Aller au contenu
  • Pas encore inscrit ?

    Pourquoi ne pas vous inscrire ? C'est simple, rapide et gratuit.
    Pour en savoir plus, lisez Les avantages de l'inscription... et la Charte de Zébulon.
    De plus, les messages que vous postez en tant qu'invité restent invisibles tant qu'un modérateur ne les a pas validés. Inscrivez-vous, ce sera un gain de temps pour tout le monde, vous, les helpeurs et les modérateurs ! :wink:

Messages recommandés

Posté(e)

j'ai besoin d'aide , merci d'avance.

 

Logfile of Trend Micro HijackThis v2.0.2

Scan saved at 12:48:52, on 10/04/2010

Platform: Windows Vista SP1 (WinNT 6.00.1905)

MSIE: Internet Explorer v7.00 (7.00.6001.18000)

Boot mode: Normal

 

Running processes:

C:\Windows\system32\taskeng.exe

C:\Windows\system32\Dwm.exe

C:\Windows\Explorer.EXE

C:\Program Files\Windows Defender\MSASCui.exe

C:\Program Files\PACKARD BELL\SetUpMyPC\SmpSys.exe

C:\Windows\RtHDVCpl.exe

C:\Program Files\Winamp\winampa.exe

C:\Program Files\Common Files\Real\Update_OB\realsched.exe

C:\Program Files\Common Files\Nero\Lib\NMIndexStoreSvr.exe

C:\Windows\ehome\ehtray.exe

C:\Windows\System32\rundll32.exe

C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe

C:\Program Files\Microsoft Office\Office12\ONENOTEM.EXE

C:\Windows\ehome\ehmsas.exe

C:\Program Files\Packard Bell\Packard Bell Recovery Management\NotificationCenter\Framework.NotificationCenter.exe

C:\Program Files\Internet Explorer\iexplore.exe

C:\Program Files\Internet Explorer\iexplore.exe

C:\Windows\system32\SearchFilterHost.exe

C:\Users\GREG\Documents\Divers New\Programmes\Rapportr.exe

 

R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://homepage.packardbell.com/rdr.aspx?b...imedia_a4730_fr

R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://homepage.packardbell.com/rdr.aspx?b...imedia_a4730_fr

R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896

R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896

R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://homepage.packardbell.com/rdr.aspx?b...imedia_a4730_fr

R0 - HKLM\Software\Microsoft\Internet Explorer\Search,SearchAssistant =

R0 - HKLM\Software\Microsoft\Internet Explorer\Search,CustomizeSearch =

R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName =

O1 - Hosts: ::1 localhost

O2 - BHO: (no name) - {02478D38-C3F9-4efb-9B51-7695ECA05670} - (no file)

O2 - BHO: AcroIEHelperStub - {18DF081C-E8AD-4283-A596-FA578C2EBDC3} - C:\Program Files\Common Files\Adobe\Acrobat\ActiveX\AcroIEHelperShim.dll

O2 - BHO: Google Toolbar Helper - {AA58ED58-01DD-4d91-8333-CF10577473F7} - C:\Program Files\Google\Google Toolbar\GoogleToolbar_32.dll

O2 - BHO: Google Toolbar Notifier BHO - {AF69DE43-7D58-4638-B6FA-CE66B5AD205D} - C:\Program Files\Google\GoogleToolbarNotifier\5.5.4723.1820\swg.dll

O3 - Toolbar: Google Toolbar - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - C:\Program Files\Google\Google Toolbar\GoogleToolbar_32.dll

O4 - HKLM\..\Run: [Windows Defender] %ProgramFiles%\Windows Defender\MSASCui.exe -hide

O4 - HKLM\..\Run: [smpcSys] C:\Program Files\Packard Bell\SetupMyPC\SmpSys.exe

O4 - HKLM\..\Run: [Adobe Reader Speed Launcher] "C:\Program Files\Adobe\Reader 9.0\Reader\Reader_sl.exe"

O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE C:\Windows\system32\NvCpl.dll,NvStartup

