Comment supprimer antivirus xp 08 ?
acharnay
Messages postés
2
Statut
Membre
-
Stitch -
Stitch -
Bonjour, mon PC est infecté par l'antivirus XP 08. l'ecran est bleu, avec le message suivant" WARNING ! SPYWARE DETECTED ON YOUR COMPUTER INSTALL AN ANTIVIRUS OR SPYWARE REMOVER TO CLEAN YOUR COMPUTER"
J'ai essayé de le désinstaller par la méthode traditionnelle (dans ajout ou suppression de programme ) mais sans succès. Sur mon PC j'ai les antivirus AVAST et SPYWARE TERMINATOR.
Je suis un novice en informatique, mais si quelqu'un pouvait m'indiquer une procédure simple pour me débarrasser de ce fleau......MERCI
J'ai essayé de le désinstaller par la méthode traditionnelle (dans ajout ou suppression de programme ) mais sans succès. Sur mon PC j'ai les antivirus AVAST et SPYWARE TERMINATOR.
Je suis un novice en informatique, mais si quelqu'un pouvait m'indiquer une procédure simple pour me débarrasser de ce fleau......MERCI
A voir également:
- Comment supprimer antivirus xp 08 ?
- Supprimer rond bleu whatsapp - Guide
- Comment supprimer une page sur word - Guide
- Cle windows xp - Guide
- Comodo antivirus - Télécharger - Sécurité
- Supprimer pub youtube - Accueil - Streaming
28 réponses
Bonjour,
Télécharge hijackthis sur ton bureau :
http://www.commentcamarche.net/telecharger/telecharger 159 hijackthis
Installe le, puis fais ceci avant de le lancer :
Va dans le menu démarrer --> Poste de travail --> disque local C --> Program Files --> Trend Micro --> Hijackthis --> cherche hijackthis.exe et fais un clic droit dessus --> renomme le en Jack.exe
Ensuite lance le et clique sur "Do a system scan and save a logfile".
Fais un copier-coller du rapport entier sur le forum
Télécharge hijackthis sur ton bureau :
http://www.commentcamarche.net/telecharger/telecharger 159 hijackthis
Installe le, puis fais ceci avant de le lancer :
Va dans le menu démarrer --> Poste de travail --> disque local C --> Program Files --> Trend Micro --> Hijackthis --> cherche hijackthis.exe et fais un clic droit dessus --> renomme le en Jack.exe
Ensuite lance le et clique sur "Do a system scan and save a logfile".
Fais un copier-coller du rapport entier sur le forum
acharnay
Bonjour, je rentre de vacances, et je attaque enfin au problème.J'ai suivi la procédure mais je suis "bloqué " au program files, car je n'ai pas de fichier "Trend Micro " Que dois je faire? merci
Renommer le programme permet de contrer certaines infections qui ont la capacité de se cacher de hijackthis lorsqu'elles le reconnaissent
Mais chez toi elles ne se cachent pas ;)
Commence par ceci stp :
Télécharge SmitfraudFix :
http://siri.urz.free.fr/Fix/SmitfraudFix.exe
- Enregistre-le sur le bureau
- Double-clique sur SmitfraudFix.exe et choisis l'option 1 puis Entrée
- Un rapport sera généré, poste-le dans ta prochaine réponse stp.
Tutorial ici pour t'aider : http://www.malekal.com//tutorial_SmitFraudfix.php
Mais chez toi elles ne se cachent pas ;)
Commence par ceci stp :
Télécharge SmitfraudFix :
http://siri.urz.free.fr/Fix/SmitfraudFix.exe
- Enregistre-le sur le bureau
- Double-clique sur SmitfraudFix.exe et choisis l'option 1 puis Entrée
- Un rapport sera généré, poste-le dans ta prochaine réponse stp.
Tutorial ici pour t'aider : http://www.malekal.com//tutorial_SmitFraudfix.php
Et voilà... Je comprend pas pourquoi on fait deux scan différent mais bon... :/
SmitFraudFix v2.334
Scan done at 17:19:29,66, 09/08/2008
Run from C:\Users\Delphine\Desktop\SmitfraudFix
OS: Microsoft Windows [version 6.0.6001] - Windows_NT
The filesystem type is NTFS
Fix run in normal mode
»»»»»»»»»»»»»»»»»»»»»»»» Process
C:\Windows\system32\csrss.exe
C:\Windows\system32\wininit.exe
C:\Windows\system32\csrss.exe
C:\Windows\system32\services.exe
C:\Windows\system32\lsass.exe
C:\Windows\system32\lsm.exe
C:\Windows\system32\winlogon.exe
C:\Windows\system32\svchost.exe
C:\Windows\Microsoft.Net\Framework\v3.0\WPF\PresentationFontCache.exe
C:\Windows\system32\svchost.exe
C:\Windows\system32\Ati2evxx.exe
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe
C:\Windows\system32\svchost.exe
C:\Windows\system32\SLsvc.exe
C:\Windows\system32\svchost.exe
C:\Windows\system32\Ati2evxx.exe
C:\Windows\system32\svchost.exe
C:\Windows\System32\spoolsv.exe
C:\Windows\system32\svchost.exe
C:\Program Files\TOSHIBA\ConfigFree\CFSvcs.exe
c:\PROGRA~1\COMMON~1\mcafee\mcproxy\mcproxy.exe
C:\PROGRA~1\McAfee\VIRUSS~1\mcshield.exe
C:\Program Files\McAfee\MPF\MPFSrv.exe
C:\Program Files\McAfee\MSK\MskSrver.exe
C:\Program Files\O2Micro Flash Memory Card Driver\o2flash.exe
C:\Windows\system32\svchost.exe
C:\Windows\system32\svchost.exe
C:\Program Files\Toshiba\TOSHIBA DVD PLAYER\TNaviSrv.exe
C:\Windows\system32\TODDSrv.exe
C:\Windows\system32\Dwm.exe
C:\Windows\Explorer.EXE
C:\Windows\system32\taskeng.exe
C:\Program Files\Toshiba\Power Saver\TosCoSrv.exe
C:\Program Files\TOSHIBA\SMARTLogService\TosIPCSrv.exe
C:\Program Files\Common Files\Ulead Systems\DVD\ULCDRSvr.exe
C:\Windows\system32\taskeng.exe
C:\Program Files\Java\jre1.6.0_03\bin\jusched.exe
C:\Program Files\Toshiba\ConfigFree\NDSTray.exe
C:\Windows\System32\svchost.exe
C:\Program Files\McAfee.com\Agent\mcagent.exe
C:\Windows\system32\SearchIndexer.exe
C:\Windows\system32\DRIVERS\xaudio.exe
C:\Program Files\IDM\Desktop SMS\DesktopSMS.exe
C:\Program Files\Toshiba\Toshiba Online Product Information\TOPI.exe
C:\Program Files\ATI Technologies\ATI.ACE\Core-Static\MOM.EXE
C:\Program Files\Synaptics\SynTP\SynTPEnh.exe
C:\Program Files\Camera Assistant Software for Toshiba\traybar.exe
C:\Program Files\Toshiba\ConfigFree\CFSwMgr.exe
C:\Program Files\Toshiba\Power Saver\TPwrMain.exe
C:\Program Files\Toshiba\SmoothView\SmoothView.exe
C:\Program Files\Toshiba\FlashCards\TCrdMain.exe
C:\Windows\WindowsMobile\wmdSync.exe
C:\Windows\System32\lphc5f8j0e392.exe
C:\Windows\System32\rundll32.exe
C:\Program Files\Windows Sidebar\sidebar.exe
C:\Program Files\Toshiba\TOSCDSPD\TOSCDSPD.exe
C:\Program Files\Windows Live\Messenger\msnmsgr.exe
C:\Program Files\DAEMON Tools Lite\daemon.exe
C:\Program Files\Windows Media Player\wmpnscfg.exe
C:\Program Files\Camera Assistant Software for Toshiba\CEC_MAIN.exe
C:\Program Files\Windows Mail\WinMail.exe
C:\PROGRA~1\McAfee\MSC\mcmscsvc.exe
C:\Windows\system32\svchost.exe
C:\Program Files\Windows Media Player\wmpnetwk.exe
C:\Program Files\Windows Sidebar\sidebar.exe
C:\Program Files\Synaptics\SynTP\SynTPHelper.exe
C:\Program Files\ATI Technologies\ATI.ACE\Core-Static\CCC.exe
C:\PROGRA~1\McAfee\VIRUSS~1\mcsysmon.exe
C:\Program Files\Windows Live\Messenger\usnsvc.exe
c:\PROGRA~1\COMMON~1\mcafee\mna\mcnasvc.exe
C:\Program Files\Java\jre1.6.0_03\bin\jucheck.exe
C:\Windows\system32\rundll32.exe
C:\Windows\System32\rundll32.exe
C:\Program Files\eMule\eMule.exe
C:\Windows\system32\rundll32.exe
C:\Windows\system32\rundll32.exe
C:\Windows\system32\rundll32.exe
C:\Program Files\Mozilla Firefox\firefox.exe
C:\PROGRA~1\McAfee\VIRUSS~1\mcods.exe
c:\PROGRA~1\mcafee\VIRUSS~1\mcvsshld.exe
C:\Windows\system32\cmd.exe
C:\Windows\system32\conime.exe
c:\PROGRA~1\mcafee\VIRUSS~1\mcvsmap.exe
C:\Windows\system32\DllHost.exe
C:\Windows\system32\wbem\wmiprvse.exe
»»»»»»»»»»»»»»»»»»»»»»»» hosts
»»»»»»»»»»»»»»»»»»»»»»»» C:\
»»»»»»»»»»»»»»»»»»»»»»»» C:\Windows
»»»»»»»»»»»»»»»»»»»»»»»» C:\Windows\system
»»»»»»»»»»»»»»»»»»»»»»»» C:\Windows\Web
»»»»»»»»»»»»»»»»»»»»»»»» C:\Windows\system32
»»»»»»»»»»»»»»»»»»»»»»»» C:\Windows\system32\LogFiles
»»»»»»»»»»»»»»»»»»»»»»»» C:\Users\Delphine
»»»»»»»»»»»»»»»»»»»»»»»» C:\Users\Delphine\Application Data
»»»»»»»»»»»»»»»»»»»»»»»» Start Menu
»»»»»»»»»»»»»»»»»»»»»»»» C:\Users\Delphine\FAVORI~1
»»»»»»»»»»»»»»»»»»»»»»»» Desktop
»»»»»»»»»»»»»»»»»»»»»»»» C:\Program Files
»»»»»»»»»»»»»»»»»»»»»»»» Corrupted keys
»»»»»»»»»»»»»»»»»»»»»»»» Desktop Components
»»»»»»»»»»»»»»»»»»»»»»»» IEDFix
!!!Attention, following keys are not inevitably infected!!!
IEDFix
Credits: Malware Analysis & Diagnostic
Code: S!Ri
»»»»»»»»»»»»»»»»»»»»»»»» VACFix
!!!Attention, following keys are not inevitably infected!!!
VACFix
Credits: Malware Analysis & Diagnostic
Code: S!Ri
+--------------------------------------------------+
[!] Suspicious: nfavxwdbdfm.dll
BHO: QXK Olive - {B763BE68-B1D1-41F4-9087-8BF71BB93155}
TypeLib: {1486F5BC-05BF-42F2-9F91-CCF8319F6685}
Interface: {5AE30D98-C235-4030-8360-B7B652D8D64A}
Interface: {699E5D2A-0C7A-49E4-A84A-DA454A48FE71}
[!] Suspicious: fdkowvbp.dll
Toolbar: fdkowvbp - {FB3486FF-2A37-4536-B847-D999BA4E7776}
TypeLib: {3F672D71-BC1D-4C9B-98D0-B06928E499A2}
Interface: {58F59A2E-E08F-41E3-AC57-D80F0C7FDA10}
Classe: fdkowvbp.bpeb
Classe: fdkowvbp.ToolBar.1
[!] Suspicious: wnslvxtf.dll
SSODL: wnslvxtf - {65FDF93F-E48F-45BB-9E2F-6280128DF7DE}
»»»»»»»»»»»»»»»»»»»»»»»» 404Fix
!!!Attention, following keys are not inevitably infected!!!
404Fix
Credits: Malware Analysis & Diagnostic
Code: S!Ri
»»»»»»»»»»»»»»»»»»»»»»»» Sharedtaskscheduler
!!!Attention, following keys are not inevitably infected!!!
SrchSTS.exe by S!Ri
Search SharedTaskScheduler's .dll
»»»»»»»»»»»»»»»»»»»»»»»» AppInit_DLLs
!!!Attention, following keys are not inevitably infected!!!
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows]
"AppInit_DLLs"=""
"LoadAppInit_DLLs"=dword:00000001
»»»»»»»»»»»»»»»»»»»»»»»» Winlogon
!!!Attention, following keys are not inevitably infected!!!
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon]
"Userinit"="C:\\Windows\\system32\\userinit.exe,"
»»»»»»»»»»»»»»»»»»»»»»»» Rustock
»»»»»»»»»»»»»»»»»»»»»»»» DNS
Description: Intel(R) PRO/Wireless 3945ABG Network Connection
DNS Server Search Order: 192.168.1.1
HKLM\SYSTEM\CCS\Services\Tcpip\..\{12505B18-8AA5-4868-9758-C8A3ECC8BA42}: DhcpNameServer=192.168.1.1
HKLM\SYSTEM\CS1\Services\Tcpip\..\{12505B18-8AA5-4868-9758-C8A3ECC8BA42}: DhcpNameServer=192.168.1.1
HKLM\SYSTEM\CS3\Services\Tcpip\..\{12505B18-8AA5-4868-9758-C8A3ECC8BA42}: DhcpNameServer=192.168.1.1
HKLM\SYSTEM\CCS\Services\Tcpip\Parameters: DhcpNameServer=192.168.1.1
HKLM\SYSTEM\CS1\Services\Tcpip\Parameters: DhcpNameServer=192.168.1.1
HKLM\SYSTEM\CS3\Services\Tcpip\Parameters: DhcpNameServer=192.168.1.1
»»»»»»»»»»»»»»»»»»»»»»»» Scanning for wininet.dll infection
»»»»»»»»»»»»»»»»»»»»»»»» End
SmitFraudFix v2.334
Scan done at 17:19:29,66, 09/08/2008
Run from C:\Users\Delphine\Desktop\SmitfraudFix
OS: Microsoft Windows [version 6.0.6001] - Windows_NT
The filesystem type is NTFS
Fix run in normal mode
»»»»»»»»»»»»»»»»»»»»»»»» Process
C:\Windows\system32\csrss.exe
C:\Windows\system32\wininit.exe
C:\Windows\system32\csrss.exe
C:\Windows\system32\services.exe
C:\Windows\system32\lsass.exe
C:\Windows\system32\lsm.exe
C:\Windows\system32\winlogon.exe
C:\Windows\system32\svchost.exe
C:\Windows\Microsoft.Net\Framework\v3.0\WPF\PresentationFontCache.exe
C:\Windows\system32\svchost.exe
C:\Windows\system32\Ati2evxx.exe
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe
C:\Windows\system32\svchost.exe
C:\Windows\system32\SLsvc.exe
C:\Windows\system32\svchost.exe
C:\Windows\system32\Ati2evxx.exe
C:\Windows\system32\svchost.exe
C:\Windows\System32\spoolsv.exe
C:\Windows\system32\svchost.exe
C:\Program Files\TOSHIBA\ConfigFree\CFSvcs.exe
c:\PROGRA~1\COMMON~1\mcafee\mcproxy\mcproxy.exe
C:\PROGRA~1\McAfee\VIRUSS~1\mcshield.exe
C:\Program Files\McAfee\MPF\MPFSrv.exe
C:\Program Files\McAfee\MSK\MskSrver.exe
C:\Program Files\O2Micro Flash Memory Card Driver\o2flash.exe
C:\Windows\system32\svchost.exe
C:\Windows\system32\svchost.exe
C:\Program Files\Toshiba\TOSHIBA DVD PLAYER\TNaviSrv.exe
C:\Windows\system32\TODDSrv.exe
C:\Windows\system32\Dwm.exe
C:\Windows\Explorer.EXE
C:\Windows\system32\taskeng.exe
C:\Program Files\Toshiba\Power Saver\TosCoSrv.exe
C:\Program Files\TOSHIBA\SMARTLogService\TosIPCSrv.exe
C:\Program Files\Common Files\Ulead Systems\DVD\ULCDRSvr.exe
C:\Windows\system32\taskeng.exe
C:\Program Files\Java\jre1.6.0_03\bin\jusched.exe
C:\Program Files\Toshiba\ConfigFree\NDSTray.exe
C:\Windows\System32\svchost.exe
C:\Program Files\McAfee.com\Agent\mcagent.exe
C:\Windows\system32\SearchIndexer.exe
C:\Windows\system32\DRIVERS\xaudio.exe
C:\Program Files\IDM\Desktop SMS\DesktopSMS.exe
C:\Program Files\Toshiba\Toshiba Online Product Information\TOPI.exe
C:\Program Files\ATI Technologies\ATI.ACE\Core-Static\MOM.EXE
C:\Program Files\Synaptics\SynTP\SynTPEnh.exe
C:\Program Files\Camera Assistant Software for Toshiba\traybar.exe
C:\Program Files\Toshiba\ConfigFree\CFSwMgr.exe
C:\Program Files\Toshiba\Power Saver\TPwrMain.exe
C:\Program Files\Toshiba\SmoothView\SmoothView.exe
C:\Program Files\Toshiba\FlashCards\TCrdMain.exe
C:\Windows\WindowsMobile\wmdSync.exe
C:\Windows\System32\lphc5f8j0e392.exe
C:\Windows\System32\rundll32.exe
C:\Program Files\Windows Sidebar\sidebar.exe
C:\Program Files\Toshiba\TOSCDSPD\TOSCDSPD.exe
C:\Program Files\Windows Live\Messenger\msnmsgr.exe
C:\Program Files\DAEMON Tools Lite\daemon.exe
C:\Program Files\Windows Media Player\wmpnscfg.exe
C:\Program Files\Camera Assistant Software for Toshiba\CEC_MAIN.exe
C:\Program Files\Windows Mail\WinMail.exe
C:\PROGRA~1\McAfee\MSC\mcmscsvc.exe
C:\Windows\system32\svchost.exe
C:\Program Files\Windows Media Player\wmpnetwk.exe
C:\Program Files\Windows Sidebar\sidebar.exe
C:\Program Files\Synaptics\SynTP\SynTPHelper.exe
C:\Program Files\ATI Technologies\ATI.ACE\Core-Static\CCC.exe
C:\PROGRA~1\McAfee\VIRUSS~1\mcsysmon.exe
C:\Program Files\Windows Live\Messenger\usnsvc.exe
c:\PROGRA~1\COMMON~1\mcafee\mna\mcnasvc.exe
C:\Program Files\Java\jre1.6.0_03\bin\jucheck.exe
C:\Windows\system32\rundll32.exe
C:\Windows\System32\rundll32.exe
C:\Program Files\eMule\eMule.exe
C:\Windows\system32\rundll32.exe
C:\Windows\system32\rundll32.exe
C:\Windows\system32\rundll32.exe
C:\Program Files\Mozilla Firefox\firefox.exe
C:\PROGRA~1\McAfee\VIRUSS~1\mcods.exe
c:\PROGRA~1\mcafee\VIRUSS~1\mcvsshld.exe
C:\Windows\system32\cmd.exe
C:\Windows\system32\conime.exe
c:\PROGRA~1\mcafee\VIRUSS~1\mcvsmap.exe
C:\Windows\system32\DllHost.exe
C:\Windows\system32\wbem\wmiprvse.exe
»»»»»»»»»»»»»»»»»»»»»»»» hosts
»»»»»»»»»»»»»»»»»»»»»»»» C:\
»»»»»»»»»»»»»»»»»»»»»»»» C:\Windows
»»»»»»»»»»»»»»»»»»»»»»»» C:\Windows\system
»»»»»»»»»»»»»»»»»»»»»»»» C:\Windows\Web
»»»»»»»»»»»»»»»»»»»»»»»» C:\Windows\system32
»»»»»»»»»»»»»»»»»»»»»»»» C:\Windows\system32\LogFiles
»»»»»»»»»»»»»»»»»»»»»»»» C:\Users\Delphine
»»»»»»»»»»»»»»»»»»»»»»»» C:\Users\Delphine\Application Data
»»»»»»»»»»»»»»»»»»»»»»»» Start Menu
»»»»»»»»»»»»»»»»»»»»»»»» C:\Users\Delphine\FAVORI~1
»»»»»»»»»»»»»»»»»»»»»»»» Desktop
»»»»»»»»»»»»»»»»»»»»»»»» C:\Program Files
»»»»»»»»»»»»»»»»»»»»»»»» Corrupted keys
»»»»»»»»»»»»»»»»»»»»»»»» Desktop Components
»»»»»»»»»»»»»»»»»»»»»»»» IEDFix
!!!Attention, following keys are not inevitably infected!!!
IEDFix
Credits: Malware Analysis & Diagnostic
Code: S!Ri
»»»»»»»»»»»»»»»»»»»»»»»» VACFix
!!!Attention, following keys are not inevitably infected!!!
VACFix
Credits: Malware Analysis & Diagnostic
Code: S!Ri
+--------------------------------------------------+
[!] Suspicious: nfavxwdbdfm.dll
BHO: QXK Olive - {B763BE68-B1D1-41F4-9087-8BF71BB93155}
TypeLib: {1486F5BC-05BF-42F2-9F91-CCF8319F6685}
Interface: {5AE30D98-C235-4030-8360-B7B652D8D64A}
Interface: {699E5D2A-0C7A-49E4-A84A-DA454A48FE71}
[!] Suspicious: fdkowvbp.dll
Toolbar: fdkowvbp - {FB3486FF-2A37-4536-B847-D999BA4E7776}
TypeLib: {3F672D71-BC1D-4C9B-98D0-B06928E499A2}
Interface: {58F59A2E-E08F-41E3-AC57-D80F0C7FDA10}
Classe: fdkowvbp.bpeb
Classe: fdkowvbp.ToolBar.1
[!] Suspicious: wnslvxtf.dll
SSODL: wnslvxtf - {65FDF93F-E48F-45BB-9E2F-6280128DF7DE}
»»»»»»»»»»»»»»»»»»»»»»»» 404Fix
!!!Attention, following keys are not inevitably infected!!!
404Fix
Credits: Malware Analysis & Diagnostic
Code: S!Ri
»»»»»»»»»»»»»»»»»»»»»»»» Sharedtaskscheduler
!!!Attention, following keys are not inevitably infected!!!
SrchSTS.exe by S!Ri
Search SharedTaskScheduler's .dll
»»»»»»»»»»»»»»»»»»»»»»»» AppInit_DLLs
!!!Attention, following keys are not inevitably infected!!!
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows]
"AppInit_DLLs"=""
"LoadAppInit_DLLs"=dword:00000001
»»»»»»»»»»»»»»»»»»»»»»»» Winlogon
!!!Attention, following keys are not inevitably infected!!!
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon]
"Userinit"="C:\\Windows\\system32\\userinit.exe,"
»»»»»»»»»»»»»»»»»»»»»»»» Rustock
»»»»»»»»»»»»»»»»»»»»»»»» DNS
Description: Intel(R) PRO/Wireless 3945ABG Network Connection
DNS Server Search Order: 192.168.1.1
HKLM\SYSTEM\CCS\Services\Tcpip\..\{12505B18-8AA5-4868-9758-C8A3ECC8BA42}: DhcpNameServer=192.168.1.1
HKLM\SYSTEM\CS1\Services\Tcpip\..\{12505B18-8AA5-4868-9758-C8A3ECC8BA42}: DhcpNameServer=192.168.1.1
HKLM\SYSTEM\CS3\Services\Tcpip\..\{12505B18-8AA5-4868-9758-C8A3ECC8BA42}: DhcpNameServer=192.168.1.1
HKLM\SYSTEM\CCS\Services\Tcpip\Parameters: DhcpNameServer=192.168.1.1
HKLM\SYSTEM\CS1\Services\Tcpip\Parameters: DhcpNameServer=192.168.1.1
HKLM\SYSTEM\CS3\Services\Tcpip\Parameters: DhcpNameServer=192.168.1.1
»»»»»»»»»»»»»»»»»»»»»»»» Scanning for wininet.dll infection
»»»»»»»»»»»»»»»»»»»»»»»» End
Vous n’avez pas trouvé la réponse que vous recherchez ?
Posez votre question
Comment ça deux scans différents ?
Fais maintenant le nettoyage :
1) Démarre en mode sans échec :
Pour cela, tu tapotes la touche F8 dès le début de l’allumage du PC sans t’arrêter (avant le logo windows) . Un menu va apparaitre, déplace-toi avec les flèches du clavier sur Démarrer en mode sans échec puis tape Entrée. Choisis ta session habituelle (une fois sur le bureau, s’il n’y a pas toutes les couleurs et autres, c’est normal).
Relance le programme SmitfraudFix.
Cette fois, choisis l’option 2, répond oui à tous;
A la fin, sauvegarde le rapport sur ton bureau, redémarre en mode normal et copie-colle le rapport ici.
2) Ensuite, passe à MalwareByte's
Télécharge et installe Malwarebyte's Anti-Malware : [<http://www.malwarebytes.org/mbam/program/mbam-setup.exe> <MBAM>]
- A la fin de l'installation, veille à ce que l'option « mettre a jour Malwarebyte's Anti-Malware » soit cochée
- Lance Malwarebyte's Anti-Malware, laisse les Mises à jour se télécharger et referme le programme
Redémarre en "Mode sans échec" : redémarre ton ordinateur et tapote sur la touche F8 jusqu'à l'affichage du menu des options avancées de Windows, et sélectionne "Mode sans échec".
