cjoint

Publicité


Publicité

Format du document : text/plain

Prévisualisation

Script ZHPFix
ShortcutFix

Lignes indésirables
[MD5.90D787A2DF45B1E82C276DFD1A91AE61] - (...) -- C:\Users\Marine\AppData\Roaming\cacaoweb\cacaoweb.exe [471552] [PID.3600] =>PUP.CacaoWeb
G2 - GCE: Preference [User Data\Default] [kbjlipmgfoamgjaogmbihaffnpkpjajp] Bubble Dock v.1.0.0.130 (Désactivé) =>PUP.BubbleDock
M3 - MFPP: Plugins - [Marine] -- C:\Users\Marine\AppData\Roaming\Mozilla\Firefox\Profiles\6wxelu2c.default\searchplugins\babylon.xml =>PUP.Babylon
M3 - MFPP: Plugins - [Marine] -- C:\Users\Marine\AppData\Roaming\Mozilla\Firefox\Profiles\6wxelu2c.default\searchplugins\BrowserProtect.xml =>Hijacker.Eazel
M3 - MFPP: Plugins - [Marine] -- C:\Users\Marine\AppData\Roaming\Mozilla\Firefox\Profiles\6wxelu2c.default\searchplugins\iminent.xml =>Adware.IMBooster
M2 - MFEP: prefs.js [Marine - 6wxelu2c.default\29abb661-0efc-4f64-8a89-b11430d434c4@9678608e-dc95-42b0-8db0-4ce126239776.com] [] Plus-HD-7.7 v (..) =>Adware.PlusHD
M2 - MFEP: prefs.js [Marine - 6wxelu2c.default\cacaoweb@cacaoweb.org] [] cacaoweb v1.0.34 (..) =>PUP.CacaoWeb
O4 - GS\QuickLaunch [Marine]: iLivid.lnk . (...) -- C:\Users\Marine\AppData\Local\iLivid\iLivid.exe (.not file.) =>Adware.Bandoo
O4 - HKCU\..\Run: [cacaoweb] . (...) -- C:\Users\Marine\AppData\Roaming\cacaoweb\cacaoweb.exe =>PUP.CacaoWeb
O4 - HKCU\..\Run: [iLivid] C:\Users\Marine\AppData\Local\iLivid\iLivid.exe (.not file.) =>Adware.Bandoo
O4 - HKLM\..\Wow6432Node\Run: [fst_fr_105] Clé orpheline =>PUA.FSTfr9
O4 - HKUS\S-1-5-21-147655156-3602907169-3331869245-1001\..\Run: [cacaoweb] . (...) -- C:\Users\Marine\AppData\Roaming\cacaoweb\cacaoweb.exe =>PUP.CacaoWeb
O4 - HKUS\S-1-5-21-147655156-3602907169-3331869245-1001\..\Run: [iLivid] C:\Users\Marine\AppData\Local\iLivid\iLivid.exe (.not file.) =>Adware.Bandoo
O23 - Service: Datamngr Coordinator (DatamngrCoordinator) . (...) - C:\Program Files (x86)\Movies Toolbar\Datamngr\DatamngrCoordinator.exe (.not file.) =>PUP.Datamngr
O39 - APT:Automatic Planified Task - C:\Windows\Tasks\bench-sys.job [366] =>PUP.GiganticSavings
O39 - APT:Automatic Planified Task - C:\Windows\Tasks\bench-Updater removing.job [314] =>PUP.GiganticSavings
[MD5.00000000000000000000000000000000] [APT] [bench-sys] (...) -- C:\Program Files (x86)\Bench\Updater\updater.exe (.not file.) [0] =>PUP.GiganticSavings
[MD5.71D490C463014E4FB88B8CBA700B111E] [APT] [EPUpdater] (...) -- C:\Users\Marine\AppData\Roaming\BabSolution\Shared\BabMaint.exe [4608] =>Hijacker.BabSolution
[HKCU\Software\5c688dee16de442] =>Hijacker.Hijacker.Eazel
[HKCU\Software\BabSolution] =>Hijacker.BabSolution
[HKCU\Software\DataMngr_Toolbar] =>PUP.Datamngr
[HKCU\Software\FileScout] =>PUP.FileScout
[HKCU\Software\InstallCore] =>Adware.InstallCore
[HKCU\Software\TutoTag] =>Spyware.AgenceExclusive
