Malware : je-cherche.net 2015-03-08T14:43:48+00:00
  • Auteur
    Messages
  • Sebastian
    Participant
    Post count: 0

    Bonjour,
    je viens de remarquer aujourd’hui que j’avais une infection qui me redirigeais vers le site : je-cherche.net j’ai essaye de le supprimer via spybot, adwcleaner, Malwabyte Anti Malware.. mais rien n’y fait.
    J’ai donc telecharger ZHPDiag et voici le rapport :

    [spoiler:23cthwup]~ Rapport de ZHPDiag v2015.3.8.27 – Nicolas Coolman (01/03/2015)
    ~ Lancé par Hyakon (08/03/2015 15:40:28)
    ~ Facebook : https://www.facebook.com/nicolascoolman1” onclick=”window.open(this.href);return false;
    ~ Adresse du Forum http://forum.nicolascoolman.fr” onclick=”window.open(this.href);return false;
    ~ Traduit par Nicolas Coolman
    ~ Etat de la version : Version à jour.
    ~ Liste blanche : Activée par le programme
    ~ Elévation des Privilèges : OK
    ~ User Account Control (UAC): Deactivate by user

    —\ Navigateurs Internet
    MSIE: Internet Explorer v11.0.9600.17633
    MFIE: Mozilla Firefox 36.0.1 (Defaut)
    GCIE: Google Chrome v40.0.2214.115

    —\ Informations sur les produits Windows
    ~ Langage: Français
    Windows Server License Manager Script : OK
    ~ Windows Operating System – Windows(R) 7, OEM_SLP channel
    System Locked Preinstallation (OEM_SLP) : OK
    Windows ID Activation : OK
    ~ Windows Partial Key : 7QJB7
    Windows License : OK
    ~ Windows Remaining Initializations Number : 4
    Software Protection Service (Protection logicielle) : OK
    Windows Automatic Updates : OK
    Windows Activation Technologies : OK
    Windows 7 Home Premium, 64-bit Service Pack 1 (Build 7601)

    —\ Logiciels de protection du système
    Avira Free Antivirus v14.0.7.468
    Malwarebytes Anti-Malware version 2.0.4.1028
    Spybot – Search & Destroy v2.4.40
    Windows Defender W7 (Deactivate)

    —\ Logiciels d'optimisation du système

    —\ Logiciels de partage PeerToPeer

    —\ Surveillance de Logiciels
    Adobe Flash Player 16 NPAPI
    Adobe Reader XI

    —\ Informations sur le système
    ~ Processor: Intel64 Family 6 Model 60 Stepping 3, GenuineIntel
    ~ Operating System: 64 Bits
    Boot mode: Normal (Normal boot)
    Total RAM: 8070 MB (40% free)
    System Restore: Désactivé (Disabled)
    System drive C: has 5 GB (14%) free of 37 GB

    —\ Mode de connexion au système
    ~ Computer Name: HYAKON-PC
    ~ User Name: Hyakon
    ~ All Users Names: Hyakon, Administrateur,
    ~ Unselected Option: None
    Logged in as Administrator

    —\ Variables d'environnement
    ~ System Unit : C:
    ~ %AppZHP% : C:UsersHyakonAppDataRoamingZHP
    ~ %AppData% : C:UsersHyakonAppDataRoaming
    ~ %Desktop% : C:UsersHyakonDesktop
    ~ %Favorites% : C:UsersHyakonFavorites
    ~ %LocalAppData% : C:UsersHyakonAppDataLocal
    ~ %StartMenu% : C:UsersHyakonAppDataRoamingMicrosoftWindowsStart Menu
    ~ %Windir% : C:Windows
    ~ %System% : C:WindowsSystem32

    —\ Enumération des unités disques
    C: Hard drive, Flash drive, Thumb drive (Free 5 Go of 37 Go)
    D: Hard drive, Flash drive, Thumb drive (Free 89 Go of 932 Go)
    E: CD-ROM drive (Not Inserted)
    H: CD-ROM drive (Not Inserted)

    —\ Etat du Centre de Sécurité Windows
    [HKLMSOFTWAREMicrosoftWindowsCurrentVersionPoliciesExplorer] NoActiveDesktopChanges: Modified
    [HKLMSOFTWAREMicrosoftWindowsCurrentVersionpoliciessystem] EnableLUA: Modified
    ~ Security Center: 49 Legitimates Filtered in 00mn 00s

    —\ Recherche particulière de fichiers génériques
    [MD5.332FEAB1435662FC6C672E25BEB37BE3] – (.Microsoft Corporation – Explorateur Windows.) (.25/02/2011 – 07:19:30.) — C:WindowsExplorer.exe [2871808]
    [MD5.94355C28C1970635A31B3FE52EB7CEBA] – (.Microsoft Corporation – Application de démarrage de Windows.) (.14/07/2009 – 02:39:52.) — C:WindowsSystem32Wininit.exe [129024]
    [MD5.9DFE41A69DF70AAB75CB5BA8C1109EA2] – (.Microsoft Corporation – Extensions Internet pour Win32.) (.12/01/2015 – 02:27:32.) — C:WindowsSystem32wininet.dll [2358272]
    [MD5.8CEBD9D0A0A879CDE9F36F4383B7CAEA] – (.Microsoft Corporation – Application d’ouverture de session Windows.) (.17/07/2014 – 03:07:24.) — C:WindowsSystem32Winlogon.exe [455168]
    [MD5.067FA52BFB59A56110A12312EF9AF243] – (.Microsoft Corporation – Bibliothèque de licences.) (.20/11/2010 – 14:27:26.) — C:WindowsSystem32sppcomapi.dll [232448]
    [MD5.FA886682CFC5D36718D3E436AACF10B9] – (.Microsoft Corporation – Ancillary Function Driver for WinSock.) (.30/05/2014 – 07:45:52.) — C:Windowssystem32DriversAFD.sys [497152]
    [MD5.02062C0B390B7729EDC9E69C680A6F3C] – (.Microsoft Corporation – ATAPI IDE Miniport Driver.) (.14/07/2009 – 02:52:21.) — C:Windowssystem32Driversatapi.sys [24128]
    [MD5.B8BD2BB284668C84865658C77574381A] – (.Microsoft Corporation – CD-ROM File System Driver.) (.14/07/2009 – 00:19:47.) — C:Windowssystem32DriversCdfs.sys [92160]
    [MD5.F036CE71586E93D94DAB220D7BDF4416] – (.Microsoft Corporation – SCSI CD-ROM Driver.) (.20/11/2010 – 10:19:21.) — C:Windowssystem32DriversCdrom.sys [147456]
    [MD5.9BB2EF44EAA163B29C4A4587887A0FE4] – (.Microsoft Corporation – DFS Namespace Client Driver.) (.20/11/2010 – 10:26:32.) — C:Windowssystem32DriversDfsC.sys [102400]
    [MD5.97BFED39B6B79EB12CDDBFEED51F56BB] – (.Microsoft Corporation – High Definition Audio Bus Driver.) (.20/11/2010 – 11:43:43.) — C:Windowssystem32DriversHDAudBus.sys [122368]
    [MD5.FA55C73D4AFFA7EE23AC4BE53B4592D3] – (.Microsoft Corporation – Pilote de port i8042.) (.14/07/2009 – 00:19:57.) — C:Windowssystem32Driversi8042prt.sys [105472]
    [MD5.AF9B39A7E7B6CAA203B3862582E9F2D0] – (.Microsoft Corporation – IP Network Address Translator.) (.14/07/2009 – 01:10:03.) — C:Windowssystem32DriversIpNat.sys [116224]
    [MD5.A5D9106A73DC88564C825D317CAC68AC] – (.Microsoft Corporation – Windows NT SMB Minirdr.) (.27/04/2011 – 03:40:40.) — C:Windowssystem32DriversMRxSmb.sys [158208]
    [MD5.09594D1089C523423B32A4229263F068] – (.Microsoft Corporation – MBT Transport driver.) (.20/11/2010 – 10:23:20.) — C:Windowssystem32DriversnetBT.sys [261632]
    [MD5.1A29A59A4C5BA6F8C85062A613B7E2B2] – (.Microsoft Corporation – Pilote du système de fichiers NT.) (.24/01/2014 – 03:37:55.) — C:Windowssystem32Driversntfs.sys [1684928]
    [MD5.0086431C29C35BE1DBC43F52CC273887] – (.Microsoft Corporation – Pilote de port parallèle.) (.14/07/2009 – 01:00:41.) — C:Windowssystem32DriversParport.sys [97280]
    [MD5.471815800AE33E6F1C32FB1B97C490CA] – (.Microsoft Corporation – RAS L2TP mini-port/call-manager driver.) (.20/11/2010 – 11:52:35.) — C:Windowssystem32DriversRasl2tp.sys [129536]
    [MD5.548260A7B8654E024DC30BF8A7C5BAA4] – (.Microsoft Corporation – SMB Transport driver.) (.14/07/2009 – 01:09:09.) — C:Windowssystem32Driverssmb.sys [93184]
    [MD5.70988118145F5F10EF24720B97F35F65] – (.Microsoft Corporation – TDI Translation Driver.) (.11/11/2014 – 02:46:26.) — C:Windowssystem32Driverstdx.sys [119296]
    [MD5.0D08D2F3B3FF84E433346669B5E0F639] – (.Microsoft Corporation – Pilote de cliché instantané du volume.) (.20/11/2010 – 14:34:02.) — C:Windowssystem32Driversvolsnap.sys [295808]
    ~ Generic Processes: Scanned in 00mn 00s

