Pc presque inutilisable
Résolu
x-nadi73-x
Messages postés
59
Date d'inscription
Statut
Membre
Dernière intervention
-
x-nadi73-x Messages postés 59 Date d'inscription Statut Membre Dernière intervention -
x-nadi73-x Messages postés 59 Date d'inscription Statut Membre Dernière intervention -
Bonjour à tous,
Alors voilà j'ai un très très gros problème avec mon pc du moins ça l'est pour moi. Mon pc est plus que d'habitude, il freeze assez souvent et surtout quand je regarde des films sur le net impossible de toucher sinon je dois fermer internet/mozilla. Lorsque je souhaite fermer qu'un seul onglet et hop y en a 2 qui se referment automatiquement. Très insupportable. De plus que lorsque je clique sur un lien soit c'est la page de mozilla qui s'ouvre soit c'est une page blanche. C'est reparti pour un tour! Parlant même pas de dossiers, je clique une seul fois le dossier c'est déjà ouvert voir des fois le sous-dossier aussi s'ouvre :S , très difficile d'utiliser un pc dans ces conditions là. Quand je clique entre deux lettres ou sur un texte voilà que c'est tout le texte qui est "validé" .Pour l'antivirus je n'ai pas fait de scan car normalement il le fait tout seul et comme l'antivirus m'est un peu étranger j'ai préféré ne pas trop toucher. Je remercie déjà tout ceux qui pourront m'aider ce serait très gentil.
Alors voilà j'ai un très très gros problème avec mon pc du moins ça l'est pour moi. Mon pc est plus que d'habitude, il freeze assez souvent et surtout quand je regarde des films sur le net impossible de toucher sinon je dois fermer internet/mozilla. Lorsque je souhaite fermer qu'un seul onglet et hop y en a 2 qui se referment automatiquement. Très insupportable. De plus que lorsque je clique sur un lien soit c'est la page de mozilla qui s'ouvre soit c'est une page blanche. C'est reparti pour un tour! Parlant même pas de dossiers, je clique une seul fois le dossier c'est déjà ouvert voir des fois le sous-dossier aussi s'ouvre :S , très difficile d'utiliser un pc dans ces conditions là. Quand je clique entre deux lettres ou sur un texte voilà que c'est tout le texte qui est "validé" .Pour l'antivirus je n'ai pas fait de scan car normalement il le fait tout seul et comme l'antivirus m'est un peu étranger j'ai préféré ne pas trop toucher. Je remercie déjà tout ceux qui pourront m'aider ce serait très gentil.
A voir également:
- Pc presque inutilisable
- Reinitialiser pc - Guide
- Test performance pc - Guide
- Pc lent - Guide
- Downloader for pc - Télécharger - Téléchargement & Transfert
- Forcer demarrage pc - Guide
82 réponses
salut :
Desactive ton antivirus le temps de la manip ainsi que ton parefeu si présent
▶ Télécharge List&Kill'em et enregistre le sur ton bureau
Il ne necessite pas d'installation
▶double clic (clic droit "executer en tant qu'administrateur" pour Vista) pour lancer le scan
choisis la langue puis choisis l'option 1 = Mode Recherche
▶laisse travailler l'outil
le rapport va s'afficher , une fois le scan fini
▶colle le contenu dans ta prochaine réponse
Desactive ton antivirus le temps de la manip ainsi que ton parefeu si présent
▶ Télécharge List&Kill'em et enregistre le sur ton bureau
Il ne necessite pas d'installation
▶double clic (clic droit "executer en tant qu'administrateur" pour Vista) pour lancer le scan
choisis la langue puis choisis l'option 1 = Mode Recherche
▶laisse travailler l'outil
le rapport va s'afficher , une fois le scan fini
▶colle le contenu dans ta prochaine réponse
Merci pour l'aide
List'em by g3n-h@ckm@n 1.0.4.8
Thx to Chiquitine29.....
User : Administrateur (Administrateurs) # XPSP2-379C75017
Update on 29/10/2009 by g3n-h@ckm@n ::::: 18.30
Start at: 13:48:37 | 06.11.2009
Contact : g3n-h@ckm@n sur CCM
Intel(R) Celeron(R) CPU 2.93GHz
Microsoft Windows XP Professionnel (5.1.2600 32-bit) # Service Pack 3
Internet Explorer 8.0.6001.18702
Windows Firewall Status : Enabled
AV : AntiVir Desktop 9.0.1.30 [ (!) Disabled | Updated ]
A:\ -> Lecteur de disquettes 3 ½ pouces
C:\ -> Disque fixe local | 58.59 Go (1.07 Go free) | NTFS
D:\ -> Disque CD-ROM
E:\ -> Disque fixe local | 17.73 Go (7.73 Go free) [Nouveau nom] | NTFS
¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤ Processus en cours
C:\WINDOWS2\System32\smss.exe 460
C:\WINDOWS2\system32\csrss.exe 508
C:\WINDOWS2\system32\winlogon.exe 532
C:\WINDOWS2\system32\services.exe 576
C:\WINDOWS2\system32\lsass.exe 596
C:\WINDOWS2\system32\svchost.exe 760
C:\WINDOWS2\system32\svchost.exe 828
C:\WINDOWS2\System32\svchost.exe 916
C:\WINDOWS2\system32\svchost.exe 988
C:\WINDOWS2\system32\spoolsv.exe 1196
C:\Program Files\Avira\AntiVir Desktop\sched.exe 1244
C:\WINDOWS2\Explorer.EXE 1476
C:\Program Files\Avira\AntiVir Desktop\avguard.exe 1500
C:\Program Files\Fichiers communs\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe 1540
C:\Program Files\Bonjour\mDNSResponder.exe 1576
C:\Program Files\Java\jre6\bin\jqs.exe 1636
C:\WINDOWS2\system32\PSIService.exe 1728
C:\Program Files\Photodex\ProShowGold\ScsiAccess.exe 1760
C:\Program Files\Microsoft\Search Enhancement Pack\SeaPort\SeaPort.exe 1776
C:\WINDOWS2\VMSnap3.EXE 1908
C:\WINDOWS2\Domino.EXE 1920
C:\Program Files\Avira\AntiVir Desktop\avgnt.exe 1928
C:\Program Files\Java\jre6\bin\jusched.exe 1964
C:\Program Files\Fichiers communs\Nikon\Monitor\NkMonitor.exe 1972
C:\WINDOWS2\system32\svchost.exe 2020
C:\Program Files\Windows Live\Messenger\msnmsgr.exe 2032
C:\WINDOWS2\system32\wdfmgr.exe 128
C:\WINDOWS2\system32\ctfmon.exe 172
C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe 180
C:\WINDOWS2\system32\svchost.exe 2056
C:\WINDOWS2\System32\alg.exe 2404
C:\Program Files\Mozilla Firefox\firefox.exe 3528
C:\WINDOWS2\system32\wscntfy.exe 2884
C:\Documents and Settings\Administrateur.XPSP2-379C75017\Bureau\List_Killem.exe 2748
C:\Documents and Settings\Administrateur.XPSP2-379C75017\Bureau\List_Killem.exe 2612
C:\WINDOWS2\system32\cmd.exe 1508
C:\WINDOWS2\system32\cmd.exe 1516
C:\WINDOWS2\system32\wbem\wmiprvse.exe 2136
C:\Documents and Settings\Administrateur.XPSP2-379C75017\Local Settings\Temp\38.tmp\pv.exe 3028
======================
Cles de demarrage "Run"
======================
Windows Registry Editor Version 5.00
[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"msnmsgr"="\"C:\\Program Files\\Windows Live\\Messenger\\msnmsgr.exe\" /background"
"ctfmon.exe"="C:\\WINDOWS2\\system32\\ctfmon.exe"
"swg"="\"C:\\Program Files\\Google\\GoogleToolbarNotifier\\GoogleToolbarNotifier.exe\""
Windows Registry Editor Version 5.00
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"SiSPower"="Rundll32.exe SiSPower.dll,ModeAgent"
"VMSnap3"="C:\\WINDOWS2\\VMSnap3.EXE"
"Domino"="C:\\WINDOWS2\\Domino.EXE"
"avgnt"="\"C:\\Program Files\\Avira\\AntiVir Desktop\\avgnt.exe\" /min"
"SoundMan"="SOUNDMAN.EXE"
"BigDog303"="C:\\WINDOWS2\\VM303_STI.EXE VIMICRO USB PC Camera (ZC0301PLH)"
"QuickTime Task"="\"C:\\Program Files\\QuickTime\\qttask.exe\" -atboottime"
"SunJavaUpdateSched"="\"C:\\Program Files\\Java\\jre6\\bin\\jusched.exe\""
"Nikon Transfer Monitor"="C:\\Program Files\\Fichiers communs\\Nikon\\Monitor\\NkMonitor.exe"
"Adobe Reader Speed Launcher"="\"C:\\Program Files\\Adobe\\Reader 9.0\\Reader\\Reader_sl.exe\""
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\OptionalComponents]
@=""
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\OptionalComponents\IMAIL]
"Installed"="1"
@=""
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\OptionalComponents\MAPI]
"NoChange"="1"
"Installed"="1"
@=""
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\OptionalComponents\MSFS]
"Installed"="1"
@=""
=====================
cles additionnelles
=====================
Windows Registry Editor Version 5.00
[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System]
"dontdisplaylastusername"=dword:00000000
"legalnoticecaption"=""
"legalnoticetext"=""
"shutdownwithoutlogon"=dword:00000001
"undockwithoutlogon"=dword:00000001
===============
===============
Windows Registry Editor Version 5.00
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad]
"PostBootReminder"="{7849596a-48ea-486e-8937-a2a3009f31a9}"
"CDBurn"="{fbeb8a05-beee-4442-804e-409d6c4515e9}"
"WebCheck"="{E6FB5E20-DE35-11CF-9C87-00AA005127ED}"
"SysTray"="{35CEC8A3-2BE6-11D2-8773-92E220524153}"
======
BHO :
======
Windows Registry Editor Version 5.00
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects]
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{18DF081C-E8AD-4283-A596-FA578C2EBDC3}]
@="AcroIEHelperStub"
"NoExplorer"=dword:00000001
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{53707962-6F74-2D53-2644-206D7942484F}]
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{5C255C8A-E604-49b4-9D64-90988571CECB}]
@=""
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{6EBF7485-159F-4bff-A14F-B9E3AAC4465B}]
@="Search Helper"
"NoExplorer"=dword:00000001
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{9030D464-4C02-4ABF-8ECC-5164760863C6}]
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{AA58ED58-01DD-4d91-8333-CF10577473F7}]
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{AF69DE43-7D58-4638-B6FA-CE66B5AD205D}]
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{C84D72FE-E17D-4195-BB24-76C02E2E7C4E}]
@="Google Dictionary Compression sdch"
"NoExplorer"=dword:00000001
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{DBC80044-A445-435b-BC74-9C25C1C588A9}]
"NoExplorer"=dword:00000001
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{E15A8DC0-8516-42A1-81EA-DC94EC1ACF10}]
"NoExplorer"=dword:00000001
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{E7E6F031-17CE-4C07-BC86-EABFE594F69C}]
@="JQSIEStartDetectorImpl"
"NoExplorer"=dword:00000001
==========================
===============
Path : C:\WINDOWS2\system32;C:\WINDOWS2;C:\WINDOWS2\System32\Wbem;C:\Program Files\QuickTime\QTSystem\
===============
¤¤¤¤¤¤¤¤¤¤ Fichiers et dossiers presents :
C:\Documents and Settings\All Users.WINDOWS2\Application Data\Microsoft\Network\Downloader\qmgr0.dat
C:\Documents and Settings\All Users.WINDOWS2\Application Data\Microsoft\Network\Downloader\qmgr1.dat
C:\WINDOWS2\System32\_004110_.tmp.dll
C:\WINDOWS2\System32\_004111_.tmp.dll
C:\WINDOWS2\System32\_004112_.tmp.dll
C:\WINDOWS2\System32\_004113_.tmp.dll
C:\WINDOWS2\System32\_004120_.tmp.dll
C:\WINDOWS2\System32\_004121_.tmp.dll
C:\WINDOWS2\System32\_004122_.tmp.dll
C:\WINDOWS2\System32\_004123_.tmp.dll
C:\WINDOWS2\System32\_004125_.tmp.dll
C:\WINDOWS2\System32\_004126_.tmp.dll
C:\WINDOWS2\System32\_004129_.tmp.dll
