Analyse hijathis svp

lion72 Messages postés 260 Statut Membre -  
verni29 Messages postés 6805 Statut Contributeur sécurité -
Bonjour,

une analyse svp

Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 17:14:17, on 2008-12-18
Platform: Windows XP SP3 (WinNT 5.01.2600)
MSIE: Internet Explorer v7.00 (7.00.6000.16762)
Boot mode: Normal

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\Explorer.EXE
C:\Program Files\Alwil Software\Avast4\aswUpdSv.exe
C:\Program Files\Alwil Software\Avast4\ashServ.exe
C:\WINDOWS\system32\igfxtray.exe
C:\WINDOWS\system32\hkcmd.exe
C:\Program Files\Intel\NCS\PROSet\PRONoMgr.exe
C:\WINDOWS\Mixer.exe
C:\Program Files\Fichiers communs\Logitech\QCDriver3\LVCOMS.EXE
C:\Program Files\Logitech\ImageStudio\LogiTray.exe
C:\Program Files\Java\jre6\bin\jusched.exe
C:\WINDOWS\winsvc.exe
C:\Program Files\Fichiers communs\System\ragebot.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\Logitech\Desktop Messenger\8876480\Program\BackWeb-8876480.exe
C:\Program Files\Antivirus 2009\av2009.exe
C:\Program Files\SEC\Natural Color\NaturalColorLoad.exe
C:\WINDOWS\winssvc.exe
C:\WINDOWS\lsass32.exe
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\Java\jre6\bin\jqs.exe
C:\WINDOWS\system32\svchost.exe
C:\Program Files\Alwil Software\Avast4\ashMaiSv.exe
C:\Program Files\Alwil Software\Avast4\ashWebSv.exe
C:\WINDOWS\system32\wscntfy.exe
C:\WINDOWS\system32\wbem\wmiapsrv.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\rundll32.exe
C:\Program Files\Mozilla Firefox\firefox.exe
C:\Program Files\Trend Micro\HijackThis\HijackThis.exe

R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = https://www.msn.com/fr-fr/?ocid=iehp
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = https://www.msn.com/fr-fr/?ocid=iehp
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = https://www.bing.com/?toHttps=1&redig=5FC791212101479BAFBE1A679848B1AF
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = https://www.bing.com/?toHttps=1&redig=5FC791212101479BAFBE1A679848B1AF
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = https://www.msn.com/fr-fr/?ocid=iehp
R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyOverride = localhost
R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName = Liens
O2 - BHO: Adobe PDF Reader Link Helper - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Fichiers communs\Adobe\Acrobat\ActiveX\AcroIEHelper.dll
O2 - BHO: (no name) - {1D4FFA7F-8147-417D-AB2E-9DD49E468FC6} - (no file)
O2 - BHO: (no name) - {3E3E10E9-5C6D-468C-BA65-5EE14B37E462} - (no file)
O2 - BHO: (no name) - {56AA628E-3134-4ACF-A9EF-0E83385504F4} - C:\WINDOWS\system32\xxyaxVnL.dll
O2 - BHO: (no name) - {6D794CB4-C7CD-4c6f-BFDC-9B77AFBDC02C} - (no file)
O2 - BHO: Java(tm) Plug-In SSV Helper - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre6\bin\ssv.dll
O2 - BHO: (no name) - {809B39A0-729E-41F7-9EE5-5C765D1BA7D9} - (no file)
O2 - BHO: {97bbc39e-000e-bcc8-b8c4-9e17a0d74668} - {86647d0a-71e9-4c8b-8ccb-e000e93cbb79} - C:\WINDOWS\system32\kvvkio.dll
O2 - BHO: Programme d'aide de l'Assistant de connexion Windows Live - {9030D464-4C02-4ABF-8ECC-5164760863C6} - C:\Program Files\Fichiers communs\Microsoft Shared\Windows Live\WindowsLiveLogin.dll
O2 - BHO: (no name) - {b44e165f-547c-447a-b41a-b25da7f6e4ab} - (no file)
O2 - BHO: (no name) - {b844cbf9-8ffa-47b6-b0af-a3a96ddd6764} - (no file)
O2 - BHO: Java(tm) Plug-In 2 SSV Helper - {DBC80044-A445-435b-BC74-9C25C1C588A9} - C:\Program Files\Java\jre6\bin\jp2ssv.dll
O2 - BHO: (no name) - {eeff6aca-65fd-4a74-861a-11132ee77f47} - (no file)
O4 - HKLM\..\Run: [IgfxTray] C:\WINDOWS\system32\igfxtray.exe
O4 - HKLM\..\Run: [HotKeysCmds] C:\WINDOWS\system32\hkcmd.exe
O4 - HKLM\..\Run: [PRONoMgr.exe] c:\Program Files\Intel\NCS\PROSet\PRONoMgr.exe
O4 - HKLM\..\Run: [C-Media Mixer] Mixer.exe /startup
O4 - HKLM\..\Run: [RealTray] C:\Program Files\Real\RealPlayer\RealPlay.exe SYSTEMBOOTHIDEPLAYER
O4 - HKLM\..\Run: [LVCOMS] C:\Program Files\Fichiers communs\Logitech\QCDriver3\LVCOMS.EXE
O4 - HKLM\..\Run: [LogitechGalleryRepair] C:\Program Files\Logitech\ImageStudio\ISStart.exe
O4 - HKLM\..\Run: [LogitechImageStudioTray] C:\Program Files\Logitech\ImageStudio\LogiTray.exe
O4 - HKLM\..\Run: [SunJavaUpdateSched] "C:\Program Files\Java\jre6\bin\jusched.exe"
O4 - HKLM\..\Run: [NeroCheck] C:\WINDOWS\system32\\NeroCheck.exe
O4 - HKLM\..\Run: [KernelFaultCheck] %systemroot%\system32\dumprep 0 -k
O4 - HKLM\..\Run: [GOlive] C:\PROGRA~1\GOlive\GOlive.exe
O4 - HKLM\..\Run: [Adobe Reader Speed Launcher] "C:\Program Files\Adobe\Reader 9.0\Reader\Reader_sl.exe"
O4 - HKLM\..\Run: [winsvc] winsvc.exe
O4 - HKLM\..\Run: [Windows Update] C:\Program Files\Fichiers communs\System\ragebot.exe
O4 - HKLM\..\Run: [lsass32] lsass32.exe
O4 - HKLM\..\Run: [winssvc32] winssvc.exe
O4 - HKLM\..\RunServices: [mmsass] mldmm.exe
O4 - HKCU\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\ctfmon.exe
O4 - HKCU\..\Run: [LDM] C:\Program Files\Logitech\Desktop Messenger\8876480\Program\BackWeb-8876480.exe
O4 - HKCU\..\Run: [MsnMsgr] "C:\Program Files\Windows Live\Messenger\MsnMsgr.Exe" /background
O4 - HKCU\..\Run: [53207238708684754635881324200410] C:\Program Files\Antivirus 2009\av2009.exe
O4 - HKUS\S-1-5-19\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'SERVICE LOCAL')
O4 - HKUS\S-1-5-20\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'SERVICE RÉSEAU')
O4 - HKUS\S-1-5-18\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'SYSTEM')
O4 - HKUS\.DEFAULT\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'Default user')
O4 - Startup: NaturalColorLoad.lnk = ?
O4 - Global Startup: Logitech Desktop Messenger.lnk = C:\Program Files\Logitech\Desktop Messenger\8876480\Program\LDMConf.exe
O4 - Global Startup: NaturalColorLoad.lnk = ?
O8 - Extra context menu item: E&xporter vers Microsoft Excel - res://C:\PROGRA~1\MICROS~2\Office12\EXCEL.EXE/3000
O9 - Extra button: Ajout Direct - {219C3416-8CB2-491a-A3C7-D9FCDDC9D600} - C:\Program Files\Windows Live\Writer\WriterBrowserExtension.dll
O9 - Extra 'Tools' menuitem: &Ajout Direct dans Windows Live Writer - {219C3416-8CB2-491a-A3C7-D9FCDDC9D600} - C:\Program Files\Windows Live\Writer\WriterBrowserExtension.dll
O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~2\Office12\REFIEBAR.DLL
O9 - Extra button: Real.com - {CD67F990-D8E9-11d2-98FE-00C0F0318AFE} - C:\WINDOWS\system32\Shdocvw.dll
O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O16 - DPF: CabBuilder - http://kiw.imgag.com/imgag/kiw/toolbar/download/InstallerControl.cab
O16 - DPF: {05CA9FB0-3E3E-4B36-BF41-0E3A5CAA8CD8} (Office Genuine Advantage Validation Tool) - http://download.microsoft.com/download/C/B/F/CBF23A2C-3E55-4664-BC5C-762780D79BA0/OGAControl.cab
O16 - DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} (WUWebControl Class) - http://www.update.microsoft.com/...
O18 - Protocol: skype4com - {FFC8B962-9B40-4DFF-9458-1830C7DD7F5D} - C:\PROGRA~1\FICHIE~1\Skype\SKYPE4~1.DLL
O20 - AppInit_DLLs: kvvkio.dll
O20 - Winlogon Notify: pmnlLcdB - C:\WINDOWS\
O20 - Winlogon Notify: zdawxd - zdawxd.dll (file missing)
O23 - Service: avast! iAVS4 Control Service (aswUpdSv) - ALWIL Software - C:\Program Files\Alwil Software\Avast4\aswUpdSv.exe
O23 - Service: avast! Antivirus - ALWIL Software - C:\Program Files\Alwil Software\Avast4\ashServ.exe
O23 - Service: avast! Mail Scanner - ALWIL Software - C:\Program Files\Alwil Software\Avast4\ashMaiSv.exe
O23 - Service: avast! Web Scanner - ALWIL Software - C:\Program Files\Alwil Software\Avast4\ashWebSv.exe
O23 - Service: FCI - Unknown owner - C:\WINDOWS\system32\svchost.exe:ext.exe (file missing)
O23 - Service: ICF - Unknown owner - C:\WINDOWS\system32\svchost.exe:ext.exe (file missing)
O23 - Service: Java Quick Starter (JavaQuickStarterService) - Sun Microsystems, Inc. - C:\Program Files\Java\jre6\bin\jqs.exe
O23 - Service: Intel NCS NetService (NetSvc) - Intel(R) Corporation - c:\Program Files\Intel\NCS\Sync\NetSvc.exe
A voir également:

11 réponses

jacques.gache Messages postés 34829 Statut Contributeur sécurité 1 618
 
bonjour, tu es bien infecté pour moi tu as 3 infections différentes donc dans un premier temps on va s'occuper de Antivirus 2009 qui est un rogue tu passeras smitfraudfix et tu posteras le rapport , Merci

Ouvre ce lien (merci a S!RI pour ce programme). http://siri.urz.free.fr/Fix/SmitfraudFix.php

le mieux serait que tu désactives tes protections résidente "antivirus et anti-spyware"
le temps d'installer smitfraudfix et de faire l'analyse.


et télécharge SmitfraudFix.exe.

Regarde le tuto

Exécute le en choisissant l’option 1
il va générer un rapport

Copie/colle le sur le poste stp.

Process.exe est détecté par certains antivirus (AntiVir, Dr.Web, Kaspersky Anti-Virus, est...) comme étant un RiskTool. Il ne s'agit pas d'un virus, mais d'un utilitaire destiné à mettre fin à des processus. Mis entre de mauvaises mains, cet utilitaire pourrait arrêter des logiciels de sécurité (Antivirus, Firewall...) d'où l'alerte émise par ces antivirus.

une petites démo en vidéo :http://pagesperso-orange.fr/rginformatique/section%20virus/smitfraudfix.htm
2
verni29 Messages postés 6805 Statut Contributeur sécurité 180
 
Redémarre en mode sans échec :
Pour cela, tu tapotes la touche F8 à l’allumage du pc sans t’arrêter.

Une fenêtre va s’ouvrir. Choisis démarrer en mode sans échec puis tape entrée.
Choisis ton compte.

Relance le programme Smitfraud,
Pour cela, tu vas dans le dossier SmitFraudFix crée sur ton bureau et tu doubles-cliques sur SmitFraudFix.cmd.
Cette fois choisis l’option 2, répond oui a tous ;
Sauvegarde le rapport, Redémarre en mode normal,
copie/colle le rapport sauvegardé sur le forum.

Et poste un nouveau rapport Hijackthis.

A+
1
verni29 Messages postés 6805 Statut Contributeur sécurité 180
 
Bonjour, lion72,

Malwarebytes a fait du bon boulot.

Pour ton ami, tu lui diras de continuer sur la discussion actuelle.

1) Télécharges Random's System Information Tool (RSIT) de random/random et enregistre le sur ton Bureau.
http://images.malwareremoval.com/random/RSIT.exe

Déconnecte toi et ferme toutes tes applications en cours.

Double-clique sur " RSIT.exe " pour le lancer .
dans la fenêtre qui va s’ouvrir choisis 2 months pour l'option "List files/folders created ..." ,
cliques ensuite sur " Continue " pour lancer l'analyse ...

Si la dernière version de HijackThis n'est pas trouvée sur ton PC, RSIT la téléchargera et te demandera d'accepter la licence.

Attends jusqu’à la fin de l’analyse.
deux rapports vont être generés.

Poste le contenu de " log.txt ", ainsi que de " info.txt " ( dans la barre des tâches), pour analyse et attends la suite ...

Si tu ne les trouves pas,les rapports sont sauvegardés dans le dossier C:\rsit.

2) Tu vas télécharger ComBoFix et enregistre le sur ton bureau ( important pour la suite )
http://download.bleepingcomputer.com/sUBs/ComboFix.exe

On va installer la console de récupération pour pouvoir utiliser ComBoFix.
Tu as le SP3 d'installer sur ton PC.
Mais est-ce une édition familiale ou professionnelle ?

Choisis le lien suivant ta version de XP ( familiale ou professionnelle ) :

Windows XP Édition familiale
http://www.microsoft.com/downloads/details.aspx?FamilyId=15491F07-99F7-4A2D-983D-81C2137FF464&displaylang=fr
Windows XP Professionnel
http://www.microsoft.com/downloads/details.aspx?FamilyId=535D248D-5E10-49B5-B80C-0A0205368124&displaylang=fr

Télécharges la console sur ton bureau ( Important ).

déconnecte toi du net.
Désactive les protections résidentes de ton ordinateur ( antivirus, antispyware et parefeu )
Branche tes différents supports amovibles ( clés USB, disque dur externe ) sans les ouvrir.

