Aller au contenu
  • Pas encore inscrit ?

    Pourquoi ne pas vous inscrire ? C'est simple, rapide et gratuit.
    Pour en savoir plus, lisez Les avantages de l'inscription... et la Charte de Zébulon.
    De plus, les messages que vous postez en tant qu'invité restent invisibles tant qu'un modérateur ne les a pas validés. Inscrivez-vous, ce sera un gain de temps pour tout le monde, vous, les helpeurs et les modérateurs ! :wink:

Messages recommandés

Posté(e)

Bonjour

j'ai un portable envahi par les virus et je ne peux pas en venir à bout

j'ai eu sur le portable AVAST,maintenant j'ai ad aware se et spybot

je fais scan sur scan et il y a tjs les memes virus:

astakiller

smitfraud-c.toolbar

Virtumonde

et

Troj/drsmart

troj/hac def-gen dans c:\windows\system 32\the matrix has you.exe

et le scan avec ad aware donne

win antivi regkey malware

et autre chose encore

Y a t'il quelque chose à faire?

Merci pour les explications simples;je suis novice

Posté(e)

Bonjour,

 

- Télécharge HijackThis sur ton bureau.

- Renomme le fichier HijackThis.exe en Scanner.exe pour cela, fais un clic droit sur le fichier HijackThis.exe et choisis renommer dans la liste

- Tape Scanner.exe et Appuye sur la touche Entrée.

- Génère un rapport en suivant ces indications :

- Double-clic sur Scanner.exe

- Exécute le et clique sur Do a scan and save log file.

- Le rapport s'ouvre sur leBloc-Note

- Colle le rapport ici, pour cela :

- Menu Edition / Selectionner Tout

- Menu Edition / copier

- Ici dans un nouveau message : clic droit / coller

- N'hésite pas à consulter l'aide HijackThis -

  • 3 semaines après...
Posté(e)

Bonjour

j'ai un portable envahi par les virus et je ne peux pas en venir à bout

j'ai eu sur le portable AVAST,maintenant j'ai ad aware se et spybot

je fais scan sur scan et il y a tjs les memes virus:

astakiller

smitfraud-c.toolbar

Virtumonde

et

Troj/drsmart

troj/hac def-gen dans c:\windows\system 32\the matrix has you.exe

et le scan avec ad aware donne

win antivi regkey malware

et autre chose encore

Y a t'il quelque chose à faire?

Merci pour les explications simples;je suis novice

 

 

 

 

 

Junior Member

 

 

Groupe : Membres

Messages: 6

Inscrit : 08/08/2006

Membre No. : 173823

Mes langues :: francais

 

 

 

après quelques difficultés pour me connecter, j'ai réussi à sortir ce fameux rapport

Logfile of HijackThis v1.99.1

Scan saved at 11:42:07, on 24/08/2006

Platform: Windows XP SP2 (WinNT 5.01.2600)

MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)

 

Running processes:

C:\WINDOWS\System32\smss.exe

C:\WINDOWS\system32\winlogon.exe

C:\WINDOWS\system32\services.exe

C:\WINDOWS\system32\lsass.exe

C:\WINDOWS\system32\svchost.exe

C:\WINDOWS\System32\svchost.exe

C:\WINDOWS\Explorer.EXE

C:\WINDOWS\system32\spoolsv.exe

C:\WINDOWS\system32\atiptaxx.exe

C:\Program Files\QuickTime\qttask.exe

C:\WINDOWS\System32\Ati2evxx.exe

C:\Program Files\Synaptics\SynTP\SynTPLpr.exe

C:\WINDOWS\System32\drivers\CDAC11BA.EXE

C:\Program Files\Synaptics\SynTP\SynTPEnh.exe

C:\Program Files\ipwins\ipwins.exe

C:\Program Files\Compaq\EAB\EabServr.exe

C:\Program Files\Fichiers communs\{8067507B-0702-1036-0930-020206260021}\Update.exe

C:\Program Files\Messenger\msmsgs.exe

C:\Program Files\Fichiers communs\Microsoft Shared\VS7Debug\mdm.exe

C:\WINDOWS\system32\ctfmon.exe

C:\Program Files\MSN Messenger\msnmsgr.exe

C:\Program Files\Sophos\Sophos Anti-Virus\SAVAdminService.exe

C:\Program Files\Sophos\AutoUpdate\ALsvc.exe

C:\Program Files\Sophos\AutoUpdate\ALMon.exe

C:\Program Files\802.11 Wireless LAN\802.11g Wireless Cardbus & PCI Adapter HW.51 V1.00\WlanCU.exe

C:\WINDOWS\System32\svchost.exe

C:\Program Files\Internet Explorer\iexplore.exe

C:\WINDOWS\system32\ytisvc.exe

C:\DOCUME~1\ADMINIST\LOCALS~1\Temp\Répertoire temporaire 1 pour Scanner.exe.zip\HijackThis.exe

C:\WINDOWS\system32\net.exe

 

R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.tiscali.fr/

R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName = Liens

O4 - HKLM\..\Run: [ATIModeChange] Ati2mdxx.exe

O4 - HKLM\..\Run: [AtiPTA] atiptaxx.exe

O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime

O4 - HKLM\..\Run: [Win32] msnsrv.exe

O4 - HKLM\..\Run: [TkBellExe] "C:\Program Files\Fichiers communs\Real\Update_OB\realsched.exe" -osboot

O4 - HKLM\..\Run: [synTPLpr] C:\Program Files\Synaptics\SynTP\SynTPLpr.exe

O4 - HKLM\..\Run: [synTPEnh] C:\Program Files\Synaptics\SynTP\SynTPEnh.exe

O4 - HKLM\..\Run: [srmclean] C:\Cpqs\Scom\srmclean.exe

O4 - HKLM\..\Run: [siSUSBRG] C:\WINDOWS\SiSUSBrg.exe

O4 - HKLM\..\Run: [ipWins] C:\Program Files\ipwins\ipwins.exe

O4 - HKLM\..\Run: [eabconfg.cpl] C:\Program Files\Compaq\EAB\EabServr.exe /Start

O4 - HKLM\..\Run: [ytisvc] C:\WINDOWS\system32\ytisvc.exe

O4 - HKCU\..\Run: [MSMSGS] "C:\Program Files\Messenger\msmsgs.exe" /background

O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe

O4 - HKCU\..\Run: [msnmsgr] "C:\Program Files\MSN Messenger\msnmsgr.exe" /background

O4 - Global Startup: AutoUpdate Monitor.lnk = C:\Program Files\Sophos\AutoUpdate\ALMon.exe

O4 - Global Startup: Microsoft Office.lnk = C:\Program Files\Microsoft Office\Office10\OSA.EXE

O4 - Global Startup: Wireless Configuration Utility HW.51.lnk = C:\Program Files\802.11 Wireless LAN\802.11g Wireless Cardbus & PCI Adapter HW.51 V1.00\WlanCU.exe

O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe

O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe

O16 - DPF: {0EB0E74A-2A76-4AB3-A7FB-9BD8C29F7F75} (CKAVWebScan Object) - http://webscanner.kaspersky.fr/kavwebscan_unicode.cab

O16 - DPF: {6E32070A-766D-4EE6-879C-DC1FA91D2FC3} (MUWebControl Class) - http://update.microsoft.com/microsoftupdat...b?1154688486886

O18 - Protocol: msnim - {828030A1-22C1-4009-854F-8E305202313F} - "C:\PROGRA~1\MSNMES~1\msgrapp.dll" (file missing)

O23 - Service: Ati HotKey Poller - Unknown owner - C:\WINDOWS\System32\Ati2evxx.exe

O23 - Service: Boonty Games - BOONTY - C:\Program Files\Fichiers communs\BOONTY Shared\Service\Boonty.exe

O23 - Service: C-DillaCdaC11BA - Macrovision - C:\WINDOWS\System32\drivers\CDAC11BA.EXE

O23 - Service: Créateur de rapports d'état Sophos Anti-Virus (SAVAdminService) - Sophos plc - C:\Program Files\Sophos\Sophos Anti-Virus\SAVAdminService.exe

O23 - Service: Sophos Anti-Virus (SAVService) - Sophos plc - C:\Program Files\Sophos\Sophos Anti-Virus\SavService.exe

O23 - Service: Sophos AutoUpdate Service - Sophos plc - C:\Program Files\Sophos\AutoUpdate\ALsvc.exe

O23 - Service: Print Spooler Service (SpoolSvc207) - Unknown owner - C:\WINDOWS\TEMP\mlsdf8h7792104.exe

O23 - Service: TuneUp WinStyler Theme Service (TUWinStylerThemeSvc) - TuneUp Software GmbH - C:\Program Files\TuneUp Utilities 2006\WinStylerThemeSvc.exe

 

Donc merci de toute votre aide et merci de m'expliquer les manoeuvres à faire avec patience. Je ne suis pas au top de l'informatique

 

J'ai réuni les deux messages du 8 aout et d'aujourd'hui) . Je pense que c'est ce qu'on me demandait de faire

Posté(e)

Bonjour,

 

- Télécharge HijackThis sur ton bureau.

- Renomme le fichier HijackThis.exe en Scanner.exe pour cela, fais un clic droit sur le fichier HijackThis.exe et choisis renommer dans la liste

- Tape Scanner.exe et Appuye sur la touche Entrée.

- Génère un rapport en suivant ces indications :

- Double-clic sur Scanner.exe

- Exécute le et clique sur Do a scan and save log file.

