Aller au contenu
  • Pas encore inscrit ?

    Pourquoi ne pas vous inscrire ? C'est simple, rapide et gratuit.
    Pour en savoir plus, lisez Les avantages de l'inscription... et la Charte de Zébulon.
    De plus, les messages que vous postez en tant qu'invité restent invisibles tant qu'un modérateur ne les a pas validés. Inscrivez-vous, ce sera un gain de temps pour tout le monde, vous, les helpeurs et les modérateurs ! :wink:

Messages recommandés

Posté(e) (modifié)

bonjour a tous

 

j'ai passe une nuit blanche pour résoudre un problème de fenetres intempestives qui s'ouvrent en arrière plan de la page principale (des pages de pub genre IQ Test, Traqueur, Hot Russian Brides, IMBooster,...ect) alors je lance un appel au secours ici

malgré ma prudence lors du serf sur internet j'ai du télécharger une saloperie j'ai fait une analyse hijackthis dont le rapport va suivre je vous remercie d'avance pour l'aide que vous voulez bien m'apporter parce que je suis vraiment perdu

 

Logfile of Trend Micro HijackThis v2.0.2

Scan saved at 08:55:29, on 16/09/2009

Platform: Unknown Windows (WinNT 6.01.3504)

MSIE: Internet Explorer v8.00 (8.00.7600.16385)

Boot mode: Normal

 

Running processes:

K:\Windows\system32\taskhost.exe

K:\Windows\system32\Dwm.exe

K:\Windows\Explorer.EXE

K:\Program Files\Avira\AntiVir Desktop\avgnt.exe

K:\Program Files\Realtek\Audio\HDA\RtHDVCpl.exe

K:\Program Files\Mozilla Firefox\firefox.exe

K:\Program Files\Megaupload\Mega Manager\MegaManager.exe

K:\Program Files\OrangeHSS\Launcher\Launcher.exe

K:\PROGRA~1\COMMON~1\France Telecom\Shared Modules\AlertModule\0\AlertModule.exe

K:\Program Files\OrangeHSS\connectivity\connectivitymanager.exe

K:\Program Files\OrangeHSS\systray\systrayapp.exe

K:\Program Files\OrangeHSS\connectivity\CoreCom\CoreCom.exe

K:\Program Files\OrangeHSS\connectivity\CoreCom\OraConfigRecover.exe

K:\PROGRA~1\COMMON~1\France Telecom\Shared Modules\FTCOMModule\0\FTCOMModule.exe

K:\Users\BOSS\Desktop\HiJackThis.exe

 

R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896

R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?LinkId=69157

R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157

R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896

R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896

R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?LinkId=69157

R0 - HKLM\Software\Microsoft\Internet Explorer\Search,SearchAssistant =

R0 - HKLM\Software\Microsoft\Internet Explorer\Search,CustomizeSearch =

R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName =

R3 - URLSearchHook: Search Class - {08C06D61-F1F3-4799-86F8-BE1A89362C85} - K:\Program Files\OrangeHSS\SearchURLHook\SearchPageURL.dll

O2 - BHO: Media Access Startup - {25B8D58C-B0CB-46b0-BA64-05B3804E4E86} - K:\Program Files\Media Access Startup\2.0.0.1050\HPIEAddOn.dll

O2 - BHO: NP Helper Class - {35B8D58C-B0CB-46b0-BA64-05B3804E4E86} - K:\Program Files\Internet Saving Optimizer\3.8.1.4690\NPIEAddOn.dll

O2 - BHO: Mega Manager IE Click Monitor - {bf00e119-21a3-4fd1-b178-3b8537e75c92} - K:\Program Files\Megaupload\Mega Manager\MegaIEMn.dll

O2 - BHO: NitroPDFBHO Class - {CF070CB8-F02F-4af4-A7B7-8D45CAD4BB54} - K:\Program Files\Nitro PDF\PDF Download\NitroPDF.dll

O4 - HKLM\..\Run: [avgnt] "K:\Program Files\Avira\AntiVir Desktop\avgnt.exe" /min

O4 - HKLM\..\Run: [RtHDVCpl] K:\Program Files\Realtek\Audio\HDA\RtHDVCpl.exe -s

O8 - Extra context menu item: Liens de téléchargement avec Mega Manager... - K:\Program Files\Megaupload\Mega Manager\mm_file.htm

O8 - Extra context menu item: Save Page As PDF ... - file://K:\Program Files\Nitro PDF\PDF Download\nitroweb.htm

O9 - Extra button: (no name) - {AD9E6088-E00B-42f9-9F0C-8480525D234E} - K:\Program Files\Nitro PDF\PDF Download\NitroPDF.dll

O9 - Extra 'Tools' menuitem: PDF Download - Options - {AD9E6088-E00B-42f9-9F0C-8480525D234E} - K:\Program Files\Nitro PDF\PDF Download\NitroPDF.dll

O9 - Extra button: PDF Download - {F1C0FD6C-A6A0-49a7-A932-71A56461867F} - K:\Program Files\Nitro PDF\PDF Download\NitroPDF.dll (HKCU)

O13 - Gopher Prefix:

O15 - Trusted Zone: http://*.mappy.com

O15 - Trusted Zone: http://*.orange.fr

O15 - Trusted Zone: http://rw.search.ke.voila.fr

O15 - Trusted Zone: http://orange.weborama.fr

O16 - DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} (Shockwave Flash Object) - http://fpdownload2.macromedia.com/get/shoc...ash/swflash.cab

O23 - Service: Avira AntiVir Planificateur (AntiVirSchedulerService) - Avira GmbH - K:\Program Files\Avira\AntiVir Desktop\sched.exe

O23 - Service: Avira AntiVir Guard (AntiVirService) - Avira GmbH - K:\Program Files\Avira\AntiVir Desktop\avguard.exe

