Problème fenetre CiD

Résolu
rom1_29 -  
 rom1_29 -
Bonjour,

Depuis quelque temps, de nombreuses fenêtres de pubs de types CiD apparaissent et ça commence à être très pénible !
De plus ma machine est ralentie ...
ci-dessous mon rapport HijackThis

Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 17:29:18, on 28/05/2008
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v7.00 (7.00.6000.16640)
Boot mode: Normal

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\Program Files\Intel\Wireless\Bin\EvtEng.exe
C:\Program Files\Intel\Wireless\Bin\S24EvMon.exe
C:\Program Files\Alwil Software\Avast4\aswUpdSv.exe
C:\Program Files\Alwil Software\Avast4\ashServ.exe
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\Fichiers communs\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
C:\WINDOWS\system32\CTsvcCDA.EXE
C:\Program Files\Fichiers communs\Microsoft Shared\VS7DEBUG\MDM.EXE
C:\Program Files\Microsoft SQL Server\MSSQL$VAIO_VEDB\Binn\sqlservr.exe
C:\WINDOWS\system32\nvsvc32.exe
C:\Program Files\Intel\Wireless\Bin\RegSrvc.exe
C:\WINDOWS\system32\svchost.exe
C:\Program Files\Sony\VAIO Event Service\VESMgr.exe
C:\Program Files\Fichiers communs\Sony Shared\VAIO Entertainment Platform\VCSW\VCSW.exe
C:\Program Files\Fichiers communs\Sony Shared\VAIO Entertainment Platform\VzCdb\VzCdbSvc.exe
C:\Program Files\Fichiers communs\Sony Shared\VAIO Entertainment Platform\VzCdb\VzFw.exe
C:\WINDOWS\Explorer.EXE
C:\Program Files\Apoint\Apoint.exe
C:\WINDOWS\system32\ICO.EXE
C:\Program Files\Sony\VAIO Power Management\SPMgr.exe
C:\Program Files\Sony\ISB Utility\ISBMgr.exe
C:\Program Files\Java\jre1.5.0_01\bin\jusched.exe
C:\Program Files\Fichiers communs\Real\Update_OB\realsched.exe
C:\PROGRA~1\Sony\SONICS~1\SsAAD.exe
C:\WINDOWS\system32\LVCOMSX.EXE
C:\Program Files\Logitech\Video\LogiTray.exe
C:\Program Files\Sony\VAIO Update 3\VAIOUpdt.exe
C:\Program Files\EPSON\Creativity Suite\Event Manager\EEventManager.exe
C:\WINDOWS\RTHDCPL.EXE
C:\Program Files\QuickTime\QTTask.exe
C:\Program Files\iTunes\iTunesHelper.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\Messenger\msmsgs.exe
C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe
C:\Program Files\Fichiers communs\Ahead\Lib\NMBgMonitor.exe
C:\Program Files\Creative\MediaSource\Detector\CTDetect.exe
C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe
C:\Program Files\Apoint\Apntex.exe
C:\Program Files\Fichiers communs\Ahead\Lib\NMIndexStoreSvr.exe
C:\Program Files\Alwil Software\Avast4\ashMaiSv.exe
C:\Program Files\Alwil Software\Avast4\ashWebSv.exe
C:\Program Files\Logitech\Video\FxSvr2.exe
C:\Program Files\Fichiers communs\Sony Shared\VAIO Entertainment\VzRs\VzRs.exe
C:\Program Files\Fichiers communs\Sony Shared\AVLib\SSScsiSV.exe
C:\Program Files\iPod\bin\iPodService.exe
C:\Program Files\Fichiers communs\Ahead\Lib\NMIndexingService.exe
C:\Program Files\Windows Live\Messenger\usnsvc.exe
C:\Program Files\Grisoft\AVG Anti-Spyware 7.5\guard.exe
C:\Program Files\Grisoft\AVG Anti-Spyware 7.5\avgas.exe
C:\Program Files\Mozilla Firefox\firefox.exe
C:\WINDOWS\system32\notepad.exe
C:\Documents and Settings\Romain LE BLEIS\Bureau\HijackThis.exe

