jc_all.htm
O8 - Extra context menu item: Download using FlashGet - C:\PROGRA~1\FLASHGET\jc_link.htm
O8 - Extra context menu item: E&xporter vers Microsoft Excel - res://C:\PROGRA~1\MICROS~2\Office10\EXCEL.EXE/3000
O8 - Extra context menu item: Send To &Bluetooth - C:\Program Files\WIDCOMM\Bluetooth Software\btsendto_ie_ctx.htm
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_07\bin\ssv.dll
O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_07\bin\ssv.dll
O9 - Extra button: @btrez.dll,-4015 - {CCA281CA-C863-46ef-9331-5C8D4460577F} - C:\Program Files\WIDCOMM\Bluetooth Software\btsendto_ie.htm
O9 - Extra 'Tools' menuitem: @btrez.dll,-4017 - {CCA281CA-C863-46ef-9331-5C8D4460577F} - C:\Program Files\WIDCOMM\Bluetooth Software\btsendto_ie.htm
O9 - Extra button: FlashGet - {D6E814A0-E0C5-11d4-8D29-0050BA6940E3} - C:\PROGRA~1\FLASHGET\flashget.exe
O9 - Extra 'Tools' menuitem: &FlashGet - {D6E814A0-E0C5-11d4-8D29-0050BA6940E3} - C:\PROGRA~1\FLASHGET\flashget.exe
O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O16 - DPF: {00B71CFB-6864-4346-A978-C0A14556272C} (Checkers Class) - http://messenger.zone.msn.com/binary/msgrchkr.cab31267.cab
O16 - DPF: {0CCA191D-13A6-4E29-B746-314DEE697D83} (Facebook Photo Uploader 5 Control) - http://upload.facebook.com/controls/2008.10.10_v5.5.8/FacebookPhotoUploader5.cab
O16 - DPF: {2917297F-F02B-4B9D-81DF-494B6333150B} (Minesweeper Flags Class) - http://messenger.zone.msn.com/binary/MineSweeper.cab31267.cab
O16 - DPF: {3DC2E31C-371A-4BD3-9A27-CDF57CE604CF} (MSN Money Charting) - https://www.msn.com/fr-fr/
O16 - DPF: {5D6F45B3-9043-443D-A792-115447494D24} (UnoCtrl Class) - http://messenger.zone.msn.com/FR-FR/a-UNO1/GAME_UNO1.cab
O16 - DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} (WUWebControl Class) - http://update.microsoft.com/...
O16 - DPF: {8E0D4DE5-3180-4024-A327-4DFAD1796A8D} (MessengerStatsClient Class) - http://messenger.zone.msn.com/binary/MessengerStatsClient.cab31267.cab
O16 - DPF: {B38870E4-7ECB-40DA-8C6A-595F0A5519FF} (MsnMessengerSetupDownloadControl Class) - http://messenger.msn.com/download/MsnMessengerSetupDownloader.cab
O16 - DPF: {C3F79A2B-B9B4-4A66-B012-3EE46475B072} (MessengerStatsClient Class) - http://messenger.zone.msn.com/binary/MessengerStatsPAClient.cab56907.cab
O16 - DPF: {C5E28B9D-0A68-4B50-94E9-E8F6B4697514} (NsvPlayX Control) - http://www.nullsoft.com/nsv/embed/nsvplayx_vp3_mp3.cab
O16 - DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} (Shockwave Flash Object) - http://fpdownload2.macromedia.com/get/shockwave/cabs/flash/swflash.cab
O16 - DPF: {F5A7706B-B9C0-4C89-A715-7A0C6B05DD48} (Minesweeper Flags Class) - http://messenger.zone.msn.com/binary/MineSweeper.cab56986.cab
O18 - Protocol: bwfile-8876480 - {9462A756-7B47-47BC-8C80-C34B9B80B32B} - C:\Program Files\Logitech\Desktop Messenger\8876480\Program\GAPlugProtocol-8876480.dll
O23 - Service: Lavasoft Ad-Aware Service (aawservice) - Lavasoft - C:\Program Files\Lavasoft\Ad-Aware\aawservice.exe
O23 - Service: Apple Mobile Device - Apple Inc. - C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
O23 - Service: avast! iAVS4 Control Service (aswUpdSv) - ALWIL Software - C:\Program Files\Alwil Software\Avast4\aswUpdSv.exe
O23 - Service: avast! Antivirus - ALWIL Software - C:\Program Files\Alwil Software\Avast4\ashServ.exe
O23 - Service: Service Bonjour (Bonjour Service) - Apple Inc. - C:\Program Files\Bonjour\mDNSResponder.exe
O23 - Service: Bluetooth Service (btwdins) - Broadcom Corporation - C:\Program Files\WIDCOMM\Bluetooth Software\bin\btwdins.exe
O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Common Files\InstallShield\Driver\11\Intel 32\IDriverT.exe
O23 - Service: Service de l’iPod (iPod Service) - Apple Inc. - C:\Program Files\iPod\bin\iPodService.exe
O23 - Service: LexBce Server (LexBceS) - Lexmark International, Inc. - C:\WINDOWS\system32\LEXBCES.EXE
O23 - Service: TrueVector Internet Monitor (vsmon) - Zone Labs, LLC - C:\WINDOWS\system32\ZONELABS\vsmon.exe
en mon absence, quelqu'un a fait je ne sais quoi sur mon ordi (ne s'y connaissant pas en informatique, elle ne peut pas me le dire) et j'ai plein de saloperies qui ressemblent à une infection par Security system.
Mon log Hijack this
Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 20:21:57, on 27/09/2009
Platform: Windows XP SP3 (WinNT 5.01.2600)
MSIE: Internet Explorer v7.00 (7.00.6000.16876)
Boot mode: Normal
Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\svchost.exe
C:\Program Files\Lavasoft\Ad-Aware\aawservice.exe
C:\WINDOWS\Explorer.EXE
C:\Program Files\Alwil Software\Avast4\aswUpdSv.exe
C:\Program Files\Alwil Software\Avast4\ashServ.exe
C:\WINDOWS\system32\LEXBCES.EXE
C:\WINDOWS\system32\LEXPPS.EXE
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
C:\Program Files\Bonjour\mDNSResponder.exe
C:\Program Files\WIDCOMM\Bluetooth Software\bin\btwdins.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\ZONELABS\vsmon.exe
C:\WINDOWS\system32\wuauclt.exe
C:\PROGRA~1\Lexmark\PHOTOC~1\LXBLKsk.exe
C:\Program Files\Lexmark\Lexmark Photo Center\MemoryCardManager.exe
C:\Program Files\Zone Labs\ZoneAlarm\zlclient.exe
C:\WINDOWS\system32\rundll32.exe
C:\Program Files\Java\jre1.6.0_07\bin\jusched.exe
C:\WINDOWS\system32\LVCOMSX.EXE
C:\Program Files\Common Files\Real\Update_OB\realsched.exe
C:\Program Files\Logitech\Video\LogiTray.exe
C:\Program Files\Adobe\Photoshop Album Starter Edition\3.0\Apps\apdproxy.exe
C:\Program Files\ScanSoft\OmniPageSE4.0\OpwareSE4.exe
C:\PROGRA~1\ALWILS~1\Avast4\ashDisp.exe
C:\Program Files\iTunes\iTunesHelper.exe
C:\WINDOWS\Temp\wpv981254007820.exe
C:\WINDOWS\system32\restorer32_a.exe
C:\WINDOWS\Temp\_ex-08.exe
C:\Documents and Settings\All Users\Application Data\19656104\19656104.exe
C:\WINDOWS\System32\svchost.exe
C:\Program Files\Logitech\Desktop Messenger\8876480\Program\LogitechDesktopMessenger.exe
C:\Program Files\Windows Live\Messenger\msnmsgr.exe
C:\Program Files\Messenger\msmsgs.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Documents and Settings\Reda\restorer32_a.exe
C:\WINDOWS\System32\svchost.exe
C:\Program Files\WIDCOMM\Bluetooth Software\BTTray.exe
C:\Program Files\Adobe\Acrobat 7.0\Reader\reader_sl.exe
C:\Program Files\SAGEM WiFi manager\WLANUTL.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\WINDOWS\system32\svchost.exe
C:\Program Files\Logitech\Video\FxSvr2.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\wuauclt.exe
C:\Program Files\iPod\bin\iPodService.exe
C:\Program Files\HijackThis\HijackThis.exe
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = https://www.google.fr/?gws_rd=ssl
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = https://www.msn.com/fr-fr/?ocid=iehp
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = https://www.bing.com/?toHttps=1&redig=5FC791212101479BAFBE1A679848B1AF
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = https://www.bing.com/?toHttps=1&redig=5FC791212101479BAFBE1A679848B1AF
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = https://www.msn.com/fr-fr/?ocid=iehp
R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyOverride = *.local
O2 - BHO: Adobe PDF Reader Link Helper - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 7.0\ActiveX\AcroIEHelper.dll
O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre1.6.0_07\bin\ssv.dll
O2 - BHO: (no name) - {7E853D72-626A-48EC-A868-BA8D5E23E045} - (no file)
O2 - BHO: Windows Live Sign-in Helper - {9030D464-4C02-4ABF-8ECC-5164760863C6} - C:\Program Files\Common Files\Microsoft Shared\Windows Live\WindowsLiveLogin.dll
O2 - BHO: IeCatch2 Class - {A5366673-E8CA-11D3-9CD9-0090271D075B} - C:\PROGRA~1\FLASHGET\jccatch.dll
