A voir également:
- Cheval de troie & tracking cookie
- Supprimer cookie - Guide
- 400 bad request request header or cookie too large ✓ - Forum Réseaux sociaux
- Antivirus cheval de troie gratuit - Télécharger - Antivirus & Antimalwares
- Tracking colis - Guide
- 400-Bad Request avec Firefox - Forum Windows
1 réponse
essai ca
Télécharge Superantispyware (SAS)
https://www.superantispyware.com/superantispywarefreevspro.html
une fois l'installation et la mise a jour effectuée
clic sur « scanner votre ordinateur »
coche scan complète
et suivant
Le rapport :
"Preferences" "Statistics/journaux de bord".
double-clique sur le dernier SUPERAntiSpyware Scan Log.
Télécharge Superantispyware (SAS)
https://www.superantispyware.com/superantispywarefreevspro.html
une fois l'installation et la mise a jour effectuée
clic sur « scanner votre ordinateur »
coche scan complète
et suivant
Le rapport :
"Preferences" "Statistics/journaux de bord".
double-clique sur le dernier SUPERAntiSpyware Scan Log.
SUPERAntiSpyware Scan Log
https://www.superantispyware.com/
Generated 12/21/2009 at 01:23 PM
Application Version : 4.32.1000
Core Rules Database Version : 4397
Trace Rules Database Version: 2232
Scan type : Complete Scan
Total Scan Time : 00:32:45
Memory items scanned : 520
Memory threats detected : 0
Registry items scanned : 5519
Registry threats detected : 13
File items scanned : 20867
File threats detected : 32
Adware.Tracking Cookie
C:\Documents and Settings\!Benoit\Cookies\!benoit@atdmt[2].txt
C:\Documents and Settings\!Benoit\Cookies\!benoit@smartadserver[1].txt
C:\Documents and Settings\!Benoit\Cookies\!benoit@aimfar.solution.weborama[1].txt
C:\Documents and Settings\!Benoit\Cookies\!benoit@xiti[1].txt
C:\Documents and Settings\!Benoit\Cookies\!benoit@weborama[1].txt
C:\Documents and Settings\!Benoit\Cookies\!benoit@ad.proxad[2].txt
C:\Documents and Settings\NetworkService\Cookies\system@ads.0pb[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@247realmedia[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@smartadserver[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@a.websponsors[2].txt
C:\Documents and Settings\NetworkService\Cookies\system@ads.audxch[2].txt
C:\Documents and Settings\NetworkService\Cookies\system@adtech[2].txt
C:\Documents and Settings\NetworkService\Cookies\system@adserving.aedgency[2].txt
C:\Documents and Settings\NetworkService\Cookies\system@virginmobile.solution.weborama[2].txt
C:\Documents and Settings\NetworkService\Cookies\system@nestlecereals.solution.weborama[2].txt
C:\Documents and Settings\NetworkService\Cookies\system@weborama[2].txt
C:\Documents and Settings\NetworkService\Cookies\system@media6degrees[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@tracking.publicidees[2].txt
C:\Documents and Settings\NetworkService\Cookies\system@ad.zanox[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@bs.serving-sys[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@ad.yieldmanager[2].txt
C:\Documents and Settings\NetworkService\Cookies\system@content.yieldmanager[2].txt
C:\Documents and Settings\NetworkService\Cookies\system@content.yieldmanager[3].txt
C:\Documents and Settings\NetworkService\Cookies\system@zanox[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@pro-market[2].txt
C:\Documents and Settings\NetworkService\Cookies\system@xiti[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@serving-sys[2].txt
C:\Documents and Settings\NetworkService\Cookies\system@mmedia.t134[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@t.bbtrack[2].txt
C:\Documents and Settings\NetworkService\Cookies\system@adsrv.clickvol[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@exoclick[1].txt
Trojan.Dropper/Win-NV
HKLM\SYSTEM\CurrentControlSet\Services\SSHNAS
HKLM\SYSTEM\CurrentControlSet\Services\SSHNAS#Type
HKLM\SYSTEM\CurrentControlSet\Services\SSHNAS#Start
HKLM\SYSTEM\CurrentControlSet\Services\SSHNAS#ErrorControl
HKLM\SYSTEM\CurrentControlSet\Services\SSHNAS#ImagePath
HKLM\SYSTEM\CurrentControlSet\Services\SSHNAS#DisplayName
HKLM\SYSTEM\CurrentControlSet\Services\SSHNAS#ObjectName
HKLM\SYSTEM\CurrentControlSet\Services\SSHNAS\Parameters
HKLM\SYSTEM\CurrentControlSet\Services\SSHNAS\Parameters#ServiceDll
HKLM\SYSTEM\CurrentControlSet\Services\SSHNAS\Enum
HKLM\SYSTEM\CurrentControlSet\Services\SSHNAS\Enum#0
HKLM\SYSTEM\CurrentControlSet\Services\SSHNAS\Enum#Count
HKLM\SYSTEM\CurrentControlSet\Services\SSHNAS\Enum#NextInstance
Trojan.Agent/Gen-NameSpy
C:\SYSTEM VOLUME INFORMATION\_RESTORE{E4E412DC-0D07-4561-A5F0-C67831DE53DA}\RP258\A0057982.EXE