Aider moi je suis infecté

tibo2355 Messages postés 14 Statut Membre -  
tibo2355 Messages postés 14 Statut Membre -
Bonjour,

j'ai lancer un scan avec avast , et il ma trouvé plusieurs virus/vers: _ win 32:trojan-gen
_win 32: rootkit-gen

j'ai fais un scan avec hijackthis :

Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 19:48:39, on 07/09/2008
Platform: Windows XP SP3 (WinNT 5.01.2600)
MSIE: Internet Explorer v7.00 (7.00.6000.16705)
Boot mode: Normal

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\Program Files\Alwil Software\Avast4\aswUpdSv.exe
C:\Program Files\Alwil Software\Avast4\ashServ.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\system32\spoolsv.exe
C:\PROGRA~1\ALWILS~1\Avast4\ashDisp.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe
C:\WINDOWS\System32\FTRTSVC.exe
C:\WINDOWS\system32\nvsvc32.exe
C:\WINDOWS\system32\svchost.exe
C:\Program Files\Alwil Software\Avast4\ashMaiSv.exe
C:\Program Files\Alwil Software\Avast4\ashWebSv.exe
C:\WINDOWS\System32\svchost.exe
C:\Program Files\Windows Live\Messenger\usnsvc.exe
C:\WINDOWS\system32\taskmgr.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Program Files\K!TV\K!TV.exe
C:\WINDOWS\system32\SNDVOL32.EXE
C:\Program Files\Windows Live\Messenger\msnmsgr.exe
C:\Program Files\Alwil Software\Avast4\ashLogV.exe
C:\Program Files\Mozilla Firefox\firefox.exe
C:\Program Files\Trend Micro\HijackThis\HijackThis.exe

R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://ie.redirect.hp.com/svs/rdr?TYPE=3&tp=iesearch&locale=FR_FR&c=Q404&bd=pavilion&pf=desktop
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Bar = https://actus.sfr.fr
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = https://actus.sfr.fr
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://home.neuf.fr/
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = https://actus.sfr.fr
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Bar = http://ie.redirect.hp.com/svs/rdr?TYPE=3&tp=iesearch&locale=FR_FR&c=Q404&bd=pavilion&pf=desktop
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = https://www.bing.com/?toHttps=1&redig=5FC791212101479BAFBE1A679848B1AF
R0 - HKLM\Software\Microsoft\Internet Explorer\Search,SearchAssistant = https://actus.sfr.fr
R1 - HKCU\Software\Microsoft\Internet Connection Wizard,ShellNext = http://register.hp.com/servlet/WebReg.servlets.ProdReg1Servlet?appID=java_wreg_wreg_genpg&prodOS=011&gwCountry=FR&language=fr&PURCH_DT_MONTH=11&PURCH_DT_DAY=06&PURCH_DT_YEAR=2004&PROD_SERIAL_ID=CZB44209WP&application=305&modelID=PP109AA&LF=blue
R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyServer = socks=
R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName = Liens
O2 - BHO: AcroIEHlprObj Class - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 6.0\Reader\ActiveX\AcroIEHelper.dll
O2 - BHO: Spybot-S&D IE Protection - {53707962-6F74-2D53-2644-206D7942484F} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre1.6.0_05\bin\ssv.dll
O2 - BHO: (no name) - {7E853D72-626A-48EC-A868-BA8D5E23E045} - (no file)
O2 - BHO: SearchSettings Class - {E312764E-7706-43F1-8DAB-FCDD2B1E416D} - C:\Program Files\Search Settings\kb126\SearchSettings.dll
O3 - Toolbar: Vue HP - {B2847E28-5D7D-4DEB-8B67-05D28BCF79F5} - c:\Program Files\HP\Digital Imaging\bin\HPDTLK02.dll
O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE C:\WINDOWS\system32\NvCpl.dll,NvStartup
O4 - HKLM\..\Run: [avast!] C:\PROGRA~1\ALWILS~1\Avast4\ashDisp.exe
O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
O4 - HKCU\..\Run: [SpybotSD TeaTimer] C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe
O4 - HKUS\S-1-5-19\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'SERVICE LOCAL')
O4 - HKUS\S-1-5-20\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'SERVICE RÉSEAU')
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_05\bin\ssv.dll
O9 - Extra 'Tools' menuitem: Console Java (Sun) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_05\bin\ssv.dll
O9 - Extra button: Stop Pub - {10954C80-4F0F-11d3-B17C-00C0DFE39736} - C:\Program Files\JCA2000\StopPub\StopPub.exe
O9 - Extra 'Tools' menuitem: Stop Pub - {10954C80-4F0F-11d3-B17C-00C0DFE39736} - C:\Program Files\JCA2000\StopPub\StopPub.exe
O9 - Extra button: (no name) - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O9 - Extra 'Tools' menuitem: Spybot - Search & Destroy Configuration - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O15 - Trusted Zone: http://www.secuser.com
O16 - DPF: {029FDBA6-3547-11D7-AA4C-0050BF051A00} (Rawflow ICD Client) - http://s.tf1.fr/mmdia/static/rawflow/clients/5.3.1.0/Rawflow.cab
O16 - DPF: {0EB0E74A-2A76-4AB3-A7FB-9BD8C29F7F75} (CKAVWebScan Object) - https://www.kaspersky.fr/?domain=webscanner.kaspersky.fr
O16 - DPF: {1D6E056F-D1BB-40F6-88E4-11EE98056FD2} (Oberon ActiveX Game Host) - http://jeuxenligne.orange.fr/Gameshell/GameHost/1.0/OberonGameHost.cab
O16 - DPF: {4F1E5B1A-2A80-42CA-8532-2D05CB959537} (MSN Photo Upload Tool) - http://gfx1.hotmail.com/mail/w2/resources/MSNPUpld.cab
O16 - DPF: {74D05D43-3236-11D4-BDCD-00C04F9A3B61} (HouseCall Control) - https://www.trendmicro.com/en_us/forHome/products/housecall.html
O16 - DPF: {BFF1950D-B1B4-4AE8-B842-B2CCF06D9A1B} (Zylom Games Player) - http://game14.zylom.com/activex/zylomgamesplayer.cab
O16 - DPF: {C3F79A2B-B9B4-4A66-B012-3EE46475B072} (MessengerStatsClient Class) - http://messenger.zone.msn.com/binary/MessengerStatsPAClient.cab56907.cab
O16 - DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} (Shockwave Flash Object) - http://fpdownload2.macromedia.com/get/shockwave/cabs/flash/swflash.cab
O16 - DPF: {DF780F87-FF2B-4DF8-92D0-73DB16A1543A} (PopCapLoader Object) - file:///C:/Documents%20and%20Settings/HP_Propriétaire/Local%20Settings/Application%20Data/Oberon%20Media/Oberon%20Games%20Host/popcaploader_v6.cab
O16 - DPF: {FC4CAF5F-91BD-4DD9-ADC1-F3C737E37BC4} (CPlayFirstSweetopiaControl Object) - file:///C:/Documents%20and%20Settings/HP_Propriétaire/Local%20Settings/Application%20Data/Oberon%20Media/Oberon%20Games%20Host/Sweetopia.1.0.0.46.cab
O23 - Service: ANIWZCSd Service (ANIWZCSdService) - Alpha Networks Inc. - C:\Program Files\ANI\ANIWZCS2 Service\ANIWZCSdS.exe
O23 - Service: avast! iAVS4 Control Service (aswUpdSv) - ALWIL Software - C:\Program Files\Alwil Software\Avast4\aswUpdSv.exe
O23 - Service: avast! Antivirus - ALWIL Software - C:\Program Files\Alwil Software\Avast4\ashServ.exe
O23 - Service: avast! Mail Scanner - ALWIL Software - C:\Program Files\Alwil Software\Avast4\ashMaiSv.exe
O23 - Service: avast! Web Scanner - ALWIL Software - C:\Program Files\Alwil Software\Avast4\ashWebSv.exe
O23 - Service: Boonty Games - BOONTY - C:\Program Files\Fichiers communs\BOONTY Shared\Service\Boonty.exe
O23 - Service: France Telecom Routing Table Service (FTRTSVC) - France Telecom - C:\WINDOWS\System32\FTRTSVC.exe
O23 - Service: iPod Service (iPodService) - Apple Computer, Inc. - C:\Program Files\iPod\bin\iPodService.exe
O23 - Service: NVIDIA Display Driver Service (NVSvc) - NVIDIA Corporation - C:\WINDOWS\system32\nvsvc32.exe
O23 - Service: Pml Driver HPZ12 - HP - C:\WINDOWS\system32\HPZipm12.exe

22 réponses

Utilisateur anonyme
 
Salut ,

● Télécharge AD-R.zip sur ton bureau.
● Dézippe-le ( clique droit -> ' extraire tout ' )
● Ouvre le dossier Ad-remover , et double clique sur Ad-remover.exe.
● Au menu principal choisi l'option "A"
● Poste le rapport qui apparait à la fin.

