Rapport hijackthis
alain195256
Messages postés
3
Statut
Membre
-
Utilisateur anonyme -
Utilisateur anonyme -
Bonjour,
j'ai plein de virus dans mon ordinateur, voici le rapport: Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 15:55:33, on 14/07/2008
Platform: Windows Vista (WinNT 6.00.1904)
MSIE: Internet Explorer v7.00 (7.00.6000.16609)
Boot mode: Normal
Running processes:
C:\Windows\system32\taskeng.exe
C:\Windows\system32\Dwm.exe
C:\Windows\Explorer.EXE
C:\Program Files\Alwil Software\Avast4\ashDisp.exe
C:\Program Files\Common Files\Symantec Shared\PIF\{B8E1DD85-8582-4c61-B58F-2F227FCA9A08}\PIFSvc.exe
C:\Program Files\Java\jre1.6.0_06\bin\jusched.exe
C:\Program Files\Windows Sidebar\sidebar.exe
C:\Windows\ehome\ehtray.exe
C:\Program Files\Windows Media Player\wmpnscfg.exe
C:\Users\alain\AppData\Local\fumkdk.exe
C:\Program Files\Logitech\SetPoint\SetPoint.exe
C:\Program Files\CASIO\Photo Loader\Plauto.exe
C:\Windows\ehome\ehmsas.exe
C:\Windows\system32\wbem\unsecapp.exe
C:\Acer\Empowering Technology\ENET\ENMTRAY.EXE
C:\Acer\Empowering Technology\EPOWER\EPOWER_DMC.EXE
C:\Acer\Empowering Technology\ACER.EMPOWERING.FRAMEWORK.SUPERVISOR.EXE
C:\Acer\Empowering Technology\eRecovery\ERAGENT.EXE
C:\Program Files\Common Files\Logishrd\KHAL2\KHALMNPR.EXE
C:\Windows\system32\wuauclt.exe
C:\Program Files\Mozilla Firefox\firefox.exe
C:\Users\alain\Desktop\HiJackThis.exe
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = https://www.bing.com/?toHttps=1&redig=5FC791212101479BAFBE1A679848B1AF
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = https://www.google.fr/?gws_rd=ssl
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = https://fr.yahoo.com/
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = https://www.bing.com/?toHttps=1&redig=5FC791212101479BAFBE1A679848B1AF
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = https://www.bing.com/?toHttps=1&redig=5FC791212101479BAFBE1A679848B1AF
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://ww17.ads.eorezo.com/cgi-bin/advert/getads.cgi?x_format=redirect&x_dp_id=9
R0 - HKLM\Software\Microsoft\Internet Explorer\Search,SearchAssistant =
R0 - HKLM\Software\Microsoft\Internet Explorer\Search,CustomizeSearch =
R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName =
O1 - Hosts: ::1 localhost
O2 - BHO: Yahoo! Toolbar Helper - {02478D38-C3F9-4EFB-9B51-7695ECA05670} - C:\Program Files\Yahoo!\Companion\Installs\cpn\yt.dll
O2 - BHO: Adobe PDF Reader Link Helper - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Common Files\Adobe\Acrobat\ActiveX\AcroIEHelper.dll
O2 - BHO: NCO 2.0 IE BHO - {602ADB0E-4AFF-4217-8AA1-95DAC4DFA408} - (no file)
O2 - BHO: EoRezoBHO - {64F56FC1-1272-44CD-BA6E-39723696E350} - C:\Program Files\EoRezo\EoAdv\EoRezoBHO.dll (file missing)
O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre1.6.0_06\bin\ssv.dll
O3 - Toolbar: Acer eDataSecurity Management - {5CBE3B7C-1E47-477e-A7DD-396DB0476E29} - C:\Windows\system32\eDStoolbar.dll
O3 - Toolbar: Yahoo! Toolbar avec bloqueur de fenêtres pop-up - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - C:\Program Files\Yahoo!\Companion\Installs\cpn\yt.dll
O3 - Toolbar: Easy-WebPrint - {327C2873-E90D-4c37-AA9D-10AC9BABA46C} - C:\Program Files\Canon\Easy-WebPrint\Toolband.dll (file missing)
O3 - Toolbar: (no name) - {7FEBEFE3-6B19-4349-98D2-FFB09D4B49CA} - (no file)
O3 - Toolbar: (no name) - {D0943516-5076-4020-A3B5-AEFAF26AB263} - (no file)
O4 - HKLM\..\Run: [avast!] C:\PROGRA~1\ALWILS~1\Avast4\ashDisp.exe
O4 - HKLM\..\Run: [Symantec PIF AlertEng] "C:\Program Files\Common Files\Symantec Shared\PIF\{B8E1DD85-8582-4c61-B58F-2F227FCA9A08}\PifSvc.exe" /a /m "C:\Program Files\Common Files\Symantec Shared\PIF\{B8E1DD85-8582-4c61-B58F-2F227FCA9A08}\AlertEng.dll"
O4 - HKLM\..\Run: [Kernel and Hardware Abstraction Layer] KHALMNPR.EXE
O4 - HKLM\..\Run: [SunJavaUpdateSched] "C:\Program Files\Java\jre1.6.0_06\bin\jusched.exe"
O4 - HKCU\..\Run: [Sidebar] C:\Program Files\Windows Sidebar\sidebar.exe /autoRun
O4 - HKCU\..\Run: [ehTray.exe] C:\Windows\ehome\ehTray.exe
O4 - HKCU\..\Run: [dmqpp.tmp] C:\Windows\system32\dmqpp.tmp
O4 - HKCU\..\Run: [dmaok.tmp] C:\Windows\system32\dmaok.tmp
O4 - HKCU\..\Run: [dmydd.tmp] C:\Windows\system32\dmydd.tmp
O4 - HKCU\..\Run: [dmhnn.tmp] C:\Windows\system32\dmhnn.tmp
O4 - HKCU\..\Run: [dmdkj.tmp] C:\Windows\system32\dmdkj.tmp
O4 - HKCU\..\Run: [dmmmh.tmp] C:\Windows\system32\dmmmh.tmp
O4 - HKCU\..\Run: [dmpob.tmp] C:\Windows\system32\dmpob.tmp
O4 - HKCU\..\Run: [dmdpv.tmp] C:\Windows\system32\dmdpv.tmp
O4 - HKCU\..\Run: [dmrwa.tmp] C:\Windows\system32\dmrwa.tmp
O4 - HKCU\..\Run: [dmdzj.tmp] C:\Windows\system32\dmdzj.tmp
O4 - HKCU\..\Run: [dmgej.tmp] C:\Windows\system32\dmgej.tmp
O4 - HKCU\..\Run: [dmwjj.tmp] C:\Windows\system32\dmwjj.tmp
O4 - HKCU\..\Run: [dmrio.tmp] C:\Windows\system32\dmrio.tmp
O4 - HKCU\..\Run: [dmghj.tmp] C:\Windows\system32\dmghj.tmp
O4 - HKCU\..\Run: [dmmkn.tmp] C:\Windows\system32\dmmkn.tmp
O4 - HKCU\..\Run: [dmwdc.tmp] C:\Windows\system32\dmwdc.tmp
O4 - HKCU\..\Run: [dmksc.tmp] C:\Windows\system32\dmksc.tmp
O4 - HKCU\..\Run: [dmczp.tmp] C:\Windows\system32\dmczp.tmp
O4 - HKCU\..\Run: [dmcup.tmp] C:\Windows\system32\dmcup.tmp
O4 - HKCU\..\Run: [dmhyz.tmp] C:\Windows\system32\dmhyz.tmp
O4 - HKCU\..\Run: [dmwuc.tmp] C:\Windows\system32\dmwuc.tmp
O4 - HKCU\..\Run: [dmssf.tmp] C:\Windows\system32\dmssf.tmp
O4 - HKCU\..\Run: [dmipp.tmp] C:\Windows\system32\dmipp.tmp
O4 - HKCU\..\Run: [dmycw.tmp] C:\Windows\system32\dmycw.tmp
O4 - HKCU\..\Run: [dmsxi.tmp] C:\Windows\system32\dmsxi.tmp
O4 - HKCU\..\Run: [dmqod.tmp] C:\Windows\system32\dmqod.tmp
O4 - HKCU\..\Run: [dmedo.tmp] C:\Windows\system32\dmedo.tmp
O4 - HKCU\..\Run: [dmpzd.tmp] C:\Windows\system32\dmpzd.tmp
O4 - HKCU\..\Run: [dmmuc.tmp] C:\Windows\system32\dmmuc.tmp
O4 - HKCU\..\Run: [dmmor.tmp] C:\Windows\system32\dmmor.tmp
O4 - HKCU\..\Run: [dmcag.tmp] C:\Windows\system32\dmcag.tmp
O4 - HKCU\..\Run: [dmnbw.tmp] C:\Windows\system32\dmnbw.tmp
O4 - HKCU\..\Run: [dmqtf.tmp] C:\Windows\system32\dmqtf.tmp
O4 - HKCU\..\Run: [dmfnt.tmp] C:\Windows\system32\dmfnt.tmp
O4 - HKCU\..\Run: [dmdan.tmp] C:\Windows\system32\dmdan.tmp
O4 - HKCU\..\Run: [dmzhp.tmp] C:\Windows\system32\dmzhp.tmp
O4 - HKCU\..\Run: [dmcat.tmp] C:\Windows\system32\dmcat.tmp
O4 - HKCU\..\Run: [dmtbu.tmp] C:\Windows\system32\dmtbu.tmp
O4 - HKCU\..\Run: [dmbxl.tmp] C:\Windows\system32\dmbxl.tmp
O4 - HKCU\..\Run: [dmajk.tmp] C:\Windows\system32\dmajk.tmp
O4 - HKCU\..\Run: [dmqvx.tmp] C:\Windows\system32\dmqvx.tmp
O4 - HKCU\..\Run: [dmwnc.tmp] C:\Windows\system32\dmwnc.tmp
O4 - HKCU\..\Run: [dmlwq.tmp] C:\Windows\system32\dmlwq.tmp
O4 - HKCU\..\Run: [dmrab.tmp] C:\Windows\system32\dmrab.tmp
O4 - HKCU\..\Run: [dmbyl.tmp] C:\Windows\system32\dmbyl.tmp
O4 - HKCU\..\Run: [dmwnl.tmp] C:\Windows\system32\dmwnl.tmp
O4 - HKCU\..\Run: [dmpix.tmp] C:\Windows\system32\dmpix.tmp
O4 - HKCU\..\Run: [dmezt.tmp] C:\Windows\system32\dmezt.tmp
O4 - HKCU\..\Run: [dmgjw.tmp] C:\Windows\system32\dmgjw.tmp
O4 - HKCU\..\Run: [dmgia.tmp] C:\Windows\system32\dmgia.tmp
O4 - HKCU\..\Run: [dmcfb.tmp] C:\Windows\system32\dmcfb.tmp
O4 - HKCU\..\Run: [dmqay.tmp] C:\Windows\system32\dmqay.tmp
O4 - HKCU\..\Run: [dmxnv.tmp] C:\Windows\system32\dmxnv.tmp
O4 - HKCU\..\Run: [dmesa.tmp] C:\Windows\system32\dmesa.tmp
O4 - HKCU\..\Run: [dmkbf.tmp] C:\Windows\system32\dmkbf.tmp
O4 - HKCU\..\Run: [dmiii.tmp] C:\Windows\system32\dmiii.tmp
O4 - HKCU\..\Run: [dmsmu.tmp] C:\Windows\system32\dmsmu.tmp
O4 - HKCU\..\Run: [dmzlu.tmp] C:\Windows\system32\dmzlu.tmp
O4 - HKCU\..\Run: [dmxix.tmp] C:\Windows\system32\dmxix.tmp
O4 - HKCU\..\Run: [dmhpd.tmp] C:\Windows\system32\dmhpd.tmp
O4 - HKCU\..\Run: [dmcdq.tmp] C:\Windows\system32\dmcdq.tmp
O4 - HKCU\..\Run: [dmieb.tmp] C:\Windows\system32\dmieb.tmp
O4 - HKCU\..\Run: [dmqna.tmp] C:\Windows\system32\dmqna.tmp
O4 - HKCU\..\Run: [dmuoi.tmp] C:\Windows\system32\dmuoi.tmp
O4 - HKCU\..\Run: [dmiiy.tmp] C:\Windows\system32\dmiiy.tmp
O4 - HKCU\..\Run: [dmpnh.tmp] C:\Windows\system32\dmpnh.tmp
O4 - HKCU\..\Run: [dmtbp.tmp] C:\Windows\system32\dmtbp.tmp
O4 - HKCU\..\Run: [dmlmj.tmp] C:\Windows\system32\dmlmj.tmp
O4 - HKCU\..\Run: [dmfqu.tmp] C:\Windows\system32\dmfqu.tmp
O4 - HKCU\..\Run: [dmivp.tmp] C:\Windows\system32\dmivp.tmp
O4 - HKCU\..\Run: [dmpmx.tmp] C:\Windows\system32\dmpmx.tmp
O4 - HKCU\..\Run: [dmrjk.tmp] C:\Windows\system32\dmrjk.tmp
O4 - HKCU\..\Run: [dmkbh.tmp] C:\Windows\system32\dmkbh.tmp
O4 - HKCU\..\Run: [dmsuc.tmp] C:\Windows\system32\dmsuc.tmp
O4 - HKCU\..\Run: [dmbsj.tmp] C:\Windows\system32\dmbsj.tmp
O4 - HKCU\..\Run: [dmwta.tmp] C:\Windows\system32\dmwta.tmp
O4 - HKCU\..\Run: [dmjkl.tmp] C:\Windows\system32\dmjkl.tmp
O4 - HKCU\..\Run: [dmrrr.tmp] C:\Windows\system32\dmrrr.tmp
O4 - HKCU\..\Run: [dmfea.tmp] C:\Windows\system32\dmfea.tmp
O4 - HKCU\..\Run: [dmeow.tmp] C:\Windows\system32\dmeow.tmp
O4 - HKCU\..\Run: [dmzch.tmp] C:\Windows\system32\dmzch.tmp
O4 - HKCU\..\Run: [dmyyk.tmp] C:\Windows\system32\dmyyk.tmp
O4 - HKCU\..\Run: [dmktc.tmp] C:\Windows\system32\dmktc.tmp
O4 - HKCU\..\Run: [dmpts.tmp] C:\Windows\system32\dmpts.tmp
O4 - HKCU\..\Run: [dmfvt.tmp] C:\Windows\system32\dmfvt.tmp
O4 - HKCU\..\Run: [dmacf.tmp] C:\Windows\system32\dmacf.tmp
O4 - HKCU\..\Run: [dmsnw.tmp] C:\Windows\system32\dmsnw.tmp
O4 - HKCU\..\Run: [dmjni.tmp] C:\Windows\system32\dmjni.tmp
O4 - HKCU\..\Run: [dmigx.tmp] C:\Windows\system32\dmigx.tmp
O4 - HKCU\..\Run: [WMPNSCFG] C:\Program Files\Windows Media Player\WMPNSCFG.exe
O4 - HKCU\..\Run: [fumkdk] c:\users\alain\appdata\local\fumkdk.exe fumkdk
O4 - HKCU\..\Run: [WinSpywareProtect] "C:\ProgramData\Adsl Software Ltd\WinSpywareProtect\Winspywareprotect.exe" /autorun
O4 - Global Startup: Empowering Technology Launcher.lnk = ?
