Antivirus 2008 PRO
Fermé
la_mailloche
-
16 août 2008 à 13:14
buginformatik Messages postés 2163 Date d'inscription mardi 16 janvier 2007 Statut Contributeur Dernière intervention 21 avril 2011 - 17 août 2008 à 17:14
buginformatik Messages postés 2163 Date d'inscription mardi 16 janvier 2007 Statut Contributeur Dernière intervention 21 avril 2011 - 17 août 2008 à 17:14
A voir également:
- Antivirus 2008 PRO
- Comodo antivirus - Télécharger - Sécurité
- Clé d'activation windows 10 pro - Guide
- Panda antivirus - Télécharger - Antivirus & Antimalwares
- I14 pro max - Accueil - Guide téléphones
- Desactiver antivirus windows 10 - Guide
25 réponses
buginformatik
Messages postés
2163
Date d'inscription
mardi 16 janvier 2007
Statut
Contributeur
Dernière intervention
21 avril 2011
54
16 août 2008 à 13:15
16 août 2008 à 13:15
La dernière version de Malwarebytes anti malware 1.23 : https://www.commentcamarche.net/telecharger/securite/14361-malwarebytes-anti-malware/
Voici un tuto pour bien l'installer et l'utiliser : http://www.infos-du-net.com/forum/278396-11-tuto-malwarebytes-anti-malware-mbam
(N'utilises pas File assassin)
! Il est Important d'être en mode sans échec lors de la recherche ! (Redémarrer l'ordi et tapoter à plusieurs reprises la touche F8 après le bip du PC)
N'oublie pas de supprimer les menaces à la fin du scan et de poster le log sur le forum !
Voici un tuto pour bien l'installer et l'utiliser : http://www.infos-du-net.com/forum/278396-11-tuto-malwarebytes-anti-malware-mbam
(N'utilises pas File assassin)
! Il est Important d'être en mode sans échec lors de la recherche ! (Redémarrer l'ordi et tapoter à plusieurs reprises la touche F8 après le bip du PC)
N'oublie pas de supprimer les menaces à la fin du scan et de poster le log sur le forum !
Bon voilà j'ai suivi la manip avec malwarebytes j'ai supprimé toute la sélection,certains ayant dû être supprimés au redémarrage de l'ordi, j'ai redémarré et antivirus 008 est toujoursprésent sur l'ordi...
Voici le rapport final :
Malwarebytes' Anti-Malware 1.24
Version de la base de données: 1056
Windows 5.1.2600 Service Pack 2
17:01:43 16/08/2008
mbam-log-8-16-2008 (17-01-42).txt
Type de recherche: Examen complet (C:\|)
Eléments examinés: 96422
Temps écoulé: 2 hour(s), 28 minute(s), 54 second(s)
Processus mémoire infecté(s): 0
Module(s) mémoire infecté(s): 2
Clé(s) du Registre infectée(s): 20
Valeur(s) du Registre infectée(s): 7
Elément(s) de données du Registre infecté(s): 2
Dossier(s) infecté(s): 5
Fichier(s) infecté(s): 137
Processus mémoire infecté(s):
(Aucun élément nuisible détecté)
Module(s) mémoire infecté(s):
C:\WINDOWS\system32\rqRKDWMd.dll (Trojan.Vundo) -> Delete on reboot.
C:\WINDOWS\system32\efcBqoOg.dll (Trojan.Vundo) -> Delete on reboot.
Clé(s) du Registre infectée(s):
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{521ed1e0-d0c3-4c65-bace-a86c531b60b6} (Trojan.Vundo) -> Delete on reboot.
HKEY_CLASSES_ROOT\CLSID\{521ed1e0-d0c3-4c65-bace-a86c531b60b6} (Trojan.Vundo) -> Delete on reboot.
HKEY_CLASSES_ROOT\CLSID\{661778f7-cdda-4611-99b0-43245c7e971d} (Trojan.Vundo) -> Delete on reboot.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{661778f7-cdda-4611-99b0-43245c7e971d} (Trojan.Vundo) -> Delete on reboot.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\efcbqoog (Trojan.Vundo) -> Delete on reboot.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\webvideo (Trojan.Vapsup) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{94be7df6-d2dd-49fd-a615-2967c17acf78} (Trojan.FakeAlert) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\antivirus 2008 (Rogue.Antivirus2008) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\tdssdata (Trojan.Agent) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\tdss (Trojan.Agent) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\tdssserv (Rootkit.Agent) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\RemoveRP (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\ugac (Rogue.PCSecureSystem) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\TypeLib\{a09db1d7-43d1-48fa-a240-31ff37affbdc} (Trojan.FakeAlert) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\Interface\{86544e26-4093-43dc-8e53-fdb8ddc5838a} (Trojan.FakeAlert) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{aba69cf4-20fb-42ce-bb6d-b6171d64b8ec} (Trojan.FakeAlert) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\VSPlugin (Trojan.FakeAlert) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\vwsrfton.bmaf (Trojan.FakeAlert) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\vwsrfton.toolbar.1 (Trojan.FakeAlert) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\MediaEldoradoCodec (Trojan.FakeAlert) -> Quarantined and deleted successfully.
Valeur(s) du Registre infectée(s):
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\ShellExecuteHooks\{661778f7-cdda-4611-99b0-43245c7e971d} (Trojan.Vundo) -> Delete on reboot.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\antivirus-2008.exe (Rogue.Installer) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\wbqxfpgl (Trojan.FakeAlert) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Products\rdomain (Rogue.PCVirusless) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Products\prodname (Rogue.PCVirusless) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Products\compname (Rogue.PCVirusless) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Toolbar\{aba69cf4-20fb-42ce-bb6d-b6171d64b8ec} (Trojan.FakeAlert) -> Quarantined and deleted successfully.
Elément(s) de données du Registre infecté(s):
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\LSA\Notification Packages (Trojan.Vundo) -> Data: c:\windows\system32\rqrkdwmd -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\LSA\Authentication Packages (Trojan.Vundo) -> Data: c:\windows\system32\rqrkdwmd -> Quarantined and deleted successfully.
Dossier(s) infecté(s):
C:\Documents and Settings\All Users\Application Data\SalesMon (Rogue.Multiple) -> Quarantined and deleted successfully.
C:\Documents and Settings\All Users\Application Data\SalesMon\Data (Rogue.Multiple) -> Quarantined and deleted successfully.
C:\Program Files\Antivirus 2008 (Rogue.Antivirus2008) -> Quarantined and deleted successfully.
C:\Program Files\Antivirus 2008\Infected (Rogue.Antivirus2008) -> Quarantined and deleted successfully.
C:\Program Files\Antivirus 2008\Suspicious (Rogue.Antivirus2008) -> Quarantined and deleted successfully.
Fichier(s) infecté(s):
C:\WINDOWS\system32\rqRKDWMd.dll (Trojan.Vundo) -> Delete on reboot.
C:\WINDOWS\system32\dMWDKRqr.ini (Trojan.Vundo) -> Delete on reboot.
C:\WINDOWS\system32\dMWDKRqr.ini2 (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\bkkprklp.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\plkrpkkb.ini (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\xwhwkvqc.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\cqvkwhwx.ini (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\efcBqoOg.dll (Trojan.Vundo) -> Delete on reboot.
C:\Program Files\Antivirus 2008\Antivirus-2008.exe (Rogue.Installer) -> Quarantined and deleted successfully.
C:\Documents and Settings\Daniel Le Gal\Local Settings\Temp\dssc32.exe (Rogue.Installer) -> Quarantined and deleted successfully.
C:\Documents and Settings\Daniel Le Gal\Local Settings\Temporary Internet Files\Content.IE5\0IGG5GTI\Antivirus2008PRO[1].exe (Rogue.Installer) -> Quarantined and deleted successfully.
C:\Documents and Settings\Daniel Le Gal\Local Settings\Temporary Internet Files\Content.IE5\0IGG5GTI\kb456456[1] (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\Documents and Settings\Daniel Le Gal\Local Settings\Temporary Internet Files\Content.IE5\9BW4WZ7X\kb767887[1] (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\Documents and Settings\Daniel Le Gal\Local Settings\Temporary Internet Files\Content.IE5\L6REM0ZK\cntr[1].gif (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\Documents and Settings\Daniel Le Gal\Local Settings\Temporary Internet Files\Content.IE5\OI9K6YRK\aqua3d[1] (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\Documents and Settings\Daniel Le Gal\Local Settings\Temporary Internet Files\Content.IE5\RAQFLJ4I\kb456456[1] (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\Documents and Settings\Daniel Le Gal\Local Settings\Temporary Internet Files\Content.IE5\UG3U8PXZ\file[1].exe (Trojan.Dropper) -> Quarantined and deleted successfully.
C:\WINDOWS\ateqoflr.exe (Trojan.Vapsup) -> Quarantined and deleted successfully.
C:\WINDOWS\edpw.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\WINDOWS\wbqxfpgl.dll (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\pvalbcyv.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\tfrrfg.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\tuvULBQK.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\Program Files\Antivirus 2008\vscan.tsi (Rogue.Antivirus2008) -> Quarantined and deleted successfully.
C:\Program Files\Antivirus 2008\zlib.dll (Rogue.Antivirus2008) -> Quarantined and deleted successfully.
C:\Documents and Settings\Daniel Le Gal\Application Data\Microsoft\Internet Explorer\Quick Launch\Antivirus-2008.lnk (Rogue.Antivirus2008) -> Quarantined and deleted successfully.
C:\WINDOWS\cookies.ini (Malware.Trace) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\tdssadw.dll (Trojan.Agent) -> Delete on reboot.
C:\WINDOWS\system32\tdssl.dll (Trojan.Agent) -> Delete on reboot.
C:\WINDOWS\system32\tdssmain.dll (Trojan.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\tdssinit.dll (Trojan.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\tdsslog.dll (Trojan.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\tdssservers.dat (Trojan.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\drivers\tdssserv.sys (Trojan.Agent) -> Delete on reboot.
C:\WINDOWS\rs.txt (Malware.Trace) -> Quarantined and deleted successfully.
C:\Program Files\tmp29093.exe (Trojan.Alphabet) -> Quarantined and deleted successfully.
C:\Program Files\tmp29296.exe (Trojan.Alphabet) -> Quarantined and deleted successfully.
C:\Program Files\tmp29359.exe (Trojan.Alphabet) -> Quarantined and deleted successfully.
C:\Program Files\tmp29375.exe (Trojan.Alphabet) -> Quarantined and deleted successfully.
C:\Program Files\tmp29390.exe (Trojan.Alphabet) -> Quarantined and deleted successfully.
C:\Program Files\tmp29500.exe (Trojan.Alphabet) -> Quarantined and deleted successfully.
C:\Program Files\tmp29640.exe (Trojan.Alphabet) -> Quarantined and deleted successfully.
C:\Program Files\tmp29671.exe (Trojan.Alphabet) -> Quarantined and deleted successfully.
C:\Program Files\tmp29843.exe (Trojan.Alphabet) -> Quarantined and deleted successfully.
C:\Program Files\tmp29859.exe (Trojan.Alphabet) -> Quarantined and deleted successfully.
C:\Program Files\tmp30125.exe (Trojan.Alphabet) -> Quarantined and deleted successfully.
C:\Program Files\tmp30234.exe (Trojan.Alphabet) -> Quarantined and deleted successfully.
C:\Program Files\tmp30375.exe (Trojan.Alphabet) -> Quarantined and deleted successfully.
C:\Program Files\tmp30390.exe (Trojan.Alphabet) -> Quarantined and deleted successfully.
C:\Program Files\tmp30437.exe (Trojan.Alphabet) -> Quarantined and deleted successfully.
C:\Program Files\tmp30562.exe (Trojan.Alphabet) -> Quarantined and deleted successfully.
C:\Program Files\tmp30828.exe (Trojan.Alphabet) -> Quarantined and deleted successfully.
C:\Program Files\tmp31031.exe (Trojan.Alphabet) -> Quarantined and deleted successfully.
C:\Program Files\tmp31375.exe (Trojan.Alphabet) -> Quarantined and deleted successfully.
C:\Program Files\tmp31562.exe (Trojan.Alphabet) -> Quarantined and deleted successfully.
C:\Program Files\tmp31859.exe (Trojan.Alphabet) -> Quarantined and deleted successfully.
C:\Program Files\tmp31937.exe (Trojan.Alphabet) -> Quarantined and deleted successfully.
C:\Program Files\tmp31968.exe (Trojan.Alphabet) -> Quarantined and deleted successfully.
C:\Program Files\tmp32343.exe (Trojan.Alphabet) -> Quarantined and deleted successfully.
C:\Program Files\tmp32562.exe (Trojan.Alphabet) -> Quarantined and deleted successfully.
C:\Program Files\tmp32734.exe (Trojan.Alphabet) -> Quarantined and deleted successfully.
C:\Program Files\tmp32859.exe (Trojan.Alphabet) -> Quarantined and deleted successfully.
C:\Program Files\tmp32984.exe (Trojan.Alphabet) -> Quarantined and deleted successfully.
C:\Program Files\tmp33125.exe (Trojan.Alphabet) -> Quarantined and deleted successfully.
C:\Program Files\tmp33468.exe (Trojan.Alphabet) -> Quarantined and deleted successfully.
C:\Program Files\tmp33750.exe (Trojan.Alphabet) -> Quarantined and deleted successfully.
C:\Program Files\tmp33859.exe (Trojan.Alphabet) -> Quarantined and deleted successfully.
C:\Program Files\tmp34187.exe (Trojan.Alphabet) -> Quarantined and deleted successfully.
C:\Program Files\tmp34515.exe (Trojan.Alphabet) -> Quarantined and deleted successfully.
C:\Program Files\tmp34562.exe (Trojan.Alphabet) -> Quarantined and deleted successfully.
C:\Program Files\tmp34578.exe (Trojan.Alphabet) -> Quarantined and deleted successfully.
C:\Program Files\tmp34656.exe (Trojan.Alphabet) -> Quarantined and deleted successfully.
C:\Program Files\tmp34781.exe (Trojan.Alphabet) -> Quarantined and deleted successfully.
C:\Program Files\tmp34812.exe (Trojan.Alphabet) -> Quarantined and deleted successfully.
C:\Program Files\tmp35093.exe (Trojan.Alphabet) -> Quarantined and deleted successfully.
C:\Program Files\tmp35109.exe (Trojan.Alphabet) -> Quarantined and deleted successfully.
C:\Program Files\tmp35312.exe (Trojan.Alphabet) -> Quarantined and deleted successfully.
C:\Program Files\tmp35421.exe (Trojan.Alphabet) -> Quarantined and deleted successfully.
C:\Program Files\tmp35468.exe (Trojan.Alphabet) -> Quarantined and deleted successfully.
C:\Program Files\tmp35500.exe (Trojan.Alphabet) -> Quarantined and deleted successfully.
C:\Program Files\tmp35609.exe (Trojan.Alphabet) -> Quarantined and deleted successfully.
C:\Program Files\tmp35718.exe (Trojan.Alphabet) -> Quarantined and deleted successfully.
C:\Program Files\tmp35828.exe (Trojan.Alphabet) -> Quarantined and deleted successfully.
C:\Program Files\tmp36000.exe (Trojan.Alphabet) -> Quarantined and deleted successfully.
C:\Program Files\tmp36062.exe (Trojan.Alphabet) -> Quarantined and deleted successfully.
C:\Program Files\tmp36125.exe (Trojan.Alphabet) -> Quarantined and deleted successfully.
C:\Program Files\tmp36203.exe (Trojan.Alphabet) -> Quarantined and deleted successfully.
C:\Program Files\tmp36375.exe (Trojan.Alphabet) -> Quarantined and deleted successfully.
C:\Program Files\tmp36406.exe (Trojan.Alphabet) -> Quarantined and deleted successfully.
C:\Program Files\tmp36750.exe (Trojan.Alphabet) -> Quarantined and deleted successfully.
C:\Program Files\tmp36796.exe (Trojan.Alphabet) -> Quarantined and deleted successfully.
C:\Program Files\tmp36843.exe (Trojan.Alphabet) -> Quarantined and deleted successfully.
C:\Program Files\tmp36921.exe (Trojan.Alphabet) -> Quarantined and deleted successfully.
C:\Program Files\tmp36937.exe (Trojan.Alphabet) -> Quarantined and deleted successfully.
C:\Program Files\tmp37125.exe (Trojan.Alphabet) -> Quarantined and deleted successfully.
C:\Program Files\tmp37234.exe (Trojan.Alphabet) -> Quarantined and deleted successfully.
C:\Program Files\tmp37281.exe (Trojan.Alphabet) -> Quarantined and deleted successfully.
C:\Program Files\tmp37468.exe (Trojan.Alphabet) -> Quarantined and deleted successfully.
C:\Program Files\tmp37500.exe (Trojan.Alphabet) -> Quarantined and deleted successfully.
C:\Program Files\tmp37578.exe (Trojan.Alphabet) -> Quarantined and deleted successfully.
C:\Program Files\tmp37718.exe (Trojan.Alphabet) -> Quarantined and deleted successfully.