- Le rapport s'ouvre sur leBloc-Note

- Colle le rapport ici, pour cela :

- Menu Edition / Selectionner Tout

- Menu Edition / copier

- Ici dans un nouveau message : clic droit / coller

- N'hésite pas à consulter l'aide HijackThis -

bon j'ai fait un prénettoyage comme indiqué par la procedure et voici le nouveau rapport de ce soir

Merci pour l'aide

Logfile of HijackThis v1.99.1

Scan saved at 19:20:41, on 25/08/2006

Platform: Windows XP SP2 (WinNT 5.01.2600)

MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)

 

Running processes:

C:\WINDOWS\System32\smss.exe

C:\WINDOWS\system32\winlogon.exe

C:\WINDOWS\system32\services.exe

C:\WINDOWS\system32\lsass.exe

C:\WINDOWS\system32\svchost.exe

C:\WINDOWS\System32\svchost.exe

C:\WINDOWS\system32\rundll32.exe

C:\WINDOWS\system32\spoolsv.exe

C:\WINDOWS\System32\Ati2evxx.exe

C:\WINDOWS\System32\drivers\CDAC11BA.EXE

C:\WINDOWS\Explorer.EXE

C:\Program Files\Fichiers communs\Microsoft Shared\VS7Debug\mdm.exe

C:\Program Files\Sophos\AutoUpdate\ALsvc.exe

C:\WINDOWS\system32\atiptaxx.exe

C:\Program Files\QuickTime\qttask.exe

C:\WINDOWS\system32\msnsrv.exe

C:\WINDOWS\System32\svchost.exe

C:\Program Files\Synaptics\SynTP\SynTPLpr.exe

C:\Program Files\Synaptics\SynTP\SynTPEnh.exe

C:\Program Files\ipwins\ipwins.exe

C:\Program Files\Compaq\EAB\EabServr.exe

C:\dfndrff_13.exe

C:\WINDOWS\system32\pavsvc.exe

C:\Program Files\Fichiers communs\{8067507B-0702-1036-0930-020206260021}\Update.exe

C:\Program Files\Messenger\msmsgs.exe

C:\WINDOWS\system32\ctfmon.exe

C:\Program Files\MSN Messenger\msnmsgr.exe

C:\Program Files\Sophos\AutoUpdate\ALMon.exe

C:\Program Files\802.11 Wireless LAN\802.11g Wireless Cardbus & PCI Adapter HW.51 V1.00\WlanCU.exe

C:\WINDOWS\system32\wuauclt.exe

C:\DOCUME~1\ADMINIST\LOCALS~1\Temp\Répertoire temporaire 2 pour Scanner.exe.zip\HijackThis.exe

 

R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = about:blank

R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Bar = about:blank

R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = about:blank

R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = about:blank

R0 - HKLM\Software\Microsoft\Internet Explorer\Search,SearchAssistant = about:blank

R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName = Liens

R3 - URLSearchHook: (no name) - {02EE5B04-F144-47BB-83FB-A60BD91B74A9} - C:\Program Files\SurfSideKick 3\SskBho.dll

O4 - HKLM\..\Run: [ATIModeChange] Ati2mdxx.exe

O4 - HKLM\..\Run: [AtiPTA] atiptaxx.exe

O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime

O4 - HKLM\..\Run: [Win32] msnsrv.exe

O4 - HKLM\..\Run: [TkBellExe] "C:\Program Files\Fichiers communs\Real\Update_OB\realsched.exe" -osboot

O4 - HKLM\..\Run: [synTPLpr] C:\Program Files\Synaptics\SynTP\SynTPLpr.exe

O4 - HKLM\..\Run: [synTPEnh] C:\Program Files\Synaptics\SynTP\SynTPEnh.exe

O4 - HKLM\..\Run: [srmclean] C:\Cpqs\Scom\srmclean.exe

O4 - HKLM\..\Run: [siSUSBRG] C:\WINDOWS\SiSUSBrg.exe

O4 - HKLM\..\Run: [ipWins] C:\Program Files\ipwins\ipwins.exe

O4 - HKLM\..\Run: [eabconfg.cpl] C:\Program Files\Compaq\EAB\EabServr.exe /Start

O4 - HKLM\..\Run: [defender] C:\\dfndrff_13.exe

O4 - HKLM\..\Run: [keyboard] C:\\kybrdff_13.exe

O4 - HKLM\..\Run: [pavsvc] C:\WINDOWS\system32\pavsvc.exe

O4 - HKLM\..\Run: [ivt85d6f] RUNDLL32.EXE w0045e03.dll,n 00385d6c0000000a0045e03

O4 - HKLM\..\Run: [surfSideKick 3] C:\Program Files\SurfSideKick 3\Ssk.exe

O4 - HKLM\..\RunServices: [Win32] msnsrv.exe

O4 - HKCU\..\Run: [MSMSGS] "C:\Program Files\Messenger\msmsgs.exe" /background

O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe

O4 - HKCU\..\Run: [msnmsgr] "C:\Program Files\MSN Messenger\msnmsgr.exe" /background

O4 - HKCU\..\Run: [Win32] msnsrv.exe

O4 - HKCU\..\Run: [surfSideKick 3] C:\Program Files\SurfSideKick 3\Ssk.exe

O4 - Global Startup: AutoUpdate Monitor.lnk = C:\Program Files\Sophos\AutoUpdate\ALMon.exe

O4 - Global Startup: Microsoft Office.lnk = C:\Program Files\Microsoft Office\Office10\OSA.EXE

O4 - Global Startup: Wireless Configuration Utility HW.51.lnk = C:\Program Files\802.11 Wireless LAN\802.11g Wireless Cardbus & PCI Adapter HW.51 V1.00\WlanCU.exe

O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe

O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe

O16 - DPF: {0EB0E74A-2A76-4AB3-A7FB-9BD8C29F7F75} (CKAVWebScan Object) - http://webscanner.kaspersky.fr/kavwebscan_unicode.cab

O16 - DPF: {6E32070A-766D-4EE6-879C-DC1FA91D2FC3} (MUWebControl Class) - http://update.microsoft.com/microsoftupdat...b?1154688486886

O18 - Protocol: msnim - {828030A1-22C1-4009-854F-8E305202313F} - "C:\PROGRA~1\MSNMES~1\msgrapp.dll" (file missing)

O20 - AppInit_DLLs: repairs303169590.dll

O23 - Service: Ati HotKey Poller - Unknown owner - C:\WINDOWS\System32\Ati2evxx.exe

O23 - Service: Boonty Games - BOONTY - C:\Program Files\Fichiers communs\BOONTY Shared\Service\Boonty.exe

O23 - Service: C-DillaCdaC11BA - Macrovision - C:\WINDOWS\System32\drivers\CDAC11BA.EXE

O23 - Service: Command Service (cmdService) - Unknown owner - C:\WINDOWS\TW91c3NpZXIgTWF4\command.exe (file missing)

O23 - Service: Sophos AutoUpdate Service - Sophos plc - C:\Program Files\Sophos\AutoUpdate\ALsvc.exe

O23 - Service: Print Spooler Service (SpoolSvc207) - Unknown owner - C:\WINDOWS\TEMP\mlsdf8h7792104.exe

O23 - Service: TuneUp WinStyler Theme Service (TUWinStylerThemeSvc) - TuneUp Software GmbH - C:\Program Files\TuneUp Utilities 2006\WinStylerThemeSvc.exe

Posté(e)

Voici la manipulation à effectuer en entier

Si certains éléments ne sont pas trouvés, merci de le signaler mais de poursuivre les manipulations jusqu'au bout.

 

 

Dans ajout/suppression de programmes du panneau de configuration, désinstalle :

SurfSideKick

 

 

-- Menu Démarrer puis executer, dans le champs tape : SC delete SpoolSvc207

 

Sur HijackThis, refais un scan et coches les lignes suivantes :

 

O4 - HKLM\..\Run: [ipWins] C:\Program Files\ipwins\ipwins.exe

O4 - HKLM\..\Run: [defender] C:\\dfndrff_13.exe

O4 - HKLM\..\Run: [keyboard] C:\\kybrdff_13.exe

O4 - HKLM\..\Run: [pavsvc] C:\WINDOWS\system32\pavsvc.exe

O4 - HKLM\..\Run: [ivt85d6f] RUNDLL32.EXE w0045e03.dll,n 00385d6c0000000a0045e03

O4 - HKLM\..\RunServices: [Win32] msnsrv.exe

O4 - HKCU\..\Run: [Win32] msnsrv.exe

 

---> puis clic sur le bouton "Fix Checked"

n'hésite pas à consulter l'aide HijackThis

 

________

 

Affiche les extensions des fichiers, ce sera plus simple :

-- Ouvre le poste de travail

-- Clic sur le menu outils en haut à droite puis options des dossiers

-- Dans la nouvelle fenêtre, clic sur l'onglet Affichage en haut

-- Décoche l'option "Masquez les extensions des fichiers dont le type est connu"

 

Créé un nouveau dossier directement sur le C:\ et nomme-le BFU. Pour cela :

-- Ouvre le poste de travail

-- Double-clic sur le disque C

-- Menu Fichier en haut puis Nouveau et nouveau dossier

-- Tapez BFU dans le nom du nouveau dossier

 

Télécharge Brute Force Uninstaller (de Merijn) et tu mets le fichier dans le dossier C:\BFU.

 

Rends toi dans le dossier C:\BFU :

-- Ouvre le poste de travail

-- Double-clic sur le disque C

-- Double-clic sur le dossier BFU

-- Sur le fichier BFU.zip, fais un clic droit / Extraire ici ou Extraire tout.

 

Ensuite :

FAIS UN CLIC-DROIT ICI et choisis "Enregistrer la cible sous..." afin de télécharger alcanshorty.bfu (de Metallica). Sauvegarde dans le dossier créé (C:\BFU). **Note : si tu utilises Internet Explorer; lors de la sauvegarde, assure-toi que le champs "Type :" affiche "Tous les fichiers".

 

Important : Tu dois maintenant avoir deux fichiers dans le dossier C:\BFU : alcanshorty.bfu et BFU.exe.

 

- Télécharge et installe ewido

- Mets le à jour à partir du menu update en haut, n'hésite pas à consulter l'Aide ewido pour tout problème.

- Télécharge clean.zip, décompresse-le sur ton bureau (clic droit / extraire tout), tu dois obtenir un dossier clean.

 

__________

 

-- Redémarre en mode en mode sans échec, si tu sais pas comment on fait lis ceci

-- Ouvre le dossier clean qui se trouve sur ton bureau, et double-clic sur clean.cmd, une fenêtre noire va apparaître pendant un instant, laisse la ouverte.

 

Démarre le "Brute Force Uninstaller" en double-cliquant BFU.exe (du dossier C:\BFU)

- Clique sur le petit dossier jaune, à la droite de la boîte Scriptline to execute, et double-clique sur :

 

alcanshorty.bfu

 

- Dans la boîte "Scriptline to execute", tu devrais maintenant voir ceci : C:\BFU\alcanshorty.bfu

Clique sur Execute et laisse-le faire son travail.

Attendre que Complete script execution apparaîsse et clique sur OK.

Clique Exit pour fermer le programme BFU.

 

- Ouvre ewido et clic sur l'onglet Settings, pour How to Act sélèctionne Quarantine.

