Rapport virus msn album photo
coco33
-
Utilisateur anonyme -
Utilisateur anonyme -
Bonjour,
J'ai été infecté par le virus msn album photo, voici le rapport est ce que quelqu'un peut me dire si je suis encore infecter??
Je pense que oui, vu qu'au démarrage mon anti virus avast m'indique que j'ai le virus!! Que dois-je faire?
MSNFix 1.676
C:\Documents and Settings\ALCOR\Local Settings\Temporary Internet Files\Content.IE5\IIGRYPZM\MSNFix[1]\MSNFix
Fix exécuté le 06/03/2008 - 9:55:30,92 By ALCOR
mode normal
************************ Recherche les fichiers présents
... C:\DOCUME~1\ALCOR\LOCALS~1\Temp\services.exe
************************ Recherche les dossiers présents
... \TEMP\
... C:\Temp\
************************ Suppression des fichiers
/!\ ... C:\DOCUME~1\ALCOR\LOCALS~1\Temp\services.exe
************************ Suppression des dossiers
/!\ ... \TEMP\
/!\ ... C:\Temp\
************************ Nettoyage du registre
Les fichiers encore présents seront supprimés au prochain redémarrage
************************ Suppression des fichiers
/!\ ... C:\DOCUME~1\ALCOR\LOCALS~1\Temp\services.exe
************************ Fichiers suspects
Aucun Fichier trouvé
Les fichiers et clés de registre supprimés ont été sauvegardés dans le fichier 06032008_ 9593145.zip
------------------------------------------------------------------------
Auteur : !aur3n7 Contact: https://www.ionos.fr/
------------------------------------------------------------------------
--------------------------------------------- END ---------------------------------------------
J'ai été infecté par le virus msn album photo, voici le rapport est ce que quelqu'un peut me dire si je suis encore infecter??
Je pense que oui, vu qu'au démarrage mon anti virus avast m'indique que j'ai le virus!! Que dois-je faire?
MSNFix 1.676
C:\Documents and Settings\ALCOR\Local Settings\Temporary Internet Files\Content.IE5\IIGRYPZM\MSNFix[1]\MSNFix
Fix exécuté le 06/03/2008 - 9:55:30,92 By ALCOR
mode normal
************************ Recherche les fichiers présents
... C:\DOCUME~1\ALCOR\LOCALS~1\Temp\services.exe
************************ Recherche les dossiers présents
... \TEMP\
... C:\Temp\
************************ Suppression des fichiers
/!\ ... C:\DOCUME~1\ALCOR\LOCALS~1\Temp\services.exe
************************ Suppression des dossiers
/!\ ... \TEMP\
/!\ ... C:\Temp\
************************ Nettoyage du registre
Les fichiers encore présents seront supprimés au prochain redémarrage
************************ Suppression des fichiers
/!\ ... C:\DOCUME~1\ALCOR\LOCALS~1\Temp\services.exe
************************ Fichiers suspects
Aucun Fichier trouvé
Les fichiers et clés de registre supprimés ont été sauvegardés dans le fichier 06032008_ 9593145.zip
------------------------------------------------------------------------
Auteur : !aur3n7 Contact: https://www.ionos.fr/
------------------------------------------------------------------------
--------------------------------------------- END ---------------------------------------------
A voir également:
- Rapport virus msn album photo
- Google photo - Télécharger - Albums photo
- Album photo partagé - Guide
- Google photo album partagé - Guide
- Photo filtre 7 gratuit - Télécharger - Retouche d'image
- Logiciel album photo - Télécharger - Albums photo
26 réponses
pour ton ecran bleu a tu installer une nouvelle peripherique ou modifier quelques choses dans ton ordi toi ou quelqu'un d'autre?
coco3322
Messages postés
37
Statut
Membre
Non j'ai rien installé ni modifié, il me dit ça l'ordi auci!Et pers ne touche à mon ordi!alors je comprends pas!
donc en mode normale tout vas bien c'est déjà bien !! grave peut être pas mais pas normale et le message que tu avais au début vidage mémoire est il toujours la? et le virus est il toujours la?
Rapport!!
