Virus alerte à côté de l'horloge
Résolu
wolffj
Messages postés
16
Statut
Membre
-
Utilisateur anonyme -
Utilisateur anonyme -
Bonjour,
Comme de nombreuses personnes, j'ai un 'virus alert' à côté de l'horloge. J'ai constaté que tout cela pouvait être résolu mais nqu'il faut poster un rapport et seulement après on peut savoir quoi faire. Après avoir lu certains messages j'ai téléchargé DSS et voici le rapport remis :
Deckard's System Scanner v20071014.68
Run by Wolff on 2008-08-15 21:59:58
Computer is in Normal Mode.
--------------------------------------------------------------------------------
-- System Restore --------------------------------------------------------------
Successfully created a Deckard's System Scanner Restore Point.
-- Last 5 Restore Point(s) --
28: 2008-08-15 20:00:03 UTC - RP333 - Deckard's System Scanner Restore Point
27: 2008-08-15 19:46:38 UTC - RP332 - Installé Ad-Aware
26: 2008-08-10 09:55:32 UTC - RP331 - Installé SYSTRAN Premium 5.0
25: 2008-08-09 16:54:25 UTC - RP330 - Configured VeohTV BETA
24: 2008-08-09 16:52:03 UTC - RP329 - Supprimé Microsoft Office Visio Professional 2003
-- First Restore Point --
1: 2008-05-12 09:21:04 UTC - RP306 - Point de vérification système
Backed up registry hives.
Performed disk cleanup.
-- HijackThis (run as Wolff.exe) -----------------------------------------------
Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 22:01: VIRUS ALERT!, on 15/08/2008
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v7.00 (7.00.6000.16674)
Boot mode: Normal
Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\Ati2evxx.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\Program Files\Lavasoft\Ad-Aware\aawservice.exe
C:\Program Files\Alwil Software\Avast4\aswUpdSv.exe
C:\WINDOWS\system32\Ati2evxx.exe
C:\WINDOWS\Explorer.EXE
C:\Program Files\ATI Technologies\ATI Control Panel\atiptaxx.exe
C:\Program Files\Analog Devices\SoundMAX\SMax4PNP.exe
C:\Program Files\Analog Devices\SoundMAX\Smax4.exe
C:\Program Files\Symantec\Norton Ghost\Agent\GhostTray.exe
C:\Program Files\Fichiers communs\Real\Update_OB\realsched.exe
C:\Program Files\CyberLink DVD Solution\PowerDVD\PDVDServ.exe
C:\Program Files\Sony Ericsson\Mobile2\Application Launcher\Application Launcher.exe
C:\Program Files\QuickTime\qttask.exe
C:\WINDOWS\ZSSnp211.exe
C:\WINDOWS\Domino.exe
C:\Program Files\Winamp\winampa.exe
D:\Omnipage pro\opware32.exe
D:\Presto! PVR\Monitor.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\Fichiers communs\Ahead\Lib\NMBgMonitor.exe
C:\Program Files\Fichiers communs\Teleca Shared\CapabilityManager.exe
C:\Program Files\Fichiers communs\Ahead\Lib\NMIndexStoreSvr.exe
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\System32\GEARSec.exe
C:\Program Files\Fichiers communs\LightScribe\LSSrvc.exe
C:\Program Files\Symantec\Norton Ghost\Agent\PQV2iSvc.exe
C:\Program Files\Analog Devices\SoundMAX\SMAgent.exe
C:\WINDOWS\system32\svchost.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\WINDOWS\system32\wscntfy.exe
C:\Program Files\Fichiers communs\Teleca Shared\Generic.exe
C:\Program Files\Sony Ericsson\Mobile2\Mobile Phone Monitor\epmworker.exe
C:\Documents and Settings\Wolff\Bureau\dss.exe
C:\PROGRA~1\TRENDM~1\HIJACK~1\Wolff.exe
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = https://www.google.fr/?gws_rd=ssl
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = https://www.msn.com/fr-fr/?ocid=iehp
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = https://www.bing.com/?toHttps=1&redig=5FC791212101479BAFBE1A679848B1AF
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = https://www.bing.com/?toHttps=1&redig=5FC791212101479BAFBE1A679848B1AF
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = https://www.msn.com/fr-fr/?ocid=iehp
R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName = Liens
O2 - BHO: (no name) - {7E853D72-626A-48EC-A868-BA8D5E23E045} - (no file)
O2 - BHO: QXK Olive - {DF6C9A95-CDD0-4EFC-9C2A-B6CA365F7396} - C:\WINDOWS\wnlmdakqlag.dll (file missing)
O3 - Toolbar: Systran50perso.IEPlugIn - {A5899B52-3AF9-4F56-85FE-AD7B3BE8490F} - C:\Program Files\SYSTRAN\5.0\Personal\IEPlugIn.dll
O3 - Toolbar: Systran50premi.IEPlugIn - {9A0844DB-84CF-4440-BDB1-1F4F7C4F7FB0} - C:\Program Files\SYSTRAN\5.0\Premium\IEPlugIn.dll
O3 - Toolbar: bgrqfetx - {892B88A3-DC94-4A1F-A75A-9AA50061A683} - C:\WINDOWS\bgrqfetx.dll
O4 - HKLM\..\Run: [ATIPTA] C:\Program Files\ATI Technologies\ATI Control Panel\atiptaxx.exe
O4 - HKLM\..\Run: [SoundMAXPnP] C:\Program Files\Analog Devices\SoundMAX\SMax4PNP.exe
O4 - HKLM\..\Run: [SoundMAX] "C:\Program Files\Analog Devices\SoundMAX\Smax4.exe" /tray
O4 - HKLM\..\Run: [PinnacleDriverCheck] C:\WINDOWS\system32\PSDrvCheck.exe -CheckReg
O4 - HKLM\..\Run: [Norton Ghost 9.0] C:\Program Files\Symantec\Norton Ghost\Agent\GhostTray.exe
O4 - HKLM\..\Run: [REGSHAVE] C:\Program Files\REGSHAVE\REGSHAVE.EXE /AUTORUN
O4 - HKLM\..\Run: [TkBellExe] "C:\Program Files\Fichiers communs\Real\Update_OB\realsched.exe" -osboot
O4 - HKLM\..\Run: [RemoteControl] "C:\Program Files\CyberLink DVD Solution\PowerDVD\PDVDServ.exe"
O4 - HKLM\..\Run: [Sony Ericsson PC Suite] "C:\Program Files\Sony Ericsson\Mobile2\Application Launcher\Application Launcher.exe" /startoptions
O4 - HKLM\..\Run: [NeroFilterCheck] C:\Program Files\Fichiers communs\Ahead\Lib\NeroCheck.exe
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
O4 - HKLM\..\Run: [ZSSnp211] C:\WINDOWS\ZSSnp211.exe
O4 - HKLM\..\Run: [Domino] C:\WINDOWS\Domino.exe
O4 - HKLM\..\Run: [WinampAgent] C:\Program Files\Winamp\winampa.exe
O4 - HKLM\..\Run: [OmniPage] D:\Omnipage pro\opware32.exe
O4 - HKLM\..\Run: [ChangeFilterMerit] D:\Presto! PVR\ChangeFilterMerit.exe
O4 - HKLM\..\Run: [Presto! PVR Monitor] D:\Presto! PVR\Monitor.exe
O4 - HKLM\..\Run: [PDF Converter Registry Controller] "C:\Program Files\SYSTRAN\5.0\Premium\RegistryController.exe"
O4 - HKLM\..\Run: [avast!] C:\PROGRA~1\ALWILS~1\Avast4\ashDisp.exe
O4 - HKCU\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\ctfmon.exe
O4 - HKCU\..\Run: [BgMonitor_{79662E04-7C6C-4d9f-84C7-88D8A56B10AA}] "C:\Program Files\Fichiers communs\Ahead\Lib\NMBgMonitor.exe"
O4 - HKUS\S-1-5-19\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'SERVICE LOCAL')
O4 - HKUS\S-1-5-20\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'SERVICE RÉSEAU')
O4 - HKUS\S-1-5-18\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'SYSTEM')
O4 - HKUS\.DEFAULT\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'Default user')
O4 - Global Startup: Adobe Reader Speed Launch.lnk = C:\Program Files\Adobe\Acrobat 7.0\Reader\reader_sl.exe
O6 - HKCU\Software\Policies\Microsoft\Internet Explorer\Restrictions present
O7 - HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System, DisableRegedit=1
O8 - Extra context menu item: E&xporter vers Microsoft Excel - res://C:\PROGRA~1\MICROS~2\Office12\EXCEL.EXE/3000
O8 - Extra context menu item: Open and Translate in Word - res://C:\Program Files\SYSTRAN\5.0\Premium\IEShellExt.dll /10
O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O16 - DPF: {1D4DB7D2-6EC9-47A3-BD87-1E41684E07BB} - http://ak.exe.imgfarm.com/images/nocache/funwebproducts/ei/SmileyCentralFWBInitialSetup1.0.0.15-3.cab
O16 - DPF: {5C6698D9-7BE4-4122-8EC5-291D84DBD4A0} (Facebook Photo Uploader 4 Control) - http://upload.facebook.com/controls/FacebookPhotoUploader3.cab
O16 - DPF: {7584C670-2274-4EFB-B00B-D6AABA6D3850} (Microsoft RDP Client Control (redist)) - http://univ-r.u-strasbg.fr/TSWeb/msrdp.cab
O16 - DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} (Shockwave Flash Object) - http://fpdownload2.macromedia.com/get/flashplayer/current/swflash.cab
O16 - DPF: {D3D0E7BC-170E-11D0-B2D1-00AA00B92B50} (FireEvent Control) - http://singles.sfr.fr/dlm/ax/fireev.2.7.0.0.cab
O16 - DPF: {D4323BF2-006A-4440-A2F5-27E3E7AB25F8} (Virtools WebPlayer Class) - http://a532.g.akamai.net/...
O21 - SSODL: xokvrpwg - {9E355653-7606-4C66-A259-44943BCEB080} - C:\WINDOWS\xokvrpwg.dll (file missing)
O21 - SSODL: tfnslopk - {0E2C046A-B22F-4511-991E-476CDB781DB1} - C:\WINDOWS\tfnslopk.dll
O23 - Service: Lavasoft Ad-Aware Service (aawservice) - Lavasoft - C:\Program Files\Lavasoft\Ad-Aware\aawservice.exe
O23 - Service: avast! iAVS4 Control Service (aswUpdSv) - ALWIL Software - C:\Program Files\Alwil Software\Avast4\aswUpdSv.exe
O23 - Service: Ati HotKey Poller - Unknown owner - C:\WINDOWS\system32\Ati2evxx.exe
O23 - Service: ATI Smart - Unknown owner - C:\WINDOWS\system32\ati2sgag.exe
O23 - Service: avast! Antivirus - ALWIL Software - C:\Program Files\Alwil Software\Avast4\ashServ.exe
O23 - Service: avast! Mail Scanner - ALWIL Software - C:\Program Files\Alwil Software\Avast4\ashMaiSv.exe
O23 - Service: avast! Web Scanner - ALWIL Software - C:\Program Files\Alwil Software\Avast4\ashWebSv.exe
O23 - Service: GEARSecurity - GEAR Software - C:\WINDOWS\System32\GEARSec.exe
O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Fichiers communs\InstallShield\Driver\11\Intel 32\IDriverT.exe
O23 - Service: Service de l'iPod (iPod Service) - Unknown owner - C:\Program Files\iPod\bin\iPodService.exe (file missing)
O23 - Service: LightScribeService Direct Disc Labeling Service (LightScribeService) - Hewlett-Packard Company - C:\Program Files\Fichiers communs\LightScribe\LSSrvc.exe
O23 - Service: NBService - Nero AG - C:\Program Files\Nero\Nero 7\Nero BackItUp\NBService.exe
O23 - Service: Norton Ghost - Symantec Corporation - C:\Program Files\Symantec\Norton Ghost\Agent\PQV2iSvc.exe
O23 - Service: SoundMAX Agent Service (SoundMAX Agent Service (default)) - Analog Devices, Inc. - C:\Program Files\Analog Devices\SoundMAX\SMAgent.exe
Comme de nombreuses personnes, j'ai un 'virus alert' à côté de l'horloge. J'ai constaté que tout cela pouvait être résolu mais nqu'il faut poster un rapport et seulement après on peut savoir quoi faire. Après avoir lu certains messages j'ai téléchargé DSS et voici le rapport remis :
Deckard's System Scanner v20071014.68
Run by Wolff on 2008-08-15 21:59:58
Computer is in Normal Mode.
--------------------------------------------------------------------------------
-- System Restore --------------------------------------------------------------
Successfully created a Deckard's System Scanner Restore Point.
-- Last 5 Restore Point(s) --
28: 2008-08-15 20:00:03 UTC - RP333 - Deckard's System Scanner Restore Point
27: 2008-08-15 19:46:38 UTC - RP332 - Installé Ad-Aware
26: 2008-08-10 09:55:32 UTC - RP331 - Installé SYSTRAN Premium 5.0
25: 2008-08-09 16:54:25 UTC - RP330 - Configured VeohTV BETA
24: 2008-08-09 16:52:03 UTC - RP329 - Supprimé Microsoft Office Visio Professional 2003
-- First Restore Point --
1: 2008-05-12 09:21:04 UTC - RP306 - Point de vérification système
Backed up registry hives.
Performed disk cleanup.
-- HijackThis (run as Wolff.exe) -----------------------------------------------
Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 22:01: VIRUS ALERT!, on 15/08/2008
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v7.00 (7.00.6000.16674)
Boot mode: Normal
Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\Ati2evxx.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\Program Files\Lavasoft\Ad-Aware\aawservice.exe
C:\Program Files\Alwil Software\Avast4\aswUpdSv.exe
C:\WINDOWS\system32\Ati2evxx.exe
C:\WINDOWS\Explorer.EXE
C:\Program Files\ATI Technologies\ATI Control Panel\atiptaxx.exe
C:\Program Files\Analog Devices\SoundMAX\SMax4PNP.exe
C:\Program Files\Analog Devices\SoundMAX\Smax4.exe
C:\Program Files\Symantec\Norton Ghost\Agent\GhostTray.exe
C:\Program Files\Fichiers communs\Real\Update_OB\realsched.exe
C:\Program Files\CyberLink DVD Solution\PowerDVD\PDVDServ.exe
C:\Program Files\Sony Ericsson\Mobile2\Application Launcher\Application Launcher.exe
C:\Program Files\QuickTime\qttask.exe
C:\WINDOWS\ZSSnp211.exe
C:\WINDOWS\Domino.exe
C:\Program Files\Winamp\winampa.exe
D:\Omnipage pro\opware32.exe
D:\Presto! PVR\Monitor.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\Fichiers communs\Ahead\Lib\NMBgMonitor.exe
C:\Program Files\Fichiers communs\Teleca Shared\CapabilityManager.exe
C:\Program Files\Fichiers communs\Ahead\Lib\NMIndexStoreSvr.exe
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\System32\GEARSec.exe
C:\Program Files\Fichiers communs\LightScribe\LSSrvc.exe
C:\Program Files\Symantec\Norton Ghost\Agent\PQV2iSvc.exe
C:\Program Files\Analog Devices\SoundMAX\SMAgent.exe
C:\WINDOWS\system32\svchost.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\WINDOWS\system32\wscntfy.exe
C:\Program Files\Fichiers communs\Teleca Shared\Generic.exe
C:\Program Files\Sony Ericsson\Mobile2\Mobile Phone Monitor\epmworker.exe
C:\Documents and Settings\Wolff\Bureau\dss.exe
C:\PROGRA~1\TRENDM~1\HIJACK~1\Wolff.exe
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = https://www.google.fr/?gws_rd=ssl
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = https://www.msn.com/fr-fr/?ocid=iehp
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = https://www.bing.com/?toHttps=1&redig=5FC791212101479BAFBE1A679848B1AF
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = https://www.bing.com/?toHttps=1&redig=5FC791212101479BAFBE1A679848B1AF
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = https://www.msn.com/fr-fr/?ocid=iehp
R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName = Liens
O2 - BHO: (no name) - {7E853D72-626A-48EC-A868-BA8D5E23E045} - (no file)
O2 - BHO: QXK Olive - {DF6C9A95-CDD0-4EFC-9C2A-B6CA365F7396} - C:\WINDOWS\wnlmdakqlag.dll (file missing)
O3 - Toolbar: Systran50perso.IEPlugIn - {A5899B52-3AF9-4F56-85FE-AD7B3BE8490F} - C:\Program Files\SYSTRAN\5.0\Personal\IEPlugIn.dll
O3 - Toolbar: Systran50premi.IEPlugIn - {9A0844DB-84CF-4440-BDB1-1F4F7C4F7FB0} - C:\Program Files\SYSTRAN\5.0\Premium\IEPlugIn.dll
O3 - Toolbar: bgrqfetx - {892B88A3-DC94-4A1F-A75A-9AA50061A683} - C:\WINDOWS\bgrqfetx.dll
O4 - HKLM\..\Run: [ATIPTA] C:\Program Files\ATI Technologies\ATI Control Panel\atiptaxx.exe
O4 - HKLM\..\Run: [SoundMAXPnP] C:\Program Files\Analog Devices\SoundMAX\SMax4PNP.exe
O4 - HKLM\..\Run: [SoundMAX] "C:\Program Files\Analog Devices\SoundMAX\Smax4.exe" /tray
O4 - HKLM\..\Run: [PinnacleDriverCheck] C:\WINDOWS\system32\PSDrvCheck.exe -CheckReg
O4 - HKLM\..\Run: [Norton Ghost 9.0] C:\Program Files\Symantec\Norton Ghost\Agent\GhostTray.exe
O4 - HKLM\..\Run: [REGSHAVE] C:\Program Files\REGSHAVE\REGSHAVE.EXE /AUTORUN
O4 - HKLM\..\Run: [TkBellExe] "C:\Program Files\Fichiers communs\Real\Update_OB\realsched.exe" -osboot
O4 - HKLM\..\Run: [RemoteControl] "C:\Program Files\CyberLink DVD Solution\PowerDVD\PDVDServ.exe"
O4 - HKLM\..\Run: [Sony Ericsson PC Suite] "C:\Program Files\Sony Ericsson\Mobile2\Application Launcher\Application Launcher.exe" /startoptions
O4 - HKLM\..\Run: [NeroFilterCheck] C:\Program Files\Fichiers communs\Ahead\Lib\NeroCheck.exe
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
O4 - HKLM\..\Run: [ZSSnp211] C:\WINDOWS\ZSSnp211.exe
O4 - HKLM\..\Run: [Domino] C:\WINDOWS\Domino.exe
O4 - HKLM\..\Run: [WinampAgent] C:\Program Files\Winamp\winampa.exe
O4 - HKLM\..\Run: [OmniPage] D:\Omnipage pro\opware32.exe
O4 - HKLM\..\Run: [ChangeFilterMerit] D:\Presto! PVR\ChangeFilterMerit.exe
O4 - HKLM\..\Run: [Presto! PVR Monitor] D:\Presto! PVR\Monitor.exe
O4 - HKLM\..\Run: [PDF Converter Registry Controller] "C:\Program Files\SYSTRAN\5.0\Premium\RegistryController.exe"
O4 - HKLM\..\Run: [avast!] C:\PROGRA~1\ALWILS~1\Avast4\ashDisp.exe
O4 - HKCU\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\ctfmon.exe
O4 - HKCU\..\Run: [BgMonitor_{79662E04-7C6C-4d9f-84C7-88D8A56B10AA}] "C:\Program Files\Fichiers communs\Ahead\Lib\NMBgMonitor.exe"
O4 - HKUS\S-1-5-19\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'SERVICE LOCAL')
O4 - HKUS\S-1-5-20\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'SERVICE RÉSEAU')
O4 - HKUS\S-1-5-18\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'SYSTEM')
O4 - HKUS\.DEFAULT\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'Default user')
O4 - Global Startup: Adobe Reader Speed Launch.lnk = C:\Program Files\Adobe\Acrobat 7.0\Reader\reader_sl.exe
O6 - HKCU\Software\Policies\Microsoft\Internet Explorer\Restrictions present
O7 - HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System, DisableRegedit=1
O8 - Extra context menu item: E&xporter vers Microsoft Excel - res://C:\PROGRA~1\MICROS~2\Office12\EXCEL.EXE/3000
O8 - Extra context menu item: Open and Translate in Word - res://C:\Program Files\SYSTRAN\5.0\Premium\IEShellExt.dll /10
O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O16 - DPF: {1D4DB7D2-6EC9-47A3-BD87-1E41684E07BB} - http://ak.exe.imgfarm.com/images/nocache/funwebproducts/ei/SmileyCentralFWBInitialSetup1.0.0.15-3.cab
O16 - DPF: {5C6698D9-7BE4-4122-8EC5-291D84DBD4A0} (Facebook Photo Uploader 4 Control) - http://upload.facebook.com/controls/FacebookPhotoUploader3.cab
O16 - DPF: {7584C670-2274-4EFB-B00B-D6AABA6D3850} (Microsoft RDP Client Control (redist)) - http://univ-r.u-strasbg.fr/TSWeb/msrdp.cab
O16 - DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} (Shockwave Flash Object) - http://fpdownload2.macromedia.com/get/flashplayer/current/swflash.cab
O16 - DPF: {D3D0E7BC-170E-11D0-B2D1-00AA00B92B50} (FireEvent Control) - http://singles.sfr.fr/dlm/ax/fireev.2.7.0.0.cab
O16 - DPF: {D4323BF2-006A-4440-A2F5-27E3E7AB25F8} (Virtools WebPlayer Class) - http://a532.g.akamai.net/...
