Probleme worm: plantage fake Svchost.exe

Résolu/Fermé
Paul - 17 nov. 2010 à 18:08
 Utilisateur anonyme - 20 nov. 2010 à 14:24
Bonjour,
voila mon probleme: j'ai recu un worm qui exécute un processus appelé Svchost.exe (avec la majuscule: c'est donc un faux) et qui n'arrete pas de planter. Il marche avec un autre processus appelé ping.exe (encore un faux car il apparait sous "Administrator").
Je suis donc floodé par des "envoyez le rapport d'erreur" bla bla. J'ai desactivé tout ca pour que je puisse continuer a utiliser mon pc... mais ca pompe quand meme plus de 3GB de ram, ca ne se ressent pas dans l'utilisation du pc mais quand meme, faut pas exagérer !
J'ai fais deux scans, un avec Malwarebyte et l'autre avec Avira... rien de rien.

A l'aide :p

Cordialement.


A voir également:

11 réponses

?????????????????????????????????????????????????????????????????????

bonjour , plus concrêt :


▶ Télécharge ici : Ad-remover sur ton bureau :


▶ Déconnecte toi et ferme toutes applications en cours !

si tu as XP => double clique
si tu as Vista ou windows 7 => clic droit "executer en tant que...."


▶ sur "Ad-R.exe" pour lancer l'installation et laisse les paramètres d'installation par défaut .

▶ clique le raccourci Ad-remover qui est sur ton bureau pour lancer l'outil .

▶ Au menu principal choisis "option Nettoyer" et tape sur [entrée] .

▶ Laisse travailler l'outil et ne touche à rien ...

▶ Poste le rapport qui apparait à la fin , sur le forum ...

( Le rapport est sauvegardé aussi sous C:\Ad-report.log )
( CTRL+A Pour tout sélectionner , CTRL+C pour copier et CTRL+V pour coller )

▶ Note : "Process.exe", une composante de l'outil, est détecté par certains antivirus (AntiVir, Dr.Web, Kaspersky Anti-Virus) comme étant un RiskTool.
Il ne s'agit pas d'un virus, mais d'un utilitaire destiné à mettre fin à des processus.
Mis entre de mauvaises mains, cet utilitaire pourrait arrêter des logiciels de sécurité (Antivirus, Firewall...) d'où l'alerte émise par ces antivirus.

¤¤¤¤¤¤?G3?-?@¢??@?(TM)©®?¤¤¤¤¤¤
1
Utilisateur anonyme
17 nov. 2010 à 18:41
Ouf, Zorro est arrivé, juste à temps ;-) Merci de t'occuper de ça Gen :-)
0
Utilisateur anonyme
17 nov. 2010 à 18:52
oui lol

ensuite je ferai péter les clés RUN ^^
0
Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 18:29:50, on 17/11/2010
Platform: Windows XP SP3 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP3 (6.00.2900.5512)
Boot mode: Normal

Running processes:
C:\WINDOWS.2\System32\smss.exe
C:\WINDOWS.2\system32\winlogon.exe
C:\WINDOWS.2\system32\services.exe
C:\WINDOWS.2\system32\lsass.exe
C:\WINDOWS.2\system32\Ati2evxx.exe
C:\WINDOWS.2\system32\svchost.exe
C:\WINDOWS.2\System32\svchost.exe
C:\WINDOWS.2\system32\Ati2evxx.exe
C:\WINDOWS.2\system32\spoolsv.exe
C:\Program Files\Avira\AntiVir Desktop\sched.exe
C:\WINDOWS.2\Explorer.EXE
C:\Program Files\TortoiseSVN\bin\TSVNCache.exe
C:\Program Files\ATI Technologies\ATI.ACE\Core-Static\MOM.exe
C:\WINDOWS.2\RTHDCPL.EXE
C:\Program Files\iTunes\iTunesHelper.exe
C:\Program Files\Common Files\Java\Java Update\jusched.exe
C:\Program Files\Avira\AntiVir Desktop\avgnt.exe
C:\Program Files\DNA\btdna.exe
C:\Program Files\ATI Technologies\ATI.ACE\Core-Static\ccc.exe
C:\Program Files\Avira\AntiVir Desktop\avguard.exe
C:\Program Files\Common Files\Apple\Mobile Device Support\AppleMobileDeviceService.exe
C:\Program Files\LogMeIn Hamachi\hamachi-2.exe
C:\Program Files\Java\jre6\bin\jqs.exe
C:\Program Files\Avira\AntiVir Desktop\avshadow.exe
C:\WINDOWS.2\system32\svchost.exe
C:\Program Files\Mozilla Firefox\firefox.exe
C:\Program Files\iPod\bin\iPodService.exe
C:\WINDOWS.2\system32\wscntfy.exe
C:\WINDOWS.2\system32\dllhost.exe
C:\WINDOWS.2\system32\javaw.exe
C:\Program Files\Mozilla Firefox\plugin-container.exe
C:\Documents and Settings\Paul\Desktop\Téléchargements\HiJackThis.exe
C:\WINDOWS.2\system32\cmd.exe
C:\WINDOWS.2\system32\ping.exe

