BonjoUR,
J'ai un rapport sous la main .Qui peut me dire ce qu'il sous entend.
Voici le rapport.
***** TROJAN REMOVER HAS RESTARTED THE SYSTEM *****
26/08/2008 06:27:29: Trojan Remover has been restarted
C:\Program Files\NetMeeting\msmsgs - READ-ONLY, HIDDEN and SYSTEM file attributes removed
C:\Program Files\NetMeeting\msmsgs has been renamed to C:\Program Files\NetMeeting\msmsgs.vir
=======================================================
Removing the following registry keys:
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{64F56FC1-1272-44CD-BA6E-39723696E350} - already removed
HKCR\CLSID\{64F56FC1-1272-44CD-BA6E-39723696E350} - already removed
=======================================================
=======================================================
Deleting the following registry value(s):
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\[xydzyh] - already deleted
HKLM\SYSTEM\CurrentControlSet\Services\Indexingbox\[ImagePath] - already deleted
HKLM\SYSTEM\CurrentControlSet\Services\Office Source Engine Help\[ImagePath] - already deleted
=======================================================
26/08/2008 06:27:30: Trojan Remover closed
************************************************************
***** NORMAL SCAN FOR ACTIVE MALWARE *****
Trojan Remover Ver 6.7.2.2539. For information, email support@simplysup1.com
[Unregistered version]
Scan started at: 06:06:22 26 août 2008
Using Database v7112
Operating System: Windows XP SP2 [Windows XP Home Edition Service Pack 2 (Build 2600)]
File System: NTFS
Data directory: C:\Documents and Settings\NéPourDominé\Application Data\Simply Super Software\Trojan Remover\
Database directory: C:\Program Files\Trojan Remover\
Logfile directory: C:\Documents and Settings\NéPourDominé\Mes documents\Simply Super Software\Trojan Remover Logfiles\
Program directory: C:\Program Files\Trojan Remover\
Running with Administrator privileges
************************************************************
The following Anti-Malware program(s) are loaded:
Nortons Anti-Virus
The regfile\shell\open\command Registry Key appears to have been modified.
The current Registry entry is: regedit.exe "%1" %*.
This entry calls the following file:
C:\WINDOWS\regedit.exe
Trojan Remover has restored the Registry regfile\shell\open key.
--------------------
************************************************************
06:06:47: Scanning ----------WIN.INI-----------
WIN.INI found in C:\WINDOWS
************************************************************
06:06:47: Scanning --------SYSTEM.INI---------
SYSTEM.INI found in C:\WINDOWS
************************************************************
06:06:47: ----- SCANNING FOR ROOTKIT SERVICES -----
No hidden Services were detected.
************************************************************
06:06:50: Scanning -----WINDOWS REGISTRY-----
--------------------
Checking HKCU\SOFTWARE\Microsoft\Windows NT\CurrentVersion\WinLogon
--------------------
Checking HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\WinLogon
This key's "Shell" value calls the following program(s):
File: Explorer.exe
C:\WINDOWS\Explorer.exe
1037312 bytes
Created: 12/01/2000
Modified: 13/06/2007
Company: Microsoft Corporation
----------
This key's "Userinit" value calls the following program(s):
File: C:\WINDOWS\system32\userinit.exe
C:\WINDOWS\system32\userinit.exe
25088 bytes
Created: 12/01/2000
Modified: 19/08/2004
Company: Microsoft Corporation
----------
File: C:\WINDOWS\system32\winsys16_061230.dll
C:\WINDOWS\system32\winsys16_061230.dll - file renamed to: C:\WINDOWS\system32\winsys16_061230.dll.vir
----------
This key's "System" value appears to be blank
----------
This key's "UIHost" value calls the following program:
File: logonui.exe
C:\WINDOWS\system32\logonui.exe
515584 bytes
Created: 12/01/2000
Modified: 19/08/2004
Company: Microsoft Corporation
----------
--------------------
Checking HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows
--------------------
Checking HKCU\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows
Value Name: load
--------------------
Checking HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Value Name: hpsysdrv
Value Data: c:\windows\system\hpsysdrv.exe
c:\windows\system\hpsysdrv.exe
52736 bytes
Created: 22/05/2002
Modified: 07/05/1998
Company: Hewlett-Packard Company
--------------------
Value Name: KBD
Value Data: C:\HP\KBD\KBD.EXE
C:\HP\KBD\KBD.EXE
61440 bytes
Created: 22/05/2002
Modified: 06/07/2001
Company: Hewlett-Packard Company
--------------------
Value Name: Recguard
Value Data: C:\WINDOWS\SMINST\RECGUARD.EXE
C:\WINDOWS\SMINST\RECGUARD.EXE
212992 bytes
Created: 22/05/2002
Modified: 18/12/2001
Company:
--------------------
Value Name: dla
Value Data: C:\WINDOWS\system32\dla\tfswctrl.exe
C:\WINDOWS\system32\dla\tfswctrl.exe
102455 bytes
Created: 22/05/2002
Modified: 09/05/2002
Company: VERITAS Software, Inc.
