Rapport de ZHPDiag v2013.4.7.45 par Nicolas Coolman, Update du 07/04/2013 Run by Pixis at 08/04/2013 22:38:21 State : Version à jour. High Elevated Privileges : OK UAC : Activate by user ---\\ Web Browser MSIE: Internet Explorer v10.0.9200.16521 MFIE: Mozilla Firefox 19.0.2 v19.0.2 (Defaut) GCIE: Google Chrome v26.0.1410.43 ---\\ Windows Product Information ~ Langage: Français Windows 7 Home Premium Edition, 64-bit Service Pack 1 (Build 7601) Windows Server License Manager Script : OK ~ Windows(R) 7, OEM_SLP channel System Locked Preinstallation (OEM_SLP) : OK Windows ID Activation : OK ~ Windows Partial Key : 3Q6C9 Windows License : OK ~ Windows Remaining Initializations Number : 0 Software Protection Service (Protection logicielle) : OK Windows Automatic Updates : OK Windows Activation Technologies : OK ---\\ System Information ~ Processor: Intel64 Family 6 Model 58 Stepping 9, GenuineIntel ~ Operating System: 64 Bits Boot mode: Normal (Normal boot) Total RAM: 6039 MB (47% free) System Restore: Activé (Enable) System drive C: has 641 GB (70%) free of 911 GB ---\\ Logged in mode ~ Computer Name: BETEZED ~ User Name: Pixis ~ All Users Names: UpdatusUser, Pixis, HomeGroupUser$, Guest, Administrator, ~ Unselected Option: None Logged in as Administrator ---\\ Environnement Variables ~ System Unit : C:\ ~ %AppData% : C:\Users\Pixis\AppData\Roaming\ ~ %Desktop% : C:\Users\Pixis\Desktop\ ~ %Favorites% : C:\Users\Pixis\Favorites\ ~ %LocalAppData% : C:\Users\Pixis\AppData\Local\ ~ %StartMenu% : C:\Users\Pixis\AppData\Roaming\Microsoft\Windows\Start Menu\ ~ %Windir% : C:\Windows\ ~ %System% : C:\Windows\System32\ ---\\ DOS/Devices C:\ Hard drive, Flash drive, Thumb drive (Free 641 Go of 911 Go) D:\ Hard drive, Flash drive, Thumb drive (Free 2 Go of 21 Go) E:\ CD-ROM drive (Free 0 Go of 0 Go) H:\ CD-ROM drive (Not Inserted) ---\\ Security Center & Tools Informations [HKLM\SOFTWARE\Microsoft\Security Center\Svc] AntiSpywareOverride: OK [HKLM\SOFTWARE\Microsoft\Security Center\Svc] AntiVirusOverride: OK [HKLM\SOFTWARE\Microsoft\Security Center\Svc] FirewallOverride: OK [HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer] NoActiveDesktopChanges: Modified [HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system] EnableLUA: OK [HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Folder\Hidden\NOHIDDEN] CheckedValue: OK [HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Folder\Hidden\SHOWALL] CheckedValue: OK [HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Associations] Application: OK [HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon] Shell: OK [HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowsUpdate\Auto Update\Results\Install] LastSuccessTime : OK ~ Security Center: Scanned in 00mn 00s ---\\ Recherche particulière de fichiers génériques [MD5.332FEAB1435662FC6C672E25BEB37BE3] - (.Microsoft Corporation - Explorateur Windows.) (.01/03/2012 - 00:24:58.) -- C:\Windows\Explorer.exe [2871808] [MD5.94355C28C1970635A31B3FE52EB7CEBA] - (.Microsoft Corporation - Application de démarrage de Windows.) (.14/07/2009 - 02:39:52.) -- C:\Windows\System32\Wininit.exe [129024] [MD5.69F1D418B4C4EC23033D598E4CBC6B73] - (.Microsoft Corporation - Extensions Internet pour Win32.) (.19/03/2013 - 01:59:21.) -- C:\Windows\System32\wininet.dll [2240512] [MD5.1151B1BAA6F350B1DB6598E0FEA7C457] - (.Microsoft Corporation - Application d’ouverture de session Windows.) (.21/11/2010 - 04:24:29.) -- C:\Windows\System32\Winlogon.exe [390656] [MD5.067FA52BFB59A56110A12312EF9AF243] - (.Microsoft Corporation - Bibliothèque de licences.) (.21/11/2010 - 04:24:16.) -- C:\Windows\System32\sppcomapi.dll [232448] [MD5.1C7857B62DE5994A75B054A9FD4C3825] - (.Microsoft Corporation - Ancillary Function Driver for WinSock.) (.28/12/2011 - 04:59:24.) -- C:\Windows\system32\Drivers\AFD.sys [498688] [MD5.02062C0B390B7729EDC9E69C680A6F3C] - (.Microsoft Corporation - ATAPI IDE Miniport Driver.) (.14/07/2009 - 02:52:21.) -- C:\Windows\system32\Drivers\atapi.sys [24128] [MD5.B8BD2BB284668C84865658C77574381A] - (.Microsoft Corporation - CD-ROM File System Driver.) (.14/07/2009 - 00:19:47.) -- C:\Windows\system32\Drivers\Cdfs.sys [92160] [MD5.F036CE71586E93D94DAB220D7BDF4416] - (.Microsoft Corporation - SCSI CD-ROM Driver.) (.21/11/2010 - 04:23:47.) -- C:\Windows\system32\Drivers\Cdrom.sys [147456] [MD5.9BB2EF44EAA163B29C4A4587887A0FE4] - (.Microsoft Corporation - DFS Namespace Client Driver.) (.21/11/2010 - 04:24:32.) -- C:\Windows\system32\Drivers\DfsC.sys [102400] [MD5.97BFED39B6B79EB12CDDBFEED51F56BB] - (.Microsoft Corporation - High Definition Audio Bus Driver.) (.21/11/2010 - 04:23:47.) -- C:\Windows\system32\Drivers\HDAudBus.sys [122368] [MD5.FA55C73D4AFFA7EE23AC4BE53B4592D3] - (.Microsoft Corporation - Pilote de port i8042.) (.14/07/2009 - 00:19:57.) -- C:\Windows\system32\Drivers\i8042prt.sys [105472] [MD5.AF9B39A7E7B6CAA203B3862582E9F2D0] - (.Microsoft Corporation - IP Network Address Translator.) (.14/07/2009 - 01:10:03.) -- C:\Windows\system32\Drivers\IpNat.sys [116224] [MD5.A5D9106A73DC88564C825D317CAC68AC] - (.Microsoft Corporation - Windows NT SMB Minirdr.) (.01/03/2012 - 00:26:44.) -- C:\Windows\system32\Drivers\MRxSmb.sys [158208] [MD5.09594D1089C523423B32A4229263F068] - (.Microsoft Corporation - MBT Transport driver.) (.21/11/2010 - 04:23:51.) -- C:\Windows\system32\Drivers\netBT.sys [261632] [MD5.E453ACF4E7D44E5530B5D5F2B9CA8563] - (.Microsoft Corporation - Pilote du système de fichiers NT.) (.31/08/2012 - 19:19:35.) -- C:\Windows\system32\Drivers\ntfs.sys [1659760] [MD5.0086431C29C35BE1DBC43F52CC273887] - (.Microsoft Corporation - Pilote de port parallèle.) (.14/07/2009 - 01:00:41.) -- C:\Windows\system32\Drivers\Parport.sys [97280] [MD5.471815800AE33E6F1C32FB1B97C490CA] - (.Microsoft Corporation - RAS L2TP mini-port/call-manager driver.) (.21/11/2010 - 04:24:33.) -- C:\Windows\system32\Drivers\Rasl2tp.sys [129536] [MD5.548260A7B8654E024DC30BF8A7C5BAA4] - (.Microsoft Corporation - SMB Transport driver.) (.14/07/2009 - 01:09:09.) -- C:\Windows\system32\Drivers\smb.sys [93184] [MD5.DDAD5A7AB24D8B65F8D724F5C20FD806] - (.Microsoft Corporation - TDI Translation Driver.) (.21/11/2010 - 04:24:32.) -- C:\Windows\system32\Drivers\tdx.sys [119296] [MD5.DF8126BD41180351A093A3AD2FC8903B] - (.Microsoft Corporation - Pilote de cliché instantané du volume.) (.01/03/2012 - 00:23:22.) -- C:\Windows\system32\Drivers\volsnap.sys [296320] ~ Generic Processes: Scanned in 00mn 00s ---\\ Etat des fichiers cachés (Caché/Total) ~ Mes musiques (My Musics) : 1/2197 ~ Mes Videos (My Videos) : 1/171 ~ Mes Favoris (My Favorites) : 1/11 ~ Mes Documents (My Documents) : 1/6155 ~ Mon Bureau (My Desktop) : 1/19902 ~ Menu demarrer (Programs) : 1/32 ~ Hidden Files: Scanned in 00mn 12s ---\\ Processus lancés [MD5.F88D89A73142BA1148453654EEC12E02] - (.HP - BioMonitor.) -- C:\Program Files (x86)\HP SimplePass\BioMonitor.exe [148296] [PID.3448] [MD5.B7F55E2AE978D3D34F7876EE5D689AAE] - (.CyberLink - YouCam Mirage.) -- C:\Program Files (x86)\CyberLink\YouCam\YCMMirage.exe [136488] [PID.7080] [MD5.3D710201E462BF75843CFDF7EA83928B] - (.Google - Google Drive.) -- C:\Program Files (x86)\Google\Drive\googledrivesync.exe [19357112] [PID.6496] [MD5.7E4E3EE20FF5D10A60E6267A8EE67786] - (.Intel Corporation - Intel(R) USB 3.0 Monitor.) -- C:\Program Files (x86)\Intel\Intel(R) USB 3.0 eXtensible Host Controller Driver\Application\iusb3mon.exe [291096] [PID.7388] [MD5.BD15FC46496D6291BEA63F37A291F95A] - (.Hewlett-Packard Development Company, L.P. - HP Message Service.) -- C:\Program Files (x86)\Hewlett-Packard\HP Quick Launch\HPMSGSVC.exe [576568] [PID.7480] [MD5.8A3B69683E63808719D24E1C68C21CC7] - (.Hewlett-Packard Development Company, L.P. - HP On Screen Display.) -- C:\Program Files (x86)\Hewlett-Packard\HP On Screen Display\HPOSD.exe [379960] [PID.7496] [MD5.148C545849C1379A3D4448F5DE768E86] - (.AVAST Software - avast! Antivirus.) -- C:\Program Files\AVAST Software\Avast\AvastUI.exe [4767304] [PID.7504] [MD5.E6DEED311D830678E1A0B4889F3C2F0E] - (.UASSOFT.COM - DRIVER AUTORUN.) -- C:\Program Files (x86)\Multimedia Mouse Driver\V5\StartAutorun.exe [212992] [PID.7608] [MD5.053B2F7FA7BB1BE106D21844FA4AAD39] - (.UASSOFT.COM - USB Keyboard And PS/2 Keyboard Driver.) -- C:\Program Files (x86)\Multimedia Mouse Driver\V5\KMConfig.exe [1470464] [PID.7732] [MD5.12401502481540DE194408F8CE71C5F3] - (.UASSOFT.COM - Keyboard And Mouse Processing.) -- C:\Program Files (x86)\Multimedia Mouse Driver\V5\KMProcess.exe [561152] [PID.7832] [MD5.73F3118CD145756A812A2529281D6F36] - (.AuthenTec Inc. - TouchControl.) -- C:\Program Files (x86)\HP SimplePass\TouchControl.exe [875336] [PID.8044] [MD5.BF2F2717C13A4BD4FD73F2788534E86B] - (.Mozilla Corporation - Firefox.) -- C:\Program Files (x86)\Mozilla Firefox\firefox.exe [917400] [PID.6896] [MD5.AA6844A5127ED4B20DF6D313467B929D] - (.Mozilla Corporation - Plugin Container for Firefox.) -- C:\Program Files (x86)\Mozilla Firefox\plugin-container.exe [17304] [PID.7160] [MD5.680AD8F376970696B45269F074A8A28E] - (.Adobe Systems, Inc. - Adobe Flash Player 11.6 r602.) -- C:\Windows\SysWOW64\Macromed\Flash\FlashPlayerPlugin_11_6_602_180.exe [1822424] [PID.3516] [MD5.B0BF698030DB6561393AE753C6D3F936] - (.Google Inc. - Google