Aide contre "antivirus 2009"

Fermé
Kewan - 19 août 2008 à 15:54
 Kewan - 19 août 2008 à 18:12
Bonjour,

j'ai ete touché par "antiivirus 2009". j'ai utilisé Malwarebyte et a d'apparence disparu. J'aimerais avoir vos conseils sur ce qu'il me reste à faire. Je vous poste mon rapport Malwarebyte suivi de mon rapport Hijack. Merci de votre attention.



Malwarebytes' Anti-Malware 1.24
Version de la base de données: 1060
Windows 5.1.2600 Service Pack 2

16:10:08 18/08/2008
mbam-log-8-18-2008 (16-10-07).txt

Type de recherche: Examen complet (C:\|)
Eléments examinés: 188829
Temps écoulé: 2 hour(s), 23 minute(s), 23 second(s)

Processus mémoire infecté(s): 1
Module(s) mémoire infecté(s): 0
Clé(s) du Registre infectée(s): 72
Valeur(s) du Registre infectée(s): 4
Elément(s) de données du Registre infecté(s): 0
Dossier(s) infecté(s): 5
Fichier(s) infecté(s): 61

Processus mémoire infecté(s):
C:\Program Files\AV9\av2009.exe (Rogue.Antivirus2009) -> Unloaded process successfully.

Module(s) mémoire infecté(s):
(Aucun élément nuisible détecté)

Clé(s) du Registre infectée(s):
HKEY_CLASSES_ROOT\CLSID\{82fc4503-8459-4239-9b85-0617beaa950a} (Dialer) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Code Store Database\Distribution Units\{82fc4503-8459-4239-9b85-0617beaa950a} (Dialer) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{037C7B8A-151A-49E6-BAED-CC05FCB50328} (Adware.Search Toolbar) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{037c7b8a-151a-49e6-baed-cc05fcb50328} (Adware.Search Toolbar) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{7504F0D5-644A-4103-9D02-95488B6CB9A1} (Adware.Instant Access) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Code Store Database\Distribution Units\{7504F0D5-644A-4103-9D02-95488B6CB9A1} (Adware.Instant Access) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{8D8BAF56-B581-4B90-A549-C4AC6B03F1BB} (Adware.Instant Access) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Code Store Database\Distribution Units\{8D8BAF56-B581-4B90-A549-C4AC6B03F1BB} (Adware.Instant Access) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{BA749BC1-143E-430D-B1DA-1D2AF67A3658} (Adware.Instant Access) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Code Store Database\Distribution Units\{BA749BC1-143E-430D-B1DA-1D2AF67A3658} (Adware.Instant Access) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{C2481ED1-9896-4D49-AE90-69858DFDE446} (Adware.Instant Access) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Code Store Database\Distribution Units\{C2481ED1-9896-4D49-AE90-69858DFDE446} (Adware.Instant Access) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{01be5bd7-b2dd-48b3-a759-59265a91e787} (Adware.EGDAccess) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Code Store Database\Distribution Units\{01be5bd7-b2dd-48b3-a759-59265a91e787} (Adware.EGDAccess) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{04ccff26-7d52-4e42-bf6a-f8ece0896eb7} (Adware.EGDAccess) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Code Store Database\Distribution Units\{04ccff26-7d52-4e42-bf6a-f8ece0896eb7} (Adware.EGDAccess) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Code Store Database\Distribution Units\{04f414e9-e352-4bc3-963d-7bfe5a5f31a9} (Adware.EGDAccess) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{07c9cfc7-de33-4a0c-9ffb-cdfba843b157} (Adware.EGDAccess) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Code Store Database\Distribution Units\{07c9cfc7-de33-4a0c-9ffb-cdfba843b157} (Adware.EGDAccess) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{0878f049-d33e-45e0-a157-c36a6683cf25} (Adware.EGDAccess) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Code Store Database\Distribution Units\{0878f049-d33e-45e0-a157-c36a6683cf25} (Adware.EGDAccess) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{0d1011b3-89c8-4f8e-8693-bb970e2e81e0} (Adware.EGDAccess) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Code Store Database\Distribution Units\{0d1011b3-89c8-4f8e-8693-bb970e2e81e0} (Adware.EGDAccess) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{0da910bc-6919-489e-b584-d9a4aac7b8de} (Adware.EGDAccess) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Code Store Database\Distribution Units\{0da910bc-6919-489e-b584-d9a4aac7b8de} (Adware.EGDAccess) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{1604df98-d1a5-44fe-844a-98d6fd0518d0} (Adware.EGDAccess) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Code Store Database\Distribution Units\{1604df98-d1a5-44fe-844a-98d6fd0518d0} (Adware.EGDAccess) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{1cd4e2dc-2da0-4154-8723-38cb04fb6a58} (Adware.EGDAccess) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Code Store Database\Distribution Units\{1cd4e2dc-2da0-4154-8723-38cb04fb6a58} (Adware.EGDAccess) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Code Store Database\Distribution Units\{201b9b37-848f-40bd-90ea-7b8f0aa89d6a} (Adware.EGDAccess) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{2a3dfc59-8a87-49a1-85d1-42903410911f} (Adware.EGDAccess) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Code Store Database\Distribution Units\{2a3dfc59-8a87-49a1-85d1-42903410911f} (Adware.EGDAccess) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Code Store Database\Distribution Units\{321f38b6-7e5f-470e-b58c-927523b7af92} (Adware.EGDAccess) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{3616f4b5-f6ad-4e67-966a-c218673648a0} (Adware.EGDAccess) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Code Store Database\Distribution Units\{3616f4b5-f6ad-4e67-966a-c218673648a0} (Adware.EGDAccess) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{3dad912e-d2b9-4323-b7c9-7f2c5cc0c57b} (Adware.EGDAccess) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Code Store Database\Distribution Units\{3dad912e-d2b9-4323-b7c9-7f2c5cc0c57b} (Adware.EGDAccess) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{54579c3d-a58d-4623-b5b5-465552bda45b} (Adware.EGDAccess) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Code Store Database\Distribution Units\{54579c3d-a58d-4623-b5b5-465552bda45b} (Adware.EGDAccess) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Code Store Database\Distribution Units\{5f4d3335-3194-4167-85ae-e7325f2695ef} (Adware.EGDAccess) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{624321f1-0581-49d8-99bd-2e952c2df31b} (Adware.EGDAccess) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Code Store Database\Distribution Units\{624321f1-0581-49d8-99bd-2e952c2df31b} (Adware.EGDAccess) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{87c1805d-c5ae-4455-ab39-e245bb516136} (Adware.EGDAccess) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Code Store Database\Distribution Units\{87c1805d-c5ae-4455-ab39-e245bb516136} (Adware.EGDAccess) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{95460abd-946a-46ff-9f56-268718323eee} (Adware.EGDAccess) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Code Store Database\Distribution Units\{95460abd-946a-46ff-9f56-268718323eee} (Adware.EGDAccess) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{a1c392a2-b274-46db-89be-1fbd476b9c93} (Adware.EGDAccess) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Code Store Database\Distribution Units\{a1c392a2-b274-46db-89be-1fbd476b9c93} (Adware.EGDAccess) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Code Store Database\Distribution Units\{aa59202c-5e41-48fc-af7d-324f5fd6a9f1} (Adware.EGDAccess) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{af7410c1-fba3-415e-800a-4110ced40536} (Adware.EGDAccess) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Code Store Database\Distribution Units\{af7410c1-fba3-415e-800a-4110ced40536} (Adware.EGDAccess) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{c6760a07-a574-4705-b113-7856315922c3} (Adware.EGDAccess) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Code Store Database\Distribution Units\{c6760a07-a574-4705-b113-7856315922c3} (Adware.EGDAccess) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{cb5d474e-a510-40a4-b5a4-838933bcba64} (Adware.EGDAccess) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{e114cd5b-17ce-4807-890e-7b1edf9f2e5e} (Adware.EGDAccess) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Code Store Database\Distribution Units\{e114cd5b-17ce-4807-890e-7b1edf9f2e5e} (Adware.EGDAccess) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{e24e8472-89b7-479f-8ad8-bbd7206a6a02} (Adware.EGDAccess) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Code Store Database\Distribution Units\{e24e8472-89b7-479f-8ad8-bbd7206a6a02} (Adware.EGDAccess) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{ec4afbf3-4540-4306-af10-4cac509ea16b} (Adware.EGDAccess) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Code Store Database\Distribution Units\{ec4afbf3-4540-4306-af10-4cac509ea16b} (Adware.EGDAccess) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{ef4dcd99-d26b-44a4-ba77-cfdcc97e7291} (Adware.EGDAccess) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Code Store Database\Distribution Units\{ef4dcd99-d26b-44a4-ba77-cfdcc97e7291} (Adware.EGDAccess) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{efb23983-5803-4914-ada3-c0ea2cfbdc37} (Adware.EGDAccess) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Code Store Database\Distribution Units\{efb23983-5803-4914-ada3-c0ea2cfbdc37} (Adware.EGDAccess) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{f99973c8-43e7-48c4-9ef3-131b67301321} (Adware.EGDAccess) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Code Store Database\Distribution Units\{f99973c8-43e7-48c4-9ef3-131b67301321} (Adware.EGDAccess) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{fa1d6d8f-c6ed-4752-8512-a33283240130} (Adware.EGDAccess) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Code Store Database\Distribution Units\{fa1d6d8f-c6ed-4752-8512-a33283240130} (Adware.EGDAccess) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{fa605711-8e72-46b2-ae49-bed11b2e729d} (Adware.EGDAccess) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Code Store Database\Distribution Units\{fa605711-8e72-46b2-ae49-bed11b2e729d} (Adware.EGDAccess) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{fa83e942-b796-46de-9155-1632ecc5473b} (Adware.EGDAccess) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Code Store Database\Distribution Units\{fa83e942-b796-46de-9155-1632ecc5473b} (Adware.EGDAccess) -> Quarantined and deleted successfully.

Valeur(s) du Registre infectée(s):
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\87867051994814576464059927546186 (Rogue.Antivirus2009) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\IEUpdate (Trojan.Agent) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\New Windows\Allow\host-domain-lookup.com (Malware.Trace) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\New Windows\Allow\www.host-domain-lookup.com (Malware.Trace) -> Quarantined and deleted successfully.

Elément(s) de données du Registre infecté(s):
(Aucun élément nuisible détecté)

Dossier(s) infecté(s):
C:\Program Files\dynamic toolbar (Adware.2020search) -> Quarantined and deleted successfully.
C:\Program Files\dynamic toolbar\Cache (Adware.2020search) -> Quarantined and deleted successfully.
C:\Program Files\dynamic toolbar\PBFRV2 (Adware.2020search) -> Quarantined and deleted successfully.
C:\Program Files\dynamic toolbar\PBFRV2\Cache (Adware.2020search) -> Quarantined and deleted successfully.
C:\Program Files\AV9 (Rogue.Antivirus2009) -> Quarantined and deleted successfully.