C:\Program Files\tmp38015.exe (Trojan.Alphabet) -> Quarantined and deleted successfully.
C:\Program Files\tmp38046.exe (Trojan.Alphabet) -> Quarantined and deleted successfully.
C:\Program Files\tmp38203.exe (Trojan.Alphabet) -> Quarantined and deleted successfully.
C:\Program Files\tmp38218.exe (Trojan.Alphabet) -> Quarantined and deleted successfully.
C:\Program Files\tmp39015.exe (Trojan.Alphabet) -> Quarantined and deleted successfully.
C:\Program Files\tmp39109.exe (Trojan.Alphabet) -> Quarantined and deleted successfully.
C:\Program Files\tmp39453.exe (Trojan.Alphabet) -> Quarantined and deleted successfully.
C:\Program Files\tmp39625.exe (Trojan.Alphabet) -> Quarantined and deleted successfully.
C:\Program Files\tmp39640.exe (Trojan.Alphabet) -> Quarantined and deleted successfully.
C:\Program Files\tmp39703.exe (Trojan.Alphabet) -> Quarantined and deleted successfully.
C:\Program Files\tmp39718.exe (Trojan.Alphabet) -> Quarantined and deleted successfully.
C:\Program Files\tmp39890.exe (Trojan.Alphabet) -> Quarantined and deleted successfully.
C:\Program Files\tmp40078.exe (Trojan.Alphabet) -> Quarantined and deleted successfully.
C:\Program Files\tmp40140.exe (Trojan.Alphabet) -> Quarantined and deleted successfully.
C:\Program Files\tmp40281.exe (Trojan.Alphabet) -> Quarantined and deleted successfully.
C:\Program Files\tmp41687.exe (Trojan.Alphabet) -> Quarantined and deleted successfully.
C:\Program Files\tmp41843.exe (Trojan.Alphabet) -> Quarantined and deleted successfully.
C:\Program Files\tmp41890.exe (Trojan.Alphabet) -> Quarantined and deleted successfully.
C:\Program Files\tmp42437.exe (Trojan.Alphabet) -> Quarantined and deleted successfully.
C:\Program Files\tmp42828.exe (Trojan.Alphabet) -> Quarantined and deleted successfully.
C:\Program Files\tmp42843.exe (Trojan.Alphabet) -> Quarantined and deleted successfully.
C:\Program Files\tmp42984.exe (Trojan.Alphabet) -> Quarantined and deleted successfully.
C:\Program Files\tmp43000.exe (Trojan.Alphabet) -> Quarantined and deleted successfully.
C:\Program Files\tmp43546.exe (Trojan.Alphabet) -> Quarantined and deleted successfully.
C:\Program Files\tmp44000.exe (Trojan.Alphabet) -> Quarantined and deleted successfully.
C:\Program Files\tmp45546.exe (Trojan.Alphabet) -> Quarantined and deleted successfully.
C:\Program Files\tmp45609.exe (Trojan.Alphabet) -> Quarantined and deleted successfully.
C:\Program Files\tmp46421.exe (Trojan.Alphabet) -> Quarantined and deleted successfully.
C:\Program Files\tmp46906.exe (Trojan.Alphabet) -> Quarantined and deleted successfully.
C:\Program Files\tmp49640.exe (Trojan.Alphabet) -> Quarantined and deleted successfully.
C:\Program Files\tmp68843.exe (Trojan.Alphabet) -> Quarantined and deleted successfully.
C:\Program Files\tmp75156.exe (Trojan.Alphabet) -> Quarantined and deleted successfully.
C:\Program Files\tmp8688828.exe (Trojan.Alphabet) -> Quarantined and deleted successfully.
C:\Program Files\tmp8693843.exe (Trojan.Alphabet) -> Quarantined and deleted successfully.
C:\WINDOWS\vwsrfton.dll (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\Documents and Settings\Daniel Le Gal\Bureau\Antivirus-2008.lnk (Rogue.Antivirus) -> Quarantined and deleted successfully.
Que dois-je donc faire maintenant?
Merci de votre patience...
Voici le rapport final :
Malwarebytes' Anti-Malware 1.24
Version de la base de données: 1056
Windows 5.1.2600 Service Pack 2
17:01:43 16/08/2008
mbam-log-8-16-2008 (17-01-42).txt
Type de recherche: Examen complet (C:\|)
Eléments examinés: 96422
Temps écoulé: 2 hour(s), 28 minute(s), 54 second(s)
Processus mémoire infecté(s): 0
Module(s) mémoire infecté(s): 2
Clé(s) du Registre infectée(s): 20
Valeur(s) du Registre infectée(s): 7
Elément(s) de données du Registre infecté(s): 2
Dossier(s) infecté(s): 5
Fichier(s) infecté(s): 137
Processus mémoire infecté(s):
(Aucun élément nuisible détecté)
Module(s) mémoire infecté(s):
C:\WINDOWS\system32\rqRKDWMd.dll (Trojan.Vundo) -> Delete on reboot.
C:\WINDOWS\system32\efcBqoOg.dll (Trojan.Vundo) -> Delete on reboot.
Clé(s) du Registre infectée(s):
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{521ed1e0-d0c3-4c65-bace-a86c531b60b6} (Trojan.Vundo) -> Delete on reboot.
HKEY_CLASSES_ROOT\CLSID\{521ed1e0-d0c3-4c65-bace-a86c531b60b6} (Trojan.Vundo) -> Delete on reboot.
HKEY_CLASSES_ROOT\CLSID\{661778f7-cdda-4611-99b0-43245c7e971d} (Trojan.Vundo) -> Delete on reboot.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{661778f7-cdda-4611-99b0-43245c7e971d} (Trojan.Vundo) -> Delete on reboot.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\efcbqoog (Trojan.Vundo) -> Delete on reboot.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\webvideo (Trojan.Vapsup) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{94be7df6-d2dd-49fd-a615-2967c17acf78} (Trojan.FakeAlert) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\antivirus 2008 (Rogue.Antivirus2008) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\tdssdata (Trojan.Agent) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\tdss (Trojan.Agent) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\tdssserv (Rootkit.Agent) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\RemoveRP (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\ugac (Rogue.PCSecureSystem) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\TypeLib\{a09db1d7-43d1-48fa-a240-31ff37affbdc} (Trojan.FakeAlert) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\Interface\{86544e26-4093-43dc-8e53-fdb8ddc5838a} (Trojan.FakeAlert) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{aba69cf4-20fb-42ce-bb6d-b6171d64b8ec} (Trojan.FakeAlert) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\VSPlugin (Trojan.FakeAlert) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\vwsrfton.bmaf (Trojan.FakeAlert) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\vwsrfton.toolbar.1 (Trojan.FakeAlert) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\MediaEldoradoCodec (Trojan.FakeAlert) -> Quarantined and deleted successfully.
Valeur(s) du Registre infectée(s):
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\ShellExecuteHooks\{661778f7-cdda-4611-99b0-43245c7e971d} (Trojan.Vundo) -> Delete on reboot.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\antivirus-2008.exe (Rogue.Installer) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\wbqxfpgl (Trojan.FakeAlert) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Products\rdomain (Rogue.PCVirusless) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Products\prodname (Rogue.PCVirusless) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Products\compname (Rogue.PCVirusless) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Toolbar\{aba69cf4-20fb-42ce-bb6d-b6171d64b8ec} (Trojan.FakeAlert) -> Quarantined and deleted successfully.
Elément(s) de données du Registre infecté(s):
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\LSA\Notification Packages (Trojan.Vundo) -> Data: c:\windows\system32\rqrkdwmd -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\LSA\Authentication Packages (Trojan.Vundo) -> Data: c:\windows\system32\rqrkdwmd -> Quarantined and deleted successfully.
Dossier(s) infecté(s):
C:\Documents and Settings\All Users\Application Data\SalesMon (Rogue.Multiple) -> Quarantined and deleted successfully.
C:\Documents and Settings\All Users\Application Data\SalesMon\Data (Rogue.Multiple) -> Quarantined and deleted successfully.
C:\Program Files\Antivirus 2008 (Rogue.Antivirus2008) -> Quarantined and deleted successfully.
C:\Program Files\Antivirus 2008\Infected (Rogue.Antivirus2008) -> Quarantined and deleted successfully.
C:\Program Files\Antivirus 2008\Suspicious (Rogue.Antivirus2008) -> Quarantined and deleted successfully.
Fichier(s) infecté(s):
C:\WINDOWS\system32\rqRKDWMd.dll (Trojan.Vundo) -> Delete on reboot.
C:\WINDOWS\system32\dMWDKRqr.ini (Trojan.Vundo) -> Delete on reboot.
C:\WINDOWS\system32\dMWDKRqr.ini2 (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\bkkprklp.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\plkrpkkb.ini (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\xwhwkvqc.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\cqvkwhwx.ini (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\efcBqoOg.dll (Trojan.Vundo) -> Delete on reboot.
C:\Program Files\Antivirus 2008\Antivirus-2008.exe (Rogue.Installer) -> Quarantined and deleted successfully.
C:\Documents and Settings\Daniel Le Gal\Local Settings\Temp\dssc32.exe (Rogue.Installer) -> Quarantined and deleted successfully.
C:\Documents and Settings\Daniel Le Gal\Local Settings\Temporary Internet Files\Content.IE5\0IGG5GTI\Antivirus2008PRO[1].exe (Rogue.Installer) -> Quarantined and deleted successfully.
C:\Documents and Settings\Daniel Le Gal\Local Settings\Temporary Internet Files\Content.IE5\0IGG5GTI\kb456456[1] (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\Documents and Settings\Daniel Le Gal\Local Settings\Temporary Internet Files\Content.IE5\9BW4WZ7X\kb767887[1] (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\Documents and Settings\Daniel Le Gal\Local Settings\Temporary Internet Files\Content.IE5\L6REM0ZK\cntr[1].gif (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\Documents and Settings\Daniel Le Gal\Local Settings\Temporary Internet Files\Content.IE5\OI9K6YRK\aqua3d[1] (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\Documents and Settings\Daniel Le Gal\Local Settings\Temporary Internet Files\Content.IE5\RAQFLJ4I\kb456456[1] (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\Documents and Settings\Daniel Le Gal\Local Settings\Temporary Internet Files\Content.IE5\UG3U8PXZ\file[1].exe (Trojan.Dropper) -> Quarantined and deleted successfully.
C:\WINDOWS\ateqoflr.exe (Trojan.Vapsup) -> Quarantined and deleted successfully.
C:\WINDOWS\edpw.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\WINDOWS\wbqxfpgl.dll (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\pvalbcyv.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\tfrrfg.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\tuvULBQK.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\Program Files\Antivirus 2008\vscan.tsi (Rogue.Antivirus2008) -> Quarantined and deleted successfully.
C:\Program Files\Antivirus 2008\zlib.dll (Rogue.Antivirus2008) -> Quarantined and deleted successfully.
C:\Documents and Settings\Daniel Le Gal\Application Data\Microsoft\Internet Explorer\Quick Launch\Antivirus-2008.lnk (Rogue.Antivirus2008) -> Quarantined and deleted successfully.
C:\WINDOWS\cookies.ini (Malware.Trace) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\tdssadw.dll (Trojan.Agent) -> Delete on reboot.
C:\WINDOWS\system32\tdssl.dll (Trojan.Agent) -> Delete on reboot.
C:\WINDOWS\system32\tdssmain.dll (Trojan.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\tdssinit.dll (Trojan.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\tdsslog.dll (Trojan.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\tdssservers.dat (Trojan.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\drivers\tdssserv.sys (Trojan.Agent) -> Delete on reboot.
C:\WINDOWS\rs.txt (Malware.Trace) -> Quarantined and deleted successfully.
C:\Program Files\tmp29093.exe (Trojan.Alphabet) -> Quarantined and deleted successfully.
C:\Program Files\tmp29296.exe (Trojan.Alphabet) -> Quarantined and deleted successfully.
C:\Program Files\tmp29359.exe (Trojan.Alphabet) -> Quarantined and deleted successfully.
C:\Program Files\tmp29375.exe (Trojan.Alphabet) -> Quarantined and deleted successfully.
C:\Program Files\tmp29390.exe (Trojan.Alphabet) -> Quarantined and deleted successfully.
C:\Program Files\tmp29500.exe (Trojan.Alphabet) -> Quarantined and deleted successfully.
C:\Program Files\tmp29640.exe (Trojan.Alphabet) -> Quarantined and deleted successfully.
C:\Program Files\tmp29671.exe (Trojan.Alphabet) -> Quarantined and deleted successfully.
C:\Program Files\tmp29843.exe (Trojan.Alphabet) -> Quarantined and deleted successfully.
C:\Program Files\tmp29859.exe (Trojan.Alphabet) -> Quarantined and deleted successfully.
C:\Program Files\tmp30125.exe (Trojan.Alphabet) -> Quarantined and deleted successfully.
C:\Program Files\tmp30234.exe (Trojan.Alphabet) -> Quarantined and deleted successfully.
C:\Program Files\tmp30375.exe (Trojan.Alphabet) -> Quarantined and deleted successfully.
C:\Program Files\tmp30390.exe (Trojan.Alphabet) -> Quarantined and deleted successfully.
C:\Program Files\tmp30437.exe (Trojan.Alphabet) -> Quarantined and deleted successfully.
C:\Program Files\tmp30562.exe (Trojan.Alphabet) -> Quarantined and deleted successfully.
C:\Program Files\tmp30828.exe (Trojan.Alphabet) -> Quarantined and deleted successfully.
C:\Program Files\tmp31031.exe (Trojan.Alphabet) -> Quarantined and deleted successfully.
C:\Program Files\tmp31375.exe (Trojan.Alphabet) -> Quarantined and deleted successfully.
C:\Program Files\tmp31562.exe (Trojan.Alphabet) -> Quarantined and deleted successfully.
C:\Program Files\tmp31859.exe (Trojan.Alphabet) -> Quarantined and deleted successfully.
C:\Program Files\tmp31937.exe (Trojan.Alphabet) -> Quarantined and deleted successfully.
C:\Program Files\tmp31968.exe (Trojan.Alphabet) -> Quarantined and deleted successfully.
C:\Program Files\tmp32343.exe (Trojan.Alphabet) -> Quarantined and deleted successfully.
C:\Program Files\tmp32562.exe (Trojan.Alphabet) -> Quarantined and deleted successfully.
C:\Program Files\tmp32734.exe (Trojan.Alphabet) -> Quarantined and deleted successfully.
C:\Program Files\tmp32859.exe (Trojan.Alphabet) -> Quarantined and deleted successfully.
C:\Program Files\tmp32984.exe (Trojan.Alphabet) -> Quarantined and deleted successfully.
C:\Program Files\tmp33125.exe (Trojan.Alphabet) -> Quarantined and deleted successfully.
C:\Program Files\tmp33468.exe (Trojan.Alphabet) -> Quarantined and deleted successfully.
C:\Program Files\tmp33750.exe (Trojan.Alphabet) -> Quarantined and deleted successfully.
C:\Program Files\tmp33859.exe (Trojan.Alphabet) -> Quarantined and deleted successfully.
C:\Program Files\tmp34187.exe (Trojan.Alphabet) -> Quarantined and deleted successfully.
C:\Program Files\tmp34515.exe (Trojan.Alphabet) -> Quarantined and deleted successfully.
C:\Program Files\tmp34562.exe (Trojan.Alphabet) -> Quarantined and deleted successfully.
C:\Program Files\tmp34578.exe (Trojan.Alphabet) -> Quarantined and deleted successfully.
C:\Program Files\tmp34656.exe (Trojan.Alphabet) -> Quarantined and deleted successfully.
C:\Program Files\tmp34781.exe (Trojan.Alphabet) -> Quarantined and deleted successfully.
C:\Program Files\tmp34812.exe (Trojan.Alphabet) -> Quarantined and deleted successfully.
C:\Program Files\tmp35093.exe (Trojan.Alphabet) -> Quarantined and deleted successfully.
C:\Program Files\tmp35109.exe (Trojan.Alphabet) -> Quarantined and deleted successfully.
C:\Program Files\tmp35312.exe (Trojan.Alphabet) -> Quarantined and deleted successfully.
C:\Program Files\tmp35421.exe (Trojan.Alphabet) -> Quarantined and deleted successfully.
C:\Program Files\tmp35468.exe (Trojan.Alphabet) -> Quarantined and deleted successfully.
C:\Program Files\tmp35500.exe (Trojan.Alphabet) -> Quarantined and deleted successfully.
C:\Program Files\tmp35609.exe (Trojan.Alphabet) -> Quarantined and deleted successfully.
C:\Program Files\tmp35718.exe (Trojan.Alphabet) -> Quarantined and deleted successfully.
C:\Program Files\tmp35828.exe (Trojan.Alphabet) -> Quarantined and deleted successfully.
C:\Program Files\tmp36000.exe (Trojan.Alphabet) -> Quarantined and deleted successfully.
C:\Program Files\tmp36062.exe (Trojan.Alphabet) -> Quarantined and deleted successfully.
