Rapport SDFix :
SDFix: Version 1.238
Run by Anna on 28/10/2008 at 13:47
Microsoft Windows XP [version 5.1.2600]
Running From: C:SDFix
Checking Services :
Name :
sysrest.sys
Path :
??C:WINDOWSsystem32sysrest.sys
sysrest.sys - Deleted
Restoring Default Security Values
Restoring Default Hosts File
Rebooting
Checking Files :
Trojan Files Found:
C:Documents and SettingsLocalServiceApplication Datasysproc64sysproc32.sys - Deleted
C:Documents and SettingsNetworkServiceApplication Datasysproc64sysproc32.sys - Deleted
C:Program FilesWinAntispyware2008comp.dat - Deleted
C:Program FilesWinAntispyware2008htmlayout.dll - Deleted
C:Program FilesWinAntispyware2008pthreadVC2.dll - Deleted
C:Program FilesWinAntispyware2008wscui.cpl - Deleted
C:Program FilesWinAntispyware2008datadaily.cvd - Deleted
C:Program FilesWinAntispyware2008Microsoft.VC80.CRTMicrosoft.VC80.CRT.manifest - Deleted
C:Program FilesWinAntispyware2008Microsoft.VC80.CRTmsvcm80.dll - Deleted
C:Program FilesWinAntispyware2008Microsoft.VC80.CRTmsvcp80.dll - Deleted
C:Program FilesWinAntispyware2008Microsoft.VC80.CRTmsvcr80.dll - Deleted
C:DOCUME~1AnnaLOCALS~1Temp.tt1.tmp - Deleted
C:DOCUME~1AnnaLOCALS~1Temp.tt1D.tmp - Deleted
C:DOCUME~1AnnaLOCALS~1Temp.tt1F.tmp - Deleted
C:DOCUME~1AnnaLOCALS~1Temp.tt2.tmp - Deleted
C:DOCUME~1AnnaLOCALS~1Temp.tt23.tmp - Deleted
C:DOCUME~1AnnaLOCALS~1Temp.tt29.tmp - Deleted
C:DOCUME~1AnnaLOCALS~1Temp.tt3.tmp - Deleted
C:DOCUME~1AnnaLOCALS~1Temp.tt4.tmp - Deleted
C:DOCUME~1AnnaLOCALS~1Temp.tt47.tmp - Deleted
C:DOCUME~1AnnaLOCALS~1Temp.tt5.tmp - Deleted
C:DOCUME~1AnnaLOCALS~1Temp.tt52.tmp - Deleted
C:DOCUME~1AnnaLOCALS~1Temp.tt7.tmp - Deleted
C:DOCUME~1AnnaLOCALS~1Temp.tt7B.tmp - Deleted
C:DOCUME~1AnnaLOCALS~1Temp.tt9.tmp - Deleted
C:DOCUME~1AnnaLOCALS~1TempBinaries1.cab2 - Deleted
C:DOCUME~1AnnaLOCALS~1TempBinaries1.cab3 - Deleted
C:DOCUME~1AnnaLOCALS~1TempBinaries1.cab4 - Deleted
C:DOCUME~1AnnaLOCALS~1TempBinaries1.cab5 - Deleted
C:DOCUME~1AnnaLOCALS~1TempBinaries1.cab6 - Deleted
C:DOCUME~1AnnaLOCALS~1TempBinaries1.cab7 - Deleted
C:DOCUME~1AnnaLOCALS~1TempBinaries1.cab8 - Deleted
C:DOCUME~1AnnaLOCALS~1TempBinaries1.cab9 - Deleted
C:DOCUME~1AnnaLOCALS~1TempBinaries2.cab3 - Deleted
C:DOCUME~1AnnaLOCALS~1TempBinaries2.cab4 - Deleted
C:DOCUME~1AnnaLOCALS~1TempBinaries2.cab5 - Deleted
C:DOCUME~1AnnaLOCALS~1TempBinaries2.cab6 - Deleted
C:DOCUME~1AnnaLOCALS~1TempBinaries2.cab7 - Deleted
C:DOCUME~1AnnaLOCALS~1TempBinaries2.cab8 - Deleted
C:DOCUME~1AnnaLOCALS~1TempBinaries2.cab9 - Deleted
C:DOCUME~1AnnaLOCALS~1TempBinaries3.cab4 - Deleted
C:DOCUME~1AnnaLOCALS~1TempBinaries3.cab5 - Deleted
C:DOCUME~1AnnaLOCALS~1TempBinaries3.cab6 - Deleted
C:DOCUME~1AnnaLOCALS~1TempBinaries3.cab7 - Deleted