R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://y.lo.st
O2 - BHO: AcroIEHelperStub - {18DF081C-E8AD-4283-A596-FA578C2EBDC3} - C:\Program Files\Common Files\Adobe\Acrobat\ActiveX\AcroIEHelperShim.dll
O2 - BHO: (no name) - {5C255C8A-E604-49b4-9D64-90988571CECB} - (no file)
O2 - BHO: Programme d'aide de l'Assistant de connexion Windows Live - {9030D464-4C02-4ABF-8ECC-5164760863C6} - C:\Program Files\Common Files\Microsoft Shared\Windows Live\WindowsLiveLogin.dll
O2 - BHO: EOBHO - {C10DC1F4-CCDF-4224-A24D-B23AFC3573C8} - C:\Program Files\EoRezo\EoRezoBHO.dll
O2 - BHO: Java(tm) Plug-In 2 SSV Helper - {DBC80044-A445-435b-BC74-9C25C1C588A9} - C:\Program Files\Java\jre6\bin\jp2ssv.dll
O2 - BHO: JQSIEStartDetectorImpl - {E7E6F031-17CE-4C07-BC86-EABFE594F69C} - C:\Program Files\Java\jre6\lib\deploy\jqs\ie\jqs_plugin.dll
O4 - HKLM\..\Run: [StartCCC] "C:\Program Files\ATI Technologies\ATI.ACE\Core-Static\CLIStart.exe" MSRun
O4 - HKLM\..\Run: [ATICustomerCare] "C:\Program Files\ATI\ATICustomerCare\ATICustomerCare.exe"
O4 - HKLM\..\Run: [RTHDCPL] RTHDCPL.EXE
O4 - HKLM\..\Run: [Alcmtr] ALCMTR.EXE
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
O4 - HKLM\..\Run: [iTunesHelper] "C:\Program Files\iTunes\iTunesHelper.exe"
O4 - HKLM\..\Run: [SunJavaUpdateSched] "C:\Program Files\Common Files\Java\Java Update\jusched.exe"
O4 - HKLM\..\Run: [Adobe Reader Speed Launcher] "C:\Program Files\Adobe\Reader 9.0\Reader\Reader_sl.exe"
O4 - HKLM\..\Run: [Adobe ARM] "C:\Program Files\Common Files\Adobe\ARM\1.0\AdobeARM.exe"
O4 - HKLM\..\Run: [LogMeIn Hamachi Ui] "C:\Program Files\LogMeIn Hamachi\hamachi-2-ui.exe" --auto-start
O4 - HKLM\..\Run: [avgnt] "C:\Program Files\Avira\AntiVir Desktop\avgnt.exe" /min
O4 - HKLM\..\Run: [SoftwareHelper] C:\Documents and Settings\Paul\Application Data\EoRezo\EoRezo\SoftwareUpdateHP.exe
O4 - HKLM\..\Run: [HKLM] C:\WINDOWS.2\WinDir\Svchost.exe
O4 - HKCU\..\Run: [BitTorrent DNA] "C:\Program Files\DNA\btdna.exe"
O4 - HKCU\..\Run: [msnmsgr] "C:\Program Files\Windows Live\Messenger\msnmsgr.exe" /background
O4 - HKCU\..\Run: [HKCU] C:\WINDOWS.2\WinDir\Svchost.exe
O4 - HKLM\..\Policies\Explorer\Run: [Policies] C:\WINDOWS.2\WinDir\Svchost.exe
O4 - HKCU\..\Policies\Explorer\Run: [Policies] C:\WINDOWS.2\WinDir\Svchost.exe
O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS.2\Network Diagnostic\xpnetdiag.exe
O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS.2\Network Diagnostic\xpnetdiag.exe
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O16 - DPF: {0D41B8C5-2599-4893-8183-00195EC8D5F9} (asusTek_sysctrl Class) - http://support.asus.com/common/asusTek_sys_ctrl.cab
O16 - DPF: {867E13F2-7F31-44FB-AC97-CD38E0DC46EF} ("Ma-Config.com control) - http://fichiers.touslesdrivers.com/maconfig/MaConfig_4_2_1_1.cab
O23 - Service: Avira AntiVir Planificateur (AntiVirSchedulerService) - Avira GmbH - C:\Program Files\Avira\AntiVir Desktop\sched.exe
O23 - Service: Avira AntiVir Guard (AntiVirService) - Avira GmbH - C:\Program Files\Avira\AntiVir Desktop\avguard.exe
O23 - Service: Apple Mobile Device - Apple Inc. - C:\Program Files\Common Files\Apple\Mobile Device Support\AppleMobileDeviceService.exe
O23 - Service: Ati HotKey Poller - ATI Technologies Inc. - C:\WINDOWS.2\system32\Ati2evxx.exe
O23 - Service: ATI Smart - Unknown owner - C:\WINDOWS.2\system32\ati2sgag.exe
O23 - Service: LogMeIn Hamachi 2.0 Tunneling Engine (Hamachi2Svc) - LogMeIn Inc. - C:\Program Files\LogMeIn Hamachi\hamachi-2.exe
O23 - Service: Service de l'iPod (iPod Service) - Apple Inc. - C:\Program Files\iPod\bin\iPodService.exe
O23 - Service: Java Quick Starter (JavaQuickStarterService) - Sun Microsystems, Inc. - C:\Program Files\Java\jre6\bin\jqs.exe
O23 - Service: Ma-Config Service (maconfservice) - CybelSoft - C:\Program Files\ma-config.com\maconfservice.exe
O23 - Service: TabDiscover Service - Unknown owner - C:\Documents and Settings\All Users.WINDOWS.2\Application Data\TabDiscover\tabdiscover147.exe (file missing)
0
Utilisateur anonyme
17 nov. 2010 à 18:35
Salut

J'ai déplacé ta question dans le forum Virus/Sécurité, c'est beaucoup plus approprié que le forum Windows pour ce genre de problème.

