Forum Clubic

Fenetres qui s'ouvrent toute seule!

bonjour tout le monde, voila j’ai des fenetres de pub qui s’ouvrent toutes les 2 à 3 minutes j’ai effectué un scan avec kaspersky 2009 mais rien puis ccleaner rien non plus,!!! j’ai des fenetres qui s’ouvre toute seules pour me demander d’ installer un anti spyware !!! mon pc rame aussi !!! je ne sais plus quoi faire !!! quelqu’un pourrais m’aider?? merci d’avance!! voici le rapport hijackthis:

Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 16:16:15, on 05/11/2008
Platform: Windows XP SP3 (WinNT 5.01.2600)
MSIE: Internet Explorer v7.00 (7.00.6000.16705)
Boot mode: Normal

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\Explorer.EXE
C:\Program Files\Kaspersky Lab\Kaspersky Anti-Virus 2009\avp.exe
C:\Program Files\TOSHIBA\ConfigFree\CFSvcs.exe
C:\WINDOWS\eHome\ehRecvr.exe
C:\WINDOWS\eHome\ehSched.exe
C:\Program Files\Google\Common\Google Updater\GoogleUpdaterService.exe
C:\Program Files\Nero\Nero8\Nero BackItUp\NBService.exe
C:\WINDOWS\system32\nvsvc32.exe
C:\WINDOWS\system32\IoctlSvc.exe
C:\WINDOWS\system32\svchost.exe
C:\Program Files\Toshiba\TOSHIBA Applet\TAPPSRV.exe
C:\PROGRA~1\COMMON~1\X10\Common\x10nets.exe
C:\WINDOWS\ehome\ehtray.exe
C:\WINDOWS\system32\rundll32.exe
C:\WINDOWS\RTHDCPL.EXE
C:\WINDOWS\system32\rundll32.exe
C:\WINDOWS\AGRSMMSG.exe
C:\Program Files\TOSHIBA\ConfigFree\NDSTray.exe
C:\Program Files\TOSHIBA\Commandes TOSHIBA\TFncKy.exe
C:\WINDOWS\System32\DLA\DLACTRLW.EXE
C:\Program Files\Kaspersky Lab\Kaspersky Anti-Virus 2009\avp.exe
C:\WINDOWS\system32\rundll32.exe
C:\WINDOWS\system32\dllhost.exe
C:\WINDOWS\vsnpstd3.exe
C:\Program Files\Microsoft Office\Office12\GrooveMonitor.exe
C:\WINDOWS\system32\TPSBattM.exe
C:\WINDOWS\system32\wscntfy.exe
C:\Program Files\TOSHIBA\Tvs\TvsTray.exe
C:\Program Files\CyberLink\PowerDVD8\PDVD8Serv.exe
C:\WINDOWS\eHome\ehmsas.exe
C:\Program Files\Java\jre1.6.0_07\bin\jusched.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\Fichiers communs\Nero\Lib\NMIndexStoreSvr.exe
C:\Program Files\Pinnacle\Shared Files\Programs\StrmServer\StrmServer.exe
C:\Program Files\Fichiers communs\Nero\Lib\NMIndexingService.exe
C:\WINDOWS\System32\svchost.exe
C:\Program Files\Windows Live\Messenger\msnmsgr.exe
C:\Program Files\Windows Live\Messenger\usnsvc.exe
C:\WINDOWS\system32\rundll32.exe
C:\Program Files\Mozilla Firefox\firefox.exe
C:\Program Files\Trend Micro\HijackThis\HijackThis.exe

R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = www.google.fr…
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = www.01net.com…
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = go.microsoft.com…
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = go.microsoft.com…
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = www.01net.com…
R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName = Liens
O3 - Toolbar: Veoh Browser Plug-in - {D0943516-5076-4020-A3B5-AEFAF26AB263} - C:\Program Files\Veoh Networks\Veoh\Plugins\reg\VeohToolbar.dll
O3 - Toolbar: &Google - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - c:\program files\google\googletoolbar2.dll
O4 - HKLM…\Run: [ehTray] C:\WINDOWS\ehome\ehtray.exe
O4 - HKLM…\Run: [NvCplDaemon] RUNDLL32.EXE C:\WINDOWS\system32\NvCpl.dll,NvStartup
O4 - HKLM…\Run: [nwiz] nwiz.exe /installquiet /keeploaded /nodetect
O4 - HKLM…\Run: [NVRotateSysTray] rundll32.exe C:\WINDOWS\system32\nvsysrot.dll,Enable
O4 - HKLM…\Run: [RTHDCPL] RTHDCPL.EXE
O4 - HKLM…\Run: [Alcmtr] ALCMTR.EXE
O4 - HKLM…\Run: [AGRSMMSG] AGRSMMSG.exe
O4 - HKLM…\Run: [TPSMain] TPSMain.exe
O4 - HKLM…\Run: [NDSTray.exe] NDSTray.exe
O4 - HKLM…\Run: [TFncKy] TFncKy.exe
O4 - HKLM…\Run: [DLA] C:\WINDOWS\System32\DLA\DLACTRLW.EXE
O4 - HKLM…\Run: [AVP] “C:\Program Files\Kaspersky Lab\Kaspersky Anti-Virus 2009\avp.exe”
O4 - HKLM…\Run: [BluetoothAuthenticationAgent] rundll32.exe bthprops.cpl,BluetoothAuthenticationAgent
O4 - HKLM…\Run: [snpstd3] C:\WINDOWS\vsnpstd3.exe
O4 - HKLM…\Run: [GrooveMonitor] “C:\Program Files\Microsoft Office\Office12\GrooveMonitor.exe”
O4 - HKLM…\Run: [Tvs] C:\Program Files\TOSHIBA\Tvs\TvsTray.exe
O4 - HKLM…\Run: [QuickTime Task] “C:\Program Files\QuickTime\qttask.exe” -atboottime
O4 - HKLM…\Run: [RemoteControl8] “C:\Program Files\CyberLink\PowerDVD8\PDVD8Serv.exe”
O4 - HKLM…\Run: [PDVD8LanguageShortcut] “C:\Program Files\CyberLink\PowerDVD8\Language\Language.exe”
O4 - HKLM…\Run: [SunJavaUpdateSched] “C:\Program Files\Java\jre1.6.0_07\bin\jusched.exe”
O4 - HKLM…\Run: [70d8a259] rundll32.exe “C:\WINDOWS\system32\txaikdob.dll”,b
O4 - HKCU…\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
O4 - HKCU…\Run: [IndxStoreSvr_{79662E04-7C6C-4d9f-84C7-88D8A56B10AA}] “C:\Program Files\Fichiers communs\Nero\Lib\NMIndexStoreSvr.exe” ASO-616B5711-6DAE-4795-A05F-39A1E5104020
O4 - HKUS\S-1-5-19…\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User ‘SERVICE LOCAL’)
O4 - HKUS\S-1-5-20…\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User ‘SERVICE RÉSEAU’)
O4 - HKUS\S-1-5-18…\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User ‘SYSTEM’)
O4 - HKUS.DEFAULT…\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User ‘Default user’)
O4 - Startup: Adobe Gamma.lnk = C:\Program Files\Fichiers communs\Adobe\Calibration\Adobe Gamma Loader.exe
O4 - Startup: Rain.lnk = C:\Rain\Rain.exe
O4 - Global Startup: Pinnacle Streaming Server.lnk = C:\Program Files\Pinnacle\Shared Files\Programs\StrmServer\StrmServer.exe
O4 - Global Startup: Windows Desktop Search.lnk = C:\Program Files\Windows Desktop Search\WindowsSearch.exe
O8 - Extra context menu item: E&xporter vers Microsoft Excel - C:\PROGRA~1\MICROS~2\Office12\EXCEL.EXE…
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_07\bin\ssv.dll
O9 - Extra ‘Tools’ menuitem: Console Java (Sun) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_07\bin\ssv.dll
O9 - Extra button: Statistiques de la protection du trafic Internet - {1F460357-8A94-4D71-9CA3-AA4ACF32ED8E} - C:\Program Files\Kaspersky Lab\Kaspersky Anti-Virus 2009\SCIEPlgn.dll
O9 - Extra button: Envoyer à OneNote - {2670000A-7350-4f3c-8081-5663EE0C6C49} - C:\PROGRA~1\MICROS~2\Office12\ONBttnIE.dll
O9 - Extra ‘Tools’ menuitem: &Envoyer à OneNote - {2670000A-7350-4f3c-8081-5663EE0C6C49} - C:\PROGRA~1\MICROS~2\Office12\ONBttnIE.dll
O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~2\Office12\REFIEBAR.DLL
O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra ‘Tools’ menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra ‘Tools’ menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O14 - IERESET.INF: START_PAGE_URL=http://www.01net.com/telecharger/
O15 - Trusted Zone: www.secuser.com…
O16 - DPF: {74D05D43-3236-11D4-BDCD-00C04F9A3B61} (HouseCall Control) - a840.g.akamai.net…
O16 - DPF: {CF40ACC5-E1BB-4AFF-AC72-04C2F616BCA7} (get_atlcom Class) - wwwimages.adobe.com…
O16 - DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} (Shockwave Flash Object) - fpdownload2.macromedia.com…
O18 - Protocol: grooveLocalGWS - {88FED34C-F0CA-4636-A375-3CB6248B04CD} - C:\Program Files\Microsoft Office\Office12\GrooveSystemServices.dll
O18 - Protocol: skype4com - {FFC8B962-9B40-4DFF-9458-1830C7DD7F5D} - C:\PROGRA~1\FICHIE~1\Skype\SKYPE4~1.DLL
O20 - AppInit_DLLs: C:\PROGRA~1\KASPER~1\KASPER~1\mzvkbd.dll,C:\PROGRA~1\KASPER~1\KASPER~1\mzvkbd3.dll szsyih.dll
O23 - Service: Adobe LM Service - Adobe Systems - C:\Program Files\Fichiers communs\Adobe Systems Shared\Service\Adobelmsvc.exe
O23 - Service: Ati HotKey Poller - ATI Technologies Inc. - C:\WINDOWS\system32\Ati2evxx.exe
O23 - Service: Kaspersky Anti-Virus (AVP) - Kaspersky Lab - C:\Program Files\Kaspersky Lab\Kaspersky Anti-Virus 2009\avp.exe
O23 - Service: ConfigFree Service (CFSvcs) - TOSHIBA CORPORATION - C:\Program Files\TOSHIBA\ConfigFree\CFSvcs.exe
O23 - Service: getPlus® Helper - NOS Microsystems Ltd. - C:\Program Files\NOS\bin\getPlus_HelperSvc.exe
O23 - Service: Google Updater Service (gusvc) - Google - C:\Program Files\Google\Common\Google Updater\GoogleUpdaterService.exe
O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Fichiers communs\InstallShield\Driver\1150\Intel 32\IDriverT.exe
O23 - Service: MSCSPTISRV - Sony Corporation - C:\Program Files\Fichiers communs\Sony Shared\AVLib\MSCSPTISRV.exe
O23 - Service: Nero BackItUp Scheduler 3 - Nero AG - C:\Program Files\Nero\Nero8\Nero BackItUp\NBService.exe
O23 - Service: NMIndexingService - Nero AG - C:\Program Files\Fichiers communs\Nero\Lib\NMIndexingService.exe
O23 - Service: NVIDIA Display Driver Service (NVSvc) - NVIDIA Corporation - C:\WINDOWS\system32\nvsvc32.exe
O23 - Service: PACSPTISVR - Unknown owner - C:\Program Files\Fichiers communs\Sony Shared\AVLib\PACSPTISVR.exe
O23 - Service: PLFlash DeviceIoControl Service - Prolific Technology Inc. - C:\WINDOWS\system32\IoctlSvc.exe
O23 - Service: SiSoftware Deployment Agent Service (SandraAgentSrv) - SiSoftware - C:\Program Files\SiSoftware\SiSoftware Sandra Lite 2009\RpcAgentSrv.exe
O23 - Service: SonicStage Back-End Service - Sony Corporation - C:\Program Files\Fichiers communs\Sony Shared\AVLib\SsBeSvc.exe
O23 - Service: Sony SPTI Service (SPTISRV) - Sony Corporation - C:\Program Files\Fichiers communs\Sony Shared\AVLib\SPTISRV.exe
O23 - Service: SonicStage SCSI Service (SSScsiSV) - Sony Corporation - C:\Program Files\Fichiers communs\Sony Shared\AVLib\SSScsiSV.exe
O23 - Service: TOSHIBA Application Service (TAPPSRV) - TOSHIBA Corp. - C:\Program Files\Toshiba\TOSHIBA Applet\TAPPSRV.exe
O23 - Service: X10 Device Network Service (x10nets) - X10 - C:\PROGRA~1\COMMON~1\X10\Common\x10nets.exe


