Rapport hijackthis

Fermé
zecaro Messages postés 1 Date d'inscription mercredi 9 juillet 2008 Statut Membre Dernière intervention 9 juillet 2008 - 9 juil. 2008 à 15:50
mum1989 Messages postés 6359 Date d'inscription vendredi 28 septembre 2007 Statut Contributeur Dernière intervention 6 août 2012 - 9 juil. 2008 à 15:54
Bonjour,
je viens de faire un scan pour voir si il y a des virus sur l'ordi d'un pote

le rapport est le suivant : qu'en pensez vous ???? merci beaucoup !

Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 11:52:19, on 09/07/2008
Platform: Windows Vista (WinNT 6.00.1904)
MSIE: Internet Explorer v7.00 (7.00.6000.16609)
Boot mode: Normal

Running processes:
C:\Windows\system32\taskeng.exe
C:\Windows\system32\Dwm.exe
C:\Windows\Explorer.EXE
C:\Program Files\Alwil Software\Avast4\ashDisp.exe
C:\Program Files\Common Files\Symantec Shared\PIF\{B8E1DD85-8582-4c61-B58F-2F227FCA9A08}\PIFSvc.exe
C:\Program Files\Java\jre1.6.0_06\bin\jusched.exe
C:\Program Files\Windows Sidebar\sidebar.exe
C:\Windows\ehome\ehtray.exe
C:\Program Files\Windows Media Player\wmpnscfg.exe
C:\Users\alain\AppData\Local\fumkdk.exe
C:\Program Files\Logitech\SetPoint\SetPoint.exe
C:\Program Files\CASIO\Photo Loader\Plauto.exe
C:\Acer\Empowering Technology\ENET\ENMTRAY.EXE
C:\Windows\ehome\ehmsas.exe
C:\Acer\Empowering Technology\EPOWER\EPOWER_DMC.EXE
C:\Windows\system32\wbem\unsecapp.exe
C:\Acer\Empowering Technology\ACER.EMPOWERING.FRAMEWORK.SUPERVISOR.EXE
C:\Acer\Empowering Technology\eRecovery\ERAGENT.EXE
C:\Program Files\Common Files\Logishrd\KHAL2\KHALMNPR.EXE
C:\Windows\system32\wuauclt.exe
C:\Program Files\Mozilla Firefox\firefox.exe
C:\Program Files\Adobe\Reader 8.0\Reader\AcroRd32.exe
C:\Users\alain\Desktop\HiJackThis.exe

R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = https://www.bing.com/?toHttps=1&redig=5FC791212101479BAFBE1A679848B1AF
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = https://www.google.fr/?gws_rd=ssl
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = https://fr.yahoo.com/
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = https://www.bing.com/?toHttps=1&redig=5FC791212101479BAFBE1A679848B1AF
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = https://www.bing.com/?toHttps=1&redig=5FC791212101479BAFBE1A679848B1AF
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://ww17.ads.eorezo.com/cgi-bin/advert/getads.cgi?x_format=redirect&x_dp_id=9
R0 - HKLM\Software\Microsoft\Internet Explorer\Search,SearchAssistant =
