Trojan + 23 infections
Résolu
fraggle559
Messages postés
335
Statut
Membre
-
Utilisateur anonyme -
Utilisateur anonyme -
Bonjour,
J'ai pris un virus en cliquant sur un lien envoyé sur msn.
Je me retrouve avec 23 infections et plusieurs Trojan.
J'ai passé Malwarebytes 2 fois et Antivir.
Je vous poste les rapports ici pour avoir de l'aide pour terminer le nettoyage.
1 ER NETTOYAGE
Malwarebytes' Anti-Malware 1.35
Version de la base de données: 1917
Windows 5.1.2600 Service Pack 2
13/05/2009 19:40:05
mbam-log-2009-05-13 (19-39-33).txt
Type de recherche: Examen complet (C:\|)
Eléments examinés: 154306
Temps écoulé: 34 minute(s), 40 second(s)
Processus mémoire infecté(s): 0
Module(s) mémoire infecté(s): 0
Clé(s) du Registre infectée(s): 0
Valeur(s) du Registre infectée(s): 2
Elément(s) de données du Registre infecté(s): 1
Dossier(s) infecté(s): 0
Fichier(s) infecté(s): 1
Processus mémoire infecté(s):
(Aucun élément nuisible détecté)
Module(s) mémoire infecté(s):
(Aucun élément nuisible détecté)
Clé(s) du Registre infectée(s):
(Aucun élément nuisible détecté)
Valeur(s) du Registre infectée(s):
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\rirawapola (Trojan.Agent) -> No action taken.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows UDP Control Center (Backdoor.Bot) -> No action taken.
Elément(s) de données du Registre infecté(s):
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\UpdatesDisableNotify (Disabled.SecurityCenter) -> Bad: (1) Good: (0) -> No action taken.
Dossier(s) infecté(s):
(Aucun élément nuisible détecté)
Fichier(s) infecté(s):
C:\WINDOWS\system32\soveveje.dll (Trojan.Agent) -> No action taken.
2EME NETTOYAGE
Malwarebytes' Anti-Malware 1.35
Version de la base de données: 1917
Windows 5.1.2600 Service Pack 2
13/05/2009 21:16:12
mbam-log-2009-05-13 (21-16-06).txt
Type de recherche: Examen complet (C:\|)
Eléments examinés: 154626
Temps écoulé: 41 minute(s), 56 second(s)
Processus mémoire infecté(s): 0
Module(s) mémoire infecté(s): 4
Clé(s) du Registre infectée(s): 7
Valeur(s) du Registre infectée(s): 5
Elément(s) de données du Registre infecté(s): 6
Dossier(s) infecté(s): 0
Fichier(s) infecté(s): 6
Processus mémoire infecté(s):
(Aucun élément nuisible détecté)
Module(s) mémoire infecté(s):
C:\WINDOWS\system32\kugeyugu.dll (Trojan.Vundo.H) -> No action taken.
C:\WINDOWS\system32\yizesoko.dll (Trojan.Vundo.H) -> No action taken.
C:\WINDOWS\system32\vabofoka.dll (Trojan.Vundo.H) -> No action taken.
c:\WINDOWS\system32\pogobiwu.dll (Trojan.Vundo.H) -> No action taken.
Clé(s) du Registre infectée(s):
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{499e9650-0baa-4087-9c29-6a5000dba20c} (Trojan.Vundo.H) -> No action taken.
HKEY_CLASSES_ROOT\CLSID\{499e9650-0baa-4087-9c29-6a5000dba20c} (Trojan.Vundo.H) -> No action taken.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{499e9650-0baa-4087-9c29-6a5000dba20c} (Trojan.Vundo.H) -> No action taken.
HKEY_CLASSES_ROOT\CLSID\{ec43e3fd-5c60-46a6-97d7-e0b85dbdd6c4} (Trojan.Vundo.H) -> No action taken.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\contim (Trojan.Vundo) -> No action taken.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\dslcnnct (Trojan.Vundo) -> No action taken.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\rdfa (Trojan.Vundo) -> No action taken.
Valeur(s) du Registre infectée(s):
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\320d18a1 (Trojan.Vundo.H) -> No action taken.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cpm313e2b3d (Trojan.Vundo.H) -> No action taken.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\rirawapola (Trojan.Vundo.H) -> No action taken.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler\{ec43e3fd-5c60-46a6-97d7-e0b85dbdd6c4} (Trojan.Vundo.H) -> No action taken.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\ssodl (Trojan.Vundo.H) -> No action taken.
Elément(s) de données du Registre infecté(s):
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows\AppInit_DLLs (Trojan.Vundo.H) -> Data: c:\windows\system32\vabofoka.dll -> No action taken.
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\LSA\Notification Packages (Trojan.Vundo.H) -> Data: c:\windows\system32\vabofoka.dll -> No action taken.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows\AppInit_DLLs (Trojan.Vundo.H) -> Data: system32\vabofoka.dll -> No action taken.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows\AppInit_DLLs (Trojan.Vundo.H) -> Data: c:\windows\system32\pogobiwu.dll -> No action taken.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows\AppInit_DLLs (Trojan.Vundo.H) -> Data: system32\pogobiwu.dll -> No action taken.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\UpdatesDisableNotify (Disabled.SecurityCenter) -> Bad: (1) Good: (0) -> No action taken.
Dossier(s) infecté(s):
(Aucun élément nuisible détecté)
Fichier(s) infecté(s):
C:\WINDOWS\system32\kugeyugu.dll (Trojan.Vundo.H) -> No action taken.
C:\WINDOWS\system32\uguyeguk.ini (Trojan.Vundo.H) -> No action taken.
c:\WINDOWS\system32\pogobiwu.dll (Trojan.Vundo.H) -> No action taken.
C:\WINDOWS\system32\yizesoko.dll (Trojan.Vundo.H) -> No action taken.
C:\WINDOWS\system32\vabofoka.dll (Trojan.Vundo.H) -> No action taken.
C:\System Volume Information\_restore{4081E8B6-077E-420E-8973-EE0643E83BA3}\RP650\A0108179.dll (Trojan.Vundo.H) -> No action taken.
NETTOYAGE ANTIVIR
Avira AntiVir Personal
Report file date: mercredi 13 mai 2009 21:21
Scanning for 1392690 virus strains and unwanted programs.
Licensed to: Avira AntiVir PersonalEdition Classic
Serial number: 0000149996-ADJIE-0001
Platform: Windows XP
Windows version: (Service Pack 2) [5.1.2600]
Boot mode: Normally booted
Username: SYSTEM
Computer name: LAURA
Version information:
BUILD.DAT : 8.2.0.348 16934 Bytes 23/03/2009 13:44:00
AVSCAN.EXE : 8.1.4.10 315649 Bytes 26/11/2008 17:34:24
AVSCAN.DLL : 8.1.4.0 40705 Bytes 26/05/2008 07:56:42
LUKE.DLL : 8.1.4.5 164097 Bytes 12/06/2008 12:44:20
LUKERES.DLL : 8.1.4.0 12033 Bytes 26/05/2008 07:58:54
ANTIVIR0.VDF : 7.1.0.0 15603712 Bytes 27/10/2008 16:38:28
ANTIVIR1.VDF : 7.1.2.12 3336192 Bytes 11/02/2009 12:09:22
ANTIVIR2.VDF : 7.1.3.185 2010112 Bytes 12/05/2009 17:29:08
ANTIVIR3.VDF : 7.1.3.199 70656 Bytes 13/05/2009 17:20:48
Engineversion : 8.2.0.166
AEVDF.DLL : 8.1.1.1 106868 Bytes 03/05/2009 17:18:28
AESCRIPT.DLL : 8.1.1.81 385401 Bytes 08/05/2009 17:20:00
AESCN.DLL : 8.1.1.10 127348 Bytes 04/04/2009 13:17:12
AERDL.DLL : 8.1.1.3 438645 Bytes 05/11/2008 17:33:36
AEPACK.DLL : 8.1.3.16 397686 Bytes 08/05/2009 17:19:58
AEOFFICE.DLL : 8.1.0.36 196987 Bytes 27/02/2009 12:07:28
AEHEUR.DLL : 8.1.0.128 1757559 Bytes 08/05/2009 17:19:56
AEHELP.DLL : 8.1.2.2 119158 Bytes 27/02/2009 12:07:28
AEGEN.DLL : 8.1.1.42 348531 Bytes 08/05/2009 17:19:50
AEEMU.DLL : 8.1.0.9 393588 Bytes 15/10/2008 17:23:26
AECORE.DLL : 8.1.6.9 176500 Bytes 14/04/2009 17:08:52
AEBB.DLL : 8.1.0.3 53618 Bytes 15/10/2008 17:23:18
AVWINLL.DLL : 1.0.0.12 15105 Bytes 09/07/2008 08:40:06
AVPREF.DLL : 8.0.2.0 38657 Bytes 16/05/2008 09:28:02
AVREP.DLL : 8.0.0.3 155688 Bytes 22/04/2009 17:09:24
AVREG.DLL : 8.0.0.1 33537 Bytes 09/05/2008 11:26:42
AVARKT.DLL : 1.0.0.23 307457 Bytes 12/02/2008 08:29:24
AVEVTLOG.DLL : 8.0.0.16 119041 Bytes 12/06/2008 12:27:50
SQLITE3.DLL : 3.3.17.1 339968 Bytes 22/01/2008 17:28:04
SMTPLIB.DLL : 1.2.0.23 28929 Bytes 12/06/2008 12:49:42
NETNT.DLL : 8.0.0.1 7937 Bytes 25/01/2008 12:05:12
RCIMAGE.DLL : 8.0.0.51 2371841 Bytes 12/06/2008 13:48:08
RCTEXT.DLL : 8.0.52.0 86273 Bytes 27/06/2008 13:34:38
Configuration settings for the scan:
Jobname..........................: Complete system scan
Configuration file...............: c:\program files\avira\antivir personaledition classic\sysscan.avp
Logging..........................: low
Primary action...................: interactive
Secondary action.................: ignore
Scan master boot sector..........: on
Scan boot sector.................: on
Boot sectors.....................: C:,
Process scan.....................: on
Scan registry....................: on
Search for rootkits..............: on
Scan all files...................: All files
Scan archives....................: on
Recursion depth..................: 20
Smart extensions.................: on
Macro heuristic..................: on
File heuristic...................: high
Start of the scan: mercredi 13 mai 2009 21:21
Starting search for hidden objects.
'64657' objects were checked, '0' hidden objects were found.
The scan of running processes will be started
Scan process 'avscan.exe' - '1' Module(s) have been scanned
Scan process 'avcenter.exe' - '1' Module(s) have been scanned
Scan process 'WSCNTFY.EXE' - '1' Module(s) have been scanned
Scan process 'KHALMNPR.EXE' - '1' Module(s) have been scanned
Scan process 'SetPoint.exe' - '1' Module(s) have been scanned
Scan process 'SVCHOST.EXE' - '1' Module(s) have been scanned
Scan process 'CTFMON.EXE' - '1' Module(s) have been scanned
Scan process 'PINMENU.EXE' - '1' Module(s) have been scanned
Scan process 'MSMSGS.EXE' - '1' Module(s) have been scanned
Scan process 'LogitechDesktopMessenger.exe' - '1' Module(s) have been scanned
Scan process 'SweetIM.exe' - '1' Module(s) have been scanned
Scan process 'BTLiveUpdate.exe' - '1' Module(s) have been scanned
Scan process 'reader_sl.exe' - '1' Module(s) have been scanned
Scan process 'vVX1000.exe' - '1' Module(s) have been scanned
Scan process 'AVGNT.EXE' - '1' Module(s) have been scanned
Scan process 'PIFSvc.exe' - '1' Module(s) have been scanned
Scan process 'RUNDLL32.EXE' - '1' Module(s) have been scanned
Scan process 'InCD.exe' - '1' Module(s) have been scanned
Scan process 'PDVDServ.exe' - '1' Module(s) have been scanned
Scan process 'SOUNDMAN.EXE' - '1' Module(s) have been scanned
Scan process 'ALG.EXE' - '1' Module(s) have been scanned
Scan process 'SVCHOST.EXE' - '1' Module(s) have been scanned
Scan process 'MSCamS32.exe' - '1' Module(s) have been scanned
Scan process 'PIFSvc.exe' - '1' Module(s) have been scanned
Scan process 'CISVC.EXE' - '1' Module(s) have been scanned
Scan process 'SVCHOST.EXE' - '1' Module(s) have been scanned
Scan process 'AVGUARD.EXE' - '1' Module(s) have been scanned
Scan process 'SVCHOST.EXE' - '1' Module(s) have been scanned
Scan process 'SCHED.EXE' - '1' Module(s) have been scanned
Scan process 'SPOOLSV.EXE' - '1' Module(s) have been scanned
Scan process 'EXPLORER.EXE' - '1' Module(s) have been scanned
Scan process 'SVCHOST.EXE' - '1' Module(s) have been scanned
Scan process 'SVCHOST.EXE' - '1' Module(s) have been scanned
Scan process 'InCDsrv.exe' - '1' Module(s) have been scanned
Scan process 'SVCHOST.EXE' - '1' Module(s) have been scanned
Scan process 'SVCHOST.EXE' - '1' Module(s) have been scanned
Scan process 'SVCHOST.EXE' - '1' Module(s) have been scanned
Scan process 'LSASS.EXE' - '1' Module(s) have been scanned
Scan process 'SERVICES.EXE' - '1' Module(s) have been scanned
Scan process 'WINLOGON.EXE' - '1' Module(s) have been scanned
Scan process 'CSRSS.EXE' - '1' Module(s) have been scanned
Scan process 'SMSS.EXE' - '1' Module(s) have been scanned
42 processes with 42 modules were scanned
Starting master boot sector scan:
Master boot sector HD0
[INFO] No virus was found!
Master boot sector HD1
[INFO] No virus was found!
[WARNING] System error [21]: Le périphérique n'est pas prêt.
Master boot sector HD2
[INFO] No virus was found!
[WARNING] System error [21]: Le périphérique n'est pas prêt.
Master boot sector HD3
[INFO] No virus was found!
[WARNING] System error [21]: Le périphérique n'est pas prêt.
Master boot sector HD4
[INFO] No virus was found!
[WARNING] System error [21]: Le périphérique n'est pas prêt.
Start scanning boot sectors:
Boot sector 'C:\'
[INFO] No virus was found!
Starting to scan the registry.
The registry was scanned ( '65' files ).
Starting the file scan:
Begin scan in 'C:\' <ACER>
C:\pagefile.sys
[WARNING] The file could not be opened!
C:\hiberfil.sys
[WARNING] The file could not be opened!
C:\sfide.exe
[DETECTION] Is the TR/Vundo.Gen Trojan
[NOTE] The file was moved to '4a741e72.qua'!
C:\Documents and Settings\13\Local Settings\Temporary Internet Files\Content.IE5\B60QRGWM\is[1].jpg
[DETECTION] Is the TR/Vundo.Gen Trojan
[NOTE] The file was moved to '4a6624a5.qua'!
C:\System Volume Information\_restore{4081E8B6-077E-420E-8973-EE0643E83BA3}\RP650\A0107213.exe
[DETECTION] Is the TR/Vundo.Gen Trojan
[NOTE] The file was moved to '4a3c28d9.qua'!
C:\System Volume Information\_restore{4081E8B6-077E-420E-8973-EE0643E83BA3}\RP650\A0109190.dll
[DETECTION] Is the TR/Vundo.Gen Trojan
[NOTE] The file was moved to '4a3c28dd.qua'!
C:\System Volume Information\_restore{4081E8B6-077E-420E-8973-EE0643E83BA3}\RP650\A0109192.dll
[DETECTION] Is the TR/Vundo.Gen Trojan
[NOTE] The file was moved to '4a3c28df.qua'!
C:\System Volume Information\_restore{4081E8B6-077E-420E-8973-EE0643E83BA3}\RP650\A0109193.dll
[DETECTION] Is the TR/Vundo.Gen Trojan
[NOTE] The file was moved to '4a3c28e2.qua'!
C:\System Volume Information\_restore{4081E8B6-077E-420E-8973-EE0643E83BA3}\RP650\A0109194.dll
[DETECTION] Is the TR/Vundo.Gen Trojan
[NOTE] The file was moved to '4a3c28e4.qua'!
C:\System Volume Information\_restore{4081E8B6-077E-420E-8973-EE0643E83BA3}\RP650\A0109200.exe
[DETECTION] Is the TR/Vundo.Gen Trojan
[NOTE] The file was moved to '4a3c28e7.qua'!
End of the scan: mercredi 13 mai 2009 22:08
Used time: 47:12 Minute(s)
The scan has been done completely.