C:DOCUME~1AnnaLOCALS~1TempBinaries3.cab8 - Deleted
C:DOCUME~1AnnaLOCALS~1TempBinaries3.cab9 - Deleted
C:WINDOWSsystem32\_scui.cpl - Deleted
C:WINDOWSsystem32delself.bat - Deleted
C:WINDOWSsystem32sysproc64sysproc32.sys - Deleted
C:WINDOWSsystem32sysproc64sysproc86.sys - Deleted
Folder C:Documents and SettingsLocalServiceApplication Datasysproc64 - Removed
Folder C:Documents and SettingsNetworkServiceApplication Datasysproc64 - Removed
Folder C:Program FilesWinAntispyware2008 - Removed
Folder C:WINDOWSsystem32sysproc64 - Removed
Removing Temp Files
ADS Check :
Final Check :
catchme 0.3.1361.2 W2K/XP/Vista - rootkit/stealth malware detector by Gmer,
http://www.gmer.net
Rootkit scan 2008-10-28 14:01:13
Windows 5.1.2600 Service Pack 3 NTFS
scanning hidden processes ...
scanning hidden services & system hive ...
scanning hidden registry entries ...
scanning hidden files ...
scan completed successfully
hidden processes: 0
hidden services: 0
hidden files: 0
Remaining Services :
Authorized Application Key Export:
[HKEY_LOCAL_MACHINEsystemcurrentcontrolsetservicessharedaccessparametersfirewallpolicystandardprofileauthorizedapplicationslist]
"%windir%\system32\sessmgr.exe"="%windir%\system32\sessmgr.exe:*:enabled:@xpsp2res.dll,-22019"
"%windir%\Network Diagnostic\xpnetdiag.exe"="%windir%\Network Diagnostic\xpnetdiag.exe:*:Enabled:@xpsp3res.dll,-20000"
"C:\Program Files\Messenger\msmsgs.exe"="C:\Program Files\Messenger\msmsgs.exe:*:Enabled:Windows Messenger"
"C:\Program Files\eMule\eMule.exe"="C:\Program Files\eMule\eMule.exe:*:Enabled:eMule Plus"
"C:\Program Files\iTunes\iTunes.exe"="C:\Program Files\iTunes\iTunes.exe:*:Enabled:iTunes"
"C:\Program Files\LimeWire\LimeWire.exe"="C:\Program Files\LimeWire\LimeWire.exe:*:Enabled:LimeWire"
"C:\WINDOWS\Temp\.tt5.tmp"="C:\WINDOWS\Temp\.tt5.tmp:*:Enabled:enable"
"C:\Program Files\Windows Live\Messenger\msnmsgr.exe"="C:\Program Files\Windows Live\Messenger\msnmsgr.exe:*:Enabled:Windows Live Messenger"
"C:\Program Files\Windows Live\Messenger\livecall.exe"="C:\Program Files\Windows Live\Messenger\livecall.exe:*:Enabled:Windows Live Messenger (Phone)"
[HKEY_LOCAL_MACHINEsystemcurrentcontrolsetservicessharedaccessparametersfirewallpolicydomainprofileauthorizedapplicationslist]
"%windir%\system32\sessmgr.exe"="%windir%\system32\sessmgr.exe:*:enabled:@xpsp2res.dll,-22019"
"%windir%\Network Diagnostic\xpnetdiag.exe"="%windir%\Network Diagnostic\xpnetdiag.exe:*:Enabled:@xpsp3res.dll,-20000"
"C:\Program Files\Windows Live\Messenger\msnmsgr.exe"="C:\Program Files\Windows Live\Messenger\msnmsgr.exe:*:Enabled:Windows Live Messenger"
"C:\Program Files\Windows Live\Messenger\livecall.exe"="C:\Program Files\Windows Live\Messenger\livecall.exe:*:Enabled:Windows Live Messenger (Phone)"
