VirusHeat a encore frappé...
Résolu
gouzgy
Messages postés
19
Statut
Membre
-
g!rly Messages postés 18462 Statut Contributeur -
g!rly Messages postés 18462 Statut Contributeur -
Bonsoir !
Mon ordinateur a été infecté il y a un petit moment par VirusHeat, ce qui ralentit beaucoup les applications, et m'empêche de naviguer sur bon nombre de sites internet (sans compter les pop-up, les icônes parasites, etc). Ça serait le pied si je pouvais m'en débarrasser...
J'ai remarqué que de l'aide a été demandé ici, plusieurs fois, pour ce cas précis, et que ça semble résolvable. Je voulais savoir si quelqu'un aurait du temps à consacrer à mon problème, en m'indiquant la marche à suivre (avec les rapports à renvoyer, genre Hijack, ce genre de choses).
Je remercie d'avance celui ou celle qui acceptera de se pencher sur mon cas ! :)
Mon ordinateur a été infecté il y a un petit moment par VirusHeat, ce qui ralentit beaucoup les applications, et m'empêche de naviguer sur bon nombre de sites internet (sans compter les pop-up, les icônes parasites, etc). Ça serait le pied si je pouvais m'en débarrasser...
J'ai remarqué que de l'aide a été demandé ici, plusieurs fois, pour ce cas précis, et que ça semble résolvable. Je voulais savoir si quelqu'un aurait du temps à consacrer à mon problème, en m'indiquant la marche à suivre (avec les rapports à renvoyer, genre Hijack, ce genre de choses).
Je remercie d'avance celui ou celle qui acceptera de se pencher sur mon cas ! :)
A voir également:
- VirusHeat a encore frappé...
- Problème clavier frappe incohérente - Accueil - Informatique
- Annuler frappe clavier - Accueil - Applications & Logiciels
- Clavier double frappe - Forum Virus
- Problème clavier lettres doubles - Forum Windows
- Problème clavier ou Mauvaise frappe! - Forum Bureautique
42 réponses
Salut,
Oui c´est mieux ;-)
a l´aide de hijack this coche et fix les lignes suivantes :
R1 - HKCU\Software\Microsoft\Internet Explorer,SearchURL =
R1 - HKLM\Software\Microsoft\Internet Explorer,SearchURL =
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Default_Search_URL =
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = about:blank
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL =
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL =
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Bar =
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page =
R1 - HKCU\Software\Microsoft\Internet Explorer\Search,SearchAssistant =
R1 - HKCU\Software\Microsoft\Internet Connection Wizard,ShellNext =
R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName = Liens
O2 - BHO: Megaupload Toolbar - {4E7BD74F-2B8D-469E-CCB0-B130EEDBE97C} - C:\PROGRA~1\MEGAUP~1\MEGAUP~1.DLL (file missing)
O3 - Toolbar: Megaupload Toolbar - {4E7BD74F-2B8D-469E-CCB0-B130EEDBE97C} - C:\PROGRA~1\MEGAUP~1\MEGAUP~1.DLL (file missing)
O4 - HKLM\..\Run: [PHIME2002ASync] C:\WINDOWS\system32\IME\TINTLGNT\TINTSETP.EXE /SYNC
O4 - HKLM\..\Run: [PHIME2002A] C:\WINDOWS\system32\IME\TINTLGNT\TINTSETP.EXE /IMEName
O4 - HKLM\..\Run: [ISUSPM Startup] C:\PROGRA~1\FICHIE~1\INSTAL~1\UPDATE~1\ISUSPM.exe -startup
O4 - HKLM\..\Run: [ISUSScheduler] "C:\Program Files\Fichiers communs\InstallShield\UpdateService\issch.exe" -start
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\QTTask.exe" -atboottime
O4 - HKLM\..\Run: [TkBellExe] "C:\Program Files\Fichiers communs\Real\Update_OB\realsched.exe" -osboot
O4 - HKUS\S-1-5-19\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'SERVICE LOCAL')
O4 - HKUS\S-1-5-20\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'SERVICE RÉSEAU')
O4 - HKUS\S-1-5-18\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'SYSTEM')
O4 - HKUS\.DEFAULT\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'Default user')
O9 - Extra button: (no name) - {CD67F990-D8E9-11d2-98FE-00C0F0318AFE} - (no file)
O22 - SharedTaskScheduler: enswathes - {4d51e91c-e917-4b7f-89ff-abe471e16927} - C:\WINDOWS\system32\uyhjw.dll (file missing)
comment fixer :
Tutoriel d´utilisation (video) : (Merci a Balltrap34 pour cette réalisation)
-> http://perso.orange.fr/rginformatique/section%20virus/demohijack.htm
puis
regarde ce tutorial pour mettre ta console java a jour :
https://www.malekal.com/maintenir-java-adobe-reader-et-le-player-flash-a-jour/
puis
essaie de passer malwarebytes maintenant et post son rapport stp
apres on instalera des nouvelles protections
@+
Oui c´est mieux ;-)
a l´aide de hijack this coche et fix les lignes suivantes :
R1 - HKCU\Software\Microsoft\Internet Explorer,SearchURL =
R1 - HKLM\Software\Microsoft\Internet Explorer,SearchURL =
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Default_Search_URL =
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = about:blank
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL =
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL =
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Bar =
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page =
R1 - HKCU\Software\Microsoft\Internet Explorer\Search,SearchAssistant =
R1 - HKCU\Software\Microsoft\Internet Connection Wizard,ShellNext =
R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName = Liens
O2 - BHO: Megaupload Toolbar - {4E7BD74F-2B8D-469E-CCB0-B130EEDBE97C} - C:\PROGRA~1\MEGAUP~1\MEGAUP~1.DLL (file missing)
O3 - Toolbar: Megaupload Toolbar - {4E7BD74F-2B8D-469E-CCB0-B130EEDBE97C} - C:\PROGRA~1\MEGAUP~1\MEGAUP~1.DLL (file missing)
O4 - HKLM\..\Run: [PHIME2002ASync] C:\WINDOWS\system32\IME\TINTLGNT\TINTSETP.EXE /SYNC
O4 - HKLM\..\Run: [PHIME2002A] C:\WINDOWS\system32\IME\TINTLGNT\TINTSETP.EXE /IMEName
O4 - HKLM\..\Run: [ISUSPM Startup] C:\PROGRA~1\FICHIE~1\INSTAL~1\UPDATE~1\ISUSPM.exe -startup
O4 - HKLM\..\Run: [ISUSScheduler] "C:\Program Files\Fichiers communs\InstallShield\UpdateService\issch.exe" -start
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\QTTask.exe" -atboottime
O4 - HKLM\..\Run: [TkBellExe] "C:\Program Files\Fichiers communs\Real\Update_OB\realsched.exe" -osboot
O4 - HKUS\S-1-5-19\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'SERVICE LOCAL')
O4 - HKUS\S-1-5-20\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'SERVICE RÉSEAU')
O4 - HKUS\S-1-5-18\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'SYSTEM')
O4 - HKUS\.DEFAULT\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'Default user')
O9 - Extra button: (no name) - {CD67F990-D8E9-11d2-98FE-00C0F0318AFE} - (no file)
O22 - SharedTaskScheduler: enswathes - {4d51e91c-e917-4b7f-89ff-abe471e16927} - C:\WINDOWS\system32\uyhjw.dll (file missing)
comment fixer :
Tutoriel d´utilisation (video) : (Merci a Balltrap34 pour cette réalisation)
-> http://perso.orange.fr/rginformatique/section%20virus/demohijack.htm
puis
regarde ce tutorial pour mettre ta console java a jour :
https://www.malekal.com/maintenir-java-adobe-reader-et-le-player-flash-a-jour/
puis
essaie de passer malwarebytes maintenant et post son rapport stp
apres on instalera des nouvelles protections
@+
Bonjour !
J'ai pu fixer sans problème, et pour Java, le test donné par le tutoriel fonctionne correctement.
Et Malwarebytes s'est déroulé sans accroc cette fois-ci. Voilà le résultat :
Malwarebytes' Anti-Malware 1.12
Version de la base de données: 788
Type de recherche: Examen complet (C:\|)
Eléments examinés: 146938
Temps écoulé: 56 minute(s), 20 second(s)
Processus mémoire infecté(s): 0
Module(s) mémoire infecté(s): 0
Clé(s) du Registre infectée(s): 5
Valeur(s) du Registre infectée(s): 5
Elément(s) de données du Registre infecté(s): 0
Dossier(s) infecté(s): 0
Fichier(s) infecté(s): 22
Processus mémoire infecté(s):
(Aucun élément nuisible détecté)
Module(s) mémoire infecté(s):
(Aucun élément nuisible détecté)
Clé(s) du Registre infectée(s):
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\SearchScopes\{daed9266-8c28-4c1c-8b58-5c66eff1d302} (Search.Hijack) -> No action taken.
HKEY_CURRENT_USER\Software\Microsoft\affri (Malware.Trace) -> No action taken.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\affri (Malware.Trace) -> No action taken.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\MS Juan (Malware.Trace) -> No action taken.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WNetPws (Trojan.Zlob) -> No action taken.
Valeur(s) du Registre infectée(s):
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Extensions\CmdMapping\{9034a523-d068-4be8-a284-9df278be776e} (Trojan.Zlob) -> No action taken.
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main\SearchMigratedDefaultURL (Trojan.Zlob) -> No action taken.
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\SearchUrl\w\ (Trojan.Zlob) -> No action taken.
HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\Main\SearchMigratedDefaultURL (Trojan.Zlob) -> No action taken.
HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\SearchUrl\w\ (Trojan.Zlob) -> No action taken.
Elément(s) de données du Registre infecté(s):
(Aucun élément nuisible détecté)
Dossier(s) infecté(s):
(Aucun élément nuisible détecté)
Fichier(s) infecté(s):
C:\QooBox\Quarantine\C\WINDOWS\system32\nvogggji.dll.vir (Trojan.AVKiller) -> No action taken.
C:\QooBox\Quarantine\C\WINDOWS\system32\opnoppml.dll.vir (Trojan.Vundo) -> No action taken.
C:\QooBox\Quarantine\C\WINDOWS\system32\rciahpfp.dll.vir (Trojan.AVKiller) -> No action taken.
C:\QooBox\Quarantine\C\WINDOWS\system32\snlpokyi.dll.vir (Trojan.AVKiller) -> No action taken.
C:\QooBox\Quarantine\C\WINDOWS\system32\ucxqnjxe.dll.vir (Trojan.AVKiller) -> No action taken.
C:\QooBox\Quarantine\C\WINDOWS\system32\uyhjw.dll.vir (Trojan.Zlob) -> No action taken.
C:\QooBox\Quarantine\C\WINDOWS\system32\vxexeukf.dll.vir (Trojan.AVKiller) -> No action taken.
C:\QooBox\Quarantine\C\WINDOWS\system32\527631\527631.dll.vir (Trojan.BHO) -> No action taken.
C:\QooBox\Quarantine\C\WINDOWS\system32\717305\717305.dll.vir (Trojan.BHO) -> No action taken.
C:\System Volume Information\_restore{B3BF5352-B406-412E-936E-A9436F19C528}\RP147\A0024674.exe (Rogue.VirusHeat) -> No action taken.
C:\System Volume Information\_restore{B3BF5352-B406-412E-936E-A9436F19C528}\RP149\A0025051.dll (Trojan.Vundo) -> No action taken.
C:\System Volume Information\_restore{B3BF5352-B406-412E-936E-A9436F19C528}\RP149\A0025052.dll (Trojan.Vundo) -> No action taken.
C:\System Volume Information\_restore{B3BF5352-B406-412E-936E-A9436F19C528}\RP149\A0026149.dll (Trojan.Vundo) -> No action taken.
C:\System Volume Information\_restore{B3BF5352-B406-412E-936E-A9436F19C528}\RP152\A0026401.dll (Trojan.BHO) -> No action taken.
C:\System Volume Information\_restore{B3BF5352-B406-412E-936E-A9436F19C528}\RP152\A0026402.dll (Trojan.BHO) -> No action taken.
C:\System Volume Information\_restore{B3BF5352-B406-412E-936E-A9436F19C528}\RP152\A0026410.dll (Trojan.AVKiller) -> No action taken.
C:\System Volume Information\_restore{B3BF5352-B406-412E-936E-A9436F19C528}\RP152\A0026411.dll (Trojan.AVKiller) -> No action taken.
C:\System Volume Information\_restore{B3BF5352-B406-412E-936E-A9436F19C528}\RP152\A0026412.dll (Trojan.AVKiller) -> No action taken.
C:\System Volume Information\_restore{B3BF5352-B406-412E-936E-A9436F19C528}\RP152\A0026413.dll (Trojan.AVKiller) -> No action taken.
C:\System Volume Information\_restore{B3BF5352-B406-412E-936E-A9436F19C528}\RP152\A0026414.dll (Trojan.AVKiller) -> No action taken.
C:\System Volume Information\_restore{B3BF5352-B406-412E-936E-A9436F19C528}\RP152\A0026505.dll (Trojan.Vundo) -> No action taken.
C:\System Volume Information\_restore{B3BF5352-B406-412E-936E-A9436F19C528}\RP154\A0026787.dll (Trojan.Zlob) -> No action taken.
J'ai pu fixer sans problème, et pour Java, le test donné par le tutoriel fonctionne correctement.
Et Malwarebytes s'est déroulé sans accroc cette fois-ci. Voilà le résultat :
Malwarebytes' Anti-Malware 1.12
Version de la base de données: 788
Type de recherche: Examen complet (C:\|)
Eléments examinés: 146938
Temps écoulé: 56 minute(s), 20 second(s)
Processus mémoire infecté(s): 0
Module(s) mémoire infecté(s): 0
Clé(s) du Registre infectée(s): 5
Valeur(s) du Registre infectée(s): 5
Elément(s) de données du Registre infecté(s): 0
Dossier(s) infecté(s): 0
Fichier(s) infecté(s): 22
Processus mémoire infecté(s):
(Aucun élément nuisible détecté)
Module(s) mémoire infecté(s):
(Aucun élément nuisible détecté)
Clé(s) du Registre infectée(s):
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\SearchScopes\{daed9266-8c28-4c1c-8b58-5c66eff1d302} (Search.Hijack) -> No action taken.
