Prise de controle PC diag, rapport hijackthis

Fermé
proxy2009 Messages postés 3 Date d'inscription dimanche 15 mars 2009 Statut Membre Dernière intervention 16 mars 2009 - 15 mars 2009 à 19:03
jacques.gache Messages postés 33453 Date d'inscription mardi 13 novembre 2007 Statut Contributeur sécurité Dernière intervention 25 janvier 2016 - 16 mars 2009 à 22:37
Bonjour,
Bonjour
Impression d'une prise de controle de mon pc a distance meme si j'ai lever cette option recemment
Je recois des confirmations de demandes sur ma boite windows live alors que je n'a rien demander, sites sur lesquels j ai ete amener a effectuer des achats
veuillez trouver ci joint le log
config vista
pc portable satellie toshiba
ciao ciao

Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 13:39:55, on 15/03/2009
Platform: Windows Vista SP1 (WinNT 6.00.1905)
MSIE: Internet Explorer v7.00 (7.00.6001.18000)
Boot mode: Normal

Running processes:
C:\Windows\system32\Dwm.exe
C:\Windows\Explorer.EXE
C:\Windows\system32\taskeng.exe
C:\Program Files\Windows Defender\MSASCui.exe
C:\Windows\RtHDVCpl.exe
C:\Program Files\Synaptics\SynTP\SynTPEnh.exe
C:\Windows\System32\igfxtray.exe
C:\Windows\System32\hkcmd.exe
C:\Windows\System32\igfxpers.exe
C:\Program Files\Avira\AntiVir PersonalEdition Classic\avgnt.exe
C:\Program Files\COMODO\SafeSurf\cssurf.exe
C:\Program Files\COMODO\COMODO Internet Security\cfp.exe
C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe
C:\Program Files\Windows Live\Messenger\msnmsgr.exe
C:\Windows\ehome\ehtray.exe
C:\Program Files\Synaptics\SynTP\SynToshiba.exe
C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe
C:\Program Files\Vidalia Bundle\Vidalia\vidalia.exe
C:\Program Files\Vidalia Bundle\Privoxy\privoxy.exe
C:\Windows\system32\igfxsrvc.exe
C:\Program Files\uTorrent\uTorrent.exe
C:\Windows\ehome\ehmsas.exe
C:\Program Files\Synaptics\SynTP\SynTPHelper.exe
C:\Program Files\Vidalia Bundle\Tor\tor.exe
C:\Program Files\Free Download Manager\fdm.exe
C:\Downloads\Software\HiJackThis.exe
C:\Program Files\COMODO\COMODO Internet Security\cfpupdat.exe

