Re sos virus valera1 cheval de troie

Résolu
pascalefrugier Messages postés 15 Date d'inscription   Statut Membre Dernière intervention   -  
philae83 Messages postés 12837 Date d'inscription   Statut Contributeur sécurité Dernière intervention   -
Bonjour,
Re bonjour,
> j'ai fait à plusieurs reprises l'analyse de AVG antispyware 7.5 et
voici le rapport:

> AVG Anti-Spyware - Rapport d'analyse
> ---------------------------------------------------------
> + Créé à: 11:11:01 27/09/2007
> + Résultat de l'analyse:
>
> C:\Program Files\Altnet -> Adware.Altnet : Ignoré.
> C:\Program Files\Altnet\My Altnet Shares -> Adware.Altnet : Ignoré.
> C:\Program Files\Altnet\My Altnet Shares\Bullguard Protection ->
Adware.Altnet : Ignoré.
> C:\Program Files\Altnet\My Altnet Shares\Bullguard
Protection\ceva_dll.cab -> Adware.Altnet : Ignoré.
> C:\Program Files\Altnet\My Altnet Shares\Bullguard
Protection\ceva_dll.cvd.cab -> Adware.Altnet : Ignoré.
> C:\Program Files\Altnet\My Altnet Shares\Bullguard
Protection\ceva_emu.cvd.cab -> Adware.Altnet : Ignoré.
> C:\Program Files\Altnet\My Altnet Shares\Bullguard
Protection\ceva_vfs.cab -> Adware.Altnet : Ignoré.
> C:\Program Files\Altnet\My Altnet Shares\Bullguard
Protection\ceva_vfs.cvd.cab -> Adware.Altnet : Ignoré.
> C:\Program Files\Altnet\My Altnet Shares\Bullguard
Protection\cevakrnl.cab -> Adware.Altnet : Ignoré.
> C:\Program Files\Altnet\My Altnet Shares\Bullguard
Protection\cevakrnl.ivd.cab -> Adware.Altnet : Ignoré.
> C:\Program Files\Altnet\My Altnet Shares\Bullguard
Protection\cevakrnl.rvd.cab -> Adware.Altnet : Ignoré.
> C:\Program Files\Altnet\My Altnet Shares\Bullguard
Protection\cevakrnl.xmd.cab -> Adware.Altnet : Ignoré.
> C:\Program Files\Altnet\My Altnet Shares\Bullguard
Protection\cran.cab -> Adware.Altnet : Ignoré.
> C:\Program Files\Altnet\My Altnet Shares\Bullguard
Protection\cran.cvd.cab -> Adware.Altnet : Ignoré.
> C:\Program Files\Altnet\My Altnet Shares\Bullguard
Protection\cran.ivd.cab -> Adware.Altnet : Ignoré.
> C:\Program Files\Altnet\My Altnet Shares\Bullguard
Protection\e_spyw.ivd.cab -> Adware.Altnet : Ignoré.
> C:\Program Files\Altnet\My Altnet Shares\Bullguard
Protection\emalware.cab -> Adware.Altnet : Ignoré.
> C:\Program Files\Altnet\My Altnet Shares\Bullguard
Protection\emalware.ivd.cab -> Adware.Altnet : Ignoré.
> C:\Program Files\Altnet\My Altnet Shares\Bullguard
Protection\html.cab -> Adware.Altnet : Ignoré.
> C:\Program Files\Altnet\My Altnet Shares\Bullguard
Protection\html.xmd.cab -> Adware.Altnet : Ignoré.
> C:\Program Files\Altnet\My Altnet Shares\Bullguard
Protection\java.cvd.cab -> Adware.Altnet : Ignoré.
> C:\Program Files\Altnet\My Altnet Shares\Bullguard
Protection\jpeg.cab -> Adware.Altnet : Ignoré.
> C:\Program Files\Altnet\My Altnet Shares\Bullguard
Protection\jpeg.xmd.cab -> Adware.Altnet : Ignoré.
> C:\Program Files\Altnet\My Altnet Shares\Bullguard
Protection\mdx_97.cab -> Adware.Altnet : Ignoré.
> C:\Program Files\Altnet\My Altnet Shares\Bullguard
Protection\mdx_97.ivd.cab -> Adware.Altnet : Ignoré.
> C:\Program Files\Altnet\My Altnet Shares\Bullguard
Protection\mdx_w95.cvd.cab -> Adware.Altnet : Ignoré.
> C:\Program Files\Altnet\My Altnet Shares\Bullguard
Protection\mdx_x95.cvd.cab -> Adware.Altnet : Ignoré.
> C:\Program Files\Altnet\My Altnet Shares\Bullguard
Protection\mdx_xf.cvd.cab -> Adware.Altnet : Ignoré.
> C:\Program Files\Altnet\My Altnet Shares\Bullguard
Protection\mime.xmd.cab -> Adware.Altnet : Ignoré.
> C:\Program Files\Altnet\My Altnet Shares\Bullguard
Protection\nelf.cab -> Adware.Altnet : Ignoré.
> C:\Program Files\Altnet\My Altnet Shares\Bullguard
Protection\nelf.cvd.cab -> Adware.Altnet : Ignoré.
> C:\Program Files\Altnet\My Altnet Shares\Bullguard
Protection\nsis.cab -> Adware.Altnet : Ignoré.
> C:\Program Files\Altnet\My Altnet Shares\Bullguard
Protection\nsis.xmd.cab -> Adware.Altnet : Ignoré.
> C:\Program Files\Altnet\My Altnet Shares\Bullguard
Protection\plugins.cab -> Adware.Altnet : Ignoré.
> C:\Program Files\Altnet\My Altnet Shares\Bullguard
Protection\plugins.cab.cab -> Adware.Altnet : Ignoré.
> C:\Program Files\Altnet\My Altnet Shares\Bullguard
Protection\plugins.cab.cab (incomplete) -> Adware.Altnet : Ignoré.
> C:\Program Files\Altnet\My Altnet Shares\Bullguard
Protection\rar.xmd.cab -> Adware.Altnet : Ignoré.
> C:\Program Files\Altnet\My Altnet Shares\Bullguard Protection\rup.cab
-> Adware.Altnet : Ignoré.
> C:\Program Files\Altnet\My Altnet Shares\Bullguard
Protection\rup.cvd.cab -> Adware.Altnet : Ignoré.
> C:\Program Files\Altnet\My Altnet Shares\Bullguard
Protection\rup.xmd.cab -> Adware.Altnet : Ignoré.
> C:\Program Files\Altnet\My Altnet Shares\Bullguard Protection\sdx.cab
-> Adware.Altnet : Ignoré.
> C:\Program Files\Altnet\My Altnet Shares\Bullguard
Protection\sdx.ivd.cab -> Adware.Altnet : Ignoré.
> C:\Program Files\Altnet\My Altnet Shares\Bullguard
Protection\sdx.xmd.cab -> Adware.Altnet : Ignoré.
> C:\Program Files\Altnet\My Altnet Shares\Bullguard
Protection\unpack.cab -> Adware.Altnet : Ignoré.
> C:\Program Files\Altnet\My Altnet Shares\Bullguard
Protection\unpack.cvd.cab -> Adware.Altnet : Ignoré.
> C:\Program Files\Altnet\My Altnet Shares\Bullguard
Protection\unpack.ivd.cab -> Adware.Altnet : Ignoré.
> C:\Program Files\Altnet\My Altnet Shares\Bullguard Protection\ve.cab
-> Adware.Altnet : Ignoré.
> C:\Program Files\Altnet\My Altnet Shares\Bullguard
Protection\ve.cvd.cab -> Adware.Altnet : Ignoré.
> C:\Program Files\Altnet\My Altnet Shares\Bullguard
Protection\ve.xmd.cab -> Adware.Altnet : Ignoré.
> HKLM\SOFTWARE\Classes\ADM25.ADM25 -> Adware.Altnet : Ignoré.
> HKLM\SOFTWARE\Classes\ADM25.ADM25\CurVer -> Adware.Altnet : Ignoré.
> HKLM\SOFTWARE\Classes\ADM4.ADM4 -> Adware.Altnet : Ignoré.
> HKLM\SOFTWARE\Classes\ADM4.ADM4\CurVer -> Adware.Altnet : Ignoré.
> HKLM\SOFTWARE\Classes\AppID\Altnet Signing Module.EXE ->
Adware.Altnet : Ignoré.
> HKLM\SOFTWARE\Classes\AppID\adm.EXE -> Adware.Altnet : Ignoré.
> HKLM\SOFTWARE\Cydoor -> Adware.Cydoor : Ignoré.
> HKU\S-1-5-21-677485609-1449655655-3289834387-1007\Software\Cydoor ->
Adware.Cydoor : Ignoré.
> C:\Documents and Settings\All Users\Application Data\Log\1004.exe ->
Adware.FastFind : Ignoré.
> HKLM\SOFTWARE\Classes\CLSID\{3E4563A4-2A9B-4912-BE38-906A0CB702CC} ->
Adware.FastFind : Ignoré.
> HKLM\SOFTWARE\Classes\CLSID\{EEBA788A-C268-492A-B7FE-42C2B6C553D4} ->
Adware.FastFind : Ignoré.
> C:\Documents and Settings\All Users\Application Data\Bin\bin.dll ->
Adware.MediaBack : Ignoré.
> C:\Documents and Settings\All Users\Application Data\Log\log.dll ->
Adware.MediaBack : Ignoré.
> C:\Documents and Settings\All Users\Application Data\Tools\tools.dll
-> Adware.MediaBack : Ignoré.
> HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser
Helper Objects\{59879FA4-4790-461c-A1CC-4EC4DE4CA483} -> Adware.RXToolbar :
Ignoré.
>
HKU\S-1-5-21-677485609-1449655655-3289834387-1007\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{59879FA4-4790-461C-A1CC-4EC4DE4CA483}
-> Adware.RXToolbar : Ignoré.
> HKU\S-1-5-21-677485609-1449655655-3289834387-1007\Software\Surfairy
-> Adware.Surfairy : Ignoré.
> C:\Documents and Settings\JEAN PAUL\Local Settings\Temporary Internet
Files\Content.IE5\EJRMG8W0\installdrivecleanerstart_fr[1].exe ->
Adware.WinFixer : Ignoré.
> C:\Documents and Settings\All Users\Application Data\Setup\Setup.dll
-> Hijacker.StartPage.ku : Nettoyé et sauvegardé (mise en quarantaine).
> C:\Documents and Settings\JEAN
PAUL\Cookies\jean_paul@advertising[2].txt -> TrackingCookie.Advertising : Nettoyé.
> C:\Documents and Settings\JEAN
PAUL\Cookies\jean_paul@doubleclick[1].txt -> TrackingCookie.Doubleclick : Nettoyé.
> C:\Documents and Settings\JEAN
PAUL\Cookies\jean_paul@doubleclick[3].txt -> TrackingCookie.Doubleclick : Nettoyé.
> C:\Documents and Settings\JEAN
PAUL\Cookies\jean_paul@mediaplex[1].txt -> TrackingCookie.Mediaplex : Nettoyé.
> C:\Documents and Settings\JEAN
PAUL\Cookies\jean_paul@mediaplex[2].txt -> TrackingCookie.Mediaplex : Nettoyé.
> C:\Documents and Settings\JEAN
PAUL\Cookies\jean_paul@need2find[2].txt -> TrackingCookie.Need2find : Nettoyé.
> C:\Documents and Settings\JEAN
PAUL\Cookies\jean_paul@ssl-hints.netflame[2].txt -> TrackingCookie.Netflame :
Nettoyé.
> C:\Documents and Settings\JEAN
PAUL\Cookies\jean_paul@stats1.reliablestats[1].txt -> TrackingCookie.Reliablestats :
Nettoyé.
> C:\Documents and Settings\JEAN
PAUL\Cookies\jean_paul@smartadserver[1].txt -> TrackingCookie.Smartadserver : Nettoyé.
> [1568] C:\WINDOWS\system32\osfodlqf.exe -> Trojan.Agent.aoy : Nettoyé
et sauvegardé (mise en quarantaine).
> C:\Documents and Settings\All Users\Application Data\root\root.dll ->
Trojan.IEService : Nettoyé et sauvegardé (mise en quarantaine).
> [1456] C:\DOCUME~1\ALLUSE~1\APPLIC~1\root\root.dll ->
Trojan.IEService : Nettoyé et sauvegardé (mise en quarantaine).
>
> Fin du rapport
>


> Comme je n' y connais rien je ne suis pas sure que les virus aient
dispau puisque quand je relance une analyse en espérant rien à signaler
il continue de trouver des trucs pas clairs!
> Merci pour toute l'aide que vous pourrez m'apporter.
> Pascale
A voir également:

88 réponses

pascalefrugier
 
Bonjour,
re je suis désepérée cette fois; il faut que tu saches (mais tu as dû t'en rendre compte) que je découvre complètement tous ces hijack bitdefender... Aussi, j'ai relancé un hijack mais...il semble que se soit le même que la première fois; faut il retélécharger hijack? quoi faire?? je suis perdue et le mot est faible d'autant que le virus valera1 prend je crois de l'ampleur car l'ordi s'emballe: l'écran s'éteind d'un seul coup, la soouris parfois ne repond plus....
Je ne sais quoi faire et j'appelle à l'aide
Pascale
0
philae83 Messages postés 12837 Date d'inscription   Statut Contributeur sécurité Dernière intervention   206
 
bonjour,

pour hijackthis, tu dis que c'est le même que la dernière fois, mais la date en haut lorsque tu as le bloc note d'ouvert il te donne quelle date ?