Chrome.) -- C:\Program Files (x86)\Google\Chrome\Application\chrome.exe [1312720] [PID.7824] [MD5.AB05EFE884483CB1AC477D2C80104CC5] - (...) -- C:\Users\Pixis\Downloads\ToolsDiags.exe [535823] [PID.924] [MD5.605664E657464F558F51C84A0F93029F] - (.Nicolas Coolman - ZHPDiag.) -- C:\Program Files (x86)\ZHPDiag\ZHPDiag.exe [6558208] [PID.4756] [MD5.BA0F98B69D84EFAE63EA80A957F9EF31] - (.HP - HP Service.) -- C:\Program Files (x86)\HP SimplePass\TrueSuiteService.exe [260424] [PID.1012] [MD5.41735B82DB57E4EBE9504EC400FD120E] - (.AVAST Software - avast! Service.) -- C:\Program Files\AVAST Software\Avast\AvastSvc.exe [45248] [PID.1380] [MD5.3927397AC60D943DAF8808AFFED582B7] - (.Adobe Systems Incorporated - Adobe Acrobat Update Service.) -- C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe [65192] [PID.2388] [MD5.CA793DCC1D5F619021EF1D37CC7A831E] - (.EasyBits Software AS - Shared EasyBits services for Windows.) -- C:\Windows\SysWOW64\ezSharedSvcHost.exe [514232] [PID.2508] [MD5.3D85344F1B6A74B5EB1D97BB8DAEE224] - (.Hewlett-Packard Company - HP Quick Synchronization Service.) -- C:\Program Files (x86)\Hewlett-Packard\Shared\HPDrvMntSvc.exe [227896] [PID.2696] [MD5.77C15D7E8F002A173EEBFF0B20CD697D] - (.Hewlett-Packard Development Company, L.P. - HP Quick Launch WMI Service.) -- C:\Program Files (x86)\Hewlett-Packard\HP Quick Launch\HPWMISVC.exe [34872] [PID.2720] [MD5.C9DCE1CB628AEED3C0C30ABBF4F1E718] - (...) -- C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\FWService\IntelMeFWService.exe [128280] [PID.2804] [MD5.3628933AF5305EAB8173949BFF912F04] - (.Intel Corporation - Intel(R) Dynamic Application Loader Host In.) -- C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\DAL\jhi_service.exe [161560] [PID.2836] [MD5.F1D29D9C5DB9C144769F5CD7212BE555] - (.VMware, Inc. - VMware NAT Service.) -- C:\Windows\SysWOW64\vmnat.exe [435864] [PID.2996] [MD5.7171B884DA8BFB1CE5C8BAE46D993CB1] - (.VMware, Inc. - VMware Authorization Service.) -- C:\Program Files (x86)\VMware\VMware Workstation\vmware-authd.exe [79872] [PID.3316] [MD5.03A7980C30E9F00F1EAC752612DC80CE] - (.VMware, Inc. - VMware VMnet DHCP service.) -- C:\Windows\SysWOW64\vmnetdhcp.exe [357016] [PID.3536] [MD5.5C6121C09B35B01705EEF7B948B92338] - (...) -- C:\Program Files (x86)\VMware\VMware Workstation\vmware-hostd.exe [15680000] [PID.3672] [MD5.7BBD5B17B77CE24BAB3ADF54991ABB36] - (.Hewlett-Packard Company - HP Software Framework WMI Service.) -- C:\Program Files (x86)\Hewlett-Packard\Shared\hpqWmiEx.exe [981048] [PID.7808] [MD5.506708142BC63DABA64F2D3AD1DCD5BF] - (.Google Inc. - Programme d'installation de Google.) -- C:\Program Files (x86)\Google\Update\GoogleUpdate.exe [116648] [PID.5088] [MD5.7D4B9A48430ED57ACA6373B71D5904CA] - (.Intel Corporation - IAStorDataSvc.) -- C:\Program Files (x86)\Intel\Intel(R) Rapid Storage Technology\IAStorDataMgrSvc.exe [13592] [PID.4872] [MD5.BF22ACF4CF3734D61357E67F0521BC03] - (.Intel Corporation - Local Manageability Service.) -- C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\LMS\LMS.exe [277784] [PID.5996] [MD5.FD6F5B42DB429FD1AE1A4483DB4DD2E0] - (.NVIDIA Corporation - NVIDIA Settings Update Manager.) -- C:\Program Files (x86)\NVIDIA Corporation\NVIDIA Update Core\daemonu.exe [2458944] [PID.5932] [MD5.B097EBA0E3FEB020BB65FE43AF5ECCFF] - (.Intel Corporation - User Notification Service.) -- C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\UNS\UNS.exe [363800] [PID.6852] ~ Processes Running: Scanned in 00mn 01s ---\\ Google Chrome, Démarrage,Recherche,Extensions (G0,G1,G2) C:\Users\Pixis\AppData\Local\Google\Chrome\User Data\Default\Preferences G1 - GCS: Preference [User Data\Default] None ~ Google Browser: Scanned in 00mn 00s ---\\ Mozilla Firefox, Plugins,Demarrage,Recherche,Extensions (P2,M0,M1,M2,M3) C:\Users\Pixis\AppData\Roaming\Mozilla\Firefox\Profiles\apuifor4.default\prefs.js M0 - MFSP: prefs.js [Pixis - apuifor4.default] http://www.facebook.com P2 - FPN: [HKCU] [pandonetworks.com/PandoWebPlugin] - (.Pando Networks - Pando Web Plugin.) -- C:\Program Files (x86)\Pando Networks\Media Booster\npPandoWebPlugin.dll ~ Firefox Browser: 14 Legitimates Scanned in 00mn 00s ---\\ Internet Explorer, Démarrage,Recherche,URLSearchHook, Phishing (R0,R1,R3,R4) R0 - HKCU\SOFTWARE\Microsoft\Internet Explorer\Main,Start Page = http://g.uk.msn.com R0 - HKLM\SOFTWARE\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com R0 - HKLM\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com R1 - HKCU\SOFTWARE\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com R1 - HKCU\SOFTWARE\Microsoft\Internet Explorer\Main,Default_Page_URL = http://g.uk.msn.com R1 - HKLM\SOFTWARE\Microsoft\Internet Explorer\Main,Extensions Off Page = about:noadd-ons R1 - HKLM\SOFTWARE\Microsoft\Internet Explorer\Main,Security Risk Page = about:securityrisk R1 - HKLM\SOFTWARE\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com R1 - HKLM\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Main,Extensions Off Page = about:noadd-ons R1 - HKLM\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Main,Security Risk Page = about:securityrisk R3 - URLSearchHook: Microsoft Url Search Hook [64Bits] - {CFBFAE00-17A6-11D0-99CB-00C04FD64497} . (.Microsoft Corporation - Navigateur Internet.) (10.00.9200.16521 (win8_gdr_soc_ie.130216-2100)) -- C:\Windows\SysWOW64\ieframe.dll ~ IE Browser: Scanned in 00mn 00s ---\\ Internet Explorer, Proxy Management (R5) R5 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyServer = no key R5 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyEnable = 0 R5 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,MigrateProxy = 1 R5 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,EnableHttp1_1 = 1 R5 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,AutoConfigProxy = wininet.dll ~ Proxy management: Scanned in 00mn 00s ---\\ Analyse des lignes F0, F1, F2, F3 - IniFiles, Autoloading programs F2 - REG:system.ini: USERINIT=C:\Windows\system32\userinit.exe, F2 - REG:system.ini: Shell=C:\Windows\explorer.exe F2 - REG:system.ini: VMApplet=C:\Windows\System32\SystemPropertiesPerformance.exe ~ Keys: Scanned in 00mn 00s ---\\ Redirection du fichier Hosts (O1) ~ Le fichier hosts est sain (The hosts file is clean). ~ Hosts File: Scanned in 00mn 00s ~ Nombre de lignes (Lines number): 21 ---\\ Browser Helper Objects de navigateur (O2) ~ BHO: 5 Legitimates Scanned in 00mn 00s ---\\ Internet Explorer Toolbars (O3) O3 - Toolbar: HP SimplePass Toolbar [64Bits] - [HKLM]{C98EE38D-21E4-4A50-907D-2B56FEC7013E} . (.HP - Website Log On.) -- C:\Program Files (x86)\HP SimplePass\IEBHO.dll O3 - Toolbar: (no name) [64Bits] - [HKLM]{318A227B-5E9F-45bd-8999-7F8F10CA4CF5} Clé orpheline ~ Toolbar: Scanned in 00mn 00s ---\\ Applications démarrées par registre & par dossier (O4) O4 - HKLM\..\Run: [IgfxTray] . (.Intel Corporation - igfxTray Module.) -- C:\Windows\system32\igfxtray.exe O4 - HKLM\..\Run: [HotKeysCmds] . (.Intel Corporation - hkcmd Module.) -- C:\Windows\system32\hkcmd.exe O4 - HKLM\..\Run: [Persistence] . (.Intel Corporation - persistence Module.) -- C:\Windows\system32\igfxpers.exe O4 - HKLM\..\Run: [SysTrayApp] . (.IDT, Inc. - IDT PC Audio.) -- C:\Program Files\IDT\WDM\sttray64.exe O4 - HKLM\..\Run: [SynTPEnh] C:\Program Files (x86)\Synaptics\SynTP\SynTPEnh.exe (.not file.) O4 - HKLM\..\Run: [AdobeAAMUpdater-1.0] . (.Adobe Systems Incorporated - Adobe Updater Startup Utility.) -- C:\Program Files (x86)\Common Files\Adobe\OOBE\PDApp\UWA\UpdaterStartupUtility.exe O4 - HKCU\..\Run: [AdobeBridge] Clé orpheline O4 - HKCU\..\Run: [GoogleDriveSync] . (.Google - Google Drive.) -- C:\Program Files (x86)\Google\Drive\googledrivesync.exe O4 - HKLM\..\Wow6432Node\Run: [USB3MON] . (.Intel Corporation - Intel(R) USB 3.0 Monitor.) -- C:\Program Files (x86)\Intel\Intel(R) USB 3.0 eXtensible Host Controller Driver\Application\iusb3mon.exe O4 - HKLM\..\Wow6432Node\Run: [HP Quick Launch] . (.Hewlett-Packard Development Company, L.P. - HP Message Service.) -- C:\Program Files (x86)\Hewlett-Packard\HP Quick Launch\HPMSGSVC.exe O4 - HKLM\..\Wow6432Node\Run: [HPOSD] . (.Hewlett-Packard Development Company, L.P. - HP On Screen Display.) -- C:\Program Files (x86)\Hewlett-Packard\HP On Screen Display\HPOSD.exe O4 - HKLM\..\Wow6432Node\Run: [avast] . (.AVAST Software - avast! Antivirus.) -- C:\Program Files\AVAST Software\Avast\avastUI.exe O4 - HKLM\..\Wow6432Node\Run: [KMConfig] . (.UASSOFT.COM - DRIVER AUTORUN.) -- C:\Program Files (x86)\Multimedia Mouse Driver\V5\StartAutorun.exe O4 - HKLM\..\Wow6432Node\Run: [SwitchBoard] . (.Adobe Systems Incorporated - SwitchBoard Server (32 bit).) -- C:\Program Files (x86)\Common Files\Adobe\SwitchBoard\SwitchBoard.exe O4 - HKLM\..\Wow6432Node\Run: [AdobeCS6ServiceManager] . (.Adobe Systems Incorporated - Adobe CS6 Service Manager.) -- C:\Program Files (x86)\Common Files\Adobe\CS6ServiceManager\CS6ServiceManager.exe O4 - HKLM\..\Wow6432Node\Run: [AdobeCS5.5ServiceManager] . (.Adobe Systems Incorporated - Adobe CS5.5 Service Manager.) -- C:\Program Files (x86)\Common Files\Adobe\CS5.5ServiceManager\CS5.5ServiceManager.exe O4 - HKLM\..\Wow6432Node\Run: [Adobe ARM] . (.Adobe Systems Incorporated - Adobe Reader and Acrobat Manager.) -- C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\AdobeARM.exe O4 - HKLM\..