Reviens a l'onglet Scan cliques Complete system Scan.

Le scan démarre.

A la fin cliquer sur Apply all actions

Puis sur Save report et pour finir Save report as enregistrer sur le Bureau.

 

Aide : N'hésite pas à consulter l'Aide ewido pour tout problème.

 

Nettoye ton ordinateur avec CCleaner : http://www.malekal.com/tutorial_CCleaner.html

 

__________

 

-- Redémarre en mode normal : Menu Démarrer / Arreter / Redémarre l'ordinateur

Attention : dans le cas où l'ordinateur redémarre en boucle en mode sans échec, faire la manipulation inverse en décochant l'option /SAFEBOOT à l'aide de msconfig : voir à nouveau cette page : cliquez-ici

 

-- Fais un scan en ligne avec Internet Explorer : Scan Kaspersky et colle le rapport ici. Si tu es perdu, tu peux suivre cette aide pour les scans en ligne

 

 

-- Copie/Colle ici les rapports sans en oublier :

- ewido

- le rapport clean : Poste de travail / double clic sur disque C / double-clic sur rapport_clean.txt et copier/coller le contenu ici C:\rapport_clean.txt

- ainsi qu'un nouveau log HijackThis

Posté(e)

Voici la manipulation à effectuer en entier

Si certains éléments ne sont pas trouvés, merci de le signaler mais de poursuivre les manipulations jusqu'au bout.

Dans ajout/suppression de programmes du panneau de configuration, désinstalle :

SurfSideKick

-- Menu Démarrer puis executer, dans le champs tape : SC delete SpoolSvc207

 

Sur HijackThis, refais un scan et coches les lignes suivantes :

 

O4 - HKLM\..\Run: [ipWins] C:\Program Files\ipwins\ipwins.exe

O4 - HKLM\..\Run: [defender] C:\\dfndrff_13.exe

O4 - HKLM\..\Run: [keyboard] C:\\kybrdff_13.exe

O4 - HKLM\..\Run: [pavsvc] C:\WINDOWS\system32\pavsvc.exe

O4 - HKLM\..\Run: [ivt85d6f] RUNDLL32.EXE w0045e03.dll,n 00385d6c0000000a0045e03

O4 - HKLM\..\RunServices: [Win32] msnsrv.exe

O4 - HKCU\..\Run: [Win32] msnsrv.exe

 

---> puis clic sur le bouton "Fix Checked"

n'hésite pas à consulter l'aide HijackThis

 

________

 

Affiche les extensions des fichiers, ce sera plus simple :

-- Ouvre le poste de travail

-- Clic sur le menu outils en haut à droite puis options des dossiers

-- Dans la nouvelle fenêtre, clic sur l'onglet Affichage en haut

-- Décoche l'option "Masquez les extensions des fichiers dont le type est connu"

 

Créé un nouveau dossier directement sur le C:\ et nomme-le BFU. Pour cela :

-- Ouvre le poste de travail

-- Double-clic sur le disque C

-- Menu Fichier en haut puis Nouveau et nouveau dossier

-- Tapez BFU dans le nom du nouveau dossier

 

Télécharge Brute Force Uninstaller (de Merijn) et tu mets le fichier dans le dossier C:\BFU.

 

Rends toi dans le dossier C:\BFU :

-- Ouvre le poste de travail

-- Double-clic sur le disque C

-- Double-clic sur le dossier BFU

-- Sur le fichier BFU.zip, fais un clic droit / Extraire ici ou Extraire tout.

 

Ensuite :

FAIS UN CLIC-DROIT ICI et choisis "Enregistrer la cible sous..." afin de télécharger alcanshorty.bfu (de Metallica). Sauvegarde dans le dossier créé (C:\BFU). **Note : si tu utilises Internet Explorer; lors de la sauvegarde, assure-toi que le champs "Type :" affiche "Tous les fichiers".

 

Important : Tu dois maintenant avoir deux fichiers dans le dossier C:\BFU : alcanshorty.bfu et BFU.exe.

 

- Télécharge et installe ewido

- Mets le à jour à partir du menu update en haut, n'hésite pas à consulter l'Aide ewido pour tout problème.

- Télécharge clean.zip, décompresse-le sur ton bureau (clic droit / extraire tout), tu dois obtenir un dossier clean.

 

__________

 

-- Redémarre en mode en mode sans échec, si tu sais pas comment on fait lis ceci

-- Ouvre le dossier clean qui se trouve sur ton bureau, et double-clic sur clean.cmd, une fenêtre noire va apparaître pendant un instant, laisse la ouverte.

 

Démarre le "Brute Force Uninstaller" en double-cliquant BFU.exe (du dossier C:\BFU)

- Clique sur le petit dossier jaune, à la droite de la boîte Scriptline to execute, et double-clique sur :

 

alcanshorty.bfu

 

- Dans la boîte "Scriptline to execute", tu devrais maintenant voir ceci : C:\BFU\alcanshorty.bfu

Clique sur Execute et laisse-le faire son travail.

Attendre que Complete script execution apparaîsse et clique sur OK.

Clique Exit pour fermer le programme BFU.

 

- Ouvre ewido et clic sur l'onglet Settings, pour How to Act sélèctionne Quarantine.

Reviens a l'onglet Scan cliques Complete system Scan.

Le scan démarre.

A la fin cliquer sur Apply all actions

Puis sur Save report et pour finir Save report as enregistrer sur le Bureau.

 

Aide : N'hésite pas à consulter l'Aide ewido pour tout problème.

 

Nettoye ton ordinateur avec CCleaner : http://www.malekal.com/tutorial_CCleaner.html

 

__________

 

-- Redémarre en mode normal : Menu Démarrer / Arreter / Redémarre l'ordinateur

Attention : dans le cas où l'ordinateur redémarre en boucle en mode sans échec, faire la manipulation inverse en décochant l'option /SAFEBOOT à l'aide de msconfig : voir à nouveau cette page : cliquez-ici

 

-- Fais un scan en ligne avec Internet Explorer : Scan Kaspersky et colle le rapport ici. Si tu es perdu, tu peux suivre cette aide pour les scans en ligne

-- Copie/Colle ici les rapports sans en oublier :

- ewido

- le rapport clean : Poste de travail / double clic sur disque C / double-clic sur rapport_clean.txt et copier/colleKASPERSKY ONLINE SCANNER REPORT---------------------------------------------------------

ewido anti-spyware - Scan Report

---------------------------------------------------------

Script clean par Malekal_morte - http://www.malekal.com

 

Logfile of HijackThis v1.99.1

Scan saved at 17:30:22, on 26/08/2006

Platform: Windows XP SP2 (WinNT 5.01.2600)

MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)

 

Running processes:

C:\WINDOWS\System32\smss.exe

C:\WINDOWS\system32\winlogon.exe

C:\WINDOWS\system32\services.exe

C:\WINDOWS\system32\lsass.exe

C:\WINDOWS\system32\svchost.exe

C:\WINDOWS\System32\svchost.exe

C:\WINDOWS\system32\spoolsv.exe

C:\WINDOWS\System32\Ati2evxx.exe

C:\WINDOWS\System32\drivers\CDAC11BA.EXE

C:\Documents and Settings\ADMINIST\Bureau\ewido anti-spyware 4.0\guard.exe

C:\Program Files\Fichiers communs\Microsoft Shared\VS7Debug\mdm.exe

C:\Program Files\Sophos\AutoUpdate\ALsvc.exe

C:\WINDOWS\System32\svchost.exe

C:\WINDOWS\system32\atiptaxx.exe

C:\Program Files\QuickTime\qttask.exe

C:\Program Files\Synaptics\SynTP\SynTPLpr.exe

C:\Program Files\Synaptics\SynTP\SynTPEnh.exe

C:\Program Files\Compaq\EAB\EabServr.exe

C:\Program Files\Messenger\msmsgs.exe

C:\WINDOWS\system32\ctfmon.exe

C:\Program Files\MSN Messenger\msnmsgr.exe

C:\Program Files\Sophos\AutoUpdate\ALMon.exe

C:\Program Files\802.11 Wireless LAN\802.11g Wireless Cardbus & PCI Adapter HW.51 V1.00\WlanCU.exe

C:\Program Files\Internet Explorer\iexplore.exe

C:\WINDOWS\system32\wuauclt.exe

C:\WINDOWS\explorer.exe

C:\DOCUME~1\ADMINIST\LOCALS~1\Temp\Répertoire temporaire 1 pour Scanner.exe.zip\HijackThis.exe

 

R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = about:blank

R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Bar = about:blank

R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = about:blank

R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = about:blank

R0 - HKLM\Software\Microsoft\Internet Explorer\Search,SearchAssistant = about:blank

R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName = Liens

R3 - URLSearchHook: (no name) - {02EE5B04-F144-47BB-83FB-A60BD91B74A9} - (no file)

O4 - HKLM\..\Run: [ATIModeChange] Ati2mdxx.exe

O4 - HKLM\..\Run: [AtiPTA] atiptaxx.exe

O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime

O4 - HKLM\..\Run: [TkBellExe] "C:\Program Files\Fichiers communs\Real\Update_OB\realsched.exe" -osboot

O4 - HKLM\..\Run: [synTPLpr] C:\Program Files\Synaptics\SynTP\SynTPLpr.exe

O4 - HKLM\..\Run: [synTPEnh] C:\Program Files\Synaptics\SynTP\SynTPEnh.exe

O4 - HKLM\..\Run: [srmclean] C:\Cpqs\Scom\srmclean.exe

O4 - HKLM\..\Run: [siSUSBRG] C:\WINDOWS\SiSUSBrg.exe

O4 - HKLM\..\Run: [eabconfg.cpl] C:\Program Files\Compaq\EAB\EabServr.exe /Start

O4 - HKCU\..\Run: [MSMSGS] "C:\Program Files\Messenger\msmsgs.exe" /background

O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe

O4 - HKCU\..\Run: [msnmsgr] "C:\Program Files\MSN Messenger\msnmsgr.exe" /background

O4 - Global Startup: AutoUpdate Monitor.lnk = C:\Program Files\Sophos\AutoUpdate\ALMon.exe

O4 - Global Startup: Microsoft Office.lnk = C:\Program Files\Microsoft Office\Office10\OSA.EXE

O4 - Global Startup: Wireless Configuration Utility HW.51.lnk = C:\Program Files\802.11 Wireless LAN\802.11g Wireless Cardbus & PCI Adapter HW.51 V1.00\WlanCU.exe

