Aller au contenu
  • Pas encore inscrit ?

    Pourquoi ne pas vous inscrire ? C'est simple, rapide et gratuit.
    Pour en savoir plus, lisez Les avantages de l'inscription... et la Charte de Zébulon.
    De plus, les messages que vous postez en tant qu'invité restent invisibles tant qu'un modérateur ne les a pas validés. Inscrivez-vous, ce sera un gain de temps pour tout le monde, vous, les helpeurs et les modérateurs ! :wink:

Messages recommandés

Posté(e)

Bonjour à tous, j'ai besoin d'aide et c'est vers vous que je me tourne.

Depuis quelques jour je me retrouve infecté par certains virus dont deux principaux:

TR/Monder.bjb ; dans=>C:\WINDOWS\system32\hgGxUMCu.dll

TR/Agent.34176 ; dans=>C:\WINDOWS\system32\jkkKbYPF.dll

J'ai essayé de les détruire maintes fois mais sans aucun résultat.

 

Je viens de lançer HIJACKTHIS pour analyser mon ordi et à présent j'ai besoins de conseils et d'aide

pour aller plus loin et éradiquer tout ces hotes indésirables.

Je vous dépose le rapport émi par HIJACKTHIS pour que vous puissiez vous rendre compte des dégats

 

 

 

 

 

 

 

Logfile of Trend Micro HijackThis v2.0.2

Scan saved at 19:41:21, on 08/08/2008

Platform: Windows XP SP3 (WinNT 5.01.2600)

MSIE: Internet Explorer v7.00 (7.00.6000.16674)

Boot mode: Normal

 

Running processes:

C:\WINDOWS\System32\smss.exe

C:\WINDOWS\system32\winlogon.exe

C:\WINDOWS\system32\services.exe

C:\WINDOWS\system32\lsass.exe

C:\WINDOWS\system32\Ati2evxx.exe

C:\WINDOWS\system32\svchost.exe

C:\WINDOWS\System32\svchost.exe

C:\WINDOWS\system32\Ati2evxx.exe

D:\Program Files\Lavasoft\Ad-Aware\aawservice.exe

C:\WINDOWS\system32\spoolsv.exe

C:\WINDOWS\Explorer.EXE

C:\Program Files\AntiVir PersonalEdition Classic\sched.exe

C:\Program Files\AntiVir PersonalEdition Classic\avguard.exe

C:\Program Files\Fichiers communs\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe

C:\WINDOWS\System32\svchost.exe

c:\program files\mcafee.com\agent\mcdetect.exe

c:\PROGRA~1\mcafee.com\agent\mctskshd.exe

C:\Documents and Settings\All Users\Application Data\ubotojir\slwbsjid.exe

C:\WINDOWS\SOUNDMAN.EXE

C:\Program Files\AntiVir PersonalEdition Classic\avgnt.exe

C:\PROGRA~1\mcafee.com\agent\mcagent.exe

C:\Program Files\ATI Technologies\ATI.ACE\CLI.EXE

C:\Program Files\Java\jre1.6.0_07\bin\jusched.exe

C:\PROGRA~1\McAfee.com\PERSON~1\MpfTray.exe

C:\Program Files\iTunes\iTunesHelper.exe

C:\Program Files\Fichiers communs\Real\Update_OB\realsched.exe

C:\WINDOWS\system32\rundll32.exe

C:\Program Files\Fichiers communs\Ahead\lib\NMBgMonitor.exe

C:\WINDOWS\system32\ctfmon.exe

C:\Program Files\Messenger\msmsgs.exe

C:\PROGRA~1\McAfee.com\PERSON~1\MPFSERVICE.exe

D:\Program Files\Stardock\CursorFX\CursorFX.exe

C:\Program Files\Raxco\PerfectDisk\PDAgent.exe

D:\Program Files\Logitech\SetPoint\SetPoint.exe

C:\WINDOWS\system32\svchost.exe

C:\PROGRA~1\McAfee.com\PERSON~1\MpfAgent.exe

C:\Program Files\Raxco\PerfectDisk\PDEngine.exe

C:\WINDOWS\system32\wscntfy.exe

C:\Program Files\ATI Technologies\ATI.ACE\cli.exe

C:\Program Files\ATI Technologies\ATI.ACE\cli.exe

C:\Program Files\Fichiers communs\Logishrd\KHAL2\KHALMNPR.EXE

C:\Program Files\iPod\bin\iPodService.exe

C:\Program Files\Windows Live\Messenger\usnsvc.exe

C:\WINDOWS\Explorer.EXE

C:\WINDOWS\system32\rundll32.exe

C:\Documents and Settings\BRUNO\Bureau\HijackThis.exe

 

R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Bar = http://recherche.neuf.fr/ie/default.html

R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = http://recherche.neuf.fr/

R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://google.fr/

R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157

R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://recherche.neuf.fr/

R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896

R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?LinkId=69157

R0 - HKLM\Software\Microsoft\Internet Explorer\Search,SearchAssistant = http://recherche.neuf.fr/ie/default.html

R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Local Page =

R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Local Page =

R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName = Liens

O1 - Hosts: 66.98.148.65 auto.search.msn.com

O1 - Hosts: 66.98.148.65 auto.search.msn.es

O4 - HKLM\..\Run: [soundMan] SOUNDMAN.EXE

O4 - HKLM\..\Run: [ATICCC] "C:\Program Files\ATI Technologies\ATI.ACE\CLIStart.exe"

O4 - HKLM\..\Run: [avgnt] "C:\Program Files\AntiVir PersonalEdition Classic\avgnt.exe" /min

O4 - HKLM\..\Run: [MCAgentExe] c:\PROGRA~1\mcafee.com\agent\mcagent.exe

O4 - HKLM\..\Run: [MCUpdateExe] C:\PROGRA~1\mcafee.com\agent\mcupdate.exe

O4 - HKLM\..\Run: [sunJavaUpdateSched] "C:\Program Files\Java\jre1.6.0_07\bin\jusched.exe"

O4 - HKLM\..\Run: [MPFExe] C:\PROGRA~1\McAfee.com\PERSON~1\MpfTray.exe

O4 - HKLM\..\Run: [NeroFilterCheck] C:\WINDOWS\system32\NeroCheck.exe

O4 - HKLM\..\Run: [Kernel and Hardware Abstraction Layer] KHALMNPR.EXE

O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime

O4 - HKLM\..\Run: [iTunesHelper] "C:\Program Files\iTunes\iTunesHelper.exe"

O4 - HKLM\..\Run: [TkBellExe] "C:\Program Files\Fichiers communs\Real\Update_OB\realsched.exe" -osboot

O4 - HKLM\..\Run: [d09361bb] rundll32.exe "C:\WINDOWS\system32\eelhoctx.dll",b

O4 - HKCU\..\Run: [bgMonitor_{79662E04-7C6C-4d9f-84C7-88D8A56B10AA}] "C:\Program Files\Fichiers communs\Ahead\lib\NMBgMonitor.exe"

O4 - HKCU\..\Run: [swg] C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe

O4 - HKCU\..\Run: [MsnMsgr] "C:\Program Files\Windows Live\Messenger\msnmsgr.exe" /background

O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe

O4 - HKCU\..\Run: [MSMSGS] "C:\Program Files\Messenger\msmsgs.exe" /background

O4 - HKCU\..\Run: [CursorFX] "D:\Program Files\Stardock\CursorFX\CursorFX.exe"

O4 - HKLM\..\Policies\Explorer\Run: [01Npug5XNe] C:\Documents and Settings\All Users\Application Data\ubotojir\slwbsjid.exe

O4 - HKUS\S-1-5-19\..\RunOnce: [nlpo_04] cmd.exe /c md "%USERPROFILE%\Local Settings\Temp" (User 'SERVICE LOCAL')

O4 - HKUS\S-1-5-19\..\RunOnce: [nlpo_06] rundll32 advpack.dll,LaunchINFSection nlite.inf,nLiteReg (User 'SERVICE LOCAL')

O4 - HKUS\S-1-5-19\..\RunOnce: [nlpo_07] rundll32 advpack.dll,LaunchINFSection nlite.inf,S (User 'SERVICE LOCAL')

O4 - HKUS\S-1-5-20\..\RunOnce: [nlpo_01] rundll32 advpack.dll,DelNodeRunDLL32 "C:\WINDOWS\Srchasst" (User 'SERVICE RÉSEAU')

O4 - HKUS\S-1-5-20\..\RunOnce: [nlpo_06] rundll32 advpack.dll,LaunchINFSection nlite.inf,nLiteReg (User 'SERVICE RÉSEAU')

O4 - HKUS\S-1-5-20\..\RunOnce: [nlpo_07] rundll32 advpack.dll,LaunchINFSection nlite.inf,S (User 'SERVICE RÉSEAU')

O4 - Global Startup: Lancement rapide d'Adobe Reader.lnk = C:\Program Files\Adobe\Acrobat 7.0\Reader\reader_sl.exe

O4 - Global Startup: Logitech SetPoint.lnk = D:\Program Files\Logitech\SetPoint\SetPoint.exe

O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_07\bin\ssv.dll

O9 - Extra 'Tools' menuitem: Console Java (Sun) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_07\bin\ssv.dll

O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe

O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe

O9 - Extra button: @C:\Program Files\Messenger\Msgslang.dll,-61144 - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe

O9 - Extra 'Tools' menuitem: @C:\Program Files\Messenger\Msgslang.dll,-61144 - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe

O16 - DPF: {20A60F0D-9AFA-4515-A0FD-83BD84642501} (Checkers Class) - http://messenger.zone.msn.com/binary/msgrchkr.cab56986.cab

O16 - DPF: {4ED9DDF0-7479-4BBE-9335-5A1EDB1D8A21} (McAfee.com Operating System Class) - http://download.mcafee.com/molbin/shared/m...90/mcinsctl.cab

O16 - DPF: {5D6F45B3-9043-443D-A792-115447494D24} (UnoCtrl Class) - http://messenger.zone.msn.com/FR-FR/a-UNO1/GAME_UNO1.cab

O16 - DPF: {C3F79A2B-B9B4-4A66-B012-3EE46475B072} (MessengerStatsClient Class) - http://messenger.zone.msn.com/binary/Messe...nt.cab56907.cab

O21 - SSODL: appdbset - {483759E7-0716-4186-98D2-04F3A56BA479} - C:\Program Files\trcjgaf\appdbset.dll

O23 - Service: Lavasoft Ad-Aware Service (aawservice) - Lavasoft - D:\Program Files\Lavasoft\Ad-Aware\aawservice.exe

O23 - Service: AntiVir PersonalEdition Classic Scheduler (AntiVirScheduler) - Avira GmbH - C:\Program Files\AntiVir PersonalEdition Classic\sched.exe

O23 - Service: AntiVir PersonalEdition Classic Guard (AntiVirService) - Avira GmbH - C:\Program Files\AntiVir PersonalEdition Classic\avguard.exe

O23 - Service: Apple Mobile Device - Apple, Inc. - C:\Program Files\Fichiers communs\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe

O23 - Service: Ati HotKey Poller - ATI Technologies Inc. - C:\WINDOWS\system32\Ati2evxx.exe

O23 - Service: ATI Smart - Unknown owner - C:\WINDOWS\system32\ati2sgag.exe

O23 - Service: Google Updater Service (gusvc) - Google - C:\Program Files\Google\Common\Google Updater\GoogleUpdaterService.exe

O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Fichiers communs\InstallShield\Driver\11\Intel 32\IDriverT.exe

O23 - Service: Service de l'iPod (iPod Service) - Apple Inc. - C:\Program Files\iPod\bin\iPodService.exe

O23 - Service: Logitech Bluetooth Service (LBTServ) - Logitech, Inc. - C:\Program Files\Fichiers communs\Logitech\Bluetooth\LBTServ.exe

O23 - Service: McAfee WSC Integration (McDetect.exe) - McAfee, Inc - c:\program files\mcafee.com\agent\mcdetect.exe

O23 - Service: McAfee Task Scheduler (McTskshd.exe) - McAfee, Inc - c:\PROGRA~1\mcafee.com\agent\mctskshd.exe

O23 - Service: McAfee SecurityCenter Update Manager (mcupdmgr.exe) - McAfee, Inc - C:\PROGRA~1\McAfee.com\Agent\mcupdmgr.exe

O23 - Service: McAfee Personal Firewall Service (MpfService) - McAfee Corporation - C:\PROGRA~1\McAfee.com\PERSON~1\MPFSERVICE.exe

O23 - Service: PDAgent - Raxco Software, Inc. - C:\Program Files\Raxco\PerfectDisk\PDAgent.exe

O23 - Service: PDEngine - Raxco Software, Inc. - C:\Program Files\Raxco\PerfectDisk\PDEngine.exe

 

--

End of file - 9526 bytes

 

 

 

 

 

Voila ; j'èspère que vous pourrez m'aider afin que mon ordi retrouve sa pleine forme.

 

Merçi pour tout , par avance et à bientôt.

 

 

(PS : Bonnes vacançes à tous ceux qui y sont et surtout courage pour les autres)

Posté(e)

J'ai un faible pour les multi infections. :P

 

Il y en a partout, mais j'ai vu pire. :P

 

Télécharge Lop S&D (d'Eric_71) sur ton bureau

 

  • Double-clique dessus pour lancer l'installation
  • Puis double-clique sur le raccourci Lop S&D présent sur ton bureau
  • Sélectionne la langue souhaitée, puis choisis l'Option 1 ( Recherche )
  • Patiente jusqu'à la fin du scan
  • Poste le rapport généré ( C:\lopR.txt )

 

( Si le Bureau ne réapparait pas presse Ctrl + Alt + Suppr , Onglet Fichier , Nouvelle tâche , tape explorer.exe et valide).

 

----

Posté(e)
J'ai un faible pour les multi infections. :P

 

Il y en a partout, mais j'ai vu pire. :P

 

Télécharge Lop S&D (d'Eric_71) sur ton bureau

 

  • Double-clique dessus pour lancer l'installation
  • Puis double-clique sur le raccourci Lop S&D présent sur ton bureau
  • Sélectionne la langue souhaitée, puis choisis l'Option 1 ( Recherche )
  • Patiente jusqu'à la fin du scan
  • Poste le rapport généré ( C:\lopR.txt )

 

( Si le Bureau ne réapparait pas presse Ctrl + Alt + Suppr , Onglet Fichier , Nouvelle tâche , tape explorer.exe et valide).

 

----

 

 

 

 

Bsr Falkra, merçi de t'interesser à mon cas qui je l'èspère n'est pas désesperé.

