Security Essentials 2010
Rahan78
Messages postés
41
Statut
Membre
-
Rahan78 Messages postés 41 Statut Membre -
Rahan78 Messages postés 41 Statut Membre -
Mon PC fixe est infesté par le faux antispyware Security Essentials.
Voici le log de Highjackthis lancé à partir du bureau
Logfile of HijackThis v1.99.1
Scan saved at 14:31:13, on 08/05/2010
Platform: Windows XP SP3 (WinNT 5.01.2600)
MSIE: Internet Explorer v8.00 (8.00.6001.18702)
Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\Program Files\Alwil Software\Avast4\aswUpdSv.exe
C:\Program Files\Alwil Software\Avast4\ashServ.exe
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\Fichiers communs\EPSON\EBAPI\eEBSVC.exe
C:\Program Files\Nero\Nero 7\InCD\InCDsrv.exe
C:\Program Files\Java\jre6\bin\jqs.exe
C:\Program Files\Fichiers communs\LightScribe\LSSrvc.exe
C:\WINDOWS\system32\nvsvc32.exe
C:\WINDOWS\system32\svchost.exe
C:\Program Files\Alwil Software\Avast4\ashMaiSv.exe
C:\Program Files\Alwil Software\Avast4\ashWebSv.exe
C:\WINDOWS\system32\wbem\wmiapsrv.exe
C:\WINDOWS\system32\wscntfy.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\SOUNDMAN.EXE
C:\WINDOWS\system32\RUNDLL32.EXE
C:\Program Files\ULiRaid\ULiRaid.exe
C:\Program Files\EasySearch\SiteVacuumClient.exe
C:\Program Files\Nero\Nero 7\InCD\NBHGui.exe
C:\Program Files\Nero\Nero 7\InCD\InCD.exe
C:\PROGRA~1\ALWILS~1\Avast4\ashDisp.exe
C:\Program Files\Java\jre6\bin\jusched.exe
C:\WINDOWS\system32\smss32.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\Fichiers communs\LightScribe\LightScribeControlPanel.exe
C:\Program Files\Securityessentials2010\SE2010.exe
C:\WINDOWS\system32\wuauclt.exe
C:\Program Files\Internet Explorer\IEXPLORE.EXE
C:\Program Files\Internet Explorer\IEXPLORE.EXE
C:\Program Files\Internet Explorer\IEXPLORE.EXE
C:\Program Files\Internet Explorer\IEXPLORE.EXE
C:\Program Files\Internet Explorer\IEXPLORE.EXE
C:\Program Files\Internet Explorer\IEXPLORE.EXE
C:\Program Files\Internet Explorer\IEXPLORE.EXE
C:\Program Files\Internet Explorer\IEXPLORE.EXE
C:\Program Files\Internet Explorer\IEXPLORE.EXE
C:\Program Files\Alwil Software\Avast4\ashSimpl.exe
C:\Documents and Settings\Propriétaire\Bureau\Rahan78.exe
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.europowersearch.com/Search.html?SelectedSearchLang=FR
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = https://www.msn.com/fr-fr/?ocid=iehp
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = https://www.bing.com/?toHttps=1&redig=5FC791212101479BAFBE1A679848B1AF
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = https://www.bing.com/?toHttps=1&redig=5FC791212101479BAFBE1A679848B1AF
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.europowersearch.com/Search.html?SelectedSearchLang=FR
R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyOverride = local
R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName = Liens
F2 - REG:system.ini: UserInit=C:\WINDOWS\system32\winlogon32.exe
O2 - BHO: Google Plus - {01677B4B-0610-4814-94A0-5F570DD7A88F} - C:\PROGRA~1\GOOGLE~1\17GOOG~1.DLL
O2 - BHO: AcroIEHelperStub - {18DF081C-E8AD-4283-A596-FA578C2EBDC3} - C:\Program Files\Fichiers communs\Adobe\Acrobat\ActiveX\AcroIEHelperShim.dll
O2 - BHO: Spybot-S&D IE Protection - {53707962-6F74-2D53-2644-206D7942484F} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O2 - BHO: Java(tm) Plug-In 2 SSV Helper - {DBC80044-A445-435b-BC74-9C25C1C588A9} - C:\Program Files\Java\jre6\bin\jp2ssv.dll
O2 - BHO: JQSIEStartDetectorImpl - {E7E6F031-17CE-4C07-BC86-EABFE594F69C} - C:\Program Files\Java\jre6\lib\deploy\jqs\ie\jqs_plugin.dll
O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE C:\WINDOWS\system32\NvCpl.dll,NvStartup
O4 - HKLM\..\Run: [nwiz] nwiz.exe /install
O4 - HKLM\..\Run: [SoundMan] SOUNDMAN.EXE
O4 - HKLM\..\Run: [NvMediaCenter] RUNDLL32.EXE C:\WINDOWS\system32\NvMcTray.dll,NvTaskbarInit
O4 - HKLM\..\Run: [Adobe Reader Speed Launcher] "C:\Program Files\Adobe\Reader 9.0\Reader\Reader_sl.exe"
O4 - HKLM\..\Run: [ULiRaid] C:\Program Files\ULiRaid\ULiRaid.exe
O4 - HKLM\..\Run: [Logitech Hardware Abstraction Layer] KHALMNPR.EXE
O4 - HKLM\..\Run: [PinnacleDriverCheck] C:\WINDOWS\system32\\PSDrvCheck.exe
O4 - HKLM\..\Run: [Kernel and Hardware Abstraction Layer] KHALMNPR.EXE
O4 - HKLM\..\Run: [SiteVacuum] C:\Program Files\EasySearch\SiteVacuumClient.exe
O4 - HKLM\..\Run: [NeroFilterCheck] C:\Program Files\Fichiers communs\Ahead\Lib\NeroCheck.exe
O4 - HKLM\..\Run: [SecurDisc] C:\Program Files\Nero\Nero 7\InCD\NBHGui.exe
O4 - HKLM\..\Run: [InCD] C:\Program Files\Nero\Nero 7\InCD\InCD.exe
O4 - HKLM\..\Run: [avast!] C:\PROGRA~1\ALWILS~1\Avast4\ashDisp.exe
O4 - HKLM\..\Run: [SunJavaUpdateSched] "C:\Program Files\Java\jre6\bin\jusched.exe"
O4 - HKLM\..\Run: [smss32.exe] C:\WINDOWS\system32\smss32.exe
O4 - HKCU\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\ctfmon.exe
O4 - HKCU\..\Run: [LightScribe Control Panel] C:\Program Files\Fichiers communs\LightScribe\LightScribeControlPanel.exe -hidden
O4 - HKCU\..\Run: [smss32.exe] C:\WINDOWS\system32\smss32.exe
O4 - HKCU\..\Run: [Security essentials 2010] C:\Program Files\Securityessentials2010\SE2010.exe
O4 - Global Startup: EPSON Status Monitor 3 Environment Check(2).lnk = C:\WINDOWS\system32\spool\drivers\w32x86\3\E_SRCV02.EXE
O4 - Global Startup: Logitech SetPoint.lnk = C:\Program Files\Logitech\SetPoint\SetPoint.exe
O8 - Extra context menu item: E&xporter vers Microsoft Excel - res://C:\PROGRA~1\MICROS~2\Office12\EXCEL.EXE/3000
O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~2\Office12\REFIEBAR.DLL
O9 - Extra button: (no name) - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O9 - Extra 'Tools' menuitem: Spybot - Search & Destroy Configuration - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - %windir%\Network Diagnostic\xpnetdiag.exe (file missing)
O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - %windir%\Network Diagnostic\xpnetdiag.exe (file missing)
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O11 - Options group: [INTERNATIONAL] International
O15 - Trusted Zone: http://*.buy-security-essentials.com
O15 - Trusted Zone: http://*.download-soft-package.com
O15 - Trusted Zone: http://*.download-software-package.com
O15 - Trusted Zone: http://*.get-key-se10.com
O15 - Trusted Zone: http://*.is-software-download.com
O15 - Trusted Zone: http://*.buy-security-essentials.com (HKLM)
O15 - Trusted Zone: http://*.get-key-se10.com (HKLM)
O17 - HKLM\System\CCS\Services\Tcpip\..\{62AD068C-692E-4478-AF9D-D2C28A2D7DD1}: NameServer = 192.168.1.1
O18 - Protocol: ms-help - {314111C7-A502-11D2-BBCA-00C04F8EC294} - C:\Program Files\Fichiers communs\Microsoft Shared\Help\hxds.dll
O18 - Filter hijack: text/xml - {807563E5-5146-11D5-A672-00B0D022E945} - C:\PROGRA~1\FICHIE~1\MICROS~1\OFFICE12\MSOXMLMF.DLL
O20 - Winlogon Notify: dimsntfy - %SystemRoot%\System32\dimsntfy.dll (file missing)
O20 - Winlogon Notify: LBTWlgn - c:\program files\fichiers communs\logitech\bluetooth\LBTWlgn.dll
O21 - SSODL: WPDShServiceObj - {AAA288BA-9A4C-45B0-95D7-94D524869DB5} - C:\WINDOWS\system32\WPDShServiceObj.dll
O23 - Service: avast! iAVS4 Control Service (aswUpdSv) - ALWIL Software - C:\Program Files\Alwil Software\Avast4\aswUpdSv.exe
O23 - Service: avast! Antivirus - ALWIL Software - C:\Program Files\Alwil Software\Avast4\ashServ.exe
O23 - Service: avast! Mail Scanner - Unknown owner - C:\Program Files\Alwil Software\Avast4\ashMaiSv.exe" /service (file missing)
O23 - Service: avast! Web Scanner - Unknown owner - C:\Program Files\Alwil Software\Avast4\ashWebSv.exe" /service (file missing)
O23 - Service: EpsonBidirectionalService - Unknown owner - C:\Program Files\Fichiers communs\EPSON\EBAPI\eEBSVC.exe
O23 - Service: InCD Helper (InCDsrv) - Nero AG - C:\Program Files\Nero\Nero 7\InCD\InCDsrv.exe
O23 - Service: Java Quick Starter (JavaQuickStarterService) - Unknown owner - C:\Program Files\Java\jre6\bin\jqs.exe" -service -config "C:\Program Files\Java\jre6\lib\deploy\jqs\jqs.conf (file missing)
O23 - Service: Logitech Bluetooth Service (LBTServ) - Logitech, Inc. - C:\Program Files\Fichiers communs\Logitech\Bluetooth\LBTServ.exe
O23 - Service: LightScribeService Direct Disc Labeling Service (LightScribeService) - Hewlett-Packard Company - C:\Program Files\Fichiers communs\LightScribe\LSSrvc.exe
O23 - Service: NMIndexingService - Nero AG - C:\Program Files\Fichiers communs\Ahead\Lib\NMIndexingService.exe
O23 - Service: NVIDIA Display Driver Service (NVSvc) - NVIDIA Corporation - C:\WINDOWS\system32\nvsvc32.exe
Une bonne âme peut-elle me donner la marche à suivre pour nettoyer mon pc ?
Rahan78
A voir également:
- Security Essentials 2010
- Microsoft security essentials - Télécharger - Antivirus & Antimalwares
- Clé activation office 2010 gratuit - Télécharger - Sécurité
- Waptrick java football 2010 - Télécharger - Jeux vidéo
- Antivirus gratuit norton internet security - Télécharger - Antivirus & Antimalwares
- Account-security-noreply@ accountprotection.microsoft.com spam ✓ - Forum Hotmail / Outlook.com
8 réponses
Hello Mr.Geek
Il serait peut-être bon d'arreter de répondre aux internautes de CCM V/S avec une réponse stéréotypée quelque soit la demande de l'user !
