Analyse smitfraud
leon95
Messages postés
1231
Statut
Membre
-
leon95 Messages postés 1231 Statut Membre -
leon95 Messages postés 1231 Statut Membre -
Bonjour,
pouvez vous me decoder ce rapport et me dire si tout va bien...
merci d avance
SmitFraudFix v2.274
Rapport fait à 20:25:44,03, 17/01/2008
Executé à partir de C:\Documents and Settings\Administrateur\Bureau\SmitfraudFix
OS: Microsoft Windows XP [version 5.1.2600] - Windows_NT
Le type du système de fichiers est NTFS
Fix executé en mode normal
»»»»»»»»»»»»»»»»»»»»»»»» Process
C:\Windows\System32\smss.exe
C:\Windows\system32\winlogon.exe
C:\Windows\system32\services.exe
C:\Windows\system32\lsass.exe
C:\Windows\system32\svchost.exe
C:\Windows\System32\svchost.exe
C:\Windows\system32\svchost.exe
C:\Windows\system32\spoolsv.exe
C:\Program Files\Avira\AntiVir PersonalEdition Classic\sched.exe
C:\Program Files\Grisoft\AVG Anti-Spyware 7.5\guard.exe
C:\Windows\System32\svchost.exe
C:\Windows\Explorer.EXE
C:\Program Files\Java\jre6\bin\jqs.exe
C:\Windows\system32\lxcrcoms.exe
C:\Program Files\Fichiers communs\Microsoft Shared\VS7Debug\mdm.exe
C:\Windows\system32\ctfmon.exe
C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe
C:\Program Files\SpywareGuard\sgmain.exe
C:\Program Files\SpywareGuard\sgbhp.exe
C:\WINDOWS\System32\wbem\wmiapsrv.exe
C:\Program Files\Sunbelt Software\Personal Firewall\kpf4ss.exe
C:\Program Files\Sunbelt Software\Personal Firewall\kpf4gui.exe
C:\Program Files\Sunbelt Software\Personal Firewall\kpf4gui.exe
C:\Program Files\Secunia\PSI (RC1)\psi.exe
C:\Program Files\Windows Live\Messenger\usnsvc.exe
C:\Program Files\Avira\AntiVir PersonalEdition Classic\avgnt.exe
C:\Program Files\Avira\AntiVir PersonalEdition Classic\avguard.exe
C:\Program Files\Mozilla Firefox\firefox.exe
C:\Windows\system32\cmd.exe
»»»»»»»»»»»»»»»»»»»»»»»» hosts
Fichier hosts corrompu !
127.0.0.1 legal-at-spybot.info
127.0.0.1 www.legal-at-spybot.info
»»»»»»»»»»»»»»»»»»»»»»»» C:\
»»»»»»»»»»»»»»»»»»»»»»»» C:\Windows
»»»»»»»»»»»»»»»»»»»»»»»» C:\Windows\system
»»»»»»»»»»»»»»»»»»»»»»»» C:\Windows\Web
»»»»»»»»»»»»»»»»»»»»»»»» C:\Windows\system32
»»»»»»»»»»»»»»»»»»»»»»»» C:\Windows\system32\LogFiles
»»»»»»»»»»»»»»»»»»»»»»»» C:\Documents and Settings\Administrateur
»»»»»»»»»»»»»»»»»»»»»»»» C:\Documents and Settings\Administrateur\Application Data
»»»»»»»»»»»»»»»»»»»»»»»» Menu Démarrer
»»»»»»»»»»»»»»»»»»»»»»»» C:\DOCUME~1\ADMINI~1\Favoris
»»»»»»»»»»»»»»»»»»»»»»»» Bureau
»»»»»»»»»»»»»»»»»»»»»»»» C:\Program Files
»»»»»»»»»»»»»»»»»»»»»»»» Clés corrompues
»»»»»»»»»»»»»»»»»»»»»»»» Eléments du bureau
»»»»»»»»»»»»»»»»»»»»»»»» IEDFix
!!!Attention, les clés qui suivent ne sont pas forcément infectées!!!
IEDFix.exe by S!Ri
»»»»»»»»»»»»»»»»»»»»»»»» Sharedtaskscheduler
!!!Attention, les clés qui suivent ne sont pas forcément infectées!!!
SrchSTS.exe by S!Ri
Search SharedTaskScheduler's .dll
»»»»»»»»»»»»»»»»»»»»»»»» AppInit_DLLs
!!!Attention, les clés qui suivent ne sont pas forcément infectées!!!
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows]
"AppInit_DLLs"=""
»»»»»»»»»»»»»»»»»»»»»»»» Winlogon.System
!!!Attention, les clés qui suivent ne sont pas forcément infectées!!!
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon]
"System"=""
»»»»»»»»»»»»»»»»»»»»»»»» Rustock
»»»»»»»»»»»»»»»»»»»»»»»» DNS
Description: Carte réseau Fast Ethernet PCI Realtek RTL8139 Family - Miniport d'ordonnancement de paquets
DNS Server Search Order: 213.245.0.18
DNS Server Search Order: 213.245.0.26
HKLM\SYSTEM\CCS\Services\Tcpip\..\{A9A25474-D3A0-41E8-83C5-AF0CB81867BD}: DhcpNameServer=213.245.0.18 213.245.0.26
HKLM\SYSTEM\CS1\Services\Tcpip\..\{A9A25474-D3A0-41E8-83C5-AF0CB81867BD}: DhcpNameServer=213.245.0.18 213.245.0.26
HKLM\SYSTEM\CS2\Services\Tcpip\..\{A9A25474-D3A0-41E8-83C5-AF0CB81867BD}: DhcpNameServer=213.245.0.18 213.245.0.26
HKLM\SYSTEM\CS3\Services\Tcpip\..\{A9A25474-D3A0-41E8-83C5-AF0CB81867BD}: DhcpNameServer=213.245.0.18 213.245.0.26
HKLM\SYSTEM\CCS\Services\Tcpip\Parameters: DhcpNameServer=213.245.0.18 213.245.0.26
HKLM\SYSTEM\CS1\Services\Tcpip\Parameters: DhcpNameServer=213.245.0.18 213.245.0.26
HKLM\SYSTEM\CS2\Services\Tcpip\Parameters: DhcpNameServer=213.245.0.18 213.245.0.26
HKLM\SYSTEM\CS3\Services\Tcpip\Parameters: DhcpNameServer=213.245.0.18 213.245.0.26
»»»»»»»»»»»»»»»»»»»»»»»» Recherche infection wininet.dll
»»»»»»»»»»»»»»»»»»»»»»»» Fin
pouvez vous me decoder ce rapport et me dire si tout va bien...
