Publicités

anils39 Messages postés 21 Statut Membre -  
 Utilisateur anonyme -
Bonjour,
J'ai un petit soucis de publicités.
Quand je joue des pages internet s'ouvre, se qui est fortement agaçant !
Je ne suis pas sous Internet Explorer mais sous Firefox.
J'ai essayé plusieurs méthodes que j'avais vu auparavant sur le net mais rien de bien efficace car sa recommence !

Que faire ?!

10 réponses

Utilisateur anonyme
 
0
Utilisateur anonyme
 
bonjour,

* Télécharge ZHPDiag sur ton bureau :

https://www.zebulon.fr/telechargements/securite/systeme/zhpdiag.html
ou
http://www.premiumorange.com/zeb-help-process/zhpdiag.html
ou
https://www.commentcamarche.net/telecharger/utilitaires/24803-zhpdiag/

* Laisse toi guider lors de l'installation, il se lancera automatiquement à la fin.

/!\Utilisateur de Vista et Seven : Clique droit sur le logo de ZHPdiag, « exécuter en tant qu'Administrateur »

* Clique sur l'icône représentant une loupe (« Lancer le diagnostic »)
* Enregistre le rapport sur ton Bureau à l'aide de l'icône représentant une disquette
* Héberge le rapport ZHPDiag.txt sur Cijoint, puis copie/colle le lien fourni dans ta prochaine réponse sur le forum :
https://www.cjoint.com/

ou :
http://dl.free.fr
ou :
http://ww38.toofiles.com/fr/documents-upload.html
ou :
https://www.terafiles.net/

tuto zhpdiag :

http://www.premiumorange.com/zeb-help-process/zhpdiag.html
0
anils39 Messages postés 21 Statut Membre
 
Bonjour Electricien 69,

Voici se que tu m'as demandé : https://www.cjoint.com/?ALfuyUhmjiw
0
Utilisateur anonyme
 
ton pc est rempli d'adwares ! => toolbars infecteuses !

tu as du essayer de regarder un tuto: donc ton pc a été infecté par tuto4pc = Eorezo = Agance exclusif .... !!!

d'ou les pub !

? Télécharger et enregistre ADWcleaner sur ton bureau (Merci à Xplode) :

http://general-changelog-team.fr/telechargements/logiciels/viewdownload/75-outils-de-xplode/28-adwcleaner

Lance le,
clique sur rechercher et poste son rapport.

0

Vous n’avez pas trouvé la réponse que vous recherchez ?

Posez votre question
anils39 Messages postés 21 Statut Membre
 
0
Utilisateur anonyme
 
relance ADWC, clique sur supprimer, poste son rapport

0
anils39 Messages postés 21 Statut Membre
 
Voici le rapport supprimé : https://www.cjoint.com/?ALgkbR43Eyp
0
Utilisateur anonyme
 
relance Zhpdiag,

* Clique sur l'icône représentant une loupe (« Lancer le diagnostic »)
* Enregistre le rapport sur ton Bureau à l'aide de l'icône représentant une disquette
* Héberge le rapport ZHPDiag.txt sur Cijoint, puis copie/colle le lien fourni dans ta prochaine réponse sur le forum :
https://www.cjoint.com/

ou :
http://dl.free.fr
ou :
http://ww38.toofiles.com/fr/documents-upload.html
ou :
https://www.terafiles.net/

0
anils39 Messages postés 21 Statut Membre
 
0
Utilisateur anonyme
 
* Lance ZHPFix via le raccourci sur ton Bureau

* Clique sur l'icone représentant la lettre H (« coller les lignes Helper »)
Copie et colle les lignes suivantes en gras dans Zhpfix :