O4 - HKLM\..\Run: [RtHDVCpl] RtHDVCpl.exe

O4 - HKLM\..\Run: [WinampAgent] "C:\Program Files\Winamp\winampa.exe"

O4 - HKLM\..\Run: [TkBellExe] "C:\Program Files\Common Files\Real\Update_OB\realsched.exe" -osboot

O4 - HKLM\..\Run: [syncman] c:\windows\system32\wuaucldt.exe

O4 - HKLM\..\Run: [Regedit32] C:\Windows\system32\regedit.exe

O4 - HKCU\..\Run: [smpcSys] C:\Program Files\PACKARD BELL\SetUpMyPC\SmpSys.exe

O4 - HKCU\..\Run: [indxStoreSvr_{79662E04-7C6C-4d9f-84C7-88D8A56B10AA}] "C:\Program Files\Common Files\Nero\Lib\NMIndexStoreSvr.exe" ASO-616B5711-6DAE-4795-A05F-39A1E5104020

O4 - HKCU\..\Run: [ehTray.exe] C:\Windows\ehome\ehTray.exe

O4 - HKCU\..\Run: [azmqkb] RUNDLL32.EXE C:\Users\ROMAIN~1\AppData\Local\Temp\msbkcmph.dll,w

O4 - HKCU\..\Run: [swg] "C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe"

O4 - HKCU\..\Run: [uTorrent] "C:\Program Files\uTorrent\uTorrent.exe"

O4 - HKUS\S-1-5-19\..\Run: [sidebar] %ProgramFiles%\Windows Sidebar\Sidebar.exe /detectMem (User 'SERVICE LOCAL')

O4 - HKUS\S-1-5-19\..\Run: [WindowsWelcomeCenter] rundll32.exe oobefldr.dll,ShowWelcomeCenter (User 'SERVICE LOCAL')

O4 - HKUS\S-1-5-20\..\Run: [sidebar] %ProgramFiles%\Windows Sidebar\Sidebar.exe /detectMem (User 'SERVICE RÉSEAU')

O4 - HKUS\S-1-5-18\..\Run: [uxvefl] RUNDLL32.EXE C:\Windows\TEMP\mssapsmr.dll,w (User 'SYSTEM')

O4 - HKUS\.DEFAULT\..\Run: [uxvefl] RUNDLL32.EXE C:\Windows\TEMP\mssapsmr.dll,w (User 'Default user')

O4 - Startup: OneNote 2007 - Capture d'écran et lancement.lnk = C:\Program Files\Microsoft Office\Office12\ONENOTEM.EXE

O4 - Startup: Sommaire de OneNote.onetoc2

O8 - Extra context menu item: E&xporter vers Microsoft Excel - res://C:\PROGRA~1\MICROS~2\OFFICE11\EXCEL.EXE/3000

O8 - Extra context menu item: Google Sidewiki... - res://C:\Program Files\Google\Google Toolbar\Component\GoogleToolbarDynamic_mui_en_96D6FF0C6D236BF8.dll/cmsidewiki.html

O9 - Extra button: Envoyer à OneNote - {2670000A-7350-4f3c-8081-5663EE0C6C49} - C:\PROGRA~1\MICROS~2\Office12\ONBttnIE.dll

O9 - Extra 'Tools' menuitem: &Envoyer à OneNote - {2670000A-7350-4f3c-8081-5663EE0C6C49} - C:\PROGRA~1\MICROS~2\Office12\ONBttnIE.dll

O9 - Extra button: (no name) - {85d1f590-48f4-11d9-9669-0800200c9a66} - C:\Windows\bdoscandel.exe

O9 - Extra 'Tools' menuitem: Uninstall BitDefender Online Scanner v8 - {85d1f590-48f4-11d9-9669-0800200c9a66} - C:\Windows\bdoscandel.exe

O9 - Extra button: Recherche - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~2\OFFICE11\REFIEBAR.DLL

O13 - Gopher Prefix:

O16 - DPF: {5D86DDB5-BDF9-441B-9E9E-D4730F4EE499} (BDSCANONLINE Control) - http://www.zebulon.fr/scan8/oscan8.cab

O16 - DPF: {E2883E8F-472F-4FB0-9522-AC9BF37916A7} - http://platformdl.adobe.com/NOS/getPlusPlus/1.6/gp.cab

O23 - Service: Adobe Active File Monitor V6 (AdobeActiveFileMonitor6.0) - Unknown owner - C:\Program Files\Adobe\Photoshop Elements 6.0\PhotoshopElementsFileAgent.exe

O23 - Service: Ati External Event Utility - ATI Technologies Inc. - C:\Windows\system32\Ati2evxx.exe

O23 - Service: Empowering Technology Service (ETService) - Unknown owner - C:\Program Files\Packard Bell\Packard Bell Recovery Management\Service\ETService.exe

O23 - Service: FLEXnet Licensing Service - Macrovision Europe Ltd. - C:\Program Files\Common Files\Macrovision Shared\FLEXnet Publisher\FNPLicensingService.exe

O23 - Service: Service Google Update (gupdate) (gupdate) - Google Inc. - C:\Program Files\Google\Update\GoogleUpdate.exe

O23 - Service: Google Software Updater (gusvc) - Google - C:\Program Files\Google\Common\Google Updater\GoogleUpdaterService.exe

O23 - Service: Nero BackItUp Scheduler 3 - Nero AG - C:\Program Files\Nero\Nero8\Nero BackItUp\NBService.exe

O23 - Service: NMIndexingService - Nero AG - C:\Program Files\Common Files\Nero\Lib\NMIndexingService.exe

O23 - Service: NVIDIA Display Driver Service (nvsvc) - NVIDIA Corporation - C:\Windows\system32\nvvsvc.exe

O23 - Service: peresvc Service (peresvc) - Neto systems - C:\Windows\system32\PereSvc.exe

O23 - Service: PLFlash DeviceIoControl Service - Prolific Technology Inc. - C:\Windows\system32\IoctlSvc.exe

 

--

End of file - 7277 bytes

Posté(e)

Bonjour,

 

Téléchargez MBAM

 

Branchez tous les supports amovibles avant de faire ce scan (clé usb/disque dur externe etc)

Avant de lancer Mbam

Vous devez d'abord désactiver vos protections mais vous ne savez pas comment faire

 

* Double cliquez sur l'icône Download_mbam-setup.exe pour lancer le processus d'installation.

Enregistrez le sur le bureau .

Fermer toutes les fenêtres et programmes

Suivez les indications (en particulier le choix de la langue et l'autorisation d'accession à Internet)

N'apportez aucune modification aux réglages par défaut et, en fin d'installation,

Vérifiez que les options Update et Launch soient cochées

MBAM démarrera automatiquement et enverra un message demandant à mettre à jour le programme avant de lancer une analyse.

cliquer sur OK pour fermer la boîte de dialogue..

* Dans l'onglet "mise à jour", cliquez sur le bouton Recherche de mise à jour:

mbam.jpg

Si le pare-feu demande l'autorisation à MBAM de se connecter, acceptez.

* Une fois la mise à jour terminée, allez dans l'onglet Recherche.

* Sélectionnez "Exécuter un examen complet"

* Cliquez sur "Rechercher"

* .L' analyse prendra un certain temps, soyez patient !

* A la fin , un message affichera :

L'examen s'est terminé normalement.

 

*Si MBAM n'a rien trouvé, il le dira aussi.

Cliquez sur "Ok" pour poursuivre.

*Fermez les navigateurs.

Cliquez sur Afficher les résultats .

 

*Sélectionnez tout et cliquez sur Supprimer la sélection ,

MBAM va détruire les fichiers et clés de registre et en mettre une copie dans la quarantaine.

puis ouvrir le Bloc-notes et y copier le rapport d'analyse qui peut être retrouvé sous l'onglet Rapports/logs.

* Copiez-collez ce rapport dans la prochaine réponse.