O23 - Service: France Telecom Routing Table Service (FTRTSVC) - France Telecom SA - K:\PROGRA~1\COMMON~1\France Telecom\Shared Modules\FTRTSVC\0\FTRTSVC.exe

O23 - Service: NVIDIA Display Driver Service (nvsvc) - NVIDIA Corporation - K:\Windows\system32\nvvsvc.exe

O23 - Service: Sukoku Service - Unknown owner - K:\ProgramData\Sukoku\sukoku117.exe

O23 - Service: @%SystemRoot%\System32\TuneUpDefragService.exe,-1 (TuneUp.Defrag) - TuneUp Software - K:\Windows\System32\TuneUpDefragService.exe

O23 - Service: @%SystemRoot%\System32\TUProgSt.exe,-1 (TuneUp.ProgramStatisticsSvc) - TuneUp Software - K:\Windows\System32\TUProgSt.exe

 

--

End of file - 4676 bytes

Modifié par shibani

Posté(e)

Bonjour,

 

Télécharger sur le bureauOTM by OldTimer .

Double-clic sur OTM.exe pour le lancer.

Sous Vista,Clic droit sur le fichier ->Choisir Exécuter en tant qu' Administrateur

Vérifier que Unregister Dll's and Ocx's soit coché.

* Copiez /Collez les lignes ci dessous):

 

:Processes

:Files

k:\program files\media access startup\2.0.0.1050\hpieaddon.dll

k:\program files\internet saving optimizer\3.8.1.4690\npieaddon.dll

 

:Services

:Reg

[-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{25B8D58C-B0CB-46b0-BA64-05B3804E4E86}]

[-HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{25B8D58C-B0CB-46b0-BA64-05B3804E4E86}]

[-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{35B8D58C-B0CB-46b0-BA64-05B3804E4E86}]

[-HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{35B8D58C-B0CB-46b0-BA64-05B3804E4E86}]

 

:Commands

[purity]

[emptytemp]

[Reboot]

 

Revenez dans OTM,

Clic droit sur la fenêtre "Paste Instructions for Items to be Moved" sous la barre jaune et choisir Coller(Paste).

* Click le bouton rouge Moveit!

* Fermez OTM

Votre Pc va redémarrer.

Rendez vous dans le dossier C:\_OTM\MovedFiles ,

ouvrez le dernier fichier .log

Copiez/collez en le contenu dans votre prochaine réponse

 

 

Téléchargez MBAM

 

Branchez tous les supports amovibles avant de faire ce scan (clé usb/disque dur externe etc)

Si vous utilisez Spybot

Pour désactiver TeaTimer qui ne set à rien et peut faire échouer une désinfection:!

Afficher d'abord le Mode Avancé dans SpyBot

->Options Avancées :

- >menu Mode, Mode Avancé.

Une colonne de menus apparaît dans la partie gauche :

- >cliquer sur Outils,

- >cliquer sur Résident,

Dans Résident :

- >décocher Résident "TeaTimer" pour le désactiver.

* Double cliquez sur l'icône Download_mbam-setup.exe pour lancer le processus d'installation.

Enregistrez le sur le bureau .

Fermer toutes les fenêtres et programmes

Suivez les indications (en particulier le choix de la langue et l'autorisation d'accession à Internet)

N'apportez aucune modification aux réglages par défaut et, en fin d'installation,

Vérifiez que les options Update et Launch soient cochées

MBAM démarrera automatiquement et enverra un message demandant à mettre à jour le programme avant de lancer une analyse.

cliquer sur OK pour fermer la boîte de dialogue..

* Dans l'onglet "mise à jour", cliquez sur le bouton Recherche de mise à jour:

Si le pare-feu demande l'autorisation à MBAM de se connecter, acceptez.

* Une fois la mise à jour terminée, allez dans l'onglet Recherche.

* Sélectionnez "Exécuter un examen complet"

* Cliquez sur "Rechercher"

* .L' analyse prendra un certain temps, soyez patient !

* A la fin , un message affichera :

L'examen s'est terminé normalement.

 

*Si MBAM n'a rien trouvé, il le dira aussi.

Cliquez sur "Ok" pour poursuivre.

*Fermez les navigateurs.

Cliquez sur Afficher les résultats .

 

*Sélectionnez tout et cliquez sur Supprimer la sélection ,

MBAM va détruire les fichiers et clés de registre et en mettre une copie dans la quarantaine.

puis ouvrir le Bloc-notes et y copier le rapport d'analyse qui peut être retrouvé sous l'onglet Rapports/logs.

* Copiez-collez ce rapport dans la prochaine réponse.

Posté(e)

merci pour votre aide

taches demandé accomplie et voici les rapport :

 

All processes killed

========== PROCESSES ==========

========== FILES ==========

LoadLibrary failed for k:\program files\media access startup\2.0.0.1050\HPIEAddOn.dll

k:\program files\media access startup\2.0.0.1050\HPIEAddOn.dll NOT unregistered.

k:\program files\media access startup\2.0.0.1050\HPIEAddOn.dll moved successfully.

LoadLibrary failed for k:\program files\internet saving optimizer\3.8.1.4690\NPIEAddOn.dll

k:\program files\internet saving optimizer\3.8.1.4690\NPIEAddOn.dll NOT unregistered.

k:\program files\internet saving optimizer\3.8.1.4690\NPIEAddOn.dll moved successfully.

========== SERVICES/DRIVERS ==========

========== REGISTRY ==========

Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{25B8D58C-B0CB-46b0-BA64-05B3804E4E86}\ deleted successfully.

Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{25B8D58C-B0CB-46b0-BA64-05B3804E4E86}\ not found.

Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{25B8D58C-B0CB-46b0-BA64-05B3804E4E86}\ deleted successfully.

Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{25B8D58C-B0CB-46b0-BA64-05B3804E4E86}\ not found.

Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{35B8D58C-B0CB-46b0-BA64-05B3804E4E86}\ deleted successfully.

Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{35B8D58C-B0CB-46b0-BA64-05B3804E4E86}\ not found.

Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{35B8D58C-B0CB-46b0-BA64-05B3804E4E86}\ deleted successfully.

Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{35B8D58C-B0CB-46b0-BA64-05B3804E4E86}\ not found.

========== COMMANDS ==========

 

[EMPTYTEMP]

 

User: All Users

 

User: BOSS

->Temp folder emptied: 82114588 bytes

File delete failed. K:\Users\BOSS\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\index.dat scheduled to be deleted on reboot.

->Temporary Internet Files folder emptied: 28955850 bytes

->FireFox cache emptied: 70479535 bytes

 

User: Default

->Temp folder emptied: 0 bytes

->Temporary Internet Files folder emptied: 0 bytes

 

User: Default User

->Temp folder emptied: 0 bytes

->Temporary Internet Files folder emptied: 0 bytes

 

User: Public

 

%systemdrive% .tmp files removed: 0 bytes

%systemroot% .tmp files removed: 0 bytes

%systemroot%\System32 .tmp files removed: 0 bytes

Windows Temp folder emptied: 1046910 bytes

RecycleBin emptied: 0 bytes

 

Total Files Cleaned = 174,14 mb

 

OTM by OldTimer - Version 3.0.0.6 log created on 09162009_125245

 

Files moved on Reboot...

 

Registry entries deleted on Reboot...

 

 

 

Malwarebytes' Anti-Malware 1.41

Version de la base de données: 2809

Windows 6.1.7600

 

16/09/2009 13:57:03

mbam-log-2009-09-16 (13-57-03).txt

 

Type de recherche: Examen complet (C:\|D:\|F:\|K:\|)

Eléments examinés: 261349

Temps écoulé: 43 minute(s), 7 second(s)

 

Processus mémoire infecté(s): 0

Module(s) mémoire infecté(s): 0

Clé(s) du Registre infectée(s): 17

Valeur(s) du Registre infectée(s): 3

Elément(s) de données du Registre infecté(s): 0

Dossier(s) infecté(s): 19

Fichier(s) infecté(s): 130

 

Processus mémoire infecté(s):

(Aucun élément nuisible détecté)

 

Module(s) mémoire infecté(s):

(Aucun élément nuisible détecté)

 

Clé(s) du Registre infectée(s):

HKEY_CLASSES_ROOT\explorerbar.funexplorer (Adware.DoubleD) -> Quarantined and deleted successfully.

HKEY_CLASSES_ROOT\explorerbar.funexplorer.1 (Adware.DoubleD) -> Quarantined and deleted successfully.

HKEY_CLASSES_ROOT\Interface\{6160f76a-1992-4b17-a32d-0c706d159105} (Adware.DoubleD) -> Quarantined and deleted successfully.

HKEY_CLASSES_ROOT\Interface\{877f3eab-4462-44df-8475-6064eafd7fbf} (Adware.DoubleD) -> Quarantined and deleted successfully.

HKEY_CLASSES_ROOT\Typelib\{ac5ab953-ed25-4f9c-87f0-b086b0178ffa} (Adware.DoubleD) -> Quarantined and deleted successfully.

HKEY_CLASSES_ROOT\Typelib\{c28a0312-c403-417b-a425-a915bc0519cd} (Adware.DoubleD) -> Quarantined and deleted successfully.

HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{25b8d58c-b0cb-46b0-ba64-05b3804e4e86} (Adware.DoubleD) -> Quarantined and deleted successfully.

HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{35b8d58c-b0cb-46b0-ba64-05b3804e4e86} (Adware.DoubleD) -> Quarantined and deleted successfully.

HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{5617eca9-488d-4ba2-8562-9710b9ab78d2} (Adware.DoubleD) -> Quarantined and deleted successfully.

HKEY_CURRENT_USER\{5617ECA9-488D-4BA2-8562-9710B9AB78D2} (Adware.DoubleD) -> Quarantined and deleted successfully.

HKEY_CURRENT_USER\SOFTWARE\DoubleD (Adware.DoubleD) -> Quarantined and deleted successfully.

HKEY_CURRENT_USER\SOFTWARE\Internet Saving Optimizer (Adware.DoubleD) -> Quarantined and deleted successfully.

HKEY_CURRENT_USER\SOFTWARE\Media Access Startup (Adware.DoubleD) -> Quarantined and deleted successfully.

HKEY_LOCAL_MACHINE\SOFTWARE\DoubleD (Adware.DoubleD) -> Quarantined and deleted successfully.

HKEY_LOCAL_MACHINE\SOFTWARE\Internet Saving Optimizer (Adware.DoubleD) -> Quarantined and deleted successfully.

HKEY_LOCAL_MACHINE\SOFTWARE\Media Access Startup (Adware.DoubleD) -> Quarantined and deleted successfully.

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{16b6279b-9ff5-41fb-8bf9-404324f5dd1f}}_is1 (Adware.DoubleD) -> Quarantined and deleted successfully.

 

Valeur(s) du Registre infectée(s):

HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\Toolbar\WebBrowser\{5617eca9-488d-4ba2-8562-9710b9ab78d2} (Adware.DoubleD) -> Quarantined and deleted successfully.

HKEY_LOCAL_MACHINE\SOFTWARE\Mozilla\Firefox\Extensions\{0ba0192d-94a5-45e3-b2b8-3ec5a1a0b5ec} (Adware.DoubleD) -> Quarantined and deleted successfully.

HKEY_LOCAL_MACHINE\SOFTWARE\Mozilla\Firefox\Extensions\{2224e955-00e9-4613-a844-ce69fccaae91} (Adware.DoubleD) -> Quarantined and deleted successfully.

 

Elément(s) de données du Registre infecté(s):

(Aucun élément nuisible détecté)

 

Dossier(s) infecté(s):

K:\Program Files\Internet Saving Optimizer (Adware.DoubleD) -> Delete on reboot.

