Trojan help me!

Résolu/Fermé
kinalys - 14 janv. 2010 à 01:47
 Utilisateur anonyme - 17 janv. 2010 à 17:56
Bonjour, j'ai besoin d'aide, mon pc est infecté...!Merci de bien vouloir m'aider à me débarrasser de ça ! Voila le rapport d'Antivir, 4 détections :



Avira AntiVir Personal
Report file date: 13 janvier 2010 17:43

Scanning for 1525890 virus strains and unwanted programs.

Licensee : Avira AntiVir Personal - FREE Antivirus
Serial number : 0000149996-ADJIE-0000001
Platform : Windows XP
Windows version : (Service Pack 2) [5.1.2600]
Boot mode : Normally booted
Username : SYSTEM
Computer name : ANIK

Version information:
BUILD.DAT : 9.0.0.415 21609 Bytes 08/11/2009 10:00:00
AVSCAN.EXE : 9.0.3.10 466689 Bytes 13/10/2009 16:26:33
AVSCAN.DLL : 9.0.3.0 40705 Bytes 27/02/2009 15:58:24
LUKE.DLL : 9.0.3.2 209665 Bytes 20/02/2009 16:35:49
LUKERES.DLL : 9.0.2.0 12033 Bytes 27/02/2009 15:58:52
VBASE000.VDF : 7.10.0.0 19875328 Bytes 06/11/2009 12:35:52
VBASE001.VDF : 7.10.1.0 1372672 Bytes 19/11/2009 11:22:48
VBASE002.VDF : 7.10.1.1 2048 Bytes 19/11/2009 11:22:48
VBASE003.VDF : 7.10.1.2 2048 Bytes 19/11/2009 11:22:48
VBASE004.VDF : 7.10.1.3 2048 Bytes 19/11/2009 11:22:48
VBASE005.VDF : 7.10.1.4 2048 Bytes 19/11/2009 11:22:48
VBASE006.VDF : 7.10.1.5 2048 Bytes 19/11/2009 11:22:48
VBASE007.VDF : 7.10.1.6 2048 Bytes 19/11/2009 11:22:48
VBASE008.VDF : 7.10.1.7 2048 Bytes 19/11/2009 11:22:49
VBASE009.VDF : 7.10.1.8 2048 Bytes 19/11/2009 11:22:49
VBASE010.VDF : 7.10.1.9 2048 Bytes 19/11/2009 11:22:49
VBASE011.VDF : 7.10.1.10 2048 Bytes 19/11/2009 11:22:49
VBASE012.VDF : 7.10.1.11 2048 Bytes 19/11/2009 11:22:49
VBASE013.VDF : 7.10.1.79 209920 Bytes 25/11/2009 11:22:53
VBASE014.VDF : 7.10.1.128 197632 Bytes 30/11/2009 11:22:56
VBASE015.VDF : 7.10.1.178 195584 Bytes 07/12/2009 11:22:59
VBASE016.VDF : 7.10.1.224 183296 Bytes 14/12/2009 11:23:04
VBASE017.VDF : 7.10.1.247 182272 Bytes 15/12/2009 11:23:07
VBASE018.VDF : 7.10.2.30 198144 Bytes 21/12/2009 11:23:10
VBASE019.VDF : 7.10.2.63 187392 Bytes 24/12/2009 11:23:13
VBASE020.VDF : 7.10.2.93 195072 Bytes 29/12/2009 11:23:16
VBASE021.VDF : 7.10.2.131 201216 Bytes 07/01/2010 11:23:19
VBASE022.VDF : 7.10.2.158 192000 Bytes 11/01/2010 11:23:22
VBASE023.VDF : 7.10.2.159 2048 Bytes 11/01/2010 11:23:22
VBASE024.VDF : 7.10.2.160 2048 Bytes 11/01/2010 11:23:23
VBASE025.VDF : 7.10.2.161 2048 Bytes 11/01/2010 11:23:23
VBASE026.VDF : 7.10.2.162 2048 Bytes 11/01/2010 11:23:23
VBASE027.VDF : 7.10.2.163 2048 Bytes 11/01/2010 11:23:24
VBASE028.VDF : 7.10.2.164 2048 Bytes 11/01/2010 11:23:25
VBASE029.VDF : 7.10.2.165 2048 Bytes 11/01/2010 11:23:25
VBASE030.VDF : 7.10.2.166 2048 Bytes 11/01/2010 11:23:26
VBASE031.VDF : 7.10.2.177 151040 Bytes 13/01/2010 11:23:28
Engineversion : 8.2.1.134
AEVDF.DLL : 8.1.1.2 106867 Bytes 08/11/2009 12:38:52
AESCRIPT.DLL : 8.1.3.7 594296 Bytes 13/01/2010 11:24:03
AESCN.DLL : 8.1.3.0 127348 Bytes 13/01/2010 11:23:59
AESBX.DLL : 8.1.1.1 246132 Bytes 08/11/2009 12:38:44
AERDL.DLL : 8.1.3.4 479605 Bytes 13/01/2010 11:23:58
AEPACK.DLL : 8.2.0.4 422263 Bytes 13/01/2010 11:23:55
AEOFFICE.DLL : 8.1.0.38 196987 Bytes 08/11/2009 12:38:38
AEHEUR.DLL : 8.1.0.194 2228599 Bytes 13/01/2010 11:23:51
AEHELP.DLL : 8.1.9.0 237943 Bytes 13/01/2010 11:23:37
AEGEN.DLL : 8.1.1.83 369014 Bytes 13/01/2010 11:23:35
AEEMU.DLL : 8.1.1.0 393587 Bytes 08/11/2009 12:38:26
AECORE.DLL : 8.1.9.1 180598 Bytes 13/01/2010 11:23:32
AEBB.DLL : 8.1.0.3 53618 Bytes 08/11/2009 12:38:20
AVWINLL.DLL : 9.0.0.3 18177 Bytes 12/12/2008 13:47:59
AVPREF.DLL : 9.0.3.0 44289 Bytes 26/08/2009 20:14:02
AVREP.DLL : 8.0.0.3 155905 Bytes 20/01/2009 19:34:28
AVREG.DLL : 9.0.0.0 36609 Bytes 05/12/2008 15:32:09
AVARKT.DLL : 9.0.0.3 292609 Bytes 24/03/2009 20:05:41
AVEVTLOG.DLL : 9.0.0.7 167169 Bytes 30/01/2009 15:37:08
SQLITE3.DLL : 3.6.1.0 326401 Bytes 28/01/2009 20:03:49
SMTPLIB.DLL : 9.2.0.25 28417 Bytes 02/02/2009 13:21:33
NETNT.DLL : 9.0.0.0 11521 Bytes 05/12/2008 15:32:10
RCIMAGE.DLL : 9.0.0.25 2438913 Bytes 15/05/2009 20:39:58
RCTEXT.DLL : 9.0.73.0 86785 Bytes 13/10/2009 17:25:47

Configuration settings for the scan:
Jobname.............................: Complete system scan
Configuration file..................: c:\program files\avira\antivir desktop\sysscan.avp
Logging.............................: low
Primary action......................: interactive
Secondary action....................: ignore
Scan master boot sector.............: on
Scan boot sector....................: on
Boot sectors........................: C:,
Process scan........................: on
Scan registry.......................: on
Search for rootkits.................: on
Integrity checking of system files..: off
Scan all files......................: All files
Scan archives.......................: on
Recursion depth.....................: 20
Smart extensions....................: on
Macro heuristic.....................: on
File heuristic......................: medium

Start of the scan: 13 janvier 2010 17:43

Starting search for hidden objects.
An ARK library instance is already running.

The scan of running processes will be started
Scan process 'avscan.exe' - '1' Module(s) have been scanned
Scan process 'avscan.exe' - '1' Module(s) have been scanned
Scan process 'avcenter.exe' - '1' Module(s) have been scanned
Scan process 'chrome.exe' - '1' Module(s) have been scanned
Scan process 'chrome.exe' - '1' Module(s) have been scanned
Scan process 'CLI.exe' - '1' Module(s) have been scanned
Scan process 'wuauclt.exe' - '1' Module(s) have been scanned
Scan process 'alg.exe' - '1' Module(s) have been scanned
Scan process 'wmiapsrv.exe' - '1' Module(s) have been scanned
Scan process 'unsecapp.exe' - '1' Module(s) have been scanned
Scan process 'DLG.exe' - '1' Module(s) have been scanned
Scan process 'btdna.exe' - '1' Module(s) have been scanned
Scan process 'NMBgMonitor.exe' - '1' Module(s) have been scanned
Scan process 'ctfmon.exe' - '1' Module(s) have been scanned
Scan process 'avgnt.exe' - '1' Module(s) have been scanned
Scan process 'jusched.exe' - '1' Module(s) have been scanned
Scan process 'stsystra.exe' - '1' Module(s) have been scanned
Scan process 'WLTRAY.EXE' - '1' Module(s) have been scanned
Scan process 'CLI.exe' - '1' Module(s) have been scanned
Scan process 'SynTPEnh.exe' - '1' Module(s) have been scanned
Scan process 'wmiprvse.exe' - '1' Module(s) have been scanned
Scan process 'msa.exe' - '1' Module(s) have been scanned
Scan process 'c.exe' - '1' Module(s) have been scanned
Scan process 'explorer.exe' - '1' Module(s) have been scanned
Scan process 'wuauclt.exe' - '1' Module(s) have been scanned
Scan process 'svchost.exe' - '1' Module(s) have been scanned
Scan process 'NicConfigSvc.exe' - '1' Module(s) have been scanned
Scan process 'MDM.EXE' - '1' Module(s) have been scanned
Scan process 'jqs.exe' - '1' Module(s) have been scanned
Scan process 'avguard.exe' - '1' Module(s) have been scanned
Scan process 'svchost.exe' - '1' Module(s) have been scanned
Scan process 'sched.exe' - '1' Module(s) have been scanned
Scan process 'spoolsv.exe' - '1' Module(s) have been scanned
Scan process 'AAWService.exe' - '1' Module(s) have been scanned
Scan process 'BCMWLTRY.EXE' - '1' Module(s) have been scanned
Scan process 'WLTRYSVC.EXE' - '1' Module(s) have been scanned
Scan process 'svchost.exe' - '1' Module(s) have been scanned
Scan process 'ati2evxx.exe' - '1' Module(s) have been scanned
Scan process 'svchost.exe' - '1' Module(s) have been scanned
Scan process 'svchost.exe' - '1' Module(s) have been scanned
Scan process 'svchost.exe' - '1' Module(s) have been scanned
Scan process 'svchost.exe' - '1' Module(s) have been scanned
Scan process 'ati2evxx.exe' - '1' Module(s) have been scanned
Scan process 'lsass.exe' - '1' Module(s) have been scanned
Scan process 'services.exe' - '1' Module(s) have been scanned
Scan process 'winlogon.exe' - '1' Module(s) have been scanned
Scan process 'csrss.exe' - '1' Module(s) have been scanned
Scan process 'smss.exe' - '1' Module(s) have been scanned
48 processes with 48 modules were scanned

Starting master boot sector scan:
Master boot sector HD0
[INFO] No virus was found!

Start scanning boot sectors:
Boot sector 'C:\'
[INFO] No virus was found!

Starting to scan executable files (registry).
The registry was scanned ( '58' files ).


Starting the file scan:

Begin scan in 'C:\'
C:\pagefile.sys
[WARNING] The file could not be opened!
[NOTE] This file is a Windows system file.
[NOTE] This file cannot be opened for scanning.
C:\Documents and Settings\Anik Goulet\Local Settings\Temp\a.exe
[DETECTION] Is the TR/FraudPack.ajwb Trojan
C:\Documents and Settings\Anik Goulet\Local Settings\Temp\d.exe
[DETECTION] Is the TR/FraudPack.ajwb Trojan
C:\Documents and Settings\Anik Goulet\Local Settings\Temp\sshnas.dll
[DETECTION] Is the TR/Crypt.XPACK.Gen Trojan
C:\WINDOWS\system32\sshnas.dll
[DETECTION] Is the TR/Crypt.XPACK.Gen Trojan

Beginning disinfection:
C:\Documents and Settings\Anik Goulet\Local Settings\Temp\a.exe
[DETECTION] Is the TR/FraudPack.ajwb Trojan
[NOTE] The file was moved to '4bb36938.qua'!
C:\Documents and Settings\Anik Goulet\Local Settings\Temp\d.exe
[DETECTION] Is the TR/FraudPack.ajwb Trojan
[NOTE] The file was moved to '4ad597b9.qua'!
C:\Documents and Settings\Anik Goulet\Local Settings\Temp\sshnas.dll
[DETECTION] Is the TR/Crypt.XPACK.Gen Trojan
[NOTE] The file was moved to '4bb6697e.qua'!
C:\WINDOWS\system32\sshnas.dll
[DETECTION] Is the TR/Crypt.XPACK.Gen Trojan
[WARNING] An error has occurred and the file was not deleted. ErrorID: 26003
[WARNING] The file could not be deleted!
[NOTE] Attempting to perform action using the ARK library.
[NOTE] The file was moved to '4bb66970.qua'!


End of the scan: 13 janvier 2010 19:45
Used time: 2:00:19 Hour(s)

The scan has been done completely.

7953 Scanned directories
332376 Files were scanned
4 Viruses and/or unwanted programs were found
0 Files were classified as suspicious
0 files were deleted
0 Viruses and unwanted programs were repaired
4 Files were moved to quarantine
0 Files were renamed
1 Files cannot be scanned
332371 Files not concerned
5582 Archives were scanned
2 Warnings
5 Notes
A voir également:

36 réponses

Utilisateur anonyme
14 janv. 2010 à 02:02
salut :

Desactive ton antivirus le temps de la manip ainsi que ton parefeu si présent(car il est detecté a tort comme infection)

▶ Télécharge et installe List&Kill'em et enregistre le sur ton bureau

▶ Branche clés usb , disques durs externes , mp3 , mp4 , etc..

double clique ( clic droit "executer en tant qu'administrateur" pour Vista/7 ) sur le raccourci sur ton bureau pour lancer l'installation

coche la case "creer une icone sur le bureau"

une fois terminée , clic sur "terminer" et le programme se lancera seul

choisis la langue puis choisis l'option 1 = Mode Recherche

▶ laisse travailler l'outil

à l'apparition de la fenetre blanche , c'est un peu long , c'est normal , le programme n'est pas bloqué.

un rapport du nom de catchme apparait sur ton bureau , ignore-le,ne le poste pas , mais ne le supprime pas pour l instant, le scan n'est pas fini.

▶ Poste le contenu du rapport qui s'ouvre aux 100 % du scan à l'ecran "COMPLETED"

tu peux supprimer le rapport catchme.log de ton bureau maintenant.

0
Merci d'avoir répondu aussi vite, alors voila le rapport
List'em by g3n-h@ckm@n 1.1.8.1

Thx to El Desaparecido.....& CCM team

User : Anik Goulet (Administrateurs) # ANIK
Update on 11/12/2009 by g3n-h@ckm@n ::::: 19:25
Start at: 20:31:06 | 2010-01-13
Contact : g3n-h@ckm@n sur CCM

Mobile AMD Sempron(tm) Processor 3500+
Microsoft Windows XP Édition familiale (5.1.2600 32-bit) # Service Pack 2
Internet Explorer 6.0.2900.2180
Windows Firewall Status : Enabled
AV : AntiVir Desktop 9.0.1.32 [ (!) Disabled | Updated ]

C:\ -> Disque fixe local | 52,81 Go (32,17 Go free) | NTFS
D:\ -> Disque CD-ROM
E:\ -> Disque CD-ROM

¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤ Processes running

C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\csrss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\Ati2evxx.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\system32\Ati2evxx.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\WLTRYSVC.EXE
C:\WINDOWS\System32\bcmwltry.exe
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\Avira\AntiVir Desktop\sched.exe
C:\WINDOWS\system32\svchost.exe
C:\Program Files\Avira\AntiVir Desktop\avguard.exe
C:\Program Files\Java\jre6\bin\jqs.exe
C:\Program Files\Fichiers communs\Microsoft Shared\VS7DEBUG\MDM.EXE
C:\Program Files\Dell\QuickSet\NICCONFIGSVC.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\msa.exe
C:\WINDOWS\system32\wbem\wmiprvse.exe
C:\Program Files\Synaptics\SynTP\SynTPEnh.exe
C:\Program Files\ATI Technologies\ATI.ACE\CLI.EXE
C:\WINDOWS\system32\WLTRAY.exe
C:\WINDOWS\stsystra.exe
C:\Program Files\Java\jre6\bin\jusched.exe
C:\Program Files\Avira\AntiVir Desktop\avgnt.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\Fichiers communs\Ahead\lib\NMBgMonitor.exe
C:\Program Files\DNA\btdna.exe
C:\Program Files\Digital Line Detect\DLG.exe
C:\WINDOWS\system32\wbem\wmiapsrv.exe
C:\WINDOWS\System32\alg.exe
C:\WINDOWS\system32\wuauclt.exe
C:\Program Files\ATI Technologies\ATI.ACE\cli.exe
C:\Program Files\Windows Live\Messenger\msnmsgr.exe
C:\Program Files\Windows Live\Contacts\wlcomm.exe
C:\Program Files\Avira\AntiVir Desktop\avscan.exe
C:\Program Files\Google\Chrome\Application\chrome.exe
C:\Program Files\Google\Chrome\Application\chrome.exe
C:\Program Files\Google\Chrome\Application\chrome.exe
C:\Program Files\Google\Chrome\Application\chrome.exe
C:\Program Files\Google\Chrome\Application\chrome.exe
C:\Documents and Settings\Anik Goulet\Bureau\List_Kill'em\List_Kill'em.exe
C:\WINDOWS\system32\cmd.exe
C:\WINDOWS\system32\wbem\wmiprvse.exe
C:\Documents and Settings\Anik Goulet\Local Settings\Temp\5D.tmp\pv.exe

======================
Keys "Run"
======================
[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
ctfmon.exe REG_SZ C:\WINDOWS\system32\ctfmon.exe
BgMonitor_{79662E04-7C6C-4d9f-84C7-88D8A56B10AA} REG_SZ "C:\Program Files\Fichiers communs\Ahead\lib\NMBgMonitor.exe"
Cld2000.exe REG_SZ C:\Program Files\Calendrier\Cld2000.exe
Netlog 24 REG_SZ C:\Program Files\Netlog 24\Notifier\Netlog24Notifier.exe
BitTorrent DNA REG_SZ "C:\Program Files\DNA\btdna.exe"
LREC75DND7 REG_SZ C:\DOCUME~1\ANIKGO~1\LOCALS~1\Temp\c.exe

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
ATICCC REG_SZ "C:\Program Files\ATI Technologies\ATI.ACE\CLIStart.exe"
SynTPEnh REG_SZ C:\Program Files\Synaptics\SynTP\SynTPEnh.exe
Broadcom Wireless Manager UI REG_SZ C:\WINDOWS\system32\WLTRAY.exe
SigmatelSysTrayApp REG_SZ stsystra.exe
NWEReboot REG_SZ
HPDJ Taskbar Utility REG_SZ C:\WINDOWS\system32\spool\drivers\w32x86\3\hpztsb04.exe
QuickTime Task REG_SZ "C:\Program Files\QuickTime\qttask.exe" -atboottime
MyWebSearch Plugin REG_SZ rundll32 C:\PROGRA~1\MYWEBS~1\bar\1.bin\M3PLUGIN.DLL,UPF
Adobe Reader Speed Launcher REG_SZ "C:\Program Files\Adobe\Reader 9.0\Reader\Reader_sl.exe"
Adobe ARM REG_SZ "C:\Program Files\Fichiers communs\Adobe\ARM\1.0\AdobeARM.exe"
SunJavaUpdateSched REG_SZ "C:\Program Files\Java\jre6\bin\jusched.exe"
avgnt REG_SZ "C:\Program Files\Avira\AntiVir Desktop\avgnt.exe" /min

[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\RunServices]

[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\RunOnce]

=====================
Other Keys
=====================
[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System]
dontdisplaylastusername REG_DWORD 0 (0x0)
legalnoticecaption REG_SZ
legalnoticetext REG_SZ
shutdownwithoutlogon REG_DWORD 1 (0x1)
undockwithoutlogon REG_DWORD 1 (0x1)

===============
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\explorer]
NoDriveTypeAutoRun REG_DWORD 157 (0x9d)

===============
[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\explorer]
HonorAutoRunSetting REG_DWORD 1 (0x1)

===============
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows]
AppInit_DLLS REG_SZ

===============
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\AtiExtEvent]
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\crypt32chain]
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\cryptnet]
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\cscdll]
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\ScCertProp]
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\Schedule]
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\sclgntfy]
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\SensLogn]
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\termsrv]
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\WgaLogon]
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\wlballoon]

===============
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\ShellExecuteHooks]
{AEB6717E-7E19-11d0-97EE-00C04FD91972} REG_SZ