[HKCU\Software\cacaoweb] =>PUP.CacaoWeb
[HKCU\Software\ilivid] =>Adware.Bandoo
[HKCU\Software\lollipop] =>Adware.Lollipop
[HKLM\Software\Iminent] =>Adware.IMBooster
[HKLM\Software\Wow6432Node\5c688dee16de442] =>Hijacker.Hijacker.Eazel
[HKLM\Software\Wow6432Node\Babylon] =>PUP.Babylon
[HKLM\Software\Wow6432Node\Datamngr] =>PUP.Datamngr
[HKLM\Software\Wow6432Node\Iminent] =>Adware.IMBooster
[HKLM\Software\Wow6432Node\Tutorials] =>Spyware.AgenceExclusive
[HKLM\Software\Wow6432Node\Vittalia] =>Adware.Vittalia
[HKLM\Software\Wow6432Node\free_soft_to_day] =>Adware.FreeSoftToday
O43 - CFD: 14/05/2013 - 13:55:10 - [1,673] ----D C:\Users\Marine\AppData\Roaming\BabSolution =>Hijacker.BabSolution
O43 - CFD: 14/05/2013 - 13:54:33 - [0,029] ----D C:\Users\Marine\AppData\Roaming\Babylon =>PUP.Babylon
O43 - CFD: 16/03/2014 - 18:59:25 - [-1435,316] ----D C:\Users\Marine\AppData\Roaming\cacaoweb =>PUP.CacaoWeb
O43 - CFD: 15/06/2013 - 14:03:52 - [0,308] ----D C:\Users\Marine\AppData\Roaming\File Scout =>PUP.FileScout
O45 - LFCP:[MD5.738A148A75D6D53639B92974DFEDDA17] - 10/03/2014 - 00:38:16 ---A- - C:\Windows\Prefetch\LOLLIPOP.EXE-2098CB4F.pf =>Adware.Lollipop
O45 - LFCP:[MD5.BB482A37A45796D7B634C8B041CD108E] - 27/02/2014 - 17:10:57 ---A- - C:\Windows\Prefetch\IMINENT_1712-B2FCAD5E.EXE-59CE7544.pf =>Adware.IMBooster
O45 - LFCP:[MD5.33AA4C485D2D9BAE0726C5D0EB8CD6F9] - 27/02/2014 - 17:20:43 ---A- - C:\Windows\Prefetch\ILIVIDMEDIABAR.EXE-B58F9369.pf =>Adware.Bandoo
O45 - LFCP:[MD5.23D837256517D79E145F98FC1369006B] - 27/02/2014 - 21:59:15 ---A- - C:\Windows\Prefetch\UPFST_FR_105.EXE-6844A30C.pf =>PUA.FSTfr9
O45 - LFCP:[MD5.607D3CDEC2ACA345E29B59C4FC660FD0] - 27/02/2014 - 22:53:22 ---A- - C:\Windows\Prefetch\BU_.EXE-39A1E8B0.pf => Infection PUP (Toolbar.Babylon)
O45 - LFCP:[MD5.CB84E3AA8174498CA2BE4BCACAB46469] - 27/02/2014 - 22:54:09 ---A- - C:\Windows\Prefetch\UMBRELLA.EXE-0B44C393.pf =>Adware.IMBooster
O50 - IFEO:Image File Execution Options - bitguard.exe - tasklist.exe =>PUP.BitGuard
O50 - IFEO:Image File Execution Options - bprotect.exe - tasklist.exe => PUP.VideoPerformer
O50 - IFEO:Image File Execution Options - browsemngr.exe - tasklist.exe => Toolbar.Babylon
O50 - IFEO:Image File Execution Options - browserdefender.exe - tasklist.exe =>Hijacker.Eazel
O50 - IFEO:Image File Execution Options - browsermngr.exe - tasklist.exe =>PUP.Babylon
O50 - IFEO:Image File Execution Options - browserprotect.exe - tasklist.exe =>Hijacker.Eazel
O50 - IFEO:Image File Execution Options - browsersafeguard.exe - tasklist.exe =>PUP.BrowserSafeguard
O50 - IFEO:Image File Execution Options - bundlesweetimsetup.exe - tasklist.exe =>PUP.SweetIM
O50 - IFEO:Image File Execution Options - delta babylon.exe - tasklist.exe =>PUP.Babylon
O50 - IFEO:Image File Execution Options - delta tb.exe - tasklist.exe => Toolbar.Babylon
