Virus myspace sur msn

Fermé
vi3t75 - 9 déc. 2008 à 14:16
 Utilisateur anonyme - 9 déc. 2008 à 17:27
Bonjour,
j ai recu un virus via msn me demandant de telecharger une foto pour myspace, depuis tous mes contacts le recoive et je n ai plus de connexion internet.
le rapport hijackthis:
Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 14:04:26, on 09/12/2008
Platform: Windows Vista SP1 (WinNT 6.00.1905)
MSIE: Internet Explorer v7.00 (7.00.6001.18000)
Boot mode: Normal

Running processes:
C:\Windows\system32\Dwm.exe
C:\Windows\Explorer.EXE
C:\Windows\system32\taskeng.exe
C:\Program Files\SweetIM\Messenger\SweetIM.exe
C:\Program Files\Common Files\Corel\Corel PhotoDownloader\Corel Photo Downloader.exe
C:\Program Files\Corel\Corel Paint Shop Pro Photo X2\CorelIOMonitor.exe
C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe
C:\Program Files\Micro Application\12 DICOS Indispensables\MediaDICO12.EXE
C:\Program Files\Windows Live\Messenger\msnmsgr.exe
C:\WINDOWS\ehome\ehtray.exe
C:\Windows\ehome\ehmsas.exe
C:\Program Files\Neuf\Media Center\MediaCenter.exe
C:\Program Files\Micro Application\12 DICOS Indispensables\Rac12.EXE
C:\Program Files\Windows Media Player\wmpnscfg.exe
C:\Program Files\Neuf\Media Center\httpd\httpd.exe
C:\Program Files\Neuf\Media Center\httpd\httpd.exe
C:\Program Files\Mozilla Firefox\firefox.exe
C:\Windows\System32\mobsync.exe
C:\Users\myriam\Desktop\HijackThis.exe

O23 - Service: Planificateur LiveUpdate automatique - Symantec Corporation - C:\Program Files\Symantec\LiveUpdate\ALUSchedulerSvc.exe
O23 - Service: ProtexisLicensing - Unknown owner - C:\Windows\system32\PSIService.exe
O23 - Service: Protexis Licensing V2 (PSI_SVC_2) - Protexis Inc. - C:\Program Files\Common Files\Protexis\License Service\PsiService_2.exe
O23 - Service: RoxMediaDB9 - Sonic Solutions - c:\Program Files\Common Files\Roxio Shared\9.0\SharedCOM\RoxMediaDB9.exe
O23 - Service: stllssvr - MicroVision Development, Inc. - c:\Program Files\Common Files\SureThing Shared\stllssvr.exe
A voir également:

3 réponses

Utilisateur anonyme
9 déc. 2008 à 15:14
Allez, un de plus!! ;))

Salut!!

Désactive l'UAC le temps de ta désinfection, on le réactivera après
:
http://www.commentcamarche.net/faq/sujet 8343 vista desactiver l uac

Télécharge MSNFix.zip (de !aur3n7) sur ton Bureau:

http://sosvirus.changelog.fr/MSNFix.zip

Décompresse-le (Clic droit >> Extraire ici).
Clique droit sur le fichier MSNFix.bat et choisis Exécuter en tant qu'administrateur.
Exécute l'option R.
Si l'infection est détectée, un message l'indiquera et il suffira de presser une touche pour lancer le nettoyage.

Note : Si une erreur de suppression est détectée un message s'affichera demandant de redémarrer l'ordinateur afin de terminer les opérations. Dans ce cas il suffit de redémarrer.