merci d avance
SmitFraudFix v2.274
Rapport fait à 20:25:44,03, 17/01/2008
Executé à partir de C:\Documents and Settings\Administrateur\Bureau\SmitfraudFix
OS: Microsoft Windows XP [version 5.1.2600] - Windows_NT
Le type du système de fichiers est NTFS
Fix executé en mode normal
»»»»»»»»»»»»»»»»»»»»»»»» Process
C:\Windows\System32\smss.exe
C:\Windows\system32\winlogon.exe
C:\Windows\system32\services.exe
C:\Windows\system32\lsass.exe
C:\Windows\system32\svchost.exe
C:\Windows\System32\svchost.exe
C:\Windows\system32\svchost.exe
C:\Windows\system32\spoolsv.exe
C:\Program Files\Avira\AntiVir PersonalEdition Classic\sched.exe
C:\Program Files\Grisoft\AVG Anti-Spyware 7.5\guard.exe
C:\Windows\System32\svchost.exe
C:\Windows\Explorer.EXE
C:\Program Files\Java\jre6\bin\jqs.exe
C:\Windows\system32\lxcrcoms.exe
C:\Program Files\Fichiers communs\Microsoft Shared\VS7Debug\mdm.exe
C:\Windows\system32\ctfmon.exe
C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe
C:\Program Files\SpywareGuard\sgmain.exe
C:\Program Files\SpywareGuard\sgbhp.exe
C:\WINDOWS\System32\wbem\wmiapsrv.exe
C:\Program Files\Sunbelt Software\Personal Firewall\kpf4ss.exe
C:\Program Files\Sunbelt Software\Personal Firewall\kpf4gui.exe
C:\Program Files\Sunbelt Software\Personal Firewall\kpf4gui.exe
C:\Program Files\Secunia\PSI (RC1)\psi.exe
C:\Program Files\Windows Live\Messenger\usnsvc.exe
C:\Program Files\Avira\AntiVir PersonalEdition Classic\avgnt.exe
C:\Program Files\Avira\AntiVir PersonalEdition Classic\avguard.exe
C:\Program Files\Mozilla Firefox\firefox.exe
C:\Windows\system32\cmd.exe
»»»»»»»»»»»»»»»»»»»»»»»» hosts
Fichier hosts corrompu !
127.0.0.1 legal-at-spybot.info
127.0.0.1 www.legal-at-spybot.info
»»»»»»»»»»»»»»»»»»»»»»»» C:\
»»»»»»»»»»»»»»»»»»»»»»»» C:\Windows
»»»»»»»»»»»»»»»»»»»»»»»» C:\Windows\system
»»»»»»»»»»»»»»»»»»»»»»»» C:\Windows\Web
»»»»»»»»»»»»»»»»»»»»»»»» C:\Windows\system32
»»»»»»»»»»»»»»»»»»»»»»»» C:\Windows\system32\LogFiles
»»»»»»»»»»»»»»»»»»»»»»»» C:\Documents and Settings\Administrateur
»»»»»»»»»»»»»»»»»»»»»»»» C:\Documents and Settings\Administrateur\Application Data
»»»»»»»»»»»»»»»»»»»»»»»» Menu Démarrer
»»»»»»»»»»»»»»»»»»»»»»»» C:\DOCUME~1\ADMINI~1\Favoris
»»»»»»»»»»»»»»»»»»»»»»»» Bureau
»»»»»»»»»»»»»»»»»»»»»»»» C:\Program Files
»»»»»»»»»»»»»»»»»»»»»»»» Clés corrompues
»»»»»»»»»»»»»»»»»»»»»»»» Eléments du bureau
»»»»»»»»»»»»»»»»»»»»»»»» IEDFix
!!!Attention, les clés qui suivent ne sont pas forcément infectées!!!
IEDFix.exe by S!Ri
»»»»»»»»»»»»»»»»»»»»»»»» Sharedtaskscheduler
!!!Attention, les clés qui suivent ne sont pas forcément infectées!!!
SrchSTS.exe by S!Ri
Search SharedTaskScheduler's .dll
»»»»»»»»»»»»»»»»»»»»»»»» AppInit_DLLs
!!!Attention, les clés qui suivent ne sont pas forcément infectées!!!
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows]
"AppInit_DLLs"=""
»»»»»»»»»»»»»»»»»»»»»»»» Winlogon.System
!!!Attention, les clés qui suivent ne sont pas forcément infectées!!!
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon]
"System"=""
»»»»»»»»»»»»»»»»»»»»»»»» Rustock
»»»»»»»»»»»»»»»»»»»»»»»» DNS
Description: Carte réseau Fast Ethernet PCI Realtek RTL8139 Family - Miniport d'ordonnancement de paquets
DNS Server Search Order: 213.245.0.18
DNS Server Search Order: 213.245.0.26
HKLM\SYSTEM\CCS\Services\Tcpip\..\{A9A25474-D3A0-41E8-83C5-AF0CB81867BD}: DhcpNameServer=213.245.0.18 213.245.0.26
HKLM\SYSTEM\CS1\Services\Tcpip\..\{A9A25474-D3A0-41E8-83C5-AF0CB81867BD}: DhcpNameServer=213.245.0.18 213.245.0.26
HKLM\SYSTEM\CS2\Services\Tcpip\..\{A9A25474-D3A0-41E8-83C5-AF0CB81867BD}: DhcpNameServer=213.245.0.18 213.245.0.26
HKLM\SYSTEM\CS3\Services\Tcpip\..\{A9A25474-D3A0-41E8-83C5-AF0CB81867BD}: DhcpNameServer=213.245.0.18 213.245.0.26
HKLM\SYSTEM\CCS\Services\Tcpip\Parameters: DhcpNameServer=213.245.0.18 213.245.0.26
HKLM\SYSTEM\CS1\Services\Tcpip\Parameters: DhcpNameServer=213.245.0.18 213.245.0.26
HKLM\SYSTEM\CS2\Services\Tcpip\Parameters: DhcpNameServer=213.245.0.18 213.245.0.26
HKLM\SYSTEM\CS3\Services\Tcpip\Parameters: DhcpNameServer=213.245.0.18 213.245.0.26
»»»»»»»»»»»»»»»»»»»»»»»» Recherche infection wininet.dll
»»»»»»»»»»»»»»»»»»»»»»»» Fin
A voir également:
- Analyse smitfraud
- Analyse composant pc - Guide
- Analyse disque dur - Télécharger - Informations & Diagnostic
- Analyse performance pc - Guide
- Échec de l'analyse antivirus. ✓ - Forum Antivirus
- Analyse et réparation disque dur externe - Guide
94 réponses
bonsoir j ai supprime rambost mais pour ma java il m etait impossible d installer la java6 update 3..et j ai reussi a installer celle la sur le site de java..voila le rapport antivir
AntiVir PersonalEdition Classic
Report file date: lundi 21 janvier 2008 21:59
Scanning for 1060579 virus strains and unwanted programs.