O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe

O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe

O16 - DPF: {0EB0E74A-2A76-4AB3-A7FB-9BD8C29F7F75} (CKAVWebScan Object) - http://www.kaspersky.com/kos/eng/partner/d...can_unicode.cab

O16 - DPF: {6E32070A-766D-4EE6-879C-DC1FA91D2FC3} (MUWebControl Class) - http://update.microsoft.com/microsoftupdat...b?1154688486886

O18 - Protocol: msnim - {828030A1-22C1-4009-854F-8E305202313F} - "C:\PROGRA~1\MSNMES~1\msgrapp.dll" (file missing)

O23 - Service: Ati HotKey Poller - Unknown owner - C:\WINDOWS\System32\Ati2evxx.exe

O23 - Service: Boonty Games - BOONTY - C:\Program Files\Fichiers communs\BOONTY Shared\Service\Boonty.exe

O23 - Service: C-DillaCdaC11BA - Macrovision - C:\WINDOWS\System32\drivers\CDAC11BA.EXE

O23 - Service: ewido anti-spyware 4.0 guard - Anti-Malware Development a.s. - C:\Documents and Settings\ADMINIST\Bureau\ewido anti-spyware 4.0\guard.exe

O23 - Service: Sophos AutoUpdate Service - Sophos plc - C:\Program Files\Sophos\AutoUpdate\ALsvc.exe

O23 - Service: TuneUp WinStyler Theme Service (TUWinStylerThemeSvc) - TuneUp Software GmbH - C:\Program Files\TuneUp Utilities 2006\WinStylerThemeSvc.exe

 

 

 

Microsoft Windows XP [version 5.1.2600]

Script execute en mode sans echec

 

*** Suppression de fichiers sur C:

C:\deskbar.exe FOUND

C:\dfndr*.exe FOUND

C:\kybr*.exe FOUND

C:\nwnm*.exe FOUND

 

*** Suppression des fichiers dans C:\WINDOWS\

C:\WINDOWS\icont.exe FOUND

C:\WINDOWS\IsUninst.exe FOUND

C:\WINDOWS\keyboard*.dat FOUND

C:\WINDOWS\unvise32qt.exe FOUND

 

*** Suppression des fichiers dans C:\WINDOWS\system32

C:\WINDOWS\system32\cmd.ftp FOUND

C:\WINDOWS\system32\i FOUND

C:\WINDOWS\system32\msnsrv.exe FOUND

C:\WINDOWS\system32\mcrh.tmp FOUND

 

"C:\Program Files\Deskbar\" FOUND

"C:\Program Files\ipwins\" FOUND

"C:\Program Files\Toolbar888\" FOUND

 

*** Suppression des clefs du registre effectuee..

 

+ Created at: 14:30:27 26/08/2006

 

+ Scan result:

 

 

 

C:\WINDOWS\system32\config\systemprofile\Local Settings\Temporary Internet Files\Content.IE5\ELQH0HKF\AppWrap[1].exe -> Adware.AdURL : Cleaned with backup (quarantined).

C:\WINDOWS\system32\config\systemprofile\Local Settings\Temporary Internet Files\Content.IE5\OHANGLMV\AppWrap[1].exe -> Adware.AdURL : Cleaned with backup (quarantined).

C:\Program Files\Fichiers communs\{8067507B-04AC-1036-0930-020206260021}\Update.exe -> Adware.Agent : Cleaned with backup (quarantined).

C:\Program Files\Fichiers communs\{8067507B-0702-1036-0930-020206260021}\Update.exe -> Adware.Agent : Cleaned with backup (quarantined).

C:\WINDOWS\system32\guard.tmp_tobedeleted -> Adware.Look2Me : Cleaned with backup (quarantined).

C:\WINDOWS\system32\iqm32.dll -> Adware.Look2Me : Cleaned with backup (quarantined).

C:\WINDOWS\system32\j04olah31d4.dll -> Adware.Look2Me : Cleaned with backup (quarantined).

C:\WINDOWS\system32\kgdfc.dll -> Adware.Look2Me : Cleaned with backup (quarantined).

C:\WINDOWS\system32\lvnm0951e.dll -> Adware.Look2Me : Cleaned with backup (quarantined).

C:\WINDOWS\system32\m4280efueh280.dll -> Adware.Look2Me : Cleaned with backup (quarantined).

C:\WINDOWS\system32\wwock32.dll -> Adware.Look2Me : Cleaned with backup (quarantined).

[724] C:\WINDOWS\system32\iqm32.dll -> Adware.Look2Me : Error during cleaning.

HKLM\SOFTWARE\SurfSideKick3 -> Adware.SurfSide : Cleaned with backup (quarantined).

HKLM\SOFTWARE\SurfSideKick3\Internet Explorer -> Adware.SurfSide : Cleaned with backup (quarantined).

HKU\S-1-5-21-1647371527-516276246-1282138258-1019\Software\SurfSideKick3 -> Adware.SurfSide : Cleaned with backup (quarantined).

HKU\S-1-5-21-1647371527-516276246-1282138258-1019\Software\SurfSideKick3\Internet Explorer -> Adware.SurfSide : Cleaned with backup (quarantined).

C:\WINDOWS\iconu.exe -> Adware.Zestyfind : Cleaned with backup (quarantined).

C:\WINDOWS\system32\config\systemprofile\Local Settings\Temporary Internet Files\Content.IE5\ELQH0HKF\AppWrap[2].exe -> Adware.Zestyfind : Cleaned with backup (quarantined).

C:\WINDOWS\system32\cjnr4r4djnoqsv.exe -> Backdoor.HacDef.fv : Cleaned with backup (quarantined).

C:\WINDOWS\system32\cjnr4r4ioptvxace.exe -> Backdoor.HacDef.fv : Cleaned with backup (quarantined).

C:\WINDOWS\system32\cjnr4r4qwcd.exe -> Backdoor.HacDef.fv : Cleaned with backup (quarantined).

C:\WINDOWS\system32\dior4f4tyaceg.exe -> Backdoor.HacDef.fv : Cleaned with backup (quarantined).

C:\WINDOWS\system32\mlsdf8hjoqsuw.exe -> Backdoor.HacDef.fv : Cleaned with backup (quarantined).

C:\WINDOWS\system32\mlsdf8hrwyac.exe -> Backdoor.HacDef.fv : Cleaned with backup (quarantined).

C:\WINDOWS\system32\mlsdf8hvbgi.exe -> Backdoor.HacDef.fv : Cleaned with backup (quarantined).

C:\WINDOWS\system32\nlkfev7acklnp.exe -> Backdoor.HacDef.fv : Cleaned with backup (quarantined).

C:\WINDOWS\system32\sklrr7yinpr.exe -> Backdoor.HacDef.fv : Cleaned with backup (quarantined).

C:\WINDOWS\system32\TFTP1736 -> Backdoor.Rbot : Cleaned with backup (quarantined).

C:\Documents and Settings\ADMINIST\dotdr.exe -> Downloader.Adload.ch : Cleaned with backup (quarantined).

C:\Documents and Settings\ADMINIST\woa32.exe/dotdr.exe -> Downloader.Adload.ch : Cleaned with backup (quarantined).

C:\Documents and Settings\ADMINIST\aw1.exe -> Downloader.Adload.ep : Cleaned with backup (quarantined).

C:\Documents and Settings\ADMINIST\aws32.exe/aw1.exe -> Downloader.Adload.ep : Cleaned with backup (quarantined).

C:\Documents and Settings\ADMINIST\dotrm.dll -> Downloader.ConHook.ad : Cleaned with backup (quarantined).

C:\Documents and Settings\ADMINIST\woa32.exe/dotrm.dll -> Downloader.ConHook.ad : Cleaned with backup (quarantined).

C:\WINDOWS\system32\ddaaw.dll -> Downloader.ConHook.ad : Cleaned with backup (quarantined).

C:\WINDOWS\system32\hgdby.dll -> Downloader.ConHook.ad : Cleaned with backup (quarantined).

C:\WINDOWS\system32\iiiji.dll -> Downloader.ConHook.ad : Cleaned with backup (quarantined).

C:\WINDOWS\system32\ljhee.dll -> Downloader.ConHook.ad : Cleaned with backup (quarantined).

C:\WINDOWS\system32\opnll.dll -> Downloader.ConHook.ad : Cleaned with backup (quarantined).

C:\WINDOWS\system32\pmkkk.dll -> Downloader.ConHook.ad : Cleaned with backup (quarantined).

C:\WINDOWS\system32\qomkk.dll -> Downloader.ConHook.ad : Cleaned with backup (quarantined).

C:\WINDOWS\system32\qoppn.dll -> Downloader.ConHook.ad : Cleaned with backup (quarantined).

C:\WINDOWS\system32\rqrsp.dll -> Downloader.ConHook.ad : Cleaned with backup (quarantined).

C:\WINDOWS\system32\urqrs.dll -> Downloader.ConHook.ad : Cleaned with backup (quarantined).

C:\WINDOWS\system32\ursss.dll -> Downloader.ConHook.ad : Cleaned with backup (quarantined).

C:\WINDOWS\system32\ww32.exe/dotrm.dll -> Downloader.ConHook.ad : Cleaned with backup (quarantined).

C:\WINDOWS\system32\xxwwx.dll -> Downloader.ConHook.ad : Cleaned with backup (quarantined).

C:\WINDOWS\system32\yayay.dll -> Downloader.ConHook.ad : Cleaned with backup (quarantined).

C:\Documents and Settings\ADMINIST\Cookies\administ@112.2o7[2].txt -> TrackingCookie.2o7 : Cleaned with backup (quarantined).

C:\Documents and Settings\ADMINIST\Cookies\administ@msnportal.112.2o7[1].txt -> TrackingCookie.2o7 : Cleaned with backup (quarantined).

C:\Documents and Settings\ADMINIST\Cookies\administ@advertising[2].txt -> TrackingCookie.Advertising : Cleaned with backup (quarantined).

C:\Documents and Settings\ADMINIST\Cookies\administ@install.bestoffersnetworks[2].txt -> TrackingCookie.Bestoffersnetworks : Cleaned with backup (quarantined).

C:\Documents and Settings\ADMINIST\Cookies\administ@cpvfeed[1].txt -> TrackingCookie.Cpvfeed : Cleaned with backup (quarantined).

