Malwarebytes' Anti-Malware 1.30
Version de la base de données: 1306
Windows 5.1.2600 Service Pack 3
01/12/2008 19:23:36
mbam-log-2008-12-01 (19-23-36).txt
Type de recherche: Examen complet (C:|)
Eléments examinés: 362868
Temps écoulé: 2 hour(s), 48 minute(s), 37 second(s)
Processus mémoire infecté(s): 0
Module(s) mémoire infecté(s): 1
Clé(s) du Registre infectée(s): 3
Valeur(s) du Registre infectée(s): 0
Elément(s) de données du Registre infecté(s): 2
Dossier(s) infecté(s): 0
Fichier(s) infecté(s): 4
Processus mémoire infecté(s):
(Aucun élément nuisible détecté)
Module(s) mémoire infecté(s):
C:WINDOWSsystem32antiwpa.dll (Malware.Tool) -> Delete on reboot.
Clé(s) du Registre infectée(s):
HKEY_CLASSES_ROOTCLSID{9afb8248-617f-460d-9366-d71cdeda3179} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOTCLSID{afbd14ae-fbeb-daad-6bbc-5f4397a60b64} (Trojan.I.Stole.Windows) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionWinlogonNotifyantiwpa (Trojan.I.Stole.Windows) -> Quarantined and deleted successfully.
Valeur(s) du Registre infectée(s):
(Aucun élément nuisible détecté)
Elément(s) de données du Registre infecté(s):
HKEY_CURRENT_USERSOFTWAREMicrosoftWindowsCurrentVersionPoliciesSystemDisableTaskMgr (Hijack.TaskManager) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.
HKEY_CURRENT_USERSOFTWAREMicrosoftWindowsCurrentVersionPoliciesActiveDesktopNoChangingWallpaper (Hijack.DisplayProperties) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.
Dossier(s) infecté(s):
(Aucun élément nuisible détecté)
Fichier(s) infecté(s):
C:WINDOWSsystem32antiwpa.dll (Trojan.I.Stole.Windows) -> Delete on reboot.
C:WINDOWSsystem32ssqqOGXr.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:WINDOWSsystem32opNEUNEx.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:WINDOWSsvchost.WDL.009 (Heuristics.Reserved.Word.Exploit) -> Quarantined and deleted successfully.
__________________________________________________________________________________________________________________________
SDFix: Version 1.240
Run by Christian on 01/12/2008 at 10:53
Microsoft Windows XP [version 5.1.2600]
Running From: C:Documents and SettingsChristianBureauSDFix
Checking Services :
Restoring Default Security Values
Restoring Default Hosts File
Rebooting
Checking Files :
No Trojan Files Found
Removing Temp Files
ADS Check :
C:WINDOWS
:210010AB90A417FB 24
Total size: 24 bytes.
WINDOWS: deleted 24 bytes in 1 streams.
Checking for remaining Streams
C:WINDOWS
No streams found.
Final Check :
catchme 0.3.1361.2 W2K/XP/Vista - rootkit/stealth malware detector by Gmer,
http://www.gmer.net
Rootkit scan 2008-12-01 19:56:42
Windows 5.1.2600 Service Pack 3 NTFS
scanning hidden processes ...
scanning hidden services & system hive ...
[HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicessptdCfg]
"s1"=dword:2df9c43f
"s2"=dword:110480d0
"h0"=dword:00000001
[HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicessptdCfg19659239224E364682FA4BAF72C53EA4]
"p0"="C:Program FilesDAEMON Tools Lite"
"h0"=dword:00000000
"khjeh"=hex:37,69,df,aa,20,0a,de,60,6b,8b,c1,a2,f3,44,fa,be,b2,b7,9d,9a,ca,..
[HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicessptdCfg19659239224E364682FA4BAF72C53EA4 0000001]
"a0"=hex:20,01,00,00,84,42,d6,97,64,50,e8,6f,2c,cb,ec,e2,38,37,1e,cb,0a,..