    —\ Etat des fichiers cachés (Caché/Total)
    ~ Mes Favoris (My Favorites) : 1/26
    ~ Mes Documents (My Documents) : 1/964
    ~ Mon Bureau (My Desktop) : 1/114
    ~ Menu demarrer (Programs) : 1/70
    ~ Hidden Files: Scanned in 00mn 00s

    —\ Processus lancés
    [MD5.78E70968C04DE6C85541CF70F8CF4E78] – (.AMD – HydraDM.) — C:Program Files (x86)ATI TechnologiesHydraVisionHydraDM.exe [1967616] [PID.2136]
    [MD5.D6E2ED7F1F7BE7CCB8676491BF950B57] – (.Akamai Technologies, Inc. – Akamai NetSession Client.) — C:UsersHyakonAppDataLocalAkamainetsession_win.exe [4673432] [PID.2208]
    [MD5.7DFCCC67990B6DE7F30F553A4E4612A4] – (…) — D:Program Files (x86)RocketDockRocketDock.exe [495616] [PID.2240]
    [MD5.7D6E1809C844B1D2AA02B6DCF1950084] – (.Skype Technologies S.A. – Skype.) — D:Program Files (x86)SkypePhoneSkype.exe [31087200] [PID.2344]
    [MD5.0431B48CF752D88C33C4BA39BA64CCB2] – (.Spotify Ltd – Spotify.) — C:UsersHyakonAppDataRoamingSpotifyspotify.exe [6737976] [PID.2524]
    [MD5.08DFA176E4FC0E63ACD8EC854449D2B0] – (.Spotify Ltd – SpotifyWebHelper.) — C:UsersHyakonAppDataRoamingSpotifyDataSpotifyWebHelper.exe [1676344] [PID.2548]
    [MD5.34BF2F6A776B3CA1B88902F0CE634D2E] – (.LOL Replay – LOL Replay Recorder.) — D:Program Files (x86)LOLReplayLOLRecorder.exe [528896] [PID.2644]
    [MD5.A162B967A88BF374A81E01EF6E7A2655] – (.Avira Operations GmbH & Co. KG – Avira system tray application.) — C:Program Files (x86)AviraAntiVir Desktopavgnt.exe [702768] [PID.3048]
    [MD5.E4E7B29D050F5480071984FE6543C311] – (.Intel Corporation – iusb3mon.) — C:Program Files (x86)IntelIntel(R) USB 3.0 eXtensible Host Controller DriverApplicationiusb3mon.exe [292848] [PID.2584]
    [MD5.E6DEED311D830678E1A0B4889F3C2F0E] – (.UASSOFT.COM – DRIVER AUTORUN.) — C:Program Files (x86)5-button mouseStartAutorun.exe [212992] [PID.1796]
    [MD5.64A22C6D03E43855A190F6DEBD5590B3] – (.UASSOFT.COM – USB Keyboard And PS/2 Keyboard Driver.) — C:Program Files (x86)5-button mouseKMConfig.exe [713216] [PID.1264]
    [MD5.EA177185AD0A301B66B1E0C9BA0C230E] – (.UASSOFT.COM – Keyboard And Mouse Processing.) — C:Program Files (x86)5-button mouseKMProcess.exe [355328] [PID.3176]
    [MD5.BB10E34B162FBEAE5636474A79026A0D] – (.Avira Operations GmbH & Co. KG – Avira.) — C:Program Files (x86)AviraMy AviraAvira.OE.Systray.exe [126712] [PID.3192]
    [MD5.24B63430A0AA8B33767A2A0E8AFCC49A] – (…) — C:UsersHyakonAppDataRoamingSpotifyDataSpotifyHelper.exe [374840] [PID.4056]
    [MD5.3C13F26A4766752314A5413038BD86B4] – (.Malwarebytes Corporation – Malwarebytes Anti-Malware.) — C:Program Files (x86)Malwarebytes Anti-Malwarembam.exe [7229752] [PID.5952]
    [MD5.7EE68A122ED08E4AAD8DA551E34D2515] – (.Safer-Networking Ltd. – Spybot – Search & Destroy tray access.) — C:Program Files (x86)Spybot – Search & Destroy 2SDTray.exe [4101576] [PID.1716]
    [MD5.B917CD01057CDDCE0F3067D0C90E5983] – (.Safer-Networking Ltd. – Start Center.) — C:Program Files (x86)Spybot – Search & Destroy 2SDWelcome.exe [4214168] [PID.5736]
    [MD5.280C014187E24860A7C860329513208F] – (.Safer-Networking Ltd. – Malware Scanner.) — C:Program Files (x86)Spybot – Search & Destroy 2SDScan.exe [4818848] [PID.4792]
    [MD5.B9D6D7E6E5C4FCD8DD7F88EC9D563085] – (.Google Inc. – Google Chrome.) — C:Program Files (x86)GoogleChromeApplicationchrome.exe [843592] [PID.7076]
    [MD5.B6A5661BA6768DD0E1AE7077E906ADDD] – (.Nicolas Coolman – ZHPDiag.) — D:Program Files (x86)ZHPDiagZHPDiag.exe [8184832] [PID.7316]
    [MD5.C2700D35AA42311A32DF7EA09630B401] – (.Avira Operations GmbH & Co. KG – Antivirus Host Framework Service.) — C:Program Files (x86)AviraAntiVir Desktopsched.exe [431920] [PID.1484]
    [MD5.FC5B75CA6A1DA31EDD4F8D53F5540B98] – (.Adobe Systems Incorporated – Adobe Acrobat Update Service.) — C:Program Files (x86)Common FilesAdobeARM1.0armsvc.exe [81088] [PID.1980]
    [MD5.C2700D35AA42311A32DF7EA09630B401] – (.Avira Operations GmbH & Co. KG – Antivirus Host Framework Service.) — C:Program Files (x86)AviraAntiVir Desktopavguard.exe [431920] [PID.2036]
    [MD5.07605743F3F7E2ECAA84E86EA9F2B509] – (.Ellora Assets Corp. – CaptureLibService.) — D:Program Files (x86)FreemakeCaptureLibCaptureLibService.exe [9216] [PID.1344]
    [MD5.D17A6630FCABAAC8A2C0C3D2345C064B] – (.UASSOFT.COM – Keyboard And Mouse Communication Service.) — C:Program Files (x86)5-button mouseKMWDSrv.exe [201216] [PID.2180]
    [MD5.0BB29DE40C9D9529793DCDB59A43CF5B] – (.Malwarebytes Corporation – Malwarebytes Anti-Malware.) — C:Program Files (x86)Malwarebytes Anti-Malwarembamscheduler.exe [1871160] [PID.2216]
    [MD5.2CDEA42B09DC5B3705F06939ADBD2FE4] – (.Sony DADC Austria AG. – SecuROM User Access Service (V7)..) — C:WindowsSysWOW64UAService7.exe [143360] [PID.2784]
    [MD5.8E6214E8C6100222BEB6A14F9B908A7E] – (.Avira Operations GmbH & Co. KG – Avira.OE.ServiceHost.) — C:Program Files (x86)AviraMy AviraAvira.OE.ServiceHost.exe [182520] [PID.2980]
    [MD5.5F82D8188B370B0CF185D4AE2B9B4A0E] – (.Malwarebytes Corporation – Malwarebytes Anti-Malware.) — C:Program Files (x86)Malwarebytes Anti-Malwarembamservice.exe [969016] [PID.3620]
    [MD5.52069AEB42D3D0F97CBCA1085EBF55E6] – (.Intel Corporation – Intel(R) Dynamic Application Loader Host In.) — C:Program Files (x86)IntelIntel(R) Management Engine ComponentsDALjhi_service.exe [169432] [PID.2572]
    [MD5.3DE66F47365AA8CEB18B1EE272F4FEBA] – (.Intel Corporation – Intel(R) Local Management Service.) — C:Program Files (x86)IntelIntel(R) Management Engine ComponentsLMSLMS.exe [390616] [PID.5280]
    [MD5.9B9B368A8FF5CAF91D7A333CF62CD2CC] – (.Safer-Networking Ltd. – Windows Security Center integration..) — C:Program Files (x86)Spybot – Search & Destroy 2SDWSCSvc.exe [171928] [PID.1924]
    [MD5.68D6C7F99BC73B88954D844FCCBEB2A0] – (.Safer-Networking Ltd. – Spybot-S&D 2 Background update service.) — C:Program Files (x86)Spybot – Search & Destroy 2SDUpdSvc.exe [2088408] [PID.5632]
    [MD5.D777F1417D9BB9F66CD9D9C3B61F730F] – (.Safer-Networking Ltd. – Spybot-S&D 2 Scanner Service.) — C:Program Files (x86)Spybot – Search & Destroy 2SDFSSvc.exe [1738168] [PID.7112]
    ~ Processes Running: Scanned in 00mn 00s

