Il y a actuellement 295 visiteurs
Jeudi 28 Mars 2024
accueilactualitésdossierscomparer les prixtélécharger gratuitement vos logicielsoffres d'emploiforum informatique
Connexion
Créer un compte

page publicitaire qui s'ouvre

Un ordinateur qui ralentit, des écrans publicitaires qui apparaissent, des applications qui refusent de démarrer ou encore votre navigateur qui s'obstine à ouvrir une page douteuse sont autant d'éléments qui indiquent que l'intégrité de votre ordinateur est menacée par un virus. Vous trouverez dans ce forum quelques conseils et logiciels pour surfer tranquillement.
Règles du forum
Pour afficher un rapport d'analyse ou un rapport d'infection (HijackThis, OTL, AdwCleaner etc...)‎, veuillez utiliser le système de fichiers joints interne au forum. Seuls les formats les .txt et .log de moins de 1Mo sont acceptés. Pour obtenir de l'aide pour insérer vos fichiers joints, veuillez consulter ce tutoriel

page publicitaire qui s'ouvre

Message le 14 Nov 2010 23:41

bonsoir

j'ai un probleme d'ordi qui rame et des page de pub qui s'ouvre sans arret ce qui est tres penible, auriez vous une solution a ça.merci d'avance
taz66410
Apprenti(e)
Apprenti(e)
 
Messages: 39
Inscription: 14 Nov 2010 23:21
 


Re: page publicitaire qui s'ouvre

Message le 14 Nov 2010 23:51

Bonjours et bienvenue sur PC infopratique :wink:


Suis cette procédure et dit moi si tu as réussis à tout faire (sauvegarde, scan OTL et....)
preparer-demande-aide-desinfection-vt-54149.html

@++
Avatar de l'utilisateur
jeanmimigab
PC-Infopraticien
PC-Infopraticien
 
Messages: 2986
Inscription: 29 Nov 2009 12:05
 

Re: page publicitaire qui s'ouvre

Message le 15 Nov 2010 00:00

ben pour le moment ca va je suis a l'analyse de otl
taz66410
Apprenti(e)
Apprenti(e)
 
Messages: 39
Inscription: 14 Nov 2010 23:21
 

Re: page publicitaire qui s'ouvre

Message le 15 Nov 2010 00:08

re,
Vu l'instabilité du système, sauvegarde bien tes documents importants et répond bien aux questions de l'étape N°3 :wink:

@++
Avatar de l'utilisateur
jeanmimigab
PC-Infopraticien
PC-Infopraticien
 
Messages: 2986
Inscription: 29 Nov 2009 12:05
 

Re: page publicitaire qui s'ouvre

Message le 15 Nov 2010 00:47

voila le rapport de extras.txt

Code: Tout sélectionner
OTL by OldTimer - Version 3.2.17.3     Folder = C:\Documents and Settings\personne\Mes documents\Téléchargements
Windows XP Professional Edition Service Pack 2 (Version = 5.1.2600) - Type = NTWorkstation
Internet Explorer (Version = 8.0.6001.18702)
Locale: 0000040C | Country: France | Language: FRA | Date Format: dd/MM/yyyy
 
511,00 Mb Total Physical Memory | 34,00 Mb Available Physical Memory | 7,00% Memory free
1,00 Gb Paging File | 1,00 Gb Available in Paging File | 66,00% Paging File free
Paging file location(s): C:\pagefile.sys 768 1536 [binary data]
 
%SystemDrive% = C: | %SystemRoot% = C:\WINDOWS | %ProgramFiles% = C:\Program Files
Drive C: | 74,52 Gb Total Space | 26,26 Gb Free Space | 35,24% Space Free | Partition Type: NTFS
Drive E: | 298,02 Gb Total Space | 277,51 Gb Free Space | 93,12% Space Free | Partition Type: FAT32
 
Computer Name: PERSONNE-94C4EB | User Name: personne | Logged in as Administrator.
Boot Mode: Normal | Scan Mode: All users
Company Name Whitelist: Off | Skip Microsoft Files: Off | No Company Name Whitelist: On | File Age = 30 Days
 
[color=#E56717]========== Extra Registry (SafeList) ==========[/color]
 
 
[color=#E56717]========== File Associations ==========[/color]
 
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\<extension>]
 
[HKEY_USERS\S-1-5-21-854245398-1078081533-1801674531-1003\SOFTWARE\Classes\<extension>]
.html [@ = htmlfile] -- Reg Error: Key error. File not found
 
[color=#E56717]========== Shell Spawning ==========[/color]
 
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\<key>\shell\[command]\command]
batfile [open] -- "%1" %*
cmdfile [open] -- "%1" %*
comfile [open] -- "%1" %*
exefile [open] -- "%1" %*
htmlfile [edit] -- Reg Error: Key error.
piffile [open] -- "%1" %*
regfile [merge] -- Reg Error: Key error.
scrfile [config] -- "%1"
scrfile [install] -- rundll32.exe desk.cpl,InstallScreenSaver %l (Microsoft Corporation)
scrfile [open] -- "%1" /S
txtfile [edit] -- Reg Error: Key error.
Unknown [openas] -- %SystemRoot%\system32\rundll32.exe %SystemRoot%\system32\shell32.dll,OpenAs_RunDLL %1
Directory [find] -- %SystemRoot%\Explorer.exe (Microsoft Corporation)
Folder [open] -- %SystemRoot%\Explorer.exe /idlist,%I,%L (Microsoft Corporation)
Folder [explore] -- %SystemRoot%\Explorer.exe /e,/idlist,%I,%L (Microsoft Corporation)
Drive [find] -- %SystemRoot%\Explorer.exe (Microsoft Corporation)
 
[color=#E56717]========== Security Center Settings ==========[/color]
 
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center]
"FirstRunDisabled" = 1
"AntiVirusDisableNotify" = 0
"FirewallDisableNotify" = 0
"UpdatesDisableNotify" = 0
"AntiVirusOverride" = 0
"FirewallOverride" = 0
 
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Monitoring]
 
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Monitoring\AhnlabAntiVirus]
 
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Monitoring\ComputerAssociatesAntiVirus]
 
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Monitoring\KasperskyAntiVirus]
 
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Monitoring\McAfeeAntiVirus]
 
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Monitoring\McAfeeFirewall]
 
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Monitoring\PandaAntiVirus]
 
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Monitoring\PandaFirewall]
 
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Monitoring\SophosAntiVirus]
 
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Monitoring\SymantecAntiVirus]
 
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Monitoring\SymantecFirewall]
 
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Monitoring\TinyFirewall]
 
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Monitoring\TrendAntiVirus]
 
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Monitoring\TrendFirewall]
 
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Monitoring\ZoneLabsFirewall]
 
[color=#E56717]========== System Restore Settings ==========[/color]
 
[HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows NT\SystemRestore]
 
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SystemRestore]
"DisableSR" = 0
 
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Sr]
"Start" = 0
 
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SrService]
"Start" = 2
 
[color=#E56717]========== Firewall Settings ==========[/color]
 
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\DomainProfile]
 
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile]
"EnableFirewall" = 1
"DoNotAllowExceptions" = 0
"DisableNotifications" = 0
 
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\GloballyOpenPorts\List]
"1900:UDP" = 1900:UDP:LocalSubNet:Enabled:@xpsp2res.dll,-22007
"2869:TCP" = 2869:TCP:LocalSubNet:Enabled:@xpsp2res.dll,-22008
"139:TCP" = 139:TCP:LocalSubNet:Disabled:@xpsp2res.dll,-22004
"445:TCP" = 445:TCP:LocalSubNet:Disabled:@xpsp2res.dll,-22005
"137:UDP" = 137:UDP:LocalSubNet:Disabled:@xpsp2res.dll,-22001
"138:UDP" = 138:UDP:LocalSubNet:Disabled:@xpsp2res.dll,-22002
 
[color=#E56717]========== Authorized Applications List ==========[/color]
 
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\DomainProfile\AuthorizedApplications\List]
"%windir%\system32\sessmgr.exe" = %windir%\system32\sessmgr.exe:*:enabled:@xpsp2res.dll,-22019 -- (Microsoft Corporation)
"%windir%\Network Diagnostic\xpnetdiag.exe" = %windir%\Network Diagnostic\xpnetdiag.exe:*:Enabled:@xpsp3res.dll,-20000 -- (Microsoft Corporation)
"C:\Program Files\Lexmark 3500-4500 Series\app4r.exe" = C:\Program Files\Lexmark 3500-4500 Series\App4R.exe:*:Enabled:Lexmark Imaging Studio -- ()
"C:\Program Files\Windows Live\Sync\WindowsLiveSync.exe" = C:\Program Files\Windows Live\Sync\WindowsLiveSync.exe:*:Enabled:Windows Live FolderShare -- (Microsoft Corporation)
"C:\Program Files\Windows Live\Messenger\wlcsdk.exe" = C:\Program Files\Windows Live\Messenger\wlcsdk.exe:*:Enabled:Windows Live Call -- (Microsoft Corporation)
"C:\Program Files\Windows Live\Messenger\msnmsgr.exe" = C:\Program Files\Windows Live\Messenger\msnmsgr.exe:*:Enabled:Windows Live Messenger -- (Microsoft Corporation)
 
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List]
"%windir%\system32\sessmgr.exe" = %windir%\system32\sessmgr.exe:*:enabled:@xpsp2res.dll,-22019 -- (Microsoft Corporation)
"C:\Program Files\Messenger\msmsgs.exe" = C:\Program Files\Messenger\msmsgs.exe:*:Enabled:Windows Messenger -- (Microsoft Corporation)
"%windir%\Network Diagnostic\xpnetdiag.exe" = %windir%\Network Diagnostic\xpnetdiag.exe:*:Enabled:@xpsp3res.dll,-20000 -- (Microsoft Corporation)
"C:\Program Files\Metin2_France\metin2.bin" = C:\Program Files\Metin2_France\metin2.bin:*:Enabled:metin2 -- ()
"C:\Program Files\eMule\emule.exe" = C:\Program Files\eMule\emule.exe:*:Disabled:eMule -- File not found
"C:\WINDOWS\system32\lxdicoms.exe" = C:\WINDOWS\system32\lxdicoms.exe:*:Enabled:Lexmark Communications System -- ( )
"C:\Program Files\Lexmark 3500-4500 Series\lxdiamon.exe" = C:\Program Files\Lexmark 3500-4500 Series\lxdiamon.exe:*:Enabled:Lexmark Device Monitor -- ()
"C:\Program Files\Lexmark 3500-4500 Series\App4R.exe" = C:\Program Files\Lexmark 3500-4500 Series\App4R.exe:*:Enabled:Lexmark Imaging Studio -- ()
"C:\Program Files\Lexmark 3500-4500 Series\lxdimon.exe" = C:\Program Files\Lexmark 3500-4500 Series\lxdimon.exe:*:Enabled:Device Monitor -- ()
"C:\WINDOWS\system32\spool\drivers\w32x86\3\lxdipswx.exe" = C:\WINDOWS\system32\spool\drivers\w32x86\3\lxdipswx.exe:*:Enabled:Printer Status Window Interface -- ()
"C:\WINDOWS\system32\spool\drivers\w32x86\3\lxditime.exe" = C:\WINDOWS\system32\spool\drivers\w32x86\3\lxditime.exe:*:Enabled:Lexmark Connect Time Executable -- (Lexmark International, Inc.)
"C:\WINDOWS\system32\spool\drivers\w32x86\3\lxdijswx.exe" = C:\WINDOWS\system32\spool\drivers\w32x86\3\lxdijswx.exe:*:Enabled:Job Status Window Interface -- ()
"C:\WINDOWS\system32\spool\drivers\w32x86\3\lxdiwbgw.exe" = C:\WINDOWS\system32\spool\drivers\w32x86\3\lxdiwbgw.exe:*:Enabled:Lexmark Web Gateway -- ()
"C:\Program Files\Epson Software\Event Manager\EEventManager.exe" = C:\Program Files\Epson Software\Event Manager\EEventManager.exe:*:Disabled:EEventManager Application -- (SEIKO EPSON CORPORATION)
"C:\Program Files\Windows Live\Sync\WindowsLiveSync.exe" = C:\Program Files\Windows Live\Sync\WindowsLiveSync.exe:*:Enabled:Windows Live FolderShare -- (Microsoft Corporation)
"C:\Program Files\Windows Live\Messenger\wlcsdk.exe" = C:\Program Files\Windows Live\Messenger\wlcsdk.exe:*:Enabled:Windows Live Call -- (Microsoft Corporation)
"C:\Program Files\Windows Live\Messenger\msnmsgr.exe" = C:\Program Files\Windows Live\Messenger\msnmsgr.exe:*:Enabled:Windows Live Messenger -- (Microsoft Corporation)
 
 
[color=#E56717]========== HKEY_LOCAL_MACHINE Uninstall List ==========[/color]
 
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall]
"{0BEDBD4E-2D34-47B5-9973-57E62B29307C}" = ATI Control Panel
"{133742BA-6F46-4D3E-85AF-78631D9AD8B8}" = Installation Windows Live
"{18455581-E099-4BA8-BC6B-F34B2F06600C}" = Google Toolbar for Internet Explorer
"{1EE04769-91C4-4A06-92B7-FCAFE6BABDD9}" = Galerie de photos Windows Live
"{205C6BDD-7B73-42DE-8505-9A093F35A238}" = Outil de téléchargement Windows Live
"{22B775E7-6C42-4FC5-8E10-9A5E3257BD94}" = MSVCRT
"{2318C2B1-4965-11d4-9B18-009027A5CD4F}" = Google Toolbar for Internet Explorer
"{3175E049-F9A9-4A3D-8F19-AC9FB04514D1}" = Windows Live Communications Platform
"{350C940c-3D7C-4EE8-BAA9-00BCB3D54227}" = WebFldrs XP
"{35725FBC-A136-4A46-9F29-091759D9BB93}" = MVision
"{445B183D-F4F1-45C8-B9DB-F11355CA657B}" = Windows Live Messenger
"{4634B21A-CC07-4396-890C-2B8168661FEA}" = Windows Live Writer
"{48F22622-1CC2-4A83-9C1E-644DD96F832D}" = Epson Event Manager
"{4A03706F-666A-4037-7777-5F2748764D10}" = Java Auto Updater
"{4CBA3D4C-8F51-4D60-B27E-F6B641C571E7}" = Microsoft Search Enhancement Pack
"{5CA72DC6-1043-4BDA-A128-C18200FF7ABA}" = Hama WLAN USB Stick
"{5DD76286-9BE7-4894-A990-E905E91AC818}" = Windows Live Mail
"{76810709-A7D3-468D-9167-A1780C1E766C}" = Windows Live FolderShare
"{7F14F68C-17FA-4F88-B3FD-7F449C1EBF32}" = EPSON Web-To-Page
"{82C36957-D2B8-4EF2-B88C-5FA03AA848C7-111382320}" = Luxor Mahjong
"{82C36957-D2B8-4EF2-B88C-5FA03AA848C7-113772953}" = Amazing Adventures The Lost Tomb
"{82C36957-D2B8-4EF2-B88C-5FA03AA848C7-113773360}" = Janes Hotel
"{82C36957-D2B8-4EF2-B88C-5FA03AA848C7-115214367}" = Ranch Rush
"{82C36957-D2B8-4EF2-B88C-5FA03AA848C7-115269747}" = Lettriq
"{82C36957-D2B8-4EF2-B88C-5FA03AA848C7-11531173}" = Farm Frenzy 2
"{82C36957-D2B8-4EF2-B88C-5FA03AA848C7-115430860}" = Amazing Adventures Around The World
"{82C36957-D2B8-4EF2-B88C-5FA03AA848C7-116401400}" = Burger Island 2
"{82C36957-D2B8-4EF2-B88C-5FA03AA848C7-116517443}" = Youda Farmer
"{82C36957-D2B8-4EF2-B88C-5FA03AA848C7-116609607}" = Undiscovered World The Incan Sun
"{82C36957-D2B8-4EF2-B88C-5FA03AA848C7-117099970}" = Youda Marina
"{82C36957-D2B8-4EF2-B88C-5FA03AA848C7-117378200}" = Youda Legend The Curse of the Amsterdam Diamond
"{82C36957-D2B8-4EF2-B88C-5FA03AA848C7-117485130}" = Mystery PI Lost In Los Angeles
"{82C36957-D2B8-4EF2-B88C-5FA03AA848C7-117664753}" = Nat Geo Lost City of Z
"{82C36957-D2B8-4EF2-B88C-5FA03AA848C7-117700587}" = Superior Save
"{82C36957-D2B8-4EF2-B88C-5FA03AA848C7-117701833}" = Cake Mania Main Street
"{82C36957-D2B8-4EF2-B88C-5FA03AA848C7-117703647}" = Aztec Tribe
"{82C36957-D2B8-4EF2-B88C-5FA03AA848C7-117778147}" = Romance of Rome
"{82C36957-D2B8-4EF2-B88C-5FA03AA848C7-117890193}" = Gardenscapes
"{82C36957-D2B8-4EF2-B88C-5FA03AA848C7-117919850}" = Coconut Queen
"{82C36957-D2B8-4EF2-B88C-5FA03AA848C7-117929370}" = Big City Adventure New York City
"{82C36957-D2B8-4EF2-B88C-5FA03AA848C7-117937340}" = Big City Adventure Bundle - 2 in 1
"{82C36957-D2B8-4EF2-B88C-5FA03AA848C7-117968890}" = Treasures of Montezuma 2
"{82C36957-D2B8-4EF2-B88C-5FA03AA848C7-118181480}" = Romantic Discoveries Bundle - 3 in 1
"{82C36957-D2B8-4EF2-B88C-5FA03AA848C7-118206773}" = 1001 Nights The Adventures of Sindbad
"{82C36957-D2B8-4EF2-B88C-5FA03AA848C7-118207953}" = Million Dollar Quest
"{82C36957-D2B8-4EF2-B88C-5FA03AA848C7-118227563}" = Haunted Hotel
"{82C36957-D2B8-4EF2-B88C-5FA03AA848C7-118266520}" = Fiona Finch And Finest Flowers
"{82C36957-D2B8-4EF2-B88C-5FA03AA848C7-118268417}" = Cake Shop 2
"{82C36957-D2B8-4EF2-B88C-5FA03AA848C7-118269867}" = Treasure Seekers Visions Of Gold
"{82C36957-D2B8-4EF2-B88C-5FA03AA848C7-118274990}" = Nora Roberts - Vision In White
"{82C36957-D2B8-4EF2-B88C-5FA03AA848C7-118289850}" = The Cradle Bundle
"{82C36957-D2B8-4EF2-B88C-5FA03AA848C7-118336810}" = Escape From Lost Island
"{82C36957-D2B8-4EF2-B88C-5FA03AA848C7-118342887}" = The Clumsys 2
"{82C36957-D2B8-4EF2-B88C-5FA03AA848C7-118382203}" = Mahjongg dimensions
"{82C36957-D2B8-4EF2-B88C-5FA03AA848C7-118392197}" = Pacman
"{82C36957-D2B8-4EF2-B88C-5FA03AA848C7-118399487}" = Farm Frenzy 3 Ice Age
"{82C36957-D2B8-4EF2-B88C-5FA03AA848C7-118422513}" = Potion Bar
"{82C36957-D2B8-4EF2-B88C-5FA03AA848C7-118429290}" = Dream Day Wedding Bella Italia
"{82C36957-D2B8-4EF2-B88C-5FA03AA848C7-118448993}" = Settlement Colossus
"{82C36957-D2B8-4EF2-B88C-5FA03AA848C7-118451570}" = 3 Days Zoo Mystery
"{82C36957-D2B8-4EF2-B88C-5FA03AA848C7-118467603}" = Farm Mania 2
"{82C36957-D2B8-4EF2-B88C-5FA03AA848C7-11847863}" = Farm Mania
"{82C36957-D2B8-4EF2-B88C-5FA03AA848C7-118485850}" = Treasure Seekers 2
"{82C36957-D2B8-4EF2-B88C-5FA03AA848C7-118503620}" = Mind’s Eye The Secrets Of Forgotten
"{82C36957-D2B8-4EF2-B88C-5FA03AA848C7-118510450}" = Nick Chase A Detective Story
"{82C36957-D2B8-4EF2-B88C-5FA03AA848C7-118514767}" = Youda Fairy
"{82C36957-D2B8-4EF2-B88C-5FA03AA848C7-118517973}" = Goodie Bag Bundle - 3 in 1
"{82C36957-D2B8-4EF2-B88C-5FA03AA848C7-11852670}" = Chicken Invaders 3 Easter
"{82C36957-D2B8-4EF2-B88C-5FA03AA848C7-118528543}" = Cassandra Journey Legacy
"{82C36957-D2B8-4EF2-B88C-5FA03AA848C7-118532140}" = Heartwild Solitaire Book Two
"{82C36957-D2B8-4EF2-B88C-5FA03AA848C7-118735100}" = Captain Space Bunny
"{82C36957-D2B8-4EF2-B88C-5FA03AA848C7-118753180}" = Agatha Christie Bundle - 3 in 1
"{82C36957-D2B8-4EF2-B88C-5FA03AA848C7-11877750}" = Foodie Fun Bundle – 5 in 1
"{82C36957-D2B8-4EF2-B88C-5FA03AA848C7-118787317}" = Vampire Saga - Pandoras Box
"{82C36957-D2B8-4EF2-B88C-5FA03AA848C7-118808493}" = Awakening The Dreamless Castle
"{82C36957-D2B8-4EF2-B88C-5FA03AA848C7-11886233}" = Farm Frenzy 3 Russian Roulette
"{82C36957-D2B8-4EF2-B88C-5FA03AA848C7-118863423}" = Oriental Dreams
"{82C36957-D2B8-4EF2-B88C-5FA03AA848C7-118868873}" = Ashtons Family Resort
"{82C36957-D2B8-4EF2-B88C-5FA03AA848C7-118877613}" = Nick Chase Deadly Diamond
"{82C36957-D2B8-4EF2-B88C-5FA03AA848C7-118891640}" = Ranch Rush 2
"{82C36957-D2B8-4EF2-B88C-5FA03AA848C7-118894440}" = Gwen The Magic Nanny
"{82C36957-D2B8-4EF2-B88C-5FA03AA848C7-118896530}" = Agatha Christie 4.50 from Paddington
"{82C36957-D2B8-4EF2-B88C-5FA03AA848C7-118901183}" = Escape The Lost Kingdom
"{82C36957-D2B8-4EF2-B88C-5FA03AA848C7-118909700}" = Dress Up Rush
"{82C36957-D2B8-4EF2-B88C-5FA03AA848C7-118911610}" = Spirit of Wandering The Legend
"{82C36957-D2B8-4EF2-B88C-5FA03AA848C7-118929827}" = Farm Craft 2
"{82C36957-D2B8-4EF2-B88C-5FA03AA848C7-11894573}" = Janes Realty
"{82C36957-D2B8-4EF2-B88C-5FA03AA848C7-11900997}" = Secret Mission Forgotten Island
"{82C36957-D2B8-4EF2-B88C-5FA03AA848C7-119023503}" = Soccer Cup Solitaire
"{82C36957-D2B8-4EF2-B88C-5FA03AA848C7-119041943}" = World Mosaics 3 Fairy Tales
"{82C36957-D2B8-4EF2-B88C-5FA03AA848C7-119049160}" = Cake Mania - Lights Camera Action
"{82C36957-D2B8-4EF2-B88C-5FA03AA848C7-119127740}" = Age Of Japan 2
"{82C36957-D2B8-4EF2-B88C-5FA03AA848C7-119164883}" = Sultan’s Labyrinth
"{82C36957-D2B8-4EF2-B88C-5FA03AA848C7-119165733}" = The Fifth Gate
"{82C36957-D2B8-4EF2-B88C-5FA03AA848C7-119193147}" = Dark Tales Edgar Allan Poe
"{87C2248A-C7DD-49ED-9BCD-B312A9D0819E}" = Epson Easy Photo Print 2
"{89F4137D-6C26-4A84-BDB8-2E5A4BB71E00}" = Microsoft Silverlight
"{8E5233E1-7495-44FB-8DEB-4BE906D59619}" = Junk Mail filter update
"{95120000-00B9-0409-0000-0000000FF1CE}" = Microsoft Application Error Reporting
"{995BF1A7-30E5-49E5-A0E4-AD3213D9E330}" = Labtec WebCam
"{9D6524E6-15CF-4852-BF70-04FE973A3DE1}" = Windows Live Toolbar
"{A1F66FC9-11EE-4F2F-98C9-16F8D1E69FB7}" = Segoe UI
"{A2BCA9F1-566C-4805-97D1-7FDC93386723}" = Adobe AIR
"{A3051CD0-2F64-3813-A88D-B8DCCDE8F8C7}" = Microsoft .NET Framework 3.0 Service Pack 2
"{AC76BA86-7AD7-1036-7B44-A91000000001}" = Adobe Reader 9.1 - Français
"{ACF60000-22B9-4CE9-98D6-2CCF359BAC07}" = ABBYY FineReader 6.0 Sprint
"{B3B487E7-6171-4376-9074-B28082CEB504}" = Windows Live Call
"{BD64AF4A-8C80-4152-AD77-FCDDF05208AB}" = Microsoft Sync Framework Services Native v1.0 (x86)
"{BEF726DD-4037-4214-8C6A-E625C02D2870}" = Logitech Audio Echo Cancellation Component
"{C09FB3CD-3D0C-3F2D-899A-6A1D67F2073F}" = Microsoft .NET Framework 2.0 Service Pack 2
"{CE2CDD62-0124-36CA-84D3-9F4DCF5C5BD9}" = Microsoft .NET Framework 3.5 SP1
"{D13FE823-C575-4451-AC37-E645A67AA581}_1.2.1.0" = Orange Installeur version 1.2.1.0
"{D3116CC7-24DC-4CA3-9CE1-23FED836E9F2}" = Assistant de connexion Windows Live
"{E91E8912-769D-42F0-8408-0E329443BABC}" = Hama Wireless LAN Adapter
"{EA516024-D84D-41F1-814F-83175A6188F2}" = Logitech Video Enumerator
"{F0B430D1-B6AA-473D-9B06-AA3DD01FD0B8}" = Microsoft SQL Server 2005 Compact Edition [ENU]
"{F0E12BBA-AD66-4022-A453-A1C8A0C4D570}" = Microsoft Choice Guard
"{F333A33D-125C-32A2-8DCE-5C5D14231E27}" = Visual C++ 2008 x86 Runtime - (v9.0.30729)
"{F333A33D-125C-32A2-8DCE-5C5D14231E27}.vc_x86runtime_30729_01" = Visual C++ 2008 x86 Runtime - v9.0.30729.01
"{FB08F381-6533-4108-B7DD-039E11FBC27E}" = Avance AC'97 Audio
"3D Petanque Unlimited Shareware" = 3D Petanque Unlimited Shareware (Désinstaller)
"Adobe AIR" = Adobe AIR
"Adobe Flash Player ActiveX" = Adobe Flash Player 10 ActiveX
"Adobe Shockwave Player" = Adobe Shockwave Player 11
"ALCATEL PC Suite_is1" = ALCATEL PC Suite V6.3.18
"ATI Display Driver" = ATI Display Driver
"conduitEngine" = Conduit Engine
"DofusArena 2.30.2" = DofusArena 2.30.2
"Eazel-FR Toolbar" = Eazel-FR Toolbar
"EPSON Scanner" = EPSON Scan
"Epson Stylus SX110_TX110 Guide d'utilisation" = Epson Stylus SX110_TX110 Manuel
"EPSON SX110 Series" = EPSON SX110 Series Printer Uninstall
"GAMEFORGE Nostale(FR)_is1" = Nostale Online FR (Remove)
"GamesBar" = GamesBar 2.0.1.12
"IDNMitigationAPIs" = Microsoft Internationalized Domain Names Mitigation APIs
"ie7" = Windows Internet Explorer 7
"ie8" = Windows Internet Explorer 8
"Lexmark 3500-4500 Series" = Lexmark 3500-4500 Series
"McAfee Security Scan" = McAfee Security Scan Plus
"Microsoft .NET Framework 3.5 SP1" = Microsoft .NET Framework 3.5 SP1
"Mozilla Firefox (3.6.12)" = Mozilla Firefox (3.6.12)
"MSNINST" = MSN
"myBabylon_English Toolbar" = myBabylon_English Toolbar
"NLSDownlevelMapping" = Microsoft National Language Support Downlevel APIs
"OrangeToolbarFR" = barre d'outils Orange
"Picasa 3" = Picasa 3
"PrintMaster Gold 4.03" = PrintMaster Gold 4.03
"QcDrv" = Programme de gestion Camera de Labtec®
"SFR_Kit" = SFR - Kit de connexion
"ShockwaveFlash" = Macromedia Flash Player 8
"Softonic_France Toolbar" = Softonic_France Toolbar
"Usbfix" = UsbFix By El Desaparecido & C_XX
"uvuvcelk" = Favorit
"WIC" = Windows Imaging Component
"WinGimp-2.0_is1" = GIMP 2.6.6
"WinLiveSuite_Wave3" = Installation Windows Live
 