O21 - SSODL: xokvrpwg - {9E355653-7606-4C66-A259-44943BCEB080} - C:\WINDOWS\xokvrpwg.dll (file missing)
O21 - SSODL: tfnslopk - {0E2C046A-B22F-4511-991E-476CDB781DB1} - C:\WINDOWS\tfnslopk.dll
O23 - Service: Lavasoft Ad-Aware Service (aawservice) - Lavasoft - C:\Program Files\Lavasoft\Ad-Aware\aawservice.exe
O23 - Service: avast! iAVS4 Control Service (aswUpdSv) - ALWIL Software - C:\Program Files\Alwil Software\Avast4\aswUpdSv.exe
O23 - Service: Ati HotKey Poller - Unknown owner - C:\WINDOWS\system32\Ati2evxx.exe
O23 - Service: ATI Smart - Unknown owner - C:\WINDOWS\system32\ati2sgag.exe
O23 - Service: avast! Antivirus - ALWIL Software - C:\Program Files\Alwil Software\Avast4\ashServ.exe
O23 - Service: avast! Mail Scanner - ALWIL Software - C:\Program Files\Alwil Software\Avast4\ashMaiSv.exe
O23 - Service: avast! Web Scanner - ALWIL Software - C:\Program Files\Alwil Software\Avast4\ashWebSv.exe
O23 - Service: GEARSecurity - GEAR Software - C:\WINDOWS\System32\GEARSec.exe
O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Fichiers communs\InstallShield\Driver\11\Intel 32\IDriverT.exe
O23 - Service: Service de l'iPod (iPod Service) - Unknown owner - C:\Program Files\iPod\bin\iPodService.exe (file missing)
O23 - Service: LightScribeService Direct Disc Labeling Service (LightScribeService) - Hewlett-Packard Company - C:\Program Files\Fichiers communs\LightScribe\LSSrvc.exe
O23 - Service: NBService - Nero AG - C:\Program Files\Nero\Nero 7\Nero BackItUp\NBService.exe
O23 - Service: Norton Ghost - Symantec Corporation - C:\Program Files\Symantec\Norton Ghost\Agent\PQV2iSvc.exe
O23 - Service: SoundMAX Agent Service (SoundMAX Agent Service (default)) - Analog Devices, Inc. - C:\Program Files\Analog Devices\SoundMAX\SMAgent.exe
A voir également:
- Virus alerte à côté de l'horloge
- Comment supprimer fausse alerte virus mcafee - Accueil - Piratage
- Appli horloge - Télécharger - Guide Android
- Horloge mondiale gratuite - Télécharger - Outils professionnels
- Alerte virus google - Accueil - Virus
- Horloge en ligne aesthetic - Télécharger - Thèmes & Fonds d'écran
26 réponses
Salut,
# Télécharge ceci: (merci a S!RI pour ce petit programme).
http://siri.urz.free.fr/Fix/SmitfraudFix.exe
Exécute le, Double click sur Smitfraudfix.exe choisit l’option 1,
voila a quoi cela ressemble : http://siri.urz.free.fr/Fix/SmitfraudFix.php
il va générer un rapport : copie/colle le sur le poste stp.
# Télécharge ceci: (merci a S!RI pour ce petit programme).
http://siri.urz.free.fr/Fix/SmitfraudFix.exe
Exécute le, Double click sur Smitfraudfix.exe choisit l’option 1,
voila a quoi cela ressemble : http://siri.urz.free.fr/Fix/SmitfraudFix.php
il va générer un rapport : copie/colle le sur le poste stp.
SmitFraudFix v2.337
Rapport fait à 22:45:25,79, 15/08/2008
Executé à partir de C:\Documents and Settings\Wolff\Bureau\SmitfraudFix
OS: Microsoft Windows XP [version 5.1.2600] - Windows_NT
Le type du système de fichiers est
Fix executé en mode normal
»»»»»»»»»»»»»»»»»»»»»»»» Process
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\Ati2evxx.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\Program Files\Lavasoft\Ad-Aware\aawservice.exe
C:\Program Files\Alwil Software\Avast4\aswUpdSv.exe
C:\WINDOWS\system32\Ati2evxx.exe
C:\WINDOWS\Explorer.EXE
C:\Program Files\ATI Technologies\ATI Control Panel\atiptaxx.exe
C:\Program Files\Analog Devices\SoundMAX\SMax4PNP.exe
C:\Program Files\Analog Devices\SoundMAX\Smax4.exe
C:\Program Files\Symantec\Norton Ghost\Agent\GhostTray.exe
C:\Program Files\Fichiers communs\Real\Update_OB\realsched.exe
C:\Program Files\CyberLink DVD Solution\PowerDVD\PDVDServ.exe
C:\Program Files\Sony Ericsson\Mobile2\Application Launcher\Application Launcher.exe
C:\Program Files\QuickTime\qttask.exe
C:\WINDOWS\ZSSnp211.exe
C:\WINDOWS\Domino.exe
C:\Program Files\Winamp\winampa.exe
D:\Omnipage pro\opware32.exe
D:\Presto! PVR\Monitor.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\Fichiers communs\Ahead\Lib\NMBgMonitor.exe
C:\Program Files\Fichiers communs\Teleca Shared\CapabilityManager.exe
C:\Program Files\Fichiers communs\Ahead\Lib\NMIndexStoreSvr.exe
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\System32\GEARSec.exe
C:\Program Files\Fichiers communs\LightScribe\LSSrvc.exe
C:\Program Files\Symantec\Norton Ghost\Agent\PQV2iSvc.exe
C:\Program Files\Analog Devices\SoundMAX\SMAgent.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\system32\wscntfy.exe
C:\Program Files\Fichiers communs\Teleca Shared\Generic.exe
C:\Program Files\Sony Ericsson\Mobile2\Mobile Phone Monitor\epmworker.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\WINDOWS\system32\cmd.exe
C:\Program Files\Internet Explorer\iexplore.exe
»»»»»»»»»»»»»»»»»»»»»»»» hosts
»»»»»»»»»»»»»»»»»»»»»»»» C:\
»»»»»»»»»»»»»»»»»»»»»»»» C:\WINDOWS
C:\WINDOWS\lnvegaow.exe PRESENT !
C:\WINDOWS\privacy_danger PRESENT !
»»»»»»»»»»»»»»»»»»»»»»»» C:\WINDOWS\system
»»»»»»»»»»»»»»»»»»»»»»»» C:\WINDOWS\Web
»»»»»»»»»»»»»»»»»»»»»»»» C:\WINDOWS\system32
C:\WINDOWS\system32\tdssservers.dat détecté, utilisez un scanner de Rootkit
C:\WINDOWS\system32\tdssinit.dll détecté, utilisez un scanner de Rootkit
C:\WINDOWS\system32\tdssl.dll détecté, utilisez un scanner de Rootkit
C:\WINDOWS\system32\tdsslog.dll détecté, utilisez un scanner de Rootkit
C:\WINDOWS\system32\tdssmain.dll détecté, utilisez un scanner de Rootkit
C:\WINDOWS\system32\drivers\tdssserv.sys détecté, utilisez un scanner de Rootkit
»»»»»»»»»»»»»»»»»»»»»»»» C:\WINDOWS\system32\LogFiles
»»»»»»»»»»»»»»»»»»»»»»»» C:\Documents and Settings\Wolff
»»»»»»»»»»»»»»»»»»»»»»»» C:\Documents and Settings\Wolff\Application Data
»»»»»»»»»»»»»»»»»»»»»»»» Menu Démarrer
»»»»»»»»»»»»»»»»»»»»»»»» C:\DOCUME~1\Wolff\Favoris
C:\DOCUME~1\Wolff\Favoris\Error Cleaner.url PRESENT !
C:\DOCUME~1\Wolff\Favoris\Privacy Protector.url PRESENT !
C:\DOCUME~1\Wolff\Favoris\Spyware?Malware Protection.url PRESENT !
»»»»»»»»»»»»»»»»»»»»»»»» Bureau
»»»»»»»»»»»»»»»»»»»»»»»» C:\Program Files
»»»»»»»»»»»»»»»»»»»»»»»» Clés corrompues
»»»»»»»»»»»»»»»»»»»»»»»» Eléments du bureau
[HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Desktop\Components\0]
"Source"="About:Home"
"SubscribedURL"="About:Home"
"FriendlyName"="Ma page d'accueil"
»»»»»»»»»»»»»»»»»»»»»»»» IEDFix
!!!Attention, les clés qui suivent ne sont pas forcément infectées!!!
IEDFix
Credits: Malware Analysis & Diagnostic
Code: S!Ri
»»»»»»»»»»»»»»»»»»»»»»»» VACFix
!!!Attention, les clés qui suivent ne sont pas forcément infectées!!!
VACFix
Credits: Malware Analysis & Diagnostic
Code: S!Ri
[!] Suspicious: bgrqfetx.dll
Toolbar: bgrqfetx - {892B88A3-DC94-4A1F-A75A-9AA50061A683}
TypeLib: {20E1148B-A9DB-4678-82AB-E3E72B0F2959}
Interface: {4C6B1408-FC27-4864-9B5D-F70A93A789C4}
Classe: bgrqfetx.bolb
Classe: bgrqfetx.ToolBar.1
[!] Suspicious: tfnslopk.dll
SSODL: tfnslopk - {0E2C046A-B22F-4511-991E-476CDB781DB1}
»»»»»»»»»»»»»»»»»»»»»»»» 404Fix
!!!Attention, les clés qui suivent ne sont pas forcément infectées!!!
404Fix
Credits: Malware Analysis & Diagnostic
Code: S!Ri
»»»»»»»»»»»»»»»»»»»»»»»» Sharedtaskscheduler
!!!Attention, les clés qui suivent ne sont pas forcément infectées!!!
SrchSTS.exe by S!Ri
Search SharedTaskScheduler's .dll
»»»»»»»»»»»»»»»»»»»»»»»» AppInit_DLLs
!!!Attention, les clés qui suivent ne sont pas forcément infectées!!!
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows]
"AppInit_DLLs"=""
»»»»»»»»»»»»»»»»»»»»»»»» Winlogon
!!!Attention, les clés qui suivent ne sont pas forcément infectées!!!
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon]
"Userinit"="C:\\WINDOWS\\system32\\userinit.exe,"
"System"=""
»»»»»»»»»»»»»»»»»»»»»»»» RK
»»»»»»»»»»»»»»»»»»»»»»»» DNS
Description: Marvell Yukon Gigabit Ethernet 10/100/1000Base-T Adapter, Copper RJ-45 - Miniport d'ordonnancement de paquets
DNS Server Search Order: 192.168.1.254
DNS Server Search Order: 82.216.111.122
DNS Server Search Order: 82.216.111.123
HKLM\SYSTEM\CCS\Services\Tcpip\..\{1ADA1522-EC6D-4FB7-9E89-10A7E54F6BE8}: DhcpNameServer=192.168.1.254 82.216.111.122 82.216.111.123
HKLM\SYSTEM\CS1\Services\Tcpip\..\{1ADA1522-EC6D-4FB7-9E89-10A7E54F6BE8}: DhcpNameServer=192.168.1.254 82.216.111.122 82.216.111.123
HKLM\SYSTEM\CS2\Services\Tcpip\..\{1ADA1522-EC6D-4FB7-9E89-10A7E54F6BE8}: DhcpNameServer=192.168.1.254 82.216.111.122 82.216.111.123
HKLM\SYSTEM\CCS\Services\Tcpip\Parameters: DhcpNameServer=192.168.1.254 82.216.111.122 82.216.111.123
HKLM\SYSTEM\CS1\Services\Tcpip\Parameters: DhcpNameServer=192.168.1.254 82.216.111.122 82.216.111.123
HKLM\SYSTEM\CS2\Services\Tcpip\Parameters: DhcpNameServer=192.168.1.254 82.216.111.122 82.216.111.123
»»»»»»»»»»»»»»»»»»»»»»»» Recherche infection wininet.dll
»»»»»»»»»»»»»»»»»»»»»»»» Fin
Rapport fait à 22:45:25,79, 15/08/2008
Executé à partir de C:\Documents and Settings\Wolff\Bureau\SmitfraudFix
OS: Microsoft Windows XP [version 5.1.2600] - Windows_NT
Le type du système de fichiers est
Fix executé en mode normal
»»»»»»»»»»»»»»»»»»»»»»»» Process
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\Ati2evxx.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\Program Files\Lavasoft\Ad-Aware\aawservice.exe
C:\Program Files\Alwil Software\Avast4\aswUpdSv.exe
C:\WINDOWS\system32\Ati2evxx.exe
C:\WINDOWS\Explorer.EXE
C:\Program Files\ATI Technologies\ATI Control Panel\atiptaxx.exe
C:\Program Files\Analog Devices\SoundMAX\SMax4PNP.exe
C:\Program Files\Analog Devices\SoundMAX\Smax4.exe
C:\Program Files\Symantec\Norton Ghost\Agent\GhostTray.exe
C:\Program Files\Fichiers communs\Real\Update_OB\realsched.exe
C:\Program Files\CyberLink DVD Solution\PowerDVD\PDVDServ.exe
C:\Program Files\Sony Ericsson\Mobile2\Application Launcher\Application Launcher.exe
C:\Program Files\QuickTime\qttask.exe
C:\WINDOWS\ZSSnp211.exe
C:\WINDOWS\Domino.exe
C:\Program Files\Winamp\winampa.exe
D:\Omnipage pro\opware32.exe
D:\Presto! PVR\Monitor.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\Fichiers communs\Ahead\Lib\NMBgMonitor.exe
C:\Program Files\Fichiers communs\Teleca Shared\CapabilityManager.exe
C:\Program Files\Fichiers communs\Ahead\Lib\NMIndexStoreSvr.exe
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\System32\GEARSec.exe
C:\Program Files\Fichiers communs\LightScribe\LSSrvc.exe
C:\Program Files\Symantec\Norton Ghost\Agent\PQV2iSvc.exe
C:\Program Files\Analog Devices\SoundMAX\SMAgent.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\system32\wscntfy.exe
C:\Program Files\Fichiers communs\Teleca Shared\Generic.exe
C:\Program Files\Sony Ericsson\Mobile2\Mobile Phone Monitor\epmworker.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\WINDOWS\system32\cmd.exe
C:\Program Files\Internet Explorer\iexplore.exe
»»»»»»»»»»»»»»»»»»»»»»»» hosts
»»»»»»»»»»»»»»»»»»»»»»»» C:\
»»»»»»»»»»»»»»»»»»»»»»»» C:\WINDOWS
C:\WINDOWS\lnvegaow.exe PRESENT !
C:\WINDOWS\privacy_danger PRESENT !
»»»»»»»»»»»»»»»»»»»»»»»» C:\WINDOWS\system
»»»»»»»»»»»»»»»»»»»»»»»» C:\WINDOWS\Web
»»»»»»»»»»»»»»»»»»»»»»»» C:\WINDOWS\system32
C:\WINDOWS\system32\tdssservers.dat détecté, utilisez un scanner de Rootkit
C:\WINDOWS\system32\tdssinit.dll détecté, utilisez un scanner de Rootkit
C:\WINDOWS\system32\tdssl.dll détecté, utilisez un scanner de Rootkit
C:\WINDOWS\system32\tdsslog.dll détecté, utilisez un scanner de Rootkit
C:\WINDOWS\system32\tdssmain.dll détecté, utilisez un scanner de Rootkit
C:\WINDOWS\system32\drivers\tdssserv.sys détecté, utilisez un scanner de Rootkit
»»»»»»»»»»»»»»»»»»»»»»»» C:\WINDOWS\system32\LogFiles
»»»»»»»»»»»»»»»»»»»»»»»» C:\Documents and Settings\Wolff
»»»»»»»»»»»»»»»»»»»»»»»» C:\Documents and Settings\Wolff\Application Data
»»»»»»»»»»»»»»»»»»»»»»»» Menu Démarrer
»»»»»»»»»»»»»»»»»»»»»»»» C:\DOCUME~1\Wolff\Favoris
C:\DOCUME~1\Wolff\Favoris\Error Cleaner.url PRESENT !
C:\DOCUME~1\Wolff\Favoris\Privacy Protector.url PRESENT !
C:\DOCUME~1\Wolff\Favoris\Spyware?Malware Protection.url PRESENT !
»»»»»»»»»»»»»»»»»»»»»»»» Bureau
»»»»»»»»»»»»»»»»»»»»»»»» C:\Program Files
»»»»»»»»»»»»»»»»»»»»»»»» Clés corrompues
»»»»»»»»»»»»»»»»»»»»»»»» Eléments du bureau
[HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Desktop\Components\0]
"Source"="About:Home"
"SubscribedURL"="About:Home"
"FriendlyName"="Ma page d'accueil"
»»»»»»»»»»»»»»»»»»»»»»»» IEDFix
!!!Attention, les clés qui suivent ne sont pas forcément infectées!!!
IEDFix
Credits: Malware Analysis & Diagnostic
Code: S!Ri
»»»»»»»»»»»»»»»»»»»»»»»» VACFix
!!!Attention, les clés qui suivent ne sont pas forcément infectées!!!
VACFix
Credits: Malware Analysis & Diagnostic
Code: S!Ri
[!] Suspicious: bgrqfetx.dll
Toolbar: bgrqfetx - {892B88A3-DC94-4A1F-A75A-9AA50061A683}
TypeLib: {20E1148B-A9DB-4678-82AB-E3E72B0F2959}
Interface: {4C6B1408-FC27-4864-9B5D-F70A93A789C4}
Classe: bgrqfetx.bolb
Classe: bgrqfetx.ToolBar.1
[!] Suspicious: tfnslopk.dll
SSODL: tfnslopk - {0E2C046A-B22F-4511-991E-476CDB781DB1}
»»»»»»»»»»»»»»»»»»»»»»»» 404Fix
!!!Attention, les clés qui suivent ne sont pas forcément infectées!!!