Glisse/Dépose ce fichier sur l'icone de ComBoFix.
Regarde le lien suivant si tu ne sais pas ce qu'est un Glisser/Déposer
http://img.bleepingcomputer.com/combofix/usage/rc.gif

Ceci va lancer combofix et installer la console de récupération.
Accepte le contrat de licence.
Tu devrais avoir un message de confirmation de la bonne installation de la console.
Clique sur Oui pour continuer le scan.

Poste le rapport que tu auras obtenu.

A+
1
verni29 Messages postés 6805 Statut Contributeur sécurité 180
 
Bonsoir.

Plusieurs infections sur ton PC.

Commence par ceci.

tu télécharges smitfraudfix de S!Ri sur ton bureau
http://siri.urz.free.fr/Fix/SmitfraudFix.exe
Double clique sur l’exécutable. Il va crée un un dossier SmitFraudFix et lancer l’outil.

tu choisis l' option 1 .
Un rapport sera crée.
Copie/colle le rapport dans ton prochain message.

A+
0

Vous n’avez pas trouvé la réponse que vous recherchez ?

Posez votre question
lion72 Messages postés 260 Statut Membre 2
 
SmitFraudFix v2.387

Rapport fait à 17:28:38,28, 2008-12-18
Executé à partir de C:\Documents and Settings\Administrateur\Bureau\SmitfraudFix
OS: Microsoft Windows XP [version 5.1.2600] - Windows_NT
Le type du système de fichiers est NTFS
Fix executé en mode normal

»»»»»»»»»»»»»»»»»»»»»»»» Process

C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\Explorer.EXE
C:\Program Files\Alwil Software\Avast4\aswUpdSv.exe
C:\Program Files\Alwil Software\Avast4\ashServ.exe
C:\WINDOWS\system32\igfxtray.exe
C:\WINDOWS\system32\hkcmd.exe
C:\Program Files\Intel\NCS\PROSet\PRONoMgr.exe
C:\Program Files\Fichiers communs\Logitech\QCDriver3\LVCOMS.EXE
C:\Program Files\Java\jre6\bin\jusched.exe
C:\WINDOWS\winsvc.exe
C:\Program Files\Fichiers communs\System\ragebot.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\Logitech\Desktop Messenger\8876480\Program\BackWeb-8876480.exe
C:\Program Files\Antivirus 2009\av2009.exe
C:\Program Files\SEC\Natural Color\NaturalColorLoad.exe
C:\WINDOWS\winssvc.exe
C:\WINDOWS\lsass32.exe
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\Java\jre6\bin\jqs.exe
C:\WINDOWS\system32\svchost.exe
C:\Program Files\Alwil Software\Avast4\ashMaiSv.exe
C:\Program Files\Alwil Software\Avast4\ashWebSv.exe
C:\WINDOWS\system32\wscntfy.exe
C:\WINDOWS\system32\wbem\wmiapsrv.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\rundll32.exe
C:\Program Files\Mozilla Firefox\firefox.exe
C:\Documents and Settings\Administrateur\Bureau\SmitfraudFix\Policies.exe
C:\WINDOWS\system32\cmd.exe

»»»»»»»»»»»»»»»»»»»»»»»» hosts

»»»»»»»»»»»»»»»»»»»»»»»» C:\

»»»»»»»»»»»»»»»»»»»»»»»» C:\WINDOWS

»»»»»»»»»»»»»»»»»»»»»»»» C:\WINDOWS\system

»»»»»»»»»»»»»»»»»»»»»»»» C:\WINDOWS\Web

»»»»»»»»»»»»»»»»»»»»»»»» C:\WINDOWS\system32

C:\WINDOWS\system32\ieupdates.exe PRESENT !
C:\WINDOWS\system32\winsrc.dll PRESENT !

»»»»»»»»»»»»»»»»»»»»»»»» C:\WINDOWS\system32\LogFiles

»»»»»»»»»»»»»»»»»»»»»»»» C:\Documents and Settings\Administrateur

»»»»»»»»»»»»»»»»»»»»»»»» C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp

»»»»»»»»»»»»»»»»»»»»»»»» C:\Documents and Settings\Administrateur\Application Data

»»»»»»»»»»»»»»»»»»»»»»»» Menu Démarrer

»»»»»»»»»»»»»»»»»»»»»»»» C:\DOCUME~1\ADMINI~1\Favoris

»»»»»»»»»»»»»»»»»»»»»»»» Bureau

»»»»»»»»»»»»»»»»»»»»»»»» C:\Program Files

»»»»»»»»»»»»»»»»»»»»»»»» Clés corrompues

»»»»»»»»»»»»»»»»»»»»»»»» Eléments du bureau

[HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Desktop\Components\0]
"Source"="About:Home"
"SubscribedURL"="About:Home"
"FriendlyName"="Ma page d'accueil"

»»»»»»»»»»»»»»»»»»»»»»»» o4Patch
!!!Attention, les clés qui suivent ne sont pas forcément infectées!!!

o4Patch
Credits: Malware Analysis & Diagnostic
Code: S!Ri

»»»»»»»»»»»»»»»»»»»»»»»» IEDFix
!!!Attention, les clés qui suivent ne sont pas forcément infectées!!!

IEDFix
Credits: Malware Analysis & Diagnostic
Code: S!Ri

»»»»»»»»»»»»»»»»»»»»»»»» Agent.OMZ.Fix
!!!Attention, les clés qui suivent ne sont pas forcément infectées!!!

Agent.OMZ.Fix
Credits: Malware Analysis & Diagnostic
Code: S!Ri

»»»»»»»»»»»»»»»»»»»»»»»» VACFix
!!!Attention, les clés qui suivent ne sont pas forcément infectées!!!

VACFix
Credits: Malware Analysis & Diagnostic
Code: S!Ri

»»»»»»»»»»»»»»»»»»»»»»»» 404Fix
!!!Attention, les clés qui suivent ne sont pas forcément infectées!!!

404Fix
Credits: Malware Analysis & Diagnostic
Code: S!Ri

»»»»»»»»»»»»»»»»»»»»»»»» Sharedtaskscheduler
!!!Attention, les clés qui suivent ne sont pas forcément infectées!!!

SrchSTS.exe by S!Ri
Search SharedTaskScheduler's .dll

»»»»»»»»»»»»»»»»»»»»»»»» AppInit_DLLs
!!!Attention, les clés qui suivent ne sont pas forcément infectées!!!

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows]
"AppInit_DLLs"="kvvkio.dll"

»»»»»»»»»»»»»»»»»»»»»»»» Winlogon
!!!Attention, les clés qui suivent ne sont pas forcément infectées!!!