[color=#E56717]========== HKEY_USERS Uninstall List ==========[/color]
 
[HKEY_USERS\S-1-5-21-854245398-1078081533-1801674531-1003\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall]
"Notification de cadeaux MSN" = Notification de cadeaux MSN
"Orange Inside" = Orange Inside
 
[color=#E56717]========== Last 10 Event Log Errors ==========[/color]
 
[ Application Events ]
Error - 11/11/2010 08:34:08 | Computer Name = PERSONNE-94C4EB | Source = Application Error | ID = 1000
Description = Application défaillante wlcomm.exe, version 14.0.8117.416, module
défaillant mgking1.dll, version 0.0.0.0, adresse de défaillance 0x00081ec6.
 
Error - 11/11/2010 13:18:40 | Computer Name = PERSONNE-94C4EB | Source = Application Error | ID = 1000
Description = Application défaillante wlcomm.exe, version 14.0.8117.416, module
défaillant mgking1.dll, version 0.0.0.0, adresse de défaillance 0x00081ec6.
 
Error - 13/11/2010 17:07:01 | Computer Name = PERSONNE-94C4EB | Source = crypt32 | ID = 131080
Description = Échec de la récupération de la mise à jour automatique du numéro de
 séquence de la liste racine tierce partie à partir de : <http://www.download.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootseq.txt>
 avec l'erreur : The server name or address could not be resolved 
 
Error - 13/11/2010 17:07:01 | Computer Name = PERSONNE-94C4EB | Source = crypt32 | ID = 131080
Description = Échec de la récupération de la mise à jour automatique du numéro de
 séquence de la liste racine tierce partie à partir de : <http://www.download.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootseq.txt>
 avec l'erreur : Cette connexion réseau n'existe pas. 
 
Error - 13/11/2010 17:07:01 | Computer Name = PERSONNE-94C4EB | Source = crypt32 | ID = 131080
Description = Échec de la récupération de la mise à jour automatique du numéro de
 séquence de la liste racine tierce partie à partir de : <http://www.download.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootseq.txt>
 avec l'erreur : Cette connexion réseau n'existe pas. 
 
Error - 13/11/2010 17:07:01 | Computer Name = PERSONNE-94C4EB | Source = crypt32 | ID = 131080
Description = Échec de la récupération de la mise à jour automatique du numéro de
 séquence de la liste racine tierce partie à partir de : <http://www.download.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootseq.txt>
 avec l'erreur : Cette connexion réseau n'existe pas. 
 
Error - 13/11/2010 17:07:02 | Computer Name = PERSONNE-94C4EB | Source = crypt32 | ID = 131080
Description = Échec de la récupération de la mise à jour automatique du numéro de
 séquence de la liste racine tierce partie à partir de : <http://www.download.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootseq.txt>
 avec l'erreur : Cette connexion réseau n'existe pas. 
 
Error - 13/11/2010 17:07:02 | Computer Name = PERSONNE-94C4EB | Source = crypt32 | ID = 131080
Description = Échec de la récupération de la mise à jour automatique du numéro de
 séquence de la liste racine tierce partie à partir de : <http://www.download.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootseq.txt>
 avec l'erreur : Cette connexion réseau n'existe pas. 
 
Error - 14/11/2010 06:09:04 | Computer Name = PERSONNE-94C4EB | Source = Application Error | ID = 1000
Description = Application défaillante wlcomm.exe, version 14.0.8117.416, module
défaillant mgking0.dll, version 0.0.0.0, adresse de défaillance 0x00081ec6.
 
Error - 14/11/2010 13:35:12 | Computer Name = PERSONNE-94C4EB | Source = Application Hang | ID = 1002
Description = Application bloquée msnmsgr.exe, version 14.0.8117.416, module bloqué
 hungapp, version 0.0.0.0, adresse de blocage 0x00000000.
 
[ System Events ]
Error - 12/11/2010 05:58:17 | Computer Name = PERSONNE-94C4EB | Source = Dhcp | ID = 1002
Description = Le bail de l'adresse IP 192.168.1.98 pour la carte réseau dont l'adresse
 réseau est 001060B300BF  a été refusé par le serveur DHCP 192.168.2.1 (celui-ci a
 envoyé un message DHCPNACK).
 
Error - 12/11/2010 06:20:49 | Computer Name = PERSONNE-94C4EB | Source = Dhcp | ID = 1002
Description = Le bail de l'adresse IP 192.168.2.10 pour la carte réseau dont l'adresse
 réseau est 001060B300BF  a été refusé par le serveur DHCP 192.168.2.1 (celui-ci a
 envoyé un message DHCPNACK).
 
Error - 12/11/2010 07:01:31 | Computer Name = PERSONNE-94C4EB | Source = Server | ID = 2505
Description = Le serveur n'a pas pu se lier au transport \Device\NetbiosSmb car
un autre ordinateur du réseau porte le même nom. Le serveur n'a pas pu démarrer.
 
Error - 12/11/2010 07:04:09 | Computer Name = PERSONNE-94C4EB | Source = Server | ID = 2505
Description = Le serveur n'a pas pu se lier au transport \Device\NetBT_Tcpip_{3DA77EF2-BE55-49CB-A17D-863604E19EB5}
 car un autre ordinateur du réseau porte le même nom. Le serveur n'a pas pu démarrer.
 
Error - 12/11/2010 07:12:12 | Computer Name = PERSONNE-94C4EB | Source = ipnathlp | ID = 32003
Description = Le traducteur d'adresses réseau (NAT) n'a pas pu demander une opération
du
 module de traduction en mode noyau.  Ceci peut indiquer une configuration incorrecte,
 des ressources insuffisantes  ou une erreur interne.  La donnée est le code de l'erreur.
 
Error - 12/11/2010 07:12:30 | Computer Name = PERSONNE-94C4EB | Source = ipnathlp | ID = 32003
Description = Le traducteur d'adresses réseau (NAT) n'a pas pu demander une opération
du
 module de traduction en mode noyau.  Ceci peut indiquer une configuration incorrecte,
 des ressources insuffisantes  ou une erreur interne.  La donnée est le code de l'erreur.
 
Error - 12/11/2010 08:00:02 | Computer Name = PERSONNE-94C4EB | Source = ipnathlp | ID = 32003
Description = Le traducteur d'adresses réseau (NAT) n'a pas pu demander une opération
du
 module de traduction en mode noyau.  Ceci peut indiquer une configuration incorrecte,
 des ressources insuffisantes  ou une erreur interne.  La donnée est le code de l'erreur.
 
Error - 12/11/2010 18:53:51 | Computer Name = PERSONNE-94C4EB | Source = DCOM | ID = 10010
Description = Le serveur {B124E104-5A8B-4389-8793-DBDEA0565511} ne s'est pas enregistré
 sur DCOM avant la fin du temps imparti.
 
Error - 13/11/2010 13:12:52 | Computer Name = PERSONNE-94C4EB | Source = Dhcp | ID = 1002
Description = Le bail de l'adresse IP 192.168.1.98 pour la carte réseau dont l'adresse
 réseau est 001060B300BF  a été refusé par le serveur DHCP 192.168.2.1 (celui-ci a
 envoyé un message DHCPNACK).
 
Error - 13/11/2010 18:14:25 | Computer Name = PERSONNE-94C4EB | Source = Dhcp | ID = 1002
Description = Le bail de l'adresse IP 192.168.1.98 pour la carte réseau dont l'adresse
 réseau est 001060B300BF  a été refusé par le serveur DHCP 192.168.2.1 (celui-ci a
 envoyé un message DHCPNACK).
 
 
< End of report >
taz66410
Apprenti(e)
Apprenti(e)
 
Messages: 39
Inscription: 14 Nov 2010 23:21
 

Re: page publicitaire qui s'ouvre

Message le 15 Nov 2010 00:52

je comprend pas le otl.txt ne s'affiche pas sur ce post

alors mon ordi est tres long au demarrage, est rame enormement une fois connecter
je peut ouvrir aucun des msn
ma cle wifi arrete pas de ce connecter et deconnecter depuis hier
j'arrive pas a ouvrir les diaporama, les dossiers qu'on m'envoye par mails

pour mon ordi je ne peut pas vous donner la marque, les ref car c'est ordi d'occas qui je croye a acheter en kit et monter par son ancien proprio.

merci
taz66410
Apprenti(e)
Apprenti(e)
 
Messages: 39
Inscription: 14 Nov 2010 23:21
 

Re: page publicitaire qui s'ouvre

Message le 15 Nov 2010 10:23

hello, :wink:

NOTE: Si ceux ci sont trop long déposez-les surCiJoint.fr et communiquer au helper le lien correspondant à vos rapports afin qu'il puisse les télécharger


@++
Avatar de l'utilisateur
jeanmimigab
PC-Infopraticien
PC-Infopraticien
 
Messages: 2986
Inscription: 29 Nov 2009 12:05
 

Re: page publicitaire qui s'ouvre

Message le 15 Nov 2010 10:53

hello

ok merci, alors voici le liens pour l'otl.txt

http://www.cijoint.fr/cjlink.php?file=c ... XBk830.txt
taz66410
Apprenti(e)
Apprenti(e)
 
Messages: 39
Inscription: 14 Nov 2010 23:21
 

Re: page publicitaire qui s'ouvre

Message le 15 Nov 2010 11:03

tu es bien infecté :-?

je te prépare le script :wink:
Avatar de l'utilisateur
jeanmimigab
PC-Infopraticien
PC-Infopraticien
 
Messages: 2986
Inscription: 29 Nov 2009 12:05
 

Re: page publicitaire qui s'ouvre

Message le 15 Nov 2010 12:32

re,

bon, va falloir arrêter de cliquer n'importe où et d'installer n'importe quoi, j'ai rarement vue aussi infecté que ça, tu n'es pas loin du reccord


* Fais un double-clic sur l'icône d'OTL pour le lancer
/!\ pour Vista/Seven fais un clic-droit sur l'icône d'OTL et choisis "Exécuter en tant qu'administrateur"

* Assure toi d'avoir fermé toutes les applications en court de fonctionnement.

* Quand la fenêtre d'OTL apparaît, assure toi que dans la section "Rapport" (en haut à droite) la case "Rapport minimal" soit cochée.