End of file - 10274 bytes

Salut

Dans hijackthis coche

Puis fait fixed checked

Desactive ton antivirus
Utilise [Navilog[/url] en mode 1 [url=http://guigui14100.web.officelive.com/tutorialnavilog.aspx]b[/b]](http://perso.orange.fr/il.mafioso/Navifix/Navilog1.exe)

merci guigui14100 j’ai suivi tes instructions voici le rapport de navilog en mode 1:

Search Navipromo version 3.6.8 commencé le 05/11/2008 à 18:50:09,28

!!! Attention,ce rapport peut indiquer des fichiers/programmes légitimes!!!
!!! Postez ce rapport sur le forum pour le faire analyser !!!
!!! Ne lancez pas la partie désinfection sans l’avis d’un spécialiste !!!

Outil exécuté depuis C:\Program Files\navilog1
Session actuelle : “LILIA”

Mise à jour le 03.11.2008 à 18h00 par IL-MAFIOSO

Microsoft Windows XP [version 5.1.2600]
Internet Explorer : 7.0.5730.11
Système de fichiers : NTFS

Recherche executé en mode normal

*** Recherche Programmes installés ***

*** Recherche dossiers dans “C:\WINDOWS” ***

*** Recherche dossiers dans “C:\Program Files” ***

*** Recherche dossiers dans “C:\Documents and Settings\All Users\menudm~1\progra~1” ***

*** Recherche dossiers dans “C:\Documents and Settings\All Users\menudm~1” ***

*** Recherche dossiers dans “c:\docume~1\alluse~1\applic~1” ***

*** Recherche dossiers dans “C:\Documents and Settings\LILIA\applic~1” ***

*** Recherche dossiers dans “C:\DOCUME~1\ADMINI~1\applic~1” ***

*** Recherche dossiers dans “C:\Documents and Settings\LILIA\locals~1\applic~1” ***

*** Recherche dossiers dans “C:\DOCUME~1\ADMINI~1\locals~1\applic~1” ***

*** Recherche dossiers dans “C:\Documents and Settings\LILIA\menudm~1\progra~1” ***

*** Recherche dossiers dans “C:\DOCUME~1\ADMINI~1\menudm~1\progra~1” ***

*** Recherche avec Catchme-rootkit/stealth malware detector par gmer ***
pour + d’infos : www.gmer.net…

*** Recherche avec GenericNaviSearch ***
!!! Tous ces résultats peuvent révéler des fichiers légitimes !!!
!!! A vérifier impérativement avant toute suppression manuelle !!!

  • Recherche dans “C:\WINDOWS\system32” *

  • Recherche dans “C:\Documents and Settings\LILIA\locals~1\applic~1” *

  • Recherche dans “C:\DOCUME~1\ADMINI~1\locals~1\applic~1” *

*** Recherche fichiers ***

*** Recherche clés spécifiques dans le Registre ***

*** Module de Recherche complémentaire ***
(Recherche fichiers spécifiques)

1)Recherche nouveaux fichiers Instant Access :

2)Recherche Heuristique :

  • Dans “C:\WINDOWS\system32” :

  • Dans “C:\Documents and Settings\LILIA\locals~1\applic~1” :

  • Dans “C:\DOCUME~1\ADMINI~1\locals~1\applic~1” :

3)Recherche Certificats :

Certificat Egroup absent !
Certificat Electronic-Group absent !
Certificat Montorgueil absent !
Certificat OOO-Favorit absent !
Certificat Sunny-Day-Design-Ltd absent !

4)Recherche fichiers connus :

C:\WINDOWS\system32\PrXwGfhk.ini2 trouvé ! infection Vundo possible non traitée par cet outil !

*** Analyse terminée le 05/11/2008 à 18:55:35,10 ***

A c’est pas l’infection que je penser, c’est une infection vundo…

Fait un scan complet avec [malwarebytes antimalware [/url], supprime les detections et post le rapport url=http://guigui14100.web.officelive.com/tutorialmbam.aspx](http://www.malwarebytes.org/mbam/program/mbam-setup.exe)

ok j’ai scanné avec malwarebytes antimalware voici le rapport merci :

Malwarebytes’ Anti-Malware 1.30
Version de la base de données: 1368
Windows 5.1.2600 Service Pack 3

05/11/2008 20:47:19
mbam-log-2008-11-05 (20-47-19).txt

Type de recherche: Examen complet (C:|D:|)
Eléments examinés: 139243
Temps écoulé: 45 minute(s), 59 second(s)

Processus mémoire infecté(s): 0
Module(s) mémoire infecté(s): 3
Clé(s) du Registre infectée(s): 13
Valeur(s) du Registre infectée(s): 1
Elément(s) de données du Registre infecté(s): 2
Dossier(s) infecté(s): 1
Fichier(s) infecté(s): 12

Processus mémoire infecté(s):
(Aucun élément nuisible détecté)

Module(s) mémoire infecté(s):
C:\WINDOWS\system32\khfGwXrP.dll (Trojan.Vundo.H) -> Delete on reboot.
C:\WINDOWS\system32\txaikdob.dll (Trojan.Vundo.H) -> Delete on reboot.
C:\WINDOWS\system32\rqRhIATl.dll (Trojan.Vundo) -> Delete on reboot.

