JS:FAKEAV-A[Trj] et autres virus

mumu7s -  
 mumu7s -
Bonjour,

Petite visite chez ma mère pendant les vacances et oh surprise un virus! (elle sait aller sur internet mais ne comprend pas comment ça marche et n'en a d'ailleurs rien à faire...) Bref en allant sur msn elle a cliqué sur un lien marqué "foto" et c'est comme ça que le virus JS:FAKEAV-A[Trj] est arrivé. N'arrivant pas à le supprimer avec Avast, j'ai supprimé Avast et mis Antivir à la place. Dès la fin de l'installation, il m'a detecté d'autres trojans, une bonne partie dans system 32.

Je vous met le rapport.

Avira AntiVir Personal
Report file date: mercredi 31 décembre 2008 13:42

Scanning for 1138943 virus strains and unwanted programs.

Licensed to: Avira AntiVir PersonalEdition Classic
Serial number: 0000149996-ADJIE-0001
Platform: Windows XP
Windows version: (Service Pack 3) [5.1.2600]
Boot mode: Normally booted
Username: SYSTEM
Computer name: MARJORIE

Version information:
BUILD.DAT : 8.2.0.337 16934 Bytes 18/11/2008 13:05:00
AVSCAN.EXE : 8.1.4.10 315649 Bytes 18/11/2008 08:21:28
AVSCAN.DLL : 8.1.4.0 40705 Bytes 26/05/2008 07:56:42
LUKE.DLL : 8.1.4.5 164097 Bytes 12/06/2008 12:44:20
LUKERES.DLL : 8.1.4.0 12033 Bytes 26/05/2008 07:58:54
ANTIVIR0.VDF : 7.1.0.0 15603712 Bytes 27/10/2008 11:30:38
ANTIVIR1.VDF : 7.1.1.33 1705984 Bytes 24/12/2008 12:39:28
ANTIVIR2.VDF : 7.1.1.34 2048 Bytes 24/12/2008 12:39:30
ANTIVIR3.VDF : 7.1.1.57 277504 Bytes 31/12/2008 12:39:34
Engineversion : 8.2.0.45
AEVDF.DLL : 8.1.0.6 102772 Bytes 14/10/2008 10:05:58
AESCRIPT.DLL : 8.1.1.19 336252 Bytes 31/12/2008 12:39:58
AESCN.DLL : 8.1.1.5 123251 Bytes 07/11/2008 15:06:42
AERDL.DLL : 8.1.1.3 438645 Bytes 04/11/2008 13:58:40
AEPACK.DLL : 8.1.3.4 393591 Bytes 11/11/2008 09:41:40
AEOFFICE.DLL : 8.1.0.33 196987 Bytes 31/12/2008 12:39:54
AEHEUR.DLL : 8.1.0.75 1524087 Bytes 31/12/2008 12:39:52
AEHELP.DLL : 8.1.2.0 119159 Bytes 31/12/2008 12:39:42
AEGEN.DLL : 8.1.1.8 323956 Bytes 31/12/2008 12:39:40
AEEMU.DLL : 8.1.0.9 393588 Bytes 14/10/2008 10:05:58
AECORE.DLL : 8.1.5.2 172405 Bytes 31/12/2008 12:39:36
AEBB.DLL : 8.1.0.3 53618 Bytes 14/10/2008 10:05:58
AVWINLL.DLL : 1.0.0.12 15105 Bytes 09/07/2008 08:40:06
AVPREF.DLL : 8.0.2.0 38657 Bytes 16/05/2008 09:28:02
AVREP.DLL : 8.0.0.2 98344 Bytes 31/07/2008 12:02:16
AVREG.DLL : 8.0.0.1 33537 Bytes 09/05/2008 11:26:42
AVARKT.DLL : 1.0.0.23 307457 Bytes 12/02/2008 08:29:24
AVEVTLOG.DLL : 8.0.0.16 119041 Bytes 12/06/2008 12:27:50
SQLITE3.DLL : 3.3.17.1 339968 Bytes 22/01/2008 17:28:04
SMTPLIB.DLL : 1.2.0.23 28929 Bytes 12/06/2008 12:49:42
NETNT.DLL : 8.0.0.1 7937 Bytes 25/01/2008 12:05:12
RCIMAGE.DLL : 8.0.0.51 2371841 Bytes 12/06/2008 13:48:08
RCTEXT.DLL : 8.0.52.0 86273 Bytes 27/06/2008 13:34:38

Configuration settings for the scan:
Jobname..........................: Complete system scan
Configuration file...............: c:\program files\avira\antivir personaledition classic\sysscan.avp
Logging..........................: low
Primary action...................: interactive
Secondary action.................: ignore
Scan master boot sector..........: on
Scan boot sector.................: on
Boot sectors.....................: C:, D:,
Process scan.....................: on
Scan registry....................: on
Search for rootkits..............: off
Scan all files...................: Intelligent file selection
Scan archives....................: on
Recursion depth..................: 20
Smart extensions.................: on
Macro heuristic..................: on
File heuristic...................: medium