R0 - HKLM\Software\Microsoft\Internet Explorer\Search,CustomizeSearch =
R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName =
O1 - Hosts: ::1 localhost
O2 - BHO: Yahoo! Toolbar Helper - {02478D38-C3F9-4EFB-9B51-7695ECA05670} - C:\Program Files\Yahoo!\Companion\Installs\cpn\yt.dll
O2 - BHO: Adobe PDF Reader Link Helper - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Common Files\Adobe\Acrobat\ActiveX\AcroIEHelper.dll
O2 - BHO: NCO 2.0 IE BHO - {602ADB0E-4AFF-4217-8AA1-95DAC4DFA408} - (no file)
O2 - BHO: EoRezoBHO - {64F56FC1-1272-44CD-BA6E-39723696E350} - C:\Program Files\EoRezo\EoAdv\EoRezoBHO.dll (file missing)
O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre1.6.0_06\bin\ssv.dll
O3 - Toolbar: Acer eDataSecurity Management - {5CBE3B7C-1E47-477e-A7DD-396DB0476E29} - C:\Windows\system32\eDStoolbar.dll
O3 - Toolbar: Yahoo! Toolbar avec bloqueur de fenêtres pop-up - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - C:\Program Files\Yahoo!\Companion\Installs\cpn\yt.dll
O3 - Toolbar: Easy-WebPrint - {327C2873-E90D-4c37-AA9D-10AC9BABA46C} - C:\Program Files\Canon\Easy-WebPrint\Toolband.dll (file missing)
O3 - Toolbar: (no name) - {7FEBEFE3-6B19-4349-98D2-FFB09D4B49CA} - (no file)
O3 - Toolbar: (no name) - {D0943516-5076-4020-A3B5-AEFAF26AB263} - (no file)
O4 - HKLM\..\Run: [avast!] C:\PROGRA~1\ALWILS~1\Avast4\ashDisp.exe
O4 - HKLM\..\Run: [Symantec PIF AlertEng] "C:\Program Files\Common Files\Symantec Shared\PIF\{B8E1DD85-8582-4c61-B58F-2F227FCA9A08}\PifSvc.exe" /a /m "C:\Program Files\Common Files\Symantec Shared\PIF\{B8E1DD85-8582-4c61-B58F-2F227FCA9A08}\AlertEng.dll"
O4 - HKLM\..\Run: [Kernel and Hardware Abstraction Layer] KHALMNPR.EXE
O4 - HKLM\..\Run: [SunJavaUpdateSched] "C:\Program Files\Java\jre1.6.0_06\bin\jusched.exe"
O4 - HKCU\..\Run: [Sidebar] C:\Program Files\Windows Sidebar\sidebar.exe /autoRun
O4 - HKCU\..\Run: [ehTray.exe] C:\Windows\ehome\ehTray.exe
O4 - HKCU\..\Run: [dmqpp.tmp] C:\Windows\system32\dmqpp.tmp
O4 - HKCU\..\Run: [dmaok.tmp] C:\Windows\system32\dmaok.tmp
O4 - HKCU\..\Run: [dmydd.tmp] C:\Windows\system32\dmydd.tmp
O4 - HKCU\..\Run: [dmhnn.tmp] C:\Windows\system32\dmhnn.tmp
O4 - HKCU\..\Run: [dmdkj.tmp] C:\Windows\system32\dmdkj.tmp
O4 - HKCU\..\Run: [dmmmh.tmp] C:\Windows\system32\dmmmh.tmp
O4 - HKCU\..\Run: [dmpob.tmp] C:\Windows\system32\dmpob.tmp
O4 - HKCU\..\Run: [dmdpv.tmp] C:\Windows\system32\dmdpv.tmp
O4 - HKCU\..\Run: [dmrwa.tmp] C:\Windows\system32\dmrwa.tmp
O4 - HKCU\..\Run: [dmdzj.tmp] C:\Windows\system32\dmdzj.tmp
O4 - HKCU\..\Run: [dmgej.tmp] C:\Windows\system32\dmgej.tmp