\Wow6432Node\RunOnce: [SymSilent] . (.Symantec Corporation - Symantec Application.) -- C:\Program Files (x86)\SymSilent\SymSilent.exe O4 - HKUS\S-1-5-19\..\Run: [Sidebar] . (.Microsoft Corporation - Gadgets du Bureau Windows.) -- C:\Program Files (x86)\Windows Sidebar\Sidebar.exe O4 - HKUS\S-1-5-20\..\Run: [Sidebar] . (.Microsoft Corporation - Gadgets du Bureau Windows.) -- C:\Program Files (x86)\Windows Sidebar\Sidebar.exe O4 - HKUS\S-1-5-19\..\RunOnce: [mctadmin] . (.Microsoft Corporation - MCTAdmin.) -- C:\Windows\System32\mctadmin.exe O4 - HKUS\S-1-5-20\..\RunOnce: [mctadmin] . (.Microsoft Corporation - MCTAdmin.) -- C:\Windows\System32\mctadmin.exe O4 - HKUS\S-1-5-21-1105701712-1843842314-172653648-1001\..\Run: [AdobeBridge] Clé orpheline O4 - HKUS\S-1-5-21-1105701712-1843842314-172653648-1001\..\Run: [GoogleDriveSync] . (.Google - Google Drive.) -- C:\Program Files (x86)\Google\Drive\googledrivesync.exe ~ Application: Scanned in 00mn 00s ---\\ Autres liens utilisateurs (O4) O4 - GS\QuickLaunch: VMware Workstation.lnk . (.VMware, Inc. - VMware Workstation.) -- C:\Program Files (x86)\VMware\VMware Workstation\vmware.exe O4 - GS\QuickLaunch: Wireshark.lnk . (.The Wireshark developer community, http://w - Wireshark.) -- C:\Program Files\Wireshark\wireshark.exe O4 - GS\Accessories: Private Character Editor.lnk . (.Microsoft Corporation - Éditeur de caractères privés.) -- C:\Windows\system32\eudcedit.exe O4 - GS\SendTo: Fax Recipient.lnk . (.Microsoft Corporation - Microsoft Windows Fax and Scan.) -- C:\Windows\system32\WFS.exe O4 - GS\Desktop: HijackThis.lnk . (.Trend Micro Inc. - HijackThis.) -- C:\Program Files (x86)\Trend Micro\HiJackThis\HiJackThis.exe O4 - GS\Desktop: MASM32 Editor.lnk . (.Steve Hutchesson - MASM32 Code Editor.) -- C:\masm32\qeditor.exe O4 - GS\Desktop: TreeDBNotes Pro 4.lnk . (.SoftArtStudio - TreeDBNotes - Notes manager.) -- C:\Program Files (x86)\TreeDBNotes Pro 4\TreeDBNotes.exe O4 - GS\Desktop: VB Decompiler Pro.lnk . (.GPcH Soft - VB P-Code, Native Code Decompiler.) -- C:\Program Files (x86)\VB Decompiler Pro\VB Decompiler.exe O4 - GS\TaskBar: Adobe After Effects CS6.lnk . (.Adobe Systems Incorporated - Adobe After Effects CS6.) -- C:\Program Files\Adobe\Adobe After Effects CS6\Support Files\AfterFX.exe O4 - GS\TaskBar: Adobe Dreamweaver CS6.lnk . (.Adobe Systems, Inc. - Adobe Dreamweaver CS6.) -- C:\Program Files (x86)\Adobe\Adobe Dreamweaver CS6\Dreamweaver.exe O4 - GS\TaskBar: Adobe Illustrator CS6 (64 Bit).lnk . (.Adobe Systems Inc. - Adobe Illustrator CS6.) -- C:\Program Files\Adobe\Adobe Illustrator CS6 (64 Bit)\Support Files\Contents\Windows\Illustrator.exe O4 - GS\TaskBar: Adobe Photoshop CS6 (64 Bit).lnk . (.Adobe Systems, Incorporated - Adobe Photoshop CS6.) -- C:\Program Files\Adobe\Adobe Photoshop CS6 (64 Bit)\Photoshop.exe O4 - GS\TaskBar: CINEMA 4D 64 Bit.lnk . (.MAXON Computer GmbH - CINEMA 4D ®.) -- C:\Program Files\MAXON\CINEMA 4D R13\CINEMA 4D 64 Bit.exe O4 - GS\TaskBar: FormatFactory.lnk . (.Free Time - FormatFactory.) -- C:\Program Files (x86)\FreeTime\FormatFactory\FormatFactory.exe O4 - GS\TaskBar: Google Chrome.lnk . (.Google Inc. - Google Chrome.) -- C:\Program Files (x86)\Google\Chrome\Application\chrome.exe O4 - GS\TaskBar: Minecraft.lnk . (...) -- C:\Users\Pixis\Desktop\Minecraft.exe O4 - GS\TaskBar: Mozilla Firefox.lnk . (.Mozilla Corporation - Firefox.) -- C:\Program Files (x86)\Mozilla Firefox\firefox.exe O4 - GS\TaskBar: Vegas Pro 12.0 (64-bit).lnk . (...) -- C:\Program Files (x86)\Sony\Vegas Pro 12.0\vegas120.exe (.not file.) O4 - GS\TaskBar: Winamp.lnk . (.Nullsoft, Inc. - Winamp.) -- C:\Program Files (x86)\Winamp\winamp.exe O4 - GS\TaskBar: Windows Explorer.lnk . (.Microsoft Corporation - Explorateur Windows.) -- C:\Windows\explorer.exe O4 - GS\Programs: Internet Explorer.lnk . (.Microsoft Corporation - Internet Explorer.) -- C:\Program Files (x86)\Internet Explorer\iexplore.exe O4 - GS\QuickLaunch: Google Chrome.lnk . (.Google Inc. - Google Chrome.) -- C:\Program Files (x86)\Google\Chrome\Application\chrome.exe O4 - GS\QuickLaunch: Launch Internet Explorer Browser.lnk . (.Microsoft Corporation - Internet Explorer.) -- C:\Program Files (x86)\Internet Explorer\iexplore.exe O4 - GS\QuickLaunch: Vuze.lnk . (.Vuze Inc. - Pas de description.) -- C:\Program Files (x86)\Vuze\Azureus.exe O4 - GS\QuickLaunch: Zoner Photo Studio 15 x64.lnk . (.ZONER software - Zoner Photo Studio 15.) -- C:\Program Files\Zoner\Photo Studio 15\Program64\Zps.exe O4 - GS\QuickLaunch: Zoner Photo Studio 15.lnk . (.ZONER software - Zoner Photo Studio 15.) -- C:\Program Files\Zoner\Photo Studio 15\Program32\Zps.exe O4 - GS\Accessories: Internet Explorer (No Add-ons).lnk . (.Microsoft Corporation - Internet Explorer.) -- C:\Program Files (x86)\Internet Explorer\iexplore.exe O4 - GS\SendTo: Format Factory.lnk . (.Free Time - FormatFactory.) -- C:\Program Files (x86)\FreeTime\FormatFactory\FormatFactory.exe O4 - GS\Desktop: Cisco Packet Tracer.lnk . (...) -- C:\Program Files (x86)\Cisco Packet Tracer 5.3\bin\PacketTracer5.exe O4 - GS\Desktop: Google Drive.lnk . (...) -- C:\Users\Pixis\Google Drive O4 - GS\Desktop: HiJackThis.lnk . (.Trend Micro Inc. - HijackThis.) -- C:\Users\Pixis\AppData\Roaming\Microsoft\Installer\{45A66726-69BC-466B-A7A4-12FCBA4883D7}\HiJackThis.exe O4 - GS\Desktop: Portrait Professional Studio 10.lnk . (.Anthropics Technology Ltd. - Portrait Professional.) -- C:\Program Files (x86)\Portrait Professional Studio 10\PortraitProfessionalStudio.exe O4 - GS\TaskBar: HP Recommended.LNK . (...) -- C:\Program Files (x86)\Hewlett-Packard\HP LaunchBox\HPTaskBar1.exe (.not file.) O4 - GS\TaskBar: Internet Explorer (2).lnk . (.Microsoft Corporation - Internet Explorer.) -- C:\Program Files (x86)\Internet Explorer\iexplore.exe O4 - GS\TaskBar: Internet Explorer (3).lnk . (.Microsoft Corporation - Internet Explorer.) -- C:\Program Files (x86)\Internet Explorer\iexplore.exe O4 - GS\TaskBar: Internet Explorer (4).lnk . (.Microsoft Corporation - Internet Explorer.) -- C:\Program Files (x86)\Internet Explorer\iexplore.exe O4 - GS\TaskBar: Internet Explorer (5).lnk . (.Microsoft Corporation - Internet Explorer.) -- C:\Program Files (x86)\Internet Explorer\iexplore.exe O4 - GS\TaskBar: Internet Explorer.lnk . (.Microsoft Corporation - Internet Explorer.) -- C:\Program Files (x86)\Internet Explorer\iexplore.exe O4 - GS\TaskBar: Photos Snapfish (2).lnk . (...) -- C:\Program Files (x86)\Hewlett-Packard\Shared\WizLink.exe O4 - GS\TaskBar: Photos Snapfish.lnk . (...) -- C:\Program Files (x86)\Hewlett-Packard\Shared\WizLink.exe O4 - GS\TaskBar: Windows Explorer (2).lnk . (.Microsoft Corporation - Explorateur Windows.) -- C:\Windows\explorer.exe O4 - GS\TaskBar: Windows Explorer (3).lnk . (.Microsoft Corporation - Explorateur Windows.) -- C:\Windows\explorer.exe O4 - GS\TaskBar: Windows Explorer (4).lnk . (.Microsoft Corporation - Explorateur Windows.) -- C:\Windows\explorer.exe O4 - GS\TaskBar: Windows Explorer (5).lnk . (.Microsoft Corporation - Explorateur Windows.) -- C:\Windows\explorer.exe O4 - GS\TaskBar: Windows Live.LNK . (...) -- C:\Program Files (x86)\Hewlett-Packard\HP LaunchBox\HPTaskBar2.exe (.not file.) O4 - GS\TaskBar: Windows Media Player (2).lnk . (.Microsoft Corporation - Lecteur Windows Media.) -- C:\Program Files (x86)\Windows Media Player\wmplayer.exe O4 - GS\TaskBar: Windows Media Player (3).lnk . (.Microsoft Corporation - Lecteur Windows Media.) -- C:\Program Files (x86)\Windows Media Player\wmplayer.exe O4 - GS\TaskBar: Windows Media Player (4).lnk . (.Microsoft Corporation - Lecteur Windows Media.) -- C:\Program Files (x86)\Windows Media Player\wmplayer.exe O4 - GS\TaskBar: Windows Media Player (5).lnk . (.Microsoft Corporation - Lecteur Windows Media.) -- C:\Program Files (x86)\Windows Media Player\wmplayer.exe O4 - GS\TaskBar: Windows Media Player.lnk . (.Microsoft Corporation - Lecteur Windows Media.) -- C:\Program Files (x86)\Windows Media Player\wmplayer.exe O4 - GS\Programs: Internet Explorer (64-bit).lnk . (.Microsoft Corporation - Internet Explorer.) -- C:\Program Files (x86)\Internet Explorer\iexplore.exe O4 - GS\SendTo: Skype.lnk . (.Skype Technologies S.A. - Skype.) -- C:\Program Files (x86)\Skype\Phone\Skype.exe ~ Global Startup: Scanned in 00mn 01s ---\\ Invisibilité de l'icône d'options IE dans le panneau de Configuration (O5) ~ IE Control Panel: 1 Legitimates Scanned in 00mn 00s ---\\ Boutons situés sur la barre d'outils principale d'Internet Explorer (O9) O9 - Extra button: &Envoyer à OneNote [64Bits] - {2670000A-7350-4f3c-8081-5663EE0C6C49} -- C:\Program Files (x86)\MICROS~2\Office14\ONBttnIE.dll (.not file.) O9 - Extra button: Notes &liées OneNote [64Bits] - {789FE86F-6FC4-46A1-9849-EDE0DB0C95CA} -- C:\Program Files (x86)\MICROS~2\Office14\ONBTTN~1.dll (.not file.) O9 - Extra button: @C:\Program Files\WIDCOMM\Bluetooth Software\btrez.dll,-12650 [64Bits] - {CCA281CA-C863-46ef-9331-5C8D4460577F} . (...) -- C:\Program Files\WIDCOMM\Bluetooth Software\bt_hot_icon.ico ~ IE Extra Buttons: Scanned in 00mn 00s ---\\ Winsock hijacker (Layered Service Provider) (O10) ~ Winsock: 9 Legitimates Scanned in 00mn 00s ---\\ Modification Domaine/Adresses DNS (O17) O17 - HKLM\System\CCS\Services\Tcpip\..