Ad-Aware 86 spywares je dois tout supprimer?

Fermé
geronimo - 10 mai 2004 à 14:51
 marjl - 10 mai 2004 à 17:58
Salut
Je suis en galère tous ses spywares affaiblissent considérablement mon pc sous Win 98. Je vous laisse mon log de ad aware
SVP pourriez vous me dire quoi effacer et quoi ne pas effacer

Voici le log

#:1 [kernel32.dll]
FilePath : C:\WINDOWS\SYSTEM\
ProcessID : 4279208143
Threads : 4
Priority : High
FileSize : 468 KB
FileVersion : 4.10.2222
ProductVersion : 4.10.2222
Copyright : Copyright (C) Microsoft Corp. 1991-1999
CompanyName : Microsoft Corporation
FileDescription : Composant Kernel Win32
InternalName : KERNEL32
OriginalFilename : KERNEL32.DLL
ProductName : Syst
Created on : 01/01/01
Last accessed : 09/05/04 22:00:00
Last modified : 05/05/99 20:22:00

#:2 [msgsrv32.exe]
FilePath : C:\WINDOWS\SYSTEM\
ProcessID : 4294950739
Threads : 1
Priority : Normal
FileSize : 11 KB
FileVersion : 4.10.2222
ProductVersion : 4.10.2222
Copyright : Copyright (C) Microsoft Corp. 1992-1998
CompanyName : Microsoft Corporation
FileDescription : Serveur de messagerie Windows 32 bits VxD
InternalName : MSGSRV32
OriginalFilename : MSGSRV32.EXE
ProductName : Syst
Created on : 01/01/01
Last accessed : 09/05/04 22:00:00
Last modified : 05/05/99 20:22:00

#:3 [mprexe.exe]
FilePath : C:\WINDOWS\SYSTEM\
ProcessID : 4278208995
Threads : 1
Priority : Normal
FileSize : 28 KB
FileVersion : 4.10.1998
ProductVersion : 4.10.1998
Copyright : Copyright (C) Microsoft Corp. 1993-1998
CompanyName : Microsoft Corporation
FileDescription : WIN32 Network Interface Service Process
InternalName : MPREXE
OriginalFilename : MPREXE.EXE
ProductName : Microsoft(R) Windows(R) Operating System
Created on : 01/01/01
Last accessed : 09/05/04 22:00:00
Last modified : 05/05/99 20:22:00

#:4 [mmtask.tsk]
FilePath : C:\WINDOWS\SYSTEM\
ProcessID : 4278210987
Threads : 1
Priority : Normal
FileSize : 1 KB
FileVersion : 4.03.1998
ProductVersion : 4.03.1998
Copyright : Copyright
CompanyName : Microsoft Corporation
FileDescription : Multimedia background task support module
InternalName : mmtask.tsk
OriginalFilename : mmtask.tsk
ProductName : Microsoft Windows
Created on : 01/01/01
Last accessed : 09/05/04 22:00:00
Last modified : 05/05/99 20:22:00

#:5 [mstask.exe]
FilePath : C:\WINDOWS\SYSTEM\
ProcessID : 4278241107
Threads : 2
Priority : Normal
FileSize : 118 KB
FileVersion : 4.71.2721.1
ProductVersion : 4.71.2721.1
Copyright : Copyright (C) Microsoft Corp. 2000
CompanyName : Microsoft Corporation
FileDescription : Moteur du Planificateur de t
InternalName : TaskScheduler
OriginalFilename : mstask.exe
ProductName : Planificateur de t
Created on : 26/04/01 17:15:26
Last accessed : 09/05/04 22:00:00
Last modified : 26/04/01 17:15:28

#:6 [ccevtmgr.exe]
FilePath : C:\PROGRAM FILES\FICHIERS COMMUNS\SYMANTEC SHARED\
ProcessID : 4278243555
Threads : 25
Priority : Normal
FileSize : 309 KB
FileVersion : 1.03.4
ProductVersion : 1.03.4
Copyright : Copyright (c) 2000-2002 Symantec Corporation. All rights reserved.
CompanyName : Symantec Corporation
FileDescription : Event Manager Service
InternalName : ccEvtMgr
OriginalFilename : ccEvtMgr.exe
ProductName : Event Manager
Created on : 30/01/03 11:44:32
Last accessed : 09/05/04 22:00:00
Last modified : 13/11/02 14:44:02

