OVH Cloud OVH Cloud

Q : Lgofile de Hijackthis - que faire ?

3 réponses
Avatar
Frank
Voici le logfile que trouve Hijackthis :
Merci de vos conseils.
Logfile of HijackThis v1.97.7
Scan saved at 22:35:20, on 28/06/2004
Platform: Windows XP SP1 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP1 (6.00.2800.1106)



Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\Program Files\Fichiers communs\Symantec Shared\ccEvtMgr.exe
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\CNet Wireless Monitor\WLService.exe
C:\Program Files\Norton SystemWorks\Norton AntiVirus\navapsvc.exe
C:\Program Files\CNet Wireless Monitor\WLanCfgG.exe
C:\Program Files\Norton SystemWorks\Norton Utilities\NPROTECT.EXE
C:\WINDOWS\System32\nvsvc32.exe
C:\PROGRA~1\NORTON~1\SPEEDD~1\nopdb.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\System32\00THotkey.exe
C:\WINDOWS\System32\TPWRTRAY.EXE
C:\WINDOWS\System32\TFNF5.exe
C:\Program Files\TOSHIBA\TOSHIBA Controls\TFncKy.exe
C:\Program Files\Synaptics\SynTP\SynTPLpr.exe
C:\Program Files\Synaptics\SynTP\SynTPEnh.exe
C:\Program Files\Fichiers communs\Symantec Shared\ccApp.exe
C:\Program Files\Adaptec\Easy CD Creator 5\DirectCD\DirectCD.exe
C:\WINDOWS\System32\ctfmon.exe
C:\Program Files\Messenger\msmsgs.exe
C:\WINDOWS\System32\wuauclt.exe
C:\Documents and Settings\JEROME\Mes
documents\Svgde260604\Download\HijackThis.exe



R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Bar =
file://C:\DOCUME~1\JEROME\LOCALS~1\Temp\sp.html
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page =
file://C:\DOCUME~1\JEROME\LOCALS~1\Temp\sp.html
R1 - HKCU\Software\Microsoft\Internet Explorer\Search,SearchAssistant =
file://C:\DOCUME~1\JEROME\LOCALS~1\Temp\sp.html
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Bar =
file://C:\DOCUME~1\JEROME\LOCALS~1\Temp\sp.html
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page =
file://C:\DOCUME~1\JEROME\LOCALS~1\Temp\sp.html
R0 - HKLM\Software\Microsoft\Internet Explorer\Search,SearchAssistant =
file://C:\DOCUME~1\JEROME\LOCALS~1\Temp\sp.html
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,HomeOldSP = about:blank
R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName =
Liens
O2 - BHO: (no name) - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program
Files\Adobe\Acrobat 6.0\Reader\ActiveX\AcroIEHelper.dll
O2 - BHO: NAV Helper - {BDF3E430-B101-42AD-A544-FADC6B084872} - C:\Program
Files\Norton SystemWorks\Norton AntiVirus\NavShExt.dll
O3 - Toolbar: &Radio - {8E718888-423F-11D2-876E-00A0C9082467} -
C:\WINDOWS\System32\msdxm.ocx
O3 - Toolbar: Norton AntiVirus - {42CDD1BF-3FFB-4238-8AD1-7859DF00B1D6} -
C:\Program Files\Norton SystemWorks\Norton AntiVirus\NavShExt.dll
O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE NvQTwk,NvCplDaemon initialize
O4 - HKLM\..\Run: [nwiz] nwiz.exe /installquiet
O4 - HKLM\..\Run: [00THotkey] C:\WINDOWS\System32\00THotkey.exe
O4 - HKLM\..\Run: [000StTHK] 000StTHK.exe
O4 - HKLM\..\Run: [Tpwrtray] TPWRTRAY.EXE
O4 - HKLM\..\Run: [TFNF5] TFNF5.exe
O4 - HKLM\..\Run: [TFncKy] TFncKy.exe /Type 01
O4 - HKLM\..\Run: [SynTPLpr] C:\Program Files\Synaptics\SynTP\SynTPLpr.exe
O4 - HKLM\..\Run: [SynTPEnh] C:\Program Files\Synaptics\SynTP\SynTPEnh.exe
O4 - HKLM\..\Run: [ccApp] C:\Program Files\Fichiers communs\Symantec
Shared\ccApp.exe
O4 - HKLM\..\Run: [ccRegVfy] C:\Program Files\Fichiers communs\Symantec
Shared\ccRegVfy.exe


