

lecool
Membres-
Compteur de contenus
22 -
Inscription
-
Dernière visite
Tout ce qui a été posté par lecool
-
Bonjour ! Je suis sous ubuntu 12.04 et chaque fois que j'ouvre une vidéo Youtube mon PC se déconnecte, et je dois redémarrer ma machine pour me reconnecter à internet . quelqu’un pour m'aider ? 00:04.0 Ethernet controller: Silicon Integrated Systems [siS] 191 Gigabit Ethernet Adapter (rev 02) 00:0e.0 Ethernet controller: VIA Technologies, Inc. VT6102 [Rhine-II] (rev 43) J'ai fais un : sudo ifconfig -a avant et après le video youtube. Avant de lancer la vidéo, ça donne ça : eth0 Link encap:Ethernet HWaddr 00:1c:25:57:cf:f4 inet adr:192.168.1.86 Bcast:192.168.1.255 Masque:255.255.255.0 adr inet6: fe80::21c:25ff:fe57:cff4/64 Scope:Lien UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1 Packets reçus:866 erreurs:0 :0 overruns:0 frame:0 TX packets:969 errors:0 dropped:0 overruns:0 carrier:0 collisions:0 lg file transmission:1000 Octets reçus:499004 (499.0 KB) Octets transmis:271598 (271.5 KB) Interruption:19 Adresse de base:0xdead eth1 Link encap:Ethernet HWaddr 9e:8b:75:e9:e6:fe adr inet6: fe80::9c8b:75ff:fee9:e6fe/64 Scope:Lien UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1 Packets reçus:0 erreurs:0 :163182150 overruns:0 frame:163182150 TX packets:0 errors:14 dropped:0 overruns:0 carrier:0 collisions:0 lg file transmission:1000 Octets reçus:0 (0.0 B) Octets transmis:0 (0.0 B) Interruption:18 Adresse de base:0xa000 lo Link encap:Boucle locale inet adr:127.0.0.1 Masque:255.0.0.0 adr inet6: ::1/128 Scope:Hôte UP LOOPBACK RUNNING MTU:16436 Metric:1 Packets reçus:200 erreurs:0 :0 overruns:0 frame:0 TX packets:200 errors:0 dropped:0 overruns:0 carrier:0 collisions:0 lg file transmission:0 Octets reçus:28638 (28.6 KB) Octets transmis:28638 (28.6 KB) Et après la déconnexion ça me donne : eth0 Link encap:Ethernet HWaddr 00:1c:25:57:cf:f4 inet adr:192.168.1.86 Bcast:192.168.1.255 Masque:255.255.255.0 adr inet6: fe80::21c:25ff:fe57:cff4/64 Scope:Lien UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1 Packets reçus:18184 erreurs:0 :0 overruns:0 frame:0 TX packets:13418 errors:0 dropped:0 overruns:0 carrier:0 collisions:0 lg file transmission:1000 Octets reçus:21418096 (21.4 MB) Octets transmis:1932659 (1.9 MB) Interruption:19 Adresse de base:0xdead eth1 Link encap:Ethernet HWaddr 9e:8b:75:e9:e6:fe adr inet6: fe80::9c8b:75ff:fee9:e6fe/64 Scope:Lien UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1 Packets reçus:0 erreurs:0 :181728555 overruns:0 frame:181728555 TX packets:0 errors:43 dropped:0 overruns:0 carrier:0 collisions:0 lg file transmission:1000 Octets reçus:0 (0.0 B) Octets transmis:0 (0.0 B) Interruption:18 Adresse de base:0xa000 lo Link encap:Boucle locale inet adr:127.0.0.1 Masque:255.0.0.0 adr inet6: ::1/128 Scope:Hôte UP LOOPBACK RUNNING MTU:16436 Metric:1 Packets reçus:818 erreurs:0 :0 overruns:0 frame:0 TX packets:818 errors:0 dropped:0 overruns:0 carrier:0 collisions:0 lg file transmission:0 Octets reçus:117479 (117.4 KB) Octets transmis:117479 (117.4 KB) P.S lorsque je le redémarre ça indique " Réseau filaire déconnecté " et pourtant il y a une connexion... N.B : J'ai posé mon problème sur un autre forum ,sans suite... alors je me tourne vers vous Merci !
-
Bonjour tout le monde ! Voila j'ai quelques soucis avec mon pc portable ... Je suis sous windows 7. Ces problèmes ont commencé après une réparation ( changement du clavier suite à la perte d'une touche) comme il etait encore sous garantie ... 1/ Quand j,ouvre Internet explorer(IE8) il m'affiche ceci : Description : Un problème a provoqué l’arrêt de l’interaction de ce programme avec Windows. Signature du problème : Nom d’événement de problème: AppHangXProcB1 Nom de l’application: iexplore.exe Version de l’application: 8.0.7601.17514 Horodatage de l’application: 4ce79912 Signature de blocage: a6d4 Type de blocage: 32 Attente du nom de l’application: iexplore.exe Attente de la version de l’application: 8.0.7601.17514 Version du système: 6.1.7601.2.1.0.768.3 Identificateur de paramètres régionaux: 3084 Signature de blocage supplém. 1: a6d486b7ff6d1a7f9a4586ad075ef5c9 Signature de blocage supplém. 2: 89ed Signature de blocage supplém. 3: 89ed3e06bc426d7972e1680c6d268bac Signature de blocage supplém. 4: a6d4 Signature de blocage supplém. 5: a6d486b7ff6d1a7f9a4586ad075ef5c9 Signature de blocage supplém. 6: 89ed Signature de blocage supplém. 7: 89ed3e06bc426d7972e1680c6d268bac Lire notre déclaration de confidentialité en ligne : http://go.microsoft.com/fwlink/?linkid=104288&clcid=0x040c Mais si j'insiste il démarre quand même... sinon je me rabats sur Firefox. Le problème c'est qu'au bout d'un certain temps il s'eteint. Si vous pouviez m'aider je vous en remercie d'avance.
-
Merci à tous et bonne continuation.
-
Rebonjour Tonton ! Après avoir essayé de booter mon PC avec une USB bootable sans succès, je me suis résigné à réparer XP avec le CD d’installation et... surprise, cette fois tout est rentré dans l'ordre. Pourvu que ça dure... Je vous remercie de m'avoir accordé un peu de votre temps et de vous être penché sur mon problème.
-
J'ai lancé le boot avec le CD et j'ai obtenu cela : TRAP 00000006===================EXCEPTION========== tr=0028 cr0=00000011 cr2=00000000 cr3=00000000 gdt limit=03FF base=00017000 idt limit=07FF base=00017400 cs:eip=0008:24000008 ss:esp=0010:0005B946 errcode=0000 flags=00010097 cy NoZr IntDis Down TrapDis eax=374e0386 ebx=003013b2 ecx=00001648 edx 534D0030 ds=0010 es=0010 edi=05B93F20 esi=00061DFA ebp=00061FE9 cr0=00000011 fs=0030 gs=0000 Pour moi bien sur C'est du chinois C'est grave docteur?
-
Je parle du CD original de mon xp bien sûr
-
Bonjour tonton Voila j'ai rendu mon usb bootable, j'y ai téléchargé Memtets86 que j'ai decompressé. J'ai placé la clé usb dans la machine, mais au niveau du bios (touche f12) il y a juste Hard Disk et CD ROM pour `{ boot menu } et pas d'USB Sinon est ce que je peux booter ma machine à partir du cd ?
-
Bonjour Tonton. 1 - J'avais oublié de préciser que j'avais un ordinateur de bureau et non un portable (laptop). 2 - Hier matin j'ai retiré la barrette de RAM ( DDRam)et je l'ai changée d'emplacement, et hop tout est rentré dans l'ordre... 3 - Ce matin je rallume ma machine et, surprise, le même problème réapparaît : J'en perds mon latin...
-
Bonsoir; il est minuit chez moi... et je m'excuse du retard je rentre à l'instant de ...mon cours. Je suis sous xp flamiial pack 3 Mon PC est un Acer modele :Aspire M1610 année 2007
-
Bonjour ! Hier ,mon P.C s'est eteint de manière intempestive suite a une coupure de courant;et depuis lorsque je l'allume il y a un bip et puis plus rien... Par contre il démarre en mode sans echec Mon pc est un Acer carte graphique sis mirage 3 graphique processeur intel ®Pentium® Dual CPU E2140 PS j'ai installé dernièrement un deuxième carte reseau ( conflit ?)
-
C'est vrai où avais-je la tête Comme il n'est jamais trop tard pour bien faire ; Bonjour à tous. je viens d'installer une nouvelle carte reseau et comme par enchantement l'ancienne fonctionne de nouveau Donc tout est rentré dans l'ordre. Merci quand même d'avoir pris la peine de me repondre...