O4 - HKCU\..\Run: [dmwjj.tmp] C:\Windows\system32\dmwjj.tmp
O4 - HKCU\..\Run: [dmrio.tmp] C:\Windows\system32\dmrio.tmp
O4 - HKCU\..\Run: [dmghj.tmp] C:\Windows\system32\dmghj.tmp
O4 - HKCU\..\Run: [dmmkn.tmp] C:\Windows\system32\dmmkn.tmp
O4 - HKCU\..\Run: [dmwdc.tmp] C:\Windows\system32\dmwdc.tmp
O4 - HKCU\..\Run: [dmksc.tmp] C:\Windows\system32\dmksc.tmp
O4 - HKCU\..\Run: [dmczp.tmp] C:\Windows\system32\dmczp.tmp
O4 - HKCU\..\Run: [dmcup.tmp] C:\Windows\system32\dmcup.tmp
O4 - HKCU\..\Run: [dmhyz.tmp] C:\Windows\system32\dmhyz.tmp
O4 - HKCU\..\Run: [dmwuc.tmp] C:\Windows\system32\dmwuc.tmp
O4 - HKCU\..\Run: [dmssf.tmp] C:\Windows\system32\dmssf.tmp
O4 - HKCU\..\Run: [dmipp.tmp] C:\Windows\system32\dmipp.tmp
O4 - HKCU\..\Run: [dmycw.tmp] C:\Windows\system32\dmycw.tmp
O4 - HKCU\..\Run: [dmsxi.tmp] C:\Windows\system32\dmsxi.tmp
O4 - HKCU\..\Run: [dmqod.tmp] C:\Windows\system32\dmqod.tmp
O4 - HKCU\..\Run: [dmedo.tmp] C:\Windows\system32\dmedo.tmp
O4 - HKCU\..\Run: [dmpzd.tmp] C:\Windows\system32\dmpzd.tmp
O4 - HKCU\..\Run: [dmmuc.tmp] C:\Windows\system32\dmmuc.tmp
O4 - HKCU\..\Run: [dmmor.tmp] C:\Windows\system32\dmmor.tmp
O4 - HKCU\..\Run: [dmcag.tmp] C:\Windows\system32\dmcag.tmp
O4 - HKCU\..\Run: [dmnbw.tmp] C:\Windows\system32\dmnbw.tmp
O4 - HKCU\..\Run: [dmqtf.tmp] C:\Windows\system32\dmqtf.tmp
O4 - HKCU\..\Run: [dmfnt.tmp] C:\Windows\system32\dmfnt.tmp
O4 - HKCU\..\Run: [dmdan.tmp] C:\Windows\system32\dmdan.tmp
O4 - HKCU\..\Run: [dmzhp.tmp] C:\Windows\system32\dmzhp.tmp
O4 - HKCU\..\Run: [dmcat.tmp] C:\Windows\system32\dmcat.tmp
O4 - HKCU\..\Run: [dmtbu.tmp] C:\Windows\system32\dmtbu.tmp
O4 - HKCU\..\Run: [dmbxl.tmp] C:\Windows\system32\dmbxl.tmp
O4 - HKCU\..\Run: [dmajk.tmp] C:\Windows\system32\dmajk.tmp
O4 - HKCU\..\Run: [dmqvx.tmp] C:\Windows\system32\dmqvx.tmp
O4 - HKCU\..\Run: [dmwnc.tmp] C:\Windows\system32\dmwnc.tmp
O4 - HKCU\..\Run: [dmlwq.tmp] C:\Windows\system32\dmlwq.tmp
O4 - HKCU\..\Run: [dmrab.tmp] C:\Windows\system32\dmrab.tmp
O4 - HKCU\..\Run: [dmbyl.tmp] C:\Windows\system32\dmbyl.tmp
O4 - HKCU\..\Run: [dmwnl.tmp] C:\Windows\system32\dmwnl.tmp
O4 - HKCU\..\Run: [dmpix.tmp] C:\Windows\system32\dmpix.tmp
O4 - HKCU\..\Run: [dmezt.tmp] C:\Windows\system32\dmezt.tmp
O4 - HKCU\..\Run: [dmgjw.tmp] C:\Windows\system32\dmgjw.tmp
O4 - HKCU\..\Run: [dmgia.tmp] C:\Windows\system32\dmgia.tmp
O4 - HKCU\..\Run: [dmcfb.tmp] C:\Windows\system32\dmcfb.tmp
O4 - HKCU\..\Run: [dmqay.tmp] C:\Windows\system32\dmqay.tmp
O4 - HKCU\..\Run: [dmxnv.tmp] C:\Windows\system32\dmxnv.tmp