O50 - IFEO:Image File Execution Options - dprotectsvc.exe - tasklist.exe =>Trojan.Trojan.Staser
O50 - IFEO:Image File Execution Options - iminentsetup.exe - tasklist.exe =>Adware.IMBooster
O50 - IFEO:Image File Execution Options - protectedsearch.exe - tasklist.exe =>Spyware.ProtectedSearch
O50 - IFEO:Image File Execution Options - rjatydimofu.exe - tasklist.exe => PUP.Agent
O50 - IFEO:Image File Execution Options - snapdo.exe - tasklist.exe =>Hijacker.SmartBar
O50 - IFEO:Image File Execution Options - sweetimsetup.exe - tasklist.exe =>PUP.SweetIM
O50 - IFEO:Image File Execution Options - utiljumpflip.exe - tasklist.exe =>PUP.JumpFlip
O61 - LFC: 16/03/2014 - 19:39:19 ---A- . (...) -- C:\Users\Marine\AppData\Roaming\BabSolution\Shared\chu.js [2] =>Hijacker.BabSolution
O61 - LFC: 16/03/2014 - 19:39:19 ---A- . (...) -- C:\Users\Marine\AppData\Roaming\cacaoweb\npdfile.dat [140] =>PUP.CacaoWeb
O61 - LFC: 16/03/2014 - 19:39:19 ---A- . (...) -- C:\Users\Marine\AppData\Roaming\cacaoweb\storage.db [7939] =>PUP.CacaoWeb
O69 - SBI: prefs.js [Marine - 6wxelu2c.default] user_pref("extensions.crossrider.bic", "1447421450289fb785078a21bb0117aa"); =>PUP.CrossRider
O69 - SBI: SearchScopes [HKCU] {9BB47C17-9C68-4BB3-B188-DD9AF0FD2406} - (Ask.com) - http://dts.search.ask.com => Infection PUP (Adware.Bandoo)
[MD5.90D787A2DF45B1E82C276DFD1A91AE61] [SPRF][16/03/2014] (...) -- C:\Users\Marine\Desktop\cacaoweb.exe [471552] =>PUP.CacaoWeb
O87 - FAEL: "UDP Query User{009170B9-C451-431D-8FC7-92B377BFD1AD}C:\users\marine\appdata\roaming\cacaoweb\cacaoweb.exe" | In - Public - P17 - TRUE | .(...) -- C:\users\marine\appdata\roaming\cacaoweb\cacaoweb.exe =>PUP.CacaoWeb
O87 - FAEL: "TCP Query User{C6579D9D-A673-4856-9740-6993AA82208C}C:\users\marine\appdata\roaming\cacaoweb\cacaoweb.exe" | In - Public - P6 - TRUE | .(...) -- C:\users\marine\appdata\roaming\cacaoweb\cacaoweb.exe =>PUP.CacaoWeb
O87 - FAEL: "{BAFE75A0-91EF-485B-9E6A-A2F0C2024DF5}" |In - None - P6 - TRUE | .(...) -- C:\Users\Marine\AppData\Local\iLivid\iLivid.exe (.not file.) =>Adware.Bandoo
O87 - FAEL: "{D873CC43-E553-4AF0-B63E-DBA93DEC00D2}" |In - None - P17 - TRUE | .(...) -- C:\Users\Marine\AppData\Local\iLivid\iLivid.exe (.not file.) =>Adware.Bandoo
[HKCU\Software\5c688dee16de442\2.6.1339.144\upd]:="upd=1" =>Hijacker.Hijacker.Eazel
[HKCU\Software\5c688dee16de442\history\{c16c1ccb-7046-4e5c-a2f3-533ad2fec8e8}2.6.1249.132]:guid="{c16c1ccb-7046-4e5c-a2f3-533ad2fec8e8}" =>Hijacker.Hijacker.Eazel
[HKCU\Software\5c688dee16de442\history\{c16c1ccb-7046-4e5c-a2f3-533ad2fec8e8}2.6.1249.132]:version="2.6.1249.132" =>Hijacker.Hijacker.Eazel
[HKCU\Software\5c688dee16de442] =>PUP.Babylon^
[HKLM\Software\Wow6432Node\5c688dee16de442] => Infection PUP (Hijacker.Eazel)
SS - | Auto 10/07/1658 0 | (DatamngrCoordinator) . (...) - C:\Program Files (x86)\Movies Toolbar\Datamngr\DatamngrCoordinator.exe =>PUP.Datamngr
