A voir également:
- Problème antivirus 2009
- Comodo antivirus - Télécharger - Sécurité
- Panda antivirus - Télécharger - Antivirus & Antimalwares
- Desactiver antivirus windows 10 - Guide
- Bitdefender antivirus gratuit - Télécharger - Antivirus & Antimalwares
- Antivirus norton gratuit - Télécharger - Antivirus & Antimalwares
7 réponses
Utilisateur anonyme
1 déc. 2008 à 21:53
1 déc. 2008 à 21:53
Hi,
Dans l'ordre:
Relance Lop S&D
Choisis cette fois ci l'Option 2 ( Suppression )
Ne ferme pas la fenêtre lors de la suppression !
Poste le rapport généré ( C:\lopR.txt )
( Si le Bureau ne réapparaît pas presse Ctrl + Alt + Suppr, Onglet Fichier,
Nouvelle tâche, tape explorer.exe et valide )
=**=*==**==**=*==*=**=*=*=*==**==**=*=*==*=**=*=*=*=*==**=*=*=*==*=*=**=**==*=*=*
Télécharge VundoFix.exe (par Atribune) sur ton Bureau.
http://www.atribune.org/ccount/click.php?id=4
* Double-clique VundoFix.exe afin de le lancer.
* Lorsque l'outil se lance à nouveau, clique sur le bouton Scan for Vundo
* Clique sur le bouton Scan for Vundo.
* Lorsque le scan est complété, clique sur le bouton Remove Vundo.
* Une invite te demandera si tu veux supprimer les fichiers, clique YES
* Après avoir cliqué "Yes", le Bureau disparaîtra un moment lors de la suppression des fichiers.
* Tu verras une invite qui t'annonce que ton PC va s'éteindre ("shutdown" ); clique OK
* Démarre ton PC à nouveau.
* Copie/colle le contenu du rapport situé dans C:\vundofix.txt ainsi qu'un nouveau rapport HijackThis! dans ta prochaine réponse.
Note: Il est possible que VundoFix soit confronté à un fichier qu'il ne peut supprimer. Si tel est le cas, l'outil se lancera au prochain redémarrage; il faut simplement suivre les instructions ci-haut, à partir de "clique sur le bouton Scan for Vundo".
Alut.
Dans l'ordre:
Relance Lop S&D
Choisis cette fois ci l'Option 2 ( Suppression )
Ne ferme pas la fenêtre lors de la suppression !
Poste le rapport généré ( C:\lopR.txt )
( Si le Bureau ne réapparaît pas presse Ctrl + Alt + Suppr, Onglet Fichier,
Nouvelle tâche, tape explorer.exe et valide )
=**=*==**==**=*==*=**=*=*=*==**==**=*=*==*=**=*=*=*=*==**=*=*=*==*=*=**=**==*=*=*
Télécharge VundoFix.exe (par Atribune) sur ton Bureau.
http://www.atribune.org/ccount/click.php?id=4
* Double-clique VundoFix.exe afin de le lancer.
* Lorsque l'outil se lance à nouveau, clique sur le bouton Scan for Vundo
* Clique sur le bouton Scan for Vundo.
* Lorsque le scan est complété, clique sur le bouton Remove Vundo.
* Une invite te demandera si tu veux supprimer les fichiers, clique YES
* Après avoir cliqué "Yes", le Bureau disparaîtra un moment lors de la suppression des fichiers.
* Tu verras une invite qui t'annonce que ton PC va s'éteindre ("shutdown" ); clique OK
* Démarre ton PC à nouveau.
* Copie/colle le contenu du rapport situé dans C:\vundofix.txt ainsi qu'un nouveau rapport HijackThis! dans ta prochaine réponse.
Note: Il est possible que VundoFix soit confronté à un fichier qu'il ne peut supprimer. Si tel est le cas, l'outil se lancera au prochain redémarrage; il faut simplement suivre les instructions ci-haut, à partir de "clique sur le bouton Scan for Vundo".
Alut.