--
Frank N
Attention adresse antispam (enlever "_" & "#") :
fk_nico#las_arro#bas_on#line_point_fr

3 réponses

Avatar
Frank
Ad-aware de son côté annonce qu'il ne peut enlever
c:windowssystem32dji.dll !!??

Des idées ?

--
Frank N
Attention adresse antispam (enlever "_" & "#") :
fk_nico#las_arro#bas_on#line_point_fr


"Frank" a écrit dans le message de news:
40e084dd$0$1084$
Voici le logfile que trouve Hijackthis :
Merci de vos conseils.
Logfile of HijackThis v1.97.7
Scan saved at 22:35:20, on 28/06/2004
Platform: Windows XP SP1 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP1 (6.00.2800.1106)



Running processes:
C:WINDOWSSystem32smss.exe
C:WINDOWSsystem32winlogon.exe
C:WINDOWSsystem32services.exe
C:WINDOWSsystem32lsass.exe
C:WINDOWSsystem32svchost.exe
C:WINDOWSSystem32svchost.exe
C:Program FilesFichiers communsSymantec SharedccEvtMgr.exe
C:WINDOWSsystem32spoolsv.exe
C:Program FilesCNet Wireless MonitorWLService.exe
C:Program FilesNorton SystemWorksNorton AntiVirusnavapsvc.exe
C:Program FilesCNet Wireless MonitorWLanCfgG.exe
C:Program FilesNorton SystemWorksNorton UtilitiesNPROTECT.EXE
C:WINDOWSSystem32nvsvc32.exe
C:PROGRA~1NORTON~1SPEEDD~1nopdb.exe
C:WINDOWSExplorer.EXE
C:WINDOWSSystem320THotkey.exe
C:WINDOWSSystem32TPWRTRAY.EXE
C:WINDOWSSystem32TFNF5.exe
C:Program FilesTOSHIBATOSHIBA ControlsTFncKy.exe
C:Program FilesSynapticsSynTPSynTPLpr.exe
C:Program FilesSynapticsSynTPSynTPEnh.exe
C:Program FilesFichiers communsSymantec SharedccApp.exe
C:Program FilesAdaptecEasy CD Creator 5DirectCDDirectCD.exe
C:WINDOWSSystem32ctfmon.exe
C:Program FilesMessengermsmsgs.exe
C:WINDOWSSystem32wuauclt.exe
C:Documents and SettingsJEROMEMes
documentsSvgde260604DownloadHijackThis.exe