===============
[HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\standardprofile\authorizedapplications\list]
%windir%\system32\sessmgr.exe REG_SZ %windir%\system32\sessmgr.exe:*:enabled:@xpsp2res.dll,-22019
%windir%\Network Diagnostic\xpnetdiag.exe REG_SZ %windir%\Network Diagnostic\xpnetdiag.exe:*:Enabled:@xpsp3res.dll,-20000
C:\Program Files\AOL\Active Virus Shield\avp.exe REG_SZ C:\Program Files\AOL\Active Virus Shield\avp.exe:*:Enabled:Active Virus Shield
C:\Program Files\Messenger\msmsgs.exe REG_SZ C:\Program Files\Messenger\msmsgs.exe:*:Enabled:Windows Messenger
C:\Program Files\mIRC\mirc.exe REG_SZ C:\Program Files\mIRC\mirc.exe:*:Enabled:mIRC
C:\Program Files\eMule\emule.exe REG_SZ C:\Program Files\eMule\emule.exe:*:Enabled:eMule
C:\Program Files\IncrediMail\bin\ImApp.exe REG_SZ C:\Program Files\IncrediMail\bin\ImApp.exe:*:Enabled:IncrediMail
C:\Program Files\IncrediMail\bin\IncMail.exe REG_SZ C:\Program Files\IncrediMail\bin\IncMail.exe:*:Enabled:IncrediMail
C:\Program Files\IncrediMail\bin\ImpCnt.exe REG_SZ C:\Program Files\IncrediMail\bin\ImpCnt.exe:*:Enabled:IncrediMail
C:\Program Files\Yahoo!\Messenger\YahooMessenger.exe REG_SZ C:\Program Files\Yahoo!\Messenger\YahooMessenger.exe:*:Enabled:Yahoo! Messenger
C:\Program Files\Yahoo!\Messenger\YServer.exe REG_SZ C:\Program Files\Yahoo!\Messenger\YServer.exe:*:Enabled:Yahoo! FT Server
C:\Program Files\BitTorrent\bittorrent.exe REG_SZ C:\Program Files\BitTorrent\bittorrent.exe:*:Enabled:BitTorrent
C:\Program Files\DNA\btdna.exe REG_SZ C:\Program Files\DNA\btdna.exe:*:Enabled:DNA
C:\Documents and Settings\Anik Goulet\Application Data\U3\000015E96A63CC90\0DE4F643-C398-46ec-9339-2362F2311932\Exec\skype.exe REG_SZ C:\Documents and Settings\Anik Goulet\Application Data\U3\000015E96A63CC90\0DE4F643-C398-46ec-9339-2362F2311932\Exec\skype.exe:*:Enabled:Skype
C:\Program Files\Windows Live\Messenger\wlcsdk.exe REG_SZ C:\Program Files\Windows Live\Messenger\wlcsdk.exe:*:Enabled:Windows Live Call
C:\Program Files\Windows Live\Messenger\msnmsgr.exe REG_SZ C:\Program Files\Windows Live\Messenger\msnmsgr.exe:*:Enabled:Windows Live Messenger
C:\Program Files\Windows Live\Sync\WindowsLiveSync.exe REG_SZ C:\Program Files\Windows Live\Sync\WindowsLiveSync.exe:*:Enabled:Windows Live FolderShare

[HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\domainprofile\authorizedapplications\list]
%windir%\system32\sessmgr.exe REG_SZ %windir%\system32\sessmgr.exe:*:enabled:@xpsp2res.dll,-22019
%windir%\Network Diagnostic\xpnetdiag.exe REG_SZ %windir%\Network Diagnostic\xpnetdiag.exe:*:Enabled:@xpsp3res.dll,-20000
C:\Program Files\Windows Live\Messenger\wlcsdk.exe REG_SZ C:\Program Files\Windows Live\Messenger\wlcsdk.exe:*:Enabled:Windows Live Call
C:\Program Files\Windows Live\Messenger\msnmsgr.exe REG_SZ C:\Program Files\Windows Live\Messenger\msnmsgr.exe:*:Enabled:Windows Live Messenger
C:\Program Files\Windows Live\Sync\WindowsLiveSync.exe REG_SZ C:\Program Files\Windows Live\Sync\WindowsLiveSync.exe:*:Enabled:Windows Live FolderShare

===============
ActivX controls
===============
HKEY_LOCAL_MACHINE\software\microsoft\code store database\distribution units\{05CA9FB0-3E3E-4B36-BF41-0E3A5CAA8CD8}
HKEY_LOCAL_MACHINE\software\microsoft\code store database\distribution units\{05D44720-58E3-49E6-BDF6-D00330E511D3}
HKEY_LOCAL_MACHINE\software\microsoft\code store database\distribution units\{0CCA191D-13A6-4E29-B746-314DEE697D83}
HKEY_LOCAL_MACHINE\software\microsoft\code store database\distribution units\{166B1BCA-3F9C-11CF-8075-444553540000}
HKEY_LOCAL_MACHINE\software\microsoft\code store database\distribution units\{1D4DB7D2-6EC9-47A3-BD87-1E41684E07BB}
HKEY_LOCAL_MACHINE\software\microsoft\code store database\distribution units\{20A60F0D-9AFA-4515-A0FD-83BD84642501}
HKEY_LOCAL_MACHINE\software\microsoft\code store database\distribution units\{3BB54395-5982-4788-8AF4-B5388FFDD0D8}
HKEY_LOCAL_MACHINE\software\microsoft\code store database\distribution units\{4F1E5B1A-2A80-42CA-8532-2D05CB959537}
HKEY_LOCAL_MACHINE\software\microsoft\code store database\distribution units\{5736C456-EA94-4AAC-BB08-917ABDD035B3}
HKEY_LOCAL_MACHINE\software\microsoft\code store database\distribution units\{5D6F45B3-9043-443D-A792-115447494D24}
HKEY_LOCAL_MACHINE\software\microsoft\code store database\distribution units\{77E32299-629F-43C6-AB77-6A1E6D7663F6}
HKEY_LOCAL_MACHINE\software\microsoft\code store database\distribution units\{7E980B9B-8AE5-466A-B6D6-DA8CF814E78A}
HKEY_LOCAL_MACHINE\software\microsoft\code store database\distribution units\{8AD9C840-044E-11D1-B3E9-00805F499D93}
HKEY_LOCAL_MACHINE\software\microsoft\code store database\distribution units\{95B5D20C-BD31-4489-8ABF-F8C8BE748463}
HKEY_LOCAL_MACHINE\software\microsoft\code store database\distribution units\{9AA73F41-EC64-489E-9A73-9CD52E528BC4}
HKEY_LOCAL_MACHINE\software\microsoft\code store database\distribution units\{AF2E62B6-F9E1-4D4F-A10A-9DC8E6DCBCC0}
HKEY_LOCAL_MACHINE\software\microsoft\code store database\distribution units\{B8BE5E93-A60C-4D26-A2DC-220313175592}
HKEY_LOCAL_MACHINE\software\microsoft\code store database\distribution units\{BD8667B7-38D8-4C77-B580-18C3E146372C}
HKEY_LOCAL_MACHINE\software\microsoft\code store database\distribution units\{C3F79A2B-B9B4-4A66-B012-3EE46475B072}
HKEY_LOCAL_MACHINE\software\microsoft\code store database\distribution units\{CAFEEFAC-0015-0000-0006-ABCDEFFEDCBA}
HKEY_LOCAL_MACHINE\software\microsoft\code store database\distribution units\{CAFEEFAC-0016-0000-0017-ABCDEFFEDCBA}
HKEY_LOCAL_MACHINE\software\microsoft\code store database\distribution units\{CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA}
HKEY_LOCAL_MACHINE\software\microsoft\code store database\distribution units\{D27CDB6E-AE6D-11CF-96B8-444553540000}
HKEY_LOCAL_MACHINE\software\microsoft\code store database\distribution units\{D27CDB6E-AE6D-12CF-96B8-444553540000}
HKEY_LOCAL_MACHINE\software\microsoft\code store database\distribution units\{DA2AA6CF-5C7A-4B71-BC3B-C771BB369937}
HKEY_LOCAL_MACHINE\software\microsoft\code store database\distribution units\{E2883E8F-472F-4FB0-9522-AC9BF37916A7}
HKEY_LOCAL_MACHINE\software\microsoft\code store database\distribution units\{F58E1CEF-A068-4C15-BA5E-587CAF3EE8C6}

===============
HKEY_LOCAL_MACHINE\software\microsoft\active setup\installed components\<{12d0ed0d-0ee0-4f90-8827-78cefb8f4988}
HKEY_LOCAL_MACHINE\software\microsoft\active setup\installed components\>{22d6f312-b0f6-11d0-94ab-0080c74c7e95}
HKEY_LOCAL_MACHINE\software\microsoft\active setup\installed components\>{26923b43-4d38-484f-9b9e-de460746276c}
HKEY_LOCAL_MACHINE\software\microsoft\active setup\installed components\>{60B49E34-C7CC-11D0-8953-00A0C90347FF}MICROS
HKEY_LOCAL_MACHINE\software\microsoft\active setup\installed components\>{881dd1c5-3dcf-431b-b061-f3f88e8be88a}
HKEY_LOCAL_MACHINE\software\microsoft\active setup\installed components\{08B0E5C0-4FCB-11CF-AAA5-00401C608500}
HKEY_LOCAL_MACHINE\software\microsoft\active setup\installed components\{10072CEC-8CC1-11D1-986E-00A0C955B42F}
HKEY_LOCAL_MACHINE\software\microsoft\active setup\installed components\{2179C5D3-EBFF-11CF-B6FD-00AA00B4E220}
HKEY_LOCAL_MACHINE\software\microsoft\active setup\installed components\{22d6f312-b0f6-11d0-94ab-0080c74c7e95}
HKEY_LOCAL_MACHINE\software\microsoft\active setup\installed components\{233C1507-6A77-46A4-9443-F871F945D258}
HKEY_LOCAL_MACHINE\software\microsoft\active setup\installed components\{283807B5-2C60-11D0-A31D-00AA00B92C03}
HKEY_LOCAL_MACHINE\software\microsoft\active setup\installed components\{2A202491-F00D-11cf-87CC-0020AFEECF20}
HKEY_LOCAL_MACHINE\software\microsoft\active setup\installed components\{2C7339CF-2B09-4501-B3F3-F3508C9228ED}
HKEY_LOCAL_MACHINE\software\microsoft\active setup\installed components\{36f8ec70-c29a-11d1-b5c7-0000f8051515}
HKEY_LOCAL_MACHINE\software\microsoft\active setup\installed components\{3af36230-a269-11d1-b5bf-0000f8051515}
HKEY_LOCAL_MACHINE\software\microsoft\active setup\installed components\{3bf42070-b3b1-11d1-b5c5-0000f8051515}
HKEY_LOCAL_MACHINE\software\microsoft\active setup\installed components\{411EDCF7-755D-414E-A74B-3DCD6583F589}
HKEY_LOCAL_MACHINE\software\microsoft\active setup\installed components\{4278c270-a269-11d1-b5bf-0000f8051515}
HKEY_LOCAL_MACHINE\software\microsoft\active setup\installed components\{44BBA840-CC51-11CF-AAFA-00AA00B6015C}
HKEY_LOCAL_MACHINE\software\microsoft\active setup\installed components\{44BBA842-CC51-11CF-AAFA-00AA00B6015B}
HKEY_LOCAL_MACHINE\software\microsoft\active setup\installed components\{44BBA848-CC51-11CF-AAFA-00AA00B6015C}
HKEY_LOCAL_MACHINE\software\microsoft\active setup\installed components\{44BBA855-CC51-11CF-AAFA-00AA00B6015F}
HKEY_LOCAL_MACHINE\software\microsoft\active setup\installed components\{45ea75a0-a269-11d1-b5bf-0000f8051515}
HKEY_LOCAL_MACHINE\software\microsoft\active setup\installed components\{4f216970-c90c-11d1-b5c7-0000f8051515}
HKEY_LOCAL_MACHINE\software\microsoft\active setup\installed components\{4f645220-306d-11d2-995d-00c04f98bbc9}
HKEY_LOCAL_MACHINE\software\microsoft\active setup\installed components\{5945c046-1e7d-11d1-bc44-00c04fd912be}
HKEY_LOCAL_MACHINE\software\microsoft\active setup\installed components\{5A8D6EE0-3E18-11D0-821E-444553540000}
HKEY_LOCAL_MACHINE\software\microsoft\active setup\installed components\{5fd399c0-a70a-11d1-9948-00c04f98bbc9}
HKEY_LOCAL_MACHINE\software\microsoft\active setup\installed components\{630b1da0-b465-11d1-9948-00c04f98bbc9}
HKEY_LOCAL_MACHINE\software\microsoft\active setup\installed components\{6BF52A52-394A-11d3-B153-00C04F79FAA6}
HKEY_LOCAL_MACHINE\software\microsoft\active setup\installed components\{6D4B2AF9-EF26-40ED-C5E9-38C2AE5C725F}
HKEY_LOCAL_MACHINE\software\microsoft\active setup\installed components\{6fab99d0-bab8-11d1-994a-00c04f98bbc9}
HKEY_LOCAL_MACHINE\software\microsoft\active setup\installed components\{7131646D-CD3C-40F4-97B9-CD9E4E6262EF}
HKEY_LOCAL_MACHINE\software\microsoft\active setup\installed components\{73FA19D0-2D75-11D2-995D-00C04F98BBC9}
HKEY_LOCAL_MACHINE\software\microsoft\active setup\installed components\{7790769C-0471-11d2-AF11-00C04FA35D02}
HKEY_LOCAL_MACHINE\software\microsoft\active setup\installed components\{89820200-ECBD-11cf-8B85-00AA005B4340}
HKEY_LOCAL_MACHINE\software\microsoft\active setup\installed components\{89820200-ECBD-11cf-8B85-00AA005B4383}
HKEY_LOCAL_MACHINE\software\microsoft\active setup\installed components\{89B4C1CD-B018-4511-B0A1-5476DBF70820}
HKEY_LOCAL_MACHINE\software\microsoft\active setup\installed components\{8b15971b-5355-4c82-8c07-7e181ea07608}
HKEY_LOCAL_MACHINE\software\microsoft\active setup\installed components\{9381D8F2-0288-11D0-9501-00AA00B911A5}
HKEY_LOCAL_MACHINE\software\microsoft\active setup\installed components\{94de52c8-2d59-4f1b-883e-79663d2d9a8c}
HKEY_LOCAL_MACHINE\software\microsoft\active setup\installed components\{9A394342-4A68-4EBA-85A6-55B559F4E700}
HKEY_LOCAL_MACHINE\software\microsoft\active setup\installed components\{ACC563BC-4266-43f0-B6ED-9D38C4202C7E}
HKEY_LOCAL_MACHINE\software\microsoft\active setup\installed components\{B508B3F1-A24A-32C0-B310-85786919EF28}
HKEY_LOCAL_MACHINE\software\microsoft\active setup\installed components\{C09FB3CD-3D0C-3F2D-899A-6A1D67F2073F}
HKEY_LOCAL_MACHINE\software\microsoft\active setup\installed components\{C9E9A340-D1F1-11D0-821E-444553540600}
HKEY_LOCAL_MACHINE\software\microsoft\active setup\installed components\{CB2F7EDD-9D1F-43C1-90FC-4F52EAE172A1}
HKEY_LOCAL_MACHINE\software\microsoft\active setup\installed components\{CC2A9BA0-3BDD-11D0-821E-444553540000}
HKEY_LOCAL_MACHINE\software\microsoft\active setup\installed components\{CDD7975E-60F8-41d5-8149-19E51D6F71D0}
HKEY_LOCAL_MACHINE\software\microsoft\active setup\installed components\{D27CDB6E-AE6D-11cf-96B8-444553540000}
HKEY_LOCAL_MACHINE\software\microsoft\active setup\installed components\{DAA94A2A-2A8D-4D3B-9DB8-56FBECED082D}
HKEY_LOCAL_MACHINE\software\microsoft\active setup\installed components\{de5aed00-a4bf-11d1-9948-00c04f98bbc9}
HKEY_LOCAL_MACHINE\software\microsoft\active setup\installed components\{E92B03AB-B707-11d2-9CBD-0000F87A369E}
HKEY_LOCAL_MACHINE\software\microsoft\active setup\installed components\{F196AC50-7C95-42E1-9947-BDAB18BF3C8C}

==============
BHO :
======
[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\browser helper objects\{18DF081C-E8AD-4283-A596-FA578C2EBDC3}]
[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\browser helper objects\{5C255C8A-E604-49b4-9D64-90988571CECB}]
[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\browser helper objects\{9030D464-4C02-4ABF-8ECC-5164760863C6}]
[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\browser helper objects\{955BE0B8-BC85-4CAF-856E-8E0D8B610560}]
[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\browser helper objects\{CA6319C0-31B7-401E-A518-A07C3DB8F777}]
[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\browser helper objects\{DBC80044-A445-435b-BC74-9C25C1C588A9}]
[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\browser helper objects\{E7E6F031-17CE-4C07-BC86-EABFE594F69C}]

================
Internet Explorer :
================
[HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\Main]
Start Page REG_SZ https://www.dell.com/fr-ca?c=ca&l=FR&s=gen&redirect=1

[HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main]
Start Page REG_SZ https://www.google.ca/webhp?sourceid=navclient&hl=fr&ie=UTF-8&gws_rd=ssl

========
Services
========
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services]

Ndisuio : 0x3
SharedAccess : 0x2
wuauserv : 0x2

=========

=======
Drive :
=======

D‚fragmenteur de disque Windows
Copyright (c) 2001 Microsoft Corp. et Executive Software International Inc.

Rapport d'analyse
52,81 Go total, 32,17 Go libre (60%), 16% fragment‚ (fragmentation du fichier 32%)

Vous devriez d‚fragmenter ce volume.

¤¤¤¤¤¤¤¤¤¤ Files/folders :

C:\Documents and Settings\All Users\Application Data\QTSBandwidthCache
C:\Program Files\Internet Explorer\msimg32.dll
C:\Program Files\Mozilla FireFox\Components\AskSearch.js
C:\WINDOWS\config.ini
C:\WINDOWS\Fonts\GRGAREF.TTF
C:\WINDOWS\msa.exe
C:\WINDOWS\System32\drivers\etc\hosts.msn
C:\WINDOWS\Tasks\{35DC3473-A719-4d14-B7C1-FD326CA84A0C}.job
C:\Documents and Settings\Anik Goulet\LOCAL Settings\Temp\AskInstallChecker.exe
C:\Documents and Settings\Anik Goulet\LOCAL Settings\Temp\b.exe
C:\Documents and Settings\Anik Goulet\LOCAL Settings\Temp\c.exe
C:\Documents and Settings\Anik Goulet\LOCAL Settings\Temp\e.exe
C:\Documents and Settings\Anik Goulet\LOCAL Settings\Temp\f.exe
C:\Documents and Settings\Anik Goulet\LOCAL Settings\Temp\install_flash_player.exe
C:\Documents and Settings\Anik Goulet\LOCAL Settings\Temp\Install_WLMessenger.exe
C:\Documents and Settings\Anik Goulet\LOCAL Settings\Temp\InstMsiA.exe
C:\Documents and Settings\Anik Goulet\LOCAL Settings\Temp\InstMsiW.exe
C:\Documents and Settings\Anik Goulet\LOCAL Settings\Temp\MsgPlusUninstall.exe
C:\Documents and Settings\Anik Goulet\LOCAL Settings\Temp\wlsetup-cvr.exe
C:\Documents and Settings\Anik Goulet\LOCAL Settings\Temp\_is5E.exe
C:\Documents and Settings\Anik Goulet\LOCAL Settings\Temp\_uninstop.exe

¤¤¤¤¤¤¤¤¤¤ Keys :

HKLM\Software\Microsoft\Windows\CurrentVersion\Run "MyWebSearch Plugin"
HKCU\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser "{BC4FFE41-DE9F-46FA-B455-AAD49B9F9938}"
"HKCU\software\microsoft\internet explorer\searchscopes\{CF739809-1C6C-47C0-85B9-569DBB141420}"
"HKLM\software\Fun Web Products"
"HKLM\SOFTWARE\Microsoft\Code Store Database\Distribution Units\{1D4DB7D2-6EC9-47A3-BD87-1E41684E07BB}"
"HKLM\Software\Microsoft\Code Store Database\Distribution Units\{1D4DB7D2-6EC9-47A3-BD87-1E41684E07BB}"
"HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Install.exe"
"HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Setup.exe"
HKCR\CLSID\{147a976f-eee1-4377-8ea7-4716e4cdd239}
HKCR\CLSID\{248dd896-bb45-11cf-9abc-0080c7e7b78d}
HKCR\CLSID\{248dd897-bb45-11cf-9abc-0080c7e7b78d}
HKCR\CLSID\{9afb8248-617f-460d-9366-d71cdeda3179}
HKCR\CLSID\{a4730ebe-43a6-443e-9776-36915d323ad3}
HKCR\Interface\{248dd892-bb45-11cf-9abc-0080c7e7b78d}
HKCR\Interface\{248dd893-bb45-11cf-9abc-0080c7e7b78d}
HKCR\interface\{cf54be1c-9359-4395-8533-1657cf209cfe}
HKCR\popcaploader.popcaploaderctrl2.1
HKCR\TypeLib\{248dd890-bb45-11cf-9abc-0080c7e7b78d}
HKCR\TypeLib\{D518921A-4A03-425E-9873-B9A71756821E}
HKCU\SOFTWARE\E8WECRKKMV
HKCU\SOFTWARE\Microsoft\Handle
HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{1A0AADCD-3A72-4B5F-900F-E3BB5A838E2A}
HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{1d4db7d2-6ec9-47a3-bd87-1e41684e07bb}
HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{b64f4a7c-97c9-11da-8bde-f66bad1e3f3a}
HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{BC4FFE41-DE9F-46fa-B455-AAD49B9F9938}
HKCU\SOFTWARE\SWEETIE
HKCU\SOFTWARE\XML
HKLM\Software\Classes\CLSID\{147A976F-EEE1-4377-8EA7-4716E4CDD239}
HKLM\Software\Classes\CLSID\{9AFB8248-617F-460D-9366-D71CDEDA3179}
HKLM\Software\Classes\Interface\{CF54BE1C-9359-4395-8533-1657CF209CFE}
HKLM\SOFTWARE\Classes\TypeLib\{D518921A-4A03-425E-9873-B9A71756821E}
HKLM\SOFTWARE\FocusInteractive
HKLM\SOFTWARE\FunWebProducts
HKLM\SOFTWARE\Microsoft\Multimedia\WMPlayer\Schemes\f3pss
HKLM\Software\Microsoft\Windows\CurrentVersion\Ext\PreApproved\{63D0ED2C-B45B-4458-8B3B-60C69BBBD83C}
HKLM\Software\Microsoft\Windows\CurrentVersion\Installer\Userdata\S-1-5-18\Components\980289C22F80A7C4BB9323DC61255E4E
HKLM\Software\Microsoft\Windows\CurrentVersion\Installer\Userdata\S-1-5-18\Components\FA96423FE2B98E248A3B23548D1E22D9
HKLM\SOFTWARE\MyWebSearch
HKLM\SYSTEM\ControlSet001\Enum\Root\Legacy_SSHNAS
HKLM\SYSTEM\ControlSet001\Services\SSHNAS
HKLM\SYSTEM\ControlSet003\Enum\Root\Legacy_SSHNAS
HKLM\SYSTEM\ControlSet003\Services\SSHNAS
HKLM\SYSTEM\CurrentControlSet\Enum\Root\Legacy_SSHNAS
HKLM\SYSTEM\CurrentControlSet\Services\SSHNAS

================
Other infections
================

catchme 0.3.1398.3 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2010-01-13 20:34:30
Windows 5.1.2600 Service Pack 2 NTFS

scanning hidden processes ...

scanning hidden services & system hive ...