Le rapport sera enregistré dans le même dossier que MSNFix sous forme date_heure.t, poste-le dans ta prochaine réponse.
1
oui merci je l ai telechargé voici le rapport:


[C:\Windows\system32\WindowsAnytimeUpgrade.exe] 626F198768F67A0FEB3AD909E638F551
[C:\Windows\system32\WinFXDocObj.exe] 14F0C0AAEF23C111371F808A6911E998
[C:\Windows\system32\wininit.exe] 101BA3EA053480BB5D957EF37C06B5ED
[C:\Windows\system32\winload.exe] BB82A604FCC5A930696962A27F1C9760
[C:\Windows\system32\winlogon.exe] C2610B6BDBEFC053BBDAB4F1B965CB24
[C:\Windows\system32\winresume.exe] E3770E54B0864B93DF82C2E35F5AB20D
[C:\Windows\system32\winrs.exe] 24AB1404A479AFEEC112079D9AF12A0D
[C:\Windows\system32\winrshost.exe] 8F26CCF26436315033192266A7135FF5
[C:\Windows\system32\WinSAT.exe] 550E83EEE739D1C25A49E70F038EC816
[C:\Windows\system32\WINSPOOL.EXE] 0B4B94B78123E8035B84105BC024F9F8
[C:\Windows\system32\winver.exe] EEE1CE328E50D4391D9CE7624286CEB0

(le dossier s appel temp.txt je ne sais pas si c est celui là que tu voulais)
sinon:


read file error: C:\Users\myriam\AppData\Local\Temp\winlogon.exe, Le fichier spécifié est introuvable.
read file error: C:\Users\myriam\AppData\Local\Temp\services.exe, Le fichier spécifié est introuvable.
read file error: C:\Windows\system32\cftmon.exe, Le fichier spécifié est introuvable.
read file error: C:\Users\myriam\AppData\Local\Temp\winlogon.exe, Le fichier spécifié est introuvable.
read file error: C:\Users\myriam\AppData\Local\Temp\services.exe, Le fichier spécifié est introuvable.
read file error: C:\Windows\system32\cftmon.exe, Le fichier spécifié est introuvable.

( celui là est dans le dossier catchme.log )


