Infection par security tool

Fermé
Speedcolibri Messages postés 15 Date d'inscription samedi 20 janvier 2007 Statut Membre Dernière intervention 30 septembre 2010 - 9 sept. 2010 à 18:55
moment de grace Messages postés 29042 Date d'inscription samedi 6 décembre 2008 Statut Contributeur sécurité Dernière intervention 18 juillet 2013 - 30 sept. 2010 à 18:47
Bonsoir,

J'ai le malheur d'avoir le rogue security tool.

Malgrés les procédures du forum, je n'arrive à rien ouvrir.

Dés que je lance un programme il ferme tout aussitôt (même Rkill et quelque soit le programme).

Mon ordinateur fonctionne sous XP.

Merci de m'indiquer une procédure pour ce type de blocage.

Merci par avance.

Je vous écris depuis mon portable de "secours".

@+

Speed.



A voir également:

15 réponses

moment de grace Messages postés 29042 Date d'inscription samedi 6 décembre 2008 Statut Contributeur sécurité Dernière intervention 18 juillet 2013 2 274
9 sept. 2010 à 18:59
bonjour

as tu fais les choses dans cet ordre

redémarrer le pc en mode sans échec avec prise en charge reseau

https://www.micro-astuce.com/depannage/demarrer-mode-sans-echec.php


Télécharge rkill

Enregistre-le sur ton Bureau
Double-clique sur l'icone rkill ( pour Vista/Seven clic-droit Exécuter en tant qu'Administrateur)
Un bref écran noir t'indiquera que le tool s'est correctement exécuter, s'il ne lance pas
change de lien de téléchargement en utilisant le suivant à partir d'ici:
https://download.bleepingcomputer.com/grinler/rkill.exe
https://download.bleepingcomputer.com/grinler/rkill.exe

Rkill COM: Rkill COM:
https://download.bleepingcomputer.com/grinler/rkill.com
https://download.bleepingcomputer.com/grinler/rkill.com

Rkill SCR: Rkill RCS:
https://download.bleepingcomputer.com/grinler/rkill.scr
https://download.bleepingcomputer.com/grinler/rkill.scr



une fois qu'il aura terminé lance


Téléchargez MalwareByte's Anti-Malware (que tu pourras garder ensuite)

http://www.malwarebytes.org/mbam/program/mbam-setup.exe

. Enregistres le sur le bureau
. Double cliques sur le fichier téléchargé pour lancer le processus d'installation.
. Dans l'onglet "mise à jour", cliques sur le bouton Recherche de mise à jour
. Si le pare-feu demande l'autorisation de se connecter pour malwarebytes, accepte
. Une fois la mise à jour terminé
. Rend-toi dans l'onglet, Recherche
. Sélectionnes Exécuter un examen complet (examen assez long)
. Cliques sur Rechercher
. Le scan démarre.
. A la fin de l'analyse, un message s'affiche : L'examen s'est terminé normalement.
Cliquez sur 'Afficher les résultats' pour afficher tous les objets trouvés.
. Cliques sur Ok pour poursuivre.
. [b]Si des malwares ont été détectés, clique sur Afficher les résultats
. Sélectionnes tout (ou laisses cochés) et cliques sur Supprimer la sélection
Malwarebytes va détruire les fichiers et clés de registre et en mettre une copie dans la quarantaine.

. Malwarebytes va ouvrir le bloc-notes et y copier le rapport d'analyse.
. Rends toi dans l'onglet rapport/log
. Tu cliques dessus pour l'afficher, une fois affiché
. Tu cliques sur edition en haut du boc notes, et puis sur sélectionner tous
. Tu recliques sur edition et puis sur copier et tu reviens sur le forum et dans ta réponse
. tu cliques droit dans le cadre de la reponse et coller


Si tu as besoin d'aide regarde ces tutoriels :
Aide: https://www.malekal.com/tutoriel-malwarebyte-anti-malware/
http://www.infos-du-net.com/forum/278396-11-tuto-malwarebytes-anti-malware-mbam
0
Speedcolibri Messages postés 15 Date d'inscription samedi 20 janvier 2007 Statut Membre Dernière intervention 30 septembre 2010
10 sept. 2010 à 11:37
Ci-joint copie du rapport.

Malwarebytes' Anti-Malware 1.46
www.malwarebytes.org

Version de la base de données: 4586

Windows 5.1.2600 Service Pack 3 (Safe Mode)
Internet Explorer 8.0.6001.18702

10/09/2010 11:27:17
mbam-log-2010-09-10 (11-27-17).txt

Type d'examen: Examen complet (C:\|E:\|F:\|)
Elément(s) analysé(s): 389655
Temps écoulé: 1 heure(s), 23 minute(s), 59 seconde(s)

Processus mémoire infecté(s): 0
Module(s) mémoire infecté(s): 0
Clé(s) du Registre infectée(s): 2
Valeur(s) du Registre infectée(s): 3
Elément(s) de données du Registre infecté(s): 0
Dossier(s) infecté(s): 12
Fichier(s) infecté(s): 233

Processus mémoire infecté(s):
(Aucun élément nuisible détecté)

Module(s) mémoire infecté(s):
(Aucun élément nuisible détecté)

Clé(s) du Registre infectée(s):
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\ModuleUsage\C:/WINDOWS/system32/EGDHTML_1025.dll (Adware.EGDAccess) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\ModuleUsage\C:/WINDOWS/system32/P2ECOM.dll (Adware.EGDAccess) -> Quarantined and deleted successfully.

Valeur(s) du Registre infectée(s):
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\sniffer (Trojan.Downloader) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\SharedDLLs\C:\WINDOWS\system32\EGDHTML_1025.dll (Adware.EGDAccess) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\SharedDLLs\C:\WINDOWS\system32\P2ECOM.dll (Adware.EGDAccess) -> Quarantined and deleted successfully.

Elément(s) de données du Registre infecté(s):
(Aucun élément nuisible détecté)

Dossier(s) infecté(s):
C:\Documents and Settings\Francky\Application Data\Ultimate Defender (Rogue.Ultimate.Defender) -> Quarantined and deleted successfully.
C:\Documents and Settings\Francky\Application Data\Ultimate Defender\logs (Rogue.Ultimate.Defender) -> Quarantined and deleted successfully.
C:\Documents and Settings\All Users\Application Data\WinAntiVirus Pro 2006 (Rogue.WinAntiVirus) -> Quarantined and deleted successfully.
C:\Documents and Settings\Francky\Application Data\WinAntiVirus Pro 2006 (Rogue.WinAntiVirus) -> Quarantined and deleted successfully.
C:\Documents and Settings\Francky\Application Data\WinAntiVirus Pro 2006\Logs (Rogue.WinAntiVirus) -> Quarantined and deleted successfully.
C:\Program Files\Ultimate Defender (Rogue.Ultimate.Defender) -> Quarantined and deleted successfully.
C:\Program Files\WinAntiVirus Pro 2006 (Rogue.WinAntiVirus) -> Quarantined and deleted successfully.
C:\Program Files\WinAntiVirus Pro 2006\AWBase (Rogue.WinAntiVirus) -> Quarantined and deleted successfully.
C:\Program Files\WinAntiVirus Pro 2006\AWBase\database (Rogue.WinAntiVirus) -> Quarantined and deleted successfully.
C:\Program Files\WinAntiVirus Pro 2006\img (Rogue.WinAntiVirus) -> Quarantined and deleted successfully.
C:\Program Files\WinAntiVirus Pro 2006\PGBase (Rogue.WinAntiVirus) -> Quarantined and deleted successfully.
C:\Program Files\WinAntiVirus Pro 2006\plugins (Rogue.WinAntiVirus) -> Quarantined and deleted successfully.