J'ai donc lançé le scan du système et en voilà le résultat:

 

 

 

 

--------------------\\ Lop S&D 4.2.2-6 XP/Vista

 

[ Windows XP (NT 5.1) Build 2600, Service Pack 3 ]

[ USER : BRUNO ] [ "C:\Lop SD" ] [ Selection : 1 ]

[ 11/08/2008 | 1:44:47,64 ] [ PC : ORDISUPERB ]

[ MAJ : 09-08-2008 | 21:15 ]

 

--------------------\\ Listing des dossiers dans APPLIC~1

 

[17/01/2007|00:11] C:\DOCUME~1\ADMINI~1\APPLIC~1\desktop.ini

[07/08/2008|20:38] C:\DOCUME~1\ADMINI~1\APPLIC~1\Microsoft

[07/08/2008|20:45] C:\DOCUME~1\ADMINI~1\APPLIC~1\Real

 

[13/12/2007|11:55] C:\DOCUME~1\ALAN\APPLIC~1\Adobe

[05/09/2007|19:48] C:\DOCUME~1\ALAN\APPLIC~1\AdobeUM

[17/02/2007|13:35] C:\DOCUME~1\ALAN\APPLIC~1\Ahead

[16/04/2008|13:27] C:\DOCUME~1\ALAN\APPLIC~1\Apple Computer

[20/01/2007|05:26] C:\DOCUME~1\ALAN\APPLIC~1\ATI

[17/01/2007|00:11] C:\DOCUME~1\ALAN\APPLIC~1\desktop.ini

[10/01/2008|19:32] C:\DOCUME~1\ALAN\APPLIC~1\DivX

[03/10/2007|14:52] C:\DOCUME~1\ALAN\APPLIC~1\Google

[20/01/2007|05:26] C:\DOCUME~1\ALAN\APPLIC~1\Identities

[20/01/2007|05:26] C:\DOCUME~1\ALAN\APPLIC~1\Logitech

[20/01/2007|17:24] C:\DOCUME~1\ALAN\APPLIC~1\Macromedia

[16/05/2007|10:55] C:\DOCUME~1\ALAN\APPLIC~1\McAfee.com Personal Firewall

[17/02/2007|13:36] C:\DOCUME~1\ALAN\APPLIC~1\Media Player Classic

[23/12/2007|21:31] C:\DOCUME~1\ALAN\APPLIC~1\Microsoft

[25/07/2008|14:14] C:\DOCUME~1\ALAN\APPLIC~1\Real

[03/02/2007|16:38] C:\DOCUME~1\ALAN\APPLIC~1\Sun

 

[17/02/2008|04:41] C:\DOCUME~1\ALLUSE~1\APPLIC~1\.zreglib

[02/07/2008|20:21] C:\DOCUME~1\ALLUSE~1\APPLIC~1\{A850D4D9-871B-4234-908D-21C457767270}

[19/01/2007|00:56] C:\DOCUME~1\ALLUSE~1\APPLIC~1\addr_file.html

[27/05/2008|22:38] C:\DOCUME~1\ALLUSE~1\APPLIC~1\Adobe

[11/08/2008|01:22] C:\DOCUME~1\ALLUSE~1\APPLIC~1\AntiVir PersonalEdition Classic

[09/01/2008|17:14] C:\DOCUME~1\ALLUSE~1\APPLIC~1\Apple

[08/02/2008|02:20] C:\DOCUME~1\ALLUSE~1\APPLIC~1\Apple Computer

[17/01/2007|00:11] C:\DOCUME~1\ALLUSE~1\APPLIC~1\desktop.ini

[19/01/2007|02:43] C:\DOCUME~1\ALLUSE~1\APPLIC~1\DVD Shrink

[03/10/2007|09:00] C:\DOCUME~1\ALLUSE~1\APPLIC~1\Google

[31/07/2008|19:44] C:\DOCUME~1\ALLUSE~1\APPLIC~1\Lavasoft

[07/12/2007|02:30] C:\DOCUME~1\ALLUSE~1\APPLIC~1\LogiShrd

[25/04/2007|21:10] C:\DOCUME~1\ALLUSE~1\APPLIC~1\Logitech

[20/01/2007|11:28] C:\DOCUME~1\ALLUSE~1\APPLIC~1\McAfee.com

[18/02/2007|12:05] C:\DOCUME~1\ALLUSE~1\APPLIC~1\McAfee.com Personal Firewall

[10/11/2007|12:42] C:\DOCUME~1\ALLUSE~1\APPLIC~1\Messenger Plus!

[29/01/2008|03:54] C:\DOCUME~1\ALLUSE~1\APPLIC~1\Microsoft

[26/05/2007|12:32] C:\DOCUME~1\ALLUSE~1\APPLIC~1\Microsoft Games

[29/01/2008|01:35] C:\DOCUME~1\ALLUSE~1\APPLIC~1\Office Genuine Advantage

[24/10/2007|21:48] C:\DOCUME~1\ALLUSE~1\APPLIC~1\QTSBandwidthCache

[19/01/2007|02:23] C:\DOCUME~1\ALLUSE~1\APPLIC~1\Raxco

[21/07/2008|01:55] C:\DOCUME~1\ALLUSE~1\APPLIC~1\SecuriSoft SARL

[26/01/2008|19:55] C:\DOCUME~1\ALLUSE~1\APPLIC~1\SlySoft

[06/08/2008|20:01] C:\DOCUME~1\ALLUSE~1\APPLIC~1\Spybot - Search & Destroy

[23/07/2008|03:51] C:\DOCUME~1\ALLUSE~1\APPLIC~1\ubotojir

[29/01/2008|01:35] C:\DOCUME~1\ALLUSE~1\APPLIC~1\Windows Genuine Advantage

[29/01/2008|03:51] C:\DOCUME~1\ALLUSE~1\APPLIC~1\WLInstaller

 

[19/01/2007|01:47] C:\DOCUME~1\BRUNO\APPLIC~1\Adobe

[27/05/2008|22:38] C:\DOCUME~1\BRUNO\APPLIC~1\AdobeUM

[18/10/2007|17:43] C:\DOCUME~1\BRUNO\APPLIC~1\Ahead

[08/02/2008|02:21] C:\DOCUME~1\BRUNO\APPLIC~1\Apple Computer

[18/01/2007|23:32] C:\DOCUME~1\BRUNO\APPLIC~1\ATI

[17/01/2007|00:11] C:\DOCUME~1\BRUNO\APPLIC~1\desktop.ini

[21/12/2007|01:44] C:\DOCUME~1\BRUNO\APPLIC~1\DivX

[03/10/2007|10:59] C:\DOCUME~1\BRUNO\APPLIC~1\Google

[10/02/2007|13:32] C:\DOCUME~1\BRUNO\APPLIC~1\Help

[17/01/2007|00:40] C:\DOCUME~1\BRUNO\APPLIC~1\Identities

[07/12/2007|02:29] C:\DOCUME~1\BRUNO\APPLIC~1\InstallShield

[21/01/2008|19:44] C:\DOCUME~1\BRUNO\APPLIC~1\Lavasoft

[18/01/2007|23:12] C:\DOCUME~1\BRUNO\APPLIC~1\Logitech

[17/01/2007|00:39] C:\DOCUME~1\BRUNO\APPLIC~1\Macromedia

[03/10/2007|11:06] C:\DOCUME~1\BRUNO\APPLIC~1\McAfee.com Personal Firewall

[19/01/2007|02:10] C:\DOCUME~1\BRUNO\APPLIC~1\Media Player Classic

[07/02/2008|19:12] C:\DOCUME~1\BRUNO\APPLIC~1\Microsoft

[25/07/2008|04:17] C:\DOCUME~1\BRUNO\APPLIC~1\Real

[26/01/2008|19:56] C:\DOCUME~1\BRUNO\APPLIC~1\SlySoft

[19/01/2007|03:41] C:\DOCUME~1\BRUNO\APPLIC~1\Sun

[19/01/2007|02:30] C:\DOCUME~1\BRUNO\APPLIC~1\Winamp

[09/10/2007|18:35] C:\DOCUME~1\BRUNO\APPLIC~1\XnView

 

[17/01/2007|00:11] C:\DOCUME~1\DEFAUL~1\APPLIC~1\desktop.ini

[17/01/2007|00:25] C:\DOCUME~1\DEFAUL~1\APPLIC~1\Microsoft

 

 

[29/07/2008|02:56] C:\DOCUME~1\LOCALS~1\APPLIC~1\Adobe

[29/07/2008|02:56] C:\DOCUME~1\LOCALS~1\APPLIC~1\AdobeUM

[19/01/2007|01:13] C:\DOCUME~1\LOCALS~1\APPLIC~1\McAfee.com Personal Firewall

[22/01/2007|14:59] C:\DOCUME~1\LOCALS~1\APPLIC~1\Microsoft

 

[17/01/2007|00:28] C:\DOCUME~1\NETWOR~1\APPLIC~1\Microsoft

 

--------------------\\ Tâches planifiées dans C:\WINDOWS\tasks

 

[09/08/2008 04:22][--a------] C:\WINDOWS\tasks\SCHEDLGU.TXT

[31/07/2008 22:21][--a------] C:\WINDOWS\tasks\AppleSoftwareUpdate.job

[11/08/2008 01:20][--ah-----] C:\WINDOWS\tasks\SA.DAT

[28/08/2001 16:00][-r-h-----] C:\WINDOWS\tasks\desktop.ini

 

--------------------\\ Listing des dossiers dans C:\Program Files

 

[17/01/2007|00:38] C:\Program Files\Adobe

[23/07/2008|03:51] C:\Program Files\akl

[11/08/2008|01:22] C:\Program Files\AntiVir PersonalEdition Classic

[09/01/2008|17:14] C:\Program Files\Apple Software Update

[18/01/2007|23:29] C:\Program Files\ATI Technologies

[18/01/2007|22:59] C:\Program Files\AvRack

[17/01/2007|00:22] C:\Program Files\ComPlus Applications

[10/04/2008|03:32] C:\Program Files\DivX

[25/04/2008|19:02] C:\Program Files\EA GAMES

[31/07/2008|19:47] C:\Program Files\Fichiers communs

[17/11/2007|00:52] C:\Program Files\Google

[23/07/2008|03:51] C:\Program Files\Inet Delivery

[02/07/2008|20:02] C:\Program Files\InstallShield Installation Information

[11/06/2008|19:05] C:\Program Files\Internet Explorer

[08/02/2008|02:21] C:\Program Files\iPod

[08/02/2008|02:21] C:\Program Files\iTunes

[21/07/2008|01:10] C:\Program Files\Java

[17/01/2007|00:32] C:\Program Files\JEUX

[21/01/2008|19:45] C:\Program Files\Lavasoft

[18/01/2007|23:10] C:\Program Files\Logitech

[18/03/2007|19:19] C:\Program Files\Maxis

[19/01/2007|01:10] C:\Program Files\McAfee.com

[02/07/2008|19:50] C:\Program Files\Messenger

[17/01/2007|00:25] C:\Program Files\microsoft frontpage

[26/05/2007|12:25] C:\Program Files\Microsoft Games

[17/01/2007|00:36] C:\Program Files\Microsoft Office

[29/01/2008|03:55] C:\Program Files\Microsoft SQL Server Compact Edition

[02/07/2008|19:50] C:\Program Files\Movie Maker

[29/01/2008|03:01] C:\Program Files\MSECache

[02/07/2008|19:50] C:\Program Files\msn

[17/01/2007|00:22] C:\Program Files\MSN Gaming Zone

[25/01/2007|20:42] C:\Program Files\Nero

[02/07/2008|19:48] C:\Program Files\NetMeeting

[19/01/2007|01:15] C:\Program Files\Neuf

[02/07/2008|19:48] C:\Program Files\Outlook Express

[23/07/2008|05:18] C:\Program Files\PCHealthCenter

[09/12/2007|16:39] C:\Program Files\PDFCreator

[12/12/2007|11:58] C:\Program Files\Prophet Soft

[23/07/2008|03:51] C:\Program Files\qlztrmc

[08/02/2008|02:18] C:\Program Files\QuickTime

[24/11/2007|17:18] C:\Program Files\RAXCO

[18/01/2007|22:59] C:\Program Files\Realtek AC97

[18/01/2007|22:59] C:\Program Files\Realtek Sound Manager

[05/08/2008|19:53] C:\Program Files\rhcehgj0e709

[17/02/2008|04:42] C:\Program Files\SlySoft

[06/08/2008|20:02] C:\Program Files\Spybot - Search & Destroy

[23/07/2008|18:39] C:\Program Files\trcjgaf

[17/01/2007|00:40] C:\Program Files\Uninstall Information

[17/01/2007|00:31] C:\Program Files\UTILS

[17/01/2007|00:36] C:\Program Files\Windows Journal Viewer

[01/03/2008|19:30] C:\Program Files\Windows Live

[17/01/2007|00:37] C:\Program Files\Windows Media Components

[08/06/2007|19:21] C:\Program Files\Windows Media Connect 2

[02/07/2008|19:48] C:\Program Files\Windows Media Player

[02/07/2008|19:48] C:\Program Files\Windows NT

[17/01/2007|00:24] C:\Program Files\WindowsUpdate

[17/01/2007|00:37] C:\Program Files\WMV9_VCM

[17/01/2007|00:25] C:\Program Files\xerox

 

--------------------\\ Listing des dossiers dans C:\Program Files\Fichiers communs

 

[27/05/2008|22:38] C:\Program Files\Fichiers communs\Adobe

[25/01/2007|20:42] C:\Program Files\Fichiers communs\Ahead

[08/02/2008|02:20] C:\Program Files\Fichiers communs\Apple

[18/01/2007|23:28] C:\Program Files\Fichiers communs\ATI Technologies

[18/01/2007|23:25] C:\Program Files\Fichiers communs\InstallShield

[17/01/2007|00:39] C:\Program Files\Fichiers communs\Java

[07/12/2007|02:30] C:\Program Files\Fichiers communs\Logishrd

[07/12/2007|02:30] C:\Program Files\Fichiers communs\Logitech

[29/01/2008|03:54] C:\Program Files\Fichiers communs\Microsoft Shared

[17/01/2007|00:23] C:\Program Files\Fichiers communs\MSSoap

[17/01/2007|00:11] C:\Program Files\Fichiers communs\ODBC

[24/11/2007|17:21] C:\Program Files\Fichiers communs\Raxco

[25/07/2008|02:08] C:\Program Files\Fichiers communs\Real

[17/01/2007|00:23] C:\Program Files\Fichiers communs\Services

[17/01/2007|00:11] C:\Program Files\Fichiers communs\SpeechEngines

[02/07/2008|19:48] C:\Program Files\Fichiers communs\System

[29/01/2008|03:54] C:\Program Files\Fichiers communs\WindowsLiveInstaller

[31/07/2008|19:47] C:\Program Files\Fichiers communs\Wise Installation Wizard

[25/07/2008|02:08] C:\Program Files\Fichiers communs\xing shared

 

--------------------\\ Process

 

( 54 Processus )

 

... OK !

 

--------------------\\ Recherche avec S_Lop

 

Aucun fichier / dossier Lop trouvé !

 

--------------------\\ Recherche de Fichiers / Dossiers Lop

 

C:\DOCUME~1\BRUNO\Cookies\bruno@adultfriendfinder[2].txt

C:\DOCUME~1\BRUNO\Cookies\bruno@adin.bigpoint[1].txt

C:\DOCUME~1\BRUNO\Cookies\bruno@banner.cotedazurpalace[2].txt

C:\DOCUME~1\BRUNO\Cookies\bruno@cotedazurpalace[1].txt

 

--------------------\\ Verification du Registre

 

..... OK !