"khjeh"=hex:36,07,33,9d,ea,1f,d1,e5,0f,7d,5b,67,49,64,e9,76,ed,a8,33,41,31,..
[HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicessptdCfg19659239224E364682FA4BAF72C53EA4 0000001 Jf40]
"khjeh"=hex:22,9e,b3,fe,4e,25,d7,7e,c5,44,93,b3,ae,fa,7c,11,73,90,62,70,e5,..
[HKEY_LOCAL_MACHINESYSTEMControlSet003ServicessptdCfg19659239224E364682FA4BAF72C53EA4]
"p0"="C:Program FilesDAEMON Tools Lite"
"h0"=dword:00000000
"khjeh"=hex:37,69,df,aa,20,0a,de,60,6b,8b,c1,a2,f3,44,fa,be,b2,b7,9d,9a,ca,..
[HKEY_LOCAL_MACHINESYSTEMControlSet003ServicessptdCfg19659239224E364682FA4BAF72C53EA4 0000001]
"a0"=hex:20,01,00,00,84,42,d6,97,64,50,e8,6f,2c,cb,ec,e2,38,37,1e,cb,0a,..
"khjeh"=hex:36,07,33,9d,ea,1f,d1,e5,0f,7d,5b,67,49,64,e9,76,ed,a8,33,41,31,..
[HKEY_LOCAL_MACHINESYSTEMControlSet003ServicessptdCfg19659239224E364682FA4BAF72C53EA4 0000001 Jf40]
"khjeh"=hex:22,9e,b3,fe,4e,25,d7,7e,c5,44,93,b3,ae,fa,7c,11,73,90,62,70,e5,..
scanning hidden registry entries ...
[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrent Version{8AC25C6A-D4B3-FF2F-2A61-C75CA1DB6116}Install]
[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrent Version{8AC25C6A-D4B3-FF2F-2A61-C75CA1DB6116}InstallVxDs]
"CTE_32 Name"="2454739:{301564B2-67A6-1A66-9C4E-A1FE91DE9752}"
[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionInstall]
[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionInstallxga-1-{21D37979-107A-ACE6-BB9A-A3AEAAE0A3EE}]
[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionInstallxga-1-{21D37979-107A-ACE6-BB9A-A3AEAAE0A3EE}Version 1.1]
"dat"="806585365:{ABB120D3-5567-E35F-DDF2-707AD7958D2D}"
[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Install VBX]
[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Install VBXCurrent]
[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Install VBXCurrentInstall]
[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Install VBXCurrentInstallxga-1-{21D37979-107A-ACE6-BB9A-A3AEAAE0A3EE}]
[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows Install VBXCurrentInstallxga-1-{21D37979-107A-ACE6-BB9A-A3AEAAE0A3EE}Version 3.x]
"dat"="1767914624:{B5ED9841-2783-972B-17D1-6FB89CC13AEA}"
scanning hidden files ...