.NET CLR Data
.NET CLR Networking
.NET Data Provider for Oracle
.NET Data Provider for SqlServer
.NETFramework
ACPI
adp94xx
adpahci
adpu160m
adpu320
adsi
AegisP
AeLookupSvc
AFD
agp440
aic78xx
ALG
aliide
amdagp
amdide
AmdK7
AmdK8
Appinfo
arc
arcsas
aswMonFlt
aswRdr
aswTdi
aswUpdSv
AsyncMac
atapi
AudioEndpointBuilder
Audiosrv
avast! Antivirus
avast! Mail Scanner
avast! Web Scanner
BattC
Beep
BFE
BITS
blbdrive
bowser
BrFiltLo
BrFiltUp
Browser
Brserid
BrSerWdm
BrUsbMdm
BrUsbSer
BTHMODEM
BTKRNL
BTWUSB
cdfs
cdrom
CertPropSvc
circlass
CLFS
clr_optimization_v2.0.50727_32
CLTNetCnService
cmdide
Compbatt
COMSysApp
crcdisk
Crusoe
crypt32
CryptSvc
DCLocator
DcomLaunch
DfsC
DFSR
Dhcp
disk
Dnscache
dot3svc
DPS
drmkaud
DXGKrnl
E1G60
EapHost
Ecache
ehRecvr
ehSched
ehstart
elxstor
EmdCache
EMDMgmt
ESENT
Eventlog
EventSystem
exfat
fastfat
fdc
fdPHost
FDResPub
FileInfo
Filetrace
flpydisk
FltMgr
FontCache3.0.0.0
Fs_Rec
gagp30kx
GEARAspiWDM
gpsvc
gusvc
HdAudAddService
HDAudBus
HidBth
HidIr
hidserv
HidUsb
hkmsvc
HpCISSs
HTTP
i2omp
i8042prt
ialm
iaStorV
IDriverT
idsvc
igfx
iirsp
IKEEXT
inetaccs
IntcAzAudAddService
intelide
intelppm
IPBusEnum
IpFilterDriver
iphlpsvc
IpInIp
IPMIDRV
IPNAT
iPod Service
IRENUM
isapnp
iScsiPrt
iteatapi
iteraid
kbdclass
kbdhid
KeyIso
KSecDD
KtmRm
LanmanServer
LanmanWorkstation
ldap
LightScribeService
LiveUpdate
LiveUpdate Notice Ex
LiveUpdate Notice Service
lltdio
lltdsvc
lmhosts
Lsa
LSI_FC
LSI_SAS
LSI_SCSI
luafv
lxcy_device
Mcx2Svc
MDM
megasas
Messenger
MMCSS
Modem
monitor
mouclass
mouhid
MountMgr
mpio
mpsdrv
MpsSvc
Mraid35x
MRxDAV
mrxsmb
mrxsmb10
mrxsmb20
msahci
msdsm
MSDTC
MSDTC Bridge 3.0.0.0
Msfs
msisadrv
MSiSCSI
msiserver
MSKSSRV
MSPCLOCK
MSPQM
MsRPC
MSSCNTRS
mssmbios
MSTEE
Mup
napagent
NativeWifiP
NDIS
NdisTapi
Ndisuio
NdisWan
NDProxy
NetBIOS
netbt
Netlogon
Netman
netprofm
NetTcpPortSharing
nfrd960
NlaSvc
Npfs
nsi
nsiproxy
NTDS
Ntfs
ntrigdigi
Null
nvraid
nvstor
nv_agp
NwlnkFlt
NwlnkFwd
ohci1394
p2pimsvc
p2psvc
PAC207
Parport
partmgr
Parvdm
PcaSvc
pci
pciide
pcmcia
PEAUTH
PerfDisk
PerfNet
PerfOS
PerfProc
pla
Planificateur LiveUpdate automatique
PlugPlay
PNRPAutoReg
PNRPsvc
PolicyAgent
PortProxy
PptpMiniport
Processor
ProfSvc
ProtectedStorage
ProtexisLicensing
Ps2
PSched
PSI_SVC_2
PxHelp20
ql2300
ql40xx
QWAVE
QWAVEdrv
RapiMgr
RasAcd
RasAuto
Rasl2tp
RasMan
RasPppoe
RasSstp
rdbss
RDPCDD
RDPDD
rdpdr
RDPENCDD
RDPNP
RDPWD
RemoteAccess
RemoteRegistry
RoxMediaDB9
RpcLocator
RpcSs
rspndr
RTL8169
RTL8187
RTLWUSB
SamSs
sbp2port
SCardSvr
Schedule
SCMNdisP
SCPolicySvc
SDRSVC
secdrv
seclogon
SENS
Serenum
Serial
sermouse
ServiceModelEndpoint 3.0.0.0
ServiceModelOperation 3.0.0.0
ServiceModelService 3.0.0.0
SessionEnv
sffdisk
sffp_mmc
sffp_sd
sfloppy
SharedAccess
ShellHWDetection
sisagp
SiSRaid2
SiSRaid4
slsvc
SLUINotify
Smb
SMSvcHost 3.0.0.0
SNMPTRAP
spldr
Spooler
sptd
srv
srv2
srvnet
sscdbus
sscdmdfl
sscdmdm
SSDPSRV
SstpSvc
StarOpen
stisvc
stllssvr
swenum
swprv
Symc8xx
Sym_hi
Sym_u3
SysMain
TabletInputService
TapiSrv
TBS
Tcpip
Tcpip6
tcpipreg
TDPIPE
TDTCP
tdx
TermDD
TermService
Themes
THREADORDER
TrkWks
TrustedInstaller
TSDDD
tssecsrv
tunmp
tunnel
uagp35
udfs
UGatherer
UGTHRSVC
UI0Detect
uliagpkx
uliahci
UlSata
ulsata2
umbus
upnphost
usb
usbbus
usbccgp
usbcir
UsbDiag
usbehci
usbhub
USBModem
usbohci
usbprint
usbscan
USBSTOR
usbuhci
usnjsvc
UxSms
vds
vga
VgaSave
viaagp
ViaC7
viaide
volmgr
volmgrx
volsnap
vsmraid
VSS
VxD
W32Time
W3SVC
w800bus
w800mdfl
w800mdm
w800obex
WacomPen
Wanarp
Wanarpv6
WcesComm
wcncsvc
WcsPlugInService
Wd
Wdf01000
WdiServiceHost
WdiSystemHost
WebClient
Wecsvc
wercplsupport
WerSvc
WinDefend
Windows Workflow Foundation 3.0.0.0
WinHttpAutoProxySvc
Winmgmt
WinRM
Winsock
WinSock2
winusb
Wlansvc
WLSetupSvc
WmiAcpi
WmiApRpl
wmiApSrv
WMPNetworkSvc
WPCSvc
WPDBusEnum
ws2ifsl
wscsvc
WSearch
WSearchIdxPi
wuauserv
WUDFRd
wudfsvc
xmlprov
z520bus
{166F2D32-B4A7-464E-9ED9-961BD4BFE17F}
{BD53F189-01C2-4516-8AF0-5BE9FC614068}
{BE59E5D5-331D-4E11-9511-0097DDDBF2BE}

