Cheval de troie & tracking cookie

aubben -  
 aubben -
Bonjour,
J''ai 2 attaques que je n'arrive pas à supprimer Cheval de troie:generic16.JP et tracking cookie Adtech
AVG les détecte mais ne les supprime pas !

Que faire Merci à vous
A voir également:

1 réponse

sherred Messages postés 8605 Statut Membre 351
 
essai ca
Télécharge Superantispyware (SAS)
https://www.superantispyware.com/superantispywarefreevspro.html

une fois l'installation et la mise a jour effectuée

clic sur « scanner votre ordinateur »
coche scan complète
et suivant

Le rapport :
"Preferences" "Statistics/journaux de bord".
double-clique sur le dernier SUPERAntiSpyware Scan Log.
0
aubben
 
Merci pour l'info je te joins le rapport
SUPERAntiSpyware Scan Log
https://www.superantispyware.com/

Generated 12/21/2009 at 01:23 PM

Application Version : 4.32.1000

Core Rules Database Version : 4397
Trace Rules Database Version: 2232

Scan type : Complete Scan
Total Scan Time : 00:32:45

Memory items scanned : 520
Memory threats detected : 0
Registry items scanned : 5519
Registry threats detected : 13
File items scanned : 20867
File threats detected : 32

Adware.Tracking Cookie
C:\Documents and Settings\!Benoit\Cookies\!benoit@atdmt[2].txt
C:\Documents and Settings\!Benoit\Cookies\!benoit@smartadserver[1].txt
C:\Documents and Settings\!Benoit\Cookies\!benoit@aimfar.solution.weborama[1].txt
C:\Documents and Settings\!Benoit\Cookies\!benoit@xiti[1].txt
C:\Documents and Settings\!Benoit\Cookies\!benoit@weborama[1].txt
C:\Documents and Settings\!Benoit\Cookies\!benoit@ad.proxad[2].txt
C:\Documents and Settings\NetworkService\Cookies\system@ads.0pb[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@247realmedia[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@smartadserver[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@a.websponsors[2].txt
C:\Documents and Settings\NetworkService\Cookies\system@ads.audxch[2].txt
C:\Documents and Settings\NetworkService\Cookies\system@adtech[2].txt
C:\Documents and Settings\NetworkService\Cookies\system@adserving.aedgency[2].txt
C:\Documents and Settings\NetworkService\Cookies\system@virginmobile.solution.weborama[2].txt
C:\Documents and Settings\NetworkService\Cookies\system@nestlecereals.solution.weborama[2].txt
C:\Documents and Settings\NetworkService\Cookies\system@weborama[2].txt
C:\Documents and Settings\NetworkService\Cookies\system@media6degrees[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@tracking.publicidees[2].txt
C:\Documents and Settings\NetworkService\Cookies\system@ad.zanox[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@bs.serving-sys[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@ad.yieldmanager[2].txt
C:\Documents and Settings\NetworkService\Cookies\system@content.yieldmanager[2].txt
C:\Documents and Settings\NetworkService\Cookies\system@content.yieldmanager[3].txt
C:\Documents and Settings\NetworkService\Cookies\system@zanox[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@pro-market[2].txt
C:\Documents and Settings\NetworkService\Cookies\system@xiti[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@serving-sys[2].txt
C:\Documents and Settings\NetworkService\Cookies\system@mmedia.t134[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@t.bbtrack[2].txt
C:\Documents and Settings\NetworkService\Cookies\system@adsrv.clickvol[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@exoclick[1].txt

Trojan.Dropper/Win-NV
HKLM\SYSTEM\CurrentControlSet\Services\SSHNAS
HKLM\SYSTEM\CurrentControlSet\Services\SSHNAS#Type
HKLM\SYSTEM\CurrentControlSet\Services\SSHNAS#Start
HKLM\SYSTEM\CurrentControlSet\Services\SSHNAS#ErrorControl
HKLM\SYSTEM\CurrentControlSet\Services\SSHNAS#ImagePath
HKLM\SYSTEM\CurrentControlSet\Services\SSHNAS#DisplayName
HKLM\SYSTEM\CurrentControlSet\Services\SSHNAS#ObjectName
HKLM\SYSTEM\CurrentControlSet\Services\SSHNAS\Parameters
HKLM\SYSTEM\CurrentControlSet\Services\SSHNAS\Parameters#ServiceDll
HKLM\SYSTEM\CurrentControlSet\Services\SSHNAS\Enum
HKLM\SYSTEM\CurrentControlSet\Services\SSHNAS\Enum#0
HKLM\SYSTEM\CurrentControlSet\Services\SSHNAS\Enum#Count
HKLM\SYSTEM\CurrentControlSet\Services\SSHNAS\Enum#NextInstance

Trojan.Agent/Gen-NameSpy
C:\SYSTEM VOLUME INFORMATION\_RESTORE{E4E412DC-0D07-4561-A5F0-C67831DE53DA}\RP258\A0057982.EXE
0