Infection? antimalware doctor
Résolu/Fermé
alèdoscour
Messages postés
25
Date d'inscription
lundi 12 avril 2010
Statut
Membre
Dernière intervention
14 avril 2010
-
12 avril 2010 à 09:12
Utilisateur anonyme - 14 avril 2010 à 21:05
Utilisateur anonyme - 14 avril 2010 à 21:05
A voir également:
- Infection? antimalware doctor
- Pc doctor - Télécharger - Optimisation
- Disk doctor - Télécharger - Récupération de données
- Car doctor - Télécharger - Vie quotidienne
- Antimalware - Télécharger - Antivirus & Antimalwares
- Spyware doctor - Télécharger - Antivirus & Antimalwares
66 réponses
alèdoscour
Messages postés
25
Date d'inscription
lundi 12 avril 2010
Statut
Membre
Dernière intervention
14 avril 2010
13 avril 2010 à 22:18
13 avril 2010 à 22:18
Gen, toujours là?
Utilisateur anonyme
14 avril 2010 à 08:31
14 avril 2010 à 08:31
bonjour
en ce que tu veux , tu le renommes ......"spaghetti , ou tartempion" ^^
en ce que tu veux , tu le renommes ......"spaghetti , ou tartempion" ^^
alèdoscour
Messages postés
25
Date d'inscription
lundi 12 avril 2010
Statut
Membre
Dernière intervention
14 avril 2010
14 avril 2010 à 08:44
14 avril 2010 à 08:44
Bonjour.
Je supprime combofix, je le telecharge à nouveau puis je le renomme.
Ensuite je relance list_kill'em.
C'est ça?
Je supprime combofix, je le telecharge à nouveau puis je le renomme.
Ensuite je relance list_kill'em.
C'est ça?
Vous n’avez pas trouvé la réponse que vous recherchez ?
Posez votre question
alèdoscour
Messages postés
25
Date d'inscription
lundi 12 avril 2010
Statut
Membre
Dernière intervention
14 avril 2010
14 avril 2010 à 09:31
14 avril 2010 à 09:31
j'ai relancé combofix téléchargé depis mon portable branché en dirct sur ma livebox.
Pendant le scan combofix me dit que mon antivirus est activé alors qu'a l'ouverture de l'ordi ou lorsque je cherche à ouvrir l'antivirus une fenetre m'annonce que je dois introduire le disque d'installation.
Après le scan j'ai voulu me reconnecter via le portable. J'ai pu aller sur Google mais ensuite lorsque j'ai choisi le site ci-joint je suis tombé sur e-bay. Pareil pour CCM. Impossible d'y acceder. J'ai donc de nouveau pris la cle USB et le PC.
ComboFix 10-04-13.02 - Amo 04/14/2010 9:02.2.1 - x86
Microsoft Windows XP Professional 5.1.2600.3.1252.1.1033.18.1015.511 [GMT 2:00]
Running from: c:\documents and settings\Amo\Desktop\AAAAAAAA.exe
AV: Symantec AntiVirus Corporate Edition *On-access scanning enabled* (Updated) {FB06448E-52B8-493A-90F3-E43226D3305C}
.
((((((((((((((((((((((((( Files Created from 2010-03-14 to 2010-04-14 )))))))))))))))))))))))))))))))
.
2010-04-13 18:23 . 2010-04-13 18:23 92834 ----a-w- c:\documents and settings\All Users\Application Data\Symantec\Symantec AntiVirus Corporate Edition\7.5\APTemp\AP0.dll
2010-04-13 16:24 . 2010-04-13 16:24 -------- d-----w- C:\Kill'em
2010-04-12 21:22 . 2010-04-12 21:22 7816540 ----a-w- C:\UsbFix_Upload_Me_D3VPCV91.zip
2010-04-12 18:48 . 2010-04-13 16:18 46640 ----a-w- c:\windows\system32\msln.exe
2010-04-12 12:30 . 2010-04-12 21:22 -------- d-----w- C:\UsbFix
2010-04-12 07:54 . 2010-04-13 16:24 -------- d-----w- c:\program files\List_Kill'em
2010-04-07 05:04 . 2010-04-07 05:04 -------- d-sh--w- c:\documents and settings\LocalService\PrivacIE
2010-04-07 05:04 . 2010-04-07 05:04 -------- d-sh--w- c:\documents and settings\LocalService\IECompatCache
2010-04-06 19:05 . 2008-04-13 18:40 34688 ----a-w- c:\windows\system32\drivers\lbrtfdc.sys
2010-04-06 19:05 . 2008-04-13 18:40 34688 ----a-w- c:\windows\system32\dllcache\lbrtfdc.sys
2010-04-06 19:04 . 2008-04-13 18:40 8192 ----a-w- c:\windows\system32\drivers\Changer.sys
2010-04-06 19:04 . 2008-04-13 18:40 8192 ----a-w- c:\windows\system32\dllcache\changer.sys
2010-04-06 19:03 . 2010-04-06 19:03 174592 ----a-w- c:\windows\Afonia.exe
.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2010-04-12 22:45 . 2007-02-02 19:14 -------- d-----w- c:\program files\Symantec AntiVirus
2010-04-12 21:09 . 2006-12-14 07:31 -------- d-----w- c:\program files\Windows Defender
2010-04-12 21:09 . 2007-06-06 11:42 -------- d-----w- c:\program files\QuickTime
2010-04-12 21:08 . 2006-04-28 02:11 -------- d-----w- c:\program files\Common Files\Symantec Shared
2010-04-12 21:08 . 2006-04-21 22:53 -------- d-----w- c:\program files\Apoint
2010-04-12 14:41 . 2004-08-11 22:00 8832 ----a-w- c:\windows\system32\drivers\rasacd.sys
2010-04-08 14:16 . 2007-02-02 19:47 -------- d-----w- c:\documents and settings\All Users\Application Data\Spybot - Search & Destroy
2010-04-06 19:44 . 2010-04-06 19:44 8 ----a-w- c:\documents and settings\NetworkService\Application Data\ypgmjw.dat
2010-04-06 19:03 . 2010-04-06 19:03 28814 ----a-w- c:\windows\system32\99.tmp
2010-04-06 19:03 . 2010-04-06 19:03 84 ----a-w- c:\windows\system32\96.tmp
2010-04-03 22:31 . 2006-04-27 14:22 -------- d-----w- c:\program files\Google
2010-03-07 18:40 . 2010-03-07 18:40 0 ----a-w- c:\windows\nsreg.dat
2010-02-25 06:24 . 2004-08-11 22:00 916480 ------w- c:\windows\system32\wininet.dll
2010-02-24 09:16 . 2009-10-04 17:00 181632 ------w- c:\windows\system32\MpSigStub.exe
2010-02-19 23:47 . 2010-02-19 23:47 3604480 ----a-w- c:\windows\system32\GPhotos.scr
2010-02-12 10:03 . 2010-03-01 07:03 293376 ------w- c:\windows\system32\browserchoice.exe
2010-01-26 13:24 . 2010-01-26 13:24 126 ----a-w- c:\documents and settings\Amo\Local Settings\Application Data\fusioncache.dat
2010-01-17 21:36 . 2010-01-17 21:32 77152 ----a-w- c:\documents and settings\Amo\Local Settings\Application Data\GDIPFONTCACHEV1.DAT
.
[code]<pre>
c:\program files\Adobe\Reader 8.0\Reader\reader_sl .exe
c:\program files\Apoint\apoint .exe
c:\program files\Common Files\Symantec Shared\ccapp .exe
c:\program files\Dell\QuickSet\quickset .exe
c:\program files\Intel\Wireless\Bin\ifrmewrk .exe
c:\program files\Intel\Wireless\Bin\zcfgsvc .exe
c:\program files\QuickTime\qttask .exe
c:\program files\Symantec AntiVirus\vptray .exe
c:\program files\Windows Defender\msascui .exe
c:\program files\Windows Media Player\wmpnscfg .exe
c:\windows\system32\dla\tfswctrl .exe
</pre>/code
((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4
[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"WMPNSCFG"="c:\program files\Windows Media Player\WMPNSCFG.exe" [N/A]
"dbf70700 .exe"="c:\documents and settings\amo\application data\3714d4468fe48242322ef6cbe954a0e3\dbf70700 .exe" [N/A]
"dbf70700 .exe"="c:\documents and settings\amo\application data\3714d4468fe48242322ef6cbe954a0e3\dbf70700 .exe" [N/A]
"dbf70700 .exe"="c:\documents and settings\amo\application data\3714d4468fe48242322ef6cbe954a0e3\dbf70700 .exe" [N/A]
"dbf70700 .exe"="c:\documents and settings\amo\application data\3714d4468fe48242322ef6cbe954a0e3\dbf70700 .exe" [N/A]
"dbf70700 .exe"="c:\documents and settings\amo\application data\3714d4468fe48242322ef6cbe954a0e3\dbf70700 .exe" [N/A]
"dbf70700 .exe"="c:\documents and settings\amo\application data\3714d4468fe48242322ef6cbe954a0e3\dbf70700 .exe" [N/A]
"dbf70700 .exe"="c:\documents and settings\amo\application data\3714d4468fe48242322ef6cbe954a0e3\dbf70700 .exe" [N/A]
"dbf70700 .exe"="c:\documents and settings\amo\application data\3714d4468fe48242322ef6cbe954a0e3\dbf70700 .exe" [N/A]
"dbf70700 .exe"="c:\documents and settings\amo\application data\3714d4468fe48242322ef6cbe954a0e3\dbf70700 .exe" [N/A]
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"QuickTime Task"="c:\program files\quicktime\qttask .exe -atboottime" [X]
"Apoint"="c:\program files\Apoint\Apoint.exe" [N/A]
"Dell QuickSet"="c:\program files\dell\quickset\quickset .exe .exe .exe .exe .exe .exe .exe .exe .exe" [N/A]
"dla"="c:\windows\system32\dla\tfswctrl.exe" [N/A]
"Windows Defender"="c:\program files\Windows Defender\MSASCui.exe" [N/A]
"ccApp"="c:\program files\Common Files\Symantec Shared\ccApp.exe" [N/A]
"igfxtray"="c:\windows\system32\igfxtray.exe" [N/A]
"igfxhkcmd"="c:\windows\system32\hkcmd.exe" [N/A]
"igfxpers"="c:\windows\system32\igfxpers.exe" [N/A]
"IntelZeroConfig"="c:\program files\Intel\Wireless\bin\ZCfgSvc.exe" [N/A]
"IntelWireless"="c:\program files\Intel\Wireless\Bin\ifrmewrk.exe" [N/A]
"Adobe Reader Speed Launcher"="c:\program files\Adobe\Reader 8.0\Reader\Reader_sl.exe" [N/A]
"vptray"="c:\progra~1\SYMANT~1\\vptray.exe" [N/A]
[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run]
"DWQueuedReporting"="c:\progra~1\COMMON~1\MICROS~1\DW\dwtrig20.exe" [2007-02-26 437160]
[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\RunOnce]
"RunNarrator"="Narrator.exe" [2008-04-14 53760]
c:\documents and settings\All Users\Start Menu\Programs\Startup\
Digital Line Detect.lnk - c:\program files\Digital Line Detect\DLG.exe [2006-4-22 24576]
[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\explorer]
"HonorAutoRunSetting"= 0 (0x0)
[HKEY_CURRENT_USER\software\microsoft\windows\currentversion\policies\explorer]
"HonorAutoRunSetting"= 0 (0x0)
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\WinDefend]
@="Service"
[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\SymantecAntiVirus]
"DisableMonitoring"=dword:00000001
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile]
"EnableFirewall"= 0 (0x0)
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%windir%\\system32\\sessmgr.exe"=
"c:\\Program Files\\Common Files\\Ahead\\Nero Web\\SetupX.exe"=
"c:\\Program Files\\Common Files\\Ahead\\Nero Web\\SetupXu.exe"=
"c:\\Program Files\\Nero\\Nero 7\\Nero ShowTime\\ShowTime.exe"=
"c:\\WINDOWS\\pchealth\\helpctr\\binaries\\helpctr.exe"=
"c:\\Program Files\\Skype\\Plugin Manager\\skypePM.exe"=
"c:\\Program Files\\Skype\\Phone\\Skype.exe"=
"c:\\WINDOWS\\Network Diagnostic\\xpnetdiag.exe"=
"c:\\Program Files\\Windows Live\\Sync\\WindowsLiveSync.exe"=
"c:\\Program Files\\Messenger\\msmsgs.exe"=
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\GloballyOpenPorts\List]
"3389:TCP"= 3389:TCP:@xpsp2res.dll,-22009
R2 WinDefend;Windows Defender;c:\program files\Windows Defender\MsMpEng.exe [11/3/2006 7:19 PM 13592]
R3 EraserUtilRebootDrv;EraserUtilRebootDrv;c:\program files\Common Files\Symantec Shared\eengine\EraserUtilRebootDrv.sys [8/27/2009 7:01 PM 102448]
R3 GTIPCI21;GTIPCI21;c:\windows\system32\drivers\gtipci21.sys [4/22/2006 12:53 AM 87936]
S0 1742699994;1742699994;c:\windows\system32\drivers\1742699994.sys --> c:\windows\system32\drivers\1742699994.sys [?]
S2 gupdate;Google Update Service (gupdate);c:\program files\Google\Update\GoogleUpdate.exe [2/4/2010 12:01 PM 135664]
S3 SavRoam;SAVRoam;c:\program files\Symantec AntiVirus\SavRoam.exe [12/20/2006 8:29 PM 116928]
.
Contents of the 'Scheduled Tasks' folder
2010-04-14 c:\windows\Tasks\GoogleUpdateTaskMachineCore.job
- c:\program files\Google\Update\GoogleUpdate.exe [2010-02-04 10:00]
2010-04-13 c:\windows\Tasks\GoogleUpdateTaskMachineUA.job
- c:\program files\Google\Update\GoogleUpdate.exe [2010-02-04 10:00]
2010-04-14 c:\windows\Tasks\MP Scheduled Scan.job
- c:\program files\Windows Defender\MpCmdRun.exe [2006-11-03 17:20]
2010-04-14 c:\windows\Tasks\OGALogon.job
- c:\windows\system32\OGAEXEC.exe [2009-08-03 13:07]
.
.
------- Supplementary Scan -------
.
IE: Add to Google Photos Screensa&ver - c:\windows\system32\GPhotos.scr/200
IE: E&xport to Microsoft Excel - c:\progra~1\MICROS~2\OFFICE11\EXCEL.EXE/3000
IE: Google Sidewiki... - c:\program files\Google\Google Toolbar\Component\GoogleToolbarDynamic_mui_en_96D6FF0C6D236BF8.dll/cmsidewiki.html
DPF: {01010200-5E80-11D8-9E86-0007E96C65AE} - hxxp://supportcenter.rr.com/sdccommon/download/tgctlins.cab
FF - ProfilePath - c:\documents and settings\Amo\Application Data\Mozilla\Firefox\Profiles\11q42en7.default\
FF - plugin: c:\program files\Google\Google Earth\plugin\npgeplugin.dll
FF - plugin: c:\program files\Google\Picasa3\npPicasa3.dll
FF - plugin: c:\program files\Google\Update\1.2.183.23\npGoogleOneClick8.dll
FF - plugin: c:\program files\Microsoft\Office Live\npOLW.dll
FF - plugin: c:\program files\Windows Live\Photo Gallery\NPWLPG.dll
FF - HiddenExtension: Microsoft .NET Framework Assistant: {20a82645-c095-46ed-80e3-08825760534b} - c:\windows\Microsoft.NET\Framework\v3.5\Windows Presentation Foundation\DotNetAssistantExtension\
---- FIREFOX POLICIES ----
c:\program files\Mozilla Firefox\greprefs\all.js - pref("ui.use_native_colors", true);
c:\program files\Mozilla Firefox\greprefs\all.js - pref("ui.use_native_popup_windows", false);
c:\program files\Mozilla Firefox\greprefs\all.js - pref("browser.enable_click_image_resizing", true);
c:\program files\Mozilla Firefox\greprefs\all.js - pref("accessibility.browsewithcaret_shortcut.enabled", true);
c:\program files\Mozilla Firefox\greprefs\all.js - pref("javascript.options.mem.high_water_mark", 32);
c:\program files\Mozilla Firefox\greprefs\all.js - pref("javascript.options.mem.gc_frequency", 1600);
c:\program files\Mozilla Firefox\greprefs\all.js - pref("network.auth.force-generic-ntlm", false);
c:\program files\Mozilla Firefox\greprefs\all.js - pref("svg.smil.enabled", false);
c:\program files\Mozilla Firefox\greprefs\all.js - pref("ui.trackpoint_hack.enabled", -1);
c:\program files\Mozilla Firefox\greprefs\all.js - pref("browser.formfill.debug", false);
c:\program files\Mozilla Firefox\greprefs\all.js - pref("browser.formfill.agedWeight", 2);
c:\program files\Mozilla Firefox\greprefs\all.js - pref("browser.formfill.bucketSize", 1);
c:\program files\Mozilla Firefox\greprefs\all.js - pref("browser.formfill.maxTimeGroupings", 25);
c:\program files\Mozilla Firefox\greprefs\all.js - pref("browser.formfill.timeGroupingSize", 604800);
c:\program files\Mozilla Firefox\greprefs\all.js - pref("browser.formfill.boundaryWeight", 25);
c:\program files\Mozilla Firefox\greprefs\all.js - pref("browser.formfill.prefixWeight", 5);
c:\program files\Mozilla Firefox\greprefs\all.js - pref("html5.enable", false);
c:\program files\Mozilla Firefox\defaults\pref\firefox-branding.js - pref("app.update.download.backgroundInterval", 600);
c:\program files\Mozilla Firefox\defaults\pref\firefox-branding.js - pref("app.update.url.manual", "https://www.mozilla.org/en-US/firefox/new/?redirect_source=firefox-com");
c:\program files\Mozilla Firefox\defaults\pref\firefox-branding.js - pref("browser.search.param.yahoo-fr-ja", "mozff");
c:\program files\Mozilla Firefox\defaults\pref\firefox.js - pref("extensions.{972ce4c6-7e08-4474-a285-3208198ce6fd}.name", "chrome://browser/locale/browser.properties");
c:\program files\Mozilla Firefox\defaults\pref\firefox.js - pref("extensions.{972ce4c6-7e08-4474-a285-3208198ce6fd}.description", "chrome://browser/locale/browser.properties");
c:\program files\Mozilla Firefox\defaults\pref\firefox.js - pref("xpinstall.whitelist.add", "addons.mozilla.org");
c:\program files\Mozilla Firefox\defaults\pref\firefox.js - pref("xpinstall.whitelist.add.36", "getpersonas.com");
c:\program files\Mozilla Firefox\defaults\pref\firefox.js - pref("lightweightThemes.update.enabled", true);
c:\program files\Mozilla Firefox\defaults\pref\firefox.js - pref("browser.allTabs.previews", false);
c:\program files\Mozilla Firefox\defaults\pref\firefox.js - pref("plugins.hide_infobar_for_outdated_plugin", false);
c:\program files\Mozilla Firefox\defaults\pref\firefox.js - pref("plugins.update.notifyUser", false);
c:\program files\Mozilla Firefox\defaults\pref\firefox.js - pref("toolbar.customization.usesheet", false);
c:\program files\Mozilla Firefox\defaults\pref\firefox.js - pref("browser.taskbar.previews.enable", false);
c:\program files\Mozilla Firefox\defaults\pref\firefox.js - pref("browser.taskbar.previews.max", 20);
c:\program files\Mozilla Firefox\defaults\pref\firefox.js - pref("browser.taskbar.previews.cachetime", 20);
.