0
pascalefrugier
 
Bonjour,
re voila ce qu'il me donne comme moi ça ne me dit rien peut etre est ce ça dont tu as besoin?
Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 11:07:06, on 08/10/2007
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v7.00 (7.00.6000.16512)
Boot mode: Normal

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\Apps\ActivBoard\nhksrv.exe
C:\WINDOWS\System32\drivers\CDAC11BA.EXE
C:\WINDOWS\system32\DRIVERS\CDANTSRV.EXE
C:\Program Files\Roxio\GoBack\GBPoll.exe
C:\Program Files\Network Associates\Common Framework\FrameworkService.exe
C:\Program Files\Network Associates\VirusScan\Mcshield.exe
C:\Program Files\Network Associates\VirusScan\VsTskMgr.exe
C:\Program Files\Fichiers communs\Microsoft Shared\VS7Debug\mdm.exe
C:\WINDOWS\System32\nvsvc32.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\System32\svchost.exe
C:\Program Files\Virtual CD v4 SDK\system\vcssecs.exe
C:\WINDOWS\system32\fxssvc.exe
C:\WINDOWS\SOUNDMAN.EXE
C:\PROGRA~1\MOUSEW~1\SYSTEM\EM_EXEC.EXE
C:\Apps\ActivBoard\MMKeybd.exe
C:\Program Files\Virtual CD v4 SDK\system\vcsplay.exe
C:\apps\ActivSurf\4448364\Program\backweb-4448364.exe
C:\Program Files\Real\RealPlayer\RealPlay.exe
C:\Program Files\Java\jre1.5.0_03\bin\jusched.exe
C:\Program Files\Logitech\Video\LogiTray.exe
C:\WINDOWS\system32\LVCOMSX.EXE
C:\Program Files\Network Associates\VirusScan\SHSTAT.EXE
C:\Program Files\Network Associates\Common Framework\UpdaterUI.exe
C:\Program Files\Fichiers communs\Network Associates\TalkBack\TBMon.exe
C:\Program Files\QuickTime\qttask.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\MSN Messenger\MsnMsgr.Exe
C:\Program Files\Ulead Systems\Ulead Photo Express 4.0 SE\CalCheck.exe
C:\Program Files\Logitech\Video\FxSvr2.exe
C:\Program Files\SAGEM\SAGEM F@st800\dslmon.exe
C:\Apps\ActivBoard\TrayMon.exe
C:\Apps\ActivBoard\OSD.exe
C:\Program Files\HP\Digital Imaging\bin\hpqtra08.exe
C:\Program Files\HP\Digital Imaging\bin\hpqimzone.exe
C:\Program Files\HP\Digital Imaging\bin\hpqSTE08.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Program Files\Adobe\Acrobat 7.0\Reader\AcroRd32.exe
C:\Program Files\Trend Micro\HijackThis\HijackThis.exe

R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = https://fr.yahoo.com/
R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyServer = http=proxy.club-internet.fr:8080
R3 - URLSearchHook: (no name) - {BE89472C-B803-4D1D-9A9A-0A63660E0FE3} - C:\PROGRA~1\COPERN~1\COPERN~1.DLL
O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE C:\WINDOWS\System32\NvCpl.dll,NvStartup
O4 - HKLM\..\Run: [SoundMan] SOUNDMAN.EXE
O4 - HKLM\..\Run: [EM_EXEC] C:\PROGRA~1\MOUSEW~1\SYSTEM\EM_EXEC.EXE
O4 - HKLM\..\Run: [ACTIVBOARD] C:\Apps\ActivBoard\MMKeybd.exe
O4 - HKLM\..\Run: [VCSPlayer] "C:\Program Files\Virtual CD v4 SDK\system\vcsplay.exe"
O4 - HKLM\..\Run: [ActivSurf] C:\apps\ActivSurf\4448364\Program\backweb-4448364.exe
O4 - HKLM\..\Run: [RealTray] C:\Program Files\Real\RealPlayer\RealPlay.exe SYSTEMBOOTHIDEPLAYER
O4 - HKLM\..\Run: [SunJavaUpdateSched] C:\Program Files\Java\jre1.5.0_03\bin\jusched.exe
O4 - HKLM\..\Run: [LogitechVideoRepair] C:\Program Files\Logitech\Video\ISStart.exe
O4 - HKLM\..\Run: [LogitechVideoTray] C:\Program Files\Logitech\Video\LogiTray.exe
O4 - HKLM\..\Run: [LVCOMSX] C:\WINDOWS\system32\LVCOMSX.EXE
O4 - HKLM\..\Run: [ShStatEXE] "C:\Program Files\Network Associates\VirusScan\SHSTAT.EXE" /STANDALONE
O4 - HKLM\..\Run: [McAfeeUpdaterUI] "C:\Program Files\Network Associates\Common Framework\UpdaterUI.exe" /StartedFromRunKey
O4 - HKLM\..\Run: [Network Associates Error Reporting Service] "C:\Program Files\Fichiers communs\Network Associates\TalkBack\TBMon.exe"
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
O4 - HKLM\..\Run: [SearchIndexer] rundll32.exe "C:\WINDOWS\system32\dlhfgaul.dll",sitypnow
O4 - HKCU\..\Run: [Update Service] C:\PROGRA~1\FICHIE~1\TEKNUM~1\update.exe /startup
O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
O4 - HKCU\..\Run: [MsnMsgr] "C:\Program Files\MSN Messenger\MsnMsgr.Exe" /background
O4 - HKCU\..\Run: [NBJ] "C:\Program Files\Ahead\Nero BackItUp\NBJ.exe"
O4 - HKUS\S-1-5-18\..\Run: [CTFMON.EXE] C:\WINDOWS\System32\CTFMON.EXE (User 'SYSTEM')
O4 - HKUS\.DEFAULT\..\Run: [CTFMON.EXE] C:\WINDOWS\System32\CTFMON.EXE (User 'Default user')
O4 - Global Startup: Adobe Gamma Loader.lnk = ?
O4 - Global Startup: Contrôleur de calendrier Ulead.lnk = C:\Program Files\Ulead Systems\Ulead Photo Express 4.0 SE\CalCheck.exe
O4 - Global Startup: DSLMON.lnk = ?
O4 - Global Startup: Démarrage rapide du logiciel HP Image Zone.lnk = C:\Program Files\HP\Digital Imaging\bin\hpqthb08.exe
O4 - Global Startup: GoBack.lnk = C:\Program Files\Roxio\GoBack\GBTray.exe
O4 - Global Startup: HP Digital Imaging Monitor.lnk = C:\Program Files\HP\Digital Imaging\bin\hpqtra08.exe
O8 - Extra context menu item: &Google Search - res://C:\Program Files\Google\GoogleToolbar1.dll/cmsearch.html
O8 - Extra context menu item: &Search - http://kt.bar.need2find.com/KT/menusearch.html?p=KT
O8 - Extra context menu item: &Translate English Word - res://C:\Program Files\Google\GoogleToolbar1.dll/cmwordtrans.html
O8 - Extra context menu item: Backward Links - res://C:\Program Files\Google\GoogleToolbar1.dll/cmbacklinks.html
O8 - Extra context menu item: Cached Snapshot of Page - res://C:\Program Files\Google\GoogleToolbar1.dll/cmcache.html
O8 - Extra context menu item: Chercher avec Copernic Agent - res://C:\Program Files\Copernic Agent\CopernicAgentExt.rdl/INTEGRATION_MENU_SEARCHEXT
O8 - Extra context menu item: Similar Pages - res://C:\Program Files\Google\GoogleToolbar1.dll/cmsimilar.html
O8 - Extra context menu item: Translate Page into English - res://C:\Program Files\Google\GoogleToolbar1.dll/cmtrans.html
O9 - Extra button: (no name) - {193B17B0-7C9F-4D5B-AEAB-8D3605EFC084} - C:\PROGRA~1\COPERN~1\COPERN~1.EXE
O9 - Extra 'Tools' menuitem: Démarrer Copernic Agent - {193B17B0-7C9F-4D5B-AEAB-8D3605EFC084} - C:\PROGRA~1\COPERN~1\COPERN~1.EXE
O9 - Extra button: Packard Bell - {1D49B7D4-524D-4ac9-BC34-B4822CAE4BB1} - C:\Apps\IECustom\script.htm
O9 - Extra button: Copernic Agent - {688DC797-DC11-46A7-9F1B-445F4F58CE6E} - C:\PROGRA~1\COPERN~1\COPERN~1.EXE
O9 - Extra button: Skype - {77BF5300-1474-4EC7-9980-D32B190E9B07} - C:\PROGRA~1\Skype\Phone\IEPlugin\SKYPEI~1.DLL
O9 - Extra button: (no name) - {85d1f590-48f4-11d9-9669-0800200c9a66} - C:\WINDOWS\bdoscandel.exe
O9 - Extra 'Tools' menuitem: Uninstall BitDefender Online Scanner v8 - {85d1f590-48f4-11d9-9669-0800200c9a66} - C:\WINDOWS\bdoscandel.exe
O9 - Extra button: Real.com - {CD67F990-D8E9-11d2-98FE-00C0F0318AFE} - C:\WINDOWS\System32\Shdocvw.dll
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O16 - DPF: {5D86DDB5-BDF9-441B-9E9E-D4730F4EE499} (BDSCANONLINE Control) - http://www.bitdefender.fr/scan_fr/scan8/oscan8.cab
O17 - HKLM\System\CCS\Services\Tcpip\..\{331EA7FA-D686-47B5-A520-A9EAF320F8B8}: NameServer = 200.88.127.22,196.3.5.132
O18 - Protocol: skype4com - {FFC8B962-9B40-4DFF-9458-1830C7DD7F5D} - C:\PROGRA~1\FICHIE~1\Skype\SKYPE4~1.DLL
O18 - Filter: application/xhtml+xml; charset=iso-8859-1 - {32F66A26-7614-11D4-BD11-00104BD3F987} - C:\Program Files\Design Science\MathPlayer\MathMLMimer.dll
O18 - Filter: application/xhtml+xml; charset=utf-8 - {32F66A26-7614-11D4-BD11-00104BD3F987} - C:\Program Files\Design Science\MathPlayer\MathMLMimer.dll
O18 - Filter hijack: text/html - {2AB289AE-4B90-4281-B2AE-1F4BB034B647} - (no file)
O18 - Filter: text/xml; charset=iso-8859-1 - {32F66A26-7614-11D4-BD11-00104BD3F987} - C:\Program Files\Design Science\MathPlayer\MathMLMimer.dll
O18 - Filter: text/xml; charset=utf-8 - {32F66A26-7614-11D4-BD11-00104BD3F987} - C:\Program Files\Design Science\MathPlayer\MathMLMimer.dll
O23 - Service: C-DillaCdaC11BA - C-Dilla Ltd - C:\WINDOWS\System32\drivers\CDAC11BA.EXE
O23 - Service: C-DillaSrv - C-Dilla Ltd - C:\WINDOWS\system32\DRIVERS\CDANTSRV.EXE
O23 - Service: DomainService - Unknown owner - C:\WINDOWS\system32\osfodlqf.exe (file missing)
O23 - Service: GBPoll - Roxio, Inc. - C:\Program Files\Roxio\GoBack\GBPoll.exe
O23 - Service: Service Framework McAfee (McAfeeFramework) - Network Associates, Inc. - C:\Program Files\Network Associates\Common Framework\FrameworkService.exe
O23 - Service: Network Associates McShield (McShield) - Network Associates, Inc. - C:\Program Files\Network Associates\VirusScan\Mcshield.exe
O23 - Service: Network Associates Task Manager (McTaskManager) - Network Associates, Inc. - C:\Program Files\Network Associates\VirusScan\VsTskMgr.exe
O23 - Service: Netropa NHK Server (nhksrv) - Unknown owner - C:\Apps\ActivBoard\nhksrv.exe
O23 - Service: NVIDIA Driver Helper Service (NVSvc) - NVIDIA Corporation - C:\WINDOWS\System32\nvsvc32.exe
O23 - Service: Pml Driver HPZ12 - HP - C:\WINDOWS\system32\HPZipm12.exe
O23 - Service: SmartLinkService (SLService) - Smart Link - C:\WINDOWS\SYSTEM32\slserv.exe
O23 - Service: Virtual CD v4 Security service (SDK - Version) (VCSSecS) - H+H Software GmbH - C:\Program Files\Virtual CD v4 SDK\system\vcssecs.exe
0
philae83 Messages postés 12837 Date d'inscription   Statut Contributeur sécurité Dernière intervention   206
 
re

* Télécharge VirtumundoBeGone sur ton bureau .
http://secured2k.home.comcast.net/tools/VirtumundoBeGone.exe
* double-clic sur VirtumundoBeGone.exe

* Suis les instructions à l'écran

* Quand le scan est terminé, enregistre le rapport.

* Copie/Colle le ici

relance également vundo stp

* Double-clique VundoFix.exe afin de le lancer

* Clique sur le bouton Scan for Vundo

* Lorsque le scan est complété, clique sur le bouton Remove Vundo

* Une invite te demandera si tu veux supprimer les fichiers, clique YES

* Après avoir cliqué "Yes", le Bureau disparaîtra un moment lors de la suppression des fichiers

* Tu verras une invite qui t'annonce que ton PC va redémarrer; clique OK

* Copie/colle le contenu du rapport situé dans C:\vundofix.txt

ainsi qu'un nouveau rapport hijackthis

0

Vous n’avez pas trouvé la réponse que vous recherchez ?

Posez votre question
philae83 Messages postés 12837 Date d'inscription   Statut Contributeur sécurité Dernière intervention   206
 
je voudrais également que tu dises si tu as accès à :