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\d347prt\Cfg\0Jf40]
"khjeh"=hex:20,02,00,00,ee,49,22,00,93,0b,08,b3,ea,e0,2f,b9,5c,4c,a2,bb,2e,..
"hj34z0"=hex:74,da,7f,20,45,bd,39,cd,75,01,b5,cf,ba,86,5d,c2,1a,15,aa,81,70,..
"hj34z1"=hex:be,da,7f,20,3d,bd,39,cd,74,01,b4,cf,bb,86,5d,c2,1a,15,aa,81,69,..
"hj34z2"=hex:be,da,7f,20,3d,bd,39,cd,74,01,b4,cf,bb,86,5d,c2,1a,15,aa,81,69,..
"hj34z3"=hex:be,da,7f,20,3d,bd,39,cd,74,01,b4,cf,bb,86,5d,c2,1a,15,aa,81,69,..
"hj34z4"=hex:be,da,7f,20,3d,bd,39,cd,74,01,b4,cf,bb,86,5d,c2,1a,15,aa,81,69,..

scanning hidden registry entries ...

scanning hidden files ...

C:\Documents and Settings\Anik Goulet\Local Settings\Temp\fla67.tmp 890811 bytes
C:\Documents and Settings\Anik Goulet\Local Settings\Temporary Internet Files\Content.IE5\W7UHMX27\st[1] 4495 bytes

scan completed successfully
hidden processes: 0
hidden services: 0
hidden files: 2


Stealth MBR rootkit/Mebroot/Sinowal detector 0.3.7 by Gmer, http://www.gmer.net

device: opened successfully
user: MBR read successfully
kernel: MBR read successfully
user & kernel MBR OK

==========
Programs
==========

Adobe
AMD
ATI Technologies
Avira
AviSynth 2.5
AVS4YOU
BAE
BitTorrent
Broadcom
Common Files
ComPlus Applications
CONEXANT
CyberLink
D-Tools
Dell
Digital Line Detect
DNA
Druide
Fichiers communs
FinePixViewerS
Google
Hewlett-Packard
InstallShield Installation Information
Internet Explorer
Java
Lavasoft
m4ng
Micro Application
Microsoft
Microsoft Etudes
microsoft frontpage
Microsoft Office
Microsoft Silverlight
Microsoft SQL Server Compact Edition
Microsoft Visual Studio
Microsoft Works
Microsoft.NET
mIRC
Modem Helper
Movie Maker
Mozilla Firefox
MSBuild
MSN
MSN Games
MSN Gaming Zone
MSN Messenger
MSXML 4.0
MSXML 6.0
Nero
NetMeeting
NetWaiting
NOS
Oberon Media
Outlook Express
QuickTime
Reference Assemblies
Roxio
Satsuki Decoder Pack
Sigmatel
Synaptics
Uninstall Information
Unity
Windows Live
Windows Live SkyDrive
Windows Media Connect 2
Windows Media Player
Windows NT
WindowsUpdate
WinRAR
WordBiz
xerox

============
Lecteur C:
============

243b1c07d30cb36821af1ef8c8
9fad0c93977be1e47016e6e52bf99642
aaw7boot.log
anumanlive.log
AUTOEXEC.BAT
bb37b8e0ed5a7bd7274d54ea
boot.ini
Bootfont.bin
CanonBJ
cfbb12f69b4732dce8ab5653f27074f6
CONFIG.SYS
dell
dell.sdr
Documents and Settings
drivers
e8fe4d5ab3f81d0c13
i386
INFCACHE.1
IO.SYS
Kill'em
List'em.txt
mpeg.txt
MSDOS.SYS
MSOCache
NTDETECT.COM
ntldr
pagefile.sys
Program Files
RECYCLER
SNPP106.RAW
sqmdata00.sqm
sqmdata01.sqm
sqmdata02.sqm
sqmdata03.sqm
sqmdata04.sqm
sqmdata05.sqm
sqmdata06.sqm
sqmdata07.sqm
sqmdata08.sqm
sqmdata09.sqm
sqmdata10.sqm
sqmdata11.sqm
sqmdata12.sqm
sqmdata13.sqm
sqmdata14.sqm
sqmdata15.sqm
sqmnoopt00.sqm
sqmnoopt01.sqm
sqmnoopt02.sqm
sqmnoopt03.sqm
sqmnoopt04.sqm
sqmnoopt05.sqm
sqmnoopt06.sqm
sqmnoopt07.sqm
sqmnoopt08.sqm
sqmnoopt09.sqm
sqmnoopt10.sqm
sqmnoopt11.sqm
sqmnoopt12.sqm
sqmnoopt13.sqm
sqmnoopt14.sqm
sqmnoopt15.sqm
System Volume Information
WINDOWS
WM800918.bin
YServer.txt

¤¤¤¤¤¤¤¤¤¤ Cracks | Keygens | Serials

C:\Documents and Settings\Anik Goulet\Local Settings\Application Data\ApplicationHistory\KeygenAntidotePrismeV6.exe.24a36f48.ini




¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤( EOF )¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤
0
Utilisateur anonyme
14 janv. 2010 à 03:06
▶ Relance List&Kill'em(soit en clic droit pour vista),avec le raccourci sur ton bureau.
mais cette fois-ci :

▶ choisis l'option 2 = Mode Suppression

laisse travailler l'outil.

en fin de scan un rapport s'ouvre

▶ colle le contenu dans ta reponse
0
Tu répond plus vite que ton ombre lucky luck :) je poste ca dans un moment
0
Utilisateur anonyme
14 janv. 2010 à 03:16
ok ;)
0
Le voila
Kill'em by g3n-h@ckm@n 1.1.8.1

User : Anik Goulet (Administrateurs) # ANIK
Update on 11/12/2009 by g3n-h@ckm@n ::::: 19:25
Start at: 21:12:15 | 2010-01-13
Contact : g3n-h@ckm@n sur CCM

Mobile AMD Sempron(tm) Processor 3500+
Microsoft Windows XP Édition familiale (5.1.2600 32-bit) # Service Pack 2
Internet Explorer 6.0.2900.2180
Windows Firewall Status : Enabled
AV : AntiVir Desktop 9.0.1.32 [ (!) Disabled | Updated ]

C:\ -> Disque fixe local | 52,81 Go (32,2 Go free) | NTFS
D:\ -> Disque CD-ROM
E:\ -> Disque CD-ROM


¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤ Processes running

C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\csrss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\Ati2evxx.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\system32\Ati2evxx.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\WLTRYSVC.EXE
C:\WINDOWS\System32\bcmwltry.exe
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\Avira\AntiVir Desktop\sched.exe
C:\WINDOWS\system32\svchost.exe
C:\Program Files\Avira\AntiVir Desktop\avguard.exe
C:\Program Files\Java\jre6\bin\jqs.exe
C:\Program Files\Fichiers communs\Microsoft Shared\VS7DEBUG\MDM.EXE
C:\Program Files\Dell\QuickSet\NICCONFIGSVC.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\msa.exe
C:\WINDOWS\system32\wbem\wmiprvse.exe
C:\Program Files\Synaptics\SynTP\SynTPEnh.exe
C:\Program Files\ATI Technologies\ATI.ACE\CLI.EXE
C:\WINDOWS\system32\WLTRAY.exe
C:\WINDOWS\stsystra.exe
C:\Program Files\Java\jre6\bin\jusched.exe
C:\Program Files\Avira\AntiVir Desktop\avgnt.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\Fichiers communs\Ahead\lib\NMBgMonitor.exe
C:\Program Files\DNA\btdna.exe
C:\Program Files\Digital Line Detect\DLG.exe
C:\WINDOWS\system32\wbem\wmiapsrv.exe
C:\WINDOWS\System32\alg.exe
C:\WINDOWS\system32\wuauclt.exe
C:\Program Files\ATI Technologies\ATI.ACE\cli.exe
C:\Program Files\Google\Chrome\Application\chrome.exe
C:\Program Files\Google\Chrome\Application\chrome.exe
C:\Program Files\Google\Chrome\Application\chrome.exe
C:\DOCUME~1\ANIKGO~1\LOCALS~1\Temp\c.exe
C:\Documents and Settings\Anik Goulet\Bureau\List_Kill'em\List_Kill'em.exe
C:\WINDOWS\system32\cmd.exe
C:\WINDOWS\system32\wbem\wmiprvse.exe
C:\Documents and Settings\Anik Goulet\Local Settings\Temp\79.tmp\pv.exe

Detections :
==========


¤¤¤¤¤¤¤¤¤¤ Files/folders :

C:\Documents and Settings\All Users\Application Data\QTSBandwidthCache
"C:\Program Files\Internet Explorer\msimg32.dll"
"C:\Program Files\Mozilla FireFox\Components\AskSearch.js"
"C:\WINDOWS\config.ini"
"C:\WINDOWS\Fonts\GRGAREF.TTF"
C:\WINDOWS\msa.exe
"C:\WINDOWS\System32\drivers\etc\hosts.msn"
"C:\WINDOWS\Tasks\{35DC3473-A719-4d14-B7C1-FD326CA84A0C}.job"
C:\Documents and Settings\Anik Goulet\LOCAL Settings\Temp\AskInstallChecker.exe
C:\Documents and Settings\Anik Goulet\LOCAL Settings\Temp\b.exe
C:\Documents and Settings\Anik Goulet\LOCAL Settings\Temp\c.exe
C:\Documents and Settings\Anik Goulet\LOCAL Settings\Temp\e.exe
C:\Documents and Settings\Anik Goulet\LOCAL Settings\Temp\f.exe
C:\Documents and Settings\Anik Goulet\LOCAL Settings\Temp\install_flash_player.exe
C:\Documents and Settings\Anik Goulet\LOCAL Settings\Temp\Install_WLMessenger.exe
C:\Documents and Settings\Anik Goulet\LOCAL Settings\Temp\InstMsiA.exe
C:\Documents and Settings\Anik Goulet\LOCAL Settings\Temp\InstMsiW.exe
C:\Documents and Settings\Anik Goulet\LOCAL Settings\Temp\MsgPlusUninstall.exe
C:\Documents and Settings\Anik Goulet\LOCAL Settings\Temp\wlsetup-cvr.exe
C:\Documents and Settings\Anik Goulet\LOCAL Settings\Temp\_is5E.exe
C:\Documents and Settings\Anik Goulet\LOCAL Settings\Temp\_uninstop.exe


¤¤¤¤¤¤¤¤¤¤ Files/folders deleted :

Quarantine :

AskInstallChecker.exe.Kill'em
AskSearch.js.Kill'em
b.exe.Kill'em
c.exe.Kill'em
config.ini.Kill'em
e.exe.Kill'em
f.exe.Kill'em
GRGAREF.TTF.Kill'em
hosts.msn.Kill'em
install_flash_player.exe.Kill'em
Install_WLMessenger.exe.Kill'em
InstMsiA.exe.Kill'em
InstMsiW.exe.Kill'em
msa.exe.Kill'em
MsgPlusUninstall.exe.Kill'em
msimg32.dll.Kill'em
QTSBandwidthCache.Kill'em
wlsetup-cvr.exe.Kill'em
_is5E.exe.Kill'em
_uninstop.exe.Kill'em
{35DC3473-A719-4d14-B7C1-FD326CA84A0C}.job.Kill'em

==============
host file OK !
==============

========
Registry
========
Deleted : HKCU\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser\{BC4FFE41-DE9F-46FA-B455-AAD49B9F9938}
Deleted : HKCU\software\microsoft\internet explorer\searchscopes\{CF739809-1C6C-47C0-85B9-569DBB141420}
Deleted : HKLM\software\Fun Web Products
Deleted : HKLM\SOFTWARE\Microsoft\Code Store Database\Distribution Units\{1D4DB7D2-6EC9-47A3-BD87-1E41684E07BB}
Deleted : HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Install.exe
Deleted : HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Setup.exe
Deleted : HKCR\CLSID\{147a976f-eee1-4377-8ea7-4716e4cdd239}
Deleted : HKCR\CLSID\{248dd896-bb45-11cf-9abc-0080c7e7b78d}
Deleted : HKCR\CLSID\{248dd897-bb45-11cf-9abc-0080c7e7b78d}
Deleted : HKCR\CLSID\{9afb8248-617f-460d-9366-d71cdeda3179}
Deleted : HKCR\CLSID\{a4730ebe-43a6-443e-9776-36915d323ad3}
Deleted : HKCR\Interface\{248dd892-bb45-11cf-9abc-0080c7e7b78d}
Deleted : HKCR\Interface\{248dd893-bb45-11cf-9abc-0080c7e7b78d}
Deleted : HKCR\interface\{cf54be1c-9359-4395-8533-1657cf209cfe}
Deleted : HKCR\popcaploader.popcaploaderctrl2.1
Deleted : HKCR\TypeLib\{248dd890-bb45-11cf-9abc-0080c7e7b78d}
Deleted : HKCR\TypeLib\{D518921A-4A03-425E-9873-B9A71756821E}
Deleted : HKCU\SOFTWARE\E8WECRKKMV
Deleted : HKCU\SOFTWARE\Microsoft\Handle
Deleted : HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{1A0AADCD-3A72-4B5F-900F-E3BB5A838E2A}
Deleted : HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{1d4db7d2-6ec9-47a3-bd87-1e41684e07bb}
Deleted : HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{b64f4a7c-97c9-11da-8bde-f66bad1e3f3a}
Deleted : HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{BC4FFE41-DE9F-46fa-B455-AAD49B9F9938}
Deleted : HKCU\SOFTWARE\SWEETIE
Deleted : HKCU\SOFTWARE\XML
Deleted : HKLM\SOFTWARE\FocusInteractive
Deleted : HKLM\SOFTWARE\FunWebProducts
Deleted : HKLM\SOFTWARE\Microsoft\Multimedia\WMPlayer\Schemes\f3pss
Deleted : HKLM\Software\Microsoft\Windows\CurrentVersion\Ext\PreApproved\{63D0ED2C-B45B-4458-8B3B-60C69BBBD83C}
Deleted : HKLM\Software\Microsoft\Windows\CurrentVersion\Installer\Userdata\S-1-5-18\Components\980289C22F80A7C4BB9323DC61255E4E
Deleted : HKLM\Software\Microsoft\Windows\CurrentVersion\Installer\Userdata\S-1-5-18\Components\FA96423FE2B98E248A3B23548D1E22D9
Deleted : HKLM\SOFTWARE\MyWebSearch
Deleted : HKLM\SYSTEM\ControlSet001\Services\SSHNAS
Deleted : HKLM\SYSTEM\ControlSet003\Enum\Root\Legacy_SSHNAS
Deleted : HKLM\SYSTEM\ControlSet003\Services\SSHNAS
Deleted : HKLM\SYSTEM\CurrentControlSet\Enum\Root\Legacy_SSHNAS

============
Disk Cleaned
============

================
Prefetch cleaned
================
0

Vous n’avez pas trouvé la réponse que vous recherchez ?

Posez votre question
Utilisateur anonyme
14 janv. 2010 à 03:27
ok pour demain car je vais aller dormir (ton pc doit deja aller mieux....) :



▶ Télécharge Ad-remover ( de C_XX ) sur ton bureau :


▶ Déconnecte toi et ferme toutes applications en cours !

▶ Double clique sur "Ad-R.exe" pour lancer l'installation et laisse les paramètres d'installation par défaut .

▶ Double-clique sur le raccourci Ad-remover qui est sur ton bureau pour lancer l'outil .

▶ Au menu principal choisis l'option "L" et tape sur [entrée] .

▶ Laisse travailler l'outil et ne touche à rien ...

▶ Poste le rapport qui apparait à la fin , sur le forum ...

( Le rapport est sauvegardé aussi sous C:\Ad-report.log )
( CTRL+A Pour tout sélectionner , CTRL+C pour copier et CTRL+V pour coller )

▶ Note : "Process.exe", une composante de l'outil, est détecté par certains antivirus (AntiVir, Dr.Web, Kaspersky Anti-Virus) comme étant un RiskTool.
Il ne s'agit pas d'un virus, mais d'un utilitaire destiné à mettre fin à des processus.
Mis entre de mauvaises mains, cet utilitaire pourrait arrêter des logiciels de sécurité (Antivirus, Firewall...) d'où l'alerte émise par ces antivirus.

ensuite :


desinstalle AD-Remover

ensuite :

▶ Télécharge et install UsbFix

(!) Branche tes sources de données externes à ton PC, (clé USB, disque dur externe, etc...) susceptible d'avoir été infectées sans les ouvrir

▶ Double clic sur le raccourci UsbFix présent sur ton bureau .

▶ Au menu principal choisis l'option " F " pour français et tape sur [entrée] .

▶ Au second menu Choisis l'option " 1 " (recherche) et tape sur [entrée]

▶ Laisse travailler l'outil.

▶ Ensuite post le rapport UsbFix.txt qui apparaitra.

Note : Le rapport UsbFix.txt est sauvegardé a la racine du disque. ( C:\UsbFix.txt )

( CTRL+A Pour tout selectionner , CTRL+C pour copier et CTRL+V pour coller )

Note : "Process.exe", une composante de l'outil, est détecté par certains antivirus (AntiVir, Dr.Web, Kaspersky Anti-Virus) comme étant un RiskTool.
Il ne s'agit pas d'un virus, mais d'un utilitaire destiné à mettre fin à des processus.
Mis entre de mauvaises mains, cet utilitaire pourrait arrêter des logiciels de sécurité (Antivirus, Firewall...) d'où l'alerte émise par ces antivirus.

ensuite :

(!) Branche tes sources de données externes à ton PC, (clé USB, disque dur externe, etc...) susceptible d avoir été infectés sans les ouvrir

▶ Double clic (clic droit "en tant qu'administrateur" pour Vista)sur le raccourci UsbFix présent sur ton bureau

▶ Au menu principal choisis l'option " F " pour français et tape sur [entrée] .

▶ Au second menu Choisis l'option " 2 " ( Suppression ) et tape sur [entrée]

▶ Ton bureau disparaitra et le pc redémarrera .

▶ Au redémarrage , UsbFix scannera ton pc , laisse travailler l'outil.

▶ Ensuite post le rapport UsbFix.txt qui apparaitra avec le bureau .

Note : Le rapport UsbFix.txt est sauvegardé a la racine du disque.( C:\UsbFix.txt )

( CTRL+A Pour tout selectionner , CTRL+C pour copier et CTRL+V pour coller )

ensuite :

relance usbfix , option desinstaller

ensuite :

Mets à jour Windows par le raccourci windows update de ton menu demarrer/tous les programmes

ensuite :

Télécharge OTL de OLDTimer

enregistre le sur ton Bureau.

▶ Double clic ( pour vista => clic droit "executer en tant qu'administrateur") sur OTL.exe pour le lancer.

▶ Coche les 2 cases Lop et Purity

▶ Coche la case devant scan all users

▶ règle-le sur "60 Days"

▶ dans la colonne de gauche , mets tout sur all

ne modifie pas ceci :

"files created whithin" et "files modified whithin"


▶Clic sur Run Scan.

A la fin du scan, le Bloc-Notes va s'ouvrir avec le rapport (OTL.txt).

Ce fichier est sur ton Bureau (en général C:\Documents and settings\le_nom_de_ta_session\OTL.txt)

▶▶▶ NE LE POSTE PAS SUR LE FORUM

Pour me le transmettre clique sur ce lien : http://www.cijoint.fr/

▶ Clique sur Parcourir et cherche le fichier ci-dessus.

▶ Clique sur Ouvrir.

▶ Clique sur "Cliquez ici pour déposer le fichier".

Un lien de cette forme :

http://www.cijoint.fr/cjlink.php?file=cjge368/cijSKAP5fU.txt

est ajouté dans la page.

▶ Copie ce lien dans ta réponse.

