Aller au contenu
  • Pas encore inscrit ?

    Pourquoi ne pas vous inscrire ? C'est simple, rapide et gratuit.
    Pour en savoir plus, lisez Les avantages de l'inscription... et la Charte de Zébulon.
    De plus, les messages que vous postez en tant qu'invité restent invisibles tant qu'un modérateur ne les a pas validés. Inscrivez-vous, ce sera un gain de temps pour tout le monde, vous, les helpeurs et les modérateurs ! :wink:

Messages recommandés

Posté(e) (modifié)

Bonjour,

 

Je suis infecté par une multitude de spywares. auriez-vous l'amabilité de m'aider ?

Voici le log de HaijackThis:

 

Logfile of Trend Micro HijackThis v2.0.2

Scan saved at 07:52:56, on 08/11/2008

Platform: Windows Vista SP1 (WinNT 6.00.1905)

MSIE: Internet Explorer v7.00 (7.00.6001.18000)

Boot mode: Normal

 

Running processes:

E:\WINDOWS\SYSTEM32\taskeng.exe

E:\Windows\system32\Dwm.exe

E:\Program Files\Kaspersky Lab\Kaspersky Internet Security 2009\avp.exe

E:\Windows\System32\wpcumi.exe

E:\Program Files\Internet Download Manager\IDMan.exe

E:\Program Files\Internet Download Manager\IEMonitor.exe

E:\Windows\system32\wbem\unsecapp.exe

E:\Program Files\Windows Live\Messenger\msnmsgr.exe

E:\Program Files\Windows Live\Contacts\wlcomm.exe

E:\Windows\explorer.exe

E:\Program Files\uTorrent2\uTorrent.exe

E:\Program Files\Mozilla Firefox\firefox.exe

E:\Program Files\Trend Micro\HijackThis\Dolc3.exe

 

R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Bar = http://g.msn.fr/0SEFRFR/SAOS02

R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.google.fr/

R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157

R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = about:blank

R0 - HKLM\Software\Microsoft\Internet Explorer\Search,CustomizeSearch =

R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyServer = 222.35.73.92:80

R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyOverride = *.local

R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName =

O1 - Hosts: ::1 localhost

O1 - Hosts: 127.255.255.255 newsleecher.com

O1 - Hosts: 127.255.255.255 www.newsleecher.com

O1 - Hosts: 72.55.172.157 secure.newsleecher.com

O2 - BHO: IE7Pro - {00011268-E188-40DF-A514-835FCD78B1BF} - E:\Program Files\IEPro\iepro.dll

O2 - BHO: IDM Helper - {0055C089-8582-441B-A0BF-17B458C2A3A8} - E:\Program Files\Internet Download Manager\IDMIECC.dll

O2 - BHO: Adobe PDF Link Helper - {18DF081C-E8AD-4283-A596-FA578C2EBDC3} - E:\Program Files\Common Files\Adobe\Acrobat\ActiveX\AcroIEHelperShim.dll

O2 - BHO: IEVkbdBHO - {59273AB4-E7D3-40F9-A1A8-6FA9CCA1862C} - E:\Program Files\Kaspersky Lab\Kaspersky Internet Security 2009\ievkbd.dll

O2 - BHO: GetTubeVideoObj Class - {6679B3FC-711A-4583-B54A-897B3A0D40E9} - E:\Program Files\GetTubeVideo\GetTubeVideo.dll

O2 - BHO: Java Plug-In SSV Helper - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - E:\Program Files\Java\jre6\bin\ssv.dll

O2 - BHO: Programme d'aide de l'Assistant de connexion Windows Live - {9030D464-4C02-4ABF-8ECC-5164760863C6} - E:\Program Files\Common Files\Microsoft Shared\Windows Live\WindowsLiveLogin.dll

O2 - BHO: Google Toolbar Helper - {AA58ED58-01DD-4d91-8333-CF10577473F7} - e:\program files\google\googletoolbar2.dll

O2 - BHO: Adobe PDF Conversion Toolbar Helper - {AE7CD045-E861-484f-8273-0445EE161910} - E:\Program Files\Common Files\Adobe\Acrobat\ActiveX\AcroIEFavClient.dll

O2 - BHO: Google Toolbar Notifier BHO - {AF69DE43-7D58-4638-B6FA-CE66B5AD205D} - E:\Program Files\Google\GoogleToolbarNotifier\4.1.805.4472\swg.dll

O2 - BHO: Java Plug-In 2 SSV Helper - {DBC80044-A445-435b-BC74-9C25C1C588A9} - E:\Program Files\Java\jre6\bin\jp2ssv.dll

O2 - BHO: SmartSelect Class - {F4971EE7-DAA0-4053-9964-665D8EE6A077} - E:\Program Files\Common Files\Adobe\Acrobat\ActiveX\AcroIEFavClient.dll

O3 - Toolbar: &Google - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - e:\program files\google\googletoolbar2.dll

O3 - Toolbar: Adobe PDF - {47833539-D0C5-4125-9FA8-0819E2EAAC93} - E:\Program Files\Common Files\Adobe\Acrobat\ActiveX\AcroIEFavClient.dll

O3 - Toolbar: Veoh Browser Plug-in - {D0943516-5076-4020-A3B5-AEFAF26AB263} - E:\Program Files\Veoh Networks\Veoh\Plugins\reg\VeohToolbar.dll

O4 - HKLM\..\Run: [AVP] "E:\Program Files\Kaspersky Lab\Kaspersky Internet Security 2009\avp.exe"

O4 - HKLM\..\Run: [WPCUMI] E:\Windows\system32\WpcUmi.exe

O4 - HKCU\..\Run: [iDMan] E:\Program Files\Internet Download Manager\IDMan.exe /onboot

O4 - HKUS\S-1-5-19\..\Run: [sidebar] %ProgramFiles%\Windows Sidebar\Sidebar.exe /detectMem (User 'SERVICE LOCAL')

O4 - HKUS\S-1-5-19\..\Run: [WindowsWelcomeCenter] rundll32.exe oobefldr.dll,ShowWelcomeCenter (User 'SERVICE LOCAL')

O4 - HKUS\S-1-5-20\..\Run: [sidebar] %ProgramFiles%\Windows Sidebar\Sidebar.exe /detectMem (User 'SERVICE RÉSEAU')

O8 - Extra context menu item: Add to Google Photos Screensa&ver - res://E:\Windows\system32\GPhotos.scr/200

O8 - Extra context menu item: Ajouter la cible du lien à un fichier PDF existant - res://E:\Program Files\Common Files\Adobe\Acrobat\ActiveX\AcroIEFavClient.dll/AcroIEAppendSelLinks.html

O8 - Extra context menu item: Ajouter le contenu des liens sélectionnés à un fichier PDF existant - res://E:\Program Files\Nuance\PDF Professional 5\bin\ZeonIEFavClient.dll/ZeonIEAppendSelLinks.HTML

O8 - Extra context menu item: Ajouter le contenu du lien à un fichier PDF existant - res://E:\Program Files\Nuance\PDF Professional 5\bin\ZeonIEFavClient.dll/ZeonIEAppend.HTML

O8 - Extra context menu item: Ajouter à Kaspersky Anti-Bannière - E:\Program Files\Kaspersky Lab\Kaspersky Internet Security 2009\ie_banner_deny.htm

O8 - Extra context menu item: Ajouter à un fichier PDF existant - res://E:\Program Files\Common Files\Adobe\Acrobat\ActiveX\AcroIEFavClient.dll/AcroIEAppend.html

O8 - Extra context menu item: Convertir au format Adobe PDF - res://E:\Program Files\Common Files\Adobe\Acrobat\ActiveX\AcroIEFavClient.dll/AcroIECapture.html

O8 - Extra context menu item: Convertir la cible du lien au format Adobe PDF - res://E:\Program Files\Common Files\Adobe\Acrobat\ActiveX\AcroIEFavClient.dll/AcroIECaptureSelLinks.html

O8 - Extra context menu item: Convertir les liens sélectionnés en fichier Adobe PDF - res://E:\Program Files\Adobe\Acrobat 8.0\Acrobat\AcroIEFavClient.dll/AcroIECaptureSelLinks.html

O8 - Extra context menu item: Créer des fichiers PDF à partir des liens sélectionnés - res://E:\Program Files\Nuance\PDF Professional 5\bin\ZeonIEFavClient.dll/ZeonIECaptureSelLinks.HTML

O8 - Extra context menu item: Créer fichier PDF - res://E:\Program Files\Nuance\PDF Professional 5\bin\ZeonIEFavClient.dll/ZeonIECapture.HTML

O8 - Extra context menu item: Créer un fichier PDF depuis le contenu du lien - res://E:\Program Files\Nuance\PDF Professional 5\bin\ZeonIEFavClient.dll/ZeonIECapture.HTML

O8 - Extra context menu item: E&xporter vers Microsoft Excel - res://E:\PROGRA~1\MICROS~3\Office12\EXCEL.EXE/3000

O8 - Extra context menu item: Grab To Fototagger - E:\Program Files\FotoTagger\grab.htm

O8 - Extra context menu item: Ouvrir avec Nuance PDF Converter 5.0 - res://E:\Program Files\Nuance\PDF Professional 5\cnvres_fre.dll /100

O8 - Extra context menu item: Télécharger avec IDM - E:\Program Files\Internet Download Manager\IEExt.htm

O8 - Extra context menu item: Télécharger le contenu de video FLV avec IDM - E:\Program Files\Internet Download Manager\IEGetVL.htm

O8 - Extra context menu item: Télécharger tous les liens avec IDM - E:\Program Files\Internet Download Manager\IEGetAll.htm

O9 - Extra button: IE7Pro Grab and Drag - {000002a3-84fe-43f1-b958-f2c3ca804f1a} - E:\Program Files\IEPro\iepro.dll

O9 - Extra 'Tools' menuitem: IE7Pro Grab and Drag - {000002a3-84fe-43f1-b958-f2c3ca804f1a} - E:\Program Files\IEPro\iepro.dll

O9 - Extra button: IE7Pro Preferences - {0026439F-A980-4f18-8C95-4F1CBBF9C1D8} - E:\Program Files\IEPro\iepro.dll

O9 - Extra 'Tools' menuitem: IE7Pro Preferences - {0026439F-A980-4f18-8C95-4F1CBBF9C1D8} - E:\Program Files\IEPro\iepro.dll

O9 - Extra button: Statistiques de la protection du trafic Internet - {1F460357-8A94-4D71-9CA3-AA4ACF32ED8E} - E:\Program Files\Kaspersky Lab\Kaspersky Internet Security 2009\SCIEPlgn.dll

O9 - Extra button: Ajout Direct - {219C3416-8CB2-491a-A3C7-D9FCDDC9D600} - E:\Program Files\Windows Live\Writer\WriterBrowserExtension.dll

O9 - Extra 'Tools' menuitem: &Ajout Direct dans Windows Live Writer - {219C3416-8CB2-491a-A3C7-D9FCDDC9D600} - E:\Program Files\Windows Live\Writer\WriterBrowserExtension.dll

O9 - Extra button: PalTalk - {4EAFEF58-EEFA-4116-983D-03B49BCBFFFE} - E:\Program Files\Paltalk Messenger\Paltalk.exe

O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - E:\PROGRA~1\MICROS~3\Office12\REFIEBAR.DLL

O10 - Unknown file in Winsock LSP: e:\windows\system32\wpclsp.dll

O10 - Unknown file in Winsock LSP: e:\windows\system32\wpclsp.dll

O10 - Unknown file in Winsock LSP: e:\windows\system32\wpclsp.dll

O10 - Unknown file in Winsock LSP: e:\windows\system32\wpclsp.dll

O10 - Unknown file in Winsock LSP: e:\windows\system32\wpclsp.dll

O10 - Unknown file in Winsock LSP: e:\windows\system32\wpclsp.dll

O10 - Unknown file in Winsock LSP: e:\windows\system32\wpclsp.dll

O10 - Unknown file in Winsock LSP: e:\windows\system32\wpclsp.dll

O10 - Unknown file in Winsock LSP: e:\windows\system32\wpclsp.dll

O16 - DPF: {04CB5B64-5915-4629-B869-8945CEBADD21} - https://static.impots.gouv.fr/abos/static/s...te/certdgi1.cab

O16 - DPF: {30528230-99f7-4bb4-88d8-fa1d4f56a2ab} -

O16 - DPF: {474F00F5-3853-492C-AC3A-476512BBC336} - http://picasaweb.google.fr/s/v/39.22/uploader2.cab

O16 - DPF: {4871A87A-BFDD-4106-8153-FFDE2BAC2967} (DLM Control) - http://dlm.tools.akamai.com/dlmanager/vers...vex-2.2.4.1.cab

O16 - DPF: {B87A4DE2-57A3-41CA-8781-89D43EA6EEF4} - http://videomessages.live.com/portal/ClientBin/VCaptCtl.cab

O16 - DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} (Shockwave Flash Object) - http://fpdownload2.macromedia.com/get/shoc...ash/swflash.cab

O20 - AppInit_DLLs: E:\PROGRA~1\Kaspersky Lab\Kaspersky Internet Security 2009\mzvkbd.dll,E:\PROGRA~1\Kaspersky Lab\Kaspersky Internet Security 2009\mzvkbd3.dll,E:\PROGRA~1\Kaspersky Lab\Kaspersky Internet Security 2009\adialhk.dll,E:\PROGRA~1\Kaspersky Lab\Kaspersky Internet Security 2009\kloehk.dll

O22 - SharedTaskScheduler: Windows DreamScene - {E31004D1-A431-41B8-826F-E902F9D95C81} - E:\Windows\System32\DreamScene.dll

O22 - SharedTaskScheduler: Stardock Vista ControlPanel Extension - {EC654325-1273-C2A9-2B7C-45D29BCE68FD} - E:\PROGRA~1\Stardock\Object Desktop\DeskScapes\DesktopControlPanel.dll

O22 - SharedTaskScheduler: StardockDreamController - {EC654325-1273-C2A9-2B7C-45D29BCE68FF} - E:\PROGRA~1\Stardock\Object Desktop\DeskScapes\DreamControl.dll

O22 - SharedTaskScheduler: Deskscapes - {EC654325-1273-C2A9-2B7C-45D29BCE68FB} - E:\PROGRA~1\Stardock\Object Desktop\DeskScapes\deskscapes.dll

O23 - Service: Acronis Scheduler2 Service (AcrSch2Svc) - Acronis - E:\Program Files\Common Files\Acronis\Schedule2\schedul2.exe

O23 - Service: Andrea ADI Filters Service (AEADIFilters) - Andrea Electronics Corporation - E:\Windows\system32\AEADISRV.EXE

O23 - Service: Planificateur LiveUpdate automatique (Automatic LiveUpdate Scheduler) - Symantec Corporation - E:\Program Files\Symantec\LiveUpdate\AluSchedulerSvc.exe

O23 - Service: Kaspersky Internet Security (AVP) - Kaspersky Lab - E:\Program Files\Kaspersky Lab\Kaspersky Internet Security 2009\avp.exe

O23 - Service: CacheBoost Performance Optimizer and Tuner Service (CacheBoost Service) - Systweak Inc - E:\Program Files\Systweak\Systweak CacheBoost\cbsrv.exe

O23 - Service: PC Tools Disk Suite (DiskSuiteService) - PC Tools - E:\Program Files\PC Tools Disk Suite\DSService.exe

O23 - Service: FLEXnet Licensing Service - Macrovision Europe Ltd. - E:\Program Files\Common Files\Macrovision Shared\FLEXnet Publisher\FNPLicensingService.exe

O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - E:\Program Files\Common Files\InstallShield\Driver\1050\Intel 32\IDriverT.exe

O23 - Service: Service de l’iPod (iPod Service) - Apple Inc. - E:\Program Files\iPod\bin\iPodService.exe

O23 - Service: LiveUpdate - Symantec Corporation - E:\Program Files\Symantec\LiveUpdate\LuComServer_3_4.EXE

O23 - Service: Lock My PC Service (LmpcService) - Unknown owner - E:\Program Files\Lock My PC 4\LmpcServ.exe

O23 - Service: Macromedia Licensing Service - Unknown owner - E:\Program Files\Common Files\Macromedia Shared\Service\Macromedia Licensing.exe

O23 - Service: O&O Defrag - O&O Software GmbH - E:\Windows\system32\oodag.exe

O23 - Service: ProtexisLicensing - Unknown owner - E:\Windows\system32\PSIService.exe

O23 - Service: SoundMovieServer - SoundMovieServer - E:\Windows\system32\snmvtsvc.exe

O23 - Service: Acronis Try And Decide Service (TryAndDecideService) - Unknown owner - E:\Program Files\Common Files\Acronis\Fomatik\TrueImageTryStartService.exe

O23 - Service: Windows Live Setup Service (WLSetupSvc) - Unknown owner - E:\Program Files\Windows Live\installer\WLSetupSvc.exe (file missing)

 

--

End of file - 12937 bytes

Modifié par Av3n4s

Posté(e)

Bonjour,

 

Kaspersky Internet Security

Kaspersky®Antivirus

Symantec®Norton Internet Security

 

IL vous faut absolument choisir pour éviter les conflits.

