Aller au contenu

Sangwa

Membres
  • Compteur de contenus

    9
  • Inscription

  • Dernière visite

Tout ce qui a été posté par Sangwa

  1. Oui, je me suis mal exprimé, mais j'ai bien suivi tes consignes, et j'ai désinstallé ma version 8 avant de télécharger la 10. Sujet passé en [Résolu]. Cette fois, c'est la bonne donc, excellent week-end et encore merciiii pour ton suivi Apollo ! A plus !
  2. Mince, flashé au moment de partir ! Huhu ! - Fichiers/dossiers Combofix supprimés + corbeille - Adobe Reader à jour - Java à jour, pas d'anciennes versions qui traînent - Flash à jour - Point de restauration créé Je dois faire autre chose ?
  3. Pour l'instant, pas de souci ! Mais il m'arrivait de naviguer pas mal de temps avant qu'une fenêtre de pub ne s'ouvre. Si jamais cela se produit, je reviendrai sur ce sujet pour l'indiquer. Apollo, merci mille fois pour ton aide précieuse, ta disponibilité et ta réactivité. Un problème solutionné en un jour alors que je m'y casse les dents depuis plusieurs semaines. Trop cool ! Bonne continuation, et bon week-end ! Merciiiiiiii.
  4. Re, Pour ce que je m'en rappelle, j'avais bien "dévacciné" les fichiers avant de désinstaller Spybot, histoire de minimiser mes actions. Mais bon, ça m'a servi de leçon, et je note tes recommandations. J'ai donc désinstallé Avast et installé Antivir, puis lancé un scan complet, ça été un peu long. Mais pas inutile ! Voici le rapport : Avira AntiVir Personal Report file date: vendredi 19 novembre 2010 14:28 Scanning for 3069524 virus strains and unwanted programs. The program is running as an unrestricted full version. Online services are available: Licensee : Avira AntiVir Personal - FREE Antivirus Serial number : 0000149996-ADJIE-0000001 Platform : Windows XP Windows version : (Service Pack 3) [5.1.2600] Boot mode : Normally booted Username : SYSTEM Computer name : SPOK Version information: BUILD.DAT : 10.0.0.592 31823 Bytes 09/08/2010 11:00:00 AVSCAN.EXE : 10.0.3.1 434344 Bytes 02/08/2010 15:09:56 AVSCAN.DLL : 10.0.3.0 46440 Bytes 01/04/2010 12:57:04 LUKE.DLL : 10.0.2.3 104296 Bytes 02/08/2010 15:10:00 LUKERES.DLL : 10.0.0.1 12648 Bytes 10/02/2010 23:40:49 VBASE000.VDF : 7.10.0.0 19875328 Bytes 06/11/2009 09:05:36 VBASE001.VDF : 7.10.1.0 1372672 Bytes 19/11/2009 19:27:49 VBASE002.VDF : 7.10.3.1 3143680 Bytes 20/01/2010 17:37:42 VBASE003.VDF : 7.10.3.75 996864 Bytes 26/01/2010 16:37:42 VBASE004.VDF : 7.10.4.203 1579008 Bytes 05/03/2010 11:29:03 VBASE005.VDF : 7.10.6.82 2494464 Bytes 15/04/2010 15:10:03 VBASE006.VDF : 7.10.7.218 2294784 Bytes 02/06/2010 15:10:04 VBASE007.VDF : 7.10.9.165 4840960 Bytes 23/07/2010 15:10:06 VBASE008.VDF : 7.10.11.133 3454464 Bytes 13/09/2010 13:23:15 VBASE009.VDF : 7.10.13.80 2265600 Bytes 02/11/2010 13:23:19 VBASE010.VDF : 7.10.13.81 2048 Bytes 02/11/2010 13:23:19 VBASE011.VDF : 7.10.13.82 2048 Bytes 02/11/2010 13:23:19 VBASE012.VDF : 7.10.13.83 2048 Bytes 02/11/2010 13:23:19 VBASE013.VDF : 7.10.13.116 147968 Bytes 04/11/2010 13:23:20 VBASE014.VDF : 7.10.13.147 146944 Bytes 07/11/2010 13:23:21 VBASE015.VDF : 7.10.13.180 123904 Bytes 09/11/2010 13:23:21 VBASE016.VDF : 7.10.13.211 122368 Bytes 11/11/2010 13:23:22 VBASE017.VDF : 7.10.13.243 147456 Bytes 15/11/2010 13:23:22 VBASE018.VDF : 7.10.14.15 142848 Bytes 17/11/2010 13:23:23 VBASE019.VDF : 7.10.14.41 134144 Bytes 19/11/2010 13:23:23 VBASE020.VDF : 7.10.14.42 2048 Bytes 19/11/2010 