R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = https://www.bing.com/?toHttps=1&redig=5FC791212101479BAFBE1A679848B1AF
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = https://www.msn.com/fr-fr/?ocid=iehp
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = https://www.bing.com/?toHttps=1&redig=5FC791212101479BAFBE1A679848B1AF
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = https://www.bing.com/?toHttps=1&redig=5FC791212101479BAFBE1A679848B1AF
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = https://www.msn.com/fr-fr/?ocid=iehp
R0 - HKLM\Software\Microsoft\Internet Explorer\Search,SearchAssistant =
R0 - HKLM\Software\Microsoft\Internet Explorer\Search,CustomizeSearch =
R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName =
O1 - Hosts: ::1 localhost
O2 - BHO: (no name) - {02478D38-C3F9-4efb-9B51-7695ECA05670} - (no file)
O2 - BHO: AcroIEHelperStub - {18DF081C-E8AD-4283-A596-FA578C2EBDC3} - C:\Program Files\Common Files\Adobe\Acrobat\ActiveX\AcroIEHelperShim.dll
O2 - BHO: (no name) - {5C255C8A-E604-49b4-9D64-90988571CECB} - (no file)
O2 - BHO: Programme d'aide de l'Assistant de connexion Windows Live - {9030D464-4C02-4ABF-8ECC-5164760863C6} - C:\Program Files\Common Files\Microsoft Shared\Windows Live\WindowsLiveLogin.dll
O2 - BHO: Google Toolbar Helper - {AA58ED58-01DD-4d91-8333-CF10577473F7} - C:\Program Files\Google\Google Toolbar\GoogleToolbar.dll
O2 - BHO: Google Toolbar Notifier BHO - {AF69DE43-7D58-4638-B6FA-CE66B5AD205D} - C:\Program Files\Google\GoogleToolbarNotifier\5.0.926.3450\swg.dll
O2 - BHO: Google Dictionary Compression sdch - {C84D72FE-E17D-4195-BB24-76C02E2E7C4E} - C:\Program Files\Google\Google Toolbar\Component\fastsearch_219B3E1547538286.dll
O2 - BHO: FDMIECookiesBHO Class - {CC59E0F9-7E43-44FA-9FAA-8377850BF205} - C:\Program Files\Free Download Manager\iefdm2.dll
O3 - Toolbar: &Google Toolbar - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - C:\Program Files\Google\Google Toolbar\GoogleToolbar.dll
O4 - HKLM\..\Run: [Windows Defender] %ProgramFiles%\Windows Defender\MSASCui.exe -hide
O4 - HKLM\..\Run: [RtHDVCpl] RtHDVCpl.exe
O4 - HKLM\..\Run: [SynTPEnh] C:\Program Files\Synaptics\SynTP\SynTPEnh.exe
O4 - HKLM\..\Run: [Adobe Reader Speed Launcher] "C:\Program Files\Adobe\Reader 9.0\Reader\Reader_sl.exe"
O4 - HKLM\..\Run: [IgfxTray] C:\Windows\system32\igfxtray.exe
O4 - HKLM\..\Run: [HotKeysCmds] C:\Windows\system32\hkcmd.exe
O4 - HKLM\..\Run: [Persistence] C:\Windows\system32\igfxpers.exe
O4 - HKLM\..\Run: [avgnt] "C:\Program Files\Avira\AntiVir PersonalEdition Classic\avgnt.exe" /min
O4 - HKLM\..\Run: [COMODO SafeSurf] "C:\Program Files\COMODO\SafeSurf\cssurf.exe" -s
O4 - HKLM\..\Run: [COMODO Internet Security] "C:\Program Files\COMODO\COMODO Internet Security\cfp.exe" -h
O4 - HKCU\..\Run: [BgMonitor_{79662E04-7C6C-4d9f-84C7-88D8A56B10AA}] "C:\Program Files\Common Files\Ahead\Lib\NMBgMonitor.exe"
O4 - HKCU\..\Run: [swg] C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe
O4 - HKCU\..\Run: [msnmsgr] "C:\Program Files\Windows Live\Messenger\msnmsgr.exe" /background
O4 - HKCU\..\Run: [ehTray.exe] C:\Windows\ehome\ehTray.exe
O4 - HKCU\..\Run: [Software Informer] "C:\Program Files\Software Informer\softinfo.exe" -autorun
O4 - HKCU\..\Run: [SpybotSD TeaTimer] C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe
O4 - HKCU\..\Run: [Vidalia] "C:\Program Files\Vidalia Bundle\Vidalia\vidalia.exe"
O4 - HKUS\S-1-5-19\..\Run: [Sidebar] %ProgramFiles%\Windows Sidebar\Sidebar.exe /detectMem (User 'SERVICE LOCAL')
O4 - HKUS\S-1-5-19\..\Run: [WindowsWelcomeCenter] rundll32.exe oobefldr.dll,ShowWelcomeCenter (User 'SERVICE LOCAL')
O4 - HKUS\S-1-5-20\..\Run: [Sidebar] %ProgramFiles%\Windows Sidebar\Sidebar.exe /detectMem (User 'SERVICE RÉSEAU')
O4 - Global Startup: Privoxy.lnk = C:\Program Files\Vidalia Bundle\Privoxy\privoxy.exe
O8 - Extra context menu item: E&xporter vers Microsoft Excel - res://C:\PROGRA~1\MICROS~2\Office12\EXCEL.EXE/3000
O8 - Extra context menu item: Télécharger la vidéo avec Free Download Manager - file://C:\Program Files\Free Download Manager\dlfvideo.htm
O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~2\Office12\REFIEBAR.DLL
O13 - Gopher Prefix:
O16 - DPF: {5727FF4C-EF4E-4d96-A96C-03AD91910448} (System Requirements Lab) - https://www.systemrequirementslab.com/cyri
O20 - AppInit_DLLs: C:\Windows\system32\cssdll32.dll
O23 - Service: a-squared Free Service (a2free) - Emsi Software GmbH - C:\Program Files\a-squared Free\a2service.exe
O23 - Service: Agere Modem Call Progress Audio (AgereModemAudio) - Agere Systems - C:\Windows\system32\agrsmsvc.exe
O23 - Service: Planificateur Avira AntiVir Personal - Free Antivirus (AntiVirScheduler) - Avira GmbH - C:\Program Files\Avira\AntiVir PersonalEdition Classic\sched.exe
O23 - Service: Avira AntiVir Personal - Free Antivirus Guard (AntiVirService) - Avira GmbH - C:\Program Files\Avira\AntiVir PersonalEdition Classic\avguard.exe
O23 - Service: avast! iAVS4 Control Service (aswUpdSv) - ALWIL Software - C:\Program Files\Alwil Software\Avast4\aswUpdSv.exe
O23 - Service: avast! Antivirus - ALWIL Software - C:\Program Files\Alwil Software\Avast4\ashServ.exe
O23 - Service: avast! Mail Scanner - ALWIL Software - C:\Program Files\Alwil Software\Avast4\ashMaiSv.exe
O23 - Service: avast! Web Scanner - ALWIL Software - C:\Program Files\Alwil Software\Avast4\ashWebSv.exe
O23 - Service: Boonty Games - Unknown owner - C:\Program Files\Common Files\BOONTY Shared\Service\Boonty.exe (file missing)
O23 - Service: COMODO Internet Security Helper Service (cmdAgent) - Unknown owner - C:\Program Files\COMODO\COMODO Internet Security\cmdagent.exe
O23 - Service: EBP Pervasive.SQL - Unknown owner - C:\PVSW\Bin\WGE_SRV.exe
O23 - Service: Google Updater Service (gusvc) - Google - C:\Program Files\Google\Common\Google Updater\GoogleUpdaterService.exe
O23 - Service: LexBce Server (LexBceS) - Lexmark International, Inc. - C:\Windows\System32\LEXBCES.EXE
O23 - Service: NMIndexingService - Unknown owner - C:\Program Files\Common Files\Ahead\Lib\NMIndexingService.exe (file missing)
O23 - Service: NMSAccessU - Unknown owner - C:\Program Files\CDBurnerXP\NMSAccessU.exe
A voir également:

5 réponses

jacques.gache Messages postés 33453 Date d'inscription mardi 13 novembre 2007 Statut Contributeur sécurité Dernière intervention 25 janvier 2016 1 616
15 mars 2009 à 19:12
bonjour, tu as 2 anti-virus avast et antivir perso vires avast qui est de loin le plus nul, et puis passes AD-remover tu fais la recherche et puis la suppression et la désinstallation , tu poste les rapport au fure et à mesure de leur création , Merci

1) télécharges http://sd-1.archive-host.com/membres/up/16506160323759868/AD-R.exe ( de Cyrildu17 / C_XX ) sur ton bureau :

Désactive le contrôle des comptes utilisateurs (tu le réactiveras apres le desinfectiont):
- Vas dans démarrer puis panneau de configuration
- Double Clique sur l'icône "Comptes d'utilisateurs"
- Clique ensuite sur désactiver et valide.


/!\ Déconnectes toi et fermes toutes applications en cours

● fait un clic droit clique sur le programme d'installation et fait exécuter en tant que administrateur , et installe le dans son emplacement par défaut. ( C:\Program files )
● clique droit sur l'icône Ad-remover située sur ton bureau et fait exécuter en tant qu'administrateur
● Au menu principal choisi l'option "A"
● Postes le rapport qui apparait à la fin .

