| ||||||||
Bonsoir, De plus mon pc chauffe beaucoup, j'ai acheté une tablette ventilée et mis un coup d'air sec dans le ventilateur lorsque mon pc était complétement à l'arret. Il y'a de l'amélioration mais il me semble encore plus chaud que la normal. Mon ordinateur est un portable Samsung R720 sous windows 7 et a environ 4 ans. # AdwCleaner v2.114 - Rapport créé le 16/03/2013 à 23:51:00
| ||||||||
Publicité | ||||||||
| ||||||||
Fichier joint : ZHPDiag.txt | ||||||||
Je viens aussi de joindre le rapport ZHP. | ||||||||
Groupe Sécurité ![]() | Huan a écrit :
Je regarde ton log ZHPDiag @+ | |||||||
Ca marche, merci ! | ||||||||
Groupe Sécurité ![]() |
C'est chargé ! 1/ Lance ZHPFix par l'icône sur le bureau, avec élévation des privilèges pour Vista et Windows 7/8( Clic droit exécuter en tant qu'administrateur ) ![]()
Code
P2 - FPN: [HKLM] [@pandonetworks.com/PandoWebPlugin] - (...) -- C:\Program Files\Pando Networks\Media Booster\npPandoWebPlugin.dll (.not file.) => Pando Networks Media Booster
O4 - HKLM\..\RunOnce: [FsVdInstReboot] Clé orpheline => Orphean Key not necessary O4 - HKLM\..\RunOnce: [FsVdUnReboot] Clé orpheline => Orphean Key not necessary [MD5.00000000000000000000000000000000] [APT] [19afe388] (...) -- C:\Users\Sparda\AppData\Local\Temp\setup1796326608.exe (.not file.) [0] => Empty File not necessary [MD5.00000000000000000000000000000000] [APT] [571a1b60] (...) -- C:\Users\Sparda\AppData\Local\Temp\setup1345237280.exe (.not file.) [0] => Empty File not necessary [MD5.00000000000000000000000000000000] [APT] [9f4fe488] (...) -- C:\Users\Sparda\AppData\Local\Temp\setup61827224.exe (.not file.) [0] => Empty File not necessary [MD5.00000000000000000000000000000000] [APT] [{16C2D050-F7EF-42DB-9F39-2E0DEBB94DCF}] (...) -- E:\BASW-00507A\setup.exe (.not file.) [0] => Empty File not necessary O42 - Logiciel: Java 6 Update 13 - (.Sun Microsystems, Inc..) [HKLM] -- {26A24AE4-039D-4CA4-87B4-2F83216013F0} => Sun Microsystems [HKCU\Software\AVAST Software] => AVAST Software [HKCU\Software\F-Secure] [HKCU\Software\MCAFEE] [HKCU\Software\Pando Networks] => P2P.Pando [HKCU\Software\SweetIM] => Infection PUP (PUP.SweetIM)* [HKCU\Software\YahooPartnerToolbar] => Toolbar.Yahoo [HKCU\Software\wscontb] => Toolbar.Agent [HKLM\Software\McAfee] [HKLM\Software\Pando Networks] => P2P.Pando [HKLM\Software\SweetIM] => Infection PUP (PUP.SweetIM)* O43 - CFD: 01/03/2011 - 13:21:54 - [0] ----D C:\Program Files\AVAST Software => AVAST Software O43 - CFD: 22/09/2012 - 23:50:01 - [0] ----D C:\Program Files\Pando Networks => P2P.Pando O43 - CFD: 16/03/2013 - 19:23:29 - [0] ----D C:\Program Files\WebSearch => Infection PUP (PUP.Browse2Save) O43 - CFD: 15/03/2013 - 18:37:50 - [0] ----D C:\ProgramData\AVAST Software => AVAST Software O43 - CFD: 12/12/2011 - 12:47:55 - [0] ----D C:\Users\Sparda\AppData\Local\PackageAware => InstallAware Software Corp. O45 - LFCP:[MD5.D4D7D42B2751BEF9F331906ACB2C8F1A] - 14/03/2013 - 12:06:49 ---A- - C:\Windows\Prefetch\SWEETPACKSUPDATEMANAGER.EXE-97D3A175.pf => Infection PUP (PUP.SweetIM)* O61 - LFC: 01/03/2007 - 06:01:00 ---A- C:\Users\Sparda\AppData\Local\Temp\SDX4400_W2K_655EDFGIPS_s\WINVISTA_XP_2K\COMMON\E_S8I0A7.EX_ [91557] => Infection MagicControl (Possible) O61 - LFC: 02/06/2009 - 15:59:02 ---A- C:\Users\Sparda\AppData\Local\Temp\SDX4400_W2K_655EDFGIPS_s\WINVISTA_XP_2K\COMMON\E_DUPA20.EX_ [150552] => Infection MagicControl (Possible) O61 - LFC: 04/06/2008 - 06:03:00 ---A- C:\Users\Sparda\AppData\Local\Temp\SDX4400_W2K_655EDFGIPS_s\WINVISTA_XP_2K\DEUTSCH\E_S8X0A7.DA_ [1318] => Infection MagicControl (Possible) O61 - LFC: 04/06/2008 - 06:03:00 ---A- C:\Users\Sparda\AppData\Local\Temp\SDX4400_W2K_655EDFGIPS_s\WINVISTA_XP_2K\ENGLISH\E_S8X0A7.DA_ [1318] => Infection MagicControl (Possible) O61 - LFC: 04/06/2008 - 06:03:00 ---A- C:\Users\Sparda\AppData\Local\Temp\SDX4400_W2K_655EDFGIPS_s\WINVISTA_XP_2K\ESPANOL\E_S8X0A7.DA_ [1318] => Infection MagicControl (Possible) O61 - LFC: 04/06/2008 - 06:03:00 ---A- C:\Users\Sparda\AppData\Local\Temp\SDX4400_W2K_655EDFGIPS_s\WINVISTA_XP_2K\FRANCAIS\E_S8X0A7.DA_ [1318] => Infection MagicControl (Possible) O61 - LFC: 04/06/2008 - 06:03:00 ---A- C:\Users\Sparda\AppData\Local\Temp\SDX4400_W2K_655EDFGIPS_s\WINVISTA_XP_2K\ITALIANO\E_S8X0A7.DA_ [1318] => Infection MagicControl (Possible) O61 - LFC: 04/06/2008 - 06:03:00 ---A- C:\Users\Sparda\AppData\Local\Temp\SDX4400_W2K_655EDFGIPS_s\WINVISTA_XP_2K\NEDERLND\E_S8X0A7.DA_ [1318] => Infection MagicControl (Possible) O61 - LFC: 04/06/2008 - 06:03:00 ---A- C:\Users\Sparda\AppData\Local\Temp\SDX4400_W2K_655EDFGIPS_s\WINVISTA_XP_2K\PORTUGAL\E_S8X0A7.DA_ [1318] => Infection MagicControl (Possible) O61 - LFC: 09/02/2007 - 03:00:00 ---A- C:\Users\Sparda\AppData\Local\Temp\SDX4400_W2K_655EDFGIPS_s\WINVISTA_XP_2K\COMMON\E_DP130E.DA_ [129] => Infection MagicControl (Possible) O61 - LFC: 10/03/2009 - 04:00:00 ---A- C:\Users\Sparda\AppData\Local\Temp\SDX4400_W2K_655EDFGIPS_s\WINVISTA_XP_2K\COMMON\E_DPPE06.EX_ [100737] => Infection MagicControl (Possible) O61 - LFC: 11/01/2007 - 04:02:00 ---A- C:\Users\Sparda\AppData\Local\Temp\SDX4400_W2K_655EDFGIPS_s\WINVISTA_XP_2K\COMMON\E_S40RP7.EX_ [59293] => Infection MagicControl (Possible) O61 - LFC: 15/03/2013 - 10:44:28 ---A- C:\Users\Sparda\AppData\Local\Temp\~DF7EFA1AB8B6F8BBD1.TMP [1536] => Infection MagicControl (Possible) O61 - LFC: 15/03/2013 - 18:40:17 ---A- C:\Users\Sparda\Downloads\mseinstall32.exe [11120080] => Infection MagicControl (Possible) O61 - LFC: 15/03/2013 - 23:27:26 -SHA- C:\Users\Sparda\AppData\Local\Temp\acro_rd_dir\Fichiers Internet temporaires\Content.IE5\index.dat [32768] => Infection MagicControl (Possible) O61 - LFC: 15/03/2013 - 23:27:26 -SHA- C:\Users\Sparda\AppData\Local\Temp\acro_rd_dir\History\History.IE5\index.dat [16384] => Infection MagicControl (Possible) O61 - LFC: 15/03/2013 - 23:27:27 ---A- C:\Users\Sparda\AppData\Local\Temp\plugtmp-79\plugin-1 [0] => Infection MagicControl (Possible) O61 - LFC: 16/03/2013 - 16:10:37 ---A- C:\Users\Sparda\AppData\Local\Temp\haurnote.txt [192] => Infection MagicControl (Possible) O61 - LFC: 16/03/2013 - 16:27:39 ---A- C:\Users\Sparda\AppData\Local\Temp\plugtmp\plugin-1 [0] => Infection MagicControl (Possible) O61 - LFC: 16/03/2013 - 16:34:06 ---A- C:\Users\Sparda\AppData\Local\Temp\Bst_Guid_Backup [36] => Infection MagicControl (Possible) O61 - LFC: 16/03/2013 - 16:34:26 ---A- C:\Users\Sparda\AppData\Local\Temp\MSI49c7d.LOG [369810] => Infection MagicControl (Possible) O61 - LFC: 16/03/2013 - 19:11:34 ---A- C:\Users\Sparda\AppData\Local\Temp\MSI49c7e.LOG [422] => Infection MagicControl (Possible) O61 - LFC: 16/03/2013 - 23:43:51 -SHA- C:\Users\Sparda\AppData\Roaming\Thumbs.db [30208] => Infection MagicControl (Possible) O61 - LFC: 16/06/2009 - 07:05:00 ---A- C:\Users\Sparda\AppData\Local\Temp\SDX4400_W2K_655EDFGIPS_s\WINVISTA_XP_2K\COMMON\EPUPDATE.EX_ [362188] => Infection MagicControl (Possible) O61 - LFC: 17/11/2006 - 06:00:00 ---A- C:\Users\Sparda\AppData\Local\Temp\SDX4400_W2K_655EDFGIPS_s\WINVISTA_XP_2K\COMMON\E_DM1CAE.DA_ [417] => Infection MagicControl (Possible) O61 - LFC: 17/12/2007 - 01:03:00 ---A- C:\Users\Sparda\AppData\Local\Temp\SDX4400_W2K_655EDFGIPS_s\WINVISTA_XP_2K\COMMON\E_SIACS7.EX_ [83689] => Infection MagicControl (Possible) O61 - LFC: 20/12/2006 - 05:00:00 ---A- C:\Users\Sparda\AppData\Local\Temp\SDX4400_W2K_655EDFGIPS_s\WINVISTA_XP_2K\COMMON\E_S40MT7.EX_ [87122] => Infection MagicControl (Possible) O61 - LFC: 22/01/2007 - 10:03:00 ---A- C:\Users\Sparda\AppData\Local\Temp\SDX4400_W2K_655EDFGIPS_s\WINVISTA_XP_2K\COMMON\EPUTY287.EX_ [56315] => Infection MagicControl (Possible) O61 - LFC: 24/04/2009 - 00:00:00 ---A- C:\Users\Sparda\AppData\Local\Temp\SDX4400_W2K_655EDFGIPS_s\WINVISTA_XP_2K\DEUTSCH\EPUPDATE.DA_ [52316] => Infection MagicControl (Possible) O61 - LFC: 24/04/2009 - 00:00:00 ---A- C:\Users\Sparda\AppData\Local\Temp\SDX4400_W2K_655EDFGIPS_s\WINVISTA_XP_2K\ENGLISH\EPUPDATE.DA_ [52316] => Infection MagicControl (Possible) O61 - LFC: 24/04/2009 - 00:00:00 ---A- C:\Users\Sparda\AppData\Local\Temp\SDX4400_W2K_655EDFGIPS_s\WINVISTA_XP_2K\ESPANOL\EPUPDATE.DA_ [52316] => Infection MagicControl (Possible) O61 - LFC: 24/04/2009 - 00:00:00 ---A- C:\Users\Sparda\AppData\Local\Temp\SDX4400_W2K_655EDFGIPS_s\WINVISTA_XP_2K\FRANCAIS\EPUPDATE.DA_ [52316] => Infection MagicControl (Possible) O61 - LFC: 24/04/2009 - 00:00:00 ---A- C:\Users\Sparda\AppData\Local\Temp\SDX4400_W2K_655EDFGIPS_s\WINVISTA_XP_2K\ITALIANO\EPUPDATE.DA_ [52316] => Infection MagicControl (Possible) O61 - LFC: 24/04/2009 - 00:00:00 ---A- C:\Users\Sparda\AppData\Local\Temp\SDX4400_W2K_655EDFGIPS_s\WINVISTA_XP_2K\NEDERLND\EPUPDATE.DA_ [52316] => Infection MagicControl (Possible) O61 - LFC: 24/04/2009 - 00:00:00 ---A- C:\Users\Sparda\AppData\Local\Temp\SDX4400_W2K_655EDFGIPS_s\WINVISTA_XP_2K\PORTUGAL\EPUPDATE.DA_ [52316] => Infection MagicControl (Possible) O61 - LFC: 25/01/2007 - 05:00:00 ---A- C:\Users\Sparda\AppData\Local\Temp\SDX4400_W2K_655EDFGIPS_s\WINVISTA_XP_2K\COMMON\E_S40RN7.EX_ [81521] => Infection MagicControl (Possible) O61 - LFC: 28/11/2007 - 01:15:00 ---A- C:\Users\Sparda\AppData\Local\Temp\SDX4400_W2K_655EDFGIPS_s\WINVISTA_XP_2K\COMMON\SAGENT4.EX_ [58285] => Infection MagicControl (Possible) O61 - LFC: 30/09/2002 - 19:47:58 ---A- C:\Users\Sparda\AppData\Local\Temp\SDX4400_W2K_655EDFGIPS_s\WINVISTA_XP_2K\COMMON\EBPSAGT4.DA_ [110] => Infection MagicControl (Possible) O69 - SBI: prefs.js [Sparda - iq1ci7cz.default] user_pref("extensions.enabledAddons", "illimitux%40illimitux.net:4.3,%7BCAFEEFAC-0016-0000-0035-ABCDEFFEDCBA%7D:6.0.35,anttoolbar%[...] => CrackStreaming.Illimitux* O69 - SBI: prefs.js [Sparda - iq1ci7cz.default] user_pref("extensions.illimitux.illimitux_backup_http", ""); => CrackStreaming.Illimitux* O69 - SBI: prefs.js [Sparda - iq1ci7cz.default] user_pref("extensions.illimitux.illimitux_backup_port", 8080); => CrackStreaming.Illimitux* O69 - SBI: prefs.js [Sparda - iq1ci7cz.default] user_pref("extensions.illimitux.illimitux_backup_referer", 2); => CrackStreaming.Illimitux* O69 - SBI: prefs.js [Sparda - iq1ci7cz.default] user_pref("extensions.illimitux.illimitux_backup_type", 2); => CrackStreaming.Illimitux* O69 - SBI: prefs.js [Sparda - iq1ci7cz.default] user_pref("extensions.illimitux.ilx_firsttime_4.3_", false); => CrackStreaming.Illimitux* O69 - SBI: prefs.js [Sparda - iq1ci7cz.default] user_pref("extensions.illimitux.ilx_mu_auto", ""); => CrackStreaming.Illimitux* O69 - SBI: prefs.js [Sparda - iq1ci7cz.default] user_pref("extensions.illimitux.ilx_pref_auto", true); => CrackStreaming.Illimitux* O69 - SBI: prefs.js [Sparda - iq1ci7cz.default] user_pref("extensions.illimitux.ilx_pref_box", true); => CrackStreaming.Illimitux* O69 - SBI: prefs.js [Sparda - iq1ci7cz.default] user_pref("extensions.illimitux.ilx_pref_captcha", true); => CrackStreaming.Illimitux* O69 - SBI: prefs.js [Sparda - iq1ci7cz.default] user_pref("extensions.illimitux.ilx_pref_divx", true); => CrackStreaming.Illimitux* O69 - SBI: prefs.js [Sparda - iq1ci7cz.default] user_pref("extensions.illimitux.ilx_pref_embed", true); => CrackStreaming.Illimitux* O69 - SBI: prefs.js [Sparda - iq1ci7cz.default] user_pref("extensions.illimitux.ilx_pref_proxy", true); => CrackStreaming.Illimitux* O69 - SBI: prefs.js [Sparda - iq1ci7cz.default] user_pref("extensions.illimitux.ilx_pref_pt_4s", true); => CrackStreaming.Illimitux* O69 - SBI: prefs.js [Sparda - iq1ci7cz.default] user_pref("extensions.illimitux.ilx_pref_pt_captcha", true); => CrackStreaming.Illimitux* O69 - SBI: prefs.js [Sparda - iq1ci7cz.default] user_pref("extensions.illimitux.ilx_pref_pt_mp", true); => CrackStreaming.Illimitux* O69 - SBI: prefs.js [Sparda - iq1ci7cz.default] user_pref("extensions.illimitux.ilx_pref_pt_mu", true); => CrackStreaming.Illimitux* O69 - SBI: prefs.js [Sparda - iq1ci7cz.default] user_pref("extensions.illimitux.ilx_pref_pt_mv", true); => CrackStreaming.Illimitux* O69 - SBI: prefs.js [Sparda - iq1ci7cz.default] user_pref("extensions.illimitux.ilx_pref_pt_rs", true); => CrackStreaming.Illimitux* O69 - SBI: prefs.js [Sparda - iq1ci7cz.default] user_pref("extensions.illimitux.ilx_pref_pt_rs1", true); => CrackStreaming.Illimitux* O69 - SBI: prefs.js [Sparda - iq1ci7cz.default] user_pref("extensions.illimitux.ilx_pref_pt_veoh", true); => CrackStreaming.Illimitux* O69 - SBI: prefs.js [Sparda - iq1ci7cz.default] user_pref("extensions.illimitux.ilx_pref_pt_zs", true); => CrackStreaming.Illimitux* O69 - SBI: prefs.js [Sparda - iq1ci7cz.default] user_pref("extensions.illimitux.ilx_pref_referer", true); => CrackStreaming.Illimitux* O69 - SBI: prefs.js [Sparda - iq1ci7cz.default] user_pref("extensions.illimitux.ilx_pref_rs", true); => CrackStreaming.Illimitux* O69 - SBI: prefs.js [Sparda - iq1ci7cz.default] user_pref("extensions.illimitux.ilx_pref_tab", true); => CrackStreaming.Illimitux* O69 - SBI: prefs.js [Sparda - iq1ci7cz.default] user_pref("extensions.illimitux.ilx_pref_zapmu", true); => CrackStreaming.Illimitux* O69 - SBI: prefs.js [Sparda - iq1ci7cz.default] user_pref("extensions.illimitux.locale", "fr"); => CrackStreaming.Illimitux* [MD5.7F7805ECBFFB0F9EDC440404D9E8313A] [SPRF][20/05/2009] (...) -- C:\Users\Sparda\AppData\Local\Temp\aoe3y-102-french.exe [18551829] => Infection MagicControl (Possible) [MD5.E60A8E3889DF3C95E5F8FE2473DB889E] [SPRF][20/03/2010] (...) -- C:\Users\Sparda\AppData\Local\Temp\CmdLineExt02.dll [36864] => Infection MagicControl (Possible) [MD5.68F5FCC916BF4EC1ECC142CB498C4FF6] [SPRF][09/03/2011] (...) -- C:\Users\Sparda\AppData\Local\Temp\ecrnamwsxo.exe [64915] => Infection MagicControl (Possible) [MD5.538CEDA4040348EE7DE3BD43374A2B80] [SPRF][18/06/2011] (...) -- C:\Users\Sparda\AppData\Local\Temp\FFSetupSoftonic270.exe [38713788] => Toolbar.Conduit* [MD5.7E2500FE46A2F97C3EC9BF012B72461C] [SPRF][16/07/2010] (.Hewlett-Packard - Pas de description.) -- C:\Users\Sparda\AppData\Local\Temp\ludiPluginLauncher.exe [20480] => Infection MagicControl (Possible) [MD5.7F618DE74A13569C1A15641094D57068] [SPRF][16/07/2010] (...) -- C:\Users\Sparda\AppData\Local\Temp\ludiPluginSetup.exe [637392] => Infection MagicControl (Possible) [MD5.8A4AF3B0695F29186AD02E2FD766FA3B] [SPRF][22/12/2012] (.SweetIM Technologies Ltd. - SQLite DLL.) -- C:\Users\Sparda\AppData\Local\Temp\mgsqlite3.dll [393016] => [MD5.694F54BD227916B89FC3EB1DB53F0685] [SPRF][30/05/2011] (.Creative Labs Inc. - OpenAL Installer.) -- C:\Users\Sparda\AppData\Local\Temp\oalinst.exe [809496] => Infection MagicControl (Possible) [MD5.1C0C43AE9C263D874F2D52F4CB906FBE] [SPRF][20/12/2012] (...) -- C:\Users\Sparda\AppData\Local\Temp\SCC.dll [327871] => Infection MagicControl (Possible) [MD5.51151D3AD8DA0DFA0E7A681AA2FF8870] [SPRF][04/03/2013] (...) -- C:\Users\Sparda\AppData\Local\Temp\sfareca00001.dll [158720] => Infection MagicControl (Possible) [MD5.51151D3AD8DA0DFA0E7A681AA2FF8870] [SPRF][04/03/2013] (...) -- C:\Users\Sparda\AppData\Local\Temp\sfareca00002.dll [158720] => Infection MagicControl (Possible) [MD5.C9BD18FE122DFF55C141522C9782718E] [SPRF][22/12/2012] (.SweetIM Technologies Ltd. - SweetIM Installer by SweetPacks.) -- C:\Users\Sparda\AppData\Local\Temp\Shortcut_sweetim_0711-adf025c2.exe [7767896] => Infection PUP (PUP.SweetIM)* [MD5.F888959350086A5C75976E4E97ED23CC] [SPRF][22/12/2012] (.SweetIM Technologies Lt - This installer.) -- C:\Users\Sparda\AppData\Local\Temp\SIMEEI2Installer.exe [2962432] => Infection PUP (PUP.SweetIM)* [MD5.7704B843006444B69486FD27D4660845] [SPRF][22/12/2012] (.SweetIM Technologies Lt - This installer.) -- C:\Users\Sparda\AppData\Local\Temp\SIMEEIInstaller.exe [3380216] => Infection PUP (PUP.SweetIM)* [MD5.638344EA55F0F01A8616C434880224A3] [SPRF][15/02/2008] (...) -- C:\Users\Sparda\AppData\Local\Temp\standalonepatcherY.exe [61440] => Infection