O4 - HKCU\..\Run: [dmesa.tmp] C:\Windows\system32\dmesa.tmp
O4 - HKCU\..\Run: [dmkbf.tmp] C:\Windows\system32\dmkbf.tmp
O4 - HKCU\..\Run: [dmiii.tmp] C:\Windows\system32\dmiii.tmp
O4 - HKCU\..\Run: [dmsmu.tmp] C:\Windows\system32\dmsmu.tmp
O4 - HKCU\..\Run: [dmzlu.tmp] C:\Windows\system32\dmzlu.tmp
O4 - HKCU\..\Run: [dmxix.tmp] C:\Windows\system32\dmxix.tmp
O4 - HKCU\..\Run: [dmhpd.tmp] C:\Windows\system32\dmhpd.tmp
O4 - HKCU\..\Run: [dmcdq.tmp] C:\Windows\system32\dmcdq.tmp
O4 - HKCU\..\Run: [dmieb.tmp] C:\Windows\system32\dmieb.tmp
O4 - HKCU\..\Run: [dmqna.tmp] C:\Windows\system32\dmqna.tmp
O4 - HKCU\..\Run: [dmuoi.tmp] C:\Windows\system32\dmuoi.tmp
O4 - HKCU\..\Run: [dmiiy.tmp] C:\Windows\system32\dmiiy.tmp
O4 - HKCU\..\Run: [dmpnh.tmp] C:\Windows\system32\dmpnh.tmp
O4 - HKCU\..\Run: [dmtbp.tmp] C:\Windows\system32\dmtbp.tmp
O4 - HKCU\..\Run: [dmlmj.tmp] C:\Windows\system32\dmlmj.tmp
O4 - HKCU\..\Run: [dmfqu.tmp] C:\Windows\system32\dmfqu.tmp
O4 - HKCU\..\Run: [dmivp.tmp] C:\Windows\system32\dmivp.tmp
O4 - HKCU\..\Run: [dmpmx.tmp] C:\Windows\system32\dmpmx.tmp
O4 - HKCU\..\Run: [dmrjk.tmp] C:\Windows\system32\dmrjk.tmp
O4 - HKCU\..\Run: [dmkbh.tmp] C:\Windows\system32\dmkbh.tmp
O4 - HKCU\..\Run: [dmsuc.tmp] C:\Windows\system32\dmsuc.tmp
O4 - HKCU\..\Run: [dmbsj.tmp] C:\Windows\system32\dmbsj.tmp
O4 - HKCU\..\Run: [dmwta.tmp] C:\Windows\system32\dmwta.tmp
O4 - HKCU\..\Run: [dmjkl.tmp] C:\Windows\system32\dmjkl.tmp
O4 - HKCU\..\Run: [dmrrr.tmp] C:\Windows\system32\dmrrr.tmp
O4 - HKCU\..\Run: [dmfea.tmp] C:\Windows\system32\dmfea.tmp
O4 - HKCU\..\Run: [dmeow.tmp] C:\Windows\system32\dmeow.tmp
O4 - HKCU\..\Run: [dmzch.tmp] C:\Windows\system32\dmzch.tmp
O4 - HKCU\..\Run: [dmyyk.tmp] C:\Windows\system32\dmyyk.tmp
O4 - HKCU\..\Run: [dmktc.tmp] C:\Windows\system32\dmktc.tmp
O4 - HKCU\..\Run: [dmpts.tmp] C:\Windows\system32\dmpts.tmp
O4 - HKCU\..\Run: [dmfvt.tmp] C:\Windows\system32\dmfvt.tmp
O4 - HKCU\..\Run: [dmacf.tmp] C:\Windows\system32\dmacf.tmp
O4 - HKCU\..\Run: [dmsnw.tmp] C:\Windows\system32\dmsnw.tmp
O4 - HKCU\..\Run: [dmjni.tmp] C:\Windows\system32\dmjni.tmp
O4 - HKCU\..\Run: [dmigx.tmp] C:\Windows\system32\dmigx.tmp
O4 - HKCU\..\Run: [WMPNSCFG] C:\Program Files\Windows Media Player\WMPNSCFG.exe
O4 - HKCU\..\Run: [fumkdk] c:\users\alain\appdata\local\fumkdk.exe fumkdk
O4 - HKCU\..\Run: [WinSpywareProtect] "C:\ProgramData\Adsl Software Ltd\WinSpywareProtect\Winspywareprotect.exe" /autorun
O4 - Global Startup: Empowering Technology Launcher.lnk = ?