( le rapport est sauvegardé aussi sous C:\Ad-report.log )

(CTRL+A Pour tout selectionner , CTRL+C pour copier et CTRL+V pour coller )

Note :

Process.exe est détecté par certains antivirus (AntiVir, Dr.Web, Kaspersky Anti-Virus) comme étant un RiskTool.
Il ne s'agit pas d'un virus, mais d'un utilitaire destiné à mettre fin à des processus.
Mis entre de mauvaises mains, cet utilitaire pourrait arrêter des logiciels de sécurité (Antivirus, Firewall...) d'où l'alerte émise par ces antivirus.

++
3
Utilisateur anonyme
 
Re,

J'avais dit sur le bureau le programme ;)

● Relance Ad-remover , au menu principal choisi l'option "B"

-- le programme va travailler --

● Poste le rapport qui apparait à la fin.

( le rapport est sauvegardé aussi sous C:\Ad-report.log )

(CTRL+A Pour tout selectionner , CTRL+C pour copier et CTRL+V pour coller )

/!\ Si le Bureau ne réapparait pas presse Ctrl + Alt + Suppr , Onglet Fichier , Nouvelle tâche , tape explorer.exe et valide) /!\

****************************************

Reposte un rapport HJT.

++
2
tibo2355 Messages postés 14 Statut Membre 2
 
voila :

--------- AD-Remover 1.0.0.7 by C_XX ---------

- START at: 20:14:02 | 07/09/2008
- ON: Windows_NT (Windows XP)
- OPTION: Clean
- INSTALL LOCATION: C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\Rar$EX01.219\Ad-remover\AD-Remover.exe
- USER: HP_Propri‚taire | PC: NOM-641695C7437
- BOOT MODE: Normal
- DRIVE(S): C:\ D:\

--------- [ PROCESSES ] ---------

------------------------ [ 0 ]

>>>>>>>>>>>>>>>> CHECKING SERVICES

Deleted successfully ! - "Boonty Games"

>>>>>>>>>>>>>>>> REGISTRY

>>>>>>>>>>>>>>>> FILES\FOLDERS

Deleted ! - "C:\Documents and Settings\HP_Propri‚taire\Cookies\hp_propri‚taire@ads.boonty[2].txt"
Deleted ! - "C:\Documents and Settings\HP_Propri‚taire\Cookies\hp_propri‚taire@boonty.aol[1].txt"
Deleted ! - "C:\Documents and Settings\HP_Propri‚taire\Cookies\hp_propri‚taire@payment.boonty[1].txt"
Deleted ! - "C:\Documents and Settings\HP_Propri‚taire\Cookies\hp_propri‚taire@shell.boonty[2].txt"
Deleted ! - "C:\Documents and Settings\HP_Propri‚taire\Cookies\hp_propri‚taire@eorezo[1].txt"
NOT deleted ! - "C:\WINDOWS\temp\191.tmp"
Deleted ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\192.tmp"
Deleted ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\4pg5A.tmp"
Deleted ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\5htA8.tmp"
Deleted ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\aax100.tmp"
Deleted ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\aax10A.tmp"
Deleted ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\aax4.tmp"
Deleted ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\aax5.tmp"
Deleted ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\aax7.tmp"
Deleted ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\aax8.tmp"
Deleted ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\aaxD9.tmp"
Deleted ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\aaxDA.tmp"
Deleted ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\aaxF6.tmp"
Deleted ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\aaxFA.tmp"
Deleted ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\aaxFC.tmp"
Deleted ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\aaxFD.tmp"
Deleted ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\Div23B.tmp"
Deleted ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\efo5F.tmp"
Deleted ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\g6cE8.tmp"
Deleted ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\ih8.tmp"
Deleted ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\ins1.tmp"
Deleted ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\is-TPDV9.tmp"
Deleted ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\is-UPFNA.tmp"
Deleted ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\IXP000.TMP"
Deleted ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\mod1.tmp"
Deleted ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\mod101.tmp"
Deleted ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\mod103.tmp"
Deleted ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\mod11B.tmp"
Deleted ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\mod12C.tmp"
Deleted ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\mod1327.tmp"
Deleted ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\mod1888.tmp"
Deleted ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\mod2.tmp"
Deleted ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\mod2B.tmp"
Deleted ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\mod2B8.tmp"
Deleted ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\mod2BF.tmp"
Deleted ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\mod3.tmp"
Deleted ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\mod32.tmp"
Deleted ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\mod4.tmp"
Deleted ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\mod492.tmp"
Deleted ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\mod498.tmp"
Deleted ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\mod49E.tmp"
Deleted ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\mod4A1.tmp"
Deleted ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\mod4B7.tmp"
Deleted ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\mod4BD.tmp"
Deleted ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\mod5.tmp"
Deleted ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\mod5D2.tmp"
Deleted ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\mod6.tmp"
Deleted ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\mod651.tmp"
Deleted ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\mod695.tmp"
Deleted ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\mod70D.tmp"
Deleted ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\mod7DC.tmp"
Deleted ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\mod7DE.tmp"
Deleted ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\mod7F8.tmp"
Deleted ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\mod8.tmp"
Deleted ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\modA0.tmp"
Deleted ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\modA6.tmp"
Deleted ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\modAE.tmp"
Deleted ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\modAF.tmp"
Deleted ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\modAF4.tmp"
Deleted ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\modB86.tmp"
Deleted ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\modB8F.tmp"
Deleted ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\modB98.tmp"
Deleted ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\modBA1.tmp"
Deleted ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\modBA7.tmp"
Deleted ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\modBAE.tmp"
Deleted ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\modCAF.tmp"
Deleted ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\modCB2.tmp"
Deleted ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\modCB5.tmp"
Deleted ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\modCB8.tmp"
Deleted ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\modCBF.tmp"
Deleted ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\modCC2.tmp"
Deleted ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\modCC5.tmp"
Deleted ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\modCF.tmp"
Deleted ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\modD.tmp"
Deleted ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\modD2.tmp"
Deleted ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\modD5.tmp"
Deleted ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\modD8.tmp"
Deleted ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\modF5.tmp"
Deleted ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\modFB.tmp"
Deleted ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\modFE.tmp"
Deleted ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\modFF.tmp"
Deleted ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\ndo5E.tmp"
Deleted ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\NeufTmp"
Deleted ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\pdu4B.tmp"
Deleted ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\plugtmp"
Deleted ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\plugtmp-1"
Deleted ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\plugtmp-2"
Deleted ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\plugtmp-3"
Deleted ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\plugtmp-4"
Deleted ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\plugtmp-5"
Deleted ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\plugtmp-6"
Deleted ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\plugtmp-7"
Deleted ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\plugtmp-8"
Deleted ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\plugtmp-9"
Deleted ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\sje59.tmp"
Deleted ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\SLF5373.tmp"
Deleted ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\TFR10A.tmp"
Deleted ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\TFR10B.tmp"
Deleted ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\TFR10D.tmp"
Deleted ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\TFR10F.tmp"
Deleted ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\TFR111.tmp"
Deleted ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\TFR115.tmp"
Deleted ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\TFR117.tmp"
Deleted ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\TFR11B.tmp"
Deleted ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\TFR11F.tmp"
Deleted ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\TFR124.tmp"
Deleted ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\TFR19.tmp"
Deleted ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\TFR1E.tmp"
Deleted ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\TFR22.tmp"
Deleted ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\TFR9.tmp"
Deleted ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\TFRA.tmp"
Deleted ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\TFRB.tmp"
Deleted ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\TFRFA.tmp"
Deleted ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\TFRFC.tmp"
Deleted ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\TFRFF.tmp"
Deleted ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\ttl1EA.tmp"
Deleted ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\u8wA5.tmp"
Deleted ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\ZAP1C7.tmp"
Deleted ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\_ISTMP1.DIR"
Deleted ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\~DF1BA1.tmp"
Deleted ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\~DF20C0.tmp"
Deleted ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\~DF20D4.tmp"
Deleted ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\~DF68CF.tmp"
Deleted ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\~DF9E2A.tmp"
NOT deleted ! - "C:\WINDOWS\temp\~DFA2BF.tmp"
Deleted ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\~DFDFE9.tmp"
Deleted ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\~DFE0EF.tmp"
Deleted ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\.zylomisrtemp1216035256"
Deleted ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\.zylomisrtemp1216046771"
Deleted ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\.zylomisrtemp1216052222"
Deleted ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\.zylomisrtemp1218134672"
Deleted ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\.zylomisrtemp1218134701"
Deleted ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\.zylomtemp1216046194"
2
Utilisateur anonyme
 