( le rapport est sauvegardé aussi sous C:\Ad-report(date).log )

(CTRL+A Pour tout selectionner , CTRL+C pour copier et CTRL+V pour coller )

Note :

"Process.exe", une composante de l'outil, est détecté par certains antivirus (AntiVir, Dr.Web, Kaspersky Anti-Virus) comme étant un RiskTool.
Il ne s'agit pas d'un virus, mais d'un utilitaire destiné à mettre fin à des processus.
Mis entre de mauvaises mains, cet utilitaire pourrait arrêter des logiciels de sécurité (Antivirus, Firewall)





2) suppression:


tu relances ad-R en faisant un clic droit et exécuter en tant qu'administrateur et tu choisis l'option B

et tu coches tout et tu le lances laissesle travailler en appuyant sur S

et postes le rapport générer

Il est sauvegardé ici : C:\Ad-report(date).log






3) désinstallation de ad-renover:


Via l'Explorateur Windows, ouvre le répertoire C:\Program Files\Ad-remover.
Double-clique sur le fichier Uninstal.exe.

Supprime les fichiers : C:\Ad-report(date).log
Supprime ensuite le répertoire C:\Program Files\AD-Remover qui sera vide.


0
proxy2009 Messages postés 3 Date d'inscription dimanche 15 mars 2009 Statut Membre Dernière intervention 16 mars 2009
15 mars 2009 à 22:37
BONJOUR
merci de ta reponse
je desinstalle avast ok
ensuite j installle ad remover
ensuite ..........
merci de preciser la demarche stp
0
jacques.gache Messages postés 33453 Date d'inscription mardi 13 novembre 2007 Statut Contributeur sécurité Dernière intervention 25 janvier 2016 1 616
15 mars 2009 à 22:44
merci de preciser la demarche stp tu veux la démarche pourquoi perso pour ad-remover peux pas faire mieux !! lol !!
sino pour avast tu peux utiliser cet outil https://www.avast.com/fr-fr/uninstall-utility
0
proxy2009 Messages postés 3 Date d'inscription dimanche 15 mars 2009 Statut Membre Dernière intervention 16 mars 2009
16 mars 2009 à 22:25
Logfile created: 16/03/2009 22:10:5
Lavasoft Ad-Aware version: 8.0.3
Extended engine version: 8.1
User performing scan: portable

*********************** Definitions database information ***********************
Lavasoft definition file: 146.0
Extended engine definition file: 8.1

******************************** Scan results: *********************************
Scan profile name: Analyse astucieuse (ID: smart)
Objects scanned: 46411
Objects detected: 127


Type Detected
==========================
Processes.......: 0
Registry entries: 0
Hostfile entries: 0
Files...........: 0
Folders.........: 0
LSPs............: 0
Cookies.........: 127
Browser hijacks.: 0
MRU objects.....: 0