C:\WINDOWS2\System32\_004130_.tmp.dll
C:\WINDOWS2\System32\_004132_.tmp.dll
C:\WINDOWS2\System32\_004133_.tmp.dll
C:\WINDOWS2\System32\_004134_.tmp.dll
C:\WINDOWS2\System32\_004136_.tmp.dll
C:\WINDOWS2\System32\_004138_.tmp.dll
C:\WINDOWS2\System32\_004139_.tmp.dll
C:\WINDOWS2\System32\_004140_.tmp.dll
C:\WINDOWS2\System32\_004144_.tmp.dll
C:\WINDOWS2\System32\_004145_.tmp.dll
C:\WINDOWS2\System32\_004147_.tmp.dll
C:\WINDOWS2\System32\_004150_.tmp.dll
C:\WINDOWS2\System32\_004152_.tmp.dll
C:\WINDOWS2\System32\_004153_.tmp.dll
C:\WINDOWS2\System32\_004155_.tmp.dll
C:\WINDOWS2\System32\_004156_.tmp.dll
C:\WINDOWS2\System32\_004159_.tmp.dll
C:\WINDOWS2\System32\_004160_.tmp.dll
C:\WINDOWS2\System32\_004161_.tmp.dll
C:\WINDOWS2\System32\_004162_.tmp.dll
C:\WINDOWS2\System32\_004163_.tmp.dll
C:\WINDOWS2\System32\_004168_.tmp.dll
C:\WINDOWS2\System32\_004170_.tmp.dll
C:\WINDOWS2\System32\drivers\_004087_.tmp.dll
C:\WINDOWS2\System32\SET14F.tmp
C:\WINDOWS2\System32\SET150.tmp
C:\WINDOWS2\System32\SET152.tmp
C:\WINDOWS2\System32\SET154.tmp
C:\WINDOWS2\System32\SET156.tmp
C:\WINDOWS2\System32\SET15D.tmp
C:\WINDOWS2\System32\SET15E.tmp
C:\WINDOWS2\System32\SET161.tmp
C:\WINDOWS2\System32\SET166.tmp
C:\WINDOWS2\System32\SET167.tmp
C:\WINDOWS2\System32\SET168.tmp
C:\WINDOWS2\System32\SET16A.tmp
C:\WINDOWS2\System32\SET16B.tmp
C:\WINDOWS2\System32\SET16C.tmp
C:\WINDOWS2\System32\SET16D.tmp
C:\WINDOWS2\System32\SET16E.tmp
C:\WINDOWS2\System32\SET170.tmp
C:\WINDOWS2\System32\SET171.tmp
C:\WINDOWS2\System32\SET172.tmp
C:\WINDOWS2\System32\SET175.tmp
C:\WINDOWS2\System32\SET17E.tmp
C:\WINDOWS2\System32\SET181.tmp
C:\WINDOWS2\System32\SET183.tmp
C:\WINDOWS2\System32\SET185.tmp
C:\WINDOWS2\System32\SET18B.tmp
C:\WINDOWS2\System32\SET18D.tmp
C:\WINDOWS2\System32\SET18E.tmp
C:\WINDOWS2\System32\SET18F.tmp
C:\WINDOWS2\System32\SET191.tmp
C:\WINDOWS2\System32\SET196.tmp
C:\WINDOWS2\System32\SET197.tmp
C:\WINDOWS2\System32\SET198.tmp
C:\WINDOWS2\System32\SET199.tmp
C:\WINDOWS2\System32\SET19A.tmp
C:\WINDOWS2\System32\SET1A4.tmp
C:\WINDOWS2\System32\SET1A5.tmp
C:\WINDOWS2\System32\SET1A8.tmp
C:\WINDOWS2\System32\SET1AB.tmp
C:\WINDOWS2\System32\SET1AC.tmp
C:\WINDOWS2\System32\SET1B3.tmp
C:\WINDOWS2\System32\SET1B4.tmp
C:\WINDOWS2\System32\SET1B6.tmp
C:\WINDOWS2\System32\SET1B9.tmp
C:\WINDOWS2\System32\SET1BA.tmp
C:\WINDOWS2\System32\SET1C3.tmp
C:\WINDOWS2\System32\SET1C4.tmp
C:\WINDOWS2\System32\SET1C7.tmp
C:\WINDOWS2\System32\SET1C9.tmp
C:\WINDOWS2\System32\SET1CA.tmp
C:\WINDOWS2\System32\SET1CB.tmp
C:\WINDOWS2\System32\SET1CC.tmp
C:\WINDOWS2\System32\SET1CD.tmp
C:\WINDOWS2\System32\SET1DC.tmp
C:\WINDOWS2\System32\SET1E1.tmp
C:\WINDOWS2\System32\SET1E3.tmp
C:\WINDOWS2\System32\SET1E5.tmp
C:\WINDOWS2\System32\SET1E6.tmp
C:\WINDOWS2\System32\SET1E7.tmp
C:\WINDOWS2\System32\SET1E9.tmp
C:\WINDOWS2\System32\SET1EA.tmp
C:\WINDOWS2\System32\SET1EE.tmp
C:\WINDOWS2\System32\SET1EF.tmp
C:\WINDOWS2\System32\SET1F2.tmp
C:\WINDOWS2\System32\SET1F3.tmp
C:\WINDOWS2\System32\SET1F4.tmp
C:\WINDOWS2\System32\SET1FA.tmp
C:\WINDOWS2\System32\SET1FB.tmp
C:\WINDOWS2\System32\SET1FC.tmp
C:\WINDOWS2\System32\SET204.tmp
C:\WINDOWS2\System32\SET209.tmp
C:\WINDOWS2\System32\SET20A.tmp
C:\WINDOWS2\System32\SET20B.tmp
C:\WINDOWS2\System32\SET20C.tmp
C:\WINDOWS2\System32\SET20E.tmp
C:\WINDOWS2\System32\SET214.tmp
C:\WINDOWS2\System32\SET220.tmp
C:\WINDOWS2\System32\SET222.tmp
C:\WINDOWS2\System32\SET224.tmp
C:\WINDOWS2\System32\SET225.tmp
C:\WINDOWS2\System32\SET226.tmp
C:\WINDOWS2\System32\SET228.tmp
C:\WINDOWS2\System32\SET231.tmp
C:\WINDOWS2\System32\SET233.tmp
C:\WINDOWS2\System32\SET234.tmp
C:\WINDOWS2\System32\SET237.tmp
C:\WINDOWS2\System32\SET239.tmp
C:\WINDOWS2\System32\SET23C.tmp
C:\WINDOWS2\System32\SET240.tmp
C:\WINDOWS2\System32\SET241.tmp
C:\WINDOWS2\System32\SET242.tmp
C:\WINDOWS2\System32\SET244.tmp
C:\WINDOWS2\System32\SET245.tmp
C:\WINDOWS2\System32\SET24B.tmp
C:\WINDOWS2\System32\SET24E.tmp
C:\WINDOWS2\System32\SET24F.tmp
C:\WINDOWS2\System32\SET256.tmp
C:\WINDOWS2\System32\SET257.tmp
C:\WINDOWS2\System32\SET25A.tmp
C:\WINDOWS2\System32\SET25B.tmp
C:\WINDOWS2\System32\SET25C.tmp
C:\WINDOWS2\System32\SET25D.tmp
C:\WINDOWS2\System32\SET25E.tmp
C:\WINDOWS2\System32\SET260.tmp
C:\WINDOWS2\System32\SET261.tmp
C:\WINDOWS2\System32\SET262.tmp
C:\WINDOWS2\System32\SET264.tmp
C:\WINDOWS2\System32\SET265.tmp
C:\WINDOWS2\System32\SET266.tmp
C:\WINDOWS2\System32\SET26B.tmp
C:\WINDOWS2\System32\SET270.tmp
C:\WINDOWS2\System32\SET271.tmp
C:\WINDOWS2\System32\SET272.tmp
C:\WINDOWS2\System32\SET276.tmp
C:\WINDOWS2\System32\SET277.tmp
C:\WINDOWS2\System32\SET278.tmp
C:\WINDOWS2\System32\SET27A.tmp
C:\WINDOWS2\System32\SET27D.tmp
C:\WINDOWS2\System32\SET27F.tmp
C:\WINDOWS2\System32\SET280.tmp
C:\WINDOWS2\System32\SET283.tmp
C:\WINDOWS2\System32\SET284.tmp
C:\WINDOWS2\System32\SET287.tmp
C:\WINDOWS2\System32\SET28A.tmp
C:\WINDOWS2\System32\SET28B.tmp
C:\WINDOWS2\System32\SET292.tmp
C:\WINDOWS2\System32\SET297.tmp
C:\WINDOWS2\System32\SET29E.tmp
C:\WINDOWS2\System32\SET29F.tmp
C:\WINDOWS2\System32\SET2A2.tmp
C:\WINDOWS2\System32\SET2A3.tmp
C:\WINDOWS2\System32\SET2AD.tmp
C:\WINDOWS2\System32\SET2AF.tmp
C:\WINDOWS2\System32\SET2B1.tmp
C:\WINDOWS2\System32\SET2B2.tmp
C:\WINDOWS2\System32\SET2BD.tmp
C:\WINDOWS2\System32\SET2BE.tmp
C:\WINDOWS2\System32\SET2BF.tmp
C:\WINDOWS2\System32\SET2C0.tmp
C:\WINDOWS2\System32\SET2C1.tmp
C:\WINDOWS2\System32\SET2C2.tmp
C:\WINDOWS2\System32\SET2C4.tmp
C:\WINDOWS2\System32\SET2C6.tmp
C:\WINDOWS2\System32\SET2C8.tmp
C:\WINDOWS2\System32\SET2CD.tmp
C:\WINDOWS2\System32\SET2CF.tmp
C:\WINDOWS2\System32\SET2D2.tmp
C:\WINDOWS2\System32\SET2D4.tmp
C:\WINDOWS2\System32\SET2D6.tmp
C:\WINDOWS2\System32\SET2D7.tmp
C:\WINDOWS2\System32\SET2D8.tmp
C:\WINDOWS2\System32\SET2D9.tmp
C:\WINDOWS2\System32\SET2DB.tmp
C:\WINDOWS2\System32\SET2E0.tmp
C:\WINDOWS2\System32\SET2E2.tmp
C:\WINDOWS2\System32\SET2E3.tmp
C:\WINDOWS2\System32\SET2E9.tmp
C:\WINDOWS2\System32\SET2F2.tmp
C:\WINDOWS2\System32\SET2F5.tmp
C:\WINDOWS2\System32\SET2F6.tmp
C:\WINDOWS2\System32\SET2F9.tmp
C:\WINDOWS2\System32\SET301.tmp
C:\WINDOWS2\System32\SET308.tmp
C:\WINDOWS2\System32\SET30A.tmp
C:\WINDOWS2\System32\SET30F.tmp
C:\WINDOWS2\System32\SET310.tmp
C:\WINDOWS2\System32\SET312.tmp
C:\WINDOWS2\System32\SET313.tmp
C:\WINDOWS2\System32\SET315.tmp
C:\WINDOWS2\System32\SET32B.tmp
C:\WINDOWS2\System32\SET32D.tmp
C:\WINDOWS2\System32\SET32F.tmp
C:\WINDOWS2\System32\SET335.tmp
C:\WINDOWS2\System32\SET339.tmp
C:\WINDOWS2\System32\SET346.tmp
C:\WINDOWS2\System32\SET34B.tmp
C:\WINDOWS2\System32\SET34D.tmp
C:\WINDOWS2\System32\SET34E.tmp
C:\WINDOWS2\System32\SET354.tmp
C:\WINDOWS2\System32\SET358.tmp
C:\WINDOWS2\System32\SET362.tmp
C:\WINDOWS2\System32\SET366.tmp
C:\WINDOWS2\System32\SET368.tmp
C:\WINDOWS2\System32\SET369.tmp
C:\WINDOWS2\System32\SET372.tmp
C:\WINDOWS2\System32\SET376.tmp
C:\WINDOWS2\System32\SET381.tmp
C:\WINDOWS2\System32\SET391.tmp
C:\WINDOWS2\System32\SET392.tmp
C:\WINDOWS2\System32\SET3B1.tmp
C:\WINDOWS2\System32\SET3B3.tmp
C:\WINDOWS2\System32\SET3B4.tmp
C:\WINDOWS2\System32\SET3B7.tmp
C:\WINDOWS2\System32\SET3BC.tmp
C:\WINDOWS2\System32\SET3BE.tmp
C:\WINDOWS2\System32\SET3C5.tmp
C:\WINDOWS2\System32\SET3C6.tmp
C:\WINDOWS2\System32\SET3C7.tmp
C:\WINDOWS2\System32\SET3C9.tmp
C:\WINDOWS2\System32\SET3CA.tmp
C:\WINDOWS2\System32\SET3CB.tmp
C:\WINDOWS2\System32\SET3CC.tmp
C:\WINDOWS2\System32\SET3CE.tmp
C:\WINDOWS2\System32\SET3D0.tmp
C:\WINDOWS2\System32\SET3D1.tmp
C:\WINDOWS2\System32\SET3D2.tmp
C:\WINDOWS2\System32\SET3D5.tmp
C:\WINDOWS2\System32\SET3D7.tmp
C:\WINDOWS2\System32\SET3DC.tmp
C:\WINDOWS2\System32\SET3DD.tmp
C:\WINDOWS2\System32\SET3E5.tmp
C:\WINDOWS2\System32\SET3EB.tmp
C:\WINDOWS2\System32\SET3F0.tmp
C:\WINDOWS2\System32\SET3F3.tmp
C:\WINDOWS2\System32\SET3F6.tmp
C:\WINDOWS2\System32\SET3F8.tmp
C:\WINDOWS2\System32\SET3FC.tmp
C:\WINDOWS2\System32\SET3FE.tmp
C:\WINDOWS2\System32\SET3FF.tmp
C:\WINDOWS2\System32\SET400.tmp
C:\WINDOWS2\System32\SET403.tmp
C:\WINDOWS2\System32\SET404.tmp
C:\WINDOWS2\System32\SET408.tmp
C:\WINDOWS2\System32\SET409.tmp
C:\WINDOWS2\System32\SET40C.tmp
C:\WINDOWS2\System32\SET40E.tmp
C:\WINDOWS2\System32\SET413.tmp
C:\WINDOWS2\System32\SET416.tmp
C:\WINDOWS2\System32\SET41A.tmp
C:\WINDOWS2\System32\SET41C.tmp
C:\WINDOWS2\System32\SET41E.tmp
C:\WINDOWS2\System32\SET589.tmp
C:\WINDOWS2\System32\SET58F.tmp
C:\Documents and Settings\Administrateur.XPSP2-379C75017\LOCAL Settings\Temp\jre-6u15-windows-i586-iftw.exe
¤¤¤¤¤¤¤¤¤¤ Clés de registre Presentes :
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Setup.exe
¤¤¤¤¤¤¤¤¤¤ C:\WINDOWS2\Prefetch :
ACRORD32.EXE-3A1F13AE.pf
ACRORD32INFO.EXE-242CE4AA.pf
ALG.EXE-1DECFBF7.pf
AVGNT.EXE-200FEF40.pf
AVNOTIFY.EXE-05ED5FD8.pf
AVWSC.EXE-0283F9DD.pf
CALC.EXE-1F8106EA.pf
CMD.EXE-17B3DF73.pf
CSCRIPT.EXE-00F5014E.pf
DEFRAG.EXE-070EA7C2.pf
DFRGNTFS.EXE-3449300C.pf
DOMINO.EXE-17A451D6.pf
DRWTSN32.EXE-029C815B.pf
EXPLORER.EXE-259ACD19.pf
EXPORTCONTROLLER.EXE-0303443A.pf
FIREFOX.EXE-28641590.pf
GOOGLEUPDATERSERVICE.EXE-3AB369BE.pf
HELPSVC.EXE-30CF7F42.pf
IEXPLORE.EXE-27122324.pf
JAVA.EXE-0C263507.pf
JAVAWS.EXE-021AC9A9.pf
JQSNOTIFY.EXE-24AE4A36.pf
JUCHECK.EXE-395165C8.pf
JUSCHED.EXE-25206883.pf
Layout.ini
LIST_KILLEM.EXE-2EE87B34.pf
LOGON.SCR-07B9284C.pf
LOGONUI.EXE-26234015.pf
MACONFIG_3_5_1_0.EXE-2E348C5D.pf
MODE.COM-3513B220.pf
MSIEXEC.EXE-0F20D965.pf
MSNMSGR.EXE-030AB647.pf
MSPAINT.EXE-3235697A.pf
NKMONITOR.EXE-2F5083F8.pf
NOTEPAD.EXE-12F99E60.pf
NTOSBOOT-B00DFAAD.pf
OPERA.EXE-12085680.pf
PHOTOFILTRE.EXE-00101112.pf
PV.EXE-10AD4F6F.pf
QTTASK.EXE-342507FB.pf
QUICKTIMEPLAYER.EXE-280B4828.pf
READER_SL.EXE-2B4EA1CB.pf
REG.EXE-1304897D.pf
RUNDLL32.EXE-04A93074.pf
RUNDLL32.EXE-0E4A2986.pf
RUNDLL32.EXE-1F16F14A.pf
RUNDLL32.EXE-1F904083.pf
RUNDLL32.EXE-242CC9EF.pf
RUNDLL32.EXE-24837BED.pf
RUNDLL32.EXE-2FB27D99.pf
RUNDLL32.EXE-38EDF48E.pf
RUNDLL32.EXE-38F1DE30.pf
SOUNDMAN.EXE-05F141F5.pf
SVCHOST.EXE-14C74329.pf
TASKMGR.EXE-04F45597.pf
UPDATE.EXE-23DA33BB.pf
UPDATE.EXE-2577D203.pf
USERINIT.EXE-02C9AD39.pf
VERCLSID.EXE-247ADA62.pf
VM303CAP.EXE-01D62B8D.pf
VMSNAP3.EXE-34BCBCE1.pf
WGATRAY.EXE-2A04A2AB.pf
WLCOMM.EXE-04AE9009.pf
WLTUSER.EXE-05A5B196.pf
WMIPRVSE.EXE-1D5062CE.pf
WMPFIREFOXPLUGIN.EXE-39C49AAA.pf
WMPLAYER.EXE-18DDEF9D.pf
WORDPAD.EXE-02314C89.pf
WORDVIEW.EXE-08BD9A01.pf
WSCNTFY.EXE-3B8EA934.pf
WUAUCLT.EXE-1E6977B4.pf
¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤( EOF )¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤
List'em by g3n-h@ckm@n 1.0.4.8
Thx to Chiquitine29.....