Comment désinstaller tous les produits Norton ?

 

Norton_Removal_Tool.

 

Cela fait:

 

Téléchargezrandom's system information tool (RSIT) par random/random et sauvegardez-le sur le Bureau.

 

Double-cliquez sur RSIT.exe afin de lancer RSIT.

* Cliquez Continue à l'écran Disclaimer.

* Si l'outil HIjackThis (version à jour) n'est pas présent ou détecté sur l'ordinateur, RSIT le télécharge et vous acceptez la licence.

* L'analyse terminée, deux fichiers texte s'ouvriront.:

Poster le contenu de log.txt (qui sera affiché)

ainsi que de info.txt (qui sera réduit dans la Barre des Tâches).

* Si ces deux rapports n'apparaissent pas, vous les trouverez dans le dossier C:\rsit

Posté(e)

Bonjour,

 

Merci pour ton aide.

Au lancement de l'outil, un message d'erreur apparaît après 2, 3 secondes.

Le voilà :

 

Line-1

Error Subscript used with non-Away variable.

 

Il n'y a eu aucun téléchargement de HijackThis. Au milieu du scan, le message apparaît et quand je clique sur "Ok" l'analyse s'arrête.

 

Fichier log :

 

Logfile of random's system information tool 1.04 (written by random/random)

Run by Dolc3 at 2008-11-08 15:18:23

Microsoft® Windows Vista Édition Intégrale Service Pack 1

System drive E: has 21 GB (15%) free of 139 GB

Total RAM: 2046 MB (54% free)

 

Logfile of Trend Micro HijackThis v2.0.2

Scan saved at 15:18:26, on 08/11/2008

Platform: Windows Vista SP1 (WinNT 6.00.1905)

MSIE: Internet Explorer v7.00 (7.00.6001.18000)

Boot mode: Normal

 

Running processes:

E:\WINDOWS\SYSTEM32\taskeng.exe

E:\Windows\system32\Dwm.exe

E:\Windows\Explorer.EXE

E:\Program Files\ASUS\AASP\1.00.33\aaCenter.exe

E:\Windows\System32\wpcumi.exe

E:\Program Files\HP\HP Software Update\hpwuSchd2.exe

E:\Program Files\Internet Download Manager\IDMan.exe

E:\Windows\system32\wbem\unsecapp.exe

E:\Program Files\Windows Live\Messenger\msnmsgr.exe

E:\Program Files\Windows Live\Contacts\wlcomm.exe

E:\Program Files\HP\Digital Imaging\bin\hpqSTE08.exe

E:\Program Files\Internet Download Manager\IEMonitor.exe

E:\Windows\system32\conime.exe

E:\Program Files\Mozilla Firefox\firefox.exe

E:\Users\Dolc3\Desktop\RSIT.exe

E:\Program Files\Trend Micro\HijackThis\Dolc3.exe

 

R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Bar = http://g.msn.fr/0SEFRFR/SAOS02

R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.google.fr/

R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157

R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = about:blank

R0 - HKLM\Software\Microsoft\Internet Explorer\Search,CustomizeSearch =

R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyServer = 222.35.73.92:80

R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyOverride = *.local

R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName =

O1 - Hosts: ::1 localhost

O1 - Hosts: 127.255.255.255 newsleecher.com

O1 - Hosts: 127.255.255.255 www.newsleecher.com

O1 - Hosts: 72.55.172.157 secure.newsleecher.com

O2 - BHO: IE7Pro - {00011268-E188-40DF-A514-835FCD78B1BF} - E:\Program Files\IEPro\iepro.dll

O2 - BHO: IDM Helper - {0055C089-8582-441B-A0BF-17B458C2A3A8} - E:\Program Files\Internet Download Manager\IDMIECC.dll

O2 - BHO: Adobe PDF Link Helper - {18DF081C-E8AD-4283-A596-FA578C2EBDC3} - E:\Program Files\Common Files\Adobe\Acrobat\ActiveX\AcroIEHelperShim.dll

O2 - BHO: IEVkbdBHO - {59273AB4-E7D3-40F9-A1A8-6FA9CCA1862C} - E:\Program Files\Kaspersky Lab\Kaspersky Internet Security 2009\ievkbd.dll

O2 - BHO: GetTubeVideoObj Class - {6679B3FC-711A-4583-B54A-897B3A0D40E9} - E:\Program Files\GetTubeVideo\GetTubeVideo.dll

O2 - BHO: Java Plug-In SSV Helper - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - E:\Program Files\Java\jre6\bin\ssv.dll

O2 - BHO: Programme d'aide de l'Assistant de connexion Windows Live - {9030D464-4C02-4ABF-8ECC-5164760863C6} - E:\Program Files\Common Files\Microsoft Shared\Windows Live\WindowsLiveLogin.dll

O2 - BHO: Google Toolbar Helper - {AA58ED58-01DD-4d91-8333-CF10577473F7} - e:\program files\google\googletoolbar2.dll

O2 - BHO: Adobe PDF Conversion Toolbar Helper - {AE7CD045-E861-484f-8273-0445EE161910} - E:\Program Files\Common Files\Adobe\Acrobat\ActiveX\AcroIEFavClient.dll

O2 - BHO: Google Toolbar Notifier BHO - {AF69DE43-7D58-4638-B6FA-CE66B5AD205D} - E:\Program Files\Google\GoogleToolbarNotifier\4.1.805.4472\swg.dll

O2 - BHO: Java Plug-In 2 SSV Helper - {DBC80044-A445-435b-BC74-9C25C1C588A9} - E:\Program Files\Java\jre6\bin\jp2ssv.dll

O2 - BHO: SmartSelect Class - {F4971EE7-DAA0-4053-9964-665D8EE6A077} - E:\Program Files\Common Files\Adobe\Acrobat\ActiveX\AcroIEFavClient.dll

O3 - Toolbar: &Google - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - e:\program files\google\googletoolbar2.dll

O3 - Toolbar: Adobe PDF - {47833539-D0C5-4125-9FA8-0819E2EAAC93} - E:\Program Files\Common Files\Adobe\Acrobat\ActiveX\AcroIEFavClient.dll

O3 - Toolbar: Veoh Browser Plug-in - {D0943516-5076-4020-A3B5-AEFAF26AB263} - E:\Program Files\Veoh Networks\Veoh\Plugins\reg\VeohToolbar.dll

O4 - HKLM\..\Run: [AVP] "E:\Program Files\Kaspersky Lab\Kaspersky Internet Security 2009\avp.exe"

O4 - HKLM\..\Run: [WPCUMI] E:\Windows\system32\WpcUmi.exe

O4 - HKLM\..\Run: [HP Software Update] E:\Program Files\HP\HP Software Update\HPWuSchd2.exe

O4 - HKCU\..\Run: [iDMan] E:\Program Files\Internet Download Manager\IDMan.exe /onboot

O4 - HKUS\S-1-5-19\..\Run: [sidebar] %ProgramFiles%\Windows Sidebar\Sidebar.exe /detectMem (User 'SERVICE LOCAL')

O4 - HKUS\S-1-5-19\..\Run: [WindowsWelcomeCenter] rundll32.exe oobefldr.dll,ShowWelcomeCenter (User 'SERVICE LOCAL')

O4 - HKUS\S-1-5-20\..\Run: [sidebar] %ProgramFiles%\Windows Sidebar\Sidebar.exe /detectMem (User 'SERVICE RÉSEAU')

O4 - Global Startup: HP Digital Imaging Monitor.lnk = E:\Program Files\HP\Digital Imaging\bin\hpqtra08.exe

O8 - Extra context menu item: Add to Google Photos Screensa&ver - res://E:\Windows\system32\GPhotos.scr/200

O8 - Extra context menu item: Ajouter la cible du lien à un fichier PDF existant - res://E:\Program Files\Common Files\Adobe\Acrobat\ActiveX\AcroIEFavClient.dll/AcroIEAppendSelLinks.html

O8 - Extra context menu item: Ajouter le contenu des liens sélectionnés à un fichier PDF existant - res://E:\Program Files\Nuance\PDF Professional 5\bin\ZeonIEFavClient.dll/ZeonIEAppendSelLinks.HTML

O8 - Extra context menu item: Ajouter le contenu du lien à un fichier PDF existant - res://E:\Program Files\Nuance\PDF Professional 5\bin\ZeonIEFavClient.dll/ZeonIEAppend.HTML

O8 - Extra context menu item: Ajouter à un fichier PDF existant - res://E:\Program Files\Common Files\Adobe\Acrobat\ActiveX\AcroIEFavClient.dll/AcroIEAppend.html

O8 - Extra context menu item: Convertir au format Adobe PDF - res://E:\Program Files\Common Files\Adobe\Acrobat\ActiveX\AcroIEFavClient.dll/AcroIECapture.html

O8 - Extra context menu item: Convertir la cible du lien au format Adobe PDF - res://E:\Program Files\Common Files\Adobe\Acrobat\ActiveX\AcroIEFavClient.dll/AcroIECaptureSelLinks.html

O8 - Extra context menu item: Convertir les liens sélectionnés en fichier Adobe PDF - res://E:\Program Files\Adobe\Acrobat 8.0\Acrobat\AcroIEFavClient.dll/AcroIECaptureSelLinks.html

O8 - Extra context menu item: Créer des fichiers PDF à partir des liens sélectionnés - res://E:\Program Files\Nuance\PDF Professional 5\bin\ZeonIEFavClient.dll/ZeonIECaptureSelLinks.HTML

O8 - Extra context menu item: Créer fichier PDF - res://E:\Program Files\Nuance\PDF Professional 5\bin\ZeonIEFavClient.dll/ZeonIECapture.HTML

O8 - Extra context menu item: Créer un fichier PDF depuis le contenu du lien - res://E:\Program Files\Nuance\PDF Professional 5\bin\ZeonIEFavClient.dll/ZeonIECapture.HTML

O8 - Extra context menu item: E&xporter vers Microsoft Excel - res://E:\PROGRA~1\MICROS~3\Office12\EXCEL.EXE/3000

O8 - Extra context menu item: Grab To Fototagger - E:\Program Files\FotoTagger\grab.htm

O8 - Extra context menu item: Ouvrir avec Nuance PDF Converter 5.0 - res://E:\Program Files\Nuance\PDF Professional 5\cnvres_fre.dll /100

O8 - Extra context menu item: Télécharger avec IDM - E:\Program Files\Internet Download Manager\IEExt.htm

O8 - Extra context menu item: Télécharger le contenu de video FLV avec IDM - E:\Program Files\Internet Download Manager\IEGetVL.htm

O8 - Extra context menu item: Télécharger tous les liens avec IDM - E:\Program Files\Internet Download Manager\IEGetAll.htm

O9 - Extra button: IE7Pro Grab and Drag - {000002a3-84fe-43f1-b958-f2c3ca804f1a} - E:\Program Files\IEPro\iepro.dll

O9 - Extra 'Tools' menuitem: IE7Pro Grab and Drag - {000002a3-84fe-43f1-b958-f2c3ca804f1a} - E:\Program Files\IEPro\iepro.dll

O9 - Extra button: IE7Pro Preferences - {0026439F-A980-4f18-8C95-4F1CBBF9C1D8} - E:\Program Files\IEPro\iepro.dll

O9 - Extra 'Tools' menuitem: IE7Pro Preferences - {0026439F-A980-4f18-8C95-4F1CBBF9C1D8} - E:\Program Files\IEPro\iepro.dll

O9 - Extra button: Statistiques de la protection du trafic Internet - {1F460357-8A94-4D71-9CA3-AA4ACF32ED8E} - E:\Program Files\Kaspersky Lab\Kaspersky Internet Security 2009\SCIEPlgn.dll

O9 - Extra button: Ajout Direct - {219C3416-8CB2-491a-A3C7-D9FCDDC9D600} - E:\Program Files\Windows Live\Writer\WriterBrowserExtension.dll

O9 - Extra 'Tools' menuitem: &Ajout Direct dans Windows Live Writer - {219C3416-8CB2-491a-A3C7-D9FCDDC9D600} - E:\Program Files\Windows Live\Writer\WriterBrowserExtension.dll

O9 - Extra button: (no name) - {2D663D1A-8670-49D9-A1A5-4C56B4E14E84} - (no file)

O9 - Extra button: PalTalk - {4EAFEF58-EEFA-4116-983D-03B49BCBFFFE} - E:\Program Files\Paltalk Messenger\Paltalk.exe

O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - E:\PROGRA~1\MICROS~3\Office12\REFIEBAR.DLL

O10 - Unknown file in Winsock LSP: e:\windows\system32\wpclsp.dll

O10 - Unknown file in Winsock LSP: e:\windows\system32\wpclsp.dll

O10 - Unknown file in Winsock LSP: e:\windows\system32\wpclsp.dll

O10 - Unknown file in Winsock LSP: e:\windows\system32\wpclsp.dll

O10 - Unknown file in Winsock LSP: e:\windows\system32\wpclsp.dll

O10 - Unknown file in Winsock LSP: e:\windows\system32\wpclsp.dll

O10 - Unknown file in Winsock LSP: e:\windows\system32\wpclsp.dll

O10 - Unknown file in Winsock LSP: e:\windows\system32\wpclsp.dll

O10 - Unknown file in Winsock LSP: e:\windows\system32\wpclsp.dll

O16 - DPF: {04CB5B64-5915-4629-B869-8945CEBADD21} - https://static.impots.gouv.fr/abos/static/s...te/certdgi1.cab

O16 - DPF: {30528230-99f7-4bb4-88d8-fa1d4f56a2ab} -

O16 - DPF: {474F00F5-3853-492C-AC3A-476512BBC336} - http://picasaweb.google.fr/s/v/39.22/uploader2.cab

O16 - DPF: {4871A87A-BFDD-4106-8153-FFDE2BAC2967} (DLM Control) - http://dlm.tools.akamai.com/dlmanager/vers...vex-2.2.4.1.cab

O16 - DPF: {B87A4DE2-57A3-41CA-8781-89D43EA6EEF4} - http://videomessages.live.com/portal/ClientBin/VCaptCtl.cab

O16 - DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} (Shockwave Flash Object) - http://fpdownload2.macromedia.com/get/shoc...ash/swflash.cab

O20 - AppInit_DLLs: E:\PROGRA~1\Kaspersky Lab\Kaspersky Internet Security 2009\mzvkbd.dll,E:\PROGRA~1\Kaspersky Lab\Kaspersky Internet Security 2009\mzvkbd3.dll,E:\PROGRA~1\Kaspersky Lab\Kaspersky Internet Security 2009\adialhk.dll,E:\PROGRA~1\Kaspersky Lab\Kaspersky Internet Security 2009\kloehk.dll

O22 - SharedTaskScheduler: Windows DreamScene - {E31004D1-A431-41B8-826F-E902F9D95C81} - E:\Windows\System32\DreamScene.dll

O22 - SharedTaskScheduler: Stardock Vista ControlPanel Extension - {EC654325-1273-C2A9-2B7C-45D29BCE68FD} - E:\PROGRA~1\Stardock\Object Desktop\DeskScapes\DesktopControlPanel.dll