Bonne chance pour la suite.
0
======= REPORT FROM AD-REMOVER 2.0.0.2,B | ONLY XP/VISTA/7 =======

Updated by TeamXscript on 11/11/10 at 11:40
Contact: AdRemover[DOT]contact[AT]gmail[DOT]com
website: http://www.teamxscript.org

C:\Program Files\Ad-Remover\main.exe (SCAN [1]) -> Launched at 20:41:15 on 17/11/2010, Normal boot

Microsoft Windows XP Professional Service Pack 3 (X86)
Paul@COMPUTER_1 ( )

============== SEARCH ==============


File found: C:\Documents and Settings\Paul\Application Data\Mozilla\FireFox\Profiles\racvqsho.default\searchplugins\askcom.xml
Folder found: C:\Documents and Settings\Paul\Application Data\Mozilla\FireFox\Profiles\racvqsho.default\conduit
File found: C:\Documents and Settings\Paul\Application Data\Mozilla\FireFox\Profiles\racvqsho.default\searchplugins\conduit.xml
File found: C:\Documents and Settings\Administrator\Application Data\Mozilla\FireFox\Profiles\btpjcnir.default\searchplugins\conduit.xml
Folder found: C:\Program Files\Conduit
Folder found: C:\Documents and Settings\All Users.WINDOWS.2\Start Menu\Programs\FileSubmit
Folder found: C:\Program Files\FileSubmit
Folder found: C:\Program Files\findbasic
Folder found: C:\Documents and Settings\Paul\Application Data\EoRezo
Folder found: C:\Documents and Settings\Paul\Local Settings\Application Data\EoRezo
Folder found: C:\Program Files\EoRezo

-- File opened: C:\Documents and Settings\Paul\Application Data\Mozilla\FireFox\Profiles\racvqsho.default\Prefs.js --
Line found: user_pref("CT2680363.SearchEngine", "Search||hxxp://search.conduit.com/Results.aspx?q=UCM_SEARCH_TER...
Line found: user_pref("CT2680363.SearchFromAddressBarUrl", "hxxp://search.conduit.com/ResultsExt.aspx?ctid=CT268...
Line found: user_pref("browser.search.defaultengine", "Ask.com");
Line found: user_pref("browser.search.defaultenginename", "Ask.com");
Line found: user_pref("browser.search.defaulturl", "hxxp://search.conduit.com/ResultsExt.aspx?ctid=CT2680363&Sea...
Line found: user_pref("browser.search.order.1", "Ask.com");
Line found: user_pref("browser.startup.homepage", "hxxp://y.lo.st");
-- File closed --


-- File opened: C:\Documents and Settings\Administrator\Application Data\Mozilla\FireFox\Profiles\btpjcnir.default\Prefs.js --
Line found: user_pref("CT2405280.SearchEngine", "Search||hxxp://search.conduit.com/Results.aspx?q=UCM_SEARCH_TER...
Line found: user_pref("CT2405280.SearchFromAddressBarUrl", "hxxp://search.conduit.com/ResultsExt.aspx?ctid=CT240...
Line found: user_pref("CT2405280.myStuffSearchUrl", "hxxp://search.conduit.com/Results.aspx?q=SEARCH_TERM&ctid=E...
Line found: user_pref("browser.search.defaulturl", "hxxp://search.conduit.com/ResultsExt.aspx?ctid=CT2405280&Sea...
-- File closed --


Key found: HKLM\Software\Classes\CLSID\{601ac3dc-786a-4eb0-bf40-ee3521e70bfb}
Key found: HKLM\Software\Classes\CLSID\{72b3882f-453a-4633-aac9-8c3dced62aff}
Key found: HKLM\Software\Classes\CLSID\{C10DC1F4-CCDF-4224-A24D-B23AFC3573C8}
Key found: HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{C10DC1F4-CCDF-4224-A24D-B23AFC3573C8}
Key found: HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{C10DC1F4-CCDF-4224-A24D-B23AFC3573C8}
Key found: HKLM\Software\Classes\Interface\{DF76E9B7-35EC-46FC-AF56-5B79DED9D64F}
Key found: HKLM\Software\Classes\TypeLib\{18AF7201-4F14-4BCF-93FE-45617CF259FF}
Key found: HKLM\Software\Classes\EoEngineBHO.EOBHO
Key found: HKLM\Software\Classes\EoEngineBHO.EOBHO.1
Key found: HKLM\Software\Classes\AppID\EoEngineBHO.DLL
Key found: HKLM\Software\Classes\AppID\{AFBB7970-789A-4264-BA70-E8127DECE400}
Key found: HKLM\Software\EoRezo
Key found: HKLM\Software\Conduit
Key found: HKCU\Software\EoRezo
Key found: HKCU\Software\Conduit
Key found: HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MenuOrder\Start Menu2\Programs\FileSubmit
Key found: HKCU\Software\Microsoft\Internet Explorer\SearchScopes\{171DEBEB-C3D4-40b7-AC73-056A5EBA4A7E}
Key found: HKLM\Software\Microsoft\Windows\CurrentVersion\Uninstall\EoRezo_is1

Value found: HKLM\Software\Microsoft\Windows\CurrentVersion\Run|Softwarehelper


============== ADDITIONNAL SCAN ==============

** Mozilla Firefox Version [3.6.12 (fr)] **

-- C:\Documents and Settings\Paul\Application Data\Mozilla\FireFox\Profiles\racvqsho.default\Prefs.js --
browser.download.dir, C:\\Documents and Settings\\Paul\\Desktop\\Téléchargements
browser.download.lastDir, C:\\Documents and Settings\\Paul\\Desktop
browser.search.defaultenginename, Ask.com
browser.search.defaulturl, hxxp://search.conduit.com/ResultsExt.aspx?ctid=CT2680363&SearchSource=3&q={searchTerms}
browser.search.selectedEngine, Google
browser.startup.homepage, hxxp://y.lo.st
browser.startup.homepage_override.mstone, rv:1.9.2.12