ZHPDiag ==> Ok
Mais pourquoi systématiquement MBAM ?
==> Il serait préférable d'analyser ZHPDiag avant de proposer un "Fix" qui risque de masquer certaines infections plus perverses....
a+
........
Il serait peut-être bon d'arreter de répondre aux internautes de CCM V/S avec une réponse stéréotypée quelque soit la demande de l'user !
ZHPDiag ==> Ok
Mais pourquoi systématiquement MBAM ?
==> Il serait préférable d'analyser ZHPDiag avant de proposer un "Fix" qui risque de masquer certaines infections plus perverses....
a+
........
C:\Program Files\EasySearch\SiteVacuumClient.exe => Infection BT (Adware.EasySearch)
C:\WINDOWS\system32\smss32.exe => Infection Diverse (Trojan.Dropper)
C:\Program Files\Securityessentials2010\SE2010.exe => Infection Rogue (Rogue.SecurityEssential2010)
F2 - REG:system.ini: UserInit=C:\WINDOWS\system32\winlogon32.exe => Infection Diverse (TR/FraudLoad.gie)
O2 - BHO: Google Plus - {01677B4B-0610-4814-94A0-5F570DD7A88F} - C:\PROGRA~1\GOOGLE~1\17GOOG~1.DLL => Infection BT
O4 - HKLM\..\Run: [SiteVacuum] C:\Program Files\EasySearch\SiteVacuumClient.exe => Infection BT (Adware.EasySearch)
O4 - HKLM\..\Run: [smss32.exe] C:\WINDOWS\system32\smss32.exe => Infection Diverse (Malware.Bot)
O4 - HKCU\..\Run: [smss32.exe] C:\WINDOWS\system32\smss32.exe => Infection Diverse (Trojan.Dropper)
O4 - HKCU\..\Run: [Security essentials 2010] C:\Program Files\Securityessentials2010\SE2010.exe => Infection Rogue (Rogue.SecurityEssential2010)
donc maintenant je lui demande juste un rapport MBAM pour supprimer les infections et un rapport ZHPDiag
C:\WINDOWS\system32\smss32.exe => Infection Diverse (Trojan.Dropper)
C:\Program Files\Securityessentials2010\SE2010.exe => Infection Rogue (Rogue.SecurityEssential2010)
F2 - REG:system.ini: UserInit=C:\WINDOWS\system32\winlogon32.exe => Infection Diverse (TR/FraudLoad.gie)
O2 - BHO: Google Plus - {01677B4B-0610-4814-94A0-5F570DD7A88F} - C:\PROGRA~1\GOOGLE~1\17GOOG~1.DLL => Infection BT
O4 - HKLM\..\Run: [SiteVacuum] C:\Program Files\EasySearch\SiteVacuumClient.exe => Infection BT (Adware.EasySearch)
O4 - HKLM\..\Run: [smss32.exe] C:\WINDOWS\system32\smss32.exe => Infection Diverse (Malware.Bot)
O4 - HKCU\..\Run: [smss32.exe] C:\WINDOWS\system32\smss32.exe => Infection Diverse (Trojan.Dropper)
O4 - HKCU\..\Run: [Security essentials 2010] C:\Program Files\Securityessentials2010\SE2010.exe => Infection Rogue (Rogue.SecurityEssential2010)
donc maintenant je lui demande juste un rapport MBAM pour supprimer les infections et un rapport ZHPDiag
donc maintenant je lui demande juste un rapport MBAM pour supprimer les infections et un rapport ZHPDiag
Un (?) aurait été de mise à la fin de ta phrase...
donc maintenant je lui demande juste un rapport MBAM pour supprimer les infections et un rapport ZHPDiag
==> Ok pour cela.
a+
Un (?) aurait été de mise à la fin de ta phrase...
donc maintenant je lui demande juste un rapport MBAM pour supprimer les infections et un rapport ZHPDiag
==> Ok pour cela.
a+
Je ne parviens pas à faire le diag avec ZHPDiag ; je lance le logiciel puis le scan et au bout de 10 secondes ça plante !!!
Par contre j'ai pu lancer une analyse rapide avec MBAM ; en voici le rapport
Malwarebytes' Anti-Malware 1.46
www.malwarebytes.org
Version de la base de données: 4052
Windows 5.1.2600 Service Pack 3
Internet Explorer 8.0.6001.18702
08/05/2010 21:41:20
mbam-log-2010-05-08 (21-41-20).txt
Type d'examen: Examen rapide
Elément(s) analysé(s): 133200
Temps écoulé: 4 minute(s), 19 seconde(s)
Processus mémoire infecté(s): 3
Module(s) mémoire infecté(s): 2
Clé(s) du Registre infectée(s): 18
Valeur(s) du Registre infectée(s): 4
Elément(s) de données du Registre infecté(s): 15
Dossier(s) infecté(s): 5
Fichier(s) infecté(s): 25
Processus mémoire infecté(s):
C:\Program Files\Securityessentials2010\SE2010.exe (Rogue.SecurityEssentials2010) -> No action taken.
C:\Program Files\EasySearch\SiteVacuumClient.exe (Adware.SuperSearch) -> No action taken.
C:\WINDOWS\system32\smss32.exe (Trojan.FakeAlert) -> No action taken.
Module(s) mémoire infecté(s):
C:\Program Files\GooglePlusVideos\17.GooglePlusVideos.dll (Trojan.SearchRedir.G) -> No action taken.
C:\Program Files\EasySearch\MFC42U.DLL (Adware.SuperSearch) -> No action taken.
Clé(s) du Registre infectée(s):
HKEY_CLASSES_ROOT\googleplusvideos.bhobridge (Trojan.SearchRedir.G) -> No action taken.
HKEY_CLASSES_ROOT\CLSID\{01677b4b-0610-4814-94a0-5f570dd7a88f} (Trojan.SearchRedir.G) -> No action taken.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{01677b4b-0610-4814-94a0-5f570dd7a88f} (Trojan.SearchRedir.G) -> No action taken.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Settings\{01677b4b-0610-4814-94a0-5f570dd7a88f} (Trojan.SearchRedir.G) -> No action taken.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{01677b4b-0610-4814-94a0-5f570dd7a88f} (Trojan.SearchRedir.G) -> No action taken.
HKEY_CLASSES_ROOT\CLSID\{1e3cfdfe-79c8-4225-81b9-20fc99da6972} (Trojan.SearchRedir.G) -> No action taken.
HKEY_CLASSES_ROOT\googleplusvideos.bhobridge.1 (Trojan.SearchRedir.G) -> No action taken.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{c8cd2017-f1e5-4f1a-b58a-ee0b1af0d0d8} (Hijack.SearchPage) -> No action taken.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Settings\{c8cd2017-f1e5-4f1a-b58a-ee0b1af0d0d8} (Hijack.SearchPage) -> No action taken.
HKEY_CLASSES_ROOT\TypeLib\{fd90c192-481b-4a89-9fd7-cfa65709f541} (Adware.SuperSearch) -> No action taken.
HKEY_CLASSES_ROOT\Interface\{0fdcf5f0-d211-4412-a6e3-dd4938e26e24} (Adware.SuperSearch) -> No action taken.
HKEY_CLASSES_ROOT\Interface\{105e2c3f-b804-4e5b-acdd-fd7733908d0e} (Adware.SuperSearch) -> No action taken.
HKEY_CLASSES_ROOT\Interface\{a30dfaca-4174-438e-bdb8-ae8fd54313a7} (Adware.SuperSearch) -> No action taken.
HKEY_CLASSES_ROOT\Interface\{aff229f4-c47c-4965-8a83-2bfca62ab441} (Adware.SuperSearch) -> No action taken.
HKEY_CLASSES_ROOT\Interface\{cb5a0bc8-e15f-48e8-afc2-95cef3e97ac3} (Adware.SuperSearch) -> No action taken.
HKEY_CLASSES_ROOT\Interface\{d5f2caa6-16d2-4d34-9aff-3dc30d94b8c1} (Adware.SuperSearch) -> No action taken.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\sitevacuum (Adware.SuperSearch) -> No action taken.
HKEY_CURRENT_USER\SOFTWARE\SE2010 (Rogue.Securityessentials2010) -> No action taken.
Valeur(s) du Registre infectée(s):
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\security essentials 2010 (Rogue.SecurityEssentials2010) -> No action taken.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\sitevacuum (Adware.SuperSearch) -> No action taken.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\smss32.exe (Trojan.FakeAlert) -> No action taken.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\smss32.exe (Trojan.FakeAlert) -> No action taken.
Elément(s) de données du Registre infecté(s):
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit (Trojan.FakeAlert) -> Data: c:\windows\system32\winlogon32.exe -> No action taken.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit (Trojan.FakeAlert) -> Data: system32\winlogon32.exe -> No action taken.
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\get-key-se10.com\http (Hijack.TrustedZone) -> Bad: (2) Good: (4) -> No action taken.
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\buy-security-essentials.com\http (Hijack.TrustedZone) -> Bad: (2) Good: (4) -> No action taken.
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\buy-security-essentials.com\http (Hijack.TrustedZone) -> Bad: (2) Good: (4) -> No action taken.
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\is-software-download.com\http (Hijack.TrustedZone) -> Bad: (2) Good: (4) -> No action taken.
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\download-soft-package.com\http (Hijack.TrustedZone) -> Bad: (2) Good: (4) -> No action taken.
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\download-software-package.com\http (Hijack.TrustedZone) -> Bad: (2) Good: (4) -> No action taken.
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\get-key-se10.com\http (Hijack.TrustedZone) -> Bad: (2) Good: (4) -> No action taken.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit (Hijack.UserInit) -> Bad: (C:\WINDOWS\system32\winlogon32.exe) Good: (userinit.exe) -> No action taken.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\ActiveDesktop\NoChangingWallpaper (Hijack.DisplayProperties) -> Bad: (1) Good: (0) -> No action taken.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoSetActiveDesktop (Hijack.DisplayProperties) -> Bad: (1) Good: (0) -> No action taken.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\activedesktop\NoChangingWallpaper (Hijack.DisplayProperties) -> Bad: (1) Good: (0) -> No action taken.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoSetActiveDesktop (Hijack.DisplayProperties) -> Bad: (1) Good: (0) -> No action taken.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableTaskMgr (Hijack.TaskManager) -> Bad: (1) Good: (0) -> No action taken.
Dossier(s) infecté(s):
C:\Program Files\Securityessentials2010 (Rogue.SecurityEssentials2010) -> No action taken.
C:\Program Files\EasySearch (Adware.SuperSearch) -> No action taken.
C:\Program Files\EasySearch\FFExt (Adware.SuperSearch) -> No action taken.
C:\Program Files\EasySearch\FFExt\chrome (Adware.SuperSearch) -> No action taken.
C:\Program Files\EasySearch\FFExt\chrome\content (Adware.SuperSearch) -> No action taken.
Fichier(s) infecté(s):
C:\Program Files\GooglePlusVideos\17.GooglePlusVideos.dll (Trojan.SearchRedir.G) -> No action taken.
C:\WINDOWS\system32\drivers\ppofmk.sys (Rootkit.Agent) -> No action taken.
C:\Documents and Settings\Propriétaire\Local Settings\Temp\svchost.exe (Trojan.Downloader) -> No action taken.
C:\Program Files\Securityessentials2010\SE2010.exe (Rogue.SecurityEssentials2010) -> No action taken.
C:\Program Files\EasySearch\MFC42U.DLL (Adware.SuperSearch) -> No action taken.
C:\Program Files\EasySearch\SiteVacuumClient.bue (Adware.SuperSearch) -> No action taken.
C:\Program Files\EasySearch\SiteVacuumClient.exe (Adware.SuperSearch) -> No action taken.