Fichier(s) infecté(s):
C:\WINDOWS\system32\winsrc.dll (Adware.Search Toolbar) -> Quarantined and deleted successfully.
C:\Documents and Settings\Guy Labracherie\Local Settings\Temp\ginstall.dll (Adware.WebHancer) -> Quarantined and deleted successfully.
C:\Documents and Settings\Jérôme Labracherie\Local Settings\Temp\ginstall.dll (Adware.WebHancer) -> Quarantined and deleted successfully.
C:\Program Files\dynamic toolbar\batch.bat (Adware.2020search) -> Quarantined and deleted successfully.
C:\Program Files\dynamic toolbar\unins000.dat (Adware.2020search) -> Quarantined and deleted successfully.
C:\Program Files\dynamic toolbar\unins000.exe (Adware.2020search) -> Quarantined and deleted successfully.
C:\Program Files\dynamic toolbar\Cache\go.bmp (Adware.2020search) -> Quarantined and deleted successfully.
C:\Program Files\dynamic toolbar\Cache\home.bmp (Adware.2020search) -> Quarantined and deleted successfully.
C:\Program Files\dynamic toolbar\Cache\logo_pb.bmp (Adware.2020search) -> Quarantined and deleted successfully.
C:\Program Files\dynamic toolbar\Cache\parent_off.bmp (Adware.2020search) -> Quarantined and deleted successfully.
C:\Program Files\dynamic toolbar\Cache\parent_on.bmp (Adware.2020search) -> Quarantined and deleted successfully.
C:\Program Files\dynamic toolbar\Cache\pbfrv2tb0200.cfg (Adware.2020search) -> Quarantined and deleted successfully.
C:\Program Files\dynamic toolbar\Cache\popup_off.bmp (Adware.2020search) -> Quarantined and deleted successfully.
C:\Program Files\dynamic toolbar\Cache\popup_on.bmp (Adware.2020search) -> Quarantined and deleted successfully.
C:\Program Files\dynamic toolbar\Cache\search.bmp (Adware.2020search) -> Quarantined and deleted successfully.
C:\Program Files\dynamic toolbar\Cache\services.bmp (Adware.2020search) -> Quarantined and deleted successfully.
C:\Program Files\dynamic toolbar\Cache\skin.bmp (Adware.2020search) -> Quarantined and deleted successfully.
C:\Program Files\dynamic toolbar\Cache\skin1.bmp (Adware.2020search) -> Quarantined and deleted successfully.
C:\Program Files\dynamic toolbar\Cache\skin2.bmp (Adware.2020search) -> Quarantined and deleted successfully.
C:\Program Files\dynamic toolbar\Cache\skin3.bmp (Adware.2020search) -> Quarantined and deleted successfully.
C:\Program Files\dynamic toolbar\Cache\skin4.bmp (Adware.2020search) -> Quarantined and deleted successfully.
C:\Program Files\dynamic toolbar\Cache\skin5.bmp (Adware.2020search) -> Quarantined and deleted successfully.
C:\Program Files\dynamic toolbar\Cache\store.bmp (Adware.2020search) -> Quarantined and deleted successfully.
C:\Program Files\dynamic toolbar\Cache\style.css (Adware.2020search) -> Quarantined and deleted successfully.
C:\Program Files\dynamic toolbar\Cache\support.bmp (Adware.2020search) -> Quarantined and deleted successfully.
C:\Program Files\dynamic toolbar\Cache\ticker.xml (Adware.2020search) -> Quarantined and deleted successfully.
C:\Program Files\dynamic toolbar\PBFRV2\Cache\ErrorLog.txt (Adware.2020search) -> Quarantined and deleted successfully.
C:\Program Files\dynamic toolbar\PBFRV2\Cache\go.bmp (Adware.2020search) -> Quarantined and deleted successfully.
C:\Program Files\dynamic toolbar\PBFRV2\Cache\home.bmp (Adware.2020search) -> Quarantined and deleted successfully.
C:\Program Files\dynamic toolbar\PBFRV2\Cache\logo_pb.bmp (Adware.2020search) -> Quarantined and deleted successfully.
C:\Program Files\dynamic toolbar\PBFRV2\Cache\parent_off.bmp (Adware.2020search) -> Quarantined and deleted successfully.
C:\Program Files\dynamic toolbar\PBFRV2\Cache\parent_on.bmp (Adware.2020search) -> Quarantined and deleted successfully.
C:\Program Files\dynamic toolbar\PBFRV2\Cache\PBFRV2TB0200.cfg (Adware.2020search) -> Quarantined and deleted successfully.
C:\Program Files\dynamic toolbar\PBFRV2\Cache\popup_off.bmp (Adware.2020search) -> Quarantined and deleted successfully.
C:\Program Files\dynamic toolbar\PBFRV2\Cache\popup_on.bmp (Adware.2020search) -> Quarantined and deleted successfully.
C:\Program Files\dynamic toolbar\PBFRV2\Cache\search.bmp (Adware.2020search) -> Quarantined and deleted successfully.
C:\Program Files\dynamic toolbar\PBFRV2\Cache\services.bmp (Adware.2020search) -> Quarantined and deleted successfully.
C:\Program Files\dynamic toolbar\PBFRV2\Cache\skin.bmp (Adware.2020search) -> Quarantined and deleted successfully.
C:\Program Files\dynamic toolbar\PBFRV2\Cache\skin1.bmp (Adware.2020search) -> Quarantined and deleted successfully.
C:\Program Files\dynamic toolbar\PBFRV2\Cache\skin2.bmp (Adware.2020search) -> Quarantined and deleted successfully.
C:\Program Files\dynamic toolbar\PBFRV2\Cache\skin3.bmp (Adware.2020search) -> Quarantined and deleted successfully.
C:\Program Files\dynamic toolbar\PBFRV2\Cache\skin4.bmp (Adware.2020search) -> Quarantined and deleted successfully.
C:\Program Files\dynamic toolbar\PBFRV2\Cache\skin5.bmp (Adware.2020search) -> Quarantined and deleted successfully.
C:\Program Files\dynamic toolbar\PBFRV2\Cache\store.bmp (Adware.2020search) -> Quarantined and deleted successfully.
C:\Program Files\dynamic toolbar\PBFRV2\Cache\style.css (Adware.2020search) -> Quarantined and deleted successfully.
C:\Program Files\dynamic toolbar\PBFRV2\Cache\support.bmp (Adware.2020search) -> Quarantined and deleted successfully.
C:\Program Files\dynamic toolbar\PBFRV2\Cache\ticker.xml (Adware.2020search) -> Quarantined and deleted successfully.
C:\Program Files\dynamic toolbar\PBFRV2\Cache\_Ticker_ticker.txt (Adware.2020search) -> Quarantined and deleted successfully.
C:\Program Files\AV9\av2009.exe (Rogue.Antivirus2009) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\ieupdates.exe (Trojan.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\~.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\Fonts\acrsecB.fon (Trojan.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\Fonts\acrsecI.fon (Trojan.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\Downloaded Program Files\EGDAccess.inf (Adware.EGDAccess) -> Quarantined and deleted successfully.
C:\WINDOWS\Downloaded Program Files\EGDAccess_ASPIV4.inf (Adware.EGDAccess) -> Quarantined and deleted successfully.
C:\WINDOWS\Downloaded Program Files\sysnetsvc32.inf (Adware.EGDAccess) -> Quarantined and deleted successfully.
C:\WINDOWS\tmlpcert2007 (Adware.EGDAccess) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\msegcompid.dll (Adware.EGDAccess) -> Quarantined and deleted successfully.
C:\Documents and Settings\Jérôme Labracherie\Menu Démarrer\NoCreditCard.lnk (Dialer) -> Quarantined and deleted successfully.
C:\Documents and Settings\Jérôme Labracherie\Application Data\Microsoft\Internet Explorer\Quick Launch\Antivirus 2009.lnk (Rogue.Antivirus2008) -> Quarantined and deleted successfully.
C:\Documents and Settings\Jérôme Labracherie\Local Settings\Temp\CmdLineExt03.dll (Trojan.Agent) -> Quarantined and deleted successfully.






Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 15:39:14, on 19/08/2008
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v7.00 (7.00.6000.16705)
Boot mode: Normal

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\Explorer.EXE
C:\PROGRA~1\FICHIE~1\AOL\ACS\AOLacsd.exe
C:\Program Files\Pack Securite\Anti-Virus\fsgk32st.exe
C:\Program Files\Pack Securite\Anti-Virus\FSGK32.EXE
C:\Program Files\Pack Securite\Common\FSMA32.EXE
C:\Program Files\MioNet\MioNetManager.exe
C:\Program Files\Pack Securite\Common\FSMB32.EXE
C:\Program Files\Pack Securite\Common\FCH32.EXE
C:\WINDOWS\system32\HPZipm12.exe
C:\WINDOWS\system32\slserv.exe
C:\Program Files\MioNet\jvm\bin\MioNet.exe
C:\WINDOWS\system32\svchost.exe
C:\Program Files\Pack Securite\Anti-Virus\fsqh.exe
C:\Program Files\Pack Securite\Common\FAMEH32.EXE
C:\WINDOWS\wanmpsvc.exe
C:\WINDOWS\SOUNDMAN.EXE
C:\ATI Technologies\ATI Control Panel\atiptaxx.exe
C:\Program Files\Java\jre1.6.0_07\bin\jusched.exe
C:\Apps\Powercinema\PCMService.exe
C:\PROGRA~1\TECHCI~1\AOLSAV\AOLAgent.exe
C:\Program Files\Fichiers communs\Real\Update_OB\realsched.exe
C:\Program Files\SlySoft\CloneCD\CloneCDTray.exe
C:\Program Files\HP\HP Software Update\HPWuSchd2.exe
C:\Program Files\Ulead Systems\Ulead InstaMedia 2.0\Monitor.exe
C:\Program Files\Ulead Systems\Ulead InstaMedia 2.0\RMC.exe
C:\WINDOWS\VM_STI.EXE
C:\Program Files\QuickTime\qttask.exe
C:\Program Files\Fichiers communs\AOL\1194975627\ee\AOLSoftware.exe
C:\Program Files\Pack Securite\Common\FSM32.EXE
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\SlySoft\AnyDVD\AnyDVDtray.exe
C:\Program Files\Internet Explorer\IEXPLORE.EXE
C:\PROGRA~1\PANICW~1\POP-UP~1\PSFree.exe
C:\Program Files\HP\Digital Imaging\bin\hpqtra08.exe
C:\Program Files\Pack Securite\FSGUI\fsguidll.exe
C:\Program Files\Philips\SPC 200NC PC Camera\TrayMin200.exe
C:\Program Files\Pack Securite\FSAUA\program\fsaua.exe
C:\Program Files\Pack Securite\Anti-Virus\fssm32.exe
C:\Program Files\Pack Securite\FWES\Program\fsdfwd.exe
C:\Program Files\HP\Digital Imaging\bin\hpqgalry.exe
C:\Program Files\Pack Securite\FSAUA\program\fsus.exe
C:\Program Files\Pack Securite\Anti-Virus\fsav32.exe
C:\Program Files\MSN Messenger\usnsvc.exe
C:\Program Files\Adobe\Acrobat 7.0\Reader\AcroRd32.exe
C:\WINDOWS\System32\svchost.exe
C:\Program Files\MSN Messenger\msnmsgr.exe
C:\Program Files\Internet Explorer\IEXPLORE.EXE
C:\Program Files\Malwarebytes' Anti-Malware\mbam.exe
C:\WINDOWS\system32\NOTEPAD.EXE
C:\Program Files\Trend Micro\HijackThis\HijackThis.exe