Fichier(s) infecté(s):
C:\WINDOWS\Temp\_ex-08.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\Documents and Settings\Francky\Local Settings\Application Data\01792.exe (Rogue.SecurityTool) -> Quarantined and deleted successfully.
C:\Documents and Settings\Francky\Local Settings\Temp\10.tmp (Backdoor.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Francky\Local Settings\Temp\12.tmp (Backdoor.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Francky\Local Settings\Temp\13.tmp (Rootkit.TDSS) -> Quarantined and deleted successfully.
C:\Documents and Settings\Francky\Local Settings\Temp\14.tmp (Rootkit.TDSS) -> Quarantined and deleted successfully.
C:\Documents and Settings\Francky\Local Settings\Temp\15.tmp (Rootkit.TDSS) -> Quarantined and deleted successfully.
C:\Documents and Settings\Francky\Local Settings\Temp\16.tmp (Rootkit.TDSS) -> Quarantined and deleted successfully.
C:\Documents and Settings\Francky\Local Settings\Temp\17.tmp (Rootkit.TDSS) -> Quarantined and deleted successfully.
C:\Documents and Settings\Francky\Local Settings\Temp\18.tmp (Rootkit.TDSS) -> Quarantined and deleted successfully.
C:\Documents and Settings\Francky\Local Settings\Temp\19.tmp (Rootkit.TDSS) -> Quarantined and deleted successfully.
C:\Documents and Settings\Francky\Local Settings\Temp\1A.tmp (Rootkit.TDSS) -> Quarantined and deleted successfully.
C:\Documents and Settings\Francky\Local Settings\Temp\1B.tmp (Rootkit.TDSS) -> Quarantined and deleted successfully.
C:\Documents and Settings\Francky\Local Settings\Temp\1C.tmp (Rootkit.TDSS) -> Quarantined and deleted successfully.
C:\Documents and Settings\Francky\Local Settings\Temp\1D.tmp (Rootkit.TDSS) -> Quarantined and deleted successfully.
C:\Documents and Settings\Francky\Local Settings\Temp\1E.tmp (Rootkit.TDSS) -> Quarantined and deleted successfully.
C:\Documents and Settings\Francky\Local Settings\Temp\1F.tmp (Rootkit.Dropper) -> Quarantined and deleted successfully.
C:\Documents and Settings\Francky\Local Settings\Temp\20.tmp (Rootkit.Dropper) -> Quarantined and deleted successfully.
C:\Documents and Settings\Francky\Local Settings\Temp\21.tmp (Rootkit.TDSS) -> Quarantined and deleted successfully.
C:\Documents and Settings\Francky\Local Settings\Temp\22.tmp (Trojan.Agent.Gen) -> Quarantined and deleted successfully.
C:\Documents and Settings\Francky\Local Settings\Temp\23.tmp (Trojan.Agent.Gen) -> Quarantined and deleted successfully.
C:\Documents and Settings\Francky\Local Settings\Temp\24.tmp (Trojan.Agent.Gen) -> Quarantined and deleted successfully.
C:\Documents and Settings\Francky\Local Settings\Temp\25.tmp (Trojan.Agent.Gen) -> Quarantined and deleted successfully.
C:\Documents and Settings\Francky\Local Settings\Temp\26.tmp (Trojan.Agent.Gen) -> Quarantined and deleted successfully.
C:\Documents and Settings\Francky\Local Settings\Temp\27.tmp (Trojan.Agent.Gen) -> Quarantined and deleted successfully.
C:\Documents and Settings\Francky\Local Settings\Temp\28.tmp (Trojan.Agent.Gen) -> Quarantined and deleted successfully.
C:\Documents and Settings\Francky\Local Settings\Temp\29.tmp (Trojan.Agent.Gen) -> Quarantined and deleted successfully.
C:\Documents and Settings\Francky\Local Settings\Temp\2A.tmp (Trojan.Agent.Gen) -> Quarantined and deleted successfully.
C:\Documents and Settings\Francky\Local Settings\Temp\2B.tmp (Trojan.Agent.Gen) -> Quarantined and deleted successfully.
C:\Documents and Settings\Francky\Local Settings\Temp\2C.tmp (Trojan.Agent.Gen) -> Quarantined and deleted successfully.
C:\Documents and Settings\Francky\Local Settings\Temp\2D.tmp (Trojan.Agent.Gen) -> Quarantined and deleted successfully.
C:\Documents and Settings\Francky\Local Settings\Temp\2E.tmp (Trojan.Agent.Gen) -> Quarantined and deleted successfully.
C:\Documents and Settings\Francky\Local Settings\Temp\2F.tmp (Trojan.Agent.Gen) -> Quarantined and deleted successfully.
C:\Documents and Settings\Francky\Local Settings\Temp\30.tmp (Trojan.Agent.Gen) -> Quarantined and deleted successfully.
C:\Documents and Settings\Francky\Local Settings\Temp\31.tmp (Trojan.Agent.Gen) -> Quarantined and deleted successfully.
C:\Documents and Settings\Francky\Local Settings\Temp\32.tmp (Trojan.Agent.Gen) -> Quarantined and deleted successfully.
C:\Documents and Settings\Francky\Local Settings\Temp\33.tmp (Trojan.Agent.Gen) -> Quarantined and deleted successfully.
C:\Documents and Settings\Francky\Local Settings\Temp\34.tmp (Trojan.Agent.Gen) -> Quarantined and deleted successfully.
C:\Documents and Settings\Francky\Local Settings\Temp\35.tmp (Trojan.Agent.Gen) -> Quarantined and deleted successfully.
C:\Documents and Settings\Francky\Local Settings\Temp\36.tmp (Trojan.Agent.Gen) -> Quarantined and deleted successfully.
C:\Documents and Settings\Francky\Local Settings\Temp\37.tmp (Trojan.Agent.Gen) -> Quarantined and deleted successfully.
C:\Documents and Settings\Francky\Local Settings\Temp\38.tmp (Trojan.Agent.Gen) -> Quarantined and deleted successfully.
C:\Documents and Settings\Francky\Local Settings\Temp\39.tmp (Rootkit.TDSS.Gen) -> Quarantined and deleted successfully.
C:\Documents and Settings\Francky\Local Settings\Temp\3A.tmp (Rootkit.TDSS.Gen) -> Quarantined and deleted successfully.
C:\Documents and Settings\Francky\Local Settings\Temp\3B.tmp (Rootkit.TDSS.Gen) -> Quarantined and deleted successfully.
C:\Documents and Settings\Francky\Local Settings\Temp\3C.tmp (Rootkit.TDSS.Gen) -> Quarantined and deleted successfully.
C:\Documents and Settings\Francky\Local Settings\Temp\3D.tmp (Trojan.Dropper) -> Quarantined and deleted successfully.
C:\Documents and Settings\Francky\Local Settings\Temp\3E.tmp (Trojan.Dropper) -> Quarantined and deleted successfully.
C:\Documents and Settings\Francky\Local Settings\Temp\7.tmp (Backdoor.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Francky\Local Settings\Temp\8.tmp (Backdoor.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Francky\Local Settings\Temp\9.tmp (Rootkit.TDSS) -> Quarantined and deleted successfully.
C:\Documents and Settings\Francky\Local Settings\Temp\A.tmp (Rootkit.TDSS) -> Quarantined and deleted successfully.
C:\Documents and Settings\Francky\Local Settings\Temp\B.tmp (Rootkit.TDSS) -> Quarantined and deleted successfully.
C:\Documents and Settings\Francky\Local Settings\Temp\C.tmp (Rootkit.TDSS) -> Quarantined and deleted successfully.
C:\Documents and Settings\Francky\Local Settings\Temp\D.tmp (Rootkit.TDSS) -> Quarantined and deleted successfully.
C:\Documents and Settings\Francky\Local Settings\Temp\E.tmp (Rootkit.TDSS) -> Quarantined and deleted successfully.
C:\Documents and Settings\Francky\Local Settings\Temp\F.tmp (Backdoor.Agent) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{EDE20B15-2B6D-47D4-8C77-CB334B113068}\RP1083\A0265075.exe (Rogue.SecurityTool) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{EDE20B15-2B6D-47D4-8C77-CB334B113068}\RP1084\A0265237.exe (Rogue.SecurityTool) -> Quarantined and deleted successfully.
C:\WINDOWS\cru629.dat (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\cru629.dat (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\univrs32.dat (Trojan.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\Temp\wpv241277987182.exe (Backdoor.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\Temp\wpv571283254541.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\Temp\wpv681284038973.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
E:\Program Files\WAV to MP3 Encoder\M3Development_WhenUSave_InstallerInst.exe (Adware.WhenU) -> Quarantined and deleted successfully.
C:\Documents and Settings\Francky\Application Data\Ultimate Defender\logs\1197922957.log (Rogue.Ultimate.Defender) -> Quarantined and deleted successfully.
C:\Documents and Settings\All Users\Application Data\WinAntiVirus Pro 2006\AVScheduler.dat (Rogue.WinAntiVirus) -> Quarantined and deleted successfully.
C:\Documents and Settings\Francky\Application Data\WinAntiVirus Pro 2006\activator_info.txt (Rogue.WinAntiVirus) -> Quarantined and deleted successfully.
C:\Documents and Settings\Francky\Application Data\WinAntiVirus Pro 2006\PGE.dat (Rogue.WinAntiVirus) -> Quarantined and deleted successfully.
C:\Documents and Settings\Francky\Application Data\WinAntiVirus Pro 2006\Logs\Activate.log (Rogue.WinAntiVirus) -> Quarantined and deleted successfully.
C:\Documents and Settings\Francky\Application Data\WinAntiVirus Pro 2006\Logs\wa6Support.log (Rogue.WinAntiVirus) -> Quarantined and deleted successfully.
C:\Documents and Settings\Francky\Application Data\WinAntiVirus Pro 2006\Logs\winav.log (Rogue.WinAntiVirus) -> Quarantined and deleted successfully.
C:\Program Files\Ultimate Defender\program.info (Rogue.Ultimate.Defender) -> Quarantined and deleted successfully.
C:\Program Files\Ultimate Defender\UltimateDefender.db (Rogue.Ultimate.Defender) -> Quarantined and deleted successfully.
C:\Program Files\Ultimate Defender\UltimateDefender.pkg (Rogue.Ultimate.Defender) -> Quarantined and deleted successfully.
C:\Program Files\WinAntiVirus Pro 2006\Activate.dat (Rogue.WinAntiVirus) -> Quarantined and deleted successfully.
C:\Program Files\WinAntiVirus Pro 2006\alerts.txt (Rogue.WinAntiVirus) -> Quarantined and deleted successfully.
C:\Program Files\WinAntiVirus Pro 2006\ASupdater.dat (Rogue.WinAntiVirus) -> Quarantined and deleted successfully.
C:\Program Files\WinAntiVirus Pro 2006\avcom.log (Rogue.WinAntiVirus) -> Quarantined and deleted successfully.
C:\Program Files\WinAntiVirus Pro 2006\bnlink.dat (Rogue.WinAntiVirus) -> Quarantined and deleted successfully.
C:\Program Files\WinAntiVirus Pro 2006\bpdlink.dat (Rogue.WinAntiVirus) -> Quarantined and deleted successfully.
C:\Program Files\WinAntiVirus Pro 2006\bpupdater.dat (Rogue.WinAntiVirus) -> Quarantined and deleted successfully.
C:\Program Files\WinAntiVirus Pro 2006\history.db (Rogue.WinAntiVirus) -> Quarantined and deleted successfully.
C:\Program Files\WinAntiVirus Pro 2006\kb.url (Rogue.WinAntiVirus) -> Quarantined and deleted successfully.
C:\Program Files\WinAntiVirus Pro 2006\lapv.dat (Rogue.WinAntiVirus) -> Quarantined and deleted successfully.
C:\Program Files\WinAntiVirus Pro 2006\License.rtf (Rogue.WinAntiVirus) -> Quarantined and deleted successfully.
C:\Program Files\WinAntiVirus Pro 2006\online.url (Rogue.WinAntiVirus) -> Quarantined and deleted successfully.
C:\Program Files\WinAntiVirus Pro 2006\PGupdater.dat (Rogue.WinAntiVirus) -> Quarantined and deleted successfully.
C:\Program Files\WinAntiVirus Pro 2006\phigh.bin (Rogue.WinAntiVirus) -> Quarantined and deleted successfully.
C:\Program Files\WinAntiVirus Pro 2006\plugins.htm (Rogue.WinAntiVirus) -> Quarantined and deleted successfully.
C:\Program Files\WinAntiVirus Pro 2006\pmedium.bin (Rogue.WinAntiVirus) -> Quarantined and deleted successfully.
C:\Program Files\WinAntiVirus Pro 2006\prc.dat (Rogue.WinAntiVirus) -> Quarantined and deleted successfully.
C:\Program Files\WinAntiVirus Pro 2006\prerules.xml (Rogue.WinAntiVirus) -> Quarantined and deleted successfully.
C:\Program Files\WinAntiVirus Pro 2006\ps.dat (Rogue.WinAntiVirus) -> Quarantined and deleted successfully.
C:\Program Files\WinAntiVirus Pro 2006\pv.dat (Rogue.WinAntiVirus) -> Quarantined and deleted successfully.
C:\Program Files\WinAntiVirus Pro 2006\settings.bin (Rogue.WinAntiVirus) -> Quarantined and deleted successfully.
C:\Program Files\WinAntiVirus Pro 2006\sr.log (Rogue.WinAntiVirus) -> Quarantined and deleted successfully.
C:\Program Files\WinAntiVirus Pro 2006\st.dat (Rogue.WinAntiVirus) -> Quarantined and deleted successfully.
C:\Program Files\WinAntiVirus Pro 2006\support.url (Rogue.WinAntiVirus) -> Quarantined and deleted successfully.
C:\Program Files\WinAntiVirus Pro 2006\unins000.dat (Rogue.WinAntiVirus) -> Quarantined and deleted successfully.
C:\Program Files\WinAntiVirus Pro 2006\UninstallPage.html (Rogue.WinAntiVirus) -> Quarantined and deleted successfully.
C:\Program Files\WinAntiVirus Pro 2006\up.dat (Rogue.WinAntiVirus) -> Quarantined and deleted successfully.
C:\Program Files\WinAntiVirus Pro 2006\update.log (Rogue.WinAntiVirus) -> Quarantined and deleted successfully.
C:\Program Files\WinAntiVirus Pro 2006\updater.dat (Rogue.WinAntiVirus) -> Quarantined and deleted successfully.
C:\Program Files\WinAntiVirus Pro 2006\vbpv.dat (Rogue.WinAntiVirus) -> Quarantined and deleted successfully.
C:\Program Files\WinAntiVirus Pro 2006\wa6.gif (Rogue.WinAntiVirus) -> Quarantined and deleted successfully.
C:\Program Files\WinAntiVirus Pro 2006\worldmap.swf (Rogue.WinAntiVirus) -> Quarantined and deleted successfully.
C:\Program Files\WinAntiVirus Pro 2006\AWBase\vbpv.dat (Rogue.WinAntiVirus) -> Quarantined and deleted successfully.
C:\Program Files\WinAntiVirus Pro 2006\AWBase\database\enemies.dat (Rogue.WinAntiVirus) -> Quarantined and deleted successfully.
C:\Program Files\WinAntiVirus Pro 2006\img\button.gif (Rogue.WinAntiVirus) -> Quarantined and deleted successfully.
C:\Program Files\WinAntiVirus Pro 2006\img\button2.gif (Rogue.WinAntiVirus) -> Quarantined and deleted successfully.
C:\Program Files\WinAntiVirus Pro 2006\img\header.gif (Rogue.WinAntiVirus) -> Quarantined and deleted successfully.
C:\Program Files\WinAntiVirus Pro 2006\img\logo.gif (Rogue.WinAntiVirus) -> Quarantined and deleted successfully.
C:\Program Files\WinAntiVirus Pro 2006\img\spacer.gif (Rogue.WinAntiVirus) -> Quarantined and deleted successfully.
C:\Program Files\WinAntiVirus Pro 2006\img\top1.jpg (Rogue.WinAntiVirus) -> Quarantined and deleted successfully.