O3 - Toolbar: FlashGet Bar - {E0E899AB-F487-11D5-8D29-0050BA6940E3} - C:\PROGRA~1\FLASHGET\fgiebar.dll
O4 - HKLM\..\Run: [LXBLKsk] C:\PROGRA~1\Lexmark\PHOTOC~1\LXBLKsk.exe
O4 - HKLM\..\Run: [MemoryCardManager] C:\Program Files\Lexmark\Lexmark Photo Center\MemoryCardManager.exe -startup
O4 - HKLM\..\Run: [NeroCheck] C:\WINDOWS\system32\NeroCheck.exe
O4 - HKLM\..\Run: [Zone Labs Client] C:\Program Files\Zone Labs\ZoneAlarm\zlclient.exe
O4 - HKLM\..\Run: [BluetoothAuthenticationAgent] rundll32.exe bthprops.cpl,,BluetoothAuthenticationAgent
O4 - HKLM\..\Run: [SunJavaUpdateSched] "C:\Program Files\Java\jre1.6.0_07\bin\jusched.exe"
O4 - HKLM\..\Run: [LVCOMSX] C:\WINDOWS\system32\LVCOMSX.EXE
O4 - HKLM\..\Run: [TkBellExe] "C:\Program Files\Common Files\Real\Update_OB\realsched.exe" -osboot
O4 - HKLM\..\Run: [LogitechVideoRepair] C:\Program Files\Logitech\Video\ISStart.exe
O4 - HKLM\..\Run: [LogitechVideoTray] C:\Program Files\Logitech\Video\LogiTray.exe
O4 - HKLM\..\Run: [Adobe Photo Downloader] "C:\Program Files\Adobe\Photoshop Album Starter Edition\3.0\Apps\apdproxy.exe"
O4 - HKLM\..\Run: [SSBkgdUpdate] "C:\Program Files\Common Files\Scansoft Shared\SSBkgdUpdate\SSBkgdupdate.exe" -Embedding -boot
O4 - HKLM\..\Run: [OpwareSE4] "C:\Program Files\ScanSoft\OmniPageSE4.0\OpwareSE4.exe"
O4 - HKLM\..\Run: [avast!] C:\PROGRA~1\ALWILS~1\Avast4\ashDisp.exe
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
O4 - HKLM\..\Run: [iTunesHelper] "C:\Program Files\iTunes\iTunesHelper.exe"
O4 - HKLM\..\Run: [sysgif32] C:\WINDOWS\Temp\wpv981254007820.exe
O4 - HKLM\..\Run: [restorer32_a] C:\WINDOWS\system32\restorer32_a.exe
O4 - HKLM\..\Run: [PromoReg] C:\WINDOWS\Temp\_ex-08.exe
O4 - HKLM\..\Run: [19656104] C:\Documents and Settings\All Users\Application Data\19656104\19656104.exe
O4 - HKCU\..\Run: [MessengerPlus3] "C:\Program Files\MessengerPlus! 3\MsgPlus.exe" /WinStart
O4 - HKCU\..\Run: [LDM] C:\Program Files\Logitech\Desktop Messenger\8876480\Program\LogitechDesktopMessenger.exe
O4 - HKCU\..\Run: [LogitechSoftwareUpdate] "C:\Program Files\Logitech\Video\ManifestEngine.exe" boot
O4 - HKCU\..\Run: [WOOKIT] C:\PROGRA~1\WANADOO\Shell.exe appLaunchClientZone.shl|PARAM= cnx
O4 - HKCU\..\Run: [msnmsgr] "C:\Program Files\Windows Live\Messenger\msnmsgr.exe" /background
O4 - HKCU\..\Run: [MSMSGS] "C:\Program Files\Messenger\msmsgs.exe" /background
O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
O4 - HKCU\..\Run: [restorer32_a] C:\Documents and Settings\Reda\restorer32_a.exe
O4 - Startup: ikowin32.exe
O4 - Global Startup: Microsoft Office.lnk = C:\Program Files\Microsoft Office\Office10\OSA.EXE
O4 - Global Startup: BTTray.lnk = ?
O4 - Global Startup: Logitech Desktop Messenger.lnk = C:\Program Files\Logitech\Desktop Messenger\8876480\Program\LogitechDesktopMessenger.exe
O4 - Global Startup: Adobe Reader Speed Launch.lnk = C:\Program Files\Adobe\Acrobat 7.0\Reader\reader_sl.exe
O4 - Global Startup: Utilitaire réseau pour SAGEM Wi-Fi 11g USB adapter.lnk = C:\Program Files\SAGEM WiFi manager\WLANUTL.exe
O8 - Extra context menu item: Download All by FlashGet - C:\PROGRA~1\FLASHGET\jc_all.htm
O8 - Extra context menu item: Download using FlashGet - C:\PROGRA~1\FLASHGET\jc_link.htm
O8 - Extra context menu item: E&xporter vers Microsoft Excel - res://C:\PROGRA~1\MICROS~2\Office10\EXCEL.EXE/3000
O8 - Extra context menu item: Send To &Bluetooth - C:\Program Files\WIDCOMM\Bluetooth Software\btsendto_ie_ctx.htm
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_07\bin\ssv.dll
O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_07\bin\ssv.dll
O9 - Extra button: @btrez.dll,-4015 - {CCA281CA-C863-46ef-9331-5C8D4460577F} - C:\Program Files\WIDCOMM\Bluetooth Software\btsendto_ie.htm
O9 - Extra 'Tools' menuitem: @btrez.dll,-4017 - {CCA281CA-C863-46ef-9331-5C8D4460577F} - C:\Program Files\WIDCOMM\Bluetooth Software\btsendto_ie.htm
O9 - Extra button: FlashGet - {D6E814A0-E0C5-11d4-8D29-0050BA6940E3} - C:\PROGRA~1\FLASHGET\flashget.exe
O9 - Extra 'Tools' menuitem: &FlashGet - {D6E814A0-E0C5-11d4-8D29-0050BA6940E3} - C:\PROGRA~1\FLASHGET\flashget.exe
O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O16 - DPF: {00B71CFB-6864-4346-A978-C0A14556272C} (Checkers Class) - http://messenger.zone.msn.com/binary/msgrchkr.cab31267.cab
O16 - DPF: {0CCA191D-13A6-4E29-B746-314DEE697D83} (Facebook Photo Uploader 5 Control) - http://upload.facebook.com/controls/2008.10.10_v5.5.8/FacebookPhotoUploader5.cab
O16 - DPF: {2917297F-F02B-4B9D-81DF-494B6333150B} (Minesweeper Flags Class) - http://messenger.zone.msn.com/binary/MineSweeper.cab31267.cab
O16 - DPF: {3DC2E31C-371A-4BD3-9A27-CDF57CE604CF} (MSN Money Charting) - https://www.msn.com/fr-fr/
O16 - DPF: {5D6F45B3-9043-443D-A792-115447494D24} (UnoCtrl Class) - http://messenger.zone.msn.com/FR-FR/a-UNO1/GAME_UNO1.cab
O16 - DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} (WUWebControl Class) - http://update.microsoft.com/...
O16 - DPF: {8E0D4DE5-3180-4024-A327-4DFAD1796A8D} (MessengerStatsClient Class) - http://messenger.zone.msn.com/binary/MessengerStatsClient.cab31267.cab
O16 - DPF: {B38870E4-7ECB-40DA-8C6A-595F0A5519FF} (MsnMessengerSetupDownloadControl Class) - http://messenger.msn.com/download/MsnMessengerSetupDownloader.cab
O16 - DPF: {C3F79A2B-B9B4-4A66-B012-3EE46475B072} (MessengerStatsClient Class) - http://messenger.zone.msn.com/binary/MessengerStatsPAClient.cab56907.cab
O16 - DPF: {C5E28B9D-0A68-4B50-94E9-E8F6B4697514} (NsvPlayX Control) - http://www.nullsoft.com/nsv/embed/nsvplayx_vp3_mp3.cab
O16 - DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} (Shockwave Flash Object) - http://fpdownload2.macromedia.com/get/shockwave/cabs/flash/swflash.cab
O16 - DPF: {F5A7706B-B9C0-4C89-A715-7A0C6B05DD48} (Minesweeper Flags Class) - http://messenger.zone.msn.com/binary/MineSweeper.cab56986.cab
O18 - Protocol: bwfile-8876480 - {9462A756-7B47-47BC-8C80-C34B9B80B32B} - C:\Program Files\Logitech\Desktop Messenger\8876480\Program\GAPlugProtocol-8876480.dll
O23 - Service: Lavasoft Ad-Aware Service (aawservice) - Lavasoft - C:\Program Files\Lavasoft\Ad-Aware\aawservice.exe
O23 - Service: Apple Mobile Device - Apple Inc. - C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
O23 - Service: avast! iAVS4 Control Service (aswUpdSv) - ALWIL Software - C:\Program Files\Alwil Software\Avast4\aswUpdSv.exe
O23 - Service: avast! Antivirus - ALWIL Software - C:\Program Files\Alwil Software\Avast4\ashServ.exe
O23 - Service: Service Bonjour (Bonjour Service) - Apple Inc. - C:\Program Files\Bonjour\mDNSResponder.exe
O23 - Service: Bluetooth Service (btwdins) - Broadcom Corporation - C:\Program Files\WIDCOMM\Bluetooth Software\bin\btwdins.exe
O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Common Files\InstallShield\Driver\11\Intel 32\IDriverT.exe
O23 - Service: Service de l’iPod (iPod Service) - Apple Inc. - C:\Program Files\iPod\bin\iPodService.exe
O23 - Service: LexBce Server (LexBceS) - Lexmark International, Inc. - C:\WINDOWS\system32\LEXBCES.EXE
O23 - Service: TrueVector Internet Monitor (vsmon) - Zone Labs, LLC - C:\WINDOWS\system32\ZONELABS\vsmon.exe
A voir également:
- Security system ou apparenté
- Reboot system now - Guide
- Microsoft security essentials - Télécharger - Antivirus & Antimalwares
- Ai security avis - Forum Mobile
- Cette action ne peut pas être réalisée car le fichier est ouvert dans system - Guide
- Fichier ouvert dans system ✓ - Forum Windows
30 réponses
Bonjour,
1) Imprime ces instructions car il faudra fermer toutes les fenêtres et applications lors de l'installation et de l'analyse.
