ituneshelper.vbe 2013-11-30T12:38:25+00:00
  • Auteur
    Messages
  • Moussa
    Participant
    Post count: 11

    Bonjour,
    Comme beaucoup d’autre, mes 2 clé USB ont été infectés par une/des virus. Sur l’une des clés, mes fichiers ont été changés en raccourci. Sur l’autre, mes dossiers et fichiers ne sont pas visibles (malgré que les dossiers, fichiers et programmes cachés sont sensés être visibles) alors qu’il y a bien 4,11 Go d’espace utilisé. Je sais qu’il y a le virus ituneshelper.vbe mais peut être y en a t’il d’autres, c’est pourquoi je demande votre aide =D Je n’ai pas encore effacé le virus, je n’ai effectué que les analyses.

    Voici les rapports:

    UsbFix:
    [spoiler:1qkeuv59]############################## | UsbFix V 7.152 | [Recherche]

    Utilisateur: Jiba (Administrateur) # JIBA-PC
    Mis à jour le 20/11/2013 par El Desaparecido – Team SosVirus
    Lancé à 11:57:03 | 30/11/2013

    Site Web : http://www.usbfix.net” onclick=”window.open(this.href);return false;
    Forum : https://www.sosvirus.net/” onclick=”window.open(this.href);return false;
    Upload Malware : upload_malware.php
    Contact : http://www.usbfix.net/contact/” onclick=”window.open(this.href);return false;

    PC: TOSHIBA (Portable PC)
    CPU: Pentium(R) Dual-Core CPU T4500 @ 2.30GHz
    RAM -> [Total : 2940 | Free : 2059]
    Bios: INSYDE
    Boot: Normal boot

    OS: Microsoft Windows 7 Édition Familiale Premium (6.1.7601 64-Bit) Service Pack 1
    WB: Windows Internet Explorer : 11.0.9600.16428
    WB: Google Chrome : 31.0.1650.57

    SC: Security Center Service [Enabled]
    WU: Windows Update Service [Enabled]
    AV: avast! Antivirus [(!) Disabled | Updated]
    AS: Windows Defender : 6.1.7600.16385 (win7_rtm.090713-1255)
    FW: Windows FireWall Service [Enabled]

    C: (%systemdrive%) -> Disque fixe # 466 Go (408 Go libre(s) – 88%) [] # NTFS
    D: -> CD-ROM
    F: -> Disque amovible # 7 Go (3 Go libre(s) – 45%) [FLO] # FAT32
    G: -> CD-ROM
    H: -> Disque amovible # 4 Go (3 Go libre(s) – 73%) [TRAVAUXJF] # FAT32

    ################## | Processus Actif |

    C:Windowssystem32csrss.exe (ID: 440 |ParentID: 432)
    C:Windowssystem32wininit.exe (ID: 492 |ParentID: 432)
    C:Windowssystem32csrss.exe (ID: 516 |ParentID: 504)
    C:Windowssystem32services.exe (ID: 556 |ParentID: 492)
    C:Windowssystem32lsass.exe (ID: 580 |ParentID: 492)
    C:Windowssystem32lsm.exe (ID: 588 |ParentID: 492)
    C:Windowssystem32winlogon.exe (ID: 648 |ParentID: 504)
    C:Windowssystem32svchost.exe (ID: 736 |ParentID: 556)
    C:Program Files (x86)Common FilesCOMODOlauncher_service.exe (ID: 808 |ParentID: 556)
    C:Windowssystem32svchost.exe (ID: 844 |ParentID: 556)
    C:Program FilesCOMODOCOMODO Internet Securitycmdagent.exe (ID: 892 |ParentID: 556)
    C:Windowssystem32svchost.exe (ID: 964 |ParentID: 556)
    C:WindowsSystem32svchost.exe (ID: 108 |ParentID: 556)
    C:WindowsSystem32svchost.exe (ID: 460 |ParentID: 556)
    C:Windowssystem32svchost.exe (ID: 548 |ParentID: 556)
    C:Windowssystem32svchost.exe (ID: 584 |ParentID: 556)
    C:Program FilesAVAST SoftwareAvastAvastSvc.exe (ID: 1256 |ParentID: 556)
    C:WindowsSystem32spoolsv.exe (ID: 1460 |ParentID: 556)
    C:Windowssystem32taskhost.exe (ID: 1516 |ParentID: 556)
    C:Windowssystem32Dwm.exe (ID: 1524 |ParentID: 460)
    C:WindowsExplorer.EXE (ID: 1812 |ParentID: 1452)
    C:Windowssystem32svchost.exe (ID: 1900 |ParentID: 556)
    C:Program Files (x86)Common FilesAdobeARM1.0armsvc.exe (ID: 1184 |ParentID: 556)
    C:Program Files (x86)Common FilesAppleMobile Device SupportAppleMobileDeviceService.exe (ID: 2088 |ParentID: 556)
    C:WindowsSystem32igfxtray.exe (ID: 2104 |ParentID: 1812)
    C:WindowsSystem32hkcmd.exe (ID: 2112 |ParentID: 1812)
    C:WindowsSystem32igfxpers.exe (ID: 2124 |ParentID: 1812)
    C:Program FilesSynapticsSynTPSynTPEnh.exe (ID: 2356 |ParentID: 1812)
    C:Program FilesCOMODOCOMODO Internet Securitycistray.exe (ID: 2480 |ParentID: 1812)
    C:Program Files (x86)Common FilesCOMODOGeekBuddyRSP.exe (ID: 2580 |ParentID: 2488)
    C:Program FilesAVAST SoftwareAvastAvastUI.exe (ID: 2620 |ParentID: 2488)
    C:Program Files (x86)Common FilesJavaJava Updatejusched.exe (ID: 2664 |ParentID: 2488)
    C:Program Files (x86)iTunesiTunesHelper.exe (ID: 2688 |ParentID: 2488)
    C:Program FilesBonjourmDNSResponder.exe (ID: 2816 |ParentID: 556)
    C:Program Files (x86)ComodoDragondragon_updater.exe (ID: 2944 |ParentID: 556)
    C:Windowssystem32svchost.exe (ID: 2984 |ParentID: 556)
    C:Program Files (x86)Common FilesCOMODOGeekBuddyRSP.exe (ID: 3032 |ParentID: 556)
    C:Windowssystem32svchost.exe (ID: 2328 |ParentID: 556)
    C:Program FilesCommon FilesMicrosoft SharedWindows LiveWLIDSVC.EXE (ID: 2552 |ParentID: 556)
    C:Windowssystem32SearchIndexer.exe (ID: 3104 |ParentID: 556)
    C:Program FilesCommon FilesMicrosoft SharedWindows LiveWLIDSvcM.exe (ID: 3212 |ParentID: 2552)
    C:Program FilesiPodbiniPodService.exe (ID: 3332 |ParentID: 556)
    C:Windowssystem32svchost.exe (ID: 3452 |ParentID: 556)
    C:PROGRAM FILESSYNAPTICSSYNTPSYNTPHELPER.EXE (ID: 3824 |ParentID: 2388)
    C:WindowsSystem32WUDFHost.exe (ID: 3984 |ParentID: 460)
    C:Program FilesCOMODOCOMODO Internet Securitycavwp.exe (ID: 3960 |ParentID: 736)
    C:Program FilesWindows Media Playerwmpnetwk.exe (ID: 3772 |ParentID: 556)
    C:WindowsSystem32svchost.exe (ID: 4156 |ParentID: 556)
    C:Program FilesCOMODOCOMODO Internet Securitycis.exe (ID: 5028 |ParentID: 2480)
    C:Windowssystem32DllHost.exe (ID: 4972 |ParentID: 736)
    C:WindowsSystem32svchost.exe (ID: 5428 |ParentID: 556)
    C:UsbFixGo.exe (ID: 3776 |ParentID: 2876)
    C:Windowssystem32wbemwmiprvse.exe (ID: 172 |ParentID: 736)