Choisis ta session habituelle
Lance Malwarebyte's Anti-Malware
- Puis va dans l'onglet "Recherche", coche "Exécuter un examen complet" puis "Rechercher"
- Sélectionne tes disques durs" puis clique sur "Lancer l’examen"
- A la fin du scan, clique sur Afficher les résultats puis sur Enregistrer le rapport
- Suppression des éléments détectés --> clique sur Supprimer la sélection
- S'il t'es demandé de redémarrer, clique sur Yes
Poste le rapport de scan après la suppression ici
Fais maintenant le nettoyage :
1) Démarre en mode sans échec :
Pour cela, tu tapotes la touche F8 dès le début de l’allumage du PC sans t’arrêter (avant le logo windows) . Un menu va apparaitre, déplace-toi avec les flèches du clavier sur Démarrer en mode sans échec puis tape Entrée. Choisis ta session habituelle (une fois sur le bureau, s’il n’y a pas toutes les couleurs et autres, c’est normal).
Relance le programme SmitfraudFix.
Cette fois, choisis l’option 2, répond oui à tous;
A la fin, sauvegarde le rapport sur ton bureau, redémarre en mode normal et copie-colle le rapport ici.
2) Ensuite, passe à MalwareByte's
Télécharge et installe Malwarebyte's Anti-Malware : [<http://www.malwarebytes.org/mbam/program/mbam-setup.exe> <MBAM>]
- A la fin de l'installation, veille à ce que l'option « mettre a jour Malwarebyte's Anti-Malware » soit cochée
- Lance Malwarebyte's Anti-Malware, laisse les Mises à jour se télécharger et referme le programme
Redémarre en "Mode sans échec" : redémarre ton ordinateur et tapote sur la touche F8 jusqu'à l'affichage du menu des options avancées de Windows, et sélectionne "Mode sans échec".
Choisis ta session habituelle
Lance Malwarebyte's Anti-Malware
- Puis va dans l'onglet "Recherche", coche "Exécuter un examen complet" puis "Rechercher"
- Sélectionne tes disques durs" puis clique sur "Lancer l’examen"
- A la fin du scan, clique sur Afficher les résultats puis sur Enregistrer le rapport
- Suppression des éléments détectés --> clique sur Supprimer la sélection
- S'il t'es demandé de redémarrer, clique sur Yes
Poste le rapport de scan après la suppression ici
bon je crois que là c'est bon non ? Il est enlevé car ça commence à me gaver...
alors SmitfraudFix:
SmitFraudFix v2.334
Scan done at 11:22:05,06, 11/08/2008
Run from C:\Users\Delphine\Desktop\SmitfraudFix
OS: Microsoft Windows [version 6.0.6001] - Windows_NT
The filesystem type is NTFS
Fix run in safe mode
»»»»»»»»»»»»»»»»»»»»»»»» SharedTaskScheduler Before SmitFraudFix
!!!Attention, following keys are not inevitably infected!!!
SrchSTS.exe by S!Ri
Search SharedTaskScheduler's .dll
»»»»»»»»»»»»»»»»»»»»»»»» Killing process
»»»»»»»»»»»»»»»»»»»»»»»» hosts
127.0.0.1 localhost
::1 localhost
»»»»»»»»»»»»»»»»»»»»»»»» VACFix
VACFix
Credits: Malware Analysis & Diagnostic
Code: S!Ri
C:\Windows\nfavxwdbdfm.dll deleted.
C:\Windows\fdkowvbp.dll deleted.
C:\Windows\wnslvxtf.dll deleted.
»»»»»»»»»»»»»»»»»»»»»»»» Winsock2 Fix
S!Ri's WS2Fix: LSP not Found.
»»»»»»»»»»»»»»»»»»»»»»»» Generic Renos Fix
GenericRenosFix by S!Ri
»»»»»»»»»»»»»»»»»»»»»»»» Deleting infected files
»»»»»»»»»»»»»»»»»»»»»»»» IEDFix
IEDFix
Credits: Malware Analysis & Diagnostic
Code: S!Ri
»»»»»»»»»»»»»»»»»»»»»»»» 404Fix
404Fix
Credits: Malware Analysis & Diagnostic
Code: S!Ri
»»»»»»»»»»»»»»»»»»»»»»»» DNS
HKLM\SYSTEM\CCS\Services\Tcpip\..\{12505B18-8AA5-4868-9758-C8A3ECC8BA42}: DhcpNameServer=192.168.1.1
HKLM\SYSTEM\CS1\Services\Tcpip\..\{12505B18-8AA5-4868-9758-C8A3ECC8BA42}: DhcpNameServer=192.168.1.1
HKLM\SYSTEM\CS3\Services\Tcpip\..\{12505B18-8AA5-4868-9758-C8A3ECC8BA42}: DhcpNameServer=192.168.1.1
HKLM\SYSTEM\CCS\Services\Tcpip\Parameters: DhcpNameServer=192.168.1.1
HKLM\SYSTEM\CS1\Services\Tcpip\Parameters: DhcpNameServer=192.168.1.1
HKLM\SYSTEM\CS3\Services\Tcpip\Parameters: DhcpNameServer=192.168.1.1
»»»»»»»»»»»»»»»»»»»»»»»» Deleting Temp Files
»»»»»»»»»»»»»»»»»»»»»»»» Winlogon.System
!!!Attention, following keys are not inevitably infected!!!
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon]
»»»»»»»»»»»»»»»»»»»»»»»» Registry Cleaning
Registry Cleaning done.
»»»»»»»»»»»»»»»»»»»»»»»» SharedTaskScheduler After SmitFraudFix
!!!Attention, following keys are not inevitably infected!!!
SrchSTS.exe by S!Ri
Search SharedTaskScheduler's .dll
»»»»»»»»»»»»»»»»»»»»»»»» End
Ensuite l'autre...
Malwarebytes' Anti-Malware 1.24
Version de la base de données: 1040
Windows 6.0.6001 Service Pack 1
12:04:57 11/08/2008
mbam-log-8-11-2008 (12-04-52).txt
Type de recherche: Examen complet (C:\|D:\|E:\|F:\|)
Eléments examinés: 139474
Temps écoulé: 25 minute(s), 28 second(s)
Processus mémoire infecté(s): 0
Module(s) mémoire infecté(s): 1
Clé(s) du Registre infectée(s): 18
Valeur(s) du Registre infectée(s): 9
Elément(s) de données du Registre infecté(s): 4
Dossier(s) infecté(s): 12
Fichier(s) infecté(s): 41
Processus mémoire infecté(s):
(Aucun élément nuisible détecté)
Module(s) mémoire infecté(s):
C:\Windows\System32\jkkLBsrp.dll (Trojan.Vundo) -> No action taken.
Clé(s) du Registre infectée(s):
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{286f5011-d462-4803-8ed3-5938434f6415} (Trojan.Vundo) -> No action taken.
HKEY_CLASSES_ROOT\CLSID\{286f5011-d462-4803-8ed3-5938434f6415} (Trojan.Vundo) -> No action taken.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{55d17579-f6ff-4a63-981b-6683f99b9972} (Trojan.BHO) -> No action taken.
HKEY_CLASSES_ROOT\CLSID\{55d17579-f6ff-4a63-981b-6683f99b9972} (Trojan.BHO) -> No action taken.
HKEY_CLASSES_ROOT\CLSID\{1b55c95b-83f2-432e-aed5-94234df7de8e} (Trojan.FakeAlert) -> No action taken.
HKEY_CLASSES_ROOT\CLSID\{f1dd776c-db30-43f0-866a-f9bb95447970} (Trojan.FakeAlert) -> No action taken.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\rhc1f8j0e392 (Rogue.Multiple) -> No action taken.
HKEY_LOCAL_MACHINE\SOFTWARE\rhc1f8j0e392 (Rogue.Multiple) -> No action taken.
HKEY_CURRENT_USER\SOFTWARE\antivirus 2008 pro (Rogue.Antivirus2008) -> No action taken.
HKEY_CURRENT_USER\SOFTWARE\MediaHoldings (Adware.PlayMP3Z) -> No action taken.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\rdfa (Trojan.Vundo) -> No action taken.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Software Notifier (Rogue.Multiple) -> No action taken.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\MS Juan (Malware.Trace) -> No action taken.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\contim (Trojan.Vundo) -> No action taken.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\MS Track System (Trojan.Vundo) -> No action taken.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\FCOVM (Trojan.Vundo) -> No action taken.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\RemoveRP (Trojan.Vundo) -> No action taken.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\aoprndtws (Trojan.Vundo) -> No action taken.
Valeur(s) du Registre infectée(s):
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\82810e5c (Trojan.Vundo) -> No action taken.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\eqvwamkl (Trojan.FakeAlert) -> No action taken.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MSServer (Malware.Trace) -> No action taken.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\ShellExecuteHooks\{55d17579-f6ff-4a63-981b-6683f99b9972} (Trojan.Vundo) -> No action taken.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lphc5f8j0e392 (Trojan.FakeAlert) -> No action taken.
HKEY_CURRENT_USER\Control Panel\Desktop\wallpaper (Hijack.Wallpaper) -> No action taken.
HKEY_CURRENT_USER\Control Panel\Desktop\originalwallpaper (Hijack.Wallpaper) -> No action taken.
HKEY_CURRENT_USER\Control Panel\Desktop\convertedwallpaper (Hijack.Wallpaper) -> No action taken.
HKEY_CURRENT_USER\Control Panel\Desktop\scrnsave.exe (Hijack.Wallpaper) -> No action taken.
Elément(s) de données du Registre infecté(s):
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\LSA\Notification Packages (Trojan.Vundo) -> Data: c:\windows\system32\jkklbsrp -> No action taken.
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\LSA\Authentication Packages (Trojan.Vundo) -> Data: c:\windows\system32\jkklbsrp -> No action taken.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\NoDispBackgroundPage (Hijack.DisplayProperties) -> Bad: (1) Good: (0) -> No action taken.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\NoDispScrSavPage (Hijack.DisplayProperties) -> Bad: (1) Good: (0) -> No action taken.
Dossier(s) infecté(s):
C:\Program Files\rhc1f8j0e392 (Rogue.Multiple) -> No action taken.
C:\Users\Delphine\AppData\Roaming\rhc1f8j0e392 (Rogue.Multiple) -> No action taken.
C:\Users\Delphine\AppData\Roaming\rhc1f8j0e392\Quarantine (Rogue.Multiple) -> No action taken.
C:\Users\Delphine\AppData\Roaming\rhc1f8j0e392\Quarantine\Autorun (Rogue.Multiple) -> No action taken.
C:\Users\Delphine\AppData\Roaming\rhc1f8j0e392\Quarantine\Autorun\HKCU (Rogue.Multiple) -> No action taken.
C:\Users\Delphine\AppData\Roaming\rhc1f8j0e392\Quarantine\Autorun\HKCU\RunOnce (Rogue.Multiple) -> No action taken.
C:\Users\Delphine\AppData\Roaming\rhc1f8j0e392\Quarantine\Autorun\HKLM (Rogue.Multiple) -> No action taken.
C:\Users\Delphine\AppData\Roaming\rhc1f8j0e392\Quarantine\Autorun\HKLM\RunOnce (Rogue.Multiple) -> No action taken.
C:\Users\Delphine\AppData\Roaming\rhc1f8j0e392\Quarantine\Autorun\StartMenuAllUsers (Rogue.Multiple) -> No action taken.
C:\Users\Delphine\AppData\Roaming\rhc1f8j0e392\Quarantine\Autorun\StartMenuCurrentUser (Rogue.Multiple) -> No action taken.
C:\Users\Delphine\AppData\Roaming\rhc1f8j0e392\Quarantine\BrowserObjects (Rogue.Multiple) -> No action taken.
C:\Users\Delphine\AppData\Roaming\rhc1f8j0e392\Quarantine\Packages (Rogue.Multiple) -> No action taken.
Fichier(s) infecté(s):
C:\Windows\System32\jkkLBsrp.dll (Trojan.Vundo) -> No action taken.
C:\Windows\System32\prsBLkkj.ini (Trojan.Vundo) -> No action taken.
C:\Windows\System32\prsBLkkj.ini2 (Trojan.Vundo) -> No action taken.
C:\Windows\System32\kldqaxpf.dll (Trojan.Vundo) -> No action taken.
C:\Windows\System32\fpxaqdlk.ini (Trojan.Vundo) -> No action taken.
C:\Windows\System32\ngntghsp.dll (Trojan.Vundo) -> No action taken.
C:\Windows\System32\pshgtngn.ini (Trojan.Vundo) -> No action taken.
C:\Windows\System32\pmnmjHbc.dll (Trojan.BHO) -> No action taken.
C:\Windows\edot.exe (Trojan.FakeAlert) -> No action taken.
C:\Windows\eqvwamkl.dll (Trojan.FakeAlert) -> No action taken.
C:\Windows\System32\aWopNHYs.dll (Trojan.Vundo) -> No action taken.
C:\Windows\System32\awwviypk.dll (Trojan.Vundo) -> No action taken.
C:\Windows\System32\bvklor.dll (Trojan.Vundo) -> No action taken.
C:\Windows\System32\exyraq.dll (Trojan.Vundo) -> No action taken.
C:\Windows\System32\fqyoli.dll (Trojan.Vundo) -> No action taken.
C:\Windows\System32\halnhghg.dll (Trojan.Vundo) -> No action taken.
C:\Windows\System32\htndjdci.dll (Trojan.Vundo) -> No action taken.
C:\Windows\System32\hvyiksur.dll (Trojan.Vundo) -> No action taken.
C:\Windows\System32\hwqvhsut.dll (Trojan.Vundo) -> No action taken.
C:\Windows\System32\kmzbfi.dll (Trojan.Vundo) -> No action taken.
C:\Windows\System32\lhczoi.dll (Trojan.Vundo) -> No action taken.
C:\Windows\System32\quifvjnn.dll (Trojan.Vundo) -> No action taken.
C:\Windows\System32\snjgre.dll (Trojan.Vundo) -> No action taken.
C:\Windows\System32\ssqqrSKa.dll (Trojan.Vundo) -> No action taken.
C:\Windows\System32\uixjad.dll (Trojan.Vundo) -> No action taken.
C:\Windows\System32\xlbstmgn.dll (Trojan.Vundo) -> No action taken.
C:\Program Files\rhc1f8j0e392\database.dat (Rogue.Multiple) -> No action taken.
C:\Program Files\rhc1f8j0e392\license.txt (Rogue.Multiple) -> No action taken.
C:\Program Files\rhc1f8j0e392\MFC71.dll (Rogue.Multiple) -> No action taken.
C:\Program Files\rhc1f8j0e392\MFC71ENU.DLL (Rogue.Multiple) -> No action taken.
C:\Program Files\rhc1f8j0e392\msvcp71.dll (Rogue.Multiple) -> No action taken.
C:\Program Files\rhc1f8j0e392\msvcr71.dll (Rogue.Multiple) -> No action taken.
C:\Program Files\rhc1f8j0e392\rhc1f8j0e392.exe (Rogue.Multiple) -> No action taken.
C:\Program Files\rhc1f8j0e392\rhc1f8j0e392.exe.local (Rogue.Multiple) -> No action taken.
C:\Program Files\rhc1f8j0e392\Uninstall.exe (Rogue.Multiple) -> No action taken.
C:\Windows\System32\jkkJdDtU.dll (Trojan.Vundo) -> No action taken.
C:\Windows\System32\byxXqopP.dll (Trojan.Vundo) -> No action taken.
C:\Windows\grswptdl.exe (Trojan.FakeAlert) -> No action taken.
C:\Windows\System32\lphc5f8j0e392.exe (Trojan.FakeAlert) -> No action taken.
C:\Windows\System32\phc5f8j0e392.bmp (Trojan.FakeAlert) -> No action taken.
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Antivirus XP 2008.lnk (Rogue.AntivirusXP) -> No action taken.
alors SmitfraudFix:
SmitFraudFix v2.334
Scan done at 11:22:05,06, 11/08/2008
Run from C:\Users\Delphine\Desktop\SmitfraudFix
OS: Microsoft Windows [version 6.0.6001] - Windows_NT
The filesystem type is NTFS
Fix run in safe mode
»»»»»»»»»»»»»»»»»»»»»»»» SharedTaskScheduler Before SmitFraudFix
!!!Attention, following keys are not inevitably infected!!!
SrchSTS.exe by S!Ri
Search SharedTaskScheduler's .dll
»»»»»»»»»»»»»»»»»»»»»»»» Killing process
»»»»»»»»»»»»»»»»»»»»»»»» hosts
127.0.0.1 localhost
::1 localhost
»»»»»»»»»»»»»»»»»»»»»»»» VACFix
VACFix
Credits: Malware Analysis & Diagnostic
Code: S!Ri
C:\Windows\nfavxwdbdfm.dll deleted.
C:\Windows\fdkowvbp.dll deleted.
C:\Windows\wnslvxtf.dll deleted.
»»»»»»»»»»»»»»»»»»»»»»»» Winsock2 Fix
S!Ri's WS2Fix: LSP not Found.
»»»»»»»»»»»»»»»»»»»»»»»» Generic Renos Fix
GenericRenosFix by S!Ri
»»»»»»»»»»»»»»»»»»»»»»»» Deleting infected files
»»»»»»»»»»»»»»»»»»»»»»»» IEDFix
IEDFix
Credits: Malware Analysis & Diagnostic
Code: S!Ri
»»»»»»»»»»»»»»»»»»»»»»»» 404Fix
404Fix
Credits: Malware Analysis & Diagnostic
Code: S!Ri
»»»»»»»»»»»»»»»»»»»»»»»» DNS
HKLM\SYSTEM\CCS\Services\Tcpip\..\{12505B18-8AA5-4868-9758-C8A3ECC8BA42}: DhcpNameServer=192.168.1.1
HKLM\SYSTEM\CS1\Services\Tcpip\..\{12505B18-8AA5-4868-9758-C8A3ECC8BA42}: DhcpNameServer=192.168.1.1
HKLM\SYSTEM\CS3\Services\Tcpip\..\{12505B18-8AA5-4868-9758-C8A3ECC8BA42}: DhcpNameServer=192.168.1.1
HKLM\SYSTEM\CCS\Services\Tcpip\Parameters: DhcpNameServer=192.168.1.1
HKLM\SYSTEM\CS1\Services\Tcpip\Parameters: DhcpNameServer=192.168.1.1
HKLM\SYSTEM\CS3\Services\Tcpip\Parameters: DhcpNameServer=192.168.1.1
»»»»»»»»»»»»»»»»»»»»»»»» Deleting Temp Files
»»»»»»»»»»»»»»»»»»»»»»»» Winlogon.System
!!!Attention, following keys are not inevitably infected!!!
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon]
»»»»»»»»»»»»»»»»»»»»»»»» Registry Cleaning
Registry Cleaning done.
»»»»»»»»»»»»»»»»»»»»»»»» SharedTaskScheduler After SmitFraudFix
!!!Attention, following keys are not inevitably infected!!!
SrchSTS.exe by S!Ri
Search SharedTaskScheduler's .dll
»»»»»»»»»»»»»»»»»»»»»»»» End
Ensuite l'autre...
Malwarebytes' Anti-Malware 1.24
Version de la base de données: 1040
Windows 6.0.6001 Service Pack 1
12:04:57 11/08/2008
mbam-log-8-11-2008 (12-04-52).txt
Type de recherche: Examen complet (C:\|D:\|E:\|F:\|)
Eléments examinés: 139474
Temps écoulé: 25 minute(s), 28 second(s)
Processus mémoire infecté(s): 0
Module(s) mémoire infecté(s): 1
Clé(s) du Registre infectée(s): 18
Valeur(s) du Registre infectée(s): 9
Elément(s) de données du Registre infecté(s): 4
Dossier(s) infecté(s): 12
Fichier(s) infecté(s): 41
Processus mémoire infecté(s):
(Aucun élément nuisible détecté)
Module(s) mémoire infecté(s):
C:\Windows\System32\jkkLBsrp.dll (Trojan.Vundo) -> No action taken.
Clé(s) du Registre infectée(s):
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{286f5011-d462-4803-8ed3-5938434f6415} (Trojan.Vundo) -> No action taken.
HKEY_CLASSES_ROOT\CLSID\{286f5011-d462-4803-8ed3-5938434f6415} (Trojan.Vundo) -> No action taken.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{55d17579-f6ff-4a63-981b-6683f99b9972} (Trojan.BHO) -> No action taken.
HKEY_CLASSES_ROOT\CLSID\{55d17579-f6ff-4a63-981b-6683f99b9972} (Trojan.BHO) -> No action taken.
HKEY_CLASSES_ROOT\CLSID\{1b55c95b-83f2-432e-aed5-94234df7de8e} (Trojan.FakeAlert) -> No action taken.
HKEY_CLASSES_ROOT\CLSID\{f1dd776c-db30-43f0-866a-f9bb95447970} (Trojan.FakeAlert) -> No action taken.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\rhc1f8j0e392 (Rogue.Multiple) -> No action taken.
HKEY_LOCAL_MACHINE\SOFTWARE\rhc1f8j0e392 (Rogue.Multiple) -> No action taken.
HKEY_CURRENT_USER\SOFTWARE\antivirus 2008 pro (Rogue.Antivirus2008) -> No action taken.
HKEY_CURRENT_USER\SOFTWARE\MediaHoldings (Adware.PlayMP3Z) -> No action taken.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\rdfa (Trojan.Vundo) -> No action taken.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Software Notifier (Rogue.Multiple) -> No action taken.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\MS Juan (Malware.Trace) -> No action taken.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\contim (Trojan.Vundo) -> No action taken.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\MS Track System (Trojan.Vundo) -> No action taken.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\FCOVM (Trojan.Vundo) -> No action taken.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\RemoveRP (Trojan.Vundo) -> No action taken.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\aoprndtws (Trojan.Vundo) -> No action taken.
Valeur(s) du Registre infectée(s):
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\82810e5c (Trojan.Vundo) -> No action taken.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\eqvwamkl (Trojan.FakeAlert) -> No action taken.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MSServer (Malware.Trace) -> No action taken.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\ShellExecuteHooks\{55d17579-f6ff-4a63-981b-6683f99b9972} (Trojan.Vundo) -> No action taken.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lphc5f8j0e392 (Trojan.FakeAlert) -> No action taken.
HKEY_CURRENT_USER\Control Panel\Desktop\wallpaper (Hijack.Wallpaper) -> No action taken.
HKEY_CURRENT_USER\Control Panel\Desktop\originalwallpaper (Hijack.Wallpaper) -> No action taken.
HKEY_CURRENT_USER\Control Panel\Desktop\convertedwallpaper (Hijack.Wallpaper) -> No action taken.
HKEY_CURRENT_USER\Control Panel\Desktop\scrnsave.exe (Hijack.Wallpaper) -> No action taken.
Elément(s) de données du Registre infecté(s):
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\LSA\Notification Packages (Trojan.Vundo) -> Data: c:\windows\system32\jkklbsrp -> No action taken.
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\LSA\Authentication Packages (Trojan.Vundo) -> Data: c:\windows\system32\jkklbsrp -> No action taken.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\NoDispBackgroundPage (Hijack.DisplayProperties) -> Bad: (1) Good: (0) -> No action taken.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\NoDispScrSavPage (Hijack.DisplayProperties) -> Bad: (1) Good: (0) -> No action taken.
Dossier(s) infecté(s):
C:\Program Files\rhc1f8j0e392 (Rogue.Multiple) -> No action taken.
C:\Users\Delphine\AppData\Roaming\rhc1f8j0e392 (Rogue.Multiple) -> No action taken.
C:\Users\Delphine\AppData\Roaming\rhc1f8j0e392\Quarantine (Rogue.Multiple) -> No action taken.
C:\Users\Delphine\AppData\Roaming\rhc1f8j0e392\Quarantine\Autorun (Rogue.Multiple) -> No action taken.
C:\Users\Delphine\AppData\Roaming\rhc1f8j0e392\Quarantine\Autorun\HKCU (Rogue.Multiple) -> No action taken.
C:\Users\Delphine\AppData\Roaming\rhc1f8j0e392\Quarantine\Autorun\HKCU\RunOnce (Rogue.Multiple) -> No action taken.
C:\Users\Delphine\AppData\Roaming\rhc1f8j0e392\Quarantine\Autorun\HKLM (Rogue.Multiple) -> No action taken.
C:\Users\Delphine\AppData\Roaming\rhc1f8j0e392\Quarantine\Autorun\HKLM\RunOnce (Rogue.Multiple) -> No action taken.
C:\Users\Delphine\AppData\Roaming\rhc1f8j0e392\Quarantine\Autorun\StartMenuAllUsers (Rogue.Multiple) -> No action taken.
C:\Users\Delphine\AppData\Roaming\rhc1f8j0e392\Quarantine\Autorun\StartMenuCurrentUser (Rogue.Multiple) -> No action taken.
C:\Users\Delphine\AppData\Roaming\rhc1f8j0e392\Quarantine\BrowserObjects (Rogue.Multiple) -> No action taken.
C:\Users\Delphine\AppData\Roaming\rhc1f8j0e392\Quarantine\Packages (Rogue.Multiple) -> No action taken.