2) Télécharge Malwarebytes' Anti-Malware (MBAM) et enregistre le sur ton Bureau à partir de ce lien :
http://www.malwarebytes.org/mbam/program/mbam-setup.exe
hxxp://www.download.com/Malwarebytes-Anti-Malware/3000-8022_4-10804572.html
3) A la fin du téléchargement, ferme toutes les fenêtres et programmes, y compris celui-ci.
4) Double-clique sur l'icône Download_mbam-setup.exe sur ton bureau pour démarrer le programme d'installation.
5) Pendant l'installation, suis les indications (en particulier le choix de la langue et l'autorisation d'accession à Internet). N'apporte aucune modification aux réglages par défaut et, en fin d'installation, vérifie que les options Update Malwarebytes' Anti-Malware et Launch Malwarebytes' Anti-Malware sont cochées.
6) MBAM démarrera automatiquement et enverra un message demandant à mettre à jour le programme avant de lancer une analyse. Comme MBAM se met automatiquement à jour en fin d'installation, clique sur OK pour fermer la boîte de dialogue. La fenêtre principale de MBAM s'affiche :
7) Dans l'onglet analyse, vérifie que "Exécuter une analyse rapide" est coché et clique sur le bouton Rechercher pour démarrer l'analyse.
8) MBAM analyse ton ordinateur. L'analyse peut prendre un certain temps. Il suffit de vérifier de temps en temps son avancement.
9) A la fin de l'analyse, un message s'affiche indiquant la fin de l'analyse. Clique sur OK pour poursuivre.
10) Si des malwares ont été détectés, leur liste s'affiche.
En cliquant sur Suppression (?) , MBAM va détruire les fichiers et clés de registre et en mettre une copie dans la quarantaine.
11) MBAM va ouvrir le Bloc-notes et y copier le rapport d'analyse. Ferme le Bloc-notes. (Le rapport peut être retrouvé sous l'onglet Rapports/logs)
12) Ferme MBAM en cliquant sur Quitter.
13) Poste le rapport dans ta réponse
1) Imprime ces instructions car il faudra fermer toutes les fenêtres et applications lors de l'installation et de l'analyse.
2) Télécharge Malwarebytes' Anti-Malware (MBAM) et enregistre le sur ton Bureau à partir de ce lien :
http://www.malwarebytes.org/mbam/program/mbam-setup.exe
hxxp://www.download.com/Malwarebytes-Anti-Malware/3000-8022_4-10804572.html
3) A la fin du téléchargement, ferme toutes les fenêtres et programmes, y compris celui-ci.
4) Double-clique sur l'icône Download_mbam-setup.exe sur ton bureau pour démarrer le programme d'installation.
5) Pendant l'installation, suis les indications (en particulier le choix de la langue et l'autorisation d'accession à Internet). N'apporte aucune modification aux réglages par défaut et, en fin d'installation, vérifie que les options Update Malwarebytes' Anti-Malware et Launch Malwarebytes' Anti-Malware sont cochées.
6) MBAM démarrera automatiquement et enverra un message demandant à mettre à jour le programme avant de lancer une analyse. Comme MBAM se met automatiquement à jour en fin d'installation, clique sur OK pour fermer la boîte de dialogue. La fenêtre principale de MBAM s'affiche :
7) Dans l'onglet analyse, vérifie que "Exécuter une analyse rapide" est coché et clique sur le bouton Rechercher pour démarrer l'analyse.
8) MBAM analyse ton ordinateur. L'analyse peut prendre un certain temps. Il suffit de vérifier de temps en temps son avancement.
9) A la fin de l'analyse, un message s'affiche indiquant la fin de l'analyse. Clique sur OK pour poursuivre.
10) Si des malwares ont été détectés, leur liste s'affiche.
En cliquant sur Suppression (?) , MBAM va détruire les fichiers et clés de registre et en mettre une copie dans la quarantaine.
11) MBAM va ouvrir le Bloc-notes et y copier le rapport d'analyse. Ferme le Bloc-notes. (Le rapport peut être retrouvé sous l'onglet Rapports/logs)
12) Ferme MBAM en cliquant sur Quitter.
13) Poste le rapport dans ta réponse
Malwarebytes' Anti-Malware 1.20
Version de la base de données: 963
Windows 5.1.2600 Service Pack 3
10:10:36 30/09/2009
mbam-log-9-30-2009 (10-10-36).txt
Type de recherche: Examen rapide
Eléments examinés: 42569
Temps écoulé: 21 minute(s), 21 second(s)
Processus mémoire infecté(s): 0
Module(s) mémoire infecté(s): 0
Clé(s) du Registre infectée(s): 0
Valeur(s) du Registre infectée(s): 2
Elément(s) de données du Registre infecté(s): 0
Dossier(s) infecté(s): 0
Fichier(s) infecté(s): 6
Processus mémoire infecté(s):
(Aucun élément nuisible détecté)
Module(s) mémoire infecté(s):
(Aucun élément nuisible détecté)
Clé(s) du Registre infectée(s):
(Aucun élément nuisible détecté)
Valeur(s) du Registre infectée(s):
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\svchost (Worm.IRCBot) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\PromoReg (Trojan.Downloader) -> Quarantined and deleted successfully.
Elément(s) de données du Registre infecté(s):
(Aucun élément nuisible détecté)
Dossier(s) infecté(s):
(Aucun élément nuisible détecté)
Fichier(s) infecté(s):
C:\Documents and Settings\Reda\Application Data\svcst.exe (Worm.IRCBot) -> Delete on reboot.
C:\WINDOWS\Temp\_ex-08.exe (Trojan.Downloader) -> Delete on reboot.
C:\Documents and Settings\Reda\Local Settings\Temp\BN1.tmp (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Reda\Local Settings\Temp\BN2.tmp (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Reda\Local Settings\Temp\BN5.tmp (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Reda\Local Settings\Temp\BN6.tmp (Trojan.Agent) -> Quarantined and deleted successfully.
Version de la base de données: 963
Windows 5.1.2600 Service Pack 3
10:10:36 30/09/2009
mbam-log-9-30-2009 (10-10-36).txt
Type de recherche: Examen rapide
Eléments examinés: 42569
Temps écoulé: 21 minute(s), 21 second(s)
Processus mémoire infecté(s): 0
Module(s) mémoire infecté(s): 0
Clé(s) du Registre infectée(s): 0
Valeur(s) du Registre infectée(s): 2
Elément(s) de données du Registre infecté(s): 0
Dossier(s) infecté(s): 0
Fichier(s) infecté(s): 6
Processus mémoire infecté(s):
(Aucun élément nuisible détecté)
Module(s) mémoire infecté(s):
(Aucun élément nuisible détecté)
Clé(s) du Registre infectée(s):
(Aucun élément nuisible détecté)
Valeur(s) du Registre infectée(s):
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\svchost (Worm.IRCBot) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\PromoReg (Trojan.Downloader) -> Quarantined and deleted successfully.
Elément(s) de données du Registre infecté(s):
(Aucun élément nuisible détecté)
Dossier(s) infecté(s):
(Aucun élément nuisible détecté)
Fichier(s) infecté(s):
C:\Documents and Settings\Reda\Application Data\svcst.exe (Worm.IRCBot) -> Delete on reboot.
C:\WINDOWS\Temp\_ex-08.exe (Trojan.Downloader) -> Delete on reboot.
C:\Documents and Settings\Reda\Local Settings\Temp\BN1.tmp (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Reda\Local Settings\Temp\BN2.tmp (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Reda\Local Settings\Temp\BN5.tmp (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Reda\Local Settings\Temp\BN6.tmp (Trojan.Agent) -> Quarantined and deleted successfully.
Bonjour,
fais redémarrer l'ordi.
==
Ouvre ce lien et télécharge ZHPDiag :
https://www.zebulon.fr/telechargements/securite/systeme/zhpdiag.html
hxxp://telechargement.zebulon.fr/telecharger-zhpdiag.html
Enregistre le sur ton Bureau.
Une fois le téléchargement achevé,fais un double clic sur ZHPDiag.exe et suis les instructions.
N'oublie pas de cocher la case qui permet de mettre un raccourci sur le Bureau.
Double clique sur le raccourci ZHPDiag sur ton Bureau.
/|\ l'outil a créé 2 icônes ZHPDiag et ZHPFix.
Clique sur le Tournevis puis sur Tous pour cocher toutes les cases des options.
Décoche les cases O45 et O61.
Clique sur la loupe pour lancer l'analyse.
Laisse l'outil travailler, il peut être assez long.
Ferme ZHPDiag en fin d'analyse.
Pour transmettre le rapport clique sur ce lien :
http://www.cijoint.fr/
Clique sur Parcourir et cherche le répertoire où est installé ZHPDiag (en général C:\Program Files\ZHPDiag).
Sélectionne le fichier ZHPDiag.txt.
Clique sur "Cliquez ici pour déposer le fichier".
Un lien de cette forme :
http://www.cijoint.fr/cjlink.php?file=cj200905/cijSKAP5fU.txt
est ajouté dans la page.
Copie ce lien dans ta réponse.
fais redémarrer l'ordi.
==
Ouvre ce lien et télécharge ZHPDiag :
https://www.zebulon.fr/telechargements/securite/systeme/zhpdiag.html
hxxp://telechargement.zebulon.fr/telecharger-zhpdiag.html
Enregistre le sur ton Bureau.
Une fois le téléchargement achevé,fais un double clic sur ZHPDiag.exe et suis les instructions.
N'oublie pas de cocher la case qui permet de mettre un raccourci sur le Bureau.
Double clique sur le raccourci ZHPDiag sur ton Bureau.
/|\ l'outil a créé 2 icônes ZHPDiag et ZHPFix.
Clique sur le Tournevis puis sur Tous pour cocher toutes les cases des options.