C:\Program Files\tmp36125.exe (Trojan.Alphabet) -> Quarantined and deleted successfully.
C:\Program Files\tmp36203.exe (Trojan.Alphabet) -> Quarantined and deleted successfully.
C:\Program Files\tmp36375.exe (Trojan.Alphabet) -> Quarantined and deleted successfully.
C:\Program Files\tmp36406.exe (Trojan.Alphabet) -> Quarantined and deleted successfully.
C:\Program Files\tmp36750.exe (Trojan.Alphabet) -> Quarantined and deleted successfully.
C:\Program Files\tmp36796.exe (Trojan.Alphabet) -> Quarantined and deleted successfully.
C:\Program Files\tmp36843.exe (Trojan.Alphabet) -> Quarantined and deleted successfully.
C:\Program Files\tmp36921.exe (Trojan.Alphabet) -> Quarantined and deleted successfully.
C:\Program Files\tmp36937.exe (Trojan.Alphabet) -> Quarantined and deleted successfully.
C:\Program Files\tmp37125.exe (Trojan.Alphabet) -> Quarantined and deleted successfully.
C:\Program Files\tmp37234.exe (Trojan.Alphabet) -> Quarantined and deleted successfully.
C:\Program Files\tmp37281.exe (Trojan.Alphabet) -> Quarantined and deleted successfully.
C:\Program Files\tmp37468.exe (Trojan.Alphabet) -> Quarantined and deleted successfully.
C:\Program Files\tmp37500.exe (Trojan.Alphabet) -> Quarantined and deleted successfully.
C:\Program Files\tmp37578.exe (Trojan.Alphabet) -> Quarantined and deleted successfully.
C:\Program Files\tmp37718.exe (Trojan.Alphabet) -> Quarantined and deleted successfully.
C:\Program Files\tmp38015.exe (Trojan.Alphabet) -> Quarantined and deleted successfully.
C:\Program Files\tmp38046.exe (Trojan.Alphabet) -> Quarantined and deleted successfully.
C:\Program Files\tmp38203.exe (Trojan.Alphabet) -> Quarantined and deleted successfully.
C:\Program Files\tmp38218.exe (Trojan.Alphabet) -> Quarantined and deleted successfully.
C:\Program Files\tmp39015.exe (Trojan.Alphabet) -> Quarantined and deleted successfully.
C:\Program Files\tmp39109.exe (Trojan.Alphabet) -> Quarantined and deleted successfully.
C:\Program Files\tmp39453.exe (Trojan.Alphabet) -> Quarantined and deleted successfully.
C:\Program Files\tmp39625.exe (Trojan.Alphabet) -> Quarantined and deleted successfully.
C:\Program Files\tmp39640.exe (Trojan.Alphabet) -> Quarantined and deleted successfully.
C:\Program Files\tmp39703.exe (Trojan.Alphabet) -> Quarantined and deleted successfully.
C:\Program Files\tmp39718.exe (Trojan.Alphabet) -> Quarantined and deleted successfully.
C:\Program Files\tmp39890.exe (Trojan.Alphabet) -> Quarantined and deleted successfully.
C:\Program Files\tmp40078.exe (Trojan.Alphabet) -> Quarantined and deleted successfully.
C:\Program Files\tmp40140.exe (Trojan.Alphabet) -> Quarantined and deleted successfully.
C:\Program Files\tmp40281.exe (Trojan.Alphabet) -> Quarantined and deleted successfully.
C:\Program Files\tmp41687.exe (Trojan.Alphabet) -> Quarantined and deleted successfully.
C:\Program Files\tmp41843.exe (Trojan.Alphabet) -> Quarantined and deleted successfully.
C:\Program Files\tmp41890.exe (Trojan.Alphabet) -> Quarantined and deleted successfully.
C:\Program Files\tmp42437.exe (Trojan.Alphabet) -> Quarantined and deleted successfully.
C:\Program Files\tmp42828.exe (Trojan.Alphabet) -> Quarantined and deleted successfully.
C:\Program Files\tmp42843.exe (Trojan.Alphabet) -> Quarantined and deleted successfully.
C:\Program Files\tmp42984.exe (Trojan.Alphabet) -> Quarantined and deleted successfully.
C:\Program Files\tmp43000.exe (Trojan.Alphabet) -> Quarantined and deleted successfully.
C:\Program Files\tmp43546.exe (Trojan.Alphabet) -> Quarantined and deleted successfully.
C:\Program Files\tmp44000.exe (Trojan.Alphabet) -> Quarantined and deleted successfully.
C:\Program Files\tmp45546.exe (Trojan.Alphabet) -> Quarantined and deleted successfully.
C:\Program Files\tmp45609.exe (Trojan.Alphabet) -> Quarantined and deleted successfully.
C:\Program Files\tmp46421.exe (Trojan.Alphabet) -> Quarantined and deleted successfully.
C:\Program Files\tmp46906.exe (Trojan.Alphabet) -> Quarantined and deleted successfully.
C:\Program Files\tmp49640.exe (Trojan.Alphabet) -> Quarantined and deleted successfully.
C:\Program Files\tmp68843.exe (Trojan.Alphabet) -> Quarantined and deleted successfully.
C:\Program Files\tmp75156.exe (Trojan.Alphabet) -> Quarantined and deleted successfully.
C:\Program Files\tmp8688828.exe (Trojan.Alphabet) -> Quarantined and deleted successfully.
C:\Program Files\tmp8693843.exe (Trojan.Alphabet) -> Quarantined and deleted successfully.
C:\WINDOWS\vwsrfton.dll (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\Documents and Settings\Daniel Le Gal\Bureau\Antivirus-2008.lnk (Rogue.Antivirus) -> Quarantined and deleted successfully.
Que dois-je donc faire maintenant?
Merci de votre patience...
buginformatik
Messages postés
2163
Date d'inscription
mardi 16 janvier 2007
Statut
Contributeur
Dernière intervention
21 avril 2011
54
16 août 2008 à 17:19
16 août 2008 à 17:19
Avant d'utiliser Hijackthis on va nettoyer le PC :
Il existe un logiciel nommé Ccleaner, qui vous permet de supprimer tout les fichiers inutiles de votre ordinateur, parfois responsables de la lenteur :
https://filehippo.com/download_ccleaner/
(cliquer sur : DownloadDownload
Latest Version
2.79MB )
ATTENTION : décochez la ligne Ajouter la barre d'Outils Yahoo! CCleaner lors de l'installation. Laissez cochée celle pour contrôler les mise à jour automatiquement les autres sont à ta guise.
Avant de lancer le nettoyage, rendez vous partie Options, puis avancé, et décoche la case "effacer uniquement les fichiers, du dossier temp etc..."
Afin que le nettoyage soit le plus en profondeur et que tu puisse garder un certain confort tu peux cocher sans problèmes :
POUR L'ONGLET WINDOWS :
- Tout internet explorer
- Tout Windows explorer
- Tout dans Système, exceptés : Raccourcis du menu démarrer et l'autre
- Dans avancé : Vieilles données du prefecht, fichiers journal ISS, désinstallateurs de hotfixes
POUR L'ONGLET APPLICATION :
- Tu peux tout cocher, sauf ce qui est liés à la sécurité du PC (windows defender, Spybot etc...)
PARTIE REGISTRE :
Tu coches TOUT sauf extensions de fichiers inexistantes puis chercher les erreurs, sans oublier de bien faire la sauvegarde proposée en la gardant dans mes documents.
Rechercher les erreurs 2 fois
>>>
Ensuite,
Télécharges hijackthis : http://www.trendsecure.com/portal/en-US/_download/HiJackThis.zip
et voici un gif pour bien l'installer : http://pageperso.aol.fr/balltrap34/Hijenr.gif
- Une fois téléchargé, renommer l'éxécutable en HJT.exe pour contrer une éventuelle infection vundo
- Double-clic dessus
- Clic sur "Do a system scan and save the log"
- Copies le rapport, le coller dans la réponse
Il existe un logiciel nommé Ccleaner, qui vous permet de supprimer tout les fichiers inutiles de votre ordinateur, parfois responsables de la lenteur :
https://filehippo.com/download_ccleaner/
(cliquer sur : DownloadDownload
Latest Version
2.79MB )
ATTENTION : décochez la ligne Ajouter la barre d'Outils Yahoo! CCleaner lors de l'installation. Laissez cochée celle pour contrôler les mise à jour automatiquement les autres sont à ta guise.
Avant de lancer le nettoyage, rendez vous partie Options, puis avancé, et décoche la case "effacer uniquement les fichiers, du dossier temp etc..."
Afin que le nettoyage soit le plus en profondeur et que tu puisse garder un certain confort tu peux cocher sans problèmes :
POUR L'ONGLET WINDOWS :
- Tout internet explorer
- Tout Windows explorer
- Tout dans Système, exceptés : Raccourcis du menu démarrer et l'autre
- Dans avancé : Vieilles données du prefecht, fichiers journal ISS, désinstallateurs de hotfixes
POUR L'ONGLET APPLICATION :
- Tu peux tout cocher, sauf ce qui est liés à la sécurité du PC (windows defender, Spybot etc...)
PARTIE REGISTRE :
Tu coches TOUT sauf extensions de fichiers inexistantes puis chercher les erreurs, sans oublier de bien faire la sauvegarde proposée en la gardant dans mes documents.
Rechercher les erreurs 2 fois
>>>
Ensuite,
Télécharges hijackthis : http://www.trendsecure.com/portal/en-US/_download/HiJackThis.zip
et voici un gif pour bien l'installer : http://pageperso.aol.fr/balltrap34/Hijenr.gif
- Une fois téléchargé, renommer l'éxécutable en HJT.exe pour contrer une éventuelle infection vundo
- Double-clic dessus
- Clic sur "Do a system scan and save the log"
- Copies le rapport, le coller dans la réponse
Vous n’avez pas trouvé la réponse que vous recherchez ?
Posez votre question
Vci le rapport :
Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 17:45:48, on 16/08/2008
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v7.00 (7.00.6000.16705)
Boot mode: Normal
Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\Ati2evxx.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\Ati2evxx.exe
C:\WINDOWS\Explorer.EXE
C:\Program Files\Alwil Software\Avast4\aswUpdSv.exe
C:\Program Files\Alwil Software\Avast4\ashServ.exe
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\Synaptics\SynTP\SynTPEnh.exe
C:\WINDOWS\RTHDCPL.EXE
C:\Program Files\Java\jre1.6.0_05\bin\jusched.exe
C:\Program Files\Sonic\DigitalMedia LE v7\MyDVD LE\DetectorApp.exe
C:\Program Files\Fichiers communs\InstallShield\UpdateService\issch.exe
C:\APPS\Powercinema\PCMService.exe
C:\PROGRA~1\ALWILS~1\Avast4\ashDisp.exe
C:\Program Files\Samsung\Samsung Media Studio\SamsungMediaStudioAgent.exe
C:\Program Files\QuickTime\qttask.exe
C:\Program Files\Lexmark 2300 Series\lxcgmon.exe
C:\Program Files\Lexmark 2300 Series\ezprint.exe
C:\Program Files\Adobe\Photoshop Album Edition Découverte\3.2\Apps\apdproxy.exe
C:\APPS\SMP\SmpSys.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe
C:\Program Files\Messenger\msmsgs.exe
c:\APPS\Powercinema\Kernel\TV\CLCapSvc.exe
c:\APPS\Powercinema\Kernel\CLML_NTService\CLMLServer.exe
C:\WINDOWS\system32\drivers\KodakCCS.exe
C:\Program Files\Fichiers communs\Microsoft Shared\VS7Debug\mdm.exe
C:\WINDOWS\system32\ScsiAccess.EXE
C:\WINDOWS\system32\svchost.exe
C:\Program Files\Fichiers communs\Ulead Systems\DVD\ULCDRSvr.exe
C:\Program Files\Sonic\DigitalMedia LE v7\MyDVD LE\USBDeviceService.exe
c:\APPS\Powercinema\Kernel\TV\CLSched.exe
C:\Program Files\Alwil Software\Avast4\ashMaiSv.exe
C:\Program Files\Alwil Software\Avast4\ashWebSv.exe
C:\WINDOWS\system32\wscntfy.exe
C:\WINDOWS\system32\lxcgcoms.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Program Files\Java\jre1.6.0_05\bin\jucheck.exe
C:\Documents and Settings\Daniel Le Gal\Bureau\HJT.exe
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://antivirus2008q-pro.com/buy.php?aff=1001
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Window Title = Packard Bell
R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName = Liens
O2 - BHO: Aide pour le lien d'Adobe PDF Reader - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Fichiers communs\Adobe\Acrobat\ActiveX\AcroIEHelper.dll
O2 - BHO: Download Manager Browser Helper Object - {19C8E43B-07B3-49CB-BFFC-6777B593E6F8} - C:\PROGRA~1\FICHIE~1\fluxDVD\DOWNLO~1\XEBDLH~1.DLL
O2 - BHO: (no name) - {661778F7-CDDA-4611-99B0-43245C7E971D} - C:\WINDOWS\system32\efcBqoOg.dll
O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre1.6.0_05\bin\ssv.dll
O2 - BHO: Google Toolbar Helper - {AA58ED58-01DD-4d91-8333-CF10577473F7} - c:\program files\google\googletoolbar3.dll
O2 - BHO: Google Toolbar Notifier BHO - {AF69DE43-7D58-4638-B6FA-CE66B5AD205D} - C:\Program Files\Google\GoogleToolbarNotifier\2.0.301.7164\swg.dll
O2 - BHO: (no name) - {E9245288-8147-43FE-A4DA-680A6F9FB038} - C:\WINDOWS\system32\rqRKDWMd.dll
O3 - Toolbar: &Google - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - c:\program files\google\googletoolbar3.dll
O4 - HKLM\..\Run: [IMJPMIG8.1] "C:\WINDOWS\IME\imjp8_1\IMJPMIG.EXE" /Spoil /RemAdvDef /Migration32
O4 - HKLM\..\Run: [PHIME2002ASync] C:\WINDOWS\system32\IME\TINTLGNT\TINTSETP.EXE /SYNC
O4 - HKLM\..\Run: [PHIME2002A] C:\WINDOWS\system32\IME\TINTLGNT\TINTSETP.EXE /IMEName
O4 - HKLM\..\Run: [SynTPEnh] C:\Program Files\Synaptics\SynTP\SynTPEnh.exe
O4 - HKLM\..\Run: [RTHDCPL] RTHDCPL.EXE
O4 - HKLM\..\Run: [SkyTel] SkyTel.EXE
O4 - HKLM\..\Run: [Alcmtr] ALCMTR.EXE
O4 - HKLM\..\Run: [AzMixerSel] C:\Program Files\Realtek\InstallShield\AzMixerSel.exe
O4 - HKLM\..\Run: [SunJavaUpdateSched] "C:\Program Files\Java\jre1.6.0_05\bin\jusched.exe"
O4 - HKLM\..\Run: [DetectorApp] C:\Program Files\Sonic\DigitalMedia LE v7\MyDVD LE\DetectorApp.exe
O4 - HKLM\..\Run: [ISUSPM Startup] C:\PROGRA~1\FICHIE~1\INSTAL~1\UPDATE~1\ISUSPM.exe -startup
O4 - HKLM\..\Run: [ISUSScheduler] "C:\Program Files\Fichiers communs\InstallShield\UpdateService\issch.exe" -start
O4 - HKLM\..\Run: [PCMService] "c:\APPS\Powercinema\PCMService.exe"
O4 - HKLM\..\Run: [avast!] C:\PROGRA~1\ALWILS~1\Avast4\ashDisp.exe
O4 - HKLM\..\Run: [YeppStudioAgent] C:\Program Files\Samsung\Samsung Media Studio\SamsungMediaStudioAgent.exe
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
O4 - HKLM\..\Run: [lxcgmon.exe] "C:\Program Files\Lexmark 2300 Series\lxcgmon.exe"
O4 - HKLM\..\Run: [EzPrint] "C:\Program Files\Lexmark 2300 Series\ezprint.exe"
O4 - HKLM\..\Run: [FaxCenterServer] "C:\Program Files\Lexmark Fax Solutions\fm3032.exe" /s
O4 - HKLM\..\Run: [Adobe Photo Downloader] "C:\Program Files\Adobe\Photoshop Album Edition Découverte\3.2\Apps\apdproxy.exe"
O4 - HKLM\..\Run: [Adobe Reader Speed Launcher] "C:\Program Files\Adobe\Reader 8.0\Reader\Reader_sl.exe"
O4 - HKLM\..\Run: [LXCGCATS] rundll32 C:\WINDOWS\System32\spool\DRIVERS\W32X86\3\LXCGtime.dll,_RunDLLEntry@16