O22 - SharedTaskScheduler: StardockDreamController - {EC654325-1273-C2A9-2B7C-45D29BCE68FF} - E:\PROGRA~1\Stardock\Object Desktop\DeskScapes\DreamControl.dll

O22 - SharedTaskScheduler: Deskscapes - {EC654325-1273-C2A9-2B7C-45D29BCE68FB} - E:\PROGRA~1\Stardock\Object Desktop\DeskScapes\deskscapes.dll

O23 - Service: Acronis Scheduler2 Service (AcrSch2Svc) - Acronis - E:\Program Files\Common Files\Acronis\Schedule2\schedul2.exe

O23 - Service: Andrea ADI Filters Service (AEADIFilters) - Andrea Electronics Corporation - E:\Windows\system32\AEADISRV.EXE

O23 - Service: Planificateur LiveUpdate automatique (Automatic LiveUpdate Scheduler) - Symantec Corporation - E:\Program Files\Symantec\LiveUpdate\AluSchedulerSvc.exe

O23 - Service: AVG Anti-Spyware Guard - GRISOFT s.r.o. - E:\Program Files\Grisoft\AVG Anti-Spyware 7.5\guard.exe

O23 - Service: Kaspersky Internet Security (AVP) - Kaspersky Lab - E:\Program Files\Kaspersky Lab\Kaspersky Internet Security 2009\avp.exe

O23 - Service: CacheBoost Performance Optimizer and Tuner Service (CacheBoost Service) - Systweak Inc - E:\Program Files\Systweak\Systweak CacheBoost\cbsrv.exe

O23 - Service: PC Tools Disk Suite (DiskSuiteService) - PC Tools - E:\Program Files\PC Tools Disk Suite\DSService.exe

O23 - Service: FLEXnet Licensing Service - Macrovision Europe Ltd. - E:\Program Files\Common Files\Macrovision Shared\FLEXnet Publisher\FNPLicensingService.exe

O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - E:\Program Files\Common Files\InstallShield\Driver\1050\Intel 32\IDriverT.exe

O23 - Service: Service de l’iPod (iPod Service) - Apple Inc. - E:\Program Files\iPod\bin\iPodService.exe

O23 - Service: LiveUpdate - Symantec Corporation - E:\Program Files\Symantec\LiveUpdate\LuComServer_3_4.EXE

O23 - Service: Lock My PC Service (LmpcService) - Unknown owner - E:\Program Files\Lock My PC 4\LmpcServ.exe

O23 - Service: Macromedia Licensing Service - Unknown owner - E:\Program Files\Common Files\Macromedia Shared\Service\Macromedia Licensing.exe

O23 - Service: O&O Defrag - O&O Software GmbH - E:\Windows\system32\oodag.exe

O23 - Service: ProtexisLicensing - Unknown owner - E:\Windows\system32\PSIService.exe

O23 - Service: SoundMovieServer - SoundMovieServer - E:\Windows\system32\snmvtsvc.exe

O23 - Service: Acronis Try And Decide Service (TryAndDecideService) - Unknown owner - E:\Program Files\Common Files\Acronis\Fomatik\TrueImageTryStartService.exe

O23 - Service: Windows Live Setup Service (WLSetupSvc) - Unknown owner - E:\Program Files\Windows Live\installer\WLSetupSvc.exe (file missing)

 

--

End of file - 13052 bytes

 

======Scheduled tasks folder======

 

E:\Windows\tasks\Advanced WindowsCare V2 Pro.job

E:\Windows\tasks\AwcProUpdate.job

E:\Windows\tasks\GlaryInitialize.job

E:\Windows\tasks\Uniblue SpyEraser.job

E:\Windows\tasks\User_Feed_Synchronization-{5433C9E9-8F4D-40F9-993C-F444CEDD7DFD}.job

 

======Registry dump======

 

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{00011268-E188-40DF-A514-835FCD78B1BF}]

IE7Pro BHO - E:\Program Files\IEPro\iepro.dll [2008-09-24 756840]

 

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{0055C089-8582-441B-A0BF-17B458C2A3A8}]

IDMIEHlprObj Class - E:\Program Files\Internet Download Manager\IDMIECC.dll [2008-10-28 153008]

 

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{18DF081C-E8AD-4283-A596-FA578C2EBDC3}]

Adobe PDF Link Helper - E:\Program Files\Common Files\Adobe\Acrobat\ActiveX\AcroIEHelperShim.dll [2008-06-11 75128]

 

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{59273AB4-E7D3-40F9-A1A8-6FA9CCA1862C}]

IEVkbdBHO Class - E:\Program Files\Kaspersky Lab\Kaspersky Internet Security 2009\ievkbd.dll [2008-07-29 62728]

 

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{6679B3FC-711A-4583-B54A-897B3A0D40E9}]

GetTubeVideoObj Class - E:\Program Files\GetTubeVideo\GetTubeVideo.dll [2008-08-11 98304]

 

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{761497BB-D6F0-462C-B6EB-D4DAF1D92D43}]

Java Plug-In SSV Helper - E:\Program Files\Java\jre6\bin\ssv.dll [2008-11-02 320920]

 

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{9030D464-4C02-4ABF-8ECC-5164760863C6}]

Programme d'aide de l'Assistant de connexion Windows Live - E:\Program Files\Common Files\Microsoft Shared\Windows Live\WindowsLiveLogin.dll [2008-02-22 401968]

 

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{AA58ED58-01DD-4d91-8333-CF10577473F7}]

Google Toolbar Helper - e:\program files\google\googletoolbar2.dll [2008-07-10 2582136]

 

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{AE7CD045-E861-484f-8273-0445EE161910}]

Adobe PDF Conversion Toolbar Helper - E:\Program Files\Common Files\Adobe\Acrobat\ActiveX\AcroIEFavClient.dll [2008-06-11 345480]

 

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{AF69DE43-7D58-4638-B6FA-CE66B5AD205D}]

Google Toolbar Notifier BHO - E:\Program Files\Google\GoogleToolbarNotifier\4.1.805.4472\swg.dll [2008-10-18 652784]

 

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{DBC80044-A445-435b-BC74-9C25C1C588A9}]

Java Plug-In 2 SSV Helper - E:\Program Files\Java\jre6\bin\jp2ssv.dll [2008-11-02 34816]

 

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{F4971EE7-DAA0-4053-9964-665D8EE6A077}]

SmartSelect Class - E:\Program Files\Common Files\Adobe\Acrobat\ActiveX\AcroIEFavClient.dll [2008-06-11 345480]

 

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Toolbar]

 

{2318C2B1-4965-11d4-9B18-009027A5CD4F} - &Google - e:\program files\google\googletoolbar2.dll [2008-07-10 2582136]

{47833539-D0C5-4125-9FA8-0819E2EAAC93} - Adobe PDF - E:\Program Files\Common Files\Adobe\Acrobat\ActiveX\AcroIEFavClient.dll [2008-06-11 345480]

{D0943516-5076-4020-A3B5-AEFAF26AB263} - Veoh Browser Plug-in - E:\Program Files\Veoh Networks\Veoh\Plugins\reg\VeohToolbar.dll [2008-09-26 352256]

 

[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run]

"AVP"=E:\Program Files\Kaspersky Lab\Kaspersky Internet Security 2009\avp.exe [2008-07-29 206088]

"WPCUMI"=E:\Windows\system32\WpcUmi.exe [2006-11-02 176128]

"HP Software Update"=E:\Program Files\HP\HP Software Update\HPWuSchd2.exe [2006-12-10 49152]

 

[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run]

""= []

"IDMan"=E:\Program Files\Internet Download Manager\IDMan.exe [2008-11-02 2606512]

 

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\888888888888888888888888888888888888888888888888888888888888888888888888888

888888888888888888888888888888888888888888888888888888888888888888888888888888888

888888888888888888888888888888888888888888888888888888888888888888888888888888888

SOFTWARE]

[]

 

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Malwarebytes' Anti-Malware]

E:\Program Files\Malwarebytes' Anti-Malware\mbamgui.exe [2008-10-22 399504]

 

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\RegistryMechanic]

E:\Program Files\Registry Mechanic\rmtray.exe [2008-07-03 812952]

 

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\SBAMTray]

E:\Program Files\Sunbelt Software\CounterSpy\SBAMTray.exe [2008-10-28 681256]

 

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\SunJavaUpdateSched]

E:\Program Files\Java\jre6\bin\jusched.exe [2008-11-02 136600]

 

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupfolder\E:^Users^Dolc3^AppData^Roaming^Microsoft^Windows^Start Menu^Programs^Startup^Moo0 ConnectionWatcher 1.30.lnk]

E:\PROGRA~1\Moo0\ConnectionWatcher 1.30\ConnectionWatcher.exe [2008-10-31 1503232]

 

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupfolder\E:^Users^Dolc3^AppData^Roaming^Microsoft^Windows^Start Menu^Programs^Startup^Secunia NSI.lnk]

[]

 

E:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup

HP Digital Imaging Monitor.lnk - E:\Program Files\HP\Digital Imaging\bin\hpqtra08.exe

 

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows]

"AppInit_DLLS"="E:\PROGRA~1\Kaspersky Lab\Kaspersky Internet Security 2009\mzvkbd.dll,E:\PROGRA~1\Kaspersky Lab\Kaspersky Internet Security 2009\mzvkbd3.dll,E:\PROGRA~1\Kaspersky Lab\Kaspersky Internet Security 2009\adialhk.dll,E:\PROGRA~1\Kaspersky Lab\Kaspersky Internet Security 2009\kloehk.dll"

 

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\klogon]

E:\Windows\system32\klogon.dll [2008-07-29 218376]

 

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\explorer\SharedTaskScheduler]

Windows DreamScene - {E31004D1-A431-41B8-826F-E902F9D95C81} - E:\Windows\System32\DreamScene.dll [2007-07-20 233888]

Stardock Vista ControlPanel Extension - {EC654325-1273-C2A9-2B7C-45D29BCE68FD} - E:\PROGRA~1\Stardock\Object Desktop\DeskScapes\DesktopControlPanel.dll [2007-08-21 87488]

StardockDreamController - {EC654325-1273-C2A9-2B7C-45D29BCE68FF} - E:\PROGRA~1\Stardock\Object Desktop\DeskScapes\DreamControl.dll [2007-08-21 492992]

Deskscapes - {EC654325-1273-C2A9-2B7C-45D29BCE68FB} - E:\PROGRA~1\Stardock\Object Desktop\DeskScapes\deskscapes.dll [2007-09-05 103848]

 

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\ShellExecuteHooks]

"{57B86673-276A-48B2-BAE7-C6DBB3020EB8}"=E:\Program Files\Grisoft\AVG Anti-Spywar

 

Je suis désolé mais le log n'est pas complet, apparemment, il y a un problème.

Posté(e)

Bonjour,

 

Kaspersky et Symantec sont toujours là.

je vous avais demandé de choisir et suggéré la suppression de Symantec.

 

Qu'est ce qui vous fait croire à des spywares?

On n'en voit pas trace.

Apollo et Bruce lee vous ont nettoyé votre machine.

 

Puisque vous avez Mbam, vous devriez le mettre à jour, et faire un scan, si cela devait vous rassurrer.

Posté(e)

Comme AntiVirus, j'ai Kaspersky Internet Security. J'ai utilisé le programme que vous avez noté mais apparemment, il a quand même laissé une trace. Avant l'utilisation de l'utilitaire, j'avais 2 lignes avec Symantec.

Hier soir, j'ai lancé un scan rapide avec MBAM et il y avait 92 clés, fichiers infectés. Après un nettoyage, j'ai relancé un scan et il y était encore.

Je vais en lancer un maintenant et je posterai le log.

Posté(e)

Voici le scan d'hier :

 

Malwarebytes' Anti-Malware 1.30

Version de la base de données: 1371

Windows 6.0.6001 Service Pack 1

 

07/11/2008 11:55:57

mbam-log-2008-11-07 (11-55-57).txt

 

Type de recherche: Examen rapide

Eléments examinés: 59393

Temps écoulé: 3 minute(s), 10 second(s)

 

Processus mémoire infecté(s): 0

Module(s) mémoire infecté(s): 0

Clé(s) du Registre infectée(s): 0

Valeur(s) du Registre infectée(s): 0

Elément(s) de données du Registre infecté(s): 0

Dossier(s) infecté(s): 0

Fichier(s) infecté(s): 92

 

Processus mémoire infecté(s):

(Aucun élément nuisible détecté)

 

Module(s) mémoire infecté(s):

(Aucun élément nuisible détecté)

 

Clé(s) du Registre infectée(s):

(Aucun élément nuisible détecté)

 

Valeur(s) du Registre infectée(s):

(Aucun élément nuisible détecté)

 

Elément(s) de données du Registre infecté(s):

(Aucun élément nuisible détecté)

 

Dossier(s) infecté(s):

(Aucun élément nuisible détecté)

 

Fichier(s) infecté(s):

E:\Users\TEMP.PC-de-Dolc3\Local Settings\Application Data\Microsoft\Windows\pguard.ini (Rogue.InternetAntivirus) -> Delete on reboot.

E:\Users\TEMP\Local Settings\Application Data\Microsoft\Windows\pguard.ini (Rogue.InternetAntivirus) -> Delete on reboot.

E:\Users\TEMP.PC-de-Dolc3\Local Settings\Application Data\Microsoft\Windows\pg32.exe (Rogue.InternetAntivirus) -> Delete on reboot.

E:\Users\TEMP\Local Settings\Application Data\Microsoft\Windows\pg32.exe (Rogue.InternetAntivirus) -> Delete on reboot.

E:\Users\TEMP.PC-de-Dolc3\Local Settings\Application Data\anesuzenyp.bin (Fake.Dropped.Malware) -> Delete on reboot.

E:\Users\TEMP\Local Settings\Application Data\anesuzenyp.bin (Fake.Dropped.Malware) -> Delete on reboot.

E:\Users\TEMP.PC-de-Dolc3\Local Settings\Application Data\igyzih._sy (Fake.Dropped.Malware) -> Delete on reboot.

E:\Users\TEMP\Local Settings\Application Data\igyzih._sy (Fake.Dropped.Malware) -> Delete on reboot.

E:\Users\TEMP.PC-de-Dolc3\Local Settings\Application Data\naciveg.reg (Fake.Dropped.Malware) -> Delete on reboot.

E:\Users\TEMP\Local Settings\Application Data\naciveg.reg (Fake.Dropped.Malware) -> Delete on reboot.

E:\Users\TEMP.PC-de-Dolc3\Local Settings\Application Data\ubuqicuho.bin (Fake.Dropped.Malware) -> Delete on reboot.

E:\Users\TEMP\Local Settings\Application Data\ubuqicuho.bin (Fake.Dropped.Malware) -> Delete on reboot.

E:\Users\TEMP.PC-de-Dolc3\Local Settings\Application Data\zokawi.lib (Fake.Dropped.Malware) -> Delete on reboot.

E:\Users\TEMP\Local Settings\Application Data\zokawi.lib (Fake.Dropped.Malware) -> Delete on reboot.

E:\Users\TEMP.PC-de-Dolc3\Local Settings\Application Data\Microsoft\Internet Explorer\iv.exe (Trojan.Agent) -> Delete on reboot.

E:\Users\TEMP\Local Settings\Application Data\Microsoft\Internet Explorer\iv.exe (Trojan.Agent) -> Delete on reboot.

E:\Users\TEMP.PC-de-Dolc3\Local Settings\Application Data\Microsoft\Internet Explorer\procgdsj32.exe (Trojan.Agent) -> Delete on reboot.

E:\Users\TEMP\Local Settings\Application Data\Microsoft\Internet Explorer\procgdsj32.exe (Trojan.Agent) -> Delete on reboot.

E:\Users\TEMP.PC-de-Dolc3\Local Settings\Application Data\Microsoft\sessmgr.exe (Trojan.Agent) -> Delete on reboot.

E:\Users\TEMP\Local Settings\Application Data\Microsoft\sessmgr.exe (Trojan.Agent) -> Delete on reboot.