User : Administrateur (Administrateurs) # XPSP2-379C75017
Update on 29/10/2009 by g3n-h@ckm@n ::::: 18.30
Start at: 13:48:37 | 06.11.2009
Contact : g3n-h@ckm@n sur CCM
Intel(R) Celeron(R) CPU 2.93GHz
Microsoft Windows XP Professionnel (5.1.2600 32-bit) # Service Pack 3
Internet Explorer 8.0.6001.18702
Windows Firewall Status : Enabled
AV : AntiVir Desktop 9.0.1.30 [ (!) Disabled | Updated ]
A:\ -> Lecteur de disquettes 3 ½ pouces
C:\ -> Disque fixe local | 58.59 Go (1.07 Go free) | NTFS
D:\ -> Disque CD-ROM
E:\ -> Disque fixe local | 17.73 Go (7.73 Go free) [Nouveau nom] | NTFS
¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤ Processus en cours
C:\WINDOWS2\System32\smss.exe 460
C:\WINDOWS2\system32\csrss.exe 508
C:\WINDOWS2\system32\winlogon.exe 532
C:\WINDOWS2\system32\services.exe 576
C:\WINDOWS2\system32\lsass.exe 596
C:\WINDOWS2\system32\svchost.exe 760
C:\WINDOWS2\system32\svchost.exe 828
C:\WINDOWS2\System32\svchost.exe 916
C:\WINDOWS2\system32\svchost.exe 988
C:\WINDOWS2\system32\spoolsv.exe 1196
C:\Program Files\Avira\AntiVir Desktop\sched.exe 1244
C:\WINDOWS2\Explorer.EXE 1476
C:\Program Files\Avira\AntiVir Desktop\avguard.exe 1500
C:\Program Files\Fichiers communs\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe 1540
C:\Program Files\Bonjour\mDNSResponder.exe 1576
C:\Program Files\Java\jre6\bin\jqs.exe 1636
C:\WINDOWS2\system32\PSIService.exe 1728
C:\Program Files\Photodex\ProShowGold\ScsiAccess.exe 1760
C:\Program Files\Microsoft\Search Enhancement Pack\SeaPort\SeaPort.exe 1776
C:\WINDOWS2\VMSnap3.EXE 1908
C:\WINDOWS2\Domino.EXE 1920
C:\Program Files\Avira\AntiVir Desktop\avgnt.exe 1928
C:\Program Files\Java\jre6\bin\jusched.exe 1964
C:\Program Files\Fichiers communs\Nikon\Monitor\NkMonitor.exe 1972
C:\WINDOWS2\system32\svchost.exe 2020
C:\Program Files\Windows Live\Messenger\msnmsgr.exe 2032
C:\WINDOWS2\system32\wdfmgr.exe 128
C:\WINDOWS2\system32\ctfmon.exe 172
C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe 180
C:\WINDOWS2\system32\svchost.exe 2056
C:\WINDOWS2\System32\alg.exe 2404
C:\Program Files\Mozilla Firefox\firefox.exe 3528
C:\WINDOWS2\system32\wscntfy.exe 2884
C:\Documents and Settings\Administrateur.XPSP2-379C75017\Bureau\List_Killem.exe 2748
C:\Documents and Settings\Administrateur.XPSP2-379C75017\Bureau\List_Killem.exe 2612
C:\WINDOWS2\system32\cmd.exe 1508
C:\WINDOWS2\system32\cmd.exe 1516
C:\WINDOWS2\system32\wbem\wmiprvse.exe 2136
C:\Documents and Settings\Administrateur.XPSP2-379C75017\Local Settings\Temp\38.tmp\pv.exe 3028
======================
Cles de demarrage "Run"
======================
Windows Registry Editor Version 5.00
[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"msnmsgr"="\"C:\\Program Files\\Windows Live\\Messenger\\msnmsgr.exe\" /background"
"ctfmon.exe"="C:\\WINDOWS2\\system32\\ctfmon.exe"
"swg"="\"C:\\Program Files\\Google\\GoogleToolbarNotifier\\GoogleToolbarNotifier.exe\""
Windows Registry Editor Version 5.00
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"SiSPower"="Rundll32.exe SiSPower.dll,ModeAgent"
"VMSnap3"="C:\\WINDOWS2\\VMSnap3.EXE"
"Domino"="C:\\WINDOWS2\\Domino.EXE"
"avgnt"="\"C:\\Program Files\\Avira\\AntiVir Desktop\\avgnt.exe\" /min"
"SoundMan"="SOUNDMAN.EXE"
"BigDog303"="C:\\WINDOWS2\\VM303_STI.EXE VIMICRO USB PC Camera (ZC0301PLH)"
"QuickTime Task"="\"C:\\Program Files\\QuickTime\\qttask.exe\" -atboottime"
"SunJavaUpdateSched"="\"C:\\Program Files\\Java\\jre6\\bin\\jusched.exe\""
"Nikon Transfer Monitor"="C:\\Program Files\\Fichiers communs\\Nikon\\Monitor\\NkMonitor.exe"
"Adobe Reader Speed Launcher"="\"C:\\Program Files\\Adobe\\Reader 9.0\\Reader\\Reader_sl.exe\""
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\OptionalComponents]
@=""
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\OptionalComponents\IMAIL]
"Installed"="1"
@=""
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\OptionalComponents\MAPI]
"NoChange"="1"
"Installed"="1"
@=""
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\OptionalComponents\MSFS]
"Installed"="1"
@=""
=====================
cles additionnelles
=====================
Windows Registry Editor Version 5.00
[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System]
"dontdisplaylastusername"=dword:00000000
"legalnoticecaption"=""
"legalnoticetext"=""
"shutdownwithoutlogon"=dword:00000001
"undockwithoutlogon"=dword:00000001
===============
===============
Windows Registry Editor Version 5.00
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad]
"PostBootReminder"="{7849596a-48ea-486e-8937-a2a3009f31a9}"
"CDBurn"="{fbeb8a05-beee-4442-804e-409d6c4515e9}"
"WebCheck"="{E6FB5E20-DE35-11CF-9C87-00AA005127ED}"
"SysTray"="{35CEC8A3-2BE6-11D2-8773-92E220524153}"
======
BHO :
======
Windows Registry Editor Version 5.00
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects]
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{18DF081C-E8AD-4283-A596-FA578C2EBDC3}]
@="AcroIEHelperStub"
"NoExplorer"=dword:00000001
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{53707962-6F74-2D53-2644-206D7942484F}]
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{5C255C8A-E604-49b4-9D64-90988571CECB}]
@=""
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{6EBF7485-159F-4bff-A14F-B9E3AAC4465B}]
@="Search Helper"
"NoExplorer"=dword:00000001
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{9030D464-4C02-4ABF-8ECC-5164760863C6}]
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{AA58ED58-01DD-4d91-8333-CF10577473F7}]
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{AF69DE43-7D58-4638-B6FA-CE66B5AD205D}]
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{C84D72FE-E17D-4195-BB24-76C02E2E7C4E}]
@="Google Dictionary Compression sdch"
"NoExplorer"=dword:00000001
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{DBC80044-A445-435b-BC74-9C25C1C588A9}]
"NoExplorer"=dword:00000001
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{E15A8DC0-8516-42A1-81EA-DC94EC1ACF10}]
"NoExplorer"=dword:00000001
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{E7E6F031-17CE-4C07-BC86-EABFE594F69C}]
@="JQSIEStartDetectorImpl"
"NoExplorer"=dword:00000001
==========================
===============
Path : C:\WINDOWS2\system32;C:\WINDOWS2;C:\WINDOWS2\System32\Wbem;C:\Program Files\QuickTime\QTSystem\
===============
¤¤¤¤¤¤¤¤¤¤ Fichiers et dossiers presents :
C:\Documents and Settings\All Users.WINDOWS2\Application Data\Microsoft\Network\Downloader\qmgr0.dat
C:\Documents and Settings\All Users.WINDOWS2\Application Data\Microsoft\Network\Downloader\qmgr1.dat
C:\WINDOWS2\System32\_004110_.tmp.dll
C:\WINDOWS2\System32\_004111_.tmp.dll
C:\WINDOWS2\System32\_004112_.tmp.dll
C:\WINDOWS2\System32\_004113_.tmp.dll
C:\WINDOWS2\System32\_004120_.tmp.dll
C:\WINDOWS2\System32\_004121_.tmp.dll
C:\WINDOWS2\System32\_004122_.tmp.dll
C:\WINDOWS2\System32\_004123_.tmp.dll
C:\WINDOWS2\System32\_004125_.tmp.dll
C:\WINDOWS2\System32\_004126_.tmp.dll
C:\WINDOWS2\System32\_004129_.tmp.dll
C:\WINDOWS2\System32\_004130_.tmp.dll
C:\WINDOWS2\System32\_004132_.tmp.dll
C:\WINDOWS2\System32\_004133_.tmp.dll
C:\WINDOWS2\System32\_004134_.tmp.dll
C:\WINDOWS2\System32\_004136_.tmp.dll
C:\WINDOWS2\System32\_004138_.tmp.dll
C:\WINDOWS2\System32\_004139_.tmp.dll
C:\WINDOWS2\System32\_004140_.tmp.dll
C:\WINDOWS2\System32\_004144_.tmp.dll
C:\WINDOWS2\System32\_004145_.tmp.dll
C:\WINDOWS2\System32\_004147_.tmp.dll
C:\WINDOWS2\System32\_004150_.tmp.dll
C:\WINDOWS2\System32\_004152_.tmp.dll
C:\WINDOWS2\System32\_004153_.tmp.dll
C:\WINDOWS2\System32\_004155_.tmp.dll
C:\WINDOWS2\System32\_004156_.tmp.dll
C:\WINDOWS2\System32\_004159_.tmp.dll
C:\WINDOWS2\System32\_004160_.tmp.dll
C:\WINDOWS2\System32\_004161_.tmp.dll
C:\WINDOWS2\System32\_004162_.tmp.dll
C:\WINDOWS2\System32\_004163_.tmp.dll
C:\WINDOWS2\System32\_004168_.tmp.dll
C:\WINDOWS2\System32\_004170_.tmp.dll
C:\WINDOWS2\System32\drivers\_004087_.tmp.dll
C:\WINDOWS2\System32\SET14F.tmp
C:\WINDOWS2\System32\SET150.tmp
C:\WINDOWS2\System32\SET152.tmp
C:\WINDOWS2\System32\SET154.tmp
C:\WINDOWS2\System32\SET156.tmp
C:\WINDOWS2\System32\SET15D.tmp
C:\WINDOWS2\System32\SET15E.tmp
C:\WINDOWS2\System32\SET161.tmp
C:\WINDOWS2\System32\SET166.tmp
C:\WINDOWS2\System32\SET167.tmp
C:\WINDOWS2\System32\SET168.tmp
C:\WINDOWS2\System32\SET16A.tmp
C:\WINDOWS2\System32\SET16B.tmp
C:\WINDOWS2\System32\SET16C.tmp
C:\WINDOWS2\System32\SET16D.tmp
C:\WINDOWS2\System32\SET16E.tmp
C:\WINDOWS2\System32\SET170.tmp
C:\WINDOWS2\System32\SET171.tmp
C:\WINDOWS2\System32\SET172.tmp
C:\WINDOWS2\System32\SET175.tmp
C:\WINDOWS2\System32\SET17E.tmp
C:\WINDOWS2\System32\SET181.tmp
C:\WINDOWS2\System32\SET183.tmp
C:\WINDOWS2\System32\SET185.tmp
C:\WINDOWS2\System32\SET18B.tmp
C:\WINDOWS2\System32\SET18D.tmp
C:\WINDOWS2\System32\SET18E.tmp
C:\WINDOWS2\System32\SET18F.tmp
C:\WINDOWS2\System32\SET191.tmp
C:\WINDOWS2\System32\SET196.tmp
C:\WINDOWS2\System32\SET197.tmp
C:\WINDOWS2\System32\SET198.tmp
C:\WINDOWS2\System32\SET199.tmp
C:\WINDOWS2\System32\SET19A.tmp
C:\WINDOWS2\System32\SET1A4.tmp
C:\WINDOWS2\System32\SET1A5.tmp
C:\WINDOWS2\System32\SET1A8.tmp
C:\WINDOWS2\System32\SET1AB.tmp