Re ,

● Télécharge Toolbar-S&D (Team IDN) sur ton Bureau : https://77b4795d-a-62cb3a1a-s-sites.googlegroups.com/site/eric71mespages/ToolBarSD.exe?attachauth=ANoY7cqJWPphpudyTqv7TRo5RQ3nm_Sx8JluVMO59X5E9cyE3j3LqKlmStIqiDqJdIgMJLi7MXn2nKVajQfoWuVvZZ2wIx_vkqO4k4P0K9jh-ra9jaKPXdZcoaVF2UqJZNH8ubL_42uIwh6f35xJ2GJMuzddVj2Qth1DgZ839lxEIFGkgWz3TdfvNMy-YtxfA3gqBUrj4U4LFeAPiWr3ClmjIP0t_Xs5PQ%3D%3D&attredirects=2

● Lance l'installation du programme en exécutant le fichier téléchargé.
● Double-clique maintenant sur le raccourci de Toolbar-S&D.
● Sélectionne la langue souhaitée en tapant la lettre de ton choix puis en validant avec la touche Entrée.
● Choisis maintenant l'option 1 (Recherche). Patiente jusqu'à la fin de la recherche.
● Poste le rapport généré. (C:\TB.txt)

Tutorial : https://sites.google.com/site/toolbarsd/aideenimages

++
2

Vous n’avez pas trouvé la réponse que vous recherchez ?

Posez votre question
Viollence Messages postés 456 Statut Membre 22
 
moi quand je suis infetion je me casse pas les coui**e a les supprimer je sauvegarde se que j'ai en vi de sauvegarder puis je formate voila en plus sa fait du bien de formater et de reprende tout a 0 voila :)
0
tibo2355 Messages postés 14 Statut Membre 2
 
--------- AD-Remover 1.0.0.7 by C_XX ---------

- START at: 20:04:05 | 07/09/2008
- ON: Windows_NT (Windows XP)
- OPTION: Scan
- INSTALL LOCATION: C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\Rar$EX01.734\Ad-remover\AD-Remover.exe
- USER: HP_Propri‚taire | PC: NOM-641695C7437
- BOOT MODE: Normal
- DRIVE(S): C:\ D:\

--------- [ PROCESSES ] ---------

C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\Program Files\Alwil Software\Avast4\aswUpdSv.exe
C:\Program Files\Alwil Software\Avast4\ashServ.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\system32\spoolsv.exe
C:\PROGRA~1\ALWILS~1\Avast4\ashDisp.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe
C:\WINDOWS\System32\FTRTSVC.exe
C:\WINDOWS\system32\nvsvc32.exe
C:\WINDOWS\system32\svchost.exe
C:\Program Files\Alwil Software\Avast4\ashMaiSv.exe
C:\Program Files\Alwil Software\Avast4\ashWebSv.exe
C:\WINDOWS\System32\svchost.exe
C:\Program Files\Windows Live\Messenger\usnsvc.exe
C:\WINDOWS\system32\taskmgr.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Program Files\K!TV\K!TV.exe
C:\WINDOWS\system32\SNDVOL32.EXE
C:\Program Files\Windows Live\Messenger\msnmsgr.exe
C:\Program Files\Mozilla Firefox\firefox.exe
C:\Program Files\WinRAR\WinRAR.exe
C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\18E.tmp\b2e.exe
C:\WINDOWS\system32\cmd.exe
C:\WINDOWS\System32\WScript.exe

------------------------ [ 30 ]

>>>>>>>>>>>>>>>> CHECKING SERVICES

Found ! - "Boonty Games"

>>>>>>>>>>>>>>>> REGISTRY

Found ! - "HKEY_LOCAL_MACHINE\Software\Boonty"
Found ! - "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\mywebsearch.net"
Found ! - "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\smileycentral.com"
Found ! - "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\0FF2AEFF45EEA0A48A4B33C1973B6094"
Found ! - "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\305B09CE8C53A214DB58887F62F25536"
Found ! - "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\F1B496B301445D115AA4000972A8B18B"
Found ! - "HKEY_LOCAL_MACHINE\Software\Classes\boontybox"
Found ! - "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Boonty Games"
Found ! - "HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\Boonty Games"
Found ! - "HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\Boonty Games"
Found ! - "HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Enum\Root\LEGACY_BOONTY_GAMES"
Found ! - "HKEY_LOCAL_MACHINE\SYSTEM\ControlSet003\Services\Boonty Games"
Found ! - "HKEY_CURRENT_USER\SOFTWARE\Boonty"
Found ! - "HKEY_CLASSES_ROOT\boontybox"
Found ! - "HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\mywebsearch.net"
Found ! - "HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\smileycentral.com"
Found ! - "HKEY_USERS\S-1-5-18\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\mywebsearch.net"
Found ! - "HKEY_USERS\S-1-5-18\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\smileycentral.com"