-
Depui ce matin je n`arrive plus a me connecter au net avec mon pc avec que le wifi marche un laptop est conntecté avec le meme routeur... j`ài comme l`ìmpression que c`un probleme materiel meme si dans le gestionnaire des peripheriques tout est normal pouvez vous m`aider SVP
-
Infection antivirus xp (Résolu)
lecool a répondu à un(e) sujet de lecool dans Analyses et éradication malwares
Apollo vous êtes genial... tout est O.K dire que j'alais le formater... mille merci ...... -
Infection antivirus xp (Résolu)
lecool a répondu à un(e) sujet de lecool dans Analyses et éradication malwares
Merci beaucoup Apollo Une dernière chose si vous le permettez : Comment récuperer toutes les icônes... tous les dossiers sont vides , mes documents, tous les programmes, ma musique...etc... Alors lâ mon bureau est etrangement vide... -
Infection antivirus xp (Résolu)
lecool a répondu à un(e) sujet de lecool dans Analyses et éradication malwares
Voici le rapport MBAM Malwarebytes' Anti-Malware 1.51.0.1200 www.malwarebytes.org Version de la base de données: 6821 Windows 5.1.2600 Service Pack 3 Internet Explorer 8.0.6001.18702 6/9/2011 4:11:25 PM mbam-log-2011-06-09 (16-11-25).txt Type d'examen: Examen complet (C:\|D:\|) Elément(s) analysé(s): 221194 Temps écoulé: 23 minute(s), 34 seconde(s) Processus mémoire infecté(s): 3 Module(s) mémoire infecté(s): 2 Clé(s) du Registre infectée(s): 75 Valeur(s) du Registre infectée(s): 13 Elément(s) de données du Registre infecté(s): 1 Dossier(s) infecté(s): 42 Fichier(s) infecté(s): 83 Processus mémoire infecté(s): c:\program files\HBLite\bin\11.0.363.0\HBLiteSA.exe (Adware.Hotbar) -> 1884 -> Unloaded process successfully. c:\program files\questscan\questscan.exe (Adware.QuestScan) -> 3792 -> Unloaded process successfully. c:\documents and settings\all users\application data\questscan\questscan133.exe (Adware.QuestScan) -> 1952 -> Unloaded process successfully. Module(s) mémoire infecté(s): c:\program files\questscan\questscan.dll (Adware.Agent.ZGen) -> Delete on reboot. c:\program files\HBLite\bin\11.0.363.0\hblitesahook.dll (Adware.HotBar) -> Delete on reboot. Clé(s) du Registre infectée(s): HKEY_CLASSES_ROOT\CLSID\{258C9770-1713-4021-8D7E-1F184A2BD754} (Adware.SmartShopper) -> Quarantined and deleted successfully. HKEY_CLASSES_ROOT\TypeLib\{F244A744-534D-4A46-855F-C0C7E9F27DAA} (Adware.SmartShopper) -> Quarantined and deleted successfully. HKEY_CLASSES_ROOT\Interface\{030C9927-10FC-4169-97A2-55BECD5D88D8} (Adware.SmartShopper) -> Quarantined and deleted successfully. HKEY_CLASSES_ROOT\ShoppingReport2.RprtCtrl.1 (Adware.SmartShopper) -> Quarantined and deleted successfully. HKEY_CLASSES_ROOT\ShoppingReport2.RprtCtrl (Adware.SmartShopper) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{258C9770-1713-4021-8D7E-1F184A2BD754} (Adware.SmartShopper) -> Quarantined and deleted successfully. HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Settings\{258C9770-1713-4021-8D7E-1F184A2BD754} (Adware.SmartShopper) -> Quarantined and deleted successfully. HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{258C9770-1713-4021-8D7E-1F184A2BD754} (Adware.SmartShopper) -> Quarantined and deleted successfully. HKEY_CLASSES_ROOT\CLSID\{3E2DFD6A-4E20-4D4C-AA8B-E1F9DBEF3C80} (Adware.ShoppingReport2) -> Quarantined and deleted successfully. HKEY_CLASSES_ROOT\ShoppingReport2.IEButton.1 (Adware.ShoppingReport2) -> Quarantined and deleted successfully. HKEY_CLASSES_ROOT\ShoppingReport2.IEButton (Adware.ShoppingReport2) -> Quarantined and deleted successfully. HKEY_CLASSES_ROOT\CLSID\{4D1EC4CA-4B92-4324-B8F8-C9A6ED06A8AE} (Adware.Hotbar) -> Quarantined and deleted successfully. HKEY_CLASSES_ROOT\TypeLib\{6F098504-CDB1-420F-A2E6-DDC0B835FEDF} (Adware.Hotbar) -> Quarantined and deleted successfully. HKEY_CLASSES_ROOT\Interface\{30B15818-E110-4527-9C05-46ACE5A3460D} (Adware.Hotbar) -> Quarantined and deleted successfully. HKEY_CLASSES_ROOT\HBLiteAX.Info.1 (Adware.Hotbar) -> Quarantined and deleted successfully. HKEY_CLASSES_ROOT\HBLiteAX.Info (Adware.Hotbar) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\PreApproved\{4D1EC4CA-4B92-4324-B8F8-C9A6ED06A8AE} (Adware.Hotbar) -> Quarantined and deleted successfully. HKEY_CLASSES_ROOT\CLSID\{4E674574-3F0B-491d-8AE3-F90B43A34FD6} (Adware.Hotbar) -> Quarantined and deleted successfully. HKEY_CLASSES_ROOT\HBLiteAX.UserProfiles.1 (Adware.Hotbar) -> Quarantined and deleted successfully. HKEY_CLASSES_ROOT\HBLiteAX.UserProfiles (Adware.Hotbar) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\PreApproved\{4E674574-3F0B-491D-8AE3-F90B43A34FD6} (Adware.Hotbar) -> Quarantined and deleted successfully. HKEY_CLASSES_ROOT\CLSID\{714E0876-FCEE-49CE-A429-B9AD8AEFCB56} (Adware.ShoppingReport2) -> Quarantined and deleted successfully. HKEY_CLASSES_ROOT\ShoppingReport2.IEButtonA.1 (Adware.ShoppingReport2) -> Quarantined and deleted successfully. HKEY_CLASSES_ROOT\ShoppingReport2.IEButtonA (Adware.ShoppingReport2) -> Quarantined and deleted successfully. HKEY_CLASSES_ROOT\CLSID\{BDEA95CF-F0E6-41E0-BD3D-B00F39A4E939} (Adware.ShoppingReport2) -> Quarantined and deleted successfully. HKEY_CLASSES_ROOT\ShoppingReport2.HbInfoBand.1 (Adware.ShoppingReport2) -> Quarantined and deleted successfully. HKEY_CLASSES_ROOT\ShoppingReport2.HbInfoBand (Adware.ShoppingReport2) -> Quarantined and deleted successfully. HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\Explorer Bars\{BDEA95CF-F0E6-41E0-BD3D-B00F39A4E939} (Adware.ShoppingReport2) -> Quarantined and deleted successfully. HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{BDEA95CF-F0E6-41E0-BD3D-B00F39A4E939} (Adware.ShoppingReport2) -> Quarantined and deleted successfully. HKEY_CLASSES_ROOT\CLSID\{DD15BCC0-5FE9-4690-A957-99FA60ED9D26} (Adware.ShoppingReport2) -> Quarantined and deleted successfully. HKEY_CLASSES_ROOT\ShoppingReport2.HbAx.1 (Adware.ShoppingReport2) -> Quarantined and deleted successfully. HKEY_CLASSES_ROOT\ShoppingReport2.HbAx (Adware.ShoppingReport2) -> Quarantined and deleted successfully. HKEY_CLASSES_ROOT\Typelib\{B035BA6B-57CD-4F72-B545-65BE465FCAF6} (Adware.ShoppingReport2) -> Quarantined and deleted successfully. HKEY_CLASSES_ROOT\Typelib\{D44FD6F0-9746-484E-B5C4-C66688393872} (Adware.ShoppingReport2) -> Quarantined and deleted successfully. HKEY_CLASSES_ROOT\Interface\{0EB3F101-224A-4B2B-9E5B-DF720857529C} (Adware.ShoppingReport2) -> Quarantined and deleted successfully. HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{B58926D6-CFB0-45D2-9C28-4B5A0F0368AE} (Adware.ClickPotato) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Extensions\{B58926D6-CFB0-45D2-9C28-4B5A0F0368AE} (Adware.ClickPotato) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\PreApproved\{B58926D6-CFB0-45D2-9C28-4B5A0F0368AE} (Adware.ClickPotato) -> Quarantined and deleted successfully. HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{DB38E21A-0133-419D-92AD-ECDFD5244D6D} (Adware.ShoppingReport2) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Extensions\{DB38E21A-0133-419D-92AD-ECDFD5244D6D} (Adware.ShoppingReport2) -> Quarantined and deleted successfully. HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{EB620C54-E229-4942-87CE-E717109FC8C6} (Adware.ShoppingReport2) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Extensions\{EB620C54-E229-4942-87CE-E717109FC8C6} (Adware.ShoppingReport2) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{A078F691-9C07-4AF2-BF43-35E79EECF8B7} (Adware.Softomate) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\PreApproved\{1602F07D-8BF3-4c08-BDD6-DDDB1C48AEDC} (Adware.ClickPotato) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\PreApproved\{69725738-CD68-4f36-8D02-8C43722EE5DA} (Adware.Hotbar) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\PreApproved\{AC6D819E-AA8F-4418-A3BB-D165C1B18BB5} (Adware.ClickPotato) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\HBLiteSA (Adware.Hotbar) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\ShoppingReport2 (Adware.ShoppingReports2) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SETUP.EXE (Malware.Packer.Gen) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\QuestScan Service (Adware.QuestScan) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\MouseDriver (Trojan.Agent) -> Quarantined and deleted successfully. HKEY_CLASSES_ROOT\ClickPotatoLiteAX.UserProfiles (Adware.ClickPotato) -> Quarantined and deleted successfully. HKEY_CLASSES_ROOT\ClickPotatoLiteAX.UserProfiles.1 (Adware.ClickPotato) -> Quarantined and deleted successfully. HKEY_CLASSES_ROOT\MenuButtonIE.ButtonIE (Adware.ClickPotato) -> Quarantined and deleted successfully. HKEY_CLASSES_ROOT\MenuButtonIE.ButtonIE.1 (Adware.ClickPotato) -> Quarantined and deleted successfully. HKEY_CLASSES_ROOT\AppID\MenuButtonIE.DLL (Adware.ClickPotato) -> Quarantined and deleted successfully. HKEY_CURRENT_USER\SOFTWARE\3XQZ6EO4AP (Trojan.FakeAlert.SA) -> Quarantined and deleted successfully. HKEY_CURRENT_USER\SOFTWARE\YDZ1QVAGOJ (Trojan.FakeAlert.SA) -> Quarantined and deleted successfully. HKEY_CURRENT_USER\Software\clickpotatolitesa (Adware.ClickPotato) -> Quarantined and deleted successfully. HKEY_CURRENT_USER\Software\hblitesa (Adware.HotBar) -> Quarantined and deleted successfully. HKEY_CURRENT_USER\Software\ShoppingReport2 (Adware.ShoppingReport2) -> Quarantined and deleted successfully. HKEY_CURRENT_USER\Software\Context\Context-Ads (Adware.AdRotator) -> Quarantined and deleted successfully. HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\ (Hijack.Zones) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\ClickPotatoLite (Adware.ClickPotato) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\HBLite (Adware.HotBar) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\ShoppingReport2 (Adware.ShoppingReport2) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\tgs90gv74r (Malware.Trace) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Context\Context-Ads (Adware.AdRotator) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\UNINSTALL\QUESTSCAN (Adware.QuestScan) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\QUESTSCAN (Adware.QuestScan) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_QUESTSCAN_SERVICE (Adware.QuestScan) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SYSTEM\CURRENTCONTROLSET\SERVICES\INPUT MANAGER (Trojan.Agent) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SYSTEM\CURRENTCONTROLSET\SERVICES\LOCAL ACCOUNT AUTHORITY SERVICE (Trojan.Agent) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SYSTEM\CURRENTCONTROLSET\SERVICES\PLUG MANAGER (Trojan.Agent) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\$XNTUninstall643$ (Adware.AdRotator) -> Quarantined and deleted successfully. Valeur(s) du Registre infectée(s): HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HBLiteSA (Adware.Hotbar) -> Value: HBLiteSA -> Quarantined and deleted successfully. HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\Extensions\CmdMapping\{DB38E21A-0133-419D-92AD-ECDFD5244D6D} (Adware.ShoppingReport2) -> Value: {DB38E21A-0133-419D-92AD-ECDFD5244D6D} -> Quarantined and deleted successfully. HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\Extensions\CmdMapping\{EB620C54-E229-4942-87CE-E717109FC8C6} (Adware.ShoppingReport2) -> Value: {EB620C54-E229-4942-87CE-E717109FC8C6} -> Quarantined and deleted successfully. HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\Extensions\CmdMapping\{EB620C54-E229-4942-87CE-E717109FC8C6} (Adware.ShoppingReport2) -> Value: {EB620C54-E229-4942-87CE-E717109FC8C6} -> Quarantined and deleted successfully. HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\Extensions\CmdMapping\{DB38E21A-0133-419d-92AD-ECDFD5244D6D} (Adware.ShoppingReport2) -> Value: {DB38E21A-0133-419d-92AD-ECDFD5244D6D} -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\QuestScan\DisplayName (Adware.QuestScan) -> Value: DisplayName -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Mozilla\Firefox\extensions\ClickPotatoLite@ClickPotatoLite.com (Adware.ClickPotato) -> Value: ClickPotatoLite@ClickPotatoLite.com -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Mozilla\Firefox\extensions\HBLite@HBLite.com (Adware.HotBar) -> Value: HBLite@HBLite.com -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\QuestScan\DllPath (Adware.QuestScan) -> Value: DllPath -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Input Manager\ImagePath (Trojan.Agent) -> Value: ImagePath -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Local Account Authority Service\ImagePath (Trojan.Agent) -> Value: ImagePath -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\MouseDriver\ImagePath (Trojan.Agent) -> Value: ImagePath -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Plug Manager\ImagePath (Trojan.Agent) -> Value: ImagePath -> Quarantined and deleted successfully. Elément(s) de données du Registre infecté(s): HKEY_CLASSES_ROOT\exefile\shell\open\command\(default) (Broken.OpenCommand) -> Bad: () Good: ("%1" %*) -> Quarantined and deleted successfully. Dossier(s) infecté(s): c:\documents and settings\ALI\application data\Dir (Backdoor.Agent) -> Quarantined and deleted successfully. c:\documents and settings\all users\application data\2aca5cc3-0f83-453d-a079-1076fe1a8b65 (Adware.Seekmo) -> Quarantined and deleted successfully. c:\documents and settings\ALI\application data\clickpotatolite (Adware.ClickPotato) -> Quarantined and deleted successfully. c:\documents and settings\all users\application data\clickpotatolitesa (Adware.ClickPotato) -> Quarantined and deleted successfully. c:\documents and settings\ALI\application data\HBLite (Adware.Hotbar) -> Quarantined and deleted successfully. c:\documents and settings\all users\application data\HBLiteSA (Adware.Hotbar) -> Quarantined and deleted successfully. c:\documents and settings\ALI\application data\shoppingreport2 (Adware.ShoppingReport2) -> Quarantined and deleted successfully. c:\documents and settings\ALI\application data\shoppingreport2\ALI (Adware.ShoppingReport2) -> Quarantined and deleted successfully. c:\documents and settings\ALI\application data\shoppingreport2\application data (Adware.ShoppingReport2) -> Quarantined and deleted successfully. c:\documents and settings\ALI\application data\shoppingreport2\cs (Adware.ShoppingReport2) -> Quarantined and deleted successfully. c:\documents and settings\ALI\application data\shoppingreport2\cs\ALI (Adware.ShoppingReport2) -> Quarantined and deleted successfully. c:\documents and settings\ALI\application data\shoppingreport2\cs\application data (Adware.ShoppingReport2) -> Quarantined and deleted successfully. c:\documents and settings\ALI\application data\shoppingreport2\cs\cs (Adware.ShoppingReport2) -> Quarantined and deleted successfully. c:\documents and settings\ALI\application data\shoppingreport2\cs\db (Adware.ShoppingReport2) -> Quarantined and deleted successfully. c:\documents and settings\ALI\application data\shoppingreport2\cs\dwld (Adware.ShoppingReport2) -> Quarantined and deleted successfully. c:\documents and settings\ALI\application data\shoppingreport2\cs\report (Adware.ShoppingReport2) -> Quarantined and deleted successfully. c:\documents and settings\ALI\application data\shoppingreport2\cs\res1 (Adware.ShoppingReport2) -> Quarantined and deleted