Rapport aidez moi, windows 2003 d'un lycée contaminé

Rapport aidez moi, windows 2003 d'un lycée contaminé - Virus/Spywares - Windows & Software

Marsh Posté le 03-02-2008 à 11:07:47    

Bonjour, je suis administrateur réseau dans un lycée, et du jour au lendemain, le processus est a 100% presque tout le temps, on a OFFICE SCAN avec la derniere mise a jour, pourtant des virus ont pénétré apres un scan et reste, voici le rapport HIJACKTHIS, help me:
 
 
 
 
 
 
Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 14:23, on 2008-02-01
Platform: Windows 2003  (WinNT 5.02.3790)
MSIE: Internet Explorer v6.00 (6.00.3790.0000)
Boot mode: Normal
 
Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\ESM\AlertMan\PROGRAM\AMVMain.exe
C:\WINDOWS\system32\Dfssvc.exe
C:\WINDOWS\System32\dns.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\esmcmn.exe
C:\WINDOWS\system32\esmfs.exe
C:\WINDOWS\system32\esmstrg.exe
C:\WINDOWS\system32\inetsrv\inetinfo.exe
C:\WINDOWS\System32\ismserv.exe
C:\WINDOWS\system32\ntfrs.exe
C:\Program Files\Trend Micro\OfficeScan Client\ntrtscan.exe
E:\Ofcscan\PCCSRV\web\service\ofcservice.exe
C:\WINDOWS\system32\Ftpiaca.exe
C:\WINDOWS\system32\Srviaca.exe
E:\Ofcscan\PCCSRV\Web\Service\DbServer.exe
C:\WINDOWS\system32\tcpsvcs.exe
C:\WINDOWS\System32\snmp.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\System32\wins.exe
C:\Program Files\Trend Micro\OfficeScan Client\OfcPfwSvc.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\Explorer.EXE
C:\Program Files\Trend Micro\OfficeScan Client\pccntmon.exe
C:\Program Files\Java\jre1.6.0_03\bin\jusched.exe
C:\WINDOWS\system32\ctfmon.exe
E:\EasyPHP\EasyPHP.exe
E:\EasyPHP\Apache\apache.exe
E:\EasyPHP\Apache\apache.exe
C:\Program Files\Trend Micro\HijackThis\HijackThis.exe
C:\Program Files\Trend Micro\OfficeScan Client\tmlisten.exe
C:\WINDOWS\TEMP\HT665C.EXE
C:\PROGRA~1\MOZILL~1\FIREFOX.EXE
C:\Program Files\Trend Micro\OfficeScan Client\pccnt.exe
 