AntiVir PersonalEdition Classic
Report file date: lundi 10 mars 2008 10:16
Scanning for 1139141 virus strains and unwanted programs.
Licensed to: Avira AntiVir PersonalEdition Classic
Serial number: 0000149996-ADJIE-0001
Platform: Windows XP
Windows version: (Service Pack 2) [5.1.2600]
Username: ALCOR
Computer name: DCPDP43J
Version information:
BUILD.DAT : 270 15603 Bytes 19/09/2007 13:32:00
AVSCAN.EXE : 7.0.6.1 290856 Bytes 23/08/2007 06:16:29
AVSCAN.DLL : 7.0.6.0 49192 Bytes 16/08/2007 05:23:51
LUKE.DLL : 7.0.5.3 147496 Bytes 14/08/2007 08:32:47
LUKERES.DLL : 7.0.6.1 10280 Bytes 21/08/2007 05:35:20
ANTIVIR0.VDF : 6.40.0.0 11030528 Bytes 18/07/2007 07:27:15
ANTIVIR1.VDF : 7.0.3.2 5447168 Bytes 07/03/2008 23:51:18
ANTIVIR2.VDF : 7.0.3.3 2048 Bytes 07/03/2008 23:51:18
ANTIVIR3.VDF : 7.0.3.6 29184 Bytes 09/03/2008 23:51:18
AVEWIN32.DLL : 7.6.0.73 3334656 Bytes 06/03/2008 03:00:15
AVWINLL.DLL : 1.0.0.7 14376 Bytes 26/02/2007 03:36:26
AVPREF.DLL : 7.0.2.2 25640 Bytes 18/07/2007 00:39:17
AVREP.DLL : 7.0.0.1 155688 Bytes 16/04/2007 06:16:24
AVPACK32.DLL : 7.6.0.3 360488 Bytes 06/03/2008 03:00:16
AVREG.DLL : 7.0.1.6 30760 Bytes 18/07/2007 00:17:06
AVARKT.DLL : 1.0.0.20 278568 Bytes 28/08/2007 05:26:33
AVEVTLOG.DLL : 7.0.0.20 86056 Bytes 18/07/2007 00:10:18
NETNT.DLL : 7.0.0.0 7720 Bytes 08/03/2007 04:09:42
RCIMAGE.DLL : 7.0.1.30 2342952 Bytes 07/08/2007 05:38:13
RCTEXT.DLL : 7.0.62.0 86056 Bytes 21/08/2007 05:50:37
SQLITE3.DLL : 3.3.17.1 339968 Bytes 23/07/2007 02:37:21
Configuration settings for the scan:
Jobname..........................: Manual Selection
Configuration file...............: C:\Documents and Settings\All Users\Application Data\Avira\AntiVir PersonalEdition Classic\PROFILES\folder.avp
Logging..........................: low
Primary action...................: interactive
Secondary action.................: ignore
Scan master boot sector..........: off
Scan boot sector.................: on
Boot sectors.....................: C:,
Scan memory......................: on
Process scan.....................: on
Scan registry....................: on
Search for rootkits..............: off
Scan all files...................: All files
Scan archives....................: on
Recursion depth..................: 20
Smart extensions.................: on
Macro heuristic..................: on
File heuristic...................: medium
Start of the scan: lundi 10 mars 2008 10:16
The scan of running processes will be started
Scan process 'avscan.exe' - '1' Module(s) have been scanned
Scan process 'avcenter.exe' - '1' Module(s) have been scanned
Scan process 'iexplore.exe' - '1' Module(s) have been scanned
Scan process 'jucheck.exe' - '1' Module(s) have been scanned
Scan process 'svchost.exe' - '1' Module(s) have been scanned
Scan process 'CPSHelpRunner.exe' - '1' Module(s) have been scanned
Scan process 'RoxMediaDB9.exe' - '1' Module(s) have been scanned
Scan process 'alg.exe' - '1' Module(s) have been scanned
Scan process 'compta.exe' - '1' Module(s) have been scanned
Scan process 'wdfmgr.exe' - '1' Module(s) have been scanned
Scan process 'sprtsvc.exe' - '1' Module(s) have been scanned
Scan process 'KHALMNPR.exe' - '1' Module(s) have been scanned
Scan process 'w3dbsmgr.exe' - '1' Module(s) have been scanned
Scan process 'BTStackServer.exe' - '1' Module(s) have been scanned