    ################## | Regedit Run |

    04 – HKLMSOFTWARE | Run : [tvncontrol] – “C:Program Files (x86)Common FilesCOMODOGeekBuddyRSP.exe” -controlservice -slave
    04 – HKLMSOFTWARE | Run : [AvastUI.exe] – “C:Program FilesAVAST SoftwareAvastAvastUI.exe” /nogui
    04 – HKLMSOFTWARE | Run : [SunJavaUpdateSched] – “C:Program Files (x86)Common FilesJavaJava Updatejusched.exe”
    04 – HKLMSOFTWARE | Run : [Adobe ARM] – “C:Program Files (x86)Common FilesAdobeARM1.0AdobeARM.exe”
    04 – HKLMSOFTWARE | Run : [APSDaemon] – “C:Program Files (x86)Common FilesAppleApple Application SupportAPSDaemon.exe”
    04 – HKLMSOFTWARE | Run : [iTunesHelper] – “C:Program Files (x86)iTunesiTunesHelper.exe”
    04 – HKLMSOFTWARE | Run : [20131121] – C:Program FilesAVAST SoftwareAvastsetupemupdateeb16c699-0587-433b-b922-433f3eb0a70b.exe /check
    04 – HKLMSOFTWAREwow6432Node | Run : [tvncontrol] – “C:Program Files (x86)Common FilesCOMODOGeekBuddyRSP.exe” -controlservice -slave
    04 – HKLMSOFTWAREwow6432Node | Run : [AvastUI.exe] – “C:Program FilesAVAST SoftwareAvastAvastUI.exe” /nogui
    04 – HKLMSOFTWAREwow6432Node | Run : [SunJavaUpdateSched] – “C:Program Files (x86)Common FilesJavaJava Updatejusched.exe”
    04 – HKLMSOFTWAREwow6432Node | Run : [Adobe ARM] – “C:Program Files (x86)Common FilesAdobeARM1.0AdobeARM.exe”
    04 – HKLMSOFTWAREwow6432Node | Run : [APSDaemon] – “C:Program Files (x86)Common FilesAppleApple Application SupportAPSDaemon.exe”
    04 – HKLMSOFTWAREwow6432Node | Run : [iTunesHelper] – “C:Program Files (x86)iTunesiTunesHelper.exe”
    04 – HKLMSOFTWAREwow6432Node | Run : [20131121] – C:Program FilesAVAST SoftwareAvastsetupemupdateeb16c699-0587-433b-b922-433f3eb0a70b.exe /check
    04 – HKLMSOFTWARE | RunOnce : [] –
    04 – HKLMSOFTWAREwow6432Node | RunOnce : [] –
    04 – HKUS-1-5-19SOFTWARE | Run : [Sidebar] – %ProgramFiles%Windows SidebarSidebar.exe /autoRun
    04 – HKUS-1-5-20SOFTWARE | Run : [Sidebar] – %ProgramFiles%Windows SidebarSidebar.exe /autoRun
    04 – HKUS-1-5-19SOFTWARE | RunOnce : [mctadmin] – C:WindowsSystem32mctadmin.exe
    04 – HKUS-1-5-20SOFTWARE | RunOnce : [mctadmin] – C:WindowsSystem32mctadmin.exe

    ################## | Recherche générique |

    Présent! H:Article Bioch.lnk
    Présent! H:A7KGEquN.lnk
    Présent! C:UsersJibaAppDataRoamingMicrosoftWindowsStart MenuProgramsStartupiTunesHelper.vbe
    Présent! H:iTunesHelper.vbe
    Présent! H:SergeLeLama.vbs

    ################## | Référence de comparaison MD5 |

    Md5 : AED4FAF279ABF7D7605E81707BE3CE64 -> C:UsersJibaAppDataRoamingMicrosoftWindowsStart MenuProgramsStartupiTunesHelper.vbe
    Md5 : AED4FAF279ABF7D7605E81707BE3CE64 -> H:iTunesHelper.vbe
    Md5 : 304439A2E8278F31E4E42DD145C65B48 -> H:SergeLeLama.vbs

    ################## | Comparaison MD5 |

    Présent! Md5 : AED4FAF279ABF7D7605E81707BE3CE64 -> C:UsersJibaAppDataRoamingMicrosoftWindowsStart MenuProgramsStartupiTunesHelper.vbe
    Présent! Md5 : AED4FAF279ABF7D7605E81707BE3CE64 -> C:VTRootHarddiskVolume2UsersJibaAppDataLocalTempiTunesHelper.vbe
    Présent! Md5 : AED4FAF279ABF7D7605E81707BE3CE64 -> C:VTRootHarddiskVolume2UsersJibaAppDataRoamingMicrosoftWindowsStart MenuProgramsStartupiTunesHelper.vbe
    Présent! Md5 : AED4FAF279ABF7D7605E81707BE3CE64 -> H:iTunesHelper.vbe
    Présent! Md5 : 304439A2E8278F31E4E42DD145C65B48 -> H:SergeLeLama.vbs

    ################## | Registre |

    Présent! HKLMSOFTWAREMicrosoftWindowsCurrentVersionPoliciesExplorer|NoActiveDesktop -> 1
    Présent! HKLMSOFTWAREMicrosoftWindowsCurrentVersionPoliciesExplorer|NoActiveDesktopChanges -> 1

    ################## | Vaccin |

    (!) Cet ordinateur n'est pas vacciné!

    ################## | E.O.F | http://www.usbfix.net” onclick=”window.open(this.href);return false; – https://www.sosvirus.net” onclick=”window.open(this.href);return false; |[/spoiler:1qkeuv59]

    MbAM (qui n’a rien trouvé)
    [spoiler:1qkeuv59]Malwarebytes Anti-Malware (Essai) 1.75.0.1300
    http://www.malwarebytes.org” onclick=”window.open(this.href);return false;

    Version de la base de données: v2013.11.30.03

    Windows 7 Service Pack 1 x64 NTFS
    Internet Explorer 11.0.9600.16428
    Jiba :: JIBA-PC [administrateur]

    Protection: Activé

    30/11/2013 12:28:07
    mbam-log-2013-11-30 (12-28-07).txt

    Type d'examen: Examen rapide
    Options d'examen activées: Mémoire | Démarrage | Registre | Système de fichiers | Heuristique/Extra | Heuristique/Shuriken | PUP | PUM
    Options d'examen désactivées: P2P
    Elément(s) analysé(s): 201993
    Temps écoulé: 3 minute(s), 14 seconde(s)

    Processus mémoire détecté(s): 0
    (Aucun élément nuisible détecté)

    Module(s) mémoire détecté(s): 0
    (Aucun élément nuisible détecté)

    Clé(s) du Registre détectée(s): 0
    (Aucun élément nuisible détecté)

    Valeur(s) du Registre détectée(s): 0
    (Aucun élément nuisible détecté)

    Elément(s) de données du Registre détecté(s): 0
    (Aucun élément nuisible détecté)

    Dossier(s) détecté(s): 0
    (Aucun élément nuisible détecté)

    Fichier(s) détecté(s): 0
    (Aucun élément nuisible détecté)

    (fin)[/spoiler:1qkeuv59]

    AdwCleaner
    [spoiler:1qkeuv59]# AdwCleaner v3.013 – Rapport créé le 30/11/2013 à 12:39:51
    # Mis à jour le 24/11/2013 par Xplode
    # Système d'exploitation : Windows 7 Home Premium Service Pack 1 (64 bits)
    # Nom d'utilisateur : Jiba – JIBA-PC
    # Exécuté depuis : C:UsersJibaDesktopadwcleaner.exe
    # Option : Nettoyer

    ***** [ Services ] *****

    ***** [ Fichiers / Dossiers ] *****

    Dossier Supprimé : C:UsersJibaAppDataRoamingdvdvideosoftiehelpers

    ***** [ Raccourcis ] *****

    ***** [ Registre ] *****

    Clé Supprimée : HKLMSOFTWAREClassesCLSID{EE932B49-D5C0-4D19-A3DA-CE0849258DE6}
    Clé Supprimée : HKLMSOFTWAREMicrosoftWindowsCurrentVersionExplorerBrowser Helper Objects{EE932B49-D5C0-4D19-A3DA-CE0849258DE6}
    Clé Supprimée : HKCUSoftwareMicrosoftWindowsCurrentVersionExtStats{EE932B49-D5C0-4D19-A3DA-CE0849258DE6}
    Clé Supprimée : HKCUSoftwareMicrosoftWindowsCurrentVersionExtSettings{EE932B49-D5C0-4D19-A3DA-CE0849258DE6}
    Clé Supprimée : HKLMSOFTWAREMicrosoftInternet ExplorerExtensions{EE932B49-D5C0-4D19-A3DA-CE0849258DE6}
    Clé Supprimée : [x64] HKLMSOFTWAREClassesCLSID{EE932B49-D5C0-4D19-A3DA-CE0849258DE6}
    Clé Supprimée : [x64] HKLMSOFTWAREMicrosoftWindowsCurrentVersionExplorerBrowser Helper Objects{EE932B49-D5C0-4D19-A3DA-CE0849258DE6}

    ***** [ Navigateurs ] *****

    -\ Internet Explorer v11.0.9600.16428

    -\ Google Chrome v31.0.1650.57

    [ Fichier : C:UsersJibaAppDataLocalGoogleChromeUser DataDefaultpreferences ]

    *************************

    AdwCleaner[R0].txt – [1646 octets] – [30/11/2013 12:35:45]
    AdwCleaner[S0].txt – [1569 octets] – [30/11/2013 12:39:51]

    ########## EOF – C:AdwCleanerAdwCleaner[S0].txt – [1629 octets] ##########[/spoiler:1qkeuv59]

    ZHPDiag
    [spoiler:1qkeuv59]~ Rapport de ZHPDiag v2013.11.28.59 – Nicolas Coolman (28/11/2013)
    ~ Lancé par Jiba (30/11/2013 12:44:58)
    ~ Adresse du Site Web http://nicolascoolman.webs.com” onclick=”window.open(this.href);return false;
    ~ Forums gratuits d'Assistance à la désinfection : http://nicolascoolman.webs.com/apps/links/” onclick=”window.open(this.href);return false;
    ~ Traduit par Nicolas Coolman
    ~ Etat de la version :
    ~ Liste blanche : Activée par le programme
    ~ Elévation des Privilèges : OK
    ~ User Account Control (UAC): Activate by user

    —\ Navigateurs Internet
    MSIE: Internet Explorer v11.0.9600.16428
    GCIE: Google Chrome v31.0.1650.57 (Defaut)