Clé(s) du Registre infectée(s):
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects{f32821c0-4d98-415e-b9eb-466deaaf92e7} (Trojan.Vundo.H) -> Delete on reboot.
HKEY_CLASSES_ROOT\CLSID{f32821c0-4d98-415e-b9eb-466deaaf92e7} (Trojan.Vundo.H) -> Delete on reboot.
HKEY_CLASSES_ROOT\CLSID{7db094b1-c3aa-487c-b75e-cb9654e1a6b4} (Trojan.Vundo) -> Delete on reboot.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats{7db094b1-c3aa-487c-b75e-cb9654e1a6b4} (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects{7db094b1-c3aa-487c-b75e-cb9654e1a6b4} (Trojan.Vundo) -> Delete on reboot.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\rqrhiatl (Trojan.Vundo) -> Delete on reboot.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats{f32821c0-4d98-415e-b9eb-466deaaf92e7} (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\MS Juan (Malware.Trace) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\contim (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\MS Track System (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\rdfa (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\FCOVM (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\RemoveRP (Trojan.Vundo) -> Quarantined and deleted successfully.

Valeur(s) du Registre infectée(s):
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\ShellExecuteHooks{7db094b1-c3aa-487c-b75e-cb9654e1a6b4} (Trojan.Vundo) -> Delete on reboot.

Elément(s) de données du Registre infecté(s):
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\LSA\Notification Packages (Trojan.Vundo.H) -> Data: c:\windows\system32\khfgwxrp -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\LSA\Authentication Packages (Trojan.Vundo) -> Data: c:\windows\system32\khfgwxrp -> Quarantined and deleted successfully.

Dossier(s) infecté(s):
C:\WINDOWS\system32\drivers\downld (Trojan.Agent) -> Quarantined and deleted successfully.

Fichier(s) infecté(s):
C:\WINDOWS\system32\khfGwXrP.dll (Trojan.Vundo.H) -> Delete on reboot.
C:\WINDOWS\system32\PrXwGfhk.ini (Trojan.Vundo.H) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\PrXwGfhk.ini2 (Trojan.Vundo.H) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\icojawct.dll (Trojan.Vundo.H) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\tcwajoci.ini (Trojan.Vundo.H) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\txaikdob.dll (Trojan.Vundo.H) -> Delete on reboot.
C:\WINDOWS\system32\bodkiaxt.ini (Trojan.Vundo.H) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\rqRhIATl.dll (Trojan.Vundo) -> Delete on reboot.
C:\Documents and Settings\LILIA\Local Settings\Temporary Internet Files\Content.IE5\WVXDF3I4\upd105320[1] (Trojan.Vundo.H) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\brugsuwm.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\rrsbna.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\uRLfEtQg.dll (Trojan.Vundo) -> Quarantined and deleted successfully.

j’ai trouvé 32 éléments infectés, puis j’ai redémarré et relancer malwarebytes anti-malware qui a trouvé encore 2 éléments infectés que j’ai supprimé mais qui revienne a chaque fois quand je refais l’analyse voici le rapport:

Malwarebytes’ Anti-Malware 1.30
Version de la base de données: 1368
Windows 5.1.2600 Service Pack 3

05/11/2008 21:47:11
mbam-log-2008-11-05 (21-47-11).txt

Type de recherche: Examen rapide
Eléments examinés: 60824
Temps écoulé: 5 minute(s), 34 second(s)

Processus mémoire infecté(s): 0
Module(s) mémoire infecté(s): 0
Clé(s) du Registre infectée(s): 2
Valeur(s) du Registre infectée(s): 0
Elément(s) de données du Registre infecté(s): 0
Dossier(s) infecté(s): 0
Fichier(s) infecté(s): 0

Processus mémoire infecté(s):
(Aucun élément nuisible détecté)

Module(s) mémoire infecté(s):
(Aucun élément nuisible détecté)

Clé(s) du Registre infectée(s):
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\MS Juan (Malware.Trace) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\MS Track System (Trojan.Vundo) -> Quarantined and deleted successfully.

Valeur(s) du Registre infectée(s):
(Aucun élément nuisible détecté)

Elément(s) de données du Registre infecté(s):
(Aucun élément nuisible détecté)

Dossier(s) infecté(s):
(Aucun élément nuisible détecté)

Fichier(s) infecté(s):
(Aucun élément nuisible détecté)

Essaye de les supprimer en demarrant en mode sans échec

peux tu me dire stp comment supprimer ces éléments en mode sans échec?
ce sont ces 2 clés du registre qui sont encore infectés :

Clé(s) du Registre infectée(s):
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\MS Juan (Malware.Trace)
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\MS Track System (Trojan.Vundo)

merci.

Refait le scan MBAM en mode sans échec puis supprime les detections et redémarre en mode normal et lance le scan mbam de vérification…

Si sa reste je te dirait quoi faire :wink:

salut guigui aprés un scan en mode sans échec et un autre scan en mode normal avec MBAM , les 2 clés sont toujours infectés!!!

Lance Combofix, laisse travailler et post le rapport

voici le rapport de combofix merci:

ComboFix 08-11-05.02 - LILIA 2008-11-06 20:20:37.1 - NTFSx86
Microsoft Windows XP Professionnel 5.1.2600.3.1252.1.1036.18.514 [GMT 1:00]
Lancé depuis: c:\documents and settings\LILIA\Bureau\ComboFix.exe

  • Un nouveau point de restauration a été créé
    .

(((((((((((((((((((((((((((((((((((( Autres suppressions ))))))))))))))))))))))))))))))))))))))))))))))))
.

c:\documents and settings\Administrateur\Local Settings\Application Data\Microsoft\Windows Media\10.0\WMSDKNSD.XML
c:\windows\system32\cmtxga.dll
c:\windows\system32\fuuqfjyk.dll
c:\windows\system32\iwkaxvmf.ini
c:\windows\system32\kfeayjyl.dll
c:\windows\system32\lojbarwm.ini
c:\windows\system32\owxxjj.dll
c:\windows\system32\pafvytxb.ini
c:\windows\system32\szsyih.dll
c:\windows\system32\tjrrgsyi.dll
c:\windows\system32\vpcagv.dll
c:\windows\system32\ynuamwsy.dll

.
((((((((((((((((((((((((((((( Fichiers créés du 2008-10-06 au 2008-11-06 ))))))))))))))))))))))))))))))))))))
.