#:7 [winupd.exe]
FilePath : C:\WINDOWS\SYSTEM\
ProcessID : 4278226255
Threads : 5
Priority : Normal
FileSize : 15 KB
Created on : 04/06/98 22:00:00
Last accessed : 09/05/04 22:00:00
Last modified : 04/06/98 22:00:00

#:8 [vsmon.exe]
FilePath : C:\WINDOWS\SYSTEM\ZONELABS\
ProcessID : 4278273619
Threads : 17
Priority : Normal
FileSize : 805 KB
FileVersion : 4.5.594.000
ProductVersion : 4.5.594.000
Copyright : Copyright
CompanyName : Zone Labs Inc.
FileDescription : TrueVector Service
InternalName : vsmon
OriginalFilename : vsmon.exe
ProductName : TrueVector Service
Created on : 17/04/04 09:22:43
Last accessed : 09/05/04 22:00:00
Last modified : 01/04/04 07:29:14

#:9 [explorer.exe]
FilePath : C:\WINDOWS\
ProcessID : 4278335695
Threads : 39
Priority : Normal
FileSize : 176 KB
FileVersion : 4.72.3110.1
ProductVersion : 4.72.3110.1
Copyright : Copyright (C) Microsoft Corp. 1981-1997
CompanyName : Microsoft Corporation
FileDescription : Explorateur Windows
InternalName : explorer
OriginalFilename : EXPLORER.EXE
ProductName : Syst
Created on : 05/05/99 20:22:00
Last accessed : 09/05/04 22:00:00
Last modified : 05/05/99 20:22:00

#:10 [tapisrv.exe]
FilePath : C:\WINDOWS\SYSTEM\
ProcessID : 4278414051
Threads : 7
Priority : Normal
FileSize : 120 KB
FileVersion : 4.10.2222
ProductVersion : 4.10.2222
Copyright : Copyright (C) Microsoft Corp. 1994-1998
CompanyName : Microsoft Corporation
FileDescription : Serveur t
InternalName : Service de t
OriginalFilename : TAPISRV.EXE
ProductName : Syst
Created on : 01/01/01
Last accessed : 09/05/04 22:00:00
Last modified : 05/05/99 20:22:00

#:11 [ptsnoop.exe]
FilePath : C:\WINDOWS\
ProcessID : 4278415619
Threads : 1
Priority : Normal
FileSize : 8 KB
Created on : 27/05/00 09:20:31
Last accessed : 09/05/04 22:00:00
Last modified : 17/08/98 16:24:04

#:12 [taskmon.exe]
FilePath : C:\WINDOWS\
ProcessID : 4278383147
Threads : 1
Priority : Normal
FileSize : 28 KB
FileVersion : 4.10.1998
ProductVersion : 4.10.1998
Copyright : Copyright (C) Microsoft Corp. 1998
CompanyName : Microsoft Corporation
FileDescription : Task Monitor
InternalName : TaskMon
OriginalFilename : TASKMON.EXE
ProductName : Microsoft(R) Windows(R) Operating System
Created on : 01/01/01
Last accessed : 09/05/04 22:00:00
Last modified : 05/05/99 20:22:00

#:13 [systray.exe]
FilePath : C:\WINDOWS\SYSTEM\
ProcessID : 4278385923
Threads : 2
Priority : Normal
FileSize : 32 KB
FileVersion : 4.10.2222
ProductVersion : 4.10.2222
Copyright : Copyright (C) Microsoft Corp. 1993-1998
CompanyName : Microsoft Corporation
FileDescription : Application de la barre d'
InternalName : SYSTRAY
OriginalFilename : SYSTRAY.EXE
ProductName : Syst
Created on : 01/01/01
Last accessed : 09/05/04 22:00:00
Last modified : 05/05/99 20:22:00

#:14 [ctnotify.exe]
FilePath : C:\PROGRAM FILES\CREATIVE\SHAREDLL\
ProcessID : 4278428659
Threads : 2
Priority : Normal
FileSize : 181 KB
FileVersion : 1.53.4.0
ProductVersion : 1.53
Copyright : Copyright (c) 1998 Creative Technology Ltd.
CompanyName : Creative Technology Ltd.
FileDescription : Disc Detector
InternalName : CtNotify
OriginalFilename : CtNotify.exe
ProductName : Creative Disc Detector
Created on : 27/05/00 09:14:48
Last accessed : 09/05/04 22:00:00
Last modified : 15/12/98 23:53:00