    —\ Informations sur les produits Windows
    ~ Langage: Français
    Windows 7 Home Premium Edition, 64-bit Service Pack 1 (Build 7601)
    Windows Server License Manager Script : OK
    ~ Windows(R) 7, OEM_COA_SLP channel
    Windows ID Activation : OK
    ~ Windows Partial Key : JG2DB
    Windows License : OK
    ~ Windows Remaining Initializations Number : 4
    Software Protection Service (Protection logicielle) : OK
    Windows Automatic Updates : OK
    Windows Activation Technologies : OK

    —\ Logiciels de protection du système
    avast! Free Antivirus v9.0.2006
    COMODO Firewall v6.3.35694.2953
    Malwarebytes Anti-Malware version 1.75.0.1300
    Windows Defender W7

    —\ Logiciels d'optimisation du système
    CCleaner v4.07 =>Piriform Ltd

    —\ Logiciels de partage PeerToPeer

    —\ Surveillance de Logiciels
    Adobe Reader XI
    Java 7 Update 45
    Java 7 Update 45

    —\ Informations sur le système
    ~ Processor: Intel64 Family 6 Model 23 Stepping 10, GenuineIntel
    ~ Operating System: 64 Bits
    Boot mode: Normal (Normal boot)
    Total RAM: 2940 MB (43% free)
    System Restore: Activé (Enable)
    System drive C: has 408 GB (87%) free of 466 GB

    —\ Mode de connexion au système
    ~ Computer Name: JIBA-PC
    ~ User Name: Jiba
    ~ All Users Names: Jiba, HomeGroupUser$, Administrateur,
    ~ Unselected Option: None
    Logged in as Administrator

    —\ Variables d'environnement
    ~ System Unit : C:
    ~ %AppZHP% : C:UsersJibaAppDataRoamingZHP
    ~ %AppData% : C:UsersJibaAppDataRoaming
    ~ %Desktop% : C:UsersJibaDesktop
    ~ %Favorites% : C:UsersJibaFavorites
    ~ %LocalAppData% : C:UsersJibaAppDataLocal
    ~ %StartMenu% : C:UsersJibaAppDataRoamingMicrosoftWindowsStart Menu
    ~ %Windir% : C:Windows
    ~ %System% : C:WindowsSystem32

    —\ Enumération des unités disques
    C: Hard drive, Flash drive, Thumb drive (Free 408 Go of 466 Go)
    D: CD-ROM drive (Not Inserted)
    E: Floppy drive, Flash card reader, USB Key (Not Inserted)
    F: Floppy drive, Flash card reader, USB Key (Free 3 Go of 7 Go)
    G: CD-ROM drive (Not Inserted)
    H: Floppy drive, Flash card reader, USB Key (Free 3 Go of 4 Go)

    —\ Etat du Centre de Sécurité Windows
    [HKLMSOFTWAREMicrosoftWindowsCurrentVersionPoliciesExplorer] NoActiveDesktopChanges: Modified
    ~ Security Center: 41 Legitimates Filtered in 00mn 00s

    —\ Recherche particulière de fichiers génériques
    [MD5.332FEAB1435662FC6C672E25BEB37BE3] – (.Microsoft Corporation – Explorateur Windows.) (.25/02/2011 – 07:19:30.) — C:WindowsExplorer.exe [2871808]
    [MD5.94355C28C1970635A31B3FE52EB7CEBA] – (.Microsoft Corporation – Application de démarrage de Windows.) (.14/07/2009 – 02:39:52.) — C:WindowsSystem32Wininit.exe [129024]
    [MD5.E6CB36B85BE59095337427E853A5B65A] – (.Microsoft Corporation – Extensions Internet pour Win32.) (.26/11/2013 – 23:27:24.) — C:WindowsSystem32wininet.dll [2332160]
    [MD5.1151B1BAA6F350B1DB6598E0FEA7C457] – (.Microsoft Corporation – Application d’ouverture de session Windows.) (.20/11/2010 – 14:25:30.) — C:WindowsSystem32Winlogon.exe [390656]
    [MD5.067FA52BFB59A56110A12312EF9AF243] – (.Microsoft Corporation – Bibliothèque de licences.) (.20/11/2010 – 14:27:26.) — C:WindowsSystem32sppcomapi.dll [232448]
    [MD5.79059559E89D06E8B80CE2944BE20228] – (.Microsoft Corporation – Ancillary Function Driver for WinSock.) (.28/09/2013 – 02:09:10.) — C:Windowssystem32DriversAFD.sys [497152]
    [MD5.02062C0B390B7729EDC9E69C680A6F3C] – (.Microsoft Corporation – ATAPI IDE Miniport Driver.) (.14/07/2009 – 02:52:21.) — C:Windowssystem32Driversatapi.sys [24128]
    [MD5.B8BD2BB284668C84865658C77574381A] – (.Microsoft Corporation – CD-ROM File System Driver.) (.14/07/2009 – 00:19:47.) — C:Windowssystem32DriversCdfs.sys [92160]
    [MD5.F036CE71586E93D94DAB220D7BDF4416] – (.Microsoft Corporation – SCSI CD-ROM Driver.) (.20/11/2010 – 10:19:21.) — C:Windowssystem32DriversCdrom.sys [147456]
    [MD5.9BB2EF44EAA163B29C4A4587887A0FE4] – (.Microsoft Corporation – DFS Namespace Client Driver.) (.20/11/2010 – 10:26:32.) — C:Windowssystem32DriversDfsC.sys [102400]
    [MD5.97BFED39B6B79EB12CDDBFEED51F56BB] – (.Microsoft Corporation – High Definition Audio Bus Driver.) (.20/11/2010 – 11:43:43.) — C:Windowssystem32DriversHDAudBus.sys [122368]
    [MD5.FA55C73D4AFFA7EE23AC4BE53B4592D3] – (.Microsoft Corporation – Pilote de port i8042.) (.14/07/2009 – 00:19:57.) — C:Windowssystem32Driversi8042prt.sys [105472]
    [MD5.AF9B39A7E7B6CAA203B3862582E9F2D0] – (.Microsoft Corporation – IP Network Address Translator.) (.14/07/2009 – 01:10:03.) — C:Windowssystem32DriversIpNat.sys [116224]
    [MD5.A5D9106A73DC88564C825D317CAC68AC] – (.Microsoft Corporation – Windows NT SMB Minirdr.) (.27/04/2011 – 03:40:40.) — C:Windowssystem32DriversMRxSmb.sys [158208]
    [MD5.09594D1089C523423B32A4229263F068] – (.Microsoft Corporation – MBT Transport driver.) (.20/11/2010 – 10:23:20.) — C:Windowssystem32DriversnetBT.sys [261632]
    [MD5.B98F8C6E31CD07B2E6F71F7F648E38C0] – (.Microsoft Corporation – Pilote du système de fichiers NT.) (.12/04/2013 – 15:45:08.) — C:Windowssystem32Driversntfs.sys [1656680]
    [MD5.0086431C29C35BE1DBC43F52CC273887] – (.Microsoft Corporation – Pilote de port parallèle.) (.14/07/2009 – 01:00:41.) — C:Windowssystem32DriversParport.sys [97280]
    [MD5.471815800AE33E6F1C32FB1B97C490CA] – (.Microsoft Corporation – RAS L2TP mini-port/call-manager driver.) (.20/11/2010 – 11:52:35.) — C:Windowssystem32DriversRasl2tp.sys [129536]
    [MD5.548260A7B8654E024DC30BF8A7C5BAA4] – (.Microsoft Corporation – SMB Transport driver.) (.14/07/2009 – 01:09:09.) — C:Windowssystem32Driverssmb.sys [93184]
    [MD5.DDAD5A7AB24D8B65F8D724F5C20FD806] – (.Microsoft Corporation – TDI Translation Driver.) (.20/11/2010 – 10:21:56.) — C:Windowssystem32Driverstdx.sys [119296]
    [MD5.0D08D2F3B3FF84E433346669B5E0F639] – (.Microsoft Corporation – Pilote de cliché instantané du volume.) (.20/11/2010 – 14:34:02.) — C:Windowssystem32Driversvolsnap.sys [295808]
    ~ Generic Processes: Scanned in 00mn 00s

    —\ Etat des fichiers cachés (Caché/Total)
    ~ Mes images (My Pictures) : 2/7
    ~ Mes musiques (My Musics) : 12/432
    ~ Mes Videos (My Videos) : 1/68
    ~ Mes Favoris (My Favorites) : 1/17
    ~ Mes Documents (My Documents) : 1/32
    ~ Mon Bureau (My Desktop) : 1/21
    ~ Menu demarrer (Programs) : 1/27
    ~ Hidden Files: Scanned in 00mn 01s

