11 réponses
olivier114
Messages postés
1552
Date d'inscription
mercredi 4 mars 2009
Statut
Membre
Dernière intervention
26 novembre 2013
104
6 juil. 2009 à 12:00
6 juil. 2009 à 12:00
bonjour,
Avant de commencer desactiver votre antivirus le temps de la desinfection
1. Il est fortement recommandé d’installer que un seul antivirus
2. commencer par télécharger https://www.clubic.com/telecharger-fiche215092-malwarebytes-anti-malware.html puis lancer une analyse complete du pc.
3. il est très important d’enregistrer le rapport
4. ensuite télécharger http://www.commentcamarche.net/telecharger/telecharger 34055026 panda anti rootkit (puis lancer une analyse)
5. il est très important d’enregistrer le rapport
6. maintenant veuillez poster chaque rapport dans un post different merci.
Avant de commencer desactiver votre antivirus le temps de la desinfection
1. Il est fortement recommandé d’installer que un seul antivirus
2. commencer par télécharger https://www.clubic.com/telecharger-fiche215092-malwarebytes-anti-malware.html puis lancer une analyse complete du pc.
3. il est très important d’enregistrer le rapport
4. ensuite télécharger http://www.commentcamarche.net/telecharger/telecharger 34055026 panda anti rootkit (puis lancer une analyse)
5. il est très important d’enregistrer le rapport
6. maintenant veuillez poster chaque rapport dans un post different merci.
bon alors voici le rapport malewarebytes!
Malwarebytes' Anti-Malware 1.38
Version de la base de données: 2297
Windows 5.1.2600 Service Pack 3
02/07/2009 15:50:18
mbam-log-2009-07-02 (15-50-18).txt
Type de recherche: Examen complet (A:\|C:\|D:\|E:\|F:\|G:\|H:\|)
Eléments examinés: 164755
Temps écoulé: 51 minute(s), 23 second(s)
Processus mémoire infecté(s): 1
Module(s) mémoire infecté(s): 1
Clé(s) du Registre infectée(s): 9
Valeur(s) du Registre infectée(s): 3
Elément(s) de données du Registre infecté(s): 1
Dossier(s) infecté(s): 4
Fichier(s) infecté(s): 24
Processus mémoire infecté(s):
C:\Program Files\EoRezo\EoEngine.exe (Adware.EoRezo) -> Unloaded process successfully.
Module(s) mémoire infecté(s):
C:\Program Files\EoRezo\EoAdv\EoAdv.dll (Adware.EoRezo) -> Delete on reboot.
Clé(s) du Registre infectée(s):
HKEY_CLASSES_ROOT\TypeLib\{b6acb3f1-6a83-432c-b854-3e1056f87f4e} (Adware.EoRezo) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\Interface\{819db72d-1c28-4387-9778-e2ff3dc86f74} (Adware.EoRezo) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{64f56fc1-1272-44cd-ba6e-39723696e350} (Adware.EoRezo) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{64f56fc1-1272-44cd-ba6e-39723696e350} (Adware.EoRezo) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{64f56fc1-1272-44cd-ba6e-39723696e350} (Adware.EoRezo) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Software Notifier (Rogue.Multiple) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\EoRezo (Rogue.Eorezo) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\InternetGameBox (Adware.Popup) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\IGB (Malware.Trace) -> Quarantined and deleted successfully.
Valeur(s) du Registre infectée(s):
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\eoengine (Adware.EoRezo) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\Desktop\id (Malware.Trace) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\Desktop\host (Malware.Trace) -> Quarantined and deleted successfully.
Elément(s) de données du Registre infecté(s):
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\FirewallDisableNotify (Disabled.SecurityCenter) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.
Dossier(s) infecté(s):
C:\Program Files\InternetGameBox (Adware.EGDAccess) -> Quarantined and deleted successfully.
c:\program files\internetgamebox\ressources (Adware.EGDAccess) -> Quarantined and deleted successfully.
c:\program files\internetgamebox\ressources\favoris (Adware.EGDAccess) -> Quarantined and deleted successfully.
c:\program files\internetgamebox\skins (Adware.EGDAccess) -> Quarantined and deleted successfully.
Fichier(s) infecté(s):
c:\documents and settings\jo\local settings\application data\frdwi_navps.dat (Adware.Navipromo.H) -> Quarantined and deleted successfully.
c:\documents and settings\jo\local settings\application data\frdwi.dat (Adware.Navipromo.H) -> Quarantined and deleted successfully.
C:\Program Files\EoRezo\EoEngine.exe (Adware.EoRezo) -> Quarantined and deleted successfully.
C:\Program Files\EoRezo\EoAdv\EoAdv.dll (Adware.EoRezo) -> Quarantined and deleted successfully.
c:\program files\EoRezo\EoAdv\EoRezoBHO.dll (Adware.EoRezo) -> Quarantined and deleted successfully.
c:\WINDOWS\system32\2.tmp (Trojan.Agent) -> Quarantined and deleted successfully.
c:\WINDOWS\system32\blackster.scr (Trojan.Agent) -> Quarantined and deleted successfully.
c:\program files\internetgamebox\language (Adware.EGDAccess) -> Quarantined and deleted successfully.
c:\program files\internetgamebox\ressources\AttenteOff.html (Adware.EGDAccess) -> Quarantined and deleted successfully.
c:\program files\internetgamebox\ressources\AttenteOn.html (Adware.EGDAccess) -> Quarantined and deleted successfully.
c:\program files\internetgamebox\ressources\configv2_en.xml (Adware.EGDAccess) -> Quarantined and deleted successfully.
c:\program files\internetgamebox\ressources\configv2_es.xml (Adware.EGDAccess) -> Quarantined and deleted successfully.
c:\program files\internetgamebox\ressources\configv2_fr.xml (Adware.EGDAccess) -> Quarantined and deleted successfully.
c:\program files\internetgamebox\ressources\favoris\defaultv2.swf (Adware.EGDAccess) -> Quarantined and deleted successfully.
c:\program files\internetgamebox\skins\skinv2.skn (Adware.EGDAccess) -> Quarantined and deleted successfully.