C:\Documents and Settings\ADMINIST\Cookies\administ@doubleclick[1].txt -> TrackingCookie.Doubleclick : Cleaned with backup (quarantined).

C:\Documents and Settings\ADMINIST\Cookies\administ@mediaplex[1].txt -> TrackingCookie.Mediaplex : Cleaned with backup (quarantined).

C:\Documents and Settings\ADMINIST\Cookies\administ@ad.yieldmanager[2].txt -> TrackingCookie.Yieldmanager : Cleaned with backup (quarantined).

 

 

::Report end

 

 

Saturday, August 26, 2006 5:19:34 PM

Operating System: Microsoft Windows XP Home Edition, Service Pack 2 (Build 2600)

Kaspersky Online Scanner version: 5.0.83.0

Kaspersky Anti-Virus database last update: 26/08/2006

Kaspersky Anti-Virus database records: 218481

 

 

Scan Settings

Scan using the following antivirus database extended

Scan Archives true

Scan Mail Bases true

 

Scan Target My Computer

C:\

D:\

 

Scan Statistics

Total number of scanned objects 48568

Number of viruses found 47

Number of infected objects 246 / 0

Number of suspicious objects 14

Duration of the scan process 00:58:38

 

Infected Object Name Virus Name Last Action

C:\ba0ac211ff219ac39db36a\sp1\spmsg.dll Object is locked skipped

 

C:\ba0ac211ff219ac39db36a\sp1\spuninst.exe Object is locked skipped

 

C:\ba0ac211ff219ac39db36a\sp1\update\eula.txt Object is locked skipped

 

C:\ba0ac211ff219ac39db36a\sp1\update\spcustom.dll Object is locked skipped

 

C:\ba0ac211ff219ac39db36a\sp1\update\update.exe Object is locked skipped

 

C:\ba0ac211ff219ac39db36a\sp2\spmsg.dll Object is locked skipped

 

C:\ba0ac211ff219ac39db36a\sp2\spuninst.exe Object is locked skipped

 

C:\ba0ac211ff219ac39db36a\sp2\update\eula.txt Object is locked skipped

 

C:\ba0ac211ff219ac39db36a\sp2\update\spcustom.dll Object is locked skipped

 

C:\ba0ac211ff219ac39db36a\sp2\update\update.exe Object is locked skipped

 

C:\Documents and Settings\ADMINIST\aw3.exe/stream/data0003 Infected: not-a-virus:AdWare.Win32.Agent.y skipped

 

C:\Documents and Settings\ADMINIST\aw3.exe/stream/data0004 Infected: not-a-virus:AdWare.Win32.Softomate.q skipped

 

C:\Documents and Settings\ADMINIST\aw3.exe/stream Infected: not-a-virus:AdWare.Win32.Softomate.q skipped

 

C:\Documents and Settings\ADMINIST\aw3.exe NSIS: infected - 3 skipped

 

C:\Documents and Settings\ADMINIST\Bureau\clean\pskill.exe Infected: not-a-virus:RiskTool.Win32.PsKill.k skipped

 

C:\Documents and Settings\ADMINIST\Cookies\index.dat Object is locked skipped

 

C:\Documents and Settings\ADMINIST\doot32.exe Infected: Backdoor.Win32.HacDef.fw skipped

 

C:\Documents and Settings\ADMINIST\Local Settings\Application Data\Microsoft\Windows\UsrClass.dat Object is locked skipped

 

C:\Documents and Settings\ADMINIST\Local Settings\Application Data\Microsoft\Windows\UsrClass.dat.LOG Object is locked skipped

 

C:\Documents and Settings\ADMINIST\Local Settings\Historique\History.IE5\index.dat Object is locked skipped

 

C:\Documents and Settings\ADMINIST\Local Settings\Temporary Internet Files\Content.IE5\index.dat Object is locked skipped

 

C:\Documents and Settings\ADMINIST\NTUSER.DAT Object is locked skipped

 

C:\Documents and Settings\ADMINIST\ntuser.dat.LOG Object is locked skipped

 

C:\Documents and Settings\ADMINIST\tam32.exe/stream/data0005 Infected: not-a-virus:AdWare.Win32.Softomate.q skipped

 

C:\Documents and Settings\ADMINIST\tam32.exe/stream Infected: not-a-virus:AdWare.Win32.Softomate.q skipped

 

C:\Documents and Settings\ADMINIST\tam32.exe NSIS: infected - 2 skipped

 

C:\Documents and Settings\All Users\Application Data\Microsoft\Network\Downloader\qmgr0.dat Object is locked skipped

 

C:\Documents and Settings\All Users\Application Data\Microsoft\Network\Downloader\qmgr1.dat Object is locked skipped

 

C:\Documents and Settings\All Users\Application Data\Spybot - Search & Destroy\Recovery\SmitfraudC10.zip/drsmartload45a45c.exe Suspicious: Password-protected-EXE skipped

 

C:\Documents and Settings\All Users\Application Data\Spybot - Search & Destroy\Recovery\SmitfraudC10.zip ZIP: suspicious - 1 skipped

 

C:\Documents and Settings\All Users\Application Data\Spybot - Search & Destroy\Recovery\SmitfraudC11.zip/drsmartload45a45b.exe Suspicious: Password-protected-EXE skipped

 

C:\Documents and Settings\All Users\Application Data\Spybot - Search & Destroy\Recovery\SmitfraudC11.zip ZIP: suspicious - 1 skipped

 

C:\Documents and Settings\All Users\Application Data\Spybot - Search & Destroy\Recovery\SmitfraudC5.zip/MTE3NDI6ODoxNg.exe Suspicious: Password-protected-EXE skipped

 

C:\Documents and Settings\All Users\Application Data\Spybot - Search & Destroy\Recovery\SmitfraudC5.zip ZIP: suspicious - 1 skipped

 

C:\Documents and Settings\All Users\Application Data\Spybot - Search & Destroy\Recovery\SmitfraudC6.zip/drsmartload849a849c.exe Suspicious: Password-protected-EXE skipped

 

C:\Documents and Settings\All Users\Application Data\Spybot - Search & Destroy\Recovery\SmitfraudC6.zip ZIP: suspicious - 1 skipped

 

C:\Documents and Settings\All Users\Application Data\Spybot - Search & Destroy\Recovery\SmitfraudC7.zip/drsmartload849a849b.exe Suspicious: Password-protected-EXE skipped

 

C:\Documents and Settings\All Users\Application Data\Spybot - Search & Destroy\Recovery\SmitfraudC7.zip ZIP: suspicious - 1 skipped

 

C:\Documents and Settings\All Users\Application Data\Spybot - Search & Destroy\Recovery\SmitfraudC8.zip/drsmartload46a46c.exe Suspicious: Password-protected-EXE skipped

 

C:\Documents and Settings\All Users\Application Data\Spybot - Search & Destroy\Recovery\SmitfraudC8.zip ZIP: suspicious - 1 skipped

 

C:\Documents and Settings\All Users\Application Data\Spybot - Search & Destroy\Recovery\SmitfraudC9.zip/drsmartload46a46b.exe Suspicious: Password-protected-EXE skipped

 

C:\Documents and Settings\All Users\Application Data\Spybot - Search & Destroy\Recovery\SmitfraudC9.zip ZIP: suspicious - 1 skipped

 

C:\Documents and Settings\LocalService\Cookies\index.dat Object is locked skipped

 

C:\Documents and Settings\LocalService\Local Settings\Application Data\Microsoft\Windows\UsrClass.dat Object is locked skipped

 

C:\Documents and Settings\LocalService\Local Settings\Application Data\Microsoft\Windows\UsrClass.dat.LOG Object is locked skipped

 

C:\Documents and Settings\LocalService\Local Settings\Historique\History.IE5\index.dat Object is locked skipped

 

C:\Documents and Settings\LocalService\Local Settings\Temporary Internet Files\Content.IE5\index.dat Object is locked skipped

 

C:\Documents and Settings\LocalService\NTUSER.DAT Object is locked skipped

 

C:\Documents and Settings\LocalService\ntuser.dat.LOG Object is locked skipped

 

C:\Documents and Settings\NetworkService\Local Settings\Application Data\Microsoft\Windows\UsrClass.dat Object is locked skipped

 

C:\Documents and Settings\NetworkService\Local Settings\Application Data\Microsoft\Windows\UsrClass.dat.LOG Object is locked skipped

 

C:\Documents and Settings\NetworkService\NTUSER.DAT Object is locked skipped

 

C:\Documents and Settings\NetworkService\ntuser.dat.LOG Object is locked skipped

 

C:\Drivers\SonyUSB\sonyhc.cat Object is locked skipped

 

C:\Drivers\SonyUSB\sonyhc2kdisk.inf Object is locked skipped

 

C:\Drivers\SonyUSB\sonyhcaudio2k.inf Object is locked skipped

 

C:\Drivers\SonyUSB\sonyhcusb2k.inf Object is locked skipped

 

C:\jghj.exe Infected: Backdoor.Win32.Rbot.aqo skipped

 

C:\Nouveau dossier\clean.zip/clean/pskill.exe Infected: not-a-virus:RiskTool.Win32.PsKill.k skipped

 

C:\Nouveau dossier\clean.zip ZIP: infected - 1 skipped

 

C:\Program Files\InstallShield Installation Information\{29F15D3F-5B37-44DB-BB89-390B3AD1404E}\Setup.ilg Object is locked skipped

 

C:\System Volume Information\MountPointManagerRemoteDatabase Object is locked skipped

 

C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP404\A0103924.lnk Object is locked skipped

 

C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP404\A0103925.lnk Object is locked skipped

 

C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP404\A0103926.lnk Object is locked skipped

 

C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP404\A0103927.lnk Object is locked skipped

 

C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP404\A0103928.lnk Object is locked skipped

 

C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP404\A0103929.lnk Object is locked skipped

 

C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP404\A0103930.lnk Object is locked skipped

 

C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP411\A0105177.exe Infected: Trojan-Spy.Win32.ProAgent.u skipped

 

C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP411\A0105179.lnk Object is locked skipped

 

C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP411\A0105181.dll Object is locked skipped

 

C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP411\A0105182.lnk Object is locked skipped

 

C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP412\A0105184.lnk Object is locked skipped

 

C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP412\A0109176.lnk Object is locked skipped

 

C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP412\A0109177.lnk Object is locked skipped

 

C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP412\A0109179.lnk Object is locked skipped

 