2008-11-06 09:28 . 2008-11-06 09:28 d-------- C:\VundoFix Backups
2008-11-05 19:56 . 2008-11-05 19:56 d-------- c:\program files\Malwarebytes’ Anti-Malware
2008-11-05 19:56 . 2008-11-05 19:56 d-------- c:\documents and settings\LILIA\Application Data\Malwarebytes
2008-11-05 19:56 . 2008-11-05 19:56 d-------- c:\documents and settings\All Users\Application Data\Malwarebytes
2008-11-05 19:56 . 2008-10-22 16:10 38,496 --a------ c:\windows\system32\drivers\mbamswissarmy.sys
2008-11-05 19:56 . 2008-10-22 16:10 15,504 --a------ c:\windows\system32\drivers\mbam.sys
2008-11-04 23:11 . 2008-11-04 23:11 d-------- c:\program files\Sun
2008-11-04 23:11 . 2008-06-10 02:32 73,728 --a------ c:\windows\system32\javacpl.cpl
2008-11-03 23:23 . 2008-11-03 23:23 d-------- c:\program files\Ihsv
2008-11-02 14:14 . 2008-11-02 14:14 d-------- c:\program files\Fichiers communs\CyberLink
2008-11-01 22:43 . 2008-11-01 22:43 d-------- c:\documents and settings\LILIA\Application Data\CyberLink
2008-11-01 22:42 . 2008-11-01 22:42 d-------- c:\documents and settings\All Users\Application Data\CyberLink
2008-11-01 22:41 . 2008-11-02 14:10 d-------- c:\program files\CyberLink
2008-11-01 22:41 . 2008-11-02 14:12 29,480 --a------ c:\windows\system32\msxml3a.dll
2008-11-01 22:40 . 2008-11-01 22:40 d-------- c:\documents and settings\All Users\Application Data\Temp
2008-10-31 10:43 . 2008-10-31 10:52 d-------- C:\MsgPlusDebug
2008-10-25 19:20 . 2008-10-25 20:49 d-------- c:\program files\TimeAdjuster
2008-10-22 23:11 . 2008-10-22 23:11 d-------- c:\program files\RayV
2008-10-21 20:12 . 2008-10-22 23:22 d-------- c:\program files\SLD Codec Pack
2008-10-21 19:47 . 2008-10-21 19:47 d-------- c:\windows\report
2008-10-21 19:47 . 2008-10-21 19:17 20,521,845 --a------ c:\windows\LPT$VPN.609
2008-10-21 19:17 . 2008-10-21 19:17 d-------- c:\windows\AU_Backup
2008-10-21 19:17 . 2008-10-21 19:17 1,968,443 --a------ c:\windows\tsc.ptn
2008-10-21 19:17 . 2008-10-21 19:17 1,213,784 --a------ c:\windows\vsapi32.dll
2008-10-21 19:17 . 2008-10-21 19:17 348,229 --a------ c:\windows\TSC.exe
2008-10-21 19:17 . 2008-10-21 19:17 91,744 --a------ c:\windows\BPMNT.dll
2008-10-21 19:17 . 2008-10-21 19:17 71,749 --a------ c:\windows\hcextoutput.dll
2008-10-21 19:17 . 2008-10-21 19:53 823 --a------ c:\windows\tsc.ini
2008-10-21 19:16 . 2008-10-21 19:17 d-------- c:\windows\AU_Temp
2008-10-21 19:16 . 2008-10-21 19:16 d-------- c:\windows\AU_Log
2008-10-21 19:16 . 2008-10-21 19:17 20,521,845 --a------ c:\windows\VPTNFILE.609
2008-10-21 19:16 . 2008-10-21 19:16 507,904 --a------ c:\windows\TMUPDATE.DLL
2008-10-21 19:16 . 2008-10-21 19:16 170 --a------ c:\windows\GetServer.ini
2008-10-21 19:15 . 2008-10-21 19:15 286,720 --a------ c:\windows\PATCH.EXE
2008-10-21 19:15 . 2008-10-21 19:15 69,689 --a------ c:\windows\UNZIP.DLL
2008-10-20 22:21 . 2008-08-14 14:23 2,191,232 -----c— c:\windows\system32\dllcache\ntoskrnl.exe
2008-10-20 22:21 . 2008-08-14 14:23 2,147,328 -----c— c:\windows\system32\dllcache\ntkrnlmp.exe
2008-10-20 22:21 . 2008-08-14 14:23 2,068,096 -----c— c:\windows\system32\dllcache\ntkrnlpa.exe
2008-10-20 22:21 . 2008-08-14 14:23 2,025,984 -----c— c:\windows\system32\dllcache\ntkrpamp.exe
2008-10-20 22:21 . 2008-09-08 11:41 333,824 -----c— c:\windows\system32\dllcache\srv.sys
2008-10-20 22:20 . 2008-09-15 16:26 1,846,528 -----c— c:\windows\system32\dllcache\win32k.sys
2008-10-19 13:25 . 2006-10-26 18:56 32,592 --a------ c:\windows\system32\msonpmon.dll
2008-10-19 13:20 . 2008-10-19 13:20 d-------- c:\program files\Microsoft Works
2008-10-19 13:18 . 2008-10-19 13:18 d-------- c:\program files\Microsoft.NET
2008-10-19 13:11 . 2008-10-19 13:11 d-------- c:\program files\Microsoft Visual Studio 8
2008-10-19 13:10 . 2008-10-20 22:30 d-------- c:\documents and settings\All Users\Application Data\Microsoft Help
2008-10-16 22:18 . 2008-10-16 22:18 d-------- c:\windows\system32\LogFiles
2008-10-16 22:18 . 2008-10-16 22:19 d-------- c:\windows\system32\drivers\UMDF
2008-10-16 22:15 . 2003-03-19 05:28 2,179,072 --------- c:\windows\system32\mfc71d.dll
2008-10-16 22:15 . 2003-03-19 04:04 765,952 --------- c:\windows\system32\msvcp71d.dll
2008-10-16 22:15 . 2002-01-05 20:16 737,280 --------- c:\windows\system32\msvcp70d.dll
2008-10-16 22:15 . 2003-03-19 04:03 544,768 --------- c:\windows\system32\msvcr71d.dll
2008-10-16 22:15 . 2002-01-05 20:16 536,576 --------- c:\windows\system32\msvcr70d.dll
2008-10-16 22:15 . 2004-06-03 11:47 385,100 --------- c:\windows\system32\MSVCRTD.DLL
2008-10-16 22:15 . 2007-10-18 11:59 201,488 --------- c:\windows\system32\MACD32.DLL
2008-10-16 22:15 . 2007-10-18 11:59 144,144 --------- c:\windows\system32\MASE32.DLL
2008-10-16 22:15 . 2007-10-18 11:59 141,584 --------- c:\windows\system32\MAMC32.DLL
2008-10-16 22:15 . 2007-10-18 11:59 63,248 --------- c:\windows\system32\MASD32.DLL
2008-10-16 22:15 . 2007-10-18 11:59 33,040 --------- c:\windows\system32\MA32.DLL
2008-10-16 22:13 . 2008-10-16 22:14 d-------- c:\program files\Pinnacle
2008-10-16 22:12 . 2008-10-16 22:12 d-------- c:\documents and settings\LILIA\Pinnacle
2008-10-15 22:35 . 2008-10-15 22:35 d-------- C:\Rain
2008-10-15 21:47 . 2008-10-15 21:47 4,484 --a------ c:\windows\system32\drivers\cpuidlep.sys
2008-10-14 08:46 . 2008-10-14 08:47 d-------- c:\program files\PDFCreator
2008-10-14 08:46 . 2004-03-09 00:00 662,288 --a------ c:\windows\system32\MSCOMCT2.OCX
2008-10-14 08:46 . 2001-10-28 16:42 116,224 --a------ c:\windows\system32\pdfcmnnt.dll
2008-10-14 08:46 . 1998-07-13 01:08 59,904 --a------ c:\windows\system32\MSCC2FR.DLL
2008-10-14 08:46 . 1998-07-06 00:00 23,552 --a------ c:\windows\system32\MSMPIDE.DLL
2008-10-13 21:23 . 2008-10-13 21:23 d-------- c:\program files\MSECache
2008-10-13 08:44 . 2008-10-13 08:44 d-------- c:\program files\K-Lite Codec Pack
2008-10-13 08:44 . 2008-07-04 07:34 860,160 --a------ c:\windows\system32\lameACM.acm
2008-10-13 08:44 . 2004-01-25 17:18 217,088 --a------ c:\windows\system32\yv12vfw.dll
2008-10-13 08:44 . 2007-09-04 17:56 164,352 --a------ c:\windows\system32\unrar.dll
2008-10-13 08:44 . 2007-09-21 01:52 118,784 --a------ c:\windows\system32\ac3acm.acm
2008-10-13 08:44 . 2008-06-12 19:36 7,680 --a------ c:\windows\system32\ff_vfw.dll
2008-10-13 08:44 . 2007-07-10 17:10 547 --a------ c:\windows\system32\ff_vfw.dll.manifest
2008-10-13 08:44 . 2007-10-03 16:03 414 --a------ c:\windows\system32\lame_acm.xml
2008-10-13 08:44 . 2008-07-30 20:09 38 --a------ c:\windows\avisplitter.ini
2008-10-06 16:16 . 2008-10-06 16:16 d-------- c:\documents and settings\LocalService\Application Data\DivX
2008-10-06 16:16 . 2007-06-14 13:41 466,048 --a------ c:\windows\system32\drivers\Ltn_stk7070P.sys
2008-10-06 16:16 . 2008-04-14 03:34 18,432 --a–c— c:\windows\system32\dllcache\bdaplgin.ax
2008-10-06 16:16 . 2008-04-14 03:34 18,432 --a------ c:\windows\system32\BdaPlgIn.ax
2008-10-06 16:16 . 2008-04-13 19:46 15,232 --a------ c:\windows\system32\drivers\MPE.sys
2008-10-06 16:16 . 2008-04-13 19:46 15,232 --a–c— c:\windows\system32\dllcache\mpe.sys
2008-10-06 16:16 . 2007-06-13 18:30 13,440 --a------ c:\windows\system32\drivers\Ltn_stkrc.sys
2008-10-06 16:16 . 2008-04-13 19:46 11,776 --a------ c:\windows\system32\drivers\BdaSup.sys
2008-10-06 16:16 . 2008-04-13 19:46 11,776 --a–c— c:\windows\system32\dllcache\bdasup.sys
2008-10-06 16:14 . 2004-07-23 08:00 446,464 --------- c:\windows\system32\HHActiveX.dll
2008-10-06 16:13 . 2006-12-01 22:54 626,688 --------- c:\windows\system32\msvcr80.dll
2008-10-06 16:13 . 2006-12-01 22:54 548,864 --------- c:\windows\system32\msvcp80.dll
2008-10-06 16:13 . 2002-01-05 12:40 487,424 --------- c:\windows\system32\MSVCP70.DLL