404Fix
Credits: Malware Analysis & Diagnostic
Code: S!Ri
»»»»»»»»»»»»»»»»»»»»»»»» Sharedtaskscheduler
!!!Attention, les clés qui suivent ne sont pas forcément infectées!!!
SrchSTS.exe by S!Ri
Search SharedTaskScheduler's .dll
»»»»»»»»»»»»»»»»»»»»»»»» AppInit_DLLs
!!!Attention, les clés qui suivent ne sont pas forcément infectées!!!
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows]
"AppInit_DLLs"=""
»»»»»»»»»»»»»»»»»»»»»»»» Winlogon
!!!Attention, les clés qui suivent ne sont pas forcément infectées!!!
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon]
"Userinit"="C:\\WINDOWS\\system32\\userinit.exe,"
"System"=""
»»»»»»»»»»»»»»»»»»»»»»»» RK
»»»»»»»»»»»»»»»»»»»»»»»» DNS
Description: Marvell Yukon Gigabit Ethernet 10/100/1000Base-T Adapter, Copper RJ-45 - Miniport d'ordonnancement de paquets
DNS Server Search Order: 192.168.1.254
DNS Server Search Order: 82.216.111.122
DNS Server Search Order: 82.216.111.123
HKLM\SYSTEM\CCS\Services\Tcpip\..\{1ADA1522-EC6D-4FB7-9E89-10A7E54F6BE8}: DhcpNameServer=192.168.1.254 82.216.111.122 82.216.111.123
HKLM\SYSTEM\CS1\Services\Tcpip\..\{1ADA1522-EC6D-4FB7-9E89-10A7E54F6BE8}: DhcpNameServer=192.168.1.254 82.216.111.122 82.216.111.123
HKLM\SYSTEM\CS2\Services\Tcpip\..\{1ADA1522-EC6D-4FB7-9E89-10A7E54F6BE8}: DhcpNameServer=192.168.1.254 82.216.111.122 82.216.111.123
HKLM\SYSTEM\CCS\Services\Tcpip\Parameters: DhcpNameServer=192.168.1.254 82.216.111.122 82.216.111.123
HKLM\SYSTEM\CS1\Services\Tcpip\Parameters: DhcpNameServer=192.168.1.254 82.216.111.122 82.216.111.123
HKLM\SYSTEM\CS2\Services\Tcpip\Parameters: DhcpNameServer=192.168.1.254 82.216.111.122 82.216.111.123
»»»»»»»»»»»»»»»»»»»»»»»» Recherche infection wininet.dll
»»»»»»»»»»»»»»»»»»»»»»»» Fin
# Démarre en mode sans échec :
Pour cela, tu tapotes la touche F8 dès le début de l’allumage du pc sans t’arrêter
Une fenêtre va s’ouvrir tu te déplaces avec les flèches du clavier sur démarrer en mode sans échec puis tape entrée.
Une fois sur le bureau s’il n’y a pas toutes les couleurs et autres c’est normal !
(Si F8 ne marche pas utilise la touche F5).
----------------------------------------------------------------------------
# Relance le programme Smitfraud :
Cette fois choisit l’option 2, répond oui a tous ;
Sauvegarde le rapport, Redémarre en mode normal, copie/colle le rapport sauvegardé sur le forum
Pour cela, tu tapotes la touche F8 dès le début de l’allumage du pc sans t’arrêter
Une fenêtre va s’ouvrir tu te déplaces avec les flèches du clavier sur démarrer en mode sans échec puis tape entrée.
Une fois sur le bureau s’il n’y a pas toutes les couleurs et autres c’est normal !
(Si F8 ne marche pas utilise la touche F5).
----------------------------------------------------------------------------
# Relance le programme Smitfraud :
Cette fois choisit l’option 2, répond oui a tous ;
Sauvegarde le rapport, Redémarre en mode normal, copie/colle le rapport sauvegardé sur le forum
j'ai tout fait mais maintenant, en mode normal, je ne peux plus acceder à rien. Je clique rien ne se passe, mon curseur se met en sablier une fois que je suis sur la barre des tâches et mon écran est bleu ( l'image de fond d'écran n'existe plus).
Le rapport est enregistré sur le bureau mais pas moyen de l'ouvrir.
J'écris depuis un autre ordinateur, ca qui peut expliquer cette réponse.
Le rapport est enregistré sur le bureau mais pas moyen de l'ouvrir.
J'écris depuis un autre ordinateur, ca qui peut expliquer cette réponse.
Vous n’avez pas trouvé la réponse que vous recherchez ?
Posez votre question
-> Redémarre en mode sans échec avec prise en charge reseau :
Comment redémarrer en mode sans echec avec prise en charge reseau ?
Tu redemarre le pc et tapote la touche F8 des le début de l allumage sans t´arrêter.
Une fenêtre sur fond noir va s’ouvrir, tu te déplaces avec les flèches du clavier sur démarrer en mode sans échec avec prise en charge reseau puis tape entrée.
Une fois sur le bureau si il n y a pas toutes les couleurs et autres c´est normal!
Ps : si F8 ne marche pas utilise la touche F5.
une fois dans ce mode :
Telecharge malwarebytes
-> http://www.malwarebytes.org/mbam/program/mbam-setup.exe
Tu l´instale; le programme va se mettre automatiquement a jour.
Une fois a jour, le programme va se lancer; click sur l´onglet parametre, et coche la case : "Arreter internet explorer pendant la suppression".
Click maintenant sur l´onglet recherche et coche la case : "executer un examen complet".
Puis click sur "rechercher".
Laisse le scanner le pc...
Si des elements on ete trouvés > click sur supprimer la selection.
si il t´es demandé de redemarrer > click sur "yes".
A la fin un rapport va s´ouvrir; sauvegarde le de maniere a le retrouver en vu de le poster sur le forum.
Copie et colle le rapport stp.
PS : les rapport sont aussi rangé dans l onglet rapport/log
Comment redémarrer en mode sans echec avec prise en charge reseau ?
Tu redemarre le pc et tapote la touche F8 des le début de l allumage sans t´arrêter.
Une fenêtre sur fond noir va s’ouvrir, tu te déplaces avec les flèches du clavier sur démarrer en mode sans échec avec prise en charge reseau puis tape entrée.
Une fois sur le bureau si il n y a pas toutes les couleurs et autres c´est normal!
Ps : si F8 ne marche pas utilise la touche F5.
une fois dans ce mode :
Telecharge malwarebytes
-> http://www.malwarebytes.org/mbam/program/mbam-setup.exe
Tu l´instale; le programme va se mettre automatiquement a jour.
Une fois a jour, le programme va se lancer; click sur l´onglet parametre, et coche la case : "Arreter internet explorer pendant la suppression".
Click maintenant sur l´onglet recherche et coche la case : "executer un examen complet".
Puis click sur "rechercher".
Laisse le scanner le pc...
Si des elements on ete trouvés > click sur supprimer la selection.
si il t´es demandé de redemarrer > click sur "yes".
A la fin un rapport va s´ouvrir; sauvegarde le de maniere a le retrouver en vu de le poster sur le forum.
Copie et colle le rapport stp.
PS : les rapport sont aussi rangé dans l onglet rapport/log
ok, c'est en route mais j'ai l'impression que ca va mettre des plombes, donc j'espère que tu as du temps...
Je ne pourais pas dormir avant d'avoir tout résolu.
Quel est l'antivirus qui soit assez fiable pour une utilisation quotidienne? (histoire de m'instruire et de te garder éveillé!)
Quel est l'antivirus qui soit assez fiable pour une utilisation quotidienne? (histoire de m'instruire et de te garder éveillé!)
on verra ça a la fin mais tu peux jeter un coup d oeil ici :
antivir vs avast :
-> http://forum.malekal.com/ftopic3528.php
antivir vs avast :
-> http://forum.malekal.com/ftopic3528.php
Vala
Malwarebytes' Anti-Malware 1.24
Version de la base de données: 1056
Windows 5.1.2600 Service Pack 2
00:16:28 16/08/2008
mbam-log-8-16-2008 (00-16-28).txt
Type de recherche: Examen complet (C:\|D:\|)
Eléments examinés: 116307
Temps écoulé: 42 minute(s), 29 second(s)
Processus mémoire infecté(s): 0
Module(s) mémoire infecté(s): 0
Clé(s) du Registre infectée(s): 10
Valeur(s) du Registre infectée(s): 1
Elément(s) de données du Registre infecté(s): 0
Dossier(s) infecté(s): 1
Fichier(s) infecté(s): 7
Processus mémoire infecté(s):
(Aucun élément nuisible détecté)
Module(s) mémoire infecté(s):
(Aucun élément nuisible détecté)
Clé(s) du Registre infectée(s):
HKEY_CLASSES_ROOT\CLSID\{9afb8248-617f-460d-9366-d71cdeda3179} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Code Store Database\Distribution Units\{1d4db7d2-6ec9-47a3-bd87-1e41684e07bb} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\tdssdata (Trojan.Agent) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\tdss (Trojan.Agent) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\tdssserv (Rootkit.Agent) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Carlson (Dialer) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\VSPlugin (Trojan.FakeAlert) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Multimedia\WMPlayer\Schemes\f3pss (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\MyWebSearch (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Fun Web Products (Adware.MyWebSearch) -> Quarantined and deleted successfully.
Valeur(s) du Registre infectée(s):
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\xokvrpwg (Trojan.FakeAlert) -> Quarantined and deleted successfully.
Elément(s) de données du Registre infecté(s):
(Aucun élément nuisible détecté)
Dossier(s) infecté(s):
C:\Program Files\Fichiers communs\Carlson (Dialer) -> Quarantined and deleted successfully.
Fichier(s) infecté(s):
C:\WINDOWS\edlb.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\tdssl.dll (Trojan.Agent) -> Delete on reboot.
C:\WINDOWS\system32\tdssmain.dll (Trojan.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\tdssinit.dll (Trojan.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\tdsslog.dll (Trojan.Agent) -> Delete on reboot.
C:\WINDOWS\system32\tdssservers.dat (Trojan.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\drivers\tdssserv.sys (Trojan.Agent) -> Delete on reboot.
Malwarebytes' Anti-Malware 1.24
Version de la base de données: 1056
Windows 5.1.2600 Service Pack 2
00:16:28 16/08/2008
mbam-log-8-16-2008 (00-16-28).txt
Type de recherche: Examen complet (C:\|D:\|)
Eléments examinés: 116307
Temps écoulé: 42 minute(s), 29 second(s)
Processus mémoire infecté(s): 0
Module(s) mémoire infecté(s): 0
Clé(s) du Registre infectée(s): 10
Valeur(s) du Registre infectée(s): 1
Elément(s) de données du Registre infecté(s): 0
Dossier(s) infecté(s): 1
Fichier(s) infecté(s): 7
Processus mémoire infecté(s):
(Aucun élément nuisible détecté)
Module(s) mémoire infecté(s):
(Aucun élément nuisible détecté)
Clé(s) du Registre infectée(s):
HKEY_CLASSES_ROOT\CLSID\{9afb8248-617f-460d-9366-d71cdeda3179} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Code Store Database\Distribution Units\{1d4db7d2-6ec9-47a3-bd87-1e41684e07bb} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\tdssdata (Trojan.Agent) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\tdss (Trojan.Agent) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\tdssserv (Rootkit.Agent) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Carlson (Dialer) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\VSPlugin (Trojan.FakeAlert) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Multimedia\WMPlayer\Schemes\f3pss (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\MyWebSearch (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Fun Web Products (Adware.MyWebSearch) -> Quarantined and deleted successfully.
Valeur(s) du Registre infectée(s):
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\xokvrpwg (Trojan.FakeAlert) -> Quarantined and deleted successfully.
Elément(s) de données du Registre infecté(s):
(Aucun élément nuisible détecté)
Dossier(s) infecté(s):
C:\Program Files\Fichiers communs\Carlson (Dialer) -> Quarantined and deleted successfully.
Fichier(s) infecté(s):
C:\WINDOWS\edlb.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\tdssl.dll (Trojan.Agent) -> Delete on reboot.
C:\WINDOWS\system32\tdssmain.dll (Trojan.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\tdssinit.dll (Trojan.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\tdsslog.dll (Trojan.Agent) -> Delete on reboot.
C:\WINDOWS\system32\tdssservers.dat (Trojan.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\drivers\tdssserv.sys (Trojan.Agent) -> Delete on reboot.
Réouvre malewarebyte
va sur quarantaine
supprime tout
Télécharge HijackThis ici :
-> Fais un clic droit sur un des liens et choisi enregistrer la cible sous .... le bureau
-> http://www.trendsecure.com/portal/en-US/_download/HJTInstall.exe
-> ftp://ftp.commentcamarche.com/download/HJTInstall.exe
-> Fais un double-clic sur HJTInstall.exe afin de lancer l'installation
-> Clique sur Install ensuite sur I Accept
-> Clique sur Do a scan system and save log file
-> Le bloc-notes s'ouvrira, fais un copier-coller de tout son contenu ici dans ta prochaine réponse
va sur quarantaine
supprime tout
Télécharge HijackThis ici :
-> Fais un clic droit sur un des liens et choisi enregistrer la cible sous .... le bureau
-> http://www.trendsecure.com/portal/en-US/_download/HJTInstall.exe
-> ftp://ftp.commentcamarche.com/download/HJTInstall.exe
-> Fais un double-clic sur HJTInstall.exe afin de lancer l'installation
-> Clique sur Install ensuite sur I Accept
-> Clique sur Do a scan system and save log file
-> Le bloc-notes s'ouvrira, fais un copier-coller de tout son contenu ici dans ta prochaine réponse
Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 09:51:10, on 16/08/2008
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v7.00 (7.00.6000.16705)
Boot mode: Normal
Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\Ati2evxx.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\System32\GEARSec.exe
C:\Program Files\Fichiers communs\LightScribe\LSSrvc.exe
C:\Program Files\Analog Devices\SoundMAX\SMAgent.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\system32\wscntfy.exe
C:\WINDOWS\system32\Ati2evxx.exe
C:\WINDOWS\Explorer.EXE
C:\Program Files\ATI Technologies\ATI Control Panel\atiptaxx.exe
C:\Program Files\Analog Devices\SoundMAX\SMax4PNP.exe
C:\Program Files\Analog Devices\SoundMAX\Smax4.exe
C:\Program Files\Symantec\Norton Ghost\Agent\GhostTray.exe
C:\Program Files\Fichiers communs\Real\Update_OB\realsched.exe
C:\Program Files\CyberLink DVD Solution\PowerDVD\PDVDServ.exe
C:\Program Files\Sony Ericsson\Mobile2\Application Launcher\Application Launcher.exe
C:\Program Files\QuickTime\qttask.exe
C:\WINDOWS\ZSSnp211.exe
C:\WINDOWS\Domino.exe
C:\Program Files\Winamp\winampa.exe
D:\Omnipage pro\opware32.exe
D:\Presto! PVR\Monitor.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\Symantec\Norton Ghost\Agent\PQV2iSvc.exe
C:\Program Files\Fichiers communs\Ahead\Lib\NMBgMonitor.exe
C:\Program Files\Adobe\Acrobat 7.0\Reader\reader_sl.exe
C:\Program Files\Fichiers communs\Teleca Shared\CapabilityManager.exe
C:\Documents and Settings\Wolff\Bureau\uTorrent.exe
C:\Program Files\Fichiers communs\Ahead\Lib\NMIndexStoreSvr.exe
C:\Program Files\Fichiers communs\Teleca Shared\Generic.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Program Files\Trend Micro\HijackThis\HijackThis.exe
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = https://www.google.fr/?gws_rd=ssl
R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName = Liens
O2 - BHO: (no name) - {7E853D72-626A-48EC-A868-BA8D5E23E045} - (no file)
O2 - BHO: QXK Olive - {DF6C9A95-CDD0-4EFC-9C2A-B6CA365F7396} - C:\WINDOWS\wnlmdakqlag.dll (file missing)
O3 - Toolbar: Systran50perso.IEPlugIn - {A5899B52-3AF9-4F56-85FE-AD7B3BE8490F} - C:\Program Files\SYSTRAN\5.0\Personal\IEPlugIn.dll
O4 - HKLM\..\Run: [ATIPTA] C:\Program Files\ATI Technologies\ATI Control Panel\atiptaxx.exe
O4 - HKLM\..\Run: [SoundMAXPnP] C:\Program Files\Analog Devices\SoundMAX\SMax4PNP.exe
O4 - HKLM\..\Run: [SoundMAX] "C:\Program Files\Analog Devices\SoundMAX\Smax4.exe" /tray
O4 - HKLM\..\Run: [PinnacleDriverCheck] C:\WINDOWS\system32\PSDrvCheck.exe -CheckReg
O4 - HKLM\..\Run: [Norton Ghost 9.0] C:\Program Files\Symantec\Norton Ghost\Agent\GhostTray.exe
O4 - HKLM\..\Run: [REGSHAVE] C:\Program Files\REGSHAVE\REGSHAVE.EXE /AUTORUN
O4 - HKLM\..\Run: [TkBellExe] "C:\Program Files\Fichiers communs\Real\Update_OB\realsched.exe" -osboot
O4 - HKLM\..\Run: [RemoteControl] "C:\Program Files\CyberLink DVD Solution\PowerDVD\PDVDServ.exe"
O4 - HKLM\..\Run: [Sony Ericsson PC Suite] "C:\Program Files\Sony Ericsson\Mobile2\Application Launcher\Application Launcher.exe" /startoptions
O4 - HKLM\..\Run: [NeroFilterCheck] C:\Program Files\Fichiers communs\Ahead\Lib\NeroCheck.exe
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
O4 - HKLM\..\Run: [ZSSnp211] C:\WINDOWS\ZSSnp211.exe
O4 - HKLM\..\Run: [Domino] C:\WINDOWS\Domino.exe
O4 - HKLM\..\Run: [WinampAgent] C:\Program Files\Winamp\winampa.exe
O4 - HKLM\..\Run: [OmniPage] D:\Omnipage pro\opware32.exe
O4 - HKLM\..\Run: [ChangeFilterMerit] D:\Presto! PVR\ChangeFilterMerit.exe
O4 - HKLM\..\Run: [Presto! PVR Monitor] D:\Presto! PVR\Monitor.exe
O4 - HKCU\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\ctfmon.exe
O4 - HKCU\..\Run: [BgMonitor_{79662E04-7C6C-4d9f-84C7-88D8A56B10AA}] "C:\Program Files\Fichiers communs\Ahead\Lib\NMBgMonitor.exe"
O4 - HKUS\S-1-5-19\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'SERVICE LOCAL')
O4 - HKUS\S-1-5-20\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'SERVICE RÉSEAU')
O4 - HKUS\S-1-5-18\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'SYSTEM')
O4 - HKUS\.DEFAULT\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'Default user')
O4 - Global Startup: Adobe Reader Speed Launch.lnk = C:\Program Files\Adobe\Acrobat 7.0\Reader\reader_sl.exe
O8 - Extra context menu item: E&xporter vers Microsoft Excel - res://C:\PROGRA~1\MICROS~2\Office12\EXCEL.EXE/3000
O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O16 - DPF: {5C6698D9-7BE4-4122-8EC5-291D84DBD4A0} (Facebook Photo Uploader 4 Control) - http://upload.facebook.com/controls/FacebookPhotoUploader3.cab
O16 - DPF: {7584C670-2274-4EFB-B00B-D6AABA6D3850} (Microsoft RDP Client Control (redist)) - http://univ-r.u-strasbg.fr/TSWeb/msrdp.cab
O16 - DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} (Shockwave Flash Object) - http://fpdownload2.macromedia.com/get/shockwave/cabs/flash/swflash.cab
O16 - DPF: {D3D0E7BC-170E-11D0-B2D1-00AA00B92B50} (FireEvent Control) - http://singles.sfr.fr/dlm/ax/fireev.2.7.0.0.cab
O16 - DPF: {D4323BF2-006A-4440-A2F5-27E3E7AB25F8} (Virtools WebPlayer Class) - http://a532.g.akamai.net/...