R1 - HKCUSoftwareMicrosoftInternet ExplorerMain,Search Bar > file://C:DOCUME~1JEROMELOCALS~1Tempsp.html
R1 - HKCUSoftwareMicrosoftInternet ExplorerMain,Search Page > file://C:DOCUME~1JEROMELOCALS~1Tempsp.html
R1 - HKCUSoftwareMicrosoftInternet ExplorerSearch,SearchAssistant > file://C:DOCUME~1JEROMELOCALS~1Tempsp.html
R1 - HKLMSoftwareMicrosoftInternet ExplorerMain,Search Bar > file://C:DOCUME~1JEROMELOCALS~1Tempsp.html
R1 - HKLMSoftwareMicrosoftInternet ExplorerMain,Search Page > file://C:DOCUME~1JEROMELOCALS~1Tempsp.html
R0 - HKLMSoftwareMicrosoftInternet ExplorerSearch,SearchAssistant > file://C:DOCUME~1JEROMELOCALS~1Tempsp.html
R1 - HKCUSoftwareMicrosoftInternet ExplorerMain,HomeOldSP about:blank
R0 - HKCUSoftwareMicrosoftInternet ExplorerToolbar,LinksFolderName > Liens
O2 - BHO: (no name) - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:Program
FilesAdobeAcrobat 6.0ReaderActiveXAcroIEHelper.dll
O2 - BHO: NAV Helper - {BDF3E430-B101-42AD-A544-FADC6B084872} - C:Program
FilesNorton SystemWorksNorton AntiVirusNavShExt.dll
O3 - Toolbar: &Radio - {8E718888-423F-11D2-876E-00A0C9082467} -
C:WINDOWSSystem32msdxm.ocx
O3 - Toolbar: Norton AntiVirus - {42CDD1BF-3FFB-4238-8AD1-7859DF00B1D6} -
C:Program FilesNorton SystemWorksNorton AntiVirusNavShExt.dll
O4 - HKLM..Run: [NvCplDaemon] RUNDLL32.EXE NvQTwk,NvCplDaemon initialize
O4 - HKLM..Run: [nwiz] nwiz.exe /installquiet
O4 - HKLM..Run: [00THotkey] C:WINDOWSSystem320THotkey.exe
O4 - HKLM..Run: [000StTHK] 000StTHK.exe
O4 - HKLM..Run: [Tpwrtray] TPWRTRAY.EXE
O4 - HKLM..Run: [TFNF5] TFNF5.exe
O4 - HKLM..Run: [TFncKy] TFncKy.exe /Type 01
O4 - HKLM..Run: [SynTPLpr] C:Program FilesSynapticsSynTPSynTPLpr.exe
O4 - HKLM..Run: [SynTPEnh] C:Program FilesSynapticsSynTPSynTPEnh.exe
O4 - HKLM..Run: [ccApp] C:Program FilesFichiers communsSymantec
SharedccApp.exe
O4 - HKLM..Run: [ccRegVfy] C:Program FilesFichiers communsSymantec
SharedccRegVfy.exe


--
Frank N
Attention adresse antispam (enlever "_" & "#") :
fk_nico#las_arro#bas_on#line_point_fr






Avatar
raymond.drygala
L'astuce c'est de mettre ce disk en slave et d'utiliser
un second os ( 2K ou xp ) installé sur un 2 eme disk dur.

Et là tu fait sauter tout ce que tu veux mais attention
à l'erreur d'interprétation. Ouvre plutôt un dossier Déplace
dans lequel tu vire les fichiers vérolés ou censés l'êtres.
En cas d'errreur tu peux toujours les récupérer.

Bon courage.



"Frank" a écrit dans le message de news:
40e084dd$0$1084$
Voici le logfile que trouve Hijackthis :
Merci de vos conseils.
Logfile of HijackThis v1.97.7
Scan saved at 22:35:20, on 28/06/2004
Platform: Windows XP SP1 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP1 (6.00.2800.1106)



Running processes:
C:WINDOWSSystem32smss.exe
C:WINDOWSsystem32winlogon.exe
C:WINDOWSsystem32services.exe
C:WINDOWSsystem32lsass.exe
C:WINDOWSsystem32svchost.exe
C:WINDOWSSystem32svchost.exe
C:Program FilesFichiers communsSymantec SharedccEvtMgr.exe
C:WINDOWSsystem32spoolsv.exe
C:Program FilesCNet Wireless MonitorWLService.exe
C:Program FilesNorton SystemWorksNorton AntiVirusnavapsvc.exe
C:Program FilesCNet Wireless MonitorWLanCfgG.exe
C:Program FilesNorton SystemWorksNorton UtilitiesNPROTECT.EXE
C:WINDOWSSystem32nvsvc32.exe
C:PROGRA~1NORTON~1SPEEDD~1nopdb.exe
C:WINDOWSExplorer.EXE
C:WINDOWSSystem320THotkey.exe
C:WINDOWSSystem32TPWRTRAY.EXE
C:WINDOWSSystem32TFNF5.exe
C:Program FilesTOSHIBATOSHIBA ControlsTFncKy.exe
C:Program FilesSynapticsSynTPSynTPLpr.exe
C:Program FilesSynapticsSynTPSynTPEnh.exe
C:Program FilesFichiers communsSymantec SharedccApp.exe
C:Program FilesAdaptecEasy CD Creator 5DirectCDDirectCD.exe
C:WINDOWSSystem32ctfmon.exe
C:Program FilesMessengermsmsgs.exe
C:WINDOWSSystem32wuauclt.exe
C:Documents and SettingsJEROMEMes
documentsSvgde260604DownloadHijackThis.exe