HKEY_CURRENT_USER\Software\Microsoft\affri (Malware.Trace) -> No action taken.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\affri (Malware.Trace) -> No action taken.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\MS Juan (Malware.Trace) -> No action taken.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WNetPws (Trojan.Zlob) -> No action taken.
Valeur(s) du Registre infectée(s):
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Extensions\CmdMapping\{9034a523-d068-4be8-a284-9df278be776e} (Trojan.Zlob) -> No action taken.
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main\SearchMigratedDefaultURL (Trojan.Zlob) -> No action taken.
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\SearchUrl\w\ (Trojan.Zlob) -> No action taken.
HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\Main\SearchMigratedDefaultURL (Trojan.Zlob) -> No action taken.
HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\SearchUrl\w\ (Trojan.Zlob) -> No action taken.
Elément(s) de données du Registre infecté(s):
(Aucun élément nuisible détecté)
Dossier(s) infecté(s):
(Aucun élément nuisible détecté)
Fichier(s) infecté(s):
C:\QooBox\Quarantine\C\WINDOWS\system32\nvogggji.dll.vir (Trojan.AVKiller) -> No action taken.
C:\QooBox\Quarantine\C\WINDOWS\system32\opnoppml.dll.vir (Trojan.Vundo) -> No action taken.
C:\QooBox\Quarantine\C\WINDOWS\system32\rciahpfp.dll.vir (Trojan.AVKiller) -> No action taken.
C:\QooBox\Quarantine\C\WINDOWS\system32\snlpokyi.dll.vir (Trojan.AVKiller) -> No action taken.
C:\QooBox\Quarantine\C\WINDOWS\system32\ucxqnjxe.dll.vir (Trojan.AVKiller) -> No action taken.
C:\QooBox\Quarantine\C\WINDOWS\system32\uyhjw.dll.vir (Trojan.Zlob) -> No action taken.
C:\QooBox\Quarantine\C\WINDOWS\system32\vxexeukf.dll.vir (Trojan.AVKiller) -> No action taken.
C:\QooBox\Quarantine\C\WINDOWS\system32\527631\527631.dll.vir (Trojan.BHO) -> No action taken.
C:\QooBox\Quarantine\C\WINDOWS\system32\717305\717305.dll.vir (Trojan.BHO) -> No action taken.
C:\System Volume Information\_restore{B3BF5352-B406-412E-936E-A9436F19C528}\RP147\A0024674.exe (Rogue.VirusHeat) -> No action taken.
C:\System Volume Information\_restore{B3BF5352-B406-412E-936E-A9436F19C528}\RP149\A0025051.dll (Trojan.Vundo) -> No action taken.
C:\System Volume Information\_restore{B3BF5352-B406-412E-936E-A9436F19C528}\RP149\A0025052.dll (Trojan.Vundo) -> No action taken.
C:\System Volume Information\_restore{B3BF5352-B406-412E-936E-A9436F19C528}\RP149\A0026149.dll (Trojan.Vundo) -> No action taken.
C:\System Volume Information\_restore{B3BF5352-B406-412E-936E-A9436F19C528}\RP152\A0026401.dll (Trojan.BHO) -> No action taken.
C:\System Volume Information\_restore{B3BF5352-B406-412E-936E-A9436F19C528}\RP152\A0026402.dll (Trojan.BHO) -> No action taken.
C:\System Volume Information\_restore{B3BF5352-B406-412E-936E-A9436F19C528}\RP152\A0026410.dll (Trojan.AVKiller) -> No action taken.
C:\System Volume Information\_restore{B3BF5352-B406-412E-936E-A9436F19C528}\RP152\A0026411.dll (Trojan.AVKiller) -> No action taken.
C:\System Volume Information\_restore{B3BF5352-B406-412E-936E-A9436F19C528}\RP152\A0026412.dll (Trojan.AVKiller) -> No action taken.
C:\System Volume Information\_restore{B3BF5352-B406-412E-936E-A9436F19C528}\RP152\A0026413.dll (Trojan.AVKiller) -> No action taken.
C:\System Volume Information\_restore{B3BF5352-B406-412E-936E-A9436F19C528}\RP152\A0026414.dll (Trojan.AVKiller) -> No action taken.
C:\System Volume Information\_restore{B3BF5352-B406-412E-936E-A9436F19C528}\RP152\A0026505.dll (Trojan.Vundo) -> No action taken.
C:\System Volume Information\_restore{B3BF5352-B406-412E-936E-A9436F19C528}\RP154\A0026787.dll (Trojan.Zlob) -> No action taken.
lorsque tu as fais le scan tu devais voir inscrit a la fin supprimer car dans ce rapport il n y a pour chaque fichier ou autre trouve que no action taken(aucune action de prise).
il faur refaire un scan complet apres mise a jour, a la fin de celui ci cliquer sur supprimer, tu obtiens un autre rapport ou pour chaque ligne doit etre indique quarantined and deleted succesfully(en quarantaine et supprimer efficacement), merci de coller ce rapport.
il faur refaire un scan complet apres mise a jour, a la fin de celui ci cliquer sur supprimer, tu obtiens un autre rapport ou pour chaque ligne doit etre indique quarantined and deleted succesfully(en quarantaine et supprimer efficacement), merci de coller ce rapport.
Ah, bah oui, forcément. Au temps pour moi, je suis à côté de la plaque. ^^
Voilà ce que ça donne une fois supprimés tous les trucs infectés :
Malwarebytes' Anti-Malware 1.12
Version de la base de données: 788
Type de recherche: Examen complet (C:\|)
Eléments examinés: 146938
Temps écoulé: 56 minute(s), 20 second(s)
Processus mémoire infecté(s): 0
Module(s) mémoire infecté(s): 0
Clé(s) du Registre infectée(s): 5
Valeur(s) du Registre infectée(s): 5
Elément(s) de données du Registre infecté(s): 0
Dossier(s) infecté(s): 0
Fichier(s) infecté(s): 22
Processus mémoire infecté(s):
(Aucun élément nuisible détecté)
Module(s) mémoire infecté(s):
(Aucun élément nuisible détecté)
Clé(s) du Registre infectée(s):
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\SearchScopes\{daed9266-8c28-4c1c-8b58-5c66eff1d302} (Search.Hijack) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\Software\Microsoft\affri (Malware.Trace) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\affri (Malware.Trace) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\MS Juan (Malware.Trace) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WNetPws (Trojan.Zlob) -> Quarantined and deleted successfully.
Valeur(s) du Registre infectée(s):
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Extensions\CmdMapping\{9034a523-d068-4be8-a284-9df278be776e} (Trojan.Zlob) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main\SearchMigratedDefaultURL (Trojan.Zlob) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\SearchUrl\w\ (Trojan.Zlob) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\Main\SearchMigratedDefaultURL (Trojan.Zlob) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\SearchUrl\w\ (Trojan.Zlob) -> Quarantined and deleted successfully.
Elément(s) de données du Registre infecté(s):
(Aucun élément nuisible détecté)
Dossier(s) infecté(s):
(Aucun élément nuisible détecté)
Fichier(s) infecté(s):
C:\QooBox\Quarantine\C\WINDOWS\system32\nvogggji.dll.vir (Trojan.AVKiller) -> Quarantined and deleted successfully.
C:\QooBox\Quarantine\C\WINDOWS\system32\opnoppml.dll.vir (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\QooBox\Quarantine\C\WINDOWS\system32\rciahpfp.dll.vir (Trojan.AVKiller) -> Quarantined and deleted successfully.
C:\QooBox\Quarantine\C\WINDOWS\system32\snlpokyi.dll.vir (Trojan.AVKiller) -> Quarantined and deleted successfully.
C:\QooBox\Quarantine\C\WINDOWS\system32\ucxqnjxe.dll.vir (Trojan.AVKiller) -> Quarantined and deleted successfully.
C:\QooBox\Quarantine\C\WINDOWS\system32\uyhjw.dll.vir (Trojan.Zlob) -> Quarantined and deleted successfully.
C:\QooBox\Quarantine\C\WINDOWS\system32\vxexeukf.dll.vir (Trojan.AVKiller) -> Quarantined and deleted successfully.
C:\QooBox\Quarantine\C\WINDOWS\system32\527631\527631.dll.vir (Trojan.BHO) -> Quarantined and deleted successfully.
C:\QooBox\Quarantine\C\WINDOWS\system32\717305\717305.dll.vir (Trojan.BHO) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{B3BF5352-B406-412E-936E-A9436F19C528}\RP147\A0024674.exe (Rogue.VirusHeat) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{B3BF5352-B406-412E-936E-A9436F19C528}\RP149\A0025051.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{B3BF5352-B406-412E-936E-A9436F19C528}\RP149\A0025052.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{B3BF5352-B406-412E-936E-A9436F19C528}\RP149\A0026149.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{B3BF5352-B406-412E-936E-A9436F19C528}\RP152\A0026401.dll (Trojan.BHO) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{B3BF5352-B406-412E-936E-A9436F19C528}\RP152\A0026402.dll (Trojan.BHO) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{B3BF5352-B406-412E-936E-A9436F19C528}\RP152\A0026410.dll (Trojan.AVKiller) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{B3BF5352-B406-412E-936E-A9436F19C528}\RP152\A0026411.dll (Trojan.AVKiller) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{B3BF5352-B406-412E-936E-A9436F19C528}\RP152\A0026412.dll (Trojan.AVKiller) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{B3BF5352-B406-412E-936E-A9436F19C528}\RP152\A0026413.dll (Trojan.AVKiller) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{B3BF5352-B406-412E-936E-A9436F19C528}\RP152\A0026414.dll (Trojan.AVKiller) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{B3BF5352-B406-412E-936E-A9436F19C528}\RP152\A0026505.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{B3BF5352-B406-412E-936E-A9436F19C528}\RP154\A0026787.dll (Trojan.Zlob) -> Quarantined and deleted successfully.
Voilà ce que ça donne une fois supprimés tous les trucs infectés :
Malwarebytes' Anti-Malware 1.12
Version de la base de données: 788
Type de recherche: Examen complet (C:\|)
Eléments examinés: 146938
Temps écoulé: 56 minute(s), 20 second(s)
Processus mémoire infecté(s): 0
Module(s) mémoire infecté(s): 0
Clé(s) du Registre infectée(s): 5
Valeur(s) du Registre infectée(s): 5
Elément(s) de données du Registre infecté(s): 0
Dossier(s) infecté(s): 0
Fichier(s) infecté(s): 22
Processus mémoire infecté(s):
(Aucun élément nuisible détecté)
Module(s) mémoire infecté(s):
(Aucun élément nuisible détecté)
Clé(s) du Registre infectée(s):
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\SearchScopes\{daed9266-8c28-4c1c-8b58-5c66eff1d302} (Search.Hijack) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\Software\Microsoft\affri (Malware.Trace) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\affri (Malware.Trace) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\MS Juan (Malware.Trace) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WNetPws (Trojan.Zlob) -> Quarantined and deleted successfully.
Valeur(s) du Registre infectée(s):
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Extensions\CmdMapping\{9034a523-d068-4be8-a284-9df278be776e} (Trojan.Zlob) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main\SearchMigratedDefaultURL (Trojan.Zlob) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\SearchUrl\w\ (Trojan.Zlob) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\Main\SearchMigratedDefaultURL (Trojan.Zlob) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\SearchUrl\w\ (Trojan.Zlob) -> Quarantined and deleted successfully.
Elément(s) de données du Registre infecté(s):
(Aucun élément nuisible détecté)
Dossier(s) infecté(s):
(Aucun élément nuisible détecté)
Fichier(s) infecté(s):
C:\QooBox\Quarantine\C\WINDOWS\system32\nvogggji.dll.vir (Trojan.AVKiller) -> Quarantined and deleted successfully.
C:\QooBox\Quarantine\C\WINDOWS\system32\opnoppml.dll.vir (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\QooBox\Quarantine\C\WINDOWS\system32\rciahpfp.dll.vir (Trojan.AVKiller) -> Quarantined and deleted successfully.
C:\QooBox\Quarantine\C\WINDOWS\system32\snlpokyi.dll.vir (Trojan.AVKiller) -> Quarantined and deleted successfully.
C:\QooBox\Quarantine\C\WINDOWS\system32\ucxqnjxe.dll.vir (Trojan.AVKiller) -> Quarantined and deleted successfully.
C:\QooBox\Quarantine\C\WINDOWS\system32\uyhjw.dll.vir (Trojan.Zlob) -> Quarantined and deleted successfully.
C:\QooBox\Quarantine\C\WINDOWS\system32\vxexeukf.dll.vir (Trojan.AVKiller) -> Quarantined and deleted successfully.
C:\QooBox\Quarantine\C\WINDOWS\system32\527631\527631.dll.vir (Trojan.BHO) -> Quarantined and deleted successfully.
C:\QooBox\Quarantine\C\WINDOWS\system32\717305\717305.dll.vir (Trojan.BHO) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{B3BF5352-B406-412E-936E-A9436F19C528}\RP147\A0024674.exe (Rogue.VirusHeat) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{B3BF5352-B406-412E-936E-A9436F19C528}\RP149\A0025051.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{B3BF5352-B406-412E-936E-A9436F19C528}\RP149\A0025052.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{B3BF5352-B406-412E-936E-A9436F19C528}\RP149\A0026149.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{B3BF5352-B406-412E-936E-A9436F19C528}\RP152\A0026401.dll (Trojan.BHO) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{B3BF5352-B406-412E-936E-A9436F19C528}\RP152\A0026402.dll (Trojan.BHO) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{B3BF5352-B406-412E-936E-A9436F19C528}\RP152\A0026410.dll (Trojan.AVKiller) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{B3BF5352-B406-412E-936E-A9436F19C528}\RP152\A0026411.dll (Trojan.AVKiller) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{B3BF5352-B406-412E-936E-A9436F19C528}\RP152\A0026412.dll (Trojan.AVKiller) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{B3BF5352-B406-412E-936E-A9436F19C528}\RP152\A0026413.dll (Trojan.AVKiller) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{B3BF5352-B406-412E-936E-A9436F19C528}\RP152\A0026414.dll (Trojan.AVKiller) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{B3BF5352-B406-412E-936E-A9436F19C528}\RP152\A0026505.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{B3BF5352-B406-412E-936E-A9436F19C528}\RP154\A0026787.dll (Trojan.Zlob) -> Quarantined and deleted successfully.