Start of the scan: mercredi 31 décembre 2008 13:42

The scan of running processes will be started
Scan process 'avscan.exe' - '1' Module(s) have been scanned
Scan process 'avcenter.exe' - '1' Module(s) have been scanned
Scan process 'guardgui.exe' - '1' Module(s) have been scanned
Scan process 'avgnt.exe' - '1' Module(s) have been scanned
Scan process 'avguard.exe' - '1' Module(s) have been scanned
Scan process 'sched.exe' - '1' Module(s) have been scanned
Scan process 'FIREFOX.EXE' - '1' Module(s) have been scanned
Scan process 'RtkBtMnt.exe' - '1' Module(s) have been scanned
Scan process 'igfxsrvc.exe' - '1' Module(s) have been scanned
Scan process 'unsecapp.exe' - '1' Module(s) have been scanned
Scan process 'igfxext.exe' - '1' Module(s) have been scanned
Scan process 'WMIPRVSE.EXE' - '1' Module(s) have been scanned
Scan process 'MgApp.exe' - '1' Module(s) have been scanned
Scan process 'SVCHOST.EXE' - '1' Module(s) have been scanned
Scan process 'soffice.BIN' - '1' Module(s) have been scanned
Scan process 'Monitor.exe' - '1' Module(s) have been scanned
Scan process 'soffice.exe' - '1' Module(s) have been scanned
Scan process 'MOUSE32A.EXE' - '1' Module(s) have been scanned
Scan process 'CTFMON.EXE' - '1' Module(s) have been scanned
Scan process 'MSNMSGR.EXE' - '1' Module(s) have been scanned
Scan process 'EoEngine.exe' - '1' Module(s) have been scanned
Scan process 'RUNDLL32.EXE' - '1' Module(s) have been scanned
Scan process 'MOFFICE.EXE' - '1' Module(s) have been scanned
Scan process 'QTTask.exe' - '1' Module(s) have been scanned
Scan process 'realsched.exe' - '1' Module(s) have been scanned
Scan process 'ePower_DMC.exe' - '1' Module(s) have been scanned
Scan process 'AVGAS.EXE' - '1' Module(s) have been scanned
Scan process 'LManager.exe' - '1' Module(s) have been scanned
Scan process 'eDSloader.exe' - '1' Module(s) have been scanned
Scan process 'ADMTRAY.EXE' - '1' Module(s) have been scanned
Scan process 'RTHDCPL.EXE' - '1' Module(s) have been scanned
Scan process 'ALG.EXE' - '1' Module(s) have been scanned
Scan process 'CLSched.exe' - '1' Module(s) have been scanned
Scan process 'WMIPRVSE.EXE' - '1' Module(s) have been scanned
Scan process 'WSCNTFY.EXE' - '1' Module(s) have been scanned
Scan process 'EXPLORER.EXE' - '1' Module(s) have been scanned
Scan process 'SVCHOST.EXE' - '1' Module(s) have been scanned
Scan process 'RichVideo.exe' - '1' Module(s) have been scanned
Scan process 'LSSrvc.exe' - '1' Module(s) have been scanned
Scan process 'CLMLService.exe' - '1' Module(s) have been scanned
Scan process 'CLMLServer.exe' - '1' Module(s) have been scanned
Scan process 'CLCapSvc.exe' - '1' Module(s) have been scanned
Scan process 'SVCHOST.EXE' - '1' Module(s) have been scanned
Scan process 'admServ.exe' - '1' Module(s) have been scanned
Scan process 'GUARD.EXE' - '1' Module(s) have been scanned
Scan process 'SPOOLSV.EXE' - '1' Module(s) have been scanned
Scan process 'SVCHOST.EXE' - '1' Module(s) have been scanned
Scan process 'SVCHOST.EXE' - '1' Module(s) have been scanned
Scan process 'SVCHOST.EXE' - '1' Module(s) have been scanned
Scan process 'SVCHOST.EXE' - '1' Module(s) have been scanned
Scan process 'SVCHOST.EXE' - '1' Module(s) have been scanned
Scan process 'SVCHOST.EXE' - '1' Module(s) have been scanned
Scan process 'LSASS.EXE' - '1' Module(s) have been scanned
Scan process 'SERVICES.EXE' - '1' Module(s) have been scanned
Scan process 'WINLOGON.EXE' - '1' Module(s) have been scanned
Scan process 'CSRSS.EXE' - '1' Module(s) have been scanned
Scan process 'SMSS.EXE' - '1' Module(s) have been scanned
57 processes with 57 modules were scanned

Starting master boot sector scan:
Master boot sector HD0
[INFO] No virus was found!

Start scanning boot sectors:
Boot sector 'C:\'
[INFO] No virus was found!
Boot sector 'D:\'
[INFO] No virus was found!

Starting to scan the registry.
The registry was scanned ( '61' files ).

Starting the file scan:

Begin scan in 'C:\' <ACER>
C:\pagefile.sys
[WARNING] The file could not be opened!
C:\hiberfil.sys
[WARNING] The file could not be opened!
C:\WINDOWS\system32\lrfwqnz.exe
[DETECTION] Is the TR/Dropper.Gen Trojan
[NOTE] The file was moved to '49c16a21.qua'!
C:\WINDOWS\system32\kkmhebtv.dll
[DETECTION] Is the TR/ConHook.D.17 Trojan
[NOTE] The file was moved to '49c86a1e.qua'!
C:\WINDOWS\system32\uoxwqd.dll
[DETECTION] Is the TR/ConHook.D.17 Trojan
[NOTE] The file was moved to '49d36a27.qua'!
C:\WINDOWS\system32\zqvyth.exe
[DETECTION] Is the TR/Crypt.XPACK.Gen Trojan
[NOTE] The file was moved to '49d16a2c.qua'!
C:\WINDOWS\system32\xeeqhu.exe
[DETECTION] Is the TR/Dldr.Swizzor.Gen Trojan
[NOTE] The file was moved to '49c06a25.qua'!
C:\WINDOWS\system32\qavkor.exe
[DETECTION] Is the TR/Dldr.Swizzor.Gen Trojan
[NOTE] The file was moved to '49d16a26.qua'!
C:\WINDOWS\system32\prbwox.exe
[DETECTION] Is the TR/Dropper.Gen Trojan
[NOTE] The file was moved to '49bd6a3b.qua'!
C:\WINDOWS\system32\jkkhghFx.dll
[DETECTION] Is the TR/Vundo.D.10 Trojan
[WARNING] An error has occurred and the file was not deleted. ErrorID: 26003
[WARNING] The file could not be deleted!
[NOTE] Attempting to perform action using the ARK lib.
[NOTE] The file was moved to '4bba6098.qua'!
C:\WINDOWS\system32\sgpeusxo.exe
[DETECTION] Is the TR/Dropper.Gen Trojan
[NOTE] The file was moved to '49cb6a40.qua'!
C:\WINDOWS\system32\udavpfa.exe
[DETECTION] Is the TR/Dropper.Gen Trojan
[NOTE] The file was moved to '49bc6a40.qua'!
C:\WINDOWS\system32\vavwnne.exe
[DETECTION] Is the TR/Dropper.Gen Trojan
[NOTE] The file was moved to '49d16a41.qua'!
C:\WINDOWS\system32\pkadlyvv.exe
[DETECTION] Is the TR/Crypt.PEPM.Gen Trojan
[NOTE] The file was moved to '49bc6a59.qua'!
C:\WINDOWS\system32\obpkwg.exe
[DETECTION] Is the TR/Dropper.Gen Trojan
[NOTE] The file was moved to '49cb6a5a.qua'!
C:\WINDOWS\system32\mujowb.exe
[DETECTION] Is the TR/Dropper.Gen Trojan
[NOTE] The file was moved to '49c56a70.qua'!
C:\WINDOWS\system32\rjqxsdh.exe
[DETECTION] Is the TR/Dropper.Gen Trojan
[NOTE] The file was moved to '49cc6a6b.qua'!
C:\WINDOWS\system32\lzpgvehto.exe
[DETECTION] Is the TR/Dropper.Gen Trojan
[NOTE] The file was moved to '49cb6a7e.qua'!
C:\WINDOWS\system32\ijtgdac.exe
[DETECTION] Is the TR/Dropper.Gen Trojan
[NOTE] The file was moved to '49cf6a70.qua'!
C:\WINDOWS\system32\lzroyau.exe
[DETECTION] Is the TR/Dropper.Gen Trojan
[NOTE] The file was moved to '49cd6a83.qua'!
C:\WINDOWS\system32\yfopljp.exe
[DETECTION] Is the TR/Dropper.Gen Trojan
[NOTE] The file was moved to '49ca6a72.qua'!
C:\WINDOWS\system32\pfzxdyksk.exe
[DETECTION] Is the TR/Dropper.Gen Trojan
[NOTE] The file was moved to '49d56a75.qua'!
C:\WINDOWS\system32\mskljxmzw.exe
[DETECTION] Is the TR/Dropper.Gen Trojan
[NOTE] The file was moved to '49c66a84.qua'!
C:\WINDOWS\system32\iufxyh.exe
[DETECTION] Is the TR/Dropper.Gen Trojan
[NOTE] The file was moved to '49c16a88.qua'!
C:\WINDOWS\system32\fntsjiajy.exe
[DETECTION] Is the TR/Dropper.Gen Trojan
[NOTE] The file was moved to '49cf6a84.qua'!
C:\WINDOWS\system32\nlakpdnp.exe
[DETECTION] Is the TR/Dropper.Gen Trojan
[NOTE] The file was moved to '49bc6a84.qua'!
C:\WINDOWS\system32\rpqdqkidn.exe
[DETECTION] Is the TR/Dropper.Gen Trojan
[NOTE] The file was moved to '49cc6a8b.qua'!
C:\WINDOWS\system32\mawtiiwvcj.exe
[DETECTION] Is the TR/Dropper.Gen Trojan
[NOTE] The file was moved to '49d26a7f.qua'!
C:\WINDOWS\system32\asnxiiq.exe
[DETECTION] Is the TR/Dropper.Gen Trojan
[NOTE] The file was moved to '49c96a95.qua'!
C:\WINDOWS\system32\fjhoakdfn.exe
[DETECTION] Is the TR/Dropper.Gen Trojan
[NOTE] The file was moved to '49c36a8d.qua'!
C:\WINDOWS\system32\svuqup.exe
[DETECTION] Is the TR/Dropper.Gen Trojan
[NOTE] The file was moved to '49d06a99.qua'!
C:\WINDOWS\system32\qlsuhxr.exe
[DETECTION] Is the TR/Dropper.Gen Trojan
[NOTE] The file was moved to '49ce6a8f.qua'!
C:\WINDOWS\system32\iiefihfox.exe
[DETECTION] Is the TR/Dropper.Gen Trojan
[NOTE] The file was moved to '49c06a8d.qua'!
C:\WINDOWS\system32\crcrsyue.exe
[DETECTION] Is the TR/Dropper.Gen Trojan
[NOTE] The file was moved to '49be6a96.qua'!
C:\WINDOWS\system32\sagdcqpqug.exe