>>>>>>>>>>>>>>>> FILES\FOLDERS

"C:\Program Files\Boonty" - found !
"C:\Program Files\BoontyGames" - found !
"C:\Program Files\Fichiers communs\BOONTY Shared" - found !
"C:\Documents and Settings\All Users\Application Data\BOONTY" - found !
"C:\Documents and Settings\All Users\MENUDM~1\PROGRA~1\BoontyGames" - found !
Found ! - "C:\Documents and Settings\HP_Propri‚taire\Cookies\hp_propri‚taire@ads.boonty[2].txt"
Found ! - "C:\Documents and Settings\HP_Propri‚taire\Cookies\hp_propri‚taire@boonty.aol[1].txt"
Found ! - "C:\Documents and Settings\HP_Propri‚taire\Cookies\hp_propri‚taire@payment.boonty[1].txt"
Found ! - "C:\Documents and Settings\HP_Propri‚taire\Cookies\hp_propri‚taire@shell.boonty[2].txt"
Found ! - "C:\Documents and Settings\HP_Propri‚taire\Cookies\hp_propri‚taire@eorezo[1].txt"
Found ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\18E.tmp"
Found ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\18F.tmp"
Found ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\4pg5A.tmp"
Found ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\5htA8.tmp"
Found ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\aax100.tmp"
Found ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\aax10A.tmp"
Found ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\aax4.tmp"
Found ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\aax5.tmp"
Found ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\aax7.tmp"
Found ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\aax8.tmp"
Found ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\aaxD9.tmp"
Found ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\aaxDA.tmp"
Found ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\aaxF6.tmp"
Found ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\aaxFA.tmp"
Found ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\aaxFC.tmp"
Found ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\aaxFD.tmp"
Found ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\Div23B.tmp"
Found ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\efo5F.tmp"
Found ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\g6cE8.tmp"
Found ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\ih8.tmp"
Found ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\ins1.tmp"
Found ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\is-TPDV9.tmp"
Found ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\is-UPFNA.tmp"
Found ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\IXP000.TMP"
Found ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\mod1.tmp"
Found ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\mod101.tmp"
Found ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\mod103.tmp"
Found ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\mod11B.tmp"
Found ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\mod12C.tmp"
Found ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\mod1327.tmp"
Found ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\mod1888.tmp"
Found ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\mod2.tmp"
Found ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\mod2B.tmp"
Found ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\mod2B8.tmp"
Found ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\mod2BF.tmp"
Found ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\mod3.tmp"
Found ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\mod32.tmp"
Found ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\mod4.tmp"
Found ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\mod492.tmp"
Found ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\mod498.tmp"
Found ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\mod49E.tmp"
Found ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\mod4A1.tmp"
Found ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\mod4B7.tmp"
Found ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\mod4BD.tmp"
Found ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\mod5.tmp"
Found ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\mod5D2.tmp"
Found ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\mod6.tmp"
Found ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\mod651.tmp"
Found ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\mod695.tmp"
Found ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\mod70D.tmp"
Found ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\mod7DC.tmp"
Found ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\mod7DE.tmp"
Found ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\mod7F8.tmp"
Found ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\mod8.tmp"
Found ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\modA0.tmp"
Found ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\modA6.tmp"
Found ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\modAE.tmp"
Found ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\modAF.tmp"
Found ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\modAF4.tmp"
Found ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\modB86.tmp"
Found ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\modB8F.tmp"
Found ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\modB98.tmp"
Found ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\modBA1.tmp"
Found ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\modBA7.tmp"
Found ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\modBAE.tmp"
Found ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\modCAF.tmp"
Found ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\modCB2.tmp"
Found ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\modCB5.tmp"
Found ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\modCB8.tmp"
Found ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\modCBF.tmp"
Found ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\modCC2.tmp"
Found ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\modCC5.tmp"
Found ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\modCF.tmp"
Found ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\modD.tmp"
Found ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\modD2.tmp"
Found ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\modD5.tmp"
Found ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\modD8.tmp"
Found ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\modF5.tmp"
Found ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\modFB.tmp"
Found ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\modFE.tmp"
Found ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\modFF.tmp"
Found ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\ndo5E.tmp"
Found ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\NeufTmp"
Found ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\pdu4B.tmp"
Found ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\plugtmp"
Found ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\plugtmp-1"
Found ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\plugtmp-2"
Found ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\plugtmp-3"
Found ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\plugtmp-4"
Found ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\plugtmp-5"
Found ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\plugtmp-6"
Found ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\plugtmp-7"
Found ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\plugtmp-8"
Found ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\plugtmp-9"
Found ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\sje59.tmp"
Found ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\SLF5373.tmp"
Found ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\TFR10A.tmp"
Found ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\TFR10B.tmp"
Found ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\TFR10D.tmp"
Found ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\TFR10F.tmp"
Found ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\TFR111.tmp"
Found ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\TFR115.tmp"
Found ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\TFR117.tmp"
Found ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\TFR11B.tmp"
Found ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\TFR11F.tmp"
Found ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\TFR124.tmp"
Found ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\TFR19.tmp"
Found ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\TFR1E.tmp"
Found ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\TFR22.tmp"
Found ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\TFR9.tmp"
Found ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\TFRA.tmp"
Found ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\TFRB.tmp"
Found ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\TFRFA.tmp"
Found ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\TFRFC.tmp"
Found ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\TFRFF.tmp"
Found ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\ttl1EA.tmp"
Found ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\u8wA5.tmp"
Found ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\ZAP1C7.tmp"
Found ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\_ISTMP1.DIR"
Found ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\~DF1BA1.tmp"
Found ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\~DF20C0.tmp"
Found ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\~DF20D4.tmp"
Found ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\~DF68CF.tmp"
Found ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\~DF9E2A.tmp"
Found ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\~DFA2BF.tmp"
Found ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\~DFDFE9.tmp"
Found ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\~DFE0EF.tmp"
Found ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\.zylomisrtemp1216035256"
Found ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\.zylomisrtemp1216046771"
Found ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\.zylomisrtemp1216052222"
Found ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\.zylomisrtemp1218134672"
Found ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\.zylomisrtemp1218134701"
Found ! - "C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp\.zylomtemp1216046194"
Found ! - "C:\WINDOWS\temp\ih8.tmp"
Found ! - "C:\WINDOWS\temp\Fichiers Internet temporaires"
Found ! - "C:\WINDOWS\temp\Temporary Internet Files"

+---- Scanning prefs.js ... ( # Mozilla User Preferences ) ----+

\...\54mbx1vt.default\prefs.js :

+--------------------------------------------------------------+

>>>>>>>>>>>>>>>> [ EOF - 224 lines ]

[ END at: 20:04:27 | 07/09/2008 ] - [ Time elapsed:

j'espére que sa va t'aidé pour mon probléme
0
tibo2355 Messages postés 14 Statut Membre 2
 
Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 20:15:51, on 07/09/2008
Platform: Windows XP SP3 (WinNT 5.01.2600)
MSIE: Internet Explorer v7.00 (7.00.6000.16705)
Boot mode: Normal

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\Program Files\Alwil Software\Avast4\aswUpdSv.exe
C:\Program Files\Alwil Software\Avast4\ashServ.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\system32\spoolsv.exe
C:\PROGRA~1\ALWILS~1\Avast4\ashDisp.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe
C:\WINDOWS\System32\FTRTSVC.exe
C:\WINDOWS\system32\nvsvc32.exe
C:\WINDOWS\system32\svchost.exe
C:\Program Files\Alwil Software\Avast4\ashMaiSv.exe
C:\Program Files\Alwil Software\Avast4\ashWebSv.exe
C:\WINDOWS\System32\svchost.exe
C:\Program Files\Windows Live\Messenger\usnsvc.exe
C:\WINDOWS\system32\taskmgr.exe
C:\Program Files\K!TV\K!TV.exe
C:\WINDOWS\system32\SNDVOL32.EXE
C:\Program Files\Windows Live\Messenger\msnmsgr.exe
C:\Program Files\Mozilla Firefox\firefox.exe
C:\Program Files\Alwil Software\Avast4\ashSimpl.exe
C:\WINDOWS\system32\NOTEPAD.EXE
C:\Program Files\Trend Micro\HijackThis\HijackThis.exe