Removed items:
Description: *real* Family Name: Cookies Clean status: Success Item ID: 408817 Family ID: 0
Description: *247realmedia* Family Name: Cookies Clean status: Failed Item ID: 408945 Family ID: 0
Description: *realmedia* Family Name: Cookies Clean status: Failed Item ID: 409139 Family ID: 0
Description: *ad.yieldmanager* Family Name: Cookies Clean status: Success Item ID: 409172 Family ID: 0
Description: *adbrite* Family Name: Cookies Clean status: Success Item ID: 409218 Family ID: 0
Description: *adfarm1.adition* Family Name: Cookies Clean status: Success Item ID: 409171 Family ID: 0
Description: *adopt.euroclick* Family Name: Cookies Clean status: Success Item ID: 409169 Family ID: 0
Description: *specificclick* Family Name: Cookies Clean status: Success Item ID: 408807 Family ID: 0
Description: *adrevolver* Family Name: Cookies Clean status: Success Item ID: 408932 Family ID: 0
Description: *pointroll* Family Name: Cookies Clean status: Success Item ID: 408826 Family ID: 0
Description: *ads.pointroll* Family Name: Cookies Clean status: Failed Item ID: 408927 Family ID: 0
Description: *adserver* Family Name: Cookies Clean status: Success Item ID: 408737 Family ID: 0
Description: *adserv* Family Name: Cookies Clean status: Success Item ID: 408921 Family ID: 0
Description: *adserve* Family Name: Cookies Clean status: Failed Item ID: 409020 Family ID: 0
Description: *adtech* Family Name: Cookies Clean status: Success Item ID: 409018 Family ID: 0
Description: *advertis* Family Name: Cookies Clean status: Success Item ID: 408918 Family ID: 0
Description: *advertising* Family Name: Cookies Clean status: Failed Item ID: 409017 Family ID: 0
Description: *adviva* Family Name: Cookies Clean status: Success Item ID: 409016 Family ID: 0
Description: *weborama* Family Name: Cookies Clean status: Success Item ID: 408955 Family ID: 0
Description: *apmebf* Family Name: Cookies Clean status: Success Item ID: 409163 Family ID: 0
Description: *atdmt* Family Name: Cookies Clean status: Success Item ID: 408910 Family ID: 0
Description: *bs.serving-sys* Family Name: Cookies Clean status: Success Item ID: 408902 Family ID: 0
Description: *serving-sys* Family Name: Cookies Clean status: Success Item ID: 409130 Family ID: 0
Description: *kelkoo* Family Name: Cookies Clean status: Success Item ID: 408851 Family ID: 0
Description: *2o7* Family Name: Cookies Clean status: Success Item ID: 408943 Family ID: 0
Description: *doubleclick* Family Name: Cookies Clean status: Success Item ID: 408875 Family ID: 0
Description: *media.adrevolver* Family Name: Cookies Clean status: Failed Item ID: 409144 Family ID: 0
Description: *estat* Family Name: Cookies Clean status: Success Item ID: 408873 Family ID: 0
Description: *fastclick* Family Name: Cookies Clean status: Success Item ID: 408869 Family ID: 0
Description: *.lycos* Family Name: Cookies Clean status: Success Item ID: 408930 Family ID: 0
Description: *gamers* Family Name: Cookies Clean status: Success Item ID: 409301 Family ID: 0
Description: *ivwbox* Family Name: Cookies Clean status: Success Item ID: 409247 Family ID: 0
Description: *webstat* Family Name: Cookies Clean status: Success Item ID: 409228 Family ID: 0
Description: *mediaplex* Family Name: Cookies Clean status: Success Item ID: 408991 Family ID: 0
Description: *overture* Family Name: Cookies Clean status: Success Item ID: 408834 Family ID: 0
Description: *perf.overture* Family Name: Cookies Clean status: Failed Item ID: 408828 Family ID: 0
Description: *revsci* Family Name: Cookies Clean status: Success Item ID: 409137 Family ID: 0
Description: *searchportal.information* Family Name: Cookies Clean status: Success Item ID: 409134 Family ID: 0
Description: *toteme* Family Name: Cookies Clean status: Success Item ID: 408791 Family ID: 0
Description: *tradedoubler* Family Name: Cookies Clean status: Success Item ID: 408964 Family ID: 0
Description: *adbureau* Family Name: Cookies Clean status: Success Item ID: 409027 Family ID: 0
Description: *etracker* Family Name: Cookies Clean status: Success Item ID: 409002 Family ID: 0
Description: *2o7* Family Name: Cookies Clean status: Success Item ID: 408943 Family ID: 0
Description: *ad.yieldmanager* Family Name: Cookies Clean status: Success Item ID: 409172 Family ID: 0
Description: *adopt.euroclick* Family Name: Cookies Clean status: Success Item ID: 409169 Family ID: 0
Description: *adrevolver* Family Name: Cookies Clean status: Success Item ID: 408932 Family ID: 0
Description: *adserver* Family Name: Cookies Clean status: Success Item ID: 408737 Family ID: 0
Description: *adserv* Family Name: Cookies Clean status: Success Item ID: 408921 Family ID: 0
Description: *adserve* Family Name: Cookies Clean status: Failed Item ID: 409020 Family ID: 0
Description: *adtech* Family Name: Cookies Clean status: Success Item ID: 409018 Family ID: 0
Description: *advertis* Family Name: Cookies Clean status: Success Item ID: 408918 Family ID: 0
Description: *advertising* Family Name: Cookies Clean status: Failed Item ID: 409017 Family ID: 0
Description: *adviva* Family Name: Cookies Clean status: Success Item ID: 409016 Family ID: 0
Description: *weborama* Family Name: Cookies Clean status: Success Item ID: 408955 Family ID: 0
Description: *apmebf* Family Name: Cookies Clean status: Success Item ID: 409163 Family ID: 0
Description: *atdmt* Family Name: Cookies Clean status: Success Item ID: 408910 Family ID: 0
Description: *bs.serving-sys* Family Name: Cookies Clean status: Success Item ID: 408902 Family ID: 0
Description: *serving-sys* Family Name: Cookies Clean status: Success Item ID: 409130 Family ID: 0
Description: *doubleclick* Family Name: Cookies Clean status: Success Item ID: 408875 Family ID: 0
Description: *media.adrevolver* Family Name: Cookies Clean status: Failed Item ID: 409144 Family ID: 0
Description: *estat* Family Name: Cookies Clean status: Success Item ID: 408873 Family ID: 0
Description: *fastclick* Family Name: Cookies Clean status: Success Item ID: 408869 Family ID: 0
Description: *.lycos* Family Name: Cookies Clean status: Success Item ID: 408930 Family ID: 0
Description: *.comclick* Family Name: Cookies Clean status: Success Item ID: 409086 Family ID: 0
Description: *kelkoo* Family Name: Cookies Clean status: Success Item ID: 408851 Family ID: 0
Description: *mediaplex* Family Name: Cookies Clean status: Success Item ID: 408991 Family ID: 0
Description: *overture* Family Name: Cookies Clean status: Success Item ID: 408834 Family ID: 0
Description: *revsci* Family Name: Cookies Clean status: Success Item ID: 409137 Family ID: 0
Description: *specificclick* Family Name: Cookies Clean status: Success Item ID: 408807 Family ID: 0
Description: *tradedoubler* Family Name: Cookies Clean status: Success Item ID: 408964 Family ID: 0
Description: zedo* Family Name: Cookies Clean status: Success Item ID: 408736 Family ID: 0
Description: *real* Family Name: Cookies Clean status: Failed Item ID: 408817 Family ID: 0
Description: *247realmedia* Family Name: Cookies Clean status: Failed Item ID: 408945 Family ID: 0
Description: *realmedia* Family Name: Cookies Clean status: Failed Item ID: 409139 Family ID: 0
Description: *ad.yieldmanager* Family Name: Cookies Clean status: Failed Item ID: 409172 Family ID: 0
Description: *adbrite* Family Name: Cookies Clean status: Failed Item ID: 409218 Family ID: 0
Description: *adfarm1.adition* Family Name: Cookies Clean status: Failed Item ID: 409171 Family ID: 0
Description: *adopt.euroclick* Family Name: Cookies Clean status: Failed Item ID: 409169 Family ID: 0
Description: *specificclick* Family Name: Cookies Clean status: Failed Item ID: 408807 Family ID: 0
Description: *adrevolver* Family Name: Cookies Clean status: Failed Item ID: 408932 Family ID: 0
Description: *pointroll* Family Name: Cookies Clean status: Failed Item ID: 408826 Family ID: 0
Description: *ads.pointroll* Family Name: Cookies Clean status: Failed Item ID: 408927 Family ID: 0
Description: *adserver* Family Name: Cookies Clean status: Failed Item ID: 408737 Family ID: 0
Description: *adserv* Family Name: Cookies Clean status: Failed Item ID: 408921 Family ID: 0
Description: *adserve* Family Name: Cookies Clean status: Failed Item ID: 409020 Family ID: 0
Description: *adtech* Family Name: Cookies Clean status: Failed Item ID: 409018 Family ID: 0
Description: *advertis* Family Name: Cookies Clean status: Failed Item ID: 408918 Family ID: 0
Description: *advertising* Family Name: Cookies Clean status: Failed Item ID: 409017 Family ID: 0
Description: *adviva* Family Name: Cookies Clean status: Failed Item ID: 409016 Family ID: 0
Description: *weborama* Family Name: Cookies Clean status: Failed Item ID: 408955 Family ID: 0
Description: *apmebf* Family Name: Cookies Clean status: Failed Item ID: 409163 Family ID: 0
Description: *atdmt* Family Name: Cookies Clean status: Failed Item ID: 408910 Family ID: 0
Description: *bs.serving-sys* Family Name: Cookies Clean status: Failed Item ID: 408902 Family ID: 0
Description: *serving-sys* Family Name: Cookies Clean status: Failed Item ID: 409130 Family ID: 0
Description: *kelkoo* Family Name: Cookies Clean status: Failed Item ID: 408851 Family ID: 0
Description: *2o7* Family Name: Cookies Clean status: Failed Item ID: 408943 Family ID: 0
Description: *doubleclick* Family Name: Cookies Clean status: Failed Item ID: 408875 Family ID: 0
Description: *media.adrevolver* Family Name: Cookies Clean status: Failed Item ID: 409144 Family ID: 0
Description: *estat* Family Name: Cookies Clean status: Failed Item ID: 408873 Family ID: 0
Description: *fastclick* Family Name: Cookies Clean status: Failed Item ID: 408869 Family ID: 0
Description: *.lycos* Family Name: Cookies Clean status: Failed Item ID: 408930 Family ID: 0
Description: *gamers* Family Name: Cookies Clean status: Failed Item ID: 409301 Family ID: 0
Description: *ivwbox* Family Name: Cookies Clean status: Failed Item ID: 409247 Family ID: 0
Description: *webstat* Family Name: Cookies Clean status: Failed Item ID: 409228 Family ID: 0
Description: *mediaplex* Family Name: Cookies Clean status: Failed Item ID: 408991 Family ID: 0
Description: *overture* Family Name: Cookies Clean status: Failed Item ID: 408834 Family ID: 0
Description: *perf.overture* Family Name: Cookies Clean status: Failed Item ID: 408828 Family ID: 0
Description: *revsci* Family Name: Cookies Clean status: Failed Item ID: 409137 Family ID: 0
Description: *searchportal.information* Family Name: Cookies Clean status: Failed Item ID: 409134 Family ID: 0
Description: *toteme* Family Name: Cookies Clean status: Failed Item ID: 408791 Family ID: 0
Description: *tradedoubler* Family Name: Cookies Clean status: Failed Item ID: 408964 Family ID: 0
Description: *adbureau* Family Name: Cookies Clean status: Failed Item ID: 409027 Family ID: 0
Description: *etracker* Family Name: Cookies Clean status: Failed Item ID: 409002 Family ID: 0
Description: *.comclick* Family Name: Cookies Clean status: Success Item ID: 409086 Family ID: 0
Description: *ad.yieldmanager* Family Name: Cookies Clean status: Success Item ID: 409172 Family ID: 0
Description: *adserver* Family Name: Cookies Clean status: Success Item ID: 408737 Family ID: 0
Description: *adserv* Family Name: Cookies Clean status: Failed Item ID: 408921 Family ID: 0
Description: *adserve* Family Name: Cookies Clean status: Failed Item ID: 409020 Family ID: 0
Description: *advertis* Family Name: Cookies Clean status: Success Item ID: 408918 Family ID: 0
Description: *advertising* Family Name: Cookies Clean status: Failed Item ID: 409017 Family ID: 0
Description: *adtech* Family Name: Cookies Clean status: Success Item ID: 409018 Family ID: 0
Description: *real* Family Name: Cookies Clean status: Success Item ID: 408817 Family ID: 0
Description: *247realmedia* Family Name: Cookies Clean status: Failed Item ID: 408945 Family ID: 0
Description: *realmedia* Family Name: Cookies Clean status: Failed Item ID: 409139 Family ID: 0
Description: *weborama* Family Name: Cookies Clean status: Success Item ID: 408955 Family ID: 0
Description: *doubleclick* Family Name: Cookies Clean status: Success Item ID: 408875 Family ID: 0
Description: *estat* Family Name: Cookies Clean status: Success Item ID: 408873 Family ID: 0