Licensed to: Avira AntiVir PersonalEdition Classic
Serial number: 0000149996-ADJIE-0001
Platform: Windows XP
Windows version: (Service Pack 2) [5.1.2600]
Username: Administrateur
Computer name: UCE552
Version information:
BUILD.DAT : 270 15603 Bytes 19/09/2007 13:32:00
AVSCAN.EXE : 7.0.6.1 290856 Bytes 23/08/2007 13:16:29
AVSCAN.DLL : 7.0.6.0 49192 Bytes 16/08/2007 12:23:51
LUKE.DLL : 7.0.5.3 147496 Bytes 14/08/2007 15:32:47
LUKERES.DLL : 7.0.6.1 10280 Bytes 21/08/2007 12:35:20
ANTIVIR0.VDF : 6.40.0.0 11030528 Bytes 18/07/2007 14:27:15
ANTIVIR1.VDF : 7.0.1.95 3367424 Bytes 14/12/2007 16:02:58
ANTIVIR2.VDF : 7.0.2.0 948736 Bytes 15/01/2008 18:48:21
ANTIVIR3.VDF : 7.0.2.25 271360 Bytes 21/01/2008 20:05:44
AVEWIN32.DLL : 7.6.0.48 3080704 Bytes 17/01/2008 18:48:23
AVWINLL.DLL : 1.0.0.7 14376 Bytes 26/02/2007 10:36:26
AVPREF.DLL : 7.0.2.2 25640 Bytes 18/07/2007 07:39:17
AVREP.DLL : 7.0.0.1 155688 Bytes 16/04/2007 13:16:24
AVPACK32.DLL : 7.6.0.3 360488 Bytes 17/01/2008 18:48:23
AVREG.DLL : 7.0.1.6 30760 Bytes 18/07/2007 07:17:06
AVARKT.DLL : 1.0.0.20 278568 Bytes 28/08/2007 12:26:33
AVEVTLOG.DLL : 7.0.0.20 86056 Bytes 18/07/2007 07:10:18
NETNT.DLL : 7.0.0.0 7720 Bytes 08/03/2007 11:09:42
RCIMAGE.DLL : 7.0.1.30 2342952 Bytes 07/08/2007 12:38:13
RCTEXT.DLL : 7.0.62.0 86056 Bytes 21/08/2007 12:50:37
SQLITE3.DLL : 3.3.17.1 339968 Bytes 23/07/2007 09:37:21
Configuration settings for the scan:
Jobname..........................: Complete system scan
Configuration file...............: c:\program files\avira\antivir personaledition classic\sysscan.avp
Logging..........................: low
Primary action...................: interactive
Secondary action.................: ignore
Scan master boot sector..........: on
Scan boot sector.................: on
Boot sectors.....................: C:,
Scan memory......................: on
Process scan.....................: on
Scan registry....................: on
Search for rootkits..............: on
Scan all files...................: All files
Scan archives....................: on
Recursion depth..................: 20
Smart extensions.................: on
Macro heuristic..................: on
File heuristic...................: medium
Start of the scan: lundi 21 janvier 2008 21:59
Starting search for hidden objects.
The driver could not be initialized.
The scan of running processes will be started
Scan process 'avscan.exe' - '1' Module(s) have been scanned
Scan process 'avcenter.exe' - '1' Module(s) have been scanned
Scan process 'explorer.exe' - '1' Module(s) have been scanned
Scan process 'svchost.exe' - '1' Module(s) have been scanned
Scan process 'guard.exe' - '1' Module(s) have been scanned
Scan process 'svchost.exe' - '1' Module(s) have been scanned
Scan process 'svchost.exe' - '1' Module(s) have been scanned
Scan process 'lsass.exe' - '1' Module(s) have been scanned
Scan process 'services.exe' - '1' Module(s) have been scanned
Scan process 'winlogon.exe' - '1' Module(s) have been scanned
Scan process 'csrss.exe' - '1' Module(s) have been scanned
Scan process 'smss.exe' - '1' Module(s) have been scanned
12 processes with 12 modules were scanned
Starting master boot sector scan:
Master boot sector HD0
[NOTE] No virus was found!
Start scanning boot sectors:
Boot sector 'C:\'
[NOTE] No virus was found!
Starting to scan the registry.
The registry was scanned ( '17' files ).
Starting the file scan:
Begin scan in 'C:\'
C:\pagefile.sys
[WARNING] The file could not be opened!
End of the scan: mardi 22 janvier 2008 00:45
Used time: 2:46:40 min
The scan has been done completely.
4447 Scanning directories
273353 Files were scanned
0 viruses and/or unwanted programs were found
0 Files were classified as suspicious:
0 files were deleted
0 files were repaired
0 files were moved to quarantine
0 files were renamed
1 Files cannot be scanned
273353 Files not concerned
6971 Archives were scanned
1 Warnings
0 Notes
AntiVir PersonalEdition Classic
Report file date: lundi 21 janvier 2008 21:59
Scanning for 1060579 virus strains and unwanted programs.
Licensed to: Avira AntiVir PersonalEdition Classic
Serial number: 0000149996-ADJIE-0001
Platform: Windows XP
Windows version: (Service Pack 2) [5.1.2600]
Username: Administrateur
Computer name: UCE552
Version information:
BUILD.DAT : 270 15603 Bytes 19/09/2007 13:32:00
AVSCAN.EXE : 7.0.6.1 290856 Bytes 23/08/2007 13:16:29
AVSCAN.DLL : 7.0.6.0 49192 Bytes 16/08/2007 12:23:51
LUKE.DLL : 7.0.5.3 147496 Bytes 14/08/2007 15:32:47
LUKERES.DLL : 7.0.6.1 10280 Bytes 21/08/2007 12:35:20
ANTIVIR0.VDF : 6.40.0.0 11030528 Bytes 18/07/2007 14:27:15
ANTIVIR1.VDF : 7.0.1.95 3367424 Bytes 14/12/2007 16:02:58
ANTIVIR2.VDF : 7.0.2.0 948736 Bytes 15/01/2008 18:48:21
ANTIVIR3.VDF : 7.0.2.25 271360 Bytes 21/01/2008 20:05:44
AVEWIN32.DLL : 7.6.0.48 3080704 Bytes 17/01/2008 18:48:23
AVWINLL.DLL : 1.0.0.7 14376 Bytes 26/02/2007 10:36:26
AVPREF.DLL : 7.0.2.2 25640 Bytes 18/07/2007 07:39:17
AVREP.DLL : 7.0.0.1 155688 Bytes 16/04/2007 13:16:24
AVPACK32.DLL : 7.6.0.3 360488 Bytes 17/01/2008 18:48:23
AVREG.DLL : 7.0.1.6 30760 Bytes 18/07/2007 07:17:06
AVARKT.DLL : 1.0.0.20 278568 Bytes 28/08/2007 12:26:33
AVEVTLOG.DLL : 7.0.0.20 86056 Bytes 18/07/2007 07:10:18
NETNT.DLL : 7.0.0.0 7720 Bytes 08/03/2007 11:09:42
RCIMAGE.DLL : 7.0.1.30 2342952 Bytes 07/08/2007 12:38:13
RCTEXT.DLL : 7.0.62.0 86056 Bytes 21/08/2007 12:50:37
SQLITE3.DLL : 3.3.17.1 339968 Bytes 23/07/2007 09:37:21
Configuration settings for the scan:
Jobname..........................: Complete system scan
Configuration file...............: c:\program files\avira\antivir personaledition classic\sysscan.avp
Logging..........................: low
Primary action...................: interactive
Secondary action.................: ignore
Scan master boot sector..........: on
Scan boot sector.................: on
Boot sectors.....................: C:,
Scan memory......................: on
Process scan.....................: on
Scan registry....................: on
Search for rootkits..............: on
Scan all files...................: All files
Scan archives....................: on
Recursion depth..................: 20
Smart extensions.................: on
Macro heuristic..................: on
File heuristic...................: medium
Start of the scan: lundi 21 janvier 2008 21:59
Starting search for hidden objects.
The driver could not be initialized.