C:\Program Files\EasySearch\SiteVacuumClient.tlb (Adware.SuperSearch) -> No action taken.
C:\Program Files\EasySearch\SiteVacuumLicense.txt (Adware.SuperSearch) -> No action taken.
C:\Program Files\EasySearch\tskill.exe (Adware.SuperSearch) -> No action taken.
C:\Program Files\EasySearch\uninst.exe (Adware.SuperSearch) -> No action taken.
C:\Program Files\EasySearch\UpdateHelper.exe (Adware.SuperSearch) -> No action taken.
C:\Program Files\EasySearch\what.is.SiteVacuumClient.exe.txt (Adware.SuperSearch) -> No action taken.
C:\Program Files\EasySearch\WSConfig.ini (Adware.SuperSearch) -> No action taken.
C:\Program Files\EasySearch\FFExt\chrome.manifest (Adware.SuperSearch) -> No action taken.
C:\Program Files\EasySearch\FFExt\install.rdf (Adware.SuperSearch) -> No action taken.
C:\Program Files\EasySearch\FFExt\chrome\content\script-injector.js (Adware.SuperSearch) -> No action taken.
C:\Program Files\EasySearch\FFExt\chrome\content\sitevacuum.xul (Adware.SuperSearch) -> No action taken.
C:\WINDOWS\system32\warnings.html (Malware.Trace) -> No action taken.
C:\WINDOWS\system32\helpers32.dll (Trojan.FakeAlert) -> No action taken.
C:\Documents and Settings\Propriétaire\Application Data\Microsoft\Internet Explorer\Quick Launch\Security essentials 2010.lnk (Rogue.SecurityEssentials2010) -> No action taken.
C:\Documents and Settings\Propriétaire\Menu Démarrer\Security essentials 2010.lnk (Rogue.SecurityEssentials2010) -> No action taken.
C:\WINDOWS\system32\smss32.exe (Trojan.FakeAlert) -> No action taken.
C:\WINDOWS\system32\Winlogon32.exe (Trojan.FakeAlert) -> No action taken.
C:\WINDOWS\system32\41.exe (Trojan.FakeAlert) -> No action taken.
Rahan78
Par contre j'ai pu lancer une analyse rapide avec MBAM ; en voici le rapport
Malwarebytes' Anti-Malware 1.46
www.malwarebytes.org
Version de la base de données: 4052
Windows 5.1.2600 Service Pack 3
Internet Explorer 8.0.6001.18702
08/05/2010 21:41:20
mbam-log-2010-05-08 (21-41-20).txt
Type d'examen: Examen rapide
Elément(s) analysé(s): 133200
Temps écoulé: 4 minute(s), 19 seconde(s)
Processus mémoire infecté(s): 3
Module(s) mémoire infecté(s): 2
Clé(s) du Registre infectée(s): 18
Valeur(s) du Registre infectée(s): 4
Elément(s) de données du Registre infecté(s): 15
Dossier(s) infecté(s): 5
Fichier(s) infecté(s): 25
Processus mémoire infecté(s):
C:\Program Files\Securityessentials2010\SE2010.exe (Rogue.SecurityEssentials2010) -> No action taken.
C:\Program Files\EasySearch\SiteVacuumClient.exe (Adware.SuperSearch) -> No action taken.
C:\WINDOWS\system32\smss32.exe (Trojan.FakeAlert) -> No action taken.
Module(s) mémoire infecté(s):
C:\Program Files\GooglePlusVideos\17.GooglePlusVideos.dll (Trojan.SearchRedir.G) -> No action taken.
C:\Program Files\EasySearch\MFC42U.DLL (Adware.SuperSearch) -> No action taken.
Clé(s) du Registre infectée(s):
HKEY_CLASSES_ROOT\googleplusvideos.bhobridge (Trojan.SearchRedir.G) -> No action taken.
HKEY_CLASSES_ROOT\CLSID\{01677b4b-0610-4814-94a0-5f570dd7a88f} (Trojan.SearchRedir.G) -> No action taken.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{01677b4b-0610-4814-94a0-5f570dd7a88f} (Trojan.SearchRedir.G) -> No action taken.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Settings\{01677b4b-0610-4814-94a0-5f570dd7a88f} (Trojan.SearchRedir.G) -> No action taken.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{01677b4b-0610-4814-94a0-5f570dd7a88f} (Trojan.SearchRedir.G) -> No action taken.
HKEY_CLASSES_ROOT\CLSID\{1e3cfdfe-79c8-4225-81b9-20fc99da6972} (Trojan.SearchRedir.G) -> No action taken.
HKEY_CLASSES_ROOT\googleplusvideos.bhobridge.1 (Trojan.SearchRedir.G) -> No action taken.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{c8cd2017-f1e5-4f1a-b58a-ee0b1af0d0d8} (Hijack.SearchPage) -> No action taken.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Settings\{c8cd2017-f1e5-4f1a-b58a-ee0b1af0d0d8} (Hijack.SearchPage) -> No action taken.
HKEY_CLASSES_ROOT\TypeLib\{fd90c192-481b-4a89-9fd7-cfa65709f541} (Adware.SuperSearch) -> No action taken.
HKEY_CLASSES_ROOT\Interface\{0fdcf5f0-d211-4412-a6e3-dd4938e26e24} (Adware.SuperSearch) -> No action taken.
HKEY_CLASSES_ROOT\Interface\{105e2c3f-b804-4e5b-acdd-fd7733908d0e} (Adware.SuperSearch) -> No action taken.
HKEY_CLASSES_ROOT\Interface\{a30dfaca-4174-438e-bdb8-ae8fd54313a7} (Adware.SuperSearch) -> No action taken.
HKEY_CLASSES_ROOT\Interface\{aff229f4-c47c-4965-8a83-2bfca62ab441} (Adware.SuperSearch) -> No action taken.
HKEY_CLASSES_ROOT\Interface\{cb5a0bc8-e15f-48e8-afc2-95cef3e97ac3} (Adware.SuperSearch) -> No action taken.
HKEY_CLASSES_ROOT\Interface\{d5f2caa6-16d2-4d34-9aff-3dc30d94b8c1} (Adware.SuperSearch) -> No action taken.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\sitevacuum (Adware.SuperSearch) -> No action taken.
HKEY_CURRENT_USER\SOFTWARE\SE2010 (Rogue.Securityessentials2010) -> No action taken.
Valeur(s) du Registre infectée(s):
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\security essentials 2010 (Rogue.SecurityEssentials2010) -> No action taken.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\sitevacuum (Adware.SuperSearch) -> No action taken.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\smss32.exe (Trojan.FakeAlert) -> No action taken.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\smss32.exe (Trojan.FakeAlert) -> No action taken.
Elément(s) de données du Registre infecté(s):
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit (Trojan.FakeAlert) -> Data: c:\windows\system32\winlogon32.exe -> No action taken.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit (Trojan.FakeAlert) -> Data: system32\winlogon32.exe -> No action taken.
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\get-key-se10.com\http (Hijack.TrustedZone) -> Bad: (2) Good: (4) -> No action taken.
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\buy-security-essentials.com\http (Hijack.TrustedZone) -> Bad: (2) Good: (4) -> No action taken.
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\buy-security-essentials.com\http (Hijack.TrustedZone) -> Bad: (2) Good: (4) -> No action taken.
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\is-software-download.com\http (Hijack.TrustedZone) -> Bad: (2) Good: (4) -> No action taken.
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\download-soft-package.com\http (Hijack.TrustedZone) -> Bad: (2) Good: (4) -> No action taken.
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\download-software-package.com\http (Hijack.TrustedZone) -> Bad: (2) Good: (4) -> No action taken.
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\get-key-se10.com\http (Hijack.TrustedZone) -> Bad: (2) Good: (4) -> No action taken.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit (Hijack.UserInit) -> Bad: (C:\WINDOWS\system32\winlogon32.exe) Good: (userinit.exe) -> No action taken.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\ActiveDesktop\NoChangingWallpaper (Hijack.DisplayProperties) -> Bad: (1) Good: (0) -> No action taken.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoSetActiveDesktop (Hijack.DisplayProperties) -> Bad: (1) Good: (0) -> No action taken.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\activedesktop\NoChangingWallpaper (Hijack.DisplayProperties) -> Bad: (1) Good: (0) -> No action taken.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoSetActiveDesktop (Hijack.DisplayProperties) -> Bad: (1) Good: (0) -> No action taken.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableTaskMgr (Hijack.TaskManager) -> Bad: (1) Good: (0) -> No action taken.
Dossier(s) infecté(s):
C:\Program Files\Securityessentials2010 (Rogue.SecurityEssentials2010) -> No action taken.
C:\Program Files\EasySearch (Adware.SuperSearch) -> No action taken.
C:\Program Files\EasySearch\FFExt (Adware.SuperSearch) -> No action taken.
C:\Program Files\EasySearch\FFExt\chrome (Adware.SuperSearch) -> No action taken.
C:\Program Files\EasySearch\FFExt\chrome\content (Adware.SuperSearch) -> No action taken.
Fichier(s) infecté(s):
C:\Program Files\GooglePlusVideos\17.GooglePlusVideos.dll (Trojan.SearchRedir.G) -> No action taken.
C:\WINDOWS\system32\drivers\ppofmk.sys (Rootkit.Agent) -> No action taken.
C:\Documents and Settings\Propriétaire\Local Settings\Temp\svchost.exe (Trojan.Downloader) -> No action taken.
C:\Program Files\Securityessentials2010\SE2010.exe (Rogue.SecurityEssentials2010) -> No action taken.
C:\Program Files\EasySearch\MFC42U.DLL (Adware.SuperSearch) -> No action taken.
C:\Program Files\EasySearch\SiteVacuumClient.bue (Adware.SuperSearch) -> No action taken.
C:\Program Files\EasySearch\SiteVacuumClient.exe (Adware.SuperSearch) -> No action taken.
C:\Program Files\EasySearch\SiteVacuumClient.tlb (Adware.SuperSearch) -> No action taken.
C:\Program Files\EasySearch\SiteVacuumLicense.txt (Adware.SuperSearch) -> No action taken.
C:\Program Files\EasySearch\tskill.exe (Adware.SuperSearch) -> No action taken.
C:\Program Files\EasySearch\uninst.exe (Adware.SuperSearch) -> No action taken.
C:\Program Files\EasySearch\UpdateHelper.exe (Adware.SuperSearch) -> No action taken.
C:\Program Files\EasySearch\what.is.SiteVacuumClient.exe.txt (Adware.SuperSearch) -> No action taken.
C:\Program Files\EasySearch\WSConfig.ini (Adware.SuperSearch) -> No action taken.
C:\Program Files\EasySearch\FFExt\chrome.manifest (Adware.SuperSearch) -> No action taken.
C:\Program Files\EasySearch\FFExt\install.rdf (Adware.SuperSearch) -> No action taken.
C:\Program Files\EasySearch\FFExt\chrome\content\script-injector.js (Adware.SuperSearch) -> No action taken.
C:\Program Files\EasySearch\FFExt\chrome\content\sitevacuum.xul (Adware.SuperSearch) -> No action taken.
C:\WINDOWS\system32\warnings.html (Malware.Trace) -> No action taken.
C:\WINDOWS\system32\helpers32.dll (Trojan.FakeAlert) -> No action taken.
C:\Documents and Settings\Propriétaire\Application Data\Microsoft\Internet Explorer\Quick Launch\Security essentials 2010.lnk (Rogue.SecurityEssentials2010) -> No action taken.
C:\Documents and Settings\Propriétaire\Menu Démarrer\Security essentials 2010.lnk (Rogue.SecurityEssentials2010) -> No action taken.