successfully. c:\documents and settings\ALI\application data\shoppingreport2\cs\shoppingreport2 (Adware.ShoppingReport2) -> Quarantined and deleted successfully. c:\documents and settings\ALI\application data\shoppingreport2\report (Adware.ShoppingReport2) -> Quarantined and deleted successfully. c:\documents and settings\ALI\application data\shoppingreport2\shoppingreport2 (Adware.ShoppingReport2) -> Quarantined and deleted successfully. c:\program files\clickpotatolite (Adware.ClickPotato) -> Quarantined and deleted successfully. c:\program files\clickpotatolite\bin (Adware.ClickPotato) -> Quarantined and deleted successfully. c:\program files\clickpotatolite\bin\10.0.668.0 (Adware.ClickPotato) -> Quarantined and deleted successfully. c:\program files\clickpotatolite\bin\10.0.668.0\firefox (Adware.ClickPotato) -> Quarantined and deleted successfully. c:\program files\clickpotatolite\bin\10.0.668.0\firefox\extensions (Adware.ClickPotato) -> Quarantined and deleted successfully. c:\program files\clickpotatolite\bin\10.0.668.0\firefox\extensions\plugins (Adware.ClickPotato) -> Quarantined and deleted successfully. c:\program files\HBLite (Adware.Hotbar) -> Delete on reboot. c:\program files\HBLite\bin (Adware.Hotbar) -> Delete on reboot. c:\program files\HBLite\bin\11.0.363.0 (Adware.Hotbar) -> Delete on reboot. c:\program files\HBLite\bin\11.0.363.0\firefox (Adware.Hotbar) -> Quarantined and deleted successfully. c:\program files\HBLite\bin\11.0.363.0\firefox\extensions (Adware.Hotbar) -> Quarantined and deleted successfully. c:\program files\HBLite\bin\11.0.363.0\firefox\extensions\plugins (Adware.Hotbar) -> Quarantined and deleted successfully. c:\program files\shoppingreport2 (Adware.ShoppingReport2) -> Delete on reboot. c:\program files\shoppingreport2\Bin (Adware.ShoppingReport2) -> Delete on reboot. c:\program files\shoppingreport2\Bin\2.7.34 (Adware.ShoppingReport2) -> Delete on reboot. c:\documents and settings\all users\menu démarrer\programmes\clickpotato (Adware.ClickPotato) -> Quarantined and deleted successfully. c:\documents and settings\all users\menu démarrer\programmes\Hotbar (Adware.Hotbar) -> Quarantined and deleted successfully. c:\WINDOWS\$xntuninstall643$ (Adware.AdRotator) -> Quarantined and deleted successfully. c:\program files\mozilla firefox\extensions\{f0e1168a-b4b5-484c-b77e-0d28e6b64096} (Adware.QuestScan) -> Quarantined and deleted successfully. c:\program files\mozilla firefox\extensions\{f0e1168a-b4b5-484c-b77e-0d28e6b64096}\chrome (Adware.QuestScan) -> Quarantined and deleted successfully. c:\program files\mozilla firefox\extensions\{f0e1168a-b4b5-484c-b77e-0d28e6b64096}\defaults (Adware.QuestScan) -> Quarantined and deleted successfully. c:\program files\mozilla firefox\extensions\{f0e1168a-b4b5-484c-b77e-0d28e6b64096}\defaults\preferences (Adware.QuestScan) -> Quarantined and deleted successfully. Fichier(s) infecté(s): c:\program files\questscan\questscan.dll (Adware.Agent.ZGen) -> Delete on reboot. c:\program files\HBLite\bin\11.0.363.0\HBLiteSA.exe (Adware.Hotbar) -> Quarantined and deleted successfully. c:\program files\HBLite\bin\11.0.363.0\hblitesahook.dll (Adware.HotBar) -> Delete on reboot. c:\program files\shoppingreport2\Bin\2.7.34\shoppingreport.dll (Adware.SmartShopper) -> Delete on reboot. c:\program files\HBLite\bin\11.0.363.0\hblitesaax.dll (Adware.Hotbar) -> Quarantined and deleted successfully. c:\documents and settings\ALI\Bureau\rk_quarantine\0.3135033419624973.exe.vir (Trojan.Agent.A) -> Quarantined and deleted successfully. c:\documents and settings\ALI\Bureau\rk_quarantine\334f.exe.vir (Trojan.Agent) -> Quarantined and deleted successfully. c:\documents and settings\ALI\Bureau\rk_quarantine\cfm.exe.vir (Trojan.Downloader) -> Quarantined and deleted successfully. c:\documents and settings\ALI\Bureau\rk_quarantine\cfq.exe.vir (Trojan.Downloader) -> Quarantined and deleted successfully. c:\documents and settings\ALI\Bureau\rk_quarantine\chabaa.exe.vir (Trojan.Downloader) -> Quarantined and deleted successfully. c:\documents and settings\ALI\Bureau\rk_quarantine\conima.exe.vir (Backdoor.Bot) -> Quarantined and deleted successfully. c:\documents and settings\ALI\Bureau\rk_quarantine\ehu.exe.vir (Trojan.FakeAlert) -> Quarantined and deleted successfully. c:\documents and settings\ALI\Bureau\rk_quarantine\eqg.exe.vir (Trojan.FakeAlert) -> Quarantined and deleted successfully. c:\documents and settings\ALI\Bureau\rk_quarantine\lssas.exe.vir (Backdoor.Bot) -> Quarantined and deleted successfully. c:\documents and settings\ALI\Bureau\rk_quarantine\manager.exe.vir (Backdoor.Bot) -> Quarantined and deleted successfully. c:\documents and settings\ALI\Bureau\rk_quarantine\mdapins.dll.vir (Trojan.Hiloti) -> Quarantined and deleted successfully. c:\documents and settings\ALI\Bureau\rk_quarantine\oh01830jnfem01830.exe.vir (Trojan.FakeAlert) -> Quarantined and deleted successfully. c:\documents and settings\ALI\Bureau\rk_quarantine\vbs.exe.vir (Trojan.FakeAlert) -> Quarantined and deleted successfully. c:\documents and settings\ALI\Bureau\rk_quarantine\vtebtz.exe.vir (Backdoor.Bot) -> Quarantined and deleted successfully. c:\documents and settings\ALI\Bureau\rk_quarantine\xbseryrwdjulo.exe.vir (Trojan.FakeMS) -> Quarantined and deleted successfully. c:\documents and settings\ALI\local settings\application data\ehu.exe (Trojan.ExeShell.Gen) -> Quarantined and deleted successfully. c:\documents and settings\ALI\local settings\application data\eqg.exe (Trojan.ExeShell.Gen) -> Quarantined and deleted successfully. c:\documents and settings\ALI\local settings\application data\vbs.exe (Trojan.ExeShell.Gen) -> Quarantined and deleted successfully. c:\documents and settings\all users\application data\17620772.exe (Trojan.FakeMS) -> Quarantined and deleted successfully. c:\documents and settings\all users\application data\exktsjdkrdaqskx.exe (Trojan.FakeMS) -> Quarantined and deleted successfully. c:\documents and settings\all users\application data\xbseryrwdjulo.exe (Trojan.FakeMS) -> Quarantined and deleted successfully. c:\documents and settings\all users\application data\oh01830jnfem01830\oh01830jnfem01830.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully. c:\documents and settings\BAYA\Bureau\rk_quarantine\6a5d.exe.vir (Trojan.Agent) -> Quarantined and deleted successfully. c:\program files\HBLite\bin\11.0.363.0\hbliteuninstaller.exe (Adware.Hotbar) -> Quarantined and deleted successfully. c:\program files\HBLite\bin\11.0.363.0\firefox\extensions\plugins\npclntax_hblitesa.dll (Adware.Hotbar) -> Quarantined and deleted successfully. c:\program files\mozilla firefox\plugins\npclntax_hblitesa.dll (Adware.Hotbar) -> Quarantined and deleted successfully. c:\program files\shoppingreport2\Uninst.exe (Adware.ShoppingReports2) -> Quarantined and deleted successfully. c:\WINDOWS\mdapins.dll (Trojan.Hiloti) -> Quarantined and deleted successfully. c:\WINDOWS\setup.exe (Malware.Packer.Gen) -> Quarantined and deleted successfully. c:\WINDOWS\system32\lcs8t9.dll (Trojan.Agent) -> Quarantined and deleted successfully. c:\WINDOWS\system32\ln9y4cg.dll (Trojan.Agent) -> Quarantined and deleted successfully. c:\WINDOWS\system32\nzunj11ez3.dll (Trojan.Agent) -> Quarantined and deleted successfully. c:\WINDOWS\system32\drivers\16117.sys (Rootkit.TDSS) -> Quarantined and deleted successfully. c:\WINDOWS\system32\drivers\16512.sys (Rootkit.TDSS) -> Quarantined and deleted successfully. c:\WINDOWS\system32\drivers\16535.sys (Rootkit.TDSS) -> Quarantined and deleted successfully. c:\WINDOWS\system32\drivers\18016.sys (Rootkit.TDSS) -> Quarantined and deleted