**************************************************************************
catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2010-04-14 09:12
Windows 5.1.2600 Service Pack 3 NTFS
scanning hidden processes ...
scanning hidden autostart entries ...
scanning hidden files ...
scan completed successfully
hidden files: 0
**************************************************************************
Stealth MBR rootkit/Mebroot/Sinowal detector 0.3.7 by Gmer, http://www.gmer.net
device: opened successfully
user: MBR read successfully
called modules: ntkrnlpa.exe catchme.sys CLASSPNP.SYS disk.sys >>UNKNOWN [0x865B7AC8]<<
kernel: MBR read successfully
detected MBR rootkit hooks:
\Driver\Disk -> CLASSPNP.SYS @ 0xf758bf28
\Driver\ACPI -> ACPI.sys @ 0xf741ecb8
\Driver\atapi -> atapi.sys @ 0xf7392852
IoDeviceObjectType -> DeleteProcedure -> ntkrnlpa.exe @ 0x80579022
ParseProcedure -> ntkrnlpa.exe @ 0x80577c84
\Device\Harddisk0\DR0 -> DeleteProcedure -> ntkrnlpa.exe @ 0x80579022
ParseProcedure -> ntkrnlpa.exe @ 0x80577c84
NDIS: Intel(R) PRO/Wireless 2200BG Network Connection -> SendCompleteHandler -> NDIS.sys @ 0xf7276bb0
PacketIndicateHandler -> NDIS.sys @ 0xf7265a0d
SendHandler -> NDIS.sys @ 0xf7279b40
user & kernel MBR OK
**************************************************************************
.
--------------------- DLLs Loaded Under Running Processes ---------------------
- - - - - - - > 'winlogon.exe'(872)
c:\windows\system32\WININET.dll
- - - - - - - > 'lsass.exe'(932)
c:\windows\system32\WININET.dll
- - - - - - - > 'explorer.exe'(2448)
c:\windows\system32\WININET.dll
c:\windows\system32\ieframe.dll
c:\windows\system32\webcheck.dll
c:\windows\system32\WPDShServiceObj.dll
c:\windows\system32\PortableDeviceTypes.dll
c:\windows\system32\PortableDeviceApi.dll
.
Completion time: 2010-04-14 09:16:40
ComboFix-quarantined-files.txt 2010-04-14 07:16
ComboFix2.txt 2010-04-12 12:01
Pre-Run: 67,843,690,496 bytes free
Post-Run: 67,814,846,464 bytes free
- - End Of File - - A9CE525B31F6D5117A1B737B42F474C6
Pendant le scan combofix me dit que mon antivirus est activé alors qu'a l'ouverture de l'ordi ou lorsque je cherche à ouvrir l'antivirus une fenetre m'annonce que je dois introduire le disque d'installation.
Après le scan j'ai voulu me reconnecter via le portable. J'ai pu aller sur Google mais ensuite lorsque j'ai choisi le site ci-joint je suis tombé sur e-bay. Pareil pour CCM. Impossible d'y acceder. J'ai donc de nouveau pris la cle USB et le PC.
ComboFix 10-04-13.02 - Amo 04/14/2010 9:02.2.1 - x86
Microsoft Windows XP Professional 5.1.2600.3.1252.1.1033.18.1015.511 [GMT 2:00]
Running from: c:\documents and settings\Amo\Desktop\AAAAAAAA.exe
AV: Symantec AntiVirus Corporate Edition *On-access scanning enabled* (Updated) {FB06448E-52B8-493A-90F3-E43226D3305C}
.
((((((((((((((((((((((((( Files Created from 2010-03-14 to 2010-04-14 )))))))))))))))))))))))))))))))
.
2010-04-13 18:23 . 2010-04-13 18:23 92834 ----a-w- c:\documents and settings\All Users\Application Data\Symantec\Symantec AntiVirus Corporate Edition\7.5\APTemp\AP0.dll
2010-04-13 16:24 . 2010-04-13 16:24 -------- d-----w- C:\Kill'em
2010-04-12 21:22 . 2010-04-12 21:22 7816540 ----a-w- C:\UsbFix_Upload_Me_D3VPCV91.zip
2010-04-12 18:48 . 2010-04-13 16:18 46640 ----a-w- c:\windows\system32\msln.exe
2010-04-12 12:30 . 2010-04-12 21:22 -------- d-----w- C:\UsbFix
2010-04-12 07:54 . 2010-04-13 16:24 -------- d-----w- c:\program files\List_Kill'em
2010-04-07 05:04 . 2010-04-07 05:04 -------- d-sh--w- c:\documents and settings\LocalService\PrivacIE
2010-04-07 05:04 . 2010-04-07 05:04 -------- d-sh--w- c:\documents and settings\LocalService\IECompatCache
2010-04-06 19:05 . 2008-04-13 18:40 34688 ----a-w- c:\windows\system32\drivers\lbrtfdc.sys
2010-04-06 19:05 . 2008-04-13 18:40 34688 ----a-w- c:\windows\system32\dllcache\lbrtfdc.sys
2010-04-06 19:04 . 2008-04-13 18:40 8192 ----a-w- c:\windows\system32\drivers\Changer.sys
2010-04-06 19:04 . 2008-04-13 18:40 8192 ----a-w- c:\windows\system32\dllcache\changer.sys
2010-04-06 19:03 . 2010-04-06 19:03 174592 ----a-w- c:\windows\Afonia.exe
.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2010-04-12 22:45 . 2007-02-02 19:14 -------- d-----w- c:\program files\Symantec AntiVirus
2010-04-12 21:09 . 2006-12-14 07:31 -------- d-----w- c:\program files\Windows Defender
2010-04-12 21:09 . 2007-06-06 11:42 -------- d-----w- c:\program files\QuickTime
2010-04-12 21:08 . 2006-04-28 02:11 -------- d-----w- c:\program files\Common Files\Symantec Shared
2010-04-12 21:08 . 2006-04-21 22:53 -------- d-----w- c:\program files\Apoint
2010-04-12 14:41 . 2004-08-11 22:00 8832 ----a-w- c:\windows\system32\drivers\rasacd.sys
2010-04-08 14:16 . 2007-02-02 19:47 -------- d-----w- c:\documents and settings\All Users\Application Data\Spybot - Search & Destroy
2010-04-06 19:44 . 2010-04-06 19:44 8 ----a-w- c:\documents and settings\NetworkService\Application Data\ypgmjw.dat
2010-04-06 19:03 . 2010-04-06 19:03 28814 ----a-w- c:\windows\system32\99.tmp
2010-04-06 19:03 . 2010-04-06 19:03 84 ----a-w- c:\windows\system32\96.tmp
2010-04-03 22:31 . 2006-04-27 14:22 -------- d-----w- c:\program files\Google
2010-03-07 18:40 . 2010-03-07 18:40 0 ----a-w- c:\windows\nsreg.dat
2010-02-25 06:24 . 2004-08-11 22:00 916480 ------w- c:\windows\system32\wininet.dll
2010-02-24 09:16 . 2009-10-04 17:00 181632 ------w- c:\windows\system32\MpSigStub.exe
2010-02-19 23:47 . 2010-02-19 23:47 3604480 ----a-w- c:\windows\system32\GPhotos.scr
2010-02-12 10:03 . 2010-03-01 07:03 293376 ------w- c:\windows\system32\browserchoice.exe
2010-01-26 13:24 . 2010-01-26 13:24 126 ----a-w- c:\documents and settings\Amo\Local Settings\Application Data\fusioncache.dat
2010-01-17 21:36 . 2010-01-17 21:32 77152 ----a-w- c:\documents and settings\Amo\Local Settings\Application Data\GDIPFONTCACHEV1.DAT
.
[code]<pre>
c:\program files\Adobe\Reader 8.0\Reader\reader_sl .exe
c:\program files\Apoint\apoint .exe
c:\program files\Common Files\Symantec Shared\ccapp .exe
c:\program files\Dell\QuickSet\quickset .exe
c:\program files\Intel\Wireless\Bin\ifrmewrk .exe
c:\program files\Intel\Wireless\Bin\zcfgsvc .exe
c:\program files\QuickTime\qttask .exe
c:\program files\Symantec AntiVirus\vptray .exe
c:\program files\Windows Defender\msascui .exe
c:\program files\Windows Media Player\wmpnscfg .exe
c:\windows\system32\dla\tfswctrl .exe
</pre>/code
((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4
[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"WMPNSCFG"="c:\program files\Windows Media Player\WMPNSCFG.exe" [N/A]
"dbf70700 .exe"="c:\documents and settings\amo\application data\3714d4468fe48242322ef6cbe954a0e3\dbf70700 .exe" [N/A]
"dbf70700 .exe"="c:\documents and settings\amo\application data\3714d4468fe48242322ef6cbe954a0e3\dbf70700 .exe" [N/A]
"dbf70700 .exe"="c:\documents and settings\amo\application data\3714d4468fe48242322ef6cbe954a0e3\dbf70700 .exe" [N/A]
"dbf70700 .exe"="c:\documents and settings\amo\application data\3714d4468fe48242322ef6cbe954a0e3\dbf70700 .exe" [N/A]
"dbf70700 .exe"="c:\documents and settings\amo\application data\3714d4468fe48242322ef6cbe954a0e3\dbf70700 .exe" [N/A]
"dbf70700 .exe"="c:\documents and settings\amo\application data\3714d4468fe48242322ef6cbe954a0e3\dbf70700 .exe" [N/A]
"dbf70700 .exe"="c:\documents and settings\amo\application data\3714d4468fe48242322ef6cbe954a0e3\dbf70700 .exe" [N/A]
"dbf70700 .exe"="c:\documents and settings\amo\application data\3714d4468fe48242322ef6cbe954a0e3\dbf70700 .exe" [N/A]
"dbf70700 .exe"="c:\documents and settings\amo\application data\3714d4468fe48242322ef6cbe954a0e3\dbf70700 .exe" [N/A]
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"QuickTime Task"="c:\program files\quicktime\qttask .exe -atboottime" [X]
"Apoint"="c:\program files\Apoint\Apoint.exe" [N/A]
"Dell QuickSet"="c:\program files\dell\quickset\quickset .exe .exe .exe .exe .exe .exe .exe .exe .exe" [N/A]
"dla"="c:\windows\system32\dla\tfswctrl.exe" [N/A]
"Windows Defender"="c:\program files\Windows Defender\MSASCui.exe" [N/A]
"ccApp"="c:\program files\Common Files\Symantec Shared\ccApp.exe" [N/A]
"igfxtray"="c:\windows\system32\igfxtray.exe" [N/A]
"igfxhkcmd"="c:\windows\system32\hkcmd.exe" [N/A]
"igfxpers"="c:\windows\system32\igfxpers.exe" [N/A]
"IntelZeroConfig"="c:\program files\Intel\Wireless\bin\ZCfgSvc.exe" [N/A]
"IntelWireless"="c:\program files\Intel\Wireless\Bin\ifrmewrk.exe" [N/A]
"Adobe Reader Speed Launcher"="c:\program files\Adobe\Reader 8.0\Reader\Reader_sl.exe" [N/A]
"vptray"="c:\progra~1\SYMANT~1\\vptray.exe" [N/A]
[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run]
"DWQueuedReporting"="c:\progra~1\COMMON~1\MICROS~1\DW\dwtrig20.exe" [2007-02-26 437160]
[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\RunOnce]
"RunNarrator"="Narrator.exe" [2008-04-14 53760]
c:\documents and settings\All Users\Start Menu\Programs\Startup\
Digital Line Detect.lnk - c:\program files\Digital Line Detect\DLG.exe [2006-4-22 24576]
[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\explorer]
"HonorAutoRunSetting"= 0 (0x0)
[HKEY_CURRENT_USER\software\microsoft\windows\currentversion\policies\explorer]
"HonorAutoRunSetting"= 0 (0x0)
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\WinDefend]
@="Service"
[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\SymantecAntiVirus]
"DisableMonitoring"=dword:00000001
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile]
"EnableFirewall"= 0 (0x0)
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%windir%\\system32\\sessmgr.exe"=
"c:\\Program Files\\Common Files\\Ahead\\Nero Web\\SetupX.exe"=
"c:\\Program Files\\Common Files\\Ahead\\Nero Web\\SetupXu.exe"=
"c:\\Program Files\\Nero\\Nero 7\\Nero ShowTime\\ShowTime.exe"=
"c:\\WINDOWS\\pchealth\\helpctr\\binaries\\helpctr.exe"=
"c:\\Program Files\\Skype\\Plugin Manager\\skypePM.exe"=
"c:\\Program Files\\Skype\\Phone\\Skype.exe"=
"c:\\WINDOWS\\Network Diagnostic\\xpnetdiag.exe"=
"c:\\Program Files\\Windows Live\\Sync\\WindowsLiveSync.exe"=
"c:\\Program Files\\Messenger\\msmsgs.exe"=
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\GloballyOpenPorts\List]
"3389:TCP"= 3389:TCP:@xpsp2res.dll,-22009
R2 WinDefend;Windows Defender;c:\program files\Windows Defender\MsMpEng.exe [11/3/2006 7:19 PM 13592]
R3 EraserUtilRebootDrv;EraserUtilRebootDrv;c:\program files\Common Files\Symantec Shared\eengine\EraserUtilRebootDrv.sys [8/27/2009 7:01 PM 102448]
R3 GTIPCI21;GTIPCI21;c:\windows\system32\drivers\gtipci21.sys [4/22/2006 12:53 AM 87936]
S0 1742699994;1742699994;c:\windows\system32\drivers\1742699994.sys --> c:\windows\system32\drivers\1742699994.sys [?]
S2 gupdate;Google Update Service (gupdate);c:\program files\Google\Update\GoogleUpdate.exe [2/4/2010 12:01 PM 135664]
S3 SavRoam;SAVRoam;c:\program files\Symantec AntiVirus\SavRoam.exe [12/20/2006 8:29 PM 116928]
.
Contents of the 'Scheduled Tasks' folder
2010-04-14 c:\windows\Tasks\GoogleUpdateTaskMachineCore.job
- c:\program files\Google\Update\GoogleUpdate.exe [2010-02-04 10:00]
2010-04-13 c:\windows\Tasks\GoogleUpdateTaskMachineUA.job
- c:\program files\Google\Update\GoogleUpdate.exe [2010-02-04 10:00]
2010-04-14 c:\windows\Tasks\MP Scheduled Scan.job
- c:\program files\Windows Defender\MpCmdRun.exe [2006-11-03 17:20]
2010-04-14 c:\windows\Tasks\OGALogon.job
- c:\windows\system32\OGAEXEC.exe [2009-08-03 13:07]
.