C:\WINDOWS\system32\smss32.exe (Trojan.FakeAlert) -> No action taken.
C:\WINDOWS\system32\Winlogon32.exe (Trojan.FakeAlert) -> No action taken.
C:\WINDOWS\system32\41.exe (Trojan.FakeAlert) -> No action taken.
Rahan78
Vous n’avez pas trouvé la réponse que vous recherchez ?
Posez votre question
Relance MBAM et cette fois clic sur"supprimer la seélection" et colle le rapport qui apparetra
je fais quoi maintenant ?
Malwarebytes' Anti-Malware 1.46
www.malwarebytes.org
Version de la base de données: 4079
Windows 5.1.2600 Service Pack 3
Internet Explorer 8.0.6001.18702
09/05/2010 13:09:16
mbam-log-2010-05-09 (13-09-16).txt
Type d'examen: Examen complet (C:\|D:\|E:\|F:\|)
Elément(s) analysé(s): 214567
Temps écoulé: 1 heure(s), 30 minute(s), 53 seconde(s)
Processus mémoire infecté(s): 3
Module(s) mémoire infecté(s): 2
Clé(s) du Registre infectée(s): 18
Valeur(s) du Registre infectée(s): 4
Elément(s) de données du Registre infecté(s): 15
Dossier(s) infecté(s): 5
Fichier(s) infecté(s): 30
Processus mémoire infecté(s):
C:\Program Files\Securityessentials2010\SE2010.exe (Rogue.SecurityEssentials) -> Unloaded process successfully.
C:\Program Files\EasySearch\SiteVacuumClient.exe (Adware.SuperSearch) -> Unloaded process successfully.
C:\WINDOWS\system32\smss32.exe (Trojan.FakeAlert) -> Unloaded process successfully.
Module(s) mémoire infecté(s):
C:\Program Files\GooglePlusVideos\17.GooglePlusVideos.dll (Trojan.SearchRedir.G) -> Delete on reboot.
C:\Program Files\EasySearch\MFC42U.DLL (Adware.SuperSearch) -> Delete on reboot.
Clé(s) du Registre infectée(s):
HKEY_CLASSES_ROOT\googleplusvideos.bhobridge (Trojan.SearchRedir.G) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{01677b4b-0610-4814-94a0-5f570dd7a88f} (Trojan.SearchRedir.G) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{01677b4b-0610-4814-94a0-5f570dd7a88f} (Trojan.SearchRedir.G) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Settings\{01677b4b-0610-4814-94a0-5f570dd7a88f} (Trojan.SearchRedir.G) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{01677b4b-0610-4814-94a0-5f570dd7a88f} (Trojan.SearchRedir.G) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{1e3cfdfe-79c8-4225-81b9-20fc99da6972} (Trojan.SearchRedir.G) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\googleplusvideos.bhobridge.1 (Trojan.SearchRedir.G) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{c8cd2017-f1e5-4f1a-b58a-ee0b1af0d0d8} (Hijack.SearchPage) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Settings\{c8cd2017-f1e5-4f1a-b58a-ee0b1af0d0d8} (Hijack.SearchPage) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\TypeLib\{fd90c192-481b-4a89-9fd7-cfa65709f541} (Adware.SuperSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\Interface\{0fdcf5f0-d211-4412-a6e3-dd4938e26e24} (Adware.SuperSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\Interface\{105e2c3f-b804-4e5b-acdd-fd7733908d0e} (Adware.SuperSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\Interface\{a30dfaca-4174-438e-bdb8-ae8fd54313a7} (Adware.SuperSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\Interface\{aff229f4-c47c-4965-8a83-2bfca62ab441} (Adware.SuperSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\Interface\{cb5a0bc8-e15f-48e8-afc2-95cef3e97ac3} (Adware.SuperSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\Interface\{d5f2caa6-16d2-4d34-9aff-3dc30d94b8c1} (Adware.SuperSearch) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\sitevacuum (Adware.SuperSearch) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\SE2010 (Rogue.Securityessentials2010) -> Quarantined and deleted successfully.
Valeur(s) du Registre infectée(s):
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\security essentials 2010 (Rogue.SecurityEssentials) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\sitevacuum (Adware.SuperSearch) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\smss32.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\smss32.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
Elément(s) de données du Registre infecté(s):
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit (Trojan.FakeAlert) -> Data: c:\windows\system32\winlogon32.exe -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit (Trojan.FakeAlert) -> Data: system32\winlogon32.exe -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\get-key-se10.com\http (Hijack.TrustedZone) -> Bad: (2) Good: (4) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\buy-security-essentials.com\http (Hijack.TrustedZone) -> Bad: (2) Good: (4) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\buy-security-essentials.com\http (Hijack.TrustedZone) -> Bad: (2) Good: (4) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\is-software-download.com\http (Hijack.TrustedZone) -> Bad: (2) Good: (4) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\download-soft-package.com\http (Hijack.TrustedZone) -> Bad: (2) Good: (4) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\download-software-package.com\http (Hijack.TrustedZone) -> Bad: (2) Good: (4) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\get-key-se10.com\http (Hijack.TrustedZone) -> Bad: (2) Good: (4) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit (Hijack.UserInit) -> Bad: (C:\WINDOWS\system32\winlogon32.exe) Good: (userinit.exe) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\ActiveDesktop\NoChangingWallpaper (Hijack.DisplayProperties) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoSetActiveDesktop (Hijack.DisplayProperties) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\activedesktop\NoChangingWallpaper (Hijack.DisplayProperties) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoSetActiveDesktop (Hijack.DisplayProperties) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableTaskMgr (Hijack.TaskManager) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.
Dossier(s) infecté(s):
C:\Program Files\Securityessentials2010 (Rogue.SecurityEssentials2010) -> Quarantined and deleted successfully.
C:\Program Files\EasySearch (Adware.SuperSearch) -> Quarantined and deleted successfully.
C:\Program Files\EasySearch\FFExt (Adware.SuperSearch) -> Quarantined and deleted successfully.
C:\Program Files\EasySearch\FFExt\chrome (Adware.SuperSearch) -> Quarantined and deleted successfully.
C:\Program Files\EasySearch\FFExt\chrome\content (Adware.SuperSearch) -> Quarantined and deleted successfully.
Fichier(s) infecté(s):
C:\Program Files\Securityessentials2010\SE2010.exe (Rogue.SecurityEssentials) -> Quarantined and deleted successfully.
C:\Program Files\GooglePlusVideos\17.GooglePlusVideos.dll (Trojan.SearchRedir.G) -> Delete on reboot.
C:\Documents and Settings\Propriétaire\Local Settings\Temp\59.tmp (Rootkit.Dropper) -> Quarantined and deleted successfully.
C:\Documents and Settings\Propriétaire\Local Settings\Temp\svchost.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{5C63E90D-4ED7-4CD3-9AD0-13C0F1A27805}\RP312\A0098196.sys (Rootkit.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\helpers32.dll (Trojan.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\292.exe (Adware.BHO) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\drivers\ppofmk.sys (Rootkit.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\Temp\5A.tmp (Rootkit.Dropper) -> Quarantined and deleted successfully.
E:\fd76fdec2ab14745912d8f4e85ac\mshta.exe (Trojan.ADS) -> Quarantined and deleted successfully.
C:\Program Files\EasySearch\MFC42U.DLL (Adware.SuperSearch) -> Quarantined and deleted successfully.
C:\Program Files\EasySearch\SiteVacuumClient.bue (Adware.SuperSearch) -> Quarantined and deleted successfully.
C:\Program Files\EasySearch\SiteVacuumClient.exe (Adware.SuperSearch) -> Quarantined and deleted successfully.
C:\Program Files\EasySearch\SiteVacuumClient.tlb (Adware.SuperSearch) -> Quarantined and deleted successfully.
C:\Program Files\EasySearch\SiteVacuumLicense.txt (Adware.SuperSearch) -> Quarantined and deleted successfully.
C:\Program Files\EasySearch\tskill.exe (Adware.SuperSearch) -> Quarantined and deleted successfully.
C:\Program Files\EasySearch\uninst.exe (Adware.SuperSearch) -> Quarantined and deleted successfully.
C:\Program Files\EasySearch\UpdateHelper.exe (Adware.SuperSearch) -> Quarantined and deleted successfully.
C:\Program Files\EasySearch\what.is.SiteVacuumClient.exe.txt (Adware.SuperSearch) -> Quarantined and deleted successfully.
C:\Program Files\EasySearch\WSConfig.ini (Adware.SuperSearch) -> Quarantined and deleted successfully.
C:\Program Files\EasySearch\FFExt\chrome.manifest (Adware.SuperSearch) -> Quarantined and deleted successfully.
C:\Program Files\EasySearch\FFExt\install.rdf (Adware.SuperSearch) -> Quarantined and deleted successfully.
C:\Program Files\EasySearch\FFExt\chrome\content\script-injector.js (Adware.SuperSearch) -> Quarantined and deleted successfully.
C:\Program Files\EasySearch\FFExt\chrome\content\sitevacuum.xul (Adware.SuperSearch) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\warnings.html (Malware.Trace) -> Quarantined and deleted successfully.
C:\Documents and Settings\Propriétaire\Application Data\Microsoft\Internet Explorer\Quick Launch\Security essentials 2010.lnk (Rogue.SecurityEssentials2010) -> Quarantined and deleted successfully.
C:\Documents and Settings\Propriétaire\Menu Démarrer\Security essentials 2010.lnk (Rogue.SecurityEssentials2010) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\smss32.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\Winlogon32.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\41.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
Malwarebytes' Anti-Malware 1.46
www.malwarebytes.org
Version de la base de données: 4079
Windows 5.1.2600 Service Pack 3
Internet Explorer 8.0.6001.18702
09/05/2010 13:09:16
mbam-log-2010-05-09 (13-09-16).txt
Type d'examen: Examen complet (C:\|D:\|E:\|F:\|)
Elément(s) analysé(s): 214567
Temps écoulé: 1 heure(s), 30 minute(s), 53 seconde(s)
Processus mémoire infecté(s): 3
Module(s) mémoire infecté(s): 2
Clé(s) du Registre infectée(s): 18
Valeur(s) du Registre infectée(s): 4
Elément(s) de données du Registre infecté(s): 15
Dossier(s) infecté(s): 5
Fichier(s) infecté(s): 30
Processus mémoire infecté(s):
C:\Program Files\Securityessentials2010\SE2010.exe (Rogue.SecurityEssentials) -> Unloaded process successfully.
C:\Program Files\EasySearch\SiteVacuumClient.exe (Adware.SuperSearch) -> Unloaded process successfully.
C:\WINDOWS\system32\smss32.exe (Trojan.FakeAlert) -> Unloaded process successfully.
Module(s) mémoire infecté(s):
C:\Program Files\GooglePlusVideos\17.GooglePlusVideos.dll (Trojan.SearchRedir.G) -> Delete on reboot.
C:\Program Files\EasySearch\MFC42U.DLL (Adware.SuperSearch) -> Delete on reboot.