O4 - HKCU\..\Run: [SmpcSys] C:\APPS\SMP\SmpSys.exe
O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
O4 - HKCU\..\Run: [swg] C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe
O4 - HKCU\..\Run: [MSMSGS] "C:\Program Files\Messenger\msmsgs.exe" /background
O4 - HKUS\S-1-5-19\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'SERVICE LOCAL')
O4 - HKUS\S-1-5-20\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'SERVICE RÉSEAU')
O4 - HKUS\S-1-5-18\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'SYSTEM')
O4 - HKUS\.DEFAULT\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'Default user')
O8 - Extra context menu item: E&xporter vers Microsoft Excel - res://C:\PROGRA~1\MICROS~2\Office10\EXCEL.EXE/3000
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_05\bin\ssv.dll
O9 - Extra 'Tools' menuitem: Console Java (Sun) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_05\bin\ssv.dll
O9 - Extra button: Titan Poker - {49783ED4-258D-4f9f-BE11-137C18D3E543} - C:\Poker\Titan Poker\casino.exe (file missing)
O9 - Extra 'Tools' menuitem: Titan Poker - {49783ED4-258D-4f9f-BE11-137C18D3E543} - C:\Poker\Titan Poker\casino.exe (file missing)
O9 - Extra button: (no name) - {85d1f590-48f4-11d9-9669-0800200c9a66} - C:\WINDOWS\bdoscandel.exe
O9 - Extra 'Tools' menuitem: Uninstall BitDefender Online Scanner v8 - {85d1f590-48f4-11d9-9669-0800200c9a66} - C:\WINDOWS\bdoscandel.exe
O9 - Extra button: Real.com - {CD67F990-D8E9-11d2-98FE-00C0F0318AFE} - C:\WINDOWS\system32\Shdocvw.dll
O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O14 - IERESET.INF: START_PAGE_URL=file://C:\APPS\IE\offline\fr.htm
O15 - Trusted Zone: *.canalplay.com
O15 - Trusted Zone: *.canalplusactive.com
O15 - Trusted Zone: *.canalplay.com (HKLM)
O15 - Trusted Zone: *.canalplusactive.com (HKLM)
O16 - DPF: {5D86DDB5-BDF9-441B-9E9E-D4730F4EE499} (BDSCANONLINE Control) - http://download.bitdefender.com/resources/scan8/oscan8.cab
O16 - DPF: {E862C832-3A5F-4CEB-BFAA-167B22010A71} (InfosFinder2.InfosFinder) - http://support.packardbell.com/files/activex/InfosFinder2.CAB
O20 - Winlogon Notify: efcBqoOg - C:\WINDOWS\SYSTEM32\efcBqoOg.dll
O23 - Service: avast! iAVS4 Control Service (aswUpdSv) - ALWIL Software - C:\Program Files\Alwil Software\Avast4\aswUpdSv.exe
O23 - Service: Ati HotKey Poller - ATI Technologies Inc. - C:\WINDOWS\system32\Ati2evxx.exe
O23 - Service: avast! Antivirus - ALWIL Software - C:\Program Files\Alwil Software\Avast4\ashServ.exe
O23 - Service: avast! Mail Scanner - ALWIL Software - C:\Program Files\Alwil Software\Avast4\ashMaiSv.exe
O23 - Service: avast! Web Scanner - ALWIL Software - C:\Program Files\Alwil Software\Avast4\ashWebSv.exe
O23 - Service: CyberLink Background Capture Service (CBCS) (CLCapSvc) - Unknown owner - c:\APPS\Powercinema\Kernel\TV\CLCapSvc.exe
O23 - Service: CyberLink Task Scheduler (CTS) (CLSched) - Unknown owner - c:\APPS\Powercinema\Kernel\TV\CLSched.exe
O23 - Service: CyberLink Media Library Service - Cyberlink - c:\APPS\Powercinema\Kernel\CLML_NTService\CLMLServer.exe
O23 - Service: Google Updater Service (gusvc) - Google - C:\Program Files\Google\Common\Google Updater\GoogleUpdaterService.exe
O23 - Service: Kodak Camera Connection Software (KodakCCS) - Eastman Kodak Company - C:\WINDOWS\system32\drivers\KodakCCS.exe
O23 - Service: lxcg_device - Unknown owner - C:\WINDOWS\system32\lxcgcoms.exe
O23 - Service: ScsiAccess - Unknown owner - C:\WINDOWS\system32\ScsiAccess.EXE
O23 - Service: Ulead Burning Helper (UleadBurningHelper) - Ulead Systems, Inc. - C:\Program Files\Fichiers communs\Ulead Systems\DVD\ULCDRSvr.exe
O23 - Service: USBDeviceService - Unknown owner - C:\Program Files\Sonic\DigitalMedia LE v7\MyDVD LE\USBDeviceService.exe
Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 17:45:48, on 16/08/2008
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v7.00 (7.00.6000.16705)
Boot mode: Normal
Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\Ati2evxx.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\Ati2evxx.exe
C:\WINDOWS\Explorer.EXE
C:\Program Files\Alwil Software\Avast4\aswUpdSv.exe
C:\Program Files\Alwil Software\Avast4\ashServ.exe
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\Synaptics\SynTP\SynTPEnh.exe
C:\WINDOWS\RTHDCPL.EXE
C:\Program Files\Java\jre1.6.0_05\bin\jusched.exe
C:\Program Files\Sonic\DigitalMedia LE v7\MyDVD LE\DetectorApp.exe
C:\Program Files\Fichiers communs\InstallShield\UpdateService\issch.exe
C:\APPS\Powercinema\PCMService.exe
C:\PROGRA~1\ALWILS~1\Avast4\ashDisp.exe
C:\Program Files\Samsung\Samsung Media Studio\SamsungMediaStudioAgent.exe
C:\Program Files\QuickTime\qttask.exe
C:\Program Files\Lexmark 2300 Series\lxcgmon.exe
C:\Program Files\Lexmark 2300 Series\ezprint.exe
C:\Program Files\Adobe\Photoshop Album Edition Découverte\3.2\Apps\apdproxy.exe
C:\APPS\SMP\SmpSys.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe
C:\Program Files\Messenger\msmsgs.exe
c:\APPS\Powercinema\Kernel\TV\CLCapSvc.exe
c:\APPS\Powercinema\Kernel\CLML_NTService\CLMLServer.exe
C:\WINDOWS\system32\drivers\KodakCCS.exe
C:\Program Files\Fichiers communs\Microsoft Shared\VS7Debug\mdm.exe
C:\WINDOWS\system32\ScsiAccess.EXE
C:\WINDOWS\system32\svchost.exe
C:\Program Files\Fichiers communs\Ulead Systems\DVD\ULCDRSvr.exe
C:\Program Files\Sonic\DigitalMedia LE v7\MyDVD LE\USBDeviceService.exe
c:\APPS\Powercinema\Kernel\TV\CLSched.exe
C:\Program Files\Alwil Software\Avast4\ashMaiSv.exe
C:\Program Files\Alwil Software\Avast4\ashWebSv.exe
C:\WINDOWS\system32\wscntfy.exe
C:\WINDOWS\system32\lxcgcoms.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Program Files\Java\jre1.6.0_05\bin\jucheck.exe
C:\Documents and Settings\Daniel Le Gal\Bureau\HJT.exe
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://antivirus2008q-pro.com/buy.php?aff=1001
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Window Title = Packard Bell
R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName = Liens
O2 - BHO: Aide pour le lien d'Adobe PDF Reader - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Fichiers communs\Adobe\Acrobat\ActiveX\AcroIEHelper.dll
O2 - BHO: Download Manager Browser Helper Object - {19C8E43B-07B3-49CB-BFFC-6777B593E6F8} - C:\PROGRA~1\FICHIE~1\fluxDVD\DOWNLO~1\XEBDLH~1.DLL
O2 - BHO: (no name) - {661778F7-CDDA-4611-99B0-43245C7E971D} - C:\WINDOWS\system32\efcBqoOg.dll
O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre1.6.0_05\bin\ssv.dll
O2 - BHO: Google Toolbar Helper - {AA58ED58-01DD-4d91-8333-CF10577473F7} - c:\program files\google\googletoolbar3.dll
O2 - BHO: Google Toolbar Notifier BHO - {AF69DE43-7D58-4638-B6FA-CE66B5AD205D} - C:\Program Files\Google\GoogleToolbarNotifier\2.0.301.7164\swg.dll
O2 - BHO: (no name) - {E9245288-8147-43FE-A4DA-680A6F9FB038} - C:\WINDOWS\system32\rqRKDWMd.dll
O3 - Toolbar: &Google - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - c:\program files\google\googletoolbar3.dll
O4 - HKLM\..\Run: [IMJPMIG8.1] "C:\WINDOWS\IME\imjp8_1\IMJPMIG.EXE" /Spoil /RemAdvDef /Migration32
O4 - HKLM\..\Run: [PHIME2002ASync] C:\WINDOWS\system32\IME\TINTLGNT\TINTSETP.EXE /SYNC
O4 - HKLM\..\Run: [PHIME2002A] C:\WINDOWS\system32\IME\TINTLGNT\TINTSETP.EXE /IMEName
O4 - HKLM\..\Run: [SynTPEnh] C:\Program Files\Synaptics\SynTP\SynTPEnh.exe
O4 - HKLM\..\Run: [RTHDCPL] RTHDCPL.EXE
O4 - HKLM\..\Run: [SkyTel] SkyTel.EXE
O4 - HKLM\..\Run: [Alcmtr] ALCMTR.EXE
O4 - HKLM\..\Run: [AzMixerSel] C:\Program Files\Realtek\InstallShield\AzMixerSel.exe
O4 - HKLM\..\Run: [SunJavaUpdateSched] "C:\Program Files\Java\jre1.6.0_05\bin\jusched.exe"
O4 - HKLM\..\Run: [DetectorApp] C:\Program Files\Sonic\DigitalMedia LE v7\MyDVD LE\DetectorApp.exe
O4 - HKLM\..\Run: [ISUSPM Startup] C:\PROGRA~1\FICHIE~1\INSTAL~1\UPDATE~1\ISUSPM.exe -startup
O4 - HKLM\..\Run: [ISUSScheduler] "C:\Program Files\Fichiers communs\InstallShield\UpdateService\issch.exe" -start
O4 - HKLM\..\Run: [PCMService] "c:\APPS\Powercinema\PCMService.exe"
O4 - HKLM\..\Run: [avast!] C:\PROGRA~1\ALWILS~1\Avast4\ashDisp.exe
O4 - HKLM\..\Run: [YeppStudioAgent] C:\Program Files\Samsung\Samsung Media Studio\SamsungMediaStudioAgent.exe
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
O4 - HKLM\..\Run: [lxcgmon.exe] "C:\Program Files\Lexmark 2300 Series\lxcgmon.exe"
O4 - HKLM\..\Run: [EzPrint] "C:\Program Files\Lexmark 2300 Series\ezprint.exe"
O4 - HKLM\..\Run: [FaxCenterServer] "C:\Program Files\Lexmark Fax Solutions\fm3032.exe" /s
O4 - HKLM\..\Run: [Adobe Photo Downloader] "C:\Program Files\Adobe\Photoshop Album Edition Découverte\3.2\Apps\apdproxy.exe"
O4 - HKLM\..\Run: [Adobe Reader Speed Launcher] "C:\Program Files\Adobe\Reader 8.0\Reader\Reader_sl.exe"
O4 - HKLM\..\Run: [LXCGCATS] rundll32 C:\WINDOWS\System32\spool\DRIVERS\W32X86\3\LXCGtime.dll,_RunDLLEntry@16
O4 - HKCU\..\Run: [SmpcSys] C:\APPS\SMP\SmpSys.exe
O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
O4 - HKCU\..\Run: [swg] C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe
O4 - HKCU\..\Run: [MSMSGS] "C:\Program Files\Messenger\msmsgs.exe" /background
O4 - HKUS\S-1-5-19\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'SERVICE LOCAL')
O4 - HKUS\S-1-5-20\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'SERVICE RÉSEAU')
O4 - HKUS\S-1-5-18\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'SYSTEM')
O4 - HKUS\.DEFAULT\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'Default user')
O8 - Extra context menu item: E&xporter vers Microsoft Excel - res://C:\PROGRA~1\MICROS~2\Office10\EXCEL.EXE/3000
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_05\bin\ssv.dll
O9 - Extra 'Tools' menuitem: Console Java (Sun) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_05\bin\ssv.dll
O9 - Extra button: Titan Poker - {49783ED4-258D-4f9f-BE11-137C18D3E543} - C:\Poker\Titan Poker\casino.exe (file missing)
O9 - Extra 'Tools' menuitem: Titan Poker - {49783ED4-258D-4f9f-BE11-137C18D3E543} - C:\Poker\Titan Poker\casino.exe (file missing)
O9 - Extra button: (no name) - {85d1f590-48f4-11d9-9669-0800200c9a66} - C:\WINDOWS\bdoscandel.exe
O9 - Extra 'Tools' menuitem: Uninstall BitDefender Online Scanner v8 - {85d1f590-48f4-11d9-9669-0800200c9a66} - C:\WINDOWS\bdoscandel.exe
O9 - Extra button: Real.com - {CD67F990-D8E9-11d2-98FE-00C0F0318AFE} - C:\WINDOWS\system32\Shdocvw.dll
O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O14 - IERESET.INF: START_PAGE_URL=file://C:\APPS\IE\offline\fr.htm
O15 - Trusted Zone: *.canalplay.com
O15 - Trusted Zone: *.canalplusactive.com
O15 - Trusted Zone: *.canalplay.com (HKLM)
O15 - Trusted Zone: *.canalplusactive.com (HKLM)
O16 - DPF: {5D86DDB5-BDF9-441B-9E9E-D4730F4EE499} (BDSCANONLINE Control) - http://download.bitdefender.com/resources/scan8/oscan8.cab
O16 - DPF: {E862C832-3A5F-4CEB-BFAA-167B22010A71} (InfosFinder2.InfosFinder) - http://support.packardbell.com/files/activex/InfosFinder2.CAB
O20 - Winlogon Notify: efcBqoOg - C:\WINDOWS\SYSTEM32\efcBqoOg.dll
O23 - Service: avast! iAVS4 Control Service (aswUpdSv) - ALWIL Software - C:\Program Files\Alwil Software\Avast4\aswUpdSv.exe
O23 - Service: Ati HotKey Poller - ATI Technologies Inc. - C:\WINDOWS\system32\Ati2evxx.exe
O23 - Service: avast! Antivirus - ALWIL Software - C:\Program Files\Alwil Software\Avast4\ashServ.exe
O23 - Service: avast! Mail Scanner - ALWIL Software - C:\Program Files\Alwil Software\Avast4\ashMaiSv.exe
O23 - Service: avast! Web Scanner - ALWIL Software - C:\Program Files\Alwil Software\Avast4\ashWebSv.exe
O23 - Service: CyberLink Background Capture Service (CBCS) (CLCapSvc) - Unknown owner - c:\APPS\Powercinema\Kernel\TV\CLCapSvc.exe
O23 - Service: CyberLink Task Scheduler (CTS) (CLSched) - Unknown owner - c:\APPS\Powercinema\Kernel\TV\CLSched.exe
O23 - Service: CyberLink Media Library Service - Cyberlink - c:\APPS\Powercinema\Kernel\CLML_NTService\CLMLServer.exe
O23 - Service: Google Updater Service (gusvc) - Google - C:\Program Files\Google\Common\Google Updater\GoogleUpdaterService.exe
O23 - Service: Kodak Camera Connection Software (KodakCCS) - Eastman Kodak Company - C:\WINDOWS\system32\drivers\KodakCCS.exe
O23 - Service: lxcg_device - Unknown owner - C:\WINDOWS\system32\lxcgcoms.exe
O23 - Service: ScsiAccess - Unknown owner - C:\WINDOWS\system32\ScsiAccess.EXE
O23 - Service: Ulead Burning Helper (UleadBurningHelper) - Ulead Systems, Inc. - C:\Program Files\Fichiers communs\Ulead Systems\DVD\ULCDRSvr.exe
O23 - Service: USBDeviceService - Unknown owner - C:\Program Files\Sonic\DigitalMedia LE v7\MyDVD LE\USBDeviceService.exe
buginformatik
Messages postés
2163
Date d'inscription
mardi 16 janvier 2007
Statut
Contributeur
Dernière intervention
21 avril 2011
54
>
la_mailloche
16 août 2008 à 18:04
16 août 2008 à 18:04
Pas encore non
buginformatik
Messages postés
2163
Date d'inscription
mardi 16 janvier 2007
Statut
Contributeur
Dernière intervention
21 avril 2011
54
16 août 2008 à 17:54
16 août 2008 à 17:54
Télécharger Vundofix.exe (par Atribune) sur votre Bureau.
* Double-cliquer sur VundoFix.exe afin de le lancer.
* Cliquer sur le bouton Scan for Vundo.
* Lorsque le scan est complété, cliquer sur le bouton fix Vundo.
* Une invite de commande demandera si l’on souhaite supprimer les fichiers, cliquer sur YES
* Après avoir cliqué "YES", le Bureau disparaîtra un moment lors de la suppression des fichiers.
* Une nouvelle invite de commande annoncera que le PC devra s'éteindre ("shutdown"). Cliquer sur OK , puis laisser le redémarrer.