C:\WINDOWS\herjek.config (Malware.Trace) -> Quarantined and deleted successfully.
c:\documents and settings\lolly\local settings\Temp\.tt7.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\ctfmonb.bmp (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\winsub.xml (Malware.Trace) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\svcp.csv (Malware.Trace) -> Quarantined and deleted successfully.
c:\WINDOWS\system32\hvstqc_navps.dat (Adware.NaviPromo) -> Quarantined and deleted successfully.
c:\WINDOWS\system32\yuzphzlu_navps.dat (Adware.NaviPromo) -> Quarantined and deleted successfully.
c:\WINDOWS\system32\hvstqc_nav.dat (Adware.NaviPromo) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\nvs2.inf (Adware.EGDAccess) -> Quarantined and deleted successfully.
Malwarebytes' Anti-Malware 1.38
Version de la base de données: 2297
Windows 5.1.2600 Service Pack 3
02/07/2009 15:50:18
mbam-log-2009-07-02 (15-50-18).txt
Type de recherche: Examen complet (A:\|C:\|D:\|E:\|F:\|G:\|H:\|)
Eléments examinés: 164755
Temps écoulé: 51 minute(s), 23 second(s)
Processus mémoire infecté(s): 1
Module(s) mémoire infecté(s): 1
Clé(s) du Registre infectée(s): 9
Valeur(s) du Registre infectée(s): 3
Elément(s) de données du Registre infecté(s): 1
Dossier(s) infecté(s): 4
Fichier(s) infecté(s): 24
Processus mémoire infecté(s):
C:\Program Files\EoRezo\EoEngine.exe (Adware.EoRezo) -> Unloaded process successfully.
Module(s) mémoire infecté(s):
C:\Program Files\EoRezo\EoAdv\EoAdv.dll (Adware.EoRezo) -> Delete on reboot.
Clé(s) du Registre infectée(s):
HKEY_CLASSES_ROOT\TypeLib\{b6acb3f1-6a83-432c-b854-3e1056f87f4e} (Adware.EoRezo) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\Interface\{819db72d-1c28-4387-9778-e2ff3dc86f74} (Adware.EoRezo) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{64f56fc1-1272-44cd-ba6e-39723696e350} (Adware.EoRezo) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{64f56fc1-1272-44cd-ba6e-39723696e350} (Adware.EoRezo) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{64f56fc1-1272-44cd-ba6e-39723696e350} (Adware.EoRezo) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Software Notifier (Rogue.Multiple) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\EoRezo (Rogue.Eorezo) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\InternetGameBox (Adware.Popup) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\IGB (Malware.Trace) -> Quarantined and deleted successfully.
Valeur(s) du Registre infectée(s):
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\eoengine (Adware.EoRezo) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\Desktop\id (Malware.Trace) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\Desktop\host (Malware.Trace) -> Quarantined and deleted successfully.
Elément(s) de données du Registre infecté(s):
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\FirewallDisableNotify (Disabled.SecurityCenter) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.
Dossier(s) infecté(s):
C:\Program Files\InternetGameBox (Adware.EGDAccess) -> Quarantined and deleted successfully.
c:\program files\internetgamebox\ressources (Adware.EGDAccess) -> Quarantined and deleted successfully.
c:\program files\internetgamebox\ressources\favoris (Adware.EGDAccess) -> Quarantined and deleted successfully.
c:\program files\internetgamebox\skins (Adware.EGDAccess) -> Quarantined and deleted successfully.
Fichier(s) infecté(s):
c:\documents and settings\jo\local settings\application data\frdwi_navps.dat (Adware.Navipromo.H) -> Quarantined and deleted successfully.
c:\documents and settings\jo\local settings\application data\frdwi.dat (Adware.Navipromo.H) -> Quarantined and deleted successfully.
C:\Program Files\EoRezo\EoEngine.exe (Adware.EoRezo) -> Quarantined and deleted successfully.
C:\Program Files\EoRezo\EoAdv\EoAdv.dll (Adware.EoRezo) -> Quarantined and deleted successfully.
c:\program files\EoRezo\EoAdv\EoRezoBHO.dll (Adware.EoRezo) -> Quarantined and deleted successfully.
c:\WINDOWS\system32\2.tmp (Trojan.Agent) -> Quarantined and deleted successfully.
c:\WINDOWS\system32\blackster.scr (Trojan.Agent) -> Quarantined and deleted successfully.
c:\program files\internetgamebox\language (Adware.EGDAccess) -> Quarantined and deleted successfully.
c:\program files\internetgamebox\ressources\AttenteOff.html (Adware.EGDAccess) -> Quarantined and deleted successfully.
c:\program files\internetgamebox\ressources\AttenteOn.html (Adware.EGDAccess) -> Quarantined and deleted successfully.
c:\program files\internetgamebox\ressources\configv2_en.xml (Adware.EGDAccess) -> Quarantined and deleted successfully.
c:\program files\internetgamebox\ressources\configv2_es.xml (Adware.EGDAccess) -> Quarantined and deleted successfully.
c:\program files\internetgamebox\ressources\configv2_fr.xml (Adware.EGDAccess) -> Quarantined and deleted successfully.
c:\program files\internetgamebox\ressources\favoris\defaultv2.swf (Adware.EGDAccess) -> Quarantined and deleted successfully.
c:\program files\internetgamebox\skins\skinv2.skn (Adware.EGDAccess) -> Quarantined and deleted successfully.
C:\WINDOWS\herjek.config (Malware.Trace) -> Quarantined and deleted successfully.
c:\documents and settings\lolly\local settings\Temp\.tt7.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\ctfmonb.bmp (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\winsub.xml (Malware.Trace) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\svcp.csv (Malware.Trace) -> Quarantined and deleted successfully.
c:\WINDOWS\system32\hvstqc_navps.dat (Adware.NaviPromo) -> Quarantined and deleted successfully.
c:\WINDOWS\system32\yuzphzlu_navps.dat (Adware.NaviPromo) -> Quarantined and deleted successfully.
c:\WINDOWS\system32\hvstqc_nav.dat (Adware.NaviPromo) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\nvs2.inf (Adware.EGDAccess) -> Quarantined and deleted successfully.
bon j'ai lancé panda et voila ce que l'ordi dit au demarrage :
R 601Ö
not enough space for thread data.
autre nouvelle, je n'arrive plus a lancer panda!il ne trouve pas le point d'entrée.
R 601Ö
not enough space for thread data.
autre nouvelle, je n'arrive plus a lancer panda!il ne trouve pas le point d'entrée.
bon alors j'ai lancé panda mais il ne m'a ps sorti de rapport!
il n'a pas detecté de rootkits!
l'ordi s'etteint souvent sans prevenir!
il n'a pas detecté de rootkits!
l'ordi s'etteint souvent sans prevenir!
