Infecté par Spyware Guard 2008

doubien Messages postés 13 Statut Membre -  
Destrio5 Messages postés 99820 Date d'inscription   Statut Modérateur Dernière intervention   -
Bonjour,

J'ai un ordi qui a été infecté par Spyware Guard, entre autre je crois.

Pas possible de lance SmitFraudFix, ça donne un message d erreur. Et l'accès à internet est limité, du genre pas possible d'installer Spytbot search and destroy.

Merci d avance pour votre aide.

Le rapport :

Logfile of HijackThis v1.99.1
Scan saved at 20:05:49, on 2009-03-02
Platform: Windows XP SP3 (WinNT 5.01.2600)
MSIE: Internet Explorer v7.00 (7.00.6000.16735)

Running processes:
C:\WINDOWS\system32\csrss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\Avira\AntiVir PersonalEdition Classic\sched.exe
C:\WINDOWS\system32\igfxpers.exe
C:\Program Files\Java\jre1.6.0_07\bin\jusched.exe
C:\Program Files\Norton Ghost\Agent\VProTray.exe
C:\WINDOWS\system32\rundll32.exe
C:\Program Files\Avira\AntiVir PersonalEdition Classic\avgnt.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\Avira\AntiVir PersonalEdition Classic\avguard.exe
C:\Program Files\DU Meter\DUMeterSvc.exe
C:\Program Files\Norton Ghost\Agent\VProSvc.exe
C:\WINDOWS\system32\oodag.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\alg.exe
C:\Program Files\Spyware Guard 2008\spywareguard.exe
C:\Documents and Settings\User\Bureau\HijackThis.exe

R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = https://www.google.ca/?gws_rd=ssl
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = https://www.msn.com/fr-fr/?ocid=iehp
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = https://www.bing.com/?toHttps=1&redig=5FC791212101479BAFBE1A679848B1AF
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = https://www.bing.com/?toHttps=1&redig=5FC791212101479BAFBE1A679848B1AF
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = https://www.msn.com/fr-fr/?ocid=iehp
R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName = Liens
O2 - BHO: Aide pour le lien d'Adobe PDF Reader - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Fichiers communs\Adobe\Acrobat\ActiveX\AcroIEHelper.dll
O2 - BHO: (no name) - {53F2D5ED-91FA-4EBA-9D2B-AA8D21BEE4A8} - C:\WINDOWS\system32\rqRLcAQK.dll
O2 - BHO: {9f9a9a85-72ef-814b-72b4-613994362de5} - {5ed26349-9316-4b27-b418-fe2758a9a9f9} - C:\WINDOWS\system32\slgeex.dll
O2 - BHO: (no name) - {6D794CB4-C7CD-4c6f-BFDC-9B77AFBDC02C} - C:\WINDOWS\system32\urqOHARJ.dll
O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre1.6.0_07\bin\ssv.dll
O2 - BHO: (no name) - {76cb19ea-453e-42d9-9f1d-fd04ed836e6e} - C:\WINDOWS\system32\hajigira.dll
O4 - HKLM\..\Run: [IgfxTray] C:\WINDOWS\system32\igfxtray.exe
O4 - HKLM\..\Run: [HotKeysCmds] C:\WINDOWS\system32\hkcmd.exe
O4 - HKLM\..\Run: [Persistence] C:\WINDOWS\system32\igfxpers.exe
O4 - HKLM\..\Run: [SunJavaUpdateSched] "C:\Program Files\Java\jre1.6.0_07\bin\jusched.exe"
O4 - HKLM\..\Run: [Norton Ghost 12.0] "C:\Program Files\Norton Ghost\Agent\VProTray.exe"
O4 - HKLM\..\Run: [ZoneAlarm Client] "C:\Program Files\Zone Labs\ZoneAlarm\zlclient.exe"
O4 - HKLM\..\Run: [C:\WINDOWS\system32\kdoer.exe] C:\WINDOWS\system32\kdoer.exe
O4 - HKLM\..\Run: [847e2b37] rundll32.exe "C:\WINDOWS\system32\wgknfufs.dll",b
O4 - HKLM\..\Run: [Adobe Reader Speed Launcher] "C:\Program Files\Adobe\Reader 8.0\Reader\Reader_sl.exe"
O4 - HKLM\..\Run: [avgnt] "C:\Program Files\Avira\AntiVir PersonalEdition Classic\avgnt.exe" /min
O4 - HKLM\..\Run: [MSConfig] C:\WINDOWS\PCHealth\HelpCtr\Binaries\MSConfig.exe /auto
O4 - HKLM\..\Run: [kedivefeza] Rundll32.exe "C:\WINDOWS\system32\telowewa.dll",s
O4 - HKLM\..\Run: [spywareguard] C:\Program Files\Spyware Guard 2008\spywareguard.exe
O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
O8 - Extra context menu item: E&xporter vers Microsoft Excel - res://C:\PROGRA~1\MICROS~2\Office10\EXCEL.EXE/3000
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_07\bin\ssv.dll
O9 - Extra 'Tools' menuitem: Console Java (Sun) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_07\bin\ssv.dll
O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - %windir%\Network Diagnostic\xpnetdiag.exe (file missing)
O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - %windir%\Network Diagnostic\xpnetdiag.exe (file missing)
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O11 - Options group: [INTERNATIONAL] International*
O16 - DPF: {0CCA191D-13A6-4E29-B746-314DEE697D83} (Facebook Photo Uploader 5 Control) - http://upload.facebook.com/controls/2008.10.10_v5.5.8/FacebookPhotoUploader5.cab
O16 - DPF: {9122D757-5A4F-4768-82C5-B4171D8556A7} (PhotoPickConvert Class) - http://appdirectory.messenger.msn.com/AppDirectory/P4Apps/PhotoSwap/PhtPkMSN.cab
O16 - DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} (Shockwave Flash Object) - http://fpdownload2.macromedia.com/get/shockwave/cabs/flash/swflash.cab
O17 - HKLM\System\CCS\Services\Tcpip\..\{40E968C2-C7A6-4B52-9AD4-68D3BE5B7E36}: NameServer = 85.255.112.204;85.255.112.83
O17 - HKLM\System\CCS\Services\Tcpip\..\{6893F9A5-77FF-4321-8D2A-EB48BA9E17E8}: NameServer = 85.255.112.204;85.255.112.83
O17 - HKLM\System\CS1\Services\Tcpip\..\{40E968C2-C7A6-4B52-9AD4-68D3BE5B7E36}: NameServer = 85.255.112.204;85.255.112.83
O18 - Protocol: livecall - {828030A1-22C1-4009-854F-8E305202313F} - C:\PROGRA~1\WI1F86~1\MESSEN~1\MSGRAP~1.DLL
O18 - Protocol: msnim - {828030A1-22C1-4009-854F-8E305202313F} - C:\PROGRA~1\WI1F86~1\MESSEN~1\MSGRAP~1.DLL
O20 - AppInit_DLLs: ,C:\WINDOWS\system32\timinebe.dll slgeex.dll
O20 - Winlogon Notify: dimsntfy - %SystemRoot%\System32\dimsntfy.dll (file missing)
O20 - Winlogon Notify: igfxcui - C:\WINDOWS\SYSTEM32\igfxdev.dll
O20 - Winlogon Notify: urqOHARJ - C:\WINDOWS\SYSTEM32\urqOHARJ.dll
O21 - SSODL: WPDShServiceObj - {AAA288BA-9A4C-45B0-95D7-94D524869DB5} - C:\WINDOWS\system32\WPDShServiceObj.dll
O21 - SSODL: ieModule - {34D4F07B-283C-4692-81A0-A75A94E0D738} - C:\Documents and Settings\All Users\Application Data\Microsoft\Internet Explorer\DLLs\ieModule.dll
O21 - SSODL: InternetConnection - {3FA4625A-5729-4C68-B943-08FFB10DE596} - C:\Documents and Settings\All Users\Application Data\Microsoft\Internet Explorer\DLLs\tigayyawie.dll
O23 - Service: Avira AntiVir Personal - Free Antivirus Scheduler (AntiVirScheduler) - Avira GmbH - C:\Program Files\Avira\AntiVir PersonalEdition Classic\sched.exe
O23 - Service: Avira AntiVir Personal - Free Antivirus Guard (AntiVirService) - Avira GmbH - C:\Program Files\Avira\AntiVir PersonalEdition Classic\avguard.exe
O23 - Service: DU Meter Service (DUMeterSvc) - Hagel Technologies Ltd - C:\Program Files\DU Meter\DUMeterSvc.exe
O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Fichiers communs\InstallShield\Driver\1150\Intel 32\IDriverT.exe
O23 - Service: Norton Ghost - Symantec Corporation - C:\Program Files\Norton Ghost\Agent\VProSvc.exe
O23 - Service: O&O Defrag - O&O Software GmbH - C:\WINDOWS\system32\oodag.exe
O23 - Service: TrueVector Internet Monitor (vsmon) - Zone Labs, LLC - C:\WINDOWS\system32\ZoneLabs\vsmon.exe
A voir également:

18 réponses

doubien Messages postés 13 Statut Membre 1
 
J veux pas me réjouir trop vite, mais cela a l'air bien nettoyé.
Gros merci !!!

Je mets le rapport :

ComboFix 09-03-02.01 - User 2009-03-02 20:47:14.1 - NTFSx86
Microsoft Windows XP Professionnel 5.1.2600.3.1252.33.1036.18.495.175 [GMT -5:00]
Lancé depuis: c:\documents and settings\User\Bureau\doubien.exe
AV: Avira AntiVir PersonalEdition *On-access scanning disabled* (Outdated)
FW: ZoneAlarm Firewall *disabled*

AVERTISSEMENT - LA CONSOLE DE RÉCUPÉRATION N'EST PAS INSTALLÉE SUR CETTE MACHINE !!
.
[color=purple]Les fichiers ci-dessous ont été désactivés pendant l'exécution:[/color]
c:\windows\system32\timinebe.dll
c:\windows\system32\slgeex.dll

(((((((((((((((((((((((((((((((((((( Autres suppressions ))))))))))))))))))))))))))))))))))))))))))))))))
.