----------------------------------------------------------

O51 - MPSK:{4460507c-e1ef-11df-996e-90fba6889b18}\AutoRun\command. (...) -- H:\Autorun.exe (.not file.) => Microsoft Windows NT or Infection USB
[MD5.61A3C048126F53F88ADC1CBCE7EDBC6C] [SPRF][04/12/2011] (.2YourFace.com - 2YourFace Installer - This file installs all the relevant addons.) -- C:\Users\Anil\AppData\Local\Temp\Setup.exe [439887]
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Associations] Application: Modified => Infection BT (Hijacker.Application)
M2 - MFEP: prefs.js [Anil - kt4pcmkw.default\{8A9386B4-E958-4c4c-ADF4-8F26DB3E4829}] [] PriceGong v2.5.4 (.PriceGong Software Ltd..) => Infection BT (Adware.PriceGong)
M2 - MFEP: prefs.js [Anil - kt4pcmkw.default\{EB9394A3-4AD6-4918-9537-31A1FD8E8EDF}] [] DealPly v2.0 (.dealply.com.) => Infection PUP (PUP.DealPly)
R0 - HKCU\SOFTWARE\Microsoft\Internet Explorer\Main,Start Page = http://search.babylon.com => Infection BT (Toolbar.Babylon)
R1 - HKCU\SOFTWARE\Microsoft\Internet Explorer\Main,Search Page = http://ww12.cherche.us => Infection BT (Hijacker.ChercheUS)
R1 - HKCU\SOFTWARE\Microsoft\Internet Explorer\Main,Default_Page_URL = http://www.cherche.us => Infection BT (Hijacker.ChercheUS)
R1 - HKCU\SOFTWARE\Microsoft\Internet Explorer\Main,Default_Search_URL = http://www.cherche.us => Infection BT (Hijacker.ChercheUS)
R1 - HKCU\SOFTWARE\Microsoft\Internet Explorer\Main,Default_Secondary_Page_URL = http://www.cherche.us => Infection BT (Hijacker.ChercheUS)
R1 - HKLM\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\AboutURLs,Tabs = http://search.babylon.com => Infection BT (Toolbar.Babylon)
O2 - BHO: PriceGong [64Bits] - {1631550F-191D-4826-B069-D9439253D926} . (.PriceGong - PriceGong Comparative Shopping Tool.) -- C:\Program Files (x86)\PriceGong\2.5.4\PriceGongIE.dll => Infection BT (Adware.PriceGong)
O2 - BHO: Babylon toolbar helper [64Bits] - {2EECD738-5844-4a99-B4B6-146BF802613B} . (.Babylon BHO - Pas de description.) -- C:\Program Files (x86)\BabylonToolbar\BabylonToolbar\1.5.3.17\bh\BabylonToolbar.dll => Infection BT (Toolbar.Babylon)
O8 - Extra context menu item: Recherche avec cherche.us - (.not file.) - C:\Users\Anil\scriptjava.html => Infection BT (cherche.us.Hjk)
O8 - Extra context menu item: Translate this web page with Babylon - (.not file.) - C:\Program Files (x86)\Babylon\Babylon-Pro\Utils\BabylonIEPI.dll => Infection BT (Toolbar.Babylon)
O8 - Extra context menu item: Translate with Babylon - (.not file.) - C:\Program Files (x86)\Babylon\Babylon-Pro\Utils\BabylonIEPI.dll => Infection BT (Toolbar.Babylon)
[MD5.00000000000000000000000000000000] [APT] [RunAsStdUser Task] (...) -- C:\Program Files (x86)\FREEzeFrog\bin\1.0.670.0\FREEzeFrogSA.exe (.not file.) => Infection KeyLogger (Adware.FreezeFrog)