* Le contenu du rapport est situé dans C:\vundofix.txt, copie et colle le rapport
Vundofix ==> http://www.atribune.org/ccount/click.php?id=4
* Double-cliquer sur VundoFix.exe afin de le lancer.
* Cliquer sur le bouton Scan for Vundo.
* Lorsque le scan est complété, cliquer sur le bouton fix Vundo.
* Une invite de commande demandera si l’on souhaite supprimer les fichiers, cliquer sur YES
* Après avoir cliqué "YES", le Bureau disparaîtra un moment lors de la suppression des fichiers.
* Une nouvelle invite de commande annoncera que le PC devra s'éteindre ("shutdown"). Cliquer sur OK , puis laisser le redémarrer.
* Le contenu du rapport est situé dans C:\vundofix.txt, copie et colle le rapport
Vundofix ==> http://www.atribune.org/ccount/click.php?id=4
buginformatik
Messages postés
2163
Date d'inscription
mardi 16 janvier 2007
Statut
Contributeur
Dernière intervention
21 avril 2011
54
16 août 2008 à 18:13
16 août 2008 à 18:13
Rien ?!
Bon on va passer à un logiciel plus puissant alors : Respecte bien les consignes
Vous devez télécharger ComboFix depuis l'une des adresses suivantes:
* http://download.bleepingcomputer.com/sUBs/ComboFix.exe
* ForoSpyware.com
Cliquez sur le bouton Enregistrer, puis lorsqu'il vous est demandé à quel emplacement l'enregistrer, assurez-vous de l'enregistrer directement sur votre Bureau
Fermez toutes vos fenêtres en cours (y compris celle-ci)
Fermez ou désactivez temporairement tous les programmes Antivirus, Antispyware, ainsi que tout pare-feu en cours d'exécution car ils pourraient perturber le fonctionnement de ComboFix.
Après avoir suivi les deux étapes précédentes, faites un double clic sur l'icône de ComboFix située sur le Bureau. Notez bien que, une fois que vous avez lancé ComboFix, vous ne devez pas cliquer dans la fenêtre de ComboFix car cela pourrait entraîner un plantage du programme. En fait, lorsque ComboFix tourne, ne touchez plus du tout à votre ordinateur ; reposez-vous pendant qu'il travaille, cela pourrait prendre un certain temps avant qu'il ait fini.
Windows affiche un avertissement au lancement car ComboFix n'a pas de signature numérique. Ceci est parfaitement normal et sans danger, et vous pouvez cliquer sur le bouton Exécuter pour continuer.
Pour continuer, appuyez sur la touche du chiffre 1 puis sur la touche Entrée (http://img.bleepingcomputer.com/combofix/en/disclaimer.jpg). Si vous avez décidé de continuer, ComboFix va maintenant créer un Point de Restauration Système pour que vous puissiez revenir à votre configuration précédente si des problèmes devaient survenir pendant l'utilisation du programme. Lorsque ComboFix a fini de créer le point de restauration, il va ensuite créer une sauvegarde de votre Registre Windows
Après la fin de la sauvegarde du Registre Windows, ComboFix va déconnecter votre ordinateur d'Internet. Par conséquent, ne soyez pas surpris ni inquiet si vous recevez des avertissements vous prévenant que vous n'êtes plus connecté à Internet, car votre connexion sera totalement rétablie dans une étape ultérieure du programme.
ComboFix va ensuite commencer à balayer votre ordinateur à la recherche d'infections connues. Cette procédure peut prendre un certain temps, soyez patient
Pendant que le programme examine votre ordinateur, il va modifier le format de votre horloge, donc ne vous inquiétez pas lorsque cela se produira. Lorsque ComboFix aura terminé, il rétablira vos paramètres d'horloge à ce qu'ils étaient auparavant. (il y a au total 41 étapes)
Lorsque ComboFix a fini son examen, il annoncera qu'il est en train de préparer le fichier rapport (alias log)
Si vous voyez votre Bureau Windows disparaître, ne vous inquiétez pas. C'est normal, et ComboFix restaurera votre Bureau avant de se terminer. Finalement, vous verrez un nouvel affichage déclarant que le programme a presque fini et vous annonçant que le fichier rapport, ou log, se trouvera dans C:\ComboFix.txt.
Il affichera ensuite automatiquement le fichier log...
Réactivez vos défenses systèmes (pare feu, antivirus...)
Ensuite copiez entièrement le log et collez le sur le forum !
>>>>>>
Si internet ne vient pas :
# Cliquez sur le bouton Démarrer.
# Cliquez sur l'option de menu Paramètres.
# Cliquez sur l'option Panneau de configuration.
# Après l'ouverture du Panneau de configuration, faites un double clic sur l'icône Connexions réseau. Si votre Panneau de configuration est paramétré pour un affichage en catégories, faites un double clic sur Connexions réseau et Internet puis cliquez sur Connexions réseau tout en bas.
# Vous verrez alors une liste de toutes les connexions réseau disponibles. Repérez la connexion vers votre adaptateur Sans Fil ou Réseau local et faites un clic droit dessus.
Ou Sinon, si une icône de votre réseau apparaît aussi dans la barre des tâches Windows, vous pouvez la réparer en faisant un clic droit sur l'icône et en choisissant Réparer
Bon on va passer à un logiciel plus puissant alors : Respecte bien les consignes
Vous devez télécharger ComboFix depuis l'une des adresses suivantes:
* http://download.bleepingcomputer.com/sUBs/ComboFix.exe
* ForoSpyware.com
Cliquez sur le bouton Enregistrer, puis lorsqu'il vous est demandé à quel emplacement l'enregistrer, assurez-vous de l'enregistrer directement sur votre Bureau
Fermez toutes vos fenêtres en cours (y compris celle-ci)
Fermez ou désactivez temporairement tous les programmes Antivirus, Antispyware, ainsi que tout pare-feu en cours d'exécution car ils pourraient perturber le fonctionnement de ComboFix.
Après avoir suivi les deux étapes précédentes, faites un double clic sur l'icône de ComboFix située sur le Bureau. Notez bien que, une fois que vous avez lancé ComboFix, vous ne devez pas cliquer dans la fenêtre de ComboFix car cela pourrait entraîner un plantage du programme. En fait, lorsque ComboFix tourne, ne touchez plus du tout à votre ordinateur ; reposez-vous pendant qu'il travaille, cela pourrait prendre un certain temps avant qu'il ait fini.
Windows affiche un avertissement au lancement car ComboFix n'a pas de signature numérique. Ceci est parfaitement normal et sans danger, et vous pouvez cliquer sur le bouton Exécuter pour continuer.
Pour continuer, appuyez sur la touche du chiffre 1 puis sur la touche Entrée (http://img.bleepingcomputer.com/combofix/en/disclaimer.jpg). Si vous avez décidé de continuer, ComboFix va maintenant créer un Point de Restauration Système pour que vous puissiez revenir à votre configuration précédente si des problèmes devaient survenir pendant l'utilisation du programme. Lorsque ComboFix a fini de créer le point de restauration, il va ensuite créer une sauvegarde de votre Registre Windows
Après la fin de la sauvegarde du Registre Windows, ComboFix va déconnecter votre ordinateur d'Internet. Par conséquent, ne soyez pas surpris ni inquiet si vous recevez des avertissements vous prévenant que vous n'êtes plus connecté à Internet, car votre connexion sera totalement rétablie dans une étape ultérieure du programme.
ComboFix va ensuite commencer à balayer votre ordinateur à la recherche d'infections connues. Cette procédure peut prendre un certain temps, soyez patient
Pendant que le programme examine votre ordinateur, il va modifier le format de votre horloge, donc ne vous inquiétez pas lorsque cela se produira. Lorsque ComboFix aura terminé, il rétablira vos paramètres d'horloge à ce qu'ils étaient auparavant. (il y a au total 41 étapes)
Lorsque ComboFix a fini son examen, il annoncera qu'il est en train de préparer le fichier rapport (alias log)
Si vous voyez votre Bureau Windows disparaître, ne vous inquiétez pas. C'est normal, et ComboFix restaurera votre Bureau avant de se terminer. Finalement, vous verrez un nouvel affichage déclarant que le programme a presque fini et vous annonçant que le fichier rapport, ou log, se trouvera dans C:\ComboFix.txt.
Il affichera ensuite automatiquement le fichier log...
Réactivez vos défenses systèmes (pare feu, antivirus...)
Ensuite copiez entièrement le log et collez le sur le forum !
>>>>>>
Si internet ne vient pas :
# Cliquez sur le bouton Démarrer.
# Cliquez sur l'option de menu Paramètres.
# Cliquez sur l'option Panneau de configuration.
# Après l'ouverture du Panneau de configuration, faites un double clic sur l'icône Connexions réseau. Si votre Panneau de configuration est paramétré pour un affichage en catégories, faites un double clic sur Connexions réseau et Internet puis cliquez sur Connexions réseau tout en bas.
# Vous verrez alors une liste de toutes les connexions réseau disponibles. Repérez la connexion vers votre adaptateur Sans Fil ou Réseau local et faites un clic droit dessus.
Ou Sinon, si une icône de votre réseau apparaît aussi dans la barre des tâches Windows, vous pouvez la réparer en faisant un clic droit sur l'icône et en choisissant Réparer
Voilà le rapport sinon je n'arrive pas à relancer avast (je n'ai pas le a dans la barre des taches)
ComboFix 08-08-15.04 - Daniel Le Gal 2008-08-16 18:22:22.1 - NTFSx86
Microsoft Windows XP Édition familiale 5.1.2600.2.1252.1.1036.18.470 [GMT 2:00]
Endroit: C:\Documents and Settings\Daniel Le Gal\Bureau\ComboFix.exe
* Création d'un nouveau point de restauration
.
(((((((((((((((((((((((((((((((((((( Autres suppressions ))))))))))))))))))))))))))))))))))))))))))))))))
.
C:\Documents and Settings\Daniel Le Gal\Cookies\daniel_le_gal@linternaute[2].txt
C:\Documents and Settings\Daniel Le Gal\Local Settings\Application Data\Microsoft\Windows Media\10.0\WMSDKNSD.XML
C:\Documents and Settings\Daniel Le Gal\Menu Démarrer\Programmes\Antivirus 2008
C:\Documents and Settings\Daniel Le Gal\Menu Démarrer\Programmes\Antivirus 2008\Antivirus-2008.lnk
C:\Documents and Settings\Daniel Le Gal\ResErrors.log
C:\WINDOWS\search_res.txt
C:\WINDOWS\system32\dMWDKRqr.ini
C:\WINDOWS\system32\dMWDKRqr.ini2
C:\WINDOWS\system32\efcBqoOg.dll
C:\WINDOWS\system32\hgmauw.dll
C:\WINDOWS\system32\mcrh.tmp
C:\WINDOWS\system32\okeeavru.dll
.
((((((((((((((((((((((((((((((((((((((( Drivers/Services )))))))))))))))))))))))))))))))))))))))))))))))))
.
-------\Legacy_DHLP
-------\Legacy_TDSSSERV
((((((((((((((((((((((((((((( Fichiers cr‚‚s 2008-07-16 to 2008-08-16 ))))))))))))))))))))))))))))))))))))
.
2008-08-16 17:56 . 2008-08-16 17:56 <REP> d-------- C:\VundoFix Backups
2008-08-16 17:26 . 2008-08-16 17:26 <REP> d-------- C:\Program Files\CCleaner
2008-08-16 13:18 . 2008-08-16 13:18 <REP> d-------- C:\Program Files\Malwarebytes' Anti-Malware
2008-08-16 13:18 . 2008-08-16 13:18 <REP> d-------- C:\Documents and Settings\Daniel Le Gal\Application Data\Malwarebytes
2008-08-16 13:18 . 2008-08-16 13:18 <REP> d-------- C:\Documents and Settings\All Users\Application Data\Malwarebytes
2008-08-16 13:18 . 2008-07-30 20:07 38,472 --a------ C:\WINDOWS\system32\drivers\mbamswissarmy.sys
2008-08-16 13:18 . 2008-07-30 20:07 17,144 --a------ C:\WINDOWS\system32\drivers\mbam.sys
2008-08-15 03:51 . 2008-08-15 03:51 323,328 --------- C:\WINDOWS\system32\rqRKDWMd.dll
2008-08-14 03:39 . 2008-05-01 16:31 331,776 --------- C:\WINDOWS\system32\dllcache\msadce.dll
.
(((((((((((((((((((((((((((((((((( Compte-rendu de Find3M ))))))))))))))))))))))))))))))))))))))))))))))))
.
2008-08-15 17:57 --------- d-----w C:\Program Files\Spybot - Search & Destroy
2008-08-15 17:57 --------- d-----w C:\Documents and Settings\All Users\Application Data\Spybot - Search & Destroy
2008-08-07 18:34 --------- d-----w C:\Program Files\Lx_cats
2008-06-20 10:45 360,320 ----a-w C:\WINDOWS\system32\drivers\tcpip.sys
2008-06-20 10:44 138,368 ----a-w C:\WINDOWS\system32\drivers\afd.sys
2008-06-20 09:52 225,920 ----a-w C:\WINDOWS\system32\drivers\tcpip6.sys
2008-04-19 14:35 674 ----a-w C:\Documents and Settings\Daniel Le Gal\Application Data\waver_2.95.dat
2008-02-18 23:38 251,416 ----a-w C:\Documents and Settings\Daniel Le Gal\Application Data\install_fr[1].exe
.
((((((((((((((((((((((((((((((((( Point de chargement Reg )))))))))))))))))))))))))))))))))))))))))))))))))
.
.
REGEDIT4
*Note* les ‚l‚ments vides & les ‚l‚ments initiaux l‚gitimes ne sont pas list‚s
[HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{E9245288-8147-43FE-A4DA-680A6F9FB038}]
2008-08-15 03:51 323328 --------- C:\WINDOWS\system32\rqRKDWMd.dll
[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"SmpcSys"="C:\APPS\SMP\SmpSys.exe" [2005-11-17 09:51 975360]
"ctfmon.exe"="C:\WINDOWS\system32\ctfmon.exe" [2004-08-05 14:00 15360]
"swg"="C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe" [2007-08-06 20:21 68856]
"MSMSGS"="C:\Program Files\Messenger\msmsgs.exe" [2004-10-13 18:24 1694208]
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"IMJPMIG8.1"="C:\WINDOWS\IME\imjp8_1\IMJPMIG.EXE" [2004-08-05 14:00 208952]
"PHIME2002ASync"="C:\WINDOWS\system32\IME\TINTLGNT\TINTSETP.EXE" [2004-08-05 14:00 455168]
"PHIME2002A"="C:\WINDOWS\system32\IME\TINTLGNT\TINTSETP.EXE" [2004-08-05 14:00 455168]
"SynTPEnh"="C:\Program Files\Synaptics\SynTP\SynTPEnh.exe" [2006-04-28 15:13 766041]
"AzMixerSel"="C:\Program Files\Realtek\InstallShield\AzMixerSel.exe" [2005-06-11 19:51 53248]
"SunJavaUpdateSched"="C:\Program Files\Java\jre1.6.0_05\bin\jusched.exe" [2008-02-22 05:25 144784]
"DetectorApp"="C:\Program Files\Sonic\DigitalMedia LE v7\MyDVD LE\DetectorApp.exe" [2005-10-20 06:15 102400]
"ISUSPM Startup"="C:\PROGRA~1\FICHIE~1\INSTAL~1\UPDATE~1\ISUSPM.exe" [2004-07-27 16:50 221184]
"ISUSScheduler"="C:\Program Files\Fichiers communs\InstallShield\UpdateService\issch.exe" [2004-07-27 16:50 81920]
"PCMService"="c:\APPS\Powercinema\PCMService.exe" [2006-02-23 12:08 147456]
"YeppStudioAgent"="C:\Program Files\Samsung\Samsung Media Studio\SamsungMediaStudioAgent.exe" [2005-10-11 12:11 40960]
"QuickTime Task"="C:\Program Files\QuickTime\qttask.exe" [2006-10-23 14:42 98304]
"lxcgmon.exe"="C:\Program Files\Lexmark 2300 Series\lxcgmon.exe" [2005-05-05 01:24 200704]
"EzPrint"="C:\Program Files\Lexmark 2300 Series\ezprint.exe" [2005-06-08 18:19 94208]
"FaxCenterServer"="C:\Program Files\Lexmark Fax Solutions\fm3032.exe" [2005-05-03 20:20 299008]
"Adobe Reader Speed Launcher"="C:\Program Files\Adobe\Reader 8.0\Reader\Reader_sl.exe" [2008-01-11 23:16 39792]
"LXCGCATS"="C:\WINDOWS\System32\spool\DRIVERS\W32X86\3\LXCGtime.dll" [2005-04-27 16:21 69632]
"RTHDCPL"="RTHDCPL.EXE" [2006-07-21 16:56 16261632 C:\WINDOWS\RTHDCPL.exe]
"SkyTel"="SkyTel.EXE" [2006-05-16 18:04 2879488 C:\WINDOWS\SkyTel.exe]
[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run]
"CTFMON.EXE"="C:\WINDOWS\system32\CTFMON.EXE" [2004-08-05 14:00 15360]
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\drivers32]
"msacm.dvacm"= C:\PROGRA~1\FICHIE~1\ULEADS~1\Vio\Dvacm.acm
"vidc.yv12"= yv12vfw.dll
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile]
"EnableFirewall"= 0 (0x0)
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%ProgramFiles%\\AOL 9.0\\aol.exe"=
"%ProgramFiles%\\UBISOFT\\Splinter Cell Pandora Tomorrow\\logo_ubi.exe"=
"%ProgramFiles%\\UBISOFT\\Splinter Cell Pandora Tomorrow\\pandora.exe"=
"%windir%\\system32\\sessmgr.exe"=
"%windir%\\Network Diagnostic\\xpnetdiag.exe"=
"C:\\Program Files\\Kodak\\KODAK Software Updater\\7288971\\Program\\Kodak Software Updater.exe"=
"C:\\WINDOWS\\system32\\dpvsetup.exe"=
"C:\\Program Files\\Real\\RealPlayer\\realplay.exe"=
"C:\\Program Files\\Messenger\\msmsgs.exe"=
"C:\\WINDOWS\\system32\\lxcgcoms.exe"=
"C:\\WINDOWS\\system32\\spool\\drivers\\w32x86\\3\\lxcgPSWX.EXE"=
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\GloballyOpenPorts\List]
"135:TCP"= 135:TCP:TCP Port 135
"5000:TCP"= 5000:TCP:TCP Port 5000
"5001:TCP"= 5001:TCP:TCP Port 5001
"5002:TCP"= 5002:TCP:TCP Port 5002
"5003:TCP"= 5003:TCP:TCP Port 5003
"5004:TCP"= 5004:TCP:TCP Port 5004
"5005:TCP"= 5005:TCP:TCP Port 5005
"5006:TCP"= 5006:TCP:TCP Port 5006
"5007:TCP"= 5007:TCP:TCP Port 5007
"5008:TCP"= 5008:TCP:TCP Port 5008
"5009:TCP"= 5009:TCP:TCP Port 5009
"5010:TCP"= 5010:TCP:TCP Port 5010
"5011:TCP"= 5011:TCP:TCP Port 5011
"5012:TCP"= 5012:TCP:TCP Port 5012
"5013:TCP"= 5013:TCP:TCP Port 5013
"5014:TCP"= 5014:TCP:TCP Port 5014
"5015:TCP"= 5015:TCP:TCP Port 5015
"5016:TCP"= 5016:TCP:TCP Port 5016
"5017:TCP"= 5017:TCP:TCP Port 5017
"5018:TCP"= 5018:TCP:TCP Port 5018
"5019:TCP"= 5019:TCP:TCP Port 5019
"5020:TCP"= 5020:TCP:TCP Port 5020
R1 aswSP;avast! Self Protection;C:\WINDOWS\system32\drivers\aswSP.sys [2008-07-19 16:35]
R2 aswFsBlk;aswFsBlk;C:\WINDOWS\system32\DRIVERS\aswFsBlk.sys [2008-07-19 16:37]
R3 usbscan;Pilote de scanneur USB;C:\WINDOWS\system32\DRIVERS\usbscan.sys [2004-08-03 22:58]
S3 USBSTOR;Pilote de stockage de masse USB;C:\WINDOWS\system32\DRIVERS\USBSTOR.SYS [2004-08-04 00:08]
.