C:\WINDOWS2\System32\SET1AC.tmp
C:\WINDOWS2\System32\SET1B3.tmp
C:\WINDOWS2\System32\SET1B4.tmp
C:\WINDOWS2\System32\SET1B6.tmp
C:\WINDOWS2\System32\SET1B9.tmp
C:\WINDOWS2\System32\SET1BA.tmp
C:\WINDOWS2\System32\SET1C3.tmp
C:\WINDOWS2\System32\SET1C4.tmp
C:\WINDOWS2\System32\SET1C7.tmp
C:\WINDOWS2\System32\SET1C9.tmp
C:\WINDOWS2\System32\SET1CA.tmp
C:\WINDOWS2\System32\SET1CB.tmp
C:\WINDOWS2\System32\SET1CC.tmp
C:\WINDOWS2\System32\SET1CD.tmp
C:\WINDOWS2\System32\SET1DC.tmp
C:\WINDOWS2\System32\SET1E1.tmp
C:\WINDOWS2\System32\SET1E3.tmp
C:\WINDOWS2\System32\SET1E5.tmp
C:\WINDOWS2\System32\SET1E6.tmp
C:\WINDOWS2\System32\SET1E7.tmp
C:\WINDOWS2\System32\SET1E9.tmp
C:\WINDOWS2\System32\SET1EA.tmp
C:\WINDOWS2\System32\SET1EE.tmp
C:\WINDOWS2\System32\SET1EF.tmp
C:\WINDOWS2\System32\SET1F2.tmp
C:\WINDOWS2\System32\SET1F3.tmp
C:\WINDOWS2\System32\SET1F4.tmp
C:\WINDOWS2\System32\SET1FA.tmp
C:\WINDOWS2\System32\SET1FB.tmp
C:\WINDOWS2\System32\SET1FC.tmp
C:\WINDOWS2\System32\SET204.tmp
C:\WINDOWS2\System32\SET209.tmp
C:\WINDOWS2\System32\SET20A.tmp
C:\WINDOWS2\System32\SET20B.tmp
C:\WINDOWS2\System32\SET20C.tmp
C:\WINDOWS2\System32\SET20E.tmp
C:\WINDOWS2\System32\SET214.tmp
C:\WINDOWS2\System32\SET220.tmp
C:\WINDOWS2\System32\SET222.tmp
C:\WINDOWS2\System32\SET224.tmp
C:\WINDOWS2\System32\SET225.tmp
C:\WINDOWS2\System32\SET226.tmp
C:\WINDOWS2\System32\SET228.tmp
C:\WINDOWS2\System32\SET231.tmp
C:\WINDOWS2\System32\SET233.tmp
C:\WINDOWS2\System32\SET234.tmp
C:\WINDOWS2\System32\SET237.tmp
C:\WINDOWS2\System32\SET239.tmp
C:\WINDOWS2\System32\SET23C.tmp
C:\WINDOWS2\System32\SET240.tmp
C:\WINDOWS2\System32\SET241.tmp
C:\WINDOWS2\System32\SET242.tmp
C:\WINDOWS2\System32\SET244.tmp
C:\WINDOWS2\System32\SET245.tmp
C:\WINDOWS2\System32\SET24B.tmp
C:\WINDOWS2\System32\SET24E.tmp
C:\WINDOWS2\System32\SET24F.tmp
C:\WINDOWS2\System32\SET256.tmp
C:\WINDOWS2\System32\SET257.tmp
C:\WINDOWS2\System32\SET25A.tmp
C:\WINDOWS2\System32\SET25B.tmp
C:\WINDOWS2\System32\SET25C.tmp
C:\WINDOWS2\System32\SET25D.tmp
C:\WINDOWS2\System32\SET25E.tmp
C:\WINDOWS2\System32\SET260.tmp
C:\WINDOWS2\System32\SET261.tmp
C:\WINDOWS2\System32\SET262.tmp
C:\WINDOWS2\System32\SET264.tmp
C:\WINDOWS2\System32\SET265.tmp
C:\WINDOWS2\System32\SET266.tmp
C:\WINDOWS2\System32\SET26B.tmp
C:\WINDOWS2\System32\SET270.tmp
C:\WINDOWS2\System32\SET271.tmp
C:\WINDOWS2\System32\SET272.tmp
C:\WINDOWS2\System32\SET276.tmp
C:\WINDOWS2\System32\SET277.tmp
C:\WINDOWS2\System32\SET278.tmp
C:\WINDOWS2\System32\SET27A.tmp
C:\WINDOWS2\System32\SET27D.tmp
C:\WINDOWS2\System32\SET27F.tmp
C:\WINDOWS2\System32\SET280.tmp
C:\WINDOWS2\System32\SET283.tmp
C:\WINDOWS2\System32\SET284.tmp
C:\WINDOWS2\System32\SET287.tmp
C:\WINDOWS2\System32\SET28A.tmp
C:\WINDOWS2\System32\SET28B.tmp
C:\WINDOWS2\System32\SET292.tmp
C:\WINDOWS2\System32\SET297.tmp
C:\WINDOWS2\System32\SET29E.tmp
C:\WINDOWS2\System32\SET29F.tmp
C:\WINDOWS2\System32\SET2A2.tmp
C:\WINDOWS2\System32\SET2A3.tmp
C:\WINDOWS2\System32\SET2AD.tmp
C:\WINDOWS2\System32\SET2AF.tmp
C:\WINDOWS2\System32\SET2B1.tmp
C:\WINDOWS2\System32\SET2B2.tmp
C:\WINDOWS2\System32\SET2BD.tmp
C:\WINDOWS2\System32\SET2BE.tmp
C:\WINDOWS2\System32\SET2BF.tmp
C:\WINDOWS2\System32\SET2C0.tmp
C:\WINDOWS2\System32\SET2C1.tmp
C:\WINDOWS2\System32\SET2C2.tmp
C:\WINDOWS2\System32\SET2C4.tmp
C:\WINDOWS2\System32\SET2C6.tmp
C:\WINDOWS2\System32\SET2C8.tmp
C:\WINDOWS2\System32\SET2CD.tmp
C:\WINDOWS2\System32\SET2CF.tmp
C:\WINDOWS2\System32\SET2D2.tmp
C:\WINDOWS2\System32\SET2D4.tmp
C:\WINDOWS2\System32\SET2D6.tmp
C:\WINDOWS2\System32\SET2D7.tmp
C:\WINDOWS2\System32\SET2D8.tmp
C:\WINDOWS2\System32\SET2D9.tmp
C:\WINDOWS2\System32\SET2DB.tmp
C:\WINDOWS2\System32\SET2E0.tmp
C:\WINDOWS2\System32\SET2E2.tmp
C:\WINDOWS2\System32\SET2E3.tmp
C:\WINDOWS2\System32\SET2E9.tmp
C:\WINDOWS2\System32\SET2F2.tmp
C:\WINDOWS2\System32\SET2F5.tmp
C:\WINDOWS2\System32\SET2F6.tmp
C:\WINDOWS2\System32\SET2F9.tmp
C:\WINDOWS2\System32\SET301.tmp
C:\WINDOWS2\System32\SET308.tmp
C:\WINDOWS2\System32\SET30A.tmp
C:\WINDOWS2\System32\SET30F.tmp
C:\WINDOWS2\System32\SET310.tmp
C:\WINDOWS2\System32\SET312.tmp
C:\WINDOWS2\System32\SET313.tmp
C:\WINDOWS2\System32\SET315.tmp
C:\WINDOWS2\System32\SET32B.tmp
C:\WINDOWS2\System32\SET32D.tmp
C:\WINDOWS2\System32\SET32F.tmp
C:\WINDOWS2\System32\SET335.tmp
C:\WINDOWS2\System32\SET339.tmp
C:\WINDOWS2\System32\SET346.tmp
C:\WINDOWS2\System32\SET34B.tmp
C:\WINDOWS2\System32\SET34D.tmp
C:\WINDOWS2\System32\SET34E.tmp
C:\WINDOWS2\System32\SET354.tmp
C:\WINDOWS2\System32\SET358.tmp
C:\WINDOWS2\System32\SET362.tmp
C:\WINDOWS2\System32\SET366.tmp
C:\WINDOWS2\System32\SET368.tmp
C:\WINDOWS2\System32\SET369.tmp
C:\WINDOWS2\System32\SET372.tmp
C:\WINDOWS2\System32\SET376.tmp
C:\WINDOWS2\System32\SET381.tmp
C:\WINDOWS2\System32\SET391.tmp
C:\WINDOWS2\System32\SET392.tmp
C:\WINDOWS2\System32\SET3B1.tmp
C:\WINDOWS2\System32\SET3B3.tmp
C:\WINDOWS2\System32\SET3B4.tmp
C:\WINDOWS2\System32\SET3B7.tmp
C:\WINDOWS2\System32\SET3BC.tmp
C:\WINDOWS2\System32\SET3BE.tmp
C:\WINDOWS2\System32\SET3C5.tmp
C:\WINDOWS2\System32\SET3C6.tmp
C:\WINDOWS2\System32\SET3C7.tmp
C:\WINDOWS2\System32\SET3C9.tmp
C:\WINDOWS2\System32\SET3CA.tmp
C:\WINDOWS2\System32\SET3CB.tmp
C:\WINDOWS2\System32\SET3CC.tmp
C:\WINDOWS2\System32\SET3CE.tmp
C:\WINDOWS2\System32\SET3D0.tmp
C:\WINDOWS2\System32\SET3D1.tmp
C:\WINDOWS2\System32\SET3D2.tmp
C:\WINDOWS2\System32\SET3D5.tmp
C:\WINDOWS2\System32\SET3D7.tmp
C:\WINDOWS2\System32\SET3DC.tmp
C:\WINDOWS2\System32\SET3DD.tmp
C:\WINDOWS2\System32\SET3E5.tmp
C:\WINDOWS2\System32\SET3EB.tmp
C:\WINDOWS2\System32\SET3F0.tmp
C:\WINDOWS2\System32\SET3F3.tmp
C:\WINDOWS2\System32\SET3F6.tmp
C:\WINDOWS2\System32\SET3F8.tmp
C:\WINDOWS2\System32\SET3FC.tmp
C:\WINDOWS2\System32\SET3FE.tmp
C:\WINDOWS2\System32\SET3FF.tmp
C:\WINDOWS2\System32\SET400.tmp
C:\WINDOWS2\System32\SET403.tmp
C:\WINDOWS2\System32\SET404.tmp
C:\WINDOWS2\System32\SET408.tmp
C:\WINDOWS2\System32\SET409.tmp
C:\WINDOWS2\System32\SET40C.tmp
C:\WINDOWS2\System32\SET40E.tmp
C:\WINDOWS2\System32\SET413.tmp
C:\WINDOWS2\System32\SET416.tmp
C:\WINDOWS2\System32\SET41A.tmp
C:\WINDOWS2\System32\SET41C.tmp
C:\WINDOWS2\System32\SET41E.tmp
C:\WINDOWS2\System32\SET589.tmp
C:\WINDOWS2\System32\SET58F.tmp
C:\Documents and Settings\Administrateur.XPSP2-379C75017\LOCAL Settings\Temp\jre-6u15-windows-i586-iftw.exe
¤¤¤¤¤¤¤¤¤¤ Clés de registre Presentes :
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Setup.exe
¤¤¤¤¤¤¤¤¤¤ C:\WINDOWS2\Prefetch :
ACRORD32.EXE-3A1F13AE.pf
ACRORD32INFO.EXE-242CE4AA.pf
ALG.EXE-1DECFBF7.pf
AVGNT.EXE-200FEF40.pf
AVNOTIFY.EXE-05ED5FD8.pf
AVWSC.EXE-0283F9DD.pf
CALC.EXE-1F8106EA.pf
CMD.EXE-17B3DF73.pf
CSCRIPT.EXE-00F5014E.pf
DEFRAG.EXE-070EA7C2.pf
DFRGNTFS.EXE-3449300C.pf
DOMINO.EXE-17A451D6.pf
DRWTSN32.EXE-029C815B.pf
EXPLORER.EXE-259ACD19.pf
EXPORTCONTROLLER.EXE-0303443A.pf
FIREFOX.EXE-28641590.pf
GOOGLEUPDATERSERVICE.EXE-3AB369BE.pf
HELPSVC.EXE-30CF7F42.pf
IEXPLORE.EXE-27122324.pf
JAVA.EXE-0C263507.pf
JAVAWS.EXE-021AC9A9.pf
JQSNOTIFY.EXE-24AE4A36.pf
JUCHECK.EXE-395165C8.pf
JUSCHED.EXE-25206883.pf
Layout.ini
LIST_KILLEM.EXE-2EE87B34.pf
LOGON.SCR-07B9284C.pf
LOGONUI.EXE-26234015.pf
MACONFIG_3_5_1_0.EXE-2E348C5D.pf
MODE.COM-3513B220.pf
MSIEXEC.EXE-0F20D965.pf
MSNMSGR.EXE-030AB647.pf
MSPAINT.EXE-3235697A.pf
NKMONITOR.EXE-2F5083F8.pf
NOTEPAD.EXE-12F99E60.pf
NTOSBOOT-B00DFAAD.pf
OPERA.EXE-12085680.pf
PHOTOFILTRE.EXE-00101112.pf
PV.EXE-10AD4F6F.pf
QTTASK.EXE-342507FB.pf
QUICKTIMEPLAYER.EXE-280B4828.pf
READER_SL.EXE-2B4EA1CB.pf
REG.EXE-1304897D.pf
RUNDLL32.EXE-04A93074.pf
RUNDLL32.EXE-0E4A2986.pf
RUNDLL32.EXE-1F16F14A.pf
RUNDLL32.EXE-1F904083.pf
RUNDLL32.EXE-242CC9EF.pf
RUNDLL32.EXE-24837BED.pf
RUNDLL32.EXE-2FB27D99.pf
RUNDLL32.EXE-38EDF48E.pf
RUNDLL32.EXE-38F1DE30.pf
SOUNDMAN.EXE-05F141F5.pf
SVCHOST.EXE-14C74329.pf
TASKMGR.EXE-04F45597.pf
UPDATE.EXE-23DA33BB.pf
UPDATE.EXE-2577D203.pf
USERINIT.EXE-02C9AD39.pf
VERCLSID.EXE-247ADA62.pf
VM303CAP.EXE-01D62B8D.pf
VMSNAP3.EXE-34BCBCE1.pf
WGATRAY.EXE-2A04A2AB.pf
WLCOMM.EXE-04AE9009.pf
WLTUSER.EXE-05A5B196.pf
WMIPRVSE.EXE-1D5062CE.pf
WMPFIREFOXPLUGIN.EXE-39C49AAA.pf
WMPLAYER.EXE-18DDEF9D.pf
WORDPAD.EXE-02314C89.pf
WORDVIEW.EXE-08BD9A01.pf
WSCNTFY.EXE-3B8EA934.pf
WUAUCLT.EXE-1E6977B4.pf
¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤( EOF )¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤
REDEMARRE EN MODE SANS ECHEC , puis :
▶ Relance List&Kill'em comme tu as fait pour l'option 1 (soit en clic droit pour vista),
mais cette fois-ci :
▶ choisis l'option 2 = Mode Destruction
laisse travailler l'outil
apres les verifications , un rapport va s'ouvrir.
▶ ferme-le.
un deuxieme rapport va s'ouvrir ,
▶ colle son contenu dans ta reponse apres avoir redemarré en mode normal
▶ Relance List&Kill'em comme tu as fait pour l'option 1 (soit en clic droit pour vista),
mais cette fois-ci :
▶ choisis l'option 2 = Mode Destruction
laisse travailler l'outil
apres les verifications , un rapport va s'ouvrir.
▶ ferme-le.
un deuxieme rapport va s'ouvrir ,
▶ colle son contenu dans ta reponse apres avoir redemarré en mode normal
Vous n’avez pas trouvé la réponse que vous recherchez ?