Remaining Files :
File Backups: - C:SDFixackupsackups.zip
Files with Hidden Attributes :
Tue 25 Mar 2008 193 A.SHR --- "C:BOOT.BAK"
Wed 15 Oct 2008 5,013,504 A..H. --- "C:Documents and SettingsAnna
tuser.tmp"
Mon 4 Aug 2003 49,221 A..H. --- "C:Program FilesAOL 8.0aolphx.exe"
Mon 4 Aug 2003 36,937 A..H. --- "C:Program FilesAOL 8.0aoltray.exe"
Mon 4 Aug 2003 40,960 A..H. --- "C:Program FilesAOL 8.0RBM.exe"
Mon 4 Aug 2003 237,633 A..H. --- "C:Program FilesAOL 8.0waol.exe"
Wed 5 Dec 2007 6,219,320 A..H. --- "C:Program FilesPicasa2setup.exe"
Sun 30 Mar 2008 4,348 A.SH. --- "C:Documents and SettingsAll UsersDRMDRMv1.bak"
Mon 4 Aug 2003 49,223 A..H. --- "C:Program FilesAOL 8.0COMITcswitch.exe"
Fri 4 Apr 2008 0 A.SH. --- "C:Documents and SettingsAll UsersDRMCacheIndiv01.tmp"
Mon 4 Aug 2003 106,496 A..H. --- "C:Program FilesFichiers communsaolshareshellfrshellext.dll"
Finished!
Rapport Malwarebytes' Anti-Malware :
Malwarebytes' Anti-Malware 1.30
Version de la base de données: 1332
Windows 5.1.2600 Service Pack 3
28/10/2008 14:17:11
mbam-log-2008-10-28 (14-17-11).txt
Type de recherche: Examen rapide
Eléments examinés: 50919
Temps écoulé: 7 minute(s), 5 second(s)
Processus mémoire infecté(s): 0
Module(s) mémoire infecté(s): 0
Clé(s) du Registre infectée(s): 0
Valeur(s) du Registre infectée(s): 5
Elément(s) de données du Registre infecté(s): 0
Dossier(s) infecté(s): 0
Fichier(s) infecté(s): 4
Processus mémoire infecté(s):
(Aucun élément nuisible détecté)
Module(s) mémoire infecté(s):
(Aucun élément nuisible détecté)
Clé(s) du Registre infectée(s):
(Aucun élément nuisible détecté)
Valeur(s) du Registre infectée(s):
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionNetworkUID (Malware.Trace) -> Quarantined and deleted successfully.
HKEY_CURRENT_USERControl PanelDesktopwallpaper (Hijack.Wallpaper) -> Quarantined and deleted successfully.
HKEY_CURRENT_USERControl PanelDesktoporiginalwallpaper (Hijack.Wallpaper) -> Quarantined and deleted successfully.
HKEY_CURRENT_USERControl PanelDesktopconvertedwallpaper (Hijack.Wallpaper) -> Quarantined and deleted successfully.
HKEY_CURRENT_USERControl PanelDesktopscrnsave.exe (Hijack.Wallpaper) -> Quarantined and deleted successfully.
Elément(s) de données du Registre infecté(s):
(Aucun élément nuisible détecté)
Dossier(s) infecté(s):
(Aucun élément nuisible détecté)
Fichier(s) infecté(s):
C:Documents and SettingsLocalServiceLocal SettingsTemporary Internet FilesContent.IE5N7XWJYCPuaqrta[1].jpg (Trojan.Downloader) -> Quarantined and deleted successfully.
C:WINDOWSsystem32\_005625_.tmp.dll (Trojan.Agent) -> Quarantined and deleted successfully.
C:WINDOWSsystem32\_005657_.tmp.dll (Trojan.Agent) -> Quarantined and deleted successfully.
