Aller au contenu

Kalidas

Membres
  • Compteur de contenus

    43
  • Inscription

  • Dernière visite

Contact Methods

  • Website URL
    http://

Profile Information

  • Intérêts
    jazz sax alto et baryton

Autres informations

  • Mes langues
    français, anglais, bengali

Kalidas's Achievements

Member

Member (4/12)

0

Réputation sur la communauté

  1. Bonsoir ô Charles, J'ai suivi, sans problèmes, ta dernière procédure, c'est ok Compte sur moi pour suivre tes instructions de sécurité Merci à toi pour tout et merci à tous les autres intervenants, Pollux, Stonangel, Jack Burton,, Megataupe, Tesgaz, S. Birkoff !! J’ai énormément appris grâce à nos échanges, ce forum est formidable ! M'enfin tout de même, Charles, après toutes ces heures passées ensemble, tu me lâches comme ça sans une carte postale, pas même un petit coup de fil ?!!
  2. Oui Charles, C'est fait sauf qu' à l'étape e-spyad, clic sur le fichier ie-ads.reg, spy sweeper s'est ouvert avec un message de mise en garde, j'ai passé outre et j'ai pas vu "l'effet garanti par le message qui suit": rien n'a suivi !
  3. Bon Dieu, Charles, Non ? ce serait la fin du tunnel ??!! La lumière blanche au bout ? c'est vrai ?!! Dans mon réduit, je fais des bonds de 15 mètres ça faisait au moins 4 jours que je me dirigeais -au ralenti, façon moonwalk un coup en avant un coup en arrière, effets spéciaux garantis Spielberg et tout le toutim - vers mon frigo situé à , allez, trois mètres, pour faire sauter le champagne, un excellent Ruinart. Mais je m'égare. Ton "tu as bien bossé kalidas" a valeur d'adoubement royal. OK quarantaine Spy sweeper vidée. C'est vrai que les problèmes du tout début ont disparu Après le tri sur les logiciels téléchargés inutiles, on pourra aborder les consignes de sécurité sur lesquelles j'ai déjà pu me faire une petite idée en allant sur le forum qui leur est consacré.
  4. Oui Charles, OK avec jv16 ensuite ne sachant plus vraiment quel scan avait détecté P2PNetworking, j'ai lancé en mode normal Spy Sweeper dont voici le rapport : 17:30: | Start of Session, dimanche 13 novembre 2005 | 17:30: Spy Sweeper started 17:30: Sweep initiated using definitions version 572 17:30: Starting Memory Sweep 17:32: Memory Sweep Complete, Elapsed Time: 00:01:46 17:32: Starting Registry Sweep 17:32: Registry Sweep Complete, Elapsed Time:00:00:11 17:32: Starting Cookie Sweep 17:32: Found Spy Cookie: advertising cookie 17:32: caroetbenni@advertising[1].txt (ID = 2175) 17:32: Found Spy Cookie: 2o7.net cookie 17:32: [email protected][1].txt (ID = 1958) 17:32: Found Spy Cookie: servedby advertising cookie 17:32: [email protected][2].txt (ID = 3335) 17:32: Cookie Sweep Complete, Elapsed Time: 00:00:00 17:32: Starting File Sweep 17:50: File Sweep Complete, Elapsed Time: 00:17:48 17:50: Full Sweep has completed. Elapsed time 00:19:47 17:50: Traces Found: 3 17:50: Removal process initiated 17:50: Quarantining All Traces: 2o7.net cookie 17:50: Quarantining All Traces: advertising cookie 17:50: Quarantining All Traces: servedby advertising cookie 17:50: Removal process completed. Elapsed time 00:00:08 ******** 13:05: | Start of Session, vendredi 11 novembre 2005 | 13:05: Spy Sweeper started 13:05: Sweep initiated using definitions version 571 13:05: Starting Memory Sweep 13:06: Memory Sweep Complete, Elapsed Time: 00:00:48 13:06: Starting Registry Sweep 13:06: Registry Sweep Complete, Elapsed Time:00:00:11 13:06: Starting Cookie Sweep 13:06: Found Spy Cookie: bluestreak cookie 13:06: caroetbenni@bluestreak[1].txt (ID = 2314) 13:06: Found Spy Cookie: 2o7.net cookie 13:06: [email protected][1].txt (ID = 1958) 13:06: Found Spy Cookie: xiti cookie 13:06: caroetbenni@xiti[1].txt (ID = 3717) 13:06: Cookie Sweep Complete, Elapsed Time: 00:00:00 13:06: Starting File Sweep 13:10: Found Adware: icondroppers 13:10: a0001472.ico (ID = 188048) 13:21: Found Adware: isearch desktop search 13:21: a0001471.ini (ID = 64321) 13:21: Found Adware: directrevenue-abetterinternet 13:21: a0001470.inf (ID = 83223) 13:23: File Sweep Complete, Elapsed Time: 00:17:07 13:23: Full Sweep has completed. Elapsed time 00:18:13 13:23: Traces Found: 6 13:25: Removal process initiated 13:25: Quarantining All Traces: directrevenue-abetterinternet 13:25: Quarantining All Traces: isearch desktop search 13:25: Quarantining All Traces: icondroppers 13:25: Quarantining All Traces: 2o7.net cookie 13:25: Quarantining All Traces: bluestreak cookie 13:25: Quarantining All Traces: xiti cookie 13:25: Removal process completed. Elapsed time 00:00:01 14:25: Deletion from quarantine initiated 14:25: Processing: 2o7.net cookie 14:25: Processing: bluestreak cookie 14:25: Processing: directrevenue-abetterinternet 14:25: Processing: icondroppers 14:25: Processing: isearch desktop search 14:25: Processing: xiti cookie 14:25: Deletion from quarantine completed. Elapsed time 00:00:00 13:01: Your spyware definitions have been updated. 17:29: Updating spyware definitions 17:29: Your definitions are up to date. 17:30: | End of Session, dimanche 13 novembre 2005 | ******** 13:00: | Start of Session, vendredi 11 novembre 2005 | 13:00: Spy Sweeper started 13:01: Your spyware definitions have been updated. Puis toujours en mode normal Panda Active scan qui lui n'a plus rien trouvé ! j'espère que j'ai bien fait Oui merci S. Birkoff pour ton intervention
  5. Charles, j'ai viré les sous clés kazaa Problème : Impossible de me connecter avec http://telechargement.zebulon.fr/201-jv16-powertools.html j'ai essayé ailleurs mais versions shareware
  6. Bonjour Charles, OK fichier .dll renommé en .old Je ne trouve pas de p2pnetworking, p2pnetworking.exe nulle part dans la base de registre après avoir suivi les chemins indiqués Sous HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run, je ne trouve que le dossier OptionalComponents avec 3 sous-dossiers IMAIL MAPI MSFS Ensuite sous RunServices, c'est vide (seulement ab (par défaut) REG_SZ (valeur non définie) Sous HKCU\Software\Microsoft\OLE, je ne trouve même pas de OLE en revanche j'ai trouvé Ole comprenant 2 dossiers dans HKLM\SOFTWARE\Microsoft\ (pas de rapport sans doute, j'en sais fichtre rien, mais je te le dis quand même) Bon maintenant Kazaa : Trouvé sous HKLM\SOFTWARE\ avec 4 sous-dossiers Bandwidth, Cloudload, ConnectionInfo, LocalContent Trouvé aussi sous HKCU\Software\ avec en -dessous Advanced, Settings, Transfer et Laaa J'espère que ce rapport n'est pas trop confus dans sa manière Merci
  7. Charles, voilà le résultat jotti : File: p2psvc.dll Status:OK MD5 563ef3cacba337eaca3902c82610e614 Packers detected: - Scanner results AntiVir Found nothing ArcaVir Found nothing Avast Found nothing AVG Antivirus Found nothing BitDefender Found nothing ClamAV Found nothing Dr.Web Found nothing F-Prot Antivirus Found nothing Fortinet Found nothing Kaspersky Anti-Virus Found nothing NOD32 Found nothing Norman Virus Control Found nothing UNA Found nothing