    —\ Google Chrome, Démarrage,Recherche,Extensions (G0,G1,G2)
    C:UsersHyakonAppDataLocalGoogleChromeUser DataDefaultPreferences

    —\ Liste des dossiers d'extension Google Chrome
    ~ Google Lines Browser: 0 Legitimates Filtered in 00mn 10s

    —\ Mozilla Firefox, Plugins,Demarrage,Recherche,Extensions (P2,M0,M1,M2,M3)
    C:UsersHyakonAppDataRoamingMozillaFirefoxProfiles88nm6bya.defaultprefs.js
    M2 – MFEP: prefs.js [Hyakon – 88nm6bya.defaultnewtaburl@sogame.cat] [] NewTabURL v2.2.3 (..)
    ~ Firefox Browser: 7 Legitimates Filtered in 00mn 00s

    —\ Internet Explorer, Démarrage,Recherche,URLSearchHook, Phishing (R0,R1,R3,R4)
    R0 – HKCUSOFTWAREMicrosoftInternet ExplorerMain,Start Page = http://www.je-cherche.net” onclick=”window.open(this.href);return false;
    R1 – HKCUSOFTWAREMicrosoftInternet ExplorerMain,Search Page = http://www.je-cherche.net” onclick=”window.open(this.href);return false;
    R1 – HKCUSOFTWAREMicrosoftInternet ExplorerMain,Default_Page_URL = http://www.je-cherche.net” onclick=”window.open(this.href);return false;
    R1 – HKCUSOFTWAREMicrosoftInternet ExplorerMain,Default_Search_URL = http://www.je-cherche.net” onclick=”window.open(this.href);return false;
    R1 – HKCUSOFTWAREMicrosoftInternet ExplorerMain,Default_Secondary_Page_URL = http://www.je-cherche.net” onclick=”window.open(this.href);return false;
    R1 – HKCUSOFTWAREMicrosoftInternet ExplorerMain,Search Bar = http://www.je-cherche.net” onclick=”window.open(this.href);return false;
    R1 – HKLMSOFTWAREMicrosoftInternet ExplorerMain,Search Page = http://www.je-cherche.net” onclick=”window.open(this.href);return false;
    R1 – HKLMSOFTWAREMicrosoftInternet ExplorerMain,Default_Page_URL = http://www.je-cherche.net” onclick=”window.open(this.href);return false;
    ~ IE Browser: 21 Legitimates Filtered in 00mn 00s

    —\ Internet Explorer, Proxy Management (R5)
    R5 – HKCUSoftwareMicrosoftWindowsCurrentVersionInternet Settings,ProxyOverride =
    R5 – HKCUSoftwareMicrosoftWindowsCurrentVersionInternet Settings,ProxyServer = no key
    R5 – HKCUSoftwareMicrosoftWindowsCurrentVersionInternet Settings,ProxyEnable = 0
    R5 – HKCUSoftwareMicrosoftWindowsCurrentVersionInternet Settings,MigrateProxy = 1
    R5 – HKCUSoftwareMicrosoftWindowsCurrentVersionInternet Settings,EnableHttp1_1 = 1
    R5 – HKCUSoftwareMicrosoftWindowsCurrentVersionInternet Settings,AutoConfigProxy = wininet.dll
    ~ Proxy management: Scanned in 00mn 00s

    —\ Analyse des lignes F0, F1, F2, F3 – IniFiles, Autoloading programs
    F2 – REG:system.ini: USERINIT=C:WindowsSystem32Userinit.exe,
    F2 – REG:system.ini: Shell=C:Windowsexplorer.exe
    F2 – REG:system.ini: VMApplet=C:WindowsSystem32SystemPropertiesPerformance.exe
    ~ Keys: Scanned in 00mn 00s

    —\ Hosts file redirection (O1)
    ~ Le fichier hôte est sain (The hosts file is clean) (21)
    ~ Hosts File: Scanned in 00mn 00s

    —\ Autres liens utilisateurs (O4)
    O4 – GSQuickLaunch [Hyakon]: µTorrent.lnk . (.BitTorrent Inc. – µTorrent.) — C:UsersHyakonAppDataRoaminguTorrentuTorrent.exe =>P2P.BitTorrent
    O4 – GSTaskBar [Hyakon]: Google Chrome.lnk . (.Google Inc. – Google Chrome.) — C:Program Files (x86)GoogleChromeApplicationchrome.exe http://www.je-cherche.net” onclick=”window.open(this.href);return false; =>Hijacker.Browsers
    ~ Global Startup: 2 Legitimates Filtered in 00mn 01s