Voilà le second rapport de lop
--------------------\\ Lop S&D 4.2.4-9c XP/Vista
Microsoft Windows XP Édition familiale ( v5.1.2600 ) Service Pack 3
X86-based PC ( Uniprocessor Free : AMD Athlon(tm) )
BIOS : Phoenix - AwardBIOS v6.00PG
USER : François ( Administrator )
BOOT : Normal boot
Antivirus : avast! antivirus 4.8.1296 [VPS 081130-0] 4.8.1296 (Activated)
A:\ (USB)
C:\ (Local Disk) - NTFS - Total:114 Go (Free:95 Go)
D:\ (CD or DVD)
E:\ (CD or DVD) - CDFS - Total:0 Go (Free:0 Go)
"C:\Lop SD" ( MAJ : 01-11-2008|16:30 )
Option : [2] ( 01/12/2008|21:49 )
\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\ SUPPRESSION
Supprime! - C:\DOCUME~1\FRANOI~1\Cookies\françois@banner.cotedazurpalace[1].txt
Supprime! - C:\DOCUME~1\FRANOI~1\Cookies\françois@banner.32vegas[1].txt
\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\
--------------------\\ Listing des dossiers dans APPLIC~1
[26/09/2008|15:55] C:\DOCUME~1\ALLUSE~1\APPLIC~1\Logitech
[19/10/2008|17:11] C:\DOCUME~1\ALLUSE~1\APPLIC~1\Microsoft
[09/09/2008|12:59] C:\DOCUME~1\ALLUSE~1\APPLIC~1\WLInstaller
[02/01/2002|00:47] C:\DOCUME~1\DEFAUL~1\APPLIC~1\Microsoft
[06/10/2008|09:13] C:\DOCUME~1\FRANOI~1\APPLIC~1\Adobe
[17/01/2002|14:37] C:\DOCUME~1\FRANOI~1\APPLIC~1\Help
[02/01/2002|00:57] C:\DOCUME~1\FRANOI~1\APPLIC~1\Identities
[06/10/2008|09:13] C:\DOCUME~1\FRANOI~1\APPLIC~1\InterTrust
[26/09/2008|15:57] C:\DOCUME~1\FRANOI~1\APPLIC~1\Leadertech
[23/01/2002|22:59] C:\DOCUME~1\FRANOI~1\APPLIC~1\Macromedia
[22/11/2008|19:41] C:\DOCUME~1\FRANOI~1\APPLIC~1\Microsoft
[25/01/2002|00:43] C:\DOCUME~1\FRANOI~1\APPLIC~1\Mozilla
[10/09/2008|13:42] C:\DOCUME~1\FRANOI~1\APPLIC~1\MSNInstaller
[08/01/2002|11:15] C:\DOCUME~1\FRANOI~1\APPLIC~1\vlc
[02/01/2002|00:47] C:\DOCUME~1\LOCALS~1\APPLIC~1\Microsoft
[02/01/2002|00:47] C:\DOCUME~1\NETWOR~1\APPLIC~1\Microsoft
--------------------\\ Tâches planifiées dans C:\WINDOWS\tasks
[01/12/2008 21:00][--a------] C:\WINDOWS\tasks\toyyrwlg.job
[23/11/2008 23:35][--a------] C:\WINDOWS\tasks\WebReg 20081123233524.job
[01/12/2008 20:33][--ah-----] C:\WINDOWS\tasks\SA.DAT
[05/08/2004 13:00][-r-h-----] C:\WINDOWS\tasks\desktop.ini
--------------------\\ Listing des dossiers dans C:\Program Files
[06/10/2008|09:13] C:\Program Files\Adobe
[25/01/2002|00:31] C:\Program Files\Alwil Software
[02/01/2002|00:44] C:\Program Files\ComPlus Applications
[01/12/2008|20:33] C:\Program Files\eMule
[01/12/2008|19:00] C:\Program Files\Everest Poker
[19/10/2008|17:06] C:\Program Files\Fichiers communs
[23/11/2008|22:27] C:\Program Files\Hewlett-Packard
[23/11/2008|22:24] C:\Program Files\HP
[13/10/2008|15:06] C:\Program Files\InstallShield Installation Information
[19/10/2008|17:12] C:\Program Files\Internet Explorer