Vous n’avez pas trouvé la réponse que vous recherchez ?
Posez votre question
je te laisse avec girly pour l installation de nouvelles protections. je pourrai te donner ma sauce mais comme c est elle qui a fait tout le travail, c est donc a elle de conclure avec toi .
Voilà le rapport HijackThis, tout beau tout chaud :
Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 19:44:17, on 28/05/2008
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)
Boot mode: Normal
Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\Program Files\Alwil Software\Avast4\aswUpdSv.exe
C:\Program Files\Alwil Software\Avast4\ashServ.exe
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\system32\acs.exe
C:\PROGRA~1\FICHIE~1\AOL\ACS\AOLacsd.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\eHome\ehRecvr.exe
C:\WINDOWS\eHome\ehSched.exe
C:\WINDOWS\system32\nvsvc32.exe
C:\WINDOWS\system32\svchost.exe
C:\Program Files\Fichiers communs\Ulead Systems\DVD\ULCDRSvr.exe
C:\Program Files\Sonic\DigitalMedia LE v7\MyDVD LE\USBDeviceService.exe
C:\Program Files\Alwil Software\Avast4\ashMaiSv.exe
C:\Program Files\Alwil Software\Avast4\ashWebSv.exe
C:\WINDOWS\ehome\ehtray.exe
C:\WINDOWS\eHome\ehmsas.exe
C:\Program Files\Synaptics\SynTP\SynTPEnh.exe
C:\WINDOWS\system32\RUNDLL32.EXE
C:\Program Files\Atheros WLAN Adapter\ACU.exe
C:\WINDOWS\RTHDCPL.EXE
C:\WINDOWS\ATK0100\HControl.exe
C:\Program Files\Sonic\DigitalMedia LE v7\MyDVD LE\DetectorApp.exe
C:\PROGRA~1\ALWILS~1\Avast4\ashDisp.exe
C:\Program Files\OFFICE One6.5\program\soffice.exe
C:\Program Files\BOINC\boincmgr.exe
C:\WINDOWS\ATK0100\ATKOSD.exe
C:\Program Files\OpenOffice.org 2.4\program\soffice.exe
C:\Program Files\OpenOffice.org 2.4\program\soffice.BIN
C:\WINDOWS\system32\dllhost.exe
C:\Program Files\BOINC\boinc.exe
C:\Program Files\BOINC\projects\www.worldcommunitygrid.org\wcg_faah_autodock_6.05_windows_intelx86
C:\Program Files\Fichiers communs\Real\Update_OB\realsched.exe
C:\Program Files\Windows Live\Messenger\msnmsgr.exe
C:\Program Files\BOINC\projects\www.worldcommunitygrid.org\wcg_faah_autodock_6.05_windows_intelx86
C:\Program Files\Windows Live\Messenger\usnsvc.exe
C:\Program Files\Mozilla Firefox\firefox.exe
C:\Program Files\HijackThis\HijackThis.exe
O2 - BHO: RealPlayer Download and Record Plugin for Internet Explorer - {3049C3E9-B461-4BC5-8870-4C09146192CA} - C:\Program Files\Real\RealPlayer\rpbrowserrecordplugin.dll
O2 - BHO: AddTask Class - {6A19C29D-ED45-4483-8999-9F939C8161F2} - C:\Program Files\eREAD6.0\eREAD6.0\WebHook.dll
O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre1.6.0_06\bin\ssv.dll
O2 - BHO: Programme d'aide de l'Assistant de connexion Windows Live - {9030D464-4C02-4ABF-8ECC-5164760863C6} - C:\Program Files\Fichiers communs\Microsoft Shared\Windows Live\WindowsLiveLogin.dll
O4 - HKLM\..\Run: [IMJPMIG8.1] "C:\WINDOWS\IME\imjp8_1\IMJPMIG.EXE" /Spoil /RemAdvDef /Migration32
O4 - HKLM\..\Run: [ehTray] C:\WINDOWS\ehome\ehtray.exe
O4 - HKLM\..\Run: [SynTPEnh] C:\Program Files\Synaptics\SynTP\SynTPEnh.exe
O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE C:\WINDOWS\system32\NvCpl.dll,NvStartup
O4 - HKLM\..\Run: [nwiz] nwiz.exe /install
O4 - HKLM\..\Run: [NvMediaCenter] RUNDLL32.EXE C:\WINDOWS\system32\NvMcTray.dll,NvTaskbarInit
O4 - HKLM\..\Run: [ACU] "C:\Program Files\Atheros WLAN Adapter\ACU.exe" -nogui
O4 - HKLM\..\Run: [RTHDCPL] RTHDCPL.EXE
O4 - HKLM\..\Run: [SkyTel] SkyTel.EXE
O4 - HKLM\..\Run: [HControl] C:\WINDOWS\ATK0100\HControl.exe
O4 - HKLM\..\Run: [DetectorApp] C:\Program Files\Sonic\DigitalMedia LE v7\MyDVD LE\DetectorApp.exe
O4 - HKLM\..\Run: [avast!] C:\PROGRA~1\ALWILS~1\Avast4\ashDisp.exe
O4 - HKLM\..\Run: [SunJavaUpdateSched] "C:\Program Files\Java\jre1.6.0_06\bin\jusched.exe"
O4 - HKLM\..\Run: [TkBellExe] "C:\Program Files\Fichiers communs\Real\Update_OB\realsched.exe" -osboot
O4 - HKCU\..\Run: [updateMgr] "C:\Program Files\Adobe\Acrobat 7.0\Reader\AdobeUpdateManager.exe" AcRdB7_0_9 -reboot 1
O4 - Startup: OFFICE One 6.5.lnk = C:\Program Files\OFFICE One6.5\program\quickstart.exe
O4 - Startup: OpenOffice.org 2.4.lnk = C:\Program Files\OpenOffice.org 2.4\program\quickstart.exe
O4 - Startup: World Community Grid - BOINC Manager.lnk = C:\Program Files\BOINC\boincmgr.exe
O4 - Global Startup: Lancement rapide d'Adobe Reader.lnk = C:\Program Files\Adobe\Acrobat 7.0\Reader\reader_sl.exe
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_06\bin\ssv.dll
O9 - Extra 'Tools' menuitem: Console Java (Sun) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_06\bin\ssv.dll
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O23 - Service: Service de configuration Atheros (ACS) - Unknown owner - C:\WINDOWS\system32\acs.exe
O23 - Service: AOL Connectivity Service (AOL ACS) - America Online, Inc. - C:\PROGRA~1\FICHIE~1\AOL\ACS\AOLacsd.exe
O23 - Service: avast! iAVS4 Control Service (aswUpdSv) - ALWIL Software - C:\Program Files\Alwil Software\Avast4\aswUpdSv.exe
O23 - Service: avast! Antivirus - ALWIL Software - C:\Program Files\Alwil Software\Avast4\ashServ.exe
O23 - Service: avast! Mail Scanner - ALWIL Software - C:\Program Files\Alwil Software\Avast4\ashMaiSv.exe
O23 - Service: avast! Web Scanner - ALWIL Software - C:\Program Files\Alwil Software\Avast4\ashWebSv.exe
O23 - Service: NVIDIA Display Driver Service (NVSvc) - NVIDIA Corporation - C:\WINDOWS\system32\nvsvc32.exe
O23 - Service: Ulead Burning Helper (UleadBurningHelper) - Ulead Systems, Inc. - C:\Program Files\Fichiers communs\Ulead Systems\DVD\ULCDRSvr.exe
O23 - Service: USBDeviceService - Unknown owner - C:\Program Files\Sonic\DigitalMedia LE v7\MyDVD LE\USBDeviceService.exe
Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 19:44:17, on 28/05/2008
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)
Boot mode: Normal
Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\Program Files\Alwil Software\Avast4\aswUpdSv.exe
C:\Program Files\Alwil Software\Avast4\ashServ.exe
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\system32\acs.exe
C:\PROGRA~1\FICHIE~1\AOL\ACS\AOLacsd.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\eHome\ehRecvr.exe
C:\WINDOWS\eHome\ehSched.exe
C:\WINDOWS\system32\nvsvc32.exe
C:\WINDOWS\system32\svchost.exe
C:\Program Files\Fichiers communs\Ulead Systems\DVD\ULCDRSvr.exe
C:\Program Files\Sonic\DigitalMedia LE v7\MyDVD LE\USBDeviceService.exe
C:\Program Files\Alwil Software\Avast4\ashMaiSv.exe
C:\Program Files\Alwil Software\Avast4\ashWebSv.exe
C:\WINDOWS\ehome\ehtray.exe
C:\WINDOWS\eHome\ehmsas.exe
C:\Program Files\Synaptics\SynTP\SynTPEnh.exe
C:\WINDOWS\system32\RUNDLL32.EXE
C:\Program Files\Atheros WLAN Adapter\ACU.exe
C:\WINDOWS\RTHDCPL.EXE
C:\WINDOWS\ATK0100\HControl.exe
C:\Program Files\Sonic\DigitalMedia LE v7\MyDVD LE\DetectorApp.exe
C:\PROGRA~1\ALWILS~1\Avast4\ashDisp.exe
C:\Program Files\OFFICE One6.5\program\soffice.exe
C:\Program Files\BOINC\boincmgr.exe
C:\WINDOWS\ATK0100\ATKOSD.exe
C:\Program Files\OpenOffice.org 2.4\program\soffice.exe
C:\Program Files\OpenOffice.org 2.4\program\soffice.BIN
C:\WINDOWS\system32\dllhost.exe
C:\Program Files\BOINC\boinc.exe
C:\Program Files\BOINC\projects\www.worldcommunitygrid.org\wcg_faah_autodock_6.05_windows_intelx86
C:\Program Files\Fichiers communs\Real\Update_OB\realsched.exe
C:\Program Files\Windows Live\Messenger\msnmsgr.exe
C:\Program Files\BOINC\projects\www.worldcommunitygrid.org\wcg_faah_autodock_6.05_windows_intelx86
C:\Program Files\Windows Live\Messenger\usnsvc.exe
C:\Program Files\Mozilla Firefox\firefox.exe
C:\Program Files\HijackThis\HijackThis.exe
O2 - BHO: RealPlayer Download and Record Plugin for Internet Explorer - {3049C3E9-B461-4BC5-8870-4C09146192CA} - C:\Program Files\Real\RealPlayer\rpbrowserrecordplugin.dll
O2 - BHO: AddTask Class - {6A19C29D-ED45-4483-8999-9F939C8161F2} - C:\Program Files\eREAD6.0\eREAD6.0\WebHook.dll
O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre1.6.0_06\bin\ssv.dll
O2 - BHO: Programme d'aide de l'Assistant de connexion Windows Live - {9030D464-4C02-4ABF-8ECC-5164760863C6} - C:\Program Files\Fichiers communs\Microsoft Shared\Windows Live\WindowsLiveLogin.dll
O4 - HKLM\..\Run: [IMJPMIG8.1] "C:\WINDOWS\IME\imjp8_1\IMJPMIG.EXE" /Spoil /RemAdvDef /Migration32
O4 - HKLM\..\Run: [ehTray] C:\WINDOWS\ehome\ehtray.exe
O4 - HKLM\..\Run: [SynTPEnh] C:\Program Files\Synaptics\SynTP\SynTPEnh.exe
O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE C:\WINDOWS\system32\NvCpl.dll,NvStartup
O4 - HKLM\..\Run: [nwiz] nwiz.exe /install
O4 - HKLM\..\Run: [NvMediaCenter] RUNDLL32.EXE C:\WINDOWS\system32\NvMcTray.dll,NvTaskbarInit
O4 - HKLM\..\Run: [ACU] "C:\Program Files\Atheros WLAN Adapter\ACU.exe" -nogui
O4 - HKLM\..\Run: [RTHDCPL] RTHDCPL.EXE
O4 - HKLM\..\Run: [SkyTel] SkyTel.EXE
O4 - HKLM\..\Run: [HControl] C:\WINDOWS\ATK0100\HControl.exe
O4 - HKLM\..\Run: [DetectorApp] C:\Program Files\Sonic\DigitalMedia LE v7\MyDVD LE\DetectorApp.exe
O4 - HKLM\..\Run: [avast!] C:\PROGRA~1\ALWILS~1\Avast4\ashDisp.exe
O4 - HKLM\..\Run: [SunJavaUpdateSched] "C:\Program Files\Java\jre1.6.0_06\bin\jusched.exe"
O4 - HKLM\..\Run: [TkBellExe] "C:\Program Files\Fichiers communs\Real\Update_OB\realsched.exe" -osboot
O4 - HKCU\..\Run: [updateMgr] "C:\Program Files\Adobe\Acrobat 7.0\Reader\AdobeUpdateManager.exe" AcRdB7_0_9 -reboot 1
O4 - Startup: OFFICE One 6.5.lnk = C:\Program Files\OFFICE One6.5\program\quickstart.exe
O4 - Startup: OpenOffice.org 2.4.lnk = C:\Program Files\OpenOffice.org 2.4\program\quickstart.exe
O4 - Startup: World Community Grid - BOINC Manager.lnk = C:\Program Files\BOINC\boincmgr.exe
O4 - Global Startup: Lancement rapide d'Adobe Reader.lnk = C:\Program Files\Adobe\Acrobat 7.0\Reader\reader_sl.exe
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_06\bin\ssv.dll
O9 - Extra 'Tools' menuitem: Console Java (Sun) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_06\bin\ssv.dll
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O23 - Service: Service de configuration Atheros (ACS) - Unknown owner - C:\WINDOWS\system32\acs.exe
O23 - Service: AOL Connectivity Service (AOL ACS) - America Online, Inc. - C:\PROGRA~1\FICHIE~1\AOL\ACS\AOLacsd.exe
O23 - Service: avast! iAVS4 Control Service (aswUpdSv) - ALWIL Software - C:\Program Files\Alwil Software\Avast4\aswUpdSv.exe
O23 - Service: avast! Antivirus - ALWIL Software - C:\Program Files\Alwil Software\Avast4\ashServ.exe
O23 - Service: avast! Mail Scanner - ALWIL Software - C:\Program Files\Alwil Software\Avast4\ashMaiSv.exe
O23 - Service: avast! Web Scanner - ALWIL Software - C:\Program Files\Alwil Software\Avast4\ashWebSv.exe
O23 - Service: NVIDIA Display Driver Service (NVSvc) - NVIDIA Corporation - C:\WINDOWS\system32\nvsvc32.exe
O23 - Service: Ulead Burning Helper (UleadBurningHelper) - Ulead Systems, Inc. - C:\Program Files\Fichiers communs\Ulead Systems\DVD\ULCDRSvr.exe
O23 - Service: USBDeviceService - Unknown owner - C:\Program Files\Sonic\DigitalMedia LE v7\MyDVD LE\USBDeviceService.exe
lol
t´inkiete j´ai la tete bien accrochée sur les épaules ;-)
instale :
Comodo 3 pro :
http://www.commentcamarche.net/telecharger/telecharger 34055041 comodo firewall pro
tuto : https://www.malekal.com/tutorial-comodo-firewall/
spywareblaster :
http://www.brightfort.com/spywareblaster.html
c´est un resident, il suffit de le mettre a jour de temps en temps car la version gratuite ne le fait pas toute seul , une fois installé et mis a jour tu mets toutes les protections sur "enable"
tuto : https://www.malekal.com/tutorial-spywareblaster/
spyware gard :
https://www.zebulon.fr/dossiers/securite/47-spywareguard.html
puis
regarde ceci concernant avast :
antivir vs avast :
-> http://forum.malekal.com/ftopic3528.php
alors je te conseille de le desinstaller et d´installer antivir a la place
Telecharge et instales l'antivirus Antivir Personal Edition Classic :
->https://www.malekal.com/avira-free-security-antivirus-gratuit/
https://www.avira.com/en/prime
http://mickael.barroux.free.fr/securite/antivir.php
http://speedweb1.free.fr/frames2.php?page=tuto5
<- tutoriel configuration du scanner...