13:23:23 VBASE021.VDF : 7.10.14.43 2048 Bytes 19/11/2010 13:23:23 VBASE022.VDF : 7.10.14.44 2048 Bytes 19/11/2010 13:23:23 VBASE023.VDF : 7.10.14.45 2048 Bytes 19/11/2010 13:23:24 VBASE024.VDF : 7.10.14.46 2048 Bytes 19/11/2010 13:23:24 VBASE025.VDF : 7.10.14.47 2048 Bytes 19/11/2010 13:23:24 VBASE026.VDF : 7.10.14.48 2048 Bytes 19/11/2010 13:23:24 VBASE027.VDF : 7.10.14.49 2048 Bytes 19/11/2010 13:23:24 VBASE028.VDF : 7.10.14.50 2048 Bytes 19/11/2010 13:23:24 VBASE029.VDF : 7.10.14.51 2048 Bytes 19/11/2010 13:23:24 VBASE030.VDF : 7.10.14.52 2048 Bytes 19/11/2010 13:23:24 VBASE031.VDF : 7.10.14.53 2048 Bytes 19/11/2010 13:23:24 Engineversion : 8.2.4.98 AEVDF.DLL : 8.1.2.1 106868 Bytes 02/08/2010 15:09:54 AESCRIPT.DLL : 8.1.3.46 1364347 Bytes 19/11/2010 13:23:32 AESCN.DLL : 8.1.6.1 127347 Bytes 02/08/2010 15:09:53 AESBX.DLL : 8.1.3.1 254324 Bytes 02/08/2010 15:09:53 AERDL.DLL : 8.1.9.2 635252 Bytes 19/11/2010 13:23:31 AEPACK.DLL : 8.2.3.11 471416 Bytes 19/11/2010 13:23:30 AEOFFICE.DLL : 8.1.1.8 201081 Bytes 02/08/2010 15:09:52 AEHEUR.DLL : 8.1.2.41 3043703 Bytes 19/11/2010 13:23:29 AEHELP.DLL : 8.1.14.0 246134 Bytes 19/11/2010 13:23:27 AEGEN.DLL : 8.1.3.24 401781 Bytes 19/11/2010 13:23:26 AEEMU.DLL : 8.1.2.0 393588 Bytes 02/08/2010 15:09:49 AECORE.DLL : 8.1.17.0 196982 Bytes 19/11/2010 13:23:26 AEBB.DLL : 8.1.1.0 53618 Bytes 02/08/2010 15:09:48 AVWINLL.DLL : 10.0.0.0 19304 Bytes 02/08/2010 15:09:56 AVPREF.DLL : 10.0.0.0 44904 Bytes 02/08/2010 15:09:55 AVREP.DLL : 10.0.0.8 62209 Bytes 17/06/2010 14:27:13 AVREG.DLL : 10.0.3.2 53096 Bytes 02/08/2010 15:09:55 AVSCPLR.DLL : 10.0.3.1 83816 Bytes 02/08/2010 15:09:56 AVARKT.DLL : 10.0.0.14 227176 Bytes 02/08/2010 15:09:54 AVEVTLOG.DLL : 10.0.0.8 203112 Bytes 02/08/2010 15:09:55 SQLITE3.DLL : 3.6.19.0 355688 Bytes 17/06/2010 14:27:22 AVSMTP.DLL : 10.0.0.17 63848 Bytes 02/08/2010 15:09:56 NETNT.DLL : 10.0.0.0 11624 Bytes 17/06/2010 14:27:21 RCIMAGE.DLL : 10.0.0.26 2550120 Bytes 28/01/2010 13:10:20 RCTEXT.DLL : 10.0.58.0 97128 Bytes 02/08/2010 15:10:08 Configuration settings for the scan: Jobname.............................: Complete system scan Configuration file..................: C:\Program Files\Avira\AntiVir Desktop\sysscan.avp Logging.............................: low Primary action......................: interactive Secondary action....................: ignore Scan master boot sector.............: on Scan boot sector....................: on Boot sectors........................: C:, Process scan........................: on Extended process scan...............: on Scan registry.......................: on Search for rootkits.................: on Integrity checking of system files..: off Scan all files......................: All files Scan archives.......................: on Recursion depth.....................: 20 Smart extensions....................: on Macro heuristic.....................: on File heuristic......................: medium Start of the scan: vendredi 19 novembre 2010 14:28 Starting search for hidden objects. HKEY_USERS\S-1-5-20\Software\Microsoft\MediaPlayer\Preferences\backgroundscancompletedate [NOTE] The registry entry is invisible. HKEY_LOCAL_MACHINE\System\ControlSet002\Services\NtmsSvc\Config\Standalone\drivelist [NOTE] The registry entry is invisible. The scan of running processes will be started Scan process 'java.exe' - '98' Module(s) have been scanned Scan