( et lui c est svc.txt )
suis debutant excuses moi si je me suis trompé peut etre....
0
Utilisateur anonyme
9 déc. 2008 à 16:57
Ok!! On va voir:

Télécharge malwarebytes

Installe-le en veillant bien à ce que la case de mise à jour soit cochée en fin d'installation.

Lance-le et après la mise à jour, coche la case "Examen Rapide".

Après le scan, si le programme trouve quelque chose, clique sur "Voir les résultats" puis sur "Supprimer la sélection".

Si MBAM te demande de rebooter pour finaliser la suppression, accepte.


Poste ensuite le rapport généré dans ta prochaine réponse. Et fais suivre d'un log hijackthis tout frais.
0
voici donc le raport mbam:


Malwarebytes' Anti-Malware 1.31
Version de la base de données: 1478
Windows 6.0.6001 Service Pack 1

09/12/2008 17:07:00
mbam-log-2008-12-09 (17-07-00).txt

Type de recherche: Examen rapide
Eléments examinés: 48341
Temps écoulé: 3 minute(s), 58 second(s)

Processus mémoire infecté(s): 0
Module(s) mémoire infecté(s): 0
Clé(s) du Registre infectée(s): 35
Valeur(s) du Registre infectée(s): 2
Elément(s) de données du Registre infecté(s): 0
Dossier(s) infecté(s): 4
Fichier(s) infecté(s): 17

Processus mémoire infecté(s):
(Aucun élément nuisible détecté)

Module(s) mémoire infecté(s):
(Aucun élément nuisible détecté)

Clé(s) du Registre infectée(s):
HKEY_CLASSES_ROOT\acm.acmfactory (Adware.WhenUSave) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\acm.acmfactory.1 (Adware.WhenUSave) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\Interface\{43382522-a846-46f4-ac57-1f71ae6e1086} (Adware.WhenUSave) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\Interface\{572fb162-c0ba-4edf-8cff-e3846153b9b0} (Adware.WhenUSave) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\Interface\{72a836d1-bc00-43c0-a941-17960e4fb842} (Adware.WhenUSave) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{0656a137-b161-cadd-9777-e37a75727e78} (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{0b682cc1-fb40-4006-a5dd-99edd3c9095d} (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{0e1230f8-ea50-42a9-983c-d22abc2eeb4c} (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{9dd4258a-7138-49c4-8d34-587879a5c7a4} (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{b8c0220d-763d-49a4-95f4-61dfdec66ee6} (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{c3bcc488-1ae7-11d4-ab82-0010a4ec2338} (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{a9aae1ab-9688-42c5-86f5-c12f6b9015ad} (Adware.WhenUSave) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\Typelib\{df901432-1b9f-4f5b-9e56-301c553f9095} (Adware.WhenUSave) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\AppID\{127df9b4-d75d-44a6-af78-8c3a8ceb03db} (Adware.WhenUSave) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{9dd4258a-7138-49c4-8d34-587879a5c7a4} (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{b8c0220d-763d-49a4-95f4-61dfdec66ee6} (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{c3bcc488-1ae7-11d4-ab82-0010a4ec2338} (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{000000da-0786-4633-87c6-1aa7a4429ef1} (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\logons (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\typelib (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\HOL5_VXIEWER.FULL.1 (Trojan.FakeAlert) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Classes\applications\accessdiver.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\fwbd (Trojan.FakeAlert) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\HolLol (Trojan.FakeAlert) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Inet Delivery (Trojan.FakeAlert) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\mslagent (Trojan.FakeAlert) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorertoolbar (Trojan.FakeAlert) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Golden Palace Casino NEW (Trojan.DNSChanger) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SYSTEM\currentcontrolset\Services\iTunesMusic (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SYSTEM\currentcontrolset\Services\rdriv (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\mwc (Malware.Trace) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\SaveNow (Adware.WhenUSave) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\WhenUSave (Adware.WhenUSave) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\AppID\ACM.DLL (Adware.WhenUSave) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\WUSN.1 (Adware.WhenUSave) -> Quarantined and deleted successfully.

