Virus alerte
llc95
-
Utilisateur anonyme -
Utilisateur anonyme -
Bonjour,
IEDFix
Credits: Malware Analysis & Diagnostic
Code: S!Ri
»»»»»»»»»»»»»»»»»»»»»»»» VACFix
!!!Attention, les clés qui suivent ne sont pas forcément infectées!!!
VACFix
Credits: Malware Analysis & Diagnostic
Code: S!Ri
+--------------------------------------------------+
[!] Suspicious: grfxbanoros.dll
BHO: QXK Olive - {E7E4053B-FD23-448B-842F-793DD49AA53C}
TypeLib: {A473416A-C3E9-4910-9721-180191815C32}
Interface: {D9230357-F5B1-443E-BFA2-0FA16687DAB8}
Interface: {F35505CC-8D3C-4063-BF16-09BFD649D44F}
»»»»»»»»»»»»»»»»»»»»»»»» 404Fix
!!!Attention, les clés qui suivent ne sont pas forcément infectées!!!
404Fix
Credits: Malware Analysis & Diagnostic
Code: S!Ri
»»»»»»»»»»»»»»»»»»»»»»»» AntiXPVSTFix
!!!Attention, les clés qui suivent ne sont pas forcément infectées!!!
AntiXPVSTFix
Credits: Malware Analysis & Diagnostic
Code: S!Ri
»»»»»»»»»»»»»»»»»»»»»»»» Sharedtaskscheduler
!!!Attention, les clés qui suivent ne sont pas forcément infectées!!!
SrchSTS.exe by S!Ri
Search SharedTaskScheduler's .dll
»»»»»»»»»»»»»»»»»»»»»»»» AppInit_DLLs
!!!Attention, les clés qui suivent ne sont pas forcément infectées!!!
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows]
"AppInit_DLLs"="karna.dat"
»»»»»»»»»»»»»»»»»»»»»»»» Winlogon
!!!Attention, les clés qui suivent ne sont pas forcément infectées!!!
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon]
"Userinit"="C:\\WINDOWS\\system32\\userinit.exe,"
"System"=""
»»»»»»»»»»»»»»»»»»»»»»»» RK
C:\WINDOWS\system32\drivers\beep.sys infecté !
»»»»»»»»»»»»»»»»»»»»»»»» DNS
Description: Adaptateur USB 2.0 sans fil à double bande (802.11a/b/g) Dell 1450 - Miniport d'ordonnancement de paquets
DNS Server Search Order: 212.27.54.252
DNS Server Search Order: 212.27.53.252
HKLM\SYSTEM\CCS\Services\Tcpip\..\{F3D1B493-7ED4-402D-A757-4B70074C85A6}: NameServer=212.27.54.252,212.27.53.252
HKLM\SYSTEM\CS1\Services\Tcpip\..\{F3D1B493-7ED4-402D-A757-4B70074C85A6}: NameServer=212.27.54.252,212.27.53.252
HKLM\SYSTEM\CS2\Services\Tcpip\..\{F3D1B493-7ED4-402D-A757-4B70074C85A6}: NameServer=212.27.54.252,212.27.53.252
HKLM\SYSTEM\CS3\Services\Tcpip\..\{F3D1B493-7ED4-402D-A757-4B70074C85A6}: NameServer=212.27.54.252,212.27.53.252
»»»»»»»»»»»»»»»»»»»»»»»» Recherche infection wininet.dll
»»»»»»»»»»»»»»»»»»»»»»»» Fin
IEDFix
Credits: Malware Analysis & Diagnostic
Code: S!Ri
»»»»»»»»»»»»»»»»»»»»»»»» VACFix
!!!Attention, les clés qui suivent ne sont pas forcément infectées!!!
VACFix
Credits: Malware Analysis & Diagnostic
Code: S!Ri
+--------------------------------------------------+
[!] Suspicious: grfxbanoros.dll
BHO: QXK Olive - {E7E4053B-FD23-448B-842F-793DD49AA53C}
TypeLib: {A473416A-C3E9-4910-9721-180191815C32}
Interface: {D9230357-F5B1-443E-BFA2-0FA16687DAB8}
Interface: {F35505CC-8D3C-4063-BF16-09BFD649D44F}
»»»»»»»»»»»»»»»»»»»»»»»» 404Fix
!!!Attention, les clés qui suivent ne sont pas forcément infectées!!!
404Fix
Credits: Malware Analysis & Diagnostic
Code: S!Ri
»»»»»»»»»»»»»»»»»»»»»»»» AntiXPVSTFix
!!!Attention, les clés qui suivent ne sont pas forcément infectées!!!
AntiXPVSTFix
Credits: Malware Analysis & Diagnostic
Code: S!Ri
»»»»»»»»»»»»»»»»»»»»»»»» Sharedtaskscheduler
!!!Attention, les clés qui suivent ne sont pas forcément infectées!!!
SrchSTS.exe by S!Ri
Search SharedTaskScheduler's .dll
»»»»»»»»»»»»»»»»»»»»»»»» AppInit_DLLs
!!!Attention, les clés qui suivent ne sont pas forcément infectées!!!
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows]
"AppInit_DLLs"="karna.dat"
»»»»»»»»»»»»»»»»»»»»»»»» Winlogon
!!!Attention, les clés qui suivent ne sont pas forcément infectées!!!
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon]
"Userinit"="C:\\WINDOWS\\system32\\userinit.exe,"
"System"=""
»»»»»»»»»»»»»»»»»»»»»»»» RK
C:\WINDOWS\system32\drivers\beep.sys infecté !
»»»»»»»»»»»»»»»»»»»»»»»» DNS
Description: Adaptateur USB 2.0 sans fil à double bande (802.11a/b/g) Dell 1450 - Miniport d'ordonnancement de paquets
DNS Server Search Order: 212.27.54.252
DNS Server Search Order: 212.27.53.252
HKLM\SYSTEM\CCS\Services\Tcpip\..\{F3D1B493-7ED4-402D-A757-4B70074C85A6}: NameServer=212.27.54.252,212.27.53.252
HKLM\SYSTEM\CS1\Services\Tcpip\..\{F3D1B493-7ED4-402D-A757-4B70074C85A6}: NameServer=212.27.54.252,212.27.53.252
HKLM\SYSTEM\CS2\Services\Tcpip\..\{F3D1B493-7ED4-402D-A757-4B70074C85A6}: NameServer=212.27.54.252,212.27.53.252
HKLM\SYSTEM\CS3\Services\Tcpip\..\{F3D1B493-7ED4-402D-A757-4B70074C85A6}: NameServer=212.27.54.252,212.27.53.252
»»»»»»»»»»»»»»»»»»»»»»»» Recherche infection wininet.dll
»»»»»»»»»»»»»»»»»»»»»»»» Fin
A voir également:
- Virus alerte
- Comment supprimer fausse alerte virus mcafee - Accueil - Piratage
- Alerte virus google - Accueil - Virus
- Fausse alerte connexion facebook - Guide
- Fausse alerte virus google - Guide
- Virus facebook demande d'amis - Accueil - Facebook
21 réponses
Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 22:37: VIRUS ALERT!, on 13/10/2008
Platform: Windows XP SP3 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP3 (6.00.2900.5512)
Boot mode: Normal
Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\Ati2evxx.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\Intel\Intel Matrix Storage Manager\iaantmon.exe
C:\Program Files\McAfee\SiteAdvisor\McSACore.exe
C:\PROGRA~1\McAfee\MSC\mcmscsvc.exe
c:\PROGRA~1\FICHIE~1\mcafee\mna\mcnasvc.exe
c:\PROGRA~1\FICHIE~1\mcafee\mcproxy\mcproxy.exe
C:\Program Files\McAfee\VirusScan\McShield.exe
C:\Program Files\McAfee\MPF\MPFSrv.exe
C:\Program Files\McAfee\MSK\MskSrver.exe
C:\WINDOWS\system32\PRISMSVC.EXE
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\system32\wscntfy.exe
c:\PROGRA~1\mcafee.com\agent\mcagent.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\system32\PRISMSVR.EXE
C:\Program Files\Spybot - Search & Destroy\SpybotSD.exe
C:\Program Files\Fichiers communs\Ulead Systems\AutoDetector\monitor.exe
C:\WINDOWS\brastk.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\DAEMON Tools Lite\daemon.exe
C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe
C:\Program Files\Dell sans fil\PRISMCFG.exe
C:\PROGRA~1\McAfee\VIRUSS~1\mcsysmon.exe
C:\Program Files\Mozilla Firefox\firefox.exe
C:\Program Files\Trend Micro\HijackThis\HijackThis.exe
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Local Page = google.net-studio.org
R1 - HKCU\Software\Microsoft\Internet Connection Wizard,ShellNext = https://www.dell.com/fr-fr
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Window Title = Internet Explorer
R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName = Liens
R3 - URLSearchHook: (no name) - {4D25F926-B9FE-4682-BF72-8AB8210D6D75} - C:\Program Files\MyWaySA\SrchAsDe\deSrcAs.dll
O3 - Toolbar: &Google - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - c:\program files\google\googletoolbar2.dll
O3 - Toolbar: DAEMON Tools Toolbar - {32099AAC-C132-4136-9E9A-4E364A424E17} - C:\Program Files\DAEMON Tools Toolbar\DTToolbar.dll
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
O4 - HKLM\..\Run: [SpybotSnD] "C:\Program Files\Spybot - Search & Destroy\SpybotSD.exe"
O4 - HKLM\..\Run: [Ulead AutoDetector v2] C:\Program Files\Fichiers communs\Ulead Systems\AutoDetector\monitor.exe
O4 - HKLM\..\Run: [SiteAdvisor] "C:\Program Files\SiteAdvisor\6261\SiteAdv.exe"
O4 - HKLM\..\RunOnce: [UPI11_COM] Regsvr32.exe /s "C:\Program Files\Ulead Systems\Ulead PhotoImpact 12\upiExtractImage.dll"
O4 - HKCU\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\ctfmon.exe
O4 - HKCU\..\Run: [swg] C:\Program Files\Google\GoogleToolbarNotifier\1.2.1128.5462\GoogleToolbarNotifier.exe
O4 - HKCU\..\Run: [DAEMON Tools Lite] "C:\Program Files\DAEMON Tools Lite\daemon.exe" -autorun
O4 - HKCU\..\Run: [SpybotSD TeaTimer] C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe
O4 - HKUS\S-1-5-19\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'SERVICE LOCAL')
O4 - HKUS\S-1-5-20\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'SERVICE RÉSEAU')
O4 - HKUS\S-1-5-18\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'SYSTEM')
O4 - HKUS\.DEFAULT\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'Default user')
O4 - Global Startup: Utilitaire de carte WLAN sans fil USB 2.0.lnk = ?
O6 - HKCU\Software\Policies\Microsoft\Internet Explorer\Restrictions present
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\j2re1.4.2_03\bin\npjpi142_03.dll
O9 - Extra 'Tools' menuitem: Console Java (Sun) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\j2re1.4.2_03\bin\npjpi142_03.dll
O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~3\Office12\REFIEBAR.DLL
O9 - Extra button: Real.com - {CD67F990-D8E9-11d2-98FE-00C0F0318AFE} - C:\WINDOWS\system32\Shdocvw.dll
O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O16 - DPF: {4ED9DDF0-7479-4BBE-9335-5A1EDB1D8A21} (McAfee.com Operating System Class) - http://download.mcafee.com/molbin/shared/mcinsctl/4,0,0,101/mcinsctl.cab
O17 - HKLM\System\CCS\Services\Tcpip\..\{F3D1B493-7ED4-402D-A757-4B70074C85A6}: NameServer = 212.27.54.252,212.27.53.252
O18 - Protocol: sacore - {5513F07E-936B-4E52-9B00-067394E91CC5} - c:\PROGRA~1\mcafee\SITEAD~1\mcieplg.dll
O23 - Service: Ati HotKey Poller - ATI Technologies Inc. - C:\WINDOWS\system32\Ati2evxx.exe
O23 - Service: Google Updater Service (gusvc) - Google - C:\Program Files\Google\Common\Google Updater\GoogleUpdaterService.exe
O23 - Service: Intel(R) Matrix Storage Event Monitor (IAANTMon) - Intel Corporation - C:\Program Files\Intel\Intel Matrix Storage Manager\iaantmon.exe
O23 - Service: McAfee SiteAdvisor Service - Unknown owner - C:\Program Files\McAfee\SiteAdvisor\McSACore.exe
O23 - Service: McAfee Services (mcmscsvc) - McAfee, Inc. - C:\PROGRA~1\McAfee\MSC\mcmscsvc.exe
O23 - Service: McAfee Network Agent (McNASvc) - McAfee, Inc. - c:\PROGRA~1\FICHIE~1\mcafee\mna\mcnasvc.exe
O23 - Service: McAfee Scanner (McODS) - McAfee, Inc. - C:\PROGRA~1\McAfee\VIRUSS~1\mcods.exe
O23 - Service: McAfee Proxy Service (McProxy) - McAfee, Inc. - c:\PROGRA~1\FICHIE~1\mcafee\mcproxy\mcproxy.exe
O23 - Service: McAfee Real-time Scanner (McShield) - McAfee, Inc. - C:\Program Files\McAfee\VirusScan\McShield.exe
O23 - Service: McAfee SystemGuards (McSysmon) - McAfee, Inc. - C:\PROGRA~1\McAfee\VIRUSS~1\mcsysmon.exe
O23 - Service: McAfee Personal Firewall Service (MpfService) - McAfee, Inc. - C:\Program Files\McAfee\MPF\MPFSrv.exe
O23 - Service: McAfee Anti-Spam Service (MSK80Service) - McAfee, Inc. - C:\Program Files\McAfee\MSK\MskSrver.exe
O23 - Service: Intel NCS NetService (NetSvc) - Intel(R) Corporation - C:\Program Files\Intel\PROSetWired\NCS\Sync\NetSvc.exe
O23 - Service: PRISMSVC - Conexant Systems, Inc. - C:\WINDOWS\system32\PRISMSVC.EXE
Scan saved at 22:37: VIRUS ALERT!, on 13/10/2008
Platform: Windows XP SP3 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP3 (6.00.2900.5512)
Boot mode: Normal
Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\Ati2evxx.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\Intel\Intel Matrix Storage Manager\iaantmon.exe
C:\Program Files\McAfee\SiteAdvisor\McSACore.exe
C:\PROGRA~1\McAfee\MSC\mcmscsvc.exe
c:\PROGRA~1\FICHIE~1\mcafee\mna\mcnasvc.exe
c:\PROGRA~1\FICHIE~1\mcafee\mcproxy\mcproxy.exe
C:\Program Files\McAfee\VirusScan\McShield.exe
C:\Program Files\McAfee\MPF\MPFSrv.exe
C:\Program Files\McAfee\MSK\MskSrver.exe
C:\WINDOWS\system32\PRISMSVC.EXE
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\system32\wscntfy.exe
c:\PROGRA~1\mcafee.com\agent\mcagent.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\system32\PRISMSVR.EXE
C:\Program Files\Spybot - Search & Destroy\SpybotSD.exe
C:\Program Files\Fichiers communs\Ulead Systems\AutoDetector\monitor.exe
C:\WINDOWS\brastk.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\DAEMON Tools Lite\daemon.exe
C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe
C:\Program Files\Dell sans fil\PRISMCFG.exe
C:\PROGRA~1\McAfee\VIRUSS~1\mcsysmon.exe
C:\Program Files\Mozilla Firefox\firefox.exe
C:\Program Files\Trend Micro\HijackThis\HijackThis.exe
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Local Page = google.net-studio.org
R1 - HKCU\Software\Microsoft\Internet Connection Wizard,ShellNext = https://www.dell.com/fr-fr
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Window Title = Internet Explorer
R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName = Liens
R3 - URLSearchHook: (no name) - {4D25F926-B9FE-4682-BF72-8AB8210D6D75} - C:\Program Files\MyWaySA\SrchAsDe\deSrcAs.dll
O3 - Toolbar: &Google - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - c:\program files\google\googletoolbar2.dll
O3 - Toolbar: DAEMON Tools Toolbar - {32099AAC-C132-4136-9E9A-4E364A424E17} - C:\Program Files\DAEMON Tools Toolbar\DTToolbar.dll
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
O4 - HKLM\..\Run: [SpybotSnD] "C:\Program Files\Spybot - Search & Destroy\SpybotSD.exe"
O4 - HKLM\..\Run: [Ulead AutoDetector v2] C:\Program Files\Fichiers communs\Ulead Systems\AutoDetector\monitor.exe
O4 - HKLM\..\Run: [SiteAdvisor] "C:\Program Files\SiteAdvisor\6261\SiteAdv.exe"
O4 - HKLM\..\RunOnce: [UPI11_COM] Regsvr32.exe /s "C:\Program Files\Ulead Systems\Ulead PhotoImpact 12\upiExtractImage.dll"
O4 - HKCU\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\ctfmon.exe
O4 - HKCU\..\Run: [swg] C:\Program Files\Google\GoogleToolbarNotifier\1.2.1128.5462\GoogleToolbarNotifier.exe
O4 - HKCU\..\Run: [DAEMON Tools Lite] "C:\Program Files\DAEMON Tools Lite\daemon.exe" -autorun
O4 - HKCU\..\Run: [SpybotSD TeaTimer] C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe
O4 - HKUS\S-1-5-19\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'SERVICE LOCAL')
O4 - HKUS\S-1-5-20\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'SERVICE RÉSEAU')
O4 - HKUS\S-1-5-18\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'SYSTEM')
O4 - HKUS\.DEFAULT\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'Default user')
O4 - Global Startup: Utilitaire de carte WLAN sans fil USB 2.0.lnk = ?