  8. Bonjour Charles, J'ai suivi à la lettre tes instructions et n'ai rien trouvé si ce n'est sous C: \windows\sytem32 les éléments suivants : p2p.dll p2pgasvc.dll p2pgraph.dll p2pnetsh.dll p2pscv.dll Ce P2P Networking serait-il lié à une ancienne utilisation de kazaa par hasard ? Kazaa que je vois dans la base de registre sous HKLM et sous HKCU ? Merci
  9. J'espère bien Charles, (pour ne pas dire le facile :"tu parles, Charles !") Je n'ai rien trouvé sous C:\WINDOWS\System32\ j'ai quand même lancé les 2 recherches avec Research dont voici les rapports : Le premier : REGEDIT4 ; Registry Search by Bobbi Flekman ; Version: 1.0.2.1 ; Results at 11/11/2005 20:06:01 for strings: ; '{c91e8926-d4be-4685-99f4-0d996b96bac0}' ; Strings excluded from search: ; (None) ; Search in: ; Registry Keys Registry Values Registry Data ; HKEY_LOCAL_MACHINE HKEY_USERS ; End Of The Log... Le second : REGEDIT4 ; Registry Search by Bobbi Flekman ; Version: 1.0.2.1 ; Results at 11/11/2005 20:09:38 for strings: ; '{1d6711c8-7154-40bb-8380-3dea45b69cbf}' ; Strings excluded from search: ; (None) ; Search in: ; Registry Keys Registry Values Registry Data ; HKEY_LOCAL_MACHINE HKEY_USERS ; End Of The Log...
  10. Oui Charles, Pas trouvé de P2P Networking dans Ajout/Suppression de programmes Fichier C:\WINDOWS\sdkik32.exe : supprimé RegSeeker a trouvé viré 512 quoi ? des choses obsolètes ou invalides...désolé pour l'imprécision Je rajoute à la suite le rapport HJT demandé par Megataupe : Résultat RegSearch : REGEDIT4 ; Registry Search by Bobbi Flekman ; Version: 1.0.2.1 ; Results at 11/11/2005 18:22:05 for strings: ; 'p2p networking' ; Strings excluded from search: ; (None) ; Search in: ; Registry Keys Registry Values Registry Data ; HKEY_LOCAL_MACHINE HKEY_USERS ; End Of The Log... LOG HIJACKTHIS : Logfile of HijackThis v1.99.1 Scan saved at 18:53:23, on 11/11/2005 Platform: Windows XP SP2 (WinNT 5.01.2600) MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180) Running processes: C:\WINDOWS\System32\smss.exe C:\WINDOWS\system32\winlogon.exe C:\WINDOWS\system32\services.exe C:\WINDOWS\system32\lsass.exe C:\WINDOWS\system32\svchost.exe C:\WINDOWS\System32\svchost.exe C:\Program Files\Fichiers communs\Symantec Shared\ccSetMgr.exe C:\Program Files\Fichiers communs\Symantec Shared\SNDSrvc.exe C:\Program Files\Fichiers communs\Symantec Shared\SPBBC\SPBBCSvc.exe C:\Program Files\Fichiers communs\Symantec Shared\ccEvtMgr.exe C:\WINDOWS\system32\spoolsv.exe C:\Program Files\Norton AntiVirus\navapsvc.exe C:\Program Files\Norton AntiVirus\IWP\NPFMntor.exe C:\WINDOWS\System32\nvsvc32.exe C:\WINDOWS\System32\svchost.exe C:\Program Files\Webroot\Spy Sweeper\WRSSSDK.exe C:\Program Files\Fichiers communs\Symantec Shared\CCPD-LC\symlcsvc.exe C:\WINDOWS\System32\MsPMSPSv.exe C:\WINDOWS\Explorer.EXE C:\Program Files\Alcatel\SpeedTouch USB\Dragdiag.exe C:\WINDOWS\System32\spool\drivers\w32x86\3\hpztsb04.exe C:\Program Files\Fichiers communs\Real\Update_OB\realsched.exe C:\Program Files\Roxio\Easy CD Creator 6\DragToDisc\DrgToDsc.exe C:\Program Files\Roxio\Easy CD Creator 6\AudioCentral\RxMon.exe C:\Program