R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://ie.redirect.hp.com/svs/rdr?TYPE=3&tp=iesearch&locale=FR_FR&c=Q404&bd=pavilion&pf=desktop
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Bar = https://actus.sfr.fr
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = https://actus.sfr.fr
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://home.neuf.fr/
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = https://actus.sfr.fr
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Bar = http://ie.redirect.hp.com/svs/rdr?TYPE=3&tp=iesearch&locale=FR_FR&c=Q404&bd=pavilion&pf=desktop
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = https://www.bing.com/?toHttps=1&redig=5FC791212101479BAFBE1A679848B1AF
R0 - HKLM\Software\Microsoft\Internet Explorer\Search,SearchAssistant = https://actus.sfr.fr
R1 - HKCU\Software\Microsoft\Internet Connection Wizard,ShellNext = http://register.hp.com/servlet/WebReg.servlets.ProdReg1Servlet?appID=java_wreg_wreg_genpg&prodOS=011&gwCountry=FR&language=fr&PURCH_DT_MONTH=11&PURCH_DT_DAY=06&PURCH_DT_YEAR=2004&PROD_SERIAL_ID=CZB44209WP&application=305&modelID=PP109AA&LF=blue
R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyServer = socks=
R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName = Liens
O2 - BHO: AcroIEHlprObj Class - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 6.0\Reader\ActiveX\AcroIEHelper.dll
O2 - BHO: Spybot-S&D IE Protection - {53707962-6F74-2D53-2644-206D7942484F} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre1.6.0_05\bin\ssv.dll
O2 - BHO: (no name) - {7E853D72-626A-48EC-A868-BA8D5E23E045} - (no file)
O2 - BHO: SearchSettings Class - {E312764E-7706-43F1-8DAB-FCDD2B1E416D} - C:\Program Files\Search Settings\kb126\SearchSettings.dll
O3 - Toolbar: Vue HP - {B2847E28-5D7D-4DEB-8B67-05D28BCF79F5} - c:\Program Files\HP\Digital Imaging\bin\HPDTLK02.dll
O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE C:\WINDOWS\system32\NvCpl.dll,NvStartup
O4 - HKLM\..\Run: [avast!] C:\PROGRA~1\ALWILS~1\Avast4\ashDisp.exe
O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
O4 - HKCU\..\Run: [SpybotSD TeaTimer] C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe
O4 - HKUS\S-1-5-19\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'SERVICE LOCAL')
O4 - HKUS\S-1-5-20\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'SERVICE RÉSEAU')
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_05\bin\ssv.dll
O9 - Extra 'Tools' menuitem: Console Java (Sun) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_05\bin\ssv.dll
O9 - Extra button: Stop Pub - {10954C80-4F0F-11d3-B17C-00C0DFE39736} - C:\Program Files\JCA2000\StopPub\StopPub.exe
O9 - Extra 'Tools' menuitem: Stop Pub - {10954C80-4F0F-11d3-B17C-00C0DFE39736} - C:\Program Files\JCA2000\StopPub\StopPub.exe
O9 - Extra button: (no name) - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O9 - Extra 'Tools' menuitem: Spybot - Search & Destroy Configuration - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O15 - Trusted Zone: http://www.secuser.com
O16 - DPF: {029FDBA6-3547-11D7-AA4C-0050BF051A00} (Rawflow ICD Client) - http://s.tf1.fr/mmdia/static/rawflow/clients/5.3.1.0/Rawflow.cab
O16 - DPF: {0EB0E74A-2A76-4AB3-A7FB-9BD8C29F7F75} (CKAVWebScan Object) - https://www.kaspersky.fr/?domain=webscanner.kaspersky.fr
O16 - DPF: {1D6E056F-D1BB-40F6-88E4-11EE98056FD2} (Oberon ActiveX Game Host) - http://jeuxenligne.orange.fr/Gameshell/GameHost/1.0/OberonGameHost.cab
O16 - DPF: {4F1E5B1A-2A80-42CA-8532-2D05CB959537} (MSN Photo Upload Tool) - http://gfx1.hotmail.com/mail/w2/resources/MSNPUpld.cab
O16 - DPF: {74D05D43-3236-11D4-BDCD-00C04F9A3B61} (HouseCall Control) - https://www.trendmicro.com/en_us/forHome/products/housecall.html
O16 - DPF: {BFF1950D-B1B4-4AE8-B842-B2CCF06D9A1B} (Zylom Games Player) - http://game14.zylom.com/activex/zylomgamesplayer.cab
O16 - DPF: {C3F79A2B-B9B4-4A66-B012-3EE46475B072} (MessengerStatsClient Class) - http://messenger.zone.msn.com/binary/MessengerStatsPAClient.cab56907.cab
O16 - DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} (Shockwave Flash Object) - http://fpdownload2.macromedia.com/get/shockwave/cabs/flash/swflash.cab
O16 - DPF: {DF780F87-FF2B-4DF8-92D0-73DB16A1543A} (PopCapLoader Object) - file:///C:/Documents%20and%20Settings/HP_Propriétaire/Local%20Settings/Application%20Data/Oberon%20Media/Oberon%20Games%20Host/popcaploader_v6.cab
O16 - DPF: {FC4CAF5F-91BD-4DD9-ADC1-F3C737E37BC4} (CPlayFirstSweetopiaControl Object) - file:///C:/Documents%20and%20Settings/HP_Propriétaire/Local%20Settings/Application%20Data/Oberon%20Media/Oberon%20Games%20Host/Sweetopia.1.0.0.46.cab
O23 - Service: ANIWZCSd Service (ANIWZCSdService) - Alpha Networks Inc. - C:\Program Files\ANI\ANIWZCS2 Service\ANIWZCSdS.exe
O23 - Service: avast! iAVS4 Control Service (aswUpdSv) - ALWIL Software - C:\Program Files\Alwil Software\Avast4\aswUpdSv.exe
O23 - Service: avast! Antivirus - ALWIL Software - C:\Program Files\Alwil Software\Avast4\ashServ.exe
O23 - Service: avast! Mail Scanner - ALWIL Software - C:\Program Files\Alwil Software\Avast4\ashMaiSv.exe
O23 - Service: avast! Web Scanner - ALWIL Software - C:\Program Files\Alwil Software\Avast4\ashWebSv.exe
O23 - Service: France Telecom Routing Table Service (FTRTSVC) - France Telecom - C:\WINDOWS\System32\FTRTSVC.exe
O23 - Service: iPod Service (iPodService) - Apple Computer, Inc. - C:\Program Files\iPod\bin\iPodService.exe
O23 - Service: NVIDIA Display Driver Service (NVSvc) - NVIDIA Corporation - C:\WINDOWS\system32\nvsvc32.exe
O23 - Service: Pml Driver HPZ12 - HP - C:\WINDOWS\system32\HPZipm12.exe
0
tibo2355 Messages postés 14 Statut Membre 2
 
-----------\\ ToolBar S&D 1.1.8 XP/Vista

Microsoft Windows XP Édition familiale ( v5.1.2600 ) Service Pack 3
X86-based PC ( Uniprocessor Free : AMD Athlon(tm) 64 Processor 3000+ )
BIOS : Phoenix - Award BIOS v6.00PG
USER : HP_Propriétaire ( Administrator )
BOOT : Normal boot
Antivirus : avast! antivirus 4.8.1229 [VPS 080907-0] 4.8.1229 (Activated)

"C:\ToolBar SD" ( MAJ : 07-09-2008|12:20 )
Option : [1] ( 07/09/2008|20:19 )

-----------\\ Recherche de Fichiers / Dossiers ...

C:\Program Files\Dealio
C:\Program Files\Dealio\kb126
C:\Program Files\GamesBar
C:\Program Files\GamesBar\Localization-French.ini
C:\Program Files\Mozilla Firefox\extensions\search@searchsettings.com
C:\Program Files\Mozilla Firefox\extensions\search@searchsettings.com\COMPONENTS\SearchSettingsFF.dll
C:\DOCUME~1\HP_PRO~1\APPLIC~1\Search Settings
C:\DOCUME~1\HP_PRO~1\APPLIC~1\Search Settings\kb126
C:\Program Files\Search Settings
C:\Program Files\Search Settings\kb126
C:\Program Files\Search Settings\SearchSettings.exe
C:\DOCUME~1\HP_PRO~1\Cookies\hp_propriétaire@h.starware[1].txt
C:\DOCUME~1\HP_PRO~1\Cookies\hp_propriétaire@try.starware[1].txt

-----------\\ [..\Internet Explorer\Main]

[HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main]
"Local Page"="C:\\WINDOWS\\system32\\blank.htm"
"Search Page"="https://actus.sfr.fr"
"Default_Search_URL"="http://ie.redirect.hp.com/svs/rdr?TYPE=3&tp=iesearch&locale=FR_FR&c=Q404&bd=pavilion&pf=desktop"
"Start Page"="http://home.neuf.fr/"
"Search Bar"="https://actus.sfr.fr"

[HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\Main]
"Default_Page_URL"="https://www.google.com/?gws_rd=ssl"
"Default_Search_URL"="https://actus.sfr.fr"
"Search Page"="https://www.bing.com/?toHttps=1&redig=5FC791212101479BAFBE1A679848B1AF"
"Start Page"="https://www.google.com/?gws_rd=ssl"
"Search Bar"="http://ie.redirect.hp.com/svs/rdr?TYPE=3&tp=iesearch&locale=FR_FR&c=Q404&bd=pavilion&pf=desktop"

--------------------\\ Recherche d'autres infections

Aucune autre infection trouvée !

1 - "C:\ToolBar SD\TB_1.txt" - 07/09/2008|20:21 - Option : [1]

-----------\\ Fin du rapport a 20:21:19,71
0
Utilisateur anonyme
 
Re ,

● Relance Toolbar-S&D en double-cliquant sur le raccourci. Tape sur "2" puis valide en appuyant sur "Entrée".

! Ne ferme pas la fenêtre lors de la suppression !

● Un rapport sera généré, poste son contenu ici.

(!) NOTE : Si ton Bureau ne réapparait pas,

Appuie simultanément sur Ctrl+Alt+Suppr pour ouvrir le Gestionnaire des tâches.
Rends-toi sur l'onglet "Processus". Clique en haut à gauche sur Fichier et choisis "Exécuter..."
Tape explorer puis valide.

+ un nouveau rapport HJT.