#:15 [ahqtb.exe]
FilePath : C:\PROGRAM FILES\CREATIVE\SBLIVE\AUDIOHQ\
ProcessID : 4278476259
Threads : 1
Priority : Normal
FileSize : 198 KB
FileVersion : 1.0.185
ProductVersion : 1.0.185
Copyright : Copyright (c) Creative Technology Ltd. 1997-1999
CompanyName : Creative Technology Ltd.
FileDescription : Creative AudioHQ
InternalName : AHQTaskBar
OriginalFilename : AHQTb.exe
ProductName : AudioHQ
Created on : 27/05/00 09:14:56
Last accessed : 09/05/04 22:00:00
Last modified : 11/04/99 23:00:00

#:16 [ctlauncher.exe]
FilePath : C:\PROGRAM FILES\CREATIVE\LAUNCHER\
ProcessID : 4278477879
Threads : 1
Priority : Normal
FileSize : 240 KB
FileVersion : 1.51.1.0
ProductVersion : 1.0
Copyright : Copyright (c) Creative Technology Ltd 1999
CompanyName : Creative Technology Ltd
FileDescription : Creative Launcher
InternalName : Launcher
OriginalFilename : Launcher
ProductName : Creative Launcher
Created on : 27/05/00 09:14:11
Last accessed : 09/05/04 22:00:00
Last modified : 21/06/99 23:51:00

#:17 [mediadet.exe]
FilePath : C:\PROGRAM FILES\CREATIVE\SHAREDLL\
ProcessID : 4278424959
Threads : 2
Priority : Normal
FileSize : 155 KB
FileVersion : 1.53.3.0
ProductVersion : 1.53
Copyright : Copyright (c) 1998 Creative Technology Ltd.
CompanyName : Creative Technology Ltd.
FileDescription : Disc Detector
InternalName : MediaDet
OriginalFilename : MediaDet.exe
ProductName : Creative Disc Detector
Created on : 27/05/00 09:14:48
Last accessed : 09/05/04 22:00:00
Last modified : 07/12/98 23:53:00

#:18 [directcd.exe]
FilePath : C:\PROGRAM FILES\ADAPTEC\DIRECTCD\
ProcessID : 4278459659
Threads : 1
Priority : Normal
FileSize : 1100 KB
FileVersion : 3.01 (162)
ProductVersion : 3.01 (162)
Copyright : Copyright (c) 1996-2000 Adaptec, Inc.
CompanyName : Adaptec
FileDescription : DirectCD Application
InternalName : DirectCD
OriginalFilename : DirectCD.EXE
ProductName : DirectCD
Created on : 12/07/00 10:12:04
Last accessed : 09/05/04 22:00:00
Last modified : 18/01/00 01:01:00

#:19 [stimon.exe]
FilePath : C:\WINDOWS\SYSTEM\
ProcessID : 4278507359
Threads : 3
Priority : Normal
FileSize : 112 KB
FileVersion : 4.10.2222
ProductVersion : 4.10.2222
Copyright : Copyright (C) Microsoft Corp. 1996-1998
CompanyName : Microsoft Corporation
FileDescription : Moniteur de p
InternalName : STIMON
OriginalFilename : STIMON.EXE
ProductName : Syst
Created on : 01/01/01
Last accessed : 09/05/04 22:00:00
Last modified : 05/05/99 20:22:00

#:20 [loadqm.exe]
FilePath : C:\WINDOWS\
ProcessID : 4278515115
Threads : 3
Priority : Normal
FileSize : 7 KB
FileVersion : 5.4.1103.3
ProductVersion : 5.4.1103.3
Copyright : Copyright (C) Microsoft Corp. 1981-1999
CompanyName : Microsoft Corporation
FileDescription : Microsoft QMgr
InternalName : LOADQM.EXE
OriginalFilename : LOADQM.EXE
ProductName : QMgr Loader
Created on : 02/02/03 13:13:11
Last accessed : 09/05/04 22:00:00
Last modified : 03/05/00 15:23:10