 

--------------------\\ Verification du fichier Hosts

 

Fichier Hosts PROPRE

 

 

--------------------\\ Recherche de fichiers avec Catchme

 

catchme 0.3.1353 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net

Rootkit scan 2008-08-11 01:45:19

Windows 5.1.2600 Service Pack 3 NTFS

scanning hidden processes ...

scanning hidden files ...

scan completed successfully

hidden processes: 0

hidden files: 133

 

--------------------\\ Recherche d'autres infections

 

C:\WINDOWS\system32\uCMUxGgh.ini

C:\WINDOWS\system32\uCMUxGgh.ini2

==> VUNDO <==

 

--------------------\\ Cracks & Keygens ..

 

=> C:\DOCUME~1\BRUNO\Favoris\http--www.inthecrack.com-tgp-117x1043374x3b2d8.url

=> C:\DOCUME~1\BRUNO\Favoris\http--www.inthecrack.com-tgp-146x1043374xd42be.url

=> C:\DOCUME~1\BRUNO\Favoris\nella .inthecrack.com-tgp-129x1054226x8fe42.url

=> C:\DOCUME~1\BRUNO\Favoris\UP\http--www.inthecrack.com-tgp-024x1226481xffee8.url

=> C:\DOCUME~1\BRUNO\Favoris\UP\http--www.inthecrack.com-tgp-026x1226481x8da35.url

=> C:\DOCUME~1\BRUNO\Favoris\UP\http--www.inthecrack.com-tgp-028x1251006x996ba.url

=> C:\DOCUME~1\BRUNO\Favoris\UP\http--www.inthecrack.com-tgp-032x1360096x04675.url

=> C:\DOCUME~1\BRUNO\Favoris\UP\http--www.inthecrack.com-tgp-034x1226481x88b93.url

=> C:\DOCUME~1\BRUNO\Favoris\UP\http--www.inthecrack.com-tgp-098x1251006x9d763.url

 

 

[F:91][D:7]-> C:\DOCUME~1\BRUNO\LOCALS~1\Temp

[F:265][D:0]-> C:\DOCUME~1\BRUNO\Cookies

[F:3927][D:26]-> C:\DOCUME~1\BRUNO\LOCALS~1\TEMPOR~1\content.IE5

 

--------------------\\ Fin du rapport a 1:46:24,88

 

 

 

J'èspère que tout cela te renseigne d'avantage quant à mon problême,

pour ma ma part, j'avoue humblement que du coup je suis dans le flou complêt et en plus

il n'est même pas artistique...le flou :P

 

Bon, vu l'heure qu'il est, je vais aller mettre mes yeux à dormir et faire de beaux rêves.

Merçi encore et bonne nuit.

 

CIAO et A+

Posté(e)

Relance Lop S&D

 

  • Choisis cette fois ci l'Option 2 ( Suppression )
  • Ne ferme pas la fenêtre lors de la suppression !
  • Poste le rapport généré ( C:\lopR.txt )

 

(Si le Bureau ne réapparait pas presse Ctrl + Alt + Suppr, Onglet Fichier , Nouvelle tâche, tape explorer.exe et valide).

 

--------

 

 

Après, télécharge Malwarebytes' Anti-Malware (MBAM)

 

  • Double clique sur le fichier téléchargé pour lancer le processus d'installation.
  • Dans l'onglet "Mise à jour", clique sur le bouton "Recherche de mise à jour": si le pare-feu demande l'autorisation à MBAM de se connecter, accepte.
  • Une fois la mise à jour terminée, rends-toi dans l'onglet "Recherche".
  • Sélectionne "Exécuter un examen rapide"
  • Clique sur "Rechercher"
  • L'analyse démarre, le scan est relativement long, c'est normal.
  • A la fin de l'analyse, un message s'affiche :
    L'examen s'est terminé normalement. Clique sur 'Afficher les résultats' pour afficher tous les objets trouvés.
    Clique sur "Ok" pour poursuivre. Si MBAM n'a rien trouvé, il te le dira aussi.
  • Ferme tes navigateurs.
  • Si des malwares ont été détectés, clique sur Afficher les résultats.
    Sélectionne tout (ou laisse coché) et clique sur Supprimer la sélection, MBAM va détruire les fichiers et clés de registre et en mettre une copie dans la quarantaine.
  • MBAM va ouvrir le Bloc-notes et y copier le rapport d'analyse. Copie-colle ce rapport et poste-le dans ta prochaine réponse.

 

NB : si MBAM te demande à redémarrer, fais-le après avoir posté ton rapport.

Après le redémarrage, poste un nouveau rapport hijackThis stp, qui suivra le rapport de MBAM.

Posté(e)
Relance Lop S&D

 

  • Choisis cette fois ci l'Option 2 ( Suppression )
  • Ne ferme pas la fenêtre lors de la suppression !
  • Poste le rapport généré ( C:\lopR.txt )

 

(Si le Bureau ne réapparait pas presse Ctrl + Alt + Suppr, Onglet Fichier , Nouvelle tâche, tape explorer.exe et valide).

 

--------

 

 

Après, télécharge Malwarebytes' Anti-Malware (MBAM)

 

  • Double clique sur le fichier téléchargé pour lancer le processus d'installation.
  • Dans l'onglet "Mise à jour", clique sur le bouton "Recherche de mise à jour": si le pare-feu demande l'autorisation à MBAM de se connecter, accepte.
  • Une fois la mise à jour terminée, rends-toi dans l'onglet "Recherche".
  • Sélectionne "Exécuter un examen rapide"
  • Clique sur "Rechercher"
  • L'analyse démarre, le scan est relativement long, c'est normal.
  • A la fin de l'analyse, un message s'affiche :
     
    Clique sur "Ok" pour poursuivre. Si MBAM n'a rien trouvé, il te le dira aussi.
  • Ferme tes navigateurs.
  • Si des malwares ont été détectés, clique sur Afficher les résultats.
    Sélectionne tout (ou laisse coché) et clique sur Supprimer la sélection, MBAM va détruire les fichiers et clés de registre et en mettre une copie dans la quarantaine.
  • MBAM va ouvrir le Bloc-notes et y copier le rapport d'analyse. Copie-colle ce rapport et poste-le dans ta prochaine réponse.

 

NB : si MBAM te demande à redémarrer, fais-le après avoir posté ton rapport.

Après le redémarrage, poste un nouveau rapport hijackThis stp, qui suivra le rapport de MBAM.

 

 

 

 

 

 

 

 

Bsr, FALKRA, je viens de lançer "LOP S&D" avec L'option 2, voila le rapport émis:

 

 

 

 

--------------------\\ Lop S&D 4.2.2-6 XP/Vista

 

[ Windows XP (NT 5.1) Build 2600, Service Pack 3 ]

[ USER : BRUNO ] [ "C:\Lop SD" ] [ Selection : 2 ]

[ 11/08/2008 | 20:47:47,85 ] [ PC : ORDISUPERB ]

[ MAJ : 09-08-2008 | 21:15 ]

 

 

\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\ SUPPRESSION /////////////////////////////

 

Supprime! - C:\DOCUME~1\BRUNO\Cookies\bruno@adin.bigpoint[1].txt

Supprime! - C:\DOCUME~1\BRUNO\Cookies\bruno@banner.cotedazurpalace[2].txt

Supprime! - C:\DOCUME~1\BRUNO\Cookies\bruno@cotedazurpalace[1].txt

RestaurÚ! - Fichier Hosts

 

//////////////////////////////////////-\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\

 

 

--------------------\\ Listing des dossiers dans APPLIC~1

 

[17/01/2007|00:11] C:\DOCUME~1\ADMINI~1\APPLIC~1\desktop.ini

[07/08/2008|20:38] C:\DOCUME~1\ADMINI~1\APPLIC~1\Microsoft

[07/08/2008|20:45] C:\DOCUME~1\ADMINI~1\APPLIC~1\Real

 

[13/12/2007|11:55] C:\DOCUME~1\ALAN\APPLIC~1\Adobe

[05/09/2007|19:48] C:\DOCUME~1\ALAN\APPLIC~1\AdobeUM

[17/02/2007|13:35] C:\DOCUME~1\ALAN\APPLIC~1\Ahead

[16/04/2008|13:27] C:\DOCUME~1\ALAN\APPLIC~1\Apple Computer

[20/01/2007|05:26] C:\DOCUME~1\ALAN\APPLIC~1\ATI

[17/01/2007|00:11] C:\DOCUME~1\ALAN\APPLIC~1\desktop.ini

[10/01/2008|19:32] C:\DOCUME~1\ALAN\APPLIC~1\DivX

[03/10/2007|14:52] C:\DOCUME~1\ALAN\APPLIC~1\Google

[20/01/2007|05:26] C:\DOCUME~1\ALAN\APPLIC~1\Identities

[20/01/2007|05:26] C:\DOCUME~1\ALAN\APPLIC~1\Logitech

[20/01/2007|17:24] C:\DOCUME~1\ALAN\APPLIC~1\Macromedia

[16/05/2007|10:55] C:\DOCUME~1\ALAN\APPLIC~1\McAfee.com Personal Firewall

[17/02/2007|13:36] C:\DOCUME~1\ALAN\APPLIC~1\Media Player Classic

[23/12/2007|21:31] C:\DOCUME~1\ALAN\APPLIC~1\Microsoft

[25/07/2008|14:14] C:\DOCUME~1\ALAN\APPLIC~1\Real

[03/02/2007|16:38] C:\DOCUME~1\ALAN\APPLIC~1\Sun

 

[17/02/2008|04:41] C:\DOCUME~1\ALLUSE~1\APPLIC~1\.zreglib

[02/07/2008|20:21] C:\DOCUME~1\ALLUSE~1\APPLIC~1\{A850D4D9-871B-4234-908D-21C457767270}

[19/01/2007|00:56] C:\DOCUME~1\ALLUSE~1\APPLIC~1\addr_file.html

[27/05/2008|22:38] C:\DOCUME~1\ALLUSE~1\APPLIC~1\Adobe

[11/08/2008|01:22] C:\DOCUME~1\ALLUSE~1\APPLIC~1\AntiVir PersonalEdition Classic

[09/01/2008|17:14] C:\DOCUME~1\ALLUSE~1\APPLIC~1\Apple

[08/02/2008|02:20] C:\DOCUME~1\ALLUSE~1\APPLIC~1\Apple Computer

[17/01/2007|00:11] C:\DOCUME~1\ALLUSE~1\APPLIC~1\desktop.ini

[19/01/2007|02:43] C:\DOCUME~1\ALLUSE~1\APPLIC~1\DVD Shrink

[03/10/2007|09:00] C:\DOCUME~1\ALLUSE~1\APPLIC~1\Google

[31/07/2008|19:44] C:\DOCUME~1\ALLUSE~1\APPLIC~1\Lavasoft

[07/12/2007|02:30] C:\DOCUME~1\ALLUSE~1\APPLIC~1\LogiShrd

[25/04/2007|21:10] C:\DOCUME~1\ALLUSE~1\APPLIC~1\Logitech

[20/01/2007|11:28] C:\DOCUME~1\ALLUSE~1\APPLIC~1\McAfee.com

[18/02/2007|12:05] C:\DOCUME~1\ALLUSE~1\APPLIC~1\McAfee.com Personal Firewall

[10/11/2007|12:42] C:\DOCUME~1\ALLUSE~1\APPLIC~1\Messenger Plus!

[29/01/2008|03:54] C:\DOCUME~1\ALLUSE~1\APPLIC~1\Microsoft

[26/05/2007|12:32] C:\DOCUME~1\ALLUSE~1\APPLIC~1\Microsoft Games

[29/01/2008|01:35] C:\DOCUME~1\ALLUSE~1\APPLIC~1\Office Genuine Advantage

[24/10/2007|21:48] C:\DOCUME~1\ALLUSE~1\APPLIC~1\QTSBandwidthCache

[19/01/2007|02:23] C:\DOCUME~1\ALLUSE~1\APPLIC~1\Raxco

[21/07/2008|01:55] C:\DOCUME~1\ALLUSE~1\APPLIC~1\SecuriSoft SARL

[26/01/2008|19:55] C:\DOCUME~1\ALLUSE~1\APPLIC~1\SlySoft

[06/08/2008|20:01] C:\DOCUME~1\ALLUSE~1\APPLIC~1\Spybot - Search & Destroy

[23/07/2008|03:51] C:\DOCUME~1\ALLUSE~1\APPLIC~1\ubotojir

[29/01/2008|01:35] C:\DOCUME~1\ALLUSE~1\APPLIC~1\Windows Genuine Advantage

[29/01/2008|03:51] C:\DOCUME~1\ALLUSE~1\APPLIC~1\WLInstaller

 

[19/01/2007|01:47] C:\DOCUME~1\BRUNO\APPLIC~1\Adobe

[27/05/2008|22:38] C:\DOCUME~1\BRUNO\APPLIC~1\AdobeUM

[18/10/2007|17:43] C:\DOCUME~1\BRUNO\APPLIC~1\Ahead

[08/02/2008|02:21] C:\DOCUME~1\BRUNO\APPLIC~1\Apple Computer

[18/01/2007|23:32] C:\DOCUME~1\BRUNO\APPLIC~1\ATI

[17/01/2007|00:11] C:\DOCUME~1\BRUNO\APPLIC~1\desktop.ini

[21/12/2007|01:44] C:\DOCUME~1\BRUNO\APPLIC~1\DivX

[03/10/2007|10:59] C:\DOCUME~1\BRUNO\APPLIC~1\Google

[10/02/2007|13:32] C:\DOCUME~1\BRUNO\APPLIC~1\Help

[17/01/2007|00:40] C:\DOCUME~1\BRUNO\APPLIC~1\Identities

[07/12/2007|02:29] C:\DOCUME~1\BRUNO\APPLIC~1\InstallShield

[21/01/2008|19:44] C:\DOCUME~1\BRUNO\APPLIC~1\Lavasoft

[18/01/2007|23:12] C:\DOCUME~1\BRUNO\APPLIC~1\Logitech

[17/01/2007|00:39] C:\DOCUME~1\BRUNO\APPLIC~1\Macromedia

[03/10/2007|11:06] C:\DOCUME~1\BRUNO\APPLIC~1\McAfee.com Personal Firewall

[19/01/2007|02:10] C:\DOCUME~1\BRUNO\APPLIC~1\Media Player Classic

[07/02/2008|19:12] C:\DOCUME~1\BRUNO\APPLIC~1\Microsoft

[25/07/2008|04:17] C:\DOCUME~1\BRUNO\APPLIC~1\Real

[26/01/2008|19:56] C:\DOCUME~1\BRUNO\APPLIC~1\SlySoft

[19/01/2007|03:41] C:\DOCUME~1\BRUNO\APPLIC~1\Sun

[19/01/2007|02:30] C:\DOCUME~1\BRUNO\APPLIC~1\Winamp

[09/10/2007|18:35] C:\DOCUME~1\BRUNO\APPLIC~1\XnView

 