The scan of running processes will be started
Scan process 'avscan.exe' - '1' Module(s) have been scanned
Scan process 'avcenter.exe' - '1' Module(s) have been scanned
Scan process 'explorer.exe' - '1' Module(s) have been scanned
Scan process 'svchost.exe' - '1' Module(s) have been scanned
Scan process 'guard.exe' - '1' Module(s) have been scanned
Scan process 'svchost.exe' - '1' Module(s) have been scanned
Scan process 'svchost.exe' - '1' Module(s) have been scanned
Scan process 'lsass.exe' - '1' Module(s) have been scanned
Scan process 'services.exe' - '1' Module(s) have been scanned
Scan process 'winlogon.exe' - '1' Module(s) have been scanned
Scan process 'csrss.exe' - '1' Module(s) have been scanned
Scan process 'smss.exe' - '1' Module(s) have been scanned
12 processes with 12 modules were scanned
Starting master boot sector scan:
Master boot sector HD0
[NOTE] No virus was found!
Start scanning boot sectors:
Boot sector 'C:\'
[NOTE] No virus was found!
Starting to scan the registry.
The registry was scanned ( '17' files ).
Starting the file scan:
Begin scan in 'C:\'
C:\pagefile.sys
[WARNING] The file could not be opened!
End of the scan: mardi 22 janvier 2008 00:45
Used time: 2:46:40 min
The scan has been done completely.
4447 Scanning directories
273353 Files were scanned
0 viruses and/or unwanted programs were found
0 Files were classified as suspicious:
0 files were deleted
0 files were repaired
0 files were moved to quarantine
0 files were renamed
1 Files cannot be scanned
273353 Files not concerned
6971 Archives were scanned
1 Warnings
0 Notes
et voila un dernier rapport tout neuf
Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 01:24:37, on 22/01/2008
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v7.00 (7.00.6000.16574)
Boot mode: Normal
Running processes:
C:\Windows\System32\smss.exe
C:\Windows\system32\winlogon.exe
C:\Windows\system32\services.exe
C:\Windows\system32\lsass.exe
C:\Windows\system32\svchost.exe
C:\Windows\System32\svchost.exe
C:\Windows\system32\svchost.exe
C:\Windows\system32\spoolsv.exe
C:\Program Files\Avira\AntiVir PersonalEdition Classic\avguard.exe
C:\Windows\Explorer.EXE
C:\Program Files\Avira\AntiVir PersonalEdition Classic\sched.exe
C:\Program Files\Grisoft\AVG Anti-Spyware 7.5\guard.exe
C:\Windows\System32\svchost.exe
C:\Program Files\Java\jre6\bin\jqs.exe
C:\Program Files\Avira\AntiVir PersonalEdition Classic\avgnt.exe
C:\Windows\system32\ctfmon.exe
C:\Windows\system32\lxcrcoms.exe
C:\Program Files\Fichiers communs\Microsoft Shared\VS7Debug\mdm.exe
C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe
C:\Program Files\SpywareGuard\sgmain.exe
C:\Program Files\SpywareGuard\sgbhp.exe
C:\WINDOWS\System32\wbem\wmiapsrv.exe
C:\Program Files\Sunbelt Software\Personal Firewall\kpf4ss.exe
C:\Program Files\Sunbelt Software\Personal Firewall\kpf4gui.exe
C:\Program Files\Sunbelt Software\Personal Firewall\kpf4gui.exe
C:\Program Files\Secunia\PSI (RC1)\psi.exe
C:\Program Files\Mozilla Firefox\firefox.exe
C:\Program Files\Trend Micro\HijackThis\HijackThis.exe
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = https://www.google.fr/?gws_rd=ssl
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Local Page =
R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName = Liens
R3 - URLSearchHook: (no name) - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - (no file)
O2 - BHO: Aide pour le lien d'Adobe PDF Reader - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Fichiers communs\Adobe\Acrobat\ActiveX\AcroIEHelper.dll
O2 - BHO: SpywareGuard Download Protection - {4A368E80-174F-4872-96B5-0B27DDD11DB2} - C:\Program Files\SpywareGuard\dlprotect.dll
O2 - BHO: Spybot-S&D IE Protection - {53707962-6F74-2D53-2644-206D7942484F} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre6\bin\ssv.dll
O2 - BHO: Programme d'aide de l'Assistant de connexion Windows Live - {9030D464-4C02-4ABF-8ECC-5164760863C6} - C:\Program Files\Fichiers communs\Microsoft Shared\Windows Live\WindowsLiveLogin.dll
O4 - HKLM\..\Run: [LXCRCATS] rundll32 C:\Windows\System32\spool\DRIVERS\W32X86\3\LXCRtime.dll,_RunDLLEntry@16
O4 - HKLM\..\Run: [avgnt] "C:\Program Files\Avira\AntiVir PersonalEdition Classic\avgnt.exe" /min
O4 - HKCU\..\Run: [ctfmon.exe] C:\Windows\system32\ctfmon.exe
O4 - HKCU\..\Run: [SpybotSD TeaTimer] "C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe"
O4 - HKUS\S-1-5-19\..\Run: [CTFMON.EXE] C:\WINDOWS\System32\CTFMON.EXE (User 'SERVICE LOCAL')
O4 - HKUS\S-1-5-20\..\Run: [CTFMON.EXE] C:\WINDOWS\System32\CTFMON.EXE (User 'SERVICE RÉSEAU')
O4 - HKUS\S-1-5-18\..\Run: [CTFMON.EXE] C:\Windows\System32\CTFMON.EXE (User 'SYSTEM')
O4 - HKUS\.DEFAULT\..\Run: [CTFMON.EXE] C:\Windows\System32\CTFMON.EXE (User 'Default user')
O4 - Startup: Secunia PSI (RC1).lnk = C:\Program Files\Secunia\PSI (RC1)\psi.exe
O4 - Startup: SpywareGuard.lnk = C:\Program Files\SpywareGuard\sgmain.exe
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre6\bin\npjpi160_10.dll
O9 - Extra 'Tools' menuitem: Console Java (Sun) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre6\bin\npjpi160_10.dll
O9 - Extra button: (no name) - {85d1f590-48f4-11d9-9669-0800200c9a66} - C:\Windows\bdoscandel.exe
O9 - Extra 'Tools' menuitem: Uninstall BitDefender Online Scanner v8 - {85d1f590-48f4-11d9-9669-0800200c9a66} - C:\Windows\bdoscandel.exe
O9 - Extra button: (no name) - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O9 - Extra 'Tools' menuitem: Spybot - Search & Destroy Configuration - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O16 - DPF: {30528230-99f7-4bb4-88d8-fa1d4f56a2ab} -
O16 - DPF: {5D86DDB5-BDF9-441B-9E9E-D4730F4EE499} (BDSCANONLINE Control) - http://www.bitdefender.fr/scan_fr/scan8/oscan8.cab
O16 - DPF: {5ED80217-570B-4DA9-BF44-BE107C0EC166} -
O23 - Service: AntiVir PersonalEdition Classic Scheduler (AntiVirScheduler) - Avira GmbH - C:\Program Files\Avira\AntiVir PersonalEdition Classic\sched.exe