-- C:\Documents and Settings\Administrator\Application Data\Mozilla\FireFox\Profiles\btpjcnir.default\Prefs.js --
browser.download.lastDir, C:\\Documents and Settings\\Administrator\\Desktop
browser.search.defaulturl, hxxp://search.conduit.com/ResultsExt.aspx?ctid=CT2405280&SearchSource=3&q={searchTerms}
browser.startup.homepage, hxxp://www.google.fr/firefox?client=firefox-a&rls=org.mozilla:fr:official
browser.startup.homepage_override.mstone, rv:1.9.1.11
browser.search.defaultenginename, Jookz
browser.search.selectedEngine, Jookz
browser.search.defaultenginename, Jookz
browser.search.selectedEngine, Jookz
browser.search.defaultenginename, Jookz
browser.search.selectedEngine, Jookz
browser.search.defaultenginename, Jookz
browser.search.selectedEngine, Jookz
browser.search.defaultenginename, Jookz
browser.search.selectedEngine, Jookz
browser.search.defaultenginename, Jookz
browser.search.selectedEngine, Jookz
browser.search.defaultenginename, Jookz
browser.search.selectedEngine, Jookz
browser.search.defaultenginename, Jookz
browser.search.selectedEngine, Jookz
browser.search.defaultenginename, Jookz
browser.search.selectedEngine, Jookz
browser.search.defaultenginename, Jookz
browser.search.selectedEngine, Jookz
browser.search.defaultenginename, Jookz
browser.search.selectedEngine, Jookz
browser.search.defaultenginename, Jookz
browser.search.selectedEngine, Jookz
browser.search.defaultenginename, Jookz
browser.search.selectedEngine, Jookz
browser.search.defaultenginename, Jookz
browser.search.selectedEngine, Jookz
browser.search.defaultenginename, Jookz
browser.search.selectedEngine, Jookz
browser.search.defaultenginename, Jookz
browser.search.selectedEngine, Jookz
browser.search.defaultenginename, Jookz
browser.search.selectedEngine, Jookz
browser.search.defaultenginename, Jookz
browser.search.selectedEngine, Jookz
browser.search.defaultenginename, Jookz
browser.search.selectedEngine, Jookz
browser.search.defaultenginename, Jookz
browser.search.selectedEngine, Jookz
browser.search.defaultenginename, Jookz
browser.search.selectedEngine, Jookz
browser.search.defaultenginename, Jookz
browser.search.selectedEngine, Jookz
browser.search.defaultenginename, Jookz
browser.search.selectedEngine, Jookz
browser.search.defaultenginename, Jookz
browser.search.selectedEngine, Jookz
browser.search.defaultenginename, Jookz
browser.search.selectedEngine, Jookz
browser.search.defaultenginename, Jookz
browser.search.selectedEngine, Jookz
browser.search.defaultenginename, Jookz
browser.search.selectedEngine, Jookz
browser.search.defaultenginename, Jookz
browser.search.selectedEngine, Jookz
browser.search.defaultenginename, Jookz
browser.search.selectedEngine, Jookz
browser.search.defaultenginename, Jookz
browser.search.selectedEngine, Jookz
browser.search.defaultenginename, Jookz
browser.search.selectedEngine, Jookz
browser.search.defaultenginename, Jookz
browser.search.selectedEngine, Jookz
browser.search.defaultenginename, Jookz
browser.search.selectedEngine, Jookz
browser.search.defaultenginename, Jookz
browser.search.selectedEngine, Jookz
browser.search.defaultenginename, Jookz
browser.search.selectedEngine, Jookz
browser.search.defaultenginename, Jookz
browser.search.selectedEngine, Jookz
browser.search.defaultenginename, Jookz
browser.search.selectedEngine, Jookz
browser.search.defaultenginename, Jookz
browser.search.selectedEngine, Jookz
browser.search.defaultenginename, Jookz
browser.search.selectedEngine, Jookz
browser.search.defaultenginename, Jookz
browser.search.selectedEngine, Jookz
browser.search.defaultenginename, Jookz
browser.search.selectedEngine, Jookz
browser.search.defaultenginename, Jookz
browser.search.selectedEngine, Jookz
browser.search.defaultenginename, Jookz
browser.search.selectedEngine, Jookz
browser.search.defaultenginename, Jookz
browser.search.selectedEngine, Jookz
browser.search.defaultenginename, Jookz
browser.search.selectedEngine, Jookz
browser.search.defaultenginename, Jookz
browser.search.selectedEngine, Jookz
browser.search.defaultenginename, Jookz
browser.search.selectedEngine, Jookz
browser.search.defaultenginename, Jookz
browser.search.selectedEngine, Jookz
browser.search.defaultenginename, Jookz
browser.search.selectedEngine, Jookz
browser.search.defaultenginename, Jookz
browser.search.selectedEngine, Jookz
browser.search.defaultenginename, Jookz
browser.search.selectedEngine, Jookz
browser.search.defaultenginename, Jookz
browser.search.selectedEngine, Jookz
browser.search.defaultenginename, Jookz
browser.search.selectedEngine, Jookz
browser.search.defaultenginename, Jookz
browser.search.selectedEngine, Jookz
browser.search.defaultenginename, Jookz
browser.search.selectedEngine, Jookz
browser.search.defaultenginename, Jookz
browser.search.selectedEngine, Jookz
browser.search.defaultenginename, Jookz
browser.search.selectedEngine, Jookz
browser.search.defaultenginename, Jookz
browser.search.selectedEngine, Jookz
browser.search.defaultenginename, Jookz
browser.search.selectedEngine, Jookz
browser.search.defaultenginename, Jookz
browser.search.selectedEngine, Jookz
browser.search.defaultenginename, Jookz
browser.search.selectedEngine, Jookz
browser.search.defaultenginename, Jookz
browser.search.selectedEngine, Jookz
browser.search.defaultenginename, Jookz
browser.search.selectedEngine, Jookz
browser.search.defaultenginename, Jookz
browser.search.selectedEngine, Jookz
browser.search.defaultenginename, Jookz
browser.search.selectedEngine, Jookz
browser.search.defaultenginename, Jookz
browser.search.selectedEngine, Jookz
browser.search.defaultenginename, Jookz
browser.search.selectedEngine, Jookz
browser.search.defaultenginename, Jookz
browser.search.selectedEngine, Jookz
browser.search.defaultenginename, Jookz
browser.search.selectedEngine, Jookz
browser.search.defaultenginename, Jookz
browser.search.selectedEngine, Jookz
browser.search.defaultenginename, Jookz
browser.search.selectedEngine, Jookz
browser.search.defaultenginename, Jookz
browser.search.selectedEngine, Jookz
browser.search.defaultenginename, Jookz
browser.search.selectedEngine, Jookz
browser.search.defaultenginename, Jookz
browser.search.selectedEngine, Jookz
browser.search.defaultenginename, Jookz
browser.search.selectedEngine, Jookz
browser.search.defaultenginename, Jookz
browser.search.selectedEngine, Jookz
browser.search.defaultenginename, Jookz
browser.search.selectedEngine, Jookz
browser.search.defaultenginename, Jookz
browser.search.selectedEngine, Jookz
browser.search.defaultenginename, Jookz
browser.search.selectedEngine, Jookz
browser.search.defaultenginename, Jookz
browser.search.selectedEngine, Jookz
browser.search.defaultenginename, Jookz
browser.search.selectedEngine, Jookz
browser.search.defaultenginename, Jookz
browser.search.selectedEngine, Jookz
browser.search.defaultenginename, Jookz
browser.search.selectedEngine, Jookz