Décoche les cases O45 et O61.
Clique sur la loupe pour lancer l'analyse.
Laisse l'outil travailler, il peut être assez long.
Ferme ZHPDiag en fin d'analyse.
Pour transmettre le rapport clique sur ce lien :
http://www.cijoint.fr/
Clique sur Parcourir et cherche le répertoire où est installé ZHPDiag (en général C:\Program Files\ZHPDiag).
Sélectionne le fichier ZHPDiag.txt.
Clique sur "Cliquez ici pour déposer le fichier".
Un lien de cette forme :
http://www.cijoint.fr/cjlink.php?file=cj200905/cijSKAP5fU.txt
est ajouté dans la page.
Copie ce lien dans ta réponse.
Salut.
Un message d'erreur apparait et le scan s'arrête.
(Violation d'accès à l'adresse 00404AA8 dans le module ZHPdiag.exe)
Un message d'erreur apparait et le scan s'arrête.
(Violation d'accès à l'adresse 00404AA8 dans le module ZHPdiag.exe)
Vous n’avez pas trouvé la réponse que vous recherchez ?
Posez votre question
Bonjour,
déconnecte toi d'Internet.
Désactive Ad Aware, Avast et Zone Alarm
Exécute ZHPDiag comme indiqué.
Réactive Ad Aware, Avast et Zone Alarm
Reconnecte toi.
Poste le rapport dans un lien cijoint.
(tu es bien sous Windows Xp) ?
déconnecte toi d'Internet.
Désactive Ad Aware, Avast et Zone Alarm
Exécute ZHPDiag comme indiqué.
Réactive Ad Aware, Avast et Zone Alarm
Reconnecte toi.
Poste le rapport dans un lien cijoint.
(tu es bien sous Windows Xp) ?
Re,
essaye cet analyseur :
Télécharge OTL de OLDTimer ici :
http://www.geekstogo.com/forum/files/file/398-otl-oldtimers-list-it/
et enregistre le sur ton Bureau.
Double clic sur OTL.exe pour le lancer.
Coche les 2 cases Lop et Purity
Coche la case devant "scan all users"
Clic sur Run Scan.
A la fin du scan, le Bloc-Notes va s'ouvrir avec le rapport (OTL.txt).
Ce fichier est sur ton Bureau (en général C:\Documents and settings\le_nom_de_ta_session\OTL.txt)
Pour me le transmettre clique sur ce lien :
http://www.cijoint.fr/
Clique sur Parcourir et cherche le fichier ci-dessus.
Clique sur Ouvrir.
Clique sur "Cliquez ici pour déposer le fichier".
Un lien de cette forme :
http://www.cijoint.fr/cjlink.php?file=cj200905/cijSKAP5fU.txt
est ajouté dans la page.
Copie ce lien dans ta réponse.
essaye cet analyseur :
Télécharge OTL de OLDTimer ici :
http://www.geekstogo.com/forum/files/file/398-otl-oldtimers-list-it/
et enregistre le sur ton Bureau.
Double clic sur OTL.exe pour le lancer.
Coche les 2 cases Lop et Purity
Coche la case devant "scan all users"
Clic sur Run Scan.
A la fin du scan, le Bloc-Notes va s'ouvrir avec le rapport (OTL.txt).
Ce fichier est sur ton Bureau (en général C:\Documents and settings\le_nom_de_ta_session\OTL.txt)
Pour me le transmettre clique sur ce lien :
http://www.cijoint.fr/
Clique sur Parcourir et cherche le fichier ci-dessus.
Clique sur Ouvrir.
Clique sur "Cliquez ici pour déposer le fichier".
Un lien de cette forme :
http://www.cijoint.fr/cjlink.php?file=cj200905/cijSKAP5fU.txt
est ajouté dans la page.
Copie ce lien dans ta réponse.
Voilà
http://www.cijoint.fr/cjlink.php?file=cj200910/cijK4uctD3.txt
(un fichier extras.txt a été crée je dois le transmettre aussi ?)
Merci
http://www.cijoint.fr/cjlink.php?file=cj200910/cijK4uctD3.txt
(un fichier extras.txt a été crée je dois le transmettre aussi ?)
Merci
Bonjour,
du travail.
Double clic sur OTL.exe pour le lancer.
Copie la liste qui se trouve en gras ci-dessous,
et colle-la dans la zone sous Customs Scans/Fixes
:OTL
PRC - [2009/09/27 19:25:38 | 00,036,352 | ---- | M] (Microsoft Corporation) -- C:\WINDOWS\Temp\wpv981254007820.exe
PRC - [2009/09/27 19:25:40 | 00,026,837 | ---- | M] () -- C:\WINDOWS\System32\restorer32_a.exe
PRC - [2009/09/27 19:27:08 | 01,096,736 | ---- | M] () -- C:\Documents and Settings\All Users\Application Data\19656104\19656104.exe
PRC - [2009/09/27 19:25:42 | 00,026,837 | ---- | M] () -- C:\Documents and Settings\Reda\restorer32_a.exe
PRC - [2009/09/29 20:59:44 | 00,013,312 | ---- | M] () -- C:\Documents and Settings\Reda\Application Data\seres.exe
PRC - [2009/09/29 20:59:44 | 00,013,312 | ---- | M] () -- C:\Documents and Settings\Reda\Application Data\svcst.exe
O4 - HKLM\..\Run: [19656104] C:\Documents and Settings\All Users\Application Data\19656104\19656104.exe ()
O4 - HKLM\..\Run: [restorer32_a] C:\WINDOWS\System32\restorer32_a.exe ()
O4 - HKLM\..\Run: [sysgif32] C:\WINDOWS\Temp\wpv981254007820.exe (Microsoft Corporation)
O4 - HKU\S-1-5-21-861567501-1202660629-1060284298-1004\..\Run: [mserv] C:\Documents and Settings\Reda\Application Data\seres.exe ()
O4 - HKU\S-1-5-21-861567501-1202660629-1060284298-1004\..\Run: [ntias64] File not found
O4 - HKU\S-1-5-21-861567501-1202660629-1060284298-1004\..\Run: [restorer32_a] C:\Documents and Settings\Reda\restorer32_a.exe ()
O4 - HKU\S-1-5-21-861567501-1202660629-1060284298-1004\..\Run: [svchost] C:\Documents and Settings\Reda\Application Data\svcst.exe ()
O4 - Startup: C:\Documents and Settings\Reda\Start Menu\Programs\Startup\ikowin32.exe ()
O16 - DPF: {00000055-9980-0010-8000-00AA00389B71} http://codecs.microsoft.com/codecs/i386/fhg.CAB (Reg Error: Key error.)
O16 - DPF: {3334504D-0000-0010-8000-00AA00389B71} http://codecs.microsoft.com/codecs/i386/mpeg4ax.cab (Reg Error: Key error.)
[2009/09/27 19:27:06 | 00,000,000 | ---D | C] -- C:\Documents and Settings\All Users\Application Data\19656104
[2009/10/02 19:53:44 | 00,000,000 | ---D | C] -- C:\Documents and Settings\Reda\Local Settings\Application Data\ntias64
[2009/10/03 08:56:24 | 00,158,320 | ---- | C] (;qkdfjfsdsgjsdg) -- C:\Documents and Settings\Reda\Application Data\lizkavd.exe
:commands
[emptytemp]
Clique sur RunFix pour lancer la suppression.
Poste le rapport.
du travail.
Double clic sur OTL.exe pour le lancer.
Copie la liste qui se trouve en gras ci-dessous,
et colle-la dans la zone sous Customs Scans/Fixes
:OTL
PRC - [2009/09/27 19:25:38 | 00,036,352 | ---- | M] (Microsoft Corporation) -- C:\WINDOWS\Temp\wpv981254007820.exe
PRC - [2009/09/27 19:25:40 | 00,026,837 | ---- | M] () -- C:\WINDOWS\System32\restorer32_a.exe
PRC - [2009/09/27 19:27:08 | 01,096,736 | ---- | M] () -- C:\Documents and Settings\All Users\Application Data\19656104\19656104.exe
PRC - [2009/09/27 19:25:42 | 00,026,837 | ---- | M] () -- C:\Documents and Settings\Reda\restorer32_a.exe
PRC - [2009/09/29 20:59:44 | 00,013,312 | ---- | M] () -- C:\Documents and Settings\Reda\Application Data\seres.exe
PRC - [2009/09/29 20:59:44 | 00,013,312 | ---- | M] () -- C:\Documents and Settings\Reda\Application Data\svcst.exe
O4 - HKLM\..\Run: [19656104] C:\Documents and Settings\All Users\Application Data\19656104\19656104.exe ()
O4 - HKLM\..\Run: [restorer32_a] C:\WINDOWS\System32\restorer32_a.exe ()
O4 - HKLM\..\Run: [sysgif32] C:\WINDOWS\Temp\wpv981254007820.exe (Microsoft Corporation)
O4 - HKU\S-1-5-21-861567501-1202660629-1060284298-1004\..\Run: [mserv] C:\Documents and Settings\Reda\Application Data\seres.exe ()
O4 - HKU\S-1-5-21-861567501-1202660629-1060284298-1004\..\Run: [ntias64] File not found
O4 - HKU\S-1-5-21-861567501-1202660629-1060284298-1004\..\Run: [restorer32_a] C:\Documents and Settings\Reda\restorer32_a.exe ()
O4 - HKU\S-1-5-21-861567501-1202660629-1060284298-1004\..\Run: [svchost] C:\Documents and Settings\Reda\Application Data\svcst.exe ()
O4 - Startup: C:\Documents and Settings\Reda\Start Menu\Programs\Startup\ikowin32.exe ()
O16 - DPF: {00000055-9980-0010-8000-00AA00389B71} http://codecs.microsoft.com/codecs/i386/fhg.CAB (Reg Error: Key error.)