.
------- Supplementary Scan -------
.
IE: Add to Google Photos Screensa&ver - c:\windows\system32\GPhotos.scr/200
IE: E&xport to Microsoft Excel - c:\progra~1\MICROS~2\OFFICE11\EXCEL.EXE/3000
IE: Google Sidewiki... - c:\program files\Google\Google Toolbar\Component\GoogleToolbarDynamic_mui_en_96D6FF0C6D236BF8.dll/cmsidewiki.html
DPF: {01010200-5E80-11D8-9E86-0007E96C65AE} - hxxp://supportcenter.rr.com/sdccommon/download/tgctlins.cab
FF - ProfilePath - c:\documents and settings\Amo\Application Data\Mozilla\Firefox\Profiles\11q42en7.default\
FF - plugin: c:\program files\Google\Google Earth\plugin\npgeplugin.dll
FF - plugin: c:\program files\Google\Picasa3\npPicasa3.dll
FF - plugin: c:\program files\Google\Update\1.2.183.23\npGoogleOneClick8.dll
FF - plugin: c:\program files\Microsoft\Office Live\npOLW.dll
FF - plugin: c:\program files\Windows Live\Photo Gallery\NPWLPG.dll
FF - HiddenExtension: Microsoft .NET Framework Assistant: {20a82645-c095-46ed-80e3-08825760534b} - c:\windows\Microsoft.NET\Framework\v3.5\Windows Presentation Foundation\DotNetAssistantExtension\
---- FIREFOX POLICIES ----
c:\program files\Mozilla Firefox\greprefs\all.js - pref("ui.use_native_colors", true);
c:\program files\Mozilla Firefox\greprefs\all.js - pref("ui.use_native_popup_windows", false);
c:\program files\Mozilla Firefox\greprefs\all.js - pref("browser.enable_click_image_resizing", true);
c:\program files\Mozilla Firefox\greprefs\all.js - pref("accessibility.browsewithcaret_shortcut.enabled", true);
c:\program files\Mozilla Firefox\greprefs\all.js - pref("javascript.options.mem.high_water_mark", 32);
c:\program files\Mozilla Firefox\greprefs\all.js - pref("javascript.options.mem.gc_frequency", 1600);
c:\program files\Mozilla Firefox\greprefs\all.js - pref("network.auth.force-generic-ntlm", false);
c:\program files\Mozilla Firefox\greprefs\all.js - pref("svg.smil.enabled", false);
c:\program files\Mozilla Firefox\greprefs\all.js - pref("ui.trackpoint_hack.enabled", -1);
c:\program files\Mozilla Firefox\greprefs\all.js - pref("browser.formfill.debug", false);
c:\program files\Mozilla Firefox\greprefs\all.js - pref("browser.formfill.agedWeight", 2);
c:\program files\Mozilla Firefox\greprefs\all.js - pref("browser.formfill.bucketSize", 1);
c:\program files\Mozilla Firefox\greprefs\all.js - pref("browser.formfill.maxTimeGroupings", 25);
c:\program files\Mozilla Firefox\greprefs\all.js - pref("browser.formfill.timeGroupingSize", 604800);
c:\program files\Mozilla Firefox\greprefs\all.js - pref("browser.formfill.boundaryWeight", 25);
c:\program files\Mozilla Firefox\greprefs\all.js - pref("browser.formfill.prefixWeight", 5);
c:\program files\Mozilla Firefox\greprefs\all.js - pref("html5.enable", false);
c:\program files\Mozilla Firefox\defaults\pref\firefox-branding.js - pref("app.update.download.backgroundInterval", 600);
c:\program files\Mozilla Firefox\defaults\pref\firefox-branding.js - pref("app.update.url.manual", "https://www.mozilla.org/en-US/firefox/new/?redirect_source=firefox-com");
c:\program files\Mozilla Firefox\defaults\pref\firefox-branding.js - pref("browser.search.param.yahoo-fr-ja", "mozff");
c:\program files\Mozilla Firefox\defaults\pref\firefox.js - pref("extensions.{972ce4c6-7e08-4474-a285-3208198ce6fd}.name", "chrome://browser/locale/browser.properties");
c:\program files\Mozilla Firefox\defaults\pref\firefox.js - pref("extensions.{972ce4c6-7e08-4474-a285-3208198ce6fd}.description", "chrome://browser/locale/browser.properties");
c:\program files\Mozilla Firefox\defaults\pref\firefox.js - pref("xpinstall.whitelist.add", "addons.mozilla.org");
c:\program files\Mozilla Firefox\defaults\pref\firefox.js - pref("xpinstall.whitelist.add.36", "getpersonas.com");
c:\program files\Mozilla Firefox\defaults\pref\firefox.js - pref("lightweightThemes.update.enabled", true);
c:\program files\Mozilla Firefox\defaults\pref\firefox.js - pref("browser.allTabs.previews", false);
c:\program files\Mozilla Firefox\defaults\pref\firefox.js - pref("plugins.hide_infobar_for_outdated_plugin", false);
c:\program files\Mozilla Firefox\defaults\pref\firefox.js - pref("plugins.update.notifyUser", false);
c:\program files\Mozilla Firefox\defaults\pref\firefox.js - pref("toolbar.customization.usesheet", false);
c:\program files\Mozilla Firefox\defaults\pref\firefox.js - pref("browser.taskbar.previews.enable", false);
c:\program files\Mozilla Firefox\defaults\pref\firefox.js - pref("browser.taskbar.previews.max", 20);
c:\program files\Mozilla Firefox\defaults\pref\firefox.js - pref("browser.taskbar.previews.cachetime", 20);
.
**************************************************************************
catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2010-04-14 09:12
Windows 5.1.2600 Service Pack 3 NTFS
scanning hidden processes ...
scanning hidden autostart entries ...
scanning hidden files ...
scan completed successfully
hidden files: 0
**************************************************************************
Stealth MBR rootkit/Mebroot/Sinowal detector 0.3.7 by Gmer, http://www.gmer.net
device: opened successfully
user: MBR read successfully
called modules: ntkrnlpa.exe catchme.sys CLASSPNP.SYS disk.sys >>UNKNOWN [0x865B7AC8]<<
kernel: MBR read successfully
detected MBR rootkit hooks:
\Driver\Disk -> CLASSPNP.SYS @ 0xf758bf28
\Driver\ACPI -> ACPI.sys @ 0xf741ecb8
\Driver\atapi -> atapi.sys @ 0xf7392852
IoDeviceObjectType -> DeleteProcedure -> ntkrnlpa.exe @ 0x80579022
ParseProcedure -> ntkrnlpa.exe @ 0x80577c84
\Device\Harddisk0\DR0 -> DeleteProcedure -> ntkrnlpa.exe @ 0x80579022
ParseProcedure -> ntkrnlpa.exe @ 0x80577c84
NDIS: Intel(R) PRO/Wireless 2200BG Network Connection -> SendCompleteHandler -> NDIS.sys @ 0xf7276bb0
PacketIndicateHandler -> NDIS.sys @ 0xf7265a0d
SendHandler -> NDIS.sys @ 0xf7279b40
user & kernel MBR OK
**************************************************************************
.
--------------------- DLLs Loaded Under Running Processes ---------------------
- - - - - - - > 'winlogon.exe'(872)
c:\windows\system32\WININET.dll
- - - - - - - > 'lsass.exe'(932)
c:\windows\system32\WININET.dll
- - - - - - - > 'explorer.exe'(2448)
c:\windows\system32\WININET.dll
c:\windows\system32\ieframe.dll
c:\windows\system32\webcheck.dll
c:\windows\system32\WPDShServiceObj.dll
c:\windows\system32\PortableDeviceTypes.dll
c:\windows\system32\PortableDeviceApi.dll
.
Completion time: 2010-04-14 09:16:40
ComboFix-quarantined-files.txt 2010-04-14 07:16
ComboFix2.txt 2010-04-12 12:01
Pre-Run: 67,843,690,496 bytes free
Post-Run: 67,814,846,464 bytes free
- - End Of File - - A9CE525B31F6D5117A1B737B42F474C6
Utilisateur anonyme
14 avril 2010 à 09:52
14 avril 2010 à 09:52
▶ Clique sur le menu Demarrer /Panneau de configuration/Options des dossiers/ puis dans l'onglet Affichage
* - Coche Afficher les fichiers et dossiers cachés
* - Décoche Masquer les extensions des fichiers dont le type est connu
* - Décoche Masquer les fichiers protégés du système d'exploitation (recommandé)
▶ clique sur Appliquer, puis OK.
N'oublie pas de recacher à nouveau les fichiers cachés et protégés du système d'exploitation en fin de désinfection, c'est important
Fais analyser le(s) fichier(s) suivants sur Virustotal :
Virus Total
* Clique sur Parcourir en haut, choisis Poste de travail et cherche ces fichiers :
c:\windows\system32\msln.exe
c:\windows\Afonia.exe
* Clique maintenant sur Envoyer le fichier. et laisse travailler tant que "Situation actuelle : en cours d'analyse" est affiché.
* Il est possible que le fichier soit mis en file d'attente en raison d'un grand nombre de demandes d'analyses. En ce cas, il te faudra patienter sans actualiser la page.
* Lorsque l'analyse est terminée ("Situation actuelle: terminé"), clique sur Formaté
* Une nouvelle fenêtre de ton navigateur va apparaître
* Clique alors sur les deux fleches
* Fais un clic droit sur la page, et choisis Sélectionner tout, puis copier
* Enfin colle le résultat dans ta prochaine réponse.
Note : Pour analyser un autre fichier, clique en bas sur Autre fichier.
* - Coche Afficher les fichiers et dossiers cachés
* - Décoche Masquer les extensions des fichiers dont le type est connu
* - Décoche Masquer les fichiers protégés du système d'exploitation (recommandé)
▶ clique sur Appliquer, puis OK.
N'oublie pas de recacher à nouveau les fichiers cachés et protégés du système d'exploitation en fin de désinfection, c'est important
Fais analyser le(s) fichier(s) suivants sur Virustotal :
Virus Total
* Clique sur Parcourir en haut, choisis Poste de travail et cherche ces fichiers :
c:\windows\system32\msln.exe
c:\windows\Afonia.exe
* Clique maintenant sur Envoyer le fichier. et laisse travailler tant que "Situation actuelle : en cours d'analyse" est affiché.
* Il est possible que le fichier soit mis en file d'attente en raison d'un grand nombre de demandes d'analyses. En ce cas, il te faudra patienter sans actualiser la page.
* Lorsque l'analyse est terminée ("Situation actuelle: terminé"), clique sur Formaté
* Une nouvelle fenêtre de ton navigateur va apparaître
* Clique alors sur les deux fleches
* Fais un clic droit sur la page, et choisis Sélectionner tout, puis copier
* Enfin colle le résultat dans ta prochaine réponse.
Note : Pour analyser un autre fichier, clique en bas sur Autre fichier.
Voila les resultats :
Pour msln>exe
Fichier xx1 reçu le 2010.04.09 06:34:07 (UTC)
Antivirus Version Dernière mise à jour Résultat
a-squared 4.5.0.50 2010.04.09 -
AhnLab-V3 5.0.0.2 2010.04.08 -
AntiVir 7.10.6.49 2010.04.08 -
Antiy-AVL 2.0.3.7 2010.04.08 -
Authentium 5.2.0.5 2010.04.09 -
Avast 4.8.1351.0 2010.04.08 -
Avast5 5.0.332.0 2010.04.08 -
AVG 9.0.0.787 2010.04.08 -
BitDefender 7.2 2010.04.09 -
CAT-QuickHeal 10.00 2010.04.09 -
ClamAV 0.96.0.3-git 2010.04.09 -
Comodo 4545 2010.04.09 -
DrWeb 5.0.2.03300 2010.04.09 -
eSafe 7.0.17.0 2010.04.08 -
eTrust-Vet 35.2.7416 2010.04.08 -
F-Prot 4.5.1.85 2010.04.08 -
F-Secure 9.0.15370.0 2010.04.09 -
Fortinet 4.0.14.0 2010.04.08 -
GData 19 2010.04.09 -
Ikarus T3.1.1.80.0 2010.04.09 -
Jiangmin 13.0.900 2010.04.09 -
Kaspersky 7.0.0.125 2010.04.09 -
McAfee-GW-Edition 6.8.5 2010.04.09 -
Microsoft 1.5605 2010.04.09 -
NOD32 5012 2010.04.09 -
Norman 6.04.11 2010.04.08 -
nProtect 2009.1.8.0 2010.04.06 -
Panda 10.0.2.2 2010.04.08 -
PCTools 7.0.3.5 2010.04.09 -
Prevx 3.0 2010.04.09 -
Rising 22.42.04.03 2010.04.09 -
Sophos 4.52.0 2010.04.09 -
Sunbelt 6154 2010.04.09 -
Symantec 20091.2.0.41 2010.04.09 -
TheHacker 6.5.2.0.258 2010.04.09 -
TrendMicro 9.120.0.1004 2010.04.09 -
VBA32 3.12.12.4 2010.04.05 -
ViRobot 2010.4.9.2268 2010.04.09 -
VirusBuster 5.0.27.0 2010.04.08 -
Information additionnelle
File size: 46640 bytes
MD5 : 2d6b7efda9d4a44c7c5bdfe8d0bbc839
SHA1 : bb8b5a4496d3c5e614b15fa612566c9ef788c156
SHA256: 0b1e1bb34eb6fc2c1e3f6176b20b72bde45a0e2bea9ea9342cf8d3e57289e7dd
PEInfo: PE Structure information<br> <br> ( base data )<br> entrypointaddress.: 0x26C8<br> timedatestamp.....: 0x46A95727 (Fri Jul 27 04:23:35 2007)<br> machinetype.......: 0x14C (Intel I386)<br> <br> ( 4 sections )<br> name viradd virsiz rawdsiz ntrpy md5<br> .text 0x1000 0x8A20 0x8C00 6.29 a5a9c3c6e77936ff1f8328a652784d4b<br>.data 0xA000 0x40 0x200 0.60 e8e030083a6aa6ced28939e09efb4142<br>.rsrc 0xB000 0x3B0 0x400 3.10 55150d77d0d260880d388afd30d91b94<br>.reloc 0xC000 0x534 0x600 4.61 8f3fc76e0db2af82a10d8247b80a2360<br> <br> ( 0 imports )<br> <br> <br> ( 0 exports )<br>
TrID : File type identification<br>Win64 Executable Generic (87.2%)<br>Win32 Executable Generic (8.6%)<br>Generic Win/DOS Executable (2.0%)<br>DOS Executable Generic (2.0%)<br>Autodesk FLIC Image File (extensions: flc, fli, cel) (0.0%)
ThreatExpert: <a href="https://www.symantec.com?md5=2d6b7efda9d4a44c7c5bdfe8d0bbc839" target="_blank">https://www.symantec.com?md5=2d6b7efda9d4a44c7c5bdfe8d0bbc839</a>
ssdeep: 768:D6/PfJ4Qvf13wCpsxXKq7BjeZhQgF3fgtSgSikrHqfmsLLAmDbL5:DeCQvf13dsxXOigF3fgtSgSikrHcFLLV
sigcheck: publisher....: Symantec Corporation<br>copyright....: Copyright (c) 2000-2007 Symantec Corporation. All rights reserved.<br>product......: MS Light<br>description..: Symantec MSLN<br>original name: msln.exe<br>internal name: MSLN<br>file version.: 5.2.0.3<br>comments.....: n/a<br>signers......: Symantec Corporation<br> VeriSign Class 3 Code Signing 2004 CA<br> Class 3 Public Primary Certification Authority<br>signing date.: 3:24 AM 7/27/2007<br>verified.....: -<br>
PEiD : -
RDS : NSRL Reference Data Set<br>-
Antivirus Version Dernière mise à jour Résultat
a-squared 4.5.0.50 2010.04.09 -
AhnLab-V3 5.0.0.2 2010.04.08 -
AntiVir 7.10.6.49 2010.04.08 -
Antiy-AVL 2.0.3.7 2010.04.08 -
Authentium 5.2.0.5 2010.04.09 -
Avast 4.8.1351.0 2010.04.08 -
Avast5 5.0.332.0 2010.04.08 -
AVG 9.0.0.787 2010.04.08 -
BitDefender 7.2 2010.04.09 -
CAT-QuickHeal 10.00 2010.04.09 -
ClamAV 0.96.0.3-git 2010.04.09 -
Comodo 4545 2010.04.09 -
DrWeb 5.0.2.03300 2010.04.09 -
eSafe 7.0.17.0 2010.04.08 -
eTrust-Vet 35.2.7416 2010.04.08 -
F-Prot 4.5.1.85 2010.04.08 -
F-Secure 9.0.15370.0 2010.04.09 -
Fortinet 4.0.14.0 2010.04.08 -