Posez votre question
Kill'em by g3n-h@ckm@n 1.0.4.8
User : Administrateur () # XPSP2-379C75017
Update on 29/10/2009 by g3n-h@ckm@n ::::: 18.30
Start at: 14:12:08 | 06.11.2009
Contact : g3n-h@ckm@n sur CCM
Intel(R) Celeron(R) CPU 2.93GHz
Microsoft Windows XP Professionnel (5.1.2600 32-bit) # Service Pack 3
Internet Explorer 8.0.6001.18702
Windows Firewall Status : Enabled
AV : AntiVir Desktop 9.0.1.30 [ (!) Disabled | Updated ]
A:\ -> Lecteur de disquettes 3 ½ pouces
C:\ -> Disque fixe local | 58.59 Go (1.11 Go free) | NTFS
D:\ -> Disque CD-ROM
E:\ -> Disque fixe local | 17.73 Go (7.73 Go free) [Nouveau nom] | NTFS
¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤ Processus en cours
C:\WINDOWS2\System32\smss.exe 152
C:\WINDOWS2\system32\csrss.exe 200
C:\WINDOWS2\system32\winlogon.exe 224
C:\WINDOWS2\system32\services.exe 268
C:\WINDOWS2\system32\lsass.exe 280
C:\WINDOWS2\system32\svchost.exe 432
C:\WINDOWS2\system32\svchost.exe 492
C:\WINDOWS2\system32\svchost.exe 552
C:\WINDOWS2\Explorer.EXE 836
C:\WINDOWS2\system32\wbem\wmiprvse.exe 944
C:\Documents and Settings\Administrateur.XPSP2-379C75017\Bureau\List_Killem.exe 1132
C:\WINDOWS2\system32\cmd.exe 1144
C:\Documents and Settings\Administrateur.XPSP2-379C75017\Local Settings\Temp\1.tmp\pv.exe 1260
Fichiers analysés :
=================
¤¤¤¤¤¤¤¤¤¤ Fichiers et dossiers presents :
"C:\Documents and Settings\All Users.WINDOWS2\Application Data\Microsoft\Network\Downloader\qmgr0.dat"
"C:\Documents and Settings\All Users.WINDOWS2\Application Data\Microsoft\Network\Downloader\qmgr1.dat"
C:\WINDOWS2\System32\_004110_.tmp.dll
C:\WINDOWS2\System32\_004111_.tmp.dll
C:\WINDOWS2\System32\_004112_.tmp.dll
C:\WINDOWS2\System32\_004113_.tmp.dll
C:\WINDOWS2\System32\_004120_.tmp.dll
C:\WINDOWS2\System32\_004121_.tmp.dll
C:\WINDOWS2\System32\_004122_.tmp.dll
C:\WINDOWS2\System32\_004123_.tmp.dll
C:\WINDOWS2\System32\_004125_.tmp.dll
C:\WINDOWS2\System32\_004126_.tmp.dll
C:\WINDOWS2\System32\_004129_.tmp.dll
C:\WINDOWS2\System32\_004130_.tmp.dll
C:\WINDOWS2\System32\_004132_.tmp.dll
C:\WINDOWS2\System32\_004133_.tmp.dll
C:\WINDOWS2\System32\_004134_.tmp.dll
C:\WINDOWS2\System32\_004136_.tmp.dll
C:\WINDOWS2\System32\_004138_.tmp.dll
C:\WINDOWS2\System32\_004139_.tmp.dll
C:\WINDOWS2\System32\_004140_.tmp.dll
C:\WINDOWS2\System32\_004144_.tmp.dll
C:\WINDOWS2\System32\_004145_.tmp.dll
C:\WINDOWS2\System32\_004147_.tmp.dll
C:\WINDOWS2\System32\_004150_.tmp.dll
C:\WINDOWS2\System32\_004152_.tmp.dll
C:\WINDOWS2\System32\_004153_.tmp.dll
C:\WINDOWS2\System32\_004155_.tmp.dll
C:\WINDOWS2\System32\_004156_.tmp.dll
C:\WINDOWS2\System32\_004159_.tmp.dll
C:\WINDOWS2\System32\_004160_.tmp.dll
C:\WINDOWS2\System32\_004161_.tmp.dll
C:\WINDOWS2\System32\_004162_.tmp.dll
C:\WINDOWS2\System32\_004163_.tmp.dll
C:\WINDOWS2\System32\_004168_.tmp.dll
C:\WINDOWS2\System32\_004170_.tmp.dll
C:\WINDOWS2\System32\drivers\_004087_.tmp.dll
C:\WINDOWS2\System32\SET14F.tmp
C:\WINDOWS2\System32\SET150.tmp
C:\WINDOWS2\System32\SET152.tmp
C:\WINDOWS2\System32\SET154.tmp
C:\WINDOWS2\System32\SET156.tmp
C:\WINDOWS2\System32\SET15D.tmp
C:\WINDOWS2\System32\SET15E.tmp
C:\WINDOWS2\System32\SET161.tmp
C:\WINDOWS2\System32\SET166.tmp
C:\WINDOWS2\System32\SET167.tmp
C:\WINDOWS2\System32\SET168.tmp
C:\WINDOWS2\System32\SET16A.tmp
C:\WINDOWS2\System32\SET16B.tmp
C:\WINDOWS2\System32\SET16C.tmp
C:\WINDOWS2\System32\SET16D.tmp
C:\WINDOWS2\System32\SET16E.tmp
C:\WINDOWS2\System32\SET170.tmp
C:\WINDOWS2\System32\SET171.tmp
C:\WINDOWS2\System32\SET172.tmp
C:\WINDOWS2\System32\SET175.tmp
C:\WINDOWS2\System32\SET17E.tmp
C:\WINDOWS2\System32\SET181.tmp
C:\WINDOWS2\System32\SET183.tmp
C:\WINDOWS2\System32\SET185.tmp
C:\WINDOWS2\System32\SET18B.tmp
C:\WINDOWS2\System32\SET18D.tmp
C:\WINDOWS2\System32\SET18E.tmp
C:\WINDOWS2\System32\SET18F.tmp
C:\WINDOWS2\System32\SET191.tmp
C:\WINDOWS2\System32\SET196.tmp
C:\WINDOWS2\System32\SET197.tmp
C:\WINDOWS2\System32\SET198.tmp
C:\WINDOWS2\System32\SET199.tmp
C:\WINDOWS2\System32\SET19A.tmp
C:\WINDOWS2\System32\SET1A4.tmp
C:\WINDOWS2\System32\SET1A5.tmp
C:\WINDOWS2\System32\SET1A8.tmp
C:\WINDOWS2\System32\SET1AB.tmp
C:\WINDOWS2\System32\SET1AC.tmp
C:\WINDOWS2\System32\SET1B3.tmp
C:\WINDOWS2\System32\SET1B4.tmp
C:\WINDOWS2\System32\SET1B6.tmp
C:\WINDOWS2\System32\SET1B9.tmp
C:\WINDOWS2\System32\SET1BA.tmp
C:\WINDOWS2\System32\SET1C3.tmp
C:\WINDOWS2\System32\SET1C4.tmp
C:\WINDOWS2\System32\SET1C7.tmp
C:\WINDOWS2\System32\SET1C9.tmp
C:\WINDOWS2\System32\SET1CA.tmp
C:\WINDOWS2\System32\SET1CB.tmp
C:\WINDOWS2\System32\SET1CC.tmp
C:\WINDOWS2\System32\SET1CD.tmp
C:\WINDOWS2\System32\SET1DC.tmp
C:\WINDOWS2\System32\SET1E1.tmp
C:\WINDOWS2\System32\SET1E3.tmp
C:\WINDOWS2\System32\SET1E5.tmp
C:\WINDOWS2\System32\SET1E6.tmp
C:\WINDOWS2\System32\SET1E7.tmp
C:\WINDOWS2\System32\SET1E9.tmp
C:\WINDOWS2\System32\SET1EA.tmp
C:\WINDOWS2\System32\SET1EE.tmp
C:\WINDOWS2\System32\SET1EF.tmp
C:\WINDOWS2\System32\SET1F2.tmp
C:\WINDOWS2\System32\SET1F3.tmp
C:\WINDOWS2\System32\SET1F4.tmp
C:\WINDOWS2\System32\SET1FA.tmp
C:\WINDOWS2\System32\SET1FB.tmp
C:\WINDOWS2\System32\SET1FC.tmp
C:\WINDOWS2\System32\SET204.tmp
C:\WINDOWS2\System32\SET209.tmp
C:\WINDOWS2\System32\SET20A.tmp
C:\WINDOWS2\System32\SET20B.tmp
C:\WINDOWS2\System32\SET20C.tmp
C:\WINDOWS2\System32\SET20E.tmp
C:\WINDOWS2\System32\SET214.tmp
C:\WINDOWS2\System32\SET220.tmp
C:\WINDOWS2\System32\SET222.tmp
C:\WINDOWS2\System32\SET224.tmp
C:\WINDOWS2\System32\SET225.tmp
C:\WINDOWS2\System32\SET226.tmp
C:\WINDOWS2\System32\SET228.tmp
C:\WINDOWS2\System32\SET231.tmp
C:\WINDOWS2\System32\SET233.tmp
C:\WINDOWS2\System32\SET234.tmp
C:\WINDOWS2\System32\SET237.tmp
C:\WINDOWS2\System32\SET239.tmp
C:\WINDOWS2\System32\SET23C.tmp
C:\WINDOWS2\System32\SET240.tmp
C:\WINDOWS2\System32\SET241.tmp
C:\WINDOWS2\System32\SET242.tmp
C:\WINDOWS2\System32\SET244.tmp
C:\WINDOWS2\System32\SET245.tmp
C:\WINDOWS2\System32\SET24B.tmp
C:\WINDOWS2\System32\SET24E.tmp
C:\WINDOWS2\System32\SET24F.tmp
C:\WINDOWS2\System32\SET256.tmp
C:\WINDOWS2\System32\SET257.tmp
C:\WINDOWS2\System32\SET25A.tmp
C:\WINDOWS2\System32\SET25B.tmp
C:\WINDOWS2\System32\SET25C.tmp
C:\WINDOWS2\System32\SET25D.tmp
C:\WINDOWS2\System32\SET25E.tmp
C:\WINDOWS2\System32\SET260.tmp
C:\WINDOWS2\System32\SET261.tmp
C:\WINDOWS2\System32\SET262.tmp
C:\WINDOWS2\System32\SET264.tmp
C:\WINDOWS2\System32\SET265.tmp
C:\WINDOWS2\System32\SET266.tmp
C:\WINDOWS2\System32\SET26B.tmp
C:\WINDOWS2\System32\SET270.tmp
C:\WINDOWS2\System32\SET271.tmp
C:\WINDOWS2\System32\SET272.tmp
C:\WINDOWS2\System32\SET276.tmp
C:\WINDOWS2\System32\SET277.tmp
C:\WINDOWS2\System32\SET278.tmp
C:\WINDOWS2\System32\SET27A.tmp
C:\WINDOWS2\System32\SET27D.tmp
C:\WINDOWS2\System32\SET27F.tmp
C:\WINDOWS2\System32\SET280.tmp
C:\WINDOWS2\System32\SET283.tmp
C:\WINDOWS2\System32\SET284.tmp
C:\WINDOWS2\System32\SET287.tmp
C:\WINDOWS2\System32\SET28A.tmp
C:\WINDOWS2\System32\SET28B.tmp
C:\WINDOWS2\System32\SET292.tmp
C:\WINDOWS2\System32\SET297.tmp
C:\WINDOWS2\System32\SET29E.tmp
C:\WINDOWS2\System32\SET29F.tmp
C:\WINDOWS2\System32\SET2A2.tmp
C:\WINDOWS2\System32\SET2A3.tmp
C:\WINDOWS2\System32\SET2AD.tmp
C:\WINDOWS2\System32\SET2AF.tmp
C:\WINDOWS2\System32\SET2B1.tmp
C:\WINDOWS2\System32\SET2B2.tmp
C:\WINDOWS2\System32\SET2BD.tmp
C:\WINDOWS2\System32\SET2BE.tmp
C:\WINDOWS2\System32\SET2BF.tmp
C:\WINDOWS2\System32\SET2C0.tmp
C:\WINDOWS2\System32\SET2C1.tmp
C:\WINDOWS2\System32\SET2C2.tmp
C:\WINDOWS2\System32\SET2C4.tmp
C:\WINDOWS2\System32\SET2C6.tmp
C:\WINDOWS2\System32\SET2C8.tmp
C:\WINDOWS2\System32\SET2CD.tmp
C:\WINDOWS2\System32\SET2CF.tmp
C:\WINDOWS2\System32\SET2D2.tmp
C:\WINDOWS2\System32\SET2D4.tmp
C:\WINDOWS2\System32\SET2D6.tmp
C:\WINDOWS2\System32\SET2D7.tmp
C:\WINDOWS2\System32\SET2D8.tmp
C:\WINDOWS2\System32\SET2D9.tmp
C:\WINDOWS2\System32\SET2DB.tmp
C:\WINDOWS2\System32\SET2E0.tmp
C:\WINDOWS2\System32\SET2E2.tmp
C:\WINDOWS2\System32\SET2E3.tmp
C:\WINDOWS2\System32\SET2E9.tmp
C:\WINDOWS2\System32\SET2F2.tmp
C:\WINDOWS2\System32\SET2F5.tmp
C:\WINDOWS2\System32\SET2F6.tmp
C:\WINDOWS2\System32\SET2F9.tmp
C:\WINDOWS2\System32\SET301.tmp
C:\WINDOWS2\System32\SET308.tmp
C:\WINDOWS2\System32\SET30A.tmp
C:\WINDOWS2\System32\SET30F.tmp
C:\WINDOWS2\System32\SET310.tmp
C:\WINDOWS2\System32\SET312.tmp
C:\WINDOWS2\System32\SET313.tmp
C:\WINDOWS2\System32\SET315.tmp
C:\WINDOWS2\System32\SET32B.tmp
C:\WINDOWS2\System32\SET32D.tmp
C:\WINDOWS2\System32\SET32F.tmp
C:\WINDOWS2\System32\SET335.tmp
C:\WINDOWS2\System32\SET339.tmp
C:\WINDOWS2\System32\SET346.tmp
C:\WINDOWS2\System32\SET34B.tmp
C:\WINDOWS2\System32\SET34D.tmp
C:\WINDOWS2\System32\SET34E.tmp
C:\WINDOWS2\System32\SET354.tmp
C:\WINDOWS2\System32\SET358.tmp
C:\WINDOWS2\System32\SET362.tmp
C:\WINDOWS2\System32\SET366.tmp
C:\WINDOWS2\System32\SET368.tmp
C:\WINDOWS2\System32\SET369.tmp
C:\WINDOWS2\System32\SET372.tmp
C:\WINDOWS2\System32\SET376.tmp
C:\WINDOWS2\System32\SET381.tmp
C:\WINDOWS2\System32\SET391.tmp
C:\WINDOWS2\System32\SET392.tmp