regalge a ma facon :
une fois antivir ouvert click surconfiguration et coche la case "expert mode" puis sur l´onglet scanner dans la fenetre du dessous tu va voir : rootkit search click sur le petit + pour deployer et coche la case a coté de ton disk dur
puis click sur configuration en haut a droite; dans la nouvelle fenetre a gauche >scanner > coche "scan all files" et en dessous >scanner priority = High
coche : allow stopping the scanner, comme cela tu peux faire une pause pendant le scan si tu le desir.
puis sur la droite coche les case suivantes :
scan boot sectors of selected drives
scan master boot sectors
scan memory
search foe rootkit before scan
decoche :
ignore off line files
toujours a gauche > scan > deploie > heuristique > macrovirus heuristic = coché et en dessous > win32 heuristic la case coché et high detection level
Puis il serait bien de lancer un scan avec antivir si possible en mode sans echec...
@+
t´inkiete j´ai la tete bien accrochée sur les épaules ;-)
instale :
Comodo 3 pro :
http://www.commentcamarche.net/telecharger/telecharger 34055041 comodo firewall pro
tuto : https://www.malekal.com/tutorial-comodo-firewall/
spywareblaster :
http://www.brightfort.com/spywareblaster.html
c´est un resident, il suffit de le mettre a jour de temps en temps car la version gratuite ne le fait pas toute seul , une fois installé et mis a jour tu mets toutes les protections sur "enable"
tuto : https://www.malekal.com/tutorial-spywareblaster/
spyware gard :
https://www.zebulon.fr/dossiers/securite/47-spywareguard.html
puis
regarde ceci concernant avast :
antivir vs avast :
-> http://forum.malekal.com/ftopic3528.php
alors je te conseille de le desinstaller et d´installer antivir a la place
Telecharge et instales l'antivirus Antivir Personal Edition Classic :
->https://www.malekal.com/avira-free-security-antivirus-gratuit/
https://www.avira.com/en/prime
http://mickael.barroux.free.fr/securite/antivir.php
http://speedweb1.free.fr/frames2.php?page=tuto5
<- tutoriel configuration du scanner...
regalge a ma facon :
une fois antivir ouvert click surconfiguration et coche la case "expert mode" puis sur l´onglet scanner dans la fenetre du dessous tu va voir : rootkit search click sur le petit + pour deployer et coche la case a coté de ton disk dur
puis click sur configuration en haut a droite; dans la nouvelle fenetre a gauche >scanner > coche "scan all files" et en dessous >scanner priority = High
coche : allow stopping the scanner, comme cela tu peux faire une pause pendant le scan si tu le desir.
puis sur la droite coche les case suivantes :
scan boot sectors of selected drives
scan master boot sectors
scan memory
search foe rootkit before scan
decoche :
ignore off line files
toujours a gauche > scan > deploie > heuristique > macrovirus heuristic = coché et en dessous > win32 heuristic la case coché et high detection level
Puis il serait bien de lancer un scan avec antivir si possible en mode sans echec...
@+
Alors, il y a pas mal de choses à dire. J'ai bien installé Comodo, Spywareblaster et Spyware Guard. Ceci dit, même avec les tutoriels, je ne sais pas si je vais savoir les utiliser efficacement. Surtout Comodo, qui visiblement intervient à peu près à chaque nouveau truc qu'on entreprend sur le net, à chaque connexion. Ça me laisse un peu perplexe, Ça viendra peut-être avec le temps, au fur et à mesure. :)
Par contre, depuis que j'ai installé Comodo (je crois que c'est à ce moment que c'est apparu la première fois), j'ai un truc bizarre qui apparaît, pour me dire que le "Smartsound" plugin n'a pas pu être installé, c'est très flou. Voilà ce qui apparaît : http://img520.imageshack.us/img520/9710/smartsoundut7.jpg
Dans le doute, je clique sur annuler, alors apparaît ceci : http://img98.imageshack.us/img98/7849/smartsound2no0.jpg
Je clique OK, et "l'application" cesse. Mais ça revient quand je cherche à installer autre chose, par exemple Spywareblaster et Spyware Guard. Qu'est ce que c'est exactement ?
Et sinon, l'autre chose, c'est que je ne vois pas comment désinstaller Avast à coup sûr. Il n'y a pas de programme de désinstallation d'Avast à proprement parler sur mon ordinateur, et par expérience, je sais que supprimer simplement le dossier Avast dans program files ne suffit pas à tout désinstaller et à éviter les conflits entre programmes similaires. Il n'exiterait pas un programme de désinstallation d'Avast ?
Par contre, depuis que j'ai installé Comodo (je crois que c'est à ce moment que c'est apparu la première fois), j'ai un truc bizarre qui apparaît, pour me dire que le "Smartsound" plugin n'a pas pu être installé, c'est très flou. Voilà ce qui apparaît : http://img520.imageshack.us/img520/9710/smartsoundut7.jpg
Dans le doute, je clique sur annuler, alors apparaît ceci : http://img98.imageshack.us/img98/7849/smartsound2no0.jpg
Je clique OK, et "l'application" cesse. Mais ça revient quand je cherche à installer autre chose, par exemple Spywareblaster et Spyware Guard. Qu'est ce que c'est exactement ?
Et sinon, l'autre chose, c'est que je ne vois pas comment désinstaller Avast à coup sûr. Il n'y a pas de programme de désinstallation d'Avast à proprement parler sur mon ordinateur, et par expérience, je sais que supprimer simplement le dossier Avast dans program files ne suffit pas à tout désinstaller et à éviter les conflits entre programmes similaires. Il n'exiterait pas un programme de désinstallation d'Avast ?
panneau de configuration puis ajout et suppression de programme tu choisis ton programme et cest parti.
mais pour avast parfois cela se passe plus difficilement alors si la premiere manniere ne fonctionne pas essaye avec cet utilitaire
http://www.commentcamarche.net/telecharger/telecharger 34055246 utilitaire de desinstallation de avast
avec ca tu devrais y arriver.
mais pour avast parfois cela se passe plus difficilement alors si la premiere manniere ne fonctionne pas essaye avec cet utilitaire
http://www.commentcamarche.net/telecharger/telecharger 34055246 utilitaire de desinstallation de avast
avec ca tu devrais y arriver.
Bonsoir !
J'ai pu tout installer, sans problème, et d'ailleurs, merci pour la technique de désinstallation d'Avast, je la garde en tête pour les autres programmes, à l'avenir... ;) Le "problème" Smartsound est réglé, j'ai fouillé un peu sur le net, et je l'ai viré de la liste de démarrage. Depuis, aucun problème.
J'ai juste une remarque concernant Antivir : "
une fois antivir ouvert click surconfiguration et coche la case "expert mode" puis sur l´onglet scanner dans la fenetre du dessous tu va voir : rootkit search click sur le petit + pour deployer et coche la case a coté de ton disk dur"
Je n'ai pas exactement cette configuration, mais plutôt ceci : http://img112.imageshack.us/img112/3555/rookitzn8.jpg
J'ai donc coché la case ayant un rapport avec le rootkit, mais le truc exact, je ne l'ai pas...
Sinon, voilà le scan Antivir en mode sans échec :
Avira AntiVir Personal
Report file date: vendredi 30 mai 2008 05:11
Scanning for 1301396 virus strains and unwanted programs.
Licensed to: Avira AntiVir PersonalEdition Classic
Serial number: 0000149996-ADJIE-0001
Platform: Windows XP
Windows version: (Service Pack 2) [5.1.2600]
Boot mode: Save mode
Username: Gaël 2
Computer name: SN012345678912
Version information:
BUILD.DAT : 8.1.00.295 16479 Bytes 09/04/2008 16:24:00
AVSCAN.EXE : 8.1.2.12 311553 Bytes 18/03/2008 09:02:56
AVSCAN.DLL : 8.1.1.0 53505 Bytes 07/02/2008 08:43:37
LUKE.DLL : 8.1.2.9 151809 Bytes 28/02/2008 08:41:23
LUKERES.DLL : 8.1.2.1 12033 Bytes 21/02/2008 08:28:40
ANTIVIR0.VDF : 6.40.0.0 11030528 Bytes 18/07/2007 10:33:34
ANTIVIR1.VDF : 7.0.3.2 5447168 Bytes 07/03/2008 13:08:58
ANTIVIR2.VDF : 7.0.4.53 1848832 Bytes 17/05/2008 22:12:39
ANTIVIR3.VDF : 7.0.4.113 361984 Bytes 29/05/2008 22:12:48
Engineversion : 8.1.0.49
AEVDF.DLL : 8.1.0.5 102772 Bytes 25/02/2008 09:58:21
AESCRIPT.DLL : 8.1.0.36 270714 Bytes 29/05/2008 22:13:57
AESCN.DLL : 8.1.0.20 119157 Bytes 29/05/2008 22:13:55
AERDL.DLL : 8.1.0.20 418165 Bytes 29/05/2008 22:13:53
AEPACK.DLL : 8.1.1.5 364918 Bytes 29/05/2008 22:13:43
AEOFFICE.DLL : 8.1.0.18 192890 Bytes 29/05/2008 22:13:38
AEHEUR.DLL : 8.1.0.29 1253750 Bytes 29/05/2008 22:13:36
AEHELP.DLL : 8.1.0.15 115063 Bytes 29/05/2008 22:13:22
AEGEN.DLL : 8.1.0.23 307573 Bytes 29/05/2008 22:13:21
AEEMU.DLL : 8.1.0.6 430451 Bytes 29/05/2008 22:13:09
AECORE.DLL : 8.1.0.30 168311 Bytes 29/05/2008 22:13:01
AVWINLL.DLL : 1.0.0.7 14593 Bytes 23/01/2008 17:07:53
AVPREF.DLL : 8.0.0.1 25857 Bytes 18/02/2008 10:37:50
AVREP.DLL : 7.0.0.1 155688 Bytes 16/04/2007 13:26:47
AVREG.DLL : 8.0.0.0 30977 Bytes 23/01/2008 17:07:49
AVARKT.DLL : 1.0.0.23 307457 Bytes 12/02/2008 08:29:23
AVEVTLOG.DLL : 8.0.0.11 114945 Bytes 28/02/2008 08:31:31
SQLITE3.DLL : 3.3.17.1 339968 Bytes 22/01/2008 17:28:02
SMTPLIB.DLL : 1.2.0.19 28929 Bytes 23/01/2008 17:08:39
NETNT.DLL : 8.0.0.1 7937 Bytes 25/01/2008 12:05:10
RCIMAGE.DLL : 8.0.0.35 2371841 Bytes 10/03/2008 14:37:25
RCTEXT.DLL : 8.0.32.0 86273 Bytes 06/03/2008 12:02:11
Configuration settings for the scan:
Jobname..........................: Complete system scan
Configuration file...............: c:\program files\avira\antivir personaledition classic\sysscan.avp
Logging..........................: low
Primary action...................: interactive
Secondary action.................: ignore
Scan master boot sector..........: on
Scan boot sector.................: on
Boot sectors.....................: C:,
Scan memory......................: on
Process scan.....................: on
Scan registry....................: on
Search for rootkits..............: on
Scan all files...................: All files
Scan archives....................: on
Recursion depth..................: 20
Smart extensions.................: on
Deviating archive types..........: +BSD Mailbox, +Netscape/Mozilla Mailbox, +Eudora Mailbox, +Squid cache, +Pegasus Mailbox, +MS Outlook Mailbox,
Macro heuristic..................: on
File heuristic...................: medium
Deviating risk categories........: +APPL,+GAME,+JOKE,+PCK,+SPR,
Start of the scan: vendredi 30 mai 2008 05:11
Starting search for hidden objects.