[17/01/2007|00:11] C:\DOCUME~1\DEFAUL~1\APPLIC~1\desktop.ini

[17/01/2007|00:25] C:\DOCUME~1\DEFAUL~1\APPLIC~1\Microsoft

 

 

[29/07/2008|02:56] C:\DOCUME~1\LOCALS~1\APPLIC~1\Adobe

[29/07/2008|02:56] C:\DOCUME~1\LOCALS~1\APPLIC~1\AdobeUM

[19/01/2007|01:13] C:\DOCUME~1\LOCALS~1\APPLIC~1\McAfee.com Personal Firewall

[22/01/2007|14:59] C:\DOCUME~1\LOCALS~1\APPLIC~1\Microsoft

 

[17/01/2007|00:28] C:\DOCUME~1\NETWOR~1\APPLIC~1\Microsoft

 

--------------------\\ Tâches planifiées dans C:\WINDOWS\tasks

 

[09/08/2008 04:22][--a------] C:\WINDOWS\tasks\SCHEDLGU.TXT

[31/07/2008 22:21][--a------] C:\WINDOWS\tasks\AppleSoftwareUpdate.job

[11/08/2008 01:20][--ah-----] C:\WINDOWS\tasks\SA.DAT

[28/08/2001 16:00][-r-h-----] C:\WINDOWS\tasks\desktop.ini

 

--------------------\\ Listing des dossiers dans C:\Program Files

 

[17/01/2007|00:38] C:\Program Files\Adobe

[23/07/2008|03:51] C:\Program Files\akl

[11/08/2008|01:22] C:\Program Files\AntiVir PersonalEdition Classic

[09/01/2008|17:14] C:\Program Files\Apple Software Update

[18/01/2007|23:29] C:\Program Files\ATI Technologies

[18/01/2007|22:59] C:\Program Files\AvRack

[17/01/2007|00:22] C:\Program Files\ComPlus Applications

[10/04/2008|03:32] C:\Program Files\DivX

[25/04/2008|19:02] C:\Program Files\EA GAMES

[31/07/2008|19:47] C:\Program Files\Fichiers communs

[17/11/2007|00:52] C:\Program Files\Google

[23/07/2008|03:51] C:\Program Files\Inet Delivery

[02/07/2008|20:02] C:\Program Files\InstallShield Installation Information

[11/06/2008|19:05] C:\Program Files\Internet Explorer

[08/02/2008|02:21] C:\Program Files\iPod

[08/02/2008|02:21] C:\Program Files\iTunes

[21/07/2008|01:10] C:\Program Files\Java

[17/01/2007|00:32] C:\Program Files\JEUX

[21/01/2008|19:45] C:\Program Files\Lavasoft

[18/01/2007|23:10] C:\Program Files\Logitech

[18/03/2007|19:19] C:\Program Files\Maxis

[19/01/2007|01:10] C:\Program Files\McAfee.com

[02/07/2008|19:50] C:\Program Files\Messenger

[17/01/2007|00:25] C:\Program Files\microsoft frontpage

[26/05/2007|12:25] C:\Program Files\Microsoft Games

[17/01/2007|00:36] C:\Program Files\Microsoft Office

[29/01/2008|03:55] C:\Program Files\Microsoft SQL Server Compact Edition

[02/07/2008|19:50] C:\Program Files\Movie Maker

[29/01/2008|03:01] C:\Program Files\MSECache

[02/07/2008|19:50] C:\Program Files\msn

[17/01/2007|00:22] C:\Program Files\MSN Gaming Zone

[25/01/2007|20:42] C:\Program Files\Nero

[02/07/2008|19:48] C:\Program Files\NetMeeting

[19/01/2007|01:15] C:\Program Files\Neuf

[02/07/2008|19:48] C:\Program Files\Outlook Express

[23/07/2008|05:18] C:\Program Files\PCHealthCenter

[09/12/2007|16:39] C:\Program Files\PDFCreator

[12/12/2007|11:58] C:\Program Files\Prophet Soft

[23/07/2008|03:51] C:\Program Files\qlztrmc

[08/02/2008|02:18] C:\Program Files\QuickTime

[24/11/2007|17:18] C:\Program Files\RAXCO

[18/01/2007|22:59] C:\Program Files\Realtek AC97

[18/01/2007|22:59] C:\Program Files\Realtek Sound Manager

[05/08/2008|19:53] C:\Program Files\rhcehgj0e709

[17/02/2008|04:42] C:\Program Files\SlySoft

[06/08/2008|20:02] C:\Program Files\Spybot - Search & Destroy

[23/07/2008|18:39] C:\Program Files\trcjgaf

[17/01/2007|00:40] C:\Program Files\Uninstall Information

[17/01/2007|00:31] C:\Program Files\UTILS

[17/01/2007|00:36] C:\Program Files\Windows Journal Viewer

[01/03/2008|19:30] C:\Program Files\Windows Live

[17/01/2007|00:37] C:\Program Files\Windows Media Components

[08/06/2007|19:21] C:\Program Files\Windows Media Connect 2

[02/07/2008|19:48] C:\Program Files\Windows Media Player

[02/07/2008|19:48] C:\Program Files\Windows NT

[17/01/2007|00:24] C:\Program Files\WindowsUpdate

[17/01/2007|00:37] C:\Program Files\WMV9_VCM

[17/01/2007|00:25] C:\Program Files\xerox

 

--------------------\\ Listing des dossiers dans C:\Program Files\Fichiers communs

 

[27/05/2008|22:38] C:\Program Files\Fichiers communs\Adobe

[25/01/2007|20:42] C:\Program Files\Fichiers communs\Ahead

[08/02/2008|02:20] C:\Program Files\Fichiers communs\Apple

[18/01/2007|23:28] C:\Program Files\Fichiers communs\ATI Technologies

[18/01/2007|23:25] C:\Program Files\Fichiers communs\InstallShield

[17/01/2007|00:39] C:\Program Files\Fichiers communs\Java

[07/12/2007|02:30] C:\Program Files\Fichiers communs\Logishrd

[07/12/2007|02:30] C:\Program Files\Fichiers communs\Logitech

[29/01/2008|03:54] C:\Program Files\Fichiers communs\Microsoft Shared

[17/01/2007|00:23] C:\Program Files\Fichiers communs\MSSoap

[17/01/2007|00:11] C:\Program Files\Fichiers communs\ODBC

[24/11/2007|17:21] C:\Program Files\Fichiers communs\Raxco

[25/07/2008|02:08] C:\Program Files\Fichiers communs\Real

[17/01/2007|00:23] C:\Program Files\Fichiers communs\Services

[17/01/2007|00:11] C:\Program Files\Fichiers communs\SpeechEngines

[02/07/2008|19:48] C:\Program Files\Fichiers communs\System

[29/01/2008|03:54] C:\Program Files\Fichiers communs\WindowsLiveInstaller

[31/07/2008|19:47] C:\Program Files\Fichiers communs\Wise Installation Wizard

[25/07/2008|02:08] C:\Program Files\Fichiers communs\xing shared

 

--------------------\\ Process

 

( 55 Processus )

 

... OK !

 

--------------------\\ Recherche avec S_Lop

 

Aucun fichier / dossier Lop trouvé !

 

--------------------\\ Recherche de Fichiers / Dossiers Lop

 

C:\DOCUME~1\BRUNO\Cookies\bruno@adultfriendfinder[1].txt

C:\DOCUME~1\BRUNO\Cookies\bruno@adin.bigpoint[2].txt

C:\DOCUME~1\BRUNO\Cookies\bruno@bigpoint[2].txt

C:\DOCUME~1\BRUNO\Cookies\bruno@es.bigpoint[1].txt

C:\DOCUME~1\BRUNO\Cookies\bruno@es.bigpoint[2].txt

C:\DOCUME~1\BRUNO\Cookies\bruno@fr1.darkorbit.bigpoint[1].txt

C:\DOCUME~1\BRUNO\Cookies\bruno@fr1.darkorbit.bigpoint[2].txt

C:\DOCUME~1\BRUNO\Cookies\bruno@www.bigpoint[1].txt

 

--------------------\\ Verification du Registre

 

..... OK !

 

--------------------\\ Verification du fichier Hosts

 

Fichier Hosts PROPRE

 

 

--------------------\\ Recherche de fichiers avec Catchme

 

catchme 0.3.1353 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net

Rootkit scan 2008-08-11 20:48:19

Windows 5.1.2600 Service Pack 3 NTFS

scanning hidden processes ...

scanning hidden files ...

scan completed successfully

hidden processes: 0

hidden files: 133

 

--------------------\\ Recherche d'autres infections

 

C:\WINDOWS\system32\uCMUxGgh.ini

C:\WINDOWS\system32\uCMUxGgh.ini2

==> VUNDO <==

 

--------------------\\ Cracks & Keygens ..

 

=> C:\DOCUME~1\BRUNO\Favoris\http--www.inthecrack.com-tgp-117x1043374x3b2d8.url

=> C:\DOCUME~1\BRUNO\Favoris\http--www.inthecrack.com-tgp-146x1043374xd42be.url

=> C:\DOCUME~1\BRUNO\Favoris\nella .inthecrack.com-tgp-129x1054226x8fe42.url

=> C:\DOCUME~1\BRUNO\Favoris\UP\http--www.inthecrack.com-tgp-024x1226481xffee8.url

=> C:\DOCUME~1\BRUNO\Favoris\UP\http--www.inthecrack.com-tgp-026x1226481x8da35.url

=> C:\DOCUME~1\BRUNO\Favoris\UP\http--www.inthecrack.com-tgp-028x1251006x996ba.url

=> C:\DOCUME~1\BRUNO\Favoris\UP\http--www.inthecrack.com-tgp-032x1360096x04675.url

=> C:\DOCUME~1\BRUNO\Favoris\UP\http--www.inthecrack.com-tgp-034x1226481x88b93.url

=> C:\DOCUME~1\BRUNO\Favoris\UP\http--www.inthecrack.com-tgp-098x1251006x9d763.url

 

 

[F:87][D:7]-> C:\DOCUME~1\BRUNO\LOCALS~1\Temp

[F:277][D:0]-> C:\DOCUME~1\BRUNO\Cookies

[F:4499][D:26]-> C:\DOCUME~1\BRUNO\LOCALS~1\TEMPOR~1\content.IE5

 

--------------------\\ Fin du rapport a 20:48:50,02

 

 

 

A présent je vais continuer avec MBAM...à très bientôt.

Posté(e)
@ toute, il reste des infections, en effet.

 

 

 

Re-hello, comme prévu me revoila et j'ai donc Lançé MBAM en "examen rapide"

et "supprimé la selection".

Je te met en copie le rapport:

 

 

 

Malwarebytes' Anti-Malware 1.24

Version de la base de données: 1042

Windows 5.1.2600 Service Pack 3

 

01:08:56 12/08/2008

mbam-log-8-12-2008 (01-08-56).txt

 

Type de recherche: Examen rapide

Eléments examinés: 69738

Temps écoulé: 21 minute(s), 56 second(s)

 

Processus mémoire infecté(s): 0

Module(s) mémoire infecté(s): 4

Clé(s) du Registre infectée(s): 36

Valeur(s) du Registre infectée(s): 7

Elément(s) de données du Registre infecté(s): 5

Dossier(s) infecté(s): 12

Fichier(s) infecté(s): 133

 

Processus mémoire infecté(s):

(Aucun élément nuisible détecté)

 

Module(s) mémoire infecté(s):

C:\WINDOWS\system32\ameasygp.dll (Trojan.Vundo) -> Delete on reboot.

C:\WINDOWS\system32\hgGxUMCu.dll (Trojan.Vundo) -> Delete on reboot.

C:\WINDOWS\system32\jkkKbYPF.dll (Trojan.Vundo) -> Delete on reboot.

C:\WINDOWS\system32\gccntj.dll (Trojan.Vundo) -> Delete on reboot.

 

Clé(s) du Registre infectée(s):

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{9ebc4069-d518-4a3b-aa38-124c4d1048ea} (Trojan.Vundo) -> Quarantined and deleted successfully.

HKEY_CLASSES_ROOT\CLSID\{9ebc4069-d518-4a3b-aa38-124c4d1048ea} (Trojan.Vundo) -> Quarantined and deleted successfully.

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{e5164e72-7450-415e-a387-f42fd6b01dcb} (Trojan.Vundo) -> Delete on reboot.

HKEY_CLASSES_ROOT\CLSID\{e5164e72-7450-415e-a387-f42fd6b01dcb} (Trojan.Vundo) -> Delete on reboot.

HKEY_CLASSES_ROOT\CLSID\{28030fa8-2428-4de6-b0f3-ce9494e1a412} (Trojan.Vundo) -> Delete on reboot.

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{28030fa8-2428-4de6-b0f3-ce9494e1a412} (Trojan.Vundo) -> Delete on reboot.

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\jkkkbypf (Trojan.Vundo) -> Delete on reboot.

HKEY_CLASSES_ROOT\CLSID\{9dd4258a-7138-49c4-8d34-587879a5c7a4} (Fake.Dropped.Malware) -> Quarantined and deleted successfully.

HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{9dd4258a-7138-49c4-8d34-587879a5c7a4} (Fake.Dropped.Malware) -> Quarantined and deleted successfully.

HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{b8c0220d-763d-49a4-95f4-61dfdec66ee6} (Fake.Dropped.Malware) -> Quarantined and deleted successfully.

HKEY_CLASSES_ROOT\CLSID\{c3bcc488-1ae7-11d4-ab82-0010a4ec2338} (Fake.Dropped.Malware) -> Quarantined and deleted successfully.

HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{c3bcc488-1ae7-11d4-ab82-0010a4ec2338} (Fake.Dropped.Malware) -> Quarantined and deleted successfully.

HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{000000da-0786-4633-87c6-1aa7a4429ef1} (Fake.Dropped.Malware) -> Quarantined and deleted successfully.

HKEY_CLASSES_ROOT\CLSID\{a15e2a71-303e-4f13-a642-eb3a786da5fc} (Trojan.Vundo) -> Quarantined and deleted successfully.

HKEY_LOCAL_MACHINE\SOFTWARE\rhcehgj0e709 (Rogue.Multiple) -> Quarantined and deleted successfully.

HKEY_CURRENT_USER\SOFTWARE\antivirus 2008 pro (Rogue.Antivirus2008) -> Quarantined and deleted successfully.

HKEY_CLASSES_ROOT\sunporn (Trojan.DNSChanger) -> Quarantined and deleted successfully.

HKEY_CLASSES_ROOT\sunpornwrrb325 (Trojan.DNSChanger) -> Quarantined and deleted successfully.

HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\logons (Fake.Dropped.Malware) -> Quarantined and deleted successfully.

HKEY_CURRENT_USER\SOFTWARE\uninstall (Fake.Dropped.Malware) -> Quarantined and deleted successfully.

HKEY_CURRENT_USER\typelib (Fake.Dropped.Malware) -> Quarantined and deleted successfully.