scan completed successfully
hidden processes: 0
hidden services: 0
hidden files: 0
Remaining Services :
Authorized Application Key Export:
[HKEY_LOCAL_MACHINEsystemcurrentcontrolsetservicessharedaccessparametersfirewallpolicystandardprofileauthorizedapplicationslist]
"%windir%\system32\sessmgr.exe"="%windir%\system32\sessmgr.exe:*:enabled:@xpsp2res.dll,-22019"
"C:\Program Files\ma-config.com\maconfservice.exe"="C:\Program Files\ma-config.com\maconfservice.exe:LocalSubNet:Enabled:maconfservice"
"%windir%\Network Diagnostic\xpnetdiag.exe"="%windir%\Network Diagnostic\xpnetdiag.exe:*:Enabled:@xpsp3res.dll,-20000"
"G:\Documents and Settings\Christian\Extreme e-mule\emule.exe"="G:\Documents and Settings\Christian\Extreme e-mule\emule.exe:*:Enabled:eMule"
"C:\Program Files\Real\RealPlayer\realplay.exe"="C:\Program Files\Real\RealPlayer\realplay.exe:*:Enabled:RealPlayer"
"C:\Program Files\IncrediMail\bin\ImApp.exe"="C:\Program Files\IncrediMail\bin\ImApp.exe:*:Enabled:IncrediMail"
"C:\Program Files\IncrediMail\bin\IncMail.exe"="C:\Program Files\IncrediMail\bin\IncMail.exe:*:Enabled:IncrediMail"
"C:\Program Files\IncrediMail\bin\ImpCnt.exe"="C:\Program Files\IncrediMail\bin\ImpCnt.exe:*:Enabled:IncrediMail"
"C:\Documents and Settings\Christian\Extreme e-mule\emule.exe"="C:\Documents and Settings\Christian\Extreme e-mule\emule.exe:*:Enabled:eMule"
"C:\Program Files\Bonjour\mDNSResponder.exe"="C:\Program Files\Bonjour\mDNSResponder.exe:*:Enabled:Bonjour"
"C:\Program Files\Microsoft Office\Office12\OUTLOOK.EXE"="C:\Program Files\Microsoft Office\Office12\OUTLOOK.EXE:*:Enabled:Microsoft Office Outlook"
"C:\Program Files\uTorrent\uTorrent.exe"="C:\Program Files\uTorrent\uTorrent.exe:*:Enabled:æTorrent"
"C:\WINDOWS\system32\dpvsetup.exe"="C:\WINDOWS\system32\dpvsetup.exe:*:Enabled:Microsoft DirectPlay Voice Test"
"C:\WINDOWS\system32\rundll32.exe"="C:\WINDOWS\system32\rundll32.exe:*:Enabled:Ex,cuter une DLL en tant qu'application"
"C:\Program Files\Fichiers communs\Nero\Nero Web\SetupX.exe"="C:\Program Files\Fichiers communs\Nero\Nero Web\SetupX.exe:*:Enabled:Nero ControlCenter"
"C:\Documents and Settings\Christian\Local Settings\Temp\OnlineUpdate8\SetupXu.exe"="C:\Documents and Settings\Christian\Local Settings\Temp\OnlineUpdate8\SetupXu.exe:*:Enabled:Nero ControlCenter"
"C:\Program Files\Vuze\Azureus.exe"="C:\Program Files\Vuze\Azureus.exe:*:Enabled:Azureus"
[HKEY_LOCAL_MACHINEsystemcurrentcontrolsetservicessharedaccessparametersfirewallpolicydomainprofileauthorizedapplicationslist]
"%windir%\system32\sessmgr.exe"="%windir%\system32\sessmgr.exe:*:enabled:@xpsp2res.dll,-22019"
"%windir%\Network Diagnostic\xpnetdiag.exe"="%windir%\Network Diagnostic\xpnetdiag.exe:*:Enabled:@xpsp3res.dll,-20000"
Remaining Files :
Files with Hidden Attributes :