Vous n’avez pas trouvé la réponse que vous recherchez ?
Posez votre question
olivier114
Messages postés
1552
Date d'inscription
mercredi 4 mars 2009
Statut
Membre
Dernière intervention
26 novembre 2013
104
7 juil. 2009 à 11:13
7 juil. 2009 à 11:13
re:
bon ben pour en finir avec ses virus télécharge ceci:
https://www.tayo.fr/download/smit-fraud-fix
puis lance une analyse et envoie un rapport stp
bon ben pour en finir avec ses virus télécharge ceci:
https://www.tayo.fr/download/smit-fraud-fix
puis lance une analyse et envoie un rapport stp
voila les rapports!
en fait je me suis planté, j'ai lancé des nettoyages!j'espere que j'ai pas flingué mon pc!
SmitFraudFix v2.373
Rapport fait à 22:20:31,27, 07/07/2009
Executé à partir de C:\Documents and Settings\lolly\Bureau\SmitfraudFix
OS: Microsoft Windows XP [version 5.1.2600] - Windows_NT
Le type du système de fichiers est NTFS
Fix executé en mode normal
»»»»»»»»»»»»»»»»»»»»»»»» SharedTaskScheduler Avant SmitFraudFix
!!!Attention, les clés qui suivent ne sont pas forcément infectées!!!
SrchSTS.exe by S!Ri
Search SharedTaskScheduler's .dll
»»»»»»»»»»»»»»»»»»»»»»»» Arret des processus
»»»»»»»»»»»»»»»»»»»»»»»» hosts
127.0.0.1 localhost
»»»»»»»»»»»»»»»»»»»»»»»» VACFix
VACFix
Credits: Malware Analysis & Diagnostic
Code: S!Ri
»»»»»»»»»»»»»»»»»»»»»»»» Winsock2 Fix
S!Ri's WS2Fix: LSP not Found.
»»»»»»»»»»»»»»»»»»»»»»»» Generic Renos Fix
GenericRenosFix by S!Ri
»»»»»»»»»»»»»»»»»»»»»»»» Suppression des fichiers infectés
»»»»»»»»»»»»»»»»»»»»»»»» IEDFix
IEDFix
Credits: Malware Analysis & Diagnostic
Code: S!Ri
»»»»»»»»»»»»»»»»»»»»»»»» 404Fix
404Fix
Credits: Malware Analysis & Diagnostic
Code: S!Ri
»»»»»»»»»»»»»»»»»»»»»»»» RK
»»»»»»»»»»»»»»»»»»»»»»»» DNS
Description: TRENDnet TEW-424UB 54M USB Dongle - Miniport d'ordonnancement de paquets
DNS Server Search Order: 212.27.32.176
DNS Server Search Order: 212.27.32.177
Description: TRENDnet TEW-424UB 54M USB Dongle - Miniport d'ordonnancement de paquets
DNS Server Search Order: 212.27.40.240
DNS Server Search Order: 212.27.40.241
Description: TRENDnet TEW-424UB 54M USB Dongle - Miniport d'ordonnancement de paquets
DNS Server Search Order: 192.168.1.1
Description: TRENDnet TEW-424UB 54M USB Dongle - Miniport d'ordonnancement de paquets
DNS Server Search Order: 192.168.1.1
Description: TRENDnet TEW-424UB 54M USB Dongle - Miniport d'ordonnancement de paquets
DNS Server Search Order: 192.168.1.1
HKLM\SYSTEM\CCS\Services\Tcpip\..\{2BB25AB5-77C9-4F3A-9D16-11C0FE8CC58C}: NameServer=212.27.32.176,212.27.32.177
HKLM\SYSTEM\CCS\Services\Tcpip\..\{6132DAFB-8239-48B5-AB81-42E368B86AA9}: DhcpNameServer=192.168.1.1
HKLM\SYSTEM\CCS\Services\Tcpip\..\{68336731-3D7C-459A-BF37-2416AD77D75B}: DhcpNameServer=192.168.1.1
HKLM\SYSTEM\CCS\Services\Tcpip\..\{C687392E-F9A2-4C36-A7E4-28AF5EEA5490}: DhcpNameServer=212.27.40.240 212.27.40.241
HKLM\SYSTEM\CCS\Services\Tcpip\..\{F150491C-CF49-4D7F-A69F-E701699F10F5}: DhcpNameServer=192.168.1.1
HKLM\SYSTEM\CS1\Services\Tcpip\..\{2BB25AB5-77C9-4F3A-9D16-11C0FE8CC58C}: NameServer=212.27.32.176,212.27.32.177
HKLM\SYSTEM\CS1\Services\Tcpip\..\{6132DAFB-8239-48B5-AB81-42E368B86AA9}: DhcpNameServer=192.168.1.1
HKLM\SYSTEM\CS1\Services\Tcpip\..\{68336731-3D7C-459A-BF37-2416AD77D75B}: DhcpNameServer=192.168.1.1
HKLM\SYSTEM\CS1\Services\Tcpip\..\{C687392E-F9A2-4C36-A7E4-28AF5EEA5490}: DhcpNameServer=212.27.40.240 212.27.40.241
HKLM\SYSTEM\CS1\Services\Tcpip\..\{F150491C-CF49-4D7F-A69F-E701699F10F5}: DhcpNameServer=192.168.1.1
HKLM\SYSTEM\CCS\Services\Tcpip\Parameters: DhcpNameServer=192.168.1.1
HKLM\SYSTEM\CS1\Services\Tcpip\Parameters: DhcpNameServer=192.168.1.1
»»»»»»»»»»»»»»»»»»»»»»»» Suppression Fichiers Temporaires
»»»»»»»»»»»»»»»»»»»»»»»» Winlogon.System
!!!Attention, les clés qui suivent ne sont pas forcément infectées!!!
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon]
"System"=""
»»»»»»»»»»»»»»»»»»»»»»»» Nettoyage du registre
Nettoyage terminé.
»»»»»»»»»»»»»»»»»»»»»»»» SharedTaskScheduler Après SmitFraudFix
!!!Attention, les clés qui suivent ne sont pas forcément infectées!!!