HKEY_CURRENT_USER\HOL5_VXIEWER.FULL.1 (Trojan.FakeAlert) -> Quarantined and deleted successfully.

HKEY_CURRENT_USER\SOFTWARE\fwbd (Trojan.FakeAlert) -> Quarantined and deleted successfully.

HKEY_CURRENT_USER\SOFTWARE\HolLol (Trojan.FakeAlert) -> Quarantined and deleted successfully.

HKEY_CURRENT_USER\SYSTEM\currentcontrolset\Services\iTunesMusic (Fake.Dropped.Malware) -> Quarantined and deleted successfully.

HKEY_CURRENT_USER\SYSTEM\currentcontrolset\Services\rdriv (Fake.Dropped.Malware) -> Quarantined and deleted successfully.

HKEY_CURRENT_USER\SOFTWARE\wkey (Malware.Trace) -> Quarantined and deleted successfully.

HKEY_CURRENT_USER\SOFTWARE\mwc (Malware.Trace) -> Quarantined and deleted successfully.

HKEY_CURRENT_USER\SOFTWARE\Microsoft\rdfa (Trojan.Vundo) -> Quarantined and deleted successfully.

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Software Notifier (Rogue.Multiple) -> Quarantined and deleted successfully.

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\MS Juan (Malware.Trace) -> Quarantined and deleted successfully.

HKEY_CURRENT_USER\SOFTWARE\Microsoft\contim (Trojan.Vundo) -> Quarantined and deleted successfully.

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\MS Track System (Trojan.Vundo) -> Quarantined and deleted successfully.

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\RemoveRP (Trojan.Vundo) -> Quarantined and deleted successfully.

HKEY_CURRENT_USER\SOFTWARE\SecuriSoft SARL (Trojan.FakeAlert) -> Quarantined and deleted successfully.

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\aoprndtws (Trojan.Vundo) -> Quarantined and deleted successfully.

 

Valeur(s) du Registre infectée(s):

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\d09361bb (Trojan.Vundo) -> Quarantined and deleted successfully.

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\ShellExecuteHooks\{28030fa8-2428-4de6-b0f3-ce9494e1a412} (Trojan.Vundo) -> Delete on reboot.

HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler\{0656a137-b161-cadd-9777-e37a75727e78} (Fake.Dropped.Malware) -> Quarantined and deleted successfully.

HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\Toolbar\{0e1230f8-ea50-42a9-983c-d22abc2eeb4c} (Fake.Dropped.Malware) -> Quarantined and deleted successfully.

HKEY_CURRENT_USER\Control Panel\Desktop\wallpaper (Hijack.Wallpaper) -> Quarantined and deleted successfully.

HKEY_CURRENT_USER\Control Panel\Desktop\originalwallpaper (Hijack.Wallpaper) -> Quarantined and deleted successfully.

HKEY_CURRENT_USER\Control Panel\Desktop\convertedwallpaper (Hijack.Wallpaper) -> Quarantined and deleted successfully.

 

Elément(s) de données du Registre infecté(s):

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\LSA\Notification Packages (Trojan.Vundo) -> Data: c:\windows\system32\hggxumcu -> Quarantined and deleted successfully.

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\LSA\Authentication Packages (Trojan.Vundo) -> Data: c:\windows\system32\hggxumcu -> Delete on reboot.

HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableTaskMgr (Hijack.TaskManager) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.

HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\NoDispBackgroundPage (Hijack.DisplayProperties) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.

HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\NoDispScrSavPage (Hijack.DisplayProperties) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.

 

Dossier(s) infecté(s):

C:\WINDOWS\mslagent (Adware.EGDAccess) -> Quarantined and deleted successfully.

C:\Program Files\akl (Fake.Dropped.Malware) -> Quarantined and deleted successfully.

C:\Program Files\PCHealthCenter (Trojan.Fakealert) -> Quarantined and deleted successfully.

C:\Program Files\Inet Delivery (Fake.Dropped.Malware) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\smp (Fake.Dropped.Malware) -> Quarantined and deleted successfully.

C:\Program Files\rhcehgj0e709 (Rogue.Multiple) -> Quarantined and deleted successfully.

C:\Documents and Settings\All Users\Application Data\SecuriSoft SARL (Rogue.WinSpywareProtect) -> Quarantined and deleted successfully.

C:\Documents and Settings\All Users\Application Data\SecuriSoft SARL\WinSpywareProtect (Rogue.WinSpywareProtect) -> Quarantined and deleted successfully.

C:\Documents and Settings\All Users\Application Data\SecuriSoft SARL\WinSpywareProtect\BASE (Rogue.WinSpywareProtect) -> Quarantined and deleted successfully.

C:\Documents and Settings\All Users\Application Data\SecuriSoft SARL\WinSpywareProtect\DELETED (Rogue.WinSpywareProtect) -> Quarantined and deleted successfully.

C:\Documents and Settings\All Users\Application Data\SecuriSoft SARL\WinSpywareProtect\LOG (Rogue.WinSpywareProtect) -> Quarantined and deleted successfully.

C:\Documents and Settings\All Users\Application Data\SecuriSoft SARL\WinSpywareProtect\SAVED (Rogue.WinSpywareProtect) -> Quarantined and deleted successfully.

 

Fichier(s) infecté(s):

C:\WINDOWS\system32\gccntj.dll (Trojan.Vundo) -> Delete on reboot.

C:\WINDOWS\system32\hgGxUMCu.dll (Trojan.Vundo) -> Delete on reboot.

C:\WINDOWS\system32\uCMUxGgh.ini (Trojan.Vundo) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\uCMUxGgh.ini2 (Trojan.Vundo) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\ablfxlsr.dll (Trojan.Vundo) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\rslxflba.ini (Trojan.Vundo) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\ameasygp.dll (Trojan.Vundo) -> Delete on reboot.

C:\WINDOWS\system32\pgysaema.ini (Trojan.Vundo) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\fchfufnc.dll (Trojan.Vundo) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\cnfufhcf.ini (Trojan.Vundo) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\jkkKbYPF.dll (Trojan.Vundo) -> Delete on reboot.

C:\WINDOWS\system32\aowdtsvs.dll (Trojan.Vundo) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\cccohf.dll (Trojan.Vundo) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\endplkne.dll (Trojan.Vundo) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\enueaxyb.dll (Trojan.Vundo) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\errexudr.dll (Trojan.Vundo) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\fpebad.dll (Trojan.Vundo) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\fsihpngt.dll (Trojan.Vundo) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\hgsrob.dll (Trojan.Vundo) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\hsorfqfk.dll (Trojan.Vundo) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\jpkqyugt.dll (Trojan.Vundo) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\mccgknmm.dll (Trojan.Vundo) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\ciikzw.dll (Trojan.Vundo) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\cuyyxi.dll (Trojan.Vundo) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\qaeixkme.dll (Trojan.Vundo) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\rzzcku.dll (Trojan.Vundo) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\uvghdjvb.dll (Trojan.Vundo) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\itspzl.dll (Trojan.Vundo) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\fgshckeb.dll (Trojan.Vundo) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\gfqesl.dll (Trojan.Vundo) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\gohzak.dll (Trojan.Vundo) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\idnwdqbn.dll (Trojan.Vundo) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\qwigyg.dll (Trojan.Vundo) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\mpnnwgrk.exe (Trojan.Vundo) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\bkynwgso.dll (Trojan.Vundo) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\oiclwu.dll (Trojan.Vundo) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\ykniigim.dll (Trojan.Vundo) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\ywuhyp.dll (Trojan.Vundo) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\djrssr.dll (Trojan.Vundo) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\ubdxqcmp.dll (Trojan.Vundo) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\uflyryhx.dll (Trojan.Vundo) -> Quarantined and deleted successfully.

C:\Documents and Settings\ENORA\Local Settings\Temporary Internet Files\Content.IE5\OD8NK3SF\kb456456[1] (Trojan.Vundo) -> Quarantined and deleted successfully.

C:\Documents and Settings\ENORA\Local Settings\Temporary Internet Files\Content.IE5\QFSFAPKJ\kb767887[1] (Trojan.Vundo) -> Quarantined and deleted successfully.

C:\Documents and Settings\BRUNO\Local Settings\Temporary Internet Files\Content.IE5\CA5MTY82\kb456456[1] (Trojan.Vundo) -> Quarantined and deleted successfully.

C:\Documents and Settings\BRUNO\Local Settings\Temporary Internet Files\Content.IE5\CA5MTY82\kb456456[2] (Trojan.Vundo) -> Quarantined and deleted successfully.

C:\Documents and Settings\BRUNO\Local Settings\Temporary Internet Files\Content.IE5\CA5MTY82\kb767887[1] (Trojan.Vundo) -> Quarantined and deleted successfully.

C:\Documents and Settings\BRUNO\Local Settings\Temporary Internet Files\Content.IE5\CF461RN7\kb767887[1] (Trojan.Vundo) -> Quarantined and deleted successfully.

C:\Documents and Settings\BRUNO\Local Settings\Temporary Internet Files\Content.IE5\CF461RN7\kb767887[2] (Trojan.Vundo) -> Quarantined and deleted successfully.

C:\Documents and Settings\BRUNO\Local Settings\Temporary Internet Files\Content.IE5\CF461RN7\kb767887[3] (Trojan.Vundo) -> Quarantined and deleted successfully.

C:\Documents and Settings\BRUNO\Local Settings\Temporary Internet Files\Content.IE5\MRQUPCCN\kb456456[1] (Trojan.Vundo) -> Quarantined and deleted successfully.

C:\Documents and Settings\BRUNO\Local Settings\Temporary Internet Files\Content.IE5\NYTFQIDU\kb456456[2] (Trojan.Vundo) -> Quarantined and deleted successfully.

C:\Documents and Settings\BRUNO\Local Settings\Temporary Internet Files\Content.IE5\ZHSKKFDZ\kb456456[1] (Trojan.Vundo) -> Quarantined and deleted successfully.

C:\Documents and Settings\BRUNO\Local Settings\Temporary Internet Files\Content.IE5\ZHSKKFDZ\kb65666[1] (Trojan.Vundo) -> Quarantined and deleted successfully.

C:\Documents and Settings\BRUNO\Local Settings\Temporary Internet Files\Content.IE5\ZHSKKFDZ\kb767887[1] (Trojan.Vundo) -> Quarantined and deleted successfully.

C:\Documents and Settings\BRUNO\Local Settings\Temporary Internet Files\Content.IE5\ZXSSVXBV\kb767887[1] (Trojan.Vundo) -> Quarantined and deleted successfully.

C:\WINDOWS\mslagent\2_mslagent.dll (Adware.EGDAccess) -> Quarantined and deleted successfully.

C:\WINDOWS\mslagent\mslagent.exe (Adware.EGDAccess) -> Quarantined and deleted successfully.

C:\WINDOWS\mslagent\uninstall.exe (Adware.EGDAccess) -> Quarantined and deleted successfully.

C:\Program Files\akl\akl.dll (Fake.Dropped.Malware) -> Quarantined and deleted successfully.

C:\Program Files\akl\akl.exe (Fake.Dropped.Malware) -> Quarantined and deleted successfully.

C:\Program Files\akl\uninstall.exe (Fake.Dropped.Malware) -> Quarantined and deleted successfully.

C:\Program Files\akl\unsetup.exe (Fake.Dropped.Malware) -> Quarantined and deleted successfully.

C:\Program Files\PCHealthCenter\0.gif (Trojan.Fakealert) -> Quarantined and deleted successfully.

C:\Program Files\PCHealthCenter\1.gif (Trojan.Fakealert) -> Quarantined and deleted successfully.

C:\Program Files\PCHealthCenter\2.gif (Trojan.Fakealert) -> Quarantined and deleted successfully.

C:\Program Files\PCHealthCenter\3.gif (Trojan.Fakealert) -> Quarantined and deleted successfully.

C:\Program Files\PCHealthCenter\sc.html (Trojan.Fakealert) -> Quarantined and deleted successfully.

C:\Program Files\PCHealthCenter\sex1.ico (Trojan.Fakealert) -> Quarantined and deleted successfully.

C:\Program Files\PCHealthCenter\sex2.ico (Trojan.Fakealert) -> Quarantined and deleted successfully.

C:\Program Files\Inet Delivery\inetdl.exe (Fake.Dropped.Malware) -> Quarantined and deleted successfully.

C:\Program Files\Inet Delivery\intdel.exe (Fake.Dropped.Malware) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\smp\msrc.exe (Fake.Dropped.Malware) -> Quarantined and deleted successfully.

C:\Documents and Settings\All Users\Application Data\SecuriSoft SARL\WinSpywareProtect\wspwprtct.exe (Rogue.WinSpywareProtect) -> Quarantined and deleted successfully.

C:\Documents and Settings\All Users\Application Data\SecuriSoft SARL\WinSpywareProtect\LOG\20080721015737875.log (Rogue.WinSpywareProtect) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\mcrh.tmp (Malware.Trace) -> Quarantined and deleted successfully.

C:\WINDOWS\cookies.ini (Malware.Trace) -> Quarantined and deleted successfully.

C:\WINDOWS\a.bat (Fake.Dropped.Malware) -> Quarantined and deleted successfully.

C:\WINDOWS\base64.tmp (Fake.Dropped.Malware) -> Quarantined and deleted successfully.

C:\WINDOWS\FVProtect.exe (Fake.Dropped.Malware) -> Quarantined and deleted successfully.

C:\WINDOWS\userconfig9x.dll (Fake.Dropped.Malware) -> Quarantined and deleted successfully.

C:\WINDOWS\winsystem.exe (Fake.Dropped.Malware) -> Quarantined and deleted successfully.

C:\WINDOWS\zip1.tmp (Fake.Dropped.Malware) -> Quarantined and deleted successfully.

C:\WINDOWS\zip2.tmp (Fake.Dropped.Malware) -> Quarantined and deleted successfully.

C:\WINDOWS\zip3.tmp (Fake.Dropped.Malware) -> Quarantined and deleted successfully.

C:\WINDOWS\zipped.tmp (Fake.Dropped.Malware) -> Quarantined and deleted successfully.

C:\WINDOWS\bdn.com (Trojan.Agent) -> Quarantined and deleted successfully.

C:\WINDOWS\iTunesMusic.exe (Trojan.Agent) -> Quarantined and deleted successfully.