[23/01/2002|22:43] C:\Program Files\Inventel
[21/09/2008|17:09] C:\Program Files\Messenger
[19/10/2008|16:58] C:\Program Files\Messenger Plus! Live
[19/10/2008|17:10] C:\Program Files\Microsoft
[27/09/2008|18:24] C:\Program Files\Microsoft CAPICOM 2.1.0.2
[02/01/2002|00:47] C:\Program Files\microsoft frontpage
[19/10/2008|17:11] C:\Program Files\Microsoft SQL Server Compact Edition
[21/09/2008|17:06] C:\Program Files\Movie Maker
[01/12/2008|20:35] C:\Program Files\Mozilla Firefox
[10/09/2008|13:41] C:\Program Files\MSN
[02/01/2002|00:43] C:\Program Files\MSN Gaming Zone
[24/11/2008|23:06] C:\Program Files\MSXML 4.0
[01/12/2008|21:10] C:\Program Files\Navilog1
[21/09/2008|17:04] C:\Program Files\NetMeeting
[02/01/2002|00:43] C:\Program Files\Online Services
[15/09/2008|19:04] C:\Program Files\Orange
[21/09/2008|17:04] C:\Program Files\Outlook Express
[19/09/2008|07:54] C:\Program Files\PhotoFiltre
[23/01/2002|22:43] C:\Program Files\Securitoo
[02/01/2002|00:45] C:\Program Files\Services en ligne
[02/01/2002|00:57] C:\Program Files\Uninstall Information
[08/01/2002|11:14] C:\Program Files\VideoLAN
[19/10/2008|17:16] C:\Program Files\Windows Live
[21/09/2008|17:07] C:\Program Files\Windows Media Player
[21/09/2008|17:04] C:\Program Files\Windows NT
[02/01/2002|00:45] C:\Program Files\WindowsUpdate
[02/01/2002|00:47] C:\Program Files\xerox
--------------------\\ Listing des dossiers dans C:\Program Files\Fichiers communs
[25/10/2008|12:04] C:\Program Files\Fichiers communs\Adobe
[23/01/2002|22:56] C:\Program Files\Fichiers communs\France Telecom
[13/10/2008|14:27] C:\Program Files\Fichiers communs\InstallShield
[19/10/2008|17:10] C:\Program Files\Fichiers communs\Microsoft Shared
[02/01/2002|00:44] C:\Program Files\Fichiers communs\MSSoap
[02/01/2002|01:13] C:\Program Files\Fichiers communs\ODBC
[02/01/2002|00:44] C:\Program Files\Fichiers communs\Services
[02/01/2002|01:13] C:\Program Files\Fichiers communs\SpeechEngines
[21/09/2008|17:04] C:\Program Files\Fichiers communs\System
[19/10/2008|17:06] C:\Program Files\Fichiers communs\Windows Live
[09/09/2008|13:00] C:\Program Files\Fichiers communs\WindowsLiveInstaller
--------------------\\ Process
( 37 Processes )
... OK !
--------------------\\ Recherche avec S_Lop
Aucun fichier / dossier Lop trouvé !
--------------------\\ Recherche de Fichiers / Dossiers Lop
Aucun fichier / dossier Lop trouvé !
--------------------\\ Verification du Registre
..... OK !
--------------------\\ Verification du fichier Hosts
Fichier Hosts PROPRE
--------------------\\ Recherche de fichiers avec Catchme
catchme 0.3.1353 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2008-12-01 21:56:34
Windows 5.1.2600 Service Pack 3 NTFS
scanning hidden processes ...
scanning hidden files ...