SrchSTS.exe by S!Ri
Search SharedTaskScheduler's .dll
»»»»»»»»»»»»»»»»»»»»»»»» Fin
en fait je me suis planté, j'ai lancé des nettoyages!j'espere que j'ai pas flingué mon pc!
SmitFraudFix v2.373
Rapport fait à 22:20:31,27, 07/07/2009
Executé à partir de C:\Documents and Settings\lolly\Bureau\SmitfraudFix
OS: Microsoft Windows XP [version 5.1.2600] - Windows_NT
Le type du système de fichiers est NTFS
Fix executé en mode normal
»»»»»»»»»»»»»»»»»»»»»»»» SharedTaskScheduler Avant SmitFraudFix
!!!Attention, les clés qui suivent ne sont pas forcément infectées!!!
SrchSTS.exe by S!Ri
Search SharedTaskScheduler's .dll
»»»»»»»»»»»»»»»»»»»»»»»» Arret des processus
»»»»»»»»»»»»»»»»»»»»»»»» hosts
127.0.0.1 localhost
»»»»»»»»»»»»»»»»»»»»»»»» VACFix
VACFix
Credits: Malware Analysis & Diagnostic
Code: S!Ri
»»»»»»»»»»»»»»»»»»»»»»»» Winsock2 Fix
S!Ri's WS2Fix: LSP not Found.
»»»»»»»»»»»»»»»»»»»»»»»» Generic Renos Fix
GenericRenosFix by S!Ri
»»»»»»»»»»»»»»»»»»»»»»»» Suppression des fichiers infectés
»»»»»»»»»»»»»»»»»»»»»»»» IEDFix
IEDFix
Credits: Malware Analysis & Diagnostic
Code: S!Ri
»»»»»»»»»»»»»»»»»»»»»»»» 404Fix
404Fix
Credits: Malware Analysis & Diagnostic
Code: S!Ri
»»»»»»»»»»»»»»»»»»»»»»»» RK
»»»»»»»»»»»»»»»»»»»»»»»» DNS
Description: TRENDnet TEW-424UB 54M USB Dongle - Miniport d'ordonnancement de paquets
DNS Server Search Order: 212.27.32.176
DNS Server Search Order: 212.27.32.177
Description: TRENDnet TEW-424UB 54M USB Dongle - Miniport d'ordonnancement de paquets
DNS Server Search Order: 212.27.40.240
DNS Server Search Order: 212.27.40.241
Description: TRENDnet TEW-424UB 54M USB Dongle - Miniport d'ordonnancement de paquets
DNS Server Search Order: 192.168.1.1
Description: TRENDnet TEW-424UB 54M USB Dongle - Miniport d'ordonnancement de paquets
DNS Server Search Order: 192.168.1.1
Description: TRENDnet TEW-424UB 54M USB Dongle - Miniport d'ordonnancement de paquets
DNS Server Search Order: 192.168.1.1
HKLM\SYSTEM\CCS\Services\Tcpip\..\{2BB25AB5-77C9-4F3A-9D16-11C0FE8CC58C}: NameServer=212.27.32.176,212.27.32.177
HKLM\SYSTEM\CCS\Services\Tcpip\..\{6132DAFB-8239-48B5-AB81-42E368B86AA9}: DhcpNameServer=192.168.1.1
HKLM\SYSTEM\CCS\Services\Tcpip\..\{68336731-3D7C-459A-BF37-2416AD77D75B}: DhcpNameServer=192.168.1.1
HKLM\SYSTEM\CCS\Services\Tcpip\..\{C687392E-F9A2-4C36-A7E4-28AF5EEA5490}: DhcpNameServer=212.27.40.240 212.27.40.241
HKLM\SYSTEM\CCS\Services\Tcpip\..\{F150491C-CF49-4D7F-A69F-E701699F10F5}: DhcpNameServer=192.168.1.1
HKLM\SYSTEM\CS1\Services\Tcpip\..\{2BB25AB5-77C9-4F3A-9D16-11C0FE8CC58C}: NameServer=212.27.32.176,212.27.32.177
HKLM\SYSTEM\CS1\Services\Tcpip\..\{6132DAFB-8239-48B5-AB81-42E368B86AA9}: DhcpNameServer=192.168.1.1
HKLM\SYSTEM\CS1\Services\Tcpip\..\{68336731-3D7C-459A-BF37-2416AD77D75B}: DhcpNameServer=192.168.1.1
HKLM\SYSTEM\CS1\Services\Tcpip\..\{C687392E-F9A2-4C36-A7E4-28AF5EEA5490}: DhcpNameServer=212.27.40.240 212.27.40.241
HKLM\SYSTEM\CS1\Services\Tcpip\..\{F150491C-CF49-4D7F-A69F-E701699F10F5}: DhcpNameServer=192.168.1.1
HKLM\SYSTEM\CCS\Services\Tcpip\Parameters: DhcpNameServer=192.168.1.1
HKLM\SYSTEM\CS1\Services\Tcpip\Parameters: DhcpNameServer=192.168.1.1
»»»»»»»»»»»»»»»»»»»»»»»» Suppression Fichiers Temporaires
»»»»»»»»»»»»»»»»»»»»»»»» Winlogon.System
!!!Attention, les clés qui suivent ne sont pas forcément infectées!!!
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon]
"System"=""
»»»»»»»»»»»»»»»»»»»»»»»» Nettoyage du registre
Nettoyage terminé.
»»»»»»»»»»»»»»»»»»»»»»»» SharedTaskScheduler Après SmitFraudFix
!!!Attention, les clés qui suivent ne sont pas forcément infectées!!!
SrchSTS.exe by S!Ri
Search SharedTaskScheduler's .dll
»»»»»»»»»»»»»»»»»»»»»»»» Fin
le deuxieme!