MagicControl (Possible) [MD5.EFA7644FAF7D622D4122F983BCCB1749] [SPRF][30/01/2013] (...) -- C:\Users\Sparda\AppData\Local\Temp\tmp8486.exe [151040] => Infection MagicControl (Possible) [MD5.EFA7644FAF7D622D4122F983BCCB1749] [SPRF][30/01/2013] (...) -- C:\Users\Sparda\AppData\Local\Temp\tmpAA38.exe [151040] => Infection MagicControl (Possible) [MD5.06BD96D0D4CCF13ACE7906F496FD521B] [SPRF][30/01/2013] (.Pas de propriétaire - FastFileDownloader.) -- C:\Users\Sparda\AppData\Local\Temp\tmpB38C.exe [3047368] => Infection MagicControl (Possible) [MD5.EFA7644FAF7D622D4122F983BCCB1749] [SPRF][30/01/2013] (...) -- C:\Users\Sparda\AppData\Local\Temp\tmpB85B.exe [151040] => Infection MagicControl (Possible) [MD5.EFA7644FAF7D622D4122F983BCCB1749] [SPRF][30/01/2013] (...) -- C:\Users\Sparda\AppData\Local\Temp\tmpCB3F.exe [151040] => Infection MagicControl (Possible) [MD5.EFA7644FAF7D622D4122F983BCCB1749] [SPRF][30/01/2013] (...) -- C:\Users\Sparda\AppData\Local\Temp\tmpE066.exe [151040] => Infection MagicControl (Possible) [MD5.EFA7644FAF7D622D4122F983BCCB1749] [SPRF][30/01/2013] (...) -- C:\Users\Sparda\AppData\Local\Temp\tmpE23C.exe [151040] => Infection MagicControl (Possible) [MD5.B2442E25949A5EA619A44B2AC213503D] [SPRF][30/01/2013] (.Amonetize ltd. - Software version updater.) -- C:\Users\Sparda\AppData\Local\Temp\UpdUninstall.exe [300584] => [MD5.E69425B44416761178538CCE849FAC19] [SPRF][22/12/2012] (...) -- C:\Users\Sparda\AppData\Local\Temp\wajam_install.exe [417384] => Toolbar.Wajam* [MD5.3C061123B9086C248CB32AD84AE40689] [SPRF][20/05/2003] (.Blizzard Entertainment - Frozen Throne Installer.) -- C:\Users\Sparda\AppData\Local\Temp\war3_Install.exe [307200] => Infection MagicControl (Possible) [MD5.AE7E0C99C5BC7D28325C0CD7885C851F] [SPRF][24/10/2012] (.Yontoo LLC - Installer.) -- C:\Users\Sparda\AppData\Local\Temp\YontooSetup-S.exe [1062504] => Infection PUP (Adware.Yontoo)* O87 - FAEL: "TCP Query User{C201CE6E-4A77-45EC-884C-0649F71ED259}C:\users\sparda\tmnationsforever\tmforever.exe" |In - Private - P6 - TRUE | .(...) -- C:\users\sparda\tmnationsforever\tmforever.exe (.not file.) => Infection MagicControl (Possible) O87 - FAEL: "UDP Query User{F861C6CD-1253-46E0-98A5-545EA82C73AD}C:\users\sparda\tmnationsforever\tmforever.exe" |In - Private - P17 - TRUE | .(...) -- C:\users\sparda\tmnationsforever\tmforever.exe (.not file.) => Infection MagicControl (Possible) O87 - FAEL: "TCP Query User{45F78DD4-00A3-42E8-99A5-FB7BE4A650D9}D:\sauvegarde\downloads\counter-strike 1.6 nosteam v19\cs 1.6\hltv.exe" |In - Public - P6 - TRUE | .(...) -- D:\sauvegarde\downloads\counter-strike 1.6 nosteam v19\cs 1.6\hltv.exe (.not file.) => Infection MagicControl (Possible) O87 - FAEL: "UDP Query User{CA5F32BC-E8A7-4553-8A4A-64D2674747BE}D:\sauvegarde\downloads\counter-strike 1.6 nosteam v19\cs 1.6\hltv.exe" |In - Public - P17 - TRUE | .(...) -- D:\sauvegarde\downloads\counter-strike 1.6 nosteam v19\cs 1.6\hltv.exe (.not file.) => Infection MagicControl (Possible) O87 - FAEL: "TCP Query User{3041A978-E1D6-4107-A982-5FAA143E350A}D:\sauvegarde\downloads\counter-strike 1.6 nosteam v19\cs 1.6\hl.exe" |In - Public - P6 - TRUE | .