O4 - Global Startup: Logitech SetPoint.lnk = C:\Program Files\Logitech\SetPoint\SetPoint.exe
O4 - Global Startup: Microsoft Office.lnk = C:\Program Files\Microsoft Office\Office\OSA9.EXE
O4 - Global Startup: Supervision de Photo Loader.lnk = C:\Program Files\CASIO\Photo Loader\Plauto.exe
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_06\bin\ssv.dll
O9 - Extra 'Tools' menuitem: Console Java (Sun) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_06\bin\ssv.dll
O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~2\Office12\REFIEBAR.DLL
O10 - Unknown file in Winsock LSP: c:\windows\system32\wpclsp.dll
O10 - Unknown file in Winsock LSP: c:\windows\system32\wpclsp.dll
O10 - Unknown file in Winsock LSP: c:\windows\system32\wpclsp.dll
O10 - Unknown file in Winsock LSP: c:\windows\system32\wpclsp.dll
O10 - Unknown file in Winsock LSP: c:\windows\system32\wpclsp.dll
O10 - Unknown file in Winsock LSP: c:\windows\system32\wpclsp.dll
O10 - Unknown file in Winsock LSP: c:\windows\system32\wpclsp.dll
O10 - Unknown file in Winsock LSP: c:\windows\system32\wpclsp.dll
O10 - Unknown file in Winsock LSP: c:\windows\system32\wpclsp.dll
O13 - Gopher Prefix:
O17 - HKLM\System\CCS\Services\Tcpip\..\{63561919-890E-4056-AF5B-4664EC7A0535}: NameServer = 85.255.115.28,85.255.112.200
O17 - HKLM\System\CCS\Services\Tcpip\..\{EFEA1FB9-7D8F-44D3-96B9-75CE629EE413}: NameServer = 85.255.115.28,85.255.112.200
O17 - HKLM\System\CS1\Services\Tcpip\Parameters: NameServer = 85.255.115.28 85.255.112.200
O17 - HKLM\System\CS2\Services\Tcpip\Parameters: NameServer = 85.255.115.28 85.255.112.200
O17 - HKLM\System\CCS\Services\Tcpip\Parameters: NameServer = 85.255.115.28 85.255.112.200
O23 - Service: avast! iAVS4 Control Service (aswUpdSv) - ALWIL Software - C:\Program Files\Alwil Software\Avast4\aswUpdSv.exe
O23 - Service: Ati External Event Utility - ATI Technologies Inc. - C:\Windows\system32\Ati2evxx.exe
O23 - Service: avast! Antivirus - ALWIL Software - C:\Program Files\Alwil Software\Avast4\ashServ.exe
O23 - Service: avast! Mail Scanner - ALWIL Software - C:\Program Files\Alwil Software\Avast4\ashMaiSv.exe
O23 - Service: avast! Web Scanner - ALWIL Software - C:\Program Files\Alwil Software\Avast4\ashWebSv.exe
O23 - Service: eDSService.exe (eDataSecurity Service) - HiTRSUT - C:\Acer\Empowering Technology\eDataSecurity\eDSService.exe
O23 - Service: eLock Service (eLockService) - Acer Inc. - C:\Acer\Empowering Technology\eLock\Service\eLockServ.exe
O23 - Service: eNet Service - Acer Inc. - C:\Acer\Empowering Technology\eNet\eNet Service.exe
O23 - Service: eRecovery Service (eRecoveryService) - Acer Inc. - C:\Acer\Empowering Technology\eRecovery\eRecoveryService.exe
O23 - Service: eSettings Service (eSettingsService) - Unknown owner - C:\Acer\Empowering Technology\eSettings\Service\capuserv.exe
O23 - Service: Logitech Bluetooth Service (LBTServ) - Logitech, Inc. - C:\Program Files\Common Files\Logishrd\Bluetooth\LBTServ.exe
O23 - Service: LightScribeService Direct Disc Labeling Service (LightScribeService) - Hewlett-Packard Company - C:\Program Files\Common Files\LightScribe\LSSrvc.exe
O23 - Service: LiveUpdate Notice Service - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\PIF\{B8E1DD85-8582-4c61-B58F-2F227FCA9A08}\PifSvc.exe
O23 - Service: MobilityService - Unknown owner - C:\Acer\Mobility Center\MobilityService.exe
O23 - Service: O2Micro Flash Memory Card Service (o2flash) - O2Micro International - C:\Program Files\O2Micro Oz128 Driver\o2flash.exe
O23 - Service: Planificateur LiveUpdate automatique - Unknown owner - C:\Program Files\Symantec\LiveUpdate\ALUSchedulerSvc.exe (file missing)
O23 - Service: Cyberlink RichVideo Service(CRVS) (RichVideo) - Unknown owner - C:\Program Files\CyberLink\Shared Files\RichVideo.exe
O23 - Service: ePower Service (WMIService) - acer - C:\Acer\Empowering Technology\ePower\ePowerSvc.exe
O23 - Service: XAudioService - Conexant Systems, Inc. - C:\Windows\system32\DRIVERS\xaudio.exe

2 réponses

lecristal Messages postés 961 Date d'inscription samedi 31 mars 2007 Statut Membre Dernière intervention 9 août 2022 18
9 juil. 2008 à 15:53
0
mum1989 Messages postés 6359 Date d'inscription vendredi 28 septembre 2007 Statut Contributeur Dernière intervention 6 août 2012 515
9 juil. 2008 à 15:54
tu sais qu'est ce que c'est ça ??