    —\ Applications lancées au démarrage du système (O4)
    O4 – HKLM..Run: [RtHDVCpl] . (.Realtek Semiconductor – Gestionnaire audio HD Realtek.) — C:Program FilesRealtekAudioHDARAVCpl64.exe =>.Realtek Semiconductor Corp
    O4 – HKLM..Run: [XboxStat] . (.Microsoft Corporation – XBoxStat.exe.) — C:Program FilesMicrosoft Xbox 360 AccessoriesXboxStat.exe
    O4 – HKLM..Run: [AdobeAAMUpdater-1.0] . (.Adobe Systems Incorporated – Adobe Updater Startup Utility.) — C:Program Files (x86)Common FilesAdobeOOBEPDAppUWAUpdaterStartupUtility.exe =>.Adobe Systems Incorporated
    O4 – HKCU..Run: [HydraVisionDesktopManager] . (.AMD – HydraDM.) — C:Program Files (x86)ATI TechnologiesHydraVisionHydraDM.exe
    O4 – HKCU..Run: [Akamai NetSession Interface] . (.Akamai Technologies, Inc. – Akamai NetSession Client.) — C:UsersHyakonAppDataLocalAkamainetsession_win.exe
    O4 – HKCU..Run: [RocketDock] . (…) — D:Program Files (x86)RocketDockRocketDock.exe
    O4 – HKCU..Run: [Skype] . (.Skype Technologies S.A. – Skype.) — D:Program Files (x86)SkypePhoneSkype.exe =>.Skype Technologies S.A.
    O4 – HKCU..Run: [LOLReplay Recorder] . (.LOL Replay – LOL Replay Recorder.) — D:Program Files (x86)LOLReplayLOLRecorder.exe
    O4 – HKCU..Run: [Spotify] . (.Spotify Ltd – Spotify.) — C:UsersHyakonAppDataRoamingSpotifySpotify.exe
    O4 – HKCU..Run: [Gadwin PrintScreen (64-bit)] . (.Gadwin Systems – Gadwin PrintScreen.) — C:Program FilesGadwinGadwin PrintScreenPrintScreen64.exe
    O4 – HKCU..Run: [Spotify Web Helper] . (.Spotify Ltd – SpotifyWebHelper.) — C:UsersHyakonAppDataRoamingSpotifyDataSpotifyWebHelper.exe
    O4 – HKLM..Wow6432NodeRun: [avgnt] . (.Avira Operations GmbH & Co. KG – Avira system tray application.) — C:Program Files (x86)AviraAntiVir Desktopavgnt.exe
    O4 – HKLM..Wow6432NodeRun: [StartCCC] . (.Advanced Micro Devices, Inc. – Catalyst® Control Center Launcher.) — C:Program Files (x86)ATI TechnologiesATI.ACECore-Staticamd64CLIStart.exe =>PUP.Istart
    O4 – HKLM..Wow6432NodeRun: [USB3MON] . (.Intel Corporation – iusb3mon.) — C:Program Files (x86)IntelIntel(R) USB 3.0 eXtensible Host Controller DriverApplicationiusb3mon.exe
    O4 – HKLM..Wow6432NodeRun: [KMCONFIG] . (.UASSOFT.COM – DRIVER AUTORUN.) — C:Program Files (x86)5-button mouseStartAutorun.exe
    O4 – HKLM..Wow6432NodeRun: [APSDaemon] . (.Apple Inc. – Apple Push.) — C:Program Files (x86)Common FilesAppleApple Application SupportAPSDaemon.exe
    O4 – HKLM..Wow6432NodeRun: [QuickTime Task] . (.Apple Inc. – QuickTime Task.) — D:Program Files (x86)QuickTimeQTTask.exe
    O4 – HKLM..Wow6432NodeRun: [Avira Systray] . (.Avira Operations GmbH & Co. KG – Avira.) — C:Program Files (x86)AviraMy AviraAvira.OE.Systray.exe
    O4 – HKLM..Wow6432NodeRun: [SDTray] . (.Safer-Networking Ltd. – Spybot – Search & Destroy tray access.) — C:Program Files (x86)Spybot – Search & Destroy 2SDTray.exe
    O4 – HKUSS-1-5-19..Run: [Sidebar] . (.Microsoft Corporation – Gadgets du Bureau Windows.) — C:Program Files (x86)Windows SidebarSidebar.exe =>.Microsoft Corporation
    O4 – HKUSS-1-5-20..Run: [Sidebar] . (.Microsoft Corporation – Gadgets du Bureau Windows.) — C:Program Files (x86)Windows SidebarSidebar.exe =>.Microsoft Corporation
    O4 – HKUS.DEFAULT..RunOnce: [SPReview] . (.Microsoft Corporation – SP Reviewer.) — C:WindowsSystem32SPReviewSPReview.exe =>.Microsoft Corporation
    O4 – HKUSS-1-5-18..RunOnce: [SPReview] . (.Microsoft Corporation – SP Reviewer.) — C:WindowsSystem32SPReviewSPReview.exe =>.Microsoft Corporation
    O4 – HKUSS-1-5-19..RunOnce: [mctadmin] . (.Microsoft Corporation – MCTAdmin.) — C:WindowsSystem32mctadmin.exe =>.Microsoft Corporation
    O4 – HKUSS-1-5-20..RunOnce: [mctadmin] . (.Microsoft Corporation – MCTAdmin.) — C:WindowsSystem32mctadmin.exe =>.Microsoft Corporation
    O4 – HKUSS-1-5-21-36609031-822057253-2127131699-1000..Run: [HydraVisionDesktopManager] . (.AMD – HydraDM.) — C:Program Files (x86)ATI TechnologiesHydraVisionHydraDM.exe
    O4 – HKUSS-1-5-21-36609031-822057253-2127131699-1000..Run: [Akamai NetSession Interface] . (.Akamai Technologies, Inc. – Akamai NetSession Client.) — C:UsersHyakonAppDataLocalAkamainetsession_win.exe
    O4 – HKUSS-1-5-21-36609031-822057253-2127131699-1000..Run: [RocketDock] . (…) — D:Program Files (x86)RocketDockRocketDock.exe
    O4 – HKUSS-1-5-21-36609031-822057253-2127131699-1000..Run: [Skype] . (.Skype Technologies S.A. – Skype.) — D:Program Files (x86)SkypePhoneSkype.exe =>.Skype Technologies S.A.
    O4 – HKUSS-1-5-21-36609031-822057253-2127131699-1000..Run: [LOLReplay Recorder] . (.LOL Replay – LOL Replay Recorder.) — D:Program Files (x86)LOLReplayLOLRecorder.exe
    O4 – HKUSS-1-5-21-36609031-822057253-2127131699-1000..Run: [Spotify] . (.Spotify Ltd – Spotify.) — C:UsersHyakonAppDataRoamingSpotifySpotify.exe
    O4 – HKUSS-1-5-21-36609031-822057253-2127131699-1000..Run: [Gadwin PrintScreen (64-bit)] . (.Gadwin Systems – Gadwin PrintScreen.) — C:Program FilesGadwinGadwin PrintScreenPrintScreen64.exe
    O4 – HKUSS-1-5-21-36609031-822057253-2127131699-1000..Run: [Spotify Web Helper] . (.Spotify Ltd – SpotifyWebHelper.) — C:UsersHyakonAppDataRoamingSpotifyDataSpotifyWebHelper.exe
    ~ Application: Scanned in 00mn 00s

    —\ Boutons situés sur la barre d'outils principale d'Internet Explorer (O9)
    O9 – Extra button: @C:Program Files (x86)EvernoteEvernoteResource.dll,-101 [64Bits] – {A95fe080-8f5d-11d2-a20b-00aa003c157a} . (.Evernote Corp., 305 Walnut Street, Redwood – Evernote Clipper for Microsoft Internet Explorer.) — C:Program Files (x86)EvernoteEvernoteEvernoteIEx64.dll
    ~ IE Extra Buttons: Scanned in 00mn 00s

    —\ Modification Domaine/Adresses DNS (O17)
    O17 – HKLMSystemCCSServicesTcpip..{FD879303-65E8-45DD-A56A-83E4D92A8B87}: DhcpNameServer = 212.27.40.241 212.27.40.240
    O17 – HKLMSystemCS1ServicesTcpip..{FD879303-65E8-45DD-A56A-83E4D92A8B87}: DhcpNameServer = 212.27.40.241 212.27.40.240
    O17 – HKLMSystemCS2ServicesTcpip..{FD879303-65E8-45DD-A56A-83E4D92A8B87}: DhcpNameServer = 212.27.40.241 212.27.40.240
    O17 – HKLMSystemCCSServicesTcpipParameters: DhcpNameServer = 212.27.40.241 212.27.40.240
    ~ Domain: Scanned in 00mn 00s