K:\Program Files\Internet Saving Optimizer\3.8.1.4690 (Adware.DoubleD) -> Delete on reboot.

K:\Program Files\Internet Saving Optimizer\3.8.1.4690\Data (Adware.DoubleD) -> Quarantined and deleted successfully.

K:\Program Files\Internet Saving Optimizer\3.8.1.4690\FF (Adware.DoubleD) -> Delete on reboot.

K:\Program Files\Internet Saving Optimizer\3.8.1.4690\FF\chrome (Adware.DoubleD) -> Quarantined and deleted successfully.

K:\Program Files\Internet Saving Optimizer\3.8.1.4690\FF\chrome\content (Adware.DoubleD) -> Quarantined and deleted successfully.

K:\Program Files\Internet Saving Optimizer\3.8.1.4690\FF\components (Adware.DoubleD) -> Delete on reboot.

K:\Program Files\Media Access Startup (Adware.DoubleD) -> Delete on reboot.

K:\Program Files\Media Access Startup\2.0.0.1050 (Adware.DoubleD) -> Delete on reboot.

K:\Program Files\Media Access Startup\2.0.0.1050\Data (Adware.DoubleD) -> Quarantined and deleted successfully.

K:\Program Files\Media Access Startup\2.0.0.1050\FF (Adware.DoubleD) -> Delete on reboot.

K:\Program Files\Media Access Startup\2.0.0.1050\FF\chrome (Adware.DoubleD) -> Quarantined and deleted successfully.

K:\Program Files\Media Access Startup\2.0.0.1050\FF\chrome\content (Adware.DoubleD) -> Quarantined and deleted successfully.

K:\Program Files\Media Access Startup\2.0.0.1050\FF\components (Adware.DoubleD) -> Delete on reboot.

K:\Users\BOSS\Local Settings\Application Data\DoubleD (Adware.DoubleD) -> Quarantined and deleted successfully.

K:\Users\BOSS\Local Settings\Application Data\Internet Saving Optimizer (Adware.DoubleD) -> Delete on reboot.

K:\Users\BOSS\Local Settings\Application Data\Internet Saving Optimizer\3.8.1.4690 (Adware.DoubleD) -> Delete on reboot.

K:\Users\BOSS\Local Settings\Application Data\Media Access Startup (Adware.DoubleD) -> Delete on reboot.

K:\Users\BOSS\Local Settings\Application Data\Media Access Startup\2.0.0.1050 (Adware.DoubleD) -> Delete on reboot.

 

Fichier(s) infecté(s):

C:\Program Files\Packard Bell\Smart Restore\mountlbl.exe (Spyware.Banker) -> Quarantined and deleted successfully.

K:\Program Files\Internet Saving Optimizer\3.8.1.4690\adwpx.exe (Adware.DoubleD) -> Quarantined and deleted successfully.

K:\Program Files\Internet Saving Optimizer\3.8.1.4690\NPCommon.dll (Adware.DoubleD) -> Delete on reboot.

K:\Program Files\Internet Saving Optimizer\3.8.1.4690\unins000.dat (Adware.DoubleD) -> Quarantined and deleted successfully.

K:\Program Files\Internet Saving Optimizer\3.8.1.4690\unins000.exe (Adware.DoubleD) -> Quarantined and deleted successfully.

K:\Program Files\Internet Saving Optimizer\3.8.1.4690\Data\config.md (Adware.DoubleD) -> Quarantined and deleted successfully.

K:\Program Files\Internet Saving Optimizer\3.8.1.4690\FF\chrome.manifest (Adware.DoubleD) -> Quarantined and deleted successfully.

K:\Program Files\Internet Saving Optimizer\3.8.1.4690\FF\install.rdf (Adware.DoubleD) -> Quarantined and deleted successfully.

K:\Program Files\Internet Saving Optimizer\3.8.1.4690\FF\chrome\NPAddOn.jar (Adware.DoubleD) -> Quarantined and deleted successfully.

K:\Program Files\Internet Saving Optimizer\3.8.1.4690\FF\chrome\content\NPAddOn.js (Adware.DoubleD) -> Quarantined and deleted successfully.

K:\Program Files\Internet Saving Optimizer\3.8.1.4690\FF\chrome\content\NPAddOn.xul (Adware.DoubleD) -> Quarantined and deleted successfully.

K:\Program Files\Internet Saving Optimizer\3.8.1.4690\FF\components\NPFFAddOn.dll (Adware.DoubleD) -> Delete on reboot.

K:\Program Files\Internet Saving Optimizer\3.8.1.4690\FF\components\NPFFAddOn.xpt (Adware.DoubleD) -> Quarantined and deleted successfully.

K:\Program Files\Internet Saving Optimizer\3.8.1.4690\FF\components\NPFFHelperComponent.js (Adware.DoubleD) -> Quarantined and deleted successfully.

K:\Program Files\Media Access Startup\2.0.0.1050\HPCommon.dll (Adware.DoubleD) -> Delete on reboot.

K:\Program Files\Media Access Startup\2.0.0.1050\hppx.exe (Adware.DoubleD) -> Quarantined and deleted successfully.

K:\Program Files\Media Access Startup\2.0.0.1050\MAHelper.exe (Adware.DoubleD) -> Quarantined and deleted successfully.

K:\Program Files\Media Access Startup\2.0.0.1050\unins000.dat (Adware.DoubleD) -> Quarantined and deleted successfully.

K:\Program Files\Media Access Startup\2.0.0.1050\unins000.exe (Adware.DoubleD) -> Quarantined and deleted successfully.

K:\Program Files\Media Access Startup\2.0.0.1050\Data\config.md (Adware.DoubleD) -> Quarantined and deleted successfully.

K:\Program Files\Media Access Startup\2.0.0.1050\FF\chrome.manifest (Adware.DoubleD) -> Quarantined and deleted successfully.