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = res://shdoclc.dll/hardAdmin.htm
R1 - HKCU\Software\Microsoft\Internet Connection Wizard,ShellNext = http://www.google.fr/
R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyServer = 192.168.224.254:3128
R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName = Liens
O2 - BHO: AcroIEHlprObj Class - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 7.0\ActiveX\AcroIEHelper.dll
O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre1.6.0_03\bin\ssv.dll
O3 - Toolbar: @msdxmLC.dll,-1@1033,&Radio - {8E718888-423F-11D2-876E-00A0C9082467} - C:\WINDOWS\system32\msdxm.ocx
O4 - HKLM\..\Run: [OfficeScanNT Monitor] "C:\Program Files\Trend Micro\OfficeScan Client\pccntmon.exe" -HideWindow
O4 - HKLM\..\Run: [SunJavaUpdateSched] "C:\Program Files\Java\jre1.6.0_03\bin\jusched.exe"
O4 - HKCU\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\ctfmon.exe
O4 - HKUS\S-1-5-19\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'SERVICE LOCAL')
O4 - HKUS\S-1-5-19\..\RunOnce: [tscuninstall] %systemroot%\system32\tscupgrd.exe (User 'SERVICE LOCAL')
O4 - HKUS\S-1-5-20\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'SERVICE RÉSEAU')
O4 - HKUS\S-1-5-20\..\RunOnce: [tscuninstall] %systemroot%\system32\tscupgrd.exe (User 'SERVICE RÉSEAU')
O4 - HKUS\S-1-5-18\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'SYSTEM')
O4 - HKUS\S-1-5-18\..\RunOnce: [tscuninstall] %systemroot%\system32\tscupgrd.exe (User 'SYSTEM')
O4 - HKUS\.DEFAULT\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'Default user')
O4 - HKUS\.DEFAULT\..\RunOnce: [tscuninstall] %systemroot%\system32\tscupgrd.exe (User 'Default user')
O4 - Startup: EasyPHP.lnk = E:\EasyPHP\EasyPHP.exe
O4 - Startup: Observe.lnk = C:\WINDOWS\system32\Repl\Export\Scripts\Observe.exe
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_03\bin\ssv.dll
O9 - Extra 'Tools' menuitem: Console Java (Sun) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_03\bin\ssv.dll
O9 - Extra button: Related - {c95fe080-8f5d-11d2-a20b-00aa003c157a} - C:\WINDOWS\web\related.htm
O9 - Extra 'Tools' menuitem: Show &Related Links - {c95fe080-8f5d-11d2-a20b-00aa003c157a} - C:\WINDOWS\web\related.htm
O15 - ESC Trusted Zone: http://www.7-zip.org
O15 - ESC Trusted Zone: http://crdp.ac-reims.fr
O15 - ESC Trusted Zone: http://msgp1.ac-reims.fr
O15 - ESC Trusted Zone: http://*.central
O15 - ESC Trusted Zone: http://www.easyphp.org
O15 - ESC Trusted Zone: http://forum.generation-nt.com
O15 - ESC Trusted Zone: http://www.generation-nt.com
O15 - ESC Trusted Zone: http://*.glpi-project.org
O15 - ESC Trusted Zone: http://www.google.fr
O15 - ESC Trusted Zone: http://pagead2.googlesyndication.com
O15 - ESC Trusted Zone: http://www.java.com
O15 - ESC Trusted Zone: http://dev.mysql.com
O15 - ESC Trusted Zone: http://fr2.php.net
O15 - ESC Trusted Zone: http://www.php.net
O15 - ESC Trusted Zone: http://forum.phpindex.com
O15 - ESC Trusted Zone: http://mesh.dl.sourceforge.net
O15 - ESC Trusted Zone: http://switch.dl.sourceforge.net
O15 - ESC Trusted Zone: http://*.sourceforge.net
O15 - ESC Trusted Zone: http://*.windowsupdate.com
O15 - ESC Trusted Zone: http://*.windowsupdate.com (HKLM)
O16 - DPF: {00134F72-5284-44F7-95A8-52A619F70751} (ObjWinNTCheck Class) - https://192.168.224.2:4343/officesc [...] nNTChk.cab
O16 - DPF: {35C3D91E-401A-4E45-88A5-F3B32CD72DF4} (Encrypt Class) - https://192.168.224.2:4343/officesc [...] AtxEnc.cab
O16 - DPF: {8990AFAD-D352-42AC-A72F-A660BBF6E209} (Console d'administration OfficeScan) - https://192.168.224.2:4343/officesc [...] onsole.cab
O16 - DPF: {A050E865-64E3-431B-8079-F0DFCEA90A2D} (PieChart Class) - https://192.168.224.2:4343/officesc [...] AtxPie.cab
O17 - HKLM\System\CCS\Services\Tcpip\Parameters: Domain = 0511565z.priv
O17 - HKLM\Software\..\Telephony: DomainName = 0511565z.priv
O17 - HKLM\System\CCS\Services\Tcpip\..\{4AC2D2C2-EDDA-4F23-A87A-4A6AEF054351}: NameServer = 127.0.0.1
O17 - HKLM\System\CS1\Services\Tcpip\Parameters: Domain = 0511565z.priv
O17 - HKLM\System\CS2\Services\Tcpip\Parameters: Domain = 0511565z.priv
O23 - Service: Alert Manager ALIVE(S) Service (AlertManagerALIVESendService) - Unknown owner - C:\ESM\AlertMan\PROGRAM\AMVALVS.EXE
O23 - Service: Alert Manager Main Service (AlertManagerMainService) - Unknown owner - C:\ESM\AlertMan\PROGRAM\AMVMain.exe
O23 - Service: Alert Manager Socket(S) Service (AlertManagerSocketSendService) - Unknown owner - C:\ESM\AlertMan\PROGRAM\AMVSCKS.EXE
O23 - Service: ESMCommonService - NEC Corporation - C:\WINDOWS\system32\esmcmn.exe
O23 - Service: ESMFSService - NEC Corporation - C:\WINDOWS\system32\esmfs.exe
O23 - Service: ESM Storage Service (ESMStorageService) - NEC Corporation - C:\WINDOWS\system32\esmstrg.exe
O23 - Service: ESRAS Utility Service (ESRAS_Utl) - NEC Corporation - C:\WINDOWS\system32\nvramsrv.exe
O23 - Service: OfficeScanNT RealTime Scan (ntrtscan) - Trend Micro Inc. - C:\Program Files\Trend Micro\OfficeScan Client\ntrtscan.exe
O23 - Service: OfficeScanNT Personal Firewall (OfcPfwSvc) - Trend Micro Inc. - C:\Program Files\Trend Micro\OfficeScan Client\OfcPfwSvc.exe
O23 - Service: OfficeScan Master Service (ofcservice) - Trend Micro Inc. - E:\Ofcscan\PCCSRV\web\service\ofcservice.exe
O23 - Service: Remote Packet Capture Protocol v.0 (experimental) (rpcapd) - Unknown owner - C:\Program Files\WinPcap\rpcapd.exe
O23 - Service: ServFTPiaca - CRDP de Reims - C:\WINDOWS\system32\Ftpiaca.exe
O23 - Service: Service IACA (Serviceiaca) - CRDP de Reims - C:\WINDOWS\system32\Srviaca.exe
O23 - Service: OfficeScanNT Listener (tmlisten) - Trend Micro Inc. - C:\Program Files\Trend Micro\OfficeScan Client\tmlisten.exe
 
--
End of file - 7723 bytes

Reply

Marsh Posté le 03-02-2008 à 11:07:47   

Reply

Sujets relatifs:

Leave a Replay

Make sure you enter the(*)required information where indicate.HTML code is not allowed