process 'WGC.exe' - '112' Module(s) have been scanned Scan process 'avscan.exe' - '68' Module(s) have been scanned Scan process 'avcenter.exe' - '63' Module(s) have been scanned Scan process 'wuauclt.exe' - '36' Module(s) have been scanned Scan process 'msdtc.exe' - '40' Module(s) have been scanned Scan process 'dllhost.exe' - '61' Module(s) have been scanned Scan process 'dllhost.exe' - '45' Module(s) have been scanned Scan process 'vssvc.exe' - '48' Module(s) have been scanned Scan process 'avgnt.exe' - '50' Module(s) have been scanned Scan process 'sched.exe' - '44' Module(s) have been scanned Scan process 'avshadow.exe' - '26' Module(s) have been scanned Scan process 'avguard.exe' - '56' Module(s) have been scanned Scan process 'plugin-container.exe' - '60' Module(s) have been scanned Scan process 'firefox.exe' - '140' Module(s) have been scanned Scan process 'cli.exe' - '152' Module(s) have been scanned Scan process 'FNPLicensingService.exe' - '15' Module(s) have been scanned Scan process 'WG111v3.exe' - '51' Module(s) have been scanned Scan process 'wlan111t.exe' - '35' Module(s) have been scanned Scan process 'WG111v3.exe' - '51' Module(s) have been scanned Scan process 'ctfmon.exe' - '25' Module(s) have been scanned Scan process 'DSAgnt.exe' - '74' Module(s) have been scanned Scan process 'hpztsb07.exe' - '20' Module(s) have been scanned Scan process 'Acrotray.exe' - '60' Module(s) have been scanned Scan process 'ICO.EXE' - '18' Module(s) have been scanned Scan process 'CLI.EXE' - '174' Module(s) have been scanned Scan process 'smax4pnp.exe' - '33' Module(s) have been scanned Scan process 'alg.exe' - '33' Module(s) have been scanned Scan process 'Explorer.EXE' - '106' Module(s) have been scanned Scan process 'WMPNetwk.exe' - '68' Module(s) have been scanned Scan process 'svchost.exe' - '39' Module(s) have been scanned Scan process 'svchost.exe' - '30' Module(s) have been scanned Scan process 'svchost.exe' - '30' Module(s) have been scanned Scan process 'jqs.exe' - '80' Module(s) have been scanned Scan process 'svchost.exe' - '34' Module(s) have been scanned Scan process 'mDNSResponder.exe' - '32' Module(s) have been scanned Scan process 'AppleMobileDeviceService.exe' - '25' Module(s) have been scanned Scan process 'svchost.exe' - '34' Module(s) have been scanned Scan process 'spoolsv.exe' - '71' Module(s) have been scanned Scan process 'Ati2evxx.exe' - '25' Module(s) have been scanned Scan process 'svchost.exe' - '54' Module(s) have been scanned Scan process 'svchost.exe' - '171' Module(s) have been scanned Scan process 'svchost.exe' - '39' Module(s) have been scanned Scan process 'svchost.exe' - '53' Module(s) have been scanned Scan process 'Ati2evxx.exe' - '23' Module(s) have been scanned Scan process 'lsass.exe' - '58' Module(s) have been scanned Scan process 'services.exe' - '36' Module(s) have been scanned Scan process 'winlogon.exe' - '77' Module(s) have been scanned Scan process 'csrss.exe' - '14' Module(s) have been scanned Scan process 'smss.exe' - '2' Module(s) have been scanned Starting master boot sector scan: Master boot sector HD0 [iNFO] No virus was found! Start scanning boot sectors: Boot sector 'C:\' [iNFO] No virus was found! Starting to scan executable files (registry). The registry was scanned ( '1827' files ). Starting the file scan: Begin scan in 'C:\' C:\Program Files\Winamp\Plugins\in_cdda.dll [DETECTION] Is the TR/Crypt.XPACK.Gen3 Trojan C:\System Volume Information\_restore{340C3340-2EBB-4324-859A-C37E85627171}\RP670\A0172364.exe [DETECTION] Is the TR/Dropper.Gen Trojan C:\System Volume Information\_restore{340C3340-2EBB-4324-859A-C37E85627171}\RP697\A0194569.exe [DETECTION] Is the TR/Trash.Gen Trojan C:\System Volume Information\_restore{340C3340-2EBB-4324-859A-C37E85627171}\RP697\A0194570.exe [DETECTION] Is the TR/Trash.Gen Trojan C:\System Volume Information\_restore{340C3340-2EBB-4324-859A-C37E85627171}\RP697\A0194571.exe [DETECTION] Is the TR/Trash.Gen Trojan C:\System Volume Information\_restore{340C3340-2EBB-4324-859A-C37E85627171}\RP697\A0194572.exe [DETECTION] Is the TR/Trash.Gen Trojan C:\System Volume Information\_restore{340C3340-2EBB-4324-859A-C37E85627171}\RP697\A0194573.exe [DETECTION] Is the TR/Trash.Gen Trojan C:\System Volume Information\_restore{340C3340-2EBB-4324-859A-C37E85627171}\RP697\A0194574.exe [DETECTION] Is the TR/Trash.Gen Trojan C:\System Volume Information\_restore{340C3340-2EBB-4324-859A-C37E85627171}\RP697\A0194575.exe [DETECTION] Is the TR/Trash.Gen Trojan C:\System Volume Information\_restore{340C3340-2EBB-4324-859A-C37E85627171}\RP697\A0194576.exe [DETECTION] Is the TR/Trash.Gen Trojan C:\System Volume Information\_restore{340C3340-2EBB-4324-859A-C37E85627171}\RP697\A0194577.exe [DETECTION] Is the TR/Trash.Gen Trojan C:\System Volume Information\_restore{340C3340-2EBB-4324-859A-C37E85627171}\RP697\A0194578.exe [DETECTION] Is the TR/Trash.Gen Trojan C:\System Volume Information\_restore{340C3340-2EBB-4324-859A-C37E85627171}\RP697\A0194579.exe [DETECTION] Is the TR/Trash.Gen Trojan C:\System Volume Information\_restore{340C3340-2EBB-4324-859A-C37E85627171}\RP697\A0194580.exe [DETECTION] Is the TR/Trash.Gen Trojan C:\System Volume Information\_restore{340C3340-2EBB-4324-859A-C37E85627171}\RP697\A0194581.exe [DETECTION] Is the TR/Trash.Gen Trojan C:\System Volume Information\_restore{340C3340-2EBB-4324-859A-C37E85627171}\RP697\A0194582.exe [DETECTION] Is the TR/Trash.Gen Trojan C:\System Volume Information\_restore{340C3340-2EBB-4324-859A-C37E85627171}\RP697\A0194583.exe [DETECTION] Is the TR/Trash.Gen Trojan C:\System Volume Information\_restore{340C3340-2EBB-4324-859A-C37E85627171}\RP697\A0194584.exe [DETECTION] Is the TR/Trash.Gen Trojan C:\System Volume Information\_restore{340C3340-2EBB-4324-859A-C37E85627171}\RP697\A0194585.exe [DETECTION] Is the TR/Trash.Gen Trojan C:\System Volume Information\_restore{340C3340-2EBB-4324-859A-C37E85627171}\RP697\A0194586.exe [DETECTION] Is the TR/Trash.Gen Trojan C:\System Volume Information\_restore{340C3340-2EBB-4324-859A-C37E85627171}\RP697\A0194587.exe [DETECTION] Is the TR/Trash.Gen Trojan C:\System Volume Information\_restore{340C3340-2EBB-4324-859A-C37E85627171}\RP697\A0194588.exe [DETECTION] Is the TR/Trash.Gen Trojan C:\System Volume Information\_restore{340C3340-2EBB-4324-859A-C37E85627171}\RP697\A0194589.exe [DETECTION] Is the TR/Trash.Gen Trojan C:\System Volume Information\_restore{340C3340-2EBB-4324-859A-C37E85627171}\RP697\A0194590.exe [DETECTION] Is the TR/Trash.Gen Trojan C:\System Volume Information\_restore{340C3340-2EBB-4324-859A-C37E85627171}\RP698\A0194918.exe [DETECTION] Is the TR/Trash.Gen Trojan C:\System Volume Information\_restore{340C3340-2EBB-4324-859A-C37E85627171}\RP699\A0205472.sys [DETECTION] Is the TR/Trash.Gen Trojan