Lecture résumé HIJACKTHIS

ROSALLY Messages postés 80 Statut Membre -  
ROSALLY Messages postés 80 Statut Membre -
Bonjour,
pourriez vous lire mon resumé suite à un scan avec hijackthis
et me dire s'il y a reparation a faire, je pense que oui, parce que j'ai tjrs le meme probleme a savoir site Chinois en page d'accueil au lancement de internet explorer... suivi par d'autres sans les avoir ouvert...
j'ai l'impression qu'il prend possession de mon pc et je ne peux rie n faire j'ai beau instalé des anti virus, anti spam, rien a faire...
merci d'avance



Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 17:39:13, on 20/02/2009
Platform: Windows XP SP3 (WinNT 5.01.2600)
MSIE: Internet Explorer v7.00 (7.00.6000.16791)
Boot mode: Normal

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\csrss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\system\rund1132.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\system\rund1132.exe
C:\Documents and Settings\All Users\Application Data\Microsoft\Crypto\common32.exe
C:\WINDOWS\WinShell.\daemon.exe
C:\WINDOWS\SOUNDMAN.EXE
C:\Program Files\Fichiers communs\Microsoft Shared\Works Shared\WkUFind.exe
C:\Program Files\Java\jre6\bin\jusched.exe
C:\Program Files\Creative\Shared Files\CAMTRAY.EXE
C:\PROGRA~1\Wanadoo\TaskBarIcon.exe
C:\Program Files\Google\Google Desktop Search\GoogleDesktop.exe
C:\Program Files\QuickTime\qttask.exe
C:\Program Files\ScanSoft\PaperPort\pptd40nt.exe
C:\Program Files\Brother\Brmfcmon\BrMfcWnd.exe
C:\Program Files\Google\Google Desktop Search\GoogleDesktop.exe
C:\Program Files\Fichiers communs\Goto Software\Vaderetro_Mgr.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\Google\Google Desktop Search\GoogleDesktop.exe
C:\Program Files\Skype\Phone\Skype.exe
C:\PROGRA~1\Wanadoo\EspaceWanadoo.exe
C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe
C:\Program Files\Brother\ControlCenter3\brccMCtl.exe
C:\PROGRA~1\Wanadoo\ComComp.exe
C:\WINDOWS\System32\ALERTM~1\ALERTM~1.EXE
C:\Program Files\Microsoft Money\System\mnyexpr.exe
C:\Program Files\Windows Media Player\WMPNSCFG.exe
C:\WINDOWS\System32\FTRTSVC.exe
C:\Program Files\Uniblue\RegistryBooster\RegistryBooster.exe
C:\Program Files\Google\Common\Google Updater\GoogleUpdaterService.exe
C:\PROGRA~1\Wanadoo\Toaster.exe
C:\PROGRA~1\Wanadoo\Inactivity.exe
C:\PROGRA~1\Wanadoo\PollingModule.exe
C:\WINDOWS\System32\svchost.exe
C:\Program Files\Java\jre6\bin\jqs.exe
C:\WINDOWS\System32\svchost.exe
C:\Program Files\Sony Corporation\Picture Package\Picture Package Menu\SonyTray.exe
C:\Program Files\Sony Corporation\Picture Package\Picture Package Applications\Residence.exe
C:\Program Files\SAGEM Wi-Fi USB 802.11g\WLANUTL.exe
C:\Program Files\Sony\Sony Picture Utility\PMBCore\SPUVolumeWatcher.exe
C:\WINDOWS\system32\svchost.exe
C:\Program Files\Windows Media Player\WMPNetwk.exe
C:\WINDOWS\system32\wbem\wmiprvse.exe
C:\Program Files\Brother\Brmfcmon\BrMfcmon.exe
C:\WINDOWS\System32\alg.exe
C:\PROGRA~1\Wanadoo\Watch.exe
C:\DOCUME~1\CKSAND~1\LOCALS~1\Temp\sys1E.tmp
C:\WINDOWS\Fonts\TIMPIatform.exe
C:\WINDOWS\system32\wauafe.exe
C:\WINDOWS\system32\wauafe.exe
C:\WINDOWS\system32\wauafe.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\WINDOWS\system32\wauafe.exe
C:\Documents and Settings\CKS Andre SNEYAERT\Local Settings\Temporary Internet Files\Content.IE5\3J3A4KDM\HiJackThis[1].exe

R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://luck114.com
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = https://www.msn.com/fr-fr/?ocid=iehp
R1 - HKCU\Software\Microsoft\Internet Explorer\SearchURL,(Default) = https://www.bing.com/?FORM=TOOLBR&cc=fr&toHttps=1&redig=4527FFF1C12746FC9EDB535C75E80ECC
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Window Title = Wanadoo
R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName = Liens
R3 - URLSearchHook: (no name) - _{CFBFAE00-17A6-11D0-99CB-00C04FD64497} - (no file)
R3 - URLSearchHook: (no name) - _{08C06D61-F1F3-4799-86F8-BE1A89362C85} - (no file)
R3 - URLSearchHook: Search Class - {08C06D61-F1F3-4799-86F8-BE1A89362C85} - C:\PROGRA~1\Wanadoo\SEARCH~1.DLL
F3 - REG:win.ini: load=C:\WINDOWS\system\rund1132.exe
F2 - REG:system.ini: UserInit=C:\WINDOWS\system32\userinit.exe,C:\WINDOWS\system\rund1132.exe,
O2 - BHO: AdPopup - {11F09AFD-75AD-4E51-AB43-E09E9351CE16} - C:\Program Files\Fichiers communs\PushWare\cpush0.dll
O2 - BHO: Info cache - {296AB8C6-FB22-4D17-8834-064E2BA0A6F0} - C:\WINDOWS\Intel\baiduc.dll
O2 - BHO: IETimber - {489873CE-F3E1-44A3-8E89-04BE26BE4446} - C:\Program Files\Internet Explorer\IETimber\IETimber.dll
O2 - BHO: Java(tm) Plug-In SSV Helper - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre6\bin\ssv.dll
O2 - BHO: (no name) - {7E853D72-626A-48EC-A868-BA8D5E23E045} - (no file)
O2 - BHO: Google Toolbar Helper - {AA58ED58-01DD-4d91-8333-CF10577473F7} - C:\Program Files\Google\Google Toolbar\GoogleToolbar.dll
O2 - BHO: Google Toolbar Notifier BHO - {AF69DE43-7D58-4638-B6FA-CE66B5AD205D} - C:\Program Files\Google\GoogleToolbarNotifier\5.0.926.3450\swg.dll
O2 - BHO: Windows Live Toolbar Helper - {BDBD1DAD-C946-4A17-ADC1-64B5B4FF55D0} - C:\Program Files\Windows Live Toolbar\msntb.dll
O2 - BHO: Google Dictionary Compression sdch - {C84D72FE-E17D-4195-BB24-76C02E2E7C4E} - C:\Program Files\Google\Google Toolbar\Component\fastsearch_219B3E1547538286.dll
O3 - Toolbar: &Yahoo! Companion - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - C:\Program Files\Yahoo!\Companion\Installs\cpn\ycomp5_6_2_0.dll
O3 - Toolbar: Windows Live Toolbar - {BDAD1DAD-C946-4A17-ADC1-64B5B4FF55D0} - C:\Program Files\Windows Live Toolbar\msntb.dll
O3 - Toolbar: &Google Toolbar - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - C:\Program Files\Google\Google Toolbar\GoogleToolbar.dll
O4 - HKLM\..\Run: [SiSPower] Rundll32.exe SiSPower.dll,ModeAgent
O4 - HKLM\..\Run: [SoundMan] SOUNDMAN.EXE
O4 - HKLM\..\Run: [fenaffiche] C:\Program Files\FenAffiche\FenUnika.exe
O4 - HKLM\..\Run: [NeroFilterCheck] C:\WINDOWS\system32\NeroCheck.exe
O4 - HKLM\..\Run: [Microsoft Works Update Detection] C:\Program Files\Fichiers communs\Microsoft Shared\Works Shared\WkUFind.exe
O4 - HKLM\..\Run: [WOOWATCH] C:\PROGRA~1\Wanadoo\Watch.exe
O4 - HKLM\..\Run: [WOOTASKBARICON] C:\PROGRA~1\Wanadoo\GestMaj.exe TaskBarIcon.exe
O4 - HKLM\..\Run: [SunJavaUpdateSched] "C:\Program Files\Java\jre6\bin\jusched.exe"
O4 - HKLM\..\Run: [Creative WebCam Tray] C:\Program Files\Creative\Shared Files\CAMTRAY.EXE
O4 - HKLM\..\Run: [IST Service] C:\Program Files\ISTsvc\istsvc.exe
O4 - HKLM\..\Run: [OaZeC] C:\WINDOWS\hxyjlul.exe
O4 - HKLM\..\Run: [Internet Optimizer] "C:\Program Files\Internet Optimizer\optimize.exe"
O4 - HKLM\..\Run: [Á³#  L"h'þ9Óœð3rÅWC:\Program Files\ISTsvc\istsvc.exe] C:\WINDOWS\hxyjlul.exe
O4 - HKLM\..\Run: [Yhyjczvn] C:\Program Files\Xkljec\Bsnub.exe
O4 - HKLM\..\Run: [Google Desktop Search] "C:\Program Files\Google\Google Desktop Search\GoogleDesktop.exe" /startup
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
O4 - HKLM\..\Run: [Adobe Reader Speed Launcher] "C:\Program Files\Adobe\Reader 8.0\Reader\Reader_sl.exe"
O4 - HKLM\..\Run: [SSBkgdUpdate] "C:\Program Files\Fichiers communs\Scansoft Shared\SSBkgdUpdate\SSBkgdupdate.exe" -Embedding -boot
O4 - HKLM\..\Run: [PaperPort PTD] "C:\Program Files\ScanSoft\PaperPort\pptd40nt.exe"
O4 - HKLM\..\Run: [IndexSearch] "C:\Program Files\ScanSoft\PaperPort\IndexSearch.exe"
O4 - HKLM\..\Run: [PPort11reminder] "C:\Program Files\ScanSoft\PaperPort\Ereg\Ereg.exe" -r "C:\Documents and Settings\All Users\Application Data\ScanSoft\PaperPort\11\Config\Ereg\Ereg.ini
O4 - HKLM\..\Run: [BrMfcWnd] C:\Program Files\Brother\Brmfcmon\BrMfcWnd.exe /AUTORUN
O4 - HKLM\..\Run: [ControlCenter3] C:\Program Files\Brother\ControlCenter3\brctrcen.exe /autorun
O4 - HKLM\..\Run: [VadeRetro Outlook] C:\Program Files\Goto Software\Vade Retro\VrMoRegister.exe -s
O4 - HKLM\..\Run: [VRManager] C:\Program Files\Fichiers communs\Goto Software\Vaderetro_Mgr.exe
O4 - HKCU\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\ctfmon.exe
O4 - HKCU\..\Run: [WOOKIT] C:\PROGRA~1\Wanadoo\Shell.exe appLaunchClientZone.shl|DEFAULT=cnx|PARAM=
O4 - HKCU\..\Run: [Livecom] "C:\PROGRA~1\Livecom\APPLIC~1\CommunicationAgent\CommunicationAgent.exe" -ICom_StartNoSplashScreen
O4 - HKCU\..\Run: [Skype] "C:\Program Files\Skype\Phone\Skype.exe" /nosplash /minimized
O4 - HKCU\..\Run: [swg] C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe
O4 - HKCU\..\Run: [MoneyAgent] "C:\Program Files\Microsoft Money\System\mnyexpr.exe"
O4 - HKCU\..\Run: [cmdhlpadm] C:\WINDOWS\system32\vkvadezy.exe
O4 - HKCU\..\Run: [WMPNSCFG] C:\Program Files\Windows Media Player\WMPNSCFG.exe
O4 - HKCU\..\Run: [Uniblue RegistryBooster 2009] C:\Program Files\Uniblue\RegistryBooster\RegistryBooster.exe /S
O4 - HKLM\..\Policies\Explorer\Run: [mysys] C:\Documents and Settings\All Users\Application Data\Microsoft\Crypto\common32.exe
O4 - HKLM\..\Policies\Explorer\Run: [user] C:\WINDOWS\WinShell..\daemon.exe
O4 - HKLM\..\Policies\Explorer\Run: [360safe] C:\WINDOWS\Fonts\wuauclt.exe
O4 - HKUS\S-1-5-19\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'SERVICE LOCAL')
O4 - HKUS\S-1-5-20\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'SERVICE RÉSEAU')
O4 - HKUS\S-1-5-18\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\ctfmon.exe (User 'SYSTEM')
O4 - HKUS\S-1-5-18\..\RunOnce: [FlashPlayerUpdate] C:\WINDOWS\system32\Macromed\Flash\FlashUtil9d.exe (User 'SYSTEM')
O4 - HKUS\.DEFAULT\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\ctfmon.exe (User 'Default user')
O4 - HKUS\.DEFAULT\..\RunOnce: [FlashPlayerUpdate] C:\WINDOWS\system32\Macromed\Flash\FlashUtil9d.exe (User 'Default user')
O4 - Startup: Outil de détection de support Picture Motion Browser.lnk = C:\Program Files\Sony\Sony Picture Utility\PMBCore\SPUVolumeWatcher.exe
O4 - Global Startup: Microsoft Office.lnk = C:\Program Files\Microsoft Office\Office10\OSA.EXE
O4 - Global Startup: Picture Package Menu.lnk = C:\Program Files\Sony Corporation\Picture Package\Picture Package Menu\SonyTray.exe
O4 - Global Startup: Picture Package VCD Maker.lnk = C:\Program Files\Sony Corporation\Picture Package\Picture Package Applications\Residence.exe
O4 - Global Startup: Utilitaire réseau pour SAGEM Wi-Fi 11g USB adapter.lnk = ?
O6 - HKCU\Software\Policies\Microsoft\Internet Explorer\Control Panel present
O8 - Extra context menu item: &Windows Live Search - res://C:\Program Files\Windows Live Toolbar\msntb.dll/search.htm
O8 - Extra context menu item: Add to Windows &Live Favorites - https://onedrive.live.com/?id=favorites
O9 - Extra button: Ajout Direct - {219C3416-8CB2-491a-A3C7-D9FCDDC9D600} - C:\Program Files\Windows Live\Writer\WriterBrowserExtension.dll
O9 - Extra 'Tools' menuitem: &Ajout Direct dans Windows Live Writer - {219C3416-8CB2-491a-A3C7-D9FCDDC9D600} - C:\Program Files\Windows Live\Writer\WriterBrowserExtension.dll
O9 - Extra button: Skype - {77BF5300-1474-4EC7-9980-D32B190E9B07} - C:\PROGRA~1\Skype\Phone\IEPlugin\SKYPEI~1.DLL
O9 - Extra button: MoneySide - {E023F504-0C5A-4750-A1E7-A9046DEA8A21} - C:\Program Files\Microsoft Money\System\mnyside.dll
O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra button: Wanadoo - {1462651F-F4BA-4C76-A001-C4284D0FE16E} - https://www.orange.fr/portail (file missing) (HKCU)
O16 - DPF: {4F1E5B1A-2A80-42CA-8532-2D05CB959537} (MSN Photo Upload Tool) - http://gfx2.hotmail.com/mail/w3/resources/MSNPUpld.cab
O16 - DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} (Shockwave Flash Object) - http://fpdownload2.macromedia.com/get/shockwave/cabs/flash/swflash.cab
O18 - Protocol: skype4com - {FFC8B962-9B40-4DFF-9458-1830C7DD7F5D} - C:\PROGRA~1\FICHIE~1\Skype\SKYPE4~1.DLL
O20 - AppInit_DLLs: karna.dat
O20 - Winlogon Notify: xrkfgusi - xrkfgusi32.dll (file missing)
O23 - Service: Securitoo AntiVirus (BackWeb Client - 174112) - Unknown owner - C:\PROGRA~1\SECURI~1\174112\Program\SERVIC~1.EXE (file missing)
O23 - Service: France Telecom Routing Table Service (FTRTSVC) - France Telecom - C:\WINDOWS\System32\FTRTSVC.exe
O23 - Service: Google Desktop Manager 5.7.806.10245 (GoogleDesktopManager-061008-081103) - Google - C:\Program Files\Google\Google Desktop Search\GoogleDesktop.exe
O23 - Service: Google Updater Service (gusvc) - Google - C:\Program Files\Google\Common\Google Updater\GoogleUpdaterService.exe
O23 - Service: Java Quick Starter (JavaQuickStarterService) - Sun Microsystems, Inc. - C:\Program Files\Java\jre6\bin\jqs.exe
O23 - Service: PsShutdown (PsShutdownSvc) - Systems Internals - C:\WINDOWS\System32\PSSDNSVC.EXE
A voir également:

123 réponses

Utilisateur anonyme
 
Il n'est pas complet, ne relance pas Smitfraudfix et reposte le. Merci
0
ROSALLY Messages postés 80 Statut Membre
 
c tout que j'ai eu comme rapport j'ai relance la machine en mode echec
mais redemarre tjrs en mode normal
je vous repond avec un autre pc
dois je refaire l'operation avec SmitfraudFix
0
Utilisateur anonyme
 
Ne touche à rien, on va attendre Lyonnais. Reste vigilante sur le forum
0
ROSALLY Messages postés 80 Statut Membre
 
j'ai ça aussi, si ça peut aider


SmitFraudFix v2.398

Rapport fait à 12:11:08,64, 24/02/2009
Executé à partir de C:\Documents and Settings\CKS Andre SNEYAERT\Bureau\SmitfraudFix
OS: Microsoft Windows XP [version 5.1.2600] - Windows_NT
Le type du système de fichiers est NTFS
Fix executé en mode normal

»»»»»»»»»»»»»»»»»»»»»»»» Process
0

Vous n’avez pas trouvé la réponse que vous recherchez ?