R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Bar = https://actus.sfr.fr
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://home.neuf.fr/
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = https://www.msn.com/fr-fr/?ocid=iehp
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = https://www.bing.com/?toHttps=1&redig=5FC791212101479BAFBE1A679848B1AF
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = https://www.msn.com/fr-fr/?ocid=iehp
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Window Title = Packard Bell
R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName = Liens
R3 - URLSearchHook: {EA551C00-2AE5-11d3-8592-00A0C98E9EA4} - - (no file)
O2 - BHO: Yahoo! Toolbar Helper - {02478D38-C3F9-4EFB-9B51-7695ECA05670} - C:\Program Files\Yahoo!\Companion\Installs\cpn\yt.dll
O2 - BHO: AcroIEHlprObj Class - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 7.0\ActiveX\AcroIEHelper.dll
O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre1.6.0_07\bin\ssv.dll
O2 - BHO: (no name) - {7E853D72-626A-48EC-A868-BA8D5E23E045} - (no file)
O2 - BHO: Windows Live Sign-in Helper - {9030D464-4C02-4ABF-8ECC-5164760863C6} - C:\Program Files\Fichiers communs\Microsoft Shared\Windows Live\WindowsLiveLogin.dll
O2 - BHO: ST - {9394EDE7-C8B5-483E-8773-474BF36AF6E4} - C:\Program Files\MSN Apps\ST\01.03.0000.1005\en-xu\stmain.dll
O2 - BHO: Google Toolbar Helper - {AA58ED58-01DD-4d91-8333-CF10577473F7} - c:\program files\google\googletoolbar2.dll
O2 - BHO: MSNToolBandBHO - {BDBD1DAD-C946-4A17-ADC1-64B5B4FF55D0} - C:\Program Files\MSN Apps\MSN Toolbar\MSN Toolbar\01.02.5000.1021\fr\msntb.dll
O3 - Toolbar: AOL Toolbar - {4982D40A-C53B-4615-B15B-B5B5E98D167C} - C:\Program Files\AOL Toolbar\toolbar.dll (file missing)
O3 - Toolbar: MSN - {BDAD1DAD-C946-4A17-ADC1-64B5B4FF55D0} - C:\Program Files\MSN Apps\MSN Toolbar\MSN Toolbar\01.02.5000.1021\fr\msntb.dll
O3 - Toolbar: Yahoo! Toolbar - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - C:\Program Files\Yahoo!\Companion\Installs\cpn\yt.dll
O3 - Toolbar: &Google - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - c:\program files\google\googletoolbar2.dll
O4 - HKLM\..\Run: [IMJPMIG8.1] "C:\WINDOWS\IME\imjp8_1\IMJPMIG.EXE" /Spoil /RemAdvDef /Migration32
O4 - HKLM\..\Run: [PHIME2002ASync] C:\WINDOWS\system32\IME\TINTLGNT\TINTSETP.EXE /SYNC
O4 - HKLM\..\Run: [PHIME2002A] C:\WINDOWS\system32\IME\TINTLGNT\TINTSETP.EXE /IMEName
O4 - HKLM\..\Run: [SoundMan] SOUNDMAN.EXE
O4 - HKLM\..\Run: [ATIPTA] C:\ATI Technologies\ATI Control Panel\atiptaxx.exe
O4 - HKLM\..\Run: [SunJavaUpdateSched] "C:\Program Files\Java\jre1.6.0_07\bin\jusched.exe"
O4 - HKLM\..\Run: [PCMService] "c:\Apps\Powercinema\PCMService.exe"
O4 - HKLM\..\Run: [AOLSAV] C:\PROGRA~1\TECHCI~1\AOLSAV\AOLAgent.exe
O4 - HKLM\..\Run: [AOLDialer] C:\Program Files\Fichiers communs\AOL\ACS\AOLDial.exe
O4 - HKLM\..\Run: [TkBellExe] "C:\Program Files\Fichiers communs\Real\Update_OB\realsched.exe" -osboot
O4 - HKLM\..\Run: [HP Component Manager] "C:\Program Files\HP\hpcoretech\hpcmpmgr.exe"
O4 - HKLM\..\Run: [CloneCDTray] "C:\Program Files\SlySoft\CloneCD\CloneCDTray.exe" /s
O4 - HKLM\..\Run: [HP Software Update] C:\Program Files\HP\HP Software Update\HPWuSchd2.exe
O4 - HKLM\..\Run: [Matchlock Scheduling] C:\Program Files\Ulead Systems\Ulead InstaMedia 2.0\Monitor.exe
O4 - HKLM\..\Run: [Ulead Remote Control Center] C:\Program Files\Ulead Systems\Ulead InstaMedia 2.0\RMC.exe
O4 - HKLM\..\Run: [BigDogPath] C:\WINDOWS\VM_STI.EXE Philips SPC 200NC PC Camera
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
O4 - HKLM\..\Run: [zuweoirfmy] c:\windows\system32\zuweoirfmy.exe zuweoirfmy
O4 - HKLM\..\Run: [HostManager] C:\Program Files\Fichiers communs\AOL\1194975627\ee\AOLSoftware.exe
O4 - HKLM\..\Run: [F-Secure Manager] "C:\Program Files\Pack Securite\Common\FSM32.EXE" /splash
O4 - HKLM\..\Run: [F-Secure TNB] "C:\Program Files\Pack Securite\FSGUI\TNBUtil.exe" /CHECKALL /WAITFORSW
O4 - HKLM\..\Run: [Love default global mess] C:\Documents and Settings\All Users\Application Data\great coal love default\bone send.exe
O4 - HKCU\..\Run: [MsnMsgr] "C:\Program Files\MSN Messenger\MsnMsgr.Exe" /background
O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
O4 - HKCU\..\Run: [WayBolt] C:\DOCUME~1\JRMELA~1\APPLIC~1\FLAWSP~1\Chin meal.exe
O4 - HKCU\..\Run: [AnyDVD] C:\Program Files\SlySoft\AnyDVD\AnyDVDtray.exe
O4 - HKCU\..\Run: [PopUpStopperFreeEdition] "C:\PROGRA~1\PANICW~1\POP-UP~1\PSFree.exe"
O4 - HKUS\S-1-5-19\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'SERVICE LOCAL')
O4 - HKUS\S-1-5-20\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'SERVICE RÉSEAU')
O4 - HKUS\S-1-5-18\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'SYSTEM')
O4 - HKUS\.DEFAULT\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'Default user')
O4 - Global Startup: DTV Remote Control.lnk = C:\Program Files\ADS Tech\DVBT Utilities\ADSRMT.EXE
O4 - Global Startup: Démarrage rapide du logiciel HP Image Zone.lnk = C:\Program Files\HP\Digital Imaging\bin\hpqthb08.exe
O4 - Global Startup: HP Digital Imaging Monitor.lnk = C:\Program Files\HP\Digital Imaging\bin\hpqtra08.exe
O4 - Global Startup: Lancement rapide d'Adobe Reader.lnk = C:\Program Files\Adobe\Acrobat 7.0\Reader\reader_sl.exe
O4 - Global Startup: TrayMin300.exe.lnk = ?
O8 - Extra context menu item: E&xporter vers Microsoft Excel - res://C:\PROGRA~1\MICROS~3\OFFICE11\EXCEL.EXE/3000
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_07\bin\ssv.dll
O9 - Extra 'Tools' menuitem: Console Java (Sun) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_07\bin\ssv.dll
O9 - Extra button: AOL Toolbar - {4982D40A-C53B-4615-B15B-B5B5E98D167C} - C:\Program Files\AOL Toolbar\toolbar.dll (file missing)
O9 - Extra 'Tools' menuitem: AOL Toolbar - {4982D40A-C53B-4615-B15B-B5B5E98D167C} - C:\Program Files\AOL Toolbar\toolbar.dll (file missing)
O9 - Extra button: Recherche - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~3\OFFICE11\REFIEBAR.DLL
O9 - Extra button: Real.com - {CD67F990-D8E9-11d2-98FE-00C0F0318AFE} - C:\WINDOWS\system32\Shdocvw.dll
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O14 - IERESET.INF: START_PAGE_URL=file://C:\APPS\IE\offline\fr.htm
O16 - DPF: fdjeux - https://www.fdjeux.net/classes/fdjeux.cab
O16 - DPF: Interface Chat Wanadoo - http://chat7.x-echo.com/version6/Applet/wchatsign.cab
O16 - DPF: {00B71CFB-6864-4346-A978-C0A14556272C} (Checkers Class) - http://messenger.zone.msn.com/binary/msgrchkr.cab31267.cab
O16 - DPF: {1D6711C8-7154-40BB-8380-3DEA45B69CBF} -
O16 - DPF: {4D7F48C0-CB49-4EA6-97D4-04F4EACC2F3B} - http://sib1.od2.com/common/Member/ClientInstall/7.20.0003/OCI/setup.exe
O16 - DPF: {8E0D4DE5-3180-4024-A327-4DFAD1796A8D} (MessengerStatsClient Class) - http://messenger.zone.msn.com/binary/MessengerStatsClient.cab31267.cab
O16 - DPF: {B38870E4-7ECB-40DA-8C6A-595F0A5519FF} (MsnMessengerSetupDownloadControl Class) - http://messenger.msn.com/download/MsnMessengerSetupDownloader.cab
O16 - DPF: {C45B1500-7B63-47C2-AB25-C28CB46AFDEE} (M6music player) - http://sib1.od2.com/common/musicmanager/installation/MusicManagerPlugin.CAB
O16 - DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} (Shockwave Flash Object) - http://fpdownload2.macromedia.com/get/shockwave/cabs/flash/swflash.cab
O23 - Service: AOL Connectivity Service (AOL ACS) - AOL LLC - C:\PROGRA~1\FICHIE~1\AOL\ACS\AOLacsd.exe
O23 - Service: ATI Smart - Unknown owner - C:\WINDOWS\system32\ati2sgag.exe
O23 - Service: FSGKHS (F-Secure Gatekeeper Handler Starter) - F-Secure Corporation - C:\Program Files\Pack Securite\Anti-Virus\fsgk32st.exe
O23 - Service: F-Secure Automatic Update Agent (FSAUA) - F-Secure Corporation - C:\Program Files\Pack Securite\FSAUA\program\fsaua.exe
O23 - Service: F-Secure Anti-Virus Firewall Daemon (FSDFWD) - F-Secure Corporation - C:\Program Files\Pack Securite\FWES\Program\fsdfwd.exe
O23 - Service: F-Secure Management Agent (FSMA) - F-Secure Corporation - C:\Program Files\Pack Securite\Common\FSMA32.EXE
O23 - Service: Google Updater Service (gusvc) - Google - C:\Program Files\Google\Common\Google Updater\GoogleUpdaterService.exe
O23 - Service: MioNet Service (MioNet) - Unknown owner - C:\Program Files\MioNet\MioNetManager.exe
O23 - Service: MysqlInventime - Unknown owner - c:\mysql\bin\mysqld-nt.exe
O23 - Service: Pml Driver HPZ12 - HP - C:\WINDOWS\system32\HPZipm12.exe
O23 - Service: SmartLinkService (SLService) - - C:\WINDOWS\SYSTEM32\slserv.exe
O23 - Service: WAN Miniport (ATW) Service (WANMiniportService) - America Online, Inc. - C:\WINDOWS\wanmpsvc.exe
A voir également:

17 réponses

jlpjlp Messages postés 51580 Date d'inscription vendredi 18 mai 2007 Statut Contributeur sécurité Dernière intervention 3 mai 2022 5 040
19 août 2008 à 15:57
slt
il en reste


http://perso.orange.fr/il.mafioso/Navifix/Navilog1.exe

Télécharger sur le bureau
Navilog.zip
= Double-Clic navilog1.zip
= Extraire tout sur le bureau
= Double-Clic navilog1 qui est sur le bureau
= Appuyer sur une touche jusqu' arriver aux options
= Choisir option 1

un rapport : fixnavi.txt dans C : va se creer
le copier/coller dans ton prochain message.
_____________



tu télécharge Lop S&D.exe sur ton Bureau.https://77b4795d-a-62cb3a1a-s-sites.googlegroups.com/site/eric71mespages/LopSD.exe?attachauth=ANoY7co3ntqUavpZ3q1BG-h4pc13vqDZmhcNeEPChtsyrgAykRbhE8bZzhk979EfQD4AgwtQUHCaQ7ZQwNYMo3_0kA8htAspckDJtu2K5t6J9z6dLW4fpZyH4FpFL1tVMBZ8H-KnN7afZ5vt-WxZRpnynk-a0XmV_Y0C0q6DxGEDKie1TnPT7gFoZnoCnspzBmbW6ZzxA4fNr3oEDlbelNZON-LjF8nOmQ%3D%3D&attredirects=2

* Double-clique dessus pour lancer l'installation
* Puis double-clique sur le raccourci Lop S&D présent sur ton Bureau
* Séléctionne la langue souhaitée , puis choisis l'option 1 (Recherche)
* Patiente jusqu'à la fin du scan
* Poste le rapport généré (C:\lopR.txt)
0
Leahkim Messages postés 3079 Date d'inscription jeudi 15 novembre 2007 Statut Membre Dernière intervention 2 mars 2014 278
19 août 2008 à 15:59
O3 - Toolbar: AOL Toolbar - {4982D40A-C53B-4615-B15B-B5B5E98D167C} - C:\Program Files\AOL Toolbar\toolbar.dll (file missing)

O2 - BHO: (no name) - {7E853D72-626A-48EC-A868-BA8D5E23E045} - (no file)

R3 - URLSearchHook: {EA551C00-2AE5-11d3-8592-00A0C98E9EA4} - - (no file)

O4 - HKLM\..\Run: [zuweoirfmy] c:\windows\system32\zuweoirfmy.exe zuweoirfmy

O4 - HKLM\..\Run: [Love default global mess] C:\Documents and Settings\All Users\Application Data\great coal love default\bone send.exe

O4 - HKCU\..\Run: [WayBolt] C:\DOCUME~1\JRMELA~1\APPLIC~1\FLAWSP~1\Chin meal.exe

O9 - Extra 'Tools' menuitem: AOL Toolbar - {4982D40A-C53B-4615-B15B-B5B5E98D167C} - C:\Program Files\AOL Toolbar\toolbar.dll (file missing)

O9 - Extra button: AOL Toolbar - {4982D40A-C53B-4615-B15B-B5B5E98D167C} - C:\Program Files\AOL Toolbar\toolbar.dll (file missing)

O16 - DPF: Interface Chat Wanadoo - http://chat7.x-echo.com/version6/Applet/wchatsign.cab

O16 - DPF: {1D6711C8-7154-40BB-8380-3DEA45B69CBF} -





Voila, tu peux repasser Hijackthis, et cocher tout ça pour qu'il les enleve (fix)
0
Utilisateur anonyme
19 août 2008 à 16:08
j ai eu aussi Malwarebyte et l ai laisser tomber , il déconnait , je me sert de A-Square Free maintenant car suite a une
infection Malwarebyte avait trouvé le Virus mais ne l a pas mis en quarantaine ni supprimé , et A-Squared l a trouvé
> Quarantaine direct
a-square free > http://www.gratilog.net/xoops/modules/mydownloads/singlefile.php?cid=242&lid=478
il ne protège pas en temps réel , sauf si tu l active mais seulement pour une période d évaluation

pour interpréter ton Log Hijackthis :

http://www.gratilog.net/xoops/modules/mydownloads/singlefile.php?cid=235&lid=483

EDIT : Bon je suis arrivé en retard , pas grave du moment que tu as été dépanné !!!
0
jlpjlp Messages postés 51580 Date d'inscription vendredi 18 mai 2007 Statut Contributeur sécurité Dernière intervention 3 mai 2022 5 040
19 août 2008 à 16:08
slt fixer les ligne ne suffit pas les infections resteront dans l'ordi!
0

Vous n’avez pas trouvé la réponse que vous recherchez ?

Posez votre question
j'ai le rapport lod mais pour navilog ça n'en finit pas :-(
0
bon je patiente, ça va sinon? la ptite santé ?il fait beau chez toi? ;-)
0
Leahkim Messages postés 3079 Date d'inscription jeudi 15 novembre 2007 Statut Membre Dernière intervention 2 mars 2014 278
19 août 2008 à 16:39
oula on dirai presque que tu me dragues mdr !

encore un geek ?
0
non ça va, j'irais pas jusque là a te draguer et laissons les geek tranquilles


jpeux y aller pour supprimer ce que tu me conseilles avec hijack?
0
Leahkim Messages postés 3079 Date d'inscription jeudi 15 novembre 2007 Statut Membre Dernière intervention 2 mars 2014 278
19 août 2008 à 16:54
oui vas y!
0
voici mes rapports :



Search Navipromo version 3.6.4 commencé le 19/08/2008 à 16:06:14,50

!!! Attention,ce rapport peut indiquer des fichiers/programmes légitimes!!!
!!! Postez ce rapport sur le forum pour le faire analyser !!!
!!! Ne lancez pas la partie désinfection sans l'avis d'un spécialiste !!!

Outil exécuté depuis C:\Program Files\navilog1
Session actuelle : "Jérôme Labracherie"

Mise à jour le 16.08.2008 à 22h00 par IL-MAFIOSO


Microsoft Windows XP [version 5.1.2600]
Internet Explorer : 7.0.5730.11
Système de fichiers : NTFS

Recherche executé en mode normal

*** Recherche Programmes installés ***

Instant Access

*** Recherche dossiers dans "C:\WINDOWS" ***


*** Recherche dossiers dans "C:\Program Files" ***


*** Recherche dossiers dans "C:\Documents and Settings\All Users\menudm~1\progra~1" ***


*** Recherche dossiers dans "C:\Documents and Settings\All Users\menudm~1" ***


*** Recherche dossiers dans "c:\docume~1\alluse~1\applic~1" ***


*** Recherche dossiers dans "C:\Documents and Settings\Jérôme Labracherie\applic~1" ***


*** Recherche dossiers dans "C:\DOCUME~1\GUYLAB~1\applic~1" ***


*** Recherche dossiers dans "C:\DOCUME~1\PROPRI~1\applic~1" ***


*** Recherche dossiers dans "C:\Documents and Settings\Jérôme Labracherie\locals~1\applic~1" ***


*** Recherche dossiers dans "C:\DOCUME~1\GUYLAB~1\locals~1\applic~1" ***


*** Recherche dossiers dans "C:\DOCUME~1\JRMELA~2\locals~1\applic~1" ***


*** Recherche dossiers dans "C:\Documents and Settings\Jérôme Labracherie\menudm~1\progra~1" ***


*** Recherche dossiers dans "C:\DOCUME~1\GUYLAB~1\menudm~1\progra~1" ***


*** Recherche avec Catchme-rootkit/stealth malware detector par gmer ***
pour + d'infos : http://www.gmer.net

Fichier(s) caché(s) :

C:\WINDOWS\system32\miqeaqq.dat
C:\WINDOWS\system32\miqeaqq.exe
C:\WINDOWS\system32\miqeaqq_nav.dat
C:\WINDOWS\system32\miqeaqq_navps.dat
C:\WINDOWS\system32\miqeaqq_navup.dat


*** Recherche avec GenericNaviSearch ***
!!! Tous ces résultats peuvent révéler des fichiers légitimes !!!
!!! A vérifier impérativement avant toute suppression manuelle !!!