.
(((((((((((((((((((((((((((((((((( Compte-rendu de Find3M ))))))))))))))))))))))))))))))))))))))))))))))))
.
2008-11-06 19:26 729,120 --sha-w c:\windows\system32\drivers\fidbox2.dat
2008-11-06 19:26 --------- d-----w c:\documents and settings\All Users\Application Data\Kaspersky Lab
2008-11-06 19:24 3,572 --sha-w c:\windows\system32\drivers\fidbox2.idx
2008-11-06 19:24 3,412,000 --sha-w c:\windows\system32\drivers\fidbox.dat
2008-11-06 19:24 27,736 --sha-w c:\windows\system32\drivers\fidbox.idx
2008-11-06 08:13 --------- d-----w c:\documents and settings\LILIA\Application Data\BitTorrent
2008-11-06 08:06 --------- d-----w c:\documents and settings\All Users\Application Data\Google Updater
2008-11-05 17:55 --------- d-----w c:\program files\Navilog1
2008-11-04 22:11 --------- d-----w c:\program files\Java
2008-11-04 22:05 --------- d-----w c:\program files\URUSoft
2008-11-04 22:01 --------- d-----w c:\program files\eMule
2008-11-04 21:10 --------- d-----w c:\program files\Zylom Games
2008-11-04 21:10 --------- d-----w c:\documents and settings\LILIA\Application Data\Zylom
2008-11-01 21:07 --------- d–h--w c:\program files\InstallShield Installation Information
2008-10-31 09:44 --------- d-----w c:\program files\Messenger Plus! Live
2008-10-29 09:30 --------- d-----w c:\documents and settings\LILIA\Application Data\Skype
2008-10-27 10:24 --------- d-----w c:\program files\Power IE
2008-10-20 23:31 --------- d-----w c:\program files\Google
2008-10-19 13:06 --------- d-----w c:\program files\Nero
2008-10-19 13:06 --------- d-----w c:\documents and settings\All Users\Application Data\Nero
2008-10-19 13:00 --------- d-----w c:\program files\Red Kawa
2008-10-19 12:59 --------- d-----w c:\program files\Notepad++
2008-10-19 12:59 --------- d-----w c:\program files\AbiSuite2
2008-10-19 12:59 --------- d-----w c:\documents and settings\LILIA\Application Data\Notepad++
2008-10-19 12:58 --------- d-----w c:\program files\CVitae
2008-10-19 12:58 --------- d-----w c:\documents and settings\LILIA\Application Data\Samsung
2008-10-19 12:56 --------- d-----w c:\program files\Online TV Player 4
2008-10-19 12:20 --------- d-----w c:\program files\MSBuild
2008-10-16 21:19 --------- d-----w c:\documents and settings\All Users\Application Data\Pinnacle
2008-10-16 21:04 --------- d-----w c:\program files\Super Internet TV
2008-10-16 21:04 --------- d-----w c:\program files\SpeedFan
2008-10-16 18:45 --------- d-----w c:\documents and settings\LILIA\Application Data\DNA
2008-10-13 07:43 --------- d-----w c:\documents and settings\LILIA\Application Data\DivX
2008-10-07 21:54 --------- d-----w c:\program files\DNA
2008-10-04 14:22 --------- d-----w c:\program files\BitTorrent
2008-09-20 09:28 --------- d-----w c:\documents and settings\LILIA\Application Data\skypePM
2008-09-19 17:06 --------- d-----w c:\documents and settings\LILIA\Application Data\vlc
2008-09-19 14:56 --------- d-----w c:\documents and settings\LILIA\Application Data\Sony Corporation
2008-09-18 22:36 --------- d-----w c:\program files\Sony
2008-09-18 22:35 --------- d-----w c:\documents and settings\All Users\Application Data\Sony Corporation
2008-09-18 22:34 --------- d-----w c:\program files\Fichiers communs\Sony Shared
2008-09-17 22:07 --------- d-----w c:\program files\inKline Global
2008-09-16 12:05 --------- d-----w c:\program files\MIKSOFT
2008-09-15 00:59 --------- d-----w c:\program files\SiSoftware
2008-09-15 00:58 --------- d-----w c:\program files\Reference Assemblies
2008-09-14 20:34 --------- d-----w c:\program files\Fichiers communs\Vbox
2008-09-12 07:46 --------- d-----w c:\program files\Trend Micro
2008-09-12 07:28 --------- d-----w c:\program files\PC Inspector File Recovery
2008-09-12 07:27 --------- d-----w c:\program files\DivX
2008-09-11 19:05 --------- d-----w c:\documents and settings\LILIA\Application Data\U3
2008-09-08 10:41 333,824 ----a-w c:\windows\system32\drivers\srv.sys
2008-09-06 22:22 --------- d-----w c:\program files\Softick
2008-09-06 17:13 --------- d-----w c:\program files\Ulead Systems
2008-09-06 17:13 --------- d-----w c:\documents and settings\LILIA\Application Data\Ulead Systems
2008-09-06 17:13 --------- d-----w c:\documents and settings\All Users\Application Data\Ulead Systems
2008-09-06 16:46 --------- d—a-w c:\program files\Offre Wanadoo
2008-09-06 16:38 --------- d-----w c:\program files\Fichiers communs\Ulead Systems
2008-08-17 19:54 74,752 ----a-w c:\windows\ST6UNST.EXE
.

((((((((((((((((((((((((((((((((( Points de chargement Reg ))))))))))))))))))))))))))))))))))))))))))))))))
.
.
Note les éléments vides & les éléments initiaux légitimes ne sont pas listés
REGEDIT4

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
“ctfmon.exe”=“c:\windows\system32\ctfmon.exe” [2008-04-14 15360]
“IndxStoreSvr_{79662E04-7C6C-4d9f-84C7-88D8A56B10AA}”=“c:\program files\Fichiers communs\Nero\Lib\NMIndexStoreSvr.exe” [2008-02-28 1828136]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
“ehTray”=“c:\windows\ehome\ehtray.exe” [2005-08-05 64512]
“NvCplDaemon”=“c:\windows\system32\NvCpl.dll” [2006-05-01 7557120]
“NVRotateSysTray”=“c:\windows\system32\nvsysrot.dll” [2006-05-01 49152]
“DLA”=“c:\windows\System32\DLA\DLACTRLW.EXE” [2005-10-06 122940]
“snpstd3”=“c:\windows\vsnpstd3.exe” [2006-09-19 827392]
“GrooveMonitor”=“c:\program files\Microsoft Office\Office12\GrooveMonitor.exe” [2007-08-24 33648]
“Tvs”=“c:\program files\TOSHIBA\Tvs\TvsTray.exe” [2006-02-02 73728]
“QuickTime Task”=“c:\program files\QuickTime\qttask.exe” [2008-05-27 413696]
“RemoteControl8”=“c:\program files\CyberLink\PowerDVD8\PDVD8Serv.exe” [2008-03-20 83240]
“PDVD8LanguageShortcut”=“c:\program files\CyberLink\PowerDVD8\Language\Language.exe” [2007-12-14 50472]
“SunJavaUpdateSched”=“c:\program files\Java\jre1.6.0_07\bin\jusched.exe” [2008-06-10 144784]
“AVP”=“c:\program files\Kaspersky Lab\Kaspersky Anti-Virus 2009\avp.exe” [2008-07-29 206088]
“nwiz”=“nwiz.exe” [2006-05-01 c:\windows\system32\nwiz.exe]
“RTHDCPL”=“RTHDCPL.EXE” [2006-05-05 c:\windows\RTHDCPL.exe]
“AGRSMMSG”=“AGRSMMSG.exe” [2005-12-13 c:\windows\agrsmmsg.exe]
“TPSMain”=“TPSMain.exe” [2005-08-03 c:\windows\system32\TPSMain.exe]
“NDSTray.exe”=“NDSTray.exe” [BU]
“TFncKy”=“TFncKy.exe” [BU]
“BluetoothAuthenticationAgent”=“bthprops.cpl” [2008-04-14 c:\windows\system32\bthprops.cpl]

[HKEY_USERS.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run]
“CTFMON.EXE”=“c:\windows\system32\CTFMON.EXE” [2008-04-14 15360]

c:\documents and settings\LILIA\Menu D?marrer\Programmes\D?marrage
Adobe Gamma.lnk - c:\program files\Fichiers communs\Adobe\Calibration\Adobe Gamma Loader.exe [2005-03-16 113664]
Rain.lnk - c:\rain\Rain.exe [2008-10-15 183296]

c:\documents and settings\All Users\Menu D?marrer\Programmes\D?marrage
Pinnacle Streaming Server.lnk - c:\program files\Pinnacle\Shared Files\Programs\StrmServer\StrmServer.exe [2008-03-25 603408]
Windows Desktop Search.lnk - c:\program files\Windows Desktop Search\WindowsSearch.exe [2006-03-26 257752]

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\system]
“InstallVisualStyle”= c:\windows\Resources\Themes\Royale\Royale.msstyles
“InstallTheme”= c:\windows\Resources\Themes\Royale.theme

[hkey_local_machine\software\microsoft\windows\currentversion\explorer\ShellExecuteHooks]
“{56F9679E-7826-4C84-81F3-532071A8BCC5}”= “c:\program files\Windows Desktop Search\MSNLNamespaceMgr.dll” [2006-03-13 233472]

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\drivers32]
“msacm.l3acm”= l3codecp.acm

[HKLM~\startupfolder\C:^Documents and Settings^All Users^Menu Démarrer^Programmes^Démarrage^Ralink Wireless Utility.lnk]
path=c:\documents and settings\All Users\Menu Démarrer\Programmes\Démarrage\Ralink Wireless Utility.lnk
backup=c:\windows\pss\Ralink Wireless Utility.lnkCommon Startup