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon]
"Userinit"="C:\\WINDOWS\\system32\\userinit.exe,"
"System"=""

»»»»»»»»»»»»»»»»»»»»»»»» RK

»»»»»»»»»»»»»»»»»»»»»»»» DNS

Description: Intel(R) PRO/100 VE Network Connection - Miniport d'ordonnancement de paquets
DNS Server Search Order: 192.168.0.1

HKLM\SYSTEM\CCS\Services\Tcpip\..\{373AB6D3-9D4E-4C3D-8387-11C76F37875A}: DhcpNameServer=192.168.0.1
HKLM\SYSTEM\CS2\Services\Tcpip\..\{373AB6D3-9D4E-4C3D-8387-11C76F37875A}: DhcpNameServer=192.168.0.1
HKLM\SYSTEM\CS3\Services\Tcpip\..\{373AB6D3-9D4E-4C3D-8387-11C76F37875A}: DhcpNameServer=24.200.241.37 24.201.245.77 24.200.243.189
HKLM\SYSTEM\CCS\Services\Tcpip\Parameters: DhcpNameServer=192.168.0.1
HKLM\SYSTEM\CS2\Services\Tcpip\Parameters: DhcpNameServer=192.168.0.1
HKLM\SYSTEM\CS3\Services\Tcpip\Parameters: DhcpNameServer=24.200.241.37 24.201.245.77 24.200.243.189

»»»»»»»»»»»»»»»»»»»»»»»» Recherche infection wininet.dll

»»»»»»»»»»»»»»»»»»»»»»»» Fin
0
lion72 Messages postés 260 Statut Membre 2
 
le rapport Smitfraud

SmitFraudFix v2.387

Rapport fait à 17:47:25,89, 2008-12-18
Executé à partir de C:\Documents and Settings\Administrateur\Bureau\SmitfraudFix
OS: Microsoft Windows XP [version 5.1.2600] - Windows_NT
Le type du système de fichiers est NTFS
Fix executé en mode sans echec

»»»»»»»»»»»»»»»»»»»»»»»» SharedTaskScheduler Avant SmitFraudFix
!!!Attention, les clés qui suivent ne sont pas forcément infectées!!!

SrchSTS.exe by S!Ri
Search SharedTaskScheduler's .dll

»»»»»»»»»»»»»»»»»»»»»»»» Arret des processus

»»»»»»»»»»»»»»»»»»»»»»»» hosts

127.0.0.1 localhost
127.0.0.1 www.007guard.com
127.0.0.1 007guard.com
127.0.0.1 008i.com
127.0.0.1 www.008k.com
127.0.0.1 008k.com
127.0.0.1 www.00hq.com
127.0.0.1 00hq.com
127.0.0.1 010402.com
127.0.0.1 www.032439.com
...

»»»»»»»»»»»»»»»»»»»»»»»» VACFix

VACFix
Credits: Malware Analysis & Diagnostic
Code: S!Ri

»»»»»»»»»»»»»»»»»»»»»»»» Winsock2 Fix

S!Ri's WS2Fix: LSP not Found.

»»»»»»»»»»»»»»»»»»»»»»»» Generic Renos Fix

GenericRenosFix by S!Ri

»»»»»»»»»»»»»»»»»»»»»»»» Suppression des fichiers infectés

C:\WINDOWS\system32\ieupdates.exe supprimé
C:\WINDOWS\system32\winsrc.dll supprimé

»»»»»»»»»»»»»»»»»»»»»»»» IEDFix

IEDFix
Credits: Malware Analysis & Diagnostic
Code: S!Ri

»»»»»»»»»»»»»»»»»»»»»»»» Agent.OMZ.Fix

Agent.OMZ.Fix
Credits: Malware Analysis & Diagnostic
Code: S!Ri

»»»»»»»»»»»»»»»»»»»»»»»» 404Fix

404Fix
Credits: Malware Analysis & Diagnostic
Code: S!Ri

»»»»»»»»»»»»»»»»»»»»»»»» RK

»»»»»»»»»»»»»»»»»»»»»»»» DNS

HKLM\SYSTEM\CCS\Services\Tcpip\..\{373AB6D3-9D4E-4C3D-8387-11C76F37875A}: DhcpNameServer=192.168.0.1
HKLM\SYSTEM\CS2\Services\Tcpip\..\{373AB6D3-9D4E-4C3D-8387-11C76F37875A}: DhcpNameServer=192.168.0.1
HKLM\SYSTEM\CS3\Services\Tcpip\..\{373AB6D3-9D4E-4C3D-8387-11C76F37875A}: DhcpNameServer=24.200.241.37 24.201.245.77 24.200.243.189
HKLM\SYSTEM\CCS\Services\Tcpip\Parameters: DhcpNameServer=192.168.0.1
HKLM\SYSTEM\CS2\Services\Tcpip\Parameters: DhcpNameServer=192.168.0.1
HKLM\SYSTEM\CS3\Services\Tcpip\Parameters: DhcpNameServer=24.200.241.37 24.201.245.77 24.200.243.189

»»»»»»»»»»»»»»»»»»»»»»»» Suppression Fichiers Temporaires

»»»»»»»»»»»»»»»»»»»»»»»» Winlogon.System
!!!Attention, les clés qui suivent ne sont pas forcément infectées!!!

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon]
"System"=""

»»»»»»»»»»»»»»»»»»»»»»»» Nettoyage du registre

Nettoyage terminé.

»»»»»»»»»»»»»»»»»»»»»»»» SharedTaskScheduler Après SmitFraudFix
!!!Attention, les clés qui suivent ne sont pas forcément infectées!!!

SrchSTS.exe by S!Ri
Search SharedTaskScheduler's .dll

»»»»»»»»»»»»»»»»»»»»»»»» Fin
0
lion72 Messages postés 260 Statut Membre 2
 
et le rapport hijackthis

Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 17:56:52, on 2008-12-18
Platform: Windows XP SP3 (WinNT 5.01.2600)
MSIE: Internet Explorer v7.00 (7.00.6000.16762)
Boot mode: Normal

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\Explorer.EXE
C:\Program Files\Alwil Software\Avast4\aswUpdSv.exe
C:\Program Files\Alwil Software\Avast4\ashServ.exe
C:\WINDOWS\system32\igfxtray.exe
C:\WINDOWS\system32\hkcmd.exe
C:\Program Files\Intel\NCS\PROSet\PRONoMgr.exe
C:\Program Files\Fichiers communs\Logitech\QCDriver3\LVCOMS.EXE
C:\Program Files\Java\jre6\bin\jusched.exe
C:\Program Files\Adobe\Reader 9.0\Reader\Reader_sl.exe
C:\Program Files\Fichiers communs\System\ragebot.exe
C:\WINDOWS\winsvc.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\Logitech\Desktop Messenger\8876480\Program\BackWeb-8876480.exe
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\SEC\Natural Color\NaturalColorLoad.exe
C:\WINDOWS\lsass32.exe
C:\WINDOWS\winssvc.exe
C:\Program Files\Java\jre6\bin\jqs.exe
C:\WINDOWS\system32\svchost.exe
C:\Program Files\Alwil Software\Avast4\ashMaiSv.exe
C:\Program Files\Alwil Software\Avast4\ashWebSv.exe
C:\WINDOWS\system32\wscntfy.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\wbem\wmiapsrv.exe
C:\Program Files\Mozilla Firefox\firefox.exe
C:\Program Files\Trend Micro\HijackThis\HijackThis.exe