GData 19 2010.04.09 -
Ikarus T3.1.1.80.0 2010.04.09 -
Jiangmin 13.0.900 2010.04.09 -
Kaspersky 7.0.0.125 2010.04.09 -
McAfee-GW-Edition 6.8.5 2010.04.09 -
Microsoft 1.5605 2010.04.09 -
NOD32 5012 2010.04.09 -
Norman 6.04.11 2010.04.08 -
nProtect 2009.1.8.0 2010.04.06 -
Panda 10.0.2.2 2010.04.08 -
PCTools 7.0.3.5 2010.04.09 -
Prevx 3.0 2010.04.09 -
Rising 22.42.04.03 2010.04.09 -
Sophos 4.52.0 2010.04.09 -
Sunbelt 6154 2010.04.09 -
Symantec 20091.2.0.41 2010.04.09 -
TheHacker 6.5.2.0.258 2010.04.09 -
TrendMicro 9.120.0.1004 2010.04.09 -
VBA32 3.12.12.4 2010.04.05 -
ViRobot 2010.4.9.2268 2010.04.09 -
VirusBuster 5.0.27.0 2010.04.08 -
Information additionnelle
File size: 46640 bytes
MD5 : 2d6b7efda9d4a44c7c5bdfe8d0bbc839
SHA1 : bb8b5a4496d3c5e614b15fa612566c9ef788c156
SHA256: 0b1e1bb34eb6fc2c1e3f6176b20b72bde45a0e2bea9ea9342cf8d3e57289e7dd
PEInfo: PE Structure information<br> <br> ( base data )<br> entrypointaddress.: 0x26C8<br> timedatestamp.....: 0x46A95727 (Fri Jul 27 04:23:35 2007)<br> machinetype.......: 0x14C (Intel I386)<br> <br> ( 4 sections )<br> name viradd virsiz rawdsiz ntrpy md5<br> .text 0x1000 0x8A20 0x8C00 6.29 a5a9c3c6e77936ff1f8328a652784d4b<br>.data 0xA000 0x40 0x200 0.60 e8e030083a6aa6ced28939e09efb4142<br>.rsrc 0xB000 0x3B0 0x400 3.10 55150d77d0d260880d388afd30d91b94<br>.reloc 0xC000 0x534 0x600 4.61 8f3fc76e0db2af82a10d8247b80a2360<br> <br> ( 0 imports )<br> <br> <br> ( 0 exports )<br>
TrID : File type identification<br>Win64 Executable Generic (87.2%)<br>Win32 Executable Generic (8.6%)<br>Generic Win/DOS Executable (2.0%)<br>DOS Executable Generic (2.0%)<br>Autodesk FLIC Image File (extensions: flc, fli, cel) (0.0%)
ThreatExpert: <a href="https://www.symantec.com?md5=2d6b7efda9d4a44c7c5bdfe8d0bbc839" target="_blank">https://www.symantec.com?md5=2d6b7efda9d4a44c7c5bdfe8d0bbc839</a>
ssdeep: 768:D6/PfJ4Qvf13wCpsxXKq7BjeZhQgF3fgtSgSikrHqfmsLLAmDbL5:DeCQvf13dsxXOigF3fgtSgSikrHcFLLV
sigcheck: publisher....: Symantec Corporation<br>copyright....: Copyright (c) 2000-2007 Symantec Corporation. All rights reserved.<br>product......: MS Light<br>description..: Symantec MSLN<br>original name: msln.exe<br>internal name: MSLN<br>file version.: 5.2.0.3<br>comments.....: n/a<br>signers......: Symantec Corporation<br> VeriSign Class 3 Code Signing 2004 CA<br> Class 3 Public Primary Certification Authority<br>signing date.: 3:24 AM 7/27/2007<br>verified.....: -<br>
PEiD : -
RDS : NSRL Reference Data Set<br>-
Pour afonia.exe
Fichier Afonia.exe reçu le 2010.04.14 08:24:02 (UTC)
Antivirus Version Dernière mise à jour Résultat
a-squared 4.5.0.50 2010.04.14 Backdoor.Vreser!IK
AhnLab-V3 5.0.0.2 2010.04.13 -
AntiVir 7.10.6.71 2010.04.14 -
Antiy-AVL 2.0.3.7 2010.04.14 -
Authentium 5.2.0.5 2010.04.14 W32/Bredolab.N.gen!Eldorado
Avast 4.8.1351.0 2010.04.14 Win32:Crypt-GDV
Avast5 5.0.332.0 2010.04.14 Win32:Crypt-GDV
AVG 9.0.0.787 2010.04.14 Crypt.SCH
BitDefender 7.2 2010.04.14 Trojan.Generic.3610405
CAT-QuickHeal 10.00 2010.04.14 Trojan.Agent.gen
ClamAV 0.96.0.3-git 2010.04.14 -
Comodo 4595 2010.04.14 -
DrWeb 5.0.2.03300 2010.04.14 Trojan.Siggen1.19971
eSafe 7.0.17.0 2010.04.13 -
eTrust-Vet 35.2.7423 2010.04.13 -
F-Prot 4.5.1.85 2010.04.13 W32/Bredolab.N.gen!Eldorado
F-Secure 9.0.15370.0 2010.04.14 Trojan.Generic.3610405
Fortinet 4.0.14.0 2010.04.12 -
GData 19 2010.04.14 Trojan.Generic.3610405
Ikarus T3.1.1.80.0 2010.04.14 Backdoor.Vreser
Jiangmin 13.0.900 2010.04.13 -
Kaspersky 7.0.0.125 2010.04.14 -
McAfee 5.400.0.1158 2010.04.14 BackDoor-EOI
McAfee-GW-Edition 6.8.5 2010.04.13 -
Microsoft 1.5605 2010.04.14 TrojanDownloader:Win32/Renos.LG
NOD32 5026 2010.04.13 a variant of Win32/Kryptik.DNS
Norman 6.04.11 2010.04.14 W32/Suspicious.S
nProtect 2009.1.8.0 2010.04.06 -
Panda 10.0.2.7 2010.04.13 Generic Trojan
PCTools 7.0.3.5 2010.04.14 -
Prevx 3.0 2010.04.14 High Risk Spyware
Rising 22.43.02.04 2010.04.14 Trojan.Win32.Generic.51FDB5A8
Sophos 4.52.0 2010.04.14 Mal/FakeAV-CU
Sunbelt 6174 2010.04.14 -
Symantec 20091.2.0.41 2010.04.14 -
TheHacker 6.5.2.0.261 2010.04.14 Trojan/Kryptik.dns
TrendMicro 9.120.0.1004 2010.04.14 -
VBA32 3.12.12.4 2010.04.09 -
ViRobot 2010.4.14.2275 2010.04.14 -
VirusBuster 5.0.27.0 2010.04.13 Trojan.Bredolab.Gen!Pac.3
Information additionnelle
File size: 174592 bytes
MD5...: 867ad6aad0e6da39cda1159bbfff1753
SHA1..: 93cf05b689009e9004d6af67b0a8d0bdc3a41603
SHA256: e6c0e4e0de157683673bb59d99d7233b68988599154580370d006c9dfd29381b
ssdeep: 3072:k0Lgm/xSLGu9JpmWadX9hBQfrkfXQTVk2QA86sb3Fh2GniCpf:kL60mtdXo<br>QfXYV2j6c3FsGbp<br>
PEiD..: -
PEInfo: PE Structure information<br><br>( base data )<br>entrypointaddress.: 0x84d2<br>timedatestamp.....: 0x4bbb2187 (Tue Apr 06 11:56:55 2010)<br>machinetype.......: 0x14c (I386)<br><br>( 5 sections )<br>name viradd virsiz rawdsiz ntrpy md5<br>.text 0x1000 0x7d0f 0x7e00 6.39 590169947906655aeba408d5f130ccc1<br>.data 0x9000 0x3b300 0x20200 6.51 172cf346a42132d55cb8876e53af65cb<br>.bss 0x45000 0x1d52 0x1e00 4.80 5d0e91ff78f38c7607997882839d5446<br>.idata 0x47000 0x292 0x400 3.37 21b9a9e2459e37c1ecd08c91d7ec7b99<br>.rsrc 0x48000 0x254 0x400 2.16 ad7246f0ffbfc3edf3151a5a3e4026f4<br><br>( 1 imports ) <br>> kernel32.dll: CloseHandle, CreateEventA, CreateFileA, DisableThreadLibraryCalls, GetACP, GetCurrentProcess, GetCurrentThreadId, GetLastError, GetOEMCP, GetProcessHeap, HeapAlloc, HeapDestroy, InterlockedDecrement, InterlockedExchange, InterlockedIncrement, LocalAlloc, LocalFree, MultiByteToWideChar, QueryPerformanceCounter, SetLastError, UnhandledExceptionFilter, VirtualAlloc, lstrcmpiA<br><br>( 0 exports ) <br>
RDS...: NSRL Reference Data Set<br>-
trid..: Win32 Executable Generic (58.2%)<br>Win16/32 Executable Delphi generic (14.1%)<br>Generic Win/DOS Executable (13.6%)<br>DOS Executable Generic (13.6%)<br>VXD Driver (0.2%)
pdfid.: -
<a href='http://info.prevx.com/aboutprogramtext.asp?PX5=72894D5200E6F653AAA1026894E1CD00E4314F5F' target='_blank'>http://info.prevx.com/aboutprogramtext.asp?PX5=72894D5200E6F653AAA1026894E1CD00E4314F5F</a>
Symantec Reputation Network: Suspicious.Insight https://www.broadcom.com/support/security-center
sigcheck:<br>publisher....: n/a<br>copyright....: FFQax5EWc<br>product......: n/a<br>description..: 4o0XV<br>original name: mfyS4P6LxR33F.exe<br>internal name: n/a<br>file version.: 1.0.34.0<br>comments.....: n/a<br>signers......: -<br>signing date.: -<br>verified.....: Unsigned<br>
Antivirus Version Dernière mise à jour Résultat
a-squared 4.5.0.50 2010.04.14 Backdoor.Vreser!IK
AhnLab-V3 5.0.0.2 2010.04.13 -
AntiVir 7.10.6.71 2010.04.14 -
Antiy-AVL 2.0.3.7 2010.04.14 -
Authentium 5.2.0.5 2010.04.14 W32/Bredolab.N.gen!Eldorado
Avast 4.8.1351.0 2010.04.14 Win32:Crypt-GDV
Avast5 5.0.332.0 2010.04.14 Win32:Crypt-GDV
AVG 9.0.0.787 2010.04.14 Crypt.SCH
BitDefender 7.2 2010.04.14 Trojan.Generic.3610405
CAT-QuickHeal 10.00 2010.04.14 Trojan.Agent.gen
ClamAV 0.96.0.3-git 2010.04.14 -
Comodo 4595 2010.04.14 -
DrWeb 5.0.2.03300 2010.04.14 Trojan.Siggen1.19971
eSafe 7.0.17.0 2010.04.13 -
eTrust-Vet 35.2.7423 2010.04.13 -
F-Prot 4.5.1.85 2010.04.13 W32/Bredolab.N.gen!Eldorado
F-Secure 9.0.15370.0 2010.04.14 Trojan.Generic.3610405
Fortinet 4.0.14.0 2010.04.12 -
GData 19 2010.04.14 Trojan.Generic.3610405
Ikarus T3.1.1.80.0 2010.04.14 Backdoor.Vreser
Jiangmin 13.0.900 2010.04.13 -
Kaspersky 7.0.0.125 2010.04.14 -
McAfee 5.400.0.1158 2010.04.14 BackDoor-EOI
McAfee-GW-Edition 6.8.5 2010.04.13 -
Microsoft 1.5605 2010.04.14 TrojanDownloader:Win32/Renos.LG
NOD32 5026 2010.04.13 a variant of Win32/Kryptik.DNS
Norman 6.04.11 2010.04.14 W32/Suspicious.S
nProtect 2009.1.8.0 2010.04.06 -
Panda 10.0.2.7 2010.04.13 Generic Trojan
PCTools 7.0.3.5 2010.04.14 -
Prevx 3.0 2010.04.14 High Risk Spyware
Rising 22.43.02.04 2010.04.14 Trojan.Win32.Generic.51FDB5A8
Sophos 4.52.0 2010.04.14 Mal/FakeAV-CU
Sunbelt 6174 2010.04.14 -
Symantec 20091.2.0.41 2010.04.14 -
TheHacker 6.5.2.0.261 2010.04.14 Trojan/Kryptik.dns
TrendMicro 9.120.0.1004 2010.04.14 -
VBA32 3.12.12.4 2010.04.09 -
ViRobot 2010.4.14.2275 2010.04.14 -
VirusBuster 5.0.27.0 2010.04.13 Trojan.Bredolab.Gen!Pac.3
Information additionnelle
File size: 174592 bytes
MD5...: 867ad6aad0e6da39cda1159bbfff1753
SHA1..: 93cf05b689009e9004d6af67b0a8d0bdc3a41603
SHA256: e6c0e4e0de157683673bb59d99d7233b68988599154580370d006c9dfd29381b
ssdeep: 3072:k0Lgm/xSLGu9JpmWadX9hBQfrkfXQTVk2QA86sb3Fh2GniCpf:kL60mtdXo<br>QfXYV2j6c3FsGbp<br>
PEiD..: -
PEInfo: PE Structure information<br><br>( base data )<br>entrypointaddress.: 0x84d2<br>timedatestamp.....: 0x4bbb2187 (Tue Apr 06 11:56:55 2010)<br>machinetype.......: 0x14c (I386)<br><br>( 5 sections )<br>name viradd virsiz rawdsiz ntrpy md5<br>.text 0x1000 0x7d0f 0x7e00 6.39 590169947906655aeba408d5f130ccc1<br>.data 0x9000 0x3b300 0x20200 6.51 172cf346a42132d55cb8876e53af65cb<br>.bss 0x45000 0x1d52 0x1e00 4.80 5d0e91ff78f38c7607997882839d5446<br>.idata 0x47000 0x292 0x400 3.37 21b9a9e2459e37c1ecd08c91d7ec7b99<br>.rsrc 0x48000 0x254 0x400 2.16 ad7246f0ffbfc3edf3151a5a3e4026f4<br><br>( 1 imports ) <br>> kernel32.dll: CloseHandle, CreateEventA, CreateFileA, DisableThreadLibraryCalls, GetACP, GetCurrentProcess, GetCurrentThreadId, GetLastError, GetOEMCP, GetProcessHeap, HeapAlloc, HeapDestroy, InterlockedDecrement, InterlockedExchange, InterlockedIncrement, LocalAlloc, LocalFree, MultiByteToWideChar, QueryPerformanceCounter, SetLastError, UnhandledExceptionFilter, VirtualAlloc, lstrcmpiA<br><br>( 0 exports ) <br>
RDS...: NSRL Reference Data Set<br>-
trid..: Win32 Executable Generic (58.2%)<br>Win16/32 Executable Delphi generic (14.1%)<br>Generic Win/DOS Executable (13.6%)<br>DOS Executable Generic (13.6%)<br>VXD Driver (0.2%)
pdfid.: -
<a href='http://info.prevx.com/aboutprogramtext.asp?PX5=72894D5200E6F653AAA1026894E1CD00E4314F5F' target='_blank'>http://info.prevx.com/aboutprogramtext.asp?PX5=72894D5200E6F653AAA1026894E1CD00E4314F5F</a>
Symantec Reputation Network: Suspicious.Insight https://www.broadcom.com/support/security-center
sigcheck:<br>publisher....: n/a<br>copyright....: FFQax5EWc<br>product......: n/a<br>description..: 4o0XV<br>original name: mfyS4P6LxR33F.exe<br>internal name: n/a<br>file version.: 1.0.34.0<br>comments.....: n/a<br>signers......: -<br>signing date.: -<br>verified.....: Unsigned<br>
Pour msln>exe
Fichier xx1 reçu le 2010.04.09 06:34:07 (UTC)
Antivirus Version Dernière mise à jour Résultat
a-squared 4.5.0.50 2010.04.09 -
AhnLab-V3 5.0.0.2 2010.04.08 -
AntiVir 7.10.6.49 2010.04.08 -
Antiy-AVL 2.0.3.7 2010.04.08 -
Authentium 5.2.0.5 2010.04.09 -
Avast 4.8.1351.0 2010.04.08 -
Avast5 5.0.332.0 2010.04.08 -
AVG 9.0.0.787 2010.04.08 -
BitDefender 7.2 2010.04.09 -
CAT-QuickHeal 10.00 2010.04.09 -
ClamAV 0.96.0.3-git 2010.04.09 -
Comodo 4545 2010.04.09 -
DrWeb 5.0.2.03300 2010.04.09 -
eSafe 7.0.17.0 2010.04.08 -
eTrust-Vet 35.2.7416 2010.04.08 -
F-Prot 4.5.1.85 2010.04.08 -
F-Secure 9.0.15370.0 2010.04.09 -
Fortinet 4.0.14.0 2010.04.08 -
GData 19 2010.04.09 -
Ikarus T3.1.1.80.0 2010.04.09 -
Jiangmin 13.0.900 2010.04.09 -
Kaspersky 7.0.0.125 2010.04.09 -
McAfee-GW-Edition 6.8.5 2010.04.09 -
Microsoft 1.5605 2010.04.09 -
NOD32 5012 2010.04.09 -
Norman 6.04.11 2010.04.08 -
nProtect 2009.1.8.0 2010.04.06 -
Panda 10.0.2.2 2010.04.08 -
PCTools 7.0.3.5 2010.04.09 -
Prevx 3.0 2010.04.09 -
Rising 22.42.04.03 2010.04.09 -
Sophos 4.52.0 2010.04.09 -
Sunbelt 6154 2010.04.09 -
Symantec 20091.2.0.41 2010.04.09 -
TheHacker 6.5.2.0.258 2010.04.09 -
TrendMicro 9.120.0.1004 2010.04.09 -
VBA32 3.12.12.4 2010.04.05 -
ViRobot 2010.4.9.2268 2010.04.09 -
VirusBuster 5.0.27.0 2010.04.08 -
Information additionnelle
File size: 46640 bytes
MD5 : 2d6b7efda9d4a44c7c5bdfe8d0bbc839
SHA1 : bb8b5a4496d3c5e614b15fa612566c9ef788c156
SHA256: 0b1e1bb34eb6fc2c1e3f6176b20b72bde45a0e2bea9ea9342cf8d3e57289e7dd
PEInfo: PE Structure information<br> <br> ( base data )<br> entrypointaddress.: 0x26C8<br> timedatestamp.....: 0x46A95727 (Fri Jul 27 04:23:35 2007)<br> machinetype.......: 0x14C (Intel I386)<br> <br> ( 4 sections )<br> name viradd virsiz rawdsiz ntrpy md5<br> .text 0x1000 0x8A20 0x8C00 6.29 a5a9c3c6e77936ff1f8328a652784d4b<br>.data 0xA000 0x40 0x200 0.60 e8e030083a6aa6ced28939e09efb4142<br>.rsrc 0xB000 0x3B0 0x400 3.10 55150d77d0d260880d388afd30d91b94<br>.reloc 0xC000 0x534 0x600 4.61 8f3fc76e0db2af82a10d8247b80a2360<br> <br> ( 0 imports )<br> <br> <br> ( 0 exports )<br>
TrID : File type identification<br>Win64 Executable Generic (87.2%)<br>Win32 Executable Generic (8.6%)<br>Generic Win/DOS Executable (2.0%)<br>DOS Executable Generic (2.0%)<br>Autodesk FLIC Image File (extensions: flc, fli, cel) (0.0%)
ThreatExpert: <a href="https://www.symantec.com?md5=2d6b7efda9d4a44c7c5bdfe8d0bbc839" target="_blank">https://www.symantec.com?md5=2d6b7efda9d4a44c7c5bdfe8d0bbc839</a>
ssdeep: 768:D6/PfJ4Qvf13wCpsxXKq7BjeZhQgF3fgtSgSikrHqfmsLLAmDbL5:DeCQvf13dsxXOigF3fgtSgSikrHcFLLV