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Adobe Reader Speed Launcher]
–a------ 2008-06-12 01:38 34672 c:\program files\Adobe\Reader 9.0\Reader\reader_sl.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\BitTorrent DNA]
–a------ 2008-10-07 22:54 289088 c:\program files\DNA\btdna.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\IndxStoreSvr_{79662E04-7C6C-4d9f-84C7-88D8A56B10AA}]
–a------ 2008-02-28 16:07 1828136 c:\program files\Fichiers communs\Nero\Lib\NMIndexStoreSvr.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\LtMoh]
–a------ 2004-08-18 11:37 184320 c:\program files\ltmoh\ltmoh.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\NBKeyScan]
–a------ 2008-02-18 15:29 2221352 c:\program files\Nero\Nero8\Nero BackItUp\NBKeyScan.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\NeroFilterCheck]
–a------ 2008-02-28 08:59 570664 c:\program files\Fichiers communs\Nero\Lib\NeroCheck.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\PMCLoader]
–a------ 2008-06-23 14:24 644368 c:\program files\Pinnacle\TVCenter Pro\PMCLoader.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\PMCRemote]
--------- 2008-06-12 13:14 214288 c:\program files\Pinnacle\Shared Files\Programs\Remote\remoterm.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\QuickTime Task]
–a------ 2008-05-27 09:50 413696 c:\program files\QuickTime\QTTask.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\SmoothView]
–a------ 2005-05-17 08:24 118784 c:\program files\Toshiba\Utilitaire de zoom TOSHIBA\SmoothView.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\swg]
–a------ 2008-09-02 16:27 39408 c:\program files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\SynTPEnh]
–a------ 2006-03-03 00:02 761948 c:\program files\Synaptics\SynTP\SynTPEnh.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\THotkey]
–a------ 2006-08-25 12:47 356352 c:\program files\Toshiba\TOSHIBA Applet\THotkey.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\TkBellExe]
–a------ 2008-08-02 12:01 185896 c:\program files\Fichiers communs\Real\Update_OB\realsched.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\TOSCDSPD]
–a------ 2005-04-11 15:08 65536 c:\program files\Toshiba\TOSCDSPD\TOSCDSPD.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Ulead AutoDetector]
--------- 2005-07-28 07:32 94208 c:\program files\Fichiers communs\Ulead Systems\AutoDetector\Monitor.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Ulead Calendar Checker]
–a------ 2005-08-22 08:10 69632 c:\program files\Ulead Systems\Ulead Photo Express 6\CalCheck.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Veoh]
–a------ 2008-09-26 18:14 3660848 c:\program files\Veoh Networks\Veoh\VeohClient.exe

[HKEY_LOCAL_MACHINE\software\microsoft\security center]
“AntiVirusDisableNotify”=dword:00000001

[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\KasperskyAntiVirus]
“DisableMonitoring”=dword:00000001

[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\SymantecFirewall]
“DisableMonitoring”=dword:00000001

[HKLM~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
“%windir%\system32\sessmgr.exe”=
“%windir%\Network Diagnostic\xpnetdiag.exe”=
“c:\Program Files\DNA\btdna.exe”=
“c:\Program Files\BitTorrent\bittorrent.exe”=
“c:\Program Files\Messenger\msmsgs.exe”=
“c:\Program Files\eMule\emule.exe”=
“c:\Program Files\Java\jre1.5.0_06\launch4j-tmp\RKMediaCenter.exe”=
“c:\Program Files\Windows Live\Messenger\msnmsgr.exe”=
“c:\Program Files\Windows Live\Messenger\livecall.exe”=
“c:\Program Files\SiSoftware\SiSoftware Sandra Lite 2009\RpcAgentSrv.exe”=
“c:\Program Files\Skype\Phone\Skype.exe”=
“c:\Program Files\Veoh Networks\Veoh\VeohClient.exe”=
“c:\Program Files\Microsoft Office\Office12\OUTLOOK.EXE”=
“c:\Program Files\Microsoft Office\Office12\GROOVE.EXE”=
“c:\Program Files\Microsoft Office\Office12\ONENOTE.EXE”=
“c:\Program Files\SiSoftware\SiSoftware Sandra Lite 2009\WNt500x86\RpcSandraSrv.exe”=

[HKLM~\services\sharedaccess\parameters\firewallpolicy\standardprofile\IcmpSettings]
“AllowInboundEchoRequest”= 1 (0x1)

R0 klbg;Kaspersky Lab Boot Guard Driver;c:\windows\system32\drivers\klbg.sys [2008-01-29 32784]
R1 cpuidlep;CpuIdle Pro System Driver;c:\windows\system32\drivers\cpuidlep.sys [2008-10-15 4484]
R3 klim5;Kaspersky Anti-Virus NDIS Filter;c:\windows\system32\DRIVERS\klim5.sys [2008-04-30 24592]
R3 X10Hid;X10 Hid Device;c:\windows\system32\Drivers\x10hid.sys [2005-11-28 7040]
S3 getPlus® Helper;getPlus® Helper;c:\program files\NOS\bin\getPlus_HelperSvc.exe [2008-06-26 31592]
S3 Ltn_stk7070P;PCTV based TV tuner device;c:\windows\system32\DRIVERS\Ltn_stk7070P.sys [2007-06-14 466048]
S3 Ltn_stkrc;PCTV Infrared Receiver;c:\windows\system32\DRIVERS\Ltn_stkrc.sys [2007-06-13 13440]
S3 SandraAgentSrv;SiSoftware Deployment Agent Service;c:\program files\SiSoftware\SiSoftware Sandra Lite 2009\RpcAgentSrv.exe [2008-09-08 98488]
S3 USBSTOR;Pilote de stockage de masse USB;c:\windows\system32\DRIVERS\USBSTOR.SYS [2008-04-13 26368]

[HKEY_CURRENT_USER\software\microsoft\windows\currentversion\explorer\mountpoints2{62c54991-7c37-11dd-ba86-000e8e18892a}]
\Shell\AutoRun\command - E:\LaunchU3.exe -a
.
Contenu du dossier ‘Tâches planifiées’

2008-11-05 c:\windows\Tasks{F897AA24-BDC3-11D1-B85B-00C04FB93981}_YOUR-6FBB7B0EF0_LILIA.job

  • c:\windows\system32\mobsync.exe [2008-04-14 03:34]
    .
        • ORPHELINS SUPPRIMES - - - -

BHO-{5a1aa012-b5ba-48ea-b5f4-36ba635d21ce} - c:\windows\system32\szsyih.dll
HKCU-Run-PMCRemote - (no file)
MSConfigStartUp-!AVG Anti-Spyware - c:\program files\Grisoft\AVG Anti-Spyware 7.5\avgas.exe

.
------- Examen supplémentaire -------
.
FireFox -: Profile - c:\documents and settings\LILIA\Application Data\Mozilla\Firefox\Profiles\42nz5p8y.default
FireFox -: prefs.js - STARTUP.HOMEPAGE - www.google.fr…
FF -: plugin - c:\documents and settings\All Users\Application Data\Zylom\ZylomGamesPlayer\npzylomgamesplayer.dll
FF -: plugin - c:\program files\DNA\plugins\npbtdna.dll
FF -: plugin - c:\program files\Google\Google Updater\2.4.1368.5602\npCIDetect13.dll
FF -: plugin - c:\program files\Mozilla Firefox\plugins\npbittorrent.dll
FF -: plugin - c:\program files\Mozilla Firefox\plugins\npzylomgamesplayer.dll
FF -: plugin - c:\program files\Opera\program\plugins\NPOFF12.DLL
FF -: plugin - c:\program files\Opera\program\plugins\nprayvplugin.dll
FF -: plugin - c:\program files\Veoh Networks\Veoh\Plugins\noreg\NPVeohVersion.dll
FF -: plugin - c:\windows\Microsoft.NET\Framework\v3.5\Windows Presentation Foundation\NPWPF.dll
.


catchme 0.3.1367 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, www.gmer.net…
Rootkit scan 2008-11-06 20:26:42
Windows 5.1.2600 Service Pack 3 NTFS

Recherche de processus cachés …

Recherche d’éléments en démarrage automatique cachés …

Recherche de fichiers cachés …

Scan terminé avec succès
Fichiers cachés: 0


.
--------------------- DLLs chargées dans les processus actifs ---------------------

PROCESSUS: c:\windows\explorer.exe
-> c:\windows\system32\nview.dll
.
------------------------ Autres processus actifs ------------------------
.
c:\program files\Toshiba\ConfigFree\CFSvcs.exe
c:\windows\ehome\ehrecvr.exe
c:\windows\ehome\ehSched.exe
c:\program files\Google\Common\Google Updater\GoogleUpdaterService.exe
c:\program files\Nero\Nero8\Nero BackItUp\NBService.exe
c:\windows\system32\nvsvc32.exe
c:\windows\system32\IoctlSvc.exe
c:\program files\Toshiba\TOSHIBA Applet\TAPPSRV.exe
c:\progra~1\COMMON~1\X10\Common\X10nets.exe
c:\windows\ehome\mcrdsvc.exe
c:\windows\system32\dllhost.exe
c:\windows\system32\wscntfy.exe
c:\windows\ehome\ehmsas.exe
c:\windows\system32\rundll32.exe
c:\windows\system32\rundll32.exe
c:\program files\Toshiba\ConfigFree\NDSTray.exe
c:\program files\Toshiba\Commandes TOSHIBA\TFncKy.exe
c:\windows\system32\rundll32.exe
c:\windows\system32\TPSBattM.exe
c:\program files\Fichiers communs\Nero\Lib\NMIndexingService.exe
.


.
Heure de fin: 2008-11-06 20:31:03 - La machine a redémarré
ComboFix-quarantined-files.txt 2008-11-06 19:30:59

Avant-CF: 41 124 515 840 octets libres
Après-CF: 41,037,918,208 octets libres

WindowsXP-KB310994-SP2-Pro-BootDisk-FRA.exe
[boot loader]
timeout=2
default=multi(0)disk(0)rdisk(0)partition(1)\WINDOWS
[operating systems]
c:\cmdcons\BOOTSECT.DAT=“Microsoft Windows Recovery Console” /cmdcons
multi(0)disk(0)rdisk(0)partition(1)\WINDOWS=“Windows XP Media Center Edition” /noexecute=optin /fastdetect

368 — E O F — 2008-08-30 20:48:31

j’ai aussi constaté que ma connexion internet est lente!!!