C:\Autorun.inf
c:\docume~1\User\LOCALS~1\Temp\tmp2.tmp
c:\documents and settings\All Users\Application Data\Microsoft\Internet Explorer\DLLs\c.cgm
c:\documents and settings\All Users\Application Data\Microsoft\Internet Explorer\DLLs\ieModule.dll
c:\documents and settings\All Users\Application Data\Microsoft\Internet Explorer\DLLs\moduleie.dll
c:\documents and settings\All Users\Application Data\Microsoft\Network\Downloader\qmgr0.dat
c:\documents and settings\All Users\Application Data\Microsoft\Network\Downloader\qmgr1.dat
c:\documents and settings\All Users\Application Data\Microsoft\Protect\track.sys
c:\documents and settings\User\Menu Démarrer\Programmes\Spyware Guard 2008
c:\documents and settings\User\Menu Démarrer\Programmes\Spyware Guard 2008\Spyware Guard 2008.lnk
c:\documents and settings\User\Menu Démarrer\Programmes\Spyware Guard 2008\Uninstall.lnk
c:\program files\Spyware Guard 2008
c:\program files\Spyware Guard 2008\conf.cfg
c:\program files\Spyware Guard 2008\mbase.vdb
c:\program files\Spyware Guard 2008\quarantine.vdb
c:\program files\Spyware Guard 2008\queue.vdb
c:\program files\Spyware Guard 2008\spywareguard.exe
c:\program files\Spyware Guard 2008\uninstall.exe
c:\program files\Spyware Guard 2008\vbase.vdb
C:\resycled
c:\resycled\boot.com
c:\windows\fxstaller.exe
c:\windows\reged.exe
c:\windows\spoolsystem.exe
c:\windows\sys.com
c:\windows\syscert.exe
c:\windows\sysexplorer.exe
c:\windows\system32\beadfqlr.ini
c:\windows\system32\drivers\TDSSpqxt.sys
c:\windows\system32\fnpblglg.dll
c:\windows\system32\hajigira.dll
c:\windows\system32\ieupdates.exe
c:\windows\system32\jpijkx.dll
c:\windows\system32\kdoer.exe
c:\windows\system32\KQAcLRqr.ini
c:\windows\system32\KQAcLRqr.ini2
c:\windows\system32\mcrh.tmp
c:\windows\system32\pgtocekk.ini
c:\windows\system32\qkpouokq.ini
c:\windows\system32\rqRLcAQK.dll
c:\windows\system32\ruupmfsa.dll
c:\windows\system32\sfufnkgw.ini
c:\windows\system32\slgeex.dll.vir
c:\windows\system32\telowewa.dll
c:\windows\system32\timinebe.dll.vir
c:\windows\system32\ugcguyeg.ini
c:\windows\system32\urqOHARJ.dll
c:\windows\system32\wgknfufs.dll
c:\windows\system32\winscenter.exe
c:\windows\system32\yddubrju.ini
c:\windows\vmreg.dll

----- BITS: Il y a peut-être des sites infectés -----

hxxp://childhe.com
.
((((((((((((((((((((((((((((((((((((((( Pilotes/Services )))))))))))))))))))))))))))))))))))))))))))))))))
.

-------\Legacy_TDSSSERV.SYS

((((((((((((((((((((((((((((( Fichiers créés du 2009-02-03 au 2009-03-03 ))))))))))))))))))))))))))))))))))))
.

2009-03-02 18:02 . 2009-03-02 18:02 <REP> d-------- c:\program files\CCleaner
2009-03-01 16:44 . 2009-03-01 16:44 <REP> d-------- c:\program files\Avira
2009-03-01 16:44 . 2009-03-01 16:44 <REP> d-------- c:\documents and settings\All Users\Application Data\Avira

.
(((((((((((((((((((((((((((((((((( Compte-rendu de Find3M ))))))))))))))))))))))))))))))))))))))))))))))))
.
2009-03-03 01:57 12,605,472 --sha-w c:\windows\system32\drivers\fidbox.dat
2009-03-02 22:53 --------- d-----w c:\program files\AVG7
2009-03-02 22:52 --------- d-----w c:\documents and settings\All Users\Application Data\avg7
2009-03-02 22:50 --------- d-----w c:\documents and settings\User\Application Data\AVG7
2009-03-02 22:50 --------- d-----w c:\documents and settings\Invité\Application Data\AVG7
2008-12-09 19:18 12,288 ----a-w c:\documents and settings\User\heheh.exe
2008-10-01 23:44 0 ----a-w c:\documents and settings\User\jagex_runescape_preferences.dat
2008-12-09 14:56 762,368 ----a-w c:\documents and settings\All Users\Application Data\Microsoft\Internet Explorer\DLLs\tigayyawie.dll
2008-10-16 20:09 32,768 --sha-w c:\windows\system32\config\systemprofile\Local Settings\Historique\History.IE5\MSHist012008101620081017\index.dat
.

((((((((((((((((((((((((((((((((( Points de chargement Reg ))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* les éléments vides & les éléments initiaux légitimes ne sont pas listés
REGEDIT4

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"ctfmon.exe"="c:\windows\system32\ctfmon.exe" [2008-04-13 15360]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"IgfxTray"="c:\windows\system32\igfxtray.exe" [2005-04-05 94208]
"HotKeysCmds"="c:\windows\system32\hkcmd.exe" [2005-04-05 77824]
"Persistence"="c:\windows\system32\igfxpers.exe" [2005-04-05 114688]
"SunJavaUpdateSched"="c:\program files\Java\jre1.6.0_07\bin\jusched.exe" [2008-06-10 144784]
"Norton Ghost 12.0"="c:\program files\Norton Ghost\Agent\VProTray.exe" [2007-03-28 2037352]
"ZoneAlarm Client"="c:\program files\Zone Labs\ZoneAlarm\zlclient.exe" [2007-12-13 919016]
"Adobe Reader Speed Launcher"="c:\program files\Adobe\Reader 8.0\Reader\Reader_sl.exe" [2008-10-15 39792]
"avgnt"="c:\program files\Avira\AntiVir PersonalEdition Classic\avgnt.exe" [2008-06-12 266497]
"MSConfig"="c:\windows\PCHealth\HelpCtr\Binaries\MSConfig.exe" [2008-04-13 172544]

[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run]
"CTFMON.EXE"="c:\windows\system32\CTFMON.EXE" [2008-04-13 15360]

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\windows]
"AppInit_DLLs"=,c:\windows\system32\timinebe.dll slgeex.dll

[HKEY_LOCAL_MACHINE\system\currentcontrolset\control\session manager]
BootExecute REG_MULTI_SZ autocheck autochk *\[u]0[/u]OODBS

[HKEY_LOCAL_MACHINE\software\microsoft\security center]
"UpdatesDisableNotify"=dword:00000001
"AntiVirusOverride"=dword:00000001

[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\ZoneLabsFirewall]
"DisableMonitoring"=dword:00000001

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile]
"EnableFirewall"= 0 (0x0)

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%windir%\\system32\\sessmgr.exe"=
"%windir%\\Network Diagnostic\\xpnetdiag.exe"=
"c:\\WINDOWS\\system32\\ZoneLabs\\avsys\\ScanningProcess.exe"=
"c:\\Program Files\\Windows Live\\Messenger\\msnmsgr.exe"=
"c:\\Program Files\\Windows Live\\Messenger\\livecall.exe"=
"c:\\Program Files\\Avira\\AntiVir PersonalEdition Classic\\avguard.exe"=

R2 DUMeterSvc;DU Meter Service;c:\program files\DU Meter\DUMeterSvc.exe [2007-12-27 1382672]
S3 Ndisprot;ArcNet NDIS Protocol Driver;c:\windows\system32\drivers\ndisprot.sys [2008-11-12 27904]

[HKEY_CURRENT_USER\software\microsoft\windows\currentversion\explorer\mountpoints2\C]
\Shell\AutoRun\command - c:\windows\system32\RunDLL32.EXE Shell32.DLL,ShellExec_RunDLL resycled\boot.com c:
\Shell\Open\command - c:\resycled\boot.com c:

[HKEY_CURRENT_USER\software\microsoft\windows\currentversion\explorer\mountpoints2\{471ea854-9d9f-11dd-9af1-0019e0683779}]
\Shell\AutoRun\command - c:\windows\system32\RunDLL32.EXE Shell32.DLL,ShellExec_RunDLL resycled\boot.com e:
\Shell\Open\command - e:\resycled\boot.com e:
.
- - - - ORPHELINS SUPPRIMES - - - -

BHO-{5ed26349-9316-4b27-b418-fe2758a9a9f9} - c:\windows\system32\slgeex.dll
BHO-{6D794CB4-C7CD-4c6f-BFDC-9B77AFBDC02C} - c:\windows\system32\urqOHARJ.dll
BHO-{76cb19ea-453e-42d9-9f1d-fd04ed836e6e} - c:\windows\system32\hajigira.dll
BHO-{E86E9BE6-E1CD-4269-8478-98000F257639} - c:\windows\system32\rqRLcAQK.dll
HKLM-Run-c:\windows\system32\kdoer.exe - c:\windows\system32\kdoer.exe
HKLM-Run-spywareguard - c:\program files\Spyware Guard 2008\spywareguard.exe
ShellExecuteHooks-{6D794CB4-C7CD-4c6f-BFDC-9B77AFBDC02C} - c:\windows\system32\urqOHARJ.dll
MSConfigStartUp-99460589701920997126216779121042 - c:\program files\Antivirus 2009\av2009.exe
MSConfigStartUp-kedivefeza - c:\windows\system32\telowewa.dll
MSConfigStartUp-spywareguard - c:\program files\Spyware Guard 2008\spywareguard.exe
MSConfigStartUp-Windows UDP Control Center - fxstaller.exe

.
------- Examen supplémentaire -------
.
uStart Page = hxxp://www.google.ca/
uInternet Connection Wizard,ShellNext = iexplore
IE: E&xporter vers Microsoft Excel - c:\progra~1\MICROS~2\Office10\EXCEL.EXE/3000
FF - ProfilePath - c:\documents and settings\User\Application Data\Mozilla\Firefox\Profiles\p2alr2y3.default\
FF - prefs.js: browser.search.selectedEngine - Amazon.fr
FF - prefs.js: browser.startup.homepage - hxxp://www.google.ca/webhp?rls=ig
.