C:\WINDOWS\mssecu.exe (Trojan.Agent) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\akttzn.exe (Trojan.Agent) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\anticipator.dll (Trojan.Agent) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\awtoolb.dll (Trojan.Agent) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\bdn.com (Trojan.Agent) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\bsva-egihsg52.exe (Trojan.Agent) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\dpcproxy.exe (Trojan.Agent) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\h@tkeysh@@k.dll (Trojan.Agent) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\hoproxy.dll (Trojan.Agent) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\hxiwlgpm.dat (Trojan.Agent) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\hxiwlgpm.exe (Trojan.Agent) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\msgp.exe (Trojan.Agent) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\msnbho.dll (Trojan.Agent) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\mssecu.exe (Trojan.Agent) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\msvchost.exe (Trojan.Agent) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\mtr2.exe (Trojan.Agent) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\mwin32.exe (Trojan.Agent) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\netode.exe (Trojan.Agent) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\newsd32.exe (Trojan.Agent) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\ps1.exe (Trojan.Agent) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\psof1.exe (Trojan.Agent) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\psoft1.exe (Trojan.Agent) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\regc64.dll (Trojan.Agent) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\regm64.dll (Trojan.Agent) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\Rundl1.exe (Trojan.Agent) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\sncntr.exe (Trojan.Agent) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\ssurf022.dll (Trojan.Agent) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\ssvchost.com (Trojan.Agent) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\ssvchost.exe (Trojan.Agent) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\sysreq.exe (Trojan.Agent) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\taack.dat (Trojan.Agent) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\taack.exe (Trojan.Agent) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\temp#01.exe (Trojan.Agent) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\thun.dll (Trojan.Agent) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\thun32.dll (Trojan.Agent) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\VBIEWER.OCX (Trojan.Agent) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\vcatchpi.dll (Trojan.Agent) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\winlogonpc.exe (Trojan.Agent) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\winsystem.exe (Trojan.Agent) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\WINWGPX.EXE (Trojan.Agent) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\vbsys2.dll (Trojan.Clicker) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\lphcahgj0e709.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\phcahgj0e709.bmp (Trojan.FakeAlert) -> Quarantined and deleted successfully.

C:\Documents and Settings\BRUNO\Local Settings\Temp\.tt1.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.

C:\Documents and Settings\BRUNO\Local Settings\Temp\.tt4.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.

C:\Documents and Settings\BRUNO\Local Settings\Temp\s1265.php (Trojan.FakeAlert) -> Quarantined and deleted successfully.

 

 

 

 

A présent je vais redémarrer et faire un scan avec HIJACK, à toute

Posté(e)
Re-hello, comme prévu me revoila et j'ai donc Lançé MBAM en "examen rapide"

et "supprimé la selection".

Je te met en copie le rapport:

 

 

 

Malwarebytes' Anti-Malware 1.24

Version de la base de données: 1042

Windows 5.1.2600 Service Pack 3

 

01:08:56 12/08/2008

mbam-log-8-12-2008 (01-08-56).txt

 

Type de recherche: Examen rapide

Eléments examinés: 69738

Temps écoulé: 21 minute(s), 56 second(s)

 

Processus mémoire infecté(s): 0

Module(s) mémoire infecté(s): 4

Clé(s) du Registre infectée(s): 36

Valeur(s) du Registre infectée(s): 7

Elément(s) de données du Registre infecté(s): 5

Dossier(s) infecté(s): 12

Fichier(s) infecté(s): 133

 

Processus mémoire infecté(s):

(Aucun élément nuisible détecté)

 

Module(s) mémoire infecté(s):

C:\WINDOWS\system32\ameasygp.dll (Trojan.Vundo) -> Delete on reboot.

C:\WINDOWS\system32\hgGxUMCu.dll (Trojan.Vundo) -> Delete on reboot.

C:\WINDOWS\system32\jkkKbYPF.dll (Trojan.Vundo) -> Delete on reboot.

C:\WINDOWS\system32\gccntj.dll (Trojan.Vundo) -> Delete on reboot.

 

Clé(s) du Registre infectée(s):

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{9ebc4069-d518-4a3b-aa38-124c4d1048ea} (Trojan.Vundo) -> Quarantined and deleted successfully.

HKEY_CLASSES_ROOT\CLSID\{9ebc4069-d518-4a3b-aa38-124c4d1048ea} (Trojan.Vundo) -> Quarantined and deleted successfully.

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{e5164e72-7450-415e-a387-f42fd6b01dcb} (Trojan.Vundo) -> Delete on reboot.

HKEY_CLASSES_ROOT\CLSID\{e5164e72-7450-415e-a387-f42fd6b01dcb} (Trojan.Vundo) -> Delete on reboot.

HKEY_CLASSES_ROOT\CLSID\{28030fa8-2428-4de6-b0f3-ce9494e1a412} (Trojan.Vundo) -> Delete on reboot.

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{28030fa8-2428-4de6-b0f3-ce9494e1a412} (Trojan.Vundo) -> Delete on reboot.

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\jkkkbypf (Trojan.Vundo) -> Delete on reboot.

HKEY_CLASSES_ROOT\CLSID\{9dd4258a-7138-49c4-8d34-587879a5c7a4} (Fake.Dropped.Malware) -> Quarantined and deleted successfully.

HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{9dd4258a-7138-49c4-8d34-587879a5c7a4} (Fake.Dropped.Malware) -> Quarantined and deleted successfully.

HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{b8c0220d-763d-49a4-95f4-61dfdec66ee6} (Fake.Dropped.Malware) -> Quarantined and deleted successfully.

HKEY_CLASSES_ROOT\CLSID\{c3bcc488-1ae7-11d4-ab82-0010a4ec2338} (Fake.Dropped.Malware) -> Quarantined and deleted successfully.

HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{c3bcc488-1ae7-11d4-ab82-0010a4ec2338} (Fake.Dropped.Malware) -> Quarantined and deleted successfully.

HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{000000da-0786-4633-87c6-1aa7a4429ef1} (Fake.Dropped.Malware) -> Quarantined and deleted successfully.

HKEY_CLASSES_ROOT\CLSID\{a15e2a71-303e-4f13-a642-eb3a786da5fc} (Trojan.Vundo) -> Quarantined and deleted successfully.

HKEY_LOCAL_MACHINE\SOFTWARE\rhcehgj0e709 (Rogue.Multiple) -> Quarantined and deleted successfully.

HKEY_CURRENT_USER\SOFTWARE\antivirus 2008 pro (Rogue.Antivirus2008) -> Quarantined and deleted successfully.

HKEY_CLASSES_ROOT\sunporn (Trojan.DNSChanger) -> Quarantined and deleted successfully.

HKEY_CLASSES_ROOT\sunpornwrrb325 (Trojan.DNSChanger) -> Quarantined and deleted successfully.

HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\logons (Fake.Dropped.Malware) -> Quarantined and deleted successfully.

HKEY_CURRENT_USER\SOFTWARE\uninstall (Fake.Dropped.Malware) -> Quarantined and deleted successfully.

HKEY_CURRENT_USER\typelib (Fake.Dropped.Malware) -> Quarantined and deleted successfully.

HKEY_CURRENT_USER\HOL5_VXIEWER.FULL.1 (Trojan.FakeAlert) -> Quarantined and deleted successfully.

HKEY_CURRENT_USER\SOFTWARE\fwbd (Trojan.FakeAlert) -> Quarantined and deleted successfully.

HKEY_CURRENT_USER\SOFTWARE\HolLol (Trojan.FakeAlert) -> Quarantined and deleted successfully.

HKEY_CURRENT_USER\SYSTEM\currentcontrolset\Services\iTunesMusic (Fake.Dropped.Malware) -> Quarantined and deleted successfully.

HKEY_CURRENT_USER\SYSTEM\currentcontrolset\Services\rdriv (Fake.Dropped.Malware) -> Quarantined and deleted successfully.

HKEY_CURRENT_USER\SOFTWARE\wkey (Malware.Trace) -> Quarantined and deleted successfully.

HKEY_CURRENT_USER\SOFTWARE\mwc (Malware.Trace) -> Quarantined and deleted successfully.

HKEY_CURRENT_USER\SOFTWARE\Microsoft\rdfa (Trojan.Vundo) -> Quarantined and deleted successfully.

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Software Notifier (Rogue.Multiple) -> Quarantined and deleted successfully.

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\MS Juan (Malware.Trace) -> Quarantined and deleted successfully.

HKEY_CURRENT_USER\SOFTWARE\Microsoft\contim (Trojan.Vundo) -> Quarantined and deleted successfully.

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\MS Track System (Trojan.Vundo) -> Quarantined and deleted successfully.

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\RemoveRP (Trojan.Vundo) -> Quarantined and deleted successfully.

HKEY_CURRENT_USER\SOFTWARE\SecuriSoft SARL (Trojan.FakeAlert) -> Quarantined and deleted successfully.

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\aoprndtws (Trojan.Vundo) -> Quarantined and deleted successfully.

 

Valeur(s) du Registre infectée(s):

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\d09361bb (Trojan.Vundo) -> Quarantined and deleted successfully.

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\ShellExecuteHooks\{28030fa8-2428-4de6-b0f3-ce9494e1a412} (Trojan.Vundo) -> Delete on reboot.

HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler\{0656a137-b161-cadd-9777-e37a75727e78} (Fake.Dropped.Malware) -> Quarantined and deleted successfully.

HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\Toolbar\{0e1230f8-ea50-42a9-983c-d22abc2eeb4c} (Fake.Dropped.Malware) -> Quarantined and deleted successfully.

HKEY_CURRENT_USER\Control Panel\Desktop\wallpaper (Hijack.Wallpaper) -> Quarantined and deleted successfully.

HKEY_CURRENT_USER\Control Panel\Desktop\originalwallpaper (Hijack.Wallpaper) -> Quarantined and deleted successfully.

HKEY_CURRENT_USER\Control Panel\Desktop\convertedwallpaper (Hijack.Wallpaper) -> Quarantined and deleted successfully.

 

Elément(s) de données du Registre infecté(s):

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\LSA\Notification Packages (Trojan.Vundo) -> Data: c:\windows\system32\hggxumcu -> Quarantined and deleted successfully.

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\LSA\Authentication Packages (Trojan.Vundo) -> Data: c:\windows\system32\hggxumcu -> Delete on reboot.

HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableTaskMgr (Hijack.TaskManager) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.

HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\NoDispBackgroundPage (Hijack.DisplayProperties) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.

HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\NoDispScrSavPage (Hijack.DisplayProperties) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.

 

Dossier(s) infecté(s):

C:\WINDOWS\mslagent (Adware.EGDAccess) -> Quarantined and deleted successfully.

C:\Program Files\akl (Fake.Dropped.Malware) -> Quarantined and deleted successfully.

C:\Program Files\PCHealthCenter (Trojan.Fakealert) -> Quarantined and deleted successfully.

C:\Program Files\Inet Delivery (Fake.Dropped.Malware) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\smp (Fake.Dropped.Malware) -> Quarantined and deleted successfully.

C:\Program Files\rhcehgj0e709 (Rogue.Multiple) -> Quarantined and deleted successfully.

C:\Documents and Settings\All Users\Application Data\SecuriSoft SARL (Rogue.WinSpywareProtect) -> Quarantined and deleted successfully.

C:\Documents and Settings\All Users\Application Data\SecuriSoft SARL\WinSpywareProtect (Rogue.WinSpywareProtect) -> Quarantined and deleted successfully.

C:\Documents and Settings\All Users\Application Data\SecuriSoft SARL\WinSpywareProtect\BASE (Rogue.WinSpywareProtect) -> Quarantined and deleted successfully.

C:\Documents and Settings\All Users\Application Data\SecuriSoft SARL\WinSpywareProtect\DELETED (Rogue.WinSpywareProtect) -> Quarantined and deleted successfully.

C:\Documents and Settings\All Users\Application Data\SecuriSoft SARL\WinSpywareProtect\LOG (Rogue.WinSpywareProtect) -> Quarantined and deleted successfully.

C:\Documents and Settings\All Users\Application Data\SecuriSoft SARL\WinSpywareProtect\SAVED (Rogue.WinSpywareProtect) -> Quarantined and deleted successfully.

 

Fichier(s) infecté(s):

C:\WINDOWS\system32\gccntj.dll (Trojan.Vundo) -> Delete on reboot.

C:\WINDOWS\system32\hgGxUMCu.dll (Trojan.Vundo) -> Delete on reboot.

C:\WINDOWS\system32\uCMUxGgh.ini (Trojan.Vundo) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\uCMUxGgh.ini2 (Trojan.Vundo) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\ablfxlsr.dll (Trojan.Vundo) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\rslxflba.ini (Trojan.Vundo) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\ameasygp.dll (Trojan.Vundo) -> Delete on reboot.

C:\WINDOWS\system32\pgysaema.ini (Trojan.Vundo) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\fchfufnc.dll (Trojan.Vundo) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\cnfufhcf.ini (Trojan.Vundo) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\jkkKbYPF.dll (Trojan.Vundo) -> Delete on reboot.

C:\WINDOWS\system32\aowdtsvs.dll (Trojan.Vundo) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\cccohf.dll (Trojan.Vundo) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\endplkne.dll (Trojan.Vundo) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\enueaxyb.dll (Trojan.Vundo) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\errexudr.dll (Trojan.Vundo) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\fpebad.dll (Trojan.Vundo) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\fsihpngt.dll (Trojan.Vundo) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\hgsrob.dll (Trojan.Vundo) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\hsorfqfk.dll (Trojan.Vundo) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\jpkqyugt.dll (Trojan.Vundo) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\mccgknmm.dll (Trojan.Vundo) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\ciikzw.dll (Trojan.Vundo) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\cuyyxi.dll (Trojan.Vundo) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\qaeixkme.dll (Trojan.Vundo) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\rzzcku.dll (Trojan.Vundo) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\uvghdjvb.dll (Trojan.Vundo) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\itspzl.dll (Trojan.Vundo) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\fgshckeb.dll (Trojan.Vundo) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\gfqesl.dll (Trojan.Vundo) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\gohzak.dll (Trojan.Vundo) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\idnwdqbn.dll (Trojan.Vundo) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\qwigyg.dll (Trojan.Vundo) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\mpnnwgrk.exe (Trojan.Vundo) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\bkynwgso.dll (Trojan.Vundo) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\oiclwu.dll (Trojan.Vundo) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\ykniigim.dll (Trojan.Vundo) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\ywuhyp.dll (Trojan.Vundo) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\djrssr.dll (Trojan.Vundo) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\ubdxqcmp.dll (Trojan.Vundo) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\uflyryhx.dll (Trojan.Vundo) -> Quarantined and deleted successfully.

C:\Documents and Settings\ENORA\Local Settings\Temporary Internet Files\Content.IE5\OD8NK3SF\kb456456[1] (Trojan.Vundo) -> Quarantined and deleted successfully.

C:\Documents and Settings\ENORA\Local Settings\Temporary Internet Files\Content.IE5\QFSFAPKJ\kb767887[1] (Trojan.Vundo) -> Quarantined and deleted successfully.

C:\Documents and Settings\BRUNO\Local Settings\Temporary Internet Files\Content.IE5\CA5MTY82\kb456456[1] (Trojan.Vundo) -> Quarantined and deleted successfully.

C:\Documents and Settings\BRUNO\Local Settings\Temporary Internet Files\Content.IE5\CA5MTY82\kb456456[2] (Trojan.Vundo) -> Quarantined and deleted successfully.

C:\Documents and Settings\BRUNO\Local Settings\Temporary Internet Files\Content.IE5\CA5MTY82\kb767887[1] (Trojan.Vundo) -> Quarantined and deleted successfully.