--------------------
Value Name: IgfxTray
Value Data: C:\WINDOWS\System32\igfxtray.exe
C:\WINDOWS\System32\igfxtray.exe
155648 bytes
Created: 27/03/2002
Modified: 27/03/2002
Company: Intel Corporation
--------------------
Value Name: HotKeysCmds
Value Data: C:\WINDOWS\System32\hkcmd.exe
C:\WINDOWS\System32\hkcmd.exe
106496 bytes
Created: 27/03/2002
Modified: 27/03/2002
Company: Intel Corporation
--------------------
Value Name: PS2
Value Data: C:\WINDOWS\system32\ps2.exe
C:\WINDOWS\system32\ps2.exe
81920 bytes
Created: 22/05/2002
Modified: 03/07/2001
Company: Hewlett-Packard Company
--------------------
Value Name: NAV Agent
Value Data: c:\PROGRA~1\NORTON~1\navapw32.exe
c:\PROGRA~1\NORTON~1\navapw32.exe
75384 bytes
Created: 11/03/2002
Modified: 11/03/2002
Company: Symantec Corporation
--------------------
Value Name: Symantec NetDriver Monitor
Value Data: C:\PROGRA~1\SYMNET~1\SNDMon.exe
C:\PROGRA~1\SYMNET~1\SNDMon.exe
95960 bytes
Created: 12/01/2000
Modified: 12/01/2000
Company: Symantec Corporation
--------------------
Value Name: GPClientMonitor
Value Data: C:\Program Files\GalleryPlayer\Player\GPClientMonitor.exe
C:\Program Files\GalleryPlayer\Player\GPClientMonitor.exe
45056 bytes
Created: 06/08/2007
Modified: 06/08/2007
Company: GalleryPlayer, Inc.
--------------------
Value Name: GPDownloadManager
Value Data: C:\Program Files\GalleryPlayer\Player\GPDownloadManager.exe
C:\Program Files\GalleryPlayer\Player\GPDownloadManager.exe
163840 bytes
Created: 06/08/2007
Modified: 06/08/2007
Company: GalleryPlayer, Inc.
--------------------
Value Name: TkBellExe
Value Data: "C:\Program Files\Fichiers communs\Real\Update_OB\realsched.exe" -osboot
C:\Program Files\Fichiers communs\Real\Update_OB\realsched.exe
185896 bytes
Created: 29/01/2008
Modified: 03/02/2008
Company: RealNetworks, Inc.