Posez votre question
Lyonnais92 Messages postés 25708 Statut Contributeur sécurité 1 537
 
Re,

Relance le programme Smitfraud,
Cette fois choisit l’option 2, répond oui a tous ;
Sauvegarde le rapport, Redémarre en mode normal, copie/colle le rapport sauvegardé sur le forum


fais attention à bien sauvegarder la totalité du rapport, pas seulement le début.

Ensuite,


Télécharge Toolbar-S&D (Team IDN) sur ton Bureau :

https://77b4795d-a-62cb3a1a-s-sites.googlegroups.com/site/eric71mespages/ToolBarSD.exe?attachauth=ANoY7cqJWPphpudyTqv7TRo5RQ3nm_Sx8JluVMO59X5E9cyE3j3LqKlmStIqiDqJdIgMJLi7MXn2nKVajQfoWuVvZZ2wIx_vkqO4k4P0K9jh-ra9jaKPXdZcoaVF2UqJZNH8ubL_42uIwh6f35xJ2GJMuzddVj2Qth1DgZ839lxEIFGkgWz3TdfvNMy-YtxfA3gqBUrj4U4LFeAPiWr3ClmjIP0t_Xs5PQ%3D%3D&attredirects=2

* Lance l'installation du programme en exécutant le fichier téléchargé.
* Double-clique maintenant sur le raccourci de Toolbar-S&D.
* Sélectionne la langue souhaitée en tapant la lettre de ton choix puis en validant avec la touche Entrée.
* Choisis maintenant l'option "2" puis valide en appuyant sur "Entrée".
! Ne ferme pas la fenêtre lors de la suppression !
Un rapport sera généré, poste son contenu ici.

Je te prépare une manip, mais il me faut faire des vérifs.
0
ROSALLY Messages postés 80 Statut Membre
 
bonjour lyonnais92

J'ai lancer le programme Smitfraud,
après rien sur l'ecran : black out total
plus aucune icone sur l'ecran et ne se passe rien depuis 15 mn....
0
Lyonnais92 Messages postés 25708 Statut Contributeur sécurité 1 537
 
Re,

à faire dans l'ordre

fais redémarrer l'ordi.

Exécute Toolbar S&D comme dit plus haut.

Ensuite :

Copie ou imprime les instructions avant

Déconnecte toi d'internet et ferme toutes tes applications.

Désactive tes protections (antivirus, parefeu, garde en temps réel de l'antispyware)


Crée un nouveau document texte : clic droit de souris sur le bureau > Nouveau > Document Texte, et copie dedans les lignes suivantes :

KillAll::

Rootkit::
c:\program files\MediaChannel\Navvy 5.2\NavvyUp.exe
c:\windows\system32\msexe.exe
c:\windows\system32\zxexe.exe
c:\windows\system32\kdexe.exe
c:\windows\Fonts\wuauclt.exe
c:\docume~1\CKSAND~1\LOCALS~1\Temp\502514
c:\program files\Internet Explorer\PowerJo.ase
c:\program files\Internet Explorer\PowerJv.ask
c:\windows\system32\odgildpe.dll
c:\windows\system32\ebhpliad.dll
c:\windows\system32\homegdpk.dll
c:\windows\system32\cockgddc.dll
c:\windows\system32\ojdnnlnf.dll
c:\windows\system32\aldoiilk.dll
c:\windows\system32\heifeado.dll
c:\windows\system32\ambiojfn.dll
c:\windows\system32\kdkdfeln.dll
c:\windows\system32\ooaddion.dll
c:\windows\system32\ndaelgfl.dll
c:\windows\system32\ccbficfi.dll
c:\windows\system32\gajdpnec.dll
c:\windows\system32\ikdapmcm.dll
c:\windows\system32\dbfkipbd.dll
c:\windows\system32\ogcmfdaf.dll
c:\windows\system32\lkknkgnk.dll
c:\windows\system32\kffoogac.dll
c:\windows\system32\akolkhck.dll
c:\windows\system32\oojlpcib.dll
c:\windows\system32\eojpchpn.dll
c:\windows\system\rund1132.exe
c:\windows\system32\drivers\pnpmem.sys
c:\windows\winsscoo.exe
c:\windows\system32\drivers\winyyy.sys
c:\windows\system32\drivers\ati4twxx.sys
c:\windows\system32\drivers\ati8quxx.sys
c:\windows\system32\drivers\ethcjxre.sys
c:\windows\fonts\alsk.sys
c:\windows\fonts\naks.sys
c:\windows\system32\dllcache\spoolsv.exe
c:\windows\system32\WanPacket.dll
c:\windows\WinShell.\daemon.exe
c:\windows\smss.exe
c:\windows\Fonts\TIMPIatform.exe
c:\windows\system32\waubfe.exe
c:\program files\bccd.pif
C:\WINDOWSupdate.dll
c:\windows\system32\kdexe.exe
c:\windows\system32\waubfe.exe
c:\windows\winsscoo.exe
c:\windows\system32\drivers\winyyy.sy­s
c:\windows\system32\1957817A.dll
c:\windows\system32\1957817A.cfg
c:\windows\system32\zxexe.exe
c:\windows\system32\198FF3D8.dll
c:\windows\system32\198FF3D8.cfg
c:\windows\system32\msexe.exe
c:\windows\system32\asdfasdf
c:\windows\system32\registryboosterppcg15.exe
c:\windows\system32\wauafe.exe
c:\windows\system32\dfln.dll
c:\windows\sysinfo.tmp
c:\windows\system32\waunafe.exe
c:\windows\system32\dafln.dll
c:\windows\system32\MSPolicyAgent.dll
c:\windows\system32\types.tmp
c:\windows\system32\waumafe.exe
c:\windows\system32\waulafe.exe
c:\windows\system32\fasadf.dll
c:\windows\system32\somspring.dat
c:\windows\system32\romarshal.dat
c:\windows\system32\drivers\pnpmem.sys
c:\windows\system32\ormsgse.axz
c:\windows\system32\waukafe.exe
c:\windows\system32\flzaitian.dll
c:\windows\system32\exlds.ini
C:\FINE CRUSH LTD.doc
c:\windows\system32\drivers\52438666.txt
c:\program files\cacmchc
c:\program files\Fichiers communs\qybabiqylo.dl
c:\program files\Fichiers communs\vexomigaga._sy
c:\program files\Fichiers communs\vodeqet.ban
c:\documents and settings\All Users\Application Data\288537758
c:\windows\system32\alimoto32.exe
c:\windows\system32\RamrtwC.dll


Registry::
[-HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{5419706F-9AD1-49BB-A91F-EE6B62E2881E}]

[-HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{912F6837-CCB6-424B-BC9C-8BB5541AFB54}]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"NavvyUp"=-
"msexe.exe"=-
"zxexe.exe"=-
"kdexe.exe"=-

[HKEY_LOCAL_MACHINE\software\microsoft\windows\Currentversion\policies\explorer\Run]
"svchstt"=-
"360safe"=-

[hkey_local_machine\software\microsoft\windows\currentversion\explorer\ShellExecuteHooks]
"{5419706F-9AD1-49BB-A91F-EE6B62E2881E}"=-
"{912F6837-CCB6-424B-BC9C-8BB5541AFB54}"=-
"8D025D9E"=-
"EB1952AD"=-
"186E0D94"=-
"C8C40DDC"=-
"83D7757F"=-
"A5D82254"=-
"1E2FEAD8"=-
"A6B283F7"=-
"4D4DFE57"=-
"88ADD287"=-
"7DAE50F5"=-
"CCBF2CF2"=-
"0A3D97EC"=-
"24DA96C6"=-
"DBF429BD"=-
"80C6FDAF"=-
"54474074"=-
"4FF880AC"=-
"A48541C4"=-
"88359C2B"=-


[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad]
"8D025D9E"=-
"EB1952AD"=-
"186E0D94"=-
"C8C40DDC"=-
"83D7757F"=-
"A5D82254"=-
"1E2FEAD8"=-
"A6B283F7"=-
"4D4DFE57"=-
"88ADD287"=-
"7DAE50F5"=-
"CCBF2CF2"=-
"0A3D97EC"=-
"24DA96C6"=-
"DBF429BD"=-
"80C6FDAF"=-
"54474074"=-
"4FF880AC"=-
"A48541C4"=-
"88359C2B"=-

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon]
"Userinit"="c:\windows\system32\userinit.exe,"

[HKEY_CURRENT_USER\software\microsoft\windows nt\currentversion\windows]
"load"=-

[-HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\360rpt.EXE]
[-HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\360safe.EXE]
[-HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\360safebox.EXE]
[-HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\360tray.EXE]
[-HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\ANTIARP.EXE]
[-HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\ArSwp.EXE]
[-HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\Ast.EXE]
[-HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\AutoRun.EXE]
[-HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\AutoRunKiller.EXE]
[-HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\AvMonitor.EXE]
[-HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\AVP.COM]
[-HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\AVP.EXE]
[-HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\CCenter.EXE]
[-HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\Frameworkservice.EXE]
[-HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\GFUpd.EXE]
[-HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\GuardField.EXE]
[-HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\IceSword.EXE]
[-HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\Iparmor.EXE]
[-HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\KASARP.EXE]
[-HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\kav32.EXE]
[-HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\KAVPFW.EXE]
[-HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\kavstart.EXE]
[-HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\kissvc.EXE]
[-HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\kmailmon.EXE]
[-HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\KPfwSvc.EXE]
[-HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\KRegEx.EXE]
[-HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\KVMonxp.KXP]
[-HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\KVSrvXP.EXE]
[-HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\KVWSC.EXE]
[-HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\kwatch.EXE]
[-HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\Mmsk.EXE]
[-HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\Navapsvc.EXE]
[-HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\nod32krn.EXE]
[-HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\Nod32kui.EXE]
[-HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\PFW.EXE]
[-HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\QQDoctor.EXE]
[-HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\RAV.EXE]
[-HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\RavMon.EXE]
[-HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\RavMonD.EXE]
[-HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\Ravservice.EXE]
[-HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\RavStub.EXE]
[-HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\RavTask.EXE]
[-HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\RAVTRAY.EXE]
[-HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\Regedit.EXE]
[-HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\rfwmain.EXE]
[-HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\rfwProxy.EXE]
[-HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\rfwsrv.EXE]
[-HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\Rfwstub.EXE]
[-HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\RsAgent.EXE]
[-HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\Rsaupd.EXE]
[-HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\RsMain.EXE]
[-HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\rsnetsvr.EXE]
[-HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\RSTray.EXE]
[-HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\Runiep.EXE]
[-HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\safeboxTray.EXE]
[-HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\ScanFrm.EXE]
[-HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\SREngLdr.EXE]
[-HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\TrojanDetector.EXE]
[-HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\Trojanwall.EXE]
[-HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\TrojDie.KXP]
[-HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\VPC32.EXE]
[-HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\VPTRAY.EXE]
[-HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\WOPTILITIES.EXE]




driver::
pnpmem
WinSSCOM
MyProt
ati4twxx
ati8quxx
ethcjxre
alsk
naks


Enregistre ce fichier sous le nom CFscript


Fait un glisser/déposer de ce fichier CFscript sur le fichier ComboFix.exe

Clique sur le fichier CFscript, maintient le doigt enfoncé et glisse la souris pour que l'icône du CFscrïpt vienne recouvrir l'icône de Combofix. Relache la souris. Combofix va démarrer.

Patiente le temps du scan.Le bureau va disparaître à plusieurs reprises: c'est normal!

Ne touche à rien tant que le scan n'est pas terminé.

Réactive ton parefeu, ton antivirus, la garde de ton antispyware

Une fois le scan achevé, un rapport va s'afficher: poste son contenu.


Si le fichier ne s'ouvre pas, il se trouve ici > C:\ComboFix.txt

Attention : cette manip a été fait pour cet ordi. Tout réutilisation peut endommager sévèrement le système d'exploitation.

===============

Après avoir posté le rapport de Combofix, essaye de redémarrer en mode sans échec.

En mode sans échec ou en mode normal, relance Smitfraudfix option 2 et poste le rapport.

===============

Ton infection date d'août 2008.

Sais tu ce qu'est CC.pif qui est sur un support externe (E:) (clé USB ou disque dur externe).

Ne cherche pas à l'ouvrir ni même à insérer ce support, dis seulement si tu sais.
A demain.
0
ROSALLY Messages postés 80 Statut Membre
 
je poste le rapport de TooBar S&D, le reste suivra
par contre pour ta question concernant CC.pif, je en sais pas ce que c'est
ça peut être une clé USB parce que j'ai pas de disque dur externe



-----------\\ ToolBar S&D 1.2.8 XP/Vista

Microsoft Windows XP Édition familiale ( v5.1.2600 ) Service Pack 3
X86-based PC ( Uniprocessor Free : Intel(R) Pentium(R) 4 CPU 3.06GHz )
BIOS : Phoenix - AwardBIOS v6.00PG
USER : CKS Andre SNEYAERT ( Administrator )
BOOT : Normal boot
C:\ (Local Disk) - NTFS - Total:176 Go (Free:142 Go)
D:\ (CD or DVD)
F:\ (USB)
G:\ (USB)
H:\ (USB)
I:\ (USB)
J:\ (USB)

"C:\ToolBar SD" ( MAJ : 21-12-2008|20:47 )
Option : [2] ( 20/02/2009|22:59 )

-----------\\ SUPPRESSION

Supprime! - C:\DOCUME~1\CKSAND~1\MENUDM~1\PROGRA~1\PlayMP3z
Supprime! - C:\DOCUME~1\CKSAND~1\Cookies\cks_andre_sneyaert@surfaccuracy[1].txt
Supprime! - C:\DOCUME~1\CKSAND~1\LOCALS~1\Temp\tem1F.tmp.exe
Supprime! - C:\DOCUME~1\CKSAND~1\LOCALS~1\Temp\nsh21.tmp
Supprime! - C:\DOCUME~1\CKSAND~1\LOCALS~1\Temp\nsk2A.tmp
Supprime! - C:\DOCUME~1\CKSAND~1\LOCALS~1\Temp\nsz13B.tmp
Supprime! - C:\DOCUME~1\CKSAND~1\LOCALS~1\Temp\nsz1EF.tmp

-----------\\ Recherche de Fichiers / Dossiers ...