O42 - Logiciel: Babylon toolbar on IE - (.Pas de propriétaire.) [HKLM] -- BabylonToolbar => Infection BT (Toolbar.Babylon)
O42 - Logiciel: PriceGong 2.5.4 - (.PriceGong.) [HKLM] -- PriceGong => Infection BT (Adware.PriceGong)
O42 - Logiciel: Tuto Piano Virtuel1.0.0.0 - (.PCTuto.) [HKLM] -- Tuto Piano Virtuel_is1 => Infection BT (Spyware.AgenceExclusive)
[HKCU\Software\AppDataLow\Software\PriceGong] => Infection BT (Adware.PriceGong)
[HKCU\Software\BabylonToolbar] => Infection BT (Toolbar.Babylon)
[HKLM\Software\CrazyLoader] => Infection BT (Adware.SPointer)
O43 - CFD: 08/12/2011 - 10:40:56 - [0] ----D- C:\Program Files\Babylon => Infection BT (Toolbar.Babylon)
O43 - CFD: 08/12/2011 - 10:37:06 - [0] ----D- C:\Program Files (x86)\Babylon => Infection BT (Toolbar.Babylon)
O43 - CFD: 08/12/2011 - 10:36:48 - [1,725] ----D- C:\Program Files (x86)\BabylonToolbar => Infection BT (Toolbar.Babylon)
O43 - CFD: 08/12/2011 - 10:36:46 - [0,469] ----D- C:\Program Files (x86)\PriceGong => Infection BT (Adware.PriceGong)
O53 - SMSR:HKLM\...\startupreg\FREEzeFrogSA [Key] . (...) -- C:\Program Files (x86)\FREEzeFrog\bin\1.0.670.0\FREEzeFrogSA.exe (.not file.) => Infection KeyLogger (Adware.FreezeFrog)
O69 - SBI: SearchScopes [HKCU] {0ECDF796-C2DC-4d79-A620-CCE0C0A66CC9} [DefaultScope] - (Search the web (Babylon)) - http://search.babylon.com => Infection BT (Toolbar.Babylon)
O87 - FAEL: "{139E6626-DCB3-4B13-BD0E-B3E515809876}" |In - Private - P6 - TRUE | .(...) -- C:\Program Files (x86)\CrazyLoader\crazyloader.exe (.not file.) => Infection BT (Adware.SPointer)
O87 - FAEL: "{B0841460-151E-4434-BB31-14145C20B79C}" |In - Private - P17 - TRUE | .(...) -- C:\Program Files (x86)\CrazyLoader\crazyloader.exe (.not file.) => Infection BT (Adware.SPointer)
[HKLM\Software\WOW6432Node\Classes\AppID\{09C554C3-109B-483C-A06B-F14172F1A947}] =>Adware.Agent => Infection BT (Adware.Agent)
[HKLM\Software\Classes\TypeLib\{0BF73E27-2734-4F7B-925A-4BBB1457F5FA}] =>PUP.Eorezo => Infection PUP (PUP.Eorezo)
[HKCU\Software\Microsoft\Internet Explorer\SearchScopes\{0ecdf796-c2dc-4d79-a620-cce0c0a66cc9}] =>Adware.MyWebSearch => Infection BT (MyWebSearch.Spy)
[HKLM\Software\WOW6432Node\Classes\CLSID\{1631550F-191D-4826-B069-D9439253D926}] =>Adware.PriceGong => Infection BT (Adware.PriceGong)
[HKLM\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{1631550F-191D-4826-B069-D9439253D926}] =>Adware.PriceGong => Infection BT (Adware.PriceGong)
[HKLM\Software\WOW6432Node\Classes\CLSID\{291BCCC1-6890-484a-89D3-318C928DAC1B}] =>Toolbar.Babylon => Infection BT (Toolbar.Babylon)
[HKLM\Software\WOW6432Node\Classes\CLSID\{293A63F7-C3B6-423A-9845-901AC0A7EE6E}] =>PUP.Eorezo => Infection PUP (PUP.Eorezo)
[HKLM\Software\WOW6432Node\Classes\CLSID\{2EECD738-5844-4a99-B4B6-146BF802613B}] =>Toolbar.Babylon => Infection BT (Toolbar.Babylon)