C:\System Volume Information\_restore{340C3340-2EBB-4324-859A-C37E85627171}\RP699\A0206588.sys [DETECTION] Is the TR/Trash.Gen Trojan Beginning disinfection: C:\System Volume Information\_restore{340C3340-2EBB-4324-859A-C37E85627171}\RP699\A0206588.sys [DETECTION] Is the TR/Trash.Gen Trojan [NOTE] The file was moved to the quarantine directory under the name '4e9b04bf.qua'. C:\System Volume Information\_restore{340C3340-2EBB-4324-859A-C37E85627171}\RP699\A0205472.sys [DETECTION] Is the TR/Trash.Gen Trojan [NOTE] The file was moved to the quarantine directory under the name '560c2b18.qua'. C:\System Volume Information\_restore{340C3340-2EBB-4324-859A-C37E85627171}\RP698\A0194918.exe [DETECTION] Is the TR/Trash.Gen Trojan [NOTE] The file was moved to the quarantine directory under the name '045c71f0.qua'. C:\System Volume Information\_restore{340C3340-2EBB-4324-859A-C37E85627171}\RP697\A0194590.exe [DETECTION] Is the TR/Trash.Gen Trojan [NOTE] The file was moved to the quarantine directory under the name '626b3e32.qua'. C:\System Volume Information\_restore{340C3340-2EBB-4324-859A-C37E85627171}\RP697\A0194589.exe [DETECTION] Is the TR/Trash.Gen Trojan [NOTE] The file was moved to the quarantine directory under the name '27ef130c.qua'. C:\System Volume Information\_restore{340C3340-2EBB-4324-859A-C37E85627171}\RP697\A0194588.exe [DETECTION] Is the TR/Trash.Gen Trojan [NOTE] The file was moved to the quarantine directory under the name '58f4216c.qua'. C:\System Volume Information\_restore{340C3340-2EBB-4324-859A-C37E85627171}\RP697\A0194587.exe [DETECTION] Is the TR/Trash.Gen Trojan [NOTE] The file was moved to the quarantine directory under the name '144c0d26.qua'. C:\System Volume Information\_restore{340C3340-2EBB-4324-859A-C37E85627171}\RP697\A0194586.exe [DETECTION] Is the TR/Trash.Gen Trojan [NOTE] The file was moved to the quarantine directory under the name '68544d76.qua'. C:\System Volume Information\_restore{340C3340-2EBB-4324-859A-C37E85627171}\RP697\A0194585.exe [DETECTION] Is the TR/Trash.Gen Trojan [NOTE] The file was moved to the quarantine directory under the name '450e623b.qua'. C:\System Volume Information\_restore{340C3340-2EBB-4324-859A-C37E85627171}\RP697\A0194584.exe [DETECTION] Is the TR/Trash.Gen Trojan [NOTE] The file was moved to the quarantine directory under the name '5c6659a1.qua'. C:\System Volume Information\_restore{340C3340-2EBB-4324-859A-C37E85627171}\RP697\A0194583.exe [DETECTION] Is the TR/Trash.Gen Trojan [NOTE] The file was moved to the quarantine directory under the name '303a7591.qua'. C:\System Volume Information\_restore{340C3340-2EBB-4324-859A-C37E85627171}\RP697\A0194582.exe [DETECTION] Is the TR/Trash.Gen Trojan [NOTE] The file was moved to the quarantine directory under the name '41834c04.qua'. C:\System Volume Information\_restore{340C3340-2EBB-4324-859A-C37E85627171}\RP697\A0194581.exe [DETECTION] Is the TR/Trash.Gen Trojan [NOTE] The file was moved to the quarantine directory under the name '4f997cc3.qua'. C:\System Volume Information\_restore{340C3340-2EBB-4324-859A-C37E85627171}\RP697\A0194580.exe [DETECTION] Is the TR/Trash.Gen Trojan [NOTE] The file was moved to the quarantine directory under the name '0ab00581.qua'. C:\System Volume Information\_restore{340C3340-2EBB-4324-859A-C37E85627171}\RP697\A0194579.exe [DETECTION] Is the TR/Trash.Gen Trojan [NOTE] The file was moved to the