Scan and cleaning complete: Finished correctly after 323 seconds

*********************************** Settings ***********************************

Scan profile:
ID: smart, enabled:1, value: Analyse astucieuse
ID: scancriticalareas, enabled:1, value: true
ID: scanrunningapps, enabled:1, value: true
ID: scanregistry, enabled:1, value: true
ID: scanlsp, enabled:1, value: true
ID: scanads, enabled:1, value: false
ID: scanhostsfile, enabled:1, value: false
ID: scanmru, enabled:1, value: false
ID: scanbrowserhijacks, enabled:1, value: true
ID: scantrackingcookies, enabled:1, value: true
ID: closebrowsers, enabled:1, value: false
ID: folderstoscan, enabled:1, value:
ID: scanrootkits, enabled:1, value: true
ID: usespywareheuristics, enabled:1, value: true
ID: extendedengine, enabled:0, value: true
ID: useheuristics, enabled:0, value: true
ID: heuristicslevel, enabled:0, value: mild, domain: medium,mild,strict
ID: filescanningoptions, enabled:1
ID: archives, enabled:1, value: false
ID: onlyexecutables, enabled:1, value: true
ID: skiplargerthan, enabled:1, value: 20480

Scan global:
ID: global, enabled:1
ID: addtocontextmenu, enabled:1, value: true
ID: playsoundoninfection, enabled:1, value: false
ID: soundfile, enabled:0, value: *to be filled in automatically*\alert.wav

Scheduled scan settings:
<Empty>

Update settings:
ID: updates, enabled:1
ID: launchthreatworksafterscan, enabled:1, value: normal, domain: normal,off,silently
ID: displaystatus, enabled:1, value: false
ID: deffiles, enabled:1, value: downloadandinstall, domain: dontcheck,downloadandinstall
ID: autodetectproxy, enabled:1, value: false
ID: useautoconfigscript, enabled:1, value: false
ID: autoconfigurl, enabled:0, value:
ID: useproxy, enabled:1, value: false
ID: proxyserver, enabled:0, value:
ID: softwareupdates, enabled:1, value: downloadandinstall, domain: dontcheck,downloadandinstall
ID: licenseandinfo, enabled:1, value: downloadandinstall, domain: dontcheck,downloadandinstall
ID: schedules, enabled:1, value: true
ID: updatedaily, enabled:1, value: Daily
ID: time, enabled:1, value: Mon Mar 16 22:09:00 2009
ID: frequency, enabled:1, value: daily, domain: daily,monthly,once,systemstart,weekly
ID: weekdays, enabled:1
ID: monday, enabled:1, value: false
ID: tuesday, enabled:1, value: false
ID: wednesday, enabled:1, value: false
ID: thursday, enabled:1, value: false
ID: friday, enabled:1, value: false
ID: saturday, enabled:1, value: false
ID: sunday, enabled:1, value: false
ID: monthly, enabled:1, value: 1, minvalue: 1, maxvalue: 31
ID: scanprofile, enabled:1, value:
ID: auto_deal_with_infections, enabled:1, value: false
ID: updateweekly, enabled:1, value: Weekly
ID: time, enabled:1, value: Mon Mar 16 22:09:00 2009
ID: frequency, enabled:1, value: weekly, domain: daily,monthly,once,systemstart,weekly
ID: weekdays, enabled:1
ID: monday, enabled:1, value: true
ID: tuesday, enabled:1, value: false
ID: wednesday, enabled:1, value: false
ID: thursday, enabled:1, value: false
ID: friday, enabled:1, value: false
ID: saturday, enabled:1, value: false
ID: sunday, enabled:1, value: false
ID: monthly, enabled:1, value: 1, minvalue: 1, maxvalue: 31
ID: scanprofile, enabled:1, value:
ID: auto_deal_with_infections, enabled:1, value: false

