Antimalware Doctor et Security Tools-Problems
Gus
-
Gus -
Gus -
Bonjour,
En début de journée j'avais mon ordi infesté de trucs pas bons. En fait, il y avait le antimalware doctor et un truc Security Tools qui ouvraient pleins de fenêtres.
En démarrant en mode sans échec et en regardant les autres forums associés au Antimalware doctor, j'ai commencer avec rkill pour ensuite utiliser MalwareByte's anti-Malware et bon, scan complet, supprimer la quarantaine.
Entre deux redémarrages où j'avais pas fait F8 à temps (avant de supprimer la quarantaine), Antimalware doctor n'était plus là, mais le maudit Security Tools oui (?...)
Avant d'aller plus loin, je penses que je vais avoir besoin d'aide pour les trucs de ComboFix si j'en ai besoin encore.
Merci énormément à celui qui me vient en aide!
(!) Edit pour mettre le rapport
Malwarebytes' Anti-Malware 1.46
www.malwarebytes.org
Version de la base de données: 4411
Windows 5.1.2600 Service Pack 3 (Safe Mode)
Internet Explorer 7.0.5730.11
2010-08-09 17:18:31
mbam-log-2010-08-09 (17-18-31).txt
Type d'examen: Examen complet (C:\|)
Elément(s) analysé(s): 200058
Temps écoulé: 31 minute(s), 0 seconde(s)
Processus mémoire infecté(s): 0
Module(s) mémoire infecté(s): 0
Clé(s) du Registre infectée(s): 17
Valeur(s) du Registre infectée(s): 5
Elément(s) de données du Registre infecté(s): 4
Dossier(s) infecté(s): 5
Fichier(s) infecté(s): 43
Processus mémoire infecté(s):
(Aucun élément nuisible détecté)
Module(s) mémoire infecté(s):
(Aucun élément nuisible détecté)
Clé(s) du Registre infectée(s):
HKEY_CLASSES_ROOT\cscrptxt.cscrptxt (Adware.EZlife) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{6741ac3f-b847-4951-9c6d-8e138c99371e} (Adware.EZlife) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{6741ac3f-b847-4951-9c6d-8e138c99371e} (Adware.EZlife) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{e0ec6fba-f009-3535-95d6-b6390db27da1} (Adware.EZlife) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\cscrptxt.cscrptxt.1.0 (Adware.EZlife) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\AppID\{84c3c236-f588-4c93-84f4-147b2abbe67b} (Adware.Adrotator) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\AppID\{38061edc-40bb-4618-a8da-e56353347e6d} (Adware.EZlife) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\AppID\{7b6a2552-e65b-4a9e-add4-c45577ffd8fd} (Adware.EZLife) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\adgj.aghlp (Adware.EZLife) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\adgj.aghlp.1 (Adware.EZLife) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\adshothlpr.adshothlpr (Adware.Adrotator) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\adshothlpr.adshothlpr.1.0 (Adware.Adrotator) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\$NtUninstallMTF1011$ (Adware.Adrotator) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Sky-Banners (Adware.Adrotator) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Street-Ads (Adware.Adrotator) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{a41a8e0d-f84b-4906-ac5b-6551e2d1450e} (Adware.AdRotator) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{a41a8e0d-f84b-4906-ac5b-6551e2d1450e} (Adware.AdRotator) -> Quarantined and deleted successfully.
Valeur(s) du Registre infectée(s):
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lsdefrag (Trojan.Downloader) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\mchk (Trojan.Adware) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\jgyo0w (Trojan.Downloader) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\sta (Trojan.Agent.Gen) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\taskman (Trojan.Agent) -> Quarantined and deleted successfully.
Elément(s) de données du Registre infecté(s):
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\AntiVirusDisableNotify (Disabled.SecurityCenter) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\FirewallDisableNotify (Disabled.SecurityCenter) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\UpdatesDisableNotify (Disabled.SecurityCenter) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters\NameServer (Trojan.DNSChanger) -> Data: 93.188.164.73,93.188.166.223 -> Quarantined and deleted successfully.
Dossier(s) infecté(s):
C:\Documents and Settings\user\Application Data\Sky-Banners (Adware.Adrotator) -> Quarantined and deleted successfully.
C:\Documents and Settings\user\Application Data\Sky-Banners\skb (Adware.Adrotator) -> Quarantined and deleted successfully.
C:\Documents and Settings\user\Application Data\Street-Ads (Adware.Adrotator) -> Quarantined and deleted successfully.
C:\Documents and Settings\user\Application Data\Street-Ads\sta (Adware.Adrotator) -> Quarantined and deleted successfully.
C:\WINDOWS\$NtUninstallMTF1011$ (Adware.Adrotator) -> Quarantined and deleted successfully.
Fichier(s) infecté(s):
C:\Documents and Settings\user\Local Settings\Temp\axneorcmsw.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\nwvap.exe (Trojan.Adware) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\awvap.dll (Adware.EZlife) -> Quarantined and deleted successfully.
C:\Documents and Settings\user\Application Data\9861A29A7659BE65F8F2B833A31FE091\secureapp70700.exe (Trojan.Agent.Gen) -> Quarantined and deleted successfully.
C:\Documents and Settings\user\Local Settings\Temp\2506.tmp (Rootkit.Dropper) -> Quarantined and deleted successfully.
C:\Documents and Settings\user\Local Settings\Temp\2507.tmp (Rootkit.Dropper) -> Quarantined and deleted successfully.
C:\Documents and Settings\user\Local Settings\Temp\250A.tmp (Rootkit.Dropper) -> Quarantined and deleted successfully.
C:\Documents and Settings\user\Local Settings\Temp\250B.tmp (Rootkit.Dropper) -> Quarantined and deleted successfully.
C:\Documents and Settings\user\Local Settings\Temp\250D.tmp (Rootkit.Dropper) -> Quarantined and deleted successfully.
C:\Documents and Settings\user\Local Settings\Temp\dzwwvzoj.exe (Trojan.Dropper) -> Quarantined and deleted successfully.
