Aller au contenu
  • Pas encore inscrit ?

    Pourquoi ne pas vous inscrire ? C'est simple, rapide et gratuit.
    Pour en savoir plus, lisez Les avantages de l'inscription... et la Charte de Zébulon.
    De plus, les messages que vous postez en tant qu'invité restent invisibles tant qu'un modérateur ne les a pas validés. Inscrivez-vous, ce sera un gain de temps pour tout le monde, vous, les helpeurs et les modérateurs ! :wink:

Messages recommandés

Posté(e)

salut tt le monde

voila les raports que j'ai avec hijacthis + antivira + mbam

 

Avira AntiVir Personal

Report file date: mercredi 19 novembre 2008 10:45

 

Scanning for 1041267 virus strains and unwanted programs.

 

Licensed to: Avira AntiVir PersonalEdition Classic

Serial number: 0000149996-ADJIE-0001

Platform: Windows XP

Windows version: (Service Pack 2) [5.1.2600]

Boot mode: Normally booted

Username: SYSTEM

Computer name: ADMIN

 

Version information:

BUILD.DAT : 8.2.0.336 16933 Bytes 30/10/2008 11:40:00

AVSCAN.EXE : 8.1.4.7 315649 Bytes 26/06/2008 09:57:53

AVSCAN.DLL : 8.1.4.0 40705 Bytes 26/05/2008 08:56:40

LUKE.DLL : 8.1.4.5 164097 Bytes 12/06/2008 13:44:19

LUKERES.DLL : 8.1.4.0 12033 Bytes 26/05/2008 08:58:52

ANTIVIR0.VDF : 7.1.0.0 15603712 Bytes 27/10/2008 09:41:57

ANTIVIR1.VDF : 7.1.0.56 411136 Bytes 09/11/2008 09:42:05

ANTIVIR2.VDF : 7.1.0.89 221184 Bytes 16/11/2008 09:42:09

ANTIVIR3.VDF : 7.1.0.106 91136 Bytes 19/11/2008 09:42:11

Engineversion : 8.2.0.34

AEVDF.DLL : 8.1.0.6 102772 Bytes 19/11/2008 09:42:46

AESCRIPT.DLL : 8.1.1.15 332156 Bytes 19/11/2008 09:42:44

AESCN.DLL : 8.1.1.5 123251 Bytes 19/11/2008 09:42:42

AERDL.DLL : 8.1.1.3 438645 Bytes 19/11/2008 09:42:40

AEPACK.DLL : 8.1.3.4 393591 Bytes 19/11/2008 09:42:37

AEOFFICE.DLL : 8.1.0.30 196986 Bytes 19/11/2008 09:42:33

AEHEUR.DLL : 8.1.0.71 1487222 Bytes 19/11/2008 09:42:32

AEHELP.DLL : 8.1.2.0 119159 Bytes 19/11/2008 09:42:22

AEGEN.DLL : 8.1.1.4 319861 Bytes 19/11/2008 09:42:21

AEEMU.DLL : 8.1.0.9 393588 Bytes 19/11/2008 09:42:18

AECORE.DLL : 8.1.5.0 172407 Bytes 19/11/2008 09:42:15

AEBB.DLL : 8.1.0.3 53618 Bytes 19/11/2008 09:42:13

AVWINLL.DLL : 1.0.0.12 15105 Bytes 09/07/2008 09:40:05

AVPREF.DLL : 8.0.2.0 38657 Bytes 16/05/2008 10:28:01

AVREP.DLL : 8.0.0.2 98344 Bytes 19/11/2008 09:42:12

AVREG.DLL : 8.0.0.1 33537 Bytes 09/05/2008 12:26:40

AVARKT.DLL : 1.0.0.23 307457 Bytes 12/02/2008 09:29:23

AVEVTLOG.DLL : 8.0.0.16 119041 Bytes 12/06/2008 13:27:49

SQLITE3.DLL : 3.3.17.1 339968 Bytes 22/01/2008 18:28:02

SMTPLIB.DLL : 1.2.0.23 28929 Bytes 12/06/2008 13:49:40

NETNT.DLL : 8.0.0.1 7937 Bytes 25/01/2008 13:05:10

RCIMAGE.DLL : 8.0.0.51 2371841 Bytes 12/06/2008 14:48:07

RCTEXT.DLL : 8.0.52.0 86273 Bytes 27/06/2008 14:34:37

 