[HKLM\Software\Google\Chrome\Extensions\kbjlipmgfoamgjaogmbihaffnpkpjajp] =>PUP.BubbleDock^
[HKLM\SYSTEM\CurrentControlSet\Services\DatamngrCoordinator] =>PUP.Datamngr^
[HKCU\Software\Microsoft\Internet Explorer\SearchScopes\{0ecdf796-c2dc-4d79-a620-cce0c0a66cc9}] =>PUP.Babylon
[HKLM\Software\Wow6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{68B81CCD-A80C-4060-8947-5AE69ED01199}] =>Adware.IMBooster
[HKCU\Software\Microsoft\Internet Explorer\SearchScopes\{9BB47C17-9C68-4BB3-B188-DD9AF0FD2406}] =>Adware.Bandoo
[HKLM\Software\Microsoft\Internet Explorer\SearchScopes\{9BB47C17-9C68-4BB3-B188-DD9AF0FD2406}] =>Adware.Bandoo
[HKLM\Software\Wow6432Node\Microsoft\Internet Explorer\SearchScopes\{9BB47C17-9C68-4BB3-B188-DD9AF0FD2406}] =>Adware.Bandoo
[HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Settings\{A40DC6C5-79D0-4ca8-A185-8FF989AF1115}] =>Adware.Bandoo
[HKLM\Software\Wow6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{E6B969FB-6D33-48d2-9061-8BBD4899EB08}] =>Adware.IMBooster
[HKCU\Software\cacaoweb] =>PUP.CacaoWeb
[HKLM\Software\Wow6432Node\DataMngr] =>Adware.Bandoo
[HKCU\Software\lollipop] =>Adware.Lollipop
[HKCU\Software\ilivid] =>Adware.Bandoo
[HKLM\Software\Iminent] =>Adware.IMBooster
[HKLM\Software\Wow6432Node\Iminent] =>Adware.IMBooster
[HKLM\Software\Wow6432Node\Tutorials] =>Spyware.AgenceExclusive
[HKLM\Software\Classes\Prod.cap] =>PUP.Babylon
[HKCU\Software\InstallCore] =>Adware.InstallCore
[HKCU\Software\AppDataLow\Software\Crossrider] =>PUP.CrossRider
[HKLM\Software\Classes\Iminent] =>Adware.IMBooster
[HKLM\Software\Wow6432Node\Classes\Iminent] =>Adware.IMBooster
[HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]:cacaoweb =>PUP.CacaoWeb^
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]:fst_fr_105 =>PUA.FSTfr9^
[HKCU\Software\Microsoft\Internet Explorer\URLSearchHooks]:{84FF7BD6-B47F-46F8-9130-01B2696B36CB} =>Adware.IMBooster
C:\Users\Marine\AppData\Local\Google\Chrome\User Data\Default\Extensions\kbjlipmgfoamgjaogmbihaffnpkpjajp =>PUP.BubbleDock^
C:\Users\Marine\AppData\Roaming\Mozilla\Firefox\Profiles\6wxelu2c.default\extensions\29abb661-0efc-4f64-8a89-b11430d434c4@9678608e-dc95-42b0-8db0-4ce126239776.com =>Adware.PlusHD^
C:\Users\Marine\AppData\Roaming\Mozilla\Firefox\Profiles\6wxelu2c.default\extensions\cacaoweb@cacaoweb.org =>PUP.CacaoWeb^
C:\Users\Marine\AppData\Roaming\BabSolution =>Hijacker.BabSolution^
C:\Users\Marine\AppData\Roaming\Babylon =>PUP.Babylon^
C:\Users\Marine\AppData\Roaming\cacaoweb =>PUP.CacaoWeb^
C:\Users\Marine\AppData\Roaming\File Scout =>PUP.FileScout^
C:\Users\Marine\AppData\Roaming\cacaoweb\cacaoweb.exe =>PUP.CacaoWeb^
C:\Windows\Tasks\bench-sys.job =>PUP.GiganticSavings^
C:\Windows\Tasks\bench-Updater removing.job =>PUP.GiganticSavings^