-----------\\ Extensions

(All Users) - {3112ca9c-de6d-4884-a869-9855de68056c} => google-toolbar

(CKS Andre SNEYAERT) - {3112ca9c-de6d-4884-a869-9855de68056c} => google-toolbar


-----------\\ [..\Internet Explorer\Main]

[HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main]
"Local Page"="C:\\WINDOWS\\system32\\blank.htm"
"Search Page"="https://www.google.com/?gws_rd=ssl"
"Start Page"="http://luck114.com"
"Search Bar"="http://www.google.com/toolbar/ie8/sidebar.html"
"SearchMigratedDefaultURL"="https://www.google.com/webhp?gws_rd=ssl{searchTerms}&sourceid=ie7&rls=com.microsoft:en-US&ie=utf8&oe=utf8"

[HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\Main]
"Default_Page_URL"="https://www.msn.com/fr-fr/?ocid=iehp"
"Default_Search_URL"="http://www.google.com/toolbar/ie8/sidebar.html"
"Search Page"="https://www.google.com/?gws_rd=ssl"
"Start Page"="https://www.google.com/?gws_rd=ssl"


--------------------\\ Recherche d'autres infections

C:\WINDOWS\Tasks\At1.job
C:\WINDOWS\Tasks\At10.job
C:\WINDOWS\Tasks\At11.job
C:\WINDOWS\Tasks\At12.job
C:\WINDOWS\Tasks\At13.job
C:\WINDOWS\Tasks\At14.job
C:\WINDOWS\Tasks\At15.job
C:\WINDOWS\Tasks\At16.job
C:\WINDOWS\Tasks\At17.job
C:\WINDOWS\Tasks\At18.job
C:\WINDOWS\Tasks\At19.job
C:\WINDOWS\Tasks\At2.job
C:\WINDOWS\Tasks\At20.job
C:\WINDOWS\Tasks\At21.job
C:\WINDOWS\Tasks\At22.job
C:\WINDOWS\Tasks\At23.job
C:\WINDOWS\Tasks\At24.job
C:\WINDOWS\Tasks\At25.job
C:\WINDOWS\Tasks\At26.job
C:\WINDOWS\Tasks\At27.job
C:\WINDOWS\Tasks\At28.job
C:\WINDOWS\Tasks\At29.job
C:\WINDOWS\Tasks\At3.job
C:\WINDOWS\Tasks\At30.job
C:\WINDOWS\Tasks\At31.job
C:\WINDOWS\Tasks\At32.job
C:\WINDOWS\Tasks\At33.job
C:\WINDOWS\Tasks\At34.job
C:\WINDOWS\Tasks\At35.job
C:\WINDOWS\Tasks\At36.job
C:\WINDOWS\Tasks\At37.job
C:\WINDOWS\Tasks\At38.job
C:\WINDOWS\Tasks\At39.job
C:\WINDOWS\Tasks\At4.job
C:\WINDOWS\Tasks\At40.job
C:\WINDOWS\Tasks\At41.job
C:\WINDOWS\Tasks\At42.job
C:\WINDOWS\Tasks\At43.job
C:\WINDOWS\Tasks\At44.job
C:\WINDOWS\Tasks\At45.job
C:\WINDOWS\Tasks\At46.job
C:\WINDOWS\Tasks\At47.job
C:\WINDOWS\Tasks\At48.job
C:\WINDOWS\Tasks\At49.job
C:\WINDOWS\Tasks\At5.job
C:\WINDOWS\Tasks\At50.job
C:\WINDOWS\Tasks\At51.job
C:\WINDOWS\Tasks\At52.job
C:\WINDOWS\Tasks\At53.job
C:\WINDOWS\Tasks\At54.job
C:\WINDOWS\Tasks\At55.job
C:\WINDOWS\Tasks\At56.job
C:\WINDOWS\Tasks\At57.job
C:\WINDOWS\Tasks\At58.job
C:\WINDOWS\Tasks\At59.job
C:\WINDOWS\Tasks\At6.job
C:\WINDOWS\Tasks\At60.job
C:\WINDOWS\Tasks\At61.job
C:\WINDOWS\Tasks\At62.job
C:\WINDOWS\Tasks\At63.job
C:\WINDOWS\Tasks\At64.job
C:\WINDOWS\Tasks\At65.job
C:\WINDOWS\Tasks\At66.job
C:\WINDOWS\Tasks\At67.job
C:\WINDOWS\Tasks\At68.job
C:\WINDOWS\Tasks\At69.job
C:\WINDOWS\Tasks\At7.job
C:\WINDOWS\Tasks\At70.job
C:\WINDOWS\Tasks\At71.job
C:\WINDOWS\Tasks\At72.job
C:\WINDOWS\Tasks\At8.job
C:\WINDOWS\Tasks\At9.job

--------------------\\ ROGUES ..

C:\DOCUME~1\CKSAND~1\MENUDM~1\PROGRA~1\XP_Antispyware

--------------------\\ Cracks & Keygens ..

C:\DOCUME~1\CKSAND~1\Cookies\cks_andre_sneyaert@captaincrackwhore[2].txt
C:\DOCUME~1\CKSAND~1\Cookies\cks_andre_sneyaert@likecrack[1].txt
C:\DOCUME~1\CKSAND~1\Cookies\cks_andre_sneyaert@www.captaincrackwhore[1].txt



1 - "C:\ToolBar SD\TB_1.txt" - 20/02/2009|22:26 - Option : [1]
2 - "C:\ToolBar SD\TB_2.txt" - 20/02/2009|23:00 - Option : [2]

-----------\\ Fin du rapport a 23:00:04,82
0
ROSALLY Messages postés 80 Statut Membre
 
ci-après rapport ComboFix
je continue les autres manip.

ComboFix 09-02-21.01 - CKS Andre SNEYAERT 2009-02-24 18:25:19.3 - NTFSx86
Microsoft Windows XP Édition familiale 5.1.2600.3.1252.1.1036.18.894.392 [GMT 1:00]
Lancé depuis: c:\documents and settings\CKS Andre SNEYAERT\Bureau\Combo-Fix.exe
Commutateurs utilisés :: c:\documents and settings\CKS Andre SNEYAERT\Bureau\CFscript.txt
* Un nouveau point de restauration a été créé
.

(((((((((((((((((((((((((((((((((((( Autres suppressions ))))))))))))))))))))))))))))))))))))))))))))))))
.

c:\program files\bccd.pif
c:\program files\Fichiers communs\PushWare
c:\program files\Fichiers communs\PushWare\cpush0.dll
c:\program files\Fichiers communs\PushWare\Uninst.exe
c:\program files\Fichiers communs\qybabiqylo.dl
c:\program files\Fichiers communs\vexomigaga._sy
c:\program files\Fichiers communs\vodeqet.ban
c:\program files\Internet Explorer\PowerJo.ase
c:\program files\Internet Explorer\PowerJv.ask
c:\program files\MediaChannel\Navvy 5.2\NavvyUp.exe
c:\windows\Fonts\TIMPIatform.exe
c:\windows\Fonts\wuauclt.exe
c:\windows\Intel\baiduc.dll
c:\windows\smss.exe
c:\windows\sysinfo.tmp
c:\windows\system\rund1132.exe
c:\windows\system32\16AF66EB.cfg
c:\windows\system32\16AF66EB.dll
c:\windows\system32\1957817A.cfg
c:\windows\system32\1957817A.dll
c:\windows\system32\198FF3D8.cfg
c:\windows\system32\198FF3D8.dll
c:\windows\system32\404Fix.exe
c:\windows\system32\4FBFD5A4.cfg
c:\windows\system32\4FBFD5A4.dll
c:\windows\system32\A1A6BC2E.cfg
c:\windows\system32\A1A6BC2E.dll
c:\windows\system32\Agent.OMZ.Fix.exe
c:\windows\system32\ali712f9.dll
c:\windows\system32\alicf27.dll
c:\windows\system32\alie7c0.dll
c:\windows\system32\alimoto32.exe
c:\windows\system32\ambiojfn.dll
c:\windows\system32\asdfasdf
c:\windows\system32\B4eocaps.SRG
c:\windows\system32\cockgddc.dll
c:\windows\system32\DA63E650.cfg
c:\windows\system32\DA63E650.dll
c:\windows\system32\dafln.dll
c:\windows\system32\dfln.dll
c:\windows\system32\drivers\52438666.txt
c:\windows\system32\drivers\acpidisk.sys
c:\windows\system32\drivers\ati4twxx.sys
c:\windows\system32\drivers\ati8quxx.sys
c:\windows\system32\drivers\ethcjxre.sys
c:\windows\system32\drivers\npf.sys
c:\windows\system32\drivers\pnpmem.sys
c:\windows\system32\drivers\winyyy.sys
c:\windows\system32\dumphive.exe
c:\windows\system32\ebhpliad.dll
c:\windows\system32\exlds.ini
c:\windows\system32\F65BDEC7.cfg
c:\windows\system32\F65BDEC7.dll
c:\windows\system32\fasadf.dll
c:\windows\system32\flzaitian.dll
c:\windows\system32\gprmsgse.axz
c:\windows\system32\gscpx32r.det
c:\windows\system32\homegdpk.dll
c:\windows\system32\IEDFix.C.exe
c:\windows\system32\IEDFix.exe
c:\windows\system32\kdexe.exe
c:\windows\system32\mprmsgse.axz
c:\windows\system32\mscpx32r.det
c:\windows\system32\msexe.exe
c:\windows\system32\MSPolicyAgent.dll
c:\windows\system32\o4Patch.exe
c:\windows\system32\odgildpe.dll
c:\windows\system32\ojdnnlnf.dll
c:\windows\system32\ormsgse.axz
c:\windows\system32\Packet.dll
c:\windows\system32\Process.exe
c:\windows\system32\RamrtwC.dll
c:\windows\system32\registryboosterppcg15.exe
c:\windows\system32\romarshal.dat
c:\windows\system32\somspring.dat
c:\windows\system32\SrchSTS.exe
c:\windows\system32\types.tmp
c:\windows\system32\VACFix.exe
c:\windows\system32\VCCLSID.exe
c:\windows\system32\WanPacket.dll
c:\windows\system32\wauafe.exe
c:\windows\system32\waubfe.exe
c:\windows\system32\waukafe.exe
c:\windows\system32\waulafe.exe
c:\windows\system32\waumafe.exe
c:\windows\system32\waunafe.exe
c:\windows\system32\wpcap.dll
c:\windows\system32\WS2Fix.exe
c:\windows\system32\zxexe.exe
c:\windows\Temp\20090122.exe
c:\windows\WinShell.\daemon.exe
c:\windows\winsscoo.exe
C:\WINDOWSupdate.dll

.
((((((((((((((((((((((((((((((((((((((( Pilotes/Services )))))))))))))))))))))))))))))))))))))))))))))))))
.

-------\Legacy_ACPIDISK
-------\Legacy_ALSK
-------\Legacy_ATI4TWXX
-------\Legacy_ATI8QUXX
-------\Legacy_MYPROT
-------\Legacy_NAKS
-------\Legacy_NPF
-------\Legacy_PNPMEM
-------\Legacy_WINSSCOM
-------\Legacy_ZG
-------\Service_acpidisk
-------\Service_aliimz
-------\Service_alsk
-------\Service_ati4twxx
-------\Service_ati8quxx
-------\Service_ethcjxre
-------\Service_MyProt
-------\Service_naks
-------\Service_npf
-------\Service_pnpmem
-------\Service_WinSSCOM


((((((((((((((((((((((((((((( Fichiers créés du 2009-01-24 au 2009-02-24 ))))))))))))))))))))))))))))))))))))
.

2009-02-24 18:04 . 2009-02-24 18:04 14,962 --ahs---- c:\windows\system32\704C3595.dll
2009-02-24 18:04 . 2009-02-24 18:04 224 --ahs---- c:\windows\system32\704C3595.cfg
2009-02-24 18:03 . 2009-02-24 18:03 14,460 --ahs---- c:\windows\system32\16BC0F81.dll
2009-02-24 18:03 . 2009-02-24 18:03 244 --ahs---- c:\windows\system32\16BC0F81.cfg
2009-02-24 12:19 . 2009-02-24 12:19 40 --a------ c:\windows\tmp.dat
2009-02-24 12:19 . 2009-02-24 12:19 37 --a------ c:\windows\sys.ini
2009-02-23 16:50 . 2004-08-05 13:00 4,224 --a------ c:\windows\system32\drivers\beep.sys
2009-02-23 16:50 . 2004-08-05 13:00 4,224 --a--c--- c:\windows\system32\dllcache\beep.sys
2009-02-21 00:01 . 2009-02-11 10:19 15,504 --a------ c:\windows\system32\drivers\mbam.sys
2009-02-21 00:00 . 2009-02-21 00:01 <REP> d-------- c:\program files\Malwarebytes' Anti-Malware
2009-02-21 00:00 . 2009-02-11 10:19 38,496 --a------ c:\windows\system32\drivers\mbamswissarmy.sys
2009-02-20 23:13 . 2009-02-20 23:13 396,288 --a------ c:\windows\HijackThis.exe
2009-02-20 22:23 . 2009-02-20 23:00 <REP> d-------- C:\ToolBar SD
2009-02-20 21:43 . 2009-02-20 21:43 16,656 --a------ C:\mbam-log-2009-02-20 (21-42-58)VIRUS
2009-02-20 19:50 . 2009-02-20 19:50 15,069 --a------ c:\windows\system32\telechargement-159-hijackthis.htm
2009-02-20 19:04 . 2009-02-20 19:04 <REP> d-------- c:\program files\MediaChannel
2009-02-20 16:08 . 2009-02-20 16:08 <REP> d-------- c:\documents and settings\CKS Andre SNEYAERT\Application Data\Malwarebytes
2009-02-20 16:08 . 2009-02-20 16:08 <REP> d-------- c:\documents and settings\All Users\Application Data\Malwarebytes
2009-02-20 13:11 . 2003-03-18 21:20 1,060,864 --a------ c:\windows\system32\mfc71.dll
2009-02-20 13:01 . 2009-02-20 13:01 520,052 --a------ c:\windows\system32\mfc71.7z
2009-02-20 12:55 . 2009-02-20 13:00 <REP> d-------- c:\windows\system32\mfc71
2009-02-20 12:01 . 2009-02-20 12:02 514,940 -rah----- c:\windows\system32\mfc71.zip
2009-02-20 11:31 . 2009-02-20 11:31 <REP> d-------- c:\documents and settings\CKS Andre SNEYAERT\Application Data\Uniblue
2009-02-19 18:50 . <REP> c:\windows\$WIND$
2009-02-19 18:45 . 2009-02-20 22:16 <REP> d-------- c:\program files\Goto Software
2009-02-19 18:45 . 2009-02-20 22:16 <REP> d-------- c:\program files\Fichiers communs\Goto Software
2009-02-19 18:45 . 2009-02-19 18:45 <REP> d-------- c:\documents and settings\CKS Andre SNEYAERT\Application Data\VadeRetro
2009-02-19 18:45 . 2009-02-20 22:16 <REP> d-------- c:\documents and settings\All Users\Application Data\VadeRetro
2009-02-19 16:43 . <REP> c:\windows\WinShell
2009-02-18 19:42 . 2009-02-18 19:42 31,232 --a------ C:\Relevé de compte LAW YAT au 31.12.2008.doc
2009-02-17 14:47 . 2009-02-24 18:25 <REP> d-------- c:\windows\Intel
2009-02-17 14:45 . 2008-04-14 03:33 19,968 --a--c--- c:\windows\system32\dllcache\linkinfo.dll
2009-02-07 23:10 . 2009-02-07 23:10 170,496 --a------ C:\FINE CRUSH LTD.doc
2009-02-02 21:59 . 2009-02-02 21:59 66,048 --a------ C:\Proposition APOLLO pour Ile MAURICE.doc
2009-02-02 17:57 . 2009-02-02 17:57 48,640 --a------ C:\Clients Ile MAURICE.doc
2009-02-02 12:23 . 2009-02-05 11:49 25,088 --a------ C:\A T T E S T A T I O N Impotsssssssssss.doc
2009-02-02 10:47 . 2009-02-02 10:47 30,720 --a------ C:\A T T E S T A T I O N - I m p o t s.doc
2009-01-31 13:51 . 2009-01-31 20:37 26,624 --a------ C:\Demande prolongation stage.doc
2009-01-27 10:10 . 2009-01-27 11:00 32,256 --a------ C:\Courrier André SNEYAERT.doc

.
(((((((((((((((((((((((((((((((((( Compte-rendu de Find3M ))))))))))))))))))))))))))))))))))))))))))))))))
.
2009-02-24 17:32 --------- d-----w c:\program files\Wanadoo
2009-02-24 11:17 --------- d-----w c:\documents and settings\CKS Andre SNEYAERT\Application Data\Skype
2009-02-23 22:43 431,922 ----a-w c:\program files\HJTInstall.7z
2009-02-23 15:33 --------- d-----w c:\documents and settings\All Users\Application Data\Google Updater
2009-02-20 16:26 --------- d-----w c:\program files\cacmchc
2009-02-18 18:10 --------- d-----w c:\program files\Google
2009-01-23 20:21 --------- d-----w c:\documents and settings\All Users\Application Data\288537758
2009-01-21 19:07 --------- d-----w c:\program files\EnveloppesEditor1.09
2009-01-21 16:56 --------- d-----w c:\documents and settings\CKS Andre SNEYAERT\Application Data\PC-FAX TX
2009-01-16 17:15 137,664 ----a-w c:\windows\system32\drivers\adiusbaw.sys
2008-09-22 09:52 85,504 ----a-w c:\documents and settings\CKS Andre SNEYAERT\Application Data\GDIPFONTCACHEV1.DAT
2008-09-04 14:43 1,940 ----a-w c:\documents and settings\CKS Andre SNEYAERT\Application Data\ViewerApp.dat
2009-02-19 15:43 159,744 ----a-w c:\program files\internet explorer\plugins\icwres.dll
2008-09-27 10:02 122,880 ----a-w c:\program files\mozilla firefox\components\GoogleDesktopMozilla.dll
.