Valeur(s) du Registre infectée(s):
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler\{0656a137-b161-cadd-9777-e37a75727e78} (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\SystemCheck2 (Trojan.Agent) -> Quarantined and deleted successfully.

Elément(s) de données du Registre infecté(s):
(Aucun élément nuisible détecté)

Dossier(s) infecté(s):
C:\Program Files\Save (Adware.WhenUSave) -> Quarantined and deleted successfully.
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\WhenU (Adware.WhenUSave) -> Quarantined and deleted successfully.
C:\Users\myriam\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\WhenU (Adware.WhenUSave) -> Quarantined and deleted successfully.
C:\Users\myriam\Desktopvirii (Fake.Dropped.Malware) -> Quarantined and deleted successfully.

Fichier(s) infecté(s):
C:\Program Files\Save\ffext.mod (Adware.WhenUSave) -> Quarantined and deleted successfully.
C:\Program Files\Save\save.cch (Adware.WhenUSave) -> Quarantined and deleted successfully.
C:\Program Files\Save\save.db (Adware.WhenUSave) -> Quarantined and deleted successfully.
C:\Program Files\Save\save.htm (Adware.WhenUSave) -> Quarantined and deleted successfully.
C:\Program Files\Save\store.db (Adware.WhenUSave) -> Quarantined and deleted successfully.
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\WhenU\Customer Support.lnk (Adware.WhenUSave) -> Quarantined and deleted successfully.
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\WhenU\Uninstall Instructions.lnk (Adware.WhenUSave) -> Quarantined and deleted successfully.
C:\Users\myriam\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\WhenU\Learn More About WhenU Save.url (Adware.WhenUSave) -> Quarantined and deleted successfully.
C:\Users\myriam\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\WhenU\Learn More About WhenU SaveNow.url (Adware.WhenUSave) -> Quarantined and deleted successfully.
C:\Users\myriam\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\WhenU\WhenU.com Website.url (Adware.WhenUSave) -> Quarantined and deleted successfully.
C:\Users\myriam\Desktopvirii\Trojan-Downloader.Win32.Agent.bl.exe (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
C:\Users\myriam\Desktopvirii\Trojan-Downloader.Win32.Agent.p.exe (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
C:\Users\myriam\Desktopvirii\Trojan-Downloader.Win32.Agent.r.exe (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
C:\Users\myriam\Desktopvirii\Trojan-Downloader.Win32.Agent.t.exe (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
C:\Users\myriam\Desktopvirii\Trojan-Downloader.Win32.Agent.v.exe (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
C:\Program Files\eoRezo (Rogue.Eorezo) -> Delete on reboot.
C:\Users\myriam\Desktopblackbird.jpg (Fake.Dropped.Malware) -> Quarantined and deleted successfully.


et celui de hijackthis:


Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 17:12:58, on 09/12/2008
Platform: Windows Vista SP1 (WinNT 6.00.1905)
MSIE: Internet Explorer v7.00 (7.00.6001.18000)
Boot mode: Normal