O16 - DPF: {3334504D-0000-0010-8000-00AA00389B71} http://codecs.microsoft.com/codecs/i386/mpeg4ax.cab (Reg Error: Key error.)
[2009/09/27 19:27:06 | 00,000,000 | ---D | C] -- C:\Documents and Settings\All Users\Application Data\19656104
[2009/10/02 19:53:44 | 00,000,000 | ---D | C] -- C:\Documents and Settings\Reda\Local Settings\Application Data\ntias64
[2009/10/03 08:56:24 | 00,158,320 | ---- | C] (;qkdfjfsdsgjsdg) -- C:\Documents and Settings\Reda\Application Data\lizkavd.exe
:commands
[emptytemp]
Clique sur RunFix pour lancer la suppression.
Poste le rapport.
All processes killed
========== OTL ==========
Process wpv981254007820.exe killed successfully!
Process restorer32_a.exe killed successfully!
Process 19656104.exe killed successfully!
No active process named restorer32_a.exe was found!
Process seres.exe killed successfully!
Process svcst.exe killed successfully!
Registry key HKEY_LOCAL_MACHINE\\Software\Microsoft\Windows\CurrentVersion\Run not found.
C:\Documents and Settings\All Users\Application Data\19656104\19656104.exe moved successfully.
Registry key HKEY_LOCAL_MACHINE\\Software\Microsoft\Windows\CurrentVersion\Run not found.
C:\WINDOWS\System32\restorer32_a.exe moved successfully.
Registry key HKEY_LOCAL_MACHINE\\Software\Microsoft\Windows\CurrentVersion\Run not found.
C:\WINDOWS\Temp\wpv981254007820.exe moved successfully.
Registry value HKEY_USERS\S-1-5-21-861567501-1202660629-1060284298-1004\\Software\Microsoft\Windows\CurrentVersion\Run\\mserv deleted successfully.
C:\Documents and Settings\Reda\Application Data\seres.exe moved successfully.
Registry value HKEY_USERS\S-1-5-21-861567501-1202660629-1060284298-1004\\Software\Microsoft\Windows\CurrentVersion\Run\\ntias64 deleted successfully.
Registry value HKEY_USERS\S-1-5-21-861567501-1202660629-1060284298-1004\\Software\Microsoft\Windows\CurrentVersion\Run\\restorer32_a deleted successfully.
C:\Documents and Settings\Reda\restorer32_a.exe moved successfully.
Registry value HKEY_USERS\S-1-5-21-861567501-1202660629-1060284298-1004\\Software\Microsoft\Windows\CurrentVersion\Run\\svchost deleted successfully.
C:\Documents and Settings\Reda\Application Data\svcst.exe moved successfully.
C:\Documents and Settings\Reda\Start Menu\Programs\Startup\ikowin32.exe moved successfully.
Starting removal of ActiveX control {00000055-9980-0010-8000-00AA00389B71}
C:\WINDOWS\Downloaded Program Files\fhg.inf moved successfully.
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Code Store Database\Distribution Units\{00000055-9980-0010-8000-00AA00389B71}\ deleted successfully.
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{00000055-9980-0010-8000-00AA00389B71}\ not found.
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{00000055-9980-0010-8000-00AA00389B71}\ not found.
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{00000055-9980-0010-8000-00AA00389B71}\ not found.
Starting removal of ActiveX control {3334504D-0000-0010-8000-00AA00389B71}
C:\WINDOWS\Downloaded Program Files\mpeg4ax.inf moved successfully.
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Code Store Database\Distribution Units\{3334504D-0000-0010-8000-00AA00389B71}\ deleted successfully.
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{3334504D-0000-0010-8000-00AA00389B71}\ not found.
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{3334504D-0000-0010-8000-00AA00389B71}\ not found.
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{3334504D-0000-0010-8000-00AA00389B71}\ not found.
C:\Documents and Settings\All Users\Application Data\19656104 moved successfully.
C:\Documents and Settings\Reda\Local Settings\Application Data\ntias64 moved successfully.
C:\Documents and Settings\Reda\Application Data\lizkavd.exe moved successfully.
========== COMMANDS ==========
[EMPTYTEMP]
User: Default User
->Temp folder emptied: 0 bytes
->Temporary Internet Files folder emptied: 33170 bytes
User: All Users
User: NetworkService
->Temp folder emptied: 0 bytes
->Temporary Internet Files folder emptied: 388787 bytes
User: LocalService
File delete failed. C:\Documents and Settings\LocalService\Local Settings\Temp\History\History.IE5\index.dat scheduled to be deleted on reboot.
File delete failed. C:\Documents and Settings\LocalService\Local Settings\Temp\Cookies\index.dat scheduled to be deleted on reboot.
File delete failed. C:\Documents and Settings\LocalService\Local Settings\Temp\Temporary Internet Files\Content.IE5\index.dat scheduled to be deleted on reboot.
->Temp folder emptied: 66016 bytes
File delete failed. C:\Documents and Settings\LocalService\Local Settings\Temporary Internet Files\Content.IE5\index.dat scheduled to be deleted on reboot.
->Temporary Internet Files folder emptied: 43656 bytes
User: Reda
->Temp folder emptied: 326011166 bytes
File delete failed. C:\Documents and Settings\Reda\Local Settings\Temporary Internet Files\AntiPhishing\A0AB7674-8D67-4F4D-B5E1-96FAEADFB79D.dat scheduled to be deleted on reboot.
File delete failed. C:\Documents and Settings\Reda\Local Settings\Temporary Internet Files\Content.IE5\O0WBSKK0\affich-14547865-security-system-ou-apparente[1].htm scheduled to be deleted on reboot.
File delete failed. C:\Documents and Settings\Reda\Local Settings\Temporary Internet Files\Content.IE5\O0WBSKK0\ads[1].htm scheduled to be deleted on reboot.
File delete failed. C:\Documents and Settings\Reda\Local Settings\Temporary Internet Files\Content.IE5\O0WBSKK0\afr[1].htm scheduled to be deleted on reboot.
File delete failed. C:\Documents and Settings\Reda\Local Settings\Temporary Internet Files\Content.IE5\0MIAJIZ6\ads[1].htm scheduled to be deleted on reboot.
File delete failed. C:\Documents and Settings\Reda\Local Settings\Temporary Internet Files\Content.IE5\MYHV95NG\afr[1].htm scheduled to be deleted on reboot.
File delete failed. C:\Documents and Settings\Reda\Local Settings\Temporary Internet Files\Content.IE5\index.dat scheduled to be deleted on reboot.
->Temporary Internet Files folder emptied: 14492233 bytes
->Java cache emptied: 41682669 bytes
%systemdrive% .tmp files removed: 0 bytes
C:\WINDOWS\msdownld.tmp folder deleted successfully.
%systemroot% .tmp files removed: 1228730 bytes
%systemroot%\System32 .tmp files removed: 8983057 bytes
File delete failed. C:\WINDOWS\temp\Perflib_Perfdata_640.dat scheduled to be deleted on reboot.
File delete failed. C:\WINDOWS\temp\ZLT03c05.TMP scheduled to be deleted on reboot.
Windows Temp folder emptied: 1203320 bytes
RecycleBin emptied: 1291369 bytes
Total Files Cleaned = 377,11 mb
OTL by OldTimer - Version 3.0.18.0 log created on 10032009_111847
Files\Folders moved on Reboot...
C:\Documents and Settings\Reda\Local Settings\Temporary Internet Files\AntiPhishing\A0AB7674-8D67-4F4D-B5E1-96FAEADFB79D.dat moved successfully.
File\Folder C:\Documents and Settings\Reda\Local Settings\Temporary Internet Files\Content.IE5\O0WBSKK0\affich-14547865-security-system-ou-apparente[1].htm not found!
File\Folder C:\Documents and Settings\Reda\Local Settings\Temporary Internet Files\Content.IE5\O0WBSKK0\ads[1].htm not found!
File\Folder C:\Documents and Settings\Reda\Local Settings\Temporary Internet Files\Content.IE5\O0WBSKK0\afr[1].htm not found!
File\Folder C:\Documents and Settings\Reda\Local Settings\Temporary Internet Files\Content.IE5\0MIAJIZ6\ads[1].htm not found!
File\Folder C:\Documents and Settings\Reda\Local Settings\Temporary Internet Files\Content.IE5\MYHV95NG\afr[1].htm not found!
C:\WINDOWS\temp\Perflib_Perfdata_640.dat moved successfully.
File\Folder C:\WINDOWS\temp\ZLT03c05.TMP not found!
Registry entries deleted on Reboot...
========== OTL ==========
Process wpv981254007820.exe killed successfully!
Process restorer32_a.exe killed successfully!
Process 19656104.exe killed successfully!
No active process named restorer32_a.exe was found!
Process seres.exe killed successfully!
Process svcst.exe killed successfully!
Registry key HKEY_LOCAL_MACHINE\\Software\Microsoft\Windows\CurrentVersion\Run not found.
C:\Documents and Settings\All Users\Application Data\19656104\19656104.exe moved successfully.
Registry key HKEY_LOCAL_MACHINE\\Software\Microsoft\Windows\CurrentVersion\Run not found.
C:\WINDOWS\System32\restorer32_a.exe moved successfully.
Registry key HKEY_LOCAL_MACHINE\\Software\Microsoft\Windows\CurrentVersion\Run not found.
C:\WINDOWS\Temp\wpv981254007820.exe moved successfully.
Registry value HKEY_USERS\S-1-5-21-861567501-1202660629-1060284298-1004\\Software\Microsoft\Windows\CurrentVersion\Run\\mserv deleted successfully.
C:\Documents and Settings\Reda\Application Data\seres.exe moved successfully.
Registry value HKEY_USERS\S-1-5-21-861567501-1202660629-1060284298-1004\\Software\Microsoft\Windows\CurrentVersion\Run\\ntias64 deleted successfully.