O6 - HKCU\Software\Policies\Microsoft\Internet Explorer\Restrictions present
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\j2re1.4.2_03\bin\npjpi142_03.dll
O9 - Extra 'Tools' menuitem: Console Java (Sun) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\j2re1.4.2_03\bin\npjpi142_03.dll
O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~3\Office12\REFIEBAR.DLL
O9 - Extra button: Real.com - {CD67F990-D8E9-11d2-98FE-00C0F0318AFE} - C:\WINDOWS\system32\Shdocvw.dll
O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O16 - DPF: {4ED9DDF0-7479-4BBE-9335-5A1EDB1D8A21} (McAfee.com Operating System Class) - http://download.mcafee.com/molbin/shared/mcinsctl/4,0,0,101/mcinsctl.cab
O17 - HKLM\System\CCS\Services\Tcpip\..\{F3D1B493-7ED4-402D-A757-4B70074C85A6}: NameServer = 212.27.54.252,212.27.53.252
O18 - Protocol: sacore - {5513F07E-936B-4E52-9B00-067394E91CC5} - c:\PROGRA~1\mcafee\SITEAD~1\mcieplg.dll
O23 - Service: Ati HotKey Poller - ATI Technologies Inc. - C:\WINDOWS\system32\Ati2evxx.exe
O23 - Service: Google Updater Service (gusvc) - Google - C:\Program Files\Google\Common\Google Updater\GoogleUpdaterService.exe
O23 - Service: Intel(R) Matrix Storage Event Monitor (IAANTMon) - Intel Corporation - C:\Program Files\Intel\Intel Matrix Storage Manager\iaantmon.exe
O23 - Service: McAfee SiteAdvisor Service - Unknown owner - C:\Program Files\McAfee\SiteAdvisor\McSACore.exe
O23 - Service: McAfee Services (mcmscsvc) - McAfee, Inc. - C:\PROGRA~1\McAfee\MSC\mcmscsvc.exe
O23 - Service: McAfee Network Agent (McNASvc) - McAfee, Inc. - c:\PROGRA~1\FICHIE~1\mcafee\mna\mcnasvc.exe
O23 - Service: McAfee Scanner (McODS) - McAfee, Inc. - C:\PROGRA~1\McAfee\VIRUSS~1\mcods.exe
O23 - Service: McAfee Proxy Service (McProxy) - McAfee, Inc. - c:\PROGRA~1\FICHIE~1\mcafee\mcproxy\mcproxy.exe
O23 - Service: McAfee Real-time Scanner (McShield) - McAfee, Inc. - C:\Program Files\McAfee\VirusScan\McShield.exe
O23 - Service: McAfee SystemGuards (McSysmon) - McAfee, Inc. - C:\PROGRA~1\McAfee\VIRUSS~1\mcsysmon.exe
O23 - Service: McAfee Personal Firewall Service (MpfService) - McAfee, Inc. - C:\Program Files\McAfee\MPF\MPFSrv.exe
O23 - Service: McAfee Anti-Spam Service (MSK80Service) - McAfee, Inc. - C:\Program Files\McAfee\MSK\MskSrver.exe
O23 - Service: Intel NCS NetService (NetSvc) - Intel(R) Corporation - C:\Program Files\Intel\PROSetWired\NCS\Sync\NetSvc.exe
O23 - Service: PRISMSVC - Conexant Systems, Inc. - C:\WINDOWS\system32\PRISMSVC.EXE
tout ceci, supprimera t-il le mess "VIRUS ALERT!" et "l'icone rouge avec la croix blanche" ds la barre prés de l'horloge ?
Vous n’avez pas trouvé la réponse que vous recherchez ?
Posez votre question
Malwarebytes' Anti-Malware 1.28
Version de la base de données: 1266
Windows 5.1.2600 Service Pack 3
13/10/2008 23:15:18
mbam-log-2008-10-13 (23-15-18).txt
Type de recherche: Examen complet (C:\|)
Eléments examinés: 123491
Temps écoulé: 30 minute(s), 31 second(s)
Processus mémoire infecté(s): 1
Module(s) mémoire infecté(s): 1
Clé(s) du Registre infectée(s): 17
Valeur(s) du Registre infectée(s): 1
Elément(s) de données du Registre infecté(s): 10
Dossier(s) infecté(s): 2
Fichier(s) infecté(s): 17
Processus mémoire infecté(s):
C:\WINDOWS\brastk.exe (Trojan.FakeAlert) -> Unloaded process successfully.
Module(s) mémoire infecté(s):
C:\WINDOWS\system32\vtUnlJbb.dll (Trojan.Vundo.H) -> Delete on reboot.
Clé(s) du Registre infectée(s):
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{0076c762-3f93-4639-9893-3f9c935420a4} (Trojan.Vundo.H) -> Delete on reboot.
HKEY_CLASSES_ROOT\CLSID\{0076c762-3f93-4639-9893-3f9c935420a4} (Trojan.Vundo.H) -> Delete on reboot.
HKEY_CLASSES_ROOT\qaccess.tchongabho (Trojan.BHO) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{a34fa88d-8437-4634-8a60-e913011ef2e5} (Trojan.BHO) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{4d25f926-b9fe-4682-bf72-8ab8210d6d75} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\TypeLib\{4d25f920-b9fe-4682-bf72-8ab8210d6d75} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\Interface\{4d25f923-b9fe-4682-bf72-8ab8210d6d75} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{4d25f921-b9fe-4682-bf72-8ab8210d6d75} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{4d25f921-b9fe-4682-bf72-8ab8210d6d75} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{4d25f924-b9fe-4682-bf72-8ab8210d6d75} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{a020e659-1ca3-4ca1-a206-312468bd13dd} (Trojan.Zlob) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\mwc (Malware.Trace) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\contim (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\MS Track System (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\FCOVM (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\RemoveRP (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\VSPlugin (Trojan.FakeAlert) -> Quarantined and deleted successfully.
Valeur(s) du Registre infectée(s):
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\URLSearchHooks\{4d25f926-b9fe-4682-bf72-8ab8210d6d75} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
Elément(s) de données du Registre infecté(s):
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\LSA\Notification Packages (Trojan.Vundo.H) -> Data: c:\windows\system32\vtunljbb -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\LSA\Authentication Packages (Trojan.Vundo.H) -> Data: c:\windows\system32\vtunljbb -> Delete on reboot.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\ProductId (Trojan.FakeAlert) -> Bad: (VIRUS ALERT!) Good: (76412-OEM-0011903-00102) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\Control Panel\International\sTimeFormat (Trojan.FakeAlert) -> Bad: (HH:mm: VIRUS ALERT!) Good: (HH:mm:ss) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Start_ShowControlPanel (Hijack.StartMenu) -> Bad: (0) Good: (1) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Start_ShowRun (Hijack.StartMenu) -> Bad: (0) Good: (1) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Start_ShowSearch (Hijack.StartMenu) -> Bad: (0) Good: (1) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Start_ShowHelp (Hijack.StartMenu) -> Bad: (0) Good: (1) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Start_ShowMyDocs (Hijack.StartMenu) -> Bad: (0) Good: (1) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Start_ShowMyComputer (Hijack.StartMenu) -> Bad: (0) Good: (1) -> Quarantined and deleted successfully.
Dossier(s) infecté(s):
C:\Program Files\MyWaySA (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\MyWaySA\SrchAsDe (Adware.MyWebSearch) -> Quarantined and deleted successfully.
Fichier(s) infecté(s):
C:\WINDOWS\system32\vtUnlJbb.dll (Trojan.Vundo.H) -> Delete on reboot.
C:\WINDOWS\system32\bbJlnUtv.ini (Trojan.Vundo.H) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\bbJlnUtv.ini2 (Trojan.Vundo.H) -> Quarantined and deleted successfully.
C:\Documents and Settings\Laurent\Application Data\sp2\qaccess.dll (Trojan.BHO) -> Quarantined and deleted successfully.
C:\Program Files\MyWaySA\SrchAsDe\deSrcAs.dll (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Documents and Settings\Laurent\Local Settings\Temporary Internet Files\Content.IE5\DRV010F9\sa2009[1].exe (Rogue.Installer) -> Quarantined and deleted successfully.
C:\RECYCLER\S-1-5-21-661480858-3614348668-306105139-1006\Dc44\AVEngn.dll (Rogue.Multiple) -> Quarantined and deleted successfully.
C:\WINDOWS\qrbgltos.dll (Trojan.Zlob) -> Quarantined and deleted successfully.
C:\WINDOWS\emsf.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\dllcache\beep.sys (Fake.Beep.Sys) -> Quarantined and deleted successfully.
C:\WINDOWS\brastk.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\wini104552664.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\Documents and Settings\Laurent\Bureau\XP_AntiSpyware_Fix.exe (Rogue.XPAntiSpyware) -> Quarantined and deleted successfully.
C:\Documents and Settings\Laurent\Bureau\Protect Your Privacy.url (Rogue.Link) -> Quarantined and deleted successfully.
C:\Documents and Settings\Laurent\Bureau\Malware Defender.url (Rogue.Link) -> Quarantined and deleted successfully.
C:\Documents and Settings\Laurent\Bureau\System Error Fixer.url (Rogue.Link) -> Quarantined and deleted successfully.
C:\Documents and Settings\Laurent\Cookies\byrafug.exe (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
Version de la base de données: 1266
Windows 5.1.2600 Service Pack 3
13/10/2008 23:15:18
mbam-log-2008-10-13 (23-15-18).txt
Type de recherche: Examen complet (C:\|)
Eléments examinés: 123491
Temps écoulé: 30 minute(s), 31 second(s)
Processus mémoire infecté(s): 1
Module(s) mémoire infecté(s): 1
Clé(s) du Registre infectée(s): 17
Valeur(s) du Registre infectée(s): 1
Elément(s) de données du Registre infecté(s): 10
Dossier(s) infecté(s): 2
Fichier(s) infecté(s): 17
Processus mémoire infecté(s):
C:\WINDOWS\brastk.exe (Trojan.FakeAlert) -> Unloaded process successfully.
Module(s) mémoire infecté(s):
C:\WINDOWS\system32\vtUnlJbb.dll (Trojan.Vundo.H) -> Delete on reboot.
Clé(s) du Registre infectée(s):
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{0076c762-3f93-4639-9893-3f9c935420a4} (Trojan.Vundo.H) -> Delete on reboot.
HKEY_CLASSES_ROOT\CLSID\{0076c762-3f93-4639-9893-3f9c935420a4} (Trojan.Vundo.H) -> Delete on reboot.
HKEY_CLASSES_ROOT\qaccess.tchongabho (Trojan.BHO) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{a34fa88d-8437-4634-8a60-e913011ef2e5} (Trojan.BHO) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{4d25f926-b9fe-4682-bf72-8ab8210d6d75} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\TypeLib\{4d25f920-b9fe-4682-bf72-8ab8210d6d75} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\Interface\{4d25f923-b9fe-4682-bf72-8ab8210d6d75} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{4d25f921-b9fe-4682-bf72-8ab8210d6d75} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{4d25f921-b9fe-4682-bf72-8ab8210d6d75} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{4d25f924-b9fe-4682-bf72-8ab8210d6d75} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{a020e659-1ca3-4ca1-a206-312468bd13dd} (Trojan.Zlob) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\mwc (Malware.Trace) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\contim (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\MS Track System (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\FCOVM (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\RemoveRP (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\VSPlugin (Trojan.FakeAlert) -> Quarantined and deleted successfully.