Fichier(s) infecté(s):
C:\Windows\System32\jkkLBsrp.dll (Trojan.Vundo) -> No action taken.
C:\Windows\System32\prsBLkkj.ini (Trojan.Vundo) -> No action taken.
C:\Windows\System32\prsBLkkj.ini2 (Trojan.Vundo) -> No action taken.
C:\Windows\System32\kldqaxpf.dll (Trojan.Vundo) -> No action taken.
C:\Windows\System32\fpxaqdlk.ini (Trojan.Vundo) -> No action taken.
C:\Windows\System32\ngntghsp.dll (Trojan.Vundo) -> No action taken.
C:\Windows\System32\pshgtngn.ini (Trojan.Vundo) -> No action taken.
C:\Windows\System32\pmnmjHbc.dll (Trojan.BHO) -> No action taken.
C:\Windows\edot.exe (Trojan.FakeAlert) -> No action taken.
C:\Windows\eqvwamkl.dll (Trojan.FakeAlert) -> No action taken.
C:\Windows\System32\aWopNHYs.dll (Trojan.Vundo) -> No action taken.
C:\Windows\System32\awwviypk.dll (Trojan.Vundo) -> No action taken.
C:\Windows\System32\bvklor.dll (Trojan.Vundo) -> No action taken.
C:\Windows\System32\exyraq.dll (Trojan.Vundo) -> No action taken.
C:\Windows\System32\fqyoli.dll (Trojan.Vundo) -> No action taken.
C:\Windows\System32\halnhghg.dll (Trojan.Vundo) -> No action taken.
C:\Windows\System32\htndjdci.dll (Trojan.Vundo) -> No action taken.
C:\Windows\System32\hvyiksur.dll (Trojan.Vundo) -> No action taken.
C:\Windows\System32\hwqvhsut.dll (Trojan.Vundo) -> No action taken.
C:\Windows\System32\kmzbfi.dll (Trojan.Vundo) -> No action taken.
C:\Windows\System32\lhczoi.dll (Trojan.Vundo) -> No action taken.
C:\Windows\System32\quifvjnn.dll (Trojan.Vundo) -> No action taken.
C:\Windows\System32\snjgre.dll (Trojan.Vundo) -> No action taken.
C:\Windows\System32\ssqqrSKa.dll (Trojan.Vundo) -> No action taken.
C:\Windows\System32\uixjad.dll (Trojan.Vundo) -> No action taken.
C:\Windows\System32\xlbstmgn.dll (Trojan.Vundo) -> No action taken.
C:\Program Files\rhc1f8j0e392\database.dat (Rogue.Multiple) -> No action taken.
C:\Program Files\rhc1f8j0e392\license.txt (Rogue.Multiple) -> No action taken.
C:\Program Files\rhc1f8j0e392\MFC71.dll (Rogue.Multiple) -> No action taken.
C:\Program Files\rhc1f8j0e392\MFC71ENU.DLL (Rogue.Multiple) -> No action taken.
C:\Program Files\rhc1f8j0e392\msvcp71.dll (Rogue.Multiple) -> No action taken.
C:\Program Files\rhc1f8j0e392\msvcr71.dll (Rogue.Multiple) -> No action taken.
C:\Program Files\rhc1f8j0e392\rhc1f8j0e392.exe (Rogue.Multiple) -> No action taken.
C:\Program Files\rhc1f8j0e392\rhc1f8j0e392.exe.local (Rogue.Multiple) -> No action taken.
C:\Program Files\rhc1f8j0e392\Uninstall.exe (Rogue.Multiple) -> No action taken.
C:\Windows\System32\jkkJdDtU.dll (Trojan.Vundo) -> No action taken.
C:\Windows\System32\byxXqopP.dll (Trojan.Vundo) -> No action taken.
C:\Windows\grswptdl.exe (Trojan.FakeAlert) -> No action taken.
C:\Windows\System32\lphc5f8j0e392.exe (Trojan.FakeAlert) -> No action taken.
C:\Windows\System32\phc5f8j0e392.bmp (Trojan.FakeAlert) -> No action taken.
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Antivirus XP 2008.lnk (Rogue.AntivirusXP) -> No action taken.
Le rapport de MalwareByte's indique "No action taken."
==> Peux-tu poster le rapport après suppression stp ? Tu le retrouveras dans l'onglet "rapports/logs" de malwarebyte's
A part ça, non ce n'est pas fini... Je comprends que ça t'agace mais :
- si on ne va pas jusqu'au bout, le problème risque de revenir
- pour éviter tout ça, il aurait fallu ne pas être infecté du tout ;)
Maintenant, fais exactement ce qui suit stp :
Télécharge ComboFix (de sUBs) sur ton Bureau (et pas ailleurs !) :
Fais un clic droit sur ce lien et choisis "enregistrer la cible sous ... " : dans la fenêtre qui s'ouvre tape C-Fix, choisis le bureau comme destination et valide : http://download.bleepingcomputer.com/sUBs/ComboFix.exe
--------------------------------------------- [ ! ATTENTION ! ] ----------------------------------------------------------
!! déconnecte toi, ferme toutes tes applications en cours et DESACTIVE TOUTES TES DEFENCES (anti-virus, antispyware, pare-feu) le temps de la manipulation :
en effet , activés, ils pourraient gêner fortement la procédure de recherche et de nettoyage de l'outil ( voir planter le PC )...Tu les réactiveras donc après !!
---> Surtout, si tu rencontres des difficultés à ce niveau là, dis le moi avant de poursuivre ...
UAC pour Vista : désactive le contrôle des comptes utilisateurs : Menu démarrer --> panneau de configuration --> comptes utilisateurs
Tuto ici : https://www.bleepingcomputer.com/combofix/fr/comment-utiliser-combofix
---------------------------------------------------------------------------------------------------------------------------------
Ensuite :
Fais un clic droit sur C-Fix.exe ( = combofix.exe ) --> exécuter en tant qu’administrateur
Appuie sur la touche Y (Yes) pour démarrer le scan .
Attention : n'utilise pas ta souris ni ton clavier pendant que le programme tourne. Cela pourrait figer l'ordi.
---> si un message d'erreur windows apparait à un momment : clique sur la croix rouge en haut à droite de la fenêtre pour la fermer
Le rapport sera crée dans: C:\Combofix.txt , poste le ici stp
==> Peux-tu poster le rapport après suppression stp ? Tu le retrouveras dans l'onglet "rapports/logs" de malwarebyte's
A part ça, non ce n'est pas fini... Je comprends que ça t'agace mais :
- si on ne va pas jusqu'au bout, le problème risque de revenir
- pour éviter tout ça, il aurait fallu ne pas être infecté du tout ;)
Maintenant, fais exactement ce qui suit stp :
Télécharge ComboFix (de sUBs) sur ton Bureau (et pas ailleurs !) :
Fais un clic droit sur ce lien et choisis "enregistrer la cible sous ... " : dans la fenêtre qui s'ouvre tape C-Fix, choisis le bureau comme destination et valide : http://download.bleepingcomputer.com/sUBs/ComboFix.exe
--------------------------------------------- [ ! ATTENTION ! ] ----------------------------------------------------------
!! déconnecte toi, ferme toutes tes applications en cours et DESACTIVE TOUTES TES DEFENCES (anti-virus, antispyware, pare-feu) le temps de la manipulation :
en effet , activés, ils pourraient gêner fortement la procédure de recherche et de nettoyage de l'outil ( voir planter le PC )...Tu les réactiveras donc après !!
---> Surtout, si tu rencontres des difficultés à ce niveau là, dis le moi avant de poursuivre ...
UAC pour Vista : désactive le contrôle des comptes utilisateurs : Menu démarrer --> panneau de configuration --> comptes utilisateurs
Tuto ici : https://www.bleepingcomputer.com/combofix/fr/comment-utiliser-combofix
---------------------------------------------------------------------------------------------------------------------------------
Ensuite :
Fais un clic droit sur C-Fix.exe ( = combofix.exe ) --> exécuter en tant qu’administrateur
Appuie sur la touche Y (Yes) pour démarrer le scan .
Attention : n'utilise pas ta souris ni ton clavier pendant que le programme tourne. Cela pourrait figer l'ordi.
---> si un message d'erreur windows apparait à un momment : clique sur la croix rouge en haut à droite de la fenêtre pour la fermer
Le rapport sera crée dans: C:\Combofix.txt , poste le ici stp
Malwarebytes' Anti-Malware 1.24
Version de la base de données: 1040
Windows 6.0.6001 Service Pack 1
13:19:10 16/08/2008
mbam-log-8-16-2008 (13-19-10).txt
Type de recherche: Examen complet (C:\|D:\|)
Eléments examinés: 135990
Temps écoulé: 19 minute(s), 58 second(s)
Processus mémoire infecté(s): 0
Module(s) mémoire infecté(s): 1
Clé(s) du Registre infectée(s): 11
Valeur(s) du Registre infectée(s): 1
Elément(s) de données du Registre infecté(s): 2
Dossier(s) infecté(s): 0
Fichier(s) infecté(s): 13
Processus mémoire infecté(s):
(Aucun élément nuisible détecté)
Module(s) mémoire infecté(s):
C:\Windows\System32\jkkLBsrp.dll (Trojan.Vundo) -> Delete on reboot.
Clé(s) du Registre infectée(s):
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{1419d9c0-5186-4030-bd5b-82ae36146a2a} (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{1419d9c0-5186-4030-bd5b-82ae36146a2a} (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{eb40b6c6-9058-4caf-a2cd-1cd83443ff33} (Trojan.Vundo) -> Delete on reboot.
HKEY_CLASSES_ROOT\CLSID\{eb40b6c6-9058-4caf-a2cd-1cd83443ff33} (Trojan.Vundo) -> Delete on reboot.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\rdfa (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\MS Juan (Malware.Trace) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\contim (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\MS Track System (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\FCOVM (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\RemoveRP (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\aoprndtws (Trojan.Vundo) -> Quarantined and deleted successfully.
Valeur(s) du Registre infectée(s):
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\82810e5c (Trojan.Vundo) -> Quarantined and deleted successfully.
Elément(s) de données du Registre infecté(s):
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\LSA\Notification Packages (Trojan.Vundo) -> Data: c:\windows\system32\jkklbsrp -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\LSA\Authentication Packages (Trojan.Vundo) -> Data: c:\windows\system32\jkklbsrp -> Delete on reboot.
Dossier(s) infecté(s):
(Aucun élément nuisible détecté)
Fichier(s) infecté(s):
C:\Windows\System32\mkxatw.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\Windows\System32\jkkLBsrp.dll (Trojan.Vundo) -> Delete on reboot.
C:\Windows\System32\prsBLkkj.ini (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\Windows\System32\prsBLkkj.ini2 (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\Windows\System32\mdtgfupx.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\Windows\System32\xpufgtdm.ini (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\Windows\System32\qidymsuw.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\Windows\System32\wusmydiq.ini (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\Windows\System32\tljfstjn.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\Windows\System32\njtsfjlt.ini (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\Users\Delphine\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\5TOS6H1H\kb456456[1] (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\Users\Delphine\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\RIGTX11J\kb767887[3] (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\Windows\System32\wqdocvce.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
Voilà le rapport après suppréssion...
Le reste je ferais plus tard ça me bombe
Version de la base de données: 1040
Windows 6.0.6001 Service Pack 1
13:19:10 16/08/2008
mbam-log-8-16-2008 (13-19-10).txt
Type de recherche: Examen complet (C:\|D:\|)
Eléments examinés: 135990
Temps écoulé: 19 minute(s), 58 second(s)
Processus mémoire infecté(s): 0
Module(s) mémoire infecté(s): 1
Clé(s) du Registre infectée(s): 11
Valeur(s) du Registre infectée(s): 1
Elément(s) de données du Registre infecté(s): 2
Dossier(s) infecté(s): 0
Fichier(s) infecté(s): 13
Processus mémoire infecté(s):
(Aucun élément nuisible détecté)
Module(s) mémoire infecté(s):
C:\Windows\System32\jkkLBsrp.dll (Trojan.Vundo) -> Delete on reboot.
Clé(s) du Registre infectée(s):
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{1419d9c0-5186-4030-bd5b-82ae36146a2a} (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{1419d9c0-5186-4030-bd5b-82ae36146a2a} (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{eb40b6c6-9058-4caf-a2cd-1cd83443ff33} (Trojan.Vundo) -> Delete on reboot.
HKEY_CLASSES_ROOT\CLSID\{eb40b6c6-9058-4caf-a2cd-1cd83443ff33} (Trojan.Vundo) -> Delete on reboot.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\rdfa (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\MS Juan (Malware.Trace) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\contim (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\MS Track System (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\FCOVM (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\RemoveRP (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\aoprndtws (Trojan.Vundo) -> Quarantined and deleted successfully.
Valeur(s) du Registre infectée(s):
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\82810e5c (Trojan.Vundo) -> Quarantined and deleted successfully.
Elément(s) de données du Registre infecté(s):
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\LSA\Notification Packages (Trojan.Vundo) -> Data: c:\windows\system32\jkklbsrp -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\LSA\Authentication Packages (Trojan.Vundo) -> Data: c:\windows\system32\jkklbsrp -> Delete on reboot.
Dossier(s) infecté(s):
(Aucun élément nuisible détecté)
Fichier(s) infecté(s):
C:\Windows\System32\mkxatw.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\Windows\System32\jkkLBsrp.dll (Trojan.Vundo) -> Delete on reboot.
C:\Windows\System32\prsBLkkj.ini (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\Windows\System32\prsBLkkj.ini2 (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\Windows\System32\mdtgfupx.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\Windows\System32\xpufgtdm.ini (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\Windows\System32\qidymsuw.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\Windows\System32\wusmydiq.ini (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\Windows\System32\tljfstjn.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\Windows\System32\njtsfjlt.ini (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\Users\Delphine\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\5TOS6H1H\kb456456[1] (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\Users\Delphine\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\RIGTX11J\kb767887[3] (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\Windows\System32\wqdocvce.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
Voilà le rapport après suppréssion...
Le reste je ferais plus tard ça me bombe
Toujours moi... décidement mon pc gagne sur ma patience... vite vite pourvus que ça soit bientot fini!!!!!!!
En tout cas merci de ta patience!
ComboFix 08-08-16.01 - Delphine 2008-08-17 16:28:57.1 - NTFSx86
Microsoft® Windows Vista™ Édition Familiale Premium 6.0.6001.1.1252.1.1036.18.2045 [GMT 2:00]
Endroit: C:\Users\Delphine\Desktop\ComboFix.exe
* Resident AV is active
.
(((((((((((((((((((((((((((((((((((( Autres suppressions ))))))))))))))))))))))))))))))))))))))))))))))))
.
C:\Windows\system32\afdclaku.dll
C:\Windows\System32\bpendomq.ini
C:\Windows\System32\cpfjikbs.ini
C:\Windows\system32\dhjnaqsy.dll
C:\Windows\system32\gkgyeabf.ini
C:\Windows\system32\gxvsapcp.dll
C:\Windows\System32\hriostsi.ini
C:\Windows\system32\hsstigst.ini
C:\Windows\system32\ivcchz.dll
C:\Windows\system32\jkkLBsrp.dll
C:\Windows\system32\jpijbc.dll
C:\Windows\System32\jutolqvu.ini
C:\Windows\system32\lfcvsb.dll
C:\Windows\system32\mLeBRHxu.dll
C:\Windows\system32\odflhtpc.dll
C:\Windows\system32\oqkvvs.dll
C:\Windows\System32\prsBLkkj.ini
C:\Windows\System32\prsBLkkj.ini2
C:\Windows\system32\qetecbtb.dll
C:\Windows\system32\rvqokygh.ini
C:\Windows\system32\udjeah.dll
C:\Windows\System32\vdwyeauy.ini
C:\Windows\system32\xfpuaf.dll
C:\Windows\system32\xnbehgkg.dll
C:\Windows\system32\ylpxgmks.ini
C:\Users\Delphine\AppData\Roaming\Microsoft\SystemCertificates\My . . . . Echec de suppression
.
((((((((((((((((((((((((((((( Fichiers cr‚‚s 2008-07-17 to 2008-08-17 ))))))))))))))))))))))))))))))))))))
.
2008-08-11 11:31 . 2008-08-11 11:31 <REP> d-------- C:\Users\Delphine\AppData\Roaming\Malwarebytes
2008-08-11 11:31 . 2008-08-11 11:31 <REP> d-------- C:\Users\All Users\Malwarebytes
2008-08-11 11:31 . 2008-08-11 11:31 <REP> d-------- C:\ProgramData\Malwarebytes
2008-08-11 11:31 . 2008-08-11 11:31 <REP> d-------- C:\Program Files\Malwarebytes' Anti-Malware
2008-08-11 11:31 . 2008-07-30 20:15 38,472 --a------ C:\Windows\System32\drivers\mbamswissarmy.sys
2008-08-11 11:31 . 2008-07-30 20:15 17,144 --a------ C:\Windows\System32\drivers\mbam.sys
2008-08-11 11:22 . 2008-08-11 11:22 691 --a------ C:\Users\Delphine\AppData\Roaming\GetValue.vbs
2008-08-11 11:22 . 2008-08-11 11:22 35 --a------ C:\Users\Delphine\AppData\Roaming\SetValue.bat
2008-08-09 19:48 . 2008-08-09 19:49 <REP> d-------- C:\Program Files\SopCast
2008-08-09 17:19 . 2008-08-11 11:22 7,734 --a------ C:\Windows\System32\tmp.reg
2008-08-07 12:03 . 2008-08-07 12:03 <REP> d-------- C:\Program Files\Trend Micro
2008-08-06 21:01 . 2008-08-06 21:01 0 --a------ C:\Windows\System32\662E.tmp
2008-08-06 18:00 . 2008-08-06 18:00 0 --a------ C:\Windows\System32\2765.tmp
2008-08-05 21:20 . 2008-08-05 21:20 0 --a------ C:\Windows\System32\DD22.tmp
2008-08-05 11:08 . 2008-08-05 11:08 <REP> d-------- C:\Users\All Users\eMule
2008-08-05 11:08 . 2008-08-05 11:08 <REP> d-------- C:\ProgramData\eMule
2008-08-05 10:58 . 2008-08-05 10:59 <REP> d-------- C:\Program Files\eMule
2008-08-04 22:17 . 2008-08-04 22:17 0 --a------ C:\Windows\System32\80BF.tmp
2008-08-04 17:05 . 2008-08-04 17:06 <REP> d-------- C:\Program Files\mp3DirectCut
2008-08-04 10:54 . 2008-08-04 10:54 0 --a------ C:\Windows\System32\3255.tmp
2008-08-04 10:48 . 2008-08-04 10:48 0 --a------ C:\Windows\System32\7C21.tmp
2008-08-03 16:53 . 2008-08-03 16:53 0 --a------ C:\Windows\System32\E890.tmp
2008-08-03 11:09 . 2008-08-03 11:09 0 --a------ C:\Windows\System32\5917.tmp
2008-08-01 21:07 . 2008-08-01 21:08 <REP> d-------- C:\Program Files\DAEMON Tools Toolbar
2008-08-01 21:07 . 2008-08-01 21:08 <REP> d-------- C:\Program Files\DAEMON Tools Lite
2008-08-01 14:00 . 2008-08-01 14:00 717,296 --a------ C:\Windows\System32\drivers\sptd.sys
2008-08-01 13:59 . 2008-08-01 13:59 <REP> d-------- C:\Users\Delphine\AppData\Roaming\DAEMON Tools
2008-08-01 13:41 . 2008-08-01 13:41 <REP> d--hs---- C:\Windows\ftpcache
2008-08-01 12:10 . 2008-08-15 13:24 <REP> d-------- C:\Users\Delphine\AppData\Roaming\LimeWire
2008-07-29 14:05 . 2008-07-29 14:05 45 ---h----- C:\Windows\dvis4105.dat
2008-07-28 13:38 . 2008-07-28 13:40 <REP> d-------- C:\Users\Delphine\AppData\Roaming\Desperate Housewives
2008-07-28 13:31 . 2008-07-28 13:31 0 --a------ C:\Windows\75cAM2m7.lnk
2008-07-26 12:04 . 2008-07-26 12:04 <REP> d-------- C:\Program Files\LimeWire
2008-07-26 12:03 . 2008-07-29 14:56 <REP> d-------- C:\Program Files\PhotoFiltre Studio
2008-07-25 23:16 . 2008-07-25 23:16 98,304 --a------ C:\Windows\System32\CmdLineExt.dll
2008-07-25 23:13 . 2008-07-25 23:13 <REP> d-------- C:\Users\Delphine\AppData\Roaming\InstallShield
2008-07-25 23:13 . 2008-07-25 23:13 <REP> d-------- C:\Program Files\Buena Vista Games
2008-07-25 22:50 . 2008-07-25 23:16 1,104 --a------ C:\Windows\disney.ini
2008-07-25 22:50 . 2008-07-25 22:50 186 --a------ C:\Windows\disneysy.ini
2008-07-24 16:53 . 2008-07-24 16:53 <REP> d-------- C:\Users\Delphine\AppData\Roaming\vlc
2008-07-24 13:18 . 2008-07-24 13:18 <REP> d-------- C:\Program Files\VideoLAN
2008-07-24 13:12 . 2008-07-24 13:12 <REP> d-------- C:\Users\Delphine\AppData\Roaming\DivX
2008-07-24 13:11 . 2008-07-24 13:11 <REP> d-------- C:\Program Files\DivX
2008-07-24 13:11 . 2008-07-24 13:11 <REP> d-------- C:\Program Files\Common Files\PX Storage Engine
2008-07-23 14:12 . 2008-07-23 14:12 <REP> d-------- C:\Program Files\Electronic Arts
2008-07-23 14:12 . 2006-07-28 09:30 236,824 --a------ C:\Windows\System32\xactengine2_3.dll
2008-07-23 14:12 . 2006-07-28 09:30 62,744 --a------ C:\Windows\System32\xinput1_2.dll
2008-07-23 14:11 . 2005-05-26 15:34 2,297,552 --a------ C:\Windows\System32\d3dx9_26.dll
2008-07-23 13:23 . 2008-07-23 13:23 <REP> d-------- C:\Program Files\Lionhead Studios
2008-07-23 12:33 . 2008-07-23 12:33 <REP> d-------- C:\Users\Delphine\AppData\Roaming\DesktopSMS
2008-07-23 12:20 . 2008-07-23 12:20 0 --ah----- C:\Windows\System32\drivers\Msft_User_WpdFs_01_00_00.Wdf
2008-07-23 10:44 . 2008-06-26 03:45 12,240,896 --a------ C:\Windows\System32\NlsLexicons0007.dll
2008-07-23 10:44 . 2008-06-26 03:45 2,644,480 --a------ C:\Windows\System32\NlsLexicons0009.dll
2008-07-23 10:43 . 2008-06-26 05:29 801,280 --a------ C:\Windows\System32\NaturalLanguage6.dll
2008-07-23 10:42 . 2008-04-23 06:42 428,544 --a------ C:\Windows\System32\EncDec.dll
2008-07-23 10:42 . 2008-04-23 06:42 293,376 --a------ C:\Windows\System32\psisdecd.dll
2008-07-23 10:42 . 2008-04-23 06:41 218,624 --a------ C:\Windows\System32\psisrndr.ax
2008-07-23 10:42 . 2008-04-23 06:41 57,856 --a------ C:\Windows\System32\MSDvbNP.ax
2008-07-23 10:40 . 2008-07-23 10:40 <REP> d-------- C:\Windows\System32\Adobe
2008-07-23 10:40 . 2008-06-17 15:14 499,712 --a------ C:\Windows\System32\msvcp71.dll
2008-07-23 10:40 . 2008-06-17 15:17 348,160 --a------ C:\Windows\System32\msvcr71.dll
2008-07-23 10:35 . 2008-04-12 05:32 784,896 --a------ C:\Windows\System32\rpcrt4.dll
2008-07-23 10:33 . 2008-03-08 04:08 4,240,384 --a------ C:\Windows\System32\GameUXLegacyGDFs.dll
2008-07-22 19:46 . 2008-08-17 14:52 <REP> d-------- C:\Users\Delphine\AppData\Roaming\uTorrent
2008-07-22 19:46 . 2008-07-22 19:46 <REP> d-------- C:\Program Files\uTorrent
2008-07-22 19:44 . 2008-07-22 19:44 <REP> d-------- C:\Users\Delphine\AppData\Roaming\Netscape
2008-07-22 19:44 . 2008-07-22 19:44 0 --a------ C:\Windows\nsreg.dat
2008-07-22 19:23 . 2008-07-22 19:44 <REP> d-------- C:\Program Files\Netscape
2008-07-22 19:18 . 2008-07-22 19:18 <REP> d-------- C:\Users\All Users\WLInstaller
2008-07-22 19:18 . 2008-07-22 19:18 <REP> d-------- C:\ProgramData\WLInstaller
2008-07-22 19:18 . 2008-07-22 19:22 <REP> d-------- C:\Program Files\Windows Live
2008-07-22 19:18 . 2008-07-22 19:22 <REP> d--hsc--- C:\Program Files\Common Files\WindowsLiveInstaller
2008-07-22 19:07 . 2008-07-22 19:07 <REP> d-------- C:\Users\Delphine\AppData\Roaming\Toshiba
2008-07-22 18:35 . 2008-07-22 18:35 <REP> d-------- C:\Program Files\SAGEM
2008-07-22 18:34 . 2008-07-22 18:34 <REP> d-------- C:\Program Files\Securitoo
2008-07-22 18:24 . 2008-07-22 18:24 <REP> dr------- C:\Users\Delphine\Searches
2008-07-22 18:24 . 2008-07-22 18:24 <REP> d-------- C:\Users\Delphine\AppData\Roaming\ATI
2008-07-22 18:24 . 2008-07-22 18:24 <REP> d-------- C:\Users\All Users\ATI
2008-07-22 18:24 . 2008-07-22 18:24 <REP> d-------- C:\ProgramData\ATI
2008-07-22 18:24 . 2008-07-22 18:24 <REP> d--hs---- C:\$RECYCLE.BIN
2008-07-22 18:23 . 2008-07-29 13:56 <REP> dr------- C:\Users\Delphine\Contacts
2008-07-22 18:21 . 2008-07-22 18:21 <REP> d-------- C:\Users\All Users\ToshibaEurope
2008-07-22 18:21 . 2008-07-22 18:21 <REP> d-------- C:\ProgramData\ToshibaEurope
2008-07-22 18:20 . 2008-07-25 14:48 <REP> dr------- C:\Users\Delphine\Videos
2008-07-22 18:20 . 2008-07-22 18:46 <REP> dr------- C:\Users\Delphine\Saved Games
2008-07-22 18:20 . 2008-08-08 18:04 <REP> dr------- C:\Users\Delphine\Pictures
2008-07-22 18:20 . 2008-08-15 12:35 <REP> dr------- C:\Users\Delphine\Music
2008-07-22 18:20 . 2008-07-22 18:24 <REP> dr------- C:\Users\Delphine\Links
2008-07-22 18:20 . 2008-08-05 11:08 <REP> dr------- C:\Users\Delphine\Downloads
2008-07-22 18:20 . 2008-08-09 11:22 <REP> dr------- C:\Users\Delphine\Documents
2008-07-22 18:20 . 2006-11-02 14:37 <REP> d-------- C:\Users\Delphine\AppData\Roaming\Media Center Programs
2008-07-22 18:20 . 2008-07-22 18:20 <REP> d--h----- C:\Users\Delphine\AppData
2008-07-22 18:20 . 2008-07-22 19:23 <REP> d-------- C:\Users\Delphine
2008-07-22 18:20 . 2008-07-22 18:20 <REP> d-------- C:\Program Files\Common Files\Toshiba Shared
2008-07-22 18:20 . 2006-11-29 13:06 3,426,072 --a------ C:\Windows\System32\d3dx9_32.dll
2008-07-22 18:19 . 2008-01-21 15:42 285,184 --a------ C:\Windows\System32\drivers\tos_sps32.sys
2008-07-22 18:17 . 2008-07-22 18:17 <REP> d-------- C:\Windows\System32\en
2008-07-22 18:17 . 2008-07-22 18:17 <REP> d-------- C:\Program Files\Camera Assistant Software for Toshiba
2008-07-22 18:17 . 2007-12-17 11:45 18,432 --a------ C:\Windows\System32\drivers\UVCFTR_S.SYS
2008-07-22 18:16 . 2008-07-22 18:16 0 -rahs---- C:\Windows\System32\drivers\TOSHIBA_Satellite A300_06470-FR_PSAJ4E-03200.MRK
2008-07-22 18:13 . 2008-07-22 18:13 <REP> d-------- C:\Windows\System32\FRA
2008-07-22 18:13 . 2008-07-22 18:13 <REP> d-------- C:\Program Files\Synaptics
2008-07-22 18:13 . 2007-10-24 11:02 936,472 --a------ C:\Windows\System32\imsmudlg.exe
2008-07-22 18:13 . 2008-07-22 18:13 0 --ah----- C:\Windows\System32\drivers\Msft_Kernel_SynTP_01000.Wdf
2008-07-22 18:12 . 2008-07-22 18:12 <REP> d-------- C:\Program Files\ATI Technologies
2008-07-22 18:12 . 2008-07-22 18:12 <REP> d-------- C:\Program Files\ATI
2008-07-22 18:12 . 2008-07-22 18:12 0 --a------ C:\Windows\ativpsrm.bin
.