R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.torrpenn-production.fr/
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = https://www.msn.com/fr-fr/?ocid=iehp
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = https://www.bing.com/?toHttps=1&redig=5FC791212101479BAFBE1A679848B1AF
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = https://www.bing.com/?toHttps=1&redig=5FC791212101479BAFBE1A679848B1AF
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = https://www.msn.com/fr-fr/?ocid=iehp
R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName = Liens
R3 - URLSearchHook: (no name) - {5A482923-9E9C-BB41-BD2D-E4ABBE34B2BE} - (no file)
O2 - BHO: Aide pour le lien d'Adobe PDF Reader - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Fichiers communs\Adobe\Acrobat\ActiveX\AcroIEHelper.dll
O2 - BHO: Download Manager Browser Helper Object - {19C8E43B-07B3-49CB-BFFC-6777B593E6F8} - C:\PROGRA~1\FICHIE~1\fluxDVD\DOWNLO~1\XEBDLH~1.DLL
O2 - BHO: (no name) - {3060F6AA-1341-63C8-60D7-3B46909789EA} - (no file)
O2 - BHO: Spybot-S&D IE Protection - {53707962-6F74-2D53-2644-206D7942484F} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O2 - BHO: (no name) - {564BEC1D-06F6-292D-8370-2427B6E4E9B3} - (no file)
O2 - BHO: (no name) - {70CB7950-9701-3BA3-2455-70E796D10596} - (no file)
O2 - BHO: (no name) - {7E853D72-626A-48EC-A868-BA8D5E23E045} - (no file)
O2 - BHO: Programme d'aide de l'Assistant de connexion Windows Live - {9030D464-4C02-4ABF-8ECC-5164760863C6} - C:\Program Files\Fichiers communs\Microsoft Shared\Windows Live\WindowsLiveLogin.dll
O2 - BHO: (no name) - {9ECB9560-04F9-4bbc-943D-298DDF1699E1} - (no file)
O2 - BHO: Google Toolbar Helper - {AA58ED58-01DD-4d91-8333-CF10577473F7} - c:\program files\google\googletoolbar3.dll
O2 - BHO: Google Toolbar Notifier BHO - {AF69DE43-7D58-4638-B6FA-CE66B5AD205D} - C:\Program Files\Google\GoogleToolbarNotifier\2.0.301.7164\swg.dll
O2 - BHO: (no name) - {BDF3E430-B101-42AD-A544-FADC6B084872} - (no file)
O3 - Toolbar: &Google - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - c:\program files\google\googletoolbar3.dll
O4 - HKLM\..\Run: [Apoint] C:\Program Files\Apoint\Apoint.exe
O4 - HKLM\..\Run: [Mouse Suite 98 Daemon] ICO.EXE
O4 - HKLM\..\Run: [SonyPowerCfg] C:\Program Files\Sony\VAIO Power Management\SPMgr.exe
O4 - HKLM\..\Run: [ISBMgr.exe] C:\Program Files\Sony\ISB Utility\ISBMgr.exe
O4 - HKLM\..\Run: [SunJavaUpdateSched] C:\Program Files\Java\jre1.5.0_01\bin\jusched.exe
O4 - HKLM\..\Run: [TkBellExe] "C:\Program Files\Fichiers communs\Real\Update_OB\realsched.exe" -osboot
O4 - HKLM\..\Run: [SsAAD.exe] C:\PROGRA~1\Sony\SONICS~1\SsAAD.exe
O4 - HKLM\..\Run: [LVCOMSX] C:\WINDOWS\system32\LVCOMSX.EXE
O4 - HKLM\..\Run: [LogitechVideoRepair] C:\Program Files\Logitech\Video\ISStart.exe
O4 - HKLM\..\Run: [LogitechVideoTray] C:\Program Files\Logitech\Video\LogiTray.exe
O4 - HKLM\..\Run: [NeroFilterCheck] C:\Program Files\Fichiers communs\Ahead\Lib\NeroCheck.exe
O4 - HKLM\..\Run: [VAIO Update 3] "C:\Program Files\Sony\VAIO Update 3\VAIOUpdt.exe" /Stationary
O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE C:\WINDOWS\system32\NvCpl.dll,NvStartup
O4 - HKLM\..\Run: [High Definition Audio Property Page Shortcut] HDAShCut.exe
O4 - HKLM\..\Run: [EEventManager] C:\Program Files\EPSON\Creativity Suite\Event Manager\EEventManager.exe
O4 - HKLM\..\Run: [RTHDCPL] RTHDCPL.EXE
O4 - HKLM\..\Run: [Alcmtr] ALCMTR.EXE
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\QTTask.exe" -atboottime
O4 - HKLM\..\Run: [iTunesHelper] "C:\Program Files\iTunes\iTunesHelper.exe"
O4 - HKLM\..\Run: [Adobe Reader Speed Launcher] "C:\Program Files\Adobe\Reader 8.0\Reader\Reader_sl.exe"
O4 - HKLM\..\Run: [Cake Wipe Inside Wma] C:\Documents and Settings\All Users\Application Data\flag barb cake wipe\Browse meta.exe
O4 - HKLM\..\Run: [!AVG Anti-Spyware] "C:\Program Files\Grisoft\AVG Anti-Spyware 7.5\avgas.exe" /minimized
O4 - HKCU\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\ctfmon.exe
O4 - HKCU\..\Run: [MSMSGS] "C:\Program Files\Messenger\msmsgs.exe" /background
O4 - HKCU\..\Run: [swg] C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe
O4 - HKCU\..\Run: [BgMonitor_{79662E04-7C6C-4d9f-84C7-88D8A56B10AA}] "C:\Program Files\Fichiers communs\Ahead\Lib\NMBgMonitor.exe"
O4 - HKCU\..\Run: [Creative Detector] C:\Program Files\Creative\MediaSource\Detector\CTDetect.exe /R
O4 - HKCU\..\Run: [msnmsgr] "C:\Program Files\Windows Live\Messenger\msnmsgr.exe" /background
O4 - HKCU\..\Run: [road draw] C:\DOCUME~1\ROMAIN~1\APPLIC~1\FORDER~1\DVD OPTION START.exe
O4 - HKCU\..\Run: [SpybotSD TeaTimer] C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe
O4 - HKUS\S-1-5-19\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'SERVICE LOCAL')
O4 - HKUS\S-1-5-20\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'SERVICE RÉSEAU')
O4 - HKUS\S-1-5-18\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'SYSTEM')
O4 - HKUS\.DEFAULT\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'Default user')
O4 - .DEFAULT User Startup: VAIO Launcher.lnk = C:\Program Files\Sony\VAIO Launcher\Launcher.exe (User 'Default user')
O4 - Startup: Adobe Gamma.lnk = C:\Program Files\Fichiers communs\Adobe\Calibration\Adobe Gamma Loader.exe
O8 - Extra context menu item: E&xporter vers Microsoft Excel - res://C:\PROGRA~1\MICROS~4\OFFICE11\EXCEL.EXE/3000
O8 - Extra context menu item: Transfert par Image Converter 2 - C:\Program Files\Sony\Image Converter 2\menu.htm
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_06\bin\ssv.dll
O9 - Extra 'Tools' menuitem: Console Java (Sun) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_06\bin\ssv.dll
O9 - Extra button: Allocam Multi Vision - {2D6B57BF-71FA-41A3-BDC5-3B5A25813D2E} - C:\PROGRA~1\ALLOCA~1\allocam.exe (file missing)
O9 - Extra 'Tools' menuitem: Allocam Multi Vision - {2D6B57BF-71FA-41A3-BDC5-3B5A25813D2E} - C:\PROGRA~1\ALLOCA~1\allocam.exe (file missing)
O9 - Extra button: Recherche - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~4\OFFICE11\REFIEBAR.DLL