**************************************************************************

catchme 0.3.1367 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2009-03-02 20:57:02
Windows 5.1.2600 Service Pack 3 NTFS

Recherche de processus cachés ...

Recherche d'éléments en démarrage automatique cachés ...

Recherche de fichiers cachés ...

Scan terminé avec succès
Fichiers cachés: 0

**************************************************************************

[HKEY_LOCAL_MACHINE\System\ControlSet001\Services\DUMeterSvc]
"ImagePath"="c:\program files\DU Meter\DUMeterSvc.exe /startedbyscm:E1F6D4BE-40E33354-DUMeterService"

[HKEY_LOCAL_MACHINE\System\ControlSet001\Services\TDSSserv.sys]
"imagepath"="\systemroot\system32\drivers\TDSSpqxt.sys"
.
--------------------- CLES DE REGISTRE BLOQUEES ---------------------

[HKEY_LOCAL_MACHINE\software\Microsoft\Windows\CurrentVersion\System*]
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

[HKEY_LOCAL_MACHINE\System\ControlSet001\Services\TDSSserv.sys]
@DACL=(02 0000)
"start"=dword:00000001
"type"=dword:00000001
"imagepath"=expand:"\\systemroot\\system32\\drivers\\TDSSpqxt.sys"
"group"="file system"
.
------------------------ Autres processus actifs ------------------------
.
c:\windows\system32\ZoneLabs\vsmon.exe
c:\program files\Avira\AntiVir PersonalEdition Classic\sched.exe
c:\program files\Avira\AntiVir PersonalEdition Classic\avguard.exe
c:\program files\Norton Ghost\Agent\VProSvc.exe
c:\windows\system32\oodag.exe
.
**************************************************************************
.
Heure de fin: 2009-03-02 21:00:47 - La machine a redémarré
ComboFix-quarantined-files.txt 2009-03-03 02:00:42

Avant-CF: 31,195,934,720 octets libres
Après-CF: 31,121,203,200 octets libres

194 --- E O F --- 2008-10-24 07:00:57
1
Destrio5 Messages postés 99820 Date d'inscription   Statut Modérateur Dernière intervention   10 305
 
Tout n'est pas nettoyé.

L'auteur d'UsbFix ayant retiré son programme (UsbFix), je prends la responsabilité de te le faire utiliser. Merci aux autres de ne pas utiliser le lien de téléchargement donné.

--> Télécharge UsbFix sur ton Bureau.

--> Lance l'installation avec les paramètres par défaut.

--> Branche tes sources de données externes à ton PC (clé USB, disque dur externe, carte SD, etc...) sans les ouvrir.

--> Double-clique sur le raccourci UsbFix sur ton Bureau.

--> Choisis l'option 1 (Nettoyage).

--> Le PC va redémarrer.

--> Après redémarrage, poste le rapport UsbFix.txt

Note : le rapport UsbFix.txt est sauvegardé à la racine du disque.

(Si le Bureau ne réapparaît pas, presse Ctrl+Alt+Suppr, Onglet "Fichier", "Nouvelle tâche", tape explorer.exe et valide)
1
doubien Messages postés 13 Statut Membre 1
 
voici :



-------------- UsbFix V2.414.3 ---------------

* User : User - USER-14CC091BE6
* Outils mis a jours le 18/01/2009 par Chiquitine29 et Chimay8
* Recherche effectuée à 21:20:04 le 2009-03-02
* Windows Xp - Internet Explorer 7.0.5730.11


--------------- [ Processus actifs ] ----------------


C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\csrss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\system32\ZoneLabs\vsmon.exe
C:\WINDOWS\system32\logonui.exe
C:\WINDOWS\system32\userinit.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\Avira\AntiVir PersonalEdition Classic\sched.exe
C:\Program Files\Avira\AntiVir PersonalEdition Classic\avwsc.exe

--------------- [ Informations lecteurs ] ----------------

C: - Lecteur fixe

E: - Lecteur amovible


--------------- [ Lecteur C ] ----------------

C: - Lecteur fixe


+- Listing des fichiers présents :

[2007-08-31 08:12][--a------] C:\AUTOEXEC.BAT
[2004-08-05 07:00][-rahs----] C:\NTDETECT.COM
[2009-03-02 20:56][---hs----] C:\boot.ini
[2009-03-02 21:00][--a------] C:\ComboFix.txt
[2009-03-02 21:00][--a------] C:\UsbFix.txt
[2007-08-31 08:12][--a------] C:\CONFIG.SYS
[2007-08-31 08:12][--a------] C:\IO.SYS
[2007-08-31 08:12][--a------] C:\MSDOS.SYS
[2007-08-31 08:12][--a------] C:\pagefile.sys

--------------- [ Lecteur E ] ----------------

E: - Lecteur amovible


+- Listing des fichiers présents :

[2008-02-28 19:51][--a------] E:\ENGLISH VERBS CHILDREN.exe

--------------- [ Registre / Startup ] ----------------

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon]
"Userinit"="C:\\WINDOWS\\system32\\userinit.exe,"

[HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main]
"Search Page"="http://www.microsoft.com/isapi/redir.dll?prd=ie&ar=iesearch"
"Start Page"="http://www.microsoft.com/isapi/redir.dll?prd=ie&pver=6&ar=msnhome"

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\run]
ctfmon.exe=C:\WINDOWS\system32\ctfmon.exe
SpybotSD TeaTimer=C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\run]
IgfxTray=C:\WINDOWS\system32\igfxtray.exe
HotKeysCmds=C:\WINDOWS\system32\hkcmd.exe
Persistence=C:\WINDOWS\system32\igfxpers.exe
SunJavaUpdateSched="C:\Program Files\Java\jre1.6.0_07\bin\jusched.exe"
Norton Ghost 12.0="C:\Program Files\Norton Ghost\Agent\VProTray.exe"
ZoneAlarm Client="C:\Program Files\Zone Labs\ZoneAlarm\zlclient.exe"
Adobe Reader Speed Launcher="C:\Program Files\Adobe\Reader 8.0\Reader\Reader_sl.exe"
avgnt="C:\Program Files\Avira\AntiVir PersonalEdition Classic\avgnt.exe" /min
MSConfig=C:\WINDOWS\PCHealth\HelpCtr\Binaries\MSConfig.exe /auto
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run\OptionalComponents=
<NO NAME>=
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run\OptionalComponents\IMAIL=
Installed=1
<NO NAME>=
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run\OptionalComponents\MAPI=
NoChange=1
Installed=1
<NO NAME>=
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run\OptionalComponents\MSFS=
Installed=1
<NO NAME>=

--------------- [ Registre / Mountpoint2 ] ----------------

Supprimé ! - HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{471ea854-9d9f-11dd-9af1-0019e0683779}\Shell\AutoRun\command
Supprimé ! - HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{471ea854-9d9f-11dd-9af1-0019e0683779}\Shell\open\Command

--------------- [ Nettoyage des disques ] ----------------


--------------- [ Resumé ] ----------------

-> /!\ Le resultat doit etre interprété par un spécialiste /!\

[2007-08-31 08:12][--a------] C:\AUTOEXEC.BAT
[2004-08-05 07:00][-rahs----] C:\NTDETECT.COM
[2009-03-02 20:56][---hs----] C:\boot.ini
[2008-02-28 19:51][--a------] E:\ENGLISH VERBS CHILDREN.exe

--------------- [ Vaccination ] ----------------

C:\autorun.inf -> Dossier autorun.inf crée par UsbFix !
E:\autorun.inf -> Dossier autorun.inf crée par UsbFix !

--------------- ! Fin du rapport ! ----------------
0
Destrio5 Messages postés 99820 Date d'inscription   Statut Modérateur Dernière intervention   10 305
 
---> Désinstalle UsbFix.

"ENGLISH VERBS CHILDREN.exe"

---> Quel est ce fichier ?
1
doubien Messages postés 13 Statut Membre 1
 
c est un fichier qui installe une application avec des exercices d anglais. Il est sur une clé USB.
0
Destrio5 Messages postés 99820 Date d'inscription   Statut Modérateur Dernière intervention   10 305
 
Salut,

/!\ Désactive tes protections résidentes (Antivirus, etc...) /!\

--> Télécharge ComboFix (de sUBs) sur ton Bureau.
--> Double-clique sur ComboFix.exe (le .exe n'est pas forcément visible) afin de le lancer.
--> Il va te demander d'installer la console de récupération : accepte.
--> Lorsque la recherche sera terminée, un rapport apparaîtra. Poste ce rapport (C:\Combofix.txt) dans ta prochaine réponse.

Pour t'aider : Un guide et un tutoriel sur l'utilisation de ComboFix
0

Vous n’avez pas trouvé la réponse que vous recherchez ?

Posez votre question
doubien Messages postés 13 Statut Membre 1
 
Salut,

Merci pour la réponse rapide.

J'ai déja essayé ta solution mais Combofix ne se lance pas, même si je le vois dans la liste des processus ensuite.
Pareil pour d'autres correctifs....
0
Destrio5 Messages postés 99820 Date d'inscription   Statut Modérateur Dernière intervention   10 305
 
Renomme ComboFix en doubien puis réessaie.
0
doubien Messages postés 13 Statut Membre 1
 
pas mieux ... :(
Pour info, y a le DDur qui gratte regulierement alors que rien ne se passe
0
Destrio5 Messages postés 99820 Date d'inscription   Statut Modérateur Dernière intervention   10 305
 
As-tu essayé en mode sans échec ?
0
doubien Messages postés 13 Statut Membre 1
 
Ça a l air de fonctionner, c est en route,merci !
a+
0
Destrio5 Messages postés 99820 Date d'inscription   Statut Modérateur Dernière intervention   10 305
 
Je vais dormir, à demain.