- - - - ORPHANS REMOVED - - - -
HKLM-Run-Adobe Photo Downloader - C:\Program Files\Adobe\Photoshop Album Edition Découverte\3.2\Apps\apdproxy.exe
.
------- Supplementary Scan -------
.
R0 -: HKCU-Main,Start Page = hxxp://antivirus2008q-pro.com/buy.php?aff=1001
R1 -: HKCU-Internet Connection Wizard,ShellNext = iexplore
O8 -: E&xporter vers Microsoft Excel - C:\PROGRA~1\MICROS~2\Office10\EXCEL.EXE/3000
O15 -: Trusted Zone: *.canalplay.com
O15 -: Trusted Zone: *.canalplusactive.com
O15 -: Trusted Zone: *.canalplay.com
O15 -: Trusted Zone: *.canalplusactive.com
O16 -: {E862C832-3A5F-4CEB-BFAA-167B22010A71} - hxxp://support.packardbell.com/files/activex/InfosFinder2.CAB
C:\WINDOWS\Downloaded Program Files\InfosFinder2.INF
C:\WINDOWS\Downloaded Program Files\INFOSFINDER2.OCX
**************************************************************************
catchme 0.3.1361 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2008-08-16 18:27:33
Windows 5.1.2600 Service Pack 2 NTFS
Balayage processus cach‚s ...
Balayage cach‚ autostart entries ...
Balayage des fichiers cach‚s ...
Scan termin‚ avec succŠs
Les fichiers cach‚s: 0
**************************************************************************
"ImagePath"="\"c:\APPS\Powercinema\Kernel\TV\CLCapSvc.exe\"\[u]0/u0\[u]0/u0\[u]0/u0\[u]0/u0\[u]0/u2\[u]0/u0\[u]0/u0\[u]0/u0¨
[%\[u]0/u0«Ô’|\[u]0/u0\[u]0/u0\[u]0/u0\[u]0/u0\[u]0/u0\[u]0/u0\[u]0/u0\[u]0/u0\[u]0/u0\[u]0/u0\[u]0/u0\[u]0/u05\[u]0/u0\[u]0/u0\[u]0/u0\[u]0/u0\[u]0/u0.\[u]0/u3pè\13\[u]0/u0pè\13\[u]0/u0\18î"
.
------------------------ Other Running Processes ------------------------
.
C:\WINDOWS\system32\ati2evxx.exe
C:\WINDOWS\system32\ati2evxx.exe
C:\Program Files\Alwil Software\Avast4\aswUpdSv.exe
C:\Program Files\Alwil Software\Avast4\ashServ.exe
C:\APPS\Powercinema\Kernel\TV\CLCapSvc.exe
C:\APPS\Powercinema\Kernel\CLML_NTService\CLMLServer.exe
C:\WINDOWS\system32\drivers\KodakCCS.exe
C:\Program Files\Fichiers communs\Microsoft Shared\VS7Debug\mdm.exe
C:\WINDOWS\system32\ScsiAccess.EXE
C:\Program Files\Fichiers communs\Ulead Systems\DVD\ULCDRSvr.exe
C:\Program Files\Sonic\DigitalMedia LE v7\MyDVD LE\USBDeviceService.exe
C:\APPS\Powercinema\Kernel\TV\CLSched.exe
C:\Program Files\Alwil Software\Avast4\ashMaiSv.exe
C:\Program Files\Alwil Software\Avast4\ashWebSv.exe
C:\WINDOWS\system32\lxcgcoms.exe
C:\WINDOWS\system32\wscntfy.exe
.
**************************************************************************
.
Temps d'accomplissement: 2008-08-16 18:30:45 - machine was rebooted
ComboFix-quarantined-files.txt 2008-08-16 16:30:37
Pre-Run: 60,059,750,400 octets libres
Post-Run: 59,984,642,048 octets libres
179 --- E O F --- 2008-08-14 05:15:57
ComboFix 08-08-15.04 - Daniel Le Gal 2008-08-16 18:22:22.1 - NTFSx86
Microsoft Windows XP Édition familiale 5.1.2600.2.1252.1.1036.18.470 [GMT 2:00]
Endroit: C:\Documents and Settings\Daniel Le Gal\Bureau\ComboFix.exe
* Création d'un nouveau point de restauration
.
(((((((((((((((((((((((((((((((((((( Autres suppressions ))))))))))))))))))))))))))))))))))))))))))))))))
.
C:\Documents and Settings\Daniel Le Gal\Cookies\daniel_le_gal@linternaute[2].txt
C:\Documents and Settings\Daniel Le Gal\Local Settings\Application Data\Microsoft\Windows Media\10.0\WMSDKNSD.XML
C:\Documents and Settings\Daniel Le Gal\Menu Démarrer\Programmes\Antivirus 2008
C:\Documents and Settings\Daniel Le Gal\Menu Démarrer\Programmes\Antivirus 2008\Antivirus-2008.lnk
C:\Documents and Settings\Daniel Le Gal\ResErrors.log
C:\WINDOWS\search_res.txt
C:\WINDOWS\system32\dMWDKRqr.ini
C:\WINDOWS\system32\dMWDKRqr.ini2
C:\WINDOWS\system32\efcBqoOg.dll
C:\WINDOWS\system32\hgmauw.dll
C:\WINDOWS\system32\mcrh.tmp
C:\WINDOWS\system32\okeeavru.dll
.
((((((((((((((((((((((((((((((((((((((( Drivers/Services )))))))))))))))))))))))))))))))))))))))))))))))))
.
-------\Legacy_DHLP
-------\Legacy_TDSSSERV
((((((((((((((((((((((((((((( Fichiers cr‚‚s 2008-07-16 to 2008-08-16 ))))))))))))))))))))))))))))))))))))
.
2008-08-16 17:56 . 2008-08-16 17:56 <REP> d-------- C:\VundoFix Backups
2008-08-16 17:26 . 2008-08-16 17:26 <REP> d-------- C:\Program Files\CCleaner
2008-08-16 13:18 . 2008-08-16 13:18 <REP> d-------- C:\Program Files\Malwarebytes' Anti-Malware
2008-08-16 13:18 . 2008-08-16 13:18 <REP> d-------- C:\Documents and Settings\Daniel Le Gal\Application Data\Malwarebytes
2008-08-16 13:18 . 2008-08-16 13:18 <REP> d-------- C:\Documents and Settings\All Users\Application Data\Malwarebytes
2008-08-16 13:18 . 2008-07-30 20:07 38,472 --a------ C:\WINDOWS\system32\drivers\mbamswissarmy.sys
2008-08-16 13:18 . 2008-07-30 20:07 17,144 --a------ C:\WINDOWS\system32\drivers\mbam.sys
2008-08-15 03:51 . 2008-08-15 03:51 323,328 --------- C:\WINDOWS\system32\rqRKDWMd.dll
2008-08-14 03:39 . 2008-05-01 16:31 331,776 --------- C:\WINDOWS\system32\dllcache\msadce.dll
.
(((((((((((((((((((((((((((((((((( Compte-rendu de Find3M ))))))))))))))))))))))))))))))))))))))))))))))))
.
2008-08-15 17:57 --------- d-----w C:\Program Files\Spybot - Search & Destroy
2008-08-15 17:57 --------- d-----w C:\Documents and Settings\All Users\Application Data\Spybot - Search & Destroy
2008-08-07 18:34 --------- d-----w C:\Program Files\Lx_cats
2008-06-20 10:45 360,320 ----a-w C:\WINDOWS\system32\drivers\tcpip.sys
2008-06-20 10:44 138,368 ----a-w C:\WINDOWS\system32\drivers\afd.sys
2008-06-20 09:52 225,920 ----a-w C:\WINDOWS\system32\drivers\tcpip6.sys
2008-04-19 14:35 674 ----a-w C:\Documents and Settings\Daniel Le Gal\Application Data\waver_2.95.dat
2008-02-18 23:38 251,416 ----a-w C:\Documents and Settings\Daniel Le Gal\Application Data\install_fr[1].exe
.
((((((((((((((((((((((((((((((((( Point de chargement Reg )))))))))))))))))))))))))))))))))))))))))))))))))
.
.
REGEDIT4
*Note* les ‚l‚ments vides & les ‚l‚ments initiaux l‚gitimes ne sont pas list‚s
[HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{E9245288-8147-43FE-A4DA-680A6F9FB038}]
2008-08-15 03:51 323328 --------- C:\WINDOWS\system32\rqRKDWMd.dll
[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"SmpcSys"="C:\APPS\SMP\SmpSys.exe" [2005-11-17 09:51 975360]
"ctfmon.exe"="C:\WINDOWS\system32\ctfmon.exe" [2004-08-05 14:00 15360]
"swg"="C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe" [2007-08-06 20:21 68856]
"MSMSGS"="C:\Program Files\Messenger\msmsgs.exe" [2004-10-13 18:24 1694208]
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"IMJPMIG8.1"="C:\WINDOWS\IME\imjp8_1\IMJPMIG.EXE" [2004-08-05 14:00 208952]
"PHIME2002ASync"="C:\WINDOWS\system32\IME\TINTLGNT\TINTSETP.EXE" [2004-08-05 14:00 455168]
"PHIME2002A"="C:\WINDOWS\system32\IME\TINTLGNT\TINTSETP.EXE" [2004-08-05 14:00 455168]
"SynTPEnh"="C:\Program Files\Synaptics\SynTP\SynTPEnh.exe" [2006-04-28 15:13 766041]
"AzMixerSel"="C:\Program Files\Realtek\InstallShield\AzMixerSel.exe" [2005-06-11 19:51 53248]
"SunJavaUpdateSched"="C:\Program Files\Java\jre1.6.0_05\bin\jusched.exe" [2008-02-22 05:25 144784]
"DetectorApp"="C:\Program Files\Sonic\DigitalMedia LE v7\MyDVD LE\DetectorApp.exe" [2005-10-20 06:15 102400]
"ISUSPM Startup"="C:\PROGRA~1\FICHIE~1\INSTAL~1\UPDATE~1\ISUSPM.exe" [2004-07-27 16:50 221184]
"ISUSScheduler"="C:\Program Files\Fichiers communs\InstallShield\UpdateService\issch.exe" [2004-07-27 16:50 81920]
"PCMService"="c:\APPS\Powercinema\PCMService.exe" [2006-02-23 12:08 147456]
"YeppStudioAgent"="C:\Program Files\Samsung\Samsung Media Studio\SamsungMediaStudioAgent.exe" [2005-10-11 12:11 40960]
"QuickTime Task"="C:\Program Files\QuickTime\qttask.exe" [2006-10-23 14:42 98304]
"lxcgmon.exe"="C:\Program Files\Lexmark 2300 Series\lxcgmon.exe" [2005-05-05 01:24 200704]
"EzPrint"="C:\Program Files\Lexmark 2300 Series\ezprint.exe" [2005-06-08 18:19 94208]
"FaxCenterServer"="C:\Program Files\Lexmark Fax Solutions\fm3032.exe" [2005-05-03 20:20 299008]
"Adobe Reader Speed Launcher"="C:\Program Files\Adobe\Reader 8.0\Reader\Reader_sl.exe" [2008-01-11 23:16 39792]
"LXCGCATS"="C:\WINDOWS\System32\spool\DRIVERS\W32X86\3\LXCGtime.dll" [2005-04-27 16:21 69632]
"RTHDCPL"="RTHDCPL.EXE" [2006-07-21 16:56 16261632 C:\WINDOWS\RTHDCPL.exe]
"SkyTel"="SkyTel.EXE" [2006-05-16 18:04 2879488 C:\WINDOWS\SkyTel.exe]
[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run]
"CTFMON.EXE"="C:\WINDOWS\system32\CTFMON.EXE" [2004-08-05 14:00 15360]
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\drivers32]
"msacm.dvacm"= C:\PROGRA~1\FICHIE~1\ULEADS~1\Vio\Dvacm.acm
"vidc.yv12"= yv12vfw.dll
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile]
"EnableFirewall"= 0 (0x0)
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%ProgramFiles%\\AOL 9.0\\aol.exe"=
"%ProgramFiles%\\UBISOFT\\Splinter Cell Pandora Tomorrow\\logo_ubi.exe"=
"%ProgramFiles%\\UBISOFT\\Splinter Cell Pandora Tomorrow\\pandora.exe"=
"%windir%\\system32\\sessmgr.exe"=
"%windir%\\Network Diagnostic\\xpnetdiag.exe"=
"C:\\Program Files\\Kodak\\KODAK Software Updater\\7288971\\Program\\Kodak Software Updater.exe"=
"C:\\WINDOWS\\system32\\dpvsetup.exe"=
"C:\\Program Files\\Real\\RealPlayer\\realplay.exe"=
"C:\\Program Files\\Messenger\\msmsgs.exe"=
"C:\\WINDOWS\\system32\\lxcgcoms.exe"=
"C:\\WINDOWS\\system32\\spool\\drivers\\w32x86\\3\\lxcgPSWX.EXE"=
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\GloballyOpenPorts\List]
"135:TCP"= 135:TCP:TCP Port 135
"5000:TCP"= 5000:TCP:TCP Port 5000
"5001:TCP"= 5001:TCP:TCP Port 5001
"5002:TCP"= 5002:TCP:TCP Port 5002
"5003:TCP"= 5003:TCP:TCP Port 5003
"5004:TCP"= 5004:TCP:TCP Port 5004
"5005:TCP"= 5005:TCP:TCP Port 5005
"5006:TCP"= 5006:TCP:TCP Port 5006
"5007:TCP"= 5007:TCP:TCP Port 5007
"5008:TCP"= 5008:TCP:TCP Port 5008
"5009:TCP"= 5009:TCP:TCP Port 5009
"5010:TCP"= 5010:TCP:TCP Port 5010
"5011:TCP"= 5011:TCP:TCP Port 5011
"5012:TCP"= 5012:TCP:TCP Port 5012
"5013:TCP"= 5013:TCP:TCP Port 5013
"5014:TCP"= 5014:TCP:TCP Port 5014
"5015:TCP"= 5015:TCP:TCP Port 5015
"5016:TCP"= 5016:TCP:TCP Port 5016
"5017:TCP"= 5017:TCP:TCP Port 5017
"5018:TCP"= 5018:TCP:TCP Port 5018
"5019:TCP"= 5019:TCP:TCP Port 5019
"5020:TCP"= 5020:TCP:TCP Port 5020
R1 aswSP;avast! Self Protection;C:\WINDOWS\system32\drivers\aswSP.sys [2008-07-19 16:35]
R2 aswFsBlk;aswFsBlk;C:\WINDOWS\system32\DRIVERS\aswFsBlk.sys [2008-07-19 16:37]
R3 usbscan;Pilote de scanneur USB;C:\WINDOWS\system32\DRIVERS\usbscan.sys [2004-08-03 22:58]
S3 USBSTOR;Pilote de stockage de masse USB;C:\WINDOWS\system32\DRIVERS\USBSTOR.SYS [2004-08-04 00:08]
.