------- Sigcheck -------

2004-08-05 13:00 15360 5584247b568c2e53934873f4b655fe6a c:\windows\$NtServicePackUninstall$\ctfmon.exe
2008-04-14 03:33 15360 59dc5bb82e4c8e0b3eadcfdbc44ba6e4 c:\windows\ServicePackFiles\i386\ctfmon.exe
2008-04-14 03:33 15360 9bc8230dda8e37e375a5a9aa551a8f76 c:\windows\system32\ctfmon.exe
.
((((((((((((((((((((((((((((( SnapShot@2009-02-24_ 1.22.06.37 )))))))))))))))))))))))))))))))))))))))))
.
- 2009-02-24 00:16:01 3,740 ----a-w c:\windows\Downloaded Program Files\alg.exe
+ 2009-02-24 17:32:35 3,740 ----a-w c:\windows\Downloaded Program Files\alg.exe
+ 2008-08-14 13:23:49 45,056 ----a-w c:\windows\system32\aoalmieo.dll
+ 2008-08-14 13:23:49 34,816 ----a-w c:\windows\system32\cbndboek.dll
+ 2008-08-14 13:23:49 249,856 ----a-w c:\windows\system32\cciieood.dll
+ 2008-08-14 13:23:49 40,960 ----a-w c:\windows\system32\cdcgebkf.dll
+ 2008-08-14 13:23:49 45,056 ----a-w c:\windows\system32\cpnbliif.dll
+ 2008-08-14 13:23:49 49,152 ----a-w c:\windows\system32\dpbfhnfj.dll
+ 2008-08-14 13:23:49 229,376 ----a-w c:\windows\system32\feeckhoj.dll
+ 2008-08-14 13:23:49 34,304 ----a-w c:\windows\system32\gjdochbi.dll
+ 2008-08-14 13:23:49 28,672 ----a-w c:\windows\system32\ipppkhkc.dll
+ 2008-08-14 13:23:49 40,960 ----a-w c:\windows\system32\mppblchp.dll
+ 2008-08-14 13:23:49 65,536 ----a-w c:\windows\system32\nfbdadcc.dll
- 2009-02-24 00:18:25 49,152 ----a-w c:\windows\system32\npptools.dll
+ 2008-04-14 02:33:36 55,296 ----a-w c:\windows\system32\npptools.dll
+ 2008-08-14 13:23:49 32,256 ----a-w c:\windows\system32\pahklhok.dll
+ 2008-08-14 13:23:49 40,960 ----a-w c:\windows\system32\pfpjhepc.dll
+ 2008-08-14 13:23:49 45,056 ----a-w c:\windows\system32\piakdpih.dll
+ 2009-02-24 17:31:30 16,384 ----atw c:\windows\Temp\Perflib_Perfdata_b4.dat
.
-- Instantané actualisé --
.
((((((((((((((((((((((((((((((((( Points de chargement Reg ))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* les éléments vides & les éléments initiaux légitimes ne sont pas listés
REGEDIT4

[HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{11F09AFD-75AD-4E51-AB43-E09E9351CE16}]
2009-02-10 04:30 196608 --a------ c:\program files\Fichiers communs\PushWare\cpush.dll

[HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{296AB8C6-FB22-4D17-8834-064E2BA0A6F0}]
2009-03-09 04:43 155648 -ra------ c:\windows\Intel\baiduc.dll

[HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{489873CE-F3E1-44A3-8E89-04BE26BE4446}]
2009-02-10 05:14 193912 --a------ c:\program files\Internet Explorer\IETimber\IETimber.dll

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"CTFMON.EXE"="c:\windows\system32\ctfmon.exe" [2008-04-14 15360]
"WOOKIT"="c:\progra~1\Wanadoo\Shell.exe" [2004-08-23 122880]
"Livecom"="c:\progra~1\Livecom\APPLIC~1\CommunicationAgent\CommunicationAgent.exe" [2006-02-23 237568]
"Skype"="c:\program files\Skype\Phone\Skype.exe" [2007-02-09 25388584]
"swg"="c:\program files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe" [2007-07-01 68856]
"MoneyAgent"="c:\program files\Microsoft Money\System\mnyexpr.exe" [2002-07-17 204863]
"WMPNSCFG"="c:\program files\Windows Media Player\WMPNSCFG.exe" [2006-11-03 204288]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"fenaffiche"="c:\program files\FenAffiche\FenUnika.exe" [2004-07-23 36864]
"NeroFilterCheck"="c:\windows\system32\NeroCheck.exe" [2001-07-09 155648]
"Microsoft Works Update Detection"="c:\program files\Fichiers communs\Microsoft Shared\Works Shared\WkUFind.exe" [2002-07-18 28672]
"WOOWATCH"="c:\progra~1\Wanadoo\Watch.exe" [2004-08-23 20480]
"WOOTASKBARICON"="c:\progra~1\Wanadoo\GestMaj.exe" [2004-10-14 32768]
"SunJavaUpdateSched"="c:\program files\Java\jre6\bin\jusched.exe" [2008-12-20 136600]
"Creative WebCam Tray"="c:\program files\Creative\Shared Files\CAMTRAY.EXE" [2003-10-13 184320]
"Google Desktop Search"="c:\program files\Google\Google Desktop Search\GoogleDesktop.exe" [2008-09-27 29744]
"QuickTime Task"="c:\program files\QuickTime\qttask.exe" [2006-09-01 282624]
"Adobe Reader Speed Launcher"="c:\program files\Adobe\Reader 8.0\Reader\Reader_sl.exe" [2007-10-10 39792]
"SSBkgdUpdate"="c:\program files\Fichiers communs\Scansoft Shared\SSBkgdUpdate\SSBkgdupdate.exe" [2006-10-25 210472]
"PaperPort PTD"="c:\program files\ScanSoft\PaperPort\pptd40nt.exe" [2007-01-29 30248]
"IndexSearch"="c:\program files\ScanSoft\PaperPort\IndexSearch.exe" [2007-01-29 46632]
"PPort11reminder"="c:\program files\ScanSoft\PaperPort\Ereg\Ereg.exe" [2007-02-01 255528]
"BrMfcWnd"="c:\program files\Brother\Brmfcmon\BrMfcWnd.exe" [2007-03-23 663552]
"ControlCenter3"="c:\program files\Brother\ControlCenter3\brctrcen.exe" [2007-01-26 65536]
"SiSPower"="SiSPower.dll" [2005-04-12 c:\windows\system32\SiSPower.dll]
"SoundMan"="SOUNDMAN.EXE" [2005-03-24 c:\windows\SOUNDMAN.EXE]

[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run]
"CTFMON.EXE"="c:\windows\system32\ctfmon.exe" [2008-04-14 15360]
"Picasa Media Detector"="c:\program files\Picasa2\PicasaMediaDetector.exe" [2008-08-21 443968]
"msnmsgr"="c:\program files\Windows Live\Messenger\msnmsgr.exe" [2007-10-18 5724184]

[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\RunOnce]
"FlashPlayerUpdate"="c:\windows\system32\Macromed\Flash\FlashUtil9d.exe" [2007-06-11 190696]

[HKEY_LOCAL_MACHINE\software\microsoft\windows\Currentversion\policies\explorer\Run]
"user"="c:\windows\WinShell..\daemon.exe" [BU]
"360safe"="c:\windows\Fonts\wuauclt.exe" [2009-02-24 19968]

c:\documents and settings\CKS Andre SNEYAERT\Menu D‚marrer\Programmes\D‚marrage\
Outil de d‚tection de support Picture Motion Browser.lnk - c:\program files\Sony\Sony Picture Utility\PMBCore\SPUVolumeWatcher.exe [2008-07-19 385024]

c:\documents and settings\All Users\Menu D‚marrer\Programmes\D‚marrage\
Microsoft Office.lnk - c:\program files\Microsoft Office\Office10\OSA.EXE [2001-02-13 83360]
Picture Package Menu.lnk - c:\program files\Sony Corporation\Picture Package\Picture Package Menu\SonyTray.exe [2006-04-28 151552]
Picture Package VCD Maker.lnk - c:\program files\Sony Corporation\Picture Package\Picture Package Applications\Residence.exe [2006-04-28 106496]
Utilitaire r‚seau pour SAGEM Wi-Fi 11g USB adapter.lnk - c:\program files\SAGEM Wi-Fi USB 802.11g\WLANUTL.exe [2007-04-20 835584]

[HKEY_CURRENT_USER\software\microsoft\windows\currentversion\policies\explorer]
"ForceClassicControlPanel"= 1 (0x1)

[hkey_local_machine\software\microsoft\windows\currentversion\explorer\ShellExecuteHooks]
"{198FF3D8-56F1-466B-A36F-F9C28B43E440}"= "198FF3D8.dll" [BU]
"{1957817A-94B2-4CAC-B113-A331809B5730}"= "1957817A.dll" [BU]
"{CC22E88D-6A04-4A65-A4B9-0CC0D3AE3014}"= "c:\windows\system32\cciieood.dll" [2008-08-14 249856]
"{03D8C1B2-5C21-4784-96C1-00228A85A357}"= "c:\windows\system32\gjdochbi.dll" [2008-08-14 34304]
"{CDC0EB4F-C90A-47A7-B43F-47AC7FFBC413}"= "c:\windows\system32\cdcgebkf.dll" [2008-08-14 40960]
"{D9BF17F3-F42E-48E2-B098-A0E2C9013FB3}"= "c:\windows\system32\dpbfhnfj.dll" [2008-08-14 49152]
"{CB7DB8E4-2C26-4A99-89E8-9339AC260CA4}"= "c:\windows\system32\cbndboek.dll" [2008-08-14 34816]
"{C97B522F-A373-4954-A638-FC5F755A6161}"= "c:\windows\system32\cpnbliif.dll" [2008-08-14 45056]
"{2999414C-E194-4B03-8486-EEEE03F40EE9}"= "c:\windows\system32\ipppkhkc.dll" [2008-08-14 28672]
"{FEEC4183-4715-4F28-891C-077F07231A6B}"= "c:\windows\system32\feeckhoj.dll" [2008-08-14 229376]
"{9F931E9C-F6FB-4918-844E-A6CE25B24792}"= "c:\windows\system32\pfpjhepc.dll" [2008-08-14 40960]
"{9A145184-6AA3-43CD-958D-D22A1D9D9333}"= "c:\windows\system32\pahklhok.dll" [2008-08-14 32256]
"{699B5C19-E0A2-4121-A989-D7A8A1B6B104}"= "c:\windows\system32\mppblchp.dll" [2008-08-14 40960]
"{A8A562E8-97BC-4E82-BAA2-0F361A9F9EF5}"= "c:\windows\system32\aoalmieo.dll" [2008-08-14 45056]
"{92A4D921-7454-4A8B-A510-93E9AFB53821}"= "c:\windows\system32\piakdpih.dll" [2008-08-14 45056]
"{7FBDADCC-FC94-46BB-BA54-84BE7CBC5D92}"= "c:\windows\system32\nfbdadcc.dll" [2008-08-14 65536]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad]
"CC22E88D"= {CC22E88D-6A04-4A65-A4B9-0CC0D3AE3014} - c:\windows\system32\cciieood.dll [2008-08-14 249856]
"03D8C1B2"= {03D8C1B2-5C21-4784-96C1-00228A85A357} - c:\windows\system32\gjdochbi.dll [2008-08-14 34304]
"CDC0EB4F"= {CDC0EB4F-C90A-47A7-B43F-47AC7FFBC413} - c:\windows\system32\cdcgebkf.dll [2008-08-14 40960]
"D9BF17F3"= {D9BF17F3-F42E-48E2-B098-A0E2C9013FB3} - c:\windows\system32\dpbfhnfj.dll [2008-08-14 49152]
"CB7DB8E4"= {CB7DB8E4-2C26-4A99-89E8-9339AC260CA4} - c:\windows\system32\cbndboek.dll [2008-08-14 34816]
"C97B522F"= {C97B522F-A373-4954-A638-FC5F755A6161} - c:\windows\system32\cpnbliif.dll [2008-08-14 45056]
"2999414C"= {2999414C-E194-4B03-8486-EEEE03F40EE9} - c:\windows\system32\ipppkhkc.dll [2008-08-14 28672]
"FEEC4183"= {FEEC4183-4715-4F28-891C-077F07231A6B} - c:\windows\system32\feeckhoj.dll [2008-08-14 229376]
"9F931E9C"= {9F931E9C-F6FB-4918-844E-A6CE25B24792} - c:\windows\system32\pfpjhepc.dll [2008-08-14 40960]
"9A145184"= {9A145184-6AA3-43CD-958D-D22A1D9D9333} - c:\windows\system32\pahklhok.dll [2008-08-14 32256]
"699B5C19"= {699B5C19-E0A2-4121-A989-D7A8A1B6B104} - c:\windows\system32\mppblchp.dll [2008-08-14 40960]
"A8A562E8"= {A8A562E8-97BC-4E82-BAA2-0F361A9F9EF5} - c:\windows\system32\aoalmieo.dll [2008-08-14 45056]
"92A4D921"= {92A4D921-7454-4A8B-A510-93E9AFB53821} - c:\windows\system32\piakdpih.dll [2008-08-14 45056]
"7FBDADCC"= {7FBDADCC-FC94-46BB-BA54-84BE7CBC5D92} - c:\windows\system32\nfbdadcc.dll [2008-08-14 65536]

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\360rpt.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\360safe.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\360safebox.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\360tray.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\ANTIARP.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\ArSwp.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\Ast.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\AutoRun.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\AutoRunKiller.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\AvMonitor.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\AVP.COM]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\AVP.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\CCenter.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\Frameworkservice.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\GFUpd.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\GuardField.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\HijackThis.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\IceSword.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\Iparmor.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\KASARP.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\kav32.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\KAVPFW.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\kavstart.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\kissvc.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\kmailmon.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\KPfwSvc.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\KRegEx.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\KVMonxp.KXP]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\KVSrvXP.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\KVWSC.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\kwatch.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\Mmsk.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\Navapsvc.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\nod32krn.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\Nod32kui.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\PFW.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\QQDoctor.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\RAV.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\RavMon.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\RavMonD.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\Ravservice.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\RavStub.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\RavTask.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\RAVTRAY.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\Regedit.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\rfwmain.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\rfwProxy.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\rfwsrv.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\Rfwstub.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\RsAgent.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\Rsaupd.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\RsMain.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\rsnetsvr.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\RSTray.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\Runiep.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\safeboxTray.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\ScanFrm.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\SREngLdr.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\TrojanDetector.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\Trojanwall.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\TrojDie.KXP]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\VPC32.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\VPTRAY.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\WOPTILITIES.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe

[HKEY_LOCAL_MACHINE\software\microsoft\security center]
"AntiVirusDisableNotify"=dword:00000001
"UpdatesDisableNotify"=dword:00000001