Running processes:
C:\Windows\system32\Dwm.exe
C:\Windows\Explorer.EXE
C:\Windows\system32\taskeng.exe
C:\Program Files\SweetIM\Messenger\SweetIM.exe
C:\Program Files\Corel\Corel Paint Shop Pro Photo X2\CorelIOMonitor.exe
C:\Program Files\Adobe\Reader 8.0\Reader\reader_sl.exe
C:\Program Files\Windows Live\Messenger\msnmsgr.exe
C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe
C:\Program Files\Windows Media Player\wmpnscfg.exe
C:\Windows\System32\mobsync.exe
C:\Windows\system32\NOTEPAD.EXE
C:\Users\myriam\Desktop\HijackThis.exe

R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = https://www.msn.com/fr-fr
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = https://www.bing.com/?toHttps=1&redig=5FC791212101479BAFBE1A679848B1AF
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://neufportail.fr/
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = https://www.msn.com/fr-fr
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = https://actus.sfr.fr
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = https://www.bing.com/?toHttps=1&redig=5FC791212101479BAFBE1A679848B1AF
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = https://home.sweetim.com/
R0 - HKLM\Software\Microsoft\Internet Explorer\Search,SearchAssistant = https://actus.sfr.fr
R0 - HKLM\Software\Microsoft\Internet Explorer\Search,CustomizeSearch =
R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName =
R3 - URLSearchHook: Yahoo! Toolbar avec bloqueur de fenêtres pop-up - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - (no file)
R3 - URLSearchHook: SweetIM ToolbarURLSearchHook Class - {EEE6C35D-6118-11DC-9C72-001320C79847} - C:\Program Files\SweetIM\Toolbars\Internet Explorer\mgHelper.dll
O1 - Hosts: ::1 localhost
O2 - BHO: Aide pour le lien d'Adobe PDF Reader - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Common Files\Adobe\Acrobat\ActiveX\AcroIEHelper.dll
O2 - BHO: EoRezoBHO - {64F56FC1-1272-44CD-BA6E-39723696E350} - C:\Program Files\eoRezo\EoAdv\EoRezoBHO.dll
O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre1.6.0_01\bin\ssv.dll
O2 - BHO: Programme d'aide de l'Assistant de connexion Windows Live - {9030D464-4C02-4ABF-8ECC-5164760863C6} - C:\Program Files\Common Files\Microsoft Shared\Windows Live\WindowsLiveLogin.dll
O2 - BHO: Google Toolbar Helper - {AA58ED58-01DD-4d91-8333-CF10577473F7} - c:\program files\google\googletoolbar1.dll
O2 - BHO: Google Toolbar Notifier BHO - {AF69DE43-7D58-4638-B6FA-CE66B5AD205D} - C:\Program Files\Google\GoogleToolbarNotifier\4.1.805.4472\swg.dll
O2 - BHO: Windows Live Toolbar Helper - {BDBD1DAD-C946-4A17-ADC1-64B5B4FF55D0} - C:\Program Files\Windows Live Toolbar\msntb.dll
O2 - BHO: SWEETIE - {EEE6C35C-6118-11DC-9C72-001320C79847} - C:\Program Files\SweetIM\Toolbars\Internet Explorer\mgToolbarIE.dll
O3 - Toolbar: Copernic Agent - {F2E259E8-0FC8-438C-A6E0-342DD80FA53E} - C:\Program Files\Copernic Agent\CopernicAgentExt.dll
O3 - Toolbar: &Google - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - c:\program files\google\googletoolbar1.dll
O3 - Toolbar: Windows Live Toolbar - {BDAD1DAD-C946-4A17-ADC1-64B5B4FF55D0} - C:\Program Files\Windows Live Toolbar\msntb.dll