C:\Documents and Settings\user\Local Settings\Temp\kiq1chip.exe (Trojan.Sisproc.Gen) -> Quarantined and deleted successfully.
C:\Documents and Settings\user\Local Settings\Temp\rsxenawmco.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\Documents and Settings\user\Local Settings\Temp\ukdoi.exe (Adware.BHO) -> Quarantined and deleted successfully.
C:\Documents and Settings\user\Local Settings\Temp\voqk2m76.exe (Trojan.LVBP) -> Quarantined and deleted successfully.
C:\Documents and Settings\user\Local Settings\Temp\Xzc.exe (Trojan.Agent.Gen) -> Quarantined and deleted successfully.
C:\Documents and Settings\user\Local Settings\Temp\Xzd.exe (Trojan.Agent.Gen) -> Quarantined and deleted successfully.
C:\Documents and Settings\user\Local Settings\Temp\Xze.exe (Trojan.Agent.Gen) -> Quarantined and deleted successfully.
C:\Documents and Settings\user\Local Settings\Temp\Xzf.exe (Trojan.Agent.Gen) -> Quarantined and deleted successfully.
C:\Documents and Settings\user\Local Settings\Temp\Xzg.exe (Trojan.Agent.Gen) -> Quarantined and deleted successfully.
C:\Documents and Settings\user\Local Settings\Temp\Xzh.exe (Trojan.Agent.Gen) -> Quarantined and deleted successfully.
C:\Documents and Settings\user\Local Settings\Temp\Xzi.exe (Trojan.Agent.Gen) -> Quarantined and deleted successfully.
C:\Documents and Settings\user\Local Settings\Temp\Xzj.exe (Trojan.Agent.Gen) -> Quarantined and deleted successfully.
C:\Documents and Settings\user\Local Settings\Temp\Xzk.exe (Trojan.Agent.Gen) -> Quarantined and deleted successfully.
C:\Documents and Settings\user\Local Settings\Temp\yhw5f2e47.exe (Trojan.Sisproc.Gen) -> Quarantined and deleted successfully.
C:\Documents and Settings\user\Local Settings\Temporary Internet Files\Content.IE5\DHKZEMZS\imhbjepxrz[1].htm (Malware.Packer.Gen) -> Quarantined and deleted successfully.
C:\Documents and Settings\user\Local Settings\Temporary Internet Files\Content.IE5\MY07L86W\aaidkfmhfa[3].htm (Adware.BHO) -> Quarantined and deleted successfully.
C:\Documents and Settings\user\Local Settings\Temporary Internet Files\Content.IE5\MY07L86W\sjnvpnidk[1].htm (Malware.Packer.Gen) -> Quarantined and deleted successfully.
C:\Documents and Settings\user\Local Settings\Temporary Internet Files\Content.IE5\ZHPJ4EJ2\aaidkfmhfa[1].htm (Adware.BHO) -> Quarantined and deleted successfully.
C:\Documents and Settings\user\Local Settings\Temporary Internet Files\Content.IE5\ZHPJ4EJ2\imhbjepxrz[1].htm (Malware.Packer.Gen) -> Quarantined and deleted successfully.
C:\Documents and Settings\user\Mes documents\1\fff-ea121.exe (Trojan.Orsam) -> Quarantined and deleted successfully.
C:\Documents and Settings\user\Mes documents\1\fff-ea140.exe (Trojan.Orsam) -> Quarantined and deleted successfully.
C:\WINDOWS\Xrutua.exe (Trojan.Agent.Gen) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\spool\prtprocs\w32x86\31e9aAA9.dll (Trojan.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\spool\prtprocs\w32x86\79s1e93.dll (Trojan.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\spool\prtprocs\w32x86\93y7c3179.dll (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\user\Application Data\Sky-Banners\skb\log.xml (Adware.Adrotator) -> Quarantined and deleted successfully.
C:\WINDOWS\$NtUninstallMTF1011$\apUninstall.exe (Adware.Adrotator) -> Quarantined and deleted successfully.
C:\Documents and Settings\user\Menu Démarrer\Programmes\Security Tool.LNK (Rogue.SecurityTool) -> Quarantined and deleted successfully.
C:\Documents and Settings\user\Application Data\Microsoft\Internet Explorer\Quick Launch\Antimalware Doctor.lnk (Rogue.AntimalwareDoctor) -> Quarantined and deleted successfully.
C:\Documents and Settings\user\Menu Démarrer\Antimalware Doctor.lnk (Rogue.AntimalwareDoctor) -> Quarantined and deleted successfully.
C:\Documents and Settings\user\Menu Démarrer\Programmes\Démarrage\Antimalware Doctor.lnk (Rogue.AntiMalwareDoctor) -> Quarantined and deleted successfully.
C:\WINDOWS\Tasks\{35DC3473-A719-4d14-B7C1-FD326CA84A0C}.job (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\Tasks\{22116563-108C-42c0-A7CE-60161B75E508}.job (Trojan.Downloader) -> Quarantined and deleted successfully.
(!)
En début de journée j'avais mon ordi infesté de trucs pas bons. En fait, il y avait le antimalware doctor et un truc Security Tools qui ouvraient pleins de fenêtres.
En démarrant en mode sans échec et en regardant les autres forums associés au Antimalware doctor, j'ai commencer avec rkill pour ensuite utiliser MalwareByte's anti-Malware et bon, scan complet, supprimer la quarantaine.
Entre deux redémarrages où j'avais pas fait F8 à temps (avant de supprimer la quarantaine), Antimalware doctor n'était plus là, mais le maudit Security Tools oui (?...)
Avant d'aller plus loin, je penses que je vais avoir besoin d'aide pour les trucs de ComboFix si j'en ai besoin encore.
Merci énormément à celui qui me vient en aide!