    —\ Processus lancés
    [MD5.D1D5DAB39DCB4BE0359943738D87409B] – (.Malwarebytes Corporation – Malwarebytes Anti-Malware.) — C:Program Files (x86)Malwarebytes' Anti-Malwarembamgui.exe [532040] [PID.2236]
    [MD5.39B47A50DC3D5E898298468307765710] – (.Comodo Security Solutions, Inc. – GeekBuddy Remote Screen Protocol Server.) — C:Program Files (x86)Common FilesCOMODOGeekBuddyRSP.exe [2327248] [PID.2096]
    [MD5.A12BAE32D24CB4960266DC8FFC45DE7E] – (.AVAST Software – avast! Antivirus.) — C:Program FilesAVAST SoftwareAvastAvastUI.exe [3568312] [PID.3632]
    [MD5.5B6E8E09BE6401A7E022F52FDFCB2FF8] – (.Oracle Corporation – Java(TM) Update Scheduler.) — C:Program Files (x86)Common FilesJavaJava Updatejusched.exe [254336] [PID.3440]
    [MD5.BAF535F843A3E790E04A7613811B55BC] – (.Apple Inc. – iTunesHelper.) — C:Program Files (x86)iTunesiTunesHelper.exe [152392] [PID.3708]
    [MD5.636D97B3BAF854511FF3F4093E895FED] – (.Google Inc. – Google Chrome.) — C:Program Files (x86)GoogleChromeApplicationchrome.exe [863184] [PID.4340]
    [MD5.DBA0C529D62F6E2F59C6F4367A0A5543] – (.Nicolas Coolman – ZHPDiag.) — C:Program Files (x86)ZHPDiagZHPDiag.exe [8256512] [PID.5968]
    [MD5.C5E43BCE9FDDD675AA82A52B8FA6E34B] – (.Comodo Security Solutions, Inc. – livePCsupport Component.) — C:Program Files (x86)Common FilesCOMODOlauncher_service.exe [70352] [PID.796]
    [MD5.4BE7EC02133544CDE7A580875E130208] – (.AVAST Software – avast! Service.) — C:Program FilesAVAST SoftwareAvastAvastSvc.exe [50344] [PID.1272]
    [MD5.ADDA5E1951B90D3D23C56D3CF0622ADC] – (.Adobe Systems Incorporated – Adobe Acrobat Update Service.) — C:Program Files (x86)Common FilesAdobeARM1.0armsvc.exe [65640] [PID.1868]
    [MD5.30E3850F303EAE5C364782EA78579CC9] – (.Apple Inc. – MobileDeviceService.) — C:Program Files (x86)Common FilesAppleMobile Device SupportAppleMobileDeviceService.exe [55624] [PID.1956]
    [MD5.DC94357F990759316423D021AEEAAF45] – (…) — C:Program Files (x86)ComodoDragondragon_updater.exe [2098880] [PID.1904]
    [MD5.65085456FD9A74D7F1A999520C299ECB] – (.Malwarebytes Corporation – Malwarebytes Anti-Malware.) — C:Program Files (x86)Malwarebytes' Anti-Malwarembamscheduler.exe [418376] [PID.2172]
    [MD5.E0D7732F2D2E24B2DB3F67B6750295B8] – (.Malwarebytes Corporation – Malwarebytes Anti-Malware.) — C:Program Files (x86)Malwarebytes' Anti-Malwarembamservice.exe [701512] [PID.2200]
    ~ Processes Running: Scanned in 00mn 02s

    —\ Google Chrome, Démarrage,Recherche,Extensions (G0,G1,G2)
    C:UsersJibaAppDataLocalGoogleChromeUser DataDefaultPreferences
    G2 – GCE: Preference [User DataDefault] [cbngamkddbfolfnmdiejkdfmngilcbcm] Shinobi Dark Theme v.1.1 (Activé)
    ~ Google Browser: 18 Legitimates Filtered in 00mn 45s

    —\ Internet Explorer, Proxy Management (R5)
    R5 – HKCUSoftwareMicrosoftWindowsCurrentVersionInternet Settings,ProxyOverride = *.local
    R5 – HKCUSoftwareMicrosoftWindowsCurrentVersionInternet Settings,ProxyServer = no key
    R5 – HKCUSoftwareMicrosoftWindowsCurrentVersionInternet Settings,ProxyEnable = 0
    R5 – HKCUSoftwareMicrosoftWindowsCurrentVersionInternet Settings,MigrateProxy = 1
    R5 – HKCUSoftwareMicrosoftWindowsCurrentVersionInternet Settings,EnableHttp1_1 = 1
    R5 – HKCUSoftwareMicrosoftWindowsCurrentVersionInternet Settings,AutoConfigProxy = wininet.dll
    ~ Proxy management: Scanned in 00mn 00s

    —\ Analyse des lignes F0, F1, F2, F3 – IniFiles, Autoloading programs
    F2 – REG:system.ini: USERINIT=C:Windowssystem32userinit.exe,
    F2 – REG:system.ini: Shell=C:Windowsexplorer.exe
    F2 – REG:system.ini: VMApplet=C:WindowsSystem32SystemPropertiesPerformance.exe
    ~ Keys: Scanned in 00mn 00s

    —\ Hosts file redirection (O1)
    ~ Le fichier hosts est sain (The hosts file is clean).
    ~ Hosts File: Scanned in 00mn 01s
    ~ Nombre de lignes (Lines number): 21

    —\ Internet Explorer Toolbars (O3)
    O3 – Toolbar: (no name) [64Bits] – [HKLM]{318A227B-5E9F-45bd-8999-7F8F10CA4CF5} Clé orpheline
    ~ Toolbar: Scanned in 00mn 00s

    —\ Autres liens utilisateurs (O4)
    O4 – GSDesktop [Public]: Brother Creative Center.lnk . (.AVAST Software – avast! Antivirus.) — C:Program Files (x86)BrotherCreativeCenterBrother Creative Center.url
    O4 – GSDesktop [Public]: Google Chrome.lnk . (.Google Inc. – Google Chrome.) — C:Program Files (x86)GoogleChromeApplicationchrome.exe
    O4 – GSQuickLaunch [Jiba]: Google Chrome.lnk . (.Google Inc. – Google Chrome.) — C:Program Files (x86)GoogleChromeApplicationchrome.exe
    O4 – GSQuickLaunch [Jiba]: Launch Internet Explorer Browser.lnk . (.Microsoft Corporation – Internet Explorer.) — C:Program Files (x86)Internet Exploreriexplore.exe
    O4 – GSQuickLaunch [Jiba]: µTorrent.lnk . (.BitTorrent Inc. – µTorrent.) — C:UsersJibaAppDataRoaminguTorrentuTorrent.exe =>P2P.BitTorrent
    O4 – GSTaskBar [Jiba]: Google Chrome.lnk . (.Google Inc. – Google Chrome.) — C:Program Files (x86)GoogleChromeApplicationchrome.exe
    O4 – GSProgram [Jiba]: Internet Explorer.lnk . (.Microsoft Corporation – Internet Explorer.) — C:Program Files (x86)Internet Exploreriexplore.exe
    O4 – GSSystemTools [Jiba]: Internet Explorer (No Add-ons).lnk . (.Microsoft Corporation – Internet Explorer.) — C:Program Files (x86)Internet Exploreriexplore.exe
    O4 – GSDesktop [Jiba]: LoneSurvivor.exe – Raccourci.lnk . (…) — C:UsersJibaDocumentsLone SurvivorLoneSurvivorLoneSurvivor.exe
    O4 – GSDesktop [Jiba]: Ordinateur – Raccourci.lnk – Clé orpheline
    O4 – GSDesktop [Jiba]: µTorrent.lnk . (.BitTorrent Inc. – µTorrent.) — C:UsersJibaAppDataRoaminguTorrentuTorrent.exe =>P2P.BitTorrent
    ~ Global Startup: 61 Legitimates Filtered in 00mn 02s

    —\ Applications lancées au démarrage du sytème (O4)
    O4 – HKLM..Run: [IgfxTray] . (.Intel Corporation – igfxTray Module.) — C:Windowssystem32igfxtray.exe
    O4 – HKLM..Run: [HotKeysCmds] . (.Intel Corporation – hkcmd Module.) — C:Windowssystem32hkcmd.exe
    O4 – HKLM..Run: [Persistence] . (.Intel Corporation – persistence Module.) — C:Windowssystem32igfxpers.exe
    O4 – HKLM..Run: [SynTPEnh] C:Program Files (x86)SynapticsSynTPSynTPEnh.exe (.not file.)
    O4 – HKLM..Run: [COMODO Internet Security] . (.COMODO – COMODO Internet Security.) — C:Program FilesCOMODOCOMODO Internet Securitycistray.exe
    O4 – HKLM..Wow6432NodeRun: [tvncontrol] . (.Comodo Security Solutions, Inc. – GeekBuddy Remote Screen Protocol Server.) — C:Program Files (x86)Common FilesCOMODOGeekBuddyRSP.exe
    O4 – HKLM..Wow6432NodeRun: [AvastUI.exe] . (.AVAST Software – avast! Antivirus.) — C:Program FilesAVAST SoftwareAvastAvastUI.exe
    O4 – HKLM..Wow6432NodeRun: [SunJavaUpdateSched] . (.Oracle Corporation – Java(TM) Update Scheduler.) — C:Program Files (x86)Common FilesJavaJava Updatejusched.exe =>.Oracle Corporation
    O4 – HKLM..Wow6432NodeRun: [Adobe ARM] . (.Adobe Systems Incorporated – Adobe Reader and Acrobat Manager.) — C:Program Files (x86)Common FilesAdobeARM1.0AdobeARM.exe =>.Adobe Systems Incorporated
    O4 – HKLM..Wow6432NodeRun: [APSDaemon] . (.Apple Inc. – Apple Push.) — C:Program Files (x86)Common FilesAppleApple Application SupportAPSDaemon.exe
    O4 – HKLM..Wow6432NodeRun: [iTunesHelper] . (.Apple Inc. – iTunesHelper.) — C:Program Files (x86)iTunesiTunesHelper.exe
    O4 – HKLM..Wow6432NodeRun: [20131121] . (.AVAST Software – avast! Emergency Update.) — C:Program FilesAVAST SoftwareAvastsetupemupdateeb16c699-0587-433b-b922-433f3eb0a70b.exe
    O4 – HKUSS-1-5-19..Run: [Sidebar] . (.Microsoft Corporation – Gadgets du Bureau Windows.) — C:Program Files (x86)Windows SidebarSidebar.exe =>.Microsoft Corporation
    O4 – HKUSS-1-5-20..Run: [Sidebar] . (.Microsoft Corporation – Gadgets du Bureau Windows.) — C:Program Files (x86)Windows SidebarSidebar.exe =>.Microsoft Corporation
    O4 – HKUSS-1-5-19..RunOnce: [mctadmin] . (.Microsoft Corporation – MCTAdmin.) — C:WindowsSystem32mctadmin.exe =>.Microsoft Corporation
    O4 – HKUSS-1-5-20..RunOnce: [mctadmin] . (.Microsoft Corporation – MCTAdmin.) — C:WindowsSystem32mctadmin.exe =>.Microsoft Corporation
    ~ Application: Scanned in 00mn 00s