SmitFraudFix v2.373
Rapport fait à 22:20:03,84, 07/07/2009
Executé à partir de C:\Documents and Settings\lolly\Bureau\SmitfraudFix
OS: Microsoft Windows XP [version 5.1.2600] - Windows_NT
Le type du système de fichiers est NTFS
Fix executé en mode normal
»»»»»»»»»»»»»»»»»»»»»»»» DNS Avant Fix
Description: TRENDnet TEW-424UB 54M USB Dongle - Miniport d'ordonnancement de paquets
DNS Server Search Order: 212.27.32.176
DNS Server Search Order: 212.27.32.177
Description: TRENDnet TEW-424UB 54M USB Dongle - Miniport d'ordonnancement de paquets
DNS Server Search Order: 212.27.40.240
DNS Server Search Order: 212.27.40.241
Description: TRENDnet TEW-424UB 54M USB Dongle - Miniport d'ordonnancement de paquets
DNS Server Search Order: 192.168.1.1
Description: TRENDnet TEW-424UB 54M USB Dongle - Miniport d'ordonnancement de paquets
DNS Server Search Order: 192.168.1.1
Description: TRENDnet TEW-424UB 54M USB Dongle - Miniport d'ordonnancement de paquets
DNS Server Search Order: 192.168.1.1
HKLM\SYSTEM\CCS\Services\Tcpip\..\{2BB25AB5-77C9-4F3A-9D16-11C0FE8CC58C}: NameServer=212.27.32.176,212.27.32.177
HKLM\SYSTEM\CCS\Services\Tcpip\..\{6132DAFB-8239-48B5-AB81-42E368B86AA9}: DhcpNameServer=192.168.1.1
HKLM\SYSTEM\CCS\Services\Tcpip\..\{68336731-3D7C-459A-BF37-2416AD77D75B}: DhcpNameServer=192.168.1.1
HKLM\SYSTEM\CCS\Services\Tcpip\..\{C687392E-F9A2-4C36-A7E4-28AF5EEA5490}: DhcpNameServer=212.27.40.240 212.27.40.241
HKLM\SYSTEM\CCS\Services\Tcpip\..\{F150491C-CF49-4D7F-A69F-E701699F10F5}: DhcpNameServer=192.168.1.1
HKLM\SYSTEM\CS1\Services\Tcpip\..\{2BB25AB5-77C9-4F3A-9D16-11C0FE8CC58C}: NameServer=212.27.32.176,212.27.32.177
HKLM\SYSTEM\CS1\Services\Tcpip\..\{6132DAFB-8239-48B5-AB81-42E368B86AA9}: DhcpNameServer=192.168.1.1
HKLM\SYSTEM\CS1\Services\Tcpip\..\{68336731-3D7C-459A-BF37-2416AD77D75B}: DhcpNameServer=192.168.1.1
HKLM\SYSTEM\CS1\Services\Tcpip\..\{C687392E-F9A2-4C36-A7E4-28AF5EEA5490}: DhcpNameServer=212.27.40.240 212.27.40.241
HKLM\SYSTEM\CS1\Services\Tcpip\..\{F150491C-CF49-4D7F-A69F-E701699F10F5}: DhcpNameServer=192.168.1.1
HKLM\SYSTEM\CCS\Services\Tcpip\Parameters: DhcpNameServer=192.168.1.1
HKLM\SYSTEM\CS1\Services\Tcpip\Parameters: DhcpNameServer=192.168.1.1
»»»»»»»»»»»»»»»»»»»»»»»» DNS Après Fix
Description: TRENDnet TEW-424UB 54M USB Dongle - Miniport d'ordonnancement de paquets
DNS Server Search Order: 212.27.32.176
DNS Server Search Order: 212.27.32.177
Description: TRENDnet TEW-424UB 54M USB Dongle - Miniport d'ordonnancement de paquets
DNS Server Search Order: 212.27.40.240
DNS Server Search Order: 212.27.40.241
Description: TRENDnet TEW-424UB 54M USB Dongle - Miniport d'ordonnancement de paquets
DNS Server Search Order: 192.168.1.1
Description: TRENDnet TEW-424UB 54M USB Dongle - Miniport d'ordonnancement de paquets
DNS Server Search Order: 192.168.1.1
Description: TRENDnet TEW-424UB 54M USB Dongle - Miniport d'ordonnancement de paquets
DNS Server Search Order: 192.168.1.1
HKLM\SYSTEM\CCS\Services\Tcpip\..\{2BB25AB5-77C9-4F3A-9D16-11C0FE8CC58C}: NameServer=212.27.32.176,212.27.32.177
HKLM\SYSTEM\CCS\Services\Tcpip\..\{6132DAFB-8239-48B5-AB81-42E368B86AA9}: DhcpNameServer=192.168.1.1
HKLM\SYSTEM\CCS\Services\Tcpip\..\{68336731-3D7C-459A-BF37-2416AD77D75B}: DhcpNameServer=192.168.1.1
HKLM\SYSTEM\CCS\Services\Tcpip\..\{C687392E-F9A2-4C36-A7E4-28AF5EEA5490}: DhcpNameServer=212.27.40.240 212.27.40.241
HKLM\SYSTEM\CCS\Services\Tcpip\..\{F150491C-CF49-4D7F-A69F-E701699F10F5}: DhcpNameServer=192.168.1.1
HKLM\SYSTEM\CS1\Services\Tcpip\..\{2BB25AB5-77C9-4F3A-9D16-11C0FE8CC58C}: NameServer=212.27.32.176,212.27.32.177
HKLM\SYSTEM\CS1\Services\Tcpip\..\{6132DAFB-8239-48B5-AB81-42E368B86AA9}: DhcpNameServer=192.168.1.1
HKLM\SYSTEM\CS1\Services\Tcpip\..\{68336731-3D7C-459A-BF37-2416AD77D75B}: DhcpNameServer=192.168.1.1
HKLM\SYSTEM\CS1\Services\Tcpip\..\{C687392E-F9A2-4C36-A7E4-28AF5EEA5490}: DhcpNameServer=212.27.40.240 212.27.40.241
HKLM\SYSTEM\CS1\Services\Tcpip\..\{F150491C-CF49-4D7F-A69F-E701699F10F5}: DhcpNameServer=192.168.1.1
HKLM\SYSTEM\CCS\Services\Tcpip\Parameters: DhcpNameServer=192.168.1.1
HKLM\SYSTEM\CS1\Services\Tcpip\Parameters: DhcpNameServer=192.168.1.1
SmitFraudFix v2.373
Rapport fait à 22:20:03,84, 07/07/2009
Executé à partir de C:\Documents and Settings\lolly\Bureau\SmitfraudFix