Tue 30 Sep 2008 24 ..SH. --- "C:WINDOWSSFA8A0808.tmp"
Mon 17 Nov 2008 1,998,848 ...H. --- "C:Program Files7 Wonders of the WorldWonders.exe"
Fri 7 Mar 2008 2,876,744 ...H. --- "C:Program FilesCradle of PersiaCradleOfPersia.exe"
Fri 11 Jan 2008 1,336,648 ...H. --- "C:Program FilesMagic Ball 2MagicBall2.exe"
Fri 11 Jan 2008 726,344 ...H. --- "C:Program FilesMosaic Tomb of MysteryMosaic.exe"
Wed 21 May 2008 14,091,592 ...H. --- "C:Program FilesMystery Case Files - Madame FateMadameFate.exe"
Wed 22 Oct 2008 949,072 A.SHR --- "C:Program FilesSpybot - Search & Destroyadvcheck.dll"
Mon 15 Sep 2008 1,562,960 A.SHR --- "C:Program FilesSpybot - Search & DestroySDHelper.dll"
Mon 7 Jul 2008 1,429,840 A.SHR --- "C:Program FilesSpybot - Search & DestroySDUpdate.exe"
Mon 7 Jul 2008 4,891,472 A.SHR --- "C:Program FilesSpybot - Search & DestroySpybotSD.exe"
Tue 16 Sep 2008 1,833,296 A.SHR --- "C:Program FilesSpybot - Search & DestroyTeaTimer.exe"
Wed 22 Oct 2008 962,896 A.SHR --- "C:Program FilesSpybot - Search & DestroyTools.dll"
Sat 26 Jul 2008 20,652 A..H. --- "C:Documents and SettingsNadineMes documentsTravaux Nanou~WRL0003.tmp"
Mon 20 Oct 2008 28,160 ...H. --- "C:Documents and SettingsChristianBureauDivers ChristianDivers docs~WRL0003.tmp"
Sat 19 Jul 2008 1,881 A..HR --- "C:Documents and SettingsNadineApplication DataSecuROMUserDatasecurom_v7_01.bak"
Mon 27 Nov 2006 9,506 A.SH. --- "C:Documents and SettingsNadineMes documentsMa musiqueSauvegarde de la licencedrmv2key.bak"
Finished!
___________________________________________________________________________________________________________________________
SmitFraudFix v2.380
Rapport fait à 20:23:07,14, 01/12/2008
Executé à partir de C:Documents and SettingsChristianBureauSmitfraudFix
OS: Microsoft Windows XP [version 5.1.2600] - Windows_NT
Le type du système de fichiers est NTFS
Fix executé en mode normal
»»»»»»»»»»»»»»»»»»»»»»»» Process
C:WINDOWSSystem32smss.exe
C:WINDOWSsystem32winlogon.exe
C:WINDOWSsystem32services.exe
C:WINDOWSsystem32lsass.exe
C:WINDOWSsystem32svchost.exe
C:WINDOWSSystem32svchost.exe
C:Program FilesIntelWiFiinS24EvMon.exe
C:Program FilesAlwil SoftwareAvast4aswUpdSv.exe
C:Program FilesAlwil SoftwareAvast4ashServ.exe
C:WINDOWSsystem32spoolsv.exe
c:program filesfichiers communslogitechlvmvfmLVPrcSrv.exe
C:WINDOWSsystem32agrsmsvc.exe
C:Program FilesIntelWiFiinEvtEng.exe
C:Program FilesNeroNero8Nero BackItUpNBService.exe
C:WINDOWSsystem32
vsvc32.exe
C:WINDOWSsystem32IoctlSvc.exe
C:Program FilesFichiers communsIntelWirelessCommonRegSrvc.exe
C:WINDOWSsystem32svchost.exe
C:WINDOWSExplorer.EXE
C:WINDOWSsystem32ctfmon.exe
C:PROGRA~1ALWILS~1Avast4ashDisp.exe
C:WINDOWSRTHDCPL.EXE
C:WINDOWSsystem32LVCOMSX.EXE
C:WINDOWSsystem32ElkCtrl.exe