--------------------
Value Name: EoEngine
Value Data:
Blank entry: []
--------------------
Value Name: EoWeather
Value Data:
Blank entry: []
--------------------
Value Name: ItsMedia
Value Data: "C:\Program Files\EoRezo\EoWeather\ItsEngine.exe"
C:\Program Files\EoRezo\EoWeather\ItsEngine.exe
1642496 bytes
Created: 07/02/2008
Modified: 11/07/2007
Company: Its Label
--------------------
Value Name: Adobe Reader Speed Launcher
Value Data: "C:\Program Files\Adobe\Reader 8.0\Reader\Reader_sl.exe"
C:\Program Files\Adobe\Reader 8.0\Reader\Reader_sl.exe
39792 bytes
Created: 11/01/2008
Modified: 11/01/2008
Company: Adobe Systems Incorporated
--------------------
Value Name: BluetoothAuthenticationAgent
Value Data: rundll32.exe bthprops.cpl,,BluetoothAuthenticationAgent
C:\WINDOWS\system32\bthprops.cpl
110592 bytes
Created: 15/01/2000
Modified: 19/08/2004
Company: Microsoft Corporation
--------------------
Value Name: xydzyh
Value Data: C:\WINDOWS\system32\xydzyh.exe
C:\WINDOWS\system32\xydzyh.exe
-HS- 86528 bytes
Created: 25/04/2008
Modified: 16/04/2008
Company:
C:\WINDOWS\system32\xydzyh.exe - this registry value has been removed
C:\WINDOWS\system32\xydzyh.exe - process is either not running or could not be terminated
C:\WINDOWS\system32\xydzyh.exe - HIDDEN and SYSTEM file attributes removed
C:\WINDOWS\system32\xydzyh.exe - file renamed to: C:\WINDOWS\system32\xydzyh.exe.vir
--------------------
Value Name: TrojanScanner
Value Data: C:\Program Files\Trojan Remover\Trjscan.exe /boot
C:\Program Files\Trojan Remover\Trjscan.exe
914512 bytes
Created: 26/08/2008
Modified: 19/08/2008
Company: Simply Super Software
--------------------
--------------------
Checking HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce
This Registry Key appears to be empty
--------------------
Checking HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnceEx
This Registry Key appears to be empty
--------------------
Checking HKCU\Software\Microsoft\Windows\CurrentVersion\Run
Value Name: MSMSGS
Value Data: "C:\Program Files\Messenger\msmsgs.exe" /background
C:\Program Files\Messenger\msmsgs.exe
1694208 bytes
Created: 10/05/2002
Modified: 13/10/2004
Company: Microsoft Corporation
--------------------
Value Name: Microsoft Works Update Detection
Value Data: C:\Program Files\Microsoft Works\WkDetect.exe
C:\Program Files\Microsoft Works\WkDetect.exe [file not found to scan]
--------------------
Value Name: swg
Value Data: C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe
C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe
68856 bytes
Created: 03/02/2008
Modified: 03/02/2008
Company: Google Inc.
--------------------
--------------------
Checking HKCU\Software\Microsoft\Windows\CurrentVersion\RunOnce
This Registry Key appears to be empty
************************************************************
06:12:45: Scanning -----SHELLEXECUTEHOOKS-----
ValueName: {AEB6717E-7E19-11d0-97EE-00C04FD91972}
File: shell32.dll - this file is expected and has been left in place
----------
************************************************************
06:12:45: Scanning -----HIDDEN REGISTRY ENTRIES-----
Taskdir check completed
----------
No Hidden File-loading Registry Entries found
----------
************************************************************
06:12:46: Scanning -----ACTIVE SCREENSAVER-----
No active ScreenSaver found to scan.
************************************************************
06:12:46: Scanning ----- REGISTRY ACTIVE SETUP KEYS -----
************************************************************
06:12:47: Scanning ----- SERVICEDLL REGISTRY KEYS -----
Key: AppMgmt
%SystemRoot%\System32\appmgmts.dll - file is globally excluded (file cannot be found)
--------------------
Key: BthServ
Path: %SystemRoot%\System32\bthserv.dll
C:\WINDOWS\System32\bthserv.dll
30208 bytes
Created: 15/01/2000
Modified: 19/08/2004
Company: Microsoft Corporation
--------------------
Key: HidServ
%SystemRoot%\System32\hidserv.dll - file is globally excluded (file cannot be found)
--------------------