Appearance settings:
ID: appearance, enabled:1
ID: skin, enabled:1, value: default.egl, reglocation: HKEY_LOCAL_MACHINE\SOFTWARE\Lavasoft\Ad-Aware\Resource
ID: showtrayicon, enabled:1, value: true
ID: language, enabled:1, value: fr, reglocation: HKEY_LOCAL_MACHINE\SOFTWARE\Lavasoft\Ad-Aware\Language

Realtime protection settings:
ID: realtime, enabled:1
ID: processprotection, enabled:1, value: true
ID: registryprotection, enabled:0, value: true
ID: networkprotection, enabled:0, value: true
ID: loadatstartup, enabled:1, value: true
ID: usespywareheuristics, enabled:0, value: true
ID: extendedengine, enabled:0, value: true
ID: useheuristics, enabled:0, value: true
ID: heuristicslevel, enabled:0, value: strict, domain: medium,mild,strict
ID: infomessages, enabled:1, value: onlyimportant, domain: display,dontnotify,onlyimportant


****************************** System information ******************************
Computer name: PC-DE-PORTABLE
Processor name: Genuine Intel(R) CPU T2300 @ 1.66GHz
Processor identifier: x86 Family 6 Model 14 Stepping 8
Raw info: processorarchitecture 0, processortype 586, processorlevel 6, processor revision 3592, number of processors 2
Physical memory available: 169807872 bytes
Physical memory total: 1062535168 bytes
Virtual memory available: 2004762624 bytes
Virtual memory total: 2147352576 bytes
Memory load: 84%
Microsoft Windows Vista Home Premium Edition, 32-bit Service Pack 1 (build 6001)
Windows startup mode:

Running processes:
PID: 500 name: C:\Windows\System32\smss.exe owner: SYSTEM domain: AUTORITE NT
PID: 568 name: C:\Windows\System32\csrss.exe owner: SYSTEM domain: AUTORITE NT
PID: 612 name: C:\Windows\System32\wininit.exe owner: SYSTEM domain: AUTORITE NT
PID: 624 name: C:\Windows\System32\csrss.exe owner: SYSTEM domain: AUTORITE NT
PID: 660 name: C:\Windows\System32\services.exe owner: SYSTEM domain: AUTORITE NT
PID: 672 name: C:\Windows\System32\lsass.exe owner: SYSTEM domain: AUTORITE NT
PID: 680 name: C:\Windows\System32\lsm.exe owner: SYSTEM domain: AUTORITE NT
PID: 776 name: C:\Windows\System32\winlogon.exe owner: SYSTEM domain: AUTORITE NT
PID: 864 name: C:\Windows\System32\svchost.exe owner: SYSTEM domain: AUTORITE NT
PID: 932 name: C:\Windows\System32\svchost.exe owner: SERVICE RÉSEAU domain: AUTORITE NT
PID: 972 name: C:\Windows\System32\svchost.exe owner: SYSTEM domain: AUTORITE NT
PID: 1064 name: C:\Windows\System32\svchost.exe owner: SERVICE LOCAL domain: AUTORITE NT
PID: 1148 name: C:\Windows\System32\svchost.exe owner: SYSTEM domain: AUTORITE NT
PID: 1160 name: C:\Windows\System32\svchost.exe owner: SYSTEM domain: AUTORITE NT
PID: 1256 name: C:\Windows\System32\SLsvc.exe owner: SERVICE RÉSEAU domain: AUTORITE NT
PID: 1300 name: C:\Windows\System32\svchost.exe owner: SERVICE LOCAL domain: AUTORITE NT
PID: 1460 name: C:\Windows\System32\svchost.exe owner: SERVICE RÉSEAU domain: AUTORITE NT
PID: 1732 name: C:\Windows\System32\dwm.exe owner: portable domain: PC-de-portable
PID: 1772 name: C:\Program Files\Alwil Software\Avast4\aswUpdSv.exe owner: SYSTEM domain: AUTORITE NT
PID: 1784 name: C:\Windows\explorer.exe owner: portable domain: PC-de-portable
PID: 1804 name: C:\Program Files\Alwil Software\Avast4\ashServ.exe owner: SYSTEM domain: AUTORITE NT
PID: 1916 name: C:\Program Files\Windows Defender\MSASCui.exe owner: portable domain: PC-de-portable
PID: 1936 name: C:\Windows\RtHDVCpl.exe owner: portable domain: PC-de-portable
PID: 1964 name: C:\Program Files\Synaptics\SynTP\SynTPEnh.exe owner: portable domain: PC-de-portable
PID: 1980 name: C:\Windows\System32\igfxtray.exe owner: portable domain: PC-de-portable
PID: 1988 name: C:\Windows\System32\hkcmd.exe owner: portable domain: PC-de-portable
PID: 1996 name: C:\Windows\System32\igfxpers.exe owner: portable domain: PC-de-portable
PID: 2004 name: C:\Program Files\COMODO\SafeSurf\cssurf.exe owner: portable domain: PC-de-portable
PID: 2012 name: C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe owner: portable domain: PC-de-portable
PID: 2020 name: C:\Program Files\Windows Live\Messenger\msnmsgr.exe owner: portable domain: PC-de-portable
PID: 384 name: C:\Windows\ehome\ehtray.exe owner: portable domain: PC-de-portable
PID: 448 name: C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe owner: portable domain: PC-de-portable
PID: 508 name: C:\Program Files\Vidalia Bundle\Privoxy\privoxy.exe owner: portable domain: PC-de-portable
PID: 548 name: C:\Windows\ehome\ehmsas.exe owner: portable domain: PC-de-portable
PID: 1868 name: C:\Windows\System32\LEXBCES.EXE owner: SYSTEM domain: AUTORITE NT
PID: 1168 name: C:\Windows\System32\igfxsrvc.exe owner: portable domain: PC-de-portable
PID: 1108 name: C:\Windows\System32\LEXPPS.EXE owner: SYSTEM domain: AUTORITE NT
PID: 200 name: C:\Windows\System32\spoolsv.exe owner: SYSTEM domain: AUTORITE NT
PID: 1924 name: C:\Windows\System32\svchost.exe owner: SERVICE LOCAL domain: AUTORITE NT
PID: 2252 name: C:\Program Files\Synaptics\SynTP\SynToshiba.exe owner: portable domain: PC-de-portable
PID: 2476 name: C:\Program Files\a-squared Free\a2service.exe owner: SYSTEM domain: AUTORITE NT
PID: 2532 name: C:\Windows\System32\agrsmsvc.exe owner: SYSTEM domain: AUTORITE NT
PID: 2552 name: C:\PVSW\Bin\WGE_SRV.exe owner: SYSTEM domain: AUTORITE NT
PID: 2588 name: C:\Program Files\CDBurnerXP\NMSAccessU.exe owner: SYSTEM domain: AUTORITE NT
PID: 2708 name: C:\PVSW\Bin\w3dbsmgr.exe owner: SYSTEM domain: AUTORITE NT
PID: 2764 name: C:\Windows\System32\svchost.exe owner: SERVICE RÉSEAU domain: AUTORITE NT
PID: 2784 name: C:\Windows\System32\svchost.exe owner: SERVICE LOCAL domain: AUTORITE NT
PID: 2844 name: C:\Windows\System32\svchost.exe owner: SYSTEM domain: AUTORITE NT
PID: 2884 name: C:\Windows\System32\SearchIndexer.exe owner: SYSTEM domain: AUTORITE NT
PID: 3088 name: C:\Program Files\Vidalia Bundle\Vidalia\vidalia.exe owner: portable domain: PC-de-portable
PID: 3152 name: C:\Program Files\Vidalia Bundle\Tor\tor.exe owner: portable domain: PC-de-portable
PID: 3352 name: C:\Program Files\Alwil Software\Avast4\ashMaiSv.exe owner: SYSTEM domain: AUTORITE NT
PID: 3380 name: C:\Windows\System32\taskeng.exe owner: portable domain: PC-de-portable
PID: 3456 name: C:\Program Files\Alwil Software\Avast4\ashWebSv.exe owner: SYSTEM domain: AUTORITE NT
PID: 4036 name: C:\Program Files\Synaptics\SynTP\SynTPHelper.exe owner: portable domain: PC-de-portable
PID: 2600 name: C:\Program Files\Windows Media Player\wmpnscfg.exe owner: portable domain: PC-de-portable
PID: 2268 name: C:\Windows\System32\taskeng.exe owner: SYSTEM domain: AUTORITE NT
PID: 3020 name: C:\Program Files\Windows Media Player\wmpnetwk.exe owner: SERVICE RÉSEAU domain: AUTORITE NT
PID: 3180 name: C:\Program Files\uTorrent\uTorrent.exe owner: portable domain: PC-de-portable
PID: 812 name: C:\Windows\System32\SearchProtocolHost.exe owner: SYSTEM domain: AUTORITE NT
PID: 3428 name: C:\Program Files\Internet Explorer\iexplore.exe owner: portable domain: PC-de-portable
PID: 4564 name: C:\PROGRA~1\FREEDO~1\fdm.exe owner: portable domain: PC-de-portable
PID: 5632 name: C:\Downloads\Software\Ad-AwareAE.exe owner: portable domain: PC-de-portable
PID: 3492 name: C:\Program Files\Windows Mail\WinMail.exe owner: portable domain: PC-de-portable
PID: 5224 name: C:\Users\portable\AppData\Local\Temp\miaEA8D.tmp\Ad-AwareAE.exe owner: portable domain: PC-de-portable
PID: 4916 name: C:\Windows\System32\msiexec.exe owner: SYSTEM domain: AUTORITE NT
PID: 4692 name: C:\Windows\servicing\TrustedInstaller.exe owner: SYSTEM domain: AUTORITE NT
PID: 4524 name: C:\Windows\System32\SearchFilterHost.exe owner: SYSTEM domain: AUTORITE NT
PID: 3548 name: C:\Program Files\Lavasoft\Ad-Aware\Ad-Aware.exe owner: portable domain: PC-de-portable
PID: 4264 name: C:\Program Files\Lavasoft\Ad-Aware\AAWService.exe owner: SYSTEM domain: AUTORITE NT
PID: 4552 name: C:\Windows\System32\conime.exe owner: portable domain: PC-de-portable
PID: 4464 name: C:\Windows\System32\wbem\unsecapp.exe owner: SYSTEM domain: AUTORITE NT
PID: 4636 name: C:\Windows\System32\wbem\WmiPrvSE.exe owner: SYSTEM domain: AUTORITE NT
PID: 6072 name: C:\Program Files\Lavasoft\Ad-Aware\AAWTray.exe owner: portable domain: PC-de-portable

Startup items:
Name: {8C7461EF-2B13-11d2-BE35-3078302C2030}
imagepath: Component Categories cache daemon
Name: WebCheck
imagepath: {E6FB5E20-DE35-11CF-9C87-00AA005127ED}
Name: Windows Defender
imagepath: %ProgramFiles%\Windows Defender\MSASCui.exe -hide
Name: RtHDVCpl
imagepath: RtHDVCpl.exe
Name: SynTPEnh
imagepath: C:\Program Files\Synaptics\SynTP\SynTPEnh.exe
Name: Adobe Reader Speed Launcher
imagepath: "C:\Program Files\Adobe\Reader 9.0\Reader\Reader_sl.exe"
Name: IgfxTray
imagepath: C:\Windows\system32\igfxtray.exe
Name: HotKeysCmds
imagepath: C:\Windows\system32\hkcmd.exe
Name: Persistence
imagepath: C:\Windows\system32\igfxpers.exe
Name: COMODO SafeSurf
imagepath: "C:\Program Files\COMODO\SafeSurf\cssurf.exe" -s
Name: Ad-Watch
imagepath: C:\Program Files\Lavasoft\Ad-Aware\AAWTray.exe
Name:
imagepath: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini
Name:
location: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\Privoxy.lnk
imagepath: C:\Program Files\Vidalia Bundle\Privoxy\privoxy.exe