▶▶ Tu feras la meme chose avec le "Extra.txt".
0
Merci, bonne nuit :)
VOila le rapport ad-aware
.
======= RAPPORT D'AD-REMOVER 1.1.4.6_H | UNIQUEMENT XP/VISTA/7 =======
.
Mis à jour par C_XX le 11.01.2010 à 22:29
Contact: AdRemover.contact@gmail.com
Site web: http://pagesperso-orange.fr/NosTools/ad_remover.html
.
Lancé à: 21:44:56, 2010-01-13 | Mode Normal | Option: CLEAN
Exécuté de: C:\Ad-Remover\
Système d'exploitation: Microsoft® Windows XP™ Service Pack 2 v5.1.2600
Nom du PC: ANIK | Utilisateur actuel: Anik Goulet

.
============== ÉLÉMENT(S) NEUTRALISÉ(S) ==============
.

C:\WINDOWS\Downloaded Program Files\F3initialsetup1.0.1.0.inf

(!) -- Fichiers temporaires supprimés.

.
HKCU\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser\\{90B8B761-DF2B-48AC-BBE0-BCC03A819B3B}
HKLM\software\AskBarDis
HKLM\Software\Classes\Interface\{7697BC38-D0FA-454B-AC75-968B4CCABFCE}
HKLM\Software\Microsoft\Windows\CurrentVersion\Run\\MyWebSearch Plugin
.
============== Scan additionnel ==============
.
.
* Internet Explorer Version 6.0.2900.2180 *
.
[HKEY_CURRENT_USER\..\Internet Explorer\Main]
.
Do404Search: 01000000
Local Page: C:\WINDOWS\system32\blank.htm
Show_ToolBar: yes
Start Page: hxxp://fr.msn.com/
Enable Browser Extensions: yes
Use Search Asst: no
Search Bar: hxxp://go.microsoft.com/fwlink/?linkid=54896
Default_Page_URL: hxxp://www.microsoft.com/isapi/redir.dll?prd=ie&pver=6&ar=msnhome
Default_search_url: hxxp://www.microsoft.com/isapi/redir.dll?prd=ie&ar=iesearch
.
[HKEY_LOCAL_MACHINE\..\Internet Explorer\Main]
.
Default_Page_URL: hxxp://www.microsoft.com/isapi/redir.dll?prd=ie&pver=6&ar=msnhome
Default_Search_URL: hxxp://www.microsoft.com/isapi/redir.dll?prd=ie&ar=iesearch
Search Page: hxxp://www.microsoft.com/isapi/redir.dll?prd=ie&ar=iesearch
Delete_Temp_Files_On_Exit: yes
Local Page: %SystemRoot%\system32\blank.htm
Start Page: hxxp://fr.msn.com/
Search bar: hxxp://search.msn.com/spbasic.htm
HKEY_LOCAL_MACHINE\software\microsoft\internet explorer\main\Start Page
.
[HKEY_LOCAL_MACHINE\..\Internet Explorer\ABOUTURLS]
.
Tabs: res://ieframe.dll/tabswelcome.htm
.
===================================
.
2106 Octet(s) - C:\Ad-Report-CLEAN[1].log
.
0 Fichier(s) - C:\DOCUME~1\ANIKGO~1\LOCALS~1\Temp
1 Fichier(s) - C:\WINDOWS\Temp
9 Fichier(s) - C:\WINDOWS\Prefetch
.
16 Fichier(s) - C:\Ad-Remover\BACKUP
1 Fichier(s) - C:\Ad-Remover\QUARANTINE
.
Fin à: 21:58:34 | 2010-01-13 - CLEAN[1]
.
============== E.O.F ==============
0
USBFIX
############################## | UsbFix V6.073 |

User : Anik Goulet (Administrateurs) # ANIK
Update on 09/01/2010 by El Desaparecido , C_XX & Chimay8
Start at: 22:13:58 | 2010-01-13
Website : http://pagesperso-orange.fr/NosTools/index.html
Contact : FindyKill.Contact@gmail.com

Mobile AMD Sempron(tm) Processor 3500+
Microsoft Windows XP Édition familiale (5.1.2600 32-bit) # Service Pack 2
Internet Explorer 6.0.2900.2180
Windows Firewall Status : Enabled
AV : AntiVir Desktop 9.0.1.32 [ (!) Disabled | Updated ]

C:\ -> Disque fixe local # 52,81 Go (33,79 Go free) # NTFS
D:\ -> Disque CD-ROM
E:\ -> Disque CD-ROM

############################## | Processus actifs |

C:\WINDOWS\System32\smss.exe 744
C:\WINDOWS\system32\csrss.exe 804
C:\WINDOWS\system32\winlogon.exe 832
C:\WINDOWS\system32\services.exe 876
C:\WINDOWS\system32\lsass.exe 888
C:\WINDOWS\system32\Ati2evxx.exe 1052
C:\WINDOWS\system32\svchost.exe 1072
C:\WINDOWS\system32\svchost.exe 1196
C:\WINDOWS\System32\svchost.exe 1352
C:\WINDOWS\system32\Ati2evxx.exe 1412
C:\WINDOWS\system32\svchost.exe 1436
C:\WINDOWS\system32\svchost.exe 1672
C:\WINDOWS\System32\WLTRYSVC.EXE 1884
C:\WINDOWS\System32\bcmwltry.exe 1896
C:\WINDOWS\system32\spoolsv.exe 212
C:\Program Files\Avira\AntiVir Desktop\sched.exe 248
C:\WINDOWS\system32\svchost.exe 484
C:\WINDOWS\Explorer.EXE 708
C:\Program Files\Avira\AntiVir Desktop\avguard.exe 1124
C:\Program Files\Java\jre6\bin\jqs.exe 1288
C:\Program Files\Fichiers communs\Microsoft Shared\VS7DEBUG\MDM.EXE 1492
C:\Program Files\Dell\QuickSet\NICCONFIGSVC.exe 1000
C:\WINDOWS\system32\svchost.exe 1804
C:\WINDOWS\system32\wbem\unsecapp.exe 2372
C:\WINDOWS\system32\wbem\wmiprvse.exe 2376
C:\WINDOWS\System32\alg.exe 2772
C:\WINDOWS\system32\wbem\wmiapsrv.exe 3716
C:\WINDOWS\system32\wuauclt.exe 1940
C:\Program Files\Synaptics\SynTP\SynTPEnh.exe 2656
C:\Program Files\ATI Technologies\ATI.ACE\CLI.EXE 2640
C:\WINDOWS\system32\WLTRAY.exe 2552
C:\WINDOWS\stsystra.exe 2600
C:\Program Files\Java\jre6\bin\jusched.exe 2844
C:\Program Files\Avira\AntiVir Desktop\avgnt.exe 1024
C:\WINDOWS\system32\ctfmon.exe 2864
C:\Program Files\Fichiers communs\Ahead\lib\NMBgMonitor.exe 1064
C:\Program Files\DNA\btdna.exe 140
C:\Program Files\Digital Line Detect\DLG.exe 3188
C:\Program Files\Google\Chrome\Application\chrome.exe 4036
C:\Program Files\ATI Technologies\ATI.ACE\cli.exe 1540
C:\Program Files\Google\Chrome\Application\chrome.exe 1796
C:\Program Files\Google\Chrome\Application\chrome.exe 2236
C:\WINDOWS\system32\wuauclt.exe 608
C:\WINDOWS\system32\wbem\wmiprvse.exe 448

################## | Elements infectieux |

C:\WINDOWS\Tasks\{66BA574B-1E11-49b8-909C-8CC9E0E8E015}.job

################## | Registre |

[HKCU\SOFTWARE\LREC75DND7]
[HKCU\SOFTWARE\XML]
[HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] "LREC75DND7"

################## | Mountpoints2 |

HKCU\..\..\Explorer\MountPoints2\F
Shell\AutoRun\command =F:\LaunchU3.exe -a

################## | Cracks > Keygens > Serials |


################## | ! Fin du rapport # UsbFix V6.073 ! |
0
voila
http://www.cijoint.fr/cjlink.php?file=cj201001/cijf5VGhwh.txt

Et extras
http://www.cijoint.fr/cjlink.php?file=cj201001/cijYqLmnd6.txt
0
http://www.cijoint.fr/cjlink.php?file=cj201001/cijYqLmnd6.txt
http://www.cijoint.fr/cjlink.php?file=cj201001/cijea1srcX.txt
voila c'est à mon tour d'aller dormir :)
0
Utilisateur anonyme
14 janv. 2010 à 14:13
▶ télécharge LOP S&D sur ton Bureau.

▶ Double-clique dessus pour lancer l'installation
▶ Puis double-clique sur le raccourci Lop S&D présent sur ton Bureau
▶ Séléctionne la langue souhaitée , puis choisis l'option 1 (Recherche)
▶ Patiente jusqu'à la fin du scan

▶ Poste le rapport généré (C:\lopR.txt)
0
et hop!
--------------------\\ Lop S&D 4.2.5-0 XP/Vista

Microsoft Windows XP Édition familiale ( v5.1.2600 ) Service Pack 2
X86-based PC ( Uniprocessor Free : Mobile AMD Sempron(tm) Processor 3500+ )
BIOS : BIOS Version 1.7.0
USER : Anik Goulet ( Administrator )
BOOT : Normal boot
Antivirus : AntiVir Desktop 9.0.1.32 (Activated)
C:\ (Local Disk) - NTFS - Total:52 Go (Free:33 Go)
D:\ (CD or DVD)
E:\ (CD or DVD)

"C:\Lop SD" ( MAJ : 19-12-2008|23:40 )
Option : [1] ( 2010-01-14|12:06 )

--------------------\\ Listing des dossiers dans APPLIC~1

[2010-01-12|06:26] C:\DOCUME~1\ALLUSE~1\APPLIC~1\{CFBD8779-FAAB-4357-84F2-1EC8619FADA6}
[2009-12-30|06:28] C:\DOCUME~1\ALLUSE~1\APPLIC~1\Adobe
[2008-02-02|08:22] C:\DOCUME~1\ALLUSE~1\APPLIC~1\Apple Computer
[2010-01-13|06:12] C:\DOCUME~1\ALLUSE~1\APPLIC~1\Avira
[2009-12-30|20:15] C:\DOCUME~1\ALLUSE~1\APPLIC~1\Google
[2006-12-27|21:03] C:\DOCUME~1\ALLUSE~1\APPLIC~1\InstallShield
[2010-01-12|06:42] C:\DOCUME~1\ALLUSE~1\APPLIC~1\Lavasoft
[2007-06-19|15:45] C:\DOCUME~1\ALLUSE~1\APPLIC~1\Lectra
[2007-01-05|14:08] C:\DOCUME~1\ALLUSE~1\APPLIC~1\Macrovision
[2006-12-27|21:05] C:\DOCUME~1\ALLUSE~1\APPLIC~1\McAfee
[2006-12-27|21:05] C:\DOCUME~1\ALLUSE~1\APPLIC~1\McAfee.com
[2007-01-04|15:56] C:\DOCUME~1\ALLUSE~1\APPLIC~1\McAfee.com Personal Firewall
[2009-03-16|17:50] C:\DOCUME~1\ALLUSE~1\APPLIC~1\Microsoft
[2008-12-22|20:25] C:\DOCUME~1\ALLUSE~1\APPLIC~1\MumboJumbo
[2009-08-09|21:24] C:\DOCUME~1\ALLUSE~1\APPLIC~1\NOS
[2007-12-15|22:18] C:\DOCUME~1\ALLUSE~1\APPLIC~1\Office Genuine Advantage
[2007-05-16|10:47] C:\DOCUME~1\ALLUSE~1\APPLIC~1\PopCap
[2004-08-20|11:46] C:\DOCUME~1\ALLUSE~1\APPLIC~1\SBSI
[2006-12-27|21:02] C:\DOCUME~1\ALLUSE~1\APPLIC~1\Sonic
[2009-01-17|10:39] C:\DOCUME~1\ALLUSE~1\APPLIC~1\TEMP
[2007-01-04|17:19] C:\DOCUME~1\ALLUSE~1\APPLIC~1\Windows Genuine Advantage
[2008-04-27|07:39] C:\DOCUME~1\ALLUSE~1\APPLIC~1\WLInstaller
[2007-07-19|06:52] C:\DOCUME~1\ALLUSE~1\APPLIC~1\Yahoo!

[2009-12-30|06:28] C:\DOCUME~1\ANIKGO~1\APPLIC~1\Adobe
[2008-05-21|19:49] C:\DOCUME~1\ANIKGO~1\APPLIC~1\AdobeUM
[2009-12-31|04:44] C:\DOCUME~1\ANIKGO~1\APPLIC~1\Ahead
[2008-02-02|08:12] C:\DOCUME~1\ANIKGO~1\APPLIC~1\Anuman Interactive
[2007-12-26|15:00] C:\DOCUME~1\ANIKGO~1\APPLIC~1\Apple Computer
[2007-07-19|19:54] C:\DOCUME~1\ANIKGO~1\APPLIC~1\ATI
[2010-01-09|15:30] C:\DOCUME~1\ANIKGO~1\APPLIC~1\BitTorrent
[2007-07-22|20:06] C:\DOCUME~1\ANIKGO~1\APPLIC~1\CyberLink
[2010-01-14|11:58] C:\DOCUME~1\ANIKGO~1\APPLIC~1\DNA
[2007-07-20|18:04] C:\DOCUME~1\ANIKGO~1\APPLIC~1\Druide
[2009-12-17|21:16] C:\DOCUME~1\ANIKGO~1\APPLIC~1\FUJIFILM
[2009-10-17|21:10] C:\DOCUME~1\ANIKGO~1\APPLIC~1\Google
[2009-12-17|21:14] C:\DOCUME~1\ANIKGO~1\APPLIC~1\InstallShield
[2009-08-24|20:30] C:\DOCUME~1\ANIKGO~1\APPLIC~1\LANCITE
[2007-10-09|20:20] C:\DOCUME~1\ANIKGO~1\APPLIC~1\Macromedia
[2008-12-09|19:30] C:\DOCUME~1\ANIKGO~1\APPLIC~1\Microsoft
[2007-01-05|18:03] C:\DOCUME~1\ANIKGO~1\APPLIC~1\MSNInstaller
[2007-01-27|18:09] C:\DOCUME~1\ANIKGO~1\APPLIC~1\PhotoInPress
[2009-10-21|15:18] C:\DOCUME~1\ANIKGO~1\APPLIC~1\Printer Info Cache
[2007-04-20|13:18] C:\DOCUME~1\ANIKGO~1\APPLIC~1\Sun
[2008-12-29|18:55] C:\DOCUME~1\ANIKGO~1\APPLIC~1\System
[2009-11-24|18:03] C:\DOCUME~1\ANIKGO~1\APPLIC~1\U3
[2008-05-01|21:31] C:\DOCUME~1\ANIKGO~1\APPLIC~1\VideoEgg

[2008-12-06|10:23] C:\DOCUME~1\AUTREQ~1\APPLIC~1\Adobe
[2006-12-27|21:00] C:\DOCUME~1\AUTREQ~1\APPLIC~1\ATI
[2007-10-12|14:40] C:\DOCUME~1\AUTREQ~1\APPLIC~1\Google
[2004-08-20|11:41] C:\DOCUME~1\AUTREQ~1\APPLIC~1\Identities
[2007-10-12|14:42] C:\DOCUME~1\AUTREQ~1\APPLIC~1\Macromedia
[2007-10-12|14:39] C:\DOCUME~1\AUTREQ~1\APPLIC~1\Microsoft

[2006-12-27|21:00] C:\DOCUME~1\DEFAUL~1\APPLIC~1\ATI
[2004-08-20|11:41] C:\DOCUME~1\DEFAUL~1\APPLIC~1\Identities
[2004-08-20|11:30] C:\DOCUME~1\DEFAUL~1\APPLIC~1\Microsoft

[2010-01-13|19:41] C:\DOCUME~1\LOCALS~1\APPLIC~1\Adobe
[2010-01-13|19:43] C:\DOCUME~1\LOCALS~1\APPLIC~1\Macromedia
[2007-01-04|15:54] C:\DOCUME~1\LOCALS~1\APPLIC~1\McAfee.com Personal Firewall
[2004-08-20|11:30] C:\DOCUME~1\LOCALS~1\APPLIC~1\Microsoft

[2004-08-20|11:30] C:\DOCUME~1\NETWOR~1\APPLIC~1\Microsoft


--------------------\\ Tâches planifiées dans C:\WINDOWS\tasks

[2010-01-14 07:13][--a------] C:\WINDOWS\tasks\Ad-Aware Update (Weekly).job
[2010-01-14 07:13][--a------] C:\WINDOWS\tasks\Ad-Aware Update (Daily 4).job
[2010-01-14 07:13][--a------] C:\WINDOWS\tasks\Ad-Aware Update (Daily 3).job
[2010-01-14 07:13][--a------] C:\WINDOWS\tasks\Ad-Aware Update (Daily 2).job
[2010-01-14 07:13][--a------] C:\WINDOWS\tasks\Ad-Aware Update (Daily 1).job
[2010-01-14 11:08][--ah-----] C:\WINDOWS\tasks\{66BA574B-1E11-49b8-909C-8CC9E0E8E015}.job
[2010-01-14 11:12][--a------] C:\WINDOWS\tasks\GoogleUpdateTaskMachineUA.job
[2010-01-14 07:05][--a------] C:\WINDOWS\tasks\GoogleUpdateTaskMachineCore.job
[2010-01-14 07:05][--ah-----] C:\WINDOWS\tasks\SA.DAT
[2004-08-05 13:00][-r-h-----] C:\WINDOWS\tasks\desktop.ini

--------------------\\ Listing des dossiers dans C:\Program Files

[2009-10-18|08:00] C:\Program Files\Adobe
[2006-12-27|20:56] C:\Program Files\AMD
[2006-12-27|20:54] C:\Program Files\ATI Technologies
[2010-01-13|06:12] C:\Program Files\Avira
[2009-12-30|19:12] C:\Program Files\AviSynth 2.5
[2009-12-30|20:03] C:\Program Files\AVS4YOU
[2006-12-27|21:06] C:\Program Files\BAE
[2009-06-22|21:10] C:\Program Files\BitTorrent
[2006-12-27|20:55] C:\Program Files\Broadcom
[2008-04-25|17:17] C:\Program Files\Common Files
[2004-08-20|11:35] C:\Program Files\ComPlus Applications
[2006-12-27|20:58] C:\Program Files\CONEXANT
[2006-12-27|21:01] C:\Program Files\CyberLink
[2006-12-27|20:57] C:\Program Files\Dell
[2006-12-27|21:01] C:\Program Files\Digital Line Detect
[2010-01-14|07:08] C:\Program Files\DNA
[2007-01-04|18:43] C:\Program Files\Druide
[2007-01-05|00:30] C:\Program Files\D-Tools
[2009-03-16|17:50] C:\Program Files\Fichiers communs
[2009-12-17|21:16] C:\Program Files\FinePixViewerS
[2009-12-30|20:15] C:\Program Files\Google
[2007-11-04|10:51] C:\Program Files\Hewlett-Packard
[2009-12-17|21:15] C:\Program Files\InstallShield Installation Information
[2010-01-13|22:56] C:\Program Files\Internet Explorer
[2009-12-19|19:36] C:\Program Files\Java
[2010-01-12|06:25] C:\Program Files\Lavasoft
[2009-12-30|20:14] C:\Program Files\m4ng
[2007-06-19|11:01] C:\Program Files\Micro Application
[2009-11-07|15:41] C:\Program Files\Microsoft
[2009-01-01|22:31] C:\Program Files\Microsoft Etudes
[2004-08-20|11:37] C:\Program Files\microsoft frontpage
[2007-01-04|18:25] C:\Program Files\Microsoft Office
[2009-11-09|05:04] C:\Program Files\Microsoft Silverlight
[2008-04-27|08:01] C:\Program Files\Microsoft SQL Server Compact Edition
[2008-06-07|19:49] C:\Program Files\Microsoft Visual Studio
[2008-08-10|07:18] C:\Program Files\Microsoft Works
[2007-01-04|18:12] C:\Program Files\Microsoft.NET
[2007-07-18|20:03] C:\Program Files\mIRC
[2008-06-07|20:10] C:\Program Files\Modem Helper
[2004-08-20|11:35] C:\Program Files\Movie Maker
[2009-06-22|21:10] C:\Program Files\Mozilla Firefox
[2009-08-15|22:00] C:\Program Files\MSBuild
[2007-01-06|18:53] C:\Program Files\MSN
[2009-06-22|21:29] C:\Program Files\MSN Games
[2004-08-20|11:34] C:\Program Files\MSN Gaming Zone
[2008-04-27|07:31] C:\Program Files\MSN Messenger
[2007-01-04|17:16] C:\Program Files\MSXML 4.0
[2007-08-15|05:07] C:\Program Files\MSXML 6.0
[2007-01-05|00:38] C:\Program Files\Nero
[2004-08-20|11:35] C:\Program Files\NetMeeting
[2008-06-07|20:10] C:\Program Files\NetWaiting
[2009-08-09|21:24] C:\Program Files\NOS
[2009-01-16|20:14] C:\Program Files\Oberon Media
[2009-08-13|22:20] C:\Program Files\Outlook Express
[2008-06-07|20:10] C:\Program Files\QuickTime
[2009-08-15|21:59] C:\Program Files\Reference Assemblies
[2007-01-04|18:21] C:\Program Files\Roxio
[2007-01-04|18:27] C:\Program Files\Satsuki Decoder Pack
[2006-12-27|20:58] C:\Program Files\Sigmatel
[2006-12-27|20:55] C:\Program Files\Synaptics
[2004-08-20|11:41] C:\Program Files\Uninstall Information
[2009-04-01|21:06] C:\Program Files\Unity
[2009-11-07|15:45] C:\Program Files\Windows Live
[2009-11-07|15:41] C:\Program Files\Windows Live SkyDrive
[2007-01-15|14:46] C:\Program Files\Windows Media Connect 2
[2007-10-12|18:33] C:\Program Files\Windows Media Player
[2004-08-20|11:34] C:\Program Files\Windows NT
[2004-08-20|11:35] C:\Program Files\WindowsUpdate
[2007-01-04|18:26] C:\Program Files\WinRAR
[2008-09-05|20:11] C:\Program Files\WordBiz
[2004-08-20|11:37] C:\Program Files\xerox

--------------------\\ Listing des dossiers dans C:\Program Files\Fichiers communs

[2007-04-15|06:50] C:\Program Files\Fichiers communs\ACD Systems
[2009-10-18|08:01] C:\Program Files\Fichiers communs\Adobe
[2007-01-05|14:08] C:\Program Files\Fichiers communs\Adobe Systems Shared
[2009-06-19|23:54] C:\Program Files\Fichiers communs\Agnitum Shared
[2007-01-05|13:18] C:\Program Files\Fichiers communs\Ahead
[2007-01-04|18:13] C:\Program Files\Fichiers communs\DESIGNER
[2008-11-17|22:46] C:\Program Files\Fichiers communs\GTK
[2006-12-27|21:02] C:\Program Files\Fichiers communs\InstallShield
[2006-12-27|20:52] C:\Program Files\Fichiers communs\Java
[2007-06-19|22:08] C:\Program Files\Fichiers communs\Lectra
[2009-12-30|20:24] C:\Program Files\Fichiers communs\Microsoft Shared
[2004-08-20|11:35] C:\Program Files\Fichiers communs\MSSoap
[2004-08-20|11:30] C:\Program Files\Fichiers communs\ODBC
[2006-12-27|21:02] C:\Program Files\Fichiers communs\Roxio Shared
[2004-08-20|11:35] C:\Program Files\Fichiers communs\Services
[2007-01-11|16:31] C:\Program Files\Fichiers communs\snpp106
[2004-08-20|11:30] C:\Program Files\Fichiers communs\SpeechEngines
[2007-06-12|21:55] C:\Program Files\Fichiers communs\System
[2009-03-16|17:50] C:\Program Files\Fichiers communs\Windows Live
[2008-04-27|07:49] C:\Program Files\Fichiers communs\WindowsLiveInstaller

--------------------\\ Process

( 53 Processes )

... OK !