6489 Scanning directories
199141 Files were scanned
8 viruses and/or unwanted programs were found
0 Files were classified as suspicious:
0 files were deleted
0 files were repaired
8 files were moved to quarantine
0 files were renamed
2 Files cannot be scanned
199131 Files not concerned
7090 Archives were scanned
6 Warnings
8 Notes
64657 Objects were scanned with rootkit scan
0 Hidden objects were found
Merci de m'aider car Antivir va certainement passer son temps à biper. j'ai bien cru que j'avais perdu l'ordi car antivir sonnait tellement que tout était bloqué.
J'ai pris un virus en cliquant sur un lien envoyé sur msn.
Je me retrouve avec 23 infections et plusieurs Trojan.
J'ai passé Malwarebytes 2 fois et Antivir.
Je vous poste les rapports ici pour avoir de l'aide pour terminer le nettoyage.
1 ER NETTOYAGE
Malwarebytes' Anti-Malware 1.35
Version de la base de données: 1917
Windows 5.1.2600 Service Pack 2
13/05/2009 19:40:05
mbam-log-2009-05-13 (19-39-33).txt
Type de recherche: Examen complet (C:\|)
Eléments examinés: 154306
Temps écoulé: 34 minute(s), 40 second(s)
Processus mémoire infecté(s): 0
Module(s) mémoire infecté(s): 0
Clé(s) du Registre infectée(s): 0
Valeur(s) du Registre infectée(s): 2
Elément(s) de données du Registre infecté(s): 1
Dossier(s) infecté(s): 0
Fichier(s) infecté(s): 1
Processus mémoire infecté(s):
(Aucun élément nuisible détecté)
Module(s) mémoire infecté(s):
(Aucun élément nuisible détecté)
Clé(s) du Registre infectée(s):
(Aucun élément nuisible détecté)
Valeur(s) du Registre infectée(s):
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\rirawapola (Trojan.Agent) -> No action taken.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows UDP Control Center (Backdoor.Bot) -> No action taken.
Elément(s) de données du Registre infecté(s):
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\UpdatesDisableNotify (Disabled.SecurityCenter) -> Bad: (1) Good: (0) -> No action taken.
Dossier(s) infecté(s):
(Aucun élément nuisible détecté)
Fichier(s) infecté(s):
C:\WINDOWS\system32\soveveje.dll (Trojan.Agent) -> No action taken.
2EME NETTOYAGE
Malwarebytes' Anti-Malware 1.35
Version de la base de données: 1917
Windows 5.1.2600 Service Pack 2
13/05/2009 21:16:12
mbam-log-2009-05-13 (21-16-06).txt
Type de recherche: Examen complet (C:\|)
Eléments examinés: 154626
Temps écoulé: 41 minute(s), 56 second(s)
Processus mémoire infecté(s): 0
Module(s) mémoire infecté(s): 4
Clé(s) du Registre infectée(s): 7
Valeur(s) du Registre infectée(s): 5
Elément(s) de données du Registre infecté(s): 6
Dossier(s) infecté(s): 0
Fichier(s) infecté(s): 6
Processus mémoire infecté(s):
(Aucun élément nuisible détecté)
Module(s) mémoire infecté(s):
C:\WINDOWS\system32\kugeyugu.dll (Trojan.Vundo.H) -> No action taken.
C:\WINDOWS\system32\yizesoko.dll (Trojan.Vundo.H) -> No action taken.
C:\WINDOWS\system32\vabofoka.dll (Trojan.Vundo.H) -> No action taken.
c:\WINDOWS\system32\pogobiwu.dll (Trojan.Vundo.H) -> No action taken.
Clé(s) du Registre infectée(s):
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{499e9650-0baa-4087-9c29-6a5000dba20c} (Trojan.Vundo.H) -> No action taken.
HKEY_CLASSES_ROOT\CLSID\{499e9650-0baa-4087-9c29-6a5000dba20c} (Trojan.Vundo.H) -> No action taken.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{499e9650-0baa-4087-9c29-6a5000dba20c} (Trojan.Vundo.H) -> No action taken.
HKEY_CLASSES_ROOT\CLSID\{ec43e3fd-5c60-46a6-97d7-e0b85dbdd6c4} (Trojan.Vundo.H) -> No action taken.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\contim (Trojan.Vundo) -> No action taken.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\dslcnnct (Trojan.Vundo) -> No action taken.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\rdfa (Trojan.Vundo) -> No action taken.
Valeur(s) du Registre infectée(s):
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\320d18a1 (Trojan.Vundo.H) -> No action taken.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cpm313e2b3d (Trojan.Vundo.H) -> No action taken.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\rirawapola (Trojan.Vundo.H) -> No action taken.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler\{ec43e3fd-5c60-46a6-97d7-e0b85dbdd6c4} (Trojan.Vundo.H) -> No action taken.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\ssodl (Trojan.Vundo.H) -> No action taken.
Elément(s) de données du Registre infecté(s):
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows\AppInit_DLLs (Trojan.Vundo.H) -> Data: c:\windows\system32\vabofoka.dll -> No action taken.
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\LSA\Notification Packages (Trojan.Vundo.H) -> Data: c:\windows\system32\vabofoka.dll -> No action taken.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows\AppInit_DLLs (Trojan.Vundo.H) -> Data: system32\vabofoka.dll -> No action taken.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows\AppInit_DLLs (Trojan.Vundo.H) -> Data: c:\windows\system32\pogobiwu.dll -> No action taken.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows\AppInit_DLLs (Trojan.Vundo.H) -> Data: system32\pogobiwu.dll -> No action taken.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\UpdatesDisableNotify (Disabled.SecurityCenter) -> Bad: (1) Good: (0) -> No action taken.
Dossier(s) infecté(s):
(Aucun élément nuisible détecté)
Fichier(s) infecté(s):
C:\WINDOWS\system32\kugeyugu.dll (Trojan.Vundo.H) -> No action taken.
C:\WINDOWS\system32\uguyeguk.ini (Trojan.Vundo.H) -> No action taken.
c:\WINDOWS\system32\pogobiwu.dll (Trojan.Vundo.H) -> No action taken.
C:\WINDOWS\system32\yizesoko.dll (Trojan.Vundo.H) -> No action taken.
C:\WINDOWS\system32\vabofoka.dll (Trojan.Vundo.H) -> No action taken.
C:\System Volume Information\_restore{4081E8B6-077E-420E-8973-EE0643E83BA3}\RP650\A0108179.dll (Trojan.Vundo.H) -> No action taken.
NETTOYAGE ANTIVIR
Avira AntiVir Personal
Report file date: mercredi 13 mai 2009 21:21
Scanning for 1392690 virus strains and unwanted programs.
Licensed to: Avira AntiVir PersonalEdition Classic
Serial number: 0000149996-ADJIE-0001
Platform: Windows XP
Windows version: (Service Pack 2) [5.1.2600]
Boot mode: Normally booted
Username: SYSTEM
Computer name: LAURA
Version information:
BUILD.DAT : 8.2.0.348 16934 Bytes 23/03/2009 13:44:00
AVSCAN.EXE : 8.1.4.10 315649 Bytes 26/11/2008 17:34:24
AVSCAN.DLL : 8.1.4.0 40705 Bytes 26/05/2008 07:56:42
LUKE.DLL : 8.1.4.5 164097 Bytes 12/06/2008 12:44:20
LUKERES.DLL : 8.1.4.0 12033 Bytes 26/05/2008 07:58:54
ANTIVIR0.VDF : 7.1.0.0 15603712 Bytes 27/10/2008 16:38:28
ANTIVIR1.VDF : 7.1.2.12 3336192 Bytes 11/02/2009 12:09:22
ANTIVIR2.VDF : 7.1.3.185 2010112 Bytes 12/05/2009 17:29:08
ANTIVIR3.VDF : 7.1.3.199 70656 Bytes 13/05/2009 17:20:48
Engineversion : 8.2.0.166
AEVDF.DLL : 8.1.1.1 106868 Bytes 03/05/2009 17:18:28
AESCRIPT.DLL : 8.1.1.81 385401 Bytes 08/05/2009 17:20:00
AESCN.DLL : 8.1.1.10 127348 Bytes 04/04/2009 13:17:12
AERDL.DLL : 8.1.1.3 438645 Bytes 05/11/2008 17:33:36
AEPACK.DLL : 8.1.3.16 397686 Bytes 08/05/2009 17:19:58
AEOFFICE.DLL : 8.1.0.36 196987 Bytes 27/02/2009 12:07:28
AEHEUR.DLL : 8.1.0.128 1757559 Bytes 08/05/2009 17:19:56
AEHELP.DLL : 8.1.2.2 119158 Bytes 27/02/2009 12:07:28
AEGEN.DLL : 8.1.1.42 348531 Bytes 08/05/2009 17:19:50
AEEMU.DLL : 8.1.0.9 393588 Bytes 15/10/2008 17:23:26
AECORE.DLL : 8.1.6.9 176500 Bytes 14/04/2009 17:08:52
AEBB.DLL : 8.1.0.3 53618 Bytes 15/10/2008 17:23:18
AVWINLL.DLL : 1.0.0.12 15105 Bytes 09/07/2008 08:40:06
AVPREF.DLL : 8.0.2.0 38657 Bytes 16/05/2008 09:28:02
AVREP.DLL : 8.0.0.3 155688 Bytes 22/04/2009 17:09:24
AVREG.DLL : 8.0.0.1 33537 Bytes 09/05/2008 11:26:42
AVARKT.DLL : 1.0.0.23 307457 Bytes 12/02/2008 08:29:24
AVEVTLOG.DLL : 8.0.0.16 119041 Bytes 12/06/2008 12:27:50
SQLITE3.DLL : 3.3.17.1 339968 Bytes 22/01/2008 17:28:04
SMTPLIB.DLL : 1.2.0.23 28929 Bytes 12/06/2008 12:49:42
NETNT.DLL : 8.0.0.1 7937 Bytes 25/01/2008 12:05:12
RCIMAGE.DLL : 8.0.0.51 2371841 Bytes 12/06/2008 13:48:08
RCTEXT.DLL : 8.0.52.0 86273 Bytes 27/06/2008 13:34:38
Configuration settings for the scan:
Jobname..........................: Complete system scan
Configuration file...............: c:\program files\avira\antivir personaledition classic\sysscan.avp
Logging..........................: low
Primary action...................: interactive
Secondary action.................: ignore
Scan master boot sector..........: on
Scan boot sector.................: on
Boot sectors.....................: C:,
Process scan.....................: on
Scan registry....................: on
Search for rootkits..............: on
Scan all files...................: All files
Scan archives....................: on
Recursion depth..................: 20
Smart extensions.................: on
Macro heuristic..................: on
File heuristic...................: high
Start of the scan: mercredi 13 mai 2009 21:21
Starting search for hidden objects.
'64657' objects were checked, '0' hidden objects were found.
The scan of running processes will be started
Scan process 'avscan.exe' - '1' Module(s) have been scanned
Scan process 'avcenter.exe' - '1' Module(s) have been scanned
Scan process 'WSCNTFY.EXE' - '1' Module(s) have been scanned
Scan process 'KHALMNPR.EXE' - '1' Module(s) have been scanned
Scan process 'SetPoint.exe' - '1' Module(s) have been scanned
Scan process 'SVCHOST.EXE' - '1' Module(s) have been scanned
Scan process 'CTFMON.EXE' - '1' Module(s) have been scanned
Scan process 'PINMENU.EXE' - '1' Module(s) have been scanned
Scan process 'MSMSGS.EXE' - '1' Module(s) have been scanned
Scan process 'LogitechDesktopMessenger.exe' - '1' Module(s) have been scanned
Scan process 'SweetIM.exe' - '1' Module(s) have been scanned
Scan process 'BTLiveUpdate.exe' - '1' Module(s) have been scanned
Scan process 'reader_sl.exe' - '1' Module(s) have been scanned
Scan process 'vVX1000.exe' - '1' Module(s) have been scanned
Scan process 'AVGNT.EXE' - '1' Module(s) have been scanned
Scan process 'PIFSvc.exe' - '1' Module(s) have been scanned
Scan process 'RUNDLL32.EXE' - '1' Module(s) have been scanned
Scan process 'InCD.exe' - '1' Module(s) have been scanned
Scan process 'PDVDServ.exe' - '1' Module(s) have been scanned
Scan process 'SOUNDMAN.EXE' - '1' Module(s) have been scanned
Scan process 'ALG.EXE' - '1' Module(s) have been scanned
Scan process 'SVCHOST.EXE' - '1' Module(s) have been scanned
Scan process 'MSCamS32.exe' - '1' Module(s) have been scanned
Scan process 'PIFSvc.exe' - '1' Module(s) have been scanned
Scan process 'CISVC.EXE' - '1' Module(s) have been scanned
Scan process 'SVCHOST.EXE' - '1' Module(s) have been scanned
Scan process 'AVGUARD.EXE' - '1' Module(s) have been scanned
Scan process 'SVCHOST.EXE' - '1' Module(s) have been scanned
Scan process 'SCHED.EXE' - '1' Module(s) have been scanned
Scan process 'SPOOLSV.EXE' - '1' Module(s) have been scanned
Scan process 'EXPLORER.EXE' - '1' Module(s) have been scanned
Scan process 'SVCHOST.EXE' - '1' Module(s) have been scanned
Scan process 'SVCHOST.EXE' - '1' Module(s) have been scanned
Scan process 'InCDsrv.exe' - '1' Module(s) have been scanned
Scan process 'SVCHOST.EXE' - '1' Module(s) have been scanned
Scan process 'SVCHOST.EXE' - '1' Module(s) have been scanned
Scan process 'SVCHOST.EXE' - '1' Module(s) have been scanned
Scan process 'LSASS.EXE' - '1' Module(s) have been scanned
Scan process 'SERVICES.EXE' - '1' Module(s) have been scanned
Scan process 'WINLOGON.EXE' - '1' Module(s) have been scanned
Scan process 'CSRSS.EXE' - '1' Module(s) have been scanned
Scan process 'SMSS.EXE' - '1' Module(s) have been scanned
42 processes with 42 modules were scanned
Starting master boot sector scan:
Master boot sector HD0
[INFO] No virus was found!
Master boot sector HD1
[INFO] No virus was found!
[WARNING] System error [21]: Le périphérique n'est pas prêt.
Master boot sector HD2
[INFO] No virus was found!
[WARNING] System error [21]: Le périphérique n'est pas prêt.
Master boot sector HD3
[INFO] No virus was found!
[WARNING] System error [21]: Le périphérique n'est pas prêt.
Master boot sector HD4
[INFO] No virus was found!
[WARNING] System error [21]: Le périphérique n'est pas prêt.
Start scanning boot sectors:
Boot sector 'C:\'
[INFO] No virus was found!
Starting to scan the registry.
The registry was scanned ( '65' files ).
Starting the file scan:
Begin scan in 'C:\' <ACER>
C:\pagefile.sys
[WARNING] The file could not be opened!
C:\hiberfil.sys
[WARNING] The file could not be opened!
C:\sfide.exe
[DETECTION] Is the TR/Vundo.Gen Trojan
[NOTE] The file was moved to '4a741e72.qua'!
C:\Documents and Settings\13\Local Settings\Temporary Internet Files\Content.IE5\B60QRGWM\is[1].jpg
[DETECTION] Is the TR/Vundo.Gen Trojan
[NOTE] The file was moved to '4a6624a5.qua'!
C:\System Volume Information\_restore{4081E8B6-077E-420E-8973-EE0643E83BA3}\RP650\A0107213.exe
[DETECTION] Is the TR/Vundo.Gen Trojan
[NOTE] The file was moved to '4a3c28d9.qua'!
C:\System Volume Information\_restore{4081E8B6-077E-420E-8973-EE0643E83BA3}\RP650\A0109190.dll
[DETECTION] Is the TR/Vundo.Gen Trojan
[NOTE] The file was moved to '4a3c28dd.qua'!
C:\System Volume Information\_restore{4081E8B6-077E-420E-8973-EE0643E83BA3}\RP650\A0109192.dll
[DETECTION] Is the TR/Vundo.Gen Trojan
[NOTE] The file was moved to '4a3c28df.qua'!
C:\System Volume Information\_restore{4081E8B6-077E-420E-8973-EE0643E83BA3}\RP650\A0109193.dll
[DETECTION] Is the TR/Vundo.Gen Trojan
[NOTE] The file was moved to '4a3c28e2.qua'!
C:\System Volume Information\_restore{4081E8B6-077E-420E-8973-EE0643E83BA3}\RP650\A0109194.dll
[DETECTION] Is the TR/Vundo.Gen Trojan
[NOTE] The file was moved to '4a3c28e4.qua'!
C:\System Volume Information\_restore{4081E8B6-077E-420E-8973-EE0643E83BA3}\RP650\A0109200.exe
[DETECTION] Is the TR/Vundo.Gen Trojan
[NOTE] The file was moved to '4a3c28e7.qua'!
End of the scan: mercredi 13 mai 2009 22:08
Used time: 47:12 Minute(s)
The scan has been done completely.