scan completed successfully
hidden processes: 0
hidden files: 0
--------------------\\ Recherche d'autres infections
C:\WINDOWS\system32\EhQsttwa.ini
C:\WINDOWS\system32\EhQsttwa.ini2
C:\WINDOWS\system32\awttsQhE.dll
[b]==> VUNDO <==/b
[F:578][D:96]-> C:\DOCUME~1\FRANOI~1\LOCALS~1\Temp
[F:33][D:0]-> C:\DOCUME~1\FRANOI~1\Cookies
[F:407][D:8]-> C:\DOCUME~1\FRANOI~1\LOCALS~1\TEMPOR~1\content.IE5
1 - "C:\Lop SD\LopR_1.txt" - 01/12/2008|21:26 - Option : [1]
2 - "C:\Lop SD\LopR_2.txt" - 01/12/2008|21:59 - Option : [2]
--------------------\\ Fin du rapport a 21:59:18
--------------------\\ Lop S&D 4.2.4-9c XP/Vista
Microsoft Windows XP Édition familiale ( v5.1.2600 ) Service Pack 3
X86-based PC ( Uniprocessor Free : AMD Athlon(tm) )
BIOS : Phoenix - AwardBIOS v6.00PG
USER : François ( Administrator )
BOOT : Normal boot
Antivirus : avast! antivirus 4.8.1296 [VPS 081130-0] 4.8.1296 (Activated)
A:\ (USB)
C:\ (Local Disk) - NTFS - Total:114 Go (Free:95 Go)
D:\ (CD or DVD)
E:\ (CD or DVD) - CDFS - Total:0 Go (Free:0 Go)
"C:\Lop SD" ( MAJ : 01-11-2008|16:30 )
Option : [2] ( 01/12/2008|21:49 )
\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\ SUPPRESSION
Supprime! - C:\DOCUME~1\FRANOI~1\Cookies\françois@banner.cotedazurpalace[1].txt
Supprime! - C:\DOCUME~1\FRANOI~1\Cookies\françois@banner.32vegas[1].txt
\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\
--------------------\\ Listing des dossiers dans APPLIC~1
[26/09/2008|15:55] C:\DOCUME~1\ALLUSE~1\APPLIC~1\Logitech
[19/10/2008|17:11] C:\DOCUME~1\ALLUSE~1\APPLIC~1\Microsoft
[09/09/2008|12:59] C:\DOCUME~1\ALLUSE~1\APPLIC~1\WLInstaller
[02/01/2002|00:47] C:\DOCUME~1\DEFAUL~1\APPLIC~1\Microsoft
[06/10/2008|09:13] C:\DOCUME~1\FRANOI~1\APPLIC~1\Adobe
[17/01/2002|14:37] C:\DOCUME~1\FRANOI~1\APPLIC~1\Help
[02/01/2002|00:57] C:\DOCUME~1\FRANOI~1\APPLIC~1\Identities
[06/10/2008|09:13] C:\DOCUME~1\FRANOI~1\APPLIC~1\InterTrust
[26/09/2008|15:57] C:\DOCUME~1\FRANOI~1\APPLIC~1\Leadertech
[23/01/2002|22:59] C:\DOCUME~1\FRANOI~1\APPLIC~1\Macromedia
[22/11/2008|19:41] C:\DOCUME~1\FRANOI~1\APPLIC~1\Microsoft
[25/01/2002|00:43] C:\DOCUME~1\FRANOI~1\APPLIC~1\Mozilla
[10/09/2008|13:42] C:\DOCUME~1\FRANOI~1\APPLIC~1\MSNInstaller
[08/01/2002|11:15] C:\DOCUME~1\FRANOI~1\APPLIC~1\vlc
[02/01/2002|00:47] C:\DOCUME~1\LOCALS~1\APPLIC~1\Microsoft
[02/01/2002|00:47] C:\DOCUME~1\NETWOR~1\APPLIC~1\Microsoft
--------------------\\ Tâches planifiées dans C:\WINDOWS\tasks
[01/12/2008 21:00][--a------] C:\WINDOWS\tasks\toyyrwlg.job
[23/11/2008 23:35][--a------] C:\WINDOWS\tasks\WebReg 20081123233524.job
[01/12/2008 20:33][--ah-----] C:\WINDOWS\tasks\SA.DAT
[05/08/2004 13:00][-r-h-----] C:\WINDOWS\tasks\desktop.ini
--------------------\\ Listing des dossiers dans C:\Program Files
[06/10/2008|09:13] C:\Program Files\Adobe
[25/01/2002|00:31] C:\Program Files\Alwil Software