#:21 [qttask.exe]
FilePath : C:\WINDOWS\SYSTEM\
ProcessID : 4278534403
Threads : 2
Priority : Normal
FileSize : 76 KB
FileVersion : 6.0.2
ProductVersion : QuickTime 6.0.2
CompanyName : Apple Computer, Inc.
FileDescription : Apple Computer, Inc.
InternalName : QuickTime Task
OriginalFilename : QTTask.exe
ProductName : QuickTime
Created on : 10/02/03 20:12:02
Last accessed : 09/05/04 22:00:00
Last modified : 10/02/03 20:12:04

#:22 [nsupdate.exe]
FilePath : C:\WINDOWS\
ProcessID : 4278465711
Threads : 1
Priority : Normal
FileSize : 81 KB
Created on : 15/08/03 12:26:31
Last accessed : 09/05/04 22:00:00
Last modified : 15/08/03 12:26:06

#:23 [ufd.exe]
FilePath : C:\PROGRAM FILES\UFD2.0\
ProcessID : 4278549207
Threads : 3
Priority : Normal
FileSize : 132 KB
FileVersion : 1, 8, 0, 0
ProductVersion : 1, 8, 0, 0
Copyright : Copyright (C) 2002
CompanyName : OTi
FileDescription : UFD MFC Application
InternalName : UFD
OriginalFilename : UFD.exe
ProductName : UFD Application
Created on : 02/12/03 21:36:12
Last accessed : 09/05/04 22:00:00
Last modified : 16/07/03 10:13:30

#:24 [ccapp.exe]
FilePath : C:\PROGRAM FILES\FICHIERS COMMUNS\SYMANTEC SHARED\
ProcessID : 4278519327
Threads : 24
Priority : Normal
FileSize : 53 KB
FileVersion : 1.08.01
ProductVersion : 1.08.01
Copyright : Copyright (c) 2000-2002 Symantec Corporation. All rights reserved.
CompanyName : Symantec Corporation
FileDescription : Common Client CC App
InternalName : ccApp
OriginalFilename : ccApp.exe
ProductName : Common Client
Created on : 27/08/03 09:11:52
Last accessed : 09/05/04 22:00:00
Last modified : 15/07/03 12:36:36

#:25 [winampa.exe]
FilePath : C:\PROGRAM FILES\WINAMP\
ProcessID : 4278552923
Threads : 1
Priority : Normal
FileSize : 33 KB
Created on : 12/12/03 23:50:34
Last accessed : 09/05/04 22:00:00
Last modified : 12/12/03 23:50:34

#:26 [usbmonit.exe]
FilePath : C:\WINDOWS\SYSTEM\
ProcessID : 4278565487
Threads : 1
Priority : Normal
FileSize : 44 KB
FileVersion : 1, 9, 0, 0
ProductVersion : 1, 9, 0, 0
Copyright : Copyright (C) 2000-2004
CompanyName : General
FileDescription : Gene USB Monitor
InternalName : USBMonitor
OriginalFilename : USBMonit.exe
ProductName : Gene USB Monitor
Created on : 28/03/04 11:46:07
Last accessed : 09/05/04 22:00:00
Last modified : 11/11/03 16:11:10

#:27 [zlclient.exe]
FilePath : C:\PROGRAM FILES\ZONE LABS\ZONEALARM\
ProcessID : 4278614995
Threads : 6
Priority : Normal
FileSize : 677 KB
FileVersion : 4.5.594.000
ProductVersion : 4.5.594.000
Copyright : Copyright
CompanyName : Zone Labs Inc.
FileDescription : Zone Labs Client
InternalName : zlclient
OriginalFilename : zlclient.exe
ProductName : Zone Labs Client
Created on : 17/04/04 09:22:57
Last accessed : 09/05/04 22:00:00
Last modified : 01/04/04 07:30:04

#:28 [ddhelp.exe]
FilePath : C:\WINDOWS\SYSTEM\
ProcessID : 4278594739
Threads : 7
Priority : Realtime
FileSize : 41 KB
FileVersion : 4.08.00.0400
ProductVersion : 4.08.00.0400
Copyright : Copyright
CompanyName : Microsoft Corporation
FileDescription : Microsoft DirectX Helper
InternalName : DDHelp.exe
OriginalFilename : DDHelp.exe
ProductName : Microsoft
Created on : 15/10/01 18:24:00
Last accessed : 09/05/04 22:00:00
Last modified : 07/11/00 13:16:46