* Recherche dans "C:\WINDOWS\system32" *

* Recherche dans "C:\Documents and Settings\Jérôme Labracherie\locals~1\applic~1" *

* Recherche dans "C:\DOCUME~1\GUYLAB~1\locals~1\applic~1" *

* Recherche dans "C:\DOCUME~1\JRMELA~2\locals~1\applic~1" *



*** Recherche fichiers ***


C:\Documents and Settings\J‚r“me Labracherie\locals~1\Temp\pack.epk trouvé !
C:\WINDOWS\Downloaded Program Files\egaccess4.inf trouvé !
C:\WINDOWS\Downloaded Program Files\IaLdr32.inf trouvé !

*** Recherche clés spécifiques dans le Registre ***

HKEY_CURRENT_USER\Software\mc trouvé !

*** Module de Recherche complémentaire ***
(Recherche fichiers spécifiques)

1)Recherche nouveaux fichiers Instant Access :


2)Recherche Heuristique :

* Dans "C:\WINDOWS\system32" :

zuweoirfmy.dat trouvé !
zuweoirfmy_nav.dat trouvé !
zuweoirfmy_navps.dat trouvé !

* Dans "C:\Documents and Settings\Jérôme Labracherie\locals~1\applic~1" :


* Dans "C:\DOCUME~1\GUYLAB~1\locals~1\applic~1" :


* Dans "C:\DOCUME~1\JRMELA~2\locals~1\applic~1" :


3)Recherche Certificats :

Certificat Egroup trouvé !
Certificat Electronic-Group absent !
Certificat Montorgueil absent !
Certificat OOO-Favorit absent !
Certificat Sunny-Day-Design-Ltd absent !

4)Recherche fichiers connus :



*** Analyse terminée le 19/08/2008 à 16:55:54,82 ***







--------------------\\ Lop S&D 4.2.3-1 XP/Vista

Microsoft Windows XP Édition familiale ( v5.1.2600 ) Service Pack 2
X86-based PC ( Uniprocessor Free : AMD Athlon(tm) XP 3000+ )
Phoenix - AwardBIOS v6.00PG
BOOT : Normal boot

"C:\Lop SD" ( MAJ : 19-08-2008|02:08 )
Option : [1] ( 19/08/2008|16:08 )

--------------------\\ Listing des dossiers dans APPLIC~1

[15/02/2008|21:46] C:\DOCUME~1\ALLUSE~1\APPLIC~1\.zreglib
[01/12/2005|11:31] C:\DOCUME~1\ALLUSE~1\APPLIC~1\Adobe
[13/11/2007|19:43] C:\DOCUME~1\ALLUSE~1\APPLIC~1\AOL
[13/11/2007|19:36] C:\DOCUME~1\ALLUSE~1\APPLIC~1\AOL Downloads
[15/02/2008|21:46] C:\DOCUME~1\ALLUSE~1\APPLIC~1\Elaborate Bytes
[06/05/2008|10:58] C:\DOCUME~1\ALLUSE~1\APPLIC~1\F-Secure
[06/05/2008|10:56] C:\DOCUME~1\ALLUSE~1\APPLIC~1\fssg
[26/02/2007|20:02] C:\DOCUME~1\ALLUSE~1\APPLIC~1\Google
[22/07/2008|18:33] C:\DOCUME~1\ALLUSE~1\APPLIC~1\great coal love default
[09/02/2005|16:23] C:\DOCUME~1\ALLUSE~1\APPLIC~1\Hewlett-Packard
[13/11/2007|19:44] C:\DOCUME~1\ALLUSE~1\APPLIC~1\Macromedia
[17/08/2008|10:56] C:\DOCUME~1\ALLUSE~1\APPLIC~1\Malwarebytes
[09/12/2006|02:58] C:\DOCUME~1\ALLUSE~1\APPLIC~1\Messenger Plus!
[11/05/2008|01:43] C:\DOCUME~1\ALLUSE~1\APPLIC~1\Microsoft
[05/01/2006|18:46] C:\DOCUME~1\ALLUSE~1\APPLIC~1\OD2
[03/11/2005|21:26] C:\DOCUME~1\ALLUSE~1\APPLIC~1\QuickTime
[16/08/2004|19:28] C:\DOCUME~1\ALLUSE~1\APPLIC~1\SBSI
[15/02/2008|21:39] C:\DOCUME~1\ALLUSE~1\APPLIC~1\SlySoft
[05/05/2006|13:07] C:\DOCUME~1\ALLUSE~1\APPLIC~1\Ulead Systems
[02/11/2004|07:20] C:\DOCUME~1\ALLUSE~1\APPLIC~1\Viewpoint
[01/07/2006|09:08] C:\DOCUME~1\ALLUSE~1\APPLIC~1\Windows Genuine Advantage
[06/12/2005|09:34] C:\DOCUME~1\ALLUSE~1\APPLIC~1\Yahoo! Companion


[01/12/2007|04:01] C:\DOCUME~1\DEFAUL~1\APPLIC~1\Microsoft
[22/10/2005|20:17] C:\DOCUME~1\DEFAUL~1\APPLIC~1\Real
[02/11/2004|07:14] C:\DOCUME~1\DEFAUL~1\APPLIC~1\Sun
[02/11/2004|07:22] C:\DOCUME~1\DEFAUL~1\APPLIC~1\Symantec


[06/10/2007|16:12] C:\DOCUME~1\GUYLAB~1\APPLIC~1\Adobe
[06/10/2007|16:13] C:\DOCUME~1\GUYLAB~1\APPLIC~1\AdobeUM
[10/12/2007|18:33] C:\DOCUME~1\GUYLAB~1\APPLIC~1\AOL
[27/01/2008|18:07] C:\DOCUME~1\GUYLAB~1\APPLIC~1\flaw spam
[01/12/2007|17:03] C:\DOCUME~1\GUYLAB~1\APPLIC~1\Google
[27/12/2004|17:55] C:\DOCUME~1\GUYLAB~1\APPLIC~1\Macromedia
[24/01/2008|22:21] C:\DOCUME~1\GUYLAB~1\APPLIC~1\Microsoft
[22/10/2005|20:17] C:\DOCUME~1\GUYLAB~1\APPLIC~1\Real
[06/01/2008|16:42] C:\DOCUME~1\GUYLAB~1\APPLIC~1\SlySoft
[02/11/2004|07:14] C:\DOCUME~1\GUYLAB~1\APPLIC~1\Sun
[02/11/2004|07:22] C:\DOCUME~1\GUYLAB~1\APPLIC~1\Symantec
[27/12/2004|17:20] C:\DOCUME~1\GUYLAB~1\APPLIC~1\Template
[21/07/2006|07:36] C:\DOCUME~1\GUYLAB~1\APPLIC~1\Ulead Systems


[29/01/2008|01:42] C:\DOCUME~1\JRMELA~1\APPLIC~1\Adobe
[01/12/2005|11:32] C:\DOCUME~1\JRMELA~1\APPLIC~1\AdobeUM
[27/12/2004|18:03] C:\DOCUME~1\JRMELA~1\APPLIC~1\AOL
[20/11/2007|10:49] C:\DOCUME~1\JRMELA~1\APPLIC~1\ArcSoft
[19/12/2005|20:25] C:\DOCUME~1\JRMELA~1\APPLIC~1\CyberLink
[08/08/2008|11:07] C:\DOCUME~1\JRMELA~1\APPLIC~1\flaw spam
[21/06/2008|19:24] C:\DOCUME~1\JRMELA~1\APPLIC~1\fltk.org
[15/06/2008|18:15] C:\DOCUME~1\JRMELA~1\APPLIC~1\F-Secure
[26/02/2007|20:05] C:\DOCUME~1\JRMELA~1\APPLIC~1\Google
[15/08/2008|10:32] C:\DOCUME~1\JRMELA~1\APPLIC~1\Hamachi
[09/11/2006|21:31] C:\DOCUME~1\JRMELA~1\APPLIC~1\Help
[01/10/2007|16:38] C:\DOCUME~1\JRMELA~1\APPLIC~1\InstallShield
[31/12/2004|13:58] C:\DOCUME~1\JRMELA~1\APPLIC~1\Leadertech
[28/12/2004|21:42] C:\DOCUME~1\JRMELA~1\APPLIC~1\Macromedia
[17/08/2008|10:56] C:\DOCUME~1\JRMELA~1\APPLIC~1\Malwarebytes
[03/04/2008|13:08] C:\DOCUME~1\JRMELA~1\APPLIC~1\Microsoft
[31/12/2004|14:21] C:\DOCUME~1\JRMELA~1\APPLIC~1\MSNInstaller
[25/08/2005|17:15] C:\DOCUME~1\JRMELA~1\APPLIC~1\OD2
[14/10/2007|15:32] C:\DOCUME~1\JRMELA~1\APPLIC~1\Playwize
[01/10/2007|16:38] C:\DOCUME~1\JRMELA~1\APPLIC~1\Pokerwize
[22/10/2005|20:17] C:\DOCUME~1\JRMELA~1\APPLIC~1\Real
[19/04/2008|16:59] C:\DOCUME~1\JRMELA~1\APPLIC~1\Roxio
[26/07/2007|15:02] C:\DOCUME~1\JRMELA~1\APPLIC~1\SlySoft
[31/12/2004|13:59] C:\DOCUME~1\JRMELA~1\APPLIC~1\Sonic
[02/11/2004|07:14] C:\DOCUME~1\JRMELA~1\APPLIC~1\Sun
[02/11/2004|07:22] C:\DOCUME~1\JRMELA~1\APPLIC~1\Symantec
[27/12/2004|16:30] C:\DOCUME~1\JRMELA~1\APPLIC~1\Template
[05/05/2006|21:41] C:\DOCUME~1\JRMELA~1\APPLIC~1\Ulead Systems


[08/08/2008|10:58] C:\DOCUME~1\LOCALS~1\APPLIC~1\flaw spam
[11/05/2008|22:48] C:\DOCUME~1\LOCALS~1\APPLIC~1\Microsoft

[01/12/2007|04:00] C:\DOCUME~1\NETWOR~1\APPLIC~1\Microsoft
[06/06/2006|15:42] C:\DOCUME~1\NETWOR~1\APPLIC~1\Symantec

[27/12/2004|15:54] C:\DOCUME~1\PROPRI~1\APPLIC~1\You've Got Pictures Screensaver

--------------------\\ Tâches planifiées dans C:\WINDOWS\tasks

[19/08/2008 16:00][--ah-----] C:\WINDOWS\tasks\B22F3784951CAE6C.job
[19/08/2008 02:01][--a------] C:\WINDOWS\tasks\Scheduled scanning task.job
[18/08/2008 16:18][--ah-----] C:\WINDOWS\tasks\SA.DAT
[05/08/2004 15:00][-r-h-----] C:\WINDOWS\tasks\desktop.ini

( B22F3784951CAE6C.job )=( c:\docume~1\jrmela~1\applic~1\flawsp~1\ProgramAceMeet.exe )