Posté(e)

Rapport mbam :

 

Malwarebytes' Anti-Malware 1.45

www.malwarebytes.org

 

Version de la base de données: 3973

 

Windows 6.0.6001 Service Pack 1

Internet Explorer 7.0.6001.18000

 

11/04/2010 03:12:51

mbam-log-2010-04-11 (03-12-51).txt

 

Type d'examen: Examen complet (C:\|D:\|E:\|F:\|G:\|H:\|J:\|)

Elément(s) analysé(s): 291886

Temps écoulé: 1 heure(s), 15 minute(s), 57 seconde(s)

 

Processus mémoire infecté(s): 2

Module(s) mémoire infecté(s): 1

Clé(s) du Registre infectée(s): 1

Valeur(s) du Registre infectée(s): 17

Elément(s) de données du Registre infecté(s): 0

Dossier(s) infecté(s): 2

Fichier(s) infecté(s): 134

 

Processus mémoire infecté(s):

c:\Windows\System32\wuaucldt.exe (Trojan.Agent) -> Unloaded process successfully.

C:\Program Files\Protection System\sc.exe (Rogue.ProtectionSystem) -> Unloaded process successfully.

 

Module(s) mémoire infecté(s):

C:\Windows\System32\config\systemprofile\AppData\Local\Windows Server\syubvo.dll (Trojan.Agent) -> Delete on reboot.

 

Clé(s) du Registre infectée(s):

HKEY_CURRENT_USER\SOFTWARE\Protection System (Rogue.ProtectionSystem) -> Quarantined and deleted successfully.

 

Valeur(s) du Registre infectée(s):

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\syncman (Trojan.FakeAlert.H) -> Quarantined and deleted successfully.

HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\security center (Rogue.ProtectionSystem) -> Quarantined and deleted successfully.

HKEY_USERS\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\syncman (Trojan.Agent) -> Quarantined and deleted successfully.

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WBEM\buildw (Malware.Trace) -> Quarantined and deleted successfully.

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WBEM\firstinstallflag (Malware.Trace) -> Quarantined and deleted successfully.

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WBEM\guid (Malware.Trace) -> Quarantined and deleted successfully.

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WBEM\i (Malware.Trace) -> Quarantined and deleted successfully.

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WBEM\uid (Malware.Trace) -> Quarantined and deleted successfully.

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WBEM\ulrn (Malware.Trace) -> Quarantined and deleted successfully.

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WBEM\update (Malware.Trace) -> Quarantined and deleted successfully.

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WBEM\updatenew (Malware.Trace) -> Quarantined and deleted successfully.

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\regedit32 (Trojan.Agent) -> Delete on reboot.

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WBEM\mbt (Backdoor.Bot) -> Quarantined and deleted successfully.

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WBEM\udpe (Malware.Trace) -> Quarantined and deleted successfully.

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WBEM\mpe (Malware.Trace) -> Quarantined and deleted successfully.

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\AppCertDlls\appsecdll (Trojan.Agent) -> Delete on reboot.

HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\syncman (Trojan.Agent) -> Quarantined and deleted successfully.

 

Elément(s) de données du Registre infecté(s):

(Aucun élément nuisible détecté)

 

Dossier(s) infecté(s):

C:\Program Files\Protection System (Rogue.ProtectionSystem) -> Quarantined and deleted successfully.

C:\Users\Phil\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Protection System (Rogue.ProtectionSystem) -> Quarantined and deleted successfully.

 

Fichier(s) infecté(s):

c:\Windows\System32\wuaucldt.exe (Trojan.FakeAlert.H) -> Quarantined and deleted successfully.

C:\Windows\System32\config\systemprofile\AppData\Local\Windows Server\syubvo.dll (Trojan.Agent) -> Delete on reboot.

C:\Users\Phil\AppData\Local\Temp\VRT1518.tmp (Spyware.OnlineGames) -> Quarantined and deleted successfully.

C:\Windows\SC.INS (Trojan.FakeAlert) -> Quarantined and deleted successfully.