Scan process 'RoxWatch9.exe' - '1' Module(s) have been scanned
Scan process 'MDM.EXE' - '1' Module(s) have been scanned
Scan process 'WGE_SRV.exe' - '1' Module(s) have been scanned
Scan process 'guard.exe' - '1' Module(s) have been scanned
Scan process 'SetPoint.exe' - '1' Module(s) have been scanned
Scan process 'BTTray.exe' - '1' Module(s) have been scanned
Scan process 'sched.exe' - '1' Module(s) have been scanned
Scan process 'TeaTimer.exe' - '1' Module(s) have been scanned
Scan process 'sprtcmd.exe' - '1' Module(s) have been scanned
Scan process 'GoogleToolbarNotifier.exe' - '1' Module(s) have been scanned
Scan process 'ctfmon.exe' - '1' Module(s) have been scanned
Scan process 'DSAgnt.exe' - '1' Module(s) have been scanned
Scan process 'GoogleDesktop.exe' - '1' Module(s) have been scanned
Scan process 'avgas.exe' - '1' Module(s) have been scanned
Scan process 'avgnt.exe' - '1' Module(s) have been scanned
Scan process 'wlancfg.exe' - '1' Module(s) have been scanned
Scan process 'GoogleDesktop.exe' - '1' Module(s) have been scanned
Scan process 'PDVDDXSrv.exe' - '1' Module(s) have been scanned
Scan process 'DrgToDsc.exe' - '1' Module(s) have been scanned
Scan process 'RoxWatchTray9.exe' - '1' Module(s) have been scanned
Scan process 'avguard.exe' - '1' Module(s) have been scanned
Scan process 'issch.exe' - '1' Module(s) have been scanned
Scan process 'LBTWiz.exe' - '1' Module(s) have been scanned
Scan process 'igfxsrvc.exe' - '1' Module(s) have been scanned
Scan process 'RTHDCPL.EXE' - '1' Module(s) have been scanned
Scan process 'jusched.exe' - '1' Module(s) have been scanned
Scan process 'igfxpers.exe' - '1' Module(s) have been scanned
Scan process 'hkcmd.exe' - '1' Module(s) have been scanned
Scan process 'igfxtray.exe' - '1' Module(s) have been scanned
Scan process 'spoolsv.exe' - '1' Module(s) have been scanned
Scan process 'explorer.exe' - '1' Module(s) have been scanned
Scan process 'aawservice.exe' - '1' Module(s) have been scanned
Scan process 'svchost.exe' - '1' Module(s) have been scanned
Scan process 'svchost.exe' - '1' Module(s) have been scanned
Scan process 'LBTSERV.EXE' - '1' Module(s) have been scanned
Scan process 'btwdins.exe' - '1' Module(s) have been scanned
Scan process 'svchost.exe' - '1' Module(s) have been scanned
Scan process 'svchost.exe' - '1' Module(s) have been scanned
Scan process 'svchost.exe' - '1' Module(s) have been scanned
Scan process 'lsass.exe' - '1' Module(s) have been scanned
Scan process 'services.exe' - '1' Module(s) have been scanned
Scan process 'winlogon.exe' - '1' Module(s) have been scanned
Scan process 'csrss.exe' - '1' Module(s) have been scanned
Scan process 'smss.exe' - '1' Module(s) have been scanned
58 processes with 58 modules were scanned
Start scanning boot sectors:
Boot sector 'C:\'
[NOTE] No virus was found!
Starting to scan the registry.
C:\Documents and Settings\ALCOR\Local Settings\Temp\services.exe
[WARNING] The file could not be opened!
The registry was scanned ( '39' files ).
Starting the file scan:
Begin scan in 'C:\'
C:\hiberfil.sys
[WARNING] The file could not be opened!
C:\pagefile.sys
[WARNING] The file could not be opened!
C:\Documents and Settings\ALCOR\Local Settings\Temp\services.exe
[WARNING] The file could not be opened!