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%windir%\\system32\\sessmgr.exe"=
"c:\\Program Files\\Messenger\\msmsgs.exe"=
"c:\\Program Files\\eMule\\emule.exe"=
"c:\\Program Files\\Livecom\\Application\\eConfv4\\livecomp.exe"=
"c:\\PROGRA~1\\Livecom\\APPLIC~1\\Exe\\Livecom.exe"=
"%windir%\\Network Diagnostic\\xpnetdiag.exe"=
"c:\\Program Files\\Windows Live\\Messenger\\msnmsgr.exe"=
"c:\\Program Files\\Windows Live\\Messenger\\livecall.exe"=
"c:\\Program Files\\Skype\\Phone\\Skype.exe"=
"c:\\Program Files\\Shareaza\\Shareaza.exe"=

S2 BackWeb Client - 174112;Securitoo AntiVirus;c:\progra~1\SECURI~1\174112\Program\SERVIC~1.EXE --> c:\progra~1\SECURI~1\174112\Program\SERVIC~1.EXE [?]
S2 MSPolicyAgent;Microsoft IPsec Policy Agent;c:\windows\System32\svchost.exe -k MSPolicyAgent [2008-04-14 14336]
S3 GoogleDesktopManager-061008-081103;Google Desktop Manager 5.7.806.10245;c:\program files\Google\Google Desktop Search\GoogleDesktop.exe [2007-11-21 29744]
S3 P1120VID;Creative WebCam NX Ultra;c:\windows\system32\drivers\P1120Vid.sys [2006-02-01 1252474]
S3 PsShutdownSvc;PsShutdown;c:\windows\system32\PSSDNSVC.EXE [2005-08-22 65536]
S3 SG760_XP;SAGEM 802.11g XG760 1211 Driver;c:\windows\system32\drivers\WlanUZXP.sys [2007-04-20 260608]
S3 UPDATEDATA;UPDATEDATA;c:\windows\system32\drivers\acpiec.sys [2001-08-23 12032]
S3 ZDCndis5;ZDCndis5 Protocol Driver;c:\windows\system32\zdcndis5.sys [2009-01-16 137664]

--- Autres Services/Pilotes en mémoire ---

*NewlyCreated* - NPF
*NewlyCreated* - ZDPNDIS5

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\svchost]
MSPolicyAgent REG_MULTI_SZ MSPolicyAgent
.
Contenu du dossier 'Tâches planifiées'

2009-02-23 c:\windows\Tasks\AppleSoftwareUpdate.job
- c:\program files\Apple Software Update\SoftwareUpdate.exe [2006-08-29 14:21]

2009-02-23 c:\windows\Tasks\At1.job
- c:\windows\system32\7f7lMNDh.exe []

2009-02-24 c:\windows\Tasks\At10.job
- c:\windows\system32\7f7lMNDh.exe []

2009-02-24 c:\windows\Tasks\At11.job
- c:\windows\system32\7f7lMNDh.exe []

2009-02-24 c:\windows\Tasks\At12.job
- c:\windows\system32\7f7lMNDh.exe []

2009-02-24 c:\windows\Tasks\At13.job
- c:\windows\system32\7f7lMNDh.exe []

2009-02-24 c:\windows\Tasks\At14.job
- c:\windows\system32\7f7lMNDh.exe []

2009-02-24 c:\windows\Tasks\At15.job
- c:\windows\system32\7f7lMNDh.exe []

2009-02-24 c:\windows\Tasks\At16.job
- c:\windows\system32\7f7lMNDh.exe []

2009-02-24 c:\windows\Tasks\At17.job
- c:\windows\system32\7f7lMNDh.exe []

2009-02-24 c:\windows\Tasks\At18.job
- c:\windows\system32\7f7lMNDh.exe []

2009-02-24 c:\windows\Tasks\At19.job
- c:\windows\system32\7f7lMNDh.exe []

2009-02-24 c:\windows\Tasks\At2.job
- c:\windows\system32\7f7lMNDh.exe []

2009-02-23 c:\windows\Tasks\At20.job
- c:\windows\system32\7f7lMNDh.exe []

2009-02-23 c:\windows\Tasks\At21.job
- c:\windows\system32\7f7lMNDh.exe []

2009-02-23 c:\windows\Tasks\At22.job
- c:\windows\system32\7f7lMNDh.exe []

2009-02-23 c:\windows\Tasks\At23.job
- c:\windows\system32\7f7lMNDh.exe []

2009-02-23 c:\windows\Tasks\At24.job
- c:\windows\system32\7f7lMNDh.exe []

2009-02-23 c:\windows\Tasks\At25.job
- c:\windows\system32\7f7lMNDh.exe []

2009-02-24 c:\windows\Tasks\At26.job
- c:\windows\system32\7f7lMNDh.exe []

2009-02-24 c:\windows\Tasks\At27.job
- c:\windows\system32\7f7lMNDh.exe []

2009-01-23 c:\windows\Tasks\At28.job
- c:\windows\system32\7f7lMNDh.exe []

2009-01-23 c:\windows\Tasks\At29.job
- c:\windows\system32\7f7lMNDh.exe []

2009-02-24 c:\windows\Tasks\At3.job
- c:\windows\system32\7f7lMNDh.exe []

2009-01-23 c:\windows\Tasks\At30.job
- c:\windows\system32\7f7lMNDh.exe []

2009-01-23 c:\windows\Tasks\At31.job
- c:\windows\system32\7f7lMNDh.exe []

2009-01-23 c:\windows\Tasks\At32.job
- c:\windows\system32\7f7lMNDh.exe []

2009-02-19 c:\windows\Tasks\At33.job
- c:\windows\system32\7f7lMNDh.exe []

2009-02-24 c:\windows\Tasks\At34.job
- c:\windows\system32\7f7lMNDh.exe []

2009-02-24 c:\windows\Tasks\At35.job
- c:\windows\system32\7f7lMNDh.exe []

2009-02-24 c:\windows\Tasks\At36.job
- c:\windows\system32\7f7lMNDh.exe []

2009-02-24 c:\windows\Tasks\At37.job
- c:\windows\system32\7f7lMNDh.exe []

2009-02-24 c:\windows\Tasks\At38.job
- c:\windows\system32\7f7lMNDh.exe []

2009-02-24 c:\windows\Tasks\At39.job
- c:\windows\system32\7f7lMNDh.exe []

2009-01-23 c:\windows\Tasks\At4.job
- c:\windows\system32\7f7lMNDh.exe []

2009-02-24 c:\windows\Tasks\At40.job
- c:\windows\system32\7f7lMNDh.exe []

2009-02-24 c:\windows\Tasks\At41.job
- c:\windows\system32\7f7lMNDh.exe []

2009-02-24 c:\windows\Tasks\At42.job
- c:\windows\system32\7f7lMNDh.exe []

2009-02-24 c:\windows\Tasks\At43.job
- c:\windows\system32\7f7lMNDh.exe []

2009-02-23 c:\windows\Tasks\At44.job
- c:\windows\system32\7f7lMNDh.exe []

2009-02-23 c:\windows\Tasks\At45.job
- c:\windows\system32\7f7lMNDh.exe []

2009-02-23 c:\windows\Tasks\At46.job
- c:\windows\system32\7f7lMNDh.exe []

2009-02-23 c:\windows\Tasks\At47.job
- c:\windows\system32\7f7lMNDh.exe []

2009-02-23 c:\windows\Tasks\At48.job
- c:\windows\system32\7f7lMNDh.exe []

2009-02-23 c:\windows\Tasks\At49.job
- c:\windows\system32\7f7lMNDh.exe []

2009-01-23 c:\windows\Tasks\At5.job
- c:\windows\system32\7f7lMNDh.exe []

2009-02-24 c:\windows\Tasks\At50.job
- c:\windows\system32\7f7lMNDh.exe []

2009-02-24 c:\windows\Tasks\At51.job
- c:\windows\system32\7f7lMNDh.exe []

2009-01-23 c:\windows\Tasks\At52.job
- c:\windows\system32\7f7lMNDh.exe []

2009-01-23 c:\windows\Tasks\At53.job
- c:\windows\system32\7f7lMNDh.exe []

2009-01-23 c:\windows\Tasks\At54.job
- c:\windows\system32\7f7lMNDh.exe []

2009-01-23 c:\windows\Tasks\At55.job
- c:\windows\system32\7f7lMNDh.exe []

2009-01-23 c:\windows\Tasks\At56.job
- c:\windows\system32\7f7lMNDh.exe []

2009-02-19 c:\windows\Tasks\At57.job
- c:\windows\system32\7f7lMNDh.exe []

2009-02-24 c:\windows\Tasks\At58.job
- c:\windows\system32\7f7lMNDh.exe []

2009-02-24 c:\windows\Tasks\At59.job
- c:\windows\system32\7f7lMNDh.exe []

2009-01-23 c:\windows\Tasks\At6.job
- c:\windows\system32\7f7lMNDh.exe []

2009-02-24 c:\windows\Tasks\At60.job
- c:\windows\system32\7f7lMNDh.exe []

2009-02-24 c:\windows\Tasks\At61.job
- c:\windows\system32\7f7lMNDh.exe []

2009-02-24 c:\windows\Tasks\At62.job
- c:\windows\system32\7f7lMNDh.exe []

2009-02-24 c:\windows\Tasks\At63.job
- c:\windows\system32\7f7lMNDh.exe []

2009-02-24 c:\windows\Tasks\At64.job
- c:\windows\system32\7f7lMNDh.exe []

2009-02-24 c:\windows\Tasks\At65.job
- c:\windows\system32\7f7lMNDh.exe []

2009-02-24 c:\windows\Tasks\At66.job
- c:\windows\system32\7f7lMNDh.exe []

2009-02-24 c:\windows\Tasks\At67.job
- c:\windows\system32\7f7lMNDh.exe []

2009-02-23 c:\windows\Tasks\At68.job
- c:\windows\system32\7f7lMNDh.exe []

2009-02-23 c:\windows\Tasks\At69.job
- c:\windows\system32\7f7lMNDh.exe []

2009-01-23 c:\windows\Tasks\At7.job
- c:\windows\system32\7f7lMNDh.exe []

2009-02-23 c:\windows\Tasks\At70.job
- c:\windows\system32\7f7lMNDh.exe []

2009-02-23 c:\windows\Tasks\At71.job
- c:\windows\system32\7f7lMNDh.exe []

2009-02-23 c:\windows\Tasks\At72.job
- c:\windows\system32\7f7lMNDh.exe []

2009-01-23 c:\windows\Tasks\At8.job
- c:\windows\system32\7f7lMNDh.exe []

2009-02-19 c:\windows\Tasks\At9.job
- c:\windows\system32\7f7lMNDh.exe []

2009-02-24 c:\windows\Tasks\Google Software Updater.job
- c:\program files\Google\Common\Google Updater\GoogleUpdaterService.exe [2009-02-23 15:32]

2009-02-24 c:\windows\Tasks\Vérifier les mises à jour de Windows Live Toolbar.job
- c:\program files\Windows Live Toolbar\MSNTBUP.EXE [2007-10-19 11:20]
.
- - - - ORPHELINS SUPPRIMES - - - -

HKLM-Run-Á³#  Lh'þ9Óœð3rÅWc:\program files\ISTsvc\istsvc.exe - c:\windows\hxyjlul.exe
ShellExecuteHooks-{8D025D9E-A5AC-49DB-968D-1F2A3C030840} - c:\windows\system32\odgildpe.dll
ShellExecuteHooks-{EB1952AD-75E8-4E4E-B626-2C415DA35709} - c:\windows\system32\ebhpliad.dll
ShellExecuteHooks-{186E0D94-F863-43EF-9B43-38DAC43C064B} - c:\windows\system32\homegdpk.dll
ShellExecuteHooks-{C8C40DDC-9B46-4266-BA0B-5AF248442C3B} - c:\windows\system32\cockgddc.dll
ShellExecuteHooks-{83D7757F-4582-4300-9F03-C3D1A544A9D0} - c:\windows\system32\ojdnnlnf.dll
ShellExecuteHooks-{A6B283F7-EAC4-4110-ACAA-A2D0B85466B7} - c:\windows\system32\ambiojfn.dll
ShellExecuteHooks-{16BC0F81-410C-41DF-A902-1B04368BA8AE} - 16BC0F81.dll
ShellExecuteHooks-{704C3595-DB85-40F6-A601-8D6F346907BD} - 704C3595.dll
SafeBoot-ati4twxx.sys
SafeBoot-ati8quxx.sys


.
------- Examen supplémentaire -------
.
uStart Page = hxxp://luck114.com
uSearchMigratedDefaultURL = hxxp://www.google.com/search?q={searchTerms}&sourceid=ie7&rls=com.microsoft:en-US&ie=utf8&oe=utf8
mStart Page = hxxp://www.google.com
uSearchURL,(Default) = hxxp://g.msn.fr/0SEFRFR/SAOS01?FORM=TOOLBR
IE: &Windows Live Search - c:\program files\Windows Live Toolbar\msntb.dll/search.htm
IE: Add to Windows &Live Favorites - https://onedrive.live.com/?id=favorites
FF - ProfilePath - c:\documents and settings\CKS Andre SNEYAERT\Application Data\Mozilla\Firefox\Profiles\h6n3nsr0.default\
FF - prefs.js: browser.search.defaulturl - hxxp://www.google.com/search?lr=&ie=UTF-8&oe=UTF-8&q=
FF - prefs.js: browser.search.selectedEngine - Google
FF - prefs.js: browser.startup.homepage - hxxp://en-us.start.mozilla.com/firefox?client=firefox-a&rls=org.mozilla:fr:official
.

**************************************************************************

catchme 0.3.1367 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2009-02-24 18:31:49
Windows 5.1.2600 Service Pack 3 NTFS

Recherche de processus cachés ...

Recherche d'éléments en démarrage automatique cachés ...

HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run
user = c:\windows\WinShell..\daemon.exe???????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????

Recherche de fichiers cachés ...


c:\windows\system32\wpcap.dll 240496 bytes executable
c:\windows\system32\Packet.dll 88952 bytes executable
c:\windows\system32\exlds.ini 141 bytes
c:\windows\system32\WanPacket.dll 68480 bytes executable
c:\windows\system32\waubfe.exe 13531 bytes executable

Scan terminé avec succès
Fichiers cachés: 5

**************************************************************************

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"Á³#  L\"h'þ9Óœð3rÅWc:\\Program Files\\ISTsvc\\istsvc.exe"="c:\\WINDOWS\\hxyjlul.exe"
.
------------------------ Autres processus actifs ------------------------
.
c:\windows\system32\FTRTSVC.exe
c:\program files\Java\jre6\bin\jqs.exe
c:\progra~1\Wanadoo\TaskBarIcon.exe
c:\program files\Brother\ControlCenter3\BrccMCtl.exe
c:\progra~1\Wanadoo\EspaceWanadoo.exe
c:\progra~1\Wanadoo\ComComp.exe
c:\progra~1\Wanadoo\Toaster.exe
c:\program files\Windows Media Player\wmpnetwk.exe
c:\progra~1\Wanadoo\Inactivity.exe
c:\progra~1\Wanadoo\PollingModule.exe
c:\program files\Brother\Brmfcmon\BrMfcMon.exe
c:\windows\system32\ALERTM~1\ALERTM~1.EXE
c:\docume~1\CKSAND~1\LOCALS~1\temp\sys2A.tmp
c:\windows\Fonts\TIMPIatform.exe
c:\windows\system32\waubfe.exe
c:\windows\system32\waubfe.exe
.
**************************************************************************
.
Heure de fin: 2009-02-24 18:39:58 - La machine a redémarré
ComboFix-quarantined-files.txt 2009-02-24 17:39:55
ComboFix2.txt 2009-02-24 01:05:33
ComboFix3.txt 2009-02-24 00:24:40

Avant-CF: 154 377 080 832 octets libres
Après-CF: 154,386,890,752 octets libres

682 --- E O F --- 2009-02-11 20:24:11
0
ROSALLY Messages postés 80 Statut Membre
 
la machine a redemarée en mode normal

au lancement de SmitFrandFix, en apuiyant sur 2 + OK Ecran vide, plus aucune icone dessus
comme précedement, après j' y suis allé chercher le rapport sur C\rapport.txt => ci-après........