Files\Analog Devices\Core\smax4pnp.exe C:\Program Files\Winamp\winampa.exe C:\Program Files\iTunes\iTunesHelper.exe C:\Program Files\Webroot\Spy Sweeper\SpySweeper.exe C:\WINDOWS\system32\ctfmon.exe C:\Program Files\Creative\SBExtigy\RemoteCenter\Rc\Rcman.exe C:\Program Files\iPod\bin\iPodService.exe C:\Program Files\Roxio\Easy CD Creator 6\AudioCentral\Playlist.exe C:\Palm\HOTSYNC.EXE C:\Program Files\Creative\SBExtigy\RemoteCenter\Center\RCenter.exe C:\Program Files\HijackThis\HijackThis.exe R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Local Page = O2 - BHO: Yahoo! Toolbar Helper - {02478D38-C3F9-4EFB-9B51-7695ECA05670} - C:\Program Files\Yahoo!\Companion\Installs\cpn0\yt.dll O2 - BHO: AcroIEHlprObj Class - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 7.0\ActiveX\AcroIEHelper.dll O2 - BHO: (no name) - {53707962-6F74-2D53-2644-206D7942484F} - (no file) O2 - BHO: Google Toolbar Helper - {AA58ED58-01DD-4d91-8333-CF10577473F7} - c:\program files\google\googletoolbar2.dll O2 - BHO: CNavExtBho Class - {BDF3E430-B101-42AD-A544-FADC6B084872} - C:\Program Files\Norton AntiVirus\NavShExt.dll O3 - Toolbar: Norton AntiVirus - {42CDD1BF-3FFB-4238-8AD1-7859DF00B1D6} - C:\Program Files\Norton AntiVirus\NavShExt.dll O3 - Toolbar: Yahoo! Toolbar - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - C:\Program Files\Yahoo!\Companion\Installs\cpn0\yt.dll O3 - Toolbar: &Google - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - c:\program files\google\googletoolbar2.dll O4 - HKLM\..\Run: [speedTouch USB Diagnostics] "C:\Program Files\Alcatel\SpeedTouch USB\Dragdiag.exe" /icon O4 - HKLM\..\Run: [HPDJ Taskbar Utility] C:\WINDOWS\System32\spool\drivers\w32x86\3\hpztsb04.exe O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE C:\WINDOWS\System32\NvCpl.dll,NvStartup O4 - HKLM\..\Run: [storageGuard] "C:\Program Files\Fichiers communs\Sonic\Update Manager\sgtray.exe" /r O4 - HKLM\..\Run: [CTStartup] C:\Program Files\Creative\Splash Screen\CTEaxSpl.EXE /run O4 - HKLM\..\Run: [symantec NetDriver Monitor] C:\PROGRA~1\SYMNET~1\SNDMon.exe /Consumer O4 - HKLM\..\Run: [TkBellExe] "C:\Program Files\Fichiers communs\Real\Update_OB\realsched.exe" -osboot O4 - HKLM\..\Run: [RoxioEngineUtility] "C:\Program Files\Fichiers communs\Roxio Shared\System\EngUtil.exe" O4 - HKLM\..\Run: [RoxioDragToDisc] "C:\Program Files\Roxio\Easy CD Creator 6\DragToDisc\DrgToDsc.exe" O4 - HKLM\..\Run: [RoxioAudioCentral] "C:\Program Files\Roxio\Easy CD Creator 6\AudioCentral\RxMon.exe" O4 - HKLM\..\Run: [soundMAXPnP] C:\Program Files\Analog Devices\Core\smax4pnp.exe O4 - HKLM\..\Run: [WinampAgent] C:\Program Files\Winamp\winampa.exe O4 - HKLM\..\Run: [iTunesHelper] C:\Program Files\iTunes\iTunesHelper.exe O4 - HKLM\..\Run: [spySweeper] "C:\Program Files\Webroot\Spy Sweeper\SpySweeper.exe" /startintray O4 - HKCU\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\ctfmon.exe O4 - HKCU\..