--------------------\\ Listing des dossiers dans C:\Program Files

[22/05/2007|01:02] C:\Program Files\7-Zip
[01/12/2005|11:29] C:\Program Files\Adobe
[10/08/2006|13:41] C:\Program Files\ADS Tech
[23/08/2006|12:54] C:\Program Files\Ahead
[24/01/2005|17:29] C:\Program Files\alzip.exe
[19/11/2007|15:18] C:\Program Files\AnmSMP
[20/11/2007|10:38] C:\Program Files\ArcSoft
[24/01/2006|18:04] C:\Program Files\Canon
[10/08/2008|02:44] C:\Program Files\Championship Manager 00-01
[08/08/2008|10:43] C:\Program Files\Circle Developement
[16/08/2004|19:05] C:\Program Files\ComPlus Applications
[13/01/2006|20:29] C:\Program Files\Creative
[28/02/2007|18:46] C:\Program Files\Cyanide
[02/11/2004|07:25] C:\Program Files\CyberLink
[05/01/2005|15:08] C:\Program Files\directx
[17/01/2005|15:49] C:\Program Files\Eidos
[21/01/2005|12:37] C:\Program Files\Elaborate Bytes
[24/01/2005|17:45] C:\Program Files\ESTsoft
[26/12/2007|03:31] C:\Program Files\Everest Poker
[13/05/2008|08:42] C:\Program Files\Every Toolbar 1.1
[20/06/2005|21:53] C:\Program Files\fdjeux
[11/05/2008|21:11] C:\Program Files\Fichiers communs
[22/07/2008|18:31] C:\Program Files\flaw spam
[14/01/2005|21:52] C:\Program Files\FpFrance Utilities
[26/02/2007|20:04] C:\Program Files\Google
[09/02/2005|16:23] C:\Program Files\Hewlett-Packard
[16/08/2005|12:19] C:\Program Files\HP
[30/06/2006|10:45] C:\Program Files\Install_Messenger.exe
[19/04/2008|17:14] C:\Program Files\InstallShield Installation Information
[15/08/2008|12:08] C:\Program Files\Internet Explorer
[17/07/2008|21:23] C:\Program Files\Java
[08/01/2005|12:31] C:\Program Files\JVTorrent
[23/12/2006|00:27] C:\Program Files\KONAMI
[02/11/2004|07:20] C:\Program Files\Learn2.com
[17/08/2008|10:56] C:\Program Files\Malwarebytes' Anti-Malware
[24/11/2007|19:03] C:\Program Files\Masks
[15/08/2008|11:25] C:\Program Files\Messenger
[10/06/2008|20:45] C:\Program Files\Messenger Plus! Live
[16/08/2004|19:11] C:\Program Files\microsoft frontpage
[26/05/2005|15:00] C:\Program Files\microsoft office
[08/01/2005|14:17] C:\Program Files\Microsoft Works
[02/11/2004|07:29] C:\Program Files\Microsoft.NET
[15/01/2008|08:13] C:\Program Files\MioNet
[16/08/2004|19:06] C:\Program Files\Movie Maker
[22/08/2006|13:31] C:\Program Files\MsgPlusLive-401.exe
[31/12/2004|14:20] C:\Program Files\MSN
[02/01/2005|14:34] C:\Program Files\MSN Apps
[16/08/2004|19:03] C:\Program Files\MSN Gaming Zone
[15/01/2008|18:36] C:\Program Files\MSN Messenger
[16/11/2006|04:02] C:\Program Files\MSXML 4.0
[25/08/2005|16:14] C:\Program Files\Music Manager
[19/08/2008|16:06] C:\Program Files\Navilog1
[16/08/2004|19:06] C:\Program Files\NetMeeting
[26/10/2007|17:18] C:\Program Files\Neuf
[16/08/2004|19:03] C:\Program Files\Online Services
[14/06/2007|03:03] C:\Program Files\Outlook Express
[16/08/2005|12:45] C:\Program Files\Overland
[07/05/2008|15:46] C:\Program Files\Pack Securite
[06/03/2008|18:22] C:\Program Files\Panicware
[01/10/2007|16:39] C:\Program Files\PartoucheWize
[24/11/2007|19:03] C:\Program Files\Patterns
[09/02/2005|17:01] C:\Program Files\pe7.exe
[23/08/2006|12:52] C:\Program Files\Philips
[24/11/2007|18:36] C:\Program Files\PhotoFiltre.zip
[24/11/2007|19:03] C:\Program Files\Plugins
[25/03/2005|13:37] C:\Program Files\Pochette Express 2
[02/11/2004|07:20] C:\Program Files\QuickTime
[16/07/2007|09:21] C:\Program Files\QuickZip
[24/01/2005|17:41] C:\Program Files\quickzip.exe
[02/11/2004|07:20] C:\Program Files\Real
[19/04/2008|16:46] C:\Program Files\Roxio
[24/11/2007|19:03] C:\Program Files\Selections
[16/08/2004|19:07] C:\Program Files\Services en ligne
[21/01/2005|15:04] C:\Program Files\SetupAnyDVD4551.exe
[15/03/2005|14:44] C:\Program Files\SetupAnyDVD4612.exe
[21/03/2005|18:47] C:\Program Files\SetupAnyDVD4631.exe
[21/01/2005|12:21] C:\Program Files\SetupCloneDVD2Slysoft.exe
[27/05/2005|10:04] C:\Program Files\SlySoft
[02/11/2004|07:31] C:\Program Files\Sonic
[20/07/2008|23:52] C:\Program Files\SopCast
[17/07/2008|21:26] C:\Program Files\Sun
[27/12/2004|17:36] C:\Program Files\TechCity Solutions
[18/08/2008|13:34] C:\Program Files\Trend Micro
[05/05/2006|21:39] C:\Program Files\Ulead Systems
[16/08/2004|19:19] C:\Program Files\Uninstall Information
[02/11/2004|07:20] C:\Program Files\Viewpoint
[07/01/2006|22:50] C:\Program Files\WebCamMobileDrvsV1_01.EXE
[20/11/2007|14:12] C:\Program Files\Windows Live
[11/05/2008|01:43] C:\Program Files\Windows Media Connect 2
[11/05/2008|01:57] C:\Program Files\Windows Media Player
[16/08/2004|19:03] C:\Program Files\Windows NT
[16/08/2004|19:07] C:\Program Files\WindowsUpdate
[16/08/2004|19:11] C:\Program Files\xerox
[06/12/2005|09:34] C:\Program Files\Yahoo!

--------------------\\ Listing des dossiers dans C:\Program Files\Fichiers communs

[19/04/2008|16:46] C:\Program Files\Fichiers communs\Adaptec Shared
[04/01/2005|19:59] C:\Program Files\Fichiers communs\Adobe
[23/08/2006|12:54] C:\Program Files\Fichiers communs\Ahead
[13/11/2007|19:52] C:\Program Files\Fichiers communs\AOL
[27/12/2004|17:39] C:\Program Files\Fichiers communs\aolback
[13/11/2007|19:43] C:\Program Files\Fichiers communs\aolshare
[02/11/2004|07:29] C:\Program Files\Fichiers communs\DESIGNER
[09/02/2005|16:21] C:\Program Files\Fichiers communs\Hewlett-Packard
[09/02/2005|16:24] C:\Program Files\Fichiers communs\HP
[05/05/2006|13:06] C:\Program Files\Fichiers communs\InstallShield
[02/11/2004|07:14] C:\Program Files\Fichiers communs\Java
[30/06/2006|10:49] C:\Program Files\Fichiers communs\Microsoft Shared
[16/08/2004|19:06] C:\Program Files\Fichiers communs\MSSoap
[02/11/2004|07:20] C:\Program Files\Fichiers communs\Nullsoft
[16/08/2004|18:57] C:\Program Files\Fichiers communs\ODBC
[02/11/2004|07:26] C:\Program Files\Fichiers communs\Real
[19/04/2008|16:47] C:\Program Files\Fichiers communs\Roxio Shared
[16/08/2004|19:06] C:\Program Files\Fichiers communs\Services
[02/11/2004|07:31] C:\Program Files\Fichiers communs\Sonic Shared
[16/08/2004|18:56] C:\Program Files\Fichiers communs\SpeechEngines
[02/11/2004|07:26] C:\Program Files\Fichiers communs\SureThing Shared
[13/05/2008|08:40] C:\Program Files\Fichiers communs\Symantec Shared
[14/06/2007|03:03] C:\Program Files\Fichiers communs\System
[05/05/2006|21:39] C:\Program Files\Fichiers communs\Ulead Systems
[02/11/2004|07:26] C:\Program Files\Fichiers communs\xing shared

--------------------\\ Process

( 67 Processus )

iexplore.exe ~ [PID:1708] ~ [Threads:20]
iexplore.exe ~ [PID:2988] ~ [Threads:25]

--------------------\\ Recherche avec S_Lop

Aucun fichier / dossier Lop trouvé !

--------------------\\ Recherche de Fichiers / Dossiers Lop

C:\DOCUME~1\ALLUSE~1\APPLIC~1\great coal love default
C:\DOCUME~1\ALLUSE~1\APPLIC~1\great coal love default\bone send.exe
C:\DOCUME~1\GUYLAB~1\APPLIC~1\flawsp~1
C:\DOCUME~1\JRMELA~1\APPLIC~1\flawsp~1
C:\DOCUME~1\JRMELA~1\APPLIC~1\flawsp~1\chicidolblahball.0xe
C:\DOCUME~1\JRMELA~1\APPLIC~1\flawsp~1\Chin meal.0xe
C:\DOCUME~1\JRMELA~1\APPLIC~1\flawsp~1\fksinbta.0xe
C:\DOCUME~1\JRMELA~1\APPLIC~1\flawsp~1\fodzyfta.0xe
C:\DOCUME~1\JRMELA~1\APPLIC~1\flawsp~1\hscrgiwu.exe
C:\DOCUME~1\JRMELA~1\APPLIC~1\flawsp~1\jhvgbdir.0xe
C:\DOCUME~1\JRMELA~1\APPLIC~1\flawsp~1\jxtzjnjp.0xe
C:\DOCUME~1\JRMELA~1\APPLIC~1\flawsp~1\mxklvyas.0xe
C:\DOCUME~1\JRMELA~1\APPLIC~1\flawsp~1\pptnmrsw.0xe
C:\DOCUME~1\JRMELA~1\APPLIC~1\flawsp~1\Program Ace Meet.0xe
C:\DOCUME~1\JRMELA~1\APPLIC~1\flawsp~1\Program Ace Meet.1xe
C:\DOCUME~1\JRMELA~1\APPLIC~1\flawsp~1\rofollne.0xe
C:\DOCUME~1\LOCALS~1\APPLIC~1\flawsp~1
C:\DOCUME~1\LOCALS~1\APPLIC~1\flawsp~1\Chin meal.0xe
C:\Program Files\flawsp~1
C:\Program Files\Circle Developement
C:\Program Files\Circle Developement\Uninstall.0xe
C:\DOCUME~1\JRMELA~1\Cookies\jérôme_labracherie@advertstream[1].txt
C:\DOCUME~1\JRMELA~1\Cookies\jérôme_labracherie@bigpoint[1].txt
C:\DOCUME~1\JRMELA~1\Cookies\jérôme_labracherie@fr.thepimps.bigpoint[2].txt
C:\DOCUME~1\JRMELA~1\Cookies\jérôme_labracherie@32vegas[1].txt
C:\DOCUME~1\JRMELA~1\Cookies\jérôme_labracherie@banner.32vegas[2].txt
C:\WINDOWS\Tasks\B22F3784951CAE6C.job

--------------------\\ Verification du Registre

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"WayBolt"="C:\\DOCUME~1\\JRMELA~1\\APPLIC~1\\FLAWSP~1\\Chin meal.exe"

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"Love default global mess"="C:\\Documents and Settings\\All Users\\Application Data\\great coal love default\\bone send.exe"

--------------------\\ Verification du fichier Hosts

Fichier Hosts MODIFIE

127.0.0.1 bin.errorprotector.com ## added by CiD
127.0.0.1 br.errorsafe.com ## added by CiD
127.0.0.1 br.winantivirus.com ## added by CiD
127.0.0.1 br.winfixer.com ## added by CiD
127.0.0.1 cdn.drivecleaner.com ## added by CiD
127.0.0.1 cdn.errorsafe.com ## added by CiD
127.0.0.1 cdn.winsoftware.com ## added by CiD
127.0.0.1 de.errorsafe.com ## added by CiD
127.0.0.1 de.winantivirus.com ## added by CiD
127.0.0.1 download.cdn.drivecleaner.com ## added by CiD
127.0.0.1 download.cdn.errorsafe.com ## added by CiD
127.0.0.1 download.cdn.winsoftware.com ## added by CiD
127.0.0.1 download.errorsafe.com ## added by CiD
127.0.0.1 download.systemdoctor.com ## added by CiD
127.0.0.1 download.winantispyware.com ## added by CiD
127.0.0.1 download.windrivecleaner.com ## added by CiD
127.0.0.1 download.winfixer.com ## added by CiD
127.0.0.1 drivecleaner.com ## added by CiD
127.0.0.1 dynamique.drivecleaner.com ## added by CiD
127.0.0.1 errorprotector.com ## added by CiD
127.0.0.1 errorsafe.com ## added by CiD
127.0.0.1 es.winantivirus.com ## added by CiD
127.0.0.1 fr.winantivirus.com ## added by CiD
127.0.0.1 fr.winfixer.com ## added by CiD
127.0.0.1 go.drivecleaner.com ## added by CiD
127.0.0.1 go.errorsafe.com ## added by CiD
127.0.0.1 go.winantispyware.com ## added by CiD
127.0.0.1 go.winantivirus.com ## added by CiD
127.0.0.1 hk.winantivirus.com ## added by CiD
127.0.0.1 instlog.errorsafe.com ## added by CiD
127.0.0.1 instlog.winantivirus.com ## added by CiD
127.0.0.1 instlog.winfixer.com ## added by CiD
127.0.0.1 jsp.drivecleaner.com ## added by CiD
127.0.0.1 kb.errorsafe.com ## added by CiD
127.0.0.1 kb.winantivirus.com ## added by CiD
127.0.0.1 nl.errorsafe.com ## added by CiD
127.0.0.1 se.errorsafe.com ## added by CiD
127.0.0.1 secure.drivecleaner.com ## added by CiD
127.0.0.1 secure.errorsafe.com ## added by CiD
127.0.0.1 secure.winantispam.com ## added by CiD
127.0.0.1 secure.winantispy.com ## added by CiD
127.0.0.1 secure.winantivirus.com ## added by CiD
127.0.0.1 support.winantivirus.com ## added by CiD
127.0.0.1 trial.updates.winsoftware.com ## added by CiD
127.0.0.1 ulog.winantivirus.com ## added by CiD
127.0.0.1 utils.errorsafe.com ## added by CiD
127.0.0.1 utils.winantivirus.com ## added by CiD
127.0.0.1 utils.winfixer.com ## added by CiD
127.0.0.1 winantispyware.com ## added by CiD
127.0.0.1 winantivirus.com ## added by CiD
127.0.0.1 winfixer.com ## added by CiD
127.0.0.1 winfixer2006.com ## added by CiD
127.0.0.1 winsoftware.com ## added by CiD
127.0.0.1 [i]ww/iw.drivecleaner.com ## added by CiD
127.0.0.1 [i]ww/iw.errorprotector.com ## added by CiD
127.0.0.1 [i]ww/iw.errorsafe.com ## added by CiD
127.0.0.1 [i]ww/iw.systemdoctor.com ## added by CiD
127.0.0.1 [i]ww/iw.utils.winfixer.com ## added by CiD
127.0.0.1 [i]ww/iw.win-anti-virus-pro.com ## added by CiD
127.0.0.1 [i]ww/iw.win-virus-pro.com ## added by CiD
127.0.0.1 [i]ww/iw.winantispam.com ## added by CiD
127.0.0.1 [i]ww/iw.winantispy.com ## added by CiD
127.0.0.1 [i]ww/iw.winantispyware.com ## added by CiD
127.0.0.1 [i]ww/iw.winantivirus.com ## added by CiD
127.0.0.1 [i]ww/iw.winantiviruspro.com ## added by CiD
127.0.0.1 [i]ww/iw.windrivecleaner.com ## added by CiD
127.0.0.1 [i]ww/iw.windrivesafe.com ## added by CiD
127.0.0.1 [i]ww/iw.winfixer.com ## added by CiD
127.0.0.1 [i]ww/iw.winfixer2006.com ## added by CiD
127.0.0.1 [i]ww/iw.winsoftware.com ## added by CiD

-> 72 [ 70 ## added by CiD ]

--------------------\\ Recherche de fichiers avec Catchme

catchme 0.3.1353 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2008-08-19 16:11:32
Windows 5.1.2600 Service Pack 2 NTFS
scanning hidden processes ...
scanning hidden files ...
scan completed successfully
hidden processes: 0
hidden files: 0

--------------------\\ Recherche d'autres infections

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"zuweoirfmy"="c:\\windows\\system32\\zuweoirfmy.exe zuweoirfmy"

C:\DOCUME~1\JRMELA~1\LOCALS~1\Temp\Pack.epk

C:\WINDOWS\System32\miqeaqq.dat
C:\WINDOWS\System32\miqeaqq.exe
C:\WINDOWS\System32\miqeaqq_nav.dat
C:\WINDOWS\System32\miqeaqq_navps.dat
C:\WINDOWS\System32\miqeaqq_navup.dat
C:\WINDOWS\Prefetch\MIQEAQQ.EXE-39839AFC.pf
C:\WINDOWS\System32\zuweoirfmy.dat
C:\WINDOWS\System32\zuweoirfmy_nav.dat
C:\WINDOWS\System32\zuweoirfmy_navps.dat
[b]==> EGDACCESS <==/b



[F:4616][D:137]-> C:\DOCUME~1\JRMELA~1\LOCALS~1\Temp
[F:225][D:0]-> C:\DOCUME~1\JRMELA~1\Cookies
[F:11407][D:16]-> C:\DOCUME~1\JRMELA~1\LOCALS~1\TEMPOR~1\content.IE5

--------------------\\ Fin du rapport a 16:18:12
0
Leahkim Messages postés 3079 Date d'inscription jeudi 15 novembre 2007 Statut Membre Dernière intervention 2 mars 2014 278
19 août 2008 à 17:00
c'est un scan de quoi ?

tu n'as pas un scan de hijackthis ?
0
jlpjlp Messages postés 51580 Date d'inscription vendredi 18 mai 2007 Statut Contributeur sécurité Dernière intervention 3 mai 2022 5 040
19 août 2008 à 17:03
navilog est specialisé pour virer les rootkit entrainant des pubs, plantages...