SmitFraudFix v2.398

Rapport fait à 19:11:41,96, 24/02/2009
Executé à partir de C:\Documents and Settings\CKS Andre SNEYAERT\Bureau\SmitfraudFix
OS: Microsoft Windows XP [version 5.1.2600] - Windows_NT
Le type du système de fichiers est NTFS
Fix executé en mode normal

»»»»»»»»»»»»»»»»»»»»»»»» SharedTaskScheduler Avant SmitFraudFix
!!!Attention, les clés qui suivent ne sont pas forcément infectées!!!

SrchSTS.exe by S!Ri
Search SharedTaskScheduler's .dll

»»»»»»»»»»»»»»»»»»»»»»»» Arret des processus
0
Utilisateur anonyme
 
Le rapport n'est pas complet.

Ouvre rapport.txt

ClickDroit n'importe ou
Dans le menu qui s'ouvre clique sur "Selectionner tout" puis sur "Copier"

Reviens sur le forum et dans le prochain message clikDroit dans la zone de saisie et "Coller"

0
ROSALLY Messages postés 80 Statut Membre
 
bonsoir booddha
je n'ai trouvé que ça le revoila encore une fois
la machine n'a pas pu démarré, peut etre c'est la raison pr ne pas avoir de rapport



SmitFraudFix v2.398

Rapport fait à 19:11:41,96, 24/02/2009
Executé à partir de C:\Documents and Settings\CKS Andre SNEYAERT\Bureau\SmitfraudFix
OS: Microsoft Windows XP [version 5.1.2600] - Windows_NT
Le type du système de fichiers est NTFS
Fix executé en mode normal

»»»»»»»»»»»»»»»»»»»»»»»» SharedTaskScheduler Avant SmitFraudFix
!!!Attention, les clés qui suivent ne sont pas forcément infectées!!!

SrchSTS.exe by S!Ri
Search SharedTaskScheduler's .dll

»»»»»»»»»»»»»»»»»»»»»»»» Arret des processus
0
Utilisateur anonyme
 
Bonjour Lyonnais et encore merci de ton aide.

Rosaly bonjour,

Après avoir chargé Antivir avec le lien donné par Lyonnais, suit ces deux tutoriaux pour l'installer et le paramétrer.

Suivre la procédure jusqu'au bout. En cas de doute demander

Procédure d'installation

Pour les réglages

Lien pour Télécharger ZoneAlarme

Puis suivre le tutorial de Malekal (ne pas utiliser le lien de téléchargement de sa page).

Ensuite fais la procédure ci-dessus donnée par Lyonnais.

Bon courage, on les aura ;-)

(Je ne serais pas là cet après-midi)
0
ROSALLY Messages postés 80 Statut Membre
 
galère.. galère.. galère

hier toute la journée devant le PC
en 1er j'ai téléchargé AVIVA au moment d'executer le programme, il ne donne rien càd il y a pas eu suite de l'instation , portant j'ai repeter la manip une centaine de fois... tjrs rien
l'instalation du pare feu OK pas de probleme
n'yant pas l'anti virus j'ai desactiver juste le pare feu
et j'ai suivie les instructions de Lyonnais92 jusqu'au rapport de ComboFix, j'ai jamais pu l'avoir sur C:\conbofix.txt
il me dit tjrs que Windows ne trouve pas C:\conbofix.txt

j'ai du repeter l'operation, mais à la 2eme tentative, Combofix c'est lancer et au demarage de la machine il n'a pas fini le processus il est rester sur la page qui dis ne toucher a rien jusqu'à ce que combofix fini
mais cette opération n'a aboutie a rien, tjrs le meme message pendant 2h.........jusqu'à ce que je relancer la machine

que faire maintenant
je pense qu'il est preferable de formater............ vous êtes les mieux placer pr savoir ce qu'il faut faire ou ne pas faire.

SOS dans l'attente de vos remarques et propositions.
merci d'avance
0
Utilisateur anonyme
 
Bonjour Rosaly.

Formater est la solution ultime et un constat d'échec que nous n'aimons pas faire.

D'autant plus que certains nuisibles qui circulent aujourd'hui sont vraiment corriaces et certains arrivent à outrepasser le formatage et restent incrustés après celui-ci.

Le principal souci sur ta machine vient du fait que nous n'arrivons pas à la redémarrer en mode sans échec.

Proposition pour Lyonnais, faire un CD de boot en mode sans échec incluant certains fixs dont Combo. Mais je sais pas faire.

Rosaly, prend ton mal en patience on devrait te trouver une solution du moins je l'espère. Lyonnais est un des tout meilleurs de ce site et au-delà. S'il faut formater, c'est lui qui te le dira.

J'avoue humblement que pour l'instant ton problème dépasse mon seuil de compétence. :-(
0
ROSALLY Messages postés 80 Statut Membre
 
bonjour Booddha

je te remercie pour ton soutien et ta franchise
je reste en attente des instructions de Lyonnais

autre chose....... ce matin je n'ai pas réussie à ouvrir Wanadoo, il me dit qu'il faut le réinstalé

je n'ose plus y toucher, heuresement que j'ai un portable, mais pas evident tout mes dossier, mails sont sur le PC principale...

Merci encore une fois à vous tous
0
Lyonnais92 Messages postés 25708 Statut Contributeur sécurité 1 537
 
Bonjour,

pas de craintes pour tes données. On ira les sauvegarder si nécessaire.

Tu as un graveur sur ton portable ?

Réinstalle Wanadoo (je suppose pour rétablir ta connexion Internet).

Ouvre ce lien

http://www.assistepc.com/forum/reparer-le-mode-sans-echec-de-windows-vt867.html

choisis le fichier qui correspond à ton cas et exécute les instructions.

SP2 et SP3 sont identiques.

Réessaye le mode sans échec.(sans acharnement, ça ne marche pas tant pis).

Supprime ta version de Combofix et télécharge la dernière ici :

http://download.bleepingcomputer.com/sUBs/ComboFix.exe

Si cela ne marche pas, télécharge sur le portable et copie sur le fixe (au passage, tu recopies sous Fixfix sur le portable ).

Attention, le rapport s'appelle combofix (avec un m pas un n).

Il faut que tu sauvegardes tes données personnelles. Si j'ai bien compris, il faut que tu cherches tes données de courriels. Quel est ton logiciel de messagerie ? Outlook 2007 ?

Formatter n'est pas l'horreur, avec les infections actuelles, on aura de plus en plus pas d'autre solution.

Le tout est de bien préparer la maeuvre.

je suis chez moi samedi soir. a partir de Dimanche, ça me sera plus facile de te porter aide.



0
ROSALLY Messages postés 80 Statut Membre
 
bonjour Lyonnais

je te remercie pour les instructions

je fais le necessaire et je te tiens au courant

merci d'avance
0
Lyonnais92 Messages postés 25708 Statut Contributeur sécurité 1 537
 
Bonjour,

j'espère pouvoir passer cet AM voir si tu as pu avancer.
0
ROSALLY Messages postés 80 Statut Membre
 
Re bonjour lyonnais92
en voici le Rapport de ComboFix fraichement réinstallé
après plusieures tentatives même en désactivant Zone alarm, au redemarage de la machine ComboFix ne pouvez pas continuer le scan, en le désinstalant j'ai réussie....... super

Pour Outlouk, franchement je ne esais pas exactement quelle version, mais tjrs est il, il marché aujourd'hui !!!! va s'avoir prkoi.......

dois-je reprendre les instructions de ton message n° 87

Je me dépêche de réinstaller Zonealarm

merci à toi




ComboFix 09-02-26.02 - CKS Andre SNEYAERT 2009-02-27 15:23:38.9 - NTFSx86
Microsoft Windows XP Édition familiale 5.1.2600.3.1252.1.1036.18.894.425 [GMT 1:00]
Lancé depuis: c:\documents and settings\CKS Andre SNEYAERT\Bureau\Fixfix.exe
* Un nouveau point de restauration a été créé
.

(((((((((((((((((((((((((((((((((((( Autres suppressions ))))))))))))))))))))))))))))))))))))))))))))))))
.
.
---- Exécution préalable -------
.
c:\docume~1\CKSAND~1\LOCALS~1\Temp\502514
c:\docume~1\CKSAND~1\LOCALS~1\temp\sys2A.tmp
C:\FINE CRUSH LTD.doc
c:\progra~1\SECURI~1\174112\Program\SERVIC~1.EXE
c:\program files\bccd.pif
c:\program files\cacmchc
c:\program files\Fichiers communs\PushWare
c:\program files\Fichiers communs\PushWare\cpush.dll
c:\program files\Fichiers communs\PushWare\cpush0.dll
c:\program files\Fichiers communs\PushWare\Uninst.exe
c:\program files\Fichiers communs\qybabiqylo.dl
c:\program files\Fichiers communs\vexomigaga._sy
c:\program files\Fichiers communs\vodeqet.ban
c:\program files\Internet Explorer\IETimber\IETimber.dll
c:\program files\internet explorer\plugins\icwres.dll
c:\program files\Internet Explorer\PowerJo.ase
c:\program files\Internet Explorer\PowerJv.ask
c:\program files\MediaChannel\Navvy 5.2\NavvyUp.exe
c:\windows\Downloaded Program Files\explorer.exe
c:\windows\fonts\alsk.sys
c:\windows\fonts\naks.sys
c:\windows\Fonts\TIMPIatform.exe
c:\windows\Fonts\wuauclt.exe
c:\windows\Intel\baiduc.dll
c:\windows\KB611311.log
c:\windows\smss.exe
c:\windows\spoolsv.exe
c:\windows\sys.ini
c:\windows\sysinfo.tmp
c:\windows\system\rund1132.exe
c:\windows\system32\16AF66EB.cfg
c:\windows\system32\16AF66EB.dll
c:\windows\system32\16BC0F81.cfg
c:\windows\system32\16BC0F81.dll
c:\windows\system32\1957817A.cfg
c:\windows\system32\1957817A.dll
c:\windows\system32\198FF3D8.cfg
c:\windows\system32\198FF3D8.dll
c:\windows\system32\404Fix.exe
c:\windows\system32\4FBFD5A4.cfg
c:\windows\system32\4FBFD5A4.dll
c:\windows\system32\704C3595.cfg
c:\windows\system32\704C3595.dll
c:\windows\system32\7f7lMNDh.exe
c:\windows\system32\A1A6BC2E.cfg
c:\windows\system32\A1A6BC2E.dll
c:\windows\system32\Agent.OMZ.Fix.exe
c:\windows\system32\akolkhck.dll
c:\windows\system32\aldoiilk.dll
c:\windows\system32\ali125a3.dll
c:\windows\system32\ali13ac2.dll
c:\windows\system32\ali13c19.dll
c:\windows\system32\ali13d52.dll
c:\windows\system32\ali142ff.dll
c:\windows\system32\ali14948.dll
c:\windows\system32\ali709f0.dll
c:\windows\system32\alia056e.dll
c:\windows\system32\alic236.dll
c:\windows\system32\alicfd3.dll
c:\windows\system32\alid09e.dll
c:\windows\system32\alide2b.dll
c:\windows\system32\alief22.dll
c:\windows\system32\alimoto32.exe
c:\windows\system32\ambiojfn.dll
c:\windows\system32\aoalmieo.dll
c:\windows\system32\asdfasdf
c:\windows\system32\B4eocaps.SRG
c:\windows\system32\cbndboek.dll
c:\windows\system32\ccbficfi.dll
c:\windows\system32\cciieood.dll
c:\windows\system32\cdcgebkf.dll
c:\windows\system32\cockgddc.dll
c:\windows\system32\cpnbliif.dll
c:\windows\system32\dafln.dll
c:\windows\system32\dbfkipbd.dll
c:\windows\system32\dfln.dll
c:\windows\system32\dllcache\spoolsv.exe
c:\windows\system32\dpbfhnfj.dll
c:\windows\system32\drivers\52438666.txt
c:\windows\system32\drivers\acpidisk.sys
c:\windows\system32\drivers\ati4twxx.sys
c:\windows\system32\drivers\ati8quxx.sys
c:\windows\system32\drivers\ethcjxre.sys
c:\windows\system32\drivers\npf.sys
c:\windows\system32\drivers\pnpmem.sys
c:\windows\system32\drivers\winyyy.sy­s
c:\windows\system32\drivers\winyyy.sys
c:\windows\system32\dumphive.exe
c:\windows\system32\ebhpliad.dll
c:\windows\system32\eojpchpn.dll
c:\windows\system32\exlds.ini
c:\windows\system32\F65BDEC7.cfg
c:\windows\system32\F65BDEC7.dll
c:\windows\system32\fasadf.dll
c:\windows\system32\feeckhoj.dll
c:\windows\system32\flzaitian.dll
c:\windows\system32\gajdpnec.dll
c:\windows\system32\gjdochbi.dll
c:\windows\system32\gprmsgse.axz
c:\windows\system32\gscpx32r.det
c:\windows\system32\heifeado.dll
c:\windows\system32\homegdpk.dll
c:\windows\system32\IEDFix.C.exe
c:\windows\system32\IEDFix.exe
c:\windows\system32\ikdapmcm.dll
c:\windows\system32\ipppkhkc.dll
c:\windows\system32\kdexe.exe
c:\windows\system32\kdkdfeln.dll
c:\windows\system32\keepSafe.exe
c:\windows\system32\kffoogac.dll
c:\windows\system32\lkknkgnk.dll
c:\windows\system32\mppblchp.dll
c:\windows\system32\mprmsgse.axz
c:\windows\system32\mscpx32r.det
c:\windows\system32\msexe.exe
c:\windows\system32\MSPolicyAgent.dll
c:\windows\system32\ndaelgfl.dll
c:\windows\system32\nfbdadcc.dll
c:\windows\system32\npptools.dll
c:\windows\system32\o4Patch.exe
c:\windows\system32\odgildpe.dll
c:\windows\system32\ogcmfdaf.dll
c:\windows\system32\ojdnnlnf.dll
c:\windows\system32\ooaddion.dll
c:\windows\system32\oojlpcib.dll
c:\windows\system32\ormsgse.axz
c:\windows\system32\Packet.dll
c:\windows\system32\pahklhok.dll
c:\windows\system32\pfpjhepc.dll
c:\windows\system32\piakdpih.dll
c:\windows\system32\Process.exe
c:\windows\system32\RamrtwC.dll
c:\windows\system32\registryboosterppcg15.exe
c:\windows\system32\romarshal.dat
c:\windows\system32\somspring.dat
c:\windows\system32\SrchSTS.exe
c:\windows\system32\types.tmp
c:\windows\system32\VACFix.exe
c:\windows\system32\VCCLSID.exe
c:\windows\system32\WanPacket.dll
c:\windows\system32\wauafe.exe
c:\windows\system32\waubfe.exe
c:\windows\system32\waukafe.exe
c:\windows\system32\waulafe.exe
c:\windows\system32\waumafe.exe
c:\windows\system32\waunafe.exe
c:\windows\system32\wpcap.dll
c:\windows\system32\WS2Fix.exe
c:\windows\system32\zxexe.exe
c:\windows\Tasks\At1.job
c:\windows\Tasks\At10.job
c:\windows\Tasks\At11.job
c:\windows\Tasks\At12.job
c:\windows\Tasks\At13.job
c:\windows\Tasks\At14.job
c:\windows\Tasks\At15.job
c:\windows\Tasks\At16.job
c:\windows\Tasks\At17.job
c:\windows\Tasks\At18.job
c:\windows\Tasks\At19.job
c:\windows\Tasks\At2.job
c:\windows\Tasks\At20.job
c:\windows\Tasks\At21.job
c:\windows\Tasks\At22.job
c:\windows\Tasks\At23.job
c:\windows\Tasks\At24.job
c:\windows\Tasks\At25.job
c:\windows\Tasks\At26.job
c:\windows\Tasks\At27.job
c:\windows\Tasks\At28.job
c:\windows\Tasks\At29.job
c:\windows\Tasks\At3.job
c:\windows\Tasks\At30.job
c:\windows\Tasks\At31.job
c:\windows\Tasks\At32.job
c:\windows\Tasks\At33.job
c:\windows\Tasks\At34.job
c:\windows\Tasks\At35.job
c:\windows\Tasks\At36.job
c:\windows\Tasks\At37.job
c:\windows\Tasks\At38.job
c:\windows\Tasks\At39.job
c:\windows\Tasks\At4.job
c:\windows\Tasks\At40.job
c:\windows\Tasks\At41.job
c:\windows\Tasks\At42.job
c:\windows\Tasks\At43.job
c:\windows\Tasks\At44.job
c:\windows\Tasks\At45.job
c:\windows\Tasks\At46.job
c:\windows\Tasks\At47.job
c:\windows\Tasks\At48.job
c:\windows\Tasks\At49.job
c:\windows\Tasks\At5.job
c:\windows\Tasks\At50.job
c:\windows\Tasks\At51.job
c:\windows\Tasks\At52.job
c:\windows\Tasks\At53.job
c:\windows\Tasks\At54.job
c:\windows\Tasks\At55.job
c:\windows\Tasks\At56.job
c:\windows\Tasks\At57.job
c:\windows\Tasks\At58.job
c:\windows\Tasks\At59.job
c:\windows\Tasks\At6.job
c:\windows\Tasks\At60.job
c:\windows\Tasks\At61.job
c:\windows\Tasks\At62.job
c:\windows\Tasks\At63.job
c:\windows\Tasks\At64.job
c:\windows\Tasks\At65.job
c:\windows\Tasks\At66.job
c:\windows\Tasks\At67.job
c:\windows\Tasks\At68.job
c:\windows\Tasks\At69.job
c:\windows\Tasks\At7.job
c:\windows\Tasks\At70.job
c:\windows\Tasks\At71.job
c:\windows\Tasks\At72.job
c:\windows\Tasks\At8.job
c:\windows\Tasks\At9.job
c:\windows\Temp\20090122.exe
c:\windows\Temp\Perflib_Perfdata_b4.dat
c:\windows\tmp.dat
c:\windows\WinShell.\daemon.exe
c:\windows\winsscoo.exe
c:\windows\winsys.exe
C:\WINDOWSupdate.dll

.
((((((((((((((((((((((((((((((((((((((( Pilotes/Services )))))))))))))))))))))))))))))))))))))))))))))))))
.

