Aller au contenu
  • Pas encore inscrit ?

    Pourquoi ne pas vous inscrire ? C'est simple, rapide et gratuit.
    Pour en savoir plus, lisez Les avantages de l'inscription... et la Charte de Zébulon.
    De plus, les messages que vous postez en tant qu'invité restent invisibles tant qu'un modérateur ne les a pas validés. Inscrivez-vous, ce sera un gain de temps pour tout le monde, vous, les helpeurs et les modérateurs ! :wink:

Messages recommandés

Posté(e)

Se pourrait-il que nous l'avons finalement eu... voici le log. Symantec ne le détecte plus maintenant

 

Logfile of The Avenger version 1, by Swandog46

Running from registry key:

\Registry\Machine\System\CurrentControlSet\Services\heeugghg

 

*******************

 

Script file located at: \??\C:\WINDOWS\nhvqamud.txt

Script file opened successfully.

 

Script file read successfully

 

Backups directory opened successfully at C:\Avenger

 

*******************

 

Beginning to process script file:

 

File C:\windows\system32\ssqpp.dll deleted successfully.

File C:\windows\system32\ppqss.ini deleted successfully.

File C:\windows\system32\ppqss.bak2 deleted successfully.

 

Completed script processing.

 

*******************

 

Finished! Terminate.

 

 

Merci pour ton aide si précieuse.

Posté(e)

merci alors voici

 

C:\WINDOWS\system32\ppqss.tmp

C:\WINDOWS\system32\ssqpp.dll

 

Beginning removal...

 

Attempting to delete C:\WINDOWS\system32\ppqss.tmp

C:\WINDOWS\system32\ppqss.tmp Has been deleted!

 

Performing Repairs to the registry.

Done!

Posté(e)

VundoFix V6.5.6

 

Checking Java version...

 

Java version is 1.5.0.3

Old versions of java are exploitable and should be removed.

 

Scan started at 14:32:27 2007-07-27

 

Listing files found while scanning....

 

C:\WINDOWS\system32\ssqpp.dll

 

Beginning removal...

 

Performing Repairs to the registry.

Done!

Posté(e)

RE

 

Bon on va faire autre chose

 

Télécharge SpySweeper (de Webroot) de ce lien (version d'essai de 14 jours) :

http://www.webroot.com/fr/land/karangatria...&ac=webroot

  • Clique sur "Télécharger la version test".
  • Installe le programme. Une fois installé, il se lancera.
  • L'option de le mettre à jour s'affichera; clic Yes.
  • Lorsque les mises à jour seront installées, clic Options sur la gauche.
  • Clic sur l'onglet Sweep Options.
  • Sous What to Sweep, coche les options suivantes:

    • Sweep Memory
    • Sweep Registry
    • Sweep Cookies
    • Sweep All User Accounts
    • Enable Direct Disk Sweeping
    • Sweep Contents of Compressed Files
    • Sweep for Rootkits
    • DÉCOCHE Do not Sweep System Restore Folder.

    [*]Clic Sweep Now sur la gauche.

    [*]Clic sur Start.

    [*]Quand le scan est terminé, clic sur Next.

    [*]Assure-toi que tous les items sont cochés, puis clic sur Next.

    [*]Tous les items cochés seront éliminés.

    [*]Si Spy Sweeper veut redémarrer pour terminer le nettoyage : ACCEPTE.

    [*]Clic Session Log au haut - à droite, et copie tout ce qu'il y a dans la fenêtre.

    [*]Clic sur l'onglet Summary, puis clic sur Finish.

    [*]Colle le contenu du "Session Log" dans ta prochaine réponse.

A plus.

Posté(e)