[HKLM\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{2EECD738-5844-4a99-B4B6-146BF802613B}] =>Toolbar.Babylon => Infection BT (Toolbar.Babylon)
[HKLM\Software\WOW6432Node\Classes\AppID\{35C1605E-438B-4D64-AAB1-8885F097A9B1}] =>Toolbar.Babylon => Infection BT (Toolbar.Babylon)
[HKLM\Software\Classes\TypeLib\{35C1605E-438B-4D64-AAB1-8885F097A9B1}] =>Toolbar.Babylon => Infection BT (Toolbar.Babylon)
[HKLM\Software\WOW6432Node\Classes\Interface\{44C3C1DB-2127-433C-98EC-4C9412B5FC3A}] =>Toolbar.Babylon => Infection BT (Toolbar.Babylon)
[HKLM\Software\WOW6432Node\Classes\Interface\{4D5132DD-BB2B-4249-B5E0-D145A8C982E1}] =>Toolbar.Babylon => Infection BT (Toolbar.Babylon)
[HKLM\Software\WOW6432Node\Classes\AppID\{4E1E9D45-8BF9-4139-915C-9F83CC3D5921}] =>Toolbar.Babylon => Infection BT (Toolbar.Babylon)
[HKLM\Software\Classes\TypeLib\{4E1E9D45-8BF9-4139-915C-9F83CC3D5921}] =>Toolbar.Babylon => Infection BT (Toolbar.Babylon)
[HKLM\Software\Classes\TypeLib\{6E8BF012-2C85-4834-B10A-1B31AF173D70}] =>Toolbar.Babylon => Infection BT (Toolbar.Babylon)
[HKLM\Software\WOW6432Node\Classes\Interface\{706D4A4B-184A-4434-B331-296B07493D2D}] =>Toolbar.Babylon => Infection BT (Toolbar.Babylon)
[HKLM\Software\WOW6432Node\Classes\AppID\{835315FC-1BF6-4CA9-80CD-F6C158D40692}] =>Adware.PriceGong => Infection BT (Adware.PriceGong)
[HKLM\Software\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{8375D9C8-634F-4ECB-8CF5-C7416BA5D542}] =>Toolbar.Babylon => Infection BT (Toolbar.Babylon)
[HKLM\Software\Classes\TypeLib\{8B3372D0-09F0-41A5-8D9B-134E148672FB}] =>Adware.PriceGong => Infection BT (Adware.PriceGong)
[HKLM\Software\WOW6432Node\Classes\Interface\{8BE10F21-185F-4CA0-B789-9921674C3993}] =>Toolbar.Babylon => Infection BT (Toolbar.Babylon)
[HKLM\Software\WOW6432Node\Classes\Interface\{94C0B25D-3359-4B10-B227-F96A77DB773F}] =>Toolbar.Babylon => Infection BT (Toolbar.Babylon)
[HKLM\Software\WOW6432Node\Classes\CLSID\{97F2FF5B-260C-4ccf-834A-2DDA4E29E39E}] =>Toolbar.Babylon => Infection BT (Toolbar.Babylon)
[HKLM\Software\WOW6432Node\Classes\CLSID\{98889811-442D-49dd-99D7-DC866BE87DBC}] =>Toolbar.Babylon => Infection BT (Toolbar.Babylon)
[HKLM\Software\WOW6432Node\Classes\Interface\{B0B75FBA-7288-4FD3-A9EB-7EE27FA65599}] =>Toolbar.Babylon => Infection BT (Toolbar.Babylon)
[HKLM\Software\WOW6432Node\Classes\AppID\{B12E99ED-69BD-437C-86BE-C862B9E5444D}] =>Toolbar.Babylon => Infection BT (Toolbar.Babylon)
[HKLM\Software\WOW6432Node\Classes\Interface\{B173667F-8395-4317-8DD6-45AD1FE00047}] =>Toolbar.Babylon => Infection BT (Toolbar.Babylon)
[HKLM\Software\WOW6432Node\Classes\Interface\{B32672B3-F656-46E0-B584-FE61C0BB6037}] =>Toolbar.Babylon => Infection BT (Toolbar.Babylon)
[HKLM\Software\WOW6432Node\Classes\CLSID\{B8276A94-891D-453C-9FF3-715C042A2575}] =>Toolbar.Babylon => Infection BT (Toolbar.Babylon)