__________________________

lop Sd vire les infections de type LOP/CID responsable de pubs
0
Leahkim Messages postés 3079 Date d'inscription jeudi 15 novembre 2007 Statut Membre Dernière intervention 2 mars 2014 278 > jlpjlp Messages postés 51580 Date d'inscription vendredi 18 mai 2007 Statut Contributeur sécurité Dernière intervention 3 mai 2022
19 août 2008 à 17:06
merci jlp je ne savais pas
0
jlpjlp Messages postés 51580 Date d'inscription vendredi 18 mai 2007 Statut Contributeur sécurité Dernière intervention 3 mai 2022 5 040
19 août 2008 à 17:01
ok
relance navilog et choisi l'option 2 et colles le rapport
_____________


relance toolbar et choisi l'option 2 et colles le rapport


_____________

recolles un nouveau hijackthis et dis tes soucis actuels
0
voilà :

Clean Navipromo version 3.6.4 commencé le 19/08/2008 à 17:07:43,57

Outil exécuté depuis C:\Program Files\navilog1
Session actuelle : "Jérôme Labracherie"

Mise à jour le 16.08.2008 à 22h00 par IL-MAFIOSO


Microsoft Windows XP [version 5.1.2600]
Internet Explorer : 7.0.5730.11
Système de fichiers : NTFS

Mode suppression automatique
avec prise en charge résultats Catchme et GNS


Nettoyage exécuté au redémarrage de l'ordinateur

*** Creation backups fichiers trouvés par Catchme ***

Copie vers "C:\Program Files\navilog1\Backupnavi"

Copie C:\WINDOWS\system32\miqeaqq.dat réalisée avec succès !
Copie C:\WINDOWS\system32\miqeaqq.exe réalisée avec succès !
Copie C:\WINDOWS\system32\miqeaqq_nav.dat réalisée avec succès !
Copie C:\WINDOWS\system32\miqeaqq_navps.dat réalisée avec succès !
Copie C:\WINDOWS\system32\miqeaqq_navup.dat réalisée avec succès !

*** Suppression des fichiers trouvés avec Catchme ***

C:\WINDOWS\system32\miqeaqq.dat supprimé !
C:\WINDOWS\system32\miqeaqq.exe supprimé !
C:\WINDOWS\system32\miqeaqq_nav.dat supprimé !
C:\WINDOWS\system32\miqeaqq_navps.dat supprimé !
C:\WINDOWS\system32\miqeaqq_navup.dat supprimé !

** 2ème passage avec résultats Catchme **

* Dans "C:\WINDOWS\system32" *


C:\WINDOWS\prefetch\miqeaqq*.pf trouvé !
Copie C:\WINDOWS\prefetch\miqeaqq*.pf réalisée avec succès !
C:\WINDOWS\prefetch\miqeaqq*.pf supprimé !


* Dans "C:\Documents and Settings\Jérôme Labracherie\locals~1\applic~1" *



*** Suppression avec sauvegardes résultats GenericNaviSearch ***

* Suppression dans "C:\WINDOWS\System32" *


* Suppression dans "C:\Documents and Settings\Jérôme Labracherie\locals~1\applic~1" *


* Suppression dans "C:\DOCUME~1\GUYLAB~1\locals~1\applic~1" *

* Suppression dans "C:\DOCUME~1\JRMELA~2\locals~1\applic~1" *


*** Suppression dossiers dans "C:\WINDOWS" ***


*** Suppression dossiers dans "C:\Program Files" ***


*** Suppression dossiers dans "C:\Documents and Settings\All Users\menudm~1\progra~1" ***


*** Suppression dossiers dans "C:\Documents and Settings\All Users\menudm~1" ***


*** Suppression dossiers dans "c:\docume~1\alluse~1\applic~1" ***


*** Suppression dossiers dans "C:\Documents and Settings\Jérôme Labracherie\applic~1" ***


*** Suppression dossiers dans "C:\DOCUME~1\GUYLAB~1\applic~1" ***


*** Suppression dossiers dans "C:\DOCUME~1\PROPRI~1\applic~1" ***


*** Suppression dossiers dans "C:\Documents and Settings\Jérôme Labracherie\locals~1\applic~1" ***


*** Suppression dossiers dans "C:\DOCUME~1\GUYLAB~1\locals~1\applic~1" ***


*** Suppression dossiers dans "C:\DOCUME~1\JRMELA~2\locals~1\applic~1" ***


*** Suppression dossiers dans "C:\Documents and Settings\Jérôme Labracherie\menudm~1\progra~1" ***


*** Suppression dossiers dans "C:\DOCUME~1\GUYLAB~1\menudm~1\progra~1" ***



*** Suppression fichiers ***

C:\Documents and Settings\J‚r“me Labracherie\locals~1\Temp\pack.epk supprimé !
C:\WINDOWS\Downloaded Program Files\egaccess4.inf supprimé !
C:\WINDOWS\Downloaded Program Files\IaLdr32.inf supprimé !
C:\WINDOWS\system32\msclock32.dll supprimé !
C:\WINDOWS\system32\msplock32.dll supprimé !

*** Suppression fichiers temporaires ***

Nettoyage contenu C:\WINDOWS\Temp effectué !
Nettoyage contenu C:\Documents and Settings\J‚r“me Labracherie\locals~1\Temp effectué !

*** Traitement Recherche complémentaire ***
(Recherche fichiers spécifiques)

1)Suppression avec sauvegardes nouveaux fichiers Instant Access :

2)Recherche, création sauvegardes et suppression Heuristique :


* Dans "C:\WINDOWS\system32" *


zuweoirfmy.dat trouvé !
Copie zuweoirfmy.dat réalisée avec succès !
zuweoirfmy.dat supprimé !

zuweoirfmy_nav.dat trouvé !
Copie zuweoirfmy_nav.dat réalisée avec succès !
zuweoirfmy_nav.dat supprimé !

zuweoirfmy_navps.dat trouvé !
Copie zuweoirfmy_navps.dat réalisée avec succès !
zuweoirfmy_navps.dat supprimé !


* Dans "C:\Documents and Settings\Jérôme Labracherie\locals~1\applic~1" *


* Dans "C:\DOCUME~1\GUYLAB~1\locals~1\applic~1" *


* Dans "C:\DOCUME~1\JRMELA~2\locals~1\applic~1" *


*** Sauvegarde du Registre vers dossier Safebackup ***

sauvegarde du Registre réalisée avec succès !

*** Nettoyage Registre ***

Nettoyage Registre Ok


*** Certificats ***

Certificat Egroup supprimé !
Certificat Electronic-Group absent !
Certificat Montorgueil absent !
Certificat OOO-Favorit absent !
Certificat Sunny-Day-Design-Ltdt absent !

*** Nettoyage terminé le 19/08/2008 à 17:20:32,98 ***



----------------------------------------------------------------------------------------------------------------------------------------

--------------------\\ Lop S&D 4.2.3-1 XP/Vista

Microsoft Windows XP Édition familiale ( v5.1.2600 ) Service Pack 2
X86-based PC ( Uniprocessor Free : AMD Athlon(tm) XP 3000+ )
Phoenix - AwardBIOS v6.00PG
BOOT : Normal boot

"C:\Lop SD" ( MAJ : 19-08-2008|02:08 )
Option : [2] ( 19/08/2008|17:23 )


\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\ SUPPRESSION

Supprime! - C:\DOCUME~1\JRMELA~1\Cookies\jérôme_labracherie@fr.thepimps.bigpoint[1].txt

\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\


--------------------\\ Listing des dossiers dans APPLIC~1

[15/02/2008|21:46] C:\DOCUME~1\ALLUSE~1\APPLIC~1\.zreglib
[01/12/2005|11:31] C:\DOCUME~1\ALLUSE~1\APPLIC~1\Adobe
[13/11/2007|19:43] C:\DOCUME~1\ALLUSE~1\APPLIC~1\AOL
[13/11/2007|19:36] C:\DOCUME~1\ALLUSE~1\APPLIC~1\AOL Downloads
[15/02/2008|21:46] C:\DOCUME~1\ALLUSE~1\APPLIC~1\Elaborate Bytes
[06/05/2008|10:58] C:\DOCUME~1\ALLUSE~1\APPLIC~1\F-Secure
[06/05/2008|10:56] C:\DOCUME~1\ALLUSE~1\APPLIC~1\fssg
[26/02/2007|20:02] C:\DOCUME~1\ALLUSE~1\APPLIC~1\Google
[09/02/2005|16:23] C:\DOCUME~1\ALLUSE~1\APPLIC~1\Hewlett-Packard
[13/11/2007|19:44] C:\DOCUME~1\ALLUSE~1\APPLIC~1\Macromedia
[17/08/2008|10:56] C:\DOCUME~1\ALLUSE~1\APPLIC~1\Malwarebytes
[09/12/2006|02:58] C:\DOCUME~1\ALLUSE~1\APPLIC~1\Messenger Plus!
[11/05/2008|01:43] C:\DOCUME~1\ALLUSE~1\APPLIC~1\Microsoft
[05/01/2006|18:46] C:\DOCUME~1\ALLUSE~1\APPLIC~1\OD2
[03/11/2005|21:26] C:\DOCUME~1\ALLUSE~1\APPLIC~1\QuickTime
[16/08/2004|19:28] C:\DOCUME~1\ALLUSE~1\APPLIC~1\SBSI
[15/02/2008|21:39] C:\DOCUME~1\ALLUSE~1\APPLIC~1\SlySoft
[05/05/2006|13:07] C:\DOCUME~1\ALLUSE~1\APPLIC~1\Ulead Systems
[01/07/2006|09:08] C:\DOCUME~1\ALLUSE~1\APPLIC~1\Windows Genuine Advantage
[06/12/2005|09:34] C:\DOCUME~1\ALLUSE~1\APPLIC~1\Yahoo! Companion


[01/12/2007|04:01] C:\DOCUME~1\DEFAUL~1\APPLIC~1\Microsoft
[22/10/2005|20:17] C:\DOCUME~1\DEFAUL~1\APPLIC~1\Real
[02/11/2004|07:14] C:\DOCUME~1\DEFAUL~1\APPLIC~1\Sun
[02/11/2004|07:22] C:\DOCUME~1\DEFAUL~1\APPLIC~1\Symantec


[06/10/2007|16:12] C:\DOCUME~1\GUYLAB~1\APPLIC~1\Adobe
[06/10/2007|16:13] C:\DOCUME~1\GUYLAB~1\APPLIC~1\AdobeUM
[10/12/2007|18:33] C:\DOCUME~1\GUYLAB~1\APPLIC~1\AOL
[01/12/2007|17:03] C:\DOCUME~1\GUYLAB~1\APPLIC~1\Google
[27/12/2004|17:55] C:\DOCUME~1\GUYLAB~1\APPLIC~1\Macromedia
[24/01/2008|22:21] C:\DOCUME~1\GUYLAB~1\APPLIC~1\Microsoft
[22/10/2005|20:17] C:\DOCUME~1\GUYLAB~1\APPLIC~1\Real
[06/01/2008|16:42] C:\DOCUME~1\GUYLAB~1\APPLIC~1\SlySoft
[02/11/2004|07:14] C:\DOCUME~1\GUYLAB~1\APPLIC~1\Sun
[02/11/2004|07:22] C:\DOCUME~1\GUYLAB~1\APPLIC~1\Symantec
[27/12/2004|17:20] C:\DOCUME~1\GUYLAB~1\APPLIC~1\Template
[21/07/2006|07:36] C:\DOCUME~1\GUYLAB~1\APPLIC~1\Ulead Systems