#:29 [createcd.exe]
FilePath : C:\PROGRAM FILES\ADAPTEC\EASY CD CREATOR 4\CREATECD\
ProcessID : 4278639651
Threads : 11
Priority : Normal
FileSize : 256 KB
FileVersion : 4.02 (285)
ProductVersion : 4.02 (285)
Copyright : Copyright (c) 1996-2000 Adaptec, Inc.
CompanyName : Adaptec
FileDescription : Adaptec Create CD
InternalName : createcd.exe
OriginalFilename : createcd.exe
ProductName : Easy CD Creator
Created on : 12/07/00 10:06:48
Last accessed : 09/05/04 22:00:00
Last modified : 19/01/00 02:02:00

#:30 [winproc32.exe]
FilePath : C:\WINDOWS\SYSTEM32\
ProcessID : 4278561679
Threads : 1
Priority : Normal
FileSize : 5 KB
Created on : 17/04/04 12:23:00
Last accessed : 09/05/04 22:00:00
Last modified : 17/04/04 12:23:02

#:31 [osa.exe]
FilePath : C:\PROGRAM FILES\MICROSOFT OFFICE\OFFICE\
ProcessID : 4278607999
Threads : 1
Priority : Normal
FileSize : 50 KB
Copyright : CD Creator
Created on : 12/07/00 10:06:48
Last accessed : 09/05/04 22:00ä

Je vous remercie d'avance pour votre réponse
A voir également:

4 réponses

stefdu Messages postés 419 Date d'inscription vendredi 23 avril 2004 Statut Membre Dernière intervention 15 juillet 2005 42
10 mai 2004 à 14:56
Bonjour,

Ce ne sont pas des spywares : ce sont les processus de Windows ! Tu ne peux pas enlever ces process-là. As-tu bien mis la bonne partie du log ?

@+
0
Voici le nouveau log

BookedSpace RegKey Data Miner HKEY_CLASSES_ROOT:BookedSpace.Extension\

BookedSpace RegKey Data Miner HKEY_LOCAL_MACHINE:Software\BookedSpace\

BookedSpace RegKey Data Miner HKEY_LOCAL_MACHINE:SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{a85c4a1b-bd36-44e5-a70f-8ec347d9b24f}\

BookedSpace RegKey Data Miner HKEY_CLASSES_ROOT:CLSID\{A85C4A1B-BD36-44E5-A70F-8EC347D9B24F}\ c:\windows\bs3.dll

BookedSpace File Data Miner c:\windows\bs3.dll

BookedSpace RegKey Data Miner
HKEY_CLASSES_ROOT:TYPELIB\{5CD19420-B328-47D5-A55F-1C07638EFDF8}\c:\windows\bs3.dll

BookedSpace RegKey Data Miner HKEY_CLASSES_ROOT:BookedSpace.Extension.3\ ({A85C4A1B-BD36-44E5-A70F-8EC347D9B24F})
CoolWebSearch RegValue Malware HKEY_LOCAL_MACHINE:SOFTWARE\Microsoft\Internet Explorer\Main\ "HOMEOldSP"

CoolWebSearch RegKey Malware HKEY_CLASSES_ROOT:CLSID\{1F724240-9E00-11D8-A0FB-44451294CD53}\ c:\windows\system\bcnkj.dll
CoolWebSearch File Malware c:\windows\system\bcnkj.dll
CoolWebSearch RegKey Malware HKEY_CLASSES_ROOT:CLSID\{1F724241-9E00-11D8-A0FB-44457DD868C8}\ c:\windows\system\bcnkj.dll

CoolWebSearch RegKey Malware HKEY_CLASSES_ROOT:PROTOCOLS\Filter\text/html\ c:\windows\system\bcnkj.dll

CoolWebSearch RegKey Malware HKEY_CLASSES_ROOT:PROTOCOLS\Filter\text/plain\ c:\windows\system\bcnkj.dll

CoolWebSearch RegKey Malware HKEY_LOCAL_MACHINE:SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{1F724241-9E00-11D8-A0FB-44457DD868C8}\ c:\windows\system\bcnkj.dll

CoolWebSearch RegKey Malware HKEY_CURRENT_USER:Software\Microsoft\Windows\CurrentVersion\Explorer\{587DBF2D-9145-4c9e-92C2-1F953DA73773}\

CoolWebSearch RegValue Malware
HKEY_CURRENT_USER:Software\Microsoft\Internet Explorer\Toolbar\WebBrowser\