Registry value HKEY_USERS\S-1-5-21-861567501-1202660629-1060284298-1004\\Software\Microsoft\Windows\CurrentVersion\Run\\restorer32_a deleted successfully.
C:\Documents and Settings\Reda\restorer32_a.exe moved successfully.
Registry value HKEY_USERS\S-1-5-21-861567501-1202660629-1060284298-1004\\Software\Microsoft\Windows\CurrentVersion\Run\\svchost deleted successfully.
C:\Documents and Settings\Reda\Application Data\svcst.exe moved successfully.
C:\Documents and Settings\Reda\Start Menu\Programs\Startup\ikowin32.exe moved successfully.
Starting removal of ActiveX control {00000055-9980-0010-8000-00AA00389B71}
C:\WINDOWS\Downloaded Program Files\fhg.inf moved successfully.
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Code Store Database\Distribution Units\{00000055-9980-0010-8000-00AA00389B71}\ deleted successfully.
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{00000055-9980-0010-8000-00AA00389B71}\ not found.
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{00000055-9980-0010-8000-00AA00389B71}\ not found.
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{00000055-9980-0010-8000-00AA00389B71}\ not found.
Starting removal of ActiveX control {3334504D-0000-0010-8000-00AA00389B71}
C:\WINDOWS\Downloaded Program Files\mpeg4ax.inf moved successfully.
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Code Store Database\Distribution Units\{3334504D-0000-0010-8000-00AA00389B71}\ deleted successfully.
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{3334504D-0000-0010-8000-00AA00389B71}\ not found.
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{3334504D-0000-0010-8000-00AA00389B71}\ not found.
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{3334504D-0000-0010-8000-00AA00389B71}\ not found.
C:\Documents and Settings\All Users\Application Data\19656104 moved successfully.
C:\Documents and Settings\Reda\Local Settings\Application Data\ntias64 moved successfully.
C:\Documents and Settings\Reda\Application Data\lizkavd.exe moved successfully.
========== COMMANDS ==========
[EMPTYTEMP]
User: Default User
->Temp folder emptied: 0 bytes
->Temporary Internet Files folder emptied: 33170 bytes
User: All Users
User: NetworkService
->Temp folder emptied: 0 bytes
->Temporary Internet Files folder emptied: 388787 bytes
User: LocalService
File delete failed. C:\Documents and Settings\LocalService\Local Settings\Temp\History\History.IE5\index.dat scheduled to be deleted on reboot.
File delete failed. C:\Documents and Settings\LocalService\Local Settings\Temp\Cookies\index.dat scheduled to be deleted on reboot.
File delete failed. C:\Documents and Settings\LocalService\Local Settings\Temp\Temporary Internet Files\Content.IE5\index.dat scheduled to be deleted on reboot.
->Temp folder emptied: 66016 bytes
File delete failed. C:\Documents and Settings\LocalService\Local Settings\Temporary Internet Files\Content.IE5\index.dat scheduled to be deleted on reboot.
->Temporary Internet Files folder emptied: 43656 bytes
User: Reda
->Temp folder emptied: 326011166 bytes
File delete failed. C:\Documents and Settings\Reda\Local Settings\Temporary Internet Files\AntiPhishing\A0AB7674-8D67-4F4D-B5E1-96FAEADFB79D.dat scheduled to be deleted on reboot.
File delete failed. C:\Documents and Settings\Reda\Local Settings\Temporary Internet Files\Content.IE5\O0WBSKK0\affich-14547865-security-system-ou-apparente[1].htm scheduled to be deleted on reboot.
File delete failed. C:\Documents and Settings\Reda\Local Settings\Temporary Internet Files\Content.IE5\O0WBSKK0\ads[1].htm scheduled to be deleted on reboot.
File delete failed. C:\Documents and Settings\Reda\Local Settings\Temporary Internet Files\Content.IE5\O0WBSKK0\afr[1].htm scheduled to be deleted on reboot.
File delete failed. C:\Documents and Settings\Reda\Local Settings\Temporary Internet Files\Content.IE5\0MIAJIZ6\ads[1].htm scheduled to be deleted on reboot.
File delete failed. C:\Documents and Settings\Reda\Local Settings\Temporary Internet Files\Content.IE5\MYHV95NG\afr[1].htm scheduled to be deleted on reboot.
File delete failed. C:\Documents and Settings\Reda\Local Settings\Temporary Internet Files\Content.IE5\index.dat scheduled to be deleted on reboot.
->Temporary Internet Files folder emptied: 14492233 bytes
->Java cache emptied: 41682669 bytes
%systemdrive% .tmp files removed: 0 bytes
C:\WINDOWS\msdownld.tmp folder deleted successfully.
%systemroot% .tmp files removed: 1228730 bytes
%systemroot%\System32 .tmp files removed: 8983057 bytes
File delete failed. C:\WINDOWS\temp\Perflib_Perfdata_640.dat scheduled to be deleted on reboot.
File delete failed. C:\WINDOWS\temp\ZLT03c05.TMP scheduled to be deleted on reboot.
Windows Temp folder emptied: 1203320 bytes
RecycleBin emptied: 1291369 bytes
Total Files Cleaned = 377,11 mb
OTL by OldTimer - Version 3.0.18.0 log created on 10032009_111847
Files\Folders moved on Reboot...
C:\Documents and Settings\Reda\Local Settings\Temporary Internet Files\AntiPhishing\A0AB7674-8D67-4F4D-B5E1-96FAEADFB79D.dat moved successfully.
File\Folder C:\Documents and Settings\Reda\Local Settings\Temporary Internet Files\Content.IE5\O0WBSKK0\affich-14547865-security-system-ou-apparente[1].htm not found!
File\Folder C:\Documents and Settings\Reda\Local Settings\Temporary Internet Files\Content.IE5\O0WBSKK0\ads[1].htm not found!
File\Folder C:\Documents and Settings\Reda\Local Settings\Temporary Internet Files\Content.IE5\O0WBSKK0\afr[1].htm not found!
File\Folder C:\Documents and Settings\Reda\Local Settings\Temporary Internet Files\Content.IE5\0MIAJIZ6\ads[1].htm not found!
File\Folder C:\Documents and Settings\Reda\Local Settings\Temporary Internet Files\Content.IE5\MYHV95NG\afr[1].htm not found!
C:\WINDOWS\temp\Perflib_Perfdata_640.dat moved successfully.
File\Folder C:\WINDOWS\temp\ZLT03c05.TMP not found!
Registry entries deleted on Reboot...
Re,
tu fais redémarrer l'ordi si OTL ne l'a pas fait.
Tu refais tourner OTL et tu postes le rapport.
tu fais redémarrer l'ordi si OTL ne l'a pas fait.
Tu refais tourner OTL et tu postes le rapport.
C'était le rapport au redemarrage.
Je le refais tourner (ca s'est d'ailleurs arrangé plus de changement de background et de lancements de plein de merde).
Je le refais tourner (ca s'est d'ailleurs arrangé plus de changement de background et de lancements de plein de merde).
All processes killed
========== OTL ==========
No active process named wpv981254007820.exe was found!
No active process named restorer32_a.exe was found!
No active process named 19656104.exe was found!
No active process named restorer32_a.exe was found!
No active process named seres.exe was found!
No active process named svcst.exe was found!
Registry key HKEY_LOCAL_MACHINE\\Software\Microsoft\Windows\CurrentVersion\Run not found.
File C:\Documents and Settings\All Users\Application Data\19656104\19656104.exe not found.
Registry key HKEY_LOCAL_MACHINE\\Software\Microsoft\Windows\CurrentVersion\Run not found.
File C:\WINDOWS\System32\restorer32_a.exe not found.
Registry key HKEY_LOCAL_MACHINE\\Software\Microsoft\Windows\CurrentVersion\Run not found.
File C:\WINDOWS\Temp\wpv981254007820.exe not found.
Registry value HKEY_USERS\S-1-5-21-861567501-1202660629-1060284298-1004\\Software\Microsoft\Windows\CurrentVersion\Run\\mserv not found.
File C:\Documents and Settings\Reda\Application Data\seres.exe not found.
Registry value HKEY_USERS\S-1-5-21-861567501-1202660629-1060284298-1004\\Software\Microsoft\Windows\CurrentVersion\Run\\ntias64 not found.
Registry value HKEY_USERS\S-1-5-21-861567501-1202660629-1060284298-1004\\Software\Microsoft\Windows\CurrentVersion\Run\\restorer32_a not found.
File C:\Documents and Settings\Reda\restorer32_a.exe not found.
Registry value HKEY_USERS\S-1-5-21-861567501-1202660629-1060284298-1004\\Software\Microsoft\Windows\CurrentVersion\Run\\svchost not found.
File C:\Documents and Settings\Reda\Application Data\svcst.exe not found.
File C:\Documents and Settings\Reda\Start Menu\Programs\Startup\ikowin32.exe not found.
Starting removal of ActiveX control {00000055-9980-0010-8000-00AA00389B71}
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Code Store Database\Distribution Units\{00000055-9980-0010-8000-00AA00389B71}\ not found.
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{00000055-9980-0010-8000-00AA00389B71}\ not found.
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{00000055-9980-0010-8000-00AA00389B71}\ not found.
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{00000055-9980-0010-8000-00AA00389B71}\ not found.
Starting removal of ActiveX control {3334504D-0000-0010-8000-00AA00389B71}
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Code Store Database\Distribution Units\{3334504D-0000-0010-8000-00AA00389B71}\ not found.
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{3334504D-0000-0010-8000-00AA00389B71}\ not found.
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{3334504D-0000-0010-8000-00AA00389B71}\ not found.
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{3334504D-0000-0010-8000-00AA00389B71}\ not found.
Folder C:\Documents and Settings\All Users\Application Data\19656104\ not found.
Folder C:\Documents and Settings\Reda\Local Settings\Application Data\ntias64\ not found.
File C:\Documents and Settings\Reda\Application Data\lizkavd.exe not found.