O3 - Toolbar: SweetIM Toolbar for Internet Explorer - {EEE6C35B-6118-11DC-9C72-001320C79847} - C:\Program Files\SweetIM\Toolbars\Internet Explorer\mgToolbarIE.dll
O3 - Toolbar: Veoh Browser Plug-in - {D0943516-5076-4020-A3B5-AEFAF26AB263} - C:\Program Files\Veoh Networks\Veoh\Plugins\reg\VeohToolbar.dll
O4 - HKLM\..\Run: [SweetIM] C:\Program Files\SweetIM\Messenger\SweetIM.exe
O4 - HKLM\..\Run: [Corel File Shell Monitor] C:\Program Files\Corel\Corel Paint Shop Pro Photo X2\CorelIOMonitor.exe
O4 - HKLM\..\Run: [Adobe Reader Speed Launcher] "C:\Program Files\Adobe\Reader 8.0\Reader\Reader_sl.exe"
O4 - HKLM\..\Run: [Corel Photo Downloader] "C:\Program Files\Common Files\Corel\Corel PhotoDownloader\Corel Photo Downloader.exe" -startup
O4 - HKLM\..\RunOnce: [Launcher] %WINDIR%\SMINST\launcher.exe
O4 - HKCU\..\Run: [swg] C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe
O4 - HKCU\..\Run: [MediaDico] C:\Program Files\Micro Application\12 DICOS Indispensables\LanceMediaDICO12.exe Lancement
O4 - HKCU\..\Run: [msnmsgr] "C:\Program Files\Windows Live\Messenger\msnmsgr.exe" /background
O4 - HKCU\..\Run: [Neuf Media Center] "C:\Program Files\Neuf\Media Center\MediaCenter.exe"
O4 - HKCU\..\Run: [ccleaner] "C:\Program Files\CCleaner\ccleaner.exe" /AUTO
O4 - HKCU\..\Run: [ISUSPM Startup] C:\PROGRA~1\COMMON~1\INSTAL~1\UPDATE~1\ISUSPM.exe -startup
O4 - HKCU\..\Run: [Veoh] "C:\Program Files\Veoh Networks\Veoh\VeohClient.exe" /VeohHide
O4 - HKCU\..\Run: [WMPNSCFG] C:\Program Files\Windows Media Player\WMPNSCFG.exe
O4 - HKUS\S-1-5-19\..\Run: [Sidebar] %ProgramFiles%\Windows Sidebar\Sidebar.exe /detectMem (User 'SERVICE LOCAL')
O4 - HKUS\S-1-5-19\..\Run: [WindowsWelcomeCenter] rundll32.exe oobefldr.dll,ShowWelcomeCenter (User 'SERVICE LOCAL')
O4 - HKUS\S-1-5-20\..\Run: [Sidebar] %ProgramFiles%\Windows Sidebar\Sidebar.exe /detectMem (User 'SERVICE RÉSEAU')
O4 - Global Startup: Microsoft Office.MSNFix
O8 - Extra context menu item: Envoyer à &Bluetooth - C:\Program Files\WIDCOMM\Logiciel Bluetooth\btsendto_ie_ctx.htm
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_01\bin\ssv.dll
O9 - Extra 'Tools' menuitem: Console Java (Sun) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_01\bin\ssv.dll
O9 - Extra button: (no name) - {193B17B0-7C9F-4D5B-AEAB-8D3605EFC084} - C:\PROGRA~1\COPERN~1\COPERN~1.EXE
O9 - Extra 'Tools' menuitem: Démarrer Copernic Agent - {193B17B0-7C9F-4D5B-AEAB-8D3605EFC084} - C:\PROGRA~1\COPERN~1\COPERN~1.EXE
O9 - Extra button: Ajout Direct - {219C3416-8CB2-491a-A3C7-D9FCDDC9D600} - C:\Program Files\Windows Live\Writer\WriterBrowserExtension.dll
O9 - Extra 'Tools' menuitem: &Ajout Direct dans Windows Live Writer - {219C3416-8CB2-491a-A3C7-D9FCDDC9D600} - C:\Program Files\Windows Live\Writer\WriterBrowserExtension.dll
O9 - Extra button: Copernic Agent - {688DC797-DC11-46A7-9F1B-445F4F58CE6E} - C:\PROGRA~1\COPERN~1\COPERN~1.EXE
O13 - Gopher Prefix:
O16 - DPF: {0CCA191D-13A6-4E29-B746-314DEE697D83} (Facebook Photo Uploader 5 Control) - http://upload.facebook.com/controls/2008.10.10_v5.5.8/FacebookPhotoUploader5.cab
O16 - DPF: {4F1E5B1A-2A80-42CA-8532-2D05CB959537} (MSN Photo Upload Tool) - http://gfx1.hotmail.com/mail/w3/pr01/resources/VistaMSNPUpldfr-fr.cab