[DETECTION] Is the TR/Dropper.Gen Trojan
[NOTE] The file was moved to '49c26a86.qua'!
C:\WINDOWS\system32\xmahec.exe
[DETECTION] Is the TR/Dropper.Gen Trojan
[NOTE] The file was moved to '49bc6a92.qua'!
C:\WINDOWS\system32\hsqelam.exe
[DETECTION] Is the TR/Crypt.XPACK.Gen Trojan
[NOTE] The file was moved to '49cc6a99.qua'!
C:\WINDOWS\system32\kdhstg.exe
[DETECTION] Is the TR/Crypt.XPACK.Gen Trojan
[NOTE] The file was moved to '49c36a8a.qua'!
C:\WINDOWS\system32\knjlxetvh.exe
[DETECTION] Is the TR/Dropper.Gen Trojan
[NOTE] The file was moved to '49c56a94.qua'!
C:\WINDOWS\system32\jhwdmnglqh.exe
[DETECTION] Is the TR/Dropper.Gen Trojan
[NOTE] The file was moved to '49d26a8f.qua'!
C:\WINDOWS\system32\zwhloiims.exe
[DETECTION] Is the TR/Dldr.Swizzor.Gen Trojan
[NOTE] The file was moved to '49c36a9e.qua'!
C:\WINDOWS\system32\lstlnkmpl.exe
[DETECTION] Is the TR/Dropper.Gen Trojan
[NOTE] The file was moved to '49cf6a9a.qua'!
C:\WINDOWS\system32\cuidjug.exe
[DETECTION] Is the TR/Dldr.Swizzor.Gen Trojan
[NOTE] The file was moved to '49c46a9d.qua'!
C:\WINDOWS\system32\htiqfd.exe
[DETECTION] Is the TR/Dropper.Gen Trojan
[NOTE] The file was moved to '49c46a9c.qua'!
C:\WINDOWS\system32\upmunebpz.exe
[DETECTION] Is the TR/Dropper.Gen Trojan
[NOTE] The file was moved to '49c86a99.qua'!
C:\WINDOWS\system32\eslirgtrrh.exe
[DETECTION] Is the TR/Dropper.Gen Trojan
[NOTE] The file was moved to '49c76a9c.qua'!
C:\WINDOWS\system32\mdmrpsx.exe
[DETECTION] Is the TR/Dropper.Gen Trojan
[NOTE] The file was moved to '49c86a8d.qua'!
C:\WINDOWS\system32\vvceotgtp.exe
[DETECTION] Is the TR/Crypt.XPACK.Gen Trojan
[NOTE] The file was moved to '49be6aa0.qua'!
C:\WINDOWS\system32\addkxpypfv.exe
[DETECTION] Is the TR/Dldr.Swizzor.Gen Trojan
[NOTE] The file was moved to '49bf6a8e.qua'!
C:\WINDOWS\system32\vpljicsk.exe
[DETECTION] Is the TR/Crypt.PEPM.Gen Trojan
[NOTE] The file was moved to '49c76aa5.qua'!
C:\WINDOWS\$NtServicePackUninstall$\ftp.exe
[DETECTION] Is the TR/Agent.49664.J Trojan
[NOTE] The file was moved to '49cb6baa.qua'!
C:\Documents and Settings\marion\Local Settings\Temporary Internet Files\Content.IE5\1WPUXEOW\apstpldr.dll[1].htm
[DETECTION] Is the TR/Agent.ALPG Trojan
[NOTE] The file was moved to '49ce6cc3.qua'!
C:\Program Files\MessengerSkinner\uninst.exe
[DETECTION] Contains recognition pattern of the DR/NaviPromo.AO.51 dropper
[NOTE] The file was moved to '49c46de7.qua'!
C:\Program Files\Instant Access\Multi\20071224001216\instant access.exe
[DETECTION] Is the TR/Crypt.CFI.Gen Trojan
[NOTE] The file was moved to '49ce6e4f.qua'!
C:\System Volume Information\_restore{03F610A5-17ED-4F43-A985-7D9B4A9C3C3D}\RP195\A0060295.EXE
[DETECTION] Is the TR/Dropper.Gen Trojan
[NOTE] The file was moved to '498b6f04.qua'!
C:\System Volume Information\_restore{03F610A5-17ED-4F43-A985-7D9B4A9C3C3D}\RP222\A0068971.exe
[DETECTION] Contains recognition pattern of the WORM/Rbot.52786.3 worm
[NOTE] The file was moved to '498b6f79.qua'!
C:\System Volume Information\_restore{03F610A5-17ED-4F43-A985-7D9B4A9C3C3D}\RP222\A0068994.dll
[DETECTION] Is the TR/Vundo.73216Y.2 Trojan
[NOTE] The file was moved to '48037b82.qua'!
C:\System Volume Information\_restore{03F610A5-17ED-4F43-A985-7D9B4A9C3C3D}\RP223\A0069168.exe
[DETECTION] Is the TR/Dropper.Gen Trojan
[NOTE] The file was moved to '498b6f7d.qua'!
C:\System Volume Information\_restore{03F610A5-17ED-4F43-A985-7D9B4A9C3C3D}\RP223\A0069169.dll
[DETECTION] Is the TR/ConHook.D.17 Trojan
[NOTE] The file was moved to '498b6f7e.qua'!
C:\System Volume Information\_restore{03F610A5-17ED-4F43-A985-7D9B4A9C3C3D}\RP223\A0069170.dll
[DETECTION] Is the TR/ConHook.D.17 Trojan
[NOTE] The file was moved to '48037b87.qua'!
C:\System Volume Information\_restore{03F610A5-17ED-4F43-A985-7D9B4A9C3C3D}\RP223\A0069171.exe
[DETECTION] Is the TR/Crypt.XPACK.Gen Trojan
[NOTE] The file was moved to '498b6f70.qua'!
C:\System Volume Information\_restore{03F610A5-17ED-4F43-A985-7D9B4A9C3C3D}\RP223\A0069172.exe
[DETECTION] Is the TR/Dldr.Swizzor.Gen Trojan
[NOTE] The file was moved to '48037b89.qua'!
C:\System Volume Information\_restore{03F610A5-17ED-4F43-A985-7D9B4A9C3C3D}\RP223\A0069173.exe