C:\Program Files\WinAntiVirus Pro 2006\img\top2.jpg (Rogue.WinAntiVirus) -> Quarantined and deleted successfully.
C:\Program Files\WinAntiVirus Pro 2006\img\top_line.gif (Rogue.WinAntiVirus) -> Quarantined and deleted successfully.
C:\Program Files\WinAntiVirus Pro 2006\PGBase\vbpv.dat (Rogue.WinAntiVirus) -> Quarantined and deleted successfully.
C:\Program Files\WinAntiVirus Pro 2006\plugins\ace.xmd (Rogue.WinAntiVirus) -> Quarantined and deleted successfully.
C:\Program Files\WinAntiVirus Pro 2006\plugins\adsntfs.xmd (Rogue.WinAntiVirus) -> Quarantined and deleted successfully.
C:\Program Files\WinAntiVirus Pro 2006\plugins\alz.xmd (Rogue.WinAntiVirus) -> Quarantined and deleted successfully.
C:\Program Files\WinAntiVirus Pro 2006\plugins\arc.xmd (Rogue.WinAntiVirus) -> Quarantined and deleted successfully.
C:\Program Files\WinAntiVirus Pro 2006\plugins\arj.xmd (Rogue.WinAntiVirus) -> Quarantined and deleted successfully.
C:\Program Files\WinAntiVirus Pro 2006\plugins\bach.xmd (Rogue.WinAntiVirus) -> Quarantined and deleted successfully.
C:\Program Files\WinAntiVirus Pro 2006\plugins\bzip2.xmd (Rogue.WinAntiVirus) -> Quarantined and deleted successfully.
C:\Program Files\WinAntiVirus Pro 2006\plugins\cab.xmd (Rogue.WinAntiVirus) -> Quarantined and deleted successfully.
C:\Program Files\WinAntiVirus Pro 2006\plugins\cevakrnl.cvd (Rogue.WinAntiVirus) -> Quarantined and deleted successfully.
C:\Program Files\WinAntiVirus Pro 2006\plugins\cevakrnl.ivd (Rogue.WinAntiVirus) -> Quarantined and deleted successfully.
C:\Program Files\WinAntiVirus Pro 2006\plugins\cevakrnl.rvd (Rogue.WinAntiVirus) -> Quarantined and deleted successfully.
C:\Program Files\WinAntiVirus Pro 2006\plugins\cevakrnl.xmd (Rogue.WinAntiVirus) -> Quarantined and deleted successfully.
C:\Program Files\WinAntiVirus Pro 2006\plugins\cevarknl.rvd (Rogue.WinAntiVirus) -> Quarantined and deleted successfully.
C:\Program Files\WinAntiVirus Pro 2006\plugins\ceva_dll.cvd (Rogue.WinAntiVirus) -> Quarantined and deleted successfully.
C:\Program Files\WinAntiVirus Pro 2006\plugins\ceva_emu.cvd (Rogue.WinAntiVirus) -> Quarantined and deleted successfully.
C:\Program Files\WinAntiVirus Pro 2006\plugins\ceva_vfs.cvd (Rogue.WinAntiVirus) -> Quarantined and deleted successfully.
C:\Program Files\WinAntiVirus Pro 2006\plugins\chm.xmd (Rogue.WinAntiVirus) -> Quarantined and deleted successfully.
C:\Program Files\WinAntiVirus Pro 2006\plugins\cpio.xmd (Rogue.WinAntiVirus) -> Quarantined and deleted successfully.
C:\Program Files\WinAntiVirus Pro 2006\plugins\cran.cvd (Rogue.WinAntiVirus) -> Quarantined and deleted successfully.
C:\Program Files\WinAntiVirus Pro 2006\plugins\cran.ivd (Rogue.WinAntiVirus) -> Quarantined and deleted successfully.
C:\Program Files\WinAntiVirus Pro 2006\plugins\cran.xmd (Rogue.WinAntiVirus) -> Quarantined and deleted successfully.
C:\Program Files\WinAntiVirus Pro 2006\plugins\dbx.xmd (Rogue.WinAntiVirus) -> Quarantined and deleted successfully.
C:\Program Files\WinAntiVirus Pro 2006\plugins\docfile.xmd (Rogue.WinAntiVirus) -> Quarantined and deleted successfully.
C:\Program Files\WinAntiVirus Pro 2006\plugins\emalware.cvd (Rogue.WinAntiVirus) -> Quarantined and deleted successfully.
C:\Program Files\WinAntiVirus Pro 2006\plugins\emalware.ivd (Rogue.WinAntiVirus) -> Quarantined and deleted successfully.
C:\Program Files\WinAntiVirus Pro 2006\plugins\emalware.xmd (Rogue.WinAntiVirus) -> Quarantined and deleted successfully.
C:\Program Files\WinAntiVirus Pro 2006\plugins\epoc.xmd (Rogue.WinAntiVirus) -> Quarantined and deleted successfully.
C:\Program Files\WinAntiVirus Pro 2006\plugins\e_spyw.ivd (Rogue.WinAntiVirus) -> Quarantined and deleted successfully.
C:\Program Files\WinAntiVirus Pro 2006\plugins\gzip.xmd (Rogue.WinAntiVirus) -> Quarantined and deleted successfully.
C:\Program Files\WinAntiVirus Pro 2006\plugins\ha.xmd (Rogue.WinAntiVirus) -> Quarantined and deleted successfully.
C:\Program Files\WinAntiVirus Pro 2006\plugins\hlp.xmd (Rogue.WinAntiVirus) -> Quarantined and deleted successfully.
C:\Program Files\WinAntiVirus Pro 2006\plugins\hpe.cvd (Rogue.WinAntiVirus) -> Quarantined and deleted successfully.
C:\Program Files\WinAntiVirus Pro 2006\plugins\hpe.xmd (Rogue.WinAntiVirus) -> Quarantined and deleted successfully.
C:\Program Files\WinAntiVirus Pro 2006\plugins\hqx.xmd (Rogue.WinAntiVirus) -> Quarantined and deleted successfully.
C:\Program Files\WinAntiVirus Pro 2006\plugins\html.xmd (Rogue.WinAntiVirus) -> Quarantined and deleted successfully.
C:\Program Files\WinAntiVirus Pro 2006\plugins\imp.xmd (Rogue.WinAntiVirus) -> Quarantined and deleted successfully.
C:\Program Files\WinAntiVirus Pro 2006\plugins\inno.xmd (Rogue.WinAntiVirus) -> Quarantined and deleted successfully.
C:\Program Files\WinAntiVirus Pro 2006\plugins\instyler.xmd (Rogue.WinAntiVirus) -> Quarantined and deleted successfully.
C:\Program Files\WinAntiVirus Pro 2006\plugins\iso.xmd (Rogue.WinAntiVirus) -> Quarantined and deleted successfully.
C:\Program Files\WinAntiVirus Pro 2006\plugins\java.cvd (Rogue.WinAntiVirus) -> Quarantined and deleted successfully.
C:\Program Files\WinAntiVirus Pro 2006\plugins\java.xmd (Rogue.WinAntiVirus) -> Quarantined and deleted successfully.
C:\Program Files\WinAntiVirus Pro 2006\plugins\jpeg.xmd (Rogue.WinAntiVirus) -> Quarantined and deleted successfully.
C:\Program Files\WinAntiVirus Pro 2006\plugins\lha.xmd (Rogue.WinAntiVirus) -> Quarantined and deleted successfully.
C:\Program Files\WinAntiVirus Pro 2006\plugins\lnk.xmd (Rogue.WinAntiVirus) -> Quarantined and deleted successfully.
C:\Program Files\WinAntiVirus Pro 2006\plugins\mbox.xmd (Rogue.WinAntiVirus) -> Quarantined and deleted successfully.
C:\Program Files\WinAntiVirus Pro 2006\plugins\mbx.xmd (Rogue.WinAntiVirus) -> Quarantined and deleted successfully.
C:\Program Files\WinAntiVirus Pro 2006\plugins\mdx.xmd (Rogue.WinAntiVirus) -> Quarantined and deleted successfully.
C:\Program Files\WinAntiVirus Pro 2006\plugins\mdx_97.cvd (Rogue.WinAntiVirus) -> Quarantined and deleted successfully.
C:\Program Files\WinAntiVirus Pro 2006\plugins\mdx_97.ivd (Rogue.WinAntiVirus) -> Quarantined and deleted successfully.
C:\Program Files\WinAntiVirus Pro 2006\plugins\mdx_w95.cvd (Rogue.WinAntiVirus) -> Quarantined and deleted successfully.
C:\Program Files\WinAntiVirus Pro 2006\plugins\mdx_x95.cvd (Rogue.WinAntiVirus) -> Quarantined and deleted successfully.
C:\Program Files\WinAntiVirus Pro 2006\plugins\mdx_xf.cvd (Rogue.WinAntiVirus) -> Quarantined and deleted successfully.
C:\Program Files\WinAntiVirus Pro 2006\plugins\mime.xmd (Rogue.WinAntiVirus) -> Quarantined and deleted successfully.
C:\Program Files\WinAntiVirus Pro 2006\plugins\mso.xmd (Rogue.WinAntiVirus) -> Quarantined and deleted successfully.
C:\Program Files\WinAntiVirus Pro 2006\plugins\na.cvd (Rogue.WinAntiVirus) -> Quarantined and deleted successfully.
C:\Program Files\WinAntiVirus Pro 2006\plugins\na.xmd (Rogue.WinAntiVirus) -> Quarantined and deleted successfully.
C:\Program Files\WinAntiVirus Pro 2006\plugins\nelf.cvd (Rogue.WinAntiVirus) -> Quarantined and deleted successfully.
C:\Program Files\WinAntiVirus Pro 2006\plugins\nelf.xmd (Rogue.WinAntiVirus) -> Quarantined and deleted successfully.
C:\Program Files\WinAntiVirus Pro 2006\plugins\nsis.xmd (Rogue.WinAntiVirus) -> Quarantined and deleted successfully.
C:\Program Files\WinAntiVirus Pro 2006\plugins\objd.xmd (Rogue.WinAntiVirus) -> Quarantined and deleted successfully.
C:\Program Files\WinAntiVirus Pro 2006\plugins\pdf.xmd (Rogue.WinAntiVirus) -> Quarantined and deleted successfully.
C:\Program Files\WinAntiVirus Pro 2006\plugins\pst.xmd (Rogue.WinAntiVirus) -> Quarantined and deleted successfully.
C:\Program Files\WinAntiVirus Pro 2006\plugins\rar.xmd (Rogue.WinAntiVirus) -> Quarantined and deleted successfully.
C:\Program Files\WinAntiVirus Pro 2006\plugins\regscan.cvd (Rogue.WinAntiVirus) -> Quarantined and deleted successfully.
C:\Program Files\WinAntiVirus Pro 2006\plugins\rpm.xmd (Rogue.WinAntiVirus) -> Quarantined and deleted successfully.
C:\Program Files\WinAntiVirus Pro 2006\plugins\rtf.xmd (Rogue.WinAntiVirus) -> Quarantined and deleted successfully.
C:\Program Files\WinAntiVirus Pro 2006\plugins\rup.cvd (Rogue.WinAntiVirus) -> Quarantined and deleted successfully.
C:\Program Files\WinAntiVirus Pro 2006\plugins\rup.xmd (Rogue.WinAntiVirus) -> Quarantined and deleted successfully.
C:\Program Files\WinAntiVirus Pro 2006\plugins\sdx.cvd (Rogue.WinAntiVirus) -> Quarantined and deleted successfully.
C:\Program Files\WinAntiVirus Pro 2006\plugins\sdx.ivd (Rogue.WinAntiVirus) -> Quarantined and deleted successfully.
C:\Program Files\WinAntiVirus Pro 2006\plugins\sdx.xmd (Rogue.WinAntiVirus) -> Quarantined and deleted successfully.
C:\Program Files\WinAntiVirus Pro 2006\plugins\sfx.xmd (Rogue.WinAntiVirus) -> Quarantined and deleted successfully.
C:\Program Files\WinAntiVirus Pro 2006\plugins\swf.xmd (Rogue.WinAntiVirus) -> Quarantined and deleted successfully.
C:\Program Files\WinAntiVirus Pro 2006\plugins\tar.xmd (Rogue.WinAntiVirus) -> Quarantined and deleted successfully.
C:\Program Files\WinAntiVirus Pro 2006\plugins\td0.xmd (Rogue.WinAntiVirus) -> Quarantined and deleted successfully.
C:\Program Files\WinAntiVirus Pro 2006\plugins\thebat.xmd (Rogue.WinAntiVirus) -> Quarantined and deleted successfully.
C:\Program Files\WinAntiVirus Pro 2006\plugins\tnef.xmd (Rogue.WinAntiVirus) -> Quarantined and deleted successfully.
C:\Program Files\WinAntiVirus Pro 2006\plugins\unpack.cvd (Rogue.WinAntiVirus) -> Quarantined and deleted successfully.
C:\Program Files\WinAntiVirus Pro 2006\plugins\unpack.ivd (Rogue.WinAntiVirus) -> Quarantined and deleted successfully.
C:\Program Files\WinAntiVirus Pro 2006\plugins\unpack.xmd (Rogue.WinAntiVirus) -> Quarantined and deleted successfully.
C:\Program Files\WinAntiVirus Pro 2006\plugins\update.txt (Rogue.WinAntiVirus) -> Quarantined and deleted successfully.
C:\Program Files\WinAntiVirus Pro 2006\plugins\uudecode.xmd (Rogue.WinAntiVirus) -> Quarantined and deleted successfully.
C:\Program Files\WinAntiVirus Pro 2006\plugins\ve.cvd (Rogue.WinAntiVirus) -> Quarantined and deleted successfully.
C:\Program Files\WinAntiVirus Pro 2006\plugins\ve.ivd (Rogue.WinAntiVirus) -> Quarantined and deleted successfully.
C:\Program Files\WinAntiVirus Pro 2006\plugins\ve.xmd (Rogue.WinAntiVirus) -> Quarantined and deleted successfully.
C:\Program Files\WinAntiVirus Pro 2006\plugins\vedata.cvd (Rogue.WinAntiVirus) -> Quarantined and deleted successfully.
C:\Program Files\WinAntiVirus Pro 2006\plugins\viza.xmd (Rogue.WinAntiVirus) -> Quarantined and deleted successfully.
C:\Program Files\WinAntiVirus Pro 2006\plugins\wise.xmd (Rogue.WinAntiVirus) -> Quarantined and deleted successfully.
C:\Program Files\WinAntiVirus Pro 2006\plugins\xishield.xmd (Rogue.WinAntiVirus) -> Quarantined and deleted successfully.
C:\Program Files\WinAntiVirus Pro 2006\plugins\z.xmd (Rogue.WinAntiVirus) -> Quarantined and deleted successfully.
C:\Program Files\WinAntiVirus Pro 2006\plugins\zip.xmd (Rogue.WinAntiVirus) -> Quarantined and deleted successfully.
C:\Program Files\WinAntiVirus Pro 2006\plugins\zoo.xmd (Rogue.WinAntiVirus) -> Quarantined and deleted successfully.
C:\Documents and Settings\Francky\Application Data\wiaservg.log (Malware.Trace) -> Quarantined and deleted successfully.
C:\Documents and Settings\Francky\Menu Démarrer\Programmes\Security Tool.LNK (Rogue.SecurityTool) -> Quarantined and deleted successfully.
C:\.protected (Rogue.Multiple) -> Quarantined and deleted successfully.
C:\Documents and Settings\All Users\Menu Démarrer\Programmes\Démarrage\.protected (Rogue.Multiple) -> Quarantined and deleted successfully.
C:\Documents and Settings\Francky\Menu Démarrer\Programmes\Démarrage\.protected (Rogue.Multiple) -> Quarantined and deleted successfully.
C:\Documents and Settings\Francky\Menu Démarrer\Programmes\Démarrage\mgjwin32.exe (Trojan.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\drivers\etc\.protected (Rogue.Multiple) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\EGDHTML_1025.dll (Adware.EGDAccess) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\EGDHTML_1026.dll (Adware.EGDAccess) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\ia.dll (Adware.EGDAccess) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\P2ECOM.dll (Adware.EGDAccess) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\stera.job (Rogue.WinAntiVirus) -> Quarantined and deleted successfully.
C:\WINDOWS\Temp\wpv011277987182.exe (Trojan.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\Temp\wpv141277987182.exe (Trojan.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\Temp\wpv221284039000.exe (Trojan.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\Temp\wpv361277987182.exe (Trojan.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\Temp\wpv541279548806.exe (Trojan.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\Temp\wpv691277987182.exe (Trojan.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\Temp\wpv871264679855.exe (Trojan.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\Temp\wpv931284038949.exe (Trojan.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\Temp\wpv981277987182.exe (Trojan.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\.protected (Rogue.Multiple) -> Quarantined and deleted successfully.
0
moment de grace Messages postés 29042 Date d'inscription samedi 6 décembre 2008 Statut Contributeur sécurité Dernière intervention 18 juillet 2013 2 274
10 sept. 2010 à 11:39
ok