[02/01/2002|00:44] C:\Program Files\ComPlus Applications
[01/12/2008|20:33] C:\Program Files\eMule
[01/12/2008|19:00] C:\Program Files\Everest Poker
[19/10/2008|17:06] C:\Program Files\Fichiers communs
[23/11/2008|22:27] C:\Program Files\Hewlett-Packard
[23/11/2008|22:24] C:\Program Files\HP
[13/10/2008|15:06] C:\Program Files\InstallShield Installation Information
[19/10/2008|17:12] C:\Program Files\Internet Explorer
[23/01/2002|22:43] C:\Program Files\Inventel
[21/09/2008|17:09] C:\Program Files\Messenger
[19/10/2008|16:58] C:\Program Files\Messenger Plus! Live
[19/10/2008|17:10] C:\Program Files\Microsoft
[27/09/2008|18:24] C:\Program Files\Microsoft CAPICOM 2.1.0.2
[02/01/2002|00:47] C:\Program Files\microsoft frontpage
[19/10/2008|17:11] C:\Program Files\Microsoft SQL Server Compact Edition
[21/09/2008|17:06] C:\Program Files\Movie Maker
[01/12/2008|20:35] C:\Program Files\Mozilla Firefox
[10/09/2008|13:41] C:\Program Files\MSN
[02/01/2002|00:43] C:\Program Files\MSN Gaming Zone
[24/11/2008|23:06] C:\Program Files\MSXML 4.0
[01/12/2008|21:10] C:\Program Files\Navilog1
[21/09/2008|17:04] C:\Program Files\NetMeeting
[02/01/2002|00:43] C:\Program Files\Online Services
[15/09/2008|19:04] C:\Program Files\Orange
[21/09/2008|17:04] C:\Program Files\Outlook Express
[19/09/2008|07:54] C:\Program Files\PhotoFiltre
[23/01/2002|22:43] C:\Program Files\Securitoo
[02/01/2002|00:45] C:\Program Files\Services en ligne
[02/01/2002|00:57] C:\Program Files\Uninstall Information
[08/01/2002|11:14] C:\Program Files\VideoLAN
[19/10/2008|17:16] C:\Program Files\Windows Live
[21/09/2008|17:07] C:\Program Files\Windows Media Player
[21/09/2008|17:04] C:\Program Files\Windows NT
[02/01/2002|00:45] C:\Program Files\WindowsUpdate
[02/01/2002|00:47] C:\Program Files\xerox
--------------------\\ Listing des dossiers dans C:\Program Files\Fichiers communs
[25/10/2008|12:04] C:\Program Files\Fichiers communs\Adobe
[23/01/2002|22:56] C:\Program Files\Fichiers communs\France Telecom
[13/10/2008|14:27] C:\Program Files\Fichiers communs\InstallShield
[19/10/2008|17:10] C:\Program Files\Fichiers communs\Microsoft Shared
[02/01/2002|00:44] C:\Program Files\Fichiers communs\MSSoap
[02/01/2002|01:13] C:\Program Files\Fichiers communs\ODBC
[02/01/2002|00:44] C:\Program Files\Fichiers communs\Services
[02/01/2002|01:13] C:\Program Files\Fichiers communs\SpeechEngines
[21/09/2008|17:04] C:\Program Files\Fichiers communs\System
[19/10/2008|17:06] C:\Program Files\Fichiers communs\Windows Live
[09/09/2008|13:00] C:\Program Files\Fichiers communs\WindowsLiveInstaller
--------------------\\ Process
( 37 Processes )
... OK !
--------------------\\ Recherche avec S_Lop
Aucun fichier / dossier Lop trouvé !
--------------------\\ Recherche de Fichiers / Dossiers Lop
Aucun fichier / dossier Lop trouvé !
--------------------\\ Verification du Registre
..... OK !