\Run: [RemoteCenter] C:\Program Files\Creative\SBExtigy\RemoteCenter\Rc\Rcman.exe O4 - Startup: Adobe Gamma.lnk = C:\Program Files\Fichiers communs\Adobe\Calibration\Adobe Gamma Loader.exe O4 - Global Startup: Adobe Gamma Loader.lnk = C:\Program Files\Fichiers communs\Adobe\Calibration\Adobe Gamma Loader.exe O4 - Global Startup: HotSync Manager.lnk = C:\Palm\HOTSYNC.EXE O4 - Global Startup: Lancement rapide d'Adobe Reader.lnk = C:\Program Files\Adobe\Acrobat 7.0\Reader\reader_sl.exe O8 - Extra context menu item: &Traduire à partir de l'anglais - res://c:\program files\google\GoogleToolbar2.dll/cmwordtrans.html O8 - Extra context menu item: Pages liées - res://c:\program files\google\GoogleToolbar2.dll/cmbacklinks.html O8 - Extra context menu item: Pages similaires - res://c:\program files\google\GoogleToolbar2.dll/cmsimilar.html O8 - Extra context menu item: Recherche &Google - res://c:\program files\google\GoogleToolbar2.dll/cmsearch.html O8 - Extra context menu item: Version de la page actuelle disponible dans le cache Google - res://c:\program files\google\GoogleToolbar2.dll/cmcache.html O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_04\bin\npjpi150_04.dll O9 - Extra 'Tools' menuitem: Console Java (Sun) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_04\bin\npjpi150_04.dll O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe O16 - DPF: {9A9307A0-7DA4-4DAF-B042-5009F29E09E1} (ActiveScan Installer Class) - http://acs.pandasoftware.com/activescan/as5free/asinst.cab O17 - HKLM\System\CCS\Services\Tcpip\..\{26A19A6D-DD5A-4BFC-83B7-413C84B86CD7}: NameServer = 80.118.196.42 80.118.192.112 O17 - HKLM\System\CS1\Services\Tcpip\..\{26A19A6D-DD5A-4BFC-83B7-413C84B86CD7}: NameServer = 80.118.196.42 80.118.192.112 O20 - Winlogon Notify: WRNotifier - C:\WINDOWS\SYSTEM32\WRLogonNTF.dll O23 - Service: Symantec Event Manager (ccEvtMgr) - Symantec Corporation - C:\Program Files\Fichiers communs\Symantec Shared\ccEvtMgr.exe O23 - Service: Symantec Password Validation (ccPwdSvc) - Symantec Corporation - C:\Program Files\Fichiers communs\Symantec Shared\ccPwdSvc.exe O23 - Service: Symantec Settings Manager (ccSetMgr) - Symantec Corporation - C:\Program Files\Fichiers communs\Symantec Shared\ccSetMgr.exe O23 - Service: iPod Service (iPodService) - Apple Computer, Inc. - C:\Program Files\iPod\bin\iPodService.exe O23 - Service: Norton AntiVirus Auto-Protect Service (navapsvc) - Symantec Corporation - C:\Program Files\Norton AntiVirus\navapsvc.exe O23 - Service: Norton AntiVirus Firewall Monitor Service (NPFMntor) - Symantec Corporation - C:\Program Files\Norton AntiVirus\IWP\NPFMntor.exe O23 - Service: NVIDIA Driver Helper Service (NVSvc) - NVIDIA Corporation - C:\WINDOWS\System32\nvsvc32.exe O23 - Service: SAVScan - Symantec Corporation - C:\Program Files\Norton AntiVirus\SAVScan.exe O23 - Service: ScriptBlocking Service (SBService) - Symantec Corporation - C:\PROGRA~1\FICHIE~1\SYMANT~1\SCRIPT~1\SBServ.exe O23 - Service: Symantec Network Drivers Service (SNDSrvc) - Symantec Corporation - C:\Program Files\Fichiers communs\Symantec Shared\SNDSrvc.exe O23 - Service: Symantec SPBBCSvc (SPBBCSvc) - Symantec Corporation - C:\Program Files\Fichiers communs\Symantec Shared\SPBBC\SPBBCSvc.exe O23 - Service: Webroot Spy Sweeper Engine (svcWRSSSDK) - Webroot Software, Inc. - C:\Program Files\Webroot\Spy Sweeper\WRSSSDK.exe O23 - Service: Symantec Core LC - Symantec Corporation - C:\Program Files\Fichiers communs\Symantec Shared\CCPD-LC\symlcsvc.exe O23 - Service: SymWMI Service (SymWSC) - Symantec Corporation - C:\Program Files\Fichiers communs\Symantec Shared\Security Center\SymWSC.exe FIN
  11. OK c'est fait "et maintenant, que vais-je faire ?" (j'ai la sensation d'avancer les yeux fermés tel l'aveugle se reposant sur son guide : un aveugle ayant une taupe comme soutien, même mega, c'est original, non?)