\{3B57DFCB-1C81-4D60-820C-3F25F32C023F}: DhcpNameServer = 192.168.1.1 O17 - HKLM\System\CCS\Services\Tcpip\..\{4391CABB-84DD-4655-8752-71EF1CC9B5BE}: DhcpNameServer = 192.169.0.2 O17 - HKLM\System\CS1\Services\Tcpip\..\{3B57DFCB-1C81-4D60-820C-3F25F32C023F}: DhcpNameServer = 192.168.1.1 O17 - HKLM\System\CS1\Services\Tcpip\..\{4391CABB-84DD-4655-8752-71EF1CC9B5BE}: DhcpNameServer = 192.169.0.2 O17 - HKLM\System\CS2\Services\Tcpip\..\{3B57DFCB-1C81-4D60-820C-3F25F32C023F}: DhcpNameServer = 192.168.1.1 O17 - HKLM\System\CS2\Services\Tcpip\..\{4391CABB-84DD-4655-8752-71EF1CC9B5BE}: DhcpNameServer = 192.169.0.2 O17 - HKLM\System\CCS\Services\Tcpip\Parameters: DhcpNameServer = 192.168.1.1 ~ Domain: Scanned in 00mn 00s ---\\ Protocole additionnel (O18) O18 - Handler: wlpg [64Bits] - {E43EF6CD-A37A-4A9B-9E6F-83F89B8E6324} . (...) -- O18 - Filter: text/xml [64Bits] - {807573E5-5146-11D5-A672-00B0D022E945} . (.Microsoft Corporation - Microsoft Office XML MIME Filter.) -- C:\Program Files\Common Files\Microsoft Shared\OFFICE14\MSOXMLMF.dll ~ Protocole Additionnel: Scanned in 00mn 00s ---\\ Valeur de Registre AppInit_DLLs et sous-clés Winlogon Notify (autorun) (O20) O20 - Winlogon Notify: igfxcui . (.Intel Corporation - igfxdev Module.) -- C:\Windows\System32\igfxdev.dll ~ Winlogon: Scanned in 00mn 00s ---\\ Valeur de Registre AppInit_DLLs et sous-clés Winlogon Notify (autorun) (O20) O20 - AppInit_DLLs: . (.NVIDIA Corporation - NVIDIA shim initialization dll, Version 295.) - C:\Windows\system32\nvinitx.dll ~ AppInit DLL: Scanned in 00mn 00s ---\\ Clé de Registre autorun ShellServiceObjectDelayLoad (SSO/SSODL) (O21) ~ SSODL: 1 Legitimates Scanned in 00mn 00s ---\\ Liste des services NT non Microsoft et non désactivés (O23) ~ Services: 27 Legitimates Scanned in 00mn 07s ---\\ Enumération Active Desktop & MHTML Editor (O24) ~ Desktop Component: 1 Legitimates Scanned in 00mn 00s ---\\ BootExecute (O34) ~ BEX: 1 Legitimates Scanned in 00mn 00s ---\\ Tâches planifiées en automatique (O39) [MD5.AE022945810805E64C94E08106801566] [APT] [Hybrid] (...) -- C:\IORRT\IORRT.bat [855] [MD5.AE022945810805E64C94E08106801566] [APT] [IORRT] (...) -- C:\IORRT\IORRT.bat [855] [MD5.ACD698C60D6937D535011BE4E83F7C36] [APT] [Red Giant Link] (...) -- C:\Program Files (x86)\Red Giant Link\Common\Red Giant Link.exe [136192] ~ Scheduled Task: 19 Legitimates Scanned in 00mn 02s ---\\ Composants installés (ActiveSetup Installed Components) (O40) ~ Active Setup: 10 Legitimates Scanned in 00mn 00s ---\\ Pilotes lancés au démarrage (O41) ~ Drivers: 69 Legitimates Scanned in 00mn 00s ---\\ Logiciels installés (O42) O42 - Logiciel: Adobe Flash Player 11 ActiveX - (.Adobe Systems Incorporated.) [HKLM][64Bits] -- Adobe Flash Player ActiveX O42 - Logiciel: Adobe Flash Player 11 Plugin - (.Adobe Systems Incorporated.) [HKLM][64Bits] -- Adobe Flash Player Plugin O42 - Logiciel: Adobe Reader X (10.1.6) MUI - (.Adobe Systems Incorporated.) [HKLM][64Bits] -- {AC76BA86-7AD7-FFFF-7B44-AA0000000001} O42 - Logiciel: CINEMA 4D 13.016 - (.MAXON Computer GmbH.) [HKLM][64Bits] -- MAXONFB05E576 O42 - Logiciel: Explorer Suite III - (...) [HKLM][64Bits] -- Explorer Suite_is1 O42 - Logiciel: Java 7 Update 17 (64-bit) - (.Oracle.) [HKLM][64Bits] -- {26A24AE4-039D-4CA4-87B4-2F86417017FF} O42 - Logiciel: Multimedia Mouse Driver - (.Nom de votre société.) [HKLM][64Bits] -- InstallShield_{A9495514-098A-4869-A464-C455857BC464} O42 - Logiciel: NuMega SmartCheck - (...) [HKLM][64Bits] -- SmartCheck O42 - Logiciel: NuMega SmartCheck 6.2 - (...) [HKLM][64Bits] -- SmartCheck 6.2 O42 - Logiciel: Pando Media Booster - (.Pando Networks Inc..) [HKLM][64Bits] -- {980A182F-E0A2-4A40-94C1-AE0C1235902E} O42 - Logiciel: Portrait Professional Studio 10.9 - (.Anthropics Technology Ltd..) [HKLM][64Bits] -- PortraitProfessionalStudio10_is1 O42 - Logiciel: Proteus 7 Professional - (.Labcenter Electronics.) [HKLM][64Bits] -- {13C4E8F0-B747-4C7C-9090-884832F9F90A} O42 - Logiciel: TreeDBNotes Pro 4 - (...) [HKLM][64Bits] -- TreeDBNotes Pro 4 O42 - Logiciel: Ubuntu - (.Ubuntu.) [HKLM][64Bits] -- Wubi O42 - Logiciel: VB Decompiler Lite - (.DotFix Software.) [HKLM][64Bits] -- VB Decompiler Lite_is1 O42 - Logiciel: VB Decompiler Pro 3.4 - (.GPcH Soft.) [HKLM][64Bits] -- VB Decompiler Pro_is1 O42 - Logiciel: Vuze - (.Vuze Inc..) [HKLM][64Bits] -- 8461-7759-5462-8226 O42 - Logiciel: avast! Free Antivirus v8.0.1483.0 - (.AVAST Software.) [HKLM][64Bits] -- avast ~ Logic: 155 Legitimates Scanned in 00mn 00s ---\\ HKCU & HKLM Software Keys [HKCU\Software\Anthropics] [HKCU\Software\Azureus] [HKCU\Software\Hex-Rays] [HKCU\Software\KetilO] [HKCU\Software\Labcenter Electronics] [HKCU\Software\MC4D] [HKCU\Software\Multimedia Combo Set] [HKCU\Software\NTCore] [HKCU\Software\NuMega] [HKCU\Software\Pando Networks] [HKCU\Software\SoftArtStudio] [HKCU\Software\ZONER] [HKLM\Software\MAXON Installer] [HKLM\Software\Wow6432Node\Anthropics] [HKLM\Software\Wow6432Node\Azureus] [HKLM\Software\Wow6432Node\Labcenter Electronics] [HKLM\Software\Wow6432Node\NuMega] [HKLM\Software\Wow6432Node\Pando Networks] [HKLM\Software\Wow6432Node\Windows Data Count] [HKLM\Software\Wow6432Node\ZONER] [HKLM\Software\ZONER] ~ Key Software: 257 Legitimates Scanned in 00mn 00s ---\\ Contenu des dossiers Programs/ProgramFiles/ProgramData/AppData (O43) O43 - CFD: 30/03/2013 - 19:28:25 - [387,948] ----D C:\Program Files (x86)\Labcenter Electronics O43 - CFD: 01/03/2013 - 19:50:41 - [6,302] ----D C:\Program Files (x86)\Multimedia Mouse Driver O43 - CFD: 02/04/2013 - 00:15:24 - [12,159] ----D C:\Program Files (x86)\NuMega O43 - CFD: 01/03/2013 - 19:40:42 - [7,234] ----D C:\Program Files (x86)\Pando Networks O43 - CFD: 07/03/2013 - 19:03:03 - [90,447] ----D C:\Program Files (x86)\Portrait Professional Studio 10 O43 - CFD: 24/03/2013 - 14:50:52 - [0,217] ---AD C:\Program Files (x86)\RSHUT Pro O43 - CFD: 24/03/2013 - 01:04:58 - [14,372] ----D C:\Program Files (x86)\TreeDBNotes Pro 4 O43 - CFD: 23/03/2013 - 21:26:52 - [9,821] ----D C:\Program Files (x86)\VB Decompiler Lite O43 - CFD: 23/03/2013 - 21:39:44 - [3,893] ----D C:\Program Files (x86)\VB Decompiler Pro O43 - CFD: 03/03/2013 - 01:01:51 - [103,702] ----D C:\Program Files (x86)\Vuze O43 - CFD: 30/03/2013 - 19:29:08 - [0,746] ----D C:\Program Files (x86)\Common Files\Labcenter Electronics O43 - CFD: 18/03/2013 - 07:55:46 - [0,001] ----D C:\ProgramData\TrueSuite O43 - CFD: 07/03/2013 - 19:10:37 - [0,010] ----D C:\ProgramData\Zoner O43 - CFD: 07/03/2013 - 19:05:44 - [0,001] ----D C:\Users\Pixis\AppData\Roaming\Anthropics O43 - CFD: 08/04/2013 - 21:17:15 - [4,507] ----D C:\Users\Pixis\AppData\Roaming\Azureus O43 - CFD: 26/03/2013 - 20:38:09 - [0] ----D C:\Users\Pixis\AppData\Roaming\Hex-Rays O43 - CFD: 03/03/2013 - 03:20:44 - [1,855] ----D C:\Users\Pixis\AppData\Roaming\MAXON O43 - CFD: 24/03/2013 - 01:02:47 - [6,135] ----D C:\Users\Pixis\AppData\Roaming\TreeDBNotes Pro 4 O43 - CFD: 07/03/2013 - 19:10:57 - [0] ----D C:\Users\Pixis\AppData\Roaming\Zoner O43 - CFD: 30/03/2013 - 19:32:38 - [0,001] ----D C:\Users\Pixis\AppData\Local\Labcenter Electronics O43 - CFD: 07/03/2013 - 19:11:01 - [38,908] ----D C:\Users\Pixis\AppData\Local\Zoner O43 - CFD: 01/03/2013 - 19:50:44 - [0,004] ----D C:\Users\Pixis\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Multimedia Mouse Driver O43 - CFD: 24/03/2013 - 00:19:30 - [0] ----D C:\Users\Pixis\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\TreeDBNotes Pro 4 ~ Program Folder: 192 Legitimates Scanned in 00mn 03s ---\\ Derniers fichiers modifiés ou crées sous Windows et System32 (O44) O44 - LFC:[MD5.12F6028271665D64EE0E7281C1B52335] - 01/04/2013 - 23:19:11 ---A- . (...) -- C:\Windows\VBADDIN.INI [47] O44 - LFC:[MD5.8175238C782ABED103BF99D21D0E9C1C] - 01/04/2013 - 23:15:25 ---A- . (.Preview Software Inc - tl32v20.) -- C:\Windows\tl32v20.dll [91648] O44 - LFC:[MD5.EABEC5D6C0F1392E4D117FAB7D1B3A0F] - 24/03/2013 - 13:50:52 ---A- . (...) -- C:\Windows\WININIT.INI [75] O44 - LFC:[MD5.1FF56AC32B38A94C3C88497BD6E00C96] - 19/03/2013 - 01:59:21 ---A- . (...) -- C:\Windows\SysNative\ieuinit.inf [25185] O44 - LFC:[MD5.1FF56AC32B38A94C3C88497BD6E00C96] - 19/03/2013 - 01:59:21 ---A- . (...) -- C:\Windows\System32\ieuinit.inf [25185] O44 - LFC:[MD5.135F074F703FEFC6FEC5BF03930718A3] - 07/04/1999 - 12:05:52 ---A- . (...) -- C:\Windows\smrtchck.tsf [2602] ~ Files: 197 Legitimates Scanned in 00mn 18s ---\\ Derniers fichiers créés dans Windows Prefetcher (O45) O45 - LFCP:[MD5.2F2F97212C7672706FBAFADADA10C5FF] - 01/04/2013 - 12:21:11 ---A- - C:\Windows\Prefetch\CNBSYSINFO.EXE-6E25FB63.pf O45 - LFCP:[MD5.C80CC8DAD6A72C93BA97F6BD4299B7B2] - 01/04/2013 - 17:22:54 ---A- - C:\Windows\Prefetch\UNETBOOTIN-WINDOWS-583.EXE-2E7EC049.pf O45 - LFCP:[MD5.AEBF29A67468EE9C58B9799D2987DEA0] - 01/04/2013 - 17:28:27 ---A- - C:\Windows\Prefetch\SEVNZ.EXE-D5A1C1D0.pf O45 - LFCP:[MD5.C196C395D8AC1B383F63CADE70776E8B] - 01/04/2013 - 17:29:05 ---A- - C:\Windows\Prefetch\UN468.EXE-DA315103.pf O45 - LFCP:[MD5.A916DE1A36AF367F8001FE89D1CB8748] - 01/04/2013 - 18:34:58 ---A- - C:\Windows\Prefetch\PYLF72.TMP.EXE-5289A8B9.pf O45 - LFCP:[MD5.F5C29ECC973FADC2AE251C41A1FF015C] - 01/04/2013 - 18:34:58 ---A- - C:\Windows\Prefetch\PYRUN.EXE-09DED9AB.pf O45 - LFCP:[MD5.5FFD8914B633B89CB834FBC9AF4055B9] - 01/04/2013 - 18:35:53 ---A- - C:\Windows\Prefetch\COMPACT.EXE-D59FAA0F.pf O45 - LFCP:[MD5.D5802D1F3B16C6F8A41201AB09ADA5FA] - 01/04/2013 - 18:36:40 ---A- - C:\Windows\Prefetch\PYL9F52.TMP.EXE-DDFF72AC.pf O45 - LFCP:[MD5.8F913367F916791FBE63C29368F5D77D] - 01/04/2013 - 18:36:40 ---A- - C:\Windows\Prefetch\PYRUN.EXE-F764000E.pf O45 - LFCP:[MD5.8B268BA307E1AA2AA222D1BEF587DAC3] - 01/04/2013 - 18:37:18 ---A- - C:\Windows\Prefetch\WUBI.EXE-8611F38C.pf O45 - LFCP:[MD5.42952AFB1E2855992DC601A091761943] - 01/04/2013 - 18:37:20 ---A- - C:\Windows\Prefetch\PYRUN.EXE-3B54D994.pf O45 - LFCP:[MD5.9384D92BDAB27C13555581D5ED90468F] - 01/04/2013 - 18:37:21 ---A- - C:\Windows\Prefetch\PYL5AB4.TMP.EXE-A1243752.pf O45 - LFCP:[MD5.56F36565CFA608347A3FDDC9040E016D] - 01/04/2013 - 18:59:59 ---A- - C:\Windows\Prefetch\QWINGRAPH.EXE-D329637D.pf O45 - LFCP:[MD5.077A936A5B98463F318754A16205B6F9] - 01/04/2013 - 19:04:44 ---A- - C:\Windows\Prefetch\IDAQ.EXE-07CAA00B.pf O45 - LFCP:[MD5.58360FD98D57FF7583E2894DB00DAFF3] - 01/04/2013 - 20:13:18 ---A- - C:\Windows\Prefetch\PEID.EXE-5471BD89.pf O45 - LFCP:[MD5.6A3E76270784E44A4FB6ED3B45C97E0D] - 01/04/2013 - 20:25:12 ---A- - C:\Windows\Prefetch\IMPORTREC.EXE-D89DC844.pf O45 - LFCP:[MD5.9471D3B56DE19315C037C06029429CD9] - 01/04/2013 - 20:25:23 ---A- - C:\Windows\Prefetch\LORDPE.EXE-D45ACB17.pf O45 - LFCP:[MD5.DCBA01C730C8A9A2CCC9CA258AE24402] - 01/04/2013 - 21:02:57 ---A- - C:\Windows\Prefetch\BRIDGEPROXY.EXE-ED26B729.pf O45 - LFCP:[MD5.68E41FBDE0EE8BDC02E61515CC55EEA8] - 01/04/2013 - 23:14:39 ---A- - C:\Windows\Prefetch\_ISDEL.EXE-B5408DAD.pf O45 - LFCP:[MD5.2A2D712A2802F0E1E0F19E422DBC1655] - 01/04/2013 - 23:16:51 ---A- - C:\Windows\Prefetch\CRACKME2.EXE-47A05B0B.pf O45 - LFCP:[MD5.A2561C1E488DEE18FFE8F94BC51F293C] - 01/04/2013 - 23:17:35 ---A- - C:\Windows\Prefetch\ZPS.EXE-539DE287.pf O45 - LFCP:[MD5.A018F047E6B7606C3CF8DAAC66973AA5] - 01/04/2013 - 23:19:03 ---A- - C:\Windows\Prefetch\_INS5576._MP-4ECD9D3A.pf O45 - LFCP:[MD5.E341799C50158E96DC3C40F63976B502] - 01/04/2013 - 23:19:03 ---A- - C:\Windows\Prefetch\_ISDEL.EXE-D95166C1.pf O45 - LFCP:[MD5.608F560C3EB6C45225D2AE745901040B] - 01/04/2013 - 23:37:03 ---A- - C:\Windows\Prefetch\SMARTCHK.EXE-EEC3CF48.pf O45 - LFCP:[MD5.C0F2C0B33ED73D8C2CAC33F77848E07D] - 02/04/2013 - 22:25:19 ---A- - C:\Windows\Prefetch\CRACKME15.EXE-08887E50.pf O45 - LFCP:[MD5.443BA875D0E3D940B3DBF72078B37293] - 02/04/2013 - 22:26:03 ---A- - C:\Windows\Prefetch\P32DASM.EXE-3E2442B8.pf O45 - LFCP:[MD5.E3B45AF1CDA50792BB779040969FBC3E] - 04/04/2013 - 22:12:51 ---A- - C:\Windows\Prefetch\RADASM.EXE-5772B1D6.pf O45 - LFCP:[MD5.27BD29D37A3CADFF1E7F08E85BBE3755] - 06/04/2013 - 15:20:08 ---A- - C:\Windows\Prefetch\VB DECOMPILER.EXE-320017E6.pf O45 - LFCP:[MD5.7B3199C1DDED5C6C6F1771B9EE693A13] - 06/04/2013 - 15:30:50 ---A- - C:\Windows\Prefetch\RESHACKER.EXE-D37333F5.pf O45 - LFCP:[MD5.217B5AC6DAC21E10584057557AACE4E4] - 06/04/2013 - 16:11:12 ---A- - C:\Windows\Prefetch\7ZFM.EXE-22E64FB8.pf O45 - LFCP:[MD5.32E72D388149287F7A7200B385C308B9] - 06/04/2013 - 16:14:28 ---A- - C:\Windows\Prefetch\OLLYDBG.EXE-7FCBA24B.pf O45 - LFCP:[MD5.D3AD9022AB8F15C63296C5E67C2D6DC7] - 07/04/2013 - 22:09:31 ---A- - C:\Windows\Prefetch\WINAMP.EXE-015FB5E1.pf O45 - LFCP:[MD5.3D8A005FC8D50531502BADC5921F3C61] - 08/04/2013 - 20:10:50 ---A- - C:\Windows\Prefetch\AZUREUS.EXE-997C5496.pf O45 - LFCP:[MD5.0CDBF62B1720CC94849D83EE86657014] - 08/04/2013 - 20:15:49 ---A- - C:\Windows\Prefetch\I4JDEL0.EXE-71874E46.pf O45 - LFCP:[MD5.5B3EE1469B5E21A0CE4AE0FC1EEFCC9B] - 31/03/2013 - 14:24:00 ---A- - C:\Windows\Prefetch\SNIFFER_GPU.EXE-4EDF8502.pf O45 - LFCP:[MD5.B42535ED86176AE5E31B8EAD8D66AE35] - 31/03/2013 - 14:28:45 ---A- - C:\Windows\Prefetch\LINK.EXE-4D35EF71.pf O45 - LFCP:[MD5.F37580AE592475B1E5428DCA6F5DD4B5] - 31/03/2013 - 14:28:58 ---A- - C:\Windows\Prefetch\TEST.EXE-BACDA1A2.pf O45 - LFCP:[MD5.C4C0C868A3B027CE53190DF92145AD2D] - 31/03/2013 - 15:01:49 ---A- - C:\Windows\Prefetch\ML.EXE-8EABCDF0.pf ~ Prefetcher: 141 Legitimates Scanned in 00mn 01s ---\\ Déni du service (Local Security Authority) (O48) O48 - LSA:Local Security Authority Notification Packages . (.Broadcom Corporation. - BtwProximityCP DLL.) -- C:\Program Files\WIDCOMM\Bluetooth Software\BtwProximityCP.dll ~ LSA: 10 Legitimates Scanned in 00mn 00s ---\\ Contrôle du Safe Boot (CSB) (O49) ~ CBS: 13 Legitimates Scanned in 00mn 00s ---\\ MountPoints2 Shell Key (O51) O51 - MPSK:{8d9459cc-7fc9-11e2-b3a7-806e6f6e6963}\AutoRun\command. (...) -- E:\autorun1.exe O51 - MPSK:{9d6fa128-824c-11e2-92e4-e006e6e0a78c}\AutoRun\command. (...) -- H:\wubi.exe (.not file.) ~ Keys: Scanned in 00mn 00s ---\\ Trojan Driver Search Data (HKLM) (O52) ~ TDSD: 2 Legitimates Scanned in 00mn 00s ---\\ ShareTools MSconfig StartupReg (O53) O53 - SMSR:HKLM\...\startupreg\Pando Media Booster [Key] . (.Pas de propriétaire - Pando Media Booster.) -- C:\Program Files (x86)\Pando Networks\Media Booster\PMB.exe O53 - SMSR:HKLM\...\startupreg\SearchProtect [Key] . (...) -- C:\Users\Pixis\AppData\Roaming\SearchProtect\bin\cltmng.exe (.not file.) O53 - SMSR:HKLM\...\startupreg\SearchProtectAll [Key] . (...) -- C:\Program Files (x86)\SearchProtect\bin\cltmng.exe (.not file.) O53 - SMSR:HKLM\...\startupreg\vmware-tray.exe [Key] . (.VMware, Inc. - VMware Tray Process.) -- C:\Program Files (x86)\VMware\VMware Workstation\vmware-tray.exe O53 - SMSR:HKLM\...\startupreg\Zoner Photo Studio Autoupdate [Key] . (.ZONER software - Zoner Photo Studio Autoupdate.) -- C:\PROGRAM FILES\ZONER\PHOTO STUDIO 15\Program32\ZPSTRAY.exe ~ SMSR Keys: 10 Legitimates Scanned in 00mn 00s ---\\ Microsoft Control Security Providers (O54) ~ MSCP: 2 Legitimates Scanned in 00mn 00s ---\\ Microsoft Windows Policies System (O55) O55 - MWPS:[HKLM\...\Policies\System] - "EnableUIADesktopToggle"=0 O55 - MWPS:[HKLM\...\Policies\System] - "FilterAdministratorToken"=0 ~ MWPS: 16 Legitimates Scanned in 00mn 00s ---\\ Microsoft Windows Policies Explorer (O56) O56 - MWPE:[HKLM\...\policies\Explorer] - "NoActiveDesktop"=1 O56 - MWPE:[HKLM\...\policies\Explorer] - "NoActiveDesktopChanges"=1 ~ MWPE Keys: 4 Legitimates Scanned in 00mn 00s ---\\ Liste des Drivers Système (O58) O58 - SDL:[MD5.5C368F4B04ED2A923E6AFCA2D37BAFF5] - 13/05/2011 - 13:57:58 ---A- . (.Hewlett-Packard Company - HP Accelerometer.) -- C:\Windows\System32\Drivers\Accelerometer.sys [43320] O58 - SDL:[MD5.65EFAEC68FA234F36880533A79D7B1C1] - 12/07/2011 - 09:36:28 ---A- . (.VMware, Inc. - VMware Virtual Storage Volume Driver.) -- C:\Windows\SysWOW64\drivers\vstor2-mntapi10-shared.sys [33392] ~ Drivers: Scanned in 00mn 00s ---\\ Derniers fichiers modifiés ou crées (Utilisateur) (O61) O61 - LFC: 06/04/2013 - 15:30:38 ---A- C:\Users\Pixis\AppData\Roaming\Azureus\torrents\vbr.rar.torrent [2076] O61 - LFC: 06/04/2013 - 15:30:39 ---A- C:\Users\Pixis\AppData\Roaming\Azureus\subs\EF82A8EFB1D60FB4232E.vuze [3222] O61 - LFC: 06/04/2013 - 16:10:12 ---A- C:\Users\Pixis\AppData\Roaming\Azureus\subs\7BAD528868BCF5F7A39D.vuze [2606] O61 - LFC: 06/04/2013 - 16:49:26 ---A- C:\Users\Pixis\AppData\Roaming\Azureus\torrents\IORRT 3.5.cmd.torrent [1199] O61 - LFC: 06/04/2013 - 16:49:52 ---A- C:\Users\Pixis\Documents\Vuze Downloads\IORRT 3.5.cmd [8427] O61 - LFC: 06/04/2013 - 16:50:27 ---A- C:\Users\Pixis\AppData\Roaming\Microsoft\Speech\Files\UserLexicons\SP_E4AD8B6F848446CEBA6B8906EB4276E6.dat [940] O61 - LFC: 06/04/2013 - 16:58:59 ---A- C:\Users\Pixis\AppData\Roaming\Azureus\active\4B4D023696F3DD6479DB3CCFE4387F022F9464D8.dat [4775] O61 - LFC: 07/04/2013 - 13:47:52 ---A- C:\Users\Pixis\Links\Google Drive.lnk [1708] O61 - LFC: 07/04/2013 - 19:29:11 ---A- C:\Users\Pixis\AppData\Roaming\Azureus\torrents\The.Big.Lebowski.DVDRip.AC3.XviD-Bayfilms.torrent [19170] O61 - LFC: 07/04/2013 - 19:47:53 ---A- C:\Users\Pixis\Documents\Vuze Downloads\The.Big.Lebowski.DVDRip.AC3.XviD-Bayfilms\The.Big.Lebowski-Kubrick@Bayfilms.txt [778] O61 - LFC: 07/04/2013 - 20:02:15 ---A- C:\Users\Pixis\AppData\Roaming\Azureus\torrents\Ouvert À Double Tour.torrent [17959] O61 - LFC: 07/04/2013 - 20:13:56 ---A- C:\Users\Pixis\Documents\Vuze Downloads\The.Big.Lebowski.DVDRip.AC3.XviD-Bayfilms\The.Big.Lebowski.1998.DVDRip.AC3.XviD-Bayfilms.avi [839409664] O61 - LFC: 07/04/2013 - 22:45:27 ---A- C:\Users\Pixis\AppData\Roaming\Todae\LMPwa\LMP_default.rtv [113632] O61 - LFC: 08/04/2013 - 17:15:56 ---A- C:\Users\Pixis\AppData\Local\Zoner\ZPS 15\MSGC\{0001-US-01424000}\68a7053324031144d826d976eed7a9bc.png [2323] O61 - LFC: 08/04/2013 - 17:15:56 ---A- C:\Users\Pixis\AppData\Local\Zoner\ZPS 15\MSGC\{0001-US-01424000}\6e2cd1f7b97135ebf4d38e4030dc4908.png [11091] O61 - LFC: 08/04/2013 - 17:15:56 ---A- C:\Users\Pixis\AppData\Local\Zoner\ZPS 15\MSGC\{0001-US-01424000}\autoupdate.xml [1574] O61 - LFC: 08/04/2013 - 18:58:34 ---A- C:\Users\Pixis\Downloads\Wireshark-win64-1.8.6.exe [26847472] O61 - LFC: 08/04/2013 - 19:13:40 ---A- C:\Users\Pixis\AppData\Roaming\Azureus\ipfilter.cache [0] O61 - LFC: 08/04/2013 - 19:14:07 ---A- C:\Users\Pixis\AppData\Roaming\Azureus\torrents\Cisco Packet Tracer 5.3.torrent [24954] O61 - LFC: 08/04/2013 - 19:14:13 ---A- C:\Users\Pixis\AppData\Roaming\Azureus\dht\version.dat [20] O61 - LFC: 08/04/2013 - 19:15:00 ---A- C:\Users\Pixis\AppData\Roaming\Azureus\subs\118F6C274745A47C4A3D.vuze [3242] O61 - LFC: 08/04/2013 - 19:15:01 ---A- C:\Users\Pixis\AppData\Roaming\Azureus\subs\DC355E579F59B60644C7.vuze [3215] O61 - LFC: 08/04/2013 - 19:15:01 ---A- C:\Users\Pixis\AppData\Roaming\Azureus\subs\EF0D07F8DD38E8F626A2.vuze [3222] O61 - LFC: 08/04/2013 - 19:15:02 ---A- C:\Users\Pixis\AppData\Roaming\Azureus\subs\A29987CF9CA4C6EAEA4D.vuze [3006] O61 - LFC: 08/04/2013 - 19:15:22 ---A- C:\Users\Pixis\AppData\Roaming\Azureus\active\099B0E6AE8CFD249216DD3F7338BEAC12DDF27BB.dat [22804] O61 - LFC: 08/04/2013 - 19:15:22 ---A- C:\Users\Pixis\AppData\Roaming\Azureus\active\C79A2D7CEB833459D4497A739D06690A01E6C80D.dat [20927] O61 - LFC: 08/04/2013 - 19:16:55 ---A- C:\Users\Pixis\Documents\Vuze Downloads\Cisco Packet Tracer 5.3\Torrent downloaded from Demonoid.com.txt [47] O61 - LFC: 08/04/2013 - 19:17:33 ---A- C:\Users\Pixis\AppData\Roaming\Azureus\active\757F6226A624CFE7EB5E7754AF9F4161D72A9C0D.dat [32117] O61 - LFC: 08/04/2013 - 19:17:33 ---A- C:\Users\Pixis\AppData\Roaming\Azureus\active\F7696A65B6F9DCFC9321926B0632E8C796A0FEA4.dat [61719] O61 - LFC: 08/04/2013 - 19:17:41 ---A- C:\Users\Pixis\Documents\Vuze Downloads\Cisco Packet Tracer 5.3\PacketTracer53_setup.exe [77533021] O61 - LFC: 08/04/2013 - 19:18:03 ---A- C:\Users\Pixis\AppData\Roaming\Azureus\active\6E35EA2C042E35E1C035C565C5983AEA0BCBB07C.dat [29220] O61 - LFC: 08/04/2013 - 19:19:19 ---A- C:\Users\Pixis\AppData\Roaming\Azureus\cache\1539613700.ico [4136] O61 - LFC: 08/04/2013 - 19:20:05 ---A- C:\Users\Pixis\.packettracer [180] O61 - LFC: 08/04/2013 - 19:23:34 ---A- C:\Users\Pixis\AppData\Roaming\Azureus\active\5185806C09E801FDFE2DA3C73DA572003A61C5A6.dat [3709] O61 - LFC: 08/04/2013 - 19:23:34 ---A- C:\Users\Pixis\AppData\Roaming\Azureus\active\6D75FA39EE54B1E767EB7373460DB80F893EE8DF.dat [42296] O61 - LFC: 08/04/2013 - 19:24:10 ---A- C:\Users\Pixis\AppData\Roaming\Azureus\subs\5104299B7F6E02C00DEA.vuze [2606] O61 - LFC: 08/04/2013 - 19:24:11 ---A- C:\Users\Pixis\AppData\Roaming\Azureus\subs\58F7E6C1081515F0B1ED.vuze [3766] O61 - LFC: 08/04/2013 - 19:24:11 ---A- C:\Users\Pixis\AppData\Roaming\Azureus\subscriptions.config [46848] O61 - LFC: 08/04/2013 - 19:24:44 ---A- C:\Users\Pixis\AppData\Roaming\Azureus\active\8D6EDF261D5ECB5A6CD6F8D8DB95D6787968D888.dat [8420] O61 - LFC: 08/04/2013 - 19:57:15 ---A- C:\Users\Pixis\AppData\Roaming\Azureus\active\58C46B1485FFF8DD211FBBE5D0997CCE785DFE11.dat [21177] O61 - LFC: 08/04/2013 - 20:04:48 ---A- C:\Users\Pixis\AppData\Roaming\Azureus\devices.config [7114] O61 - LFC: 08/04/2013 - 20:08:36 ---A- C:\Users\Pixis\AppData\Roaming\Azureus\active\65D2780EE1C62C34ADA31D5D15AE072008A9D2E0.dat [8904] O61 - LFC: 08/04/2013 - 20:08:36 ---A- C:\Users\Pixis\AppData\Roaming\Azureus\active\B7C56142B0ACA87B7E73EAC647410FB2AAFF00C3.dat [78456] O61 - LFC: 08/04/2013 - 20:08:36 ---A- C:\Users\Pixis\AppData\Roaming\Azureus\active\F63644AB669B5DA3B164BCC3E4F32C923BDF6C2D.dat [16281] O61 - LFC: 08/04/2013 - 20:09:14 ---A- C:\Users\Pixis\AppData\Roaming\Azureus\dht\addresses.dat [249] O61 - LFC: 08/04/2013 - 20:10:26 ---A- C:\Users\Pixis\AppData\Roaming\Azureus\active\9928F1270A109EAA7B715B2CF46CD7F3465B3C94.dat [49025] O61 - LFC: 08/04/2013 - 20:10:51 ---A- C:\Users\Pixis\AppData\Roaming\Azureus\torrents\Wireshark Network Analysis (Second Edition).torrent [12939] O61 - LFC: 08/04/2013 - 20:11:01 ---A- C:\Users\Pixis\AppData\Roaming\Azureus\plugins\azupnpav\cd.dat [1901] O61 - LFC: 08/04/2013 - 20:11:11 ---A- C:\Users\Pixis\Documents\Vuze Downloads\Wireshark Network Analysis (Second Edition)\README.nfo [2049] O61 - LFC: 08/04/2013 - 20:12:36 ---A- C:\Users\Pixis\AppData\Roaming\Azureus\active\878CF84A8FA4BD3A66AA1A99CEF4D33CF16BFD61.dat [36304] O61 - LFC: 08/04/2013 - 20:12:36 ---A- C:\Users\Pixis\AppData\Roaming\Azureus\active\D5AD2F2D3E170C21CFD54D90800916E3690AB36A.dat [19607] O61 - LFC: 08/04/2013 - 20:12:37 ---A- C:\Users\Pixis\AppData\Roaming\Azureus\active\73B0A20DC924984C3C6506CD186442924ADECA1A.dat [38551] O61 - LFC: 08/04/2013 - 20:12:37 ---A- C:\Users\Pixis\AppData\Roaming\Azureus\active\DFF8650139ADB1BCEDF6FAC146A3CA82DAE64F51.dat [50919] O61 - LFC: 08/04/2013 - 20:14:00 ---A- C:\Users\Pixis\AppData\Roaming\Azureus\rcm.config [66328] O61 - LFC: 08/04/2013 - 20:15:45 ---A- C:\Users\Pixis\AppData\Roaming\Azureus\VuzeActivities.config [598] O61 - LFC: 08/04/2013 - 20:15:45 ---A- C:\Users\Pixis\AppData\Roaming\Azureus\azureus.statistics [176] O61 - LFC: 08/04/2013 - 20:15:45 ---A- C:\Users\Pixis\AppData\Roaming\Azureus\dht\contacts.dat [548] O61 - LFC: 08/04/2013 - 20:15:45 ---A- C:\Users\Pixis\AppData\Roaming\Azureus\dht\diverse.dat [1317] O61 - LFC: 08/04/2013 - 20:15:45 ---A- C:\Users\Pixis\AppData\Roaming\Azureus\dht\general.dat [11] O61 - LFC: 08/04/2013 - 20:15:45 ---A- C:\Users\Pixis\AppData\Roaming\Azureus\net\pm_3215.dat [27159] O61 - LFC: 08/04/2013 - 20:15:46 ---A- C:\Users\Pixis\AppData\Roaming\Azureus\active\06D39D5D155032F5CE4310E98F1548BD3EAB8CE5.dat [4640] O61 - LFC: 08/04/2013 - 20:15:46 ---A- C:\Users\Pixis\AppData\Roaming\Azureus\active\07FA7B39B2C3FC52B40782215B65D8DCBA41E545.dat [45607] O61 - LFC: 08/04/2013 - 20:15:46 ---A- C:\Users\Pixis\AppData\Roaming\Azureus\active\2059964916364FD7D111D3AB3295B9543F13BEE6.dat [16977] O61 - LFC: 08/04/2013 - 20:15:46 ---A- C:\Users\Pixis\AppData\Roaming\Azureus\active\2D2EA419FBE78B7AACDACA77D8237A925B375B4B.dat [630456] O61 - LFC: 08/04/2013 - 20:15:46 ---A- C:\Users\Pixis\AppData\Roaming\Azureus\active\2F5B87B30E064A7B465F8105CF263AD748FD72F4.dat [47456] O61 - LFC: 08/04/2013 - 20:15:46 ---A- C:\Users\Pixis\AppData\Roaming\Azureus\active\30F2F39908D7167181DE1EA05A56D67C6ACF281D.dat [49513] O61 - LFC: 08/04/2013 - 20:15:46 ---A- C:\Users\Pixis\AppData\Roaming\Azureus\active\3E022A4E3617F832F1A43478669A1523310BCDCA.dat [4193] O61 - LFC: 08/04/2013 - 20:15:46 ---A- C:\Users\Pixis\AppData\Roaming\Azureus\active\56E3F1954F8225EBB52E8E8123CDD6FD992162FC.dat [25126] O61 - LFC: 08/04/2013 - 20:15:46 ---A- C:\Users\Pixis\AppData\Roaming\Azureus\active\8968AF1B669F3795C20EFF5CD35BF4252916C549.dat [40838] O61 - LFC: 08/04/2013 - 20:15:46 ---A- C:\Users\Pixis\AppData\Roaming\Azureus\active\92FF6F156E85B9574CFE4355AC52FCC3938DB3D0.dat [25878] O61 - LFC: 08/04/2013 - 20:15:46 ---A- C:\Users\Pixis\AppData\Roaming\Azureus\active\B468CBFF391CBCBECC910CCEADB246F847EF7A90.dat [18474] O61 - LFC: 08/04/2013 - 20:15:46 ---A- C:\Users\Pixis\AppData\Roaming\Azureus\active\C8C5A42201B890195D409682BF887CC71E038B2F.dat [20054] O61 - LFC: 08/04/2013 - 20:15:46 ---A- C:\Users\Pixis\AppData\Roaming\Azureus\active\C90DB98C5AABE64DCD7F730D816E755242FFFBD4.dat [47895] O61 - LFC: 08/04/2013 - 20:15:46 ---A- C:\Users\Pixis\AppData\Roaming\Azureus\active\CD501B94DC4341CB0A8B813B430D5334413192CB.dat [47314] O61 - LFC: 08/04/2013 - 20:15:46 ---A- C:\Users\Pixis\AppData\Roaming\Azureus\active\F570DCD5A5C48FC69CE25BEFEBBC57E6AFCE30AF.dat [233995] O61 - LFC: 08/04/2013 - 20:15:46 ---A- C:\Users\Pixis\AppData\Roaming\Azureus\active\cache.dat [12054] O61 - LFC: 08/04/2013 - 20:15:46 ---A- C:\Users\Pixis\AppData\Roaming\Azureus\downloads.config [19944] O61 - LFC: 08/04/2013 - 20:15:48 ---A- C:\Users\Pixis\AppData\Roaming\Azureus\azureus.config [10968] O61 - LFC: 08/04/2013 - 20:15:48 ---A- C:\Users\Pixis\AppData\Roaming\Azureus\sidebarauto.config [585] O61 - LFC: 08/04/2013 - 20:15:48 ---A- C:\Users\Pixis\AppData\Roaming\Azureus\tables.config [15833] O61 - LFC: 08/04/2013 - 20:16:29 ---A- C:\Users\Pixis\AppData\Roaming\Wireshark\recent [2077] O61 - LFC: 08/04/2013 - 20:16:29 ---A- C:\Users\Pixis\AppData\Roaming\Wireshark\recent_common [2075] O61 - LFC: 08/04/2013 - 21:36:27 ---A- C:\Users\Pixis\Downloads\ToolsDiags.exe [535823] O61 - LFC: 08/04/2013 - 21:39:11 ---A- C:\Users\Pixis\AppData\Local\Google\Chrome\User Data\Certificate Revocation Lists [268117] O61 - LFC: 08/04/2013 - 21:39:17 ---A- C:\Users\Pixis\AppData\Local\Google\Chrome\User Data\Local State [26383] ~ 302 Fichiers temporaires (Temporary files) ~ Files: 766 Legitimates Scanned in 01mn 30s ---\\ Liste des outils de nettoyage (O63) O63 - Logiciel: HijackThis 2.0.2 - (.TrendMicro.) [HKLM] -- HijackThis O63 - Logiciel: ZHPDiag 2013 - (.Nicolas Coolman.) [HKLM] -- ZHPDiag_is1 O63 - Logiciel: HiJackThis - (.Trend Micro.) [HKLM] -- {45A66726-69BC-466B-A7A4-12FCBA4883D7} ~ ADS: Scanned in 00mn 00s ---\\ Liste des services Legacy (O64) O64 - Services: CurCS - 07/03/2013 - Pas de propriétaire (aswRvrt) .(...) - LEGACY_ASWRVRT O64 - Services: CurCS - 07/03/2013 - Pas de propriétaire (aswVmm) .(...) - LEGACY_ASWVMM ~ Legacy: 80 Legitimates Scanned in 00mn 01s ---\\ File Associations Shell Spawning (O67) ~ FASS Keys: 19 Legitimates Scanned in 00mn 00s ---\\ Start Menu Internet (O68) O68 - StartMenuInternet: [HKLM\..\Shell\open\Command] (.Mozilla Corporation - Firefox.) -- C:\Program Files (x86)\Mozilla Firefox\firefox.exe O68 - StartMenuInternet: [HKLM\..\Shell\open\Command] (.Google Inc. - Google Chrome.) -- C:\Program Files (x86)\Google\Chrome\Application\chrome.exe O68 - StartMenuInternet: [HKLM\..