++
0
tibo2355 Messages postés 14 Statut Membre 2
 
-----------\\ ToolBar S&D 1.1.8 XP/Vista

Microsoft Windows XP Édition familiale ( v5.1.2600 ) Service Pack 3
X86-based PC ( Uniprocessor Free : AMD Athlon(tm) 64 Processor 3000+ )
BIOS : Phoenix - Award BIOS v6.00PG
USER : HP_Propriétaire ( Administrator )
BOOT : Normal boot
Antivirus : avast! antivirus 4.8.1229 [VPS 080907-0] 4.8.1229 (Activated)

"C:\ToolBar SD" ( MAJ : 07-09-2008|12:20 )
Option : [2] ( 07/09/2008|20:29 )

-----------\\ SUPPRESSION

Supprime! - C:\Program Files\Dealio\kb126
Supprime! - C:\Program Files\GamesBar\Localization-French.ini
Supprime! - C:\Program Files\Mozilla Firefox\extensions\search@searchsettings.com
Supprime! - C:\DOCUME~1\HP_PRO~1\APPLIC~1\Search Settings\kb126
Supprime! - C:\Program Files\Search Settings\kb126
Supprime! - C:\Program Files\Search Settings\SearchSettings.exe
Supprime! - C:\DOCUME~1\HP_PRO~1\Cookies\hp_propriétaire@h.starware[1].txt
Supprime! - C:\DOCUME~1\HP_PRO~1\Cookies\hp_propriétaire@try.starware[1].txt
Supprime! - C:\Program Files\Dealio
Supprime! - C:\Program Files\GamesBar
Supprime! - C:\DOCUME~1\HP_PRO~1\APPLIC~1\Search Settings
Supprime! - C:\Program Files\Search Settings

-----------\\ Recherche de Fichiers / Dossiers ...

-----------\\ [..\Internet Explorer\Main]

[HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main]
"Local Page"="C:\\WINDOWS\\system32\\blank.htm"
"Search Page"="https://actus.sfr.fr"
"Default_Search_URL"="http://ie.redirect.hp.com/svs/rdr?TYPE=3&tp=iesearch&locale=FR_FR&c=Q404&bd=pavilion&pf=desktop"
"Start Page"="http://home.neuf.fr/"
"Search Bar"="https://actus.sfr.fr"

[HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\Main]
"Default_Page_URL"="https://www.google.com/?gws_rd=ssl"
"Default_Search_URL"="https://actus.sfr.fr"
"Search Page"="https://www.bing.com/?toHttps=1&redig=5FC791212101479BAFBE1A679848B1AF"
"Start Page"="https://www.msn.com/fr-fr/"
"Search Bar"="http://ie.redirect.hp.com/svs/rdr?TYPE=3&tp=iesearch&locale=FR_FR&c=Q404&bd=pavilion&pf=desktop"

--------------------\\ Recherche d'autres infections

Aucune autre infection trouvée !

1 - "C:\ToolBar SD\TB_1.txt" - 07/09/2008|20:21 - Option : [1]
2 - "C:\ToolBar SD\TB_2.txt" - 07/09/2008|20:30 - Option : [2]

-----------\\ Fin du rapport a 20:30:38,25
0
tibo2355 Messages postés 14 Statut Membre 2
 
Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 20:31:42, on 07/09/2008
Platform: Windows XP SP3 (WinNT 5.01.2600)
MSIE: Internet Explorer v7.00 (7.00.6000.16705)
Boot mode: Normal

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\Program Files\Alwil Software\Avast4\aswUpdSv.exe
C:\Program Files\Alwil Software\Avast4\ashServ.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\system32\spoolsv.exe
C:\PROGRA~1\ALWILS~1\Avast4\ashDisp.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe
C:\WINDOWS\System32\FTRTSVC.exe
C:\WINDOWS\system32\nvsvc32.exe
C:\WINDOWS\system32\svchost.exe
C:\Program Files\Alwil Software\Avast4\ashMaiSv.exe
C:\Program Files\Alwil Software\Avast4\ashWebSv.exe
C:\WINDOWS\System32\svchost.exe
C:\Program Files\Windows Live\Messenger\usnsvc.exe
C:\WINDOWS\system32\taskmgr.exe
C:\Program Files\K!TV\K!TV.exe
C:\WINDOWS\system32\SNDVOL32.EXE
C:\Program Files\Windows Live\Messenger\msnmsgr.exe
C:\WINDOWS\system32\NOTEPAD.EXE
C:\Program Files\Mozilla Firefox\firefox.exe
C:\Program Files\Trend Micro\HijackThis\HijackThis.exe

R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://ie.redirect.hp.com/svs/rdr?TYPE=3&tp=iesearch&locale=FR_FR&c=Q404&bd=pavilion&pf=desktop
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Bar = https://actus.sfr.fr
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = https://actus.sfr.fr
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://home.neuf.fr/
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = https://actus.sfr.fr
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Bar = http://ie.redirect.hp.com/svs/rdr?TYPE=3&tp=iesearch&locale=FR_FR&c=Q404&bd=pavilion&pf=desktop
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = https://www.bing.com/?toHttps=1&redig=5FC791212101479BAFBE1A679848B1AF
R0 - HKLM\Software\Microsoft\Internet Explorer\Search,SearchAssistant = https://actus.sfr.fr
R1 - HKCU\Software\Microsoft\Internet Connection Wizard,ShellNext = http://register.hp.com/servlet/WebReg.servlets.ProdReg1Servlet?appID=java_wreg_wreg_genpg&prodOS=011&gwCountry=FR&language=fr&PURCH_DT_MONTH=11&PURCH_DT_DAY=06&PURCH_DT_YEAR=2004&PROD_SERIAL_ID=CZB44209WP&application=305&modelID=PP109AA&LF=blue
R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyServer = socks=
R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName = Liens
O2 - BHO: AcroIEHlprObj Class - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 6.0\Reader\ActiveX\AcroIEHelper.dll
O2 - BHO: Spybot-S&D IE Protection - {53707962-6F74-2D53-2644-206D7942484F} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre1.6.0_05\bin\ssv.dll
O2 - BHO: (no name) - {7E853D72-626A-48EC-A868-BA8D5E23E045} - (no file)
O3 - Toolbar: Vue HP - {B2847E28-5D7D-4DEB-8B67-05D28BCF79F5} - c:\Program Files\HP\Digital Imaging\bin\HPDTLK02.dll
O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE C:\WINDOWS\system32\NvCpl.dll,NvStartup
O4 - HKLM\..\Run: [avast!] C:\PROGRA~1\ALWILS~1\Avast4\ashDisp.exe
O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
O4 - HKCU\..\Run: [SpybotSD TeaTimer] C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe
O4 - HKUS\S-1-5-19\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'SERVICE LOCAL')
O4 - HKUS\S-1-5-20\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'SERVICE RÉSEAU')
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_05\bin\ssv.dll
O9 - Extra 'Tools' menuitem: Console Java (Sun) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_05\bin\ssv.dll
O9 - Extra button: Stop Pub - {10954C80-4F0F-11d3-B17C-00C0DFE39736} - C:\Program Files\JCA2000\StopPub\StopPub.exe
O9 - Extra 'Tools' menuitem: Stop Pub - {10954C80-4F0F-11d3-B17C-00C0DFE39736} - C:\Program Files\JCA2000\StopPub\StopPub.exe
O9 - Extra button: (no name) - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O9 - Extra 'Tools' menuitem: Spybot - Search & Destroy Configuration - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O15 - Trusted Zone: http://www.secuser.com
O16 - DPF: {029FDBA6-3547-11D7-AA4C-0050BF051A00} (Rawflow ICD Client) - http://s.tf1.fr/mmdia/static/rawflow/clients/5.3.1.0/Rawflow.cab
O16 - DPF: {0EB0E74A-2A76-4AB3-A7FB-9BD8C29F7F75} (CKAVWebScan Object) - https://www.kaspersky.fr/?domain=webscanner.kaspersky.fr
O16 - DPF: {1D6E056F-D1BB-40F6-88E4-11EE98056FD2} (Oberon ActiveX Game Host) - http://jeuxenligne.orange.fr/Gameshell/GameHost/1.0/OberonGameHost.cab
O16 - DPF: {4F1E5B1A-2A80-42CA-8532-2D05CB959537} (MSN Photo Upload Tool) - http://gfx1.hotmail.com/mail/w2/resources/MSNPUpld.cab
O16 - DPF: {74D05D43-3236-11D4-BDCD-00C04F9A3B61} (HouseCall Control) - https://www.trendmicro.com/en_us/forHome/products/housecall.html
O16 - DPF: {BFF1950D-B1B4-4AE8-B842-B2CCF06D9A1B} (Zylom Games Player) - http://game14.zylom.com/activex/zylomgamesplayer.cab
O16 - DPF: {C3F79A2B-B9B4-4A66-B012-3EE46475B072} (MessengerStatsClient Class) - http://messenger.zone.msn.com/binary/MessengerStatsPAClient.cab56907.cab
O16 - DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} (Shockwave Flash Object) - http://fpdownload2.macromedia.com/get/shockwave/cabs/flash/swflash.cab
O16 - DPF: {DF780F87-FF2B-4DF8-92D0-73DB16A1543A} (PopCapLoader Object) - file:///C:/Documents%20and%20Settings/HP_Propriétaire/Local%20Settings/Application%20Data/Oberon%20Media/Oberon%20Games%20Host/popcaploader_v6.cab
O16 - DPF: {FC4CAF5F-91BD-4DD9-ADC1-F3C737E37BC4} (CPlayFirstSweetopiaControl Object) - file:///C:/Documents%20and%20Settings/HP_Propriétaire/Local%20Settings/Application%20Data/Oberon%20Media/Oberon%20Games%20Host/Sweetopia.1.0.0.46.cab
O23 - Service: ANIWZCSd Service (ANIWZCSdService) - Alpha Networks Inc. - C:\Program Files\ANI\ANIWZCS2 Service\ANIWZCSdS.exe
O23 - Service: avast! iAVS4 Control Service (aswUpdSv) - ALWIL Software - C:\Program Files\Alwil Software\Avast4\aswUpdSv.exe
O23 - Service: avast! Antivirus - ALWIL Software - C:\Program Files\Alwil Software\Avast4\ashServ.exe
O23 - Service: avast! Mail Scanner - ALWIL Software - C:\Program Files\Alwil Software\Avast4\ashMaiSv.exe
O23 - Service: avast! Web Scanner - ALWIL Software - C:\Program Files\Alwil Software\Avast4\ashWebSv.exe
O23 - Service: France Telecom Routing Table Service (FTRTSVC) - France Telecom - C:\WINDOWS\System32\FTRTSVC.exe
O23 - Service: iPod Service (iPodService) - Apple Computer, Inc. - C:\Program Files\iPod\bin\iPodService.exe
O23 - Service: NVIDIA Display Driver Service (NVSvc) - NVIDIA Corporation - C:\WINDOWS\system32\nvsvc32.exe
O23 - Service: Pml Driver HPZ12 - HP - C:\WINDOWS\system32\HPZipm12.exe
0
Utilisateur anonyme
 