K:\Program Files\Media Access Startup\2.0.0.1050\FF\install.rdf (Adware.DoubleD) -> Quarantined and deleted successfully.

K:\Program Files\Media Access Startup\2.0.0.1050\FF\chrome\HPAddOn.jar (Adware.DoubleD) -> Quarantined and deleted successfully.

K:\Program Files\Media Access Startup\2.0.0.1050\FF\chrome\content\HPAddOn.js (Adware.DoubleD) -> Quarantined and deleted successfully.

K:\Program Files\Media Access Startup\2.0.0.1050\FF\chrome\content\HPAddOn.xul (Adware.DoubleD) -> Quarantined and deleted successfully.

K:\Program Files\Media Access Startup\2.0.0.1050\FF\components\HPFFAddOn.dll (Adware.DoubleD) -> Delete on reboot.

K:\Program Files\Media Access Startup\2.0.0.1050\FF\components\HPFFAddOn.xpt (Adware.DoubleD) -> Quarantined and deleted successfully.

K:\Program Files\Media Access Startup\2.0.0.1050\FF\components\HPFFHelperComponent.js (Adware.DoubleD) -> Quarantined and deleted successfully.

K:\Users\BOSS\Local Settings\Application Data\Internet Saving Optimizer\3.8.1.4690\config.md (Adware.DoubleD) -> Quarantined and deleted successfully.

K:\Users\BOSS\Local Settings\Application Data\Internet Saving Optimizer\3.8.1.4690\ipdata.md (Adware.DoubleD) -> Quarantined and deleted successfully.

K:\Users\BOSS\Local Settings\Application Data\Internet Saving Optimizer\3.8.1.4690\NP_20090914-093151.592.log (Adware.DoubleD) -> Quarantined and deleted successfully.

K:\Users\BOSS\Local Settings\Application Data\Internet Saving Optimizer\3.8.1.4690\NP_20090914-194312.087.log (Adware.DoubleD) -> Quarantined and deleted successfully.

K:\Users\BOSS\Local Settings\Application Data\Internet Saving Optimizer\3.8.1.4690\NP_20090914-194655.345.log (Adware.DoubleD) -> Quarantined and deleted successfully.

K:\Users\BOSS\Local Settings\Application Data\Internet Saving Optimizer\3.8.1.4690\NP_20090914-194655.954.log (Adware.DoubleD) -> Quarantined and deleted successfully.

K:\Users\BOSS\Local Settings\Application Data\Internet Saving Optimizer\3.8.1.4690\NP_20090914-200516.922.log (Adware.DoubleD) -> Quarantined and deleted successfully.

K:\Users\BOSS\Local Settings\Application Data\Internet Saving Optimizer\3.8.1.4690\NP_20090914-200617.389.log (Adware.DoubleD) -> Quarantined and deleted successfully.

K:\Users\BOSS\Local Settings\Application Data\Internet Saving Optimizer\3.8.1.4690\NP_20090914-200617.936.log (Adware.DoubleD) -> Quarantined and deleted successfully.

K:\Users\BOSS\Local Settings\Application Data\Internet Saving Optimizer\3.8.1.4690\NP_20090914-201238.764.log (Adware.DoubleD) -> Quarantined and deleted successfully.

K:\Users\BOSS\Local Settings\Application Data\Internet Saving Optimizer\3.8.1.4690\NP_20090914-201239.779.log (Adware.DoubleD) -> Quarantined and deleted successfully.

K:\Users\BOSS\Local Settings\Application Data\Internet Saving Optimizer\3.8.1.4690\NP_20090915-013433.243.log (Adware.DoubleD) -> Quarantined and deleted successfully.

K:\Users\BOSS\Local Settings\Application Data\Internet Saving Optimizer\3.8.1.4690\NP_20090915-013643.324.log (Adware.DoubleD) -> Quarantined and deleted successfully.

K:\Users\BOSS\Local Settings\Application Data\Internet Saving Optimizer\3.8.1.4690\NP_20090915-013929.779.log (Adware.DoubleD) -> Quarantined and deleted successfully.

K:\Users\BOSS\Local Settings\Application Data\Internet Saving Optimizer\3.8.1.4690\NP_20090915-022511.128.log (Adware.DoubleD) -> Quarantined and deleted successfully.

K:\Users\BOSS\Local Settings\Application Data\Internet Saving Optimizer\3.8.1.4690\NP_20090915-023515.306.log (Adware.DoubleD) -> Quarantined and deleted successfully.

K:\Users\BOSS\Local Settings\Application Data\Internet Saving Optimizer\3.8.1.4690\NP_20090915-025714.940.log (Adware.DoubleD) -> Quarantined and deleted successfully.

K:\Users\BOSS\Local Settings\Application Data\Internet Saving Optimizer\3.8.1.4690\NP_20090915-030856.447.log (Adware.DoubleD) -> Quarantined and deleted successfully.

K:\Users\BOSS\Local Settings\Application Data\Internet Saving Optimizer\3.8.1.4690\NP_20090915-031314.053.log (Adware.DoubleD) -> Quarantined and deleted successfully.

K:\Users\BOSS\Local Settings\Application Data\Internet Saving Optimizer\3.8.1.4690\NP_20090915-033916.850.log (Adware.DoubleD) -> Quarantined and deleted successfully.

K:\Users\BOSS\Local Settings\Application Data\Internet Saving Optimizer\3.8.1.4690\NP_20090915-051812.864.log (Adware.DoubleD) -> Quarantined and deleted successfully.

K:\Users\BOSS\Local Settings\Application Data\Internet Saving Optimizer\3.8.1.4690\NP_20090915-052608.699.log (Adware.DoubleD) -> Quarantined and deleted successfully.

K:\Users\BOSS\Local Settings\Application Data\Internet Saving Optimizer\3.8.1.4690\NP_20090915-052719.634.log (Adware.DoubleD) -> Quarantined and deleted successfully.