O23 - Service: Ati HotKey Poller - Unknown owner - C:\WINDOWS\system32\Ati2evxx.exe
O23 - Service: ATI Smart - Unknown owner - C:\WINDOWS\system32\ati2sgag.exe
O23 - Service: GEARSecurity - GEAR Software - C:\WINDOWS\System32\GEARSec.exe
O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Fichiers communs\InstallShield\Driver\11\Intel 32\IDriverT.exe
O23 - Service: Service de l'iPod (iPod Service) - Unknown owner - C:\Program Files\iPod\bin\iPodService.exe (file missing)
O23 - Service: LightScribeService Direct Disc Labeling Service (LightScribeService) - Hewlett-Packard Company - C:\Program Files\Fichiers communs\LightScribe\LSSrvc.exe
O23 - Service: NBService - Nero AG - C:\Program Files\Nero\Nero 7\Nero BackItUp\NBService.exe
O23 - Service: Norton Ghost - Symantec Corporation - C:\Program Files\Symantec\Norton Ghost\Agent\PQV2iSvc.exe
O23 - Service: SoundMAX Agent Service (SoundMAX Agent Service (default)) - Analog Devices, Inc. - C:\Program Files\Analog Devices\SoundMAX\SMAgent.exe
Scan saved at 09:51:10, on 16/08/2008
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v7.00 (7.00.6000.16705)
Boot mode: Normal
Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\Ati2evxx.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\System32\GEARSec.exe
C:\Program Files\Fichiers communs\LightScribe\LSSrvc.exe
C:\Program Files\Analog Devices\SoundMAX\SMAgent.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\system32\wscntfy.exe
C:\WINDOWS\system32\Ati2evxx.exe
C:\WINDOWS\Explorer.EXE
C:\Program Files\ATI Technologies\ATI Control Panel\atiptaxx.exe
C:\Program Files\Analog Devices\SoundMAX\SMax4PNP.exe
C:\Program Files\Analog Devices\SoundMAX\Smax4.exe
C:\Program Files\Symantec\Norton Ghost\Agent\GhostTray.exe
C:\Program Files\Fichiers communs\Real\Update_OB\realsched.exe
C:\Program Files\CyberLink DVD Solution\PowerDVD\PDVDServ.exe
C:\Program Files\Sony Ericsson\Mobile2\Application Launcher\Application Launcher.exe
C:\Program Files\QuickTime\qttask.exe
C:\WINDOWS\ZSSnp211.exe
C:\WINDOWS\Domino.exe
C:\Program Files\Winamp\winampa.exe
D:\Omnipage pro\opware32.exe
D:\Presto! PVR\Monitor.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\Symantec\Norton Ghost\Agent\PQV2iSvc.exe
C:\Program Files\Fichiers communs\Ahead\Lib\NMBgMonitor.exe
C:\Program Files\Adobe\Acrobat 7.0\Reader\reader_sl.exe
C:\Program Files\Fichiers communs\Teleca Shared\CapabilityManager.exe
C:\Documents and Settings\Wolff\Bureau\uTorrent.exe
C:\Program Files\Fichiers communs\Ahead\Lib\NMIndexStoreSvr.exe
C:\Program Files\Fichiers communs\Teleca Shared\Generic.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Program Files\Trend Micro\HijackThis\HijackThis.exe
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = https://www.google.fr/?gws_rd=ssl
R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName = Liens
O2 - BHO: (no name) - {7E853D72-626A-48EC-A868-BA8D5E23E045} - (no file)
O2 - BHO: QXK Olive - {DF6C9A95-CDD0-4EFC-9C2A-B6CA365F7396} - C:\WINDOWS\wnlmdakqlag.dll (file missing)
O3 - Toolbar: Systran50perso.IEPlugIn - {A5899B52-3AF9-4F56-85FE-AD7B3BE8490F} - C:\Program Files\SYSTRAN\5.0\Personal\IEPlugIn.dll
O4 - HKLM\..\Run: [ATIPTA] C:\Program Files\ATI Technologies\ATI Control Panel\atiptaxx.exe
O4 - HKLM\..\Run: [SoundMAXPnP] C:\Program Files\Analog Devices\SoundMAX\SMax4PNP.exe
O4 - HKLM\..\Run: [SoundMAX] "C:\Program Files\Analog Devices\SoundMAX\Smax4.exe" /tray
O4 - HKLM\..\Run: [PinnacleDriverCheck] C:\WINDOWS\system32\PSDrvCheck.exe -CheckReg
O4 - HKLM\..\Run: [Norton Ghost 9.0] C:\Program Files\Symantec\Norton Ghost\Agent\GhostTray.exe
O4 - HKLM\..\Run: [REGSHAVE] C:\Program Files\REGSHAVE\REGSHAVE.EXE /AUTORUN
O4 - HKLM\..\Run: [TkBellExe] "C:\Program Files\Fichiers communs\Real\Update_OB\realsched.exe" -osboot
O4 - HKLM\..\Run: [RemoteControl] "C:\Program Files\CyberLink DVD Solution\PowerDVD\PDVDServ.exe"
O4 - HKLM\..\Run: [Sony Ericsson PC Suite] "C:\Program Files\Sony Ericsson\Mobile2\Application Launcher\Application Launcher.exe" /startoptions
O4 - HKLM\..\Run: [NeroFilterCheck] C:\Program Files\Fichiers communs\Ahead\Lib\NeroCheck.exe
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
O4 - HKLM\..\Run: [ZSSnp211] C:\WINDOWS\ZSSnp211.exe
O4 - HKLM\..\Run: [Domino] C:\WINDOWS\Domino.exe
O4 - HKLM\..\Run: [WinampAgent] C:\Program Files\Winamp\winampa.exe
O4 - HKLM\..\Run: [OmniPage] D:\Omnipage pro\opware32.exe
O4 - HKLM\..\Run: [ChangeFilterMerit] D:\Presto! PVR\ChangeFilterMerit.exe
O4 - HKLM\..\Run: [Presto! PVR Monitor] D:\Presto! PVR\Monitor.exe
O4 - HKCU\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\ctfmon.exe
O4 - HKCU\..\Run: [BgMonitor_{79662E04-7C6C-4d9f-84C7-88D8A56B10AA}] "C:\Program Files\Fichiers communs\Ahead\Lib\NMBgMonitor.exe"
O4 - HKUS\S-1-5-19\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'SERVICE LOCAL')
O4 - HKUS\S-1-5-20\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'SERVICE RÉSEAU')
O4 - HKUS\S-1-5-18\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'SYSTEM')
O4 - HKUS\.DEFAULT\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'Default user')
O4 - Global Startup: Adobe Reader Speed Launch.lnk = C:\Program Files\Adobe\Acrobat 7.0\Reader\reader_sl.exe
O8 - Extra context menu item: E&xporter vers Microsoft Excel - res://C:\PROGRA~1\MICROS~2\Office12\EXCEL.EXE/3000
O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O16 - DPF: {5C6698D9-7BE4-4122-8EC5-291D84DBD4A0} (Facebook Photo Uploader 4 Control) - http://upload.facebook.com/controls/FacebookPhotoUploader3.cab
O16 - DPF: {7584C670-2274-4EFB-B00B-D6AABA6D3850} (Microsoft RDP Client Control (redist)) - http://univ-r.u-strasbg.fr/TSWeb/msrdp.cab
O16 - DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} (Shockwave Flash Object) - http://fpdownload2.macromedia.com/get/shockwave/cabs/flash/swflash.cab
O16 - DPF: {D3D0E7BC-170E-11D0-B2D1-00AA00B92B50} (FireEvent Control) - http://singles.sfr.fr/dlm/ax/fireev.2.7.0.0.cab
O16 - DPF: {D4323BF2-006A-4440-A2F5-27E3E7AB25F8} (Virtools WebPlayer Class) - http://a532.g.akamai.net/...
O23 - Service: Ati HotKey Poller - Unknown owner - C:\WINDOWS\system32\Ati2evxx.exe
O23 - Service: ATI Smart - Unknown owner - C:\WINDOWS\system32\ati2sgag.exe
O23 - Service: GEARSecurity - GEAR Software - C:\WINDOWS\System32\GEARSec.exe
O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Fichiers communs\InstallShield\Driver\11\Intel 32\IDriverT.exe
O23 - Service: Service de l'iPod (iPod Service) - Unknown owner - C:\Program Files\iPod\bin\iPodService.exe (file missing)
O23 - Service: LightScribeService Direct Disc Labeling Service (LightScribeService) - Hewlett-Packard Company - C:\Program Files\Fichiers communs\LightScribe\LSSrvc.exe
O23 - Service: NBService - Nero AG - C:\Program Files\Nero\Nero 7\Nero BackItUp\NBService.exe
O23 - Service: Norton Ghost - Symantec Corporation - C:\Program Files\Symantec\Norton Ghost\Agent\PQV2iSvc.exe
O23 - Service: SoundMAX Agent Service (SoundMAX Agent Service (default)) - Analog Devices, Inc. - C:\Program Files\Analog Devices\SoundMAX\SMAgent.exe
Télécharge combofix : http://download.bleepingcomputer.com/sUBs/ComboFix.exe
-> Double clique sur combofix.exe.
-> Tape sur la touche 1 (Yes) pour démarrer le scan.
-> Lorsque le scan sera complété, un rapport apparaîtra. Copie/colle ce rapport dans ta prochaine réponse.
NOTE : Le rapport se trouve également ici : C:\Combofix.txt
Avant d'utiliser ComboFix :
-> Déconnecte toi d'internet et referme les fenêtres de tous les programmes en cours.
-> Désactive provisoirement et seulement le temps de l'utilisation de ComboFix, la protection en temps réel de ton Antivirus et de tes Antispywares, qui peuvent géner fortement la procédure de recherche et de nettoyage de l'outil.
Une fois fait, sur ton bureau double-clic sur Combofix.exe.
- Répond oui au message d'avertissement, pour que le programme commence à procéder à l'analyse du pc.
/!\ Pendant la durée de cette étape, ne te sert pas du pc et n'ouvre aucun programmes.
- En fin de scan il est possible que ComboFix ait besoin de redemarrer le pc pour finaliser la désinfection\recherche, laisses-le faire.
- Un rapport s'ouvrira ensuite dans le bloc notes, ce fichier rapport Combofix.txt, est automatiquement sauvegardé et rangé à C:\Combofix.txt)
-> Réactive la protection en temps réel de ton Antivirus et de tes Antispywares, avant de te reconnecter à internet.
-> Reviens sur le forum, et copie et colle la totalité du contenu de C:\Combofix.txt dans ton prochain message.
-> Double clique sur combofix.exe.
-> Tape sur la touche 1 (Yes) pour démarrer le scan.
-> Lorsque le scan sera complété, un rapport apparaîtra. Copie/colle ce rapport dans ta prochaine réponse.
NOTE : Le rapport se trouve également ici : C:\Combofix.txt
Avant d'utiliser ComboFix :
-> Déconnecte toi d'internet et referme les fenêtres de tous les programmes en cours.
-> Désactive provisoirement et seulement le temps de l'utilisation de ComboFix, la protection en temps réel de ton Antivirus et de tes Antispywares, qui peuvent géner fortement la procédure de recherche et de nettoyage de l'outil.
Une fois fait, sur ton bureau double-clic sur Combofix.exe.
- Répond oui au message d'avertissement, pour que le programme commence à procéder à l'analyse du pc.
/!\ Pendant la durée de cette étape, ne te sert pas du pc et n'ouvre aucun programmes.
- En fin de scan il est possible que ComboFix ait besoin de redemarrer le pc pour finaliser la désinfection\recherche, laisses-le faire.
- Un rapport s'ouvrira ensuite dans le bloc notes, ce fichier rapport Combofix.txt, est automatiquement sauvegardé et rangé à C:\Combofix.txt)
-> Réactive la protection en temps réel de ton Antivirus et de tes Antispywares, avant de te reconnecter à internet.
-> Reviens sur le forum, et copie et colle la totalité du contenu de C:\Combofix.txt dans ton prochain message.
ComboFix 08-08-14.05 - Wolff 2008-08-16 9:57:16.1 - NTFSx86
Microsoft Windows XP Édition familiale 5.1.2600.2.1252.1.1036.18.674 [GMT 2:00]
Endroit: C:\Documents and Settings\Wolff\Bureau\ComboFix.exe
* Création d'un nouveau point de restauration
[color=red][b]AVERTISSEMENT - LA CONSOLE DE RÉCUPÉRATION N'EST PAS INSTALLÉE SUR CETTE MACHINE !![/b][/color]
.
(((((((((((((((((((((((((((((((((((( Autres suppressions ))))))))))))))))))))))))))))))))))))))))))))))))
.
C:\Documents and Settings\Wolff\Application Data\macromedia\Flash Player\#SharedObjects\9GWBBZX4\interclick.com
C:\Documents and Settings\Wolff\Application Data\macromedia\Flash Player\#SharedObjects\9GWBBZX4\interclick.com\ud.sol
C:\Documents and Settings\Wolff\Application Data\macromedia\Flash Player\macromedia.com\support\flashplayer\sys\#interclick.com
C:\Documents and Settings\Wolff\Application Data\macromedia\Flash Player\macromedia.com\support\flashplayer\sys\#interclick.com\settings.sol
C:\WINDOWS\system32\Microsoft\backup.ftp
C:\WINDOWS\system32\Microsoft\backup.tftp
.
((((((((((((((((((((((((((((((((((((((( Drivers/Services )))))))))))))))))))))))))))))))))))))))))))))))))
.
-------\Legacy_TDSSSERV
-------\Legacy_XPROTECTOR
-------\Service_XPROTECTOR
((((((((((((((((((((((((((((( Fichiers cr‚‚s 2008-07-16 to 2008-08-16 ))))))))))))))))))))))))))))))))))))
.
2008-08-15 23:32 . 2008-08-15 23:32 <REP> d-------- C:\Program Files\Malwarebytes' Anti-Malware
2008-08-15 23:32 . 2008-08-15 23:32 <REP> d-------- C:\Documents and Settings\Wolff\Application Data\Malwarebytes
2008-08-15 23:32 . 2008-08-15 23:32 <REP> d-------- C:\Documents and Settings\All Users\Application Data\Malwarebytes
2008-08-15 23:32 . 2008-07-30 20:07 38,472 --a------ C:\WINDOWS\system32\drivers\mbamswissarmy.sys
2008-08-15 23:32 . 2008-07-30 20:07 17,144 --a------ C:\WINDOWS\system32\drivers\mbam.sys
2008-08-15 22:44 . 2008-08-15 22:58 3,022 --a------ C:\WINDOWS\system32\tmp.reg
2008-08-15 22:43 . 2007-09-06 00:22 289,144 --a------ C:\WINDOWS\system32\VCCLSID.exe
2008-08-15 22:43 . 2006-04-27 17:49 288,417 --a------ C:\WINDOWS\system32\SrchSTS.exe
2008-08-15 22:43 . 2008-05-29 09:35 86,528 --a------ C:\WINDOWS\system32\VACFix.exe
2008-08-15 22:43 . 2008-05-18 21:40 82,944 --a------ C:\WINDOWS\system32\IEDFix.exe
2008-08-15 22:43 . 2008-08-14 21:52 82,432 --a------ C:\WINDOWS\system32\IEDFix.C.exe
2008-08-15 22:43 . 2008-08-09 15:37 82,432 --a------ C:\WINDOWS\system32\404Fix.exe
2008-08-15 22:43 . 2003-06-05 21:13 53,248 --a------ C:\WINDOWS\system32\Process.exe
2008-08-15 22:43 . 2004-07-31 18:50 51,200 --a------ C:\WINDOWS\system32\dumphive.exe
2008-08-15 22:43 . 2007-10-04 00:36 25,600 --a------ C:\WINDOWS\system32\WS2Fix.exe
2008-08-15 21:59 . 2008-08-15 21:59 <REP> d-------- C:\Deckard
2008-08-15 21:56 . 2008-08-15 21:56 <REP> d-------- C:\Program Files\Trend Micro
2008-08-10 15:26 . 2008-08-10 15:26 <REP> d-------- C:\Documents and Settings\All Users\Application Data\Avg7
2008-08-09 15:06 . 2008-08-16 00:36 <REP> d-------- C:\Program Files\uTorrent
2008-08-09 15:06 . 2008-08-16 09:56 <REP> d-------- C:\Documents and Settings\Wolff\Application Data\uTorrent
2008-07-25 10:36 . 2008-07-25 10:36 524,288 --a------ C:\WINDOWS\system32\DivXsm.exe
2008-07-25 10:36 . 2008-07-25 10:36 4,816 --a------ C:\WINDOWS\system32\divxsm.tlb
2008-07-23 18:50 . 2008-07-23 18:50 3,596,288 --a------ C:\WINDOWS\system32\qt-dx331.dll
2008-07-23 18:50 . 2008-07-23 18:50 9,878 --a------ C:\WINDOWS\system32\dsm_fr.qm
2008-07-23 18:48 . 2008-07-23 18:48 1,044,480 --a------ C:\WINDOWS\system32\libdivx.dll
2008-07-23 18:48 . 2008-07-23 18:48 200,704 --a------ C:\WINDOWS\system32\ssldivx.dll
2008-07-23 18:47 . 2008-07-23 18:47 634,880 --a------ C:\WINDOWS\system32\divxdec.ax
2008-07-23 18:47 . 2008-07-23 18:47 8,835 --a------ C:\WINDOWS\system32\dpufr.qm
2008-07-23 18:47 . 2008-07-23 18:47 3,067 --a------ C:\WINDOWS\system32\dtu_fr.qm
2008-07-23 18:47 . 2008-07-23 18:47 416 --a------ C:\WINDOWS\system32\dtu100.dll.manifest
2008-07-23 18:47 . 2008-07-23 18:47 416 --a------ C:\WINDOWS\system32\dpl100.dll.manifest
2008-07-23 18:46 . 2008-07-23 18:46 12,288 --a------ C:\WINDOWS\system32\DivXWMPExtType.dll
2008-07-19 15:09 . 2008-07-19 15:09 244 --ah----- C:\sqmnoopt03.sqm
2008-07-19 15:09 . 2008-07-19 15:09 232 --ah----- C:\sqmdata03.sqm
.
(((((((((((((((((((((((((((((((((( Compte-rendu de Find3M ))))))))))))))))))))))))))))))))))))))))))))))))
.
2008-08-15 22:22 --------- d-----w C:\Program Files\Lavasoft
2008-08-15 19:46 --------- d-----w C:\Documents and Settings\All Users\Application Data\Lavasoft
2008-08-09 16:55 --------- d--h--w C:\Program Files\InstallShield Installation Information
2008-08-09 16:13 --------- d-----w C:\Program Files\DivX
2008-07-26 10:17 --------- d-----w C:\Program Files\Fichiers communs\Adobe
2008-07-25 22:07 --------- d-----w C:\Program Files\WinTV
2008-07-06 14:07 --------- d-----w C:\Documents and Settings\Wolff\Application Data\AdobeUM
2008-06-29 16:15 --------- d-----w C:\Documents and Settings\Wolff\Application Data\EPSON
2008-06-20 10:45 360,320 ------w C:\WINDOWS\system32\drivers\tcpip.sys
2008-06-20 10:44 138,368 ----a-w C:\WINDOWS\system32\drivers\afd.sys
2008-06-20 09:52 225,920 ----a-w C:\WINDOWS\system32\drivers\tcpip6.sys
2004-10-01 13:00 40,960 ----a-w C:\Program Files\Uninstall_CDS.exe
.