R1 - HKCUSoftwareMicrosoftInternet ExplorerMain,Search Bar > file://C:DOCUME~1JEROMELOCALS~1Tempsp.html
R1 - HKCUSoftwareMicrosoftInternet ExplorerMain,Search Page > file://C:DOCUME~1JEROMELOCALS~1Tempsp.html
R1 - HKCUSoftwareMicrosoftInternet ExplorerSearch,SearchAssistant > file://C:DOCUME~1JEROMELOCALS~1Tempsp.html
R1 - HKLMSoftwareMicrosoftInternet ExplorerMain,Search Bar > file://C:DOCUME~1JEROMELOCALS~1Tempsp.html
R1 - HKLMSoftwareMicrosoftInternet ExplorerMain,Search Page > file://C:DOCUME~1JEROMELOCALS~1Tempsp.html
R0 - HKLMSoftwareMicrosoftInternet ExplorerSearch,SearchAssistant > file://C:DOCUME~1JEROMELOCALS~1Tempsp.html
R1 - HKCUSoftwareMicrosoftInternet ExplorerMain,HomeOldSP about:blank
R0 - HKCUSoftwareMicrosoftInternet ExplorerToolbar,LinksFolderName > Liens
O2 - BHO: (no name) - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:Program
FilesAdobeAcrobat 6.0ReaderActiveXAcroIEHelper.dll
O2 - BHO: NAV Helper - {BDF3E430-B101-42AD-A544-FADC6B084872} - C:Program
FilesNorton SystemWorksNorton AntiVirusNavShExt.dll
O3 - Toolbar: &Radio - {8E718888-423F-11D2-876E-00A0C9082467} -
C:WINDOWSSystem32msdxm.ocx
O3 - Toolbar: Norton AntiVirus - {42CDD1BF-3FFB-4238-8AD1-7859DF00B1D6} -
C:Program FilesNorton SystemWorksNorton AntiVirusNavShExt.dll
O4 - HKLM..Run: [NvCplDaemon] RUNDLL32.EXE NvQTwk,NvCplDaemon initialize
O4 - HKLM..Run: [nwiz] nwiz.exe /installquiet
O4 - HKLM..Run: [00THotkey] C:WINDOWSSystem320THotkey.exe
O4 - HKLM..Run: [000StTHK] 000StTHK.exe
O4 - HKLM..Run: [Tpwrtray] TPWRTRAY.EXE
O4 - HKLM..Run: [TFNF5] TFNF5.exe
O4 - HKLM..Run: [TFncKy] TFncKy.exe /Type 01
O4 - HKLM..Run: [SynTPLpr] C:Program FilesSynapticsSynTPSynTPLpr.exe
O4 - HKLM..Run: [SynTPEnh] C:Program FilesSynapticsSynTPSynTPEnh.exe
O4 - HKLM..Run: [ccApp] C:Program FilesFichiers communsSymantec
SharedccApp.exe
O4 - HKLM..Run: [ccRegVfy] C:Program FilesFichiers communsSymantec
SharedccRegVfy.exe


--
Frank N
Attention adresse antispam (enlever "_" & "#") :
fk_nico#las_arro#bas_on#line_point_fr