(((((((((((((((((((((((((((((((((( Compte-rendu de Find3M ))))))))))))))))))))))))))))))))))))))))))))))))
.
2008-08-15 08:15 --------- d-----w C:\Program Files\McAfee
2008-08-03 10:14 --------- d--h--w C:\Program Files\InstallShield Installation Information
2008-08-01 19:04 --------- d-----w C:\Program Files\Google
2008-07-23 18:50 --------- d-----w C:\Program Files\Windows Mail
2008-07-23 17:37 --------- d-----w C:\ProgramData\Microsoft Help
2008-07-22 16:21 --------- d-----w C:\Program Files\Toshiba
2008-07-22 16:20 --------- d-----w C:\ProgramData\Toshiba
2008-07-22 16:17 --------- d-sh--w C:\ProgramData\Modèles
2008-07-22 16:17 --------- d-sh--w C:\ProgramData\Menu Démarrer
2008-07-22 16:17 --------- d-sh--w C:\ProgramData\Favoris
2008-07-22 16:17 --------- d-sh--w C:\ProgramData\Bureau
2008-07-22 16:17 --------- d-sh--w C:\Program Files\Fichiers communs
2008-07-22 16:13 --------- d-----w C:\Program Files\Intel
2008-06-18 17:52 161,096 ----a-w C:\Windows\System32\DivXCodecVersionChecker.exe
2008-06-11 00:07 524,288 ----a-w C:\Windows\System32\DivXsm.exe
2008-06-11 00:07 3,596,288 ----a-w C:\Windows\System32\qt-dx331.dll
2008-06-11 00:04 200,704 ----a-w C:\Windows\System32\ssldivx.dll
2008-06-11 00:04 1,044,480 ----a-w C:\Windows\System32\libdivx.dll
2008-05-27 05:21 1,582,592 ----a-w C:\Windows\System32\tquery.dll
2008-05-27 05:21 1,418,240 ----a-w C:\Windows\System32\mssrch.dll
2008-05-27 05:17 87,552 ----a-w C:\Windows\System32\SearchFilterHost.exe
2008-05-27 05:17 87,552 ----a-w C:\Windows\System32\mssitlb.dll
2008-05-27 05:17 754,176 ----a-w C:\Windows\System32\propsys.dll
2008-05-27 05:17 60,416 ----a-w C:\Windows\System32\msscntrs.dll
2008-05-27 05:17 6,103,040 ----a-w C:\Windows\System32\chtbrkr.dll
2008-05-27 05:17 34,816 ----a-w C:\Windows\System32\msscb.dll
2008-05-27 05:17 32,768 ----a-w C:\Windows\System32\mssprxy.dll
2008-05-27 05:17 313,344 ----a-w C:\Windows\System32\thawbrkr.dll
2008-05-27 05:17 301,568 ----a-w C:\Windows\System32\srchadmin.dll
2008-05-27 05:17 194,560 ----a-w C:\Windows\System32\offfilt.dll
2008-05-27 05:17 143,872 ----a-w C:\Windows\System32\korwbrkr.dll
2008-05-27 05:17 11,776 ----a-w C:\Windows\System32\msshooks.dll
2008-05-27 05:17 1,671,680 ----a-w C:\Windows\System32\chsbrkr.dll
2008-05-27 04:59 18,904 ----a-w C:\Windows\System32\StructuredQuerySchemaTrivial.bin
2008-05-27 04:59 106,605 ----a-w C:\Windows\System32\StructuredQuerySchema.bin
2008-05-22 22:18 12,288 ----a-w C:\Windows\System32\DivXWMPExtType.dll
2008-01-21 02:43 174 --sha-w C:\Program Files\desktop.ini
.
------- Sigcheck -------
2008-01-21 04:23 21504 3794b461c45882e06856f282eef025af C:\Windows\System32\svchost.exe
2008-01-21 04:23 21504 3794b461c45882e06856f282eef025af C:\Windows\winsxs\x86_microsoft-windows-services-svchost_31bf3856ad364e35_6.0.6001.18000_none_b5bb59a1054dbde5\svchost.exe
2008-01-21 04:24 627200 b974d9f06dc7d1908e825dc201681269 C:\Windows\System32\user32.dll
2008-01-21 04:24 627200 b974d9f06dc7d1908e825dc201681269 C:\Windows\winsxs\x86_microsoft-windows-user32_31bf3856ad364e35_6.0.6001.18000_none_cd386c416d5c7f32\user32.dll
2008-01-21 04:24 179200 b304d47d5744ba20fcb99fb8b2c07b0b C:\Windows\System32\ws2_32.dll
2008-01-21 04:24 179200 b304d47d5744ba20fcb99fb8b2c07b0b C:\Windows\winsxs\x86_microsoft-windows-w..nfrastructure-ws232_31bf3856ad364e35_6.0.6001.18000_none_f2b7b0c2ce5605c4\ws2_32.dll
2008-04-25 06:35 826880 44fd3968ad885026d94450832a78de8a C:\Windows\System32\wininet.dll
2008-04-25 06:23 826368 9191790bf02a8d759ec2b4e4fa868407 C:\Windows\winsxs\x86_microsoft-windows-i..tocolimplementation_31bf3856ad364e35_6.0.6000.16681_none_ffad35c1a4ec79d4\wininet.dll
2008-04-25 06:09 827392 f40594128a6bfda6c3f0900796895078 C:\Windows\winsxs\x86_microsoft-windows-i..tocolimplementation_31bf3856ad364e35_6.0.6000.20823_none_0079b48ebdd7a1cd\wininet.dll
2008-01-21 04:24 825856 455d715a840579bdc1cf8e5c1da76849 C:\Windows\winsxs\x86_microsoft-windows-i..tocolimplementation_31bf3856ad364e35_6.0.6001.18000_none_01e8f37da1d311e6\wininet.dll
2008-04-25 06:35 826880 44fd3968ad885026d94450832a78de8a C:\Windows\winsxs\x86_microsoft-windows-i..tocolimplementation_31bf3856ad364e35_6.0.6001.18063_none_01ab14d3a2010591\wininet.dll
2008-04-25 06:22 826880 a86218059c228e7691a13e4cb63c4cdf C:\Windows\winsxs\x86_microsoft-windows-i..tocolimplementation_31bf3856ad364e35_6.0.6001.22167_none_0238b2c6bb1b0ab7\wininet.dll
2008-04-26 10:26 891448 82e266bee5f0167e41c6ecfdd2a79c02 C:\Windows\System32\drivers\tcpip.sys
2008-01-21 04:25 891448 fc6e2835d667774d409c7c7021eaf9c4 C:\Windows\winsxs\x86_microsoft-windows-tcpip-binaries_31bf3856ad364e35_6.0.6001.18000_none_b31e1252666640f6\tcpip.sys
2008-04-26 10:26 891448 82e266bee5f0167e41c6ecfdd2a79c02 C:\Windows\winsxs\x86_microsoft-windows-tcpip-binaries_31bf3856ad364e35_6.0.6001.18063_none_b2e033a8669434a1\tcpip.sys
2008-04-26 10:08 891448 01ec1e92595f839bee70d439c46796e3 C:\Windows\winsxs\x86_microsoft-windows-tcpip-binaries_31bf3856ad364e35_6.0.6001.22167_none_b36dd19b7fae39c7\tcpip.sys
2008-01-21 04:24 314880 c2610b6bdbefc053bbdab4f1b965cb24 C:\Windows\System32\winlogon.exe
2008-01-21 04:24 314880 c2610b6bdbefc053bbdab4f1b965cb24 C:\Windows\winsxs\x86_microsoft-windows-winlogon_31bf3856ad364e35_6.0.6001.18000_none_6fc30116d4f17bf5\winlogon.exe
2008-01-21 04:23 529464 9bdc71790fa08f0a0b5f10462b1bd0b1 C:\Windows\System32\drivers\ndis.sys
2008-01-21 04:23 529464 9bdc71790fa08f0a0b5f10462b1bd0b1 C:\Windows\winsxs\x86_microsoft-windows-ndis_31bf3856ad364e35_6.0.6001.18000_none_a7c72bc71c0f0d18\ndis.sys
2008-04-26 10:25 3600952 6bb1994f5b62fef6268f1ebb4014e293 C:\Windows\System32\ntkrnlpa.exe
2008-01-21 04:24 3600440 fe51e8dbbef2d01ef886499fecbf2d78 C:\Windows\winsxs\x86_microsoft-windows-os-kernel_31bf3856ad364e35_6.0.6001.18000_none_6c3061a0b4231268\ntkrnlpa.exe
2008-04-26 10:25 3600952 6bb1994f5b62fef6268f1ebb4014e293 C:\Windows\winsxs\x86_microsoft-windows-os-kernel_31bf3856ad364e35_6.0.6001.18063_none_6bf282f6b4510613\ntkrnlpa.exe
2008-04-26 10:11 3601464 68eef02a8846442fe98ad0e0517ee6bc C:\Windows\winsxs\x86_microsoft-windows-os-kernel_31bf3856ad364e35_6.0.6001.22167_none_6c8020e9cd6b0b39\ntkrnlpa.exe
2008-04-26 10:25 3549240 c9cd31b3cba8134f2b47fb5e78376acc C:\Windows\System32\ntoskrnl.exe
2008-01-21 04:24 3548728 6700f35eba206e5c89ac27c9a124dc01 C:\Windows\winsxs\x86_microsoft-windows-os-kernel_31bf3856ad364e35_6.0.6001.18000_none_6c3061a0b4231268\ntoskrnl.exe
2008-04-26 10:25 3549240 c9cd31b3cba8134f2b47fb5e78376acc C:\Windows\winsxs\x86_microsoft-windows-os-kernel_31bf3856ad364e35_6.0.6001.18063_none_6bf282f6b4510613\ntoskrnl.exe
2008-04-26 10:11 3549240 22d444d3d88a4c299894b3638a114bf7 C:\Windows\winsxs\x86_microsoft-windows-os-kernel_31bf3856ad364e35_6.0.6001.22167_none_6c8020e9cd6b0b39\ntoskrnl.exe
2008-01-21 04:24 2927104 ffa764631cb70a30065c12ef8e174f9f C:\Windows\explorer.exe
2008-01-21 04:24 2927104 ffa764631cb70a30065c12ef8e174f9f C:\Windows\winsxs\x86_microsoft-windows-explorer_31bf3856ad364e35_6.0.6001.18000_none_51b4a71279bc6ebf\explorer.exe
2008-01-21 04:24 279040 2b336ab6286d6c81fa02cbab914e3c6c C:\Windows\System32\services.exe
2008-01-21 04:24 279040 2b336ab6286d6c81fa02cbab914e3c6c C:\Windows\winsxs\x86_microsoft-windows-s..s-servicecontroller_31bf3856ad364e35_6.0.6001.18000_none_cf5fc067cd49010a\services.exe
2008-01-21 04:24 9728 dcf733788c7d088d814e5f80eb4b3e0f C:\Windows\System32\lsass.exe
2008-01-21 04:24 9728 dcf733788c7d088d814e5f80eb4b3e0f C:\Windows\winsxs\x86_microsoft-windows-lsa_31bf3856ad364e35_6.0.6001.18000_none_a64a8ac25ccb3836\lsass.exe
2006-11-02 11:45 8704 22bfd03df51065a9ed8d17f8fb72296b C:\Windows\System32\ctfmon.exe
2006-11-02 11:45 8704 22bfd03df51065a9ed8d17f8fb72296b C:\Windows\winsxs\x86_microsoft-windows-t..cesframework-ctfmon_31bf3856ad364e35_6.0.6000.16386_none_9af9cad793a67953\ctfmon.exe
2008-01-21 04:24 125952 846cdf9a3cf4da9b306adfb7d55ee4c2 C:\Windows\System32\spoolsv.exe
2008-01-21 04:24 125952 846cdf9a3cf4da9b306adfb7d55ee4c2 C:\Windows\winsxs\x86_microsoft-windows-printing-spooler-core_31bf3856ad364e35_6.0.6001.18000_none_d64ba321c188c516\spoolsv.exe
2008-01-21 04:25 43008 8e93cdf0ea8edba63f07e2898a9b2147 C:\Windows\System32\wuauclt.exe
2006-11-02 11:46 41472 ff81090b6ef1a42a19df226632711d25 C:\Windows\winsxs\x86_microsoft-windows-w..wsupdateclient-core_31bf3856ad364e35_6.0.6000.16386_none_acab9aecacae685d\wuauclt.exe
2008-01-21 04:25 43008 8e93cdf0ea8edba63f07e2898a9b2147 C:\Windows\winsxs\x86_microsoft-windows-w..wsupdateclient-core_31bf3856ad364e35_7.0.6001.18000_none_a052d92e34802200\wuauclt.exe
2008-01-21 04:24 25088 0e135526e9785d085bcd9aede6fbcbf9 C:\Windows\System32\userinit.exe
2008-01-21 04:24 25088 0e135526e9785d085bcd9aede6fbcbf9 C:\Windows\winsxs\x86_microsoft-windows-userinit_31bf3856ad364e35_6.0.6001.18000_none_dc28ba15d1aff80b\userinit.exe
.
((((((((((((((((((((((((((((((((( Point de chargement Reg )))))))))))))))))))))))))))))))))))))))))))))))))
.
.
REGEDIT4
*Note* les ‚l‚ments vides & les ‚l‚ments initiaux l‚gitimes ne sont pas list‚s
[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"Sidebar"="C:\Program Files\Windows Sidebar\sidebar.exe" [2008-01-21 04:23 1233920]
"TOSCDSPD"="C:\Program Files\TOSHIBA\TOSCDSPD\TOSCDSPD.exe" [2007-12-29 10:06 430080]
"MsnMsgr"="C:\Program Files\Windows Live\Messenger\MsnMsgr.Exe" [2007-10-18 11:34 5724184]
"DAEMON Tools Lite"="C:\Program Files\DAEMON Tools Lite\daemon.exe" [2008-07-17 14:20 490952]
"WMPNSCFG"="C:\Program Files\Windows Media Player\WMPNSCFG.exe" [2008-01-21 04:25 202240]
"ehTray.exe"="C:\Windows\ehome\ehTray.exe" [2008-01-21 04:25 125952]
"WindowsWelcomeCenter"="oobefldr.dll" [2008-01-21 04:23 2153472 C:\Windows\System32\oobefldr.dll]
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"SunJavaUpdateSched"="C:\Program Files\Java\jre1.6.0_03\bin\jusched.exe" [2007-09-25 02:11 132496]
"Adobe Reader Speed Launcher"="C:\Program Files\Adobe\Reader 8.0\Reader\Reader_sl.exe" [2007-05-11 04:06 40048]
"mcagent_exe"="C:\Program Files\McAfee.com\Agent\mcagent.exe" [2007-08-03 23:33 582992]
"Desktop SMS"="C:\Program Files\IDM\Desktop SMS\DesktopSMS.exe" [2007-06-18 11:51 1507328]
"topi"="C:\Program Files\TOSHIBA\Toshiba Online Product Information\topi.exe" [2007-07-10 10:24 581632]
"StartCCC"="C:\Program Files\ATI Technologies\ATI.ACE\Core-Static\CLIStart.exe" [2006-11-10 12:35 90112]
"SynTPEnh"="C:\Program Files\Synaptics\SynTP\SynTPEnh.exe" [2007-11-29 18:58 1029416]
"Camera Assistant Software"="C:\Program Files\Camera Assistant Software for Toshiba\traybar.exe" [2007-10-25 17:41 413696]
"Toshiba Registration"="C:\Program Files\Toshiba\Registration\ToshibaRegistration.exe" [2007-05-04 12:05 571024]
"NDSTray.exe"="NDSTray.exe" [BU]
C:\Users\Delphine\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\
TRDCReminder.lnk - C:\Program Files\Toshiba\TRDCReminder\TRDCReminder.exe [2007-07-27 11:30:22 389120]
[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\system]
"EnableLUA"= 0 (0x0)
"EnableUIADesktopToggle"= 0 (0x0)
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\windows]
"AppInit_DLLs"=mkxatw.dll
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\drivers32]
"msacm.dvacm"= C:\PROGRA~1\COMMON~1\ULEADS~1\vio\dvacm.acm
[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\McAfeeAntiSpyware]
"DisableMonitoring"=dword:00000001
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\DomainProfile]
"EnableFirewall"= 0 (0x0)
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\FirewallRules]
"{749D0E7F-1FB9-47C2-9CBF-6FC155B13BE7}"= Profile=Private|Profile=Public|C:\Program Files\Common Files\Mcafee\MNA\McNaSvc.exe:McAfee Network Agent
"{FC05447A-D300-407B-AE26-40533E552F10}"= UDP:C:\Program Files\Microsoft Office\Office12\ONENOTE.EXE:Microsoft Office OneNote
"{6062A136-093B-4946-BB91-BC0D98695D22}"= TCP:C:\Program Files\Microsoft Office\Office12\ONENOTE.EXE:Microsoft Office OneNote
"{CC439BD8-1186-427B-8AE8-160B391E2D6D}"= C:\Program Files\Windows Live\Messenger\livecall.exe:Windows Live Messenger (Phone)
"{1E843D94-1290-4BD7-9565-DB36EB526F7B}"= UDP:C:\Program Files\uTorrent\uTorrent.exe:µTorrent
"{7D414578-E66A-4404-8EF6-72D85BEEFD67}"= TCP:C:\Program Files\uTorrent\uTorrent.exe:µTorrent
"{40CD22C5-D7C4-4139-93D5-360A6702AD68}"= UDP:C:\Program Files\uTorrent\uTorrent.exe:µTorrent (TCP-In)
"{4337E283-38A1-430F-B24A-45E94FD45560}"= TCP:C:\Program Files\uTorrent\uTorrent.exe:µTorrent (UDP-In)
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\PublicProfile]
"EnableFirewall"= 0 (0x0)
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\StandardProfile]
"EnableFirewall"= 0 (0x0)
R3 atikmdag;atikmdag;C:\Windows\system32\DRIVERS\atikmdag.sys [2008-01-30 17:24]
R3 CnxtHdAudAddService;Microsoft UAA Function Driver for High Definition Audio Service;C:\Windows\system32\drivers\CHDART.sys [2008-02-01 12:46]
R3 O2MDRDR;O2MDRDR;C:\Windows\system32\DRIVERS\o2media.sys [2008-01-15 11:34]
R3 QIOMem;Generic IO & Memory Access;C:\Windows\system32\DRIVERS\QIOMem.sys [2007-04-09 17:13]
R3 yukonwlh;NDIS6.0 Miniport Driver for Marvell Yukon Ethernet Controller;C:\Windows\system32\DRIVERS\yk60x86.sys [2007-12-06 11:51]
S3 MBAMSwissArmy;MBAMSwissArmy;C:\Windows\system32\drivers\mbamswissarmy.sys [2008-07-30 20:15]
S4 ErrDev;Microsoft Hardware Error Device Driver;C:\Windows\system32\drivers\errdev.sys [2008-01-21 04:23]
S4 MegaSR;MegaSR;C:\Windows\system32\drivers\megasr.sys [2008-01-21 04:23]
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\svchost]
WindowsMobile REG_MULTI_SZ wcescomm rapimgr
LocalServiceRestricted REG_MULTI_SZ WcesComm RapiMgr
[HKEY_CURRENT_USER\software\microsoft\windows\currentversion\explorer\mountpoints2\{c772f8dd-607a-11dd-8097-001e683997c8}]
\shell\AutoRun\command - D:\Autorun.exe
.
Contenu du dossier 'Scheduled Tasks/Tƒches planifi‚es'
2008-02-26 C:\Windows\Tasks\McDefragTask.job
- c:\PROGRA~1\mcafee\mqc\QcConsol.exe [2007-12-04 13:32]
2008-07-31 C:\Windows\Tasks\McQcTask.job
- c:\PROGRA~1\mcafee\mqc\QcConsol.exe [2007-12-04 13:32]
.
- - - - ORPHANS REMOVED - - - -
SSODL-wqLxMX-{82810EF4-282B-A45E-66F4-2C288AD68A4C} - C:\Windows\system32\pd.dll
.
------- Supplementary Scan -------
.
FireFox -: Profile - C:\Users\Delphine\AppData\Roaming\Mozilla\Firefox\Profiles\j88nbiiz.default\
FireFox -: prefs.js - STARTUP.HOMEPAGE - hxxp://www.google.fr/
**************************************************************************
catchme 0.3.1361 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2008-08-17 16:39:13
Windows 6.0.6001 Service Pack 1 NTFS
Balayage processus cach‚s ...
Balayage cach‚ autostart entries ...
Balayage des fichiers cach‚s ...
C:\Users\Delphine\AppData\Roaming\Microsoft\IdentityCRL\Production\ppcrlconfig.dll 20040 bytes executable
Scan termin‚ avec succŠs
Les fichiers cach‚s: 1
**************************************************************************
.
--------------------- DLLs a charg‚ sous des processus courants ---------------------
PROCESS: C:\Windows\Explorer.exe
-> C:\Program Files\IDM\Desktop SMS\oehook.dll
.
------------------------ Other Running Processes ------------------------
.