C:\Documents and Settings\BRUNO\Local Settings\Temporary Internet Files\Content.IE5\CF461RN7\kb767887[1] (Trojan.Vundo) -> Quarantined and deleted successfully.

C:\Documents and Settings\BRUNO\Local Settings\Temporary Internet Files\Content.IE5\CF461RN7\kb767887[2] (Trojan.Vundo) -> Quarantined and deleted successfully.

C:\Documents and Settings\BRUNO\Local Settings\Temporary Internet Files\Content.IE5\CF461RN7\kb767887[3] (Trojan.Vundo) -> Quarantined and deleted successfully.

C:\Documents and Settings\BRUNO\Local Settings\Temporary Internet Files\Content.IE5\MRQUPCCN\kb456456[1] (Trojan.Vundo) -> Quarantined and deleted successfully.

C:\Documents and Settings\BRUNO\Local Settings\Temporary Internet Files\Content.IE5\NYTFQIDU\kb456456[2] (Trojan.Vundo) -> Quarantined and deleted successfully.

C:\Documents and Settings\BRUNO\Local Settings\Temporary Internet Files\Content.IE5\ZHSKKFDZ\kb456456[1] (Trojan.Vundo) -> Quarantined and deleted successfully.

C:\Documents and Settings\BRUNO\Local Settings\Temporary Internet Files\Content.IE5\ZHSKKFDZ\kb65666[1] (Trojan.Vundo) -> Quarantined and deleted successfully.

C:\Documents and Settings\BRUNO\Local Settings\Temporary Internet Files\Content.IE5\ZHSKKFDZ\kb767887[1] (Trojan.Vundo) -> Quarantined and deleted successfully.

C:\Documents and Settings\BRUNO\Local Settings\Temporary Internet Files\Content.IE5\ZXSSVXBV\kb767887[1] (Trojan.Vundo) -> Quarantined and deleted successfully.

C:\WINDOWS\mslagent\2_mslagent.dll (Adware.EGDAccess) -> Quarantined and deleted successfully.

C:\WINDOWS\mslagent\mslagent.exe (Adware.EGDAccess) -> Quarantined and deleted successfully.

C:\WINDOWS\mslagent\uninstall.exe (Adware.EGDAccess) -> Quarantined and deleted successfully.

C:\Program Files\akl\akl.dll (Fake.Dropped.Malware) -> Quarantined and deleted successfully.

C:\Program Files\akl\akl.exe (Fake.Dropped.Malware) -> Quarantined and deleted successfully.

C:\Program Files\akl\uninstall.exe (Fake.Dropped.Malware) -> Quarantined and deleted successfully.

C:\Program Files\akl\unsetup.exe (Fake.Dropped.Malware) -> Quarantined and deleted successfully.

C:\Program Files\PCHealthCenter\0.gif (Trojan.Fakealert) -> Quarantined and deleted successfully.

C:\Program Files\PCHealthCenter\1.gif (Trojan.Fakealert) -> Quarantined and deleted successfully.

C:\Program Files\PCHealthCenter\2.gif (Trojan.Fakealert) -> Quarantined and deleted successfully.

C:\Program Files\PCHealthCenter\3.gif (Trojan.Fakealert) -> Quarantined and deleted successfully.

C:\Program Files\PCHealthCenter\sc.html (Trojan.Fakealert) -> Quarantined and deleted successfully.

C:\Program Files\PCHealthCenter\sex1.ico (Trojan.Fakealert) -> Quarantined and deleted successfully.

C:\Program Files\PCHealthCenter\sex2.ico (Trojan.Fakealert) -> Quarantined and deleted successfully.

C:\Program Files\Inet Delivery\inetdl.exe (Fake.Dropped.Malware) -> Quarantined and deleted successfully.

C:\Program Files\Inet Delivery\intdel.exe (Fake.Dropped.Malware) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\smp\msrc.exe (Fake.Dropped.Malware) -> Quarantined and deleted successfully.

C:\Documents and Settings\All Users\Application Data\SecuriSoft SARL\WinSpywareProtect\wspwprtct.exe (Rogue.WinSpywareProtect) -> Quarantined and deleted successfully.

C:\Documents and Settings\All Users\Application Data\SecuriSoft SARL\WinSpywareProtect\LOG\20080721015737875.log (Rogue.WinSpywareProtect) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\mcrh.tmp (Malware.Trace) -> Quarantined and deleted successfully.

C:\WINDOWS\cookies.ini (Malware.Trace) -> Quarantined and deleted successfully.

C:\WINDOWS\a.bat (Fake.Dropped.Malware) -> Quarantined and deleted successfully.

C:\WINDOWS\base64.tmp (Fake.Dropped.Malware) -> Quarantined and deleted successfully.

C:\WINDOWS\FVProtect.exe (Fake.Dropped.Malware) -> Quarantined and deleted successfully.

C:\WINDOWS\userconfig9x.dll (Fake.Dropped.Malware) -> Quarantined and deleted successfully.

C:\WINDOWS\winsystem.exe (Fake.Dropped.Malware) -> Quarantined and deleted successfully.

C:\WINDOWS\zip1.tmp (Fake.Dropped.Malware) -> Quarantined and deleted successfully.

C:\WINDOWS\zip2.tmp (Fake.Dropped.Malware) -> Quarantined and deleted successfully.

C:\WINDOWS\zip3.tmp (Fake.Dropped.Malware) -> Quarantined and deleted successfully.

C:\WINDOWS\zipped.tmp (Fake.Dropped.Malware) -> Quarantined and deleted successfully.

C:\WINDOWS\bdn.com (Trojan.Agent) -> Quarantined and deleted successfully.

C:\WINDOWS\iTunesMusic.exe (Trojan.Agent) -> Quarantined and deleted successfully.

C:\WINDOWS\mssecu.exe (Trojan.Agent) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\akttzn.exe (Trojan.Agent) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\anticipator.dll (Trojan.Agent) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\awtoolb.dll (Trojan.Agent) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\bdn.com (Trojan.Agent) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\bsva-egihsg52.exe (Trojan.Agent) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\dpcproxy.exe (Trojan.Agent) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\h@tkeysh@@k.dll (Trojan.Agent) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\hoproxy.dll (Trojan.Agent) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\hxiwlgpm.dat (Trojan.Agent) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\hxiwlgpm.exe (Trojan.Agent) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\msgp.exe (Trojan.Agent) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\msnbho.dll (Trojan.Agent) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\mssecu.exe (Trojan.Agent) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\msvchost.exe (Trojan.Agent) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\mtr2.exe (Trojan.Agent) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\mwin32.exe (Trojan.Agent) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\netode.exe (Trojan.Agent) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\newsd32.exe (Trojan.Agent) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\ps1.exe (Trojan.Agent) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\psof1.exe (Trojan.Agent) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\psoft1.exe (Trojan.Agent) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\regc64.dll (Trojan.Agent) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\regm64.dll (Trojan.Agent) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\Rundl1.exe (Trojan.Agent) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\sncntr.exe (Trojan.Agent) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\ssurf022.dll (Trojan.Agent) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\ssvchost.com (Trojan.Agent) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\ssvchost.exe (Trojan.Agent) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\sysreq.exe (Trojan.Agent) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\taack.dat (Trojan.Agent) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\taack.exe (Trojan.Agent) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\temp#01.exe (Trojan.Agent) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\thun.dll (Trojan.Agent) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\thun32.dll (Trojan.Agent) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\VBIEWER.OCX (Trojan.Agent) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\vcatchpi.dll (Trojan.Agent) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\winlogonpc.exe (Trojan.Agent) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\winsystem.exe (Trojan.Agent) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\WINWGPX.EXE (Trojan.Agent) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\vbsys2.dll (Trojan.Clicker) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\lphcahgj0e709.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\phcahgj0e709.bmp (Trojan.FakeAlert) -> Quarantined and deleted successfully.

C:\Documents and Settings\BRUNO\Local Settings\Temp\.tt1.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.

C:\Documents and Settings\BRUNO\Local Settings\Temp\.tt4.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.

C:\Documents and Settings\BRUNO\Local Settings\Temp\s1265.php (Trojan.FakeAlert) -> Quarantined and deleted successfully.

 

 

 

 

A présent je vais redémarrer et faire un scan avec HIJACK, à toute

 

 

 

 

 

 

Je suis à nouveaux de retour...

Donc, après avoir redémarré, j'ai lançé un nouveau scan avec LOP S&D

et voila le rapport:

 

 

 

--------------------\\ Lop S&D 4.2.2-6 XP/Vista

 

[ Windows XP (NT 5.1) Build 2600, Service Pack 3 ]

[ USER : BRUNO ] [ "C:\Lop SD" ] [ Selection : 1 ]

[ 12/08/2008 | 2:41:23,93 ] [ PC : ORDISUPERB ]

[ MAJ : 09-08-2008 | 21:15 ]

 

--------------------\\ Listing des dossiers dans APPLIC~1

 

[17/01/2007|00:11] C:\DOCUME~1\ADMINI~1\APPLIC~1\desktop.ini

[07/08/2008|20:38] C:\DOCUME~1\ADMINI~1\APPLIC~1\Microsoft

[07/08/2008|20:45] C:\DOCUME~1\ADMINI~1\APPLIC~1\Real

 

[13/12/2007|11:55] C:\DOCUME~1\ALAN\APPLIC~1\Adobe

[05/09/2007|19:48] C:\DOCUME~1\ALAN\APPLIC~1\AdobeUM

[17/02/2007|13:35] C:\DOCUME~1\ALAN\APPLIC~1\Ahead

[16/04/2008|13:27] C:\DOCUME~1\ALAN\APPLIC~1\Apple Computer

[20/01/2007|05:26] C:\DOCUME~1\ALAN\APPLIC~1\ATI

[17/01/2007|00:11] C:\DOCUME~1\ALAN\APPLIC~1\desktop.ini

[10/01/2008|19:32] C:\DOCUME~1\ALAN\APPLIC~1\DivX

[03/10/2007|14:52] C:\DOCUME~1\ALAN\APPLIC~1\Google

[20/01/2007|05:26] C:\DOCUME~1\ALAN\APPLIC~1\Identities

[20/01/2007|05:26] C:\DOCUME~1\ALAN\APPLIC~1\Logitech

[20/01/2007|17:24] C:\DOCUME~1\ALAN\APPLIC~1\Macromedia

[16/05/2007|10:55] C:\DOCUME~1\ALAN\APPLIC~1\McAfee.com Personal Firewall

[17/02/2007|13:36] C:\DOCUME~1\ALAN\APPLIC~1\Media Player Classic

[23/12/2007|21:31] C:\DOCUME~1\ALAN\APPLIC~1\Microsoft

[25/07/2008|14:14] C:\DOCUME~1\ALAN\APPLIC~1\Real

[03/02/2007|16:38] C:\DOCUME~1\ALAN\APPLIC~1\Sun

 

[17/02/2008|04:41] C:\DOCUME~1\ALLUSE~1\APPLIC~1\.zreglib

[02/07/2008|20:21] C:\DOCUME~1\ALLUSE~1\APPLIC~1\{A850D4D9-871B-4234-908D-21C457767270}

[19/01/2007|00:56] C:\DOCUME~1\ALLUSE~1\APPLIC~1\addr_file.html

[27/05/2008|22:38] C:\DOCUME~1\ALLUSE~1\APPLIC~1\Adobe

[12/08/2008|01:22] C:\DOCUME~1\ALLUSE~1\APPLIC~1\AntiVir PersonalEdition Classic

[09/01/2008|17:14] C:\DOCUME~1\ALLUSE~1\APPLIC~1\Apple

[08/02/2008|02:20] C:\DOCUME~1\ALLUSE~1\APPLIC~1\Apple Computer

[17/01/2007|00:11] C:\DOCUME~1\ALLUSE~1\APPLIC~1\desktop.ini

[19/01/2007|02:43] C:\DOCUME~1\ALLUSE~1\APPLIC~1\DVD Shrink

[03/10/2007|09:00] C:\DOCUME~1\ALLUSE~1\APPLIC~1\Google

[31/07/2008|19:44] C:\DOCUME~1\ALLUSE~1\APPLIC~1\Lavasoft

[07/12/2007|02:30] C:\DOCUME~1\ALLUSE~1\APPLIC~1\LogiShrd

[25/04/2007|21:10] C:\DOCUME~1\ALLUSE~1\APPLIC~1\Logitech

[12/08/2008|00:32] C:\DOCUME~1\ALLUSE~1\APPLIC~1\Malwarebytes

[20/01/2007|11:28] C:\DOCUME~1\ALLUSE~1\APPLIC~1\McAfee.com

[18/02/2007|12:05] C:\DOCUME~1\ALLUSE~1\APPLIC~1\McAfee.com Personal Firewall

[10/11/2007|12:42] C:\DOCUME~1\ALLUSE~1\APPLIC~1\Messenger Plus!