Valeur(s) du Registre infectée(s):
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\URLSearchHooks\{4d25f926-b9fe-4682-bf72-8ab8210d6d75} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
Elément(s) de données du Registre infecté(s):
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\LSA\Notification Packages (Trojan.Vundo.H) -> Data: c:\windows\system32\vtunljbb -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\LSA\Authentication Packages (Trojan.Vundo.H) -> Data: c:\windows\system32\vtunljbb -> Delete on reboot.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\ProductId (Trojan.FakeAlert) -> Bad: (VIRUS ALERT!) Good: (76412-OEM-0011903-00102) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\Control Panel\International\sTimeFormat (Trojan.FakeAlert) -> Bad: (HH:mm: VIRUS ALERT!) Good: (HH:mm:ss) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Start_ShowControlPanel (Hijack.StartMenu) -> Bad: (0) Good: (1) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Start_ShowRun (Hijack.StartMenu) -> Bad: (0) Good: (1) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Start_ShowSearch (Hijack.StartMenu) -> Bad: (0) Good: (1) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Start_ShowHelp (Hijack.StartMenu) -> Bad: (0) Good: (1) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Start_ShowMyDocs (Hijack.StartMenu) -> Bad: (0) Good: (1) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Start_ShowMyComputer (Hijack.StartMenu) -> Bad: (0) Good: (1) -> Quarantined and deleted successfully.
Dossier(s) infecté(s):
C:\Program Files\MyWaySA (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\MyWaySA\SrchAsDe (Adware.MyWebSearch) -> Quarantined and deleted successfully.
Fichier(s) infecté(s):
C:\WINDOWS\system32\vtUnlJbb.dll (Trojan.Vundo.H) -> Delete on reboot.
C:\WINDOWS\system32\bbJlnUtv.ini (Trojan.Vundo.H) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\bbJlnUtv.ini2 (Trojan.Vundo.H) -> Quarantined and deleted successfully.
C:\Documents and Settings\Laurent\Application Data\sp2\qaccess.dll (Trojan.BHO) -> Quarantined and deleted successfully.
C:\Program Files\MyWaySA\SrchAsDe\deSrcAs.dll (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Documents and Settings\Laurent\Local Settings\Temporary Internet Files\Content.IE5\DRV010F9\sa2009[1].exe (Rogue.Installer) -> Quarantined and deleted successfully.
C:\RECYCLER\S-1-5-21-661480858-3614348668-306105139-1006\Dc44\AVEngn.dll (Rogue.Multiple) -> Quarantined and deleted successfully.
C:\WINDOWS\qrbgltos.dll (Trojan.Zlob) -> Quarantined and deleted successfully.
C:\WINDOWS\emsf.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\dllcache\beep.sys (Fake.Beep.Sys) -> Quarantined and deleted successfully.
C:\WINDOWS\brastk.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\wini104552664.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\Documents and Settings\Laurent\Bureau\XP_AntiSpyware_Fix.exe (Rogue.XPAntiSpyware) -> Quarantined and deleted successfully.
C:\Documents and Settings\Laurent\Bureau\Protect Your Privacy.url (Rogue.Link) -> Quarantined and deleted successfully.
C:\Documents and Settings\Laurent\Bureau\Malware Defender.url (Rogue.Link) -> Quarantined and deleted successfully.
C:\Documents and Settings\Laurent\Bureau\System Error Fixer.url (Rogue.Link) -> Quarantined and deleted successfully.
C:\Documents and Settings\Laurent\Cookies\byrafug.exe (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
-----------\\ ToolBar S&D 1.2.2 XP/Vista
Microsoft Windows XP Édition familiale ( v5.1.2600 ) Service Pack 3
X86-based PC ( Multiprocessor Free : Intel(R) Pentium(R) 4 CPU 3.00GHz )
BIOS : Phoenix ROM BIOS PLUS Version 1.10 A03
USER : Laurent ( Administrator )
BOOT : Normal boot
Antivirus : McAfee VirusScan (Activated)
Firewall : McAfee Personal Firewall (Activated)
C:\ (Local Disk) - NTFS - Total : 145 Go Free : 63 Go
D:\ (CD or DVD)
E:\ (USB)
F:\ (USB)
G:\ (USB)
H:\ (USB)
I:\ (CD or DVD)
J:\ (CD or DVD)
"C:\ToolBar SD" ( MAJ : 04-10-2008|21:00 )
Option : [1] ( 13/10/2008|23:25 )
-----------\\ Recherche de Fichiers / Dossiers ...
C:\Program Files\DAEMON Tools Toolbar
C:\Program Files\DAEMON Tools Toolbar\DTToolbar.dll
C:\Program Files\DAEMON Tools Toolbar\Resources
C:\Program Files\DAEMON Tools Toolbar\uninst.exe
C:\Program Files\DAEMON Tools Toolbar\_DTLite.xml
-----------\\ [..\Internet Explorer\Main]
[HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main]
"Start Page"="https://www.google.com/?gws_rd=ssl"
"Search Page"="https://www.google.com/?gws_rd=ssl"
"Search Bar"="http://www.google.com/toolbar/ie8/sidebar.html"
[HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\Main]
"Default_Page_URL"="http://www.microsoft.com/isapi/redir.dll?prd=ie&pver=6&ar=msnhome"
"Default_Search_URL"="http://www.google.com/toolbar/ie8/sidebar.html"
"Search Page"="https://www.google.com/?gws_rd=ssl"
"Local Page"="%SystemRoot%\\system32\\blank.htm"
"Start Page"="https://www.google.com/?gws_rd=ssl"
"Home_Page"="https://www.dell.com/fr-fr?c=fr&l=fr&s=gen&redirect=1"
"Help_Page"="http://support.euro.dell.com/segment.asp?country=FR&language=FR"
--------------------\\ Recherche d'autres infections
C:\WINDOWS\system32\iSAHOqss.ini
C:\WINDOWS\system32\iSAHOqss.ini2
[b]==> VUNDO <==/b
--------------------\\ Cracks & Keygens ..
C:\DOCUME~1\Laurent\Mes documents\Downloads\PhotoFiltre Studio 9.0.0\Keygen
C:\DOCUME~1\Laurent\Mes documents\GrabIt Downloads\The.Sims.2.Apartment.Life.GENERIC KEYGEN-FFF.zip .exe
C:\DOCUME~1\Laurent\Mes documents\GrabIt Downloads\The.Sims.2.Apartment.Life.GENERIC KEYGEN-FFF.zip.1.exe
C:\DOCUME~1\Laurent\Mes documents\GrabIt Downloads\The.Sims.2.Apartment.Life.GENERIC KEYGEN-FFF.zip.exe
C:\DOCUME~1\Laurent\Mes documents\GrabIt Downloads\The.Sims.2.Apartment.Life.GENERIC_KEYGEN-FFF.zip.1.exe
C:\DOCUME~1\Laurent\Mes documents\GrabIt Downloads\The.Sims.2.Apartment.Life.GENERIC_KEYGEN-FFF.zip.exe
C:\DOCUME~1\Laurent\Mes documents\GrabIt Downloads\The.Sims.2.Bon.Voyage.GENERIC KEYGEN-FFF.zip .exe
C:\DOCUME~1\Laurent\Mes documents\GrabIt Downloads\The.Sims.2.Bon.Voyage.GENERIC KEYGEN-FFF.zip.1.exe
C:\DOCUME~1\Laurent\Mes documents\GrabIt Downloads\The.Sims.2.Bon.Voyage.GENERIC KEYGEN-FFF.zip.exe
C:\DOCUME~1\Laurent\Mes documents\GrabIt Downloads\The.Sims.2.Bon.Voyage.GENERIC_KEYGEN-FFF.zip.1.exe
C:\DOCUME~1\Laurent\Mes documents\GrabIt Downloads\The.Sims.2.Bon.Voyage.GENERIC_KEYGEN-FFF.zip.exe
C:\DOCUME~1\Laurent\Recent\Crack - BL3LE'.lnk
C:\DOCUME~1\Laurent\Recent\Crack.lnk
C:\DOCUME~1\Laurent\Recent\Lfp Manager 2008 Pc Game Multilang Fr-Ita-Esp-Pol-Deu-Eng-Nl Crack & Serial Inclus Verif Steph Ok.lnk
C:\DOCUME~1\Laurent\Recent\Pc - Pes 2008 - Pes2008 - Pro Evolution Soccer 2008 - Crack Seriale - Perfetti - By (Bl3Le).lnk
C:\DOCUME~1\Laurent\Recent\The Sims2 NoCD Crack.lnk
C:\DOCUME~1\Laurent\Recent\uTorrent.Manual.Crak.Keygen.lnk
1 - "C:\ToolBar SD\TB_1.txt" - 13/10/2008|23:29 - Option : [1]
-----------\\ Fin du rapport a 23:29:04,20
Microsoft Windows XP Édition familiale ( v5.1.2600 ) Service Pack 3
X86-based PC ( Multiprocessor Free : Intel(R) Pentium(R) 4 CPU 3.00GHz )
BIOS : Phoenix ROM BIOS PLUS Version 1.10 A03
USER : Laurent ( Administrator )
BOOT : Normal boot
Antivirus : McAfee VirusScan (Activated)
Firewall : McAfee Personal Firewall (Activated)
C:\ (Local Disk) - NTFS - Total : 145 Go Free : 63 Go
D:\ (CD or DVD)
E:\ (USB)
F:\ (USB)
G:\ (USB)
H:\ (USB)
I:\ (CD or DVD)
J:\ (CD or DVD)
"C:\ToolBar SD" ( MAJ : 04-10-2008|21:00 )
Option : [1] ( 13/10/2008|23:25 )
-----------\\ Recherche de Fichiers / Dossiers ...
C:\Program Files\DAEMON Tools Toolbar
C:\Program Files\DAEMON Tools Toolbar\DTToolbar.dll
C:\Program Files\DAEMON Tools Toolbar\Resources
C:\Program Files\DAEMON Tools Toolbar\uninst.exe
C:\Program Files\DAEMON Tools Toolbar\_DTLite.xml
-----------\\ [..\Internet Explorer\Main]
[HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main]
"Start Page"="https://www.google.com/?gws_rd=ssl"
"Search Page"="https://www.google.com/?gws_rd=ssl"
"Search Bar"="http://www.google.com/toolbar/ie8/sidebar.html"
[HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\Main]
"Default_Page_URL"="http://www.microsoft.com/isapi/redir.dll?prd=ie&pver=6&ar=msnhome"
"Default_Search_URL"="http://www.google.com/toolbar/ie8/sidebar.html"
"Search Page"="https://www.google.com/?gws_rd=ssl"
"Local Page"="%SystemRoot%\\system32\\blank.htm"
"Start Page"="https://www.google.com/?gws_rd=ssl"
"Home_Page"="https://www.dell.com/fr-fr?c=fr&l=fr&s=gen&redirect=1"
"Help_Page"="http://support.euro.dell.com/segment.asp?country=FR&language=FR"
--------------------\\ Recherche d'autres infections
C:\WINDOWS\system32\iSAHOqss.ini
C:\WINDOWS\system32\iSAHOqss.ini2
[b]==> VUNDO <==/b
--------------------\\ Cracks & Keygens ..
C:\DOCUME~1\Laurent\Mes documents\Downloads\PhotoFiltre Studio 9.0.0\Keygen
C:\DOCUME~1\Laurent\Mes documents\GrabIt Downloads\The.Sims.2.Apartment.Life.GENERIC KEYGEN-FFF.zip .exe
C:\DOCUME~1\Laurent\Mes documents\GrabIt Downloads\The.Sims.2.Apartment.Life.GENERIC KEYGEN-FFF.zip.1.exe
C:\DOCUME~1\Laurent\Mes documents\GrabIt Downloads\The.Sims.2.Apartment.Life.GENERIC KEYGEN-FFF.zip.exe
C:\DOCUME~1\Laurent\Mes documents\GrabIt Downloads\The.Sims.2.Apartment.Life.GENERIC_KEYGEN-FFF.zip.1.exe
C:\DOCUME~1\Laurent\Mes documents\GrabIt Downloads\The.Sims.2.Apartment.Life.GENERIC_KEYGEN-FFF.zip.exe
C:\DOCUME~1\Laurent\Mes documents\GrabIt Downloads\The.Sims.2.Bon.Voyage.GENERIC KEYGEN-FFF.zip .exe
C:\DOCUME~1\Laurent\Mes documents\GrabIt Downloads\The.Sims.2.Bon.Voyage.GENERIC KEYGEN-FFF.zip.1.exe
C:\DOCUME~1\Laurent\Mes documents\GrabIt Downloads\The.Sims.2.Bon.Voyage.GENERIC KEYGEN-FFF.zip.exe
C:\DOCUME~1\Laurent\Mes documents\GrabIt Downloads\The.Sims.2.Bon.Voyage.GENERIC_KEYGEN-FFF.zip.1.exe
C:\DOCUME~1\Laurent\Mes documents\GrabIt Downloads\The.Sims.2.Bon.Voyage.GENERIC_KEYGEN-FFF.zip.exe
C:\DOCUME~1\Laurent\Recent\Crack - BL3LE'.lnk
C:\DOCUME~1\Laurent\Recent\Crack.lnk
C:\DOCUME~1\Laurent\Recent\Lfp Manager 2008 Pc Game Multilang Fr-Ita-Esp-Pol-Deu-Eng-Nl Crack & Serial Inclus Verif Steph Ok.lnk
C:\DOCUME~1\Laurent\Recent\Pc - Pes 2008 - Pes2008 - Pro Evolution Soccer 2008 - Crack Seriale - Perfetti - By (Bl3Le).lnk
C:\DOCUME~1\Laurent\Recent\The Sims2 NoCD Crack.lnk
C:\DOCUME~1\Laurent\Recent\uTorrent.Manual.Crak.Keygen.lnk
1 - "C:\ToolBar SD\TB_1.txt" - 13/10/2008|23:29 - Option : [1]
-----------\\ Fin du rapport a 23:29:04,20
-----------\\ ToolBar S&D 1.2.2 XP/Vista
Microsoft Windows XP Édition familiale ( v5.1.2600 ) Service Pack 3
X86-based PC ( Multiprocessor Free : Intel(R) Pentium(R) 4 CPU 3.00GHz )
BIOS : Phoenix ROM BIOS PLUS Version 1.10 A03
USER : Laurent ( Administrator )
BOOT : Normal boot
Antivirus : McAfee VirusScan (Activated)
Firewall : McAfee Personal Firewall (Activated)
C:\ (Local Disk) - NTFS - Total : 145 Go Free : 63 Go
D:\ (CD or DVD)
E:\ (USB)
F:\ (USB)
G:\ (USB)
H:\ (USB)
I:\ (CD or DVD)
J:\ (CD or DVD)
"C:\ToolBar SD" ( MAJ : 04-10-2008|21:00 )
Option : [2] ( 13/10/2008|23:33 )
-----------\\ SUPPRESSION
Supprime! - C:\Program Files\DAEMON Tools Toolbar\DTToolbar.dll
Supprime! - C:\Program Files\DAEMON Tools Toolbar\Resources
Supprime! - C:\Program Files\DAEMON Tools Toolbar\uninst.exe
Supprime! - C:\Program Files\DAEMON Tools Toolbar\_DTLite.xml
Supprime! - C:\Program Files\DAEMON Tools Toolbar
-----------\\ Recherche de Fichiers / Dossiers ...