GlobalCS Dialer RegKey Malware HKEY_USERS:.default\Software\GlobalCS\

GlobalCS Dialer RegKey Malware HKEY_CURRENT_USER:Software\GlobalCS\

GlobalCS Dialer RegValue Malware HKEY_LOCAL_MACHINE:SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ "NsUpdate"

GlobalCS Dialer File Malware c:\windows\nsupdate.exe
Lop.com File Malware c:\windows\application data\cukjevbf.exe

Masta Dialer RegKey Malware HKEY_CURRENT_USER:Software\Masta\

NavExcel RegKey Malware HKEY_CLASSES_ROOT:AppID\{710BCB5B-8C6C-483E-A4F5-FAF083B13184}\
NavExcel RegKey Malware HKEY_CLASSES_ROOT:CLSID\{c1e58a84-95b3-4630-b8c2-d06b77b7a0fc}\

NavExcel RegKey Malware HKEY_CLASSES_ROOT:Interface\{20F36AF3-3486-4BB6-8BCB-F1F8ABE74D07}\

NavExcel RegKey Malware HKEY_CLASSES_ROOT:navexcel.navhelper\

NavExcel RegKey Malware HKEY_CLASSES_ROOT:navexcel.navhelper.1\

NavExcel RegKey Malware HKEY_LOCAL_MACHINE:SOFTWARE\NavExcel\

NavExcel RegKey Malware HKEY_CLASSES_ROOT:TypeLib\{FA4DE133-D3C3-4ED4-92D1-CD4DDE839AB3}\

NavExcel RegValue Malware HKEY_LOCAL_MACHINE:Software\Microsoft\Windows\CurrentVersion\RunOnce\c:\windows\temp\ne9230\nhuninstaller.exe
NavExcel File Malware c:\windows\temp\ne9230\nhuninstaller.exe

NavExcel RegKey Malware HKEY_CLASSES_ROOT:APPID\nhelper.dll\
Possible Browser Hijack attempt RegData Vulnerability HKEY_CURRENT_USER:Software\Microsoft\Internet Explorer\Main"Search Page" ("http://4-counter.com/?a=2&b=megad") Possible browser hijack attempt
Possible Browser Hijack attempt RegData Vulnerability HKEY_CURRENT_USER:Software\Microsoft\Internet Explorer\Main"Start Page" ("http://4-counter.com/?b=megad") Possible browser hijack attempt

Possible Browser Hijack attempt RegData Vulnerability HKEY_CURRENT_USER:Software\Microsoft\Internet Explorer\Main"Search Bar" ("http://4-counter.com/?a=2&b=megad") Possible browser hijack attempt
Possible Browser Hijack attempt RegData Vulnerability HKEY_CURRENT_USER:Software\Microsoft\Internet Explorer\Search"SearchAssistant" ("http://4-counter.com/?a=2&b=megad") Possible browser hijack attempt

Possible Browser Hijack attempt RegData Vulnerability HKEY_CURRENT_USER:Software\Microsoft\Internet Explorer"SearchURL" ("http://4-counter.com/?a=2&b=megad") Possible browser hijack attempt
Possible Browser Hijack attempt RegData Vulnerability HKEY_LOCAL_MACHINE:Software\Microsoft\Internet Explorer\Main"Search Page" ("http://4-counter.com/?a=2&b=megad") Possible browser hijack attempt

Possible Browser Hijack attempt RegData Vulnerability HKEY_LOCAL_MACHINE:Software\Microsoft\Internet Explorer\Main"Search Bar" ("http://4-counter.com/?a=2&b=megad") Possible browser hijack attempt
Possible Browser Hijack attempt RegData Vulnerability HKEY_LOCAL_MACHINE:Software\Microsoft\Internet Explorer\Search"SearchAssistant" ("http://4-counter.com/?a=2&b=megad") Possible browser hijack attempt
Possible Browser Hijack attempt RegData Vulnerability HKEY_LOCAL_MACHINE:Software\Microsoft\Internet Explorer"SearchURL" ("http://4-counter.com/?a=2&b=megad") Possible browser hijack attempt