sigcheck: publisher....: Symantec Corporation<br>copyright....: Copyright (c) 2000-2007 Symantec Corporation. All rights reserved.<br>product......: MS Light<br>description..: Symantec MSLN<br>original name: msln.exe<br>internal name: MSLN<br>file version.: 5.2.0.3<br>comments.....: n/a<br>signers......: Symantec Corporation<br> VeriSign Class 3 Code Signing 2004 CA<br> Class 3 Public Primary Certification Authority<br>signing date.: 3:24 AM 7/27/2007<br>verified.....: -<br>
PEiD : -
RDS : NSRL Reference Data Set<br>-
Antivirus Version Dernière mise à jour Résultat
a-squared 4.5.0.50 2010.04.09 -
AhnLab-V3 5.0.0.2 2010.04.08 -
AntiVir 7.10.6.49 2010.04.08 -
Antiy-AVL 2.0.3.7 2010.04.08 -
Authentium 5.2.0.5 2010.04.09 -
Avast 4.8.1351.0 2010.04.08 -
Avast5 5.0.332.0 2010.04.08 -
AVG 9.0.0.787 2010.04.08 -
BitDefender 7.2 2010.04.09 -
CAT-QuickHeal 10.00 2010.04.09 -
ClamAV 0.96.0.3-git 2010.04.09 -
Comodo 4545 2010.04.09 -
DrWeb 5.0.2.03300 2010.04.09 -
eSafe 7.0.17.0 2010.04.08 -
eTrust-Vet 35.2.7416 2010.04.08 -
F-Prot 4.5.1.85 2010.04.08 -
F-Secure 9.0.15370.0 2010.04.09 -
Fortinet 4.0.14.0 2010.04.08 -
GData 19 2010.04.09 -
Ikarus T3.1.1.80.0 2010.04.09 -
Jiangmin 13.0.900 2010.04.09 -
Kaspersky 7.0.0.125 2010.04.09 -
McAfee-GW-Edition 6.8.5 2010.04.09 -
Microsoft 1.5605 2010.04.09 -
NOD32 5012 2010.04.09 -
Norman 6.04.11 2010.04.08 -
nProtect 2009.1.8.0 2010.04.06 -
Panda 10.0.2.2 2010.04.08 -
PCTools 7.0.3.5 2010.04.09 -
Prevx 3.0 2010.04.09 -
Rising 22.42.04.03 2010.04.09 -
Sophos 4.52.0 2010.04.09 -
Sunbelt 6154 2010.04.09 -
Symantec 20091.2.0.41 2010.04.09 -
TheHacker 6.5.2.0.258 2010.04.09 -
TrendMicro 9.120.0.1004 2010.04.09 -
VBA32 3.12.12.4 2010.04.05 -
ViRobot 2010.4.9.2268 2010.04.09 -
VirusBuster 5.0.27.0 2010.04.08 -
Information additionnelle
File size: 46640 bytes
MD5 : 2d6b7efda9d4a44c7c5bdfe8d0bbc839
SHA1 : bb8b5a4496d3c5e614b15fa612566c9ef788c156
SHA256: 0b1e1bb34eb6fc2c1e3f6176b20b72bde45a0e2bea9ea9342cf8d3e57289e7dd
PEInfo: PE Structure information<br> <br> ( base data )<br> entrypointaddress.: 0x26C8<br> timedatestamp.....: 0x46A95727 (Fri Jul 27 04:23:35 2007)<br> machinetype.......: 0x14C (Intel I386)<br> <br> ( 4 sections )<br> name viradd virsiz rawdsiz ntrpy md5<br> .text 0x1000 0x8A20 0x8C00 6.29 a5a9c3c6e77936ff1f8328a652784d4b<br>.data 0xA000 0x40 0x200 0.60 e8e030083a6aa6ced28939e09efb4142<br>.rsrc 0xB000 0x3B0 0x400 3.10 55150d77d0d260880d388afd30d91b94<br>.reloc 0xC000 0x534 0x600 4.61 8f3fc76e0db2af82a10d8247b80a2360<br> <br> ( 0 imports )<br> <br> <br> ( 0 exports )<br>
TrID : File type identification<br>Win64 Executable Generic (87.2%)<br>Win32 Executable Generic (8.6%)<br>Generic Win/DOS Executable (2.0%)<br>DOS Executable Generic (2.0%)<br>Autodesk FLIC Image File (extensions: flc, fli, cel) (0.0%)
ThreatExpert: <a href="https://www.symantec.com?md5=2d6b7efda9d4a44c7c5bdfe8d0bbc839" target="_blank">https://www.symantec.com?md5=2d6b7efda9d4a44c7c5bdfe8d0bbc839</a>
ssdeep: 768:D6/PfJ4Qvf13wCpsxXKq7BjeZhQgF3fgtSgSikrHqfmsLLAmDbL5:DeCQvf13dsxXOigF3fgtSgSikrHcFLLV
sigcheck: publisher....: Symantec Corporation<br>copyright....: Copyright (c) 2000-2007 Symantec Corporation. All rights reserved.<br>product......: MS Light<br>description..: Symantec MSLN<br>original name: msln.exe<br>internal name: MSLN<br>file version.: 5.2.0.3<br>comments.....: n/a<br>signers......: Symantec Corporation<br> VeriSign Class 3 Code Signing 2004 CA<br> Class 3 Public Primary Certification Authority<br>signing date.: 3:24 AM 7/27/2007<br>verified.....: -<br>
PEiD : -
RDS : NSRL Reference Data Set<br>-
Pour afonia.exe
Fichier Afonia.exe reçu le 2010.04.14 08:24:02 (UTC)
Antivirus Version Dernière mise à jour Résultat
a-squared 4.5.0.50 2010.04.14 Backdoor.Vreser!IK
AhnLab-V3 5.0.0.2 2010.04.13 -
AntiVir 7.10.6.71 2010.04.14 -
Antiy-AVL 2.0.3.7 2010.04.14 -
Authentium 5.2.0.5 2010.04.14 W32/Bredolab.N.gen!Eldorado
Avast 4.8.1351.0 2010.04.14 Win32:Crypt-GDV
Avast5 5.0.332.0 2010.04.14 Win32:Crypt-GDV
AVG 9.0.0.787 2010.04.14 Crypt.SCH
BitDefender 7.2 2010.04.14 Trojan.Generic.3610405
CAT-QuickHeal 10.00 2010.04.14 Trojan.Agent.gen
ClamAV 0.96.0.3-git 2010.04.14 -
Comodo 4595 2010.04.14 -
DrWeb 5.0.2.03300 2010.04.14 Trojan.Siggen1.19971
eSafe 7.0.17.0 2010.04.13 -
eTrust-Vet 35.2.7423 2010.04.13 -
F-Prot 4.5.1.85 2010.04.13 W32/Bredolab.N.gen!Eldorado
F-Secure 9.0.15370.0 2010.04.14 Trojan.Generic.3610405
Fortinet 4.0.14.0 2010.04.12 -
GData 19 2010.04.14 Trojan.Generic.3610405
Ikarus T3.1.1.80.0 2010.04.14 Backdoor.Vreser
Jiangmin 13.0.900 2010.04.13 -
Kaspersky 7.0.0.125 2010.04.14 -
McAfee 5.400.0.1158 2010.04.14 BackDoor-EOI
McAfee-GW-Edition 6.8.5 2010.04.13 -
Microsoft 1.5605 2010.04.14 TrojanDownloader:Win32/Renos.LG
NOD32 5026 2010.04.13 a variant of Win32/Kryptik.DNS
Norman 6.04.11 2010.04.14 W32/Suspicious.S
nProtect 2009.1.8.0 2010.04.06 -
Panda 10.0.2.7 2010.04.13 Generic Trojan
PCTools 7.0.3.5 2010.04.14 -
Prevx 3.0 2010.04.14 High Risk Spyware
Rising 22.43.02.04 2010.04.14 Trojan.Win32.Generic.51FDB5A8
Sophos 4.52.0 2010.04.14 Mal/FakeAV-CU
Sunbelt 6174 2010.04.14 -
Symantec 20091.2.0.41 2010.04.14 -
TheHacker 6.5.2.0.261 2010.04.14 Trojan/Kryptik.dns
TrendMicro 9.120.0.1004 2010.04.14 -
VBA32 3.12.12.4 2010.04.09 -
ViRobot 2010.4.14.2275 2010.04.14 -
VirusBuster 5.0.27.0 2010.04.13 Trojan.Bredolab.Gen!Pac.3
Information additionnelle
File size: 174592 bytes
MD5...: 867ad6aad0e6da39cda1159bbfff1753
SHA1..: 93cf05b689009e9004d6af67b0a8d0bdc3a41603
SHA256: e6c0e4e0de157683673bb59d99d7233b68988599154580370d006c9dfd29381b
ssdeep: 3072:k0Lgm/xSLGu9JpmWadX9hBQfrkfXQTVk2QA86sb3Fh2GniCpf:kL60mtdXo<br>QfXYV2j6c3FsGbp<br>
PEiD..: -
PEInfo: PE Structure information<br><br>( base data )<br>entrypointaddress.: 0x84d2<br>timedatestamp.....: 0x4bbb2187 (Tue Apr 06 11:56:55 2010)<br>machinetype.......: 0x14c (I386)<br><br>( 5 sections )<br>name viradd virsiz rawdsiz ntrpy md5<br>.text 0x1000 0x7d0f 0x7e00 6.39 590169947906655aeba408d5f130ccc1<br>.data 0x9000 0x3b300 0x20200 6.51 172cf346a42132d55cb8876e53af65cb<br>.bss 0x45000 0x1d52 0x1e00 4.80 5d0e91ff78f38c7607997882839d5446<br>.idata 0x47000 0x292 0x400 3.37 21b9a9e2459e37c1ecd08c91d7ec7b99<br>.rsrc 0x48000 0x254 0x400 2.16 ad7246f0ffbfc3edf3151a5a3e4026f4<br><br>( 1 imports ) <br>> kernel32.dll: CloseHandle, CreateEventA, CreateFileA, DisableThreadLibraryCalls, GetACP, GetCurrentProcess, GetCurrentThreadId, GetLastError, GetOEMCP, GetProcessHeap, HeapAlloc, HeapDestroy, InterlockedDecrement, InterlockedExchange, InterlockedIncrement, LocalAlloc, LocalFree, MultiByteToWideChar, QueryPerformanceCounter, SetLastError, UnhandledExceptionFilter, VirtualAlloc, lstrcmpiA<br><br>( 0 exports ) <br>
RDS...: NSRL Reference Data Set<br>-
trid..: Win32 Executable Generic (58.2%)<br>Win16/32 Executable Delphi generic (14.1%)<br>Generic Win/DOS Executable (13.6%)<br>DOS Executable Generic (13.6%)<br>VXD Driver (0.2%)
pdfid.: -
<a href='http://info.prevx.com/aboutprogramtext.asp?PX5=72894D5200E6F653AAA1026894E1CD00E4314F5F' target='_blank'>http://info.prevx.com/aboutprogramtext.asp?PX5=72894D5200E6F653AAA1026894E1CD00E4314F5F</a>
Symantec Reputation Network: Suspicious.Insight https://www.broadcom.com/support/security-center
sigcheck:<br>publisher....: n/a<br>copyright....: FFQax5EWc<br>product......: n/a<br>description..: 4o0XV<br>original name: mfyS4P6LxR33F.exe<br>internal name: n/a<br>file version.: 1.0.34.0<br>comments.....: n/a<br>signers......: -<br>signing date.: -<br>verified.....: Unsigned<br>
Antivirus Version Dernière mise à jour Résultat
a-squared 4.5.0.50 2010.04.14 Backdoor.Vreser!IK
AhnLab-V3 5.0.0.2 2010.04.13 -
AntiVir 7.10.6.71 2010.04.14 -
Antiy-AVL 2.0.3.7 2010.04.14 -
Authentium 5.2.0.5 2010.04.14 W32/Bredolab.N.gen!Eldorado
Avast 4.8.1351.0 2010.04.14 Win32:Crypt-GDV
Avast5 5.0.332.0 2010.04.14 Win32:Crypt-GDV
AVG 9.0.0.787 2010.04.14 Crypt.SCH
BitDefender 7.2 2010.04.14 Trojan.Generic.3610405
CAT-QuickHeal 10.00 2010.04.14 Trojan.Agent.gen
ClamAV 0.96.0.3-git 2010.04.14 -
Comodo 4595 2010.04.14 -
DrWeb 5.0.2.03300 2010.04.14 Trojan.Siggen1.19971
eSafe 7.0.17.0 2010.04.13 -
eTrust-Vet 35.2.7423 2010.04.13 -
F-Prot 4.5.1.85 2010.04.13 W32/Bredolab.N.gen!Eldorado
F-Secure 9.0.15370.0 2010.04.14 Trojan.Generic.3610405
Fortinet 4.0.14.0 2010.04.12 -
GData 19 2010.04.14 Trojan.Generic.3610405
Ikarus T3.1.1.80.0 2010.04.14 Backdoor.Vreser
Jiangmin 13.0.900 2010.04.13 -
Kaspersky 7.0.0.125 2010.04.14 -
McAfee 5.400.0.1158 2010.04.14 BackDoor-EOI
McAfee-GW-Edition 6.8.5 2010.04.13 -
Microsoft 1.5605 2010.04.14 TrojanDownloader:Win32/Renos.LG
NOD32 5026 2010.04.13 a variant of Win32/Kryptik.DNS
Norman 6.04.11 2010.04.14 W32/Suspicious.S
nProtect 2009.1.8.0 2010.04.06 -
Panda 10.0.2.7 2010.04.13 Generic Trojan
PCTools 7.0.3.5 2010.04.14 -
Prevx 3.0 2010.04.14 High Risk Spyware
Rising 22.43.02.04 2010.04.14 Trojan.Win32.Generic.51FDB5A8
Sophos 4.52.0 2010.04.14 Mal/FakeAV-CU
Sunbelt 6174 2010.04.14 -
Symantec 20091.2.0.41 2010.04.14 -
TheHacker 6.5.2.0.261 2010.04.14 Trojan/Kryptik.dns
TrendMicro 9.120.0.1004 2010.04.14 -
VBA32 3.12.12.4 2010.04.09 -
ViRobot 2010.4.14.2275 2010.04.14 -
VirusBuster 5.0.27.0 2010.04.13 Trojan.Bredolab.Gen!Pac.3
Information additionnelle
File size: 174592 bytes
MD5...: 867ad6aad0e6da39cda1159bbfff1753
SHA1..: 93cf05b689009e9004d6af67b0a8d0bdc3a41603
SHA256: e6c0e4e0de157683673bb59d99d7233b68988599154580370d006c9dfd29381b
ssdeep: 3072:k0Lgm/xSLGu9JpmWadX9hBQfrkfXQTVk2QA86sb3Fh2GniCpf:kL60mtdXo<br>QfXYV2j6c3FsGbp<br>
PEiD..: -
PEInfo: PE Structure information<br><br>( base data )<br>entrypointaddress.: 0x84d2<br>timedatestamp.....: 0x4bbb2187 (Tue Apr 06 11:56:55 2010)<br>machinetype.......: 0x14c (I386)<br><br>( 5 sections )<br>name viradd virsiz rawdsiz ntrpy md5<br>.text 0x1000 0x7d0f 0x7e00 6.39 590169947906655aeba408d5f130ccc1<br>.data 0x9000 0x3b300 0x20200 6.51 172cf346a42132d55cb8876e53af65cb<br>.bss 0x45000 0x1d52 0x1e00 4.80 5d0e91ff78f38c7607997882839d5446<br>.idata 0x47000 0x292 0x400 3.37 21b9a9e2459e37c1ecd08c91d7ec7b99<br>.rsrc 0x48000 0x254 0x400 2.16 ad7246f0ffbfc3edf3151a5a3e4026f4<br><br>( 1 imports ) <br>> kernel32.dll: CloseHandle, CreateEventA, CreateFileA, DisableThreadLibraryCalls, GetACP, GetCurrentProcess, GetCurrentThreadId, GetLastError, GetOEMCP, GetProcessHeap, HeapAlloc, HeapDestroy, InterlockedDecrement, InterlockedExchange, InterlockedIncrement, LocalAlloc, LocalFree, MultiByteToWideChar, QueryPerformanceCounter, SetLastError, UnhandledExceptionFilter, VirtualAlloc, lstrcmpiA<br><br>( 0 exports ) <br>
RDS...: NSRL Reference Data Set<br>-
trid..: Win32 Executable Generic (58.2%)<br>Win16/32 Executable Delphi generic (14.1%)<br>Generic Win/DOS Executable (13.6%)<br>DOS Executable Generic (13.6%)<br>VXD Driver (0.2%)
pdfid.: -
<a href='http://info.prevx.com/aboutprogramtext.asp?PX5=72894D5200E6F653AAA1026894E1CD00E4314F5F' target='_blank'>http://info.prevx.com/aboutprogramtext.asp?PX5=72894D5200E6F653AAA1026894E1CD00E4314F5F</a>
Symantec Reputation Network: Suspicious.Insight https://www.broadcom.com/support/security-center
sigcheck:<br>publisher....: n/a<br>copyright....: FFQax5EWc<br>product......: n/a<br>description..: 4o0XV<br>original name: mfyS4P6LxR33F.exe<br>internal name: n/a<br>file version.: 1.0.34.0<br>comments.....: n/a<br>signers......: -<br>signing date.: -<br>verified.....: Unsigned<br>
Utilisateur anonyme
Modifié par gen-hackman le 14/04/2010 à 11:26
Modifié par gen-hackman le 14/04/2010 à 11:26
__________________________________________________________
=>/!\Le script qui suit a été écrit spécialement cet ordinateur/!\ <=
=>il est fort déconseillé de le transposer sur un autre ordinateur !<=====|
---------------------------------------------------------------
Toujours avec toutes les protections désactivées, fais ceci :
? Ouvre le bloc-notes (Menu démarrer --> programmes --> accessoires --> bloc-notes)
? Copie/colle dans le bloc-notes ce qui entre les lignes ci dessous (sans les lignes) :
----------------------------------------------------------
KillAll::
Collect::[4]
c:\windows\Afonia.exe
c:\documents and settings\NetworkService\Application Data\ypgmjw.dat
c:\windows\system32\99.tmp
c:\windows\system32\96.tmp
c:\program files\dell\quickset\quickset .exe .exe .exe .exe .exe .exe .exe .exe .exe
Extra::[4]
c:\windows\system32\drivers\1742699994.sys
Driver::
1742699994
Registry::
[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"dbf70700 .exe"=-
"dbf70700 .exe"=-
"dbf70700 .exe"=-
"dbf70700 .exe"=-
"dbf70700 .exe"=-
"dbf70700 .exe"=-
"dbf70700 .exe"=-
"dbf70700 .exe"=-
"dbf70700 .exe"=-
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"Adobe Reader Speed Launcher"=-
"QuickTime Task"=-
"Dell QuickSet"=-
[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\SymantecAntiVirus]
"DisableMonitoring"=dword:00000000
------------------------------------------------------------------
? Enregistre ce fichier sur ton Bureau (et pas ailleurs !) sous le nom CFScript.txt
? Quitte le Bloc Notes
? Fais un glisser/déposer de ce fichier CFScript sur le fichier combofix
? Patiente le temps du scan. Le Bureau va disparaître à plusieurs reprises : c'est normal ! Ne touche à rien tant que le scan n'est pas terminé.