End of the scan: lundi 10 mars 2008 10:40
Used time: 24:05 min
The scan has been done completely.
4619 Scanning directories
255169 Files were scanned
0 viruses and/or unwanted programs were found
0 Files were classified as suspicious:
0 files were deleted
0 files were repaired
0 files were moved to quarantine
0 files were renamed
4 Files cannot be scanned
255169 Files not concerned
3376 Archives were scanned
4 Warnings
0 Notes
AntiVir PersonalEdition Classic
Report file date: lundi 10 mars 2008 10:16
Scanning for 1139141 virus strains and unwanted programs.
Licensed to: Avira AntiVir PersonalEdition Classic
Serial number: 0000149996-ADJIE-0001
Platform: Windows XP
Windows version: (Service Pack 2) [5.1.2600]
Username: ALCOR
Computer name: DCPDP43J
Version information:
BUILD.DAT : 270 15603 Bytes 19/09/2007 13:32:00
AVSCAN.EXE : 7.0.6.1 290856 Bytes 23/08/2007 06:16:29
AVSCAN.DLL : 7.0.6.0 49192 Bytes 16/08/2007 05:23:51
LUKE.DLL : 7.0.5.3 147496 Bytes 14/08/2007 08:32:47
LUKERES.DLL : 7.0.6.1 10280 Bytes 21/08/2007 05:35:20
ANTIVIR0.VDF : 6.40.0.0 11030528 Bytes 18/07/2007 07:27:15
ANTIVIR1.VDF : 7.0.3.2 5447168 Bytes 07/03/2008 23:51:18
ANTIVIR2.VDF : 7.0.3.3 2048 Bytes 07/03/2008 23:51:18
ANTIVIR3.VDF : 7.0.3.6 29184 Bytes 09/03/2008 23:51:18
AVEWIN32.DLL : 7.6.0.73 3334656 Bytes 06/03/2008 03:00:15
AVWINLL.DLL : 1.0.0.7 14376 Bytes 26/02/2007 03:36:26
AVPREF.DLL : 7.0.2.2 25640 Bytes 18/07/2007 00:39:17
AVREP.DLL : 7.0.0.1 155688 Bytes 16/04/2007 06:16:24
AVPACK32.DLL : 7.6.0.3 360488 Bytes 06/03/2008 03:00:16
AVREG.DLL : 7.0.1.6 30760 Bytes 18/07/2007 00:17:06
AVARKT.DLL : 1.0.0.20 278568 Bytes 28/08/2007 05:26:33
AVEVTLOG.DLL : 7.0.0.20 86056 Bytes 18/07/2007 00:10:18
NETNT.DLL : 7.0.0.0 7720 Bytes 08/03/2007 04:09:42
RCIMAGE.DLL : 7.0.1.30 2342952 Bytes 07/08/2007 05:38:13
RCTEXT.DLL : 7.0.62.0 86056 Bytes 21/08/2007 05:50:37
SQLITE3.DLL : 3.3.17.1 339968 Bytes 23/07/2007 02:37:21
Configuration settings for the scan:
Jobname..........................: Manual Selection
Configuration file...............: C:\Documents and Settings\All Users\Application Data\Avira\AntiVir PersonalEdition Classic\PROFILES\folder.avp
Logging..........................: low
Primary action...................: interactive
Secondary action.................: ignore
Scan master boot sector..........: off
Scan boot sector.................: on
Boot sectors.....................: C:,
Scan memory......................: on
Process scan.....................: on
Scan registry....................: on
Search for rootkits..............: off
Scan all files...................: All files
Scan archives....................: on
Recursion depth..................: 20
Smart extensions.................: on
Macro heuristic..................: on
File heuristic...................: medium
Start of the scan: lundi 10 mars 2008 10:16
The scan of running processes will be started
Scan process 'avscan.exe' - '1' Module(s) have been scanned
Scan process 'avcenter.exe' - '1' Module(s) have been scanned
Scan process 'iexplore.exe' - '1' Module(s) have been scanned
Scan process 'jucheck.exe' - '1' Module(s) have been scanned
Scan process 'svchost.exe' - '1' Module(s) have been scanned
Scan process 'CPSHelpRunner.exe' - '1' Module(s) have been scanned
Scan process 'RoxMediaDB9.exe' - '1' Module(s) have been scanned