6489 Scanning directories
199141 Files were scanned
8 viruses and/or unwanted programs were found
0 Files were classified as suspicious:
0 files were deleted
0 files were repaired
8 files were moved to quarantine
0 files were renamed
2 Files cannot be scanned
199131 Files not concerned
7090 Archives were scanned
6 Warnings
8 Notes
64657 Objects were scanned with rootkit scan
0 Hidden objects were found
Merci de m'aider car Antivir va certainement passer son temps à biper. j'ai bien cru que j'avais perdu l'ordi car antivir sonnait tellement que tout était bloqué.
A voir également:
- Trojan + 23 infections
- Trojan remover - Télécharger - Antivirus & Antimalwares
- Indicatif +23 - Guide
- Anti trojan - Télécharger - Antivirus & Antimalwares
- Virus trojan al11 ✓ - Forum Virus
- Problème réception chaînes 20 21 23 24 25 - Forum TNT / Satellite / Réception
56 réponses
Bizare,
Dans tous les programmes, l'ordinateur affiche toujours norton antivirus.
Comment cela se fait il ?
Dans tous les programmes, l'ordinateur affiche toujours norton antivirus.
Comment cela se fait il ?
le programme est toujours présent dans "ajout/suppression de programme" Est ce que je peux réessayer par ce chemin pour l'enlever ?
oups avait pas vu ton message. le pc a fait son redémarrage tous seul pourtant. alors je le redémarre encore et je revérifie. ensuite on verra pour combofix
non je confirme norton n'est pas désinstaller même après ce 2eme démarrage du pc. je le fais directement dans ajout/suppression ?
Vous n’avez pas trouvé la réponse que vous recherchez ?
Posez votre question
oui, car infection vundo, bien lire la procédure avant de commencer
---> Télécharge ComboFix.exe de sUBs sur ton Bureau :
http://download.bleepingcomputer.com/sUBs/ComboFix.exe
places le sur le bureau et renommes le jacobin.exe
/!\ Déconnecte-toi du net et DESACTIVES TOUTES LES DEFENSES, antivirus et antispyware y compris /!\
---> Double-clique sur jacobin.exe
Un "pop-up" va apparaître qui dit que "ComboFix est utilisé à vos risques et avec aucune garantie...".
Accepte en cliquant sur "Oui"
SURTOUT INSTALLES LA CONSOLE DE RECUPERATION
---> Mets-le en langue française F
Tape sur la touche 1 (Yes) pour démarrer le scan.
/!\ Ne touche à rien tant que le scan n'est pas terminé. /!\
En fin de scan, il est possible que ComboFix ait besoin de redémarrer le PC pour finaliser la désinfection, laisse-le faire.
Une fois le scan achevé, un rapport va s'afficher : Poste son contenu
/!\ Réactive la protection en temps réel de ton antivirus et de ton antispyware avant de te reconnecter à Internet. /!\
Note : Le rapport se trouve également là : C:\ComboFix.txt
---> Télécharge ComboFix.exe de sUBs sur ton Bureau :
http://download.bleepingcomputer.com/sUBs/ComboFix.exe
places le sur le bureau et renommes le jacobin.exe
/!\ Déconnecte-toi du net et DESACTIVES TOUTES LES DEFENSES, antivirus et antispyware y compris /!\
---> Double-clique sur jacobin.exe
Un "pop-up" va apparaître qui dit que "ComboFix est utilisé à vos risques et avec aucune garantie...".
Accepte en cliquant sur "Oui"
SURTOUT INSTALLES LA CONSOLE DE RECUPERATION
---> Mets-le en langue française F
Tape sur la touche 1 (Yes) pour démarrer le scan.
/!\ Ne touche à rien tant que le scan n'est pas terminé. /!\
En fin de scan, il est possible que ComboFix ait besoin de redémarrer le PC pour finaliser la désinfection, laisse-le faire.
Une fois le scan achevé, un rapport va s'afficher : Poste son contenu
/!\ Réactive la protection en temps réel de ton antivirus et de ton antispyware avant de te reconnecter à Internet. /!\
Note : Le rapport se trouve également là : C:\ComboFix.txt
ok
je vais essayer de le faire pour ce soir, tu pourras l'analyser. mais je serai absente ce soir.merci.
j'espère m'en sortir avec la console de récupération.
je vais essayer de le faire pour ce soir, tu pourras l'analyser. mais je serai absente ce soir.merci.
j'espère m'en sortir avec la console de récupération.
J'ai enfin eu le temps de passer combofix.
Avant, je voudrais savoir, j'ai une liste de 69 infections en quarantaine dans antimalwarebytes même après le passage de combofix. Que dois-je en faire ? Les laisser ? les supprimer ? Je n'ai peut être pas bien utilisé malwarebytes ?
voilà le rapport COMBOFIX
ComboFix 09-05-19.08 - 13 20/05/2009 14:15.1 - [color=red][b]FAT32[/b][/color]x86
Microsoft Windows XP Édition familiale 5.1.2600.2.1252.33.1036.18.735.459 [GMT 2:00]
Lancé depuis: c:\documents and settings\13\Bureau\jacobin.exe
AV: Avira AntiVir PersonalEdition *On-access scanning disabled* (Updated) {AD166499-45F9-482A-A743-FDD3350758C7}
.
(((((((((((((((((((((((((((((((((((( Autres suppressions ))))))))))))))))))))))))))))))))))))))))))))))))
.
c:\docume~1\13\LOCALS~1\Temp\IadHide5.dll
c:\documents and settings\13\Local Settings\Temp\IadHide5.dll
c:\windows\N039_jpg.zip
c:\windows\system32\bajgntid.ini
c:\windows\system32\bcbrwqwb.ini
c:\windows\system32\Microsoft\backup.ftp
c:\windows\system32\Microsoft\backup.tftp
c:\windows\system32\qebeoiqu.ini
c:\windows\system32\uysrbwur.ini
c:\windows\system32\xkrmdkyv.ini
c:\windows\Tasks\hpptazlh.job
.
((((((((((((((((((((((((((((((((((((((( Pilotes/Services )))))))))))))))))))))))))))))))))))))))))))))))))
.
-------\Legacy_PERFORMANCE_MONITOR
-------\Legacy_USERINIT_LOGON_APPLICATION
((((((((((((((((((((((((((((( Fichiers créés du 2009-04-20 au 2009-05-20 ))))))))))))))))))))))))))))))))))))
.
2009-05-16 13:17 . 2009-05-16 13:17 -------- d-----w c:\documents and settings\All Users\Application Data\NortonInstaller
2009-05-15 07:17 . 2009-05-15 07:17 -------- d-----w C:\UsbFix
2009-05-14 13:34 . 2009-05-14 13:34 -------- d-----w c:\program files\Ad-remover
2009-05-14 13:07 . 2009-05-14 13:07 -------- d-----w C:\rsit
2009-05-07 17:45 . 2009-05-07 17:45 -------- d-----w c:\documents and settings\NetworkService\Local Settings\Application Data\Apple
2009-05-05 07:58 . 2009-05-05 07:58 -------- d-----w c:\documents and settings\All Users\Application Data\Apple Computer
2009-05-04 06:54 . 2009-05-04 06:54 -------- d-----w c:\documents and settings\13\Local Settings\Application Data\Apple
2009-05-04 06:54 . 2009-05-04 06:54 -------- d-----w c:\program files\Apple Software Update
2009-05-04 06:54 . 2009-05-04 06:54 -------- d-----w c:\documents and settings\All Users\Application Data\Apple
2009-04-28 17:57 . 2009-04-28 17:57 -------- d-----w c:\documents and settings\13\Local Settings\Application Data\Apple Computer
2009-04-22 12:05 . 2009-04-22 12:05 -------- d-----w c:\windows\InCD
.
(((((((((((((((((((((((((((((((((( Compte-rendu de Find3M ))))))))))))))))))))))))))))))))))))))))))))))))
.
2009-05-20 12:16 . 2006-12-24 22:52 12 ----a-w c:\windows\bthservsdp.dat
2009-05-16 10:56 . 2009-05-16 10:56 0 ----a-w C:\LOGB6F.tmp
2009-05-15 07:24 . 2009-05-15 07:24 0 ----a-w C:\LOG4D.tmp
2009-04-26 08:54 . 2009-04-18 08:29 3240 ----a-w c:\windows\system32\PerfStringBackup.TMP
2009-04-26 08:54 . 1979-12-31 22:00 75562 ----a-w c:\windows\system32\perfc00C.dat
2009-04-26 08:54 . 1979-12-31 22:00 468828 ----a-w c:\windows\system32\perfh00C.dat
2009-04-20 09:15 . 2009-04-20 09:15 -------- d-----w c:\program files\Fichiers communs\Nero
2009-04-12 15:20 . 2009-04-12 15:21 5632 ----a-w c:\windows\system32\drivers\StarOpen.sys
2009-04-10 17:20 . 2009-04-10 17:20 -------- d-----w c:\program files\Kellogg's Asie
2009-04-10 12:05 . 2009-04-10 12:05 -------- d-----w c:\program files\Bbox
2009-04-09 08:43 . 2006-05-12 16:24 32304 ----a-w c:\documents and settings\13\Local Settings\Application Data\GDIPFONTCACHEV1.DAT
2009-04-06 13:32 . 2009-01-22 07:27 38496 ----a-w c:\windows\system32\drivers\mbamswissarmy.sys
2009-04-06 13:32 . 2009-01-22 07:27 15504 ----a-w c:\windows\system32\drivers\mbam.sys
2009-04-03 18:55 . 2009-04-03 18:55 -------- d-----w c:\program files\Microsoft Silverlight
2009-04-03 13:47 . 2009-04-03 13:47 -------- d-----w c:\program files\BboxUpdate
2009-04-01 14:51 . 2009-04-01 14:51 -------- d-----w c:\program files\Techcity
2009-03-23 08:30 . 2009-03-23 08:30 -------- d-----w c:\program files\Microsoft Sync Framework
2009-03-23 08:14 . 2009-03-23 08:14 -------- d-----w c:\program files\Fichiers communs\Windows Live
2009-03-08 12:22 . 2009-03-08 12:22 1241088 ----a-w c:\windows\system32\SET10E.tmp
2009-03-08 12:21 . 2009-03-08 12:21 10240 ------w c:\windows\system32\SETFD.tmp
2009-03-08 12:09 . 2009-03-08 12:09 391536 ------w c:\windows\system32\SET10B.tmp
2009-03-08 02:41 . 2009-03-08 02:41 5937152 ----a-w c:\windows\system32\SET120.tmp
2009-03-08 02:39 . 2009-03-08 02:39 11063808 ----a-w c:\windows\system32\SET10D.tmp
2009-03-08 02:35 . 2009-03-08 02:35 385024 ----a-w c:\windows\system32\SET101.tmp
2009-03-08 02:34 . 1979-12-31 22:00 914944 ----a-w c:\windows\system32\wininet.dll
2009-03-08 02:34 . 2009-03-08 02:34 1206784 ----a-w c:\windows\system32\SET12D.tmp
2009-03-08 02:34 . 2009-03-08 02:34 1469440 ------w c:\windows\system32\SET116.tmp
2009-03-08 02:34 . 2009-03-08 02:34 236544 ----a-w c:\windows\system32\SET12F.tmp
2009-03-08 02:34 . 2009-03-08 02:34 208384 ------w c:\windows\system32\SET130.tmp
2009-03-08 02:34 . 2009-03-08 02:34 43008 ----a-w c:\windows\system32\SET11A.tmp
2009-03-08 02:34 . 1979-12-31 22:00 43008 ----a-w c:\windows\system32\licmgr10.dll
2009-03-08 02:34 . 2009-03-08 02:34 105984 ----a-w c:\windows\system32\SET12C.tmp
2009-03-08 02:34 . 2009-03-08 02:34 193536 ------w c:\windows\system32\SET126.tmp
2009-03-08 02:34 . 2009-03-08 02:34 109568 ------w c:\windows\system32\SET129.tmp
2009-03-08 02:33 . 2009-03-08 02:33 18944 ------w c:\windows\system32\SETFE.tmp
2009-03-08 02:33 . 1979-12-31 22:00 18944 ----a-w c:\windows\system32\corpol.dll
2009-03-08 02:33 . 2009-03-08 02:33 25600 ------w c:\windows\system32\SET119.tmp
2009-03-08 02:33 . 2009-03-08 02:33 726528 ----a-w c:\windows\system32\SET118.tmp
2009-03-08 02:33 . 2009-03-08 02:33 229376 ------w c:\windows\system32\SET107.tmp
2009-03-08 02:33 . 2009-03-08 02:33 420352 ----a-w c:\windows\system32\SET12E.tmp
2009-03-08 02:33 . 1979-12-31 22:00 420352 ----a-w c:\windows\system32\vbscript.dll
2009-03-08 02:33 . 2009-03-08 02:33 125952 ------w c:\windows\system32\SET106.tmp
2009-03-08 02:32 . 2009-03-08 02:32 72704 ----a-w c:\windows\system32\SETFB.tmp
2009-03-08 02:32 . 1979-12-31 22:00 72704 ----a-w c:\windows\system32\admparse.dll
2009-03-08 02:32 . 2009-03-08 02:32 173056 ------w c:\windows\system32\SET103.tmp
2009-03-08 02:32 . 2009-03-08 02:32 163840 ------w c:\windows\system32\SET108.tmp
2009-03-08 02:32 . 2009-03-08 02:32 71680 ----a-w c:\windows\system32\SET112.tmp
2009-03-08 02:32 . 2009-03-08 02:32 55808 ------w c:\windows\system32\SET110.tmp
2009-03-08 02:32 . 1979-12-31 22:00 71680 ----a-w c:\windows\system32\iesetup.dll
2009-03-08 02:32 . 2009-03-08 02:32 128512 ----a-w c:\windows\system32\SETFC.tmp
2009-03-08 02:32 . 2009-03-08 02:32 94720 ----a-w c:\windows\system32\SET117.tmp
2009-03-08 02:32 . 2009-03-08 02:32 594432 ----a-w c:\windows\system32\SET11B.tmp
2009-03-08 02:32 . 2009-03-08 02:32 1985024 ----a-w c:\windows\system32\SET111.tmp
2009-03-08 02:32 . 2009-03-08 02:32 611840 ------w c:\windows\system32\SET128.tmp
2009-03-08 02:30 . 2009-03-08 02:30 66560 ----a-w c:\windows\system32\SET12B.tmp
2009-03-08 02:22 . 2009-03-08 02:22 164352 ------w c:\windows\system32\SET113.tmp
2009-03-08 02:22 . 2009-03-08 02:22 156160 ----a-w c:\windows\system32\SET125.tmp
2009-03-08 02:22 . 1979-12-31 22:00 156160 ----a-w c:\windows\system32\msls31.dll
2009-03-08 02:15 . 2009-03-08 02:15 57667 ----a-w c:\windows\system32\SET114.tmp
2009-03-08 02:11 . 2009-03-08 02:11 445952 ----a-w c:\windows\system32\SET10A.tmp
2009-03-06 14:46 . 1979-12-31 22:00 286208 ----a-w c:\windows\system32\pdh.dll
2009-03-02 15:14 . 2009-03-02 15:14 0 ----a-w C:\LOG1B.tmp
2009-03-02 14:53 . 2009-03-02 14:53 0 ----a-w C:\LOG5.tmp
2009-03-02 11:18 . 2009-03-02 11:18 0 ----a-w C:\LOGCE.tmp
2009-02-22 09:19 . 2009-02-22 09:19 0 ----a-w C:\LOG2D.tmp
2009-02-21 23:25 . 2009-02-21 23:25 0 ----a-w C:\LOG2DE.tmp
2009-02-21 23:06 . 2009-02-21 23:06 0 ----a-w C:\LOG2C8.tmp
2009-02-21 12:18 . 2009-02-21 12:18 0 ----a-w C:\LOG137.tmp
2009-02-21 12:14 . 2009-02-21 12:14 0 ----a-w C:\LOG136.tmp
.