O23 - Service: AntiVir PersonalEdition Classic Guard (AntiVirService) - Avira GmbH - C:\Program Files\Avira\AntiVir PersonalEdition Classic\avguard.exe
O23 - Service: AVG Anti-Spyware Guard - GRISOFT s.r.o. - C:\Program Files\Grisoft\AVG Anti-Spyware 7.5\guard.exe
O23 - Service: Java Quick Starter (JavaQuickStarterService) - Sun Microsystems, Inc. - C:\Program Files\Java\jre6\bin\jqs.exe
O23 - Service: lxcr_device - - C:\Windows\system32\lxcrcoms.exe
O23 - Service: Sunbelt Personal Firewall 4 (SPF4) - Sunbelt Software - C:\Program Files\Sunbelt Software\Personal Firewall\kpf4ss.exe
Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 01:24:37, on 22/01/2008
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v7.00 (7.00.6000.16574)
Boot mode: Normal
Running processes:
C:\Windows\System32\smss.exe
C:\Windows\system32\winlogon.exe
C:\Windows\system32\services.exe
C:\Windows\system32\lsass.exe
C:\Windows\system32\svchost.exe
C:\Windows\System32\svchost.exe
C:\Windows\system32\svchost.exe
C:\Windows\system32\spoolsv.exe
C:\Program Files\Avira\AntiVir PersonalEdition Classic\avguard.exe
C:\Windows\Explorer.EXE
C:\Program Files\Avira\AntiVir PersonalEdition Classic\sched.exe
C:\Program Files\Grisoft\AVG Anti-Spyware 7.5\guard.exe
C:\Windows\System32\svchost.exe
C:\Program Files\Java\jre6\bin\jqs.exe
C:\Program Files\Avira\AntiVir PersonalEdition Classic\avgnt.exe
C:\Windows\system32\ctfmon.exe
C:\Windows\system32\lxcrcoms.exe
C:\Program Files\Fichiers communs\Microsoft Shared\VS7Debug\mdm.exe
C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe
C:\Program Files\SpywareGuard\sgmain.exe
C:\Program Files\SpywareGuard\sgbhp.exe
C:\WINDOWS\System32\wbem\wmiapsrv.exe
C:\Program Files\Sunbelt Software\Personal Firewall\kpf4ss.exe
C:\Program Files\Sunbelt Software\Personal Firewall\kpf4gui.exe
C:\Program Files\Sunbelt Software\Personal Firewall\kpf4gui.exe
C:\Program Files\Secunia\PSI (RC1)\psi.exe
C:\Program Files\Mozilla Firefox\firefox.exe
C:\Program Files\Trend Micro\HijackThis\HijackThis.exe
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = https://www.google.fr/?gws_rd=ssl
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Local Page =
R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName = Liens
R3 - URLSearchHook: (no name) - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - (no file)
O2 - BHO: Aide pour le lien d'Adobe PDF Reader - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Fichiers communs\Adobe\Acrobat\ActiveX\AcroIEHelper.dll
O2 - BHO: SpywareGuard Download Protection - {4A368E80-174F-4872-96B5-0B27DDD11DB2} - C:\Program Files\SpywareGuard\dlprotect.dll
O2 - BHO: Spybot-S&D IE Protection - {53707962-6F74-2D53-2644-206D7942484F} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre6\bin\ssv.dll
O2 - BHO: Programme d'aide de l'Assistant de connexion Windows Live - {9030D464-4C02-4ABF-8ECC-5164760863C6} - C:\Program Files\Fichiers communs\Microsoft Shared\Windows Live\WindowsLiveLogin.dll
O4 - HKLM\..\Run: [LXCRCATS] rundll32 C:\Windows\System32\spool\DRIVERS\W32X86\3\LXCRtime.dll,_RunDLLEntry@16
O4 - HKLM\..\Run: [avgnt] "C:\Program Files\Avira\AntiVir PersonalEdition Classic\avgnt.exe" /min
O4 - HKCU\..\Run: [ctfmon.exe] C:\Windows\system32\ctfmon.exe
O4 - HKCU\..\Run: [SpybotSD TeaTimer] "C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe"
O4 - HKUS\S-1-5-19\..\Run: [CTFMON.EXE] C:\WINDOWS\System32\CTFMON.EXE (User 'SERVICE LOCAL')
O4 - HKUS\S-1-5-20\..\Run: [CTFMON.EXE] C:\WINDOWS\System32\CTFMON.EXE (User 'SERVICE RÉSEAU')
O4 - HKUS\S-1-5-18\..\Run: [CTFMON.EXE] C:\Windows\System32\CTFMON.EXE (User 'SYSTEM')
O4 - HKUS\.DEFAULT\..\Run: [CTFMON.EXE] C:\Windows\System32\CTFMON.EXE (User 'Default user')
O4 - Startup: Secunia PSI (RC1).lnk = C:\Program Files\Secunia\PSI (RC1)\psi.exe
O4 - Startup: SpywareGuard.lnk = C:\Program Files\SpywareGuard\sgmain.exe
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre6\bin\npjpi160_10.dll
O9 - Extra 'Tools' menuitem: Console Java (Sun) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre6\bin\npjpi160_10.dll
O9 - Extra button: (no name) - {85d1f590-48f4-11d9-9669-0800200c9a66} - C:\Windows\bdoscandel.exe
O9 - Extra 'Tools' menuitem: Uninstall BitDefender Online Scanner v8 - {85d1f590-48f4-11d9-9669-0800200c9a66} - C:\Windows\bdoscandel.exe
O9 - Extra button: (no name) - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O9 - Extra 'Tools' menuitem: Spybot - Search & Destroy Configuration - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O16 - DPF: {30528230-99f7-4bb4-88d8-fa1d4f56a2ab} -
O16 - DPF: {5D86DDB5-BDF9-441B-9E9E-D4730F4EE499} (BDSCANONLINE Control) - http://www.bitdefender.fr/scan_fr/scan8/oscan8.cab
O16 - DPF: {5ED80217-570B-4DA9-BF44-BE107C0EC166} -
O23 - Service: AntiVir PersonalEdition Classic Scheduler (AntiVirScheduler) - Avira GmbH - C:\Program Files\Avira\AntiVir PersonalEdition Classic\sched.exe
O23 - Service: AntiVir PersonalEdition Classic Guard (AntiVirService) - Avira GmbH - C:\Program Files\Avira\AntiVir PersonalEdition Classic\avguard.exe
O23 - Service: AVG Anti-Spyware Guard - GRISOFT s.r.o. - C:\Program Files\Grisoft\AVG Anti-Spyware 7.5\guard.exe
O23 - Service: Java Quick Starter (JavaQuickStarterService) - Sun Microsystems, Inc. - C:\Program Files\Java\jre6\bin\jqs.exe
O23 - Service: lxcr_device - - C:\Windows\system32\lxcrcoms.exe
O23 - Service: Sunbelt Personal Firewall 4 (SPF4) - Sunbelt Software - C:\Program Files\Sunbelt Software\Personal Firewall\kpf4ss.exe
Vous n’avez pas trouvé la réponse que vous recherchez ?
Posez votre question
relance hijack
scan only
C:\Program Files\Java\jre6\bin\jqs.exe
O16 - DPF: {30528230-99f7-4bb4-88d8-fa1d4f56a2ab} -
O23 - Service: Java Quick Starter (JavaQuickStarterService) - Sun Microsystems, Inc. - C:\Program Files\Java\jre6\bin\jqs.exe
Coches ces lignes et clic sur fix checked...
Ensuite tu vas télécharger
1.Télécharge SDfix (ICI)http://downloads.andymanchesta.com/RemovalTools/SDFix.exe
Imprime ou note ce que tu dois faire car quand tu seras en mode sans echec tu n'auras pas acces à internet.