---> Télécharge Malwarebytes' Anti-Malware (MBAM) sur ton Bureau.
---> Double-clique sur le fichier téléchargé pour lancer le processus d'installation.
---> Dans l'onglet Mise à jour, clique sur le bouton Recherche de mise à jour : si le pare-feu demande l'autorisation à MBAM de se connecter à Internet, accepte.
---> Une fois la mise à jour terminée, rends-toi dans l'onglet Recherche.
---> Sélectionne Exécuter un examen rapide.
---> Clique sur Rechercher. L'analyse démarre.

A la fin de l'analyse, un message s'affiche :

L'examen s'est terminé normalement. Cliquez sur 'Afficher les résultats' pour afficher tous les objets trouvés.

---> Clique sur OK pour poursuivre. Si MBAM n'a rien trouvé, il te le dira aussi.
---> Ferme tes navigateurs.
Si des malwares ont été détectés, clique sur Afficher les résultats.
---> Sélectionne tout (ou laisse coché) et clique sur Supprimer la sélection, MBAM va détruire les fichiers et clés de registre infectés et en mettre une copie dans la quarantaine.
---> MBAM va ouvrir le Bloc-notes et y copier le rapport d'analyse. Copie-colle ce rapport dans ta prochaine réponse.
0
doubien Messages postés 13 Statut Membre 1
 
la suite :

Malwarebytes' Anti-Malware 1.34
Version de la base de données: 1814
Windows 5.1.2600 Service Pack 3

2009-03-02 22:04:50
mbam-log-2009-03-02 (22-04-50).txt

Type de recherche: Examen rapide
Eléments examinés: 69092
Temps écoulé: 5 minute(s), 48 second(s)

Processus mémoire infecté(s): 0
Module(s) mémoire infecté(s): 0
Clé(s) du Registre infectée(s): 2
Valeur(s) du Registre infectée(s): 0
Elément(s) de données du Registre infecté(s): 0
Dossier(s) infecté(s): 0
Fichier(s) infecté(s): 6

Processus mémoire infecté(s):
(Aucun élément nuisible détecté)

Module(s) mémoire infecté(s):
(Aucun élément nuisible détecté)

Clé(s) du Registre infectée(s):
HKEY_CURRENT_USER\SOFTWARE\Spyware Guard 2008 (Rogue.SpywareGuard) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{3fa4625a-5729-4c68-b943-08ffb10de596} (Trojan.FakeAlert) -> Quarantined and deleted successfully.

Valeur(s) du Registre infectée(s):
(Aucun élément nuisible détecté)

Elément(s) de données du Registre infecté(s):
(Aucun élément nuisible détecté)

Dossier(s) infecté(s):
(Aucun élément nuisible détecté)

Fichier(s) infecté(s):
C:\WINDOWS\system32\TDSSnrsr.dll (Trojan.TDSS) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\TDSSoiqh.dll (Trojan.TDSS) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\TDSSosvn.dat (Malware.Trace) -> Quarantined and deleted successfully.
C:\Documents and Settings\All Users\Application Data\Microsoft\Internet Explorer\DLLs\tigayyawie.dll (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\TDSSfpmp.dll (Rootkit.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\TDSStkdv.log (Trojan.TDSS) -> Quarantined and deleted successfully.
0
Destrio5 Messages postés 99820 Date d'inscription   Statut Modérateur Dernière intervention   10 305
 
---> Relance MBAM, va dans Quarantaine et supprime tout.

J'aimerais que tu fasses ceci :

---> Télécharge SDFix (créé par AndyManchesta) sur ton Bureau.
- Double-clique sur SDFix.exe et choisis Install pour l'extraire dans un dossier dédié sur le Bureau.
- Redémarre ton ordinateur en mode sans échec.

---> Pour redémarrer en mode sans échec :
- Redémarre ton PC.
- Au démarrage, tapote sur F8 (F5 sur certains PC) juste après l'affichage du BIOS et juste avant le chargement de Windows.
- Dans le menu d'options avancées, choisis Mode sans échec.
- Choisis ta session.

---> Déroule la liste des instructions ci-dessous :
- Ouvre le dossier SDFix qui vient d'être créé dans le répertoire C:\ et double-clique sur RunThis.bat pour lancer le script.
- Appuie sur Y pour commencer le processus de nettoyage.
- Il va supprimer les services et les entrées du Registre de certains trojans trouvés puis te demandera d'appuyer sur une touche pour redémarrer.
- Appuie sur une touche pour redémarrer le PC.
- Ton système sera plus long pour redémarrer qu'à l'accoutumée car l'outil va continuer à s'exécuter et supprimer des fichiers.
- Après le chargement du Bureau, l'outil terminera son travail et affichera Finished.
- Appuie sur une touche pour finir l'exécution du script et charger les icônes de ton Bureau.
- Les icônes du Bureau affichées, le rapport SDFix s'ouvrira à l'écran et s'enregistrera aussi dans le dossier SDFix sous le nom Report.txt.
- Enfin, copie/colle le contenu du fichier Report.txt dans ta prochaine réponse.
0
doubien Messages postés 13 Statut Membre 1
 
C'est fait.

[b]SDFix: Version 1.240 [/b]
Run by User on 2009-03-03 at 19:07

Microsoft Windows XP [version 5.1.2600]
Running From: C:\SDFix

[b]Checking Services [/b]:

[b]Name [/b]:
TDSSserv.sys

[b]Path [/b]:
\systemroot\system32\drivers\TDSSpqxt.sys

TDSSserv.sys - Deleted

Restoring Default Security Values
Restoring Default Hosts File

Rebooting

[b]Checking Files [/b]:

Trojan Files Found:

C:\WINDOWS\system32\drivers\TDSSpqxt.sys - Deleted

Removing Temp Files

[b]ADS Check [/b]:

[b]Final Check [/b]:

catchme 0.3.1361.2 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2009-03-03 19:12:34
Windows 5.1.2600 Service Pack 3 NTFS

scanning hidden processes ...

scanning hidden services & system hive ...

scanning hidden registry entries ...

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\System]
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

scanning hidden files ...

scan completed successfully
hidden processes: 0
hidden services: 0
hidden files: 0

[b]Remaining Services [/b]:

Authorized Application Key Export:

[HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\standardprofile\authorizedapplications\list]
"%windir%\\system32\\sessmgr.exe"="%windir%\\system32\\sessmgr.exe:*:enabled:@xpsp2res.dll,-22019"
"%windir%\\Network Diagnostic\\xpnetdiag.exe"="%windir%\\Network Diagnostic\\xpnetdiag.exe:*:Enabled:@xpsp3res.dll,-20000"
"C:\\WINDOWS\\system32\\ZoneLabs\\avsys\\ScanningProcess.exe"="C:\\WINDOWS\\system32\\ZoneLabs\\avsys\\ScanningProcess.exe:*:Enabled:Kaspersky AV Scanner"
"C:\\Program Files\\Windows Live\\Messenger\\msnmsgr.exe"="C:\\Program Files\\Windows Live\\Messenger\\msnmsgr.exe:*:Enabled:Windows Live Messenger"
"C:\\Program Files\\Windows Live\\Messenger\\livecall.exe"="C:\\Program Files\\Windows Live\\Messenger\\livecall.exe:*:Enabled:Windows Live Messenger (Phone)"
"C:\\Program Files\\Avira\\AntiVir PersonalEdition Classic\\avguard.exe"="C:\\Program Files\\Avira\\AntiVir PersonalEdition Classic\\avguard.exe:*:Enabled:avguard"

[HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\domainprofile\authorizedapplications\list]
"%windir%\\system32\\sessmgr.exe"="%windir%\\system32\\sessmgr.exe:*:enabled:@xpsp2res.dll,-22019"
"%windir%\\Network Diagnostic\\xpnetdiag.exe"="%windir%\\Network Diagnostic\\xpnetdiag.exe:*:Enabled:@xpsp3res.dll,-20000"
"C:\\Program Files\\Windows Live\\Messenger\\msnmsgr.exe"="C:\\Program Files\\Windows Live\\Messenger\\msnmsgr.exe:*:Enabled:Windows Live Messenger"
"C:\\Program Files\\Windows Live\\Messenger\\livecall.exe"="C:\\Program Files\\Windows Live\\Messenger\\livecall.exe:*:Enabled:Windows Live Messenger (Phone)"

[b]Remaining Files [/b]:

File Backups: - C:\SDFix\backups\backups.zip

[b]Files with Hidden Attributes [/b]:

Sun 13 Apr 2008 1,695,232 ..SH. --- "C:\Program Files\Messenger\msmsgs.exe"
Thu 24 Nov 2005 17,920 A.SHR --- "C:\Program Files\Autodesk\Autodesk DWF Viewer\_Setup.dll"
Fri 31 Aug 2007 0 A.SH. --- "C:\Documents and Settings\All Users\DRM\Cache\Indiv01.tmp"

[b]Finished![/b]
0
Destrio5 Messages postés 99820 Date d'inscription   Statut Modérateur Dernière intervention   10 305
 
---> Menu Démarrer > Exécuter > Tape combofix /u et valide.

--> Télécharge Random's System Information Tool (RSIT) (par random/random) sur ton Bureau.

--> Double-clique sur RSIT.exe afin de lancer le programme.
(Sous Vista, il faut cliquer droit sur RSIT.exe et choisir Exécuter en tant qu'administrateur)

--> Clique sur Continue à l'écran Disclaimer.

--> Si l'outil HijackThis (version à jour) n'est pas présent ou non détecté sur l'ordinateur, RSIT le téléchargera (autorise l'accès dans ton pare-feu, si demandé) et tu devras accepter la licence.

--> Lorsque l'analyse sera terminée, deux fichiers texte s'ouvriront. Poste le contenu de log.txt (c'est celui qui apparaît à l'écran) ainsi que de info.txt (que tu verras dans la barre des tâches).