Scan process 'alg.exe' - '1' Module(s) have been scanned
Scan process 'compta.exe' - '1' Module(s) have been scanned
Scan process 'wdfmgr.exe' - '1' Module(s) have been scanned
Scan process 'sprtsvc.exe' - '1' Module(s) have been scanned
Scan process 'KHALMNPR.exe' - '1' Module(s) have been scanned
Scan process 'w3dbsmgr.exe' - '1' Module(s) have been scanned
Scan process 'BTStackServer.exe' - '1' Module(s) have been scanned
Scan process 'RoxWatch9.exe' - '1' Module(s) have been scanned
Scan process 'MDM.EXE' - '1' Module(s) have been scanned
Scan process 'WGE_SRV.exe' - '1' Module(s) have been scanned
Scan process 'guard.exe' - '1' Module(s) have been scanned
Scan process 'SetPoint.exe' - '1' Module(s) have been scanned
Scan process 'BTTray.exe' - '1' Module(s) have been scanned
Scan process 'sched.exe' - '1' Module(s) have been scanned
Scan process 'TeaTimer.exe' - '1' Module(s) have been scanned
Scan process 'sprtcmd.exe' - '1' Module(s) have been scanned
Scan process 'GoogleToolbarNotifier.exe' - '1' Module(s) have been scanned
Scan process 'ctfmon.exe' - '1' Module(s) have been scanned
Scan process 'DSAgnt.exe' - '1' Module(s) have been scanned
Scan process 'GoogleDesktop.exe' - '1' Module(s) have been scanned
Scan process 'avgas.exe' - '1' Module(s) have been scanned
Scan process 'avgnt.exe' - '1' Module(s) have been scanned
Scan process 'wlancfg.exe' - '1' Module(s) have been scanned
Scan process 'GoogleDesktop.exe' - '1' Module(s) have been scanned
Scan process 'PDVDDXSrv.exe' - '1' Module(s) have been scanned
Scan process 'DrgToDsc.exe' - '1' Module(s) have been scanned
Scan process 'RoxWatchTray9.exe' - '1' Module(s) have been scanned
Scan process 'avguard.exe' - '1' Module(s) have been scanned
Scan process 'issch.exe' - '1' Module(s) have been scanned
Scan process 'LBTWiz.exe' - '1' Module(s) have been scanned
Scan process 'igfxsrvc.exe' - '1' Module(s) have been scanned
Scan process 'RTHDCPL.EXE' - '1' Module(s) have been scanned
Scan process 'jusched.exe' - '1' Module(s) have been scanned
Scan process 'igfxpers.exe' - '1' Module(s) have been scanned
Scan process 'hkcmd.exe' - '1' Module(s) have been scanned
Scan process 'igfxtray.exe' - '1' Module(s) have been scanned
Scan process 'spoolsv.exe' - '1' Module(s) have been scanned
Scan process 'explorer.exe' - '1' Module(s) have been scanned
Scan process 'aawservice.exe' - '1' Module(s) have been scanned
Scan process 'svchost.exe' - '1' Module(s) have been scanned
Scan process 'svchost.exe' - '1' Module(s) have been scanned
Scan process 'LBTSERV.EXE' - '1' Module(s) have been scanned
Scan process 'btwdins.exe' - '1' Module(s) have been scanned
Scan process 'svchost.exe' - '1' Module(s) have been scanned
Scan process 'svchost.exe' - '1' Module(s) have been scanned
Scan process 'svchost.exe' - '1' Module(s) have been scanned
Scan process 'lsass.exe' - '1' Module(s) have been scanned
Scan process 'services.exe' - '1' Module(s) have been scanned
Scan process 'winlogon.exe' - '1' Module(s) have been scanned
Scan process 'csrss.exe' - '1' Module(s) have been scanned
Scan process 'smss.exe' - '1' Module(s) have been scanned
58 processes with 58 modules were scanned
Start scanning boot sectors:
Boot sector 'C:\'
[NOTE] No virus was found!
Starting to scan the registry.