E:\Users\TEMP.PC-de-Dolc3\Local Settings\Application Data\Microsoft\spoolsv.exe (Trojan.Agent) -> Delete on reboot.

E:\Users\TEMP\Local Settings\Application Data\Microsoft\spoolsv.exe (Trojan.Agent) -> Delete on reboot.

E:\Users\TEMP.PC-de-Dolc3\Cookies\MM2048.DAT (Trojan.Agent) -> Delete on reboot.

E:\Users\TEMP\Cookies\MM2048.DAT (Trojan.Agent) -> Delete on reboot.

E:\Users\TEMP.PC-de-Dolc3\Cookies\MM256.DAT (Trojan.Agent) -> Delete on reboot.

E:\Users\TEMP\Cookies\MM256.DAT (Trojan.Agent) -> Delete on reboot.

E:\Users\TEMP.PC-de-Dolc3\Local Settings\alg.exe (Trojan.Agent) -> Delete on reboot.

E:\Users\TEMP\Local Settings\alg.exe (Trojan.Agent) -> Delete on reboot.

E:\Users\TEMP.PC-de-Dolc3\Local Settings\Application Data\Microsoft\Windows\sav.exe (Fake.Dropped.Malware) -> Delete on reboot.

E:\Users\TEMP\Local Settings\Application Data\Microsoft\Windows\sav.exe (Fake.Dropped.Malware) -> Delete on reboot.

E:\Users\TEMP.PC-de-Dolc3\Local Settings\Apps\2.0\srw94.exe (Fake.Dropped.Malware) -> Delete on reboot.

E:\Users\TEMP\Local Settings\Apps\2.0\srw94.exe (Fake.Dropped.Malware) -> Delete on reboot.

E:\Users\TEMP.PC-de-Dolc3\Cookies\bumo.reg (Fake.Dropped.Malware) -> Delete on reboot.

E:\Users\TEMP\Cookies\bumo.reg (Fake.Dropped.Malware) -> Delete on reboot.

E:\Users\TEMP.PC-de-Dolc3\Cookies\jababug.inf (Fake.Dropped.Malware) -> Delete on reboot.

E:\Users\TEMP\Cookies\jababug.inf (Fake.Dropped.Malware) -> Delete on reboot.

E:\Users\TEMP.PC-de-Dolc3\Local Settings\Application Data\ycuc.lib (Fake.Dropped.Malware) -> Delete on reboot.

E:\Users\TEMP\Local Settings\Application Data\ycuc.lib (Fake.Dropped.Malware) -> Delete on reboot.

E:\Users\TEMP.PC-de-Dolc3\Local Settings\Application Data\bokefa.bat (Fake.Dropped.Malware) -> Delete on reboot.

E:\Users\TEMP\Local Settings\Application Data\bokefa.bat (Fake.Dropped.Malware) -> Delete on reboot.

E:\Users\TEMP.PC-de-Dolc3\Local Settings\Application Data\sytetuf.sys (Fake.Dropped.Malware) -> Delete on reboot.

E:\Users\TEMP\Local Settings\Application Data\sytetuf.sys (Fake.Dropped.Malware) -> Delete on reboot.

E:\Users\TEMP.PC-de-Dolc3\Local Settings\Application Data\vege.ban (Fake.Dropped.Malware) -> Delete on reboot.

E:\Users\TEMP\Local Settings\Application Data\vege.ban (Fake.Dropped.Malware) -> Delete on reboot.

E:\Users\TEMP.PC-de-Dolc3\Local Settings\Application Data\xyzunore.dl (Fake.Dropped.Malware) -> Delete on reboot.

E:\Users\TEMP\Local Settings\Application Data\xyzunore.dl (Fake.Dropped.Malware) -> Delete on reboot.

E:\Users\TEMP.PC-de-Dolc3\Local Settings\Application Data\zyfotydyjo.exe (Fake.Dropped.Malware) -> Delete on reboot.

E:\Users\TEMP\Local Settings\Application Data\zyfotydyjo.exe (Fake.Dropped.Malware) -> Delete on reboot.

E:\Users\TEMP.PC-de-Dolc3\Local Settings\Temporary Internet Files\etokosyb.scr (Fake.Dropped.Malware) -> Delete on reboot.

E:\Users\TEMP\Local Settings\Temporary Internet Files\etokosyb.scr (Fake.Dropped.Malware) -> Delete on reboot.

E:\Users\TEMP.PC-de-Dolc3\Local Settings\Application Data\sec3.exe (Trojan.Agent) -> Delete on reboot.

E:\Users\TEMP\Local Settings\Application Data\sec3.exe (Trojan.Agent) -> Delete on reboot.

E:\Users\TEMP.PC-de-Dolc3\Local Settings\Application Data\anok.bat (Fake.Dropped.Malware) -> Delete on reboot.

E:\Users\TEMP\Local Settings\Application Data\anok.bat (Fake.Dropped.Malware) -> Delete on reboot.

E:\Users\TEMP.PC-de-Dolc3\Local Settings\Application Data\ewabutovah.dl (Fake.Dropped.Malware) -> Delete on reboot.

E:\Users\TEMP\Local Settings\Application Data\ewabutovah.dl (Fake.Dropped.Malware) -> Delete on reboot.

E:\Users\TEMP.PC-de-Dolc3\Local Settings\Application Data\fibaw.ban (Fake.Dropped.Malware) -> Delete on reboot.

E:\Users\TEMP\Local Settings\Application Data\fibaw.ban (Fake.Dropped.Malware) -> Delete on reboot.

E:\Users\TEMP.PC-de-Dolc3\Local Settings\Application Data\ybikohe.vbs (Fake.Dropped.Malware) -> Delete on reboot.

E:\Users\TEMP\Local Settings\Application Data\ybikohe.vbs (Fake.Dropped.Malware) -> Delete on reboot.

E:\Users\TEMP.PC-de-Dolc3\Cookies\uwux.exe (Fake.Dropped.Malware) -> Delete on reboot.

E:\Users\TEMP\Cookies\uwux.exe (Fake.Dropped.Malware) -> Delete on reboot.

E:\Users\TEMP.PC-de-Dolc3\Cookies\jiceji._sy (Fake.Dropped.Malware) -> Delete on reboot.

E:\Users\TEMP\Cookies\jiceji._sy (Fake.Dropped.Malware) -> Delete on reboot.

E:\Users\TEMP.PC-de-Dolc3\Cookies\esycire._dl (Fake.Dropped.Malware) -> Delete on reboot.

E:\Users\TEMP\Cookies\esycire._dl (Fake.Dropped.Malware) -> Delete on reboot.

E:\Users\TEMP.PC-de-Dolc3\Local Settings\Application Data\xacsceib.exe (Trojan.Agent) -> Delete on reboot.

E:\Users\TEMP\Local Settings\Application Data\xacsceib.exe (Trojan.Agent) -> Delete on reboot.

E:\Users\TEMP.PC-de-Dolc3\Local Settings\Application Data\cftmon.exe (Trojan.Agent) -> Delete on reboot.

E:\Users\TEMP\Local Settings\Application Data\cftmon.exe (Trojan.Agent) -> Delete on reboot.

E:\Users\TEMP.PC-de-Dolc3\Local Settings\Application Data\Windowsupdate.exe (Trojan.Agent) -> Delete on reboot.

E:\Users\TEMP\Local Settings\Application Data\Windowsupdate.exe (Trojan.Agent) -> Delete on reboot.

E:\Users\TEMP.PC-de-Dolc3\Local Settings\Application Data\spool.exe (Trojan.Agent) -> Delete on reboot.

E:\Users\TEMP\Local Settings\Application Data\spool.exe (Trojan.Agent) -> Delete on reboot.

E:\Users\TEMP.PC-de-Dolc3\Local Settings\Application Data\igutymyko.ban (Fake.Dropped.Malware) -> Delete on reboot.

E:\Users\TEMP\Local Settings\Application Data\igutymyko.ban (Fake.Dropped.Malware) -> Delete on reboot.

E:\Users\TEMP.PC-de-Dolc3\Local Settings\Application Data\ymuxag.com (Fake.Dropped.Malware) -> Delete on reboot.

E:\Users\TEMP\Local Settings\Application Data\ymuxag.com (Fake.Dropped.Malware) -> Delete on reboot.

E:\Users\TEMP.PC-de-Dolc3\Local Settings\Tempmbroit.exe (Trojan.FakeAlert) -> Delete on reboot.

E:\Users\TEMP\Local Settings\Tempmbroit.exe (Trojan.FakeAlert) -> Delete on reboot.

E:\Users\TEMP.PC-de-Dolc3\Cookies\syssp.exe (Fake.Dropped.Malware) -> Delete on reboot.

E:\Users\TEMP\Cookies\syssp.exe (Fake.Dropped.Malware) -> Delete on reboot.

E:\Users\TEMP.PC-de-Dolc3\Local Settings\Temp\_check32.bat (Malware.Trace) -> Delete on reboot.

E:\Users\TEMP\Local Settings\Temp\_check32.bat (Malware.Trace) -> Delete on reboot.

E:\Users\TEMP.PC-de-Dolc3\Application Data\install.exe (Rogue.SpyProtector) -> Delete on reboot.

E:\Users\TEMP\Application Data\install.exe (Rogue.SpyProtector) -> Delete on reboot.

E:\Users\TEMP.PC-de-Dolc3\Application Data\shellex.dll (Rogue.SpyProtector) -> Delete on reboot.

E:\Users\TEMP\Application Data\shellex.dll (Rogue.SpyProtector) -> Delete on reboot.

E:\Users\TEMP.PC-de-Dolc3\Application Data\srcss.exe (Rogue.SpyProtector) -> Delete on reboot.

E:\Users\TEMP\Application Data\srcss.exe (Rogue.SpyProtector) -> Delete on reboot.

E:\Users\TEMP.PC-de-Dolc3\Local Settings\Application Data\Microsoft\Windows\procgdwh32.exe (Rogue.InternetAntivirus) -> Delete on reboot.

E:\Users\TEMP\Local Settings\Application Data\Microsoft\Windows\procgdwh32.exe (Rogue.InternetAntivirus) -> Delete on reboot.

Posté(e) (modifié)

Et maintenant le scan que je viens de faire :

 

Malwarebytes' Anti-Malware 1.30

Version de la base de données: 1371

Windows 6.0.6001 Service Pack 1

 

08/11/2008 17:07:06

mbam-log-2008-11-08 (17-07-01).txt

 

Type de recherche: Examen rapide

Eléments examinés: 61659

Temps écoulé: 3 minute(s), 46 second(s)

 

Processus mémoire infecté(s): 0

Module(s) mémoire infecté(s): 0

Clé(s) du Registre infectée(s): 1

Valeur(s) du Registre infectée(s): 0

Elément(s) de données du Registre infecté(s): 0

Dossier(s) infecté(s): 2

Fichier(s) infecté(s): 138

 

Processus mémoire infecté(s):

(Aucun élément nuisible détecté)

 

Module(s) mémoire infecté(s):

(Aucun élément nuisible détecté)

 

Clé(s) du Registre infectée(s):

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\adware away v3.1.4.8_is1 (Rogue.AdwareAway) -> No action taken.

 

Valeur(s) du Registre infectée(s):

(Aucun élément nuisible détecté)

 

Elément(s) de données du Registre infecté(s):

(Aucun élément nuisible détecté)

 

Dossier(s) infecté(s):

E:\Program Files\Adware Away (Rogue.AdwareAway) -> No action taken.

E:\ProgramData\Microsoft\Windows\Start Menu\Programs\Adware Away (Rogue.AdwareAway) -> No action taken.

 

Fichier(s) infecté(s):

E:\Program Files\Adware Away\activex.tmp (Rogue.AdwareAway) -> No action taken.

E:\Program Files\Adware Away\AdAway.dll (Rogue.AdwareAway) -> No action taken.

E:\Program Files\Adware Away\AdAway.exe (Rogue.AdwareAway) -> No action taken.

E:\Program Files\Adware Away\AdwareAway.chm (Rogue.AdwareAway) -> No action taken.

E:\Program Files\Adware Away\autorun.tmp (Rogue.AdwareAway) -> No action taken.

E:\Program Files\Adware Away\DiagnosticScan.SYS (Rogue.AdwareAway) -> No action taken.

E:\Program Files\Adware Away\EnumAutoRun.exe (Rogue.AdwareAway) -> No action taken.

E:\Program Files\Adware Away\EnumDlls.exe (Rogue.AdwareAway) -> No action taken.

E:\Program Files\Adware Away\EProcess.exe (Rogue.AdwareAway) -> No action taken.

E:\Program Files\Adware Away\explorerbar.tmp (Rogue.AdwareAway) -> No action taken.

E:\Program Files\Adware Away\fa.tmp (Rogue.AdwareAway) -> No action taken.

E:\Program Files\Adware Away\FixDesktopBackground.exe (Rogue.AdwareAway) -> No action taken.

E:\Program Files\Adware Away\folderdll.tmp (Rogue.AdwareAway) -> No action taken.

E:\Program Files\Adware Away\global.dll (Rogue.AdwareAway) -> No action taken.

E:\Program Files\Adware Away\iebhotoolbar.tmp (Rogue.AdwareAway) -> No action taken.

E:\Program Files\Adware Away\iepage.tmp (Rogue.AdwareAway) -> No action taken.

E:\Program Files\Adware Away\ietoolbarbutton.tmp (Rogue.AdwareAway) -> No action taken.

E:\Program Files\Adware Away\ieurlprefix.tmp (Rogue.AdwareAway) -> No action taken.

E:\Program Files\Adware Away\ieurlsearchhook.tmp (Rogue.AdwareAway) -> No action taken.

E:\Program Files\Adware Away\lsp.tmp (Rogue.AdwareAway) -> No action taken.

E:\Program Files\Adware Away\nameserver.tmp (Rogue.AdwareAway) -> No action taken.

E:\Program Files\Adware Away\notifydll.tmp (Rogue.AdwareAway) -> No action taken.

E:\Program Files\Adware Away\overall.log (Rogue.AdwareAway) -> No action taken.

E:\Program Files\Adware Away\process.tmp (Rogue.AdwareAway) -> No action taken.

E:\Program Files\Adware Away\protocolfilter.tmp (Rogue.AdwareAway) -> No action taken.

E:\Program Files\Adware Away\ScanAtStartup.exe (Rogue.AdwareAway) -> No action taken.

E:\Program Files\Adware Away\screenshot.exe (Rogue.AdwareAway) -> No action taken.

E:\Program Files\Adware Away\securitysite.tmp (Rogue.AdwareAway) -> No action taken.

E:\Program Files\Adware Away\service.tmp (Rogue.AdwareAway) -> No action taken.

E:\Program Files\Adware Away\shellextension.tmp (Rogue.AdwareAway) -> No action taken.

E:\Program Files\Adware Away\shellextensionhook.tmp (Rogue.AdwareAway) -> No action taken.

E:\Program Files\Adware Away\SPAP.tmp (Rogue.AdwareAway) -> No action taken.

E:\Program Files\Adware Away\svchostdll.tmp (Rogue.AdwareAway) -> No action taken.

E:\Program Files\Adware Away\sysrestriction.tmp (Rogue.AdwareAway) -> No action taken.

E:\Program Files\Adware Away\unins000.dat (Rogue.AdwareAway) -> No action taken.

E:\Program Files\Adware Away\unins000.exe (Rogue.AdwareAway) -> No action taken.

E:\Program Files\Adware Away\uninstall.tmp (Rogue.AdwareAway) -> No action taken.

E:\Program Files\Adware Away\Update2.exe (Rogue.AdwareAway) -> No action taken.

E:\ProgramData\Microsoft\Windows\Start Menu\Programs\Adware Away\Adware Away.lnk (Rogue.AdwareAway) -> No action taken.

E:\ProgramData\Microsoft\Windows\Start Menu\Programs\Adware Away\Uninstall.lnk (Rogue.AdwareAway) -> No action taken.

E:\ProgramData\Microsoft\Windows\Start Menu\Programs\Adware Away\Update.lnk (Rogue.AdwareAway) -> No action taken.