C:\WINDOWS2\System32\SET3B1.tmp
C:\WINDOWS2\System32\SET3B3.tmp
C:\WINDOWS2\System32\SET3B4.tmp
C:\WINDOWS2\System32\SET3B7.tmp
C:\WINDOWS2\System32\SET3BC.tmp
C:\WINDOWS2\System32\SET3BE.tmp
C:\WINDOWS2\System32\SET3C5.tmp
C:\WINDOWS2\System32\SET3C6.tmp
C:\WINDOWS2\System32\SET3C7.tmp
C:\WINDOWS2\System32\SET3C9.tmp
C:\WINDOWS2\System32\SET3CA.tmp
C:\WINDOWS2\System32\SET3CB.tmp
C:\WINDOWS2\System32\SET3CC.tmp
C:\WINDOWS2\System32\SET3CE.tmp
C:\WINDOWS2\System32\SET3D0.tmp
C:\WINDOWS2\System32\SET3D1.tmp
C:\WINDOWS2\System32\SET3D2.tmp
C:\WINDOWS2\System32\SET3D5.tmp
C:\WINDOWS2\System32\SET3D7.tmp
C:\WINDOWS2\System32\SET3DC.tmp
C:\WINDOWS2\System32\SET3DD.tmp
C:\WINDOWS2\System32\SET3E5.tmp
C:\WINDOWS2\System32\SET3EB.tmp
C:\WINDOWS2\System32\SET3F0.tmp
C:\WINDOWS2\System32\SET3F3.tmp
C:\WINDOWS2\System32\SET3F6.tmp
C:\WINDOWS2\System32\SET3F8.tmp
C:\WINDOWS2\System32\SET3FC.tmp
C:\WINDOWS2\System32\SET3FE.tmp
C:\WINDOWS2\System32\SET3FF.tmp
C:\WINDOWS2\System32\SET400.tmp
C:\WINDOWS2\System32\SET403.tmp
C:\WINDOWS2\System32\SET404.tmp
C:\WINDOWS2\System32\SET408.tmp
C:\WINDOWS2\System32\SET409.tmp
C:\WINDOWS2\System32\SET40C.tmp
C:\WINDOWS2\System32\SET40E.tmp
C:\WINDOWS2\System32\SET413.tmp
C:\WINDOWS2\System32\SET416.tmp
C:\WINDOWS2\System32\SET41A.tmp
C:\WINDOWS2\System32\SET41C.tmp
C:\WINDOWS2\System32\SET41E.tmp
C:\WINDOWS2\System32\SET589.tmp
C:\WINDOWS2\System32\SET58F.tmp
C:\Documents and Settings\Administrateur.XPSP2-379C75017\LOCAL Settings\Temp\jre-6u15-windows-i586-iftw.exe
¤¤¤¤¤¤¤¤¤¤ Action sur les fichiers :
Quarantaine :
jre-6u15-windows-i586-iftw.exe.Kill'em
qmgr0.dat.Kill'em
qmgr1.dat.Kill'em
SET14F.tmp.Kill'em
SET150.tmp.Kill'em
SET152.tmp.Kill'em
SET154.tmp.Kill'em
SET156.tmp.Kill'em
SET15D.tmp.Kill'em
SET15E.tmp.Kill'em
SET161.tmp.Kill'em
SET166.tmp.Kill'em
SET167.tmp.Kill'em
SET168.tmp.Kill'em
SET16A.tmp.Kill'em
SET16B.tmp.Kill'em
SET16C.tmp.Kill'em
SET16D.tmp.Kill'em
SET16E.tmp.Kill'em
SET170.tmp.Kill'em
SET171.tmp.Kill'em
SET172.tmp.Kill'em
SET175.tmp.Kill'em
SET17E.tmp.Kill'em
SET181.tmp.Kill'em
SET183.tmp.Kill'em
SET185.tmp.Kill'em
SET18B.tmp.Kill'em
SET18D.tmp.Kill'em
SET18E.tmp.Kill'em
SET18F.tmp.Kill'em
SET191.tmp.Kill'em
SET196.tmp.Kill'em
SET197.tmp.Kill'em
SET198.tmp.Kill'em
SET199.tmp.Kill'em
SET19A.tmp.Kill'em
SET1A4.tmp.Kill'em
SET1A5.tmp.Kill'em
SET1A8.tmp.Kill'em
SET1AB.tmp.Kill'em
SET1AC.tmp.Kill'em
SET1B3.tmp.Kill'em
SET1B4.tmp.Kill'em
SET1B6.tmp.Kill'em
SET1B9.tmp.Kill'em
SET1BA.tmp.Kill'em
SET1C3.tmp.Kill'em
SET1C4.tmp.Kill'em
SET1C7.tmp.Kill'em
SET1C9.tmp.Kill'em
SET1CA.tmp.Kill'em
SET1CB.tmp.Kill'em
SET1CC.tmp.Kill'em
SET1CD.tmp.Kill'em
SET1DC.tmp.Kill'em
SET1E1.tmp.Kill'em
SET1E3.tmp.Kill'em
SET1E5.tmp.Kill'em
SET1E6.tmp.Kill'em
SET1E7.tmp.Kill'em
SET1E9.tmp.Kill'em
SET1EA.tmp.Kill'em
SET1EE.tmp.Kill'em
SET1EF.tmp.Kill'em
SET1F2.tmp.Kill'em
SET1F3.tmp.Kill'em
SET1F4.tmp.Kill'em
SET1FA.tmp.Kill'em
SET1FB.tmp.Kill'em
SET1FC.tmp.Kill'em
SET204.tmp.Kill'em
SET209.tmp.Kill'em
SET20A.tmp.Kill'em
SET20B.tmp.Kill'em
SET20C.tmp.Kill'em
SET20E.tmp.Kill'em
SET214.tmp.Kill'em
SET220.tmp.Kill'em
SET222.tmp.Kill'em
SET224.tmp.Kill'em
SET225.tmp.Kill'em
SET226.tmp.Kill'em
SET228.tmp.Kill'em
SET231.tmp.Kill'em
SET233.tmp.Kill'em
SET234.tmp.Kill'em
SET237.tmp.Kill'em
SET239.tmp.Kill'em
SET23C.tmp.Kill'em
SET240.tmp.Kill'em
SET241.tmp.Kill'em
SET242.tmp.Kill'em
SET244.tmp.Kill'em
SET245.tmp.Kill'em
SET24B.tmp.Kill'em
SET24E.tmp.Kill'em
SET24F.tmp.Kill'em
SET256.tmp.Kill'em
SET257.tmp.Kill'em
SET25A.tmp.Kill'em
SET25B.tmp.Kill'em
SET25C.tmp.Kill'em
SET25D.tmp.Kill'em
SET25E.tmp.Kill'em
SET260.tmp.Kill'em
SET261.tmp.Kill'em
SET262.tmp.Kill'em
SET264.tmp.Kill'em
SET265.tmp.Kill'em
SET266.tmp.Kill'em
SET26B.tmp.Kill'em
SET270.tmp.Kill'em
SET271.tmp.Kill'em
SET272.tmp.Kill'em
SET276.tmp.Kill'em
SET277.tmp.Kill'em
SET278.tmp.Kill'em
SET27A.tmp.Kill'em
SET27D.tmp.Kill'em
SET27F.tmp.Kill'em
SET280.tmp.Kill'em
SET283.tmp.Kill'em
SET284.tmp.Kill'em
SET287.tmp.Kill'em
SET28A.tmp.Kill'em
SET28B.tmp.Kill'em
SET292.tmp.Kill'em
SET297.tmp.Kill'em
SET29E.tmp.Kill'em
SET29F.tmp.Kill'em
SET2A2.tmp.Kill'em
SET2A3.tmp.Kill'em
SET2AD.tmp.Kill'em
SET2AF.tmp.Kill'em
SET2B1.tmp.Kill'em
SET2B2.tmp.Kill'em
SET2BD.tmp.Kill'em
SET2BE.tmp.Kill'em
SET2BF.tmp.Kill'em
SET2C0.tmp.Kill'em
SET2C1.tmp.Kill'em
SET2C2.tmp.Kill'em
SET2C4.tmp.Kill'em
SET2C6.tmp.Kill'em
SET2C8.tmp.Kill'em
SET2CD.tmp.Kill'em
SET2CF.tmp.Kill'em
SET2D2.tmp.Kill'em
SET2D4.tmp.Kill'em
SET2D6.tmp.Kill'em
SET2D7.tmp.Kill'em
SET2D8.tmp.Kill'em
SET2D9.tmp.Kill'em
SET2DB.tmp.Kill'em
SET2E0.tmp.Kill'em
SET2E2.tmp.Kill'em
SET2E3.tmp.Kill'em
SET2E9.tmp.Kill'em
SET2F2.tmp.Kill'em
SET2F5.tmp.Kill'em
SET2F6.tmp.Kill'em
SET2F9.tmp.Kill'em
SET301.tmp.Kill'em
SET308.tmp.Kill'em
SET30A.tmp.Kill'em
SET30F.tmp.Kill'em
SET310.tmp.Kill'em
SET312.tmp.Kill'em
SET313.tmp.Kill'em
SET315.tmp.Kill'em
SET32B.tmp.Kill'em
SET32D.tmp.Kill'em
SET32F.tmp.Kill'em
SET335.tmp.Kill'em
SET339.tmp.Kill'em
SET346.tmp.Kill'em
SET34B.tmp.Kill'em
SET34D.tmp.Kill'em
SET34E.tmp.Kill'em
SET354.tmp.Kill'em
SET358.tmp.Kill'em
SET362.tmp.Kill'em
SET366.tmp.Kill'em
SET368.tmp.Kill'em
SET369.tmp.Kill'em
SET372.tmp.Kill'em
SET376.tmp.Kill'em
SET381.tmp.Kill'em
SET391.tmp.Kill'em
SET392.tmp.Kill'em
SET3B1.tmp.Kill'em
SET3B3.tmp.Kill'em
SET3B4.tmp.Kill'em
SET3B7.tmp.Kill'em
SET3BC.tmp.Kill'em
SET3BE.tmp.Kill'em
SET3C5.tmp.Kill'em
SET3C6.tmp.Kill'em
SET3C7.tmp.Kill'em
SET3C9.tmp.Kill'em
SET3CA.tmp.Kill'em
SET3CB.tmp.Kill'em
SET3CC.tmp.Kill'em
SET3CE.tmp.Kill'em
SET3D0.tmp.Kill'em
SET3D1.tmp.Kill'em
SET3D2.tmp.Kill'em
SET3D5.tmp.Kill'em
SET3D7.tmp.Kill'em
SET3DC.tmp.Kill'em
SET3DD.tmp.Kill'em
SET3E5.tmp.Kill'em
SET3EB.tmp.Kill'em
SET3F0.tmp.Kill'em
SET3F3.tmp.Kill'em
SET3F6.tmp.Kill'em
SET3F8.tmp.Kill'em
SET3FC.tmp.Kill'em
SET3FE.tmp.Kill'em
SET3FF.tmp.Kill'em
SET400.tmp.Kill'em
SET403.tmp.Kill'em
SET404.tmp.Kill'em
SET408.tmp.Kill'em
SET409.tmp.Kill'em
SET40C.tmp.Kill'em
SET40E.tmp.Kill'em
SET413.tmp.Kill'em
SET416.tmp.Kill'em
SET41A.tmp.Kill'em
SET41C.tmp.Kill'em
SET41E.tmp.Kill'em
SET589.tmp.Kill'em
SET58F.tmp.Kill'em
_004087_.tmp.dll.Kill'em
_004110_.tmp.dll.Kill'em
_004111_.tmp.dll.Kill'em
_004112_.tmp.dll.Kill'em
_004113_.tmp.dll.Kill'em
_004120_.tmp.dll.Kill'em
_004121_.tmp.dll.Kill'em
_004122_.tmp.dll.Kill'em
_004123_.tmp.dll.Kill'em
_004125_.tmp.dll.Kill'em
_004126_.tmp.dll.Kill'em
_004129_.tmp.dll.Kill'em
_004130_.tmp.dll.Kill'em
_004132_.tmp.dll.Kill'em
_004133_.tmp.dll.Kill'em
_004134_.tmp.dll.Kill'em
_004136_.tmp.dll.Kill'em
_004138_.tmp.dll.Kill'em
_004139_.tmp.dll.Kill'em
_004140_.tmp.dll.Kill'em
_004144_.tmp.dll.Kill'em
_004145_.tmp.dll.Kill'em
_004147_.tmp.dll.Kill'em
_004150_.tmp.dll.Kill'em
_004152_.tmp.dll.Kill'em
_004153_.tmp.dll.Kill'em
_004155_.tmp.dll.Kill'em
_004156_.tmp.dll.Kill'em
_004159_.tmp.dll.Kill'em
_004160_.tmp.dll.Kill'em
_004161_.tmp.dll.Kill'em
_004162_.tmp.dll.Kill'em
_004163_.tmp.dll.Kill'em
_004168_.tmp.dll.Kill'em
_004170_.tmp.dll.Kill'em
¤¤¤¤¤¤¤¤¤¤ Verification :
===============
Path : C:\WINDOWS2\system32;C:\WINDOWS2;C:\WINDOWS2\System32\Wbem;C:\Program Files\QuickTime\QTSystem\
===============
¤¤¤¤¤¤¤¤¤¤ Fichiers et dossiers presents :
¤¤¤¤¤¤¤¤¤¤ Clés de registre Presentes :
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Setup.exe
¤¤¤¤¤¤¤¤¤¤ C:\WINDOWS2\Prefetch :
Layout.ini
NTOSBOOT-B00DFAAD.pf
¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤( EOF )¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤
User : Administrateur () # XPSP2-379C75017
Update on 29/10/2009 by g3n-h@ckm@n ::::: 18.30
Start at: 14:12:08 | 06.11.2009
Contact : g3n-h@ckm@n sur CCM
Intel(R) Celeron(R) CPU 2.93GHz
Microsoft Windows XP Professionnel (5.1.2600 32-bit) # Service Pack 3
Internet Explorer 8.0.6001.18702
Windows Firewall Status : Enabled
AV : AntiVir Desktop 9.0.1.30 [ (!) Disabled | Updated ]
A:\ -> Lecteur de disquettes 3 ½ pouces
C:\ -> Disque fixe local | 58.59 Go (1.11 Go free) | NTFS
D:\ -> Disque CD-ROM
E:\ -> Disque fixe local | 17.73 Go (7.73 Go free) [Nouveau nom] | NTFS
¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤ Processus en cours
C:\WINDOWS2\System32\smss.exe 152
C:\WINDOWS2\system32\csrss.exe 200
C:\WINDOWS2\system32\winlogon.exe 224
C:\WINDOWS2\system32\services.exe 268
C:\WINDOWS2\system32\lsass.exe 280
C:\WINDOWS2\system32\svchost.exe 432
C:\WINDOWS2\system32\svchost.exe 492
C:\WINDOWS2\system32\svchost.exe 552
C:\WINDOWS2\Explorer.EXE 836
C:\WINDOWS2\system32\wbem\wmiprvse.exe 944
C:\Documents and Settings\Administrateur.XPSP2-379C75017\Bureau\List_Killem.exe 1132
C:\WINDOWS2\system32\cmd.exe 1144
C:\Documents and Settings\Administrateur.XPSP2-379C75017\Local Settings\Temp\1.tmp\pv.exe 1260
Fichiers analysés :
=================
¤¤¤¤¤¤¤¤¤¤ Fichiers et dossiers presents :
"C:\Documents and Settings\All Users.WINDOWS2\Application Data\Microsoft\Network\Downloader\qmgr0.dat"
"C:\Documents and Settings\All Users.WINDOWS2\Application Data\Microsoft\Network\Downloader\qmgr1.dat"