-----------\\ [..\Internet Explorer\Main]
[HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main]
"Start Page"="https://www.google.com/?gws_rd=ssl"
"Search Page"="https://www.google.com/?gws_rd=ssl"
"Search Bar"="http://www.google.com/toolbar/ie8/sidebar.html"
[HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\Main]
"Default_Page_URL"="http://www.microsoft.com/isapi/redir.dll?prd=ie&pver=6&ar=msnhome"
"Default_Search_URL"="http://www.google.com/toolbar/ie8/sidebar.html"
"Search Page"="https://www.google.com/?gws_rd=ssl"
"Local Page"="%SystemRoot%\\system32\\blank.htm"
"Start Page"="https://www.google.com/?gws_rd=ssl"
"Home_Page"="https://www.dell.com/fr-fr?c=fr&l=fr&s=gen&redirect=1"
"Help_Page"="http://support.euro.dell.com/segment.asp?country=FR&language=FR"
--------------------\\ Recherche d'autres infections
C:\WINDOWS\system32\iSAHOqss.ini
C:\WINDOWS\system32\iSAHOqss.ini2
[b]==> VUNDO <==/b
--------------------\\ Cracks & Keygens ..
C:\DOCUME~1\Laurent\Mes documents\Downloads\PhotoFiltre Studio 9.0.0\Keygen
C:\DOCUME~1\Laurent\Mes documents\GrabIt Downloads\The.Sims.2.Apartment.Life.GENERIC KEYGEN-FFF.zip .exe
C:\DOCUME~1\Laurent\Mes documents\GrabIt Downloads\The.Sims.2.Apartment.Life.GENERIC KEYGEN-FFF.zip.1.exe
C:\DOCUME~1\Laurent\Mes documents\GrabIt Downloads\The.Sims.2.Apartment.Life.GENERIC KEYGEN-FFF.zip.exe
C:\DOCUME~1\Laurent\Mes documents\GrabIt Downloads\The.Sims.2.Apartment.Life.GENERIC_KEYGEN-FFF.zip.1.exe
C:\DOCUME~1\Laurent\Mes documents\GrabIt Downloads\The.Sims.2.Apartment.Life.GENERIC_KEYGEN-FFF.zip.exe
C:\DOCUME~1\Laurent\Mes documents\GrabIt Downloads\The.Sims.2.Bon.Voyage.GENERIC KEYGEN-FFF.zip .exe
C:\DOCUME~1\Laurent\Mes documents\GrabIt Downloads\The.Sims.2.Bon.Voyage.GENERIC KEYGEN-FFF.zip.1.exe
C:\DOCUME~1\Laurent\Mes documents\GrabIt Downloads\The.Sims.2.Bon.Voyage.GENERIC KEYGEN-FFF.zip.exe
C:\DOCUME~1\Laurent\Mes documents\GrabIt Downloads\The.Sims.2.Bon.Voyage.GENERIC_KEYGEN-FFF.zip.1.exe
C:\DOCUME~1\Laurent\Mes documents\GrabIt Downloads\The.Sims.2.Bon.Voyage.GENERIC_KEYGEN-FFF.zip.exe
C:\DOCUME~1\Laurent\Recent\Crack - BL3LE'.lnk
C:\DOCUME~1\Laurent\Recent\Crack.lnk
C:\DOCUME~1\Laurent\Recent\Lfp Manager 2008 Pc Game Multilang Fr-Ita-Esp-Pol-Deu-Eng-Nl Crack & Serial Inclus Verif Steph Ok.lnk
C:\DOCUME~1\Laurent\Recent\Pc - Pes 2008 - Pes2008 - Pro Evolution Soccer 2008 - Crack Seriale - Perfetti - By (Bl3Le).lnk
C:\DOCUME~1\Laurent\Recent\The Sims2 NoCD Crack.lnk
C:\DOCUME~1\Laurent\Recent\uTorrent.Manual.Crak.Keygen.lnk
1 - "C:\ToolBar SD\TB_1.txt" - 13/10/2008|23:29 - Option : [1]
2 - "C:\ToolBar SD\TB_2.txt" - 13/10/2008|23:37 - Option : [2]
-----------\\ Fin du rapport a 23:37:48,93
Microsoft Windows XP Édition familiale ( v5.1.2600 ) Service Pack 3
X86-based PC ( Multiprocessor Free : Intel(R) Pentium(R) 4 CPU 3.00GHz )
BIOS : Phoenix ROM BIOS PLUS Version 1.10 A03
USER : Laurent ( Administrator )
BOOT : Normal boot
Antivirus : McAfee VirusScan (Activated)
Firewall : McAfee Personal Firewall (Activated)
C:\ (Local Disk) - NTFS - Total : 145 Go Free : 63 Go
D:\ (CD or DVD)
E:\ (USB)
F:\ (USB)
G:\ (USB)
H:\ (USB)
I:\ (CD or DVD)
J:\ (CD or DVD)
"C:\ToolBar SD" ( MAJ : 04-10-2008|21:00 )
Option : [2] ( 13/10/2008|23:33 )
-----------\\ SUPPRESSION
Supprime! - C:\Program Files\DAEMON Tools Toolbar\DTToolbar.dll
Supprime! - C:\Program Files\DAEMON Tools Toolbar\Resources
Supprime! - C:\Program Files\DAEMON Tools Toolbar\uninst.exe
Supprime! - C:\Program Files\DAEMON Tools Toolbar\_DTLite.xml
Supprime! - C:\Program Files\DAEMON Tools Toolbar
-----------\\ Recherche de Fichiers / Dossiers ...
-----------\\ [..\Internet Explorer\Main]
[HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main]
"Start Page"="https://www.google.com/?gws_rd=ssl"
"Search Page"="https://www.google.com/?gws_rd=ssl"
"Search Bar"="http://www.google.com/toolbar/ie8/sidebar.html"
[HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\Main]
"Default_Page_URL"="http://www.microsoft.com/isapi/redir.dll?prd=ie&pver=6&ar=msnhome"
"Default_Search_URL"="http://www.google.com/toolbar/ie8/sidebar.html"
"Search Page"="https://www.google.com/?gws_rd=ssl"
"Local Page"="%SystemRoot%\\system32\\blank.htm"
"Start Page"="https://www.google.com/?gws_rd=ssl"
"Home_Page"="https://www.dell.com/fr-fr?c=fr&l=fr&s=gen&redirect=1"
"Help_Page"="http://support.euro.dell.com/segment.asp?country=FR&language=FR"
--------------------\\ Recherche d'autres infections
C:\WINDOWS\system32\iSAHOqss.ini
C:\WINDOWS\system32\iSAHOqss.ini2
[b]==> VUNDO <==/b
--------------------\\ Cracks & Keygens ..
C:\DOCUME~1\Laurent\Mes documents\Downloads\PhotoFiltre Studio 9.0.0\Keygen
C:\DOCUME~1\Laurent\Mes documents\GrabIt Downloads\The.Sims.2.Apartment.Life.GENERIC KEYGEN-FFF.zip .exe
C:\DOCUME~1\Laurent\Mes documents\GrabIt Downloads\The.Sims.2.Apartment.Life.GENERIC KEYGEN-FFF.zip.1.exe
C:\DOCUME~1\Laurent\Mes documents\GrabIt Downloads\The.Sims.2.Apartment.Life.GENERIC KEYGEN-FFF.zip.exe
C:\DOCUME~1\Laurent\Mes documents\GrabIt Downloads\The.Sims.2.Apartment.Life.GENERIC_KEYGEN-FFF.zip.1.exe
C:\DOCUME~1\Laurent\Mes documents\GrabIt Downloads\The.Sims.2.Apartment.Life.GENERIC_KEYGEN-FFF.zip.exe
C:\DOCUME~1\Laurent\Mes documents\GrabIt Downloads\The.Sims.2.Bon.Voyage.GENERIC KEYGEN-FFF.zip .exe
C:\DOCUME~1\Laurent\Mes documents\GrabIt Downloads\The.Sims.2.Bon.Voyage.GENERIC KEYGEN-FFF.zip.1.exe
C:\DOCUME~1\Laurent\Mes documents\GrabIt Downloads\The.Sims.2.Bon.Voyage.GENERIC KEYGEN-FFF.zip.exe
C:\DOCUME~1\Laurent\Mes documents\GrabIt Downloads\The.Sims.2.Bon.Voyage.GENERIC_KEYGEN-FFF.zip.1.exe
C:\DOCUME~1\Laurent\Mes documents\GrabIt Downloads\The.Sims.2.Bon.Voyage.GENERIC_KEYGEN-FFF.zip.exe
C:\DOCUME~1\Laurent\Recent\Crack - BL3LE'.lnk
C:\DOCUME~1\Laurent\Recent\Crack.lnk
C:\DOCUME~1\Laurent\Recent\Lfp Manager 2008 Pc Game Multilang Fr-Ita-Esp-Pol-Deu-Eng-Nl Crack & Serial Inclus Verif Steph Ok.lnk
C:\DOCUME~1\Laurent\Recent\Pc - Pes 2008 - Pes2008 - Pro Evolution Soccer 2008 - Crack Seriale - Perfetti - By (Bl3Le).lnk
C:\DOCUME~1\Laurent\Recent\The Sims2 NoCD Crack.lnk
C:\DOCUME~1\Laurent\Recent\uTorrent.Manual.Crak.Keygen.lnk
1 - "C:\ToolBar SD\TB_1.txt" - 13/10/2008|23:29 - Option : [1]
2 - "C:\ToolBar SD\TB_2.txt" - 13/10/2008|23:37 - Option : [2]
-----------\\ Fin du rapport a 23:37:48,93
C:\WINDOWS\system32\iSAHOqss.ini moved successfully.
C:\WINDOWS\system32\iSAHOqss.ini2 moved successfully.
OTMoveIt2 by OldTimer - Version 1.0.4.3 log created on 10132008_234156
C:\WINDOWS\system32\iSAHOqss.ini2 moved successfully.
OTMoveIt2 by OldTimer - Version 1.0.4.3 log created on 10132008_234156
ComboFix 08-10-12.01 - Laurent 2008-10-13 23:47:40.1 - NTFSx86
Microsoft Windows XP Édition familiale 5.1.2600.3.1252.1.1036.18.565 [GMT 2:00]
Lancé depuis: C:\Documents and Settings\Laurent\Mes documents\Downloads\ComboFix.exe
* Un nouveau point de restauration a été créé
* Resident AV is active
[COLOR=RED][B]AVERTISSEMENT - LA CONSOLE DE RÉCUPÉRATION N'EST PAS INSTALLÉE SUR CETTE MACHINE !![/B][/COLOR]
.
(((((((((((((((((((((((((((((((((((( Autres suppressions ))))))))))))))))))))))))))))))))))))))))))))))))
.
C:\Documents and Settings\All Users\Application Data\Microsoft\Network\Downloader\qmgr0.dat
C:\Documents and Settings\All Users\Application Data\Microsoft\Network\Downloader\qmgr1.dat
C:\Documents and Settings\Camille\Local Settings\Application Data\Microsoft\Windows Media\10.0\WMSDKNSD.XML
C:\Documents and Settings\Laurent\Application Data\Adobe\Player.exe
C:\Documents and Settings\Laurent\Cookies\ahixod.inf
C:\Documents and Settings\Laurent\Cookies\ecytotubur._dl
C:\Documents and Settings\Laurent\Cookies\nuhamivuhu.dat
C:\Documents and Settings\Laurent\Cookies\ozekypifu.bin
C:\Documents and Settings\Laurent\Cookies\ybekagody.scr
C:\Documents and Settings\Laurent\Local Settings\Temporary Internet Files\fodezuwuz.dat
C:\Documents and Settings\Laurent\Local Settings\Temporary Internet Files\zykeqi.sys
C:\WINDOWS\system32\dwfaiq.dll
C:\WINDOWS\system32\iSAHOqss.ini
C:\WINDOWS\system32\iSAHOqss.ini2
C:\WINDOWS\system32\ljncuvnm.ini
C:\WINDOWS\system32\loqkesfr.dll
C:\WINDOWS\system32\qtupldjt.dll
C:\WINDOWS\system32\ssqOHASi.dll
C:\WINDOWS\system32\ssqRHWOH.dll
C:\WINDOWS\system32\tqsgcq.dll
C:\WINDOWS\system32\tuvTkIxX.dll
C:\WINDOWS\system32\yaywWQIb.dll
C:\WINDOWS\system32\yayxyVnL.dll
----- BITS: Il y a peut-être des sites infectés -----
hxxp://78.157.143.198
.
((((((((((((((((((((((((((((( Fichiers créés du 2008-09-13 au 2008-10-13 ))))))))))))))))))))))))))))))))))))
.