C:Documents and SettingsAnnaApplication DataMicrosoftInternet ExplorerQuick LaunchWinAntispyware2008.lnk (Rogue.WinAntiSpyware) -> Quarantined and deleted successfully.
Rapport SmitfraudFix:
SmitFraudFix v2.368
Rapport fait à 14:20:33,43, 28/10/2008
Executé à partir de C:Program FilesMozilla FirefoxSmitfraudFix
OS: Microsoft Windows XP [version 5.1.2600] - Windows_NT
Le type du système de fichiers est NTFS
Fix executé en mode normal
»»»»»»»»»»»»»»»»»»»»»»»» Process
C:WINDOWSSystem32smss.exe
C:WINDOWSsystem32winlogon.exe
C:WINDOWSsystem32services.exe
C:WINDOWSsystem32lsass.exe
C:WINDOWSsystem32svchost.exe
C:WINDOWSSystem32svchost.exe
C:WINDOWSExplorer.EXE
C:WINDOWSsystem32spoolsv.exe
C:Program FilesFichiers communsAppleMobile Device SupportinAppleMobileDeviceService.exe
C:Program FilesFichiers communsMicrosoft SharedVS7Debugmdm.exe
C:WINDOWSsystem32slserv.exe
C:WINDOWSSystem32svchost.exe
C:Program FilesVirtual CD v4 SDKsystemvcssecs.exe
C:Program FilesFichiers communsBitDefenderBitDefender Communicatorxcommsvr.exe
C:Program FilesFichiers communsBitDefenderBitDefender Update Servicelivesrv.exe
C:Program FilesBitDefenderBitDefender 2008vsserv.exe
C:WINDOWSSystem32svchost.exe
C:WINDOWSsystem32wscntfy.exe
C:ATI TechnologiesATI Control Panelatiptaxx.exe
C:WINDOWSSOUNDMAN.EXE
C:appsABoardABoard.exe
C:appsABoardAOSD.exe
C:Program FilesBitDefenderBitDefender 2008dagent.exe
C:Program FilesiTunesiTunesHelper.exe
C:Program FilesJavajre1.6.0_06injusched.exe
C:Program FilesSony EricssonMobile2Application LauncherApplication Launcher.exe
C:Program FilesQuickTimeqttask.exe
C:WINDOWSsystem32wuauclt.exe
C:WINDOWSsystem32ctfmon.exe
C:Program FilesPicasa2PicasaMediaDetector.exe
C:Program FilesWindows LiveMessengerMsnMsgr.Exe
C:WINDOWSSystem32svchost.exe
C:Program FilesHewlett-PackardDigital Imaginginhpohmr08.exe
C:Program FilesHewlett-PackardDigital Imaginginhpotdd01.exe
C:Program FilesFichiers communsTeleca SharedCapabilityManager.exe
C:Program FilesHewlett-PackardDigital Imaginginhpoevm08.exe
C:Program FilesHewlett-PackardDigital ImagingBinhpoSTS08.exe
C:Program FilesiPodiniPodService.exe
C:Program FilesFichiers communsTeleca SharedGeneric.exe
C:Program FilesSony EricssonMobile2Mobile Phone Monitorepmworker.exe
C:WINDOWSsystem32cmd.exe
»»»»»»»»»»»»»»»»»»»»»»»» hosts
»»»»»»»»»»»»»»»»»»»»»»»» C:
»»»»»»»»»»»»»»»»»»»»»»»» C:WINDOWS
»»»»»»»»»»»»»»»»»»»»»»»» C:WINDOWSsystem
»»»»»»»»»»»»»»»»»»»»»»»» C:WINDOWSWeb
»»»»»»»»»»»»»»»»»»»»»»»» C:WINDOWSsystem32
»»»»»»»»»»»»»»»»»»»»»»»» C:WINDOWSsystem32LogFiles
»»»»»»»»»»»»»»»»»»»»»»»» C:Documents and SettingsAnna
»»»»»»»»»»»»»»»»»»»»»»»» C:Documents and SettingsAnnaApplication Data
»»»»»»»»»»»»»»»»»»»»»»»» Menu Démarrer
»»»»»»»»»»»»»»»»»»»»»»»» C:DOCUME~1AnnaFavoris
»»»»»»»»»»»»»»»»»»»»»»»» Bureau
»»»»»»»»»»»»»»»»»»»»»»»» C:Program Files
»»»»»»»»»»»»»»»»»»»»»»»» Clés corrompues
»»»»»»»»»»»»»»»»»»»»»»»» Eléments du bureau
[HKEY_CURRENT_USERSoftwareMicrosoftInternet ExplorerDesktopComponents ]
"Source"="About:Home"
"SubscribedURL"="About:Home"
"FriendlyName"="Ma page d'accueil"
»»»»»»»»»»»»»»»»»»»»»»»» o4Patch
!!!Attention, les clés qui suivent ne sont pas forcément infectées!!!