O4 - Global Startup: Logitech SetPoint.lnk = C:\Program Files\Logitech\SetPoint\SetPoint.exe
O4 - Global Startup: Microsoft Office.lnk = C:\Program Files\Microsoft Office\Office\OSA9.EXE
O4 - Global Startup: Supervision de Photo Loader.lnk = C:\Program Files\CASIO\Photo Loader\Plauto.exe
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_06\bin\ssv.dll
O9 - Extra 'Tools' menuitem: Console Java (Sun) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_06\bin\ssv.dll
O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~2\Office12\REFIEBAR.DLL
O10 - Unknown file in Winsock LSP: c:\windows\system32\wpclsp.dll
O10 - Unknown file in Winsock LSP: c:\windows\system32\wpclsp.dll
O10 - Unknown file in Winsock LSP: c:\windows\system32\wpclsp.dll
O10 - Unknown file in Winsock LSP: c:\windows\system32\wpclsp.dll
O10 - Unknown file in Winsock LSP: c:\windows\system32\wpclsp.dll
O10 - Unknown file in Winsock LSP: c:\windows\system32\wpclsp.dll
O10 - Unknown file in Winsock LSP: c:\windows\system32\wpclsp.dll
O10 - Unknown file in Winsock LSP: c:\windows\system32\wpclsp.dll
O10 - Unknown file in Winsock LSP: c:\windows\system32\wpclsp.dll
O13 - Gopher Prefix:
O17 - HKLM\System\CCS\Services\Tcpip\..\{63561919-890E-4056-AF5B-4664EC7A0535}: NameServer = 85.255.115.28,85.255.112.200
O17 - HKLM\System\CCS\Services\Tcpip\..\{EFEA1FB9-7D8F-44D3-96B9-75CE629EE413}: NameServer = 85.255.115.28,85.255.112.200
O17 - HKLM\System\CS1\Services\Tcpip\Parameters: NameServer = 85.255.115.28 85.255.112.200
O17 - HKLM\System\CS2\Services\Tcpip\Parameters: NameServer = 85.255.115.28 85.255.112.200
O17 - HKLM\System\CCS\Services\Tcpip\Parameters: NameServer = 85.255.115.28 85.255.112.200
O23 - Service: avast! iAVS4 Control Service (aswUpdSv) - ALWIL Software - C:\Program Files\Alwil Software\Avast4\aswUpdSv.exe
O23 - Service: Ati External Event Utility - ATI Technologies Inc. - C:\Windows\system32\Ati2evxx.exe
O23 - Service: avast! Antivirus - ALWIL Software - C:\Program Files\Alwil Software\Avast4\ashServ.exe
O23 - Service: avast! Mail Scanner - ALWIL Software - C:\Program Files\Alwil Software\Avast4\ashMaiSv.exe
O23 - Service: avast! Web Scanner - ALWIL Software - C:\Program Files\Alwil Software\Avast4\ashWebSv.exe
O23 - Service: eDSService.exe (eDataSecurity Service) - HiTRSUT - C:\Acer\Empowering Technology\eDataSecurity\eDSService.exe
O23 - Service: eLock Service (eLockService) - Acer Inc. - C:\Acer\Empowering Technology\eLock\Service\eLockServ.exe
O23 - Service: eNet Service - Acer Inc. - C:\Acer\Empowering Technology\eNet\eNet Service.exe
O23 - Service: eRecovery Service (eRecoveryService) - Acer Inc. - C:\Acer\Empowering Technology\eRecovery\eRecoveryService.exe
O23 - Service: eSettings Service (eSettingsService) - Unknown owner - C:\Acer\Empowering Technology\eSettings\Service\capuserv.exe
O23 - Service: Logitech Bluetooth Service (LBTServ) - Logitech, Inc. - C:\Program Files\Common Files\Logishrd\Bluetooth\LBTServ.exe
O23 - Service: LightScribeService Direct Disc Labeling Service (LightScribeService) - Hewlett-Packard Company - C:\Program Files\Common Files\LightScribe\LSSrvc.exe
O23 - Service: LiveUpdate Notice Service - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\PIF\{B8E1DD85-8582-4c61-B58F-2F227FCA9A08}\PifSvc.exe
O23 - Service: MobilityService - Unknown owner - C:\Acer\Mobility Center\MobilityService.exe
O23 - Service: O2Micro Flash Memory Card Service (o2flash) - O2Micro International - C:\Program Files\O2Micro Oz128 Driver\o2flash.exe
O23 - Service: Planificateur LiveUpdate automatique - Unknown owner - C:\Program Files\Symantec\LiveUpdate\ALUSchedulerSvc.exe (file missing)
O23 - Service: Cyberlink RichVideo Service(CRVS) (RichVideo) - Unknown owner - C:\Program Files\CyberLink\Shared Files\RichVideo.exe
O23 - Service: ePower Service (WMIService) - acer - C:\Acer\Empowering Technology\ePower\ePowerSvc.exe
O23 - Service: XAudioService - Conexant Systems, Inc. - C:\Windows\system32\DRIVERS\xaudio.exe
j'ai plein de virus dans mon ordinateur, voici le rapport: Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 15:55:33, on 14/07/2008
Platform: Windows Vista (WinNT 6.00.1904)
MSIE: Internet Explorer v7.00 (7.00.6000.16609)
Boot mode: Normal
Running processes:
C:\Windows\system32\taskeng.exe
C:\Windows\system32\Dwm.exe
C:\Windows\Explorer.EXE
C:\Program Files\Alwil Software\Avast4\ashDisp.exe
C:\Program Files\Common Files\Symantec Shared\PIF\{B8E1DD85-8582-4c61-B58F-2F227FCA9A08}\PIFSvc.exe
C:\Program Files\Java\jre1.6.0_06\bin\jusched.exe
C:\Program Files\Windows Sidebar\sidebar.exe
C:\Windows\ehome\ehtray.exe
C:\Program Files\Windows Media Player\wmpnscfg.exe
C:\Users\alain\AppData\Local\fumkdk.exe
C:\Program Files\Logitech\SetPoint\SetPoint.exe
C:\Program Files\CASIO\Photo Loader\Plauto.exe
C:\Windows\ehome\ehmsas.exe
C:\Windows\system32\wbem\unsecapp.exe
C:\Acer\Empowering Technology\ENET\ENMTRAY.EXE
C:\Acer\Empowering Technology\EPOWER\EPOWER_DMC.EXE
C:\Acer\Empowering Technology\ACER.EMPOWERING.FRAMEWORK.SUPERVISOR.EXE
C:\Acer\Empowering Technology\eRecovery\ERAGENT.EXE
C:\Program Files\Common Files\Logishrd\KHAL2\KHALMNPR.EXE
C:\Windows\system32\wuauclt.exe
C:\Program Files\Mozilla Firefox\firefox.exe
C:\Users\alain\Desktop\HiJackThis.exe
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = https://www.bing.com/?toHttps=1&redig=5FC791212101479BAFBE1A679848B1AF
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = https://www.google.fr/?gws_rd=ssl
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = https://fr.yahoo.com/
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = https://www.bing.com/?toHttps=1&redig=5FC791212101479BAFBE1A679848B1AF
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = https://www.bing.com/?toHttps=1&redig=5FC791212101479BAFBE1A679848B1AF
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://ww17.ads.eorezo.com/cgi-bin/advert/getads.cgi?x_format=redirect&x_dp_id=9
R0 - HKLM\Software\Microsoft\Internet Explorer\Search,SearchAssistant =
R0 - HKLM\Software\Microsoft\Internet Explorer\Search,CustomizeSearch =
R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName =
O1 - Hosts: ::1 localhost
O2 - BHO: Yahoo! Toolbar Helper - {02478D38-C3F9-4EFB-9B51-7695ECA05670} - C:\Program Files\Yahoo!\Companion\Installs\cpn\yt.dll
O2 - BHO: Adobe PDF Reader Link Helper - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Common Files\Adobe\Acrobat\ActiveX\AcroIEHelper.dll
O2 - BHO: NCO 2.0 IE BHO - {602ADB0E-4AFF-4217-8AA1-95DAC4DFA408} - (no file)
O2 - BHO: EoRezoBHO - {64F56FC1-1272-44CD-BA6E-39723696E350} - C:\Program Files\EoRezo\EoAdv\EoRezoBHO.dll (file missing)
O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre1.6.0_06\bin\ssv.dll
O3 - Toolbar: Acer eDataSecurity Management - {5CBE3B7C-1E47-477e-A7DD-396DB0476E29} - C:\Windows\system32\eDStoolbar.dll
O3 - Toolbar: Yahoo! Toolbar avec bloqueur de fenêtres pop-up - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - C:\Program Files\Yahoo!\Companion\Installs\cpn\yt.dll
O3 - Toolbar: Easy-WebPrint - {327C2873-E90D-4c37-AA9D-10AC9BABA46C} - C:\Program Files\Canon\Easy-WebPrint\Toolband.dll (file missing)
O3 - Toolbar: (no name) - {7FEBEFE3-6B19-4349-98D2-FFB09D4B49CA} - (no file)
O3 - Toolbar: (no name) - {D0943516-5076-4020-A3B5-AEFAF26AB263} - (no file)
O4 - HKLM\..\Run: [avast!] C:\PROGRA~1\ALWILS~1\Avast4\ashDisp.exe
O4 - HKLM\..\Run: [Symantec PIF AlertEng] "C:\Program Files\Common Files\Symantec Shared\PIF\{B8E1DD85-8582-4c61-B58F-2F227FCA9A08}\PifSvc.exe" /a /m "C:\Program Files\Common Files\Symantec Shared\PIF\{B8E1DD85-8582-4c61-B58F-2F227FCA9A08}\AlertEng.dll"
O4 - HKLM\..\Run: [Kernel and Hardware Abstraction Layer] KHALMNPR.EXE
O4 - HKLM\..\Run: [SunJavaUpdateSched] "C:\Program Files\Java\jre1.6.0_06\bin\jusched.exe"
O4 - HKCU\..\Run: [Sidebar] C:\Program Files\Windows Sidebar\sidebar.exe /autoRun
O4 - HKCU\..\Run: [ehTray.exe] C:\Windows\ehome\ehTray.exe
O4 - HKCU\..\Run: [dmqpp.tmp] C:\Windows\system32\dmqpp.tmp
O4 - HKCU\..\Run: [dmaok.tmp] C:\Windows\system32\dmaok.tmp
O4 - HKCU\..\Run: [dmydd.tmp] C:\Windows\system32\dmydd.tmp
O4 - HKCU\..\Run: [dmhnn.tmp] C:\Windows\system32\dmhnn.tmp
O4 - HKCU\..\Run: [dmdkj.tmp] C:\Windows\system32\dmdkj.tmp
O4 - HKCU\..\Run: [dmmmh.tmp] C:\Windows\system32\dmmmh.tmp
O4 - HKCU\..\Run: [dmpob.tmp] C:\Windows\system32\dmpob.tmp
O4 - HKCU\..\Run: [dmdpv.tmp] C:\Windows\system32\dmdpv.tmp
O4 - HKCU\..\Run: [dmrwa.tmp] C:\Windows\system32\dmrwa.tmp
O4 - HKCU\..\Run: [dmdzj.tmp] C:\Windows\system32\dmdzj.tmp
O4 - HKCU\..\Run: [dmgej.tmp] C:\Windows\system32\dmgej.tmp
O4 - HKCU\..\Run: [dmwjj.tmp] C:\Windows\system32\dmwjj.tmp
O4 - HKCU\..\Run: [dmrio.tmp] C:\Windows\system32\dmrio.tmp
O4 - HKCU\..\Run: [dmghj.tmp] C:\Windows\system32\dmghj.tmp
O4 - HKCU\..\Run: [dmmkn.tmp] C:\Windows\system32\dmmkn.tmp
O4 - HKCU\..\Run: [dmwdc.tmp] C:\Windows\system32\dmwdc.tmp
O4 - HKCU\..\Run: [dmksc.tmp] C:\Windows\system32\dmksc.tmp
O4 - HKCU\..\Run: [dmczp.tmp] C:\Windows\system32\dmczp.tmp
O4 - HKCU\..\Run: [dmcup.tmp] C:\Windows\system32\dmcup.tmp
O4 - HKCU\..\Run: [dmhyz.tmp] C:\Windows\system32\dmhyz.tmp
O4 - HKCU\..\Run: [dmwuc.tmp] C:\Windows\system32\dmwuc.tmp
O4 - HKCU\..\Run: [dmssf.tmp] C:\Windows\system32\dmssf.tmp
O4 - HKCU\..\Run: [dmipp.tmp] C:\Windows\system32\dmipp.tmp
O4 - HKCU\..\Run: [dmycw.tmp] C:\Windows\system32\dmycw.tmp
O4 - HKCU\..\Run: [dmsxi.tmp] C:\Windows\system32\dmsxi.tmp
O4 - HKCU\..\Run: [dmqod.tmp] C:\Windows\system32\dmqod.tmp
O4 - HKCU\..\Run: [dmedo.tmp] C:\Windows\system32\dmedo.tmp
O4 - HKCU\..\Run: [dmpzd.tmp] C:\Windows\system32\dmpzd.tmp
O4 - HKCU\..\Run: [dmmuc.tmp] C:\Windows\system32\dmmuc.tmp
O4 - HKCU\..\Run: [dmmor.tmp] C:\Windows\system32\dmmor.tmp
O4 - HKCU\..\Run: [dmcag.tmp] C:\Windows\system32\dmcag.tmp
O4 - HKCU\..\Run: [dmnbw.tmp] C:\Windows\system32\dmnbw.tmp
O4 - HKCU\..\Run: [dmqtf.tmp] C:\Windows\system32\dmqtf.tmp
O4 - HKCU\..\Run: [dmfnt.tmp] C:\Windows\system32\dmfnt.tmp
O4 - HKCU\..\Run: [dmdan.tmp] C:\Windows\system32\dmdan.tmp
O4 - HKCU\..\Run: [dmzhp.tmp] C:\Windows\system32\dmzhp.tmp
O4 - HKCU\..\Run: [dmcat.tmp] C:\Windows\system32\dmcat.tmp
O4 - HKCU\..\Run: [dmtbu.tmp] C:\Windows\system32\dmtbu.tmp
O4 - HKCU\..\Run: [dmbxl.tmp] C:\Windows\system32\dmbxl.tmp
O4 - HKCU\..\Run: [dmajk.tmp] C:\Windows\system32\dmajk.tmp
O4 - HKCU\..\Run: [dmqvx.tmp] C:\Windows\system32\dmqvx.tmp
O4 - HKCU\..\Run: [dmwnc.tmp] C:\Windows\system32\dmwnc.tmp
O4 - HKCU\..\Run: [dmlwq.tmp] C:\Windows\system32\dmlwq.tmp
O4 - HKCU\..\Run: [dmrab.tmp] C:\Windows\system32\dmrab.tmp
O4 - HKCU\..\Run: [dmbyl.tmp] C:\Windows\system32\dmbyl.tmp
O4 - HKCU\..\Run: [dmwnl.tmp] C:\Windows\system32\dmwnl.tmp
O4 - HKCU\..\Run: [dmpix.tmp] C:\Windows\system32\dmpix.tmp
O4 - HKCU\..\Run: [dmezt.tmp] C:\Windows\system32\dmezt.tmp
O4 - HKCU\..\Run: [dmgjw.tmp] C:\Windows\system32\dmgjw.tmp
O4 - HKCU\..\Run: [dmgia.tmp] C:\Windows\system32\dmgia.tmp
O4 - HKCU\..\Run: [dmcfb.tmp] C:\Windows\system32\dmcfb.tmp
O4 - HKCU\..\Run: [dmqay.tmp] C:\Windows\system32\dmqay.tmp
O4 - HKCU\..\Run: [dmxnv.tmp] C:\Windows\system32\dmxnv.tmp
O4 - HKCU\..\Run: [dmesa.tmp] C:\Windows\system32\dmesa.tmp
O4 - HKCU\..\Run: [dmkbf.tmp] C:\Windows\system32\dmkbf.tmp
O4 - HKCU\..\Run: [dmiii.tmp] C:\Windows\system32\dmiii.tmp
O4 - HKCU\..\Run: [dmsmu.tmp] C:\Windows\system32\dmsmu.tmp
O4 - HKCU\..\Run: [dmzlu.tmp] C:\Windows\system32\dmzlu.tmp
O4 - HKCU\..\Run: [dmxix.tmp] C:\Windows\system32\dmxix.tmp
O4 - HKCU\..\Run: [dmhpd.tmp] C:\Windows\system32\dmhpd.tmp
O4 - HKCU\..\Run: [dmcdq.tmp] C:\Windows\system32\dmcdq.tmp
O4 - HKCU\..\Run: [dmieb.tmp] C:\Windows\system32\dmieb.tmp
O4 - HKCU\..\Run: [dmqna.tmp] C:\Windows\system32\dmqna.tmp
O4 - HKCU\..\Run: [dmuoi.tmp] C:\Windows\system32\dmuoi.tmp
O4 - HKCU\..\Run: [dmiiy.tmp] C:\Windows\system32\dmiiy.tmp
O4 - HKCU\..\Run: [dmpnh.tmp] C:\Windows\system32\dmpnh.tmp
O4 - HKCU\..\Run: [dmtbp.tmp] C:\Windows\system32\dmtbp.tmp
O4 - HKCU\..\Run: [dmlmj.tmp] C:\Windows\system32\dmlmj.tmp
O4 - HKCU\..\Run: [dmfqu.tmp] C:\Windows\system32\dmfqu.tmp
O4 - HKCU\..\Run: [dmivp.tmp] C:\Windows\system32\dmivp.tmp
O4 - HKCU\..\Run: [dmpmx.tmp] C:\Windows\system32\dmpmx.tmp
O4 - HKCU\..\Run: [dmrjk.tmp] C:\Windows\system32\dmrjk.tmp
O4 - HKCU\..\Run: [dmkbh.tmp] C:\Windows\system32\dmkbh.tmp
O4 - HKCU\..\Run: [dmsuc.tmp] C:\Windows\system32\dmsuc.tmp
O4 - HKCU\..\Run: [dmbsj.tmp] C:\Windows\system32\dmbsj.tmp
O4 - HKCU\..\Run: [dmwta.tmp] C:\Windows\system32\dmwta.tmp
O4 - HKCU\..\Run: [dmjkl.tmp] C:\Windows\system32\dmjkl.tmp
O4 - HKCU\..\Run: [dmrrr.tmp] C:\Windows\system32\dmrrr.tmp
O4 - HKCU\..\Run: [dmfea.tmp] C:\Windows\system32\dmfea.tmp
O4 - HKCU\..\Run: [dmeow.tmp] C:\Windows\system32\dmeow.tmp
O4 - HKCU\..\Run: [dmzch.tmp] C:\Windows\system32\dmzch.tmp
O4 - HKCU\..\Run: [dmyyk.tmp] C:\Windows\system32\dmyyk.tmp
O4 - HKCU\..\Run: [dmktc.tmp] C:\Windows\system32\dmktc.tmp
O4 - HKCU\..\Run: [dmpts.tmp] C:\Windows\system32\dmpts.tmp
O4 - HKCU\..\Run: [dmfvt.tmp] C:\Windows\system32\dmfvt.tmp
O4 - HKCU\..\Run: [dmacf.tmp] C:\Windows\system32\dmacf.tmp
O4 - HKCU\..\Run: [dmsnw.tmp] C:\Windows\system32\dmsnw.tmp
O4 - HKCU\..\Run: [dmjni.tmp] C:\Windows\system32\dmjni.tmp
O4 - HKCU\..\Run: [dmigx.tmp] C:\Windows\system32\dmigx.tmp
O4 - HKCU\..\Run: [WMPNSCFG] C:\Program Files\Windows Media Player\WMPNSCFG.exe
O4 - HKCU\..\Run: [fumkdk] c:\users\alain\appdata\local\fumkdk.exe fumkdk
O4 - HKCU\..\Run: [WinSpywareProtect] "C:\ProgramData\Adsl Software Ltd\WinSpywareProtect\Winspywareprotect.exe" /autorun
O4 - Global Startup: Empowering Technology Launcher.lnk = ?
O4 - Global Startup: Logitech SetPoint.lnk = C:\Program Files\Logitech\SetPoint\SetPoint.exe
O4 - Global Startup: Microsoft Office.lnk = C:\Program Files\Microsoft Office\Office\OSA9.EXE
O4 - Global Startup: Supervision de Photo Loader.lnk = C:\Program Files\CASIO\Photo Loader\Plauto.exe
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_06\bin\ssv.dll
O9 - Extra 'Tools' menuitem: Console Java (Sun) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_06\bin\ssv.dll
O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~2\Office12\REFIEBAR.DLL
O10 - Unknown file in Winsock LSP: c:\windows\system32\wpclsp.dll
O10 - Unknown file in Winsock LSP: c:\windows\system32\wpclsp.dll
O10 - Unknown file in Winsock LSP: c:\windows\system32\wpclsp.dll
O10 - Unknown file in Winsock LSP: c:\windows\system32\wpclsp.dll
O10 - Unknown file in Winsock LSP: c:\windows\system32\wpclsp.dll
O10 - Unknown file in Winsock LSP: c:\windows\system32\wpclsp.dll
O10 - Unknown file in Winsock LSP: c:\windows\system32\wpclsp.dll
O10 - Unknown file in Winsock LSP: c:\windows\system32\wpclsp.dll
O10 - Unknown file in Winsock LSP: c:\windows\system32\wpclsp.dll
O13 - Gopher Prefix:
O17 - HKLM\System\CCS\Services\Tcpip\..\{63561919-890E-4056-AF5B-4664EC7A0535}: NameServer = 85.255.115.28,85.255.112.200
O17 - HKLM\System\CCS\Services\Tcpip\..\{EFEA1FB9-7D8F-44D3-96B9-75CE629EE413}: NameServer = 85.255.115.28,85.255.112.200
O17 - HKLM\System\CS1\Services\Tcpip\Parameters: NameServer = 85.255.115.28 85.255.112.200
O17 - HKLM\System\CS2\Services\Tcpip\Parameters: NameServer = 85.255.115.28 85.255.112.200
O17 - HKLM\System\CCS\Services\Tcpip\Parameters: NameServer = 85.255.115.28 85.255.112.200
O23 - Service: avast! iAVS4 Control Service (aswUpdSv) - ALWIL Software - C:\Program Files\Alwil Software\Avast4\aswUpdSv.exe
O23 - Service: Ati External Event Utility - ATI Technologies Inc. - C:\Windows\system32\Ati2evxx.exe
O23 - Service: avast! Antivirus - ALWIL Software - C:\Program Files\Alwil Software\Avast4\ashServ.exe
O23 - Service: avast! Mail Scanner - ALWIL Software - C:\Program Files\Alwil Software\Avast4\ashMaiSv.exe
O23 - Service: avast! Web Scanner - ALWIL Software - C:\Program Files\Alwil Software\Avast4\ashWebSv.exe
O23 - Service: eDSService.exe (eDataSecurity Service) - HiTRSUT - C:\Acer\Empowering Technology\eDataSecurity\eDSService.exe
O23 - Service: eLock Service (eLockService) - Acer Inc. - C:\Acer\Empowering Technology\eLock\Service\eLockServ.exe
O23 - Service: eNet Service - Acer Inc. - C:\Acer\Empowering Technology\eNet\eNet Service.exe
O23 - Service: eRecovery Service (eRecoveryService) - Acer Inc. - C:\Acer\Empowering Technology\eRecovery\eRecoveryService.exe
O23 - Service: eSettings Service (eSettingsService) - Unknown owner - C:\Acer\Empowering Technology\eSettings\Service\capuserv.exe
O23 - Service: Logitech Bluetooth Service (LBTServ) - Logitech, Inc. - C:\Program Files\Common Files\Logishrd\Bluetooth\LBTServ.exe
O23 - Service: LightScribeService Direct Disc Labeling Service (LightScribeService) - Hewlett-Packard Company - C:\Program Files\Common Files\LightScribe\LSSrvc.exe
O23 - Service: LiveUpdate Notice Service - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\PIF\{B8E1DD85-8582-4c61-B58F-2F227FCA9A08}\PifSvc.exe
O23 - Service: MobilityService - Unknown owner - C:\Acer\Mobility Center\MobilityService.exe
O23 - Service: O2Micro Flash Memory Card Service (o2flash) - O2Micro International - C:\Program Files\O2Micro Oz128 Driver\o2flash.exe
O23 - Service: Planificateur LiveUpdate automatique - Unknown owner - C:\Program Files\Symantec\LiveUpdate\ALUSchedulerSvc.exe (file missing)
O23 - Service: Cyberlink RichVideo Service(CRVS) (RichVideo) - Unknown owner - C:\Program Files\CyberLink\Shared Files\RichVideo.exe
O23 - Service: ePower Service (WMIService) - acer - C:\Acer\Empowering Technology\ePower\ePowerSvc.exe
O23 - Service: XAudioService - Conexant Systems, Inc. - C:\Windows\system32\DRIVERS\xaudio.exe
A voir également:
- Rapport hijackthis
- Hijackthis - Télécharger - Antivirus & Antimalwares
- Plan rapport de stage - Guide
- Rapport de crash windows - Guide
- Impression rapport de stage ✓ - Forum Word
- Modifier rapport d'échelle pdf xchange viewer ✓ - Forum PDF
12 réponses
Salut
en effet
Désactive le contrôle des comptes utilisateurs (tu le réactiveras après ta désinfection):
- Vas dans "Démarrer" puis Panneau de configuration.