? Une fois le scan achevé, un rapport va s'afficher: poste son contenu.
? Si le fichier ne s'ouvre pas, il se trouve ici => C:\ComboFix.txt
?G3?-?@¢??@?(TM)©®?
alèdoscour
Messages postés
25
Date d'inscription
lundi 12 avril 2010
Statut
Membre
Dernière intervention
14 avril 2010
14 avril 2010 à 11:17
14 avril 2010 à 11:17
Est-ce sur le fichier combofix que j'ai renommé, car je n'ai que celui-là qui apparait sur mon bureau.
voila le rapport.
A l'allumage la fenetre virus definition daemon apparait toujours
ComboFix 10-04-13.02 - Amo 04/14/2010 11:31:33.3.1 - x86
Microsoft Windows XP Professional 5.1.2600.3.1252.1.1033.18.1015.319 [GMT 2:00]
Running from: c:\documents and settings\Amo\Desktop\AAAAAAAA.exe
Command switches used :: c:\documents and settings\Amo\Desktop\CFScript.txt
AV: Symantec AntiVirus Corporate Edition *On-access scanning enabled* (Updated) {FB06448E-52B8-493A-90F3-E43226D3305C}
file zipped: c:\documents and settings\NetworkService\Application Data\ypgmjw.dat
file zipped: c:\windows\Afonia.exe
file zipped: c:\windows\system32\96.tmp
file zipped: c:\windows\system32\99.tmp
.
((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.
c:\documents and settings\NetworkService\Application Data\ypgmjw.dat
c:\windows\Afonia.exe
c:\windows\system32\96.tmp
c:\windows\system32\99.tmp
.
((((((((((((((((((((((((((((((((((((((( Drivers/Services )))))))))))))))))))))))))))))))))))))))))))))))))
.
-------\Service_1742699994
((((((((((((((((((((((((( Files Created from 2010-03-14 to 2010-04-14 )))))))))))))))))))))))))))))))
.
2010-04-13 18:23 . 2010-04-13 18:23 92834 ----a-w- c:\documents and settings\All Users\Application Data\Symantec\Symantec AntiVirus Corporate Edition\7.5\APTemp\AP0.dll
2010-04-13 16:24 . 2010-04-13 16:24 -------- d-----w- C:\Kill'em
2010-04-12 21:22 . 2010-04-12 21:22 7816540 ----a-w- C:\UsbFix_Upload_Me_D3VPCV91.zip
2010-04-12 18:48 . 2010-04-13 16:18 46640 ----a-w- c:\windows\system32\msln.exe
2010-04-12 12:30 . 2010-04-12 21:22 -------- d-----w- C:\UsbFix
2010-04-12 07:54 . 2010-04-13 16:24 -------- d-----w- c:\program files\List_Kill'em
2010-04-07 05:04 . 2010-04-07 05:04 -------- d-sh--w- c:\documents and settings\LocalService\PrivacIE
2010-04-07 05:04 . 2010-04-07 05:04 -------- d-sh--w- c:\documents and settings\LocalService\IECompatCache
2010-04-06 19:05 . 2008-04-13 18:40 34688 ----a-w- c:\windows\system32\drivers\lbrtfdc.sys
2010-04-06 19:05 . 2008-04-13 18:40 34688 ----a-w- c:\windows\system32\dllcache\lbrtfdc.sys
2010-04-06 19:04 . 2008-04-13 18:40 8192 ----a-w- c:\windows\system32\drivers\Changer.sys
2010-04-06 19:04 . 2008-04-13 18:40 8192 ----a-w- c:\windows\system32\dllcache\changer.sys
.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2010-04-12 22:45 . 2007-02-02 19:14 -------- d-----w- c:\program files\Symantec AntiVirus
2010-04-12 21:09 . 2006-12-14 07:31 -------- d-----w- c:\program files\Windows Defender
2010-04-12 21:09 . 2007-06-06 11:42 -------- d-----w- c:\program files\QuickTime
2010-04-12 21:08 . 2006-04-28 02:11 -------- d-----w- c:\program files\Common Files\Symantec Shared
2010-04-12 21:08 . 2006-04-21 22:53 -------- d-----w- c:\program files\Apoint
2010-04-12 14:41 . 2004-08-11 22:00 8832 ----a-w- c:\windows\system32\drivers\rasacd.sys
2010-04-08 14:16 . 2007-02-02 19:47 -------- d-----w- c:\documents and settings\All Users\Application Data\Spybot - Search & Destroy
2010-04-03 22:31 . 2006-04-27 14:22 -------- d-----w- c:\program files\Google
2010-03-07 18:40 . 2010-03-07 18:40 0 ----a-w- c:\windows\nsreg.dat
2010-02-25 06:24 . 2004-08-11 22:00 916480 ------w- c:\windows\system32\wininet.dll
2010-02-24 09:16 . 2009-10-04 17:00 181632 ------w- c:\windows\system32\MpSigStub.exe
2010-02-19 23:47 . 2010-02-19 23:47 3604480 ----a-w- c:\windows\system32\GPhotos.scr
2010-02-12 10:03 . 2010-03-01 07:03 293376 ------w- c:\windows\system32\browserchoice.exe
2010-01-26 13:24 . 2010-01-26 13:24 126 ----a-w- c:\documents and settings\Amo\Local Settings\Application Data\fusioncache.dat
2010-01-17 21:36 . 2010-01-17 21:32 77152 ----a-w- c:\documents and settings\Amo\Local Settings\Application Data\GDIPFONTCACHEV1.DAT
.
[code]<pre>
c:\program files\Adobe\Reader 8.0\Reader\reader_sl .exe
c:\program files\Apoint\apoint .exe
c:\program files\Common Files\Symantec Shared\ccapp .exe
c:\program files\Dell\QuickSet\quickset .exe
c:\program files\Intel\Wireless\Bin\ifrmewrk .exe
c:\program files\Intel\Wireless\Bin\zcfgsvc .exe
c:\program files\QuickTime\qttask .exe
c:\program files\Symantec AntiVirus\vptray .exe
c:\program files\Windows Defender\msascui .exe
c:\program files\Windows Media Player\wmpnscfg .exe
c:\windows\system32\dla\tfswctrl .exe
</pre>/code
((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4
[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"WMPNSCFG"="c:\program files\Windows Media Player\WMPNSCFG.exe" [N/A]
"dbf70700 .exe"="c:\documents and settings\amo\application data\3714d4468fe48242322ef6cbe954a0e3\dbf70700 .exe" [N/A]
"dbf70700 .exe"="c:\documents and settings\amo\application data\3714d4468fe48242322ef6cbe954a0e3\dbf70700 .exe" [N/A]
"dbf70700 .exe"="c:\documents and settings\amo\application data\3714d4468fe48242322ef6cbe954a0e3\dbf70700 .exe" [N/A]
"dbf70700 .exe"="c:\documents and settings\amo\application data\3714d4468fe48242322ef6cbe954a0e3\dbf70700 .exe" [N/A]
"dbf70700 .exe"="c:\documents and settings\amo\application data\3714d4468fe48242322ef6cbe954a0e3\dbf70700 .exe" [N/A]
"dbf70700 .exe"="c:\documents and settings\amo\application data\3714d4468fe48242322ef6cbe954a0e3\dbf70700 .exe" [N/A]
"dbf70700 .exe"="c:\documents and settings\amo\application data\3714d4468fe48242322ef6cbe954a0e3\dbf70700 .exe" [N/A]
"dbf70700 .exe"="c:\documents and settings\amo\application data\3714d4468fe48242322ef6cbe954a0e3\dbf70700 .exe" [N/A]
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"Apoint"="c:\program files\Apoint\Apoint.exe" [N/A]
"dla"="c:\windows\system32\dla\tfswctrl.exe" [N/A]
"Windows Defender"="c:\program files\Windows Defender\MSASCui.exe" [N/A]
"ccApp"="c:\program files\Common Files\Symantec Shared\ccApp.exe" [N/A]
"igfxtray"="c:\windows\system32\igfxtray.exe" [N/A]
"igfxhkcmd"="c:\windows\system32\hkcmd.exe" [N/A]
"igfxpers"="c:\windows\system32\igfxpers.exe" [N/A]
"IntelZeroConfig"="c:\program files\Intel\Wireless\bin\ZCfgSvc.exe" [N/A]
"IntelWireless"="c:\program files\Intel\Wireless\Bin\ifrmewrk.exe" [N/A]
"vptray"="c:\progra~1\SYMANT~1\\vptray.exe" [N/A]
[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run]
"DWQueuedReporting"="c:\progra~1\COMMON~1\MICROS~1\DW\dwtrig20.exe" [2007-02-26 437160]
[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\RunOnce]
"RunNarrator"="Narrator.exe" [2008-04-14 53760]
c:\documents and settings\All Users\Start Menu\Programs\Startup\
Digital Line Detect.lnk - c:\program files\Digital Line Detect\DLG.exe [2006-4-22 24576]
[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\explorer]
"HonorAutoRunSetting"= 0 (0x0)
[HKEY_CURRENT_USER\software\microsoft\windows\currentversion\policies\explorer]
"HonorAutoRunSetting"= 0 (0x0)
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\WinDefend]
@="Service"
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile]
"EnableFirewall"= 0 (0x0)
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%windir%\\system32\\sessmgr.exe"=
"c:\\Program Files\\Common Files\\Ahead\\Nero Web\\SetupX.exe"=
"c:\\Program Files\\Common Files\\Ahead\\Nero Web\\SetupXu.exe"=
"c:\\Program Files\\Nero\\Nero 7\\Nero ShowTime\\ShowTime.exe"=
"c:\\WINDOWS\\pchealth\\helpctr\\binaries\\helpctr.exe"=
"c:\\Program Files\\Skype\\Plugin Manager\\skypePM.exe"=
"c:\\Program Files\\Skype\\Phone\\Skype.exe"=
"c:\\WINDOWS\\Network Diagnostic\\xpnetdiag.exe"=
"c:\\Program Files\\Windows Live\\Sync\\WindowsLiveSync.exe"=
"c:\\Program Files\\Messenger\\msmsgs.exe"=
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\GloballyOpenPorts\List]
"3389:TCP"= 3389:TCP:@xpsp2res.dll,-22009
R2 WinDefend;Windows Defender;c:\program files\Windows Defender\MsMpEng.exe [11/3/2006 7:19 PM 13592]
R3 EraserUtilRebootDrv;EraserUtilRebootDrv;c:\program files\Common Files\Symantec Shared\eengine\EraserUtilRebootDrv.sys [8/27/2009 7:01 PM 102448]
R3 GTIPCI21;GTIPCI21;c:\windows\system32\drivers\gtipci21.sys [4/22/2006 12:53 AM 87936]
S2 gupdate;Google Update Service (gupdate);c:\program files\Google\Update\GoogleUpdate.exe [2/4/2010 12:01 PM 135664]
S3 SavRoam;SAVRoam;c:\program files\Symantec AntiVirus\SavRoam.exe [12/20/2006 8:29 PM 116928]
.
Contents of the 'Scheduled Tasks' folder
2010-04-14 c:\windows\Tasks\GoogleUpdateTaskMachineCore.job
- c:\program files\Google\Update\GoogleUpdate.exe [2010-02-04 10:00]
2010-04-14 c:\windows\Tasks\GoogleUpdateTaskMachineUA.job
- c:\program files\Google\Update\GoogleUpdate.exe [2010-02-04 10:00]
2010-04-14 c:\windows\Tasks\MP Scheduled Scan.job
- c:\program files\Windows Defender\MpCmdRun.exe [2006-11-03 17:20]
2010-04-14 c:\windows\Tasks\OGALogon.job
- c:\windows\system32\OGAEXEC.exe [2009-08-03 13:07]
.
.
------- Supplementary Scan -------
.