((((((((((((((((((((((((((((((((( Points de chargement Reg ))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* les éléments vides & les éléments initiaux légitimes ne sont pas listés
REGEDIT4
[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"LDM"="c:\program files\Logitech\Desktop Messenger\8876480\Program\LogitechDesktopMessenger.exe" [2006-12-26 32768]
"MsnMsgr"="c:\program files\Windows Live\Messenger\msnmsgr.exe" [2007-10-18 5724184]
"MSMSGS"="c:\program files\Messenger\msmsgs.exe" [2004-10-13 1694208]
"ctfmon.exe"="c:\windows\system32\ctfmon.exe" [2004-08-05 15360]
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"RemoteControl"="c:\program files\CyberLink\PowerDVD\PDVDServ.exe" [2003-10-21 40960]
"NeroFilterCheck"="c:\windows\system32\NeroCheck.exe" [2001-07-09 155648]
"InCD"="c:\program files\Ahead\InCD\InCD.exe" [2004-10-18 1315840]
"PROMT Integrator"="c:\program files\PROMT5\INTEGRAL\PinStart.exe" [2001-09-03 49152]
"avgnt"="c:\program files\Avira\AntiVir PersonalEdition Classic\avgnt.exe" [2008-06-12 266497]
"LifeCam"="c:\program files\Microsoft LifeCam\LifeExp.exe" [2007-05-17 279912]
"VX1000"="c:\windows\vVX1000.exe" [2007-04-10 709992]
"Adobe Reader Speed Launcher"="c:\program files\Adobe\Reader 9.0\Reader\Reader_sl.exe" [2009-02-27 35696]
"BboxUpdate"="c:\program files\BboxUpdate\BTLiveUpdate.exe" [2008-08-06 103936]
"QuickTime Task"="c:\program files\QuickTime\qttask.exe" [2009-01-05 413696]
"SoundMan"="SOUNDMAN.EXE" - c:\windows\SOUNDMAN.EXE [2004-05-14 67072]
"BluetoothAuthenticationAgent"="bthprops.cpl" - c:\windows\system32\BTHPROPS.CPL [2004-08-05 110592]
"Logitech Hardware Abstraction Layer"="KHALMNPR.EXE" - c:\windows\KHALMNPR.Exe [2008-02-29 76304]
"Kernel and Hardware Abstraction Layer"="KHALMNPR.EXE" - c:\windows\KHALMNPR.Exe [2008-02-29 76304]
[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run]
"CTFMON.EXE"="c:\windows\system32\CTFMON.EXE" [2004-08-05 15360]
c:\documents and settings\All Users\Menu D‚marrer\Programmes\D‚marrage\
Microsoft Office.lnk - c:\program files\Microsoft Office\Office10\OSA.EXE [2001-2-13 83360]
Logitech Desktop Messenger.lnk - c:\program files\Logitech\Desktop Messenger\8876480\Program\LDMConf.exe [2006-12-26 450560]
Logitech SetPoint.lnk - c:\program files\Logitech\SetPoint\SetPoint.exe [2008-10-14 805392]
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\LBTWlgn]
2008-05-02 00:42 72208 ----a-w c:\program files\Fichiers communs\Logitech\Bluetooth\LBTWLgn.dll
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\WdfLoadGroup]
@=""
[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring]
"DisableMonitoring"=dword:00000001
[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\SymantecAntiVirus]
"DisableMonitoring"=dword:00000001
[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\SymantecFirewall]
"DisableMonitoring"=dword:00000001
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile]
"EnableFirewall"= 0 (0x0)
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%windir%\\system32\\sessmgr.exe"=
"c:\\Program Files\\Messenger\\MSMSGS.EXE"=
"c:\\Program Files\\Logitech\\Desktop Messenger\\8876480\\Program\\LogitechDesktopMessenger.exe"=
"c:\\Program Files\\eMule\\emule.exe"=
"c:\\WINDOWS\\System32\\rtcshare.exe"=
"c:\\Program Files\\NetMeeting\\conf.exe"=
"%windir%\\Network Diagnostic\\xpnetdiag.exe"=
"c:\\Program Files\\Microsoft LifeCam\\LifeCam.exe"=
"c:\\Program Files\\Microsoft LifeCam\\LifeExp.exe"=
"c:\\Program Files\\Mozilla Firefox\\firefox.exe"=
"c:\\Program Files\\Windows Live\\Messenger\\MSNMSGR.EXE"=
"c:\\Program Files\\Windows Live\\Messenger\\livecall.exe"=
"c:\\Program Files\\Bbox\\eSKernel.exe"=
"c:\\Program Files\\BboxUpdate\\BTLiveUpdate.exe"=
R0 PzWDM;PzWDM;c:\windows\system32\drivers\PzWDM.sys [25/12/2007 19:40 15172]
.
Contenu du dossier 'Tâches planifiées'
2009-05-20 c:\windows\Tasks\User_Feed_Synchronization-{FF5DF99F-C204-45E8-9DC9-B60BD76EAA1D}.job
- c:\windows\system32\msfeedssync.exe [2007-08-13 02:31]
2009-05-14 c:\windows\Tasks\AppleSoftwareUpdate.job
- c:\program files\Apple Software Update\SoftwareUpdate.exe [2008-07-30 10:34]
.
- - - - ORPHELINS SUPPRIMES - - - -
HKCU-RunOnce-Shockwave Updater - c:\windows\system32\ADOBE\SHOCKW~1\SWHELP~1.EXE -Update -1100465 -Mozilla/5.0 (Windows; U; Windows NT 5.1; fr; rv:1.9.0.7) Gecko/2009021910 Firefox/3.0.7
HKLM-Run-DXDllRegExe - dxdllreg.exe
Notify-vtUkihHB - vtUkihHB.dll
.
------- Examen supplémentaire -------
.
uSearchMigratedDefaultURL = hxxp://www.google.com/search?q={searchTerms}
uInternet Connection Wizard,ShellNext = iexplore
IE: &Windows Live Search - c:\program files\Windows Live Toolbar\msntb.dll/search.htm
IE: Add to Windows &Live Favorites - https://onedrive.live.com/?id=favorites
IE: E&xporter vers Microsoft Excel - c:\progra~1\MICROS~2\Office10\EXCEL.EXE/3000
IE: Easy-WebPrint Ajouter à la liste d'impressions - c:\program files\Canon\Easy-WebPrint\Resource.dll/RC_AddToList.html
IE: Easy-WebPrint Impression rapide - c:\program files\Canon\Easy-WebPrint\Resource.dll/RC_HSPrint.html
IE: Easy-WebPrint Imprimer - c:\program files\Canon\Easy-WebPrint\Resource.dll/RC_Print.html
IE: Easy-WebPrint Prévisualiser - c:\program files\Canon\Easy-WebPrint\Resource.dll/RC_Preview.html
IE: Ouvrir dans un nouvel onglet d'arrière-plan - c:\program files\Windows Live Toolbar\Components\fr-fr\msntabres.dll.mui/229?2a22063e1a6841fa860803837843fbd1
IE: Ouvrir dans un nouvel onglet de premier plan - c:\program files\Windows Live Toolbar\Components\fr-fr\msntabres.dll.mui/230?2a22063e1a6841fa860803837843fbd1
IE: {{7A2EFD41-E6B3-11D2-89E3-00E0292EE574} - c:\program files\PROMT5\PROMTIE4\promtie5.htm
IE: {{7A2EFD41-E6B3-11D2-89E3-00E0292EE575} - c:\program files\PROMT5\PROMTIE4\options.htm
FF - ProfilePath - c:\documents and settings\13\Application Data\Mozilla\Firefox\Profiles\9ka9hnr1.default\
FF - prefs.js: browser.search.defaulturl - hxxp://search.sweetim.com/search.asp?src=2&q=
FF - prefs.js: browser.search.selectedEngine - Google
FF - prefs.js: browser.startup.homepage - hxxp://fr.msn.com/
FF - prefs.js: keyword.URL - hxxp://search.sweetim.com/search.asp?src=2&q=
.
**************************************************************************
catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2009-05-20 14:18
Windows 5.1.2600 Service Pack 2 FAT NTAPI
Recherche de processus cachés ...
Recherche d'éléments en démarrage automatique cachés ...
Recherche de fichiers cachés ...
Scan terminé avec succès
Fichiers cachés: 0
**************************************************************************
.
--------------------- DLLs chargées dans les processus actifs ---------------------
- - - - - - - > 'winlogon.exe'(528)
c:\program files\fichiers communs\logitech\bluetooth\LBTWlgn.dll
c:\program files\fichiers communs\logitech\bluetooth\LBTServ.dll
- - - - - - - > 'explorer.exe'(2896)
c:\program files\Logitech\SetPoint\lgscroll.dll
c:\progra~1\WINDOW~2\wmpband.dll
c:\windows\system32\ieframe.dll
c:\windows\system32\webcheck.dll
c:\windows\system32\WPDShServiceObj.dll
c:\windows\system32\PortableDeviceTypes.dll
c:\windows\system32\PortableDeviceApi.dll
.
------------------------ Autres processus actifs ------------------------
.
c:\program files\AHEAD\INCD\INCDSRV.EXE
c:\program files\AVIRA\ANTIVIR PERSONALEDITION CLASSIC\SCHED.EXE
c:\program files\AVIRA\ANTIVIR PERSONALEDITION CLASSIC\AVGUARD.EXE
c:\program files\MICROSOFT LIFECAM\MSCAMS32.EXE
c:\windows\SYSTEM32\RUNDLL32.EXE
c:\program files\PROMT5\INTEGRAL\PINMENU.EXE
c:\program files\FICHIERS COMMUNS\LOGISHRD\KHAL2\KHALMNPR.EXE
c:\windows\SYSTEM32\WSCNTFY.EXE
.
**************************************************************************
.
Heure de fin: 2009-05-20 14:21 - La machine a redémarré
ComboFix-quarantined-files.txt 2009-05-20 12:21
Avant-CF: 7 321 354 240 octets libres
Après-CF: 7 670 431 744 octets libres
WindowsXP-KB310994-SP2-Home-BootDisk-FRA.exe
[boot loader]
timeout=2
default=multi(0)disk(0)rdisk(0)partition(1)\WINDOWS
[operating systems]
c:\cmdcons\BOOTSECT.DAT="Microsoft Windows Recovery Console" /cmdcons
multi(0)disk(0)rdisk(0)partition(1)\WINDOWS="Microsoft Windows XP dition familiale" /noexecute=optin /fastdetect
249 --- E O F --- 2009-05-13 16:03
Avant, je voudrais savoir, j'ai une liste de 69 infections en quarantaine dans antimalwarebytes même après le passage de combofix. Que dois-je en faire ? Les laisser ? les supprimer ? Je n'ai peut être pas bien utilisé malwarebytes ?
voilà le rapport COMBOFIX
ComboFix 09-05-19.08 - 13 20/05/2009 14:15.1 - [color=red][b]FAT32[/b][/color]x86
Microsoft Windows XP Édition familiale 5.1.2600.2.1252.33.1036.18.735.459 [GMT 2:00]
Lancé depuis: c:\documents and settings\13\Bureau\jacobin.exe
AV: Avira AntiVir PersonalEdition *On-access scanning disabled* (Updated) {AD166499-45F9-482A-A743-FDD3350758C7}
.
(((((((((((((((((((((((((((((((((((( Autres suppressions ))))))))))))))))))))))))))))))))))))))))))))))))
.
c:\docume~1\13\LOCALS~1\Temp\IadHide5.dll
c:\documents and settings\13\Local Settings\Temp\IadHide5.dll
c:\windows\N039_jpg.zip
c:\windows\system32\bajgntid.ini
c:\windows\system32\bcbrwqwb.ini
c:\windows\system32\Microsoft\backup.ftp
c:\windows\system32\Microsoft\backup.tftp
c:\windows\system32\qebeoiqu.ini
c:\windows\system32\uysrbwur.ini
c:\windows\system32\xkrmdkyv.ini
c:\windows\Tasks\hpptazlh.job
.
((((((((((((((((((((((((((((((((((((((( Pilotes/Services )))))))))))))))))))))))))))))))))))))))))))))))))
.
-------\Legacy_PERFORMANCE_MONITOR
-------\Legacy_USERINIT_LOGON_APPLICATION
((((((((((((((((((((((((((((( Fichiers créés du 2009-04-20 au 2009-05-20 ))))))))))))))))))))))))))))))))))))
.
2009-05-16 13:17 . 2009-05-16 13:17 -------- d-----w c:\documents and settings\All Users\Application Data\NortonInstaller
2009-05-15 07:17 . 2009-05-15 07:17 -------- d-----w C:\UsbFix
2009-05-14 13:34 . 2009-05-14 13:34 -------- d-----w c:\program files\Ad-remover
2009-05-14 13:07 . 2009-05-14 13:07 -------- d-----w C:\rsit
2009-05-07 17:45 . 2009-05-07 17:45 -------- d-----w c:\documents and settings\NetworkService\Local Settings\Application Data\Apple
2009-05-05 07:58 . 2009-05-05 07:58 -------- d-----w c:\documents and settings\All Users\Application Data\Apple Computer
2009-05-04 06:54 . 2009-05-04 06:54 -------- d-----w c:\documents and settings\13\Local Settings\Application Data\Apple
2009-05-04 06:54 . 2009-05-04 06:54 -------- d-----w c:\program files\Apple Software Update
2009-05-04 06:54 . 2009-05-04 06:54 -------- d-----w c:\documents and settings\All Users\Application Data\Apple
2009-04-28 17:57 . 2009-04-28 17:57 -------- d-----w c:\documents and settings\13\Local Settings\Application Data\Apple Computer
2009-04-22 12:05 . 2009-04-22 12:05 -------- d-----w c:\windows\InCD
.
(((((((((((((((((((((((((((((((((( Compte-rendu de Find3M ))))))))))))))))))))))))))))))))))))))))))))))))
.