- Double Clique sur l'icône Comptes d'utilisateurs et sur Activer ou désactiver le contrôle des comptes d'utilisateurs.
- Clique sur Continuer.
- Décoche la case Utiliser le contrôle des comptes d'utilisateurs pour vous aider à protéger votre ordinateur.
- Valide par OK et redémarre.
ensuite :
* Télécharge FixWareout de ce site sur le bureau:
http://downloads.subratam.org/Fixwareout.exe
hxxp://swandog46.geekstogo.com/Fixwareout.exe
* Lance le fix: clique sur Next, puis Install, puis assure toi que "Run fixit" est activé puis clique sur Finish.
Le fix va commencer, suis les messages à l'écran. Il te sera demandé de redémarrer ton ordinateur, fais le. Ton système mettra un peu plus de temps au démarrage, c'est normal.
*Poste (Copie/colle) le contenu du rapport qui va s'afficher à l'écran (report.txt) avec un nouveau rapport HijackThis! dans ta prochaine réponse.
ensuite :
# Télécharge ceci: (merci a S!RI pour ce petit programme).
http://siri.urz.free.fr/Fix/SmitfraudFix.zip
Exécute le, Double click sur Smitfraudfix.cmd choisit l’option 1,
voila a quoi cela ressemble : http://siri.urz.free.fr/Fix/SmitfraudFix.php
il va générer un rapport : copie/colle le sur le poste stp.
en effet
Désactive le contrôle des comptes utilisateurs (tu le réactiveras après ta désinfection):
- Vas dans "Démarrer" puis Panneau de configuration.
- Double Clique sur l'icône Comptes d'utilisateurs et sur Activer ou désactiver le contrôle des comptes d'utilisateurs.
- Clique sur Continuer.
- Décoche la case Utiliser le contrôle des comptes d'utilisateurs pour vous aider à protéger votre ordinateur.
- Valide par OK et redémarre.
ensuite :
* Télécharge FixWareout de ce site sur le bureau:
http://downloads.subratam.org/Fixwareout.exe
hxxp://swandog46.geekstogo.com/Fixwareout.exe
* Lance le fix: clique sur Next, puis Install, puis assure toi que "Run fixit" est activé puis clique sur Finish.
Le fix va commencer, suis les messages à l'écran. Il te sera demandé de redémarrer ton ordinateur, fais le. Ton système mettra un peu plus de temps au démarrage, c'est normal.
*Poste (Copie/colle) le contenu du rapport qui va s'afficher à l'écran (report.txt) avec un nouveau rapport HijackThis! dans ta prochaine réponse.
ensuite :
# Télécharge ceci: (merci a S!RI pour ce petit programme).
http://siri.urz.free.fr/Fix/SmitfraudFix.zip
Exécute le, Double click sur Smitfraudfix.cmd choisit l’option 1,
voila a quoi cela ressemble : http://siri.urz.free.fr/Fix/SmitfraudFix.php
il va générer un rapport : copie/colle le sur le poste stp.
alain195256
Messages postés
3
Statut
Membre
lorsque j'appuie sur une touche l'écran noir disparait
fais un clic droit sur hijackthis
choisi executer en tant qu administrateur
fais scan only
coche ces lignes :
O17 - HKLM\System\CS1\Services\Tcpip\Parameters: NameServer = 85.255.115.28 85.255.112.200
O17 - HKLM\System\CS2\Services\Tcpip\Parameters: NameServer = 85.255.115.28 85.255.112.200
O17 - HKLM\System\CCS\Services\Tcpip\Parameters: NameServer = 85.255.115.28 85.255.112.200
et clic sur fix checked
ensuite :
-> Redémarre en mode sans échec :
Comment redémarrer en mode sans echec?
Tu redemarre le pc et tapote la touche F8 des le début de l allumage sans t´arrêter.
Une fenêtre sur fond noir va s’ouvrir, tu te déplaces avec les flèches du clavier sur démarrer en mode sans échec puis tape entrée.
Une fois sur le bureau si il n y a pas toutes les couleurs et autres c´est normal!
Ps : si F8 ne marche pas utilise la touche F5.
click sur demarrer > executer > dans la boite de dialogue tape > cmd et valide
dans la fenetre noir tape ceci : ipconfig /flushdns et valide par entree
ensuite en mode normal :
Telecharge malwarebytes
-> http://www.malwarebytes.org/mbam/program/mbam-setup.exe
Tu l´instale; le programme va se mettre automatiquement a jour.
Une fois a jour, le programme va se lancer; click sur l´onglet parametre, et coche la case : "Arreter internet explorer pendant la suppression".
Click maintenant sur l´onglet recherche et coche la case : "executer un examen complet".
Puis click sur "rechercher".
Laisse le scanner le pc...
Si des elements on ete trouvés > click sur supprimer la selection.
si il t´es demandé de redemarrer > click sur "yes".
A la fin un rapport va s´ouvrir; sauvegarde le de maniere a le retrouver en vu de le poster sur le forum.
Copie et colle le rapport stp.
ps : les rapport sont aussi rangé dans l onglet rapport/log
choisi executer en tant qu administrateur
fais scan only
coche ces lignes :
O17 - HKLM\System\CS1\Services\Tcpip\Parameters: NameServer = 85.255.115.28 85.255.112.200
O17 - HKLM\System\CS2\Services\Tcpip\Parameters: NameServer = 85.255.115.28 85.255.112.200
O17 - HKLM\System\CCS\Services\Tcpip\Parameters: NameServer = 85.255.115.28 85.255.112.200
et clic sur fix checked
ensuite :
-> Redémarre en mode sans échec :
Comment redémarrer en mode sans echec?
Tu redemarre le pc et tapote la touche F8 des le début de l allumage sans t´arrêter.
Une fenêtre sur fond noir va s’ouvrir, tu te déplaces avec les flèches du clavier sur démarrer en mode sans échec puis tape entrée.
Une fois sur le bureau si il n y a pas toutes les couleurs et autres c´est normal!
Ps : si F8 ne marche pas utilise la touche F5.
click sur demarrer > executer > dans la boite de dialogue tape > cmd et valide
dans la fenetre noir tape ceci : ipconfig /flushdns et valide par entree
ensuite en mode normal :
Telecharge malwarebytes
-> http://www.malwarebytes.org/mbam/program/mbam-setup.exe
Tu l´instale; le programme va se mettre automatiquement a jour.
Une fois a jour, le programme va se lancer; click sur l´onglet parametre, et coche la case : "Arreter internet explorer pendant la suppression".
Click maintenant sur l´onglet recherche et coche la case : "executer un examen complet".
Puis click sur "rechercher".
Laisse le scanner le pc...
Si des elements on ete trouvés > click sur supprimer la selection.
si il t´es demandé de redemarrer > click sur "yes".
A la fin un rapport va s´ouvrir; sauvegarde le de maniere a le retrouver en vu de le poster sur le forum.
Copie et colle le rapport stp.
ps : les rapport sont aussi rangé dans l onglet rapport/log
Vous n’avez pas trouvé la réponse que vous recherchez ?
Posez votre question
salut a mon avis il en reste
de plus tu as un detournement de DNS donc envoi le rapport malewarebyte + un nouveau rapport hijackthis stp
de plus tu as un detournement de DNS donc envoi le rapport malewarebyte + un nouveau rapport hijackthis stp
Malwarebytes' Anti-Malware 1.20
Version de la base de données: 948
Windows 6.0.6000
20:54:46 14/07/2008
mbam-log-7-14-2008 (20-54-46).txt
Type de recherche: Examen complet (C:\|D:\|)
Eléments examinés: 121655
Temps écoulé: 2 hour(s), 1 minute(s), 2 second(s)
Processus mémoire infecté(s): 0
Module(s) mémoire infecté(s): 0
Clé(s) du Registre infectée(s): 10
Valeur(s) du Registre infectée(s): 1
Elément(s) de données du Registre infecté(s): 9
Dossier(s) infecté(s): 15
Fichier(s) infecté(s): 22
Processus mémoire infecté(s):
(Aucun élément nuisible détecté)
Module(s) mémoire infecté(s):
(Aucun élément nuisible détecté)
Clé(s) du Registre infectée(s):
HKEY_CLASSES_ROOT\CLSID\{df1c8e21-4045-4d67-b528-335f1a4f0de9} (Adware.Navipromo) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\ParisHilton (Adware.NaviPromo) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\ParisHilton (Adware.NaviPromo) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Adsl Software Ltd (Trojan.FakeAlert) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\hostie.bho (Adware.Zango) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\hostie.bho.1 (Adware.Zango) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\hbr.hbmain (Adware.Zango) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\hbr.hbmain.1 (Adware.Zango) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\hbmain.commband (Adware.Zango) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\hbmain.commband.1 (Adware.Zango) -> Quarantined and deleted successfully.
Valeur(s) du Registre infectée(s):
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\winspywareprotect (Rogue.WinSpywareProtect) -> Quarantined and deleted successfully.
Elément(s) de données du Registre infecté(s):
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters\NameServer (Trojan.DNSChanger) -> Data: 85.255.115.28 85.255.112.200 -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters\Interfaces\{63561919-890e-4056-af5b-4664ec7a0535}\NameServer (Trojan.DNSChanger) -> Data: 85.255.115.28,85.255.112.200 -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters\Interfaces\{efea1fb9-7d8f-44d3-96b9-75ce629ee413}\NameServer (Trojan.DNSChanger) -> Data: 85.255.115.28,85.255.112.200 -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\Tcpip\Parameters\NameServer (Trojan.DNSChanger) -> Data: 85.255.115.28 85.255.112.200 -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\Tcpip\Parameters\Interfaces\{63561919-890e-4056-af5b-4664ec7a0535}\NameServer (Trojan.DNSChanger) -> Data: 85.255.115.28,85.255.112.200 -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\Tcpip\Parameters\Interfaces\{efea1fb9-7d8f-44d3-96b9-75ce629ee413}\NameServer (Trojan.DNSChanger) -> Data: 85.255.115.28,85.255.112.200 -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\Tcpip\Parameters\NameServer (Trojan.DNSChanger) -> Data: 85.255.115.28 85.255.112.200 -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\Tcpip\Parameters\Interfaces\{63561919-890e-4056-af5b-4664ec7a0535}\NameServer (Trojan.DNSChanger) -> Data: 85.255.115.28,85.255.112.200 -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\Tcpip\Parameters\Interfaces\{efea1fb9-7d8f-44d3-96b9-75ce629ee413}\NameServer (Trojan.DNSChanger) -> Data: 85.255.115.28,85.255.112.200 -> Quarantined and deleted successfully.
Dossier(s) infecté(s):
C:\Program Files\Instant Access (Adware.EGDAccess) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Center (Adware.EGDAccess) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\DesktopIcons (Adware.EGDAccess) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Multi (Adware.EGDAccess) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Multi\20080418180415 (Adware.EGDAccess) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Multi\20080418180415\Common (Adware.EGDAccess) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Multi\20080418180415\js (Adware.EGDAccess) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Multi\20080418180415\medias (Adware.EGDAccess) -> Quarantined and deleted successfully.
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Spyware-Secure (Rogue.Spyware-Secure) -> Quarantined and deleted successfully.
C:\ProgramData\ADSL Software Ltd (Rogue.Multiple) -> Quarantined and deleted successfully.
C:\ProgramData\ADSL Software Ltd\WinSpywareProtect (Rogue.Multiple) -> Quarantined and deleted successfully.
C:\ProgramData\ADSL Software Ltd\WinSpywareProtect\BASE (Rogue.Multiple) -> Quarantined and deleted successfully.
C:\ProgramData\ADSL Software Ltd\WinSpywareProtect\DELETED (Rogue.Multiple) -> Quarantined and deleted successfully.
C:\ProgramData\ADSL Software Ltd\WinSpywareProtect\LOG (Rogue.Multiple) -> Quarantined and deleted successfully.
C:\ProgramData\ADSL Software Ltd\WinSpywareProtect\SAVED (Rogue.Multiple) -> Quarantined and deleted successfully.
Fichier(s) infecté(s):
C:\Program Files\Instant Access\Center\SuperBabes.lnk (Adware.EGDAccess) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Center\tray1.ico (Adware.EGDAccess) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\DesktopIcons\SuperBabes.lnk (Adware.EGDAccess) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Multi\20080418180415\dialerexe.ini (Adware.EGDAccess) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Multi\20080418180415\instant access.exe (Adware.EGDAccess) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Multi\20080418180415\Common\module.php (Adware.EGDAccess) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Multi\20080418180415\Common\module.php_0.loginvis (Adware.EGDAccess) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Multi\20080418180415\js\js_api_dialer.php (Adware.EGDAccess) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Multi\20080418180415\medias\button1.gif (Adware.EGDAccess) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Multi\20080418180415\medias\button2.gif (Adware.EGDAccess) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Multi\20080418180415\medias\button3.gif (Adware.EGDAccess) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Multi\20080418180415\medias\button4.gif (Adware.EGDAccess) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Multi\20080418180415\medias\dialer.ico (Adware.EGDAccess) -> Quarantined and deleted successfully.
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Spyware-Secure\Spyware-Secure trial.lnk (Rogue.Spyware-Secure) -> Quarantined and deleted successfully.
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Spyware-Secure\Website.lnk (Rogue.Spyware-Secure) -> Quarantined and deleted successfully.
C:\ProgramData\ADSL Software Ltd\WinSpywareProtect\LOG\20080708174929496.log (Rogue.Multiple) -> Quarantined and deleted successfully.
C:\ProgramData\ADSL Software Ltd\WinSpywareProtect\LOG\20080708184355475.log (Rogue.Multiple) -> Quarantined and deleted successfully.
C:\ProgramData\ADSL Software Ltd\WinSpywareProtect\LOG\20080709173442245.log (Rogue.Multiple) -> Quarantined and deleted successfully.
C:\ProgramData\ADSL Software Ltd\WinSpywareProtect\LOG\20080711182845093.log (Rogue.Multiple) -> Quarantined and deleted successfully.
C:\Windows\System32\nsinet.exe (Adware.NaviPromo) -> Quarantined and deleted successfully.
C:\Windows\dialerexe.ini (Adware.NaviPromo) -> Quarantined and deleted successfully.
C:\Windows\System32\nvs2.inf (Adware.EGDAccess) -> Quarantined and deleted successfully.
Version de la base de données: 948
Windows 6.0.6000
20:54:46 14/07/2008
mbam-log-7-14-2008 (20-54-46).txt
Type de recherche: Examen complet (C:\|D:\|)
Eléments examinés: 121655
Temps écoulé: 2 hour(s), 1 minute(s), 2 second(s)
Processus mémoire infecté(s): 0
Module(s) mémoire infecté(s): 0
Clé(s) du Registre infectée(s): 10
Valeur(s) du Registre infectée(s): 1
Elément(s) de données du Registre infecté(s): 9
Dossier(s) infecté(s): 15
Fichier(s) infecté(s): 22
Processus mémoire infecté(s):
(Aucun élément nuisible détecté)
Module(s) mémoire infecté(s):
(Aucun élément nuisible détecté)
Clé(s) du Registre infectée(s):
HKEY_CLASSES_ROOT\CLSID\{df1c8e21-4045-4d67-b528-335f1a4f0de9} (Adware.Navipromo) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\ParisHilton (Adware.NaviPromo) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\ParisHilton (Adware.NaviPromo) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Adsl Software Ltd (Trojan.FakeAlert) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\hostie.bho (Adware.Zango) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\hostie.bho.1 (Adware.Zango) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\hbr.hbmain (Adware.Zango) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\hbr.hbmain.1 (Adware.Zango) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\hbmain.commband (Adware.Zango) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\hbmain.commband.1 (Adware.Zango) -> Quarantined and deleted successfully.
Valeur(s) du Registre infectée(s):
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\winspywareprotect (Rogue.WinSpywareProtect) -> Quarantined and deleted successfully.
Elément(s) de données du Registre infecté(s):
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters\NameServer (Trojan.DNSChanger) -> Data: 85.255.115.28 85.255.112.200 -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters\Interfaces\{63561919-890e-4056-af5b-4664ec7a0535}\NameServer (Trojan.DNSChanger) -> Data: 85.255.115.28,85.255.112.200 -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters\Interfaces\{efea1fb9-7d8f-44d3-96b9-75ce629ee413}\NameServer (Trojan.DNSChanger) -> Data: 85.255.115.28,85.255.112.200 -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\Tcpip\Parameters\NameServer (Trojan.DNSChanger) -> Data: 85.255.115.28 85.255.112.200 -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\Tcpip\Parameters\Interfaces\{63561919-890e-4056-af5b-4664ec7a0535}\NameServer (Trojan.DNSChanger) -> Data: 85.255.115.28,85.255.112.200 -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\Tcpip\Parameters\Interfaces\{efea1fb9-7d8f-44d3-96b9-75ce629ee413}\NameServer (Trojan.DNSChanger) -> Data: 85.255.115.28,85.255.112.200 -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\Tcpip\Parameters\NameServer (Trojan.DNSChanger) -> Data: 85.255.115.28 85.255.112.200 -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\Tcpip\Parameters\Interfaces\{63561919-890e-4056-af5b-4664ec7a0535}\NameServer (Trojan.DNSChanger) -> Data: 85.255.115.28,85.255.112.200 -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\Tcpip\Parameters\Interfaces\{efea1fb9-7d8f-44d3-96b9-75ce629ee413}\NameServer (Trojan.DNSChanger) -> Data: 85.255.115.28,85.255.112.200 -> Quarantined and deleted successfully.