E:\ProgramData\Microsoft\Windows\Start Menu\Programs\Adware Away\User Manual.lnk (Rogue.AdwareAway) -> No action taken.

E:\Windows\adaway.lic (Rogue.AdwareAway) -> No action taken.

E:\Users\Administrateur\Desktop\Adware Away.lnk (Rogue.AdwareAway) -> No action taken.

E:\Users\TEMP.PC-de-Dolc3\Local Settings\Application Data\Microsoft\Windows\pguard.ini (Rogue.InternetAntivirus) -> No action taken.

E:\Users\TEMP\Local Settings\Application Data\Microsoft\Windows\pguard.ini (Rogue.InternetAntivirus) -> No action taken.

E:\Users\TEMP.PC-de-Dolc3\Local Settings\Application Data\Microsoft\Windows\pg32.exe (Rogue.InternetAntivirus) -> No action taken.

E:\Users\TEMP\Local Settings\Application Data\Microsoft\Windows\pg32.exe (Rogue.InternetAntivirus) -> No action taken.

E:\Users\TEMP.PC-de-Dolc3\Local Settings\Application Data\anesuzenyp.bin (Fake.Dropped.Malware) -> No action taken.

E:\Users\TEMP\Local Settings\Application Data\anesuzenyp.bin (Fake.Dropped.Malware) -> No action taken.

E:\Users\TEMP.PC-de-Dolc3\Local Settings\Application Data\igyzih._sy (Fake.Dropped.Malware) -> No action taken.

E:\Users\TEMP\Local Settings\Application Data\igyzih._sy (Fake.Dropped.Malware) -> No action taken.

E:\Users\TEMP.PC-de-Dolc3\Local Settings\Application Data\naciveg.reg (Fake.Dropped.Malware) -> No action taken.

E:\Users\TEMP\Local Settings\Application Data\naciveg.reg (Fake.Dropped.Malware) -> No action taken.

E:\Users\TEMP.PC-de-Dolc3\Local Settings\Application Data\ubuqicuho.bin (Fake.Dropped.Malware) -> No action taken.

E:\Users\TEMP\Local Settings\Application Data\ubuqicuho.bin (Fake.Dropped.Malware) -> No action taken.

E:\Users\TEMP.PC-de-Dolc3\Local Settings\Application Data\zokawi.lib (Fake.Dropped.Malware) -> No action taken.

E:\Users\TEMP\Local Settings\Application Data\zokawi.lib (Fake.Dropped.Malware) -> No action taken.

E:\Users\TEMP.PC-de-Dolc3\Local Settings\Application Data\Microsoft\Internet Explorer\iv.exe (Trojan.Agent) -> No action taken.

E:\Users\TEMP\Local Settings\Application Data\Microsoft\Internet Explorer\iv.exe (Trojan.Agent) -> No action taken.

E:\Users\TEMP.PC-de-Dolc3\Local Settings\Application Data\Microsoft\Internet Explorer\procgdsj32.exe (Trojan.Agent) -> No action taken.

E:\Users\TEMP\Local Settings\Application Data\Microsoft\Internet Explorer\procgdsj32.exe (Trojan.Agent) -> No action taken.

E:\Users\TEMP.PC-de-Dolc3\Local Settings\Application Data\Microsoft\sessmgr.exe (Trojan.Agent) -> No action taken.

E:\Users\TEMP\Local Settings\Application Data\Microsoft\sessmgr.exe (Trojan.Agent) -> No action taken.

E:\Users\TEMP.PC-de-Dolc3\Local Settings\Application Data\Microsoft\spoolsv.exe (Trojan.Agent) -> No action taken.

E:\Users\TEMP\Local Settings\Application Data\Microsoft\spoolsv.exe (Trojan.Agent) -> No action taken.

E:\Users\TEMP.PC-de-Dolc3\Cookies\MM2048.DAT (Trojan.Agent) -> No action taken.

E:\Users\TEMP\Cookies\MM2048.DAT (Trojan.Agent) -> No action taken.

E:\Users\TEMP.PC-de-Dolc3\Cookies\MM256.DAT (Trojan.Agent) -> No action taken.

E:\Users\TEMP\Cookies\MM256.DAT (Trojan.Agent) -> No action taken.

E:\Users\TEMP.PC-de-Dolc3\Local Settings\alg.exe (Trojan.Agent) -> No action taken.

E:\Users\TEMP\Local Settings\alg.exe (Trojan.Agent) -> No action taken.

E:\Users\TEMP.PC-de-Dolc3\Local Settings\Application Data\Microsoft\Windows\sav.exe (Fake.Dropped.Malware) -> No action taken.

E:\Users\TEMP\Local Settings\Application Data\Microsoft\Windows\sav.exe (Fake.Dropped.Malware) -> No action taken.

E:\Users\TEMP.PC-de-Dolc3\Local Settings\Apps\2.0\srw94.exe (Fake.Dropped.Malware) -> No action taken.

E:\Users\TEMP\Local Settings\Apps\2.0\srw94.exe (Fake.Dropped.Malware) -> No action taken.

E:\Users\TEMP.PC-de-Dolc3\Cookies\bumo.reg (Fake.Dropped.Malware) -> No action taken.

E:\Users\TEMP\Cookies\bumo.reg (Fake.Dropped.Malware) -> No action taken.

E:\Users\TEMP.PC-de-Dolc3\Cookies\jababug.inf (Fake.Dropped.Malware) -> No action taken.

E:\Users\TEMP\Cookies\jababug.inf (Fake.Dropped.Malware) -> No action taken.

E:\Users\TEMP.PC-de-Dolc3\Local Settings\Application Data\ycuc.lib (Fake.Dropped.Malware) -> No action taken.

E:\Users\TEMP\Local Settings\Application Data\ycuc.lib (Fake.Dropped.Malware) -> No action taken.

E:\Users\TEMP.PC-de-Dolc3\Local Settings\Application Data\bokefa.bat (Fake.Dropped.Malware) -> No action taken.

E:\Users\TEMP\Local Settings\Application Data\bokefa.bat (Fake.Dropped.Malware) -> No action taken.

E:\Users\TEMP.PC-de-Dolc3\Local Settings\Application Data\sytetuf.sys (Fake.Dropped.Malware) -> No action taken.

E:\Users\TEMP\Local Settings\Application Data\sytetuf.sys (Fake.Dropped.Malware) -> No action taken.

E:\Users\TEMP.PC-de-Dolc3\Local Settings\Application Data\vege.ban (Fake.Dropped.Malware) -> No action taken.

E:\Users\TEMP\Local Settings\Application Data\vege.ban (Fake.Dropped.Malware) -> No action taken.

E:\Users\TEMP.PC-de-Dolc3\Local Settings\Application Data\xyzunore.dl (Fake.Dropped.Malware) -> No action taken.

E:\Users\TEMP\Local Settings\Application Data\xyzunore.dl (Fake.Dropped.Malware) -> No action taken.

E:\Users\TEMP.PC-de-Dolc3\Local Settings\Application Data\zyfotydyjo.exe (Fake.Dropped.Malware) -> No action taken.

E:\Users\TEMP\Local Settings\Application Data\zyfotydyjo.exe (Fake.Dropped.Malware) -> No action taken.

E:\Users\TEMP.PC-de-Dolc3\Local Settings\Temporary Internet Files\etokosyb.scr (Fake.Dropped.Malware) -> No action taken.

E:\Users\TEMP\Local Settings\Temporary Internet Files\etokosyb.scr (Fake.Dropped.Malware) -> No action taken.

E:\Users\TEMP.PC-de-Dolc3\Local Settings\Application Data\sec3.exe (Trojan.Agent) -> No action taken.

E:\Users\TEMP\Local Settings\Application Data\sec3.exe (Trojan.Agent) -> No action taken.

E:\Users\TEMP.PC-de-Dolc3\Local Settings\Application Data\anok.bat (Fake.Dropped.Malware) -> No action taken.

E:\Users\TEMP\Local Settings\Application Data\anok.bat (Fake.Dropped.Malware) -> No action taken.

E:\Users\TEMP.PC-de-Dolc3\Local Settings\Application Data\ewabutovah.dl (Fake.Dropped.Malware) -> No action taken.

E:\Users\TEMP\Local Settings\Application Data\ewabutovah.dl (Fake.Dropped.Malware) -> No action taken.

E:\Users\TEMP.PC-de-Dolc3\Local Settings\Application Data\fibaw.ban (Fake.Dropped.Malware) -> No action taken.

E:\Users\TEMP\Local Settings\Application Data\fibaw.ban (Fake.Dropped.Malware) -> No action taken.

E:\Users\TEMP.PC-de-Dolc3\Local Settings\Application Data\ybikohe.vbs (Fake.Dropped.Malware) -> No action taken.

E:\Users\TEMP\Local Settings\Application Data\ybikohe.vbs (Fake.Dropped.Malware) -> No action taken.

E:\Users\TEMP.PC-de-Dolc3\Cookies\uwux.exe (Fake.Dropped.Malware) -> No action taken.

E:\Users\TEMP\Cookies\uwux.exe (Fake.Dropped.Malware) -> No action taken.

E:\Users\TEMP.PC-de-Dolc3\Cookies\jiceji._sy (Fake.Dropped.Malware) -> No action taken.

E:\Users\TEMP\Cookies\jiceji._sy (Fake.Dropped.Malware) -> No action taken.

E:\Users\TEMP.PC-de-Dolc3\Cookies\esycire._dl (Fake.Dropped.Malware) -> No action taken.

E:\Users\TEMP\Cookies\esycire._dl (Fake.Dropped.Malware) -> No action taken.

E:\Users\TEMP.PC-de-Dolc3\Local Settings\Application Data\xacsceib.exe (Trojan.Agent) -> No action taken.

E:\Users\TEMP\Local Settings\Application Data\xacsceib.exe (Trojan.Agent) -> No action taken.

E:\Users\TEMP.PC-de-Dolc3\Local Settings\Application Data\cftmon.exe (Trojan.Agent) -> No action taken.

E:\Users\TEMP\Local Settings\Application Data\cftmon.exe (Trojan.Agent) -> No action taken.

E:\Users\TEMP.PC-de-Dolc3\Local Settings\Application Data\Windowsupdate.exe (Trojan.Agent) -> No action taken.

E:\Users\TEMP\Local Settings\Application Data\Windowsupdate.exe (Trojan.Agent) -> No action taken.

E:\Users\TEMP.PC-de-Dolc3\Local Settings\Application Data\spool.exe (Trojan.Agent) -> No action taken.

E:\Users\TEMP\Local Settings\Application Data\spool.exe (Trojan.Agent) -> No action taken.

E:\Users\TEMP.PC-de-Dolc3\Local Settings\Application Data\igutymyko.ban (Fake.Dropped.Malware) -> No action taken.

E:\Users\TEMP\Local Settings\Application Data\igutymyko.ban (Fake.Dropped.Malware) -> No action taken.

E:\Users\TEMP.PC-de-Dolc3\Local Settings\Application Data\ymuxag.com (Fake.Dropped.Malware) -> No action taken.

E:\Users\TEMP\Local Settings\Application Data\ymuxag.com (Fake.Dropped.Malware) -> No action taken.

E:\Users\Zahia\Desktop\Adware Away.lnk (Rogue.AdwareAway) -> No action taken.

E:\Users\Invité\Desktop\Adware Away.lnk (Rogue.AdwareAway) -> No action taken.

E:\Users\TEMP.PC-de-Dolc3\Local Settings\Tempmbroit.exe (Trojan.FakeAlert) -> No action taken.

E:\Users\TEMP\Local Settings\Tempmbroit.exe (Trojan.FakeAlert) -> No action taken.

E:\Users\TEMP.PC-de-Dolc3\Cookies\syssp.exe (Fake.Dropped.Malware) -> No action taken.

E:\Users\TEMP\Cookies\syssp.exe (Fake.Dropped.Malware) -> No action taken.

E:\Users\TEMP.PC-de-Dolc3\Local Settings\Temp\_check32.bat (Malware.Trace) -> No action taken.

E:\Users\TEMP\Local Settings\Temp\_check32.bat (Malware.Trace) -> No action taken.

E:\Users\TEMP.PC-de-Dolc3\Application Data\install.exe (Rogue.SpyProtector) -> No action taken.

E:\Users\TEMP\Application Data\install.exe (Rogue.SpyProtector) -> No action taken.

E:\Users\TEMP.PC-de-Dolc3\Application Data\shellex.dll (Rogue.SpyProtector) -> No action taken.

E:\Users\TEMP\Application Data\shellex.dll (Rogue.SpyProtector) -> No action taken.

E:\Users\TEMP.PC-de-Dolc3\Application Data\srcss.exe (Rogue.SpyProtector) -> No action taken.

E:\Users\TEMP\Application Data\srcss.exe (Rogue.SpyProtector) -> No action taken.

E:\Users\TEMP.PC-de-Dolc3\Local Settings\Application Data\Microsoft\Windows\procgdwh32.exe (Rogue.InternetAntivirus) -> No action taken.

E:\Users\TEMP\Local Settings\Application Data\Microsoft\Windows\procgdwh32.exe (Rogue.InternetAntivirus) -> No action taken.

 

 

Je vais nettoyer ça ensuite, je lancerai un autre scan.

 

Edit :

 

MBAM m'a demandé de redémarrer afin de pouvoir nettoyer la machine, chose que j'ai faite. J'ai relancé un autre scan pour voir si il avait nettoyé la machine, il s'avère qu'il n' a pas réussi. Voici le scan qui l'atteste. A chaque fois, il me demande de redémarrer pour désinfecter le pc et à chaque fois, il retrouve les mêmes choses.

 

Malwarebytes' Anti-Malware 1.30

Version de la base de données: 1371

Windows 6.0.6001 Service Pack 1

 

08/11/2008 17:19:53

mbam-log-2008-11-08 (17-19-44).txt

 

Type de recherche: Examen rapide

Eléments examinés: 61189

Temps écoulé: 4 minute(s), 10 second(s)

 

Processus mémoire infecté(s): 0

Module(s) mémoire infecté(s): 0

Clé(s) du Registre infectée(s): 0

Valeur(s) du Registre infectée(s): 0

Elément(s) de données du Registre infecté(s): 0

Dossier(s) infecté(s): 0

Fichier(s) infecté(s): 92

 

Processus mémoire infecté(s):

(Aucun élément nuisible détecté)

 

Module(s) mémoire infecté(s):

(Aucun élément nuisible détecté)

 

Clé(s) du Registre infectée(s):

(Aucun élément nuisible détecté)

 

Valeur(s) du Registre infectée(s):

(Aucun élément nuisible détecté)

 

Elément(s) de données du Registre infecté(s):

(Aucun élément nuisible détecté)

 

Dossier(s) infecté(s):

(Aucun élément nuisible détecté)

 

Fichier(s) infecté(s):

E:\Users\TEMP.PC-de-Dolc3\Local Settings\Application Data\Microsoft\Windows\pguard.ini (Rogue.InternetAntivirus) -> No action taken.

E:\Users\TEMP\Local Settings\Application Data\Microsoft\Windows\pguard.ini (Rogue.InternetAntivirus) -> No action taken.

E:\Users\TEMP.PC-de-Dolc3\Local Settings\Application Data\Microsoft\Windows\pg32.exe (Rogue.InternetAntivirus) -> No action taken.

E:\Users\TEMP\Local Settings\Application Data\Microsoft\Windows\pg32.exe (Rogue.InternetAntivirus) -> No action taken.

E:\Users\TEMP.PC-de-Dolc3\Local Settings\Application Data\anesuzenyp.bin (Fake.Dropped.Malware) -> No action taken.

E:\Users\TEMP\Local Settings\Application Data\anesuzenyp.bin (Fake.Dropped.Malware) -> No action taken.

E:\Users\TEMP.PC-de-Dolc3\Local Settings\Application Data\igyzih._sy (Fake.Dropped.Malware) -> No action taken.

E:\Users\TEMP\Local Settings\Application Data\igyzih._sy (Fake.Dropped.Malware) -> No action taken.