tu avais de tres mauvaises choses

vide la quarantaine

puis

Attention, avant de commencer, lit attentivement la procédure, et imprime la

Aide à l'utilisation
https://www.bleepingcomputer.com/combofix/fr/comment-utiliser-combofix



Télécharge ComboFix de sUBs sur ton Bureau :

http://download.bleepingcomputer.com/sUBs/ComboFix.exe

/!\ Déconnecte-toi du net et DESACTIVES TOUTES LES DEFENSES, antivirus et antispyware y compris /!\

---> Double-clique sur ComboFix.exe
Un "pop-up" va apparaître qui dit que ComboFix est utilisé à vos risques et avec aucune garantie... Clique sur oui pour accepter

SURTOUT INSTALLES LA CONSOLE DE RECUPERATION
(si il te propose de l'installer remets provisoirement internet)

---> Mets-le en langue française F
Tape sur la touche 1 (Yes) pour démarrer le scan.

Ne touche à rien(souris, clavier) tant que le scan n'est pas terminé, car tu risques de planter ton PC

En fin de scan, il est possible que ComboFix ait besoin de redémarrer le PC pour finaliser la désinfection, laisse-le faire.

Une fois le scan achevé, un rapport va s'afficher : Poste son contenu

/!\ Réactive la protection en temps réel de ton antivirus et de ton antispyware avant de te reconnecter à Internet. /!\

Note : Le rapport se trouve également là : C:\ComboFix.txt

0
Speedcolibri Messages postés 15 Date d'inscription samedi 20 janvier 2007 Statut Membre Dernière intervention 30 septembre 2010
10 sept. 2010 à 11:51
Salut,

Mission de suppression réalisé avec succès.

Merci pour l'aide.

Speed.
0
moment de grace Messages postés 29042 Date d'inscription samedi 6 décembre 2008 Statut Contributeur sécurité Dernière intervention 18 juillet 2013 2 274
10 sept. 2010 à 11:53
faire combofix comme indiqué juste au dessus
0

Vous n’avez pas trouvé la réponse que vous recherchez ?

Posez votre question
Speedcolibri Messages postés 15 Date d'inscription samedi 20 janvier 2007 Statut Membre Dernière intervention 30 septembre 2010
10 sept. 2010 à 12:06
Re;

La Quarantaine de Malwarebytes est vide.

Combofix est déja télécharger et est sur le bureau, je l'ai renommé asdehi comme indiqué sur un autre site (cela n'as pas trompé le rogue) suite à une première tentative qui c'est révélé vaine car je n'ais pas pu ouvrir à cause du rogue.

Est il possible de faire combofix plus tard (lundi) le temps d'imprimer la procédure ?

Pour le moment tout fonctionne correctement.

@+

Speed.
0
moment de grace Messages postés 29042 Date d'inscription samedi 6 décembre 2008 Statut Contributeur sécurité Dernière intervention 18 juillet 2013 2 274
10 sept. 2010 à 12:09
oui sans soucis

en revanche tu le retélecharges et tu le renommes avant de l'enregistrer sur le bureau

renommes le SPEED.exe et ne fais que ce que je te demande

merci

@+ donc
0
Speedcolibri Messages postés 15 Date d'inscription samedi 20 janvier 2007 Statut Membre Dernière intervention 30 septembre 2010
13 sept. 2010 à 18:59
Bonsoir , scan effectué avec succés par combo fix.

Ci-joint le rapport.

Bonne soirée.
@+

ComboFix 10-09-12.04 - Francky 13/09/2010 18:18:25.1.1 - x86
Microsoft Windows XP Édition familiale 5.1.2600.3.1252.33.1036.18.511.284 [GMT 2:00]
Lancé depuis: c:\documents and settings\Francky\Bureau\ComboFix.exe
* Un nouveau point de restauration a été créé
.

(((((((((((((((((((((((((((((((((((( Autres suppressions ))))))))))))))))))))))))))))))))))))))))))))))))
.

c:\windows\system32\drivers\npf.sys
c:\windows\system32\Packet.dll
c:\windows\system32\stera.log
c:\windows\system32\wpcap.dll
E:\autorun.inf
F:\Autorun.inf

Une copie infectée de c:\windows\system32\drivers\disk.sys a été trouvée et désinfectée
Copie restaurée à partir de - Kitty had a snack :p
.
((((((((((((((((((((((((((((((((((((((( Pilotes/Services )))))))))))))))))))))))))))))))))))))))))))))))))
.

-------\Legacy_BOONTY_GAMES
-------\Legacy_NPF
-------\Service_Boonty Games
-------\Service_NPF
-------\Service_usnjsvc


((((((((((((((((((((((((((((( Fichiers créés du 2010-08-13 au 2010-09-13 ))))))))))))))))))))))))))))))))))))
.

2010-09-10 09:40 . 2010-09-10 09:40 -------- d-----w- c:\documents and settings\Francky\Application Data\Malwarebytes
2010-09-10 07:08 . 2010-09-10 07:08 -------- d-----w- c:\documents and settings\Administrateur\Application Data\Malwarebytes
2010-09-10 07:08 . 2010-04-29 13:39 38224 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
2010-09-10 07:08 . 2010-09-10 07:08 -------- d-----w- c:\program files\Malwarebytes' Anti-Malware
2010-09-10 07:08 . 2010-09-10 07:08 -------- d-----w- c:\documents and settings\All Users\Application Data\Malwarebytes
2010-09-10 07:08 . 2010-04-29 13:39 20952 ----a-w- c:\windows\system32\drivers\mbam.sys
2010-09-09 16:06 . 2010-09-09 16:06 -------- d-----w- c:\windows\system32\wbem\Repository
2010-08-18 17:32 . 2010-08-18 17:32 -------- d-----r- c:\documents and settings\NetworkService\Favoris

.
(((((((((((((((((((((((((((((((((( Compte-rendu de Find3M ))))))))))))))))))))))))))))))))))))))))))))))))
.
2010-09-11 22:01 . 2005-10-12 19:29 -------- d-----w- c:\documents and settings\Francky\Application Data\Skype
2010-09-11 15:29 . 2009-04-28 16:38 -------- d-----w- c:\documents and settings\Francky\Application Data\skypePM
2010-09-10 22:23 . 2008-11-30 15:18 512 ----a-w- C:\drmHeader.bin
2010-08-26 18:14 . 2010-06-21 16:33 1324 ----a-w- c:\windows\system32\d3d9caps.dat
2010-08-24 15:35 . 2003-09-02 14:12 -------- d--h--w- c:\program files\InstallShield Installation Information
2010-08-14 12:31 . 2007-05-31 16:10 -------- d-----w- c:\program files\Fichiers communs\Java
2010-08-14 12:30 . 2007-05-31 16:10 -------- d-----w- c:\program files\Java
2010-07-17 03:00 . 2010-08-14 12:30 423656 ----a-w- c:\windows\system32\deployJava1.dll
2004-09-01 18:49 . 2004-09-01 18:51 578728 -c--a-w- c:\program files\QuickTimeInstaller.exe
.

((((((((((((((((((((((((((((((((( Points de chargement Reg ))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* les éléments vides & les éléments initiaux légitimes ne sont pas listés
REGEDIT4

[HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{b9c901e7-15ff-4d17-9429-d4634d15ac2d}]
2010-08-27 17:42 2734688 ----a-w- c:\program files\Barre_outils_FCS\tbBar0.dll

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Toolbar]
"{b9c901e7-15ff-4d17-9429-d4634d15ac2d}"= "c:\program files\Barre_outils_FCS\tbBar0.dll" [2010-08-27 2734688]

[HKEY_CLASSES_ROOT\clsid\{b9c901e7-15ff-4d17-9429-d4634d15ac2d}]

[HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Toolbar\Webbrowser]
"{B9C901E7-15FF-4D17-9429-D4634D15AC2D}"= "c:\program files\Barre_outils_FCS\tbBar0.dll" [2010-08-27 2734688]

[HKEY_CLASSES_ROOT\clsid\{b9c901e7-15ff-4d17-9429-d4634d15ac2d}]

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"LDM"="c:\program files\Logitech\Desktop Messenger\8876480\Program\LogitechDesktopMessenger.exe" [2005-11-13 36864]
"LogitechSoftwareUpdate"="c:\program files\Logitech\Video\ManifestEngine.exe" [2004-06-01 196608]
"msnmsgr"="c:\progra~1\WI1F86~1\MESSEN~1\msnmsgr.exe" [2007-10-18 5724184]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"DSLAGENTEXE"="dslagent.exe USB" [X]
"Disc Detector"="c:\program files\Creative\ShareDLL\CtNotify.exe" [1999-08-29 189952]
"UpdReg"="c:\windows\Updreg.exe" [2000-05-10 90112]
"AHQInit"="c:\program files\Creative\SBLive\Program\AHQInit.exe" [2001-05-10 102400]
"AudioHQ"="c:\program files\Creative\SBLive\AudioHQ\AHQTB.EXE" [2001-08-17 180224]
"GSICONEXE"="GSICON.EXE" [2001-07-18 90112]
"AdaptecDirectCD"="c:\program files\Roxio\Easy CD Creator 5\DirectCD\DirectCD.exe" [2002-04-10 679936]
"XTNDConnect PC - ErPhn2"="c:\progra~1\FICHIE~1\XCPCSync\TRANSL~1\ErPhn2\ErTray.exe" [2003-02-13 53248]
"SideWinderTrayV4"="c:\progra~1\MICROS~4\GAMECO~1\Common\SWTrayV4.exe" [2000-06-28 24649]
"QuickTime Task"="c:\program files\QuickTime\qttask.exe" [2004-09-01 98304]
"ATIPTA"="c:\program files\ATI Technologies\ATI Control Panel\atiptaxx.exe" [2004-11-30 344064]
"LVCOMSX"="c:\windows\system32\LVCOMSX.EXE" [2004-05-21 221184]
"LogitechVideoRepair"="c:\program files\Logitech\Video\ISStart.exe" [2004-06-01 458752]
"LogitechVideoTray"="c:\program files\Logitech\Video\LogiTray.exe" [2004-06-01 217088]
"LogitechGalleryRepair"="c:\program files\Logitech\Video\ISStart.exe" [2004-06-01 458752]
"TkBellExe"="c:\program files\Fichiers communs\Real\Update_OB\realsched.exe" [2010-02-02 198160]
"SunJavaUpdateSched"="c:\program files\Fichiers communs\Java\Java Update\jusched.exe" [2010-05-14 248552]

[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run]
"CTFMON.EXE"="c:\windows\System32\CTFMON.EXE" [2008-04-14 15360]

c:\documents and settings\All Users\Menu D'marrer\Programmes\D'marrage\
AutoStart IR.lnk - c:\program files\WinTV\Ir.exe [2005-4-1 102455]
BTTray.lnk - c:\program files\WIDCOMM\Logiciel Bluetooth\BTTray.exe [2002-10-25 360509]
Logitech Desktop Messenger.lnk - c:\program files\Logitech\Desktop Messenger\8876480\Program\LDMConf.exe [2005-11-13 196608]
Logitech SetPoint.lnk - c:\program files\Logitech\SetPoint\SetPoint.exe [2006-12-26 593920]
Microsoft Office.lnk - c:\program files\Microsoft Office\Office10\OSA.EXE [2001-2-13 83360]

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Logitech Hardware Abstraction Layer]
2006-05-10 08:48 94208 ----a-w- c:\windows\KHALMNPR.Exe

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%windir%\\system32\\sessmgr.exe"=
"c:\\Program Files\\Yahoo!\\Messenger\\YPager.exe"=
"c:\\Program Files\\Yahoo!\\Messenger\\YServer.exe"=
"c:\\Program Files\\Messenger\\msmsgs.exe"=
"e:\\Le bourrico\\eMule\\emule.exe"=
"e:\\eMule\\emule.exe"=
"c:\\Program Files\\Microsoft Games\\Combat Flight Simulator 3\\cfs3.exe"=
"c:\\Program Files\\Logitech\\Desktop Messenger\\8876480\\Program\\LogitechDesktopMessenger.exe"=
"c:\\Program Files\\Maple 7\\BIN.WNT\\mserver.exe"=
"c:\\Program Files\\QuickTime\\QuickTimePlayer.exe"=
"e:\program files\rapimgr.exe"= e:\program files\rapimgr.exe:169.254.2.0/255.255.255.0:Enabled:ActiveSync RAPI Manager
"e:\program files\wcescomm.exe"= e:\program files\wcescomm.exe:169.254.2.0/255.255.255.0:Enabled:ActiveSync Connection Manager
"e:\program files\WCESMgr.exe"= e:\program files\WCESMgr.exe:169.254.2.0/255.255.255.0:Enabled:ActiveSync Application
"%windir%\\Network Diagnostic\\xpnetdiag.exe"=
"c:\\Program Files\\Participatory Culture Foundation\\Miro\\xulrunner\\python\\Miro_Downloader.exe"=
"c:\\Program Files\\Windows Live\\Messenger\\msnmsgr.exe"=
"c:\\Program Files\\Windows Live\\Messenger\\livecall.exe"=
"e:\\eMule\\002\\emule.exe"=
"c:\\Program Files\\Real\\RealPlayer\\realplay.exe"=
"f:\\skype\\Plugin Manager\\skypePM.exe"=
"f:\\eMule\\emule.exe"=
"f:\\skype\\Phone\\Skype.exe"=