--------------------\\ Verification du fichier Hosts
Fichier Hosts PROPRE
--------------------\\ Recherche de fichiers avec Catchme
catchme 0.3.1353 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2008-12-01 21:56:34
Windows 5.1.2600 Service Pack 3 NTFS
scanning hidden processes ...
scanning hidden files ...
scan completed successfully
hidden processes: 0
hidden files: 0
--------------------\\ Recherche d'autres infections
C:\WINDOWS\system32\EhQsttwa.ini
C:\WINDOWS\system32\EhQsttwa.ini2
C:\WINDOWS\system32\awttsQhE.dll
[b]==> VUNDO <==/b
[F:578][D:96]-> C:\DOCUME~1\FRANOI~1\LOCALS~1\Temp
[F:33][D:0]-> C:\DOCUME~1\FRANOI~1\Cookies
[F:407][D:8]-> C:\DOCUME~1\FRANOI~1\LOCALS~1\TEMPOR~1\content.IE5
1 - "C:\Lop SD\LopR_1.txt" - 01/12/2008|21:26 - Option : [1]
2 - "C:\Lop SD\LopR_2.txt" - 01/12/2008|21:59 - Option : [2]
--------------------\\ Fin du rapport a 21:59:18
Voilà ce que ca me marque
VundoFix V7.0.6
Scan started at 22:14:49 01/12/2008
Listing files found while scanning....
No infected files were found.
VundoFix V7.0.6
Scan started at 22:14:49 01/12/2008
Listing files found while scanning....
No infected files were found.
Utilisateur anonyme
1 déc. 2008 à 22:53
1 déc. 2008 à 22:53
Hi,
-Télécharge et installe MalwareByte's Anti-Malware
Malwarebyte
- Mets le à jour
---
- Double clique sur le raccourci de MalwareByte's Anti-Malware qui est sur le bureau.
- Sélectionne Exécuter un examen complet si ce n'est pas déjà fait
- clique sur Rechercher
- Une fois le scan terminé, une fenêtre s'ouvre, clique sur sur Ok
- Si MalwareByte's n'a rien détecté, clique sur Ok Un rapport va apparaître ferme-le.
- Si MalwareByte's a détecté des infections, clique sur Afficher les résultats ensuite sur Supprimer la sélection
- Enregistre le rapport sur ton Bureau comme cela il sera plus facile à retrouver, poste ensuite ce rapport.
Note : Si MalwareByte's a besoin de redémarrer pour terminer la suppression, accepte en cliquant sur Ok
-Télécharge et installe MalwareByte's Anti-Malware
Malwarebyte
- Mets le à jour
---
- Double clique sur le raccourci de MalwareByte's Anti-Malware qui est sur le bureau.
- Sélectionne Exécuter un examen complet si ce n'est pas déjà fait
- clique sur Rechercher
- Une fois le scan terminé, une fenêtre s'ouvre, clique sur sur Ok
- Si MalwareByte's n'a rien détecté, clique sur Ok Un rapport va apparaître ferme-le.
- Si MalwareByte's a détecté des infections, clique sur Afficher les résultats ensuite sur Supprimer la sélection
- Enregistre le rapport sur ton Bureau comme cela il sera plus facile à retrouver, poste ensuite ce rapport.
Note : Si MalwareByte's a besoin de redémarrer pour terminer la suppression, accepte en cliquant sur Ok
Vous n’avez pas trouvé la réponse que vous recherchez ?
Posez votre question
Le voilà (merci pour ton aide, je tiens à te le répéter)
Malwarebytes' Anti-Malware 1.30
Version de la base de données: 1452
Windows 5.1.2600 Service Pack 3
03/12/2008 08:57:29
mbam-log-2008-12-03 (08-57-29).txt
Type de recherche: Examen complet (C:\|)
Eléments examinés: 70113
Temps écoulé: 22 minute(s), 41 second(s)
Processus mémoire infecté(s): 1
Module(s) mémoire infecté(s): 2
Clé(s) du Registre infectée(s): 14
Valeur(s) du Registre infectée(s): 2
Elément(s) de données du Registre infecté(s): 0
Dossier(s) infecté(s): 0
Fichier(s) infecté(s): 25
Processus mémoire infecté(s):
C:\WINDOWS\fxstaller.exe (Backdoor.Bot) -> Unloaded process successfully.
Module(s) mémoire infecté(s):
C:\WINDOWS\system32\nwjizs.dll (Trojan.Vundo.H) -> Delete on reboot.
C:\WINDOWS\system32\geBtUnoL.dll (Trojan.Vundo) -> Delete on reboot.