C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP412\A0110174.lnk Object is locked skipped

 

C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP412\A0111176.exe Infected: Trojan-Spy.Win32.ProAgent.u skipped

 

C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP412\A0111177.lnk Object is locked skipped

 

C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP412\A0111181.lnk Object is locked skipped

 

C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP413\A0113173.lnk Object is locked skipped

 

C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP413\A0114202.lnk Object is locked skipped

 

C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP413\A0114203.lnk Object is locked skipped

 

C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP415\A0121233.lnk Object is locked skipped

 

C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP416\A0126288.exe Object is locked skipped

 

C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP416\A0127286.lnk Object is locked skipped

 

C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP417\A0127330.lnk Object is locked skipped

 

C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP417\A0127331.lnk Object is locked skipped

 

C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP417\A0127348.lnk Object is locked skipped

 

C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP417\A0130347.lnk Object is locked skipped

 

C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP418\A0132357.lnk Object is locked skipped

 

C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP419\A0134388.ilg Object is locked skipped

 

C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP420\A0135496.rbf Object is locked skipped

 

C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP420\A0135497.rbf Object is locked skipped

 

C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP420\A0135525.rbf Object is locked skipped

 

C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP420\A0135526.rbf Object is locked skipped

 

C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP420\A0135527.rbf Object is locked skipped

 

C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP420\A0135528.rbf Object is locked skipped

 

C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP420\A0135529.rbf Object is locked skipped

 

C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP420\A0135530.rbf Object is locked skipped

 

C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP420\A0135531.rbf Object is locked skipped

 

C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP420\A0135532.rbf Object is locked skipped

 

C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP420\A0135533.rbf Object is locked skipped

 

C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP420\A0135534.rbf Object is locked skipped

 

C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP420\A0135535.rbf Object is locked skipped

 

C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP420\A0135536.rbf Object is locked skipped

 

C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP420\A0135537.rbf Object is locked skipped

 

C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP420\A0135540.lnk Object is locked skipped

 

C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP420\A0135541.lnk Object is locked skipped

 

C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP421\A0135545.lnk Object is locked skipped

 

C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP421\A0135555.exe Object is locked skipped

 

C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP421\A0135556.exe Object is locked skipped

 

C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP421\A0135557.EXE Object is locked skipped

 

C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP421\A0135558.exe Object is locked skipped

 

C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP421\A0135566.exe Infected: Packed.Win32.Tibs skipped

 

C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP421\A0135572.exe Object is locked skipped

 

C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP421\A0135573.ini Object is locked skipped

 

C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP421\A0135574.ini Object is locked skipped

 

C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP421\A0135575.crl Object is locked skipped

 

C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP421\A0135576.ini Object is locked skipped

 

C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP421\A0135577.ini Object is locked skipped

 

C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP421\A0135578.ini Object is locked skipped

 

C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP421\A0135579.dll Object is locked skipped

 

C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP421\A0135580.ini Object is locked skipped

 

C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP421\A0135581.dll Object is locked skipped

 

C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP421\A0135582.ini Object is locked skipped

 

C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP421\A0135583.ini Object is locked skipped

 

C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP421\A0135587.lnk Object is locked skipped

 

C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP421\A0135588.lnk Object is locked skipped

 

C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP421\A0135589.lnk Object is locked skipped

 

C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP421\A0135590.lnk Object is locked skipped

 

C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP421\A0135591.lnk Object is locked skipped

 

C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP421\A0135592.lnk Object is locked skipped

 

C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP421\A0135593.lnk Object is locked skipped

 

C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP421\A0135594.lnk Object is locked skipped

 

C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP421\A0135595.lnk Object is locked skipped

 

C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP421\A0135596.lnk Object is locked skipped

 

C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP421\A0135597.lnk Object is locked skipped

 

C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP421\A0135598.lnk Object is locked skipped

 

C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP421\A0135599.lnk Object is locked skipped

 

C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP421\A0135600.lnk Object is locked skipped

 

C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP421\A0135601.lnk Object is locked skipped

 

C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP421\A0135602.lnk Object is locked skipped

 

C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP421\A0135603.lnk Object is locked skipped

 

C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP421\A0135604.lnk Object is locked skipped

 

C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP421\A0135605.lnk Object is locked skipped

 

C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP421\A0135606.lnk Object is locked skipped

 

C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP421\A0136620.lnk Object is locked skipped

 

C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP421\A0136621.lnk Object is locked skipped

 

C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP421\A0136622.lnk Object is locked skipped

 

C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP421\A0136623.lnk Object is locked skipped

 

C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP421\A0136624.lnk Object is locked skipped

 

C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP421\A0136625.lnk Object is locked skipped

 

C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP421\A0136626.lnk Object is locked skipped

 

C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP421\A0136627.lnk Object is locked skipped

 

C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP421\A0136628.lnk Object is locked skipped

 

C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP421\A0136629.lnk Object is locked skipped

 

C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP421\A0136630.lnk Object is locked skipped

 

C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP421\A0136631.lnk Object is locked skipped

 

C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP421\A0136632.lnk Object is locked skipped

 

C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP421\A0136633.lnk Object is locked skipped

 

C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP421\A0136634.lnk Object is locked skipped

 

C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP421\A0136635.lnk Object is locked skipped

 

C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP421\A0136636.lnk Object is locked skipped

 

C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP421\A0136637.lnk Object is locked skipped

 

C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP421\A0136638.lnk Object is locked skipped

 

C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP421\A0136639.lnk Object is locked skipped

 

C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP421\A0136640.lnk Object is locked skipped

 

C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP421\A0136641.lnk Object is locked skipped

 

C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP421\A0136642.lnk Object is locked skipped

 

C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP421\A0136643.lnk Object is locked skipped

 

C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP421\A0136645.lnk Object is locked skipped

 

C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP421\A0136646.lnk Object is locked skipped

 

C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP421\A0136647.lnk Object is locked skipped

 

C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP421\A0136648.lnk Object is locked skipped

 

C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP421\A0136649.lnk Object is locked skipped

 

C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP421\A0136650.lnk Object is locked skipped

 

C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP421\A0136651.lnk Object is locked skipped

 

C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP421\A0136652.lnk Object is locked skipped

 

C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP421\A0136653.lnk Object is locked skipped

 

C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP421\A0136654.lnk Object is locked skipped

 

C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP421\A0136655.lnk Object is locked skipped

 

C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP421\A0136656.lnk Object is locked skipped

 

C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP421\A0136657.lnk Object is locked skipped

 

C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP421\A0136658.lnk Object is locked skipped

 

C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP421\A0136659.lnk Object is locked skipped

 

C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP421\A0136660.lnk Object is locked skipped

 

C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP421\A0136661.lnk Object is locked skipped

 

C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP421\A0136662.lnk Object is locked skipped

 

C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP421\A0136663.lnk Object is locked skipped

 

C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP421\A0136664.lnk Object is locked skipped

 

C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP421\A0136665.lnk Object is locked skipped

 

C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP421\A0136666.lnk Object is locked skipped

 

C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP421\A0136667.lnk Object is locked skipped

 

C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP421\A0136668.lnk Object is locked skipped

 

C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP421\A0136669.lnk Object is locked skipped

 

C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP421\A0136670.lnk Object is locked skipped

 

C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP421\A0136671.lnk Object is locked skipped

 

C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP421\A0136672.lnk Object is locked skipped

 

C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP421\A0136673.lnk Object is locked skipped

 

C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP421\A0136674.lnk Object is locked skipped

 

C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP421\A0136677.lnk Object is locked skipped

 

C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP421\A0136678.lnk Object is locked skipped

 

C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP421\A0136679.lnk Object is locked skipped

 

C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP421\A0136680.lnk Object is locked skipped

 

C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP421\A0136681.lnk Object is locked skipped

 

C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP421\A0136682.lnk Object is locked skipped

 

C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP421\A0136683.lnk Object is locked skipped

 

C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP421\A0136684.lnk Object is locked skipped

 

C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP421\A0136685.lnk Object is locked skipped

 

C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP421\A0136686.lnk Object is locked skipped

 

C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP421\A0136687.lnk Object is locked skipped

 

C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP421\A0136688.lnk Object is locked skipped

 

C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP421\A0136689.lnk Object is locked skipped

 

C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP421\A0136690.lnk Object is locked skipped

 

C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP421\A0136691.lnk Object is locked skipped

 

C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP421\A0136692.lnk Object is locked skipped

 

C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP421\A0136693.lnk Object is locked skipped

 

C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP421\A0136694.lnk Object is locked skipped

 

C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP421\A0136695.lnk Object is locked skipped

 

C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP421\A0136696.lnk Object is locked skipped

 

C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP421\A0136697.lnk Object is locked skipped

 

C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP421\A0136732.lnk Object is locked skipped

 

C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP421\A0138732.lnk Object is locked skipped

 

C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP421\A0138733.lnk Object is locked skipped

 

C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP421\A0138734.lnk Object is locked skipped

 

C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP421\A0138776.lnk Object is locked skipped

 

C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP421\A0138777.lnk Object is locked skipped

 

C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP421\A0138778.lnk Object is locked skipped

 

C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP421\A0138779.lnk Object is locked skipped

 

C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP421\A0138780.lnk Object is locked skipped

 

C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP421\A0138781.lnk Object is locked skipped

 

C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP421\A0138782.lnk Object is locked skipped

 

C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP421\A0138783.lnk Object is locked skipped

 

C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP421\A0138802.ilg Object is locked skipped

 

C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP421\A0138824.lnk Object is locked skipped

 

C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP421\A0138825.lnk Object is locked skipped

 

C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP421\A0138826.lnk Object is locked skipped

 

C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP421\A0138853.lnk Object is locked skipped

 

C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP421\A0138854.lnk Object is locked skipped

 

C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP422\A0138875.ilg Object is locked skipped

 

C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP422\A0139771.lnk Object is locked skipped

 

C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP422\A0139772.lnk Object is locked skipped

 

C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP422\A0139773.lnk Object is locked skipped

 

C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP422\A0139774.lnk Object is locked skipped

 

C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP423\A0141769.lnk Object is locked skipped

 

C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP423\A0141770.lnk Object is locked skipped

 

C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP425\A0141845.ver Object is locked skipped

 

C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP425\A0141846.inf Object is locked skipped

 

C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP425\A0141847.cat Object is locked skipped

 

C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP425\A0141848.dll Object is locked skipped

 

C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP425\A0141849.dll Object is locked skipped

 

C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP425\A0141850.dll Object is locked skipped

 

C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP425\A0141851.ver Object is locked skipped

 

C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP425\A0141852.inf Object is locked skipped

 

C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP425\A0141853.cat Object is locked skipped

 

C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP425\A0141854.dll Object is locked skipped

 

C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP425\A0141855.dll Object is locked skipped

 

C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP425\A0141856.dll Object is locked skipped

 

C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP425\A0141857.exe Object is locked skipped

 

C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP425\A0141858.exe Object is locked skipped

 

C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP425\A0141859.dll Object is locked skipped

 

C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP425\A0141860.dll Object is locked skipped

 

C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP425\A0141864.exe Object is locked skipped

 

C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP426\A0143890.exe Infected: Packed.Win32.Tibs skipped

 

C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP426\A0143898.lnk Object is locked skipped

 

C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP426\A0143899.lnk Object is locked skipped

 

C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP426\A0143900.exe Object is locked skipped

 

C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP426\A0143904.exe Object is locked skipped

 

C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP426\A0143908.lnk Object is locked skipped

 

C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP426\A0143934.ilg Object is locked skipped

 

C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP426\A0143936.ilg Object is locked skipped

 

C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP426\A0143939.ilg Object is locked skipped

Posté(e)

Télécharge Look2Me-Destroyer.exe de Atribune sur ton Bureau.