************************************************************
06:19:47: Scanning ----- APPINIT_DLLS -----
The AppInit_DLLs value is blank
************************************************************
06:19:47: Scanning ----- SECURITY PROVIDER DLLS -----
DLL: msapsspc.dll schannel.dll digest.dll msnsspc.dll
msapsspc.dll schannel.dll digest.dll msnsspc.dll [file not found to scan]
----------
************************************************************
06:19:47: Scanning ------ USER STARTUP GROUPS ------
Checking Startup Group for All Users
[C:\WINDOWS\Profiles\All Users\Start Menu\Programs\StartUp]
No Startup files for All Users were located to check
************************************************************
06:19:47: Scanning ------ COMMON STARTUP GROUP ------
[C:\Documents and Settings\All Users\Menu Démarrer\Programmes\Démarrage]
The Common Startup Group attempts to load the following file(s) at boot time:
C:\Documents and Settings\All Users\Menu Démarrer\Programmes\Démarrage\desktop.ini
-HS- 84 bytes
Created: 10/05/2002
Modified: 10/05/2002
Company:
--------------------
C:\Program Files\hp center\137903\Program\BackWeb-137903.exe
16384 bytes
Created: 22/05/2002
Modified: 22/05/2002
Company:
hp center.lnk - links to C:\Program Files\hp center\137903\Program\BackWeb-137903.exe
--------------------
C:\Program Files\Google\Google Updater\GoogleUpdater.exe
125624 bytes
Created: 07/02/2008
Modified: 07/02/2008
Company: Google
Outil de mise à jour Google.lnk - links to C:\Program Files\Google\Google Updater\GoogleUpdater.exe
--------------------
C:\Program Files\SAGEM WiFi manager\WLANUTL.exe
950272 bytes
Created: 25/04/2008
Modified: 16/01/2007
Company:
Utilitaire réseau pour SAGEM Wi-Fi 11g USB adapter.lnk - links to C:\Program Files\SAGEM WiFi manager\WLANUTL.exe
--------------------
************************************************************
No User Startup Groups were located to check
************************************************************
06:19:48: Scanning ----- SCHEDULED TASKS -----
Taskname: Norton AntiVirus - Analyser mon ordinateur.job
File: c:\PROGRA~1\NORTON~1\NAVW32.exe
c:\PROGRA~1\NORTON~1\NAVW32.exe
87672 bytes
Created: 11/03/2002
Modified: 11/03/2002
Company: Symantec Corporation
Parameters: /task:C:\DOCUME~1\ALLUSE~1\APPLIC~1\Symantec\NORTON~1\Tasks\mycomp.sca
Next Run Time: 29/08/2008 20:00:00
Status: La tâche est prête à s'exécuter à l'heure prévue
Creator: Propriétaire
Comments: Il s'agit d'une tâche de programmation d'analyse de Norton AntiVirus.
----------
Taskname: Symantec NetDetect.job
File: C:\Program Files\Symantec\LiveUpdate\NDETECT.EXE
C:\Program Files\Symantec\LiveUpdate\NDETECT.EXE
99960 bytes
Created: 22/05/2002
Modified: 22/11/2001
Company: Symantec Corporation
Parameters: [blank]
Next Run Time: Never
Status: La tâche ne sera pas exécutée à l'heure prévue car elle a été désactivée
Creator: Propriétaire
Comments: Symantec NetDetect
----------
************************************************************
06:19:49: ----- ADDITIONAL CHECKS -----
PE386 rootkit checks completed
----------
Winlogon registry rootkit checks completed
----------
Heuristic checks for hidden files/drivers completed
----------
Layered Service Provider entries checks completed
----------
==============================
Restrictive Windows Explorer Policies found in force on this computer:
HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer
Value: SHOWALL\"CheckedValue"
All Policy Values listed have been removed
==============================
Windows Explorer Policies checks completed
----------
Checking for specific malicious files:
C:\WINDOWS\system32\kavo.exe - PWS.OnlineGames
C:\WINDOWS\system32\kavo.exe - process is either not running or could not be terminated
C:\WINDOWS\system32\kavo.exe - READ-ONLY, HIDDEN and SYSTEM file attributes removed
C:\WINDOWS\system32\kavo.exe - file renamed to: C:\WINDOWS\system32\kavo.exe.vir
----------
Desktop Wallpaper: c:\windows\web\wallpaper\info-800.bmp
c:\windows\web\wallpaper\info-800.bmp
481080 bytes
Created: 22/05/2002
Modified: 22/08/2001
Company:
----------
Web Desktop Wallpaper: %SystemRoot%\web\wallpaper\info-800.bmp