========== COMMANDS ==========
[EMPTYTEMP]
User: Default User
->Temp folder emptied: 0 bytes
->Temporary Internet Files folder emptied: 0 bytes
User: All Users
User: NetworkService
->Temp folder emptied: 0 bytes
->Temporary Internet Files folder emptied: 0 bytes
User: LocalService
File delete failed. C:\Documents and Settings\LocalService\Local Settings\Temp\History\History.IE5\index.dat scheduled to be deleted on reboot.
File delete failed. C:\Documents and Settings\LocalService\Local Settings\Temp\Cookies\index.dat scheduled to be deleted on reboot.
File delete failed. C:\Documents and Settings\LocalService\Local Settings\Temp\Temporary Internet Files\Content.IE5\index.dat scheduled to be deleted on reboot.
->Temp folder emptied: 66016 bytes
File delete failed. C:\Documents and Settings\LocalService\Local Settings\Temporary Internet Files\Content.IE5\index.dat scheduled to be deleted on reboot.
->Temporary Internet Files folder emptied: 33170 bytes
User: Reda
->Temp folder emptied: 2435 bytes
File delete failed. C:\Documents and Settings\Reda\Local Settings\Temporary Internet Files\AntiPhishing\A0AB7674-8D67-4F4D-B5E1-96FAEADFB79D.dat scheduled to be deleted on reboot.
File delete failed. C:\Documents and Settings\Reda\Local Settings\Temporary Internet Files\Content.IE5\U0U2ADFA\ads[1].htm scheduled to be deleted on reboot.
File delete failed. C:\Documents and Settings\Reda\Local Settings\Temporary Internet Files\Content.IE5\U0U2ADFA\ads[2].htm scheduled to be deleted on reboot.
File delete failed. C:\Documents and Settings\Reda\Local Settings\Temporary Internet Files\Content.IE5\NFZEOV0F\afr[1].htm scheduled to be deleted on reboot.
File delete failed. C:\Documents and Settings\Reda\Local Settings\Temporary Internet Files\Content.IE5\NFZEOV0F\afr[2].htm scheduled to be deleted on reboot.
File delete failed. C:\Documents and Settings\Reda\Local Settings\Temporary Internet Files\Content.IE5\NFZEOV0F\dis[1].htm scheduled to be deleted on reboot.
File delete failed. C:\Documents and Settings\Reda\Local Settings\Temporary Internet Files\Content.IE5\NFZEOV0F\affich-14547865-security-system-ou-apparente[1].htm scheduled to be deleted on reboot.
File delete failed. C:\Documents and Settings\Reda\Local Settings\Temporary Internet Files\Content.IE5\index.dat scheduled to be deleted on reboot.
->Temporary Internet Files folder emptied: 1519674 bytes
->Java cache emptied: 0 bytes
%systemdrive% .tmp files removed: 0 bytes
%systemroot% .tmp files removed: 0 bytes
%systemroot%\System32 .tmp files removed: 0 bytes
File delete failed. C:\WINDOWS\temp\Perflib_Perfdata_610.dat scheduled to be deleted on reboot.
File delete failed. C:\WINDOWS\temp\ZLT04b88.TMP scheduled to be deleted on reboot.
Windows Temp folder emptied: 16895 bytes
RecycleBin emptied: 0 bytes
Total Files Cleaned = 1,56 mb
OTL by OldTimer - Version 3.0.18.0 log created on 10032009_205557
Files\Folders moved on Reboot...
C:\Documents and Settings\Reda\Local Settings\Temporary Internet Files\AntiPhishing\A0AB7674-8D67-4F4D-B5E1-96FAEADFB79D.dat moved successfully.
File\Folder C:\Documents and Settings\Reda\Local Settings\Temporary Internet Files\Content.IE5\U0U2ADFA\ads[1].htm not found!
File\Folder C:\Documents and Settings\Reda\Local Settings\Temporary Internet Files\Content.IE5\U0U2ADFA\ads[2].htm not found!
File\Folder C:\Documents and Settings\Reda\Local Settings\Temporary Internet Files\Content.IE5\NFZEOV0F\afr[1].htm not found!
File\Folder C:\Documents and Settings\Reda\Local Settings\Temporary Internet Files\Content.IE5\NFZEOV0F\afr[2].htm not found!
File\Folder C:\Documents and Settings\Reda\Local Settings\Temporary Internet Files\Content.IE5\NFZEOV0F\dis[1].htm not found!
File\Folder C:\Documents and Settings\Reda\Local Settings\Temporary Internet Files\Content.IE5\NFZEOV0F\affich-14547865-security-system-ou-apparente[1].htm not found!
C:\WINDOWS\temp\Perflib_Perfdata_610.dat moved successfully.
File\Folder C:\WINDOWS\temp\ZLT04b88.TMP not found!
Registry entries deleted on Reboot...
========== OTL ==========
No active process named wpv981254007820.exe was found!
No active process named restorer32_a.exe was found!
No active process named 19656104.exe was found!
No active process named restorer32_a.exe was found!
No active process named seres.exe was found!
No active process named svcst.exe was found!
Registry key HKEY_LOCAL_MACHINE\\Software\Microsoft\Windows\CurrentVersion\Run not found.
File C:\Documents and Settings\All Users\Application Data\19656104\19656104.exe not found.
Registry key HKEY_LOCAL_MACHINE\\Software\Microsoft\Windows\CurrentVersion\Run not found.
File C:\WINDOWS\System32\restorer32_a.exe not found.
Registry key HKEY_LOCAL_MACHINE\\Software\Microsoft\Windows\CurrentVersion\Run not found.
File C:\WINDOWS\Temp\wpv981254007820.exe not found.
Registry value HKEY_USERS\S-1-5-21-861567501-1202660629-1060284298-1004\\Software\Microsoft\Windows\CurrentVersion\Run\\mserv not found.
File C:\Documents and Settings\Reda\Application Data\seres.exe not found.
Registry value HKEY_USERS\S-1-5-21-861567501-1202660629-1060284298-1004\\Software\Microsoft\Windows\CurrentVersion\Run\\ntias64 not found.
Registry value HKEY_USERS\S-1-5-21-861567501-1202660629-1060284298-1004\\Software\Microsoft\Windows\CurrentVersion\Run\\restorer32_a not found.
File C:\Documents and Settings\Reda\restorer32_a.exe not found.
Registry value HKEY_USERS\S-1-5-21-861567501-1202660629-1060284298-1004\\Software\Microsoft\Windows\CurrentVersion\Run\\svchost not found.
File C:\Documents and Settings\Reda\Application Data\svcst.exe not found.
File C:\Documents and Settings\Reda\Start Menu\Programs\Startup\ikowin32.exe not found.
Starting removal of ActiveX control {00000055-9980-0010-8000-00AA00389B71}
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Code Store Database\Distribution Units\{00000055-9980-0010-8000-00AA00389B71}\ not found.
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{00000055-9980-0010-8000-00AA00389B71}\ not found.
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{00000055-9980-0010-8000-00AA00389B71}\ not found.
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{00000055-9980-0010-8000-00AA00389B71}\ not found.
Starting removal of ActiveX control {3334504D-0000-0010-8000-00AA00389B71}
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Code Store Database\Distribution Units\{3334504D-0000-0010-8000-00AA00389B71}\ not found.
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{3334504D-0000-0010-8000-00AA00389B71}\ not found.
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{3334504D-0000-0010-8000-00AA00389B71}\ not found.
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{3334504D-0000-0010-8000-00AA00389B71}\ not found.
Folder C:\Documents and Settings\All Users\Application Data\19656104\ not found.
Folder C:\Documents and Settings\Reda\Local Settings\Application Data\ntias64\ not found.
File C:\Documents and Settings\Reda\Application Data\lizkavd.exe not found.
========== COMMANDS ==========
[EMPTYTEMP]
User: Default User
->Temp folder emptied: 0 bytes
->Temporary Internet Files folder emptied: 0 bytes
User: All Users
User: NetworkService
->Temp folder emptied: 0 bytes
->Temporary Internet Files folder emptied: 0 bytes
User: LocalService
File delete failed. C:\Documents and Settings\LocalService\Local Settings\Temp\History\History.IE5\index.dat scheduled to be deleted on reboot.
File delete failed. C:\Documents and Settings\LocalService\Local Settings\Temp\Cookies\index.dat scheduled to be deleted on reboot.
File delete failed. C:\Documents and Settings\LocalService\Local Settings\Temp\Temporary Internet Files\Content.IE5\index.dat scheduled to be deleted on reboot.
->Temp folder emptied: 66016 bytes
File delete failed. C:\Documents and Settings\LocalService\Local Settings\Temporary Internet Files\Content.IE5\index.dat scheduled to be deleted on reboot.
->Temporary Internet Files folder emptied: 33170 bytes
User: Reda
->Temp folder emptied: 2435 bytes
File delete failed. C:\Documents and Settings\Reda\Local Settings\Temporary Internet Files\AntiPhishing\A0AB7674-8D67-4F4D-B5E1-96FAEADFB79D.dat scheduled to be deleted on reboot.
File delete failed. C:\Documents and Settings\Reda\Local Settings\Temporary Internet Files\Content.IE5\U0U2ADFA\ads[1].htm scheduled to be deleted on reboot.
File delete failed. C:\Documents and Settings\Reda\Local Settings\Temporary Internet Files\Content.IE5\U0U2ADFA\ads[2].htm scheduled to be deleted on reboot.
File delete failed. C:\Documents and Settings\Reda\Local Settings\Temporary Internet Files\Content.IE5\NFZEOV0F\afr[1].htm scheduled to be deleted on reboot.
File delete failed. C:\Documents and Settings\Reda\Local Settings\Temporary Internet Files\Content.IE5\NFZEOV0F\afr[2].htm scheduled to be deleted on reboot.
File delete failed. C:\Documents and Settings\Reda\Local Settings\Temporary Internet Files\Content.IE5\NFZEOV0F\dis[1].htm scheduled to be deleted on reboot.