J’analyse ton rapport est je te dit quoi faire :wink:

Upload cest fichier sur virus total et post les rapport

j’ai uploadé les fichiers sur virus total mais je n’ai pas trouvé ces 2 fichiers :
c:\windows\system32\szsyih.dll
c:\program files\Opera\program\plugins\nprayvplugin.dll

je pensais que c’était des fichiers cachés mais ils n’apparaissent pas même en affichant les fichiers cachés dans options des dossiers.

sinon voici les rapports des 2 autres:

Fichier NPVeohVersion.dll reçu le 2008.11.06 23:04:13 (CET)
Situation actuelle: en cours de chargement … mis en file d’attente en attente en cours d’analyse terminé NON TROUVE ARRETE
Résultat: 0/36 (0%)
en train de charger les informations du serveur…
Votre fichier est dans la file d’attente, en position: 4.
L’heure estimée de démarrage est entre 62 et 88 secondes.
Ne fermez pas la fenêtre avant la fin de l’analyse.
L’analyseur qui traitait votre fichier est actuellement stoppé, nous allons attendre quelques secondes pour tenter de récupérer vos résultats.
Si vous attendez depuis plus de cinq minutes, vous devez renvoyer votre fichier.
Votre fichier est, en ce moment, en cours d’analyse par VirusTotal,
les résultats seront affichés au fur et à mesure de leur génération.
Formaté Formaté
Impression des résultats Impression des résultats
Votre fichier a expiré ou n’existe pas.
Le service est en ce moment, stoppé, votre fichier attend d’être analysé (position : ) depuis une durée indéfinie.

Vous pouvez attendre une réponse du Web (re-chargement automatique) ou taper votre e-mail dans le formulaire ci-dessous et cliquer “Demande” pour que le système vous envoie une notification quand l’analyse sera terminée.
Email:

Antivirus Version Dernière mise à jour Résultat
AhnLab-V3 2008.11.5.3 2008.11.06 -
AntiVir 7.9.0.26 2008.11.06 -
Authentium 5.1.0.4 2008.11.06 -
Avast 4.8.1248.0 2008.11.06 -
AVG 8.0.0.161 2008.11.06 -
BitDefender 7.2 2008.11.06 -
CAT-QuickHeal 9.50 2008.11.04 -
ClamAV 0.94.1 2008.11.06 -
DrWeb 4.44.0.09170 2008.11.06 -
eSafe 7.0.17.0 2008.11.06 -
eTrust-Vet 31.6.6195 2008.11.06 -
Ewido 4.0 2008.11.06 -
F-Prot 4.4.4.56 2008.11.06 -
F-Secure 8.0.14332.0 2008.11.06 -
Fortinet 3.117.0.0 2008.11.06 -
GData 19 2008.11.06 -
Ikarus T3.1.1.45.0 2008.11.06 -
K7AntiVirus 7.10.518 2008.11.06 -
Kaspersky 7.0.0.125 2008.11.06 -
McAfee 5426 2008.11.06 -
Microsoft 1.4005 2008.11.06 -
NOD32 3592 2008.11.06 -
Norman 5.80.02 2008.11.06 -
Panda 9.0.0.4 2008.11.06 -
PCTools 4.4.2.0 2008.11.06 -
Prevx1 V2 2008.11.06 -
Rising 21.02.32.00 2008.11.06 -
SecureWeb-Gateway 6.7.6 2008.11.06 -
Sophos 4.35.0 2008.11.06 -
Sunbelt 3.1.1783.2 2008.11.05 -
Symantec 10 2008.11.06 -
TheHacker 6.3.1.1.142 2008.11.06 -
TrendMicro 8.700.0.1004 2008.11.06 -
VBA32 3.12.8.9 2008.11.06 -
ViRobot 2008.11.6.1455 2008.11.06 -
VirusBuster 4.5.11.0 2008.11.06 -
Information additionnelle
File size: 237568 bytes
MD5…: b14268dbeeecb6e09fa78a770793a4db
SHA1…: 089c3dfa54d3e5f8d33e0f2e15b27bb13607bfaf
SHA256: 49f9d95b0c7ea6d510163eb7ccd1c76cfd31973a6cd52419c1bb2e74bbe56cfd
SHA512: 1e41abcab25fe8860335143abc68bb9aa0a8558f5cac75356cb803e14fba1b67
8426dcb6e5299084affca973127f24465058aac393cb0684dad3d7d9faa422f6
PEiD…: Armadillo v1.xx - v2.xx
TrID…: File type identification
InstallShield setup (37.7%)
Win32 Executable MS Visual C++ (generic) (33.0%)
Windows Screen Saver (11.4%)
Win32 Executable Generic (7.4%)
Win32 Dynamic Link Library (generic) (6.6%)
PEInfo: PE Structure information

( base data )
entrypointaddress.: 0x1000b898
timedatestamp…: 0x37822bbb (Tue Jul 06 16:15:55 1999)
machinetype…: 0x14c (I386)

( 5 sections )
name viradd virsiz rawdsiz ntrpy md5
.text 0x1000 0x20146 0x21000 6.51 ba11b40c156732d28e1f80ca042e115e
.rdata 0x22000 0x966d 0xa000 4.75 1fed7c8f081703b7f0d6399f69fdebc0
.data 0x2c000 0x7980 0x5000 2.31 b4db6fe68b1bc5138022f1287f6905f7
.rsrc 0x34000 0x3764 0x4000 4.46 a0151bf2c31da90dc606d2afebb21b19
.reloc 0x38000 0x4fb4 0x5000 4.86 afef0e1e3d01976c57bd4b81127648d0

( 12 imports )

KERNEL32.dll: ExitProcess, TerminateProcess, GetCommandLineA, RtlUnwind, HeapFree, HeapAlloc, RaiseException, HeapReAlloc, GetTimeZoneInformation, HeapSize, GetACP, SetHandleCount, GetStdHandle, GetFileType, GetStartupInfoA, FreeEnvironmentStringsA, FreeEnvironmentStringsW, GetEnvironmentStrings, GetEnvironmentVariableA, GetVersionExA, GetEnvironmentStringsW, VirtualFree, LCMapStringA, LCMapStringW, VirtualAlloc, GetOEMCP, DuplicateHandle, SetUnhandledExceptionFilter, GetStringTypeA, GetStringTypeW, IsBadReadPtr, IsBadCodePtr, SetStdHandle, CompareStringA, CompareStringW, SetEnvironmentVariableA, FormatMessageA, GetFileTime, GetFileSize, GetFileAttributesA, GetFullPathNameA, GetVolumeInformationA, FindFirstFileA, FindClose, SetEndOfFile, UnlockFile, LockFile, FlushFileBuffers, SetFilePointer, WriteFile, ReadFile, CreateFileA, GetCurrentProcess, HeapCreate, GetCPInfo, CloseHandle, GlobalLock, GlobalAlloc, GlobalDeleteAtom, lstrcmpA, lstrcmpiA, GetCurrentThread, GetCurrentThreadId, InterlockedIncrement, MultiByteToWideChar, GetModuleFileNameA, GetProcessVersion, WritePrivateProfileStringA, GlobalFlags, SetErrorMode, FileTimeToLocalFileTime, FileTimeToSystemTime, GetTickCount, GetThreadLocale, MulDiv, lstrcpynA, GetLastError, SetLastError, TlsGetValue, LocalReAlloc, TlsSetValue, EnterCriticalSection, GlobalReAlloc, LeaveCriticalSection, TlsFree, GlobalHandle, GlobalUnlock, GlobalFree, DeleteCriticalSection, TlsAlloc, InitializeCriticalSection, LocalFree, LocalAlloc, WideCharToMultiByte, InterlockedDecrement, LoadLibraryA, FreeLibrary, FindResourceA, LoadResource, LockResource, GetVersion, lstrcatA, GlobalGetAtomNameA, GlobalAddAtomA, GlobalFindAtomA, lstrcpyA, GetModuleHandleA, GetProcAddress, IsBadWritePtr, HeapDestroy, lstrlenA
USER32.dll: LoadCursorA, DestroyMenu, CharUpperA, CreateDialogIndirectParamA, EndDialog, PtInRect, GetClassNameA, UnregisterClassA, PostThreadMessageA, RegisterClipboardFormatA, CharNextA, GetDesktopWindow, SetRect, CopyAcceleratorTableA, GrayStringA, DrawTextA, TabbedTextOutA, EndPaint, BeginPaint, GetWindowDC, ReleaseDC, GetDC, ClientToScreen, MessageBeep, GetNextDlgGroupItem, MapDialogRect, SetWindowContextHelpId, ShowWindow, MoveWindow, SetWindowTextA, IsDialogMessageA, LoadIconA, UpdateWindow, MapWindowPoints, GetSysColor, AdjustWindowRectEx, GetSysColorBrush, LoadStringA, GetTopWindow, IsChild, GetCapture, WinHelpA, wsprintfA, RegisterClassA, GetSubMenu, GetMenuItemID, GetDlgItem, GetWindowTextA, GetDlgCtrlID, DefWindowProcA, DestroyWindow, CreateWindowExA, GetClassLongA, SetPropA, GetPropA, CallWindowProcA, RemovePropA, GetMessageTime, GetMessagePos, GetForegroundWindow, SetForegroundWindow, GetWindow, SetWindowPos, RegisterWindowMessageA, SystemParametersInfoA, IsIconic, GetWindowPlacement, GetSystemMetrics, GetMenuCheckMarkDimensions, LoadBitmapA, GetMenuState, ModifyMenuA, SetMenuItemBitmaps, CheckMenuItem, EnableMenuItem, GetNextDlgTabItem, GetMessageA, TranslateMessage, DispatchMessageA, GetActiveWindow, GetClassInfoA, GetKeyState, ValidateRect, IsWindowVisible, PeekMessageA, GetCursorPos, GetLastActivePopup, IsWindowEnabled, MessageBoxA, SetCursor, PostMessageA, PostQuitMessage, GetClientRect, FillRect, CopyRect, GetWindowLongA, SetWindowLongA, RedrawWindow, SetActiveWindow, SendMessageA, GetParent, CallNextHookEx, SetWindowsHookExA, UnhookWindowsHookEx, GetWindowRect, OffsetRect, IsWindow, GetFocus, SetFocus, EnableWindow, GetMenuItemCount, GetMenu, SendDlgItemMessageA
GDI32.dll: DeleteObject, GetDeviceCaps, GetViewportExtEx, GetWindowExtEx, PtVisible, RectVisible, TextOutA, ExtTextOutA, Escape, DPtoLP, LPtoDP, GetTextColor, GetBkColor, GetMapMode, ScaleWindowExtEx, SetWindowExtEx, ScaleViewportExtEx, SetViewportExtEx, OffsetViewportOrgEx, SetViewportOrgEx, SetMapMode, GetStockObject, SelectObject, RestoreDC, SaveDC, DeleteDC, GetObjectA, SetBkColor, SetTextColor, GetClipBox, CreateBitmap
comdlg32.dll: GetFileTitleA
WINSPOOL.DRV: DocumentPropertiesA, OpenPrinterA, ClosePrinter
ADVAPI32.dll: RegCloseKey, RegCreateKeyExA, RegOpenKeyExA, RegSetValueExA
COMCTL32.dll: -
oledlg.dll: -
ole32.dll: CoFreeUnusedLibraries, CoRevokeClassObject, OleFlushClipboard, CoTaskMemFree, CreateILockBytesOnHGlobal, StgCreateDocfileOnILockBytes, StgOpenStorageOnILockBytes, CLSIDFromProgID, CoRegisterMessageFilter, CreateBindCtx, CoGetClassObject, CLSIDFromString, OleIsCurrentClipboard, OleUninitialize, OleInitialize, CoTaskMemAlloc
OLEPRO32.DLL: -
OLEAUT32.dll: -, -, -, -, -, -, -, -, -, -
urlmon.dll: CreateAsyncBindCtx, RegisterBindStatusCallback, CreateURLMoniker