Note : les rapports sont sauvegardés dans le dossier C:\rsit.
0
doubien Messages postés 13 Statut Membre 1
 
Logfile of random's system information tool 1.05 (written by random/random)
Run by User at 2009-03-05 23:33:40
Microsoft Windows XP Professionnel Service Pack 3
System drive C: has 29 GB (77%) free of 38 GB
Total RAM: 495 MB (32% free)

Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 23:34:04, on 2009-03-05
Platform: Windows XP SP3 (WinNT 5.01.2600)
MSIE: Internet Explorer v7.00 (7.00.6000.16791)
Boot mode: Normal

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\ZoneLabs\vsmon.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\Avira\AntiVir PersonalEdition Classic\sched.exe
C:\Program Files\Avira\AntiVir PersonalEdition Classic\avguard.exe
C:\Program Files\DU Meter\DUMeterSvc.exe
C:\Program Files\Norton Ghost\Agent\VProSvc.exe
C:\WINDOWS\system32\oodag.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\system32\hkcmd.exe
C:\WINDOWS\system32\igfxpers.exe
C:\Program Files\Java\jre1.6.0_07\bin\jusched.exe
C:\Program Files\Norton Ghost\Agent\VProTray.exe
C:\Program Files\Zone Labs\ZoneAlarm\zlclient.exe
C:\WINDOWS\system32\ctfmon.exe
C:\WINDOWS\system32\wuauclt.exe
C:\Program Files\Avira\AntiVir PersonalEdition Classic\avgnt.exe
C:\Documents and Settings\User\Bureau\RSIT.exe
C:\Program Files\trend micro\User.exe

R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = https://www.msn.com/fr-fr/?ocid=iehp
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = https://www.bing.com/?toHttps=1&redig=5FC791212101479BAFBE1A679848B1AF
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = https://www.bing.com/?toHttps=1&redig=5FC791212101479BAFBE1A679848B1AF
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = https://www.msn.com/fr-fr
R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName = Liens
O2 - BHO: Aide pour le lien d'Adobe PDF Reader - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Fichiers communs\Adobe\Acrobat\ActiveX\AcroIEHelper.dll
O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre1.6.0_07\bin\ssv.dll
O4 - HKLM\..\Run: [IgfxTray] C:\WINDOWS\system32\igfxtray.exe
O4 - HKLM\..\Run: [HotKeysCmds] C:\WINDOWS\system32\hkcmd.exe
O4 - HKLM\..\Run: [Persistence] C:\WINDOWS\system32\igfxpers.exe
O4 - HKLM\..\Run: [SunJavaUpdateSched] "C:\Program Files\Java\jre1.6.0_07\bin\jusched.exe"
O4 - HKLM\..\Run: [Norton Ghost 12.0] "C:\Program Files\Norton Ghost\Agent\VProTray.exe"
O4 - HKLM\..\Run: [ZoneAlarm Client] "C:\Program Files\Zone Labs\ZoneAlarm\zlclient.exe"
O4 - HKLM\..\Run: [Adobe Reader Speed Launcher] "C:\Program Files\Adobe\Reader 8.0\Reader\Reader_sl.exe"
O4 - HKLM\..\Run: [avgnt] "C:\Program Files\Avira\AntiVir PersonalEdition Classic\avgnt.exe" /min
O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
O4 - HKUS\S-1-5-18\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'SYSTEM')
O4 - HKUS\.DEFAULT\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'Default user')
O8 - Extra context menu item: E&xporter vers Microsoft Excel - res://C:\PROGRA~1\MICROS~2\Office10\EXCEL.EXE/3000
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_07\bin\ssv.dll
O9 - Extra 'Tools' menuitem: Console Java (Sun) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_07\bin\ssv.dll
O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra button: (no name) - Cmdmapping - (no file) (HKCU)
O16 - DPF: {0CCA191D-13A6-4E29-B746-314DEE697D83} (Facebook Photo Uploader 5 Control) - http://upload.facebook.com/controls/2008.10.10_v5.5.8/FacebookPhotoUploader5.cab
O16 - DPF: {9122D757-5A4F-4768-82C5-B4171D8556A7} (PhotoPickConvert Class) - http://appdirectory.messenger.msn.com/AppDirectory/P4Apps/PhotoSwap/PhtPkMSN.cab
O16 - DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} (Shockwave Flash Object) - http://fpdownload2.macromedia.com/get/shockwave/cabs/flash/swflash.cab
O20 - AppInit_DLLs: C:\WINDOWS\system32\timinebe.dll slgeex.dll
O23 - Service: Avira AntiVir Personal - Free Antivirus Scheduler (AntiVirScheduler) - Avira GmbH - C:\Program Files\Avira\AntiVir PersonalEdition Classic\sched.exe
O23 - Service: Avira AntiVir Personal - Free Antivirus Guard (AntiVirService) - Avira GmbH - C:\Program Files\Avira\AntiVir PersonalEdition Classic\avguard.exe
O23 - Service: DU Meter Service (DUMeterSvc) - Hagel Technologies Ltd - C:\Program Files\DU Meter\DUMeterSvc.exe
O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Fichiers communs\InstallShield\Driver\1150\Intel 32\IDriverT.exe
O23 - Service: Norton Ghost - Symantec Corporation - C:\Program Files\Norton Ghost\Agent\VProSvc.exe
O23 - Service: O&O Defrag - O&O Software GmbH - C:\WINDOWS\system32\oodag.exe
O23 - Service: TrueVector Internet Monitor (vsmon) - Zone Labs, LLC - C:\WINDOWS\system32\ZoneLabs\vsmon.exe
0
Destrio5 Messages postés 99820 Date d'inscription   Statut Modérateur Dernière intervention   10 305
 
1/

---> Lance ce fichier : C:\Program Files\trend micro\User.exe

---> Choisis Do a system scan only.

---> Coche les cases qui sont devant les lignes suivantes :

O9 - Extra button: (no name) - Cmdmapping - (no file) (HKCU)

O20 - AppInit_DLLs: C:\WINDOWS\system32\timinebe.dll slgeex.dll

---> Clique en bas sur Fix checked. Mets oui si HijackThis te demande quelque chose.

---> Ferme HijackThis.

2/

---> Désactive ton antivirus le temps de la manipulation car OTMoveIt3 est détecté comme une infection à tort.

---> Télécharge OTMoveIt3 (OldTimer) sur ton Bureau.

---> Double-clique sur OTMoveIt3.exe afin de le lancer.

---> Copie (Ctrl+C) le texte suivant ci-dessous :

:processes
explorer.exe

:files
C:\WINDOWS\system32\8f5def49-.txt

:commands
[purity]
[emptytemp]
[reboot]

---> Colle (Ctrl+V) le texte précédemment copié dans le cadre Paste Instructions for Items to be Moved.

---> Clique maintenant sur le bouton MoveIt! puis ferme OTMoveIt3.

Si un fichier ou dossier ne peut pas être supprimé immédiatement, le logiciel te demandera de redémarrer.
Accepte en cliquant sur YES.

---> Poste le rapport situé dans ce dossier : C:\_OTMoveIt\MovedFiles\
Le nom du rapport correspond au moment de sa création : date_heure.log
0
doubien Messages postés 13 Statut Membre 1
 
========== PROCESSES ==========
Process explorer.exe killed successfully.
========== FILES ==========
C:\WINDOWS\system32\8f5def49-.txt moved successfully.
========== COMMANDS ==========
File delete failed. C:\DOCUME~1\User\LOCALS~1\Temp\etilqs_dr0hDUxFgKgYz1gzpzhc scheduled to be deleted on reboot.
File delete failed. C:\DOCUME~1\User\LOCALS~1\Temp\Perflib_Perfdata_a0c.dat scheduled to be deleted on reboot.
User's Temp folder emptied.
User's Temporary Internet Files folder emptied.
User's Internet Explorer cache folder emptied.
Local Service Temp folder emptied.
File delete failed. C:\Documents and Settings\LocalService\Local Settings\Temporary Internet Files\Content.IE5\index.dat scheduled to be deleted on reboot.
Local Service Temporary Internet Files folder emptied.
File delete failed. C:\WINDOWS\temp\Perflib_Perfdata_178.dat scheduled to be deleted on reboot.
File delete failed. C:\WINDOWS\temp\ZLT07154.TMP scheduled to be deleted on reboot.
File delete failed. C:\WINDOWS\temp\ZLT07157.TMP scheduled to be deleted on reboot.
Windows Temp folder emptied.
Java cache emptied.
File delete failed. C:\Documents and Settings\User\Local Settings\Application Data\Mozilla\Firefox\Profiles\p2alr2y3.default\Cache\_CACHE_001_ scheduled to be deleted on reboot.
File delete failed. C:\Documents and Settings\User\Local Settings\Application Data\Mozilla\Firefox\Profiles\p2alr2y3.default\Cache\_CACHE_002_ scheduled to be deleted on reboot.
File delete failed. C:\Documents and Settings\User\Local Settings\Application Data\Mozilla\Firefox\Profiles\p2alr2y3.default\Cache\_CACHE_003_ scheduled to be deleted on reboot.
File delete failed. C:\Documents and Settings\User\Local Settings\Application Data\Mozilla\Firefox\Profiles\p2alr2y3.default\Cache\_CACHE_MAP_ scheduled to be deleted on reboot.
File delete failed. C:\Documents and Settings\User\Local Settings\Application Data\Mozilla\Firefox\Profiles\p2alr2y3.default\urlclassifier3.sqlite scheduled to be deleted on reboot.
File delete failed. C:\Documents and Settings\User\Local Settings\Application Data\Mozilla\Firefox\Profiles\p2alr2y3.default\XUL.mfl scheduled to be deleted on reboot.
FireFox cache emptied.
Temp folders emptied.