o4Patch
Credits: Malware Analysis & Diagnostic
Code: S!Ri
»»»»»»»»»»»»»»»»»»»»»»»» IEDFix
!!!Attention, les clés qui suivent ne sont pas forcément infectées!!!
IEDFix
Credits: Malware Analysis & Diagnostic
Code: S!Ri
»»»»»»»»»»»»»»»»»»»»»»»» VACFix
!!!Attention, les clés qui suivent ne sont pas forcément infectées!!!
VACFix
Credits: Malware Analysis & Diagnostic
Code: S!Ri
»»»»»»»»»»»»»»»»»»»»»»»» 404Fix
!!!Attention, les clés qui suivent ne sont pas forcément infectées!!!
404Fix
Credits: Malware Analysis & Diagnostic
Code: S!Ri
»»»»»»»»»»»»»»»»»»»»»»»» AntiXPVSTFix
!!!Attention, les clés qui suivent ne sont pas forcément infectées!!!
AntiXPVSTFix
Credits: Malware Analysis & Diagnostic
Code: S!Ri
»»»»»»»»»»»»»»»»»»»»»»»» Sharedtaskscheduler
!!!Attention, les clés qui suivent ne sont pas forcément infectées!!!
SrchSTS.exe by S!Ri
Search SharedTaskScheduler's .dll
»»»»»»»»»»»»»»»»»»»»»»»» AppInit_DLLs
!!!Attention, les clés qui suivent ne sont pas forcément infectées!!!
[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionWindows]
"AppInit_DLLs"="karina.dat"
»»»»»»»»»»»»»»»»»»»»»»»» Winlogon
!!!Attention, les clés qui suivent ne sont pas forcément infectées!!!
[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionWinlogon]
"Userinit"="C:\WINDOWS\system32\userinit.exe,"
"System"=""
»»»»»»»»»»»»»»»»»»»»»»»» RK
»»»»»»»»»»»»»»»»»»»»»»»» DNS
Description: Realtek RTL8139/810x Family Fast Ethernet NIC - Miniport d'ordonnancement de paquets
DNS Server Search Order: 192.168.1.1
HKLMSYSTEMCCSServicesTcpip..{D52417ED-AA7C-43ED-BB8C-925D37C76DA3}: DhcpNameServer=192.168.1.1
HKLMSYSTEMCS1ServicesTcpip..{D52417ED-AA7C-43ED-BB8C-925D37C76DA3}: DhcpNameServer=192.168.1.1
HKLMSYSTEMCS2ServicesTcpip..{D52417ED-AA7C-43ED-BB8C-925D37C76DA3}: DhcpNameServer=192.168.1.1
HKLMSYSTEMCCSServicesTcpipParameters: DhcpNameServer=192.168.1.1
HKLMSYSTEMCS1ServicesTcpipParameters: DhcpNameServer=192.168.1.1
HKLMSYSTEMCS2ServicesTcpipParameters: DhcpNameServer=192.168.1.1
»»»»»»»»»»»»»»»»»»»»»»»» Recherche infection wininet.dll
»»»»»»»»»»»»»»»»»»»»»»»» Fin
Par contre je n'ai pas trouvé le fichier que vous m'avez demandé d'analyser. Celui-ci: C:_WINDOWSsystem32lphcpqoj0en6g.exe .