C:\Documents and Settings\ALCOR\Local Settings\Temp\services.exe
[WARNING] The file could not be opened!
The registry was scanned ( '39' files ).
Starting the file scan:
Begin scan in 'C:\'
C:\hiberfil.sys
[WARNING] The file could not be opened!
C:\pagefile.sys
[WARNING] The file could not be opened!
C:\Documents and Settings\ALCOR\Local Settings\Temp\services.exe
[WARNING] The file could not be opened!
End of the scan: lundi 10 mars 2008 10:40
Used time: 24:05 min
The scan has been done completely.
4619 Scanning directories
255169 Files were scanned
0 viruses and/or unwanted programs were found
0 Files were classified as suspicious:
0 files were deleted
0 files were repaired
0 files were moved to quarantine
0 files were renamed
4 Files cannot be scanned
255169 Files not concerned
3376 Archives were scanned
4 Warnings
0 Notes
Vous n’avez pas trouvé la réponse que vous recherchez ?
Posez votre question
Télécharger sur le bureau
http://downloads.andymanchesta.com/RemovalTools/SDFix.exe
= Double-clic SDFix.
= Clic Install
------
= Redémarrer en mode Sans Échec (le démarrage peut prendre plusieurs minutes)
Attention, pas d’accès à internet dans ce mode. Enregistrer ou imprimer les consignes. Relancer le Pc et tapoter la touche F8 ( ou F5, 2 ou 4 pour certains) , jusqu’à l’apparition des inscriptions avec choix de démarrage
Avec les touches « flèches », sélectionner Mode sans échec ==> entrée ==>nom utilisateur habituel
--------
= Double-clic sur le nouveau dossier SDFix qui est dans C:\
= Double-clic RunThis
= Presser Y
= A l’invitation ==> appuyer sur une touche pour redémarrer
= Redémarrage ( qui sera plus long ,car nettoyage en cours )
Continuer si un message d’erreurs apparaît ,dans ce cas aller directement au rapport dans SDfix
= apparition de Finished
= Appuyer sur une touche
= Dans SDFix , un rapport Report.
antivir ne ta rien trouver?
http://downloads.andymanchesta.com/RemovalTools/SDFix.exe
= Double-clic SDFix.
= Clic Install
------
= Redémarrer en mode Sans Échec (le démarrage peut prendre plusieurs minutes)
Attention, pas d’accès à internet dans ce mode. Enregistrer ou imprimer les consignes. Relancer le Pc et tapoter la touche F8 ( ou F5, 2 ou 4 pour certains) , jusqu’à l’apparition des inscriptions avec choix de démarrage
Avec les touches « flèches », sélectionner Mode sans échec ==> entrée ==>nom utilisateur habituel
--------
= Double-clic sur le nouveau dossier SDFix qui est dans C:\
= Double-clic RunThis
= Presser Y
= A l’invitation ==> appuyer sur une touche pour redémarrer
= Redémarrage ( qui sera plus long ,car nettoyage en cours )
Continuer si un message d’erreurs apparaît ,dans ce cas aller directement au rapport dans SDfix
= apparition de Finished
= Appuyer sur une touche
= Dans SDFix , un rapport Report.
antivir ne ta rien trouver?
Non antivir n'avait rien détecté, et la mon ordi a redémarré et pr l'instant rien il m'a pas dit qu'il y avait un virus comme ce matin!! Et je n'ai pas eu l'écran bleu en redémarrant depuis le monde sans échec!!
[b]SDFix: Version 1.155 [/b]
Run by ALCOR on 10/03/2008 at 11:16
Microsoft Windows XP [version 5.1.2600]
Running From: C:\SDFix
[b]Checking Services [/b]:
Restoring Windows Registry Values
Restoring Windows Default Hosts File
Rebooting
[b]Checking Files [/b]:
Trojan Files Found:
C:\DOCUME~1\ALCOR\LOCALS~1\Temp\services.exe - Deleted
C:\WINDOWS\system32\real.txt - Deleted
Removing Temp Files
[b]ADS Check [/b]:
[b]Final Check [/b]:
catchme 0.3.1344.2 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2008-03-10 11:19:34
Windows 5.1.2600 Service Pack 2 NTFS
scanning hidden processes ...
scanning hidden services & system hive ...
scanning hidden registry entries ...