\Shell\open\Command] (.Microsoft Corporation - Internet Explorer.) -- C:\Program Files\Internet Explorer\iexplore.exe ~ Keys: Scanned in 00mn 00s ---\\ Search Browser Infection (O69) O69 - SBI: SearchScopes [HKCU] {0633EE93-D776-472f-A0FF-E1416B8B2E3A} [DefaultScope] - (Bing) - http://www.bing.com O69 - SBI: SearchScopes [HKCU] {38267303-CBDD-4950-BA57-D4FDAE76BE6A} - (Propositions de recherche Amazon.fr) - http://www.amazon.fr O69 - SBI: SearchScopes [HKCU] {b7fca997-d0fb-4fe0-8afd-255e89cf9671} - (Yahoo) - http://fr.search.yahoo.com O69 - SBI: SearchScopes [HKCU] {d43b3890-80c7-4010-a95d-1e77b5924dc3} - (Wikipedia) - http://fr.wikipedia.org O69 - SBI: SearchScopes [HKCU] {D944BB61-2E34-4DBF-A683-47E505C587DC} - (eBay) - http://rover.ebay.com ~ Keys: Scanned in 00mn 00s ---\\ Crack & Keygen Files (O82) C:\Users\Pixis\Desktop\Cracking\Crackme\Crackmes\Am0kCM_2.exe C:\Users\Pixis\Desktop\Cracking\Crackme\Crackmes\crackme1.exe C:\Users\Pixis\Desktop\Cracking\Crackme\Crackmes\f3rgo_chl1.exe C:\Users\Pixis\Desktop\Cracking\Crackme\Crackmes\hackereh@.exe C:\Users\Pixis\Desktop\Cracking\Crackme\Crackmes\KeygenME.exe C:\Users\Pixis\Desktop\Cracking\Crackme\Daemon Crack\N°13\crackme3.exe C:\Users\Pixis\Desktop\Cracking\Crackme\Daemon Crack\N°13\Lancez-moi.exe C:\Users\Pixis\Desktop\Cracking\Crackme\Daemon Crack\N°15\crackme3.exe C:\Users\Pixis\Desktop\Cracking\Crackme\Daemon Crack\N°15\due-cm2.dat C:\Users\Pixis\Desktop\Cracking\Crackme\Daemon Crack\N°15\due-cm2.exe C:\Users\Pixis\Desktop\Cracking\Crackme\Daemon Crack\N°15\Lancez-moi.exe C:\Users\Pixis\Desktop\Cracking\Crackme\NewbieContest\1.crackme1\crackme1.exe C:\Users\Pixis\Desktop\Cracking\Crackme\NewbieContest\3.crackme3\crackme3.exe C:\Users\Pixis\Desktop\Cracking\Crackme\NewbieContest\4.crackme4\crackme4.exe C:\Users\Pixis\Desktop\Cracking\Crackme\NewbieContest\6.crackme\crackme15.exe C:\Users\Pixis\Desktop\Cracking\Crackme\NewbieContest\crackme12.zip C:\Users\Pixis\Desktop\Cracking\Crackme\NewbieContest\crackme4.zip C:\Users\Pixis\Desktop\Cracking\Crackme\NewbieContest\Folcrack\crackme2.exe C:\Users\Pixis\Desktop\Cracking\Tuto\R4ndom\R4ndom_tutorial_10\Target\Crackme6.exe C:\Users\Pixis\Desktop\Cracking\Tuto\R4ndom\R4ndom_tutorial_11\CrackmeConsole.exe C:\Users\Pixis\Desktop\Cracking\Tuto\R4ndom\R4ndom_tutorial_16A\crackme12.exe C:\Users\Pixis\Desktop\Cracking\Tuto\R4ndom\R4ndom_tutorial_16b\Target\crackme12.exe C:\Users\Pixis\Desktop\Cracking\Tuto\R4ndom\R4ndom_tutorial_16b\Target\crackme12_patched.exe C:\Users\Pixis\Desktop\Cracking\Tuto\R4ndom\R4ndom_tutorial_16c\Files\crackme12.exe C:\Users\Pixis\Desktop\Cracking\Tuto\R4ndom\R4ndom_tutorial_17\Targets\DelphiCrackme.exe C:\Users\Pixis\Desktop\Cracking\Tuto\R4ndom\R4ndom_tutorial_19\Files\Saturday Night Crackme.exe C:\Users\Pixis\Desktop\Cracking\Tuto\R4ndom\R4ndom_tutorial_19\Files\Saturday Night Crackme.exe.BAK C:\Users\Pixis\Desktop\Cracking\Tuto\R4ndom\R4ndom_tutorial_19\Files\saturday.night.crackme-patch.exe C:\Users\Pixis\Desktop\Cracking\Tuto\R4ndom\R4ndom_tutorial_20A\Targets\CrackmeVB1.exe C:\Users\Pixis\Desktop\Cracking\Tuto\R4ndom\R4ndom_tutorial_20A\Targets\CrackmeVB2.exe C:\Users\Pixis\Desktop\Cracking\Tuto\R4ndom\R4ndom_tutorial_20A\Targets\CrackmeVB3.exe C:\Users\Pixis\Desktop\Cracking\Tuto\R4ndom\R4ndom_tutorial_20B\Targets\CrackmeVB3.exe C:\Users\Pixis\Desktop\Cracking\Tuto\R4ndom\R4ndom_tutorial_20B\Targets\CrackmeVB4.Exe C:\Users\Pixis\Desktop\Cracking\Tuto\R4ndom\R4ndom_tutorial_20B\Targets\Point-H Crackme.exe C:\Users\Pixis\Desktop\Cracking\Tuto\R4ndom\R4ndom_tutorial_21\Target\Anti-crackme.exe C:\Users\Pixis\Desktop\Cracking\Tuto\R4ndom\R4ndom_tutorial_6\Crackme2.exe C:\Users\Pixis\Desktop\Cracking\Tuto\R4ndom\R4ndom_tutorial_6\Crackme2_patched.exe C:\Users\Pixis\Desktop\Cracking\Tuto\R4ndom\R4ndom_tutorial_7\Crackme8.exe C:\Users\Pixis\Desktop\Cracking\Tuto\R4ndom\R4ndom_tutorial_7\Crackme8_modified.exe C:\Users\Pixis\Desktop\Cracking\Tuto\R4ndom\R4ndom_tutorial_7\Crackme8_modified_patched.exe C:\Users\Pixis\Desktop\Cracking\Tuto\R4ndom\R4ndom_tutorial_8\Crackme3.EXE C:\Users\Pixis\Desktop\Cracking\Tuto\R4ndom\R4ndom_tutorial_8\Crackme3_patched.EXE C:\Users\Pixis\Desktop\Cracking\Tuto\R4ndom\R4ndom_tutorial_9\Crackme6.exe C:\Users\Pixis\Desktop\Cracking\Tuto\R4ndom\R4ndom_tutorial_9\Crackme6_patched.exe C:\Users\Pixis\Downloads\crackme15(1).zip C:\Users\Pixis\Downloads\crackme15(2).zip C:\Users\Pixis\Downloads\crackme15.zip C:\Users\Pixis\Downloads\crackme17.zip C:\Users\Pixis\Desktop\Cracking\Crackme\Crackmes\Am0kCM_2.exe C:\Users\Pixis\Desktop\Cracking\Crackme\Crackmes\crackme1.exe C:\Users\Pixis\Desktop\Cracking\Crackme\Crackmes\f3rgo_chl1.exe C:\Users\Pixis\Desktop\Cracking\Crackme\Crackmes\hackereh@.exe C:\Users\Pixis\Desktop\Cracking\Crackme\Crackmes\KeygenME.exe C:\Users\Pixis\Desktop\Cracking\Crackme\Daemon Crack\N°13\crackme3.exe C:\Users\Pixis\Desktop\Cracking\Crackme\Daemon Crack\N°13\Lancez-moi.exe C:\Users\Pixis\Desktop\Cracking\Crackme\Daemon Crack\N°15\crackme3.exe C:\Users\Pixis\Desktop\Cracking\Crackme\Daemon Crack\N°15\due-cm2.dat C:\Users\Pixis\Desktop\Cracking\Crackme\Daemon Crack\N°15\due-cm2.exe C:\Users\Pixis\Desktop\Cracking\Crackme\Daemon Crack\N°15\Lancez-moi.exe C:\Users\Pixis\Desktop\Cracking\Crackme\NewbieContest\1.crackme1\crackme1.exe C:\Users\Pixis\Desktop\Cracking\Crackme\NewbieContest\3.crackme3\crackme3.exe C:\Users\Pixis\Desktop\Cracking\Crackme\NewbieContest\4.crackme4\crackme4.exe C:\Users\Pixis\Desktop\Cracking\Crackme\NewbieContest\6.crackme\crackme15.exe C:\Users\Pixis\Desktop\Cracking\Crackme\NewbieContest\crackme12.zip C:\Users\Pixis\Desktop\Cracking\Crackme\NewbieContest\crackme4.zip C:\Users\Pixis\Desktop\Cracking\Crackme\NewbieContest\Folcrack\crackme2.exe C:\Users\Pixis\Desktop\Cracking\Tuto\R4ndom\R4ndom_tutorial_10\Target\Crackme6.exe C:\Users\Pixis\Desktop\Cracking\Tuto\R4ndom\R4ndom_tutorial_11\CrackmeConsole.exe C:\Users\Pixis\Desktop\Cracking\Tuto\R4ndom\R4ndom_tutorial_16A\crackme12.exe C:\Users\Pixis\Desktop\Cracking\Tuto\R4ndom\R4ndom_tutorial_16b\Target\crackme12.exe C:\Users\Pixis\Desktop\Cracking\Tuto\R4ndom\R4ndom_tutorial_16b\Target\crackme12_patched.exe C:\Users\Pixis\Desktop\Cracking\Tuto\R4ndom\R4ndom_tutorial_16c\Files\crackme12.exe C:\Users\Pixis\Desktop\Cracking\Tuto\R4ndom\R4ndom_tutorial_17\Targets\DelphiCrackme.exe C:\Users\Pixis\Desktop\Cracking\Tuto\R4ndom\R4ndom_tutorial_19\Files\Saturday Night Crackme.exe C:\Users\Pixis\Desktop\Cracking\Tuto\R4ndom\R4ndom_tutorial_19\Files\Saturday Night Crackme.exe.BAK C:\Users\Pixis\Desktop\Cracking\Tuto\R4ndom\R4ndom_tutorial_19\Files\saturday.night.crackme-patch.exe C:\Users\Pixis\Desktop\Cracking\Tuto\R4ndom\R4ndom_tutorial_20A\Targets\CrackmeVB1.exe C:\Users\Pixis\Desktop\Cracking\Tuto\R4ndom\R4ndom_tutorial_20A\Targets\CrackmeVB2.exe C:\Users\Pixis\Desktop\Cracking\Tuto\R4ndom\R4ndom_tutorial_20A\Targets\CrackmeVB3.exe C:\Users\Pixis\Desktop\Cracking\Tuto\R4ndom\R4ndom_tutorial_20B\Targets\CrackmeVB3.exe C:\Users\Pixis\Desktop\Cracking\Tuto\R4ndom\R4ndom_tutorial_20B\Targets\CrackmeVB4.Exe C:\Users\Pixis\Desktop\Cracking\Tuto\R4ndom\R4ndom_tutorial_20B\Targets\Point-H Crackme.exe C:\Users\Pixis\Desktop\Cracking\Tuto\R4ndom\R4ndom_tutorial_21\Target\Anti-crackme.exe C:\Users\Pixis\Desktop\Cracking\Tuto\R4ndom\R4ndom_tutorial_6\Crackme2.exe C:\Users\Pixis\Desktop\Cracking\Tuto\R4ndom\R4ndom_tutorial_6\Crackme2_patched.exe C:\Users\Pixis\Desktop\Cracking\Tuto\R4ndom\R4ndom_tutorial_7\Crackme8.exe C:\Users\Pixis\Desktop\Cracking\Tuto\R4ndom\R4ndom_tutorial_7\Crackme8_modified.exe C:\Users\Pixis\Desktop\Cracking\Tuto\R4ndom\R4ndom_tutorial_7\Crackme8_modified_patched.exe C:\Users\Pixis\Desktop\Cracking\Tuto\R4ndom\R4ndom_tutorial_8\Crackme3.EXE C:\Users\Pixis\Desktop\Cracking\Tuto\R4ndom\R4ndom_tutorial_8\Crackme3_patched.EXE C:\Users\Pixis\Desktop\Cracking\Tuto\R4ndom\R4ndom_tutorial_9\Crackme6.exe C:\Users\Pixis\Desktop\Cracking\Tuto\R4ndom\R4ndom_tutorial_9\Crackme6_patched.exe C:\Users\Pixis\Downloads\crackme15(1).zip C:\Users\Pixis\Downloads\crackme15(2).zip C:\Users\Pixis\Downloads\crackme15.zip C:\Users\Pixis\Downloads\crackme17.zip ~ Files: Scanned in 01mn 24s ---\\ Recherche des services démarrés par Svchost (O83) ~ Services: 32 Legitimates Scanned in 00mn 00s ---\\ Recherche particuliere à la racine de certains dossiers (O84) [MD5.08AF557C8E6E74D7D92314F6B2C86273] [SPRF][08/04/2013] (...) -- C:\Users\Pixis\AppData\Local\Temp\i4jdel0.exe [4608] [MD5.A4BF011891E40520C127DF8E646A373B] [SPRF][18/03/2013] (...) -- C:\Users\Pixis\Desktop\eteindre.bat [37] [MD5.B63CCB43F2779CBEA5D8D3CE2E3D90FB] [SPRF][08/03/2013] (...) -- C:\Users\Pixis\Desktop\Minecraft.exe [263186] ~ Files: Scanned in 00mn 00s ---\\ Firewall Active Exception List (FirewallRules) (O87) O87 - FAEL: "{A2E1CB46-F470-46C6-9745-7536613D845A}" | In - Private - P6 - TRUE | .(.Vuze Inc. - Pas de description.) -- C:\Program Files (x86)\Vuze\Azureus.exe O87 - FAEL: "{25D83240-F59F-4DEC-B947-E145EDC761A6}" | In - Private - P17 - TRUE | .(.Vuze Inc. - Pas de description.) -- C:\Program Files (x86)\Vuze\Azureus.exe O87 - FAEL: "{28B0A181-2AB1-4EB9-BBEB-E4432FABF9C3}" | In - Domain - P6 - TRUE | .(.Pas de propriétaire - Pando Media Booster.) -- C:\Program Files (x86)\Pando Networks\Media Booster\PMB.exe O87 - FAEL: "{276F22AC-719E-480A-8339-C76FDE3D3C94}" | In - Domain - P17 - TRUE | .