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\GloballyOpenPorts\List]
"26675:TCP"= 26675:TCP:169.254.2.0/255.255.255.0:Enabled:ActiveSync Service

R2 LBeepKE;LBeepKE;c:\windows\system32\drivers\LBeepKE.sys [26/12/2006 11:33 3712]
R3 HCWU2DTD;Hauppauge Nova USB2 DVB-T TV Receiver;c:\windows\system32\drivers\hcwu2dtd.sys [01/04/2005 15:58 31488]
S2 CoachCap;FUJIFILM EX-10/EX-20 PC V1.00;c:\windows\system32\drivers\coachcap.sys [03/03/2002 12:26 93068]
S2 gafwload;ECI Telecom USB ADSL Loader;c:\windows\system32\drivers\gafwload.sys [02/09/2003 16:58 26987]
S2 gupdate;Google Update Service (gupdate);c:\program files\Google\Update\GoogleUpdate.exe [21/07/2009 19:00 133104]
S3 ASPI;Advanced SCSI Programming Interface Driver;c:\windows\system32\drivers\ASPI32.SYS [10/06/2006 20:34 16512]
S3 HCWU2DTL;Hauppauge Nova-USB2-T Adapter Firmware Loader;c:\windows\system32\drivers\hcwusdtl.sys [01/04/2005 15:57 16768]
S3 SWUSBFLT;Pilote de filtre Microsoft SideWinder VIA;c:\windows\system32\drivers\SWUSBFLT.SYS [13/01/2004 18:52 3968]
S3 USBAV191;Instant VideoXpress;c:\windows\system32\drivers\USBAV191.SYS [01/02/2006 17:12 120128]
.
Contenu du dossier 'Tâches planifiées'

2010-09-13 c:\windows\Tasks\Google Software Updater.job
- c:\program files\Google\Common\Google Updater\GoogleUpdaterService.exe [2007-01-24 16:59]

2010-09-13 c:\windows\Tasks\GoogleUpdateTaskMachineCore1ca5b421658e858.job
- c:\program files\Google\Update\GoogleUpdate.exe [2009-07-21 17:00]

2010-09-13 c:\windows\Tasks\GoogleUpdateTaskMachineUA1ca5b4216ea57ca.job
- c:\program files\Google\Update\GoogleUpdate.exe [2009-07-21 17:00]

2010-09-13 c:\windows\Tasks\User_Feed_Synchronization-{03AF8A2E-B6D5-4E8B-AB1C-C429769C9BB1}.job
- c:\windows\system32\msfeedssync.exe [2009-03-08 02:31]

2010-09-13 c:\windows\Tasks\User_Feed_Synchronization-{B95D413D-2949-4A12-9E9C-B00CE5B9F888}.job
- c:\windows\system32\msfeedssync.exe [2009-03-08 02:31]
.
.
------- Examen supplémentaire -------
.
IE: E&xporter vers Microsoft Excel - c:\progra~1\MICROS~2\Office10\EXCEL.EXE/3000
Handler: bwfile-8876480 - {9462A756-7B47-47BC-8C80-C34B9B80B32B} - c:\program files\Logitech\Desktop Messenger\8876480\Program\GAPlugProtocol-8876480.dll
DPF: Microsoft XML Parser for Java - file://c:\windows\Java\classes\xmldso.cab
DPF: {721700FE-7F0E-49C5-BDED-CA92B7CB1245} - hxxp://203.125.227.74/dcsclictrl.cab
DPF: {C1BAC744-8F0B-11D0-89E7-00C0A8295197} - hxxp://www.crtvg.es/camweb/camera.cab
DPF: {E78928A6-3D2A-4BF7-A100-F3FBAA351B49} - hxxps://www.vpay.co.kr/kvpfiles/KVPISPCTLD.cab
.
- - - - ORPHELINS SUPPRIMES - - - -

AddRemove-Creative News - c:\program files\Creative\News\CTNews.isu



**************************************************************************

catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2010-09-13 18:39
Windows 5.1.2600 Service Pack 3 NTFS

Recherche de processus cachés ...

Recherche d'éléments en démarrage automatique cachés ...

HKLM\Software\Microsoft\Windows\CurrentVersion\Run
Disc Detector = c:\program files\Creative\ShareDLL\CtNotify.exe?X???????????????? C?????D?tecteur de disque???????A?p ????B???@?$?@?? C?????U?@?????????@?B???A???????A???????B???@?????P???$?@?? ??????~?:~??????????@???????????????????B???????????????????????????????????B

Recherche de fichiers cachés ...

Scan terminé avec succès
Fichiers cachés: 0

**************************************************************************
.
--------------------- CLES DE REGISTRE BLOQUEES ---------------------

[HKEY_LOCAL_MACHINE\software\Classes\CLSID\{A483C63A-CDBC-426E-BF93-872502E8144E}]
@Denied: (A 2) (Everyone)
@="FlashBroker"
"LocalizedString"="@c:\\WINDOWS\\system32\\Macromed\\Flash\\FlashUtil10i_ActiveX.exe,-101"

[HKEY_LOCAL_MACHINE\software\Classes\CLSID\{A483C63A-CDBC-426E-BF93-872502E8144E}\Elevation]
"Enabled"=dword:00000001

[HKEY_LOCAL_MACHINE\software\Classes\CLSID\{A483C63A-CDBC-426E-BF93-872502E8144E}\LocalServer32]
@="c:\\WINDOWS\\system32\\Macromed\\Flash\\FlashUtil10i_ActiveX.exe"

[HKEY_LOCAL_MACHINE\software\Classes\CLSID\{A483C63A-CDBC-426E-BF93-872502E8144E}\TypeLib]
@="{FAB3E735-69C7-453B-A446-B6823C6DF1C9}"

[HKEY_LOCAL_MACHINE\software\Classes\Interface\{E3F2C3CB-5EB8-4A04-B22C-7E3B4B6AF30F}]
@Denied: (A 2) (Everyone)
@="IFlashBroker4"

[HKEY_LOCAL_MACHINE\software\Classes\Interface\{E3F2C3CB-5EB8-4A04-B22C-7E3B4B6AF30F}\ProxyStubClsid32]
@="{00020424-0000-0000-C000-000000000046}"

[HKEY_LOCAL_MACHINE\software\Classes\Interface\{E3F2C3CB-5EB8-4A04-B22C-7E3B4B6AF30F}\TypeLib]
@="{FAB3E735-69C7-453B-A446-B6823C6DF1C9}"
"Version"="1.0"

[HKEY_LOCAL_MACHINE\software\Microsoft\Windows\CurrentVersion\Reinstall\æHôwæ*]
"DisplayName"="\09"
"DeviceDesc"="\09"
"ProviderName"=""
"MFG"="?"
"ReinstallString"="2002, 6.13.10.6143"
"DeviceInstanceIds"=multi:"\00"
.
--------------------- DLLs chargées dans les processus actifs ---------------------

- - - - - - - > 'winlogon.exe'(884)
c:\windows\system32\Ati2evxx.dll

- - - - - - - > 'explorer.exe'(2156)
c:\program files\Goto Software\Vade Retro\VrOe_hook.dll
c:\program files\Logitech\SetPoint\GameHook.dll
c:\program files\Logitech\SetPoint\lgscroll.dll
c:\progra~1\WINDOW~3\wmpband.dll
c:\windows\system32\eappprxy.dll
c:\windows\system32\webcheck.dll
c:\windows\system32\WPDShServiceObj.dll
c:\windows\System32\BTNCopy.dll
c:\windows\system32\PortableDeviceTypes.dll
c:\windows\system32\PortableDeviceApi.dll
c:\program files\Microsoft Office\Office10\msohev.dll
.
------------------------ Autres processus actifs ------------------------
.
c:\windows\system32\Ati2evxx.exe
c:\windows\system32\devldr32.exe
c:\windows\system32\Ati2evxx.exe
c:\windows\System32\DRIVERS\CDANTSRV.EXE
c:\windows\System32\CTsvcCDA.EXE
c:\program files\Java\jre6\bin\jqs.exe
c:\program files\Fichiers communs\Microsoft Shared\VS7Debug\mdm.exe
c:\program files\Fichiers communs\Ulead Systems\DVD\ULCDRSvr.exe
c:\windows\System32\MsPMSPSv.exe
c:\windows\system32\GSICON.EXE
c:\windows\system32\dslagent.exe
e:\program files\wcescomm.exe
c:\program files\Creative\ShareDLL\MediaDet.Exe
e:\udpixel\UDPixel_fr.exe
c:\program files\Goto Software\Vade Retro\Vaderetro_oe.exe
c:\program files\Fichiers communs\Logitech\KhalShared\KHALMNPR.EXE
e:\progra~1\rapimgr.exe
c:\program files\Logitech\Video\FxSvr2.exe
c:\windows\system32\wscntfy.exe
.
**************************************************************************
.
Heure de fin: 2010-09-13 18:55:35 - La machine a redémarré
ComboFix-quarantined-files.txt 2010-09-13 16:55

Avant-CF: 48 628 891 648 octets libres
Après-CF: 49 365 913 600 octets libres

WindowsXP-KB310994-SP2-Home-BootDisk-FRA.exe
[boot loader]
timeout=2
default=multi(0)disk(0)rdisk(0)partition(1)\WINDOWS
[operating systems]
c:\cmdcons\BOOTSECT.DAT="Microsoft Windows Recovery Console" /cmdcons
UnsupportedDebug="do not select this" /debug
multi(0)disk(0)rdisk(0)partition(1)\WINDOWS="Microsoft Windows XP dition familiale" /fastdetect /NoExecute=OptIn
multi(0)disk(0)rdisk(0)partition(2)\WINDOWS="Microsoft Windows XP dition familiale" /fastdetect

- - End Of File - - AE6130CF6D458842E387AECB0D8A80BE
0
moment de grace Messages postés 29042 Date d'inscription samedi 6 décembre 2008 Statut Contributeur sécurité Dernière intervention 18 juillet 2013 2 274
13 sept. 2010 à 19:55
ok

voilà qui me plait bien

Télécharge ZHPDiag ( de Nicolas coolman ).
https://www.zebulon.fr/telechargements/securite/systeme/zhpdiag.html


(outil de diagnostic)


Double clique sur le fichier d'installation, puis installe le avec les paramètres par défaut ( N'oublie pas de cocher " Créer une icône sur le bureau " )

Lance ZHPDiag en double cliquant sur l'icône présente sur ton bureau (Clique droit -> Executer en tant qu'admin ( vista )

Clique sur la loupe en haut à gauche, puis laisse l'outil scanner.

Une fois le scan terminé, clique sur l'icône en forme de disquette et enregistre le fichier sur ton bureau.

Rend toi sur Cjoint : http://www.cijoint.fr/

Clique sur "Parcourir " dans la partie " Joindre un fichier[...] "

Sélectionne le rapport ZHPdiag.txt qui se trouve sur ton bureau

Clique ensuite sur "Cliquez ici pour déposer le fichier " et copie/colle le lien dans ton prochain message

0
Speedcolibri Messages postés 15 Date d'inscription samedi 20 janvier 2007 Statut Membre Dernière intervention 30 septembre 2010
15 sept. 2010 à 21:36
Bonsoir,

Ok je vais faire la suite je pense demain car je suis un peut pris niveau temps .

Merci pour les procédures.

@+

Speedcolibri
0
moment de grace Messages postés 29042 Date d'inscription samedi 6 décembre 2008 Statut Contributeur sécurité Dernière intervention 18 juillet 2013 2 274
16 sept. 2010 à 03:40
ok

@+ plus tard donc
0
Speedcolibri Messages postés 15 Date d'inscription samedi 20 janvier 2007 Statut Membre Dernière intervention 30 septembre 2010
18 sept. 2010 à 19:14
Bonsoir ,

Ci-joint le lien suite au scan.

http://www.cijoint.fr/cjlink.php?file=cj201009/cij915jBCa.txt

@+

Speedcolibri
0
moment de grace Messages postés 29042 Date d'inscription samedi 6 décembre 2008 Statut Contributeur sécurité Dernière intervention 18 juillet 2013 2 274
18 sept. 2010 à 19:27
ok

comment va le pc ?