    —\ Protocole additionnel (O18)
    O18 – Handler: wlpg [64Bits] – {E43EF6CD-A37A-4A9B-9E6F-83F89B8E6324} . (…) —
    O18 – Filter: application/x-msdownload [64Bits] – {1E66F26B-79EE-11D2-8710-00C04F79ED0D} . (.Microsoft Corporation – Microsoft .NET Runtime Execution Engine.) — C:WindowsSystem32mscoree.dll =>.Microsoft Corporation
    ~ Protocole Additionnel: Scanned in 00mn 00s

    —\ Liste des services NT non Microsoft et non désactivés (O23)
    O23 – Service: Keyboard And Mouse Communication Service (KMWDSERVICE) . (.UASSOFT.COM – Keyboard And Mouse Communication Service.) – C:Program Files (x86)5-button mouseKMWDSrv.exe
    O23 – Service: Spybot-S&D 2 Security Center Service (SDWSCService) . (.Safer-Networking Ltd. – Windows Security Center integration..) – C:Program Files (x86)Spybot – Search & Destroy 2SDWSCSvc.exe
    O23 – Service: XhwyAAF (XhwyAAF) . (…) – C:ProgramDataQYPhSYqNXhwyAAF.exe (.not file.)
    ~ Services: 19 Legitimates Filtered in 00mn 04s

    —\ Tâches planifiées en automatique (O39)
    [MD5.8B5254A48DEB875913A549A8300D8FFE] [APT] [{C126338C-AA20-480B-9E7B-9FA1DEDDE21E}] (…) — D:Program Files (x86)LucasArtsStar Wars Battlefront IIGameDataBattlefrontII.exe [15005184]
    O39 – APT: – (..) — C:WindowsSystem32TasksAdobe Flash Player Updater [1002]
    O39 – APT: – (..) — C:WindowsSystem32TasksGoogleUpdateTaskMachineCore [1066]
    O39 – APT: – (..) — C:WindowsSystem32TasksGoogleUpdateTaskMachineUA [1070]
    ~ Scheduled Task: 14 Legitimates Filtered in 00mn 03s

    —\ Logiciels installés (O42)
    O42 – Logiciel: 5-button mouse – (.Author.) [HKLM][64Bits] — InstallShield_{7B926DFB-431E-449F-B829-E45D928BCA55}
    O42 – Logiciel: 5-button mouse – (.Author.) [HKLM][64Bits] — {7B926DFB-431E-449F-B829-E45D928BCA55}
    O42 – Logiciel: AuraKingdom-FR – (…) [HKLM][64Bits] — AuraKingdom-FR
    O42 – Logiciel: Geany 1.24 – (.The Geany developer team.) [HKLM][64Bits] — Geany
    O42 – Logiciel: Kingo ROOT version 1.3.2.2226 – (.Kingosoft Technology Ltd..) [HKLM][64Bits] — {AE7675D6-0B31-494F-ABFA-822E1A0FDF17}_is1
    O42 – Logiciel: SRS-Root – (.123Unlock GSM Service.) [HKLM][64Bits] — {24EAD272-D05D-4950-BD59-F88AB7B4C8C7}_is1
    O42 – Logiciel: The Bard's Tale – (.inXile Entertainment.) [HKLM][64Bits] — Steam App 41900
    O42 – Logiciel: The Swapper – (.Olli Harjola, Otto Hantula, Tom Jubert, Carlo Castellano.) [HKLM][64Bits] — Steam App 231160
    O42 – Logiciel: Unholy Heights – (.Petit Depotto.) [HKLM][64Bits] — Steam App 249330
    O42 – Logiciel: iRoot – (.深圳信壹网络有限公司.) [HKLM][64Bits] — {1295E43F-382A-4CB2-9E0F-079C0D7401BB}_is1
    ~ Logic: 28 Legitimates Filtered in 00mn 00s

    —\ HKCU & HKLM Software Keys
    [HKCUSoftwareClubic]
    [HKCUSoftwareGLIDE3toOpenGL]
    [HKCUSoftwareGoldenGate]
    [HKCUSoftwarePando Networks]
    [HKCUSoftwareXinYi Network]
    [HKCUSoftwareinXile Entertainment]
    [HKLMSoftwareWow6432NodeDJOnlineFB]
    [HKLMSoftwareWow6432NodeDurante]
    [HKLMSoftwareWow6432NodePando Networks]
    [HKLMSoftwareWow6432NodeXinYi Network]
    [HKLMSoftwareWow6432NodeinXile Entertainment]
    ~ Key Software: 416 Legitimates Filtered in 00mn 00s

    —\ Contenu des dossiers Programs/ProgramFiles/ProgramData/AppData (O43)
    O43 – CFD: 04/09/2014 – 19:34:09 – [] —-D C:Program Files (x86)5-button mouse
    O43 – CFD: 25/08/2014 – 17:03:13 – [] —-D C:Program Files (x86)Pando Networks
    O43 – CFD: 19/08/2014 – 13:25:04 – [] –H-D C:ProgramData{0691F710-1ECA-4B5A-9727-25554F1BFDC6}
    O43 – CFD: 04/09/2014 – 19:34:09 – [] —-D C:ProgramDataMicrosoftWindowsStart MenuPrograms5-button mouse
    O43 – CFD: 08/02/2015 – 14:10:52 – [] —-D C:ProgramDataMicrosoftWindowsStart MenuProgramsGeany
    O43 – CFD: 08/02/2015 – 19:39:26 – [] —-D C:ProgramDataMicrosoftWindowsStart MenuProgramsKingo ROOT
    O43 – CFD: 18/10/2014 – 21:56:26 – [] —-D C:ProgramDataMicrosoftWindowsStart MenuProgramsR.G. Gamblers
    O43 – CFD: 08/02/2015 – 19:33:42 – [] —-D C:ProgramDataMicrosoftWindowsStart MenuProgramsROOT´óʦ
    O43 – CFD: 08/02/2015 – 19:37:20 – [] —-D C:ProgramDataMicrosoftWindowsStart MenuProgramsSRSROOT
    O43 – CFD: 14/07/2009 – 16:35:05 – [0] R-H-D C:ProgramDataMicrosoftWindowsStart MenuProgramsTablet PC
    O43 – CFD: 13/09/2014 – 12:57:34 – [] —-D C:UsersHyakonAppDataRoamingAdbDriverInstaller
    O43 – CFD: 08/02/2015 – 14:46:50 – [] —-D C:UsersHyakonAppDataRoaminggeany
    O43 – CFD: 24/01/2015 – 17:24:39 – [] –H-D C:UsersHyakonAppDataRoamingGoldenGate
    O43 – CFD: 08/02/2015 – 19:39:29 – [] —-D C:UsersHyakonAppDataRoamingKingosoft
    O43 – CFD: 08/02/2015 – 19:33:43 – [] —-D C:UsersHyakonAppDataRoamingmgyun
    O43 – CFD: 08/11/2014 – 13:43:36 – [] —-D C:UsersHyakonAppDataRoamingmitsurugi01
    O43 – CFD: 06/12/2014 – 22:08:55 – [] -SH-D C:UsersHyakonAppDataLocalEmieBrowserModeList
    O43 – CFD: 10/09/2014 – 21:58:51 – [] —-D C:UsersHyakonAppDataLocalGods_Will_Be_Watching
    O43 – CFD: 08/02/2015 – 19:39:27 – [] —-D C:UsersHyakonAppDataLocalKingosoft
    O43 – CFD: 04/09/2014 – 19:33:59 – [] —-D C:UsersHyakonAppDataLocal{ED489FC1-D2FB-40CD-A0CF-3FC29A3D0214}
    ~ Program Folder: 271 Legitimates Filtered in 00mn 00s