(.Pas de propriétaire - Pando Media Booster.) -- C:\Program Files (x86)\Pando Networks\Media Booster\PMB.exe O87 - FAEL: "{49ABD7E7-AB24-45B6-B8F5-0FE1EC0EAA26}" | In - Private - P6 - TRUE | .(.Pas de propriétaire - Pando Media Booster.) -- C:\Program Files (x86)\Pando Networks\Media Booster\PMB.exe O87 - FAEL: "{BFA2FA8F-A63C-483F-86C6-A0EFBEE9B526}" | In - Private - P17 - TRUE | .(.Pas de propriétaire - Pando Media Booster.) -- C:\Program Files (x86)\Pando Networks\Media Booster\PMB.exe O87 - FAEL: "{8DD29C7E-664E-445A-B7DD-5533B1B494EE}" | In - None - P17 - TRUE | .(.Pas de propriétaire - Pando Media Booster.) -- C:\Program Files (x86)\Pando Networks\Media Booster\PMB.exe O87 - FAEL: "TCP Query User{F86C9E8F-7EE4-4B65-BFAA-F5CA3EA9D609}C:\program files (x86)\vuze\azureus.exe" | In - Public - P6 - TRUE | .(.Vuze Inc. - Pas de description.) -- C:\program files (x86)\vuze\azureus.exe O87 - FAEL: "UDP Query User{5460AF9E-A3AD-4DDA-83EB-F6768E966FD7}C:\program files (x86)\vuze\azureus.exe" | In - Public - P17 - TRUE | .(.Vuze Inc. - Pas de description.) -- C:\program files (x86)\vuze\azureus.exe O87 - FAEL: "TCP Query User{BE477DD8-7F65-4E9B-BE3A-F783A0790752}C:\users\pixis\documents\ida pro\ida pro advanced edition\idaq.exe" | In - Private - P6 - TRUE | .(.Hex-Rays SA.) -- C:\users\pixis\documents\ida pro\ida pro advanced edition\idaq.exe O87 - FAEL: "UDP Query User{DB1DA29A-6892-4352-92A0-A7D80C830EAB}C:\users\pixis\documents\ida pro\ida pro advanced edition\idaq.exe" | In - Private - P17 - TRUE | .(.Hex-Rays SA.) -- C:\users\pixis\documents\ida pro\ida pro advanced edition\idaq.exe O87 - FAEL: "{726CD58C-A3D1-4DEC-9934-3B42DD848903}" | In - Public - P17 - TRUE | .(.Hex-Rays SA - The Interactive Disassembler.) -- C:\users\pixis\documents\ida pro\ida pro advanced edition\idaq.exe O87 - FAEL: "{D3BB0823-3049-46FD-9F8C-ACA6F98749A8}" | In - Public - P6 - TRUE | .(.Hex-Rays SA - The Interactive Disassembler.) -- C:\users\pixis\documents\ida pro\ida pro advanced edition\idaq.exe ~ Firewall: 217 Legitimates Scanned in 00mn 01s ---\\ Scan Additionnel (O88) Database Version : v2.11492 - (07/04/2013) Clés trouvées (Keys found) : 8 Valeurs trouvées (Values found) : 0 Dossiers trouvés (Folders found) : 0 Fichiers trouvés (Files found) : 0 [HKLM\Software\Wow6432Node\Microsoft\Tracing\BingBar_RASMANCS] =>Toolbar.Bing [HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{C98EE38D-21E4-4A50-907D-2B56FEC7013E}] =>Toolbar.Agent [HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Settings\{C98EE38D-21E4-4A50-907D-2B56FEC7013E}] =>Toolbar.Agent [HKLM\Software\Classes\CLSID\{C98EE38D-21E4-4A50-907D-2B56FEC7013E}] =>Toolbar.Agent [HKLM\Software\Wow6432Node\Microsoft\Tracing\BingBar_RASAPI32] =>Toolbar.Bing [HKCU\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}] =>Toolbar.Bing [HKLM\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}] =>Toolbar.Bing [HKLM\Software\Wow6432Node\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}] =>Toolbar.Bing ~ Additionnel: Scanned in 00mn 14s ---\\ Product Upgrade Codes (O90) O90 - PUC: "31ED90C3C7689824F9595401BBA3F575" . (.Magic Bullet Suite 64-bit.) -- C:\Windows\Installer\{3C09DE13-867C-4289-9F95-4510BB3A5F57}\ARPPRODUCTICON.exe O90 - PUC: "4155949AA89096844A464C5558B74C46" . (.Multimedia Mouse Driver.) -- C:\Windows\Installer\{A9495514-098A-4869-A464-C455857BC464}\ARPPRODUCTICON.exe ~ Update Products: 125 Legitimates Scanned in 00mn 00s ---\\ Etat général des services non Microsoft (EGS) (SR=Running, SS=Stopped) SR - | Auto 18/12/2012 65192 | (AdobeARMservice) . (.Adobe Systems Incorporated.) - C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe SS - | Demand 12/03/2013 253656 | (AdobeFlashPlayerUpdateSvc) . (.Adobe Systems Incorporated.) - C:\Windows\SysWOW64\Macromed\Flash\FlashPlayerUpdateService.exe SR - | Auto 07/03/2013 45248 | (avast! Antivirus) . (.AVAST Software.) - C:\Program Files\AVAST Software\Avast\AvastSvc.exe SR - | Auto 05/12/2011 1084192 | (btwdins) . (.Broadcom Corporation..) - C:\Program Files\WIDCOMM\Bluetooth Software\btwdins.exe SS - | Auto 20/04/2011 241648 | (CLKMSVC10_38F51D56) . (.CyberLink.) - C:\Program Files (x86)\CyberLink\PowerDVD10\NavFilter\kmsvc.exe SS - | Demand 30/01/2012 276248 | (cphs) . (.Intel Corporation.) - C:\Windows\SysWow64\IntelCpHeciSvc.exe SR - | Auto ??\??\???? 0 | (ezSharedSvc) . (.EasyBits Software AS.) - C:\Windows\System32\ezSharedSvcHost.exe SR - | Auto 11/12/2011 260424 | (FPLService) . (.HP.) - C:\Program Files (x86)\HP SimplePass\TrueSuiteService.exe SS - | Auto 01/03/2013 116648 | (gupdate) . (.Google Inc..) - C:\Program Files (x86)\Google\Update\GoogleUpdate.exe SS - | Demand 01/03/2013 116648 | (gupdatem) . (.Google Inc..) - C:\Program Files (x86)\Google\Update\GoogleUpdate.exe SR - | Auto 09/09/2011 86072 | (HP Support Assistant Service) . (.Hewlett-Packard Company.) - C:\Program Files (x86)\Hewlett-Packard\HP Support Framework\hpsa_service.exe SR - | Auto 16/02/2011 682040 | (HPAuto) . (.Hewlett-Packard.) - C:\Program Files\Hewlett-Packard\HP Auto\HPAuto.exe SR - | Auto 11/10/2010 346168 | (HPClientSvc) . (.Hewlett-Packard Company.) - C:\Program Files\Hewlett-Packard\HP Client Services\HPClientServices.exe SR - | Auto 22/11/2011 227896 | (HPDrvMntSvc.exe) . (.Hewlett-Packard Company.) - C:\Program Files (x86)\Hewlett-Packard\Shared\HPDrvMntSvc.exe SR - | Demand 22/11/2011 981048 | (hpqwmiex) . (.Hewlett-Packard Company.) - C:\Program Files (x86)\Hewlett-Packard\Shared\hpqWmiEx.exe SR - | Auto 13/05/2011 30520 | (hpsrv) . (.Hewlett-Packard Company.) - C:\Windows\System32\Hpservice.exe SR - | Auto 29/11/2011 34872 | (HPWMISVC) . (.Hewlett-Packard Development Company, L.P..) - C:\Program Files (x86)\Hewlett-Packard\HP Quick Launch\HPWMISVC.exe SR - | Auto 30/11/2011 13592 | (IAStorDataMgrSvc) . (.Intel Corporation.) - C:\Program Files (x86)\Intel\Intel(R) Rapid Storage Technology\IAStorDataMgrSvc.exe SR - | Auto 08/12/2011 607456 | (Intel(R) Capability Licensing Service Interface) . (.Intel(R) Corporation.) - C:\Program Files\Intel\iCLS Client\HeciServer.exe SR - | Auto 128280 | (Intel(R) ME Service) . (...) - C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\FWService\IntelMeFWService.exe SR - | Auto 16/12/2011 161560 | (jhi_service) . (.Intel Corporation.) - C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\DAL\jhi_service.exe SR - | Auto 16/12/2011 277784 | (LMS) . (.Intel Corporation.) - C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\LMS\LMS.exe SS - | Demand 08/03/2013 115608 | (MozillaMaintenance) . (.Mozilla Foundation.) - C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe SR - | Auto 28/01/2012 889664 | (nvsvc) . (.NVIDIA Corporation.) - C:\Windows\system32\nvvsvc.exe SR - | Auto 02/02/2012 2458944 | (nvUpdatusService) . (.NVIDIA Corporation.) - C:\Program Files (x86)\NVIDIA Corporation\NVIDIA Update Core\daemonu.exe SS - | Demand 25/06/2010 117264 | (rpcapd) . (.CACE Technologies, Inc..) - C:\Program Files (x86)\WinPcap\rpcapd.exe SS - | Auto 13/07/2012 160944 | (SkypeUpdate) . (.Skype Technologies.) - C:\Program Files (x86)\Skype\Updater\Updater.exe SR - | Auto 04/01/2012 311808 | (STacSV) . (.IDT, Inc..) - C:\Program Files\IDT\WDM\STacSV64.exe SS - | Demand 19/02/2010 517096 | (SwitchBoard) . (.Adobe Systems Incorporated.) - C:\Program Files (x86)\Common Files\Adobe\SwitchBoard\SwitchBoard.exe SS - | Demand 09/12/2011 269640 | (TrueService) . (.AuthenTec, Inc..) - C:\Program Files\Common Files\AuthenTec\TrueService.exe SR - | Auto 16/12/2011 363800 | (UNS) . (.Intel Corporation.) - C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\UNS\UNS.exe SR - | Auto 15/08/2012 79872 | (VMAuthdService) . (.VMware, Inc..) - C:\Program Files (x86)\VMware\VMware Workstation\vmware-authd.exe SR - | Auto ??\??\???? 0 | (VMnetDHCP) . (.VMware, Inc..) - C:\Windows\system32\vmnetdhcp.exe SR - | Auto 01/08/2012 917656 | (VMUSBArbService) . (.VMware, Inc..) - C:\Program Files (x86)\Common Files\VMware\USB\vmware-usbarbitrator64.exe SR - | Auto ??\??\???? 0 | (VMware NAT Service) . (.VMware, Inc..) - C:\Windows\system32\vmnat.exe SR - | Auto 15680000 | (VMwareHostd) . (...) - C:\Program Files (x86)\VMware\VMware Workstation\vmware-hostd.exe SR - | Auto 14/07/2009 27136 | C:\Program Files (x86)\Windows Defender\mpsvc.dll (WinDefend) . (.Microsoft Corporation.) - C:\Windows\System32\svchost.exe SR - | Auto 0 | (WMPNetworkSvc) . (...) - C:\Program Files (x86)\Windows Media Player\wmpnetwk.exe SR - | Auto 14/07/2009 27136 | C:\Windows\System32\wuaueng.dll (wuauserv) . (.Microsoft Corporation.) - C:\Windows\System32\svchost.exe ~ Services: Scanned in 00mn 00s ---\\ Recherche Master Boot Record Infection (MBR)(O80) Stealth MBR rootkit/Mebroot/Sinowal/TDL4 detector 0.4.2 by Gmer, http://www.gmer.net Run by Pixis at 08/04/2013 22:42:40 device: opened successfully user: error reading MBR Disk trace: error: Read Descripteur non valide kernel: error reading MBR ~ MBR: 9 Legitimates Scanned in 00mn 02s ---\\ Recherche Master Boot Record Infection (MBRCheck)(O80) Written by ad13, http://ad13.geekstog Run by Pixis at 08/04/2013 22:42:42 ********* Dump file Name ********* C:\PhysicalDisk0_MBR.bin ~ MBR: Scanned in 00mn 04s ~ 2249 Legitimates filtered by white list End of the scan (938 lines in 04mn 21s)(96)