OS: Microsoft Windows XP [version 5.1.2600] - Windows_NT
Le type du système de fichiers est NTFS
Fix executé en mode normal
»»»»»»»»»»»»»»»»»»»»»»»» DNS Avant Fix
Description: TRENDnet TEW-424UB 54M USB Dongle - Miniport d'ordonnancement de paquets
DNS Server Search Order: 212.27.32.176
DNS Server Search Order: 212.27.32.177
Description: TRENDnet TEW-424UB 54M USB Dongle - Miniport d'ordonnancement de paquets
DNS Server Search Order: 212.27.40.240
DNS Server Search Order: 212.27.40.241
Description: TRENDnet TEW-424UB 54M USB Dongle - Miniport d'ordonnancement de paquets
DNS Server Search Order: 192.168.1.1
Description: TRENDnet TEW-424UB 54M USB Dongle - Miniport d'ordonnancement de paquets
DNS Server Search Order: 192.168.1.1
Description: TRENDnet TEW-424UB 54M USB Dongle - Miniport d'ordonnancement de paquets
DNS Server Search Order: 192.168.1.1
HKLM\SYSTEM\CCS\Services\Tcpip\..\{2BB25AB5-77C9-4F3A-9D16-11C0FE8CC58C}: NameServer=212.27.32.176,212.27.32.177
HKLM\SYSTEM\CCS\Services\Tcpip\..\{6132DAFB-8239-48B5-AB81-42E368B86AA9}: DhcpNameServer=192.168.1.1
HKLM\SYSTEM\CCS\Services\Tcpip\..\{68336731-3D7C-459A-BF37-2416AD77D75B}: DhcpNameServer=192.168.1.1
HKLM\SYSTEM\CCS\Services\Tcpip\..\{C687392E-F9A2-4C36-A7E4-28AF5EEA5490}: DhcpNameServer=212.27.40.240 212.27.40.241
HKLM\SYSTEM\CCS\Services\Tcpip\..\{F150491C-CF49-4D7F-A69F-E701699F10F5}: DhcpNameServer=192.168.1.1
HKLM\SYSTEM\CS1\Services\Tcpip\..\{2BB25AB5-77C9-4F3A-9D16-11C0FE8CC58C}: NameServer=212.27.32.176,212.27.32.177
HKLM\SYSTEM\CS1\Services\Tcpip\..\{6132DAFB-8239-48B5-AB81-42E368B86AA9}: DhcpNameServer=192.168.1.1
HKLM\SYSTEM\CS1\Services\Tcpip\..\{68336731-3D7C-459A-BF37-2416AD77D75B}: DhcpNameServer=192.168.1.1
HKLM\SYSTEM\CS1\Services\Tcpip\..\{C687392E-F9A2-4C36-A7E4-28AF5EEA5490}: DhcpNameServer=212.27.40.240 212.27.40.241
HKLM\SYSTEM\CS1\Services\Tcpip\..\{F150491C-CF49-4D7F-A69F-E701699F10F5}: DhcpNameServer=192.168.1.1
HKLM\SYSTEM\CCS\Services\Tcpip\Parameters: DhcpNameServer=192.168.1.1
HKLM\SYSTEM\CS1\Services\Tcpip\Parameters: DhcpNameServer=192.168.1.1
»»»»»»»»»»»»»»»»»»»»»»»» DNS Après Fix
Description: TRENDnet TEW-424UB 54M USB Dongle - Miniport d'ordonnancement de paquets
DNS Server Search Order: 212.27.32.176
DNS Server Search Order: 212.27.32.177
Description: TRENDnet TEW-424UB 54M USB Dongle - Miniport d'ordonnancement de paquets
DNS Server Search Order: 212.27.40.240
DNS Server Search Order: 212.27.40.241
Description: TRENDnet TEW-424UB 54M USB Dongle - Miniport d'ordonnancement de paquets
DNS Server Search Order: 192.168.1.1
Description: TRENDnet TEW-424UB 54M USB Dongle - Miniport d'ordonnancement de paquets
DNS Server Search Order: 192.168.1.1
Description: TRENDnet TEW-424UB 54M USB Dongle - Miniport d'ordonnancement de paquets
DNS Server Search Order: 192.168.1.1
HKLM\SYSTEM\CCS\Services\Tcpip\..\{2BB25AB5-77C9-4F3A-9D16-11C0FE8CC58C}: NameServer=212.27.32.176,212.27.32.177
HKLM\SYSTEM\CCS\Services\Tcpip\..\{6132DAFB-8239-48B5-AB81-42E368B86AA9}: DhcpNameServer=192.168.1.1
HKLM\SYSTEM\CCS\Services\Tcpip\..\{68336731-3D7C-459A-BF37-2416AD77D75B}: DhcpNameServer=192.168.1.1
HKLM\SYSTEM\CCS\Services\Tcpip\..\{C687392E-F9A2-4C36-A7E4-28AF5EEA5490}: DhcpNameServer=212.27.40.240 212.27.40.241
HKLM\SYSTEM\CCS\Services\Tcpip\..\{F150491C-CF49-4D7F-A69F-E701699F10F5}: DhcpNameServer=192.168.1.1
HKLM\SYSTEM\CS1\Services\Tcpip\..\{2BB25AB5-77C9-4F3A-9D16-11C0FE8CC58C}: NameServer=212.27.32.176,212.27.32.177
HKLM\SYSTEM\CS1\Services\Tcpip\..\{6132DAFB-8239-48B5-AB81-42E368B86AA9}: DhcpNameServer=192.168.1.1
HKLM\SYSTEM\CS1\Services\Tcpip\..\{68336731-3D7C-459A-BF37-2416AD77D75B}: DhcpNameServer=192.168.1.1
HKLM\SYSTEM\CS1\Services\Tcpip\..\{C687392E-F9A2-4C36-A7E4-28AF5EEA5490}: DhcpNameServer=212.27.40.240 212.27.40.241
HKLM\SYSTEM\CS1\Services\Tcpip\..\{F150491C-CF49-4D7F-A69F-E701699F10F5}: DhcpNameServer=192.168.1.1
HKLM\SYSTEM\CCS\Services\Tcpip\Parameters: DhcpNameServer=192.168.1.1
HKLM\SYSTEM\CS1\Services\Tcpip\Parameters: DhcpNameServer=192.168.1.1
olivierngoc
Messages postés
794
Date d'inscription
samedi 25 avril 2009
Statut
Membre
Dernière intervention
8 septembre 2022
132
7 juil. 2009 à 22:42
7 juil. 2009 à 22:42
Bon fais un truc simple pour une fois achète ou télécharger un anti-virus et scanne COMPLÈTEMENT ton ordinateur ;)
et le dernier!