    —\ Boutons situés sur la barre d'outils principale d'Internet Explorer (O9)
    O9 – Extra button: Free YouTube Download [64Bits] – {EE932B49-D5C0-4D19-A3DA-CE0849258DE6} . (…) — C:Program Files (x86)Common FilesDVDVideoSoftpluginsdvdvideosoft.ico
    ~ IE Extra Buttons: Scanned in 00mn 00s

    —\ Modification Domaine/Adresses DNS (O17)
    O17 – HKLMSystemCCSServicesTcpip..{4A38195F-6926-48EF-A914-502929409EC1}: DhcpNameServer = 192.168.1.1
    O17 – HKLMSystemCS1ServicesTcpip..{4A38195F-6926-48EF-A914-502929409EC1}: DhcpNameServer = 192.168.1.1
    O17 – HKLMSystemCS2ServicesTcpip..{4A38195F-6926-48EF-A914-502929409EC1}: DhcpNameServer = 192.168.1.1
    O17 – HKLMSystemCCSServicesTcpipParameters: DhcpNameServer = 192.168.1.1
    ~ Domain: Scanned in 00mn 00s

    —\ Protocole additionnel (O18)
    O18 – Handler: vbscript [64Bits] – {3050F3B2-98B5-11CF-BB82-00AA00BDCE0B} . (.Microsoft Corporation – Visionneuse HTML Microsoft (R).) — C:WindowsSystem32mshtml.dll =>.Microsoft Corporation
    O18 – Filter: text/xml [64Bits] – {807563E5-5146-11D5-A672-00B0D022E945} . (.Microsoft Corporation – Microsoft Office XML MIME Filter.) — C:Program FilesCommon FilesMicrosoft SharedOFFICE12MSOXMLMF.dll =>.Microsoft Corporation
    ~ Protocole Additionnel: Scanned in 00mn 00s

    —\ Valeur de Registre AppInit_DLLs et sous-clés Winlogon Notify (autorun) (O20)
    O20 – Winlogon Notify: igfxcui . (.Intel Corporation – igfxdev Module.) — C:WindowsSystem32igfxdev.dll
    ~ Winlogon: Scanned in 00mn 00s

    —\ Pilotes lancés au démarrage du système (O41)
    O41 – Driver: (HMD) . (…) – C:WindowsSystem32DRIVERShmd.sys
    ~ Drivers: 93 Legitimates Filtered in 00mn 00s

    —\ Derniers fichiers modifiés ou crées sous Windows et System32 (O44)
    O44 – LFC:[MD5.97D8307C04F8CBED6799D4C2E9D56782] – 24/11/2013 – 02:19:19 —A- . (…) — C:WindowsSystem32Driversfvstore.dat [79448]
    O44 – LFC:[MD5.F862CD08F1AD4EE39BD506853F3C6103] – 26/11/2013 – 23:27:24 —A- . (…) — C:WindowsSysNativeieuinit.inf [16284]
    O44 – LFC:[MD5.F862CD08F1AD4EE39BD506853F3C6103] – 26/11/2013 – 23:27:24 —A- . (…) — C:WindowsSystem32ieuinit.inf [16284]
    O44 – LFC:[MD5.B4734B5C8DF3014FE389061CB332AEF5] – 30/11/2013 – 12:00:35 —A- . (…) — C:UsbFix [Scan 1] JIBA-PC.txt [8698]
    ~ Files: 143 Legitimates Filtered in 00mn 28s

    —\ Derniers fichiers créés dans Windows Prefetcher (O45)
    O45 – LFCP:[MD5.5A4350DBC98CA9BBD26849F608A803AA] – 29/11/2013 – 14:56:20 —A- – C:WindowsPrefetchEB16C699-0587-433B-B922-433F3-BD79743D.pf
    O45 – LFCP:[MD5.EAEB8CA30C77626D71CF3C5DABFD58F1] – 30/11/2013 – 12:05:24 —A- – C:WindowsPrefetchGO.EXE-0A7DE786.pf
    O45 – LFCP:[MD5.D57899B57B4D8492A3416BEE592AB443] – 30/11/2013 – 12:42:45 —A- – C:WindowsPrefetchINSTUP.EXE-7E543EAF.pf
    ~ Prefetcher: 137 Legitimates Filtered in 00mn 01s

    —\ Enumération des clés de registre PoliciesSystem (MWPS) (O55)
    O55 – MWPS:[HKLM…PoliciesSystem] – “EnableUIADesktopToggle”=0
    O55 – MWPS:[HKLM…PoliciesSystem] – “FilterAdministratorToken”=0
    ~ MWPS: 16 Legitimates Filtered in 00mn 00s

    —\ Enumération des clés de registre PoliciesExplorer (MWPE) (O56)
    O56 – MWPE:[HKLM…policiesExplorer] – “NoActiveDesktopChanges”=1
    ~ MWPE Keys: 3 Legitimates Filtered in 00mn 00s

    —\ Liste des pilotes du système (SDL) (O58)
    O58 – SDL:[MD5.C04F7B373881009D7994D9BF55D24AB4] – 9/11/2013 – 15:11:59 —A- . (…) — C:WindowsSystem32DriversaswRvrt.sys [65776]
    O58 – SDL:[MD5.59787B95DD9CA44CB139D96863438587] – 9/11/2013 – 15:11:59 —A- . (…) — C:WindowsSystem32DriversaswVmm.sys [205320]
    O58 – SDL:[MD5.7AD735DB1A9CC82D75E8854952EE8052] – 7/05/2013 – 08:00:18 —A- . (.Windows (R) Win 7 DDK provider – Safe Deletion Driver.) — C:WindowsSystem32DriversCFRMD.sys [37976]
    O58 – SDL:[MD5.0E5DA5369A0FCAEA12456DD852545184] – 14/07/2009 – 02:47:48 —A- . (.Emulex – Storport Miniport Driver for LightPulse HBAs.) — C:WindowsSystem32Driverselxstor.sys [530496]
    O58 – SDL:[MD5.F2523EF6460FC42405B12248338AB2F0] – 10/06/2009 – 21:31:59 —A- . (.Hauppauge Computer Works, Inc. – Hauppauge WinTV 885 Consumer IR Driver for eHome.) — C:WindowsSystem32Drivershcw85cir.sys [31232]
    O58 – SDL:[MD5.D3A6BCD0047EE7923C2C3960C4CDCA4D] – 7/10/2013 – 06:17:38 —A- . (…) — C:WindowsSystem32Drivershmd.sys [14888]
    O58 – SDL:[MD5.F3817967ED533D08327DC73BC4D5542A] – 14/07/2009 – 02:45:55 —A- . (.Promise Technology – Promise SuperTrak EX Series Driver for Windows.) — C:WindowsSystem32Driversstexstor.sys [24656]
    O58 – SDL:[MD5.C9E9D59C0099A9FF51697E9306A44240] – 13/12/2012 – 14:50:36 —A- . (.Apple, Inc. – Apple Mobile Device USB Driver.) — C:WindowsSystem32Driversusbaapl64.sys [54784]
    ~ Drivers: 16 Legitimates Filtered in 00mn 02s

    —\ Derniers fichiers modifiés ou crées (Utilisateur) (O61)
    O61 – LFC: 27/11/2013 – 12:49:19 —A- . (…) — C:UsersJibaAppDataLocalGoogleChromeUser DataWidevineCDM1.4.1.376_platform_specificwin_x86widevinecdm.dll [6940304]
    O61 – LFC: 27/11/2013 – 12:49:19 —A- . (…) — C:UsersJibaAppDataLocalGoogleChromeUser DataWidevineCDM1.4.1.376manifest.fingerprint [66]
    O61 – LFC: 27/11/2013 – 12:49:19 —A- . (…) — C:UsersJibaAppDataLocalGoogleChromeUser DataWidevineCDM1.4.1.376manifest.json [848]
    O61 – LFC: 28/11/2013 – 12:49:23 —A- . (…) — C:UsersJibaDocumentsfree_av_9.0.2006_2013-11-28_22-52-25.avastconfig [3915]
    O61 – LFC: 30/11/2013 – 12:48:52 —A- . (…) — C:UsersJibaAppDataLocalGoogleChromeUser DataCertificate Revocation Lists [269398]
    O61 – LFC: 30/11/2013 – 12:49:19 —A- . (…) — C:UsersJibaAppDataLocalGoogleChromeUser DataLocal State [46303]
    O61 – LFC: 30/11/2013 – 12:49:23 —A- . (…) — C:UsersJibaAppDataRoamingZHPLog.txt [17757] =>.Nicolas Coolman
    O61 – LFC: 30/11/2013 – 12:49:23 —A- . (…) — C:UsersJibaAppDataRoamingZHPTestsZHPDiag.txt [2835] =>.Nicolas Coolman
    O61 – LFC: 30/11/2013 – 12:49:23 —A- . (…) — C:UsersJibaDownloadsrestagesbim.zip [327467]
    ~ 15 Fichiers temporaires (Temporary files)
    ~ Files: 157 Legitimates Filtered in 00mn 41s