C:\WINDOWS2\System32\_004110_.tmp.dll
C:\WINDOWS2\System32\_004111_.tmp.dll
C:\WINDOWS2\System32\_004112_.tmp.dll
C:\WINDOWS2\System32\_004113_.tmp.dll
C:\WINDOWS2\System32\_004120_.tmp.dll
C:\WINDOWS2\System32\_004121_.tmp.dll
C:\WINDOWS2\System32\_004122_.tmp.dll
C:\WINDOWS2\System32\_004123_.tmp.dll
C:\WINDOWS2\System32\_004125_.tmp.dll
C:\WINDOWS2\System32\_004126_.tmp.dll
C:\WINDOWS2\System32\_004129_.tmp.dll
C:\WINDOWS2\System32\_004130_.tmp.dll
C:\WINDOWS2\System32\_004132_.tmp.dll
C:\WINDOWS2\System32\_004133_.tmp.dll
C:\WINDOWS2\System32\_004134_.tmp.dll
C:\WINDOWS2\System32\_004136_.tmp.dll
C:\WINDOWS2\System32\_004138_.tmp.dll
C:\WINDOWS2\System32\_004139_.tmp.dll
C:\WINDOWS2\System32\_004140_.tmp.dll
C:\WINDOWS2\System32\_004144_.tmp.dll
C:\WINDOWS2\System32\_004145_.tmp.dll
C:\WINDOWS2\System32\_004147_.tmp.dll
C:\WINDOWS2\System32\_004150_.tmp.dll
C:\WINDOWS2\System32\_004152_.tmp.dll
C:\WINDOWS2\System32\_004153_.tmp.dll
C:\WINDOWS2\System32\_004155_.tmp.dll
C:\WINDOWS2\System32\_004156_.tmp.dll
C:\WINDOWS2\System32\_004159_.tmp.dll
C:\WINDOWS2\System32\_004160_.tmp.dll
C:\WINDOWS2\System32\_004161_.tmp.dll
C:\WINDOWS2\System32\_004162_.tmp.dll
C:\WINDOWS2\System32\_004163_.tmp.dll
C:\WINDOWS2\System32\_004168_.tmp.dll
C:\WINDOWS2\System32\_004170_.tmp.dll
C:\WINDOWS2\System32\drivers\_004087_.tmp.dll
C:\WINDOWS2\System32\SET14F.tmp
C:\WINDOWS2\System32\SET150.tmp
C:\WINDOWS2\System32\SET152.tmp
C:\WINDOWS2\System32\SET154.tmp
C:\WINDOWS2\System32\SET156.tmp
C:\WINDOWS2\System32\SET15D.tmp
C:\WINDOWS2\System32\SET15E.tmp
C:\WINDOWS2\System32\SET161.tmp
C:\WINDOWS2\System32\SET166.tmp
C:\WINDOWS2\System32\SET167.tmp
C:\WINDOWS2\System32\SET168.tmp
C:\WINDOWS2\System32\SET16A.tmp
C:\WINDOWS2\System32\SET16B.tmp
C:\WINDOWS2\System32\SET16C.tmp
C:\WINDOWS2\System32\SET16D.tmp
C:\WINDOWS2\System32\SET16E.tmp
C:\WINDOWS2\System32\SET170.tmp
C:\WINDOWS2\System32\SET171.tmp
C:\WINDOWS2\System32\SET172.tmp
C:\WINDOWS2\System32\SET175.tmp
C:\WINDOWS2\System32\SET17E.tmp
C:\WINDOWS2\System32\SET181.tmp
C:\WINDOWS2\System32\SET183.tmp
C:\WINDOWS2\System32\SET185.tmp
C:\WINDOWS2\System32\SET18B.tmp
C:\WINDOWS2\System32\SET18D.tmp
C:\WINDOWS2\System32\SET18E.tmp
C:\WINDOWS2\System32\SET18F.tmp
C:\WINDOWS2\System32\SET191.tmp
C:\WINDOWS2\System32\SET196.tmp
C:\WINDOWS2\System32\SET197.tmp
C:\WINDOWS2\System32\SET198.tmp
C:\WINDOWS2\System32\SET199.tmp
C:\WINDOWS2\System32\SET19A.tmp
C:\WINDOWS2\System32\SET1A4.tmp
C:\WINDOWS2\System32\SET1A5.tmp
C:\WINDOWS2\System32\SET1A8.tmp
C:\WINDOWS2\System32\SET1AB.tmp
C:\WINDOWS2\System32\SET1AC.tmp
C:\WINDOWS2\System32\SET1B3.tmp
C:\WINDOWS2\System32\SET1B4.tmp
C:\WINDOWS2\System32\SET1B6.tmp
C:\WINDOWS2\System32\SET1B9.tmp
C:\WINDOWS2\System32\SET1BA.tmp
C:\WINDOWS2\System32\SET1C3.tmp
C:\WINDOWS2\System32\SET1C4.tmp
C:\WINDOWS2\System32\SET1C7.tmp
C:\WINDOWS2\System32\SET1C9.tmp
C:\WINDOWS2\System32\SET1CA.tmp
C:\WINDOWS2\System32\SET1CB.tmp
C:\WINDOWS2\System32\SET1CC.tmp
C:\WINDOWS2\System32\SET1CD.tmp
C:\WINDOWS2\System32\SET1DC.tmp
C:\WINDOWS2\System32\SET1E1.tmp
C:\WINDOWS2\System32\SET1E3.tmp
C:\WINDOWS2\System32\SET1E5.tmp
C:\WINDOWS2\System32\SET1E6.tmp
C:\WINDOWS2\System32\SET1E7.tmp
C:\WINDOWS2\System32\SET1E9.tmp
C:\WINDOWS2\System32\SET1EA.tmp
C:\WINDOWS2\System32\SET1EE.tmp
C:\WINDOWS2\System32\SET1EF.tmp
C:\WINDOWS2\System32\SET1F2.tmp
C:\WINDOWS2\System32\SET1F3.tmp
C:\WINDOWS2\System32\SET1F4.tmp
C:\WINDOWS2\System32\SET1FA.tmp
C:\WINDOWS2\System32\SET1FB.tmp
C:\WINDOWS2\System32\SET1FC.tmp
C:\WINDOWS2\System32\SET204.tmp
C:\WINDOWS2\System32\SET209.tmp
C:\WINDOWS2\System32\SET20A.tmp
C:\WINDOWS2\System32\SET20B.tmp
C:\WINDOWS2\System32\SET20C.tmp
C:\WINDOWS2\System32\SET20E.tmp
C:\WINDOWS2\System32\SET214.tmp
C:\WINDOWS2\System32\SET220.tmp
C:\WINDOWS2\System32\SET222.tmp
C:\WINDOWS2\System32\SET224.tmp
C:\WINDOWS2\System32\SET225.tmp
C:\WINDOWS2\System32\SET226.tmp
C:\WINDOWS2\System32\SET228.tmp
C:\WINDOWS2\System32\SET231.tmp
C:\WINDOWS2\System32\SET233.tmp
C:\WINDOWS2\System32\SET234.tmp
C:\WINDOWS2\System32\SET237.tmp
C:\WINDOWS2\System32\SET239.tmp
C:\WINDOWS2\System32\SET23C.tmp
C:\WINDOWS2\System32\SET240.tmp
C:\WINDOWS2\System32\SET241.tmp
C:\WINDOWS2\System32\SET242.tmp
C:\WINDOWS2\System32\SET244.tmp
C:\WINDOWS2\System32\SET245.tmp
C:\WINDOWS2\System32\SET24B.tmp
C:\WINDOWS2\System32\SET24E.tmp
C:\WINDOWS2\System32\SET24F.tmp
C:\WINDOWS2\System32\SET256.tmp
C:\WINDOWS2\System32\SET257.tmp
C:\WINDOWS2\System32\SET25A.tmp
C:\WINDOWS2\System32\SET25B.tmp
C:\WINDOWS2\System32\SET25C.tmp
C:\WINDOWS2\System32\SET25D.tmp
C:\WINDOWS2\System32\SET25E.tmp
C:\WINDOWS2\System32\SET260.tmp
C:\WINDOWS2\System32\SET261.tmp
C:\WINDOWS2\System32\SET262.tmp
C:\WINDOWS2\System32\SET264.tmp
C:\WINDOWS2\System32\SET265.tmp
C:\WINDOWS2\System32\SET266.tmp
C:\WINDOWS2\System32\SET26B.tmp
C:\WINDOWS2\System32\SET270.tmp
C:\WINDOWS2\System32\SET271.tmp
C:\WINDOWS2\System32\SET272.tmp
C:\WINDOWS2\System32\SET276.tmp
C:\WINDOWS2\System32\SET277.tmp
C:\WINDOWS2\System32\SET278.tmp
C:\WINDOWS2\System32\SET27A.tmp
C:\WINDOWS2\System32\SET27D.tmp
C:\WINDOWS2\System32\SET27F.tmp
C:\WINDOWS2\System32\SET280.tmp
C:\WINDOWS2\System32\SET283.tmp
C:\WINDOWS2\System32\SET284.tmp
C:\WINDOWS2\System32\SET287.tmp
C:\WINDOWS2\System32\SET28A.tmp
C:\WINDOWS2\System32\SET28B.tmp
C:\WINDOWS2\System32\SET292.tmp
C:\WINDOWS2\System32\SET297.tmp
C:\WINDOWS2\System32\SET29E.tmp
C:\WINDOWS2\System32\SET29F.tmp
C:\WINDOWS2\System32\SET2A2.tmp
C:\WINDOWS2\System32\SET2A3.tmp
C:\WINDOWS2\System32\SET2AD.tmp
C:\WINDOWS2\System32\SET2AF.tmp
C:\WINDOWS2\System32\SET2B1.tmp
C:\WINDOWS2\System32\SET2B2.tmp
C:\WINDOWS2\System32\SET2BD.tmp
C:\WINDOWS2\System32\SET2BE.tmp
C:\WINDOWS2\System32\SET2BF.tmp
C:\WINDOWS2\System32\SET2C0.tmp
C:\WINDOWS2\System32\SET2C1.tmp
C:\WINDOWS2\System32\SET2C2.tmp
C:\WINDOWS2\System32\SET2C4.tmp
C:\WINDOWS2\System32\SET2C6.tmp
C:\WINDOWS2\System32\SET2C8.tmp
C:\WINDOWS2\System32\SET2CD.tmp
C:\WINDOWS2\System32\SET2CF.tmp
C:\WINDOWS2\System32\SET2D2.tmp
C:\WINDOWS2\System32\SET2D4.tmp
C:\WINDOWS2\System32\SET2D6.tmp
C:\WINDOWS2\System32\SET2D7.tmp
C:\WINDOWS2\System32\SET2D8.tmp
C:\WINDOWS2\System32\SET2D9.tmp
C:\WINDOWS2\System32\SET2DB.tmp
C:\WINDOWS2\System32\SET2E0.tmp
C:\WINDOWS2\System32\SET2E2.tmp
C:\WINDOWS2\System32\SET2E3.tmp
C:\WINDOWS2\System32\SET2E9.tmp
C:\WINDOWS2\System32\SET2F2.tmp
C:\WINDOWS2\System32\SET2F5.tmp
C:\WINDOWS2\System32\SET2F6.tmp
C:\WINDOWS2\System32\SET2F9.tmp
C:\WINDOWS2\System32\SET301.tmp
C:\WINDOWS2\System32\SET308.tmp
C:\WINDOWS2\System32\SET30A.tmp
C:\WINDOWS2\System32\SET30F.tmp
C:\WINDOWS2\System32\SET310.tmp
C:\WINDOWS2\System32\SET312.tmp
C:\WINDOWS2\System32\SET313.tmp
C:\WINDOWS2\System32\SET315.tmp
C:\WINDOWS2\System32\SET32B.tmp
C:\WINDOWS2\System32\SET32D.tmp
C:\WINDOWS2\System32\SET32F.tmp
C:\WINDOWS2\System32\SET335.tmp
C:\WINDOWS2\System32\SET339.tmp
C:\WINDOWS2\System32\SET346.tmp
C:\WINDOWS2\System32\SET34B.tmp
C:\WINDOWS2\System32\SET34D.tmp
C:\WINDOWS2\System32\SET34E.tmp
C:\WINDOWS2\System32\SET354.tmp
C:\WINDOWS2\System32\SET358.tmp
C:\WINDOWS2\System32\SET362.tmp
C:\WINDOWS2\System32\SET366.tmp
C:\WINDOWS2\System32\SET368.tmp
C:\WINDOWS2\System32\SET369.tmp
C:\WINDOWS2\System32\SET372.tmp
C:\WINDOWS2\System32\SET376.tmp
C:\WINDOWS2\System32\SET381.tmp
C:\WINDOWS2\System32\SET391.tmp
C:\WINDOWS2\System32\SET392.tmp
C:\WINDOWS2\System32\SET3B1.tmp
C:\WINDOWS2\System32\SET3B3.tmp
C:\WINDOWS2\System32\SET3B4.tmp
C:\WINDOWS2\System32\SET3B7.tmp
C:\WINDOWS2\System32\SET3BC.tmp
C:\WINDOWS2\System32\SET3BE.tmp
C:\WINDOWS2\System32\SET3C5.tmp
C:\WINDOWS2\System32\SET3C6.tmp
C:\WINDOWS2\System32\SET3C7.tmp
C:\WINDOWS2\System32\SET3C9.tmp
C:\WINDOWS2\System32\SET3CA.tmp
C:\WINDOWS2\System32\SET3CB.tmp
C:\WINDOWS2\System32\SET3CC.tmp
C:\WINDOWS2\System32\SET3CE.tmp
C:\WINDOWS2\System32\SET3D0.tmp
C:\WINDOWS2\System32\SET3D1.tmp
C:\WINDOWS2\System32\SET3D2.tmp
C:\WINDOWS2\System32\SET3D5.tmp
C:\WINDOWS2\System32\SET3D7.tmp
C:\WINDOWS2\System32\SET3DC.tmp
C:\WINDOWS2\System32\SET3DD.tmp
C:\WINDOWS2\System32\SET3E5.tmp
C:\WINDOWS2\System32\SET3EB.tmp
C:\WINDOWS2\System32\SET3F0.tmp
C:\WINDOWS2\System32\SET3F3.tmp
C:\WINDOWS2\System32\SET3F6.tmp
C:\WINDOWS2\System32\SET3F8.tmp
C:\WINDOWS2\System32\SET3FC.tmp
C:\WINDOWS2\System32\SET3FE.tmp
C:\WINDOWS2\System32\SET3FF.tmp
C:\WINDOWS2\System32\SET400.tmp
C:\WINDOWS2\System32\SET403.tmp
C:\WINDOWS2\System32\SET404.tmp
C:\WINDOWS2\System32\SET408.tmp
C:\WINDOWS2\System32\SET409.tmp
C:\WINDOWS2\System32\SET40C.tmp
C:\WINDOWS2\System32\SET40E.tmp
C:\WINDOWS2\System32\SET413.tmp
C:\WINDOWS2\System32\SET416.tmp
C:\WINDOWS2\System32\SET41A.tmp
C:\WINDOWS2\System32\SET41C.tmp
C:\WINDOWS2\System32\SET41E.tmp
C:\WINDOWS2\System32\SET589.tmp
C:\WINDOWS2\System32\SET58F.tmp
C:\Documents and Settings\Administrateur.XPSP2-379C75017\LOCAL Settings\Temp\jre-6u15-windows-i586-iftw.exe
¤¤¤¤¤¤¤¤¤¤ Action sur les fichiers :
Quarantaine :