C:\WINDOWS\web\wallpaper\info-800.bmp
481080 bytes
Created: 22/05/2002
Modified: 22/08/2001
Company:
----------
Checking autorun.inf in C:\
C:\autorun.inf open entry: [m9as2c.cmd]
C:\m9as2c.cmd
-RHS- 109945 bytes
Created: 21/08/2008
Modified: 21/08/2008
Company:
----------
Checking autorun.inf in D:\
D:\autorun.inf open entry: [m9as2c.cmd]
D:\m9as2c.cmd
-RHS- 109945 bytes
Created: 21/08/2008
Modified: 21/08/2008
Company:
----------
--------------------
Additional checks completed
C:\WINDOWS\System32\smss.exe
[1 loaded module]
--------------------
C:\WINDOWS\system32\csrss.exe
[13 loaded modules in total]
--------------------
C:\WINDOWS\system32\winlogon.exe
[65 loaded modules in total]
--------------------
C:\WINDOWS\system32\services.exe
[25 loaded modules in total]
--------------------
C:\WINDOWS\system32\lsass.exe
[56 loaded modules in total]
--------------------
C:\WINDOWS\system32\svchost.exe
[47 loaded modules in total]
--------------------
C:\WINDOWS\system32\svchost.exe
[39 loaded modules in total]
--------------------
C:\WINDOWS\System32\svchost.exe
[150 loaded modules in total]
--------------------
C:\WINDOWS\system32\svchost.exe
[28 loaded modules in total]
--------------------
C:\WINDOWS\System32\svchost.exe
[30 loaded modules in total]
--------------------
C:\WINDOWS\System32\svchost.exe
[40 loaded modules in total]
--------------------
C:\WINDOWS\system32\LEXBCES.EXE
[25 loaded modules in total]
--------------------
C:\WINDOWS\system32\LEXPPS.EXE
[20 loaded modules in total]
--------------------
C:\WINDOWS\system32\spoolsv.exe
[60 loaded modules in total]
--------------------
C:\WINDOWS\system32\svchost.exe
[31 loaded modules in total]
--------------------
C:\Program Files\Google\Common\Google Updater\GoogleUpdaterService.exe
[23 loaded modules in total]
--------------------
c:\Program Files\Norton AntiVirus\navapsvc.exe
[18 loaded modules in total]
--------------------
C:\WINDOWS\System32\svchost.exe
[37 loaded modules in total]
--------------------
C:\Program Files\Internet Explorer\IEXPLORE.EXE
[42 loaded modules in total]
--------------------
C:\WINDOWS\System32\alg.exe
[31 loaded modules in total]
--------------------
C:\WINDOWS\system32\wscntfy.exe
[15 loaded modules in total]
--------------------
C:\WINDOWS\Explorer.EXE
[106 loaded modules in total]
--------------------
C:\windows\system\hpsysdrv.exe
[9 loaded modules in total]
--------------------
C:\HP\KBD\KBD.EXE
[49 loaded modules in total]
--------------------
C:\WINDOWS\system32\dla\tfswctrl.exe
[25 loaded modules in total]
--------------------
C:\PROGRA~1\NORTON~1\navapw32.exe
[67 loaded modules in total]
--------------------
C:\Program Files\GalleryPlayer\Player\GPClientMonitor.exe
[83 loaded modules in total]
--------------------
C:\Program Files\GalleryPlayer\Player\GPDownloadManager.exe
[100 loaded modules in total]
--------------------
C:\WINDOWS\system32\rundll32.exe
[35 loaded modules in total]
--------------------
C:\Program Files\hp center\137903\Program\BackWeb-137903.exe
[66 loaded modules in total]
--------------------
C:\Program Files\Google\Google Updater\GoogleUpdater.exe
[58 loaded modules in total]
--------------------
C:\Program Files\SAGEM WiFi manager\WLANUTL.exe
[37 loaded modules in total]
--------------------
C:\WINDOWS\System32\wbem\wmiprvse.exe
[57 loaded modules in total]
--------------------
C:\Program Files\Fichiers communs\Microsoft Shared\Windows Live\WLLoginProxy.exe
[53 loaded modules in total]
--------------------
C:\Program Files\Microsoft Office\OFFICE11\WINWORD.EXE
[90 loaded modules in total]
--------------------
C:\Program Files\Microsoft Works\MSWorks.exe
[45 loaded modules in total]
--------------------
C:\Program Files\Adobe\Reader 8.0\Reader\AcroRd32.exe
[89 loaded modules in total]
--------------------
C:\Program Files\Internet Explorer\iexplore.exe
[133 loaded modules in total]
--------------------
C:\Documents and Settings\NéPourDominé\Application Data\Simply Super Software\Trojan Remover\vihD4.exe
FileSize: 2548288
[This is a Trojan Remover component]