* Copies et colles le contenue de cette citation dans la partie inférieure d'OTL "Personnalisation"

:Files
C:\Documents and Settings\personne\Local Settings\Application Data\uvuvcelk.exe
C:\WINDOWS\system32\mgking0.dll
C:\Documents and Settings\personne\Local Settings\Temp\cvasds0.dll
C:\WINDOWS\System32\GameMon.des
C:\Documents and Settings\personne\Application Data\Mozilla\Firefox\Profiles\w4ao4bqi.default\extensions\{364d4e0c-543f-4b85-abe3-19551139da4f}
C:\Documents and Settings\personne\Application Data\Mozilla\Firefox\Profiles\w4ao4bqi.default\extensions\{a8f9752d-e2b8-4e7a-86b5-499f4330e2fe}
C:\Program Files\ConduitEngine
C:\Program Files\Softonic_France
C:\Program Files\Eazel-FR
C:\Documents and Settings\personne\Application Data\Mozilla\Firefox\Profiles\w4ao4bqi.default\extensions\OberonGameHost@OberonGames.com
C:\Documents and Settings\personne\Application Data\Mozilla\Firefox\Profiles\w4ao4bqi.default\searchplugins\conduit.xml
C:\Program Files\Mozilla Firefox\searchplugins\babylon.xml
C:\Program Files\GamesBar
C:\Program Files\myBabylon_English
C:\Documents and Settings\personne\Local Settings\Temp\herss.exe
C:\WINDOWS\system32\mgking.exe
c:\documents and settings\personne\local settings\application data\uvuvcelk.exe
E:\AUTORUN.FCB
C:\Documents and Settings\personne\Application Data\stats.txt
C:\Documents and Settings\personne\Local Settings\Application Data\uvuvcelk_nav.dat
C:\Documents and Settings\personne\Local Settings\Application Data\uvuvcelk_navps.dat
C:\Documents and Settings\personne\Local Settings\Application Data\uvuvcelk.dat
C:\Documents and Settings\personne\Local Settings\Application Data\uvuvcelk.exe
C:\Documents and Settings\personne\Local Settings\Application Data\haugbugb.exe
C:\Documents and Settings\personne\Local Settings\Application Data\ykvalw.exe
C:\Documents and Settings\personne\Local Settings\Application Data\dawtjg.exe
C:\Documents and Settings\personne\Local Settings\Application Data\beebcezc_nav.dat
C:\Documents and Settings\personne\Local Settings\Application Data\beebcezc.dat
C:\cbbw88s.exe
C:\dwh.exe
C:\egmjjb.exe
C:\9keibj.exe
C:\b9v.exe
C:\lpl.exe
C:\r3q63rok.exe
C:\9d6resf.exe
C:\jeo3ky.exe
C:\b18eb17aff9e25d692cf
C:\kyme.exe
C:\WINDOWS\System32\mgking1.dll
C:\WINDOWS\_delis32.ini
C:\WINDOWS\System32\MobOlExt.dll
C:\Documents and Settings\All Users\Application Data\GamesBar
C:\Documents and Settings\All Users.WINDOWS\Application Data\Games-Attack
C:\Documents and Settings\All Users.WINDOWS\Application Data\Oberon Games
C:\Documents and Settings\All Users.WINDOWS\Application Data\~0
C:\Documents and Settings\personne\Application Data\Oberon Games
C:\Documents and Settings\personne\Application Data\Oberonv1002
C:\Documents and Settings\personne\Application Data\Oberonv1006
C:\0fkk02x.exe
C:\0qw6vege.exe
C:\10nb.exe
C:\1a1dndah.exe
C:\1di1w.exe
C:\2o1ajagt.exe
C:\2sm66r.exe
C:\2ul.exe
C:\3c.exe
C:\3dcs9.exe
C:\3yalgc.exe
C:\62.exe
C:\6ruaqx.exe
C:\86.exe
C:\9b9w3.exe
C:\9cquqs.exe
C:\9d6resf.exe
C:\9g86.exe
C:\9jyhdim8.exe
C:\9keibj.exe
C:\9qqigqwf.exe
C:\9u.exe
C:\awb3ryk.exe
C:\b00ijwpu.exe
C:\b9v.exe
C:\ba.exe
C:\bbjl2g.exe
C:\bu8.exe
C:\bycfht.exe
C:\cbbw88s.exe
C:\cgaqyi.exe
C:\cobn8w3.exe
C:\cqb6wo.exe
C:\cs6phv6d.exe
C:\ctu8r.exe
C:\curqp.exe
C:\dogyx90.exe
C:\dqm.exe
C:\dwh.exe
C:\eer6ril9.exe
C:\egmjjb.exe
C:\ey.exe
C:\f9o8o.exe
C:\g12g.exe
C:\ggpw.exe
C:\i8gcgmg.exe
C:\i9bwjpqc.exe
C:\iuvvl9f3.exe
C:\jeo3ky.exe
C:\ji83j.exe
C:\k1d.exe
C:\krwyrv0d.exe
C:\ktly.exe
C:\kyme.exe
C:\l61yyp.exe
C:\lhh3v.exe
C:\lphfa.exe
C:\lpl.exe
C:\m.exe
C:\mbdm.exe
C:\mbvd.exe
C:\mi9al8rs.exe
C:\mjafm.exe
C:\mje12tni.exe
C:\mranjm.exe
C:\mwfubaob.exe
C:\n0qls.exe
C:\nds0q.exe
C:\nyt9mrd3.exe
C:\o8tf6l.exe
C:\opdux.exe
C:\p3vwxx.exe
C:\p6xebrnt.exe
C:\pbudsara.exe
C:\pbyqfn.exe
C:\pcxis.exe
C:\ph.exe
C:\q3kku.exe
C:\q93fi6kf.exe
C:\qbr2q.exe
C:\qcoageh.exe
C:\qcod.exe
C:\r2g20.exe
C:\r3fhr.exe
C:\r3q63rok.exe
C:\r3x0k.exe C:\rg9g9bgq.exe
C:\s1.exe
C:\s3ek.exe
C:\sdfqh.exe
C:\se12ydam.exe
C:\sp1jensi.exe
C:\srgo.exe
C:\t2hjo0.exe
C:\tgt.exe
C:\v1cbvsmq.exe
C:\vb0hsoay.exe
C:\vgyn6ewc.exe
C:\vk0w.exe
C:\vlvtdflx.exe
C:\w3.exe
C:\w9uxx92.exe
C:\wbj.exe
C:\wcgswa.exe
C:\wfx062.exe
C:\wglb9q.exe
C:\wrsf.exe
C:\ws.exe
C:\wu1n.exe
C:\wyskq6lt.exe
C:\x3xh.exe
C:\x8sigm.exe
C:\y6cqb2is.exe
C:\ycvvj.exe
C:\yqq8eqil.exe
C:\ysyjq1bs.exe

:OTL
SRV - [2009/09/03 18:51:00 | 003,347,280 | ---- | M] (INCA Internet Co., Ltd.) [On_Demand | Stopped] -- C:\WINDOWS\System32\GameMon.des -- (npggsvc)
IE - HKLM\SOFTWARE\Microsoft\Internet Explorer\Main,Default_Secondary_Page_URL = [binary data]
IE - HKLM\SOFTWARE\Microsoft\Internet Explorer\Main,Security Risk Page = about:SecurityRisk
IE - HKU\S-1-5-21-854245398-1078081533-1801674531-1003\..\URLSearchHook: {08C06D61-F1F3-4799-86F8-BE1A89362C85} - C:\Program Files\OrangeHSS\SearchURLHook\SearchPageURL.dll File not found
IE - HKU\S-1-5-21-854245398-1078081533-1801674531-1003\..\URLSearchHook: {4daac69c-cba7-45e2-9bc8-1044483d3352} - C:\Program Files\Softonic_France\tbSoft.dll (Conduit Ltd.)
IE - HKU\S-1-5-21-854245398-1078081533-1801674531-1003\..\URLSearchHook: {a8f9752d-e2b8-4e7a-86b5-499f4330e2fe} - C:\Program Files\Eazel-FR\tbEaze.dll (Conduit Ltd.)
IE - HKU\S-1-5-21-854245398-1078081533-1801674531-1003\..\URLSearchHook: {b2e293ee-fd7e-4c71-a714-5f4750d8d7b7} - C:\Program Files\myBabylon_English\tbmyBa.dll (Conduit Ltd.)
FF - prefs.js..extensions.enabledItems: {b2e293ee-fd7e-4c71-a714-5f4750d8d7b7}:2.6.0.15
FF - prefs.js..extensions.enabledItems: {a8f9752d-e2b8-4e7a-86b5-499f4330e2fe}:2.7.2.0
[2010/10/19 20:40:35 | 000,000,000 | ---D | M] (Softonic_France Toolbar) -- C:\Documents and Settings\personne\Application Data\Mozilla\Firefox\Profiles\w4ao4bqi.default\extensions\{364d4e0c-543f-4b85-abe3-19551139da4f}
[2010/10/03 10:57:40 | 000,000,000 | ---D | M] (Eazel-FR Toolbar) -- C:\Documents and Settings\personne\Application Data\Mozilla\Firefox\Profiles\w4ao4bqi.default\extensions\{a8f9752d-e2b8-4e7a-86b5-499f4330e2fe}
O2 - BHO: (Conduit Engine) - {30F9B915-B755-4826-820B-08FBA6BD249D} - C:\Program Files\ConduitEngine\ConduitEngine.dll (Conduit Ltd.)
O2 - BHO: (Softonic_France Toolbar) - {4daac69c-cba7-45e2-9bc8-1044483d3352} - C:\Program Files\Softonic_France\tbSoft.dll (Conduit Ltd.)
O2 - BHO: (no name) - {5C255C8A-E604-49b4-9D64-90988571CECB} - No CLSID value found.
O2 - BHO: (Eazel-FR Toolbar) - {a8f9752d-e2b8-4e7a-86b5-499f4330e2fe} - C:\Program Files\Eazel-FR\tbEaze.dll (Conduit Ltd.)
O2 - BHO: (myBabylon English Toolbar) - {b2e293ee-fd7e-4c71-a714-5f4750d8d7b7} - C:\Program Files\myBabylon_English\tbmyBa.dll (Conduit Ltd.)
[2009/09/12 11:40:09 | 000,000,000 | ---D | M] -- C:\Documents and Settings\personne\Application Data\Mozilla\Firefox\Profiles\w4ao4bqi.default\extensions\OberonGameHost@OberonGames.com
[2010/09/24 11:20:06 | 000,000,919 | ---- | M] () -- C:\Documents and Settings\personne\Application Data\Mozilla\Firefox\Profiles\w4ao4bqi.default\searchplugins\conduit.xml
O2 - BHO: (GamesBarBHO Class) - {CB0D163C-E9F4-4236-9496-0597E24B23A5} - C:\Program Files\GamesBar\oberontb.dll (Oberon Media Ltd.)
O3 - HKLM\..\Toolbar: (Conduit Engine) - {30F9B915-B755-4826-820B-08FBA6BD249D} - C:\Program Files\ConduitEngine\ConduitEngine.dll (Conduit Ltd.)
O3 - HKLM\..\Toolbar: (GamesBar) - {6F282B65-56BF-4BD1-A8B2-A4449A05863D} - C:\Program Files\GamesBar\oberontb.dll (Oberon Media Ltd.)
O3 - HKLM\..\Toolbar: (Eazel-FR Toolbar) - {a8f9752d-e2b8-4e7a-86b5-499f4330e2fe} - C:\Program Files\Eazel-FR\tbEaze.dll (Conduit Ltd.)
O3 - HKLM\..\Toolbar: (myBabylon English Toolbar) - {b2e293ee-fd7e-4c71-a714-5f4750d8d7b7} - C:\Program Files\myBabylon_English\tbmyBa.dll (Conduit Ltd.)
O4 - HKU\S-1-5-21-854245398-1078081533-1801674531-1003\..\Run: [cdoosoft] C:\Documents and Settings\personne\Local Settings\Temp\herss.exe ()
O4 - HKU\S-1-5-21-854245398-1078081533-1801674531-1003\..\Run: [king_mg] C:\WINDOWS\system32\mgking.exe ()
O4 - HKU\S-1-5-21-854245398-1078081533-1801674531-1003\..\Run: [uvuvcelk] c:\documents and settings\personne\local settings\application data\uvuvcelk.exe ()
O9 - Extra 'Tools' menuitem : GamesBar - {1A93C934-025B-4c3a-B38E-9654A7003239} - Reg Error: Value error. File not found
O15 - HKU\S-1-5-21-854245398-1078081533-1801674531-1003\..Trusted Domains: orange.fr ([logicielsgratuits] http in Sites de confiance)
O32 - AutoRun File - [2010/11/14 23:55:23 | 000,000,000 | ---D | M] - C:\Autorun.inf -- [ NTFS ]
O32 - AutoRun File - [2010/02/02 15:49:20 | 000,000,055 | RHS- | M] () - E:\AUTORUN.FCB -- [ FAT32 ]
O33 - MountPoints2\{05dc4526-2098-11df-b95d-001060b300bf}\Shell\AutoRun\command - "" = E:\2ul.exe -- File not found
O33 - MountPoints2\{05dc4526-2098-11df-b95d-001060b300bf}\Shell\open\Command - "" = E:\2ul.exe -- File not found
O33 - MountPoints2\{05dc4537-2098-11df-b95d-001060b300bf}\Shell\AutoRun\command - "" = F:\2ul.exe -- File not found
O33 - MountPoints2\{05dc4537-2098-11df-b95d-001060b300bf}\Shell\open\Command - "" = F:\2ul.exe -- File not found
O33 - MountPoints2\{10a36d54-e36c-11de-b92c-e37b2192fba2}\Shell - "" = AutoRun
O33 - MountPoints2\{10a36d54-e36c-11de-b92c-e37b2192fba2}\Shell\AutoRun\command - "" = E:\AutoRunCardDetector.exe -- File not found
O33 - MountPoints2\{4067cf47-47a0-11df-b99b-001060b300bf}\Shell\AutoRun\command - "" = G:\2ul.exe -- File not found
O33 - MountPoints2\{4067cf47-47a0-11df-b99b-001060b300bf}\Shell\open\Command - "" = G:\2ul.exe -- File not found
O33 - MountPoints2\{57270bd4-9329-11de-b882-000aeb0219e3}\Shell - "" = AutoRun
O33 - MountPoints2\{57270bd4-9329-11de-b882-000aeb0219e3}\Shell\AutoRun\command - "" = E:\AutoRunCardDetector.exe -- File not found
O33 - MountPoints2\{6561d315-27b7-11df-b975-001060b300bf}\Shell\AutoRun\command - "" = F:\k1d.exe -- File not found
O33 - MountPoints2\{6561d315-27b7-11df-b975-001060b300bf}\Shell\open\Command - "" = F:\k1d.exe -- File not found
O33 - MountPoints2\{e0ea63d9-8360-11de-b864-000aeb0219e3}\Shell\AutoRun\command - "" = F:\wyskq6lt.exe -- File not found
O33 - MountPoints2\{e0ea63d9-8360-11de-b864-000aeb0219e3}\Shell\open\Command - "" = F:\wyskq6lt.exe -- File not found
O34 - HKLM BootExecute: (autocheck autochk *) - File not found
[2010/10/17 20:33:24 | 000,294,634 | ---- | C] () -- C:\Documents and Settings\personne\Local Settings\Application Data\uvuvcelk_nav.dat
[2010/10/17 20:33:24 | 000,003,522 | ---- | C] () -- C:\Documents and Settings\personne\Local Settings\Application Data\uvuvcelk_navps.dat
[2010/10/17 20:33:24 | 000,003,259 | ---- | C] () -- C:\Documents and Settings\personne\Local Settings\Application Data\uvuvcelk.dat
[2010/10/17 20:33:10 | 000,569,344 | ---- | C] () -- C:\Documents and Settings\personne\Local Settings\Application Data\uvuvcelk.exe
[2010/10/17 12:43:00 | 000,000,000 | ---D | C] -- C:\b18eb17aff9e25d692cf
[2010/07/19 16:36:02 | 000,573,952 | ---- | C] () -- C:\Documents and Settings\personne\Local Settings\Application Data\haugbugb.exe
[2010/02/14 14:20:24 | 000,335,872 | ---- | C] () -- C:\Documents and Settings\personne\Local Settings\Application Data\ykvalw.exe
[2010/02/06 14:18:22 | 000,361,984 | ---- | C] () -- C:\Documents and Settings\personne\Local Settings\Application Data\dawtjg.exe
[2009/09/07 14:59:34 | 000,493,429 | ---- | C] () -- C:\Documents and Settings\personne\Local Settings\Application Data\beebcezc_nav.dat
[2009/09/07 14:59:34 | 000,004,045 | ---- | C] () -- C:\Documents and Settings\personne\Local Settings\Application Data\beebcezc.dat
[4 C:\WINDOWS\*.tmp files -> C:\WINDOWS\*.tmp -> ]
[238 C:\WINDOWS\System32\*.tmp files -> C:\WINDOWS\System32\*.tmp -> ]
[145 C:\WINDOWS\System32\dllcache\*.tmp files -> C:\WINDOWS\System32\dllcache\*.tmp -> ]
@Alternate Data Stream - 16 bytes -> C:\Documents and Settings\personne\Mes documents\Shareaza Downloads:Shareaza.GUID
@Alternate Data Stream - 153 bytes -> C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:F6E5C7FB
@Alternate Data Stream - 152 bytes -> C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:C0D722EB
@Alternate Data Stream - 152 bytes -> C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:38849DE5
@Alternate Data Stream - 151 bytes -> C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:E6C58E14
@Alternate Data Stream - 151 bytes -> C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:DE38CB5F
@Alternate Data Stream - 151 bytes -> C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:DAFD38AE
@Alternate Data Stream - 151 bytes -> C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:CBEB737E
@Alternate Data Stream - 151 bytes -> C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:5425B7F5
@Alternate Data Stream - 151 bytes -> C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:3FBB88CF
@Alternate Data Stream - 150 bytes -> C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:E7123C4C
@Alternate Data Stream - 150 bytes -> C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:E71141D2
@Alternate Data Stream - 150 bytes -> C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:E31D4564
@Alternate Data Stream - 150 bytes -> C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:E1F04E8D
@Alternate Data Stream - 150 bytes -> C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:D05E7A8B
@Alternate Data Stream - 150 bytes -> C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:93C48025
@Alternate Data Stream - 150 bytes -> C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:7079A696
@Alternate Data Stream - 150 bytes -> C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:4C509008
@Alternate Data Stream - 149 bytes -> C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:4B49E3BC
@Alternate Data Stream - 149 bytes -> C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:0651F96C
@Alternate Data Stream - 148 bytes -> C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:D4E73D7F
@Alternate Data Stream - 148 bytes -> C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:B17C9C5E
@Alternate Data Stream - 148 bytes -> C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:A518B662
@Alternate Data Stream - 148 bytes -> C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:52A42F4C
@Alternate Data Stream - 148 bytes -> C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:49F896E9
@Alternate Data Stream - 148 bytes -> C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:45A334DD
@Alternate Data Stream - 148 bytes -> C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:41099CE9
@Alternate Data Stream - 147 bytes -> C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:DCDE7C60
@Alternate Data Stream - 147 bytes -> C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:CF2C26D2
@Alternate Data Stream - 147 bytes -> C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:87FA5E8A
@Alternate Data Stream - 147 bytes -> C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:700B8E2E
@Alternate Data Stream - 147 bytes -> C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:550179F5
@Alternate Data Stream - 146 bytes -> C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:FE4E15B1
@Alternate Data Stream - 146 bytes -> C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:88BFF41D
@Alternate Data Stream - 146 bytes -> C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:6CC86DF2
@Alternate Data Stream - 146 bytes -> C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:666FB4AA
@Alternate Data Stream - 146 bytes -> C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:41C283B2
@Alternate Data Stream - 146 bytes -> C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:2CBB1EC8
@Alternate Data Stream - 145 bytes -> C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:E1982A23
@Alternate Data Stream - 145 bytes -> C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:A163B050
@Alternate Data Stream - 145 bytes -> C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:8BB2EE92
@Alternate Data Stream - 145 bytes -> C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:50A11A00
@Alternate Data Stream - 145 bytes -> C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:3612C9BE
@Alternate Data Stream - 144 bytes -> C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:ED66F190
@Alternate Data Stream - 144 bytes -> C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:D93DCF15
@Alternate Data Stream - 144 bytes -> C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:6051163F
@Alternate Data Stream - 144 bytes -> C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:1B7E916D
@Alternate Data Stream - 143 bytes -> C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:E62BE020
@Alternate Data Stream - 143 bytes -> C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:C40E212B
@Alternate Data Stream - 143 bytes -> C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:BAC9506D
@Alternate Data Stream - 143 bytes -> C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:A118E9A3
@Alternate Data Stream - 143 bytes -> C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:726A7C8D
@Alternate Data Stream - 143 bytes -> C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:6FCD73D7
@Alternate Data Stream - 143 bytes -> C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:5E3FBF9D
@Alternate Data Stream - 143 bytes -> C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:3B9582E0
@Alternate Data Stream - 143 bytes -> C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:2A5BC0A9
@Alternate Data Stream - 143 bytes -> C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:1D60AEC3
@Alternate Data Stream - 142 bytes -> C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:FEF919E6
@Alternate Data Stream - 142 bytes -> C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:D8A7F3FF
@Alternate Data Stream - 142 bytes -> C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:C4A1F01E
@Alternate Data Stream - 142 bytes -> C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:A86C3734
@Alternate Data Stream - 142 bytes -> C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:8FF962C6
@Alternate Data Stream - 142 bytes -> C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:74BB299D
@Alternate Data Stream - 142 bytes -> C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:54CB420C
@Alternate Data Stream - 142 bytes -> C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:48529647
@Alternate Data Stream - 142 bytes -> C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:2F34C507
@Alternate Data Stream - 142 bytes -> C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:20B17557
@Alternate Data Stream - 142 bytes -> C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:204BEE0F
@Alternate Data Stream - 142 bytes -> C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:092DD1DD
@Alternate Data Stream - 141 bytes -> C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:F878F14A
@Alternate Data Stream - 141 bytes -> C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:D20FFA63
@Alternate Data Stream - 141 bytes -> C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:CBCE0A92
@Alternate Data Stream - 141 bytes -> C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:94B65E3C
@Alternate Data Stream - 141 bytes -> C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:1AF93AF4
@Alternate Data Stream - 140 bytes -> C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:F42CF153
@Alternate Data Stream - 140 bytes -> C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:E3AFC61E
@Alternate Data Stream - 140 bytes -> C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:E1069F99
@Alternate Data Stream - 140 bytes -> C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:D8EA2847
@Alternate Data Stream - 140 bytes -> C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:69EC5FA7
@Alternate Data Stream - 140 bytes -> C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:5B111056
@Alternate Data Stream - 140 bytes -> C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:478FEFC3
@Alternate Data Stream - 139 bytes -> C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:DBA1A307
@Alternate Data Stream - 139 bytes -> C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:588B60C7
@Alternate Data Stream - 139 bytes -> C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:27B99ED6
@Alternate Data Stream - 139 bytes -> C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:24AB14E7
@Alternate Data Stream - 139 bytes -> C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:131C0EE9
@Alternate Data Stream - 138 bytes -> C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:D5458F6B
@Alternate Data Stream - 138 bytes -> C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:69B9AAE7
@Alternate Data Stream - 138 bytes -> C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:51A22C60
@Alternate Data Stream - 138 bytes -> C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:14168AA3
@Alternate Data Stream - 138 bytes -> C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:002640E3
@Alternate Data Stream - 137 bytes -> C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:FDD78BE5
@Alternate Data Stream - 137 bytes -> C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:EF4B1DA9
@Alternate Data Stream - 137 bytes -> C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:EC36F550
@Alternate Data Stream - 137 bytes -> C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:E2C7E93F
@Alternate Data Stream - 137 bytes -> C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:C8EAE2CC
@Alternate Data Stream - 137 bytes -> C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:9F36615A
@Alternate Data Stream - 137 bytes -> C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:90E60569
@Alternate Data Stream - 137 bytes -> C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:4FFA5B5C
@Alternate Data Stream - 137 bytes -> C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:001F2DD1
@Alternate Data Stream - 136 bytes -> C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:F791B5EF
@Alternate Data Stream - 136 bytes -> C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:88555A1F
@Alternate Data Stream - 136 bytes -> C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:445352A1
@Alternate Data Stream - 136 bytes -> C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:2A8A3140
@Alternate Data Stream - 136 bytes -> C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:0D713C0D
@Alternate Data Stream - 135 bytes -> C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:CDFF58FE
@Alternate Data Stream - 135 bytes -> C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:864A52B8
@Alternate Data Stream - 135 bytes -> C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:74B502CB
@Alternate Data Stream - 135 bytes -> C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:41B89F80
@Alternate Data Stream - 135 bytes -> C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:17DA7CD5
@Alternate Data Stream - 134 bytes -> C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:FE74DAB1
@Alternate Data Stream - 134 bytes -> C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:F01E7F17
@Alternate Data Stream - 134 bytes -> C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:D091E13E
@Alternate Data Stream - 134 bytes -> C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:79F970BE
@Alternate Data Stream - 133 bytes -> C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:B8EA2C49
@Alternate Data Stream - 133 bytes -> C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:B5D277AB
@Alternate Data Stream - 133 bytes -> C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:9B750A13
@Alternate Data Stream - 133 bytes -> C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:97A03D0F
@Alternate Data Stream - 133 bytes -> C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:77846FFE
@Alternate Data Stream - 133 bytes -> C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:6D4F7F2B
@Alternate Data Stream - 133 bytes -> C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:46545F5C
@Alternate Data Stream - 132 bytes -> C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:DD831FA6
@Alternate Data Stream - 132 bytes -> C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:902B3C72
@Alternate Data Stream - 132 bytes -> C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:861A898F
@Alternate Data Stream - 132 bytes -> C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:078B239B
@Alternate Data Stream - 131 bytes -> C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:E6A84C9D
@Alternate Data Stream - 131 bytes -> C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:857692EC
@Alternate Data Stream - 131 bytes -> C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:84499DA6
@Alternate Data Stream - 131 bytes -> C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:3965C4E8
@Alternate Data Stream - 131 bytes -> C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:2085D07D
@Alternate Data Stream - 131 bytes -> C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:13B137AF
@Alternate Data Stream - 130 bytes -> C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:A4AD016E
@Alternate Data Stream - 130 bytes -> C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:68DA8CC0
@Alternate Data Stream - 130 bytes -> C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:5A27D490
@Alternate Data Stream - 130 bytes -> C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:4C97EF04
@Alternate Data Stream - 130 bytes -> C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:2556A8A0
@Alternate Data Stream - 129 bytes -> C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:FAC5BCF5
@Alternate Data Stream - 129 bytes -> C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:A9EB5571
@Alternate Data Stream - 129 bytes -> C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:82C50600
@Alternate Data Stream - 129 bytes -> C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:7DFDF9DF
@Alternate Data Stream - 129 bytes -> C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:76084F6D
@Alternate Data Stream - 128 bytes -> C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:6CEB2458
@Alternate Data Stream - 128 bytes -> C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:3780BCC3
@Alternate Data Stream - 127 bytes -> C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:E495057A
@Alternate Data Stream - 127 bytes -> C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:C36E5828
@Alternate Data Stream - 127 bytes -> C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:B8B102B9
@Alternate Data Stream - 127 bytes -> C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:8CE601F5
@Alternate Data Stream - 127 bytes -> C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:7C8950EF
@Alternate Data Stream - 127 bytes -> C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:5C5A503E
@Alternate Data Stream - 127 bytes -> C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:54F7A151
@Alternate Data Stream - 127 bytes -> C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:4D3513A5
@Alternate Data Stream - 127 bytes -> C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:4CD2D817
@Alternate Data Stream - 127 bytes -> C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:2504A086
@Alternate Data Stream - 127 bytes -> C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:016C09C5
@Alternate Data Stream - 126 bytes -> C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:DD3F5AF4
@Alternate Data Stream - 126 bytes -> C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:BD2054EF
@Alternate Data Stream - 126 bytes -> C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:8F7ECF6A
@Alternate Data Stream - 126 bytes -> C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:70F0A2F4
@Alternate Data Stream - 126 bytes -> C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:615435BE
@Alternate Data Stream - 126 bytes -> C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:54997B77
@Alternate Data Stream - 126 bytes -> C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:04893BD0
@Alternate Data Stream - 125 bytes -> C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:FD444D31
@Alternate Data Stream - 125 bytes -> C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:B54102AD
@Alternate Data Stream - 125 bytes -> C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:74456BF5
@Alternate Data Stream - 125 bytes -> C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:5A13AEC2
@Alternate Data Stream - 125 bytes -> C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:3447AB86
@Alternate Data Stream - 125 bytes -> C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:1D9ED8F7
@Alternate Data Stream - 125 bytes -> C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:18AA05CB
@Alternate Data Stream - 125 bytes -> C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:029E021F
@Alternate Data Stream - 124 bytes -> C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:F854E9B8
@Alternate Data Stream - 124 bytes -> C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:1013B07C
@Alternate Data Stream - 123 bytes -> C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:F86CC73E
@Alternate Data Stream - 123 bytes -> C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:D11BEC54
@Alternate Data Stream - 123 bytes -> C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:81C88EA7
@Alternate Data Stream - 123 bytes -> C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:7F66BF58
@Alternate Data Stream - 123 bytes -> C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:1BC99E01
@Alternate Data Stream - 123 bytes -> C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:05816AFA
@Alternate Data Stream - 122 bytes -> C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:F79CBFC4
@Alternate Data Stream - 122 bytes -> C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:ED45A20F
@Alternate Data Stream - 122 bytes -> C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:B6C84920
@Alternate Data Stream - 122 bytes -> C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:A4C20950
@Alternate Data Stream - 122 bytes -> C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:4F636E25
@Alternate Data Stream - 122 bytes -> C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:409F27A9
@Alternate Data Stream - 122 bytes -> C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:0A9883D3
@Alternate Data Stream - 122 bytes -> C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:023F0743
@Alternate Data Stream - 121 bytes -> C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:86A8CE8D
@Alternate Data Stream - 121 bytes -> C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:1C93E55E
@Alternate Data Stream - 120 bytes -> C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:E463CA56
@Alternate Data Stream - 120 bytes -> C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:5E4A7758
@Alternate Data Stream - 119 bytes -> C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:8599F087
@Alternate Data Stream - 118 bytes -> C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:AE78B77A
@Alternate Data Stream - 118 bytes -> C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:8B9E766D
@Alternate Data Stream - 118 bytes -> C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:75F5C19E
@Alternate Data Stream - 117 bytes -> C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:8C443193
@Alternate Data Stream - 116 bytes -> C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:45E74272