successfully. c:\WINDOWS\system32\drivers\19515.sys (Rootkit.TDSS) -> Quarantined and deleted successfully. c:\WINDOWS\system32\drivers\19622.sys (Rootkit.TDSS) -> Quarantined and deleted successfully. c:\WINDOWS\system32\drivers\484AA.sys (Rootkit.TDSS) -> Quarantined and deleted successfully. c:\WINDOWS\system32\drivers\51520.sys (Rootkit.TDSS) -> Quarantined and deleted successfully. c:\WINDOWS\system32\drivers\7356.sys (Rootkit.TDSS) -> Quarantined and deleted successfully. c:\program files\questscan\questscan.exe (Adware.QuestScan) -> Quarantined and deleted successfully. c:\documents and settings\all users\application data\questscan\questscan133.exe (Adware.QuestScan) -> Quarantined and deleted successfully. c:\documents and settings\ALI\application data\Dir\Dated.dat (Backdoor.Agent) -> Quarantined and deleted successfully. c:\documents and settings\ALI\application data\Adobe\shed\thr1.chm (Malware.Trace) -> Quarantined and deleted successfully. c:\documents and settings\ALI\application data\Adobe\plugs\mmc66.exe (Trojan.Agent.Gen) -> Quarantined and deleted successfully. c:\documents and settings\ALI\application data\mousedriver.bat (Trojan.Agent) -> Quarantined and deleted successfully. c:\documents and settings\networkservice\application data\mousedriver.bat (Trojan.Agent) -> Quarantined and deleted successfully. c:\documents and settings\ALI\local settings\application data\Input.bat (Trojan.Agent) -> Quarantined and deleted successfully. c:\documents and settings\networkservice\local settings\application data\localaccountauthority.bat (Trojan.Agent) -> Quarantined and deleted successfully. c:\documents and settings\networkservice\local settings\application data\Plug.bat (Trojan.Agent) -> Quarantined and deleted successfully. c:\documents and settings\all users\application data\clickpotatolitesa\clickpotatolitesa.dat (Adware.ClickPotato) -> Quarantined and deleted successfully. c:\documents and settings\all users\application data\clickpotatolitesa\clickpotatolitesaabout.mht (Adware.ClickPotato) -> Quarantined and deleted successfully. c:\documents and settings\all users\application data\clickpotatolitesa\clickpotatolitesaau.dat (Adware.ClickPotato) -> Quarantined and deleted successfully. c:\documents and settings\all users\application data\clickpotatolitesa\clickpotatolitesaeula.mht (Adware.ClickPotato) -> Quarantined and deleted successfully. c:\documents and settings\all users\application data\clickpotatolitesa\clickpotatolitesa_hpk.dat (Adware.ClickPotato) -> Quarantined and deleted successfully. c:\documents and settings\all users\application data\clickpotatolitesa\clickpotatolitesa_kyf.dat (Adware.ClickPotato) -> Quarantined and deleted successfully. c:\documents and settings\all users\application data\HBLiteSA\HBLiteSA.dat (Adware.Hotbar) -> Quarantined and deleted successfully. c:\documents and settings\all users\application data\HBLiteSA\hblitesaabout.mht (Adware.Hotbar) -> Quarantined and deleted successfully. c:\documents and settings\all users\application data\HBLiteSA\hblitesaau.dat (Adware.Hotbar) -> Quarantined and deleted successfully. c:\documents and settings\all users\application data\HBLiteSA\hblitesaeula.mht (Adware.Hotbar) -> Quarantined and deleted successfully. c:\documents and settings\all users\application data\HBLiteSA\hblitesa_hpk.dat (Adware.Hotbar) -> Quarantined and deleted successfully. c:\documents and settings\all users\application data\HBLiteSA\hblitesa_kyf.dat (Adware.Hotbar) -> Quarantined and deleted successfully. c:\documents and settings\ALI\application data\shoppingreport2\cs\Config.xml (Adware.ShoppingReport2) -> Quarantined and deleted successfully. c:\documents and settings\ALI\application data\shoppingreport2\cs\db\Aliases.dbs (Adware.ShoppingReport2) -> Quarantined and deleted successfully. c:\documents and settings\ALI\application data\shoppingreport2\cs\db\Sites.dbs (Adware.ShoppingReport2) -> Quarantined and deleted successfully. c:\documents and settings\ALI\application data\shoppingreport2\cs\dwld\whitelist.xip (Adware.ShoppingReport2) -> Quarantined and deleted successfully. c:\documents and settings\ALI\application data\shoppingreport2\cs\report\aggr_storage.xml (Adware.ShoppingReport2) -> Quarantined and deleted successfully. c:\documents and settings\ALI\application data\shoppingreport2\cs\report\send_storage.xml (Adware.ShoppingReport2) -> Quarantined and deleted successfully. c:\documents and settings\ALI\application data\shoppingreport2\cs\res1\whitelist.dbs (Adware.ShoppingReport2) -> Quarantined and deleted successfully. c:\program files\clickpotatolite\bin\10.0.668.0\firefox\extensions\install.rdf (Adware.ClickPotato) -> Quarantined and deleted successfully. c:\program files\HBLite\bin\11.0.363.0\firefox\extensions\install.rdf (Adware.Hotbar) -> Quarantined and deleted successfully. c:\WINDOWS\$xntuninstall643$\apuninstall.exe (Adware.AdRotator) -> Quarantined and deleted successfully. c:\WINDOWS\$xntuninstall643$\zrpt.xml (Adware.AdRotator) -> Quarantined and deleted successfully. c:\program files\mozilla firefox\extensions\{f0e1168a-b4b5-484c-b77e-0d28e6b64096}\chrome.manifest (Adware.QuestScan) -> Quarantined and deleted successfully. c:\program files\mozilla firefox\extensions\{f0e1168a-b4b5-484c-b77e-0d28e6b64096}\install.rdf (Adware.QuestScan) -> Quarantined and deleted successfully. c:\program files\mozilla firefox\extensions\{f0e1168a-b4b5-484c-b77e-0d28e6b64096}\chrome\questscan.jar (Adware.QuestScan) -> Quarantined and deleted successfully. c:\program files\mozilla firefox\extensions\{f0e1168a-b4b5-484c-b77e-0d28e6b64096}\defaults\preferences\prefs.js (Adware.QuestScan) -> Quarantined and deleted successfully. -
Infection antivirus xp (Résolu)
lecool a répondu à un(e) sujet de lecool dans Analyses et éradication malwares
Sinon il y a une fenetre qui dit maitenant MBAM est déjà en cours d'execution... P.S: J'avais un anti malware installé je ne me souviens plus du nom quelque chose comme super malware... je suis en mode sans echec edit: pour la seconde fenetre j'avais ouvert deux fois MBAM désolé -
Infection antivirus xp (Résolu)
lecool a répondu à un(e) sujet de lecool dans Analyses et éradication malwares
Pour la mise a jour de MBAM , j'ai un message qui dit :Une erreur s'est produite, Vuillez transmettre ce code d'erreur â notre équipe de support. PROGRAM_ERROR_UPDATING(11001,0,Host not found) Hôte inconnu -
Infection antivirus xp (Résolu)
lecool a répondu à un(e) sujet de lecool dans Analyses et éradication malwares