2009-05-20 12:16 . 2006-12-24 22:52 12 ----a-w c:\windows\bthservsdp.dat
2009-05-16 10:56 . 2009-05-16 10:56 0 ----a-w C:\LOGB6F.tmp
2009-05-15 07:24 . 2009-05-15 07:24 0 ----a-w C:\LOG4D.tmp
2009-04-26 08:54 . 2009-04-18 08:29 3240 ----a-w c:\windows\system32\PerfStringBackup.TMP
2009-04-26 08:54 . 1979-12-31 22:00 75562 ----a-w c:\windows\system32\perfc00C.dat
2009-04-26 08:54 . 1979-12-31 22:00 468828 ----a-w c:\windows\system32\perfh00C.dat
2009-04-20 09:15 . 2009-04-20 09:15 -------- d-----w c:\program files\Fichiers communs\Nero
2009-04-12 15:20 . 2009-04-12 15:21 5632 ----a-w c:\windows\system32\drivers\StarOpen.sys
2009-04-10 17:20 . 2009-04-10 17:20 -------- d-----w c:\program files\Kellogg's Asie
2009-04-10 12:05 . 2009-04-10 12:05 -------- d-----w c:\program files\Bbox
2009-04-09 08:43 . 2006-05-12 16:24 32304 ----a-w c:\documents and settings\13\Local Settings\Application Data\GDIPFONTCACHEV1.DAT
2009-04-06 13:32 . 2009-01-22 07:27 38496 ----a-w c:\windows\system32\drivers\mbamswissarmy.sys
2009-04-06 13:32 . 2009-01-22 07:27 15504 ----a-w c:\windows\system32\drivers\mbam.sys
2009-04-03 18:55 . 2009-04-03 18:55 -------- d-----w c:\program files\Microsoft Silverlight
2009-04-03 13:47 . 2009-04-03 13:47 -------- d-----w c:\program files\BboxUpdate
2009-04-01 14:51 . 2009-04-01 14:51 -------- d-----w c:\program files\Techcity
2009-03-23 08:30 . 2009-03-23 08:30 -------- d-----w c:\program files\Microsoft Sync Framework
2009-03-23 08:14 . 2009-03-23 08:14 -------- d-----w c:\program files\Fichiers communs\Windows Live
2009-03-08 12:22 . 2009-03-08 12:22 1241088 ----a-w c:\windows\system32\SET10E.tmp
2009-03-08 12:21 . 2009-03-08 12:21 10240 ------w c:\windows\system32\SETFD.tmp
2009-03-08 12:09 . 2009-03-08 12:09 391536 ------w c:\windows\system32\SET10B.tmp
2009-03-08 02:41 . 2009-03-08 02:41 5937152 ----a-w c:\windows\system32\SET120.tmp
2009-03-08 02:39 . 2009-03-08 02:39 11063808 ----a-w c:\windows\system32\SET10D.tmp
2009-03-08 02:35 . 2009-03-08 02:35 385024 ----a-w c:\windows\system32\SET101.tmp
2009-03-08 02:34 . 1979-12-31 22:00 914944 ----a-w c:\windows\system32\wininet.dll
2009-03-08 02:34 . 2009-03-08 02:34 1206784 ----a-w c:\windows\system32\SET12D.tmp
2009-03-08 02:34 . 2009-03-08 02:34 1469440 ------w c:\windows\system32\SET116.tmp
2009-03-08 02:34 . 2009-03-08 02:34 236544 ----a-w c:\windows\system32\SET12F.tmp
2009-03-08 02:34 . 2009-03-08 02:34 208384 ------w c:\windows\system32\SET130.tmp
2009-03-08 02:34 . 2009-03-08 02:34 43008 ----a-w c:\windows\system32\SET11A.tmp
2009-03-08 02:34 . 1979-12-31 22:00 43008 ----a-w c:\windows\system32\licmgr10.dll
2009-03-08 02:34 . 2009-03-08 02:34 105984 ----a-w c:\windows\system32\SET12C.tmp
2009-03-08 02:34 . 2009-03-08 02:34 193536 ------w c:\windows\system32\SET126.tmp
2009-03-08 02:34 . 2009-03-08 02:34 109568 ------w c:\windows\system32\SET129.tmp
2009-03-08 02:33 . 2009-03-08 02:33 18944 ------w c:\windows\system32\SETFE.tmp
2009-03-08 02:33 . 1979-12-31 22:00 18944 ----a-w c:\windows\system32\corpol.dll
2009-03-08 02:33 . 2009-03-08 02:33 25600 ------w c:\windows\system32\SET119.tmp
2009-03-08 02:33 . 2009-03-08 02:33 726528 ----a-w c:\windows\system32\SET118.tmp
2009-03-08 02:33 . 2009-03-08 02:33 229376 ------w c:\windows\system32\SET107.tmp
2009-03-08 02:33 . 2009-03-08 02:33 420352 ----a-w c:\windows\system32\SET12E.tmp
2009-03-08 02:33 . 1979-12-31 22:00 420352 ----a-w c:\windows\system32\vbscript.dll
2009-03-08 02:33 . 2009-03-08 02:33 125952 ------w c:\windows\system32\SET106.tmp
2009-03-08 02:32 . 2009-03-08 02:32 72704 ----a-w c:\windows\system32\SETFB.tmp
2009-03-08 02:32 . 1979-12-31 22:00 72704 ----a-w c:\windows\system32\admparse.dll
2009-03-08 02:32 . 2009-03-08 02:32 173056 ------w c:\windows\system32\SET103.tmp
2009-03-08 02:32 . 2009-03-08 02:32 163840 ------w c:\windows\system32\SET108.tmp
2009-03-08 02:32 . 2009-03-08 02:32 71680 ----a-w c:\windows\system32\SET112.tmp
2009-03-08 02:32 . 2009-03-08 02:32 55808 ------w c:\windows\system32\SET110.tmp
2009-03-08 02:32 . 1979-12-31 22:00 71680 ----a-w c:\windows\system32\iesetup.dll
2009-03-08 02:32 . 2009-03-08 02:32 128512 ----a-w c:\windows\system32\SETFC.tmp
2009-03-08 02:32 . 2009-03-08 02:32 94720 ----a-w c:\windows\system32\SET117.tmp
2009-03-08 02:32 . 2009-03-08 02:32 594432 ----a-w c:\windows\system32\SET11B.tmp
2009-03-08 02:32 . 2009-03-08 02:32 1985024 ----a-w c:\windows\system32\SET111.tmp
2009-03-08 02:32 . 2009-03-08 02:32 611840 ------w c:\windows\system32\SET128.tmp
2009-03-08 02:30 . 2009-03-08 02:30 66560 ----a-w c:\windows\system32\SET12B.tmp
2009-03-08 02:22 . 2009-03-08 02:22 164352 ------w c:\windows\system32\SET113.tmp
2009-03-08 02:22 . 2009-03-08 02:22 156160 ----a-w c:\windows\system32\SET125.tmp
2009-03-08 02:22 . 1979-12-31 22:00 156160 ----a-w c:\windows\system32\msls31.dll
2009-03-08 02:15 . 2009-03-08 02:15 57667 ----a-w c:\windows\system32\SET114.tmp
2009-03-08 02:11 . 2009-03-08 02:11 445952 ----a-w c:\windows\system32\SET10A.tmp
2009-03-06 14:46 . 1979-12-31 22:00 286208 ----a-w c:\windows\system32\pdh.dll
2009-03-02 15:14 . 2009-03-02 15:14 0 ----a-w C:\LOG1B.tmp
2009-03-02 14:53 . 2009-03-02 14:53 0 ----a-w C:\LOG5.tmp
2009-03-02 11:18 . 2009-03-02 11:18 0 ----a-w C:\LOGCE.tmp
2009-02-22 09:19 . 2009-02-22 09:19 0 ----a-w C:\LOG2D.tmp
2009-02-21 23:25 . 2009-02-21 23:25 0 ----a-w C:\LOG2DE.tmp
2009-02-21 23:06 . 2009-02-21 23:06 0 ----a-w C:\LOG2C8.tmp
2009-02-21 12:18 . 2009-02-21 12:18 0 ----a-w C:\LOG137.tmp
2009-02-21 12:14 . 2009-02-21 12:14 0 ----a-w C:\LOG136.tmp
.
((((((((((((((((((((((((((((((((( Points de chargement Reg ))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* les éléments vides & les éléments initiaux légitimes ne sont pas listés
REGEDIT4
[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"LDM"="c:\program files\Logitech\Desktop Messenger\8876480\Program\LogitechDesktopMessenger.exe" [2006-12-26 32768]
"MsnMsgr"="c:\program files\Windows Live\Messenger\msnmsgr.exe" [2007-10-18 5724184]
"MSMSGS"="c:\program files\Messenger\msmsgs.exe" [2004-10-13 1694208]
"ctfmon.exe"="c:\windows\system32\ctfmon.exe" [2004-08-05 15360]
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"RemoteControl"="c:\program files\CyberLink\PowerDVD\PDVDServ.exe" [2003-10-21 40960]
"NeroFilterCheck"="c:\windows\system32\NeroCheck.exe" [2001-07-09 155648]
"InCD"="c:\program files\Ahead\InCD\InCD.exe" [2004-10-18 1315840]
"PROMT Integrator"="c:\program files\PROMT5\INTEGRAL\PinStart.exe" [2001-09-03 49152]
"avgnt"="c:\program files\Avira\AntiVir PersonalEdition Classic\avgnt.exe" [2008-06-12 266497]
"LifeCam"="c:\program files\Microsoft LifeCam\LifeExp.exe" [2007-05-17 279912]
"VX1000"="c:\windows\vVX1000.exe" [2007-04-10 709992]
"Adobe Reader Speed Launcher"="c:\program files\Adobe\Reader 9.0\Reader\Reader_sl.exe" [2009-02-27 35696]
"BboxUpdate"="c:\program files\BboxUpdate\BTLiveUpdate.exe" [2008-08-06 103936]
"QuickTime Task"="c:\program files\QuickTime\qttask.exe" [2009-01-05 413696]
"SoundMan"="SOUNDMAN.EXE" - c:\windows\SOUNDMAN.EXE [2004-05-14 67072]
"BluetoothAuthenticationAgent"="bthprops.cpl" - c:\windows\system32\BTHPROPS.CPL [2004-08-05 110592]
"Logitech Hardware Abstraction Layer"="KHALMNPR.EXE" - c:\windows\KHALMNPR.Exe [2008-02-29 76304]
"Kernel and Hardware Abstraction Layer"="KHALMNPR.EXE" - c:\windows\KHALMNPR.Exe [2008-02-29 76304]
[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run]
"CTFMON.EXE"="c:\windows\system32\CTFMON.EXE" [2004-08-05 15360]
c:\documents and settings\All Users\Menu D‚marrer\Programmes\D‚marrage\
Microsoft Office.lnk - c:\program files\Microsoft Office\Office10\OSA.EXE [2001-2-13 83360]
Logitech Desktop Messenger.lnk - c:\program files\Logitech\Desktop Messenger\8876480\Program\LDMConf.exe [2006-12-26 450560]
Logitech SetPoint.lnk - c:\program files\Logitech\SetPoint\SetPoint.exe [2008-10-14 805392]
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\LBTWlgn]
2008-05-02 00:42 72208 ----a-w c:\program files\Fichiers communs\Logitech\Bluetooth\LBTWLgn.dll
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\WdfLoadGroup]
@=""
[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring]
"DisableMonitoring"=dword:00000001
[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\SymantecAntiVirus]
"DisableMonitoring"=dword:00000001
[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\SymantecFirewall]
"DisableMonitoring"=dword:00000001
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile]
"EnableFirewall"= 0 (0x0)
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%windir%\\system32\\sessmgr.exe"=
"c:\\Program Files\\Messenger\\MSMSGS.EXE"=
"c:\\Program Files\\Logitech\\Desktop Messenger\\8876480\\Program\\LogitechDesktopMessenger.exe"=
"c:\\Program Files\\eMule\\emule.exe"=
"c:\\WINDOWS\\System32\\rtcshare.exe"=
"c:\\Program Files\\NetMeeting\\conf.exe"=
"%windir%\\Network Diagnostic\\xpnetdiag.exe"=
"c:\\Program Files\\Microsoft LifeCam\\LifeCam.exe"=
"c:\\Program Files\\Microsoft LifeCam\\LifeExp.exe"=
"c:\\Program Files\\Mozilla Firefox\\firefox.exe"=
"c:\\Program Files\\Windows Live\\Messenger\\MSNMSGR.EXE"=
"c:\\Program Files\\Windows Live\\Messenger\\livecall.exe"=
"c:\\Program Files\\Bbox\\eSKernel.exe"=
"c:\\Program Files\\BboxUpdate\\BTLiveUpdate.exe"=
R0 PzWDM;PzWDM;c:\windows\system32\drivers\PzWDM.sys [25/12/2007 19:40 15172]
.
Contenu du dossier 'Tâches planifiées'
2009-05-20 c:\windows\Tasks\User_Feed_Synchronization-{FF5DF99F-C204-45E8-9DC9-B60BD76EAA1D}.job
- c:\windows\system32\msfeedssync.exe [2007-08-13 02:31]
2009-05-14 c:\windows\Tasks\AppleSoftwareUpdate.job
- c:\program files\Apple Software Update\SoftwareUpdate.exe [2008-07-30 10:34]
.
- - - - ORPHELINS SUPPRIMES - - - -
HKCU-RunOnce-Shockwave Updater - c:\windows\system32\ADOBE\SHOCKW~1\SWHELP~1.EXE -Update -1100465 -Mozilla/5.0 (Windows; U; Windows NT 5.1; fr; rv:1.9.0.7) Gecko/2009021910 Firefox/3.0.7
HKLM-Run-DXDllRegExe - dxdllreg.exe
Notify-vtUkihHB - vtUkihHB.dll
.
------- Examen supplémentaire -------
.
uSearchMigratedDefaultURL = hxxp://www.google.com/search?q={searchTerms}
uInternet Connection Wizard,ShellNext = iexplore
IE: &Windows Live Search - c:\program files\Windows Live Toolbar\msntb.dll/search.htm
IE: Add to Windows &Live Favorites - https://onedrive.live.com/?id=favorites
IE: E&xporter vers Microsoft Excel - c:\progra~1\MICROS~2\Office10\EXCEL.EXE/3000
IE: Easy-WebPrint Ajouter à la liste d'impressions - c:\program files\Canon\Easy-WebPrint\Resource.dll/RC_AddToList.html
IE: Easy-WebPrint Impression rapide - c:\program files\Canon\Easy-WebPrint\Resource.dll/RC_HSPrint.html
IE: Easy-WebPrint Imprimer - c:\program files\Canon\Easy-WebPrint\Resource.dll/RC_Print.html
IE: Easy-WebPrint Prévisualiser - c:\program files\Canon\Easy-WebPrint\Resource.dll/RC_Preview.html
IE: Ouvrir dans un nouvel onglet d'arrière-plan - c:\program files\Windows Live Toolbar\Components\fr-fr\msntabres.dll.mui/229?2a22063e1a6841fa860803837843fbd1
IE: Ouvrir dans un nouvel onglet de premier plan - c:\program files\Windows Live Toolbar\Components\fr-fr\msntabres.dll.mui/230?2a22063e1a6841fa860803837843fbd1
IE: {{7A2EFD41-E6B3-11D2-89E3-00E0292EE574} - c:\program files\PROMT5\PROMTIE4\promtie5.htm
IE: {{7A2EFD41-E6B3-11D2-89E3-00E0292EE575} - c:\program files\PROMT5\PROMTIE4\options.htm
FF - ProfilePath - c:\documents and settings\13\Application Data\Mozilla\Firefox\Profiles\9ka9hnr1.default\
FF - prefs.js: browser.search.defaulturl - hxxp://search.sweetim.com/search.asp?src=2&q=
FF - prefs.js: browser.search.selectedEngine - Google
FF - prefs.js: browser.startup.homepage - hxxp://fr.msn.com/
FF - prefs.js: keyword.URL - hxxp://search.sweetim.com/search.asp?src=2&q=
.
**************************************************************************
catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2009-05-20 14:18
Windows 5.1.2600 Service Pack 2 FAT NTAPI
Recherche de processus cachés ...
Recherche d'éléments en démarrage automatique cachés ...
Recherche de fichiers cachés ...
Scan terminé avec succès
Fichiers cachés: 0
**************************************************************************
.
--------------------- DLLs chargées dans les processus actifs ---------------------
- - - - - - - > 'winlogon.exe'(528)
c:\program files\fichiers communs\logitech\bluetooth\LBTWlgn.dll
c:\program files\fichiers communs\logitech\bluetooth\LBTServ.dll
- - - - - - - > 'explorer.exe'(2896)
c:\program files\Logitech\SetPoint\lgscroll.dll
c:\progra~1\WINDOW~2\wmpband.dll
c:\windows\system32\ieframe.dll
c:\windows\system32\webcheck.dll
c:\windows\system32\WPDShServiceObj.dll
c:\windows\system32\PortableDeviceTypes.dll
c:\windows\system32\PortableDeviceApi.dll
.
------------------------ Autres processus actifs ------------------------
.
c:\program files\AHEAD\INCD\INCDSRV.EXE
c:\program files\AVIRA\ANTIVIR PERSONALEDITION CLASSIC\SCHED.EXE
c:\program files\AVIRA\ANTIVIR PERSONALEDITION CLASSIC\AVGUARD.EXE
c:\program files\MICROSOFT LIFECAM\MSCAMS32.EXE
c:\windows\SYSTEM32\RUNDLL32.EXE
c:\program files\PROMT5\INTEGRAL\PINMENU.EXE
c:\program files\FICHIERS COMMUNS\LOGISHRD\KHAL2\KHALMNPR.EXE
c:\windows\SYSTEM32\WSCNTFY.EXE
.
**************************************************************************
.
Heure de fin: 2009-05-20 14:21 - La machine a redémarré
ComboFix-quarantined-files.txt 2009-05-20 12:21
Avant-CF: 7 321 354 240 octets libres
Après-CF: 7 670 431 744 octets libres
WindowsXP-KB310994-SP2-Home-BootDisk-FRA.exe
[boot loader]
timeout=2
default=multi(0)disk(0)rdisk(0)partition(1)\WINDOWS
[operating systems]
c:\cmdcons\BOOTSECT.DAT="Microsoft Windows Recovery Console" /cmdcons
multi(0)disk(0)rdisk(0)partition(1)\WINDOWS="Microsoft Windows XP dition familiale" /noexecute=optin /fastdetect
249 --- E O F --- 2009-05-13 16:03
non j'ai fait le scan le 14 mai . (je te le poste). Mais je m'en suis aperçu il y a quelques jours et j'ai donc revérifié après combofix pour voir s'il les avait fait disparaitre.
Malwarebytes' Anti-Malware 1.36
Version de la base de données: 2128
Windows 5.1.2600 Service Pack 2
14/05/2009 09:22:31
mbam-log-2009-05-14 (09-22-31).txt
Type de recherche: Examen complet (C:\|)
Eléments examinés: 165917
Temps écoulé: 25 minute(s), 49 second(s)
Processus mémoire infecté(s): 0
Module(s) mémoire infecté(s): 0
Clé(s) du Registre infectée(s): 0
Valeur(s) du Registre infectée(s): 0
Elément(s) de données du Registre infecté(s): 0
Dossier(s) infecté(s): 0
Fichier(s) infecté(s): 1
Processus mémoire infecté(s):
(Aucun élément nuisible détecté)
Module(s) mémoire infecté(s):
(Aucun élément nuisible détecté)
Clé(s) du Registre infectée(s):
(Aucun élément nuisible détecté)
Valeur(s) du Registre infectée(s):
(Aucun élément nuisible détecté)
Elément(s) de données du Registre infecté(s):
(Aucun élément nuisible détecté)
Dossier(s) infecté(s):
(Aucun élément nuisible détecté)
Fichier(s) infecté(s):
C:\WINDOWS\msnmsgrss.exe (Backdoor.Bot) -> Quarantined and deleted successfully.