démarrer------------exécuter
0
pascalefrugier
 
Bonjour,
RE excuse moi si je mets du temps mais internet deconne tellemnt que je ne parvenais pas ouvrir vundofix pour te donner le rapport... je t'envois pour l'instant le resultat de virtumundo ci joint :
[10/08/2007, 14:05:56] - VirtumundoBeGone v1.5 ( "C:\Documents and Settings\JEAN PAUL\Local Settings\Temporary Internet Files\Content.IE5\V2J8BEC5\VirtumundoBeGone[1].exe" )
[10/08/2007, 14:06:10] - Detected System Information:
[10/08/2007, 14:06:10] - Windows Version: 5.1.2600, Service Pack 2
[10/08/2007, 14:06:10] - Current Username: JEAN PAUL (Admin)
[10/08/2007, 14:06:10] - Windows is in NORMAL mode.
[10/08/2007, 14:06:10] - Searching for Browser Helper Objects:
[10/08/2007, 14:06:10] - BHO 1: {02478D38-C3F9-4EFB-9B51-7695ECA05670} (Yahoo! Toolbar Helper)
[10/08/2007, 14:06:10] - BHO 2: {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} (Adobe PDF Reader Link Helper)
[10/08/2007, 14:06:10] - BHO 3: {11072A3D-7C40-4A35-A716-26A0EEA71233} ()
[10/08/2007, 14:06:10] - WARNING: BHO has no default name. Checking for Winlogon reference.
[10/08/2007, 14:06:10] - Checking for HKLM\...\Winlogon\Notify\awtqq
[10/08/2007, 14:06:10] - Key not found: HKLM\...\Winlogon\Notify\awtqq, continuing.
[10/08/2007, 14:06:10] - BHO 4: {22BF413B-C6D2-4d91-82A9-A0F997BA588C} (Skype add-on (mastermind))
[10/08/2007, 14:06:10] - BHO 5: {4D1C4E81-A32A-416b-BCDB-33B3EF3617D3} (Need2Find Bar BHO)
[10/08/2007, 14:06:10] - BHO 6: {4E7BD74F-2B8D-469E-90F0-F66AB581A933} ()
[10/08/2007, 14:06:10] - WARNING: BHO has no default name. Checking for Winlogon reference.
[10/08/2007, 14:06:10] - No filename found. Continuing.
[10/08/2007, 14:06:10] - BHO 7: {733E9132-53CA-4C97-9AC9-145C4502FA20} ()
[10/08/2007, 14:06:10] - WARNING: BHO has no default name. Checking for Winlogon reference.
[10/08/2007, 14:06:10] - Checking for HKLM\...\Winlogon\Notify\iifdbyv
[10/08/2007, 14:06:10] - Found: HKLM\...\Winlogon\Notify\iifdbyv - This is probably Virtumundo.
[10/08/2007, 14:06:10] - Assigning {733E9132-53CA-4C97-9AC9-145C4502FA20} MSEvents Object
[10/08/2007, 14:06:10] - BHO list has been changed! Starting over...
[10/08/2007, 14:06:10] - BHO 1: {02478D38-C3F9-4EFB-9B51-7695ECA05670} (Yahoo! Toolbar Helper)
[10/08/2007, 14:06:10] - BHO 2: {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} (Adobe PDF Reader Link Helper)
[10/08/2007, 14:06:10] - BHO 3: {11072A3D-7C40-4A35-A716-26A0EEA71233} ()
[10/08/2007, 14:06:11] - WARNING: BHO has no default name. Checking for Winlogon reference.
[10/08/2007, 14:06:11] - Checking for HKLM\...\Winlogon\Notify\awtqq
[10/08/2007, 14:06:11] - Key not found: HKLM\...\Winlogon\Notify\awtqq, continuing.
[10/08/2007, 14:06:11] - BHO 4: {22BF413B-C6D2-4d91-82A9-A0F997BA588C} (Skype add-on (mastermind))
[10/08/2007, 14:06:11] - BHO 5: {4D1C4E81-A32A-416b-BCDB-33B3EF3617D3} (Need2Find Bar BHO)
[10/08/2007, 14:06:11] - BHO 6: {4E7BD74F-2B8D-469E-90F0-F66AB581A933} ()
[10/08/2007, 14:06:11] - WARNING: BHO has no default name. Checking for Winlogon reference.
[10/08/2007, 14:06:11] - No filename found. Continuing.
[10/08/2007, 14:06:11] - BHO 7: {733E9132-53CA-4C97-9AC9-145C4502FA20} (MSEvents Object)
[10/08/2007, 14:06:11] - ALERT: Found MSEvents Object!
[10/08/2007, 14:06:11] - BHO 8: {7E853D72-626A-48EC-A868-BA8D5E23E045} ()
[10/08/2007, 14:06:11] - WARNING: BHO has no default name. Checking for Winlogon reference.
[10/08/2007, 14:06:11] - No filename found. Continuing.
[10/08/2007, 14:06:11] - BHO 9: {9030D464-4C02-4ABF-8ECC-5164760863C6} (Windows Live Sign-in Helper)
[10/08/2007, 14:06:11] - BHO 10: {AA58ED58-01DD-4d91-8333-CF10577473F7} (Google Toolbar Helper)
[10/08/2007, 14:06:11] - BHO 11: {BB9AAAF3-4F8D-48B5-A565-FF3E58433DC2} (SurfairyBHO Class)
[10/08/2007, 14:06:11] - BHO 12: {CF46BFB3-2ACC-441b-B82B-36B9562C7FF1} ()
[10/08/2007, 14:06:11] - WARNING: BHO has no default name. Checking for Winlogon reference.
[10/08/2007, 14:06:11] - Checking for HKLM\...\Winlogon\Notify\qidovhdo
[10/08/2007, 14:06:11] - Key not found: HKLM\...\Winlogon\Notify\qidovhdo, continuing.
[10/08/2007, 14:06:11] - Finished Searching Browser Helper Objects
[10/08/2007, 14:06:11] - *** Detected MSEvents Object
[10/08/2007, 14:06:11] - Trying to remove MSEvents Object...
[10/08/2007, 14:06:12] - Terminating Process: IEXPLORE.EXE
[10/08/2007, 14:06:12] - Terminating Process: RUNDLL32.EXE
[10/08/2007, 14:06:12] - Disabling Automatic Shell Restart
[10/08/2007, 14:06:12] - Terminating Process: EXPLORER.EXE
[10/08/2007, 14:06:13] - Suspending the NT Session Manager System Service
[10/08/2007, 14:06:13] - Terminating Windows NT Logon/Logoff Manager
[10/08/2007, 14:06:13] - Re-enabling Automatic Shell Restart
[10/08/2007, 14:06:13] - File to disable: C:\WINDOWS\system32\iifdbyv.dll
[10/08/2007, 14:06:13] - Renaming C:\WINDOWS\system32\iifdbyv.dll -> C:\WINDOWS\system32\iifdbyv.dll.vir
[10/08/2007, 14:06:14] - File successfully renamed!
[10/08/2007, 14:06:14] - Removing HKLM\...\Browser Helper Objects\{733E9132-53CA-4C97-9AC9-145C4502FA20}
[10/08/2007, 14:06:14] - Removing HKCR\CLSID\{733E9132-53CA-4C97-9AC9-145C4502FA20}
[10/08/2007, 14:06:14] - Adding Kill Bit for ActiveX for GUID: {733E9132-53CA-4C97-9AC9-145C4502FA20}
[10/08/2007, 14:06:14] - Deleting ATLEvents/MSEvents Registry entries
[10/08/2007, 14:06:14] - Removing HKLM\...\Winlogon\Notify\iifdbyv
[10/08/2007, 14:06:14] - Searching for Browser Helper Objects:
[10/08/2007, 14:06:14] - BHO 1: {02478D38-C3F9-4EFB-9B51-7695ECA05670} (Yahoo! Toolbar Helper)
[10/08/2007, 14:06:14] - BHO 2: {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} (Adobe PDF Reader Link Helper)
[10/08/2007, 14:06:14] - BHO 3: {11072A3D-7C40-4A35-A716-26A0EEA71233} ()
[10/08/2007, 14:06:14] - WARNING: BHO has no default name. Checking for Winlogon reference.
[10/08/2007, 14:06:14] - Checking for HKLM\...\Winlogon\Notify\awtqq
[10/08/2007, 14:06:14] - Key not found: HKLM\...\Winlogon\Notify\awtqq, continuing.
[10/08/2007, 14:06:14] - BHO 4: {22BF413B-C6D2-4d91-82A9-A0F997BA588C} (Skype add-on (mastermind))
[10/08/2007, 14:06:14] - BHO 5: {4D1C4E81-A32A-416b-BCDB-33B3EF3617D3} (Need2Find Bar BHO)
[10/08/2007, 14:06:15] - BHO 6: {4E7BD74F-2B8D-469E-90F0-F66AB581A933} ()
[10/08/2007, 14:06:15] - WARNING: BHO has no default name. Checking for Winlogon reference.
[10/08/2007, 14:06:15] - No filename found. Continuing.
[10/08/2007, 14:06:15] - BHO 7: {7E853D72-626A-48EC-A868-BA8D5E23E045} ()
[10/08/2007, 14:06:15] - WARNING: BHO has no default name. Checking for Winlogon reference.
[10/08/2007, 14:06:15] - No filename found. Continuing.
[10/08/2007, 14:06:15] - BHO 8: {9030D464-4C02-4ABF-8ECC-5164760863C6} (Windows Live Sign-in Helper)
[10/08/2007, 14:06:15] - BHO 9: {AA58ED58-01DD-4d91-8333-CF10577473F7} (Google Toolbar Helper)
[10/08/2007, 14:06:15] - BHO 10: {BB9AAAF3-4F8D-48B5-A565-FF3E58433DC2} (SurfairyBHO Class)
[10/08/2007, 14:06:15] - BHO 11: {CF46BFB3-2ACC-441b-B82B-36B9562C7FF1} ()
[10/08/2007, 14:06:15] - WARNING: BHO has no default name. Checking for Winlogon reference.
[10/08/2007, 14:06:15] - Checking for HKLM\...\Winlogon\Notify\qidovhdo
[10/08/2007, 14:06:15] - Key not found: HKLM\...\Winlogon\Notify\qidovhdo, continuing.
[10/08/2007, 14:06:15] - Finished Searching Browser Helper Objects
[10/08/2007, 14:06:15] - Finishing up...
[10/08/2007, 14:06:15] - A restart is needed.
[10/08/2007, 14:06:23] - Attempting to Restart via STOP error (Blue Screen!)

[10/08/2007, 14:15:10] - VirtumundoBeGone v1.5 ( "C:\Documents and Settings\JEAN PAUL\Bureau\VirtumundoBeGone.exe" )
[10/08/2007, 14:15:13] - Detected System Information:
[10/08/2007, 14:15:13] - Windows Version: 5.1.2600, Service Pack 2
[10/08/2007, 14:15:13] - Current Username: JEAN PAUL (Admin)
[10/08/2007, 14:15:13] - Windows is in NORMAL mode.
[10/08/2007, 14:15:13] - Searching for Browser Helper Objects:
[10/08/2007, 14:15:13] - BHO 1: {02478D38-C3F9-4EFB-9B51-7695ECA05670} (Yahoo! Toolbar Helper)
[10/08/2007, 14:15:13] - BHO 2: {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} (Adobe PDF Reader Link Helper)
[10/08/2007, 14:15:13] - BHO 3: {22BF413B-C6D2-4d91-82A9-A0F997BA588C} (Skype add-on (mastermind))
[10/08/2007, 14:15:13] - BHO 4: {4D1C4E81-A32A-416b-BCDB-33B3EF3617D3} (Need2Find Bar BHO)
[10/08/2007, 14:15:13] - BHO 5: {4E7BD74F-2B8D-469E-90F0-F66AB581A933} ()
[10/08/2007, 14:15:13] - WARNING: BHO has no default name. Checking for Winlogon reference.
[10/08/2007, 14:15:13] - No filename found. Continuing.
[10/08/2007, 14:15:13] - BHO 6: {7E853D72-626A-48EC-A868-BA8D5E23E045} ()
[10/08/2007, 14:15:13] - WARNING: BHO has no default name. Checking for Winlogon reference.
[10/08/2007, 14:15:13] - No filename found. Continuing.
[10/08/2007, 14:15:13] - BHO 7: {9030D464-4C02-4ABF-8ECC-5164760863C6} (Windows Live Sign-in Helper)
[10/08/2007, 14:15:13] - BHO 8: {AA58ED58-01DD-4d91-8333-CF10577473F7} (Google Toolbar Helper)
[10/08/2007, 14:15:13] - BHO 9: {BB9AAAF3-4F8D-48B5-A565-FF3E58433DC2} (SurfairyBHO Class)
[10/08/2007, 14:15:13] - BHO 10: {CF46BFB3-2ACC-441b-B82B-36B9562C7FF1} ()
[10/08/2007, 14:15:13] - WARNING: BHO has no default name. Checking for Winlogon reference.
[10/08/2007, 14:15:13] - Checking for HKLM\...\Winlogon\Notify\qidovhdo
[10/08/2007, 14:15:13] - Key not found: HKLM\...\Winlogon\Notify\qidovhdo, continuing.
[10/08/2007, 14:15:13] - BHO 11: {D8E2CD19-D58D-4D8A-8BB4-A13874AD8F86} ()
[10/08/2007, 14:15:13] - WARNING: BHO has no default name. Checking for Winlogon reference.
[10/08/2007, 14:15:13] - Checking for HKLM\...\Winlogon\Notify\awtqq
[10/08/2007, 14:15:13] - Key not found: HKLM\...\Winlogon\Notify\awtqq, continuing.
[10/08/2007, 14:15:13] - Finished Searching Browser Helper Objects
[10/08/2007, 14:15:13] - Finishing up...
[10/08/2007, 14:15:13] - Nothing found! Exiting...

pour ce qui est de ta derniere question à priori oui nous avons accés à démarrer et exécuter.
J essaye au plus vite de t'envoyer la suite de ce que tu m'as demandé mais internet de veut pas m'ouvrir "atribune.org......"!! je rame, je piétine, je m'inquiète mias je lutte!!
MERCI POUR TON AIDE
Pascale
0
pascalefrugier
 
re bon je te confirme impossible d'aller trouver vundofix etant donne qu internet nous permet par moment d'ouvrir les favoris j'ai essaye Par ce biais de telecharger vundo mais impossible la page inscrit "error openning requested page" ahrrrrrrrrrrrrrrrrrrrrrrrr!!!!!!!! donc là je désespère.... Je retente on peut r^ver
a suivreMERCI
Pascale
0
philae83 Messages postés 12837 Date d'inscription   Statut Contributeur sécurité Dernière intervention   206
 
tu n'as pas la possiblité de télécharger sur un autre pc et via une clé usb par exemple ?
0
philae83 Messages postés 12837 Date d'inscription   Statut Contributeur sécurité Dernière intervention   206
 
pour ce qui est de ta derniere question à priori oui nous avons accés à démarrer et exécuter.


ok merci
J essaye au plus vite de t'envoyer la suite de ce que tu m'as demandé mais internet de veut pas m'ouvrir "atribune.org......"!! je rame, je piétine, je m'inquiète mias je lutte!!


c'est pas grave, fait au mieux.
N'oublie pas VUNDO stp

et je vais te demander également de supprimer COMBOFIX qu'on avait téléchargé, et tu vas essayer de le reprendre et de refaire la manip :

téléchargement :
http://download.bleepingcomputer.com/sUBs/ComboFix.exe

puis


* Double clique combofix.exe.

* Tape sur la touche Y (Yes) pour démarrer le scan.

* Lorsque le scan sera complété, un rapport apparaîtra. Copie/colle ce rapport dans ta prochaine réponse

NOTE : Le rapport se trouve également ici : C:\Combofix.txt

0
philae83 Messages postés 12837 Date d'inscription   Statut Contributeur sécurité Dernière intervention   206
 
re

j'ai oublié un morceau tout à l'heure, je voulais que tu regardes :

démarrer---------exécuter---------tu tapes cmd
et tu me dis si tu as accès ou pas

0
pascalefrugier
 
Bonjour,
alors j'ai reussi avec cle usb (merci du tuyau) a lancer vundo fix et je n'ai pas de rapport puisqu'aucun fichier infesté détecté! incroyable mais vrai... pourtant notre anti virus trouve bien le valera 1 sans pouvoir le supprimer; donc je suis en train de lancer combofix on va voir ce que ça donne
pour demarrere executer cmd ça ouvre une fenetre noire c WINDOWS SYSTEM32 cmd exe
a suivre j'envoie combofix des que c'est fini et hijack this comme tu m'avais d"mande
MERCI DE TON AIDE
Pascale
0
philae83 Messages postés 12837 Date d'inscription   Statut Contributeur sécurité Dernière intervention   206
 
bon on dirait que ça se décoince tout de même

j'attends le rapport de combo
0
pascalefrugier
 
Bonjour,
RE alors normalement ça y est j'ai tout: combofix et hijack juste apres:
ComboFix 07-10-07.2 - JEAN PAUL 2007-10-08 17:51:48.1 - NTFSx86
Microsoft Windows XP dition familiale 5.1.2600.2.1252.1.1036.18.185 [GMT -4:00]
Running from: D:\ComboFix.exe
* Created a new restore point
.

(((((((((((((((((((((((((((((((((((( Autres suppressions ))))))))))))))))))))))))))))))))))))))))))))))))
.