IE: Add to Google Photos Screensa&ver - c:\windows\system32\GPhotos.scr/200
IE: E&xport to Microsoft Excel - c:\progra~1\MICROS~2\OFFICE11\EXCEL.EXE/3000
IE: Google Sidewiki... - c:\program files\Google\Google Toolbar\Component\GoogleToolbarDynamic_mui_en_96D6FF0C6D236BF8.dll/cmsidewiki.html
DPF: {01010200-5E80-11D8-9E86-0007E96C65AE} - hxxp://supportcenter.rr.com/sdccommon/download/tgctlins.cab
FF - ProfilePath - c:\documents and settings\Amo\Application Data\Mozilla\Firefox\Profiles\11q42en7.default\
FF - plugin: c:\program files\Google\Google Earth\plugin\npgeplugin.dll
FF - plugin: c:\program files\Google\Picasa3\npPicasa3.dll
FF - plugin: c:\program files\Google\Update\1.2.183.23\npGoogleOneClick8.dll
FF - plugin: c:\program files\Microsoft\Office Live\npOLW.dll
FF - plugin: c:\program files\Windows Live\Photo Gallery\NPWLPG.dll
FF - HiddenExtension: Microsoft .NET Framework Assistant: {20a82645-c095-46ed-80e3-08825760534b} - c:\windows\Microsoft.NET\Framework\v3.5\Windows Presentation Foundation\DotNetAssistantExtension\
---- FIREFOX POLICIES ----
c:\program files\Mozilla Firefox\greprefs\all.js - pref("ui.use_native_colors", true);
c:\program files\Mozilla Firefox\greprefs\all.js - pref("ui.use_native_popup_windows", false);
c:\program files\Mozilla Firefox\greprefs\all.js - pref("browser.enable_click_image_resizing", true);
c:\program files\Mozilla Firefox\greprefs\all.js - pref("accessibility.browsewithcaret_shortcut.enabled", true);
c:\program files\Mozilla Firefox\greprefs\all.js - pref("javascript.options.mem.high_water_mark", 32);
c:\program files\Mozilla Firefox\greprefs\all.js - pref("javascript.options.mem.gc_frequency", 1600);
c:\program files\Mozilla Firefox\greprefs\all.js - pref("network.auth.force-generic-ntlm", false);
c:\program files\Mozilla Firefox\greprefs\all.js - pref("svg.smil.enabled", false);
c:\program files\Mozilla Firefox\greprefs\all.js - pref("ui.trackpoint_hack.enabled", -1);
c:\program files\Mozilla Firefox\greprefs\all.js - pref("browser.formfill.debug", false);
c:\program files\Mozilla Firefox\greprefs\all.js - pref("browser.formfill.agedWeight", 2);
c:\program files\Mozilla Firefox\greprefs\all.js - pref("browser.formfill.bucketSize", 1);
c:\program files\Mozilla Firefox\greprefs\all.js - pref("browser.formfill.maxTimeGroupings", 25);
c:\program files\Mozilla Firefox\greprefs\all.js - pref("browser.formfill.timeGroupingSize", 604800);
c:\program files\Mozilla Firefox\greprefs\all.js - pref("browser.formfill.boundaryWeight", 25);
c:\program files\Mozilla Firefox\greprefs\all.js - pref("browser.formfill.prefixWeight", 5);
c:\program files\Mozilla Firefox\greprefs\all.js - pref("html5.enable", false);
c:\program files\Mozilla Firefox\defaults\pref\firefox-branding.js - pref("app.update.download.backgroundInterval", 600);
c:\program files\Mozilla Firefox\defaults\pref\firefox-branding.js - pref("app.update.url.manual", "https://www.mozilla.org/en-US/firefox/new/?redirect_source=firefox-com");
c:\program files\Mozilla Firefox\defaults\pref\firefox-branding.js - pref("browser.search.param.yahoo-fr-ja", "mozff");
c:\program files\Mozilla Firefox\defaults\pref\firefox.js - pref("extensions.{972ce4c6-7e08-4474-a285-3208198ce6fd}.name", "chrome://browser/locale/browser.properties");
c:\program files\Mozilla Firefox\defaults\pref\firefox.js - pref("extensions.{972ce4c6-7e08-4474-a285-3208198ce6fd}.description", "chrome://browser/locale/browser.properties");
c:\program files\Mozilla Firefox\defaults\pref\firefox.js - pref("xpinstall.whitelist.add", "addons.mozilla.org");
c:\program files\Mozilla Firefox\defaults\pref\firefox.js - pref("xpinstall.whitelist.add.36", "getpersonas.com");
c:\program files\Mozilla Firefox\defaults\pref\firefox.js - pref("lightweightThemes.update.enabled", true);
c:\program files\Mozilla Firefox\defaults\pref\firefox.js - pref("browser.allTabs.previews", false);
c:\program files\Mozilla Firefox\defaults\pref\firefox.js - pref("plugins.hide_infobar_for_outdated_plugin", false);
c:\program files\Mozilla Firefox\defaults\pref\firefox.js - pref("plugins.update.notifyUser", false);
c:\program files\Mozilla Firefox\defaults\pref\firefox.js - pref("toolbar.customization.usesheet", false);
c:\program files\Mozilla Firefox\defaults\pref\firefox.js - pref("browser.taskbar.previews.enable", false);
c:\program files\Mozilla Firefox\defaults\pref\firefox.js - pref("browser.taskbar.previews.max", 20);
c:\program files\Mozilla Firefox\defaults\pref\firefox.js - pref("browser.taskbar.previews.cachetime", 20);
.
**************************************************************************
catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2010-04-14 11:43
Windows 5.1.2600 Service Pack 3 NTFS
scanning hidden processes ...
scanning hidden autostart entries ...
scanning hidden files ...
scan completed successfully
hidden files: 0
**************************************************************************
Stealth MBR rootkit/Mebroot/Sinowal detector 0.3.7 by Gmer, http://www.gmer.net
device: opened successfully
user: MBR read successfully
called modules: ntkrnlpa.exe CLASSPNP.SYS disk.sys >>UNKNOWN [0x865E2AC8]<<
kernel: MBR read successfully
detected MBR rootkit hooks:
\Driver\Disk -> CLASSPNP.SYS @ 0xf75c6f28
\Driver\ACPI -> ACPI.sys @ 0xf7459cb8
\Driver\atapi -> atapi.sys @ 0xf73cd852
IoDeviceObjectType -> DeleteProcedure -> ntkrnlpa.exe @ 0x80579022
ParseProcedure -> ntkrnlpa.exe @ 0x80577c84
\Device\Harddisk0\DR0 -> DeleteProcedure -> ntkrnlpa.exe @ 0x80579022
ParseProcedure -> ntkrnlpa.exe @ 0x80577c84
NDIS: Intel(R) PRO/Wireless 2200BG Network Connection -> SendCompleteHandler -> NDIS.sys @ 0xf72b1bb0
PacketIndicateHandler -> NDIS.sys @ 0xf72a0a0d
SendHandler -> NDIS.sys @ 0xf72b4b40
user & kernel MBR OK
**************************************************************************
.
--------------------- DLLs Loaded Under Running Processes ---------------------
- - - - - - - > 'winlogon.exe'(904)
c:\windows\system32\WININET.dll
- - - - - - - > 'lsass.exe'(964)
c:\windows\system32\WININET.dll
- - - - - - - > 'explorer.exe'(2168)
c:\windows\system32\WININET.dll
c:\windows\system32\ieframe.dll
c:\windows\system32\webcheck.dll
c:\windows\system32\WPDShServiceObj.dll
c:\windows\system32\PortableDeviceTypes.dll
c:\windows\system32\PortableDeviceApi.dll
.
------------------------ Other Running Processes ------------------------
.
c:\program files\Intel\Wireless\Bin\EvtEng.exe
c:\program files\Intel\Wireless\Bin\S24EvMon.exe
c:\program files\Intel\Wireless\Bin\WLKeeper.exe
c:\program files\Common Files\Symantec Shared\ccEvtMgr.exe
c:\program files\Common Files\Symantec Shared\ccSetMgr.exe
c:\program files\Common Files\Symantec Shared\SPBBC\SPBBCSvc.exe
c:\windows\System32\SCardSvr.exe
c:\program files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
c:\windows\system32\basfipm.exe
c:\windows\system32\crypserv.exe
c:\program files\Java\jre6\bin\jqs.exe
c:\program files\Common Files\Microsoft Shared\VS7DEBUG\MDM.EXE
c:\program files\Dell\QuickSet\NICCONFIGSVC.exe
c:\program files\Intel\Wireless\Bin\RegSrvc.exe
c:\program files\Microsoft\Search Enhancement Pack\SeaPort\SeaPort.exe
c:\program files\Canon\CAL\CALMAIN.exe
c:\windows\system32\wscntfy.exe
.
**************************************************************************
.
Completion time: 2010-04-14 11:50:34 - machine was rebooted
ComboFix-quarantined-files.txt 2010-04-14 09:50
ComboFix2.txt 2010-04-14 07:16
ComboFix3.txt 2010-04-12 12:01
Pre-Run: 67,817,693,184 bytes free
Post-Run: 67,782,787,072 bytes free
- - End Of File - - 50AEE53F702BE60E3275FFA822FB43F9
A l'allumage la fenetre virus definition daemon apparait toujours
ComboFix 10-04-13.02 - Amo 04/14/2010 11:31:33.3.1 - x86
Microsoft Windows XP Professional 5.1.2600.3.1252.1.1033.18.1015.319 [GMT 2:00]
Running from: c:\documents and settings\Amo\Desktop\AAAAAAAA.exe
Command switches used :: c:\documents and settings\Amo\Desktop\CFScript.txt
AV: Symantec AntiVirus Corporate Edition *On-access scanning enabled* (Updated) {FB06448E-52B8-493A-90F3-E43226D3305C}
file zipped: c:\documents and settings\NetworkService\Application Data\ypgmjw.dat
file zipped: c:\windows\Afonia.exe
file zipped: c:\windows\system32\96.tmp
file zipped: c:\windows\system32\99.tmp
.
((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.
c:\documents and settings\NetworkService\Application Data\ypgmjw.dat
c:\windows\Afonia.exe
c:\windows\system32\96.tmp
c:\windows\system32\99.tmp
.
((((((((((((((((((((((((((((((((((((((( Drivers/Services )))))))))))))))))))))))))))))))))))))))))))))))))
.
-------\Service_1742699994
((((((((((((((((((((((((( Files Created from 2010-03-14 to 2010-04-14 )))))))))))))))))))))))))))))))
.
2010-04-13 18:23 . 2010-04-13 18:23 92834 ----a-w- c:\documents and settings\All Users\Application Data\Symantec\Symantec AntiVirus Corporate Edition\7.5\APTemp\AP0.dll
2010-04-13 16:24 . 2010-04-13 16:24 -------- d-----w- C:\Kill'em
2010-04-12 21:22 . 2010-04-12 21:22 7816540 ----a-w- C:\UsbFix_Upload_Me_D3VPCV91.zip
2010-04-12 18:48 . 2010-04-13 16:18 46640 ----a-w- c:\windows\system32\msln.exe
2010-04-12 12:30 . 2010-04-12 21:22 -------- d-----w- C:\UsbFix
2010-04-12 07:54 . 2010-04-13 16:24 -------- d-----w- c:\program files\List_Kill'em
2010-04-07 05:04 . 2010-04-07 05:04 -------- d-sh--w- c:\documents and settings\LocalService\PrivacIE
2010-04-07 05:04 . 2010-04-07 05:04 -------- d-sh--w- c:\documents and settings\LocalService\IECompatCache
2010-04-06 19:05 . 2008-04-13 18:40 34688 ----a-w- c:\windows\system32\drivers\lbrtfdc.sys
2010-04-06 19:05 . 2008-04-13 18:40 34688 ----a-w- c:\windows\system32\dllcache\lbrtfdc.sys
2010-04-06 19:04 . 2008-04-13 18:40 8192 ----a-w- c:\windows\system32\drivers\Changer.sys
2010-04-06 19:04 . 2008-04-13 18:40 8192 ----a-w- c:\windows\system32\dllcache\changer.sys
.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2010-04-12 22:45 . 2007-02-02 19:14 -------- d-----w- c:\program files\Symantec AntiVirus
2010-04-12 21:09 . 2006-12-14 07:31 -------- d-----w- c:\program files\Windows Defender
2010-04-12 21:09 . 2007-06-06 11:42 -------- d-----w- c:\program files\QuickTime
2010-04-12 21:08 . 2006-04-28 02:11 -------- d-----w- c:\program files\Common Files\Symantec Shared
2010-04-12 21:08 . 2006-04-21 22:53 -------- d-----w- c:\program files\Apoint
2010-04-12 14:41 . 2004-08-11 22:00 8832 ----a-w- c:\windows\system32\drivers\rasacd.sys
2010-04-08 14:16 . 2007-02-02 19:47 -------- d-----w- c:\documents and settings\All Users\Application Data\Spybot - Search & Destroy
2010-04-03 22:31 . 2006-04-27 14:22 -------- d-----w- c:\program files\Google
2010-03-07 18:40 . 2010-03-07 18:40 0 ----a-w- c:\windows\nsreg.dat
2010-02-25 06:24 . 2004-08-11 22:00 916480 ------w- c:\windows\system32\wininet.dll
2010-02-24 09:16 . 2009-10-04 17:00 181632 ------w- c:\windows\system32\MpSigStub.exe
2010-02-19 23:47 . 2010-02-19 23:47 3604480 ----a-w- c:\windows\system32\GPhotos.scr
2010-02-12 10:03 . 2010-03-01 07:03 293376 ------w- c:\windows\system32\browserchoice.exe
2010-01-26 13:24 . 2010-01-26 13:24 126 ----a-w- c:\documents and settings\Amo\Local Settings\Application Data\fusioncache.dat
2010-01-17 21:36 . 2010-01-17 21:32 77152 ----a-w- c:\documents and settings\Amo\Local Settings\Application Data\GDIPFONTCACHEV1.DAT
.
[code]<pre>
c:\program files\Adobe\Reader 8.0\Reader\reader_sl .exe
c:\program files\Apoint\apoint .exe
c:\program files\Common Files\Symantec Shared\ccapp .exe
c:\program files\Dell\QuickSet\quickset .exe
c:\program files\Intel\Wireless\Bin\ifrmewrk .exe
c:\program files\Intel\Wireless\Bin\zcfgsvc .exe
c:\program files\QuickTime\qttask .exe
c:\program files\Symantec AntiVirus\vptray .exe
c:\program files\Windows Defender\msascui .exe
c:\program files\Windows Media Player\wmpnscfg .exe
c:\windows\system32\dla\tfswctrl .exe
</pre>/code
((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4
[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"WMPNSCFG"="c:\program files\Windows Media Player\WMPNSCFG.exe" [N/A]
"dbf70700 .exe"="c:\documents and settings\amo\application data\3714d4468fe48242322ef6cbe954a0e3\dbf70700 .exe" [N/A]
"dbf70700 .exe"="c:\documents and settings\amo\application data\3714d4468fe48242322ef6cbe954a0e3\dbf70700 .exe" [N/A]
"dbf70700 .exe"="c:\documents and settings\amo\application data\3714d4468fe48242322ef6cbe954a0e3\dbf70700 .exe" [N/A]
"dbf70700 .exe"="c:\documents and settings\amo\application data\3714d4468fe48242322ef6cbe954a0e3\dbf70700 .exe" [N/A]
"dbf70700 .exe"="c:\documents and settings\amo\application data\3714d4468fe48242322ef6cbe954a0e3\dbf70700 .exe" [N/A]
"dbf70700 .exe"="c:\documents and settings\amo\application data\3714d4468fe48242322ef6cbe954a0e3\dbf70700 .exe" [N/A]
"dbf70700 .exe"="c:\documents and settings\amo\application data\3714d4468fe48242322ef6cbe954a0e3\dbf70700 .exe" [N/A]
"dbf70700 .exe"="c:\documents and settings\amo\application data\3714d4468fe48242322ef6cbe954a0e3\dbf70700 .exe" [N/A]
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"Apoint"="c:\program files\Apoint\Apoint.exe" [N/A]
"dla"="c:\windows\system32\dla\tfswctrl.exe" [N/A]
"Windows Defender"="c:\program files\Windows Defender\MSASCui.exe" [N/A]
"ccApp"="c:\program files\Common Files\Symantec Shared\ccApp.exe" [N/A]
"igfxtray"="c:\windows\system32\igfxtray.exe" [N/A]
"igfxhkcmd"="c:\windows\system32\hkcmd.exe" [N/A]
"igfxpers"="c:\windows\system32\igfxpers.exe" [N/A]
"IntelZeroConfig"="c:\program files\Intel\Wireless\bin\ZCfgSvc.exe" [N/A]
"IntelWireless"="c:\program files\Intel\Wireless\Bin\ifrmewrk.exe" [N/A]
"vptray"="c:\progra~1\SYMANT~1\\vptray.exe" [N/A]
[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run]
"DWQueuedReporting"="c:\progra~1\COMMON~1\MICROS~1\DW\dwtrig20.exe" [2007-02-26 437160]
[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\RunOnce]
"RunNarrator"="Narrator.exe" [2008-04-14 53760]
c:\documents and settings\All Users\Start Menu\Programs\Startup\
Digital Line Detect.lnk - c:\program files\Digital Line Detect\DLG.exe [2006-4-22 24576]
[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\explorer]
"HonorAutoRunSetting"= 0 (0x0)
[HKEY_CURRENT_USER\software\microsoft\windows\currentversion\policies\explorer]
"HonorAutoRunSetting"= 0 (0x0)
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\WinDefend]
@="Service"
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile]
"EnableFirewall"= 0 (0x0)
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%windir%\\system32\\sessmgr.exe"=
"c:\\Program Files\\Common Files\\Ahead\\Nero Web\\SetupX.exe"=
"c:\\Program Files\\Common Files\\Ahead\\Nero Web\\SetupXu.exe"=
"c:\\Program Files\\Nero\\Nero 7\\Nero ShowTime\\ShowTime.exe"=
"c:\\WINDOWS\\pchealth\\helpctr\\binaries\\helpctr.exe"=
"c:\\Program Files\\Skype\\Plugin Manager\\skypePM.exe"=
"c:\\Program Files\\Skype\\Phone\\Skype.exe"=
"c:\\WINDOWS\\Network Diagnostic\\xpnetdiag.exe"=
"c:\\Program Files\\Windows Live\\Sync\\WindowsLiveSync.exe"=
"c:\\Program Files\\Messenger\\msmsgs.exe"=
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\GloballyOpenPorts\List]
"3389:TCP"= 3389:TCP:@xpsp2res.dll,-22009
R2 WinDefend;Windows Defender;c:\program files\Windows Defender\MsMpEng.exe [11/3/2006 7:19 PM 13592]
R3 EraserUtilRebootDrv;EraserUtilRebootDrv;c:\program files\Common Files\Symantec Shared\eengine\EraserUtilRebootDrv.sys [8/27/2009 7:01 PM 102448]
R3 GTIPCI21;GTIPCI21;c:\windows\system32\drivers\gtipci21.sys [4/22/2006 12:53 AM 87936]
S2 gupdate;Google Update Service (gupdate);c:\program files\Google\Update\GoogleUpdate.exe [2/4/2010 12:01 PM 135664]
S3 SavRoam;SAVRoam;c:\program files\Symantec AntiVirus\SavRoam.exe [12/20/2006 8:29 PM 116928]
.