[HKLM\Software\WOW6432Node\Classes\Interface\{BCFF5F55-6F44-11D2-86F8-00104B265ED5}] =>Spyware.Soft2PC => Infection PUP (Spyware.Soft2PC)
[HKLM\Software\WOW6432Node\Classes\AppID\{BDB69379-802F-4eaf-B541-F8DE92DD98DB}] =>Toolbar.Babylon => Infection BT (Toolbar.Babylon)
[HKLM\Software\WOW6432Node\Classes\Interface\{BFE569F7-646C-4512-969B-9BE3E580D393}] =>Toolbar.Babylon => Infection BT (Toolbar.Babylon)
[HKLM\Software\WOW6432Node\Classes\Interface\{C2434722-5C85-4CA0-BA69-1B67E7AB3D68}] =>Toolbar.Babylon => Infection BT (Toolbar.Babylon)
[HKLM\Software\WOW6432Node\Classes\Interface\{C2996524-2187-441F-A398-CD6CB6B3D020}] =>Toolbar.Babylon => Infection BT (Toolbar.Babylon)
[HKLM\Software\WOW6432Node\Classes\CLSID\{D2A2595C-4FE4-4315-AA9B-19DBD6271B71}] =>Adware.PriceGong => Infection BT (Adware.PriceGong)
[HKLM\Software\WOW6432Node\Classes\AppID\{D7EE8177-D51E-4F89-92B6-83EA2EC40800}] =>Toolbar.Babylon => Infection BT (Toolbar.Babylon)
[HKLM\Software\Classes\TypeLib\{D7EE8177-D51E-4F89-92B6-83EA2EC40800}] =>Toolbar.Babylon => Infection BT (Toolbar.Babylon)
[HKLM\Software\WOW6432Node\Classes\Interface\{E047E227-5342-4D94-80F7-CFB154BF55BD}] =>Toolbar.Babylon => Infection BT (Toolbar.Babylon)
[HKLM\Software\WOW6432Node\Classes\Interface\{E2ED56B6-35FC-4484-9530-EC87FB458E78}] =>PUP.Eorezo => Infection PUP (PUP.Eorezo)
[HKLM\Software\WOW6432Node\Classes\Interface\{E3F79BE9-24D4-4F4D-8C13-DF2C9899F82E}] =>Toolbar.Babylon => Infection BT (Toolbar.Babylon)
[HKLM\Software\WOW6432Node\Classes\CLSID\{E46C8196-B634-44a1-AF6E-957C64278AB1}] =>Toolbar.Babylon => Infection BT (Toolbar.Babylon)
[HKLM\Software\WOW6432Node\Classes\Interface\{E77EEF95-3E83-4BB8-9C0D-4A5163774997}] =>Toolbar.Babylon => Infection BT (Toolbar.Babylon)
[HKLM\Software\WOW6432Node\Classes\CLSID\{FFB9ADCB-8C79-4C29-81D3-74D46A93D370}] =>Toolbar.Babylon => Infection BT (Toolbar.Babylon)
[HKCU\Software\AppDataLow\Software\PriceGong] =>Adware.PriceGong => Infection Diverse (Adware.PriceGong)
C:\Users\Anil\AppData\Roaming\Mozilla\Firefox\Profiles\kt4pcmkw.default\Extensions\{8A9386B4-E958-4c4c-ADF4-8F26DB3E4829} =>Adware.PriceGong => Infection BT (Adware.PriceGong)
[MD5.00000000000000000000000000000000] [APT] [Norton Security Scan for Anil] (...) -- C:\Program Files\NORTON~2\Engine\351~1.8\Nss.exe (.not file.) => Fichier absent
[MD5.00000000000000000000000000000000] [APT] [{304DE946-F378-403D-B5F7-C524F69777D7}] (...) -- C:\Program Files (x86)\InstallShield Installation Information\{901DC58A-5C1B-4315-BA40-5AD3D3A463B9}\setup.exe (.not file.) => Fichier absent
[MD5.00000000000000000000000000000000] [APT] [{A9CB8498-CC54-4177-86CC-96964C6CB836}] (...) -- C:\Users\Anil\AppData\Local\Temp\Rar$EX07.986\install.exe (.not file.) => Fichier absent
O43 - CFD: 31/10/2010 - 11:14:16 - [0,002] ----D- C:\ProgramData\Partner => Game