Clé(s) du Registre infectée(s):
HKEY_CLASSES_ROOT\googleplusvideos.bhobridge (Trojan.SearchRedir.G) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{01677b4b-0610-4814-94a0-5f570dd7a88f} (Trojan.SearchRedir.G) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{01677b4b-0610-4814-94a0-5f570dd7a88f} (Trojan.SearchRedir.G) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Settings\{01677b4b-0610-4814-94a0-5f570dd7a88f} (Trojan.SearchRedir.G) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{01677b4b-0610-4814-94a0-5f570dd7a88f} (Trojan.SearchRedir.G) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{1e3cfdfe-79c8-4225-81b9-20fc99da6972} (Trojan.SearchRedir.G) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\googleplusvideos.bhobridge.1 (Trojan.SearchRedir.G) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{c8cd2017-f1e5-4f1a-b58a-ee0b1af0d0d8} (Hijack.SearchPage) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Settings\{c8cd2017-f1e5-4f1a-b58a-ee0b1af0d0d8} (Hijack.SearchPage) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\TypeLib\{fd90c192-481b-4a89-9fd7-cfa65709f541} (Adware.SuperSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\Interface\{0fdcf5f0-d211-4412-a6e3-dd4938e26e24} (Adware.SuperSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\Interface\{105e2c3f-b804-4e5b-acdd-fd7733908d0e} (Adware.SuperSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\Interface\{a30dfaca-4174-438e-bdb8-ae8fd54313a7} (Adware.SuperSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\Interface\{aff229f4-c47c-4965-8a83-2bfca62ab441} (Adware.SuperSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\Interface\{cb5a0bc8-e15f-48e8-afc2-95cef3e97ac3} (Adware.SuperSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\Interface\{d5f2caa6-16d2-4d34-9aff-3dc30d94b8c1} (Adware.SuperSearch) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\sitevacuum (Adware.SuperSearch) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\SE2010 (Rogue.Securityessentials2010) -> Quarantined and deleted successfully.
Valeur(s) du Registre infectée(s):
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\security essentials 2010 (Rogue.SecurityEssentials) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\sitevacuum (Adware.SuperSearch) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\smss32.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\smss32.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
Elément(s) de données du Registre infecté(s):
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit (Trojan.FakeAlert) -> Data: c:\windows\system32\winlogon32.exe -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit (Trojan.FakeAlert) -> Data: system32\winlogon32.exe -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\get-key-se10.com\http (Hijack.TrustedZone) -> Bad: (2) Good: (4) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\buy-security-essentials.com\http (Hijack.TrustedZone) -> Bad: (2) Good: (4) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\buy-security-essentials.com\http (Hijack.TrustedZone) -> Bad: (2) Good: (4) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\is-software-download.com\http (Hijack.TrustedZone) -> Bad: (2) Good: (4) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\download-soft-package.com\http (Hijack.TrustedZone) -> Bad: (2) Good: (4) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\download-software-package.com\http (Hijack.TrustedZone) -> Bad: (2) Good: (4) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\get-key-se10.com\http (Hijack.TrustedZone) -> Bad: (2) Good: (4) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit (Hijack.UserInit) -> Bad: (C:\WINDOWS\system32\winlogon32.exe) Good: (userinit.exe) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\ActiveDesktop\NoChangingWallpaper (Hijack.DisplayProperties) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoSetActiveDesktop (Hijack.DisplayProperties) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\activedesktop\NoChangingWallpaper (Hijack.DisplayProperties) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoSetActiveDesktop (Hijack.DisplayProperties) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableTaskMgr (Hijack.TaskManager) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.
Dossier(s) infecté(s):
C:\Program Files\Securityessentials2010 (Rogue.SecurityEssentials2010) -> Quarantined and deleted successfully.
C:\Program Files\EasySearch (Adware.SuperSearch) -> Quarantined and deleted successfully.
C:\Program Files\EasySearch\FFExt (Adware.SuperSearch) -> Quarantined and deleted successfully.
C:\Program Files\EasySearch\FFExt\chrome (Adware.SuperSearch) -> Quarantined and deleted successfully.
C:\Program Files\EasySearch\FFExt\chrome\content (Adware.SuperSearch) -> Quarantined and deleted successfully.
Fichier(s) infecté(s):
C:\Program Files\Securityessentials2010\SE2010.exe (Rogue.SecurityEssentials) -> Quarantined and deleted successfully.
C:\Program Files\GooglePlusVideos\17.GooglePlusVideos.dll (Trojan.SearchRedir.G) -> Delete on reboot.
C:\Documents and Settings\Propriétaire\Local Settings\Temp\59.tmp (Rootkit.Dropper) -> Quarantined and deleted successfully.
C:\Documents and Settings\Propriétaire\Local Settings\Temp\svchost.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{5C63E90D-4ED7-4CD3-9AD0-13C0F1A27805}\RP312\A0098196.sys (Rootkit.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\helpers32.dll (Trojan.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\292.exe (Adware.BHO) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\drivers\ppofmk.sys (Rootkit.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\Temp\5A.tmp (Rootkit.Dropper) -> Quarantined and deleted successfully.
E:\fd76fdec2ab14745912d8f4e85ac\mshta.exe (Trojan.ADS) -> Quarantined and deleted successfully.
C:\Program Files\EasySearch\MFC42U.DLL (Adware.SuperSearch) -> Quarantined and deleted successfully.
C:\Program Files\EasySearch\SiteVacuumClient.bue (Adware.SuperSearch) -> Quarantined and deleted successfully.
C:\Program Files\EasySearch\SiteVacuumClient.exe (Adware.SuperSearch) -> Quarantined and deleted successfully.
C:\Program Files\EasySearch\SiteVacuumClient.tlb (Adware.SuperSearch) -> Quarantined and deleted successfully.
C:\Program Files\EasySearch\SiteVacuumLicense.txt (Adware.SuperSearch) -> Quarantined and deleted successfully.
C:\Program Files\EasySearch\tskill.exe (Adware.SuperSearch) -> Quarantined and deleted successfully.
C:\Program Files\EasySearch\uninst.exe (Adware.SuperSearch) -> Quarantined and deleted successfully.
C:\Program Files\EasySearch\UpdateHelper.exe (Adware.SuperSearch) -> Quarantined and deleted successfully.
C:\Program Files\EasySearch\what.is.SiteVacuumClient.exe.txt (Adware.SuperSearch) -> Quarantined and deleted successfully.
C:\Program Files\EasySearch\WSConfig.ini (Adware.SuperSearch) -> Quarantined and deleted successfully.
C:\Program Files\EasySearch\FFExt\chrome.manifest (Adware.SuperSearch) -> Quarantined and deleted successfully.
C:\Program Files\EasySearch\FFExt\install.rdf (Adware.SuperSearch) -> Quarantined and deleted successfully.
C:\Program Files\EasySearch\FFExt\chrome\content\script-injector.js (Adware.SuperSearch) -> Quarantined and deleted successfully.
C:\Program Files\EasySearch\FFExt\chrome\content\sitevacuum.xul (Adware.SuperSearch) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\warnings.html (Malware.Trace) -> Quarantined and deleted successfully.
C:\Documents and Settings\Propriétaire\Application Data\Microsoft\Internet Explorer\Quick Launch\Security essentials 2010.lnk (Rogue.SecurityEssentials2010) -> Quarantined and deleted successfully.
C:\Documents and Settings\Propriétaire\Menu Démarrer\Security essentials 2010.lnk (Rogue.SecurityEssentials2010) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\smss32.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\Winlogon32.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\41.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
Voici le log après suppression
Malwarebytes' Anti-Malware 1.46
www.malwarebytes.org
Version de la base de données: 4079
Windows 5.1.2600 Service Pack 3
Internet Explorer 8.0.6001.18702
09/05/2010 13:09:16
mbam-log-2010-05-09 (13-09-16).txt
Type d'examen: Examen complet (C:\|D:\|E:\|F:\|)
Elément(s) analysé(s): 214567
Temps écoulé: 1 heure(s), 30 minute(s), 53 seconde(s)
Processus mémoire infecté(s): 3
Module(s) mémoire infecté(s): 2
Clé(s) du Registre infectée(s): 18
Valeur(s) du Registre infectée(s): 4
Elément(s) de données du Registre infecté(s): 15
Dossier(s) infecté(s): 5
Fichier(s) infecté(s): 30
Processus mémoire infecté(s):
C:\Program Files\Securityessentials2010\SE2010.exe (Rogue.SecurityEssentials) -> Unloaded process successfully.
C:\Program Files\EasySearch\SiteVacuumClient.exe (Adware.SuperSearch) -> Unloaded process successfully.
C:\WINDOWS\system32\smss32.exe (Trojan.FakeAlert) -> Unloaded process successfully.
Module(s) mémoire infecté(s):
C:\Program Files\GooglePlusVideos\17.GooglePlusVideos.dll (Trojan.SearchRedir.G) -> Delete on reboot.
C:\Program Files\EasySearch\MFC42U.DLL (Adware.SuperSearch) -> Delete on reboot.
Clé(s) du Registre infectée(s):
HKEY_CLASSES_ROOT\googleplusvideos.bhobridge (Trojan.SearchRedir.G) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{01677b4b-0610-4814-94a0-5f570dd7a88f} (Trojan.SearchRedir.G) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{01677b4b-0610-4814-94a0-5f570dd7a88f} (Trojan.SearchRedir.G) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Settings\{01677b4b-0610-4814-94a0-5f570dd7a88f} (Trojan.SearchRedir.G) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{01677b4b-0610-4814-94a0-5f570dd7a88f} (Trojan.SearchRedir.G) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{1e3cfdfe-79c8-4225-81b9-20fc99da6972} (Trojan.SearchRedir.G) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\googleplusvideos.bhobridge.1 (Trojan.SearchRedir.G) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{c8cd2017-f1e5-4f1a-b58a-ee0b1af0d0d8} (Hijack.SearchPage) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Settings\{c8cd2017-f1e5-4f1a-b58a-ee0b1af0d0d8} (Hijack.SearchPage) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\TypeLib\{fd90c192-481b-4a89-9fd7-cfa65709f541} (Adware.SuperSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\Interface\{0fdcf5f0-d211-4412-a6e3-dd4938e26e24} (Adware.SuperSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\Interface\{105e2c3f-b804-4e5b-acdd-fd7733908d0e} (Adware.SuperSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\Interface\{a30dfaca-4174-438e-bdb8-ae8fd54313a7} (Adware.SuperSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\Interface\{aff229f4-c47c-4965-8a83-2bfca62ab441} (Adware.SuperSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\Interface\{cb5a0bc8-e15f-48e8-afc2-95cef3e97ac3} (Adware.SuperSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\Interface\{d5f2caa6-16d2-4d34-9aff-3dc30d94b8c1} (Adware.SuperSearch) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\sitevacuum (Adware.SuperSearch) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\SE2010 (Rogue.Securityessentials2010) -> Quarantined and deleted successfully.
Valeur(s) du Registre infectée(s):
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\security essentials 2010 (Rogue.SecurityEssentials) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\sitevacuum (Adware.SuperSearch) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\smss32.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\smss32.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
Elément(s) de données du Registre infecté(s):
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit (Trojan.FakeAlert) -> Data: c:\windows\system32\winlogon32.exe -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit (Trojan.FakeAlert) -> Data: system32\winlogon32.exe -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\get-key-se10.com\http (Hijack.TrustedZone) -> Bad: (2) Good: (4) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\buy-security-essentials.com\http (Hijack.TrustedZone) -> Bad: (2) Good: (4) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\buy-security-essentials.com\http (Hijack.TrustedZone) -> Bad: (2) Good: (4) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\is-software-download.com\http (Hijack.TrustedZone) -> Bad: (2) Good: (4) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\download-soft-package.com\http (Hijack.TrustedZone) -> Bad: (2) Good: (4) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\download-software-package.com\http (Hijack.TrustedZone) -> Bad: (2) Good: (4) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\get-key-se10.com\http (Hijack.TrustedZone) -> Bad: (2) Good: (4) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit (Hijack.UserInit) -> Bad: (C:\WINDOWS\system32\winlogon32.exe) Good: (userinit.exe) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\ActiveDesktop\NoChangingWallpaper (Hijack.DisplayProperties) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoSetActiveDesktop (Hijack.DisplayProperties) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\activedesktop\NoChangingWallpaper (Hijack.DisplayProperties) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoSetActiveDesktop (Hijack.DisplayProperties) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableTaskMgr (Hijack.TaskManager) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.