========================================

** Internet Explorer Version [6.0.2900.5512] **

[HKCU\Software\Microsoft\Internet Explorer\Main]
Do404Search: 0x01000000
Local Page: C:\WINDOWS.2\system32\blank.htm
Search Page: hxxp://www.microsoft.com/isapi/redir.dll?prd=ie&ar=iesearch
Show_ToolBar: yes
Start Page: hxxp://www.msn.com/
Use Search Asst: no

[HKLM\Software\Microsoft\Internet Explorer\Main]
Default_Page_URL: hxxp://www.microsoft.com/isapi/redir.dll?prd=ie&pver=6&ar=msnhome
Default_Search_URL: hxxp://www.microsoft.com/isapi/redir.dll?prd=ie&ar=iesearch
Delete_Temp_Files_On_Exit: yes
Local Page: C:\WINDOWS.2\system32\blank.htm
Search Page: hxxp://www.microsoft.com/isapi/redir.dll?prd=ie&ar=iesearch
Start Page: hxxp://www.microsoft.com/isapi/redir.dll?prd={SUB_PRD}&clcid={SUB_CLSID}&pver={SUB_PVER}&ar=home

[HKLM\Software\Microsoft\Internet Explorer\ABOUTURLS]
Tabs: hxxp://y.lo.st
Blank: res://mshtml.dll/blank.htm

========================================

C:\Program Files\Ad-Remover\Quarantine: 0 File(s)
C:\Program Files\Ad-Remover\Backup: 1 File(s)

C:\Ad-Report-SCAN[1].txt - 17/11/2010 (4789 Byte(s))

End at: 20:41:46, 17/11/2010

============== E.O.F ==============
0

Vous n’avez pas trouvé la réponse que vous recherchez ?

Posez votre question
Utilisateur anonyme
17 nov. 2010 à 20:53
j'avais dit supprimer......
0
======= REPORT FROM AD-REMOVER 2.0.0.2,B | ONLY XP/VISTA/7 =======

Updated by TeamXscript on 11/11/10 at 11:40
Contact: AdRemover[DOT]contact[AT]gmail[DOT]com
website: http://www.teamxscript.org

C:\Program Files\Ad-Remover\main.exe (CLEAN [1]) -> Launched at 20:56:50 on 17/11/2010, Safeboot mode

Microsoft Windows XP Professional Service Pack 3 (X86)
Paul@COMPUTER_1 ( )

============== ACTION(S) ==============


File deleted: C:\Documents and Settings\Paul\Application Data\Mozilla\FireFox\Profiles\racvqsho.default\searchplugins\askcom.xml
Folder deleted: C:\Documents and Settings\Paul\Application Data\Mozilla\FireFox\Profiles\racvqsho.default\conduit
File deleted: C:\Documents and Settings\Paul\Application Data\Mozilla\FireFox\Profiles\racvqsho.default\searchplugins\conduit.xml
File deleted: C:\Documents and Settings\Administrator\Application Data\Mozilla\FireFox\Profiles\btpjcnir.default\searchplugins\conduit.xml
Folder deleted: C:\Program Files\Conduit
Folder deleted: C:\Documents and Settings\All Users.WINDOWS.2\Start Menu\Programs\FileSubmit
Folder deleted: C:\Program Files\FileSubmit
Folder deleted: C:\Program Files\findbasic
Folder deleted: C:\Documents and Settings\Paul\Application Data\EoRezo
Folder deleted: C:\Documents and Settings\Paul\Local Settings\Application Data\EoRezo
Folder deleted: C:\Program Files\EoRezo

(!) -- Temporary files deleted.


-- File opened: C:\Documents and Settings\Paul\Application Data\Mozilla\FireFox\Profiles\racvqsho.default\Prefs.js --
Line deleted:
Line deleted:
Line deleted: user_pref("CT2680363.SearchEngine", "Search||hxxp://search.conduit.com/Results.aspx?q=UCM_SEARCH_TER...
Line deleted: user_pref("CT2680363.SearchFromAddressBarUrl", "hxxp://search.conduit.com/ResultsExt.aspx?ctid=CT268...
Line deleted: user_pref("browser.search.defaultengine", "Ask.com");
Line deleted: user_pref("browser.search.defaultenginename", "Ask.com");
Line deleted: user_pref("browser.search.defaulturl", "hxxp://search.conduit.com/ResultsExt.aspx?ctid=CT2680363&Sea...
Line deleted: user_pref("browser.search.order.1", "Ask.com");
Line deleted: user_pref("browser.startup.homepage", "hxxp://y.lo.st");
-- File closed --