K:\Users\BOSS\Local Settings\Application Data\Internet Saving Optimizer\3.8.1.4690\NP_20090915-052721.226.log (Adware.DoubleD) -> Quarantined and deleted successfully.

K:\Users\BOSS\Local Settings\Application Data\Internet Saving Optimizer\3.8.1.4690\NP_20090915-055101.193.log (Adware.DoubleD) -> Quarantined and deleted successfully.

K:\Users\BOSS\Local Settings\Application Data\Internet Saving Optimizer\3.8.1.4690\NP_20090915-061239.007.log (Adware.DoubleD) -> Quarantined and deleted successfully.

K:\Users\BOSS\Local Settings\Application Data\Internet Saving Optimizer\3.8.1.4690\NP_20090915-063020.383.log (Adware.DoubleD) -> Quarantined and deleted successfully.

K:\Users\BOSS\Local Settings\Application Data\Internet Saving Optimizer\3.8.1.4690\NP_20090915-063634.256.log (Adware.DoubleD) -> Quarantined and deleted successfully.

K:\Users\BOSS\Local Settings\Application Data\Internet Saving Optimizer\3.8.1.4690\NP_20090915-063635.708.log (Adware.DoubleD) -> Quarantined and deleted successfully.

K:\Users\BOSS\Local Settings\Application Data\Internet Saving Optimizer\3.8.1.4690\NP_20090915-064532.272.log (Adware.DoubleD) -> Quarantined and deleted successfully.

K:\Users\BOSS\Local Settings\Application Data\Internet Saving Optimizer\3.8.1.4690\NP_20090915-075648.860.log (Adware.DoubleD) -> Quarantined and deleted successfully.

K:\Users\BOSS\Local Settings\Application Data\Internet Saving Optimizer\3.8.1.4690\NP_20090915-080118.654.log (Adware.DoubleD) -> Quarantined and deleted successfully.

K:\Users\BOSS\Local Settings\Application Data\Internet Saving Optimizer\3.8.1.4690\NP_20090915-201344.834.log (Adware.DoubleD) -> Quarantined and deleted successfully.

K:\Users\BOSS\Local Settings\Application Data\Internet Saving Optimizer\3.8.1.4690\NP_20090915-201356.364.log (Adware.DoubleD) -> Quarantined and deleted successfully.

K:\Users\BOSS\Local Settings\Application Data\Internet Saving Optimizer\3.8.1.4690\NP_20090915-201821.013.log (Adware.DoubleD) -> Quarantined and deleted successfully.

K:\Users\BOSS\Local Settings\Application Data\Internet Saving Optimizer\3.8.1.4690\NP_20090915-202707.523.log (Adware.DoubleD) -> Quarantined and deleted successfully.

K:\Users\BOSS\Local Settings\Application Data\Internet Saving Optimizer\3.8.1.4690\NP_20090915-203416.730.log (Adware.DoubleD) -> Quarantined and deleted successfully.

K:\Users\BOSS\Local Settings\Application Data\Internet Saving Optimizer\3.8.1.4690\NP_20090915-210421.620.log (Adware.DoubleD) -> Quarantined and deleted successfully.

K:\Users\BOSS\Local Settings\Application Data\Internet Saving Optimizer\3.8.1.4690\NP_20090915-210424.273.log (Adware.DoubleD) -> Quarantined and deleted successfully.

K:\Users\BOSS\Local Settings\Application Data\Internet Saving Optimizer\3.8.1.4690\NP_20090915-231706.511.log (Adware.DoubleD) -> Quarantined and deleted successfully.

K:\Users\BOSS\Local Settings\Application Data\Internet Saving Optimizer\3.8.1.4690\NP_20090916-004400.862.log (Adware.DoubleD) -> Quarantined and deleted successfully.

K:\Users\BOSS\Local Settings\Application Data\Internet Saving Optimizer\3.8.1.4690\NP_20090916-004511.839.log (Adware.DoubleD) -> Quarantined and deleted successfully.

K:\Users\BOSS\Local Settings\Application Data\Internet Saving Optimizer\3.8.1.4690\NP_20090916-005819.906.log (Adware.DoubleD) -> Quarantined and deleted successfully.

K:\Users\BOSS\Local Settings\Application Data\Internet Saving Optimizer\3.8.1.4690\NP_20090916-010100.198.log (Adware.DoubleD) -> Quarantined and deleted successfully.

K:\Users\BOSS\Local Settings\Application Data\Internet Saving Optimizer\3.8.1.4690\NP_20090916-010451.906.log (Adware.DoubleD) -> Quarantined and deleted successfully.

K:\Users\BOSS\Local Settings\Application Data\Internet Saving Optimizer\3.8.1.4690\NP_20090916-010453.950.log (Adware.DoubleD) -> Quarantined and deleted successfully.

K:\Users\BOSS\Local Settings\Application Data\Internet Saving Optimizer\3.8.1.4690\NP_20090916-020717.288.log (Adware.DoubleD) -> Quarantined and deleted successfully.

K:\Users\BOSS\Local Settings\Application Data\Internet Saving Optimizer\3.8.1.4690\NP_20090916-020719.037.log (Adware.DoubleD) -> Quarantined and deleted successfully.

K:\Users\BOSS\Local Settings\Application Data\Internet Saving Optimizer\3.8.1.4690\NP_20090916-031508.817.log (Adware.DoubleD) -> Quarantined and deleted successfully.

K:\Users\BOSS\Local Settings\Application Data\Internet Saving Optimizer\3.8.1.4690\NP_20090916-125737.869.log (Adware.DoubleD) -> Quarantined and deleted successfully.

K:\Users\BOSS\Local Settings\Application Data\Internet Saving Optimizer\3.8.1.4690\rstatus.md (Adware.DoubleD) -> Quarantined and deleted successfully.