SmitFraudFix v2.373
Rapport fait à 22:20:31,27, 07/07/2009
Executé à partir de C:\Documents and Settings\lolly\Bureau\SmitfraudFix
OS: Microsoft Windows XP [version 5.1.2600] - Windows_NT
Le type du système de fichiers est NTFS
Fix executé en mode normal
»»»»»»»»»»»»»»»»»»»»»»»» SharedTaskScheduler Avant SmitFraudFix
!!!Attention, les clés qui suivent ne sont pas forcément infectées!!!
SrchSTS.exe by S!Ri
Search SharedTaskScheduler's .dll
»»»»»»»»»»»»»»»»»»»»»»»» Arret des processus
»»»»»»»»»»»»»»»»»»»»»»»» hosts
127.0.0.1 localhost
»»»»»»»»»»»»»»»»»»»»»»»» VACFix
VACFix
Credits: Malware Analysis & Diagnostic
Code: S!Ri
»»»»»»»»»»»»»»»»»»»»»»»» Winsock2 Fix
S!Ri's WS2Fix: LSP not Found.
»»»»»»»»»»»»»»»»»»»»»»»» Generic Renos Fix
GenericRenosFix by S!Ri
»»»»»»»»»»»»»»»»»»»»»»»» Suppression des fichiers infectés
»»»»»»»»»»»»»»»»»»»»»»»» IEDFix
IEDFix
Credits: Malware Analysis & Diagnostic
Code: S!Ri
»»»»»»»»»»»»»»»»»»»»»»»» 404Fix
404Fix
Credits: Malware Analysis & Diagnostic
Code: S!Ri
»»»»»»»»»»»»»»»»»»»»»»»» RK
»»»»»»»»»»»»»»»»»»»»»»»» DNS
Description: TRENDnet TEW-424UB 54M USB Dongle - Miniport d'ordonnancement de paquets
DNS Server Search Order: 212.27.32.176
DNS Server Search Order: 212.27.32.177
Description: TRENDnet TEW-424UB 54M USB Dongle - Miniport d'ordonnancement de paquets
DNS Server Search Order: 212.27.40.240
DNS Server Search Order: 212.27.40.241
Description: TRENDnet TEW-424UB 54M USB Dongle - Miniport d'ordonnancement de paquets
DNS Server Search Order: 192.168.1.1
Description: TRENDnet TEW-424UB 54M USB Dongle - Miniport d'ordonnancement de paquets
DNS Server Search Order: 192.168.1.1
Description: TRENDnet TEW-424UB 54M USB Dongle - Miniport d'ordonnancement de paquets
DNS Server Search Order: 192.168.1.1
HKLM\SYSTEM\CCS\Services\Tcpip\..\{2BB25AB5-77C9-4F3A-9D16-11C0FE8CC58C}: NameServer=212.27.32.176,212.27.32.177
HKLM\SYSTEM\CCS\Services\Tcpip\..\{6132DAFB-8239-48B5-AB81-42E368B86AA9}: DhcpNameServer=192.168.1.1
HKLM\SYSTEM\CCS\Services\Tcpip\..\{68336731-3D7C-459A-BF37-2416AD77D75B}: DhcpNameServer=192.168.1.1
HKLM\SYSTEM\CCS\Services\Tcpip\..\{C687392E-F9A2-4C36-A7E4-28AF5EEA5490}: DhcpNameServer=212.27.40.240 212.27.40.241
HKLM\SYSTEM\CCS\Services\Tcpip\..\{F150491C-CF49-4D7F-A69F-E701699F10F5}: DhcpNameServer=192.168.1.1
HKLM\SYSTEM\CS1\Services\Tcpip\..\{2BB25AB5-77C9-4F3A-9D16-11C0FE8CC58C}: NameServer=212.27.32.176,212.27.32.177
HKLM\SYSTEM\CS1\Services\Tcpip\..\{6132DAFB-8239-48B5-AB81-42E368B86AA9}: DhcpNameServer=192.168.1.1
HKLM\SYSTEM\CS1\Services\Tcpip\..\{68336731-3D7C-459A-BF37-2416AD77D75B}: DhcpNameServer=192.168.1.1
HKLM\SYSTEM\CS1\Services\Tcpip\..\{C687392E-F9A2-4C36-A7E4-28AF5EEA5490}: DhcpNameServer=212.27.40.240 212.27.40.241
HKLM\SYSTEM\CS1\Services\Tcpip\..\{F150491C-CF49-4D7F-A69F-E701699F10F5}: DhcpNameServer=192.168.1.1
HKLM\SYSTEM\CCS\Services\Tcpip\Parameters: DhcpNameServer=192.168.1.1
HKLM\SYSTEM\CS1\Services\Tcpip\Parameters: DhcpNameServer=192.168.1.1
»»»»»»»»»»»»»»»»»»»»»»»» Suppression Fichiers Temporaires
»»»»»»»»»»»»»»»»»»»»»»»» Winlogon.System
!!!Attention, les clés qui suivent ne sont pas forcément infectées!!!
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon]
"System"=""
»»»»»»»»»»»»»»»»»»»»»»»» Nettoyage du registre
Nettoyage terminé.
»»»»»»»»»»»»»»»»»»»»»»»» SharedTaskScheduler Après SmitFraudFix
!!!Attention, les clés qui suivent ne sont pas forcément infectées!!!
SrchSTS.exe by S!Ri
Search SharedTaskScheduler's .dll
»»»»»»»»»»»»»»»»»»»»»»»» Fin
SmitFraudFix v2.373
Rapport fait à 22:20:31,27, 07/07/2009
Executé à partir de C:\Documents and Settings\lolly\Bureau\SmitfraudFix
OS: Microsoft Windows XP [version 5.1.2600] - Windows_NT
Le type du système de fichiers est NTFS
Fix executé en mode normal
»»»»»»»»»»»»»»»»»»»»»»»» SharedTaskScheduler Avant SmitFraudFix
!!!Attention, les clés qui suivent ne sont pas forcément infectées!!!
SrchSTS.exe by S!Ri
Search SharedTaskScheduler's .dll
»»»»»»»»»»»»»»»»»»»»»»»» Arret des processus
»»»»»»»»»»»»»»»»»»»»»»»» hosts
127.0.0.1 localhost
»»»»»»»»»»»»»»»»»»»»»»»» VACFix
VACFix
Credits: Malware Analysis & Diagnostic
Code: S!Ri
»»»»»»»»»»»»»»»»»»»»»»»» Winsock2 Fix
S!Ri's WS2Fix: LSP not Found.