[DETECTION] Is the TR/Dldr.Swizzor.Gen Trojan
[NOTE] The file was moved to '498b6f7f.qua'!
C:\System Volume Information\_restore{03F610A5-17ED-4F43-A985-7D9B4A9C3C3D}\RP223\A0069174.exe
[DETECTION] Is the TR/Dropper.Gen Trojan
[NOTE] The file was moved to '48037b78.qua'!
C:\System Volume Information\_restore{03F610A5-17ED-4F43-A985-7D9B4A9C3C3D}\RP223\A0069175.exe
[DETECTION] Is the TR/Dropper.Gen Trojan
[NOTE] The file was moved to '498b6f81.qua'!
C:\System Volume Information\_restore{03F610A5-17ED-4F43-A985-7D9B4A9C3C3D}\RP223\A0069176.exe
[DETECTION] Is the TR/Dropper.Gen Trojan
[NOTE] The file was moved to '498b6f80.qua'!
C:\System Volume Information\_restore{03F610A5-17ED-4F43-A985-7D9B4A9C3C3D}\RP223\A0069177.exe
[DETECTION] Is the TR/Dropper.Gen Trojan
[NOTE] The file was moved to '48037b79.qua'!
C:\System Volume Information\_restore{03F610A5-17ED-4F43-A985-7D9B4A9C3C3D}\RP223\A0069178.exe
[DETECTION] Is the TR/Crypt.PEPM.Gen Trojan
[NOTE] The file was moved to '498b6f82.qua'!
C:\System Volume Information\_restore{03F610A5-17ED-4F43-A985-7D9B4A9C3C3D}\RP223\A0069179.exe
[DETECTION] Is the TR/Dropper.Gen Trojan
[NOTE] The file was moved to '48037b7a.qua'!
C:\System Volume Information\_restore{03F610A5-17ED-4F43-A985-7D9B4A9C3C3D}\RP223\A0069180.exe
[DETECTION] Is the TR/Dropper.Gen Trojan
[NOTE] The file was moved to '498b6f83.qua'!
C:\System Volume Information\_restore{03F610A5-17ED-4F43-A985-7D9B4A9C3C3D}\RP223\A0069181.exe
[DETECTION] Is the TR/Dropper.Gen Trojan
[NOTE] The file was moved to '48037b7c.qua'!
C:\System Volume Information\_restore{03F610A5-17ED-4F43-A985-7D9B4A9C3C3D}\RP223\A0069182.exe
[DETECTION] Is the TR/Dropper.Gen Trojan
[NOTE] The file was moved to '498b6f85.qua'!
C:\System Volume Information\_restore{03F610A5-17ED-4F43-A985-7D9B4A9C3C3D}\RP223\A0069183.exe
[DETECTION] Is the TR/Dropper.Gen Trojan
[NOTE] The file was moved to '48037b7b.qua'!
C:\System Volume Information\_restore{03F610A5-17ED-4F43-A985-7D9B4A9C3C3D}\RP223\A0069184.exe
[DETECTION] Is the TR/Dropper.Gen Trojan
[NOTE] The file was moved to '498b6f84.qua'!
C:\System Volume Information\_restore{03F610A5-17ED-4F43-A985-7D9B4A9C3C3D}\RP223\A0069185.exe
[DETECTION] Is the TR/Dropper.Gen Trojan
[NOTE] The file was moved to '48037b7d.qua'!
C:\System Volume Information\_restore{03F610A5-17ED-4F43-A985-7D9B4A9C3C3D}\RP223\A0069186.exe
[DETECTION] Is the TR/Dropper.Gen Trojan
[NOTE] The file was moved to '48037b7e.qua'!
C:\System Volume Information\_restore{03F610A5-17ED-4F43-A985-7D9B4A9C3C3D}\RP223\A0069187.exe
[DETECTION] Is the TR/Dropper.Gen Trojan
[NOTE] The file was moved to '498b6f87.qua'!
C:\System Volume Information\_restore{03F610A5-17ED-4F43-A985-7D9B4A9C3C3D}\RP223\A0069188.exe
[DETECTION] Is the TR/Dropper.Gen Trojan
[NOTE] The file was moved to '48037b70.qua'!
C:\System Volume Information\_restore{03F610A5-17ED-4F43-A985-7D9B4A9C3C3D}\RP223\A0069189.exe
[DETECTION] Is the TR/Dropper.Gen Trojan
[NOTE] The file was moved to '498b6f86.qua'!
C:\System Volume Information\_restore{03F610A5-17ED-4F43-A985-7D9B4A9C3C3D}\RP223\A0069190.exe
[DETECTION] Is the TR/Dropper.Gen Trojan
[NOTE] The file was moved to '48037b7f.qua'!
C:\System Volume Information\_restore{03F610A5-17ED-4F43-A985-7D9B4A9C3C3D}\RP223\A0069191.exe
[DETECTION] Is the TR/Dropper.Gen Trojan
[NOTE] The file was moved to '498b6f78.qua'!
C:\System Volume Information\_restore{03F610A5-17ED-4F43-A985-7D9B4A9C3C3D}\RP223\A0069192.exe
[DETECTION] Is the TR/Dropper.Gen Trojan
[NOTE] The file was moved to '498b6f89.qua'!
C:\System Volume Information\_restore{03F610A5-17ED-4F43-A985-7D9B4A9C3C3D}\RP223\A0069193.exe
[DETECTION] Is the TR/Dropper.Gen Trojan
[NOTE] The file was moved to '48037b72.qua'!
C:\System Volume Information\_restore{03F610A5-17ED-4F43-A985-7D9B4A9C3C3D}\RP223\A0069194.exe
[DETECTION] Is the TR/Dropper.Gen Trojan
[NOTE] The file was moved to '498b6f8b.qua'!
C:\System Volume Information\_restore{03F610A5-17ED-4F43-A985-7D9B4A9C3C3D}\RP223\A0069195.exe
[DETECTION] Is the TR/Dropper.Gen Trojan
[NOTE] The file was moved to '48037b74.qua'!