    —\ Liste des outils de désinfection (LATC) (O63)
    O63 – Logiciel: UsbFix By El Desaparecido – (.El Desaparecido – http://www.usbfix.net.)” onclick=”window.open(this.href);return false; [HKLM] — Usbfix
    O63 – Logiciel: ZHPDiag 2013 – (.Nicolas Coolman.) [HKLM] — ZHPDiag_is1 =>.Nicolas Coolman
    ~ ADS: Scanned in 00mn 00s

    —\ Liste les services legacy du registre (LALS) (O64)
    O64 – Services: CurCS – 24/09/2013 – C:WindowsSystem32DRIVERScmdhlp.sys (cmdHlp) .(.COMODO – COMODO Internet Security Helper Driver.) – LEGACY_CMDHLP
    O64 – Services: CurCS – 7/10/2013 – C:WindowsSystem32DRIVERShmd.sys (HMD) .(…) – LEGACY_HMD
    O64 – Services: CurCS – 24/09/2013 – C:WindowsSystem32DRIVERSinspect.sys (inspect) .(.COMODO – COMODO Internet Security Firewall Driver.) – LEGACY_INSPECT
    O64 – Services: CurCS – 4/04/2013 – C:Windowssystem32driversmbam.sys (MBAMProtector) .(.Malwarebytes Corporation – Malwarebytes Anti-Malware.) – LEGACY_MBAMPROTECTOR
    O64 – Services: CurCS – 10/06/2009 – C:WindowsSystem32Driverssecdrv.sys (secdrv) .(.Macrovision Corporation, Macrovision Europe – Macrovision SECURITY Driver.) – LEGACY_SECDRV
    ~ Legacy: 122 Legitimates Filtered in 00mn 00s

    —\ Associations Shell Spawning (O67)
    O67 – Shell Spawning: < .html> [HKCU..openCommand] (.Not Key.)
    ~ FASS Keys: 11 Legitimates Filtered in 00mn 00s

    —\ Menu de démarrage Internet (SMI) (O68)
    O68 – StartMenuInternet: [HKLM..ShellopenCommand] (.Comodo – Comodo Dragon.) — C:Program Files (x86)ComodoDragondragon.exe
    O68 – StartMenuInternet: [HKLM..ShellopenCommand] (.Google Inc. – Google Chrome.) — C:Program Files (x86)GoogleChromeApplicationchrome.exe
    O68 – StartMenuInternet: [HKLM..ShellopenCommand] (.Microsoft Corporation – Internet Explorer.) — C:Program FilesInternet Exploreriexplore.exe
    ~ Keys: Scanned in 00mn 00s

    —\ Recherche particulière à la racine du système (SPRF) (O84)
    [MD5.C59BDF3C0E8F946A6D9E8E3934485830] [SPRF][22/11/2013] (…) — C:UsersJibaAppDataLocalTempQuarantine.exe [355225]
    [MD5.AFAFA655CC59872129A32CDE4F60F2DE] [SPRF][30/11/2013] (…) — C:UsersJibaDesktopadwcleaner.exe [1091882]
    ~ Files: 3 Legitimates Filtered in 00mn 01s

    —\ Liste des exceptions du parefeu (FirewallRules) (O87)
    O87 – FAEL: “{1FFB2C27-1C91-4DFD-8D34-5E37B076DF92}” |In – Private – P6 – TRUE | .(…) — C:WindowsTempCMC_DRAGONrestart_helper.exe (.not file.)
    O87 – FAEL: “{7AC844DE-2DA2-4005-B6E9-FF32521DCF07}” |In – Private – P17 – TRUE | .(…) — C:WindowsTempCMC_DRAGONrestart_helper.exe (.not file.)
    O87 – FAEL: “{331DDF62-A995-4997-AA29-B324B7D5A842}” |In – Public – P6 – TRUE | .(…) — C:WindowsTempCMC_DRAGONrestart_helper.exe (.not file.)
    O87 – FAEL: “{459B1C1A-E416-49AA-BC6C-851E9380E9BB}” |In – Public – P17 – TRUE | .(…) — C:WindowsTempCMC_DRAGONrestart_helper.exe (.not file.)
    O87 – FAEL: “{DB24C243-E840-40ED-AC28-A6EFE294D36D}” |In – Public – P6 – TRUE | .(…) — C:Program Files (x86)VSOVSO Downloader3VsoDownloader.exe (.not file.)
    O87 – FAEL: “{64B4E333-8199-4DD5-BD9A-816B69EFED7F}” |In – Public – P17 – TRUE | .(…) — C:Program Files (x86)VSOVSO Downloader3VsoDownloader.exe (.not file.)
    ~ Firewall: 197 Legitimates Filtered in 00mn 01s

    —\ Etat général des services non Microsoft (EGS) (SR=Running, SS=Stopped)
    SS – | Demand 25/01/2010 245760 | (BrYNSvc) . (.Brother Industries, Ltd..) – C:Program Files (x86)Browny02BrYNSvc.exe
    SS – | Demand 24/09/2013 164056 | (cmdvirth) . (.COMODO.) – C:Program FilesCOMODOCOMODO Internet Securitycmdvirth.exe
    SS – | Auto 2/11/2013 116648 | (gupdate) . (.Google Inc..) – C:Program Files (x86)GoogleUpdateGoogleUpdate.exe
    SS – | Demand 2/11/2013 116648 | (gupdatem) . (.Google Inc..) – C:Program Files (x86)GoogleUpdateGoogleUpdate.exe

    SR – | Auto 5/09/2013 65640 | (AdobeARMservice) . (.Adobe Systems Incorporated.) – C:Program Files (x86)Common FilesAdobeARM1.0armsvc.exe
    SR – | Auto 7/09/2013 55624 | (Apple Mobile Device) . (.Apple Inc..) – C:Program Files (x86)Common FilesAppleMobile Device SupportAppleMobileDeviceService.exe
    SR – | Auto 9/11/2013 50344 | (avast! Antivirus) . (.AVAST Software.) – C:Program FilesAVAST SoftwareAvastAvastSvc.exe
    SR – | Auto 30/08/2011 462184 | (Bonjour Service) . (.Apple Inc..) – C:Program FilesBonjourmDNSResponder.exe
    SR – | Auto 19/09/2013 70352 | (CLPSLauncher) . (.Comodo Security Solutions, Inc..) – C:Program Files (x86)Common FilesCOMODOlauncher_service.exe
    SR – | Auto 20/10/2013 6254152 | (cmdAgent) . (.COMODO.) – C:Program FilesCOMODOCOMODO Internet Securitycmdagent.exe
    SR – | Auto 11/11/2013 2098880 | (DragonUpdater) . (…) – C:Program Files (x86)ComodoDragondragon_updater.exe
    SR – | Auto 17/09/2013 2327248 | (GeekBuddyRSP) . (.Comodo Security Solutions, Inc..) – C:Program Files (x86)Common FilesCOMODOGeekBuddyRSP.exe
    SR – | Demand 2/11/2013 641352 | (iPod Service) . (.Apple Inc..) – C:Program FilesiPodbiniPodService.exe
    SR – | Auto 4/04/2013 418376 | (MBAMScheduler) . (.Malwarebytes Corporation.) – C:Program Files (x86)Malwarebytes' Anti-Malwarembamscheduler.exe
    SR – | Auto 4/04/2013 701512 | (MBAMService) . (.Malwarebytes Corporation.) – C:Program Files (x86)Malwarebytes' Anti-Malwarembamservice.exe
    SR – | Auto 14/07/2009 27136 | C:Program Files (x86)Windows Defendermpsvc.dll (WinDefend) . (.Microsoft Corporation.) – C:WindowsSystem32svchost.exe
    SR – | Auto 10/07/1658 0 | (WMPNetworkSvc) . (…) – C:Program Files (x86)Windows Media Playerwmpnetwk.exe =>.Microsoft Corporation
    SR – | Auto 14/07/2009 27136 | C:WindowsSystem32wuaueng.dll (wuauserv) . (.Microsoft Corporation.) – C:WindowsSystem32svchost.exe

    ~ Services: Scanned in 00mn 11s

    —\ Recherche d'infection sur le Master Boot Record (MBR)(O80)
    Run by Jiba at 30/11/2013 12:50:10
    ~ OS 64 not supported by MBR tool

    ~ MBR: 0 Legitimates Filtered in 00mn 00s

    —\ Recherche d'infection sur le Master Boot Record (MBRCheck)(O80)
    Written by ad13, http://ad13.geekstog” onclick=”window.open(this.href);return false;
    Run by Jiba at 30/11/2013 12:50:12