C:\Windows\System32\2664,256.exe (Trojan.Downloader) -> Quarantined and deleted successfully.

C:\Windows\System32\opear.exe (Backdoor.Bot) -> Quarantined and deleted successfully.

C:\Windows\System32\BtwSvc.dll (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Windows\System32\d.bin (Backdoor.Bot) -> Quarantined and deleted successfully.

C:\Windows\System32\lsm32.sys (Backdoor.Bot) -> Quarantined and deleted successfully.

C:\Windows\System32\ms.bin (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Windows\System32\PereSvc.exe (Backdoor.Bot) -> Quarantined and deleted successfully.

C:\Windows\System32\PowerDes.exe (Backdoor.Bot) -> Quarantined and deleted successfully.

C:\Windows\System32\so.bin (Backdoor.Bot) -> Quarantined and deleted successfully.

C:\Windows\System32\txpxr_639245576462.b1k (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Windows\System32\w.exe (Backdoor.Bot) -> Quarantined and deleted successfully.

C:\Windows\System32\8833,124.exe (Backdoor.Bot) -> Quarantined and deleted successfully.

C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\99CU6T5H\wCA0FO0T1.bin (Backdoor.Bot) -> Quarantined and deleted successfully.

C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\99CU6T5H\wCA21M9QM.bin (Backdoor.Bot) -> Quarantined and deleted successfully.

C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\99CU6T5H\wCA3I7C7M.bin (Backdoor.Bot) -> Quarantined and deleted successfully.

C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\99CU6T5H\wCAJKKNEB.bin (Backdoor.Bot) -> Quarantined and deleted successfully.

C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\99CU6T5H\wCANEPHUI.bin (Backdoor.Bot) -> Quarantined and deleted successfully.

C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\99CU6T5H\wCAP1S88F.bin (Backdoor.Bot) -> Quarantined and deleted successfully.

C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\99CU6T5H\wCAQKJA8Z.bin (Backdoor.Bot) -> Quarantined and deleted successfully.

C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\99CU6T5H\w[10].bin (Backdoor.Bot) -> Quarantined and deleted successfully.

C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\99CU6T5H\w[11].bin (Backdoor.Bot) -> Quarantined and deleted successfully.

C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\99CU6T5H\w[1].bin (Backdoor.Bot) -> Quarantined and deleted successfully.

C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\99CU6T5H\w[2].bin (Backdoor.Bot) -> Quarantined and deleted successfully.

C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\99CU6T5H\w[3].bin (Backdoor.Bot) -> Quarantined and deleted successfully.

C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\99CU6T5H\w[4].bin (Backdoor.Bot) -> Quarantined and deleted successfully.

C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\99CU6T5H\w[5].bin (Backdoor.Bot) -> Quarantined and deleted successfully.

C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\99CU6T5H\w[6].bin (Backdoor.Bot) -> Quarantined and deleted successfully.

C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\99CU6T5H\w[7].bin (Backdoor.Bot) -> Quarantined and deleted successfully.

C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\99CU6T5H\w[8].bin (Backdoor.Bot) -> Quarantined and deleted successfully.

C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\99CU6T5H\w[9].bin (Backdoor.Bot) -> Quarantined and deleted successfully.

C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\CK5NJHRR\wCA4HXGM9.bin (Backdoor.Bot) -> Quarantined and deleted successfully.

C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\CK5NJHRR\wCAIVV1X4.bin (Backdoor.Bot) -> Quarantined and deleted successfully.

C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\CK5NJHRR\wCAMVFD8N.bin (Backdoor.Bot) -> Quarantined and deleted successfully.

C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\CK5NJHRR\wCAOSET0H.bin (Backdoor.Bot) -> Quarantined and deleted successfully.

C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\CK5NJHRR\wCAZEP31B.bin (Backdoor.Bot) -> Quarantined and deleted successfully.

C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\CK5NJHRR\w[10].bin (Backdoor.Bot) -> Quarantined and deleted successfully.

C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\CK5NJHRR\w[11].bin (Backdoor.Bot) -> Quarantined and deleted successfully.