Possible Browser Hijack attempt RegData Vulnerability HKEY_USERS:.Default\Software\Microsoft\Internet Explorer\Main"Search Page" ("http://4-counter.com/?a=2&b=megad") Possible browser hijack attempt
Possible Browser Hijack attempt RegData Vulnerability HKEY_USERS:.Default\Software\Microsoft\Internet Explorer\Main"Start Page" ("http://4-counter.com/?b=megad") Possible browser hijack attempt

Possible Browser Hijack attempt RegData Vulnerability HKEY_USERS:.Default\Software\Microsoft\Internet Explorer\Main"Search Bar" ("http://4-counter.com/?a=2&b=megad") Possible browser hijack attempt
Possible Browser Hijack attempt RegData Vulnerability HKEY_USERS:.Default\Software\Microsoft\Internet Explorer\Search"SearchAssistant" ("http://4-counter.com/?a=2&b=megad") Possible browser hijack attempt
Possible Browser Hijack attempt RegData Vulnerability HKEY_USERS:.Default\Software\Microsoft\Internet Explorer"SearchURL" ("http://4-counter.com/?a=2&b=megad") Possible browser hijack attempt

Possible Browser Hijack attempt RegData Vulnerability HKEY_CURRENT_USER:Software\Microsoft\Internet Explorer\Main"Search Page" ("http://4-counter.com/?a=2&b=megad") Possible browser hijack attempt
Possible Browser Hijack attempt RegData Vulnerability HKEY_CURRENT_USER:Software\Microsoft\Internet Explorer\Main"Start Page" ("http://4-counter.com/?b=megad") Possible browser hijack attempt

Possible Browser Hijack attempt RegData Vulnerability HKEY_CURRENT_USER:Software\Microsoft\Internet Explorer\Main"Search Bar" ("http://4-counter.com/?a=2&b=megad") Possible browser hijack attempt
Possible Browser Hijack attempt RegData Vulnerability HKEY_CURRENT_USER:Software\Microsoft\Internet Explorer\Search"SearchAssistant" ("http://4-counter.com/?a=2&b=megad") Possible browser hijack attempt
Possible Browser Hijack attempt RegData Vulnerability HKEY_CURRENT_USER:Software\Microsoft\Internet Explorer"SearchURL" ("http://4-counter.com/?a=2&b=megad") Possible browser hijack attempt

Possible Browser Hijack attempt RegData Vulnerability HKEY_LOCAL_MACHINE:Software\Microsoft\Internet Explorer\Main"Search Page" ("http://4-counter.com/?a=2&b=megad") Possible browser hijack attempt
Possible Browser Hijack attempt RegData Vulnerability HKEY_LOCAL_MACHINE:Software\Microsoft\Internet Explorer\Main"Search Bar" ("http://4-counter.com/?a=2&b=megad") Possible browser hijack attempt
Possible Browser Hijack attempt RegData Vulnerability HKEY_LOCAL_MACHINE:Software\Microsoft\Internet Explorer\Search"SearchAssistant" ("http://4-counter.com/?a=2&b=megad") Possible browser hijack attempt

Possible Browser Hijack attempt RegData Vulnerability HKEY_LOCAL_MACHINE:Software\Microsoft\Internet Explorer"SearchURL" ("http://4-counter.com/?a=2&b=megad") Possible browser hijack attempt
Possible Browser Hijack attempt RegData Vulnerability HKEY_USERS:.Default\Software\Microsoft\Internet Explorer\Main"Search Page" ("http://4-counter.com/?a=2&b=megad") Possible browser hijack attempt

Possible Browser Hijack attempt RegData Vulnerability HKEY_USERS:.Default\Software\Microsoft\Internet Explorer\Main"Start Page" ("http://4-counter.com/?b=megad") Possible browser hijack attempt
Possible Browser Hijack attempt RegData Vulnerability HKEY_USERS:.Default\Software\Microsoft\Internet Explorer\Main"Search Bar" ("http://4-counter.com/?a=2&b=megad") Possible browser hijack attempt
Possible Browser Hijack attempt RegData Vulnerability HKEY_USERS:.Default\Software\Microsoft\Internet Explorer\Search"SearchAssistant" ("http://4-counter.com/?a=2&b=megad") Possible browser hijack attempt
Possible Browser Hijack attempt RegData Vulnerability HKEY_USERS:.Default\Software\Microsoft\Internet Explorer"SearchURL" ("http://4-counter.com/?a=2&b=megad") Possible browser hijack attempt