15:19: Removal process completed. Elapsed time 00:00:10

15:19: Quarantining All Traces: zedo cookie

15:19: Quarantining All Traces: xiti cookie

15:19: Quarantining All Traces: burstbeacon cookie

15:19: Quarantining All Traces: weborama cookie

15:19: Quarantining All Traces: tribalfusion cookie

15:19: Quarantining All Traces: statcounter cookie

15:19: Quarantining All Traces: serving-sys cookie

15:19: Quarantining All Traces: partypoker cookie

15:19: Quarantining All Traces: overture cookie

15:19: Quarantining All Traces: mediaplex cookie

15:19: Quarantining All Traces: imrworldwide.com cookie

15:19: Quarantining All Traces: fastclick cookie

15:19: Quarantining All Traces: burstnet cookie

15:19: Quarantining All Traces: bs.serving-sys cookie

15:19: Quarantining All Traces: bluestreak cookie

15:19: Quarantining All Traces: atlas dmt cookie

15:19: Quarantining All Traces: advertising cookie

15:19: Quarantining All Traces: addynamix cookie

15:19: Quarantining All Traces: adecn cookie

15:19: Quarantining All Traces: yieldmanager cookie

15:19: Quarantining All Traces: 2o7.net cookie

15:19: Quarantining All Traces: 247realmedia cookie

15:19: Quarantining All Traces: syswebtelecom

15:19: Quarantining All Traces: trojan-phisher-metafisher

15:18: Removal process initiated

15:16: Traces Found: 28

15:16: Full Sweep has completed. Elapsed time 00:15:05

15:16: File Sweep Complete, Elapsed Time: 00:12:19

15:14: Warning: Failed to access drive E:

15:14: Warning: Failed to access drive D:

15:04: Starting File Sweep

15:04: Warning: Failed to access drive A:

15:03: Cookie Sweep Complete, Elapsed Time: 00:00:02

15:03: c:\documents and settings\louisp\cookies\louisp@zedo[1].txt (ID = 3762)

15:03: Found Spy Cookie: zedo cookie

15:03: c:\documents and settings\louisp\cookies\louisp@xiti[1].txt (ID = 3717)

15:03: Found Spy Cookie: xiti cookie

15:03: c:\documents and settings\louisp\cookies\louisp@www.burstnet[1].txt (ID = 2337)

15:03: c:\documents and settings\louisp\cookies\louisp@www.burstbeacon[1].txt (ID = 2335)

15:03: Found Spy Cookie: burstbeacon cookie

15:03: c:\documents and settings\louisp\cookies\louisp@weborama[2].txt (ID = 3658)

15:03: Found Spy Cookie: weborama cookie

15:03: c:\documents and settings\louisp\cookies\louisp@tribalfusion[1].txt (ID = 3589)

15:03: Found Spy Cookie: tribalfusion cookie

15:03: c:\documents and settings\louisp\cookies\louisp@statcounter[1].txt (ID = 3447)

15:03: Found Spy Cookie: statcounter cookie

15:03: c:\documents and settings\louisp\cookies\louisp@serving-sys[2].txt (ID = 3343)

15:03: Found Spy Cookie: serving-sys cookie

15:03: c:\documents and settings\louisp\cookies\louisp@partypoker[2].txt (ID = 3111)

15:03: Found Spy Cookie: partypoker cookie

15:03: c:\documents and settings\louisp\cookies\louisp@partygaming.122.2o7[1].txt (ID = 1958)

15:03: c:\documents and settings\louisp\cookies\louisp@overture[1].txt (ID = 3105)

15:03: Found Spy Cookie: overture cookie

15:03: c:\documents and settings\louisp\cookies\louisp@network-ca.247realmedia[1].txt (ID = 1954)

15:03: c:\documents and settings\louisp\cookies\louisp@msnportal.112.2o7[1].txt (ID = 1958)

15:03: c:\documents and settings\louisp\cookies\louisp@mediaplex[1].txt (ID = 6442)

15:03: Found Spy Cookie: mediaplex cookie

15:03: c:\documents and settings\louisp\cookies\louisp@imrworldwide[2].txt (ID = 2845)

15:03: Found Spy Cookie: imrworldwide.com cookie

15:03: c:\documents and settings\louisp\cookies\louisp@fastclick[1].txt (ID = 2651)

15:03: Found Spy Cookie: fastclick cookie

15:03: c:\documents and settings\louisp\cookies\louisp@burstnet[2].txt (ID = 2336)

15:03: Found Spy Cookie: burstnet cookie

15:03: c:\documents and settings\louisp\cookies\louisp@bs.serving-sys[1].txt (ID = 2330)

15:03: Found Spy Cookie: bs.serving-sys cookie

15:03: c:\documents and settings\louisp\cookies\louisp@bluestreak[2].txt (ID = 2314)