C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\CK5NJHRR\w[1].bin (Backdoor.Bot) -> Quarantined and deleted successfully.

C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\CK5NJHRR\w[2].bin (Backdoor.Bot) -> Quarantined and deleted successfully.

C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\CK5NJHRR\w[3].bin (Backdoor.Bot) -> Quarantined and deleted successfully.

C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\CK5NJHRR\w[4].bin (Backdoor.Bot) -> Quarantined and deleted successfully.

C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\CK5NJHRR\w[5].bin (Backdoor.Bot) -> Quarantined and deleted successfully.

C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\CK5NJHRR\w[6].bin (Backdoor.Bot) -> Quarantined and deleted successfully.

C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\CK5NJHRR\w[7].bin (Backdoor.Bot) -> Quarantined and deleted successfully.

C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\CK5NJHRR\w[8].bin (Backdoor.Bot) -> Quarantined and deleted successfully.

C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\CK5NJHRR\w[9].bin (Backdoor.Bot) -> Quarantined and deleted successfully.

C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ECVMSDEU\w[2].bin (Backdoor.Bot) -> Quarantined and deleted successfully.

C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ECVMSDEU\w[3].bin (Backdoor.Bot) -> Quarantined and deleted successfully.

C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ECVMSDEU\w[4].bin (Backdoor.Bot) -> Quarantined and deleted successfully.

C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ECVMSDEU\w[5].bin (Backdoor.Bot) -> Quarantined and deleted successfully.

C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ECVMSDEU\w[6].bin (Backdoor.Bot) -> Quarantined and deleted successfully.

C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ECVMSDEU\w[7].bin (Backdoor.Bot) -> Quarantined and deleted successfully.

C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ECVMSDEU\w[8].bin (Backdoor.Bot) -> Quarantined and deleted successfully.

C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ECVMSDEU\w[9].bin (Backdoor.Bot) -> Quarantined and deleted successfully.

C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ECVMSDEU\w[1].bin (Backdoor.Bot) -> Quarantined and deleted successfully.

C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ECVMSDEU\wCA1CZRSL.bin (Backdoor.Bot) -> Quarantined and deleted successfully.

C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ECVMSDEU\wCA7J485V.bin (Backdoor.Bot) -> Quarantined and deleted successfully.

C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ECVMSDEU\wCA7P6M24.bin (Backdoor.Bot) -> Quarantined and deleted successfully.

C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ECVMSDEU\wCA9KDKS7.bin (Backdoor.Bot) -> Quarantined and deleted successfully.

C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ECVMSDEU\wCAACHZ4V.bin (Backdoor.Bot) -> Quarantined and deleted successfully.

C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ECVMSDEU\wCAAWR6H4.bin (Backdoor.Bot) -> Quarantined and deleted successfully.

C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ECVMSDEU\wCAP0YVMI.bin (Backdoor.Bot) -> Quarantined and deleted successfully.

C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ECVMSDEU\w[10].bin (Backdoor.Bot) -> Quarantined and deleted successfully.

C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ECVMSDEU\w[11].bin (Backdoor.Bot) -> Quarantined and deleted successfully.

C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\PVTOQN6U\wCADCFE7W.bin (Backdoor.Bot) -> Quarantined and deleted successfully.

C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\PVTOQN6U\wCAEY1ALL.bin (Backdoor.Bot) -> Quarantined and deleted successfully.

C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\PVTOQN6U\wCAZNCRBN.bin (Backdoor.Bot) -> Quarantined and deleted successfully.

C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\PVTOQN6U\w[10].bin (Backdoor.Bot) -> Quarantined and deleted successfully.

C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\PVTOQN6U\w[11].bin (Backdoor.Bot) -> Quarantined and deleted successfully.

C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\PVTOQN6U\w[3].bin (Backdoor.Bot) -> Quarantined and deleted successfully.

C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\PVTOQN6U\w[4].bin (Backdoor.Bot) -> Quarantined and deleted successfully.