* Télécharge load_tdsskiller (de Loup Blanc) sur ton Bureau

http://fradesch.perso.cegetel.net/transf/Load_tdsskiller.exe

* Lance load_tdsskiller en faisant un double-clic dessus / Lance par un clic-droit dessus ? Exécuter en temps qu'administrateur
* L'outil va se connecter pour télécharger une copie à jour de TDSSKiller, puis va lancer une analyse
* A la fin, il te sera demandé d'appuyer sur une touche, puis le rapport s'affichera automatiquement : copie-colle son contenu dans ta prochaine réponse (C:\tdsskiller\report.txt)
0
Speedcolibri Messages postés 15 Date d'inscription samedi 20 janvier 2007 Statut Membre Dernière intervention 30 septembre 2010
21 sept. 2010 à 22:12
Bonsoir,

Le pc tourne impec (pour ce que je lui demande ;) ).

Je pense faire la manip demain en journé.

Merci pour les infos.

@+

Speedcolibri
0
moment de grace Messages postés 29042 Date d'inscription samedi 6 décembre 2008 Statut Contributeur sécurité Dernière intervention 18 juillet 2013 2 274
21 sept. 2010 à 22:14
ok

@ demain donc...
0
Speedcolibri Messages postés 15 Date d'inscription samedi 20 janvier 2007 Statut Membre Dernière intervention 30 septembre 2010
23 sept. 2010 à 15:56
Bonjour,

Ci joint le rapport du scan.
A première vu il n'a rien trouvé :) .