C:\System Volume Information\_restore{03F610A5-17ED-4F43-A985-7D9B4A9C3C3D}\RP223\A0069196.exe
[DETECTION] Is the TR/Dropper.Gen Trojan
[NOTE] The file was moved to '48e29a7f.qua'!
C:\System Volume Information\_restore{03F610A5-17ED-4F43-A985-7D9B4A9C3C3D}\RP223\A0069197.exe
[DETECTION] Is the TR/Dropper.Gen Trojan
[NOTE] The file was moved to '48e29a81.qua'!
C:\System Volume Information\_restore{03F610A5-17ED-4F43-A985-7D9B4A9C3C3D}\RP223\A0069198.exe
[DETECTION] Is the TR/Dropper.Gen Trojan
[NOTE] The file was moved to '498b6f7a.qua'!
C:\System Volume Information\_restore{03F610A5-17ED-4F43-A985-7D9B4A9C3C3D}\RP223\A0069199.exe
[DETECTION] Is the TR/Dropper.Gen Trojan
[NOTE] The file was moved to '48e29a70.qua'!
C:\System Volume Information\_restore{03F610A5-17ED-4F43-A985-7D9B4A9C3C3D}\RP223\A0069200.exe
[DETECTION] Is the TR/Dropper.Gen Trojan
[NOTE] The file was moved to '48e29a72.qua'!
C:\System Volume Information\_restore{03F610A5-17ED-4F43-A985-7D9B4A9C3C3D}\RP223\A0069201.exe
[DETECTION] Is the TR/Crypt.XPACK.Gen Trojan
[NOTE] The file was moved to '48e29a74.qua'!
C:\System Volume Information\_restore{03F610A5-17ED-4F43-A985-7D9B4A9C3C3D}\RP223\A0069202.exe
[DETECTION] Is the TR/Crypt.XPACK.Gen Trojan
[NOTE] The file was moved to '498b6f8a.qua'!
C:\System Volume Information\_restore{03F610A5-17ED-4F43-A985-7D9B4A9C3C3D}\RP223\A0069203.exe
[DETECTION] Is the TR/Dropper.Gen Trojan
[NOTE] The file was moved to '48e29a73.qua'!
C:\System Volume Information\_restore{03F610A5-17ED-4F43-A985-7D9B4A9C3C3D}\RP223\A0069204.exe
[DETECTION] Is the TR/Dropper.Gen Trojan
[NOTE] The file was moved to '498b6f8c.qua'!
C:\System Volume Information\_restore{03F610A5-17ED-4F43-A985-7D9B4A9C3C3D}\RP223\A0069205.exe
[DETECTION] Is the TR/Dldr.Swizzor.Gen Trojan
[NOTE] The file was moved to '48e29a75.qua'!
C:\System Volume Information\_restore{03F610A5-17ED-4F43-A985-7D9B4A9C3C3D}\RP223\A0069206.exe
[DETECTION] Is the TR/Dropper.Gen Trojan
[NOTE] The file was moved to '498b6f8d.qua'!
C:\System Volume Information\_restore{03F610A5-17ED-4F43-A985-7D9B4A9C3C3D}\RP223\A0069207.exe
[DETECTION] Is the TR/Dldr.Swizzor.Gen Trojan
[NOTE] The file was moved to '48e29a76.qua'!
C:\System Volume Information\_restore{03F610A5-17ED-4F43-A985-7D9B4A9C3C3D}\RP223\A0069208.exe
[DETECTION] Is the TR/Dropper.Gen Trojan
[NOTE] The file was moved to '498b6f8f.qua'!
C:\System Volume Information\_restore{03F610A5-17ED-4F43-A985-7D9B4A9C3C3D}\RP223\A0069209.exe
[DETECTION] Is the TR/Dropper.Gen Trojan
[NOTE] The file was moved to '498b6f8e.qua'!
C:\System Volume Information\_restore{03F610A5-17ED-4F43-A985-7D9B4A9C3C3D}\RP223\A0069210.exe
[DETECTION] Is the TR/Dropper.Gen Trojan
[NOTE] The file was moved to '48e29a77.qua'!
C:\System Volume Information\_restore{03F610A5-17ED-4F43-A985-7D9B4A9C3C3D}\RP223\A0069211.exe
[DETECTION] Is the TR/Dropper.Gen Trojan
[NOTE] The file was moved to '48e29a79.qua'!
C:\System Volume Information\_restore{03F610A5-17ED-4F43-A985-7D9B4A9C3C3D}\RP223\A0069212.exe
[DETECTION] Is the TR/Crypt.XPACK.Gen Trojan
[NOTE] The file was moved to '48e29a68.qua'!
C:\System Volume Information\_restore{03F610A5-17ED-4F43-A985-7D9B4A9C3C3D}\RP223\A0069213.exe
[DETECTION] Is the TR/Dldr.Swizzor.Gen Trojan
[NOTE] The file was moved to '498b6f91.qua'!
C:\System Volume Information\_restore{03F610A5-17ED-4F43-A985-7D9B4A9C3C3D}\RP223\A0069214.exe
[DETECTION] Is the TR/Crypt.PEPM.Gen Trojan
[NOTE] The file was moved to '48e29a6a.qua'!
C:\System Volume Information\_restore{03F610A5-17ED-4F43-A985-7D9B4A9C3C3D}\RP223\A0069216.exe
[DETECTION] Contains recognition pattern of the DR/NaviPromo.AO.51 dropper
[NOTE] The file was moved to '48e29a7b.qua'!
C:\System Volume Information\_restore{03F610A5-17ED-4F43-A985-7D9B4A9C3C3D}\RP223\A0069217.exe
[DETECTION] Is the TR/Crypt.CFI.Gen Trojan
[NOTE] The file was moved to '48e29a7d.qua'!
C:\Recycled\Dc214.com
[DETECTION] Contains recognition pattern of the WORM/Rbot.52786.3 worm
[NOTE] The file was moved to '498d6fd7.qua'!
C:\Recycled\Dc215.com
[DETECTION] Contains recognition pattern of the WORM/Rbot.52786.3 worm
[NOTE] The file was moved to '48ea7298.qua'!
Begin scan in 'D:\' <ACERDATA>