:Commands
[emptytemp]
[EMPTYFLASH]
[PURITY]
[RESETHOSTS]





* Cliques sur l'icône "Correction" (en haut à gauche) .
* Laisse le scan aller à son terme sans te servir du PC
* A la fin du scan un rapport va s'ouvrir "OTL.Txt"
* Copie et colle le rapports dans ta réponse stp...
* Au cas où, tu peux les retrouver dans le dossier C:\OTL ou sur ton bureau en fonction des cas rencontrés


ensuite...

  • télécharge Malwarebytes >>ici
  • Pour t'aiderun super tuto de Danakil à lire avant le scan.
  • Choisie "exécuter un examen rapide" et à la fin du scan , coche tous les éléments trouvés,et clique sur supprimer la sélection.
  • Poste moi le rapport stp.

@++
Avatar de l'utilisateur
jeanmimigab
PC-Infopraticien
PC-Infopraticien
 
Messages: 2986
Inscription: 29 Nov 2009 12:05
 

Re: page publicitaire qui s'ouvre

Message le 15 Nov 2010 13:02

comme j'ai dit c'est un ordi d'occas, donc ça vient peut etre pas de moi. et j'ai windos xp est ce que je fait pareil
taz66410
Apprenti(e)
Apprenti(e)
 
Messages: 39
Inscription: 14 Nov 2010 23:21
 

Re: page publicitaire qui s'ouvre

Message le 15 Nov 2010 13:43

voila le rapport

Code: Tout sélectionner
All processes killed
========== FILES ==========
C:\Documents and Settings\personne\Local Settings\Application Data\uvuvcelk.exe moved successfully.
C:\WINDOWS\system32\mgking0.dll moved successfully.
C:\Documents and Settings\personne\Local Settings\Temp\cvasds0.dll moved successfully.
C:\WINDOWS\System32\GameMon.des moved successfully.
C:\Documents and Settings\personne\Application Data\Mozilla\Firefox\Profiles\w4ao4bqi.default\extensions\{364d4e0c-543f-4b85-abe3-19551139da4f}\searchplugin folder moved successfully.
C:\Documents and Settings\personne\Application Data\Mozilla\Firefox\Profiles\w4ao4bqi.default\extensions\{364d4e0c-543f-4b85-abe3-19551139da4f}\META-INF folder moved successfully.
C:\Documents and Settings\personne\Application Data\Mozilla\Firefox\Profiles\w4ao4bqi.default\extensions\{364d4e0c-543f-4b85-abe3-19551139da4f}\lib folder moved successfully.
C:\Documents and Settings\personne\Application Data\Mozilla\Firefox\Profiles\w4ao4bqi.default\extensions\{364d4e0c-543f-4b85-abe3-19551139da4f}\defaults folder moved successfully.
C:\Documents and Settings\personne\Application Data\Mozilla\Firefox\Profiles\w4ao4bqi.default\extensions\{364d4e0c-543f-4b85-abe3-19551139da4f}\components folder moved successfully.
C:\Documents and Settings\personne\Application Data\Mozilla\Firefox\Profiles\w4ao4bqi.default\extensions\{364d4e0c-543f-4b85-abe3-19551139da4f}\chrome folder moved successfully.
C:\Documents and Settings\personne\Application Data\Mozilla\Firefox\Profiles\w4ao4bqi.default\extensions\{364d4e0c-543f-4b85-abe3-19551139da4f} folder moved successfully.
C:\Documents and Settings\personne\Application Data\Mozilla\Firefox\Profiles\w4ao4bqi.default\extensions\{a8f9752d-e2b8-4e7a-86b5-499f4330e2fe}\searchplugin folder moved successfully.
C:\Documents and Settings\personne\Application Data\Mozilla\Firefox\Profiles\w4ao4bqi.default\extensions\{a8f9752d-e2b8-4e7a-86b5-499f4330e2fe}\META-INF folder moved successfully.
C:\Documents and Settings\personne\Application Data\Mozilla\Firefox\Profiles\w4ao4bqi.default\extensions\{a8f9752d-e2b8-4e7a-86b5-499f4330e2fe}\lib folder moved successfully.
C:\Documents and Settings\personne\Application Data\Mozilla\Firefox\Profiles\w4ao4bqi.default\extensions\{a8f9752d-e2b8-4e7a-86b5-499f4330e2fe}\defaults folder moved successfully.
C:\Documents and Settings\personne\Application Data\Mozilla\Firefox\Profiles\w4ao4bqi.default\extensions\{a8f9752d-e2b8-4e7a-86b5-499f4330e2fe}\components folder moved successfully.
C:\Documents and Settings\personne\Application Data\Mozilla\Firefox\Profiles\w4ao4bqi.default\extensions\{a8f9752d-e2b8-4e7a-86b5-499f4330e2fe}\chrome folder moved successfully.
C:\Documents and Settings\personne\Application Data\Mozilla\Firefox\Profiles\w4ao4bqi.default\extensions\{a8f9752d-e2b8-4e7a-86b5-499f4330e2fe} folder moved successfully.
C:\Program Files\ConduitEngine folder moved successfully.
C:\Program Files\Softonic_France folder moved successfully.
C:\Program Files\Eazel-FR folder moved successfully.
C:\Documents and Settings\personne\Application Data\Mozilla\Firefox\Profiles\w4ao4bqi.default\extensions\OberonGameHost@OberonGames.com\platform\WINNT_x86-msvc\plugins folder moved successfully.
C:\Documents and Settings\personne\Application Data\Mozilla\Firefox\Profiles\w4ao4bqi.default\extensions\OberonGameHost@OberonGames.com\platform\WINNT_x86-msvc folder moved successfully.
C:\Documents and Settings\personne\Application Data\Mozilla\Firefox\Profiles\w4ao4bqi.default\extensions\OberonGameHost@OberonGames.com\platform folder moved successfully.
C:\Documents and Settings\personne\Application Data\Mozilla\Firefox\Profiles\w4ao4bqi.default\extensions\OberonGameHost@OberonGames.com\META-INF folder moved successfully.
C:\Documents and Settings\personne\Application Data\Mozilla\Firefox\Profiles\w4ao4bqi.default\extensions\OberonGameHost@OberonGames.com folder moved successfully.
C:\Documents and Settings\personne\Application Data\Mozilla\Firefox\Profiles\w4ao4bqi.default\searchplugins\conduit.xml moved successfully.
C:\Program Files\Mozilla Firefox\searchplugins\babylon.xml moved successfully.
C:\Program Files\GamesBar folder moved successfully.
C:\Program Files\myBabylon_English folder moved successfully.
C:\Documents and Settings\personne\Local Settings\Temp\herss.exe moved successfully.
C:\WINDOWS\system32\mgking.exe moved successfully.
File\Folder c:\documents and settings\personne\local settings\application data\uvuvcelk.exe not found.
E:\AUTORUN.FCB moved successfully.
C:\Documents and Settings\personne\Application Data\stats.txt moved successfully.
C:\Documents and Settings\personne\Local Settings\Application Data\uvuvcelk_nav.dat moved successfully.
C:\Documents and Settings\personne\Local Settings\Application Data\uvuvcelk_navps.dat moved successfully.
C:\Documents and Settings\personne\Local Settings\Application Data\uvuvcelk.dat moved successfully.
File\Folder C:\Documents and Settings\personne\Local Settings\Application Data\uvuvcelk.exe not found.
C:\Documents and Settings\personne\Local Settings\Application Data\haugbugb.exe moved successfully.
C:\Documents and Settings\personne\Local Settings\Application Data\ykvalw.exe moved successfully.
C:\Documents and Settings\personne\Local Settings\Application Data\dawtjg.exe moved successfully.
C:\Documents and Settings\personne\Local Settings\Application Data\beebcezc_nav.dat moved successfully.
C:\Documents and Settings\personne\Local Settings\Application Data\beebcezc.dat moved successfully.
C:\cbbw88s.exe moved successfully.
C:\dwh.exe moved successfully.
C:\egmjjb.exe moved successfully.
C:\9keibj.exe moved successfully.
C:\b9v.exe moved successfully.
C:\lpl.exe moved successfully.
C:\r3q63rok.exe moved successfully.
C:\9d6resf.exe moved successfully.
C:\jeo3ky.exe moved successfully.
C:\b18eb17aff9e25d692cf folder moved successfully.
C:\kyme.exe moved successfully.
C:\WINDOWS\System32\mgking1.dll moved successfully.
C:\WINDOWS\_delis32.ini moved successfully.
C:\WINDOWS\System32\MobOlExt.dll moved successfully.
C:\Documents and Settings\All Users\Application Data\GamesBar\onload folder moved successfully.
C:\Documents and Settings\All Users\Application Data\GamesBar folder moved successfully.
C:\Documents and Settings\All Users.WINDOWS\Application Data\Games-Attack folder moved successfully.
C:\Documents and Settings\All Users.WINDOWS\Application Data\Oberon Games\TurboSubs folder moved successfully.
C:\Documents and Settings\All Users.WINDOWS\Application Data\Oberon Games\TurboPizza folder moved successfully.
C:\Documents and Settings\All Users.WINDOWS\Application Data\Oberon Games\TurboFiesta\Statistics\14_level_13 folder moved successfully.
C:\Documents and Settings\All Users.WINDOWS\Application Data\Oberon Games\TurboFiesta\Statistics\13_level_12 folder moved successfully.
C:\Documents and Settings\All Users.WINDOWS\Application Data\Oberon Games\TurboFiesta\Statistics\12_level_11 folder moved successfully.
C:\Documents and Settings\All Users.WINDOWS\Application Data\Oberon Games\TurboFiesta\Statistics\11_level_10 folder moved successfully.
C:\Documents and Settings\All Users.WINDOWS\Application Data\Oberon Games\TurboFiesta\Statistics\10_level_10_x folder moved successfully.
C:\Documents and Settings\All Users.WINDOWS\Application Data\Oberon Games\TurboFiesta\Statistics\09_level_9 folder moved successfully.
C:\Documents and Settings\All Users.WINDOWS\Application Data\Oberon Games\TurboFiesta\Statistics\08_level_8 folder moved successfully.
C:\Documents and Settings\All Users.WINDOWS\Application Data\Oberon Games\TurboFiesta\Statistics\07_level_7 folder moved successfully.
C:\Documents and Settings\All Users.WINDOWS\Application Data\Oberon Games\TurboFiesta\Statistics\06_level_6 folder moved successfully.
C:\Documents and Settings\All Users.WINDOWS\Application Data\Oberon Games\TurboFiesta\Statistics\05_level_5 folder moved successfully.
C:\Documents and Settings\All Users.WINDOWS\Application Data\Oberon Games\TurboFiesta\Statistics\04_level_4 folder moved successfully.
C:\Documents and Settings\All Users.WINDOWS\Application Data\Oberon Games\TurboFiesta\Statistics\03_level_3 folder moved successfully.
C:\Documents and Settings\All Users.WINDOWS\Application Data\Oberon Games\TurboFiesta\Statistics\02_level_2 folder moved successfully.
C:\Documents and Settings\All Users.WINDOWS\Application Data\Oberon Games\TurboFiesta\Statistics\01_level_1 folder moved successfully.
C:\Documents and Settings\All Users.WINDOWS\Application Data\Oberon Games\TurboFiesta\Statistics folder moved successfully.
C:\Documents and Settings\All Users.WINDOWS\Application Data\Oberon Games\TurboFiesta folder moved successfully.
C:\Documents and Settings\All Users.WINDOWS\Application Data\Oberon Games folder moved successfully.
C:\Documents and Settings\All Users.WINDOWS\Application Data\~0 folder moved successfully.
C:\Documents and Settings\personne\Application Data\Oberon Games\TurboSubs folder moved successfully.
C:\Documents and Settings\personne\Application Data\Oberon Games\TurboFiesta folder moved successfully.
C:\Documents and Settings\personne\Application Data\Oberon Games folder moved successfully.
C:\Documents and Settings\personne\Application Data\Oberonv1002\Mystery P.I. - Lost in LA folder moved successfully.
C:\Documents and Settings\personne\Application Data\Oberonv1002\Escape Rosecliff Island folder moved successfully.
C:\Documents and Settings\personne\Application Data\Oberonv1002 folder moved successfully.
C:\Documents and Settings\personne\Application Data\Oberonv1006\Amazing Adventures 2 folder moved successfully.
C:\Documents and Settings\personne\Application Data\Oberonv1006\Amazing Adventures folder moved successfully.
C:\Documents and Settings\personne\Application Data\Oberonv1006 folder moved successfully.
C:\0fkk02x.exe moved successfully.
C:\0qw6vege.exe moved successfully.
C:\10nb.exe moved successfully.
C:\1a1dndah.exe moved successfully.
C:\1di1w.exe moved successfully.
C:\2o1ajagt.exe moved successfully.
C:\2sm66r.exe moved successfully.
C:\2ul.exe moved successfully.
C:\3c.exe moved successfully.
C:\3dcs9.exe moved successfully.
C:\3yalgc.exe moved successfully.
C:\62.exe moved successfully.
C:\6ruaqx.exe moved successfully.
C:\86.exe moved successfully.
C:\9b9w3.exe moved successfully.
C:\9cquqs.exe moved successfully.
File\Folder C:\9d6resf.exe not found.
C:\9g86.exe moved successfully.
C:\9jyhdim8.exe moved successfully.
File\Folder C:\9keibj.exe not found.
C:\9qqigqwf.exe moved successfully.
C:\9u.exe moved successfully.
C:\awb3ryk.exe moved successfully.
C:\b00ijwpu.exe moved successfully.
File\Folder C:\b9v.exe not found.
C:\ba.exe moved successfully.
C:\bbjl2g.exe moved successfully.
C:\bu8.exe moved successfully.
C:\bycfht.exe moved successfully.
File\Folder C:\cbbw88s.exe not found.
C:\cgaqyi.exe moved successfully.
C:\cobn8w3.exe moved successfully.
C:\cqb6wo.exe moved successfully.
C:\cs6phv6d.exe moved successfully.
C:\ctu8r.exe moved successfully.
C:\curqp.exe moved successfully.
C:\dogyx90.exe moved successfully.
C:\dqm.exe moved successfully.
File\Folder C:\dwh.exe not found.
C:\eer6ril9.exe moved successfully.
File\Folder C:\egmjjb.exe not found.
C:\ey.exe moved successfully.
C:\f9o8o.exe moved successfully.
C:\g12g.exe moved successfully.
C:\ggpw.exe moved successfully.
C:\i8gcgmg.exe moved successfully.
C:\i9bwjpqc.exe moved successfully.
C:\iuvvl9f3.exe moved successfully.
File\Folder C:\jeo3ky.exe not found.
C:\ji83j.exe moved successfully.
C:\k1d.exe moved successfully.
C:\krwyrv0d.exe moved successfully.
C:\ktly.exe moved successfully.
File\Folder C:\kyme.exe not found.
C:\l61yyp.exe moved successfully.
C:\lhh3v.exe moved successfully.
C:\lphfa.exe moved successfully.
File\Folder C:\lpl.exe not found.
C:\m.exe moved successfully.
C:\mbdm.exe moved successfully.
C:\mbvd.exe moved successfully.
C:\mi9al8rs.exe moved successfully.
C:\mjafm.exe moved successfully.
C:\mje12tni.exe moved successfully.
C:\mranjm.exe moved successfully.
C:\mwfubaob.exe moved successfully.
C:\n0qls.exe moved successfully.
C:\nds0q.exe moved successfully.
C:\nyt9mrd3.exe moved successfully.
C:\o8tf6l.exe moved successfully.
C:\opdux.exe moved successfully.
C:\p3vwxx.exe moved successfully.
C:\p6xebrnt.exe moved successfully.
C:\pbudsara.exe moved successfully.
C:\pbyqfn.exe moved successfully.
C:\pcxis.exe moved successfully.
C:\ph.exe moved successfully.
C:\q3kku.exe moved successfully.
C:\q93fi6kf.exe moved successfully.
C:\qbr2q.exe moved successfully.
C:\qcoageh.exe moved successfully.
C:\qcod.exe moved successfully.
C:\r2g20.exe moved successfully.
C:\r3fhr.exe moved successfully.
File\Folder C:\r3q63rok.exe not found.
File\Folder C:\r3x0k.exe C:\rg9g9bgq.exe not found.
C:\s1.exe moved successfully.
C:\s3ek.exe moved successfully.
C:\sdfqh.exe moved successfully.
C:\se12ydam.exe moved successfully.
C:\sp1jensi.exe moved successfully.
C:\srgo.exe moved successfully.
C:\t2hjo0.exe moved successfully.
C:\tgt.exe moved successfully.
C:\v1cbvsmq.exe moved successfully.
C:\vb0hsoay.exe moved successfully.
C:\vgyn6ewc.exe moved successfully.
C:\vk0w.exe moved successfully.
C:\vlvtdflx.exe moved successfully.
C:\w3.exe moved successfully.
C:\w9uxx92.exe moved successfully.
C:\wbj.exe moved successfully.
C:\wcgswa.exe moved successfully.
C:\wfx062.exe moved successfully.
C:\wglb9q.exe moved successfully.
C:\wrsf.exe moved successfully.
C:\ws.exe moved successfully.
C:\wu1n.exe moved successfully.
C:\wyskq6lt.exe moved successfully.
C:\x3xh.exe moved successfully.
C:\x8sigm.exe moved successfully.
C:\y6cqb2is.exe moved successfully.
C:\ycvvj.exe moved successfully.
C:\yqq8eqil.exe moved successfully.
C:\ysyjq1bs.exe moved successfully.
========== OTL ==========
Service npggsvc stopped successfully!
Service npggsvc deleted successfully!
File C:\WINDOWS\System32\GameMon.des not found.
HKLM\SOFTWARE\Microsoft\Internet Explorer\Main\\Default_Secondary_Page_URL| /E : value set successfully!
HKLM\SOFTWARE\Microsoft\Internet Explorer\Main\\Security Risk Page| /E : value set successfully!
Registry value HKEY_USERS\S-1-5-21-854245398-1078081533-1801674531-1003\Software\Microsoft\Internet Explorer\URLSearchHooks\\{08C06D61-F1F3-4799-86F8-BE1A89362C85} deleted successfully.
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{08C06D61-F1F3-4799-86F8-BE1A89362C85}\ deleted successfully.
Registry value HKEY_USERS\S-1-5-21-854245398-1078081533-1801674531-1003\Software\Microsoft\Internet Explorer\URLSearchHooks\\{4daac69c-cba7-45e2-9bc8-1044483d3352} deleted successfully.
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{4daac69c-cba7-45e2-9bc8-1044483d3352}\ deleted successfully.
File C:\Program Files\Softonic_France\tbSoft.dll not found.
Registry value HKEY_USERS\S-1-5-21-854245398-1078081533-1801674531-1003\Software\Microsoft\Internet Explorer\URLSearchHooks\\{a8f9752d-e2b8-4e7a-86b5-499f4330e2fe} deleted successfully.
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{a8f9752d-e2b8-4e7a-86b5-499f4330e2fe}\ deleted successfully.
File C:\Program Files\Eazel-FR\tbEaze.dll not found.
Registry value HKEY_USERS\S-1-5-21-854245398-1078081533-1801674531-1003\Software\Microsoft\Internet Explorer\URLSearchHooks\\{b2e293ee-fd7e-4c71-a714-5f4750d8d7b7} deleted successfully.
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{b2e293ee-fd7e-4c71-a714-5f4750d8d7b7}\ deleted successfully.
File C:\Program Files\myBabylon_English\tbmyBa.dll not found.
Prefs.js: {b2e293ee-fd7e-4c71-a714-5f4750d8d7b7}:2.6.0.15 removed from extensions.enabledItems
Prefs.js: {a8f9752d-e2b8-4e7a-86b5-499f4330e2fe}:2.7.2.0 removed from extensions.enabledItems
Folder C:\Documents and Settings\personne\Application Data\Mozilla\Firefox\Profiles\w4ao4bqi.default\extensions\{364d4e0c-543f-4b85-abe3-19551139da4f}\ not found.
Folder C:\Documents and Settings\personne\Application Data\Mozilla\Firefox\Profiles\w4ao4bqi.default\extensions\{a8f9752d-e2b8-4e7a-86b5-499f4330e2fe}\ not found.
Registry key HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{30F9B915-B755-4826-820B-08FBA6BD249D}\ deleted successfully.
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{30F9B915-B755-4826-820B-08FBA6BD249D}\ deleted successfully.
File C:\Program Files\ConduitEngine\ConduitEngine.dll not found.
Registry key HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{4daac69c-cba7-45e2-9bc8-1044483d3352}\ deleted successfully.
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{4daac69c-cba7-45e2-9bc8-1044483d3352}\ not found.
File C:\Program Files\Softonic_France\tbSoft.dll not found.
Registry key HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{5C255C8A-E604-49b4-9D64-90988571CECB}\ deleted successfully.
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{5C255C8A-E604-49b4-9D64-90988571CECB}\ not found.
Registry key HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{a8f9752d-e2b8-4e7a-86b5-499f4330e2fe}\ deleted successfully.
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{a8f9752d-e2b8-4e7a-86b5-499f4330e2fe}\ not found.
File C:\Program Files\Eazel-FR\tbEaze.dll not found.
Registry key HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{b2e293ee-fd7e-4c71-a714-5f4750d8d7b7}\ deleted successfully.
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{b2e293ee-fd7e-4c71-a714-5f4750d8d7b7}\ not found.
File C:\Program Files\myBabylon_English\tbmyBa.dll not found.
Folder C:\Documents and Settings\personne\Application Data\Mozilla\Firefox\Profiles\w4ao4bqi.default\extensions\OberonGameHost@OberonGames.com\ not found.
File C:\Documents and Settings\personne\Application Data\Mozilla\Firefox\Profiles\w4ao4bqi.default\searchplugins\conduit.xml not found.
Registry key HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{CB0D163C-E9F4-4236-9496-0597E24B23A5}\ deleted successfully.
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{CB0D163C-E9F4-4236-9496-0597E24B23A5}\ deleted successfully.
File C:\Program Files\GamesBar\oberontb.dll not found.
Registry value HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\Toolbar\\{30F9B915-B755-4826-820B-08FBA6BD249D} deleted successfully.
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{30F9B915-B755-4826-820B-08FBA6BD249D}\ not found.
File C:\Program Files\ConduitEngine\ConduitEngine.dll not found.
Registry value HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\Toolbar\\{6F282B65-56BF-4BD1-A8B2-A4449A05863D} deleted successfully.
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{6F282B65-56BF-4BD1-A8B2-A4449A05863D}\ deleted successfully.
File C:\Program Files\GamesBar\oberontb.dll not found.
Registry value HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\Toolbar\\{a8f9752d-e2b8-4e7a-86b5-499f4330e2fe} deleted successfully.
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{a8f9752d-e2b8-4e7a-86b5-499f4330e2fe}\ not found.
File FR\tbEaze.dll not found.
Registry value HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\Toolbar\\{b2e293ee-fd7e-4c71-a714-5f4750d8d7b7} deleted successfully.
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{b2e293ee-fd7e-4c71-a714-5f4750d8d7b7}\ not found.
File C:\Program Files\myBabylon_English\tbmyBa.dll not found.
Registry value HKEY_USERS\S-1-5-21-854245398-1078081533-1801674531-1003\\Software\Microsoft\Windows\CurrentVersion\Run\\cdoosoft deleted successfully.
File C:\Documents and Settings\personne\Local Settings\Temp\herss.exe not found.
Registry value HKEY_USERS\S-1-5-21-854245398-1078081533-1801674531-1003\\Software\Microsoft\Windows\CurrentVersion\Run\\king_mg deleted successfully.
File C:\WINDOWS\system32\mgking.exe not found.
Registry value HKEY_USERS\S-1-5-21-854245398-1078081533-1801674531-1003\\Software\Microsoft\Windows\CurrentVersion\Run\\uvuvcelk deleted successfully.
File c:\documents and settings\personne\local settings\application data\uvuvcelk.exe not found.
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Extensions\{1A93C934-025B-4c3a-B38E-9654A7003239}\ deleted successfully.
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{1A93C934-025B-4c3a-B38E-9654A7003239}\ not found.
Registry key HKEY_USERS\S-1-5-21-854245398-1078081533-1801674531-1003\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\orange.fr\logicielsgratuits\ deleted successfully.
File  not found.
File E:\AUTORUN.FCB not found.
Registry key HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{05dc4526-2098-11df-b95d-001060b300bf}\ deleted successfully.
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{05dc4526-2098-11df-b95d-001060b300bf}\ not found.
File E:\2ul.exe not found.