(!) Edit pour mettre le rapport
Malwarebytes' Anti-Malware 1.46
www.malwarebytes.org
Version de la base de données: 4411
Windows 5.1.2600 Service Pack 3 (Safe Mode)
Internet Explorer 7.0.5730.11
2010-08-09 17:18:31
mbam-log-2010-08-09 (17-18-31).txt
Type d'examen: Examen complet (C:\|)
Elément(s) analysé(s): 200058
Temps écoulé: 31 minute(s), 0 seconde(s)
Processus mémoire infecté(s): 0
Module(s) mémoire infecté(s): 0
Clé(s) du Registre infectée(s): 17
Valeur(s) du Registre infectée(s): 5
Elément(s) de données du Registre infecté(s): 4
Dossier(s) infecté(s): 5
Fichier(s) infecté(s): 43
Processus mémoire infecté(s):
(Aucun élément nuisible détecté)
Module(s) mémoire infecté(s):
(Aucun élément nuisible détecté)
Clé(s) du Registre infectée(s):
HKEY_CLASSES_ROOT\cscrptxt.cscrptxt (Adware.EZlife) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{6741ac3f-b847-4951-9c6d-8e138c99371e} (Adware.EZlife) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{6741ac3f-b847-4951-9c6d-8e138c99371e} (Adware.EZlife) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{e0ec6fba-f009-3535-95d6-b6390db27da1} (Adware.EZlife) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\cscrptxt.cscrptxt.1.0 (Adware.EZlife) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\AppID\{84c3c236-f588-4c93-84f4-147b2abbe67b} (Adware.Adrotator) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\AppID\{38061edc-40bb-4618-a8da-e56353347e6d} (Adware.EZlife) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\AppID\{7b6a2552-e65b-4a9e-add4-c45577ffd8fd} (Adware.EZLife) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\adgj.aghlp (Adware.EZLife) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\adgj.aghlp.1 (Adware.EZLife) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\adshothlpr.adshothlpr (Adware.Adrotator) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\adshothlpr.adshothlpr.1.0 (Adware.Adrotator) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\$NtUninstallMTF1011$ (Adware.Adrotator) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Sky-Banners (Adware.Adrotator) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Street-Ads (Adware.Adrotator) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{a41a8e0d-f84b-4906-ac5b-6551e2d1450e} (Adware.AdRotator) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{a41a8e0d-f84b-4906-ac5b-6551e2d1450e} (Adware.AdRotator) -> Quarantined and deleted successfully.
Valeur(s) du Registre infectée(s):
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lsdefrag (Trojan.Downloader) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\mchk (Trojan.Adware) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\jgyo0w (Trojan.Downloader) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\sta (Trojan.Agent.Gen) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\taskman (Trojan.Agent) -> Quarantined and deleted successfully.
Elément(s) de données du Registre infecté(s):
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\AntiVirusDisableNotify (Disabled.SecurityCenter) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\FirewallDisableNotify (Disabled.SecurityCenter) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\UpdatesDisableNotify (Disabled.SecurityCenter) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters\NameServer (Trojan.DNSChanger) -> Data: 93.188.164.73,93.188.166.223 -> Quarantined and deleted successfully.
Dossier(s) infecté(s):
C:\Documents and Settings\user\Application Data\Sky-Banners (Adware.Adrotator) -> Quarantined and deleted successfully.
C:\Documents and Settings\user\Application Data\Sky-Banners\skb (Adware.Adrotator) -> Quarantined and deleted successfully.
C:\Documents and Settings\user\Application Data\Street-Ads (Adware.Adrotator) -> Quarantined and deleted successfully.
C:\Documents and Settings\user\Application Data\Street-Ads\sta (Adware.Adrotator) -> Quarantined and deleted successfully.
C:\WINDOWS\$NtUninstallMTF1011$ (Adware.Adrotator) -> Quarantined and deleted successfully.
Fichier(s) infecté(s):
C:\Documents and Settings\user\Local Settings\Temp\axneorcmsw.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\nwvap.exe (Trojan.Adware) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\awvap.dll (Adware.EZlife) -> Quarantined and deleted successfully.
C:\Documents and Settings\user\Application Data\9861A29A7659BE65F8F2B833A31FE091\secureapp70700.exe (Trojan.Agent.Gen) -> Quarantined and deleted successfully.
C:\Documents and Settings\user\Local Settings\Temp\2506.tmp (Rootkit.Dropper) -> Quarantined and deleted successfully.
C:\Documents and Settings\user\Local Settings\Temp\2507.tmp (Rootkit.Dropper) -> Quarantined and deleted successfully.
C:\Documents and Settings\user\Local Settings\Temp\250A.tmp (Rootkit.Dropper) -> Quarantined and deleted successfully.
C:\Documents and Settings\user\Local Settings\Temp\250B.tmp (Rootkit.Dropper) -> Quarantined and deleted successfully.
C:\Documents and Settings\user\Local Settings\Temp\250D.tmp (Rootkit.Dropper) -> Quarantined and deleted successfully.
C:\Documents and Settings\user\Local Settings\Temp\dzwwvzoj.exe (Trojan.Dropper) -> Quarantined and deleted successfully.
C:\Documents and Settings\user\Local Settings\Temp\kiq1chip.exe (Trojan.Sisproc.Gen) -> Quarantined and deleted successfully.
C:\Documents and Settings\user\Local Settings\Temp\rsxenawmco.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\Documents and Settings\user\Local Settings\Temp\ukdoi.exe (Adware.BHO) -> Quarantined and deleted successfully.
C:\Documents and Settings\user\Local Settings\Temp\voqk2m76.exe (Trojan.LVBP) -> Quarantined and deleted successfully.
C:\Documents and Settings\user\Local Settings\Temp\Xzc.exe (Trojan.Agent.Gen) -> Quarantined and deleted successfully.
C:\Documents and Settings\user\Local Settings\Temp\Xzd.exe (Trojan.Agent.Gen) -> Quarantined and deleted successfully.
C:\Documents and Settings\user\Local Settings\Temp\Xze.exe (Trojan.Agent.Gen) -> Quarantined and deleted successfully.
C:\Documents and Settings\user\Local Settings\Temp\Xzf.exe (Trojan.Agent.Gen) -> Quarantined and deleted successfully.
C:\Documents and Settings\user\Local Settings\Temp\Xzg.exe (Trojan.Agent.Gen) -> Quarantined and deleted successfully.
C:\Documents and Settings\user\Local Settings\Temp\Xzh.exe (Trojan.Agent.Gen) -> Quarantined and deleted successfully.