O43 - CFD: 05/11/2010 - 23:02:24 - [0,270] ----D- C:\Program Files (x86)\Cracklock => Crack, KeyGen, Keymaker - Possible Malware
O53 - SMSR:HKLM\...\startupreg\Protection [Key] . (...) -- C:\Users\Anil\Protection.exe (.not file.) => Fichier absent
O87 - FAEL: "{9174C094-A83D-4A48-8CC8-50C4294E6626}" |In - None - P17 - TRUE | .(...) -- C:\Program Files (x86)\Acer Arcade Deluxe\Arcade Movie\TouchMovie.exe (.not file.) => Fichier absent
O87 - FAEL: "{9EF297F6-8405-4843-A96E-981979C01A32}" |In - None - P17 - TRUE | .(...) -- C:\Program Files (x86)\Acer Arcade Deluxe\Arcade Movie\TouchMovieService.exe (.not file.) => Fichier absent
O87 - FAEL: "TCP Query User{F7689039-B59A-48E5-BD33-8F9A7D6B7D52}I:\cod4\iw3mp.exe" |In - Private - P6 - TRUE | .(...) -- I:\cod4\iw3mp.exe (.not file.) => Fichier absent
O87 - FAEL: "UDP Query User{FE9E2D45-FA41-4FCC-AC63-43A101A8D3C9}I:\cod4\iw3mp.exe" |In - Private - P17 - TRUE | .(...) -- I:\cod4\iw3mp.exe (.not file.) => Fichier absent
O87 - FAEL: "TCP Query User{EB8A9DED-39C2-46F5-851F-AB7EB057AB64}C:\users\anil\appdata\local\temp\jdic_0_9_5\ieembed.exe" |In - Private - P6 - TRUE | .(...) -- C:\users\anil\appdata\local\temp\jdic_0_9_5\ieembed.exe (.not file.) => Fichier absent
O87 - FAEL: "UDP Query User{86E8524B-6E88-458F-9655-B59BC670811D}C:\users\anil\appdata\local\temp\jdic_0_9_5\ieembed.exe" |In - Private - P17 - TRUE | .(...) -- C:\users\anil\appdata\local\temp\jdic_0_9_5\ieembed.exe (.not file.) => Fichier absent
O87 - FAEL: "TCP Query User{6F8C3C8E-2763-4254-B9CD-8A0D1CE832BA}C:\users\anil\desktop\portmap.exe" |In - Private - P6 - TRUE | .(...) -- C:\users\anil\desktop\portmap.exe (.not file.) => Fichier absent
O87 - FAEL: "UDP Query User{5CF7E950-C184-433E-A0AC-6998001E52A7}C:\users\anil\desktop\portmap.exe" |In - Private - P17 - TRUE | .(...) -- C:\users\anil\desktop\portmap.exe (.not file.) => Fichier absent
O87 - FAEL: "{488B7902-1EA8-497A-B4C1-73B02475FAF1}" |In - Public - P17 - TRUE | .(...) -- C:\users\anil\desktop\portmap.exe (.not file.) => Fichier absent
O87 - FAEL: "{41E7187C-706D-4757-8A31-68DEE8283B37}" |In - Public - P6 - TRUE | .(...) -- C:\users\anil\desktop\portmap.exe (.not file.) => Fichier absent
O87 - FAEL: "TCP Query User{70D91493-278D-452A-AF15-8346AFB698D5}C:\users\anil\appdata\local\temp\rar$ex29.045\iw4mp.exe" |In - Private - P6 - TRUE | .(...) -- C:\users\anil\appdata\local\temp\rar$ex29.045\iw4mp.exe (.not file.) => Fichier absent
O87 - FAEL: "UDP Query User{2314C1B1-25E0-494D-8714-AF590B317E35}C:\users\anil\appdata\local\temp\rar$ex29.045\iw4mp.exe" |In - Private - P17 - TRUE | .(...) -- C:\users\anil\appdata\local\temp\rar$ex29.045\iw4mp.exe (.not file.) => Fichier absent