Dossier(s) infecté(s):
C:\Program Files\Instant Access (Adware.EGDAccess) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Center (Adware.EGDAccess) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\DesktopIcons (Adware.EGDAccess) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Multi (Adware.EGDAccess) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Multi\20080418180415 (Adware.EGDAccess) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Multi\20080418180415\Common (Adware.EGDAccess) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Multi\20080418180415\js (Adware.EGDAccess) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Multi\20080418180415\medias (Adware.EGDAccess) -> Quarantined and deleted successfully.
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Spyware-Secure (Rogue.Spyware-Secure) -> Quarantined and deleted successfully.
C:\ProgramData\ADSL Software Ltd (Rogue.Multiple) -> Quarantined and deleted successfully.
C:\ProgramData\ADSL Software Ltd\WinSpywareProtect (Rogue.Multiple) -> Quarantined and deleted successfully.
C:\ProgramData\ADSL Software Ltd\WinSpywareProtect\BASE (Rogue.Multiple) -> Quarantined and deleted successfully.
C:\ProgramData\ADSL Software Ltd\WinSpywareProtect\DELETED (Rogue.Multiple) -> Quarantined and deleted successfully.
C:\ProgramData\ADSL Software Ltd\WinSpywareProtect\LOG (Rogue.Multiple) -> Quarantined and deleted successfully.
C:\ProgramData\ADSL Software Ltd\WinSpywareProtect\SAVED (Rogue.Multiple) -> Quarantined and deleted successfully.
Fichier(s) infecté(s):
C:\Program Files\Instant Access\Center\SuperBabes.lnk (Adware.EGDAccess) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Center\tray1.ico (Adware.EGDAccess) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\DesktopIcons\SuperBabes.lnk (Adware.EGDAccess) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Multi\20080418180415\dialerexe.ini (Adware.EGDAccess) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Multi\20080418180415\instant access.exe (Adware.EGDAccess) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Multi\20080418180415\Common\module.php (Adware.EGDAccess) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Multi\20080418180415\Common\module.php_0.loginvis (Adware.EGDAccess) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Multi\20080418180415\js\js_api_dialer.php (Adware.EGDAccess) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Multi\20080418180415\medias\button1.gif (Adware.EGDAccess) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Multi\20080418180415\medias\button2.gif (Adware.EGDAccess) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Multi\20080418180415\medias\button3.gif (Adware.EGDAccess) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Multi\20080418180415\medias\button4.gif (Adware.EGDAccess) -> Quarantined and deleted successfully.
C:\Program Files\Instant Access\Multi\20080418180415\medias\dialer.ico (Adware.EGDAccess) -> Quarantined and deleted successfully.
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Spyware-Secure\Spyware-Secure trial.lnk (Rogue.Spyware-Secure) -> Quarantined and deleted successfully.
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Spyware-Secure\Website.lnk (Rogue.Spyware-Secure) -> Quarantined and deleted successfully.
C:\ProgramData\ADSL Software Ltd\WinSpywareProtect\LOG\20080708174929496.log (Rogue.Multiple) -> Quarantined and deleted successfully.
C:\ProgramData\ADSL Software Ltd\WinSpywareProtect\LOG\20080708184355475.log (Rogue.Multiple) -> Quarantined and deleted successfully.
C:\ProgramData\ADSL Software Ltd\WinSpywareProtect\LOG\20080709173442245.log (Rogue.Multiple) -> Quarantined and deleted successfully.
C:\ProgramData\ADSL Software Ltd\WinSpywareProtect\LOG\20080711182845093.log (Rogue.Multiple) -> Quarantined and deleted successfully.
C:\Windows\System32\nsinet.exe (Adware.NaviPromo) -> Quarantined and deleted successfully.
C:\Windows\dialerexe.ini (Adware.NaviPromo) -> Quarantined and deleted successfully.
C:\Windows\System32\nvs2.inf (Adware.EGDAccess) -> Quarantined and deleted successfully.
réouvre malewarebyte
va sur quarantaine
supprime tout
ensuite refais un scan hijackthis et post le rapport stp
va sur quarantaine
supprime tout
ensuite refais un scan hijackthis et post le rapport stp
voici le rapport
Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 15:31:25, on 16/07/2008
Platform: Windows Vista (WinNT 6.00.1904)
MSIE: Internet Explorer v7.00 (7.00.6000.16681)
Boot mode: Normal
Running processes:
C:\Windows\system32\Dwm.exe
C:\Windows\Explorer.EXE
C:\Program Files\Alwil Software\Avast4\ashDisp.exe
C:\Program Files\Common Files\Symantec Shared\PIF\{B8E1DD85-8582-4c61-B58F-2F227FCA9A08}\PIFSvc.exe
C:\Program Files\Java\jre1.6.0_06\bin\jusched.exe
C:\Program Files\Synaptics\SynTP\SynTPEnh.exe
C:\Program Files\Windows Sidebar\sidebar.exe
C:\Windows\ehome\ehtray.exe
C:\Program Files\Windows Media Player\wmpnscfg.exe
C:\Users\alain\AppData\Local\fumkdk.exe
C:\Windows\system32\taskeng.exe
C:\Program Files\Logitech\SetPoint\LBTWiz.exe
C:\Windows\ehome\ehmsas.exe
C:\Program Files\Logitech\SetPoint\SetPoint.exe
C:\Program Files\CASIO\Photo Loader\Plauto.exe
C:\Acer\Empowering Technology\ENET\ENMTRAY.EXE
C:\Program Files\Common Files\Logishrd\KHAL2\KHALMNPR.EXE
C:\Acer\Empowering Technology\EPOWER\EPOWER_DMC.EXE
C:\Acer\Empowering Technology\ACER.EMPOWERING.FRAMEWORK.SUPERVISOR.EXE
C:\Acer\Empowering Technology\eRecovery\ERAGENT.EXE
C:\Windows\system32\wbem\unsecapp.exe
C:\Program Files\Mozilla Firefox\firefox.exe
C:\Users\alain\Desktop\HiJackThis.exe
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = https://www.bing.com/?toHttps=1&redig=5FC791212101479BAFBE1A679848B1AF
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = https://www.google.fr/?gws_rd=ssl
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://fr.fr.acer.yahoo.com
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = https://www.bing.com/?toHttps=1&redig=5FC791212101479BAFBE1A679848B1AF
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://ww17.ads.eorezo.com/cgi-bin/advert/getads.cgi?x_format=redirect&x_dp_id=9
R0 - HKLM\Software\Microsoft\Internet Explorer\Search,SearchAssistant =
R0 - HKLM\Software\Microsoft\Internet Explorer\Search,CustomizeSearch =
R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName =
O1 - Hosts: ::1 localhost
O2 - BHO: Yahoo! Toolbar Helper - {02478D38-C3F9-4EFB-9B51-7695ECA05670} - C:\Program Files\Yahoo!\Companion\Installs\cpn\yt.dll
O2 - BHO: Adobe PDF Reader Link Helper - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Common Files\Adobe\Acrobat\ActiveX\AcroIEHelper.dll
O2 - BHO: NCO 2.0 IE BHO - {602ADB0E-4AFF-4217-8AA1-95DAC4DFA408} - (no file)
O2 - BHO: EoRezoBHO - {64F56FC1-1272-44CD-BA6E-39723696E350} - C:\Program Files\EoRezo\EoAdv\EoRezoBHO.dll (file missing)
O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre1.6.0_06\bin\ssv.dll
O3 - Toolbar: Acer eDataSecurity Management - {5CBE3B7C-1E47-477e-A7DD-396DB0476E29} - C:\Windows\system32\eDStoolbar.dll
O3 - Toolbar: Yahoo! Toolbar avec bloqueur de fenêtres pop-up - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - C:\Program Files\Yahoo!\Companion\Installs\cpn\yt.dll
O3 - Toolbar: Easy-WebPrint - {327C2873-E90D-4c37-AA9D-10AC9BABA46C} - C:\Program Files\Canon\Easy-WebPrint\Toolband.dll (file missing)
O3 - Toolbar: (no name) - {7FEBEFE3-6B19-4349-98D2-FFB09D4B49CA} - (no file)
O3 - Toolbar: (no name) - {D0943516-5076-4020-A3B5-AEFAF26AB263} - (no file)
O4 - HKLM\..\Run: [avast!] C:\PROGRA~1\ALWILS~1\Avast4\ashDisp.exe
O4 - HKLM\..\Run: [Symantec PIF AlertEng] "C:\Program Files\Common Files\Symantec Shared\PIF\{B8E1DD85-8582-4c61-B58F-2F227FCA9A08}\PifSvc.exe" /a /m "C:\Program Files\Common Files\Symantec Shared\PIF\{B8E1DD85-8582-4c61-B58F-2F227FCA9A08}\AlertEng.dll"
O4 - HKLM\..\Run: [Kernel and Hardware Abstraction Layer] KHALMNPR.EXE
O4 - HKLM\..\Run: [SunJavaUpdateSched] "C:\Program Files\Java\jre1.6.0_06\bin\jusched.exe"
O4 - HKLM\..\Run: [SynTPEnh] C:\Program Files\Synaptics\SynTP\SynTPEnh.exe
O4 - HKCU\..\Run: [Sidebar] C:\Program Files\Windows Sidebar\sidebar.exe /autoRun
O4 - HKCU\..\Run: [ehTray.exe] C:\Windows\ehome\ehTray.exe
O4 - HKCU\..\Run: [dmqpp.tmp] C:\Windows\system32\dmqpp.tmp
O4 - HKCU\..\Run: [dmaok.tmp] C:\Windows\system32\dmaok.tmp
O4 - HKCU\..\Run: [dmydd.tmp] C:\Windows\system32\dmydd.tmp
O4 - HKCU\..\Run: [dmhnn.tmp] C:\Windows\system32\dmhnn.tmp
O4 - HKCU\..\Run: [dmdkj.tmp] C:\Windows\system32\dmdkj.tmp
O4 - HKCU\..\Run: [dmmmh.tmp] C:\Windows\system32\dmmmh.tmp
O4 - HKCU\..\Run: [dmpob.tmp] C:\Windows\system32\dmpob.tmp
O4 - HKCU\..\Run: [dmdpv.tmp] C:\Windows\system32\dmdpv.tmp
O4 - HKCU\..\Run: [dmrwa.tmp] C:\Windows\system32\dmrwa.tmp
O4 - HKCU\..\Run: [dmdzj.tmp] C:\Windows\system32\dmdzj.tmp
O4 - HKCU\..\Run: [dmgej.tmp] C:\Windows\system32\dmgej.tmp
O4 - HKCU\..\Run: [dmwjj.tmp] C:\Windows\system32\dmwjj.tmp
O4 - HKCU\..\Run: [dmrio.tmp] C:\Windows\system32\dmrio.tmp
O4 - HKCU\..\Run: [dmghj.tmp] C:\Windows\system32\dmghj.tmp
O4 - HKCU\..\Run: [dmmkn.tmp] C:\Windows\system32\dmmkn.tmp
O4 - HKCU\..\Run: [dmwdc.tmp] C:\Windows\system32\dmwdc.tmp
O4 - HKCU\..\Run: [dmksc.tmp] C:\Windows\system32\dmksc.tmp
O4 - HKCU\..\Run: [dmczp.tmp] C:\Windows\system32\dmczp.tmp
O4 - HKCU\..\Run: [dmcup.tmp] C:\Windows\system32\dmcup.tmp
O4 - HKCU\..\Run: [dmhyz.tmp] C:\Windows\system32\dmhyz.tmp
O4 - HKCU\..\Run: [dmwuc.tmp] C:\Windows\system32\dmwuc.tmp
O4 - HKCU\..\Run: [dmssf.tmp] C:\Windows\system32\dmssf.tmp
O4 - HKCU\..\Run: [dmipp.tmp] C:\Windows\system32\dmipp.tmp
O4 - HKCU\..\Run: [dmycw.tmp] C:\Windows\system32\dmycw.tmp
O4 - HKCU\..\Run: [dmsxi.tmp] C:\Windows\system32\dmsxi.tmp
O4 - HKCU\..\Run: [dmqod.tmp] C:\Windows\system32\dmqod.tmp
O4 - HKCU\..\Run: [dmedo.tmp] C:\Windows\system32\dmedo.tmp
O4 - HKCU\..\Run: [dmpzd.tmp] C:\Windows\system32\dmpzd.tmp
O4 - HKCU\..\Run: [dmmuc.tmp] C:\Windows\system32\dmmuc.tmp
O4 - HKCU\..\Run: [dmmor.tmp] C:\Windows\system32\dmmor.tmp
O4 - HKCU\..\Run: [dmcag.tmp] C:\Windows\system32\dmcag.tmp
O4 - HKCU\..\Run: [dmnbw.tmp] C:\Windows\system32\dmnbw.tmp
O4 - HKCU\..\Run: [dmqtf.tmp] C:\Windows\system32\dmqtf.tmp
O4 - HKCU\..\Run: [dmfnt.tmp] C:\Windows\system32\dmfnt.tmp
O4 - HKCU\..\Run: [dmdan.tmp] C:\Windows\system32\dmdan.tmp
O4 - HKCU\..\Run: [dmzhp.tmp] C:\Windows\system32\dmzhp.tmp
O4 - HKCU\..\Run: [dmcat.tmp] C:\Windows\system32\dmcat.tmp
O4 - HKCU\..\Run: [dmtbu.tmp] C:\Windows\system32\dmtbu.tmp
O4 - HKCU\..\Run: [dmbxl.tmp] C:\Windows\system32\dmbxl.tmp
O4 - HKCU\..\Run: [dmajk.tmp] C:\Windows\system32\dmajk.tmp
O4 - HKCU\..\Run: [dmqvx.tmp] C:\Windows\system32\dmqvx.tmp
O4 - HKCU\..\Run: [dmwnc.tmp] C:\Windows\system32\dmwnc.tmp
O4 - HKCU\..\Run: [dmlwq.tmp] C:\Windows\system32\dmlwq.tmp
O4 - HKCU\..\Run: [dmrab.tmp] C:\Windows\system32\dmrab.tmp
O4 - HKCU\..\Run: [dmbyl.tmp] C:\Windows\system32\dmbyl.tmp
O4 - HKCU\..\Run: [dmwnl.tmp] C:\Windows\system32\dmwnl.tmp
O4 - HKCU\..\Run: [dmpix.tmp] C:\Windows\system32\dmpix.tmp
O4 - HKCU\..\Run: [dmezt.tmp] C:\Windows\system32\dmezt.tmp
O4 - HKCU\..\Run: [dmgjw.tmp] C:\Windows\system32\dmgjw.tmp
O4 - HKCU\..\Run: [dmgia.tmp] C:\Windows\system32\dmgia.tmp
O4 - HKCU\..\Run: [dmcfb.tmp] C:\Windows\system32\dmcfb.tmp
O4 - HKCU\..\Run: [dmqay.tmp] C:\Windows\system32\dmqay.tmp
O4 - HKCU\..\Run: [dmxnv.tmp] C:\Windows\system32\dmxnv.tmp
O4 - HKCU\..\Run: [dmesa.tmp] C:\Windows\system32\dmesa.tmp
O4 - HKCU\..\Run: [dmkbf.tmp] C:\Windows\system32\dmkbf.tmp
O4 - HKCU\..\Run: [dmiii.tmp] C:\Windows\system32\dmiii.tmp
O4 - HKCU\..\Run: [dmsmu.tmp] C:\Windows\system32\dmsmu.tmp
O4 - HKCU\..\Run: [dmzlu.tmp] C:\Windows\system32\dmzlu.tmp
O4 - HKCU\..\Run: [dmxix.tmp] C:\Windows\system32\dmxix.tmp
O4 - HKCU\..\Run: [dmhpd.tmp] C:\Windows\system32\dmhpd.tmp
O4 - HKCU\..\Run: [dmcdq.tmp] C:\Windows\system32\dmcdq.tmp
O4 - HKCU\..\Run: [dmieb.tmp] C:\Windows\system32\dmieb.tmp
O4 - HKCU\..\Run: [dmqna.tmp] C:\Windows\system32\dmqna.tmp
O4 - HKCU\..\Run: [dmuoi.tmp] C:\Windows\system32\dmuoi.tmp
O4 - HKCU\..\Run: [dmiiy.tmp] C:\Windows\system32\dmiiy.tmp
O4 - HKCU\..\Run: [dmpnh.tmp] C:\Windows\system32\dmpnh.tmp
O4 - HKCU\..\Run: [dmtbp.tmp] C:\Windows\system32\dmtbp.tmp
O4 - HKCU\..\Run: [dmlmj.tmp] C:\Windows\system32\dmlmj.tmp
O4 - HKCU\..\Run: [dmfqu.tmp] C:\Windows\system32\dmfqu.tmp
O4 - HKCU\..\Run: [dmivp.tmp] C:\Windows\system32\dmivp.tmp
O4 - HKCU\..\Run: [dmpmx.tmp] C:\Windows\system32\dmpmx.tmp
O4 - HKCU\..\Run: [dmrjk.tmp] C:\Windows\system32\dmrjk.tmp
O4 - HKCU\..\Run: [dmkbh.tmp] C:\Windows\system32\dmkbh.tmp
O4 - HKCU\..\Run: [dmsuc.tmp] C:\Windows\system32\dmsuc.tmp
O4 - HKCU\..\Run: [dmbsj.tmp] C:\Windows\system32\dmbsj.tmp
O4 - HKCU\..\Run: [dmwta.tmp] C:\Windows\system32\dmwta.tmp
O4 - HKCU\..\Run: [dmjkl.tmp] C:\Windows\system32\dmjkl.tmp
O4 - HKCU\..\Run: [dmrrr.tmp] C:\Windows\system32\dmrrr.tmp
O4 - HKCU\..\Run: [dmfea.tmp] C:\Windows\system32\dmfea.tmp
O4 - HKCU\..\Run: [dmeow.tmp] C:\Windows\system32\dmeow.tmp
O4 - HKCU\..\Run: [dmzch.tmp] C:\Windows\system32\dmzch.tmp
O4 - HKCU\..\Run: [dmyyk.tmp] C:\Windows\system32\dmyyk.tmp
O4 - HKCU\..\Run: [dmktc.tmp] C:\Windows\system32\dmktc.tmp
O4 - HKCU\..\Run: [dmpts.tmp] C:\Windows\system32\dmpts.tmp
O4 - HKCU\..\Run: [dmfvt.tmp] C:\Windows\system32\dmfvt.tmp
O4 - HKCU\..\Run: [dmacf.tmp] C:\Windows\system32\dmacf.tmp
O4 - HKCU\..\Run: [dmsnw.tmp] C:\Windows\system32\dmsnw.tmp
O4 - HKCU\..\Run: [dmjni.tmp] C:\Windows\system32\dmjni.tmp
O4 - HKCU\..\Run: [dmigx.tmp] C:\Windows\system32\dmigx.tmp
O4 - HKCU\..\Run: [WMPNSCFG] C:\Program Files\Windows Media Player\WMPNSCFG.exe
O4 - HKCU\..\Run: [fumkdk] c:\users\alain\appdata\local\fumkdk.exe fumkdk
O4 - Global Startup: Empowering Technology Launcher.lnk = ?