Malwarebytes' Anti-Malware 1.36
Version de la base de données: 2128
Windows 5.1.2600 Service Pack 2
14/05/2009 09:22:31
mbam-log-2009-05-14 (09-22-31).txt
Type de recherche: Examen complet (C:\|)
Eléments examinés: 165917
Temps écoulé: 25 minute(s), 49 second(s)
Processus mémoire infecté(s): 0
Module(s) mémoire infecté(s): 0
Clé(s) du Registre infectée(s): 0
Valeur(s) du Registre infectée(s): 0
Elément(s) de données du Registre infecté(s): 0
Dossier(s) infecté(s): 0
Fichier(s) infecté(s): 1
Processus mémoire infecté(s):
(Aucun élément nuisible détecté)
Module(s) mémoire infecté(s):
(Aucun élément nuisible détecté)
Clé(s) du Registre infectée(s):
(Aucun élément nuisible détecté)
Valeur(s) du Registre infectée(s):
(Aucun élément nuisible détecté)
Elément(s) de données du Registre infecté(s):
(Aucun élément nuisible détecté)
Dossier(s) infecté(s):
(Aucun élément nuisible détecté)
Fichier(s) infecté(s):
C:\WINDOWS\msnmsgrss.exe (Backdoor.Bot) -> Quarantined and deleted successfully.
oui effectivement, je ne comprends pas, ce rapport, je l'ai trouvé lorsque j'ouvre malwarebyte dans rapport mais en le lisant, j'ai vu qu'il ne reflète pas la liste de la quarantaine apparente dans malwarebytes onglet quarantaine.
est que je peux trouver un autre rapport ailleurs ?
j'ai trouvé celui du 13 mai qui semble plus infecté. je te le poste. Sinon, je refais un nouveau scan malwarebytes mais pourquoi ces infections sont encore listées dans la quarantaine ?
Malwarebytes' Anti-Malware 1.35
Version de la base de données: 1917
Windows 5.1.2600 Service Pack 2
13/05/2009 21:16:17
mbam-log-2009-05-13 (21-16-17).txt
Type de recherche: Examen complet (C:\|)
Eléments examinés: 154626
Temps écoulé: 41 minute(s), 56 second(s)
Processus mémoire infecté(s): 0
Module(s) mémoire infecté(s): 4
Clé(s) du Registre infectée(s): 7
Valeur(s) du Registre infectée(s): 5
Elément(s) de données du Registre infecté(s): 6
Dossier(s) infecté(s): 0
Fichier(s) infecté(s): 6
Processus mémoire infecté(s):
(Aucun élément nuisible détecté)
Module(s) mémoire infecté(s):
C:\WINDOWS\system32\kugeyugu.dll (Trojan.Vundo.H) -> Delete on reboot.
C:\WINDOWS\system32\yizesoko.dll (Trojan.Vundo.H) -> Delete on reboot.
C:\WINDOWS\system32\vabofoka.dll (Trojan.Vundo.H) -> Delete on reboot.
c:\WINDOWS\system32\pogobiwu.dll (Trojan.Vundo.H) -> Delete on reboot.
Clé(s) du Registre infectée(s):
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{499e9650-0baa-4087-9c29-6a5000dba20c} (Trojan.Vundo.H) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{499e9650-0baa-4087-9c29-6a5000dba20c} (Trojan.Vundo.H) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{499e9650-0baa-4087-9c29-6a5000dba20c} (Trojan.Vundo.H) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{ec43e3fd-5c60-46a6-97d7-e0b85dbdd6c4} (Trojan.Vundo.H) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\contim (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\dslcnnct (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\rdfa (Trojan.Vundo) -> Quarantined and deleted successfully.
Valeur(s) du Registre infectée(s):
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\320d18a1 (Trojan.Vundo.H) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cpm313e2b3d (Trojan.Vundo.H) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\rirawapola (Trojan.Vundo.H) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler\{ec43e3fd-5c60-46a6-97d7-e0b85dbdd6c4} (Trojan.Vundo.H) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\ssodl (Trojan.Vundo.H) -> Quarantined and deleted successfully.
Elément(s) de données du Registre infecté(s):
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows\AppInit_DLLs (Trojan.Vundo.H) -> Data: c:\windows\system32\vabofoka.dll -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\LSA\Notification Packages (Trojan.Vundo.H) -> Data: c:\windows\system32\vabofoka.dll -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows\AppInit_DLLs (Trojan.Vundo.H) -> Data: system32\vabofoka.dll -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows\AppInit_DLLs (Trojan.Vundo.H) -> Data: c:\windows\system32\pogobiwu.dll -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows\AppInit_DLLs (Trojan.Vundo.H) -> Data: system32\pogobiwu.dll -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\UpdatesDisableNotify (Disabled.SecurityCenter) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.
Dossier(s) infecté(s):
(Aucun élément nuisible détecté)
Fichier(s) infecté(s):
C:\WINDOWS\system32\kugeyugu.dll (Trojan.Vundo.H) -> Delete on reboot.
C:\WINDOWS\system32\uguyeguk.ini (Trojan.Vundo.H) -> Quarantined and deleted successfully.
c:\WINDOWS\system32\pogobiwu.dll (Trojan.Vundo.H) -> Delete on reboot.
C:\WINDOWS\system32\yizesoko.dll (Trojan.Vundo.H) -> Delete on reboot.
C:\WINDOWS\system32\vabofoka.dll (Trojan.Vundo.H) -> Delete on reboot.
C:\System Volume Information\_restore{4081E8B6-077E-420E-8973-EE0643E83BA3}\RP650\A0108179.dll (Trojan.Vundo.H) -> Quarantined and deleted successfully.
est que je peux trouver un autre rapport ailleurs ?
j'ai trouvé celui du 13 mai qui semble plus infecté. je te le poste. Sinon, je refais un nouveau scan malwarebytes mais pourquoi ces infections sont encore listées dans la quarantaine ?
Malwarebytes' Anti-Malware 1.35
Version de la base de données: 1917
Windows 5.1.2600 Service Pack 2
13/05/2009 21:16:17
mbam-log-2009-05-13 (21-16-17).txt
Type de recherche: Examen complet (C:\|)
Eléments examinés: 154626
Temps écoulé: 41 minute(s), 56 second(s)
Processus mémoire infecté(s): 0
Module(s) mémoire infecté(s): 4
Clé(s) du Registre infectée(s): 7
Valeur(s) du Registre infectée(s): 5
Elément(s) de données du Registre infecté(s): 6
Dossier(s) infecté(s): 0
Fichier(s) infecté(s): 6
Processus mémoire infecté(s):
(Aucun élément nuisible détecté)
Module(s) mémoire infecté(s):
C:\WINDOWS\system32\kugeyugu.dll (Trojan.Vundo.H) -> Delete on reboot.
C:\WINDOWS\system32\yizesoko.dll (Trojan.Vundo.H) -> Delete on reboot.
C:\WINDOWS\system32\vabofoka.dll (Trojan.Vundo.H) -> Delete on reboot.
c:\WINDOWS\system32\pogobiwu.dll (Trojan.Vundo.H) -> Delete on reboot.
Clé(s) du Registre infectée(s):
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{499e9650-0baa-4087-9c29-6a5000dba20c} (Trojan.Vundo.H) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{499e9650-0baa-4087-9c29-6a5000dba20c} (Trojan.Vundo.H) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{499e9650-0baa-4087-9c29-6a5000dba20c} (Trojan.Vundo.H) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{ec43e3fd-5c60-46a6-97d7-e0b85dbdd6c4} (Trojan.Vundo.H) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\contim (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\dslcnnct (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\rdfa (Trojan.Vundo) -> Quarantined and deleted successfully.
Valeur(s) du Registre infectée(s):
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\320d18a1 (Trojan.Vundo.H) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cpm313e2b3d (Trojan.Vundo.H) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\rirawapola (Trojan.Vundo.H) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler\{ec43e3fd-5c60-46a6-97d7-e0b85dbdd6c4} (Trojan.Vundo.H) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\ssodl (Trojan.Vundo.H) -> Quarantined and deleted successfully.
Elément(s) de données du Registre infecté(s):
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows\AppInit_DLLs (Trojan.Vundo.H) -> Data: c:\windows\system32\vabofoka.dll -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\LSA\Notification Packages (Trojan.Vundo.H) -> Data: c:\windows\system32\vabofoka.dll -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows\AppInit_DLLs (Trojan.Vundo.H) -> Data: system32\vabofoka.dll -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows\AppInit_DLLs (Trojan.Vundo.H) -> Data: c:\windows\system32\pogobiwu.dll -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows\AppInit_DLLs (Trojan.Vundo.H) -> Data: system32\pogobiwu.dll -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\UpdatesDisableNotify (Disabled.SecurityCenter) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.
Dossier(s) infecté(s):
(Aucun élément nuisible détecté)
Fichier(s) infecté(s):
C:\WINDOWS\system32\kugeyugu.dll (Trojan.Vundo.H) -> Delete on reboot.
C:\WINDOWS\system32\uguyeguk.ini (Trojan.Vundo.H) -> Quarantined and deleted successfully.
c:\WINDOWS\system32\pogobiwu.dll (Trojan.Vundo.H) -> Delete on reboot.
C:\WINDOWS\system32\yizesoko.dll (Trojan.Vundo.H) -> Delete on reboot.
C:\WINDOWS\system32\vabofoka.dll (Trojan.Vundo.H) -> Delete on reboot.
C:\System Volume Information\_restore{4081E8B6-077E-420E-8973-EE0643E83BA3}\RP650\A0108179.dll (Trojan.Vundo.H) -> Quarantined and deleted successfully.
voici le rapport malwarebytes.(l'onglet quarantaine dans programme malwarebytes contient toujours les 69 éléments, je les supprime ? C'est peut etre juste la liste de ce qu'il avait mis en quarantaine précédement ?)
mais antivir, pendant le scan de malwerbytes vient de me signaler 2 alertes. Comment est ce possible alors que le rapport ici n'indique rien ?
Malwarebytes' Anti-Malware 1.36
Version de la base de données: 2157
Windows 5.1.2600 Service Pack 2
20/05/2009 15:33:52
mbam-log-2009-05-20 (15-33-52).txt
Type de recherche: Examen complet (C:\|)
Eléments examinés: 157960
Temps écoulé: 35 minute(s), 23 second(s)
Processus mémoire infecté(s): 0
Module(s) mémoire infecté(s): 0
Clé(s) du Registre infectée(s): 0
Valeur(s) du Registre infectée(s): 0
Elément(s) de données du Registre infecté(s): 0
Dossier(s) infecté(s): 0
Fichier(s) infecté(s): 0
Processus mémoire infecté(s):
(Aucun élément nuisible détecté)
Module(s) mémoire infecté(s):
(Aucun élément nuisible détecté)
Clé(s) du Registre infectée(s):
(Aucun élément nuisible détecté)
Valeur(s) du Registre infectée(s):
(Aucun élément nuisible détecté)
Elément(s) de données du Registre infecté(s):
(Aucun élément nuisible détecté)
Dossier(s) infecté(s):
(Aucun élément nuisible détecté)
Fichier(s) infecté(s):
(Aucun élément nuisible détecté)
mais antivir, pendant le scan de malwerbytes vient de me signaler 2 alertes. Comment est ce possible alors que le rapport ici n'indique rien ?
Malwarebytes' Anti-Malware 1.36
Version de la base de données: 2157
Windows 5.1.2600 Service Pack 2
20/05/2009 15:33:52
mbam-log-2009-05-20 (15-33-52).txt
Type de recherche: Examen complet (C:\|)
Eléments examinés: 157960
Temps écoulé: 35 minute(s), 23 second(s)
Processus mémoire infecté(s): 0
Module(s) mémoire infecté(s): 0
Clé(s) du Registre infectée(s): 0
Valeur(s) du Registre infectée(s): 0
Elément(s) de données du Registre infecté(s): 0
Dossier(s) infecté(s): 0
Fichier(s) infecté(s): 0
Processus mémoire infecté(s):
(Aucun élément nuisible détecté)
Module(s) mémoire infecté(s):
(Aucun élément nuisible détecté)
Clé(s) du Registre infectée(s):
(Aucun élément nuisible détecté)
Valeur(s) du Registre infectée(s):
(Aucun élément nuisible détecté)
Elément(s) de données du Registre infecté(s):
(Aucun élément nuisible détecté)
Dossier(s) infecté(s):
(Aucun élément nuisible détecté)
Fichier(s) infecté(s):
(Aucun élément nuisible détecté)
j'ai fait un scan antivir le voila
Avira AntiVir Personal
Report file date: mercredi 20 mai 2009 15:40
Scanning for 1410306 virus strains and unwanted programs.
Licensed to: Avira AntiVir PersonalEdition Classic
Serial number: 0000149996-ADJIE-0001
Platform: Windows XP
Windows version: (Service Pack 2) [5.1.2600]
Boot mode: Normally booted
Username: SYSTEM
Computer name: LAURA
Version information:
BUILD.DAT : 8.2.0.348 16934 Bytes 23/03/2009 13:44:00
AVSCAN.EXE : 8.1.4.10 315649 Bytes 26/11/2008 17:34:24
AVSCAN.DLL : 8.1.4.0 40705 Bytes 26/05/2008 07:56:42
LUKE.DLL : 8.1.4.5 164097 Bytes 12/06/2008 12:44:20
LUKERES.DLL : 8.1.4.0 12033 Bytes 26/05/2008 07:58:54
ANTIVIR0.VDF : 7.1.0.0 15603712 Bytes 27/10/2008 16:38:28
ANTIVIR1.VDF : 7.1.2.12 3336192 Bytes 11/02/2009 12:09:22
ANTIVIR2.VDF : 7.1.3.185 2010112 Bytes 12/05/2009 17:29:08
ANTIVIR3.VDF : 7.1.3.231 325632 Bytes 19/05/2009 17:19:28
Engineversion : 8.2.0.168
AEVDF.DLL : 8.1.1.1 106868 Bytes 03/05/2009 17:18:28
AESCRIPT.DLL : 8.1.2.0 389497 Bytes 15/05/2009 17:21:34
AESCN.DLL : 8.1.2.3 127347 Bytes 15/05/2009 17:21:32
AERDL.DLL : 8.1.1.3 438645 Bytes 05/11/2008 17:33:36
AEPACK.DLL : 8.1.3.16 397686 Bytes 08/05/2009 17:19:58
AEOFFICE.DLL : 8.1.0.36 196987 Bytes 27/02/2009 12:07:28
AEHEUR.DLL : 8.1.0.129 1761655 Bytes 15/05/2009 17:21:32
AEHELP.DLL : 8.1.2.2 119158 Bytes 27/02/2009 12:07:28
AEGEN.DLL : 8.1.1.44 348532 Bytes 15/05/2009 17:21:24
AEEMU.DLL : 8.1.0.9 393588 Bytes 15/10/2008 17:23:26
AECORE.DLL : 8.1.6.9 176500 Bytes 14/04/2009 17:08:52
AEBB.DLL : 8.1.0.3 53618 Bytes 15/10/2008 17:23:18
AVWINLL.DLL : 1.0.0.12 15105 Bytes 09/07/2008 08:40:06
AVPREF.DLL : 8.0.2.0 38657 Bytes 16/05/2008 09:28:02
AVREP.DLL : 8.0.0.3 155688 Bytes 22/04/2009 17:09:24
AVREG.DLL : 8.0.0.1 33537 Bytes 09/05/2008 11:26:42
AVARKT.DLL : 1.0.0.23 307457 Bytes 12/02/2008 08:29:24
AVEVTLOG.DLL : 8.0.0.16 119041 Bytes 12/06/2008 12:27:50
SQLITE3.DLL : 3.3.17.1 339968 Bytes 22/01/2008 17:28:04
SMTPLIB.DLL : 1.2.0.23 28929 Bytes 12/06/2008 12:49:42
NETNT.DLL : 8.0.0.1 7937 Bytes 25/01/2008 12:05:12
RCIMAGE.DLL : 8.0.0.51 2371841 Bytes 12/06/2008 13:48:08
RCTEXT.DLL : 8.0.52.0 86273 Bytes 27/06/2008 13:34:38
Configuration settings for the scan:
Jobname..........................: Complete system scan
Configuration file...............: c:\program files\avira\antivir personaledition classic\sysscan.avp
Logging..........................: low
Primary action...................: interactive
Secondary action.................: ignore
Scan master boot sector..........: on
Scan boot sector.................: on
Boot sectors.....................: C:,
Process scan.....................: on
Scan registry....................: on
Search for rootkits..............: on
Scan all files...................: All files
Scan archives....................: on
Recursion depth..................: 20
Smart extensions.................: on
Macro heuristic..................: on
File heuristic...................: high
Start of the scan: mercredi 20 mai 2009 15:40
Starting search for hidden objects.
'54735' objects were checked, '0' hidden objects were found.