Double-clique sur SDFix.exe pour lancer l'installation.
Clique sur Install : cela va créer un dossier (à la racine du disque dur par défaut) nommé SDFix
A- redémarre en mode sans echec (Comment faire? Redémarre en mode Sans Échec
(au démarrage, tapote immédiatement la touche F8), puis tu verras un écran avec choix de démarrages :
choisis Mode sans échec avec les flèches du clavier, puis valide avec Entrée.
Choisis ton compte usuel (et non Administrateur).
B- double-clique sur RunThis.bat puis tape Y puis appuyez sur la touche Entrée de votre clavier, afin de lancer le nettoyage !
C- A un certain moment , Appuye sur une touche de votre clavier pour redémarrer
le PC.
D- Colle le rapport généré dans ton prochain message
scan only
C:\Program Files\Java\jre6\bin\jqs.exe
O16 - DPF: {30528230-99f7-4bb4-88d8-fa1d4f56a2ab} -
O23 - Service: Java Quick Starter (JavaQuickStarterService) - Sun Microsystems, Inc. - C:\Program Files\Java\jre6\bin\jqs.exe
Coches ces lignes et clic sur fix checked...
Ensuite tu vas télécharger
1.Télécharge SDfix (ICI)http://downloads.andymanchesta.com/RemovalTools/SDFix.exe
Imprime ou note ce que tu dois faire car quand tu seras en mode sans echec tu n'auras pas acces à internet.
Double-clique sur SDFix.exe pour lancer l'installation.
Clique sur Install : cela va créer un dossier (à la racine du disque dur par défaut) nommé SDFix
A- redémarre en mode sans echec (Comment faire? Redémarre en mode Sans Échec
(au démarrage, tapote immédiatement la touche F8), puis tu verras un écran avec choix de démarrages :
choisis Mode sans échec avec les flèches du clavier, puis valide avec Entrée.
Choisis ton compte usuel (et non Administrateur).
B- double-clique sur RunThis.bat puis tape Y puis appuyez sur la touche Entrée de votre clavier, afin de lancer le nettoyage !
C- A un certain moment , Appuye sur une touche de votre clavier pour redémarrer
le PC.
D- Colle le rapport généré dans ton prochain message
voila j ai fixe les deux lignes j ai telecharge sdfix et ensuite double clic puis install en mode normal..maintenant je dois redemarrer en mode sans echec mais je vais le chercher ou runthis bat..merci et voila moi j ai un seul compte administrateur et rien d autre..et je sais pas comment faire..
Mais non, ne t'inquiétes pas pour si peu, tu accédes au mode sans échec, c'est de la routine...
Le compte administrateur représent ton compte usuel, c'est pour le différencier des autres... dans ce mode tu as la main "experte" sur ton pc..
Le compte administrateur représent ton compte usuel, c'est pour le différencier des autres... dans ce mode tu as la main "experte" sur ton pc..
voila j ai deux rapports tu me diras..en voila deja un
catchme 0.3.1344.2 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2008-01-22 02:37:54
Windows 5.1.2600 Service Pack 2 NTFS
scanning hidden processes ...
scanning hidden services & system hive ...
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet003\Services\aspnet_state\Performance]
"Library"="C:\Windows\Microsoft.NET\Framework\v2.0.50727\aspnet_perf.dll"
"Open"="OpenStateServicePerfData"
"Close"="CloseStateServicePerfData"
"Collect"="CollectStateServicePerfData"
"Last Counter"=dword:00000d44
"Last Help"=dword:00000d45
"First Counter"=dword:00000c7e
"First Help"=dword:00000c7f
"Object List"="3198 3198 3198 3198 3198 3198 3198 3198 3198 3198 3198 3198 3198 3198 3198 3198 3198 3198 3198 3198 3198 3198 3198 3198"
"WbemAdapFileSize"=dword:00005c00
"WbemAdapStatus"=dword:00000000
scanning hidden registry entries ...
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\System]
"OODEFRAG08.00.00.01WORKSTATION"="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"
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Media Connect\MAC Access Control\Allowed MACs]
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Media Connect\MAC Access Control\Denied MACs]
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Media Connect\MAC Access Control\Launched Apps]
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Media Connect\MAC Access Control\Rejected MACs]
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Media Connect\Users\S-1-5-21-257621693-4282951562-813958858-500]
"UserFolderName"=""
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Media Connect\Users\S-1-5-21-257621693-4282951562-813958858-500\101]
"Name"="101"
"FriendlyName"="TODO"
"GlobalVolumeName"="\\?\Volume{ec2ce060-63b0-11d7-9219-806d6172696f}\"
"GlobalVolumePath"="\Documents and Settings\Administrateur\Mes documents\Ma musique"
"LocalDrive"="C:"
"LocalPath"="\Documents and Settings\Administrateur\Mes documents\Ma musique"
"ShareWithEveryone"="True"
"ShareWithApprovedDevices"="False"
"State"="False"
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Media Connect\Users\S-1-5-21-257621693-4282951562-813958858-500\101\Approved]
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Media Connect\Users\S-1-5-21-257621693-4282951562-813958858-500\102]
"Name"="102"
"FriendlyName"="TODO"
"GlobalVolumeName"="\\?\Volume{ec2ce060-63b0-11d7-9219-806d6172696f}\"
"GlobalVolumePath"="\Documents and Settings\Administrateur\Mes documents\Mes images"
"LocalDrive"="C:"
"LocalPath"="\Documents and Settings\Administrateur\Mes documents\Mes images"
"ShareWithEveryone"="True"
"ShareWithApprovedDevices"="False"
"State"="False"
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Media Connect\Users\S-1-5-21-257621693-4282951562-813958858-500\102\Approved]
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Media Connect\Users\S-1-5-21-257621693-4282951562-813958858-500\103]
"Name"="103"
"FriendlyName"="TODO"
"GlobalVolumeName"="\\?\Volume{ec2ce060-63b0-11d7-9219-806d6172696f}\"
"GlobalVolumePath"="\Documents and Settings\Administrateur\Mes documents\Mes vid\xe9os"
"LocalDrive"="C:"
"LocalPath"="\Documents and Settings\Administrateur\Mes documents\Mes vid\xe9os"
"ShareWithEveryone"="True"
"ShareWithApprovedDevices"="False"
"State"="False"
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Media Connect\Users\S-1-5-21-257621693-4282951562-813958858-500\103\Approved]
scanning hidden files ...
scan completed successfully
hidden processes: 0
hidden services: 0
hidden files: 15
catchme 0.3.1344.2 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2008-01-22 02:37:54
Windows 5.1.2600 Service Pack 2 NTFS
scanning hidden processes ...
scanning hidden services & system hive ...
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet003\Services\aspnet_state\Performance]
"Library"="C:\Windows\Microsoft.NET\Framework\v2.0.50727\aspnet_perf.dll"
"Open"="OpenStateServicePerfData"
"Close"="CloseStateServicePerfData"
"Collect"="CollectStateServicePerfData"
"Last Counter"=dword:00000d44
"Last Help"=dword:00000d45
"First Counter"=dword:00000c7e
"First Help"=dword:00000c7f
"Object List"="3198 3198 3198 3198 3198 3198 3198 3198 3198 3198 3198 3198 3198 3198 3198 3198 3198 3198 3198 3198 3198 3198 3198 3198"
"WbemAdapFileSize"=dword:00005c00
"WbemAdapStatus"=dword:00000000
scanning hidden registry entries ...