Re ,
Pour vérif :

Imprime ou enregistre ces instructions car il faudra fermer toutes les fenêtres et applications lors de l'installation et de l'analyse.

→ Télécharge Malwarebytes' Anti-Malware (MBAM) et enregistre le sur ton Bureau.

→ A la fin du téléchargement, ferme toutes les fenêtres et programmes, y compris celui-ci.

→ Double-clique sur l'icône Download_mbam-setup.exe sur ton bureau pour démarrer le programme d'installation.

→ Pendant l'installation, suis les indications (en particulier le choix de la langue et l'autorisation d'accession à Internet). N'apporte aucune modification aux réglages par défaut et, en fin d'installation, vérifie que les options Update Malwarebytes' Anti-Malware et Launch Malwarebytes' Anti-Malware sont cochées.

→ MBAM démarrera automatiquement et enverra un message demandant à mettre à jour le programme avant de lancer une analyse. Comme MBAM se met automatiquement à jour en fin d'installation, clique sur OK pour fermer la boîte de dialogue. La fenêtre principale de MBAM s'affiche :

→ Dans l'onglet analyse, vérifie que "Exécuter un examen complet" est coché et clique sur le bouton Rechercher pour démarrer l'analyse.

→ MBAM analyse ton ordinateur. L'analyse peut prendre un certain temps. Il suffit de vérifier de temps en temps son avancement.

→ A la fin de l'analyse, un message s'affiche indiquant la fin de l'analyse. Clique sur OK pour poursuivre.

→ Si des malwares ont été détectés, leur liste s'affiche.
En cliquant sur Suppression (?) , MBAM va détruire les fichiers et clés de registre et en mettre une copie dans la quarantaine. ►► FAIT LE

→ MBAM va ouvrir le Bloc-notes et y copier le rapport d'analyse. Ferme le Bloc-notes. (Le rapport peut être retrouvé sous l'onglet Rapports/logs)

→ Ferme MBAM en cliquant sur Quitter.

Poste le rapport dans ta réponse

Tutorial : https://forum.pcastuces.com/malwarebytes_antimalwares___tutoriel-f31s3.htm

++
0
tibo2355 Messages postés 14 Statut Membre 2
 
merci pour ton aide car j'y serai jamais arriver tout seul

l'analyse avec malwarebytes je la ferai demain car j'ai pas le temps se soir

je posterai le rapport demain

merci
0
tibo2355 Messages postés 14 Statut Membre 2
 
voila :

Malwarebytes' Anti-Malware 1.27
Version de la base de données: 1130
Windows 5.1.2600 Service Pack 3

08/09/2008 20:55:57
mbam-log-2008-09-08 (20-55-57).txt

Type de recherche: Examen complet (C:\|D:\|)
Eléments examinés: 145443
Temps écoulé: 52 minute(s), 59 second(s)

Processus mémoire infecté(s): 0
Module(s) mémoire infecté(s): 0
Clé(s) du Registre infectée(s): 7
Valeur(s) du Registre infectée(s): 0
Elément(s) de données du Registre infecté(s): 0
Dossier(s) infecté(s): 0
Fichier(s) infecté(s): 0

Processus mémoire infecté(s):
(Aucun élément nuisible détecté)

Module(s) mémoire infecté(s):
(Aucun élément nuisible détecté)

Clé(s) du Registre infectée(s):
HKEY_CLASSES_ROOT\popcaploader.popcaploaderctrl2 (Adware.PopCap) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\popcaploader.popcaploaderctrl2.1 (Adware.PopCap) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\Interface\{e4e3e0f8-cd30-4380-8ce9-b96904bdefca} (Adware.PopCap) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\Interface\{fe8a736f-4124-4d9c-b4b1-3b12381efabe} (Adware.PopCap) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{df780f87-ff2b-4df8-92d0-73db16a1543a} (Adware.PopCap) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\Typelib\{c9c5deaf-0a1f-4660-8279-9edfad6fefe1} (Adware.PopCap) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Code Store Database\Distribution Units\{df780f87-ff2b-4df8-92d0-73db16a1543a} (Adware.PopCap) -> Quarantined and deleted successfully.

Valeur(s) du Registre infectée(s):
(Aucun élément nuisible détecté)

Elément(s) de données du Registre infecté(s):
(Aucun élément nuisible détecté)

Dossier(s) infecté(s):
(Aucun élément nuisible détecté)

Fichier(s) infecté(s):
(Aucun élément nuisible détecté)
0
Utilisateur anonyme
 
Re ,

● Vide la quarantaine de Malwarebyte's Anti-Malware:

_ Clique sur le raccourci de "Malwarebytes' Anti-Malware" , puis sur "Quarantaine" .

sélectionne les divers éléments en cliquant sur "Tout" puis clique sur "Supprime".