C:\Documents and Settings\user\Local Settings\Temp\Xzi.exe (Trojan.Agent.Gen) -> Quarantined and deleted successfully.
C:\Documents and Settings\user\Local Settings\Temp\Xzj.exe (Trojan.Agent.Gen) -> Quarantined and deleted successfully.
C:\Documents and Settings\user\Local Settings\Temp\Xzk.exe (Trojan.Agent.Gen) -> Quarantined and deleted successfully.
C:\Documents and Settings\user\Local Settings\Temp\yhw5f2e47.exe (Trojan.Sisproc.Gen) -> Quarantined and deleted successfully.
C:\Documents and Settings\user\Local Settings\Temporary Internet Files\Content.IE5\DHKZEMZS\imhbjepxrz[1].htm (Malware.Packer.Gen) -> Quarantined and deleted successfully.
C:\Documents and Settings\user\Local Settings\Temporary Internet Files\Content.IE5\MY07L86W\aaidkfmhfa[3].htm (Adware.BHO) -> Quarantined and deleted successfully.
C:\Documents and Settings\user\Local Settings\Temporary Internet Files\Content.IE5\MY07L86W\sjnvpnidk[1].htm (Malware.Packer.Gen) -> Quarantined and deleted successfully.
C:\Documents and Settings\user\Local Settings\Temporary Internet Files\Content.IE5\ZHPJ4EJ2\aaidkfmhfa[1].htm (Adware.BHO) -> Quarantined and deleted successfully.
C:\Documents and Settings\user\Local Settings\Temporary Internet Files\Content.IE5\ZHPJ4EJ2\imhbjepxrz[1].htm (Malware.Packer.Gen) -> Quarantined and deleted successfully.
C:\Documents and Settings\user\Mes documents\1\fff-ea121.exe (Trojan.Orsam) -> Quarantined and deleted successfully.
C:\Documents and Settings\user\Mes documents\1\fff-ea140.exe (Trojan.Orsam) -> Quarantined and deleted successfully.
C:\WINDOWS\Xrutua.exe (Trojan.Agent.Gen) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\spool\prtprocs\w32x86\31e9aAA9.dll (Trojan.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\spool\prtprocs\w32x86\79s1e93.dll (Trojan.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\spool\prtprocs\w32x86\93y7c3179.dll (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\user\Application Data\Sky-Banners\skb\log.xml (Adware.Adrotator) -> Quarantined and deleted successfully.
C:\WINDOWS\$NtUninstallMTF1011$\apUninstall.exe (Adware.Adrotator) -> Quarantined and deleted successfully.
C:\Documents and Settings\user\Menu Démarrer\Programmes\Security Tool.LNK (Rogue.SecurityTool) -> Quarantined and deleted successfully.
C:\Documents and Settings\user\Application Data\Microsoft\Internet Explorer\Quick Launch\Antimalware Doctor.lnk (Rogue.AntimalwareDoctor) -> Quarantined and deleted successfully.
C:\Documents and Settings\user\Menu Démarrer\Antimalware Doctor.lnk (Rogue.AntimalwareDoctor) -> Quarantined and deleted successfully.
C:\Documents and Settings\user\Menu Démarrer\Programmes\Démarrage\Antimalware Doctor.lnk (Rogue.AntiMalwareDoctor) -> Quarantined and deleted successfully.
C:\WINDOWS\Tasks\{35DC3473-A719-4d14-B7C1-FD326CA84A0C}.job (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\Tasks\{22116563-108C-42c0-A7CE-60161B75E508}.job (Trojan.Downloader) -> Quarantined and deleted successfully.
(!)
A voir également:
- Antimalware Doctor et Security Tools-Problems
- Daemon tools - Télécharger - Émulation & Virtualisation
- Microsoft security essentials - Télécharger - Antivirus & Antimalwares
- Pc doctor - Télécharger - Optimisation
- Time tools - Télécharger - Comptabilité & Facturation
- Pc tools - Télécharger - Divers Utilitaires
29 réponses
Hey! Voilà le rapport.
Rapport de ZHPFix v1.12.3133 par Nicolas Coolman, Update du 05/08/2010
Fichier d'export Registre :
Run by Administrateur at 2010-08-18 14:09:19
Web site : http://www.premiumorange.com/zeb-help-process/zhpfix.html
Contact : nicolascoolman@yahoo.fr
========== Clé(s) du Registre ==========
O23 - Service: SpyHunter 4 Service (SpyHunter 4 Service) . (.Pas de propriétaire - Pas de description.) - C:\PROGRA~1\ENIGMA~1\SPYHUN~1\SH4SER~1.exe => Clé supprimée avec succès
HKLM\Software\Nwnuensys => Clé supprimée avec succès
O64 - Services: CurCS - C:\WINDOWS\system32\Drivers\BSUJRZ.sys - bsujrz (bsujrz) .(.Pas de propriétaire - Pas de description.) - LEGACY_BSUJRZ => Clé supprimée avec succès
O64 - Services: CurCS - (.not file.) - klmd24 (klmd24) .(.Pas de propriétaire - Pas de description.) - LEGACY_KLMD24 => Clé supprimée avec succès
O64 - Services: CurCS - (.not file.) - klmdb (klmdb) .(.Pas de propriétaire - Pas de description.) - LEGACY_KLMDB => Clé supprimée avec succès
O64 - Services: CurCS - (.not file.) - SpyHunter 4 Service (SpyHunter 4 Service) .(.Pas de propriétaire - Pas de description.) - LEGACY_SPYHUNTER_4_SERVICE => Clé supprimée avec succès
========== Valeur(s) du Registre ==========
O81 - IFC: Internet Feature Controls [HKUS\.DEFAULT] [FEATURE_BROWSER_EMULATION] -- svchost.exe => Valeur supprimée avec succès
O81 - IFC: Internet Feature Controls [HKUS\S-1-5-18] [FEATURE_BROWSER_EMULATION] -- svchost.exe => Valeur absente
O47 - AAKE:Key Export SP - "C:\Program Files\World of Warcraft\WoW-1.12.0-enUS-downloader.exe" [Enabled] .(.) (.not file.) -- C:\Program Files\World of Warcraft\WoW-1.12.0-enUS-downloader.exe => Valeur supprimée avec succès