The driver could not be initialized.
The scan of running processes will be started
Scan process 'avscan.exe' - '1' Module(s) have been scanned
Scan process 'avcenter.exe' - '1' Module(s) have been scanned
Scan process 'explorer.exe' - '1' Module(s) have been scanned
Scan process 'svchost.exe' - '1' Module(s) have been scanned
Scan process 'svchost.exe' - '1' Module(s) have been scanned
Scan process 'svchost.exe' - '1' Module(s) have been scanned
Scan process 'lsass.exe' - '1' Module(s) have been scanned
Scan process 'services.exe' - '1' Module(s) have been scanned
Scan process 'winlogon.exe' - '1' Module(s) have been scanned
Scan process 'csrss.exe' - '1' Module(s) have been scanned
Scan process 'smss.exe' - '1' Module(s) have been scanned
11 processes with 11 modules were scanned
Starting master boot sector scan:
Master boot sector HD0
[INFO] No virus was found!
Start scanning boot sectors:
Boot sector 'C:\'
[INFO] No virus was found!
Starting to scan the registry.
The registry was scanned ( '31' files ).
Starting the file scan:
Begin scan in 'C:\' <HDD>
C:\pagefile.sys
[WARNING] The file could not be opened!
C:\Documents and Settings\All Users\Application Data\Symantec\Norton AntiVirus\Quarantine\0F290639.exe
[0] Archive type: HIDDEN
--> FIL\\\?\C:\Documents and Settings\All Users\Application Data\Symantec\Norton AntiVirus\Quarantine\0F290639.exe
[DETECTION] Is the Trojan horse TR/VB.aqt
[NOTE] The file was moved to '4871b0fb.qua'!
C:\Documents and Settings\All Users\Application Data\Symantec\Norton AntiVirus\Quarantine\19576705.exe
[0] Archive type: HIDDEN
--> FIL\\\?\C:\Documents and Settings\All Users\Application Data\Symantec\Norton AntiVirus\Quarantine\19576705.exe
[DETECTION] Is the Trojan horse TR/VB.aqt
[NOTE] The file was moved to '4874b0f6.qua'!
C:\Documents and Settings\All Users\Application Data\Symantec\Norton AntiVirus\Quarantine\42F11419.exe
[0] Archive type: HIDDEN
--> FIL\\\?\C:\Documents and Settings\All Users\Application Data\Symantec\Norton AntiVirus\Quarantine\42F11419.exe
[DETECTION] Is the Trojan horse TR/VB.aqt
[NOTE] The file was moved to '4885b0f7.qua'!
C:\Documents and Settings\Gaël 2\Bureau\Section 9\ComboFix.exe
[DETECTION] Contains detection pattern of the application APPL/Tool.NirCmd.D
[DETECTION] Contains detection pattern of the application APPL/Rmadmin.131072
[DETECTION] Contains detection pattern of the SPR/Tool.PV program
[NOTE] The file was moved to '48acb21b.qua'!
C:\fixwareout\FindT\nircmd.exe
[DETECTION] Contains detection pattern of the application APPL/NirCmd.2
[NOTE] The file was moved to '48b1b985.qua'!
C:\QooBox\Quarantine\catchme2008-05-27_ 00809,62.zip
[0] Archive type: ZIP
--> opnoppml.dll
[DETECTION] Is the Trojan horse TR/Vundo.Gen
[NOTE] The file was moved to '48b3c114.qua'!
C:\QooBox\Quarantine\C\Program Files\NetProject\sbmdl.dll.vir
[DETECTION] Is the Trojan horse TR/Dldr.Zlob.luc
[NOTE] The file was moved to '48acc116.qua'!
C:\QooBox\Quarantine\C\Program Files\NetProject\sbmntr.exe.vir
[DETECTION] Is the Trojan horse TR/Dldr.Zlob.lps.11
[NOTE] The file was moved to '48acc117.qua'!
C:\QooBox\Quarantine\C\Program Files\NetProject\sbsm.exe.vir
[DETECTION] Is the Trojan horse TR/BHO.bjw
[NOTE] The file was moved to '48b2c117.qua'!
C:\QooBox\Quarantine\C\WINDOWS\system32\alnrvsee.dll.vir
[DETECTION] Is the Trojan horse TR/Vundo.Gen
[NOTE] The file was moved to '48adc122.qua'!
C:\QooBox\Quarantine\C\WINDOWS\system32\babksaxx.dll.vir
[DETECTION] Is the Trojan horse TR/Monder.108544
[NOTE] The file was moved to '48a1c117.qua'!
C:\QooBox\Quarantine\C\WINDOWS\system32\bkftbpjn.exe.vir
[DETECTION] Is the Trojan horse TR/PrivacySet.A
[NOTE] The file was moved to '48a5c122.qua'!
C:\QooBox\Quarantine\C\WINDOWS\system32\btllbxge.exe.vir
[DETECTION] Is the Trojan horse TR/PrivacySet.A
[NOTE] The file was moved to '48abc12b.qua'!
C:\QooBox\Quarantine\C\WINDOWS\system32\ctndridl.dll.vir
[DETECTION] Is the Trojan horse TR/Monder.IK
[NOTE] The file was moved to '48adc12c.qua'!
C:\QooBox\Quarantine\C\WINDOWS\system32\ctobocfm.exe.vir
[DETECTION] Is the Trojan horse TR/PrivacySet.A
[NOTE] The file was moved to '48aec12c.qua'!
C:\QooBox\Quarantine\C\WINDOWS\system32\flwugrcv.dll.vir
[DETECTION] Is the Trojan horse TR/Monder.IO
[NOTE] The file was moved to '48b6c124.qua'!
C:\QooBox\Quarantine\C\WINDOWS\system32\frpyrtit.dll.vir
[DETECTION] Is the Trojan horse TR/Vundo.Gen
[NOTE] The file was moved to '48afc12b.qua'!
C:\QooBox\Quarantine\C\WINDOWS\system32\fwodpnan.dll.vir
[DETECTION] Is the Trojan horse TR/Monder.IX
[NOTE] The file was moved to '48aec130.qua'!
C:\QooBox\Quarantine\C\WINDOWS\system32\gbgdjsoj.dll.vir
[DETECTION] Is the Trojan horse TR/Monder.GZ
[NOTE] The file was moved to '48a6c11b.qua'!
C:\QooBox\Quarantine\C\WINDOWS\system32\gmalsvwr.exe.vir
[DETECTION] Is the Trojan horse TR/PrivacySet.A
[NOTE] The file was moved to '48a0c127.qua'!
C:\QooBox\Quarantine\C\WINDOWS\system32\gmgutspo.dll.vir
[DETECTION] Is the Trojan horse TR/Vundo.EMI
[NOTE] The file was moved to '48a6c127.qua'!
C:\QooBox\Quarantine\C\WINDOWS\system32\hrsbtlrf.dll.vir
[DETECTION] Is the Trojan horse TR/Vundo.Gen
[NOTE] The file was moved to '48b2c12d.qua'!
C:\QooBox\Quarantine\C\WINDOWS\system32\iqsjcpce.dll.vir
[DETECTION] Is the Trojan horse TR/Vundo.Gen
[NOTE] The file was moved to '48b2c12c.qua'!
C:\QooBox\Quarantine\C\WINDOWS\system32\irwbqjon.exe.vir
[DETECTION] Is the Trojan horse TR/PrivacySet.A
[NOTE] The file was moved to '48b6c12d.qua'!
C:\QooBox\Quarantine\C\WINDOWS\system32\jkfxfpfp.dll.vir
[DETECTION] Is the Trojan horse TR/Vundo.Gen
[NOTE] The file was moved to '48a5c127.qua'!
C:\QooBox\Quarantine\C\WINDOWS\system32\jomdoiui.exe.vir
[DETECTION] Is the Trojan horse TR/PrivacySet.A
[NOTE] The file was moved to '48acc12b.qua'!
C:\QooBox\Quarantine\C\WINDOWS\system32\joquulhj.dll.vir
[DETECTION] Is the Trojan horse TR/Monder.DI
[NOTE] The file was moved to '48b0c12c.qua'!
C:\QooBox\Quarantine\C\WINDOWS\system32\jstwblsl.exe.vir
[DETECTION] Is the Trojan horse TR/PrivacySet.A
[NOTE] The file was moved to '48b3c130.qua'!
C:\QooBox\Quarantine\C\WINDOWS\system32\jsxwtpco.dll.vir
[DETECTION] Is the Trojan horse TR/Vundo.Gen
[NOTE] The file was moved to '48b7c130.qua'!
C:\QooBox\Quarantine\C\WINDOWS\system32\kdsvg.exe.vir
[DETECTION] Is the Trojan horse TR/Vundo.Gen
[NOTE] The file was moved to '48b2c122.qua'!
C:\QooBox\Quarantine\C\WINDOWS\system32\kithchxd.exe.vir
[DETECTION] Is the Trojan horse TR/PrivacySet.A
[NOTE] The file was moved to '48b3c127.qua'!
C:\QooBox\Quarantine\C\WINDOWS\system32\kksyborv.dll.vir
[DETECTION] Is the Trojan horse TR/Monder.DO
[NOTE] The file was moved to '48b2c129.qua'!
C:\QooBox\Quarantine\C\WINDOWS\system32\kmccvefh.dll.vir
[DETECTION] Is the Trojan horse TR/Vundo.Gen
[NOTE] The file was moved to '48a2c12c.qua'!
C:\QooBox\Quarantine\C\WINDOWS\system32\kvvhtsub.exe.vir
[DETECTION] Is the Trojan horse TR/PrivacySet.A
[NOTE] The file was moved to '48b5c135.qua'!
C:\QooBox\Quarantine\C\WINDOWS\system32\leqtxvfo.dll.vir
[DETECTION] Is the Trojan horse TR/Vundo.EMP
[NOTE] The file was moved to '48b0c124.qua'!
C:\QooBox\Quarantine\C\WINDOWS\system32\mobfasyq.dll.vir
[DETECTION] Is the Trojan horse TR/Monder.IX
[NOTE] The file was moved to '48a1c12f.qua'!
C:\QooBox\Quarantine\C\WINDOWS\system32\mtxqohqy.dll.vir
[DETECTION] Is the Trojan horse TR/Vundo.Gen
[NOTE] The file was moved to '48b7c134.qua'!
C:\QooBox\Quarantine\C\WINDOWS\system32\nkavgjpo.dll.vir
[DETECTION] Is the Trojan horse TR/Vundo.Gen
[NOTE] The file was moved to '48a0c12c.qua'!
C:\QooBox\Quarantine\C\WINDOWS\system32\nnnNGYsQ.dll.vir
[DETECTION] Is the Trojan horse TR/Monder.41984.1
[NOTE] The file was moved to '48adc12f.qua'!
C:\QooBox\Quarantine\C\WINDOWS\system32\nvkbblqb.dll.vir
[DETECTION] Is the Trojan horse TR/Vundo.Gen
[NOTE] The file was moved to '48aac137.qua'!
C:\QooBox\Quarantine\C\WINDOWS\system32\odsnxmhn.exe.vir
[DETECTION] Is the Trojan horse TR/PrivacySet.A
[NOTE] The file was moved to '48b2c126.qua'!
C:\QooBox\Quarantine\C\WINDOWS\system32\oibqttfn.dll.vir
[DETECTION] Is the Trojan horse TR/Vundo.Gen
[NOTE] The file was moved to '48a1c12b.qua'!
C:\QooBox\Quarantine\C\WINDOWS\system32\pnhruffs.exe.vir
[DETECTION] Is the Trojan horse TR/PrivacySet.A
[NOTE] The file was moved to '48a7c131.qua'!
C:\QooBox\Quarantine\C\WINDOWS\system32\qdnkkxtu.dll.vir
[DETECTION] Is the Trojan horse TR/Monder.104512
[NOTE] The file was moved to '48adc127.qua'!
C:\QooBox\Quarantine\C\WINDOWS\system32\qxgbcver.exe.vir
[DETECTION] Is the Trojan horse TR/PrivacySet.A
[NOTE] The file was moved to '48a6c13c.qua'!
C:\QooBox\Quarantine\C\WINDOWS\system32\reqvqlrq.dll.vir
[DETECTION] Is the Trojan horse TR/Monder.DE
[NOTE] The file was moved to '48b0c12a.qua'!
C:\QooBox\Quarantine\C\WINDOWS\system32\rvvqxyrp.dll.vir
[DETECTION] Is the Trojan horse TR/Vundo.Gen
[NOTE] The file was moved to '48b5c13b.qua'!
C:\QooBox\Quarantine\C\WINDOWS\system32\rxnaufdk.dll.vir
[DETECTION] Is the Trojan horse TR/Monder.105024
[NOTE] The file was moved to '48adc13e.qua'!
C:\QooBox\Quarantine\C\WINDOWS\system32\slfvlkgt.dll.vir
[DETECTION] Is the Trojan horse TR/Monder.IX
[NOTE] The file was moved to '48a5c132.qua'!
C:\QooBox\Quarantine\C\WINDOWS\system32\taurarof.exe.vir
[DETECTION] Is the Trojan horse TR/PrivacySet.A
[NOTE] The file was moved to '48b4c127.qua'!
C:\QooBox\Quarantine\C\WINDOWS\system32\tnhkrgys.dll.vir
[DETECTION] Is the Trojan horse TR/Monder.108544
[NOTE] The file was moved to '48a7c135.qua'!
C:\QooBox\Quarantine\C\WINDOWS\system32\uugdajmc.dll.vir
[DETECTION] Is the Trojan horse TR/Vundo.Gen
[NOTE] The file was moved to '48a6c13d.qua'!