-------\Legacy_ACPIDISK
-------\Legacy_NPF
-------\Legacy_ZG
-------\Service_acpidisk
-------\Service_aliimz
-------\Service_npf
-------\Legacy_ACPIDISK
-------\Legacy_NPF
-------\Legacy_PNPMEM
-------\Legacy_WINSSCOM
-------\Legacy_ZG
-------\Service_acpidisk
-------\Service_aliimz
-------\Service_npf
-------\Service_pnpmem
-------\Service_WinSSCOM
-------\Legacy_ACPIDISK
-------\Legacy_NPF
-------\Legacy_PNPMEM
-------\Legacy_WINSSCOM
-------\Service_acpidisk
-------\Service_aliimz
-------\Service_npf
-------\Service_pnpmem
-------\Service_WinSSCOM
-------\Legacy_ACPIDISK
-------\Legacy_NPF
-------\Legacy_PNPMEM
-------\Legacy_WINSSCOM
-------\Legacy_ZG
-------\Service_aliimz
-------\Service_npf
-------\Service_pnpmem
-------\Service_WinSSCOM


((((((((((((((((((((((((((((( Fichiers créés du 2009-01-27 au 2009-02-27 ))))))))))))))))))))))))))))))))))))
.

2009-02-26 18:41 . 2009-02-26 18:41 21,248 --a------ c:\windows\winyyy.sys
2009-02-26 12:08 . 2009-02-26 16:38 249,344 --a------ c:\windows\smss.exe.vzr
2009-02-26 11:43 . 2009-02-26 11:43 40 --a------ c:\windows\tmp.dat
2009-02-26 11:43 . 2009-02-26 11:43 37 --a------ c:\windows\sys.ini
2009-02-25 23:29 . 2009-02-27 15:01 1,113 --a------ C:\rollback.ini
2009-02-25 20:49 . 2009-02-04 07:59 122,372 --a------ c:\windows\system32\drivers\pnpmem.sys
2009-02-25 20:49 . 2009-02-25 20:49 32 --a------ c:\windows\system32\ormsgse.axz
2009-02-25 20:26 . 2009-02-25 20:26 <REP> d-------- c:\program files\SonicWallES
2009-02-25 20:10 . 2009-02-25 20:10 133,120 --a------ c:\windows\winsscoo.exe.vzr
2009-02-25 20:08 . 2009-02-26 19:06 13,976 --a------ c:\windows\system32\1957817A.dll.vzr
2009-02-25 20:08 . 2009-02-25 20:08 300 --ahs---- c:\windows\system32\1957817A.cfg
2009-02-25 20:07 . 2009-02-25 20:07 14,962 --a------ c:\windows\system32\704C3595.dll.vzr
2009-02-25 20:07 . 2009-02-25 20:07 224 --ahs---- c:\windows\system32\704C3595.cfg
2009-02-25 20:06 . 2009-02-25 20:06 219,272 --a------ c:\windows\system32\4FBFD5A4.dll.vzr
2009-02-25 20:05 . 2009-02-25 20:05 14,460 --a------ c:\windows\system32\16BC0F81.dll.vzr
2009-02-25 20:05 . 2009-02-25 20:05 244 --ahs---- c:\windows\system32\16BC0F81.cfg
2009-02-25 20:02 . 2009-02-25 20:02 218,746 --a------ c:\windows\system32\16AF66EB.dll.vzr
2009-02-25 20:02 . 2009-02-25 20:02 13,462 --a------ c:\windows\system32\F65BDEC7.dll.vzr
2009-02-25 20:00 . 2009-02-25 20:00 16,632 --a------ c:\windows\system32\msexe.exe
2009-02-25 20:00 . 2009-02-26 11:27 1,249 --a------ c:\windows\system32\asdfasdf
2009-02-25 19:19 . 2009-02-26 00:38 141 --a------ c:\windows\system32\exlds.ini
2009-02-25 19:09 . 2009-02-25 19:26 <REP> d-------- C:\Combo-Fix
2009-02-25 18:43 . 2009-02-25 18:43 89,726 --a------ c:\windows\guid.exe
2009-02-25 17:25 . 2009-02-25 17:25 13,926 --ahs---- c:\windows\system32\72B29486.dll
2009-02-25 17:25 . 2009-02-25 17:25 200 --ahs---- c:\windows\system32\72B29486.cfg
2009-02-25 14:04 . 2009-02-27 15:26 35,022,944 --ahs---- c:\windows\system32\drivers\fidbox.dat
2009-02-25 14:04 . 2009-02-26 23:04 433,508 --ahs---- c:\windows\system32\drivers\fidbox.idx
2009-02-25 13:58 . 2009-02-27 15:19 <REP> d-------- c:\windows\system32\ZoneLabs
2009-02-25 13:58 . 2009-02-25 13:58 <REP> d-------- c:\program files\Zone Labs
2009-02-25 13:58 . 2009-02-25 14:01 4,212 --ah----- c:\windows\system32\zllictbl.dat
2009-02-25 13:56 . 2009-02-27 15:19 <REP> d-------- c:\windows\Internet Logs
2009-02-24 19:17 . 2009-02-26 19:06 2,681 --a------ c:\windows\winsys.inf
2009-02-24 18:55 . 2009-02-24 18:55 1,811 --a------ c:\windows\ACROREAD.INI
2009-02-23 16:50 . 2004-08-05 13:00 4,224 --a------ c:\windows\system32\drivers\beep.sys
2009-02-23 16:50 . 2004-08-05 13:00 4,224 --a--c--- c:\windows\system32\dllcache\beep.sys
2009-02-21 00:01 . 2009-02-11 10:19 15,504 --a------ c:\windows\system32\drivers\mbam.sys
2009-02-21 00:00 . 2009-02-21 00:01 <REP> d-------- c:\program files\Malwarebytes' Anti-Malware
2009-02-21 00:00 . 2009-02-11 10:19 38,496 --a------ c:\windows\system32\drivers\mbamswissarmy.sys
2009-02-20 23:13 . 2009-02-20 23:13 396,288 --a------ c:\windows\HijackThis.exe
2009-02-20 22:23 . 2009-02-20 23:00 <REP> d-------- C:\ToolBar SD
2009-02-20 21:43 . 2009-02-20 21:43 16,656 --a------ C:\mbam-log-2009-02-20 (21-42-58)VIRUS
2009-02-20 19:50 . 2009-02-20 19:50 15,069 --a------ c:\windows\system32\telechargement-159-hijackthis.htm
2009-02-20 19:04 . 2009-02-20 19:04 <REP> d-------- c:\program files\MediaChannel
2009-02-20 16:08 . 2009-02-20 16:08 <REP> d-------- c:\documents and settings\CKS Andre SNEYAERT\Application Data\Malwarebytes
2009-02-20 16:08 . 2009-02-20 16:08 <REP> d-------- c:\documents and settings\All Users\Application Data\Malwarebytes
2009-02-20 13:11 . 2003-03-18 21:20 1,060,864 --a------ c:\windows\system32\mfc71.dll
2009-02-20 13:01 . 2009-02-20 13:01 520,052 --a------ c:\windows\system32\mfc71.7z
2009-02-20 12:55 . 2009-02-20 13:00 <REP> d-------- c:\windows\system32\mfc71
2009-02-20 12:01 . 2009-02-20 12:02 514,940 -rah----- c:\windows\system32\mfc71.zip
2009-02-20 11:31 . 2009-02-20 11:31 <REP> d-------- c:\documents and settings\CKS Andre SNEYAERT\Application Data\Uniblue
2009-02-19 18:50 . <REP> c:\windows\$WIND$
2009-02-19 18:45 . 2009-02-20 22:16 <REP> d-------- c:\program files\Goto Software
2009-02-19 18:45 . 2009-02-20 22:16 <REP> d-------- c:\program files\Fichiers communs\Goto Software
2009-02-19 18:45 . 2009-02-19 18:45 <REP> d-------- c:\documents and settings\CKS Andre SNEYAERT\Application Data\VadeRetro
2009-02-19 18:45 . 2009-02-20 22:16 <REP> d-------- c:\documents and settings\All Users\Application Data\VadeRetro
2009-02-19 16:43 . <REP> c:\windows\WinShell
2009-02-18 19:42 . 2009-02-18 19:42 31,232 --a------ C:\Relevé de compte LAW YAT au 31.12.2008.doc
2009-02-17 14:47 . 2009-02-26 22:29 <REP> d-------- c:\windows\Intel
2009-02-17 14:45 . 2008-04-14 03:33 19,968 --a--c--- c:\windows\system32\dllcache\linkinfo.dll
2009-02-16 07:42 . 2009-02-16 07:42 69,888 --a------ c:\windows\battc.sys
2009-02-07 23:10 . 2009-02-07 23:10 170,496 --a------ C:\FINE CRUSH LTD.doc
2009-02-02 21:59 . 2009-02-02 21:59 66,048 --a------ C:\Proposition APOLLO pour Ile MAURICE.doc
2009-02-02 17:57 . 2009-02-02 17:57 48,640 --a------ C:\Clients Ile MAURICE.doc
2009-02-02 12:23 . 2009-02-05 11:49 25,088 --a------ C:\A T T E S T A T I O N Impotsssssssssss.doc
2009-02-02 10:47 . 2009-02-02 10:47 30,720 --a------ C:\A T T E S T A T I O N - I m p o t s.doc
2009-01-31 13:51 . 2009-01-31 20:37 26,624 --a------ C:\Demande prolongation stage.doc
2009-01-27 10:10 . 2009-01-27 11:00 32,256 --a------ C:\Courrier André SNEYAERT.doc

.
(((((((((((((((((((((((((((((((((( Compte-rendu de Find3M ))))))))))))))))))))))))))))))))))))))))))))))))
.
2009-02-27 14:13 --------- d-----w c:\program files\Wanadoo
2009-02-26 22:06 --------- d-----w c:\documents and settings\CKS Andre SNEYAERT\Application Data\Skype
2009-02-26 18:36 --------- d-----w c:\documents and settings\All Users\Application Data\Google Updater
2009-02-26 10:44 --------- d-----w c:\program files\FenAffiche
2009-02-25 17:50 --------- d-----w c:\program files\Common
2009-02-25 17:40 24,576 ----a-w c:\windows\TEMPIadHide3.dll
2009-02-25 17:06 49,152 ----a-w c:\windows\system32\npptools.dll.tmp
2009-02-23 22:43 431,922 ----a-w c:\program files\HJTInstall.7z
2009-02-18 18:10 --------- d-----w c:\program files\Google
2009-01-23 20:21 --------- d-----w c:\documents and settings\All Users\Application Data\288537758
2009-01-21 19:07 --------- d-----w c:\program files\EnveloppesEditor1.09
2009-01-21 16:56 --------- d-----w c:\documents and settings\CKS Andre SNEYAERT\Application Data\PC-FAX TX
2009-01-17 14:02 14,336 ----a-w c:\windows\system32\svchost.exe
2009-01-16 17:15 137,664 ----a-w c:\windows\system32\zdcndis5.sys
2009-01-16 17:15 137,664 ----a-w c:\windows\system32\pcandis5.sys
2009-01-16 17:15 137,664 ----a-w c:\windows\system32\drivers\adiusbaw.sys
2008-12-20 22:47 826,368 ----a-w c:\windows\system32\wininet.dll
2008-12-20 10:50 410,984 ----a-w c:\windows\system32\deploytk.dll
2008-09-22 09:52 85,504 ----a-w c:\documents and settings\CKS Andre SNEYAERT\Application Data\GDIPFONTCACHEV1.DAT
2008-09-04 14:43 1,940 ----a-w c:\documents and settings\CKS Andre SNEYAERT\Application Data\ViewerApp.dat
2008-09-27 10:02 122,880 ----a-w c:\program files\mozilla firefox\components\GoogleDesktopMozilla.dll
.