-- File opened: C:\Documents and Settings\Administrator\Application Data\Mozilla\FireFox\Profiles\btpjcnir.default\Prefs.js --
Line deleted:
Line deleted:
Line deleted: user_pref("CT2405280.SearchEngine", "Search||hxxp://search.conduit.com/Results.aspx?q=UCM_SEARCH_TER...
Line deleted: user_pref("CT2405280.SearchFromAddressBarUrl", "hxxp://search.conduit.com/ResultsExt.aspx?ctid=CT240...
Line deleted: user_pref("CT2405280.myStuffSearchUrl", "hxxp://search.conduit.com/Results.aspx?q=SEARCH_TERM&ctid=E...
Line deleted: user_pref("browser.search.defaulturl", "hxxp://search.conduit.com/ResultsExt.aspx?ctid=CT2405280&Sea...
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
Line deleted:
-- File closed --


Key deleted: HKLM\Software\Classes\CLSID\{601ac3dc-786a-4eb0-bf40-ee3521e70bfb}
Key deleted: HKLM\Software\Classes\CLSID\{72b3882f-453a-4633-aac9-8c3dced62aff}
Key deleted: HKLM\Software\Classes\CLSID\{C10DC1F4-CCDF-4224-A24D-B23AFC3573C8}
Key deleted: HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{C10DC1F4-CCDF-4224-A24D-B23AFC3573C8}
Key deleted: HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{C10DC1F4-CCDF-4224-A24D-B23AFC3573C8}
Key deleted: HKLM\Software\Classes\Interface\{DF76E9B7-35EC-46FC-AF56-5B79DED9D64F}
Key deleted: HKLM\Software\Classes\TypeLib\{18AF7201-4F14-4BCF-93FE-45617CF259FF}
Key deleted: HKLM\Software\Classes\EoEngineBHO.EOBHO
Key deleted: HKLM\Software\Classes\EoEngineBHO.EOBHO.1
Key deleted: HKLM\Software\Classes\AppID\EoEngineBHO.DLL
Key deleted: HKLM\Software\Classes\AppID\{AFBB7970-789A-4264-BA70-E8127DECE400}
Key deleted: HKLM\Software\EoRezo
Key deleted: HKLM\Software\Conduit
Key deleted: HKCU\Software\EoRezo
Key deleted: HKCU\Software\Conduit
Key deleted: HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MenuOrder\Start Menu2\Programs\FileSubmit
Key deleted: HKCU\Software\Microsoft\Internet Explorer\SearchScopes\{171DEBEB-C3D4-40b7-AC73-056A5EBA4A7E}
Key deleted: HKLM\Software\Microsoft\Windows\CurrentVersion\Uninstall\EoRezo_is1

Value deleted: HKLM\Software\Microsoft\Windows\CurrentVersion\Run|Softwarehelper


============== ADDITIONNAL SCAN ==============

** Mozilla Firefox Version [3.6.12 (fr)] **

-- C:\Documents and Settings\Paul\Application Data\Mozilla\FireFox\Profiles\racvqsho.default\Prefs.js --
browser.download.dir, C:\\Documents and Settings\\Paul\\Desktop\\Téléchargements
browser.download.lastDir, C:\\Documents and Settings\\Paul\\Desktop
browser.search.selectedEngine, Google
browser.startup.homepage_override.mstone, rv:1.9.2.12