( 3 exports )
NP_GetEntryPoints, NP_Initialize, NP_Shutdown

Fichier npbtdna.dll reçu le 2008.11.06 22:52:25 (CET)
Situation actuelle: terminé
Résultat: 1/36 (2.78%)
Formaté Formaté
Impression des résultats Impression des résultats
Antivirus Version Dernière mise à jour Résultat
AhnLab-V3 2008.11.5.3 2008.11.06 -
AntiVir 7.9.0.26 2008.11.06 -
Authentium 5.1.0.4 2008.11.06 -
Avast 4.8.1248.0 2008.11.06 -
AVG 8.0.0.161 2008.11.06 -
BitDefender 7.2 2008.11.06 -
CAT-QuickHeal 9.50 2008.11.04 -
ClamAV 0.94.1 2008.11.06 -
DrWeb 4.44.0.09170 2008.11.06 -
eSafe 7.0.17.0 2008.11.06 -
eTrust-Vet 31.6.6195 2008.11.06 -
Ewido 4.0 2008.11.06 -
F-Prot 4.4.4.56 2008.11.06 -
F-Secure 8.0.14332.0 2008.11.06 -
Fortinet 3.117.0.0 2008.11.06 -
GData 19 2008.11.06 -
Ikarus T3.1.1.45.0 2008.11.06 -
K7AntiVirus 7.10.518 2008.11.06 -
Kaspersky 7.0.0.125 2008.11.06 -
McAfee 5426 2008.11.06 -
Microsoft 1.4005 2008.11.06 -
NOD32 3592 2008.11.06 -
Norman 5.80.02 2008.11.06 -
Panda 9.0.0.4 2008.11.06 Suspicious file
PCTools 4.4.2.0 2008.11.06 -
Prevx1 V2 2008.11.06 -
Rising 21.02.32.00 2008.11.06 -
SecureWeb-Gateway 6.7.6 2008.11.06 -
Sophos 4.35.0 2008.11.06 -
Sunbelt 3.1.1783.2 2008.11.05 -
Symantec 10 2008.11.06 -
TheHacker 6.3.1.1.142 2008.11.06 -
TrendMicro 8.700.0.1004 2008.11.06 -
VBA32 3.12.8.9 2008.11.05 -
ViRobot 2008.11.6.1455 2008.11.06 -
VirusBuster 4.5.11.0 2008.11.06 -
Information additionnelle
File size: 54592 bytes
MD5…: 12faa4db80c6062884ad11b9fd370e65
SHA1…: 5332ff9312816893b02f6ccbaa0e357a51c7d7ab
SHA256: 3e298ff0cf68928b98579d44296d930fefa96674975e6cad53c250443dc9e1db
SHA512: a25fb78bbebcbb8fc82562c56db4c4357b78436e2481a66f427279da32d355f8
2d0081f32356bb23a8a8416bfc42de47a1b611d3591321c38dd74f39ea64a0f2
PEiD…: -
TrID…: File type identification
DirectShow filter (58.3%)
Windows OCX File (35.7%)
Win32 Executable Generic (2.4%)
Win32 Dynamic Link Library (generic) (2.1%)
Generic Win/DOS Executable (0.5%)
PEInfo: PE Structure information

( base data )
entrypointaddress.: 0x100054e6
timedatestamp…: 0x480e5433 (Tue Apr 22 21:10:11 2008)
machinetype…: 0x14c (I386)

( 5 sections )
name viradd virsiz rawdsiz ntrpy md5
.text 0x1000 0x4beb 0x5000 6.25 d0b801c96d471c780acf20097771626b
.rdata 0x6000 0xabe 0x1000 3.87 be0a433c727ea2ba2435987798e2f321
.data 0x7000 0x124d 0x2000 3.73 4df02fe610bc3751a231735e5c7cf1df
.rsrc 0x9000 0x10f8 0x2000 2.68 13a9dae41c297f0f2b8c695d3ef50085
.reloc 0xb000 0x6be 0x1000 3.37 8d021f349d6f51d09df1ae877fead4d3

( 6 imports )

KERNEL32.dll: Sleep, CreateProcessA, GetTickCount, LeaveCriticalSection, EnterCriticalSection, MultiByteToWideChar, lstrlenW, lstrlenA, GetShortPathNameA, WideCharToMultiByte, SizeofResource, GetLastError, lstrcmpiA, lstrcpynA, IsDBCSLeadByte, DeleteCriticalSection, GetModuleHandleA, InitializeCriticalSection, HeapAlloc, GetSystemInfo, GetVersionExA, HeapCreate, HeapDestroy, lstrcpyA, lstrcatA, GetProcAddress, LoadLibraryA, InterlockedDecrement, InterlockedIncrement, DebugBreak, HeapReAlloc, HeapFree, GetModuleFileNameA, LoadLibraryExA, FindResourceA, LoadResource, LockResource, CreateFileA, WriteFile, CloseHandle, DeleteFileA, DisableThreadLibraryCalls, FreeLibrary
USER32.dll: CharNextA, FindWindowA
SHLWAPI.dll: SHDeleteKeyA
ADVAPI32.dll: RegDeleteValueA, RegDeleteKeyA, RegOpenKeyExA, RegQueryValueExA, RegCloseKey, RegEnumKeyExA, RegSetValueExA, RegQueryInfoKeyA, RegEnumValueA, RegCreateKeyExA
ole32.dll: CoTaskMemFree, CoTaskMemAlloc, CoTaskMemRealloc, CoCreateInstance
OLEAUT32.dll: -, -, -, -, -, -, -, -

( 7 exports )
DllCanUnloadNow, DllGetClassObject, DllRegisterServer, DllUnregisterServer, NP_GetEntryPoints, NP_Initialize, NP_Shutdown
ThreatExpert info: www.threatexpert.com…
packers (Kaspersky): PE_Patch

bonsoir guigui14100 je voulais te faire part que l’infection a été neutralisé et je t’en remercie, mais j’ai internet qui rame de temps en temps pourrais tu me dire quoi faire si possible? merci

Salut

Passe un coup de ccleaner nettoie fichier temporaire et registre

bonjour, j’ai également des fenêtres intempestives qui s’exécutent dans Internet explorer
J’ai déjà fait un scan avast, et spybot, malwarebytes et adware, rien à faire, cela revient toujours au démarrage. j’ai fait mes scan en mode sans échec.
j’ai le rapport malwarebytes, si quelqu’un pouvait m’aider, ce serait génial!

merci d’avance

Salut,

fait moi un hijackthis.

merci.

@+