R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyOverride = localhost
R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName = Liens
O2 - BHO: Adobe PDF Reader Link Helper - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Fichiers communs\Adobe\Acrobat\ActiveX\AcroIEHelper.dll
O2 - BHO: (no name) - {1D4FFA7F-8147-417D-AB2E-9DD49E468FC6} - (no file)
O2 - BHO: (no name) - {2F3FD7C9-C92C-45E6-9036-52B0F8D902D6} - C:\WINDOWS\system32\xxyaxVnL.dll
O2 - BHO: (no name) - {3E3E10E9-5C6D-468C-BA65-5EE14B37E462} - (no file)
O2 - BHO: (no name) - {6D794CB4-C7CD-4c6f-BFDC-9B77AFBDC02C} - (no file)
O2 - BHO: Java(tm) Plug-In SSV Helper - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre6\bin\ssv.dll
O2 - BHO: (no name) - {809B39A0-729E-41F7-9EE5-5C765D1BA7D9} - (no file)
O2 - BHO: {97bbc39e-000e-bcc8-b8c4-9e17a0d74668} - {86647d0a-71e9-4c8b-8ccb-e000e93cbb79} - C:\WINDOWS\system32\kvvkio.dll
O2 - BHO: Programme d'aide de l'Assistant de connexion Windows Live - {9030D464-4C02-4ABF-8ECC-5164760863C6} - C:\Program Files\Fichiers communs\Microsoft Shared\Windows Live\WindowsLiveLogin.dll
O2 - BHO: (no name) - {b44e165f-547c-447a-b41a-b25da7f6e4ab} - (no file)
O2 - BHO: (no name) - {b844cbf9-8ffa-47b6-b0af-a3a96ddd6764} - (no file)
O2 - BHO: Java(tm) Plug-In 2 SSV Helper - {DBC80044-A445-435b-BC74-9C25C1C588A9} - C:\Program Files\Java\jre6\bin\jp2ssv.dll
O2 - BHO: (no name) - {eeff6aca-65fd-4a74-861a-11132ee77f47} - (no file)
O4 - HKLM\..\Run: [IgfxTray] C:\WINDOWS\system32\igfxtray.exe
O4 - HKLM\..\Run: [HotKeysCmds] C:\WINDOWS\system32\hkcmd.exe
O4 - HKLM\..\Run: [PRONoMgr.exe] c:\Program Files\Intel\NCS\PROSet\PRONoMgr.exe
O4 - HKLM\..\Run: [C-Media Mixer] Mixer.exe /startup
O4 - HKLM\..\Run: [RealTray] C:\Program Files\Real\RealPlayer\RealPlay.exe SYSTEMBOOTHIDEPLAYER
O4 - HKLM\..\Run: [LVCOMS] C:\Program Files\Fichiers communs\Logitech\QCDriver3\LVCOMS.EXE
O4 - HKLM\..\Run: [LogitechGalleryRepair] C:\Program Files\Logitech\ImageStudio\ISStart.exe
O4 - HKLM\..\Run: [LogitechImageStudioTray] C:\Program Files\Logitech\ImageStudio\LogiTray.exe
O4 - HKLM\..\Run: [SunJavaUpdateSched] "C:\Program Files\Java\jre6\bin\jusched.exe"
O4 - HKLM\..\Run: [NeroCheck] C:\WINDOWS\system32\\NeroCheck.exe
O4 - HKLM\..\Run: [KernelFaultCheck] %systemroot%\system32\dumprep 0 -k
O4 - HKLM\..\Run: [GOlive] C:\PROGRA~1\GOlive\GOlive.exe
O4 - HKLM\..\Run: [Adobe Reader Speed Launcher] "C:\Program Files\Adobe\Reader 9.0\Reader\Reader_sl.exe"
O4 - HKLM\..\Run: [winsvc] winsvc.exe
O4 - HKLM\..\Run: [Windows Update] C:\Program Files\Fichiers communs\System\ragebot.exe
O4 - HKLM\..\Run: [lsass32] lsass32.exe
O4 - HKLM\..\Run: [winssvc32] winssvc.exe
O4 - HKLM\..\RunServices: [mmsass] mldmm.exe
O4 - HKCU\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\ctfmon.exe
O4 - HKCU\..\Run: [LDM] C:\Program Files\Logitech\Desktop Messenger\8876480\Program\BackWeb-8876480.exe
O4 - HKCU\..\Run: [MsnMsgr] "C:\Program Files\Windows Live\Messenger\MsnMsgr.Exe" /background
O4 - HKCU\..\Run: [53207238708684754635881324200410] C:\Program Files\Antivirus 2009\av2009.exe
O4 - HKUS\S-1-5-19\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'SERVICE LOCAL')
O4 - HKUS\S-1-5-20\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'SERVICE RÉSEAU')
O4 - HKUS\S-1-5-18\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'SYSTEM')
O4 - HKUS\.DEFAULT\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'Default user')
O4 - Startup: NaturalColorLoad.lnk = ?
O4 - Global Startup: Logitech Desktop Messenger.lnk = C:\Program Files\Logitech\Desktop Messenger\8876480\Program\LDMConf.exe
O4 - Global Startup: NaturalColorLoad.lnk = ?
O8 - Extra context menu item: E&xporter vers Microsoft Excel - res://C:\PROGRA~1\MICROS~2\Office12\EXCEL.EXE/3000
O9 - Extra button: Ajout Direct - {219C3416-8CB2-491a-A3C7-D9FCDDC9D600} - C:\Program Files\Windows Live\Writer\WriterBrowserExtension.dll
O9 - Extra 'Tools' menuitem: &Ajout Direct dans Windows Live Writer - {219C3416-8CB2-491a-A3C7-D9FCDDC9D600} - C:\Program Files\Windows Live\Writer\WriterBrowserExtension.dll
O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~2\Office12\REFIEBAR.DLL
O9 - Extra button: Real.com - {CD67F990-D8E9-11d2-98FE-00C0F0318AFE} - C:\WINDOWS\system32\Shdocvw.dll
O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O16 - DPF: CabBuilder - http://kiw.imgag.com/imgag/kiw/toolbar/download/InstallerControl.cab
O16 - DPF: {05CA9FB0-3E3E-4B36-BF41-0E3A5CAA8CD8} (Office Genuine Advantage Validation Tool) - http://download.microsoft.com/download/C/B/F/CBF23A2C-3E55-4664-BC5C-762780D79BA0/OGAControl.cab
O16 - DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} (WUWebControl Class) - http://www.update.microsoft.com/...
O18 - Protocol: skype4com - {FFC8B962-9B40-4DFF-9458-1830C7DD7F5D} - C:\PROGRA~1\FICHIE~1\Skype\SKYPE4~1.DLL
O20 - AppInit_DLLs: kvvkio.dll
O20 - Winlogon Notify: pmnlLcdB - C:\WINDOWS\
O20 - Winlogon Notify: zdawxd - zdawxd.dll (file missing)
O23 - Service: avast! iAVS4 Control Service (aswUpdSv) - ALWIL Software - C:\Program Files\Alwil Software\Avast4\aswUpdSv.exe
O23 - Service: avast! Antivirus - ALWIL Software - C:\Program Files\Alwil Software\Avast4\ashServ.exe
O23 - Service: avast! Mail Scanner - ALWIL Software - C:\Program Files\Alwil Software\Avast4\ashMaiSv.exe
O23 - Service: avast! Web Scanner - ALWIL Software - C:\Program Files\Alwil Software\Avast4\ashWebSv.exe
O23 - Service: FCI - Unknown owner - C:\WINDOWS\system32\svchost.exe:ext.exe (file missing)
O23 - Service: ICF - Unknown owner - C:\WINDOWS\system32\svchost.exe:ext.exe (file missing)
O23 - Service: Java Quick Starter (JavaQuickStarterService) - Sun Microsystems, Inc. - C:\Program Files\Java\jre6\bin\jqs.exe
O23 - Service: Intel NCS NetService (NetSvc) - Intel(R) Corporation - c:\Program Files\Intel\NCS\Sync\NetSvc.exe
0
verni29 Messages postés 6805 Statut Contributeur sécurité 180
 
1) Télécharge VirtumundoBegone sur le bureau:
http://secured2k.home.comcast.net/tools/VirtumundoBeGone.exe

Double clique sur VirtumundoBeGone.exe et suis les instructions.
Une fois terminé, redémarre l’ordinateur .