2008-10-13 23:41 . 2008-10-13 23:41 <REP> d-------- C:\_OTMoveIt
2008-10-13 23:26 . 2008-10-13 23:35 884 --a------ C:\Documents and Settings\Orph.egd
2008-10-13 23:24 . 2008-10-13 23:37 <REP> d-------- C:\ToolBar SD
2008-10-13 22:42 . 2008-10-13 22:42 <REP> d-------- C:\Documents and Settings\Laurent\Application Data\Malwarebytes
2008-10-13 22:41 . 2008-10-13 22:42 <REP> d-------- C:\Program Files\Malwarebytes' Anti-Malware
2008-10-13 22:41 . 2008-10-13 22:41 <REP> d-------- C:\Documents and Settings\All Users\Application Data\Malwarebytes
2008-10-13 22:41 . 2008-09-10 00:04 38,528 --a------ C:\WINDOWS\system32\drivers\mbamswissarmy.sys
2008-10-13 22:41 . 2008-09-10 00:03 17,200 --a------ C:\WINDOWS\system32\drivers\mbam.sys
2008-10-13 22:10 . 2008-10-13 22:22 922 --a------ C:\WINDOWS\system32\tmp.reg
2008-10-13 21:54 . 2004-08-20 12:30 <REP> d--h----- C:\Documents and Settings\Administrateur\Voisinage réseau
2008-10-13 21:54 . 2004-08-20 12:30 <REP> d--h----- C:\Documents and Settings\Administrateur\Voisinage d'impression
2008-10-13 21:54 . 2004-08-20 12:30 <REP> d--h----- C:\Documents and Settings\Administrateur\Modèles
2008-10-13 21:54 . 2006-03-10 02:12 <REP> dr------- C:\Documents and Settings\Administrateur\Mes documents
2008-10-13 21:54 . 2004-08-20 12:30 <REP> dr------- C:\Documents and Settings\Administrateur\Menu Démarrer
2008-10-13 21:54 . 2004-08-20 12:42 <REP> dr------- C:\Documents and Settings\Administrateur\Favoris
2008-10-13 21:54 . 2006-03-10 02:10 <REP> d-------- C:\Documents and Settings\Administrateur\Bureau
2008-10-13 21:54 . 2006-03-10 02:10 <REP> d-------- C:\Documents and Settings\Administrateur\Application Data\You've Got Pictures Screensaver
2008-10-13 21:54 . 2006-03-10 02:12 <REP> d-------- C:\Documents and Settings\Administrateur\Application Data\Corel
2008-10-13 21:54 . 2008-10-13 21:54 <REP> d-------- C:\Documents and Settings\Administrateur
2008-10-13 21:31 . 2008-10-13 21:31 <REP> d-------- C:\Program Files\Trend Micro
2008-10-13 21:02 . 2008-10-13 21:02 16,409 --a------ C:\Documents and Settings\All Users\Application Data\ivuj.vbs
2008-10-13 21:02 . 2008-10-13 21:02 15,621 --a------ C:\Program Files\Fichiers communs\opytetinyd.scr
2008-10-13 21:02 . 2008-10-13 21:02 15,386 --a------ C:\Documents and Settings\Laurent\Application Data\ugyn.dll
2008-10-13 21:02 . 2008-10-13 21:02 14,873 --a------ C:\Documents and Settings\All Users\Application Data\fipivy.dat
2008-10-13 21:02 . 2008-10-13 21:02 14,648 --a------ C:\WINDOWS\yjytigoduj.db
2008-10-13 21:02 . 2008-10-13 21:02 11,650 --a------ C:\WINDOWS\ykelutiqoz.ban
2008-10-13 21:02 . 2008-10-13 21:02 11,309 --a------ C:\Program Files\Fichiers communs\ytosepuvux.vbs
2008-10-13 21:02 . 2008-10-13 21:02 11,150 --a------ C:\Documents and Settings\All Users\Application Data\wuvyh.scr
2008-10-13 21:02 . 2008-10-13 21:02 11,088 --a------ C:\WINDOWS\ucitucyp.scr
2008-10-13 21:02 . 2008-10-13 21:02 11,067 --a------ C:\WINDOWS\system32\avuxupuwo.com
2008-10-13 21:02 . 2008-10-13 21:02 10,805 --a------ C:\WINDOWS\system32\iwilacydi.exe
2008-10-13 21:02 . 2008-10-13 21:02 10,379 --a------ C:\WINDOWS\fonefezab.bin
2008-10-13 21:02 . 2008-10-13 21:02 10,358 --a------ C:\WINDOWS\system32\qydatugyc.bin
2008-10-13 21:02 . 2008-10-13 21:02 10,271 --a------ C:\Documents and Settings\Laurent\Application Data\acyguver.bat
2008-10-13 20:55 . 2007-08-21 08:00 1,536 --a------ C:\WINDOWS\system32\Delete_Me_Dummy_karna.dat
2008-10-13 20:54 . 2008-10-13 20:54 <REP> d-------- C:\Documents and Settings\All Users\Application Data\texcrqps
2008-10-13 20:53 . 2008-10-13 23:15 <REP> d-------- C:\Documents and Settings\Laurent\Application Data\sp2
2008-10-13 20:53 . 2008-10-13 19:50 266,240 --a------ C:\WINDOWS\ngwstxfd.dll
2008-10-13 20:53 . 2008-10-13 19:50 217,088 --a------ C:\WINDOWS\rosqxvmn.dll
2008-10-13 20:53 . 2008-10-13 19:50 94,208 --a------ C:\WINDOWS\lomxeqsn.exe
2008-10-13 20:51 . 2008-10-13 20:51 <REP> d--h----- C:\WINDOWS\PIF
2008-10-13 19:54 . 2008-10-13 19:55 <REP> d-------- C:\Program Files\GrabIt
2008-10-12 18:52 . 2008-10-13 20:09 <REP> d-------- C:\Documents and Settings\Laurent\Application Data\GrabIt
2008-10-05 19:16 . 2008-10-05 19:16 <REP> d-------- C:\Documents and Settings\Valentin\Application Data\Ulead Systems
2008-10-05 18:58 . 2008-10-05 18:58 <REP> d-------- C:\Program Files\Ulead Systems
2008-10-05 18:58 . 2008-10-05 18:58 <REP> d-------- C:\Program Files\Fichiers communs\Ulead Systems
2008-10-05 18:58 . 2008-10-05 18:58 <REP> d-------- C:\Documents and Settings\All Users\Application Data\Ulead Systems
2008-10-05 16:03 . 2008-10-05 16:05 <REP> d-------- C:\Documents and Settings\Laurent\.gimp-2.6
2008-10-05 16:03 . 2008-10-05 16:03 <REP> d-------- C:\Documents and Settings\Laurent\.gegl-0.0
2008-10-05 15:14 . 2008-10-08 14:41 <REP> d-------- C:\Documents and Settings\Valentin\Application Data\dvdcss
2008-10-03 18:19 . 2008-10-03 18:19 <REP> d-------- C:\Program Files\WordBiz
2008-10-03 18:13 . 2008-10-03 18:13 <REP> d-------- C:\Documents and Settings\LocalService\Application Data\SACore
2008-10-01 21:32 . 2008-10-01 21:32 268 --ah----- C:\sqmdata01.sqm
2008-10-01 21:32 . 2008-10-01 21:32 244 --ah----- C:\sqmnoopt01.sqm
2008-10-01 20:17 . 2008-10-01 20:17 <REP> d-------- C:\WINDOWS\system32\fr
2008-10-01 20:17 . 2008-10-01 20:17 <REP> d-------- C:\WINDOWS\system32\bits
2008-10-01 20:17 . 2008-10-01 20:17 <REP> d-------- C:\WINDOWS\l2schemas
2008-10-01 20:15 . 2008-10-01 20:15 <REP> d-------- C:\WINDOWS\ServicePackFiles
2008-10-01 20:10 . 2008-10-01 20:10 <REP> d-------- C:\WINDOWS\EHome
2008-09-30 17:41 . 2004-08-03 22:41 1,041,536 --------- C:\WINDOWS\system32\drivers\hsfdpsp2.sys
2008-09-30 17:41 . 2004-08-03 22:41 685,056 --------- C:\WINDOWS\system32\drivers\hsfcxts2.sys
2008-09-30 17:41 . 2004-08-03 22:41 220,032 --------- C:\WINDOWS\system32\drivers\hsfbs2s2.sys
2008-09-30 17:41 . 2004-08-05 14:00 184,107 --------- C:\WINDOWS\system32\dllcache\compact.wmz
2008-09-30 17:41 . 2004-07-17 22:55 129,045 --------- C:\WINDOWS\system32\drivers\cxthsfs2.cty
2008-09-30 17:41 . 2004-08-05 14:00 999 --------- C:\WINDOWS\system32\dllcache\bktrh.gif
2008-09-30 17:41 . 2004-08-05 14:00 773 --------- C:\WINDOWS\system32\dllcache\cnth.gif
2008-09-30 17:41 . 2004-08-05 14:00 773 --------- C:\WINDOWS\system32\dllcache\cnt.gif
2008-09-30 17:41 . 2004-08-05 14:00 772 --------- C:\WINDOWS\system32\dllcache\cntd.gif
2008-09-30 17:41 . 2004-08-05 14:00 760 --------- C:\WINDOWS\system32\dllcache\cloapph.gif
2008-09-30 17:41 . 2004-08-05 14:00 717 --------- C:\WINDOWS\system32\dllcache\cloapp.gif
2008-09-24 15:23 . 2008-09-24 15:23 <REP> d-------- C:\Documents and Settings\Camille\Application Data\vlc
2008-09-23 21:08 . 2008-09-23 21:20 <REP> d-------- C:\Documents and Settings\Laurent\Application Data\MP-Manager
2008-09-23 21:07 . 2008-09-23 21:07 <REP> d-------- C:\Program Files\MPMAN
.
(((((((((((((((((((((((((((((((((( Compte-rendu de Find3M ))))))))))))))))))))))))))))))))))))))))))))))))
.
2008-10-13 19:19 --------- d-----w C:\Documents and Settings\Laurent\Application Data\EoRezo
2008-10-13 19:13 --------- d-----w C:\Documents and Settings\Laurent\Application Data\temp
2008-10-13 19:02 12,652 ----a-w C:\Program Files\Fichiers communs\abaxesepyc.inf
2008-10-13 17:08 --------- d-----w C:\Program Files\McAfee
2008-10-13 05:08 --------- d-----w C:\Program Files\eMule
2008-10-10 16:40 --------- d-----w C:\Program Files\ScrabBot
2008-10-05 16:58 --------- d--h--w C:\Program Files\InstallShield Installation Information
2008-10-05 13:50 --------- d-----w C:\Program Files\EoRezo
2008-10-03 15:34 --------- d-----w C:\Documents and Settings\All Users\Application Data\SiteAdvisor
2008-10-03 15:33 --------- d-----w C:\Documents and Settings\All Users\Application Data\McAfee
2008-10-01 16:03 --------- d-----w C:\Program Files\Spybot - Search & Destroy
2008-09-17 18:28 --------- d-----w C:\Program Files\Fichiers communs\logishrd
2008-09-12 15:23 --------- d-----w C:\Documents and Settings\Valentin\Application Data\vlc
2008-09-10 12:55 --------- d-----w C:\Documents and Settings\All Users\Application Data\Microsoft Help
2008-09-06 08:52 --------- d-----w C:\Documents and Settings\Laurent\Application Data\vlc
2008-09-06 08:43 --------- d-----w C:\Program Files\VideoLAN
2008-09-05 20:19 --------- d-----w C:\Program Files\Messenger Plus! Live
2008-09-05 15:43 --------- d-----w C:\Documents and Settings\All Users\Application Data\Messenger Plus!
2008-08-28 15:17 --------- d-----w C:\Documents and Settings\Camille\Application Data\McAfee
2008-08-20 20:35 --------- d-----w C:\Documents and Settings\All Users\Application Data\Spybot - Search & Destroy
2008-08-17 14:57 --------- d-----w C:\Documents and Settings\Valentin\Application Data\Sonic
2008-08-17 13:15 --------- d-----w C:\Program Files\PhotoFiltre
2008-08-16 16:38 --------- d-----w C:\Program Files\DAEMON Tools Lite
2008-08-16 11:18 --------- d-----w C:\Program Files\EA SPORTS
2008-08-16 09:42 --------- d-----w C:\Program Files\KONAMI
2008-08-15 22:58 --------- d-----w C:\Program Files\HomePlayer
2008-08-15 13:06 --------- d-----w C:\Program Files\MessengerPlus! 3
2008-08-15 08:30 --------- d--h--r C:\Documents and Settings\Laurent\Application Data\SecuROM
2008-08-15 08:14 717,296 ----a-w C:\WINDOWS\system32\drivers\sptd.sys
2008-08-15 08:14 --------- d-----w C:\Documents and Settings\Laurent\Application Data\DAEMON Tools
2008-08-15 08:09 --------- d-----w C:\Program Files\DAEMON Tools Pro
2008-08-15 08:03 --------- d-----w C:\Documents and Settings\Laurent\Application Data\Sonic
2008-08-15 08:03 --------- d-----w C:\Documents and Settings\Laurent\Application Data\Leadertech
2008-08-14 21:24 --------- d-----w C:\Documents and Settings\Laurent\Application Data\uTorrent
.
[code]<pre>
----a-w 878,080 2008-10-13 18:44:14 C:\Documents and Settings\Laurent\Mes documents\GrabIt Downloads\The.Sims.2.Apartment.Life.GENERIC KEYGEN-FFF.zip .exe
----a-w 878,080 2008-10-13 18:46:32 C:\Documents and Settings\Laurent\Mes documents\GrabIt Downloads\The.Sims.2.Bon.Voyage.GENERIC KEYGEN-FFF.zip .exe
</pre>[/code]
((((((((((((((((((((((((((((((((( Points de chargement Reg ))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* les éléments vides & les éléments initiaux légitimes ne sont pas listés
REGEDIT4
[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"CTFMON.EXE"="C:\WINDOWS\system32\ctfmon.exe" [2008-04-14 15360]
"swg"="C:\Program Files\Google\GoogleToolbarNotifier\1.2.1128.5462\GoogleToolbarNotifier.exe" [N/A]
"DAEMON Tools Lite"="C:\Program Files\DAEMON Tools Lite\daemon.exe" [2008-07-24 490952]
"SpybotSD TeaTimer"="C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe" [2008-09-16 1833296]
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"QuickTime Task"="C:\Program Files\QuickTime\qttask.exe" [2006-03-10 98304]
"SpybotSnD"="C:\Program Files\Spybot - Search & Destroy\SpybotSD.exe" [2008-07-07 4891472]
"Ulead AutoDetector v2"="C:\Program Files\Fichiers communs\Ulead Systems\AutoDetector\monitor.exe" [2004-11-26 90112]
"SiteAdvisor"="C:\Program Files\SiteAdvisor\6261\SiteAdv.exe" [N/A]
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce]
"UPI11_COM"="C:\Program Files\Ulead Systems\Ulead PhotoImpact 12\upiExtractImage.dll" [2006-08-15 40960]
[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run]
"CTFMON.EXE"="C:\WINDOWS\system32\CTFMON.EXE" [2008-04-14 15360]
C:\Documents and Settings\All Users\Menu D‚marrer\Programmes\D‚marrage\
Utilitaire de carte WLAN sans fil USB 2.0.lnk - C:\Program Files\Dell sans fil\PRISMCFG.exe [2006-03-10 921704]
[HKEY_CURRENT_USER\software\microsoft\windows\currentversion\policies\explorer]
"NoLogOff"= 0 (0x0)
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\PRISMAPI.DLL]
2005-12-22 22:08 450646 C:\WINDOWS\system32\PRISMAPI.dll
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\windows]
"AppInit_DLLs"=dwfaiq.dll
[HKEY_LOCAL_MACHINE\software\microsoft\security center]
"AntiVirusDisableNotify"=dword:00000001
"FirewallDisableNotify"=dword:00000001
"UpdatesDisableNotify"=dword:00000001
[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\McAfeeAntiVirus]
"DisableMonitoring"=dword:00000001
[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\McAfeeFirewall]
"DisableMonitoring"=dword:00000001
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile]
"EnableFirewall"= 0 (0x0)
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%windir%\\system32\\sessmgr.exe"=
"C:\\Program Files\\Microsoft Office\\Office12\\OUTLOOK.EXE"=
"C:\\Program Files\\Fichiers communs\\McAfee\\MNA\\McNASvc.exe"=
"C:\\Program Files\\eMule\\emule.exe"=
"C:\\Program Files\\KONAMI\\Pro Evolution Soccer 2008\\PES2008.exe"=
"%windir%\\Network Diagnostic\\xpnetdiag.exe"=
"C:\\Program Files\\Windows Live\\Messenger\\msnmsgr.exe"=
"C:\\Program Files\\Windows Live\\Messenger\\livecall.exe"=
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\GloballyOpenPorts\List]
"11645:TCP"= 11645:TCP:TCP_émule
"11655:UDP"= 11655:UDP:UDP_émule
R2 McAfee SiteAdvisor Service;McAfee SiteAdvisor Service;C:\Program Files\McAfee\SiteAdvisor\McSACore.exe [2008-09-08 198944]
R2 PRISMSVC;PRISMSVC;C:\WINDOWS\system32\PRISMSVC.EXE [2005-12-22 61526]
R3 USBSTOR;Pilote de stockage de masse USB;C:\WINDOWS\system32\DRIVERS\USBSTOR.SYS [2008-04-13 26368]
.