Contents of the 'Scheduled Tasks' folder
2010-04-14 c:\windows\Tasks\GoogleUpdateTaskMachineCore.job
- c:\program files\Google\Update\GoogleUpdate.exe [2010-02-04 10:00]
2010-04-14 c:\windows\Tasks\GoogleUpdateTaskMachineUA.job
- c:\program files\Google\Update\GoogleUpdate.exe [2010-02-04 10:00]
2010-04-14 c:\windows\Tasks\MP Scheduled Scan.job
- c:\program files\Windows Defender\MpCmdRun.exe [2006-11-03 17:20]
2010-04-14 c:\windows\Tasks\OGALogon.job
- c:\windows\system32\OGAEXEC.exe [2009-08-03 13:07]
.
.
------- Supplementary Scan -------
.
IE: Add to Google Photos Screensa&ver - c:\windows\system32\GPhotos.scr/200
IE: E&xport to Microsoft Excel - c:\progra~1\MICROS~2\OFFICE11\EXCEL.EXE/3000
IE: Google Sidewiki... - c:\program files\Google\Google Toolbar\Component\GoogleToolbarDynamic_mui_en_96D6FF0C6D236BF8.dll/cmsidewiki.html
DPF: {01010200-5E80-11D8-9E86-0007E96C65AE} - hxxp://supportcenter.rr.com/sdccommon/download/tgctlins.cab
FF - ProfilePath - c:\documents and settings\Amo\Application Data\Mozilla\Firefox\Profiles\11q42en7.default\
FF - plugin: c:\program files\Google\Google Earth\plugin\npgeplugin.dll
FF - plugin: c:\program files\Google\Picasa3\npPicasa3.dll
FF - plugin: c:\program files\Google\Update\1.2.183.23\npGoogleOneClick8.dll
FF - plugin: c:\program files\Microsoft\Office Live\npOLW.dll
FF - plugin: c:\program files\Windows Live\Photo Gallery\NPWLPG.dll
FF - HiddenExtension: Microsoft .NET Framework Assistant: {20a82645-c095-46ed-80e3-08825760534b} - c:\windows\Microsoft.NET\Framework\v3.5\Windows Presentation Foundation\DotNetAssistantExtension\
---- FIREFOX POLICIES ----
c:\program files\Mozilla Firefox\greprefs\all.js - pref("ui.use_native_colors", true);
c:\program files\Mozilla Firefox\greprefs\all.js - pref("ui.use_native_popup_windows", false);
c:\program files\Mozilla Firefox\greprefs\all.js - pref("browser.enable_click_image_resizing", true);
c:\program files\Mozilla Firefox\greprefs\all.js - pref("accessibility.browsewithcaret_shortcut.enabled", true);
c:\program files\Mozilla Firefox\greprefs\all.js - pref("javascript.options.mem.high_water_mark", 32);
c:\program files\Mozilla Firefox\greprefs\all.js - pref("javascript.options.mem.gc_frequency", 1600);
c:\program files\Mozilla Firefox\greprefs\all.js - pref("network.auth.force-generic-ntlm", false);
c:\program files\Mozilla Firefox\greprefs\all.js - pref("svg.smil.enabled", false);
c:\program files\Mozilla Firefox\greprefs\all.js - pref("ui.trackpoint_hack.enabled", -1);
c:\program files\Mozilla Firefox\greprefs\all.js - pref("browser.formfill.debug", false);
c:\program files\Mozilla Firefox\greprefs\all.js - pref("browser.formfill.agedWeight", 2);
c:\program files\Mozilla Firefox\greprefs\all.js - pref("browser.formfill.bucketSize", 1);
c:\program files\Mozilla Firefox\greprefs\all.js - pref("browser.formfill.maxTimeGroupings", 25);
c:\program files\Mozilla Firefox\greprefs\all.js - pref("browser.formfill.timeGroupingSize", 604800);
c:\program files\Mozilla Firefox\greprefs\all.js - pref("browser.formfill.boundaryWeight", 25);
c:\program files\Mozilla Firefox\greprefs\all.js - pref("browser.formfill.prefixWeight", 5);
c:\program files\Mozilla Firefox\greprefs\all.js - pref("html5.enable", false);
c:\program files\Mozilla Firefox\defaults\pref\firefox-branding.js - pref("app.update.download.backgroundInterval", 600);
c:\program files\Mozilla Firefox\defaults\pref\firefox-branding.js - pref("app.update.url.manual", "https://www.mozilla.org/en-US/firefox/new/?redirect_source=firefox-com");
c:\program files\Mozilla Firefox\defaults\pref\firefox-branding.js - pref("browser.search.param.yahoo-fr-ja", "mozff");
c:\program files\Mozilla Firefox\defaults\pref\firefox.js - pref("extensions.{972ce4c6-7e08-4474-a285-3208198ce6fd}.name", "chrome://browser/locale/browser.properties");
c:\program files\Mozilla Firefox\defaults\pref\firefox.js - pref("extensions.{972ce4c6-7e08-4474-a285-3208198ce6fd}.description", "chrome://browser/locale/browser.properties");
c:\program files\Mozilla Firefox\defaults\pref\firefox.js - pref("xpinstall.whitelist.add", "addons.mozilla.org");
c:\program files\Mozilla Firefox\defaults\pref\firefox.js - pref("xpinstall.whitelist.add.36", "getpersonas.com");
c:\program files\Mozilla Firefox\defaults\pref\firefox.js - pref("lightweightThemes.update.enabled", true);
c:\program files\Mozilla Firefox\defaults\pref\firefox.js - pref("browser.allTabs.previews", false);
c:\program files\Mozilla Firefox\defaults\pref\firefox.js - pref("plugins.hide_infobar_for_outdated_plugin", false);
c:\program files\Mozilla Firefox\defaults\pref\firefox.js - pref("plugins.update.notifyUser", false);
c:\program files\Mozilla Firefox\defaults\pref\firefox.js - pref("toolbar.customization.usesheet", false);
c:\program files\Mozilla Firefox\defaults\pref\firefox.js - pref("browser.taskbar.previews.enable", false);
c:\program files\Mozilla Firefox\defaults\pref\firefox.js - pref("browser.taskbar.previews.max", 20);
c:\program files\Mozilla Firefox\defaults\pref\firefox.js - pref("browser.taskbar.previews.cachetime", 20);
.
**************************************************************************
catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2010-04-14 11:43
Windows 5.1.2600 Service Pack 3 NTFS
scanning hidden processes ...
scanning hidden autostart entries ...
scanning hidden files ...
scan completed successfully
hidden files: 0
**************************************************************************
Stealth MBR rootkit/Mebroot/Sinowal detector 0.3.7 by Gmer, http://www.gmer.net
device: opened successfully
user: MBR read successfully
called modules: ntkrnlpa.exe CLASSPNP.SYS disk.sys >>UNKNOWN [0x865E2AC8]<<
kernel: MBR read successfully
detected MBR rootkit hooks:
\Driver\Disk -> CLASSPNP.SYS @ 0xf75c6f28
\Driver\ACPI -> ACPI.sys @ 0xf7459cb8
\Driver\atapi -> atapi.sys @ 0xf73cd852
IoDeviceObjectType -> DeleteProcedure -> ntkrnlpa.exe @ 0x80579022
ParseProcedure -> ntkrnlpa.exe @ 0x80577c84
\Device\Harddisk0\DR0 -> DeleteProcedure -> ntkrnlpa.exe @ 0x80579022
ParseProcedure -> ntkrnlpa.exe @ 0x80577c84
NDIS: Intel(R) PRO/Wireless 2200BG Network Connection -> SendCompleteHandler -> NDIS.sys @ 0xf72b1bb0
PacketIndicateHandler -> NDIS.sys @ 0xf72a0a0d
SendHandler -> NDIS.sys @ 0xf72b4b40
user & kernel MBR OK
**************************************************************************
.
--------------------- DLLs Loaded Under Running Processes ---------------------
- - - - - - - > 'winlogon.exe'(904)
c:\windows\system32\WININET.dll
- - - - - - - > 'lsass.exe'(964)
c:\windows\system32\WININET.dll
- - - - - - - > 'explorer.exe'(2168)
c:\windows\system32\WININET.dll
c:\windows\system32\ieframe.dll
c:\windows\system32\webcheck.dll
c:\windows\system32\WPDShServiceObj.dll
c:\windows\system32\PortableDeviceTypes.dll
c:\windows\system32\PortableDeviceApi.dll
.
------------------------ Other Running Processes ------------------------
.
c:\program files\Intel\Wireless\Bin\EvtEng.exe
c:\program files\Intel\Wireless\Bin\S24EvMon.exe
c:\program files\Intel\Wireless\Bin\WLKeeper.exe
c:\program files\Common Files\Symantec Shared\ccEvtMgr.exe
c:\program files\Common Files\Symantec Shared\ccSetMgr.exe
c:\program files\Common Files\Symantec Shared\SPBBC\SPBBCSvc.exe
c:\windows\System32\SCardSvr.exe
c:\program files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
c:\windows\system32\basfipm.exe
c:\windows\system32\crypserv.exe
c:\program files\Java\jre6\bin\jqs.exe
c:\program files\Common Files\Microsoft Shared\VS7DEBUG\MDM.EXE
c:\program files\Dell\QuickSet\NICCONFIGSVC.exe
c:\program files\Intel\Wireless\Bin\RegSrvc.exe
c:\program files\Microsoft\Search Enhancement Pack\SeaPort\SeaPort.exe
c:\program files\Canon\CAL\CALMAIN.exe
c:\windows\system32\wscntfy.exe
.
**************************************************************************
.
Completion time: 2010-04-14 11:50:34 - machine was rebooted
ComboFix-quarantined-files.txt 2010-04-14 09:50
ComboFix2.txt 2010-04-14 07:16
ComboFix3.txt 2010-04-12 12:01
Pre-Run: 67,817,693,184 bytes free
Post-Run: 67,782,787,072 bytes free
- - End Of File - - 50AEE53F702BE60E3275FFA822FB43F9
Utilisateur anonyme
14 avril 2010 à 14:06
14 avril 2010 à 14:06
Imprime ces instructions car il faudra fermer toutes les fenêtres et applications lors de l'installation et de l'analyse.
▶ Télécharge :
Malwarebytes
ou :
Malwarebytes
▶ Installe le ( choisis bien "francais" ; ne modifie pas les paramètres d'installe ) et mets le à jour .
(NB : Si tu as un message d'erreur t'indiquant qu'il te manque "COMCTL32.OCX" lors de l'installe, alors télécharge le ici : COMCTL32.OCX
▶ Potasses le Tuto pour te familiariser avec le prg :
( cela dit, il est très simple d'utilisation ).
relance malwarebytes en suivant scrupuleusement ces consignes :
! Déconnecte toi et ferme toutes applications en cours !
▶ Lance Malwarebyte's .
Fais un examen dit "Complet" .
▶ Laisse le programme travailler ( et ne rien faire d'autre avec le PC durant le scan ).
▶ à la fin tu cliques sur "résultat" .
▶ Vérifie que tous les objets infectés soient validés, puis clique sur " suppression " .
▶ Note : si il faut redémarrer ton PC pour finir le nettoyage, fais le !
▶ Poste le rapport sauvegardé après la suppression des objets infectés (dans l'onglet "rapport/log"de Malwarebytes, le dernier en date)
▶ Télécharge :
Malwarebytes
ou :
Malwarebytes
▶ Installe le ( choisis bien "francais" ; ne modifie pas les paramètres d'installe ) et mets le à jour .
(NB : Si tu as un message d'erreur t'indiquant qu'il te manque "COMCTL32.OCX" lors de l'installe, alors télécharge le ici : COMCTL32.OCX
▶ Potasses le Tuto pour te familiariser avec le prg :
( cela dit, il est très simple d'utilisation ).
relance malwarebytes en suivant scrupuleusement ces consignes :
! Déconnecte toi et ferme toutes applications en cours !
▶ Lance Malwarebyte's .
Fais un examen dit "Complet" .
▶ Laisse le programme travailler ( et ne rien faire d'autre avec le PC durant le scan ).
▶ à la fin tu cliques sur "résultat" .
▶ Vérifie que tous les objets infectés soient validés, puis clique sur " suppression " .
▶ Note : si il faut redémarrer ton PC pour finir le nettoyage, fais le !
▶ Poste le rapport sauvegardé après la suppression des objets infectés (dans l'onglet "rapport/log"de Malwarebytes, le dernier en date)
Ca a l'air beaucoup mieux : CPU a 40% au lieu de 100% au depart, navigation facile.
Par contre la fenetre virus definition Daemon apparait toujours a l'allumage, mon antivirus est desactive et je ne peux plus l'activer sans le disque. Or je ne l'ai pas(on m'a donne le portable avec l'antivirus deja installe).
Enfin ma connexion wifi est desactivee et windows me dit qu'il ne peut pas la configurer.
Y-a-t-il des liens possibles?
Par contre la fenetre virus definition Daemon apparait toujours a l'allumage, mon antivirus est desactive et je ne peux plus l'activer sans le disque. Or je ne l'ai pas(on m'a donne le portable avec l'antivirus deja installe).
Enfin ma connexion wifi est desactivee et windows me dit qu'il ne peut pas la configurer.
Y-a-t-il des liens possibles?
Utilisateur anonyme
14 avril 2010 à 16:32
14 avril 2010 à 16:32
je pense que tu devrais virer ton antivirus et mettre antivir....
pour la wifi si tu te mets sur connections reseau et doubleclic sur la connection sans fil , la carte reseau s'active-t-elle ?
ensuite pour controler si le service est bien demarré :
demarrer / executer / puis tape :
services.msc , puis entrée
et vois si la configuration automatique sans fil est bien demarrrée , auquelcas , demarre-la
pour la wifi si tu te mets sur connections reseau et doubleclic sur la connection sans fil , la carte reseau s'active-t-elle ?
ensuite pour controler si le service est bien demarré :
demarrer / executer / puis tape :
services.msc , puis entrée
et vois si la configuration automatique sans fil est bien demarrrée , auquelcas , demarre-la
J'ai telecharge antivir en gardant les parametres recommandes lors de l'installation
En ce qui concerne la connexion wifi je n'ai pas compris comment voir si la carte reseau est activee. Par contre la configuration automatique est bien demarree.
Y-a-t-il une manip pour passer mon portable en francais plutot qu'en anglais?
En ce qui concerne la connexion wifi je n'ai pas compris comment voir si la carte reseau est activee. Par contre la configuration automatique est bien demarree.
Y-a-t-il une manip pour passer mon portable en francais plutot qu'en anglais?
OK Gen.
Je pense que tout est regle. J'ai reussi a me reconnecter en mode wifi et il semble que le probleme vienne d'une interaction avec une autre livebox ??
Je confirme ma question sur le passage de l'anglais au francais mais peut-etre devrais-je ouvrir une autre discussion?
Je pense que tout est regle. J'ai reussi a me reconnecter en mode wifi et il semble que le probleme vienne d'une interaction avec une autre livebox ??
Je confirme ma question sur le passage de l'anglais au francais mais peut-etre devrais-je ouvrir une autre discussion?
Utilisateur anonyme
14 avril 2010 à 17:25
14 avril 2010 à 17:25
regarde dans ton gestionnaire de peripheriques si tu as un "!" ou "?"