C:\Windows\Microsoft.NET\Framework\v3.0\WPF\PresentationFontCache.exe
C:\Windows\System32\Ati2evxx.exe
C:\Windows\System32\audiodg.exe
C:\Windows\System32\Ati2evxx.exe
C:\Program Files\Toshiba\ConfigFree\CFSvcs.exe
C:\PROGRA~1\COMMON~1\McAfee\McProxy\McProxy.exe
C:\PROGRA~1\McAfee\VIRUSS~1\Mcshield.exe
C:\Program Files\McAfee\MPF\MpfSrv.exe
C:\Program Files\McAfee\MSK\msksrver.exe
C:\Program Files\O2Micro Flash Memory Card Driver\o2flash.exe
C:\Program Files\Toshiba\TOSHIBA DVD PLAYER\TNaviSrv.exe
C:\Windows\System32\TODDSrv.exe
C:\Program Files\Toshiba\Power Saver\TosCoSrv.exe
C:\Program Files\Toshiba\SMARTLogService\TosIPCSrv.exe
C:\Program Files\Common Files\Ulead Systems\DVD\ULCDRSvr.exe
C:\Windows\System32\drivers\XAudio.exe
C:\PROGRA~1\McAfee\MSC\mcmscsvc.exe
C:\PROGRA~1\McAfee.com\Agent\mcagent.exe
C:\Windows\System32\conime.exe
C:\Program Files\Toshiba\ConfigFree\NDSTray.exe
C:\Program Files\Toshiba\Power Saver\TPwrMain.exe
C:\Program Files\Toshiba\SmoothView\SmoothView.exe
C:\Program Files\Toshiba\FlashCards\TCrdMain.exe
C:\Windows\WindowsMobile\wmdSync.exe
C:\Program Files\ATI Technologies\ATI.ACE\Core-Static\MOM.exe
C:\Program Files\Camera Assistant Software for Toshiba\CEC_MAIN.exe
C:\Windows\ehome\ehmsas.exe
C:\Program Files\Windows Media Player\wmpnetwk.exe
C:\Program Files\Synaptics\SynTP\SynTPHelper.exe
C:\Program Files\Windows Mail\WinMail.exe
C:\Program Files\ATI Technologies\ATI.ACE\Core-Static\CCC.exe
C:\Program Files\Toshiba\ConfigFree\CFSwMgr.exe
C:\PROGRA~1\McAfee\VIRUSS~1\mcsysmon.exe
C:\PROGRA~1\COMMON~1\McAfee\MNA\McNASvc.exe
C:\Windows\System32\wbem\WMIADAP.exe
C:\Program Files\McAfee\MSC\mcupdmgr.exe
.
**************************************************************************
.
Temps d'accomplissement: 2008-08-17 16:44:29 - machine was rebooted
ComboFix-quarantined-files.txt 2008-08-17 14:44:11
Pre-Run: 64,880,685,056 octets libres
Post-Run: 64,310,317,056 octets libres
367 --- E O F --- 2008-08-02 10:14:19
En attente d'autres instructions chef!
En tout cas merci de ta patience!
ComboFix 08-08-16.01 - Delphine 2008-08-17 16:28:57.1 - NTFSx86
Microsoft® Windows Vista™ Édition Familiale Premium 6.0.6001.1.1252.1.1036.18.2045 [GMT 2:00]
Endroit: C:\Users\Delphine\Desktop\ComboFix.exe
* Resident AV is active
.
(((((((((((((((((((((((((((((((((((( Autres suppressions ))))))))))))))))))))))))))))))))))))))))))))))))
.
C:\Windows\system32\afdclaku.dll
C:\Windows\System32\bpendomq.ini
C:\Windows\System32\cpfjikbs.ini
C:\Windows\system32\dhjnaqsy.dll
C:\Windows\system32\gkgyeabf.ini
C:\Windows\system32\gxvsapcp.dll
C:\Windows\System32\hriostsi.ini
C:\Windows\system32\hsstigst.ini
C:\Windows\system32\ivcchz.dll
C:\Windows\system32\jkkLBsrp.dll
C:\Windows\system32\jpijbc.dll
C:\Windows\System32\jutolqvu.ini
C:\Windows\system32\lfcvsb.dll
C:\Windows\system32\mLeBRHxu.dll
C:\Windows\system32\odflhtpc.dll
C:\Windows\system32\oqkvvs.dll
C:\Windows\System32\prsBLkkj.ini
C:\Windows\System32\prsBLkkj.ini2
C:\Windows\system32\qetecbtb.dll
C:\Windows\system32\rvqokygh.ini
C:\Windows\system32\udjeah.dll
C:\Windows\System32\vdwyeauy.ini
C:\Windows\system32\xfpuaf.dll
C:\Windows\system32\xnbehgkg.dll
C:\Windows\system32\ylpxgmks.ini
C:\Users\Delphine\AppData\Roaming\Microsoft\SystemCertificates\My . . . . Echec de suppression
.
((((((((((((((((((((((((((((( Fichiers cr‚‚s 2008-07-17 to 2008-08-17 ))))))))))))))))))))))))))))))))))))
.
2008-08-11 11:31 . 2008-08-11 11:31 <REP> d-------- C:\Users\Delphine\AppData\Roaming\Malwarebytes
2008-08-11 11:31 . 2008-08-11 11:31 <REP> d-------- C:\Users\All Users\Malwarebytes
2008-08-11 11:31 . 2008-08-11 11:31 <REP> d-------- C:\ProgramData\Malwarebytes
2008-08-11 11:31 . 2008-08-11 11:31 <REP> d-------- C:\Program Files\Malwarebytes' Anti-Malware
2008-08-11 11:31 . 2008-07-30 20:15 38,472 --a------ C:\Windows\System32\drivers\mbamswissarmy.sys
2008-08-11 11:31 . 2008-07-30 20:15 17,144 --a------ C:\Windows\System32\drivers\mbam.sys
2008-08-11 11:22 . 2008-08-11 11:22 691 --a------ C:\Users\Delphine\AppData\Roaming\GetValue.vbs
2008-08-11 11:22 . 2008-08-11 11:22 35 --a------ C:\Users\Delphine\AppData\Roaming\SetValue.bat
2008-08-09 19:48 . 2008-08-09 19:49 <REP> d-------- C:\Program Files\SopCast
2008-08-09 17:19 . 2008-08-11 11:22 7,734 --a------ C:\Windows\System32\tmp.reg
2008-08-07 12:03 . 2008-08-07 12:03 <REP> d-------- C:\Program Files\Trend Micro
2008-08-06 21:01 . 2008-08-06 21:01 0 --a------ C:\Windows\System32\662E.tmp
2008-08-06 18:00 . 2008-08-06 18:00 0 --a------ C:\Windows\System32\2765.tmp
2008-08-05 21:20 . 2008-08-05 21:20 0 --a------ C:\Windows\System32\DD22.tmp
2008-08-05 11:08 . 2008-08-05 11:08 <REP> d-------- C:\Users\All Users\eMule
2008-08-05 11:08 . 2008-08-05 11:08 <REP> d-------- C:\ProgramData\eMule
2008-08-05 10:58 . 2008-08-05 10:59 <REP> d-------- C:\Program Files\eMule
2008-08-04 22:17 . 2008-08-04 22:17 0 --a------ C:\Windows\System32\80BF.tmp
2008-08-04 17:05 . 2008-08-04 17:06 <REP> d-------- C:\Program Files\mp3DirectCut
2008-08-04 10:54 . 2008-08-04 10:54 0 --a------ C:\Windows\System32\3255.tmp
2008-08-04 10:48 . 2008-08-04 10:48 0 --a------ C:\Windows\System32\7C21.tmp
2008-08-03 16:53 . 2008-08-03 16:53 0 --a------ C:\Windows\System32\E890.tmp
2008-08-03 11:09 . 2008-08-03 11:09 0 --a------ C:\Windows\System32\5917.tmp
2008-08-01 21:07 . 2008-08-01 21:08 <REP> d-------- C:\Program Files\DAEMON Tools Toolbar
2008-08-01 21:07 . 2008-08-01 21:08 <REP> d-------- C:\Program Files\DAEMON Tools Lite
2008-08-01 14:00 . 2008-08-01 14:00 717,296 --a------ C:\Windows\System32\drivers\sptd.sys
2008-08-01 13:59 . 2008-08-01 13:59 <REP> d-------- C:\Users\Delphine\AppData\Roaming\DAEMON Tools
2008-08-01 13:41 . 2008-08-01 13:41 <REP> d--hs---- C:\Windows\ftpcache
2008-08-01 12:10 . 2008-08-15 13:24 <REP> d-------- C:\Users\Delphine\AppData\Roaming\LimeWire
2008-07-29 14:05 . 2008-07-29 14:05 45 ---h----- C:\Windows\dvis4105.dat
2008-07-28 13:38 . 2008-07-28 13:40 <REP> d-------- C:\Users\Delphine\AppData\Roaming\Desperate Housewives
2008-07-28 13:31 . 2008-07-28 13:31 0 --a------ C:\Windows\75cAM2m7.lnk
2008-07-26 12:04 . 2008-07-26 12:04 <REP> d-------- C:\Program Files\LimeWire
2008-07-26 12:03 . 2008-07-29 14:56 <REP> d-------- C:\Program Files\PhotoFiltre Studio
2008-07-25 23:16 . 2008-07-25 23:16 98,304 --a------ C:\Windows\System32\CmdLineExt.dll
2008-07-25 23:13 . 2008-07-25 23:13 <REP> d-------- C:\Users\Delphine\AppData\Roaming\InstallShield
2008-07-25 23:13 . 2008-07-25 23:13 <REP> d-------- C:\Program Files\Buena Vista Games
2008-07-25 22:50 . 2008-07-25 23:16 1,104 --a------ C:\Windows\disney.ini
2008-07-25 22:50 . 2008-07-25 22:50 186 --a------ C:\Windows\disneysy.ini
2008-07-24 16:53 . 2008-07-24 16:53 <REP> d-------- C:\Users\Delphine\AppData\Roaming\vlc
2008-07-24 13:18 . 2008-07-24 13:18 <REP> d-------- C:\Program Files\VideoLAN
2008-07-24 13:12 . 2008-07-24 13:12 <REP> d-------- C:\Users\Delphine\AppData\Roaming\DivX
2008-07-24 13:11 . 2008-07-24 13:11 <REP> d-------- C:\Program Files\DivX
2008-07-24 13:11 . 2008-07-24 13:11 <REP> d-------- C:\Program Files\Common Files\PX Storage Engine
2008-07-23 14:12 . 2008-07-23 14:12 <REP> d-------- C:\Program Files\Electronic Arts
2008-07-23 14:12 . 2006-07-28 09:30 236,824 --a------ C:\Windows\System32\xactengine2_3.dll
2008-07-23 14:12 . 2006-07-28 09:30 62,744 --a------ C:\Windows\System32\xinput1_2.dll
2008-07-23 14:11 . 2005-05-26 15:34 2,297,552 --a------ C:\Windows\System32\d3dx9_26.dll
2008-07-23 13:23 . 2008-07-23 13:23 <REP> d-------- C:\Program Files\Lionhead Studios
2008-07-23 12:33 . 2008-07-23 12:33 <REP> d-------- C:\Users\Delphine\AppData\Roaming\DesktopSMS
2008-07-23 12:20 . 2008-07-23 12:20 0 --ah----- C:\Windows\System32\drivers\Msft_User_WpdFs_01_00_00.Wdf
2008-07-23 10:44 . 2008-06-26 03:45 12,240,896 --a------ C:\Windows\System32\NlsLexicons0007.dll
2008-07-23 10:44 . 2008-06-26 03:45 2,644,480 --a------ C:\Windows\System32\NlsLexicons0009.dll
2008-07-23 10:43 . 2008-06-26 05:29 801,280 --a------ C:\Windows\System32\NaturalLanguage6.dll
2008-07-23 10:42 . 2008-04-23 06:42 428,544 --a------ C:\Windows\System32\EncDec.dll
2008-07-23 10:42 . 2008-04-23 06:42 293,376 --a------ C:\Windows\System32\psisdecd.dll
2008-07-23 10:42 . 2008-04-23 06:41 218,624 --a------ C:\Windows\System32\psisrndr.ax
2008-07-23 10:42 . 2008-04-23 06:41 57,856 --a------ C:\Windows\System32\MSDvbNP.ax
2008-07-23 10:40 . 2008-07-23 10:40 <REP> d-------- C:\Windows\System32\Adobe
2008-07-23 10:40 . 2008-06-17 15:14 499,712 --a------ C:\Windows\System32\msvcp71.dll
2008-07-23 10:40 . 2008-06-17 15:17 348,160 --a------ C:\Windows\System32\msvcr71.dll
2008-07-23 10:35 . 2008-04-12 05:32 784,896 --a------ C:\Windows\System32\rpcrt4.dll
2008-07-23 10:33 . 2008-03-08 04:08 4,240,384 --a------ C:\Windows\System32\GameUXLegacyGDFs.dll
2008-07-22 19:46 . 2008-08-17 14:52 <REP> d-------- C:\Users\Delphine\AppData\Roaming\uTorrent
2008-07-22 19:46 . 2008-07-22 19:46 <REP> d-------- C:\Program Files\uTorrent
2008-07-22 19:44 . 2008-07-22 19:44 <REP> d-------- C:\Users\Delphine\AppData\Roaming\Netscape
2008-07-22 19:44 . 2008-07-22 19:44 0 --a------ C:\Windows\nsreg.dat
2008-07-22 19:23 . 2008-07-22 19:44 <REP> d-------- C:\Program Files\Netscape
2008-07-22 19:18 . 2008-07-22 19:18 <REP> d-------- C:\Users\All Users\WLInstaller
2008-07-22 19:18 . 2008-07-22 19:18 <REP> d-------- C:\ProgramData\WLInstaller
2008-07-22 19:18 . 2008-07-22 19:22 <REP> d-------- C:\Program Files\Windows Live
2008-07-22 19:18 . 2008-07-22 19:22 <REP> d--hsc--- C:\Program Files\Common Files\WindowsLiveInstaller
2008-07-22 19:07 . 2008-07-22 19:07 <REP> d-------- C:\Users\Delphine\AppData\Roaming\Toshiba
2008-07-22 18:35 . 2008-07-22 18:35 <REP> d-------- C:\Program Files\SAGEM
2008-07-22 18:34 . 2008-07-22 18:34 <REP> d-------- C:\Program Files\Securitoo
2008-07-22 18:24 . 2008-07-22 18:24 <REP> dr------- C:\Users\Delphine\Searches
2008-07-22 18:24 . 2008-07-22 18:24 <REP> d-------- C:\Users\Delphine\AppData\Roaming\ATI
2008-07-22 18:24 . 2008-07-22 18:24 <REP> d-------- C:\Users\All Users\ATI
2008-07-22 18:24 . 2008-07-22 18:24 <REP> d-------- C:\ProgramData\ATI
2008-07-22 18:24 . 2008-07-22 18:24 <REP> d--hs---- C:\$RECYCLE.BIN
2008-07-22 18:23 . 2008-07-29 13:56 <REP> dr------- C:\Users\Delphine\Contacts
2008-07-22 18:21 . 2008-07-22 18:21 <REP> d-------- C:\Users\All Users\ToshibaEurope
2008-07-22 18:21 . 2008-07-22 18:21 <REP> d-------- C:\ProgramData\ToshibaEurope
2008-07-22 18:20 . 2008-07-25 14:48 <REP> dr------- C:\Users\Delphine\Videos
2008-07-22 18:20 . 2008-07-22 18:46 <REP> dr------- C:\Users\Delphine\Saved Games
2008-07-22 18:20 . 2008-08-08 18:04 <REP> dr------- C:\Users\Delphine\Pictures
2008-07-22 18:20 . 2008-08-15 12:35 <REP> dr------- C:\Users\Delphine\Music
2008-07-22 18:20 . 2008-07-22 18:24 <REP> dr------- C:\Users\Delphine\Links
2008-07-22 18:20 . 2008-08-05 11:08 <REP> dr------- C:\Users\Delphine\Downloads
2008-07-22 18:20 . 2008-08-09 11:22 <REP> dr------- C:\Users\Delphine\Documents
2008-07-22 18:20 . 2006-11-02 14:37 <REP> d-------- C:\Users\Delphine\AppData\Roaming\Media Center Programs
2008-07-22 18:20 . 2008-07-22 18:20 <REP> d--h----- C:\Users\Delphine\AppData
2008-07-22 18:20 . 2008-07-22 19:23 <REP> d-------- C:\Users\Delphine
2008-07-22 18:20 . 2008-07-22 18:20 <REP> d-------- C:\Program Files\Common Files\Toshiba Shared
2008-07-22 18:20 . 2006-11-29 13:06 3,426,072 --a------ C:\Windows\System32\d3dx9_32.dll
2008-07-22 18:19 . 2008-01-21 15:42 285,184 --a------ C:\Windows\System32\drivers\tos_sps32.sys
2008-07-22 18:17 . 2008-07-22 18:17 <REP> d-------- C:\Windows\System32\en
2008-07-22 18:17 . 2008-07-22 18:17 <REP> d-------- C:\Program Files\Camera Assistant Software for Toshiba
2008-07-22 18:17 . 2007-12-17 11:45 18,432 --a------ C:\Windows\System32\drivers\UVCFTR_S.SYS
2008-07-22 18:16 . 2008-07-22 18:16 0 -rahs---- C:\Windows\System32\drivers\TOSHIBA_Satellite A300_06470-FR_PSAJ4E-03200.MRK
2008-07-22 18:13 . 2008-07-22 18:13 <REP> d-------- C:\Windows\System32\FRA
2008-07-22 18:13 . 2008-07-22 18:13 <REP> d-------- C:\Program Files\Synaptics
2008-07-22 18:13 . 2007-10-24 11:02 936,472 --a------ C:\Windows\System32\imsmudlg.exe
2008-07-22 18:13 . 2008-07-22 18:13 0 --ah----- C:\Windows\System32\drivers\Msft_Kernel_SynTP_01000.Wdf
2008-07-22 18:12 . 2008-07-22 18:12 <REP> d-------- C:\Program Files\ATI Technologies
2008-07-22 18:12 . 2008-07-22 18:12 <REP> d-------- C:\Program Files\ATI
2008-07-22 18:12 . 2008-07-22 18:12 0 --a------ C:\Windows\ativpsrm.bin
.
(((((((((((((((((((((((((((((((((( Compte-rendu de Find3M ))))))))))))))))))))))))))))))))))))))))))))))))
.
2008-08-15 08:15 --------- d-----w C:\Program Files\McAfee
2008-08-03 10:14 --------- d--h--w C:\Program Files\InstallShield Installation Information
2008-08-01 19:04 --------- d-----w C:\Program Files\Google
2008-07-23 18:50 --------- d-----w C:\Program Files\Windows Mail
2008-07-23 17:37 --------- d-----w C:\ProgramData\Microsoft Help
2008-07-22 16:21 --------- d-----w C:\Program Files\Toshiba
2008-07-22 16:20 --------- d-----w C:\ProgramData\Toshiba
2008-07-22 16:17 --------- d-sh--w C:\ProgramData\Modèles
2008-07-22 16:17 --------- d-sh--w C:\ProgramData\Menu Démarrer
2008-07-22 16:17 --------- d-sh--w C:\ProgramData\Favoris
2008-07-22 16:17 --------- d-sh--w C:\ProgramData\Bureau
2008-07-22 16:17 --------- d-sh--w C:\Program Files\Fichiers communs
2008-07-22 16:13 --------- d-----w C:\Program Files\Intel
2008-06-18 17:52 161,096 ----a-w C:\Windows\System32\DivXCodecVersionChecker.exe
2008-06-11 00:07 524,288 ----a-w C:\Windows\System32\DivXsm.exe
2008-06-11 00:07 3,596,288 ----a-w C:\Windows\System32\qt-dx331.dll
2008-06-11 00:04 200,704 ----a-w C:\Windows\System32\ssldivx.dll
2008-06-11 00:04 1,044,480 ----a-w C:\Windows\System32\libdivx.dll
2008-05-27 05:21 1,582,592 ----a-w C:\Windows\System32\tquery.dll
2008-05-27 05:21 1,418,240 ----a-w C:\Windows\System32\mssrch.dll
2008-05-27 05:17 87,552 ----a-w C:\Windows\System32\SearchFilterHost.exe
2008-05-27 05:17 87,552 ----a-w C:\Windows\System32\mssitlb.dll
2008-05-27 05:17 754,176 ----a-w C:\Windows\System32\propsys.dll
2008-05-27 05:17 60,416 ----a-w C:\Windows\System32\msscntrs.dll
2008-05-27 05:17 6,103,040 ----a-w C:\Windows\System32\chtbrkr.dll
2008-05-27 05:17 34,816 ----a-w C:\Windows\System32\msscb.dll
2008-05-27 05:17 32,768 ----a-w C:\Windows\System32\mssprxy.dll
2008-05-27 05:17 313,344 ----a-w C:\Windows\System32\thawbrkr.dll
2008-05-27 05:17 301,568 ----a-w C:\Windows\System32\srchadmin.dll
2008-05-27 05:17 194,560 ----a-w C:\Windows\System32\offfilt.dll
2008-05-27 05:17 143,872 ----a-w C:\Windows\System32\korwbrkr.dll
2008-05-27 05:17 11,776 ----a-w C:\Windows\System32\msshooks.dll
2008-05-27 05:17 1,671,680 ----a-w C:\Windows\System32\chsbrkr.dll
2008-05-27 04:59 18,904 ----a-w C:\Windows\System32\StructuredQuerySchemaTrivial.bin
2008-05-27 04:59 106,605 ----a-w C:\Windows\System32\StructuredQuerySchema.bin
2008-05-22 22:18 12,288 ----a-w C:\Windows\System32\DivXWMPExtType.dll
2008-01-21 02:43 174 --sha-w C:\Program Files\desktop.ini
.