    ********* Dump file Name *********
    C:PhysicalDisk0_MBR.bin

    ~ MBR: Scanned in 00mn 02s

    —\ Scan Additionnel (O88)
    Database Version : 13001 – (28/11/2013)
    Clés trouvées (Keys found) : 0
    Valeurs trouvées (Values found) : 2
    Dossiers trouvés (Folders found) : 0
    Fichiers trouvés (Files found) : 0

    ~ Additionnel Scan: 218546 Items scanned in 00mn 53s

    —\ Récapitulatif des détections trouvées sur votre station
    ~ MSI: 0 link(s) detected in 00mn 53s

    ~ 1320 Legitimates filtered by white list
    End of the scan (421 lines in 06mn 08s)(0)[/spoiler:1qkeuv59]

  • g3n-h@ckm@ng3n-h@ckm@n
    Admin bbPress
    Post count: 8305

    salut relance usbfix et clique sur suppression puis poste le rapport en découlant

  • Moussa
    Participant
    Post count: 11

    Merci pour votre rapidité, voici le rapport:
    [spoiler:1ucjm5c8]############################## | UsbFix V 7.152 | [Suppression]

    Utilisateur: Jiba (Administrateur) # JIBA-PC
    Mis à jour le 20/11/2013 par El Desaparecido – Team SosVirus
    Lancé à 14:20:46 | 30/11/2013

    Site Web : http://www.usbfix.net” onclick=”window.open(this.href);return false;
    Forum : https://www.sosvirus.net/” onclick=”window.open(this.href);return false;
    Upload Malware : upload_malware.php
    Contact : http://www.usbfix.net/contact/” onclick=”window.open(this.href);return false;

    PC: TOSHIBA (Portable PC)
    CPU: Pentium(R) Dual-Core CPU T4500 @ 2.30GHz
    RAM -> [Total : 2940 | Free : 1853]
    Bios: INSYDE
    Boot: Fail-safe boot

    OS: Microsoft Windows 7 Édition Familiale Premium (6.1.7601 64-Bit) Service Pack 1
    WB: Windows Internet Explorer : 11.0.9600.16428
    WB: Google Chrome : 31.0.1650.57

    SC: Security Center Service [Enabled]
    WU: Windows Update Service [Enabled]
    AV: avast! Antivirus [(!) Disabled | Updated]
    AS: Windows Defender : 6.1.7600.16385 (win7_rtm.090713-1255)
    AS: Malwarebytes' Anti-Malware : 1.75.0001
    FW: Windows FireWall Service [(!) Disabled]

    C: (%systemdrive%) -> Disque fixe # 466 Go (408 Go libre(s) – 88%) [] # NTFS
    D: -> CD-ROM
    F: -> Disque amovible # 7 Go (3 Go libre(s) – 45%) [FLO] # FAT32
    G: -> CD-ROM
    H: -> Disque amovible # 4 Go (3 Go libre(s) – 73%) [TRAVAUXJF] # FAT32

    ################## | Processus Stoppés |

    Stoppé! C:WindowsExplorer.EXE (ID: 1020 |ParentID: 1012)
    Stoppé! C:Windowssystem32ctfmon.exe (ID: 288 |ParentID: 1020)
    Stoppé! C:Windowssystem32DllHost.exe (ID: 1092 |ParentID: 576)

    ################## | Regedit Run |

    04 – HKLMSOFTWARE | Run : [tvncontrol] – “C:Program Files (x86)Common FilesCOMODOGeekBuddyRSP.exe” -controlservice -slave
    04 – HKLMSOFTWARE | Run : [AvastUI.exe] – “C:Program FilesAVAST SoftwareAvastAvastUI.exe” /nogui
    04 – HKLMSOFTWARE | Run : [SunJavaUpdateSched] – “C:Program Files (x86)Common FilesJavaJava Updatejusched.exe”
    04 – HKLMSOFTWARE | Run : [Adobe ARM] – “C:Program Files (x86)Common FilesAdobeARM1.0AdobeARM.exe”
    04 – HKLMSOFTWARE | Run : [APSDaemon] – “C:Program Files (x86)Common FilesAppleApple Application SupportAPSDaemon.exe”
    04 – HKLMSOFTWARE | Run : [iTunesHelper] – “C:Program Files (x86)iTunesiTunesHelper.exe”
    04 – HKLMSOFTWARE | Run : [20131121] – C:Program FilesAVAST SoftwareAvastsetupemupdateeb16c699-0587-433b-b922-433f3eb0a70b.exe /check
    04 – HKLMSOFTWAREwow6432Node | Run : [tvncontrol] – “C:Program Files (x86)Common FilesCOMODOGeekBuddyRSP.exe” -controlservice -slave
    04 – HKLMSOFTWAREwow6432Node | Run : [AvastUI.exe] – “C:Program FilesAVAST SoftwareAvastAvastUI.exe” /nogui
    04 – HKLMSOFTWAREwow6432Node | Run : [SunJavaUpdateSched] – “C:Program Files (x86)Common FilesJavaJava Updatejusched.exe”
    04 – HKLMSOFTWAREwow6432Node | Run : [Adobe ARM] – “C:Program Files (x86)Common FilesAdobeARM1.0AdobeARM.exe”
    04 – HKLMSOFTWAREwow6432Node | Run : [APSDaemon] – “C:Program Files (x86)Common FilesAppleApple Application SupportAPSDaemon.exe”
    04 – HKLMSOFTWAREwow6432Node | Run : [iTunesHelper] – “C:Program Files (x86)iTunesiTunesHelper.exe”
    04 – HKLMSOFTWAREwow6432Node | Run : [20131121] – C:Program FilesAVAST SoftwareAvastsetupemupdateeb16c699-0587-433b-b922-433f3eb0a70b.exe /check
    04 – HKLMSOFTWARE | RunOnce : [] –
    04 – HKLMSOFTWAREwow6432Node | RunOnce : [] –
    04 – HKUS-1-5-19SOFTWARE | Run : [Sidebar] – %ProgramFiles%Windows SidebarSidebar.exe /autoRun
    04 – HKUS-1-5-20SOFTWARE | Run : [Sidebar] – %ProgramFiles%Windows SidebarSidebar.exe /autoRun
    04 – HKUS-1-5-19SOFTWARE | RunOnce : [mctadmin] – C:WindowsSystem32mctadmin.exe
    04 – HKUS-1-5-20SOFTWARE | RunOnce : [mctadmin] – C:WindowsSystem32mctadmin.exe

    ################## | Recherche générique |

    Supprimé! H:Article Bioch.lnk
    Supprimé! H:iTunesHelper.vbe
    Supprimé! H:SergeLeLama.vbs

    (!) Fichiers temporaires supprimés.

    ################## | Référence de comparaison MD5 |

    Md5 : AED4FAF279ABF7D7605E81707BE3CE64 -> H:iTunesHelper.vbe
    Md5 : 304439A2E8278F31E4E42DD145C65B48 -> H:SergeLeLama.vbs

    ################## | Comparaison MD5 |

    Supprimé! Md5 : AED4FAF279ABF7D7605E81707BE3CE64 -> C:VTRootHarddiskVolume2UsersJibaAppDataLocalTempiTunesHelper.vbe
    Supprimé! Md5 : AED4FAF279ABF7D7605E81707BE3CE64 -> C:VTRootHarddiskVolume2UsersJibaAppDataRoamingMicrosoftWindowsStart MenuProgramsStartupiTunesHelper.vbe

    ################## | Registre |

    Réparé ! HKLMSOFTWAREMicrosoftWindowsCurrentVersionPoliciesExplorer|NoActiveDesktop -> 0
    Réparé ! HKLMSOFTWAREMicrosoftWindowsCurrentVersionPoliciesExplorer|NoActiveDesktopChanges -> 0

    ################## | Listing |

    [12/11/2013 – 22:04:05 | SHD ] C:$Recycle.Bin
    [30/11/2013 – 12:40:07 | D ] C:AdwCleaner
    [09/11/2013 – 15:58:18 | D ] C:Brother
    [19/11/2013 – 17:39:04 | SHD ] C:Config.Msi
    [14/07/2009 – 06:08:56 | SHD ] C:Documents and Settings
    [12/11/2013 – 23:54:09 | D ] C:first_launch
    [30/11/2013 – 14:19:36 | ASH | 2312089600] C:hiberfil.sys
    [03/11/2013 – 13:18:18 | D ] C:Intel
    [11/11/2013 – 20:05:39 | RHD ] C:MSOCache
    [30/11/2013 – 14:19:39 | ASH | 3082788864] C:pagefile.sys
    [14/07/2009 – 04:20:08 | D ] C:PerfLogs
    [30/11/2013 – 12:50:12 | N | 512] C:PhysicalDisk0_MBR.bin
    [17/11/2013 – 21:38:43 | D ] C:Program Files
    [30/11/2013 – 12:18:59 | D ] C:Program Files (x86)
    [30/11/2013 – 12:14:01 | HD ] C:ProgramData
    [02/11/2013 – 20:33:21 | SHD ] C:Recovery
    [26/11/2013 – 23:24:58 | SHD ] C:System Volume Information
    [30/11/2013 – 14:24:58 | D ] C:UsbFix
    [30/11/2013 – 12:57:05 | N | 781] C:UsbFix [Clean 2] JIBA-PC.txt
    [30/11/2013 – 13:58:22 | N | 6547] C:UsbFix [Clean 4] JIBA-PC.txt
    [30/11/2013 – 14:25:04 | A | 5699] C:UsbFix [Clean 6] JIBA-PC.txt
    [30/11/2013 – 12:00:35 | N | 8698] C:UsbFix [Scan 1] JIBA-PC.txt
    [02/11/2013 – 20:33:28 | RD ] C:Users
    [11/11/2013 – 20:00:03 | D ] C:VTRoot
    [30/11/2013 – 14:13:31 | D ] C:Windows
    [06/10/2012 – 12:39:24 | RASH | 28160] F:Thumbs.db
    [19/08/2011 – 12:46:52 | D ] F:Zik
    [11/10/2012 – 20:35:24 | D ] F:Ipod (Jibi)
    [29/11/2013 – 20:49:00 | D ] F:installation
    [11/10/2012 – 20:35:24 | D ] F:dossier gaël
    [01/12/2011 – 14:02:54 | SHD ] F:.Spotlight-V100
    [14/05/2012 – 15:42:48 | D ] F:.fseventsd
    [26/07/2012 – 11:42:54 | D ] H:Travaux scolaires
    [09/11/2013 – 15:54:56 | N | 11738] H:Le Jeu, le jouet et le jouer.odt
    [12/03/2013 – 18:40:06 | D ] H:Article Bioch