[29/01/2008|01:42] C:\DOCUME~1\JRMELA~1\APPLIC~1\Adobe
[01/12/2005|11:32] C:\DOCUME~1\JRMELA~1\APPLIC~1\AdobeUM
[27/12/2004|18:03] C:\DOCUME~1\JRMELA~1\APPLIC~1\AOL
[20/11/2007|10:49] C:\DOCUME~1\JRMELA~1\APPLIC~1\ArcSoft
[19/12/2005|20:25] C:\DOCUME~1\JRMELA~1\APPLIC~1\CyberLink
[21/06/2008|19:24] C:\DOCUME~1\JRMELA~1\APPLIC~1\fltk.org
[15/06/2008|18:15] C:\DOCUME~1\JRMELA~1\APPLIC~1\F-Secure
[26/02/2007|20:05] C:\DOCUME~1\JRMELA~1\APPLIC~1\Google
[15/08/2008|10:32] C:\DOCUME~1\JRMELA~1\APPLIC~1\Hamachi
[09/11/2006|21:31] C:\DOCUME~1\JRMELA~1\APPLIC~1\Help
[01/10/2007|16:38] C:\DOCUME~1\JRMELA~1\APPLIC~1\InstallShield
[31/12/2004|13:58] C:\DOCUME~1\JRMELA~1\APPLIC~1\Leadertech
[28/12/2004|21:42] C:\DOCUME~1\JRMELA~1\APPLIC~1\Macromedia
[17/08/2008|10:56] C:\DOCUME~1\JRMELA~1\APPLIC~1\Malwarebytes
[03/04/2008|13:08] C:\DOCUME~1\JRMELA~1\APPLIC~1\Microsoft
[31/12/2004|14:21] C:\DOCUME~1\JRMELA~1\APPLIC~1\MSNInstaller
[25/08/2005|17:15] C:\DOCUME~1\JRMELA~1\APPLIC~1\OD2
[14/10/2007|15:32] C:\DOCUME~1\JRMELA~1\APPLIC~1\Playwize
[01/10/2007|16:38] C:\DOCUME~1\JRMELA~1\APPLIC~1\Pokerwize
[22/10/2005|20:17] C:\DOCUME~1\JRMELA~1\APPLIC~1\Real
[19/04/2008|16:59] C:\DOCUME~1\JRMELA~1\APPLIC~1\Roxio
[26/07/2007|15:02] C:\DOCUME~1\JRMELA~1\APPLIC~1\SlySoft
[31/12/2004|13:59] C:\DOCUME~1\JRMELA~1\APPLIC~1\Sonic
[02/11/2004|07:14] C:\DOCUME~1\JRMELA~1\APPLIC~1\Sun
[02/11/2004|07:22] C:\DOCUME~1\JRMELA~1\APPLIC~1\Symantec
[27/12/2004|16:30] C:\DOCUME~1\JRMELA~1\APPLIC~1\Template
[05/05/2006|21:41] C:\DOCUME~1\JRMELA~1\APPLIC~1\Ulead Systems


[11/05/2008|22:48] C:\DOCUME~1\LOCALS~1\APPLIC~1\Microsoft

[01/12/2007|04:00] C:\DOCUME~1\NETWOR~1\APPLIC~1\Microsoft
[06/06/2006|15:42] C:\DOCUME~1\NETWOR~1\APPLIC~1\Symantec

[27/12/2004|15:54] C:\DOCUME~1\PROPRI~1\APPLIC~1\You've Got Pictures Screensaver

--------------------\\ Tâches planifiées dans C:\WINDOWS\tasks

[19/08/2008 02:01][--a------] C:\WINDOWS\tasks\Scheduled scanning task.job
[19/08/2008 17:14][--ah-----] C:\WINDOWS\tasks\SA.DAT
[05/08/2004 15:00][-r-h-----] C:\WINDOWS\tasks\desktop.ini

--------------------\\ Listing des dossiers dans C:\Program Files

[22/05/2007|01:02] C:\Program Files\7-Zip
[01/12/2005|11:29] C:\Program Files\Adobe
[10/08/2006|13:41] C:\Program Files\ADS Tech
[23/08/2006|12:54] C:\Program Files\Ahead
[24/01/2005|17:29] C:\Program Files\alzip.exe
[19/11/2007|15:18] C:\Program Files\AnmSMP
[20/11/2007|10:38] C:\Program Files\ArcSoft
[24/01/2006|18:04] C:\Program Files\Canon
[10/08/2008|02:44] C:\Program Files\Championship Manager 00-01
[16/08/2004|19:05] C:\Program Files\ComPlus Applications
[13/01/2006|20:29] C:\Program Files\Creative
[28/02/2007|18:46] C:\Program Files\Cyanide
[02/11/2004|07:25] C:\Program Files\CyberLink
[05/01/2005|15:08] C:\Program Files\directx
[17/01/2005|15:49] C:\Program Files\Eidos
[21/01/2005|12:37] C:\Program Files\Elaborate Bytes
[24/01/2005|17:45] C:\Program Files\ESTsoft
[26/12/2007|03:31] C:\Program Files\Everest Poker
[13/05/2008|08:42] C:\Program Files\Every Toolbar 1.1
[20/06/2005|21:53] C:\Program Files\fdjeux
[11/05/2008|21:11] C:\Program Files\Fichiers communs
[14/01/2005|21:52] C:\Program Files\FpFrance Utilities
[26/02/2007|20:04] C:\Program Files\Google
[09/02/2005|16:23] C:\Program Files\Hewlett-Packard
[16/08/2005|12:19] C:\Program Files\HP
[30/06/2006|10:45] C:\Program Files\Install_Messenger.exe
[19/04/2008|17:14] C:\Program Files\InstallShield Installation Information
[15/08/2008|12:08] C:\Program Files\Internet Explorer
[17/07/2008|21:23] C:\Program Files\Java
[08/01/2005|12:31] C:\Program Files\JVTorrent
[23/12/2006|00:27] C:\Program Files\KONAMI
[02/11/2004|07:20] C:\Program Files\Learn2.com
[17/08/2008|10:56] C:\Program Files\Malwarebytes' Anti-Malware
[24/11/2007|19:03] C:\Program Files\Masks
[15/08/2008|11:25] C:\Program Files\Messenger
[10/06/2008|20:45] C:\Program Files\Messenger Plus! Live
[16/08/2004|19:11] C:\Program Files\microsoft frontpage
[26/05/2005|15:00] C:\Program Files\microsoft office
[08/01/2005|14:17] C:\Program Files\Microsoft Works
[02/11/2004|07:29] C:\Program Files\Microsoft.NET
[15/01/2008|08:13] C:\Program Files\MioNet
[16/08/2004|19:06] C:\Program Files\Movie Maker
[22/08/2006|13:31] C:\Program Files\MsgPlusLive-401.exe
[31/12/2004|14:20] C:\Program Files\MSN
[02/01/2005|14:34] C:\Program Files\MSN Apps
[16/08/2004|19:03] C:\Program Files\MSN Gaming Zone
[15/01/2008|18:36] C:\Program Files\MSN Messenger
[16/11/2006|04:02] C:\Program Files\MSXML 4.0
[25/08/2005|16:14] C:\Program Files\Music Manager
[19/08/2008|17:20] C:\Program Files\Navilog1
[16/08/2004|19:06] C:\Program Files\NetMeeting
[26/10/2007|17:18] C:\Program Files\Neuf
[16/08/2004|19:03] C:\Program Files\Online Services
[14/06/2007|03:03] C:\Program Files\Outlook Express
[16/08/2005|12:45] C:\Program Files\Overland
[07/05/2008|15:46] C:\Program Files\Pack Securite
[06/03/2008|18:22] C:\Program Files\Panicware
[01/10/2007|16:39] C:\Program Files\PartoucheWize
[24/11/2007|19:03] C:\Program Files\Patterns
[09/02/2005|17:01] C:\Program Files\pe7.exe
[23/08/2006|12:52] C:\Program Files\Philips
[24/11/2007|18:36] C:\Program Files\PhotoFiltre.zip
[24/11/2007|19:03] C:\Program Files\Plugins
[25/03/2005|13:37] C:\Program Files\Pochette Express 2
[02/11/2004|07:20] C:\Program Files\QuickTime
[16/07/2007|09:21] C:\Program Files\QuickZip
[24/01/2005|17:41] C:\Program Files\quickzip.exe
[02/11/2004|07:20] C:\Program Files\Real
[19/04/2008|16:46] C:\Program Files\Roxio
[24/11/2007|19:03] C:\Program Files\Selections
[16/08/2004|19:07] C:\Program Files\Services en ligne
[21/01/2005|15:04] C:\Program Files\SetupAnyDVD4551.exe
[15/03/2005|14:44] C:\Program Files\SetupAnyDVD4612.exe
[21/03/2005|18:47] C:\Program Files\SetupAnyDVD4631.exe
[21/01/2005|12:21] C:\Program Files\SetupCloneDVD2Slysoft.exe
[27/05/2005|10:04] C:\Program Files\SlySoft
[02/11/2004|07:31] C:\Program Files\Sonic
[20/07/2008|23:52] C:\Program Files\SopCast
[17/07/2008|21:26] C:\Program Files\Sun
[27/12/2004|17:36] C:\Program Files\TechCity Solutions
[18/08/2008|13:34] C:\Program Files\Trend Micro
[05/05/2006|21:39] C:\Program Files\Ulead Systems
[16/08/2004|19:19] C:\Program Files\Uninstall Information
[07/01/2006|22:50] C:\Program Files\WebCamMobileDrvsV1_01.EXE
[20/11/2007|14:12] C:\Program Files\Windows Live
[11/05/2008|01:43] C:\Program Files\Windows Media Connect 2
[11/05/2008|01:57] C:\Program Files\Windows Media Player
[16/08/2004|19:03] C:\Program Files\Windows NT
[16/08/2004|19:07] C:\Program Files\WindowsUpdate
[16/08/2004|19:11] C:\Program Files\xerox
[06/12/2005|09:34] C:\Program Files\Yahoo!

--------------------\\ Listing des dossiers dans C:\Program Files\Fichiers communs

[19/04/2008|16:46] C:\Program Files\Fichiers communs\Adaptec Shared
[04/01/2005|19:59] C:\Program Files\Fichiers communs\Adobe
[23/08/2006|12:54] C:\Program Files\Fichiers communs\Ahead
[13/11/2007|19:52] C:\Program Files\Fichiers communs\AOL
[27/12/2004|17:39] C:\Program Files\Fichiers communs\aolback
[13/11/2007|19:43] C:\Program Files\Fichiers communs\aolshare
[02/11/2004|07:29] C:\Program Files\Fichiers communs\DESIGNER
[09/02/2005|16:21] C:\Program Files\Fichiers communs\Hewlett-Packard
[09/02/2005|16:24] C:\Program Files\Fichiers communs\HP
[05/05/2006|13:06] C:\Program Files\Fichiers communs\InstallShield
[02/11/2004|07:14] C:\Program Files\Fichiers communs\Java
[30/06/2006|10:49] C:\Program Files\Fichiers communs\Microsoft Shared
[16/08/2004|19:06] C:\Program Files\Fichiers communs\MSSoap
[02/11/2004|07:20] C:\Program Files\Fichiers communs\Nullsoft
[16/08/2004|18:57] C:\Program Files\Fichiers communs\ODBC
[02/11/2004|07:26] C:\Program Files\Fichiers communs\Real
[19/04/2008|16:47] C:\Program Files\Fichiers communs\Roxio Shared
[16/08/2004|19:06] C:\Program Files\Fichiers communs\Services
[02/11/2004|07:31] C:\Program Files\Fichiers communs\Sonic Shared
[16/08/2004|18:56] C:\Program Files\Fichiers communs\SpeechEngines
[02/11/2004|07:26] C:\Program Files\Fichiers communs\SureThing Shared
[13/05/2008|08:40] C:\Program Files\Fichiers communs\Symantec Shared
[14/06/2007|03:03] C:\Program Files\Fichiers communs\System
[05/05/2006|21:39] C:\Program Files\Fichiers communs\Ulead Systems
[02/11/2004|07:26] C:\Program Files\Fichiers communs\xing shared

--------------------\\ Process

( 62 Processus )

... OK !

--------------------\\ Recherche avec S_Lop

Aucun fichier / dossier Lop trouvé !

--------------------\\ Recherche de Fichiers / Dossiers Lop

Aucun fichier / dossier Lop trouvé !

--------------------\\ Verification du Registre

..... OK !

--------------------\\ Verification du fichier Hosts

Fichier Hosts PROPRE


--------------------\\ Recherche de fichiers avec Catchme

catchme 0.3.1353 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2008-08-19 17:26:45
Windows 5.1.2600 Service Pack 2 NTFS
scanning hidden processes ...
scanning hidden files ...
scan completed successfully
hidden processes: 0
hidden files: 0

--------------------\\ Recherche d'autres infections


Aucune autre infection trouvée !