C:\check_LSA7.txt
C:\Documents and Settings\JEAN PAUL\Bureau\internet.lnk
C:\WINDOWS\cookies.ini
C:\WINDOWS\system32\aodktnrv.ini
C:\WINDOWS\system32\aoxxtjcp.dll
C:\WINDOWS\system32\awtqq.dll
C:\WINDOWS\system32\dlhfgaul.dll
C:\WINDOWS\system32\lalacjuo.ini
C:\WINDOWS\system32\luagfhld.ini
C:\WINDOWS\system32\MabryObj.dll
C:\WINDOWS\system32\oujcalal.dll
C:\WINDOWS\system32\pcjtxxoa.ini
C:\WINDOWS\system32\pglhlkfh.dll
C:\WINDOWS\system32\qidovhdo.dll
C:\WINDOWS\system32\qqtwa.bak2
C:\WINDOWS\system32\qqtwa.ini
C:\WINDOWS\system32\rqdsnaej.dll
C:\WINDOWS\system32\vrntkdoa.dll
D:\copy.exe

.
((((((((((((((((((((((((((((((((((((((( Drivers/Services )))))))))))))))))))))))))))))))))))))))))))))))))


-------\LEGACY_DOMAINSERVICE
-------\DomainService


((((((((((((((((((((((((((((( Fichiers créés 2007-09-08 to 2007-10-08 ))))))))))))))))))))))))))))))))))))
.

2007-10-08 17:50 51,200 --a------ C:\WINDOWS\NirCmd.exe
2007-10-03 11:19 <REP> d-------- C:\Downloads
2007-10-03 11:19 <REP> d-------- C:\Bases
2007-10-03 11:18 <REP> d-------- C:\Kaspersky
2007-10-01 17:09 <REP> d-------- C:\ProfNOTE 2007
2007-10-01 17:09 <REP> d-------- C:\Documents and Settings\JEAN PAUL\Application Data\InstallShield
2007-10-01 16:42 <REP> d-------- C:\PRONOTE 2007
2007-10-01 08:14 101,864 --a------ C:\WINDOWS\system32\GDIPFONTCACHEV1.DAT
2007-09-30 18:58 <REP> d-------- C:\Program Files\gdmath
2007-09-30 18:55 61,440 --a------ C:\WINDOWS\UnDeploy.exe
2007-09-30 11:45 <REP> d-------- C:\WINDOWS\BDOSCAN8
2007-09-29 09:56 <REP> d-------- C:\VundoFix Backups
2007-09-28 11:07 <REP> d-------- C:\Program Files\Navilog1
2007-09-28 08:23 <REP> d-------- C:\Program Files\Trend Micro
2007-09-13 21:41 44,054 --a------ C:\WINDOWS\system32\iifdbyv.dll.vir

.
(((((((((((((((((((((((((((((((((( Compte-rendu de Find3M ))))))))))))))))))))))))))))))))))))))))))))))))
.
2007-10-06 21:49 --------- d-------- C:\Program Files\mpcts
2007-10-04 18:35 --------- d-------- C:\Documents and Settings\JEAN PAUL\Application Data\U3
2007-10-01 17:09 --------- d--h----- C:\Program Files\InstallShield Installation Information
2007-09-30 11:28 --------- d-------- C:\Documents and Settings\All Users\Application Data\Symantec
2007-09-28 21:25 --------- d-------- C:\Documents and Settings\JEAN PAUL\Application Data\dvdcss
2007-09-27 13:39 --------- d-------- C:\Documents and Settings\All Users\Application Data\root
2007-09-27 11:10 --------- d-------- C:\Documents and Settings\All Users\Application Data\Setup
2007-09-26 20:31 --------- d-------- C:\Program Files\mpc1s
2007-09-26 20:30 --------- d-------- C:\Documents and Settings\JEAN PAUL\Application Data\Canon
2007-09-19 19:01 --------- d-------- C:\Program Files\Atelier Scientifique
2007-09-09 19:56 --------- d-------- C:\Program Files\FoxTarot4
2007-09-01 18:00 --------- d-------- C:\Documents and Settings\JEAN PAUL\Application Data\WinRAR
2007-08-29 12:45 --------- d-------- C:\Program Files\JS World
2007-08-27 17:08 --------- d-------- C:\Program Files\JS Star
2007-08-25 16:20 74752 --a------ C:\WINDOWS\ST6UNST.EXE
2007-08-25 16:20 258048 --------- C:\WINDOWS\Setup1.exe
2007-08-19 20:01 --------- d-------- C:\Documents and Settings\All Users\Application Data\WinZip
2007-08-18 18:30 --------- d-------- C:\Program Files\Western Digital Technologies
2006-02-01 13:03 1955904 --a------ C:\Program Files\PPVIEWER.EXE
2002-11-15 07:11 41034 --a------ C:\Program Files\salv.exe
2002-07-17 05:00 299061 --a------ C:\Program Files\msisam10.dll
2002-07-17 05:00 241724 --a------ C:\Program Files\msuni10.dll
2002-07-16 07:21 1138762 --a------ C:\Program Files\rsalv.dll
2002-07-16 07:20 872523 --a------ C:\Program Files\j3salv.dll
1999-06-27 00:11 4608 -ra------ C:\Program Files\W95inf32.dll
1999-06-27 00:11 2272 -ra------ C:\Program Files\W95inf16.dll
.

((((((((((((((((((((((((((((((((( Point de chargement Reg )))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* les éléments vides & les éléments initiaux légitimes ne sont pas listés

[HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{4E7BD74F-2B8D-469E-90F0-F66AB581A933}]

[HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{BB9AAAF3-4F8D-48B5-A565-FF3E58433DC2}]
2002-05-03 08:27 81920 --a------ C:\Program Files\Surfairy\SurfairyHlp.dll

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"NvCplDaemon"="C:\WINDOWS\System32\NvCpl.dll" [2002-10-25 13:18]
"SoundMan"="SOUNDMAN.EXE" [2002-09-11 13:57 C:\WINDOWS\SOUNDMAN.EXE]
"EM_EXEC"="C:\PROGRA~1\MOUSEW~1\SYSTEM\EM_EXEC.EXE" [2002-01-28 04:43]
"ACTIVBOARD"="C:\Apps\ActivBoard\MMKeybd.exe" [2002-06-19 13:51]
"VCSPlayer"="C:\Program Files\Virtual CD v4 SDK\system\vcsplay.exe" [2002-06-07 07:34]
"ActivSurf"="C:\apps\ActivSurf\4448364\Program\backweb-4448364.exe" [2003-02-04 16:38]
"RealTray"="C:\Program Files\Real\RealPlayer\RealPlay.exe" [2003-02-04 16:40]
"SunJavaUpdateSched"="C:\Program Files\Java\jre1.5.0_03\bin\jusched.exe" [2005-04-12 21:48]
"LogitechVideoRepair"="C:\Program Files\Logitech\Video\ISStart.exe" [2005-01-18 11:47]
"LogitechVideoTray"="C:\Program Files\Logitech\Video\LogiTray.exe" [2005-01-18 11:37]
"LVCOMSX"="C:\WINDOWS\system32\LVCOMSX.EXE" [2004-10-08 05:52]
"ShStatEXE"="C:\Program Files\Network Associates\VirusScan\SHSTAT.exe" [2004-09-22 14:00]
"McAfeeUpdaterUI"="C:\Program Files\Network Associates\Common Framework\UpdaterUI.exe" [2004-08-05 21:50]
"Network Associates Error Reporting Service"="C:\Program Files\Fichiers communs\Network Associates\TalkBack\TBMon.exe" [2003-10-07 03:48]
"QuickTime Task"="C:\Program Files\QuickTime\qttask.exe" [2006-01-15 07:47]

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"Update Service"="C:\PROGRA~1\FICHIE~1\TEKNUM~1\update.exe" [2003-02-04 16:43]
"ctfmon.exe"="C:\WINDOWS\system32\ctfmon.exe" [2004-08-19 19:09]
"MsnMsgr"="C:\Program Files\MSN Messenger\MsnMsgr.exe" [2007-01-19 12:55]
"NBJ"="C:\Program Files\Ahead\Nero BackItUp\NBJ.exe" [2005-10-11 12:25]

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Run]
Q:\CDSETUP.EXE

R0 hpt3xx;hpt3xx;C:\WINDOWS\system32\DRIVERS\hpt3xx.sys
R1 msikbd2k;Multimedia Keyboard Filter Driver;C:\WINDOWS\system32\DRIVERS\msikbd2k.sys
R1 NaiAvTdi1;NaiAvTdi1;C:\WINDOWS\system32\drivers\mvstdi5x.sys
R1 vcsmpdrv;vcsmpdrv;C:\WINDOWS\system32\DRIVERS\vcsmpdrv.sys
R2 nhksrv;Netropa NHK Server;C:\Apps\ActivBoard\nhksrv.exe
R2 VCSSecS;Virtual CD v4 Security service (SDK - Version);C:\Program Files\Virtual CD v4 SDK\system\vcssecs.exe
R3 2WIREPCP;2Wire USB;C:\WINDOWS\system32\DRIVERS\2WirePCP.sys
S3 C-Dilla;C-Dilla;\??\C:\WINDOWS\system32\drivers\CDANT.SYS
S3 EntDrv51;EntDrv51;\??\C:\WINDOWS\system32\drivers\EntDrv51.sys


[HKEY_CURRENT_USER\software\microsoft\windows\currentversion\explorer\mountpoints2\{1c6f64d6-304b-11da-a6f5-0010dcdba667}]
AutoRun\command- setupSNK.exe

.
**************************************************************************

catchme 0.3.1169 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2007-10-08 18:01:42
Windows 5.1.2600 Service Pack 2 NTFS

scanning hidden processes ...

scanning hidden autostart entries ...

HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows
AppInit_DLLs = ??????????

scanning hidden files ...

C:\WINDOWS\QTFont.for
C:\WINDOWS\QTFont.qfn

scan completed successfully
hidden files: 2

**************************************************************************
.
Completion time: 2007-10-08 18:04:32 - machine was rebooted
C:\ComboFix-quarantined-files.txt ... 2007-10-08 18:04
.
--- E O F ---
[code]
2002-05-15 09:21 83656 --a------ C:\Qoobox\Quarantine\C\WINDOWS\system32\MabryObj.dll.vir
2006-10-03 17:18 748 --a------ C:\Qoobox\Quarantine\C\Documents and Settings\JEAN PAUL\Bureau\INTERNET.lnk.vir
2007-09-13 21:47 244832 --a------ C:\Qoobox\Quarantine\C\WINDOWS\system32\awtqq.dll.vir
2007-09-14 10:00 69184 --a------ C:\Qoobox\Quarantine\C\WINDOWS\system32\rqdsnaej.dll.vir
2007-09-24 14:14 694127 --a------ C:\Qoobox\Quarantine\C\WINDOWS\system32\lalacjuo.ini.vir
2007-09-24 14:14 85056 --a------ C:\Qoobox\Quarantine\C\WINDOWS\system32\oujcalal.dll.vir
2007-09-28 20:51 85056 --a------ C:\Qoobox\Quarantine\C\WINDOWS\system32\pglhlkfh.dll.vir
2007-09-29 10:14 69184 --a------ C:\Qoobox\Quarantine\C\WINDOWS\system32\qidovhdo.dll.vir
2007-10-03 21:28 694270 --a------ C:\Qoobox\Quarantine\C\WINDOWS\system32\pcjtxxoa.ini.vir
2007-10-03 21:28 86080 --a------ C:\Qoobox\Quarantine\C\WINDOWS\system32\aoxxtjcp.dll.vir
2007-10-04 21:25 85056 --a------ C:\Qoobox\Quarantine\C\WINDOWS\system32\vrntkdoa.dll.vir
2007-10-06 09:57 693541 --a------ C:\Qoobox\Quarantine\C\WINDOWS\system32\aodktnrv.ini.vir
2007-10-07 21:33 625482 --a------ C:\Qoobox\Quarantine\C\WINDOWS\system32\qqtwa.bak2.vir
2007-10-07 21:40 86080 --a------ C:\Qoobox\Quarantine\C\WINDOWS\system32\dlhfgaul.dll.vir
2007-10-08 08:38 520 --a------ C:\Qoobox\Quarantine\C\WINDOWS\cookies.ini.vir
2007-10-08 14:07 64680 --a------ C:\Qoobox\Quarantine\C\check_LSA7.txt.vir
2007-10-08 14:08 693961 --a------ C:\Qoobox\Quarantine\C\WINDOWS\system32\luagfhld.ini.vir
2007-10-08 17:55 846 --a------ C:\Qoobox\Quarantine\Registry_backups\LEGACY_DOMAINSERVICE.reg.dat
2007-10-08 17:56 2956 --a------ C:\Qoobox\Quarantine\Registry_backups\services_DomainService.reg.dat
2007-10-08 17:56 419 --a------ C:\Qoobox\Quarantine\catchme.log
2007-10-08 17:56 449385 --a------ C:\Qoobox\Quarantine\catchme2007-10-08_180128.85.zip
2007-10-08 17:56 631871 --a------ C:\Qoobox\Quarantine\C\WINDOWS\system32\qqtwa.ini.vir


Structure du dossier pour le volume HDD
Le num‚ro de s‚rie du volume est B0C9-731B
C:\QOOBOX\QUARANTINE
| catchme.log
| catchme2007-10-08_180128.85.zip
|
+---C
| | check_LSA7.txt.vir
| |
| +---Documents and Settings
| | \---JEAN PAUL
| | \---Bureau
| | INTERNET.lnk.vir
| |
| \---WINDOWS
| | cookies.ini.vir
| |
| \---system32
| aodktnrv.ini.vir
| aoxxtjcp.dll.vir
| awtqq.dll.vir
| dlhfgaul.dll.vir
| lalacjuo.ini.vir
| luagfhld.ini.vir
| MabryObj.dll.vir
| oujcalal.dll.vir
| pcjtxxoa.ini.vir
| pglhlkfh.dll.vir
| qidovhdo.dll.vir
| qqtwa.bak2.vir
| qqtwa.ini.vir
| rqdsnaej.dll.vir
| vrntkdoa.dll.vir
|
\---Registry_backups
LEGACY_DOMAINSERVICE.reg.dat
services_DomainService.reg.dat

[/code]




Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 18:09:20, on 08/10/2007
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v7.00 (7.00.6000.16512)
Boot mode: Normal