jre-6u15-windows-i586-iftw.exe.Kill'em
qmgr0.dat.Kill'em
qmgr1.dat.Kill'em
SET14F.tmp.Kill'em
SET150.tmp.Kill'em
SET152.tmp.Kill'em
SET154.tmp.Kill'em
SET156.tmp.Kill'em
SET15D.tmp.Kill'em
SET15E.tmp.Kill'em
SET161.tmp.Kill'em
SET166.tmp.Kill'em
SET167.tmp.Kill'em
SET168.tmp.Kill'em
SET16A.tmp.Kill'em
SET16B.tmp.Kill'em
SET16C.tmp.Kill'em
SET16D.tmp.Kill'em
SET16E.tmp.Kill'em
SET170.tmp.Kill'em
SET171.tmp.Kill'em
SET172.tmp.Kill'em
SET175.tmp.Kill'em
SET17E.tmp.Kill'em
SET181.tmp.Kill'em
SET183.tmp.Kill'em
SET185.tmp.Kill'em
SET18B.tmp.Kill'em
SET18D.tmp.Kill'em
SET18E.tmp.Kill'em
SET18F.tmp.Kill'em
SET191.tmp.Kill'em
SET196.tmp.Kill'em
SET197.tmp.Kill'em
SET198.tmp.Kill'em
SET199.tmp.Kill'em
SET19A.tmp.Kill'em
SET1A4.tmp.Kill'em
SET1A5.tmp.Kill'em
SET1A8.tmp.Kill'em
SET1AB.tmp.Kill'em
SET1AC.tmp.Kill'em
SET1B3.tmp.Kill'em
SET1B4.tmp.Kill'em
SET1B6.tmp.Kill'em
SET1B9.tmp.Kill'em
SET1BA.tmp.Kill'em
SET1C3.tmp.Kill'em
SET1C4.tmp.Kill'em
SET1C7.tmp.Kill'em
SET1C9.tmp.Kill'em
SET1CA.tmp.Kill'em
SET1CB.tmp.Kill'em
SET1CC.tmp.Kill'em
SET1CD.tmp.Kill'em
SET1DC.tmp.Kill'em
SET1E1.tmp.Kill'em
SET1E3.tmp.Kill'em
SET1E5.tmp.Kill'em
SET1E6.tmp.Kill'em
SET1E7.tmp.Kill'em
SET1E9.tmp.Kill'em
SET1EA.tmp.Kill'em
SET1EE.tmp.Kill'em
SET1EF.tmp.Kill'em
SET1F2.tmp.Kill'em
SET1F3.tmp.Kill'em
SET1F4.tmp.Kill'em
SET1FA.tmp.Kill'em
SET1FB.tmp.Kill'em
SET1FC.tmp.Kill'em
SET204.tmp.Kill'em
SET209.tmp.Kill'em
SET20A.tmp.Kill'em
SET20B.tmp.Kill'em
SET20C.tmp.Kill'em
SET20E.tmp.Kill'em
SET214.tmp.Kill'em
SET220.tmp.Kill'em
SET222.tmp.Kill'em
SET224.tmp.Kill'em
SET225.tmp.Kill'em
SET226.tmp.Kill'em
SET228.tmp.Kill'em
SET231.tmp.Kill'em
SET233.tmp.Kill'em
SET234.tmp.Kill'em
SET237.tmp.Kill'em
SET239.tmp.Kill'em
SET23C.tmp.Kill'em
SET240.tmp.Kill'em
SET241.tmp.Kill'em
SET242.tmp.Kill'em
SET244.tmp.Kill'em
SET245.tmp.Kill'em
SET24B.tmp.Kill'em
SET24E.tmp.Kill'em
SET24F.tmp.Kill'em
SET256.tmp.Kill'em
SET257.tmp.Kill'em
SET25A.tmp.Kill'em
SET25B.tmp.Kill'em
SET25C.tmp.Kill'em
SET25D.tmp.Kill'em
SET25E.tmp.Kill'em
SET260.tmp.Kill'em
SET261.tmp.Kill'em
SET262.tmp.Kill'em
SET264.tmp.Kill'em
SET265.tmp.Kill'em
SET266.tmp.Kill'em
SET26B.tmp.Kill'em
SET270.tmp.Kill'em
SET271.tmp.Kill'em
SET272.tmp.Kill'em
SET276.tmp.Kill'em
SET277.tmp.Kill'em
SET278.tmp.Kill'em
SET27A.tmp.Kill'em
SET27D.tmp.Kill'em
SET27F.tmp.Kill'em
SET280.tmp.Kill'em
SET283.tmp.Kill'em
SET284.tmp.Kill'em
SET287.tmp.Kill'em
SET28A.tmp.Kill'em
SET28B.tmp.Kill'em
SET292.tmp.Kill'em
SET297.tmp.Kill'em
SET29E.tmp.Kill'em
SET29F.tmp.Kill'em
SET2A2.tmp.Kill'em
SET2A3.tmp.Kill'em
SET2AD.tmp.Kill'em
SET2AF.tmp.Kill'em
SET2B1.tmp.Kill'em
SET2B2.tmp.Kill'em
SET2BD.tmp.Kill'em
SET2BE.tmp.Kill'em
SET2BF.tmp.Kill'em
SET2C0.tmp.Kill'em
SET2C1.tmp.Kill'em
SET2C2.tmp.Kill'em
SET2C4.tmp.Kill'em
SET2C6.tmp.Kill'em
SET2C8.tmp.Kill'em
SET2CD.tmp.Kill'em
SET2CF.tmp.Kill'em
SET2D2.tmp.Kill'em
SET2D4.tmp.Kill'em
SET2D6.tmp.Kill'em
SET2D7.tmp.Kill'em
SET2D8.tmp.Kill'em
SET2D9.tmp.Kill'em
SET2DB.tmp.Kill'em
SET2E0.tmp.Kill'em
SET2E2.tmp.Kill'em
SET2E3.tmp.Kill'em
SET2E9.tmp.Kill'em
SET2F2.tmp.Kill'em
SET2F5.tmp.Kill'em
SET2F6.tmp.Kill'em
SET2F9.tmp.Kill'em
SET301.tmp.Kill'em
SET308.tmp.Kill'em
SET30A.tmp.Kill'em
SET30F.tmp.Kill'em
SET310.tmp.Kill'em
SET312.tmp.Kill'em
SET313.tmp.Kill'em
SET315.tmp.Kill'em
SET32B.tmp.Kill'em
SET32D.tmp.Kill'em
SET32F.tmp.Kill'em
SET335.tmp.Kill'em
SET339.tmp.Kill'em
SET346.tmp.Kill'em
SET34B.tmp.Kill'em
SET34D.tmp.Kill'em
SET34E.tmp.Kill'em
SET354.tmp.Kill'em
SET358.tmp.Kill'em
SET362.tmp.Kill'em
SET366.tmp.Kill'em
SET368.tmp.Kill'em
SET369.tmp.Kill'em
SET372.tmp.Kill'em
SET376.tmp.Kill'em
SET381.tmp.Kill'em
SET391.tmp.Kill'em
SET392.tmp.Kill'em
SET3B1.tmp.Kill'em
SET3B3.tmp.Kill'em
SET3B4.tmp.Kill'em
SET3B7.tmp.Kill'em
SET3BC.tmp.Kill'em
SET3BE.tmp.Kill'em
SET3C5.tmp.Kill'em
SET3C6.tmp.Kill'em
SET3C7.tmp.Kill'em
SET3C9.tmp.Kill'em
SET3CA.tmp.Kill'em
SET3CB.tmp.Kill'em
SET3CC.tmp.Kill'em
SET3CE.tmp.Kill'em
SET3D0.tmp.Kill'em
SET3D1.tmp.Kill'em
SET3D2.tmp.Kill'em
SET3D5.tmp.Kill'em
SET3D7.tmp.Kill'em
SET3DC.tmp.Kill'em
SET3DD.tmp.Kill'em
SET3E5.tmp.Kill'em
SET3EB.tmp.Kill'em
SET3F0.tmp.Kill'em
SET3F3.tmp.Kill'em
SET3F6.tmp.Kill'em
SET3F8.tmp.Kill'em
SET3FC.tmp.Kill'em
SET3FE.tmp.Kill'em
SET3FF.tmp.Kill'em
SET400.tmp.Kill'em
SET403.tmp.Kill'em
SET404.tmp.Kill'em
SET408.tmp.Kill'em
SET409.tmp.Kill'em
SET40C.tmp.Kill'em
SET40E.tmp.Kill'em
SET413.tmp.Kill'em
SET416.tmp.Kill'em
SET41A.tmp.Kill'em
SET41C.tmp.Kill'em
SET41E.tmp.Kill'em
SET589.tmp.Kill'em
SET58F.tmp.Kill'em
_004087_.tmp.dll.Kill'em
_004110_.tmp.dll.Kill'em
_004111_.tmp.dll.Kill'em
_004112_.tmp.dll.Kill'em
_004113_.tmp.dll.Kill'em
_004120_.tmp.dll.Kill'em
_004121_.tmp.dll.Kill'em
_004122_.tmp.dll.Kill'em
_004123_.tmp.dll.Kill'em
_004125_.tmp.dll.Kill'em
_004126_.tmp.dll.Kill'em
_004129_.tmp.dll.Kill'em
_004130_.tmp.dll.Kill'em
_004132_.tmp.dll.Kill'em
_004133_.tmp.dll.Kill'em
_004134_.tmp.dll.Kill'em
_004136_.tmp.dll.Kill'em
_004138_.tmp.dll.Kill'em
_004139_.tmp.dll.Kill'em
_004140_.tmp.dll.Kill'em
_004144_.tmp.dll.Kill'em
_004145_.tmp.dll.Kill'em
_004147_.tmp.dll.Kill'em
_004150_.tmp.dll.Kill'em
_004152_.tmp.dll.Kill'em
_004153_.tmp.dll.Kill'em
_004155_.tmp.dll.Kill'em
_004156_.tmp.dll.Kill'em
_004159_.tmp.dll.Kill'em
_004160_.tmp.dll.Kill'em
_004161_.tmp.dll.Kill'em
_004162_.tmp.dll.Kill'em
_004163_.tmp.dll.Kill'em
_004168_.tmp.dll.Kill'em
_004170_.tmp.dll.Kill'em
¤¤¤¤¤¤¤¤¤¤ Verification :
===============
Path : C:\WINDOWS2\system32;C:\WINDOWS2;C:\WINDOWS2\System32\Wbem;C:\Program Files\QuickTime\QTSystem\
===============
¤¤¤¤¤¤¤¤¤¤ Fichiers et dossiers presents :
¤¤¤¤¤¤¤¤¤¤ Clés de registre Presentes :
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Setup.exe
¤¤¤¤¤¤¤¤¤¤ C:\WINDOWS2\Prefetch :
Layout.ini
NTOSBOOT-B00DFAAD.pf
¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤( EOF )¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤
parfait :
(salut Al)
Télécharge OTL de OLDTimer
▶ enregistre le sur ton Bureau.
▶ Double clic sur OTL.exe pour le lancer.
▶ Coche les 2 cases Lop et Purity
▶ Coche la case devant scan all users
▶ règle-le sur "60 Days"
▶ dans la colonne de gauche , mets tout sur all
▶Clic sur Run Scan.
A la fin du scan, le Bloc-Notes va s'ouvrir avec le rapport (OTL.txt).
Ce fichier est sur ton Bureau (en général C:\Documents and settings\le_nom_de_ta_session\OTL.txt)
▶▶▶ NE LE POSTE PAS SUR LE FORUM
Pour me le transmettre clique sur ce lien : https://www.cjoint.com/
▶ Clique sur Parcourir et cherche le fichier ci-dessus.
▶ Clique sur Ouvrir.
▶ Clique sur "Cliquez ici pour déposer le fichier".
Un lien de cette forme :
http://www.cijoint.fr/cjlink.php?file=cjge368/cijSKAP5fU.txt
est ajouté dans la page.
▶ Copie ce lien dans ta réponse.
Tu feras la meme chose avec le "Extra.txt".
(salut Al)
Télécharge OTL de OLDTimer
▶ enregistre le sur ton Bureau.
▶ Double clic sur OTL.exe pour le lancer.
▶ Coche les 2 cases Lop et Purity
▶ Coche la case devant scan all users
▶ règle-le sur "60 Days"
▶ dans la colonne de gauche , mets tout sur all
▶Clic sur Run Scan.
A la fin du scan, le Bloc-Notes va s'ouvrir avec le rapport (OTL.txt).
Ce fichier est sur ton Bureau (en général C:\Documents and settings\le_nom_de_ta_session\OTL.txt)
▶▶▶ NE LE POSTE PAS SUR LE FORUM
Pour me le transmettre clique sur ce lien : https://www.cjoint.com/
▶ Clique sur Parcourir et cherche le fichier ci-dessus.
▶ Clique sur Ouvrir.
▶ Clique sur "Cliquez ici pour déposer le fichier".
Un lien de cette forme :
http://www.cijoint.fr/cjlink.php?file=cjge368/cijSKAP5fU.txt
est ajouté dans la page.
▶ Copie ce lien dans ta réponse.
Tu feras la meme chose avec le "Extra.txt".
Oui j'ai tout sélectionné mais il n'y a rien qui change en bas ça marque Scanning process C:\Windows2... mais toujours rien
Pouvez-vous aller au mode sans échec?
oui puisqu'il a effectué la suppresssion de List&Kill'em dans ce mode........;)
faut lire !
oui puisqu'il a effectué la suppresssion de List&Kill'em dans ce mode........;)
faut lire !
Re
Justement lorsque je disais que rien ne se passait c'était de cette barre que je parlais, j'ai laissé faire pendant 4-5 heures mais la barre n'avançait pas. Je vais essayé de faire la 2 en mode sans échec
Justement lorsque je disais que rien ne se passait c'était de cette barre que je parlais, j'ai laissé faire pendant 4-5 heures mais la barre n'avançait pas. Je vais essayé de faire la 2 en mode sans échec
Ouh là 20 h :o bon ba vivement que c'est le samedi aujourd'hui je pourrai garder le pc ouvert pendant une vingtaine d'heures lol
Pour répondre à faguoren dsl de répondre en retard mais avec ce pc il faut de la patiente ^^ donc oui jusqu'à maintenant j'ai toujours pu aller en mode sans échec ce qui doit être normal non ? mais comme je ne suis pas une pro du pc je ne sais pas c'est quoi qui bug autant la seule chose que je sache c'est que ça devient lassant d'utiliser un pc à moitié mort ^^
Si vous ne pouvez pas démarrer en mode sans échec, vous vérifiez si votre RAM Shou est endommagé.