OTMoveIt3 by OldTimer - Version 1.0.8.0 log created on 03062009_074321

Files moved on Reboot...
File C:\DOCUME~1\User\LOCALS~1\Temp\etilqs_dr0hDUxFgKgYz1gzpzhc not found!
File C:\DOCUME~1\User\LOCALS~1\Temp\Perflib_Perfdata_a0c.dat not found!
File move failed. C:\Documents and Settings\LocalService\Local Settings\Temporary Internet Files\Content.IE5\index.dat scheduled to be moved on reboot.
File C:\WINDOWS\temp\Perflib_Perfdata_178.dat not found!
File C:\WINDOWS\temp\ZLT07154.TMP not found!
File C:\WINDOWS\temp\ZLT07157.TMP not found!
C:\Documents and Settings\User\Local Settings\Application Data\Mozilla\Firefox\Profiles\p2alr2y3.default\Cache\_CACHE_001_ moved successfully.
C:\Documents and Settings\User\Local Settings\Application Data\Mozilla\Firefox\Profiles\p2alr2y3.default\Cache\_CACHE_002_ moved successfully.
C:\Documents and Settings\User\Local Settings\Application Data\Mozilla\Firefox\Profiles\p2alr2y3.default\Cache\_CACHE_003_ moved successfully.
C:\Documents and Settings\User\Local Settings\Application Data\Mozilla\Firefox\Profiles\p2alr2y3.default\Cache\_CACHE_MAP_ moved successfully.
C:\Documents and Settings\User\Local Settings\Application Data\Mozilla\Firefox\Profiles\p2alr2y3.default\urlclassifier3.sqlite moved successfully.
C:\Documents and Settings\User\Local Settings\Application Data\Mozilla\Firefox\Profiles\p2alr2y3.default\XUL.mfl moved successfully.
0
Destrio5 Messages postés 99820 Date d'inscription   Statut Modérateur Dernière intervention   10 305
 
---> Désinstalle les deux programmes suivants :
- Java 6 Update 3
- Java 6 Update 7

---> Mets à jour Java.

---> Mets à jour Adobe Reader.

--> Double-clique sur l'icône d'Antivir (Parapluie) dans la barre des tâches.

--> Dans Antivir, choisis Outils puis Configuration.

--> Coche Mode Expert et coche Rech. Rootkit au dém. de la recherche à droite dans Autres réglages.

--> Fais un scan complet et poste le rapport.
0
doubien Messages postés 13 Statut Membre 1
 
Avira AntiVir Personal
Report file date: 6 mars 2009 15:55

Scanning for 1285039 virus strains and unwanted programs.

Licensed to: Avira AntiVir PersonalEdition Classic
Serial number: 0000149996-ADJIE-0001
Platform: Windows XP
Windows version: (Service Pack 3) [5.1.2600]
Boot mode: Normally booted
Username: SYSTEM
Computer name: USER-14CC091BE6

Version information:
BUILD.DAT : 8.2.0.337 16934 Bytes 18/11/2008 13:05:00
AVSCAN.EXE : 8.1.4.10 315649 Bytes 18/11/2008 14:21:26
AVSCAN.DLL : 8.1.4.0 40705 Bytes 26/05/2008 13:56:40
LUKE.DLL : 8.1.4.5 164097 Bytes 12/06/2008 18:44:19
LUKERES.DLL : 8.1.4.0 12033 Bytes 26/05/2008 13:58:52
ANTIVIR0.VDF : 7.1.0.0 15603712 Bytes 27/10/2008 17:30:36
ANTIVIR1.VDF : 7.1.2.12 3336192 Bytes 11/02/2009 02:04:52
ANTIVIR2.VDF : 7.1.2.105 513536 Bytes 03/03/2009 22:33:22
ANTIVIR3.VDF : 7.1.2.128 113664 Bytes 05/03/2009 04:24:31
Engineversion : 8.2.0.105
AEVDF.DLL : 8.1.1.0 106868 Bytes 03/03/2009 02:05:19
AESCRIPT.DLL : 8.1.1.57 356729 Bytes 06/03/2009 04:25:50
AESCN.DLL : 8.1.1.8 127346 Bytes 06/03/2009 04:25:42
AERDL.DLL : 8.1.1.3 438645 Bytes 04/11/2008 19:58:38
AEPACK.DLL : 8.1.3.10 397686 Bytes 06/03/2009 04:25:38
AEOFFICE.DLL : 8.1.0.36 196987 Bytes 03/03/2009 02:05:12
AEHEUR.DLL : 8.1.0.104 1634679 Bytes 06/03/2009 04:25:32
AEHELP.DLL : 8.1.2.2 119158 Bytes 03/03/2009 02:05:03
AEGEN.DLL : 8.1.1.25 336243 Bytes 06/03/2009 04:24:48
AEEMU.DLL : 8.1.0.9 393588 Bytes 14/10/2008 16:05:56
AECORE.DLL : 8.1.6.6 176501 Bytes 03/03/2009 02:05:00
AEBB.DLL : 8.1.0.3 53618 Bytes 14/10/2008 16:05:56
AVWINLL.DLL : 1.0.0.12 15105 Bytes 09/07/2008 14:40:05
AVPREF.DLL : 8.0.2.0 38657 Bytes 16/05/2008 15:28:01
AVREP.DLL : 8.0.0.2 98344 Bytes 31/07/2008 18:02:15
AVREG.DLL : 8.0.0.1 33537 Bytes 09/05/2008 17:26:40
AVARKT.DLL : 1.0.0.23 307457 Bytes 12/02/2008 14:29:23
AVEVTLOG.DLL : 8.0.0.16 119041 Bytes 12/06/2008 18:27:49
SQLITE3.DLL : 3.3.17.1 339968 Bytes 22/01/2008 23:28:02
SMTPLIB.DLL : 1.2.0.23 28929 Bytes 12/06/2008 18:49:40
NETNT.DLL : 8.0.0.1 7937 Bytes 25/01/2008 18:05:10
RCIMAGE.DLL : 8.0.0.51 2371841 Bytes 12/06/2008 19:48:07
RCTEXT.DLL : 8.0.52.0 86273 Bytes 27/06/2008 19:34:37

Configuration settings for the scan:
Jobname..........................: Complete system scan
Configuration file...............: c:\program files\avira\antivir personaledition classic\sysscan.avp
Logging..........................: low
Primary action...................: interactive
Secondary action.................: ignore
Scan master boot sector..........: on
Scan boot sector.................: on
Boot sectors.....................: C:,
Process scan.....................: on
Scan registry....................: on
Search for rootkits..............: on
Scan all files...................: Intelligent file selection
Scan archives....................: on
Recursion depth..................: 20
Smart extensions.................: on
Macro heuristic..................: on
File heuristic...................: medium

Start of the scan: 6 mars 2009 15:55

Starting search for hidden objects.
'43931' objects were checked, '0' hidden objects were found.

The scan of running processes will be started
Scan process 'avscan.exe' - '1' Module(s) have been scanned
Scan process 'avcenter.exe' - '1' Module(s) have been scanned
Scan process 'msiexec.exe' - '1' Module(s) have been scanned
Scan process 'jqs.exe' - '1' Module(s) have been scanned
Scan process 'svchost.exe' - '1' Module(s) have been scanned
Scan process 'firefox.exe' - '1' Module(s) have been scanned
Scan process 'ctfmon.exe' - '1' Module(s) have been scanned
Scan process 'avgnt.exe' - '1' Module(s) have been scanned
Scan process 'zlclient.exe' - '0' Module(s) have been scanned
Scan process 'VProTray.exe' - '1' Module(s) have been scanned
Scan process 'igfxpers.exe' - '1' Module(s) have been scanned
Scan process 'hkcmd.exe' - '1' Module(s) have been scanned
Scan process 'alg.exe' - '1' Module(s) have been scanned
Scan process 'svchost.exe' - '1' Module(s) have been scanned
Scan process 'oodag.exe' - '1' Module(s) have been scanned
Scan process 'VProSvc.exe' - '1' Module(s) have been scanned
Scan process 'DUMeterSvc.exe' - '1' Module(s) have been scanned
Scan process 'avguard.exe' - '1' Module(s) have been scanned
Scan process 'sched.exe' - '1' Module(s) have been scanned
Scan process 'spoolsv.exe' - '1' Module(s) have been scanned
Scan process 'explorer.exe' - '1' Module(s) have been scanned
Scan process 'vsmon.exe' - '0' Module(s) have been scanned
Scan process 'svchost.exe' - '1' Module(s) have been scanned
Scan process 'svchost.exe' - '1' Module(s) have been scanned
Scan process 'svchost.exe' - '1' Module(s) have been scanned
Scan process 'svchost.exe' - '1' Module(s) have been scanned
Scan process 'svchost.exe' - '1' Module(s) have been scanned
Scan process 'lsass.exe' - '1' Module(s) have been scanned
Scan process 'services.exe' - '1' Module(s) have been scanned
Scan process 'winlogon.exe' - '1' Module(s) have been scanned
Scan process 'csrss.exe' - '1' Module(s) have been scanned
Scan process 'smss.exe' - '1' Module(s) have been scanned
30 processes with 30 modules were scanned

Starting master boot sector scan:
Master boot sector HD0
[INFO] No virus was found!

Start scanning boot sectors:
Boot sector 'C:\'
[INFO] No virus was found!

Starting to scan the registry.
The registry was scanned ( '51' files ).

Starting the file scan:

Begin scan in 'C:\'
C:\pagefile.sys
[WARNING] The file could not be opened!
C:\Documents and Settings\User\heheh.exe
[DETECTION] Is the TR/PSW.ZGG.3 Trojan
[NOTE] The file was moved to '4a198e97.qua'!
C:\Program Files\ACD Systems\ACDSee\Crack.exe
[DETECTION] Is the TR/Agent.9414.A Trojan
[NOTE] The file was moved to '4a128f0b.qua'!
C:\Qoobox\Quarantine\C\Documents and Settings\All Users\Application Data\Microsoft\Internet Explorer\DLLs\ieModule.dll.vir
[DETECTION] Is the TR/PCK.Krap.D.847 Trojan
[NOTE] The file was moved to '49fe900f.qua'!
C:\Qoobox\Quarantine\C\Documents and Settings\All Users\Application Data\Microsoft\Internet Explorer\DLLs\moduleie.dll.vir
[DETECTION] Is the TR/Crypt.XPACK.Gen Trojan
[NOTE] The file was moved to '4a15901a.qua'!
C:\Qoobox\Quarantine\C\Program Files\Spyware Guard 2008\spywareguard.exe.vir
[DETECTION] Is the TR/Fakealert.akv.6 Trojan
[NOTE] The file was moved to '4a2a901d.qua'!
C:\Qoobox\Quarantine\C\Program Files\Spyware Guard 2008\uninstall.exe.vir
[DETECTION] Contains a recognition pattern of the (harmful) BDS/Hupigon.Gen back-door program
[NOTE] The file was moved to '4a1a901c.qua'!
C:\Qoobox\Quarantine\C\resycled\boot.com.vir
[DETECTION] Is the TR/Crypt.XPACK.Gen Trojan
[NOTE] The file was moved to '4a20901e.qua'!
C:\Qoobox\Quarantine\C\WINDOWS\fxstaller.exe.vir
[DETECTION] Contains recognition pattern of the WORM/IrcBot.24576.18 worm
[NOTE] The file was moved to '4a249027.qua'!
C:\Qoobox\Quarantine\C\WINDOWS\system32\fnpblglg.dll.vir
[DETECTION] Is the TR/Vundo.Gen Trojan
[NOTE] The file was moved to '4a21901f.qua'!
C:\Qoobox\Quarantine\C\WINDOWS\system32\hajigira.dll.vir
[DETECTION] Is the TR/Vundo.Gen Trojan
[NOTE] The file was moved to '4a1b9012.qua'!
C:\Qoobox\Quarantine\C\WINDOWS\system32\ieupdates.exe.vir
[DETECTION] Is the TR/Fakealert.HA Trojan
[NOTE] The file was moved to '4a269016.qua'!
C:\Qoobox\Quarantine\C\WINDOWS\system32\jpijkx.dll.vir
[DETECTION] Is the TR/Vundo.Gen Trojan
[NOTE] The file was moved to '4a1a9022.qua'!
C:\Qoobox\Quarantine\C\WINDOWS\system32\kdoer.exe.vir
[DETECTION] Is the TR/Dropper.Gen Trojan
[NOTE] The file was moved to '4a209016.qua'!
C:\Qoobox\Quarantine\C\WINDOWS\system32\rqRLcAQK.dll.vir
[DETECTION] Is the TR/Crypt.XPACK.Gen Trojan
[NOTE] The file was moved to '4a039023.qua'!
C:\Qoobox\Quarantine\C\WINDOWS\system32\ruupmfsa.dll.vir
[DETECTION] Is the TR/Vundo.Gen Trojan
[NOTE] The file was moved to '4a269028.qua'!
C:\Qoobox\Quarantine\C\WINDOWS\system32\slgeex.dll.vir.vir
[DETECTION] Is the TR/Vundo.Gen Trojan
[NOTE] The file was moved to '4a18901f.qua'!
C:\Qoobox\Quarantine\C\WINDOWS\system32\telowewa.dll.vir
[DETECTION] Is the TR/Vundo.Gen Trojan
[NOTE] The file was moved to '4a1d9018.qua'!
C:\Qoobox\Quarantine\C\WINDOWS\system32\timinebe.dll.vir.vir
[DETECTION] Is the TR/Vundo.Gen Trojan
[NOTE] The file was moved to '4a1e901d.qua'!
C:\Qoobox\Quarantine\C\WINDOWS\system32\urqOHARJ.dll.vir
[DETECTION] Is the TR/Trash.Gen Trojan
[NOTE] The file was moved to '4a229026.qua'!
C:\Qoobox\Quarantine\C\WINDOWS\system32\wgknfufs.dll.vir
[DETECTION] Is the TR/Vundo.Gen Trojan
[NOTE] The file was moved to '4a1c901b.qua'!
C:\Qoobox\Quarantine\C\WINDOWS\system32\winscenter.exe.vir
[DETECTION] Is the TR/PCK.Krap.D.852 Trojan
[NOTE] The file was moved to '4a1f901e.qua'!
C:\Qoobox\Quarantine\C\WINDOWS\system32\_urqOHARJ_.dll.zip
[0] Archive type: ZIP
--> urqOHARJ.dll
[DETECTION] Is the TR/Crypt.XPACK.Gen Trojan
[NOTE] The file was moved to '4a23902a.qua'!
C:\Qoobox\Quarantine\C\WINDOWS\system32\drivers\TDSSpqxt.sys.vir
[DETECTION] Is the TR/Rootkit.Gen Trojan
[NOTE] The file was moved to '4a048ffa.qua'!
C:\System Volume Information\_restore{E270CE50-7F26-4997-AF90-F7F19E52717D}\RP150\A0031809.exe
[DETECTION] Contains recognition pattern of the DR/Delphi.Gen dropper
[NOTE] The file was moved to '49e18ff6.qua'!
C:\System Volume Information\_restore{E270CE50-7F26-4997-AF90-F7F19E52717D}\RP150\A0031810.dll
[DETECTION] Is the TR/Crypt.XPACK.Gen Trojan
[NOTE] The file was moved to '48621a37.qua'!
C:\System Volume Information\_restore{E270CE50-7F26-4997-AF90-F7F19E52717D}\RP150\A0031811.dll
[DETECTION] Is the TR/Crypt.XPACK.Gen Trojan
[NOTE] The file was moved to '49e18ff7.qua'!
C:\System Volume Information\_restore{E270CE50-7F26-4997-AF90-F7F19E52717D}\RP150\A0031812.dll
[DETECTION] Is the TR/Crypt.XPACK.Gen Trojan
[NOTE] The file was moved to '48621a38.qua'!
C:\System Volume Information\_restore{E270CE50-7F26-4997-AF90-F7F19E52717D}\RP150\A0031813.dll
[DETECTION] Is the TR/Crypt.XPACK.Gen Trojan
[NOTE] The file was moved to '49e18ff9.qua'!
C:\System Volume Information\_restore{E270CE50-7F26-4997-AF90-F7F19E52717D}\RP150\A0031814.dll
[DETECTION] Is the TR/Crypt.XPACK.Gen Trojan
[NOTE] The file was moved to '48621a3a.qua'!
C:\System Volume Information\_restore{E270CE50-7F26-4997-AF90-F7F19E52717D}\RP150\A0031815.dll
[DETECTION] Is the TR/Crypt.XPACK.Gen Trojan
[NOTE] The file was moved to '49e18ff8.qua'!
C:\System Volume Information\_restore{E270CE50-7F26-4997-AF90-F7F19E52717D}\RP150\A0031816.dll
[DETECTION] Is the TR/Crypt.XPACK.Gen Trojan
[NOTE] The file was moved to '48621a39.qua'!
C:\System Volume Information\_restore{E270CE50-7F26-4997-AF90-F7F19E52717D}\RP150\A0031817.dll
[DETECTION] Is the TR/Crypt.XPACK.Gen Trojan
[NOTE] The file was moved to '49e18ffa.qua'!
C:\System Volume Information\_restore{E270CE50-7F26-4997-AF90-F7F19E52717D}\RP150\A0031818.dll
[DETECTION] Is the TR/Crypt.XPACK.Gen Trojan
[NOTE] The file was moved to '48621a3b.qua'!
C:\System Volume Information\_restore{E270CE50-7F26-4997-AF90-F7F19E52717D}\RP150\A0031819.dll
[DETECTION] Is the TR/Crypt.XPACK.Gen Trojan
[NOTE] The file was moved to '49e18ffb.qua'!
C:\System Volume Information\_restore{E270CE50-7F26-4997-AF90-F7F19E52717D}\RP150\A0031820.dll
[DETECTION] Is the TR/Crypt.XPACK.Gen Trojan
[NOTE] The file was moved to '48621a3c.qua'!
C:\System Volume Information\_restore{E270CE50-7F26-4997-AF90-F7F19E52717D}\RP150\A0031821.dll
[DETECTION] Is the TR/Vundo.Gen Trojan
[NOTE] The file was moved to '49e18ffd.qua'!
C:\System Volume Information\_restore{E270CE50-7F26-4997-AF90-F7F19E52717D}\RP150\A0031823.dll
[DETECTION] Is the TR/Vundo.Gen Trojan
[NOTE] The file was moved to '49e18ffc.qua'!
C:\System Volume Information\_restore{E270CE50-7F26-4997-AF90-F7F19E52717D}\RP150\A0031824.dll
[DETECTION] Is the TR/Vundo.Gen Trojan
[NOTE] The file was moved to '48621a3d.qua'!
C:\System Volume Information\_restore{E270CE50-7F26-4997-AF90-F7F19E52717D}\RP150\A0031825.dll
[DETECTION] Is the TR/Vundo.Gen Trojan
[NOTE] The file was moved to '49e18ffe.qua'!
C:\System Volume Information\_restore{E270CE50-7F26-4997-AF90-F7F19E52717D}\RP150\A0031826.dll
[DETECTION] Is the TR/Vundo.Gen Trojan
[NOTE] The file was moved to '48621a3f.qua'!
C:\System Volume Information\_restore{E270CE50-7F26-4997-AF90-F7F19E52717D}\RP150\A0031827.dll
[DETECTION] Is the TR/Vundo.Gen Trojan
[NOTE] The file was moved to '48621a3e.qua'!
C:\System Volume Information\_restore{E270CE50-7F26-4997-AF90-F7F19E52717D}\RP150\A0031828.dll
[DETECTION] Is the TR/Vundo.Gen Trojan
[NOTE] The file was moved to '49e18fff.qua'!
C:\System Volume Information\_restore{E270CE50-7F26-4997-AF90-F7F19E52717D}\RP150\A0031829.dll
[DETECTION] Is the TR/Vundo.Gen Trojan
[NOTE] The file was moved to '486205c0.qua'!
C:\System Volume Information\_restore{E270CE50-7F26-4997-AF90-F7F19E52717D}\RP151\A0031939.dll
[DETECTION] Is the TR/Vundo.Gen Trojan
[NOTE] The file was moved to '49e19004.qua'!
C:\System Volume Information\_restore{E270CE50-7F26-4997-AF90-F7F19E52717D}\RP151\A0031940.dll
[DETECTION] Is the TR/Vundo.Gen Trojan
[NOTE] The file was moved to '486205c5.qua'!
C:\System Volume Information\_restore{E270CE50-7F26-4997-AF90-F7F19E52717D}\RP151\A0031941.dll
[DETECTION] Is the TR/Vundo.Gen Trojan
[NOTE] The file was moved to '49e19006.qua'!
C:\System Volume Information\_restore{E270CE50-7F26-4997-AF90-F7F19E52717D}\RP151\A0031942.dll
[DETECTION] Is the TR/Vundo.Gen Trojan
[NOTE] The file was moved to '49e19005.qua'!
C:\System Volume Information\_restore{E270CE50-7F26-4997-AF90-F7F19E52717D}\RP151\A0031943.dll
[DETECTION] Is the TR/Vundo.Gen Trojan
[NOTE] The file was moved to '486205c6.qua'!
C:\System Volume Information\_restore{E270CE50-7F26-4997-AF90-F7F19E52717D}\RP151\A0031994.dll
[DETECTION] Contains a recognition pattern of the (harmful) BDS/TDSS.adb back-door program
[NOTE] The file was moved to '49e19007.qua'!
C:\System Volume Information\_restore{E270CE50-7F26-4997-AF90-F7F19E52717D}\RP151\A0031995.dll
[DETECTION] Is the TR/Drop.Softomat.AN Trojan
[NOTE] The file was moved to '49e19008.qua'!
C:\System Volume Information\_restore{E270CE50-7F26-4997-AF90-F7F19E52717D}\RP151\A0031996.dll
[DETECTION] Is the TR/Trash.Gen Trojan
[NOTE] The file was moved to '486205c9.qua'!
C:\System Volume Information\_restore{E270CE50-7F26-4997-AF90-F7F19E52717D}\RP151\A0032093.dll
[DETECTION] Is the TR/Vundo.Gen Trojan
[NOTE] The file was moved to '49e19009.qua'!
C:\System Volume Information\_restore{E270CE50-7F26-4997-AF90-F7F19E52717D}\RP157\A0032781.exe
[DETECTION] Is the TR/PSW.ZGG.3 Trojan
[NOTE] The file was moved to '49e19024.qua'!
C:\System Volume Information\_restore{E270CE50-7F26-4997-AF90-F7F19E52717D}\RP157\A0032782.exe
[DETECTION] Is the TR/Agent.9414.A Trojan
[NOTE] The file was moved to '486205e5.qua'!