Dossier(s) infecté(s):
C:\Program Files\Securityessentials2010 (Rogue.SecurityEssentials2010) -> Quarantined and deleted successfully.
C:\Program Files\EasySearch (Adware.SuperSearch) -> Quarantined and deleted successfully.
C:\Program Files\EasySearch\FFExt (Adware.SuperSearch) -> Quarantined and deleted successfully.
C:\Program Files\EasySearch\FFExt\chrome (Adware.SuperSearch) -> Quarantined and deleted successfully.
C:\Program Files\EasySearch\FFExt\chrome\content (Adware.SuperSearch) -> Quarantined and deleted successfully.
Fichier(s) infecté(s):
C:\Program Files\Securityessentials2010\SE2010.exe (Rogue.SecurityEssentials) -> Quarantined and deleted successfully.
C:\Program Files\GooglePlusVideos\17.GooglePlusVideos.dll (Trojan.SearchRedir.G) -> Delete on reboot.
C:\Documents and Settings\Propriétaire\Local Settings\Temp\59.tmp (Rootkit.Dropper) -> Quarantined and deleted successfully.
C:\Documents and Settings\Propriétaire\Local Settings\Temp\svchost.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{5C63E90D-4ED7-4CD3-9AD0-13C0F1A27805}\RP312\A0098196.sys (Rootkit.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\helpers32.dll (Trojan.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\292.exe (Adware.BHO) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\drivers\ppofmk.sys (Rootkit.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\Temp\5A.tmp (Rootkit.Dropper) -> Quarantined and deleted successfully.
E:\fd76fdec2ab14745912d8f4e85ac\mshta.exe (Trojan.ADS) -> Quarantined and deleted successfully.
C:\Program Files\EasySearch\MFC42U.DLL (Adware.SuperSearch) -> Quarantined and deleted successfully.
C:\Program Files\EasySearch\SiteVacuumClient.bue (Adware.SuperSearch) -> Quarantined and deleted successfully.
C:\Program Files\EasySearch\SiteVacuumClient.exe (Adware.SuperSearch) -> Quarantined and deleted successfully.
C:\Program Files\EasySearch\SiteVacuumClient.tlb (Adware.SuperSearch) -> Quarantined and deleted successfully.
C:\Program Files\EasySearch\SiteVacuumLicense.txt (Adware.SuperSearch) -> Quarantined and deleted successfully.
C:\Program Files\EasySearch\tskill.exe (Adware.SuperSearch) -> Quarantined and deleted successfully.
C:\Program Files\EasySearch\uninst.exe (Adware.SuperSearch) -> Quarantined and deleted successfully.
C:\Program Files\EasySearch\UpdateHelper.exe (Adware.SuperSearch) -> Quarantined and deleted successfully.
C:\Program Files\EasySearch\what.is.SiteVacuumClient.exe.txt (Adware.SuperSearch) -> Quarantined and deleted successfully.
C:\Program Files\EasySearch\WSConfig.ini (Adware.SuperSearch) -> Quarantined and deleted successfully.
C:\Program Files\EasySearch\FFExt\chrome.manifest (Adware.SuperSearch) -> Quarantined and deleted successfully.
C:\Program Files\EasySearch\FFExt\install.rdf (Adware.SuperSearch) -> Quarantined and deleted successfully.
C:\Program Files\EasySearch\FFExt\chrome\content\script-injector.js (Adware.SuperSearch) -> Quarantined and deleted successfully.
C:\Program Files\EasySearch\FFExt\chrome\content\sitevacuum.xul (Adware.SuperSearch) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\warnings.html (Malware.Trace) -> Quarantined and deleted successfully.
C:\Documents and Settings\Propriétaire\Application Data\Microsoft\Internet Explorer\Quick Launch\Security essentials 2010.lnk (Rogue.SecurityEssentials2010) -> Quarantined and deleted successfully.
C:\Documents and Settings\Propriétaire\Menu Démarrer\Security essentials 2010.lnk (Rogue.SecurityEssentials2010) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\smss32.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\Winlogon32.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\41.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
Malwarebytes' Anti-Malware 1.46
www.malwarebytes.org
Version de la base de données: 4079
Windows 5.1.2600 Service Pack 3
Internet Explorer 8.0.6001.18702
09/05/2010 13:09:16
mbam-log-2010-05-09 (13-09-16).txt
Type d'examen: Examen complet (C:\|D:\|E:\|F:\|)
Elément(s) analysé(s): 214567
Temps écoulé: 1 heure(s), 30 minute(s), 53 seconde(s)
Processus mémoire infecté(s): 3
Module(s) mémoire infecté(s): 2
Clé(s) du Registre infectée(s): 18
Valeur(s) du Registre infectée(s): 4
Elément(s) de données du Registre infecté(s): 15
Dossier(s) infecté(s): 5
Fichier(s) infecté(s): 30
Processus mémoire infecté(s):
C:\Program Files\Securityessentials2010\SE2010.exe (Rogue.SecurityEssentials) -> Unloaded process successfully.
C:\Program Files\EasySearch\SiteVacuumClient.exe (Adware.SuperSearch) -> Unloaded process successfully.
C:\WINDOWS\system32\smss32.exe (Trojan.FakeAlert) -> Unloaded process successfully.
Module(s) mémoire infecté(s):
C:\Program Files\GooglePlusVideos\17.GooglePlusVideos.dll (Trojan.SearchRedir.G) -> Delete on reboot.
C:\Program Files\EasySearch\MFC42U.DLL (Adware.SuperSearch) -> Delete on reboot.
Clé(s) du Registre infectée(s):
HKEY_CLASSES_ROOT\googleplusvideos.bhobridge (Trojan.SearchRedir.G) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{01677b4b-0610-4814-94a0-5f570dd7a88f} (Trojan.SearchRedir.G) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{01677b4b-0610-4814-94a0-5f570dd7a88f} (Trojan.SearchRedir.G) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Settings\{01677b4b-0610-4814-94a0-5f570dd7a88f} (Trojan.SearchRedir.G) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{01677b4b-0610-4814-94a0-5f570dd7a88f} (Trojan.SearchRedir.G) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{1e3cfdfe-79c8-4225-81b9-20fc99da6972} (Trojan.SearchRedir.G) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\googleplusvideos.bhobridge.1 (Trojan.SearchRedir.G) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{c8cd2017-f1e5-4f1a-b58a-ee0b1af0d0d8} (Hijack.SearchPage) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Settings\{c8cd2017-f1e5-4f1a-b58a-ee0b1af0d0d8} (Hijack.SearchPage) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\TypeLib\{fd90c192-481b-4a89-9fd7-cfa65709f541} (Adware.SuperSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\Interface\{0fdcf5f0-d211-4412-a6e3-dd4938e26e24} (Adware.SuperSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\Interface\{105e2c3f-b804-4e5b-acdd-fd7733908d0e} (Adware.SuperSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\Interface\{a30dfaca-4174-438e-bdb8-ae8fd54313a7} (Adware.SuperSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\Interface\{aff229f4-c47c-4965-8a83-2bfca62ab441} (Adware.SuperSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\Interface\{cb5a0bc8-e15f-48e8-afc2-95cef3e97ac3} (Adware.SuperSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\Interface\{d5f2caa6-16d2-4d34-9aff-3dc30d94b8c1} (Adware.SuperSearch) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\sitevacuum (Adware.SuperSearch) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\SE2010 (Rogue.Securityessentials2010) -> Quarantined and deleted successfully.
Valeur(s) du Registre infectée(s):
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\security essentials 2010 (Rogue.SecurityEssentials) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\sitevacuum (Adware.SuperSearch) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\smss32.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\smss32.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
Elément(s) de données du Registre infecté(s):
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit (Trojan.FakeAlert) -> Data: c:\windows\system32\winlogon32.exe -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit (Trojan.FakeAlert) -> Data: system32\winlogon32.exe -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\get-key-se10.com\http (Hijack.TrustedZone) -> Bad: (2) Good: (4) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\buy-security-essentials.com\http (Hijack.TrustedZone) -> Bad: (2) Good: (4) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\buy-security-essentials.com\http (Hijack.TrustedZone) -> Bad: (2) Good: (4) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\is-software-download.com\http (Hijack.TrustedZone) -> Bad: (2) Good: (4) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\download-soft-package.com\http (Hijack.TrustedZone) -> Bad: (2) Good: (4) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\download-software-package.com\http (Hijack.TrustedZone) -> Bad: (2) Good: (4) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\get-key-se10.com\http (Hijack.TrustedZone) -> Bad: (2) Good: (4) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit (Hijack.UserInit) -> Bad: (C:\WINDOWS\system32\winlogon32.exe) Good: (userinit.exe) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\ActiveDesktop\NoChangingWallpaper (Hijack.DisplayProperties) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoSetActiveDesktop (Hijack.DisplayProperties) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\activedesktop\NoChangingWallpaper (Hijack.DisplayProperties) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoSetActiveDesktop (Hijack.DisplayProperties) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableTaskMgr (Hijack.TaskManager) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.
Dossier(s) infecté(s):
C:\Program Files\Securityessentials2010 (Rogue.SecurityEssentials2010) -> Quarantined and deleted successfully.
C:\Program Files\EasySearch (Adware.SuperSearch) -> Quarantined and deleted successfully.
C:\Program Files\EasySearch\FFExt (Adware.SuperSearch) -> Quarantined and deleted successfully.
C:\Program Files\EasySearch\FFExt\chrome (Adware.SuperSearch) -> Quarantined and deleted successfully.
C:\Program Files\EasySearch\FFExt\chrome\content (Adware.SuperSearch) -> Quarantined and deleted successfully.
Fichier(s) infecté(s):
C:\Program Files\Securityessentials2010\SE2010.exe (Rogue.SecurityEssentials) -> Quarantined and deleted successfully.
C:\Program Files\GooglePlusVideos\17.GooglePlusVideos.dll (Trojan.SearchRedir.G) -> Delete on reboot.
C:\Documents and Settings\Propriétaire\Local Settings\Temp\59.tmp (Rootkit.Dropper) -> Quarantined and deleted successfully.
C:\Documents and Settings\Propriétaire\Local Settings\Temp\svchost.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{5C63E90D-4ED7-4CD3-9AD0-13C0F1A27805}\RP312\A0098196.sys (Rootkit.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\helpers32.dll (Trojan.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\292.exe (Adware.BHO) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\drivers\ppofmk.sys (Rootkit.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\Temp\5A.tmp (Rootkit.Dropper) -> Quarantined and deleted successfully.
E:\fd76fdec2ab14745912d8f4e85ac\mshta.exe (Trojan.ADS) -> Quarantined and deleted successfully.
C:\Program Files\EasySearch\MFC42U.DLL (Adware.SuperSearch) -> Quarantined and deleted successfully.
C:\Program Files\EasySearch\SiteVacuumClient.bue (Adware.SuperSearch) -> Quarantined and deleted successfully.
C:\Program Files\EasySearch\SiteVacuumClient.exe (Adware.SuperSearch) -> Quarantined and deleted successfully.
C:\Program Files\EasySearch\SiteVacuumClient.tlb (Adware.SuperSearch) -> Quarantined and deleted successfully.
C:\Program Files\EasySearch\SiteVacuumLicense.txt (Adware.SuperSearch) -> Quarantined and deleted successfully.
C:\Program Files\EasySearch\tskill.exe (Adware.SuperSearch) -> Quarantined and deleted successfully.
C:\Program Files\EasySearch\uninst.exe (Adware.SuperSearch) -> Quarantined and deleted successfully.
C:\Program Files\EasySearch\UpdateHelper.exe (Adware.SuperSearch) -> Quarantined and deleted successfully.