C:\QooBox\Quarantine\C\WINDOWS\system32\uugdsuua.dll.vir
[DETECTION] Is the Trojan horse TR/Vundo.Gen
[NOTE] The file was moved to '490bfc26.qua'!
C:\QooBox\Quarantine\C\WINDOWS\system32\vdmhntyd.dll.vir
[DETECTION] Is the Trojan horse TR/Vundo.Gen
[NOTE] The file was moved to '48acc12c.qua'!
C:\QooBox\Quarantine\C\WINDOWS\system32\wenamyec.exe.vir
[DETECTION] Is the Trojan horse TR/PrivacySet.A
[NOTE] The file was moved to '48adc12d.qua'!
C:\QooBox\Quarantine\C\WINDOWS\system32\wxvrrxqu.dll.vir
[DETECTION] Is the Trojan horse TR/Vundo.Gen
[NOTE] The file was moved to '48b5c141.qua'!
C:\QooBox\Quarantine\C\WINDOWS\system32\xkubtxff.dll.vir
[DETECTION] Is the Trojan horse TR/Vundo.Gen
[NOTE] The file was moved to '48b4c134.qua'!
C:\QooBox\Quarantine\C\WINDOWS\system32\xmekrqyr.dll.vir
[DETECTION] Is the Trojan horse TR/Monder.108544
[NOTE] The file was moved to '48a4c137.qua'!
C:\QooBox\Quarantine\C\WINDOWS\system32\yeioexwn.dll.vir
[DETECTION] Is the Trojan horse TR/Vundo.EOL
[NOTE] The file was moved to '48a8c12f.qua'!
C:\QooBox\Quarantine\C\WINDOWS\system32\ytokdaal.dll.vir
[DETECTION] Is the Trojan horse TR/Vundo.EMQ
[NOTE] The file was moved to '48aec13f.qua'!
C:\QooBox\Quarantine\C\WINDOWS\system32\yyrvxqqn.dll.vir
[DETECTION] Is the Trojan horse TR/Vundo.Gen
[NOTE] The file was moved to '48b1c144.qua'!
End of the scan: vendredi 30 mai 2008 11:43
Used time: 6:32:50 min
The scan has been done completely.
8528 Scanning directories
399595 Files were scanned
63 viruses and/or unwanted programs were found
0 Files were classified as suspicious:
0 files were deleted
0 files were repaired
61 files were moved to quarantine
0 files were renamed
1 Files cannot be scanned
399532 Files not concerned
11590 Archives were scanned
1 Warnings
61 Notes
Quand j'ai redémarré l'ordinateur en mode normal après ce scan, Antivir en a relancé un automatiquement, ce qui a donné des résultats différents... Je le mets aussi ?
J'ai pu tout installer, sans problème, et d'ailleurs, merci pour la technique de désinstallation d'Avast, je la garde en tête pour les autres programmes, à l'avenir... ;) Le "problème" Smartsound est réglé, j'ai fouillé un peu sur le net, et je l'ai viré de la liste de démarrage. Depuis, aucun problème.
J'ai juste une remarque concernant Antivir : "
une fois antivir ouvert click surconfiguration et coche la case "expert mode" puis sur l´onglet scanner dans la fenetre du dessous tu va voir : rootkit search click sur le petit + pour deployer et coche la case a coté de ton disk dur"
Je n'ai pas exactement cette configuration, mais plutôt ceci : http://img112.imageshack.us/img112/3555/rookitzn8.jpg
J'ai donc coché la case ayant un rapport avec le rootkit, mais le truc exact, je ne l'ai pas...
Sinon, voilà le scan Antivir en mode sans échec :
Avira AntiVir Personal
Report file date: vendredi 30 mai 2008 05:11
Scanning for 1301396 virus strains and unwanted programs.
Licensed to: Avira AntiVir PersonalEdition Classic
Serial number: 0000149996-ADJIE-0001
Platform: Windows XP
Windows version: (Service Pack 2) [5.1.2600]
Boot mode: Save mode
Username: Gaël 2
Computer name: SN012345678912
Version information:
BUILD.DAT : 8.1.00.295 16479 Bytes 09/04/2008 16:24:00
AVSCAN.EXE : 8.1.2.12 311553 Bytes 18/03/2008 09:02:56
AVSCAN.DLL : 8.1.1.0 53505 Bytes 07/02/2008 08:43:37
LUKE.DLL : 8.1.2.9 151809 Bytes 28/02/2008 08:41:23
LUKERES.DLL : 8.1.2.1 12033 Bytes 21/02/2008 08:28:40
ANTIVIR0.VDF : 6.40.0.0 11030528 Bytes 18/07/2007 10:33:34
ANTIVIR1.VDF : 7.0.3.2 5447168 Bytes 07/03/2008 13:08:58
ANTIVIR2.VDF : 7.0.4.53 1848832 Bytes 17/05/2008 22:12:39
ANTIVIR3.VDF : 7.0.4.113 361984 Bytes 29/05/2008 22:12:48
Engineversion : 8.1.0.49
AEVDF.DLL : 8.1.0.5 102772 Bytes 25/02/2008 09:58:21
AESCRIPT.DLL : 8.1.0.36 270714 Bytes 29/05/2008 22:13:57
AESCN.DLL : 8.1.0.20 119157 Bytes 29/05/2008 22:13:55
AERDL.DLL : 8.1.0.20 418165 Bytes 29/05/2008 22:13:53
AEPACK.DLL : 8.1.1.5 364918 Bytes 29/05/2008 22:13:43
AEOFFICE.DLL : 8.1.0.18 192890 Bytes 29/05/2008 22:13:38
AEHEUR.DLL : 8.1.0.29 1253750 Bytes 29/05/2008 22:13:36
AEHELP.DLL : 8.1.0.15 115063 Bytes 29/05/2008 22:13:22
AEGEN.DLL : 8.1.0.23 307573 Bytes 29/05/2008 22:13:21
AEEMU.DLL : 8.1.0.6 430451 Bytes 29/05/2008 22:13:09
AECORE.DLL : 8.1.0.30 168311 Bytes 29/05/2008 22:13:01
AVWINLL.DLL : 1.0.0.7 14593 Bytes 23/01/2008 17:07:53
AVPREF.DLL : 8.0.0.1 25857 Bytes 18/02/2008 10:37:50
AVREP.DLL : 7.0.0.1 155688 Bytes 16/04/2007 13:26:47
AVREG.DLL : 8.0.0.0 30977 Bytes 23/01/2008 17:07:49
AVARKT.DLL : 1.0.0.23 307457 Bytes 12/02/2008 08:29:23
AVEVTLOG.DLL : 8.0.0.11 114945 Bytes 28/02/2008 08:31:31
SQLITE3.DLL : 3.3.17.1 339968 Bytes 22/01/2008 17:28:02
SMTPLIB.DLL : 1.2.0.19 28929 Bytes 23/01/2008 17:08:39
NETNT.DLL : 8.0.0.1 7937 Bytes 25/01/2008 12:05:10
RCIMAGE.DLL : 8.0.0.35 2371841 Bytes 10/03/2008 14:37:25
RCTEXT.DLL : 8.0.32.0 86273 Bytes 06/03/2008 12:02:11
Configuration settings for the scan:
Jobname..........................: Complete system scan
Configuration file...............: c:\program files\avira\antivir personaledition classic\sysscan.avp
Logging..........................: low
Primary action...................: interactive
Secondary action.................: ignore
Scan master boot sector..........: on
Scan boot sector.................: on
Boot sectors.....................: C:,
Scan memory......................: on
Process scan.....................: on
Scan registry....................: on
Search for rootkits..............: on
Scan all files...................: All files
Scan archives....................: on
Recursion depth..................: 20
Smart extensions.................: on
Deviating archive types..........: +BSD Mailbox, +Netscape/Mozilla Mailbox, +Eudora Mailbox, +Squid cache, +Pegasus Mailbox, +MS Outlook Mailbox,
Macro heuristic..................: on
File heuristic...................: medium
Deviating risk categories........: +APPL,+GAME,+JOKE,+PCK,+SPR,
Start of the scan: vendredi 30 mai 2008 05:11
Starting search for hidden objects.
The driver could not be initialized.
The scan of running processes will be started
Scan process 'avscan.exe' - '1' Module(s) have been scanned
Scan process 'avcenter.exe' - '1' Module(s) have been scanned
Scan process 'explorer.exe' - '1' Module(s) have been scanned
Scan process 'svchost.exe' - '1' Module(s) have been scanned
Scan process 'svchost.exe' - '1' Module(s) have been scanned
Scan process 'svchost.exe' - '1' Module(s) have been scanned
Scan process 'lsass.exe' - '1' Module(s) have been scanned
Scan process 'services.exe' - '1' Module(s) have been scanned
Scan process 'winlogon.exe' - '1' Module(s) have been scanned
Scan process 'csrss.exe' - '1' Module(s) have been scanned
Scan process 'smss.exe' - '1' Module(s) have been scanned
11 processes with 11 modules were scanned
Starting master boot sector scan:
Master boot sector HD0
[INFO] No virus was found!
Start scanning boot sectors:
Boot sector 'C:\'
[INFO] No virus was found!
Starting to scan the registry.
The registry was scanned ( '31' files ).
Starting the file scan:
Begin scan in 'C:\' <HDD>
C:\pagefile.sys
[WARNING] The file could not be opened!
C:\Documents and Settings\All Users\Application Data\Symantec\Norton AntiVirus\Quarantine\0F290639.exe
[0] Archive type: HIDDEN
--> FIL\\\?\C:\Documents and Settings\All Users\Application Data\Symantec\Norton AntiVirus\Quarantine\0F290639.exe
[DETECTION] Is the Trojan horse TR/VB.aqt
[NOTE] The file was moved to '4871b0fb.qua'!
C:\Documents and Settings\All Users\Application Data\Symantec\Norton AntiVirus\Quarantine\19576705.exe
[0] Archive type: HIDDEN
--> FIL\\\?\C:\Documents and Settings\All Users\Application Data\Symantec\Norton AntiVirus\Quarantine\19576705.exe
[DETECTION] Is the Trojan horse TR/VB.aqt
[NOTE] The file was moved to '4874b0f6.qua'!
C:\Documents and Settings\All Users\Application Data\Symantec\Norton AntiVirus\Quarantine\42F11419.exe
[0] Archive type: HIDDEN
--> FIL\\\?\C:\Documents and Settings\All Users\Application Data\Symantec\Norton AntiVirus\Quarantine\42F11419.exe
[DETECTION] Is the Trojan horse TR/VB.aqt
[NOTE] The file was moved to '4885b0f7.qua'!
C:\Documents and Settings\Gaël 2\Bureau\Section 9\ComboFix.exe
[DETECTION] Contains detection pattern of the application APPL/Tool.NirCmd.D
[DETECTION] Contains detection pattern of the application APPL/Rmadmin.131072
[DETECTION] Contains detection pattern of the SPR/Tool.PV program
[NOTE] The file was moved to '48acb21b.qua'!
C:\fixwareout\FindT\nircmd.exe
[DETECTION] Contains detection pattern of the application APPL/NirCmd.2
[NOTE] The file was moved to '48b1b985.qua'!
C:\QooBox\Quarantine\catchme2008-05-27_ 00809,62.zip
[0] Archive type: ZIP
--> opnoppml.dll
[DETECTION] Is the Trojan horse TR/Vundo.Gen
[NOTE] The file was moved to '48b3c114.qua'!
C:\QooBox\Quarantine\C\Program Files\NetProject\sbmdl.dll.vir
[DETECTION] Is the Trojan horse TR/Dldr.Zlob.luc
[NOTE] The file was moved to '48acc116.qua'!
C:\QooBox\Quarantine\C\Program Files\NetProject\sbmntr.exe.vir
[DETECTION] Is the Trojan horse TR/Dldr.Zlob.lps.11
[NOTE] The file was moved to '48acc117.qua'!
C:\QooBox\Quarantine\C\Program Files\NetProject\sbsm.exe.vir
[DETECTION] Is the Trojan horse TR/BHO.bjw
[NOTE] The file was moved to '48b2c117.qua'!
C:\QooBox\Quarantine\C\WINDOWS\system32\alnrvsee.dll.vir
[DETECTION] Is the Trojan horse TR/Vundo.Gen
[NOTE] The file was moved to '48adc122.qua'!
C:\QooBox\Quarantine\C\WINDOWS\system32\babksaxx.dll.vir
[DETECTION] Is the Trojan horse TR/Monder.108544
[NOTE] The file was moved to '48a1c117.qua'!
C:\QooBox\Quarantine\C\WINDOWS\system32\bkftbpjn.exe.vir
[DETECTION] Is the Trojan horse TR/PrivacySet.A
[NOTE] The file was moved to '48a5c122.qua'!
C:\QooBox\Quarantine\C\WINDOWS\system32\btllbxge.exe.vir
[DETECTION] Is the Trojan horse TR/PrivacySet.A
[NOTE] The file was moved to '48abc12b.qua'!
C:\QooBox\Quarantine\C\WINDOWS\system32\ctndridl.dll.vir
[DETECTION] Is the Trojan horse TR/Monder.IK
[NOTE] The file was moved to '48adc12c.qua'!
C:\QooBox\Quarantine\C\WINDOWS\system32\ctobocfm.exe.vir
[DETECTION] Is the Trojan horse TR/PrivacySet.A
[NOTE] The file was moved to '48aec12c.qua'!
C:\QooBox\Quarantine\C\WINDOWS\system32\flwugrcv.dll.vir
[DETECTION] Is the Trojan horse TR/Monder.IO
[NOTE] The file was moved to '48b6c124.qua'!
C:\QooBox\Quarantine\C\WINDOWS\system32\frpyrtit.dll.vir
[DETECTION] Is the Trojan horse TR/Vundo.Gen
[NOTE] The file was moved to '48afc12b.qua'!