((((((((((((((((((((((((((((( SnapShot_2009-02-26_23.16.44.98 )))))))))))))))))))))))))))))))))))))))))
.
+ 2009-02-27 07:48:31 16,384 ----atw c:\windows\Temp\Perflib_Perfdata_204.dat
.
-- Instantané actualisé --
.
((((((((((((((((((((((((((((((((( Points de chargement Reg ))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* les éléments vides & les éléments initiaux légitimes ne sont pas listés
REGEDIT4

[HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{912F6837-CCB6-424B-BC9C-8BB5541AFB54}]
c:\program files\Internet Explorer\PowerJv.ask [BU]

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"CTFMON.EXE"="c:\windows\system32\ctfmon.exe" [2008-04-14 15360]
"WOOKIT"="c:\progra~1\Wanadoo\Shell.exe" [2004-08-23 122880]
"Livecom"="c:\progra~1\Livecom\APPLIC~1\CommunicationAgent\CommunicationAgent.exe" [2006-02-23 237568]
"Skype"="c:\program files\Skype\Phone\Skype.exe" [2007-02-09 25388584]
"swg"="c:\program files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe" [2007-07-01 68856]
"MoneyAgent"="c:\program files\Microsoft Money\System\mnyexpr.exe" [2002-07-17 204863]
"WMPNSCFG"="c:\program files\Windows Media Player\WMPNSCFG.exe" [2006-11-03 204288]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"fenaffiche"="c:\program files\FenAffiche\FenUnika.exe" [BU]
"NeroFilterCheck"="c:\windows\system32\NeroCheck.exe" [2001-07-09 155648]
"Microsoft Works Update Detection"="c:\program files\Fichiers communs\Microsoft Shared\Works Shared\WkUFind.exe" [2002-07-18 28672]
"WOOWATCH"="c:\progra~1\Wanadoo\Watch.exe" [2004-08-23 20480]
"WOOTASKBARICON"="c:\progra~1\Wanadoo\GestMaj.exe" [2004-10-14 32768]
"SunJavaUpdateSched"="c:\program files\Java\jre6\bin\jusched.exe" [2008-12-20 136600]
"Creative WebCam Tray"="c:\program files\Creative\Shared Files\CAMTRAY.EXE" [2003-10-13 184320]
"Google Desktop Search"="c:\program files\Google\Google Desktop Search\GoogleDesktop.exe" [2008-09-27 29744]
"QuickTime Task"="c:\program files\QuickTime\qttask.exe" [2006-09-01 282624]
"Adobe Reader Speed Launcher"="c:\program files\Adobe\Reader 8.0\Reader\Reader_sl.exe" [2007-10-10 39792]
"SSBkgdUpdate"="c:\program files\Fichiers communs\Scansoft Shared\SSBkgdUpdate\SSBkgdupdate.exe" [2006-10-25 210472]
"PaperPort PTD"="c:\program files\ScanSoft\PaperPort\pptd40nt.exe" [2007-01-29 30248]
"IndexSearch"="c:\program files\ScanSoft\PaperPort\IndexSearch.exe" [2007-01-29 46632]
"PPort11reminder"="c:\program files\ScanSoft\PaperPort\Ereg\Ereg.exe" [2007-02-01 255528]
"BrMfcWnd"="c:\program files\Brother\Brmfcmon\BrMfcWnd.exe" [2007-03-23 663552]
"ControlCenter3"="c:\program files\Brother\ControlCenter3\brctrcen.exe" [2007-01-26 65536]
"msexe.exe"="c:\windows\system32\msexe.exe" [2009-02-25 16632]
"zxexe.exe"="c:\windows\system32\zxexe.exe" [BU]
"SiSPower"="SiSPower.dll" [2005-04-12 c:\windows\system32\SiSPower.dll]
"SoundMan"="SOUNDMAN.EXE" [2005-03-24 c:\windows\SOUNDMAN.EXE]

[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run]
"CTFMON.EXE"="c:\windows\system32\ctfmon.exe" [2008-04-14 15360]
"Picasa Media Detector"="c:\program files\Picasa2\PicasaMediaDetector.exe" [2008-08-21 443968]
"msnmsgr"="c:\program files\Windows Live\Messenger\msnmsgr.exe" [2007-10-18 5724184]

[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\RunOnce]
"FlashPlayerUpdate"="c:\windows\system32\Macromed\Flash\FlashUtil9d.exe" [2007-06-11 190696]

[HKEY_LOCAL_MACHINE\software\microsoft\windows\Currentversion\policies\explorer\Run]
"stup"="c:\docume~1\CKSAND~1\LOCALS~1\Temp\3010780" [X]
"user"="c:\windows\WinShell..\daemon.exe" [BU]
"360safe"="c:\windows\Fonts\wuauclt.exe" [BU]

c:\documents and settings\CKS Andre SNEYAERT\Menu D‚marrer\Programmes\D‚marrage\
Outil de d‚tection de support Picture Motion Browser.lnk - c:\program files\Sony\Sony Picture Utility\PMBCore\SPUVolumeWatcher.exe [2008-07-19 385024]

c:\documents and settings\All Users\Menu D‚marrer\Programmes\D‚marrage\
Microsoft Office.lnk - c:\program files\Microsoft Office\Office10\OSA.EXE [2001-02-13 83360]
Picture Package Menu.lnk - c:\program files\Sony Corporation\Picture Package\Picture Package Menu\SonyTray.exe [2006-04-28 151552]
Picture Package VCD Maker.lnk - c:\program files\Sony Corporation\Picture Package\Picture Package Applications\Residence.exe [2006-04-28 106496]
Utilitaire r‚seau pour SAGEM Wi-Fi 11g USB adapter.lnk - c:\program files\SAGEM Wi-Fi USB 802.11g\WLANUTL.exe [2007-04-20 835584]

[HKEY_CURRENT_USER\software\microsoft\windows\currentversion\policies\explorer]
"ForceClassicControlPanel"= 1 (0x1)

[hkey_local_machine\software\microsoft\windows\currentversion\explorer\ShellExecuteHooks]
"{8D025D9E-A5AC-49DB-968D-1F2A3C030840}"= "c:\windows\system32\odgildpe.dll" [BU]
"{EB1952AD-75E8-4E4E-B626-2C415DA35709}"= "c:\windows\system32\ebhpliad.dll" [BU]
"{186E0D94-F863-43EF-9B43-38DAC43C064B}"= "c:\windows\system32\homegdpk.dll" [BU]
"{C8C40DDC-9B46-4266-BA0B-5AF248442C3B}"= "c:\windows\system32\cockgddc.dll" [BU]
"{83D7757F-4582-4300-9F03-C3D1A544A9D0}"= "c:\windows\system32\ojdnnlnf.dll" [BU]
"{A6B283F7-EAC4-4110-ACAA-A2D0B85466B7}"= "c:\windows\system32\ambiojfn.dll" [BU]
"{16BC0F81-410C-41DF-A902-1B04368BA8AE}"= "16BC0F81.dll" [BU]
"{704C3595-DB85-40F6-A601-8D6F346907BD}"= "704C3595.dll" [BU]
"{72B29486-39B6-4241-B234-B57DEF78302F}"= "72B29486.dll" [BU]
"{1957817A-94B2-4CAC-B113-A331809B5730}"= "1957817A.dll" [BU]
"{B3DDF3DF-0A05-4BE9-B37D-7021BD501C7A}"= "c:\windows\system32\bjddfjdf.dll" [BU]
"{A9386267-1CF0-48EC-9DBA-412A44C76334}"= "c:\windows\system32\apjomimn.dll" [BU]
"{9B8978FE-5B0E-476D-8F15-3FB5119A42F3}"= "c:\windows\system32\pbopnofe.dll" [BU]
"{FE494031-756B-4865-99B4-4DE92DDCF609}"= "c:\windows\system32\fekpkgjh.dll" [BU]
"{46184B86-19FF-4A37-9167-4C538027CEBC}"= "c:\windows\system32\kmhokbom.dll" [BU]
"{AC9A4670-B0B6-4EC7-B6A5-B29FA3530420}"= "c:\windows\system32\acpakmng.dll" [BU]
"{9B3DC09A-2613-4613-96F8-F8E305BFF825}"= "c:\windows\system32\pbjdcgpa.dll" [BU]
"{C13945CA-D00B-4474-B105-3838809607EA}"= "c:\windows\system32\chjpklca.dll" [BU]
"{1BFB618F-82C7-45DE-A0B9-F76FACE92F32}"= "c:\windows\system32\hbfbmhof.dll" [2008-08-14 32256]
"{22EC45F3-1651-409E-8273-6D80E39B4549}"= "c:\windows\system32\iiecklfj.dll" [BU]
"{391597A0-67FF-4D4F-9AFF-8471E5D0D3C9}"= "c:\windows\system32\jphlpnag.dll" [BU]
"{BA9620A6-68E8-492D-9B28-7B7416F69673}"= "c:\windows\system32\bapmigam.dll" [BU]
"{04D3233B-EC1F-44B3-BBE4-9D76438EEC1E}"= "c:\windows\system32\gkdjijjb.dll" [BU]
"{51E74159-54A6-4355-A78F-55998328FC07}"= "c:\windows\system32\lhenkhlp.dll" [BU]
"{912F6837-CCB6-424B-BC9C-8BB5541AFB54}"= "c:\program files\Internet Explorer\PowerJv.ask" [BU]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad]
"B3DDF3DF"= {B3DDF3DF-0A05-4BE9-B37D-7021BD501C7A} - c:\windows\system32\bjddfjdf.dll [BU]
"A9386267"= {A9386267-1CF0-48EC-9DBA-412A44C76334} - c:\windows\system32\apjomimn.dll [BU]
"9B8978FE"= {9B8978FE-5B0E-476D-8F15-3FB5119A42F3} - c:\windows\system32\pbopnofe.dll [BU]
"FE494031"= {FE494031-756B-4865-99B4-4DE92DDCF609} - c:\windows\system32\fekpkgjh.dll [BU]
"46184B86"= {46184B86-19FF-4A37-9167-4C538027CEBC} - c:\windows\system32\kmhokbom.dll [BU]
"AC9A4670"= {AC9A4670-B0B6-4EC7-B6A5-B29FA3530420} - c:\windows\system32\acpakmng.dll [BU]
"9B3DC09A"= {9B3DC09A-2613-4613-96F8-F8E305BFF825} - c:\windows\system32\pbjdcgpa.dll [BU]
"C13945CA"= {C13945CA-D00B-4474-B105-3838809607EA} - c:\windows\system32\chjpklca.dll [BU]
"1BFB618F"= {1BFB618F-82C7-45DE-A0B9-F76FACE92F32} - c:\windows\system32\hbfbmhof.dll [2008-08-14 32256]
"22EC45F3"= {22EC45F3-1651-409E-8273-6D80E39B4549} - c:\windows\system32\iiecklfj.dll [BU]
"391597A0"= {391597A0-67FF-4D4F-9AFF-8471E5D0D3C9} - c:\windows\system32\jphlpnag.dll [BU]
"BA9620A6"= {BA9620A6-68E8-492D-9B28-7B7416F69673} - c:\windows\system32\bapmigam.dll [BU]
"04D3233B"= {04D3233B-EC1F-44B3-BBE4-9D76438EEC1E} - c:\windows\system32\gkdjijjb.dll [BU]
"51E74159"= {51E74159-54A6-4355-A78F-55998328FC07} - c:\windows\system32\lhenkhlp.dll [BU]

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\windows]
"AppInit_DLLs"=hbfbmhof.dll

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\360rpt.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\360safe.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\360safebox.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\360tray.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\a.exe]
"Debugger"=c:\windows\system32\keepSafe.exe

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\ANTIARP.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\ArSwp.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\Ast.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\AutoRun.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\AutoRunKiller.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\AvMonitor.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\AVP.COM]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\AVP.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\CCenter.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\Frameworkservice.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\GFUpd.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\GuardField.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\HijackThis.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\IceSword.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\Iparmor.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\KASARP.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\kav32.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\KAVPFW.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\kavstart.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\kissvc.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\kmailmon.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\KPfwSvc.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\KRegEx.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\KVMonxp.KXP]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\KVSrvXP.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\KVWSC.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\kwatch.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\Mmsk.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\Navapsvc.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\nod32krn.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\Nod32kui.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\PFW.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\QQDoctor.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\RAV.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\RavMon.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\RavMonD.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\Ravservice.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\RavStub.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\RavTask.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\RAVTRAY.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\Regedit.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\rfwmain.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\rfwProxy.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\rfwsrv.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\Rfwstub.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\RsAgent.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\Rsaupd.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\RsMain.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\rsnetsvr.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\RSTray.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\Runiep.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\safeboxTray.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\ScanFrm.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\SREngLdr.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\TrojanDetector.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\Trojanwall.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\TrojDie.KXP]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\VPC32.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\VPTRAY.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\WOPTILITIES.EXE]
"debugger"=c:\windows\system32\dllcache\spoolsv.exe

[HKEY_LOCAL_MACHINE\software\microsoft\security center]
"AntiVirusDisableNotify"=dword:00000001
"UpdatesDisableNotify"=dword:00000001

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%windir%\\system32\\sessmgr.exe"=
"c:\\Program Files\\Messenger\\msmsgs.exe"=
"c:\\Program Files\\eMule\\emule.exe"=
"c:\\Program Files\\Livecom\\Application\\eConfv4\\livecomp.exe"=
"c:\\PROGRA~1\\Livecom\\APPLIC~1\\Exe\\Livecom.exe"=
"%windir%\\Network Diagnostic\\xpnetdiag.exe"=
"c:\\Program Files\\Windows Live\\Messenger\\msnmsgr.exe"=
"c:\\Program Files\\Windows Live\\Messenger\\livecall.exe"=
"c:\\Program Files\\Skype\\Phone\\Skype.exe"=
"c:\\Program Files\\Shareaza\\Shareaza.exe"=

R0 rnieys;rnieys;c:\windows\system32\drivers\jme.sys [2005-08-08 30368]
S2 MSPolicyAgent;Microsoft IPsec Policy Agent;c:\windows\System32\svchost.exe -k MSPolicyAgent [2008-04-14 14336]
S3 GoogleDesktopManager-061008-081103;Google Desktop Manager 5.7.806.10245;c:\program files\Google\Google Desktop Search\GoogleDesktop.exe [2007-11-21 29744]
S3 myprotector;myprotector;c:\windows\battc.sys [2009-02-16 69888]
S3 P1120VID;Creative WebCam NX Ultra;c:\windows\system32\drivers\P1120Vid.sys [2006-02-01 1252474]
S3 PsShutdownSvc;PsShutdown;c:\windows\system32\PSSDNSVC.EXE [2005-08-22 65536]
S3 SG760_XP;SAGEM 802.11g XG760 1211 Driver;c:\windows\system32\drivers\WlanUZXP.sys [2007-04-20 260608]
S3 UPDATEDATA;UPDATEDATA;c:\windows\system32\drivers\acpiec.sys [2001-08-23 12032]
S3 ZDCndis5;ZDCndis5 Protocol Driver;c:\windows\system32\zdcndis5.sys [2009-01-16 137664]

--- Autres Services/Pilotes en mémoire ---

*NewlyCreated* - ZDPNDIS5

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\svchost]
MSPolicyAgent REG_MULTI_SZ MSPolicyAgent

[HKEY_CURRENT_USER\software\microsoft\windows\currentversion\explorer\mountpoints2\{c984ab7c-e6f0-11dd-8d9e-00142a50775a}]
\shell\explore\command - E:\CC.PIF
\shell\open\Command - E:\CC.PIF
.
Contenu du dossier 'Tâches planifiées'

2009-02-23 c:\windows\Tasks\AppleSoftwareUpdate.job
- c:\program files\Apple Software Update\SoftwareUpdate.exe [2006-08-29 14:21]

2009-02-27 c:\windows\Tasks\Google Software Updater.job
- c:\program files\Google\Common\Google Updater\GoogleUpdaterService.exe [2009-02-23 15:32]

2009-02-27 c:\windows\Tasks\Vérifier les mises à jour de Windows Live Toolbar.job
- c:\program files\Windows Live Toolbar\MSNTBUP.EXE [2007-10-19 11:20]
.
- - - - ORPHELINS SUPPRIMES - - - -

HKLM-Run-Á³#  Lh'þ9Óœð3rÅWc:\program files\ISTsvc\istsvc.exe - c:\windows\hxyjlul.exe


.
------- Examen supplémentaire -------
.
uSearchMigratedDefaultURL = hxxp://www.google.com/search?q={searchTerms}&sourceid=ie7&rls=com.microsoft:en-US&ie=utf8&oe=utf8
uStart Page = www.6700.cn?tn=1027251
mStart Page = hxxp://www.google.com
uSearchURL,(Default) = hxxp://g.msn.fr/0SEFRFR/SAOS01?FORM=TOOLBR
IE: &Windows Live Search - c:\program files\Windows Live Toolbar\msntb.dll/search.htm
IE: Add to Windows &Live Favorites - https://onedrive.live.com/?id=favorites
FF - ProfilePath - c:\documents and settings\CKS Andre SNEYAERT\Application Data\Mozilla\Firefox\Profiles\h6n3nsr0.default\
FF - prefs.js: browser.search.defaulturl - hxxp://www.google.com/search?lr=&ie=UTF-8&oe=UTF-8&q=
FF - prefs.js: browser.search.selectedEngine - Google
FF - prefs.js: browser.startup.homepage - hxxp://en-us.start.mozilla.com/firefox?client=firefox-a&rls=org.mozilla:fr:official
.

**************************************************************************

catchme 0.3.1367 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2009-02-27 15:26:18
Windows 5.1.2600 Service Pack 3 NTFS

Recherche de processus cachés ...

Recherche d'éléments en démarrage automatique cachés ...

HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run
user = c:\windows\WinShell..\daemon.exe???????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????

Recherche de fichiers cachés ...

Scan terminé avec succès
Fichiers cachés: 0

**************************************************************************

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"Á³#  L\"h'þ9Óœð3rÅWc:\\Program Files\\ISTsvc\\istsvc.exe"="c:\\WINDOWS\\hxyjlul.exe"
.
Heure de fin: 2009-02-27 15:30:10
ComboFix-quarantined-files.txt 2009-02-27 14:30:02
ComboFix2.txt 2009-02-24 17:40:00
ComboFix3.txt 2009-02-24 01:05:33
ComboFix4.txt 2009-02-24 00:24:40

Avant-CF: 153,317,736,448 octets libres
Après-CF: 153,294,225,408 octets libres

680 --- E O F --- 2009-02-25 23:55:14
0