--------------------\\ Recherche avec S_Lop

Aucun fichier / dossier Lop trouvé !

--------------------\\ Recherche de Fichiers / Dossiers Lop

C:\DOCUME~1\ANIKGO~1\LOCALS~1\Temp\msgpl_afdf.tmp

--------------------\\ Verification du Registre

..... OK !

--------------------\\ Verification du fichier Hosts

Fichier Hosts PROPRE


--------------------\\ Recherche de fichiers avec Catchme

catchme 0.3.1353 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2010-01-14 12:08:07
Windows 5.1.2600 Service Pack 2 NTFS
scanning hidden processes ...
scanning hidden files ...
scan completed successfully
hidden processes: 0
hidden files: 0

--------------------\\ Recherche d'autres infections

--------------------\\ Cracks & Keygens ..

C:\DOCUME~1\ANIKGO~1\Local Settings\Application Data\ApplicationHistory\KeygenAntidotePrismeV6.exe.24a36f48.ini


[F:5][D:104]-> C:\DOCUME~1\ANIKGO~1\LOCALS~1\Temp
[F:16][D:0]-> C:\DOCUME~1\ANIKGO~1\Cookies
[F:179][D:21]-> C:\DOCUME~1\ANIKGO~1\LOCALS~1\TEMPOR~1\content.IE5

1 - "C:\Lop SD\LopR_1.txt" - 2010-01-14|12:11 - Option : [1]

--------------------\\ Fin du rapport a 12:11:08
0
Utilisateur anonyme
14 janv. 2010 à 18:57
tu nas pas fait la suppression avec usbfix

ensuite :

▶ double-clique sur le raccourci Lop S&D présent sur ton Bureau

▶ Séléctionne la langue souhaitée , puis choisis l'option "Suppression + Hosts"
▶ Patiente jusqu'à la fin du scan
▶ Poste le rapport généré (C:\lopR.txt)
0
--------------------\\ Lop S&D 4.2.5-0 XP/Vista

Microsoft Windows XP Édition familiale ( v5.1.2600 ) Service Pack 2
X86-based PC ( Uniprocessor Free : Mobile AMD Sempron(tm) Processor 3500+ )
BIOS : BIOS Version 1.7.0
USER : Anik Goulet ( Administrator )
BOOT : Normal boot
Antivirus : AntiVir Desktop 9.0.1.32 (Activated)
C:\ (Local Disk) - NTFS - Total:52 Go (Free:33 Go)
D:\ (CD or DVD)
E:\ (CD or DVD)

"C:\Lop SD" ( MAJ : 19-12-2008|23:40 )
Option : [1] ( 2010-01-14|12:06 )

--------------------\\ Listing des dossiers dans APPLIC~1

[2010-01-12|06:26] C:\DOCUME~1\ALLUSE~1\APPLIC~1\{CFBD8779-FAAB-4357-84F2-1EC8619FADA6}
[2009-12-30|06:28] C:\DOCUME~1\ALLUSE~1\APPLIC~1\Adobe
[2008-02-02|08:22] C:\DOCUME~1\ALLUSE~1\APPLIC~1\Apple Computer
[2010-01-13|06:12] C:\DOCUME~1\ALLUSE~1\APPLIC~1\Avira
[2009-12-30|20:15] C:\DOCUME~1\ALLUSE~1\APPLIC~1\Google
[2006-12-27|21:03] C:\DOCUME~1\ALLUSE~1\APPLIC~1\InstallShield
[2010-01-12|06:42] C:\DOCUME~1\ALLUSE~1\APPLIC~1\Lavasoft
[2007-06-19|15:45] C:\DOCUME~1\ALLUSE~1\APPLIC~1\Lectra
[2007-01-05|14:08] C:\DOCUME~1\ALLUSE~1\APPLIC~1\Macrovision
[2006-12-27|21:05] C:\DOCUME~1\ALLUSE~1\APPLIC~1\McAfee
[2006-12-27|21:05] C:\DOCUME~1\ALLUSE~1\APPLIC~1\McAfee.com
[2007-01-04|15:56] C:\DOCUME~1\ALLUSE~1\APPLIC~1\McAfee.com Personal Firewall
[2009-03-16|17:50] C:\DOCUME~1\ALLUSE~1\APPLIC~1\Microsoft
[2008-12-22|20:25] C:\DOCUME~1\ALLUSE~1\APPLIC~1\MumboJumbo
[2009-08-09|21:24] C:\DOCUME~1\ALLUSE~1\APPLIC~1\NOS
[2007-12-15|22:18] C:\DOCUME~1\ALLUSE~1\APPLIC~1\Office Genuine Advantage
[2007-05-16|10:47] C:\DOCUME~1\ALLUSE~1\APPLIC~1\PopCap
[2004-08-20|11:46] C:\DOCUME~1\ALLUSE~1\APPLIC~1\SBSI
[2006-12-27|21:02] C:\DOCUME~1\ALLUSE~1\APPLIC~1\Sonic
[2009-01-17|10:39] C:\DOCUME~1\ALLUSE~1\APPLIC~1\TEMP
[2007-01-04|17:19] C:\DOCUME~1\ALLUSE~1\APPLIC~1\Windows Genuine Advantage
[2008-04-27|07:39] C:\DOCUME~1\ALLUSE~1\APPLIC~1\WLInstaller
[2007-07-19|06:52] C:\DOCUME~1\ALLUSE~1\APPLIC~1\Yahoo!

[2009-12-30|06:28] C:\DOCUME~1\ANIKGO~1\APPLIC~1\Adobe
[2008-05-21|19:49] C:\DOCUME~1\ANIKGO~1\APPLIC~1\AdobeUM
[2009-12-31|04:44] C:\DOCUME~1\ANIKGO~1\APPLIC~1\Ahead
[2008-02-02|08:12] C:\DOCUME~1\ANIKGO~1\APPLIC~1\Anuman Interactive
[2007-12-26|15:00] C:\DOCUME~1\ANIKGO~1\APPLIC~1\Apple Computer
[2007-07-19|19:54] C:\DOCUME~1\ANIKGO~1\APPLIC~1\ATI
[2010-01-09|15:30] C:\DOCUME~1\ANIKGO~1\APPLIC~1\BitTorrent
[2007-07-22|20:06] C:\DOCUME~1\ANIKGO~1\APPLIC~1\CyberLink
[2010-01-14|11:58] C:\DOCUME~1\ANIKGO~1\APPLIC~1\DNA
[2007-07-20|18:04] C:\DOCUME~1\ANIKGO~1\APPLIC~1\Druide
[2009-12-17|21:16] C:\DOCUME~1\ANIKGO~1\APPLIC~1\FUJIFILM
[2009-10-17|21:10] C:\DOCUME~1\ANIKGO~1\APPLIC~1\Google
[2009-12-17|21:14] C:\DOCUME~1\ANIKGO~1\APPLIC~1\InstallShield
[2009-08-24|20:30] C:\DOCUME~1\ANIKGO~1\APPLIC~1\LANCITE
[2007-10-09|20:20] C:\DOCUME~1\ANIKGO~1\APPLIC~1\Macromedia
[2008-12-09|19:30] C:\DOCUME~1\ANIKGO~1\APPLIC~1\Microsoft
[2007-01-05|18:03] C:\DOCUME~1\ANIKGO~1\APPLIC~1\MSNInstaller
[2007-01-27|18:09] C:\DOCUME~1\ANIKGO~1\APPLIC~1\PhotoInPress
[2009-10-21|15:18] C:\DOCUME~1\ANIKGO~1\APPLIC~1\Printer Info Cache
[2007-04-20|13:18] C:\DOCUME~1\ANIKGO~1\APPLIC~1\Sun
[2008-12-29|18:55] C:\DOCUME~1\ANIKGO~1\APPLIC~1\System
[2009-11-24|18:03] C:\DOCUME~1\ANIKGO~1\APPLIC~1\U3
[2008-05-01|21:31] C:\DOCUME~1\ANIKGO~1\APPLIC~1\VideoEgg

[2008-12-06|10:23] C:\DOCUME~1\AUTREQ~1\APPLIC~1\Adobe
[2006-12-27|21:00] C:\DOCUME~1\AUTREQ~1\APPLIC~1\ATI
[2007-10-12|14:40] C:\DOCUME~1\AUTREQ~1\APPLIC~1\Google
[2004-08-20|11:41] C:\DOCUME~1\AUTREQ~1\APPLIC~1\Identities
[2007-10-12|14:42] C:\DOCUME~1\AUTREQ~1\APPLIC~1\Macromedia
[2007-10-12|14:39] C:\DOCUME~1\AUTREQ~1\APPLIC~1\Microsoft

[2006-12-27|21:00] C:\DOCUME~1\DEFAUL~1\APPLIC~1\ATI
[2004-08-20|11:41] C:\DOCUME~1\DEFAUL~1\APPLIC~1\Identities
[2004-08-20|11:30] C:\DOCUME~1\DEFAUL~1\APPLIC~1\Microsoft

[2010-01-13|19:41] C:\DOCUME~1\LOCALS~1\APPLIC~1\Adobe
[2010-01-13|19:43] C:\DOCUME~1\LOCALS~1\APPLIC~1\Macromedia
[2007-01-04|15:54] C:\DOCUME~1\LOCALS~1\APPLIC~1\McAfee.com Personal Firewall
[2004-08-20|11:30] C:\DOCUME~1\LOCALS~1\APPLIC~1\Microsoft

[2004-08-20|11:30] C:\DOCUME~1\NETWOR~1\APPLIC~1\Microsoft


--------------------\\ Tâches planifiées dans C:\WINDOWS\tasks

[2010-01-14 07:13][--a------] C:\WINDOWS\tasks\Ad-Aware Update (Weekly).job
[2010-01-14 07:13][--a------] C:\WINDOWS\tasks\Ad-Aware Update (Daily 4).job
[2010-01-14 07:13][--a------] C:\WINDOWS\tasks\Ad-Aware Update (Daily 3).job
[2010-01-14 07:13][--a------] C:\WINDOWS\tasks\Ad-Aware Update (Daily 2).job
[2010-01-14 07:13][--a------] C:\WINDOWS\tasks\Ad-Aware Update (Daily 1).job
[2010-01-14 11:08][--ah-----] C:\WINDOWS\tasks\{66BA574B-1E11-49b8-909C-8CC9E0E8E015}.job
[2010-01-14 11:12][--a------] C:\WINDOWS\tasks\GoogleUpdateTaskMachineUA.job
[2010-01-14 07:05][--a------] C:\WINDOWS\tasks\GoogleUpdateTaskMachineCore.job
[2010-01-14 07:05][--ah-----] C:\WINDOWS\tasks\SA.DAT
[2004-08-05 13:00][-r-h-----] C:\WINDOWS\tasks\desktop.ini

--------------------\\ Listing des dossiers dans C:\Program Files

[2009-10-18|08:00] C:\Program Files\Adobe
[2006-12-27|20:56] C:\Program Files\AMD
[2006-12-27|20:54] C:\Program Files\ATI Technologies
[2010-01-13|06:12] C:\Program Files\Avira
[2009-12-30|19:12] C:\Program Files\AviSynth 2.5
[2009-12-30|20:03] C:\Program Files\AVS4YOU
[2006-12-27|21:06] C:\Program Files\BAE
[2009-06-22|21:10] C:\Program Files\BitTorrent
[2006-12-27|20:55] C:\Program Files\Broadcom
[2008-04-25|17:17] C:\Program Files\Common Files
[2004-08-20|11:35] C:\Program Files\ComPlus Applications
[2006-12-27|20:58] C:\Program Files\CONEXANT
[2006-12-27|21:01] C:\Program Files\CyberLink
[2006-12-27|20:57] C:\Program Files\Dell
[2006-12-27|21:01] C:\Program Files\Digital Line Detect
[2010-01-14|07:08] C:\Program Files\DNA
[2007-01-04|18:43] C:\Program Files\Druide
[2007-01-05|00:30] C:\Program Files\D-Tools
[2009-03-16|17:50] C:\Program Files\Fichiers communs
[2009-12-17|21:16] C:\Program Files\FinePixViewerS
[2009-12-30|20:15] C:\Program Files\Google
[2007-11-04|10:51] C:\Program Files\Hewlett-Packard
[2009-12-17|21:15] C:\Program Files\InstallShield Installation Information
[2010-01-13|22:56] C:\Program Files\Internet Explorer
[2009-12-19|19:36] C:\Program Files\Java
[2010-01-12|06:25] C:\Program Files\Lavasoft
[2009-12-30|20:14] C:\Program Files\m4ng
[2007-06-19|11:01] C:\Program Files\Micro Application
[2009-11-07|15:41] C:\Program Files\Microsoft
[2009-01-01|22:31] C:\Program Files\Microsoft Etudes
[2004-08-20|11:37] C:\Program Files\microsoft frontpage
[2007-01-04|18:25] C:\Program Files\Microsoft Office
[2009-11-09|05:04] C:\Program Files\Microsoft Silverlight
[2008-04-27|08:01] C:\Program Files\Microsoft SQL Server Compact Edition
[2008-06-07|19:49] C:\Program Files\Microsoft Visual Studio
[2008-08-10|07:18] C:\Program Files\Microsoft Works
[2007-01-04|18:12] C:\Program Files\Microsoft.NET
[2007-07-18|20:03] C:\Program Files\mIRC
[2008-06-07|20:10] C:\Program Files\Modem Helper
[2004-08-20|11:35] C:\Program Files\Movie Maker
[2009-06-22|21:10] C:\Program Files\Mozilla Firefox
[2009-08-15|22:00] C:\Program Files\MSBuild
[2007-01-06|18:53] C:\Program Files\MSN
[2009-06-22|21:29] C:\Program Files\MSN Games
[2004-08-20|11:34] C:\Program Files\MSN Gaming Zone
[2008-04-27|07:31] C:\Program Files\MSN Messenger
[2007-01-04|17:16] C:\Program Files\MSXML 4.0
[2007-08-15|05:07] C:\Program Files\MSXML 6.0
[2007-01-05|00:38] C:\Program Files\Nero
[2004-08-20|11:35] C:\Program Files\NetMeeting
[2008-06-07|20:10] C:\Program Files\NetWaiting
[2009-08-09|21:24] C:\Program Files\NOS
[2009-01-16|20:14] C:\Program Files\Oberon Media
[2009-08-13|22:20] C:\Program Files\Outlook Express
[2008-06-07|20:10] C:\Program Files\QuickTime
[2009-08-15|21:59] C:\Program Files\Reference Assemblies
[2007-01-04|18:21] C:\Program Files\Roxio
[2007-01-04|18:27] C:\Program Files\Satsuki Decoder Pack
[2006-12-27|20:58] C:\Program Files\Sigmatel
[2006-12-27|20:55] C:\Program Files\Synaptics
[2004-08-20|11:41] C:\Program Files\Uninstall Information
[2009-04-01|21:06] C:\Program Files\Unity
[2009-11-07|15:45] C:\Program Files\Windows Live
[2009-11-07|15:41] C:\Program Files\Windows Live SkyDrive
[2007-01-15|14:46] C:\Program Files\Windows Media Connect 2
[2007-10-12|18:33] C:\Program Files\Windows Media Player
[2004-08-20|11:34] C:\Program Files\Windows NT
[2004-08-20|11:35] C:\Program Files\WindowsUpdate
[2007-01-04|18:26] C:\Program Files\WinRAR
[2008-09-05|20:11] C:\Program Files\WordBiz
[2004-08-20|11:37] C:\Program Files\xerox

--------------------\\ Listing des dossiers dans C:\Program Files\Fichiers communs

[2007-04-15|06:50] C:\Program Files\Fichiers communs\ACD Systems
[2009-10-18|08:01] C:\Program Files\Fichiers communs\Adobe
[2007-01-05|14:08] C:\Program Files\Fichiers communs\Adobe Systems Shared
[2009-06-19|23:54] C:\Program Files\Fichiers communs\Agnitum Shared
[2007-01-05|13:18] C:\Program Files\Fichiers communs\Ahead
[2007-01-04|18:13] C:\Program Files\Fichiers communs\DESIGNER
[2008-11-17|22:46] C:\Program Files\Fichiers communs\GTK
[2006-12-27|21:02] C:\Program Files\Fichiers communs\InstallShield
[2006-12-27|20:52] C:\Program Files\Fichiers communs\Java
[2007-06-19|22:08] C:\Program Files\Fichiers communs\Lectra
[2009-12-30|20:24] C:\Program Files\Fichiers communs\Microsoft Shared
[2004-08-20|11:35] C:\Program Files\Fichiers communs\MSSoap
[2004-08-20|11:30] C:\Program Files\Fichiers communs\ODBC
[2006-12-27|21:02] C:\Program Files\Fichiers communs\Roxio Shared
[2004-08-20|11:35] C:\Program Files\Fichiers communs\Services
[2007-01-11|16:31] C:\Program Files\Fichiers communs\snpp106
[2004-08-20|11:30] C:\Program Files\Fichiers communs\SpeechEngines
[2007-06-12|21:55] C:\Program Files\Fichiers communs\System
[2009-03-16|17:50] C:\Program Files\Fichiers communs\Windows Live
[2008-04-27|07:49] C:\Program Files\Fichiers communs\WindowsLiveInstaller

--------------------\\ Process

( 53 Processes )

... OK !

--------------------\\ Recherche avec S_Lop

Aucun fichier / dossier Lop trouvé !

--------------------\\ Recherche de Fichiers / Dossiers Lop

C:\DOCUME~1\ANIKGO~1\LOCALS~1\Temp\msgpl_afdf.tmp

--------------------\\ Verification du Registre

..... OK !

--------------------\\ Verification du fichier Hosts

Fichier Hosts PROPRE


--------------------\\ Recherche de fichiers avec Catchme

catchme 0.3.1353 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2010-01-14 12:08:07
Windows 5.1.2600 Service Pack 2 NTFS
scanning hidden processes ...
scanning hidden files ...
scan completed successfully
hidden processes: 0
hidden files: 0

--------------------\\ Recherche d'autres infections

--------------------\\ Cracks & Keygens ..