---> Télécharger Look2Me-Destroyer.exe

 

- Ferme toutes les fenêtres et programmes actifs avant de passer à l'étape suivante.

- Double-clique Look2Me-Destroyer.exe afin de lancer l'outil.

- Coche Run this program as a task

- Un message s'affichera, te disant ceci : "Look2Me-Destroyer will close and re-open in approximately 10 seconds". Clique OK

- Il se relancera après les 10 secondes, puis clique sur le bouton Scan for L2M; les icônes de ton Bureau vont disparaître : c'est normal.

- Lorsque le scan termine, clique sur le bouton Remove L2M

- Un message Done Scanning apparaîtra, clique OK.

- Un nouveau message s'affichera : Done removing infected files! Look2Me-Destroyer will now shutdown your computer; clique OK.

- Ton PC va maintenant s'éteindre.

- Démarre ton PC normalement.

- Colle le rapport généré, situé ici : C:\Look2Me-Destroyer.txt , ainsi qu'un nouveau rapport HijackThis! dans ta prochaine réponse.

 

** Si Look2Me-Destroyer ne se relance pas automatiquement après les 10 secondes, redémarre et essaie à nouveau.

 

** Si tu reçois un message de ton parefeu que l'outil tente d'accéder à l'internet : Accepte.

 

** Si un message runtime error '339' s'affiche : télécharge MSWINSCK.OCX, et place-le dans le dossier C:\Windows\System32.

 

 

_____

 

 

- Télécharge Vundoxfix de Atribune - mirror si le lien ne fonctionne pas : http://www.softpedia.com/get/Antivirus/VundoFix.shtml

- Double-clique VundoFix.exe afin de le lancer.

- Coche Run VundoFix as a task.

- Un message t'avertira que l'outil va se fermer et s'ouvrir à nouveau : clique Ok

- Clique sur le bouton Scan for Vundo.

- Lorsque le scan est complété, clique sur le bouton Remove Vundo.

- Une invite te demandera si tu veux supprimer les fichiers, clique YES

- Après avoir cliqué "Yes", le Bureau disparaîtra un moment lors de la suppression des fichiers.

- Tu verras une invite qui t'annonce que ton PC va s'éteindre ("shutdown") ; clique OK

- Démarre ton PC à nouveau.

- Copie/colle le contenu du rapport situé dans C:\vundofix.txt ainsi qu'un nouveau rapport HijackThis! dans ta prochaine réponse.

Posté(e)

bonjour Malekal morte

voici les nouveaux rapports

Logfile of HijackThis v1.99.1

Scan saved at 10:13:19, on 27/08/2006

Platform: Windows XP SP2 (WinNT 5.01.2600)

MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)

 

Running processes:

C:\WINDOWS\System32\smss.exe

C:\WINDOWS\system32\winlogon.exe

C:\WINDOWS\system32\services.exe

C:\WINDOWS\system32\lsass.exe

C:\WINDOWS\system32\svchost.exe

C:\WINDOWS\System32\svchost.exe

C:\WINDOWS\system32\spoolsv.exe

C:\WINDOWS\Explorer.EXE

C:\WINDOWS\System32\Ati2evxx.exe

C:\WINDOWS\System32\drivers\CDAC11BA.EXE

C:\Documents and Settings\ADMINIST\Bureau\ewido anti-spyware 4.0\guard.exe

C:\Program Files\Fichiers communs\Microsoft Shared\VS7Debug\mdm.exe

C:\Program Files\Sophos\AutoUpdate\ALsvc.exe

C:\WINDOWS\System32\svchost.exe

C:\WINDOWS\system32\atiptaxx.exe

C:\Program Files\QuickTime\qttask.exe

C:\Program Files\Synaptics\SynTP\SynTPLpr.exe

C:\Program Files\Synaptics\SynTP\SynTPEnh.exe

C:\Program Files\Compaq\EAB\EabServr.exe

C:\Program Files\Messenger\msmsgs.exe

C:\WINDOWS\system32\ctfmon.exe

C:\Program Files\MSN Messenger\msnmsgr.exe

C:\Program Files\Sophos\AutoUpdate\ALMon.exe

C:\Program Files\802.11 Wireless LAN\802.11g Wireless Cardbus & PCI Adapter HW.51 V1.00\WlanCU.exe

C:\WINDOWS\system32\wuauclt.exe

C:\DOCUME~1\ADMINIST\LOCALS~1\Temp\Répertoire temporaire 2 pour Scanner.exe.zip\HijackThis.exe

C:\WINDOWS\system32\wuauclt.exe

 

R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = about:blank

R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Bar = about:blank

R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = about:blank

R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = about:blank

R0 - HKLM\Software\Microsoft\Internet Explorer\Search,SearchAssistant = about:blank

R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName = Liens

R3 - URLSearchHook: (no name) - {02EE5B04-F144-47BB-83FB-A60BD91B74A9} - (no file)

O2 - BHO: (no name) - {74B099C7-B1D4-46ED-8985-D3263D859B30} - C:\WINDOWS\system32\rqoml.dll (file missing)

O4 - HKLM\..\Run: [ATIModeChange] Ati2mdxx.exe

O4 - HKLM\..\Run: [AtiPTA] atiptaxx.exe

O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime

O4 - HKLM\..\Run: [TkBellExe] "C:\Program Files\Fichiers communs\Real\Update_OB\realsched.exe" -osboot

O4 - HKLM\..\Run: [synTPLpr] C:\Program Files\Synaptics\SynTP\SynTPLpr.exe

O4 - HKLM\..\Run: [synTPEnh] C:\Program Files\Synaptics\SynTP\SynTPEnh.exe

O4 - HKLM\..\Run: [srmclean] C:\Cpqs\Scom\srmclean.exe

O4 - HKLM\..\Run: [siSUSBRG] C:\WINDOWS\SiSUSBrg.exe

O4 - HKLM\..\Run: [eabconfg.cpl] C:\Program Files\Compaq\EAB\EabServr.exe /Start

O4 - HKCU\..\Run: [MSMSGS] "C:\Program Files\Messenger\msmsgs.exe" /background

O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe

O4 - HKCU\..\Run: [msnmsgr] "C:\Program Files\MSN Messenger\msnmsgr.exe" /background

O4 - Global Startup: AutoUpdate Monitor.lnk = C:\Program Files\Sophos\AutoUpdate\ALMon.exe

O4 - Global Startup: Microsoft Office.lnk = C:\Program Files\Microsoft Office\Office10\OSA.EXE

O4 - Global Startup: Wireless Configuration Utility HW.51.lnk = C:\Program Files\802.11 Wireless LAN\802.11g Wireless Cardbus & PCI Adapter HW.51 V1.00\WlanCU.exe

O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe

O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe

O16 - DPF: {0EB0E74A-2A76-4AB3-A7FB-9BD8C29F7F75} (CKAVWebScan Object) - http://www.kaspersky.com/kos/eng/partner/d...can_unicode.cab

O16 - DPF: {6E32070A-766D-4EE6-879C-DC1FA91D2FC3} (MUWebControl Class) - http://update.microsoft.com/microsoftupdat...b?1154688486886

O18 - Protocol: msnim - {828030A1-22C1-4009-854F-8E305202313F} - "C:\PROGRA~1\MSNMES~1\msgrapp.dll" (file missing)

O20 - Winlogon Notify: WgaLogon - C:\WINDOWS\SYSTEM32\WgaLogon.dll

O23 - Service: Ati HotKey Poller - Unknown owner - C:\WINDOWS\System32\Ati2evxx.exe

O23 - Service: Boonty Games - BOONTY - C:\Program Files\Fichiers communs\BOONTY Shared\Service\Boonty.exe

O23 - Service: C-DillaCdaC11BA - Macrovision - C:\WINDOWS\System32\drivers\CDAC11BA.EXE

O23 - Service: ewido anti-spyware 4.0 guard - Anti-Malware Development a.s. - C:\Documents and Settings\ADMINIST\Bureau\ewido anti-spyware 4.0\guard.exe

O23 - Service: Sophos AutoUpdate Service - Sophos plc - C:\Program Files\Sophos\AutoUpdate\ALsvc.exe

O23 - Service: TuneUp WinStyler Theme Service (TUWinStylerThemeSvc) - TuneUp Software GmbH - C:\Program Files\TuneUp Utilities 2006\WinStylerThemeSvc.exe

 

 

Look2Me-Destroyer V1.0.12

 

Scanning for infected files.....

Scan started at 27/08/2006 09:06:09

 

Infected! C:\WINDOWS\system32\lv2s09f7e.dll

Infected! C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP450\A0163815.dll

Infected! C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP450\A0164832.dll

Infected! C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP450\A0164833.dll

Infected! C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP450\A0164834.dll

Infected! C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP450\A0165848.dll

Infected! C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP450\A0165856.dll

Infected! C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP450\A0167008.dll

Infected! C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP450\A0167021.dll

Infected! C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP451\A0167039.dll

Infected! C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP451\A0167040.dll

Infected! C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP452\A0167124.dll

Infected! C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP452\A0167139.dll

Infected! C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP452\A0167143.dll

Infected! C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP452\A0167289.dll

Infected! C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP452\A0167336.dll

Infected! C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP452\A0167337.dll

Infected! C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP452\A0167338.dll

Infected! C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP452\A0167339.dll

Infected! C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP452\A0167340.dll

Infected! C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP452\A0167355.dll

Infected! C:\WINDOWS\system32\jtro0793e.dll

Infected! C:\WINDOWS\system32\guard.tmp

 

Attempting to delete infected files...