- - - - ORPHANS REMOVED - - - -
HKLM-Run-Adobe Photo Downloader - C:\Program Files\Adobe\Photoshop Album Edition Découverte\3.2\Apps\apdproxy.exe
.
------- Supplementary Scan -------
.
R0 -: HKCU-Main,Start Page = hxxp://antivirus2008q-pro.com/buy.php?aff=1001
R1 -: HKCU-Internet Connection Wizard,ShellNext = iexplore
O8 -: E&xporter vers Microsoft Excel - C:\PROGRA~1\MICROS~2\Office10\EXCEL.EXE/3000
O15 -: Trusted Zone: *.canalplay.com
O15 -: Trusted Zone: *.canalplusactive.com
O15 -: Trusted Zone: *.canalplay.com
O15 -: Trusted Zone: *.canalplusactive.com
O16 -: {E862C832-3A5F-4CEB-BFAA-167B22010A71} - hxxp://support.packardbell.com/files/activex/InfosFinder2.CAB
C:\WINDOWS\Downloaded Program Files\InfosFinder2.INF
C:\WINDOWS\Downloaded Program Files\INFOSFINDER2.OCX
**************************************************************************
catchme 0.3.1361 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2008-08-16 18:27:33
Windows 5.1.2600 Service Pack 2 NTFS
Balayage processus cach‚s ...
Balayage cach‚ autostart entries ...
Balayage des fichiers cach‚s ...
Scan termin‚ avec succŠs
Les fichiers cach‚s: 0
**************************************************************************
"ImagePath"="\"c:\APPS\Powercinema\Kernel\TV\CLCapSvc.exe\"\[u]0/u0\[u]0/u0\[u]0/u0\[u]0/u0\[u]0/u2\[u]0/u0\[u]0/u0\[u]0/u0¨
[%\[u]0/u0«Ô’|\[u]0/u0\[u]0/u0\[u]0/u0\[u]0/u0\[u]0/u0\[u]0/u0\[u]0/u0\[u]0/u0\[u]0/u0\[u]0/u0\[u]0/u0\[u]0/u05\[u]0/u0\[u]0/u0\[u]0/u0\[u]0/u0\[u]0/u0.\[u]0/u3pè\13\[u]0/u0pè\13\[u]0/u0\18î"
.
------------------------ Other Running Processes ------------------------
.
C:\WINDOWS\system32\ati2evxx.exe
C:\WINDOWS\system32\ati2evxx.exe
C:\Program Files\Alwil Software\Avast4\aswUpdSv.exe
C:\Program Files\Alwil Software\Avast4\ashServ.exe
C:\APPS\Powercinema\Kernel\TV\CLCapSvc.exe
C:\APPS\Powercinema\Kernel\CLML_NTService\CLMLServer.exe
C:\WINDOWS\system32\drivers\KodakCCS.exe
C:\Program Files\Fichiers communs\Microsoft Shared\VS7Debug\mdm.exe
C:\WINDOWS\system32\ScsiAccess.EXE
C:\Program Files\Fichiers communs\Ulead Systems\DVD\ULCDRSvr.exe
C:\Program Files\Sonic\DigitalMedia LE v7\MyDVD LE\USBDeviceService.exe
C:\APPS\Powercinema\Kernel\TV\CLSched.exe
C:\Program Files\Alwil Software\Avast4\ashMaiSv.exe
C:\Program Files\Alwil Software\Avast4\ashWebSv.exe
C:\WINDOWS\system32\lxcgcoms.exe
C:\WINDOWS\system32\wscntfy.exe
.
**************************************************************************
.
Temps d'accomplissement: 2008-08-16 18:30:45 - machine was rebooted
ComboFix-quarantined-files.txt 2008-08-16 16:30:37
Pre-Run: 60,059,750,400 octets libres
Post-Run: 59,984,642,048 octets libres
179 --- E O F --- 2008-08-14 05:15:57
buginformatik
Messages postés
2163
Date d'inscription
mardi 16 janvier 2007
Statut
Contributeur
Dernière intervention
21 avril 2011
54
16 août 2008 à 18:52
16 août 2008 à 18:52
Tant mieu j'allais te dire de le virer et de le remplacer pas antivir, qui fait moi confiance, est bien meilleur !
Voici le comparatif de Avast et antivir : http://forum.malekal.com/ftopic3528.php
Télécharge antivir : https://download.cnet.com/Avira-Free-Security-with-Antivirus/3000-18510_4-10322935.html?part=dl-10322935&subj=dl&tag=button&cdlPid=10867326
Vide la quarantaine d'avast, coupe momentanément ta connexion internet, Puis via le panneau de config désinstalle avast! et ensuite installe antivir
Pour finir remet internet et voici un peu de lecture pour bien configurer antivir : Tuto de prise en main : https://www.malekal.com/avira-free-security-antivirus-gratuit/
Voici le comparatif de Avast et antivir : http://forum.malekal.com/ftopic3528.php
Télécharge antivir : https://download.cnet.com/Avira-Free-Security-with-Antivirus/3000-18510_4-10322935.html?part=dl-10322935&subj=dl&tag=button&cdlPid=10867326
Vide la quarantaine d'avast, coupe momentanément ta connexion internet, Puis via le panneau de config désinstalle avast! et ensuite installe antivir
Pour finir remet internet et voici un peu de lecture pour bien configurer antivir : Tuto de prise en main : https://www.malekal.com/avira-free-security-antivirus-gratuit/
buginformatik
Messages postés
2163
Date d'inscription
mardi 16 janvier 2007
Statut
Contributeur
Dernière intervention
21 avril 2011
54
16 août 2008 à 18:53
16 août 2008 à 18:53
ok alors reposte un log hijackthis
Donc je vais désinstaller avast et installer antivir
buginformatik
Messages postés
2163
Date d'inscription
mardi 16 janvier 2007
Statut
Contributeur
Dernière intervention
21 avril 2011
54
16 août 2008 à 18:53
16 août 2008 à 18:53
atten on éradique antivirus 2008
la_mailloche
>
buginformatik
Messages postés
2163
Date d'inscription
mardi 16 janvier 2007
Statut
Contributeur
Dernière intervention
21 avril 2011
16 août 2008 à 18:55
16 août 2008 à 18:55
ok
Voici le log hijackthis :
Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 18:54:22, on 16/08/2008
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v7.00 (7.00.6000.16705)
Boot mode: Normal
Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\Ati2evxx.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\Ati2evxx.exe
C:\WINDOWS\Explorer.EXE
C:\Program Files\Alwil Software\Avast4\aswUpdSv.exe
C:\Program Files\Alwil Software\Avast4\ashServ.exe
C:\WINDOWS\system32\spoolsv.exe
c:\APPS\Powercinema\Kernel\TV\CLCapSvc.exe
c:\APPS\Powercinema\Kernel\CLML_NTService\CLMLServer.exe
C:\WINDOWS\system32\drivers\KodakCCS.exe
C:\Program Files\Synaptics\SynTP\SynTPEnh.exe
C:\WINDOWS\RTHDCPL.EXE
C:\Program Files\Java\jre1.6.0_05\bin\jusched.exe
C:\Program Files\Fichiers communs\Microsoft Shared\VS7Debug\mdm.exe
C:\Program Files\Sonic\DigitalMedia LE v7\MyDVD LE\DetectorApp.exe
C:\Program Files\Fichiers communs\InstallShield\UpdateService\issch.exe
C:\APPS\Powercinema\PCMService.exe
C:\Program Files\Samsung\Samsung Media Studio\SamsungMediaStudioAgent.exe
C:\Program Files\QuickTime\qttask.exe
C:\Program Files\Lexmark 2300 Series\lxcgmon.exe
C:\Program Files\Lexmark 2300 Series\ezprint.exe
C:\APPS\SMP\SmpSys.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe
C:\WINDOWS\system32\ScsiAccess.EXE
C:\Program Files\Messenger\msmsgs.exe
C:\WINDOWS\system32\svchost.exe
C:\Program Files\Fichiers communs\Ulead Systems\DVD\ULCDRSvr.exe
C:\Program Files\Sonic\DigitalMedia LE v7\MyDVD LE\USBDeviceService.exe
c:\APPS\Powercinema\Kernel\TV\CLSched.exe
C:\Program Files\Alwil Software\Avast4\ashMaiSv.exe
C:\Program Files\Alwil Software\Avast4\ashWebSv.exe
C:\WINDOWS\system32\lxcgcoms.exe
C:\Program Files\Internet Explorer\IEXPLORE.EXE
C:\Program Files\Java\jre1.6.0_05\bin\jucheck.exe
C:\WINDOWS\system32\NOTEPAD.EXE
C:\Documents and Settings\Daniel Le Gal\Bureau\HJT.exe
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://antivirus2008q-pro.com/buy.php?aff=1001
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = https://www.msn.com/fr-fr/?ocid=iehp
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = https://www.bing.com/?toHttps=1&redig=5FC791212101479BAFBE1A679848B1AF
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = https://www.bing.com/?toHttps=1&redig=5FC791212101479BAFBE1A679848B1AF
R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName = Liens
O2 - BHO: Aide pour le lien d'Adobe PDF Reader - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Fichiers communs\Adobe\Acrobat\ActiveX\AcroIEHelper.dll
O2 - BHO: Download Manager Browser Helper Object - {19C8E43B-07B3-49CB-BFFC-6777B593E6F8} - C:\PROGRA~1\FICHIE~1\fluxDVD\DOWNLO~1\XEBDLH~1.DLL
O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre1.6.0_05\bin\ssv.dll
O2 - BHO: Google Toolbar Helper - {AA58ED58-01DD-4d91-8333-CF10577473F7} - c:\program files\google\googletoolbar3.dll
O2 - BHO: Google Toolbar Notifier BHO - {AF69DE43-7D58-4638-B6FA-CE66B5AD205D} - C:\Program Files\Google\GoogleToolbarNotifier\2.0.301.7164\swg.dll
O2 - BHO: (no name) - {E9245288-8147-43FE-A4DA-680A6F9FB038} - C:\WINDOWS\system32\rqRKDWMd.dll
O3 - Toolbar: &Google - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - c:\program files\google\googletoolbar3.dll
O4 - HKLM\..\Run: [IMJPMIG8.1] "C:\WINDOWS\IME\imjp8_1\IMJPMIG.EXE" /Spoil /RemAdvDef /Migration32
O4 - HKLM\..\Run: [PHIME2002ASync] C:\WINDOWS\system32\IME\TINTLGNT\TINTSETP.EXE /SYNC
O4 - HKLM\..\Run: [PHIME2002A] C:\WINDOWS\system32\IME\TINTLGNT\TINTSETP.EXE /IMEName
O4 - HKLM\..\Run: [SynTPEnh] C:\Program Files\Synaptics\SynTP\SynTPEnh.exe
O4 - HKLM\..\Run: [RTHDCPL] RTHDCPL.EXE
O4 - HKLM\..\Run: [SkyTel] SkyTel.EXE
O4 - HKLM\..\Run: [AzMixerSel] C:\Program Files\Realtek\InstallShield\AzMixerSel.exe
O4 - HKLM\..\Run: [SunJavaUpdateSched] "C:\Program Files\Java\jre1.6.0_05\bin\jusched.exe"
O4 - HKLM\..\Run: [DetectorApp] C:\Program Files\Sonic\DigitalMedia LE v7\MyDVD LE\DetectorApp.exe
O4 - HKLM\..\Run: [ISUSPM Startup] C:\PROGRA~1\FICHIE~1\INSTAL~1\UPDATE~1\ISUSPM.exe -startup
O4 - HKLM\..\Run: [ISUSScheduler] "C:\Program Files\Fichiers communs\InstallShield\UpdateService\issch.exe" -start
O4 - HKLM\..\Run: [PCMService] "c:\APPS\Powercinema\PCMService.exe"
O4 - HKLM\..\Run: [YeppStudioAgent] C:\Program Files\Samsung\Samsung Media Studio\SamsungMediaStudioAgent.exe
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
O4 - HKLM\..\Run: [lxcgmon.exe] "C:\Program Files\Lexmark 2300 Series\lxcgmon.exe"
O4 - HKLM\..\Run: [EzPrint] "C:\Program Files\Lexmark 2300 Series\ezprint.exe"
O4 - HKLM\..\Run: [FaxCenterServer] "C:\Program Files\Lexmark Fax Solutions\fm3032.exe" /s
O4 - HKLM\..\Run: [Adobe Reader Speed Launcher] "C:\Program Files\Adobe\Reader 8.0\Reader\Reader_sl.exe"
O4 - HKLM\..\Run: [LXCGCATS] rundll32 C:\WINDOWS\System32\spool\DRIVERS\W32X86\3\LXCGtime.dll,_RunDLLEntry@16
O4 - HKCU\..\Run: [SmpcSys] C:\APPS\SMP\SmpSys.exe
O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
O4 - HKCU\..\Run: [swg] C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe
O4 - HKCU\..\Run: [MSMSGS] "C:\Program Files\Messenger\msmsgs.exe" /background
O4 - HKUS\S-1-5-19\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'SERVICE LOCAL')
O4 - HKUS\S-1-5-20\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'SERVICE RÉSEAU')
O4 - HKUS\S-1-5-18\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'SYSTEM')
O4 - HKUS\.DEFAULT\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'Default user')
O8 - Extra context menu item: E&xporter vers Microsoft Excel - res://C:\PROGRA~1\MICROS~2\Office10\EXCEL.EXE/3000
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_05\bin\ssv.dll
O9 - Extra 'Tools' menuitem: Console Java (Sun) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_05\bin\ssv.dll
O9 - Extra button: Titan Poker - {49783ED4-258D-4f9f-BE11-137C18D3E543} - C:\Poker\Titan Poker\casino.exe (file missing)
O9 - Extra 'Tools' menuitem: Titan Poker - {49783ED4-258D-4f9f-BE11-137C18D3E543} - C:\Poker\Titan Poker\casino.exe (file missing)
O9 - Extra button: (no name) - {85d1f590-48f4-11d9-9669-0800200c9a66} - C:\WINDOWS\bdoscandel.exe
O9 - Extra 'Tools' menuitem: Uninstall BitDefender Online Scanner v8 - {85d1f590-48f4-11d9-9669-0800200c9a66} - C:\WINDOWS\bdoscandel.exe
O9 - Extra button: Real.com - {CD67F990-D8E9-11d2-98FE-00C0F0318AFE} - C:\WINDOWS\system32\Shdocvw.dll
O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O14 - IERESET.INF: START_PAGE_URL=file://C:\APPS\IE\offline\fr.htm
O15 - Trusted Zone: *.canalplay.com
O15 - Trusted Zone: *.canalplusactive.com
O15 - Trusted Zone: *.canalplay.com (HKLM)
O15 - Trusted Zone: *.canalplusactive.com (HKLM)
O16 - DPF: {5D86DDB5-BDF9-441B-9E9E-D4730F4EE499} (BDSCANONLINE Control) - http://download.bitdefender.com/resources/scan8/oscan8.cab
O16 - DPF: {E862C832-3A5F-4CEB-BFAA-167B22010A71} (InfosFinder2.InfosFinder) - http://support.packardbell.com/files/activex/InfosFinder2.CAB
O23 - Service: avast! iAVS4 Control Service (aswUpdSv) - ALWIL Software - C:\Program Files\Alwil Software\Avast4\aswUpdSv.exe
O23 - Service: Ati HotKey Poller - ATI Technologies Inc. - C:\WINDOWS\system32\Ati2evxx.exe
O23 - Service: avast! Antivirus - ALWIL Software - C:\Program Files\Alwil Software\Avast4\ashServ.exe
O23 - Service: avast! Mail Scanner - ALWIL Software - C:\Program Files\Alwil Software\Avast4\ashMaiSv.exe
O23 - Service: avast! Web Scanner - ALWIL Software - C:\Program Files\Alwil Software\Avast4\ashWebSv.exe
O23 - Service: CyberLink Background Capture Service (CBCS) (CLCapSvc) - Unknown owner - c:\APPS\Powercinema\Kernel\TV\CLCapSvc.exe
O23 - Service: CyberLink Task Scheduler (CTS) (CLSched) - Unknown owner - c:\APPS\Powercinema\Kernel\TV\CLSched.exe
O23 - Service: CyberLink Media Library Service - Cyberlink - c:\APPS\Powercinema\Kernel\CLML_NTService\CLMLServer.exe
O23 - Service: Google Updater Service (gusvc) - Google - C:\Program Files\Google\Common\Google Updater\GoogleUpdaterService.exe