Copie/colle le contenu du rapport VBG.TXT créé sur le bureau.

2) Tu télécharges MalwareBytes.
http://www.malwarebytes.org/mbam/program/mbam-setup.exe

Tu l'installes. Choisis les options par défaut.
A la fin de l’installation, il te sera demandé de mettre à jour MalwareBytes et de l’éxecuter .
Accepte. Après la, mise à jour, le logiciel va s’ouvrir.

Dans l’onglet Recherche, sélectionne Exécuter un examen complet.
Clique sur recherche. Tu ne sélectionnes que les disques durs de l’ordinateur.
Clique sur lancer l’examen.

A la fin de la recherche, comme il est demandé, clique sur afficher les résultats.
Si des infections sont trouvées, clique sur Supprimer la sélection.
Tu postes le rapport dans ton prochain message.

Si tu ne retrouves pas le rapport, ouvre MalwareBytes et regarde dans l’onglet Rapport/logs. Il y est. Clique dessus et choisir ouvrir.

Le scan dure en moyenne 50 mn.

A+
0
lion72 Messages postés 260 Statut Membre 2
 
analyse VirtumundoBegone

[12/18/2008, 19:21:36] - VirtumundoBeGone v1.5 ( "C:\Documents and Settings\Administrateur\Bureau\VirtumundoBeGone.exe" )
[12/18/2008, 19:21:40] - Detected System Information:
[12/18/2008, 19:21:40] - Windows Version: 5.1.2600, Service Pack 3
[12/18/2008, 19:21:40] - Current Username: Administrateur (Admin)
[12/18/2008, 19:21:40] - Windows is in NORMAL mode.
[12/18/2008, 19:21:40] - Searching for Browser Helper Objects:
[12/18/2008, 19:21:41] - BHO 1: {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} (Adobe PDF Reader Link Helper)
[12/18/2008, 19:21:41] - BHO 2: {1D4FFA7F-8147-417D-AB2E-9DD49E468FC6} ()
[12/18/2008, 19:21:41] - WARNING: BHO has no default name. Checking for Winlogon reference.
[12/18/2008, 19:21:41] - No filename found. Continuing.
[12/18/2008, 19:21:41] - BHO 3: {2F3FD7C9-C92C-45E6-9036-52B0F8D902D6} ()
[12/18/2008, 19:21:41] - WARNING: BHO has no default name. Checking for Winlogon reference.
[12/18/2008, 19:21:41] - Checking for HKLM\...\Winlogon\Notify\xxyaxVnL
[12/18/2008, 19:21:41] - Key not found: HKLM\...\Winlogon\Notify\xxyaxVnL, continuing.
[12/18/2008, 19:21:41] - BHO 4: {3E3E10E9-5C6D-468C-BA65-5EE14B37E462} ()
[12/18/2008, 19:21:41] - WARNING: BHO has no default name. Checking for Winlogon reference.
[12/18/2008, 19:21:41] - No filename found. Continuing.
[12/18/2008, 19:21:41] - BHO 5: {6D794CB4-C7CD-4c6f-BFDC-9B77AFBDC02C} ()
[12/18/2008, 19:21:41] - WARNING: BHO has no default name. Checking for Winlogon reference.
[12/18/2008, 19:21:41] - No filename found. Continuing.
[12/18/2008, 19:21:41] - BHO 6: {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} (Java(tm) Plug-In SSV Helper)
[12/18/2008, 19:21:41] - BHO 7: {809B39A0-729E-41F7-9EE5-5C765D1BA7D9} ()
[12/18/2008, 19:21:41] - WARNING: BHO has no default name. Checking for Winlogon reference.
[12/18/2008, 19:21:41] - No filename found. Continuing.
[12/18/2008, 19:21:41] - BHO 8: {86647d0a-71e9-4c8b-8ccb-e000e93cbb79} ()
[12/18/2008, 19:21:41] - WARNING: BHO has no default name. Checking for Winlogon reference.
[12/18/2008, 19:21:41] - Checking for HKLM\...\Winlogon\Notify\kvvkio
[12/18/2008, 19:21:41] - Key not found: HKLM\...\Winlogon\Notify\kvvkio, continuing.
[12/18/2008, 19:21:41] - BHO 9: {9030D464-4C02-4ABF-8ECC-5164760863C6} (Programme d'aide de l'Assistant de connexion Windows Live)
[12/18/2008, 19:21:41] - BHO 10: {b44e165f-547c-447a-b41a-b25da7f6e4ab} ()
[12/18/2008, 19:21:41] - WARNING: BHO has no default name. Checking for Winlogon reference.
[12/18/2008, 19:21:41] - No filename found. Continuing.
[12/18/2008, 19:21:41] - BHO 11: {b844cbf9-8ffa-47b6-b0af-a3a96ddd6764} ()
[12/18/2008, 19:21:41] - WARNING: BHO has no default name. Checking for Winlogon reference.
[12/18/2008, 19:21:41] - No filename found. Continuing.
[12/18/2008, 19:21:41] - BHO 12: {DBC80044-A445-435b-BC74-9C25C1C588A9} (Java(tm) Plug-In 2 SSV Helper)
[12/18/2008, 19:21:41] - BHO 13: {eeff6aca-65fd-4a74-861a-11132ee77f47} ()
[12/18/2008, 19:21:41] - WARNING: BHO has no default name. Checking for Winlogon reference.
[12/18/2008, 19:21:41] - No filename found. Continuing.
[12/18/2008, 19:21:41] - Finished Searching Browser Helper Objects
[12/18/2008, 19:21:41] - Finishing up...
[12/18/2008, 19:21:42] - Nothing found! Exiting...
0
lion72 Messages postés 260 Statut Membre 2
 
et voila le rapport malwarebyte's

Malwarebytes' Anti-Malware 1.31
Version de la base de données: 1517
Windows 5.1.2600 Service Pack 3

2008-12-18 20:20:10
mbam-log-2008-12-18 (20-20-10).txt

Type de recherche: Examen complet (C:\|D:\|)
Eléments examinés: 88411
Temps écoulé: 49 minute(s), 55 second(s)

Processus mémoire infecté(s): 2
Module(s) mémoire infecté(s): 2
Clé(s) du Registre infectée(s): 17
Valeur(s) du Registre infectée(s): 2
Elément(s) de données du Registre infecté(s): 2
Dossier(s) infecté(s): 1
Fichier(s) infecté(s): 125

Processus mémoire infecté(s):
C:\Program Files\Fichiers communs\System\ragebot.exe (Backdoor.Bot) -> Unloaded process successfully.
C:\WINDOWS\winsvc.exe (Backdoor.Bot) -> Unloaded process successfully.

Module(s) mémoire infecté(s):
C:\WINDOWS\system32\xxyaxVnL.dll (Trojan.Vundo.H) -> Delete on reboot.
C:\WINDOWS\system32\kvvkio.dll (Trojan.Vundo) -> Delete on reboot.