C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\PVTOQN6U\w[5].bin (Backdoor.Bot) -> Quarantined and deleted successfully.

C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\PVTOQN6U\w[6].bin (Backdoor.Bot) -> Quarantined and deleted successfully.

C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\PVTOQN6U\w[7].bin (Backdoor.Bot) -> Quarantined and deleted successfully.

C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\PVTOQN6U\w[8].bin (Backdoor.Bot) -> Quarantined and deleted successfully.

C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\PVTOQN6U\w[9].bin (Backdoor.Bot) -> Quarantined and deleted successfully.

C:\Windows\System32\config\systemprofile\AppData\Local\Windows Server\kwqnhx.dll (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Windows\Temp\VRT5EC5.tmp (Spyware.OnlineGames) -> Quarantined and deleted successfully.

C:\Windows\Temp\VRT625A.tmp (Spyware.OnlineGames) -> Quarantined and deleted successfully.

C:\Windows\Temp\VRT6F4.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.

C:\Windows\Temp\VRT7E24.tmp (Spyware.OnlineGames) -> Quarantined and deleted successfully.

C:\Windows\Temp\VRTA3BE.tmp (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Windows\Temp\VRTA563.tmp (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Windows\Temp\VRTA7C.tmp (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Windows\Temp\VRTA90A.tmp (Trojan.FakeAlert) -> Quarantined and deleted successfully.

C:\Windows\Temp\VRTADBC.tmp (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Windows\Temp\VRTB126.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.

C:\Windows\Temp\VRTC301.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.

C:\Windows\Temp\VRTC8FA.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.

C:\Windows\Temp\VRTCC63.tmp (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Windows\Temp\VRTCD3D.tmp (Spyware.OnlineGames) -> Quarantined and deleted successfully.

C:\Windows\Temp\VRTD578.tmp (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Windows\Temp\VRTD6B0.tmp (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Windows\Temp\VRTD74C.tmp (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Windows\Temp\VRTE04.tmp (Spyware.OnlineGames) -> Quarantined and deleted successfully.

C:\Windows\Temp\VRTEDD8.tmp (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Windows\Temp\VRTF6EE.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.

C:\Windows\Temp\VRTF8EE.tmp (Spyware.OnlineGames) -> Quarantined and deleted successfully.

C:\Windows\Temp\VRTFCF4.tmp (Spyware.OnlineGames) -> Quarantined and deleted successfully.

C:\Windows\Temp\VRTFD14.tmp (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Windows\Temp\VRTFDCF.tmp (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Windows\Temp\VRT57F1.tmp (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Windows\Temp\t4m0_133245647419.bk.old (Backdoor.Bot) -> Quarantined and deleted successfully.

C:\Windows\Temp\t4m0_47666247813.bk.old (Backdoor.Bot) -> Quarantined and deleted successfully.

C:\Windows\Temp\t4m0_593671430200.bk.old (Backdoor.Bot) -> Quarantined and deleted successfully.

C:\Windows\Temp\t4m0_629739602016.bk.old (Backdoor.Bot) -> Quarantined and deleted successfully.

C:\Windows\Temp\t4m0_814342369465.bk.old (Backdoor.Bot) -> Quarantined and deleted successfully.

C:\Windows\Temp\t4m0_8948697515.bk.old (Backdoor.Bot) -> Quarantined and deleted successfully.

C:\Windows\Temp\tmp0_516790841472.bk.old (Backdoor.Bot) -> Quarantined and deleted successfully.

C:\Windows\Temp\tmp0_874621837604.bk.old (Backdoor.Bot) -> Quarantined and deleted successfully.

C:\Windows\Temp\VRT1333.tmp (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Windows\Temp\VRT19A8.tmp (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Windows\Temp\VRT1FF1.tmp (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Windows\Temp\VRT2146.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.

C:\Windows\Temp\VRT2D56.tmp (Spyware.OnlineGames) -> Quarantined and deleted successfully.

C:\Windows\Temp\VRT2EDD.tmp (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Windows\Temp\VRT3542.tmp (Spyware.OnlineGames) -> Quarantined and deleted successfully.