Registry key HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{05dc4526-2098-11df-b95d-001060b300bf}\ not found.
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{05dc4526-2098-11df-b95d-001060b300bf}\ not found.
File E:\2ul.exe not found.
Registry key HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{05dc4537-2098-11df-b95d-001060b300bf}\ deleted successfully.
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{05dc4537-2098-11df-b95d-001060b300bf}\ not found.
File F:\2ul.exe not found.
Registry key HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{05dc4537-2098-11df-b95d-001060b300bf}\ not found.
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{05dc4537-2098-11df-b95d-001060b300bf}\ not found.
File F:\2ul.exe not found.
Registry key HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{10a36d54-e36c-11de-b92c-e37b2192fba2}\ deleted successfully.
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{10a36d54-e36c-11de-b92c-e37b2192fba2}\ not found.
Registry key HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{10a36d54-e36c-11de-b92c-e37b2192fba2}\ not found.
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{10a36d54-e36c-11de-b92c-e37b2192fba2}\ not found.
File E:\AutoRunCardDetector.exe not found.
Registry key HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{4067cf47-47a0-11df-b99b-001060b300bf}\ deleted successfully.
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{4067cf47-47a0-11df-b99b-001060b300bf}\ not found.
File G:\2ul.exe not found.
Registry key HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{4067cf47-47a0-11df-b99b-001060b300bf}\ not found.
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{4067cf47-47a0-11df-b99b-001060b300bf}\ not found.
File G:\2ul.exe not found.
Registry key HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{57270bd4-9329-11de-b882-000aeb0219e3}\ deleted successfully.
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{57270bd4-9329-11de-b882-000aeb0219e3}\ not found.
Registry key HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{57270bd4-9329-11de-b882-000aeb0219e3}\ not found.
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{57270bd4-9329-11de-b882-000aeb0219e3}\ not found.
File E:\AutoRunCardDetector.exe not found.
Registry key HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{6561d315-27b7-11df-b975-001060b300bf}\ deleted successfully.
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{6561d315-27b7-11df-b975-001060b300bf}\ not found.
File F:\k1d.exe not found.
Registry key HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{6561d315-27b7-11df-b975-001060b300bf}\ not found.
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{6561d315-27b7-11df-b975-001060b300bf}\ not found.
File F:\k1d.exe not found.
Registry key HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{e0ea63d9-8360-11de-b864-000aeb0219e3}\ deleted successfully.
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{e0ea63d9-8360-11de-b864-000aeb0219e3}\ not found.
File F:\wyskq6lt.exe not found.
Registry key HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{e0ea63d9-8360-11de-b864-000aeb0219e3}\ not found.
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{e0ea63d9-8360-11de-b864-000aeb0219e3}\ not found.
File F:\wyskq6lt.exe not found.
Registry value HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session manager\\BootExecute:autocheck autochk * deleted successfully.
File C:\Documents and Settings\personne\Local Settings\Application Data\uvuvcelk_nav.dat not found.
File C:\Documents and Settings\personne\Local Settings\Application Data\uvuvcelk_navps.dat not found.
File C:\Documents and Settings\personne\Local Settings\Application Data\uvuvcelk.dat not found.
File C:\Documents and Settings\personne\Local Settings\Application Data\uvuvcelk.exe not found.
Folder C:\b18eb17aff9e25d692cf\ not found.
File C:\Documents and Settings\personne\Local Settings\Application Data\haugbugb.exe not found.
File C:\Documents and Settings\personne\Local Settings\Application Data\ykvalw.exe not found.
File C:\Documents and Settings\personne\Local Settings\Application Data\dawtjg.exe not found.
File C:\Documents and Settings\personne\Local Settings\Application Data\beebcezc_nav.dat not found.
File C:\Documents and Settings\personne\Local Settings\Application Data\beebcezc.dat not found.
C:\WINDOWS\msdownld.tmp folder deleted successfully.
C:\WINDOWS\SET3.tmp deleted successfully.
C:\WINDOWS\SET4.tmp deleted successfully.
C:\WINDOWS\SET8.tmp deleted successfully.
C:\WINDOWS\System32\CONFIG.TMP deleted successfully.
C:\WINDOWS\System32\SET100.tmp deleted successfully.
C:\WINDOWS\System32\SET101.tmp deleted successfully.
C:\WINDOWS\System32\SET102.tmp deleted successfully.
C:\WINDOWS\System32\SET103.tmp deleted successfully.
C:\WINDOWS\System32\SET104.tmp deleted successfully.
C:\WINDOWS\System32\SET105.tmp deleted successfully.
C:\WINDOWS\System32\SET106.tmp deleted successfully.
C:\WINDOWS\System32\SET107.tmp deleted successfully.
C:\WINDOWS\System32\SET108.tmp deleted successfully.
C:\WINDOWS\System32\SET109.tmp deleted successfully.
C:\WINDOWS\System32\SET10A.tmp deleted successfully.
C:\WINDOWS\System32\SET10B.tmp deleted successfully.
C:\WINDOWS\System32\SET10C.tmp deleted successfully.
C:\WINDOWS\System32\SET10D.tmp deleted successfully.
C:\WINDOWS\System32\SET10E.tmp deleted successfully.
C:\WINDOWS\System32\SET10F.tmp deleted successfully.
C:\WINDOWS\System32\SET11.tmp deleted successfully.
C:\WINDOWS\System32\SET110.tmp deleted successfully.
C:\WINDOWS\System32\SET111.tmp deleted successfully.
C:\WINDOWS\System32\SET112.tmp deleted successfully.
C:\WINDOWS\System32\SET113.tmp deleted successfully.
C:\WINDOWS\System32\SET114.tmp deleted successfully.
C:\WINDOWS\System32\SET115.tmp deleted successfully.
C:\WINDOWS\System32\SET116.tmp deleted successfully.
C:\WINDOWS\System32\SET117.tmp deleted successfully.
C:\WINDOWS\System32\SET118.tmp deleted successfully.
C:\WINDOWS\System32\SET119.tmp deleted successfully.
C:\WINDOWS\System32\SET11A.tmp deleted successfully.
C:\WINDOWS\System32\SET11B.tmp deleted successfully.
C:\WINDOWS\System32\SET11C.tmp deleted successfully.
C:\WINDOWS\System32\SET11D.tmp deleted successfully.
C:\WINDOWS\System32\SET11E.tmp deleted successfully.
C:\WINDOWS\System32\SET11F.tmp deleted successfully.
C:\WINDOWS\System32\SET120.tmp deleted successfully.
C:\WINDOWS\System32\SET121.tmp deleted successfully.
C:\WINDOWS\System32\SET122.tmp deleted successfully.
C:\WINDOWS\System32\SET123.tmp deleted successfully.
C:\WINDOWS\System32\SET124.tmp deleted successfully.
C:\WINDOWS\System32\SET125.tmp deleted successfully.
C:\WINDOWS\System32\SET126.tmp deleted successfully.
C:\WINDOWS\System32\SET127.tmp deleted successfully.
C:\WINDOWS\System32\SET128.tmp deleted successfully.
C:\WINDOWS\System32\SET129.tmp deleted successfully.
C:\WINDOWS\System32\SET12A.tmp deleted successfully.
C:\WINDOWS\System32\SET12B.tmp deleted successfully.
C:\WINDOWS\System32\SET12C.tmp deleted successfully.
C:\WINDOWS\System32\SET12D.tmp deleted successfully.
C:\WINDOWS\System32\SET12E.tmp deleted successfully.
C:\WINDOWS\System32\SET12F.tmp deleted successfully.
C:\WINDOWS\System32\SET130.tmp deleted successfully.
C:\WINDOWS\System32\SET131.tmp deleted successfully.
C:\WINDOWS\System32\SET132.tmp deleted successfully.
C:\WINDOWS\System32\SET133.tmp deleted successfully.
C:\WINDOWS\System32\SET134.tmp deleted successfully.
C:\WINDOWS\System32\SET135.tmp deleted successfully.
C:\WINDOWS\System32\SET136.tmp deleted successfully.
C:\WINDOWS\System32\SET137.tmp deleted successfully.
C:\WINDOWS\System32\SET138.tmp deleted successfully.
C:\WINDOWS\System32\SET139.tmp deleted successfully.
C:\WINDOWS\System32\SET13A.tmp deleted successfully.
C:\WINDOWS\System32\SET13B.tmp deleted successfully.
C:\WINDOWS\System32\SET13C.tmp deleted successfully.
C:\WINDOWS\System32\SET13D.tmp deleted successfully.
C:\WINDOWS\System32\SET13E.tmp deleted successfully.
C:\WINDOWS\System32\SET13F.tmp deleted successfully.
C:\WINDOWS\System32\SET140.tmp deleted successfully.
C:\WINDOWS\System32\SET141.tmp deleted successfully.
C:\WINDOWS\System32\SET142.tmp deleted successfully.
C:\WINDOWS\System32\SET143.tmp deleted successfully.
C:\WINDOWS\System32\SET144.tmp deleted successfully.
C:\WINDOWS\System32\SET145.tmp deleted successfully.
C:\WINDOWS\System32\SET146.tmp deleted successfully.
C:\WINDOWS\System32\SET147.tmp deleted successfully.
C:\WINDOWS\System32\SET148.tmp deleted successfully.
C:\WINDOWS\System32\SET149.tmp deleted successfully.
C:\WINDOWS\System32\SET14A.tmp deleted successfully.
C:\WINDOWS\System32\SET14B.tmp deleted successfully.
C:\WINDOWS\System32\SET14C.tmp deleted successfully.
C:\WINDOWS\System32\SET14D.tmp deleted successfully.
C:\WINDOWS\System32\SET14E.tmp deleted successfully.
C:\WINDOWS\System32\SET14F.tmp deleted successfully.
C:\WINDOWS\System32\SET150.tmp deleted successfully.
C:\WINDOWS\System32\SET151.tmp deleted successfully.
C:\WINDOWS\System32\SET152.tmp deleted successfully.
C:\WINDOWS\System32\SET153.tmp deleted successfully.
C:\WINDOWS\System32\SET154.tmp deleted successfully.
C:\WINDOWS\System32\SET16.tmp deleted successfully.
C:\WINDOWS\System32\SET17.tmp deleted successfully.
C:\WINDOWS\System32\SET178.tmp deleted successfully.
C:\WINDOWS\System32\SET179.tmp deleted successfully.
C:\WINDOWS\System32\SET17A.tmp deleted successfully.
C:\WINDOWS\System32\SET17B.tmp deleted successfully.
C:\WINDOWS\System32\SET17C.tmp deleted successfully.
C:\WINDOWS\System32\SET17D.tmp deleted successfully.
C:\WINDOWS\System32\SET17E.tmp deleted successfully.
C:\WINDOWS\System32\SET17F.tmp deleted successfully.
C:\WINDOWS\System32\SET18.tmp deleted successfully.
C:\WINDOWS\System32\SET19.tmp deleted successfully.
C:\WINDOWS\System32\SET1A.tmp deleted successfully.
C:\WINDOWS\System32\SET1B.tmp deleted successfully.
C:\WINDOWS\System32\SET1C.tmp deleted successfully.
C:\WINDOWS\System32\SET1D.tmp deleted successfully.
C:\WINDOWS\System32\SET1E.tmp deleted successfully.
C:\WINDOWS\System32\SET1F.tmp deleted successfully.
C:\WINDOWS\System32\SET20.tmp deleted successfully.
C:\WINDOWS\System32\SET26.tmp deleted successfully.
C:\WINDOWS\System32\SET33.tmp deleted successfully.
C:\WINDOWS\System32\SET3A.tmp deleted successfully.
C:\WINDOWS\System32\SET48.tmp deleted successfully.
C:\WINDOWS\System32\SET59.tmp deleted successfully.
C:\WINDOWS\System32\SET5C.tmp deleted successfully.
C:\WINDOWS\System32\SET6.tmp deleted successfully.
C:\WINDOWS\System32\SET64.tmp deleted successfully.
C:\WINDOWS\System32\SET85.tmp deleted successfully.
C:\WINDOWS\System32\SET86.tmp deleted successfully.
C:\WINDOWS\System32\SET87.tmp deleted successfully.
C:\WINDOWS\System32\SET88.tmp deleted successfully.
C:\WINDOWS\System32\SET89.tmp deleted successfully.
C:\WINDOWS\System32\SET8A.tmp deleted successfully.
C:\WINDOWS\System32\SET8B.tmp deleted successfully.
C:\WINDOWS\System32\SET8C.tmp deleted successfully.
C:\WINDOWS\System32\SET8D.tmp deleted successfully.
C:\WINDOWS\System32\SET8E.tmp deleted successfully.
C:\WINDOWS\System32\SET8F.tmp deleted successfully.
C:\WINDOWS\System32\SET90.tmp deleted successfully.
C:\WINDOWS\System32\SET91.tmp deleted successfully.
C:\WINDOWS\System32\SET92.tmp deleted successfully.
C:\WINDOWS\System32\SET93.tmp deleted successfully.
C:\WINDOWS\System32\SET94.tmp deleted successfully.
C:\WINDOWS\System32\SET95.tmp deleted successfully.
C:\WINDOWS\System32\SET96.tmp deleted successfully.
C:\WINDOWS\System32\SET97.tmp deleted successfully.
C:\WINDOWS\System32\SET98.tmp deleted successfully.
C:\WINDOWS\System32\SET99.tmp deleted successfully.
C:\WINDOWS\System32\SET9A.tmp deleted successfully.
C:\WINDOWS\System32\SET9B.tmp deleted successfully.
C:\WINDOWS\System32\SET9C.tmp deleted successfully.
C:\WINDOWS\System32\SET9D.tmp deleted successfully.
C:\WINDOWS\System32\SET9E.tmp deleted successfully.
C:\WINDOWS\System32\SET9F.tmp deleted successfully.
C:\WINDOWS\System32\SETA0.tmp deleted successfully.
C:\WINDOWS\System32\SETA1.tmp deleted successfully.
C:\WINDOWS\System32\SETA2.tmp deleted successfully.
C:\WINDOWS\System32\SETA3.tmp deleted successfully.
C:\WINDOWS\System32\SETA4.tmp deleted successfully.
C:\WINDOWS\System32\SETA5.tmp deleted successfully.
C:\WINDOWS\System32\SETA6.tmp deleted successfully.
C:\WINDOWS\System32\SETA7.tmp deleted successfully.
C:\WINDOWS\System32\SETA8.tmp deleted successfully.
C:\WINDOWS\System32\SETA9.tmp deleted successfully.
C:\WINDOWS\System32\SETAA.tmp deleted successfully.
C:\WINDOWS\System32\SETAB.tmp deleted successfully.
C:\WINDOWS\System32\SETAC.tmp deleted successfully.
C:\WINDOWS\System32\SETAD.tmp deleted successfully.
C:\WINDOWS\System32\SETAE.tmp deleted successfully.
C:\WINDOWS\System32\SETAF.tmp deleted successfully.
C:\WINDOWS\System32\SETB0.tmp deleted successfully.
C:\WINDOWS\System32\SETB1.tmp deleted successfully.
C:\WINDOWS\System32\SETB2.tmp deleted successfully.
C:\WINDOWS\System32\SETB3.tmp deleted successfully.
C:\WINDOWS\System32\SETB4.tmp deleted successfully.
C:\WINDOWS\System32\SETB5.tmp deleted successfully.
C:\WINDOWS\System32\SETB6.tmp deleted successfully.
C:\WINDOWS\System32\SETB7.tmp deleted successfully.
C:\WINDOWS\System32\SETB8.tmp deleted successfully.
C:\WINDOWS\System32\SETB9.tmp deleted successfully.
C:\WINDOWS\System32\SETBA.tmp deleted successfully.
C:\WINDOWS\System32\SETBB.tmp deleted successfully.
C:\WINDOWS\System32\SETBC.tmp deleted successfully.
C:\WINDOWS\System32\SETBD.tmp deleted successfully.
C:\WINDOWS\System32\SETBE.tmp deleted successfully.
C:\WINDOWS\System32\SETBF.tmp deleted successfully.
C:\WINDOWS\System32\SETC0.tmp deleted successfully.
C:\WINDOWS\System32\SETC1.tmp deleted successfully.
C:\WINDOWS\System32\SETC2.tmp deleted successfully.
C:\WINDOWS\System32\SETC3.tmp deleted successfully.
C:\WINDOWS\System32\SETC4.tmp deleted successfully.
C:\WINDOWS\System32\SETC5.tmp deleted successfully.
C:\WINDOWS\System32\SETC6.tmp deleted successfully.
C:\WINDOWS\System32\SETC7.tmp deleted successfully.
C:\WINDOWS\System32\SETC8.tmp deleted successfully.
C:\WINDOWS\System32\SETC9.tmp deleted successfully.
C:\WINDOWS\System32\SETCA.tmp deleted successfully.
C:\WINDOWS\System32\SETCB.tmp deleted successfully.
C:\WINDOWS\System32\SETCC.tmp deleted successfully.
C:\WINDOWS\System32\SETCD.tmp deleted successfully.
C:\WINDOWS\System32\SETCE.tmp deleted successfully.
C:\WINDOWS\System32\SETCF.tmp deleted successfully.
C:\WINDOWS\System32\SETD.tmp deleted successfully.
C:\WINDOWS\System32\SETD0.tmp deleted successfully.
C:\WINDOWS\System32\SETD1.tmp deleted successfully.
C:\WINDOWS\System32\SETD2.tmp deleted successfully.
C:\WINDOWS\System32\SETD3.tmp deleted successfully.
C:\WINDOWS\System32\SETD4.tmp deleted successfully.
C:\WINDOWS\System32\SETD5.tmp deleted successfully.
C:\WINDOWS\System32\SETD6.tmp deleted successfully.
C:\WINDOWS\System32\SETD7.tmp deleted successfully.
C:\WINDOWS\System32\SETD8.tmp deleted successfully.
C:\WINDOWS\System32\SETD9.tmp deleted successfully.
C:\WINDOWS\System32\SETDA.tmp deleted successfully.
C:\WINDOWS\System32\SETDB.tmp deleted successfully.
C:\WINDOWS\System32\SETDC.tmp deleted successfully.
C:\WINDOWS\System32\SETDD.tmp deleted successfully.
C:\WINDOWS\System32\SETDE.tmp deleted successfully.
C:\WINDOWS\System32\SETDF.tmp deleted successfully.
C:\WINDOWS\System32\SETE0.tmp deleted successfully.
C:\WINDOWS\System32\SETE1.tmp deleted successfully.
C:\WINDOWS\System32\SETE2.tmp deleted successfully.
C:\WINDOWS\System32\SETE3.tmp deleted successfully.
C:\WINDOWS\System32\SETE4.tmp deleted successfully.
C:\WINDOWS\System32\SETE5.tmp deleted successfully.
C:\WINDOWS\System32\SETE6.tmp deleted successfully.
C:\WINDOWS\System32\SETE7.tmp deleted successfully.
C:\WINDOWS\System32\SETE8.tmp deleted successfully.
C:\WINDOWS\System32\SETE9.tmp deleted successfully.
C:\WINDOWS\System32\SETEA.tmp deleted successfully.
C:\WINDOWS\System32\SETEB.tmp deleted successfully.
C:\WINDOWS\System32\SETEC.tmp deleted successfully.
C:\WINDOWS\System32\SETED.tmp deleted successfully.
C:\WINDOWS\System32\SETEE.tmp deleted successfully.
C:\WINDOWS\System32\SETF.tmp deleted successfully.
C:\WINDOWS\System32\SETF0.tmp deleted successfully.
C:\WINDOWS\System32\SETF1.tmp deleted successfully.
C:\WINDOWS\System32\SETF2.tmp deleted successfully.
C:\WINDOWS\System32\SETF3.tmp deleted successfully.
C:\WINDOWS\System32\SETF4.tmp deleted successfully.
C:\WINDOWS\System32\SETF5.tmp deleted successfully.
C:\WINDOWS\System32\SETF6.tmp deleted successfully.
C:\WINDOWS\System32\SETF7.tmp deleted successfully.
C:\WINDOWS\System32\SETF8.tmp deleted successfully.
C:\WINDOWS\System32\SETF9.tmp deleted successfully.
C:\WINDOWS\System32\SETFA.tmp deleted successfully.
C:\WINDOWS\System32\SETFB.tmp deleted successfully.
C:\WINDOWS\System32\SETFC.tmp deleted successfully.
C:\WINDOWS\System32\SETFD.tmp deleted successfully.
C:\WINDOWS\System32\SETFE.tmp deleted successfully.
C:\WINDOWS\System32\SETFF.tmp deleted successfully.
C:\WINDOWS\System32\dllcache\SET51.tmp deleted successfully.
C:\WINDOWS\System32\dllcache\SET52.tmp deleted successfully.
C:\WINDOWS\System32\dllcache\SET53.tmp deleted successfully.
C:\WINDOWS\System32\dllcache\SET54.tmp deleted successfully.
C:\WINDOWS\System32\dllcache\SET55.tmp deleted successfully.
C:\WINDOWS\System32\dllcache\SET56.tmp deleted successfully.
C:\WINDOWS\System32\dllcache\SET57.tmp deleted successfully.
C:\WINDOWS\System32\dllcache\SET58.tmp deleted successfully.
C:\WINDOWS\System32\dllcache\SET59.tmp deleted successfully.
C:\WINDOWS\System32\dllcache\SET5A.tmp deleted successfully.
C:\WINDOWS\System32\dllcache\SET5B.tmp deleted successfully.
C:\WINDOWS\System32\dllcache\SET5C.tmp deleted successfully.
C:\WINDOWS\System32\dllcache\SET5D.tmp deleted successfully.
C:\WINDOWS\System32\dllcache\SET5E.tmp deleted successfully.
C:\WINDOWS\System32\dllcache\SET5F.tmp deleted successfully.
C:\WINDOWS\System32\dllcache\SET60.tmp deleted successfully.
C:\WINDOWS\System32\dllcache\SET61.tmp deleted successfully.
C:\WINDOWS\System32\dllcache\SET62.tmp deleted successfully.
C:\WINDOWS\System32\dllcache\SET63.tmp deleted successfully.
C:\WINDOWS\System32\dllcache\SET64.tmp deleted successfully.
C:\WINDOWS\System32\dllcache\SET65.tmp deleted successfully.
C:\WINDOWS\System32\dllcache\SET66.tmp deleted successfully.
C:\WINDOWS\System32\dllcache\SET67.tmp deleted successfully.
C:\WINDOWS\System32\dllcache\SET68.tmp deleted successfully.
C:\WINDOWS\System32\dllcache\SET69.tmp deleted successfully.
C:\WINDOWS\System32\dllcache\SET6A.tmp deleted successfully.
C:\WINDOWS\System32\dllcache\SET6B.tmp deleted successfully.
C:\WINDOWS\System32\dllcache\SET6C.tmp deleted successfully.
C:\WINDOWS\System32\dllcache\SET6D.tmp deleted successfully.
C:\WINDOWS\System32\dllcache\SET6E.tmp deleted successfully.
C:\WINDOWS\System32\dllcache\SET6F.tmp deleted successfully.
C:\WINDOWS\System32\dllcache\SET70.tmp deleted successfully.
C:\WINDOWS\System32\dllcache\SET71.tmp deleted successfully.
C:\WINDOWS\System32\dllcache\SET72.tmp deleted successfully.
C:\WINDOWS\System32\dllcache\SET73.tmp deleted successfully.
C:\WINDOWS\System32\dllcache\SET74.tmp deleted successfully.
C:\WINDOWS\System32\dllcache\SET75.tmp deleted successfully.
C:\WINDOWS\System32\dllcache\SET76.tmp deleted successfully.
C:\WINDOWS\System32\dllcache\SET77.tmp deleted successfully.
C:\WINDOWS\System32\dllcache\SET78.tmp deleted successfully.
C:\WINDOWS\System32\dllcache\SET79.tmp deleted successfully.
C:\WINDOWS\System32\dllcache\SET7A.tmp deleted successfully.
C:\WINDOWS\System32\dllcache\SET7B.tmp deleted successfully.
C:\WINDOWS\System32\dllcache\SET7C.tmp deleted successfully.
C:\WINDOWS\System32\dllcache\SET7D.tmp deleted successfully.
C:\WINDOWS\System32\dllcache\SET7E.tmp deleted successfully.
C:\WINDOWS\System32\dllcache\SET7F.tmp deleted successfully.
C:\WINDOWS\System32\dllcache\SET80.tmp deleted successfully.
C:\WINDOWS\System32\dllcache\SET81.tmp deleted successfully.
C:\WINDOWS\System32\dllcache\SET82.tmp deleted successfully.
C:\WINDOWS\System32\dllcache\SET83.tmp deleted successfully.
C:\WINDOWS\System32\dllcache\SET84.tmp deleted successfully.
C:\WINDOWS\System32\dllcache\SET85.tmp deleted successfully.
C:\WINDOWS\System32\dllcache\SET86.tmp deleted successfully.
C:\WINDOWS\System32\dllcache\SET87.tmp deleted successfully.
C:\WINDOWS\System32\dllcache\SET88.tmp deleted successfully.
C:\WINDOWS\System32\dllcache\SET89.tmp deleted successfully.
C:\WINDOWS\System32\dllcache\SET8A.tmp deleted successfully.
C:\WINDOWS\System32\dllcache\SET8B.tmp deleted successfully.
C:\WINDOWS\System32\dllcache\SET8C.tmp deleted successfully.
C:\WINDOWS\System32\dllcache\SET8D.tmp deleted successfully.
C:\WINDOWS\System32\dllcache\SET8E.tmp deleted successfully.
C:\WINDOWS\System32\dllcache\SET8F.tmp deleted successfully.
C:\WINDOWS\System32\dllcache\SET90.tmp deleted successfully.
C:\WINDOWS\System32\dllcache\SET91.tmp deleted successfully.
C:\WINDOWS\System32\dllcache\SET92.tmp deleted successfully.
C:\WINDOWS\System32\dllcache\SET93.tmp deleted successfully.
C:\WINDOWS\System32\dllcache\SET94.tmp deleted successfully.
C:\WINDOWS\System32\dllcache\SET95.tmp deleted successfully.
C:\WINDOWS\System32\dllcache\SET96.tmp deleted successfully.
C:\WINDOWS\System32\dllcache\SET97.tmp deleted successfully.
C:\WINDOWS\System32\dllcache\SET98.tmp deleted successfully.
C:\WINDOWS\System32\dllcache\SET99.tmp deleted successfully.
C:\WINDOWS\System32\dllcache\SET9A.tmp deleted successfully.
C:\WINDOWS\System32\dllcache\SET9B.tmp deleted successfully.
C:\WINDOWS\System32\dllcache\SET9C.tmp deleted successfully.
C:\WINDOWS\System32\dllcache\SET9D.tmp deleted successfully.
C:\WINDOWS\System32\dllcache\SET9E.tmp deleted successfully.