------- Sigcheck -------
2008-01-21 04:23 21504 3794b461c45882e06856f282eef025af C:\Windows\System32\svchost.exe
2008-01-21 04:23 21504 3794b461c45882e06856f282eef025af C:\Windows\winsxs\x86_microsoft-windows-services-svchost_31bf3856ad364e35_6.0.6001.18000_none_b5bb59a1054dbde5\svchost.exe
2008-01-21 04:24 627200 b974d9f06dc7d1908e825dc201681269 C:\Windows\System32\user32.dll
2008-01-21 04:24 627200 b974d9f06dc7d1908e825dc201681269 C:\Windows\winsxs\x86_microsoft-windows-user32_31bf3856ad364e35_6.0.6001.18000_none_cd386c416d5c7f32\user32.dll
2008-01-21 04:24 179200 b304d47d5744ba20fcb99fb8b2c07b0b C:\Windows\System32\ws2_32.dll
2008-01-21 04:24 179200 b304d47d5744ba20fcb99fb8b2c07b0b C:\Windows\winsxs\x86_microsoft-windows-w..nfrastructure-ws232_31bf3856ad364e35_6.0.6001.18000_none_f2b7b0c2ce5605c4\ws2_32.dll
2008-04-25 06:35 826880 44fd3968ad885026d94450832a78de8a C:\Windows\System32\wininet.dll
2008-04-25 06:23 826368 9191790bf02a8d759ec2b4e4fa868407 C:\Windows\winsxs\x86_microsoft-windows-i..tocolimplementation_31bf3856ad364e35_6.0.6000.16681_none_ffad35c1a4ec79d4\wininet.dll
2008-04-25 06:09 827392 f40594128a6bfda6c3f0900796895078 C:\Windows\winsxs\x86_microsoft-windows-i..tocolimplementation_31bf3856ad364e35_6.0.6000.20823_none_0079b48ebdd7a1cd\wininet.dll
2008-01-21 04:24 825856 455d715a840579bdc1cf8e5c1da76849 C:\Windows\winsxs\x86_microsoft-windows-i..tocolimplementation_31bf3856ad364e35_6.0.6001.18000_none_01e8f37da1d311e6\wininet.dll
2008-04-25 06:35 826880 44fd3968ad885026d94450832a78de8a C:\Windows\winsxs\x86_microsoft-windows-i..tocolimplementation_31bf3856ad364e35_6.0.6001.18063_none_01ab14d3a2010591\wininet.dll
2008-04-25 06:22 826880 a86218059c228e7691a13e4cb63c4cdf C:\Windows\winsxs\x86_microsoft-windows-i..tocolimplementation_31bf3856ad364e35_6.0.6001.22167_none_0238b2c6bb1b0ab7\wininet.dll
2008-04-26 10:26 891448 82e266bee5f0167e41c6ecfdd2a79c02 C:\Windows\System32\drivers\tcpip.sys
2008-01-21 04:25 891448 fc6e2835d667774d409c7c7021eaf9c4 C:\Windows\winsxs\x86_microsoft-windows-tcpip-binaries_31bf3856ad364e35_6.0.6001.18000_none_b31e1252666640f6\tcpip.sys
2008-04-26 10:26 891448 82e266bee5f0167e41c6ecfdd2a79c02 C:\Windows\winsxs\x86_microsoft-windows-tcpip-binaries_31bf3856ad364e35_6.0.6001.18063_none_b2e033a8669434a1\tcpip.sys
2008-04-26 10:08 891448 01ec1e92595f839bee70d439c46796e3 C:\Windows\winsxs\x86_microsoft-windows-tcpip-binaries_31bf3856ad364e35_6.0.6001.22167_none_b36dd19b7fae39c7\tcpip.sys
2008-01-21 04:24 314880 c2610b6bdbefc053bbdab4f1b965cb24 C:\Windows\System32\winlogon.exe
2008-01-21 04:24 314880 c2610b6bdbefc053bbdab4f1b965cb24 C:\Windows\winsxs\x86_microsoft-windows-winlogon_31bf3856ad364e35_6.0.6001.18000_none_6fc30116d4f17bf5\winlogon.exe
2008-01-21 04:23 529464 9bdc71790fa08f0a0b5f10462b1bd0b1 C:\Windows\System32\drivers\ndis.sys
2008-01-21 04:23 529464 9bdc71790fa08f0a0b5f10462b1bd0b1 C:\Windows\winsxs\x86_microsoft-windows-ndis_31bf3856ad364e35_6.0.6001.18000_none_a7c72bc71c0f0d18\ndis.sys
2008-04-26 10:25 3600952 6bb1994f5b62fef6268f1ebb4014e293 C:\Windows\System32\ntkrnlpa.exe
2008-01-21 04:24 3600440 fe51e8dbbef2d01ef886499fecbf2d78 C:\Windows\winsxs\x86_microsoft-windows-os-kernel_31bf3856ad364e35_6.0.6001.18000_none_6c3061a0b4231268\ntkrnlpa.exe
2008-04-26 10:25 3600952 6bb1994f5b62fef6268f1ebb4014e293 C:\Windows\winsxs\x86_microsoft-windows-os-kernel_31bf3856ad364e35_6.0.6001.18063_none_6bf282f6b4510613\ntkrnlpa.exe
2008-04-26 10:11 3601464 68eef02a8846442fe98ad0e0517ee6bc C:\Windows\winsxs\x86_microsoft-windows-os-kernel_31bf3856ad364e35_6.0.6001.22167_none_6c8020e9cd6b0b39\ntkrnlpa.exe
2008-04-26 10:25 3549240 c9cd31b3cba8134f2b47fb5e78376acc C:\Windows\System32\ntoskrnl.exe
2008-01-21 04:24 3548728 6700f35eba206e5c89ac27c9a124dc01 C:\Windows\winsxs\x86_microsoft-windows-os-kernel_31bf3856ad364e35_6.0.6001.18000_none_6c3061a0b4231268\ntoskrnl.exe
2008-04-26 10:25 3549240 c9cd31b3cba8134f2b47fb5e78376acc C:\Windows\winsxs\x86_microsoft-windows-os-kernel_31bf3856ad364e35_6.0.6001.18063_none_6bf282f6b4510613\ntoskrnl.exe
2008-04-26 10:11 3549240 22d444d3d88a4c299894b3638a114bf7 C:\Windows\winsxs\x86_microsoft-windows-os-kernel_31bf3856ad364e35_6.0.6001.22167_none_6c8020e9cd6b0b39\ntoskrnl.exe
2008-01-21 04:24 2927104 ffa764631cb70a30065c12ef8e174f9f C:\Windows\explorer.exe
2008-01-21 04:24 2927104 ffa764631cb70a30065c12ef8e174f9f C:\Windows\winsxs\x86_microsoft-windows-explorer_31bf3856ad364e35_6.0.6001.18000_none_51b4a71279bc6ebf\explorer.exe
2008-01-21 04:24 279040 2b336ab6286d6c81fa02cbab914e3c6c C:\Windows\System32\services.exe
2008-01-21 04:24 279040 2b336ab6286d6c81fa02cbab914e3c6c C:\Windows\winsxs\x86_microsoft-windows-s..s-servicecontroller_31bf3856ad364e35_6.0.6001.18000_none_cf5fc067cd49010a\services.exe
2008-01-21 04:24 9728 dcf733788c7d088d814e5f80eb4b3e0f C:\Windows\System32\lsass.exe
2008-01-21 04:24 9728 dcf733788c7d088d814e5f80eb4b3e0f C:\Windows\winsxs\x86_microsoft-windows-lsa_31bf3856ad364e35_6.0.6001.18000_none_a64a8ac25ccb3836\lsass.exe
2006-11-02 11:45 8704 22bfd03df51065a9ed8d17f8fb72296b C:\Windows\System32\ctfmon.exe
2006-11-02 11:45 8704 22bfd03df51065a9ed8d17f8fb72296b C:\Windows\winsxs\x86_microsoft-windows-t..cesframework-ctfmon_31bf3856ad364e35_6.0.6000.16386_none_9af9cad793a67953\ctfmon.exe
2008-01-21 04:24 125952 846cdf9a3cf4da9b306adfb7d55ee4c2 C:\Windows\System32\spoolsv.exe
2008-01-21 04:24 125952 846cdf9a3cf4da9b306adfb7d55ee4c2 C:\Windows\winsxs\x86_microsoft-windows-printing-spooler-core_31bf3856ad364e35_6.0.6001.18000_none_d64ba321c188c516\spoolsv.exe
2008-01-21 04:25 43008 8e93cdf0ea8edba63f07e2898a9b2147 C:\Windows\System32\wuauclt.exe
2006-11-02 11:46 41472 ff81090b6ef1a42a19df226632711d25 C:\Windows\winsxs\x86_microsoft-windows-w..wsupdateclient-core_31bf3856ad364e35_6.0.6000.16386_none_acab9aecacae685d\wuauclt.exe
2008-01-21 04:25 43008 8e93cdf0ea8edba63f07e2898a9b2147 C:\Windows\winsxs\x86_microsoft-windows-w..wsupdateclient-core_31bf3856ad364e35_7.0.6001.18000_none_a052d92e34802200\wuauclt.exe
2008-01-21 04:24 25088 0e135526e9785d085bcd9aede6fbcbf9 C:\Windows\System32\userinit.exe
2008-01-21 04:24 25088 0e135526e9785d085bcd9aede6fbcbf9 C:\Windows\winsxs\x86_microsoft-windows-userinit_31bf3856ad364e35_6.0.6001.18000_none_dc28ba15d1aff80b\userinit.exe
.
((((((((((((((((((((((((((((((((( Point de chargement Reg )))))))))))))))))))))))))))))))))))))))))))))))))
.
.
REGEDIT4
*Note* les ‚l‚ments vides & les ‚l‚ments initiaux l‚gitimes ne sont pas list‚s
[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"Sidebar"="C:\Program Files\Windows Sidebar\sidebar.exe" [2008-01-21 04:23 1233920]
"TOSCDSPD"="C:\Program Files\TOSHIBA\TOSCDSPD\TOSCDSPD.exe" [2007-12-29 10:06 430080]
"MsnMsgr"="C:\Program Files\Windows Live\Messenger\MsnMsgr.Exe" [2007-10-18 11:34 5724184]
"DAEMON Tools Lite"="C:\Program Files\DAEMON Tools Lite\daemon.exe" [2008-07-17 14:20 490952]
"WMPNSCFG"="C:\Program Files\Windows Media Player\WMPNSCFG.exe" [2008-01-21 04:25 202240]
"ehTray.exe"="C:\Windows\ehome\ehTray.exe" [2008-01-21 04:25 125952]
"WindowsWelcomeCenter"="oobefldr.dll" [2008-01-21 04:23 2153472 C:\Windows\System32\oobefldr.dll]
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"SunJavaUpdateSched"="C:\Program Files\Java\jre1.6.0_03\bin\jusched.exe" [2007-09-25 02:11 132496]
"Adobe Reader Speed Launcher"="C:\Program Files\Adobe\Reader 8.0\Reader\Reader_sl.exe" [2007-05-11 04:06 40048]
"mcagent_exe"="C:\Program Files\McAfee.com\Agent\mcagent.exe" [2007-08-03 23:33 582992]
"Desktop SMS"="C:\Program Files\IDM\Desktop SMS\DesktopSMS.exe" [2007-06-18 11:51 1507328]
"topi"="C:\Program Files\TOSHIBA\Toshiba Online Product Information\topi.exe" [2007-07-10 10:24 581632]
"StartCCC"="C:\Program Files\ATI Technologies\ATI.ACE\Core-Static\CLIStart.exe" [2006-11-10 12:35 90112]
"SynTPEnh"="C:\Program Files\Synaptics\SynTP\SynTPEnh.exe" [2007-11-29 18:58 1029416]
"Camera Assistant Software"="C:\Program Files\Camera Assistant Software for Toshiba\traybar.exe" [2007-10-25 17:41 413696]
"Toshiba Registration"="C:\Program Files\Toshiba\Registration\ToshibaRegistration.exe" [2007-05-04 12:05 571024]
"NDSTray.exe"="NDSTray.exe" [BU]
C:\Users\Delphine\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\
TRDCReminder.lnk - C:\Program Files\Toshiba\TRDCReminder\TRDCReminder.exe [2007-07-27 11:30:22 389120]
[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\system]
"EnableLUA"= 0 (0x0)
"EnableUIADesktopToggle"= 0 (0x0)
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\windows]
"AppInit_DLLs"=mkxatw.dll
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\drivers32]
"msacm.dvacm"= C:\PROGRA~1\COMMON~1\ULEADS~1\vio\dvacm.acm
[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\McAfeeAntiSpyware]
"DisableMonitoring"=dword:00000001
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\DomainProfile]
"EnableFirewall"= 0 (0x0)
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\FirewallRules]
"{749D0E7F-1FB9-47C2-9CBF-6FC155B13BE7}"= Profile=Private|Profile=Public|C:\Program Files\Common Files\Mcafee\MNA\McNaSvc.exe:McAfee Network Agent
"{FC05447A-D300-407B-AE26-40533E552F10}"= UDP:C:\Program Files\Microsoft Office\Office12\ONENOTE.EXE:Microsoft Office OneNote
"{6062A136-093B-4946-BB91-BC0D98695D22}"= TCP:C:\Program Files\Microsoft Office\Office12\ONENOTE.EXE:Microsoft Office OneNote
"{CC439BD8-1186-427B-8AE8-160B391E2D6D}"= C:\Program Files\Windows Live\Messenger\livecall.exe:Windows Live Messenger (Phone)
"{1E843D94-1290-4BD7-9565-DB36EB526F7B}"= UDP:C:\Program Files\uTorrent\uTorrent.exe:µTorrent
"{7D414578-E66A-4404-8EF6-72D85BEEFD67}"= TCP:C:\Program Files\uTorrent\uTorrent.exe:µTorrent
"{40CD22C5-D7C4-4139-93D5-360A6702AD68}"= UDP:C:\Program Files\uTorrent\uTorrent.exe:µTorrent (TCP-In)
"{4337E283-38A1-430F-B24A-45E94FD45560}"= TCP:C:\Program Files\uTorrent\uTorrent.exe:µTorrent (UDP-In)
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\PublicProfile]
"EnableFirewall"= 0 (0x0)
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\StandardProfile]
"EnableFirewall"= 0 (0x0)
R3 atikmdag;atikmdag;C:\Windows\system32\DRIVERS\atikmdag.sys [2008-01-30 17:24]
R3 CnxtHdAudAddService;Microsoft UAA Function Driver for High Definition Audio Service;C:\Windows\system32\drivers\CHDART.sys [2008-02-01 12:46]
R3 O2MDRDR;O2MDRDR;C:\Windows\system32\DRIVERS\o2media.sys [2008-01-15 11:34]
R3 QIOMem;Generic IO & Memory Access;C:\Windows\system32\DRIVERS\QIOMem.sys [2007-04-09 17:13]
R3 yukonwlh;NDIS6.0 Miniport Driver for Marvell Yukon Ethernet Controller;C:\Windows\system32\DRIVERS\yk60x86.sys [2007-12-06 11:51]
S3 MBAMSwissArmy;MBAMSwissArmy;C:\Windows\system32\drivers\mbamswissarmy.sys [2008-07-30 20:15]
S4 ErrDev;Microsoft Hardware Error Device Driver;C:\Windows\system32\drivers\errdev.sys [2008-01-21 04:23]
S4 MegaSR;MegaSR;C:\Windows\system32\drivers\megasr.sys [2008-01-21 04:23]
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\svchost]
WindowsMobile REG_MULTI_SZ wcescomm rapimgr
LocalServiceRestricted REG_MULTI_SZ WcesComm RapiMgr
[HKEY_CURRENT_USER\software\microsoft\windows\currentversion\explorer\mountpoints2\{c772f8dd-607a-11dd-8097-001e683997c8}]
\shell\AutoRun\command - D:\Autorun.exe
.
Contenu du dossier 'Scheduled Tasks/Tƒches planifi‚es'
2008-02-26 C:\Windows\Tasks\McDefragTask.job
- c:\PROGRA~1\mcafee\mqc\QcConsol.exe [2007-12-04 13:32]
2008-07-31 C:\Windows\Tasks\McQcTask.job
- c:\PROGRA~1\mcafee\mqc\QcConsol.exe [2007-12-04 13:32]
.
- - - - ORPHANS REMOVED - - - -
SSODL-wqLxMX-{82810EF4-282B-A45E-66F4-2C288AD68A4C} - C:\Windows\system32\pd.dll
.
------- Supplementary Scan -------
.
FireFox -: Profile - C:\Users\Delphine\AppData\Roaming\Mozilla\Firefox\Profiles\j88nbiiz.default\
FireFox -: prefs.js - STARTUP.HOMEPAGE - hxxp://www.google.fr/
**************************************************************************
catchme 0.3.1361 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2008-08-17 16:39:13
Windows 6.0.6001 Service Pack 1 NTFS
Balayage processus cach‚s ...
Balayage cach‚ autostart entries ...
Balayage des fichiers cach‚s ...
C:\Users\Delphine\AppData\Roaming\Microsoft\IdentityCRL\Production\ppcrlconfig.dll 20040 bytes executable
Scan termin‚ avec succŠs
Les fichiers cach‚s: 1
**************************************************************************
.
--------------------- DLLs a charg‚ sous des processus courants ---------------------
PROCESS: C:\Windows\Explorer.exe
-> C:\Program Files\IDM\Desktop SMS\oehook.dll
.
------------------------ Other Running Processes ------------------------
.
C:\Windows\Microsoft.NET\Framework\v3.0\WPF\PresentationFontCache.exe
C:\Windows\System32\Ati2evxx.exe
C:\Windows\System32\audiodg.exe
C:\Windows\System32\Ati2evxx.exe
C:\Program Files\Toshiba\ConfigFree\CFSvcs.exe
C:\PROGRA~1\COMMON~1\McAfee\McProxy\McProxy.exe
C:\PROGRA~1\McAfee\VIRUSS~1\Mcshield.exe
C:\Program Files\McAfee\MPF\MpfSrv.exe
C:\Program Files\McAfee\MSK\msksrver.exe
C:\Program Files\O2Micro Flash Memory Card Driver\o2flash.exe
C:\Program Files\Toshiba\TOSHIBA DVD PLAYER\TNaviSrv.exe
C:\Windows\System32\TODDSrv.exe
C:\Program Files\Toshiba\Power Saver\TosCoSrv.exe
C:\Program Files\Toshiba\SMARTLogService\TosIPCSrv.exe
C:\Program Files\Common Files\Ulead Systems\DVD\ULCDRSvr.exe
C:\Windows\System32\drivers\XAudio.exe
C:\PROGRA~1\McAfee\MSC\mcmscsvc.exe
C:\PROGRA~1\McAfee.com\Agent\mcagent.exe
C:\Windows\System32\conime.exe
C:\Program Files\Toshiba\ConfigFree\NDSTray.exe
C:\Program Files\Toshiba\Power Saver\TPwrMain.exe
C:\Program Files\Toshiba\SmoothView\SmoothView.exe
C:\Program Files\Toshiba\FlashCards\TCrdMain.exe
C:\Windows\WindowsMobile\wmdSync.exe
C:\Program Files\ATI Technologies\ATI.ACE\Core-Static\MOM.exe
C:\Program Files\Camera Assistant Software for Toshiba\CEC_MAIN.exe
C:\Windows\ehome\ehmsas.exe
C:\Program Files\Windows Media Player\wmpnetwk.exe
C:\Program Files\Synaptics\SynTP\SynTPHelper.exe
C:\Program Files\Windows Mail\WinMail.exe
C:\Program Files\ATI Technologies\ATI.ACE\Core-Static\CCC.exe
C:\Program Files\Toshiba\ConfigFree\CFSwMgr.exe
C:\PROGRA~1\McAfee\VIRUSS~1\mcsysmon.exe
C:\PROGRA~1\COMMON~1\McAfee\MNA\McNASvc.exe
C:\Windows\System32\wbem\WMIADAP.exe
C:\Program Files\McAfee\MSC\mcupdmgr.exe
.
**************************************************************************
.
Temps d'accomplissement: 2008-08-17 16:44:29 - machine was rebooted
ComboFix-quarantined-files.txt 2008-08-17 14:44:11
Pre-Run: 64,880,685,056 octets libres
Post-Run: 64,310,317,056 octets libres
367 --- E O F --- 2008-08-02 10:14:19
En attente d'autres instructions chef!
Je viens de rentrer de vacances, as-tu encore des problèmes ?
Peux-tu supprimer Combofix, puis télécharger la nouvelle version et refaire un scan avec (en suivant la procédure indiquée ici : http://www.commentcamarche.net/forum/affich 7738304 comment supprimer antivirus xp 08#8 )
Peux-tu supprimer Combofix, puis télécharger la nouvelle version et refaire un scan avec (en suivant la procédure indiquée ici : http://www.commentcamarche.net/forum/affich 7738304 comment supprimer antivirus xp 08#8 )
Il me semble que le problème est fini, il ne me met plus de messages et mon fond d'écran ne change plus, maintenant j'ai un soucis avec mozilla de temps en temps il déraille il bug et quand je lance une recherche pour un site il m'envoye vers un autre... Serais ce une forme de virus ?
En tout cas j espère que tes vacances se sont bien passés et bonne reprise ;)
En tout cas j espère que tes vacances se sont bien passés et bonne reprise ;)
Merci, j'ai passé d'excellentes vacances, j'espère que toi aussi ;)
Si tu as encore hijackthis, peux-tu poster un nouveau rapport stp (en cliquant sur "do a system scan and save a logfile") ? Sinon tu trouveras la procédure au message 1.
Si tu as encore hijackthis, peux-tu poster un nouveau rapport stp (en cliquant sur "do a system scan and save a logfile") ? Sinon tu trouveras la procédure au message 1.
Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 12:41:58, on 06/09/2008
Platform: Windows Vista SP1 (WinNT 6.00.1905)
MSIE: Internet Explorer v7.00 (7.00.6001.18000)
Boot mode: Normal
Running processes:
C:\Windows\system32\taskeng.exe
C:\Windows\system32\Dwm.exe
C:\Windows\Explorer.EXE
C:\Program Files\Java\jre1.6.0_03\bin\jusched.exe
C:\Program Files\Toshiba\ConfigFree\NDSTray.exe
C:\Program Files\IDM\Desktop SMS\DesktopSMS.exe
C:\Program Files\Toshiba\Toshiba Online Product Information\TOPI.exe
C:\Program Files\Synaptics\SynTP\SynTPEnh.exe
C:\Program Files\Camera Assistant Software for Toshiba\traybar.exe
C:\Program Files\Toshiba\Power Saver\TPwrMain.exe
C:\Program Files\Toshiba\SmoothView\SmoothView.exe
C:\Program Files\ATI Technologies\ATI.ACE\Core-Static\MOM.EXE
C:\Program Files\Toshiba\FlashCards\TCrdMain.exe
C:\Windows\WindowsMobile\wmdSync.exe
C:\Program Files\AVG\AVG8\avgtray.exe
C:\Program Files\Search Settings\SearchSettings.exe
C:\Program Files\Windows Sidebar\sidebar.exe
C:\Program Files\Toshiba\TOSCDSPD\TOSCDSPD.exe
C:\Program Files\Camera Assistant Software for Toshiba\CEC_MAIN.exe
C:\Program Files\Windows Media Player\wmpnscfg.exe
C:\Program Files\Windows Live\Messenger\msnmsgr.exe
C:\Program Files\DAEMON Tools Lite\daemon.exe
C:\Windows\ehome\ehtray.exe
C:\Windows\ehome\ehmsas.exe
C:\Program Files\Netscape\Navigator 9\navigator.exe
C:\Program Files\Windows Mail\WinMail.exe
C:\Program Files\Toshiba\ConfigFree\CFSwMgr.exe
C:\Program Files\ATI Technologies\ATI.ACE\Core-Static\CCC.exe
C:\Program Files\Synaptics\SynTP\SynTPHelper.exe
C:\Program Files\Trend Micro\HijackThis\Jack.exe
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = https://www.msn.com/fr-fr/?ocid=iehp
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = https://www.bing.com/?toHttps=1&redig=5FC791212101479BAFBE1A679848B1AF
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = https://www.bing.com/?toHttps=1&redig=5FC791212101479BAFBE1A679848B1AF
R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName =
R3 - URLSearchHook: SearchSettings Class - {E312764E-7706-43F1-8DAB-FCDD2B1E416D} - C:\Program Files\Search Settings\kb127\SearchSettings.dll
O2 - BHO: WormRadar.com IESiteBlocker.NavFilter - {3CA2F312-6F6E-4B53-A66E-4E65E497C8C0} - C:\Program Files\AVG\AVG8\avgssie.dll
O2 - BHO: DealioBHO Class - {6A87B991-A31F-4130-AE72-6D0C294BF082} - C:\Program Files\Dealio\kb127\Dealio.dll
O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre1.6.0_03\bin\ssv.dll
O2 - BHO: Programme d'aide de l'Assistant de connexion Windows Live - {9030D464-4C02-4ABF-8ECC-5164760863C6} - C:\Program Files\Common Files\Microsoft Shared\Windows Live\WindowsLiveLogin.dll
O2 - BHO: AVG Security Toolbar - {A057A204-BACC-4D26-9990-79A187E2698E} - C:\PROGRA~1\AVG\AVG8\AVGTOO~1.DLL
O2 - BHO: SearchSettings Class - {E312764E-7706-43F1-8DAB-FCDD2B1E416D} - C:\Program Files\Search Settings\kb127\SearchSettings.dll
O3 - Toolbar: AVG Security Toolbar - {A057A204-BACC-4D26-9990-79A187E2698E} - C:\PROGRA~1\AVG\AVG8\AVGTOO~1.DLL
O3 - Toolbar: Dealio - {E67C74F4-A00A-4F2C-9FEC-FD9DC004A67F} - C:\Program Files\Dealio\kb127\Dealio.dll
O4 - HKLM\..\Run: [SunJavaUpdateSched] "C:\Program Files\Java\jre1.6.0_03\bin\jusched.exe"
O4 - HKLM\..\Run: [NDSTray.exe] NDSTray.exe
O4 - HKLM\..\Run: [ITSecMng] %ProgramFiles%\TOSHIBA\Bluetooth Toshiba Stack\ItSecMng.exe /START
O4 - HKLM\..\Run: [Adobe Reader Speed Launcher] "C:\Program Files\Adobe\Reader 8.0\Reader\Reader_sl.exe"
O4 - HKLM\..\Run: [Desktop SMS] C:\Program Files\IDM\Desktop SMS\DesktopSMS.exe /auto