(...) -- D:\sauvegarde\downloads\counter-strike 1.6 nosteam v19\cs 1.6\hl.exe (.not file.) => Infection MagicControl O87 - FAEL: "UDP Query User{17992183-8558-44B0-98BA-A99718B394A1}D:\sauvegarde\downloads\counter-strike 1.6 nosteam v19\cs 1.6\hl.exe" |In - Public - P17 - TRUE | .(...) -- D:\sauvegarde\downloads\counter-strike 1.6 nosteam v19\cs 1.6\hl.exe (.not file.) => Infection MagicControl O87 - FAEL: "TCP Query User{D1295E5F-FCBB-4A1C-AA01-4535FFDECFA5}D:\sauvegarde\downloads\warcraft iii 1.24b\warcraft iii 1.24b\war3.exe" |In - Private - P6 - TRUE | .(...) -- D:\sauvegarde\downloads\warcraft iii 1.24b\warcraft iii 1.24b\war3.exe (.not file.) => Infection MagicControl (Possible) O87 - FAEL: "UDP Query User{B6EF8C76-5DB1-4543-BED0-4A5EC4687094}D:\sauvegarde\downloads\warcraft iii 1.24b\warcraft iii 1.24b\war3.exe" |In - Private - P17 - TRUE | .(...) -- D:\sauvegarde\downloads\warcraft iii 1.24b\warcraft iii 1.24b\war3.exe (.not file.) => Infection MagicControl (Possible) O87 - FAEL: "TCP Query User{5AB5F79E-B0DE-4AA9-8925-A8CE06F064D1}C:\program files\maxima-5.25.1\bin\xmaxima.exe" |In - Private - P6 - TRUE | .(...) -- C:\program files\maxima-5.25.1\bin\xmaxima.exe (.not file.) => Infection MagicControl O87 - FAEL: "UDP Query User{CE768F8F-57A3-4F95-9500-F85ECB88C02C}C:\program files\maxima-5.25.1\bin\xmaxima.exe" |In - Private - P17 - TRUE | .(...) -- C:\program files\maxima-5.25.1\bin\xmaxima.exe (.not file.) => Infection MagicControl O87 - FAEL: "TCP Query User{B902A7E6-696D-45B1-81D0-FF214DDB677B}C:\users\sparda\tmnationsforever\tmforever.exe" |In - Public - P6 - TRUE | .(...) -- C:\users\sparda\tmnationsforever\tmforever.exe (.not file.) => Infection MagicControl (Possible) O87 - FAEL: "UDP Query User{2A82E5B1-62C6-4E65-A84B-0A7A3CC2BC4D}C:\users\sparda\tmnationsforever\tmforever.exe" |In - Public - P17 - TRUE | .(...) -- C:\users\sparda\tmnationsforever\tmforever.exe (.not file.) => Infection MagicControl (Possible) O87 - FAEL: "{8618BFDE-CCA7-44E3-BAC6-5205AE297765}" |In - Private - P6 - TRUE | .(...) -- C:\Program Files\SweetIM\Communicator\SweetPacksUpdateManager.exe (.not file.) => Infection PUP (PUP.SweetIM)* O87 - FAEL: "{2346DF56-DBBA-4B20-B83D-005E0ACF3070}" |In - Private - P17 - TRUE | .(...) -- C:\Program Files\SweetIM\Communicator\SweetPacksUpdateManager.exe (.not file.) => Infection PUP (PUP.SweetIM)* O87 - FAEL: "TCP Query User{31EF1C1B-FAB9-45CE-BE38-A3A6407BCB29}C:\users\sparda\downloads\hub\ptokax.exe" | In - Private - P6 - TRUE | .(...) -- C:\users\sparda\downloads\hub\ptokax.exe => Infection MagicControl (Possible) O87 - FAEL: "UDP Query User{E7AAD87B-09E9-45C1-815D-DBD86573FB56}C:\users\sparda\downloads\hub\ptokax.exe" | In - Private - P17 - TRUE | .