C:\Windows\Temp\VRT4E20.tmp (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Windows\Temp\VRT5215.tmp (Spyware.OnlineGames) -> Quarantined and deleted successfully.

C:\Program Files\Protection System\sc.exe (Rogue.ProtectionSystem) -> Quarantined and deleted successfully.

C:\Users\Phil\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Protection System\Live Support.lnk (Rogue.ProtectionSystem) -> Quarantined and deleted successfully.

C:\Users\Phil\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Protection System\Protection System.lnk (Rogue.ProtectionSystem) -> Quarantined and deleted successfully.

C:\Users\Phil\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Protection System\Uninstall.lnk (Rogue.ProtectionSystem) -> Quarantined and deleted successfully.

C:\Windows\System32\grouppolicy\User\Scripts\Logon\autorun.bat (Malware.Trace) -> Quarantined and deleted successfully.

C:\Windows\System32\config\systemprofile\wuaucldt.exe (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Windows\System32\FInstall.sys (Backdoor.Bot) -> Quarantined and deleted successfully.

C:\Users\Phil\oashdihasidhasuidhiasdhiashdiuasdhasd (Malware.Trace) -> Quarantined and deleted successfully.

C:\Windows\System32\config\systemprofile\oashdihasidhasuidhiasdhiashdiuasdhasd (Malware.Trace) -> Quarantined and deleted successfully.

C:\Windows\sc.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.

C:\Windows\System32\GroupPolicy\User\Scripts\Logon\winlogo.exe (Trojan.Agent) -> Quarantined and deleted successfully.

Posté(e)

C'est à votre convenance.

Les éléments en quarantaine sont inoffensifs.

 

 

Scan en ligne

NOTE: Le scan en ligne sera à faire avec Internet Explorer.

Désactiver l'antivirus actuel

Vous devez désactiver vos protections et ne savez pas comment faire

Sur PCA,En Français

Notez que ce scan examine , mais ne désinfecte pas

Kaspersky

Sous Vista,il faut désactiver l'UAC, et cliquer droit sur Internet Explorer / Exécuter en tant qu'administrateur et coller l'URL de Kaspersky

http://www.kaspersky.com/kos/eng/partner/d...kavwebscan.html

Vider la corbeille.

* Cliquer sur Accept

* Une barre jaune va demander d'accepter l'installation de Kavwebscan_Unicode.cab, installer l'Active X.

* cliquer une nouvelle fois sur "Accept"

* Les bases de mises à jour vont s'installer, patienter un moment

* Cliquer sur Next.

* Cliquer sur My Computer, le scan se met en route;

attendre la fin du scan sans fermer la fenêtre sinon il s'arrêtera.

A la fin du scan, si des objets infectés sont découverts, cliquer sur Save report as...

Choisir bureau et nommer le rapport "rapport Kaspersky" et dans le champ d'enregistrement, choisir "fichiers texte" enregistrer le rapport.

Copier/coller l'entièreté du fichier texte ouvert, par clic droit dessus, sélectionner tout/copier.

Coller ce rapport dans la réponse sur le forum.

 

Rejoindre la conversation

Vous pouvez publier maintenant et vous inscrire plus tard. Si vous avez un compte, connectez-vous maintenant pour publier avec votre compte.
Remarque : votre message nécessitera l’approbation d’un modérateur avant de pouvoir être visible.

Invité
Répondre à ce sujet…

×   Collé en tant que texte enrichi.   Coller en tant que texte brut à la place

  Seulement 75 émoticônes maximum sont autorisées.

×   Votre lien a été automatiquement intégré.   Afficher plutôt comme un lien

×   Votre contenu précédent a été rétabli.   Vider l’éditeur

×   Vous ne pouvez pas directement coller des images. Envoyez-les depuis votre ordinateur ou insérez-les depuis une URL.

  • En ligne récemment   0 membre est en ligne

    • Aucun utilisateur enregistré regarde cette page.
×
×
  • Créer...