O47 - AAKE:Key Export SP - "C:\Program Files\World of Warcraft\WoW-1.12.x-to-2.0.1-enUS-patch-downloader.exe" [Enabled] .(.Pas de propriétaire - .) (.not file.) -- C:\Program Files\World of Warcraft\WoW-1.12.x-to-2.0.1-enUS-patch-downloader.exe => Valeur supprimée avec succès
O47 - AAKE:Key Export SP - "C:\Program Files\Electronic Arts\The Battle for Middle-earth II\game.dat" [Enabled] .(.Pas de propriétaire - .) (.not file.) -- C:\Program Files\Electronic Arts\The Battle for Middle-earth II\game.dat:*:Enabled:The Ba => Valeur absente
O47 - AAKE:Key Export SP - "C:\Program Files\Electronic Arts\The Lord of the Rings, The Rise of the Witch-king\game.dat" [Enabled] .(.Pas de propriétaire - .) (.not file.) -- C:\Program Files\Electronic Arts\The Lord of the Rings, The Rise of the Witch-ki => Valeur supprimée avec succès
O47 - AAKE:Key Export SP - "C:\Program Files\Electronic Arts\The Lord of the Rings, The Rise of the Witch-king\patchget.dat" [Enabled] .(.Pas de propriétaire - .) (.not file.) -- C:\Program Files\Electronic Arts\The Lord of the Rings, The Rise of the Witc => Valeur supprimée avec succès
O47 - AAKE:Key Export SP - "C:\Documents and Settings\user\Application Data\GarageGames\IAPlayer\products\5000\install\ScrewjumperPC.exe" [Enabled] .(.Pas de propriétaire - .) (.not file.) -- C:\Documents and Settings\user\Application Data\GarageGames\IAP => Valeur supprimée avec succès
O47 - AAKE:Key Export SP - "C:\Documents and Settings\user\Application Data\GarageGames\IAPlayer\products\6000\install\cyclomite.exe" [Enabled] .(.Pas de propriétaire - .) (.not file.) -- C:\Documents and Settings\user\Application Data\GarageGames\IAPlaye => Valeur supprimée avec succès
O47 - AAKE:Key Export SP - "C:\Documents and Settings\user\Application Data\GarageGames\IAPlayer\products\7000\install\Zap.exe" [Enabled] .(.Pas de propriétaire - .) (.not file.) -- C:\Documents and Settings\user\Application Data\GarageGames\IAPlayer\prod => Valeur supprimée avec succès
O47 - AAKE:Key Export SP - "C:\Sierra\Empire Earth - The Art of Conquest\EE-AOC.exe" [Disabled] .(.) (.not file.) -- C:\Sierra\Empire Earth - The Art of Conquest\EE-AOC.exe => Valeur supprimée avec succès
========== Fichier HOSTS ==========
127.0.0.1173.192.153.1 => Domaine Supprimé
Le fichier Hosts est sain
========== Autre ==========
O24 - Default MHTML Editor: Last - .(.Pas de propriétaire - Pas de description.) - (.not file.) => Format Non supporté
========== Récapitulatif ==========
6 : Clé(s) du Registre
11 : Valeur(s) du Registre
2 : Fichier HOSTS
1 : Autre
End of the scan
Rapport de ZHPFix v1.12.3133 par Nicolas Coolman, Update du 05/08/2010
Fichier d'export Registre :
Run by Administrateur at 2010-08-18 14:09:19
Web site : http://www.premiumorange.com/zeb-help-process/zhpfix.html
Contact : nicolascoolman@yahoo.fr
========== Clé(s) du Registre ==========
O23 - Service: SpyHunter 4 Service (SpyHunter 4 Service) . (.Pas de propriétaire - Pas de description.) - C:\PROGRA~1\ENIGMA~1\SPYHUN~1\SH4SER~1.exe => Clé supprimée avec succès
HKLM\Software\Nwnuensys => Clé supprimée avec succès
O64 - Services: CurCS - C:\WINDOWS\system32\Drivers\BSUJRZ.sys - bsujrz (bsujrz) .(.Pas de propriétaire - Pas de description.) - LEGACY_BSUJRZ => Clé supprimée avec succès
O64 - Services: CurCS - (.not file.) - klmd24 (klmd24) .(.Pas de propriétaire - Pas de description.) - LEGACY_KLMD24 => Clé supprimée avec succès
O64 - Services: CurCS - (.not file.) - klmdb (klmdb) .(.Pas de propriétaire - Pas de description.) - LEGACY_KLMDB => Clé supprimée avec succès
O64 - Services: CurCS - (.not file.) - SpyHunter 4 Service (SpyHunter 4 Service) .(.Pas de propriétaire - Pas de description.) - LEGACY_SPYHUNTER_4_SERVICE => Clé supprimée avec succès
========== Valeur(s) du Registre ==========
O81 - IFC: Internet Feature Controls [HKUS\.DEFAULT] [FEATURE_BROWSER_EMULATION] -- svchost.exe => Valeur supprimée avec succès
O81 - IFC: Internet Feature Controls [HKUS\S-1-5-18] [FEATURE_BROWSER_EMULATION] -- svchost.exe => Valeur absente
O47 - AAKE:Key Export SP - "C:\Program Files\World of Warcraft\WoW-1.12.0-enUS-downloader.exe" [Enabled] .(.) (.not file.) -- C:\Program Files\World of Warcraft\WoW-1.12.0-enUS-downloader.exe => Valeur supprimée avec succès
O47 - AAKE:Key Export SP - "C:\Program Files\World of Warcraft\WoW-1.12.x-to-2.0.1-enUS-patch-downloader.exe" [Enabled] .(.Pas de propriétaire - .) (.not file.) -- C:\Program Files\World of Warcraft\WoW-1.12.x-to-2.0.1-enUS-patch-downloader.exe => Valeur supprimée avec succès
O47 - AAKE:Key Export SP - "C:\Program Files\Electronic Arts\The Battle for Middle-earth II\game.dat" [Enabled] .(.Pas de propriétaire - .) (.not file.) -- C:\Program Files\Electronic Arts\The Battle for Middle-earth II\game.dat:*:Enabled:The Ba => Valeur absente
O47 - AAKE:Key Export SP - "C:\Program Files\Electronic Arts\The Lord of the Rings, The Rise of the Witch-king\game.dat" [Enabled] .(.Pas de propriétaire - .) (.not file.) -- C:\Program Files\Electronic Arts\The Lord of the Rings, The Rise of the Witch-ki => Valeur supprimée avec succès