[22 loaded modules in total]
--------------------
************************************************************
06:22:16: Checking AUTOEXEC.BAT file
AUTOEXEC.BAT found in C:\
No malicious entries were found in the AUTOEXEC.BAT file
************************************************************
06:22:16: Checking AUTOEXEC.NT file
AUTOEXEC.NT found in C:\WINDOWS\system32
No malicious entries were found in the AUTOEXEC.NT file
************************************************************
06:22:17: Checking HOSTS file
No malicious entries were found in the HOSTS file
************************************************************
06:22:17: Scanning ------ %TEMP% DIRECTORY ------
C:\DOCUME~1\NPOURD~1\LOCALS~1\Temp\JET8E5D.tmp appears to be in-use/locked
C:\DOCUME~1\NPOURD~1\LOCALS~1\Temp\JETAE.tmp appears to be in-use/locked
C:\DOCUME~1\NPOURD~1\LOCALS~1\Temp\~DF112B.tmp appears to be in-use/locked
C:\DOCUME~1\NPOURD~1\LOCALS~1\Temp\~DF23EA.tmp appears to be in-use/locked
C:\DOCUME~1\NPOURD~1\LOCALS~1\Temp\~DF6F9C.tmp appears to be in-use/locked
************************************************************
06:22:18: Scanning ------ C:\WINDOWS\Temp DIRECTORY ------
************************************************************
06:22:50: Scanning ------ ROOT DIRECTORY ------
************************************************************
06:23:10: ------ Scan for other files to remove ------
No malware-related files found to remove
************************************************************
=== CHANGES WERE MADE TO THE WINDOWS REGISTRY ===
=== ONE OR MORE FILES WERE RENAMED OR REMOVED ===
Scan completed at: 06:23:11 26 août 2008
-------------------------------------------------------------------------
One or more files could not be moved or renamed as requested.
They may be in use by Windows, so Trojan Remover needs
to restart the system in order to deal with these files.
26/08/2008 06:23:25: restart commenced
************************************************************
varfendell
Messages postés3256Date d'inscriptionjeudi 27 décembre 2007StatutMembreDernière intervention 8 février 2020706 26 août 2008 à 09:59
Bonjour,
et bien après un rapide passage sur ton rapport, j'ai pu voir deux choses:
1/ certaine infection n'ont pas été supprimées et ont été renommé en .vir
2/d'autre infections seront supprimées au redémarrage de ton ordinateur.
Je te conseil cependant de faire une scan complet avec malware:
télécharge malware sur cette page=>le tutoriel à été fait par VIRUS_KILLER
A la fin de l'installation, veille à ce que l'option Mettre à jour Malwarebytes' Anti-Malware soit cochée. >>> clique sur "Terminer"
Lance Malwarebyte's Anti-Malware en double-cliquant sur l'icône sur le bureau.
Au premier lancement, une fenêtre t'annonce que la version est Free >>> clique sur ok
Laisse les Mises à jour se télécharger *** Referme le programme ***
redemmarre en mode sans echecs regarder ici si vous ne savez pas comment faire)
Lance Malwarebyte's Anti-Malware
Onglet "Recherche" >>> coche Exécuter un examen complet >>> Rechercher
Sélectionne ton disque dur >>> clic sur Lancer l'examen
Suppression des éléments détectés >>>> clique sur Supprimer la sélection
Colle le rapport de malwarebytes dans ta réponse S'il t'es demandé de redémarrer >>> clique sur "Yes"
et de nettoyer ton ordinateur avec ccleaner:
téléchargeccleaner (tutoriel ici par VIRUS_KILLER ou en voici un autre)
passe un bon coup de balais sur ton ordi: -effectue plusieurs fois le nettoyage avec le nettoyeur
-idem avec la fonction registre
-supprime les programmes au démarrage qui sont inutile.
puis de poster un rapport hijackthis pour verifier que ton ordi est clean:
TéléchargerHijackThis Le dézipper dans un dossier prévu à cet effet.
Par exemple C:\hijackthis
Démo : (Merci a Balltrap34 pour cette réalisation)
http://pageperso.aol.fr/balltrap34/Hijenr.gif
L’exécuter puis sur "Do a system scan and save a logfile" (cf. démo)
faire un copier-coller du log entier sur le forum Démo : (Merci a Balltrap34 pour cette réalisation)
http://pageperso.aol.fr/balltrap34/demohijack.htm