O87 - FAEL: "{B48FFB13-FA73-408A-A9D4-0DECDE899754}" |In - Public - P17 - TRUE | .(...) -- C:\users\anil\appdata\local\temp\rar$ex29.045\iw4mp.exe (.not file.) => Fichier absent
O87 - FAEL: "{FD7C7385-E884-4EEF-8E8F-52E01894DE1A}" |In - Public - P6 - TRUE | .(...) -- C:\users\anil\appdata\local\temp\rar$ex29.045\iw4mp.exe (.not file.) => Fichier absent
O87 - FAEL: "TCP Query User{226E3C80-D253-446D-A6ED-E931C7798807}C:\users\anil\appdata\local\temp\rar$ex29.045\iw4mp.dat" |In - Public - P6 - TRUE | .(...) -- C:\users\anil\appdata\local\temp\rar$ex29.045\iw4mp.dat (.not file.) => Fichier absent
O87 - FAEL: "UDP Query User{3E5B5694-0140-4AC6-B997-0D9C4AE3F37B}C:\users\anil\appdata\local\temp\rar$ex29.045\iw4mp.dat" |In - Public - P17 - TRUE | .(...) -- C:\users\anil\appdata\local\temp\rar$ex29.045\iw4mp.dat (.not file.) => Fichier absent
O87 - FAEL: "TCP Query User{FE0F07F3-1E4C-480F-9716-28D6994A2E2C}C:\users\anil\desktop\nouveau dossier (2)\mw2- multiplayer\iw4mp.exe" |In - Private - P6 - TRUE | .(...) -- C:\users\anil\desktop\nouveau dossier (2)\mw2- multiplayer\iw4mp.exe (.not file.) => Fichier absent
O87 - FAEL: "{129D477A-2495-494E-B9AC-763EF8B39391}" |In - Public - P17 - TRUE | .(...) -- C:\users\anil\desktop\nouveau dossier (2)\mw2- multiplayer\iw4mp.exe (.not file.) => Fichier absent
O87 - FAEL: "{AAB47D28-FA3D-44E8-9EED-371C8B631221}" |In - Public - P6 - TRUE | .(...) -- C:\users\anil\desktop\nouveau dossier (2)\mw2- multiplayer\iw4mp.exe (.not file.) => Fichier absent
O87 - FAEL: "TCP Query User{95935CD2-73C1-4E8D-956E-6AC12BBAFBBF}C:\users\anil\desktop\nouveau dossier (2)\mw2- multiplayer\iw4mp.dat" |In - Public - P6 - TRUE | .(...) -- C:\users\anil\desktop\nouveau dossier (2)\mw2- multiplayer\iw4mp.dat (.not file.) => Fichier absent
O87 - FAEL: "UDP Query User{B8D5C59B-885F-40AC-85D5-83912AF7FBF1}C:\users\anil\desktop\nouveau dossier (2)\mw2- multiplayer\iw4mp.dat" |In - Public - P17 - TRUE | .(...) -- C:\users\anil\desktop\nouveau dossier (2)\mw2- multiplayer\iw4mp.dat (.not file.) => Fichier absent
O87 - FAEL: "TCP Query User{584C8F56-9DE6-4D33-B3B9-7C0DA4BE0A6E}C:\users\anil\desktop\iw4mp.exe" |In - Private - P6 - TRUE | .(...) -- C:\users\anil\desktop\iw4mp.exe (.not file.) => Fichier absent
O87 - FAEL: "UDP Query User{A735C5E5-02B1-48EC-99B4-81534E482501}C:\users\anil\desktop\iw4mp.exe" |In - Private - P17 - TRUE | .(...) -- C:\users\anil\desktop\iw4mp.exe (.not file.) => Fichier absent
O87 - FAEL: "{B4EC29F8-9AEB-47C4-B08A-EC4BA97A50B6}" |In - Public - P17 - TRUE | .(...) -- C:\users\anil\desktop\iw4mp.exe (.not file.) => Fichier absent
O87 - FAEL: "{51F0827B-08EF-4E8D-974B-9B5BC2E11308}" |In - Public - P6 - TRUE | .(...) -- C:\users\anil\desktop\iw4mp.exe (.not file.) => Fichier absent
O87 - FAEL: "TCP Query User{1AE1206D-0519-4218-9106-8A991493F3AC}C:\users\anil\desktop\iw4mp.dat" |In - Private - P6 - TRUE | .(...) -- C:\users\anil\desktop\iw4mp.dat (.not file.) => Fichier absent