Configuration settings for the scan:

Jobname..........................: Complete system scan

Configuration file...............: C:\Program Files\Avira\AntiVir PersonalEdition Classic\sysscan.avp

Logging..........................: low

Primary action...................: interactive

Secondary action.................: ignore

Scan master boot sector..........: on

Scan boot sector.................: on

Boot sectors.....................: C:, D:, E:,

Process scan.....................: on

Scan registry....................: on

Search for rootkits..............: on

Scan all files...................: All files

Scan archives....................: on

Recursion depth..................: 20

Smart extensions.................: on

Macro heuristic..................: on

File heuristic...................: medium

 

Start of the scan: mercredi 19 novembre 2008 10:45

 

Starting search for hidden objects.

'35859' objects were checked, '0' hidden objects were found.

 

The scan of running processes will be started

Scan process 'ping.exe' - '1' Module(s) have been scanned

Scan process 'avscan.exe' - '1' Module(s) have been scanned

Scan process 'avcenter.exe' - '1' Module(s) have been scanned

Scan process 'avgnt.exe' - '1' Module(s) have been scanned

Scan process 'sched.exe' - '1' Module(s) have been scanned

Scan process 'avguard.exe' - '1' Module(s) have been scanned

Scan process 'ping.exe' - '1' Module(s) have been scanned

Scan process 'alg.exe' - '1' Module(s) have been scanned

Scan process 'MgApp.exe' - '1' Module(s) have been scanned

Scan process 'RocketDock.exe' - '1' Module(s) have been scanned

Scan process 'E_FATIBZE.EXE' - '1' Module(s) have been scanned

Scan process 'BosS.Redhouane.exe' - '1' Module(s) have been scanned

Module is infected -> 'C:\Documents and Settings\PC\Application Data\Microsoft\Windows\PC\Data\Security Settings\Antivirus\Scan\History\BosS.Redhouane.exe'

Scan process 'Services.exe' - '1' Module(s) have been scanned

Module is infected -> 'C:\Documents and Settings\PC\Application Data\Microsoft\Windows\PC\Data\Security Settings\Antivirus\Scan\History\Services.exe'

Scan process 'Csrss.exe' - '1' Module(s) have been scanned

Module is infected -> 'C:\Documents and Settings\PC\Application Data\Microsoft\Windows\PC\Data\Security Settings\Antivirus\Scan\History\Csrss.exe'

Scan process 'smss.exe' - '1' Module(s) have been scanned

Module is infected -> 'C:\Documents and Settings\PC\Application Data\Microsoft\Windows\PC\Data\Security Settings\Antivirus\Scan\History\smss.exe'

Scan process 'Winlogon.exe' - '1' Module(s) have been scanned

Module is infected -> 'C:\Documents and Settings\PC\Application Data\Microsoft\Windows\PC\Data\Security Settings\Antivirus\Scan\History\Winlogon.exe'

Scan process 'Killer.exe' - '1' Module(s) have been scanned

Module is infected -> 'C:\Documents and Settings\PC\Application Data\Microsoft\Windows\PC\Data\Security Settings\Antivirus\Scan\History\Killer.exe'

Scan process 'rundll32.exe' - '1' Module(s) have been scanned

Scan process 'RTHDCPL.exe' - '1' Module(s) have been scanned

Scan process 'PC.exe' - '1' Module(s) have been scanned

Module is infected -> 'C:\WINDOWS\PC\PC.exe'