quarantine directory under the name '03bb012a.qua'. C:\System Volume Information\_restore{340C3340-2EBB-4324-859A-C37E85627171}\RP697\A0194578.exe [DETECTION] Is the TR/Trash.Gen Trojan [NOTE] The file was moved to the quarantine directory under the name '5bfa1843.qua'. C:\System Volume Information\_restore{340C3340-2EBB-4324-859A-C37E85627171}\RP697\A0194577.exe [DETECTION] Is the TR/Trash.Gen Trojan [NOTE] The file was moved to the quarantine directory under the name '770e618f.qua'. C:\System Volume Information\_restore{340C3340-2EBB-4324-859A-C37E85627171}\RP697\A0194576.exe [DETECTION] Is the TR/Trash.Gen Trojan [NOTE] The file was moved to the quarantine directory under the name '49f00155.qua'. C:\System Volume Information\_restore{340C3340-2EBB-4324-859A-C37E85627171}\RP697\A0194575.exe [DETECTION] Is the TR/Trash.Gen Trojan [NOTE] The file was moved to the quarantine directory under the name '2afe2a26.qua'. C:\System Volume Information\_restore{340C3340-2EBB-4324-859A-C37E85627171}\RP697\A0194574.exe [DETECTION] Is the TR/Trash.Gen Trojan [NOTE] The file was moved to the quarantine directory under the name '0c366a3b.qua'. C:\System Volume Information\_restore{340C3340-2EBB-4324-859A-C37E85627171}\RP697\A0194573.exe [DETECTION] Is the TR/Trash.Gen Trojan [NOTE] The file was moved to the quarantine directory under the name '3ea2119e.qua'. C:\System Volume Information\_restore{340C3340-2EBB-4324-859A-C37E85627171}\RP697\A0194572.exe [DETECTION] Is the TR/Trash.Gen Trojan [NOTE] The file was moved to the quarantine directory under the name '34e73ae0.qua'. C:\System Volume Information\_restore{340C3340-2EBB-4324-859A-C37E85627171}\RP697\A0194571.exe [DETECTION] Is the TR/Trash.Gen Trojan [NOTE] The file was moved to the quarantine directory under the name '0bb45ea5.qua'. C:\System Volume Information\_restore{340C3340-2EBB-4324-859A-C37E85627171}\RP697\A0194570.exe [DETECTION] Is the TR/Trash.Gen Trojan [NOTE] The file was moved to the quarantine directory under the name '75985282.qua'. C:\System Volume Information\_restore{340C3340-2EBB-4324-859A-C37E85627171}\RP697\A0194569.exe [DETECTION] Is the TR/Trash.Gen Trojan [NOTE] The file was moved to the quarantine directory under the name '20e05649.qua'. C:\System Volume Information\_restore{340C3340-2EBB-4324-859A-C37E85627171}\RP670\A0172364.exe [DETECTION] Is the TR/Dropper.Gen Trojan [NOTE] The file was moved to the quarantine directory under the name '2d762761.qua'. C:\Program Files\Winamp\Plugins\in_cdda.dll [DETECTION] Is the TR/Crypt.XPACK.Gen3 Trojan [NOTE] The file was moved to the quarantine directory under the name '3179332a.qua'. End of the scan: vendredi 19 novembre 2010 17:04 Used time: 2:34:21 Hour(s) The scan has been done completely. 63918 Scanned directories 961839 Files were scanned 27 Viruses and/or unwanted programs were found 0 Files were classified as suspicious 0 files were deleted 0 Viruses and unwanted programs were repaired 27 Files were moved to quarantine 0 Files were renamed 0 Files cannot be scanned 961812 Files not concerned 6060 Archives were scanned 0 Warnings 27 Notes 845865 Objects were scanned with rootkit scan 2 Hidden objects were found Merci beaucoup pour ton aide. J'attends tes prochaines directives