C:\DOCUME~1\ANIKGO~1\Local Settings\Application Data\ApplicationHistory\KeygenAntidotePrismeV6.exe.24a36f48.ini


[F:5][D:104]-> C:\DOCUME~1\ANIKGO~1\LOCALS~1\Temp
[F:16][D:0]-> C:\DOCUME~1\ANIKGO~1\Cookies
[F:179][D:21]-> C:\DOCUME~1\ANIKGO~1\LOCALS~1\TEMPOR~1\content.IE5

1 - "C:\Lop SD\LopR_1.txt" - 2010-01-14|12:11 - Option : [1]

--------------------\\ Fin du rapport a 12:11:08
0
Je dois refaire USBFix ? Seulement l'Étape de la suppression ou je dois recommencer ?
0
Utilisateur anonyme
14 janv. 2010 à 22:01
uniquement la suppression si tu ne l as pas faite !
0
Si je l'avais fait... et bien je l'Ai refais... j'ai un Zip sur mon bureau et on me dit d'envoyer ce ficher... je fais quoi avec ca ?
0
Utilisateur anonyme
14 janv. 2010 à 22:53
poste le rapport de suppression dans ce cas
0
############################## | UsbFix V6.073 |

User : Anik Goulet (Administrateurs) # ANIK
Update on 09/01/2010 by El Desaparecido , C_XX & Chimay8
Start at: 17:16:10 | 2010-01-14
Website : http://pagesperso-orange.fr/NosTools/index.html
Contact : FindyKill.Contact@gmail.com

Mobile AMD Sempron(tm) Processor 3500+
Microsoft Windows XP Édition familiale (5.1.2600 32-bit) # Service Pack 2
Internet Explorer 6.0.2900.2180
Windows Firewall Status : Enabled
AV : AntiVir Desktop 9.0.1.32 [ Enabled | Updated ]

C:\ -> Disque fixe local # 52,81 Go (33,67 Go free) # NTFS
D:\ -> Disque CD-ROM
E:\ -> Disque CD-ROM

############################## | Processus actifs |

C:\WINDOWS\System32\smss.exe 748
C:\WINDOWS\system32\csrss.exe 804
C:\WINDOWS\system32\winlogon.exe 832
C:\WINDOWS\system32\services.exe 876
C:\WINDOWS\system32\lsass.exe 888
C:\WINDOWS\system32\Ati2evxx.exe 1064
C:\WINDOWS\system32\svchost.exe 1080
C:\WINDOWS\system32\svchost.exe 1172
C:\WINDOWS\System32\svchost.exe 1316
C:\WINDOWS\system32\logonui.exe 1372
C:\WINDOWS\system32\svchost.exe 1412
C:\WINDOWS\system32\Ati2evxx.exe 1432
C:\WINDOWS\system32\svchost.exe 1640
C:\WINDOWS\System32\WLTRYSVC.EXE 1892
C:\WINDOWS\System32\bcmwltry.exe 1904
C:\Program Files\Lavasoft\Ad-Aware\AAWService.exe 1912
C:\WINDOWS\system32\spoolsv.exe 2008
C:\Program Files\Avira\AntiVir Desktop\sched.exe 200
C:\WINDOWS\system32\svchost.exe 268
C:\Program Files\Avira\AntiVir Desktop\avguard.exe 440
C:\Program Files\Google\Update\GoogleUpdate.exe 468
C:\Program Files\Java\jre6\bin\jqs.exe 492
C:\Program Files\Fichiers communs\Microsoft Shared\VS7DEBUG\MDM.EXE 552
C:\Program Files\Google\Update\GoogleUpdate.exe 620
C:\Program Files\Dell\QuickSet\NICCONFIGSVC.exe 784
C:\WINDOWS\Explorer.EXE 1404
C:\Program Files\Google\Update\GoogleUpdate.exe 1572
C:\WINDOWS\system32\svchost.exe 1680
C:\WINDOWS\system32\wuauclt.exe 1712
C:\WINDOWS\system32\wbem\wmiprvse.exe 2244
C:\WINDOWS\system32\wbem\unsecapp.exe 2460
C:\WINDOWS\system32\wbem\wmiprvse.exe 2472
C:\WINDOWS\System32\alg.exe 2608
C:\WINDOWS\system32\wbem\wmiapsrv.exe 2656

################## | Elements infectieux |

Supprimé ! C:\Recycler\S-1-5-21-4118579170-2468342108-67488333-1006

################## | Registre |


################## | Mountpoints2 |


################## | Listing des fichiers présent |

[2010-01-14 17:15|--a------|2012] C:\aaw7boot.log
[2010-01-13 21:58|--a------|2445] C:\Ad-Report-CLEAN[1].log
[2008-02-02 08:17|--a------|1659] C:\anumanlive.log
[2010-01-13 21:19|--a------|4] C:\AUTOEXEC.BAT
[2007-01-05 14:19|-rahs----|216] C:\boot.ini
[2004-08-05 13:00|-rahs----|4952] C:\Bootfont.bin
[2004-08-20 11:37|--a------|0] C:\CONFIG.SYS
[2006-12-27 20:38|-rah-----|5472] C:\dell.sdr
[2007-01-04 18:25|--a------|4128] C:\INFCACHE.1
[2004-08-20 11:37|--ah-----|0] C:\IO.SYS
[2010-01-13 21:19|--a------|7406] C:\Kill'em.txt
[2010-01-13 20:58|--a------|28966] C:\List'em.txt
[2010-01-14 15:14|--a------|12146] C:\lopR.txt
[2009-12-30 19:23|--a------|1645] C:\mpeg.txt
[2004-08-20 11:37|--ah-----|0] C:\MSDOS.SYS
[2004-08-05 13:00|-rahs----|47564] C:\NTDETECT.COM
[2004-08-05 13:00|-rahs----|251712] C:\ntldr
[?|?|?] C:\pagefile.sys
[2009-02-22 16:24|--a------|230408] C:\SNPP106.RAW
[2010-01-14 17:23|--a------|3319] C:\UsbFix.txt
[2003-03-12 13:50|--ah-----|140] C:\WM800918.bin
[2007-07-29 19:11|--a------|150] C:\YServer.txt

################## | Vaccination |

# C:\autorun.inf -> Dossier créé par UsbFix.

################## | Crack > Keygen > Serial |
0
Utilisateur anonyme
15 janv. 2010 à 11:52
hello supprime ceci :

C:\YServer.txt

ensuite :

▶ double-clique ( pour Vista / 7 => clic droit "executer en tant qu'administrateuir" ) sur le raccourci Lop S&D présent sur ton Bureau

▶ Séléctionne la langue souhaitée , puis choisis l'option "Suppression + Hosts"
▶ Patiente jusqu'à la fin du scan
▶ Poste le rapport généré (C:\lopR.txt)

refais un scan OTL comme indiqué plus haut stp , apres avoir supprimé LOP SD
0
--------------------\\ Lop S&D 4.2.5-0 XP/Vista

Microsoft Windows XP Édition familiale ( v5.1.2600 ) Service Pack 2
X86-based PC ( Uniprocessor Free : Mobile AMD Sempron(tm) Processor 3500+ )
BIOS : BIOS Version 1.7.0
USER : Anik Goulet ( Administrator )
BOOT : Normal boot
Antivirus : AntiVir Desktop 9.0.1.32 (Not Activated)
C:\ (Local Disk) - NTFS - Total:52 Go (Free:33 Go)
D:\ (CD or DVD)
E:\ (CD or DVD)

"C:\Lop SD" ( MAJ : 19-12-2008|23:40 )
Option : [2] ( 2010-01-15| 6:33 )


\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\


--------------------\\ Listing des dossiers dans APPLIC~1

[2010-01-12|06:26] C:\DOCUME~1\ALLUSE~1\APPLIC~1\{CFBD8779-FAAB-4357-84F2-1EC8619FADA6}
[2009-12-30|06:28] C:\DOCUME~1\ALLUSE~1\APPLIC~1\Adobe
[2008-02-02|08:22] C:\DOCUME~1\ALLUSE~1\APPLIC~1\Apple Computer
[2010-01-13|06:12] C:\DOCUME~1\ALLUSE~1\APPLIC~1\Avira
[2009-12-30|20:15] C:\DOCUME~1\ALLUSE~1\APPLIC~1\Google
[2006-12-27|21:03] C:\DOCUME~1\ALLUSE~1\APPLIC~1\InstallShield
[2010-01-12|06:42] C:\DOCUME~1\ALLUSE~1\APPLIC~1\Lavasoft
[2007-06-19|15:45] C:\DOCUME~1\ALLUSE~1\APPLIC~1\Lectra
[2007-01-05|14:08] C:\DOCUME~1\ALLUSE~1\APPLIC~1\Macrovision
[2006-12-27|21:05] C:\DOCUME~1\ALLUSE~1\APPLIC~1\McAfee
[2006-12-27|21:05] C:\DOCUME~1\ALLUSE~1\APPLIC~1\McAfee.com
[2007-01-04|15:56] C:\DOCUME~1\ALLUSE~1\APPLIC~1\McAfee.com Personal Firewall
[2009-03-16|17:50] C:\DOCUME~1\ALLUSE~1\APPLIC~1\Microsoft
[2008-12-22|20:25] C:\DOCUME~1\ALLUSE~1\APPLIC~1\MumboJumbo
[2009-08-09|21:24] C:\DOCUME~1\ALLUSE~1\APPLIC~1\NOS
[2007-12-15|22:18] C:\DOCUME~1\ALLUSE~1\APPLIC~1\Office Genuine Advantage
[2007-05-16|10:47] C:\DOCUME~1\ALLUSE~1\APPLIC~1\PopCap
[2004-08-20|11:46] C:\DOCUME~1\ALLUSE~1\APPLIC~1\SBSI
[2006-12-27|21:02] C:\DOCUME~1\ALLUSE~1\APPLIC~1\Sonic
[2009-01-17|10:39] C:\DOCUME~1\ALLUSE~1\APPLIC~1\TEMP
[2007-01-04|17:19] C:\DOCUME~1\ALLUSE~1\APPLIC~1\Windows Genuine Advantage
[2008-04-27|07:39] C:\DOCUME~1\ALLUSE~1\APPLIC~1\WLInstaller
[2007-07-19|06:52] C:\DOCUME~1\ALLUSE~1\APPLIC~1\Yahoo!

[2009-12-30|06:28] C:\DOCUME~1\ANIKGO~1\APPLIC~1\Adobe
[2008-05-21|19:49] C:\DOCUME~1\ANIKGO~1\APPLIC~1\AdobeUM
[2009-12-31|04:44] C:\DOCUME~1\ANIKGO~1\APPLIC~1\Ahead
[2008-02-02|08:12] C:\DOCUME~1\ANIKGO~1\APPLIC~1\Anuman Interactive
[2007-12-26|15:00] C:\DOCUME~1\ANIKGO~1\APPLIC~1\Apple Computer
[2007-07-19|19:54] C:\DOCUME~1\ANIKGO~1\APPLIC~1\ATI
[2010-01-09|15:30] C:\DOCUME~1\ANIKGO~1\APPLIC~1\BitTorrent
[2007-07-22|20:06] C:\DOCUME~1\ANIKGO~1\APPLIC~1\CyberLink
[2010-01-15|06:29] C:\DOCUME~1\ANIKGO~1\APPLIC~1\DNA
[2007-07-20|18:04] C:\DOCUME~1\ANIKGO~1\APPLIC~1\Druide
[2009-12-17|21:16] C:\DOCUME~1\ANIKGO~1\APPLIC~1\FUJIFILM
[2009-10-17|21:10] C:\DOCUME~1\ANIKGO~1\APPLIC~1\Google
[2009-12-17|21:14] C:\DOCUME~1\ANIKGO~1\APPLIC~1\InstallShield
[2009-08-24|20:30] C:\DOCUME~1\ANIKGO~1\APPLIC~1\LANCITE
[2007-10-09|20:20] C:\DOCUME~1\ANIKGO~1\APPLIC~1\Macromedia
[2008-12-09|19:30] C:\DOCUME~1\ANIKGO~1\APPLIC~1\Microsoft
[2007-01-05|18:03] C:\DOCUME~1\ANIKGO~1\APPLIC~1\MSNInstaller
[2007-01-27|18:09] C:\DOCUME~1\ANIKGO~1\APPLIC~1\PhotoInPress
[2009-10-21|15:18] C:\DOCUME~1\ANIKGO~1\APPLIC~1\Printer Info Cache
[2007-04-20|13:18] C:\DOCUME~1\ANIKGO~1\APPLIC~1\Sun
[2008-12-29|18:55] C:\DOCUME~1\ANIKGO~1\APPLIC~1\System
[2009-11-24|18:03] C:\DOCUME~1\ANIKGO~1\APPLIC~1\U3
[2008-05-01|21:31] C:\DOCUME~1\ANIKGO~1\APPLIC~1\VideoEgg

[2008-12-06|10:23] C:\DOCUME~1\AUTREQ~1\APPLIC~1\Adobe
[2006-12-27|21:00] C:\DOCUME~1\AUTREQ~1\APPLIC~1\ATI
[2007-10-12|14:40] C:\DOCUME~1\AUTREQ~1\APPLIC~1\Google
[2004-08-20|11:41] C:\DOCUME~1\AUTREQ~1\APPLIC~1\Identities
[2007-10-12|14:42] C:\DOCUME~1\AUTREQ~1\APPLIC~1\Macromedia
[2007-10-12|14:39] C:\DOCUME~1\AUTREQ~1\APPLIC~1\Microsoft

[2006-12-27|21:00] C:\DOCUME~1\DEFAUL~1\APPLIC~1\ATI
[2004-08-20|11:41] C:\DOCUME~1\DEFAUL~1\APPLIC~1\Identities
[2004-08-20|11:30] C:\DOCUME~1\DEFAUL~1\APPLIC~1\Microsoft

[2010-01-13|19:41] C:\DOCUME~1\LOCALS~1\APPLIC~1\Adobe
[2010-01-13|19:43] C:\DOCUME~1\LOCALS~1\APPLIC~1\Macromedia
[2007-01-04|15:54] C:\DOCUME~1\LOCALS~1\APPLIC~1\McAfee.com Personal Firewall
[2004-08-20|11:30] C:\DOCUME~1\LOCALS~1\APPLIC~1\Microsoft

[2004-08-20|11:30] C:\DOCUME~1\NETWOR~1\APPLIC~1\Microsoft


--------------------\\ Tâches planifiées dans C:\WINDOWS\tasks

[2010-01-15 06:23][--a------] C:\WINDOWS\tasks\Ad-Aware Update (Weekly).job
[2010-01-15 06:23][--a------] C:\WINDOWS\tasks\Ad-Aware Update (Daily 4).job
[2010-01-15 06:23][--a------] C:\WINDOWS\tasks\Ad-Aware Update (Daily 3).job
[2010-01-15 06:23][--a------] C:\WINDOWS\tasks\Ad-Aware Update (Daily 2).job
[2010-01-15 06:23][--a------] C:\WINDOWS\tasks\Ad-Aware Update (Daily 1).job
[2010-01-14 22:12][--a------] C:\WINDOWS\tasks\GoogleUpdateTaskMachineUA.job
[2010-01-15 06:17][--a------] C:\WINDOWS\tasks\GoogleUpdateTaskMachineCore.job
[2010-01-15 06:16][--ah-----] C:\WINDOWS\tasks\SA.DAT
[2004-08-05 13:00][-r-h-----] C:\WINDOWS\tasks\desktop.ini

--------------------\\ Listing des dossiers dans C:\Program Files

[2009-10-18|08:00] C:\Program Files\Adobe
[2006-12-27|20:56] C:\Program Files\AMD
[2006-12-27|20:54] C:\Program Files\ATI Technologies
[2010-01-13|06:12] C:\Program Files\Avira
[2009-12-30|19:12] C:\Program Files\AviSynth 2.5
[2009-12-30|20:03] C:\Program Files\AVS4YOU
[2006-12-27|21:06] C:\Program Files\BAE
[2009-06-22|21:10] C:\Program Files\BitTorrent
[2006-12-27|20:55] C:\Program Files\Broadcom
[2008-04-25|17:17] C:\Program Files\Common Files
[2004-08-20|11:35] C:\Program Files\ComPlus Applications
[2006-12-27|20:58] C:\Program Files\CONEXANT
[2006-12-27|21:01] C:\Program Files\CyberLink
[2006-12-27|20:57] C:\Program Files\Dell
[2006-12-27|21:01] C:\Program Files\Digital Line Detect
[2010-01-15|06:19] C:\Program Files\DNA
[2007-01-04|18:43] C:\Program Files\Druide
[2007-01-05|00:30] C:\Program Files\D-Tools
[2009-03-16|17:50] C:\Program Files\Fichiers communs
[2009-12-17|21:16] C:\Program Files\FinePixViewerS
[2009-12-30|20:15] C:\Program Files\Google
[2007-11-04|10:51] C:\Program Files\Hewlett-Packard
[2009-12-17|21:15] C:\Program Files\InstallShield Installation Information
[2010-01-13|22:56] C:\Program Files\Internet Explorer
[2009-12-19|19:36] C:\Program Files\Java
[2010-01-12|06:25] C:\Program Files\Lavasoft
[2009-12-30|20:14] C:\Program Files\m4ng
[2007-06-19|11:01] C:\Program Files\Micro Application
[2009-11-07|15:41] C:\Program Files\Microsoft
[2009-01-01|22:31] C:\Program Files\Microsoft Etudes
[2004-08-20|11:37] C:\Program Files\microsoft frontpage
[2007-01-04|18:25] C:\Program Files\Microsoft Office
[2009-11-09|05:04] C:\Program Files\Microsoft Silverlight
[2008-04-27|08:01] C:\Program Files\Microsoft SQL Server Compact Edition
[2008-06-07|19:49] C:\Program Files\Microsoft Visual Studio
[2008-08-10|07:18] C:\Program Files\Microsoft Works
[2007-01-04|18:12] C:\Program Files\Microsoft.NET
[2007-07-18|20:03] C:\Program Files\mIRC
[2008-06-07|20:10] C:\Program Files\Modem Helper
[2004-08-20|11:35] C:\Program Files\Movie Maker
[2009-06-22|21:10] C:\Program Files\Mozilla Firefox
[2009-08-15|22:00] C:\Program Files\MSBuild
[2007-01-06|18:53] C:\Program Files\MSN
[2009-06-22|21:29] C:\Program Files\MSN Games
[2004-08-20|11:34] C:\Program Files\MSN Gaming Zone
[2008-04-27|07:31] C:\Program Files\MSN Messenger
[2007-01-04|17:16] C:\Program Files\MSXML 4.0
[2007-08-15|05:07] C:\Program Files\MSXML 6.0
[2007-01-05|00:38] C:\Program Files\Nero
[2004-08-20|11:35] C:\Program Files\NetMeeting
[2008-06-07|20:10] C:\Program Files\NetWaiting
[2009-08-09|21:24] C:\Program Files\NOS
[2009-01-16|20:14] C:\Program Files\Oberon Media
[2009-08-13|22:20] C:\Program Files\Outlook Express
[2008-06-07|20:10] C:\Program Files\QuickTime
[2009-08-15|21:59] C:\Program Files\Reference Assemblies
[2007-01-04|18:21] C:\Program Files\Roxio
[2007-01-04|18:27] C:\Program Files\Satsuki Decoder Pack
[2006-12-27|20:58] C:\Program Files\Sigmatel
[2006-12-27|20:55] C:\Program Files\Synaptics
[2004-08-20|11:41] C:\Program Files\Uninstall Information
[2009-04-01|21:06] C:\Program Files\Unity
[2009-11-07|15:45] C:\Program Files\Windows Live
[2009-11-07|15:41] C:\Program Files\Windows Live SkyDrive
[2007-01-15|14:46] C:\Program Files\Windows Media Connect 2
[2007-10-12|18:33] C:\Program Files\Windows Media Player
[2004-08-20|11:34] C:\Program Files\Windows NT
[2004-08-20|11:35] C:\Program Files\WindowsUpdate
[2007-01-04|18:26] C:\Program Files\WinRAR
[2008-09-05|20:11] C:\Program Files\WordBiz
[2004-08-20|11:37] C:\Program Files\xerox

--------------------\\ Listing des dossiers dans C:\Program Files\Fichiers communs

[2007-04-15|06:50] C:\Program Files\Fichiers communs\ACD Systems
[2009-10-18|08:01] C:\Program Files\Fichiers communs\Adobe
[2007-01-05|14:08] C:\Program Files\Fichiers communs\Adobe Systems Shared
[2009-06-19|23:54] C:\Program Files\Fichiers communs\Agnitum Shared
[2007-01-05|13:18] C:\Program Files\Fichiers communs\Ahead
[2007-01-04|18:13] C:\Program Files\Fichiers communs\DESIGNER
[2008-11-17|22:46] C:\Program Files\Fichiers communs\GTK
[2006-12-27|21:02] C:\Program Files\Fichiers communs\InstallShield
[2006-12-27|20:52] C:\Program Files\Fichiers communs\Java
[2007-06-19|22:08] C:\Program Files\Fichiers communs\Lectra
[2009-12-30|20:24] C:\Program Files\Fichiers communs\Microsoft Shared
[2004-08-20|11:35] C:\Program Files\Fichiers communs\MSSoap
[2004-08-20|11:30] C:\Program Files\Fichiers communs\ODBC
[2006-12-27|21:02] C:\Program Files\Fichiers communs\Roxio Shared
[2004-08-20|11:35] C:\Program Files\Fichiers communs\Services
[2007-01-11|16:31] C:\Program Files\Fichiers communs\snpp106
[2004-08-20|11:30] C:\Program Files\Fichiers communs\SpeechEngines
[2007-06-12|21:55] C:\Program Files\Fichiers communs\System
[2009-03-16|17:50] C:\Program Files\Fichiers communs\Windows Live
[2008-04-27|07:49] C:\Program Files\Fichiers communs\WindowsLiveInstaller

--------------------\\ Process

( 45 Processes )

... OK !

--------------------\\ Recherche avec S_Lop

Aucun fichier / dossier Lop trouvé !

--------------------\\ Recherche de Fichiers / Dossiers Lop

Aucun fichier / dossier Lop trouvé !

--------------------\\ Verification du Registre

..... OK !

--------------------\\ Verification du fichier Hosts

Fichier Hosts PROPRE


--------------------\\ Recherche de fichiers avec Catchme

catchme 0.3.1353 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2010-01-15 06:35:31
Windows 5.1.2600 Service Pack 2 NTFS
scanning hidden processes ...
scanning hidden files ...
scan completed successfully
hidden processes: 0
hidden files: 0

--------------------\\ Recherche d'autres infections

--------------------\\ Cracks & Keygens ..