Contenu du dossier 'Tâches planifiées'
2008-08-14 C:\WINDOWS\Tasks\McDefragTask.job
- c:\PROGRA~1\mcafee\mqc\QcConsol.exe [2007-12-04 13:32]
2008-08-11 C:\WINDOWS\Tasks\McQcTask.job
- c:\PROGRA~1\mcafee\mqc\QcConsol.exe [2007-12-04 13:32]
2008-08-12 C:\WINDOWS\Tasks\Rappel d'abonnement 1 auprès de l'ISP.job
- C:\WINDOWS\system32\OOBE\oobebaln.exe [2008-04-14 04:34]
2008-08-20 C:\WINDOWS\Tasks\Spybot - Search & Destroy - Scheduled Task.job
- C:\Program Files\Spybot - Search & Destroy\SpybotSD.exe [2008-07-07 09:42]
2008-08-20 C:\WINDOWS\Tasks\Spybot - Search & Destroy Updater - Scheduled Task.job
- C:\Program Files\Spybot - Search & Destroy\SDUpdate.exe [2008-07-07 09:42]
.
- - - - ORPHELINS SUPPRIMES - - - -
BHO-{0076C762-3F93-4639-9893-3F9C935420A4} - (no file)
BHO-{18012CA7-F1F3-4008-BB9E-04669D73E207} - C:\WINDOWS\system32\ssqOHASi.dll
BHO-{B2ADB537-AFF6-4D72-BA77-DA012A6FDEA6} - C:\WINDOWS\system32\yaywWQIb.dll
BHO-{E7E4053B-FD23-448B-842F-793DD49AA53C} - (no file)
Toolbar-{32099AAC-C132-4136-9E9A-4E364A424E17} - (no file)
WebBrowser-{32099AAC-C132-4136-9E9A-4E364A424E17} - (no file)
ShellExecuteHooks-{B2ADB537-AFF6-4D72-BA77-DA012A6FDEA6} - C:\WINDOWS\system32\yaywWQIb.dll
.
------- Examen supplémentaire -------
.
FireFox -: Profile - C:\Documents and Settings\Laurent\Application Data\Mozilla\Firefox\Profiles\s4k5kv9i.default\
FireFox -: prefs.js - STARTUP.HOMEPAGE - hxxp://google.fr
FF -: plugin - C:\Program Files\Adobe\Acrobat 6.0\Reader\browser\nppdf32.dll
FF -: plugin - C:\Program Files\Java\j2re1.4.2_03\bin\NPJava11.dll
FF -: plugin - C:\Program Files\Java\j2re1.4.2_03\bin\NPJava12.dll
FF -: plugin - C:\Program Files\Java\j2re1.4.2_03\bin\NPJava13.dll
FF -: plugin - C:\Program Files\Java\j2re1.4.2_03\bin\NPJava14.dll
FF -: plugin - C:\Program Files\Java\j2re1.4.2_03\bin\NPJava32.dll
FF -: plugin - C:\Program Files\Java\j2re1.4.2_03\bin\NPJPI142_03.dll
FF -: plugin - C:\Program Files\Java\j2re1.4.2_03\bin\NPOJI610.dll
FF -: plugin - C:\Program Files\Viewpoint\Viewpoint Experience Technology\npViewpoint.dll
.
**************************************************************************
catchme 0.3.1361 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2008-10-13 23:53:58
Windows 5.1.2600 Service Pack 3 NTFS
Recherche de processus cachés ...
Recherche d'éléments en démarrage automatique cachés ...
Recherche de fichiers cachés ...
Scan terminé avec succès
Fichiers cachés: 0
**************************************************************************
.
------------------------ Autres processus actifs ------------------------
.
C:\WINDOWS\system32\ati2evxx.exe
C:\Program Files\Intel\Intel Matrix Storage Manager\IAANTMon.exe
C:\PROGRA~1\McAfee\MSC\mcmscsvc.exe
C:\PROGRA~1\FICHIE~1\McAfee\MNA\McNASvc.exe
C:\PROGRA~1\FICHIE~1\McAfee\McProxy\McProxy.exe
C:\PROGRA~1\McAfee\VIRUSS~1\Mcshield.exe
C:\Program Files\McAfee\MPF\MpfSrv.exe
C:\Program Files\McAfee\MSK\msksrver.exe
C:\WINDOWS\system32\wdfmgr.exe
C:\WINDOWS\system32\userinit.exe
C:\Program Files\McAfee.com\Agent\mcagent.exe
C:\WINDOWS\system32\PRISMSVR.exe
C:\PROGRA~1\McAfee\VIRUSS~1\mcsysmon.exe
C:\PROGRA~1\McAfee\VIRUSS~1\mcvsshld.exe
.
**************************************************************************
.
Heure de fin: 2008-10-13 23:56:34 - La machine a redémarré
ComboFix-quarantined-files.txt 2008-10-13 21:56:29
Avant-CF: 68 041 883 648 octets libres
Après-CF: 68,287,524,864 octets libres
274 --- E O F --- 2008-10-02 08:24:58
Microsoft Windows XP Édition familiale 5.1.2600.3.1252.1.1036.18.565 [GMT 2:00]
Lancé depuis: C:\Documents and Settings\Laurent\Mes documents\Downloads\ComboFix.exe
* Un nouveau point de restauration a été créé
* Resident AV is active
[COLOR=RED][B]AVERTISSEMENT - LA CONSOLE DE RÉCUPÉRATION N'EST PAS INSTALLÉE SUR CETTE MACHINE !![/B][/COLOR]
.
(((((((((((((((((((((((((((((((((((( Autres suppressions ))))))))))))))))))))))))))))))))))))))))))))))))
.
C:\Documents and Settings\All Users\Application Data\Microsoft\Network\Downloader\qmgr0.dat
C:\Documents and Settings\All Users\Application Data\Microsoft\Network\Downloader\qmgr1.dat
C:\Documents and Settings\Camille\Local Settings\Application Data\Microsoft\Windows Media\10.0\WMSDKNSD.XML
C:\Documents and Settings\Laurent\Application Data\Adobe\Player.exe
C:\Documents and Settings\Laurent\Cookies\ahixod.inf
C:\Documents and Settings\Laurent\Cookies\ecytotubur._dl
C:\Documents and Settings\Laurent\Cookies\nuhamivuhu.dat
C:\Documents and Settings\Laurent\Cookies\ozekypifu.bin
C:\Documents and Settings\Laurent\Cookies\ybekagody.scr
C:\Documents and Settings\Laurent\Local Settings\Temporary Internet Files\fodezuwuz.dat
C:\Documents and Settings\Laurent\Local Settings\Temporary Internet Files\zykeqi.sys
C:\WINDOWS\system32\dwfaiq.dll
C:\WINDOWS\system32\iSAHOqss.ini
C:\WINDOWS\system32\iSAHOqss.ini2
C:\WINDOWS\system32\ljncuvnm.ini
C:\WINDOWS\system32\loqkesfr.dll
C:\WINDOWS\system32\qtupldjt.dll
C:\WINDOWS\system32\ssqOHASi.dll
C:\WINDOWS\system32\ssqRHWOH.dll
C:\WINDOWS\system32\tqsgcq.dll
C:\WINDOWS\system32\tuvTkIxX.dll
C:\WINDOWS\system32\yaywWQIb.dll
C:\WINDOWS\system32\yayxyVnL.dll
----- BITS: Il y a peut-être des sites infectés -----
hxxp://78.157.143.198
.
((((((((((((((((((((((((((((( Fichiers créés du 2008-09-13 au 2008-10-13 ))))))))))))))))))))))))))))))))))))
.
2008-10-13 23:41 . 2008-10-13 23:41 <REP> d-------- C:\_OTMoveIt
2008-10-13 23:26 . 2008-10-13 23:35 884 --a------ C:\Documents and Settings\Orph.egd
2008-10-13 23:24 . 2008-10-13 23:37 <REP> d-------- C:\ToolBar SD
2008-10-13 22:42 . 2008-10-13 22:42 <REP> d-------- C:\Documents and Settings\Laurent\Application Data\Malwarebytes
2008-10-13 22:41 . 2008-10-13 22:42 <REP> d-------- C:\Program Files\Malwarebytes' Anti-Malware
2008-10-13 22:41 . 2008-10-13 22:41 <REP> d-------- C:\Documents and Settings\All Users\Application Data\Malwarebytes
2008-10-13 22:41 . 2008-09-10 00:04 38,528 --a------ C:\WINDOWS\system32\drivers\mbamswissarmy.sys
2008-10-13 22:41 . 2008-09-10 00:03 17,200 --a------ C:\WINDOWS\system32\drivers\mbam.sys
2008-10-13 22:10 . 2008-10-13 22:22 922 --a------ C:\WINDOWS\system32\tmp.reg
2008-10-13 21:54 . 2004-08-20 12:30 <REP> d--h----- C:\Documents and Settings\Administrateur\Voisinage réseau
2008-10-13 21:54 . 2004-08-20 12:30 <REP> d--h----- C:\Documents and Settings\Administrateur\Voisinage d'impression
2008-10-13 21:54 . 2004-08-20 12:30 <REP> d--h----- C:\Documents and Settings\Administrateur\Modèles
2008-10-13 21:54 . 2006-03-10 02:12 <REP> dr------- C:\Documents and Settings\Administrateur\Mes documents
2008-10-13 21:54 . 2004-08-20 12:30 <REP> dr------- C:\Documents and Settings\Administrateur\Menu Démarrer
2008-10-13 21:54 . 2004-08-20 12:42 <REP> dr------- C:\Documents and Settings\Administrateur\Favoris
2008-10-13 21:54 . 2006-03-10 02:10 <REP> d-------- C:\Documents and Settings\Administrateur\Bureau
2008-10-13 21:54 . 2006-03-10 02:10 <REP> d-------- C:\Documents and Settings\Administrateur\Application Data\You've Got Pictures Screensaver
2008-10-13 21:54 . 2006-03-10 02:12 <REP> d-------- C:\Documents and Settings\Administrateur\Application Data\Corel
2008-10-13 21:54 . 2008-10-13 21:54 <REP> d-------- C:\Documents and Settings\Administrateur
2008-10-13 21:31 . 2008-10-13 21:31 <REP> d-------- C:\Program Files\Trend Micro
2008-10-13 21:02 . 2008-10-13 21:02 16,409 --a------ C:\Documents and Settings\All Users\Application Data\ivuj.vbs
2008-10-13 21:02 . 2008-10-13 21:02 15,621 --a------ C:\Program Files\Fichiers communs\opytetinyd.scr
2008-10-13 21:02 . 2008-10-13 21:02 15,386 --a------ C:\Documents and Settings\Laurent\Application Data\ugyn.dll
2008-10-13 21:02 . 2008-10-13 21:02 14,873 --a------ C:\Documents and Settings\All Users\Application Data\fipivy.dat
2008-10-13 21:02 . 2008-10-13 21:02 14,648 --a------ C:\WINDOWS\yjytigoduj.db
2008-10-13 21:02 . 2008-10-13 21:02 11,650 --a------ C:\WINDOWS\ykelutiqoz.ban
2008-10-13 21:02 . 2008-10-13 21:02 11,309 --a------ C:\Program Files\Fichiers communs\ytosepuvux.vbs
2008-10-13 21:02 . 2008-10-13 21:02 11,150 --a------ C:\Documents and Settings\All Users\Application Data\wuvyh.scr
2008-10-13 21:02 . 2008-10-13 21:02 11,088 --a------ C:\WINDOWS\ucitucyp.scr
2008-10-13 21:02 . 2008-10-13 21:02 11,067 --a------ C:\WINDOWS\system32\avuxupuwo.com
2008-10-13 21:02 . 2008-10-13 21:02 10,805 --a------ C:\WINDOWS\system32\iwilacydi.exe
2008-10-13 21:02 . 2008-10-13 21:02 10,379 --a------ C:\WINDOWS\fonefezab.bin
2008-10-13 21:02 . 2008-10-13 21:02 10,358 --a------ C:\WINDOWS\system32\qydatugyc.bin
2008-10-13 21:02 . 2008-10-13 21:02 10,271 --a------ C:\Documents and Settings\Laurent\Application Data\acyguver.bat
2008-10-13 20:55 . 2007-08-21 08:00 1,536 --a------ C:\WINDOWS\system32\Delete_Me_Dummy_karna.dat
2008-10-13 20:54 . 2008-10-13 20:54 <REP> d-------- C:\Documents and Settings\All Users\Application Data\texcrqps
2008-10-13 20:53 . 2008-10-13 23:15 <REP> d-------- C:\Documents and Settings\Laurent\Application Data\sp2
2008-10-13 20:53 . 2008-10-13 19:50 266,240 --a------ C:\WINDOWS\ngwstxfd.dll
2008-10-13 20:53 . 2008-10-13 19:50 217,088 --a------ C:\WINDOWS\rosqxvmn.dll
2008-10-13 20:53 . 2008-10-13 19:50 94,208 --a------ C:\WINDOWS\lomxeqsn.exe
2008-10-13 20:51 . 2008-10-13 20:51 <REP> d--h----- C:\WINDOWS\PIF
2008-10-13 19:54 . 2008-10-13 19:55 <REP> d-------- C:\Program Files\GrabIt
2008-10-12 18:52 . 2008-10-13 20:09 <REP> d-------- C:\Documents and Settings\Laurent\Application Data\GrabIt
2008-10-05 19:16 . 2008-10-05 19:16 <REP> d-------- C:\Documents and Settings\Valentin\Application Data\Ulead Systems
2008-10-05 18:58 . 2008-10-05 18:58 <REP> d-------- C:\Program Files\Ulead Systems
2008-10-05 18:58 . 2008-10-05 18:58 <REP> d-------- C:\Program Files\Fichiers communs\Ulead Systems
2008-10-05 18:58 . 2008-10-05 18:58 <REP> d-------- C:\Documents and Settings\All Users\Application Data\Ulead Systems
2008-10-05 16:03 . 2008-10-05 16:05 <REP> d-------- C:\Documents and Settings\Laurent\.gimp-2.6
2008-10-05 16:03 . 2008-10-05 16:03 <REP> d-------- C:\Documents and Settings\Laurent\.gegl-0.0
2008-10-05 15:14 . 2008-10-08 14:41 <REP> d-------- C:\Documents and Settings\Valentin\Application Data\dvdcss
2008-10-03 18:19 . 2008-10-03 18:19 <REP> d-------- C:\Program Files\WordBiz
2008-10-03 18:13 . 2008-10-03 18:13 <REP> d-------- C:\Documents and Settings\LocalService\Application Data\SACore
2008-10-01 21:32 . 2008-10-01 21:32 268 --ah----- C:\sqmdata01.sqm
2008-10-01 21:32 . 2008-10-01 21:32 244 --ah----- C:\sqmnoopt01.sqm
2008-10-01 20:17 . 2008-10-01 20:17 <REP> d-------- C:\WINDOWS\system32\fr
2008-10-01 20:17 . 2008-10-01 20:17 <REP> d-------- C:\WINDOWS\system32\bits
2008-10-01 20:17 . 2008-10-01 20:17 <REP> d-------- C:\WINDOWS\l2schemas
2008-10-01 20:15 . 2008-10-01 20:15 <REP> d-------- C:\WINDOWS\ServicePackFiles
2008-10-01 20:10 . 2008-10-01 20:10 <REP> d-------- C:\WINDOWS\EHome
2008-09-30 17:41 . 2004-08-03 22:41 1,041,536 --------- C:\WINDOWS\system32\drivers\hsfdpsp2.sys
2008-09-30 17:41 . 2004-08-03 22:41 685,056 --------- C:\WINDOWS\system32\drivers\hsfcxts2.sys
2008-09-30 17:41 . 2004-08-03 22:41 220,032 --------- C:\WINDOWS\system32\drivers\hsfbs2s2.sys
2008-09-30 17:41 . 2004-08-05 14:00 184,107 --------- C:\WINDOWS\system32\dllcache\compact.wmz
2008-09-30 17:41 . 2004-07-17 22:55 129,045 --------- C:\WINDOWS\system32\drivers\cxthsfs2.cty
2008-09-30 17:41 . 2004-08-05 14:00 999 --------- C:\WINDOWS\system32\dllcache\bktrh.gif
2008-09-30 17:41 . 2004-08-05 14:00 773 --------- C:\WINDOWS\system32\dllcache\cnth.gif
2008-09-30 17:41 . 2004-08-05 14:00 773 --------- C:\WINDOWS\system32\dllcache\cnt.gif
2008-09-30 17:41 . 2004-08-05 14:00 772 --------- C:\WINDOWS\system32\dllcache\cntd.gif
2008-09-30 17:41 . 2004-08-05 14:00 760 --------- C:\WINDOWS\system32\dllcache\cloapph.gif
2008-09-30 17:41 . 2004-08-05 14:00 717 --------- C:\WINDOWS\system32\dllcache\cloapp.gif
2008-09-24 15:23 . 2008-09-24 15:23 <REP> d-------- C:\Documents and Settings\Camille\Application Data\vlc
2008-09-23 21:08 . 2008-09-23 21:20 <REP> d-------- C:\Documents and Settings\Laurent\Application Data\MP-Manager
2008-09-23 21:07 . 2008-09-23 21:07 <REP> d-------- C:\Program Files\MPMAN
.