Voici le rapport TDSSKiler 2011/06/09 13:42:31.0234 0484 TDSS rootkit removing tool 2.5.4.0 Jun 7 2011 17:31:48 2011/06/09 13:42:31.0265 0484 =======================================14:02 2011-06-09========================================= 2011/06/09 13:42:31.0265 0484 SystemInfo: 2011/06/09 13:42:31.0265 0484 2011/06/09 13:42:31.0265 0484 OS Version: 5.1.2600 ServicePack: 3.0 2011/06/09 13:42:31.0265 0484 Product type: Workstation 2011/06/09 13:42:31.0265 0484 ComputerName: ALI-EB93CC60C3B 2011/06/09 13:42:31.0265 0484 UserName: ALI 2011/06/09 13:42:31.0265 0484 Windows directory: C:\WINDOWS 2011/06/09 13:42:31.0265 0484 System windows directory: C:\WINDOWS 2011/06/09 13:42:31.0265 0484 Processor architecture: Intel x86 2011/06/09 13:42:31.0265 0484 Number of processors: 2 2011/06/09 13:42:31.0265 0484 Page size: 0x1000 2011/06/09 13:42:31.0265 0484 Boot type: Safe boot 2011/06/09 13:42:31.0265 0484 ================================================================================ 2011/06/09 13:42:34.0343 0484 Initialize success 2011/06/09 13:42:59.0671 0616 ================================================================================ 2011/06/09 13:42:59.0671 0616 Scan started 2011/06/09 13:42:59.0671 0616 Mode: Manual; 2011/06/09 13:42:59.0671 0616 ================================================================================ 2011/06/09 13:43:00.0937 0616 16535 (6d9a7f8439bfc39115e9341cabaf56a8) C:\WINDOWS\system32\drivers\16535.sys 2011/06/09 13:43:01.0609 0616 484AA (6d9a7f8439bfc39115e9341cabaf56a8) C:\WINDOWS\system32\drivers\484AA.sys 2011/06/09 13:43:02.0484 0616 ACPI (e5e6dbfc41ea8aad005cb9a57a96b43b) C:\WINDOWS\system32\DRIVERS\ACPI.sys 2011/06/09 13:43:02.0843 0616 ACPIEC (e4abc1212b70bb03d35e60681c447210) C:\WINDOWS\system32\drivers\ACPIEC.sys 2011/06/09 13:43:03.0406 0616 aec (8bed39e3c35d6a489438b8141717a557) C:\WINDOWS\system32\drivers\aec.sys 2011/06/09 13:43:03.0781 0616 AFD (7618d5218f2a614672ec61a80d854a37) C:\WINDOWS\System32\drivers\afd.sys 2011/06/09 13:43:05.0718 0616 Ambfilt (267fc636801edc5ab28e14036349e3be) C:\WINDOWS\system32\drivers\Ambfilt.sys 2011/06/09 13:43:07.0718 0616 AsyncMac (b153affac761e7f5fcfa822b9c4e97bc) C:\WINDOWS\system32\DRIVERS\asyncmac.sys 2011/06/09 13:43:08.0000 0616 atapi (9f3a2f5aa6875c72bf062c712cfa2674) C:\WINDOWS\system32\DRIVERS\atapi.sys 2011/06/09 13:43:08.0546 0616 Atmarpc (9916c1225104ba14794209cfa8012159) C:\WINDOWS\system32\DRIVERS\atmarpc.sys 2011/06/09 13:43:08.0875 0616 audstub (d9f724aa26c010a217c97606b160ed68) C:\WINDOWS\system32\DRIVERS\audstub.sys 2011/06/09 13:43:09.0250 0616 bdfsfltr (9b281f5f673cbc5b9ec886d59e0b4f26) C:\WINDOWS\system32\drivers\bdfsfltr.sys 2011/06/09 13:43:09.0625 0616 Beep (da1f27d85e0d1525f6621372e7b685e9) C:\WINDOWS\system32\drivers\Beep.sys 2011/06/09 13:43:09.0921 0616 cbidf2k (90a673fc8e12a79afbed2576f6a7aaf9) C:\WINDOWS\system32\drivers\cbidf2k.sys 2011/06/09 13:43:10.0234 0616 CCDECODE (0be5aef125be881c4f854c554f2b025c) C:\WINDOWS\system32\DRIVERS\CCDECODE.sys 2011/06/09 13:43:11.0015 0616 Cdfs (c885b02847f5d2fd45a24e219ed93b32) C:\WINDOWS\system32\drivers\Cdfs.sys 2011/06/09 13:43:11.0328 0616 Cdrom (1f4260cc5b42272d71f79e570a27a4fe) C:\WINDOWS\system32\DRIVERS\cdrom.sys 2011/06/09 13:43:13.0609 0616 Disk (044452051f3e02e7963599fc8f4f3e25) C:\WINDOWS\system32\DRIVERS\disk.sys 2011/06/09 13:43:14.0171 0616 dmboot (f5deadd42335fb33edca74ecb2f36cba) C:\WINDOWS\system32\drivers\dmboot.sys 2011/06/09 13:43:14.0734 0616 dmio (5a7c47c9b3f9fb92a66410a7509f0c71) C:\WINDOWS\system32\DRIVERS\dmio.sys 2011/06/09 13:43:15.0046 0616 dmload (e9317282a63ca4d188c0df5e09c6ac5f) C:\WINDOWS\system32\drivers\dmload.sys 2011/06/09 13:43:15.0375 0616 DMusic (8a208dfcf89792a484e76c40e5f50b45) C:\WINDOWS\system32\drivers\DMusic.sys 2011/06/09 13:43:15.0812 0616 driverhardwarev2 (a694d8db6d360a3bbb0bd1517f1c1aee) C:\Program Files\ma-config.com\Drivers\driverhardwarev2.sys 2011/06/09 13:43:16.0062 0616 drmkaud (8f5fcff8e8848afac920905fbd9d33c8) C:\WINDOWS\system32\drivers\drmkaud.sys 2011/06/09 13:43:16.0328 0616 DrvAgent32 (651554e483712b708ede864d0ca1aa73) C:\WINDOWS\system32\Drivers\DrvAgent32.sys 2011/06/09 13:43:16.0765 0616 Fastfat (38d332a6d56af32635675f132548343e) C:\WINDOWS\system32\drivers\Fastfat.sys 2011/06/09 13:43:17.0093 0616 Fdc (92cdd60b6730b9f50f6a1a0c1f8cdc81) C:\WINDOWS\system32\DRIVERS\fdc.sys 2011/06/09 13:43:17.0406 0616 FilterService (b73ec688c29f81f9da0fcf63682b3ecb) C:\WINDOWS\system32\DRIVERS\lvuvcflt.sys 2011/06/09 13:43:17.0687 0616 Fips (31f923eb2170fc172c81abda0045d18c) C:\WINDOWS\system32\drivers\Fips.sys 2011/06/09 13:43:17.0953 0616 Flpydisk (9d27e7b80bfcdf1cdd9b555862d5e7f0) C:\WINDOWS\system32\drivers\Flpydisk.sys 2011/06/09 13:43:18.0281 0616 FltMgr (b2cf4b0786f8212cb92ed2b50c6db6b0) C:\WINDOWS\system32\drivers\fltmgr.sys 2011/06/09 13:43:18.0593 0616 Fs_Rec (3e1e2bd4f39b0e2b7dc4f4d2bcc2779a) C:\WINDOWS\system32\drivers\Fs_Rec.sys 2011/06/09 13:43:18.0921 0616 Ftdisk (a86859b77b908c18c2657f284aa29fe3) C:\WINDOWS\system32\DRIVERS\ftdisk.sys 2011/06/09 13:43:19.0218 0616 Gpc (0a02c63c8b144bd8c86b103dee7c86a2) C:\WINDOWS\system32\DRIVERS\msgpc.sys 2011/06/09 13:43:19.0640 0616 HDAudBus (573c7d0a32852b48f3058cfd8026f511) C:\WINDOWS\system32\DRIVERS\HDAudBus.sys 2011/06/09 13:43:19.0937 0616 hidusb (ccf82c5ec8a7326c3066de870c06daf1) C:\WINDOWS\system32\DRIVERS\hidusb.sys 2011/06/09 13:43:20.0578 0616 HTTP (f80a415ef82cd06ffaf0d971528ead38) C:\WINDOWS\system32\Drivers\HTTP.sys 2011/06/09 13:43:21.0453 0616 i8042prt (a09bdc4ed10e3b2e0ec27bb94af32516) C:\WINDOWS\system32\DRIVERS\i8042prt.sys 2011/06/09 13:43:21.0796 0616 Imapi (083a052659f5310dd8b6a6cb05edcf8e) C:\WINDOWS\system32\DRIVERS\imapi.sys 2011/06/09 13:43:24.0515 0616 IntcAzAudAddService (7a9299f48d6f2e802e5b0e0dc508842a) C:\WINDOWS\system32\drivers\RtkHDAud.sys 2011/06/09 13:43:27.0078 0616 intelppm (ad340800c35a42d4de1641a37feea34c) C:\WINDOWS\system32\DRIVERS\intelppm.sys 2011/06/09 13:43:27.0375 0616 Ip6Fw (3bb22519a194418d5fec05d800a19ad0) C:\WINDOWS\system32\drivers\ip6fw.sys 2011/06/09 13:43:27.0687 0616 IpInIp (b87ab476dcf76e72010632b5550955f5) C:\WINDOWS\system32\DRIVERS\ipinip.sys 2011/06/09 13:43:28.0015 0616 IpNat (cc748ea12c6effde940ee98098bf96bb) C:\WINDOWS\system32\DRIVERS\ipnat.sys 2011/06/09 13:43:28.0343 0616 IPSec (23c74d75e36e7158768dd63d92789a91) C:\WINDOWS\system32\DRIVERS\ipsec.sys 2011/06/09 13:43:28.0640 0616 IRENUM (c93c9ff7b04d772627a3646d89f7bf89) C:\WINDOWS\system32\DRIVERS\irenum.sys 2011/06/09 13:43:28.0937 0616 isapnp (355836975a67b6554bca60328cd6cb74) C:\WINDOWS\system32\DRIVERS\isapnp.sys 2011/06/09 13:43:29.0234 0616 Kbdclass (16813155807c6881f4bfbf6657424659) C:\WINDOWS\system32\DRIVERS\kbdclass.sys 2011/06/09 13:43:29.0515 0616 kbdhid (94c59cb884ba010c063687c3a50dce8e) C:\WINDOWS\system32\DRIVERS\kbdhid.sys 2011/06/09 13:43:29.0843 0616 kmixer (692bcf44383d056aed41b045a323d378) C:\WINDOWS\system32\drivers\kmixer.sys 2011/06/09 13:43:30.0203 0616 KSecDD (b467646c54cc746128904e1654c750c1) C:\WINDOWS\system32\drivers\KSecDD.sys 2011/06/09 13:43:30.0953 0616 LVPr2Mon (8be71d7edb8c7494913722059f760dd0) C:\WINDOWS\system32\Drivers\LVPr2Mon.sys 2011/06/09 13:43:31.0328 0616 LVRS (a1857fbb9b4930eeb2fd92386c45c529) C:\WINDOWS\system32\DRIVERS\lvrs.sys 2011/06/09 13:43:33.0921 0616 LVUVC (a240e42a7402e927a71b6e8aa4629b13) C:\WINDOWS\system32\DRIVERS\lvuvc.sys 2011/06/09 13:43:36.0531 0616 mnmdd (4ae068242760a1fb6e1a44bf4e16afa6) C:\WINDOWS\system32\drivers\mnmdd.sys 2011/06/09 13:43:36.0828 0616 Modem (510ade9327fe84c10254e1902697e25f) C:\WINDOWS\system32\drivers\Modem.sys 2011/06/09 13:43:37.0562 0616 Monfilt (c7d9f9717916b34c1b00dd4834af485c) C:\WINDOWS\system32\drivers\Monfilt.sys 2011/06/09 13:43:38.0312 0616 Mouclass (027c01bd7ef3349aaebc883d8a799efb) C:\WINDOWS\system32\DRIVERS\mouclass.sys 2011/06/09 13:43:38.0578 0616 mouhid (124d6846040c79b9c997f78ef4b2a4e5) C:\WINDOWS\system32\DRIVERS\mouhid.sys 2011/06/09 13:43:38.0843 0616 MountMgr (a80b9a0bad1b73637dbcbba7df72d3fd) C:\WINDOWS\system32\drivers\MountMgr.sys 2011/06/09 13:43:39.0187 0616 MQAC (eee50bf24caeedb515a8f3b22756d3bb) C:\WINDOWS\system32\drivers\mqac.sys 2011/06/09 13:43:39.0640 0616 MREMP50 (9bd4dcb5412921864a7aacdedfbd1923) C:\PROGRA~1\COMMON~1\Motive\MREMP50.SYS 2011/06/09 13:43:39.0859 0616 MRESP50 (07c02c892e8e1a72d6bf35004f0e9c5e) C:\PROGRA~1\COMMON~1\Motive\MRESP50.SYS 2011/06/09 13:43:40.0203 0616 MRxDAV (11d42bb6206f33fbb3ba0288d3ef81bd) C:\WINDOWS\system32\DRIVERS\mrxdav.sys 2011/06/09 13:43:40.0687 0616 MRxSmb (0ea4d8ed179b75f8afa7998ba22285ca) C:\WINDOWS\system32\DRIVERS\mrxsmb.sys 2011/06/09 13:43:41.0171 0616 Msfs (c941ea2454ba8350021d774daf0f1027) C:\WINDOWS\system32\drivers\Msfs.sys 2011/06/09 13:43:41.0468 0616 MSKSSRV (d1575e71568f4d9e14ca56b7b0453bf1) C:\WINDOWS\system32\drivers\MSKSSRV.sys 2011/06/09 13:43:41.0781 0616 MSPCLOCK (325bb26842fc7ccc1fcce2c457317f3e) C:\WINDOWS\system32\drivers\MSPCLOCK.sys 2011/06/09 13:43:42.0062 0616 MSPQM (bad59648ba099da4a17680b39730cb3d) C:\WINDOWS\system32\drivers\MSPQM.sys 2011/06/09 13:43:42.0328 0616 mssmbios (af5f4f3f14a8ea2c26de30f7a1e17136) C:\WINDOWS\system32\DRIVERS\mssmbios.sys 2011/06/09 13:43:42.0609 0616 MSTEE (e53736a9e30c45fa9e7b5eac55056d1d) C:\WINDOWS\system32\drivers\MSTEE.sys 2011/06/09 13:43:42.0921 0616 Mup (2f625d11385b1a94360bfc70aaefdee1) C:\WINDOWS\system32\drivers\Mup.sys 2011/06/09 13:43:43.0218 0616 NABTSFEC (5b50f1b2a2ed47d560577b221da734db) C:\WINDOWS\system32\DRIVERS\NABTSFEC.sys 2011/06/09 13:43:43.0593 0616 NDIS (1df7f42665c94b825322fae71721130d) C:\WINDOWS\system32\drivers\NDIS.sys 2011/06/09 13:43:43.0921 0616 NdisIP (7ff1f1fd8609c149aa432f95a8163d97) C:\WINDOWS\system32\DRIVERS\NdisIP.sys 2011/06/09 13:43:44.0218 0616 NdisTapi (1ab3d00c991ab086e69db84b6c0ed78f) C:\WINDOWS\system32\DRIVERS\ndistapi.sys 2011/06/09 13:43:44.0484 0616 Ndisuio (f927a4434c5028758a842943ef1a3849) C:\WINDOWS\system32\DRIVERS\ndisuio.sys 2011/06/09 13:43:44.0781 0616 NdisWan (edc1531a49c80614b2cfda43ca8659ab) C:\WINDOWS\system32\DRIVERS\ndiswan.sys 2011/06/09 13:43:45.0078 0616 NDProxy (9282bd12dfb069d3889eb3fcc1000a9b) C:\WINDOWS\system32\drivers\NDProxy.sys 2011/06/09 13:43:45.0343 0616 NetBIOS (5d81cf9a2f1a3a756b66cf684911cdf0) C:\WINDOWS\system32\DRIVERS\netbios.sys 2011/06/09 13:43:45.0671 0616 NetBT (74b2b2f5bea5e9a3dc021d685551bd3d) C:\WINDOWS\system32\DRIVERS\netbt.sys 2011/06/09 13:43:46.0125 0616 Npfs (3182d64ae053d6fb034f44b6def8034a) C:\WINDOWS\system32\drivers\Npfs.sys 2011/06/09 13:43:46.0609 0616 Ntfs (78a08dd6a8d65e697c18e1db01c5cdca) C:\WINDOWS\system32\drivers\Ntfs.sys 2011/06/09 13:43:47.0140 0616 Null (73c1e1f395918bc2c6dd67af7591a3ad) C:\WINDOWS\system32\drivers\Null.sys 2011/06/09 13:43:47.0421 0616 NwlnkFlt (b305f3fad35083837ef46a0bbce2fc57) C:\WINDOWS\system32\DRIVERS\nwlnkflt.sys 2011/06/09 13:43:47.0703 0616 NwlnkFwd (c99b3415198d1aab7227f2c88fd664b9) C:\WINDOWS\system32\DRIVERS\nwlnkfwd.sys 2011/06/09 13:43:48.0062 0616 ohci1394 (ca33832df41afb202ee7aeb05145922f) C:\WINDOWS\system32\drivers\ohci1394.sys 2011/06/09 13:43:48.0375 0616 Parport (8fd0bdbea875d06ccf6c945ca9abaf75) C:\WINDOWS\system32\DRIVERS\parport.sys 2011/06/09 13:43:48.0671 0616 PartMgr (beb3ba25197665d82ec7065b724171c6) C:\WINDOWS\system32\drivers\PartMgr.sys 2011/06/09 13:43:48.0937 0616 ParVdm (9575c5630db8fb804649a6959737154c) C:\WINDOWS\system32\drivers\ParVdm.sys 2011/06/09 13:43:49.0203 0616 PCI (043410877bda580c528f45165f7125bc) C:\WINDOWS\system32\DRIVERS\pci.sys 2011/06/09 13:43:49.0734 0616 PCIIde (f4bfde7209c14a07aaa61e4d6ae69eac) C:\WINDOWS\system32\DRIVERS\pciide.sys 2011/06/09 13:43:50.0046 0616 Pcmcia (f0406cbc60bdb0394a0e17ffb04cdd3d) C:\WINDOWS\system32\drivers\Pcmcia.sys 2011/06/09 13:43:52.0921 0616 PID_PEPI (dd184d9adfe2a8a21741dbdfe9e22f5c) C:\WINDOWS\system32\DRIVERS\LV302V32.SYS 2011/06/09 13:43:54.0187 0616 PptpMiniport (efeec01b1d3cf84f16ddd24d9d9d8f99) C:\WINDOWS\system32\DRIVERS\raspptp.sys 2011/06/09 13:43:54.0359 0616 Profos (d90a33660d328a9f587580f0b38c85de) C:\Program Files\Bell\Services de sécurité Internet de Bell\BitDefender\profos.sys 2011/06/09 13:43:54.0687 0616 PSched (09298ec810b07e5d582cb3a3f9255424) C:\WINDOWS\system32\DRIVERS\psched.sys 2011/06/09 13:43:54.0984 0616 Ptilink (80d317bd1c3dbc5d4fe7b1678c60cadd) C:\WINDOWS\system32\DRIVERS\ptilink.sys 2011/06/09 13:43:55.0281 0616 PxHelp20 (e42e3433dbb4cffe8fdd91eab29aea8e) C:\WINDOWS\system32\Drivers\PxHelp20.sys 2011/06/09 13:43:56.0875 0616 RadialpointIDSDriver (9dc4b985729c8ae26b0fd607d2081048) C:\Program Files\Bell\Services de sécurité Internet de Bell\AVG\Identity Protection\agent\drivers\AVGIDSDriver.sys 2011/06/09 13:43:57.0218 0616 RadialpointIDSEH (2457250ca176e7fde9c3d3b2c94341f0) C:\WINDOWS\system32\drivers\AVGIDSEH.sys 2011/06/09 13:43:57.0312 0616 RadialpointIDSFilter (0871aad56c4960e311150fd724e106ae) C:\Program Files\Bell\Services de sécurité Internet de Bell\AVG\Identity Protection\agent\drivers\AVGIDSFilter.sys 2011/06/09 13:43:57.0453 0616 RadialpointIDSShim (2b949205f1c53b6e4002a3c38327c9a2) C:\Program Files\Bell\Services de sécurité Internet de Bell\AVG\Identity Protection\agent\drivers\AVGIDSShim.sys 2011/06/09 13:43:57.0750 0616 RasAcd (fe0d99d6f31e4fad8159f690d68ded9c) C:\WINDOWS\system32\DRIVERS\rasacd.sys 2011/06/09 13:43:58.0046 0616 Rasl2tp (11b4a627bc9614b885c4969bfa5ff8a6) C:\WINDOWS\system32\DRIVERS\rasl2tp.sys 2011/06/09 13:43:58.0343 0616 RasPppoe (5bc962f2654137c9909c3d4603587dee) C:\WINDOWS\system32\DRIVERS\raspppoe.sys 2011/06/09 13:43:58.0609 0616 Raspti (fdbb1d60066fcfbb7452fd8f9829b242) C:\WINDOWS\system32\DRIVERS\raspti.sys 2011/06/09 13:43:58.0937 0616 Rdbss (7ad224ad1a1437fe28d89cf22b17780a) C:\WINDOWS\system32\DRIVERS\rdbss.sys 2011/06/09 13:43:59.0265 0616 RDPCDD (4912d5b403614ce99c28420f75353332) C:\WINDOWS\system32\DRIVERS\RDPCDD.sys 2011/06/09 13:43:59.0609 0616 rdpdr (15cabd0f7c00c47c70124907916af3f1) C:\WINDOWS\system32\DRIVERS\rdpdr.sys 2011/06/09 13:44:00.0000 0616 RDPWD (6728e45b66f93c08f11de2e316fc70dd) C:\WINDOWS\system32\drivers\RDPWD.sys 2011/06/09 13:44:00.0328 0616 redbook (d8eb2a7904db6c916eb5361878ddcbae) C:\WINDOWS\system32\DRIVERS\redbook.sys 2011/06/09 13:44:00.0734 0616 RMCAST (96f7a9a7bf0c9c0440a967440065d33c) C:\WINDOWS\system32\drivers\RMCast.sys 2011/06/09 13:44:01.0093 0616 ROOTMODEM (d8b0b4ade32574b2d9c5cc34dc0dbbe7) C:\WINDOWS\system32\Drivers\RootMdm.sys 2011/06/09 13:44:01.0421 0616 RPPKT (b7e136986bb3dac249a00e760281f0a9) C:\WINDOWS\system32\DRIVERS\rp_pkt32.sys 2011/06/09 13:44:01.0718 0616 RPSKT (750d83c39d60964b6bc2b8a75ed7a165) C:\WINDOWS\system32\DRIVERS\rp_skt32.sys 2011/06/09 13:44:01.0984 0616 SASDIFSV (a3281aec37e0720a2bc28034c2df2a56) C:\Program Files\SUPERAntiSpyware\SASDIFSV.SYS 2011/06/09 13:44:02.0093 0616 SASKUTIL (61db0d0756a99506207fd724e3692b25) C:\Program Files\SUPERAntiSpyware\SASKUTIL.SYS 2011/06/09 13:44:02.0531 0616 Secdrv (90a3935d05b494a5a39d37e71f09a677) C:\WINDOWS\system32\DRIVERS\secdrv.sys 2011/06/09 13:44:02.0859 0616 serenum (0f29512ccd6bead730039fb4bd2c85ce) C:\WINDOWS\system32\DRIVERS\serenum.sys 2011/06/09 13:44:03.0125 0616 Serial (93d313c31f7ad9ea2b75f26075413c7c) C:\WINDOWS\system32\DRIVERS\serial.sys 2011/06/09 13:44:03.0515 0616 Sfloppy (8e6b8c671615d126fdc553d1e2de5562) C:\WINDOWS\system32\drivers\Sfloppy.sys 2011/06/09 13:44:04.0171 0616 SiS315 (88f2aebb99c5bdc2f12a1f47e5355730) C:\WINDOWS\system32\DRIVERS\sisgrp.sys 2011/06/09 13:44:04.0531 0616 SiSGbeXP (37daa9f59a3ff30a314fd98ee8f47000) C:\WINDOWS\system32\DRIVERS\SiSGbeXP.sys 2011/06/09 13:44:04.0796 0616 SiSkp (2e49c8d6057eb13aa30733ca2f592348) C:\WINDOWS\system32\DRIVERS\srvkp.sys 2011/06/09 13:44:05.0062 0616 SLIP (866d538ebe33709a5c9f5c62b73b7d14) C:\WINDOWS\system32\DRIVERS\SLIP.sys 2011/06/09 13:44:08.0875 0616 SNPSTD3 (11bb0e11d42cc3a43d741d9b30839be1) C:\WINDOWS\system32\DRIVERS\snpstd3.sys 2011/06/09 13:44:12.0812 0616 splitter (ab8b92451ecb048a4d1de7c3ffcb4a9f) C:\WINDOWS\system32\drivers\splitter.sys 2011/06/09 13:44:13.0125 0616 SpyEmrg (a60f1294709054ab62ac909c5616ca78) C:\WINDOWS\system32\Drivers\spyemrg.sys 2011/06/09 13:44:13.0390 0616 SpyEmrgAccess (cac0e73a49c850ed21904b5843a37c0a) C:\WINDOWS\system32\Drivers\spyemrg_access.sys 2011/06/09 13:44:13.0656 0616 SpyEmrgGuard (0e4faa4dcfc4e60d746e267f820d2446) C:\WINDOWS\system32\Drivers\spyemrg_guard.sys 2011/06/09 13:44:13.0984 0616 sr (39626e6dc1fb39434ec40c42722b660a) C:\WINDOWS\system32\DRIVERS\sr.sys 2011/06/09 13:44:14.0406 0616 Srv (47ddfc2f003f7f9f0592c6874962a2e7) C:\WINDOWS\system32\DRIVERS\srv.sys 2011/06/09 13:44:15.0140 0616 streamip (77813007ba6265c4b6098187e6ed79d2) C:\WINDOWS\system32\DRIVERS\StreamIP.sys 2011/06/09 13:44:15.0421 0616 swenum (3941d127aef12e93addf6fe6ee027e0f) C:\WINDOWS\system32\DRIVERS\swenum.sys 2011/06/09 13:44:15.0703 0616 swmidi (8ce882bcc6cf8a62f2b2323d95cb3d01) C:\WINDOWS\system32\drivers\swmidi.sys 2011/06/09 13:44:17.0078 0616 sysaudio (8b83f3ed0f1688b4958f77cd6d2bf290) C:\WINDOWS\system32\drivers\sysaudio.sys 2011/06/09 13:44:17.0531 0616 Tcpip (9aefa14bd6b182d61e3119fa5f436d3d) C:\WINDOWS\system32\DRIVERS\tcpip.sys 2011/06/09 13:44:17.0921 0616 TDPIPE (6471a66807f5e104e4885f5b67349397) C:\WINDOWS\system32\drivers\TDPIPE.sys 2011/06/09 13:44:18.0203 0616 TDTCP (c56b6d0402371cf3700eb322ef3aaf61) C:\WINDOWS\system32\drivers\TDTCP.sys 2011/06/09 13:44:18.0500 0616 TermDD (88155247177638048422893737429d9e) C:\WINDOWS\system32\DRIVERS\termdd.sys 2011/06/09 13:44:19.0031 0616 Trufos (b16d66a71de03285e14e9f165b59eda4) C:\Program Files\Bell\Services de sécurité Internet de Bell\BitDefender\trufos.sys 2011/06/09 13:44:19.0359 0616 uagp35 (d85938f272d1bcf3db3a31fc0a048928) C:\WINDOWS\system32\DRIVERS\uagp35.sys 2011/06/09 13:44:19.0656 0616 Udfs (5787b80c2e3c5e2f56c2a233d91fa2c9) C:\WINDOWS\system32\drivers\Udfs.sys 2011/06/09 13:44:20.0328 0616 Update (402ddc88356b1bac0ee3dd1580c76a31) C:\WINDOWS\system32\DRIVERS\update.sys 2011/06/09 13:44:20.0828 0616 usbaudio (e919708db44ed8543a7c017953148330) C:\WINDOWS\system32\drivers\usbaudio.sys 2011/06/09 13:44:21.0125 0616 usbccgp (173f317ce0db8e21322e71b7e60a27e8) C:\WINDOWS\system32\DRIVERS\usbccgp.sys 2011/06/09 13:44:21.0406 0616 usbehci (65dcf09d0e37d4c6b11b5b0b76d470a7) C:\WINDOWS\system32\DRIVERS\usbehci.sys 2011/06/09 13:44:21.0687 0616 usbhub (1ab3cdde553b6e064d2e754efe20285c) C:\WINDOWS\system32\DRIVERS\usbhub.sys 2011/06/09 13:44:21.0968 0616 usbohci (0daecce65366ea32b162f85f07c6753b) C:\WINDOWS\system32\DRIVERS\usbohci.sys 2011/06/09 13:44:22.0265 0616 usbprint (a717c8721046828520c9edf31288fc00) C:\WINDOWS\system32\DRIVERS\usbprint.sys 2011/06/09 13:44:22.0546 0616 usbstor (a32426d9b14a089eaa1d922e0c5801a9) C:\WINDOWS\system32\DRIVERS\USBSTOR.SYS 2011/06/09 13:44:22.0859 0616 usbvideo (63bbfca7f390f4c49ed4b96bfb1633e0) C:\WINDOWS\system32\Drivers\usbvideo.sys 2011/06/09 13:44:23.0218 0616 VgaSave (0d3a8fafceacd8b7625cd549757a7df1) C:\WINDOWS\System32\drivers\vga.sys 2011/06/09 13:44:23.0781 0616 VolSnap (7ab08d3d4cb52fe40645cb19b679d505) C:\WINDOWS\system32\DRIVERS\volsnap.sys 2011/06/09 13:44:24.0171 0616 Wanarp (e20b95baedb550f32dd489265c1da1f6) C:\WINDOWS\system32\DRIVERS\wanarp.sys 2011/06/09 13:44:24.0718 0616 wdmaud (6768acf64b18196494413695f0c3a00f) C:\WINDOWS\system32\drivers\wdmaud.sys 2011/06/09 13:44:25.0312 0616 WSTCODEC (c98b39829c2bbd34e454150633c62c78) C:\WINDOWS\system32\DRIVERS\WSTCODEC.SYS 2011/06/09 13:44:25.0593 0616 WudfPf (f15feafffbb3644ccc80c5da584e6311) C:\WINDOWS\system32\DRIVERS\WudfPf.sys 2011/06/09 13:44:25.0906 0616 WudfRd (28b524262bce6de1f7ef9f510ba3985b) C:\WINDOWS\system32\DRIVERS\wudfrd.sys 2011/06/09 13:44:26.0140 0616 MBR (0x1B8) (dad11e2a62df7f44f938c5059e874339) \Device\Harddisk0\DR0 2011/06/09 13:44:26.0187 0616 \Device\Harddisk0\DR0 - detected Rootkit.Win32.TDSS.tdl4 (0) 2011/06/09 13:44:26.0234 0616 MBR (0x1B8) (e5fa06aca0d60ba9c870d0ef3d9898c9) \Device\Harddisk5\DR12 2011/06/09 13:44:26.0343 0616 ================================================================================ 2011/06/09 13:44:26.0343 0616 Scan finished 2011/06/09 13:44:26.0343 0616 ================================================================================ 2011/06/09 13:44:26.0421 0524 Detected object count: 1 2011/06/09 13:44:26.0421 0524 Actual detected object count: 1 2011/06/09 13:44:58.0421 0524 \Device\Harddisk0\DR0 (Rootkit.Win32.TDSS.tdl4) - will be cured after reboot 2011/06/09 13:44:58.0421 0524 \Device\Harddisk0\DR0 - ok 2011/06/09 13:44:58.0421 0524 Rootkit.Win32.TDSS.tdl4(\Device\Harddisk0\DR0) - User select action: Cure 2011/06/09 13:55:36.0671 1508 TDSS rootkit removing tool 2.5.4.0 Jun 7 2011 17:31:48 2011/06/09 13:55:36.0812 1508 ================================================================================ 2011/06/09 13:55:36.0812 1508 SystemInfo: 2011/06/09 13:55:36.0812 1508 2011/06/09 13:55:36.0812 1508 OS Version: 5.1.2600 ServicePack: 3.0 2011/06/09 13:55:36.0812 1508 Product type: Workstation 2011/06/09 13:55:36.0812 1508 ComputerName: ALI-EB93CC60C3B 2011/06/09 13:55:36.0812 1508 UserName: ALI 2011/06/09 13:55:36.0812 1508 Windows directory: C:\WINDOWS 2011/06/09 13:55:36.0812 1508 System windows directory: C:\WINDOWS 2011/06/09 13:55:36.0812 1508 Processor architecture: Intel x86 2011/06/09 13:55:36.0812 1508 Number of processors: 2 2011/06/09 13:55:36.0812 1508 Page size: 0x1000 2011/06/09 13:55:36.0812 1508 Boot type: Safe boot 2011/06/09 13:55:36.0812 1508 ================================================================================ 2011/06/09 13:55:40.0328 1508 Initialize success 2011/06/09 13:55:52.0968 1504 Deinitialize success 2011/06/09 13:45:09.0546 0136 Deinitialize success -
Infection antivirus xp (Résolu)
lecool a répondu à un(e) sujet de lecool dans Analyses et éradication malwares
Zebulon.fr est le seul forum auquel j'ai demandé de l'aide... Rapport avec option 4 RogueKiller V5.2.2 [05/06/2011] par Tigzy contact sur Forum Sciences / Forum Informatique - Sur la Toile (SLT) mail: tigzyRK<at>gmail<dot>com Remontees: [RogueKiller] Remontées (1/24) Systeme d'exploitation: Windows XP (5.1.2600 Service Pack 3) 32 bits version Demarrage : Mode sans echec Utilisateur: ALI [Droits d'admin] Mode: Proxy RAZ -- Date : 09/06/2011 13:29:03 Processus malicieux: 0 Entrees de registre: 1 [PROXY IE] HKCU\[...]\Internet Settings : ProxyServer (http=127.0.0.1:62283) -> DELETED Termine : << RKreport[8].txt >> RKreport[1].txt ; RKreport[2].txt ; RKreport[3].txt ; RKreport[4].txt ; RKreport[5].txt ; RKreport[6].txt ; RKreport[7].txt ; RKreport[8].txt -
Infection antivirus xp (Résolu)
lecool a répondu à un(e) sujet de lecool dans Analyses et éradication malwares
Voici le rapport RK RogueKiller V5.2.2 [05/06/2011] par Tigzy contact sur Forum Sciences / Forum Informatique - Sur la Toile (SLT) mail: tigzyRK<at>gmail<dot>com Remontees: [RogueKiller] Remontées (1/24) Systeme d'exploitation: Windows XP (5.1.2600 Service Pack 3) 32 bits version Demarrage : Mode normal Utilisateur: ALI [Droits d'admin] Mode: Suppression -- Date : 09/06/2011 12:42:16 Processus malicieux: 2 [sUSP PATH] 334F.exe -- c:\windows\temp\334f.exe -> KILLED [sUSP PATH] questscan133.exe -- c:\documents and settings\all users\application data\questscan\questscan133.exe -> KILLED Entrees de registre: 1 [PROXY IE] HKCU\[...]\Internet Settings : ProxyServer (http=127.0.0.1:62283) -> NOT REMOVED, USE PROXYFIX Fichier HOSTS: Termine : << RKreport[7].txt >> RKreport[1].txt ; RKreport[2].txt ; RKreport[3].txt ; RKreport[4].txt ; RKreport[5].txt ; RKreport[6].txt ; RKreport[7].txt -
Infection antivirus xp (Résolu)
lecool a répondu à un(e) sujet de lecool dans Analyses et éradication malwares
Merci puis-jefaire ses manipulations en mode sans echec ? -
Bonjour Ma machine est infectée,je suis sous xp pro pack3. C'est l'un de ces virus sous formes d'antivirus qui détecte soit disant des fichiers infectés et vous recommande de scanner... Je suis novice en informatique. Ce virus bloque l'acces a internet, Si quelqu'un peut m'aider. je l'en remercie d'avance