»»»»»»»»»»»»»»»»»»»»»»»» Generic Renos Fix
GenericRenosFix by S!Ri
»»»»»»»»»»»»»»»»»»»»»»»» Suppression des fichiers infectés
»»»»»»»»»»»»»»»»»»»»»»»» IEDFix
IEDFix
Credits: Malware Analysis & Diagnostic
Code: S!Ri
»»»»»»»»»»»»»»»»»»»»»»»» 404Fix
404Fix
Credits: Malware Analysis & Diagnostic
Code: S!Ri
»»»»»»»»»»»»»»»»»»»»»»»» RK
»»»»»»»»»»»»»»»»»»»»»»»» DNS
Description: TRENDnet TEW-424UB 54M USB Dongle - Miniport d'ordonnancement de paquets
DNS Server Search Order: 212.27.32.176
DNS Server Search Order: 212.27.32.177
Description: TRENDnet TEW-424UB 54M USB Dongle - Miniport d'ordonnancement de paquets
DNS Server Search Order: 212.27.40.240
DNS Server Search Order: 212.27.40.241
Description: TRENDnet TEW-424UB 54M USB Dongle - Miniport d'ordonnancement de paquets
DNS Server Search Order: 192.168.1.1
Description: TRENDnet TEW-424UB 54M USB Dongle - Miniport d'ordonnancement de paquets
DNS Server Search Order: 192.168.1.1
Description: TRENDnet TEW-424UB 54M USB Dongle - Miniport d'ordonnancement de paquets
DNS Server Search Order: 192.168.1.1
HKLM\SYSTEM\CCS\Services\Tcpip\..\{2BB25AB5-77C9-4F3A-9D16-11C0FE8CC58C}: NameServer=212.27.32.176,212.27.32.177
HKLM\SYSTEM\CCS\Services\Tcpip\..\{6132DAFB-8239-48B5-AB81-42E368B86AA9}: DhcpNameServer=192.168.1.1
HKLM\SYSTEM\CCS\Services\Tcpip\..\{68336731-3D7C-459A-BF37-2416AD77D75B}: DhcpNameServer=192.168.1.1
HKLM\SYSTEM\CCS\Services\Tcpip\..\{C687392E-F9A2-4C36-A7E4-28AF5EEA5490}: DhcpNameServer=212.27.40.240 212.27.40.241
HKLM\SYSTEM\CCS\Services\Tcpip\..\{F150491C-CF49-4D7F-A69F-E701699F10F5}: DhcpNameServer=192.168.1.1
HKLM\SYSTEM\CS1\Services\Tcpip\..\{2BB25AB5-77C9-4F3A-9D16-11C0FE8CC58C}: NameServer=212.27.32.176,212.27.32.177
HKLM\SYSTEM\CS1\Services\Tcpip\..\{6132DAFB-8239-48B5-AB81-42E368B86AA9}: DhcpNameServer=192.168.1.1
HKLM\SYSTEM\CS1\Services\Tcpip\..\{68336731-3D7C-459A-BF37-2416AD77D75B}: DhcpNameServer=192.168.1.1
HKLM\SYSTEM\CS1\Services\Tcpip\..\{C687392E-F9A2-4C36-A7E4-28AF5EEA5490}: DhcpNameServer=212.27.40.240 212.27.40.241
HKLM\SYSTEM\CS1\Services\Tcpip\..\{F150491C-CF49-4D7F-A69F-E701699F10F5}: DhcpNameServer=192.168.1.1
HKLM\SYSTEM\CCS\Services\Tcpip\Parameters: DhcpNameServer=192.168.1.1
HKLM\SYSTEM\CS1\Services\Tcpip\Parameters: DhcpNameServer=192.168.1.1
»»»»»»»»»»»»»»»»»»»»»»»» Suppression Fichiers Temporaires
»»»»»»»»»»»»»»»»»»»»»»»» Winlogon.System
!!!Attention, les clés qui suivent ne sont pas forcément infectées!!!
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon]
"System"=""
»»»»»»»»»»»»»»»»»»»»»»»» Nettoyage du registre
Nettoyage terminé.
»»»»»»»»»»»»»»»»»»»»»»»» SharedTaskScheduler Après SmitFraudFix
!!!Attention, les clés qui suivent ne sont pas forcément infectées!!!
SrchSTS.exe by S!Ri
Search SharedTaskScheduler's .dll
»»»»»»»»»»»»»»»»»»»»»»»» Fin
rraaaaah!
la c'est la débandade!un composant windows est absent ou endommagé et le lecteur cd ne lit pas le cd d'installation!!!
je n'ai pas pu faire d'analyse complète car des que je mettait en route le scan avec avast free édition 4.8 l'ordi s'éteignait!
mon autre ordi déconne aussi!
je sais pas quoi faire mais du tout la!!!
la c'est la débandade!un composant windows est absent ou endommagé et le lecteur cd ne lit pas le cd d'installation!!!
je n'ai pas pu faire d'analyse complète car des que je mettait en route le scan avec avast free édition 4.8 l'ordi s'éteignait!
mon autre ordi déconne aussi!
je sais pas quoi faire mais du tout la!!!
bon alors la c'est la caca mais pour de bon!
j'ai pas le cd windows pour cet ordi et j'arrives pas a acceder a rien sans!
un fichier windows est absent ou endommagé est la seule chose que l'ecran peut afficher!
il y a une solution la?
je dois trouver un autre systeme d'exploitation?
y a t'il moyen de reparer les fichiers windows sans le cd?
je vais essayer de retrouver le cd mais j'ai deja fouillé partout et je ne suis pas sur que le gars qui me l'a donné m'avait donné le cd d'installation!
merci pour ton aide olivierngoc!!!
j'ai pas le cd windows pour cet ordi et j'arrives pas a acceder a rien sans!
un fichier windows est absent ou endommagé est la seule chose que l'ecran peut afficher!
il y a une solution la?
je dois trouver un autre systeme d'exploitation?
y a t'il moyen de reparer les fichiers windows sans le cd?
je vais essayer de retrouver le cd mais j'ai deja fouillé partout et je ne suis pas sur que le gars qui me l'a donné m'avait donné le cd d'installation!
merci pour ton aide olivierngoc!!!