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\Apps\ActivBoard\nhksrv.exe
C:\WINDOWS\System32\drivers\CDAC11BA.EXE
C:\WINDOWS\system32\DRIVERS\CDANTSRV.EXE
C:\Program Files\Roxio\GoBack\GBPoll.exe
C:\Program Files\Network Associates\Common Framework\FrameworkService.exe
C:\Program Files\Network Associates\VirusScan\Mcshield.exe
C:\Program Files\Network Associates\VirusScan\VsTskMgr.exe
C:\Program Files\Fichiers communs\Microsoft Shared\VS7Debug\mdm.exe
C:\WINDOWS\System32\nvsvc32.exe
C:\WINDOWS\system32\HPZipm12.exe
C:\WINDOWS\System32\svchost.exe
C:\Program Files\Virtual CD v4 SDK\system\vcssecs.exe
C:\WINDOWS\system32\fxssvc.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\SOUNDMAN.EXE
C:\PROGRA~1\MOUSEW~1\SYSTEM\EM_EXEC.EXE
C:\Apps\ActivBoard\MMKeybd.exe
C:\Program Files\Virtual CD v4 SDK\system\vcsplay.exe
C:\apps\ActivSurf\4448364\Program\backweb-4448364.exe
C:\Program Files\Real\RealPlayer\RealPlay.exe
C:\Program Files\Java\jre1.5.0_03\bin\jusched.exe
C:\Program Files\Logitech\Video\LogiTray.exe
C:\WINDOWS\system32\LVCOMSX.EXE
C:\Program Files\Network Associates\VirusScan\SHSTAT.EXE
C:\Program Files\Network Associates\Common Framework\UpdaterUI.exe
C:\Program Files\Fichiers communs\Network Associates\TalkBack\TBMon.exe
C:\Program Files\QuickTime\qttask.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\MSN Messenger\MsnMsgr.Exe
C:\Program Files\Ulead Systems\Ulead Photo Express 4.0 SE\CalCheck.exe
C:\Program Files\SAGEM\SAGEM F@st800\dslmon.exe
C:\Apps\ActivBoard\TrayMon.exe
C:\Apps\ActivBoard\OSD.exe
C:\Program Files\HP\Digital Imaging\bin\hpqtra08.exe
C:\Program Files\Logitech\Video\FxSvr2.exe
C:\Program Files\HP\Digital Imaging\bin\hpqSTE08.exe
C:\Program Files\HP\Digital Imaging\bin\hpqimzone.exe
C:\Program Files\Internet Explorer\IEXPLORE.EXE
C:\Program Files\Trend Micro\HijackThis\HijackThis.exe

R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = https://fr.yahoo.com/
R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyServer = http=proxy.club-internet.fr:8080
R3 - URLSearchHook: (no name) - {BE89472C-B803-4D1D-9A9A-0A63660E0FE3} - C:\PROGRA~1\COPERN~1\COPERN~1.DLL
O2 - BHO: Yahoo! Toolbar Helper - {02478D38-C3F9-4EFB-9B51-7695ECA05670} - C:\Program Files\Yahoo!\Companion\Installs\cpn\yt.dll
O2 - BHO: Adobe PDF Reader Link Helper - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 7.0\ActiveX\AcroIEHelper.dll
O2 - BHO: Skype add-on (mastermind) - {22BF413B-C6D2-4d91-82A9-A0F997BA588C} - C:\PROGRA~1\Skype\Phone\IEPlugin\SKYPEI~1.DLL
O2 - BHO: Need2Find Bar BHO - {4D1C4E81-A32A-416b-BCDB-33B3EF3617D3} - C:\Program Files\Need2Find\bar\5.bin\ND2FNBAR.DLL
O2 - BHO: (no name) - {4E7BD74F-2B8D-469E-90F0-F66AB581A933} - (no file)
O2 - BHO: (no name) - {7E853D72-626A-48EC-A868-BA8D5E23E045} - (no file)
O2 - BHO: Windows Live Sign-in Helper - {9030D464-4C02-4ABF-8ECC-5164760863C6} - C:\Program Files\Fichiers communs\Microsoft Shared\Windows Live\WindowsLiveLogin.dll
O2 - BHO: Google Toolbar Helper - {AA58ED58-01DD-4d91-8333-CF10577473F7} - c:\program files\google\googletoolbar1.dll
O2 - BHO: SurfairyBHO Class - {BB9AAAF3-4F8D-48B5-A565-FF3E58433DC2} - C:\Program Files\Surfairy\SurfairyHlp.dll
O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE C:\WINDOWS\System32\NvCpl.dll,NvStartup
O4 - HKLM\..\Run: [SoundMan] SOUNDMAN.EXE
O4 - HKLM\..\Run: [EM_EXEC] C:\PROGRA~1\MOUSEW~1\SYSTEM\EM_EXEC.EXE
O4 - HKLM\..\Run: [ACTIVBOARD] C:\Apps\ActivBoard\MMKeybd.exe
O4 - HKLM\..\Run: [VCSPlayer] "C:\Program Files\Virtual CD v4 SDK\system\vcsplay.exe"
O4 - HKLM\..\Run: [ActivSurf] C:\apps\ActivSurf\4448364\Program\backweb-4448364.exe
O4 - HKLM\..\Run: [RealTray] C:\Program Files\Real\RealPlayer\RealPlay.exe SYSTEMBOOTHIDEPLAYER
O4 - HKLM\..\Run: [SunJavaUpdateSched] C:\Program Files\Java\jre1.5.0_03\bin\jusched.exe
O4 - HKLM\..\Run: [LogitechVideoRepair] C:\Program Files\Logitech\Video\ISStart.exe
O4 - HKLM\..\Run: [LogitechVideoTray] C:\Program Files\Logitech\Video\LogiTray.exe
O4 - HKLM\..\Run: [LVCOMSX] C:\WINDOWS\system32\LVCOMSX.EXE
O4 - HKLM\..\Run: [ShStatEXE] "C:\Program Files\Network Associates\VirusScan\SHSTAT.EXE" /STANDALONE
O4 - HKLM\..\Run: [McAfeeUpdaterUI] "C:\Program Files\Network Associates\Common Framework\UpdaterUI.exe" /StartedFromRunKey
O4 - HKLM\..\Run: [Network Associates Error Reporting Service] "C:\Program Files\Fichiers communs\Network Associates\TalkBack\TBMon.exe"
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
O4 - HKCU\..\Run: [Update Service] C:\PROGRA~1\FICHIE~1\TEKNUM~1\update.exe /startup
O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
O4 - HKCU\..\Run: [MsnMsgr] "C:\Program Files\MSN Messenger\MsnMsgr.Exe" /background
O4 - HKCU\..\Run: [NBJ] "C:\Program Files\Ahead\Nero BackItUp\NBJ.exe"
O4 - HKUS\S-1-5-18\..\Run: [CTFMON.EXE] C:\WINDOWS\System32\CTFMON.EXE (User 'SYSTEM')
O4 - HKUS\.DEFAULT\..\Run: [CTFMON.EXE] C:\WINDOWS\System32\CTFMON.EXE (User 'Default user')
O4 - Global Startup: Adobe Gamma Loader.lnk = ?
O4 - Global Startup: Contrôleur de calendrier Ulead.lnk = C:\Program Files\Ulead Systems\Ulead Photo Express 4.0 SE\CalCheck.exe
O4 - Global Startup: DSLMON.lnk = ?
O4 - Global Startup: Démarrage rapide du logiciel HP Image Zone.lnk = C:\Program Files\HP\Digital Imaging\bin\hpqthb08.exe
O4 - Global Startup: GoBack.lnk = C:\Program Files\Roxio\GoBack\GBTray.exe
O4 - Global Startup: HP Digital Imaging Monitor.lnk = C:\Program Files\HP\Digital Imaging\bin\hpqtra08.exe
O8 - Extra context menu item: &Google Search - res://C:\Program Files\Google\GoogleToolbar1.dll/cmsearch.html
O8 - Extra context menu item: &Search - http://kt.bar.need2find.com/KT/menusearch.html?p=KT
O8 - Extra context menu item: &Translate English Word - res://C:\Program Files\Google\GoogleToolbar1.dll/cmwordtrans.html
O8 - Extra context menu item: Backward Links - res://C:\Program Files\Google\GoogleToolbar1.dll/cmbacklinks.html
O8 - Extra context menu item: Cached Snapshot of Page - res://C:\Program Files\Google\GoogleToolbar1.dll/cmcache.html
O8 - Extra context menu item: Chercher avec Copernic Agent - res://C:\Program Files\Copernic Agent\CopernicAgentExt.rdl/INTEGRATION_MENU_SEARCHEXT
O8 - Extra context menu item: Similar Pages - res://C:\Program Files\Google\GoogleToolbar1.dll/cmsimilar.html
O8 - Extra context menu item: Translate Page into English - res://C:\Program Files\Google\GoogleToolbar1.dll/cmtrans.html
O9 - Extra button: (no name) - {193B17B0-7C9F-4D5B-AEAB-8D3605EFC084} - C:\PROGRA~1\COPERN~1\COPERN~1.EXE
O9 - Extra 'Tools' menuitem: Démarrer Copernic Agent - {193B17B0-7C9F-4D5B-AEAB-8D3605EFC084} - C:\PROGRA~1\COPERN~1\COPERN~1.EXE
O9 - Extra button: Packard Bell - {1D49B7D4-524D-4ac9-BC34-B4822CAE4BB1} - C:\Apps\IECustom\script.htm
O9 - Extra button: Copernic Agent - {688DC797-DC11-46A7-9F1B-445F4F58CE6E} - C:\PROGRA~1\COPERN~1\COPERN~1.EXE
O9 - Extra button: Skype - {77BF5300-1474-4EC7-9980-D32B190E9B07} - C:\PROGRA~1\Skype\Phone\IEPlugin\SKYPEI~1.DLL
O9 - Extra button: (no name) - {85d1f590-48f4-11d9-9669-0800200c9a66} - C:\WINDOWS\bdoscandel.exe
O9 - Extra 'Tools' menuitem: Uninstall BitDefender Online Scanner v8 - {85d1f590-48f4-11d9-9669-0800200c9a66} - C:\WINDOWS\bdoscandel.exe
O9 - Extra button: Real.com - {CD67F990-D8E9-11d2-98FE-00C0F0318AFE} - C:\WINDOWS\System32\Shdocvw.dll
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O16 - DPF: {5D86DDB5-BDF9-441B-9E9E-D4730F4EE499} (BDSCANONLINE Control) - http://www.bitdefender.fr/scan_fr/scan8/oscan8.cab
O17 - HKLM\System\CCS\Services\Tcpip\..\{331EA7FA-D686-47B5-A520-A9EAF320F8B8}: NameServer = 200.88.127.22,196.3.5.132
O18 - Protocol: skype4com - {FFC8B962-9B40-4DFF-9458-1830C7DD7F5D} - C:\PROGRA~1\FICHIE~1\Skype\SKYPE4~1.DLL
O18 - Filter: application/xhtml+xml; charset=iso-8859-1 - {32F66A26-7614-11D4-BD11-00104BD3F987} - C:\Program Files\Design Science\MathPlayer\MathMLMimer.dll
O18 - Filter: application/xhtml+xml; charset=utf-8 - {32F66A26-7614-11D4-BD11-00104BD3F987} - C:\Program Files\Design Science\MathPlayer\MathMLMimer.dll
O18 - Filter: text/xml; charset=iso-8859-1 - {32F66A26-7614-11D4-BD11-00104BD3F987} - C:\Program Files\Design Science\MathPlayer\MathMLMimer.dll
O18 - Filter: text/xml; charset=utf-8 - {32F66A26-7614-11D4-BD11-00104BD3F987} - C:\Program Files\Design Science\MathPlayer\MathMLMimer.dll
O23 - Service: C-DillaCdaC11BA - C-Dilla Ltd - C:\WINDOWS\System32\drivers\CDAC11BA.EXE
O23 - Service: C-DillaSrv - C-Dilla Ltd - C:\WINDOWS\system32\DRIVERS\CDANTSRV.EXE
O23 - Service: GBPoll - Roxio, Inc. - C:\Program Files\Roxio\GoBack\GBPoll.exe
O23 - Service: Service Framework McAfee (McAfeeFramework) - Network Associates, Inc. - C:\Program Files\Network Associates\Common Framework\FrameworkService.exe
O23 - Service: Network Associates McShield (McShield) - Network Associates, Inc. - C:\Program Files\Network Associates\VirusScan\Mcshield.exe
O23 - Service: Network Associates Task Manager (McTaskManager) - Network Associates, Inc. - C:\Program Files\Network Associates\VirusScan\VsTskMgr.exe
O23 - Service: Netropa NHK Server (nhksrv) - Unknown owner - C:\Apps\ActivBoard\nhksrv.exe
O23 - Service: NVIDIA Driver Helper Service (NVSvc) - NVIDIA Corporation - C:\WINDOWS\System32\nvsvc32.exe
O23 - Service: Pml Driver HPZ12 - HP - C:\WINDOWS\system32\HPZipm12.exe
O23 - Service: SmartLinkService (SLService) - Smart Link - C:\WINDOWS\SYSTEM32\slserv.exe
O23 - Service: Virtual CD v4 Security service (SDK - Version) (VCSSecS) - H+H Software GmbH - C:\Program Files\Virtual CD v4 SDK\system\vcssecs.exe
0
philae83 Messages postés 12837 Date d'inscription   Statut Contributeur sécurité Dernière intervention   206
 
parfait tout ça.

je regarde le tout, et je reviens

0
philae83 Messages postés 12837 Date d'inscription   Statut Contributeur sécurité Dernière intervention   206
 
on continue

Une partie de la procédure se déroulera sans avoir accès à internet, prière d'imprimer ces instructions, ou de les coller dans un fichier texte, pour lecture durant cette désinfection.

Les manipulations sont à faire sans interruption et dans l'ordre.

Si tu ne comprends pas quelque chose, demande des explications avant de commencer.


$$ Télécharge Brute Force Uninstaller (de Merijn)

http://www.merijn.org/files/bfu.zip

Créé un nouveau dossier directement sur le C:\ et nomme-le BFU. Décompresse le fichier téléchargé dans ce nouveau dossier (C:\BFU)



$$ FAIS UN CLIC-DROIT sur le lien suivant

http://perso.orange.fr/Chercheur-perso/scripts/toolbar.bfu



et choisis "Enregistrer la cible sous..." afin de télécharger Toolbar.bfu de Chercheur

Sauvegarde dans le dossier créé (C:\BFU).

**Note : si tu utlises Internet Explorer; lors de la sauvegarde, assure-toi que le champs "Type :" affiche "Tous les fichiers". Tu dois maintenant avoir deux fichiers dans le dossier C:\BFU : [bToolbar.bfu et BFU.exe (très important).



$$ Redémarre en mode Sans Échec : au redémarrage, tapote immédiatement la touche F8 ou F5; tu verras un écran avec choix de démarrages apparaître. Utilisant les flèches du clavier, choisis "Mode Sans Échec" et valide avec "Entrée".

Choisis ton compte usuel, et non Administrateur.



$$ Démarre le "Brute Force Uninstaller" en double-cliquant BFU.exe (du dossier C:\BFU)

Clique sur le petit dossier jaune, à la droite de la boîte Scriptline to execute, et double-clique sur :

Toolbar.bfu



Dans la boîte "Scriptline to execute", tu devrais maintenant voir ceci : C:\BFU\Toolbar.bfu

Clique sur Execute et laisse-le faire son travail.

Attendre que Complete script execution apparaîsse et clique sur OK.