((((((((((((((((((((((((((((((((( Point de chargement Reg )))))))))))))))))))))))))))))))))))))))))))))))))
.
.
REGEDIT4
*Note* les ‚l‚ments vides & les ‚l‚ments initiaux l‚gitimes ne sont pas list‚s
[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"CTFMON.EXE"="C:\WINDOWS\system32\ctfmon.exe" [2004-08-05 14:00 15360]
"BgMonitor_{79662E04-7C6C-4d9f-84C7-88D8A56B10AA}"="C:\Program Files\Fichiers communs\Ahead\Lib\NMBgMonitor.exe" [2006-09-13 12:12 139264]
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"ATIPTA"="C:\Program Files\ATI Technologies\ATI Control Panel\atiptaxx.exe" [2004-02-24 22:10 335872]
"SoundMAXPnP"="C:\Program Files\Analog Devices\SoundMAX\SMax4PNP.exe" [2003-05-29 17:28 790528]
"PinnacleDriverCheck"="C:\WINDOWS\system32\PSDrvCheck.exe" [2004-03-11 01:26 406016]
"Norton Ghost 9.0"="C:\Program Files\Symantec\Norton Ghost\Agent\GhostTray.exe" [2004-08-02 17:36 1122304]
"REGSHAVE"="C:\Program Files\REGSHAVE\REGSHAVE.EXE" [2002-02-04 22:32 53248]
"TkBellExe"="C:\Program Files\Fichiers communs\Real\Update_OB\realsched.exe" [2006-05-28 10:37 180269]
"RemoteControl"="C:\Program Files\CyberLink DVD Solution\PowerDVD\PDVDServ.exe" [2004-11-02 20:24 32768]
"Sony Ericsson PC Suite"="C:\Program Files\Sony Ericsson\Mobile2\Application Launcher\Application Launcher.exe" [2005-10-26 18:17 159744]
"NeroFilterCheck"="C:\Program Files\Fichiers communs\Ahead\Lib\NeroCheck.exe" [2006-01-12 17:40 155648]
"QuickTime Task"="C:\Program Files\QuickTime\qttask.exe" [2007-04-27 09:41 282624]
"ZSSnp211"="C:\WINDOWS\ZSSnp211.exe" [2007-06-25 08:41 57344]
"Domino"="C:\WINDOWS\Domino.exe" [2007-06-25 08:41 49152]
"WinampAgent"="C:\Program Files\Winamp\winampa.exe" [2007-12-20 17:16 37376]
"OmniPage"="D:\Omnipage pro\opware32.exe" [1999-11-08 03:04 53248]
"ChangeFilterMerit"="D:\Presto! PVR\ChangeFilterMerit.exe" [2006-12-27 11:16 45056]
"Presto! PVR Monitor"="D:\Presto! PVR\Monitor.exe" [2007-05-29 16:57 143360]
[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run]
"CTFMON.EXE"="C:\WINDOWS\system32\CTFMON.EXE" [2004-08-05 14:00 15360]
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\drivers32]
"VIDC.MJPG"= Pvmjpg30.dll
"VIDC.PIM1"= pclepim1.dll
"VIDC.VDOM"= vdowave.drv
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%windir%\\system32\\sessmgr.exe"=
"C:\\Program Files\\Pinnacle\\Studio 10\\programs\\RM.exe"=
"C:\\Program Files\\Pinnacle\\Studio 10\\programs\\Studio.exe"=
"C:\\Program Files\\Pinnacle\\Studio 10\\programs\\PMSRegisterFile.exe"=
"C:\\Program Files\\Pinnacle\\Studio 10\\programs\\umi.exe"=
"C:\\Program Files\\Messenger\\msmsgs.exe"=
"%windir%\\Network Diagnostic\\xpnetdiag.exe"=
"C:\\Program Files\\MSN Messenger\\msnmsgr.exe"=
"C:\\Program Files\\MSN Messenger\\livecall.exe"=
"C:\\Program Files\\DNA\\btdna.exe"=
"C:\\Program Files\\Microsoft Office\\Office12\\OUTLOOK.EXE"=
"C:\\Documents and Settings\\Wolff\\Bureau\\uTorrent.exe"=
R0 PQV2i;PQV2i;C:\WINDOWS\system32\drivers\PQV2i.sys [2004-08-02 17:04]
R1 MemAlloc;MemAlloc;C:\WINDOWS\system32\DRIVERS\memalloc.sys [2002-08-26 07:51]
R1 PQIMount;PQIMount;C:\WINDOWS\system32\drivers\PQIMount.sys [2004-08-02 17:23]
R3 BENDER;Pinnacle DV/AV Capture;C:\WINDOWS\system32\drivers\bender.sys [2005-08-22 15:11]
R3 USB28xxBGA;WinTV HVR-900;C:\WINDOWS\system32\DRIVERS\emBDA.sys [2006-06-06 20:27]
R3 USB28xxOEM;WinTV OEM Filter;C:\WINDOWS\system32\DRIVERS\emOEM.sys [2006-06-02 00:51]
R3 yukonx86;NDIS5.1 Miniport Driver for Marvell Yukon Gigabit Ethernet Adapter;C:\WINDOWS\system32\DRIVERS\yukonx86.sys [2003-12-23 00:32]
S1 LStone;Pinnacle Systems Studio AV/DV Overlay;C:\WINDOWS\system32\DRIVERS\lstone2k.sys [2002-12-10 14:20]
.
- - - - ORPHANS REMOVED - - - -
HKCU-Run-PowerBar - (no file)
.
------- Supplementary Scan -------
.
R0 -: HKCU-Main,Start Page = hxxp://www.google.fr/
R1 -: HKCU-Internet Connection Wizard,ShellNext = iexplore
O8 -: E&xporter vers Microsoft Excel - C:\PROGRA~1\MICROS~2\Office12\EXCEL.EXE/3000
O16 -: {7584C670-2274-4EFB-B00B-D6AABA6D3850} - hxxp://univ-r.u-strasbg.fr/TSWeb/msrdp.cab
C:\WINDOWS\Downloaded Program Files\msrdp.inf
C:\WINDOWS\Downloaded Program Files\msrdp.ocx
O16 -: {D3D0E7BC-170E-11D0-B2D1-00AA00B92B50} - hxxp://singles.sfr.fr/dlm/ax/fireev.2.7.0.0.cab
C:\WINDOWS\Downloaded Program Files\fireev.inf
C:\WINDOWS\Downloaded Program Files\fireev.ocx
**************************************************************************
catchme 0.3.1361 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2008-08-16 10:01:26
Windows 5.1.2600 Service Pack 2 NTFS
Balayage processus cach‚s ...
Balayage cach‚ autostart entries ...
Balayage des fichiers cach‚s ...
Scan termin‚ avec succŠs
Les fichiers cach‚s: 0
**************************************************************************
.
--------------------- DLLs a charg‚ sous des processus courants ---------------------
PROCESS: C:\WINDOWS\system32\winlogon.exe
-> C:\WINDOWS\system32\Ati2evxx.dll
.
------------------------ Other Running Processes ------------------------
.
C:\WINDOWS\system32\ati2evxx.exe
C:\WINDOWS\system32\gearsec.exe
C:\Program Files\Fichiers communs\LightScribe\LSSrvc.exe
C:\Program Files\Analog Devices\SoundMAX\SMAgent.exe
C:\WINDOWS\system32\wscntfy.exe
C:\WINDOWS\system32\ati2evxx.exe
C:\Program Files\Symantec\Norton Ghost\Agent\PQV2iSvc.exe
C:\Program Files\Fichiers communs\Teleca Shared\CapabilityManager.exe
C:\Program Files\Adobe\Acrobat 7.0\Reader\reader_sl.exe
C:\Program Files\Fichiers communs\Ahead\Lib\NMIndexStoreSvr.exe
C:\Program Files\Fichiers communs\Teleca Shared\Generic.exe
.
**************************************************************************
.
Temps d'accomplissement: 2008-08-16 10:04:41 - machine was rebooted
ComboFix-quarantined-files.txt 2008-08-16 08:04:37
Pre-Run: 57,979,428,864 octets libres
Post-Run: 57,896,603,648 octets libres
174 --- E O F --- 2008-08-16 00:19:23
Microsoft Windows XP Édition familiale 5.1.2600.2.1252.1.1036.18.674 [GMT 2:00]
Endroit: C:\Documents and Settings\Wolff\Bureau\ComboFix.exe
* Création d'un nouveau point de restauration
[color=red][b]AVERTISSEMENT - LA CONSOLE DE RÉCUPÉRATION N'EST PAS INSTALLÉE SUR CETTE MACHINE !![/b][/color]
.
(((((((((((((((((((((((((((((((((((( Autres suppressions ))))))))))))))))))))))))))))))))))))))))))))))))
.
C:\Documents and Settings\Wolff\Application Data\macromedia\Flash Player\#SharedObjects\9GWBBZX4\interclick.com
C:\Documents and Settings\Wolff\Application Data\macromedia\Flash Player\#SharedObjects\9GWBBZX4\interclick.com\ud.sol
C:\Documents and Settings\Wolff\Application Data\macromedia\Flash Player\macromedia.com\support\flashplayer\sys\#interclick.com
C:\Documents and Settings\Wolff\Application Data\macromedia\Flash Player\macromedia.com\support\flashplayer\sys\#interclick.com\settings.sol
C:\WINDOWS\system32\Microsoft\backup.ftp
C:\WINDOWS\system32\Microsoft\backup.tftp
.
((((((((((((((((((((((((((((((((((((((( Drivers/Services )))))))))))))))))))))))))))))))))))))))))))))))))
.
-------\Legacy_TDSSSERV
-------\Legacy_XPROTECTOR
-------\Service_XPROTECTOR
((((((((((((((((((((((((((((( Fichiers cr‚‚s 2008-07-16 to 2008-08-16 ))))))))))))))))))))))))))))))))))))
.
2008-08-15 23:32 . 2008-08-15 23:32 <REP> d-------- C:\Program Files\Malwarebytes' Anti-Malware
2008-08-15 23:32 . 2008-08-15 23:32 <REP> d-------- C:\Documents and Settings\Wolff\Application Data\Malwarebytes
2008-08-15 23:32 . 2008-08-15 23:32 <REP> d-------- C:\Documents and Settings\All Users\Application Data\Malwarebytes
2008-08-15 23:32 . 2008-07-30 20:07 38,472 --a------ C:\WINDOWS\system32\drivers\mbamswissarmy.sys
2008-08-15 23:32 . 2008-07-30 20:07 17,144 --a------ C:\WINDOWS\system32\drivers\mbam.sys
2008-08-15 22:44 . 2008-08-15 22:58 3,022 --a------ C:\WINDOWS\system32\tmp.reg
2008-08-15 22:43 . 2007-09-06 00:22 289,144 --a------ C:\WINDOWS\system32\VCCLSID.exe
2008-08-15 22:43 . 2006-04-27 17:49 288,417 --a------ C:\WINDOWS\system32\SrchSTS.exe
2008-08-15 22:43 . 2008-05-29 09:35 86,528 --a------ C:\WINDOWS\system32\VACFix.exe
2008-08-15 22:43 . 2008-05-18 21:40 82,944 --a------ C:\WINDOWS\system32\IEDFix.exe
2008-08-15 22:43 . 2008-08-14 21:52 82,432 --a------ C:\WINDOWS\system32\IEDFix.C.exe
2008-08-15 22:43 . 2008-08-09 15:37 82,432 --a------ C:\WINDOWS\system32\404Fix.exe
2008-08-15 22:43 . 2003-06-05 21:13 53,248 --a------ C:\WINDOWS\system32\Process.exe
2008-08-15 22:43 . 2004-07-31 18:50 51,200 --a------ C:\WINDOWS\system32\dumphive.exe
2008-08-15 22:43 . 2007-10-04 00:36 25,600 --a------ C:\WINDOWS\system32\WS2Fix.exe
2008-08-15 21:59 . 2008-08-15 21:59 <REP> d-------- C:\Deckard
2008-08-15 21:56 . 2008-08-15 21:56 <REP> d-------- C:\Program Files\Trend Micro
2008-08-10 15:26 . 2008-08-10 15:26 <REP> d-------- C:\Documents and Settings\All Users\Application Data\Avg7
2008-08-09 15:06 . 2008-08-16 00:36 <REP> d-------- C:\Program Files\uTorrent
2008-08-09 15:06 . 2008-08-16 09:56 <REP> d-------- C:\Documents and Settings\Wolff\Application Data\uTorrent
2008-07-25 10:36 . 2008-07-25 10:36 524,288 --a------ C:\WINDOWS\system32\DivXsm.exe
2008-07-25 10:36 . 2008-07-25 10:36 4,816 --a------ C:\WINDOWS\system32\divxsm.tlb
2008-07-23 18:50 . 2008-07-23 18:50 3,596,288 --a------ C:\WINDOWS\system32\qt-dx331.dll
2008-07-23 18:50 . 2008-07-23 18:50 9,878 --a------ C:\WINDOWS\system32\dsm_fr.qm
2008-07-23 18:48 . 2008-07-23 18:48 1,044,480 --a------ C:\WINDOWS\system32\libdivx.dll
2008-07-23 18:48 . 2008-07-23 18:48 200,704 --a------ C:\WINDOWS\system32\ssldivx.dll
2008-07-23 18:47 . 2008-07-23 18:47 634,880 --a------ C:\WINDOWS\system32\divxdec.ax
2008-07-23 18:47 . 2008-07-23 18:47 8,835 --a------ C:\WINDOWS\system32\dpufr.qm
2008-07-23 18:47 . 2008-07-23 18:47 3,067 --a------ C:\WINDOWS\system32\dtu_fr.qm
2008-07-23 18:47 . 2008-07-23 18:47 416 --a------ C:\WINDOWS\system32\dtu100.dll.manifest
2008-07-23 18:47 . 2008-07-23 18:47 416 --a------ C:\WINDOWS\system32\dpl100.dll.manifest
2008-07-23 18:46 . 2008-07-23 18:46 12,288 --a------ C:\WINDOWS\system32\DivXWMPExtType.dll
2008-07-19 15:09 . 2008-07-19 15:09 244 --ah----- C:\sqmnoopt03.sqm
2008-07-19 15:09 . 2008-07-19 15:09 232 --ah----- C:\sqmdata03.sqm
.
(((((((((((((((((((((((((((((((((( Compte-rendu de Find3M ))))))))))))))))))))))))))))))))))))))))))))))))
.
2008-08-15 22:22 --------- d-----w C:\Program Files\Lavasoft
2008-08-15 19:46 --------- d-----w C:\Documents and Settings\All Users\Application Data\Lavasoft
2008-08-09 16:55 --------- d--h--w C:\Program Files\InstallShield Installation Information
2008-08-09 16:13 --------- d-----w C:\Program Files\DivX
2008-07-26 10:17 --------- d-----w C:\Program Files\Fichiers communs\Adobe
2008-07-25 22:07 --------- d-----w C:\Program Files\WinTV
2008-07-06 14:07 --------- d-----w C:\Documents and Settings\Wolff\Application Data\AdobeUM
2008-06-29 16:15 --------- d-----w C:\Documents and Settings\Wolff\Application Data\EPSON
2008-06-20 10:45 360,320 ------w C:\WINDOWS\system32\drivers\tcpip.sys
2008-06-20 10:44 138,368 ----a-w C:\WINDOWS\system32\drivers\afd.sys
2008-06-20 09:52 225,920 ----a-w C:\WINDOWS\system32\drivers\tcpip6.sys
2004-10-01 13:00 40,960 ----a-w C:\Program Files\Uninstall_CDS.exe
.
((((((((((((((((((((((((((((((((( Point de chargement Reg )))))))))))))))))))))))))))))))))))))))))))))))))
.
.
REGEDIT4
*Note* les ‚l‚ments vides & les ‚l‚ments initiaux l‚gitimes ne sont pas list‚s
[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"CTFMON.EXE"="C:\WINDOWS\system32\ctfmon.exe" [2004-08-05 14:00 15360]
"BgMonitor_{79662E04-7C6C-4d9f-84C7-88D8A56B10AA}"="C:\Program Files\Fichiers communs\Ahead\Lib\NMBgMonitor.exe" [2006-09-13 12:12 139264]
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"ATIPTA"="C:\Program Files\ATI Technologies\ATI Control Panel\atiptaxx.exe" [2004-02-24 22:10 335872]
"SoundMAXPnP"="C:\Program Files\Analog Devices\SoundMAX\SMax4PNP.exe" [2003-05-29 17:28 790528]
"PinnacleDriverCheck"="C:\WINDOWS\system32\PSDrvCheck.exe" [2004-03-11 01:26 406016]
"Norton Ghost 9.0"="C:\Program Files\Symantec\Norton Ghost\Agent\GhostTray.exe" [2004-08-02 17:36 1122304]
"REGSHAVE"="C:\Program Files\REGSHAVE\REGSHAVE.EXE" [2002-02-04 22:32 53248]
"TkBellExe"="C:\Program Files\Fichiers communs\Real\Update_OB\realsched.exe" [2006-05-28 10:37 180269]
"RemoteControl"="C:\Program Files\CyberLink DVD Solution\PowerDVD\PDVDServ.exe" [2004-11-02 20:24 32768]
"Sony Ericsson PC Suite"="C:\Program Files\Sony Ericsson\Mobile2\Application Launcher\Application Launcher.exe" [2005-10-26 18:17 159744]
"NeroFilterCheck"="C:\Program Files\Fichiers communs\Ahead\Lib\NeroCheck.exe" [2006-01-12 17:40 155648]
"QuickTime Task"="C:\Program Files\QuickTime\qttask.exe" [2007-04-27 09:41 282624]
"ZSSnp211"="C:\WINDOWS\ZSSnp211.exe" [2007-06-25 08:41 57344]
"Domino"="C:\WINDOWS\Domino.exe" [2007-06-25 08:41 49152]
"WinampAgent"="C:\Program Files\Winamp\winampa.exe" [2007-12-20 17:16 37376]
"OmniPage"="D:\Omnipage pro\opware32.exe" [1999-11-08 03:04 53248]
"ChangeFilterMerit"="D:\Presto! PVR\ChangeFilterMerit.exe" [2006-12-27 11:16 45056]
"Presto! PVR Monitor"="D:\Presto! PVR\Monitor.exe" [2007-05-29 16:57 143360]
[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run]
"CTFMON.EXE"="C:\WINDOWS\system32\CTFMON.EXE" [2004-08-05 14:00 15360]
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\drivers32]
"VIDC.MJPG"= Pvmjpg30.dll
"VIDC.PIM1"= pclepim1.dll
"VIDC.VDOM"= vdowave.drv
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%windir%\\system32\\sessmgr.exe"=
"C:\\Program Files\\Pinnacle\\Studio 10\\programs\\RM.exe"=
"C:\\Program Files\\Pinnacle\\Studio 10\\programs\\Studio.exe"=
"C:\\Program Files\\Pinnacle\\Studio 10\\programs\\PMSRegisterFile.exe"=
"C:\\Program Files\\Pinnacle\\Studio 10\\programs\\umi.exe"=
"C:\\Program Files\\Messenger\\msmsgs.exe"=
"%windir%\\Network Diagnostic\\xpnetdiag.exe"=
"C:\\Program Files\\MSN Messenger\\msnmsgr.exe"=
"C:\\Program Files\\MSN Messenger\\livecall.exe"=
"C:\\Program Files\\DNA\\btdna.exe"=
"C:\\Program Files\\Microsoft Office\\Office12\\OUTLOOK.EXE"=
"C:\\Documents and Settings\\Wolff\\Bureau\\uTorrent.exe"=
R0 PQV2i;PQV2i;C:\WINDOWS\system32\drivers\PQV2i.sys [2004-08-02 17:04]
R1 MemAlloc;MemAlloc;C:\WINDOWS\system32\DRIVERS\memalloc.sys [2002-08-26 07:51]
R1 PQIMount;PQIMount;C:\WINDOWS\system32\drivers\PQIMount.sys [2004-08-02 17:23]
R3 BENDER;Pinnacle DV/AV Capture;C:\WINDOWS\system32\drivers\bender.sys [2005-08-22 15:11]
R3 USB28xxBGA;WinTV HVR-900;C:\WINDOWS\system32\DRIVERS\emBDA.sys [2006-06-06 20:27]
R3 USB28xxOEM;WinTV OEM Filter;C:\WINDOWS\system32\DRIVERS\emOEM.sys [2006-06-02 00:51]
R3 yukonx86;NDIS5.1 Miniport Driver for Marvell Yukon Gigabit Ethernet Adapter;C:\WINDOWS\system32\DRIVERS\yukonx86.sys [2003-12-23 00:32]
S1 LStone;Pinnacle Systems Studio AV/DV Overlay;C:\WINDOWS\system32\DRIVERS\lstone2k.sys [2002-12-10 14:20]
.