Avatar
Frank
Voila ce que trouve ad-aware :

Vendor Type Category Object Comment
Possible Browser Hijack attempt RegData Data Miner
HKEY_CURRENT_USER:SoftwareMicrosoftInternet ExplorerMain"Start Page"
("about:blank") Possible browser hijack attempt
Possible Browser Hijack attempt RegData Data Miner
HKEY_LOCAL_MACHINE:SoftwareMicrosoftInternet ExplorerMain"Start Page"
("about:blank") Possible browser hijack attempt
Possible Browser Hijack attempt RegData Data Miner
HKEY_CURRENT_USER:SoftwareMicrosoftInternet ExplorerMain"Search Page"
("file://C:DOCUME~1JEROMELOCALS~1Tempsp.html") Possible browser hijack
attempt
Possible Browser Hijack attempt RegData Data Miner
HKEY_CURRENT_USER:SoftwareMicrosoftInternet ExplorerMain"Search Bar"
("file://C:DOCUME~1JEROMELOCALS~1Tempsp.html") Possible browser hijack
attempt
Possible Browser Hijack attempt RegData Data Miner
HKEY_CURRENT_USER:SoftwareMicrosoftInternet
ExplorerSearch"SearchAssistant"
("file://C:DOCUME~1JEROMELOCALS~1Tempsp.html") Possible browser hijack
attempt
Possible Browser Hijack attempt RegData Data Miner
HKEY_LOCAL_MACHINE:SoftwareMicrosoftInternet ExplorerMain"Search Page"
("file://C:DOCUME~1JEROMELOCALS~1Tempsp.html") Possible browser hijack
attempt
Possible Browser Hijack attempt RegData Data Miner
HKEY_LOCAL_MACHINE:SoftwareMicrosoftInternet ExplorerMain"Search Bar"
("file://C:DOCUME~1JEROMELOCALS~1Tempsp.html") Possible browser hijack
attempt
Possible Browser Hijack attempt RegData Data Miner
HKEY_LOCAL_MACHINE:SoftwareMicrosoftInternet
ExplorerSearch"SearchAssistant"
("file://C:DOCUME~1JEROMELOCALS~1Tempsp.html") Possible browser hijack
attempt
CoolWebSearch RegKey Malware
HKEY_CLASSES_ROOT:CLSID{32E12422-DF64-435B-B885-86623C7CC98D}
c:windowssystem32gjokb.dll
CoolWebSearch File Malware c:windowssystem32gjokb.dll
CoolWebSearch RegKey Malware
HKEY_CLASSES_ROOT:CLSID{BD6B2A06-E9BC-4F83-BED1-141E56638FFD}
c:windowssystem32gjokb.dll
CoolWebSearch RegKey Malware
HKEY_CLASSES_ROOT:PROTOCOLSFiltertext/html c:windowssystem32gjokb.dll
CoolWebSearch RegKey Malware
HKEY_CLASSES_ROOT:PROTOCOLSFiltertext/plain c:windowssystem32gjokb.dll
CoolWebSearch RegKey Malware
HKEY_LOCAL_MACHINE:SOFTWAREMicrosoftWindowsCurrentVersionExplorerBrowse
r Helper Objects{32E12422-DF64-435B-B885-86623C7CC98D}
c:windowssystem32gjokb.dll
CoolWebSearch RegValue Malware
HKEY_CURRENT_USER:SoftwareMicrosoftInternet ExplorerToolbarWebBrowser
CoolWebSearch File Malware c:docume~1jeromelocals~1tempsp.html


--
Frank N
Attention adresse antispam (enlever "_" & "#") :
fk_nico#las_arro#bas_on#line_point_fr


"joke0" a écrit dans le message de news:

Salut,

Frank:
[big snip]

Je ne vois rien d'anormal, à part un rapport incomplet ;-)

Qu'est-ce que Ad-aware diagnostique pour la .dll ?

--
joke0