C:\WINDOWS\System32\dllcache\SET9F.tmp deleted successfully.
C:\WINDOWS\System32\dllcache\SETA0.tmp deleted successfully.
C:\WINDOWS\System32\dllcache\SETA1.tmp deleted successfully.
C:\WINDOWS\System32\dllcache\SETA2.tmp deleted successfully.
C:\WINDOWS\System32\dllcache\SETA3.tmp deleted successfully.
C:\WINDOWS\System32\dllcache\SETA4.tmp deleted successfully.
C:\WINDOWS\System32\dllcache\SETA5.tmp deleted successfully.
C:\WINDOWS\System32\dllcache\SETA6.tmp deleted successfully.
C:\WINDOWS\System32\dllcache\SETA7.tmp deleted successfully.
C:\WINDOWS\System32\dllcache\SETA8.tmp deleted successfully.
C:\WINDOWS\System32\dllcache\SETA9.tmp deleted successfully.
C:\WINDOWS\System32\dllcache\SETAA.tmp deleted successfully.
C:\WINDOWS\System32\dllcache\SETAB.tmp deleted successfully.
C:\WINDOWS\System32\dllcache\SETAC.tmp deleted successfully.
C:\WINDOWS\System32\dllcache\SETAD.tmp deleted successfully.
C:\WINDOWS\System32\dllcache\SETAE.tmp deleted successfully.
C:\WINDOWS\System32\dllcache\SETAF.tmp deleted successfully.
C:\WINDOWS\System32\dllcache\SETB0.tmp deleted successfully.
C:\WINDOWS\System32\dllcache\SETB1.tmp deleted successfully.
C:\WINDOWS\System32\dllcache\SETB2.tmp deleted successfully.
C:\WINDOWS\System32\dllcache\SETB3.tmp deleted successfully.
C:\WINDOWS\System32\dllcache\SETB4.tmp deleted successfully.
C:\WINDOWS\System32\dllcache\SETB5.tmp deleted successfully.
C:\WINDOWS\System32\dllcache\SETB6.tmp deleted successfully.
C:\WINDOWS\System32\dllcache\SETB7.tmp deleted successfully.
C:\WINDOWS\System32\dllcache\SETB8.tmp deleted successfully.
C:\WINDOWS\System32\dllcache\SETB9.tmp deleted successfully.
C:\WINDOWS\System32\dllcache\SETBA.tmp deleted successfully.
C:\WINDOWS\System32\dllcache\SETBB.tmp deleted successfully.
C:\WINDOWS\System32\dllcache\SETBC.tmp deleted successfully.
C:\WINDOWS\System32\dllcache\SETBD.tmp deleted successfully.
C:\WINDOWS\System32\dllcache\SETBE.tmp deleted successfully.
C:\WINDOWS\System32\dllcache\SETBF.tmp deleted successfully.
C:\WINDOWS\System32\dllcache\SETC0.tmp deleted successfully.
C:\WINDOWS\System32\dllcache\SETC1.tmp deleted successfully.
C:\WINDOWS\System32\dllcache\SETC2.tmp deleted successfully.
C:\WINDOWS\System32\dllcache\SETC3.tmp deleted successfully.
C:\WINDOWS\System32\dllcache\SETC4.tmp deleted successfully.
C:\WINDOWS\System32\dllcache\SETC5.tmp deleted successfully.
C:\WINDOWS\System32\dllcache\SETC6.tmp deleted successfully.
C:\WINDOWS\System32\dllcache\SETC7.tmp deleted successfully.
C:\WINDOWS\System32\dllcache\SETC8.tmp deleted successfully.
C:\WINDOWS\System32\dllcache\SETC9.tmp deleted successfully.
C:\WINDOWS\System32\dllcache\SETCA.tmp deleted successfully.
C:\WINDOWS\System32\dllcache\SETCB.tmp deleted successfully.
C:\WINDOWS\System32\dllcache\SETCC.tmp deleted successfully.
C:\WINDOWS\System32\dllcache\SETCD.tmp deleted successfully.
C:\WINDOWS\System32\dllcache\SETCE.tmp deleted successfully.
C:\WINDOWS\System32\dllcache\SETCF.tmp deleted successfully.
C:\WINDOWS\System32\dllcache\SETD0.tmp deleted successfully.
C:\WINDOWS\System32\dllcache\SETD1.tmp deleted successfully.
C:\WINDOWS\System32\dllcache\SETD2.tmp deleted successfully.
C:\WINDOWS\System32\dllcache\SETD3.tmp deleted successfully.
C:\WINDOWS\System32\dllcache\SETD4.tmp deleted successfully.
C:\WINDOWS\System32\dllcache\SETD5.tmp deleted successfully.
C:\WINDOWS\System32\dllcache\SETD6.tmp deleted successfully.
C:\WINDOWS\System32\dllcache\SETD7.tmp deleted successfully.
C:\WINDOWS\System32\dllcache\SETD8.tmp deleted successfully.
C:\WINDOWS\System32\dllcache\SETD9.tmp deleted successfully.
C:\WINDOWS\System32\dllcache\SETDA.tmp deleted successfully.
C:\WINDOWS\System32\dllcache\SETDB.tmp deleted successfully.
C:\WINDOWS\System32\dllcache\SETDC.tmp deleted successfully.
C:\WINDOWS\System32\dllcache\SETDD.tmp deleted successfully.
C:\WINDOWS\System32\dllcache\SETDE.tmp deleted successfully.
C:\WINDOWS\System32\dllcache\SETDF.tmp deleted successfully.
C:\WINDOWS\System32\dllcache\SETE0.tmp deleted successfully.
C:\WINDOWS\System32\dllcache\SETE1.tmp deleted successfully.
Unable to delete ADS C:\Documents and Settings\personne\Mes documents\Shareaza Downloads:Shareaza.GUID .
ADS C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:F6E5C7FB deleted successfully.
ADS C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:C0D722EB deleted successfully.
ADS C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:38849DE5 deleted successfully.
ADS C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:E6C58E14 deleted successfully.
ADS C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:DE38CB5F deleted successfully.
ADS C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:DAFD38AE deleted successfully.
ADS C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:CBEB737E deleted successfully.
ADS C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:5425B7F5 deleted successfully.
ADS C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:3FBB88CF deleted successfully.
ADS C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:E7123C4C deleted successfully.
ADS C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:E71141D2 deleted successfully.
ADS C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:E31D4564 deleted successfully.
ADS C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:E1F04E8D deleted successfully.
ADS C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:D05E7A8B deleted successfully.
ADS C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:93C48025 deleted successfully.
ADS C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:7079A696 deleted successfully.
ADS C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:4C509008 deleted successfully.
ADS C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:4B49E3BC deleted successfully.
ADS C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:0651F96C deleted successfully.
ADS C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:D4E73D7F deleted successfully.
ADS C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:B17C9C5E deleted successfully.
ADS C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:A518B662 deleted successfully.
ADS C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:52A42F4C deleted successfully.
ADS C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:49F896E9 deleted successfully.
ADS C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:45A334DD deleted successfully.
ADS C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:41099CE9 deleted successfully.
ADS C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:DCDE7C60 deleted successfully.
ADS C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:CF2C26D2 deleted successfully.
ADS C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:87FA5E8A deleted successfully.
ADS C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:700B8E2E deleted successfully.
ADS C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:550179F5 deleted successfully.
ADS C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:FE4E15B1 deleted successfully.
ADS C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:88BFF41D deleted successfully.
ADS C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:6CC86DF2 deleted successfully.
ADS C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:666FB4AA deleted successfully.
ADS C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:41C283B2 deleted successfully.
ADS C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:2CBB1EC8 deleted successfully.
ADS C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:E1982A23 deleted successfully.
ADS C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:A163B050 deleted successfully.
ADS C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:8BB2EE92 deleted successfully.
ADS C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:50A11A00 deleted successfully.
ADS C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:3612C9BE deleted successfully.
ADS C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:ED66F190 deleted successfully.
ADS C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:D93DCF15 deleted successfully.
ADS C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:6051163F deleted successfully.
ADS C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:1B7E916D deleted successfully.
ADS C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:E62BE020 deleted successfully.
ADS C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:C40E212B deleted successfully.
ADS C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:BAC9506D deleted successfully.
ADS C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:A118E9A3 deleted successfully.
ADS C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:726A7C8D deleted successfully.
ADS C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:6FCD73D7 deleted successfully.
ADS C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:5E3FBF9D deleted successfully.
ADS C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:3B9582E0 deleted successfully.
ADS C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:2A5BC0A9 deleted successfully.
ADS C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:1D60AEC3 deleted successfully.
ADS C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:FEF919E6 deleted successfully.
ADS C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:D8A7F3FF deleted successfully.
ADS C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:C4A1F01E deleted successfully.
ADS C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:A86C3734 deleted successfully.
ADS C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:8FF962C6 deleted successfully.
ADS C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:74BB299D deleted successfully.
ADS C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:54CB420C deleted successfully.
ADS C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:48529647 deleted successfully.
ADS C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:2F34C507 deleted successfully.
ADS C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:20B17557 deleted successfully.
ADS C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:204BEE0F deleted successfully.
ADS C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:092DD1DD deleted successfully.
ADS C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:F878F14A deleted successfully.
ADS C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:D20FFA63 deleted successfully.
ADS C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:CBCE0A92 deleted successfully.
ADS C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:94B65E3C deleted successfully.
ADS C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:1AF93AF4 deleted successfully.
ADS C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:F42CF153 deleted successfully.
ADS C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:E3AFC61E deleted successfully.
ADS C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:E1069F99 deleted successfully.
ADS C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:D8EA2847 deleted successfully.
ADS C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:69EC5FA7 deleted successfully.
ADS C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:5B111056 deleted successfully.
ADS C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:478FEFC3 deleted successfully.
ADS C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:DBA1A307 deleted successfully.
ADS C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:588B60C7 deleted successfully.
ADS C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:27B99ED6 deleted successfully.
ADS C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:24AB14E7 deleted successfully.
ADS C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:131C0EE9 deleted successfully.
ADS C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:D5458F6B deleted successfully.
ADS C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:69B9AAE7 deleted successfully.
ADS C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:51A22C60 deleted successfully.
ADS C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:14168AA3 deleted successfully.
ADS C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:002640E3 deleted successfully.
ADS C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:FDD78BE5 deleted successfully.
ADS C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:EF4B1DA9 deleted successfully.
ADS C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:EC36F550 deleted successfully.
ADS C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:E2C7E93F deleted successfully.
ADS C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:C8EAE2CC deleted successfully.
ADS C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:9F36615A deleted successfully.
ADS C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:90E60569 deleted successfully.
ADS C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:4FFA5B5C deleted successfully.
ADS C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:001F2DD1 deleted successfully.
ADS C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:F791B5EF deleted successfully.
ADS C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:88555A1F deleted successfully.
ADS C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:445352A1 deleted successfully.
ADS C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:2A8A3140 deleted successfully.
ADS C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:0D713C0D deleted successfully.
ADS C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:CDFF58FE deleted successfully.
ADS C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:864A52B8 deleted successfully.
ADS C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:74B502CB deleted successfully.
ADS C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:41B89F80 deleted successfully.
ADS C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:17DA7CD5 deleted successfully.
ADS C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:FE74DAB1 deleted successfully.
ADS C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:F01E7F17 deleted successfully.
ADS C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:D091E13E deleted successfully.
ADS C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:79F970BE deleted successfully.
ADS C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:B8EA2C49 deleted successfully.
ADS C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:B5D277AB deleted successfully.
ADS C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:9B750A13 deleted successfully.
ADS C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:97A03D0F deleted successfully.
ADS C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:77846FFE deleted successfully.
ADS C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:6D4F7F2B deleted successfully.
ADS C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:46545F5C deleted successfully.
ADS C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:DD831FA6 deleted successfully.
ADS C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:902B3C72 deleted successfully.
ADS C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:861A898F deleted successfully.
ADS C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:078B239B deleted successfully.
ADS C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:E6A84C9D deleted successfully.
ADS C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:857692EC deleted successfully.
ADS C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:84499DA6 deleted successfully.
ADS C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:3965C4E8 deleted successfully.
ADS C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:2085D07D deleted successfully.
ADS C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:13B137AF deleted successfully.
ADS C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:A4AD016E deleted successfully.
ADS C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:68DA8CC0 deleted successfully.
ADS C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:5A27D490 deleted successfully.
ADS C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:4C97EF04 deleted successfully.
ADS C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:2556A8A0 deleted successfully.
ADS C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:FAC5BCF5 deleted successfully.
ADS C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:A9EB5571 deleted successfully.
ADS C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:82C50600 deleted successfully.
ADS C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:7DFDF9DF deleted successfully.
ADS C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:76084F6D deleted successfully.
ADS C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:6CEB2458 deleted successfully.
ADS C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:3780BCC3 deleted successfully.
ADS C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:E495057A deleted successfully.
ADS C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:C36E5828 deleted successfully.
ADS C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:B8B102B9 deleted successfully.
ADS C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:8CE601F5 deleted successfully.
ADS C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:7C8950EF deleted successfully.
ADS C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:5C5A503E deleted successfully.
ADS C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:54F7A151 deleted successfully.
ADS C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:4D3513A5 deleted successfully.
ADS C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:4CD2D817 deleted successfully.
ADS C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:2504A086 deleted successfully.
ADS C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:016C09C5 deleted successfully.
ADS C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:DD3F5AF4 deleted successfully.
ADS C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:BD2054EF deleted successfully.
ADS C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:8F7ECF6A deleted successfully.
ADS C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:70F0A2F4 deleted successfully.
ADS C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:615435BE deleted successfully.
ADS C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:54997B77 deleted successfully.
ADS C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:04893BD0 deleted successfully.
ADS C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:FD444D31 deleted successfully.
ADS C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:B54102AD deleted successfully.
ADS C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:74456BF5 deleted successfully.
ADS C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:5A13AEC2 deleted successfully.
ADS C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:3447AB86 deleted successfully.
ADS C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:1D9ED8F7 deleted successfully.
ADS C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:18AA05CB deleted successfully.
ADS C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:029E021F deleted successfully.
ADS C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:F854E9B8 deleted successfully.
ADS C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:1013B07C deleted successfully.
ADS C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:F86CC73E deleted successfully.
ADS C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:D11BEC54 deleted successfully.
ADS C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:81C88EA7 deleted successfully.
ADS C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:7F66BF58 deleted successfully.
ADS C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:1BC99E01 deleted successfully.
ADS C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:05816AFA deleted successfully.
ADS C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:F79CBFC4 deleted successfully.
ADS C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:ED45A20F deleted successfully.
ADS C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:B6C84920 deleted successfully.
ADS C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:A4C20950 deleted successfully.
ADS C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:4F636E25 deleted successfully.
ADS C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:409F27A9 deleted successfully.
ADS C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:0A9883D3 deleted successfully.
ADS C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:023F0743 deleted successfully.
ADS C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:86A8CE8D deleted successfully.
ADS C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:1C93E55E deleted successfully.
ADS C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:E463CA56 deleted successfully.
ADS C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:5E4A7758 deleted successfully.
ADS C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:8599F087 deleted successfully.
ADS C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:AE78B77A deleted successfully.
ADS C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:8B9E766D deleted successfully.
ADS C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:75F5C19E deleted successfully.
ADS C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:8C443193 deleted successfully.
ADS C:\Documents and Settings\All Users.WINDOWS\Application Data\TEMP:45E74272 deleted successfully.
========== COMMANDS ==========
 