C:\Users\Marine\AppData\Roaming\BabSolution\Shared\BabMaint.exe =>Hijacker.BabSolution^
[HKCU\Software\BabSolution] =>Hijacker.BabSolution^
[HKCU\Software\DataMngr_Toolbar] =>PUP.Datamngr^
[HKCU\Software\FileScout] =>PUP.FileScout^
[HKCU\Software\TutoTag] =>Spyware.AgenceExclusive^
[HKLM\Software\Wow6432Node\Babylon] =>PUP.Babylon^
[HKLM\Software\Wow6432Node\Datamngr] =>PUP.Datamngr^
[HKLM\Software\Wow6432Node\Vittalia] =>Adware.Vittalia^
[HKLM\Software\Wow6432Node\free_soft_to_day] =>Adware.FreeSoftToday^
C:\Users\Marine\Desktop\cacaoweb.exe =>PUP.CacaoWeb^
[HKCU\Software\5c688dee16de442\history\{c16c1ccb-7046-4e5c-a2f3-533ad2fec8e8}2.6.1249.132]:guid="{c16c1ccb-7046-4e5c-a2f3-533ad2fec8e8}" =>Hijacker.Hijacker.Eazel^
[HKCU\Software\5c688dee16de442] =>PUP.Babylon^^
C:\Users\Marine\Downloads\cacaoweb.exe =>PUP.CacaoWeb
C:\Users\Marine\AppData\Local\Temp\Umbrella.exe390cf9f6 =>Adware.IMBooster
G2 - GCE: Preference [User Data\Default] [aaaaojmikegpiepcfdkkjaplodkpfmlo] Ask Toolbar v.7.15.23.42079 (Désactivé) =>Toolbar.Ask
M3 - MFPP: Plugins - [Marine] -- C:\Users\Marine\AppData\Roaming\Mozilla\Firefox\Profiles\6wxelu2c.default\searchplugins\askcom.xml => Plugin Mozilla Firefox Ask.com
M3 - MFPP: Plugins - [Marine] -- C:\Users\Marine\AppData\Roaming\Mozilla\Firefox\Profiles\6wxelu2c.default\searchplugins\delta.xml =>Toolbar.DeltaSearch
O43 - CFD: 16/03/2014 - 17:03:05 - [0] ----D C:\ProgramData\Ask => Toolbar.Ask
O50 - IFEO:Image File Execution Options - cltmngsvc.exe - tasklist.exe => Toolbar.Conduit
O50 - IFEO:Image File Execution Options - delta2.exe - tasklist.exe => Toolbar.DeltaSearch
O50 - IFEO:Image File Execution Options - deltainstaller.exe - tasklist.exe => Toolbar.DeltaSearch
O50 - IFEO:Image File Execution Options - deltasetup.exe - tasklist.exe => Toolbar.DeltaSearch
O50 - IFEO:Image File Execution Options - deltatb.exe - tasklist.exe =>Toolbar.DeltaSearch
O50 - IFEO:Image File Execution Options - deltatb_2501-c733154b.exe - tasklist.exe =>Toolbar.DeltaSearch
O50 - IFEO:Image File Execution Options - searchprotection.exe - tasklist.exe =>Toolbar.Conduit
O50 - IFEO:Image File Execution Options - searchprotector.exe - tasklist.exe =>Toolbar.Conduit
O50 - IFEO:Image File Execution Options - tbdelta.exetoolbar783881609.exe - tasklist.exe => Toolbar.DeltaSearch
O69 - SBI: C:\Users\Marine\AppData\Roaming\Mozilla\Firefox\Profiles\6wxelu2c.default\searchplugins\askcom.xml => Plugin Mozilla Firefox Ask.com
O69 - SBI: prefs.js [Marine - 6wxelu2c.default] user_pref("extensions.delta.admin", false); => Toolbar.DeltaSearch)*
O69 - SBI: prefs.js [Marine - 6wxelu2c.default] user_pref("extensions.delta.aflt", "babsst srcExt=def"); => Toolbar.DeltaSearch)*
O69 - SBI: prefs.js [Marine - 6wxelu2c.default] user_pref("extensions.delta.appId", "{C26644C4-2A12-4CA6-8F2E-0EDE6CF018F3}"); => Toolbar.DeltaSearch)*