[29/01/2008|03:54] C:\DOCUME~1\ALLUSE~1\APPLIC~1\Microsoft

[26/05/2007|12:32] C:\DOCUME~1\ALLUSE~1\APPLIC~1\Microsoft Games

[29/01/2008|01:35] C:\DOCUME~1\ALLUSE~1\APPLIC~1\Office Genuine Advantage

[24/10/2007|21:48] C:\DOCUME~1\ALLUSE~1\APPLIC~1\QTSBandwidthCache

[19/01/2007|02:23] C:\DOCUME~1\ALLUSE~1\APPLIC~1\Raxco

[26/01/2008|19:55] C:\DOCUME~1\ALLUSE~1\APPLIC~1\SlySoft

[06/08/2008|20:01] C:\DOCUME~1\ALLUSE~1\APPLIC~1\Spybot - Search & Destroy

[23/07/2008|03:51] C:\DOCUME~1\ALLUSE~1\APPLIC~1\ubotojir

[29/01/2008|01:35] C:\DOCUME~1\ALLUSE~1\APPLIC~1\Windows Genuine Advantage

[29/01/2008|03:51] C:\DOCUME~1\ALLUSE~1\APPLIC~1\WLInstaller

 

[19/01/2007|01:47] C:\DOCUME~1\BRUNO\APPLIC~1\Adobe

[27/05/2008|22:38] C:\DOCUME~1\BRUNO\APPLIC~1\AdobeUM

[18/10/2007|17:43] C:\DOCUME~1\BRUNO\APPLIC~1\Ahead

[08/02/2008|02:21] C:\DOCUME~1\BRUNO\APPLIC~1\Apple Computer

[18/01/2007|23:32] C:\DOCUME~1\BRUNO\APPLIC~1\ATI

[17/01/2007|00:11] C:\DOCUME~1\BRUNO\APPLIC~1\desktop.ini

[21/12/2007|01:44] C:\DOCUME~1\BRUNO\APPLIC~1\DivX

[03/10/2007|10:59] C:\DOCUME~1\BRUNO\APPLIC~1\Google

[10/02/2007|13:32] C:\DOCUME~1\BRUNO\APPLIC~1\Help

[17/01/2007|00:40] C:\DOCUME~1\BRUNO\APPLIC~1\Identities

[07/12/2007|02:29] C:\DOCUME~1\BRUNO\APPLIC~1\InstallShield

[21/01/2008|19:44] C:\DOCUME~1\BRUNO\APPLIC~1\Lavasoft

[18/01/2007|23:12] C:\DOCUME~1\BRUNO\APPLIC~1\Logitech

[17/01/2007|00:39] C:\DOCUME~1\BRUNO\APPLIC~1\Macromedia

[12/08/2008|00:32] C:\DOCUME~1\BRUNO\APPLIC~1\Malwarebytes

[03/10/2007|11:06] C:\DOCUME~1\BRUNO\APPLIC~1\McAfee.com Personal Firewall

[19/01/2007|02:10] C:\DOCUME~1\BRUNO\APPLIC~1\Media Player Classic

[07/02/2008|19:12] C:\DOCUME~1\BRUNO\APPLIC~1\Microsoft

[25/07/2008|04:17] C:\DOCUME~1\BRUNO\APPLIC~1\Real

[26/01/2008|19:56] C:\DOCUME~1\BRUNO\APPLIC~1\SlySoft

[19/01/2007|03:41] C:\DOCUME~1\BRUNO\APPLIC~1\Sun

[19/01/2007|02:30] C:\DOCUME~1\BRUNO\APPLIC~1\Winamp

[09/10/2007|18:35] C:\DOCUME~1\BRUNO\APPLIC~1\XnView

 

[17/01/2007|00:11] C:\DOCUME~1\DEFAUL~1\APPLIC~1\desktop.ini

[17/01/2007|00:25] C:\DOCUME~1\DEFAUL~1\APPLIC~1\Microsoft

 

 

[29/07/2008|02:56] C:\DOCUME~1\LOCALS~1\APPLIC~1\Adobe

[29/07/2008|02:56] C:\DOCUME~1\LOCALS~1\APPLIC~1\AdobeUM

[19/01/2007|01:13] C:\DOCUME~1\LOCALS~1\APPLIC~1\McAfee.com Personal Firewall

[22/01/2007|14:59] C:\DOCUME~1\LOCALS~1\APPLIC~1\Microsoft

 

[17/01/2007|00:28] C:\DOCUME~1\NETWOR~1\APPLIC~1\Microsoft

 

--------------------\\ Tâches planifiées dans C:\WINDOWS\tasks

 

[12/08/2008 01:19][--a------] C:\WINDOWS\tasks\SCHEDLGU.TXT

[31/07/2008 22:21][--a------] C:\WINDOWS\tasks\AppleSoftwareUpdate.job

[12/08/2008 01:21][--ah-----] C:\WINDOWS\tasks\SA.DAT

[28/08/2001 16:00][-r-h-----] C:\WINDOWS\tasks\desktop.ini

 

--------------------\\ Listing des dossiers dans C:\Program Files

 

[17/01/2007|00:38] C:\Program Files\Adobe

[12/08/2008|01:22] C:\Program Files\AntiVir PersonalEdition Classic

[09/01/2008|17:14] C:\Program Files\Apple Software Update

[18/01/2007|23:29] C:\Program Files\ATI Technologies

[18/01/2007|22:59] C:\Program Files\AvRack

[17/01/2007|00:22] C:\Program Files\ComPlus Applications

[10/04/2008|03:32] C:\Program Files\DivX

[25/04/2008|19:02] C:\Program Files\EA GAMES

[31/07/2008|19:47] C:\Program Files\Fichiers communs

[17/11/2007|00:52] C:\Program Files\Google

[02/07/2008|20:02] C:\Program Files\InstallShield Installation Information

[11/06/2008|19:05] C:\Program Files\Internet Explorer

[08/02/2008|02:21] C:\Program Files\iPod

[08/02/2008|02:21] C:\Program Files\iTunes

[21/07/2008|01:10] C:\Program Files\Java

[17/01/2007|00:32] C:\Program Files\JEUX

[21/01/2008|19:45] C:\Program Files\Lavasoft

[18/01/2007|23:10] C:\Program Files\Logitech

[18/03/2007|19:19] C:\Program Files\Maxis

[19/01/2007|01:10] C:\Program Files\McAfee.com

[02/07/2008|19:50] C:\Program Files\Messenger

[17/01/2007|00:25] C:\Program Files\microsoft frontpage

[26/05/2007|12:25] C:\Program Files\Microsoft Games

[17/01/2007|00:36] C:\Program Files\Microsoft Office

[29/01/2008|03:55] C:\Program Files\Microsoft SQL Server Compact Edition

[02/07/2008|19:50] C:\Program Files\Movie Maker

[29/01/2008|03:01] C:\Program Files\MSECache

[02/07/2008|19:50] C:\Program Files\msn

[17/01/2007|00:22] C:\Program Files\MSN Gaming Zone

[25/01/2007|20:42] C:\Program Files\Nero

[02/07/2008|19:48] C:\Program Files\NetMeeting

[19/01/2007|01:15] C:\Program Files\Neuf

[02/07/2008|19:48] C:\Program Files\Outlook Express

[09/12/2007|16:39] C:\Program Files\PDFCreator

[12/12/2007|11:58] C:\Program Files\Prophet Soft

[23/07/2008|03:51] C:\Program Files\qlztrmc

[08/02/2008|02:18] C:\Program Files\QuickTime

[24/11/2007|17:18] C:\Program Files\RAXCO

[18/01/2007|22:59] C:\Program Files\Realtek AC97

[18/01/2007|22:59] C:\Program Files\Realtek Sound Manager

[17/02/2008|04:42] C:\Program Files\SlySoft

[06/08/2008|20:02] C:\Program Files\Spybot - Search & Destroy

[23/07/2008|18:39] C:\Program Files\trcjgaf

[17/01/2007|00:40] C:\Program Files\Uninstall Information

[17/01/2007|00:31] C:\Program Files\UTILS

[17/01/2007|00:36] C:\Program Files\Windows Journal Viewer

[01/03/2008|19:30] C:\Program Files\Windows Live

[17/01/2007|00:37] C:\Program Files\Windows Media Components

[08/06/2007|19:21] C:\Program Files\Windows Media Connect 2

[02/07/2008|19:48] C:\Program Files\Windows Media Player

[02/07/2008|19:48] C:\Program Files\Windows NT

[17/01/2007|00:24] C:\Program Files\WindowsUpdate

[17/01/2007|00:37] C:\Program Files\WMV9_VCM

[17/01/2007|00:25] C:\Program Files\xerox

 

--------------------\\ Listing des dossiers dans C:\Program Files\Fichiers communs

 

[27/05/2008|22:38] C:\Program Files\Fichiers communs\Adobe

[25/01/2007|20:42] C:\Program Files\Fichiers communs\Ahead

[08/02/2008|02:20] C:\Program Files\Fichiers communs\Apple

[18/01/2007|23:28] C:\Program Files\Fichiers communs\ATI Technologies

[18/01/2007|23:25] C:\Program Files\Fichiers communs\InstallShield

[17/01/2007|00:39] C:\Program Files\Fichiers communs\Java

[07/12/2007|02:30] C:\Program Files\Fichiers communs\Logishrd

[07/12/2007|02:30] C:\Program Files\Fichiers communs\Logitech

[29/01/2008|03:54] C:\Program Files\Fichiers communs\Microsoft Shared

[17/01/2007|00:23] C:\Program Files\Fichiers communs\MSSoap

[17/01/2007|00:11] C:\Program Files\Fichiers communs\ODBC

[24/11/2007|17:21] C:\Program Files\Fichiers communs\Raxco

[25/07/2008|02:08] C:\Program Files\Fichiers communs\Real

[17/01/2007|00:23] C:\Program Files\Fichiers communs\Services

[17/01/2007|00:11] C:\Program Files\Fichiers communs\SpeechEngines

[02/07/2008|19:48] C:\Program Files\Fichiers communs\System

[29/01/2008|03:54] C:\Program Files\Fichiers communs\WindowsLiveInstaller

[31/07/2008|19:47] C:\Program Files\Fichiers communs\Wise Installation Wizard

[25/07/2008|02:08] C:\Program Files\Fichiers communs\xing shared

 

--------------------\\ Process

 

( 51 Processus )

 

... OK !

 

--------------------\\ Recherche avec S_Lop

 

Aucun fichier / dossier Lop trouvé !

 

--------------------\\ Recherche de Fichiers / Dossiers Lop

 

C:\DOCUME~1\BRUNO\Cookies\bruno@adultfriendfinder[1].txt

C:\DOCUME~1\BRUNO\Cookies\bruno@advertising[2].txt

C:\DOCUME~1\BRUNO\Cookies\bruno@adin.bigpoint[2].txt

C:\DOCUME~1\BRUNO\Cookies\bruno@bigpoint[2].txt

C:\DOCUME~1\BRUNO\Cookies\bruno@es.bigpoint[1].txt

C:\DOCUME~1\BRUNO\Cookies\bruno@es.bigpoint[2].txt

C:\DOCUME~1\BRUNO\Cookies\bruno@es.bigpoint[3].txt

C:\DOCUME~1\BRUNO\Cookies\bruno@fr.seafight.bigpoint[1].txt

C:\DOCUME~1\BRUNO\Cookies\bruno@fr1.darkorbit.bigpoint[1].txt

C:\DOCUME~1\BRUNO\Cookies\bruno@fr1.darkorbit.bigpoint[2].txt

C:\DOCUME~1\BRUNO\Cookies\bruno@www.bigpoint[2].txt

C:\DOCUME~1\BRUNO\Cookies\bruno@fr.seafight.bigpoint[1].txt

 

--------------------\\ Verification du Registre

 

..... OK !

 

--------------------\\ Verification du fichier Hosts

 

Fichier Hosts PROPRE

 

 

--------------------\\ Recherche de fichiers avec Catchme

 

catchme 0.3.1353 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net

Rootkit scan 2008-08-12 02:41:58

Windows 5.1.2600 Service Pack 3 NTFS

scanning hidden processes ...

scanning hidden files ...

scan completed successfully

hidden processes: 0

hidden files: 133

 

--------------------\\ Recherche d'autres infections

 

--------------------\\ Cracks & Keygens ..

 

=> C:\DOCUME~1\BRUNO\Favoris\http--www.inthecrack.com-tgp-117x1043374x3b2d8.url

=> C:\DOCUME~1\BRUNO\Favoris\http--www.inthecrack.com-tgp-146x1043374xd42be.url

=> C:\DOCUME~1\BRUNO\Favoris\nella .inthecrack.com-tgp-129x1054226x8fe42.url

=> C:\DOCUME~1\BRUNO\Favoris\UP\http--www.inthecrack.com-tgp-024x1226481xffee8.url

=> C:\DOCUME~1\BRUNO\Favoris\UP\http--www.inthecrack.com-tgp-026x1226481x8da35.url

=> C:\DOCUME~1\BRUNO\Favoris\UP\http--www.inthecrack.com-tgp-028x1251006x996ba.url

=> C:\DOCUME~1\BRUNO\Favoris\UP\http--www.inthecrack.com-tgp-032x1360096x04675.url

=> C:\DOCUME~1\BRUNO\Favoris\UP\http--www.inthecrack.com-tgp-034x1226481x88b93.url

=> C:\DOCUME~1\BRUNO\Favoris\UP\http--www.inthecrack.com-tgp-098x1251006x9d763.url

 

 

[F:88][D:7]-> C:\DOCUME~1\BRUNO\LOCALS~1\Temp

[F:290][D:0]-> C:\DOCUME~1\BRUNO\Cookies

[F:4929][D:26]-> C:\DOCUME~1\BRUNO\LOCALS~1\TEMPOR~1\content.IE5

 

--------------------\\ Fin du rapport a 2:43:06,00

 

 

 

 

Je ne sais pas si mon ordi est enfin nettoyé mais pour l'instant je n'est plus de détection d'infection

par ANTIVIR qui l'antivirus que j'utilise.

j'attend avec impatience ton avis éclairé sur la question.

Maintenant, l'heure de l'extinction des feux est dépassé depuis fort longtemps et du coup je vais y aller

car demain il y a du pain sur la planche.

Donc bonne nuit et peut-être à demain...

 

CIAO :P

Posté(e)

Bonjour tout le monde !!!

 

Salut p'tit frère ! :P

 

C'est bien d'avoir refait un scan !

 

Sauf qu'il me semble que tu aurais du le faire avec HIJACK ...

Et pas LOP S&D :P

 

Enfin bon t'es bon pour recommencer voila tout :P

 

Quoi qu'il en soit, a la lecture de ce scan et sans avoir les compétences de FALKRA, il me semble bien qu'il y est encore quelques trucs bizards qui ne me plaisent pas du tout comme :

 

" zreglib, {A850D4D9-871B-4234-908D-21C457767270}, addr_file.html, LogiShrd, Malwarebytes, QTSBandwidthCache, ubotojir, SCHEDLGU.TXT, SA.DAT, qlztrmc, Prophet Soft, qlztrmc, trcjgaf, UTILS ...

 

Et sans doute n'ais-je pas tout vue et ou, je me trompe sur la "nocivité" de certaines lignes.

 

 

J'attend donc moi aussi le verdict...

 

Merci FALKRA pour ton aide.

 

Je vais continuer de suivre le sujet :P

 

Allez... :P

Posté(e)

Ne débarquez pas au milieu d'une désinfection de quelqu'un, et lisez mes liens en signature. Merci.

 

" zreglib, {A850D4D9-871B-4234-908D-21C457767270}, addr_file.html, LogiShrd, Malwarebytes, QTSBandwidthCache, ubotojir, SCHEDLGU.TXT, SA.DAT, qlztrmc, Prophet Soft, qlztrmc, trcjgaf, UTILS ...
Si tu ne sais pas trier un fichier légitime d'un fichier infectieux, abstiens toi.

 

Je vais continuer de suivre le sujet
Passionnante lecture, en effet.

 

---------------------

 

Je ne sais pas si mon ordi est enfin nettoyé mais pour l'instant je n'est plus de détection d'infection

par ANTIVIR qui l'antivirus que j'utilise.

j'attend avec impatience ton avis éclairé sur la question.

C'est bon signe.

 

Poste un nouveau rapport HijackThis stp, ça doit aller mieux. :P

Rejoindre la conversation

Vous pouvez publier maintenant et vous inscrire plus tard. Si vous avez un compte, connectez-vous maintenant pour publier avec votre compte.
Remarque : votre message nécessitera l’approbation d’un modérateur avant de pouvoir être visible.

Invité
Répondre à ce sujet…

×   Collé en tant que texte enrichi.   Coller en tant que texte brut à la place

  Seulement 75 émoticônes maximum sont autorisées.

×   Votre lien a été automatiquement intégré.   Afficher plutôt comme un lien

×   Votre contenu précédent a été rétabli.   Vider l’éditeur

×   Vous ne pouvez pas directement coller des images. Envoyez-les depuis votre ordinateur ou insérez-les depuis une URL.

  • En ligne récemment   0 membre est en ligne

    • Aucun utilisateur enregistré regarde cette page.
×
×
  • Créer...