End of the scan: mercredi 31 décembre 2008 14:13
Used time: 30:20 Minute(s)

The scan has been done completely.

9485 Scanning directories
352507 Files were scanned
106 viruses and/or unwanted programs were found
0 Files were classified as suspicious:
0 files were deleted
0 files were repaired
106 files were moved to quarantine
0 files were renamed
2 Files cannot be scanned
352399 Files not concerned
11356 Archives were scanned
3 Warnings
106 Notes

Que faut-il que je fasse en premier? Un rapport Hijack this?
Merci pour votre aide.

1 réponse

mumu7s
 
Je met le rapport HijackThis :

Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 14:27:45, on 31/12/2008
Platform: Windows XP SP3 (WinNT 5.01.2600)
MSIE: Internet Explorer v7.00 (7.00.6000.16762)
Boot mode: Normal

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\Grisoft\AVG Anti-Spyware 7.5\guard.exe
C:\Acer\Empowering Technology\admServ.exe
C:\Program Files\Acer\Acer Arcade\Kernel\TV\CLCapSvc.exe
C:\Program Files\Acer\Acer Arcade\Kernel\CLML_NTService\CLMLServer.exe
C:\Program Files\Acer\Acer Arcade\Kernel\CLML_NTService\CLMLService.exe
C:\Program Files\Fichiers communs\LightScribe\LSSrvc.exe
C:\Program Files\CyberLink\Shared Files\RichVideo.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\system32\wscntfy.exe
C:\Program Files\Acer\Acer Arcade\Kernel\TV\CLSched.exe
C:\WINDOWS\RTHDCPL.EXE
C:\Acer\Empowering Technology\admtray.exe
C:\Acer\Empowering Technology\eDataSecurity\eDSloader.exe
C:\PROGRA~1\LAUNCH~1\LManager.exe
C:\Program Files\Grisoft\AVG Anti-Spyware 7.5\avgas.exe
C:\Acer\Empowering Technology\ePower\ePower_DMC.exe
C:\Program Files\Fichiers communs\Real\Update_OB\realsched.exe
C:\Program Files\QuickTime\QTTask.exe
C:\Program Files\Labtec\Mouse\V3.0\moffice.exe
C:\WINDOWS\system32\rundll32.exe
C:\Program Files\EoRezo\EoEngine.exe
C:\Program Files\Windows Live\Messenger\MsnMsgr.Exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\Labtec\Mouse\V3.0\MOUSE32A.EXE
C:\Program Files\OpenOffice.org 2.3\program\soffice.exe
C:\Acer\Empowering Technology\eRecovery\Monitor.exe
C:\Program Files\OpenOffice.org 2.3\program\soffice.BIN
C:\WINDOWS\System32\svchost.exe
C:\PROGRA~1\MAGENTIC\bin\MgApp.exe
C:\WINDOWS\system32\igfxext.exe
C:\WINDOWS\system32\wbem\unsecapp.exe
C:\WINDOWS\system32\igfxsrvc.exe
C:\DOCUME~1\marion\LOCALS~1\Temp\RtkBtMnt.exe
C:\Program Files\Mozilla Firefox\firefox.exe
C:\Program Files\Avira\AntiVir PersonalEdition Classic\sched.exe
C:\Program Files\Avira\AntiVir PersonalEdition Classic\avguard.exe
C:\Program Files\Avira\AntiVir PersonalEdition Classic\avgnt.exe
C:\Program Files\Trend Micro\HijackThis\HijackThis.exe