Clé(s) du Registre infectée(s):
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{2f3fd7c9-c92c-45e6-9036-52b0f8d902d6} (Trojan.Vundo.H) -> Delete on reboot.
HKEY_CLASSES_ROOT\CLSID\{2f3fd7c9-c92c-45e6-9036-52b0f8d902d6} (Trojan.Vundo.H) -> Delete on reboot.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{86647d0a-71e9-4c8b-8ccb-e000e93cbb79} (Trojan.Vundo.H) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{86647d0a-71e9-4c8b-8ccb-e000e93cbb79} (Trojan.Vundo.H) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{86647d0a-71e9-4c8b-8ccb-e000e93cbb79} (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{6d794cb4-c7cd-4c6f-bfdc-9b77afbdc02c} (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{6d794cb4-c7cd-4c6f-bfdc-9b77afbdc02c} (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\fci (Rootkit.Agent) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\MediaHoldings (Adware.PlayMP3Z) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\MS Juan (Malware.Trace) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\contim (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\instkey (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\MS Track System (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\rdfa (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\FCOVM (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\RemoveRP (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\ICF (Rootkit.Agent) -> Quarantined and deleted successfully.

Valeur(s) du Registre infectée(s):
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\windows update (Backdoor.Bot) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunServices\mmsass (Backdoor.Bot) -> Quarantined and deleted successfully.

Elément(s) de données du Registre infecté(s):
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\LSA\Notification Packages (Trojan.Vundo.H) -> Data: c:\windows\system32\xxyaxvnl -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\LSA\Authentication Packages (Trojan.Vundo) -> Data: c:\windows\system32\xxyaxvnl -> Delete on reboot.

Dossier(s) infecté(s):
C:\Program Files\Antivirus 2009 (Rogue.Antivirus 2009) -> Quarantined and deleted successfully.