    —\ Enumération des clés de registre PoliciesSystem (MWPS) (O55)
    O55 – MWPS:[HKLM…PoliciesSystem] – “EnableLUA”=0
    O55 – MWPS:[HKLM…PoliciesSystem] – “EnableUIADesktopToggle”=0
    O55 – MWPS:[HKLM…PoliciesSystem] – “PromptOnSecureDesktop”=0
    O55 – MWPS:[HKLM…PoliciesSystem] – “FilterAdministratorToken”=0
    ~ MWPS: 18 Legitimates Filtered in 00mn 00s

    —\ Enumération des clés de registre PoliciesExplorer (MWPE) (O56)
    O56 – MWPE:[HKLM…policiesExplorer] – “NoActiveDesktopChanges”=1
    ~ MWPE Keys: 4 Legitimates Filtered in 00mn 00s

    —\ Liste des pilotes du système (SDL) (O58)
    O58 – SDL:14/07/2009 – 02:47:48 —A- . (.Emulex – Storport Miniport Driver for LightPulse HBAs.) — C:WindowsSystem32Driverselxstor.sys [530496]
    O58 – SDL:10/06/2009 – 21:31:59 —A- . (.Hauppauge Computer Works, Inc. – Hauppauge WinTV 885 Consumer IR Driver for eHome.) — C:WindowsSystem32Drivershcw85cir.sys [31232]
    O58 – SDL:14/07/2009 – 02:45:55 —A- . (.Promise Technology – Promise SuperTrak EX Series Driver for Windows.) — C:WindowsSystem32Driversstexstor.sys [24656]
    ~ Drivers: 72 Legitimates Filtered in 00mn 00s

    —\ Liste des outils de désinfection (LATC) (O63)
    O63 – Logiciel: ZHPDiag 2015 – (.Nicolas Coolman.) [HKLM] — ZHPDiag_is1 =>.Nicolas Coolman
    ~ ADS: Scanned in 00mn 00s

    —\ Menu de démarrage Internet (SMI) (O68)
    O68 – StartMenuInternet: [HKLM..ShellopenCommand] (.Mozilla Corporation – Firefox.) — C:Program Files (x86)Mozilla Firefoxfirefox.exe
    O68 – StartMenuInternet: [HKLM..ShellopenCommand] (.Google Inc. – Google Chrome.) — C:Program Files (x86)GoogleChromeApplicationchrome.exe
    O68 – StartMenuInternet: [HKLM..ShellopenCommand] (.Microsoft Corporation – Internet Explorer.) — C:Program FilesInternet Exploreriexplore.exe
    ~ Keys: Scanned in 00mn 00s

    —\ Recherche d'infection sur les navigateurs internet (SBI) (O69)
    O69 – SBI: SearchScopes [HKCU] {0633EE93-D776-472f-A0FF-E1416B8B2E3A} [DefaultScope] – (Bing) – http://www.bing.com” onclick=”window.open(this.href);return false;
    ~ Keys: Scanned in 00mn 00s

    —\ Recherche particulière à la racine du système (SPRF) (O84)
    [MD5.DD89B12A21223EE65709C540BEEB4D36] [SPRF][27/01/2015] (…) — C:UsersHyakonAppDataRoamingAdobeWLCMCache.dat [34]
    ~ Files: 2 Legitimates Filtered in 00mn 00s

    —\ Liste des exceptions du parefeu (FirewallRules) (O87)
    O87 – FAEL: “{CAF6E4D0-808D-4336-B82D-04A473994B7B}” | In – None – P6 – TRUE | .(.BitTorrent Inc. – µTorrent.) — C:UsersHyakonAppDataRoaminguTorrentuTorrent.exe =>P2P.BitTorrent
    O87 – FAEL: “{D03D330C-B294-453C-BDC1-7EE2AFAA7102}” | In – None – P17 – TRUE | .(.BitTorrent Inc. – µTorrent.) — C:UsersHyakonAppDataRoaminguTorrentuTorrent.exe =>P2P.BitTorrent
    ~ Firewall: 2 Legitimates Filtered in 00mn 05s

    —\ Etat général des services non Microsoft (EGS) (SR=Running, SS=Stopped)
    SS – | Demand 05/02/2015 267440 | (AdobeFlashPlayerUpdateSvc) . (.Adobe Systems Incorporated.) – C:WindowsSysWOW64MacromedFlashFlashPlayerUpdateService.exe
    SS – | Demand 09/04/2014 279024 | (cphs) . (.Intel Corporation.) – C:WindowsSysWow64IntelCpHeciSvc.exe
    SS – | Auto 03/08/2014 116648 | (gupdate) . (.Google Inc..) – C:Program Files (x86)GoogleUpdateGoogleUpdate.exe
    SS – | Demand 03/08/2014 116648 | (gupdatem) . (.Google Inc..) – C:Program Files (x86)GoogleUpdateGoogleUpdate.exe
    SS – | Demand 03/04/2005 69632 | (IDriverT) . (.Macrovision Corporation.) – C:Program Files (x86)Common FilesInstallShieldDriver11Intel 32IDriverT.exe
    SS – | Demand 27/08/2013 828376 | (Intel(R) Capability Licensing Service TCP IP Interface) . (.Intel(R) Corporation.) – C:Program FilesInteliCLS ClientSocketHeciServer.exe
    SS – | Demand 05/03/2015 148080 | (MozillaMaintenance) . (.Mozilla Foundation.) – C:Program Files (x86)Mozilla Maintenance Servicemaintenanceservice.exe
    SS – | Auto 02/01/2015 315488 | (SkypeUpdate) . (.Skype Technologies.) – D:Program Files (x86)SkypeUpdaterUpdater.exe
    SS – | Demand 16/07/2014 542912 | (Steam Client Service) . (.Valve Corporation.) – C:Program Files (x86)Common FilesSteamSteamService.exe
    SS – | Demand 14/07/2009 27136 | C:Program Files (x86)Windows Defendermpsvc.dll (WinDefend) . (.Microsoft Corporation.) – C:WindowsSystem32svchost.exe
    SS – | Auto 22/07/1658 0 | (XhwyAAF) . (…) – C:ProgramDataQYPhSYqNXhwyAAF.exe
    SR – | Auto 19/12/2014 81088 | (AdobeARMservice) . (.Adobe Systems Incorporated.) – C:Program Files (x86)Common FilesAdobeARM1.0armsvc.exe
    SR – | Auto 18/04/2014 239616 | (AMD External Events Utility) . (.AMD.) – C:WindowsSystem32atiesrxx.exe
    SR – | Auto 16/12/2014 431920 | (AntiVirSchedulerService) . (.Avira Operations GmbH & Co. KG.) – C:Program Files (x86)AviraAntiVir Desktopsched.exe
    SR – | Auto 16/12/2014 431920 | (AntiVirService) . (.Avira Operations GmbH & Co. KG.) – C:Program Files (x86)AviraAntiVir Desktopavguard.exe
    SR – | Auto 19/01/2015 182520 | (Avira.OE.ServiceHost) . (.Avira Operations GmbH & Co. KG.) – C:Program Files (x86)AviraMy AviraAvira.OE.ServiceHost.exe
    SR – | Auto 13/08/2014 9216 | (FreemakeVideoCapture) . (.Ellora Assets Corp..) – D:Program Files (x86)FreemakeCaptureLibCaptureLibService.exe
    SR – | Auto 09/04/2014 296432 | (igfxCUIService1.0.0.0) . (.Intel Corporation.) – C:WindowsSystem32igfxCUIService.exe
    SR – | Auto 27/08/2013 747520 | (Intel(R) Capability Licensing Service Interface) . (.Intel(R) Corporation.) – C:Program FilesInteliCLS ClientHeciServer.exe
    SR – | Auto 16/09/2013 169432 | (jhi_service) . (.Intel Corporation.) – C:Program Files (x86)IntelIntel(R) Management Engine ComponentsDALjhi_service.exe
    SR – | Auto 08/10/2009 201216 | (KMWDSERVICE) . (.UASSOFT.COM.) – C:Program Files (x86)5-button mouseKMWDSrv.exe
    SR – | Auto 16/09/2013 390616 | (LMS) . (.Intel Corporation.) – C:Program Files (x86)IntelIntel(R) Management Engine ComponentsLMSLMS.exe
    SR – | Auto 21/11/2014 1871160 | (MBAMScheduler) . (.Malwarebytes Corporation.) – C:Program Files (x86)Malwarebytes Anti-Malwarembamscheduler.exe
    SR – | Auto 21/11/2014 969016 | (MBAMService) . (.Malwarebytes Corporation.) – C:Program Files (x86)Malwarebytes Anti-Malwarembamservice.exe
    SR – | Auto 24/06/2014 1738168 | (SDScannerService) . (.Safer-Networking Ltd..) – C:Program Files (x86)Spybot – Search & Destroy 2SDFSSvc.exe
    SR – | Auto 27/06/2014 2088408 | (SDUpdateService) . (.Safer-Networking Ltd..) – C:Program Files (x86)Spybot – Search & Destroy 2SDUpdSvc.exe
    SR – | Auto 25/04/2014 171928 | (SDWSCService) . (.Safer-Networking Ltd..) – C:Program Files (x86)Spybot – Search & Destroy 2SDWSCSvc.exe
    SR – | Auto 22/07/1658 0 | (UserAccess7) . (.Sony DADC Austria AG..) – C:Windowssystem32UAService7.exe
    SR – | Demand 22/07/1658 0 | (WMPNetworkSvc) . (…) – C:Program Files (x86)Windows Media Playerwmpnetwk.exe =>.Microsoft Corporation
    SR – | Auto 14/07/2009 27136 | C:WindowsSystem32wuaueng.dll (wuauserv) . (.Microsoft Corporation.) – C:WindowsSystem32svchost.exe
    ~ Services: Scanned in 00mn 05s