R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://lo.st#home
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = https://www.msn.com/fr-fr/?ocid=iehp
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = https://www.bing.com/?toHttps=1&redig=5FC791212101479BAFBE1A679848B1AF
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = https://www.bing.com/?toHttps=1&redig=5FC791212101479BAFBE1A679848B1AF
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = https://www.msn.com/fr-fr/?ocid=iehp
R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName = Liens
O2 - BHO: AcroIEHlprObj Class - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - c:\Program Files\Adobe\Acrobat 7.0\ActiveX\AcroIEHelper.dll
O2 - BHO: {d6301bae-7c28-a939-5eb4-6dad68084e71} - {17e48086-dad6-4be5-939a-82c7eab1036d} - C:\WINDOWS\system32\kmksgc.dll
O2 - BHO: EoBho - {64F56FC1-1272-44CD-BA6E-39723696E350} - C:\Program Files\EoRezo\EoAdv\EoRezoBHO.dll
O2 - BHO: (no name) - {6D794CB4-C7CD-4c6f-BFDC-9B77AFBDC02C} - C:\WINDOWS\system32\wvUnOGvu.dll
O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre1.6.0_03\bin\ssv.dll
O2 - BHO: (no name) - {FEC3530A-7D00-47A5-8A0D-B9268509CFF7} - C:\WINDOWS\system32\jkkhghFx.dll (file missing)
O3 - Toolbar: Acer eDataSecurity Management - {5CBE3B7C-1E47-477e-A7DD-396DB0476E29} - C:\WINDOWS\system32\eDStoolbar.dll
O4 - HKLM\..\Run: [LaunchApp] Alaunch
O4 - HKLM\..\Run: [RTHDCPL] RTHDCPL.EXE
O4 - HKLM\..\Run: [SkyTel] SkyTel.EXE
O4 - HKLM\..\Run: [Alcmtr] ALCMTR.EXE
O4 - HKLM\..\Run: [AzMixerSel] C:\Program Files\Realtek\InstallShield\AzMixerSel.exe
O4 - HKLM\..\Run: [ADMTray.exe] "C:\Acer\Empowering Technology\admtray.exe"
O4 - HKLM\..\Run: [eDataSecurity Loader] C:\Acer\Empowering Technology\eDataSecurity\eDSloader.exe
O4 - HKLM\..\Run: [LManager] C:\PROGRA~1\LAUNCH~1\LManager.exe
O4 - HKLM\..\Run: [!AVG Anti-Spyware] "C:\Program Files\Grisoft\AVG Anti-Spyware 7.5\avgas.exe" /minimized
O4 - HKLM\..\Run: [ePower_DMC] C:\Acer\Empowering Technology\ePower\ePower_DMC.exe
O4 - HKLM\..\Run: [TkBellExe] "C:\Program Files\Fichiers communs\Real\Update_OB\realsched.exe" -osboot
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\QTTask.exe" -atboottime
O4 - HKLM\..\Run: [FLMOFFICE4DMOUSE] C:\Program Files\Labtec\Mouse\V3.0\moffice.exe
O4 - HKLM\..\Run: [320d18a1] rundll32.exe "C:\WINDOWS\system32\rqxrxwjr.dll",b
O4 - HKLM\..\Run: [EoEngine] "C:\Program Files\EoRezo\EoEngine.exe"
O4 - HKLM\..\Run: [avgnt] "C:\Program Files\Avira\AntiVir PersonalEdition Classic\avgnt.exe" /min
O4 - HKCU\..\Run: [messengerskinner] C:\Program Files\MessengerSkinner\MessengerSkinner.exe
O4 - HKCU\..\Run: [ErrorSafeFree] "C:\Program Files\ErrorSafe Free\uers.exe" /min
O4 - HKCU\..\Run: [Lyad] C:\Program Files\Lyad Messenger\lyad_messenger.exe autostart
O4 - HKCU\..\Run: [Magentic] C:\PROGRA~1\MAGENTIC\bin\Magentic.exe /c
O4 - HKCU\..\Run: [msnmsgr] "C:\Program Files\Windows Live\Messenger\MsnMsgr.Exe" /background
O4 - HKCU\..\Run: [WOOKIT] C:\PROGRA~1\WANADOO\Shell.exe appLaunchClientZone.shl|PARAM= cnx
O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
O4 - HKCU\..\Run: [yeeukug] "c:\documents and settings\marion\local settings\application data\yeeukug.exe" yeeukug
O4 - HKUS\S-1-5-19\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'SERVICE LOCAL')
O4 - HKUS\S-1-5-20\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'SERVICE RÉSEAU')
O4 - HKUS\S-1-5-18\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'SYSTEM')
O4 - HKUS\.DEFAULT\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'Default user')
O4 - Startup: OpenOffice.org 2.3.lnk = C:\Program Files\OpenOffice.org 2.3\program\quickstart.exe
O8 - Extra context menu item: Add to Windows &Live Favorites - https://onedrive.live.com/?id=favorites
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_03\bin\ssv.dll
O9 - Extra 'Tools' menuitem: Console Java (Sun) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_03\bin\ssv.dll
O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O16 - DPF: {67DABFBF-D0AB-41FA-9C46-CC0F21721616} (DivXBrowserPlugin Object) - http://download.divx.com/webplayer/stage6/windows/AutoDLDivXWebPlayerInstaller.cab
O16 - DPF: {C3F79A2B-B9B4-4A66-B012-3EE46475B072} (MessengerStatsClient Class) - http://messenger.zone.msn.com/binary/MessengerStatsPAClient.cab56907.cab
O16 - DPF: {D8089245-3211-40F6-819B-9E5E92CD61A2} (FlashXControl Object) - https://register3.valueactive.com/323/webolr/OCX/FlashAX.cab
O16 - DPF: {DF1C8E21-4045-4D67-B528-335F1A4F0DE9} - http://scripts.dlv4.com/binaries/egaccess4/egaccess4_1073_em_XP.cab
O20 - AppInit_DLLs: kmksgc.dll
O20 - Winlogon Notify: wvUnOGvu - C:\WINDOWS\SYSTEM32\wvUnOGvu.dll
O23 - Service: Avira AntiVir Personal - Free Antivirus Scheduler (AntiVirScheduler) - Avira GmbH - C:\Program Files\Avira\AntiVir PersonalEdition Classic\sched.exe
O23 - Service: Avira AntiVir Personal - Free Antivirus Guard (AntiVirService) - Avira GmbH - C:\Program Files\Avira\AntiVir PersonalEdition Classic\avguard.exe
O23 - Service: AVG Anti-Spyware Guard - GRISOFT s.r.o. - C:\Program Files\Grisoft\AVG Anti-Spyware 7.5\guard.exe
O23 - Service: AdminWorks Agent X6 (AWService) - Avocent Inc. - C:\Acer\Empowering Technology\admServ.exe
O23 - Service: Boonty Games - BOONTY - C:\Program Files\Fichiers communs\BOONTY Shared\Service\Boonty.exe
O23 - Service: CyberLink Background Capture Service (CBCS) (CLCapSvc) - Unknown owner - C:\Program Files\Acer\Acer Arcade\Kernel\TV\CLCapSvc.exe
O23 - Service: CyberLink Task Scheduler (CTS) (CLSched) - Unknown owner - C:\Program Files\Acer\Acer Arcade\Kernel\TV\CLSched.exe
O23 - Service: CyberLink Media Library Service - Cyberlink - C:\Program Files\Acer\Acer Arcade\Kernel\CLML_NTService\CLMLServer.exe
O23 - Service: LightScribeService Direct Disc Labeling Service (LightScribeService) - Hewlett-Packard Company - C:\Program Files\Fichiers communs\LightScribe\LSSrvc.exe
O23 - Service: Cyberlink RichVideo Service(CRVS) (RichVideo) - Unknown owner - C:\Program Files\CyberLink\Shared Files\RichVideo.exe
0