O87 - FAEL: "UDP Query User{B83DE585-F07F-4F7C-9B36-F884669F5630}C:\users\anil\desktop\iw4mp.dat" |In - Private - P17 - TRUE | .(...) -- C:\users\anil\desktop\iw4mp.dat (.not file.) => Fichier absent
O87 - FAEL: "{DB389BE1-261B-49EA-A82E-1F38FFD93EF6}" |In - Public - P17 - TRUE | .(...) -- C:\users\anil\desktop\iw4mp.dat (.not file.) => Fichier absent
O87 - FAEL: "{D8190F6E-59C7-40E1-B35D-21EF70E91428}" |In - Public - P6 - TRUE | .(...) -- C:\users\anil\desktop\iw4mp.dat (.not file.) => Fichier absent
O87 - FAEL: "{40C8E8FF-2E1C-4EEB-8BF5-FE82D6797728}" |In - Public - P17 - TRUE | .(...) -- C:\users\anil\desktop\codmw3_up_by_fike_for_wawa_mania\common\call of duty modern warfare 3\iw5mp_server.exe (.not file.) => Fichier absent
O87 - FAEL: "{50950B5B-D413-4BB2-9BD6-80510E52F0DA}" |In - Public - P6 - TRUE | .(...) -- C:\users\anil\desktop\codmw3_up_by_fike_for_wawa_mania\common\call of duty modern warfare 3\iw5mp_server.exe (.not file.) => Fichier absent
[HKCU\Software\NirSoft\ProduKey] =>PSWTool.ProduKey =>
[HKLM\Software\WOW6432Node\Classes\AppID\esrv.EXE] =>Toolbar.Babylon =>
[HKLM\Software\WOW6432Node\Classes\AppID\PriceGongIE.DLL] =>Adware.PriceGong =>
[HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{83ff80f4-8c74-4b80-b5ba-c8ddd434e5c4}] =>Spyware.BHO =>
[HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Settings\{83ff80f4-8c74-4b80-b5ba-c8ddd434e5c4}] =>Spyware.BHO =>
[HKLM\Software\WOW6432Node\Google\Chrome\Extensions\bkomkajifikmkfnjgphkjcfeepbnojok] =>Adware.PriceGong =>
[HKCU\Software\Microsoft\Internet Explorer\MenuExt\recherche avec cherche.us] =>Hijacker.ChercheUS =>
[HKCU\Software\BabylonToolbar] =>Toolbar.Babylon =>
[HKLM\Software\WOW6432Node\BabylonToolbar] =>Toolbar.Babylon =>
[HKLM\Software\Wow6432Node\Martin Prikryl\OpenCandy] =>Adware.OpenCandy =>
C:\Program Files\Babylon =>Toolbar.Babylon =>
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\PriceGong =>Adware.PriceGong =>
C:\Users\Anil\AppData\LocalLow\ShopperReports3 =>Adware.ShopperReports =>
C:\Users\Anil\AppData\Local\Temp\BabylonToolbar =>Toolbar.Babylon =>
C:\Program Files (x86)\Babylon =>Toolbar.Babylon =>
C:\Program Files (x86)\BabylonToolbar =>Toolbar.Babylon =>
C:\Program Files (x86)\DAEMON Tools Toolbar =>Toolbar.Agent =>
C:\Program Files (x86)\PriceGong =>Adware.PriceGong =>
SR - | Auto 02/10/2011 341296 | (NitroReaderDriverReadSpool2) . (.Nitro PDF Software.) - C:\Program Files\Common Files\Nitro PDF\Reader\2.0\NitroPDFReaderDriverService2x64.exe =>
Emptytemp


----------------------------------------------------------

- Clique sur le bouton « GO » pour lancer le nettoyage,
- Copie/colle la totalité du rapport dans ta prochaine réponse
Tuto :

http://www.premiumorange.com/zeb-help-process/zhpfix.html
0