    ################## | Vaccin |

    F:Autorun.inf -> Vaccin créé par UsbFix (El Desaparecido)
    H:Autorun.inf -> Vaccin créé par UsbFix (El Desaparecido)

    ################## | E.O.F | http://www.usbfix.net” onclick=”window.open(this.href);return false; – https://www.sosvirus.net” onclick=”window.open(this.href);return false; |[/spoiler:1ucjm5c8]

  • g3n-h@ckm@ng3n-h@ckm@n
    Admin bbPress
    Post count: 8305

    • Télécharge Junkware Removal Tool Download (de thisisu) sur ton bureau.
    • Lance Junkware Removal Tool Download, exécuter en tant qu’administrateur sous Windows : 7/8 et Vista
    • Appuie sur n’importe quelle touche.

    • Une fois le scan terminé rends toi sur le bureau, le fichier JRT.txt à été créé.
    • Héberge le rapport JRT.txt surSosUpload, puis copie/colle le lien fourni dans ta prochaine réponse sur le forum
  • Moussa
    Participant
    Post count: 11

    Salut! je sais pas si ce n’est qu’une impression mais l’analyse prend beaucoup de temps… est ce normal?
    Pour l’instant il analyse les registres (depuis près de 30min).

  • g3n-h@ckm@ng3n-h@ckm@n
    Admin bbPress
    Post count: 8305

    faut laisser tourner … si c’est vraiment trop long on avisera

    par contre , tu devras changer tes mots de passe car il ont été volés par l’infection

  • Moussa
    Participant
    Post count: 11

    Merci pour l’info ^^
    Voici le lien: https://antimalware.top/log/SosUpload.9d7acfc5305b270fea0ddc9a795befdf.txt” onclick=”window.open(this.href);return false;

  • g3n-h@ckm@ng3n-h@ckm@n
    Admin bbPress
    Post count: 8305

    • Copie le script ci dessous :
      HKCUSoftware
      HKLMSoftware
      HKCUSoftwareMicrosoftCommand Processor /s
      HKLMSoftwareMicrosoftCommand Processor /s
      %Homedrive%*
      %Homedrive%*.
      %Userprofile%*
      %Userprofile%*.
      %Allusersprofile%*
      %Allusersprofile%*.
      %LocalAppData%*
      %LocalAppData%*.
      %Userprofile%Local SettingsApplication Data*
      %Userprofile%Local SettingsApplication Data*.
      %programFiles%*
      %programfiles%GoogleDesktopInstall /s
      %programFiles%*.
      %Systemroot%Installer*.
      %Systemroot%Temp*.exe /s
      %systemroot%system32*.dll /lockedfiles
      %systemroot%system32*.exe /lockedfiles
      %systemroot%system32*.in*
      %systemroot%Tasks*
      %systemroot%Tasks*.
      %systemroot%system32Tasks*
      %systemroot%system32Tasks*.
      %systemroot%system32drivers*.sy* /lockedfiles
      %systemroot%system32config*.exe /s
      %Systemroot%ServiceProfiles*.exe /s
      %systemroot%system32*.sys
      dir %Homedrive%* /S /A:L /C
      msconfig
      activex
      /md5start
      explorer.exe
      winlogon.exe
      wininit.exe
      volsnap.sys
      atapi.sys
      ndis.sys
      cdrom.sys
      i8042prt.sys
      iastor.sys
      tdx.sys
      netbt.sys
      afd.sys
      /md5stop
      netsvcs
      safebootminimal
      safebootnetwork
      CREATERESTOREPOINT
    • Télécharge OTL (by OldTimer) sur ton bureau.
    • Lance OTL, exécuter en tant qu’administrateur sous Windows : 7/8 et Vista
    • Coche/Sélectionne les cases comme l’image ci dessous
    • Colle le Script copié plus haut dans la partie inférieure d’OTL “Personnalisation”
    • Clique sur Analyse

    • Une fois le scan terminé 1 ou 2 rapports vont s’ouvrir OTL.txt et Extras.txt.
    • Héberge les rapports OTL.txt et Extras.txt sur SosUpload, puis copie/colle le lien fourni dans ta prochaine réponse sur le forum

      Note : Au cas où, tu peux les retrouver dans le dossier C:OTL ou sur ton bureau en fonction des cas rencontrés

  • Moussa
    Participant
    Post count: 11

    Le premier rapport OTL.txt:
    https://antimalware.top/log/SosUpload.26147290a8a9c7139842223da01fddba.txt” onclick=”window.open(this.href);return false;

    Le second rapport Extras.txt:
    https://antimalware.top/log/SosUpload.faba75ffa70ce9c2a05aac834067090f.txt” onclick=”window.open(this.href);return false;

  • g3n-h@ckm@ng3n-h@ckm@n
    Admin bbPress
    Post count: 8305

    tu as payé la suite comodo ou tu as juste installé le parefeu ?

  • Moussa
    Participant
    Post count: 11

    Juste le parefeu ;)

  • g3n-h@ckm@ng3n-h@ckm@n
    Admin bbPress
    Post count: 8305

    desinstalle geek buddy alors

  • Moussa
    Participant
    Post count: 11

    ok c’est fait what’s next? :D

  • g3n-h@ckm@ng3n-h@ckm@n
    Admin bbPress
    Post count: 8305

    refais OTL , suite à cela je vais te faire un script pour virer les 2/3 restes

  • Moussa
    Participant
    Post count: 11

    bonjour! je n’ai pu être présent hier dans la soirée du coup je n’ai pas vu votre message :/ j’ai relancé l’analyse OTL:

    OTL.txt: https://antimalware.top/log/SosUpload.b7b7856214634f28b472b1f7c513f284.txt” onclick=”window.open(this.href);return false;

    Extras.txt: https://antimalware.top/log/SosUpload.b0c30e3e068e2fa24cedc9c0793d847e.txt” onclick=”window.open(this.href);return false;

  • g3n-h@ckm@ng3n-h@ckm@n
    Admin bbPress
    Post count: 8305

    re :D

    ATTENTION !!! : Script personnalisé pour cette machine uniquement , ne pas reproduire !!

    si tu as XP => double clique
    si tu as Vista ou windows 7 => clic droit “executer en tant que….”

    sur OTL.exe pour le lancer.

    Copie la liste qui se trouve en gras ci-dessous,

    colle-la dans la zone sous “Personnalisation” :


    :processes
    explorer.exe
    iexplore.exe
    firefox.exe
    msnmsgr.exe
    Teatimer.exe

    :OTL
    O4 – HKLM..Run: [tvncontrol] “C:Program Files (x86)Common FilesCOMODOGeekBuddyRSP.exe” -controlservice -slave File not found
    O9 – Extra Button: Free YouTube Download – {EE932B49-D5C0-4D19-A3DA-CE0849258DE6} – Reg Error: Key error. File not found
    O9 – Extra ‘Tools’ menuitem : Free YouTube Download – {EE932B49-D5C0-4D19-A3DA-CE0849258DE6} – Reg Error: Key error. File not found

    :reg
    [HKEY_LOCAL_MACHINESoftwareMicrosoftWindowsCurrentVersionRun]
    “iTunesHelper”=-

    :commands
    [emptytemp]

    Clique sur “Correction” pour lancer la suppression.

    Poste le rapport qui logiquement s’ouvrira tout seul en fin de travail appres le redemarrage.

    ===============

    [fin2desinf:26qa6kch][/fin2desinf:26qa6kch]

  • Moussa
    Participant
    Post count: 11

    Voici le rapport: https://antimalware.top/log/SosUpload.d15bfa564be216d330f5c10996d20436.log” onclick=”window.open(this.href);return false;

  • g3n-h@ckm@ng3n-h@ckm@n
    Admin bbPress
    Post count: 8305

    ouais c’est bon tu peux finir avec le ménage qui suit au dessus

  • Moussa
    Participant
    Post count: 11

    Ok d’acc’ merci beaucoup pour votre aide. Continuez comme ça vous faites du super boulot :super:
    Bon week-end =D

  • g3n-h@ckm@ng3n-h@ckm@n
    Admin bbPress
    Post count: 8305

    bnne route :) :D ^^ :money: :content32:

Le sujet ‘ituneshelper.vbe’ est fermé à de nouvelles réponses.