Clé(s) du Registre infectée(s):
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{a3deb21a-1dc2-4633-83de-27f58bbeb0e6} (Trojan.Vundo.H) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{a3deb21a-1dc2-4633-83de-27f58bbeb0e6} (Trojan.Vundo.H) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{6d794cb4-c7cd-4c6f-bfdc-9b77afbdc02c} (Trojan.BHO.H) -> Delete on reboot.
HKEY_CLASSES_ROOT\CLSID\{6d794cb4-c7cd-4c6f-bfdc-9b77afbdc02c} (Trojan.BHO.H) -> Delete on reboot.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{a3deb21a-1dc2-4633-83de-27f58bbeb0e6} (Trojan.Vundo.H) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{6d794cb4-c7cd-4c6f-bfdc-9b77afbdc02c} (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\gebtunol (Trojan.Vundo) -> Delete on reboot.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\MS Juan (Malware.Trace) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\contim (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\instkey (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\MS Track System (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\rdfa (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\FCOVM (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\RemoveRP (Trojan.Vundo) -> Quarantined and deleted successfully.
Valeur(s) du Registre infectée(s):
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\ShellExecuteHooks\{6d794cb4-c7cd-4c6f-bfdc-9b77afbdc02c} (Trojan.Vundo) -> Delete on reboot.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows UDP Control Center (Backdoor.Bot) -> Quarantined and deleted successfully.
Elément(s) de données du Registre infecté(s):
(Aucun élément nuisible détecté)
Dossier(s) infecté(s):
(Aucun élément nuisible détecté)
Fichier(s) infecté(s):
C:\WINDOWS\system32\nwjizs.dll (Trojan.Vundo.H) -> Delete on reboot.
C:\WINDOWS\system32\hxyalboh.dll (Trojan.Vundo.H) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\hoblayxh.ini (Trojan.Vundo.H) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\ypthwvdk.dll (Trojan.Vundo.H) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\kdvwhtpy.ini (Trojan.Vundo.H) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\geBtUnoL.dll (Trojan.BHO.H) -> Delete on reboot.
C:\WINDOWS\fxstaller.exe (Backdoor.Bot) -> Delete on reboot.
C:\System Volume Information\_restore{88B4A9CD-E8B5-4028-A531-93CF8C435590}\RP115\A0030422.com (Backdoor.Bot) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{88B4A9CD-E8B5-4028-A531-93CF8C435590}\RP115\A0032433.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{88B4A9CD-E8B5-4028-A531-93CF8C435590}\RP115\A0032434.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{88B4A9CD-E8B5-4028-A531-93CF8C435590}\RP116\A0032551.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{88B4A9CD-E8B5-4028-A531-93CF8C435590}\RP117\A0034567.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{88B4A9CD-E8B5-4028-A531-93CF8C435590}\RP117\A0034584.exe (Backdoor.Bot) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\plfwsxgn.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\vapffm.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\vyiyqv.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\bodbtxks.dll (Trojan.Vundo.H) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\glzkco.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\mbvrwyyq.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\xrlqmggx.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\ylnqycbt.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\qtyrhj.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\Documents and Settings\François\Local Settings\Temp\IXP000.TMP\burimi.exe (Backdoor.Bot) -> Quarantined and deleted successfully.
C:\Documents and Settings\François\Local Settings\Temporary Internet Files\Content.IE5\2N6NMJ6T\kb600179[1] (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\Documents and Settings\François\Local Settings\Temporary Internet Files\Content.IE5\SRA3IR09\index[1] (Trojan.Vundo.H) -> Quarantined and deleted successfully.
Malwarebytes' Anti-Malware 1.30
Version de la base de données: 1452
Windows 5.1.2600 Service Pack 3
03/12/2008 08:57:29
mbam-log-2008-12-03 (08-57-29).txt
Type de recherche: Examen complet (C:\|)
Eléments examinés: 70113
Temps écoulé: 22 minute(s), 41 second(s)
Processus mémoire infecté(s): 1
Module(s) mémoire infecté(s): 2
Clé(s) du Registre infectée(s): 14
Valeur(s) du Registre infectée(s): 2
Elément(s) de données du Registre infecté(s): 0
Dossier(s) infecté(s): 0
Fichier(s) infecté(s): 25
Processus mémoire infecté(s):
C:\WINDOWS\fxstaller.exe (Backdoor.Bot) -> Unloaded process successfully.