Scan process 'explorer.exe' - '1' Module(s) have been scanned

Scan process 'ULCDRSvr.exe' - '1' Module(s) have been scanned

Scan process 'svchost.exe' - '1' Module(s) have been scanned

Scan process 'nvsvc32.exe' - '1' Module(s) have been scanned

Scan process 'DevSvc.exe' - '1' Module(s) have been scanned

Scan process 'spoolsv.exe' - '1' Module(s) have been scanned

Scan process 'svchost.exe' - '1' Module(s) have been scanned

Scan process 'svchost.exe' - '1' Module(s) have been scanned

Scan process 'svchost.exe' - '1' Module(s) have been scanned

Scan process 'svchost.exe' - '1' Module(s) have been scanned

Scan process 'svchost.exe' - '1' Module(s) have been scanned

Scan process 'lsass.exe' - '1' Module(s) have been scanned

Scan process 'services.exe' - '1' Module(s) have been scanned

Scan process 'winlogon.exe' - '1' Module(s) have been scanned

Scan process 'csrss.exe' - '1' Module(s) have been scanned

Scan process 'smss.exe' - '1' Module(s) have been scanned

Process 'BosS.Redhouane.exe' has been terminated

Process 'Services.exe' has been terminated

Process 'Csrss.exe' has been terminated

Process 'smss.exe' has been terminated

Process 'Winlogon.exe' has been terminated

Process 'Killer.exe' has been terminated

Process 'PC.exe' has been terminated

C:\Documents and Settings\PC\Application Data\Microsoft\Windows\PC\Data\Security Settings\Antivirus\Scan\History\BosS.Redhouane.exe

[DETECTION] Contains recognition pattern of the WORM/AutoIt.DO worm

[NOTE] The file was deleted!

C:\Documents and Settings\PC\Application Data\Microsoft\Windows\PC\Data\Security Settings\Antivirus\Scan\History\Services.exe

[DETECTION] Contains recognition pattern of the WORM/AutoIt.DO worm

[NOTE] The file was deleted!

C:\Documents and Settings\PC\Application Data\Microsoft\Windows\PC\Data\Security Settings\Antivirus\Scan\History\Csrss.exe

[DETECTION] Contains recognition pattern of the WORM/AutoIt.DO worm

[NOTE] The file was deleted!

C:\Documents and Settings\PC\Application Data\Microsoft\Windows\PC\Data\Security Settings\Antivirus\Scan\History\smss.exe

[DETECTION] Contains recognition pattern of the WORM/AutoIt.DO worm

[NOTE] The file was deleted!

C:\Documents and Settings\PC\Application Data\Microsoft\Windows\PC\Data\Security Settings\Antivirus\Scan\History\Winlogon.exe

[DETECTION] Contains recognition pattern of the WORM/AutoIt.DO worm

[NOTE] The file was deleted!

C:\Documents and Settings\PC\Application Data\Microsoft\Windows\PC\Data\Security Settings\Antivirus\Scan\History\Killer.exe

[DETECTION] Contains recognition pattern of the WORM/AutoIt.DO worm

[NOTE] The file was deleted!

C:\WINDOWS\PC\PC.exe

[DETECTION] Contains recognition pattern of the WORM/AutoIt.DO worm

[NOTE] WORM/AutoIt.DO:[HKEY_LOCAL_MACHINE\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN]:<KiSs>=sz:PC.exe

[NOTE] The file was deleted!

 

43 processes with 36 modules were scanned

 

Starting master boot sector scan:

Master boot sector HD0

[iNFO] No virus was found!

Master boot sector HD1

[iNFO] No virus was found!

 

Start scanning boot sectors:

Boot sector 'C:\'

[iNFO] No virus was found!

Boot sector 'D:\'

[iNFO] No virus was found!

Boot sector 'E:\'

[iNFO] No virus was found!

 

Starting to scan the registry.

 

The registry was scanned ( '49' files ).

 

 

Starting the file scan:

 

Begin scan in 'C:\'

C:\pagefile.sys

[WARNING] The file could not be opened!

C:\Redhouane.eXe

[DETECTION] Contains recognition pattern of the WORM/AutoIt.DO worm

[NOTE] The file was deleted!

C:\SoMoZATY.exe

[DETECTION] Contains recognition pattern of the WORM/AutoIt.DO worm

[NOTE] The file was deleted!