Clique Exit pour fermer le programme BFU.



$$ Redémarre normalement

puis

* lance hijackthis puis coche ces lignes :

O2 - BHO: Need2Find Bar BHO - {4D1C4E81-A32A-416b-BCDB-33B3EF3617D3} - C:\Program Files\Need2Find\bar\5.bin\ND2FNBAR.DLL------------celle ci devrait avoir disparue
O2 - BHO: (no name) - {4E7BD74F-2B8D-469E-90F0-F66AB581A933} - (no file)
O2 - BHO: (no name) - {7E853D72-626A-48EC-A868-BA8D5E23E045} - (no file)

* toutes applications fermées et HORS CONNEXION, clique sur fix checked

* Télécharge Gmer
http://www2.gmer.net/gmer.zip

* décompresse-le.
* Double-clique sur l'icone Gmer, puis sélectionne l'onglet "Rootkit" ; vérifie que tout soit coché à droite :

1. System
2. Devices
3. Proceses
4. Libraries
5. Modules
6. Services
7. Registry
8. Files

Clique ensuite sur "Scan" et laisse-le faire son travail.
A la fin du scan clique sur "Copy", et dans ton prochain message -> clic droit/coller

reposte un nouveau rapport hijackthis également

je verrais la suite demain, il se fait tard
je vais me coucher
0
pascalefrugier
 
Bonjour,
re OUFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF on a tout fait...je pense... voici les deux rapports manquants du gmer et hijack:

1/
GMER 1.0.13.12551 - http://www.gmer.net
Rootkit scan 2007-10-08 19:34:55
Windows 5.1.2600 Service Pack 2