C:\Program Files\EasySearch\what.is.SiteVacuumClient.exe.txt (Adware.SuperSearch) -> Quarantined and deleted successfully.
C:\Program Files\EasySearch\WSConfig.ini (Adware.SuperSearch) -> Quarantined and deleted successfully.
C:\Program Files\EasySearch\FFExt\chrome.manifest (Adware.SuperSearch) -> Quarantined and deleted successfully.
C:\Program Files\EasySearch\FFExt\install.rdf (Adware.SuperSearch) -> Quarantined and deleted successfully.
C:\Program Files\EasySearch\FFExt\chrome\content\script-injector.js (Adware.SuperSearch) -> Quarantined and deleted successfully.
C:\Program Files\EasySearch\FFExt\chrome\content\sitevacuum.xul (Adware.SuperSearch) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\warnings.html (Malware.Trace) -> Quarantined and deleted successfully.
C:\Documents and Settings\Propriétaire\Application Data\Microsoft\Internet Explorer\Quick Launch\Security essentials 2010.lnk (Rogue.SecurityEssentials2010) -> Quarantined and deleted successfully.
C:\Documents and Settings\Propriétaire\Menu Démarrer\Security essentials 2010.lnk (Rogue.SecurityEssentials2010) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\smss32.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\Winlogon32.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\41.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
Malwarebytes' Anti-Malware 1.46
www.malwarebytes.org
Version de la base de données: 4079
Windows 5.1.2600 Service Pack 3
Internet Explorer 8.0.6001.18702
09/05/2010 13:09:16
mbam-log-2010-05-09 (13-09-16).txt
Type d'examen: Examen complet (C:\|D:\|E:\|F:\|)
Elément(s) analysé(s): 214567
Temps écoulé: 1 heure(s), 30 minute(s), 53 seconde(s)
Processus mémoire infecté(s): 3
Module(s) mémoire infecté(s): 2
Clé(s) du Registre infectée(s): 18
Valeur(s) du Registre infectée(s): 4
Elément(s) de données du Registre infecté(s): 15
Dossier(s) infecté(s): 5
Fichier(s) infecté(s): 30
Processus mémoire infecté(s):
C:\Program Files\Securityessentials2010\SE2010.exe (Rogue.SecurityEssentials) -> Unloaded process successfully.
C:\Program Files\EasySearch\SiteVacuumClient.exe (Adware.SuperSearch) -> Unloaded process successfully.
C:\WINDOWS\system32\smss32.exe (Trojan.FakeAlert) -> Unloaded process successfully.
Module(s) mémoire infecté(s):
C:\Program Files\GooglePlusVideos\17.GooglePlusVideos.dll (Trojan.SearchRedir.G) -> Delete on reboot.
C:\Program Files\EasySearch\MFC42U.DLL (Adware.SuperSearch) -> Delete on reboot.
Clé(s) du Registre infectée(s):
HKEY_CLASSES_ROOT\googleplusvideos.bhobridge (Trojan.SearchRedir.G) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{01677b4b-0610-4814-94a0-5f570dd7a88f} (Trojan.SearchRedir.G) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{01677b4b-0610-4814-94a0-5f570dd7a88f} (Trojan.SearchRedir.G) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Settings\{01677b4b-0610-4814-94a0-5f570dd7a88f} (Trojan.SearchRedir.G) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{01677b4b-0610-4814-94a0-5f570dd7a88f} (Trojan.SearchRedir.G) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{1e3cfdfe-79c8-4225-81b9-20fc99da6972} (Trojan.SearchRedir.G) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\googleplusvideos.bhobridge.1 (Trojan.SearchRedir.G) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{c8cd2017-f1e5-4f1a-b58a-ee0b1af0d0d8} (Hijack.SearchPage) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Settings\{c8cd2017-f1e5-4f1a-b58a-ee0b1af0d0d8} (Hijack.SearchPage) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\TypeLib\{fd90c192-481b-4a89-9fd7-cfa65709f541} (Adware.SuperSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\Interface\{0fdcf5f0-d211-4412-a6e3-dd4938e26e24} (Adware.SuperSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\Interface\{105e2c3f-b804-4e5b-acdd-fd7733908d0e} (Adware.SuperSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\Interface\{a30dfaca-4174-438e-bdb8-ae8fd54313a7} (Adware.SuperSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\Interface\{aff229f4-c47c-4965-8a83-2bfca62ab441} (Adware.SuperSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\Interface\{cb5a0bc8-e15f-48e8-afc2-95cef3e97ac3} (Adware.SuperSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\Interface\{d5f2caa6-16d2-4d34-9aff-3dc30d94b8c1} (Adware.SuperSearch) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\sitevacuum (Adware.SuperSearch) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\SE2010 (Rogue.Securityessentials2010) -> Quarantined and deleted successfully.
Valeur(s) du Registre infectée(s):
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\security essentials 2010 (Rogue.SecurityEssentials) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\sitevacuum (Adware.SuperSearch) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\smss32.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\smss32.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
Elément(s) de données du Registre infecté(s):
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit (Trojan.FakeAlert) -> Data: c:\windows\system32\winlogon32.exe -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit (Trojan.FakeAlert) -> Data: system32\winlogon32.exe -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\get-key-se10.com\http (Hijack.TrustedZone) -> Bad: (2) Good: (4) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\buy-security-essentials.com\http (Hijack.TrustedZone) -> Bad: (2) Good: (4) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\buy-security-essentials.com\http (Hijack.TrustedZone) -> Bad: (2) Good: (4) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\is-software-download.com\http (Hijack.TrustedZone) -> Bad: (2) Good: (4) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\download-soft-package.com\http (Hijack.TrustedZone) -> Bad: (2) Good: (4) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\download-software-package.com\http (Hijack.TrustedZone) -> Bad: (2) Good: (4) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\get-key-se10.com\http (Hijack.TrustedZone) -> Bad: (2) Good: (4) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit (Hijack.UserInit) -> Bad: (C:\WINDOWS\system32\winlogon32.exe) Good: (userinit.exe) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\ActiveDesktop\NoChangingWallpaper (Hijack.DisplayProperties) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoSetActiveDesktop (Hijack.DisplayProperties) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\activedesktop\NoChangingWallpaper (Hijack.DisplayProperties) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoSetActiveDesktop (Hijack.DisplayProperties) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableTaskMgr (Hijack.TaskManager) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.
Dossier(s) infecté(s):
C:\Program Files\Securityessentials2010 (Rogue.SecurityEssentials2010) -> Quarantined and deleted successfully.
C:\Program Files\EasySearch (Adware.SuperSearch) -> Quarantined and deleted successfully.
C:\Program Files\EasySearch\FFExt (Adware.SuperSearch) -> Quarantined and deleted successfully.
C:\Program Files\EasySearch\FFExt\chrome (Adware.SuperSearch) -> Quarantined and deleted successfully.
C:\Program Files\EasySearch\FFExt\chrome\content (Adware.SuperSearch) -> Quarantined and deleted successfully.
Fichier(s) infecté(s):
C:\Program Files\Securityessentials2010\SE2010.exe (Rogue.SecurityEssentials) -> Quarantined and deleted successfully.
C:\Program Files\GooglePlusVideos\17.GooglePlusVideos.dll (Trojan.SearchRedir.G) -> Delete on reboot.
C:\Documents and Settings\Propriétaire\Local Settings\Temp\59.tmp (Rootkit.Dropper) -> Quarantined and deleted successfully.
C:\Documents and Settings\Propriétaire\Local Settings\Temp\svchost.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{5C63E90D-4ED7-4CD3-9AD0-13C0F1A27805}\RP312\A0098196.sys (Rootkit.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\helpers32.dll (Trojan.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\292.exe (Adware.BHO) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\drivers\ppofmk.sys (Rootkit.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\Temp\5A.tmp (Rootkit.Dropper) -> Quarantined and deleted successfully.
E:\fd76fdec2ab14745912d8f4e85ac\mshta.exe (Trojan.ADS) -> Quarantined and deleted successfully.
C:\Program Files\EasySearch\MFC42U.DLL (Adware.SuperSearch) -> Quarantined and deleted successfully.
C:\Program Files\EasySearch\SiteVacuumClient.bue (Adware.SuperSearch) -> Quarantined and deleted successfully.
C:\Program Files\EasySearch\SiteVacuumClient.exe (Adware.SuperSearch) -> Quarantined and deleted successfully.
C:\Program Files\EasySearch\SiteVacuumClient.tlb (Adware.SuperSearch) -> Quarantined and deleted successfully.
C:\Program Files\EasySearch\SiteVacuumLicense.txt (Adware.SuperSearch) -> Quarantined and deleted successfully.
C:\Program Files\EasySearch\tskill.exe (Adware.SuperSearch) -> Quarantined and deleted successfully.
C:\Program Files\EasySearch\uninst.exe (Adware.SuperSearch) -> Quarantined and deleted successfully.
C:\Program Files\EasySearch\UpdateHelper.exe (Adware.SuperSearch) -> Quarantined and deleted successfully.
C:\Program Files\EasySearch\what.is.SiteVacuumClient.exe.txt (Adware.SuperSearch) -> Quarantined and deleted successfully.
C:\Program Files\EasySearch\WSConfig.ini (Adware.SuperSearch) -> Quarantined and deleted successfully.
C:\Program Files\EasySearch\FFExt\chrome.manifest (Adware.SuperSearch) -> Quarantined and deleted successfully.
C:\Program Files\EasySearch\FFExt\install.rdf (Adware.SuperSearch) -> Quarantined and deleted successfully.
C:\Program Files\EasySearch\FFExt\chrome\content\script-injector.js (Adware.SuperSearch) -> Quarantined and deleted successfully.
C:\Program Files\EasySearch\FFExt\chrome\content\sitevacuum.xul (Adware.SuperSearch) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\warnings.html (Malware.Trace) -> Quarantined and deleted successfully.
C:\Documents and Settings\Propriétaire\Application Data\Microsoft\Internet Explorer\Quick Launch\Security essentials 2010.lnk (Rogue.SecurityEssentials2010) -> Quarantined and deleted successfully.
C:\Documents and Settings\Propriétaire\Menu Démarrer\Security essentials 2010.lnk (Rogue.SecurityEssentials2010) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\smss32.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\Winlogon32.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\41.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
www.malwarebytes.org
Version de la base de données: 4079
Windows 5.1.2600 Service Pack 3
Internet Explorer 8.0.6001.18702
09/05/2010 13:09:16
mbam-log-2010-05-09 (13-09-16).txt
Type d'examen: Examen complet (C:\|D:\|E:\|F:\|)
Elément(s) analysé(s): 214567
Temps écoulé: 1 heure(s), 30 minute(s), 53 seconde(s)
Processus mémoire infecté(s): 3
Module(s) mémoire infecté(s): 2
Clé(s) du Registre infectée(s): 18
Valeur(s) du Registre infectée(s): 4
Elément(s) de données du Registre infecté(s): 15
Dossier(s) infecté(s): 5
Fichier(s) infecté(s): 30
Processus mémoire infecté(s):
C:\Program Files\Securityessentials2010\SE2010.exe (Rogue.SecurityEssentials) -> Unloaded process successfully.
C:\Program Files\EasySearch\SiteVacuumClient.exe (Adware.SuperSearch) -> Unloaded process successfully.
C:\WINDOWS\system32\smss32.exe (Trojan.FakeAlert) -> Unloaded process successfully.
Module(s) mémoire infecté(s):
C:\Program Files\GooglePlusVideos\17.GooglePlusVideos.dll (Trojan.SearchRedir.G) -> Delete on reboot.
C:\Program Files\EasySearch\MFC42U.DLL (Adware.SuperSearch) -> Delete on reboot.