15:03: Found Spy Cookie: bluestreak cookie

15:03: c:\documents and settings\louisp\cookies\louisp@atdmt[2].txt (ID = 2253)

15:03: Found Spy Cookie: atlas dmt cookie

15:03: c:\documents and settings\louisp\cookies\louisp@advertising[2].txt (ID = 2175)

15:03: Found Spy Cookie: advertising cookie

15:03: c:\documents and settings\louisp\cookies\louisp@ads.addynamix[1].txt (ID = 2062)

15:03: Found Spy Cookie: addynamix cookie

15:03: c:\documents and settings\louisp\cookies\louisp@adecn[1].txt (ID = 2063)

15:03: Found Spy Cookie: adecn cookie

15:03: c:\documents and settings\louisp\cookies\louisp@ad.yieldmanager[2].txt (ID = 3751)

15:03: Found Spy Cookie: yieldmanager cookie

15:03: c:\documents and settings\louisp\cookies\louisp@2o7[1].txt (ID = 1957)

15:03: Found Spy Cookie: 2o7.net cookie

15:03: c:\documents and settings\louisp\cookies\louisp@247realmedia[1].txt (ID = 1953)

15:03: Found Spy Cookie: 247realmedia cookie

15:03: Starting Cookie Sweep

15:03: Registry Sweep Complete, Elapsed Time:00:00:30

15:03: HKU\S-1-5-21-1078081533-448539723-839522115-1129\software\sponsoradulto2\ (ID = 143576)

15:03: Found Adware: syswebtelecom

15:03: HKLM\software\microsoft\windows\currentversion\control panel\load\ (ID = 1150937)

15:03: Found Trojan Horse: trojan-phisher-metafisher

15:03: Starting Registry Sweep

15:03: Memory Sweep Complete, Elapsed Time: 00:02:03

15:01: Starting Memory Sweep

15:01: Sweep initiated using definitions version 734

15:01: Spy Sweeper 5.0.7.1608 started

15:01: | Start of Session, 2007-07-27 |

********

15:01: | End of Session, 2007-07-27 |

Keylogger Shield: Off

BHO Shield: On

IE Security Shield: On

Alternate Data Stream (ADS) Execution Shield: On

Startup Shield: On

Common Ad Sites Shield: Off

Hosts File Shield: On

Spy Communication Shield: On

ActiveX Shield: On

Windows Messenger Service Shield: On

IE Favorites Shield: On

Spy Installation Shield: On

Memory Shield: On

IE Hijack Shield: On

IE Tracking Cookies Shield: Off

14:56: Shield States

14:56: Spyware Definitions: 734

14:55: Spy Sweeper 5.0.7.1608 started

14:55: Spy Sweeper 5.0.7.1608 started

14:55: | Start of Session, 2007-07-27 |

********

Posté(e)

log hijackthis

 

Logfile of HijackThis v1.99.1

Scan saved at 15:32, on 2007-07-27

Platform: Windows XP SP2 (WinNT 5.01.2600)

MSIE: Internet Explorer v7.00 (7.00.6000.16473)

 

Running processes:

C:\WINDOWS\System32\smss.exe

C:\WINDOWS\system32\winlogon.exe

C:\WINDOWS\system32\services.exe

C:\WINDOWS\system32\lsass.exe

C:\WINDOWS\system32\Ati2evxx.exe

C:\WINDOWS\system32\svchost.exe

C:\WINDOWS\System32\svchost.exe

C:\WINDOWS\system32\brsvc01a.exe

C:\WINDOWS\system32\spoolsv.exe

C:\WINDOWS\system32\brss01a.exe

C:\WINDOWS\system32\Brmfrmps.exe

C:\Program Files\Symantec_Client_Security\Symantec AntiVirus\DefWatch.exe

C:\WINDOWS\System32\svchost.exe

C:\Program Files\Microsoft SQL Server\MSSQL$MICROSOFTSMLBIZ\Binn\sqlservr.exe

C:\WINDOWS\system32\Ati2evxx.exe

C:\WINDOWS\Explorer.EXE

C:\Program Files\Symantec_Client_Security\Symantec AntiVirus\Rtvscan.exe

C:\WINDOWS\system32\svchost.exe

C:\Program Files\Webroot\Spy Sweeper\SpySweeper.exe

C:\Program Files\ATI Technologies\ATI Control Panel\atiptaxx.exe

C:\Program Files\ULi5287\ULi5287.exe

C:\Program Files\Analog Devices\Core\smax4pnp.exe

C:\Program Files\Analog Devices\SoundMAX\Smax4.exe

C:\Program Files\CyberLink DVD Solution\PowerDVD\PDVDServ.exe

C:\PROGRA~1\SYMANT~1\SYMANT~1\vptray.exe

C:\Program Files\ScanSoft\PaperPort\pptd40nt.exe

C:\Program Files\iTunes\iTunesHelper.exe

C:\Program Files\Brother\ControlCenter2\brctrcen.exe

C:\Program Files\Java\jre1.6.0_01\bin\jusched.exe

C:\Program Files\Webroot\Spy Sweeper\SpySweeperUI.exe

C:\WINDOWS\system32\ctfmon.exe

C:\Program Files\Google\GoogleToolbarNotifier\1.2.1128.5462\GoogleToolbarNotifier.exe

C:\Program Files\Microsoft SQL Server\80\Tools\Binn\sqlmangr.exe

C:\Program Files\iPod\bin\iPodService.exe

C:\Program Files\Internet Explorer\iexplore.exe

C:\Program Files\Fichiers communs\Microsoft Shared\Windows Live\WLLoginProxy.exe

C:\WINDOWS\system32\msiexec.exe

C:\Program Files\Microsoft Office\OFFICE11\OUTLOOK.EXE

C:\Program Files\Microsoft Office\OFFICE11\WINWORD.EXE

C:\Program Files\WinRAR\WinRAR.exe

C:\Program Files\Webroot\Spy Sweeper\SSU.EXE

C:\DOCUME~1\louisp\LOCALS~1\Temp\Rar$EX00.875\kiff128.exe

 

R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157

R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896

R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896

R1 - HKCU\Software\Microsoft\Internet Explorer\SearchURL,(Default) = http://g.msn.ca/0SEENCA/SAOS01?FORM=TOOLBR

R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName = Liens

O2 - BHO: Adobe PDF Reader Link Helper - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 7.0\ActiveX\AcroIEHelper.dll

O2 - BHO: (no name) - {2771DBF5-604E-46A5-A03B-C9935307CE5C} - C:\WINDOWS\system32\ssqpp.dll (file missing)

O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre1.6.0_01\bin\ssv.dll

O2 - BHO: (no name) - {7E853D72-626A-48EC-A868-BA8D5E23E045} - (no file)

O2 - BHO: Windows Live Sign-in Helper - {9030D464-4C02-4ABF-8ECC-5164760863C6} - C:\Program Files\Fichiers communs\Microsoft Shared\Windows Live\WindowsLiveLogin.dll

O2 - BHO: Google Toolbar Helper - {AA58ED58-01DD-4d91-8333-CF10577473F7} - c:\program files\google\googletoolbar2.dll

O2 - BHO: Windows Live Toolbar Helper - {BDBD1DAD-C946-4A17-ADC1-64B5B4FF55D0} - C:\Program Files\Windows Live Toolbar\msntb.dll

O3 - Toolbar: &Google - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - c:\program files\google\googletoolbar2.dll

O3 - Toolbar: Windows Live Toolbar - {BDAD1DAD-C946-4A17-ADC1-64B5B4FF55D0} - C:\Program Files\Windows Live Toolbar\msntb.dll

O4 - HKLM\..\Run: [ATIPTA] "C:\Program Files\ATI Technologies\ATI Control Panel\atiptaxx.exe"

O4 - HKLM\..\Run: [uLiRaid] "C:\Program Files\ULi5287\ULi5287.exe"

O4 - HKLM\..\Run: [High Definition Audio Property Page Shortcut] HDAShCut.exe

O4 - HKLM\..\Run: [soundMAXPnP] "C:\Program Files\Analog Devices\Core\smax4pnp.exe"

O4 - HKLM\..\Run: [soundMAX] "C:\Program Files\Analog Devices\SoundMAX\Smax4.exe" /tray

O4 - HKLM\..\Run: [RemoteControl] "C:\Program Files\CyberLink DVD Solution\PowerDVD\PDVDServ.exe"

O4 - HKLM\..\Run: [Windows Defender] "C:\Program Files\Windows Defender\MSASCui.exe" -hide