  12. Merci Megataupe, voici le log Spy Sweeper : ******** 13:05: | Start of Session, vendredi 11 novembre 2005 | 13:05: Spy Sweeper started 13:05: Sweep initiated using definitions version 571 13:05: Starting Memory Sweep 13:06: Memory Sweep Complete, Elapsed Time: 00:00:48 13:06: Starting Registry Sweep 13:06: Registry Sweep Complete, Elapsed Time:00:00:11 13:06: Starting Cookie Sweep 13:06: Found Spy Cookie: bluestreak cookie 13:06: caroetbenni@bluestreak[1].txt (ID = 2314) 13:06: Found Spy Cookie: 2o7.net cookie 13:06: [email protected][1].txt (ID = 1958) 13:06: Found Spy Cookie: xiti cookie 13:06: caroetbenni@xiti[1].txt (ID = 3717) 13:06: Cookie Sweep Complete, Elapsed Time: 00:00:00 13:06: Starting File Sweep 13:10: Found Adware: icondroppers 13:10: a0001472.ico (ID = 188048) 13:21: Found Adware: isearch desktop search 13:21: a0001471.ini (ID = 64321) 13:21: Found Adware: directrevenue-abetterinternet 13:21: a0001470.inf (ID = 83223) 13:23: File Sweep Complete, Elapsed Time: 00:17:07 13:23: Full Sweep has completed. Elapsed time 00:18:13 13:23: Traces Found: 6 13:25: Removal process initiated 13:25: Quarantining All Traces: directrevenue-abetterinternet 13:25: Quarantining All Traces: isearch desktop search 13:25: Quarantining All Traces: icondroppers 13:25: Quarantining All Traces: 2o7.net cookie 13:25: Quarantining All Traces: bluestreak cookie 13:25: Quarantining All Traces: xiti cookie 13:25: Removal process completed. Elapsed time 00:00:01 ******** 13:00: | Start of Session, vendredi 11 novembre 2005 | 13:00: Spy Sweeper started 13:01: Your spyware definitions have been updated. FIN
  13. Bonjour Charles, , Mega Volià le rapport Panda : Incident Status Location Adware:adware/navipromo No disinfected C:\WINDOWS\sdkik32.exe Adware:adware/p2pnetworking No disinfected Windows Registry Merci
  14. OK Megataupe, merci Voilà le log SpySweeper : ******** 00:25: | Start of Session, vendredi 11 novembre 2005 | 00:25: Spy Sweeper started 00:25: Sweep initiated using definitions version 571 00:25: Starting Memory Sweep 00:26: Memory Sweep Complete, Elapsed Time: 00:01:41 00:26: Starting Registry Sweep 00:26: Found Adware: isearch desktop search 00:26: HKCR\mfiltis\ (3 subtraces) (ID = 129007) 00:26: HKLM\software\classes\mfiltis\ (3 subtraces) (ID = 129010) 00:26: HKLM\software\system updater\ (ID = 129016) 00:26: Found Adware: dluca 00:26: HKU\S-1-5-21-1659004503-1364589140-725345543-1003\software\program info\ (ID = 125223) 00:26: Found Adware: isearch toolbar 00:26: HKU\S-1-5-21-1659004503-1364589140-725345543-1003\software\microsoft\internet explorer\extensions\cmdmapping\ || {1ae2f26c-8e23-4930-a68d-9e681a764001} (ID = 129029) 00:27: Registry Sweep Complete, Elapsed Time:00:00:11 00:27: Starting Cookie Sweep 00:27: Found Spy Cookie: advertising cookie 00:27: caroetbenni@advertising[2].txt (ID = 2175) 00:27: Found Spy Cookie: servedby advertising cookie 00:27: [email protected][1].txt (ID = 3335) 00:27: Cookie Sweep Complete, Elapsed Time: 00:00:01 00:27: Starting File Sweep 00:29: Found Adware: icondroppers 00:29: icon2.ico (ID = 188048) 00:41: deskbar.ini (ID = 64321) 00:41: Found Adware: lopdotcom 00:41: banking.url (ID = 66328) 00:41: b to b.url (ID = 66517) 00:41: business.url (ID = 66517) 00:41: careers.url (ID = 66608) 00:41: credit cards.url (ID = 66770) 00:41: finance.url (ID = 67092) 00:41: insurance.url (ID = 67470) 00:41: office.url (ID = 67901) 00:41: printing.url (ID = 68120) 00:41: computer games.url (ID = 66720) 00:41: computer stores.url (ID = 66727) 00:41: dedicated server.url (ID = 66845) 00:41: domain names.url (ID = 66920) 00:41: hardware.url (ID = 67312) 00:41: laptops.url (ID = 67606) 00:41: software.url (ID = 68423) 00:41: web design.url (ID = 68813) 00:41: web hosting.url (ID = 68815) 00:41: auction.url (ID = 66259) 00:41: classifieds.url (ID = 66684) 00:41: free emails.url (ID = 67214) 00:41: free homepages.url (ID = 67218) 00:41: free services.url (ID = 67226) 00:41: school essays and homework.url (ID = 68275) 00:41: services.url (ID = 68327) 00:41: automotive.url (ID = 66285) 00:41: dvd.url (ID = 66967) 00:41: entertainment.url (ID = 67020) 00:41: hot games and gaming.url (ID = 67399) 00:41: mp3.url (ID = 67833) 00:41: travel.url (ID = 68701) 00:41: black jack.url (ID = 66431) 00:41: chips.url (ID = 66670) 00:41: craps.url (ID = 66751) 00:41: multi player.url (ID = 67851) 00:41: online casinos.url (ID = 67928) 00:41: poker.url (ID = 68075) 00:41: roulette.url (ID = 68236) 00:41: slots.url (ID = 68394) 00:41: sports books.url (ID = 68441) 00:41: art.url (ID = 66245) 00:41: astrology.url (ID = 66250) 00:41: books.url (ID = 66477) 00:41: community.url (ID = 66711) 00:41: ebooks.url (ID = 66993) 00:41: kids.url (ID = 67587) 00:41: magazines.url (ID = 67723) 00:41: matchmaking.url (ID = 67741) 00:41: pets.url (ID = 68013) 00:41: self help.url (ID = 68308) 00:42: wine.url (ID = 68853) 00:42: women.url (ID = 68871) 00:42: construction.url (ID = 66729) 00:42: furniture.url (ID = 67236) 00:42: home and garden.url (ID = 67375) 00:42: real estate.url (ID = 68170) 00:42: utilities.url (ID = 68755) 00:42: beauty.url (ID = 66353) 00:42: health and fitness.url (ID = 67319) 00:42: pharmacy.url (ID = 68016) 00:42: education.url (ID = 67002) 00:42: training.url (ID = 68676) 00:42: accessories.url (ID = 66120) 00:42: apparel.url (ID = 66240) 00:42: cards.url (ID = 66607) 00:42: electronics.url (ID = 67010) 00:42: flowers.url (ID = 67156) 00:42: gifts.url (ID = 67259) 00:42: jewlery.url (ID = 67552) 00:42: retail products.url (ID = 68219) 00:42: shoes.url (ID = 68356) 00:42: shopping.url (ID = 68361) 00:42: toys.url (ID = 68673) 00:42: Found Adware: directrevenue-abetterinternet 00:42: btgrab.inf (ID = 83223) 00:42: Warning: File not found 00:44: File Sweep Complete, Elapsed Time: 00:17:16 00:44: Full Sweep has completed. Elapsed time 00:19:11 00:44: Traces Found: 89 00:44: Removal process initiated 00:44: Quarantining All Traces: directrevenue-abetterinternet 00:45: Quarantining All Traces: isearch desktop search 00:45: Quarantining All Traces: lopdotcom 00:45: Quarantining All Traces: dluca 00:45: Quarantining All Traces: icondroppers 00:45: Quarantining All Traces: isearch toolbar 00:45: Quarantining All Traces: advertising cookie 00:45: Quarantining All Traces: servedby advertising cookie 00:45: Removal process completed. Elapsed time 00:00:13 ******** 00:22: | Start of Session, vendredi 11 novembre 2005 | 00:22: Spy Sweeper started 00:23: Your spyware definitions have been updated. 00:25: | End of Session, vendredi 11 novembre 2005 |
×
×
  • Créer...