The scan of running processes will be started
Scan process 'avscan.exe' - '1' Module(s) have been scanned
Scan process 'avcenter.exe' - '1' Module(s) have been scanned
Scan process 'firefox.exe' - '1' Module(s) have been scanned
Scan process 'EXPLORER.EXE' - '1' Module(s) have been scanned
Scan process 'KHALMNPR.EXE' - '1' Module(s) have been scanned
Scan process 'SVCHOST.EXE' - '1' Module(s) have been scanned
Scan process 'SetPoint.exe' - '1' Module(s) have been scanned
Scan process 'PINMENU.EXE' - '1' Module(s) have been scanned
Scan process 'CTFMON.EXE' - '1' Module(s) have been scanned
Scan process 'MSMSGS.EXE' - '1' Module(s) have been scanned
Scan process 'LogitechDesktopMessenger.exe' - '1' Module(s) have been scanned
Scan process 'BTLiveUpdate.exe' - '1' Module(s) have been scanned
Scan process 'AVGNT.EXE' - '1' Module(s) have been scanned
Scan process 'RUNDLL32.EXE' - '1' Module(s) have been scanned
Scan process 'InCD.exe' - '1' Module(s) have been scanned
Scan process 'PDVDServ.exe' - '1' Module(s) have been scanned
Scan process 'SOUNDMAN.EXE' - '1' Module(s) have been scanned
Scan process 'ALG.EXE' - '1' Module(s) have been scanned
Scan process 'SVCHOST.EXE' - '1' Module(s) have been scanned
Scan process 'MSCamS32.exe' - '1' Module(s) have been scanned
Scan process 'SVCHOST.EXE' - '1' Module(s) have been scanned
Scan process 'AVGUARD.EXE' - '1' Module(s) have been scanned
Scan process 'SVCHOST.EXE' - '1' Module(s) have been scanned
Scan process 'SCHED.EXE' - '1' Module(s) have been scanned
Scan process 'SPOOLSV.EXE' - '1' Module(s) have been scanned
Scan process 'SVCHOST.EXE' - '1' Module(s) have been scanned
Scan process 'SVCHOST.EXE' - '1' Module(s) have been scanned
Scan process 'InCDsrv.exe' - '1' Module(s) have been scanned
Scan process 'SVCHOST.EXE' - '1' Module(s) have been scanned
Scan process 'SVCHOST.EXE' - '1' Module(s) have been scanned
Scan process 'SVCHOST.EXE' - '1' Module(s) have been scanned
Scan process 'LSASS.EXE' - '1' Module(s) have been scanned
Scan process 'SERVICES.EXE' - '1' Module(s) have been scanned
Scan process 'WINLOGON.EXE' - '1' Module(s) have been scanned
Scan process 'CSRSS.EXE' - '1' Module(s) have been scanned
Scan process 'SMSS.EXE' - '1' Module(s) have been scanned
36 processes with 36 modules were scanned
Starting master boot sector scan:
Master boot sector HD0
[INFO] No virus was found!
Master boot sector HD1
[INFO] No virus was found!
[WARNING] System error [21]: Le périphérique n'est pas prêt.
Master boot sector HD2
[INFO] No virus was found!
[WARNING] System error [21]: Le périphérique n'est pas prêt.
Master boot sector HD3
[INFO] No virus was found!
[WARNING] System error [21]: Le périphérique n'est pas prêt.
Master boot sector HD4
[INFO] No virus was found!
[WARNING] System error [21]: Le périphérique n'est pas prêt.
Start scanning boot sectors:
Boot sector 'C:\'
[INFO] No virus was found!
Starting to scan the registry.
The registry was scanned ( '64' files ).
Starting the file scan:
Begin scan in 'C:\' <ACER>
C:\pagefile.sys
[WARNING] The file could not be opened!
C:\hiberfil.sys
[WARNING] The file could not be opened!
C:\System Volume Information\_restore{4081E8B6-077E-420E-8973-EE0643E83BA3}\RP649\A0107195.EXE
[DETECTION] Contains recognition pattern of the DR/Sdbot.100864 dropper
[NOTE] The file was moved to '4a450f8a.qua'!
C:\System Volume Information\_restore{4081E8B6-077E-420E-8973-EE0643E83BA3}\RP650\A0109229.exe
[DETECTION] Contains recognition pattern of the WORM/SdBot.44082 worm
[NOTE] The file was moved to '4a450f90.qua'!
End of the scan: mercredi 20 mai 2009 16:11
Used time: 30:26 Minute(s)
The scan has been done completely.
6306 Scanning directories
187653 Files were scanned
2 viruses and/or unwanted programs were found
0 Files were classified as suspicious:
0 files were deleted
0 files were repaired
2 files were moved to quarantine
0 files were renamed
2 Files cannot be scanned
187649 Files not concerned
6969 Archives were scanned
6 Warnings
2 Notes
54735 Objects were scanned with rootkit scan
0 Hidden objects were found
Avira AntiVir Personal
Report file date: mercredi 20 mai 2009 15:40
Scanning for 1410306 virus strains and unwanted programs.
Licensed to: Avira AntiVir PersonalEdition Classic
Serial number: 0000149996-ADJIE-0001
Platform: Windows XP
Windows version: (Service Pack 2) [5.1.2600]
Boot mode: Normally booted
Username: SYSTEM
Computer name: LAURA
Version information:
BUILD.DAT : 8.2.0.348 16934 Bytes 23/03/2009 13:44:00
AVSCAN.EXE : 8.1.4.10 315649 Bytes 26/11/2008 17:34:24
AVSCAN.DLL : 8.1.4.0 40705 Bytes 26/05/2008 07:56:42
LUKE.DLL : 8.1.4.5 164097 Bytes 12/06/2008 12:44:20
LUKERES.DLL : 8.1.4.0 12033 Bytes 26/05/2008 07:58:54
ANTIVIR0.VDF : 7.1.0.0 15603712 Bytes 27/10/2008 16:38:28
ANTIVIR1.VDF : 7.1.2.12 3336192 Bytes 11/02/2009 12:09:22
ANTIVIR2.VDF : 7.1.3.185 2010112 Bytes 12/05/2009 17:29:08
ANTIVIR3.VDF : 7.1.3.231 325632 Bytes 19/05/2009 17:19:28
Engineversion : 8.2.0.168
AEVDF.DLL : 8.1.1.1 106868 Bytes 03/05/2009 17:18:28
AESCRIPT.DLL : 8.1.2.0 389497 Bytes 15/05/2009 17:21:34
AESCN.DLL : 8.1.2.3 127347 Bytes 15/05/2009 17:21:32
AERDL.DLL : 8.1.1.3 438645 Bytes 05/11/2008 17:33:36
AEPACK.DLL : 8.1.3.16 397686 Bytes 08/05/2009 17:19:58
AEOFFICE.DLL : 8.1.0.36 196987 Bytes 27/02/2009 12:07:28
AEHEUR.DLL : 8.1.0.129 1761655 Bytes 15/05/2009 17:21:32
AEHELP.DLL : 8.1.2.2 119158 Bytes 27/02/2009 12:07:28
AEGEN.DLL : 8.1.1.44 348532 Bytes 15/05/2009 17:21:24
AEEMU.DLL : 8.1.0.9 393588 Bytes 15/10/2008 17:23:26
AECORE.DLL : 8.1.6.9 176500 Bytes 14/04/2009 17:08:52
AEBB.DLL : 8.1.0.3 53618 Bytes 15/10/2008 17:23:18
AVWINLL.DLL : 1.0.0.12 15105 Bytes 09/07/2008 08:40:06
AVPREF.DLL : 8.0.2.0 38657 Bytes 16/05/2008 09:28:02
AVREP.DLL : 8.0.0.3 155688 Bytes 22/04/2009 17:09:24
AVREG.DLL : 8.0.0.1 33537 Bytes 09/05/2008 11:26:42
AVARKT.DLL : 1.0.0.23 307457 Bytes 12/02/2008 08:29:24
AVEVTLOG.DLL : 8.0.0.16 119041 Bytes 12/06/2008 12:27:50
SQLITE3.DLL : 3.3.17.1 339968 Bytes 22/01/2008 17:28:04
SMTPLIB.DLL : 1.2.0.23 28929 Bytes 12/06/2008 12:49:42
NETNT.DLL : 8.0.0.1 7937 Bytes 25/01/2008 12:05:12
RCIMAGE.DLL : 8.0.0.51 2371841 Bytes 12/06/2008 13:48:08
RCTEXT.DLL : 8.0.52.0 86273 Bytes 27/06/2008 13:34:38
Configuration settings for the scan:
Jobname..........................: Complete system scan
Configuration file...............: c:\program files\avira\antivir personaledition classic\sysscan.avp
Logging..........................: low
Primary action...................: interactive
Secondary action.................: ignore
Scan master boot sector..........: on
Scan boot sector.................: on
Boot sectors.....................: C:,
Process scan.....................: on
Scan registry....................: on
Search for rootkits..............: on
Scan all files...................: All files
Scan archives....................: on
Recursion depth..................: 20
Smart extensions.................: on
Macro heuristic..................: on
File heuristic...................: high
Start of the scan: mercredi 20 mai 2009 15:40
Starting search for hidden objects.
'54735' objects were checked, '0' hidden objects were found.
The scan of running processes will be started
Scan process 'avscan.exe' - '1' Module(s) have been scanned
Scan process 'avcenter.exe' - '1' Module(s) have been scanned
Scan process 'firefox.exe' - '1' Module(s) have been scanned
Scan process 'EXPLORER.EXE' - '1' Module(s) have been scanned
Scan process 'KHALMNPR.EXE' - '1' Module(s) have been scanned
Scan process 'SVCHOST.EXE' - '1' Module(s) have been scanned
Scan process 'SetPoint.exe' - '1' Module(s) have been scanned
Scan process 'PINMENU.EXE' - '1' Module(s) have been scanned
Scan process 'CTFMON.EXE' - '1' Module(s) have been scanned
Scan process 'MSMSGS.EXE' - '1' Module(s) have been scanned
Scan process 'LogitechDesktopMessenger.exe' - '1' Module(s) have been scanned
Scan process 'BTLiveUpdate.exe' - '1' Module(s) have been scanned
Scan process 'AVGNT.EXE' - '1' Module(s) have been scanned
Scan process 'RUNDLL32.EXE' - '1' Module(s) have been scanned
Scan process 'InCD.exe' - '1' Module(s) have been scanned
Scan process 'PDVDServ.exe' - '1' Module(s) have been scanned
Scan process 'SOUNDMAN.EXE' - '1' Module(s) have been scanned
Scan process 'ALG.EXE' - '1' Module(s) have been scanned
Scan process 'SVCHOST.EXE' - '1' Module(s) have been scanned
Scan process 'MSCamS32.exe' - '1' Module(s) have been scanned
Scan process 'SVCHOST.EXE' - '1' Module(s) have been scanned
Scan process 'AVGUARD.EXE' - '1' Module(s) have been scanned
Scan process 'SVCHOST.EXE' - '1' Module(s) have been scanned
Scan process 'SCHED.EXE' - '1' Module(s) have been scanned
Scan process 'SPOOLSV.EXE' - '1' Module(s) have been scanned
Scan process 'SVCHOST.EXE' - '1' Module(s) have been scanned
Scan process 'SVCHOST.EXE' - '1' Module(s) have been scanned
Scan process 'InCDsrv.exe' - '1' Module(s) have been scanned
Scan process 'SVCHOST.EXE' - '1' Module(s) have been scanned
Scan process 'SVCHOST.EXE' - '1' Module(s) have been scanned
Scan process 'SVCHOST.EXE' - '1' Module(s) have been scanned
Scan process 'LSASS.EXE' - '1' Module(s) have been scanned
Scan process 'SERVICES.EXE' - '1' Module(s) have been scanned
Scan process 'WINLOGON.EXE' - '1' Module(s) have been scanned
Scan process 'CSRSS.EXE' - '1' Module(s) have been scanned
Scan process 'SMSS.EXE' - '1' Module(s) have been scanned
36 processes with 36 modules were scanned
Starting master boot sector scan:
Master boot sector HD0
[INFO] No virus was found!
Master boot sector HD1
[INFO] No virus was found!
[WARNING] System error [21]: Le périphérique n'est pas prêt.
Master boot sector HD2
[INFO] No virus was found!
[WARNING] System error [21]: Le périphérique n'est pas prêt.
Master boot sector HD3
[INFO] No virus was found!
[WARNING] System error [21]: Le périphérique n'est pas prêt.
Master boot sector HD4
[INFO] No virus was found!
[WARNING] System error [21]: Le périphérique n'est pas prêt.
Start scanning boot sectors:
Boot sector 'C:\'
[INFO] No virus was found!
Starting to scan the registry.
The registry was scanned ( '64' files ).
Starting the file scan:
Begin scan in 'C:\' <ACER>
C:\pagefile.sys
[WARNING] The file could not be opened!
C:\hiberfil.sys
[WARNING] The file could not be opened!
C:\System Volume Information\_restore{4081E8B6-077E-420E-8973-EE0643E83BA3}\RP649\A0107195.EXE
[DETECTION] Contains recognition pattern of the DR/Sdbot.100864 dropper
[NOTE] The file was moved to '4a450f8a.qua'!
C:\System Volume Information\_restore{4081E8B6-077E-420E-8973-EE0643E83BA3}\RP650\A0109229.exe
[DETECTION] Contains recognition pattern of the WORM/SdBot.44082 worm
[NOTE] The file was moved to '4a450f90.qua'!
End of the scan: mercredi 20 mai 2009 16:11
Used time: 30:26 Minute(s)
The scan has been done completely.
6306 Scanning directories
187653 Files were scanned
2 viruses and/or unwanted programs were found
0 Files were classified as suspicious:
0 files were deleted
0 files were repaired
2 files were moved to quarantine
0 files were renamed
2 Files cannot be scanned
187649 Files not concerned
6969 Archives were scanned
6 Warnings
2 Notes
54735 Objects were scanned with rootkit scan
0 Hidden objects were found
il faut supprimer tout ce qu'il y a dans la quarantaine de malwarebytes en cliquant sur "tout supprimer"
vider la quarantaine d'antivir , clic sur "administration" puis sur quarantaine et cliquer sur l'icone de la corbeille
les cochonneries sont dans les points de restauration
il va falloir purger ton pc
vider la quarantaine d'antivir , clic sur "administration" puis sur quarantaine et cliquer sur l'icone de la corbeille
les cochonneries sont dans les points de restauration
il va falloir purger ton pc
J'ai fait les suppressions. Que va t'il falloir faire maintenant ?
Donne moi les instructions et je le ferais demain matin car là je vais arrêter. Bonsoir.
Donne moi les instructions et je le ferais demain matin car là je vais arrêter. Bonsoir.
as tu mis xp à jour ?
Purge de la restauration système
*Désactive ta restauration :
Clique droit sur poste de travail/propriétés/Restauration système/coche la case désactiver la restauration, appliquer, OK
---> Redémarre ton PC ...
*Réactive ta restauration :
Clique droit sur poste de travail/propriétés/Restauration système/décoche la case désactiver la restauration, appliquer, OK
--->Redémarre ton PC ...
( Note : tu peux aussi y accéder via panneau de configuration->" système "->" restauration système " ).
à demain
bonsoir
Purge de la restauration système
*Désactive ta restauration :
Clique droit sur poste de travail/propriétés/Restauration système/coche la case désactiver la restauration, appliquer, OK
---> Redémarre ton PC ...
*Réactive ta restauration :
Clique droit sur poste de travail/propriétés/Restauration système/décoche la case désactiver la restauration, appliquer, OK
--->Redémarre ton PC ...
( Note : tu peux aussi y accéder via panneau de configuration->" système "->" restauration système " ).
à demain
bonsoir
avant de purger le pc
Télécharge SDFix (créé par AndyManchesta) et sauvegarde le sur ton Bureau.
http://downloads.andymanchesta.com/RemovalTools/SDFix.exe
guide: http://site-naheulbeuk.com/
Double clique sur SDFix.exe et choisis Install pour l'extraire dans un dossier dédié sur le Bureau. Redémarre ton ordinateur en mode sans échec en suivant la procédure que voici :
• Redémarre ton ordinateur
• Après avoir entendu l'ordinateur biper lors du démarrage, mais avant que l'icône Windows apparaisse, tapote la touche F8 (une pression par seconde).
• A la place du chargement normal de Windows, un menu avec différentes options devrait apparaître.
• Choisis la première option, pour exécuter Windows en mode sans échec, puis appuie sur "Entrée".
• Choisis ton compte.
Déroule la liste des instructions ci-dessous :
• Ouvre le dossier SDFix qui vient d'être créé dans le répertoire C:\ et double clique sur RunThis.bat pour lancer le script.
• Appuie sur Y pour commencer le processus de nettoyage.
• Il va supprimer les services et les entrées du Registre de certains trojans trouvés puis te demandera d'appuyer sur une touche pour redémarrer.
• Appuie sur une touche pour redémarrer le PC.
• Ton système sera plus long pour redémarrer qu'à l'accoutumée car l'outil va continuer à s'exécuter et supprimer des fichiers.
• Après le chargement du Bureau, l'outil terminera son travail et affichera Finished.
• Appuie sur une touche pour finir l'exécution du script et charger les icônes de ton Bureau.
• Les icônes du Bureau affichées, le rapport SDFix s'ouvrira à l'écran et s'enregistrera aussi dans le dossier SDFix sous le nom Report.txt.
• Enfin, copie/colle le contenu du fichier Report.txt dans ta prochaine réponse sur le forum
Si SDfix ne se lance pas (ça arrive!)