O4 - HKLM\..\Run: [topi] C:\Program Files\TOSHIBA\Toshiba Online Product Information\topi.exe -startup
O4 - HKLM\..\Run: [StartCCC] "C:\Program Files\ATI Technologies\ATI.ACE\Core-Static\CLIStart.exe"
O4 - HKLM\..\Run: [SynTPEnh] C:\Program Files\Synaptics\SynTP\SynTPEnh.exe
O4 - HKLM\..\Run: [Camera Assistant Software] "C:\Program Files\Camera Assistant Software for Toshiba\traybar.exe" /start
O4 - HKLM\..\Run: [TPwrMain] %ProgramFiles%\TOSHIBA\Power Saver\TPwrMain.EXE
O4 - HKLM\..\Run: [HSON] %ProgramFiles%\TOSHIBA\TBS\HSON.exe
O4 - HKLM\..\Run: [SmoothView] %ProgramFiles%\Toshiba\SmoothView\SmoothView.exe
O4 - HKLM\..\Run: [00TCrdMain] %ProgramFiles%\TOSHIBA\FlashCards\TCrdMain.exe
O4 - HKLM\..\Run: [Toshiba Registration] C:\Program Files\Toshiba\Registration\ToshibaRegistration.exe
O4 - HKLM\..\Run: [Windows Mobile-based device management] %windir%\WindowsMobile\wmdSync.exe
O4 - HKLM\..\Run: [AVG8_TRAY] C:\PROGRA~1\AVG\AVG8\avgtray.exe
O4 - HKLM\..\Run: [au] C:\Program Files\Dealio\DealioAU.exe
O4 - HKLM\..\Run: [SearchSettings] C:\Program Files\Search Settings\SearchSettings.exe
O4 - HKCU\..\Run: [Sidebar] C:\Program Files\Windows Sidebar\sidebar.exe /autoRun
O4 - HKCU\..\Run: [WindowsWelcomeCenter] rundll32.exe oobefldr.dll,ShowWelcomeCenter
O4 - HKCU\..\Run: [TOSCDSPD] C:\Program Files\TOSHIBA\TOSCDSPD\TOSCDSPD.exe
O4 - HKCU\..\Run: [MsnMsgr] "C:\Program Files\Windows Live\Messenger\MsnMsgr.Exe" /background
O4 - HKCU\..\Run: [DAEMON Tools Lite] "C:\Program Files\DAEMON Tools Lite\daemon.exe" -autorun
O4 - HKCU\..\Run: [ehTray.exe] C:\Windows\ehome\ehTray.exe
O4 - HKCU\..\Run: [WMPNSCFG] C:\Program Files\Windows Media Player\WMPNSCFG.exe
O4 - HKUS\S-1-5-19\..\Run: [Sidebar] %ProgramFiles%\Windows Sidebar\Sidebar.exe /detectMem (User 'SERVICE LOCAL')
O4 - HKUS\S-1-5-19\..\Run: [WindowsWelcomeCenter] rundll32.exe oobefldr.dll,ShowWelcomeCenter (User 'SERVICE LOCAL')
O4 - HKUS\S-1-5-20\..\Run: [Sidebar] %ProgramFiles%\Windows Sidebar\Sidebar.exe /detectMem (User 'SERVICE RÉSEAU')
O4 - .DEFAULT User Startup: TRDCReminder.lnk = C:\Program Files\Toshiba\TRDCReminder\TRDCReminder.exe (User 'Default user')
O4 - Startup: TRDCReminder.lnk = C:\Program Files\Toshiba\TRDCReminder\TRDCReminder.exe
O8 - Extra context menu item: Compare Prices with &Dealio - C:\Users\Delphine\AppData\LocalLow\Dealio\kb127\res\DealioSearch.html
O8 - Extra context menu item: E&xporter vers Microsoft Excel - res://C:\PROGRA~1\MICROS~3\Office12\EXCEL.EXE/3000
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_03\bin\ssv.dll
O9 - Extra 'Tools' menuitem: Console Java (Sun) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_03\bin\ssv.dll
O9 - Extra button: Envoyer à OneNote - {2670000A-7350-4f3c-8081-5663EE0C6C49} - C:\PROGRA~1\MICROS~3\Office12\ONBttnIE.dll
O9 - Extra 'Tools' menuitem: &Envoyer à OneNote - {2670000A-7350-4f3c-8081-5663EE0C6C49} - C:\PROGRA~1\MICROS~3\Office12\ONBttnIE.dll
O9 - Extra button: eBay - Achetez, Vendez - {76577871-04EC-495E-A12B-91F7C3600AFA} - https://www.ebay.fr (file missing)
O9 - Extra button: Amazon.fr - {8A918C1D-E123-4E36-B562-5C1519E434CE} - https://www.amazon.fr/exec/obidos/subst/home/home.html/262-6263521-6325360?_encoding=UTF8&link_code=hom&tag=Toshibafrbholink-21 (file missing)
O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~3\Office12\REFIEBAR.DLL
O9 - Extra button: Dealio - {E908B145-C847-4e85-B315-07E2E70DECF8} - C:\Program Files\Dealio\kb127\Dealio.dll
O9 - Extra 'Tools' menuitem: Dealio - {E908B145-C847-4e85-B315-07E2E70DECF8} - C:\Program Files\Dealio\kb127\Dealio.dll
O9 - Extra button: (no name) - Cmdmapping - (no file) (HKCU)
O13 - Gopher Prefix:
O16 - DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} (Shockwave Flash Object) - http://fpdownload2.macromedia.com/get/shockwave/cabs/flash/swflash.cab
O17 - HKLM\System\CCS\Services\Tcpip\..\{12505B18-8AA5-4868-9758-C8A3ECC8BA42}: NameServer = 192.168.1.1
O17 - HKLM\System\CS1\Services\Tcpip\..\{12505B18-8AA5-4868-9758-C8A3ECC8BA42}: NameServer = 192.168.1.1
O17 - HKLM\System\CS2\Services\Tcpip\..\{12505B18-8AA5-4868-9758-C8A3ECC8BA42}: NameServer = 192.168.1.1
O18 - Protocol: linkscanner - {F274614C-63F8-47D5-A4D1-FBDDE494F8D1} - C:\Program Files\AVG\AVG8\avgpp.dll
O20 - AppInit_DLLs: mkxatw.dll,avgrsstx.dll
O23 - Service: Ati External Event Utility - ATI Technologies Inc. - C:\Windows\system32\Ati2evxx.exe
O23 - Service: AVG8 E-mail Scanner (avg8emc) - AVG Technologies CZ, s.r.o. - C:\PROGRA~1\AVG\AVG8\avgemc.exe
O23 - Service: AVG8 WatchDog (avg8wd) - AVG Technologies CZ, s.r.o. - C:\PROGRA~1\AVG\AVG8\avgwdsvc.exe
O23 - Service: ConfigFree Service - TOSHIBA CORPORATION - C:\Program Files\TOSHIBA\ConfigFree\CFSvcs.exe
O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Common Files\InstallShield\Driver\11\Intel 32\IDriverT.exe
O23 - Service: O2Micro Flash Memory Card Service (o2flash) - O2Micro International - C:\Program Files\O2Micro Flash Memory Card Driver\o2flash.exe
O23 - Service: TOSHIBA Navi Support Service (TNaviSrv) - TOSHIBA Corporation - C:\Program Files\Toshiba\TOSHIBA DVD PLAYER\TNaviSrv.exe
O23 - Service: TOSHIBA Optical Disc Drive Service (TODDSrv) - TOSHIBA Corporation - C:\Windows\system32\TODDSrv.exe
O23 - Service: TOSHIBA Power Saver (TosCoSrv) - TOSHIBA Corporation - C:\Program Files\Toshiba\Power Saver\TosCoSrv.exe
O23 - Service: TOSHIBA Bluetooth Service - Unknown owner - c:\Program Files\Toshiba\Bluetooth Toshiba Stack\TosBtSrv.exe (file missing)
O23 - Service: TOSHIBA SMART Log Service - TOSHIBA Corporation - C:\Program Files\TOSHIBA\SMARTLogService\TosIPCSrv.exe
O23 - Service: Ulead Burning Helper (UleadBurningHelper) - Ulead Systems, Inc. - C:\Program Files\Common Files\Ulead Systems\DVD\ULCDRSvr.exe
O23 - Service: XAudioService - Conexant Systems, Inc. - C:\Windows\system32\DRIVERS\xaudio.exe
Scan saved at 12:41:58, on 06/09/2008
Platform: Windows Vista SP1 (WinNT 6.00.1905)
MSIE: Internet Explorer v7.00 (7.00.6001.18000)
Boot mode: Normal
Running processes:
C:\Windows\system32\taskeng.exe
C:\Windows\system32\Dwm.exe
C:\Windows\Explorer.EXE
C:\Program Files\Java\jre1.6.0_03\bin\jusched.exe
C:\Program Files\Toshiba\ConfigFree\NDSTray.exe
C:\Program Files\IDM\Desktop SMS\DesktopSMS.exe
C:\Program Files\Toshiba\Toshiba Online Product Information\TOPI.exe
C:\Program Files\Synaptics\SynTP\SynTPEnh.exe
C:\Program Files\Camera Assistant Software for Toshiba\traybar.exe
C:\Program Files\Toshiba\Power Saver\TPwrMain.exe
C:\Program Files\Toshiba\SmoothView\SmoothView.exe
C:\Program Files\ATI Technologies\ATI.ACE\Core-Static\MOM.EXE
C:\Program Files\Toshiba\FlashCards\TCrdMain.exe
C:\Windows\WindowsMobile\wmdSync.exe
C:\Program Files\AVG\AVG8\avgtray.exe
C:\Program Files\Search Settings\SearchSettings.exe
C:\Program Files\Windows Sidebar\sidebar.exe
C:\Program Files\Toshiba\TOSCDSPD\TOSCDSPD.exe
C:\Program Files\Camera Assistant Software for Toshiba\CEC_MAIN.exe
C:\Program Files\Windows Media Player\wmpnscfg.exe
C:\Program Files\Windows Live\Messenger\msnmsgr.exe
C:\Program Files\DAEMON Tools Lite\daemon.exe
C:\Windows\ehome\ehtray.exe
C:\Windows\ehome\ehmsas.exe
C:\Program Files\Netscape\Navigator 9\navigator.exe
C:\Program Files\Windows Mail\WinMail.exe
C:\Program Files\Toshiba\ConfigFree\CFSwMgr.exe
C:\Program Files\ATI Technologies\ATI.ACE\Core-Static\CCC.exe
C:\Program Files\Synaptics\SynTP\SynTPHelper.exe
C:\Program Files\Trend Micro\HijackThis\Jack.exe
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = https://www.msn.com/fr-fr/?ocid=iehp
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = https://www.bing.com/?toHttps=1&redig=5FC791212101479BAFBE1A679848B1AF
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = https://www.bing.com/?toHttps=1&redig=5FC791212101479BAFBE1A679848B1AF
R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName =
R3 - URLSearchHook: SearchSettings Class - {E312764E-7706-43F1-8DAB-FCDD2B1E416D} - C:\Program Files\Search Settings\kb127\SearchSettings.dll
O2 - BHO: WormRadar.com IESiteBlocker.NavFilter - {3CA2F312-6F6E-4B53-A66E-4E65E497C8C0} - C:\Program Files\AVG\AVG8\avgssie.dll
O2 - BHO: DealioBHO Class - {6A87B991-A31F-4130-AE72-6D0C294BF082} - C:\Program Files\Dealio\kb127\Dealio.dll
O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre1.6.0_03\bin\ssv.dll
O2 - BHO: Programme d'aide de l'Assistant de connexion Windows Live - {9030D464-4C02-4ABF-8ECC-5164760863C6} - C:\Program Files\Common Files\Microsoft Shared\Windows Live\WindowsLiveLogin.dll
O2 - BHO: AVG Security Toolbar - {A057A204-BACC-4D26-9990-79A187E2698E} - C:\PROGRA~1\AVG\AVG8\AVGTOO~1.DLL
O2 - BHO: SearchSettings Class - {E312764E-7706-43F1-8DAB-FCDD2B1E416D} - C:\Program Files\Search Settings\kb127\SearchSettings.dll
O3 - Toolbar: AVG Security Toolbar - {A057A204-BACC-4D26-9990-79A187E2698E} - C:\PROGRA~1\AVG\AVG8\AVGTOO~1.DLL
O3 - Toolbar: Dealio - {E67C74F4-A00A-4F2C-9FEC-FD9DC004A67F} - C:\Program Files\Dealio\kb127\Dealio.dll
O4 - HKLM\..\Run: [SunJavaUpdateSched] "C:\Program Files\Java\jre1.6.0_03\bin\jusched.exe"
O4 - HKLM\..\Run: [NDSTray.exe] NDSTray.exe
O4 - HKLM\..\Run: [ITSecMng] %ProgramFiles%\TOSHIBA\Bluetooth Toshiba Stack\ItSecMng.exe /START
O4 - HKLM\..\Run: [Adobe Reader Speed Launcher] "C:\Program Files\Adobe\Reader 8.0\Reader\Reader_sl.exe"
O4 - HKLM\..\Run: [Desktop SMS] C:\Program Files\IDM\Desktop SMS\DesktopSMS.exe /auto
O4 - HKLM\..\Run: [topi] C:\Program Files\TOSHIBA\Toshiba Online Product Information\topi.exe -startup
O4 - HKLM\..\Run: [StartCCC] "C:\Program Files\ATI Technologies\ATI.ACE\Core-Static\CLIStart.exe"
O4 - HKLM\..\Run: [SynTPEnh] C:\Program Files\Synaptics\SynTP\SynTPEnh.exe
O4 - HKLM\..\Run: [Camera Assistant Software] "C:\Program Files\Camera Assistant Software for Toshiba\traybar.exe" /start
O4 - HKLM\..\Run: [TPwrMain] %ProgramFiles%\TOSHIBA\Power Saver\TPwrMain.EXE
O4 - HKLM\..\Run: [HSON] %ProgramFiles%\TOSHIBA\TBS\HSON.exe
O4 - HKLM\..\Run: [SmoothView] %ProgramFiles%\Toshiba\SmoothView\SmoothView.exe
O4 - HKLM\..\Run: [00TCrdMain] %ProgramFiles%\TOSHIBA\FlashCards\TCrdMain.exe
O4 - HKLM\..\Run: [Toshiba Registration] C:\Program Files\Toshiba\Registration\ToshibaRegistration.exe
O4 - HKLM\..\Run: [Windows Mobile-based device management] %windir%\WindowsMobile\wmdSync.exe
O4 - HKLM\..\Run: [AVG8_TRAY] C:\PROGRA~1\AVG\AVG8\avgtray.exe
O4 - HKLM\..\Run: [au] C:\Program Files\Dealio\DealioAU.exe
O4 - HKLM\..\Run: [SearchSettings] C:\Program Files\Search Settings\SearchSettings.exe
O4 - HKCU\..\Run: [Sidebar] C:\Program Files\Windows Sidebar\sidebar.exe /autoRun
O4 - HKCU\..\Run: [WindowsWelcomeCenter] rundll32.exe oobefldr.dll,ShowWelcomeCenter
O4 - HKCU\..\Run: [TOSCDSPD] C:\Program Files\TOSHIBA\TOSCDSPD\TOSCDSPD.exe
O4 - HKCU\..\Run: [MsnMsgr] "C:\Program Files\Windows Live\Messenger\MsnMsgr.Exe" /background
O4 - HKCU\..\Run: [DAEMON Tools Lite] "C:\Program Files\DAEMON Tools Lite\daemon.exe" -autorun
O4 - HKCU\..\Run: [ehTray.exe] C:\Windows\ehome\ehTray.exe
O4 - HKCU\..\Run: [WMPNSCFG] C:\Program Files\Windows Media Player\WMPNSCFG.exe
O4 - HKUS\S-1-5-19\..\Run: [Sidebar] %ProgramFiles%\Windows Sidebar\Sidebar.exe /detectMem (User 'SERVICE LOCAL')
O4 - HKUS\S-1-5-19\..\Run: [WindowsWelcomeCenter] rundll32.exe oobefldr.dll,ShowWelcomeCenter (User 'SERVICE LOCAL')
O4 - HKUS\S-1-5-20\..\Run: [Sidebar] %ProgramFiles%\Windows Sidebar\Sidebar.exe /detectMem (User 'SERVICE RÉSEAU')
O4 - .DEFAULT User Startup: TRDCReminder.lnk = C:\Program Files\Toshiba\TRDCReminder\TRDCReminder.exe (User 'Default user')
O4 - Startup: TRDCReminder.lnk = C:\Program Files\Toshiba\TRDCReminder\TRDCReminder.exe
O8 - Extra context menu item: Compare Prices with &Dealio - C:\Users\Delphine\AppData\LocalLow\Dealio\kb127\res\DealioSearch.html
O8 - Extra context menu item: E&xporter vers Microsoft Excel - res://C:\PROGRA~1\MICROS~3\Office12\EXCEL.EXE/3000
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_03\bin\ssv.dll
O9 - Extra 'Tools' menuitem: Console Java (Sun) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_03\bin\ssv.dll
O9 - Extra button: Envoyer à OneNote - {2670000A-7350-4f3c-8081-5663EE0C6C49} - C:\PROGRA~1\MICROS~3\Office12\ONBttnIE.dll
O9 - Extra 'Tools' menuitem: &Envoyer à OneNote - {2670000A-7350-4f3c-8081-5663EE0C6C49} - C:\PROGRA~1\MICROS~3\Office12\ONBttnIE.dll
O9 - Extra button: eBay - Achetez, Vendez - {76577871-04EC-495E-A12B-91F7C3600AFA} - https://www.ebay.fr (file missing)
O9 - Extra button: Amazon.fr - {8A918C1D-E123-4E36-B562-5C1519E434CE} - https://www.amazon.fr/exec/obidos/subst/home/home.html/262-6263521-6325360?_encoding=UTF8&link_code=hom&tag=Toshibafrbholink-21 (file missing)
O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~3\Office12\REFIEBAR.DLL
O9 - Extra button: Dealio - {E908B145-C847-4e85-B315-07E2E70DECF8} - C:\Program Files\Dealio\kb127\Dealio.dll
O9 - Extra 'Tools' menuitem: Dealio - {E908B145-C847-4e85-B315-07E2E70DECF8} - C:\Program Files\Dealio\kb127\Dealio.dll
O9 - Extra button: (no name) - Cmdmapping - (no file) (HKCU)
O13 - Gopher Prefix:
O16 - DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} (Shockwave Flash Object) - http://fpdownload2.macromedia.com/get/shockwave/cabs/flash/swflash.cab
O17 - HKLM\System\CCS\Services\Tcpip\..\{12505B18-8AA5-4868-9758-C8A3ECC8BA42}: NameServer = 192.168.1.1
O17 - HKLM\System\CS1\Services\Tcpip\..\{12505B18-8AA5-4868-9758-C8A3ECC8BA42}: NameServer = 192.168.1.1
O17 - HKLM\System\CS2\Services\Tcpip\..\{12505B18-8AA5-4868-9758-C8A3ECC8BA42}: NameServer = 192.168.1.1
O18 - Protocol: linkscanner - {F274614C-63F8-47D5-A4D1-FBDDE494F8D1} - C:\Program Files\AVG\AVG8\avgpp.dll
O20 - AppInit_DLLs: mkxatw.dll,avgrsstx.dll
O23 - Service: Ati External Event Utility - ATI Technologies Inc. - C:\Windows\system32\Ati2evxx.exe
O23 - Service: AVG8 E-mail Scanner (avg8emc) - AVG Technologies CZ, s.r.o. - C:\PROGRA~1\AVG\AVG8\avgemc.exe
O23 - Service: AVG8 WatchDog (avg8wd) - AVG Technologies CZ, s.r.o. - C:\PROGRA~1\AVG\AVG8\avgwdsvc.exe
O23 - Service: ConfigFree Service - TOSHIBA CORPORATION - C:\Program Files\TOSHIBA\ConfigFree\CFSvcs.exe
O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Common Files\InstallShield\Driver\11\Intel 32\IDriverT.exe
O23 - Service: O2Micro Flash Memory Card Service (o2flash) - O2Micro International - C:\Program Files\O2Micro Flash Memory Card Driver\o2flash.exe
O23 - Service: TOSHIBA Navi Support Service (TNaviSrv) - TOSHIBA Corporation - C:\Program Files\Toshiba\TOSHIBA DVD PLAYER\TNaviSrv.exe
O23 - Service: TOSHIBA Optical Disc Drive Service (TODDSrv) - TOSHIBA Corporation - C:\Windows\system32\TODDSrv.exe
O23 - Service: TOSHIBA Power Saver (TosCoSrv) - TOSHIBA Corporation - C:\Program Files\Toshiba\Power Saver\TosCoSrv.exe
O23 - Service: TOSHIBA Bluetooth Service - Unknown owner - c:\Program Files\Toshiba\Bluetooth Toshiba Stack\TosBtSrv.exe (file missing)
O23 - Service: TOSHIBA SMART Log Service - TOSHIBA Corporation - C:\Program Files\TOSHIBA\SMARTLogService\TosIPCSrv.exe
O23 - Service: Ulead Burning Helper (UleadBurningHelper) - Ulead Systems, Inc. - C:\Program Files\Common Files\Ulead Systems\DVD\ULCDRSvr.exe
O23 - Service: XAudioService - Conexant Systems, Inc. - C:\Windows\system32\DRIVERS\xaudio.exe
Tu as une barre d'outil infectée (SearchSettings), c'est tout nouveau, tu ne l'avais pas avant... Ca devrait être simple à supprimer
Télécharge Toolbar-S&D (Team IDN) sur ton Bureau.
https://77b4795d-a-62cb3a1a-s-sites.googlegroups.com/site/eric71mespages/ToolBarSD.exe?attachauth=ANoY7cqJWPphpudyTqv7TRo5RQ3nm_Sx8JluVMO59X5E9cyE3j3LqKlmStIqiDqJdIgMJLi7MXn2nKVajQfoWuVvZZ2wIx_vkqO4k4P0K9jh-ra9jaKPXdZcoaVF2UqJZNH8ubL_42uIwh6f35xJ2GJMuzddVj2Qth1DgZ839lxEIFGkgWz3TdfvNMy-YtxfA3gqBUrj4U4LFeAPiWr3ClmjIP0t_Xs5PQ%3D%3D&attredirects=2
Clique-droit sur le raccourci de Toolbar-S&D sur le Bureau et choisis " Exécuter en tant qu' Administrateur"
* Sélectionne la langue souhaitée en tapant la lettre de ton choix puis en validant avec la touche Entrée.
* Choisis maintenant l'option 1 (Recherche). Patiente jusqu'à la fin de la recherche.
* Poste le rapport généré. (C:\TB.txt)
Télécharge Toolbar-S&D (Team IDN) sur ton Bureau.
https://77b4795d-a-62cb3a1a-s-sites.googlegroups.com/site/eric71mespages/ToolBarSD.exe?attachauth=ANoY7cqJWPphpudyTqv7TRo5RQ3nm_Sx8JluVMO59X5E9cyE3j3LqKlmStIqiDqJdIgMJLi7MXn2nKVajQfoWuVvZZ2wIx_vkqO4k4P0K9jh-ra9jaKPXdZcoaVF2UqJZNH8ubL_42uIwh6f35xJ2GJMuzddVj2Qth1DgZ839lxEIFGkgWz3TdfvNMy-YtxfA3gqBUrj4U4LFeAPiWr3ClmjIP0t_Xs5PQ%3D%3D&attredirects=2
Clique-droit sur le raccourci de Toolbar-S&D sur le Bureau et choisis " Exécuter en tant qu' Administrateur"
* Sélectionne la langue souhaitée en tapant la lettre de ton choix puis en validant avec la touche Entrée.
* Choisis maintenant l'option 1 (Recherche). Patiente jusqu'à la fin de la recherche.
* Poste le rapport généré. (C:\TB.txt)
Oulalala j'aime pas trop quand ça t'affiches mes dossiers --' xD
voilà le rapport
-----------\\ ToolBar S&D 1.1.8 XP/Vista
Microsoft® Windows Vista™ Édition Familiale Premium ( v6.0.6001 ) Service Pack 1
X86-based PC ( Multiprocessor Free : Intel(R) Core(TM)2 Duo CPU T5550 @ 1.83GHz )
BIOS : PhoenixBIOS 4.0 Release 6.1
USER : Delphine ( Administrator )
BOOT : Normal boot
Antivirus : AVG Anti-Virus Free 8.0 (Activated)
"C:\ToolBar SD" ( MAJ : 07-09-2008|12:20 )
Option : [1] ( 09/09/2008|13:46 )
[ UAC => 0 ]
-----------\\ Recherche de Fichiers / Dossiers ...
C:\PROGRA~2\MICROS~1\Windows\STARTM~1\Programs\Dealio
C:\Program Files\Dealio
C:\Program Files\Dealio\DealioAU.exe
C:\Program Files\Dealio\kb127
C:\Program Files\Dealio\SearchSettingsKit.exe
C:\Program Files\DAEMON Tools Toolbar
C:\Program Files\DAEMON Tools Toolbar\DTToolbar.dll
C:\Program Files\DAEMON Tools Toolbar\FirefoxDTT
C:\Program Files\DAEMON Tools Toolbar\Resources
C:\Program Files\DAEMON Tools Toolbar\uninst.exe
C:\Program Files\DAEMON Tools Toolbar\_DTLite.xml
C:\Program Files\Search Settings
C:\Program Files\Search Settings\kb127
C:\Program Files\Search Settings\SearchSettings.exe
-----------\\ [..\Internet Explorer\Main]
[HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main]
"Local Page"="C:\\windows\\system32\\blank.htm"
"Search Page"="http://www.microsoft.com/isapi/redir.dll?prd=ie&ar=iesearch"
"Start Page"="http://www.microsoft.com/isapi/redir.dll?prd=ie&pver=6&ar=msnhome"
"Default_Search_URL"="http://www.microsoft.com/isapi/redir.dll?prd=ie&ar=iesearch"
"Url"="https://www.msn.com/fr-fr/actualite/"
[HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\Main]
"Start Page"="http://www.microsoft.com/isapi/redir.dll?prd={SUB_PRD}&clcid={SUB_CLSID}&pver={SUB_PVER}&ar=home"
"Default_Page_URL"="https://www.msn.com/fr-fr/?ocid=iehp"
"Default_Search_URL"="https://www.bing.com/?toHttps=1&redig=5FC791212101479BAFBE1A679848B1AF"
"Search Page"="https://www.bing.com/?toHttps=1&redig=5FC791212101479BAFBE1A679848B1AF"
"Local Page"="C:\\windows\\system32\\blank.htm"
--------------------\\ Recherche d'autres infections
--------------------\\ ROOTKIT !!
[HKLM\..\CurrentControlSet\Enum\Root\LEGACY_TDSSSERV] -- ROOTKIT Tibs !
[HKLM\..\CurrentControlSet\Services\tdssserv] -- ROOTKIT Tibs !
[HKLM\..\CurrentControlSet\Enum\Root\tdssserv] -- ROOTKIT Tibs !
[HKLM\..\ControlSet001\Enum\Root\LEGACY_TDSSSERV] -- ROOTKIT Tibs !
[HKLM\..\ControlSet001\Services\tdssserv] -- ROOTKIT Tibs !
[HKLM\..\ControlSet001\Enum\Root\tdssserv] -- ROOTKIT Tibs !
[HKLM\..\ControlSet002\Enum\Root\LEGACY_TDSSSERV] -- ROOTKIT Tibs !
[HKLM\..\ControlSet002\Services\tdssserv] -- ROOTKIT Tibs !
[HKLM\..\ControlSet002\Enum\Root\tdssserv] -- ROOTKIT Tibs !
--------------------\\ Cracks & Keygens ..