(((((((((((((((((((((((((((((((((( Compte-rendu de Find3M ))))))))))))))))))))))))))))))))))))))))))))))))
.
2008-10-13 19:19 --------- d-----w C:\Documents and Settings\Laurent\Application Data\EoRezo
2008-10-13 19:13 --------- d-----w C:\Documents and Settings\Laurent\Application Data\temp
2008-10-13 19:02 12,652 ----a-w C:\Program Files\Fichiers communs\abaxesepyc.inf
2008-10-13 17:08 --------- d-----w C:\Program Files\McAfee
2008-10-13 05:08 --------- d-----w C:\Program Files\eMule
2008-10-10 16:40 --------- d-----w C:\Program Files\ScrabBot
2008-10-05 16:58 --------- d--h--w C:\Program Files\InstallShield Installation Information
2008-10-05 13:50 --------- d-----w C:\Program Files\EoRezo
2008-10-03 15:34 --------- d-----w C:\Documents and Settings\All Users\Application Data\SiteAdvisor
2008-10-03 15:33 --------- d-----w C:\Documents and Settings\All Users\Application Data\McAfee
2008-10-01 16:03 --------- d-----w C:\Program Files\Spybot - Search & Destroy
2008-09-17 18:28 --------- d-----w C:\Program Files\Fichiers communs\logishrd
2008-09-12 15:23 --------- d-----w C:\Documents and Settings\Valentin\Application Data\vlc
2008-09-10 12:55 --------- d-----w C:\Documents and Settings\All Users\Application Data\Microsoft Help
2008-09-06 08:52 --------- d-----w C:\Documents and Settings\Laurent\Application Data\vlc
2008-09-06 08:43 --------- d-----w C:\Program Files\VideoLAN
2008-09-05 20:19 --------- d-----w C:\Program Files\Messenger Plus! Live
2008-09-05 15:43 --------- d-----w C:\Documents and Settings\All Users\Application Data\Messenger Plus!
2008-08-28 15:17 --------- d-----w C:\Documents and Settings\Camille\Application Data\McAfee
2008-08-20 20:35 --------- d-----w C:\Documents and Settings\All Users\Application Data\Spybot - Search & Destroy
2008-08-17 14:57 --------- d-----w C:\Documents and Settings\Valentin\Application Data\Sonic
2008-08-17 13:15 --------- d-----w C:\Program Files\PhotoFiltre
2008-08-16 16:38 --------- d-----w C:\Program Files\DAEMON Tools Lite
2008-08-16 11:18 --------- d-----w C:\Program Files\EA SPORTS
2008-08-16 09:42 --------- d-----w C:\Program Files\KONAMI
2008-08-15 22:58 --------- d-----w C:\Program Files\HomePlayer
2008-08-15 13:06 --------- d-----w C:\Program Files\MessengerPlus! 3
2008-08-15 08:30 --------- d--h--r C:\Documents and Settings\Laurent\Application Data\SecuROM
2008-08-15 08:14 717,296 ----a-w C:\WINDOWS\system32\drivers\sptd.sys
2008-08-15 08:14 --------- d-----w C:\Documents and Settings\Laurent\Application Data\DAEMON Tools
2008-08-15 08:09 --------- d-----w C:\Program Files\DAEMON Tools Pro
2008-08-15 08:03 --------- d-----w C:\Documents and Settings\Laurent\Application Data\Sonic
2008-08-15 08:03 --------- d-----w C:\Documents and Settings\Laurent\Application Data\Leadertech
2008-08-14 21:24 --------- d-----w C:\Documents and Settings\Laurent\Application Data\uTorrent
.
[code]<pre>
----a-w 878,080 2008-10-13 18:44:14 C:\Documents and Settings\Laurent\Mes documents\GrabIt Downloads\The.Sims.2.Apartment.Life.GENERIC KEYGEN-FFF.zip .exe
----a-w 878,080 2008-10-13 18:46:32 C:\Documents and Settings\Laurent\Mes documents\GrabIt Downloads\The.Sims.2.Bon.Voyage.GENERIC KEYGEN-FFF.zip .exe
</pre>[/code]
((((((((((((((((((((((((((((((((( Points de chargement Reg ))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* les éléments vides & les éléments initiaux légitimes ne sont pas listés
REGEDIT4
[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"CTFMON.EXE"="C:\WINDOWS\system32\ctfmon.exe" [2008-04-14 15360]
"swg"="C:\Program Files\Google\GoogleToolbarNotifier\1.2.1128.5462\GoogleToolbarNotifier.exe" [N/A]
"DAEMON Tools Lite"="C:\Program Files\DAEMON Tools Lite\daemon.exe" [2008-07-24 490952]
"SpybotSD TeaTimer"="C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe" [2008-09-16 1833296]
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"QuickTime Task"="C:\Program Files\QuickTime\qttask.exe" [2006-03-10 98304]
"SpybotSnD"="C:\Program Files\Spybot - Search & Destroy\SpybotSD.exe" [2008-07-07 4891472]
"Ulead AutoDetector v2"="C:\Program Files\Fichiers communs\Ulead Systems\AutoDetector\monitor.exe" [2004-11-26 90112]
"SiteAdvisor"="C:\Program Files\SiteAdvisor\6261\SiteAdv.exe" [N/A]
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce]
"UPI11_COM"="C:\Program Files\Ulead Systems\Ulead PhotoImpact 12\upiExtractImage.dll" [2006-08-15 40960]
[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run]
"CTFMON.EXE"="C:\WINDOWS\system32\CTFMON.EXE" [2008-04-14 15360]
C:\Documents and Settings\All Users\Menu D‚marrer\Programmes\D‚marrage\
Utilitaire de carte WLAN sans fil USB 2.0.lnk - C:\Program Files\Dell sans fil\PRISMCFG.exe [2006-03-10 921704]
[HKEY_CURRENT_USER\software\microsoft\windows\currentversion\policies\explorer]
"NoLogOff"= 0 (0x0)
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\PRISMAPI.DLL]
2005-12-22 22:08 450646 C:\WINDOWS\system32\PRISMAPI.dll
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\windows]
"AppInit_DLLs"=dwfaiq.dll
[HKEY_LOCAL_MACHINE\software\microsoft\security center]
"AntiVirusDisableNotify"=dword:00000001
"FirewallDisableNotify"=dword:00000001
"UpdatesDisableNotify"=dword:00000001
[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\McAfeeAntiVirus]
"DisableMonitoring"=dword:00000001
[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\McAfeeFirewall]
"DisableMonitoring"=dword:00000001
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile]
"EnableFirewall"= 0 (0x0)
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%windir%\\system32\\sessmgr.exe"=
"C:\\Program Files\\Microsoft Office\\Office12\\OUTLOOK.EXE"=
"C:\\Program Files\\Fichiers communs\\McAfee\\MNA\\McNASvc.exe"=
"C:\\Program Files\\eMule\\emule.exe"=
"C:\\Program Files\\KONAMI\\Pro Evolution Soccer 2008\\PES2008.exe"=
"%windir%\\Network Diagnostic\\xpnetdiag.exe"=
"C:\\Program Files\\Windows Live\\Messenger\\msnmsgr.exe"=
"C:\\Program Files\\Windows Live\\Messenger\\livecall.exe"=
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\GloballyOpenPorts\List]
"11645:TCP"= 11645:TCP:TCP_émule
"11655:UDP"= 11655:UDP:UDP_émule
R2 McAfee SiteAdvisor Service;McAfee SiteAdvisor Service;C:\Program Files\McAfee\SiteAdvisor\McSACore.exe [2008-09-08 198944]
R2 PRISMSVC;PRISMSVC;C:\WINDOWS\system32\PRISMSVC.EXE [2005-12-22 61526]
R3 USBSTOR;Pilote de stockage de masse USB;C:\WINDOWS\system32\DRIVERS\USBSTOR.SYS [2008-04-13 26368]
.
Contenu du dossier 'Tâches planifiées'
2008-08-14 C:\WINDOWS\Tasks\McDefragTask.job
- c:\PROGRA~1\mcafee\mqc\QcConsol.exe [2007-12-04 13:32]
2008-08-11 C:\WINDOWS\Tasks\McQcTask.job
- c:\PROGRA~1\mcafee\mqc\QcConsol.exe [2007-12-04 13:32]
2008-08-12 C:\WINDOWS\Tasks\Rappel d'abonnement 1 auprès de l'ISP.job
- C:\WINDOWS\system32\OOBE\oobebaln.exe [2008-04-14 04:34]
2008-08-20 C:\WINDOWS\Tasks\Spybot - Search & Destroy - Scheduled Task.job
- C:\Program Files\Spybot - Search & Destroy\SpybotSD.exe [2008-07-07 09:42]
2008-08-20 C:\WINDOWS\Tasks\Spybot - Search & Destroy Updater - Scheduled Task.job
- C:\Program Files\Spybot - Search & Destroy\SDUpdate.exe [2008-07-07 09:42]
.
- - - - ORPHELINS SUPPRIMES - - - -
BHO-{0076C762-3F93-4639-9893-3F9C935420A4} - (no file)
BHO-{18012CA7-F1F3-4008-BB9E-04669D73E207} - C:\WINDOWS\system32\ssqOHASi.dll
BHO-{B2ADB537-AFF6-4D72-BA77-DA012A6FDEA6} - C:\WINDOWS\system32\yaywWQIb.dll
BHO-{E7E4053B-FD23-448B-842F-793DD49AA53C} - (no file)
Toolbar-{32099AAC-C132-4136-9E9A-4E364A424E17} - (no file)
WebBrowser-{32099AAC-C132-4136-9E9A-4E364A424E17} - (no file)
ShellExecuteHooks-{B2ADB537-AFF6-4D72-BA77-DA012A6FDEA6} - C:\WINDOWS\system32\yaywWQIb.dll
.
------- Examen supplémentaire -------
.
FireFox -: Profile - C:\Documents and Settings\Laurent\Application Data\Mozilla\Firefox\Profiles\s4k5kv9i.default\
FireFox -: prefs.js - STARTUP.HOMEPAGE - hxxp://google.fr
FF -: plugin - C:\Program Files\Adobe\Acrobat 6.0\Reader\browser\nppdf32.dll
FF -: plugin - C:\Program Files\Java\j2re1.4.2_03\bin\NPJava11.dll
FF -: plugin - C:\Program Files\Java\j2re1.4.2_03\bin\NPJava12.dll
FF -: plugin - C:\Program Files\Java\j2re1.4.2_03\bin\NPJava13.dll
FF -: plugin - C:\Program Files\Java\j2re1.4.2_03\bin\NPJava14.dll
FF -: plugin - C:\Program Files\Java\j2re1.4.2_03\bin\NPJava32.dll
FF -: plugin - C:\Program Files\Java\j2re1.4.2_03\bin\NPJPI142_03.dll
FF -: plugin - C:\Program Files\Java\j2re1.4.2_03\bin\NPOJI610.dll
FF -: plugin - C:\Program Files\Viewpoint\Viewpoint Experience Technology\npViewpoint.dll
.
**************************************************************************
catchme 0.3.1361 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2008-10-13 23:53:58
Windows 5.1.2600 Service Pack 3 NTFS
Recherche de processus cachés ...
Recherche d'éléments en démarrage automatique cachés ...
Recherche de fichiers cachés ...
Scan terminé avec succès
Fichiers cachés: 0
**************************************************************************
.
------------------------ Autres processus actifs ------------------------
.