O4 - Global Startup: Logitech SetPoint.lnk = C:\Program Files\Logitech\SetPoint\SetPoint.exe
O4 - Global Startup: Microsoft Office.lnk = C:\Program Files\Microsoft Office\Office\OSA9.EXE
O4 - Global Startup: Supervision de Photo Loader.lnk = C:\Program Files\CASIO\Photo Loader\Plauto.exe
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_06\bin\ssv.dll
O9 - Extra 'Tools' menuitem: Console Java (Sun) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_06\bin\ssv.dll
O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~2\Office12\REFIEBAR.DLL
O10 - Unknown file in Winsock LSP: c:\windows\system32\wpclsp.dll
O10 - Unknown file in Winsock LSP: c:\windows\system32\wpclsp.dll
O10 - Unknown file in Winsock LSP: c:\windows\system32\wpclsp.dll
O10 - Unknown file in Winsock LSP: c:\windows\system32\wpclsp.dll
O10 - Unknown file in Winsock LSP: c:\windows\system32\wpclsp.dll
O10 - Unknown file in Winsock LSP: c:\windows\system32\wpclsp.dll
O10 - Unknown file in Winsock LSP: c:\windows\system32\wpclsp.dll
O10 - Unknown file in Winsock LSP: c:\windows\system32\wpclsp.dll
O10 - Unknown file in Winsock LSP: c:\windows\system32\wpclsp.dll
O13 - Gopher Prefix:
O23 - Service: avast! iAVS4 Control Service (aswUpdSv) - ALWIL Software - C:\Program Files\Alwil Software\Avast4\aswUpdSv.exe
O23 - Service: Ati External Event Utility - ATI Technologies Inc. - C:\Windows\system32\Ati2evxx.exe
O23 - Service: avast! Antivirus - ALWIL Software - C:\Program Files\Alwil Software\Avast4\ashServ.exe
O23 - Service: avast! Mail Scanner - ALWIL Software - C:\Program Files\Alwil Software\Avast4\ashMaiSv.exe
O23 - Service: avast! Web Scanner - ALWIL Software - C:\Program Files\Alwil Software\Avast4\ashWebSv.exe
O23 - Service: eDSService.exe (eDataSecurity Service) - HiTRSUT - C:\Acer\Empowering Technology\eDataSecurity\eDSService.exe
O23 - Service: eLock Service (eLockService) - Acer Inc. - C:\Acer\Empowering Technology\eLock\Service\eLockServ.exe
O23 - Service: eNet Service - Acer Inc. - C:\Acer\Empowering Technology\eNet\eNet Service.exe
O23 - Service: eRecovery Service (eRecoveryService) - Acer Inc. - C:\Acer\Empowering Technology\eRecovery\eRecoveryService.exe
O23 - Service: eSettings Service (eSettingsService) - Unknown owner - C:\Acer\Empowering Technology\eSettings\Service\capuserv.exe
O23 - Service: Logitech Bluetooth Service (LBTServ) - Logitech, Inc. - C:\Program Files\Common Files\Logishrd\Bluetooth\LBTServ.exe
O23 - Service: LightScribeService Direct Disc Labeling Service (LightScribeService) - Hewlett-Packard Company - C:\Program Files\Common Files\LightScribe\LSSrvc.exe
O23 - Service: LiveUpdate Notice Service - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\PIF\{B8E1DD85-8582-4c61-B58F-2F227FCA9A08}\PifSvc.exe
O23 - Service: MobilityService - Unknown owner - C:\Acer\Mobility Center\MobilityService.exe
O23 - Service: O2Micro Flash Memory Card Service (o2flash) - O2Micro International - C:\Program Files\O2Micro Oz128 Driver\o2flash.exe
O23 - Service: Planificateur LiveUpdate automatique - Unknown owner - C:\Program Files\Symantec\LiveUpdate\ALUSchedulerSvc.exe (file missing)
O23 - Service: Cyberlink RichVideo Service(CRVS) (RichVideo) - Unknown owner - C:\Program Files\CyberLink\Shared Files\RichVideo.exe
O23 - Service: ePower Service (WMIService) - acer - C:\Acer\Empowering Technology\ePower\ePowerSvc.exe
O23 - Service: XAudioService - Conexant Systems, Inc. - C:\Windows\system32\DRIVERS\xaudio.exe
Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 15:31:25, on 16/07/2008
Platform: Windows Vista (WinNT 6.00.1904)
MSIE: Internet Explorer v7.00 (7.00.6000.16681)
Boot mode: Normal
Running processes:
C:\Windows\system32\Dwm.exe
C:\Windows\Explorer.EXE
C:\Program Files\Alwil Software\Avast4\ashDisp.exe
C:\Program Files\Common Files\Symantec Shared\PIF\{B8E1DD85-8582-4c61-B58F-2F227FCA9A08}\PIFSvc.exe
C:\Program Files\Java\jre1.6.0_06\bin\jusched.exe
C:\Program Files\Synaptics\SynTP\SynTPEnh.exe
C:\Program Files\Windows Sidebar\sidebar.exe
C:\Windows\ehome\ehtray.exe
C:\Program Files\Windows Media Player\wmpnscfg.exe
C:\Users\alain\AppData\Local\fumkdk.exe
C:\Windows\system32\taskeng.exe
C:\Program Files\Logitech\SetPoint\LBTWiz.exe
C:\Windows\ehome\ehmsas.exe
C:\Program Files\Logitech\SetPoint\SetPoint.exe
C:\Program Files\CASIO\Photo Loader\Plauto.exe
C:\Acer\Empowering Technology\ENET\ENMTRAY.EXE
C:\Program Files\Common Files\Logishrd\KHAL2\KHALMNPR.EXE
C:\Acer\Empowering Technology\EPOWER\EPOWER_DMC.EXE
C:\Acer\Empowering Technology\ACER.EMPOWERING.FRAMEWORK.SUPERVISOR.EXE
C:\Acer\Empowering Technology\eRecovery\ERAGENT.EXE
C:\Windows\system32\wbem\unsecapp.exe
C:\Program Files\Mozilla Firefox\firefox.exe
C:\Users\alain\Desktop\HiJackThis.exe
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = https://www.bing.com/?toHttps=1&redig=5FC791212101479BAFBE1A679848B1AF
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = https://www.google.fr/?gws_rd=ssl
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://fr.fr.acer.yahoo.com
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = https://www.bing.com/?toHttps=1&redig=5FC791212101479BAFBE1A679848B1AF
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://ww17.ads.eorezo.com/cgi-bin/advert/getads.cgi?x_format=redirect&x_dp_id=9
R0 - HKLM\Software\Microsoft\Internet Explorer\Search,SearchAssistant =
R0 - HKLM\Software\Microsoft\Internet Explorer\Search,CustomizeSearch =
R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName =
O1 - Hosts: ::1 localhost
O2 - BHO: Yahoo! Toolbar Helper - {02478D38-C3F9-4EFB-9B51-7695ECA05670} - C:\Program Files\Yahoo!\Companion\Installs\cpn\yt.dll
O2 - BHO: Adobe PDF Reader Link Helper - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Common Files\Adobe\Acrobat\ActiveX\AcroIEHelper.dll
O2 - BHO: NCO 2.0 IE BHO - {602ADB0E-4AFF-4217-8AA1-95DAC4DFA408} - (no file)
O2 - BHO: EoRezoBHO - {64F56FC1-1272-44CD-BA6E-39723696E350} - C:\Program Files\EoRezo\EoAdv\EoRezoBHO.dll (file missing)
O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre1.6.0_06\bin\ssv.dll
O3 - Toolbar: Acer eDataSecurity Management - {5CBE3B7C-1E47-477e-A7DD-396DB0476E29} - C:\Windows\system32\eDStoolbar.dll
O3 - Toolbar: Yahoo! Toolbar avec bloqueur de fenêtres pop-up - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - C:\Program Files\Yahoo!\Companion\Installs\cpn\yt.dll
O3 - Toolbar: Easy-WebPrint - {327C2873-E90D-4c37-AA9D-10AC9BABA46C} - C:\Program Files\Canon\Easy-WebPrint\Toolband.dll (file missing)
O3 - Toolbar: (no name) - {7FEBEFE3-6B19-4349-98D2-FFB09D4B49CA} - (no file)
O3 - Toolbar: (no name) - {D0943516-5076-4020-A3B5-AEFAF26AB263} - (no file)
O4 - HKLM\..\Run: [avast!] C:\PROGRA~1\ALWILS~1\Avast4\ashDisp.exe
O4 - HKLM\..\Run: [Symantec PIF AlertEng] "C:\Program Files\Common Files\Symantec Shared\PIF\{B8E1DD85-8582-4c61-B58F-2F227FCA9A08}\PifSvc.exe" /a /m "C:\Program Files\Common Files\Symantec Shared\PIF\{B8E1DD85-8582-4c61-B58F-2F227FCA9A08}\AlertEng.dll"
O4 - HKLM\..\Run: [Kernel and Hardware Abstraction Layer] KHALMNPR.EXE
O4 - HKLM\..\Run: [SunJavaUpdateSched] "C:\Program Files\Java\jre1.6.0_06\bin\jusched.exe"
O4 - HKLM\..\Run: [SynTPEnh] C:\Program Files\Synaptics\SynTP\SynTPEnh.exe
O4 - HKCU\..\Run: [Sidebar] C:\Program Files\Windows Sidebar\sidebar.exe /autoRun
O4 - HKCU\..\Run: [ehTray.exe] C:\Windows\ehome\ehTray.exe
O4 - HKCU\..\Run: [dmqpp.tmp] C:\Windows\system32\dmqpp.tmp
O4 - HKCU\..\Run: [dmaok.tmp] C:\Windows\system32\dmaok.tmp
O4 - HKCU\..\Run: [dmydd.tmp] C:\Windows\system32\dmydd.tmp
O4 - HKCU\..\Run: [dmhnn.tmp] C:\Windows\system32\dmhnn.tmp
O4 - HKCU\..\Run: [dmdkj.tmp] C:\Windows\system32\dmdkj.tmp
O4 - HKCU\..\Run: [dmmmh.tmp] C:\Windows\system32\dmmmh.tmp
O4 - HKCU\..\Run: [dmpob.tmp] C:\Windows\system32\dmpob.tmp
O4 - HKCU\..\Run: [dmdpv.tmp] C:\Windows\system32\dmdpv.tmp
O4 - HKCU\..\Run: [dmrwa.tmp] C:\Windows\system32\dmrwa.tmp
O4 - HKCU\..\Run: [dmdzj.tmp] C:\Windows\system32\dmdzj.tmp
O4 - HKCU\..\Run: [dmgej.tmp] C:\Windows\system32\dmgej.tmp
O4 - HKCU\..\Run: [dmwjj.tmp] C:\Windows\system32\dmwjj.tmp
O4 - HKCU\..\Run: [dmrio.tmp] C:\Windows\system32\dmrio.tmp
O4 - HKCU\..\Run: [dmghj.tmp] C:\Windows\system32\dmghj.tmp
O4 - HKCU\..\Run: [dmmkn.tmp] C:\Windows\system32\dmmkn.tmp
O4 - HKCU\..\Run: [dmwdc.tmp] C:\Windows\system32\dmwdc.tmp
O4 - HKCU\..\Run: [dmksc.tmp] C:\Windows\system32\dmksc.tmp
O4 - HKCU\..\Run: [dmczp.tmp] C:\Windows\system32\dmczp.tmp
O4 - HKCU\..\Run: [dmcup.tmp] C:\Windows\system32\dmcup.tmp
O4 - HKCU\..\Run: [dmhyz.tmp] C:\Windows\system32\dmhyz.tmp
O4 - HKCU\..\Run: [dmwuc.tmp] C:\Windows\system32\dmwuc.tmp
O4 - HKCU\..\Run: [dmssf.tmp] C:\Windows\system32\dmssf.tmp
O4 - HKCU\..\Run: [dmipp.tmp] C:\Windows\system32\dmipp.tmp
O4 - HKCU\..\Run: [dmycw.tmp] C:\Windows\system32\dmycw.tmp
O4 - HKCU\..\Run: [dmsxi.tmp] C:\Windows\system32\dmsxi.tmp
O4 - HKCU\..\Run: [dmqod.tmp] C:\Windows\system32\dmqod.tmp
O4 - HKCU\..\Run: [dmedo.tmp] C:\Windows\system32\dmedo.tmp
O4 - HKCU\..\Run: [dmpzd.tmp] C:\Windows\system32\dmpzd.tmp
O4 - HKCU\..\Run: [dmmuc.tmp] C:\Windows\system32\dmmuc.tmp
O4 - HKCU\..\Run: [dmmor.tmp] C:\Windows\system32\dmmor.tmp
O4 - HKCU\..\Run: [dmcag.tmp] C:\Windows\system32\dmcag.tmp
O4 - HKCU\..\Run: [dmnbw.tmp] C:\Windows\system32\dmnbw.tmp
O4 - HKCU\..\Run: [dmqtf.tmp] C:\Windows\system32\dmqtf.tmp
O4 - HKCU\..\Run: [dmfnt.tmp] C:\Windows\system32\dmfnt.tmp
O4 - HKCU\..\Run: [dmdan.tmp] C:\Windows\system32\dmdan.tmp
O4 - HKCU\..\Run: [dmzhp.tmp] C:\Windows\system32\dmzhp.tmp
O4 - HKCU\..\Run: [dmcat.tmp] C:\Windows\system32\dmcat.tmp
O4 - HKCU\..\Run: [dmtbu.tmp] C:\Windows\system32\dmtbu.tmp
O4 - HKCU\..\Run: [dmbxl.tmp] C:\Windows\system32\dmbxl.tmp
O4 - HKCU\..\Run: [dmajk.tmp] C:\Windows\system32\dmajk.tmp
O4 - HKCU\..\Run: [dmqvx.tmp] C:\Windows\system32\dmqvx.tmp
O4 - HKCU\..\Run: [dmwnc.tmp] C:\Windows\system32\dmwnc.tmp
O4 - HKCU\..\Run: [dmlwq.tmp] C:\Windows\system32\dmlwq.tmp
O4 - HKCU\..\Run: [dmrab.tmp] C:\Windows\system32\dmrab.tmp
O4 - HKCU\..\Run: [dmbyl.tmp] C:\Windows\system32\dmbyl.tmp
O4 - HKCU\..\Run: [dmwnl.tmp] C:\Windows\system32\dmwnl.tmp
O4 - HKCU\..\Run: [dmpix.tmp] C:\Windows\system32\dmpix.tmp
O4 - HKCU\..\Run: [dmezt.tmp] C:\Windows\system32\dmezt.tmp
O4 - HKCU\..\Run: [dmgjw.tmp] C:\Windows\system32\dmgjw.tmp
O4 - HKCU\..\Run: [dmgia.tmp] C:\Windows\system32\dmgia.tmp
O4 - HKCU\..\Run: [dmcfb.tmp] C:\Windows\system32\dmcfb.tmp
O4 - HKCU\..\Run: [dmqay.tmp] C:\Windows\system32\dmqay.tmp
O4 - HKCU\..\Run: [dmxnv.tmp] C:\Windows\system32\dmxnv.tmp
O4 - HKCU\..\Run: [dmesa.tmp] C:\Windows\system32\dmesa.tmp
O4 - HKCU\..\Run: [dmkbf.tmp] C:\Windows\system32\dmkbf.tmp
O4 - HKCU\..\Run: [dmiii.tmp] C:\Windows\system32\dmiii.tmp
O4 - HKCU\..\Run: [dmsmu.tmp] C:\Windows\system32\dmsmu.tmp
O4 - HKCU\..\Run: [dmzlu.tmp] C:\Windows\system32\dmzlu.tmp
O4 - HKCU\..\Run: [dmxix.tmp] C:\Windows\system32\dmxix.tmp
O4 - HKCU\..\Run: [dmhpd.tmp] C:\Windows\system32\dmhpd.tmp
O4 - HKCU\..\Run: [dmcdq.tmp] C:\Windows\system32\dmcdq.tmp
O4 - HKCU\..\Run: [dmieb.tmp] C:\Windows\system32\dmieb.tmp
O4 - HKCU\..\Run: [dmqna.tmp] C:\Windows\system32\dmqna.tmp
O4 - HKCU\..\Run: [dmuoi.tmp] C:\Windows\system32\dmuoi.tmp
O4 - HKCU\..\Run: [dmiiy.tmp] C:\Windows\system32\dmiiy.tmp
O4 - HKCU\..\Run: [dmpnh.tmp] C:\Windows\system32\dmpnh.tmp
O4 - HKCU\..\Run: [dmtbp.tmp] C:\Windows\system32\dmtbp.tmp
O4 - HKCU\..\Run: [dmlmj.tmp] C:\Windows\system32\dmlmj.tmp
O4 - HKCU\..\Run: [dmfqu.tmp] C:\Windows\system32\dmfqu.tmp
O4 - HKCU\..\Run: [dmivp.tmp] C:\Windows\system32\dmivp.tmp
O4 - HKCU\..\Run: [dmpmx.tmp] C:\Windows\system32\dmpmx.tmp
O4 - HKCU\..\Run: [dmrjk.tmp] C:\Windows\system32\dmrjk.tmp
O4 - HKCU\..\Run: [dmkbh.tmp] C:\Windows\system32\dmkbh.tmp
O4 - HKCU\..\Run: [dmsuc.tmp] C:\Windows\system32\dmsuc.tmp
O4 - HKCU\..\Run: [dmbsj.tmp] C:\Windows\system32\dmbsj.tmp
O4 - HKCU\..\Run: [dmwta.tmp] C:\Windows\system32\dmwta.tmp
O4 - HKCU\..\Run: [dmjkl.tmp] C:\Windows\system32\dmjkl.tmp
O4 - HKCU\..\Run: [dmrrr.tmp] C:\Windows\system32\dmrrr.tmp
O4 - HKCU\..\Run: [dmfea.tmp] C:\Windows\system32\dmfea.tmp
O4 - HKCU\..\Run: [dmeow.tmp] C:\Windows\system32\dmeow.tmp
O4 - HKCU\..\Run: [dmzch.tmp] C:\Windows\system32\dmzch.tmp
O4 - HKCU\..\Run: [dmyyk.tmp] C:\Windows\system32\dmyyk.tmp
O4 - HKCU\..\Run: [dmktc.tmp] C:\Windows\system32\dmktc.tmp
O4 - HKCU\..\Run: [dmpts.tmp] C:\Windows\system32\dmpts.tmp
O4 - HKCU\..\Run: [dmfvt.tmp] C:\Windows\system32\dmfvt.tmp
O4 - HKCU\..\Run: [dmacf.tmp] C:\Windows\system32\dmacf.tmp
O4 - HKCU\..\Run: [dmsnw.tmp] C:\Windows\system32\dmsnw.tmp
O4 - HKCU\..\Run: [dmjni.tmp] C:\Windows\system32\dmjni.tmp
O4 - HKCU\..\Run: [dmigx.tmp] C:\Windows\system32\dmigx.tmp
O4 - HKCU\..\Run: [WMPNSCFG] C:\Program Files\Windows Media Player\WMPNSCFG.exe
O4 - HKCU\..\Run: [fumkdk] c:\users\alain\appdata\local\fumkdk.exe fumkdk
O4 - Global Startup: Empowering Technology Launcher.lnk = ?