Module(s) mémoire infecté(s):
C:\WINDOWS\system32\nwjizs.dll (Trojan.Vundo.H) -> Delete on reboot.
C:\WINDOWS\system32\geBtUnoL.dll (Trojan.Vundo) -> Delete on reboot.
Clé(s) du Registre infectée(s):
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{a3deb21a-1dc2-4633-83de-27f58bbeb0e6} (Trojan.Vundo.H) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{a3deb21a-1dc2-4633-83de-27f58bbeb0e6} (Trojan.Vundo.H) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{6d794cb4-c7cd-4c6f-bfdc-9b77afbdc02c} (Trojan.BHO.H) -> Delete on reboot.
HKEY_CLASSES_ROOT\CLSID\{6d794cb4-c7cd-4c6f-bfdc-9b77afbdc02c} (Trojan.BHO.H) -> Delete on reboot.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{a3deb21a-1dc2-4633-83de-27f58bbeb0e6} (Trojan.Vundo.H) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{6d794cb4-c7cd-4c6f-bfdc-9b77afbdc02c} (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\gebtunol (Trojan.Vundo) -> Delete on reboot.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\MS Juan (Malware.Trace) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\contim (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\instkey (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\MS Track System (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\rdfa (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\FCOVM (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\RemoveRP (Trojan.Vundo) -> Quarantined and deleted successfully.
Valeur(s) du Registre infectée(s):
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\ShellExecuteHooks\{6d794cb4-c7cd-4c6f-bfdc-9b77afbdc02c} (Trojan.Vundo) -> Delete on reboot.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows UDP Control Center (Backdoor.Bot) -> Quarantined and deleted successfully.
Elément(s) de données du Registre infecté(s):
(Aucun élément nuisible détecté)
Dossier(s) infecté(s):
(Aucun élément nuisible détecté)
Fichier(s) infecté(s):
C:\WINDOWS\system32\nwjizs.dll (Trojan.Vundo.H) -> Delete on reboot.
C:\WINDOWS\system32\hxyalboh.dll (Trojan.Vundo.H) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\hoblayxh.ini (Trojan.Vundo.H) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\ypthwvdk.dll (Trojan.Vundo.H) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\kdvwhtpy.ini (Trojan.Vundo.H) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\geBtUnoL.dll (Trojan.BHO.H) -> Delete on reboot.
C:\WINDOWS\fxstaller.exe (Backdoor.Bot) -> Delete on reboot.
C:\System Volume Information\_restore{88B4A9CD-E8B5-4028-A531-93CF8C435590}\RP115\A0030422.com (Backdoor.Bot) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{88B4A9CD-E8B5-4028-A531-93CF8C435590}\RP115\A0032433.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{88B4A9CD-E8B5-4028-A531-93CF8C435590}\RP115\A0032434.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{88B4A9CD-E8B5-4028-A531-93CF8C435590}\RP116\A0032551.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{88B4A9CD-E8B5-4028-A531-93CF8C435590}\RP117\A0034567.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{88B4A9CD-E8B5-4028-A531-93CF8C435590}\RP117\A0034584.exe (Backdoor.Bot) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\plfwsxgn.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\vapffm.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\vyiyqv.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\bodbtxks.dll (Trojan.Vundo.H) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\glzkco.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\mbvrwyyq.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\xrlqmggx.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\ylnqycbt.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\qtyrhj.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\Documents and Settings\François\Local Settings\Temp\IXP000.TMP\burimi.exe (Backdoor.Bot) -> Quarantined and deleted successfully.
C:\Documents and Settings\François\Local Settings\Temporary Internet Files\Content.IE5\2N6NMJ6T\kb600179[1] (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\Documents and Settings\François\Local Settings\Temporary Internet Files\Content.IE5\SRA3IR09\index[1] (Trojan.Vundo.H) -> Quarantined and deleted successfully.