-- C:\Documents and Settings\Administrator\Application Data\Mozilla\FireFox\Profiles\btpjcnir.default\Prefs.js --
browser.download.lastDir, C:\\Documents and Settings\\Administrator\\Desktop
browser.startup.homepage, hxxp://www.google.fr/firefox?client=firefox-a&rls=org.mozilla:fr:official
browser.startup.homepage_override.mstone, rv:1.9.1.11
browser.search.defaultenginename, Jookz
browser.search.selectedEngine, Jookz
browser.search.defaultenginename, Jookz
browser.search.selectedEngine, Jookz
browser.search.defaultenginename, Jookz
browser.search.selectedEngine, Jookz
browser.search.defaultenginename, Jookz
browser.search.selectedEngine, Jookz
browser.search.defaultenginename, Jookz
browser.search.selectedEngine, Jookz
browser.search.defaultenginename, Jookz
browser.search.selectedEngine, Jookz
browser.search.defaultenginename, Jookz
browser.search.selectedEngine, Jookz
browser.search.defaultenginename, Jookz
browser.search.selectedEngine, Jookz
browser.search.defaultenginename, Jookz
browser.search.selectedEngine, Jookz
browser.search.defaultenginename, Jookz
browser.search.selectedEngine, Jookz
browser.search.defaultenginename, Jookz
browser.search.selectedEngine, Jookz
browser.search.defaultenginename, Jookz
browser.search.selectedEngine, Jookz
browser.search.defaultenginename, Jookz
browser.search.selectedEngine, Jookz
browser.search.defaultenginename, Jookz
browser.search.selectedEngine, Jookz
browser.search.defaultenginename, Jookz
browser.search.selectedEngine, Jookz
browser.search.defaultenginename, Jookz
browser.search.selectedEngine, Jookz
browser.search.defaultenginename, Jookz
browser.search.selectedEngine, Jookz
browser.search.defaultenginename, Jookz
browser.search.selectedEngine, Jookz
browser.search.defaultenginename, Jookz
browser.search.selectedEngine, Jookz
browser.search.defaultenginename, Jookz
browser.search.selectedEngine, Jookz
browser.search.defaultenginename, Jookz
browser.search.selectedEngine, Jookz
browser.search.defaultenginename, Jookz
browser.search.selectedEngine, Jookz
browser.search.defaultenginename, Jookz
browser.search.selectedEngine, Jookz
browser.search.defaultenginename, Jookz
browser.search.selectedEngine, Jookz
browser.search.defaultenginename, Jookz
browser.search.selectedEngine, Jookz
browser.search.defaultenginename, Jookz
browser.search.selectedEngine, Jookz
browser.search.defaultenginename, Jookz
browser.search.selectedEngine, Jookz
browser.search.defaultenginename, Jookz
browser.search.selectedEngine, Jookz
browser.search.defaultenginename, Jookz
browser.search.selectedEngine, Jookz
browser.search.defaultenginename, Jookz
browser.search.selectedEngine, Jookz
browser.search.defaultenginename, Jookz
browser.search.selectedEngine, Jookz
browser.search.defaultenginename, Jookz
browser.search.selectedEngine, Jookz
browser.search.defaultenginename, Jookz
browser.search.selectedEngine, Jookz
browser.search.defaultenginename, Jookz
browser.search.selectedEngine, Jookz
browser.search.defaultenginename, Jookz
browser.search.selectedEngine, Jookz
browser.search.defaultenginename, Jookz
browser.search.selectedEngine, Jookz
browser.search.defaultenginename, Jookz
browser.search.selectedEngine, Jookz
browser.search.defaultenginename, Jookz
browser.search.selectedEngine, Jookz
browser.search.defaultenginename, Jookz
browser.search.selectedEngine, Jookz
browser.search.defaultenginename, Jookz
browser.search.selectedEngine, Jookz
browser.search.defaultenginename, Jookz
browser.search.selectedEngine, Jookz
browser.search.defaultenginename, Jookz
browser.search.selectedEngine, Jookz
browser.search.defaultenginename, Jookz
browser.search.selectedEngine, Jookz
browser.search.defaultenginename, Jookz
browser.search.selectedEngine, Jookz
browser.search.defaultenginename, Jookz
browser.search.selectedEngine, Jookz
browser.search.defaultenginename, Jookz
browser.search.selectedEngine, Jookz
browser.search.defaultenginename, Jookz
browser.search.selectedEngine, Jookz
browser.search.defaultenginename, Jookz
browser.search.selectedEngine, Jookz
browser.search.defaultenginename, Jookz
browser.search.selectedEngine, Jookz
browser.search.defaultenginename, Jookz
browser.search.selectedEngine, Jookz
browser.search.defaultenginename, Jookz
browser.search.selectedEngine, Jookz
browser.search.defaultenginename, Jookz
browser.search.selectedEngine, Jookz
browser.search.defaultenginename, Jookz
browser.search.selectedEngine, Jookz
browser.search.defaultenginename, Jookz
browser.search.selectedEngine, Jookz
browser.search.defaultenginename, Jookz
browser.search.selectedEngine, Jookz
browser.search.defaultenginename, Jookz
browser.search.selectedEngine, Jookz
browser.search.defaultenginename, Jookz
browser.search.selectedEngine, Jookz
browser.search.defaultenginename, Jookz
browser.search.selectedEngine, Jookz
browser.search.defaultenginename, Jookz
browser.search.selectedEngine, Jookz
browser.search.defaultenginename, Jookz
browser.search.selectedEngine, Jookz
browser.search.defaultenginename, Jookz
browser.search.selectedEngine, Jookz
browser.search.defaultenginename, Jookz
browser.search.selectedEngine, Jookz
browser.search.defaultenginename, Jookz
browser.search.selectedEngine, Jookz
browser.search.defaultenginename, Jookz
browser.search.selectedEngine, Jookz
browser.search.defaultenginename, Jookz
browser.search.selectedEngine, Jookz
browser.search.defaultenginename, Jookz
browser.search.selectedEngine, Jookz
browser.search.defaultenginename, Jookz
browser.search.selectedEngine, Jookz
browser.search.defaultenginename, Jookz
browser.search.selectedEngine, Jookz
browser.search.defaultenginename, Jookz
browser.search.selectedEngine, Jookz
browser.search.defaultenginename, Jookz
browser.search.selectedEngine, Jookz
browser.search.defaultenginename, Jookz
browser.search.selectedEngine, Jookz
browser.search.defaultenginename, Jookz
browser.search.selectedEngine, Jookz
browser.search.defaultenginename, Jookz
browser.search.selectedEngine, Jookz
browser.search.defaultenginename, Jookz
browser.search.selectedEngine, Jookz
browser.search.defaultenginename, Jookz
browser.search.selectedEngine, Jookz
browser.search.defaultenginename, Jookz
browser.search.selectedEngine, Jookz
browser.search.defaultenginename, Jookz
browser.search.selectedEngine, Jookz
browser.search.defaultenginename, Jookz
browser.search.selectedEngine, Jookz
browser.search.defaultenginename, Jookz
browser.search.selectedEngine, Jookz
browser.search.defaultenginename, Jookz
browser.search.selectedEngine, Jookz
browser.search.defaultenginename, Jookz
browser.search.selectedEngine, Jookz
browser.search.defaultenginename, Jookz
browser.search.selectedEngine, Jookz
browser.search.defaultenginename, Jookz
browser.search.selectedEngine, Jookz

========================================

** Internet Explorer Version [6.0.2900.5512] **

[HKCU\Software\Microsoft\Internet Explorer\Main]
Default_Page_URL: hxxp://www.microsoft.com/isapi/redir.dll?prd=ie&pver=6&ar=msnhome
Default_Search_URL: hxxp://www.microsoft.com/isapi/redir.dll?prd=ie&ar=iesearch
Do404Search: 0x01000000
Local Page: C:\WINDOWS.2\system32\blank.htm
Search bar: hxxp://go.microsoft.com/fwlink/?linkid=54896
Show_ToolBar: yes
Start Page: hxxp://fr.msn.com/
Use Search Asst: no

[HKLM\Software\Microsoft\Internet Explorer\Main]
Default_Page_URL: hxxp://go.microsoft.com/fwlink/?LinkId=54896
Default_Search_URL: hxxp://www.microsoft.com/isapi/redir.dll?prd=ie&ar=iesearch
Delete_Temp_Files_On_Exit: yes
Local Page: C:\WINDOWS.2\system32\blank.htm
Search bar: hxxp://search.msn.com/spbasic.htm
Search Page: hxxp://www.microsoft.com/isapi/redir.dll?prd=ie&ar=iesearch
Start Page: hxxp://fr.msn.com/