[EMPTYTEMP]
 
User: All Users
 
User: All Users.WINDOWS
 
User: Default User
 
User: Default User.WINDOWS
->Temp folder emptied: 0 bytes
->Temporary Internet Files folder emptied: 33170 bytes
->Flash cache emptied: 41620 bytes
 
User: LocalService
->Temp folder emptied: 0 bytes
->Temporary Internet Files folder emptied: 2384543 bytes
 
User: NetworkService
->Temp folder emptied: 0 bytes
->Temporary Internet Files folder emptied: 33237 bytes
 
User: personne
->Temp folder emptied: 3130019430 bytes
->Temporary Internet Files folder emptied: 223838546 bytes
->FireFox cache emptied: 41118973 bytes
->Flash cache emptied: 13534677 bytes
 
%systemdrive% .tmp files removed: 0 bytes
%systemroot% .tmp files removed: 0 bytes
%systemroot%\System32 .tmp files removed: 0 bytes
%systemroot%\System32\dllcache .tmp files removed: 0 bytes
%systemroot%\System32\drivers .tmp files removed: 0 bytes
Windows Temp folder emptied: 35423665 bytes
%systemroot%\system32\config\systemprofile\Local Settings\Temp folder emptied: 64764176 bytes
%systemroot%\system32\config\systemprofile\Local Settings\Temporary Internet Files folder emptied: 33170 bytes
RecycleBin emptied: 7053884 bytes
 
Total Files Cleaned = 3 355,00 mb
 
 
[EMPTYFLASH]
 
User: All Users
 
User: All Users.WINDOWS
 
User: Default User
 
User: Default User.WINDOWS
->Flash cache emptied: 0 bytes
 
User: LocalService
 
User: NetworkService
 
User: personne
->Flash cache emptied: 0 bytes
 
Total Flash Files Cleaned = 0,00 mb
 
C:\WINDOWS\System32\drivers\etc\Hosts moved successfully.
HOSTS file reset successfully
 
OTL by OldTimer - Version 3.2.17.3 log created on 11152010_132626

Files\Folders moved on Reboot...

Registry entries deleted on Reboot...
taz66410
Apprenti(e)
Apprenti(e)
 
Messages: 39
Inscription: 14 Nov 2010 23:21
 

Re: page publicitaire qui s'ouvre

Message le 15 Nov 2010 14:14

re,
et j'ai windos xp est ce que je fait pareil


Surtout pas, le fix est spécifique à ce PC!

Tu me poste le rapport Malwarebytes stp... :wink:
Avatar de l'utilisateur
jeanmimigab
PC-Infopraticien
PC-Infopraticien
 
Messages: 2986
Inscription: 29 Nov 2009 12:05
 

Re: page publicitaire qui s'ouvre

Message le 15 Nov 2010 16:05

voila le rapport malwarebytes

Code: Tout sélectionner
Malwarebytes' Anti-Malware 1.46
www.malwarebytes.org

Version de la base de données: 5120

Windows 5.1.2600 Service Pack 2
Internet Explorer 8.0.6001.18702

15/11/2010 16:04:09
mbam-log-2010-11-15 (16-04-09).txt

Type d'examen: Examen complet (C:\|D:\|E:\|)
Elément(s) analysé(s): 257998
Temps écoulé: 2 heure(s), 0 minute(s), 39 seconde(s)

Processus mémoire infecté(s): 0
Module(s) mémoire infecté(s): 0
Clé(s) du Registre infectée(s): 3
Valeur(s) du Registre infectée(s): 0
Elément(s) de données du Registre infecté(s): 1
Dossier(s) infecté(s): 0
Fichier(s) infecté(s): 294

Processus mémoire infecté(s):
(Aucun élément nuisible détecté)

Module(s) mémoire infecté(s):
(Aucun élément nuisible détecté)

Clé(s) du Registre infectée(s):
HKEY_CLASSES_ROOT\CLSID\MADOWN (Worm.Magania) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\NOD32KVBIT (Trojan.Frethog) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\fcn (Rogue.Residue) -> Quarantined and deleted successfully.

Valeur(s) du Registre infectée(s):
(Aucun élément nuisible détecté)

Elément(s) de données du Registre infecté(s):
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Folder\Hidden\SHOWALL\CheckedValue (Hijack.System.Hidden) -> Bad: (0) Good: (1) -> Quarantined and deleted successfully.

Dossier(s) infecté(s):
(Aucun élément nuisible détecté)