- - - - ORPHANS REMOVED - - - -
HKCU-Run-PowerBar - (no file)
.
------- Supplementary Scan -------
.
R0 -: HKCU-Main,Start Page = hxxp://www.google.fr/
R1 -: HKCU-Internet Connection Wizard,ShellNext = iexplore
O8 -: E&xporter vers Microsoft Excel - C:\PROGRA~1\MICROS~2\Office12\EXCEL.EXE/3000
O16 -: {7584C670-2274-4EFB-B00B-D6AABA6D3850} - hxxp://univ-r.u-strasbg.fr/TSWeb/msrdp.cab
C:\WINDOWS\Downloaded Program Files\msrdp.inf
C:\WINDOWS\Downloaded Program Files\msrdp.ocx
O16 -: {D3D0E7BC-170E-11D0-B2D1-00AA00B92B50} - hxxp://singles.sfr.fr/dlm/ax/fireev.2.7.0.0.cab
C:\WINDOWS\Downloaded Program Files\fireev.inf
C:\WINDOWS\Downloaded Program Files\fireev.ocx
**************************************************************************
catchme 0.3.1361 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2008-08-16 10:01:26
Windows 5.1.2600 Service Pack 2 NTFS
Balayage processus cach‚s ...
Balayage cach‚ autostart entries ...
Balayage des fichiers cach‚s ...
Scan termin‚ avec succŠs
Les fichiers cach‚s: 0
**************************************************************************
.
--------------------- DLLs a charg‚ sous des processus courants ---------------------
PROCESS: C:\WINDOWS\system32\winlogon.exe
-> C:\WINDOWS\system32\Ati2evxx.dll
.
------------------------ Other Running Processes ------------------------
.
C:\WINDOWS\system32\ati2evxx.exe
C:\WINDOWS\system32\gearsec.exe
C:\Program Files\Fichiers communs\LightScribe\LSSrvc.exe
C:\Program Files\Analog Devices\SoundMAX\SMAgent.exe
C:\WINDOWS\system32\wscntfy.exe
C:\WINDOWS\system32\ati2evxx.exe
C:\Program Files\Symantec\Norton Ghost\Agent\PQV2iSvc.exe
C:\Program Files\Fichiers communs\Teleca Shared\CapabilityManager.exe
C:\Program Files\Adobe\Acrobat 7.0\Reader\reader_sl.exe
C:\Program Files\Fichiers communs\Ahead\Lib\NMIndexStoreSvr.exe
C:\Program Files\Fichiers communs\Teleca Shared\Generic.exe
.
**************************************************************************
.
Temps d'accomplissement: 2008-08-16 10:04:41 - machine was rebooted
ComboFix-quarantined-files.txt 2008-08-16 08:04:37
Pre-Run: 57,979,428,864 octets libres
Post-Run: 57,896,603,648 octets libres
174 --- E O F --- 2008-08-16 00:19:23
Rends toi sur ce site :
https://www.virustotal.com/gui/
Clique sur parcourir et cherche ce fichier : C:\WINDOWS\ZSSnp211.exe
Clique sur Send File.
Un rapport va s'élaborer ligne à ligne.
Attends la fin. Il doit comprendre la taille du fichier envoyé.
Sauvegarde le rapport avec le bloc-note.
Copie le dans ta réponse.
fais la meme chose pour : C:\WINDOWS\Domino.exe
https://www.virustotal.com/gui/
Clique sur parcourir et cherche ce fichier : C:\WINDOWS\ZSSnp211.exe
Clique sur Send File.
Un rapport va s'élaborer ligne à ligne.
Attends la fin. Il doit comprendre la taille du fichier envoyé.
Sauvegarde le rapport avec le bloc-note.
Copie le dans ta réponse.
fais la meme chose pour : C:\WINDOWS\Domino.exe
et le second :
Fichier Domino.exe reçu le 2008.08.12 17:28:45 (CET)
Situation actuelle: terminé
Résultat: 0/36 (0.00%)
Formaté Impression des résultats
Antivirus Version Dernière mise à jour Résultat
AhnLab-V3 2008.8.13.0 2008.08.12 -
AntiVir 7.8.1.19 2008.08.12 -
Authentium 5.1.0.4 2008.08.12 -
Avast 4.8.1195.0 2008.08.12 -
AVG 8.0.0.156 2008.08.12 -
BitDefender 7.2 2008.08.12 -
CAT-QuickHeal 9.50 2008.08.12 -
ClamAV 0.93.1 2008.08.12 -
DrWeb 4.44.0.09170 2008.08.12 -
eSafe 7.0.17.0 2008.08.12 -
eTrust-Vet 31.6.6027 2008.08.12 -
Ewido 4.0 2008.08.12 -
F-Prot 4.4.4.56 2008.08.12 -
F-Secure 7.60.13501.0 2008.08.12 -
Fortinet 3.14.0.0 2008.08.12 -
GData 2.0.7306.1023 2008.08.12 -
Ikarus T3.1.1.34.0 2008.08.12 -
K7AntiVirus 7.10.412 2008.08.12 -
Kaspersky 7.0.0.125 2008.08.12 -
McAfee 5358 2008.08.11 -
Microsoft 1.3807 2008.08.12 -
NOD32v2 3349 2008.08.12 -
Norman 5.80.02 2008.08.12 -
Panda 9.0.0.4 2008.08.12 -
PCTools 4.4.2.0 2008.08.12 -
Prevx1 V2 2008.08.12 -
Rising 20.57.12.00 2008.08.12 -
Sophos 4.32.0 2008.08.12 -
Sunbelt 3.1.1542.1 2008.08.12 -
Symantec 10 2008.08.12 -
TheHacker 6.3.0.3.046 2008.08.12 -
TrendMicro 8.700.0.1004 2008.08.12 -
VBA32 3.12.8.3 2008.08.11 -
ViRobot 2008.8.12.1333 2008.08.12 -
VirusBuster 4.5.11.0 2008.08.12 -
Webwasher-Gateway 6.6.2 2008.08.12 -
Information additionnelle
File size: 49152 bytes
MD5...: 5603c2c8940f5e43864d4000304ab175
SHA1..: f22234ed04ad1220b28cacaabc2ab0361ce6fe11
SHA256: aea3c84d561c605bb42968e98c6024909b6ad8cba64c45aed6343495fc78ab58
SHA512: 02e2d0812465aeef722d041b45618385c9cbea27eb85e6dcfef55d0e5fc7a0e3
cf5cdf6df05c5b9ec79aee540a32f8faf2d9a3371c2b6902382a4529892c9ea6
PEiD..: InstallShield 2000
PEInfo: PE Structure information
( base data )
entrypointaddress.: 0x402590
timedatestamp.....: 0x44e58125 (Fri Aug 18 08:58:13 2006)
machinetype.......: 0x14c (I386)
( 4 sections )
name viradd virsiz rawdsiz ntrpy md5
.text 0x1000 0x5475 0x6000 5.99 eb40aa04898b145b39ad6fed65d76aea
.rdata 0x7000 0xd0e 0x1000 4.86 ac8f8ad613fec801923e04b97959ead4
.data 0x8000 0x5a98 0x3000 0.65 d87ce043bef47f3a61d4950c786abbce
.rsrc 0xe000 0x360 0x1000 0.90 aafef067de0eebfa29c644d3bdefbed3
( 4 imports )
> KERNEL32.dll: CloseHandle, GetLastError, CreateMutexA, UnmapViewOfFile, MapViewOfFile, Sleep, CreateFileMappingA, GetSystemTime, SetFilePointer, LoadLibraryA, GetProcAddress, GetStringTypeW, GetStringTypeA, LCMapStringW, LCMapStringA, FlushFileBuffers, SetStdHandle, IsBadCodePtr, IsBadWritePtr, IsBadReadPtr, SetUnhandledExceptionFilter, VirtualAlloc, WriteFile, VirtualFree, HeapCreate, HeapDestroy, GetFileType, GetStdHandle, SetHandleCount, RtlUnwind, GetModuleHandleA, GetStartupInfoA, GetCommandLineA, GetVersion, ExitProcess, HeapFree, HeapAlloc, WideCharToMultiByte, TerminateProcess, GetCurrentProcess, UnhandledExceptionFilter, GetModuleFileNameA, FreeEnvironmentStringsA, MultiByteToWideChar, FreeEnvironmentStringsW, GetEnvironmentStrings, GetEnvironmentStringsW, GetCPInfo, GetACP, GetOEMCP
> USER32.dll: DispatchMessageA, TranslateMessage, TranslateAcceleratorA, GetMessageA, LoadAcceleratorsA, RegisterDeviceNotificationA, UnregisterDeviceNotification, RegisterClassExA, CreateWindowExA, PostQuitMessage, DefWindowProcA
> ole32.dll: CreateBindCtx, CoUninitialize, CoGetMalloc, CoCreateInstance, MkParseDisplayName, CoInitialize
> OLEAUT32.dll: -, -
( 0 exports )
ThreatExpert info: https://www.symantec.com?md5=5603c2c8940f5e43864d4000304ab175
Fichier Domino.exe reçu le 2008.08.12 17:28:45 (CET)
Situation actuelle: terminé
Résultat: 0/36 (0.00%)
Formaté Impression des résultats
Antivirus Version Dernière mise à jour Résultat
AhnLab-V3 2008.8.13.0 2008.08.12 -
AntiVir 7.8.1.19 2008.08.12 -
Authentium 5.1.0.4 2008.08.12 -
Avast 4.8.1195.0 2008.08.12 -
AVG 8.0.0.156 2008.08.12 -
BitDefender 7.2 2008.08.12 -
CAT-QuickHeal 9.50 2008.08.12 -
ClamAV 0.93.1 2008.08.12 -
DrWeb 4.44.0.09170 2008.08.12 -
eSafe 7.0.17.0 2008.08.12 -
eTrust-Vet 31.6.6027 2008.08.12 -
Ewido 4.0 2008.08.12 -
F-Prot 4.4.4.56 2008.08.12 -
F-Secure 7.60.13501.0 2008.08.12 -
Fortinet 3.14.0.0 2008.08.12 -
GData 2.0.7306.1023 2008.08.12 -
Ikarus T3.1.1.34.0 2008.08.12 -
K7AntiVirus 7.10.412 2008.08.12 -
Kaspersky 7.0.0.125 2008.08.12 -
McAfee 5358 2008.08.11 -
Microsoft 1.3807 2008.08.12 -
NOD32v2 3349 2008.08.12 -
Norman 5.80.02 2008.08.12 -
Panda 9.0.0.4 2008.08.12 -
PCTools 4.4.2.0 2008.08.12 -
Prevx1 V2 2008.08.12 -
Rising 20.57.12.00 2008.08.12 -
Sophos 4.32.0 2008.08.12 -
Sunbelt 3.1.1542.1 2008.08.12 -
Symantec 10 2008.08.12 -
TheHacker 6.3.0.3.046 2008.08.12 -
TrendMicro 8.700.0.1004 2008.08.12 -
VBA32 3.12.8.3 2008.08.11 -
ViRobot 2008.8.12.1333 2008.08.12 -
VirusBuster 4.5.11.0 2008.08.12 -
Webwasher-Gateway 6.6.2 2008.08.12 -
Information additionnelle
File size: 49152 bytes
MD5...: 5603c2c8940f5e43864d4000304ab175
SHA1..: f22234ed04ad1220b28cacaabc2ab0361ce6fe11
SHA256: aea3c84d561c605bb42968e98c6024909b6ad8cba64c45aed6343495fc78ab58
SHA512: 02e2d0812465aeef722d041b45618385c9cbea27eb85e6dcfef55d0e5fc7a0e3
cf5cdf6df05c5b9ec79aee540a32f8faf2d9a3371c2b6902382a4529892c9ea6
PEiD..: InstallShield 2000
PEInfo: PE Structure information
( base data )
entrypointaddress.: 0x402590
timedatestamp.....: 0x44e58125 (Fri Aug 18 08:58:13 2006)
machinetype.......: 0x14c (I386)
( 4 sections )
name viradd virsiz rawdsiz ntrpy md5
.text 0x1000 0x5475 0x6000 5.99 eb40aa04898b145b39ad6fed65d76aea
.rdata 0x7000 0xd0e 0x1000 4.86 ac8f8ad613fec801923e04b97959ead4
.data 0x8000 0x5a98 0x3000 0.65 d87ce043bef47f3a61d4950c786abbce
.rsrc 0xe000 0x360 0x1000 0.90 aafef067de0eebfa29c644d3bdefbed3
( 4 imports )
> KERNEL32.dll: CloseHandle, GetLastError, CreateMutexA, UnmapViewOfFile, MapViewOfFile, Sleep, CreateFileMappingA, GetSystemTime, SetFilePointer, LoadLibraryA, GetProcAddress, GetStringTypeW, GetStringTypeA, LCMapStringW, LCMapStringA, FlushFileBuffers, SetStdHandle, IsBadCodePtr, IsBadWritePtr, IsBadReadPtr, SetUnhandledExceptionFilter, VirtualAlloc, WriteFile, VirtualFree, HeapCreate, HeapDestroy, GetFileType, GetStdHandle, SetHandleCount, RtlUnwind, GetModuleHandleA, GetStartupInfoA, GetCommandLineA, GetVersion, ExitProcess, HeapFree, HeapAlloc, WideCharToMultiByte, TerminateProcess, GetCurrentProcess, UnhandledExceptionFilter, GetModuleFileNameA, FreeEnvironmentStringsA, MultiByteToWideChar, FreeEnvironmentStringsW, GetEnvironmentStrings, GetEnvironmentStringsW, GetCPInfo, GetACP, GetOEMCP
> USER32.dll: DispatchMessageA, TranslateMessage, TranslateAcceleratorA, GetMessageA, LoadAcceleratorsA, RegisterDeviceNotificationA, UnregisterDeviceNotification, RegisterClassExA, CreateWindowExA, PostQuitMessage, DefWindowProcA
> ole32.dll: CreateBindCtx, CoUninitialize, CoGetMalloc, CoCreateInstance, MkParseDisplayName, CoInitialize
> OLEAUT32.dll: -, -
( 0 exports )
ThreatExpert info: https://www.symantec.com?md5=5603c2c8940f5e43864d4000304ab175
Je pense que pour le premier, le rapport est le suivant:
Fichier ZSSnp211.exe reçu le 2008.08.11 21:04:21 (CET)
Situation actuelle: terminé
Résultat: 0/36 (0.00%)
Formaté Impression des résultats
Antivirus Version Dernière mise à jour Résultat
AhnLab-V3 2008.8.12.0 2008.08.11 -
AntiVir 7.8.1.19 2008.08.11 -
Authentium 5.1.0.4 2008.08.11 -
Avast 4.8.1195.0 2008.08.11 -
AVG 8.0.0.156 2008.08.11 -
BitDefender 7.2 2008.08.11 -
CAT-QuickHeal 9.50 2008.08.11 -
ClamAV 0.93.1 2008.08.11 -
DrWeb 4.44.0.09170 2008.08.11 -
eSafe 7.0.17.0 2008.08.11 -
eTrust-Vet 31.6.6021 2008.08.08 -
Ewido 4.0 2008.08.11 -
F-Prot 4.4.4.56 2008.08.11 -
F-Secure 7.60.13501.0 2008.08.11 -
Fortinet 3.14.0.0 2008.08.11 -
GData 2.0.7306.1023 2008.08.11 -
Ikarus T3.1.1.34.0 2008.08.11 -
K7AntiVirus 7.10.411 2008.08.11 -
Kaspersky 7.0.0.125 2008.08.11 -
McAfee 5358 2008.08.11 -
Microsoft 1.3807 2008.08.11 -
NOD32v2 3346 2008.08.11 -
Norman 5.80.02 2008.08.11 -
Panda 9.0.0.4 2008.08.11 -
PCTools 4.4.2.0 2008.08.11 -
Prevx1 V2 2008.08.11 -
Rising 20.57.02.00 2008.08.11 -
Sophos 4.32.0 2008.08.11 -
Sunbelt 3.1.1538.1 2008.08.09 -
Symantec 10 2008.08.11 -
TheHacker 6.2.96.395 2008.08.08 -
TrendMicro 8.700.0.1004 2008.08.11 -
VBA32 3.12.8.3 2008.08.11 -
ViRobot 2008.8.11.1331 2008.08.11 -
VirusBuster 4.5.11.0 2008.08.11 -
Webwasher-Gateway 6.6.2 2008.08.11 -
Information additionnelle
File size: 57344 bytes
MD5...: 0560b36a9a58dcf6698545f9521eabf2
SHA1..: d32e735dca20f47d5716cb593a81933872de15df
SHA256: 72447a4ae36da8dfc4de57fdfcdbb7e6224ce2a2e91e1bd2ce322dc38fed841a
SHA512: 9e62fa264f14385b2a749a7110d053136638fe7e624221ec2472775eb6942d7a
94b95d9960f6d8000b3399b7326370fa49d03c7a6830a1980c5fe52a40226400
PEiD..: -
PEInfo: PE Structure information
( base data )
entrypointaddress.: 0x402aaa
timedatestamp.....: 0x4615b951 (Fri Apr 06 03:06:57 2007)
machinetype.......: 0x14c (I386)
( 4 sections )
name viradd virsiz rawdsiz ntrpy md5
.text 0x1000 0x6a15 0x7000 6.41 9a6b2e1e1ea48d21e1d9001c206f21a9
.rdata 0x8000 0x1884 0x2000 4.20 928c0bc7f6859ccbd7e6f7ef7ff7fdc2
.data 0xa000 0x2e38 0x1000 1.29 f1c8318c742c977413e45a3114f36964
.rsrc 0xd000 0x2cc8 0x3000 5.12 27256a4759a6d51af7014fe80d9eb956
( 6 imports )
> ksproxy.ax: KsSynchronousDeviceControl
> KERNEL32.dll: CreateProcessA, UnmapViewOfFile, MapViewOfFile, Sleep, GetWindowsDirectoryA, CreateFileMappingA, CloseHandle, GetLastError, CreateMutexA, GetStringTypeW, GetStringTypeA, SetFilePointer, HeapSize, InterlockedExchange, GetCPInfo, GetOEMCP, GetACP, LoadLibraryA, VirtualQuery, GetSystemInfo, VirtualProtect, LCMapStringA, LCMapStringW, GetCommandLineA, MultiByteToWideChar, FlushFileBuffers, SetStdHandle, GetSystemTimeAsFileTime, GetCurrentProcessId, GetCurrentThreadId, GetTickCount, QueryPerformanceCounter, IsBadCodePtr, IsBadReadPtr, SetUnhandledExceptionFilter, RtlUnwind, WideCharToMultiByte, GetModuleHandleA, GetStartupInfoA, GetLocaleInfoA, GetVersionExA, HeapFree, HeapAlloc, ExitProcess, GetProcAddress, TerminateProcess, GetCurrentProcess, WriteFile, GetStdHandle, GetModuleFileNameA, UnhandledExceptionFilter, FreeEnvironmentStringsA, GetEnvironmentStrings, FreeEnvironmentStringsW, GetEnvironmentStringsW, SetHandleCount, GetFileType, HeapDestroy, HeapCreate, VirtualFree, VirtualAlloc, HeapReAlloc, IsBadWritePtr
> USER32.dll: RegisterDeviceNotificationA, UnregisterDeviceNotification, CreateWindowExA, DefWindowProcA, LoadAcceleratorsA, GetMessageA, TranslateAcceleratorA, TranslateMessage, DispatchMessageA, RegisterClassExA, KillTimer, PostQuitMessage, SetTimer
> ADVAPI32.dll: RegQueryValueExA, RegCloseKey, RegOpenKeyA
> ole32.dll: CreateBindCtx, CoUninitialize, CoGetMalloc, CoCreateInstance, MkParseDisplayName, CoInitialize
> OLEAUT32.dll: -, -
( 0 exports )
ThreatExpert info: https://www.symantec.com?md5=0560b36a9a58dcf6698545f9521eabf2
Fichier ZSSnp211.exe reçu le 2008.08.11 21:04:21 (CET)
Situation actuelle: terminé
Résultat: 0/36 (0.00%)
Formaté Impression des résultats
Antivirus Version Dernière mise à jour Résultat
AhnLab-V3 2008.8.12.0 2008.08.11 -
AntiVir 7.8.1.19 2008.08.11 -
Authentium 5.1.0.4 2008.08.11 -
Avast 4.8.1195.0 2008.08.11 -
AVG 8.0.0.156 2008.08.11 -
BitDefender 7.2 2008.08.11 -
CAT-QuickHeal 9.50 2008.08.11 -
ClamAV 0.93.1 2008.08.11 -
DrWeb 4.44.0.09170 2008.08.11 -
eSafe 7.0.17.0 2008.08.11 -
eTrust-Vet 31.6.6021 2008.08.08 -
Ewido 4.0 2008.08.11 -
F-Prot 4.4.4.56 2008.08.11 -
F-Secure 7.60.13501.0 2008.08.11 -
Fortinet 3.14.0.0 2008.08.11 -
GData 2.0.7306.1023 2008.08.11 -
Ikarus T3.1.1.34.0 2008.08.11 -
K7AntiVirus 7.10.411 2008.08.11 -
Kaspersky 7.0.0.125 2008.08.11 -
McAfee 5358 2008.08.11 -
Microsoft 1.3807 2008.08.11 -
NOD32v2 3346 2008.08.11 -
Norman 5.80.02 2008.08.11 -
Panda 9.0.0.4 2008.08.11 -
PCTools 4.4.2.0 2008.08.11 -
Prevx1 V2 2008.08.11 -
Rising 20.57.02.00 2008.08.11 -
Sophos 4.32.0 2008.08.11 -
Sunbelt 3.1.1538.1 2008.08.09 -
Symantec 10 2008.08.11 -
TheHacker 6.2.96.395 2008.08.08 -
TrendMicro 8.700.0.1004 2008.08.11 -
VBA32 3.12.8.3 2008.08.11 -
ViRobot 2008.8.11.1331 2008.08.11 -
VirusBuster 4.5.11.0 2008.08.11 -
Webwasher-Gateway 6.6.2 2008.08.11 -
Information additionnelle
File size: 57344 bytes
MD5...: 0560b36a9a58dcf6698545f9521eabf2
SHA1..: d32e735dca20f47d5716cb593a81933872de15df
SHA256: 72447a4ae36da8dfc4de57fdfcdbb7e6224ce2a2e91e1bd2ce322dc38fed841a
SHA512: 9e62fa264f14385b2a749a7110d053136638fe7e624221ec2472775eb6942d7a
94b95d9960f6d8000b3399b7326370fa49d03c7a6830a1980c5fe52a40226400
PEiD..: -
PEInfo: PE Structure information
( base data )
entrypointaddress.: 0x402aaa
timedatestamp.....: 0x4615b951 (Fri Apr 06 03:06:57 2007)
machinetype.......: 0x14c (I386)
( 4 sections )
name viradd virsiz rawdsiz ntrpy md5