C:\Documents and Settings\PC\Application Data\Microsoft\Windows\PC\Data\Security Settings\Antivirus\Scan\History\PC.exe

[DETECTION] Contains recognition pattern of the WORM/AutoIt.DO worm

[NOTE] The file was deleted!

C:\Documents and Settings\PC\Menu Démarrer\Programmes\Démarrage\GoodBye.PC.bat

[DETECTION] Contains recognition pattern of the WORM/AutoIt.DO worm

[NOTE] The file was deleted!

C:\System Volume Information\_restore{74C3FF89-5CD0-4C34-B877-30DE44651658}\RP1\A0000378.exe

[DETECTION] Contains recognition pattern of the WORM/AutoIt.DO worm

[NOTE] The file was deleted!

C:\System Volume Information\_restore{74C3FF89-5CD0-4C34-B877-30DE44651658}\RP1\A0000379.exe

[DETECTION] Contains recognition pattern of the WORM/AutoIt.DO worm

[NOTE] The file was deleted!

C:\System Volume Information\_restore{74C3FF89-5CD0-4C34-B877-30DE44651658}\RP1\A0000380.exe

[DETECTION] Contains recognition pattern of the WORM/AutoIt.DO worm

[NOTE] The file was deleted!

C:\System Volume Information\_restore{74C3FF89-5CD0-4C34-B877-30DE44651658}\RP1\A0000381.exe

[DETECTION] Contains recognition pattern of the WORM/AutoIt.DO worm

[NOTE] The file was deleted!

C:\System Volume Information\_restore{74C3FF89-5CD0-4C34-B877-30DE44651658}\RP1\A0000382.exe

[DETECTION] Contains recognition pattern of the WORM/AutoIt.DO worm

[NOTE] The file was deleted!

C:\System Volume Information\_restore{74C3FF89-5CD0-4C34-B877-30DE44651658}\RP1\A0000383.exe

[DETECTION] Contains recognition pattern of the WORM/AutoIt.DO worm

[NOTE] The file was deleted!

C:\System Volume Information\_restore{74C3FF89-5CD0-4C34-B877-30DE44651658}\RP1\A0000384.exe

[DETECTION] Contains recognition pattern of the WORM/AutoIt.DO worm

[NOTE] The file was deleted!

C:\System Volume Information\_restore{74C3FF89-5CD0-4C34-B877-30DE44651658}\RP1\A0000385.eXe

[DETECTION] Contains recognition pattern of the WORM/AutoIt.DO worm

[NOTE] The file was deleted!

C:\System Volume Information\_restore{74C3FF89-5CD0-4C34-B877-30DE44651658}\RP1\A0000386.exe

[DETECTION] Contains recognition pattern of the WORM/AutoIt.DO worm

[NOTE] The file was deleted!

C:\System Volume Information\_restore{74C3FF89-5CD0-4C34-B877-30DE44651658}\RP1\A0000387.exe

[DETECTION] Contains recognition pattern of the WORM/AutoIt.DO worm

[NOTE] The file was deleted!

C:\System Volume Information\_restore{74C3FF89-5CD0-4C34-B877-30DE44651658}\RP1\A0000388.bat

[DETECTION] Contains recognition pattern of the WORM/AutoIt.DO worm

[NOTE] The file was deleted!

Begin scan in 'D:\' <MUSIQUE>

D:\SoMoZATY.exe

[DETECTION] Contains recognition pattern of the WORM/AutoIt.DO worm

[NOTE] The file was deleted!

D:\Redhouane.eXe

[DETECTION] Contains recognition pattern of the WORM/AutoIt.DO worm

[NOTE] The file was deleted!

D:\System Volume Information\_restore{74C3FF89-5CD0-4C34-B877-30DE44651658}\RP1\A0000389.exe

[DETECTION] Contains recognition pattern of the WORM/AutoIt.DO worm

[NOTE] The file was deleted!

D:\System Volume Information\_restore{74C3FF89-5CD0-4C34-B877-30DE44651658}\RP1\A0000390.eXe

[DETECTION] Contains recognition pattern of the WORM/AutoIt.DO worm

[NOTE] The file was deleted!