O16 - DPF: {6E5E167B-1566-4316-B27F-0DDAB3484CF7} (Image Uploader Control) - http://www.fotodiscount.com/infos/migration.cfm
O16 - DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} (Shockwave Flash Object) - http://fpdownload2.macromedia.com/get/shockwave/cabs/flash/swflash.cab
O23 - Service: avast! iAVS4 Control Service (aswUpdSv) - ALWIL Software - C:\Program Files\Alwil Software\Avast4\aswUpdSv.exe
O23 - Service: avast! Antivirus - ALWIL Software - C:\Program Files\Alwil Software\Avast4\ashServ.exe
O23 - Service: avast! Mail Scanner - ALWIL Software - C:\Program Files\Alwil Software\Avast4\ashMaiSv.exe
O23 - Service: avast! Web Scanner - ALWIL Software - C:\Program Files\Alwil Software\Avast4\ashWebSv.exe
O23 - Service: Symantec Lic NetConnect service (CLTNetCnService) - Unknown owner - C:\Program Files\Common Files\Symantec Shared\ccSvcHst.exe (file missing)
O23 - Service: Google Updater Service (gusvc) - Google - C:\Program Files\Google\Common\Google Updater\GoogleUpdaterService.exe
O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Common Files\InstallShield\Driver\1150\Intel 32\IDriverT.exe
O23 - Service: Service de l'iPod (iPod Service) - Apple Inc. - C:\Program Files\iPod\bin\iPodService.exe
O23 - Service: LightScribeService Direct Disc Labeling Service (LightScribeService) - Hewlett-Packard Company - c:\Program Files\Common Files\LightScribe\LSSrvc.exe
O23 - Service: LiveUpdate - Symantec Corporation - C:\PROGRA~1\Symantec\LIVEUP~1\LUCOMS~1.EXE
O23 - Service: LiveUpdate Notice Service Ex (LiveUpdate Notice Ex) - Unknown owner - c:\Program Files\Common Files\Symantec Shared\ccSvcHst.exe (file missing)
O23 - Service: LiveUpdate Notice Service - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\PIF\{B8E1DD85-8582-4c61-B58F-2F227FCA9A08}\PIFSvc.exe
O23 - Service: lxcy_device - - C:\Windows\system32\lxcycoms.exe
O23 - Service: Planificateur LiveUpdate automatique - Symantec Corporation - C:\Program Files\Symantec\LiveUpdate\ALUSchedulerSvc.exe
O23 - Service: ProtexisLicensing - Unknown owner - C:\Windows\system32\PSIService.exe
O23 - Service: Protexis Licensing V2 (PSI_SVC_2) - Protexis Inc. - C:\Program Files\Common Files\Protexis\License Service\PsiService_2.exe
O23 - Service: RoxMediaDB9 - Sonic Solutions - c:\Program Files\Common Files\Roxio Shared\9.0\SharedCOM\RoxMediaDB9.exe
O23 - Service: stllssvr - MicroVision Development, Inc. - c:\Program Files\Common Files\SureThing Shared\stllssvr.exe
0
Utilisateur anonyme
9 déc. 2008 à 17:27
Relance MBAM, va dans quarantaine et supprime tout.

Fais ceci:

Télécharge CCleaner

Lors de l’installation, décoche l’option qui t’installerait la barre Yahoo


Va dans "Options">>"Avancé". Décoche la première ligne.

Va dans la section "Nettoyeur". Lance l'analyse. La liste créée, lance le nettoyage deux fois de suite afin d'obtenir 0bytes supprimé!

Ensuite dans "Registre", lance une recherche des erreurs. La liste créée, fais-les réparer.

/!\ A ce moment CCleaner te demande normalement de sauvegarder le registre, fais-le. /!\


Recommence ensuite le cycle Recherche/Réparation des erreurs jusqu'à n'en trouver aucune lors de la recherche.

0

Discussions similaires