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\System]
"OODEFRAG08.00.00.01WORKSTATION"="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"
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Media Connect\MAC Access Control\Allowed MACs]
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Media Connect\MAC Access Control\Denied MACs]
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Media Connect\MAC Access Control\Launched Apps]
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Media Connect\MAC Access Control\Rejected MACs]
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Media Connect\Users\S-1-5-21-257621693-4282951562-813958858-500]
"UserFolderName"=""
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Media Connect\Users\S-1-5-21-257621693-4282951562-813958858-500\101]
"Name"="101"
"FriendlyName"="TODO"
"GlobalVolumeName"="\\?\Volume{ec2ce060-63b0-11d7-9219-806d6172696f}\"
"GlobalVolumePath"="\Documents and Settings\Administrateur\Mes documents\Ma musique"
"LocalDrive"="C:"
"LocalPath"="\Documents and Settings\Administrateur\Mes documents\Ma musique"
"ShareWithEveryone"="True"
"ShareWithApprovedDevices"="False"
"State"="False"
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Media Connect\Users\S-1-5-21-257621693-4282951562-813958858-500\101\Approved]
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Media Connect\Users\S-1-5-21-257621693-4282951562-813958858-500\102]
"Name"="102"
"FriendlyName"="TODO"
"GlobalVolumeName"="\\?\Volume{ec2ce060-63b0-11d7-9219-806d6172696f}\"
"GlobalVolumePath"="\Documents and Settings\Administrateur\Mes documents\Mes images"
"LocalDrive"="C:"
"LocalPath"="\Documents and Settings\Administrateur\Mes documents\Mes images"
"ShareWithEveryone"="True"
"ShareWithApprovedDevices"="False"
"State"="False"
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Media Connect\Users\S-1-5-21-257621693-4282951562-813958858-500\102\Approved]
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Media Connect\Users\S-1-5-21-257621693-4282951562-813958858-500\103]
"Name"="103"
"FriendlyName"="TODO"
"GlobalVolumeName"="\\?\Volume{ec2ce060-63b0-11d7-9219-806d6172696f}\"
"GlobalVolumePath"="\Documents and Settings\Administrateur\Mes documents\Mes vid\xe9os"
"LocalDrive"="C:"
"LocalPath"="\Documents and Settings\Administrateur\Mes documents\Mes vid\xe9os"
"ShareWithEveryone"="True"
"ShareWithApprovedDevices"="False"
"State"="False"
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Media Connect\Users\S-1-5-21-257621693-4282951562-813958858-500\103\Approved]
scanning hidden files ...
scan completed successfully
hidden processes: 0
hidden services: 0
hidden files: 15
et voilal autre
SDFix: Version 1.129
Run by Administrateur on 22/01/2008 at 02:18
Microsoft Windows XP [version 5.1.2600]
Running From: C:\SDFix
Safe Mode:
Checking Services:
Restoring Windows Registry Values
Restoring Windows Default Hosts File
Rebooting...
Normal Mode:
Checking Files:
No Trojan Files Found
Removing Temp Files...
ADS Check:
C:\Windows
No streams found.
C:\Windows\system32
No streams found.
C:\Windows\system32\svchost.exe
No streams found.
C:\Windows\system32\ntoskrnl.exe
No streams found.
Final Check:
catchme 0.3.1344.2 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2008-01-22 02:37:54
Windows 5.1.2600 Service Pack 2 NTFS
scanning hidden processes ...
scanning hidden services & system hive ...
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet003\Services\aspnet_state\Performance]
"Library"="C:\Windows\Microsoft.NET\Framework\v2.0.50727\aspnet_perf.dll"
"Open"="OpenStateServicePerfData"
"Close"="CloseStateServicePerfData"
"Collect"="CollectStateServicePerfData"
"Last Counter"=dword:00000d44
"Last Help"=dword:00000d45
"First Counter"=dword:00000c7e
"First Help"=dword:00000c7f
"Object List"="3198 3198 3198 3198 3198 3198 3198 3198 3198 3198 3198 3198 3198 3198 3198 3198 3198 3198 3198 3198 3198 3198 3198 3198"
"WbemAdapFileSize"=dword:00005c00
"WbemAdapStatus"=dword:00000000
scanning hidden registry entries ...
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\System]
"OODEFRAG08.00.00.01WORKSTATION"="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"
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Media Connect\MAC Access Control\Allowed MACs]
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Media Connect\MAC Access Control\Denied MACs]
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Media Connect\MAC Access Control\Launched Apps]
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Media Connect\MAC Access Control\Rejected MACs]
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Media Connect\Users\S-1-5-21-257621693-4282951562-813958858-500]
"UserFolderName"=""
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Media Connect\Users\S-1-5-21-257621693-4282951562-813958858-500\101]
"Name"="101"
"FriendlyName"="TODO"
"GlobalVolumeName"="\\?\Volume{ec2ce060-63b0-11d7-9219-806d6172696f}\"
"GlobalVolumePath"="\Documents and Settings\Administrateur\Mes documents\Ma musique"
"LocalDrive"="C:"
"LocalPath"="\Documents and Settings\Administrateur\Mes documents\Ma musique"
"ShareWithEveryone"="True"
"ShareWithApprovedDevices"="False"
"State"="False"
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Media Connect\Users\S-1-5-21-257621693-4282951562-813958858-500\101\Approved]
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Media Connect\Users\S-1-5-21-257621693-4282951562-813958858-500\102]
"Name"="102"
"FriendlyName"="TODO"
"GlobalVolumeName"="\\?\Volume{ec2ce060-63b0-11d7-9219-806d6172696f}\"
"GlobalVolumePath"="\Documents and Settings\Administrateur\Mes documents\Mes images"
"LocalDrive"="C:"
"LocalPath"="\Documents and Settings\Administrateur\Mes documents\Mes images"
"ShareWithEveryone"="True"
"ShareWithApprovedDevices"="False"
"State"="False"
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Media Connect\Users\S-1-5-21-257621693-4282951562-813958858-500\102\Approved]
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Media Connect\Users\S-1-5-21-257621693-4282951562-813958858-500\103]
"Name"="103"
"FriendlyName"="TODO"
"GlobalVolumeName"="\\?\Volume{ec2ce060-63b0-11d7-9219-806d6172696f}\"
"GlobalVolumePath"="\Documents and Settings\Administrateur\Mes documents\Mes vid\xe9os"
"LocalDrive"="C:"
"LocalPath"="\Documents and Settings\Administrateur\Mes documents\Mes vid\xe9os"
"ShareWithEveryone"="True"
"ShareWithApprovedDevices"="False"
"State"="False"
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Media Connect\Users\S-1-5-21-257621693-4282951562-813958858-500\103\Approved]
scanning hidden files ...
scan completed successfully
hidden processes: 0
hidden services: 0
hidden files: 15
Remaining Services:
------------------
Authorized Application Key Export:
[HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\standardprofile\authorizedapplications\list]
[HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\domainprofile\authorizedapplications\list]
Remaining Files:
---------------
Files with Hidden Attributes:
Mon 9 Apr 2007 5 A.SH. --- "C:\WINDOWS\system32\dedd9_g.dll"
Sat 17 Dec 2005 4,348 A.SH. --- "C:\Documents and Settings\All Users\DRM\DRMv1.bak"
Sat 19 Jan 2008 6,656 A..H. --- "C:\System Volume Information\_restore{0D239C9C-6D8C-4EEB-AA90-B83F129BEE29}\RP84\A0024332.exe"
Sat 19 Jan 2008 1,024 A..H. --- "C:\System Volume Information\_restore{0D239C9C-6D8C-4EEB-AA90-B83F129BEE29}\RP84\A0024333.sys"
Tue 23 Oct 2007 0 A.SH. --- "C:\Documents and Settings\All Users\DRM\Cache\Indiv02.tmp"
Finished!