[HKLM\Software\Microsoft\Internet Explorer\ABOUTURLS]
Tabs: res://ieframe.dll/tabswelcome.htm
Blank: res://mshtml.dll/blank.htm

========================================

C:\Program Files\Ad-Remover\Quarantine: 30 File(s)
C:\Program Files\Ad-Remover\Backup: 16 File(s)

C:\Ad-Report-CLEAN[1].txt - 17/11/2010 (9014 Byte(s))
C:\Ad-Report-SCAN[1].txt - 17/11/2010 (13048 Byte(s))

End at: 20:57:23, 17/11/2010

============== E.O.F ==============

Effectué en mode Sans échec
0
Utilisateur anonyme
17 nov. 2010 à 21:04
Télécharge ici :OTL

enregistre le sur ton Bureau.

si tu as XP => double clique
si tu as Vista ou windows 7 => clic droit "executer en tant que...."


sur OTL.exe pour le lancer.

▶ Coche les 2 cases Lop et Purity

▶ Coche la case devant tous les utilisateurs

▶ règle age du fichier sur "60 jours"

▶ dans la moitié gauche , mets tout sur "tous"

ne modifie pas ceci :

"fichiers créés" et "fichiers Modifiés"


▶Clic sur Analyse.

A la fin du scan, le Bloc-Notes va s'ouvrir avec le rapport (OTL.txt).

Ce fichier est sur ton Bureau (en général C:\Documents and settings\le_nom_de_ta_session\OTL.txt)

▶▶▶ NE LE POSTE PAS SUR LE FORUM

Pour me le transmettre clique sur ce lien : http://www.cijoint.fr/

▶ Clique sur Parcourir et cherche le fichier ci-dessus.

▶ Clique sur Ouvrir.

▶ Clique sur "Cliquez ici pour déposer le fichier".

juste au niveau du bouton , en fin de chargement du fichier , Un lien de cette forme apparaitra :

http://www.cijoint.fr/cjlink.php?file=cjge368/cijSKAP5fU.txt

▶ Copie ce lien dans ta réponse.

▶▶ Tu feras la meme chose avec le "Extra.txt" qui logiquement sera aussi sur ton bureau.
0
http://www.cijoint.fr/cjlink.php?file=cj201011/cijTnv0kIe.txt Extras
http://www.cijoint.fr/cjlink.php?file=cj201011/cijGldYH1f.txt OTL
0
Utilisateur anonyme
18 nov. 2010 à 08:26
bonjour

si tu as XP => double clique
si tu as Vista ou windows 7 => clic droit "executer en tant que...."


sur OTL.exe pour le lancer.


▶Copie la liste qui se trouve en gras ci-dessous,

▶ colle-la dans la zone sous "Personnalisation" :


:processes
explorer.exe
iexplore.exe
firefox.exe
msnmsgr.exe
Teatimer.exe

:Services
TabDiscover Service

:OTL
FF - prefs.js..extensions.enabledItems: {CAFEEFAC-0016-0000-0011-ABCDEFFEDCBA}:6.0.11
FF - prefs.js..extensions.enabledItems: {CAFEEFAC-0016-0000-0017-ABCDEFFEDCBA}:6.0.17
FF - prefs.js..extensions.enabledItems: {CAFEEFAC-0016-0000-0020-ABCDEFFEDCBA}:6.0.20
O3 - HKU\S-1-5-21-583907252-1326574676-1801674531-1003\..\Toolbar\WebBrowser: (&Links) - {0E5CBF21-D15F-11D0-8301-00AA005B4383}
O4 - HKLM..\Run: [HKLM] C:\WINDOWS.2\WinDir\Svchost.exe ()
O4 - HKU\S-1-5-21-583907252-1326574676-1801674531-1003..\Run: [HKCU] C:\WINDOWS.2\WinDir\Svchost.exe ()
O6 - HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer\Run: Policies = C:\WINDOWS.2\WinDir\Svchost.exe ()
O7 - HKU\S-1-5-21-583907252-1326574676-1801674531-1003\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer\Run: Policies = C:\WINDOWS.2\WinDir\Svchost.exe ()
O4 - Startup: C:\Documents and Settings\Administrator\Start Menu\Programs\Startup\LimeWire On Startup.lnk = C:\Program Files\LimeWire\LimeWire.exe File not found
O35 - HKLM\..comfile [open] -- "%1" %*
O35 - HKLM\..exefile [open] -- "%1" %*
O37 - HKLM\...com [@ = comfile] -- "%1" %*
O37 - HKLM\...exe [@ = exefile] -- "%1" %*

:Reg
[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run]
"Adobe Reader Speed Launcher"=-
"Alcmtr"=-
"iTunesHelper"=-
"QuickTime Task"=-

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer]
"NoDriveTypeAutoRun"=145

:Files
C:\Documents and Settings\All Users.WINDOWS.2\Application Data\TabDiscover
C:\Program Files\Mozilla Firefox\searchplugins\jookz.xml
C:\Program Files\Mozilla Firefox\searchplugins\jookz.xml.bak
C:\Documents and Settings\All Users.WINDOWS.2\Application Data\mtbjfghn.xbe
C:\Documents and Settings\All Users.WINDOWS.1\Application Data\Findbasic
C:\Documents and Settings\Paul\Application Data\WinDir

:commands
[emptytemp]
[start explorer]
[reboot]



▶ Clique sur "Correction" pour lancer la suppression.


▶ Poste le rapport qui logiquement s'ouvrira tout seul en fin de travail appres le redemarrage.
0
Pas de rapport, mais en tout cas plus de problemes !
Merci beaucoup et bon week end :)
0
Utilisateur anonyme
20 nov. 2010 à 14:24
re ,

le rapport :

C:\_OTL\Moved Files\la_date_et_l'heure.txt
0