O4 - HKLM\..\Run: [Kernel and Hardware Abstraction Layer] KHALMNPR.EXE
O4 - HKLM\..\Run: [SunJavaUpdateSched] "C:\Program Files\Java\jre1.6.0_06\bin\jusched.exe"
O4 - HKCU\..\Run: [Sidebar] C:\Program Files\Windows Sidebar\sidebar.exe /autoRun
O4 - HKCU\..\Run: [ehTray.exe] C:\Windows\ehome\ehTray.exe
O4 - HKCU\..\Run: [dmqpp.tmp] C:\Windows\system32\dmqpp.tmp
O4 - HKCU\..\Run: [dmaok.tmp] C:\Windows\system32\dmaok.tmp
O4 - HKCU\..\Run: [dmydd.tmp] C:\Windows\system32\dmydd.tmp
O4 - HKCU\..\Run: [dmhnn.tmp] C:\Windows\system32\dmhnn.tmp
O4 - HKCU\..\Run: [dmdkj.tmp] C:\Windows\system32\dmdkj.tmp
O4 - HKCU\..\Run: [dmmmh.tmp] C:\Windows\system32\dmmmh.tmp
O4 - HKCU\..\Run: [dmpob.tmp] C:\Windows\system32\dmpob.tmp
O4 - HKCU\..\Run: [dmdpv.tmp] C:\Windows\system32\dmdpv.tmp
O4 - HKCU\..\Run: [dmrwa.tmp] C:\Windows\system32\dmrwa.tmp
O4 - HKCU\..\Run: [dmdzj.tmp] C:\Windows\system32\dmdzj.tmp
O4 - HKCU\..\Run: [dmgej.tmp] C:\Windows\system32\dmgej.tmp
O4 - HKCU\..\Run: [dmwjj.tmp] C:\Windows\system32\dmwjj.tmp
O4 - HKCU\..\Run: [dmrio.tmp] C:\Windows\system32\dmrio.tmp
O4 - HKCU\..\Run: [dmghj.tmp] C:\Windows\system32\dmghj.tmp
O4 - HKCU\..\Run: [dmmkn.tmp] C:\Windows\system32\dmmkn.tmp
O4 - HKCU\..\Run: [dmwdc.tmp] C:\Windows\system32\dmwdc.tmp
O4 - HKCU\..\Run: [dmksc.tmp] C:\Windows\system32\dmksc.tmp
O4 - HKCU\..\Run: [dmczp.tmp] C:\Windows\system32\dmczp.tmp
O4 - HKCU\..\Run: [dmcup.tmp] C:\Windows\system32\dmcup.tmp
O4 - HKCU\..\Run: [dmhyz.tmp] C:\Windows\system32\dmhyz.tmp
O4 - HKCU\..\Run: [dmwuc.tmp] C:\Windows\system32\dmwuc.tmp
O4 - HKCU\..\Run: [dmssf.tmp] C:\Windows\system32\dmssf.tmp
O4 - HKCU\..\Run: [dmipp.tmp] C:\Windows\system32\dmipp.tmp
O4 - HKCU\..\Run: [dmycw.tmp] C:\Windows\system32\dmycw.tmp
O4 - HKCU\..\Run: [dmsxi.tmp] C:\Windows\system32\dmsxi.tmp
O4 - HKCU\..\Run: [dmqod.tmp] C:\Windows\system32\dmqod.tmp
O4 - HKCU\..\Run: [dmedo.tmp] C:\Windows\system32\dmedo.tmp
O4 - HKCU\..\Run: [dmpzd.tmp] C:\Windows\system32\dmpzd.tmp
O4 - HKCU\..\Run: [dmmuc.tmp] C:\Windows\system32\dmmuc.tmp