C:\DOCUME~1\ANIKGO~1\Local Settings\Application Data\ApplicationHistory\KeygenAntidotePrismeV6.exe.24a36f48.ini


[F:12][D:103]-> C:\DOCUME~1\ANIKGO~1\LOCALS~1\Temp
[F:18][D:0]-> C:\DOCUME~1\ANIKGO~1\Cookies
[F:108][D:21]-> C:\DOCUME~1\ANIKGO~1\LOCALS~1\TEMPOR~1\content.IE5

1 - "C:\Lop SD\LopR_1.txt" - 2010-01-14|12:11 - Option : [1]
2 - "C:\Lop SD\LopR_2.txt" - 2010-01-14|15:14 - Option : [2]
3 - "C:\Lop SD\LopR_3.txt" - 2010-01-15| 6:37 - Option : [2]

--------------------\\ Fin du rapport a 6:37:03
0
http://www.cijoint.fr/cjlink.php?file=cj201001/cijn96o3nU.txt
http://www.cijoint.fr/cjlink.php?file=cj201001/cijmpUcWDM.txt
0
Utilisateur anonyme
15 janv. 2010 à 13:23
Imprime ces instructions car il faudra fermer toutes les fenêtres et applications lors de l'installation et de l'analyse.



▶ Télécharge :

Malwarebytes

ou :

Malwarebytes

▶ Installe le ( choisis bien "francais" ; ne modifie pas les paramètres d'installe ) et mets le à jour .

(NB : Si tu as un message d'erreur t'indiquant qu'il te manque "COMCTL32.OCX" lors de l'installe, alors télécharge le ici : COMCTL32.OCX

▶ Potasses le Tuto pour te familiariser avec le prg :


( cela dit, il est très simple d'utilisation ).

relance malwarebytes en suivant scrupuleusement ces consignes :

! Déconnecte toi et ferme toutes applications en cours !

▶ Lance Malwarebyte's .

Fais un examen dit "Complet" .

▶ Laisse le programme travailler ( et ne rien faire d'autre avec le PC durant le scan ).
▶ à la fin tu cliques sur "résultat" .
Vérifie que tous les objets infectés soient validés, puis clique sur " suppression " .

Note : si il faut redémarrer ton PC pour finir le nettoyage, fais le !


Poste le rapport sauvegardé après la suppression des objets infectés (dans l'onglet "rapport/log"de Malwarebytes, le dernier en date)

0
Malwarebytes' Anti-Malware 1.44
Version de la base de données: 3572
Windows 5.1.2600 Service Pack 2
Internet Explorer 6.0.2900.2180

2010-01-15 18:43:52
mbam-log-2010-01-15 (18-43-52).txt

Type de recherche: Examen complet (C:\|)
Eléments examinés: 183313
Temps écoulé: 42 minute(s), 49 second(s)

Processus mémoire infecté(s): 0
Module(s) mémoire infecté(s): 0
Clé(s) du Registre infectée(s): 30
Valeur(s) du Registre infectée(s): 0
Elément(s) de données du Registre infecté(s): 3
Dossier(s) infecté(s): 13
Fichier(s) infecté(s): 157

Processus mémoire infecté(s):
(Aucun élément nuisible détecté)

Module(s) mémoire infecté(s):
(Aucun élément nuisible détecté)

Clé(s) du Registre infectée(s):
HKEY_CLASSES_ROOT\videoegg.activexloader (Adware.VideoEgg) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{168dc258-1455-4e61-8590-9dac2f27b675} (Adware.VideoEgg) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{1a8642f1-dc80-4edc-a39d-0fb62a58b455} (Adware.VideoEgg) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{3f91eb90-ef62-44ee-a685-fac29af111cd} (Adware.VideoEgg) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{5c29c7e4-5321-4cad-be2e-877666bed5df} (Adware.VideoEgg) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{83dfb6ee-ab18-41b5-86d4-b544a141d67e} (Adware.VideoEgg) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{88d6cf0e-cf70-4c24-bf6e-e4e414bc649c} (Adware.VideoEgg) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{8f6a82a2-d7b1-443e-bb9f-f7dc887dd618} (Adware.VideoEgg) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{9856e2d8-ffb2-4fe5-8cad-d5ad6a35a804} (Adware.VideoEgg) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{a3d06987-c35e-49e4-8fe2-ac67b9fbfb4c} (Adware.VideoEgg) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{a58c497b-3ee2-45e7-9594-daca6be2a0d0} (Adware.VideoEgg) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{ad0a3058-fd49-4f98-a514-fd055201835e} (Adware.VideoEgg) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{ad5915ea-b61a-4dba-b5c8-ef4b2df0a3c7} (Adware.VideoEgg) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{af2e62b6-f9e1-4d4f-a10a-9dc8e6dcbcc0} (Adware.VideoEgg) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{af2e62b6-f9e1-4d4f-a10a-9dc8e6dcbcc0} (Adware.VideoEgg) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Code Store Database\Distribution Units\{af2e62b6-f9e1-4d4f-a10a-9dc8e6dcbcc0} (Adware.VideoEgg) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{bb187c0d-6f53-4f3e-9590-98fd3a7364a2} (Adware.VideoEgg) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{c5041fd9-4819-4dc4-b20e-c950b5b03d2a} (Adware.VideoEgg) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{d17726cc-d4dd-4c4a-9671-471d56e413b5} (Adware.VideoEgg) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{db8cce99-59c6-4552-8bfc-058feb38d6ce} (Adware.VideoEgg) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{dc3a04ee-cdd7-4407-915c-a5502f97eecd} (Adware.VideoEgg) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{e1a63484-a022-4d42-830a-fbd411514440} (Adware.VideoEgg) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{e282c728-189d-419e-8ee2-1601f4b39ba5} (Adware.VideoEgg) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\videoegg.activexloader.1 (Adware.VideoEgg) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{6fd31ed6-7c94-4bbc-8e95-f927f4d3a949} (Adware.180Solutions) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\videoegg (Adware.VideoEgg) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\MozillaPlugins\@videoegg.com/publisher,version=1.5 (Adware.VideoEgg) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\VideoEgg (Adware.VideoEgg) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\MozillaPlugins\@videoegg.com/publisher,version=1.5 (Adware.VideoEgg) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\VideoEgg (Adware.VideoEgg) -> Quarantined and deleted successfully.

Valeur(s) du Registre infectée(s):
(Aucun élément nuisible détecté)

Elément(s) de données du Registre infecté(s):
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\AntiVirusDisableNotify (Disabled.SecurityCenter) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\FirewallDisableNotify (Disabled.SecurityCenter) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\UpdatesDisableNotify (Disabled.SecurityCenter) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.

Dossier(s) infecté(s):
C:\Documents and Settings\Anik Goulet\Application Data\VideoEgg (Adware.VideoEgg) -> Quarantined and deleted successfully.
C:\Documents and Settings\Anik Goulet\Application Data\VideoEgg\Data (Adware.VideoEgg) -> Quarantined and deleted successfully.
C:\Documents and Settings\Anik Goulet\Application Data\VideoEgg\Loader (Adware.VideoEgg) -> Quarantined and deleted successfully.
C:\Documents and Settings\Anik Goulet\Application Data\VideoEgg\Loader\4665 (Adware.VideoEgg) -> Quarantined and deleted successfully.
C:\Documents and Settings\Anik Goulet\Application Data\VideoEgg\Publisher (Adware.VideoEgg) -> Quarantined and deleted successfully.
C:\Documents and Settings\Anik Goulet\Application Data\VideoEgg\Publisher\4520 (Adware.VideoEgg) -> Quarantined and deleted successfully.
C:\Documents and Settings\Anik Goulet\Application Data\VideoEgg\Publisher\4520\resources (Adware.VideoEgg) -> Quarantined and deleted successfully.
C:\Documents and Settings\Anik Goulet\Application Data\VideoEgg\Publisher\4520\resources\VideoEgg (Adware.VideoEgg) -> Quarantined and deleted successfully.
C:\Documents and Settings\Anik Goulet\Application Data\VideoEgg\Publisher\4520\resources\VideoEgg\images (Adware.VideoEgg) -> Quarantined and deleted successfully.
C:\Documents and Settings\Anik Goulet\Application Data\VideoEgg\Publisher\4520\resources\VideoEgg\messages (Adware.VideoEgg) -> Quarantined and deleted successfully.
C:\Documents and Settings\Anik Goulet\Application Data\VideoEgg\Publisher\4665 (Adware.VideoEgg) -> Quarantined and deleted successfully.
C:\Documents and Settings\Anik Goulet\Application Data\VideoEgg\Updater (Adware.VideoEgg) -> Quarantined and deleted successfully.
C:\Documents and Settings\Anik Goulet\Application Data\VideoEgg\Updater\4665 (Adware.VideoEgg) -> Quarantined and deleted successfully.