Cordialement
Speedcolibri

2010/09/23 15:52:32.0500 TDSS rootkit removing tool 2.4.2.1 Sep 7 2010 14:43:44
2010/09/23 15:52:32.0500 ================================================================================
2010/09/23 15:52:32.0500 SystemInfo:
2010/09/23 15:52:32.0500
2010/09/23 15:52:32.0500 OS Version: 5.1.2600 ServicePack: 3.0
2010/09/23 15:52:32.0500 Product type: Workstation
2010/09/23 15:52:32.0500 ComputerName: COLIBRI-002
2010/09/23 15:52:32.0500 UserName: Francky
2010/09/23 15:52:32.0500 Windows directory: C:\WINDOWS
2010/09/23 15:52:32.0500 System windows directory: C:\WINDOWS
2010/09/23 15:52:32.0500 Processor architecture: Intel x86
2010/09/23 15:52:32.0500 Number of processors: 1
2010/09/23 15:52:32.0500 Page size: 0x1000
2010/09/23 15:52:32.0500 Boot type: Normal boot
2010/09/23 15:52:32.0500 ================================================================================
2010/09/23 15:52:33.0265 Initialize success
2010/09/23 15:53:33.0546 ================================================================================
2010/09/23 15:53:33.0546 Scan started
2010/09/23 15:53:33.0546 Mode: Manual;
2010/09/23 15:53:33.0546 ================================================================================
2010/09/23 15:53:35.0453 ac97intc (0f2d66d5f08ebe2f77bb904288dcf6f0) C:\WINDOWS\system32\drivers\ac97intc.sys
2010/09/23 15:53:35.0640 ACPI (e5e6dbfc41ea8aad005cb9a57a96b43b) C:\WINDOWS\system32\DRIVERS\ACPI.sys
2010/09/23 15:53:35.0828 ACPIEC (e4abc1212b70bb03d35e60681c447210) C:\WINDOWS\system32\drivers\ACPIEC.sys
2010/09/23 15:53:36.0031 aec (8bed39e3c35d6a489438b8141717a557) C:\WINDOWS\system32\drivers\aec.sys
2010/09/23 15:53:36.0234 AFD (7e775010ef291da96ad17ca4b17137d7) C:\WINDOWS\System32\drivers\afd.sys
2010/09/23 15:53:36.0421 agp440 (08fd04aa961bdc77fb983f328334e3d7) C:\WINDOWS\system32\DRIVERS\agp440.sys
2010/09/23 15:53:37.0750 ASPI (54ab078660e536da72b21a27f56b035b) C:\WINDOWS\System32\DRIVERS\ASPI32.sys
2010/09/23 15:53:37.0953 AsyncMac (b153affac761e7f5fcfa822b9c4e97bc) C:\WINDOWS\system32\DRIVERS\asyncmac.sys
2010/09/23 15:53:38.0125 atapi (9f3a2f5aa6875c72bf062c712cfa2674) C:\WINDOWS\system32\DRIVERS\atapi.sys
2010/09/23 15:53:38.0531 ati2mtag (1e75fad9de6cd4d745d27347324649a8) C:\WINDOWS\system32\DRIVERS\ati2mtag.sys
2010/09/23 15:53:38.0718 Atmarpc (9916c1225104ba14794209cfa8012159) C:\WINDOWS\system32\DRIVERS\atmarpc.sys
2010/09/23 15:53:38.0968 audstub (d9f724aa26c010a217c97606b160ed68) C:\WINDOWS\system32\DRIVERS\audstub.sys
2010/09/23 15:53:39.0156 Beep (da1f27d85e0d1525f6621372e7b685e9) C:\WINDOWS\system32\drivers\Beep.sys
2010/09/23 15:53:39.0343 BtAudio (abf0ea7efc513c7b6aade147104cad74) C:\WINDOWS\system32\DRIVERS\btaudio.sys
2010/09/23 15:53:39.0531 BTDriver (65fc9b1c2e14dc1bbc4633f17021137d) C:\WINDOWS\system32\DRIVERS\btport.sys
2010/09/23 15:53:39.0765 BTKRNL (3364925dabdd1208672c8b4494b77856) C:\WINDOWS\system32\drivers\btkrnl.sys
2010/09/23 15:53:39.0968 BTSERIAL (554e9fbd075ccb1c13ec64130ef31826) C:\WINDOWS\System32\drivers\btserial.sys
2010/09/23 15:53:40.0156 BTSLBCSP (7de98c34e27e7daa4ccdf3f761c7a06c) C:\WINDOWS\System32\drivers\btslbcsp.sys
2010/09/23 15:53:40.0343 BTWDNDIS (74a258a2b7c8bcea3b0ad60676b76598) C:\WINDOWS\system32\DRIVERS\btwdndis.sys
2010/09/23 15:53:40.0515 BTWUSB (dfcfca9cc865d0ec7c8e84b129e52c65) C:\WINDOWS\system32\Drivers\btwusb.sys
2010/09/23 15:53:40.0671 C-Dilla (4ff76600b4ca68376b80af1683799c60) C:\WINDOWS\System32\drivers\CDANT.SYS
2010/09/23 15:53:40.0921 cbidf2k (90a673fc8e12a79afbed2576f6a7aaf9) C:\WINDOWS\system32\drivers\cbidf2k.sys
2010/09/23 15:53:41.0078 CCDECODE (0be5aef125be881c4f854c554f2b025c) C:\WINDOWS\system32\DRIVERS\CCDECODE.sys
2010/09/23 15:53:41.0328 Cdaudio (c1b486a7658353d33a10cc15211a873b) C:\WINDOWS\system32\drivers\Cdaudio.sys
2010/09/23 15:53:41.0734 Cdfs (c885b02847f5d2fd45a24e219ed93b32) C:\WINDOWS\system32\drivers\Cdfs.sys
2010/09/23 15:53:42.0218 Cdr4_xp (837eef65af62d4e8a37c41d3879f7274) C:\WINDOWS\system32\drivers\Cdr4_xp.sys
2010/09/23 15:53:42.0781 Cdralw2k (579da2f9f5401f55dae2cf8779d61dfc) C:\WINDOWS\system32\drivers\Cdralw2k.sys
2010/09/23 15:53:43.0484 cdrbsdrv (351735695e9ead93de6af85d8beb1ca8) C:\WINDOWS\system32\drivers\cdrbsdrv.sys
2010/09/23 15:53:44.0640 Cdrom (1f4260cc5b42272d71f79e570a27a4fe) C:\WINDOWS\system32\DRIVERS\cdrom.sys
2010/09/23 15:53:45.0390 cdudf_xp (072070a498d5fad70c3a99a5f0b1331b) C:\WINDOWS\system32\drivers\cdudf_xp.sys
2010/09/23 15:53:47.0093 CoachCap (34444d12a5b66637f66de06efb8e3f57) C:\WINDOWS\system32\drivers\CoachCap.sys
2010/09/23 15:53:47.0375 ctljystk (71007bd2e1e26927fe3e4eb00c0beedf) C:\WINDOWS\system32\DRIVERS\ctljystk.sys
2010/09/23 15:53:47.0640 Disk (044452051f3e02e7963599fc8f4f3e25) C:\WINDOWS\system32\DRIVERS\disk.sys
2010/09/23 15:53:47.0828 dmboot (f5deadd42335fb33edca74ecb2f36cba) C:\WINDOWS\system32\drivers\dmboot.sys
2010/09/23 15:53:48.0000 dmio (5a7c47c9b3f9fb92a66410a7509f0c71) C:\WINDOWS\system32\drivers\dmio.sys
2010/09/23 15:53:48.0187 dmload (e9317282a63ca4d188c0df5e09c6ac5f) C:\WINDOWS\system32\drivers\dmload.sys
2010/09/23 15:53:48.0359 DMusic (8a208dfcf89792a484e76c40e5f50b45) C:\WINDOWS\system32\drivers\DMusic.sys
2010/09/23 15:53:48.0593 drmkaud (8f5fcff8e8848afac920905fbd9d33c8) C:\WINDOWS\system32\drivers\drmkaud.sys
2010/09/23 15:53:48.0765 dvd_2K (a3997baab606caa92f27e07bc4f070f0) C:\WINDOWS\system32\drivers\dvd_2K.sys
2010/09/23 15:53:48.0953 E100B (56ab585a307909c4447d5900a10c6bc7) C:\WINDOWS\system32\DRIVERS\e100b325.sys
2010/09/23 15:53:49.0265 emu10k (eac137eb2c92c524cbb91b60f82db27e) C:\WINDOWS\system32\drivers\emu10k1f.sys
2010/09/23 15:53:49.0453 emu10k1 (aadc81e967c25dd7c90e150fec6eab74) C:\WINDOWS\system32\drivers\ctlface.sys
2010/09/23 15:53:49.0671 Fastfat (38d332a6d56af32635675f132548343e) C:\WINDOWS\system32\drivers\Fastfat.sys
2010/09/23 15:53:49.0875 Fdc (92cdd60b6730b9f50f6a1a0c1f8cdc81) C:\WINDOWS\system32\DRIVERS\fdc.sys
2010/09/23 15:53:50.0062 Fips (31f923eb2170fc172c81abda0045d18c) C:\WINDOWS\system32\drivers\Fips.sys
2010/09/23 15:53:50.0296 Flpydisk (9d27e7b80bfcdf1cdd9b555862d5e7f0) C:\WINDOWS\system32\DRIVERS\flpydisk.sys
2010/09/23 15:53:50.0500 FltMgr (b2cf4b0786f8212cb92ed2b50c6db6b0) C:\WINDOWS\system32\drivers\fltmgr.sys
2010/09/23 15:53:50.0687 Fs_Rec (3e1e2bd4f39b0e2b7dc4f4d2bcc2779a) C:\WINDOWS\system32\drivers\Fs_Rec.sys
2010/09/23 15:53:50.0875 Ftdisk (a86859b77b908c18c2657f284aa29fe3) C:\WINDOWS\system32\DRIVERS\ftdisk.sys
2010/09/23 15:53:51.0078 gafwload (9e2180de57d099421ccbcfdaa0a4fbaa) C:\WINDOWS\system32\DRIVERS\gafwload.sys
2010/09/23 15:53:51.0312 gameenum (065639773d8b03f33577f6cdaea21063) C:\WINDOWS\system32\DRIVERS\gameenum.sys
2010/09/23 15:53:51.0468 GcKernel (72fe2bea6863d4eb93442a1c4fb5ca48) C:\WINDOWS\system32\DRIVERS\GcKernel.sys
2010/09/23 15:53:51.0640 Gpc (0a02c63c8b144bd8c86b103dee7c86a2) C:\WINDOWS\system32\DRIVERS\msgpc.sys
2010/09/23 15:53:51.0843 HCWU2DTD (4c5cf2d1430083fc6c7926700eaaf780) C:\WINDOWS\system32\Drivers\hcwu2dtd.sys
2010/09/23 15:53:52.0031 HCWU2DTL (db24b2ff9dd7bd142d1cf6b9f705fb69) C:\WINDOWS\system32\DRIVERS\hcwusdtl.sys
2010/09/23 15:53:52.0234 HIDSwvd (bd205320308fb41c88a4049a2d1764b4) C:\WINDOWS\system32\DRIVERS\HIDSwvd.sys
2010/09/23 15:53:52.0406 HidUsb (ccf82c5ec8a7326c3066de870c06daf1) C:\WINDOWS\system32\DRIVERS\hidusb.sys
2010/09/23 15:53:52.0671 HTTP (f80a415ef82cd06ffaf0d971528ead38) C:\WINDOWS\system32\Drivers\HTTP.sys
2010/09/23 15:53:52.0937 i8042prt (a09bdc4ed10e3b2e0ec27bb94af32516) C:\WINDOWS\system32\DRIVERS\i8042prt.sys
2010/09/23 15:53:53.0125 Imapi (083a052659f5310dd8b6a6cb05edcf8e) C:\WINDOWS\system32\drivers\Imapi.sys
2010/09/23 15:53:53.0734 IntelIde (4b6da2f0a4095857a9e3f3697399d575) C:\WINDOWS\system32\DRIVERS\intelide.sys
2010/09/23 15:53:53.0906 intelppm (ad340800c35a42d4de1641a37feea34c) C:\WINDOWS\system32\DRIVERS\intelppm.sys
2010/09/23 15:53:54.0125 ip6fw (3bb22519a194418d5fec05d800a19ad0) C:\WINDOWS\system32\drivers\ip6fw.sys
2010/09/23 15:53:54.0296 IpFilterDriver (731f22ba402ee4b62748adaf6363c182) C:\WINDOWS\system32\DRIVERS\ipfltdrv.sys
2010/09/23 15:53:54.0453 IpInIp (b87ab476dcf76e72010632b5550955f5) C:\WINDOWS\system32\DRIVERS\ipinip.sys
2010/09/23 15:53:54.0625 IpNat (cc748ea12c6effde940ee98098bf96bb) C:\WINDOWS\system32\DRIVERS\ipnat.sys
2010/09/23 15:53:54.0812 IPSec (23c74d75e36e7158768dd63d92789a91) C:\WINDOWS\system32\DRIVERS\ipsec.sys
2010/09/23 15:53:54.0984 IRENUM (c93c9ff7b04d772627a3646d89f7bf89) C:\WINDOWS\system32\DRIVERS\irenum.sys
2010/09/23 15:53:55.0156 isapnp (355836975a67b6554bca60328cd6cb74) C:\WINDOWS\system32\DRIVERS\isapnp.sys
2010/09/23 15:53:55.0359 Kbdclass (16813155807c6881f4bfbf6657424659) C:\WINDOWS\system32\DRIVERS\kbdclass.sys
2010/09/23 15:53:55.0546 kbdhid (94c59cb884ba010c063687c3a50dce8e) C:\WINDOWS\system32\DRIVERS\kbdhid.sys
2010/09/23 15:53:55.0734 kmixer (692bcf44383d056aed41b045a323d378) C:\WINDOWS\system32\drivers\kmixer.sys
2010/09/23 15:53:55.0921 KSecDD (b467646c54cc746128904e1654c750c1) C:\WINDOWS\system32\drivers\KSecDD.sys
2010/09/23 15:53:56.0109 L8042mou (f0f944e4da9a75dee6a37d4afc7e1bbc) C:\WINDOWS\system32\Drivers\L8042mou.sys
2010/09/23 15:53:56.0406 LBeepKE (ac3b39817bfde9735f5654468dbf7d49) C:\WINDOWS\system32\Drivers\LBeepKE.sys
2010/09/23 15:53:56.0484 LHidKe (dd40c03d85649205ec086722474c8a63) C:\WINDOWS\system32\DRIVERS\LHidKE.Sys
2010/09/23 15:53:56.0687 LMouKE (2ebd4c02d259944869630a912ec86bce) C:\WINDOWS\system32\Drivers\LMouKE.sys
2010/09/23 15:53:56.0875 LVUSBSta (a9abad5fcb7011114082933b01e13fce) C:\WINDOWS\system32\drivers\lvusbsta.sys
2010/09/23 15:53:57.0078 mmc_2K (e97e3fe03b6f271336cb2fbb24734989) C:\WINDOWS\system32\drivers\mmc_2K.sys
2010/09/23 15:53:57.0296 mnmdd (4ae068242760a1fb6e1a44bf4e16afa6) C:\WINDOWS\system32\drivers\mnmdd.sys
2010/09/23 15:53:57.0468 Modem (510ade9327fe84c10254e1902697e25f) C:\WINDOWS\system32\drivers\Modem.sys
2010/09/23 15:53:57.0562 Mouclass (027c01bd7ef3349aaebc883d8a799efb) C:\WINDOWS\system32\DRIVERS\mouclass.sys
2010/09/23 15:53:57.0750 mouhid (124d6846040c79b9c997f78ef4b2a4e5) C:\WINDOWS\system32\DRIVERS\mouhid.sys
2010/09/23 15:53:57.0937 MountMgr (a80b9a0bad1b73637dbcbba7df72d3fd) C:\WINDOWS\system32\drivers\MountMgr.sys
2010/09/23 15:53:58.0125 MPE (c0f8e0c2c3c0437cf37c6781896dc3ec) C:\WINDOWS\system32\DRIVERS\MPE.sys
2010/09/23 15:53:58.0359 MRxDAV (11d42bb6206f33fbb3ba0288d3ef81bd) C:\WINDOWS\system32\DRIVERS\mrxdav.sys
2010/09/23 15:53:58.0562 MRxSmb (f3aefb11abc521122b67095044169e98) C:\WINDOWS\system32\DRIVERS\mrxsmb.sys
2010/09/23 15:53:58.0781 Msfs (c941ea2454ba8350021d774daf0f1027) C:\WINDOWS\system32\drivers\Msfs.sys
2010/09/23 15:53:58.0937 MSKSSRV (d1575e71568f4d9e14ca56b7b0453bf1) C:\WINDOWS\system32\drivers\MSKSSRV.sys
2010/09/23 15:53:59.0156 MSPCLOCK (325bb26842fc7ccc1fcce2c457317f3e) C:\WINDOWS\system32\drivers\MSPCLOCK.sys
2010/09/23 15:53:59.0343 MSPQM (bad59648ba099da4a17680b39730cb3d) C:\WINDOWS\system32\drivers\MSPQM.sys
2010/09/23 15:53:59.0437 mssmbios (af5f4f3f14a8ea2c26de30f7a1e17136) C:\WINDOWS\system32\DRIVERS\mssmbios.sys
2010/09/23 15:53:59.0593 MSTEE (e53736a9e30c45fa9e7b5eac55056d1d) C:\WINDOWS\system32\drivers\MSTEE.sys
2010/09/23 15:53:59.0781 Mup (2f625d11385b1a94360bfc70aaefdee1) C:\WINDOWS\system32\drivers\Mup.sys
2010/09/23 15:53:59.0937 NABTSFEC (5b50f1b2a2ed47d560577b221da734db) C:\WINDOWS\system32\DRIVERS\NABTSFEC.sys
2010/09/23 15:54:00.0171 NDIS (1df7f42665c94b825322fae71721130d) C:\WINDOWS\system32\drivers\NDIS.sys
2010/09/23 15:54:00.0343 NdisIP (7ff1f1fd8609c149aa432f95a8163d97) C:\WINDOWS\system32\DRIVERS\NdisIP.sys
2010/09/23 15:54:00.0515 NdisTapi (1ab3d00c991ab086e69db84b6c0ed78f) C:\WINDOWS\system32\DRIVERS\ndistapi.sys
2010/09/23 15:54:00.0687 Ndisuio (f927a4434c5028758a842943ef1a3849) C:\WINDOWS\system32\DRIVERS\ndisuio.sys
2010/09/23 15:54:00.0875 NdisWan (edc1531a49c80614b2cfda43ca8659ab) C:\WINDOWS\system32\DRIVERS\ndiswan.sys
2010/09/23 15:54:01.0062 NDProxy (6215023940cfd3702b46abc304e1d45a) C:\WINDOWS\system32\drivers\NDProxy.sys
2010/09/23 15:54:01.0156 NetBIOS (5d81cf9a2f1a3a756b66cf684911cdf0) C:\WINDOWS\system32\DRIVERS\netbios.sys
2010/09/23 15:54:01.0359 NetBT (74b2b2f5bea5e9a3dc021d685551bd3d) C:\WINDOWS\system32\DRIVERS\netbt.sys
2010/09/23 15:54:01.0578 Npfs (3182d64ae053d6fb034f44b6def8034a) C:\WINDOWS\system32\drivers\Npfs.sys
2010/09/23 15:54:01.0781 Ntfs (78a08dd6a8d65e697c18e1db01c5cdca) C:\WINDOWS\system32\drivers\Ntfs.sys
2010/09/23 15:54:01.0984 Null (73c1e1f395918bc2c6dd67af7591a3ad) C:\WINDOWS\system32\drivers\Null.sys
2010/09/23 15:54:02.0156 NwlnkFlt (b305f3fad35083837ef46a0bbce2fc57) C:\WINDOWS\system32\DRIVERS\nwlnkflt.sys
2010/09/23 15:54:02.0328 NwlnkFwd (c99b3415198d1aab7227f2c88fd664b9) C:\WINDOWS\system32\DRIVERS\nwlnkfwd.sys
2010/09/23 15:54:02.0500 OMCI (cec7e2c6c1fa00c7ab2f5434f848ae51) C:\WINDOWS\SYSTEM32\DRIVERS\OMCI.SYS
2010/09/23 15:54:02.0687 Parport (8fd0bdbea875d06ccf6c945ca9abaf75) C:\WINDOWS\system32\DRIVERS\parport.sys
2010/09/23 15:54:02.0875 PartMgr (beb3ba25197665d82ec7065b724171c6) C:\WINDOWS\system32\drivers\PartMgr.sys
2010/09/23 15:54:03.0046 ParVdm (9575c5630db8fb804649a6959737154c) C:\WINDOWS\system32\drivers\ParVdm.sys
2010/09/23 15:54:03.0296 PCI (043410877bda580c528f45165f7125bc) C:\WINDOWS\system32\DRIVERS\pci.sys
2010/09/23 15:54:03.0531 Pcmcia (f0406cbc60bdb0394a0e17ffb04cdd3d) C:\WINDOWS\system32\drivers\Pcmcia.sys
2010/09/23 15:54:03.0890 pfc (5903fa75200807ad739286bbf40c4904) C:\WINDOWS\system32\drivers\pfc.sys
2010/09/23 15:54:04.0078 PfModNT (2f5532f9b0f903b26847da674b4f55b2) C:\WINDOWS\System32\PfModNT.sys
2010/09/23 15:54:04.0328 PhilCam8116_XP (ecfbea72977cc8d2c11f74aa07d8e7d0) C:\WINDOWS\system32\DRIVERS\CamDrL20.sys
2010/09/23 15:54:04.0531 PptpMiniport (efeec01b1d3cf84f16ddd24d9d9d8f99) C:\WINDOWS\system32\DRIVERS\raspptp.sys
2010/09/23 15:54:04.0703 Processor (e19c9632ac828f6f214391e2bdda11cb) C:\WINDOWS\system32\DRIVERS\processr.sys
2010/09/23 15:54:04.0890 PSched (09298ec810b07e5d582cb3a3f9255424) C:\WINDOWS\system32\DRIVERS\psched.sys
2010/09/23 15:54:05.0078 Ptilink (80d317bd1c3dbc5d4fe7b1678c60cadd) C:\WINDOWS\system32\DRIVERS\ptilink.sys
2010/09/23 15:54:05.0312 pwd_2k (070eddd0e4a5be55dd590d8b30dbff22) C:\WINDOWS\system32\drivers\pwd_2k.sys
2010/09/23 15:54:05.0515 PxHelp20 (d86b4a68565e444d76457f14172c875a) C:\WINDOWS\system32\Drivers\PxHelp20.sys
2010/09/23 15:54:05.0859 RasAcd (fe0d99d6f31e4fad8159f690d68ded9c) C:\WINDOWS\system32\DRIVERS\rasacd.sys
2010/09/23 15:54:06.0046 Rasl2tp (11b4a627bc9614b885c4969bfa5ff8a6) C:\WINDOWS\system32\DRIVERS\rasl2tp.sys
2010/09/23 15:54:06.0078 RasPppoe (5bc962f2654137c9909c3d4603587dee) C:\WINDOWS\system32\DRIVERS\raspppoe.sys
2010/09/23 15:54:06.0312 Raspti (fdbb1d60066fcfbb7452fd8f9829b242) C:\WINDOWS\system32\DRIVERS\raspti.sys
2010/09/23 15:54:06.0484 Rdbss (7ad224ad1a1437fe28d89cf22b17780a) C:\WINDOWS\system32\DRIVERS\rdbss.sys
2010/09/23 15:54:06.0671 RDPCDD (4912d5b403614ce99c28420f75353332) C:\WINDOWS\system32\DRIVERS\RDPCDD.sys
2010/09/23 15:54:06.0859 RDPWD (6728e45b66f93c08f11de2e316fc70dd) C:\WINDOWS\system32\drivers\RDPWD.sys
2010/09/23 15:54:07.0046 redbook (d8eb2a7904db6c916eb5361878ddcbae) C:\WINDOWS\system32\DRIVERS\redbook.sys
2010/09/23 15:54:07.0328 ROOTMODEM (d8b0b4ade32574b2d9c5cc34dc0dbbe7) C:\WINDOWS\system32\Drivers\RootMdm.sys
2010/09/23 15:54:07.0531 RTL8023xp (47b8ea4493ebffb3d6a0e06cd03c5aba) C:\WINDOWS\system32\DRIVERS\FA311XP.SYS
2010/09/23 15:54:07.0703 rtl8139 (d507c1400284176573224903819ffda3) C:\WINDOWS\system32\DRIVERS\RTL8139.SYS
2010/09/23 15:54:07.0890 Secdrv (90a3935d05b494a5a39d37e71f09a677) C:\WINDOWS\system32\DRIVERS\secdrv.sys
2010/09/23 15:54:08.0109 serenum (0f29512ccd6bead730039fb4bd2c85ce) C:\WINDOWS\system32\DRIVERS\serenum.sys
2010/09/23 15:54:08.0484 Serial (93d313c31f7ad9ea2b75f26075413c7c) C:\WINDOWS\system32\DRIVERS\serial.sys
2010/09/23 15:54:08.0671 Sfloppy (8e6b8c671615d126fdc553d1e2de5562) C:\WINDOWS\system32\drivers\Sfloppy.sys
2010/09/23 15:54:08.0859 sfman (28b740a66cb88be3d0cd93d5664d7d88) C:\WINDOWS\system32\drivers\sfman.sys
2010/09/23 15:54:09.0078 slabbus (1b07ad8cce612ac298dd29763d579cda) C:\WINDOWS\system32\DRIVERS\slabbus.sys
2010/09/23 15:54:09.0265 slabser (4d3d895660b22fdaa48e80381870fa8d) C:\WINDOWS\system32\DRIVERS\slabser.sys
2010/09/23 15:54:09.0437 SLIP (866d538ebe33709a5c9f5c62b73b7d14) C:\WINDOWS\system32\DRIVERS\SLIP.sys
2010/09/23 15:54:09.0609 SONYPVU1 (a1eceeaa5c5e74b2499eb51d38185b84) C:\WINDOWS\system32\DRIVERS\SONYPVU1.SYS
2010/09/23 15:54:09.0796 splitter (ab8b92451ecb048a4d1de7c3ffcb4a9f) C:\WINDOWS\system32\drivers\splitter.sys
2010/09/23 15:54:09.0984 sr (39626e6dc1fb39434ec40c42722b660a) C:\WINDOWS\system32\DRIVERS\sr.sys
2010/09/23 15:54:10.0203 Srv (da852e3e0bf1cea75d756f9866241e57) C:\WINDOWS\system32\DRIVERS\srv.sys
2010/09/23 15:54:10.0406 streamip (77813007ba6265c4b6098187e6ed79d2) C:\WINDOWS\system32\DRIVERS\StreamIP.sys
2010/09/23 15:54:10.0562 swenum (3941d127aef12e93addf6fe6ee027e0f) C:\WINDOWS\system32\DRIVERS\swenum.sys
2010/09/23 15:54:10.0750 swmidi (8ce882bcc6cf8a62f2b2323d95cb3d01) C:\WINDOWS\system32\drivers\swmidi.sys
2010/09/23 15:54:10.0921 SWUSBFLT (5212178c49079e40831d95ec7596fcc7) C:\WINDOWS\system32\DRIVERS\SWUSBFLT.sys
2010/09/23 15:54:11.0343 sysaudio (8b83f3ed0f1688b4958f77cd6d2bf290) C:\WINDOWS\system32\drivers\sysaudio.sys
2010/09/23 15:54:11.0562 Tcpip (9aefa14bd6b182d61e3119fa5f436d3d) C:\WINDOWS\system32\DRIVERS\tcpip.sys
2010/09/23 15:54:11.0734 TDPIPE (6471a66807f5e104e4885f5b67349397) C:\WINDOWS\system32\drivers\TDPIPE.sys
2010/09/23 15:54:11.0890 TDTCP (c56b6d0402371cf3700eb322ef3aaf61) C:\WINDOWS\system32\drivers\TDTCP.sys
2010/09/23 15:54:12.0062 TermDD (88155247177638048422893737429d9e) C:\WINDOWS\system32\DRIVERS\termdd.sys
2010/09/23 15:54:12.0359 UdfReadr_xp (27e66e79fd742c107fdb23280e17d869) C:\WINDOWS\system32\drivers\UdfReadr_xp.sys
2010/09/23 15:54:12.0546 Udfs (5787b80c2e3c5e2f56c2a233d91fa2c9) C:\WINDOWS\system32\drivers\Udfs.sys
2010/09/23 15:54:12.0765 Update (402ddc88356b1bac0ee3dd1580c76a31) C:\WINDOWS\system32\DRIVERS\update.sys
2010/09/23 15:54:12.0984 usbaudio (e919708db44ed8543a7c017953148330) C:\WINDOWS\system32\drivers\usbaudio.sys
2010/09/23 15:54:13.0171 USBAV191 (f1964683a42155c727a60b14c702dd6a) C:\WINDOWS\system32\DRIVERS\USBAV191.SYS
2010/09/23 15:54:13.0453 usbccgp (173f317ce0db8e21322e71b7e60a27e8) C:\WINDOWS\system32\DRIVERS\usbccgp.sys
2010/09/23 15:54:13.0640 usbehci (65dcf09d0e37d4c6b11b5b0b76d470a7) C:\WINDOWS\system32\DRIVERS\usbehci.sys
2010/09/23 15:54:13.0812 usbhub (1ab3cdde553b6e064d2e754efe20285c) C:\WINDOWS\system32\DRIVERS\usbhub.sys
2010/09/23 15:54:13.0984 usbprint (a717c8721046828520c9edf31288fc00) C:\WINDOWS\system32\DRIVERS\usbprint.sys
2010/09/23 15:54:14.0203 usbscan (a0b8cf9deb1184fbdd20784a58fa75d4) C:\WINDOWS\system32\DRIVERS\usbscan.sys
2010/09/23 15:54:14.0421 USBSTOR (a32426d9b14a089eaa1d922e0c5801a9) C:\WINDOWS\system32\DRIVERS\USBSTOR.SYS
2010/09/23 15:54:14.0593 usbuhci (26496f9dee2d787fc3e61ad54821ffe6) C:\WINDOWS\system32\DRIVERS\usbuhci.sys
2010/09/23 15:54:14.0781 usb_rndisx (b6cc50279d6cd28e090a5d33244adc9a) C:\WINDOWS\system32\DRIVERS\usb8023x.sys
2010/09/23 15:54:14.0953 VgaSave (0d3a8fafceacd8b7625cd549757a7df1) C:\WINDOWS\System32\drivers\vga.sys
2010/09/23 15:54:15.0171 VolSnap (46de1126684369bace4849e4fc8c43ca) C:\WINDOWS\system32\drivers\VolSnap.sys
2010/09/23 15:54:15.0406 Wanarp (e20b95baedb550f32dd489265c1da1f6) C:\WINDOWS\system32\DRIVERS\wanarp.sys
2010/09/23 15:54:15.0593 wanusb (6691e161da092c9bf2813f14e748606a) C:\WINDOWS\system32\DRIVERS\gwausb.sys
2010/09/23 15:54:15.0796 wceusbsh (4a954a20a4c73d6db13c0fe25f3f1b0c) C:\WINDOWS\system32\DRIVERS\wceusbsh.sys
2010/09/23 15:54:16.0015 wdmaud (6768acf64b18196494413695f0c3a00f) C:\WINDOWS\system32\drivers\wdmaud.sys
2010/09/23 15:54:16.0296 WSTCODEC (c98b39829c2bbd34e454150633c62c78) C:\WINDOWS\system32\DRIVERS\WSTCODEC.SYS
2010/09/23 15:54:16.0468 WudfPf (f15feafffbb3644ccc80c5da584e6311) C:\WINDOWS\system32\DRIVERS\WudfPf.sys
2010/09/23 15:54:16.0625 WudfRd (28b524262bce6de1f7ef9f510ba3985b) C:\WINDOWS\system32\DRIVERS\wudfrd.sys
2010/09/23 15:54:16.0718 ================================================================================
2010/09/23 15:54:16.0718 Scan finished
2010/09/23 15:54:16.0718 ================================================================================
0
moment de grace Messages postés 29042 Date d'inscription samedi 6 décembre 2008 Statut Contributeur sécurité Dernière intervention 18 juillet 2013 2 274
23 sept. 2010 à 16:32
exact