Clé(s) du Registre infectée(s):
HKEY_CLASSES_ROOT\googleplusvideos.bhobridge (Trojan.SearchRedir.G) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{01677b4b-0610-4814-94a0-5f570dd7a88f} (Trojan.SearchRedir.G) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{01677b4b-0610-4814-94a0-5f570dd7a88f} (Trojan.SearchRedir.G) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Settings\{01677b4b-0610-4814-94a0-5f570dd7a88f} (Trojan.SearchRedir.G) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{01677b4b-0610-4814-94a0-5f570dd7a88f} (Trojan.SearchRedir.G) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{1e3cfdfe-79c8-4225-81b9-20fc99da6972} (Trojan.SearchRedir.G) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\googleplusvideos.bhobridge.1 (Trojan.SearchRedir.G) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{c8cd2017-f1e5-4f1a-b58a-ee0b1af0d0d8} (Hijack.SearchPage) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Settings\{c8cd2017-f1e5-4f1a-b58a-ee0b1af0d0d8} (Hijack.SearchPage) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\TypeLib\{fd90c192-481b-4a89-9fd7-cfa65709f541} (Adware.SuperSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\Interface\{0fdcf5f0-d211-4412-a6e3-dd4938e26e24} (Adware.SuperSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\Interface\{105e2c3f-b804-4e5b-acdd-fd7733908d0e} (Adware.SuperSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\Interface\{a30dfaca-4174-438e-bdb8-ae8fd54313a7} (Adware.SuperSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\Interface\{aff229f4-c47c-4965-8a83-2bfca62ab441} (Adware.SuperSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\Interface\{cb5a0bc8-e15f-48e8-afc2-95cef3e97ac3} (Adware.SuperSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\Interface\{d5f2caa6-16d2-4d34-9aff-3dc30d94b8c1} (Adware.SuperSearch) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\sitevacuum (Adware.SuperSearch) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\SE2010 (Rogue.Securityessentials2010) -> Quarantined and deleted successfully.
Valeur(s) du Registre infectée(s):
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\security essentials 2010 (Rogue.SecurityEssentials) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\sitevacuum (Adware.SuperSearch) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\smss32.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\smss32.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
Elément(s) de données du Registre infecté(s):
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit (Trojan.FakeAlert) -> Data: c:\windows\system32\winlogon32.exe -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit (Trojan.FakeAlert) -> Data: system32\winlogon32.exe -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\get-key-se10.com\http (Hijack.TrustedZone) -> Bad: (2) Good: (4) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\buy-security-essentials.com\http (Hijack.TrustedZone) -> Bad: (2) Good: (4) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\buy-security-essentials.com\http (Hijack.TrustedZone) -> Bad: (2) Good: (4) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\is-software-download.com\http (Hijack.TrustedZone) -> Bad: (2) Good: (4) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\download-soft-package.com\http (Hijack.TrustedZone) -> Bad: (2) Good: (4) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\download-software-package.com\http (Hijack.TrustedZone) -> Bad: (2) Good: (4) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\get-key-se10.com\http (Hijack.TrustedZone) -> Bad: (2) Good: (4) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit (Hijack.UserInit) -> Bad: (C:\WINDOWS\system32\winlogon32.exe) Good: (userinit.exe) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\ActiveDesktop\NoChangingWallpaper (Hijack.DisplayProperties) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoSetActiveDesktop (Hijack.DisplayProperties) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\activedesktop\NoChangingWallpaper (Hijack.DisplayProperties) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoSetActiveDesktop (Hijack.DisplayProperties) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableTaskMgr (Hijack.TaskManager) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.
Dossier(s) infecté(s):
C:\Program Files\Securityessentials2010 (Rogue.SecurityEssentials2010) -> Quarantined and deleted successfully.
C:\Program Files\EasySearch (Adware.SuperSearch) -> Quarantined and deleted successfully.
C:\Program Files\EasySearch\FFExt (Adware.SuperSearch) -> Quarantined and deleted successfully.
C:\Program Files\EasySearch\FFExt\chrome (Adware.SuperSearch) -> Quarantined and deleted successfully.
C:\Program Files\EasySearch\FFExt\chrome\content (Adware.SuperSearch) -> Quarantined and deleted successfully.
Fichier(s) infecté(s):
C:\Program Files\Securityessentials2010\SE2010.exe (Rogue.SecurityEssentials) -> Quarantined and deleted successfully.
C:\Program Files\GooglePlusVideos\17.GooglePlusVideos.dll (Trojan.SearchRedir.G) -> Delete on reboot.
C:\Documents and Settings\Propriétaire\Local Settings\Temp\59.tmp (Rootkit.Dropper) -> Quarantined and deleted successfully.
C:\Documents and Settings\Propriétaire\Local Settings\Temp\svchost.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{5C63E90D-4ED7-4CD3-9AD0-13C0F1A27805}\RP312\A0098196.sys (Rootkit.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\helpers32.dll (Trojan.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\292.exe (Adware.BHO) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\drivers\ppofmk.sys (Rootkit.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\Temp\5A.tmp (Rootkit.Dropper) -> Quarantined and deleted successfully.
E:\fd76fdec2ab14745912d8f4e85ac\mshta.exe (Trojan.ADS) -> Quarantined and deleted successfully.
C:\Program Files\EasySearch\MFC42U.DLL (Adware.SuperSearch) -> Quarantined and deleted successfully.
C:\Program Files\EasySearch\SiteVacuumClient.bue (Adware.SuperSearch) -> Quarantined and deleted successfully.
C:\Program Files\EasySearch\SiteVacuumClient.exe (Adware.SuperSearch) -> Quarantined and deleted successfully.
C:\Program Files\EasySearch\SiteVacuumClient.tlb (Adware.SuperSearch) -> Quarantined and deleted successfully.
C:\Program Files\EasySearch\SiteVacuumLicense.txt (Adware.SuperSearch) -> Quarantined and deleted successfully.
C:\Program Files\EasySearch\tskill.exe (Adware.SuperSearch) -> Quarantined and deleted successfully.
C:\Program Files\EasySearch\uninst.exe (Adware.SuperSearch) -> Quarantined and deleted successfully.
C:\Program Files\EasySearch\UpdateHelper.exe (Adware.SuperSearch) -> Quarantined and deleted successfully.
C:\Program Files\EasySearch\what.is.SiteVacuumClient.exe.txt (Adware.SuperSearch) -> Quarantined and deleted successfully.
C:\Program Files\EasySearch\WSConfig.ini (Adware.SuperSearch) -> Quarantined and deleted successfully.
C:\Program Files\EasySearch\FFExt\chrome.manifest (Adware.SuperSearch) -> Quarantined and deleted successfully.
C:\Program Files\EasySearch\FFExt\install.rdf (Adware.SuperSearch) -> Quarantined and deleted successfully.
C:\Program Files\EasySearch\FFExt\chrome\content\script-injector.js (Adware.SuperSearch) -> Quarantined and deleted successfully.
C:\Program Files\EasySearch\FFExt\chrome\content\sitevacuum.xul (Adware.SuperSearch) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\warnings.html (Malware.Trace) -> Quarantined and deleted successfully.
C:\Documents and Settings\Propriétaire\Application Data\Microsoft\Internet Explorer\Quick Launch\Security essentials 2010.lnk (Rogue.SecurityEssentials2010) -> Quarantined and deleted successfully.
C:\Documents and Settings\Propriétaire\Menu Démarrer\Security essentials 2010.lnk (Rogue.SecurityEssentials2010) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\smss32.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\Winlogon32.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\41.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
Aide au diagnostic d'un pc infecté
1- Utilisation d'un logiciel de diagnostic
*Télécharger ZHPDiag (de Nicolas Coolman)
https://www.zebulon.fr/telechargements/securite/systeme/zhpdiag.html
*Se laisser guider lors de l'installation, le programme se lancera automatiquement à la fin.
*Cliquer sur l'icône représentant une loupe (« Lancer le diagnostic »)
*Enregistrer le rapport sur le Bureau à l'aide de l'icône représentant une disquette
*Héberger le rapport ZHPDiag.txt sur un site tel que cijoint.fr, puis copier/coller le lien fourni sur le forum Virus/Sécurité de CCM.
*Télécharger Malwarebytes' Anti-Malware (MBAM) sur le Bureau.
https://www.commentcamarche.net/telecharger/securite/14361-malwarebytes-anti-malware/
*Double-cliquer sur le fichier téléchargé pour lancer le processus d'installation.
*Dans l'onglet Mise à jour, cliquer sur le bouton Recherche de mise à jour : si le pare-feu demande l'autorisation à MBAM de se connecter à Internet, accepter.
*Une fois la mise à jour terminée, se rendre dans l'onglet Recherche.
*Sélectionner Exécuter un Examen Complet.
*Cliquer sur Rechercher. L'analyse dure généralement entre 30 minutes et 2 heures.
*A la fin de l'analyse, un message s'affiche :
"L'examen s'est terminé normalement. Cliquez sur "Afficher les résultats" pour afficher tous les objets trouvés"
*Cliquer sur OK pour poursuivre. Si MBAM n'a rien trouvé, il le dira aussi.
*Fermer les navigateurs (Internet Explorer, Mozilla Firefox, etc.).
Si des Malwares ont été détectés, cliquer sur Afficher les résultats.
Sélectionner tout (ou laisser coché) et cliquer sur Supprimer la sélection, MBAM va détruire les fichiers et clés de registre infectés et en mettre une copie dans la quarantaine.
MBAM va ouvrir le Bloc-notes et y copier le rapport d'analyse. Copier-coller le rapport entier sur le forum Virus/Sécurité.
1- Utilisation d'un logiciel de diagnostic
*Télécharger ZHPDiag (de Nicolas Coolman)
https://www.zebulon.fr/telechargements/securite/systeme/zhpdiag.html
*Se laisser guider lors de l'installation, le programme se lancera automatiquement à la fin.
*Cliquer sur l'icône représentant une loupe (« Lancer le diagnostic »)
*Enregistrer le rapport sur le Bureau à l'aide de l'icône représentant une disquette
*Héberger le rapport ZHPDiag.txt sur un site tel que cijoint.fr, puis copier/coller le lien fourni sur le forum Virus/Sécurité de CCM.
*Télécharger Malwarebytes' Anti-Malware (MBAM) sur le Bureau.
https://www.commentcamarche.net/telecharger/securite/14361-malwarebytes-anti-malware/
*Double-cliquer sur le fichier téléchargé pour lancer le processus d'installation.
*Dans l'onglet Mise à jour, cliquer sur le bouton Recherche de mise à jour : si le pare-feu demande l'autorisation à MBAM de se connecter à Internet, accepter.
*Une fois la mise à jour terminée, se rendre dans l'onglet Recherche.
*Sélectionner Exécuter un Examen Complet.
*Cliquer sur Rechercher. L'analyse dure généralement entre 30 minutes et 2 heures.
*A la fin de l'analyse, un message s'affiche :
"L'examen s'est terminé normalement. Cliquez sur "Afficher les résultats" pour afficher tous les objets trouvés"
*Cliquer sur OK pour poursuivre. Si MBAM n'a rien trouvé, il le dira aussi.
*Fermer les navigateurs (Internet Explorer, Mozilla Firefox, etc.).
Si des Malwares ont été détectés, cliquer sur Afficher les résultats.
Sélectionner tout (ou laisser coché) et cliquer sur Supprimer la sélection, MBAM va détruire les fichiers et clés de registre infectés et en mettre une copie dans la quarantaine.
MBAM va ouvrir le Bloc-notes et y copier le rapport d'analyse. Copier-coller le rapport entier sur le forum Virus/Sécurité.
+1
@+