 

Attempting to delete: C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP450\A0163815.dll

C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP450\A0163815.dll Deleted successfully!

 

Attempting to delete: C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP450\A0164832.dll

C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP450\A0164832.dll Deleted successfully!

 

Attempting to delete: C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP450\A0164833.dll

C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP450\A0164833.dll Deleted successfully!

 

Attempting to delete: C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP450\A0164834.dll

C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP450\A0164834.dll Deleted successfully!

 

Attempting to delete: C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP450\A0165848.dll

C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP450\A0165848.dll Deleted successfully!

 

Attempting to delete: C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP450\A0165856.dll

C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP450\A0165856.dll Deleted successfully!

 

Attempting to delete: C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP450\A0167008.dll

C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP450\A0167008.dll Deleted successfully!

 

Attempting to delete: C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP450\A0167021.dll

C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP450\A0167021.dll Deleted successfully!

 

Attempting to delete: C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP451\A0167039.dll

C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP451\A0167039.dll Deleted successfully!

 

Attempting to delete: C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP451\A0167040.dll

C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP451\A0167040.dll Deleted successfully!

 

Attempting to delete: C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP452\A0167124.dll

C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP452\A0167124.dll Deleted successfully!

 

Attempting to delete: C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP452\A0167139.dll

C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP452\A0167139.dll Deleted successfully!

 

Attempting to delete: C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP452\A0167143.dll

C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP452\A0167143.dll Deleted successfully!

 

Attempting to delete: C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP452\A0167289.dll

C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP452\A0167289.dll Deleted successfully!

 

Attempting to delete: C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP452\A0167336.dll

C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP452\A0167336.dll Deleted successfully!

 

Attempting to delete: C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP452\A0167337.dll

C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP452\A0167337.dll Deleted successfully!

 

Attempting to delete: C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP452\A0167338.dll

C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP452\A0167338.dll Deleted successfully!

 

Attempting to delete: C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP452\A0167339.dll

C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP452\A0167339.dll Deleted successfully!

 

Attempting to delete: C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP452\A0167340.dll

C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP452\A0167340.dll Deleted successfully!

 

Attempting to delete: C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP452\A0167355.dll

C:\System Volume Information\_restore{0E146069-ED9D-439E-9989-CCF268F6A6C3}\RP452\A0167355.dll Deleted successfully!

 

Attempting to delete: C:\WINDOWS\system32\jtro0793e.dll

C:\WINDOWS\system32\jtro0793e.dll Deleted successfully!

 

Attempting to delete: C:\WINDOWS\system32\guard.tmp

C:\WINDOWS\system32\guard.tmp Deleted successfully!

 

Making registry repairs.

 

Removing: HKLM\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\MS-DOS Emulation

 

Removing: HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Approved "{C5DAC1C4-736B-4B85-AAD7-D9F020977600}"

HKCR\Clsid\{C5DAC1C4-736B-4B85-AAD7-D9F020977600}

 

Restoring Windows certificates.

 

Replaced hosts file with default windows hosts file

 

 

Restoring SeDebugPrivilege for Administrateurs - Succeeded

 

VundoFix V6.1.2

 

Checking Java version...

 

Sun Java not detected

Scan started at 09:21:23 27/08/2006

 

Listing files found while scanning....

 

C:\WINDOWS\system32\byxutqq.dll

C:\WINDOWS\system32\hggfdec.dll

C:\WINDOWS\system32\qoppn.dll

C:\WINDOWS\system32\rqoml.dll

C:\WINDOWS\system32\lmoqr.ini

C:\WINDOWS\system32\lmoqr.bak1

C:\WINDOWS\system32\lmoqr.ini2

C:\WINDOWS\system32\lmoqr.tmp

C:\WINDOWS\system32\urqpnlm.dll

 

Beginning removal...

 

Attempting to delete C:\WINDOWS\system32\byxutqq.dll

C:\WINDOWS\system32\byxutqq.dll Has been deleted!

 

Attempting to delete C:\WINDOWS\system32\hggfdec.dll

C:\WINDOWS\system32\hggfdec.dll Has been deleted!

 

Attempting to delete C:\WINDOWS\system32\qoppn.dll

C:\WINDOWS\system32\qoppn.dll Could not be deleted.

 

Attempting to delete C:\WINDOWS\system32\rqoml.dll

C:\WINDOWS\system32\rqoml.dll Has been deleted!

 

Attempting to delete C:\WINDOWS\system32\lmoqr.ini

C:\WINDOWS\system32\lmoqr.ini Has been deleted!

 

Attempting to delete C:\WINDOWS\system32\lmoqr.bak1

C:\WINDOWS\system32\lmoqr.bak1 Has been deleted!

 

Attempting to delete C:\WINDOWS\system32\lmoqr.ini2

C:\WINDOWS\system32\lmoqr.ini2 Has been deleted!

 

Attempting to delete C:\WINDOWS\system32\lmoqr.tmp

C:\WINDOWS\system32\lmoqr.tmp Has been deleted!

 

Attempting to delete C:\WINDOWS\system32\urqpnlm.dll

C:\WINDOWS\system32\urqpnlm.dll Has been deleted!

 

Performing Repairs to the registry.

Done!

 

VundoFix V6.1.2

 

Checking Java version...

 

Sun Java not detected

Scan started at 09:38:56 27/08/2006

 

Listing files found while scanning....

 

C:\WINDOWS\system32\qoppn.dll

 

Beginning removal...

 

Beginning removal...

 

Attempting to delete C:\WINDOWS\system32\qoppn.dll

C:\WINDOWS\system32\qoppn.dll Could not be deleted.

 

Performing Repairs to the registry.

Done!

 

Cependant avec vundoxfix, j'ai eu un message disant qu'il n'arrivait pas à supprimer

c:windows/system/qoppn.dll

voilà et le pc ne s'est pas éteint tout seul

Sinon tout s'est bien passé

Merci pour ces explications simples

Posté(e)

- Télécharge chercher.zip sur ton bureau

- Ne double-clic pas dessus !! Fais un clic droit sur le fichier et extraire tout

- Un nouveau dossier chercher va être créé

- Ouvre le et double-clic sur chercher.cmd

- Une fenêtre va s'ouvrir, laisse la ouverte et appuie sur une touche quand on te le demande

- Copie/colle le contenu du bloc-note qui s'ouvre, pour cela :

-- Dans le bloc-note, cliquez sur le menu Edition / Selectionner tout

-- A nouveau menu Edition / copier

-- Dans un nouveau message ici, faire un clic droit / coller

Posté(e)

VundoFix V6.1.2

 

Checking Java version...

 

Sun Java not detected

Scan started at 09:21:23 27/08/2006

 

Listing files found while scanning....

 

C:\WINDOWS\system32\byxutqq.dll

C:\WINDOWS\system32\hggfdec.dll

C:\WINDOWS\system32\qoppn.dll

C:\WINDOWS\system32\rqoml.dll

C:\WINDOWS\system32\lmoqr.ini

C:\WINDOWS\system32\lmoqr.bak1

C:\WINDOWS\system32\lmoqr.ini2

C:\WINDOWS\system32\lmoqr.tmp

C:\WINDOWS\system32\urqpnlm.dll

 

Beginning removal...

 

Attempting to delete C:\WINDOWS\system32\byxutqq.dll

C:\WINDOWS\system32\byxutqq.dll Has been deleted!

 

Attempting to delete C:\WINDOWS\system32\hggfdec.dll

C:\WINDOWS\system32\hggfdec.dll Has been deleted!

 

Attempting to delete C:\WINDOWS\system32\qoppn.dll

C:\WINDOWS\system32\qoppn.dll Could not be deleted.

 

Attempting to delete C:\WINDOWS\system32\rqoml.dll

C:\WINDOWS\system32\rqoml.dll Has been deleted!

 

Attempting to delete C:\WINDOWS\system32\lmoqr.ini

C:\WINDOWS\system32\lmoqr.ini Has been deleted!

 

Attempting to delete C:\WINDOWS\system32\lmoqr.bak1

C:\WINDOWS\system32\lmoqr.bak1 Has been deleted!

 

Attempting to delete C:\WINDOWS\system32\lmoqr.ini2

C:\WINDOWS\system32\lmoqr.ini2 Has been deleted!

 

Attempting to delete C:\WINDOWS\system32\lmoqr.tmp

C:\WINDOWS\system32\lmoqr.tmp Has been deleted!

 

Attempting to delete C:\WINDOWS\system32\urqpnlm.dll

C:\WINDOWS\system32\urqpnlm.dll Has been deleted!

 

Performing Repairs to the registry.

Done!

 

VundoFix V6.1.2

 

Checking Java version...

 

Sun Java not detected

Scan started at 09:38:56 27/08/2006

 

Listing files found while scanning....

 

C:\WINDOWS\system32\qoppn.dll

 

Beginning removal...

 

Beginning removal...

 

Attempting to delete C:\WINDOWS\system32\qoppn.dll

C:\WINDOWS\system32\qoppn.dll Could not be deleted.

 

Performing Repairs to the registry.

Done!

 

voilà...

Rejoindre la conversation

Vous pouvez publier maintenant et vous inscrire plus tard. Si vous avez un compte, connectez-vous maintenant pour publier avec votre compte.
Remarque : votre message nécessitera l’approbation d’un modérateur avant de pouvoir être visible.

Invité
Répondre à ce sujet…

×   Collé en tant que texte enrichi.   Coller en tant que texte brut à la place

  Seulement 75 émoticônes maximum sont autorisées.

×   Votre lien a été automatiquement intégré.   Afficher plutôt comme un lien

×   Votre contenu précédent a été rétabli.   Vider l’éditeur

×   Vous ne pouvez pas directement coller des images. Envoyez-les depuis votre ordinateur ou insérez-les depuis une URL.

  • En ligne récemment   0 membre est en ligne

    • Aucun utilisateur enregistré regarde cette page.
×
×
  • Créer...