Bootexecute items:
Name:
imagepath: autocheck autochk *

Running services:
Name: a2free
displayname: a-squared Free Service
Name: AeLookupSvc
displayname: Expérience d’application
Name: AgereModemAudio
displayname: Agere Modem Call Progress Audio
Name: aswUpdSv
displayname: avast! iAVS4 Control Service
Name: AudioEndpointBuilder
displayname: Générateur de points de terminaison du service Audio Windows
Name: Audiosrv
displayname: Audio Windows
Name: avast! Antivirus
displayname: avast! Antivirus
Name: avast! Mail Scanner
displayname: avast! Mail Scanner
Name: avast! Web Scanner
displayname: avast! Web Scanner
Name: BFE
displayname: Moteur de filtrage de base
Name: BITS
displayname: Service de transfert intelligent en arrière-plan
Name: Browser
displayname: Explorateur d'ordinateurs
Name: CryptSvc
displayname: Services de chiffrement
Name: DcomLaunch
displayname: Lanceur de processus serveur DCOM
Name: Dhcp
displayname: Client DHCP
Name: Dnscache
displayname: Client DNS
Name: DPS
displayname: Service de stratégie de diagnostic
Name: EapHost
displayname: Protocole EAP (Extensible Authentication Protocol)
Name: EBP Pervasive.SQL
displayname: EBP Pervasive.SQL
Name: EMDMgmt
displayname: Service ReadyBoost
Name: Eventlog
displayname: Journal d’événements Windows
Name: EventSystem
displayname: Système d'événement COM+
Name: fdPHost
displayname: Hôte du fournisseur de découverte de fonctions
Name: FDResPub
displayname: Publication des ressources de découverte de fonctions
Name: gpsvc
displayname: Client de stratégie de groupe
Name: IKEEXT
displayname: Modules de génération de clés IKE et AuthIP
Name: iphlpsvc
displayname: Assistance IP
Name: KeyIso
displayname: Isolation de clé CNG
Name: KtmRm
displayname: Service KtmRm pour Distributed Transaction Coordinator
Name: LanmanServer
displayname: Serveur
Name: LanmanWorkstation
displayname: Station de travail
Name: LexBceS
displayname: LexBce Server
Name: lmhosts
displayname: Assistance NetBIOS sur TCP/IP
Name: MMCSS
displayname: Planificateur de classes multimédias
Name: MpsSvc
displayname: Pare-feu Windows
Name: msiserver
displayname: Windows Installer
Name: Netman
displayname: Connexions réseau
Name: netprofm
displayname: Service Liste des réseaux
Name: NlaSvc
displayname: Connaissance des emplacements réseau
Name: NMSAccessU
displayname: NMSAccessU
Name: nsi
displayname: Service Interface du magasin réseau
Name: PcaSvc
displayname: Service de l’Assistant Compatibilité des programmes
Name: PlugPlay
displayname: Plug-and-Play
Name: PolicyAgent
displayname: Agent de stratégie IPsec
Name: ProfSvc
displayname: Service de profil utilisateur
Name: ProtectedStorage
displayname: Emplacement protégé
Name: RasMan
displayname: Gestionnaire de connexions d'accès distant
Name: RpcSs
displayname: Appel de procédure distante (RPC)
Name: SamSs
displayname: Gestionnaire de comptes de sécurité
Name: Schedule
displayname: Planificateur de tâches
Name: seclogon
displayname: Ouverture de session secondaire
Name: SENS
displayname: Service de notification d’événements système
Name: ShellHWDetection
displayname: Détection matériel noyau
Name: slsvc
displayname: Licence du logiciel
Name: Spooler
displayname: Spouleur d'impression
Name: SSDPSRV
displayname: Découverte SSDP
Name: SstpSvc
displayname: Service SSTP (Secure Socket Tunneling Protocol)
Name: stisvc
displayname: Acquisition d'image Windows (WIA)
Name: SysMain
displayname: Superfetch
Name: TabletInputService
displayname: Service Panneau de saisie Tablet PC
Name: TapiSrv
displayname: Téléphonie
Name: TermService
displayname: Services Terminal Server
Name: Themes
displayname: Thèmes
Name: TrkWks
displayname: Client de suivi de lien distribué
Name: TrustedInstaller
displayname: Programme d’installation de modules Windows
Name: upnphost
displayname: Hôte de périphérique UPnP
Name: UxSms
displayname: Gestionnaire de sessions du Gestionnaire de fenêtrage
Name: W32Time
displayname: Horloge Windows
Name: WdiSystemHost
displayname: Hôte système de diagnostics
Name: WebClient
displayname: WebClient
Name: WerSvc
displayname: Service de rapport d'erreurs Windows
Name: WinDefend
displayname: Windows Defender
Name: Winmgmt
displayname: Infrastructure de gestion Windows
Name: Wlansvc
displayname: Service de configuration automatique WLAN
Name: WMPNetworkSvc
displayname: Service Partage réseau du Lecteur Windows Media
Name: WPDBusEnum
displayname: Service Énumérateur d’appareil mobile
Name: wscsvc
displayname: Centre de sécurité
Name: WSearch
displayname: Windows Search
Name: wuauserv
displayname: Windows Update
Name: wudfsvc
displayname: Windows Driver Foundation - Infrastructure de pilote mode-utilisateur
Name: Lavasoft Ad-Aware Service
displayname: Lavasoft Ad-Aware Service
0

Vous n’avez pas trouvé la réponse que vous recherchez ?

Posez votre question
jacques.gache Messages postés 33453 Date d'inscription mardi 13 novembre 2007 Statut Contributeur sécurité Dernière intervention 25 janvier 2016 1 616
16 mars 2009 à 22:37
c'est quoi ton rapport je te demande de passer et de poster un rapport de AD-Remover et toi tu me mets un rapport de AD-Aware ce ne sont pas les même fonction donc ne recherche et ne supprimes pas les mêmes chose soit tu me postes un rapport comme demander dans le 1) du message 1 ou on en reste la !!!
0