O23 - Service: Kodak Camera Connection Software (KodakCCS) - Eastman Kodak Company - C:\WINDOWS\system32\drivers\KodakCCS.exe
O23 - Service: lxcg_device - Unknown owner - C:\WINDOWS\system32\lxcgcoms.exe
O23 - Service: ScsiAccess - Unknown owner - C:\WINDOWS\system32\ScsiAccess.EXE
O23 - Service: Ulead Burning Helper (UleadBurningHelper) - Ulead Systems, Inc. - C:\Program Files\Fichiers communs\Ulead Systems\DVD\ULCDRSvr.exe
O23 - Service: USBDeviceService - Unknown owner - C:\Program Files\Sonic\DigitalMedia LE v7\MyDVD LE\USBDeviceService.exe
Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 18:54:22, on 16/08/2008
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v7.00 (7.00.6000.16705)
Boot mode: Normal
Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\Ati2evxx.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\Ati2evxx.exe
C:\WINDOWS\Explorer.EXE
C:\Program Files\Alwil Software\Avast4\aswUpdSv.exe
C:\Program Files\Alwil Software\Avast4\ashServ.exe
C:\WINDOWS\system32\spoolsv.exe
c:\APPS\Powercinema\Kernel\TV\CLCapSvc.exe
c:\APPS\Powercinema\Kernel\CLML_NTService\CLMLServer.exe
C:\WINDOWS\system32\drivers\KodakCCS.exe
C:\Program Files\Synaptics\SynTP\SynTPEnh.exe
C:\WINDOWS\RTHDCPL.EXE
C:\Program Files\Java\jre1.6.0_05\bin\jusched.exe
C:\Program Files\Fichiers communs\Microsoft Shared\VS7Debug\mdm.exe
C:\Program Files\Sonic\DigitalMedia LE v7\MyDVD LE\DetectorApp.exe
C:\Program Files\Fichiers communs\InstallShield\UpdateService\issch.exe
C:\APPS\Powercinema\PCMService.exe
C:\Program Files\Samsung\Samsung Media Studio\SamsungMediaStudioAgent.exe
C:\Program Files\QuickTime\qttask.exe
C:\Program Files\Lexmark 2300 Series\lxcgmon.exe
C:\Program Files\Lexmark 2300 Series\ezprint.exe
C:\APPS\SMP\SmpSys.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe
C:\WINDOWS\system32\ScsiAccess.EXE
C:\Program Files\Messenger\msmsgs.exe
C:\WINDOWS\system32\svchost.exe
C:\Program Files\Fichiers communs\Ulead Systems\DVD\ULCDRSvr.exe
C:\Program Files\Sonic\DigitalMedia LE v7\MyDVD LE\USBDeviceService.exe
c:\APPS\Powercinema\Kernel\TV\CLSched.exe
C:\Program Files\Alwil Software\Avast4\ashMaiSv.exe
C:\Program Files\Alwil Software\Avast4\ashWebSv.exe
C:\WINDOWS\system32\lxcgcoms.exe
C:\Program Files\Internet Explorer\IEXPLORE.EXE
C:\Program Files\Java\jre1.6.0_05\bin\jucheck.exe
C:\WINDOWS\system32\NOTEPAD.EXE
C:\Documents and Settings\Daniel Le Gal\Bureau\HJT.exe
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://antivirus2008q-pro.com/buy.php?aff=1001
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = https://www.msn.com/fr-fr/?ocid=iehp
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = https://www.bing.com/?toHttps=1&redig=5FC791212101479BAFBE1A679848B1AF
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = https://www.bing.com/?toHttps=1&redig=5FC791212101479BAFBE1A679848B1AF
R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName = Liens
O2 - BHO: Aide pour le lien d'Adobe PDF Reader - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Fichiers communs\Adobe\Acrobat\ActiveX\AcroIEHelper.dll
O2 - BHO: Download Manager Browser Helper Object - {19C8E43B-07B3-49CB-BFFC-6777B593E6F8} - C:\PROGRA~1\FICHIE~1\fluxDVD\DOWNLO~1\XEBDLH~1.DLL
O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre1.6.0_05\bin\ssv.dll
O2 - BHO: Google Toolbar Helper - {AA58ED58-01DD-4d91-8333-CF10577473F7} - c:\program files\google\googletoolbar3.dll
O2 - BHO: Google Toolbar Notifier BHO - {AF69DE43-7D58-4638-B6FA-CE66B5AD205D} - C:\Program Files\Google\GoogleToolbarNotifier\2.0.301.7164\swg.dll
O2 - BHO: (no name) - {E9245288-8147-43FE-A4DA-680A6F9FB038} - C:\WINDOWS\system32\rqRKDWMd.dll
O3 - Toolbar: &Google - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - c:\program files\google\googletoolbar3.dll
O4 - HKLM\..\Run: [IMJPMIG8.1] "C:\WINDOWS\IME\imjp8_1\IMJPMIG.EXE" /Spoil /RemAdvDef /Migration32
O4 - HKLM\..\Run: [PHIME2002ASync] C:\WINDOWS\system32\IME\TINTLGNT\TINTSETP.EXE /SYNC
O4 - HKLM\..\Run: [PHIME2002A] C:\WINDOWS\system32\IME\TINTLGNT\TINTSETP.EXE /IMEName
O4 - HKLM\..\Run: [SynTPEnh] C:\Program Files\Synaptics\SynTP\SynTPEnh.exe
O4 - HKLM\..\Run: [RTHDCPL] RTHDCPL.EXE
O4 - HKLM\..\Run: [SkyTel] SkyTel.EXE
O4 - HKLM\..\Run: [AzMixerSel] C:\Program Files\Realtek\InstallShield\AzMixerSel.exe
O4 - HKLM\..\Run: [SunJavaUpdateSched] "C:\Program Files\Java\jre1.6.0_05\bin\jusched.exe"
O4 - HKLM\..\Run: [DetectorApp] C:\Program Files\Sonic\DigitalMedia LE v7\MyDVD LE\DetectorApp.exe
O4 - HKLM\..\Run: [ISUSPM Startup] C:\PROGRA~1\FICHIE~1\INSTAL~1\UPDATE~1\ISUSPM.exe -startup
O4 - HKLM\..\Run: [ISUSScheduler] "C:\Program Files\Fichiers communs\InstallShield\UpdateService\issch.exe" -start
O4 - HKLM\..\Run: [PCMService] "c:\APPS\Powercinema\PCMService.exe"
O4 - HKLM\..\Run: [YeppStudioAgent] C:\Program Files\Samsung\Samsung Media Studio\SamsungMediaStudioAgent.exe
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
O4 - HKLM\..\Run: [lxcgmon.exe] "C:\Program Files\Lexmark 2300 Series\lxcgmon.exe"
O4 - HKLM\..\Run: [EzPrint] "C:\Program Files\Lexmark 2300 Series\ezprint.exe"
O4 - HKLM\..\Run: [FaxCenterServer] "C:\Program Files\Lexmark Fax Solutions\fm3032.exe" /s
O4 - HKLM\..\Run: [Adobe Reader Speed Launcher] "C:\Program Files\Adobe\Reader 8.0\Reader\Reader_sl.exe"
O4 - HKLM\..\Run: [LXCGCATS] rundll32 C:\WINDOWS\System32\spool\DRIVERS\W32X86\3\LXCGtime.dll,_RunDLLEntry@16
O4 - HKCU\..\Run: [SmpcSys] C:\APPS\SMP\SmpSys.exe
O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
O4 - HKCU\..\Run: [swg] C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe
O4 - HKCU\..\Run: [MSMSGS] "C:\Program Files\Messenger\msmsgs.exe" /background
O4 - HKUS\S-1-5-19\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'SERVICE LOCAL')
O4 - HKUS\S-1-5-20\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'SERVICE RÉSEAU')
O4 - HKUS\S-1-5-18\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'SYSTEM')
O4 - HKUS\.DEFAULT\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'Default user')
O8 - Extra context menu item: E&xporter vers Microsoft Excel - res://C:\PROGRA~1\MICROS~2\Office10\EXCEL.EXE/3000
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_05\bin\ssv.dll
O9 - Extra 'Tools' menuitem: Console Java (Sun) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_05\bin\ssv.dll
O9 - Extra button: Titan Poker - {49783ED4-258D-4f9f-BE11-137C18D3E543} - C:\Poker\Titan Poker\casino.exe (file missing)
O9 - Extra 'Tools' menuitem: Titan Poker - {49783ED4-258D-4f9f-BE11-137C18D3E543} - C:\Poker\Titan Poker\casino.exe (file missing)
O9 - Extra button: (no name) - {85d1f590-48f4-11d9-9669-0800200c9a66} - C:\WINDOWS\bdoscandel.exe
O9 - Extra 'Tools' menuitem: Uninstall BitDefender Online Scanner v8 - {85d1f590-48f4-11d9-9669-0800200c9a66} - C:\WINDOWS\bdoscandel.exe
O9 - Extra button: Real.com - {CD67F990-D8E9-11d2-98FE-00C0F0318AFE} - C:\WINDOWS\system32\Shdocvw.dll
O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O14 - IERESET.INF: START_PAGE_URL=file://C:\APPS\IE\offline\fr.htm
O15 - Trusted Zone: *.canalplay.com
O15 - Trusted Zone: *.canalplusactive.com
O15 - Trusted Zone: *.canalplay.com (HKLM)
O15 - Trusted Zone: *.canalplusactive.com (HKLM)
O16 - DPF: {5D86DDB5-BDF9-441B-9E9E-D4730F4EE499} (BDSCANONLINE Control) - http://download.bitdefender.com/resources/scan8/oscan8.cab
O16 - DPF: {E862C832-3A5F-4CEB-BFAA-167B22010A71} (InfosFinder2.InfosFinder) - http://support.packardbell.com/files/activex/InfosFinder2.CAB
O23 - Service: avast! iAVS4 Control Service (aswUpdSv) - ALWIL Software - C:\Program Files\Alwil Software\Avast4\aswUpdSv.exe
O23 - Service: Ati HotKey Poller - ATI Technologies Inc. - C:\WINDOWS\system32\Ati2evxx.exe
O23 - Service: avast! Antivirus - ALWIL Software - C:\Program Files\Alwil Software\Avast4\ashServ.exe
O23 - Service: avast! Mail Scanner - ALWIL Software - C:\Program Files\Alwil Software\Avast4\ashMaiSv.exe
O23 - Service: avast! Web Scanner - ALWIL Software - C:\Program Files\Alwil Software\Avast4\ashWebSv.exe
O23 - Service: CyberLink Background Capture Service (CBCS) (CLCapSvc) - Unknown owner - c:\APPS\Powercinema\Kernel\TV\CLCapSvc.exe
O23 - Service: CyberLink Task Scheduler (CTS) (CLSched) - Unknown owner - c:\APPS\Powercinema\Kernel\TV\CLSched.exe
O23 - Service: CyberLink Media Library Service - Cyberlink - c:\APPS\Powercinema\Kernel\CLML_NTService\CLMLServer.exe
O23 - Service: Google Updater Service (gusvc) - Google - C:\Program Files\Google\Common\Google Updater\GoogleUpdaterService.exe
O23 - Service: Kodak Camera Connection Software (KodakCCS) - Eastman Kodak Company - C:\WINDOWS\system32\drivers\KodakCCS.exe
O23 - Service: lxcg_device - Unknown owner - C:\WINDOWS\system32\lxcgcoms.exe
O23 - Service: ScsiAccess - Unknown owner - C:\WINDOWS\system32\ScsiAccess.EXE
O23 - Service: Ulead Burning Helper (UleadBurningHelper) - Ulead Systems, Inc. - C:\Program Files\Fichiers communs\Ulead Systems\DVD\ULCDRSvr.exe
O23 - Service: USBDeviceService - Unknown owner - C:\Program Files\Sonic\DigitalMedia LE v7\MyDVD LE\USBDeviceService.exe
buginformatik
Messages postés
2163
Date d'inscription
mardi 16 janvier 2007
Statut
Contributeur
Dernière intervention
21 avril 2011
54
16 août 2008 à 19:01
16 août 2008 à 19:01
Refais un scan avec malware byte anti malware et poste moi le log, sauf si aucune infection n'a été détectée
Bon voilà j'ai effectué le scan il m'a trouvé 4 fichiers infectés dont 2 où il a fallu redémarrer le systeme pour réparer mais le problème c'est qu'au redémarrage je n'ai pas trouvé le rapport...
Au temps pour moi, le voici :
Malwarebytes' Anti-Malware 1.24
Version de la base de données: 1056
Windows 5.1.2600 Service Pack 2
19:24:07 16/08/2008
mbam-log-8-16-2008 (19-24-07).txt
Type de recherche: Examen complet (C:\|)
Eléments examinés: 87264
Temps écoulé: 20 minute(s), 29 second(s)
Processus mémoire infecté(s): 0
Module(s) mémoire infecté(s): 0
Clé(s) du Registre infectée(s): 2
Valeur(s) du Registre infectée(s): 0
Elément(s) de données du Registre infecté(s): 0
Dossier(s) infecté(s): 0
Fichier(s) infecté(s): 2
Processus mémoire infecté(s):
(Aucun élément nuisible détecté)
Module(s) mémoire infecté(s):
(Aucun élément nuisible détecté)
Clé(s) du Registre infectée(s):
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{e9245288-8147-43fe-a4da-680a6f9fb038} (Trojan.BHO) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{e9245288-8147-43fe-a4da-680a6f9fb038} (Trojan.BHO) -> Quarantined and deleted successfully.
Valeur(s) du Registre infectée(s):
(Aucun élément nuisible détecté)
Elément(s) de données du Registre infecté(s):
(Aucun élément nuisible détecté)
Dossier(s) infecté(s):
(Aucun élément nuisible détecté)
Fichier(s) infecté(s):
C:\WINDOWS\system32\rqRKDWMd.dll (Trojan.BHO) -> Delete on reboot.
C:\QooBox\Quarantine\C\WINDOWS\system32\efcBqoOg.dll.vir (Trojan.Vundo) -> Delete on reboot.
Malwarebytes' Anti-Malware 1.24
Version de la base de données: 1056
Windows 5.1.2600 Service Pack 2
19:24:07 16/08/2008
mbam-log-8-16-2008 (19-24-07).txt
Type de recherche: Examen complet (C:\|)
Eléments examinés: 87264
Temps écoulé: 20 minute(s), 29 second(s)
Processus mémoire infecté(s): 0
Module(s) mémoire infecté(s): 0
Clé(s) du Registre infectée(s): 2
Valeur(s) du Registre infectée(s): 0
Elément(s) de données du Registre infecté(s): 0
Dossier(s) infecté(s): 0
Fichier(s) infecté(s): 2
Processus mémoire infecté(s):
(Aucun élément nuisible détecté)
Module(s) mémoire infecté(s):
(Aucun élément nuisible détecté)
Clé(s) du Registre infectée(s):
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{e9245288-8147-43fe-a4da-680a6f9fb038} (Trojan.BHO) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{e9245288-8147-43fe-a4da-680a6f9fb038} (Trojan.BHO) -> Quarantined and deleted successfully.
Valeur(s) du Registre infectée(s):
(Aucun élément nuisible détecté)
Elément(s) de données du Registre infecté(s):
(Aucun élément nuisible détecté)
Dossier(s) infecté(s):
(Aucun élément nuisible détecté)
Fichier(s) infecté(s):
C:\WINDOWS\system32\rqRKDWMd.dll (Trojan.BHO) -> Delete on reboot.
C:\QooBox\Quarantine\C\WINDOWS\system32\efcBqoOg.dll.vir (Trojan.Vundo) -> Delete on reboot.
buginformatik
Messages postés
2163
Date d'inscription
mardi 16 janvier 2007
Statut
Contributeur
Dernière intervention
21 avril 2011
54
16 août 2008 à 19:31
16 août 2008 à 19:31
Il n'est pas là ?? ==> http://www.zimagez.com/zimage/2008-03-241654.php
ok réglé
ok réglé
buginformatik
Messages postés
2163
Date d'inscription
mardi 16 janvier 2007
Statut
Contributeur
Dernière intervention
21 avril 2011
54
16 août 2008 à 19:33
16 août 2008 à 19:33
Youhou ! on l'a eu ==> C:\WINDOWS\system32\rqRKDWMd.dll
très bien tu peux passer au changemetn d'antivirus
très bien tu peux passer au changemetn d'antivirus