K:\Users\BOSS\Local Settings\Application Data\Media Access Startup\2.0.0.1050\config.md (Adware.DoubleD) -> Quarantined and deleted successfully.

K:\Users\BOSS\Local Settings\Application Data\Media Access Startup\2.0.0.1050\HJHP_20090914-093043.698.log (Adware.DoubleD) -> Quarantined and deleted successfully.

K:\Users\BOSS\Local Settings\Application Data\Media Access Startup\2.0.0.1050\HJHP_20090914-093151.560.log (Adware.DoubleD) -> Quarantined and deleted successfully.

K:\Users\BOSS\Local Settings\Application Data\Media Access Startup\2.0.0.1050\HJHP_20090914-194312.071.log (Adware.DoubleD) -> Quarantined and deleted successfully.

K:\Users\BOSS\Local Settings\Application Data\Media Access Startup\2.0.0.1050\HJHP_20090914-194655.345.log (Adware.DoubleD) -> Quarantined and deleted successfully.

K:\Users\BOSS\Local Settings\Application Data\Media Access Startup\2.0.0.1050\HJHP_20090914-194655.954.log (Adware.DoubleD) -> Quarantined and deleted successfully.

K:\Users\BOSS\Local Settings\Application Data\Media Access Startup\2.0.0.1050\HJHP_20090914-200516.829.log (Adware.DoubleD) -> Quarantined and deleted successfully.

K:\Users\BOSS\Local Settings\Application Data\Media Access Startup\2.0.0.1050\HJHP_20090914-200617.373.log (Adware.DoubleD) -> Quarantined and deleted successfully.

K:\Users\BOSS\Local Settings\Application Data\Media Access Startup\2.0.0.1050\HJHP_20090914-200617.936.log (Adware.DoubleD) -> Quarantined and deleted successfully.

K:\Users\BOSS\Local Settings\Application Data\Media Access Startup\2.0.0.1050\HJHP_20090914-201238.764.log (Adware.DoubleD) -> Quarantined and deleted successfully.

K:\Users\BOSS\Local Settings\Application Data\Media Access Startup\2.0.0.1050\HJHP_20090914-201239.763.log (Adware.DoubleD) -> Quarantined and deleted successfully.

K:\Users\BOSS\Local Settings\Application Data\Media Access Startup\2.0.0.1050\HJHP_20090915-013433.243.log (Adware.DoubleD) -> Quarantined and deleted successfully.

K:\Users\BOSS\Local Settings\Application Data\Media Access Startup\2.0.0.1050\HJHP_20090915-013643.308.log (Adware.DoubleD) -> Quarantined and deleted successfully.

K:\Users\BOSS\Local Settings\Application Data\Media Access Startup\2.0.0.1050\HJHP_20090915-013929.779.log (Adware.DoubleD) -> Quarantined and deleted successfully.

K:\Users\BOSS\Local Settings\Application Data\Media Access Startup\2.0.0.1050\HJHP_20090915-022511.112.log (Adware.DoubleD) -> Quarantined and deleted successfully.

K:\Users\BOSS\Local Settings\Application Data\Media Access Startup\2.0.0.1050\HJHP_20090915-023515.306.log (Adware.DoubleD) -> Quarantined and deleted successfully.

K:\Users\BOSS\Local Settings\Application Data\Media Access Startup\2.0.0.1050\HJHP_20090915-025714.908.log (Adware.DoubleD) -> Quarantined and deleted successfully.

K:\Users\BOSS\Local Settings\Application Data\Media Access Startup\2.0.0.1050\HJHP_20090915-030856.400.log (Adware.DoubleD) -> Quarantined and deleted successfully.

K:\Users\BOSS\Local Settings\Application Data\Media Access Startup\2.0.0.1050\HJHP_20090915-031313.991.log (Adware.DoubleD) -> Quarantined and deleted successfully.

K:\Users\BOSS\Local Settings\Application Data\Media Access Startup\2.0.0.1050\HJHP_20090915-033916.850.log (Adware.DoubleD) -> Quarantined and deleted successfully.

K:\Users\BOSS\Local Settings\Application Data\Media Access Startup\2.0.0.1050\HJHP_20090915-051812.817.log (Adware.DoubleD) -> Quarantined and deleted successfully.

K:\Users\BOSS\Local Settings\Application Data\Media Access Startup\2.0.0.1050\HJHP_20090915-052608.637.log (Adware.DoubleD) -> Quarantined and deleted successfully.

K:\Users\BOSS\Local Settings\Application Data\Media Access Startup\2.0.0.1050\HJHP_20090915-052719.634.log (Adware.DoubleD) -> Quarantined and deleted successfully.

K:\Users\BOSS\Local Settings\Application Data\Media Access Startup\2.0.0.1050\HJHP_20090915-052721.226.log (Adware.DoubleD) -> Quarantined and deleted successfully.

K:\Users\BOSS\Local Settings\Application Data\Media Access Startup\2.0.0.1050\HJHP_20090915-055101.177.log (Adware.DoubleD) -> Quarantined and deleted successfully.

K:\Users\BOSS\Local Settings\Application Data\Media Access Startup\2.0.0.1050\HJHP_20090915-061239.007.log (Adware.DoubleD) -> Quarantined and deleted successfully.

K:\Users\BOSS\Local Settings\Application Data\Media Access Startup\2.0.0.1050\HJHP_20090915-063020.383.log (Adware.DoubleD) -> Quarantined and deleted successfully.

K:\Users\BOSS\Local Settings\Application Data\Media Access Startup\2.0.0.1050\HJHP_20090915-063634.256.log (Adware.DoubleD) -> Quarantined and deleted successfully.

K:\Users\BOSS\Local Settings\Application Data\Media Access Startup\2.0.0.1050\HJHP_20090915-063635.708.log (Adware.DoubleD) -> Quarantined and deleted successfully.