O47 - AAKE:Key Export SP - "C:\Program Files\Electronic Arts\The Lord of the Rings, The Rise of the Witch-king\patchget.dat" [Enabled] .(.Pas de propriétaire - .) (.not file.) -- C:\Program Files\Electronic Arts\The Lord of the Rings, The Rise of the Witc => Valeur supprimée avec succès
O47 - AAKE:Key Export SP - "C:\Documents and Settings\user\Application Data\GarageGames\IAPlayer\products\5000\install\ScrewjumperPC.exe" [Enabled] .(.Pas de propriétaire - .) (.not file.) -- C:\Documents and Settings\user\Application Data\GarageGames\IAP => Valeur supprimée avec succès
O47 - AAKE:Key Export SP - "C:\Documents and Settings\user\Application Data\GarageGames\IAPlayer\products\6000\install\cyclomite.exe" [Enabled] .(.Pas de propriétaire - .) (.not file.) -- C:\Documents and Settings\user\Application Data\GarageGames\IAPlaye => Valeur supprimée avec succès
O47 - AAKE:Key Export SP - "C:\Documents and Settings\user\Application Data\GarageGames\IAPlayer\products\7000\install\Zap.exe" [Enabled] .(.Pas de propriétaire - .) (.not file.) -- C:\Documents and Settings\user\Application Data\GarageGames\IAPlayer\prod => Valeur supprimée avec succès
O47 - AAKE:Key Export SP - "C:\Sierra\Empire Earth - The Art of Conquest\EE-AOC.exe" [Disabled] .(.) (.not file.) -- C:\Sierra\Empire Earth - The Art of Conquest\EE-AOC.exe => Valeur supprimée avec succès
========== Fichier HOSTS ==========
127.0.0.1173.192.153.1 => Domaine Supprimé
Le fichier Hosts est sain
========== Autre ==========
O24 - Default MHTML Editor: Last - .(.Pas de propriétaire - Pas de description.) - (.not file.) => Format Non supporté
========== Récapitulatif ==========
6 : Clé(s) du Registre
11 : Valeur(s) du Registre
2 : Fichier HOSTS
1 : Autre
End of the scan
Salut!
En effet il faut suivre les procédures jusqu'au bout, même si tout semble aller mieux!
En ouverture en mode normal, tout est mieux. Il y a une fenêtre d'erreur de chargement de C:\WINDOWS\dpdhal.dll qui s'ouvre, mais l'ordinateur fonctionne quand même. J'avais l'impression qu'il rushait un peu et un peu lent pour l'instant.
J'ai ouvert firefox (page d'accueil google) -> taper le sujet de ce thread sur google --> cliquer sur la page pour te répondre. J'espère ne pas avoir trop surfer ^^!
En effet il faut suivre les procédures jusqu'au bout, même si tout semble aller mieux!
En ouverture en mode normal, tout est mieux. Il y a une fenêtre d'erreur de chargement de C:\WINDOWS\dpdhal.dll qui s'ouvre, mais l'ordinateur fonctionne quand même. J'avais l'impression qu'il rushait un peu et un peu lent pour l'instant.
J'ai ouvert firefox (page d'accueil google) -> taper le sujet de ce thread sur google --> cliquer sur la page pour te répondre. J'espère ne pas avoir trop surfer ^^!
Ok ! Alors maintenant que tu es en mode normal, relance Malwarebytes', mets le à jour et lance un scan complet.
Salut!
J'ai commencé l'analyse et j'suis partie faire d'autres trucs en attendant. J'suis revenu et l'ordinateur avait comme redémarré. Dans la section rapport/log, il n'y avait rien, même si j'avais vu qu'il y avait une infection rendu à la moitié du scan =/ . Je refais une autre analyse complète dès maintenant.
J'ai commencé l'analyse et j'suis partie faire d'autres trucs en attendant. J'suis revenu et l'ordinateur avait comme redémarré. Dans la section rapport/log, il n'y avait rien, même si j'avais vu qu'il y avait une infection rendu à la moitié du scan =/ . Je refais une autre analyse complète dès maintenant.
Vous n’avez pas trouvé la réponse que vous recherchez ?
Posez votre question
Re! Désolé pour l'attente, mais le voilà
Malwarebytes' Anti-Malware 1.46
www.malwarebytes.org
Version de la base de données: 4446
Windows 5.1.2600 Service Pack 3
Internet Explorer 7.0.5730.11
2010-08-18 18:27:19
mbam-log-2010-08-18 (18-27-19).txt
Type d'examen: Examen complet (C:\|)
Elément(s) analysé(s): 206643
Temps écoulé: 1 heure(s), 6 minute(s), 12 seconde(s)
Processus mémoire infecté(s): 0
Module(s) mémoire infecté(s): 0
Clé(s) du Registre infectée(s): 8
Valeur(s) du Registre infectée(s): 2
Elément(s) de données du Registre infecté(s): 0
Dossier(s) infecté(s): 0
Fichier(s) infecté(s): 0
Processus mémoire infecté(s):
(Aucun élément nuisible détecté)
Module(s) mémoire infecté(s):
(Aucun élément nuisible détecté)
Clé(s) du Registre infectée(s):
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{018b7ec3-eeca-11d3-8e71-0000e82c6c0d} (Adware.ISTBar) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\10DPP6O2VE (Trojan.FakeAlert) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\Software\Antimalware Doctor Inc (Rogue.AntimalwareDoctor) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Uninstall\Antimalware Doctor (Rogue.AntimalwareDoctor) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Sky-Banners (Adware.Adrotator) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\Software\Street-Ads (Adware.Adrotator) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\XML (Trojan.FakeAlert) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\ZE18MW23GY (Trojan.FakeAlert) -> Quarantined and deleted successfully.