C:\WINDOWS\system32\ati2evxx.exe
C:\Program Files\Intel\Intel Matrix Storage Manager\IAANTMon.exe
C:\PROGRA~1\McAfee\MSC\mcmscsvc.exe
C:\PROGRA~1\FICHIE~1\McAfee\MNA\McNASvc.exe
C:\PROGRA~1\FICHIE~1\McAfee\McProxy\McProxy.exe
C:\PROGRA~1\McAfee\VIRUSS~1\Mcshield.exe
C:\Program Files\McAfee\MPF\MpfSrv.exe
C:\Program Files\McAfee\MSK\msksrver.exe
C:\WINDOWS\system32\wdfmgr.exe
C:\WINDOWS\system32\userinit.exe
C:\Program Files\McAfee.com\Agent\mcagent.exe
C:\WINDOWS\system32\PRISMSVR.exe
C:\PROGRA~1\McAfee\VIRUSS~1\mcsysmon.exe
C:\PROGRA~1\McAfee\VIRUSS~1\mcvsshld.exe
.
**************************************************************************
.
Heure de fin: 2008-10-13 23:56:34 - La machine a redémarré
ComboFix-quarantined-files.txt 2008-10-13 21:56:29
Avant-CF: 68 041 883 648 octets libres
Après-CF: 68,287,524,864 octets libres
274 --- E O F --- 2008-10-02 08:24:58
je n'sais pas si je dois attendre un autre com de ta part ? mais sache ke ce fut un reel plaisir de "bosser" avec toi !!! thankssssssssssss
Salut,
# Démarre en mode sans échec :
Pour cela, tu tapotes la touche F8 dès le début de l’allumage du pc sans t’arrêter
Une fenêtre va s’ouvrir tu te déplaces avec les flèches du clavier sur démarrer en mode sans échec puis tape entrée.
Une fois sur le bureau s’il n’y a pas toutes les couleurs et autres c’est normal !
(Si F8 ne marche pas utilise la touche F5).
----------------------------------------------------------------------------
# Relance le programme Smitfraud :
Cette fois choisit l’option 2, répond oui a tous ;
Sauvegarde le rapport, Redémarre en mode normal, copie/colle le rapport sauvegardé sur le forum
# Démarre en mode sans échec :
Pour cela, tu tapotes la touche F8 dès le début de l’allumage du pc sans t’arrêter
Une fenêtre va s’ouvrir tu te déplaces avec les flèches du clavier sur démarrer en mode sans échec puis tape entrée.
Une fois sur le bureau s’il n’y a pas toutes les couleurs et autres c’est normal !
(Si F8 ne marche pas utilise la touche F5).
----------------------------------------------------------------------------
# Relance le programme Smitfraud :
Cette fois choisit l’option 2, répond oui a tous ;
Sauvegarde le rapport, Redémarre en mode normal, copie/colle le rapport sauvegardé sur le forum
Télécharge HijackThis (outils de dignostic) ici :
-> Fais un clic droit sur un des liens et choisi enregistrer la cible sous .... le bureau
-> http://www.trendsecure.com/portal/en-US/_download/HJTInstall.exe
-> ftp://ftp.commentcamarche.com/download/HJTInstall.exe
-> Fais un double-clic sur HJTInstall.exe afin de lancer l'installation
-> Clique sur Install ensuite sur I Accept
-> Clique sur Do a scan system and save log file
-> Le bloc-notes s'ouvrira, fais un copier-coller de tout son contenu ici dans ta prochaine réponse
-> Fais un clic droit sur un des liens et choisi enregistrer la cible sous .... le bureau
-> http://www.trendsecure.com/portal/en-US/_download/HJTInstall.exe
-> ftp://ftp.commentcamarche.com/download/HJTInstall.exe
-> Fais un double-clic sur HJTInstall.exe afin de lancer l'installation
-> Clique sur Install ensuite sur I Accept
-> Clique sur Do a scan system and save log file
-> Le bloc-notes s'ouvrira, fais un copier-coller de tout son contenu ici dans ta prochaine réponse
Telecharge malwarebytes
Tu l´instale; le programme va se mettre automatiquement a jour.
Une fois a jour, le programme va se lancer; click sur l´onglet parametre, et coche la case : "Arreter internet explorer pendant la suppression".
Click maintenant sur l´onglet recherche et coche la case : "executer un examen complet".
Puis click sur "rechercher".
Laisse le scanner le pc...
Si des elements on ete trouvés > click sur supprimer la selection.
si il t´es demandé de redemarrer > click sur "yes".
A la fin un rapport va s´ouvrir; sauvegarde le de maniere a le retrouver en vu de le poster sur le forum.
Copie et colle le rapport stp.
PS : les rapport sont aussi rangé dans l onglet rapport/log
Tu l´instale; le programme va se mettre automatiquement a jour.
Une fois a jour, le programme va se lancer; click sur l´onglet parametre, et coche la case : "Arreter internet explorer pendant la suppression".
Click maintenant sur l´onglet recherche et coche la case : "executer un examen complet".
Puis click sur "rechercher".
Laisse le scanner le pc...
Si des elements on ete trouvés > click sur supprimer la selection.
si il t´es demandé de redemarrer > click sur "yes".
A la fin un rapport va s´ouvrir; sauvegarde le de maniere a le retrouver en vu de le poster sur le forum.
Copie et colle le rapport stp.
PS : les rapport sont aussi rangé dans l onglet rapport/log
réouvre malewarebyte
va sur quarantaine
supprime tout,
Télécharge Toolbar-S&D (Team IDN) sur ton Bureau.
https://77b4795d-a-62cb3a1a-s-sites.googlegroups.com/site/eric71mespages/ToolBarSD.exe?attachauth=ANoY7cqJWPphpudyTqv7TRo5RQ3nm_Sx8JluVMO59X5E9cyE3j3LqKlmStIqiDqJdIgMJLi7MXn2nKVajQfoWuVvZZ2wIx_vkqO4k4P0K9jh-ra9jaKPXdZcoaVF2UqJZNH8ubL_42uIwh6f35xJ2GJMuzddVj2Qth1DgZ839lxEIFGkgWz3TdfvNMy-YtxfA3gqBUrj4U4LFeAPiWr3ClmjIP0t_Xs5PQ%3D%3D&attredirects=2
* Lance l'installation du programme en exécutant le fichier téléchargé.
* Double-clique maintenant sur le raccourci de Toolbar-S&D.
* Sélectionne la langue souhaitée en tapant la lettre de ton choix puis en validant avec la touche Entrée.
* Choisis maintenant l'option 1 (Recherche). Patiente jusqu'à la fin de la recherche.
* Poste le rapport généré. (C:\TB.txt)
va sur quarantaine
supprime tout,
Télécharge Toolbar-S&D (Team IDN) sur ton Bureau.
https://77b4795d-a-62cb3a1a-s-sites.googlegroups.com/site/eric71mespages/ToolBarSD.exe?attachauth=ANoY7cqJWPphpudyTqv7TRo5RQ3nm_Sx8JluVMO59X5E9cyE3j3LqKlmStIqiDqJdIgMJLi7MXn2nKVajQfoWuVvZZ2wIx_vkqO4k4P0K9jh-ra9jaKPXdZcoaVF2UqJZNH8ubL_42uIwh6f35xJ2GJMuzddVj2Qth1DgZ839lxEIFGkgWz3TdfvNMy-YtxfA3gqBUrj4U4LFeAPiWr3ClmjIP0t_Xs5PQ%3D%3D&attredirects=2
* Lance l'installation du programme en exécutant le fichier téléchargé.
* Double-clique maintenant sur le raccourci de Toolbar-S&D.
* Sélectionne la langue souhaitée en tapant la lettre de ton choix puis en validant avec la touche Entrée.
* Choisis maintenant l'option 1 (Recherche). Patiente jusqu'à la fin de la recherche.
* Poste le rapport généré. (C:\TB.txt)
Relance Toolbar-S&D en double-cliquant sur le raccourci. Tape sur "2" puis valide en appuyant sur "Entrée".
! Ne ferme pas la fenêtre lors de la suppression !
Un rapport sera généré, poste son contenu ici.
NOTE : Si ton Bureau ne réapparait pas, appuie simultanément sur Ctrl+Alt+Suppr pour ouvrir le Gestionnaire des tâches.
Rends-toi sur l'onglet "Processus". Clique en haut à gauche sur Fichier et choisis "Exécuter..."
Tape explorer puis valide.
! Ne ferme pas la fenêtre lors de la suppression !
Un rapport sera généré, poste son contenu ici.
NOTE : Si ton Bureau ne réapparait pas, appuie simultanément sur Ctrl+Alt+Suppr pour ouvrir le Gestionnaire des tâches.
Rends-toi sur l'onglet "Processus". Clique en haut à gauche sur Fichier et choisis "Exécuter..."
Tape explorer puis valide.
télécharge OTMoveIt http://download.bleepingcomputer.com/oldtimer/OTMoveIt2.exe (de Old_Timer) sur ton Bureau.
double-clique sur OTMoveIt.exe pour le lancer.
Assure toi que la case Unregister Dll's and Ocx's soit bien cochée
copie la liste qui se trouve en gras ci-dessous,
et colle-la dans le cadre de gauche de OTMoveIt :Paste List of Files/Folders to be moved.
C:\WINDOWS\system32\iSAHOqss.ini
C:\WINDOWS\system32\iSAHOqss.ini2
clique sur MoveIt! pour lancer la suppression.
le résultat apparaitra dans le cadre "Results".
clique sur Exit pour fermer.
poste le rapport situé dans C:\_OTMoveIt\MovedFiles.
il te sera peut-être demander de redémarrer le pc pour achever la suppression.si c'est le cas accepte par Yes.
double-clique sur OTMoveIt.exe pour le lancer.
Assure toi que la case Unregister Dll's and Ocx's soit bien cochée
copie la liste qui se trouve en gras ci-dessous,
et colle-la dans le cadre de gauche de OTMoveIt :Paste List of Files/Folders to be moved.
C:\WINDOWS\system32\iSAHOqss.ini
C:\WINDOWS\system32\iSAHOqss.ini2
clique sur MoveIt! pour lancer la suppression.
le résultat apparaitra dans le cadre "Results".
clique sur Exit pour fermer.
poste le rapport situé dans C:\_OTMoveIt\MovedFiles.
il te sera peut-être demander de redémarrer le pc pour achever la suppression.si c'est le cas accepte par Yes.
ON DERNIER SCAN :
Télécharge combofix : http://download.bleepingcomputer.com/sUBs/ComboFix.exe
-> Double clique sur combofix.exe.
-> Tape sur la touche 1 (Yes) pour démarrer le scan.
-> Lorsque le scan sera complété, un rapport apparaîtra. Copie/colle ce rapport dans ta prochaine réponse.
NOTE : Le rapport se trouve également ici : C:\Combofix.txt
Avant d'utiliser ComboFix :
-> Déconnecte toi d'internet et referme les fenêtres de tous les programmes en cours.
-> Désactive provisoirement et seulement le temps de l'utilisation de ComboFix, la protection en temps réel de ton Antivirus et de tes Antispywares, qui peuvent géner fortement la procédure de recherche et de nettoyage de l'outil.
Une fois fait, sur ton bureau double-clic sur Combofix.exe.
- Répond oui au message d'avertissement, pour que le programme commence à procéder à l'analyse du pc.
/!\ Pendant la durée de cette étape, ne te sert pas du pc et n'ouvre aucun programmes.
- En fin de scan il est possible que ComboFix ait besoin de redemarrer le pc pour finaliser la désinfection\recherche, laisses-le faire.
- Un rapport s'ouvrira ensuite dans le bloc notes, ce fichier rapport Combofix.txt, est automatiquement sauvegardé et rangé à C:\Combofix.txt)
-> Réactive la protection en temps réel de ton Antivirus et de tes Antispywares, avant de te reconnecter à internet.
-> Reviens sur le forum, et copie et colle la totalité du contenu de C:\Combofix.txt dans ton prochain message.
Télécharge combofix : http://download.bleepingcomputer.com/sUBs/ComboFix.exe
-> Double clique sur combofix.exe.
-> Tape sur la touche 1 (Yes) pour démarrer le scan.
-> Lorsque le scan sera complété, un rapport apparaîtra. Copie/colle ce rapport dans ta prochaine réponse.
NOTE : Le rapport se trouve également ici : C:\Combofix.txt
Avant d'utiliser ComboFix :
-> Déconnecte toi d'internet et referme les fenêtres de tous les programmes en cours.
-> Désactive provisoirement et seulement le temps de l'utilisation de ComboFix, la protection en temps réel de ton Antivirus et de tes Antispywares, qui peuvent géner fortement la procédure de recherche et de nettoyage de l'outil.
Une fois fait, sur ton bureau double-clic sur Combofix.exe.
- Répond oui au message d'avertissement, pour que le programme commence à procéder à l'analyse du pc.
/!\ Pendant la durée de cette étape, ne te sert pas du pc et n'ouvre aucun programmes.
- En fin de scan il est possible que ComboFix ait besoin de redemarrer le pc pour finaliser la désinfection\recherche, laisses-le faire.
- Un rapport s'ouvrira ensuite dans le bloc notes, ce fichier rapport Combofix.txt, est automatiquement sauvegardé et rangé à C:\Combofix.txt)
-> Réactive la protection en temps réel de ton Antivirus et de tes Antispywares, avant de te reconnecter à internet.
-> Reviens sur le forum, et copie et colle la totalité du contenu de C:\Combofix.txt dans ton prochain message.
double-clique sur OTMoveIt.exe pour le lancer.
Assure toi que la case Unregister Dll's and Ocx's soit bien cochée
copie la liste qui se trouve en gras ci-dessous,
et colle-la dans le cadre de gauche de OTMoveIt :Paste List of Files/Folders to be moved.
C:\WINDOWS\yjytigoduj.db
C:\WINDOWS\ykelutiqoz.ban
C:\WINDOWS\ucitucyp.scr
C:\WINDOWS\system32\avuxupuwo.com
C:\WINDOWS\system32\iwilacydi.exe
clique sur MoveIt! pour lancer la suppression.
le résultat apparaitra dans le cadre "Results".
clique sur Exit pour fermer.
poste le rapport situé dans C:\_OTMoveIt\MovedFiles.
il te sera peut-être demander de redémarrer le pc pour achever la suppression.si c'est le cas accepte par Yes.
Assure toi que la case Unregister Dll's and Ocx's soit bien cochée
copie la liste qui se trouve en gras ci-dessous,
et colle-la dans le cadre de gauche de OTMoveIt :Paste List of Files/Folders to be moved.
C:\WINDOWS\yjytigoduj.db
C:\WINDOWS\ykelutiqoz.ban
C:\WINDOWS\ucitucyp.scr
C:\WINDOWS\system32\avuxupuwo.com
C:\WINDOWS\system32\iwilacydi.exe
clique sur MoveIt! pour lancer la suppression.
le résultat apparaitra dans le cadre "Results".
clique sur Exit pour fermer.
poste le rapport situé dans C:\_OTMoveIt\MovedFiles.
il te sera peut-être demander de redémarrer le pc pour achever la suppression.si c'est le cas accepte par Yes.