C:\QooBox\Quarantine\C\WINDOWS\system32\fwodpnan.dll.vir
[DETECTION] Is the Trojan horse TR/Monder.IX
[NOTE] The file was moved to '48aec130.qua'!
C:\QooBox\Quarantine\C\WINDOWS\system32\gbgdjsoj.dll.vir
[DETECTION] Is the Trojan horse TR/Monder.GZ
[NOTE] The file was moved to '48a6c11b.qua'!
C:\QooBox\Quarantine\C\WINDOWS\system32\gmalsvwr.exe.vir
[DETECTION] Is the Trojan horse TR/PrivacySet.A
[NOTE] The file was moved to '48a0c127.qua'!
C:\QooBox\Quarantine\C\WINDOWS\system32\gmgutspo.dll.vir
[DETECTION] Is the Trojan horse TR/Vundo.EMI
[NOTE] The file was moved to '48a6c127.qua'!
C:\QooBox\Quarantine\C\WINDOWS\system32\hrsbtlrf.dll.vir
[DETECTION] Is the Trojan horse TR/Vundo.Gen
[NOTE] The file was moved to '48b2c12d.qua'!
C:\QooBox\Quarantine\C\WINDOWS\system32\iqsjcpce.dll.vir
[DETECTION] Is the Trojan horse TR/Vundo.Gen
[NOTE] The file was moved to '48b2c12c.qua'!
C:\QooBox\Quarantine\C\WINDOWS\system32\irwbqjon.exe.vir
[DETECTION] Is the Trojan horse TR/PrivacySet.A
[NOTE] The file was moved to '48b6c12d.qua'!
C:\QooBox\Quarantine\C\WINDOWS\system32\jkfxfpfp.dll.vir
[DETECTION] Is the Trojan horse TR/Vundo.Gen
[NOTE] The file was moved to '48a5c127.qua'!
C:\QooBox\Quarantine\C\WINDOWS\system32\jomdoiui.exe.vir
[DETECTION] Is the Trojan horse TR/PrivacySet.A
[NOTE] The file was moved to '48acc12b.qua'!
C:\QooBox\Quarantine\C\WINDOWS\system32\joquulhj.dll.vir
[DETECTION] Is the Trojan horse TR/Monder.DI
[NOTE] The file was moved to '48b0c12c.qua'!
C:\QooBox\Quarantine\C\WINDOWS\system32\jstwblsl.exe.vir
[DETECTION] Is the Trojan horse TR/PrivacySet.A
[NOTE] The file was moved to '48b3c130.qua'!
C:\QooBox\Quarantine\C\WINDOWS\system32\jsxwtpco.dll.vir
[DETECTION] Is the Trojan horse TR/Vundo.Gen
[NOTE] The file was moved to '48b7c130.qua'!
C:\QooBox\Quarantine\C\WINDOWS\system32\kdsvg.exe.vir
[DETECTION] Is the Trojan horse TR/Vundo.Gen
[NOTE] The file was moved to '48b2c122.qua'!
C:\QooBox\Quarantine\C\WINDOWS\system32\kithchxd.exe.vir
[DETECTION] Is the Trojan horse TR/PrivacySet.A
[NOTE] The file was moved to '48b3c127.qua'!
C:\QooBox\Quarantine\C\WINDOWS\system32\kksyborv.dll.vir
[DETECTION] Is the Trojan horse TR/Monder.DO
[NOTE] The file was moved to '48b2c129.qua'!
C:\QooBox\Quarantine\C\WINDOWS\system32\kmccvefh.dll.vir
[DETECTION] Is the Trojan horse TR/Vundo.Gen
[NOTE] The file was moved to '48a2c12c.qua'!
C:\QooBox\Quarantine\C\WINDOWS\system32\kvvhtsub.exe.vir
[DETECTION] Is the Trojan horse TR/PrivacySet.A
[NOTE] The file was moved to '48b5c135.qua'!
C:\QooBox\Quarantine\C\WINDOWS\system32\leqtxvfo.dll.vir
[DETECTION] Is the Trojan horse TR/Vundo.EMP
[NOTE] The file was moved to '48b0c124.qua'!
C:\QooBox\Quarantine\C\WINDOWS\system32\mobfasyq.dll.vir
[DETECTION] Is the Trojan horse TR/Monder.IX
[NOTE] The file was moved to '48a1c12f.qua'!
C:\QooBox\Quarantine\C\WINDOWS\system32\mtxqohqy.dll.vir
[DETECTION] Is the Trojan horse TR/Vundo.Gen
[NOTE] The file was moved to '48b7c134.qua'!
C:\QooBox\Quarantine\C\WINDOWS\system32\nkavgjpo.dll.vir
[DETECTION] Is the Trojan horse TR/Vundo.Gen
[NOTE] The file was moved to '48a0c12c.qua'!
C:\QooBox\Quarantine\C\WINDOWS\system32\nnnNGYsQ.dll.vir
[DETECTION] Is the Trojan horse TR/Monder.41984.1
[NOTE] The file was moved to '48adc12f.qua'!
C:\QooBox\Quarantine\C\WINDOWS\system32\nvkbblqb.dll.vir
[DETECTION] Is the Trojan horse TR/Vundo.Gen
[NOTE] The file was moved to '48aac137.qua'!
C:\QooBox\Quarantine\C\WINDOWS\system32\odsnxmhn.exe.vir
[DETECTION] Is the Trojan horse TR/PrivacySet.A
[NOTE] The file was moved to '48b2c126.qua'!
C:\QooBox\Quarantine\C\WINDOWS\system32\oibqttfn.dll.vir
[DETECTION] Is the Trojan horse TR/Vundo.Gen
[NOTE] The file was moved to '48a1c12b.qua'!
C:\QooBox\Quarantine\C\WINDOWS\system32\pnhruffs.exe.vir
[DETECTION] Is the Trojan horse TR/PrivacySet.A
[NOTE] The file was moved to '48a7c131.qua'!
C:\QooBox\Quarantine\C\WINDOWS\system32\qdnkkxtu.dll.vir
[DETECTION] Is the Trojan horse TR/Monder.104512
[NOTE] The file was moved to '48adc127.qua'!
C:\QooBox\Quarantine\C\WINDOWS\system32\qxgbcver.exe.vir
[DETECTION] Is the Trojan horse TR/PrivacySet.A
[NOTE] The file was moved to '48a6c13c.qua'!
C:\QooBox\Quarantine\C\WINDOWS\system32\reqvqlrq.dll.vir
[DETECTION] Is the Trojan horse TR/Monder.DE
[NOTE] The file was moved to '48b0c12a.qua'!
C:\QooBox\Quarantine\C\WINDOWS\system32\rvvqxyrp.dll.vir
[DETECTION] Is the Trojan horse TR/Vundo.Gen
[NOTE] The file was moved to '48b5c13b.qua'!
C:\QooBox\Quarantine\C\WINDOWS\system32\rxnaufdk.dll.vir
[DETECTION] Is the Trojan horse TR/Monder.105024
[NOTE] The file was moved to '48adc13e.qua'!
C:\QooBox\Quarantine\C\WINDOWS\system32\slfvlkgt.dll.vir
[DETECTION] Is the Trojan horse TR/Monder.IX
[NOTE] The file was moved to '48a5c132.qua'!
C:\QooBox\Quarantine\C\WINDOWS\system32\taurarof.exe.vir
[DETECTION] Is the Trojan horse TR/PrivacySet.A
[NOTE] The file was moved to '48b4c127.qua'!
C:\QooBox\Quarantine\C\WINDOWS\system32\tnhkrgys.dll.vir
[DETECTION] Is the Trojan horse TR/Monder.108544
[NOTE] The file was moved to '48a7c135.qua'!
C:\QooBox\Quarantine\C\WINDOWS\system32\uugdajmc.dll.vir
[DETECTION] Is the Trojan horse TR/Vundo.Gen
[NOTE] The file was moved to '48a6c13d.qua'!
C:\QooBox\Quarantine\C\WINDOWS\system32\uugdsuua.dll.vir
[DETECTION] Is the Trojan horse TR/Vundo.Gen
[NOTE] The file was moved to '490bfc26.qua'!
C:\QooBox\Quarantine\C\WINDOWS\system32\vdmhntyd.dll.vir
[DETECTION] Is the Trojan horse TR/Vundo.Gen
[NOTE] The file was moved to '48acc12c.qua'!
C:\QooBox\Quarantine\C\WINDOWS\system32\wenamyec.exe.vir
[DETECTION] Is the Trojan horse TR/PrivacySet.A
[NOTE] The file was moved to '48adc12d.qua'!
C:\QooBox\Quarantine\C\WINDOWS\system32\wxvrrxqu.dll.vir
[DETECTION] Is the Trojan horse TR/Vundo.Gen
[NOTE] The file was moved to '48b5c141.qua'!
C:\QooBox\Quarantine\C\WINDOWS\system32\xkubtxff.dll.vir
[DETECTION] Is the Trojan horse TR/Vundo.Gen
[NOTE] The file was moved to '48b4c134.qua'!
C:\QooBox\Quarantine\C\WINDOWS\system32\xmekrqyr.dll.vir
[DETECTION] Is the Trojan horse TR/Monder.108544
[NOTE] The file was moved to '48a4c137.qua'!
C:\QooBox\Quarantine\C\WINDOWS\system32\yeioexwn.dll.vir
[DETECTION] Is the Trojan horse TR/Vundo.EOL
[NOTE] The file was moved to '48a8c12f.qua'!
C:\QooBox\Quarantine\C\WINDOWS\system32\ytokdaal.dll.vir
[DETECTION] Is the Trojan horse TR/Vundo.EMQ
[NOTE] The file was moved to '48aec13f.qua'!
C:\QooBox\Quarantine\C\WINDOWS\system32\yyrvxqqn.dll.vir
[DETECTION] Is the Trojan horse TR/Vundo.Gen
[NOTE] The file was moved to '48b1c144.qua'!
End of the scan: vendredi 30 mai 2008 11:43
Used time: 6:32:50 min
The scan has been done completely.
8528 Scanning directories
399595 Files were scanned
63 viruses and/or unwanted programs were found
0 Files were classified as suspicious:
0 files were deleted
0 files were repaired
61 files were moved to quarantine
0 files were renamed
1 Files cannot be scanned
399532 Files not concerned
11590 Archives were scanned
1 Warnings
61 Notes
Quand j'ai redémarré l'ordinateur en mode normal après ce scan, Antivir en a relancé un automatiquement, ce qui a donné des résultats différents... Je le mets aussi ?
Salut,
que de bonnes nouvelles ;-)
ton pc va bien en somme !
post un dernier hijack this pour que je te donne les dernieres directives...
@´+
que de bonnes nouvelles ;-)
ton pc va bien en somme !
post un dernier hijack this pour que je te donne les dernieres directives...