E:\Users\TEMP.PC-de-Dolc3\Local Settings\Application Data\naciveg.reg (Fake.Dropped.Malware) -> No action taken.

E:\Users\TEMP\Local Settings\Application Data\naciveg.reg (Fake.Dropped.Malware) -> No action taken.

E:\Users\TEMP.PC-de-Dolc3\Local Settings\Application Data\ubuqicuho.bin (Fake.Dropped.Malware) -> No action taken.

E:\Users\TEMP\Local Settings\Application Data\ubuqicuho.bin (Fake.Dropped.Malware) -> No action taken.

E:\Users\TEMP.PC-de-Dolc3\Local Settings\Application Data\zokawi.lib (Fake.Dropped.Malware) -> No action taken.

E:\Users\TEMP\Local Settings\Application Data\zokawi.lib (Fake.Dropped.Malware) -> No action taken.

E:\Users\TEMP.PC-de-Dolc3\Local Settings\Application Data\Microsoft\Internet Explorer\iv.exe (Trojan.Agent) -> No action taken.

E:\Users\TEMP\Local Settings\Application Data\Microsoft\Internet Explorer\iv.exe (Trojan.Agent) -> No action taken.

E:\Users\TEMP.PC-de-Dolc3\Local Settings\Application Data\Microsoft\Internet Explorer\procgdsj32.exe (Trojan.Agent) -> No action taken.

E:\Users\TEMP\Local Settings\Application Data\Microsoft\Internet Explorer\procgdsj32.exe (Trojan.Agent) -> No action taken.

E:\Users\TEMP.PC-de-Dolc3\Local Settings\Application Data\Microsoft\sessmgr.exe (Trojan.Agent) -> No action taken.

E:\Users\TEMP\Local Settings\Application Data\Microsoft\sessmgr.exe (Trojan.Agent) -> No action taken.

E:\Users\TEMP.PC-de-Dolc3\Local Settings\Application Data\Microsoft\spoolsv.exe (Trojan.Agent) -> No action taken.

E:\Users\TEMP\Local Settings\Application Data\Microsoft\spoolsv.exe (Trojan.Agent) -> No action taken.

E:\Users\TEMP.PC-de-Dolc3\Cookies\MM2048.DAT (Trojan.Agent) -> No action taken.

E:\Users\TEMP\Cookies\MM2048.DAT (Trojan.Agent) -> No action taken.

E:\Users\TEMP.PC-de-Dolc3\Cookies\MM256.DAT (Trojan.Agent) -> No action taken.

E:\Users\TEMP\Cookies\MM256.DAT (Trojan.Agent) -> No action taken.

E:\Users\TEMP.PC-de-Dolc3\Local Settings\alg.exe (Trojan.Agent) -> No action taken.

E:\Users\TEMP\Local Settings\alg.exe (Trojan.Agent) -> No action taken.

E:\Users\TEMP.PC-de-Dolc3\Local Settings\Application Data\Microsoft\Windows\sav.exe (Fake.Dropped.Malware) -> No action taken.

E:\Users\TEMP\Local Settings\Application Data\Microsoft\Windows\sav.exe (Fake.Dropped.Malware) -> No action taken.

E:\Users\TEMP.PC-de-Dolc3\Local Settings\Apps\2.0\srw94.exe (Fake.Dropped.Malware) -> No action taken.

E:\Users\TEMP\Local Settings\Apps\2.0\srw94.exe (Fake.Dropped.Malware) -> No action taken.

E:\Users\TEMP.PC-de-Dolc3\Cookies\bumo.reg (Fake.Dropped.Malware) -> No action taken.

E:\Users\TEMP\Cookies\bumo.reg (Fake.Dropped.Malware) -> No action taken.

E:\Users\TEMP.PC-de-Dolc3\Cookies\jababug.inf (Fake.Dropped.Malware) -> No action taken.

E:\Users\TEMP\Cookies\jababug.inf (Fake.Dropped.Malware) -> No action taken.

E:\Users\TEMP.PC-de-Dolc3\Local Settings\Application Data\ycuc.lib (Fake.Dropped.Malware) -> No action taken.

E:\Users\TEMP\Local Settings\Application Data\ycuc.lib (Fake.Dropped.Malware) -> No action taken.

E:\Users\TEMP.PC-de-Dolc3\Local Settings\Application Data\bokefa.bat (Fake.Dropped.Malware) -> No action taken.

E:\Users\TEMP\Local Settings\Application Data\bokefa.bat (Fake.Dropped.Malware) -> No action taken.

E:\Users\TEMP.PC-de-Dolc3\Local Settings\Application Data\sytetuf.sys (Fake.Dropped.Malware) -> No action taken.

E:\Users\TEMP\Local Settings\Application Data\sytetuf.sys (Fake.Dropped.Malware) -> No action taken.

E:\Users\TEMP.PC-de-Dolc3\Local Settings\Application Data\vege.ban (Fake.Dropped.Malware) -> No action taken.

E:\Users\TEMP\Local Settings\Application Data\vege.ban (Fake.Dropped.Malware) -> No action taken.

E:\Users\TEMP.PC-de-Dolc3\Local Settings\Application Data\xyzunore.dl (Fake.Dropped.Malware) -> No action taken.

E:\Users\TEMP\Local Settings\Application Data\xyzunore.dl (Fake.Dropped.Malware) -> No action taken.

E:\Users\TEMP.PC-de-Dolc3\Local Settings\Application Data\zyfotydyjo.exe (Fake.Dropped.Malware) -> No action taken.

E:\Users\TEMP\Local Settings\Application Data\zyfotydyjo.exe (Fake.Dropped.Malware) -> No action taken.

E:\Users\TEMP.PC-de-Dolc3\Local Settings\Temporary Internet Files\etokosyb.scr (Fake.Dropped.Malware) -> No action taken.

E:\Users\TEMP\Local Settings\Temporary Internet Files\etokosyb.scr (Fake.Dropped.Malware) -> No action taken.

E:\Users\TEMP.PC-de-Dolc3\Local Settings\Application Data\sec3.exe (Trojan.Agent) -> No action taken.

E:\Users\TEMP\Local Settings\Application Data\sec3.exe (Trojan.Agent) -> No action taken.

E:\Users\TEMP.PC-de-Dolc3\Local Settings\Application Data\anok.bat (Fake.Dropped.Malware) -> No action taken.

E:\Users\TEMP\Local Settings\Application Data\anok.bat (Fake.Dropped.Malware) -> No action taken.

E:\Users\TEMP.PC-de-Dolc3\Local Settings\Application Data\ewabutovah.dl (Fake.Dropped.Malware) -> No action taken.

E:\Users\TEMP\Local Settings\Application Data\ewabutovah.dl (Fake.Dropped.Malware) -> No action taken.

E:\Users\TEMP.PC-de-Dolc3\Local Settings\Application Data\fibaw.ban (Fake.Dropped.Malware) -> No action taken.

E:\Users\TEMP\Local Settings\Application Data\fibaw.ban (Fake.Dropped.Malware) -> No action taken.

E:\Users\TEMP.PC-de-Dolc3\Local Settings\Application Data\ybikohe.vbs (Fake.Dropped.Malware) -> No action taken.

E:\Users\TEMP\Local Settings\Application Data\ybikohe.vbs (Fake.Dropped.Malware) -> No action taken.

E:\Users\TEMP.PC-de-Dolc3\Cookies\uwux.exe (Fake.Dropped.Malware) -> No action taken.

E:\Users\TEMP\Cookies\uwux.exe (Fake.Dropped.Malware) -> No action taken.

E:\Users\TEMP.PC-de-Dolc3\Cookies\jiceji._sy (Fake.Dropped.Malware) -> No action taken.

E:\Users\TEMP\Cookies\jiceji._sy (Fake.Dropped.Malware) -> No action taken.

E:\Users\TEMP.PC-de-Dolc3\Cookies\esycire._dl (Fake.Dropped.Malware) -> No action taken.

E:\Users\TEMP\Cookies\esycire._dl (Fake.Dropped.Malware) -> No action taken.

E:\Users\TEMP.PC-de-Dolc3\Local Settings\Application Data\xacsceib.exe (Trojan.Agent) -> No action taken.

E:\Users\TEMP\Local Settings\Application Data\xacsceib.exe (Trojan.Agent) -> No action taken.

E:\Users\TEMP.PC-de-Dolc3\Local Settings\Application Data\cftmon.exe (Trojan.Agent) -> No action taken.

E:\Users\TEMP\Local Settings\Application Data\cftmon.exe (Trojan.Agent) -> No action taken.

E:\Users\TEMP.PC-de-Dolc3\Local Settings\Application Data\Windowsupdate.exe (Trojan.Agent) -> No action taken.

E:\Users\TEMP\Local Settings\Application Data\Windowsupdate.exe (Trojan.Agent) -> No action taken.

E:\Users\TEMP.PC-de-Dolc3\Local Settings\Application Data\spool.exe (Trojan.Agent) -> No action taken.

E:\Users\TEMP\Local Settings\Application Data\spool.exe (Trojan.Agent) -> No action taken.

E:\Users\TEMP.PC-de-Dolc3\Local Settings\Application Data\igutymyko.ban (Fake.Dropped.Malware) -> No action taken.

E:\Users\TEMP\Local Settings\Application Data\igutymyko.ban (Fake.Dropped.Malware) -> No action taken.

E:\Users\TEMP.PC-de-Dolc3\Local Settings\Application Data\ymuxag.com (Fake.Dropped.Malware) -> No action taken.

E:\Users\TEMP\Local Settings\Application Data\ymuxag.com (Fake.Dropped.Malware) -> No action taken.

E:\Users\TEMP.PC-de-Dolc3\Local Settings\Tempmbroit.exe (Trojan.FakeAlert) -> No action taken.

E:\Users\TEMP\Local Settings\Tempmbroit.exe (Trojan.FakeAlert) -> No action taken.

E:\Users\TEMP.PC-de-Dolc3\Cookies\syssp.exe (Fake.Dropped.Malware) -> No action taken.

E:\Users\TEMP\Cookies\syssp.exe (Fake.Dropped.Malware) -> No action taken.

E:\Users\TEMP.PC-de-Dolc3\Local Settings\Temp\_check32.bat (Malware.Trace) -> No action taken.

E:\Users\TEMP\Local Settings\Temp\_check32.bat (Malware.Trace) -> No action taken.

E:\Users\TEMP.PC-de-Dolc3\Application Data\install.exe (Rogue.SpyProtector) -> No action taken.

E:\Users\TEMP\Application Data\install.exe (Rogue.SpyProtector) -> No action taken.

E:\Users\TEMP.PC-de-Dolc3\Application Data\shellex.dll (Rogue.SpyProtector) -> No action taken.

E:\Users\TEMP\Application Data\shellex.dll (Rogue.SpyProtector) -> No action taken.

E:\Users\TEMP.PC-de-Dolc3\Application Data\srcss.exe (Rogue.SpyProtector) -> No action taken.

E:\Users\TEMP\Application Data\srcss.exe (Rogue.SpyProtector) -> No action taken.

E:\Users\TEMP.PC-de-Dolc3\Local Settings\Application Data\Microsoft\Windows\procgdwh32.exe (Rogue.InternetAntivirus) -> No action taken.

E:\Users\TEMP\Local Settings\Application Data\Microsoft\Windows\procgdwh32.exe (Rogue.InternetAntivirus) -> No action taken.

Modifié par Av3n4s
Posté(e)

Bonsoir,

Curieux , le comportement de Mbam.

C'est du jamais vu!

 

Expliquez moi cette structure:

 

E:\Users\TEMP\Local Settings\

E:\Users\TEMP.PC-de-Dolc3\Local Settings\

E:\Users\Zahia\

Je suppose que vous avez renommé Documents and Settings, mais pourquoi \TEMP\ ?

 

Télécharger sur le bureauOTMoveIt3 by OldTimer .

Double-clic sur OTMoveIt3.exe pour le lancer.

Sous Vista,Clic droit sur le fichier ->Choisir Exécuter en tant qu' Administrateur

Vérifier que Unregister Dll's and Ocx's soit coché.

* Copiez /Collez les lignes ci dessous):

 

:Processes

explorer.exe

:Services

 

:Files

E:\Program Files\Adware Away

E:\ProgramData\Microsoft\Windows\Start Menu\Programs\Adware Away

E:\ProgramData\Microsoft\Windows\Start Menu\Programs\Adware Away\Adware Away.lnk

E:\ProgramData\Microsoft\Windows\Start Menu\Programs\Adware Away\Uninstall.lnk

E:\ProgramData\Microsoft\Windows\Start Menu\Programs\Adware Away\Update.lnk

E:\ProgramData\Microsoft\Windows\Start Menu\Programs\Adware Away\User Manual.lnk

E:\Windows\adaway.lic

E:\Users\Administrateur\Desktop\Adware Away.lnk

E:\Users\TEMP.PC-de-Dolc3\Local Settings\Application Data\Microsoft\Windows\pguard.ini

E:\Users\TEMP\Local Settings\Application Data\Microsoft\Windows\pguard.ini

E:\Users\TEMP.PC-de-Dolc3\Local Settings\Application Data\Microsoft\Windows\pg32.exe

E:\Users\TEMP\Local Settings\Application Data\Microsoft\Windows\pg32.exe

E:\Users\TEMP.PC-de-Dolc3\Local Settings\Application Data\anesuzenyp.bin

E:\Users\TEMP\Local Settings\Application Data\anesuzenyp.bin

E:\Users\TEMP.PC-de-Dolc3\Local Settings\Application Data\igyzih._sy

E:\Users\TEMP\Local Settings\Application Data\igyzih._sy

E:\Users\TEMP.PC-de-Dolc3\Local Settings\Application Data\naciveg.reg

E:\Users\TEMP\Local Settings\Application Data\naciveg.reg

E:\Users\TEMP.PC-de-Dolc3\Local Settings\Application Data\ubuqicuho.bin

E:\Users\TEMP\Local Settings\Application Data\ubuqicuho.bin

E:\Users\TEMP.PC-de-Dolc3\Local Settings\Application Data\zokawi.lib

E:\Users\TEMP\Local Settings\Application Data\zokawi.lib

E:\Users\TEMP.PC-de-Dolc3\Local Settings\Application Data\Microsoft\Internet Explorer\iv.exe

E:\Users\TEMP\Local Settings\Application Data\Microsoft\Internet Explorer\iv.exe

E:\Users\TEMP.PC-de-Dolc3\Local Settings\Application Data\Microsoft\Internet Explorer\procgdsj32.exe

E:\Users\TEMP\Local Settings\Application Data\Microsoft\Internet Explorer\procgdsj32.exe

E:\Users\TEMP.PC-de-Dolc3\Local Settings\Application Data\Microsoft\sessmgr.exe

E:\Users\TEMP\Local Settings\Application Data\Microsoft\sessmgr.exe

E:\Users\TEMP.PC-de-Dolc3\Local Settings\Application Data\Microsoft\spoolsv.exe

E:\Users\TEMP\Local Settings\Application Data\Microsoft\spoolsv.exe

E:\Users\TEMP.PC-de-Dolc3\Cookies\MM2048.DAT

E:\Users\TEMP\Cookies\MM2048.DAT

E:\Users\TEMP.PC-de-Dolc3\Cookies\MM256.DAT

E:\Users\TEMP\Cookies\MM256.DAT

E:\Users\TEMP.PC-de-Dolc3\Local Settings\alg.exe

E:\Users\TEMP\Local Settings\alg.exe

E:\Users\TEMP.PC-de-Dolc3\Local Settings\Application Data\Microsoft\Windows\sav.exe