Fichier(s) infecté(s):
C:\Documents and Settings\Anik Goulet\Application Data\VideoEgg\Loader\4665\npvideoegg-loader.dll (Adware.VideoEgg) -> Quarantined and deleted successfully.
C:\Documents and Settings\Anik Goulet\Application Data\VideoEgg\Updater\updater.exe (Adware.VideoEgg) -> Quarantined and deleted successfully.
C:\Documents and Settings\Anik Goulet\Application Data\VideoEgg\Updater\VideoEggBroker.exe (Adware.VideoEgg) -> Quarantined and deleted successfully.
C:\Documents and Settings\Anik Goulet\Application Data\VideoEgg\Updater\VideoEggBroker.exe.old (Adware.VideoEgg) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{EA39A09C-50BA-4996-869B-915C83FE3B53}\RP1082\A0045843.EXE (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{EA39A09C-50BA-4996-869B-915C83FE3B53}\RP1082\A0045844.DLL (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{EA39A09C-50BA-4996-869B-915C83FE3B53}\RP1085\A0046053.dll (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Documents and Settings\Anik Goulet\Application Data\VideoEgg\DataLOCKED (Adware.VideoEgg) -> Quarantined and deleted successfully.
C:\Documents and Settings\Anik Goulet\Application Data\VideoEgg\Uninstall.exe (Adware.VideoEgg) -> Quarantined and deleted successfully.
C:\Documents and Settings\Anik Goulet\Application Data\VideoEgg\Data\report.log (Adware.VideoEgg) -> Quarantined and deleted successfully.
C:\Documents and Settings\Anik Goulet\Application Data\VideoEgg\Loader\loader.ver (Adware.VideoEgg) -> Quarantined and deleted successfully.
C:\Documents and Settings\Anik Goulet\Application Data\VideoEgg\Publisher\publisher.ver (Adware.VideoEgg) -> Quarantined and deleted successfully.
C:\Documents and Settings\Anik Goulet\Application Data\VideoEgg\Publisher\4520\avcodec.dll (Adware.VideoEgg) -> Quarantined and deleted successfully.
C:\Documents and Settings\Anik Goulet\Application Data\VideoEgg\Publisher\4520\crashRpt.dll (Adware.VideoEgg) -> Quarantined and deleted successfully.
C:\Documents and Settings\Anik Goulet\Application Data\VideoEgg\Publisher\4520\FLVEncoder.dll (Adware.VideoEgg) -> Quarantined and deleted successfully.
C:\Documents and Settings\Anik Goulet\Application Data\VideoEgg\Publisher\4520\lame_enc.dll (Adware.VideoEgg) -> Quarantined and deleted successfully.
C:\Documents and Settings\Anik Goulet\Application Data\VideoEgg\Publisher\4520\LevelMeter.ax (Adware.VideoEgg) -> Quarantined and deleted successfully.
C:\Documents and Settings\Anik Goulet\Application Data\VideoEgg\Publisher\4520\libcurlve.dll (Adware.VideoEgg) -> Quarantined and deleted successfully.
C:\Documents and Settings\Anik Goulet\Application Data\VideoEgg\Publisher\4520\libpng.dll (Adware.VideoEgg) -> Quarantined and deleted successfully.
C:\Documents and Settings\Anik Goulet\Application Data\VideoEgg\Publisher\4520\npvideoegg-publisher.dll (Adware.VideoEgg) -> Quarantined and deleted successfully.
C:\Documents and Settings\Anik Goulet\Application Data\VideoEgg\Publisher\4520\VideoEgg_FLVWriter.ax (Adware.VideoEgg) -> Quarantined and deleted successfully.
C:\Documents and Settings\Anik Goulet\Application Data\VideoEgg\Publisher\4520\zlib.dll (Adware.VideoEgg) -> Quarantined and deleted successfully.
C:\Documents and Settings\Anik Goulet\Application Data\VideoEgg\Publisher\4520\resources\VideoEgg\images\aol_watermark.png (Adware.VideoEgg) -> Quarantined and deleted successfully.
C:\Documents and Settings\Anik Goulet\Application Data\VideoEgg\Publisher\4520\resources\VideoEgg\images\audio_combo.png (Adware.VideoEgg) -> Quarantined and deleted successfully.
C:\Documents and Settings\Anik Goulet\Application Data\VideoEgg\Publisher\4520\resources\VideoEgg\images\audio_source.png (Adware.VideoEgg) -> Quarantined and deleted successfully.
C:\Documents and Settings\Anik Goulet\Application Data\VideoEgg\Publisher\4520\resources\VideoEgg\images\big_gray_logo.png (Adware.VideoEgg) -> Quarantined and deleted successfully.
C:\Documents and Settings\Anik Goulet\Application Data\VideoEgg\Publisher\4520\resources\VideoEgg\images\big_logo_cropped.png (Adware.VideoEgg) -> Quarantined and deleted successfully.
C:\Documents and Settings\Anik Goulet\Application Data\VideoEgg\Publisher\4520\resources\VideoEgg\images\blank_slide.png (Adware.VideoEgg) -> Quarantined and deleted successfully.
C:\Documents and Settings\Anik Goulet\Application Data\VideoEgg\Publisher\4520\resources\VideoEgg\images\button_browse_down.png (Adware.VideoEgg) -> Quarantined and deleted successfully.
C:\Documents and Settings\Anik Goulet\Application Data\VideoEgg\Publisher\4520\resources\VideoEgg\images\button_browse_over.png (Adware.VideoEgg) -> Quarantined and deleted successfully.
C:\Documents and Settings\Anik Goulet\Application Data\VideoEgg\Publisher\4520\resources\VideoEgg\images\button_browse_up.png (Adware.VideoEgg) -> Quarantined and deleted successfully.
C:\Documents and Settings\Anik Goulet\Application Data\VideoEgg\Publisher\4520\resources\VideoEgg\images\camcorders_title.png (Adware.VideoEgg) -> Quarantined and deleted successfully.
C:\Documents and Settings\Anik Goulet\Application Data\VideoEgg\Publisher\4520\resources\VideoEgg\images\camcorder_btn_highlighted.png (Adware.VideoEgg) -> Quarantined and deleted successfully.
C:\Documents and Settings\Anik Goulet\Application Data\VideoEgg\Publisher\4520\resources\VideoEgg\images\camcorder_slide.png (Adware.VideoEgg) -> Quarantined and deleted successfully.
C:\Documents and Settings\Anik Goulet\Application Data\VideoEgg\Publisher\4520\resources\VideoEgg\images\corners_bottom_left.png (Adware.VideoEgg) -> Quarantined and deleted successfully.
C:\Documents and Settings\Anik Goulet\Application Data\VideoEgg\Publisher\4520\resources\VideoEgg\images\corners_bottom_left_curve.png (Adware.VideoEgg) -> Quarantined and deleted successfully.
C:\Documents and Settings\Anik Goulet\Application Data\VideoEgg\Publisher\4520\resources\VideoEgg\images\corners_bottom_right.png (Adware.VideoEgg) -> Quarantined and deleted successfully.
C:\Documents and Settings\Anik Goulet\Application Data\VideoEgg\Publisher\4520\resources\VideoEgg\images\corners_top_right.png (Adware.VideoEgg) -> Quarantined and deleted successfully.
C:\Documents and Settings\Anik Goulet\Application Data\VideoEgg\Publisher\4520\resources\VideoEgg\images\done.png (Adware.VideoEgg) -> Quarantined and deleted successfully.
C:\Documents and Settings\Anik Goulet\Application Data\VideoEgg\Publisher\4520\resources\VideoEgg\images\done_capture.png (Adware.VideoEgg) -> Quarantined and deleted successfully.
C:\Documents and Settings\Anik Goulet\Application Data\VideoEgg\Publisher\4520\resources\VideoEgg\images\done_capture_down.png (Adware.VideoEgg) -> Quarantined and deleted successfully.
C:\Documents and Settings\Anik Goulet\Application Data\VideoEgg\Publisher\4520\resources\VideoEgg\images\done_capture_over.png (Adware.VideoEgg) -> Quarantined and deleted successfully.
C:\Documents and Settings\Anik Goulet\Application Data\VideoEgg\Publisher\4520\resources\VideoEgg\images\done_down.png (Adware.VideoEgg) -> Quarantined and deleted successfully.
C:\Documents and Settings\Anik Goulet\Application Data\VideoEgg\Publisher\4520\resources\VideoEgg\images\done_over.png (Adware.VideoEgg) -> Quarantined and deleted successfully.
C:\Documents and Settings\Anik Goulet\Application Data\VideoEgg\Publisher\4520\resources\VideoEgg\images\dropshadow_bottom_left.png (Adware.VideoEgg) -> Quarantined and deleted successfully.
C:\Documents and Settings\Anik Goulet\Application Data\VideoEgg\Publisher\4520\resources\VideoEgg\images\dropshadow_horiz.png (Adware.VideoEgg) -> Quarantined and deleted successfully.
C:\Documents and Settings\Anik Goulet\Application Data\VideoEgg\Publisher\4520\resources\VideoEgg\images\dropshadow_vertical.png (Adware.VideoEgg) -> Quarantined and deleted successfully.
C:\Documents and Settings\Anik Goulet\Application Data\VideoEgg\Publisher\4520\resources\VideoEgg\images\dropzone.png (Adware.VideoEgg) -> Quarantined and deleted successfully.
C:\Documents and Settings\Anik Goulet\Application Data\VideoEgg\Publisher\4520\resources\VideoEgg\images\dv_fast_forward.png (Adware.VideoEgg) -> Quarantined and deleted successfully.
C:\Documents and Settings\Anik Goulet\Application Data\VideoEgg\Publisher\4520\resources\VideoEgg\images\dv_pause.png (Adware.VideoEgg) -> Quarantined and deleted successfully.
C:\Documents and Settings\Anik Goulet\Application Data\VideoEgg\Publisher\4520\resources\VideoEgg\images\dv_play.png (Adware.VideoEgg) -> Quarantined and deleted successfully.
C:\Documents and Settings\Anik Goulet\Application Data\VideoEgg\Publisher\4520\resources\VideoEgg\images\dv_rewind.png (Adware.VideoEgg) -> Quarantined and deleted successfully.
C:\Documents and Settings\Anik Goulet\Application Data\VideoEgg\Publisher\4520\resources\VideoEgg\images\dv_stop.png (Adware.VideoEgg) -> Quarantined and deleted successfully.
C:\Documents and Settings\Anik Goulet\Application Data\VideoEgg\Publisher\4520\resources\VideoEgg\images\email_instructions.png (Adware.VideoEgg) -> Quarantined and deleted successfully.
C:\Documents and Settings\Anik Goulet\Application Data\VideoEgg\Publisher\4520\resources\VideoEgg\images\email_sent.png (Adware.VideoEgg) -> Quarantined and deleted successfully.
C:\Documents and Settings\Anik Goulet\Application Data\VideoEgg\Publisher\4520\resources\VideoEgg\images\email_sent_down.png (Adware.VideoEgg) -> Quarantined and deleted successfully.
C:\Documents and Settings\Anik Goulet\Application Data\VideoEgg\Publisher\4520\resources\VideoEgg\images\email_sent_over.png (Adware.VideoEgg) -> Quarantined and deleted successfully.
C:\Documents and Settings\Anik Goulet\Application Data\VideoEgg\Publisher\4520\resources\VideoEgg\images\eraser.CUR (Adware.VideoEgg) -> Quarantined and deleted successfully.
C:\Documents and Settings\Anik Goulet\Application Data\VideoEgg\Publisher\4520\resources\VideoEgg\images\eraser_cursor.png (Adware.VideoEgg) -> Quarantined and deleted successfully.
C:\Documents and Settings\Anik Goulet\Application Data\VideoEgg\Publisher\4520\resources\VideoEgg\images\file_btn_highlighted.png (Adware.VideoEgg) -> Quarantined and deleted successfully.
C:\Documents and Settings\Anik Goulet\Application Data\VideoEgg\Publisher\4520\resources\VideoEgg\images\file_slide.png (Adware.VideoEgg) -> Quarantined and deleted successfully.
C:\Documents and Settings\Anik Goulet\Application Data\VideoEgg\Publisher\4520\resources\VideoEgg\images\help.png (Adware.VideoEgg) -> Quarantined and deleted successfully.
C:\Documents and Settings\Anik Goulet\Application Data\VideoEgg\Publisher\4520\resources\VideoEgg\images\icon_camcorder.png (Adware.VideoEgg) -> Quarantined and deleted successfully.
C:\Documents and Settings\Anik Goulet\Application Data\VideoEgg\Publisher\4520\resources\VideoEgg\images\icon_camcorders.png (Adware.VideoEgg) -> Quarantined and deleted successfully.
C:\Documents and Settings\Anik Goulet\Application Data\VideoEgg\Publisher\4520\resources\VideoEgg\images\icon_camcorder_dark.png (Adware.VideoEgg) -> Quarantined and deleted successfully.
C:\Documents and Settings\Anik Goulet\Application Data\VideoEgg\Publisher\4520\resources\VideoEgg\images\icon_camcorder_light.png (Adware.VideoEgg) -> Quarantined and deleted successfully.
C:\Documents and Settings\Anik Goulet\Application Data\VideoEgg\Publisher\4520\resources\VideoEgg\images\icon_ff.png (Adware.VideoEgg) -> Quarantined and deleted successfully.
C:\Documents and Settings\Anik Goulet\Application Data\VideoEgg\Publisher\4520\resources\VideoEgg\images\icon_file_dark.png (Adware.VideoEgg) -> Quarantined and deleted successfully.
C:\Documents and Settings\Anik Goulet\Application Data\VideoEgg\Publisher\4520\resources\VideoEgg\images\icon_file_light.png (Adware.VideoEgg) -> Quarantined and deleted successfully.
C:\Documents and Settings\Anik Goulet\Application Data\VideoEgg\Publisher\4520\resources\VideoEgg\images\icon_pause.png (Adware.VideoEgg) -> Quarantined and deleted successfully.
C:\Documents and Settings\Anik Goulet\Application Data\VideoEgg\Publisher\4520\resources\VideoEgg\images\icon_phone_dark.png (Adware.VideoEgg) -> Quarantined and deleted successfully.
C:\Documents and Settings\Anik Goulet\Application Data\VideoEgg\Publisher\4520\resources\VideoEgg\images\icon_phone_light.png (Adware.VideoEgg) -> Quarantined and deleted successfully.
C:\Documents and Settings\Anik Goulet\Application Data\VideoEgg\Publisher\4520\resources\VideoEgg\images\icon_play.png (Adware.VideoEgg) -> Quarantined and deleted successfully.
C:\Documents and Settings\Anik Goulet\Application Data\VideoEgg\Publisher\4520\resources\VideoEgg\images\icon_rewind.png (Adware.VideoEgg) -> Quarantined and deleted successfully.
C:\Documents and Settings\Anik Goulet\Application Data\VideoEgg\Publisher\4520\resources\VideoEgg\images\icon_stop.png (Adware.VideoEgg) -> Quarantined and deleted successfully.
C:\Documents and Settings\Anik Goulet\Application Data\VideoEgg\Publisher\4520\resources\VideoEgg\images\icon_webcam.png (Adware.VideoEgg) -> Quarantined and deleted successfully.
C:\Documents and Settings\Anik Goulet\Application Data\VideoEgg\Publisher\4520\resources\VideoEgg\images\icon_webcams.png (Adware.VideoEgg) -> Quarantined and deleted successfully.
C:\Documents and Settings\Anik Goulet\Application Data\VideoEgg\Publisher\4520\resources\VideoEgg\images\icon_webcam_dark.png (Adware.VideoEgg) -> Quarantined and deleted successfully.
C:\Documents and Settings\Anik Goulet\Application Data\VideoEgg\Publisher\4520\resources\VideoEgg\images\icon_webcam_light.png (Adware.VideoEgg) -> Quarantined and deleted successfully.
C:\Documents and Settings\Anik Goulet\Application Data\VideoEgg\Publisher\4520\resources\VideoEgg\images\loading.png (Adware.VideoEgg) -> Quarantined and deleted successfully.
C:\Documents and Settings\Anik Goulet\Application Data\VideoEgg\Publisher\4520\resources\VideoEgg\images\loading_movie.png (Adware.VideoEgg) -> Quarantined and deleted successfully.
C:\Documents and Settings\Anik Goulet\Application Data\VideoEgg\Publisher\4520\resources\VideoEgg\images\locating.png (Adware.VideoEgg) -> Quarantined and deleted successfully.
C:\Documents and Settings\Anik Goulet\Application Data\VideoEgg\Publisher\4520\resources\VideoEgg\images\logo.png (Adware.VideoEgg) -> Quarantined and deleted successfully.
C:\Documents and Settings\Anik Goulet\Application Data\VideoEgg\Publisher\4520\resources\VideoEgg\images\logo_bottom.png (Adware.VideoEgg) -> Quarantined and deleted successfully.
C:\Documents and Settings\Anik Goulet\Application Data\VideoEgg\Publisher\4520\resources\VideoEgg\images\logo_middle.png (Adware.VideoEgg) -> Quarantined and deleted successfully.
C:\Documents and Settings\Anik Goulet\Application Data\VideoEgg\Publisher\4520\resources\VideoEgg\images\logo_top.png (Adware.VideoEgg) -> Quarantined and deleted successfully.
C:\Documents and Settings\Anik Goulet\Application Data\VideoEgg\Publisher\4520\resources\VideoEgg\images\mobile_btn_highlighted.png (Adware.VideoEgg) -> Quarantined and deleted successfully.
C:\Documents and Settings\Anik Goulet\Application Data\VideoEgg\Publisher\4520\resources\VideoEgg\images\mobile_slide.png (Adware.VideoEgg) -> Quarantined and deleted successfully.
C:\Documents and Settings\Anik Goulet\Application Data\VideoEgg\Publisher\4520\resources\VideoEgg\images\mobile_slide_disabled.png (Adware.VideoEgg) -> Quarantined and deleted successfully.
C:\Documents and Settings\Anik Goulet\Application Data\VideoEgg\Publisher\4520\resources\VideoEgg\images\movie_placeholder.png (Adware.VideoEgg) -> Quarantined and deleted successfully.
C:\Documents and Settings\Anik Goulet\Application Data\VideoEgg\Publisher\4520\resources\VideoEgg\images\ok.png (Adware.VideoEgg) -> Quarantined and deleted successfully.
C:\Documents and Settings\Anik Goulet\Application Data\VideoEgg\Publisher\4520\resources\VideoEgg\images\ok_down.png (Adware.VideoEgg) -> Quarantined and deleted successfully.
C:\Documents and Settings\Anik Goulet\Application Data\VideoEgg\Publisher\4520\resources\VideoEgg\images\ok_over.png (Adware.VideoEgg) -> Quarantined and deleted successfully.
C:\Documents and Settings\Anik Goulet\Application Data\VideoEgg\Publisher\4520\resources\VideoEgg\images\player_fast_forward.png (Adware.VideoEgg) -> Quarantined and deleted successfully.
C:\Documents and Settings\Anik Goulet\Application Data\VideoEgg\Publisher\4520\resources\VideoEgg\images\player_fast_forward_disabled.png (Adware.VideoEgg) -> Quarantined and deleted successfully.
C:\Documents and Settings\Anik Goulet\Application Data\VideoEgg\Publisher\4520\resources\VideoEgg\images\player_fill.png (Adware.VideoEgg) -> Quarantined and deleted successfully.
C:\Documents and Settings\Anik Goulet\Application Data\VideoEgg\Publisher\4520\resources\VideoEgg\images\player_pause.png (Adware.VideoEgg) -> Quarantined and deleted successfully.
C:\Documents and Settings\Anik Goulet\Application Data\VideoEgg\Publisher\4520\resources\VideoEgg\images\player_play.png (Adware.VideoEgg) -> Quarantined and deleted successfully.
C:\Documents and Settings\Anik Goulet\Application Data\VideoEgg\Publisher\4520\resources\VideoEgg\images\player_rewind.png (Adware.VideoEgg) -> Quarantined and deleted successfully.
C:\Documents and Settings\Anik Goulet\Application Data\VideoEgg\Publisher\4520\resources\VideoEgg\images\player_rewind_disabled.png (Adware.VideoEgg) -> Quarantined and deleted successfully.
C:\Documents and Settings\Anik Goulet\Application Data\VideoEgg\Publisher\4520\resources\VideoEgg\images\player_rewind_to_start.png (Adware.VideoEgg) -> Quarantined and deleted successfully.
C:\Documents and Settings\Anik Goulet\Application Data\VideoEgg\Publisher\4520\resources\VideoEgg\images\playhead.png (Adware.VideoEgg) -> Quarantined and deleted successfully.
C:\Documents and Settings\Anik Goulet\Application Data\VideoEgg\Publisher\4520\resources\VideoEgg\images\powered_by.png (Adware.VideoEgg) -> Quarantined and deleted successfully.
C:\Documents and Settings\Anik Goulet\Application Data\VideoEgg\Publisher\4520\resources\VideoEgg\images\progress.png (Adware.VideoEgg) -> Quarantined and deleted successfully.
C:\Documents and Settings\Anik Goulet\Application Data\VideoEgg\Publisher\4520\resources\VideoEgg\images\refresh_list_down.png (Adware.VideoEgg) -> Quarantined and deleted successfully.
C:\Documents and Settings\Anik Goulet\Application Data\VideoEgg\Publisher\4520\resources\VideoEgg\images\refresh_list_over.png (Adware.VideoEgg) -> Quarantined and deleted successfully.
C:\Documents and Settings\Anik Goulet\Application Data\VideoEgg\Publisher\4520\resources\VideoEgg\images\refresh_list_up.png (Adware.VideoEgg) -> Quarantined and deleted successfully.
C:\Documents and Settings\Anik Goulet\Application Data\VideoEgg\Publisher\4520\resources\VideoEgg\images\restart.png (Adware.VideoEgg) -> Quarantined and deleted successfully.
C:\Documents and Settings\Anik Goulet\Application Data\VideoEgg\Publisher\4520\resources\VideoEgg\images\restart_over.png (Adware.VideoEgg) -> Quarantined and deleted successfully.
C:\Documents and Settings\Anik Goulet\Application Data\VideoEgg\Publisher\4520\resources\VideoEgg\images\start_capture.png (Adware.VideoEgg) -> Quarantined and deleted successfully.
C:\Documents and Settings\Anik Goulet\Application Data\VideoEgg\Publisher\4520\resources\VideoEgg\images\start_capture_disabled.png (Adware.VideoEgg) -> Quarantined and deleted successfully.
C:\Documents and Settings\Anik Goulet\Application Data\VideoEgg\Publisher\4520\resources\VideoEgg\images\start_capture_down.png (Adware.VideoEgg) -> Quarantined and deleted successfully.
C:\Documents and Settings\Anik Goulet\Application Data\VideoEgg\Publisher\4520\resources\VideoEgg\images\start_capture_over.png (Adware.VideoEgg) -> Quarantined and deleted successfully.
C:\Documents and Settings\Anik Goulet\Application Data\VideoEgg\Publisher\4520\resources\VideoEgg\images\start_over.png (Adware.VideoEgg) -> Quarantined and deleted successfully.
C:\Documents and Settings\Anik Goulet\Application Data\VideoEgg\Publisher\4520\resources\VideoEgg\images\start_over_highlight.png (Adware.VideoEgg) -> Quarantined and deleted successfully.
C:\Documents and Settings\Anik Goulet\Application Data\VideoEgg\Publisher\4520\resources\VideoEgg\images\start_slider.png (Adware.VideoEgg) -> Quarantined and deleted successfully.
C:\Documents and Settings\Anik Goulet\Application Data\VideoEgg\Publisher\4520\resources\VideoEgg\images\stop_capture.png (Adware.VideoEgg) -> Quarantined and deleted successfully.
C:\Documents and Settings\Anik Goulet\Application Data\VideoEgg\Publisher\4520\resources\VideoEgg\images\stop_capture_disabled.png (Adware.VideoEgg) -> Quarantined and deleted successfully.
C:\Documents and Settings\Anik Goulet\Application Data\VideoEgg\Publisher\4520\resources\VideoEgg\images\stop_capture_down.png (Adware.VideoEgg) -> Quarantined and deleted successfully.
C:\Documents and Settings\Anik Goulet\Application Data\VideoEgg\Publisher\4520\resources\VideoEgg\images\stop_capture_over.png (Adware.VideoEgg) -> Quarantined and deleted successfully.
C:\Documents and Settings\Anik Goulet\Application Data\VideoEgg\Publisher\4520\resources\VideoEgg\images\stop_slider.png (Adware.VideoEgg) -> Quarantined and deleted successfully.
C:\Documents and Settings\Anik Goulet\Application Data\VideoEgg\Publisher\4520\resources\VideoEgg\images\tab_slide_deselected.png (Adware.VideoEgg) -> Quarantined and deleted successfully.
C:\Documents and Settings\Anik Goulet\Application Data\VideoEgg\Publisher\4520\resources\VideoEgg\images\tape_control.png (Adware.VideoEgg) -> Quarantined and deleted successfully.
C:\Documents and Settings\Anik Goulet\Application Data\VideoEgg\Publisher\4520\resources\VideoEgg\images\text_camcorder.png (Adware.VideoEgg) -> Quarantined and deleted successfully.
C:\Documents and Settings\Anik Goulet\Application Data\VideoEgg\Publisher\4520\resources\VideoEgg\images\text_camcorder_highlight.png (Adware.VideoEgg) -> Quarantined and deleted successfully.
C:\Documents and Settings\Anik Goulet\Application Data\VideoEgg\Publisher\4520\resources\VideoEgg\images\text_file.png (Adware.VideoEgg) -> Quarantined and deleted successfully.
C:\Documents and Settings\Anik Goulet\Application Data\VideoEgg\Publisher\4520\resources\VideoEgg\images\text_file_highlight.png (Adware.VideoEgg) -> Quarantined and deleted successfully.
C:\Documents and Settings\Anik Goulet\Application Data\VideoEgg\Publisher\4520\resources\VideoEgg\images\text_phone.png (Adware.VideoEgg) -> Quarantined and deleted successfully.
C:\Documents and Settings\Anik Goulet\Application Data\VideoEgg\Publisher\4520\resources\VideoEgg\images\text_phone_highlight.png (Adware.VideoEgg) -> Quarantined and deleted successfully.
C:\Documents and Settings\Anik Goulet\Application Data\VideoEgg\Publisher\4520\resources\VideoEgg\images\text_webcam.png (Adware.VideoEgg) -> Quarantined and deleted successfully.
C:\Documents and Settings\Anik Goulet\Application Data\VideoEgg\Publisher\4520\resources\VideoEgg\images\text_webcam_highlight.png (Adware.VideoEgg) -> Quarantined and deleted successfully.
C:\Documents and Settings\Anik Goulet\Application Data\VideoEgg\Publisher\4520\resources\VideoEgg\images\title.png (Adware.VideoEgg) -> Quarantined and deleted successfully.
C:\Documents and Settings\Anik Goulet\Application Data\VideoEgg\Publisher\4520\resources\VideoEgg\images\upload.png (Adware.VideoEgg) -> Quarantined and deleted successfully.
C:\Documents and Settings\Anik Goulet\Application Data\VideoEgg\Publisher\4520\resources\VideoEgg\images\uploading.png (Adware.VideoEgg) -> Quarantined and deleted successfully.
C:\Documents and Settings\Anik Goulet\Application Data\VideoEgg\Publisher\4520\resources\VideoEgg\images\uploading_fill.png (Adware.VideoEgg) -> Quarantined and deleted successfully.
C:\Documents and Settings\Anik Goulet\Application Data\VideoEgg\Publisher\4520\resources\VideoEgg\images\uploading_high.png (Adware.VideoEgg) -> Quarantined and deleted successfully.
C:\Documents and Settings\Anik Goulet\Application Data\VideoEgg\Publisher\4520\resources\VideoEgg\images\uploading_low.png (Adware.VideoEgg) -> Quarantined and deleted successfully.
C:\Documents and Settings\Anik Goulet\Application Data\VideoEgg\Publisher\4520\resources\VideoEgg\images\uploading_medium.png (Adware.VideoEgg) -> Quarantined and deleted successfully.
C:\Documents and Settings\Anik Goulet\Application Data\VideoEgg\Publisher\4520\resources\VideoEgg\images\uploading_thumbnail.png (Adware.VideoEgg) -> Quarantined and deleted successfully.
C:\Documents and Settings\Anik Goulet\Application Data\VideoEgg\Publisher\4520\resources\VideoEgg\images\upload_down.png (Adware.VideoEgg) -> Quarantined and deleted successfully.
C:\Documents and Settings\Anik Goulet\Application Data\VideoEgg\Publisher\4520\resources\VideoEgg\images\upload_from.png (Adware.VideoEgg) -> Quarantined and deleted successfully.
C:\Documents and Settings\Anik Goulet\Application Data\VideoEgg\Publisher\4520\resources\VideoEgg\images\upload_over.png (Adware.VideoEgg) -> Quarantined and deleted successfully.
C:\Documents and Settings\Anik Goulet\Application Data\VideoEgg\Publisher\4520\resources\VideoEgg\images\volume_gray.png (Adware.VideoEgg) -> Quarantined and deleted successfully.
C:\Documents and Settings\Anik Goulet\Application Data\VideoEgg\Publisher\4520\resources\VideoEgg\images\volume_green.png (Adware.VideoEgg) -> Quarantined and deleted successfully.
C:\Documents and Settings\Anik Goulet\Application Data\VideoEgg\Publisher\4520\resources\VideoEgg\images\volume_high.png (Adware.VideoEgg) -> Quarantined and deleted successfully.
C:\Documents and Settings\Anik Goulet\Application Data\VideoEgg\Publisher\4520\resources\VideoEgg\images\volume_low.png (Adware.VideoEgg) -> Quarantined and deleted successfully.
C:\Documents and Settings\Anik Goulet\Application Data\VideoEgg\Publisher\4520\resources\VideoEgg\images\volume_orange.png (Adware.VideoEgg) -> Quarantined and deleted successfully.
C:\Documents and Settings\Anik Goulet\Application Data\VideoEgg\Publisher\4520\resources\VideoEgg\images\volume_red.png (Adware.VideoEgg) -> Quarantined and deleted successfully.
C:\Documents and Settings\Anik Goulet\Application Data\VideoEgg\Publisher\4520\resources\VideoEgg\images\volume_slider.png (Adware.VideoEgg) -> Quarantined and deleted successfully.
C:\Documents and Settings\Anik Goulet\Application Data\VideoEgg\Publisher\4520\resources\VideoEgg\images\waiting_for_email.png (Adware.VideoEgg) -> Quarantined and deleted successfully.
C:\Documents and Settings\Anik Goulet\Application Data\VideoEgg\Publisher\4520\resources\VideoEgg\images\webcams_title.png (Adware.VideoEgg) -> Quarantined and deleted successfully.
C:\Documents and Settings\Anik Goulet\Application Data\VideoEgg\Publisher\4520\resources\VideoEgg\images\webcam_btn_highlighted.png (Adware.VideoEgg) -> Quarantined and deleted successfully.
C:\Documents and Settings\Anik Goulet\Application Data\VideoEgg\Publisher\4520\resources\VideoEgg\images\webcam_slide.png (Adware.VideoEgg) -> Quarantined and deleted successfully.
C:\Documents and Settings\Anik Goulet\Application Data\VideoEgg\Publisher\4520\resources\VideoEgg\messages\messages.en-US.bundle (Adware.VideoEgg) -> Quarantined and deleted successfully.
C:\Documents and Settings\Anik Goulet\Application Data\VideoEgg\Updater\updater.ver (Adware.VideoEgg) -> Quarantined and deleted successfully.
C:\Documents and Settings\Anik Goulet\Application Data\VideoEgg\Updater\4665\libcurlve.dll (Adware.VideoEgg) -> Quarantined and deleted successfully.
C:\Documents and Settings\Anik Goulet\Application Data\VideoEgg\Updater\4665\updater.dll (Adware.VideoEgg) -> Quarantined and deleted successfully.
0
Utilisateur anonyme
16 janv. 2010 à 01:07
bien refais OTL stp
0
http://www.cijoint.fr/cjlink.php?file=cj201001/cijHoijUBj.txt
http://www.cijoint.fr/cjlink.php?file=cj201001/cijVIAic9G.txt


:S :S :S
0
Utilisateur anonyme
16 janv. 2010 à 01:42
desinstalle AD-Aware il est inutile

▶ Clique sur le menu Demarrer /Panneau de configuration/Options des dossiers/ puis dans l'onglet Affichage
* - Coche Afficher les fichiers et dossiers cachés
* - Décoche Masquer les extensions des fichiers dont le type est connu
* - Décoche Masquer les fichiers protégés du système d'exploitation (recommandé)

▶ clique sur Appliquer, puis OK.

N'oublie pas de recacher à nouveau les fichiers cachés et protégés du système d'exploitation en fin de désinfection, c'est important

Fais analyser le(s) fichier(s) suivants sur Virustotal :

Virus Total

* Clique sur Parcourir en haut, choisis Poste de travail et cherche ces fichiers :

C:\WINDOWS\System32\drvc.dll
C:\WINDOWS\iexplore.ini
C:\WINDOWS\System32\Cnmbjun5.dll
C:\WINDOWS\System32\Cnmbjun4.dll



* Clique maintenant sur Envoyer le fichier. et laisse travailler tant que "Situation actuelle : en cours d'analyse" est affiché.
* Il est possible que le fichier soit mis en file d'attente en raison d'un grand nombre de demandes d'analyses. En ce cas, il te faudra patienter sans actualiser la page.
* Lorsque l'analyse est terminée ("Situation actuelle: terminé"), clique sur Formaté
* Une nouvelle fenêtre de ton navigateur va apparaître
* Clique alors sur les deux fleches
* Fais un clic droit sur la page, et choisis Sélectionner tout, puis copier
* Enfin colle le résultat dans ta prochaine réponse.

Note : Pour analyser un autre fichier, clique en bas sur Autre fichier.
0
Je dois analyser les fichiers un par un, tu veux que tu poste quoi ? les liens pour les analyses?
0