  5. Désactive le teatimer de Spybot en passant par les options de Spybot: une fois dans le logiciel, il faut aller dans le menu "Mode" => coche "Mode avancé" => "Outils"(en bas de page)=> "Résident" => et tu décoches cette case: "Résident Teatimer" . Tu ne dois plus voir l'icône du Teatimer dans la barre de tâches! Ne fais pas l'impasse sur cette étape, car ça peut faire échouer la procédure de désinfection ! Je ne peux pas faire cela, à priori, je n'ai pas Spybot dans la barre des tâches. J'ai en effet désinstallé Spybot, ce logiciel faisant partie de mes essais pour me débarrasser de mon problème. Il reste un dossier dans Programs Files nommé "Spybot - Search and Destroy" avec à l'intérieur un exe : TeaTimer.exe. uniquement. Dois-je le lancer ? Le supprimer ? Du coup, j'ai juste désactivé les proxy sur les navigateurs, je préfère attendre tes directives avant de continuer.
  6. Pas de souci Me disais, tiens, j'ai mal enregistré mes fichiers...
  7. Ok, désolé o_O' Oui, j'ai bien cliqué sur reboot now, mais cela n'a pas fonctionné. J'ai donc fait un redémarrage manuel (bouton démarrer -arrêter) de la barre des tâches. Le PC a bien rebooté. Et voici les rapports RSIT : Info.txt : http://www.cijoint.fr/cjlink.php?file=cj201011/cijd74446a.txt Log.txt : http://www.cijoint.fr/cjlink.php?file=cj201011/cijblSuhjq.txt Sinon, pour info, le info.txt ne s'est pas affiché chez moi (introuvable y compris dans la barre des tâches), j'ai lancé RSIT une deuxième fois sans plus de succès. J'ai donc récupéré le fichiers dans SystemDrive\rsit. Peut-être est-ce utile de le préciser dans le message standard que vous délivrez en ajoutant à la fin une phrase du type "Ou récupérez ces deux fichiers dans SystemDrive\rsit" ? Ou pas... Je préfère le préciser pour contribuer même si c'est pas utile, car ça fait vraiment plaisir d'avoir de l'aide comme ça.
  8. Merci beaucoup pour votre réponse rapide. C'est bien noté pour Combofix, je ne ferai pas l'erreur deux fois. J'ai effectué ces manipulations, un objet malicieux a été trouvé, voici le rapport TDSSKiller : Cijoint.fr - Service gratuit de dépôt de fichiers
  9. Bonjour, Il semble que mon pc soit infecté depuis quelques semaines (oui, je ne fais pas dans l'original désolé), le symptôme récurrent étant l'ouverture de fenêtres intempestives lors de la navigation, ou la redirection vers un site non désiré après une recherche sur un moteur de recherche. J'ai bien essayé de me débarrasser tout seul de ce problème afin de ne pas encombrer les forums d'un sujet de plus, mais j'avoue m'avouer vaincu. J'ai installé Malwares btyes, et Combofix. Tous deux ont dégagé des éléments nuisibles. Combofix, lancé avant-hier, a détecté un "rootkit". Malheureusement, après une courte navigation les fenêtres intempestives ont réapparu. Merci de bien vouloir m'indiquer une procédure à suivre, s'il-vous-plaît. J'ai commencé à installer tout ce que je lisais sur les forums pour me débarrasser de ce truc, donc je vais peut-être arrêter de faire n'importe quoi et m'adresser à des gens compétents. Je précise que je poste sur ce forum en suivant le lien donné sur le tutorial de Comboxfix sur bleepingcomputer.com. Je poste à tout hasard le rapport de combofix si cela peut faire gagner du temps, car j'ai vu que c'était demandé régulièrement mais je suis en attente de vos directives si cela ne suffit pas. Merci d'avance à qui pourra me consacrer un peu de temps. Bonne journée Le rapport ci-joint de combofix : Cijoint.fr - Service gratuit de dépôt de fichiers
×
×
  • Créer...