K:\Users\BOSS\Local Settings\Application Data\Media Access Startup\2.0.0.1050\HJHP_20090915-064532.272.log (Adware.DoubleD) -> Quarantined and deleted successfully.

K:\Users\BOSS\Local Settings\Application Data\Media Access Startup\2.0.0.1050\HJHP_20090915-075648.860.log (Adware.DoubleD) -> Quarantined and deleted successfully.

K:\Users\BOSS\Local Settings\Application Data\Media Access Startup\2.0.0.1050\HJHP_20090915-080118.654.log (Adware.DoubleD) -> Quarantined and deleted successfully.

K:\Users\BOSS\Local Settings\Application Data\Media Access Startup\2.0.0.1050\HJHP_20090915-201344.819.log (Adware.DoubleD) -> Quarantined and deleted successfully.

K:\Users\BOSS\Local Settings\Application Data\Media Access Startup\2.0.0.1050\HJHP_20090915-201356.348.log (Adware.DoubleD) -> Quarantined and deleted successfully.

K:\Users\BOSS\Local Settings\Application Data\Media Access Startup\2.0.0.1050\HJHP_20090915-201821.003.log (Adware.DoubleD) -> Quarantined and deleted successfully.

K:\Users\BOSS\Local Settings\Application Data\Media Access Startup\2.0.0.1050\HJHP_20090915-202707.523.log (Adware.DoubleD) -> Quarantined and deleted successfully.

K:\Users\BOSS\Local Settings\Application Data\Media Access Startup\2.0.0.1050\HJHP_20090915-203416.605.log (Adware.DoubleD) -> Quarantined and deleted successfully.

K:\Users\BOSS\Local Settings\Application Data\Media Access Startup\2.0.0.1050\HJHP_20090915-210421.620.log (Adware.DoubleD) -> Quarantined and deleted successfully.

K:\Users\BOSS\Local Settings\Application Data\Media Access Startup\2.0.0.1050\HJHP_20090915-210424.273.log (Adware.DoubleD) -> Quarantined and deleted successfully.

K:\Users\BOSS\Local Settings\Application Data\Media Access Startup\2.0.0.1050\HJHP_20090915-231706.511.log (Adware.DoubleD) -> Quarantined and deleted successfully.

K:\Users\BOSS\Local Settings\Application Data\Media Access Startup\2.0.0.1050\HJHP_20090916-004400.847.log (Adware.DoubleD) -> Quarantined and deleted successfully.

K:\Users\BOSS\Local Settings\Application Data\Media Access Startup\2.0.0.1050\HJHP_20090916-004511.823.log (Adware.DoubleD) -> Quarantined and deleted successfully.

K:\Users\BOSS\Local Settings\Application Data\Media Access Startup\2.0.0.1050\HJHP_20090916-005819.906.log (Adware.DoubleD) -> Quarantined and deleted successfully.

K:\Users\BOSS\Local Settings\Application Data\Media Access Startup\2.0.0.1050\HJHP_20090916-010100.198.log (Adware.DoubleD) -> Quarantined and deleted successfully.

K:\Users\BOSS\Local Settings\Application Data\Media Access Startup\2.0.0.1050\HJHP_20090916-010451.906.log (Adware.DoubleD) -> Quarantined and deleted successfully.

K:\Users\BOSS\Local Settings\Application Data\Media Access Startup\2.0.0.1050\HJHP_20090916-010453.935.log (Adware.DoubleD) -> Quarantined and deleted successfully.

K:\Users\BOSS\Local Settings\Application Data\Media Access Startup\2.0.0.1050\HJHP_20090916-020717.288.log (Adware.DoubleD) -> Quarantined and deleted successfully.

K:\Users\BOSS\Local Settings\Application Data\Media Access Startup\2.0.0.1050\HJHP_20090916-020719.021.log (Adware.DoubleD) -> Quarantined and deleted successfully.

K:\Users\BOSS\Local Settings\Application Data\Media Access Startup\2.0.0.1050\HJHP_20090916-031508.817.log (Adware.DoubleD) -> Quarantined and deleted successfully.

K:\Users\BOSS\Local Settings\Application Data\Media Access Startup\2.0.0.1050\HJHP_20090916-125737.760.log (Adware.DoubleD) -> Quarantined and deleted successfully.

K:\Users\BOSS\Local Settings\Application Data\Media Access Startup\2.0.0.1050\ipdata.md (Adware.DoubleD) -> Quarantined and deleted successfully.

Posté(e) (modifié)

bonsoir

apparemment le problème est résolu merci infiniment :P

donc si dans l'avenir j'ai le meme problème je n'ai qu'a appliquer votre solution? ou ca dépend d'autres paramètres?

j'avais télécharger proxomitron naoko croyant qu'il allais résoudre ce problème

si c'est un bon logiciel comment le configurer? :P

 

je confirme le probleme des fenetre a ete résolu encore merci

Modifié par shibani
Posté(e)

Bonjour,

donc si dans l'avenir j'ai le meme problème je n'ai qu'a appliquer votre solution?

 

Surtout pas !

Tout dépend du contexte.

Il vaut mieux demander conseil.

Rejoindre la conversation

Vous pouvez publier maintenant et vous inscrire plus tard. Si vous avez un compte, connectez-vous maintenant pour publier avec votre compte.
Remarque : votre message nécessitera l’approbation d’un modérateur avant de pouvoir être visible.

Invité
Répondre à ce sujet…

×   Collé en tant que texte enrichi.   Coller en tant que texte brut à la place

  Seulement 75 émoticônes maximum sont autorisées.

×   Votre lien a été automatiquement intégré.   Afficher plutôt comme un lien

×   Votre contenu précédent a été rétabli.   Vider l’éditeur

×   Vous ne pouvez pas directement coller des images. Envoyez-les depuis votre ordinateur ou insérez-les depuis une URL.

  • En ligne récemment   0 membre est en ligne

    • Aucun utilisateur enregistré regarde cette page.
×
×
  • Créer...