O4 - Global Startup: Logitech SetPoint.lnk = C:\Program Files\Logitech\SetPoint\SetPoint.exe
O4 - Global Startup: Microsoft Office.lnk = C:\Program Files\Microsoft Office\Office\OSA9.EXE
O4 - Global Startup: Supervision de Photo Loader.lnk = C:\Program Files\CASIO\Photo Loader\Plauto.exe
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_06\bin\ssv.dll
O9 - Extra 'Tools' menuitem: Console Java (Sun) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_06\bin\ssv.dll
O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~2\Office12\REFIEBAR.DLL
O10 - Unknown file in Winsock LSP: c:\windows\system32\wpclsp.dll
O10 - Unknown file in Winsock LSP: c:\windows\system32\wpclsp.dll
O10 - Unknown file in Winsock LSP: c:\windows\system32\wpclsp.dll
O10 - Unknown file in Winsock LSP: c:\windows\system32\wpclsp.dll
O10 - Unknown file in Winsock LSP: c:\windows\system32\wpclsp.dll
O10 - Unknown file in Winsock LSP: c:\windows\system32\wpclsp.dll
O10 - Unknown file in Winsock LSP: c:\windows\system32\wpclsp.dll
O10 - Unknown file in Winsock LSP: c:\windows\system32\wpclsp.dll
O10 - Unknown file in Winsock LSP: c:\windows\system32\wpclsp.dll
O13 - Gopher Prefix:
O23 - Service: avast! iAVS4 Control Service (aswUpdSv) - ALWIL Software - C:\Program Files\Alwil Software\Avast4\aswUpdSv.exe
O23 - Service: Ati External Event Utility - ATI Technologies Inc. - C:\Windows\system32\Ati2evxx.exe
O23 - Service: avast! Antivirus - ALWIL Software - C:\Program Files\Alwil Software\Avast4\ashServ.exe
O23 - Service: avast! Mail Scanner - ALWIL Software - C:\Program Files\Alwil Software\Avast4\ashMaiSv.exe
O23 - Service: avast! Web Scanner - ALWIL Software - C:\Program Files\Alwil Software\Avast4\ashWebSv.exe
O23 - Service: eDSService.exe (eDataSecurity Service) - HiTRSUT - C:\Acer\Empowering Technology\eDataSecurity\eDSService.exe
O23 - Service: eLock Service (eLockService) - Acer Inc. - C:\Acer\Empowering Technology\eLock\Service\eLockServ.exe
O23 - Service: eNet Service - Acer Inc. - C:\Acer\Empowering Technology\eNet\eNet Service.exe
O23 - Service: eRecovery Service (eRecoveryService) - Acer Inc. - C:\Acer\Empowering Technology\eRecovery\eRecoveryService.exe
O23 - Service: eSettings Service (eSettingsService) - Unknown owner - C:\Acer\Empowering Technology\eSettings\Service\capuserv.exe
O23 - Service: Logitech Bluetooth Service (LBTServ) - Logitech, Inc. - C:\Program Files\Common Files\Logishrd\Bluetooth\LBTServ.exe
O23 - Service: LightScribeService Direct Disc Labeling Service (LightScribeService) - Hewlett-Packard Company - C:\Program Files\Common Files\LightScribe\LSSrvc.exe
O23 - Service: LiveUpdate Notice Service - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\PIF\{B8E1DD85-8582-4c61-B58F-2F227FCA9A08}\PifSvc.exe
O23 - Service: MobilityService - Unknown owner - C:\Acer\Mobility Center\MobilityService.exe
O23 - Service: O2Micro Flash Memory Card Service (o2flash) - O2Micro International - C:\Program Files\O2Micro Oz128 Driver\o2flash.exe
O23 - Service: Planificateur LiveUpdate automatique - Unknown owner - C:\Program Files\Symantec\LiveUpdate\ALUSchedulerSvc.exe (file missing)
O23 - Service: Cyberlink RichVideo Service(CRVS) (RichVideo) - Unknown owner - C:\Program Files\CyberLink\Shared Files\RichVideo.exe
O23 - Service: ePower Service (WMIService) - acer - C:\Acer\Empowering Technology\ePower\ePowerSvc.exe
O23 - Service: XAudioService - Conexant Systems, Inc. - C:\Windows\system32\DRIVERS\xaudio.exe
Tu n as plus le detournement de DNS mais il te reste pas mal d infection
Télécharge combofix : http://download.bleepingcomputer.com/sUBs/ComboFix.exe
-> Double clique sur combofix.exe.
-> Tape sur la touche 1 (Yes) pour démarrer le scan.
-> Lorsque le scan sera complété, un rapport apparaîtra. Copie/colle ce rapport dans ta prochaine réponse.
NOTE : Le rapport se trouve également ici : C:\Combofix.txt
Avant d'utiliser ComboFix :
-> Déconnecte toi d'internet et referme les fenêtres de tous les programmes en cours.
-> Désactive provisoirement et seulement le temps de l'utilisation de ComboFix, la protection en temps réel de ton Antivirus et de tes Antispywares, qui peuvent géner fortement la procédure de recherche et de nettoyage de l'outil.
Une fois fait, sur ton bureau double-clic sur Combofix.exe.
- Répond oui au message d'avertissement, pour que le programme commence à procéder à l'analyse du pc.
/!\ Pendant la durée de cette étape, ne te sert pas du pc et n'ouvre aucun programmes.
- En fin de scan il est possible que ComboFix ait besoin de redemarrer le pc pour finaliser la désinfection\recherche, laisses-le faire.
- Un rapport s'ouvrira ensuite dans le bloc notes, ce fichier rapport Combofix.txt, est automatiquement sauvegardé et rangé à C:\Combofix.txt)
-> Réactive la protection en temps réel de ton Antivirus et de tes Antispywares, avant de te reconnecter à internet.
-> Reviens sur le forum, et copie et colle la totalité du contenu de C:\Combofix.txt dans ton prochain message.
-> Tutoriel https://www.bleepingcomputer.com/combofix/fr/comment-utiliser-combofix
Télécharge combofix : http://download.bleepingcomputer.com/sUBs/ComboFix.exe
-> Double clique sur combofix.exe.
-> Tape sur la touche 1 (Yes) pour démarrer le scan.
-> Lorsque le scan sera complété, un rapport apparaîtra. Copie/colle ce rapport dans ta prochaine réponse.
NOTE : Le rapport se trouve également ici : C:\Combofix.txt
Avant d'utiliser ComboFix :
-> Déconnecte toi d'internet et referme les fenêtres de tous les programmes en cours.
-> Désactive provisoirement et seulement le temps de l'utilisation de ComboFix, la protection en temps réel de ton Antivirus et de tes Antispywares, qui peuvent géner fortement la procédure de recherche et de nettoyage de l'outil.
Une fois fait, sur ton bureau double-clic sur Combofix.exe.
- Répond oui au message d'avertissement, pour que le programme commence à procéder à l'analyse du pc.
/!\ Pendant la durée de cette étape, ne te sert pas du pc et n'ouvre aucun programmes.
- En fin de scan il est possible que ComboFix ait besoin de redemarrer le pc pour finaliser la désinfection\recherche, laisses-le faire.
- Un rapport s'ouvrira ensuite dans le bloc notes, ce fichier rapport Combofix.txt, est automatiquement sauvegardé et rangé à C:\Combofix.txt)
-> Réactive la protection en temps réel de ton Antivirus et de tes Antispywares, avant de te reconnecter à internet.
-> Reviens sur le forum, et copie et colle la totalité du contenu de C:\Combofix.txt dans ton prochain message.
-> Tutoriel https://www.bleepingcomputer.com/combofix/fr/comment-utiliser-combofix
ComboFix 08-07-17.3 - alain 2008-07-18 10:59:57.1 - NTFSx86
Microsoft® Windows Vista™ Édition Familiale Premium 6.0.6000.0.1252.1.1036.18.814 [GMT 2:00]
Endroit: C:\Users\alain\Desktop\ComboFix.exe
* Création d'un nouveau point de restauration
.
(((((((((((((((((((((((((((((((((((( Autres suppressions ))))))))))))))))))))))))))))))))))))))))))))))))
.
C:\Users\alain\AppData\Local\kyeis.dat
C:\Users\alain\AppData\Local\kyeis.exe
C:\Users\alain\AppData\Local\kyeis_nav.dat
C:\Users\alain\AppData\Local\kyeis_navps.dat
C:\Windows\system32\ACER.exe
C:\Windows\Temp\log.txt
.
((((((((((((((((((((((((((((( Fichiers créés 2008-06-18 to 2008-07-18 ))))))))))))))))))))))))))))))))))))
.
2008-07-18 10:55 . 2008-07-18 10:56 <REP> d-------- C:\327882R2FWJFW
2008-07-15 09:21 . 2008-02-15 01:19 944,184 --a------ C:\Windows\System32\winload.exe
2008-07-15 09:21 . 2008-02-19 07:10 620,088 --a------ C:\Windows\System32\ci.dll
2008-07-15 09:21 . 2008-02-29 08:39 371,712 --a------ C:\Windows\System32\srcore.dll
2008-07-15 09:21 . 2008-02-29 08:38 313,856 --a------ C:\Windows\System32\rstrui.exe
2008-07-15 09:21 . 2008-02-29 08:39 40,960 --a------ C:\Windows\System32\srclient.dll
2008-07-15 09:21 . 2008-02-29 08:51 19,000 --a------ C:\Windows\System32\kd1394.dll
2008-07-15 09:21 . 2008-02-29 08:38 16,384 --a------ C:\Windows\System32\srdelayed.exe
2008-07-15 09:21 . 2008-02-29 08:34 7,168 --a------ C:\Windows\System32\f3ahvoas.dll
2008-07-15 09:21 . 2008-02-29 08:35 6,656 --a------ C:\Windows\System32\kbd106n.dll
2008-07-15 09:20 . 2008-03-08 02:37 4,247,552 --a------ C:\Windows\System32\GameUXLegacyGDFs.dll
2008-07-15 09:20 . 2008-02-29 06:16 2,027,008 --a------ C:\Windows\System32\win32k.sys
2008-07-15 09:20 . 2008-02-21 06:43 296,448 --a------ C:\Windows\System32\gdi32.dll
2008-07-15 09:20 . 2008-05-10 03:21 113,664 --a------ C:\Windows\System32\drivers\rmcast.sys
2008-07-15 09:20 . 2008-05-10 05:30 14,848 --a------ C:\Windows\System32\wshrm.dll
2008-07-14 18:17 . 2008-07-14 18:17 <REP> d-------- C:\Users\All Users\Malwarebytes
2008-07-14 18:17 . 2008-07-14 18:17 <REP> d-------- C:\Users\alain\AppData\Roaming\Malwarebytes
2008-07-14 18:17 . 2008-07-14 18:17 <REP> d-------- C:\ProgramData\Malwarebytes
2008-07-14 18:17 . 2008-07-14 20:53 <REP> d-------- C:\Program Files\Malwarebytes' Anti-Malware
2008-07-14 18:17 . 2008-07-07 17:35 34,296 --a------ C:\Windows\System32\drivers\mbamcatchme.sys
2008-07-14 18:17 . 2008-07-07 17:35 17,144 --a------ C:\Windows\System32\drivers\mbam.sys
2008-07-14 16:20 . 2008-07-16 15:31 <REP> d-------- C:\fixwareout
2008-07-09 17:08 . 2008-07-09 17:43 <REP> d-------- C:\Users\All Users\Spybot - Search & Destroy
2008-07-09 17:08 . 2008-07-09 17:43 <REP> d-------- C:\ProgramData\Spybot - Search & Destroy
2008-06-25 14:25 . 2008-07-05 06:12 <REP> d-------- C:\Users\alain\[u]0/u6.08 à mélizey
2008-06-19 10:06 . 2008-06-19 10:07 <REP> d-------- C:\Program Files\Java
2008-06-19 10:04 . 2008-06-19 10:04 <REP> d-------- C:\Program Files\Common Files\Java
2008-06-18 18:51 . 2008-06-18 18:51 <REP> d-------- C:\Users\alain\AppData\Roaming\Icone
.
(((((((((((((((((((((((((((((((((( Compte-rendu de Find3M ))))))))))))))))))))))))))))))))))))))))))))))))
.
2008-07-15 16:35 174 --sha-w C:\Program Files\desktop.ini
2008-07-15 16:29 --------- d-----w C:\Program Files\Windows Mail
2008-07-05 03:52 --------- d-----w C:\ProgramData\Microsoft Help
2008-06-10 08:36 --------- d-----w C:\Program Files\DivX
2008-06-10 07:18 --------- d-----w C:\Program Files\Google
2008-05-30 23:22 823,296 ----a-w C:\Windows\System32\divx_xx0c.dll
2008-05-30 23:22 823,296 ----a-w C:\Windows\System32\divx_xx07.dll
2008-05-30 23:22 815,104 ----a-w C:\Windows\System32\divx_xx0a.dll
2008-05-30 23:22 802,816 ----a-w C:\Windows\System32\divx_xx11.dll
2008-05-30 23:22 683,520 ----a-w C:\Windows\System32\DivX.dll
2008-05-30 23:22 593,920 ----a-w C:\Windows\System32\dpuGUI11.dll
2008-05-30 23:22 57,344 ----a-w C:\Windows\System32\dpv11.dll
2008-05-30 23:22 53,248 ----a-w C:\Windows\System32\dpuGUI10.dll
2008-05-30 23:22 344,064 ----a-w C:\Windows\System32\dpus11.dll
2008-05-30 23:22 294,912 ----a-w C:\Windows\System32\dpu11.dll
2008-05-30 23:22 294,912 ----a-w C:\Windows\System32\dpu10.dll
2008-05-22 22:22 524,288 ----a-w C:\Windows\System32\DivXsm.exe
2008-05-22 22:22 3,596,288 ----a-w C:\Windows\System32\qt-dx331.dll
2008-05-22 22:20 200,704 ----a-w C:\Windows\System32\ssldivx.dll
2008-05-22 22:20 1,044,480 ----a-w C:\Windows\System32\libdivx.dll
2008-05-22 22:19 81,920 ----a-w C:\Windows\System32\dpl100.dll
2008-05-22 22:19 196,608 ----a-w C:\Windows\System32\dtu100.dll
2008-05-22 22:19 161,096 ----a-w C:\Windows\System32\DivXCodecVersionChecker.exe
2008-05-22 22:18 12,288 ----a-w C:\Windows\System32\DivXWMPExtType.dll
2008-04-26 08:02 1,327,104 ----a-w C:\Windows\System32\quartz.dll
2008-04-25 04:23 826,368 ----a-w C:\Windows\System32\wininet.dll
2008-04-25 04:23 56,320 ----a-w C:\Windows\System32\iesetup.dll
2008-04-25 04:23 52,736 ----a-w C:\Windows\AppPatch\iebrshim.dll
2008-04-25 04:22 26,624 ----a-w C:\Windows\System32\ieUnatt.exe
2008-02-25 22:14 0 ----a-w C:\Users\alain\AppData\Roaming\wklnhst.dat
2008-04-03 08:24 16,384 --sha-w C:\Windows\ServiceProfiles\LocalService\AppData\Local\Microsoft\Windows\History\History.IE5\index.dat
2008-04-03 08:24 32,768 --sha-w C:\Windows\ServiceProfiles\LocalService\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\index.dat
2008-04-03 08:24 16,384 --sha-w C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Windows\Cookies\index.dat
.
((((((((((((((((((((((((((((((((( Point de chargement Reg )))))))))))))))))))))))))))))))))))))))))))))))))
.
.
REGEDIT4
*Note* les éléments vides & les éléments initiaux légitimes ne sont pas listés
[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"Sidebar"="C:\Program Files\Windows Sidebar\sidebar.exe" [2008-01-19 04:36 1232896]
"ehTray.exe"="C:\Windows\ehome\ehTray.exe" [2006-11-02 14:35 125440]
"WMPNSCFG"="C:\Program Files\Windows Media Player\WMPNSCFG.exe" [2006-11-02 14:36 201728]
"AdobeUpdater"="C:\Program Files\Common Files\Adobe\Updater5\AdobeUpdater.exe" [2007-03-01 11:37 2321600]
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"avast!"="C:\PROGRA~1\ALWILS~1\Avast4\ashDisp.exe" [2008-05-16 01:19 79224]
"Symantec PIF AlertEng"="C:\Program Files\Common Files\Symantec Shared\PIF\{B8E1DD85-8582-4c61-B58F-2F227FCA9A08}\PifSvc.exe" [2007-03-12 11:22 517768]
"SunJavaUpdateSched"="C:\Program Files\Java\jre1.6.0_06\bin\jusched.exe" [2008-03-25 04:28 144784]
"SynTPEnh"="C:\Program Files\Synaptics\SynTP\SynTPEnh.exe" [2006-10-23 21:00 815104]
"Kernel and Hardware Abstraction Layer"="KHALMNPR.EXE" [2007-11-29 03:17 55824 C:\Windows\KHALMNPR.Exe]
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\
Empowering Technology Launcher.lnk - C:\Acer\Empowering Technology\eAPLauncher.exe [2007-09-17 19:33:55 535336]
Logitech SetPoint.lnk - C:\Program Files\Logitech\SetPoint\SetPoint.exe [2008-03-14 09:11:05 789008]
Microsoft Office.lnk - C:\Program Files\Microsoft Office\Office\OSA9.EXE [1999-02-18 01:05:56 65588]
Supervision de Photo Loader.lnk - C:\Program Files\CASIO\Photo Loader\Plauto.exe [2008-01-19 19:53:06 217088]
[HKEY_CURRENT_USER\software\microsoft\windows\currentversion\policies\system]
"LogonHoursAction"= 2 (0x2)
"DontDisplayLogonHoursWarnings"= 1 (0x1)
[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring]
"DisableMonitoring"=dword:00000001
[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\SymantecAntiVirus]
"DisableMonitoring"=dword:00000001
[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\SymantecFirewall]
"DisableMonitoring"=dword:00000001
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\DomainProfile]
"EnableFirewall"= 0 (0x0)
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\FirewallRules]
"{EF379370-5C42-46B8-944B-5FB3A1FA1A39}"= C:\Program Files\CyberLink\PowerDVD\PowerDVD.EXE:CyberLink PowerDVD
"{EE2C9D54-3AD5-4A21-9CF5-3006E2365FB2}"= Disabled:UDP:C:\Users\alain\Desktop\incredimail_install.exe:IncrediMail Installer
"{BDABCAD8-2E06-4A8C-AB3E-38FE512BC7C0}"= Disabled:TCP:C:\Users\alain\Desktop\incredimail_install.exe:IncrediMail Installer
"{86279E3B-F797-46CF-A2FE-F1F11DF1D152}"= Disabled:UDP:C:\Users\alain\AppData\Local\Temp\ImInstaller\IncrediMail\incredimail_install.exe:IncrediMail Installer
"{2AB2621D-59CA-402B-9367-912978AAEE76}"= Disabled:TCP:C:\Users\alain\AppData\Local\Temp\ImInstaller\IncrediMail\incredimail_install.exe:IncrediMail Installer
"TCP Query User{9CDE96EC-4E44-4B29-AD9B-C2172869F32A}C:\\program files\\emule\\emule.exe"= UDP:C:\program files\emule\emule.exe:eMule
"UDP Query User{930D275A-6A1F-4E1C-8F94-DEE680178842}C:\\program files\\emule\\emule.exe"= TCP:C:\program files\emule\emule.exe:eMule
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\PublicProfile]
"EnableFirewall"= 0 (0x0)
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\RestrictedServices\Static\System]
"DFSR-1"= RPort=5722|UDP:%SystemRoot%\system32\svchost.exe|Svc=DFSR:Allow inbound TCP traffic|
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\StandardProfile]
"EnableFirewall"= 0 (0x0)
"DoNotAllowExceptions"= 1 (0x1)
R0 O2MDRDR;O2MDRDR;C:\Windows\system32\DRIVERS\o2media.sys [2007-04-03 19:04]
R0 O2SDRDR;O2SDRDR;C:\Windows\system32\DRIVERS\o2sd.sys [2007-04-03 01:11]
R1 aswSP;avast! Self Protection;C:\Windows\system32\drivers\aswSP.sys [2008-05-16 01:20]
R2 {95808DC4-FA4A-4c74-92FE-5B863F82066B};{95808DC4-FA4A-4c74-92FE-5B863F82066B};C:\Program Files\CyberLink\PowerDVD\[u]0/u00.fcl [2006-11-02 16:51]
R2 aswFsBlk;aswFsBlk;C:\Windows\system32\DRIVERS\aswFsBlk.sys [2008-05-16 01:16]
R2 aswMonFlt;aswMonFlt;C:\Windows\system32\DRIVERS\aswMonFlt.sys [2008-05-16 01:18]
R2 MSSQL$MSSMLBIZ;SQL Server (MSSMLBIZ);C:\Program Files\Microsoft SQL Server\MSSQL.1\MSSQL\Binn\sqlservr.exe [2006-04-14 10:07]
R3 atikmdag;atikmdag;C:\Windows\system32\DRIVERS\atikmdag.sys [2007-08-12 09:10]
R3 yukonwlh;NDIS6.0 Miniport Driver for Marvell Yukon Ethernet Controller;C:\Windows\system32\DRIVERS\yk60x86.sys [2007-04-17 20:12]
[HKEY_CURRENT_USER\software\microsoft\windows\currentversion\explorer\mountpoints2\{a3d5da7c-c72d-11dc-995e-000000000000}]
\shell\AutoRun\command - rundll32.exe url,FileProtocolHandler library_1.htm
[HKEY_CURRENT_USER\software\microsoft\windows\currentversion\explorer\mountpoints2\{a7837212-e83a-11dc-8e7f-000000000000}]
\shell\AutoRun\command - F:\Autorun.exe /run
\shell\Shell00\Command - F:\Autorun.exe /run
\shell\Shell01\Command - F:\Autorun.exe /action
\shell\Shell02\Command - F:\Autorun.exe /uninstall
*Newly Created Service* - CATCHME
*Newly Created Service* - PROCEXP90
.