End of the scan: 6 mars 2009 16:16
Used time: 21:10 Minute(s)

The scan has been done completely.

4041 Scanning directories
118814 Files were scanned
54 viruses and/or unwanted programs were found
0 Files were classified as suspicious:
0 files were deleted
0 files were repaired
54 files were moved to quarantine
0 files were renamed
1 Files cannot be scanned
118759 Files not concerned
838 Archives were scanned
1 Warnings
54 Notes
43931 Objects were scanned with rootkit scan
0 Hidden objects were found
0
Destrio5 Messages postés 99820 Date d'inscription   Statut Modérateur Dernière intervention   10 305
 
---> Refais un scan RSIT et poste le rapport log.
0
doubien Messages postés 13 Statut Membre 1
 
me revoila !!!

Logfile of random's system information tool 1.05 (written by random/random)
Run by User at 2009-03-14 18:51:57
Microsoft Windows XP Professionnel Service Pack 3
System drive C: has 30 GB (79%) free of 38 GB
Total RAM: 495 MB (34% free)

Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 18:52:08, on 2009-03-14
Platform: Windows XP SP3 (WinNT 5.01.2600)
MSIE: Internet Explorer v7.00 (7.00.6000.16791)
Boot mode: Normal

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\ZoneLabs\vsmon.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\Avira\AntiVir PersonalEdition Classic\sched.exe
C:\Program Files\Avira\AntiVir PersonalEdition Classic\avguard.exe
C:\Program Files\DU Meter\DUMeterSvc.exe
C:\Program Files\Java\jre6\bin\jqs.exe
C:\Program Files\Norton Ghost\Agent\VProSvc.exe
C:\WINDOWS\system32\oodag.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\system32\hkcmd.exe
C:\WINDOWS\system32\igfxpers.exe
C:\Program Files\Norton Ghost\Agent\VProTray.exe
C:\Program Files\Zone Labs\ZoneAlarm\zlclient.exe
C:\Program Files\Avira\AntiVir PersonalEdition Classic\avgnt.exe
C:\Program Files\Java\jre6\bin\jusched.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Documents and Settings\User\Bureau\RSIT.exe
C:\Program Files\trend micro\User.exe

R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = https://www.bing.com/?toHttps=1&redig=5FC791212101479BAFBE1A679848B1AF
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = https://www.msn.com/fr-fr
R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName = Liens
O2 - BHO: AcroIEHelperStub - {18DF081C-E8AD-4283-A596-FA578C2EBDC3} - C:\Program Files\Fichiers communs\Adobe\Acrobat\ActiveX\AcroIEHelperShim.dll
O2 - BHO: Java(tm) Plug-In 2 SSV Helper - {DBC80044-A445-435b-BC74-9C25C1C588A9} - C:\Program Files\Java\jre6\bin\jp2ssv.dll
O2 - BHO: JQSIEStartDetectorImpl - {E7E6F031-17CE-4C07-BC86-EABFE594F69C} - C:\Program Files\Java\jre6\lib\deploy\jqs\ie\jqs_plugin.dll
O4 - HKLM\..\Run: [IgfxTray] C:\WINDOWS\system32\igfxtray.exe
O4 - HKLM\..\Run: [HotKeysCmds] C:\WINDOWS\system32\hkcmd.exe
O4 - HKLM\..\Run: [Persistence] C:\WINDOWS\system32\igfxpers.exe
O4 - HKLM\..\Run: [Norton Ghost 12.0] "C:\Program Files\Norton Ghost\Agent\VProTray.exe"
O4 - HKLM\..\Run: [ZoneAlarm Client] "C:\Program Files\Zone Labs\ZoneAlarm\zlclient.exe"
O4 - HKLM\..\Run: [avgnt] "C:\Program Files\Avira\AntiVir PersonalEdition Classic\avgnt.exe" /min
O4 - HKLM\..\Run: [SunJavaUpdateSched] "C:\Program Files\Java\jre6\bin\jusched.exe"
O4 - HKLM\..\Run: [Adobe Reader Speed Launcher] "C:\Program Files\Adobe\Reader 9.0\Reader\Reader_sl.exe"
O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
O4 - HKUS\S-1-5-18\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'SYSTEM')
O4 - HKUS\.DEFAULT\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'Default user')
O8 - Extra context menu item: E&xporter vers Microsoft Excel - res://C:\PROGRA~1\MICROS~2\Office10\EXCEL.EXE/3000
O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O16 - DPF: {0CCA191D-13A6-4E29-B746-314DEE697D83} (Facebook Photo Uploader 5 Control) - http://upload.facebook.com/controls/2008.10.10_v5.5.8/FacebookPhotoUploader5.cab
O16 - DPF: {9122D757-5A4F-4768-82C5-B4171D8556A7} (PhotoPickConvert Class) - http://appdirectory.messenger.msn.com/AppDirectory/P4Apps/PhotoSwap/PhtPkMSN.cab
O16 - DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} (Shockwave Flash Object) - http://fpdownload2.macromedia.com/get/shockwave/cabs/flash/swflash.cab
O23 - Service: Avira AntiVir Personal - Free Antivirus Scheduler (AntiVirScheduler) - Avira GmbH - C:\Program Files\Avira\AntiVir PersonalEdition Classic\sched.exe
O23 - Service: Avira AntiVir Personal - Free Antivirus Guard (AntiVirService) - Avira GmbH - C:\Program Files\Avira\AntiVir PersonalEdition Classic\avguard.exe
O23 - Service: DU Meter Service (DUMeterSvc) - Hagel Technologies Ltd - C:\Program Files\DU Meter\DUMeterSvc.exe
O23 - Service: getPlus(R) Helper - NOS Microsystems Ltd. - C:\Program Files\NOS\bin\getPlus_HelperSvc.exe
O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Fichiers communs\InstallShield\Driver\1150\Intel 32\IDriverT.exe
O23 - Service: Java Quick Starter (JavaQuickStarterService) - Sun Microsystems, Inc. - C:\Program Files\Java\jre6\bin\jqs.exe
O23 - Service: Norton Ghost - Symantec Corporation - C:\Program Files\Norton Ghost\Agent\VProSvc.exe
O23 - Service: O&O Defrag - O&O Software GmbH - C:\WINDOWS\system32\oodag.exe
O23 - Service: TrueVector Internet Monitor (vsmon) - Zone Labs, LLC - C:\WINDOWS\system32\ZoneLabs\vsmon.exe
0
Destrio5 Messages postés 99820 Date d'inscription   Statut Modérateur Dernière intervention   10 305
 
1/

---> Désinstalle HijackThis.

---> Télécharge ToolsCleaner2 sur ton Bureau.
* Double-clique sur ToolsCleaner2.exe pour le lancer.
* Clique sur Recherche et laisse le scan agir.
* Clique sur Suppression pour finaliser.
* Tu peux, si tu le souhaites, te servir des Options Facultatives.
* Clique sur Quitter pour obtenir le rapport.
* Poste le rapport (TCleaner.txt) qui se trouve à la racine de ton disque dur (C:\).

2/

---> Télécharge et installe CCleaner Slim.
* Lance-le. Va dans Options puis Avancé et décoche la case Effacer uniquement les fichiers etc....
* Va dans Nettoyeur, choisis Analyse. Une fois terminé, lance le nettoyage.
* Ensuite, choisis Registre, puis Chercher des erreurs. Une fois terminé, répare toutes les erreurs (Sauvegarde la base de registre).

3/

---> Il est nécessaire de désactiver puis réactiver la restauration système pour la purger.

---> Je te conseille de créer un point de restauration que tu pourras utiliser plus tard si tu as un problème.

==Prévention==

Conserve MBAM. Il te servira à scanner les fichiers douteux en complément de l'antivirus et scanne le disque dur régulièrement.

Comme navigateur, utilise plutôt Mozilla Firefox qu'Internet Explorer. Tu peux utiliser l'extension NoScript pour plus de sécurité.

Vérifie que les mises à jour automatiques sont bien activées (Menu Démarrer, clique droit sur Poste de travail, onglet Mises à jour automatiques).

Tu peux aussi modifier le fichier Hosts pour améliorer la sécurité de ton PC : Lien

Par rapport au P2P : Lien

Voici un dossier complet (A lire avec Adobe Reader ou Foxit Reader) : Lien

Sois plus vigilant(e) sur Internet ;)
0