.text 0x1000 0x6a15 0x7000 6.41 9a6b2e1e1ea48d21e1d9001c206f21a9
.rdata 0x8000 0x1884 0x2000 4.20 928c0bc7f6859ccbd7e6f7ef7ff7fdc2
.data 0xa000 0x2e38 0x1000 1.29 f1c8318c742c977413e45a3114f36964
.rsrc 0xd000 0x2cc8 0x3000 5.12 27256a4759a6d51af7014fe80d9eb956
( 6 imports )
> ksproxy.ax: KsSynchronousDeviceControl
> KERNEL32.dll: CreateProcessA, UnmapViewOfFile, MapViewOfFile, Sleep, GetWindowsDirectoryA, CreateFileMappingA, CloseHandle, GetLastError, CreateMutexA, GetStringTypeW, GetStringTypeA, SetFilePointer, HeapSize, InterlockedExchange, GetCPInfo, GetOEMCP, GetACP, LoadLibraryA, VirtualQuery, GetSystemInfo, VirtualProtect, LCMapStringA, LCMapStringW, GetCommandLineA, MultiByteToWideChar, FlushFileBuffers, SetStdHandle, GetSystemTimeAsFileTime, GetCurrentProcessId, GetCurrentThreadId, GetTickCount, QueryPerformanceCounter, IsBadCodePtr, IsBadReadPtr, SetUnhandledExceptionFilter, RtlUnwind, WideCharToMultiByte, GetModuleHandleA, GetStartupInfoA, GetLocaleInfoA, GetVersionExA, HeapFree, HeapAlloc, ExitProcess, GetProcAddress, TerminateProcess, GetCurrentProcess, WriteFile, GetStdHandle, GetModuleFileNameA, UnhandledExceptionFilter, FreeEnvironmentStringsA, GetEnvironmentStrings, FreeEnvironmentStringsW, GetEnvironmentStringsW, SetHandleCount, GetFileType, HeapDestroy, HeapCreate, VirtualFree, VirtualAlloc, HeapReAlloc, IsBadWritePtr
> USER32.dll: RegisterDeviceNotificationA, UnregisterDeviceNotification, CreateWindowExA, DefWindowProcA, LoadAcceleratorsA, GetMessageA, TranslateAcceleratorA, TranslateMessage, DispatchMessageA, RegisterClassExA, KillTimer, PostQuitMessage, SetTimer
> ADVAPI32.dll: RegQueryValueExA, RegCloseKey, RegOpenKeyA
> ole32.dll: CreateBindCtx, CoUninitialize, CoGetMalloc, CoCreateInstance, MkParseDisplayName, CoInitialize
> OLEAUT32.dll: -, -
( 0 exports )
ThreatExpert info: https://www.symantec.com?md5=0560b36a9a58dcf6698545f9521eabf2
télécharge OTMoveIt http://download.bleepingcomputer.com/oldtimer/OTMoveIt2.exe (de Old_Timer) sur ton Bureau.
double-clique sur OTMoveIt.exe pour le lancer.
Assure toi que la case Unregister Dll's and Ocx's soit bien cochée
copie la liste qui se trouve en gras ci-dessous,
et colle-la dans le cadre de gauche de OTMoveIt :Paste List of Files/Folders to be moved.
C:\WINDOWS\system32\tmp.reg
C:\WINDOWS\system32\VCCLSID.exe
C:\WINDOWS\system32\SrchSTS.exe
C:\WINDOWS\system32\VACFix.exe
C:\WINDOWS\system32\IEDFix.exe
C:\WINDOWS\system32\IEDFix.C.exe
C:\WINDOWS\system32\404Fix.exe
C:\WINDOWS\system32\Process.exe
C:\WINDOWS\system32\dumphive.exe
C:\WINDOWS\system32\WS2Fix.exe
C:\Deckard
clique sur MoveIt! pour lancer la suppression.
le résultat apparaitra dans le cadre "Results".
clique sur Exit pour fermer.
poste le rapport situé dans C:\_OTMoveIt\MovedFiles.
il te sera peut-être demander de redémarrer le pc pour achever la suppression.si c'est le cas accepte par Yes.
ensuite :
Télécharge HijackThis ici :
-> Fais un clic droit sur un des liens et choisi enregistrer la cible sous .... le bureau
-> http://www.trendsecure.com/portal/en-US/_download/HJTInstall.exe
-> ftp://ftp.commentcamarche.com/download/HJTInstall.exe
-> Fais un double-clic sur HJTInstall.exe afin de lancer l'installation
-> Clique sur Install ensuite sur I Accept
-> Clique sur Do a scan system and save log file
-> Le bloc-notes s'ouvrira, fais un copier-coller de tout son contenu ici dans ta prochaine réponse
double-clique sur OTMoveIt.exe pour le lancer.
Assure toi que la case Unregister Dll's and Ocx's soit bien cochée
copie la liste qui se trouve en gras ci-dessous,
et colle-la dans le cadre de gauche de OTMoveIt :Paste List of Files/Folders to be moved.
C:\WINDOWS\system32\tmp.reg
C:\WINDOWS\system32\VCCLSID.exe
C:\WINDOWS\system32\SrchSTS.exe
C:\WINDOWS\system32\VACFix.exe
C:\WINDOWS\system32\IEDFix.exe
C:\WINDOWS\system32\IEDFix.C.exe
C:\WINDOWS\system32\404Fix.exe
C:\WINDOWS\system32\Process.exe
C:\WINDOWS\system32\dumphive.exe
C:\WINDOWS\system32\WS2Fix.exe
C:\Deckard
clique sur MoveIt! pour lancer la suppression.
le résultat apparaitra dans le cadre "Results".
clique sur Exit pour fermer.
poste le rapport situé dans C:\_OTMoveIt\MovedFiles.
il te sera peut-être demander de redémarrer le pc pour achever la suppression.si c'est le cas accepte par Yes.
ensuite :
Télécharge HijackThis ici :
-> Fais un clic droit sur un des liens et choisi enregistrer la cible sous .... le bureau
-> http://www.trendsecure.com/portal/en-US/_download/HJTInstall.exe
-> ftp://ftp.commentcamarche.com/download/HJTInstall.exe
-> Fais un double-clic sur HJTInstall.exe afin de lancer l'installation
-> Clique sur Install ensuite sur I Accept
-> Clique sur Do a scan system and save log file
-> Le bloc-notes s'ouvrira, fais un copier-coller de tout son contenu ici dans ta prochaine réponse
C:\WINDOWS\system32\tmp.reg moved successfully.
C:\WINDOWS\system32\VCCLSID.exe moved successfully.
C:\WINDOWS\system32\SrchSTS.exe moved successfully.
C:\WINDOWS\system32\VACFix.exe moved successfully.
C:\WINDOWS\system32\IEDFix.exe moved successfully.
C:\WINDOWS\system32\IEDFix.C.exe moved successfully.
C:\WINDOWS\system32\404Fix.exe moved successfully.
C:\WINDOWS\system32\Process.exe moved successfully.
C:\WINDOWS\system32\dumphive.exe moved successfully.
C:\WINDOWS\system32\WS2Fix.exe moved successfully.
C:\Deckard\System Scanner\backup\WINDOWS\temp\_avast4_ moved successfully.
C:\Deckard\System Scanner\backup\WINDOWS\temp moved successfully.
C:\Deckard\System Scanner\backup\WINDOWS\Downloaded Program Files moved successfully.
C:\Deckard\System Scanner\backup\WINDOWS moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\~rnsetup moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\~nsu.tmp moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\{DBCD58F3-E7CB-4B98-942F-6F66E5D49915} moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\{DA13B1E3-4362-4442-8345-CCA945A8F760} moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\{C9758B34-CEFC-42D3-8E25-3447527FCBBC} moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\{6675e71b-9843-4971-bc15-18ab52801134} moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\{426A0945-B602-47FD-BA68-4D0AE1D2EF95} moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\{22E35B20-24B8-4E75-9D44-A23D8D61F04E} moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\{1BED385A-DFD1-4EF7-9C08-A8C4CE0B1420}\{EF781A5C-58F5-4BFD-87F9-E4F14D382F25} moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\{1BED385A-DFD1-4EF7-9C08-A8C4CE0B1420} moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\{0C23FE83-AE60-4083-BB00-BECB25925A83} moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\{0bedbd4e-2d34-47b5-9973-57e62b29307c} moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\{0BA2B6AF-98E5-4E03-BE2D-C8383BF06983} moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\{01BDB864-4B64-4444-B51F-A437B88088FA}\{3CB05291-F546-458E-A796-B5BCF5A3CDC4} moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\{01BDB864-4B64-4444-B51F-A437B88088FA} moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\_wasktmp moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\_is9D moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\_is8 moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\_is6 moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\_is3 moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\_is2 moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\_is17E moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\_ir_sf7_temp_0 moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\_avast4_ moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\_0_ moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\WPDNSE moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\Word8.0 moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\WLZB01C.tmp\freeform\xml\xui\browser moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\WLZB01C.tmp\freeform\xml\xui moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\WLZB01C.tmp\freeform\xml moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\WLZB01C.tmp\freeform\Big Bento\window moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\WLZB01C.tmp\freeform\Big Bento moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\WLZB01C.tmp\freeform\Bento\window moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\WLZB01C.tmp\freeform\Bento moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\WLZB01C.tmp\freeform moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\WLZB01C.tmp moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\WLZ8933.tmp moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\WER9e6b.dir00 moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\VBE moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\Répertoire temporaire 2 pour fucking.amal.(1998).fre.1cd.(224291).zip moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\RarSFX0 moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\outlook logging moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\OIS\temp moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\OIS\cacheFiles moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\OIS moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\OfficeUpdate moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\NZB_Load moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\NZBS moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\nst62.tmp moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\nsj1A.tmp moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\nsa15.tmp moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\nro.log\log moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\nro.log moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\nps.tmp moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\NeroDemo11035\Setup moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\NeroDemo11035\Redist\MS\System moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\NeroDemo11035\Redist\MS moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\NeroDemo11035\Redist\DirectX moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\NeroDemo11035\Redist\Config moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\NeroDemo11035\Redist moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\NeroDemo11035\Cab moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\NeroDemo11035 moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\msohtmlclip1\01 moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\msohtmlclip1 moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\msohtmlclip moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\msohtml1\01 moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\msohtml1 moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\msohtml moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\modD.tmp moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\modA.tmp moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\mod9.tmp moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\mod8D.tmp moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\mod4.tmp moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\MessengerCache moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\iss45.tmp moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\iss4.tmp moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\iss3.tmp moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\iss2.tmp moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\iss178.tmp moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\iss177.tmp moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\iss170.tmp moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\iss10.tmp moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\iss1.tmp moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\isp7.tmp moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\isp6.tmp moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\isp2.tmp moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\is-K1H99.tmp moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\is-FULOA.tmp\_isetup moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\is-FULOA.tmp moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\InstMsp moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\ImageUploader_Temp moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\hsperfdata_Wolff moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\Google Toolbar moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\GGS3D.tmp\Fake Profile moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\GGS3D.tmp moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\Garmin Software Updates moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\ff_temp\xpcom.ns\bin\components moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\ff_temp\xpcom.ns\bin moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\ff_temp\xpcom.ns moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\ff_temp moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\Div12.tmp moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\Div11.tmp moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\Default moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\ckz_QCQS moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\Cddb\2793472 moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\Cddb moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\bye44.tmp\Driver moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\bye44.tmp\Documentation moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\bye44.tmp\Disk1 moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\bye44.tmp moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\bye2.tmp\Disk1 moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\bye2.tmp moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\bye16F.tmp\Disk1 moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\bye16F.tmp moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\bye1.tmp\Disk1 moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\bye1.tmp moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\audacity_1_2_temp moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\Adobe\Acrobat\7.0 moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\Adobe\Acrobat\6.0 moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\Adobe\Acrobat moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\Adobe moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1 moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1 moved successfully.
C:\Deckard\System Scanner\backup moved successfully.
C:\Deckard\System Scanner moved successfully.
C:\Deckard moved successfully.
OTMoveIt2 by OldTimer - Version 1.0.4.3 log created on 08162008_111701
C:\WINDOWS\system32\VCCLSID.exe moved successfully.
C:\WINDOWS\system32\SrchSTS.exe moved successfully.
C:\WINDOWS\system32\VACFix.exe moved successfully.
C:\WINDOWS\system32\IEDFix.exe moved successfully.
C:\WINDOWS\system32\IEDFix.C.exe moved successfully.
C:\WINDOWS\system32\404Fix.exe moved successfully.
C:\WINDOWS\system32\Process.exe moved successfully.
C:\WINDOWS\system32\dumphive.exe moved successfully.
C:\WINDOWS\system32\WS2Fix.exe moved successfully.
C:\Deckard\System Scanner\backup\WINDOWS\temp\_avast4_ moved successfully.
C:\Deckard\System Scanner\backup\WINDOWS\temp moved successfully.
C:\Deckard\System Scanner\backup\WINDOWS\Downloaded Program Files moved successfully.