pour finir


1)

* Copie tout le texte présent en gras ci-dessous ( tu le selectionnes avec ta souris / Clique droit dessus et choisis "copier" ou fait Ctrl+C )

O43 - CFD:Common File Directory ----D- C:\Program Files\SpyTrooper
O43 - CFD:Common File Directory ----D- C:\Program Files\Common Files\Companion Wizard
O81 - IFC: Internet Feature Controls [HKUS\.DEFAULT] [FEATURE_BROWSER_EMULATION] -- svchost.exe
O81 - IFC: Internet Feature Controls [HKUS\S-1-5-18] [FEATURE_BROWSER_EMULATION]



Puis Lance ZHPFix depuis le raccourci du bureau .

* Une fois l'outil ZHPFix ouvert , clique sur le bouton [ H ] ( "coller les lignes Helper" ) .

* Dans l'encadré principal tu verras donc les lignes que tu as copié précédemment apparaitrent .

Vérifie que toutes les lignes que je t'ai demandé de copier (et seulement elles) sont dans la fenêtre.



Clique sur " Ok " , puis " Tous " et enfin " Nettoyer ".

Copie/Colle le rapport à l'écran dans ton prochain message

( ce rapport est sauvegardé dans ce dossier C:\Program files\ZHPDiag\ZHPFixReport.txt )

..........................


2)

* Lancez Adobe Reader
* Cliquez sur Edition --> Préférences --> JavaScript
* Décochez "Activer Acrobat JavaScript"
* Validez

....................

3)
IMPORTANT

Purger la restauration systeme XP

http://www.bibou0007.com/windows-xp-f101/purger-la-restauration-du-systeme-sous-windows-xp-t151.htm


.................

4)

Télécharge DelFix sur ton bureau.

http://sd-1.archive-host.com/membres/up/17959594961240255/DelFix.exe

1. Lance le, tape 2 puis valide en appuyant sur [Entrée]

2. Patiente pendant le scan jusqu'à l'ouverture du rapport.

3. Copie/Colle le contenu du rapport dans ta prochaine réponse.

Note : Le rapport se trouve également sous C:\DelFixSearch

.......................................

Recommandations pour l'avenir

Tu es la meilleure protection pour ton pc que tout autre antivirus, si tu admets un minimum de rigueur dans son utilisation...Les virus sont vigilants et pénètrent ta machine par toutes les portes que tu laisseras ouvertes...
- logiciels non à jour (windows, internet explorer, java, adobe reader etc)
- installation de toolbar
- fréquentation de sites piégés
- P2P
- Application de cracks
- Supports usb

Pour t'aider dans cette tâche, voici quelques pistes

Pour naviguer sur internet plus en sécurité et à l'abri des publicités, je te conseille vivement d'installer et d'utiliser le navigateur firefox
http://www.mozilla-europe.org/fr/firefox/

Une fois que c'est fait, lances le et installe l'extension de sécurité adblock plus
pour bloquer les publicités
https://addons.mozilla.org/fr/mobile/addon/1865

............................

WOT - Extension pour ton navigateur internet :
Voici une extension à télécharger qui te permettra, en faisant tes recherches sur google, de savoir si le site proposé lors de tes recherches est un site de confiance ou un site à éviter car il pourrait infecter ton PC :
Pour Firefox : https://addons.mozilla.org/fr/firefox/addon/wot-safe-browsing-tool/
Pour internet explorer : https://chrome.google.com/webstore/detail/wot-web-of-trust-website/bhmmomiinigofkjcapegjjndpbikblnp

........................


Tu dois aussi mettre à jour tous tes autres programmes pour combler des failles de sécurité... Vérifie les mises disponibles à l'aide de ce petit programme (choisis la version sans installation) : Update Checker
https://www.commentcamarche.net/telecharger/utilitaires/9771-filehippo-app-manager/
Et particulièrement Internet explorer, même s'il n'est pas ton navigateur, car les MAJ sécurité Windows ne s'opèrent que par ce chemin là

......................................

Pour éviter une infection toolbar, il faut tout lire attentivement lorsque tu installes un programme gratuit, et décocher tous les programmes additionnels qui sont proposés, en particulier les barres d'outils !

..........................

Vaccines tes disques amovibles à l'aide de USBFix (de Chiquitine29 et C_XX)
http://pagesperso-orange.fr/NosTools/Chiquitine29/UsbFix.exe
Au menu principal, choisis l'option 3 (Vaccination).

explications ici https://forum.malekal.com/viewtopic.php?t=5544&start=
............................

garder Malwarebytes et faire un examen de temps en temps ton PC, avec mise à jour avant chaque scan
.......................


Télécharge et installe CCleaner (N'installe pas la Yahoo Toolbar) :
https://www.commentcamarche.net/telecharger/utilitaires/5647-ccleaner/

* Lance-le.(clic droit "en tant qu'administrateur" pour Vista) Va dans Options puis Avancé et décoche la case Effacer uniquement les fichiers etc....
* Va dans Nettoyeur, choisis Analyse. Une fois terminé, lance le nettoyage.
* Ensuite, choisis Registre, puis Chercher des erreurs. Une fois terminé, répare toutes les erreurs tant de fois qu il en trouve a l analyse

..........................
utilitaire pour défragmenter , utilises pour ce faire Defraggler https://www.clubic.com/telecharger-fiche44314-defraggler.html

........................
A lire pour mieux comprendre l'environnement qui t'entoure
http://assiste.com.free.fr/p/abc/a/zombies_et_botnets.html
https://www.malekal.com/fichiers/projetantimalwares/ProjetAntiMalware-courte.pdf

http://www.libellules.ch/...





0
Speedcolibri Messages postés 15 Date d'inscription samedi 20 janvier 2007 Statut Membre Dernière intervention 30 septembre 2010
30 sept. 2010 à 18:45
Salut;

Merci pour les infos.

Je suis actuellement en déplacement à l'étranger.

J'effectuerais ces applications à mon retour.

@+

Speedcolibri
0
moment de grace Messages postés 29042 Date d'inscription samedi 6 décembre 2008 Statut Contributeur sécurité Dernière intervention 18 juillet 2013 2 274
Modifié par moment de grace le 30/09/2010 à 18:47
c'est noté

bon voyage, en attendant ton retour..
0