Possible Browser Hijack attempt RegData Vulnerability HKEY_LOCAL_MACHINE:Software\Microsoft\Internet Explorer\Main"Start Page" ("about:blank") Possible browser hijack attempt
Redhotnetworks RegKey Malware HKEY_CLASSES_ROOT:CLSID\{1c955f3b-5b32-4393-a05d-24b4970cd2a1}\
Redhotnetworks RegKey Malware HKEY_CLASSES_ROOT:TYPELIB\{139990b7-6359-4f4d-90b2-acc5c6ed2aff}\
Redhotnetworks RegKey Malware HKEY_CLASSES_ROOT:videox.video\
Redhotnetworks RegKey Malware HKEY_CLASSES_ROOT:videox.video.1\
Redhotnetworks RegKey Malware HKEY_LOCAL_MACHINE:Software\microsoft\windows\currentversion\moduleusage\C:/WINDOWS/Downloaded Program Files/videox.dll\
Redhotnetworks File Malware c:\windows\downloaded program files\videox.dll
Redhotnetworks RegValue Malware HKEY_LOCAL_MACHINE:Software\Microsoft\Windows\CurrentVersion\SharedDLLs\c:\windows\downloaded program files\videox.dll

Redhotnetworks RegKey Malware HKEY_CLASSES_ROOT:Interface\{FB85A25D-A82E-44BC-9A6B-5A487163C805}\
SysWeb-Telecom Dialer RegKey Malware HKEY_USERS:.default\Software\SysWebTelecom\
SysWeb-Telecom Dialer RegKey Malware HKEY_CLASSES_ROOT:CLSID\{efb22865-f3bc-4309-adfa-c8e078a7f762}\

SysWeb-Telecom Dialer RegKey Malware HKEY_CLASSES_ROOT:Interface\{639581D0-8376-4073-B73B-45993FA45156}\

SysWeb-Telecom Dialer RegKey Malware HKEY_CLASSES_ROOT:Interface\{66B0C472-A6B5-4E86-8330-F4875AF90929}\

SysWeb-Telecom Dialer RegKey Malware HKEY_LOCAL_MACHINE:SOFTWARE\Microsoft\Code Store Database\Distribution Units\{EFB22865-F3BC-4309-ADFA-C8E078A7F762}\

SysWeb-Telecom Dialer RegKey Malware HKEY_CURRENT_USER:Software\SysWebTelecom\

SysWeb-Telecom Dialer RegKey Malware HKEY_CLASSES_ROOT:syswebtelecom.syswebtelecom\
SysWeb-Telecom Dialer RegKey Malware HKEY_CLASSES_ROOT:TYPELIB\{21de6877-97c0-4fc7-9c16-666b996db4a2}\

SysWeb-Telecom Dialer RegKey Malware HKEY_LOCAL_MACHINE:Software\microsoft\windows\currentversion\moduleusage\C:/WINDOWS/Downloaded Program Files/SysWebTelecomInt.dll\

SysWeb-Telecom Dialer File Malware c:\windows\downloaded program files\syswebtelecomint.dll

SysWeb-Telecom Dialer RegValue Malware HKEY_LOCAL_MACHINE:Software\Microsoft\Windows\CurrentVersion\SharedDLLs\c:\windows\downloaded program files\syswebtelecomint.dll
Tracking Cookie File Data Miner c:\windows\cookies\therby@megad.4-counter[2].txt
Tracking Cookie File Data Miner c:\windows\cookies\therby@megad.global-counter[2].txt
Virtumundo RegKey Data Miner HKEY_CLASSES_ROOT:AppID\BookedSpace.DLL\
Virtumundo RegValue Data Miner HKEY_USERS:.default\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser\
WebDialer File Malware c:\windows\temp\icd1.tmp\ole32ws.dll
Windows RegData Vulnerability HKEY_CLASSES_ROOT:regfile\shell\open\command"" ()


Je te remercie Stephdu de m'avoir répondu rapidement
Peu tu me dire SVp ce que je dois enlever
Merci
0
salut !
en règle générale, on vire TOUT ce que trouve AD-AWARE !
de plus il met tout ça en quarantaine (pour le cas-où...).
Si au bout de quelques jours tu vois que ton PC fonctionne toujours bien, tu pourras supprimer la quarantaine !
0
et regarde dans tes connexions, si tu as pas un n° téléphone bizarre (international ou surtaxé).
0