Begin scan in 'E:\' <FILM>

E:\Redhouane.eXe

[DETECTION] Contains recognition pattern of the WORM/AutoIt.DO worm

[NOTE] The file was deleted!

E:\SoMoZATY.exe

[DETECTION] Contains recognition pattern of the WORM/AutoIt.DO worm

[NOTE] The file was deleted!

E:\System Volume Information\_restore{4046E047-F531-49C8-AFA8-82DA0E32FB45}\RP147\A0021736.exe

[DETECTION] Contains recognition pattern of the WORM/AutoIt.DO worm

[NOTE] The file was deleted!

E:\System Volume Information\_restore{74C3FF89-5CD0-4C34-B877-30DE44651658}\RP1\A0000391.eXe

[DETECTION] Contains recognition pattern of the WORM/AutoIt.DO worm

[NOTE] The file was deleted!

E:\System Volume Information\_restore{74C3FF89-5CD0-4C34-B877-30DE44651658}\RP1\A0000392.exe

[DETECTION] Contains recognition pattern of the WORM/AutoIt.DO worm

[NOTE] The file was deleted!

 

 

End of the scan: mercredi 19 novembre 2008 11:01

Used time: 16:28 Minute(s)

 

The scan has been done completely.

 

3569 Scanning directories

135232 Files were scanned

38 viruses and/or unwanted programs were found

0 Files were classified as suspicious:

31 files were deleted

0 files were repaired

0 files were moved to quarantine

0 files were renamed

1 Files cannot be scanned

135193 Files not concerned

1057 Archives were scanned

1 Warnings

31 Notes

35859 Objects were scanned with rootkit scan

0 Hidden objects were found

 

****************************************************

 

 

Logfile of Trend Micro HijackThis v2.0.2

Scan saved at 12:25:49, on 19/11/2008

Platform: Windows XP SP2 (WinNT 5.01.2600)

MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)

Boot mode: Normal

 

Running processes:

C:\WINDOWS\System32\smss.exe

C:\WINDOWS\system32\winlogon.exe

C:\WINDOWS\system32\services.exe

C:\WINDOWS\system32\lsass.exe

C:\WINDOWS\system32\svchost.exe

C:\WINDOWS\System32\svchost.exe

C:\WINDOWS\system32\spoolsv.exe

C:\Program Files\Avira\AntiVir PersonalEdition Classic\sched.exe

C:\WINDOWS\Explorer.EXE

C:\Program Files\Avira\AntiVir PersonalEdition Classic\avguard.exe

C:\Program Files\Fichiers communs\InterVideo\DeviceService\DevSvc.exe

C:\Program Files\Avira\AntiVir PersonalEdition Classic\avgnt.exe

C:\WINDOWS\system32\RUNDLL32.EXE

C:\WINDOWS\RTHDCPL.EXE

C:\WINDOWS\System32\spool\DRIVERS\W32X86\3\E_FATIBZE.EXE

C:\WINDOWS\system32\nvsvc32.exe

C:\WINDOWS\system32\svchost.exe

C:\Program Files\Fichiers communs\Ulead Systems\DVD\ULCDRSvr.exe

C:\WINDOWS\BricoPacks\Vista Inspirat 2\RocketDock\RocketDock.exe

C:\PROGRA~1\Magentic\bin\MgApp.exe

C:\WINDOWS\system32\wuauclt.exe

C:\Program Files\Trend Micro\HijackThis\HijackThis.exe

 

R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName = Liens

R3 - URLSearchHook: MyPlayCity Toolbar - {4724c5d8-dfa7-417a-a2f5-1eabfee9b4ac} - C:\Program Files\MyPlayCity\tbMyP0.dll

O2 - BHO: Skype add-on (mastermind) - {22BF413B-C6D2-4d91-82A9-A0F997BA588C} - C:\Program Files\Skype\Toolbars\Internet Explorer\SkypeIEPlugin.dll

O2 - BHO: MyPlayCity Toolbar - {4724c5d8-dfa7-417a-a2f5-1eabfee9b4ac} - C:\Program Files\MyPlayCity\tbMyP0.dll