O4 - HKLM\..\Run: [vptray] C:\PROGRA~1\SYMANT~1\SYMANT~1\vptray.exe

O4 - HKLM\..\Run: [sSBkgdUpdate] "C:\Program Files\Fichiers communs\Scansoft Shared\SSBkgdUpdate\SSBkgdupdate.exe" -Embedding -boot

O4 - HKLM\..\Run: [PaperPort PTD] "C:\Program Files\ScanSoft\PaperPort\pptd40nt.exe"

O4 - HKLM\..\Run: [indexSearch] "C:\Program Files\ScanSoft\PaperPort\IndexSearch.exe"

O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime

O4 - HKLM\..\Run: [iTunesHelper] "C:\Program Files\iTunes\iTunesHelper.exe"

O4 - HKLM\..\Run: [setDefPrt] "C:\Program Files\Brother\Brmfl04a\BrStDvPt.exe"

O4 - HKLM\..\Run: [ControlCenter2.0] "C:\Program Files\Brother\ControlCenter2\brctrcen.exe" /autorun

O4 - HKLM\..\Run: [sunJavaUpdateSched] "C:\Program Files\Java\jre1.6.0_01\bin\jusched.exe"

O4 - HKLM\..\Run: [WinampAgent] "C:\Program Files\Winamp\winampa.exe"

O4 - HKLM\..\Run: [spySweeper] "C:\Program Files\Webroot\Spy Sweeper\SpySweeperUI.exe" /startintray

O4 - HKCU\..\Run: [LDM] C:\Program Files\Logitech\Desktop Messenger\8876480\Program\BackWeb-8876480.exe

O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe

O4 - HKCU\..\Run: [ToshibaGLDocMon] "C:\Program Files\TOSHIBA\TOSHIBA e-STUDIO Client\GLDocMon.exe"

O4 - HKCU\..\Run: [WMPNSCFG] "C:\Program Files\Windows Media Player\WMPNSCFG.exe"

O4 - HKCU\..\Run: [swg] "C:\Program Files\Google\GoogleToolbarNotifier\1.2.1128.5462\GoogleToolbarNotifier.exe"

O4 - HKCU\..\Run: [MsnMsgr] "C:\Program Files\MSN Messenger\MsnMsgr.Exe" /background

O4 - HKCU\..\Run: [updateMgr] "C:\Program Files\Adobe\Acrobat 7.0\Reader\AdobeUpdateManager.exe" AcRdB7_0_9 -reboot 1

O4 - Global Startup: Lancement rapide d'Adobe Reader.lnk = C:\Program Files\Adobe\Acrobat 7.0\Reader\reader_sl.exe

O4 - Global Startup: Service Manager.lnk = C:\Program Files\Microsoft SQL Server\80\Tools\Binn\sqlmangr.exe

O4 - Global Startup: Status Monitor.lnk = C:\Program Files\Brother\Brmfcmon\BrMfcWnd.exe

O8 - Extra context menu item: &Windows Live Search - res://C:\Program Files\Windows Live Toolbar\msntb.dll/search.htm

O8 - Extra context menu item: Add to Windows &Live Favorites - http://favorites.live.com/quickadd.aspx

O8 - Extra context menu item: E&xporter vers Microsoft Excel - res://C:\PROGRA~1\MICROS~2\OFFICE11\EXCEL.EXE/3000

O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_01\bin\ssv.dll

O9 - Extra 'Tools' menuitem: Console Java (Sun) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_01\bin\ssv.dll

O9 - Extra button: Recherche - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~2\OFFICE11\REFIEBAR.DLL

O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - %windir%\Network Diagnostic\xpnetdiag.exe (file missing)

O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - %windir%\Network Diagnostic\xpnetdiag.exe (file missing)

O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe

O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe

O11 - Options group: [iNTERNATIONAL] International*

O12 - Plugin for .spop: C:\Program Files\Internet Explorer\Plugins\NPDocBox.dll

O16 - DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} (Shockwave Flash Object) - http://fpdownload2.macromedia.com/get/shoc...ash/swflash.cab