SDFix: Version 1.129
Run by Administrateur on 22/01/2008 at 02:18
Microsoft Windows XP [version 5.1.2600]
Running From: C:\SDFix
Safe Mode:
Checking Services:
Restoring Windows Registry Values
Restoring Windows Default Hosts File
Rebooting...
Normal Mode:
Checking Files:
No Trojan Files Found
Removing Temp Files...
ADS Check:
C:\Windows
No streams found.
C:\Windows\system32
No streams found.
C:\Windows\system32\svchost.exe
No streams found.
C:\Windows\system32\ntoskrnl.exe
No streams found.
Final Check:
catchme 0.3.1344.2 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2008-01-22 02:37:54
Windows 5.1.2600 Service Pack 2 NTFS
scanning hidden processes ...
scanning hidden services & system hive ...
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet003\Services\aspnet_state\Performance]
"Library"="C:\Windows\Microsoft.NET\Framework\v2.0.50727\aspnet_perf.dll"
"Open"="OpenStateServicePerfData"
"Close"="CloseStateServicePerfData"
"Collect"="CollectStateServicePerfData"
"Last Counter"=dword:00000d44
"Last Help"=dword:00000d45
"First Counter"=dword:00000c7e
"First Help"=dword:00000c7f
"Object List"="3198 3198 3198 3198 3198 3198 3198 3198 3198 3198 3198 3198 3198 3198 3198 3198 3198 3198 3198 3198 3198 3198 3198 3198"
"WbemAdapFileSize"=dword:00005c00
"WbemAdapStatus"=dword:00000000
scanning hidden registry entries ...
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\System]
"OODEFRAG08.00.00.01WORKSTATION"="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"
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Media Connect\MAC Access Control\Allowed MACs]
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Media Connect\MAC Access Control\Denied MACs]
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Media Connect\MAC Access Control\Launched Apps]
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Media Connect\MAC Access Control\Rejected MACs]
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Media Connect\Users\S-1-5-21-257621693-4282951562-813958858-500]
"UserFolderName"=""
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Media Connect\Users\S-1-5-21-257621693-4282951562-813958858-500\101]
"Name"="101"
"FriendlyName"="TODO"
"GlobalVolumeName"="\\?\Volume{ec2ce060-63b0-11d7-9219-806d6172696f}\"
"GlobalVolumePath"="\Documents and Settings\Administrateur\Mes documents\Ma musique"
"LocalDrive"="C:"
"LocalPath"="\Documents and Settings\Administrateur\Mes documents\Ma musique"
"ShareWithEveryone"="True"
"ShareWithApprovedDevices"="False"
"State"="False"
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Media Connect\Users\S-1-5-21-257621693-4282951562-813958858-500\101\Approved]
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Media Connect\Users\S-1-5-21-257621693-4282951562-813958858-500\102]
"Name"="102"
"FriendlyName"="TODO"
"GlobalVolumeName"="\\?\Volume{ec2ce060-63b0-11d7-9219-806d6172696f}\"
"GlobalVolumePath"="\Documents and Settings\Administrateur\Mes documents\Mes images"
"LocalDrive"="C:"
"LocalPath"="\Documents and Settings\Administrateur\Mes documents\Mes images"
"ShareWithEveryone"="True"
"ShareWithApprovedDevices"="False"
"State"="False"
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Media Connect\Users\S-1-5-21-257621693-4282951562-813958858-500\102\Approved]
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Media Connect\Users\S-1-5-21-257621693-4282951562-813958858-500\103]
"Name"="103"
"FriendlyName"="TODO"
"GlobalVolumeName"="\\?\Volume{ec2ce060-63b0-11d7-9219-806d6172696f}\"
"GlobalVolumePath"="\Documents and Settings\Administrateur\Mes documents\Mes vid\xe9os"
"LocalDrive"="C:"
"LocalPath"="\Documents and Settings\Administrateur\Mes documents\Mes vid\xe9os"
"ShareWithEveryone"="True"
"ShareWithApprovedDevices"="False"
"State"="False"
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Media Connect\Users\S-1-5-21-257621693-4282951562-813958858-500\103\Approved]
scanning hidden files ...
scan completed successfully
hidden processes: 0
hidden services: 0
hidden files: 15
Remaining Services:
------------------
Authorized Application Key Export:
[HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\standardprofile\authorizedapplications\list]
[HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\domainprofile\authorizedapplications\list]
Remaining Files:
---------------
Files with Hidden Attributes:
Mon 9 Apr 2007 5 A.SH. --- "C:\WINDOWS\system32\dedd9_g.dll"
Sat 17 Dec 2005 4,348 A.SH. --- "C:\Documents and Settings\All Users\DRM\DRMv1.bak"
Sat 19 Jan 2008 6,656 A..H. --- "C:\System Volume Information\_restore{0D239C9C-6D8C-4EEB-AA90-B83F129BEE29}\RP84\A0024332.exe"
Sat 19 Jan 2008 1,024 A..H. --- "C:\System Volume Information\_restore{0D239C9C-6D8C-4EEB-AA90-B83F129BEE29}\RP84\A0024333.sys"
Tue 23 Oct 2007 0 A.SH. --- "C:\Documents and Settings\All Users\DRM\Cache\Indiv02.tmp"
Finished!
purges la restauration de ton système clic droit sur poste de travail = Propriètes => restauration systeme coches la case, et décoches la case ....
pour le moment je n ai rien teste et la je t avoue que je vais dormir..on verra au reveil..et je te remercie..mais dis moi d apres toi j ai eu ces saloperies comment?je ne telecharge ni musique ni films X et je ne vais pas sur ce genre de site non plus..
ca serait trop long à expliquer !
mais les menaces profiennent de partout
un xp pas à jours
un programme xp pas à jours
un lien cliquer par hasard
une défaillance d'un port de ton pare-feu
tes surfs privés !
etc etc...
mais les menaces profiennent de partout
un xp pas à jours
un programme xp pas à jours
un lien cliquer par hasard
une défaillance d'un port de ton pare-feu
tes surfs privés !
etc etc...
bonsoir..et bien par moment ca me dit erreur de script adobe flash player 9.; voulez vous continuer ou arreter ce script...alors je ne sais que faire...
il me semble que je t'avais demandé de désinstaller ta console java et de la réinstaller ???
ensuite vas sur le site officiel =>un contôle régulier de la console JAVA pour s'assurer qu'elle est à jour https://www.java.com/en/download/uninstalltool.jsp
Tiens moi au courant
ensuite vas sur le site officiel =>un contôle régulier de la console JAVA pour s'assurer qu'elle est à jour https://www.java.com/en/download/uninstalltool.jsp
Tiens moi au courant