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\C040311900063D11C8EF10054038389C\Usage]
"MSOfficeDocumentImaging"=dword:386a0580
scanning hidden files ...
scan completed successfully
hidden processes: 0
hidden services: 0
hidden files: 0
[b]Remaining Services [/b]:
Authorized Application Key Export:
[HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\standardprofile\authorizedapplications\list]
"%windir%\\system32\\sessmgr.exe"="%windir%\\system32\\sessmgr.exe:*:enabled:@xpsp2res.dll,-22019"
"C:\\Program Files\\Messenger\\msmsgs.exe"="C:\\Program Files\\Messenger\\msmsgs.exe:*:Enabled:Windows Messenger"
"C:\\PVSW\\Bin\\w3dbsmgr.exe"="C:\\PVSW\\Bin\\w3dbsmgr.exe:*:Enabled:Database Service Manager"
"%windir%\\Network Diagnostic\\xpnetdiag.exe"="%windir%\\Network Diagnostic\\xpnetdiag.exe:*:Enabled:@xpsp3res.dll,-20000"
"C:\\DOCUME~1\\ALCOR\\LOCALS~1\\Temp\\services.exe"="C:\\DOCUME~1\\ALCOR\\LOCALS~1\\Temp\\services.exe:*:Enabled:Flash Media"
[HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\domainprofile\authorizedapplications\list]
"%windir%\\system32\\sessmgr.exe"="%windir%\\system32\\sessmgr.exe:*:enabled:@xpsp2res.dll,-22019"
"C:\\PVSW\\Bin\\w3dbsmgr.exe"="C:\\PVSW\\Bin\\w3dbsmgr.exe:*:Enabled:Database Service Manager"
"%windir%\\Network Diagnostic\\xpnetdiag.exe"="%windir%\\Network Diagnostic\\xpnetdiag.exe:*:Enabled:@xpsp3res.dll,-20000"
[b]Remaining Files [/b]:
File Backups: - C:\SDFix\backups\backups.zip
[b]Files with Hidden Attributes [/b]:
Mon 28 Jan 2008 1,404,240 A.SHR --- "C:\Program Files\Spybot - Search & Destroy\SDUpdate.exe"
Mon 28 Jan 2008 5,146,448 A.SHR --- "C:\Program Files\Spybot - Search & Destroy\SpybotSD.exe"
Mon 28 Jan 2008 2,097,488 A.SHR --- "C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe"
Wed 24 Oct 2007 25,839,664 A..H. --- "C:\WINDOWS\SoftwareDistribution\Download\60ca6af11040112be1355236afadeb90\BIT92.tmp"
Fri 5 Oct 2007 8 A..H. --- "C:\Documents and Settings\ALCOR\Application Data\GTek\GTUpdate\AUpdate\Channels\ch_u1\lock.tmp"
Fri 5 Oct 2007 8 A..H. --- "C:\Documents and Settings\ALCOR\Application Data\GTek\GTUpdate\AUpdate\Channels\ch_u2\lock.tmp"
Fri 5 Oct 2007 8 A..H. --- "C:\Documents and Settings\ALCOR\Application Data\GTek\GTUpdate\AUpdate\Channels\ch_u3\lock.tmp"
[b]Finished![/b]
[b]SDFix: Version 1.155 [/b]
Run by ALCOR on 10/03/2008 at 11:16
Microsoft Windows XP [version 5.1.2600]
Running From: C:\SDFix
[b]Checking Services [/b]:
Restoring Windows Registry Values
Restoring Windows Default Hosts File
Rebooting
[b]Checking Files [/b]:
Trojan Files Found:
C:\DOCUME~1\ALCOR\LOCALS~1\Temp\services.exe - Deleted
C:\WINDOWS\system32\real.txt - Deleted
Removing Temp Files
[b]ADS Check [/b]:
[b]Final Check [/b]:
catchme 0.3.1344.2 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2008-03-10 11:19:34
Windows 5.1.2600 Service Pack 2 NTFS
scanning hidden processes ...
scanning hidden services & system hive ...
scanning hidden registry entries ...