* Démarrer->Exécuter
* Copie/colle ceci dans la fenêtre :
%systemroot%\system32\cmd.exe /K %systemdrive%\SDFix\apps\FixPath.exe
* Clique sur ok, et valide.
* Redémarre et essaye de nouveau de lancer SDfix
Télécharge SDFix (créé par AndyManchesta) et sauvegarde le sur ton Bureau.
http://downloads.andymanchesta.com/RemovalTools/SDFix.exe
guide: http://site-naheulbeuk.com/
Double clique sur SDFix.exe et choisis Install pour l'extraire dans un dossier dédié sur le Bureau. Redémarre ton ordinateur en mode sans échec en suivant la procédure que voici :
• Redémarre ton ordinateur
• Après avoir entendu l'ordinateur biper lors du démarrage, mais avant que l'icône Windows apparaisse, tapote la touche F8 (une pression par seconde).
• A la place du chargement normal de Windows, un menu avec différentes options devrait apparaître.
• Choisis la première option, pour exécuter Windows en mode sans échec, puis appuie sur "Entrée".
• Choisis ton compte.
Déroule la liste des instructions ci-dessous :
• Ouvre le dossier SDFix qui vient d'être créé dans le répertoire C:\ et double clique sur RunThis.bat pour lancer le script.
• Appuie sur Y pour commencer le processus de nettoyage.
• Il va supprimer les services et les entrées du Registre de certains trojans trouvés puis te demandera d'appuyer sur une touche pour redémarrer.
• Appuie sur une touche pour redémarrer le PC.
• Ton système sera plus long pour redémarrer qu'à l'accoutumée car l'outil va continuer à s'exécuter et supprimer des fichiers.
• Après le chargement du Bureau, l'outil terminera son travail et affichera Finished.
• Appuie sur une touche pour finir l'exécution du script et charger les icônes de ton Bureau.
• Les icônes du Bureau affichées, le rapport SDFix s'ouvrira à l'écran et s'enregistrera aussi dans le dossier SDFix sous le nom Report.txt.
• Enfin, copie/colle le contenu du fichier Report.txt dans ta prochaine réponse sur le forum
Si SDfix ne se lance pas (ça arrive!)
* Démarrer->Exécuter
* Copie/colle ceci dans la fenêtre :
%systemroot%\system32\cmd.exe /K %systemdrive%\SDFix\apps\FixPath.exe
* Clique sur ok, et valide.
* Redémarre et essaye de nouveau de lancer SDfix
je n'ai pas bien compris, je dois faire sdfix avant de désactiver la restauration ?
D'après le guide sdfix, des malwares peuvent modifier l'ordinateur, je te confirme que j'ai constaté ça car le centre de sécurité avait désactivé des parametres(MAJ automatique) que j'avais remis actifs et en plus, le pack SP3 était installé sur mon ordinateur depuis mi avril.
D'après le guide sdfix, des malwares peuvent modifier l'ordinateur, je te confirme que j'ai constaté ça car le centre de sécurité avait désactivé des parametres(MAJ automatique) que j'avais remis actifs et en plus, le pack SP3 était installé sur mon ordinateur depuis mi avril.
bonjour,
tout c'est bien passé. Voila le rapport sdfix. dois-je désactiver les points de restauration maintenant (comme expliqué dans ton message 61) ?
[b]SDFix: Version 1.240 [/b]
Run by 13 on 21/05/2009 at 15:24
Microsoft Windows XP [version 5.1.2600]
Running From: C:\SDFix
[b]Checking Services [/b]:
Restoring Default Security Values
Restoring Default Hosts File
Rebooting
[b]Checking Files [/b]:
Trojan Files Found:
C:\WINDOWS\W139_jpg.zip - Deleted
C:\WINDOWS\Nokia_19_jpg.zip - Deleted
Removing Temp Files
[b]ADS Check [/b]:
[b]Final Check [/b]:
catchme 0.3.1361.2 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2009-05-21 15:29:07
Windows 5.1.2600 Service Pack 2 FAT NTAPI
scanning hidden processes ...
scanning hidden services ...
scanning hidden autostart entries ...
scanning hidden files ...
scan completed successfully
hidden processes: 0
hidden services: 0
hidden files: 0
[b]Remaining Services [/b]:
Authorized Application Key Export:
[HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\standardprofile\authorizedapplications\list]
"%windir%\\system32\\sessmgr.exe"="%windir%\\system32\\sessmgr.exe:*:enabled:@xpsp2res.dll,-22019"
"C:\\Program Files\\Messenger\\MSMSGS.EXE"="C:\\Program Files\\Messenger\\MSMSGS.EXE:*:Enabled:Windows Messenger"
"C:\\Program Files\\Logitech\\Desktop Messenger\\8876480\\Program\\LogitechDesktopMessenger.exe"="C:\\Program Files\\Logitech\\Desktop Messenger\\8876480\\Program\\LogitechDesktopMessenger.exe:*:Disabled:Logitech Desktop Messenger"
"C:\\Program Files\\eMule\\emule.exe"="C:\\Program Files\\eMule\\emule.exe:*:Enabled:eMule"
"C:\\WINDOWS\\System32\\rtcshare.exe"="C:\\WINDOWS\\System32\\rtcshare.exe:*:Disabled:Partage de l'application RTC"
"C:\\Program Files\\NetMeeting\\conf.exe"="C:\\Program Files\\NetMeeting\\conf.exe:*:Enabled:Windows© NetMeeting©"
"%windir%\\Network Diagnostic\\xpnetdiag.exe"="%windir%\\Network Diagnostic\\xpnetdiag.exe:*:Enabled:@xpsp3res.dll,-20000"
"C:\\Program Files\\Microsoft LifeCam\\LifeCam.exe"="C:\\Program Files\\Microsoft LifeCam\\LifeCam.exe:*:Enabled:LifeCam.exe"
"C:\\Program Files\\Microsoft LifeCam\\LifeExp.exe"="C:\\Program Files\\Microsoft LifeCam\\LifeExp.exe:*:Enabled:LifeExp.exe"
"C:\\Program Files\\Mozilla Firefox\\firefox.exe"="C:\\Program Files\\Mozilla Firefox\\firefox.exe:*:Disabled:Firefox"
"C:\\Program Files\\Windows Live\\Messenger\\MSNMSGR.EXE"="C:\\Program Files\\Windows Live\\Messenger\\MSNMSGR.EXE:*:Enabled:Windows Live Messenger"
"C:\\Program Files\\Windows Live\\Messenger\\livecall.exe"="C:\\Program Files\\Windows Live\\Messenger\\livecall.exe:*:Enabled:Windows Live Messenger (Phone)"
"C:\\Program Files\\Bbox\\eSKernel.exe"="C:\\Program Files\\Bbox\\eSKernel.exe:*:Enabled:Bbox assistant d'installation"
"C:\\Program Files\\BboxUpdate\\BTLiveUpdate.exe"="C:\\Program Files\\BboxUpdate\\BTLiveUpdate.exe:*:Enabled:Bbox - Bouygues Telecom - Utilitaire de mise … jour"
[HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\domainprofile\authorizedapplications\list]
"%windir%\\system32\\sessmgr.exe"="%windir%\\system32\\sessmgr.exe:*:enabled:@xpsp2res.dll,-22019"
"C:\\Program Files\\Logitech\\Desktop Messenger\\8876480\\Program\\LogitechDesktopMessenger.exe"="C:\\Program Files\\Logitech\\Desktop Messenger\\8876480\\Program\\LogitechDesktopMessenger.exe:*:Enabled:Logitech Desktop Messenger"
"%windir%\\Network Diagnostic\\xpnetdiag.exe"="%windir%\\Network Diagnostic\\xpnetdiag.exe:*:Enabled:@xpsp3res.dll,-20000"
"C:\\Program Files\\Windows Live\\Messenger\\MSNMSGR.EXE"="C:\\Program Files\\Windows Live\\Messenger\\MSNMSGR.EXE:*:Enabled:Windows Live Messenger"
"C:\\Program Files\\Windows Live\\Messenger\\livecall.exe"="C:\\Program Files\\Windows Live\\Messenger\\livecall.exe:*:Enabled:Windows Live Messenger (Phone)"
[b]Remaining Files [/b]:
File Backups: - C:\SDFix\backups\backups.zip
[b]Files with Hidden Attributes [/b]:
Mon 18 Apr 2005 1,024 ...HR --- "C:\WINDOWS\system32\NTIMPEG2.dll"
Mon 18 Apr 2005 1,024 ...HR --- "C:\WINDOWS\system32\NTICDMK32.dll"
Mon 18 Apr 2005 1,024 ...HR --- "C:\WINDOWS\system32\ntiembed.dll"
Wed 22 Oct 2008 949,072 A.SHR --- "C:\Program Files\Spybot - Search & Destroy\advcheck.dll"
Wed 22 Oct 2008 962,896 A.SHR --- "C:\Program Files\Spybot - Search & Destroy\Tools.dll"
Mon 15 Sep 2008 1,562,960 A.SHR --- "C:\Program Files\Spybot - Search & Destroy\SDHelper.dll"
Sun 12 Mar 2006 10,311,680 ..SH. --- "C:\Program Files\AVIConverter\MENCODER.EXE"
Sat 31 Dec 2005 8,578,048 ..SH. --- "C:\Program Files\AVIConverter\mencoder1.exe"
Tue 5 Jun 2007 4,348 ..SH. --- "C:\Documents and Settings\All Users\DRM\DRMv1.bak"
Mon 14 Mar 2005 299,008 A..H. --- "C:\Program Files\Canon\MP Navigator 2.0\Maint.exe"
Mon 25 Apr 2005 61,440 A..H. --- "C:\Program Files\Canon\MP Navigator 2.0\uinstrsc.dll"
Wed 1 Aug 2007 0 A.SH. --- "C:\Documents and Settings\All Users\DRM\Cache\Indiv01.tmp"
Thu 28 Jun 2007 3,096,576 A..H. --- "C:\Documents and Settings\13\Application Data\U3\temp\Launchpad Removal.exe"
[b]Finished![/b]
tout c'est bien passé. Voila le rapport sdfix. dois-je désactiver les points de restauration maintenant (comme expliqué dans ton message 61) ?
[b]SDFix: Version 1.240 [/b]
Run by 13 on 21/05/2009 at 15:24
Microsoft Windows XP [version 5.1.2600]
Running From: C:\SDFix
[b]Checking Services [/b]:
Restoring Default Security Values
Restoring Default Hosts File
Rebooting
[b]Checking Files [/b]:
Trojan Files Found:
C:\WINDOWS\W139_jpg.zip - Deleted
C:\WINDOWS\Nokia_19_jpg.zip - Deleted
Removing Temp Files
[b]ADS Check [/b]:
[b]Final Check [/b]:
catchme 0.3.1361.2 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2009-05-21 15:29:07
Windows 5.1.2600 Service Pack 2 FAT NTAPI
scanning hidden processes ...
scanning hidden services ...
scanning hidden autostart entries ...
scanning hidden files ...
scan completed successfully
hidden processes: 0
hidden services: 0
hidden files: 0
[b]Remaining Services [/b]:
Authorized Application Key Export:
[HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\standardprofile\authorizedapplications\list]
"%windir%\\system32\\sessmgr.exe"="%windir%\\system32\\sessmgr.exe:*:enabled:@xpsp2res.dll,-22019"
"C:\\Program Files\\Messenger\\MSMSGS.EXE"="C:\\Program Files\\Messenger\\MSMSGS.EXE:*:Enabled:Windows Messenger"
"C:\\Program Files\\Logitech\\Desktop Messenger\\8876480\\Program\\LogitechDesktopMessenger.exe"="C:\\Program Files\\Logitech\\Desktop Messenger\\8876480\\Program\\LogitechDesktopMessenger.exe:*:Disabled:Logitech Desktop Messenger"
"C:\\Program Files\\eMule\\emule.exe"="C:\\Program Files\\eMule\\emule.exe:*:Enabled:eMule"
"C:\\WINDOWS\\System32\\rtcshare.exe"="C:\\WINDOWS\\System32\\rtcshare.exe:*:Disabled:Partage de l'application RTC"
"C:\\Program Files\\NetMeeting\\conf.exe"="C:\\Program Files\\NetMeeting\\conf.exe:*:Enabled:Windows© NetMeeting©"
"%windir%\\Network Diagnostic\\xpnetdiag.exe"="%windir%\\Network Diagnostic\\xpnetdiag.exe:*:Enabled:@xpsp3res.dll,-20000"
"C:\\Program Files\\Microsoft LifeCam\\LifeCam.exe"="C:\\Program Files\\Microsoft LifeCam\\LifeCam.exe:*:Enabled:LifeCam.exe"
"C:\\Program Files\\Microsoft LifeCam\\LifeExp.exe"="C:\\Program Files\\Microsoft LifeCam\\LifeExp.exe:*:Enabled:LifeExp.exe"
"C:\\Program Files\\Mozilla Firefox\\firefox.exe"="C:\\Program Files\\Mozilla Firefox\\firefox.exe:*:Disabled:Firefox"
"C:\\Program Files\\Windows Live\\Messenger\\MSNMSGR.EXE"="C:\\Program Files\\Windows Live\\Messenger\\MSNMSGR.EXE:*:Enabled:Windows Live Messenger"
"C:\\Program Files\\Windows Live\\Messenger\\livecall.exe"="C:\\Program Files\\Windows Live\\Messenger\\livecall.exe:*:Enabled:Windows Live Messenger (Phone)"
"C:\\Program Files\\Bbox\\eSKernel.exe"="C:\\Program Files\\Bbox\\eSKernel.exe:*:Enabled:Bbox assistant d'installation"
"C:\\Program Files\\BboxUpdate\\BTLiveUpdate.exe"="C:\\Program Files\\BboxUpdate\\BTLiveUpdate.exe:*:Enabled:Bbox - Bouygues Telecom - Utilitaire de mise … jour"
[HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\domainprofile\authorizedapplications\list]
"%windir%\\system32\\sessmgr.exe"="%windir%\\system32\\sessmgr.exe:*:enabled:@xpsp2res.dll,-22019"
"C:\\Program Files\\Logitech\\Desktop Messenger\\8876480\\Program\\LogitechDesktopMessenger.exe"="C:\\Program Files\\Logitech\\Desktop Messenger\\8876480\\Program\\LogitechDesktopMessenger.exe:*:Enabled:Logitech Desktop Messenger"
"%windir%\\Network Diagnostic\\xpnetdiag.exe"="%windir%\\Network Diagnostic\\xpnetdiag.exe:*:Enabled:@xpsp3res.dll,-20000"
"C:\\Program Files\\Windows Live\\Messenger\\MSNMSGR.EXE"="C:\\Program Files\\Windows Live\\Messenger\\MSNMSGR.EXE:*:Enabled:Windows Live Messenger"
"C:\\Program Files\\Windows Live\\Messenger\\livecall.exe"="C:\\Program Files\\Windows Live\\Messenger\\livecall.exe:*:Enabled:Windows Live Messenger (Phone)"
[b]Remaining Files [/b]:
File Backups: - C:\SDFix\backups\backups.zip
[b]Files with Hidden Attributes [/b]:
Mon 18 Apr 2005 1,024 ...HR --- "C:\WINDOWS\system32\NTIMPEG2.dll"
Mon 18 Apr 2005 1,024 ...HR --- "C:\WINDOWS\system32\NTICDMK32.dll"
Mon 18 Apr 2005 1,024 ...HR --- "C:\WINDOWS\system32\ntiembed.dll"
Wed 22 Oct 2008 949,072 A.SHR --- "C:\Program Files\Spybot - Search & Destroy\advcheck.dll"
Wed 22 Oct 2008 962,896 A.SHR --- "C:\Program Files\Spybot - Search & Destroy\Tools.dll"
Mon 15 Sep 2008 1,562,960 A.SHR --- "C:\Program Files\Spybot - Search & Destroy\SDHelper.dll"
Sun 12 Mar 2006 10,311,680 ..SH. --- "C:\Program Files\AVIConverter\MENCODER.EXE"
Sat 31 Dec 2005 8,578,048 ..SH. --- "C:\Program Files\AVIConverter\mencoder1.exe"
Tue 5 Jun 2007 4,348 ..SH. --- "C:\Documents and Settings\All Users\DRM\DRMv1.bak"
Mon 14 Mar 2005 299,008 A..H. --- "C:\Program Files\Canon\MP Navigator 2.0\Maint.exe"
Mon 25 Apr 2005 61,440 A..H. --- "C:\Program Files\Canon\MP Navigator 2.0\uinstrsc.dll"
Wed 1 Aug 2007 0 A.SH. --- "C:\Documents and Settings\All Users\DRM\Cache\Indiv01.tmp"
Thu 28 Jun 2007 3,096,576 A..H. --- "C:\Documents and Settings\13\Application Data\U3\temp\Launchpad Removal.exe"
[b]Finished![/b]
dans le coup tu n'as pas fait combo fix
il faudrai désinstaller Sweetim