E:\Users\TEMP\Local Settings\Application Data\Microsoft\Windows\sav.exe

E:\Users\TEMP.PC-de-Dolc3\Local Settings\Apps\2.0\srw94.exe

E:\Users\TEMP\Local Settings\Apps\2.0\srw94.exe

E:\Users\TEMP.PC-de-Dolc3\Cookies\bumo.reg

E:\Users\TEMP\Cookies\bumo.reg

E:\Users\TEMP.PC-de-Dolc3\Cookies\jababug.inf

E:\Users\TEMP\Cookies\jababug.inf

E:\Users\TEMP.PC-de-Dolc3\Local Settings\Application Data\ycuc.lib

E:\Users\TEMP\Local Settings\Application Data\ycuc.lib

E:\Users\TEMP.PC-de-Dolc3\Local Settings\Application Data\bokefa.bat

E:\Users\TEMP\Local Settings\Application Data\bokefa.bat

E:\Users\TEMP.PC-de-Dolc3\Local Settings\Application Data\sytetuf.sys

E:\Users\TEMP\Local Settings\Application Data\sytetuf.sys

E:\Users\TEMP.PC-de-Dolc3\Local Settings\Application Data\vege.ban

E:\Users\TEMP\Local Settings\Application Data\vege.ban

E:\Users\TEMP.PC-de-Dolc3\Local Settings\Application Data\xyzunore.dl

E:\Users\TEMP\Local Settings\Application Data\xyzunore.dl

E:\Users\TEMP.PC-de-Dolc3\Local Settings\Application Data\zyfotydyjo.exe

E:\Users\TEMP\Local Settings\Application Data\zyfotydyjo.exe

E:\Users\TEMP.PC-de-Dolc3\Local Settings\Temporary Internet Files\etokosyb.scr

E:\Users\TEMP\Local Settings\Temporary Internet Files\etokosyb.scr

E:\Users\TEMP.PC-de-Dolc3\Local Settings\Application Data\sec3.exe

E:\Users\TEMP\Local Settings\Application Data\sec3.exe

E:\Users\TEMP.PC-de-Dolc3\Local Settings\Application Data\anok.bat

E:\Users\TEMP\Local Settings\Application Data\anok.bat

E:\Users\TEMP.PC-de-Dolc3\Local Settings\Application Data\ewabutovah.dl

E:\Users\TEMP\Local Settings\Application Data\ewabutovah.dl

E:\Users\TEMP.PC-de-Dolc3\Local Settings\Application Data\fibaw.ban

E:\Users\TEMP\Local Settings\Application Data\fibaw.ban

E:\Users\TEMP.PC-de-Dolc3\Local Settings\Application Data\ybikohe.vbs

E:\Users\TEMP\Local Settings\Application Data\ybikohe.vbs

E:\Users\TEMP.PC-de-Dolc3\Cookies\uwux.exe

E:\Users\TEMP\Cookies\uwux.exe

E:\Users\TEMP.PC-de-Dolc3\Cookies\jiceji._sy

E:\Users\TEMP\Cookies\jiceji._sy

E:\Users\TEMP.PC-de-Dolc3\Cookies\esycire._dl

E:\Users\TEMP\Cookies\esycire._dl

E:\Users\TEMP.PC-de-Dolc3\Local Settings\Application Data\xacsceib.exe

E:\Users\TEMP\Local Settings\Application Data\xacsceib.exe

E:\Users\TEMP.PC-de-Dolc3\Local Settings\Application Data\cftmon.exe

E:\Users\TEMP\Local Settings\Application Data\cftmon.exe

E:\Users\TEMP.PC-de-Dolc3\Local Settings\Application Data\Windowsupdate.exe

E:\Users\TEMP\Local Settings\Application Data\Windowsupdate.exe

E:\Users\TEMP.PC-de-Dolc3\Local Settings\Application Data\spool.exe

E:\Users\TEMP\Local Settings\Application Data\spool.exe

E:\Users\TEMP.PC-de-Dolc3\Local Settings\Application Data\igutymyko.ban

E:\Users\TEMP\Local Settings\Application Data\igutymyko.ban

E:\Users\TEMP.PC-de-Dolc3\Local Settings\Application Data\ymuxag.com

E:\Users\TEMP\Local Settings\Application Data\ymuxag.com

E:\Users\Zahia\Desktop\Adware Away.lnk

E:\Users\Invité\Desktop\Adware Away.lnk

E:\Users\TEMP.PC-de-Dolc3\Local Settings\Tempmbroit.exe

E:\Users\TEMP\Local Settings\Tempmbroit.exe

E:\Users\TEMP.PC-de-Dolc3\Cookies\syssp.exe

E:\Users\TEMP\Cookies\syssp.exe

E:\Users\TEMP.PC-de-Dolc3\Local Settings\Temp\_check32.bat

E:\Users\TEMP\Local Settings\Temp\_check32.bat

E:\Users\TEMP.PC-de-Dolc3\Application Data\install.exe

E:\Users\TEMP\Application Data\install.exe

E:\Users\TEMP.PC-de-Dolc3\Application Data\shellex.dll

E:\Users\TEMP\Application Data\shellex.dll

E:\Users\TEMP.PC-de-Dolc3\Application Data\srcss.exe

E:\Users\TEMP\Application Data\srcss.exe

E:\Users\TEMP.PC-de-Dolc3\Local Settings\Application Data\Microsoft\Windows\procgdwh32.exe

E:\Users\TEMP\Local Settings\Application Data\Microsoft\Windows\procgdwh32.exe

 

:Reg

 

:Commands

[purity]

[emptytemp]

[start explorer]

[Reboot]

Revenez dans OTMoveIt3,

Clic droit sur la fenêtre "Paste Instructions for Items to be Moved" sous la barre jaune et choisir Coller(Paste).

* Click le bouton rouge Moveit!

* Fermez OTMoveIt3

Votre Pc va redémarrer.

Rendez vous dans le dossier C:\_OTMoveIt\MovedFiles ,

ouvrez le dernier fichier .log

Copiez/collez en le contenu dans votre prochaine réponse

 

Posté(e)
Bonsoir,

Curieux , le comportement de Mbam.

C'est du jamais vu!

 

Expliquez moi cette structure:

 

E:\Users\TEMP\Local Settings\

E:\Users\TEMP.PC-de-Dolc3\Local Settings\

E:\Users\Zahia\

Je suppose que vous avez renommé Documents and Settings, mais pourquoi \TEMP\ ?

 

Télécharger sur le bureauOTMoveIt3 by OldTimer .

Double-clic sur OTMoveIt3.exe pour le lancer.

Sous Vista,Clic droit sur le fichier ->Choisir Exécuter en tant qu' Administrateur

Vérifier que Unregister Dll's and Ocx's soit coché.

* Copiez /Collez les lignes ci dessous):

 

:Processes

explorer.exe

:Services

 

:Files

E:\Program Files\Adware Away

E:\ProgramData\Microsoft\Windows\Start Menu\Programs\Adware Away

E:\ProgramData\Microsoft\Windows\Start Menu\Programs\Adware Away\Adware Away.lnk

E:\ProgramData\Microsoft\Windows\Start Menu\Programs\Adware Away\Uninstall.lnk

E:\ProgramData\Microsoft\Windows\Start Menu\Programs\Adware Away\Update.lnk

E:\ProgramData\Microsoft\Windows\Start Menu\Programs\Adware Away\User Manual.lnk

E:\Windows\adaway.lic

E:\Users\Administrateur\Desktop\Adware Away.lnk

E:\Users\TEMP.PC-de-Dolc3\Local Settings\Application Data\Microsoft\Windows\pguard.ini

E:\Users\TEMP\Local Settings\Application Data\Microsoft\Windows\pguard.ini

E:\Users\TEMP.PC-de-Dolc3\Local Settings\Application Data\Microsoft\Windows\pg32.exe

E:\Users\TEMP\Local Settings\Application Data\Microsoft\Windows\pg32.exe

E:\Users\TEMP.PC-de-Dolc3\Local Settings\Application Data\anesuzenyp.bin

E:\Users\TEMP\Local Settings\Application Data\anesuzenyp.bin

E:\Users\TEMP.PC-de-Dolc3\Local Settings\Application Data\igyzih._sy

E:\Users\TEMP\Local Settings\Application Data\igyzih._sy

E:\Users\TEMP.PC-de-Dolc3\Local Settings\Application Data\naciveg.reg

E:\Users\TEMP\Local Settings\Application Data\naciveg.reg

E:\Users\TEMP.PC-de-Dolc3\Local Settings\Application Data\ubuqicuho.bin

E:\Users\TEMP\Local Settings\Application Data\ubuqicuho.bin

E:\Users\TEMP.PC-de-Dolc3\Local Settings\Application Data\zokawi.lib

E:\Users\TEMP\Local Settings\Application Data\zokawi.lib

E:\Users\TEMP.PC-de-Dolc3\Local Settings\Application Data\Microsoft\Internet Explorer\iv.exe

E:\Users\TEMP\Local Settings\Application Data\Microsoft\Internet Explorer\iv.exe

E:\Users\TEMP.PC-de-Dolc3\Local Settings\Application Data\Microsoft\Internet Explorer\procgdsj32.exe

E:\Users\TEMP\Local Settings\Application Data\Microsoft\Internet Explorer\procgdsj32.exe

E:\Users\TEMP.PC-de-Dolc3\Local Settings\Application Data\Microsoft\sessmgr.exe

E:\Users\TEMP\Local Settings\Application Data\Microsoft\sessmgr.exe

E:\Users\TEMP.PC-de-Dolc3\Local Settings\Application Data\Microsoft\spoolsv.exe

E:\Users\TEMP\Local Settings\Application Data\Microsoft\spoolsv.exe

E:\Users\TEMP.PC-de-Dolc3\Cookies\MM2048.DAT

E:\Users\TEMP\Cookies\MM2048.DAT

E:\Users\TEMP.PC-de-Dolc3\Cookies\MM256.DAT

E:\Users\TEMP\Cookies\MM256.DAT

E:\Users\TEMP.PC-de-Dolc3\Local Settings\alg.exe

E:\Users\TEMP\Local Settings\alg.exe

E:\Users\TEMP.PC-de-Dolc3\Local Settings\Application Data\Microsoft\Windows\sav.exe

E:\Users\TEMP\Local Settings\Application Data\Microsoft\Windows\sav.exe

E:\Users\TEMP.PC-de-Dolc3\Local Settings\Apps\2.0\srw94.exe

E:\Users\TEMP\Local Settings\Apps\2.0\srw94.exe

E:\Users\TEMP.PC-de-Dolc3\Cookies\bumo.reg

E:\Users\TEMP\Cookies\bumo.reg

E:\Users\TEMP.PC-de-Dolc3\Cookies\jababug.inf

E:\Users\TEMP\Cookies\jababug.inf

E:\Users\TEMP.PC-de-Dolc3\Local Settings\Application Data\ycuc.lib

E:\Users\TEMP\Local Settings\Application Data\ycuc.lib

E:\Users\TEMP.PC-de-Dolc3\Local Settings\Application Data\bokefa.bat

E:\Users\TEMP\Local Settings\Application Data\bokefa.bat

E:\Users\TEMP.PC-de-Dolc3\Local Settings\Application Data\sytetuf.sys

E:\Users\TEMP\Local Settings\Application Data\sytetuf.sys

E:\Users\TEMP.PC-de-Dolc3\Local Settings\Application Data\vege.ban

E:\Users\TEMP\Local Settings\Application Data\vege.ban

E:\Users\TEMP.PC-de-Dolc3\Local Settings\Application Data\xyzunore.dl

E:\Users\TEMP\Local Settings\Application Data\xyzunore.dl

E:\Users\TEMP.PC-de-Dolc3\Local Settings\Application Data\zyfotydyjo.exe

E:\Users\TEMP\Local Settings\Application Data\zyfotydyjo.exe

E:\Users\TEMP.PC-de-Dolc3\Local Settings\Temporary Internet Files\etokosyb.scr

E:\Users\TEMP\Local Settings\Temporary Internet Files\etokosyb.scr

E:\Users\TEMP.PC-de-Dolc3\Local Settings\Application Data\sec3.exe

E:\Users\TEMP\Local Settings\Application Data\sec3.exe

E:\Users\TEMP.PC-de-Dolc3\Local Settings\Application Data\anok.bat

E:\Users\TEMP\Local Settings\Application Data\anok.bat

E:\Users\TEMP.PC-de-Dolc3\Local Settings\Application Data\ewabutovah.dl

E:\Users\TEMP\Local Settings\Application Data\ewabutovah.dl

E:\Users\TEMP.PC-de-Dolc3\Local Settings\Application Data\fibaw.ban

E:\Users\TEMP\Local Settings\Application Data\fibaw.ban

E:\Users\TEMP.PC-de-Dolc3\Local Settings\Application Data\ybikohe.vbs

E:\Users\TEMP\Local Settings\Application Data\ybikohe.vbs

E:\Users\TEMP.PC-de-Dolc3\Cookies\uwux.exe

E:\Users\TEMP\Cookies\uwux.exe

E:\Users\TEMP.PC-de-Dolc3\Cookies\jiceji._sy

E:\Users\TEMP\Cookies\jiceji._sy

E:\Users\TEMP.PC-de-Dolc3\Cookies\esycire._dl

E:\Users\TEMP\Cookies\esycire._dl

E:\Users\TEMP.PC-de-Dolc3\Local Settings\Application Data\xacsceib.exe

E:\Users\TEMP\Local Settings\Application Data\xacsceib.exe

E:\Users\TEMP.PC-de-Dolc3\Local Settings\Application Data\cftmon.exe

E:\Users\TEMP\Local Settings\Application Data\cftmon.exe

E:\Users\TEMP.PC-de-Dolc3\Local Settings\Application Data\Windowsupdate.exe

E:\Users\TEMP\Local Settings\Application Data\Windowsupdate.exe

E:\Users\TEMP.PC-de-Dolc3\Local Settings\Application Data\spool.exe

E:\Users\TEMP\Local Settings\Application Data\spool.exe

E:\Users\TEMP.PC-de-Dolc3\Local Settings\Application Data\igutymyko.ban

E:\Users\TEMP\Local Settings\Application Data\igutymyko.ban

E:\Users\TEMP.PC-de-Dolc3\Local Settings\Application Data\ymuxag.com

E:\Users\TEMP\Local Settings\Application Data\ymuxag.com

E:\Users\Zahia\Desktop\Adware Away.lnk

E:\Users\Invité\Desktop\Adware Away.lnk

E:\Users\TEMP.PC-de-Dolc3\Local Settings\Tempmbroit.exe

E:\Users\TEMP\Local Settings\Tempmbroit.exe

E:\Users\TEMP.PC-de-Dolc3\Cookies\syssp.exe

E:\Users\TEMP\Cookies\syssp.exe

E:\Users\TEMP.PC-de-Dolc3\Local Settings\Temp\_check32.bat

E:\Users\TEMP\Local Settings\Temp\_check32.bat

E:\Users\TEMP.PC-de-Dolc3\Application Data\install.exe

E:\Users\TEMP\Application Data\install.exe

E:\Users\TEMP.PC-de-Dolc3\Application Data\shellex.dll

E:\Users\TEMP\Application Data\shellex.dll

E:\Users\TEMP.PC-de-Dolc3\Application Data\srcss.exe

E:\Users\TEMP\Application Data\srcss.exe

E:\Users\TEMP.PC-de-Dolc3\Local Settings\Application Data\Microsoft\Windows\procgdwh32.exe

E:\Users\TEMP\Local Settings\Application Data\Microsoft\Windows\procgdwh32.exe

 

:Reg

 

:Commands

[purity]

[emptytemp]

[start explorer]

[Reboot]

Revenez dans OTMoveIt3,

Clic droit sur la fenêtre "Paste Instructions for Items to be Moved" sous la barre jaune et choisir Coller(Paste).

* Click le bouton rouge Moveit!

* Fermez OTMoveIt3

Votre Pc va redémarrer.

Rendez vous dans le dossier C:\_OTMoveIt\MovedFiles ,

ouvrez le dernier fichier .log

Copiez/collez en le contenu dans votre prochaine réponse

 

 

Bonjour,

 

Vous allez trouver cela étonnant mais je ne saurai vous répondre. Ces dossiers sont apparus du jour au lendemain. Par contre,j'avais ouvert un nouveau compte utilisateur "Zahia". Pour le reste des dossiers, je les ai supprimé. Voici le log demandé

 

========== PROCESSES ==========

Process explorer.exe killed successfully.

========== SERVICES/DRIVERS ==========

========== FILES ==========

File/Folder E:\Program Files\Adware Away not found.