---- System - GMER 1.0.13 ----

SSDT 82714109 ZwCreateThread

---- User code sections - GMER 1.0.13 ----

.text C:\WINDOWS\system32\services.exe[656] kernel32.dll!ReadFile 7C80180E 5 Bytes CALL 37001160 C:\WINDOWS\system32\EntApi.dll
.text C:\WINDOWS\system32\services.exe[656] kernel32.dll!VirtualProtectEx 7C801A5D 5 Bytes CALL 37001160 C:\WINDOWS\system32\EntApi.dll
.text C:\WINDOWS\system32\services.exe[656] kernel32.dll!VirtualProtect 7C801AD0 5 Bytes CALL 37001160 C:\WINDOWS\system32\EntApi.dll
.text C:\WINDOWS\system32\services.exe[656] kernel32.dll!LoadLibraryA 7C801D77 5 Bytes CALL 37001160 C:\WINDOWS\system32\EntApi.dll
.text C:\WINDOWS\system32\services.exe[656] kernel32.dll!GetStartupInfoA 7C801EEE 5 Bytes CALL 37001160 C:\WINDOWS\system32\EntApi.dll
.text C:\WINDOWS\system32\services.exe[656] kernel32.dll!GetProcAddress 7C80ADA0 5 Bytes CALL 37001160 C:\WINDOWS\system32\EntApi.dll
.text C:\WINDOWS\system32\services.exe[656] kernel32.dll!WriteFile 7C810D87 5 Bytes CALL 37001160 C:\WINDOWS\system32\EntApi.dll
.text C:\WINDOWS\system32\services.exe[656] kernel32.dll!CreatePipe 7C81E0C7 5 Bytes CALL 37001160 C:\WINDOWS\system32\EntApi.dll
.text C:\WINDOWS\system32\services.exe[656] kernel32.dll!PeekNamedPipe 7C85F90F 5 Bytes CALL 37001160 C:\WINDOWS\system32\EntApi.dll
.text C:\WINDOWS\system32\services.exe[656] kernel32.dll!WinExec 7C86136D 5 Bytes CALL 37001160 C:\WINDOWS\system32\EntApi.dll
.text C:\WINDOWS\system32\services.exe[656] ADVAPI32.dll!RegOpenKeyA 77DCC41B 5 Bytes CALL 37001160 C:\WINDOWS\system32\EntApi.dll
.text C:\WINDOWS\system32\services.exe[656] WS2_32.dll!select 719F2DC0 5 Bytes CALL 37001160 C:\WINDOWS\system32\EntApi.dll
.text C:\WINDOWS\system32\services.exe[656] WS2_32.dll!socket 719F3B91 5 Bytes CALL 37001160 C:\WINDOWS\system32\EntApi.dll
.text C:\WINDOWS\system32\services.exe[656] WS2_32.dll!bind 719F3E00 5 Bytes CALL 37001160 C:\WINDOWS\system32\EntApi.dll
.text C:\WINDOWS\system32\services.exe[656] WS2_32.dll!send 719F428A 5 Bytes CALL 37001160 C:\WINDOWS\system32\EntApi.dll
.text C:\WINDOWS\system32\services.exe[656] WS2_32.dll!recv 719F615A 5 Bytes CALL 37001160 C:\WINDOWS\system32\EntApi.dll
.text C:\WINDOWS\system32\services.exe[656] WININET.dll!InternetReadFile 4409ABBC 5 Bytes CALL 37001160 C:\WINDOWS\system32\EntApi.dll
.text C:\WINDOWS\system32\services.exe[656] WININET.dll!InternetOpenA 4409C869 5 Bytes CALL 37001160 C:\WINDOWS\system32\EntApi.dll
.text C:\WINDOWS\system32\services.exe[656] WININET.dll!InternetOpenUrlA 440A06DD 5 Bytes CALL 37001160 C:\WINDOWS\system32\EntApi.dll
.text C:\WINDOWS\system32\lsass.exe[668] kernel32.dll!ReadFile 7C80180E 5 Bytes CALL 37001160 C:\WINDOWS\system32\EntApi.dll
.text C:\WINDOWS\system32\lsass.exe[668] kernel32.dll!VirtualProtectEx 7C801A5D 5 Bytes CALL 37001160 C:\WINDOWS\system32\EntApi.dll
.text C:\WINDOWS\system32\lsass.exe[668] kernel32.dll!VirtualProtect 7C801AD0 5 Bytes CALL 37001160 C:\WINDOWS\system32\EntApi.dll
.text C:\WINDOWS\system32\lsass.exe[668] kernel32.dll!LoadLibraryA 7C801D77 5 Bytes CALL 37001160 C:\WINDOWS\system32\EntApi.dll
.text C:\WINDOWS\system32\lsass.exe[668] kernel32.dll!GetStartupInfoA 7C801EEE 5 Bytes CALL 37001160 C:\WINDOWS\system32\EntApi.dll
.text C:\WINDOWS\system32\lsass.exe[668] kernel32.dll!GetProcAddress 7C80ADA0 5 Bytes CALL 37001160 C:\WINDOWS\system32\EntApi.dll
.text C:\WINDOWS\system32\lsass.exe[668] kernel32.dll!WriteFile 7C810D87 5 Bytes CALL 37001160 C:\WINDOWS\system32\EntApi.dll
.text C:\WINDOWS\system32\lsass.exe[668] kernel32.dll!CreatePipe 7C81E0C7 5 Bytes CALL 37001160 C:\WINDOWS\system32\EntApi.dll
.text C:\WINDOWS\system32\lsass.exe[668] kernel32.dll!PeekNamedPipe 7C85F90F 5 Bytes CALL 37001160 C:\WINDOWS\system32\EntApi.dll
.text C:\WINDOWS\system32\lsass.exe[668] kernel32.dll!WinExec 7C86136D 5 Bytes CALL 37001160 C:\WINDOWS\system32\EntApi.dll
.text C:\WINDOWS\system32\lsass.exe[668] ADVAPI32.dll!RegOpenKeyA 77DCC41B 5 Bytes CALL 37001160 C:\WINDOWS\system32\EntApi.dll
.text C:\WINDOWS\system32\lsass.exe[668] WS2_32.dll!select 719F2DC0 5 Bytes CALL 37001160 C:\WINDOWS\system32\EntApi.dll
.text C:\WINDOWS\system32\lsass.exe[668] WS2_32.dll!socket 719F3B91 5 Bytes CALL 37001160 C:\WINDOWS\system32\EntApi.dll
.text C:\WINDOWS\system32\lsass.exe[668] WS2_32.dll!bind 719F3E00 5 Bytes CALL 37001160 C:\WINDOWS\system32\EntApi.dll
.text C:\WINDOWS\system32\lsass.exe[668] WS2_32.dll!send 719F428A 5 Bytes CALL 37001160 C:\WINDOWS\system32\EntApi.dll
.text C:\WINDOWS\system32\lsass.exe[668] WS2_32.dll!recv 719F615A 5 Bytes CALL 37001160 C:\WINDOWS\system32\EntApi.dll
.text C:\WINDOWS\system32\lsass.exe[668] WININET.dll!InternetReadFile 4409ABBC 5 Bytes CALL 37001160 C:\WINDOWS\system32\EntApi.dll
.text C:\WINDOWS\system32\lsass.exe[668] WININET.dll!InternetOpenA 4409C869 5 Bytes CALL 37001160 C:\WINDOWS\system32\EntApi.dll
.text C:\WINDOWS\system32\lsass.exe[668] WININET.dll!InternetOpenUrlA 440A06DD 5 Bytes CALL 37001160 C:\WINDOWS\system32\EntApi.dll
.text C:\WINDOWS\system32\svchost.exe[820] kernel32.dll!ReadFile 7C80180E 5 Bytes CALL 37001160 C:\WINDOWS\system32\EntApi.dll
.text C:\WINDOWS\system32\svchost.exe[820] kernel32.dll!VirtualProtectEx 7C801A5D 5 Bytes CALL 37001160 C:\WINDOWS\system32\EntApi.dll
.text C:\WINDOWS\system32\svchost.exe[820] kernel32.dll!VirtualProtect 7C801AD0 5 Bytes CALL 37001160 C:\WINDOWS\system32\EntApi.dll
.text C:\WINDOWS\system32\svchost.exe[820] kernel32.dll!LoadLibraryA 7C801D77 5 Bytes CALL 37001160 C:\WINDOWS\system32\EntApi.dll
.text C:\WINDOWS\system32\svchost.exe[820] kernel32.dll!GetStartupInfoA 7C801EEE 5 Bytes CALL 37001160 C:\WINDOWS\system32\EntApi.dll
.text C:\WINDOWS\system32\svchost.exe[820] kernel32.dll!GetProcAddress 7C80ADA0 5 Bytes CALL 37001160 C:\WINDOWS\system32\EntApi.dll
.text C:\WINDOWS\system32\svchost.exe[820] kernel32.dll!WriteFile 7C810D87 5 Bytes CALL 37001160 C:\WINDOWS\system32\EntApi.dll
.text C:\WINDOWS\system32\svchost.exe[820] kernel32.dll!CreatePipe 7C81E0C7 5 Bytes CALL 37001160 C:\WINDOWS\system32\EntApi.dll
.text C:\WINDOWS\system32\svchost.exe[820] kernel32.dll!PeekNamedPipe 7C85F90F 5 Bytes CALL 37001160 C:\WINDOWS\system32\EntApi.dll
.text C:\WINDOWS\system32\svchost.exe[820] kernel32.dll!WinExec 7C86136D 5 Bytes CALL 37001160 C:\WINDOWS\system32\EntApi.dll
.text C:\WINDOWS\system32\svchost.exe[820] ADVAPI32.dll!RegOpenKeyA 77DCC41B 5 Bytes CALL 37001160 C:\WINDOWS\system32\EntApi.dll
.text C:\WINDOWS\system32\svchost.exe[820] WS2_32.dll!select 719F2DC0 5 Bytes CALL 37001160 C:\WINDOWS\system32\EntApi.dll
.text C:\WINDOWS\system32\svchost.exe[820] WS2_32.dll!socket 719F3B91 5 Bytes CALL 37001160 C:\WINDOWS\system32\EntApi.dll
.text C:\WINDOWS\system32\svchost.exe[820] WS2_32.dll!bind 719F3E00 5 Bytes CALL 37001160 C:\WINDOWS\system32\EntApi.dll
.text C:\WINDOWS\system32\svchost.exe[820] WS2_32.dll!send 719F428A 5 Bytes CALL 37001160 C:\WINDOWS\system32\EntApi.dll
.text C:\WINDOWS\system32\svchost.exe[820] WS2_32.dll!recv 719F615A 5 Bytes CALL 37001160 C:\WINDOWS\system32\EntApi.dll
.text C:\WINDOWS\system32\svchost.exe[820] WININET.dll!InternetReadFile 4409ABBC 5 Bytes CALL 37001160 C:\WINDOWS\system32\EntApi.dll
.text C:\WINDOWS\system32\svchost.exe[820] WININET.dll!InternetOpenA 4409C869 5 Bytes CALL 37001160 C:\WINDOWS\system32\EntApi.dll
.text C:\WINDOWS\system32\svchost.exe[820] WININET.dll!InternetOpenUrlA 440A06DD 5 Bytes CALL 37001160 C:\WINDOWS\system32\EntApi.dll
.text C:\WINDOWS\system32\svchost.exe[876] kernel32.dll!ReadFile 7C80180E 5 Bytes CALL 37001160 C:\WINDOWS\system32\EntApi.dll
.text C:\WINDOWS\system32\svchost.exe[876] kernel32.dll!VirtualProtectEx 7C801A5D 5 Bytes CALL 37001160 C:\WINDOWS\system32\EntApi.dll
.text C:\WINDOWS\system32\svchost.exe[876] kernel32.dll!VirtualProtect 7C801AD0 5 Bytes CALL 37001160 C:\WINDOWS\system32\EntApi.dll
.text C:\WINDOWS\system32\svchost.exe[876] kernel32.dll!LoadLibraryA 7C801D77 5 Bytes CALL 37001160 C:\WINDOWS\system32\EntApi.dll
.text C:\WINDOWS\system32\svchost.exe[876] kernel32.dll!GetStartupInfoA 7C801EEE 5 Bytes CALL 37001160 C:\WINDOWS\system32\EntApi.dll
.text C:\WINDOWS\system32\svchost.exe[876] kernel32.dll!GetProcAddress 7C80ADA0 5 Bytes CALL 37001160 C:\WINDOWS\system32\EntApi.dll
.text C:\WINDOWS\system32\svchost.exe[876] kernel32.dll!WriteFile 7C810D87 5 Bytes CALL 37001160 C:\WINDOWS\system32\EntApi.dll
.text C:\WINDOWS\system32\svchost.exe[876] kernel32.dll!CreatePipe 7C81E0C7 5 Bytes CALL 37001160 C:\WINDOWS\system32\EntApi.dll
.text C:\WINDOWS\system32\svchost.exe[876] kernel32.dll!PeekNamedPipe 7C85F90F 5 Bytes CALL 37001160 C:\WINDOWS\system32\EntApi.dll
.text C:\WINDOWS\system32\svchost.exe[876] kernel32.dll!WinExec 7C86136D 5 Bytes CALL 37001160 C:\WINDOWS\system32\EntApi.dll
.text C:\WINDOWS\system32\svchost.exe[876] ADVAPI32.dll!RegOpenKeyA 77DCC41B 5 Bytes CALL 37001160 C:\WINDOWS\system32\EntApi.dll
.text C:\WINDOWS\system32\svchost.exe[876] WS2_32.dll!select 719F2DC0 5 Bytes CALL 37001160 C:\WINDOWS\system32\EntApi.dll
.text C:\WINDOWS\system32\svchost.exe[876] WS2_32.dll!socket 719F3B91 5 Bytes CALL 37001160 C:\WINDOWS\system32\EntApi.dll
.text C:\WINDOWS\system32\svchost.exe[876] WS2_32.dll!bind 719F3E00 5 Bytes CALL 37001160 C:\WINDOWS\system32\EntApi.dll
.text C:\WINDOWS\system32\svchost.exe[876] WS2_32.dll!send 719F428A 5 Bytes CALL 37001160 C:\WINDOWS\system32\EntApi.dll
.text C:\WINDOWS\system32\svchost.exe[876] WS2_32.dll!recv 719F615A 5 Bytes CALL 37001160 C:\WINDOWS\system32\EntApi.dll
.text C:\WINDOWS\system32\svchost.exe[876] WININET.dll!InternetReadFile 4409ABBC 5 Bytes CALL 37001160 C:\WINDOWS\system32\EntApi.dll
.text C:\WINDOWS\system32\svchost.exe[876] WININET.dll!InternetOpenA 4409C869 5 Bytes CALL 37001160 C:\WINDOWS\system32\EntApi.dll
.text C:\WINDOWS\system32\svchost.exe[876] WININET.dll!InternetOpenUrlA 440A06DD 5 Bytes CALL 37001160 C:\WINDOWS\system32\EntApi.dll
.text C:\WINDOWS\System32\svchost.exe[968] kernel32.dll!ReadFile 7C80180E 5 Bytes CALL 37001160 C:\WINDOWS\system32\EntApi.dll
.text C:\WINDOWS\System32\svchost.exe[968] kernel32.dll!VirtualProtectEx 7C801A5D 5 Bytes CALL 37001160 C:\WINDOWS\system32\EntApi.dll
.text C:\WINDOWS\System32\svchost.exe[968] kernel32.dll!VirtualProtect 7C801AD0 5 Bytes CALL 37001160 C:\WINDOWS\system32\EntApi.dll
.text C:\WINDOWS\System32\svchost.exe[968] kernel32.dll!LoadLibraryA 7C801D77 5 Bytes CALL 37001160 C:\WINDOWS\system32\EntApi.dll
.text C:\WINDOWS\System32\svchost.exe[968] kernel32.dll!GetStartupInfoA 7C801EEE 5 Bytes CALL 37001160 C:\WINDOWS\system32\EntApi.dll
.text C:\WINDOWS\System32\svchost.exe[968] kernel32.dll!GetProcAddress 7C80ADA0 5 Bytes CALL 37001160 C:\WINDOWS\system32\EntApi.dll
.text C:\WINDOWS\System32\svchost.exe[968] kernel32.dll!WriteFile 7C810D87 5 Bytes CALL 37001160 C:\WINDOWS\system32\EntApi.dll
.text C:\WINDOWS\System32\svchost.exe[968] kernel32.dll!CreatePipe 7C81E0C7 5 Bytes CALL 37001160 C:\WINDOWS\system32\EntApi.dll
.text C:\WINDOWS\System32\svchost.exe[968] kernel32.dll!PeekNamedPipe 7C85F90F 5 Bytes CALL 37001160 C:\WINDOWS\system32\EntApi.dll
.text C:\WINDOWS\System32\svchost.exe[968] kernel32.dll!WinExec 7C86136D 5 Bytes CALL 37001160 C:\WINDOWS\system32\EntApi.dll
.text C:\WINDOWS\System32\svchost.exe[968] ADVAPI32.dll!RegOpenKeyA 77DCC41B 5 Bytes CALL 37001160 C:\WINDOWS\system32\EntApi.dll
.text C:\WINDOWS\System32\svchost.exe[968] WS2_32.dll!select 719F2DC0 5 Bytes CALL 37001160 C:\WINDOWS\system32\EntApi.dll
.text C:\WINDOWS\System32\svchost.exe[968] WS2_32.dll!socket 719F3B91 5 Bytes CALL 37001160 C:\WINDOWS\system32\EntApi.dll
.text C:\WINDOWS\System32\svchost.exe[968] WS2_32.dll!bind 719F3E00 5 Bytes CALL 37001160 C:\WINDOWS\system32\EntApi.dll
.text C:\WINDOWS\System32\svchost.exe[968] WS2_32.dll!send 719F428A 5 Bytes CALL 37001160 C:\WINDOWS\system32\EntApi.dll
.text C:\WINDOWS\System32\svchost.exe[968] WS2_32.dll!recv 719F615A 5 Bytes CALL 37001160 C:\WINDOWS\system32\EntApi.dll
.text C:\WINDOWS\System32\svchost.exe[968] WININET.dll!InternetReadFile 4409ABBC 5 Bytes CALL 37001160 C:\WINDOWS\system32\EntApi.dll
.text C:\WINDOWS\System32\svchost.exe[968] WININET.dll!InternetOpenA 4409C869 5 Bytes CALL 37001160 C:\WINDOWS\system32\EntApi.dll
.text C:\WINDOWS\System32\svchost.exe[968] WININET.dll!InternetOpenUrlA 440A06DD 5 Bytes CALL 37001160 C:\WINDOWS\system32\EntApi.dll
.text C:\WINDOWS\System32\svchost.exe[1024] kernel32.dll!ReadFile 7C80180E 5 Bytes CALL 37001160 C:\WINDOWS\system32\EntApi.dll
.text C:\WINDOWS\System32\svchost.exe[1024] kernel32.dll!VirtualProtectEx 7C801A5D 5 Bytes CALL 37001160 C:\WINDOWS\system32\EntApi.dll
.text C:\WINDOWS\System32\svchost.exe[1024] kernel32.dll!VirtualProtect 7C801AD0 5 Bytes CALL 37001160 C:\WINDOWS\system32\EntApi.dll
.text C:\WINDOWS\System32\svchost.exe[1024] kernel32.dll!LoadLibraryA 7C801D77 5 Bytes CALL 37001160 C:\WINDOWS\system32\EntApi.dll
.text C:\WINDOWS\System32\svchost.exe[1024] kernel32.dll!GetStartupInfoA 7C801EEE 5 Bytes CALL 37001160 C:\WINDOWS\system32\EntApi.dll
.text C:\WINDOWS\System32\svchost.exe[1024] kernel32.dll!GetProcAddress 7C80ADA0 5 Bytes CALL 37001160 C:\WINDOWS\system32\EntApi.dll
.text C:\WINDOWS\System32\svchost.exe[1024] kernel32.dll!WriteFile 7C810D87 5 Bytes CALL 37001160 C:\WINDOWS\system32\EntApi.dll
.text C:\WINDOWS\System32\svchost.exe[1024] kernel32.dll!CreatePipe 7C81E0C7 5 Bytes CALL 37001160 C:\WINDOWS\system32\EntApi.dll
.text C:\WINDOWS\System32\svchost.exe[1024] kernel32.dll!PeekNamedPipe 7C85F90F 5 Bytes CALL 37001160 C:\WINDOWS\system32\EntApi.dll
.text C:\WINDOWS\System32\svchost.exe[1024] kernel32.dll!WinExec 7C86136D 5 Bytes CALL 37001160 C:\WINDOWS\system32\EntApi.dll
.text C:\WINDOWS\System32\svchost.exe[1024] ADVAPI32.dll!RegOpenKeyA 77DCC41B 5 Bytes CALL 37001160 C:\WINDOWS\system32\EntApi.dll
.text C:\WINDOWS\System32\svchost.exe[1024] WS2_32.dll!select 719F2DC0 5 Bytes CALL 37001160 C:\WINDOWS\system32\EntApi.dll
.text C:\WINDOWS\System32\svchost.exe[1024] WS2_32.dll!socket 719F3B91 5 Bytes CALL 37001160 C:\WINDOWS\system32\EntApi.dll
.text C:\WINDOWS\System32\svchost.exe[1024] WS2_32.dll!bind 719F3E00 5 Bytes CALL 37001160 C:\WINDOWS\system32\EntApi.dll
.text C:\WINDOWS\System32\svchost.exe[1024] WS2_32.dll!send 719F428A 5 Bytes CALL 37001160 C:\WINDOWS\system32\EntApi.dll
.text C:\WINDOWS\System32\svchost.exe[1024] WS2_32.dll!recv 719F615A 5 Bytes CALL 37001160 C:\WINDOWS\system32\EntApi.dll
.text C:\WINDOWS\System32\svchost.exe[1024] WININET.dll!InternetReadFile 4409ABBC 5 Bytes CALL 37001160 C:\WINDOWS\system32\EntApi.dll
.text C:\WINDOWS\System32\svchost.exe[1024] WININET.dll!InternetOpenA 4409C869 5 Bytes CALL 37001160 C:\WINDOWS\system32\EntApi.dll
.text C:\WINDOWS\System32\svchost.exe[1024] WININET.dll!InternetOpenUrlA 440A06DD 5 Bytes CALL 37001160 C:\WINDOWS\system32\EntApi.dll
.text C:\WINDOWS\Explorer.EXE[1116] kernel32.dll!ReadFile 7C80180E 5 Bytes CALL 37001160 C:\WINDOWS\system32\EntApi.dll
.text C:\WINDOWS\Explorer.EXE[1116] kernel32.dll!VirtualProtectEx 7C801A5D 5 Bytes CALL 37001160 C:\WINDOWS\system32\EntApi.dll
.text C:\WINDOWS\Explorer.EXE[1116] kernel32.dll!VirtualProtect 7C801AD0 5 Bytes CALL 37001160 C:\WINDOWS\system32\EntApi.dll
.text C:\WINDOWS\Explorer.EXE[1116] kernel32.dll!LoadLibraryA 7C801D77 5 Bytes CALL 37001160 C:\WINDOWS\system32\EntApi.dll
.text C:\WINDOWS\Explorer.EXE[1116] kernel32.dll!GetStartupInfoA 7C801EEE 5 Bytes CALL 37001160 C:\WINDOWS\system32\EntApi.dll
.text C:\WINDOWS\Explorer.EXE[1116] kernel32.dll!GetProcAddress 7C80ADA0 5 Bytes CALL 37001160 C:\WINDOWS\system32\EntApi.dll
.text C:\WINDOWS\Explorer.EXE[1116] kernel32.dll!WriteFile 7C810D87 5 Bytes CALL 37001160 C:\WINDOWS\system32\EntApi.dll
.text C:\WINDOWS\Explorer.EXE[1116] kernel32.dll!CreatePipe 7C81E0C7 5 Bytes CALL 37001160 C:\WINDOWS\system32\EntApi.dll
.text C:\WINDOWS\Explorer.EXE[1116] kernel32.dll!PeekNamedPipe 7C85F90F 5 Bytes CALL 37001160 C:\WINDOWS\system32\EntApi.dll
.text C:\WINDOWS\Explorer.EXE[1116] kernel32.dll!WinExec 7C86136D 5 Bytes CALL 37001160 C:\WINDOWS\system32\EntApi.dll
.text C:\WINDOWS\Explorer.EXE[1116] ADVAPI32.dll!RegOpenKeyA 77DCC41B 5 Bytes CALL 37001160 C:\WINDOWS\system32\EntApi.dll
.text C:\WINDOWS\Explorer.EXE[1116] WININET.dll!InternetReadFile 4409ABBC 5 Bytes CALL 37001160 C:\WINDOWS\system32\EntApi.dll
.text C:\WINDOWS\Explorer.EXE[1116] WININET.dll!InternetOpenA 4409C869 5 Bytes CALL 37001160 C:\WINDOWS\system32\EntApi.dll
.text C:\WINDOWS\Explorer.EXE[1116] WININET.dll!InternetOpenUrlA 440A06DD 5 Bytes CALL 37001160 C:\WINDOWS\system32\EntApi.dll
.text C:\WINDOWS\Explorer.EXE[1116] WS2_32.dll!select 719F2DC0 5 Bytes CALL 37001160 C:\WINDOWS\system32\EntApi.dll
.text C:\WINDOWS\Explorer.EXE[1116] WS2_32.dll!socket 719F3B91 5 Bytes CALL 37001160 C:\WINDOWS\system32\EntApi.dll
.text C:\WINDOWS\Explorer.EXE[1116] WS2_32.dll!bind 719F3E00 5 Bytes CALL 37001160 C:\WINDOWS\system32\EntApi.dll
.text C:\WINDOWS\Explorer.EXE[1116] WS2_32.dll!send 719F428A 5 Bytes CALL 37001160 C:\WINDOWS\system32\EntApi.dll
.text C:\WINDOWS\Explorer.EXE[1116] WS2_32.dll!recv 719F615A 5 Bytes CALL 37001160 C:\WINDOWS\system32\EntApi.dll
.text C:\WINDOWS\System32\svchost.exe[1136] kernel32.dll!ReadFile 7C80180E 5 Bytes CALL 37001160 C:\WINDOWS\system32\EntApi.dll
.text C:\WINDOWS\System32\svchost.exe[1136] kernel32.dll!VirtualProtectEx 7C801A5D 5 Bytes CALL 37001160 C:\WINDOWS\system32\EntApi.dll
.text C:\WINDOWS\System32\svchost.exe[1136] kernel32.dll!VirtualProtect 7C801AD0 5 Bytes CALL 37001160 C:\WINDOWS\system32\EntApi.dll
.text C:\WINDOWS\System32\svchost.exe[1136] kernel32.dll!LoadLibraryA 7C801D77 5 Bytes CALL 37001160 C:\WINDOWS\system32\EntApi.dll
.text C:\WINDOWS\System32\svchost.exe[1136] kernel32.dll!GetStartupInfoA 7C801EEE 5 Bytes CALL 37001160 C:\WINDOWS\system32\EntApi.dll
.text C:\WINDOWS\System32\svchost.exe[1136] kernel32.dll!GetProcAddress 7C80ADA0 5 Bytes CALL 37001160 C:\WINDOWS\system32\EntApi.dll
.text C:\WINDOWS\System32\svchost.exe[1136] kernel32.dll!WriteFile 7C810D87 5 Bytes CALL 37001160 C:\WINDOWS\system32\EntApi.dll
.text C:\WINDOWS\System32\svchost.exe[1136] kernel32.dll!CreatePipe 7C81E0C7 5 Bytes CALL 37001160 C:\WINDOWS\system32\EntApi.dll
.text C:\WINDOWS\System32\svchost.exe[1136] kernel32.dll!PeekNamedPipe 7C85F90F 5 Bytes CALL 37001160 C:\WINDOWS\system32\EntApi.dll
.text C:\WINDOWS\System32\svchost.exe[1136] kernel32.dll!WinExec 7C86136D 5 Bytes CALL 37001160 C:\WINDOWS\system32\EntApi.dll
.text C:\WINDOWS\System32\svchost.exe[1136] ADVAPI32.dll!RegOpenKeyA 77DCC41B 5 Bytes CALL 37001160 C:\WINDOWS\system32\EntApi.dll
.text C:\WINDOWS\System32\svchost.exe[1136] WS2_32.dll!select 719F2DC0 5 Bytes CALL 37001160 C:\WINDOWS\system32\EntApi.dll
.text C:\WINDOWS\System32\svchost.exe[1136] WS2_32.dll!socket 719F3B91 5 Bytes CALL 37001160 C:\WINDOWS\system32\EntApi.dll
.text C:\WINDOWS\System32\svchost.exe[1136] WS2_32.dll!bind 719F3E00 5 Bytes CALL 37001160 C:\WINDOWS\system32\EntApi.dll
.text C:\WINDOWS\System32\svchost.exe[1136] WS2_32.dll!send 719F428A 5 Bytes CALL 37001160 C:\WINDOWS\system32\EntApi.dll
.text C:\WINDOWS\System32\svchost.exe[1136] WS2_32.dll!recv 719F615A 5 Bytes CALL 37001160 C:\WINDOWS\system32\EntApi.dll
.text C:\WIN
0
philae83 Messages postés 12837 Date d'inscription   Statut Contributeur sécurité Dernière intervention   206
 
bonsoir,

tu as oublié le rapport hijackthis stp....