Reposte un rapport Hijackthis ;)

+
0
tibo2355 Messages postés 14 Statut Membre 2
 
voila :

Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 12:05:25, on 11/09/2008
Platform: Windows XP SP3 (WinNT 5.01.2600)
MSIE: Internet Explorer v7.00 (7.00.6000.16705)
Boot mode: Normal

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\Explorer.EXE
C:\Program Files\Alwil Software\Avast4\aswUpdSv.exe
C:\Program Files\Alwil Software\Avast4\ashServ.exe
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\System32\FTRTSVC.exe
C:\WINDOWS\system32\nvsvc32.exe
C:\WINDOWS\system32\svchost.exe
C:\Program Files\Alwil Software\Avast4\ashMaiSv.exe
C:\Program Files\Alwil Software\Avast4\ashWebSv.exe
C:\PROGRA~1\ALWILS~1\Avast4\ashDisp.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe
C:\WINDOWS\System32\svchost.exe
C:\Program Files\Mozilla Firefox\firefox.exe
C:\Program Files\Trend Micro\HijackThis\HijackThis.exe

R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://ie.redirect.hp.com/...
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Bar = https://actus.sfr.fr
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = https://actus.sfr.fr
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://home.neuf.fr/
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = https://actus.sfr.fr
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Bar = http://ie.redirect.hp.com/...
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = https://www.bing.com/?toHttps=1&redig=5FC791212101479BAFBE1A679848B1AF
R0 - HKLM\Software\Microsoft\Internet Explorer\Search,SearchAssistant = https://actus.sfr.fr
R1 - HKCU\Software\Microsoft\Internet Connection Wizard,ShellNext = http://register.hp.com/servlet/WebReg.servlets.ProdReg1Servlet?appID=java_wreg_wreg_genpg&prodOS=011&gwCountry=FR&language=fr&PURCH_DT_MONTH=11&PURCH_DT_DAY=06&PURCH_DT_YEAR=2004&PROD_SERIAL_ID=CZB44209WP&application=305&modelID=PP109AA&LF=blue
R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyServer = socks=
R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyOverride = *.local
R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName = Liens
O2 - BHO: AcroIEHlprObj Class - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 6.0\Reader\ActiveX\AcroIEHelper.dll
O2 - BHO: Spybot-S&D IE Protection - {53707962-6F74-2D53-2644-206D7942484F} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre1.6.0_05\bin\ssv.dll
O2 - BHO: (no name) - {7E853D72-626A-48EC-A868-BA8D5E23E045} - (no file)
O2 - BHO: Programme d'aide de l'Assistant de connexion Windows Live - {9030D464-4C02-4ABF-8ECC-5164760863C6} - C:\Program Files\Fichiers communs\Microsoft Shared\Windows Live\WindowsLiveLogin.dll
O3 - Toolbar: Vue HP - {B2847E28-5D7D-4DEB-8B67-05D28BCF79F5} - c:\Program Files\HP\Digital Imaging\bin\HPDTLK02.dll
O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE C:\WINDOWS\system32\NvCpl.dll,NvStartup
O4 - HKLM\..\Run: [avast!] C:\PROGRA~1\ALWILS~1\Avast4\ashDisp.exe
O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
O4 - HKCU\..\Run: [SpybotSD TeaTimer] C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe
O4 - HKUS\S-1-5-19\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'SERVICE LOCAL')
O4 - HKUS\S-1-5-20\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'SERVICE RÉSEAU')
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_05\bin\ssv.dll
O9 - Extra 'Tools' menuitem: Console Java (Sun) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_05\bin\ssv.dll
O9 - Extra button: Stop Pub - {10954C80-4F0F-11d3-B17C-00C0DFE39736} - C:\Program Files\JCA2000\StopPub\StopPub.exe
O9 - Extra 'Tools' menuitem: Stop Pub - {10954C80-4F0F-11d3-B17C-00C0DFE39736} - C:\Program Files\JCA2000\StopPub\StopPub.exe
O9 - Extra button: (no name) - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O9 - Extra 'Tools' menuitem: Spybot - Search & Destroy Configuration - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O15 - Trusted Zone: http://www.secuser.com
O16 - DPF: {029FDBA6-3547-11D7-AA4C-0050BF051A00} (Rawflow ICD Client) - http://s.tf1.fr/mmdia/static/rawflow/clients/5.3.1.0/Rawflow.cab
O16 - DPF: {0EB0E74A-2A76-4AB3-A7FB-9BD8C29F7F75} (CKAVWebScan Object) - https://www.kaspersky.fr/?domain=webscanner.kaspersky.fr
O16 - DPF: {1D6E056F-D1BB-40F6-88E4-11EE98056FD2} (Oberon ActiveX Game Host) - http://jeuxenligne.orange.fr/Gameshell/GameHost/1.0/OberonGameHost.cab
O16 - DPF: {4F1E5B1A-2A80-42CA-8532-2D05CB959537} (MSN Photo Upload Tool) - http://gfx1.hotmail.com/mail/w2/resources/MSNPUpld.cab
O16 - DPF: {74D05D43-3236-11D4-BDCD-00C04F9A3B61} (HouseCall Control) - https://www.trendmicro.com/en_us/forHome/products/housecall.html
O16 - DPF: {BFF1950D-B1B4-4AE8-B842-B2CCF06D9A1B} (Zylom Games Player) - http://game14.zylom.com/activex/zylomgamesplayer.cab
O16 - DPF: {C3F79A2B-B9B4-4A66-B012-3EE46475B072} (MessengerStatsClient Class) - http://messenger.zone.msn.com/binary/MessengerStatsPAClient.cab56907.cab
O16 - DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} (Shockwave Flash Object) - http://fpdownload2.macromedia.com/get/shockwave/cabs/flash/swflash.cab
O16 - DPF: {DF780F87-FF2B-4DF8-92D0-73DB16A1543A} -
O16 - DPF: {FC4CAF5F-91BD-4DD9-ADC1-F3C737E37BC4} (CPlayFirstSweetopiaControl Object) - file:///C:/Documents%20and%20Settings/HP_Propriétaire/Local%20Settings/Application%20Data/Oberon%20Media/Oberon%20Games%20Host/Sweetopia.1.0.0.46.cab
O23 - Service: ANIWZCSd Service (ANIWZCSdService) - Alpha Networks Inc. - C:\Program Files\ANI\ANIWZCS2 Service\ANIWZCSdS.exe
O23 - Service: avast! iAVS4 Control Service (aswUpdSv) - ALWIL Software - C:\Program Files\Alwil Software\Avast4\aswUpdSv.exe
O23 - Service: avast! Antivirus - ALWIL Software - C:\Program Files\Alwil Software\Avast4\ashServ.exe
O23 - Service: avast! Mail Scanner - ALWIL Software - C:\Program Files\Alwil Software\Avast4\ashMaiSv.exe
O23 - Service: avast! Web Scanner - ALWIL Software - C:\Program Files\Alwil Software\Avast4\ashWebSv.exe
O23 - Service: France Telecom Routing Table Service (FTRTSVC) - France Telecom - C:\WINDOWS\System32\FTRTSVC.exe
O23 - Service: iPod Service (iPodService) - Apple Computer, Inc. - C:\Program Files\iPod\bin\iPodService.exe
O23 - Service: NVIDIA Display Driver Service (NVSvc) - NVIDIA Corporation - C:\WINDOWS\system32\nvsvc32.exe
O23 - Service: Pml Driver HPZ12 - HP - C:\WINDOWS\system32\HPZipm12.exe
0
Utilisateur anonyme
 
Re ,

As tu encore des alertes d'Avast ?

++
0
tibo2355 Messages postés 14 Statut Membre 2
 
non, mais je fais faire un scan avec avast pour voir si j'en est encore
0
tibo2355 Messages postés 14 Statut Membre 2
 
j'ai fais un scan avec avast , et plus alerte

qu'est que c fini ? il sont vraiment parti??
0
Utilisateur anonyme
 
Re ,

Très bien.

Fait ceci :

_Maintenant , nous allons supprimer les logiciels de désinfection que je t'ai fait téléchargé.
En effet , s'en servir est dangereux pour le pc si l'on ne s'y connais pas.
De plus ils sont mis régulièrement à jours.

→ Ferme toutes les applications en cours, puis télécharge ToolsCleaner2 sur ton Bureau.

→ Double clique sur ToolsCleaner2.exe >
→ Clique sur .Recherche
→ puis sur Suppression quand la liste est trouvée.
→ Poste le rapport (TCleaner.txt) qui se trouve à la racine de ton disque dur (C:\).

(CTRL+A Pour tout selectionner , CTRL+C pour copier et CTRL+V pour coller )

Note : ton bureau RISQUE de disparaître, c'est normal. S'il n'apparaît pas à la fin du scan, fais la manip suivante :

CTRL+ALT+SUPP pour ouvrir le Gestionnaire des tâches.
Puis rends toi à l'onglet "Processus". Clique en haut à gauche sur Fichiers et choisis "Exécuter"

Tape explorer.exe et valide. Cela fera re-apparaître le Bureau

Tuto : http://www.commentcamarche.net/faq/sujet 8341 toolscleaner suppression des fix de force brute ( merci espion3004 )

++
0