File/Folder E:\ProgramData\Microsoft\Windows\Start Menu\Programs\Adware Away not found.

File/Folder E:\ProgramData\Microsoft\Windows\Start Menu\Programs\Adware Away\Adware Away.lnk not found.

File/Folder E:\ProgramData\Microsoft\Windows\Start Menu\Programs\Adware Away\Uninstall.lnk not found.

File/Folder E:\ProgramData\Microsoft\Windows\Start Menu\Programs\Adware Away\Update.lnk not found.

File/Folder E:\ProgramData\Microsoft\Windows\Start Menu\Programs\Adware Away\User Manual.lnk not found.

File/Folder E:\Windows\adaway.lic not found.

File/Folder E:\Users\Administrateur\Desktop\Adware Away.lnk not found.

File/Folder E:\Users\TEMP.PC-de-Dolc3\Local Settings\Application Data\Microsoft\Windows\pguard.ini not found.

File/Folder E:\Users\TEMP\Local Settings\Application Data\Microsoft\Windows\pguard.ini not found.

File/Folder E:\Users\TEMP.PC-de-Dolc3\Local Settings\Application Data\Microsoft\Windows\pg32.exe not found.

File/Folder E:\Users\TEMP\Local Settings\Application Data\Microsoft\Windows\pg32.exe not found.

File/Folder E:\Users\TEMP.PC-de-Dolc3\Local Settings\Application Data\anesuzenyp.bin not found.

File/Folder E:\Users\TEMP\Local Settings\Application Data\anesuzenyp.bin not found.

File/Folder E:\Users\TEMP.PC-de-Dolc3\Local Settings\Application Data\igyzih._sy not found.

File/Folder E:\Users\TEMP\Local Settings\Application Data\igyzih._sy not found.

File/Folder E:\Users\TEMP.PC-de-Dolc3\Local Settings\Application Data\naciveg.reg not found.

File/Folder E:\Users\TEMP\Local Settings\Application Data\naciveg.reg not found.

File/Folder E:\Users\TEMP.PC-de-Dolc3\Local Settings\Application Data\ubuqicuho.bin not found.

File/Folder E:\Users\TEMP\Local Settings\Application Data\ubuqicuho.bin not found.

File/Folder E:\Users\TEMP.PC-de-Dolc3\Local Settings\Application Data\zokawi.lib not found.

File/Folder E:\Users\TEMP\Local Settings\Application Data\zokawi.lib not found.

File/Folder E:\Users\TEMP.PC-de-Dolc3\Local Settings\Application Data\Microsoft\Internet Explorer\iv.exe not found.

File/Folder E:\Users\TEMP\Local Settings\Application Data\Microsoft\Internet Explorer\iv.exe not found.

File/Folder E:\Users\TEMP.PC-de-Dolc3\Local Settings\Application Data\Microsoft\Internet Explorer\procgdsj32.exe not found.

File/Folder E:\Users\TEMP\Local Settings\Application Data\Microsoft\Internet Explorer\procgdsj32.exe not found.

File/Folder E:\Users\TEMP.PC-de-Dolc3\Local Settings\Application Data\Microsoft\sessmgr.exe not found.

File/Folder E:\Users\TEMP\Local Settings\Application Data\Microsoft\sessmgr.exe not found.

File/Folder E:\Users\TEMP.PC-de-Dolc3\Local Settings\Application Data\Microsoft\spoolsv.exe not found.

File/Folder E:\Users\TEMP\Local Settings\Application Data\Microsoft\spoolsv.exe not found.

File/Folder E:\Users\TEMP.PC-de-Dolc3\Cookies\MM2048.DAT not found.

File/Folder E:\Users\TEMP\Cookies\MM2048.DAT not found.

File/Folder E:\Users\TEMP.PC-de-Dolc3\Cookies\MM256.DAT not found.

File/Folder E:\Users\TEMP\Cookies\MM256.DAT not found.

File/Folder E:\Users\TEMP.PC-de-Dolc3\Local Settings\alg.exe not found.

File/Folder E:\Users\TEMP\Local Settings\alg.exe not found.

File/Folder E:\Users\TEMP.PC-de-Dolc3\Local Settings\Application Data\Microsoft\Windows\sav.exe not found.

File/Folder E:\Users\TEMP\Local Settings\Application Data\Microsoft\Windows\sav.exe not found.

File/Folder E:\Users\TEMP.PC-de-Dolc3\Local Settings\Apps\2.0\srw94.exe not found.

File/Folder E:\Users\TEMP\Local Settings\Apps\2.0\srw94.exe not found.

File/Folder E:\Users\TEMP.PC-de-Dolc3\Cookies\bumo.reg not found.

File/Folder E:\Users\TEMP\Cookies\bumo.reg not found.

File/Folder E:\Users\TEMP.PC-de-Dolc3\Cookies\jababug.inf not found.

File/Folder E:\Users\TEMP\Cookies\jababug.inf not found.

File/Folder E:\Users\TEMP.PC-de-Dolc3\Local Settings\Application Data\ycuc.lib not found.

File/Folder E:\Users\TEMP\Local Settings\Application Data\ycuc.lib not found.

File/Folder E:\Users\TEMP.PC-de-Dolc3\Local Settings\Application Data\bokefa.bat not found.

File/Folder E:\Users\TEMP\Local Settings\Application Data\bokefa.bat not found.

File/Folder E:\Users\TEMP.PC-de-Dolc3\Local Settings\Application Data\sytetuf.sys not found.

File/Folder E:\Users\TEMP\Local Settings\Application Data\sytetuf.sys not found.

File/Folder E:\Users\TEMP.PC-de-Dolc3\Local Settings\Application Data\vege.ban not found.

File/Folder E:\Users\TEMP\Local Settings\Application Data\vege.ban not found.

File/Folder E:\Users\TEMP.PC-de-Dolc3\Local Settings\Application Data\xyzunore.dl not found.

File/Folder E:\Users\TEMP\Local Settings\Application Data\xyzunore.dl not found.

File/Folder E:\Users\TEMP.PC-de-Dolc3\Local Settings\Application Data\zyfotydyjo.exe not found.

File/Folder E:\Users\TEMP\Local Settings\Application Data\zyfotydyjo.exe not found.

File/Folder E:\Users\TEMP.PC-de-Dolc3\Local Settings\Temporary Internet Files\etokosyb.scr not found.

File/Folder E:\Users\TEMP\Local Settings\Temporary Internet Files\etokosyb.scr not found.

File/Folder E:\Users\TEMP.PC-de-Dolc3\Local Settings\Application Data\sec3.exe not found.

File/Folder E:\Users\TEMP\Local Settings\Application Data\sec3.exe not found.

File/Folder E:\Users\TEMP.PC-de-Dolc3\Local Settings\Application Data\anok.bat not found.

File/Folder E:\Users\TEMP\Local Settings\Application Data\anok.bat not found.

File/Folder E:\Users\TEMP.PC-de-Dolc3\Local Settings\Application Data\ewabutovah.dl not found.

File/Folder E:\Users\TEMP\Local Settings\Application Data\ewabutovah.dl not found.

File/Folder E:\Users\TEMP.PC-de-Dolc3\Local Settings\Application Data\fibaw.ban not found.

File/Folder E:\Users\TEMP\Local Settings\Application Data\fibaw.ban not found.

File/Folder E:\Users\TEMP.PC-de-Dolc3\Local Settings\Application Data\ybikohe.vbs not found.

File/Folder E:\Users\TEMP\Local Settings\Application Data\ybikohe.vbs not found.

File/Folder E:\Users\TEMP.PC-de-Dolc3\Cookies\uwux.exe not found.

File/Folder E:\Users\TEMP\Cookies\uwux.exe not found.

File/Folder E:\Users\TEMP.PC-de-Dolc3\Cookies\jiceji._sy not found.

File/Folder E:\Users\TEMP\Cookies\jiceji._sy not found.

File/Folder E:\Users\TEMP.PC-de-Dolc3\Cookies\esycire._dl not found.

File/Folder E:\Users\TEMP\Cookies\esycire._dl not found.

File/Folder E:\Users\TEMP.PC-de-Dolc3\Local Settings\Application Data\xacsceib.exe not found.

File/Folder E:\Users\TEMP\Local Settings\Application Data\xacsceib.exe not found.

File/Folder E:\Users\TEMP.PC-de-Dolc3\Local Settings\Application Data\cftmon.exe not found.

File/Folder E:\Users\TEMP\Local Settings\Application Data\cftmon.exe not found.

File/Folder E:\Users\TEMP.PC-de-Dolc3\Local Settings\Application Data\Windowsupdate.exe not found.

File/Folder E:\Users\TEMP\Local Settings\Application Data\Windowsupdate.exe not found.

File/Folder E:\Users\TEMP.PC-de-Dolc3\Local Settings\Application Data\spool.exe not found.

File/Folder E:\Users\TEMP\Local Settings\Application Data\spool.exe not found.

File/Folder E:\Users\TEMP.PC-de-Dolc3\Local Settings\Application Data\igutymyko.ban not found.

File/Folder E:\Users\TEMP\Local Settings\Application Data\igutymyko.ban not found.

File/Folder E:\Users\TEMP.PC-de-Dolc3\Local Settings\Application Data\ymuxag.com not found.

File/Folder E:\Users\TEMP\Local Settings\Application Data\ymuxag.com not found.

File/Folder E:\Users\Zahia\Desktop\Adware Away.lnk not found.

File/Folder E:\Users\Invité\Desktop\Adware Away.lnk not found.

File/Folder E:\Users\TEMP.PC-de-Dolc3\Local Settings\Tempmbroit.exe not found.

File/Folder E:\Users\TEMP\Local Settings\Tempmbroit.exe not found.

File/Folder E:\Users\TEMP.PC-de-Dolc3\Cookies\syssp.exe not found.

File/Folder E:\Users\TEMP\Cookies\syssp.exe not found.

File/Folder E:\Users\TEMP.PC-de-Dolc3\Local Settings\Temp\_check32.bat not found.

File/Folder E:\Users\TEMP\Local Settings\Temp\_check32.bat not found.

File/Folder E:\Users\TEMP.PC-de-Dolc3\Application Data\install.exe not found.

File/Folder E:\Users\TEMP\Application Data\install.exe not found.

File/Folder E:\Users\TEMP.PC-de-Dolc3\Application Data\shellex.dll not found.

File/Folder E:\Users\TEMP\Application Data\shellex.dll not found.

File/Folder E:\Users\TEMP.PC-de-Dolc3\Application Data\srcss.exe not found.

File/Folder E:\Users\TEMP\Application Data\srcss.exe not found.

File/Folder E:\Users\TEMP.PC-de-Dolc3\Local Settings\Application Data\Microsoft\Windows\procgdwh32.exe not found.

File/Folder E:\Users\TEMP\Local Settings\Application Data\Microsoft\Windows\procgdwh32.exe not found.

========== REGISTRY ==========

========== COMMANDS ==========

File delete failed. E:\Users\Dolc3\AppData\Local\Temp\~DF3EC5.tmp scheduled to be deleted on reboot.

File delete failed. E:\Users\Dolc3\AppData\Local\Temp\~DF6F77.tmp scheduled to be deleted on reboot.

User's Temp folder emptied.

User's Temporary Internet Files folder emptied.

User's Internet Explorer cache folder emptied.

Local Service Temp folder emptied.

Local Service Temporary Internet Files folder emptied.

Windows Temp folder emptied.

FireFox cache emptied.

Opera cache emptied.

Temp folders emptied.

Explorer started successfully

 

OTMoveIt3 by OldTimer - Version 1.0.7.0 log created on 11102008_151920

 

Files moved on Reboot...

E:\Users\Dolc3\AppData\Local\Temp\~DF3EC5.tmp moved successfully.

E:\Users\Dolc3\AppData\Local\Temp\~DF6F77.tmp moved successfully.

Posté(e)
Vous allez trouver cela étonnant mais je ne saurai vous répondre. Ces dossiers sont apparus du jour au lendemain. Par contre,j'avais ouvert un nouveau compte utilisateur "Zahia". Pour le reste des dossiers, je les ai supprimé. Voici le log demandé

 

Etonnant, en effet.

 

Quand les avez vous supprimés ?

Avant, pendant nos procédures ?

 

Tout se passe comme si ce dossier Users était invisible ou protégé.

 

Vous allez télécharger Combofix.

Ce logiciel est très puissant et ne doit pas être utilisé sans une aide compétente sous peine de risquer des dommages irréversibles.

Veuillez noter que ce logiciel est régulièrement mis à jour et que la version que vous allez charger sera obsolète dans quelques jours.

Avant de l'installer,lisez ce Mode opératoire:

Ensuite

Télécharger combofix.exe de sUBs

et sauvegardez le sur le bureau

 

Tout d'abord, Combofix vérifie si la Console de récupération est installée et vous propose de le faire dans le cas contraire.

La Console de récupération Windows vous permettra de démarrer dans un mode spécial de récupération (réparation).

Elle peut être nécessaire si votre ordinateur rencontre un problème après une tentative de nettoyage.

C'est une procédure simple, qui ne vous prendra que peu de temps et pourra peut-être un jour vous sauver la mise.

Après installation,vous devriez voir ce message:

The Recovery Console was successfully installed.

Fermez ou désactivez tous les programmes Antivirus, Antispyware, Pare-feu actifs car ils pourraient perturber le fonctionnement de ComboFix.

Cela est absolument nécessaire au succès de la procédure.

Bien évidemment, vous les rétablirez ensuite.

 

Si vous utilez Combofix pour détruire Bagle, voyez le $ 3 Renommer Combofix

 

*Double cliquer sur combofix.exe pour le lancer.

Ne pas fermer la fenêtre qui vient de s'ouvrir , le bureau serait vide et cela pourrait entraîner un plantage du programme!

1)La console de Récupération

Certaines infections (Rootkit en Mbr)ne peuvent être traitées qu'en utilisant la Console de Récupération,

D'importantes procédures que Combix est susceptible de lancer ne fonctionneront qu'à la condition que la console de récupération(Sous Xp) soit installée

C'est pourquoiil vous est instament conseillé d' installer d'abord la Console de Récupération sur le pc .

Les utilisateurs de Windows Vista peuvent utiliser leur CD Windows pour démarrer en mode Vista Recovery Environment (Environnement de réparation Vista)

Cela permettra de réparer le système au cas ou le pc ne redémarrerait plus suite à la désinfection.

Si c'est déjà fait, passez au point 2).

* Après avoir cliqué sur le lien correspondant à votre version de Windows, vous serez dirigé sur une page:

cliquez sur le bouton Télécharger afin de récupérer le package d'installation sur leBureau:

Ne modifiez pas le nom du fichier

Windows XP Service Pack 2 (SP2) > Microsoft Windows XP Professionnel SP2

* Faites un glisser/déposer de ce fichier sur le fichier ComboFix.exe comme sur la capture >

img-191142280s3.gif

 

* Suivre les indications à l'écran pour lancer ComboFix et lorsqu'on le demande, accepter le Contrat de Licence d'Utilisateur Final pour installer la Console de Récupération Microsoft.

* Lorsque ce sera terminé, un message disant que la Console a bien été installée apparait, puis un rapport nommé CF_RC.txt va s'afficher:

postez en le contenu .

Rejoindre la conversation

Vous pouvez publier maintenant et vous inscrire plus tard. Si vous avez un compte, connectez-vous maintenant pour publier avec votre compte.
Remarque : votre message nécessitera l’approbation d’un modérateur avant de pouvoir être visible.

Invité
Répondre à ce sujet…

×   Collé en tant que texte enrichi.   Coller en tant que texte brut à la place

  Seulement 75 émoticônes maximum sont autorisées.

×   Votre lien a été automatiquement intégré.   Afficher plutôt comme un lien

×   Votre contenu précédent a été rétabli.   Vider l’éditeur

×   Vous ne pouvez pas directement coller des images. Envoyez-les depuis votre ordinateur ou insérez-les depuis une URL.

  • En ligne récemment   0 membre est en ligne

    • Aucun utilisateur enregistré regarde cette page.
×
×
  • Créer...