O2 - BHO: iGamebar - {4E7BD74F-2B8D-469E-C0FF-FD69B994BD34} - C:\PROGRA~1\igamebar\igamebar.dll

O2 - BHO: Google Toolbar Helper - {AA58ED58-01DD-4d91-8333-CF10577473F7} - c:\program files\google\googletoolbar1.dll

O2 - BHO: EpsonToolBandKicker Class - {E99421FB-68DD-40F0-B4AC-B7027CAE2F1A} - C:\Program Files\EPSON\EPSON Web-To-Page\EPSON Web-To-Page.dll

O3 - Toolbar: iGamebar - {4E7BD74F-2B8D-469E-C0FF-FD69B994BD34} - C:\PROGRA~1\igamebar\igamebar.dll

O3 - Toolbar: EPSON Web-To-Page - {EE5D279F-081B-4404-994D-C6B60AAEBA6D} - C:\Program Files\EPSON\EPSON Web-To-Page\EPSON Web-To-Page.dll

O3 - Toolbar: &Google - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - c:\program files\google\googletoolbar1.dll

O3 - Toolbar: MyPlayCity Toolbar - {4724c5d8-dfa7-417a-a2f5-1eabfee9b4ac} - C:\Program Files\MyPlayCity\tbMyP0.dll

O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE C:\WINDOWS\system32\NvCpl.dll,NvStartup

O4 - HKLM\..\Run: [skyTel] SkyTel.EXE

O4 - HKLM\..\Run: [nwiz] nwiz.exe /install

O4 - HKLM\..\Run: [avgnt] "C:\Program Files\Avira\AntiVir PersonalEdition Classic\avgnt.exe" /min

O4 - HKLM\..\Run: [NvMediaCenter] RUNDLL32.EXE C:\WINDOWS\system32\NvMcTray.dll,NvTaskbarInit

O4 - HKLM\..\Run: [RTHDCPL] RTHDCPL.EXE

O4 - HKLM\..\Run: [Alcmtr] ALCMTR.EXE

O4 - HKCU\..\Run: [MsgCenterExe] "C:\Program Files\Fichiers communs\Real\Update_OB\RealOneMessageCenter.exe" -osboot

O4 - HKCU\..\Run: [EPSON Stylus D92 Series] C:\WINDOWS\System32\spool\DRIVERS\W32X86\3\E_FATIBZE.EXE /FU "C:\WINDOWS\TEMP\E_S94.tmp" /EF "HKCU"

O4 - HKCU\..\Run: [Magentic] C:\PROGRA~1\Magentic\bin\Magentic.exe /c

O4 - HKUS\S-1-5-19\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'SERVICE LOCAL')

O4 - HKUS\S-1-5-20\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'SERVICE RÉSEAU')

O4 - HKUS\S-1-5-18\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'SYSTEM')

O4 - HKUS\.DEFAULT\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'Default user')

O4 - Startup: RocketDock.lnk = C:\WINDOWS\BricoPacks\Vista Inspirat 2\RocketDock\RocketDock.exe

O9 - Extra button: Skype - {77BF5300-1474-4EC7-9980-D32B190E9B07} - C:\Program Files\Skype\Toolbars\Internet Explorer\SkypeIEPlugin.dll

O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe

O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe

O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe

O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe

O18 - Protocol: skype4com - {FFC8B962-9B40-4DFF-9458-1830C7DD7F5D} - C:\PROGRA~1\FICHIE~1\Skype\SKYPE4~1.DLL

O23 - Service: Avira AntiVir Personal - Free Antivirus Scheduler (AntiVirScheduler) - Avira GmbH - C:\Program Files\Avira\AntiVir PersonalEdition Classic\sched.exe

O23 - Service: Avira AntiVir Personal - Free Antivirus Guard (AntiVirService) - Avira GmbH - C:\Program Files\Avira\AntiVir PersonalEdition Classic\avguard.exe

O23 - Service: Boonty Games - BOONTY - C:\Program Files\Fichiers communs\BOONTY Shared\Service\Boonty.exe

O23 - Service: Capture Device Service - InterVideo Inc. - C:\Program Files\Fichiers communs\InterVideo\DeviceService\DevSvc.exe