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\C040311900063D11C8EF10054038389C\Usage]
"MSOfficeDocumentImaging"=dword:386a0580
scanning hidden files ...
scan completed successfully
hidden processes: 0
hidden services: 0
hidden files: 0
[b]Remaining Services [/b]:
Authorized Application Key Export:
[HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\standardprofile\authorizedapplications\list]
"%windir%\\system32\\sessmgr.exe"="%windir%\\system32\\sessmgr.exe:*:enabled:@xpsp2res.dll,-22019"
"C:\\Program Files\\Messenger\\msmsgs.exe"="C:\\Program Files\\Messenger\\msmsgs.exe:*:Enabled:Windows Messenger"
"C:\\PVSW\\Bin\\w3dbsmgr.exe"="C:\\PVSW\\Bin\\w3dbsmgr.exe:*:Enabled:Database Service Manager"
"%windir%\\Network Diagnostic\\xpnetdiag.exe"="%windir%\\Network Diagnostic\\xpnetdiag.exe:*:Enabled:@xpsp3res.dll,-20000"
"C:\\DOCUME~1\\ALCOR\\LOCALS~1\\Temp\\services.exe"="C:\\DOCUME~1\\ALCOR\\LOCALS~1\\Temp\\services.exe:*:Enabled:Flash Media"
[HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\domainprofile\authorizedapplications\list]
"%windir%\\system32\\sessmgr.exe"="%windir%\\system32\\sessmgr.exe:*:enabled:@xpsp2res.dll,-22019"
"C:\\PVSW\\Bin\\w3dbsmgr.exe"="C:\\PVSW\\Bin\\w3dbsmgr.exe:*:Enabled:Database Service Manager"
"%windir%\\Network Diagnostic\\xpnetdiag.exe"="%windir%\\Network Diagnostic\\xpnetdiag.exe:*:Enabled:@xpsp3res.dll,-20000"
[b]Remaining Files [/b]:
File Backups: - C:\SDFix\backups\backups.zip
[b]Files with Hidden Attributes [/b]:
Mon 28 Jan 2008 1,404,240 A.SHR --- "C:\Program Files\Spybot - Search & Destroy\SDUpdate.exe"
Mon 28 Jan 2008 5,146,448 A.SHR --- "C:\Program Files\Spybot - Search & Destroy\SpybotSD.exe"
Mon 28 Jan 2008 2,097,488 A.SHR --- "C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe"
Wed 24 Oct 2007 25,839,664 A..H. --- "C:\WINDOWS\SoftwareDistribution\Download\60ca6af11040112be1355236afadeb90\BIT92.tmp"
Fri 5 Oct 2007 8 A..H. --- "C:\Documents and Settings\ALCOR\Application Data\GTek\GTUpdate\AUpdate\Channels\ch_u1\lock.tmp"
Fri 5 Oct 2007 8 A..H. --- "C:\Documents and Settings\ALCOR\Application Data\GTek\GTUpdate\AUpdate\Channels\ch_u2\lock.tmp"
Fri 5 Oct 2007 8 A..H. --- "C:\Documents and Settings\ALCOR\Application Data\GTek\GTUpdate\AUpdate\Channels\ch_u3\lock.tmp"
[b]Finished![/b]
Plus un rapport
catchme 0.3.1344.2 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2008-03-10 11:19:34
Windows 5.1.2600 Service Pack 2 NTFS
scanning hidden processes ...
scanning hidden services & system hive ...
scanning hidden registry entries ...
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\C040311900063D11C8EF10054038389C\Usage]
"MSOfficeDocumentImaging"=dword:386a0580
scanning hidden files ...
scan completed successfully
hidden processes: 0
hidden services: 0
hidden files: 0
catchme 0.3.1344.2 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2008-03-10 11:19:34
Windows 5.1.2600 Service Pack 2 NTFS
scanning hidden processes ...
scanning hidden services & system hive ...
scanning hidden registry entries ...
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\C040311900063D11C8EF10054038389C\Usage]
"MSOfficeDocumentImaging"=dword:386a0580
scanning hidden files ...
scan completed successfully
hidden processes: 0
hidden services: 0
hidden files: 0