Fichier(s) infecté(s):
C:\WINDOWS\system32\xxyaxVnL.dll (Trojan.Vundo.H) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\LnVxayxx.ini (Trojan.Vundo.H) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\LnVxayxx.ini2 (Trojan.Vundo.H) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\kvvkio.dll (Trojan.Vundo.H) -> Delete on reboot.
C:\WINDOWS\system32\bcijloyp.dll (Trojan.Vundo.H) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\pyoljicb.ini (Trojan.Vundo.H) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\eykrmswq.dll (Trojan.Vundo.H) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\qwsmrkye.ini (Trojan.Vundo.H) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\xjbhjdso.dll (Trojan.Vundo.H) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\osdjhbjx.ini (Trojan.Vundo.H) -> Quarantined and deleted successfully.
C:\Program Files\Fichiers communs\System\ragebot.exe (Backdoor.Bot) -> Quarantined and deleted successfully.
C:\WINDOWS\winsvc.exe (Backdoor.Bot) -> Quarantined and deleted successfully.
C:\img.MSNFix (Backdoor.Bot) -> Quarantined and deleted successfully.
C:\msnpwstlr.exe (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Program Files\MSNFix\backup\img.exe (Backdoor.Bot) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{33A2C446-9AC2-46D5-AB1F-78F516A9AA7F}\RP322\A0048460.dll (Trojan.FakeAlert) -> Delete on reboot.
C:\System Volume Information\_restore{33A2C446-9AC2-46D5-AB1F-78F516A9AA7F}\RP322\A0048461.dll (Trojan.FakeAlert) -> Delete on reboot.
C:\System Volume Information\_restore{33A2C446-9AC2-46D5-AB1F-78F516A9AA7F}\RP322\A0048518.sys (Rootkit.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\mssi.exe (Backdoor.Bot) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\ajawls.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\byXNhFWm.dll (Trojan.Vundo) -> Delete on reboot.
C:\WINDOWS\system32\byXoOiFu.dll (Trojan.Vundo) -> Delete on reboot.
C:\WINDOWS\system32\byXPfcBS.dll (Trojan.Vundo) -> Delete on reboot.
C:\WINDOWS\system32\byXQGVpO.dll (Trojan.Vundo) -> Delete on reboot.
C:\WINDOWS\system32\cbXNFxuv.dll (Trojan.Vundo) -> Delete on reboot.
C:\WINDOWS\system32\cbXNGyWm.dll (Trojan.Vundo) -> Delete on reboot.
C:\WINDOWS\system32\cbXOFusS.dll (Trojan.Vundo) -> Delete on reboot.
C:\WINDOWS\system32\cbXPhhhE.dll (Trojan.Vundo) -> Delete on reboot.
C:\WINDOWS\system32\cbXRLbCv.dll (Trojan.Vundo) -> Delete on reboot.
C:\WINDOWS\system32\dabfsn.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\ddcAqPge.dll (Trojan.Vundo) -> Delete on reboot.
C:\WINDOWS\system32\ddcDuRIa.dll (Trojan.Vundo) -> Delete on reboot.
C:\WINDOWS\system32\ddcyvSlM.dll (Trojan.Vundo) -> Delete on reboot.
C:\WINDOWS\system32\djmpmhsn.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\fcccyXNG.dll (Trojan.Vundo) -> Delete on reboot.
C:\WINDOWS\system32\fcccyYsR.dll (Trojan.Vundo) -> Delete on reboot.
C:\WINDOWS\system32\fccddDvV.dll (Trojan.Vundo) -> Delete on reboot.
C:\WINDOWS\system32\opnlLCVl.dll (Trojan.Vundo) -> Delete on reboot.
C:\WINDOWS\system32\opnnlmMg.dll (Trojan.Vundo) -> Delete on reboot.
C:\WINDOWS\system32\lJAtRIYR.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\ljJATmND.dll (Trojan.Vundo) -> Delete on reboot.
C:\WINDOWS\system32\ljJCspnN.dll (Trojan.Vundo) -> Delete on reboot.
C:\WINDOWS\system32\nnnMcYop.dll (Trojan.Vundo) -> Delete on reboot.
C:\WINDOWS\system32\nnnMDUMd.dll (Trojan.Vundo) -> Delete on reboot.
C:\WINDOWS\system32\nnnmjiGA.dll (Trojan.Vundo) -> Delete on reboot.
C:\WINDOWS\system32\nnnmkKAR.dll (Trojan.Vundo) -> Delete on reboot.
C:\WINDOWS\system32\nnnmnlKe.dll (Trojan.Vundo) -> Delete on reboot.
C:\WINDOWS\system32\nnnnLcCv.dll (Trojan.Vundo) -> Delete on reboot.
C:\WINDOWS\system32\nnnonMgg.dll (Trojan.Vundo) -> Delete on reboot.
C:\WINDOWS\system32\pkjmowjy.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\pmnKeBTn.dll (Trojan.Vundo) -> Delete on reboot.
C:\WINDOWS\system32\pmnKeeBT.dll (Trojan.Vundo) -> Delete on reboot.
C:\WINDOWS\system32\pmnmNHYR.dll (Trojan.Vundo) -> Delete on reboot.
C:\WINDOWS\system32\pmnNGaxu.dll (Trojan.Vundo) -> Delete on reboot.
C:\WINDOWS\system32\pmnnNheF.dll (Trojan.Vundo) -> Delete on reboot.
C:\WINDOWS\system32\pmnoPFXp.dll (Trojan.Vundo) -> Delete on reboot.
C:\WINDOWS\system32\ssqOICVl.dll (Trojan.Vundo) -> Delete on reboot.
C:\WINDOWS\system32\ssqRjiJd.dll (Trojan.Vundo) -> Delete on reboot.
C:\WINDOWS\system32\ssqRLcAq.dll (Trojan.Vundo) -> Delete on reboot.
C:\WINDOWS\system32\tuvTjIba.dll (Trojan.Vundo) -> Delete on reboot.
C:\WINDOWS\system32\tuvtqRii.dll (Trojan.Vundo) -> Delete on reboot.
C:\WINDOWS\system32\tuvtRKdA.dll (Trojan.Vundo) -> Delete on reboot.
C:\WINDOWS\system32\vtUlJCVp.dll (Trojan.Vundo) -> Delete on reboot.
C:\WINDOWS\system32\geBrpoLF.dll (Trojan.Vundo) -> Delete on reboot.
C:\WINDOWS\system32\geBsqQJc.dll (Trojan.Vundo) -> Delete on reboot.
C:\WINDOWS\system32\geBsrstT.dll (Trojan.Vundo) -> Delete on reboot.
C:\WINDOWS\system32\geBtRLcY.dll (Trojan.Vundo) -> Delete on reboot.
C:\WINDOWS\system32\geBtTkhE.dll (Trojan.Vundo) -> Delete on reboot.
C:\WINDOWS\system32\geBUooOI.dll (Trojan.Vundo) -> Delete on reboot.
C:\WINDOWS\system32\geBuSJyX.dll (Trojan.Vundo) -> Delete on reboot.
C:\WINDOWS\system32\awtrPijI.dll (Trojan.Vundo) -> Delete on reboot.
C:\WINDOWS\system32\awtsQJYp.dll (Trojan.Vundo) -> Delete on reboot.
C:\WINDOWS\system32\awtsTjIb.dll (Trojan.Vundo) -> Delete on reboot.
C:\WINDOWS\system32\awttrqpm.dll (Trojan.Vundo) -> Delete on reboot.
C:\WINDOWS\system32\awttsRIa.dll (Trojan.Vundo) -> Delete on reboot.
C:\WINDOWS\system32\awtuuTkK.dll (Trojan.Vundo) -> Delete on reboot.
C:\WINDOWS\system32\awtuvSki.dll (Trojan.Vundo) -> Delete on reboot.
C:\WINDOWS\system32\efcyvuUL.dll (Trojan.Vundo) -> Delete on reboot.
C:\WINDOWS\system32\gqwxyn.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\hgGawXoO.dll (Trojan.Vundo) -> Delete on reboot.
C:\WINDOWS\system32\hgGayvwx.dll (Trojan.Vundo) -> Delete on reboot.
C:\WINDOWS\system32\hgGvwtqR.dll (Trojan.Vundo) -> Delete on reboot.
C:\WINDOWS\system32\hgGxWpPj.dll (Trojan.Vundo) -> Delete on reboot.
C:\WINDOWS\system32\hgGyyvuS.dll (Trojan.Vundo) -> Delete on reboot.
C:\WINDOWS\system32\loqqbbyq.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\mlJBTlKa.dll (Trojan.Vundo) -> Delete on reboot.
C:\WINDOWS\system32\mlJCSjkl.dll (Trojan.Vundo) -> Delete on reboot.
C:\WINDOWS\system32\mlJYpnOG.dll (Trojan.Vundo) -> Delete on reboot.
C:\WINDOWS\system32\prdbsaef.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\urqNEVom.dll (Trojan.Vundo) -> Delete on reboot.
C:\WINDOWS\system32\urqQjHaA.dll (Trojan.Vundo) -> Delete on reboot.
C:\WINDOWS\system32\urqRjIaB.dll (Trojan.Vundo) -> Delete on reboot.
C:\WINDOWS\system32\jkkJyArQ.dll (Trojan.Vundo) -> Delete on reboot.
C:\WINDOWS\system32\jkkKawus.dll (Trojan.Vundo) -> Delete on reboot.
C:\WINDOWS\system32\jkkLBtsq.dll (Trojan.Vundo) -> Delete on reboot.
C:\WINDOWS\system32\kHaabyXQ.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\iifdbBQj.dll (Trojan.Vundo) -> Delete on reboot.
C:\WINDOWS\system32\iifFUNFY.dll (Trojan.Vundo) -> Delete on reboot.
C:\WINDOWS\system32\iifFvVMg.dll (Trojan.Vundo) -> Delete on reboot.
C:\WINDOWS\system32\iifgDwXP.dll (Trojan.Vundo) -> Delete on reboot.
C:\WINDOWS\system32\iiuytk.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\kHayXQkj.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\wvUkHbxY.dll (Trojan.Vundo) -> Delete on reboot.
C:\WINDOWS\system32\wvULFWNE.dll (Trojan.Vundo) -> Delete on reboot.
C:\WINDOWS\system32\wvUMcYPh.dll (Trojan.Vundo) -> Delete on reboot.
C:\WINDOWS\system32\wvUnLEwV.dll (Trojan.Vundo) -> Delete on reboot.
C:\WINDOWS\system32\xxyWpQGW.dll (Trojan.Vundo) -> Delete on reboot.
C:\WINDOWS\system32\xxywWQgf.dll (Trojan.Vundo) -> Delete on reboot.
C:\WINDOWS\system32\xxyYoPge.dll (Trojan.Vundo) -> Delete on reboot.
C:\WINDOWS\system32\yaywwVol.dll (Trojan.Vundo) -> Delete on reboot.
C:\WINDOWS\system32\khfCvSJy.dll (Trojan.Vundo) -> Delete on reboot.
C:\WINDOWS\system32\khfeecCU.dll (Trojan.Vundo) -> Delete on reboot.
C:\WINDOWS\system32\khfEVPfg.dll (Trojan.Vundo) -> Delete on reboot.
C:\WINDOWS\system32\khfFwVpq.dll (Trojan.Vundo) -> Delete on reboot.
C:\WINDOWS\system32\khfGxWQj.dll (Trojan.Vundo) -> Delete on reboot.
C:\WINDOWS\system32\qoMCSlIx.dll (Trojan.Vundo) -> Delete on reboot.
C:\WINDOWS\system32\qoMfgGVo.dll (Trojan.Vundo) -> Delete on reboot.
C:\WINDOWS\system32\rqRHxuVo.dll (Trojan.Vundo) -> Delete on reboot.
C:\WINDOWS\system32\rqRjkHXn.dll (Trojan.Vundo) -> Delete on reboot.
C:\WINDOWS\system32\rqrOfdeb.dll (Trojan.Vundo) -> Delete on reboot.
C:\WINDOWS\system32\nauieexo.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\Temp\ofx22.tmp (Rootkit.Agent) -> Quarantined and deleted successfully.
C:\Program Files\Antivirus 2009\av2009.exe.vir (Rogue.Antivirus 2009) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\ieupdates.exe.tmp (Adware.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\Explorer32.exe (Backdoor.PoisonIvy) -> Quarantined and deleted successfully.
0
lion72 Messages postés 260 Statut Membre 2
 
voila les 2 analyse, moi je redonne l'ordi a mon ami, c'est lui qui va continuer le nettoyage,
son nom est okploide .

il devrait s'inscrire prochainement.
0