O9 - Extra button: (no name) - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O9 - Extra 'Tools' menuitem: Spybot - Search & Destroy Configuration - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O14 - IERESET.INF: START_PAGE_URL=http://www.club-vaio.com/fr/
O15 - Trusted Zone: *.sony-europe.com
O15 - Trusted Zone: *.sonystyle-europe.com
O15 - Trusted Zone: *.vaio-link.com
O15 - Trusted Zone: *.canalplay.com (HKLM)
O15 - Trusted Zone: *.canalplusactive.com (HKLM)
O16 - DPF: {4F1E5B1A-2A80-42CA-8532-2D05CB959537} (MSN Photo Upload Tool) - http://romtpp.spaces.live.com//PhotoUpload/MsnPUpld.cab
O16 - DPF: {CF40ACC5-E1BB-4AFF-AC72-04C2F616BCA7} (get_atlcom Class) - http://www.adobe.com/products/acrobat/nos/gp.cab
O16 - DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} (Shockwave Flash Object) - http://fpdownload2.macromedia.com/get/shockwave/cabs/flash/swflash.cab
O16 - DPF: {E1AF091A-9F23-4059-89D7-C05EE073285D} (Canal+ Active MSWAY) - https://www.canalplus.com/canalplay/
O16 - DPF: {FFBB3F3B-0A5A-4106-BE53-DFE1E2340CB1} (DLM Control) - http://dlm.tools.akamai.com/dlmanager/versions/activex/dlm-activex-2.2.3.0.cab
O17 - HKLM\System\CCS\Services\Tcpip\..\{004DA463-EBD5-46B2-9A5B-3873C107A533}: NameServer = 193.252.19.3,193.252.19.4
O17 - HKLM\System\CS1\Services\Tcpip\..\{004DA463-EBD5-46B2-9A5B-3873C107A533}: NameServer = 193.252.19.3,193.252.19.4
O17 - HKLM\System\CS2\Services\Tcpip\..\{004DA463-EBD5-46B2-9A5B-3873C107A533}: NameServer = 193.252.19.3,193.252.19.4
O18 - Filter hijack: text/html - {994D478A-45D0-4DB4-AE77-288B1E346E99} - (no file)
O20 - AppInit_DLLs: 303169581.dll,Runner.dll
O23 - Service: Adobe LM Service - Adobe Systems - C:\Program Files\Fichiers communs\Adobe Systems Shared\Service\Adobelmsvc.exe
O23 - Service: Apple Mobile Device - Apple, Inc. - C:\Program Files\Fichiers communs\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
O23 - Service: avast! iAVS4 Control Service (aswUpdSv) - ALWIL Software - C:\Program Files\Alwil Software\Avast4\aswUpdSv.exe
O23 - Service: avast! Antivirus - ALWIL Software - C:\Program Files\Alwil Software\Avast4\ashServ.exe
O23 - Service: avast! Mail Scanner - ALWIL Software - C:\Program Files\Alwil Software\Avast4\ashMaiSv.exe
O23 - Service: avast! Web Scanner - ALWIL Software - C:\Program Files\Alwil Software\Avast4\ashWebSv.exe
O23 - Service: AVG Anti-Spyware Guard - GRISOFT s.r.o. - C:\Program Files\Grisoft\AVG Anti-Spyware 7.5\guard.exe
O23 - Service: Creative Service for CDROM Access - Creative Technology Ltd - C:\WINDOWS\system32\CTsvcCDA.EXE
O23 - Service: Intel(R) PROSet/Wireless Event Log (EvtEng) - Intel Corporation - C:\Program Files\Intel\Wireless\Bin\EvtEng.exe
O23 - Service: Google Updater Service (gusvc) - Google - C:\Program Files\Google\Common\Google Updater\GoogleUpdaterService.exe
O23 - Service: Image Converter video recording monitor for VAIO Entertainment - Sony Corporation - C:\Program Files\Sony\Image Converter 2\IcVzMon.exe
O23 - Service: Service de l'iPod (iPod Service) - Apple Inc. - C:\Program Files\iPod\bin\iPodService.exe
O23 - Service: MSCSPTISRV - Sony Corporation - C:\Program Files\Fichiers communs\Sony Shared\AVLib\MSCSPTISRV.exe
O23 - Service: NBService - Nero AG - C:\Program Files\Nero\Nero 7\Nero BackItUp\NBService.exe
O23 - Service: NMIndexingService - Nero AG - C:\Program Files\Fichiers communs\Ahead\Lib\NMIndexingService.exe
O23 - Service: NVIDIA Display Driver Service (NVSvc) - NVIDIA Corporation - C:\WINDOWS\system32\nvsvc32.exe
O23 - Service: PACSPTISVR - Sony Corporation - C:\Program Files\Fichiers communs\Sony Shared\AVLib\PACSPTISVR.exe
O23 - Service: Intel(R) PROSet/Wireless Registry Service (RegSrvc) - Intel Corporation - C:\Program Files\Intel\Wireless\Bin\RegSrvc.exe
O23 - Service: Intel(R) PROSet/Wireless Service (S24EventMonitor) - Intel Corporation - C:\Program Files\Intel\Wireless\Bin\S24EvMon.exe
O23 - Service: Sony SPTI Service (SPTISRV) - Sony Corporation - C:\Program Files\Fichiers communs\Sony Shared\AVLib\SPTISRV.exe
O23 - Service: SonicStage SCSI Service (SSScsiSV) - Sony Corporation - C:\Program Files\Fichiers communs\Sony Shared\AVLib\SSScsiSV.exe
O23 - Service: VAIO Entertainment Aggregation and Control Service - Sony Corporation - C:\Program Files\Fichiers communs\Sony Shared\VAIO Entertainment\VzRs\VzRs.exe
O23 - Service: VAIO Entertainment Task Scheduler - Sony Corporation - C:\Program Files\Sony\VAIO Entertainment\VzTaskScheduler.exe
O23 - Service: VAIO Entertainment TV Device Arbitration Service - Sony Corporation - C:\Program Files\Fichiers communs\Sony Shared\VAIO Entertainment Platform\VzCs\VzHardwareResourceManager\VzHardwareResourceManager.exe
O23 - Service: VAIO Event Service - Sony Corporation - C:\Program Files\Sony\VAIO Event Service\VESMgr.exe
O23 - Service: VAIO Media Integrated Server (VAIOMediaPlatform-IntegratedServer-AppServer) - Sony Corporation - C:\Program Files\Sony\VAIO Media Integrated Server\VMISrv.exe
O23 - Service: VAIO Media Integrated Server (HTTP) (VAIOMediaPlatform-IntegratedServer-HTTP) - Sony Corporation - C:\Program Files\Sony\VAIO Media Integrated Server\Platform\SV_Httpd.exe
O23 - Service: VAIO Media Integrated Server (UPnP) (VAIOMediaPlatform-IntegratedServer-UPnP) - Sony Corporation - C:\Program Files\Sony\VAIO Media Integrated Server\Platform\UPnPFramework.exe
O23 - Service: VAIO Media Gateway Server (VAIOMediaPlatform-Mobile-Gateway) - Sony Corporation - C:\Program Files\Sony\VAIO Media Integrated Server\Platform\VmGateway.exe
O23 - Service: VAIO Cooporated Initialisation (VCI) - Sony Corporation - C:\Program Files\Sony\VAIO Cooperated Initialisation\VCI_SVC.exe
O23 - Service: VAIO Entertainment UPnP Client Adapter (Vcsw) - Sony Corporation - C:\Program Files\Fichiers communs\Sony Shared\VAIO Entertainment Platform\VCSW\VCSW.exe
O23 - Service: VAIO Entertainment Database Service (VzCdbSvc) - Sony Corporation - C:\Program Files\Fichiers communs\Sony Shared\VAIO Entertainment Platform\VzCdb\VzCdbSvc.exe
O23 - Service: VAIO Entertainment File Import Service (VzFw) - Sony Corporation - C:\Program Files\Fichiers communs\Sony Shared\VAIO Entertainment Platform\VzCdb\VzFw.exe
A voir également:

28 réponses

Utilisateur anonyme
 
Fais ce que je t'ai demandé stp ;)
0
rom1_29
 
ok j'avais pas vu lol
0
Utilisateur anonyme
 
Pas de soucis :D
0
rom1_29
 
Avira AntiVir Personal
Report file date: mercredi 4 juin 2008 23:30

Scanning for 1310153 virus strains and unwanted programs.

Licensed to: Avira AntiVir PersonalEdition Classic
Serial number: 0000149996-ADJIE-0001
Platform: Windows XP
Windows version: (Service Pack 2) [5.1.2600]
Boot mode: Save mode
Username: LE BLEIS
Computer name: ROMAIN_VAIO

Version information:
BUILD.DAT : 8.1.00.295 16479 Bytes 09/04/2008 16:24:00
AVSCAN.EXE : 8.1.2.12 311553 Bytes 18/03/2008 09:02:56
AVSCAN.DLL : 8.1.1.0 53505 Bytes 07/02/2008 08:43:37
LUKE.DLL : 8.1.2.9 151809 Bytes 28/02/2008 08:41:23
LUKERES.DLL : 8.1.2.1 12033 Bytes 21/02/2008 08:28:40
ANTIVIR0.VDF : 6.40.0.0 11030528 Bytes 18/07/2007 10:33:34
ANTIVIR1.VDF : 7.0.3.2 5447168 Bytes 07/03/2008 13:08:58
ANTIVIR2.VDF : 7.0.4.120 2206720 Bytes 01/06/2008 21:15:09
ANTIVIR3.VDF : 7.0.4.143 92672 Bytes 04/06/2008 21:15:11
Engineversion : 8.1.0.51
AEVDF.DLL : 8.1.0.5 102772 Bytes 25/02/2008 09:58:21
AESCRIPT.DLL : 8.1.0.37 270715 Bytes 04/06/2008 21:15:33
AESCN.DLL : 8.1.0.20 119157 Bytes 04/06/2008 21:15:32
AERDL.DLL : 8.1.0.20 418165 Bytes 04/06/2008 21:15:31
AEPACK.DLL : 8.1.1.5 364918 Bytes 04/06/2008 21:15:28
AEOFFICE.DLL : 8.1.0.18 192890 Bytes 04/06/2008 21:15:26
AEHEUR.DLL : 8.1.0.29 1253750 Bytes 04/06/2008 21:15:24
AEHELP.DLL : 8.1.0.15 115063 Bytes 04/06/2008 21:15:18
AEGEN.DLL : 8.1.0.25 307573 Bytes 04/06/2008 21:15:16
AEEMU.DLL : 8.1.0.6 430451 Bytes 04/06/2008 21:15:14
AECORE.DLL : 8.1.0.30 168311 Bytes 04/06/2008 21:15:12
AVWINLL.DLL : 1.0.0.7 14593 Bytes 23/01/2008 17:07:53
AVPREF.DLL : 8.0.0.1 25857 Bytes 18/02/2008 10:37:50
AVREP.DLL : 7.0.0.1 155688 Bytes 16/04/2007 13:26:47
AVREG.DLL : 8.0.0.0 30977 Bytes 23/01/2008 17:07:49
AVARKT.DLL : 1.0.0.23 307457 Bytes 12/02/2008 08:29:23
AVEVTLOG.DLL : 8.0.0.11 114945 Bytes 28/02/2008 08:31:31
SQLITE3.DLL : 3.3.17.1 339968 Bytes 22/01/2008 17:28:02
SMTPLIB.DLL : 1.2.0.19 28929 Bytes 23/01/2008 17:08:39
NETNT.DLL : 8.0.0.1 7937 Bytes 25/01/2008 12:05:10
RCIMAGE.DLL : 8.0.0.35 2371841 Bytes 10/03/2008 14:37:25
RCTEXT.DLL : 8.0.32.0 86273 Bytes 06/03/2008 12:02:11