O4 - HKCU\..\Run: [dmmor.tmp] C:\Windows\system32\dmmor.tmp
O4 - HKCU\..\Run: [dmcag.tmp] C:\Windows\system32\dmcag.tmp
O4 - HKCU\..\Run: [dmnbw.tmp] C:\Windows\system32\dmnbw.tmp
O4 - HKCU\..\Run: [dmqtf.tmp] C:\Windows\system32\dmqtf.tmp
O4 - HKCU\..\Run: [dmfnt.tmp] C:\Windows\system32\dmfnt.tmp
O4 - HKCU\..\Run: [dmdan.tmp] C:\Windows\system32\dmdan.tmp
O4 - HKCU\..\Run: [dmzhp.tmp] C:\Windows\system32\dmzhp.tmp
O4 - HKCU\..\Run: [dmcat.tmp] C:\Windows\system32\dmcat.tmp
O4 - HKCU\..\Run: [dmtbu.tmp] C:\Windows\system32\dmtbu.tmp
O4 - HKCU\..\Run: [dmbxl.tmp] C:\Windows\system32\dmbxl.tmp
O4 - HKCU\..\Run: [dmajk.tmp] C:\Windows\system32\dmajk.tmp
O4 - HKCU\..\Run: [dmqvx.tmp] C:\Windows\system32\dmqvx.tmp
O4 - HKCU\..\Run: [dmwnc.tmp] C:\Windows\system32\dmwnc.tmp
O4 - HKCU\..\Run: [dmlwq.tmp] C:\Windows\system32\dmlwq.tmp
O4 - HKCU\..\Run: [dmrab.tmp] C:\Windows\system32\dmrab.tmp
O4 - HKCU\..\Run: [dmbyl.tmp] C:\Windows\system32\dmbyl.tmp
O4 - HKCU\..\Run: [dmwnl.tmp] C:\Windows\system32\dmwnl.tmp
O4 - HKCU\..\Run: [dmpix.tmp] C:\Windows\system32\dmpix.tmp
O4 - HKCU\..\Run: [dmezt.tmp] C:\Windows\system32\dmezt.tmp
O4 - HKCU\..\Run: [dmgjw.tmp] C:\Windows\system32\dmgjw.tmp
O4 - HKCU\..\Run: [dmgia.tmp] C:\Windows\system32\dmgia.tmp
O4 - HKCU\..\Run: [dmcfb.tmp] C:\Windows\system32\dmcfb.tmp
O4 - HKCU\..\Run: [dmqay.tmp] C:\Windows\system32\dmqay.tmp
O4 - HKCU\..\Run: [dmxnv.tmp] C:\Windows\system32\dmxnv.tmp
O4 - HKCU\..\Run: [dmesa.tmp] C:\Windows\system32\dmesa.tmp
O4 - HKCU\..\Run: [dmkbf.tmp] C:\Windows\system32\dmkbf.tmp
O4 - HKCU\..\Run: [dmiii.tmp] C:\Windows\system32\dmiii.tmp
O4 - HKCU\..\Run: [dmsmu.tmp] C:\Windows\system32\dmsmu.tmp
O4 - HKCU\..\Run: [dmzlu.tmp] C:\Windows\system32\dmzlu.tmp
O4 - HKCU\..\Run: [dmxix.tmp] C:\Windows\system32\dmxix.tmp
O4 - HKCU\..\Run: [dmhpd.tmp] C:\Windows\system32\dmhpd.tmp
O4 - HKCU\..\Run: [dmcdq.tmp] C:\Windows\system32\dmcdq.tmp
O4 - HKCU\..\Run: [dmieb.tmp] C:\Windows\system32\dmieb.tmp
O4 - HKCU\..\Run: [dmqna.tmp] C:\Windows\system32\dmqna.tmp
O4 - HKCU\..\Run: [dmuoi.tmp] C:\Windows\system32\dmuoi.tmp