Contenu du dossier 'Scheduled Tasks/Tâches planifiées'
"2008-07-18 08:59:59 C:\Windows\Tasks\User_Feed_Synchronization-{C2391D2C-3589-4FB3-9529-929887AD2125}.job"
- C:\Windows\system32\msfeedssync.exe
"2008-07-17 14:19:32 C:\Windows\Tasks\User_Feed_Synchronization-{FF89E2C6-98AE-4259-8AFF-CD4A8C10AFC0}.job"
- C:\Windows\system32\msfeedssync.exe
.
- - - - ORPHANS REMOVED - - - -
HKCU-Run-dmqpp.tmp - C:\Windows\system32\dmqpp.tmp
HKCU-Run-dmaok.tmp - C:\Windows\system32\dmaok.tmp
HKCU-Run-dmydd.tmp - C:\Windows\system32\dmydd.tmp
HKCU-Run-dmhnn.tmp - C:\Windows\system32\dmhnn.tmp
HKCU-Run-dmdkj.tmp - C:\Windows\system32\dmdkj.tmp
HKCU-Run-dmmmh.tmp - C:\Windows\system32\dmmmh.tmp
HKCU-Run-dmpob.tmp - C:\Windows\system32\dmpob.tmp
HKCU-Run-dmdpv.tmp - C:\Windows\system32\dmdpv.tmp
HKCU-Run-dmrwa.tmp - C:\Windows\system32\dmrwa.tmp
HKCU-Run-dmdzj.tmp - C:\Windows\system32\dmdzj.tmp
HKCU-Run-dmgej.tmp - C:\Windows\system32\dmgej.tmp
HKCU-Run-dmwjj.tmp - C:\Windows\system32\dmwjj.tmp
HKCU-Run-dmrio.tmp - C:\Windows\system32\dmrio.tmp
HKCU-Run-dmghj.tmp - C:\Windows\system32\dmghj.tmp
HKCU-Run-dmmkn.tmp - C:\Windows\system32\dmmkn.tmp
HKCU-Run-dmwdc.tmp - C:\Windows\system32\dmwdc.tmp
HKCU-Run-dmksc.tmp - C:\Windows\system32\dmksc.tmp
HKCU-Run-dmczp.tmp - C:\Windows\system32\dmczp.tmp
HKCU-Run-dmcup.tmp - C:\Windows\system32\dmcup.tmp
HKCU-Run-dmhyz.tmp - C:\Windows\system32\dmhyz.tmp
HKCU-Run-dmwuc.tmp - C:\Windows\system32\dmwuc.tmp
HKCU-Run-dmssf.tmp - C:\Windows\system32\dmssf.tmp
HKCU-Run-dmipp.tmp - C:\Windows\system32\dmipp.tmp
HKCU-Run-dmycw.tmp - C:\Windows\system32\dmycw.tmp
HKCU-Run-dmsxi.tmp - C:\Windows\system32\dmsxi.tmp
HKCU-Run-dmqod.tmp - C:\Windows\system32\dmqod.tmp
HKCU-Run-dmedo.tmp - C:\Windows\system32\dmedo.tmp
HKCU-Run-dmpzd.tmp - C:\Windows\system32\dmpzd.tmp
HKCU-Run-dmmuc.tmp - C:\Windows\system32\dmmuc.tmp
HKCU-Run-dmmor.tmp - C:\Windows\system32\dmmor.tmp
HKCU-Run-dmcag.tmp - C:\Windows\system32\dmcag.tmp
HKCU-Run-dmnbw.tmp - C:\Windows\system32\dmnbw.tmp
HKCU-Run-dmqtf.tmp - C:\Windows\system32\dmqtf.tmp
HKCU-Run-dmfnt.tmp - C:\Windows\system32\dmfnt.tmp
HKCU-Run-dmdan.tmp - C:\Windows\system32\dmdan.tmp
HKCU-Run-dmzhp.tmp - C:\Windows\system32\dmzhp.tmp
HKCU-Run-dmcat.tmp - C:\Windows\system32\dmcat.tmp
HKCU-Run-dmtbu.tmp - C:\Windows\system32\dmtbu.tmp
HKCU-Run-dmbxl.tmp - C:\Windows\system32\dmbxl.tmp
HKCU-Run-dmajk.tmp - C:\Windows\system32\dmajk.tmp
HKCU-Run-dmqvx.tmp - C:\Windows\system32\dmqvx.tmp
HKCU-Run-dmwnc.tmp - C:\Windows\system32\dmwnc.tmp
HKCU-Run-dmlwq.tmp - C:\Windows\system32\dmlwq.tmp
HKCU-Run-dmrab.tmp - C:\Windows\system32\dmrab.tmp
HKCU-Run-dmbyl.tmp - C:\Windows\system32\dmbyl.tmp
HKCU-Run-dmwnl.tmp - C:\Windows\system32\dmwnl.tmp
HKCU-Run-dmpix.tmp - C:\Windows\system32\dmpix.tmp
HKCU-Run-dmezt.tmp - C:\Windows\system32\dmezt.tmp
HKCU-Run-dmgjw.tmp - C:\Windows\system32\dmgjw.tmp
HKCU-Run-dmgia.tmp - C:\Windows\system32\dmgia.tmp
HKCU-Run-dmcfb.tmp - C:\Windows\system32\dmcfb.tmp
HKCU-Run-dmqay.tmp - C:\Windows\system32\dmqay.tmp
HKCU-Run-dmxnv.tmp - C:\Windows\system32\dmxnv.tmp
HKCU-Run-dmesa.tmp - C:\Windows\system32\dmesa.tmp
HKCU-Run-dmkbf.tmp - C:\Windows\system32\dmkbf.tmp
HKCU-Run-dmiii.tmp - C:\Windows\system32\dmiii.tmp
HKCU-Run-dmsmu.tmp - C:\Windows\system32\dmsmu.tmp
HKCU-Run-dmzlu.tmp - C:\Windows\system32\dmzlu.tmp
HKCU-Run-dmxix.tmp - C:\Windows\system32\dmxix.tmp
HKCU-Run-dmhpd.tmp - C:\Windows\system32\dmhpd.tmp
HKCU-Run-dmcdq.tmp - C:\Windows\system32\dmcdq.tmp
HKCU-Run-dmieb.tmp - C:\Windows\system32\dmieb.tmp
HKCU-Run-dmqna.tmp - C:\Windows\system32\dmqna.tmp
HKCU-Run-dmuoi.tmp - C:\Windows\system32\dmuoi.tmp
HKCU-Run-dmiiy.tmp - C:\Windows\system32\dmiiy.tmp
HKCU-Run-dmpnh.tmp - C:\Windows\system32\dmpnh.tmp
HKCU-Run-dmtbp.tmp - C:\Windows\system32\dmtbp.tmp
HKCU-Run-dmlmj.tmp - C:\Windows\system32\dmlmj.tmp
HKCU-Run-dmfqu.tmp - C:\Windows\system32\dmfqu.tmp
HKCU-Run-dmivp.tmp - C:\Windows\system32\dmivp.tmp
HKCU-Run-dmpmx.tmp - C:\Windows\system32\dmpmx.tmp
HKCU-Run-dmrjk.tmp - C:\Windows\system32\dmrjk.tmp
HKCU-Run-dmkbh.tmp - C:\Windows\system32\dmkbh.tmp
HKCU-Run-dmsuc.tmp - C:\Windows\system32\dmsuc.tmp
HKCU-Run-dmbsj.tmp - C:\Windows\system32\dmbsj.tmp
HKCU-Run-dmwta.tmp - C:\Windows\system32\dmwta.tmp
HKCU-Run-dmjkl.tmp - C:\Windows\system32\dmjkl.tmp
HKCU-Run-dmrrr.tmp - C:\Windows\system32\dmrrr.tmp
HKCU-Run-dmfea.tmp - C:\Windows\system32\dmfea.tmp
HKCU-Run-dmeow.tmp - C:\Windows\system32\dmeow.tmp
HKCU-Run-dmzch.tmp - C:\Windows\system32\dmzch.tmp
HKCU-Run-dmyyk.tmp - C:\Windows\system32\dmyyk.tmp
HKCU-Run-dmktc.tmp - C:\Windows\system32\dmktc.tmp
HKCU-Run-dmpts.tmp - C:\Windows\system32\dmpts.tmp
HKCU-Run-dmfvt.tmp - C:\Windows\system32\dmfvt.tmp
HKCU-Run-dmacf.tmp - C:\Windows\system32\dmacf.tmp
HKCU-Run-dmsnw.tmp - C:\Windows\system32\dmsnw.tmp
HKCU-Run-dmjni.tmp - C:\Windows\system32\dmjni.tmp
HKCU-Run-dmigx.tmp - C:\Windows\system32\dmigx.tmp
HKCU-Run-Acer Tour Reminder - (no file)
**************************************************************************
catchme 0.3.1361 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2008-07-18 11:03:10
Windows 6.0.6000 NTFS
Balayage processus cachés ...
Balayage caché autostart entries ...
Balayage des fichiers cachés ...
Scan terminé avec succès
Les fichiers cachés: 0
**************************************************************************
.
Temps d'accomplissement: 2008-07-18 11:04:19
ComboFix-quarantined-files.txt 2008-07-18 09:04:11
Pre-Run: 38,471,307,264 octets libres
Post-Run: 38,518,886,400 octets libres
259 --- E O F --- 2008-07-16 13:44:25
Microsoft® Windows Vista™ Édition Familiale Premium 6.0.6000.0.1252.1.1036.18.814 [GMT 2:00]
Endroit: C:\Users\alain\Desktop\ComboFix.exe
* Création d'un nouveau point de restauration
.
(((((((((((((((((((((((((((((((((((( Autres suppressions ))))))))))))))))))))))))))))))))))))))))))))))))
.
C:\Users\alain\AppData\Local\kyeis.dat
C:\Users\alain\AppData\Local\kyeis.exe
C:\Users\alain\AppData\Local\kyeis_nav.dat
C:\Users\alain\AppData\Local\kyeis_navps.dat
C:\Windows\system32\ACER.exe
C:\Windows\Temp\log.txt
.
((((((((((((((((((((((((((((( Fichiers créés 2008-06-18 to 2008-07-18 ))))))))))))))))))))))))))))))))))))
.
2008-07-18 10:55 . 2008-07-18 10:56 <REP> d-------- C:\327882R2FWJFW
2008-07-15 09:21 . 2008-02-15 01:19 944,184 --a------ C:\Windows\System32\winload.exe
2008-07-15 09:21 . 2008-02-19 07:10 620,088 --a------ C:\Windows\System32\ci.dll
2008-07-15 09:21 . 2008-02-29 08:39 371,712 --a------ C:\Windows\System32\srcore.dll
2008-07-15 09:21 . 2008-02-29 08:38 313,856 --a------ C:\Windows\System32\rstrui.exe
2008-07-15 09:21 . 2008-02-29 08:39 40,960 --a------ C:\Windows\System32\srclient.dll
2008-07-15 09:21 . 2008-02-29 08:51 19,000 --a------ C:\Windows\System32\kd1394.dll
2008-07-15 09:21 . 2008-02-29 08:38 16,384 --a------ C:\Windows\System32\srdelayed.exe
2008-07-15 09:21 . 2008-02-29 08:34 7,168 --a------ C:\Windows\System32\f3ahvoas.dll
2008-07-15 09:21 . 2008-02-29 08:35 6,656 --a------ C:\Windows\System32\kbd106n.dll
2008-07-15 09:20 . 2008-03-08 02:37 4,247,552 --a------ C:\Windows\System32\GameUXLegacyGDFs.dll
2008-07-15 09:20 . 2008-02-29 06:16 2,027,008 --a------ C:\Windows\System32\win32k.sys
2008-07-15 09:20 . 2008-02-21 06:43 296,448 --a------ C:\Windows\System32\gdi32.dll
2008-07-15 09:20 . 2008-05-10 03:21 113,664 --a------ C:\Windows\System32\drivers\rmcast.sys
2008-07-15 09:20 . 2008-05-10 05:30 14,848 --a------ C:\Windows\System32\wshrm.dll
2008-07-14 18:17 . 2008-07-14 18:17 <REP> d-------- C:\Users\All Users\Malwarebytes
2008-07-14 18:17 . 2008-07-14 18:17 <REP> d-------- C:\Users\alain\AppData\Roaming\Malwarebytes
2008-07-14 18:17 . 2008-07-14 18:17 <REP> d-------- C:\ProgramData\Malwarebytes
2008-07-14 18:17 . 2008-07-14 20:53 <REP> d-------- C:\Program Files\Malwarebytes' Anti-Malware
2008-07-14 18:17 . 2008-07-07 17:35 34,296 --a------ C:\Windows\System32\drivers\mbamcatchme.sys
2008-07-14 18:17 . 2008-07-07 17:35 17,144 --a------ C:\Windows\System32\drivers\mbam.sys
2008-07-14 16:20 . 2008-07-16 15:31 <REP> d-------- C:\fixwareout
2008-07-09 17:08 . 2008-07-09 17:43 <REP> d-------- C:\Users\All Users\Spybot - Search & Destroy
2008-07-09 17:08 . 2008-07-09 17:43 <REP> d-------- C:\ProgramData\Spybot - Search & Destroy
2008-06-25 14:25 . 2008-07-05 06:12 <REP> d-------- C:\Users\alain\[u]0/u6.08 à mélizey
2008-06-19 10:06 . 2008-06-19 10:07 <REP> d-------- C:\Program Files\Java
2008-06-19 10:04 . 2008-06-19 10:04 <REP> d-------- C:\Program Files\Common Files\Java
2008-06-18 18:51 . 2008-06-18 18:51 <REP> d-------- C:\Users\alain\AppData\Roaming\Icone
.
(((((((((((((((((((((((((((((((((( Compte-rendu de Find3M ))))))))))))))))))))))))))))))))))))))))))))))))
.
2008-07-15 16:35 174 --sha-w C:\Program Files\desktop.ini
2008-07-15 16:29 --------- d-----w C:\Program Files\Windows Mail
2008-07-05 03:52 --------- d-----w C:\ProgramData\Microsoft Help
2008-06-10 08:36 --------- d-----w C:\Program Files\DivX
2008-06-10 07:18 --------- d-----w C:\Program Files\Google
2008-05-30 23:22 823,296 ----a-w C:\Windows\System32\divx_xx0c.dll
2008-05-30 23:22 823,296 ----a-w C:\Windows\System32\divx_xx07.dll
2008-05-30 23:22 815,104 ----a-w C:\Windows\System32\divx_xx0a.dll
2008-05-30 23:22 802,816 ----a-w C:\Windows\System32\divx_xx11.dll
2008-05-30 23:22 683,520 ----a-w C:\Windows\System32\DivX.dll
2008-05-30 23:22 593,920 ----a-w C:\Windows\System32\dpuGUI11.dll
2008-05-30 23:22 57,344 ----a-w C:\Windows\System32\dpv11.dll
2008-05-30 23:22 53,248 ----a-w C:\Windows\System32\dpuGUI10.dll
2008-05-30 23:22 344,064 ----a-w C:\Windows\System32\dpus11.dll
2008-05-30 23:22 294,912 ----a-w C:\Windows\System32\dpu11.dll
2008-05-30 23:22 294,912 ----a-w C:\Windows\System32\dpu10.dll
2008-05-22 22:22 524,288 ----a-w C:\Windows\System32\DivXsm.exe
2008-05-22 22:22 3,596,288 ----a-w C:\Windows\System32\qt-dx331.dll
2008-05-22 22:20 200,704 ----a-w C:\Windows\System32\ssldivx.dll
2008-05-22 22:20 1,044,480 ----a-w C:\Windows\System32\libdivx.dll
2008-05-22 22:19 81,920 ----a-w C:\Windows\System32\dpl100.dll
2008-05-22 22:19 196,608 ----a-w C:\Windows\System32\dtu100.dll
2008-05-22 22:19 161,096 ----a-w C:\Windows\System32\DivXCodecVersionChecker.exe
2008-05-22 22:18 12,288 ----a-w C:\Windows\System32\DivXWMPExtType.dll
2008-04-26 08:02 1,327,104 ----a-w C:\Windows\System32\quartz.dll
2008-04-25 04:23 826,368 ----a-w C:\Windows\System32\wininet.dll
2008-04-25 04:23 56,320 ----a-w C:\Windows\System32\iesetup.dll
2008-04-25 04:23 52,736 ----a-w C:\Windows\AppPatch\iebrshim.dll
2008-04-25 04:22 26,624 ----a-w C:\Windows\System32\ieUnatt.exe
2008-02-25 22:14 0 ----a-w C:\Users\alain\AppData\Roaming\wklnhst.dat
2008-04-03 08:24 16,384 --sha-w C:\Windows\ServiceProfiles\LocalService\AppData\Local\Microsoft\Windows\History\History.IE5\index.dat
2008-04-03 08:24 32,768 --sha-w C:\Windows\ServiceProfiles\LocalService\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\index.dat
2008-04-03 08:24 16,384 --sha-w C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Windows\Cookies\index.dat
.