Configuration settings for the scan:
Jobname..........................: Complete system scan
Configuration file...............: c:\program files\avira\antivir personaledition classic\sysscan.avp
Logging..........................: low
Primary action...................: interactive
Secondary action.................: ignore
Scan master boot sector..........: on
Scan boot sector.................: on
Boot sectors.....................: C:, D:,
Scan memory......................: on
Process scan.....................: on
Scan registry....................: on
Search for rootkits..............: on
Scan all files...................: All files
Scan archives....................: on
Recursion depth..................: 20
Smart extensions.................: on
Macro heuristic..................: on
File heuristic...................: medium

Start of the scan: mercredi 4 juin 2008 23:30

Starting search for hidden objects.
The driver could not be initialized.

The scan of running processes will be started
Scan process 'avscan.exe' - '1' Module(s) have been scanned
Scan process 'avcenter.exe' - '1' Module(s) have been scanned
Scan process 'explorer.exe' - '1' Module(s) have been scanned
Scan process 'svchost.exe' - '1' Module(s) have been scanned
Scan process 'svchost.exe' - '1' Module(s) have been scanned
Scan process 'svchost.exe' - '1' Module(s) have been scanned
Scan process 'lsass.exe' - '1' Module(s) have been scanned
Scan process 'services.exe' - '1' Module(s) have been scanned
Scan process 'winlogon.exe' - '1' Module(s) have been scanned
Scan process 'csrss.exe' - '1' Module(s) have been scanned
Scan process 'smss.exe' - '1' Module(s) have been scanned
11 processes with 11 modules were scanned

Starting master boot sector scan:
Master boot sector HD0
[INFO] No virus was found!

Start scanning boot sectors:
Boot sector 'C:\'
[INFO] No virus was found!
Boot sector 'D:\'
[INFO] No virus was found!

Starting to scan the registry.
The registry was scanned ( '44' files ).

Starting the file scan:

Begin scan in 'C:\' <VAIO>
C:\pagefile.sys
[WARNING] The file could not be opened!
C:\QUARANTINE\7d861161b1bcb0.bup
[DETECTION] Contains detection pattern of the exploits EXP/Office.Dropper.Gen
[NOTE] The file was moved to '487f9b42.qua'!
C:\QUARANTINE\7d861161b2f1770.bup
[DETECTION] Contains detection pattern of the exploits EXP/Office.Dropper.Gen
[NOTE] The file was moved to '487f9b4d.qua'!
C:\QUARANTINE\7d861161c121090.bup
[DETECTION] Contains detection pattern of the exploits EXP/Office.Dropper.Gen
[NOTE] The file was moved to '487f9b55.qua'!
C:\QUARANTINE\7d861161c212800.bup
[DETECTION] Contains detection pattern of the exploits EXP/Office.Dropper.Gen
[NOTE] The file was moved to '487f9b5d.qua'!
C:\QUARANTINE\7d861161c23a90.bup
[DETECTION] Contains detection pattern of the exploits EXP/Office.Dropper.Gen
[NOTE] The file was moved to '4909fb66.qua'!
C:\QUARANTINE\7d861161c3423b0.bup
[DETECTION] Contains detection pattern of the exploits EXP/Office.Dropper.Gen
[NOTE] The file was moved to '487f9b5e.qua'!
C:\QUARANTINE\7d861161d173640.bup
[DETECTION] Contains detection pattern of the exploits EXP/Office.Dropper.Gen
[NOTE] The file was moved to '4909fb67.qua'!
C:\QUARANTINE\7d861161d27a50.bup
[DETECTION] Contains detection pattern of the exploits EXP/Office.Dropper.Gen
[NOTE] The file was moved to '487f9b50.qua'!
C:\QUARANTINE\7d861161d362d70.bup
[DETECTION] Contains detection pattern of the exploits EXP/Office.Dropper.Gen
[NOTE] The file was moved to '487f9b5f.qua'!
C:\QUARANTINE\7d861161d73b20.bup
[DETECTION] Contains detection pattern of the exploits EXP/Office.Dropper.Gen
[NOTE] The file was moved to '4909fb58.qua'!
C:\QUARANTINE\7d861161e19d40.bup
[DETECTION] Contains detection pattern of the exploits EXP/Office.Dropper.Gen
[NOTE] The file was moved to '487f9b60.qua'!
C:\QUARANTINE\7d861161e281dd0.bup
[DETECTION] Contains detection pattern of the exploits EXP/Office.Dropper.Gen
[NOTE] The file was moved to '4909fb59.qua'!
C:\QUARANTINE\7d861161e372f70.bup
[DETECTION] Contains detection pattern of the exploits EXP/Office.Dropper.Gen
[NOTE] The file was moved to '487f9b61.qua'!
C:\QUARANTINE\7d861161e93d10.bup
[DETECTION] Contains detection pattern of the exploits EXP/Office.Dropper.Gen
[NOTE] The file was moved to '4909fb5a.qua'!
C:\QUARANTINE\7d861161f1a1120.bup
[DETECTION] Contains detection pattern of the exploits EXP/Office.Dropper.Gen
[NOTE] The file was moved to '487f9b63.qua'!
C:\QUARANTINE\7d861161f2926a0.bup
[DETECTION] Contains detection pattern of the exploits EXP/Office.Dropper.Gen
[NOTE] The file was moved to '487f9b62.qua'!
C:\QUARANTINE\7d861161f383d10.bup
[DETECTION] Contains detection pattern of the exploits EXP/Office.Dropper.Gen
[NOTE] The file was moved to '4909fb5b.qua'!
C:\QUARANTINE\7d861161fb180.bup
[DETECTION] Contains detection pattern of the exploits EXP/Office.Dropper.Gen
[NOTE] The file was moved to '4909fb5c.qua'!
C:\QUARANTINE\7d86116201c660.bup
[DETECTION] Contains detection pattern of the exploits EXP/Office.Dropper.Gen
[NOTE] The file was moved to '487f9b64.qua'!
C:\QUARANTINE\7d86116202b22c0.bup
[DETECTION] Contains detection pattern of the exploits EXP/Office.Dropper.Gen
[NOTE] The file was moved to '4909fb5d.qua'!
C:\QUARANTINE\7d86116203a3640.bup
[DETECTION] Contains detection pattern of the exploits EXP/Office.Dropper.Gen
[NOTE] The file was moved to '487f9b65.qua'!
C:\QUARANTINE\7d8611620c3540.bup
[DETECTION] Contains detection pattern of the exploits EXP/Office.Dropper.Gen
[NOTE] The file was moved to '4909fb5e.qua'!
C:\QUARANTINE\7d86116211d19f0.bup
[DETECTION] Contains detection pattern of the exploits EXP/Office.Dropper.Gen
[NOTE] The file was moved to '487f9b66.qua'!
C:\QUARANTINE\7d86116212c2b80.bup
[DETECTION] Contains detection pattern of the exploits EXP/Office.Dropper.Gen
[NOTE] The file was moved to '4909fb5f.qua'!
C:\QUARANTINE\7d86116213b3a30.bup
[DETECTION] Contains detection pattern of the exploits EXP/Office.Dropper.Gen
[NOTE] The file was moved to '487f9b58.qua'!
C:\QUARANTINE\7d8611621e760.bup
[DETECTION] Contains detection pattern of the exploits EXP/Office.Dropper.Gen
[NOTE] The file was moved to '487f9b67.qua'!
C:\QUARANTINE\7d86116221e1be0.bup
[DETECTION] Contains detection pattern of the exploits EXP/Office.Dropper.Gen
[NOTE] The file was moved to '4909fb50.qua'!
C:\QUARANTINE\7d86116222d2b80.bup
[DETECTION] Contains detection pattern of the exploits EXP/Office.Dropper.Gen
[NOTE] The file was moved to '487f9b68.qua'!
C:\QUARANTINE\7d8611622fc40.bup
[DETECTION] Contains detection pattern of the exploits EXP/Office.Dropper.Gen
[NOTE] The file was moved to '4909fb51.qua'!
C:\QUARANTINE\7d861162303d10.bup
[DETECTION] Contains detection pattern of the exploits EXP/Office.Dropper.Gen
[NOTE] The file was moved to '487f9b69.qua'!
C:\QUARANTINE\7d861162310d40.bup
[DETECTION] Contains detection pattern of the exploits EXP/Office.Dropper.Gen
[NOTE] The file was moved to '4909fb52.qua'!
C:\QUARANTINE\7d86116231f1dd0.bup
[DETECTION] Contains detection pattern of the exploits EXP/Office.Dropper.Gen
[NOTE] The file was moved to '487f9b6a.qua'!
C:\QUARANTINE\7d86116232f2990.bup
[DETECTION] Contains detection pattern of the exploits EXP/Office.Dropper.Gen
[NOTE] The file was moved to '4909fb53.qua'!
C:\QUARANTINE\7d8611624131320.bup
[DETECTION] Contains detection pattern of the exploits EXP/Office.Dropper.Gen
[NOTE] The file was moved to '487f9b6b.qua'!
C:\QUARANTINE\7d861162431410.bup
[DETECTION] Contains detection pattern of the exploits EXP/Office.Dropper.Gen
[NOTE] The file was moved to '4909fb54.qua'!
C:\QUARANTINE\7d86116251921c0.bup
[DETECTION] Contains detection pattern of the exploits EXP/Office.Dropper.Gen
[NOTE] The file was moved to '487f9b6c.qua'!
C:\QUARANTINE\7d86116252b22c0.bup
[DETECTION] Contains detection pattern of the exploits EXP/Office.Dropper.Gen
[NOTE] The file was moved to '4909fb55.qua'!
C:\QUARANTINE\7d861162561be0.bup
[DETECTION] Contains detection pattern of the exploits EXP/Office.Dropper.Gen
[NOTE] The file was moved to '487f9b6d.qua'!
C:\QUARANTINE\7d861162611ce0.bup