File delete failed. C:\Documents and Settings\Reda\Local Settings\Temporary Internet Files\Content.IE5\NFZEOV0F\affich-14547865-security-system-ou-apparente[1].htm scheduled to be deleted on reboot.
File delete failed. C:\Documents and Settings\Reda\Local Settings\Temporary Internet Files\Content.IE5\index.dat scheduled to be deleted on reboot.
->Temporary Internet Files folder emptied: 1519674 bytes
->Java cache emptied: 0 bytes
%systemdrive% .tmp files removed: 0 bytes
%systemroot% .tmp files removed: 0 bytes
%systemroot%\System32 .tmp files removed: 0 bytes
File delete failed. C:\WINDOWS\temp\Perflib_Perfdata_610.dat scheduled to be deleted on reboot.
File delete failed. C:\WINDOWS\temp\ZLT04b88.TMP scheduled to be deleted on reboot.
Windows Temp folder emptied: 16895 bytes
RecycleBin emptied: 0 bytes
Total Files Cleaned = 1,56 mb
OTL by OldTimer - Version 3.0.18.0 log created on 10032009_205557
Files\Folders moved on Reboot...
C:\Documents and Settings\Reda\Local Settings\Temporary Internet Files\AntiPhishing\A0AB7674-8D67-4F4D-B5E1-96FAEADFB79D.dat moved successfully.
File\Folder C:\Documents and Settings\Reda\Local Settings\Temporary Internet Files\Content.IE5\U0U2ADFA\ads[1].htm not found!
File\Folder C:\Documents and Settings\Reda\Local Settings\Temporary Internet Files\Content.IE5\U0U2ADFA\ads[2].htm not found!
File\Folder C:\Documents and Settings\Reda\Local Settings\Temporary Internet Files\Content.IE5\NFZEOV0F\afr[1].htm not found!
File\Folder C:\Documents and Settings\Reda\Local Settings\Temporary Internet Files\Content.IE5\NFZEOV0F\afr[2].htm not found!
File\Folder C:\Documents and Settings\Reda\Local Settings\Temporary Internet Files\Content.IE5\NFZEOV0F\dis[1].htm not found!
File\Folder C:\Documents and Settings\Reda\Local Settings\Temporary Internet Files\Content.IE5\NFZEOV0F\affich-14547865-security-system-ou-apparente[1].htm not found!
C:\WINDOWS\temp\Perflib_Perfdata_610.dat moved successfully.
File\Folder C:\WINDOWS\temp\ZLT04b88.TMP not found!
Registry entries deleted on Reboot...
Re,
je n'ai pas besoin que tu fasses tourner de nouveau OTL avec un script de désinfection.
Refais ce qui est dit au post 7 à partir de :
Double clic sur OTL.exe pour le lancer.
Bon, ceci dit, comme il ne trouve pas les objest du script, c'est que le nettoyage a réussi, ce qui est une bonne nouvelle.
Le nouveau rapport va permettre d'affiner si besoin.
je n'ai pas besoin que tu fasses tourner de nouveau OTL avec un script de désinfection.
Refais ce qui est dit au post 7 à partir de :
Double clic sur OTL.exe pour le lancer.
Bon, ceci dit, comme il ne trouve pas les objest du script, c'est que le nettoyage a réussi, ce qui est une bonne nouvelle.
Le nouveau rapport va permettre d'affiner si besoin.
Malwarebytes' Anti-Malware 1.41
Version de la base de données: 2904
Windows 5.1.2600 Service Pack 3
04/10/2009 12:54:47
mbam-log-2009-10-04 (12-54-46).txt
Type de recherche: Examen rapide
Eléments examinés: 92838
Temps écoulé: 10 minute(s), 30 second(s)
Processus mémoire infecté(s): 0
Module(s) mémoire infecté(s): 0
Clé(s) du Registre infectée(s): 3
Valeur(s) du Registre infectée(s): 9
Elément(s) de données du Registre infecté(s): 3
Dossier(s) infecté(s): 1
Fichier(s) infecté(s): 5
Processus mémoire infecté(s):
(Aucun élément nuisible détecté)
Module(s) mémoire infecté(s):
(Aucun élément nuisible détecté)
Clé(s) du Registre infectée(s):
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{1d4db7d2-6ec9-47a3-bd87-1e41684e07bb} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{09f1adac-76d8-4d0f-99a5-5c907dadb988} (Rogue.Multiple) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\systemsecurity2009 (Rogue.TotalSecurity) -> Quarantined and deleted successfully.
Valeur(s) du Registre infectée(s):
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\restorer32_a (Trojan.FakeAlert) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\sysgif32 (Trojan.Agent) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\Control Panel\don't load\scui.cpl (Hijack.SecurityCenter) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\Control Panel\don't load\wscui.cpl (Hijack.SecurityCenter) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\ForceClassicControlPanel (Hijack.ControlPanelStyle) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\19656104 (Rogue.Multiple) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Regedit32 (Trojan.Agent) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RList (Malware.Trace) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Antivirus Pro 2010 (Rogue.AntiVirusPro2010) -> Quarantined and deleted successfully.
Elément(s) de données du Registre infecté(s):
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\AntiVirusDisableNotify (Disabled.SecurityCenter) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\FirewallDisableNotify (Disabled.SecurityCenter) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\UpdatesDisableNotify (Disabled.SecurityCenter) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.
Dossier(s) infecté(s):
C:\Documents and Settings\Reda\Start Menu\Programs\Total Security (Rogue.TotalSecurity) -> Quarantined and deleted successfully.
Fichier(s) infecté(s):
C:\WINDOWS\system32\_scui.cpl (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\Documents and Settings\Reda\Start Menu\Programs\Total Security\Total Security 2009.lnk (Rogue.TotalSecurity) -> Quarantined and deleted successfully.
C:\Documents and Settings\Reda\Application Data\wiaserva.log (Malware.Trace) -> Quarantined and deleted successfully.
C:\Documents and Settings\Reda\oashdihasidhasuidhiasdhiashdiuasdhasd (Malware.Trace) -> Quarantined and deleted successfully.
C:\WINDOWS\SKO Screensaver.dat (Trojan.Agent) -> Quarantined and deleted successfully.
(le logiciel aussi doit etre mis à jour ?)
Version de la base de données: 2904
Windows 5.1.2600 Service Pack 3
04/10/2009 12:54:47
mbam-log-2009-10-04 (12-54-46).txt
Type de recherche: Examen rapide
Eléments examinés: 92838
Temps écoulé: 10 minute(s), 30 second(s)
Processus mémoire infecté(s): 0
Module(s) mémoire infecté(s): 0
Clé(s) du Registre infectée(s): 3
Valeur(s) du Registre infectée(s): 9
Elément(s) de données du Registre infecté(s): 3
Dossier(s) infecté(s): 1
Fichier(s) infecté(s): 5
Processus mémoire infecté(s):
(Aucun élément nuisible détecté)
Module(s) mémoire infecté(s):
(Aucun élément nuisible détecté)
Clé(s) du Registre infectée(s):
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{1d4db7d2-6ec9-47a3-bd87-1e41684e07bb} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{09f1adac-76d8-4d0f-99a5-5c907dadb988} (Rogue.Multiple) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\systemsecurity2009 (Rogue.TotalSecurity) -> Quarantined and deleted successfully.
Valeur(s) du Registre infectée(s):
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\restorer32_a (Trojan.FakeAlert) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\sysgif32 (Trojan.Agent) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\Control Panel\don't load\scui.cpl (Hijack.SecurityCenter) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\Control Panel\don't load\wscui.cpl (Hijack.SecurityCenter) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\ForceClassicControlPanel (Hijack.ControlPanelStyle) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\19656104 (Rogue.Multiple) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Regedit32 (Trojan.Agent) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RList (Malware.Trace) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Antivirus Pro 2010 (Rogue.AntiVirusPro2010) -> Quarantined and deleted successfully.
Elément(s) de données du Registre infecté(s):
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\AntiVirusDisableNotify (Disabled.SecurityCenter) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\FirewallDisableNotify (Disabled.SecurityCenter) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\UpdatesDisableNotify (Disabled.SecurityCenter) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.
Dossier(s) infecté(s):
C:\Documents and Settings\Reda\Start Menu\Programs\Total Security (Rogue.TotalSecurity) -> Quarantined and deleted successfully.
Fichier(s) infecté(s):
C:\WINDOWS\system32\_scui.cpl (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\Documents and Settings\Reda\Start Menu\Programs\Total Security\Total Security 2009.lnk (Rogue.TotalSecurity) -> Quarantined and deleted successfully.
C:\Documents and Settings\Reda\Application Data\wiaserva.log (Malware.Trace) -> Quarantined and deleted successfully.
C:\Documents and Settings\Reda\oashdihasidhasuidhiasdhiashdiuasdhasd (Malware.Trace) -> Quarantined and deleted successfully.
C:\WINDOWS\SKO Screensaver.dat (Trojan.Agent) -> Quarantined and deleted successfully.
(le logiciel aussi doit etre mis à jour ?)
Bonsoir,
le logiciel aussi a été mis à jour (si tu as noté, la mise à jour s'est faite en 2 temps).
Comme tu peux le constater en lisant le rapport de MBAM, ça a changé des choses ...
Par contre, le rapport OTL a vieilli.
Fais redémarrer l'ordi si ça n'a pas été fait depuis le scan de MBAM, refais tourner OTL et poste le résultat dans un lien cijoint.
le logiciel aussi a été mis à jour (si tu as noté, la mise à jour s'est faite en 2 temps).
Comme tu peux le constater en lisant le rapport de MBAM, ça a changé des choses ...
Par contre, le rapport OTL a vieilli.
Fais redémarrer l'ordi si ça n'a pas été fait depuis le scan de MBAM, refais tourner OTL et poste le résultat dans un lien cijoint.