Valeur(s) du Registre infectée(s):
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\10dpp6o2ve (Trojan.FakeAlert) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ze18mw23gy (Trojan.FakeAlert) -> Quarantined and deleted successfully.
Elément(s) de données du Registre infecté(s):
(Aucun élément nuisible détecté)
Dossier(s) infecté(s):
(Aucun élément nuisible détecté)
Fichier(s) infecté(s):
(Aucun élément nuisible détecté)
Malwarebytes' Anti-Malware 1.46
www.malwarebytes.org
Version de la base de données: 4446
Windows 5.1.2600 Service Pack 3
Internet Explorer 7.0.5730.11
2010-08-18 18:27:19
mbam-log-2010-08-18 (18-27-19).txt
Type d'examen: Examen complet (C:\|)
Elément(s) analysé(s): 206643
Temps écoulé: 1 heure(s), 6 minute(s), 12 seconde(s)
Processus mémoire infecté(s): 0
Module(s) mémoire infecté(s): 0
Clé(s) du Registre infectée(s): 8
Valeur(s) du Registre infectée(s): 2
Elément(s) de données du Registre infecté(s): 0
Dossier(s) infecté(s): 0
Fichier(s) infecté(s): 0
Processus mémoire infecté(s):
(Aucun élément nuisible détecté)
Module(s) mémoire infecté(s):
(Aucun élément nuisible détecté)
Clé(s) du Registre infectée(s):
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{018b7ec3-eeca-11d3-8e71-0000e82c6c0d} (Adware.ISTBar) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\10DPP6O2VE (Trojan.FakeAlert) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\Software\Antimalware Doctor Inc (Rogue.AntimalwareDoctor) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Uninstall\Antimalware Doctor (Rogue.AntimalwareDoctor) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Sky-Banners (Adware.Adrotator) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\Software\Street-Ads (Adware.Adrotator) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\XML (Trojan.FakeAlert) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\ZE18MW23GY (Trojan.FakeAlert) -> Quarantined and deleted successfully.
Valeur(s) du Registre infectée(s):
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\10dpp6o2ve (Trojan.FakeAlert) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ze18mw23gy (Trojan.FakeAlert) -> Quarantined and deleted successfully.
Elément(s) de données du Registre infecté(s):
(Aucun élément nuisible détecté)
Dossier(s) infecté(s):
(Aucun élément nuisible détecté)
Fichier(s) infecté(s):
(Aucun élément nuisible détecté)
Re!
1ère étape!
JavaRa 1.15 Removal Log.
Report follows after line.
------------------------------------
The JavaRa removal process was started on Thu Aug 19 10:01:07 2010
Found and removed: C:\Program Files\Java\jre1.5.0_03
Found and removed: C:\Program Files\Java\jre1.6.0_01
Found and removed: C:\Program Files\Java\jre1.6.0_03
Found and removed: C:\Documents and Settings\user\Application Data\Sun\Java\jre1.6.0_15
Found and removed: SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders\\C:\Program Files\Java\jre1.5.0_03\
Found and removed: SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders\\C:\Program Files\Java\jre1.6.0_01\
Found and removed: SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders\\C:\Program Files\Java\jre1.6.0_03\
Found and removed: SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders\\C:\Program Files\Java\jre1.6.0_01\bin\
Found and removed: SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders\\C:\Program Files\Java\jre1.6.0_03\bin\
------------------------------------
Finished reporting.
1ère étape!
JavaRa 1.15 Removal Log.
Report follows after line.
------------------------------------
The JavaRa removal process was started on Thu Aug 19 10:01:07 2010
Found and removed: C:\Program Files\Java\jre1.5.0_03
Found and removed: C:\Program Files\Java\jre1.6.0_01
Found and removed: C:\Program Files\Java\jre1.6.0_03
Found and removed: C:\Documents and Settings\user\Application Data\Sun\Java\jre1.6.0_15
Found and removed: SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders\\C:\Program Files\Java\jre1.5.0_03\
Found and removed: SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders\\C:\Program Files\Java\jre1.6.0_01\
Found and removed: SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders\\C:\Program Files\Java\jre1.6.0_03\
Found and removed: SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders\\C:\Program Files\Java\jre1.6.0_01\bin\
Found and removed: SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders\\C:\Program Files\Java\jre1.6.0_03\bin\
------------------------------------
Finished reporting.
hey hop!
Je vais procéder à l'optimisation au retour du travail! Pour ce qui est des mises à jour, Adobe me dit qu'il n'y en a pas de nouvelles disponibles. Internet Exp. 8 s'est bien déroulé.
[ Rapport ToolsCleaner version 2.3.11 (par A.Rothstein & dj QUIOU) ]
--> Recherche:
C:\UsbFix: trouvé !
C:\Documents and Settings\user\Mes documents\Téléchargements\UsbFix.exe: trouvé !
C:\Program Files\Ad-remover: trouvé !
C:\Program Files\ZHPDiag: trouvé !
C:\Program Files\Ad-Remover\Backup\Ad-R.exe: trouvé !
C:\Program Files\ZHPDiag\ZHPdiag.exe: trouvé !
C:\Program Files\ZHPDiag\catchme.exe: trouvé !
C:\Program Files\ZHPDiag\mbr.log: trouvé !
C:\Program Files\ZHPDiag\mbr.exe: trouvé !
C:\UsbFix\UsbFix.exe: trouvé !
---------------------------------
--> Suppression:
C:\Program Files\Ad-Remover\Backup\Ad-R.exe: supprimé !
C:\Program Files\ZHPDiag\ZHPdiag.exe: supprimé !
C:\Program Files\ZHPDiag\catchme.exe: supprimé !
C:\Documents and Settings\user\Mes documents\Téléchargements\UsbFix.exe: supprimé !
C:\Program Files\ZHPDiag\mbr.log: supprimé !