    —\ Recherche d'infection sur le Master Boot Record (MBR)(O80)
    Run by Hyakon at 08/03/2015 15:41:21
    ~ OS 64 not supported by MBR tool
    ~ MBR: 0 Legitimates Filtered in 00mn 00s

    —\ Recherche d'infection sur le Master Boot Record (MBRCheck)(O80)
    Written by ad13, http://ad13.geekstog” onclick=”window.open(this.href);return false;
    Run by Hyakon at 08/03/2015 15:41:23
    ********* Dump file Name *********
    C:PhysicalDisk0_MBR.bin
    ~ MBR: Scanned in 00mn 02s

    —\ Scan Additionnel (O88)
    Database Version : 13008 – (01/03/2015)
    Clés trouvées (Keys found) : 0
    Valeurs trouvées (Values found) : 3
    Dossiers trouvés (Folders found) : 0
    Fichiers trouvés (Files found) : 0

    [HKLMSOFTWAREMicrosoftWindowsCurrentVersionRun]:StartCCC =>PUP.Istart^
    ~ Additionnel Scan: 258927 Items scanned in 00mn 10s

    —\ Informations complémentaires sur les modules
    ~ http://nicolascoolman.fr/r5-internet-explorer-proxy-management-iepm/” onclick=”window.open(this.href);return false; =>.Internet Explorer, Proxy Management (R5)
    ~ http://nicolascoolman.fr/o4-applications-demarrees-par-le-registre/” onclick=”window.open(this.href);return false; =>.Applications lancées au démarrage du système (O4)
    ~ AMI: 2 Legitimates Filtered in 00mn 00s

    —\ Récapitulatif des détections trouvées sur votre station
    http://nicolascoolman.fr/hijacker-browsers” onclick=”window.open(this.href);return false; =>Hijacker.Browsers
    http://www.nicolascoolman.fr/blog/” onclick=”window.open(this.href);return false; =>PUP.Istart
    ~ MSI: 2 link(s) detected in 00mn 00s

    ~ 964 Legitimates filtered by white list
    End of the scan (486 lines in 01mn 05s)(0.11)[/spoiler:23cthwup]

    Si quelqu’un pourrait m’aider a m’en débarrasser, j’en serais reconnaissant.
    Merci bien.

  • Anonyme
    Post count: 0

    Hello :hello:

    Bienvenue sur SosVirus :welcome:

    On va nettoyer cela :

    • Désactive ton antivirus le temps du téléchargement et de l’utilisation.
    • Télécharge ZHPCleaner de Nicolas Coolman sur ton bureau.
    • Ferme ton navigateur
    • Fais un double clique sur l’icône pour le lancer
      Note: Clique droit sur l’icône puis Exécuter en tant qu’administrateur sous Windows Vista, Seven et Windows 8
    • Accepte “les conditions d’utilisation
    • Clique sur Réparer

    Note: Durant le scan, si l’outil te demande “Avez-vous installé ce proxy ?” et que tu n’en as pas installé, clique sur “Non” ou “Voulez-vous remplacer la page d’accueil ?, clique sur “Non

    [hr:znt452g6]

    • Télécharge FRST (de Farbar) sur ton bureau !
    • Ferme toutes les applications en cours !
    • Lance FRST, exécuter en tant qu’administrateur sous Windows : 7/8 et Vista
    • Coche la case Addition.txt
    • Clique sur Scan

    • Une fois le scan terminé rends toi sur le bureau, deux rapports FRST.txt et Addition.txt ont été créés.
    • Héberge les rapports FRST.txt et Addition.txt sur SosUpload, puis copie/colle le lien fourni dans ta prochaine réponse
  • SebaShyo
    Post count: 0

    Merci pour ta on aide :)
    Voici les fichier demande

    ZHPCleaner : https://antimalware.top/download/rbxzlbctg7nw3u3qiokom0iawwx64pcvp6b7rjtj” onclick=”window.open(this.href);return false;

    addition : https://antimalware.top/download/rbxzlbctg7nw3u3qiokom0iawwx64pcvp6b7rjtj” onclick=”window.open(this.href);return false;

    frst : https://antimalware.top/download/cu93asxcgvip2db5qrgye4sg04k98938knrsf0rc” onclick=”window.open(this.href);return false;

  • Anonyme
    Post count: 0

    Tu as mis le rapport zhpcleaner à la place de addition.txt :(, tu peux renvoyer ce rapport stp ?

  • SebaShyo
    Post count: 0

    Desole voici l’addition.txt

    https://antimalware.top/download/kwtmk45u9tlsrvvntee3bi4aphmc9pk98p1h90zh” onclick=”window.open(this.href);return false;

  • Anonyme
    Post count: 0
    • Appuies simultanément sur les touches Windows et R
    • Une fenêtre va s’ouvrir, tape ceci : notepad
    • Clic sur OK