[DETECTION] Contains detection pattern of the exploits EXP/Office.Dropper.Gen
[NOTE] The file was moved to '487f9b6e.qua'!
C:\QUARANTINE\7d8611626132990.bup
[DETECTION] Contains detection pattern of the exploits EXP/Office.Dropper.Gen
[NOTE] The file was moved to '4909fb57.qua'!
C:\QUARANTINE\7d8611626241220.bup
[DETECTION] Contains detection pattern of the exploits EXP/Office.Dropper.Gen
[NOTE] The file was moved to '487f9b6f.qua'!
C:\QUARANTINE\7d8611627153450.bup
[DETECTION] Contains detection pattern of the exploits EXP/Office.Dropper.Gen
[NOTE] The file was moved to '4909fb48.qua'!
C:\QUARANTINE\7d8611627261600.bup
[DETECTION] Contains detection pattern of the exploits EXP/Office.Dropper.Gen
[NOTE] The file was moved to '487f9b70.qua'!
C:\QUARANTINE\7d8611627371410.bup
[DETECTION] Contains detection pattern of the exploits EXP/Office.Dropper.Gen
[NOTE] The file was moved to '4909fb49.qua'!
C:\QUARANTINE\7d86116281f2f70.bup
[DETECTION] Contains detection pattern of the exploits EXP/Office.Dropper.Gen
[NOTE] The file was moved to '487f9b71.qua'!
C:\QUARANTINE\7d861162820570.bup
[DETECTION] Contains detection pattern of the exploits EXP/Office.Dropper.Gen
[NOTE] The file was moved to '4909fb4a.qua'!
C:\QUARANTINE\7d8611628d1320.bup
[DETECTION] Contains detection pattern of the exploits EXP/Office.Dropper.Gen
[NOTE] The file was moved to '487f9b73.qua'!
C:\QUARANTINE\7d8611629c370.bup
[DETECTION] Contains detection pattern of the exploits EXP/Office.Dropper.Gen
[NOTE] The file was moved to '487f9b72.qua'!
C:\QUARANTINE\7d8611629c570.bup
[DETECTION] Contains detection pattern of the exploits EXP/Office.Dropper.Gen
[NOTE] The file was moved to '4909fb4b.qua'!
C:\QUARANTINE\7d861162b122030.bup
[DETECTION] Contains detection pattern of the exploits EXP/Office.Dropper.Gen
[NOTE] The file was moved to '4909fb4c.qua'!
C:\QUARANTINE\7d861162b122610.bup
[DETECTION] Contains detection pattern of the exploits EXP/Office.Dropper.Gen
[NOTE] The file was moved to '487f9b74.qua'!
C:\QUARANTINE\7d861162b22bb0.bup
[DETECTION] Contains detection pattern of the exploits EXP/Office.Dropper.Gen
[NOTE] The file was moved to '4909fb4d.qua'!
C:\QUARANTINE\7d861162b312320.bup
[DETECTION] Contains detection pattern of the exploits EXP/Office.Dropper.Gen
[NOTE] The file was moved to '487f9b75.qua'!
C:\QUARANTINE\7d861162c2a1f0.bup
[DETECTION] Contains detection pattern of the exploits EXP/Office.Dropper.Gen
[NOTE] The file was moved to '4909fb4e.qua'!
C:\QUARANTINE\7d861162c2a8c0.bup
[DETECTION] Contains detection pattern of the exploits EXP/Office.Dropper.Gen
[NOTE] The file was moved to '487f9b76.qua'!
C:\QUARANTINE\7d861162c392de0.bup
[DETECTION] Contains detection pattern of the exploits EXP/Office.Dropper.Gen
[NOTE] The file was moved to '4909fb4f.qua'!
C:\QUARANTINE\7d861162c52ee0.bup
[DETECTION] Contains detection pattern of the exploits EXP/Office.Dropper.Gen
[NOTE] The file was moved to '487f9b77.qua'!
C:\QUARANTINE\7d861162d1c1960.bup
[DETECTION] Contains detection pattern of the exploits EXP/Office.Dropper.Gen
[NOTE] The file was moved to '4909fb40.qua'!
C:\QUARANTINE\7d861162d2b2bf0.bup
[DETECTION] Contains detection pattern of the exploits EXP/Office.Dropper.Gen
[NOTE] The file was moved to '487f9b78.qua'!
C:\QUARANTINE\7d861162dd5d0.bup
[DETECTION] Contains detection pattern of the exploits EXP/Office.Dropper.Gen
[NOTE] The file was moved to '4909fb41.qua'!
C:\QUARANTINE\7d861162f2a1770.bup
[DETECTION] Contains detection pattern of the exploits EXP/Office.Dropper.Gen
[NOTE] The file was moved to '487f9b79.qua'!
C:\QUARANTINE\7d86116312e3b90.bup
[DETECTION] Contains detection pattern of the exploits EXP/Office.Dropper.Gen
[NOTE] The file was moved to '4909fb42.qua'!
C:\QUARANTINE\7d8611632122610.bup
[DETECTION] Contains detection pattern of the exploits EXP/Office.Dropper.Gen
[NOTE] The file was moved to '487f9b7a.qua'!
C:\QUARANTINE\7d861163222af0.bup
[DETECTION] Contains detection pattern of the exploits EXP/Office.Dropper.Gen
[NOTE] The file was moved to '487f9b7b.qua'!
C:\QUARANTINE\7d8611633122e0.bup
[DETECTION] Contains detection pattern of the exploits EXP/Office.Dropper.Gen
[NOTE] The file was moved to '4909fb44.qua'!
C:\QUARANTINE\7d8611633211570.bup
[DETECTION] Contains detection pattern of the exploits EXP/Office.Dropper.Gen
[NOTE] The file was moved to '487f9b7d.qua'!
C:\QUARANTINE\7d861163321d40.bup
[DETECTION] Contains detection pattern of the exploits EXP/Office.Dropper.Gen
[NOTE] The file was moved to '487f9b7c.qua'!
C:\QUARANTINE\7d861163322030.bup
[DETECTION] Contains detection pattern of the exploits EXP/Office.Dropper.Gen
[NOTE] The file was moved to '4909fb45.qua'!
C:\QUARANTINE\7d8611639192510.bup
[DETECTION] Contains detection pattern of the exploits EXP/Office.Dropper.Gen
[NOTE] The file was moved to '4909fb46.qua'!
C:\QUARANTINE\7d8611639283d80.bup
[DETECTION] Contains detection pattern of the exploits EXP/Office.Dropper.Gen
[NOTE] The file was moved to '487f9b7f.qua'!
C:\QUARANTINE\7d8611639381280.bup
[DETECTION] Contains detection pattern of the exploits EXP/Office.Dropper.Gen
[NOTE] The file was moved to '487f9b7e.qua'!
C:\QUARANTINE\7d861163a342af0.bup
[DETECTION] Contains detection pattern of the exploits EXP/Office.Dropper.Gen
[NOTE] The file was moved to '4909fb47.qua'!
C:\QUARANTINE\7d861163ab3d80.bup
[DETECTION] Contains detection pattern of the exploits EXP/Office.Dropper.Gen
[NOTE] The file was moved to '4909fb61.qua'!
C:\QUARANTINE\7d861163b1831c0.bup
[DETECTION] Contains detection pattern of the exploits EXP/Office.Dropper.Gen
[NOTE] The file was moved to '487f9b5a.qua'!
C:\QUARANTINE\7d861163b312320.bup
[DETECTION] Contains detection pattern of the exploits EXP/Office.Dropper.Gen
[NOTE] The file was moved to '4909fbb8.qua'!
C:\QUARANTINE\7d861163b92030.bup
[DETECTION] Contains detection pattern of the exploits EXP/Office.Dropper.Gen
[NOTE] The file was moved to '487f9b81.qua'!
C:\QUARANTINE\7d8611791a3980.bup
[DETECTION] Contains detection pattern of the exploits EXP/Office.Dropper.Gen
[NOTE] The file was moved to '487f9b82.qua'!
Begin scan in 'D:\' <VAIO>