((((((((((((((((((((((((((((((((( Point de chargement Reg )))))))))))))))))))))))))))))))))))))))))))))))))
.
.
REGEDIT4
*Note* les éléments vides & les éléments initiaux légitimes ne sont pas listés
[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"Sidebar"="C:\Program Files\Windows Sidebar\sidebar.exe" [2008-01-19 04:36 1232896]
"ehTray.exe"="C:\Windows\ehome\ehTray.exe" [2006-11-02 14:35 125440]
"WMPNSCFG"="C:\Program Files\Windows Media Player\WMPNSCFG.exe" [2006-11-02 14:36 201728]
"AdobeUpdater"="C:\Program Files\Common Files\Adobe\Updater5\AdobeUpdater.exe" [2007-03-01 11:37 2321600]
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"avast!"="C:\PROGRA~1\ALWILS~1\Avast4\ashDisp.exe" [2008-05-16 01:19 79224]
"Symantec PIF AlertEng"="C:\Program Files\Common Files\Symantec Shared\PIF\{B8E1DD85-8582-4c61-B58F-2F227FCA9A08}\PifSvc.exe" [2007-03-12 11:22 517768]
"SunJavaUpdateSched"="C:\Program Files\Java\jre1.6.0_06\bin\jusched.exe" [2008-03-25 04:28 144784]
"SynTPEnh"="C:\Program Files\Synaptics\SynTP\SynTPEnh.exe" [2006-10-23 21:00 815104]
"Kernel and Hardware Abstraction Layer"="KHALMNPR.EXE" [2007-11-29 03:17 55824 C:\Windows\KHALMNPR.Exe]
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\
Empowering Technology Launcher.lnk - C:\Acer\Empowering Technology\eAPLauncher.exe [2007-09-17 19:33:55 535336]
Logitech SetPoint.lnk - C:\Program Files\Logitech\SetPoint\SetPoint.exe [2008-03-14 09:11:05 789008]
Microsoft Office.lnk - C:\Program Files\Microsoft Office\Office\OSA9.EXE [1999-02-18 01:05:56 65588]
Supervision de Photo Loader.lnk - C:\Program Files\CASIO\Photo Loader\Plauto.exe [2008-01-19 19:53:06 217088]
[HKEY_CURRENT_USER\software\microsoft\windows\currentversion\policies\system]
"LogonHoursAction"= 2 (0x2)
"DontDisplayLogonHoursWarnings"= 1 (0x1)
[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring]
"DisableMonitoring"=dword:00000001
[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\SymantecAntiVirus]
"DisableMonitoring"=dword:00000001
[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\SymantecFirewall]
"DisableMonitoring"=dword:00000001
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\DomainProfile]
"EnableFirewall"= 0 (0x0)
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\FirewallRules]
"{EF379370-5C42-46B8-944B-5FB3A1FA1A39}"= C:\Program Files\CyberLink\PowerDVD\PowerDVD.EXE:CyberLink PowerDVD
"{EE2C9D54-3AD5-4A21-9CF5-3006E2365FB2}"= Disabled:UDP:C:\Users\alain\Desktop\incredimail_install.exe:IncrediMail Installer
"{BDABCAD8-2E06-4A8C-AB3E-38FE512BC7C0}"= Disabled:TCP:C:\Users\alain\Desktop\incredimail_install.exe:IncrediMail Installer
"{86279E3B-F797-46CF-A2FE-F1F11DF1D152}"= Disabled:UDP:C:\Users\alain\AppData\Local\Temp\ImInstaller\IncrediMail\incredimail_install.exe:IncrediMail Installer
"{2AB2621D-59CA-402B-9367-912978AAEE76}"= Disabled:TCP:C:\Users\alain\AppData\Local\Temp\ImInstaller\IncrediMail\incredimail_install.exe:IncrediMail Installer
"TCP Query User{9CDE96EC-4E44-4B29-AD9B-C2172869F32A}C:\\program files\\emule\\emule.exe"= UDP:C:\program files\emule\emule.exe:eMule
"UDP Query User{930D275A-6A1F-4E1C-8F94-DEE680178842}C:\\program files\\emule\\emule.exe"= TCP:C:\program files\emule\emule.exe:eMule
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\PublicProfile]
"EnableFirewall"= 0 (0x0)
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\RestrictedServices\Static\System]
"DFSR-1"= RPort=5722|UDP:%SystemRoot%\system32\svchost.exe|Svc=DFSR:Allow inbound TCP traffic|
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\StandardProfile]
"EnableFirewall"= 0 (0x0)
"DoNotAllowExceptions"= 1 (0x1)
R0 O2MDRDR;O2MDRDR;C:\Windows\system32\DRIVERS\o2media.sys [2007-04-03 19:04]
R0 O2SDRDR;O2SDRDR;C:\Windows\system32\DRIVERS\o2sd.sys [2007-04-03 01:11]
R1 aswSP;avast! Self Protection;C:\Windows\system32\drivers\aswSP.sys [2008-05-16 01:20]
R2 {95808DC4-FA4A-4c74-92FE-5B863F82066B};{95808DC4-FA4A-4c74-92FE-5B863F82066B};C:\Program Files\CyberLink\PowerDVD\[u]0/u00.fcl [2006-11-02 16:51]
R2 aswFsBlk;aswFsBlk;C:\Windows\system32\DRIVERS\aswFsBlk.sys [2008-05-16 01:16]
R2 aswMonFlt;aswMonFlt;C:\Windows\system32\DRIVERS\aswMonFlt.sys [2008-05-16 01:18]
R2 MSSQL$MSSMLBIZ;SQL Server (MSSMLBIZ);C:\Program Files\Microsoft SQL Server\MSSQL.1\MSSQL\Binn\sqlservr.exe [2006-04-14 10:07]
R3 atikmdag;atikmdag;C:\Windows\system32\DRIVERS\atikmdag.sys [2007-08-12 09:10]
R3 yukonwlh;NDIS6.0 Miniport Driver for Marvell Yukon Ethernet Controller;C:\Windows\system32\DRIVERS\yk60x86.sys [2007-04-17 20:12]
[HKEY_CURRENT_USER\software\microsoft\windows\currentversion\explorer\mountpoints2\{a3d5da7c-c72d-11dc-995e-000000000000}]
\shell\AutoRun\command - rundll32.exe url,FileProtocolHandler library_1.htm
[HKEY_CURRENT_USER\software\microsoft\windows\currentversion\explorer\mountpoints2\{a7837212-e83a-11dc-8e7f-000000000000}]
\shell\AutoRun\command - F:\Autorun.exe /run
\shell\Shell00\Command - F:\Autorun.exe /run
\shell\Shell01\Command - F:\Autorun.exe /action
\shell\Shell02\Command - F:\Autorun.exe /uninstall
*Newly Created Service* - CATCHME
*Newly Created Service* - PROCEXP90
.
Contenu du dossier 'Scheduled Tasks/Tâches planifiées'
"2008-07-18 08:59:59 C:\Windows\Tasks\User_Feed_Synchronization-{C2391D2C-3589-4FB3-9529-929887AD2125}.job"
- C:\Windows\system32\msfeedssync.exe
"2008-07-17 14:19:32 C:\Windows\Tasks\User_Feed_Synchronization-{FF89E2C6-98AE-4259-8AFF-CD4A8C10AFC0}.job"
- C:\Windows\system32\msfeedssync.exe
.
- - - - ORPHANS REMOVED - - - -
HKCU-Run-dmqpp.tmp - C:\Windows\system32\dmqpp.tmp
HKCU-Run-dmaok.tmp - C:\Windows\system32\dmaok.tmp
HKCU-Run-dmydd.tmp - C:\Windows\system32\dmydd.tmp
HKCU-Run-dmhnn.tmp - C:\Windows\system32\dmhnn.tmp
HKCU-Run-dmdkj.tmp - C:\Windows\system32\dmdkj.tmp
HKCU-Run-dmmmh.tmp - C:\Windows\system32\dmmmh.tmp
HKCU-Run-dmpob.tmp - C:\Windows\system32\dmpob.tmp
HKCU-Run-dmdpv.tmp - C:\Windows\system32\dmdpv.tmp
HKCU-Run-dmrwa.tmp - C:\Windows\system32\dmrwa.tmp
HKCU-Run-dmdzj.tmp - C:\Windows\system32\dmdzj.tmp
HKCU-Run-dmgej.tmp - C:\Windows\system32\dmgej.tmp
HKCU-Run-dmwjj.tmp - C:\Windows\system32\dmwjj.tmp
HKCU-Run-dmrio.tmp - C:\Windows\system32\dmrio.tmp
HKCU-Run-dmghj.tmp - C:\Windows\system32\dmghj.tmp
HKCU-Run-dmmkn.tmp - C:\Windows\system32\dmmkn.tmp
HKCU-Run-dmwdc.tmp - C:\Windows\system32\dmwdc.tmp
HKCU-Run-dmksc.tmp - C:\Windows\system32\dmksc.tmp
HKCU-Run-dmczp.tmp - C:\Windows\system32\dmczp.tmp
HKCU-Run-dmcup.tmp - C:\Windows\system32\dmcup.tmp
HKCU-Run-dmhyz.tmp - C:\Windows\system32\dmhyz.tmp
HKCU-Run-dmwuc.tmp - C:\Windows\system32\dmwuc.tmp
HKCU-Run-dmssf.tmp - C:\Windows\system32\dmssf.tmp
HKCU-Run-dmipp.tmp - C:\Windows\system32\dmipp.tmp
HKCU-Run-dmycw.tmp - C:\Windows\system32\dmycw.tmp
HKCU-Run-dmsxi.tmp - C:\Windows\system32\dmsxi.tmp
HKCU-Run-dmqod.tmp - C:\Windows\system32\dmqod.tmp
HKCU-Run-dmedo.tmp - C:\Windows\system32\dmedo.tmp
HKCU-Run-dmpzd.tmp - C:\Windows\system32\dmpzd.tmp
HKCU-Run-dmmuc.tmp - C:\Windows\system32\dmmuc.tmp
HKCU-Run-dmmor.tmp - C:\Windows\system32\dmmor.tmp
HKCU-Run-dmcag.tmp - C:\Windows\system32\dmcag.tmp
HKCU-Run-dmnbw.tmp - C:\Windows\system32\dmnbw.tmp
HKCU-Run-dmqtf.tmp - C:\Windows\system32\dmqtf.tmp
HKCU-Run-dmfnt.tmp - C:\Windows\system32\dmfnt.tmp
HKCU-Run-dmdan.tmp - C:\Windows\system32\dmdan.tmp
HKCU-Run-dmzhp.tmp - C:\Windows\system32\dmzhp.tmp
HKCU-Run-dmcat.tmp - C:\Windows\system32\dmcat.tmp
HKCU-Run-dmtbu.tmp - C:\Windows\system32\dmtbu.tmp
HKCU-Run-dmbxl.tmp - C:\Windows\system32\dmbxl.tmp
HKCU-Run-dmajk.tmp - C:\Windows\system32\dmajk.tmp
HKCU-Run-dmqvx.tmp - C:\Windows\system32\dmqvx.tmp
HKCU-Run-dmwnc.tmp - C:\Windows\system32\dmwnc.tmp
HKCU-Run-dmlwq.tmp - C:\Windows\system32\dmlwq.tmp
HKCU-Run-dmrab.tmp - C:\Windows\system32\dmrab.tmp
HKCU-Run-dmbyl.tmp - C:\Windows\system32\dmbyl.tmp
HKCU-Run-dmwnl.tmp - C:\Windows\system32\dmwnl.tmp
HKCU-Run-dmpix.tmp - C:\Windows\system32\dmpix.tmp
HKCU-Run-dmezt.tmp - C:\Windows\system32\dmezt.tmp
HKCU-Run-dmgjw.tmp - C:\Windows\system32\dmgjw.tmp
HKCU-Run-dmgia.tmp - C:\Windows\system32\dmgia.tmp
HKCU-Run-dmcfb.tmp - C:\Windows\system32\dmcfb.tmp
HKCU-Run-dmqay.tmp - C:\Windows\system32\dmqay.tmp
HKCU-Run-dmxnv.tmp - C:\Windows\system32\dmxnv.tmp
HKCU-Run-dmesa.tmp - C:\Windows\system32\dmesa.tmp
HKCU-Run-dmkbf.tmp - C:\Windows\system32\dmkbf.tmp
HKCU-Run-dmiii.tmp - C:\Windows\system32\dmiii.tmp
HKCU-Run-dmsmu.tmp - C:\Windows\system32\dmsmu.tmp
HKCU-Run-dmzlu.tmp - C:\Windows\system32\dmzlu.tmp
HKCU-Run-dmxix.tmp - C:\Windows\system32\dmxix.tmp
HKCU-Run-dmhpd.tmp - C:\Windows\system32\dmhpd.tmp
HKCU-Run-dmcdq.tmp - C:\Windows\system32\dmcdq.tmp
HKCU-Run-dmieb.tmp - C:\Windows\system32\dmieb.tmp
HKCU-Run-dmqna.tmp - C:\Windows\system32\dmqna.tmp
HKCU-Run-dmuoi.tmp - C:\Windows\system32\dmuoi.tmp
HKCU-Run-dmiiy.tmp - C:\Windows\system32\dmiiy.tmp
HKCU-Run-dmpnh.tmp - C:\Windows\system32\dmpnh.tmp
HKCU-Run-dmtbp.tmp - C:\Windows\system32\dmtbp.tmp
HKCU-Run-dmlmj.tmp - C:\Windows\system32\dmlmj.tmp
HKCU-Run-dmfqu.tmp - C:\Windows\system32\dmfqu.tmp
HKCU-Run-dmivp.tmp - C:\Windows\system32\dmivp.tmp
HKCU-Run-dmpmx.tmp - C:\Windows\system32\dmpmx.tmp
HKCU-Run-dmrjk.tmp - C:\Windows\system32\dmrjk.tmp
HKCU-Run-dmkbh.tmp - C:\Windows\system32\dmkbh.tmp
HKCU-Run-dmsuc.tmp - C:\Windows\system32\dmsuc.tmp
HKCU-Run-dmbsj.tmp - C:\Windows\system32\dmbsj.tmp
HKCU-Run-dmwta.tmp - C:\Windows\system32\dmwta.tmp
HKCU-Run-dmjkl.tmp - C:\Windows\system32\dmjkl.tmp
HKCU-Run-dmrrr.tmp - C:\Windows\system32\dmrrr.tmp
HKCU-Run-dmfea.tmp - C:\Windows\system32\dmfea.tmp
HKCU-Run-dmeow.tmp - C:\Windows\system32\dmeow.tmp
HKCU-Run-dmzch.tmp - C:\Windows\system32\dmzch.tmp
HKCU-Run-dmyyk.tmp - C:\Windows\system32\dmyyk.tmp
HKCU-Run-dmktc.tmp - C:\Windows\system32\dmktc.tmp
HKCU-Run-dmpts.tmp - C:\Windows\system32\dmpts.tmp
HKCU-Run-dmfvt.tmp - C:\Windows\system32\dmfvt.tmp
HKCU-Run-dmacf.tmp - C:\Windows\system32\dmacf.tmp
HKCU-Run-dmsnw.tmp - C:\Windows\system32\dmsnw.tmp
HKCU-Run-dmjni.tmp - C:\Windows\system32\dmjni.tmp
HKCU-Run-dmigx.tmp - C:\Windows\system32\dmigx.tmp
HKCU-Run-Acer Tour Reminder - (no file)
**************************************************************************
catchme 0.3.1361 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2008-07-18 11:03:10
Windows 6.0.6000 NTFS
Balayage processus cachés ...
Balayage caché autostart entries ...
Balayage des fichiers cachés ...
Scan terminé avec succès
Les fichiers cachés: 0
**************************************************************************
.
Temps d'accomplissement: 2008-07-18 11:04:19
ComboFix-quarantined-files.txt 2008-07-18 09:04:11
Pre-Run: 38,471,307,264 octets libres
Post-Run: 38,518,886,400 octets libres
259 --- E O F --- 2008-07-16 13:44:25
parfait
ça doit aller mieux chez toi
on va verifier ton infection magic controle (les pubs)
Désactive le contrôle des comptes utilisateurs (tu le réactiveras après ta désinfection):
- Vas dans "Démarrer" puis Panneau de configuration.
- Double Clique sur l'icône Comptes d'utilisateurs et sur Activer ou désactiver le contrôle des comptes d'utilisateurs.
- Clique sur Continuer.
- Décoche la case Utiliser le contrôle des comptes d'utilisateurs pour vous aider à protéger votre ordinateur.
- Valide par OK et redémarre.
Télécharge maintenant Navilog1 depuis-ce lien :
http://perso.orange.fr/il.mafioso/Navifix/Navilog1.exe
Enregistrer la cible (du lien) sous... et enregistre-le sur ton bureau.
Ensuite double clique sur navilog1.exe pour lancer l'installation.
Une fois l'installation terminée, Fais un Clic-droit sur le raccourci Navilog1 présent sur ton bureau et choisis "Exécuter
en tant qu'administrateur".
Au menu principal, Fais le choix 1
Laisse toi guider et patiente.
Patiente jusqu'au message :
*** Analyse Termine le ..... ***
Appuie sur une touche le blocnote va s'ouvrir.
Copie-colle l'intégralité du rapport dans une réponse.
Referme le blocnote
Le rapport fixnavi.txt est en outre sauvegardé a la racine du disque
ça doit aller mieux chez toi
on va verifier ton infection magic controle (les pubs)
Désactive le contrôle des comptes utilisateurs (tu le réactiveras après ta désinfection):
- Vas dans "Démarrer" puis Panneau de configuration.
- Double Clique sur l'icône Comptes d'utilisateurs et sur Activer ou désactiver le contrôle des comptes d'utilisateurs.
- Clique sur Continuer.
- Décoche la case Utiliser le contrôle des comptes d'utilisateurs pour vous aider à protéger votre ordinateur.
- Valide par OK et redémarre.
Télécharge maintenant Navilog1 depuis-ce lien :
http://perso.orange.fr/il.mafioso/Navifix/Navilog1.exe
Enregistrer la cible (du lien) sous... et enregistre-le sur ton bureau.
Ensuite double clique sur navilog1.exe pour lancer l'installation.
Une fois l'installation terminée, Fais un Clic-droit sur le raccourci Navilog1 présent sur ton bureau et choisis "Exécuter
en tant qu'administrateur".
Au menu principal, Fais le choix 1
Laisse toi guider et patiente.
Patiente jusqu'au message :
*** Analyse Termine le ..... ***
Appuie sur une touche le blocnote va s'ouvrir.
Copie-colle l'intégralité du rapport dans une réponse.
Referme le blocnote
Le rapport fixnavi.txt est en outre sauvegardé a la racine du disque