(...) -- C:\users\sparda\downloads\hub\ptokax.exe => Infection MagicControl (Possible) [HKLM\Software\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\DF94592A3F56C0445A25B61841FC13D9] => Toolbar.Skipe [HKCU\Software\SweetIM] => Infection PUP (PUP.SweetIM)* [HKLM\Software\SweetIM] => Infection PUP (PUP.SweetIM)* [HKCU\Software\wscontb] => Toolbar.Agent [HKCU\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}] => Toolbar.Bing [HKLM\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}] => Toolbar.Bing C:\Program Files\WebSearch => Infection PUP (PUP.Browse2Save) C:\Users\Sparda\AppData\Local\Google\Chrome\User Data\Default\Extensions\niapdbllcanepiiimjjndipklodoedlc => Infection PUP (Adware.Yontoo) C:\Users\Sparda\AppData\Local\Temp\Shortcut_sweetim_0711-adf025c2.exe => Infection PUP (PUP.SweetIM)* C:\Users\Sparda\AppData\Local\Temp\SIMEEI2Installer.exe => Infection PUP (PUP.SweetIM) C:\Users\Sparda\AppData\Local\Temp\SIMEEIInstaller.exe => Infection PUP (PUP.SweetIM) C:\Users\Sparda\AppData\Local\Temp\YontooSetup-S.exe => Infection PUP (Adware.Yontoo)* C:\Users\Sparda\AppData\Local\Temp\wajam_install.exe => Toolbar.Wajam* C:\Users\Sparda\AppData\Local\Temp\mgsqlite3.dll => Infection PUP (PUP.SweetIM) EmptyCLSID Emptytemp EmptyFlash
Note: Si l'UAC est active, après le clic sur "GO", un message va apparaître du style "Voulez-vous autoriser le programme...." qu'il faudra valider : Puis ZHPFix se relance, il faudra à nouveau cliquer sur le bouton "Presse-papier" pour coller les lignes, puis sur le bouton "GO" Une fois le résultat affiché, clique sur la croix rouge pour refermer l'outil (en haut à doite).
http://www.general-changelog-team.fr/fr/downloads/viewcategory/15-outils-de-el-desaparecido
/!\ Si blocage, désactiver temporairement l'antivirus
Recherche des infectionsClique sur le bouton " Recherche " Reviens dans ta réponse avec les deux rapports demandés
| |||||||
Fichier joint : ZHPFixReport.txt | ||||||||
voici le zhp par contre j'ai fermé le rappot usb fix par inadvertance j'en es relancé un. D'ailleurs comme demandé par le logiciel j'ai branché mon disque dur externe que j'utilise très rarement que je n'ai pas penser à nettoyer. Voici donc le deuxieme rapport usb fix : | ||||||||
Groupe Sécurité ![]() |
Relance USBFix /!\ Si cela bloque vers 14% =>
| |||||||
après désactivation de mon antivirus : | ||||||||
Groupe Sécurité ![]() |
Faut lire ce que je demande, tu as lancé USBFix en mode "Recherche", c'est pas ce que j'ai demandé! | |||||||
ah oui excuse moi je reboot en mode sans echec tout de suite et je t'envoie le rapport. | ||||||||
voilà le rapport : | ||||||||
Groupe Sécurité ![]() |
Passe ce scanner en ligne =>
| |||||||
Bon je pense que le scanner va encore durer longtemps. Je le posterai demain. | ||||||||
bah enfaite le voici : | ||||||||
Groupe Sécurité ![]() |
C:\Users\Sparda\AppData\Local\Google\Chrome\User Data\Default\Extensions\aepfnfcngdoclhamabgkjfcddahifhhg\1\510970f81ebce7.17524574.js Ok, deux profils de Chrome douteux et à supprimer Suppression des outils et rapports
Citation
DelFix va supprimer les outils utilisés pour cette désinfection.(quarantaines comprises)
DelFix va purger la restauration systéme potentiellement infectée et créer un nouveau point de restauration propre. Ce point de restauration sera nommé "Fin de désinfection" A l'issue Delfix s'auto-supprime.
Vous pouvez maintenant l'enregistrer et poster son contenu.
Modifié par Evasion60 le 18/03/2013 15:38 | |||||||
Bonjour, | ||||||||
|
Les bons plans du moment PC Astuces | Tous les Bons Plans | ||||||||||||||||||
|