O4 - HKCU\..\Run: [dmiiy.tmp] C:\Windows\system32\dmiiy.tmp
O4 - HKCU\..\Run: [dmpnh.tmp] C:\Windows\system32\dmpnh.tmp
O4 - HKCU\..\Run: [dmtbp.tmp] C:\Windows\system32\dmtbp.tmp
O4 - HKCU\..\Run: [dmlmj.tmp] C:\Windows\system32\dmlmj.tmp
O4 - HKCU\..\Run: [dmfqu.tmp] C:\Windows\system32\dmfqu.tmp
O4 - HKCU\..\Run: [dmivp.tmp] C:\Windows\system32\dmivp.tmp
O4 - HKCU\..\Run: [dmpmx.tmp] C:\Windows\system32\dmpmx.tmp
O4 - HKCU\..\Run: [dmrjk.tmp] C:\Windows\system32\dmrjk.tmp
O4 - HKCU\..\Run: [dmkbh.tmp] C:\Windows\system32\dmkbh.tmp
O4 - HKCU\..\Run: [dmsuc.tmp] C:\Windows\system32\dmsuc.tmp
O4 - HKCU\..\Run: [dmbsj.tmp] C:\Windows\system32\dmbsj.tmp
O4 - HKCU\..\Run: [dmwta.tmp] C:\Windows\system32\dmwta.tmp
O4 - HKCU\..\Run: [dmjkl.tmp] C:\Windows\system32\dmjkl.tmp
O4 - HKCU\..\Run: [dmrrr.tmp] C:\Windows\system32\dmrrr.tmp
O4 - HKCU\..\Run: [dmfea.tmp] C:\Windows\system32\dmfea.tmp
O4 - HKCU\..\Run: [dmeow.tmp] C:\Windows\system32\dmeow.tmp
O4 - HKCU\..\Run: [dmzch.tmp] C:\Windows\system32\dmzch.tmp
O4 - HKCU\..\Run: [dmyyk.tmp] C:\Windows\system32\dmyyk.tmp
O4 - HKCU\..\Run: [dmktc.tmp] C:\Windows\system32\dmktc.tmp
O4 - HKCU\..\Run: [dmpts.tmp] C:\Windows\system32\dmpts.tmp
O4 - HKCU\..\Run: [dmfvt.tmp] C:\Windows\system32\dmfvt.tmp
O4 - HKCU\..\Run: [dmacf.tmp] C:\Windows\system32\dmacf.tmp
O4 - HKCU\..\Run: [dmsnw.tmp] C:\Windows\system32\dmsnw.tmp
O4 - HKCU\..\Run: [dmjni.tmp] C:\Windows\system32\dmjni.tmp
O4 - HKCU\..\Run: [dmigx.tmp] C:\Windows\system32\dmigx.tmp
O4 - HKCU\..\Run: [WMPNSCFG] C:\Program Files\Windows Media Player\WMPNSCFG.exe
O4 - HKCU\..\Run: [fumkdk] c:\users\alain\appdata\local\fumkdk.exe fumkdk
O4 - HKCU\..\Run: [WinSpywareProtect] "C:\ProgramData\Adsl Software Ltd\WinSpywareProtect



c'est tous les programmes que tu as au demarrage !
menu demarrer
executer
msconfig
demarrage
et desactive tous les programmes qui finissent par .tmp
desactive WinSpywareProtect] "C:\ProgramData\Adsl Software Ltd\WinSpywareProtect
et ça WinSpywareProtect] "C:\ProgramData\Adsl Software Ltd\WinSpywareProtect
0