O69 - SBI: prefs.js [Marine - 6wxelu2c.default] user_pref("extensions.delta.autoRvrt", "false"); => Toolbar.DeltaSearch)*
O69 - SBI: prefs.js [Marine - 6wxelu2c.default] user_pref("extensions.delta.dfltLng", "fr"); => Toolbar.DeltaSearch)*
O69 - SBI: prefs.js [Marine - 6wxelu2c.default] user_pref("extensions.delta.excTlbr", false); => Toolbar.DeltaSearch)*
O69 - SBI: prefs.js [Marine - 6wxelu2c.default] user_pref("extensions.delta.ffxUnstlRst", true); => Toolbar.DeltaSearch)*
O69 - SBI: prefs.js [Marine - 6wxelu2c.default] user_pref("extensions.delta.id", "70f7ea830000000000002016d81d791a"); => Toolbar.DeltaSearch)*
O69 - SBI: prefs.js [Marine - 6wxelu2c.default] user_pref("extensions.delta.instlDay", "15880"); => Toolbar.DeltaSearch)*
O69 - SBI: prefs.js [Marine - 6wxelu2c.default] user_pref("extensions.delta.instlRef", "sst"); => Toolbar.DeltaSearch)*
O69 - SBI: prefs.js [Marine - 6wxelu2c.default] user_pref("extensions.delta.newTab", false); => Toolbar.DeltaSearch)*
O69 - SBI: prefs.js [Marine - 6wxelu2c.default] user_pref("extensions.delta.prdct", "delta"); => Toolbar.DeltaSearch)*
O69 - SBI: prefs.js [Marine - 6wxelu2c.default] user_pref("extensions.delta.prtnrId", "delta"); => Toolbar.DeltaSearch)*
O69 - SBI: prefs.js [Marine - 6wxelu2c.default] user_pref("extensions.delta.rvrt", "false"); => Toolbar.DeltaSearch)*
O69 - SBI: prefs.js [Marine - 6wxelu2c.default] user_pref("extensions.delta.smplGrp", "none"); => Toolbar.DeltaSearch)*
O69 - SBI: prefs.js [Marine - 6wxelu2c.default] user_pref("extensions.delta.tlbrId", "base"); => Toolbar.DeltaSearch)*
O69 - SBI: prefs.js [Marine - 6wxelu2c.default] user_pref("extensions.delta.tlbrSrchUrl", ""); => Toolbar.DeltaSearch)*
O69 - SBI: prefs.js [Marine - 6wxelu2c.default] user_pref("extensions.delta.vrsn", "1.8.21.5"); => Toolbar.DeltaSearch)*
O69 - SBI: prefs.js [Marine - 6wxelu2c.default] user_pref("extensions.delta.vrsnTs", "1.8.21.523:08:48"); => Toolbar.DeltaSearch)*
O69 - SBI: prefs.js [Marine - 6wxelu2c.default] user_pref("extensions.delta.vrsni", "1.8.21.5"); => Toolbar.DeltaSearch)*
O69 - SBI: prefs.js [Marine - 6wxelu2c.default] user_pref("extensions.delta_i.babExt", ""); => Toolbar.DeltaSearch)*
O69 - SBI: prefs.js [Marine - 6wxelu2c.default] user_pref("extensions.delta_i.babTrack", "affID=119549&tsp=4923"); => Toolbar.DeltaSearch)*
O69 - SBI: prefs.js [Marine - 6wxelu2c.default] user_pref("extensions.delta_i.srcExt", ""); => Toolbar.DeltaSearch)*
O69 - SBI: SearchScopes [HKCU] {0ECDF796-C2DC-4d79-A620-CCE0C0A66CC9} - (Delta Search) - http://www.delta-search.com =>Toolbar.DeltaSearch
O69 - SBI: SearchScopes [HKCU] {2D034770-18BF-44A7-9C6D-C9CAB0B27BA2} - (Ask Search) - http://websearch.ask.com =>Toolbar.Ask
[HKLM\Software\Google\Chrome\Extensions\aaaaojmikegpiepcfdkkjaplodkpfmlo] =>Toolbar.Ask^
[HKLM\Software\Classes\AppID\{C26644C4-2A12-4CA6-8F2E-0EDE6CF018F3}] =>Toolbar.DeltaSearch