C:\Deckard\System Scanner\backup\WINDOWS moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\~rnsetup moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\~nsu.tmp moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\{DBCD58F3-E7CB-4B98-942F-6F66E5D49915} moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\{DA13B1E3-4362-4442-8345-CCA945A8F760} moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\{C9758B34-CEFC-42D3-8E25-3447527FCBBC} moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\{6675e71b-9843-4971-bc15-18ab52801134} moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\{426A0945-B602-47FD-BA68-4D0AE1D2EF95} moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\{22E35B20-24B8-4E75-9D44-A23D8D61F04E} moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\{1BED385A-DFD1-4EF7-9C08-A8C4CE0B1420}\{EF781A5C-58F5-4BFD-87F9-E4F14D382F25} moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\{1BED385A-DFD1-4EF7-9C08-A8C4CE0B1420} moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\{0C23FE83-AE60-4083-BB00-BECB25925A83} moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\{0bedbd4e-2d34-47b5-9973-57e62b29307c} moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\{0BA2B6AF-98E5-4E03-BE2D-C8383BF06983} moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\{01BDB864-4B64-4444-B51F-A437B88088FA}\{3CB05291-F546-458E-A796-B5BCF5A3CDC4} moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\{01BDB864-4B64-4444-B51F-A437B88088FA} moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\_wasktmp moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\_is9D moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\_is8 moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\_is6 moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\_is3 moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\_is2 moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\_is17E moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\_ir_sf7_temp_0 moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\_avast4_ moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\_0_ moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\WPDNSE moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\Word8.0 moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\WLZB01C.tmp\freeform\xml\xui\browser moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\WLZB01C.tmp\freeform\xml\xui moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\WLZB01C.tmp\freeform\xml moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\WLZB01C.tmp\freeform\Big Bento\window moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\WLZB01C.tmp\freeform\Big Bento moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\WLZB01C.tmp\freeform\Bento\window moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\WLZB01C.tmp\freeform\Bento moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\WLZB01C.tmp\freeform moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\WLZB01C.tmp moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\WLZ8933.tmp moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\WER9e6b.dir00 moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\VBE moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\Répertoire temporaire 2 pour fucking.amal.(1998).fre.1cd.(224291).zip moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\RarSFX0 moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\outlook logging moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\OIS\temp moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\OIS\cacheFiles moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\OIS moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\OfficeUpdate moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\NZB_Load moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\NZBS moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\nst62.tmp moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\nsj1A.tmp moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\nsa15.tmp moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\nro.log\log moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\nro.log moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\nps.tmp moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\NeroDemo11035\Setup moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\NeroDemo11035\Redist\MS\System moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\NeroDemo11035\Redist\MS moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\NeroDemo11035\Redist\DirectX moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\NeroDemo11035\Redist\Config moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\NeroDemo11035\Redist moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\NeroDemo11035\Cab moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\NeroDemo11035 moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\msohtmlclip1\01 moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\msohtmlclip1 moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\msohtmlclip moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\msohtml1\01 moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\msohtml1 moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\msohtml moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\modD.tmp moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\modA.tmp moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\mod9.tmp moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\mod8D.tmp moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\mod4.tmp moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\MessengerCache moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\iss45.tmp moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\iss4.tmp moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\iss3.tmp moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\iss2.tmp moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\iss178.tmp moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\iss177.tmp moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\iss170.tmp moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\iss10.tmp moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\iss1.tmp moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\isp7.tmp moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\isp6.tmp moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\isp2.tmp moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\is-K1H99.tmp moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\is-FULOA.tmp\_isetup moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\is-FULOA.tmp moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\InstMsp moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\ImageUploader_Temp moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\hsperfdata_Wolff moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\Google Toolbar moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\GGS3D.tmp\Fake Profile moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\GGS3D.tmp moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\Garmin Software Updates moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\ff_temp\xpcom.ns\bin\components moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\ff_temp\xpcom.ns\bin moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\ff_temp\xpcom.ns moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\ff_temp moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\Div12.tmp moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\Div11.tmp moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\Default moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\ckz_QCQS moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\Cddb\2793472 moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\Cddb moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\bye44.tmp\Driver moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\bye44.tmp\Documentation moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\bye44.tmp\Disk1 moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\bye44.tmp moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\bye2.tmp\Disk1 moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\bye2.tmp moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\bye16F.tmp\Disk1 moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\bye16F.tmp moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\bye1.tmp\Disk1 moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\bye1.tmp moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\audacity_1_2_temp moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\Adobe\Acrobat\7.0 moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\Adobe\Acrobat\6.0 moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\Adobe\Acrobat moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp\Adobe moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1\Temp moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff\LOCALS~1 moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1\Wolff moved successfully.
C:\Deckard\System Scanner\backup\DOCUME~1 moved successfully.
C:\Deckard\System Scanner\backup moved successfully.
C:\Deckard\System Scanner moved successfully.
C:\Deckard moved successfully.
OTMoveIt2 by OldTimer - Version 1.0.4.3 log created on 08162008_111701
et le dernier :
Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 11:19:38, on 16/08/2008
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v7.00 (7.00.6000.16705)
Boot mode: Normal
Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\Ati2evxx.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\System32\GEARSec.exe
C:\Program Files\Fichiers communs\LightScribe\LSSrvc.exe
C:\Program Files\Analog Devices\SoundMAX\SMAgent.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\system32\wscntfy.exe
C:\WINDOWS\system32\Ati2evxx.exe
C:\Program Files\ATI Technologies\ATI Control Panel\atiptaxx.exe
C:\Program Files\Analog Devices\SoundMAX\SMax4PNP.exe
C:\Program Files\Symantec\Norton Ghost\Agent\GhostTray.exe
C:\Program Files\Fichiers communs\Real\Update_OB\realsched.exe
C:\Program Files\CyberLink DVD Solution\PowerDVD\PDVDServ.exe
C:\Program Files\Sony Ericsson\Mobile2\Application Launcher\Application Launcher.exe
C:\Program Files\QuickTime\qttask.exe
C:\WINDOWS\ZSSnp211.exe
C:\WINDOWS\Domino.exe
C:\Program Files\Winamp\winampa.exe
D:\Omnipage pro\opware32.exe
D:\Presto! PVR\Monitor.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\Fichiers communs\Ahead\Lib\NMBgMonitor.exe
C:\Program Files\Symantec\Norton Ghost\Agent\PQV2iSvc.exe
C:\Program Files\Fichiers communs\Teleca Shared\CapabilityManager.exe
C:\Program Files\Fichiers communs\Ahead\Lib\NMIndexStoreSvr.exe
C:\Program Files\Fichiers communs\Teleca Shared\Generic.exe
C:\WINDOWS\explorer.exe
C:\Documents and Settings\Wolff\Bureau\uTorrent.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Program Files\Avira\AntiVir PersonalEdition Classic\sched.exe
C:\Program Files\Avira\AntiVir PersonalEdition Classic\avguard.exe
C:\Program Files\Avira\AntiVir PersonalEdition Classic\avgnt.exe
C:\Program Files\Trend Micro\HijackThis\HijackThis.exe
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = https://www.google.fr/?gws_rd=ssl
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = https://www.msn.com/fr-fr/?ocid=iehp
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = https://www.bing.com/?toHttps=1&redig=5FC791212101479BAFBE1A679848B1AF
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = https://www.bing.com/?toHttps=1&redig=5FC791212101479BAFBE1A679848B1AF
R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName = Liens
O2 - BHO: (no name) - {7E853D72-626A-48EC-A868-BA8D5E23E045} - (no file)
O3 - Toolbar: Systran50perso.IEPlugIn - {A5899B52-3AF9-4F56-85FE-AD7B3BE8490F} - C:\Program Files\SYSTRAN\5.0\Personal\IEPlugIn.dll
O4 - HKLM\..\Run: [ATIPTA] C:\Program Files\ATI Technologies\ATI Control Panel\atiptaxx.exe
O4 - HKLM\..\Run: [SoundMAXPnP] C:\Program Files\Analog Devices\SoundMAX\SMax4PNP.exe
O4 - HKLM\..\Run: [PinnacleDriverCheck] C:\WINDOWS\system32\PSDrvCheck.exe -CheckReg
O4 - HKLM\..\Run: [Norton Ghost 9.0] C:\Program Files\Symantec\Norton Ghost\Agent\GhostTray.exe
O4 - HKLM\..\Run: [REGSHAVE] C:\Program Files\REGSHAVE\REGSHAVE.EXE /AUTORUN
O4 - HKLM\..\Run: [TkBellExe] "C:\Program Files\Fichiers communs\Real\Update_OB\realsched.exe" -osboot
O4 - HKLM\..\Run: [RemoteControl] "C:\Program Files\CyberLink DVD Solution\PowerDVD\PDVDServ.exe"
O4 - HKLM\..\Run: [Sony Ericsson PC Suite] "C:\Program Files\Sony Ericsson\Mobile2\Application Launcher\Application Launcher.exe" /startoptions
O4 - HKLM\..\Run: [NeroFilterCheck] C:\Program Files\Fichiers communs\Ahead\Lib\NeroCheck.exe
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
O4 - HKLM\..\Run: [ZSSnp211] C:\WINDOWS\ZSSnp211.exe
O4 - HKLM\..\Run: [Domino] C:\WINDOWS\Domino.exe
O4 - HKLM\..\Run: [WinampAgent] C:\Program Files\Winamp\winampa.exe
O4 - HKLM\..\Run: [OmniPage] D:\Omnipage pro\opware32.exe
O4 - HKLM\..\Run: [ChangeFilterMerit] D:\Presto! PVR\ChangeFilterMerit.exe
O4 - HKLM\..\Run: [Presto! PVR Monitor] D:\Presto! PVR\Monitor.exe
O4 - HKLM\..\Run: [avgnt] "C:\Program Files\Avira\AntiVir PersonalEdition Classic\avgnt.exe" /min
O4 - HKCU\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\ctfmon.exe
O4 - HKCU\..\Run: [BgMonitor_{79662E04-7C6C-4d9f-84C7-88D8A56B10AA}] "C:\Program Files\Fichiers communs\Ahead\Lib\NMBgMonitor.exe"
O4 - HKUS\S-1-5-19\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'SERVICE LOCAL')
O4 - HKUS\S-1-5-20\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'SERVICE RÉSEAU')
O4 - HKUS\S-1-5-18\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'SYSTEM')
O4 - HKUS\.DEFAULT\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'Default user')
O4 - Global Startup: Adobe Reader Speed Launch.lnk = C:\Program Files\Adobe\Acrobat 7.0\Reader\reader_sl.exe
O8 - Extra context menu item: E&xporter vers Microsoft Excel - res://C:\PROGRA~1\MICROS~2\Office12\EXCEL.EXE/3000
O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O16 - DPF: {5C6698D9-7BE4-4122-8EC5-291D84DBD4A0} (Facebook Photo Uploader 4 Control) - http://upload.facebook.com/controls/FacebookPhotoUploader3.cab
O16 - DPF: {7584C670-2274-4EFB-B00B-D6AABA6D3850} (Microsoft RDP Client Control (redist)) - http://univ-r.u-strasbg.fr/TSWeb/msrdp.cab
O16 - DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} (Shockwave Flash Object) - http://fpdownload2.macromedia.com/get/shockwave/cabs/flash/swflash.cab
O16 - DPF: {D3D0E7BC-170E-11D0-B2D1-00AA00B92B50} (FireEvent Control) - http://singles.sfr.fr/dlm/ax/fireev.2.7.0.0.cab
O16 - DPF: {D4323BF2-006A-4440-A2F5-27E3E7AB25F8} (Virtools WebPlayer Class) - http://a532.g.akamai.net/...
O23 - Service: Avira AntiVir Personal - Free Antivirus Scheduler (AntiVirScheduler) - Avira GmbH - C:\Program Files\Avira\AntiVir PersonalEdition Classic\sched.exe
O23 - Service: Avira AntiVir Personal - Free Antivirus Guard (AntiVirService) - Avira GmbH - C:\Program Files\Avira\AntiVir PersonalEdition Classic\avguard.exe
O23 - Service: Ati HotKey Poller - Unknown owner - C:\WINDOWS\system32\Ati2evxx.exe
O23 - Service: ATI Smart - Unknown owner - C:\WINDOWS\system32\ati2sgag.exe
O23 - Service: GEARSecurity - GEAR Software - C:\WINDOWS\System32\GEARSec.exe
O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Fichiers communs\InstallShield\Driver\11\Intel 32\IDriverT.exe
O23 - Service: Service de l'iPod (iPod Service) - Unknown owner - C:\Program Files\iPod\bin\iPodService.exe (file missing)
O23 - Service: LightScribeService Direct Disc Labeling Service (LightScribeService) - Hewlett-Packard Company - C:\Program Files\Fichiers communs\LightScribe\LSSrvc.exe
O23 - Service: NBService - Nero AG - C:\Program Files\Nero\Nero 7\Nero BackItUp\NBService.exe
O23 - Service: Norton Ghost - Symantec Corporation - C:\Program Files\Symantec\Norton Ghost\Agent\PQV2iSvc.exe
O23 - Service: SoundMAX Agent Service (SoundMAX Agent Service (default)) - Analog Devices, Inc. - C:\Program Files\Analog Devices\SoundMAX\SMAgent.exe
Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 11:19:38, on 16/08/2008
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v7.00 (7.00.6000.16705)
Boot mode: Normal
Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\Ati2evxx.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\System32\GEARSec.exe
C:\Program Files\Fichiers communs\LightScribe\LSSrvc.exe
C:\Program Files\Analog Devices\SoundMAX\SMAgent.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\system32\wscntfy.exe
C:\WINDOWS\system32\Ati2evxx.exe
C:\Program Files\ATI Technologies\ATI Control Panel\atiptaxx.exe
C:\Program Files\Analog Devices\SoundMAX\SMax4PNP.exe
C:\Program Files\Symantec\Norton Ghost\Agent\GhostTray.exe
C:\Program Files\Fichiers communs\Real\Update_OB\realsched.exe
C:\Program Files\CyberLink DVD Solution\PowerDVD\PDVDServ.exe
C:\Program Files\Sony Ericsson\Mobile2\Application Launcher\Application Launcher.exe
C:\Program Files\QuickTime\qttask.exe
C:\WINDOWS\ZSSnp211.exe
C:\WINDOWS\Domino.exe
C:\Program Files\Winamp\winampa.exe
D:\Omnipage pro\opware32.exe
D:\Presto! PVR\Monitor.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\Fichiers communs\Ahead\Lib\NMBgMonitor.exe
C:\Program Files\Symantec\Norton Ghost\Agent\PQV2iSvc.exe
C:\Program Files\Fichiers communs\Teleca Shared\CapabilityManager.exe
C:\Program Files\Fichiers communs\Ahead\Lib\NMIndexStoreSvr.exe
C:\Program Files\Fichiers communs\Teleca Shared\Generic.exe
C:\WINDOWS\explorer.exe
C:\Documents and Settings\Wolff\Bureau\uTorrent.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Program Files\Avira\AntiVir PersonalEdition Classic\sched.exe
C:\Program Files\Avira\AntiVir PersonalEdition Classic\avguard.exe
C:\Program Files\Avira\AntiVir PersonalEdition Classic\avgnt.exe
C:\Program Files\Trend Micro\HijackThis\HijackThis.exe
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = https://www.google.fr/?gws_rd=ssl
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = https://www.msn.com/fr-fr/?ocid=iehp
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = https://www.bing.com/?toHttps=1&redig=5FC791212101479BAFBE1A679848B1AF
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = https://www.bing.com/?toHttps=1&redig=5FC791212101479BAFBE1A679848B1AF
R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName = Liens
O2 - BHO: (no name) - {7E853D72-626A-48EC-A868-BA8D5E23E045} - (no file)
O3 - Toolbar: Systran50perso.IEPlugIn - {A5899B52-3AF9-4F56-85FE-AD7B3BE8490F} - C:\Program Files\SYSTRAN\5.0\Personal\IEPlugIn.dll
O4 - HKLM\..\Run: [ATIPTA] C:\Program Files\ATI Technologies\ATI Control Panel\atiptaxx.exe
O4 - HKLM\..\Run: [SoundMAXPnP] C:\Program Files\Analog Devices\SoundMAX\SMax4PNP.exe
O4 - HKLM\..\Run: [PinnacleDriverCheck] C:\WINDOWS\system32\PSDrvCheck.exe -CheckReg
O4 - HKLM\..\Run: [Norton Ghost 9.0] C:\Program Files\Symantec\Norton Ghost\Agent\GhostTray.exe
O4 - HKLM\..\Run: [REGSHAVE] C:\Program Files\REGSHAVE\REGSHAVE.EXE /AUTORUN
O4 - HKLM\..\Run: [TkBellExe] "C:\Program Files\Fichiers communs\Real\Update_OB\realsched.exe" -osboot
O4 - HKLM\..\Run: [RemoteControl] "C:\Program Files\CyberLink DVD Solution\PowerDVD\PDVDServ.exe"
O4 - HKLM\..\Run: [Sony Ericsson PC Suite] "C:\Program Files\Sony Ericsson\Mobile2\Application Launcher\Application Launcher.exe" /startoptions
O4 - HKLM\..\Run: [NeroFilterCheck] C:\Program Files\Fichiers communs\Ahead\Lib\NeroCheck.exe
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
O4 - HKLM\..\Run: [ZSSnp211] C:\WINDOWS\ZSSnp211.exe
O4 - HKLM\..\Run: [Domino] C:\WINDOWS\Domino.exe
O4 - HKLM\..\Run: [WinampAgent] C:\Program Files\Winamp\winampa.exe
O4 - HKLM\..\Run: [OmniPage] D:\Omnipage pro\opware32.exe
O4 - HKLM\..\Run: [ChangeFilterMerit] D:\Presto! PVR\ChangeFilterMerit.exe
O4 - HKLM\..\Run: [Presto! PVR Monitor] D:\Presto! PVR\Monitor.exe
O4 - HKLM\..\Run: [avgnt] "C:\Program Files\Avira\AntiVir PersonalEdition Classic\avgnt.exe" /min
O4 - HKCU\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\ctfmon.exe
O4 - HKCU\..\Run: [BgMonitor_{79662E04-7C6C-4d9f-84C7-88D8A56B10AA}] "C:\Program Files\Fichiers communs\Ahead\Lib\NMBgMonitor.exe"
O4 - HKUS\S-1-5-19\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'SERVICE LOCAL')
O4 - HKUS\S-1-5-20\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'SERVICE RÉSEAU')
O4 - HKUS\S-1-5-18\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'SYSTEM')
O4 - HKUS\.DEFAULT\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'Default user')
O4 - Global Startup: Adobe Reader Speed Launch.lnk = C:\Program Files\Adobe\Acrobat 7.0\Reader\reader_sl.exe
O8 - Extra context menu item: E&xporter vers Microsoft Excel - res://C:\PROGRA~1\MICROS~2\Office12\EXCEL.EXE/3000
O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O16 - DPF: {5C6698D9-7BE4-4122-8EC5-291D84DBD4A0} (Facebook Photo Uploader 4 Control) - http://upload.facebook.com/controls/FacebookPhotoUploader3.cab
O16 - DPF: {7584C670-2274-4EFB-B00B-D6AABA6D3850} (Microsoft RDP Client Control (redist)) - http://univ-r.u-strasbg.fr/TSWeb/msrdp.cab
O16 - DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} (Shockwave Flash Object) - http://fpdownload2.macromedia.com/get/shockwave/cabs/flash/swflash.cab
O16 - DPF: {D3D0E7BC-170E-11D0-B2D1-00AA00B92B50} (FireEvent Control) - http://singles.sfr.fr/dlm/ax/fireev.2.7.0.0.cab
O16 - DPF: {D4323BF2-006A-4440-A2F5-27E3E7AB25F8} (Virtools WebPlayer Class) - http://a532.g.akamai.net/...
O23 - Service: Avira AntiVir Personal - Free Antivirus Scheduler (AntiVirScheduler) - Avira GmbH - C:\Program Files\Avira\AntiVir PersonalEdition Classic\sched.exe
O23 - Service: Avira AntiVir Personal - Free Antivirus Guard (AntiVirService) - Avira GmbH - C:\Program Files\Avira\AntiVir PersonalEdition Classic\avguard.exe
O23 - Service: Ati HotKey Poller - Unknown owner - C:\WINDOWS\system32\Ati2evxx.exe
O23 - Service: ATI Smart - Unknown owner - C:\WINDOWS\system32\ati2sgag.exe
O23 - Service: GEARSecurity - GEAR Software - C:\WINDOWS\System32\GEARSec.exe
O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Fichiers communs\InstallShield\Driver\11\Intel 32\IDriverT.exe
O23 - Service: Service de l'iPod (iPod Service) - Unknown owner - C:\Program Files\iPod\bin\iPodService.exe (file missing)
O23 - Service: LightScribeService Direct Disc Labeling Service (LightScribeService) - Hewlett-Packard Company - C:\Program Files\Fichiers communs\LightScribe\LSSrvc.exe
O23 - Service: NBService - Nero AG - C:\Program Files\Nero\Nero 7\Nero BackItUp\NBService.exe
O23 - Service: Norton Ghost - Symantec Corporation - C:\Program Files\Symantec\Norton Ghost\Agent\PQV2iSvc.exe
O23 - Service: SoundMAX Agent Service (SoundMAX Agent Service (default)) - Analog Devices, Inc. - C:\Program Files\Analog Devices\SoundMAX\SMAgent.exe