@´+
Hop-hop-hop, Hijack, dernier service ! :]
Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 15:31:12, on 01/06/2008
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)
Boot mode: Normal
Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\system32\acs.exe
C:\Program Files\Avira\AntiVir PersonalEdition Classic\sched.exe
C:\PROGRA~1\FICHIE~1\AOL\ACS\AOLacsd.exe
C:\Program Files\COMODO\Firewall\cmdagent.exe
C:\WINDOWS\eHome\ehRecvr.exe
C:\WINDOWS\eHome\ehSched.exe
C:\WINDOWS\system32\nvsvc32.exe
C:\WINDOWS\system32\svchost.exe
C:\Program Files\Fichiers communs\Ulead Systems\DVD\ULCDRSvr.exe
C:\Program Files\Sonic\DigitalMedia LE v7\MyDVD LE\USBDeviceService.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\system32\RUNDLL32.EXE
C:\Program Files\Atheros WLAN Adapter\ACU.exe
C:\WINDOWS\system32\dllhost.exe
C:\WINDOWS\RTHDCPL.EXE
C:\Program Files\COMODO\Firewall\cfp.exe
C:\Program Files\Synaptics\SynTP\SynTPEnh.exe
C:\Program Files\SpywareGuard\sgmain.exe
C:\Program Files\BOINC\boincmgr.exe
C:\Program Files\SpywareGuard\sgbhp.exe
C:\Program Files\BOINC\boinc.exe
C:\Program Files\Avira\AntiVir PersonalEdition Classic\avguard.exe
C:\Program Files\Avira\AntiVir PersonalEdition Classic\avgnt.exe
C:\Program Files\Windows Live\Messenger\usnsvc.exe
C:\Program Files\QuickTime\qttask.exe
C:\Program Files\BOINC\projects\www.worldcommunitygrid.org\wcg_faah_autodock_6.05_windows_intelx86
C:\Program Files\BOINC\projects\www.worldcommunitygrid.org\wcg_faah_autodock_6.05_windows_intelx86
C:\Program Files\Fichiers communs\Real\Update_OB\realsched.exe
C:\Program Files\HijackThis\HijackThis.exe
O2 - BHO: RealPlayer Download and Record Plugin for Internet Explorer - {3049C3E9-B461-4BC5-8870-4C09146192CA} - C:\Program Files\Real\RealPlayer\rpbrowserrecordplugin.dll
O2 - BHO: SpywareGuard Download Protection - {4A368E80-174F-4872-96B5-0B27DDD11DB2} - C:\Program Files\SpywareGuard\dlprotect.dll
O2 - BHO: AddTask Class - {6A19C29D-ED45-4483-8999-9F939C8161F2} - C:\Program Files\eREAD6.0\eREAD6.0\WebHook.dll
O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre1.6.0_06\bin\ssv.dll
O2 - BHO: Programme d'aide de l'Assistant de connexion Windows Live - {9030D464-4C02-4ABF-8ECC-5164760863C6} - C:\Program Files\Fichiers communs\Microsoft Shared\Windows Live\WindowsLiveLogin.dll
O4 - HKLM\..\Run: [NvMediaCenter] RUNDLL32.EXE C:\WINDOWS\system32\NvMcTray.dll,NvTaskbarInit
O4 - HKLM\..\Run: [ACU] "C:\Program Files\Atheros WLAN Adapter\ACU.exe" -nogui
O4 - HKLM\..\Run: [RTHDCPL] RTHDCPL.EXE
O4 - HKLM\..\Run: [COMODO Firewall Pro] "C:\Program Files\COMODO\Firewall\cfp.exe" -h
O4 - HKLM\..\Run: [avgnt] "C:\Program Files\Avira\AntiVir PersonalEdition Classic\avgnt.exe" /min
O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE C:\WINDOWS\system32\NvCpl.dll,NvStartup
O4 - HKLM\..\Run: [SynTPEnh] C:\Program Files\Synaptics\SynTP\SynTPEnh.exe
O4 - HKLM\..\Run: [TkBellExe] "C:\Program Files\Fichiers communs\Real\Update_OB\realsched.exe" -osboot
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
O4 - Startup: SpywareGuard.lnk = C:\Program Files\SpywareGuard\sgmain.exe
O4 - Startup: World Community Grid - BOINC Manager.lnk = C:\Program Files\BOINC\boincmgr.exe
O4 - Global Startup: Lancement rapide d'Adobe Reader.lnk = C:\Program Files\Adobe\Acrobat 7.0\Reader\reader_sl.exe
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_06\bin\ssv.dll
O9 - Extra 'Tools' menuitem: Console Java (Sun) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_06\bin\ssv.dll
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O20 - AppInit_DLLs: C:\WINDOWS\system32\guard32.dll
O23 - Service: Service de configuration Atheros (ACS) - Unknown owner - C:\WINDOWS\system32\acs.exe
O23 - Service: Avira AntiVir Personal – Free Antivirus Scheduler (AntiVirScheduler) - Avira GmbH - C:\Program Files\Avira\AntiVir PersonalEdition Classic\sched.exe
O23 - Service: Avira AntiVir Personal – Free Antivirus Guard (AntiVirService) - Avira GmbH - C:\Program Files\Avira\AntiVir PersonalEdition Classic\avguard.exe
O23 - Service: AOL Connectivity Service (AOL ACS) - America Online, Inc. - C:\PROGRA~1\FICHIE~1\AOL\ACS\AOLacsd.exe
O23 - Service: COMODO Firewall Pro Helper Service (cmdAgent) - Unknown owner - C:\Program Files\COMODO\Firewall\cmdagent.exe
O23 - Service: NVIDIA Display Driver Service (NVSvc) - NVIDIA Corporation - C:\WINDOWS\system32\nvsvc32.exe
O23 - Service: Ulead Burning Helper (UleadBurningHelper) - Ulead Systems, Inc. - C:\Program Files\Fichiers communs\Ulead Systems\DVD\ULCDRSvr.exe
O23 - Service: USBDeviceService - Unknown owner - C:\Program Files\Sonic\DigitalMedia LE v7\MyDVD LE\USBDeviceService.exe
Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 15:31:12, on 01/06/2008
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)
Boot mode: Normal
Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\system32\acs.exe
C:\Program Files\Avira\AntiVir PersonalEdition Classic\sched.exe
C:\PROGRA~1\FICHIE~1\AOL\ACS\AOLacsd.exe
C:\Program Files\COMODO\Firewall\cmdagent.exe
C:\WINDOWS\eHome\ehRecvr.exe
C:\WINDOWS\eHome\ehSched.exe
C:\WINDOWS\system32\nvsvc32.exe
C:\WINDOWS\system32\svchost.exe
C:\Program Files\Fichiers communs\Ulead Systems\DVD\ULCDRSvr.exe
C:\Program Files\Sonic\DigitalMedia LE v7\MyDVD LE\USBDeviceService.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\system32\RUNDLL32.EXE
C:\Program Files\Atheros WLAN Adapter\ACU.exe
C:\WINDOWS\system32\dllhost.exe
C:\WINDOWS\RTHDCPL.EXE
C:\Program Files\COMODO\Firewall\cfp.exe
C:\Program Files\Synaptics\SynTP\SynTPEnh.exe
C:\Program Files\SpywareGuard\sgmain.exe
C:\Program Files\BOINC\boincmgr.exe
C:\Program Files\SpywareGuard\sgbhp.exe
C:\Program Files\BOINC\boinc.exe
C:\Program Files\Avira\AntiVir PersonalEdition Classic\avguard.exe
C:\Program Files\Avira\AntiVir PersonalEdition Classic\avgnt.exe
C:\Program Files\Windows Live\Messenger\usnsvc.exe
C:\Program Files\QuickTime\qttask.exe
C:\Program Files\BOINC\projects\www.worldcommunitygrid.org\wcg_faah_autodock_6.05_windows_intelx86
C:\Program Files\BOINC\projects\www.worldcommunitygrid.org\wcg_faah_autodock_6.05_windows_intelx86
C:\Program Files\Fichiers communs\Real\Update_OB\realsched.exe
C:\Program Files\HijackThis\HijackThis.exe
O2 - BHO: RealPlayer Download and Record Plugin for Internet Explorer - {3049C3E9-B461-4BC5-8870-4C09146192CA} - C:\Program Files\Real\RealPlayer\rpbrowserrecordplugin.dll
O2 - BHO: SpywareGuard Download Protection - {4A368E80-174F-4872-96B5-0B27DDD11DB2} - C:\Program Files\SpywareGuard\dlprotect.dll
O2 - BHO: AddTask Class - {6A19C29D-ED45-4483-8999-9F939C8161F2} - C:\Program Files\eREAD6.0\eREAD6.0\WebHook.dll
O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre1.6.0_06\bin\ssv.dll
O2 - BHO: Programme d'aide de l'Assistant de connexion Windows Live - {9030D464-4C02-4ABF-8ECC-5164760863C6} - C:\Program Files\Fichiers communs\Microsoft Shared\Windows Live\WindowsLiveLogin.dll
O4 - HKLM\..\Run: [NvMediaCenter] RUNDLL32.EXE C:\WINDOWS\system32\NvMcTray.dll,NvTaskbarInit
O4 - HKLM\..\Run: [ACU] "C:\Program Files\Atheros WLAN Adapter\ACU.exe" -nogui
O4 - HKLM\..\Run: [RTHDCPL] RTHDCPL.EXE
O4 - HKLM\..\Run: [COMODO Firewall Pro] "C:\Program Files\COMODO\Firewall\cfp.exe" -h
O4 - HKLM\..\Run: [avgnt] "C:\Program Files\Avira\AntiVir PersonalEdition Classic\avgnt.exe" /min
O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE C:\WINDOWS\system32\NvCpl.dll,NvStartup
O4 - HKLM\..\Run: [SynTPEnh] C:\Program Files\Synaptics\SynTP\SynTPEnh.exe
O4 - HKLM\..\Run: [TkBellExe] "C:\Program Files\Fichiers communs\Real\Update_OB\realsched.exe" -osboot
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
O4 - Startup: SpywareGuard.lnk = C:\Program Files\SpywareGuard\sgmain.exe
O4 - Startup: World Community Grid - BOINC Manager.lnk = C:\Program Files\BOINC\boincmgr.exe
O4 - Global Startup: Lancement rapide d'Adobe Reader.lnk = C:\Program Files\Adobe\Acrobat 7.0\Reader\reader_sl.exe
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_06\bin\ssv.dll
O9 - Extra 'Tools' menuitem: Console Java (Sun) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_06\bin\ssv.dll
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O20 - AppInit_DLLs: C:\WINDOWS\system32\guard32.dll
O23 - Service: Service de configuration Atheros (ACS) - Unknown owner - C:\WINDOWS\system32\acs.exe
O23 - Service: Avira AntiVir Personal – Free Antivirus Scheduler (AntiVirScheduler) - Avira GmbH - C:\Program Files\Avira\AntiVir PersonalEdition Classic\sched.exe
O23 - Service: Avira AntiVir Personal – Free Antivirus Guard (AntiVirService) - Avira GmbH - C:\Program Files\Avira\AntiVir PersonalEdition Classic\avguard.exe
O23 - Service: AOL Connectivity Service (AOL ACS) - America Online, Inc. - C:\PROGRA~1\FICHIE~1\AOL\ACS\AOLacsd.exe
O23 - Service: COMODO Firewall Pro Helper Service (cmdAgent) - Unknown owner - C:\Program Files\COMODO\Firewall\cmdagent.exe
O23 - Service: NVIDIA Display Driver Service (NVSvc) - NVIDIA Corporation - C:\WINDOWS\system32\nvsvc32.exe
O23 - Service: Ulead Burning Helper (UleadBurningHelper) - Ulead Systems, Inc. - C:\Program Files\Fichiers communs\Ulead Systems\DVD\ULCDRSvr.exe
O23 - Service: USBDeviceService - Unknown owner - C:\Program Files\Sonic\DigitalMedia LE v7\MyDVD LE\USBDeviceService.exe
Salut gouzny,
spywareblaster t´as annoncé que acrobat reader voulait créer une entrée bho, normalement tu accepte, mais la en locurence c´est une version obsolette donc tu as bien fait de ne pas accepter ,-)
coche et fix ceci avec hijack this :
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
O4 - HKLM\..\Run: [TkBellExe] "C:\Program Files\Fichiers communs\Real\Update_OB\realsched.exe" -osboot
puis
ta version de acrobat reader n´est pas a jour, tu veux la version 8.1 derniere en date alors desinstale ta version par le panneau de configuration / ajoue et suppression de programme
et instale la derniere :
https://get2.adobe.com/reader/otherversions/
ou oublie completement acrobat reader et instales foxit plus léger a la place:
https://www.clubic.com/telecharger-fiche13808-foxit-reader.html
meme si tu surf avec firefox :
internet explorer 6.0 = failles de securitées importantes
alors fais les mises a jour windows : tu veux la version 7.0
https://support.microsoft.com/en-US/topic/internet-explorer-downloads-d49e1f0d-571c-9a7b-d97e-be248806ca70
@+
spywareblaster t´as annoncé que acrobat reader voulait créer une entrée bho, normalement tu accepte, mais la en locurence c´est une version obsolette donc tu as bien fait de ne pas accepter ,-)
coche et fix ceci avec hijack this :
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
O4 - HKLM\..\Run: [TkBellExe] "C:\Program Files\Fichiers communs\Real\Update_OB\realsched.exe" -osboot
puis
ta version de acrobat reader n´est pas a jour, tu veux la version 8.1 derniere en date alors desinstale ta version par le panneau de configuration / ajoue et suppression de programme
et instale la derniere :
https://get2.adobe.com/reader/otherversions/
ou oublie completement acrobat reader et instales foxit plus léger a la place:
https://www.clubic.com/telecharger-fiche13808-foxit-reader.html
meme si tu surf avec firefox :
internet explorer 6.0 = failles de securitées importantes
alors fais les mises a jour windows : tu veux la version 7.0
https://support.microsoft.com/en-US/topic/internet-explorer-downloads-d49e1f0d-571c-9a7b-d97e-be248806ca70
@+
Héhé, je commence à avoir du nez alors... (oopa)
Cases cochées, fixées, Acrobat désinstallé, et Foxit à la place (qui m'a tout l'air d'être bien plus fonctionnel, pour le peu que je l'utilise), Explorer mis à jour.
Normalement, je crois qu'on doit avoir fait le tour. C'était une thérapie de longue haleine, docteur ! :P
Mais en a-t-on vraiment fini ? Je finis par douter, tellement il y avait de choses à faire.
Tiens, sinon, avec le lien que tu m'as donné pour comparer Avast et Antivir, j'ai un peu flâné sur le reste du forum de Malekal (très instructif, d'ailleurs), et j'en suis venu à me demander un truc : vu que tu m'as demandé de mettre Java à jour, et qu'ils en parlent parmi les causes d'infection, est-ce que c'est à cause de ça que j'ai chopé Virusheat ?
Enfin bref. Résolu, finalement, ou pas ? :o
Cases cochées, fixées, Acrobat désinstallé, et Foxit à la place (qui m'a tout l'air d'être bien plus fonctionnel, pour le peu que je l'utilise), Explorer mis à jour.
Normalement, je crois qu'on doit avoir fait le tour. C'était une thérapie de longue haleine, docteur ! :P
Mais en a-t-on vraiment fini ? Je finis par douter, tellement il y avait de choses à faire.
Tiens, sinon, avec le lien que tu m'as donné pour comparer Avast et Antivir, j'ai un peu flâné sur le reste du forum de Malekal (très instructif, d'ailleurs), et j'en suis venu à me demander un truc : vu que tu m'as demandé de mettre Java à jour, et qu'ils en parlent parmi les causes d'infection, est-ce que c'est à cause de ça que j'ai chopé Virusheat ?
Enfin bref. Résolu, finalement, ou pas ? :o
Salut gouzgy,
Oui il me semble que la on soit arrivé au bout ;-)
Je crois que les principales causes de ton infection doivent leurs explications aux fait que tu : surfais avec internet explorer 6.0, tu avais opté pour avast et que tu n´avais pas de par feu...
puis oui java comme tu a pu le voir peux entrainer pas mal de misericordes mais plus subtiles encore que ce virus heat...
Enfin maintenant ce n´est plus qu´une sale histoire qu´il vaut mieux oublier ;)
Enfin ne l´oublie pas completement, je veux dire fais attention a ce que tu fais sur le net et tiens tes softs a jour.
Bonne continuation`
bye`
g!rly`
Oui il me semble que la on soit arrivé au bout ;-)
Je crois que les principales causes de ton infection doivent leurs explications aux fait que tu : surfais avec internet explorer 6.0, tu avais opté pour avast et que tu n´avais pas de par feu...
puis oui java comme tu a pu le voir peux entrainer pas mal de misericordes mais plus subtiles encore que ce virus heat...
Enfin maintenant ce n´est plus qu´une sale histoire qu´il vaut mieux oublier ;)
Enfin ne l´oublie pas completement, je veux dire fais attention a ce que tu fais sur le net et tiens tes softs a jour.
Bonne continuation`
bye`
g!rly`