[F:4][D:1]-> C:\DOCUME~1\JRMELA~1\LOCALS~1\Temp
[F:220][D:0]-> C:\DOCUME~1\JRMELA~1\Cookies
[F:11635][D:16]-> C:\DOCUME~1\JRMELA~1\LOCALS~1\TEMPOR~1\content.IE5

--------------------\\ Fin du rapport a 17:29:29


Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 17:30:15, on 19/08/2008
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v7.00 (7.00.6000.16705)
Boot mode: Normal

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\PROGRA~1\FICHIE~1\AOL\ACS\AOLacsd.exe
C:\Program Files\Pack Securite\Anti-Virus\fsgk32st.exe
C:\Program Files\Pack Securite\Anti-Virus\FSGK32.EXE
C:\Program Files\Pack Securite\Common\FSMA32.EXE
C:\Program Files\MioNet\MioNetManager.exe
C:\Program Files\Pack Securite\Common\FSMB32.EXE
C:\Program Files\Pack Securite\Common\FCH32.EXE
C:\WINDOWS\system32\HPZipm12.exe
C:\WINDOWS\system32\slserv.exe
C:\WINDOWS\system32\svchost.exe
C:\Program Files\MioNet\jvm\bin\MioNet.exe
C:\WINDOWS\wanmpsvc.exe
C:\Program Files\Pack Securite\Common\FAMEH32.EXE
C:\Program Files\Pack Securite\Anti-Virus\fsqh.exe
C:\Program Files\Pack Securite\FSAUA\program\fsaua.exe
C:\Program Files\Pack Securite\Anti-Virus\fssm32.exe
C:\Program Files\Pack Securite\FWES\Program\fsdfwd.exe
C:\Program Files\Pack Securite\FSAUA\program\fsus.exe
C:\Program Files\Pack Securite\Anti-Virus\fsav32.exe
C:\WINDOWS\NOTEPAD.EXE
C:\WINDOWS\SOUNDMAN.EXE
C:\ATI Technologies\ATI Control Panel\atiptaxx.exe
C:\Program Files\Java\jre1.6.0_07\bin\jusched.exe
C:\Apps\Powercinema\PCMService.exe
C:\PROGRA~1\TECHCI~1\AOLSAV\AOLAgent.exe
C:\WINDOWS\System32\svchost.exe
C:\Program Files\Fichiers communs\AOL\ACS\AOLDial.exe
C:\Program Files\Fichiers communs\Real\Update_OB\realsched.exe
C:\Program Files\SlySoft\CloneCD\CloneCDTray.exe
C:\Program Files\HP\HP Software Update\HPWuSchd2.exe
C:\Program Files\Ulead Systems\Ulead InstaMedia 2.0\Monitor.exe
C:\Program Files\Ulead Systems\Ulead InstaMedia 2.0\RMC.exe
C:\WINDOWS\VM_STI.EXE
C:\Program Files\QuickTime\qttask.exe
C:\Program Files\Fichiers communs\AOL\1194975627\ee\AOLSoftware.exe
C:\Program Files\Pack Securite\Common\FSM32.EXE
C:\Program Files\MSN Messenger\MsnMsgr.Exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\SlySoft\AnyDVD\AnyDVDtray.exe
C:\Program Files\Pack Securite\FSGUI\fsguidll.exe
C:\PROGRA~1\PANICW~1\POP-UP~1\PSFree.exe
C:\Program Files\HP\Digital Imaging\bin\hpqtra08.exe
C:\Program Files\Philips\SPC 200NC PC Camera\TrayMin200.exe
C:\Program Files\HP\Digital Imaging\bin\hpqgalry.exe
C:\WINDOWS\explorer.exe
C:\WINDOWS\system32\NOTEPAD.EXE
C:\Program Files\Trend Micro\HijackThis\HijackThis.exe

R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Bar = https://actus.sfr.fr
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://home.neuf.fr/
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = https://www.msn.com/fr-fr/?ocid=iehp
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = https://www.bing.com/?toHttps=1&redig=5FC791212101479BAFBE1A679848B1AF
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = https://www.msn.com/fr-fr/?ocid=iehp
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Window Title = Packard Bell
R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName = Liens
R3 - URLSearchHook: {EA551C00-2AE5-11d3-8592-00A0C98E9EA4} - - (no file)
O2 - BHO: Yahoo! Toolbar Helper - {02478D38-C3F9-4EFB-9B51-7695ECA05670} - C:\Program Files\Yahoo!\Companion\Installs\cpn\yt.dll
O2 - BHO: AcroIEHlprObj Class - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 7.0\ActiveX\AcroIEHelper.dll
O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre1.6.0_07\bin\ssv.dll
O2 - BHO: (no name) - {7E853D72-626A-48EC-A868-BA8D5E23E045} - (no file)
O2 - BHO: Windows Live Sign-in Helper - {9030D464-4C02-4ABF-8ECC-5164760863C6} - C:\Program Files\Fichiers communs\Microsoft Shared\Windows Live\WindowsLiveLogin.dll
O2 - BHO: ST - {9394EDE7-C8B5-483E-8773-474BF36AF6E4} - C:\Program Files\MSN Apps\ST\01.03.0000.1005\en-xu\stmain.dll
O2 - BHO: Google Toolbar Helper - {AA58ED58-01DD-4d91-8333-CF10577473F7} - c:\program files\google\googletoolbar2.dll
O2 - BHO: MSNToolBandBHO - {BDBD1DAD-C946-4A17-ADC1-64B5B4FF55D0} - C:\Program Files\MSN Apps\MSN Toolbar\MSN Toolbar\01.02.5000.1021\fr\msntb.dll
O3 - Toolbar: AOL Toolbar - {4982D40A-C53B-4615-B15B-B5B5E98D167C} - C:\Program Files\AOL Toolbar\toolbar.dll (file missing)
O3 - Toolbar: MSN - {BDAD1DAD-C946-4A17-ADC1-64B5B4FF55D0} - C:\Program Files\MSN Apps\MSN Toolbar\MSN Toolbar\01.02.5000.1021\fr\msntb.dll
O3 - Toolbar: Yahoo! Toolbar - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - C:\Program Files\Yahoo!\Companion\Installs\cpn\yt.dll
O3 - Toolbar: &Google - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - c:\program files\google\googletoolbar2.dll
O4 - HKLM\..\Run: [IMJPMIG8.1] "C:\WINDOWS\IME\imjp8_1\IMJPMIG.EXE" /Spoil /RemAdvDef /Migration32
O4 - HKLM\..\Run: [PHIME2002ASync] C:\WINDOWS\system32\IME\TINTLGNT\TINTSETP.EXE /SYNC
O4 - HKLM\..\Run: [PHIME2002A] C:\WINDOWS\system32\IME\TINTLGNT\TINTSETP.EXE /IMEName
O4 - HKLM\..\Run: [SoundMan] SOUNDMAN.EXE
O4 - HKLM\..\Run: [ATIPTA] C:\ATI Technologies\ATI Control Panel\atiptaxx.exe
O4 - HKLM\..\Run: [SunJavaUpdateSched] "C:\Program Files\Java\jre1.6.0_07\bin\jusched.exe"
O4 - HKLM\..\Run: [PCMService] "c:\Apps\Powercinema\PCMService.exe"
O4 - HKLM\..\Run: [AOLSAV] C:\PROGRA~1\TECHCI~1\AOLSAV\AOLAgent.exe
O4 - HKLM\..\Run: [AOLDialer] C:\Program Files\Fichiers communs\AOL\ACS\AOLDial.exe
O4 - HKLM\..\Run: [TkBellExe] "C:\Program Files\Fichiers communs\Real\Update_OB\realsched.exe" -osboot
O4 - HKLM\..\Run: [HP Component Manager] "C:\Program Files\HP\hpcoretech\hpcmpmgr.exe"
O4 - HKLM\..\Run: [CloneCDTray] "C:\Program Files\SlySoft\CloneCD\CloneCDTray.exe" /s
O4 - HKLM\..\Run: [HP Software Update] C:\Program Files\HP\HP Software Update\HPWuSchd2.exe
O4 - HKLM\..\Run: [Matchlock Scheduling] C:\Program Files\Ulead Systems\Ulead InstaMedia 2.0\Monitor.exe
O4 - HKLM\..\Run: [Ulead Remote Control Center] C:\Program Files\Ulead Systems\Ulead InstaMedia 2.0\RMC.exe
O4 - HKLM\..\Run: [BigDogPath] C:\WINDOWS\VM_STI.EXE Philips SPC 200NC PC Camera
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
O4 - HKLM\..\Run: [HostManager] C:\Program Files\Fichiers communs\AOL\1194975627\ee\AOLSoftware.exe
O4 - HKLM\..\Run: [F-Secure Manager] "C:\Program Files\Pack Securite\Common\FSM32.EXE" /splash
O4 - HKLM\..\Run: [F-Secure TNB] "C:\Program Files\Pack Securite\FSGUI\TNBUtil.exe" /CHECKALL /WAITFORSW
O4 - HKCU\..\Run: [MsnMsgr] "C:\Program Files\MSN Messenger\MsnMsgr.Exe" /background
O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
O4 - HKCU\..\Run: [AnyDVD] C:\Program Files\SlySoft\AnyDVD\AnyDVDtray.exe
O4 - HKCU\..\Run: [PopUpStopperFreeEdition] "C:\PROGRA~1\PANICW~1\POP-UP~1\PSFree.exe"
O4 - HKUS\S-1-5-19\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'SERVICE LOCAL')
O4 - HKUS\S-1-5-20\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'SERVICE RÉSEAU')
O4 - HKUS\S-1-5-18\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'SYSTEM')
O4 - HKUS\.DEFAULT\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'Default user')
O4 - Global Startup: DTV Remote Control.lnk = C:\Program Files\ADS Tech\DVBT Utilities\ADSRMT.EXE
O4 - Global Startup: Démarrage rapide du logiciel HP Image Zone.lnk = C:\Program Files\HP\Digital Imaging\bin\hpqthb08.exe
O4 - Global Startup: HP Digital Imaging Monitor.lnk = C:\Program Files\HP\Digital Imaging\bin\hpqtra08.exe
O4 - Global Startup: Lancement rapide d'Adobe Reader.lnk = C:\Program Files\Adobe\Acrobat 7.0\Reader\reader_sl.exe
O4 - Global Startup: TrayMin300.exe.lnk = ?
O8 - Extra context menu item: E&xporter vers Microsoft Excel - res://C:\PROGRA~1\MICROS~3\OFFICE11\EXCEL.EXE/3000
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_07\bin\ssv.dll
O9 - Extra 'Tools' menuitem: Console Java (Sun) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_07\bin\ssv.dll
O9 - Extra button: AOL Toolbar - {4982D40A-C53B-4615-B15B-B5B5E98D167C} - C:\Program Files\AOL Toolbar\toolbar.dll (file missing)
O9 - Extra 'Tools' menuitem: AOL Toolbar - {4982D40A-C53B-4615-B15B-B5B5E98D167C} - C:\Program Files\AOL Toolbar\toolbar.dll (file missing)
O9 - Extra button: Recherche - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~3\OFFICE11\REFIEBAR.DLL
O9 - Extra button: Real.com - {CD67F990-D8E9-11d2-98FE-00C0F0318AFE} - C:\WINDOWS\system32\Shdocvw.dll
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O14 - IERESET.INF: START_PAGE_URL=file://C:\APPS\IE\offline\fr.htm
O16 - DPF: fdjeux - https://www.fdjeux.net/classes/fdjeux.cab
O16 - DPF: Interface Chat Wanadoo - http://chat7.x-echo.com/version6/Applet/wchatsign.cab
O16 - DPF: {00B71CFB-6864-4346-A978-C0A14556272C} (Checkers Class) - http://messenger.zone.msn.com/binary/msgrchkr.cab31267.cab
O16 - DPF: {1D6711C8-7154-40BB-8380-3DEA45B69CBF} -
O16 - DPF: {4D7F48C0-CB49-4EA6-97D4-04F4EACC2F3B} - http://sib1.od2.com/common/Member/ClientInstall/7.20.0003/OCI/setup.exe
O16 - DPF: {8E0D4DE5-3180-4024-A327-4DFAD1796A8D} (MessengerStatsClient Class) - http://messenger.zone.msn.com/binary/MessengerStatsClient.cab31267.cab
O16 - DPF: {B38870E4-7ECB-40DA-8C6A-595F0A5519FF} (MsnMessengerSetupDownloadControl Class) - http://messenger.msn.com/download/MsnMessengerSetupDownloader.cab
O16 - DPF: {C45B1500-7B63-47C2-AB25-C28CB46AFDEE} (M6music player) - http://sib1.od2.com/common/musicmanager/installation/MusicManagerPlugin.CAB
O16 - DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} (Shockwave Flash Object) - http://fpdownload2.macromedia.com/get/shockwave/cabs/flash/swflash.cab
O23 - Service: AOL Connectivity Service (AOL ACS) - AOL LLC - C:\PROGRA~1\FICHIE~1\AOL\ACS\AOLacsd.exe
O23 - Service: ATI Smart - Unknown owner - C:\WINDOWS\system32\ati2sgag.exe
O23 - Service: FSGKHS (F-Secure Gatekeeper Handler Starter) - F-Secure Corporation - C:\Program Files\Pack Securite\Anti-Virus\fsgk32st.exe
O23 - Service: F-Secure Automatic Update Agent (FSAUA) - F-Secure Corporation - C:\Program Files\Pack Securite\FSAUA\program\fsaua.exe
O23 - Service: F-Secure Anti-Virus Firewall Daemon (FSDFWD) - F-Secure Corporation - C:\Program Files\Pack Securite\FWES\Program\fsdfwd.exe
O23 - Service: F-Secure Management Agent (FSMA) - F-Secure Corporation - C:\Program Files\Pack Securite\Common\FSMA32.EXE
O23 - Service: Google Updater Service (gusvc) - Google - C:\Program Files\Google\Common\Google Updater\GoogleUpdaterService.exe
O23 - Service: MioNet Service (MioNet) - Unknown owner - C:\Program Files\MioNet\MioNetManager.exe
O23 - Service: MysqlInventime - Unknown owner - c:\mysql\bin\mysqld-nt.exe
O23 - Service: Pml Driver HPZ12 - HP - C:\WINDOWS\system32\HPZipm12.exe
O23 - Service: SmartLinkService (SLService) - - C:\WINDOWS\SYSTEM32\slserv.exe
O23 - Service: WAN Miniport (ATW) Service (WANMiniportService) - America Online, Inc. - C:\WINDOWS\wanmpsvc.exe
0
jlpjlp Messages postés 51580 Date d'inscription vendredi 18 mai 2007 Statut Contributeur sécurité Dernière intervention 3 mai 2022 5 040
19 août 2008 à 17:42
colle le rapport d'un scan en ligne
avec un des suivants:


bitdefender en ligne :
http://www.bitdefender.fr/scan_fr/scan8/ie.html

Panda en ligne :
http://pandasoftware.fr
0
en ce qui concerne les soucis, là ça semble aller bien, j'ai pas encore eu de fenetres que j'appelle peut-etre à tord "pop-up" et qui me pourrissent ma navigation d'habitude...
0
jlpjlp Messages postés 51580 Date d'inscription vendredi 18 mai 2007 Statut Contributeur sécurité Dernière intervention 3 mai 2022 5 040
19 août 2008 à 18:05
ok parfait

pour verifier et finir j'espere fais le message 16
0
j'ai lancé la recherche et je crois qu'il y en a pour petit moment, je vais laisser chercher tranquillement. un grand merci a toi Jlpjlp pour ton aide, idem pour leahkim. bonne soirée à vous si on se recroise pas. encore merci , vous etes super ;-)
0