C:\Program Files\ZHPDiag\mbr.exe: supprimé !
C:\UsbFix\UsbFix.exe: supprimé !
C:\UsbFix: supprimé !
C:\Program Files\Ad-remover: supprimé !
C:\Program Files\ZHPDiag: supprimé !
Je vais procéder à l'optimisation au retour du travail! Pour ce qui est des mises à jour, Adobe me dit qu'il n'y en a pas de nouvelles disponibles. Internet Exp. 8 s'est bien déroulé.
[ Rapport ToolsCleaner version 2.3.11 (par A.Rothstein & dj QUIOU) ]
--> Recherche:
C:\UsbFix: trouvé !
C:\Documents and Settings\user\Mes documents\Téléchargements\UsbFix.exe: trouvé !
C:\Program Files\Ad-remover: trouvé !
C:\Program Files\ZHPDiag: trouvé !
C:\Program Files\Ad-Remover\Backup\Ad-R.exe: trouvé !
C:\Program Files\ZHPDiag\ZHPdiag.exe: trouvé !
C:\Program Files\ZHPDiag\catchme.exe: trouvé !
C:\Program Files\ZHPDiag\mbr.log: trouvé !
C:\Program Files\ZHPDiag\mbr.exe: trouvé !
C:\UsbFix\UsbFix.exe: trouvé !
---------------------------------
--> Suppression:
C:\Program Files\Ad-Remover\Backup\Ad-R.exe: supprimé !
C:\Program Files\ZHPDiag\ZHPdiag.exe: supprimé !
C:\Program Files\ZHPDiag\catchme.exe: supprimé !
C:\Documents and Settings\user\Mes documents\Téléchargements\UsbFix.exe: supprimé !
C:\Program Files\ZHPDiag\mbr.log: supprimé !
C:\Program Files\ZHPDiag\mbr.exe: supprimé !
C:\UsbFix\UsbFix.exe: supprimé !
C:\UsbFix: supprimé !
C:\Program Files\Ad-remover: supprimé !
C:\Program Files\ZHPDiag: supprimé !
Salut!!
Results of screen317's Security Check version 0.99.5
Windows XP Service Pack 3
Internet Explorer 8
[b]''''''''''''''''''''''''''''''
[u]Antivirus/Firewall Check:[/u][/b]
[color=red][b]Windows Security Center service is not running! This report may not be accurate![/b][/color]
RPS Firewall
[color=red][b]Antivirus out of date![/b][/color]
[b]'''''''''''''''''''''''''''''''
[u]Anti-malware/Other Utilities Check:[/u][/b]
Malwarebytes' Anti-Malware
CCleaner
Java(TM) 6 Update 21
Java(TM) SE Runtime Environment 6 Update 1
Java(TM) 6 Update 3
[color=red][b]Out of date Java installed![/b][/color]
Adobe Flash Player 10.1.82.76
Adobe Reader 9.3.3
Adobe Reader 9.3 - Français
Mozilla Firefox (3.6.8)
[b]''''''''''''''''''''''''''''''''
Process Check:
[u]objlist.exe by Laurent[/u][/b]
AVG avgemc.exe
[b]''''''''''''''''''''''''''''''''
[u]DNS Vulnerability Check:[/u][/b]
GREAT! (Not vulnerable to DNS cache poisoning)
[b]''''''''''End of Log''''''''''''[/b]
=======
Sur update checker, ya un ATI Catalyst Drivers et un quick time player update qui n'avaient pas fonctionné la première fois.
À plus (*en passant merci beaucoup*)
Results of screen317's Security Check version 0.99.5
Windows XP Service Pack 3
Internet Explorer 8
[b]''''''''''''''''''''''''''''''
[u]Antivirus/Firewall Check:[/u][/b]
[color=red][b]Windows Security Center service is not running! This report may not be accurate![/b][/color]
RPS Firewall
[color=red][b]Antivirus out of date![/b][/color]
[b]'''''''''''''''''''''''''''''''
[u]Anti-malware/Other Utilities Check:[/u][/b]
Malwarebytes' Anti-Malware
CCleaner
Java(TM) 6 Update 21
Java(TM) SE Runtime Environment 6 Update 1
Java(TM) 6 Update 3
[color=red][b]Out of date Java installed![/b][/color]
Adobe Flash Player 10.1.82.76
Adobe Reader 9.3.3
Adobe Reader 9.3 - Français
Mozilla Firefox (3.6.8)
[b]''''''''''''''''''''''''''''''''
Process Check:
[u]objlist.exe by Laurent[/u][/b]
AVG avgemc.exe
[b]''''''''''''''''''''''''''''''''
[u]DNS Vulnerability Check:[/u][/b]
GREAT! (Not vulnerable to DNS cache poisoning)
[b]''''''''''End of Log''''''''''''[/b]
=======
Sur update checker, ya un ATI Catalyst Drivers et un quick time player update qui n'avaient pas fonctionné la première fois.
À plus (*en passant merci beaucoup*)
Fais ceci pour vérification :
-+-+-+-+-> Virustotal <-+-+-+-+-
[x] Suis ce tutoriel pour afficher les fichiers cachés.
[x] Rends toi sur ce site puis cliques sur " Choisissez un fichier ".
[x] Sélectionne ce fichier : C\Windows\dpdhal.dll
puis cliques sur " Ouvrir ". Patiente pendant l'envoi.
[x] Si il est indiqué que le fichier a déjà été analysé, clique sur " Réanalyser ".
[x] Copie/Colle le rapport affiché à l'écran dans ta prochaine réponse.
-+-+-+-+-> Virustotal <-+-+-+-+-
[x] Suis ce tutoriel pour afficher les fichiers cachés.
[x] Rends toi sur ce site puis cliques sur " Choisissez un fichier ".
[x] Sélectionne ce fichier : C\Windows\dpdhal.dll
puis cliques sur " Ouvrir ". Patiente pendant l'envoi.
[x] Si il est indiqué que le fichier a déjà été analysé, clique sur " Réanalyser ".
[x] Copie/Colle le rapport affiché à l'écran dans ta prochaine réponse.