O23 - Service: Google Updater Service (gusvc) - Google - C:\Program Files\Google\Common\Google Updater\GoogleUpdaterService.exe

O23 - Service: NVIDIA Display Driver Service (NVSvc) - NVIDIA Corporation - C:\WINDOWS\system32\nvsvc32.exe

O23 - Service: ServiceLayer - Nokia. - C:\Program Files\Fichiers communs\PCSuite\Services\ServiceLayer.exe

O23 - Service: Ulead Burning Helper (UleadBurningHelper) - Ulead Systems, Inc. - C:\Program Files\Fichiers communs\Ulead Systems\DVD\ULCDRSvr.exe

O24 - Desktop Component 0: (no name) - About:Home

O24 - Desktop Component 1: (no name) - http://www.aljazeera.net/%20-%20141k

O24 - Desktop Component 2: (no name) - http://www.the-soft.net/?go=taks%20-%2086k

O24 - Desktop Component 3: (no name) - http://www.the-soft.net/?go=taks&action=showall

O24 - Desktop Component 4: (no name) - http://www.aljazeera.net/

O24 - Desktop Component 5: (no name) - http://www.aljazeerasport.net/

O24 - Desktop Component 6: (no name) - http://www.radioalgerie.net/

 

--

End of file - 6050 bytes

 

 

****************************************

 

Malwarebytes' Anti-Malware 1.30

Version de la base de données: 1411

Windows 5.1.2600 Service Pack 2

 

19/11/2008 12:20:19

mbam-log-2008-11-19 (12-20-19).txt

 

Type de recherche: Examen complet (C:\|D:\|E:\|G:\|H:\|)

Eléments examinés: 80934

Temps écoulé: 29 minute(s), 18 second(s)

 

Processus mémoire infecté(s): 0

Module(s) mémoire infecté(s): 0

Clé(s) du Registre infectée(s): 2

Valeur(s) du Registre infectée(s): 0

Elément(s) de données du Registre infecté(s): 4

Dossier(s) infecté(s): 0

Fichier(s) infecté(s): 0

 

Processus mémoire infecté(s):

(Aucun élément nuisible détecté)

 

Module(s) mémoire infecté(s):

(Aucun élément nuisible détecté)

 

Clé(s) du Registre infectée(s):

HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{1a93c934-025b-4c3a-b38e-9654a7003239} (Adware.Gamesbar) -> Quarantined and deleted successfully.

HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{6f282b65-56bf-4bd1-a8b2-a4449a05863d} (Adware.Gamesbar) -> Quarantined and deleted successfully.

 

Valeur(s) du Registre infectée(s):

(Aucun élément nuisible détecté)

 

Elément(s) de données du Registre infecté(s):

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions (Hijack.FolderOptions) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoRun (Hijack.Run) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.

HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableTaskMgr (Hijack.TaskManager) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.

HKEY_CURRENT_USER\SOFTWARE\Policies\Microsoft\Windows\System\DisableCMD (Hijack.CMDPrompt) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.

 

Dossier(s) infecté(s):

(Aucun élément nuisible détecté)

 

Fichier(s) infecté(s):

(Aucun élément nuisible détecté)

Rejoindre la conversation

Vous pouvez publier maintenant et vous inscrire plus tard. Si vous avez un compte, connectez-vous maintenant pour publier avec votre compte.
Remarque : votre message nécessitera l’approbation d’un modérateur avant de pouvoir être visible.

Invité
Répondre à ce sujet…

×   Collé en tant que texte enrichi.   Coller en tant que texte brut à la place

  Seulement 75 émoticônes maximum sont autorisées.

×   Votre lien a été automatiquement intégré.   Afficher plutôt comme un lien

×   Votre contenu précédent a été rétabli.   Vider l’éditeur

×   Vous ne pouvez pas directement coller des images. Envoyez-les depuis votre ordinateur ou insérez-les depuis une URL.

  • En ligne récemment   0 membre est en ligne

    • Aucun utilisateur enregistré regarde cette page.
×
×
  • Créer...