End of the scan: jeudi 5 juin 2008 11:45
Used time: 12:15:14 min

The scan has been done completely.

7269 Scanning directories
381454 Files were scanned
77 viruses and/or unwanted programs were found
0 Files were classified as suspicious:
0 files were deleted
0 files were repaired
77 files were moved to quarantine
0 files were renamed
1 Files cannot be scanned
381377 Files not concerned
13562 Archives were scanned
1 Warnings
77 Notes
0

Vous n’avez pas trouvé la réponse que vous recherchez ?

Posez votre question
Utilisateur anonyme
 
Niquel. ;)

* Je t'invite à lire ceci :
*https://www.malekal.com/proteger-pc-virus-pirates/
*http://forum.telecharger.01net.com/microhebdo/6/tuto-securite/mesures_preventives_avant_navigation_sinternet_et_entretien-346836/messages-1.html
*Utilise Windows Update
*Télécharge https://filehippo.com/windows/tuning-utilities/ tu l'installes et il te liste ce qu'il faut mettre à jour avec les liens correspondants.

*Télécharge ToolsCleaner (A.Rothstein) sur ton Bureau:
http://a-rothstein.changelog.fr/TC/ToolsCleaner2.exe
*Clique sur Recherche et laisse le scan se terminer.
*Clique sur Suppression pour finaliser.
*Tu peux, si tu le souhaites, te servir des Options facultatives.
*Clique sur Quitter, pour que le rapport puisse se créer.
*Poste le rapport C:\TCleaner.txt

------------------------------------------------------------------------------------------­­-------------------------

1.Ouvre le Menu Démarrer
2.Clique-droit sur Poste de travail
3.Clique sur Propriétés
4.Positionne-toi dans l'onglet Restauration du système
5.Coche Désactiver la restauration système
6.Valide par Ok
7.Redémarre
8.Reproduis les manipulations 1 à 3
9.Décoche Désactiver la restauration système
10.Valide par Ok

------------------------------------------------------------------------------------------­­-------------------------

*Télécharge Ccleaner :
https://www.ccleaner.com/ccleaner/download
Clique sur le premier Download now > Choisis la version Slim
Installe Ccleaner.
Nettoie Windows et la base de registre en suivant ce tuto :
https://www.malekal.com/tutoriel-ccleaner/#mozTocId223895

------------------------------------------------------------------------------------------­­-------------------------
0
rom1_29
 
-->- Recherche:

C:\Documents and Settings\LE BLEIS\Bureau\HijackThis.exe: trouvé !
C:\Documents and Settings\LE BLEIS\Bureau\MsnFix: trouvé !
C:\Documents and Settings\LE BLEIS\Bureau\GenProc: trouvé !
C:\UBCD4Win\BartPE\I386\SYSTEM32\tar.exe: trouvé !
C:\UBCD4Win\BartPE\I386\SYSTEM32\gzip.exe: trouvé !
C:\UBCD4Win\BartPE\PROGRAMS\HijackThis: trouvé !
C:\UBCD4Win\BartPE\PROGRAMS\HijackThis\HijackThis.exe: trouvé !
C:\UBCD4Win\plugin\AntiSpyware\HijackThis: trouvé !
C:\UBCD4Win\plugin\AntiSpyware\hijackthis\HijackThis.exe: trouvé !

---------------------------------
-->- Suppression:

C:\Documents and Settings\LE BLEIS\Bureau\HijackThis.exe: supprimé !
C:\UBCD4Win\BartPE\I386\SYSTEM32\tar.exe: supprimé !
C:\UBCD4Win\BartPE\I386\SYSTEM32\gzip.exe: supprimé !
C:\UBCD4Win\BartPE\PROGRAMS\HijackThis\HijackThis.exe: supprimé !
C:\UBCD4Win\plugin\AntiSpyware\hijackthis\HijackThis.exe: supprimé !
C:\Documents and Settings\LE BLEIS\Bureau\MsnFix: supprimé !
C:\Documents and Settings\LE BLEIS\Bureau\GenProc: supprimé !
C:\UBCD4Win\BartPE\PROGRAMS\HijackThis: supprimé !
C:\UBCD4Win\plugin\AntiSpyware\HijackThis: supprimé !
0
Utilisateur anonyme
 
Parfait !

Tu peux mettre ton sujet en résolu.
0
rom1_29
 
Ok merci beaucoup !
J'espère que ça va être bon ! ;)
0