[HKLM\Software\Wow6432Node\Classes\AppID\{C26644C4-2A12-4CA6-8F2E-0EDE6CF018F3}] =>Toolbar.DeltaSearch
C:\Users\Marine\AppData\Local\Google\Chrome\User Data\Default\Extensions\aaaaojmikegpiepcfdkkjaplodkpfmlo =>Toolbar.Ask^


Lignes superflues ou inutiles
O4 - GS\Program [Public]: Desktop.lnk - Clé orpheline => Orphean Key not necessary
O45 - LFCP:[MD5.7EBD3064A8AC4B91DE85CED419ACF82B] - 10/03/2014 - 00:37:49 ---A- - C:\Windows\Prefetch\_IU14D2N.TMP-30AD62A0.pf => Fichier du dossier Prefetcher
O45 - LFCP:[MD5.88303FD86D7B892A8A264D7C9EEFD507] - 10/03/2014 - 00:39:07 ---A- - C:\Windows\Prefetch\TORCH.EXE-8CC39379.pf => Fichier du dossier Prefetcher
O45 - LFCP:[MD5.496C2C64C364E5E33E0741D29C63F9CD] - 10/03/2014 - 00:45:16 ---A- - C:\Windows\Prefetch\ITOUCH-SERVER-WIN.EXE-374F8004.pf => Fichier du dossier Prefetcher
O45 - LFCP:[MD5.576CDF6E554D81459865A540E519C820] - 10/03/2014 - 01:09:19 ---A- - C:\Windows\Prefetch\PHOTOSAPP.EXE-8FE95EC8.pf => Fichier du dossier Prefetcher
O45 - LFCP:[MD5.89D16FC03A6C4DA82B3B66E7DC5F046D] - 16/03/2014 - 10:31:37 ---A- - C:\Windows\Prefetch\dynreservedpri.db => Fichier du dossier Prefetcher
O45 - LFCP:[MD5.E446E5F85926EDA37FDF0D0BBE2334FC] - 16/03/2014 - 17:22:10 ---A- - C:\Windows\Prefetch\INSTUP.EXE-F70AF890.pf => Fichier du dossier Prefetcher
O45 - LFCP:[MD5.D314C0E0C3A24C4FB94C946BC564BA0F] - 16/03/2014 - 19:33:11 ---A- - C:\Windows\Prefetch\PfPre_0fcf9791.db => Fichier du dossier Prefetcher
O45 - LFCP:[MD5.628C15348F479D3A585D4ABC2FCCCE0D] - 27/02/2014 - 17:15:21 ---A- - C:\Windows\Prefetch\IEXPLOREINSTALLER.EXE-282FF61C.pf => Fichier du dossier Prefetcher
O45 - LFCP:[MD5.4D0011932513026D77DEA1A26F4FEE2F] - 27/02/2014 - 17:48:55 ---A- - C:\Windows\Prefetch\INTERNET EXPLORER SETTINGS.EX-D0883BE0.pf => Fichier du dossier Prefetcher
O45 - LFCP:[MD5.38B2FAC3C39849F22EE1835D32F62899] - 27/02/2014 - 18:10:46 ---A- - C:\Windows\Prefetch\FONTVIEW.EXE-FAED34E4.pf => Fichier du dossier Prefetcher
O45 - LFCP:[MD5.1B7C7A2F30B5F0651FEA162CE24C78D1] - 27/02/2014 - 22:56:57 ---A- - C:\Windows\Prefetch\PREDM.TMP-D837B5D1.pf => Fichier du dossier Prefetcher
O45 - LFCP:[MD5.4E0667ADD9BF16B0837889FE58BB7A51] - 27/02/2014 - 22:57:09 ---A- - C:\Windows\Prefetch\DDRAGON.TMP-411BD5B6.pf => Fichier du dossier Prefetcher
O45 - LFCP:[MD5.58D7C28BA2297EE80F588CC26717733B] - 27/02/2014 - 22:57:28 ---A- - C:\Windows\Prefetch\PACKAGE_DDRAGON_INSTALLER_MUL-56105655.pf => Fichier du dossier Prefetcher

Lignes d'optimisation du démarrage
OPT:O4 - HKLM\..\Wow6432Node\Run: [iTunesHelper] . (.Apple Inc. - iTunesHelper.) -- C:\Program Files (x86)\iTunes\iTunesHelper.exe
OPT:SR - | Auto 30/08/2011 462184 | (Bonjour Service) . (.Apple Inc..) - C:\Program Files\Bonjour\mDNSResponder.exe

Publicité


Signaler le contenu de ce document

Publicité