O17 - HKLM\System\CCS\Services\Tcpip\Parameters: Domain = domaine.tadoussac.com

O17 - HKLM\Software\..\Telephony: DomainName = domaine.tadoussac.com

O17 - HKLM\System\CS1\Services\Tcpip\Parameters: Domain = domaine.tadoussac.com

O17 - HKLM\System\CS2\Services\Tcpip\Parameters: Domain = domaine.tadoussac.com

O18 - Protocol: livecall - {828030A1-22C1-4009-854F-8E305202313F} - C:\PROGRA~1\MSNMES~1\MSGRAP~1.DLL

O18 - Protocol: msnim - {828030A1-22C1-4009-854F-8E305202313F} - C:\PROGRA~1\MSNMES~1\MSGRAP~1.DLL

O20 - Winlogon Notify: NavLogon - C:\WINDOWS\system32\NavLogon.dll

O20 - Winlogon Notify: ssqpp - C:\WINDOWS\system32\ssqpp.dll (file missing)

O20 - Winlogon Notify: WgaLogon - C:\WINDOWS\SYSTEM32\WgaLogon.dll

O20 - Winlogon Notify: WRNotifier - C:\WINDOWS\SYSTEM32\WRLogonNTF.dll

O21 - SSODL: WPDShServiceObj - {AAA288BA-9A4C-45B0-95D7-94D524869DB5} - C:\WINDOWS\system32\WPDShServiceObj.dll

O23 - Service: Ati HotKey Poller - ATI Technologies Inc. - C:\WINDOWS\system32\Ati2evxx.exe

O23 - Service: Boonty Games - BOONTY - C:\Program Files\Fichiers communs\BOONTY Shared\Service\Boonty.exe

O23 - Service: Brother Popup Suspend service for Resource manager (brmfrmps) - Unknown owner - C:\WINDOWS\system32\Brmfrmps.exe" -service (file missing)

O23 - Service: BrSplService (Brother XP spl Service) - brother Industries Ltd - C:\WINDOWS\system32\brsvc01a.exe

O23 - Service: DefWatch - Symantec Corporation - C:\Program Files\Symantec_Client_Security\Symantec AntiVirus\DefWatch.exe

O23 - Service: Google Updater Service (gusvc) - Google - C:\Program Files\Google\Common\Google Updater\GoogleUpdaterService.exe

O23 - Service: Service de l'iPod (iPod Service) - Apple Inc. - C:\Program Files\iPod\bin\iPodService.exe

O23 - Service: MSSQL$MICROSOFTSMLBIZ - Unknown owner - C:\Program Files\Microsoft SQL Server\MSSQL$MICROSOFTSMLBIZ\Binn\sqlservr.exe" -sMICROSOFTSMLBIZ (file missing)

O23 - Service: Symantec AntiVirus Client (Norton AntiVirus Server) - Symantec Corporation - C:\Program Files\Symantec_Client_Security\Symantec AntiVirus\Rtvscan.exe

O23 - Service: SQLAgent$MICROSOFTSMLBIZ - Unknown owner - C:\Program Files\Microsoft SQL Server\MSSQL$MICROSOFTSMLBIZ\Binn\sqlagent.EXE" -i MICROSOFTSMLBIZ (file missing)

O23 - Service: Moteur Webroot Spy Sweeper (WebrootSpySweeperService) - Webroot Software, Inc. - C:\Program Files\Webroot\Spy Sweeper\SpySweeper.exe

 

 

 

je t'envoi dans quelques minutes le log de kaspersky, c'est assez long

Rejoindre la conversation

Vous pouvez publier maintenant et vous inscrire plus tard. Si vous avez un compte, connectez-vous maintenant pour publier avec votre compte.
Remarque : votre message nécessitera l’approbation d’un modérateur avant de pouvoir être visible.

Invité
Répondre à ce sujet…

×   Collé en tant que texte enrichi.   Coller en tant que texte brut à la place

  Seulement 75 émoticônes maximum sont autorisées.

×   Votre lien a été automatiquement intégré.   Afficher plutôt comme un lien

×   Votre contenu précédent a été rétabli.   Vider l’éditeur

×   Vous ne pouvez pas directement coller des images. Envoyez-les depuis votre ordinateur ou insérez-les depuis une URL.

  • En ligne récemment   0 membre est en ligne

    • Aucun utilisateur enregistré regarde cette page.
×
×
  • Créer...