0
pascalefrugier
 
Bonjour,
RE AH JE CROYAIS OUPS
LE VOICI

Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 19:38:38, on 08/10/2007
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v7.00 (7.00.6000.16512)
Boot mode: Normal

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\Apps\ActivBoard\nhksrv.exe
C:\WINDOWS\System32\drivers\CDAC11BA.EXE
C:\WINDOWS\system32\DRIVERS\CDANTSRV.EXE
C:\Program Files\Roxio\GoBack\GBPoll.exe
C:\Program Files\Network Associates\Common Framework\FrameworkService.exe
C:\Program Files\Network Associates\VirusScan\Mcshield.exe
C:\Program Files\Network Associates\VirusScan\VsTskMgr.exe
C:\Program Files\Fichiers communs\Microsoft Shared\VS7Debug\mdm.exe
C:\WINDOWS\System32\nvsvc32.exe
C:\WINDOWS\system32\HPZipm12.exe
C:\WINDOWS\System32\svchost.exe
C:\Program Files\Virtual CD v4 SDK\system\vcssecs.exe
C:\WINDOWS\system32\fxssvc.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\SOUNDMAN.EXE
C:\PROGRA~1\MOUSEW~1\SYSTEM\EM_EXEC.EXE
C:\Apps\ActivBoard\MMKeybd.exe
C:\Program Files\Virtual CD v4 SDK\system\vcsplay.exe
C:\apps\ActivSurf\4448364\Program\backweb-4448364.exe
C:\Program Files\Real\RealPlayer\RealPlay.exe
C:\Program Files\Java\jre1.5.0_03\bin\jusched.exe
C:\Program Files\Logitech\Video\LogiTray.exe
C:\WINDOWS\system32\LVCOMSX.EXE
C:\Program Files\Network Associates\VirusScan\SHSTAT.EXE
C:\Program Files\Network Associates\Common Framework\UpdaterUI.exe
C:\Program Files\Fichiers communs\Network Associates\TalkBack\TBMon.exe
C:\Program Files\QuickTime\qttask.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\MSN Messenger\MsnMsgr.Exe
C:\Program Files\Ulead Systems\Ulead Photo Express 4.0 SE\CalCheck.exe
C:\Program Files\Logitech\Video\FxSvr2.exe
C:\Program Files\SAGEM\SAGEM F@st800\dslmon.exe
C:\Program Files\HP\Digital Imaging\bin\hpqtra08.exe
C:\Apps\ActivBoard\TrayMon.exe
C:\Apps\ActivBoard\OSD.exe
C:\Program Files\HP\Digital Imaging\bin\hpqSTE08.exe
C:\Program Files\HP\Digital Imaging\bin\hpqimzone.exe
C:\Program Files\Trend Micro\HijackThis\HijackThis.exe

R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = https://fr.yahoo.com/
R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyServer = http=proxy.club-internet.fr:8080
R3 - URLSearchHook: (no name) - {BE89472C-B803-4D1D-9A9A-0A63660E0FE3} - C:\PROGRA~1\COPERN~1\COPERN~1.DLL
O2 - BHO: Yahoo! Toolbar Helper - {02478D38-C3F9-4EFB-9B51-7695ECA05670} - C:\Program Files\Yahoo!\Companion\Installs\cpn\yt.dll
O2 - BHO: Adobe PDF Reader Link Helper - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 7.0\ActiveX\AcroIEHelper.dll
O2 - BHO: Skype add-on (mastermind) - {22BF413B-C6D2-4d91-82A9-A0F997BA588C} - C:\PROGRA~1\Skype\Phone\IEPlugin\SKYPEI~1.DLL
O2 - BHO: Windows Live Sign-in Helper - {9030D464-4C02-4ABF-8ECC-5164760863C6} - C:\Program Files\Fichiers communs\Microsoft Shared\Windows Live\WindowsLiveLogin.dll
O2 - BHO: Google Toolbar Helper - {AA58ED58-01DD-4d91-8333-CF10577473F7} - c:\program files\google\googletoolbar1.dll
O2 - BHO: SurfairyBHO Class - {BB9AAAF3-4F8D-48B5-A565-FF3E58433DC2} - C:\Program Files\Surfairy\SurfairyHlp.dll
O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE C:\WINDOWS\System32\NvCpl.dll,NvStartup
O4 - HKLM\..\Run: [SoundMan] SOUNDMAN.EXE
O4 - HKLM\..\Run: [EM_EXEC] C:\PROGRA~1\MOUSEW~1\SYSTEM\EM_EXEC.EXE
O4 - HKLM\..\Run: [ACTIVBOARD] C:\Apps\ActivBoard\MMKeybd.exe
O4 - HKLM\..\Run: [VCSPlayer] "C:\Program Files\Virtual CD v4 SDK\system\vcsplay.exe"
O4 - HKLM\..\Run: [ActivSurf] C:\apps\ActivSurf\4448364\Program\backweb-4448364.exe
O4 - HKLM\..\Run: [RealTray] C:\Program Files\Real\RealPlayer\RealPlay.exe SYSTEMBOOTHIDEPLAYER
O4 - HKLM\..\Run: [SunJavaUpdateSched] C:\Program Files\Java\jre1.5.0_03\bin\jusched.exe
O4 - HKLM\..\Run: [LogitechVideoRepair] C:\Program Files\Logitech\Video\ISStart.exe
O4 - HKLM\..\Run: [LogitechVideoTray] C:\Program Files\Logitech\Video\LogiTray.exe
O4 - HKLM\..\Run: [LVCOMSX] C:\WINDOWS\system32\LVCOMSX.EXE
O4 - HKLM\..\Run: [ShStatEXE] "C:\Program Files\Network Associates\VirusScan\SHSTAT.EXE" /STANDALONE
O4 - HKLM\..\Run: [McAfeeUpdaterUI] "C:\Program Files\Network Associates\Common Framework\UpdaterUI.exe" /StartedFromRunKey
O4 - HKLM\..\Run: [Network Associates Error Reporting Service] "C:\Program Files\Fichiers communs\Network Associates\TalkBack\TBMon.exe"
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
O4 - HKCU\..\Run: [Update Service] C:\PROGRA~1\FICHIE~1\TEKNUM~1\update.exe /startup
O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
O4 - HKCU\..\Run: [MsnMsgr] "C:\Program Files\MSN Messenger\MsnMsgr.Exe" /background
O4 - HKCU\..\Run: [NBJ] "C:\Program Files\Ahead\Nero BackItUp\NBJ.exe"
O4 - HKUS\S-1-5-18\..\Run: [CTFMON.EXE] C:\WINDOWS\System32\CTFMON.EXE (User 'SYSTEM')
O4 - HKUS\.DEFAULT\..\Run: [CTFMON.EXE] C:\WINDOWS\System32\CTFMON.EXE (User 'Default user')
O4 - Global Startup: Adobe Gamma Loader.lnk = ?
O4 - Global Startup: Contrôleur de calendrier Ulead.lnk = C:\Program Files\Ulead Systems\Ulead Photo Express 4.0 SE\CalCheck.exe
O4 - Global Startup: DSLMON.lnk = ?
O4 - Global Startup: Démarrage rapide du logiciel HP Image Zone.lnk = C:\Program Files\HP\Digital Imaging\bin\hpqthb08.exe
O4 - Global Startup: GoBack.lnk = C:\Program Files\Roxio\GoBack\GBTray.exe
O4 - Global Startup: HP Digital Imaging Monitor.lnk = C:\Program Files\HP\Digital Imaging\bin\hpqtra08.exe
O8 - Extra context menu item: &Google Search - res://C:\Program Files\Google\GoogleToolbar1.dll/cmsearch.html
O8 - Extra context menu item: &Translate English Word - res://C:\Program Files\Google\GoogleToolbar1.dll/cmwordtrans.html
O8 - Extra context menu item: Backward Links - res://C:\Program Files\Google\GoogleToolbar1.dll/cmbacklinks.html
O8 - Extra context menu item: Cached Snapshot of Page - res://C:\Program Files\Google\GoogleToolbar1.dll/cmcache.html
O8 - Extra context menu item: Chercher avec Copernic Agent - res://C:\Program Files\Copernic Agent\CopernicAgentExt.rdl/INTEGRATION_MENU_SEARCHEXT
O8 - Extra context menu item: Similar Pages - res://C:\Program Files\Google\GoogleToolbar1.dll/cmsimilar.html
O8 - Extra context menu item: Translate Page into English - res://C:\Program Files\Google\GoogleToolbar1.dll/cmtrans.html
O9 - Extra button: (no name) - {193B17B0-7C9F-4D5B-AEAB-8D3605EFC084} - C:\PROGRA~1\COPERN~1\COPERN~1.EXE
O9 - Extra 'Tools' menuitem: Démarrer Copernic Agent - {193B17B0-7C9F-4D5B-AEAB-8D3605EFC084} - C:\PROGRA~1\COPERN~1\COPERN~1.EXE
O9 - Extra button: Packard Bell - {1D49B7D4-524D-4ac9-BC34-B4822CAE4BB1} - C:\Apps\IECustom\script.htm
O9 - Extra button: Copernic Agent - {688DC797-DC11-46A7-9F1B-445F4F58CE6E} - C:\PROGRA~1\COPERN~1\COPERN~1.EXE
O9 - Extra button: Skype - {77BF5300-1474-4EC7-9980-D32B190E9B07} - C:\PROGRA~1\Skype\Phone\IEPlugin\SKYPEI~1.DLL
O9 - Extra button: (no name) - {85d1f590-48f4-11d9-9669-0800200c9a66} - C:\WINDOWS\bdoscandel.exe
O9 - Extra 'Tools' menuitem: Uninstall BitDefender Online Scanner v8 - {85d1f590-48f4-11d9-9669-0800200c9a66} - C:\WINDOWS\bdoscandel.exe
O9 - Extra button: Real.com - {CD67F990-D8E9-11d2-98FE-00C0F0318AFE} - C:\WINDOWS\System32\Shdocvw.dll
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O16 - DPF: {5D86DDB5-BDF9-441B-9E9E-D4730F4EE499} (BDSCANONLINE Control) - http://www.bitdefender.fr/scan_fr/scan8/oscan8.cab
O17 - HKLM\System\CCS\Services\Tcpip\..\{331EA7FA-D686-47B5-A520-A9EAF320F8B8}: NameServer = 200.88.127.22,196.3.5.132
O18 - Protocol: skype4com - {FFC8B962-9B40-4DFF-9458-1830C7DD7F5D} - C:\PROGRA~1\FICHIE~1\Skype\SKYPE4~1.DLL
O18 - Filter: application/xhtml+xml; charset=iso-8859-1 - {32F66A26-7614-11D4-BD11-00104BD3F987} - C:\Program Files\Design Science\MathPlayer\MathMLMimer.dll
O18 - Filter: application/xhtml+xml; charset=utf-8 - {32F66A26-7614-11D4-BD11-00104BD3F987} - C:\Program Files\Design Science\MathPlayer\MathMLMimer.dll
O18 - Filter: text/xml; charset=iso-8859-1 - {32F66A26-7614-11D4-BD11-00104BD3F987} - C:\Program Files\Design Science\MathPlayer\MathMLMimer.dll
O18 - Filter: text/xml; charset=utf-8 - {32F66A26-7614-11D4-BD11-00104BD3F987} - C:\Program Files\Design Science\MathPlayer\MathMLMimer.dll
O23 - Service: C-DillaCdaC11BA - C-Dilla Ltd - C:\WINDOWS\System32\drivers\CDAC11BA.EXE
O23 - Service: C-DillaSrv - C-Dilla Ltd - C:\WINDOWS\system32\DRIVERS\CDANTSRV.EXE
O23 - Service: GBPoll - Roxio, Inc. - C:\Program Files\Roxio\GoBack\GBPoll.exe
O23 - Service: Service Framework McAfee (McAfeeFramework) - Network Associates, Inc. - C:\Program Files\Network Associates\Common Framework\FrameworkService.exe
O23 - Service: Network Associates McShield (McShield) - Network Associates, Inc. - C:\Program Files\Network Associates\VirusScan\Mcshield.exe
O23 - Service: Network Associates Task Manager (McTaskManager) - Network Associates, Inc. - C:\Program Files\Network Associates\VirusScan\VsTskMgr.exe
O23 - Service: Netropa NHK Server (nhksrv) - Unknown owner - C:\Apps\ActivBoard\nhksrv.exe
O23 - Service: NVIDIA Driver Helper Service (NVSvc) - NVIDIA Corporation - C:\WINDOWS\System32\nvsvc32.exe
O23 - Service: Pml Driver HPZ12 - HP - C:\WINDOWS\system32\HPZipm12.exe
O23 - Service: SmartLinkService (SLService) - Smart Link - C:\WINDOWS\SYSTEM32\slserv.exe
O23 - Service: Virtual CD v4 Security service (SDK - Version) (VCSSecS) - H+H Software GmbH - C:\Program Files\Virtual CD v4 SDK\system\vcssecs.exe
0
philae83 Messages postés 12837 Date d'inscription   Statut Contributeur sécurité Dernière intervention   206
 
re bonsoir,

pas grave

* lance hijackthis puis coche et fixe cette ligne HORS CONNEXION

O2 - BHO: SurfairyBHO Class - {BB9AAAF3-4F8D-48B5-A565-FF3E58433DC2} - C:\Program Files\Surfairy\SurfairyHlp.dll

ensuite

via ajout et suppression de programme, supprime si tu le trouves
Surfairy

et supprime également le dossier

C:\Program Files\Surfairy

on pourrait faire le point maintenant. Où en es tu ? comment se comporte ton pc actuellement ?

0
pascalefrugier
 
Bonjour,
bonsoir! merci merci d'etre encore là et toujours d'attaque! même si je n'ai pas saisi ce que tu m'as fait faire il semblerait que le pc se comporte mieux, après avoir lance hijack et supprimer la ligne demandé, j'ai supprimé le fichier surfairy parcontre je ne l'ai pas trouvé dans ajout suppression programme mais j'ai supp le dossier; je viens de lancer une ouverture interner et tout fonctionne à priori car comme je te le disais c'est mon point de repère car voilà des semaines que ça ne fonctionnait pas très bien.
Dois je faire autre chose? sinon je ne sais pas comment voir si mon pc se comporte bien?
A suivre
Pascale
encore merci de ton aide et soutien
0
philae83 Messages postés 12837 Date d'inscription   Statut Contributeur sécurité Dernière intervention   206
 
ok, déjà pas si mal, pour faire encore une vérif, il faudrait refaire la manip que tu avais faite précédemment avec e scan (le rapport (long) que tu m'as envoyé par mail)

peux tu le refaire, et me le renvoyer de la même manière si il est trop long.

0