C:Program FilesBrotherBrmfcmonBrMfcWnd.exe
C:Program FilesJavajre1.6.0_07injusched.exe
C:Program FilesFichiers communsRealUpdate_OB
ealsched.exe
C:Program FilesBrotherControlCenter3rccMCtl.exe
C:WINDOWSsystem32frmwrk32.exe
C:Program FilesMessengermsmsgs.exe
C:Program FilesIncrediMailinIMApp.exe
C:Program FilesBrotherBrmfcmonBrMfimon.exe
C:Program FilesInternet ExplorerIEXPLORE.EXE
C:WINDOWSsystem32cmd.exe
C:WINDOWSsystem32wscntfy.exe
»»»»»»»»»»»»»»»»»»»»»»»» hosts
»»»»»»»»»»»»»»»»»»»»»»»» C:
»»»»»»»»»»»»»»»»»»»»»»»» C:WINDOWS
»»»»»»»»»»»»»»»»»»»»»»»» C:WINDOWSsystem
»»»»»»»»»»»»»»»»»»»»»»»» C:WINDOWSWeb
»»»»»»»»»»»»»»»»»»»»»»»» C:WINDOWSsystem32
»»»»»»»»»»»»»»»»»»»»»»»» C:Documents and SettingsChristian
»»»»»»»»»»»»»»»»»»»»»»»» C:DOCUME~1CHRIST~1LOCALS~1Temp
»»»»»»»»»»»»»»»»»»»»»»»» C:Documents and SettingsChristianApplication Data
»»»»»»»»»»»»»»»»»»»»»»»» Menu Démarrer
»»»»»»»»»»»»»»»»»»»»»»»» C:DOCUME~1CHRIST~1Favoris
»»»»»»»»»»»»»»»»»»»»»»»» Bureau
»»»»»»»»»»»»»»»»»»»»»»»» C:Program Files
»»»»»»»»»»»»»»»»»»»»»»»» Clés corrompues
»»»»»»»»»»»»»»»»»»»»»»»» Eléments du bureau
[HKEY_CURRENT_USERSoftwareMicrosoftInternet ExplorerDesktopComponents ]
"Source"="About:Home"
"SubscribedURL"="About:Home"
"FriendlyName"="Ma page d'accueil"
»»»»»»»»»»»»»»»»»»»»»»»» o4Patch
!!!Attention, les clés qui suivent ne sont pas forcément infectées!!!
o4Patch
Credits: Malware Analysis & Diagnostic
Code: S!Ri
»»»»»»»»»»»»»»»»»»»»»»»» IEDFix
!!!Attention, les clés qui suivent ne sont pas forcément infectées!!!
IEDFix
Credits: Malware Analysis & Diagnostic
Code: S!Ri
»»»»»»»»»»»»»»»»»»»»»»»» VACFix
!!!Attention, les clés qui suivent ne sont pas forcément infectées!!!
VACFix
Credits: Malware Analysis & Diagnostic
Code: S!Ri
»»»»»»»»»»»»»»»»»»»»»»»» 404Fix
!!!Attention, les clés qui suivent ne sont pas forcément infectées!!!
404Fix
Credits: Malware Analysis & Diagnostic
Code: S!Ri
»»»»»»»»»»»»»»»»»»»»»»»» Sharedtaskscheduler
!!!Attention, les clés qui suivent ne sont pas forcément infectées!!!
SrchSTS.exe by S!Ri
Search SharedTaskScheduler's .dll
»»»»»»»»»»»»»»»»»»»»»»»» AppInit_DLLs
!!!Attention, les clés qui suivent ne sont pas forcément infectées!!!
[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionWindows]
"AppInit_DLLs"=""
»»»»»»»»»»»»»»»»»»»»»»»» Winlogon
!!!Attention, les clés qui suivent ne sont pas forcément infectées!!!
[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionWinlogon]
"Userinit"="C:\WINDOWS\system32\userinit.exe,"
"System"=""
»»»»»»»»»»»»»»»»»»»»»»»» RK
»»»»»»»»»»»»»»»»»»»»»»»» DNS
HKLMSYSTEMCS3ServicesTcpip..{F7D42882-11B8-4519-B7CD-67369A023A0D}: DhcpNameServer=192.168.1.1
HKLMSYSTEMCS3ServicesTcpipParameters: DhcpNameServer=192.168.1.1
»»»»»»»»»»»»»»»»»»»»»»»» Recherche infection wininet.dll
»»»»»»»»»»»»»»»»»»»»»»»» Fin