C:\Users\Delphine\Documents\Downloads\Les.Sims2.la.Totale.FRENCH-Kilcop-[nucleus-fr.org]\01 - Les Sims 2\crack
C:\Users\Delphine\Documents\Downloads\Les.Sims2.la.Totale.FRENCH-Kilcop-[nucleus-fr.org]\01 - Les Sims 2\crack\mo-s2dvd.nfo
C:\Users\Delphine\Documents\Downloads\Les.Sims2.la.Totale.FRENCH-Kilcop-[nucleus-fr.org]\01 - Les Sims 2\crack\Sims2.exe
C:\Users\Delphine\Documents\Downloads\Les.Sims2.la.Totale.FRENCH-Kilcop-[nucleus-fr.org]\04 - Acad‚mie\crack
C:\Users\Delphine\Documents\Downloads\Les.Sims2.la.Totale.FRENCH-Kilcop-[nucleus-fr.org]\04 - Acad‚mie\crack\readme.txt
C:\Users\Delphine\Documents\Downloads\Les.Sims2.la.Totale.FRENCH-Kilcop-[nucleus-fr.org]\04 - Acad‚mie\crack\Sims2EP1_1.mir
C:\Users\Delphine\Documents\Downloads\Les.Sims2.la.Totale.FRENCH-Kilcop-[nucleus-fr.org]\06 - Nuits de Folie\crack
C:\Users\Delphine\Documents\Downloads\Les.Sims2.la.Totale.FRENCH-Kilcop-[nucleus-fr.org]\06 - Nuits de Folie\crack\tnts23m1.rar
C:\Users\Delphine\Documents\Downloads\Les.Sims2.la.Totale.FRENCH-Kilcop-[nucleus-fr.org]\08 - La Bonne Affaire\crack
C:\Users\Delphine\Documents\Downloads\Les.Sims2.la.Totale.FRENCH-Kilcop-[nucleus-fr.org]\08 - La Bonne Affaire\crack\rld-sofb
C:\Users\Delphine\Documents\Downloads\Les.Sims2.la.Totale.FRENCH-Kilcop-[nucleus-fr.org]\08 - La Bonne Affaire\crack\rld-sofb\reloaded.nfo
C:\Users\Delphine\Documents\Downloads\Les.Sims2.la.Totale.FRENCH-Kilcop-[nucleus-fr.org]\08 - La Bonne Affaire\crack\rld-sofb\Sims2EP3.exe
C:\Users\Delphine\Documents\Downloads\Les.Sims2.la.Totale.FRENCH-Kilcop-[nucleus-fr.org]\10 - Fun en famille\Crack
C:\Users\Delphine\Documents\Downloads\Les.Sims2.la.Totale.FRENCH-Kilcop-[nucleus-fr.org]\10 - Fun en famille\Crack\reloaded.nfo
C:\Users\Delphine\Documents\Downloads\Les.Sims2.la.Totale.FRENCH-Kilcop-[nucleus-fr.org]\10 - Fun en famille\Crack\Sims2SP1.exe
C:\Users\Delphine\Documents\Downloads\Les.Sims2.la.Totale.FRENCH-Kilcop-[nucleus-fr.org]\12 - Glamour\Crack
C:\Users\Delphine\Documents\Downloads\Les.Sims2.la.Totale.FRENCH-Kilcop-[nucleus-fr.org]\12 - Glamour\Crack\keygen.exe
C:\Users\Delphine\Documents\Downloads\Les.Sims2.la.Totale.FRENCH-Kilcop-[nucleus-fr.org]\12 - Glamour\Crack\rzr-sglc.nfo
C:\Users\Delphine\Documents\Downloads\Les.Sims2.la.Totale.FRENCH-Kilcop-[nucleus-fr.org]\12 - Glamour\Crack\Sims2SP2.exe
C:\Users\Delphine\Documents\Downloads\Les.Sims2.la.Totale.FRENCH-Kilcop-[nucleus-fr.org]\13 - Animaux & Cie\Crack
C:\Users\Delphine\Documents\Downloads\Les.Sims2.la.Totale.FRENCH-Kilcop-[nucleus-fr.org]\13 - Animaux & Cie\Keygen
C:\Users\Delphine\Documents\Downloads\Les.Sims2.la.Totale.FRENCH-Kilcop-[nucleus-fr.org]\13 - Animaux & Cie\Crack\Sims2EP4.exe
C:\Users\Delphine\Documents\Downloads\Les.Sims2.la.Totale.FRENCH-Kilcop-[nucleus-fr.org]\13 - Animaux & Cie\Keygen\reloaded.nfo
C:\Users\Delphine\Documents\Downloads\Les.Sims2.la.Totale.FRENCH-Kilcop-[nucleus-fr.org]\13 - Animaux & Cie\Keygen\rld-s2pekg.exe
C:\Users\Delphine\Documents\Photofiltre Studio\Textures\grungy_texture_by_crackpotstock.jpg
[ UAC => 1 ]
1 - "C:\ToolBar SD\TB_1.txt" - 09/09/2008|13:46 - Option : [1]
-----------\\ Fin du rapport a 13:46:44,43
voilà le rapport
-----------\\ ToolBar S&D 1.1.8 XP/Vista
Microsoft® Windows Vista™ Édition Familiale Premium ( v6.0.6001 ) Service Pack 1
X86-based PC ( Multiprocessor Free : Intel(R) Core(TM)2 Duo CPU T5550 @ 1.83GHz )
BIOS : PhoenixBIOS 4.0 Release 6.1
USER : Delphine ( Administrator )
BOOT : Normal boot
Antivirus : AVG Anti-Virus Free 8.0 (Activated)
"C:\ToolBar SD" ( MAJ : 07-09-2008|12:20 )
Option : [1] ( 09/09/2008|13:46 )
[ UAC => 0 ]
-----------\\ Recherche de Fichiers / Dossiers ...
C:\PROGRA~2\MICROS~1\Windows\STARTM~1\Programs\Dealio
C:\Program Files\Dealio
C:\Program Files\Dealio\DealioAU.exe
C:\Program Files\Dealio\kb127
C:\Program Files\Dealio\SearchSettingsKit.exe
C:\Program Files\DAEMON Tools Toolbar
C:\Program Files\DAEMON Tools Toolbar\DTToolbar.dll
C:\Program Files\DAEMON Tools Toolbar\FirefoxDTT
C:\Program Files\DAEMON Tools Toolbar\Resources
C:\Program Files\DAEMON Tools Toolbar\uninst.exe
C:\Program Files\DAEMON Tools Toolbar\_DTLite.xml
C:\Program Files\Search Settings
C:\Program Files\Search Settings\kb127
C:\Program Files\Search Settings\SearchSettings.exe
-----------\\ [..\Internet Explorer\Main]
[HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main]
"Local Page"="C:\\windows\\system32\\blank.htm"
"Search Page"="http://www.microsoft.com/isapi/redir.dll?prd=ie&ar=iesearch"
"Start Page"="http://www.microsoft.com/isapi/redir.dll?prd=ie&pver=6&ar=msnhome"
"Default_Search_URL"="http://www.microsoft.com/isapi/redir.dll?prd=ie&ar=iesearch"
"Url"="https://www.msn.com/fr-fr/actualite/"
[HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\Main]
"Start Page"="http://www.microsoft.com/isapi/redir.dll?prd={SUB_PRD}&clcid={SUB_CLSID}&pver={SUB_PVER}&ar=home"
"Default_Page_URL"="https://www.msn.com/fr-fr/?ocid=iehp"
"Default_Search_URL"="https://www.bing.com/?toHttps=1&redig=5FC791212101479BAFBE1A679848B1AF"
"Search Page"="https://www.bing.com/?toHttps=1&redig=5FC791212101479BAFBE1A679848B1AF"
"Local Page"="C:\\windows\\system32\\blank.htm"
--------------------\\ Recherche d'autres infections
--------------------\\ ROOTKIT !!
[HKLM\..\CurrentControlSet\Enum\Root\LEGACY_TDSSSERV] -- ROOTKIT Tibs !
[HKLM\..\CurrentControlSet\Services\tdssserv] -- ROOTKIT Tibs !
[HKLM\..\CurrentControlSet\Enum\Root\tdssserv] -- ROOTKIT Tibs !
[HKLM\..\ControlSet001\Enum\Root\LEGACY_TDSSSERV] -- ROOTKIT Tibs !
[HKLM\..\ControlSet001\Services\tdssserv] -- ROOTKIT Tibs !
[HKLM\..\ControlSet001\Enum\Root\tdssserv] -- ROOTKIT Tibs !
[HKLM\..\ControlSet002\Enum\Root\LEGACY_TDSSSERV] -- ROOTKIT Tibs !
[HKLM\..\ControlSet002\Services\tdssserv] -- ROOTKIT Tibs !
[HKLM\..\ControlSet002\Enum\Root\tdssserv] -- ROOTKIT Tibs !
--------------------\\ Cracks & Keygens ..
C:\Users\Delphine\Documents\Downloads\Les.Sims2.la.Totale.FRENCH-Kilcop-[nucleus-fr.org]\01 - Les Sims 2\crack
C:\Users\Delphine\Documents\Downloads\Les.Sims2.la.Totale.FRENCH-Kilcop-[nucleus-fr.org]\01 - Les Sims 2\crack\mo-s2dvd.nfo
C:\Users\Delphine\Documents\Downloads\Les.Sims2.la.Totale.FRENCH-Kilcop-[nucleus-fr.org]\01 - Les Sims 2\crack\Sims2.exe
C:\Users\Delphine\Documents\Downloads\Les.Sims2.la.Totale.FRENCH-Kilcop-[nucleus-fr.org]\04 - Acad‚mie\crack
C:\Users\Delphine\Documents\Downloads\Les.Sims2.la.Totale.FRENCH-Kilcop-[nucleus-fr.org]\04 - Acad‚mie\crack\readme.txt
C:\Users\Delphine\Documents\Downloads\Les.Sims2.la.Totale.FRENCH-Kilcop-[nucleus-fr.org]\04 - Acad‚mie\crack\Sims2EP1_1.mir
C:\Users\Delphine\Documents\Downloads\Les.Sims2.la.Totale.FRENCH-Kilcop-[nucleus-fr.org]\06 - Nuits de Folie\crack
C:\Users\Delphine\Documents\Downloads\Les.Sims2.la.Totale.FRENCH-Kilcop-[nucleus-fr.org]\06 - Nuits de Folie\crack\tnts23m1.rar
C:\Users\Delphine\Documents\Downloads\Les.Sims2.la.Totale.FRENCH-Kilcop-[nucleus-fr.org]\08 - La Bonne Affaire\crack
C:\Users\Delphine\Documents\Downloads\Les.Sims2.la.Totale.FRENCH-Kilcop-[nucleus-fr.org]\08 - La Bonne Affaire\crack\rld-sofb
C:\Users\Delphine\Documents\Downloads\Les.Sims2.la.Totale.FRENCH-Kilcop-[nucleus-fr.org]\08 - La Bonne Affaire\crack\rld-sofb\reloaded.nfo
C:\Users\Delphine\Documents\Downloads\Les.Sims2.la.Totale.FRENCH-Kilcop-[nucleus-fr.org]\08 - La Bonne Affaire\crack\rld-sofb\Sims2EP3.exe
C:\Users\Delphine\Documents\Downloads\Les.Sims2.la.Totale.FRENCH-Kilcop-[nucleus-fr.org]\10 - Fun en famille\Crack
C:\Users\Delphine\Documents\Downloads\Les.Sims2.la.Totale.FRENCH-Kilcop-[nucleus-fr.org]\10 - Fun en famille\Crack\reloaded.nfo
C:\Users\Delphine\Documents\Downloads\Les.Sims2.la.Totale.FRENCH-Kilcop-[nucleus-fr.org]\10 - Fun en famille\Crack\Sims2SP1.exe
C:\Users\Delphine\Documents\Downloads\Les.Sims2.la.Totale.FRENCH-Kilcop-[nucleus-fr.org]\12 - Glamour\Crack
C:\Users\Delphine\Documents\Downloads\Les.Sims2.la.Totale.FRENCH-Kilcop-[nucleus-fr.org]\12 - Glamour\Crack\keygen.exe
C:\Users\Delphine\Documents\Downloads\Les.Sims2.la.Totale.FRENCH-Kilcop-[nucleus-fr.org]\12 - Glamour\Crack\rzr-sglc.nfo
C:\Users\Delphine\Documents\Downloads\Les.Sims2.la.Totale.FRENCH-Kilcop-[nucleus-fr.org]\12 - Glamour\Crack\Sims2SP2.exe
C:\Users\Delphine\Documents\Downloads\Les.Sims2.la.Totale.FRENCH-Kilcop-[nucleus-fr.org]\13 - Animaux & Cie\Crack
C:\Users\Delphine\Documents\Downloads\Les.Sims2.la.Totale.FRENCH-Kilcop-[nucleus-fr.org]\13 - Animaux & Cie\Keygen
C:\Users\Delphine\Documents\Downloads\Les.Sims2.la.Totale.FRENCH-Kilcop-[nucleus-fr.org]\13 - Animaux & Cie\Crack\Sims2EP4.exe
C:\Users\Delphine\Documents\Downloads\Les.Sims2.la.Totale.FRENCH-Kilcop-[nucleus-fr.org]\13 - Animaux & Cie\Keygen\reloaded.nfo
C:\Users\Delphine\Documents\Downloads\Les.Sims2.la.Totale.FRENCH-Kilcop-[nucleus-fr.org]\13 - Animaux & Cie\Keygen\rld-s2pekg.exe
C:\Users\Delphine\Documents\Photofiltre Studio\Textures\grungy_texture_by_crackpotstock.jpg
[ UAC => 1 ]
1 - "C:\ToolBar SD\TB_1.txt" - 09/09/2008|13:46 - Option : [1]
-----------\\ Fin du rapport a 13:46:44,43
Au contraire, heureusement que ça affiche certains de tes dossiers, maintenant je comprends mieux pourquoi ton ordinateur est infecté... Les cracks et keygens sont à bannir, la plupart d'entre eux sont infectés : https://forum.malekal.com/viewtopic.php?f=33&t=893
Je te conseille vivement de désinstaller tes logiciels crackés et supprime tous tes keygens, sinon ça ne sert à rien de continuer, les infections présentes sur ton ordinateur reviendront tout le temps ! Et ton ordinateur restera ouvert à tous les pirates...
Sinon ToolbarS&D a détecté la barre d'outil infecté que j'avais repéré sur Hijackthis, mais il a aussi trouvé des rootkits (programme qui est capable de camoufler tous les changements effectués lors de l'intrusion de l'infection...)
Je te conseille vivement de désinstaller tes logiciels crackés et supprime tous tes keygens, sinon ça ne sert à rien de continuer, les infections présentes sur ton ordinateur reviendront tout le temps ! Et ton ordinateur restera ouvert à tous les pirates...
Sinon ToolbarS&D a détecté la barre d'outil infecté que j'avais repéré sur Hijackthis, mais il a aussi trouvé des rootkits (programme qui est capable de camoufler tous les changements effectués lors de l'intrusion de l'infection...)
Bon j'ai capté j efface alors Les Sims... Je l'avais mis ça marchait pas j'mettais pas pris la tête dessus donc tant mieux d'un côté... Et dire que j'ai failli les graver sur cd... :/ Fais ch**r!
Enfin bref merci pour l'info je vais garder le lien que tu m'as donné comme ça je saurais
j'ai donc supprimer les sims... Je dois faire quoi alors pour enlever la barre d'outil qui me fait buguer ?
Enfin bref merci pour l'info je vais garder le lien que tu m'as donné comme ça je saurais
j'ai donc supprimer les sims... Je dois faire quoi alors pour enlever la barre d'outil qui me fait buguer ?
Ok, si tu as tout supprimé, on va réellement pouvoir désinfecter cette fois :
Désactive le contrôle des comptes utilisateurs (il se réactivera automatiquement à la fin du scan) :
* Va dans démarrer puis panneau de configuration
* Double Clique sur l'icône "Comptes d'utilisateurs"
Clique ensuite sur désactiver et valide.
Clique-droit sur le raccourci Toolbar-S&D sur le Bureau et choisis " Exécuter en tant qu' Administrateur ".
Tape sur "2" puis valide en appuyant sur "Entrée".
! Ne ferme pas la fenêtre lors de la suppression !
Un rapport sera généré, poste son contenu ici.
NOTE : Si ton Bureau ne réapparait pas, appuie simultanément sur Ctrl+Alt+Suppr pour ouvrir le Gestionnaire des tâches. Rends-toi sur l'onglet "Processus". Clique en haut à gauche sur Fichier et choisis "Exécuter..." Tape explorer puis valide.
Désactive le contrôle des comptes utilisateurs (il se réactivera automatiquement à la fin du scan) :
* Va dans démarrer puis panneau de configuration
* Double Clique sur l'icône "Comptes d'utilisateurs"
Clique ensuite sur désactiver et valide.
Clique-droit sur le raccourci Toolbar-S&D sur le Bureau et choisis " Exécuter en tant qu' Administrateur ".
Tape sur "2" puis valide en appuyant sur "Entrée".
! Ne ferme pas la fenêtre lors de la suppression !
Un rapport sera généré, poste son contenu ici.
NOTE : Si ton Bureau ne réapparait pas, appuie simultanément sur Ctrl+Alt+Suppr pour ouvrir le Gestionnaire des tâches. Rends-toi sur l'onglet "Processus". Clique en haut à gauche sur Fichier et choisis "Exécuter..." Tape explorer puis valide.
-----------\\ ToolBar S&D 1.1.8 XP/Vista
Microsoft® Windows Vista™ Édition Familiale Premium ( v6.0.6001 ) Service Pack 1
X86-based PC ( Multiprocessor Free : Intel(R) Core(TM)2 Duo CPU T5550 @ 1.83GHz )
BIOS : PhoenixBIOS 4.0 Release 6.1
USER : Delphine ( Administrator )
BOOT : Normal boot
Antivirus : AVG Anti-Virus Free 8.0 (Activated)
"C:\ToolBar SD" ( MAJ : 07-09-2008|12:20 )
Option : [2] ( 09/09/2008|20:02 )
[ UAC => 0 ]
-----------\\ SUPPRESSION
Supprime! - C:\PROGRA~2\MICROS~1\Windows\STARTM~1\Programs\Dealio
Supprime! - C:\Program Files\Dealio\DealioAU.exe
Supprime! - C:\Program Files\Dealio\kb127
Supprime! - C:\Program Files\Dealio\SearchSettingsKit.exe
Supprime! - C:\Program Files\DAEMON Tools Toolbar\DTToolbar.dll
Supprime! - C:\Program Files\DAEMON Tools Toolbar\FirefoxDTT
Supprime! - C:\Program Files\DAEMON Tools Toolbar\Resources
Supprime! - C:\Program Files\DAEMON Tools Toolbar\uninst.exe
Supprime! - C:\Program Files\DAEMON Tools Toolbar\_DTLite.xml
Supprime! - C:\Program Files\Search Settings\kb127
Supprime! - C:\Program Files\Search Settings\SearchSettings.exe
Supprime! - C:\Program Files\Dealio
Supprime! - C:\Program Files\DAEMON Tools Toolbar
Supprime! - C:\Program Files\Search Settings
-----------\\ Recherche de Fichiers / Dossiers ...
-----------\\ [..\Internet Explorer\Main]
[HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main]
"Local Page"="C:\\windows\\system32\\blank.htm"
"Search Page"="http://www.microsoft.com/isapi/redir.dll?prd=ie&ar=iesearch"
"Start Page"="http://www.microsoft.com/isapi/redir.dll?prd=ie&pver=6&ar=msnhome"
"Default_Search_URL"="http://www.microsoft.com/isapi/redir.dll?prd=ie&ar=iesearch"
"Url"="https://www.msn.com/fr-fr/actualite/"
[HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\Main]
"Start Page"="https://www.msn.com/fr-fr/"
"Default_Page_URL"="https://www.msn.com/fr-fr/?ocid=iehp"
"Default_Search_URL"="https://www.bing.com/?toHttps=1&redig=5FC791212101479BAFBE1A679848B1AF"
"Search Page"="https://www.bing.com/?toHttps=1&redig=5FC791212101479BAFBE1A679848B1AF"
"Local Page"="C:\\windows\\system32\\blank.htm"
--------------------\\ Recherche d'autres infections
--------------------\\ ROOTKIT !!
[HKLM\..\CurrentControlSet\Enum\Root\LEGACY_TDSSSERV] -- ROOTKIT Tibs !
[HKLM\..\CurrentControlSet\Services\tdssserv] -- ROOTKIT Tibs !
[HKLM\..\CurrentControlSet\Enum\Root\tdssserv] -- ROOTKIT Tibs !
[HKLM\..\ControlSet001\Enum\Root\LEGACY_TDSSSERV] -- ROOTKIT Tibs !
[HKLM\..\ControlSet001\Services\tdssserv] -- ROOTKIT Tibs !
[HKLM\..\ControlSet001\Enum\Root\tdssserv] -- ROOTKIT Tibs !
[HKLM\..\ControlSet002\Enum\Root\LEGACY_TDSSSERV] -- ROOTKIT Tibs !
[HKLM\..\ControlSet002\Services\tdssserv] -- ROOTKIT Tibs !
[HKLM\..\ControlSet002\Enum\Root\tdssserv] -- ROOTKIT Tibs !
--------------------\\ Cracks & Keygens ..
C:\Users\Delphine\Documents\Photofiltre Studio\Textures\grungy_texture_by_crackpotstock.jpg
[ UAC => 1 ]
1 - "C:\ToolBar SD\TB_1.txt" - 09/09/2008|13:46 - Option : [1]
2 - "C:\ToolBar SD\TB_2.txt" - 09/09/2008|20:03 - Option : [2]
-----------\\ Fin du rapport a 20:03:46,82
Microsoft® Windows Vista™ Édition Familiale Premium ( v6.0.6001 ) Service Pack 1
X86-based PC ( Multiprocessor Free : Intel(R) Core(TM)2 Duo CPU T5550 @ 1.83GHz )
BIOS : PhoenixBIOS 4.0 Release 6.1
USER : Delphine ( Administrator )
BOOT : Normal boot
Antivirus : AVG Anti-Virus Free 8.0 (Activated)
"C:\ToolBar SD" ( MAJ : 07-09-2008|12:20 )
Option : [2] ( 09/09/2008|20:02 )
[ UAC => 0 ]
-----------\\ SUPPRESSION
Supprime! - C:\PROGRA~2\MICROS~1\Windows\STARTM~1\Programs\Dealio
Supprime! - C:\Program Files\Dealio\DealioAU.exe
Supprime! - C:\Program Files\Dealio\kb127
Supprime! - C:\Program Files\Dealio\SearchSettingsKit.exe
Supprime! - C:\Program Files\DAEMON Tools Toolbar\DTToolbar.dll
Supprime! - C:\Program Files\DAEMON Tools Toolbar\FirefoxDTT
Supprime! - C:\Program Files\DAEMON Tools Toolbar\Resources
Supprime! - C:\Program Files\DAEMON Tools Toolbar\uninst.exe
Supprime! - C:\Program Files\DAEMON Tools Toolbar\_DTLite.xml
Supprime! - C:\Program Files\Search Settings\kb127
Supprime! - C:\Program Files\Search Settings\SearchSettings.exe
Supprime! - C:\Program Files\Dealio
Supprime! - C:\Program Files\DAEMON Tools Toolbar
Supprime! - C:\Program Files\Search Settings
-----------\\ Recherche de Fichiers / Dossiers ...
-----------\\ [..\Internet Explorer\Main]
[HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main]
"Local Page"="C:\\windows\\system32\\blank.htm"
"Search Page"="http://www.microsoft.com/isapi/redir.dll?prd=ie&ar=iesearch"
"Start Page"="http://www.microsoft.com/isapi/redir.dll?prd=ie&pver=6&ar=msnhome"
"Default_Search_URL"="http://www.microsoft.com/isapi/redir.dll?prd=ie&ar=iesearch"
"Url"="https://www.msn.com/fr-fr/actualite/"
[HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\Main]
"Start Page"="https://www.msn.com/fr-fr/"
"Default_Page_URL"="https://www.msn.com/fr-fr/?ocid=iehp"
"Default_Search_URL"="https://www.bing.com/?toHttps=1&redig=5FC791212101479BAFBE1A679848B1AF"
"Search Page"="https://www.bing.com/?toHttps=1&redig=5FC791212101479BAFBE1A679848B1AF"
"Local Page"="C:\\windows\\system32\\blank.htm"
--------------------\\ Recherche d'autres infections
--------------------\\ ROOTKIT !!
[HKLM\..\CurrentControlSet\Enum\Root\LEGACY_TDSSSERV] -- ROOTKIT Tibs !
[HKLM\..\CurrentControlSet\Services\tdssserv] -- ROOTKIT Tibs !
[HKLM\..\CurrentControlSet\Enum\Root\tdssserv] -- ROOTKIT Tibs !
[HKLM\..\ControlSet001\Enum\Root\LEGACY_TDSSSERV] -- ROOTKIT Tibs !
[HKLM\..\ControlSet001\Services\tdssserv] -- ROOTKIT Tibs !
[HKLM\..\ControlSet001\Enum\Root\tdssserv] -- ROOTKIT Tibs !
[HKLM\..\ControlSet002\Enum\Root\LEGACY_TDSSSERV] -- ROOTKIT Tibs !
[HKLM\..\ControlSet002\Services\tdssserv] -- ROOTKIT Tibs !
[HKLM\..\ControlSet002\Enum\Root\tdssserv] -- ROOTKIT Tibs !
--------------------\\ Cracks & Keygens ..
C:\Users\Delphine\Documents\Photofiltre Studio\Textures\grungy_texture_by_crackpotstock.jpg
[ UAC => 1 ]
1 - "C:\ToolBar SD\TB_1.txt" - 09/09/2008|13:46 - Option : [1]
2 - "C:\ToolBar SD\TB_2.txt" - 09/09/2008|20:03 - Option : [2]
-----------\\ Fin du rapport a 20:03:46,82