      Note : Le bloc note va s’ouvrir

    • Copie les lignes suivantes :
      start
      BHO-x32: Evernote extension -> {92EF2EAD-A7CE-4424-B0DB-499CF856608E} -> C:Program Files (x86)EvernoteEvernoteEvernoteIE.dll (Evernote Corp., 305 Walnut Street, Redwood City, CA 94063)
      C:Program Files (x86)Evernote
      HKLMSoftwareMicrosoftInternet ExplorerMain,Search Page = http://www.je-cherche.net
      HKLMSoftwareMicrosoftInternet ExplorerMain,Default_Page_URL = http://www.je-cherche.net
      HKUS-1-5-21-36609031-822057253-2127131699-1000SoftwareMicrosoftInternet ExplorerMain,Search Page = http://www.je-cherche.net
      HKUS-1-5-21-36609031-822057253-2127131699-1000SoftwareMicrosoftInternet ExplorerMain,Start Page = http://www.je-cherche.net
      HKUS-1-5-21-36609031-822057253-2127131699-1000SoftwareMicrosoftInternet ExplorerMain,Default_Secondary_Page_URL = http://www.je-cherche.net
      HKUS-1-5-21-36609031-822057253-2127131699-1000SoftwareMicrosoftInternet ExplorerMain,Default_Page_URL = http://www.je-cherche.net
      HKUS-1-5-21-36609031-822057253-2127131699-1000SoftwareMicrosoftInternet ExplorerMain,Start Page_bak = http://www.je-cherche.net
      HKUS-1-5-21-36609031-822057253-2127131699-1000SoftwareMicrosoftInternet ExplorerMain,Search Bar = http://www.je-cherche.net
      HKUS-1-5-21-36609031-822057253-2127131699-1000SoftwareMicrosoftInternet ExplorerMain,Default_Search_URL = http://www.je-cherche.net/keyword/
      HKUS-1-5-21-36609031-822057253-2127131699-1000SoftwareMicrosoftInternet ExplorerMain,SearchMigratedDefaultName = www.je-cherche.net
      HKUS-1-5-21-36609031-822057253-2127131699-1000SoftwareMicrosoftInternet ExplorerMain,SearchMigratedDefaultURL = http://www.je-cherche.net
      HKUS-1-5-21-36609031-822057253-2127131699-1000-{ED1FC765-E35E-4C3D-BF15-2C2B11260CE4}-0SoftwareMicrosoftInternet ExplorerMain,Search Page = http://www.je-cherche.net
      HKUS-1-5-21-36609031-822057253-2127131699-1000-{ED1FC765-E35E-4C3D-BF15-2C2B11260CE4}-0SoftwareMicrosoftInternet ExplorerMain,Start Page = http://www.je-cherche.net
      HKUS-1-5-21-36609031-822057253-2127131699-1000-{ED1FC765-E35E-4C3D-BF15-2C2B11260CE4}-0SoftwareMicrosoftInternet ExplorerMain,Default_Secondary_Page_URL = http://www.je-cherche.net
      HKUS-1-5-21-36609031-822057253-2127131699-1000-{ED1FC765-E35E-4C3D-BF15-2C2B11260CE4}-0SoftwareMicrosoftInternet ExplorerMain,Default_Page_URL = http://www.je-cherche.net
      HKUS-1-5-21-36609031-822057253-2127131699-1000-{ED1FC765-E35E-4C3D-BF15-2C2B11260CE4}-0SoftwareMicrosoftInternet ExplorerMain,Start Page_bak = http://www.je-cherche.net
      HKUS-1-5-21-36609031-822057253-2127131699-1000-{ED1FC765-E35E-4C3D-BF15-2C2B11260CE4}-0SoftwareMicrosoftInternet ExplorerMain,Search Bar = http://www.je-cherche.net
      HKUS-1-5-21-36609031-822057253-2127131699-1000-{ED1FC765-E35E-4C3D-BF15-2C2B11260CE4}-0SoftwareMicrosoftInternet ExplorerMain,Default_Search_URL = http://www.je-cherche.net/keyword/
      HKUS-1-5-21-36609031-822057253-2127131699-1000-{ED1FC765-E35E-4C3D-BF15-2C2B11260CE4}-0SoftwareMicrosoftInternet ExplorerMain,SearchMigratedDefaultName = www.je-cherche.net
      TcpipParameters: [DhcpNameServer] 212.27.40.241 212.27.40.240
      FF NewTab: hxxp://www.je-cherche.net
      FF SelectedSearchEngine: je-cherche
      FF Keyword.URL: hxxp://www.je-cherche.net/result.php?&q=
      FF Extension: NewTabURL - C:UsersHyakonAppDataRoamingMozillaFirefoxProfiles88nm6bya.defaultExtensionsnewtaburl@sogame.cat [2015-03-08]
      CHR StartupUrls: Default -> "hxxp://www.qoqa.fr/", "hxxp://www.google.com/ig/redirectdomain?brand=TEUA&bmod=TEUA"
      CHR HKLM-x32...ChromeExtension: [flliilndjeohchalpbbcdekjklbdgfkk] - No Path
      S2 XhwyAAF; "C:ProgramDataQYPhSYqNXhwyAAF.exe" [X]
      C:ProgramDataQYPhSYqN
      C:UsersHyakonAppDataRoamingmgyun
      end

    • Retourne dans le bloc note puis colle les lignes copiées.
    • Clic sur Fichier, puis Enregistrer sous …, nomme le fixlist.txt et enregistre le sur ton bureau !
    • Rends toi sur le bureau, Lance FRST, exécuter en tant qu’administrateur sous Windows : 7/8 et Vista
    • Clic sur Fix

      Note : Patiente le temps de la suppression

    • Une fois le scan terminé rends toi sur le bureau, deux rapports Fixlog.txt a été créé.
    • Héberge le rapport Fixlog.txt sur SosUpload, puis copie/colle le lien fourni dans ta prochaine réponse
  • SebaShyo
    Post count: 0

    Voici le fixlog : https://antimalware.top/download/opx6bye48mzzoox7e6ruumtbjvo61v65mulv0ag1” onclick=”window.open(this.href);return false;

  • Anonyme
    Post count: 0

    :hello:

    supprime les rapports 2 rapports FRST puis refait un scan et communique les nouveaux rapports stp

  • SebaShyo
    Post count: 0

    Donc voila les deux fichiers :
    Addition.txt : https://antimalware.top/success/8xm2zohj263b5kk8cbrai9kqrlrafjx813e707kx” onclick=”window.open(this.href);return false;

    Et le fichier
    Frst.txt : https://antimalware.top/success/lnda14mftmu372vkqnt0xffxl0rqinrtb578p3a4” onclick=”window.open(this.href);return false;

  • Anonyme
    Post count: 0

    Ok, plus de soucis je suppose ?

  • SebaShyo
    Post count: 0

    Oui depuis le fix sur FRST plus de soucis avec le malware c:
    J’aimerais bien comprendre comment tu as fais, épatant !
    Tout mes remerciements et si tu voudrais m’expliquer je suis tout ouïe !
    Encore merci :)

  • Anonyme
    Post count: 0

    J’ai tout simplement supprimé les redirections + le malware et son service associé :

    S2 XhwyAAF; “C:ProgramDataQYPhSYqNXhwyAAF.exe” [X]
    C:ProgramDataQYPhSYqN
    C:UsersHyakonAppDataRoamingmgyun

    Bonne semaine :hello:

    • Pour supprimer les outils de désinfections utilisés :
    • Télécharges Delfix sur ton Bureau.
    • Lance Delfix, exécuter en tant qu’administrateur sous Windows : 7/8 et Vista
    • Coche les cases suivantes :
      • Supprimer les outils de désinfection
      • Purger la restauration système

    • Télécharge CCleaner
    • installes la nouvelle version l’ancienne sera écrasé
    • Lance ccsetup¤¤¤.exe, exécuter en tant qu’administrateur sous Windows : 7/8 et Vista
    • Procède à l’installation de celui çi
    • Lance Ccleaner, exécuter en tant qu’administrateur sous Windows : 7/8 et Vista
    • Clic sur l’onglet “Nettoyeur
    • Clic sur Oui
    • Clic sur Nettoyer

      Note : Une fenêtre va s’ouvrir

    • Clic sur OK

    Information: Recommence les étapes ci-dessus, jusqu’à ce que tu n’es rien.

    Une fois fini sur nettoyeur fais registre

    • Clique sur Registre
    • Clique sur Chercher les erreurs

    Note: Patiente le temps de la recherche …

    • Clique sur Non à la fenêtre “Voulez vous créer une sauvegarde des clés de registre qui vont être supprimées ?

    • Clique sur la nouvelle fenêtre sur “Corriger les erreurs sélectionnées

    Information: Recommence les étapes ci-dessus, jusqu’à ce que tu n’es plus d’erreur.

    • Clique sur fermer

    [fin2desinf:3fk6ndxi][/fin2desinf:3fk6ndxi]

Le sujet ‘Malware : je-cherche.net’ est fermé à de nouvelles réponses.