Fichier(s) infecté(s):
C:\ucivd6xi.bat (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\yf3lu6l8.bat (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\r3x0k.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\rg9g9bgq.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{33D2830F-39C5-4015-9ED8-330B79CB23E7}\RP390\A0233796.exe (Worm.Taterf) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{33D2830F-39C5-4015-9ED8-330B79CB23E7}\RP390\A0233820.exe (Worm.Taterf) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{33D2830F-39C5-4015-9ED8-330B79CB23E7}\RP390\A0233833.exe (Worm.Taterf) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{33D2830F-39C5-4015-9ED8-330B79CB23E7}\RP390\A0233871.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{33D2830F-39C5-4015-9ED8-330B79CB23E7}\RP390\A0233861.exe (Worm.Taterf) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{33D2830F-39C5-4015-9ED8-330B79CB23E7}\RP391\A0233923.exe (Worm.Taterf) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{33D2830F-39C5-4015-9ED8-330B79CB23E7}\RP392\A0234949.exe (Worm.Taterf) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{33D2830F-39C5-4015-9ED8-330B79CB23E7}\RP392\A0238991.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{33D2830F-39C5-4015-9ED8-330B79CB23E7}\RP393\A0239056.exe (Worm.Taterf) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{33D2830F-39C5-4015-9ED8-330B79CB23E7}\RP394\A0239058.exe (Worm.Taterf) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{33D2830F-39C5-4015-9ED8-330B79CB23E7}\RP394\A0240056.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{33D2830F-39C5-4015-9ED8-330B79CB23E7}\RP394\A0241065.exe (Worm.Taterf) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{33D2830F-39C5-4015-9ED8-330B79CB23E7}\RP397\A0242139.exe (Worm.Taterf) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{33D2830F-39C5-4015-9ED8-330B79CB23E7}\RP399\A0242230.exe (Worm.Taterf) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{33D2830F-39C5-4015-9ED8-330B79CB23E7}\RP402\A0245303.exe (Worm.Taterf) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{33D2830F-39C5-4015-9ED8-330B79CB23E7}\RP402\A0245314.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{33D2830F-39C5-4015-9ED8-330B79CB23E7}\RP403\A0245316.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{33D2830F-39C5-4015-9ED8-330B79CB23E7}\RP408\A0251397.exe (Worm.Taterf) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{33D2830F-39C5-4015-9ED8-330B79CB23E7}\RP411\A0256458.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{33D2830F-39C5-4015-9ED8-330B79CB23E7}\RP412\A0256474.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{33D2830F-39C5-4015-9ED8-330B79CB23E7}\RP412\A0258459.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{33D2830F-39C5-4015-9ED8-330B79CB23E7}\RP417\A0263578.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{33D2830F-39C5-4015-9ED8-330B79CB23E7}\RP418\A0264591.exe (Worm.Taterf) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{33D2830F-39C5-4015-9ED8-330B79CB23E7}\RP418\A0264612.exe (Worm.Taterf) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{33D2830F-39C5-4015-9ED8-330B79CB23E7}\RP419\A0264619.exe (Worm.Taterf) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{33D2830F-39C5-4015-9ED8-330B79CB23E7}\RP419\A0265614.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{33D2830F-39C5-4015-9ED8-330B79CB23E7}\RP419\A0266611.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{33D2830F-39C5-4015-9ED8-330B79CB23E7}\RP419\A0267611.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{33D2830F-39C5-4015-9ED8-330B79CB23E7}\RP421\A0268980.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{33D2830F-39C5-4015-9ED8-330B79CB23E7}\RP422\A0269027.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{33D2830F-39C5-4015-9ED8-330B79CB23E7}\RP422\A0269081.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{33D2830F-39C5-4015-9ED8-330B79CB23E7}\RP423\A0269133.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{33D2830F-39C5-4015-9ED8-330B79CB23E7}\RP424\A0271095.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{33D2830F-39C5-4015-9ED8-330B79CB23E7}\RP424\A0271107.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{33D2830F-39C5-4015-9ED8-330B79CB23E7}\RP425\A0271114.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{33D2830F-39C5-4015-9ED8-330B79CB23E7}\RP425\A0273106.exe (Worm.Taterf) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{33D2830F-39C5-4015-9ED8-330B79CB23E7}\RP425\A0274106.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{33D2830F-39C5-4015-9ED8-330B79CB23E7}\RP425\A0274117.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{33D2830F-39C5-4015-9ED8-330B79CB23E7}\RP426\A0274122.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{33D2830F-39C5-4015-9ED8-330B79CB23E7}\RP426\A0274133.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{33D2830F-39C5-4015-9ED8-330B79CB23E7}\RP426\A0276133.exe (Worm.Taterf) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{33D2830F-39C5-4015-9ED8-330B79CB23E7}\RP426\A0276144.exe (Trojan.GamesThief) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{33D2830F-39C5-4015-9ED8-330B79CB23E7}\RP426\A0277144.exe (Trojan.GamesThief) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{33D2830F-39C5-4015-9ED8-330B79CB23E7}\RP426\A0278144.exe (Worm.Taterf) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{33D2830F-39C5-4015-9ED8-330B79CB23E7}\RP427\A0278146.exe (Worm.Taterf) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{33D2830F-39C5-4015-9ED8-330B79CB23E7}\RP427\A0279144.exe (Worm.Taterf) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{33D2830F-39C5-4015-9ED8-330B79CB23E7}\RP427\A0279155.exe (Worm.Taterf) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{33D2830F-39C5-4015-9ED8-330B79CB23E7}\RP427\A0279165.exe (Worm.Taterf) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{33D2830F-39C5-4015-9ED8-330B79CB23E7}\RP428\A0280174.exe (Worm.Taterf) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{33D2830F-39C5-4015-9ED8-330B79CB23E7}\RP428\A0279168.exe (Worm.Taterf) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{33D2830F-39C5-4015-9ED8-330B79CB23E7}\RP428\A0280165.exe (Worm.Taterf) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{33D2830F-39C5-4015-9ED8-330B79CB23E7}\RP428\A0280176.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{33D2830F-39C5-4015-9ED8-330B79CB23E7}\RP428\A0281174.exe (Worm.Taterf) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{33D2830F-39C5-4015-9ED8-330B79CB23E7}\RP429\A0281177.exe (Worm.Taterf) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{33D2830F-39C5-4015-9ED8-330B79CB23E7}\RP429\A0282190.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{33D2830F-39C5-4015-9ED8-330B79CB23E7}\RP430\A0286191.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{33D2830F-39C5-4015-9ED8-330B79CB23E7}\RP430\A0282196.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{33D2830F-39C5-4015-9ED8-330B79CB23E7}\RP430\A0283190.exe (Worm.Taterf) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{33D2830F-39C5-4015-9ED8-330B79CB23E7}\RP430\A0287192.exe (Worm.Taterf) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{33D2830F-39C5-4015-9ED8-330B79CB23E7}\RP430\A0287203.exe (Worm.Taterf) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{33D2830F-39C5-4015-9ED8-330B79CB23E7}\RP431\A0287208.exe (Worm.Taterf) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{33D2830F-39C5-4015-9ED8-330B79CB23E7}\RP432\A0287573.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{33D2830F-39C5-4015-9ED8-330B79CB23E7}\RP432\A0287538.exe (Worm.Taterf) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{33D2830F-39C5-4015-9ED8-330B79CB23E7}\RP432\A0288565.exe (Worm.Taterf) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{33D2830F-39C5-4015-9ED8-330B79CB23E7}\RP433\A0288569.exe (Worm.Taterf) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{33D2830F-39C5-4015-9ED8-330B79CB23E7}\RP433\A0288582.exe (Worm.Taterf) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{33D2830F-39C5-4015-9ED8-330B79CB23E7}\RP433\A0288608.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{33D2830F-39C5-4015-9ED8-330B79CB23E7}\RP433\A0288619.exe (Worm.Taterf) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{33D2830F-39C5-4015-9ED8-330B79CB23E7}\RP434\A0288659.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{33D2830F-39C5-4015-9ED8-330B79CB23E7}\RP434\A0288623.exe (Worm.Taterf) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{33D2830F-39C5-4015-9ED8-330B79CB23E7}\RP434\A0288637.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{33D2830F-39C5-4015-9ED8-330B79CB23E7}\RP434\A0288676.exe (Worm.Taterf) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{33D2830F-39C5-4015-9ED8-330B79CB23E7}\RP435\A0288682.exe (Worm.Taterf) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{33D2830F-39C5-4015-9ED8-330B79CB23E7}\RP436\A0288706.exe (Worm.Taterf) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{33D2830F-39C5-4015-9ED8-330B79CB23E7}\RP436\A0289678.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{33D2830F-39C5-4015-9ED8-330B79CB23E7}\RP437\A0289699.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{33D2830F-39C5-4015-9ED8-330B79CB23E7}\RP437\A0290682.exe (Worm.Taterf) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{33D2830F-39C5-4015-9ED8-330B79CB23E7}\RP437\A0290700.exe (Worm.Taterf) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{33D2830F-39C5-4015-9ED8-330B79CB23E7}\RP437\A0290704.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{33D2830F-39C5-4015-9ED8-330B79CB23E7}\RP438\A0290710.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{33D2830F-39C5-4015-9ED8-330B79CB23E7}\RP438\A0290714.exe (Worm.Taterf) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{33D2830F-39C5-4015-9ED8-330B79CB23E7}\RP439\A0290727.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{33D2830F-39C5-4015-9ED8-330B79CB23E7}\RP439\A0290731.exe (Worm.Taterf) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{33D2830F-39C5-4015-9ED8-330B79CB23E7}\RP439\A0290745.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{33D2830F-39C5-4015-9ED8-330B79CB23E7}\RP439\A0290746.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{33D2830F-39C5-4015-9ED8-330B79CB23E7}\RP440\A0293747.exe (Worm.Taterf) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{33D2830F-39C5-4015-9ED8-330B79CB23E7}\RP440\A0293773.exe (Worm.Taterf) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{33D2830F-39C5-4015-9ED8-330B79CB23E7}\RP440\A0293774.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{33D2830F-39C5-4015-9ED8-330B79CB23E7}\RP441\A0293782.exe (Worm.Taterf) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{33D2830F-39C5-4015-9ED8-330B79CB23E7}\RP441\A0293786.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{33D2830F-39C5-4015-9ED8-330B79CB23E7}\RP442\A0293855.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{33D2830F-39C5-4015-9ED8-330B79CB23E7}\RP442\A0293859.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{33D2830F-39C5-4015-9ED8-330B79CB23E7}\RP442\A0293879.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{33D2830F-39C5-4015-9ED8-330B79CB23E7}\RP442\A0293890.dll (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{33D2830F-39C5-4015-9ED8-330B79CB23E7}\RP442\A0293894.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{33D2830F-39C5-4015-9ED8-330B79CB23E7}\RP443\A0293901.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{33D2830F-39C5-4015-9ED8-330B79CB23E7}\RP443\A0294890.dll (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{33D2830F-39C5-4015-9ED8-330B79CB23E7}\RP443\A0294894.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{33D2830F-39C5-4015-9ED8-330B79CB23E7}\RP443\A0294898.exe (Worm.Taterf) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{33D2830F-39C5-4015-9ED8-330B79CB23E7}\RP444\A0294921.exe (Worm.Taterf) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{33D2830F-39C5-4015-9ED8-330B79CB23E7}\RP444\A0294901.exe (Worm.Taterf) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{33D2830F-39C5-4015-9ED8-330B79CB23E7}\RP444\A0294903.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{33D2830F-39C5-4015-9ED8-330B79CB23E7}\RP444\A0294917.dll (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{33D2830F-39C5-4015-9ED8-330B79CB23E7}\RP444\A0294923.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{33D2830F-39C5-4015-9ED8-330B79CB23E7}\RP444\A0295917.dll (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{33D2830F-39C5-4015-9ED8-330B79CB23E7}\RP444\A0295921.exe (Worm.Taterf) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{33D2830F-39C5-4015-9ED8-330B79CB23E7}\RP444\A0295922.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{33D2830F-39C5-4015-9ED8-330B79CB23E7}\RP445\A0298922.exe (Worm.Taterf) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{33D2830F-39C5-4015-9ED8-330B79CB23E7}\RP445\A0295937.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{33D2830F-39C5-4015-9ED8-330B79CB23E7}\RP445\A0295941.exe (Worm.Taterf) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{33D2830F-39C5-4015-9ED8-330B79CB23E7}\RP445\A0296917.dll (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{33D2830F-39C5-4015-9ED8-330B79CB23E7}\RP445\A0296921.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{33D2830F-39C5-4015-9ED8-330B79CB23E7}\RP445\A0296925.exe (Worm.Taterf) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{33D2830F-39C5-4015-9ED8-330B79CB23E7}\RP445\A0298917.dll (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{33D2830F-39C5-4015-9ED8-330B79CB23E7}\RP445\A0298921.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{33D2830F-39C5-4015-9ED8-330B79CB23E7}\RP445\A0299917.dll (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{33D2830F-39C5-4015-9ED8-330B79CB23E7}\RP445\A0299923.exe (Worm.Taterf) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{33D2830F-39C5-4015-9ED8-330B79CB23E7}\RP410\A0255426.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\_OTL\MovedFiles\11152010_132626\C_\lpl.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\_OTL\MovedFiles\11152010_132626\C_\ph.exe (Worm.Magania) -> Quarantined and deleted successfully.
C:\_OTL\MovedFiles\11152010_132626\C_\0fkk02x.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\_OTL\MovedFiles\11152010_132626\C_\0qw6vege.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\_OTL\MovedFiles\11152010_132626\C_\10nb.exe (Worm.Magania) -> Quarantined and deleted successfully.
C:\_OTL\MovedFiles\11152010_132626\C_\1a1dndah.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\_OTL\MovedFiles\11152010_132626\C_\1di1w.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\_OTL\MovedFiles\11152010_132626\C_\2o1ajagt.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\_OTL\MovedFiles\11152010_132626\C_\2sm66r.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\_OTL\MovedFiles\11152010_132626\C_\2ul.exe (Trojan.GamesThief) -> Quarantined and deleted successfully.
C:\_OTL\MovedFiles\11152010_132626\C_\3c.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\_OTL\MovedFiles\11152010_132626\C_\3dcs9.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\_OTL\MovedFiles\11152010_132626\C_\3yalgc.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\_OTL\MovedFiles\11152010_132626\C_\62.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\_OTL\MovedFiles\11152010_132626\C_\6ruaqx.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\_OTL\MovedFiles\11152010_132626\C_\86.exe (Trojan.GameThief) -> Quarantined and deleted successfully.
C:\_OTL\MovedFiles\11152010_132626\C_\9b9w3.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\_OTL\MovedFiles\11152010_132626\C_\9cquqs.exe (Worm.AutoRun) -> Quarantined and deleted successfully.
C:\_OTL\MovedFiles\11152010_132626\C_\9d6resf.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\_OTL\MovedFiles\11152010_132626\C_\9g86.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\_OTL\MovedFiles\11152010_132626\C_\9jyhdim8.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\_OTL\MovedFiles\11152010_132626\C_\9u.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\_OTL\MovedFiles\11152010_132626\C_\awb3ryk.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\_OTL\MovedFiles\11152010_132626\C_\b00ijwpu.exe (Worm.Taterf) -> Quarantined and deleted successfully.
C:\_OTL\MovedFiles\11152010_132626\C_\b9v.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\_OTL\MovedFiles\11152010_132626\C_\ba.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\_OTL\MovedFiles\11152010_132626\C_\bbjl2g.exe (Worm.Taterf) -> Quarantined and deleted successfully.
C:\_OTL\MovedFiles\11152010_132626\C_\bycfht.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\_OTL\MovedFiles\11152010_132626\C_\cbbw88s.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\_OTL\MovedFiles\11152010_132626\C_\cobn8w3.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\_OTL\MovedFiles\11152010_132626\C_\cqb6wo.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\_OTL\MovedFiles\11152010_132626\C_\cs6phv6d.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\_OTL\MovedFiles\11152010_132626\C_\ctu8r.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\_OTL\MovedFiles\11152010_132626\C_\curqp.exe (Worm.Taterf) -> Quarantined and deleted successfully.
C:\_OTL\MovedFiles\11152010_132626\C_\dogyx90.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\_OTL\MovedFiles\11152010_132626\C_\dwh.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\_OTL\MovedFiles\11152010_132626\C_\eer6ril9.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\_OTL\MovedFiles\11152010_132626\C_\egmjjb.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\_OTL\MovedFiles\11152010_132626\C_\ey.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\_OTL\MovedFiles\11152010_132626\C_\f9o8o.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\_OTL\MovedFiles\11152010_132626\C_\g12g.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\_OTL\MovedFiles\11152010_132626\C_\ggpw.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\_OTL\MovedFiles\11152010_132626\C_\i8gcgmg.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\_OTL\MovedFiles\11152010_132626\C_\i9bwjpqc.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\_OTL\MovedFiles\11152010_132626\C_\iuvvl9f3.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\_OTL\MovedFiles\11152010_132626\C_\jeo3ky.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\_OTL\MovedFiles\11152010_132626\C_\k1d.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\_OTL\MovedFiles\11152010_132626\C_\krwyrv0d.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\_OTL\MovedFiles\11152010_132626\C_\kyme.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\_OTL\MovedFiles\11152010_132626\C_\l61yyp.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\_OTL\MovedFiles\11152010_132626\C_\lhh3v.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\_OTL\MovedFiles\11152010_132626\C_\lphfa.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\_OTL\MovedFiles\11152010_132626\C_\m.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\_OTL\MovedFiles\11152010_132626\C_\mbdm.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\_OTL\MovedFiles\11152010_132626\C_\mjafm.exe (Worm.Magania) -> Quarantined and deleted successfully.
C:\_OTL\MovedFiles\11152010_132626\C_\mje12tni.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\_OTL\MovedFiles\11152010_132626\C_\mranjm.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\_OTL\MovedFiles\11152010_132626\C_\mwfubaob.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\_OTL\MovedFiles\11152010_132626\C_\n0qls.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\_OTL\MovedFiles\11152010_132626\C_\nds0q.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\_OTL\MovedFiles\11152010_132626\C_\o8tf6l.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\_OTL\MovedFiles\11152010_132626\C_\opdux.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\_OTL\MovedFiles\11152010_132626\C_\p3vwxx.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\_OTL\MovedFiles\11152010_132626\C_\pbudsara.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\_OTL\MovedFiles\11152010_132626\C_\pbyqfn.exe (Worm.Taterf) -> Quarantined and deleted successfully.
C:\_OTL\MovedFiles\11152010_132626\C_\pcxis.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\_OTL\MovedFiles\11152010_132626\C_\q3kku.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\_OTL\MovedFiles\11152010_132626\C_\qbr2q.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\_OTL\MovedFiles\11152010_132626\C_\qcoageh.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\_OTL\MovedFiles\11152010_132626\C_\qcod.exe (Worm.Magania) -> Quarantined and deleted successfully.
C:\_OTL\MovedFiles\11152010_132626\C_\r2g20.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\_OTL\MovedFiles\11152010_132626\C_\r3fhr.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\_OTL\MovedFiles\11152010_132626\C_\r3q63rok.exe (Trojan.GamesThief) -> Quarantined and deleted successfully.
C:\_OTL\MovedFiles\11152010_132626\C_\s1.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\_OTL\MovedFiles\11152010_132626\C_\s3ek.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\_OTL\MovedFiles\11152010_132626\C_\sdfqh.exe (Spyware.OnLineGames) -> Quarantined and deleted successfully.
C:\_OTL\MovedFiles\11152010_132626\C_\se12ydam.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\_OTL\MovedFiles\11152010_132626\C_\sp1jensi.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\_OTL\MovedFiles\11152010_132626\C_\srgo.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\_OTL\MovedFiles\11152010_132626\C_\t2hjo0.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\_OTL\MovedFiles\11152010_132626\C_\tgt.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\_OTL\MovedFiles\11152010_132626\C_\v1cbvsmq.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\_OTL\MovedFiles\11152010_132626\C_\vgyn6ewc.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\_OTL\MovedFiles\11152010_132626\C_\vk0w.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\_OTL\MovedFiles\11152010_132626\C_\w3.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\_OTL\MovedFiles\11152010_132626\C_\w9uxx92.exe (Worm.Magania) -> Quarantined and deleted successfully.
C:\_OTL\MovedFiles\11152010_132626\C_\wbj.exe (Worm.Magania) -> Quarantined and deleted successfully.
C:\_OTL\MovedFiles\11152010_132626\C_\wcgswa.exe (Worm.Taterf) -> Quarantined and deleted successfully.
C:\_OTL\MovedFiles\11152010_132626\C_\wfx062.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\_OTL\MovedFiles\11152010_132626\C_\wrsf.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\_OTL\MovedFiles\11152010_132626\C_\wu1n.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\_OTL\MovedFiles\11152010_132626\C_\wyskq6lt.exe (Worm.Taterf) -> Quarantined and deleted successfully.
C:\_OTL\MovedFiles\11152010_132626\C_\x3xh.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\_OTL\MovedFiles\11152010_132626\C_\y6cqb2is.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\_OTL\MovedFiles\11152010_132626\C_\ycvvj.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\_OTL\MovedFiles\11152010_132626\C_\ysyjq1bs.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\_OTL\MovedFiles\11152010_132626\C_Documents and Settings\personne\Local Settings\Temp\herss.exe (Worm.Taterf) -> Quarantined and deleted successfully.
C:\_OTL\MovedFiles\11152010_132626\C_WINDOWS\system32\mgking.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\_OTL\MovedFiles\11152010_132626\C_WINDOWS\system32\mgking0.dll (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\_OTL\MovedFiles\11152010_132626\C_WINDOWS\system32\mgking1.dll (Spyware.OnlineGames) -> Quarantined and deleted successfully.
E:\krwyrv0d.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.
E:\x3xh.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.
E:\dwh.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.
E:\r3x0k.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.
E:\i8gcgmg.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.
E:\egmjjb.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.
E:\b9v.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.
E:\wyskq6lt.exe (Worm.Taterf) -> Quarantined and deleted successfully.
E:\vgyn6ewc.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.
E:\cbbw88s.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.
E:\mbvd.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.
E:\sdfqh.exe (Spyware.OnLineGames) -> Quarantined and deleted successfully.
E:\c2e.exe (Spyware.OnLineGames) -> Quarantined and deleted successfully.
E:\bbjl2g.exe (Worm.Taterf) -> Quarantined and deleted successfully.
E:\pbyqfn.exe (Worm.Taterf) -> Quarantined and deleted successfully.
E:\ysyjq1bs.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.
E:\ba.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.
E:\r3fhr.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.
E:\System Volume Information\_restore{33D2830F-39C5-4015-9ED8-330B79CB23E7}\RP390\A0233801.exe (Worm.Taterf) -> Quarantined and deleted successfully.
E:\System Volume Information\_restore{33D2830F-39C5-4015-9ED8-330B79CB23E7}\RP390\A0233822.exe (Worm.Taterf) -> Quarantined and deleted successfully.
E:\System Volume Information\_restore{33D2830F-39C5-4015-9ED8-330B79CB23E7}\RP390\A0233835.exe (Worm.Taterf) -> Quarantined and deleted successfully.
E:\System Volume Information\_restore{33D2830F-39C5-4015-9ED8-330B79CB23E7}\RP390\A0233845.exe (Worm.Taterf) -> Quarantined and deleted successfully.
E:\System Volume Information\_restore{33D2830F-39C5-4015-9ED8-330B79CB23E7}\RP390\A0233848.exe (Worm.Taterf) -> Quarantined and deleted successfully.
E:\System Volume Information\_restore{33D2830F-39C5-4015-9ED8-330B79CB23E7}\RP390\A0233850.exe (Worm.Taterf) -> Quarantined and deleted successfully.
E:\System Volume Information\_restore{33D2830F-39C5-4015-9ED8-330B79CB23E7}\RP399\A0242232.exe (Worm.Taterf) -> Quarantined and deleted successfully.
E:\System Volume Information\_restore{33D2830F-39C5-4015-9ED8-330B79CB23E7}\RP434\A0288662.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.
E:\System Volume Information\_restore{33D2830F-39C5-4015-9ED8-330B79CB23E7}\RP434\A0288678.exe (Worm.Taterf) -> Quarantined and deleted successfully.
E:\System Volume Information\_restore{33D2830F-39C5-4015-9ED8-330B79CB23E7}\RP435\A0288684.exe (Worm.Taterf) -> Quarantined and deleted successfully.
E:\System Volume Information\_restore{33D2830F-39C5-4015-9ED8-330B79CB23E7}\RP436\A0288707.exe (Worm.Taterf) -> Quarantined and deleted successfully.
E:\System Volume Information\_restore{33D2830F-39C5-4015-9ED8-330B79CB23E7}\RP436\A0289680.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.
E:\System Volume Information\_restore{33D2830F-39C5-4015-9ED8-330B79CB23E7}\RP437\A0289700.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.
E:\System Volume Information\_restore{33D2830F-39C5-4015-9ED8-330B79CB23E7}\RP437\A0290684.exe (Worm.Taterf) -> Quarantined and deleted successfully.
E:\System Volume Information\_restore{33D2830F-39C5-4015-9ED8-330B79CB23E7}\RP437\A0290702.exe (Worm.Taterf) -> Quarantined and deleted successfully.
E:\System Volume Information\_restore{33D2830F-39C5-4015-9ED8-330B79CB23E7}\RP437\A0290705.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.
E:\System Volume Information\_restore{33D2830F-39C5-4015-9ED8-330B79CB23E7}\RP438\A0290712.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.
E:\System Volume Information\_restore{33D2830F-39C5-4015-9ED8-330B79CB23E7}\RP438\A0290715.exe (Worm.Taterf) -> Quarantined and deleted successfully.
E:\System Volume Information\_restore{33D2830F-39C5-4015-9ED8-330B79CB23E7}\RP439\A0290729.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.
E:\System Volume Information\_restore{33D2830F-39C5-4015-9ED8-330B79CB23E7}\RP439\A0290732.exe (Worm.Taterf) -> Quarantined and deleted successfully.
E:\System Volume Information\_restore{33D2830F-39C5-4015-9ED8-330B79CB23E7}\RP439\A0290748.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.
E:\System Volume Information\_restore{33D2830F-39C5-4015-9ED8-330B79CB23E7}\RP439\A0290749.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.
E:\System Volume Information\_restore{33D2830F-39C5-4015-9ED8-330B79CB23E7}\RP440\A0293749.exe (Worm.Taterf) -> Quarantined and deleted successfully.
E:\System Volume Information\_restore{33D2830F-39C5-4015-9ED8-330B79CB23E7}\RP440\A0293776.exe (Worm.Taterf) -> Quarantined and deleted successfully.
E:\System Volume Information\_restore{33D2830F-39C5-4015-9ED8-330B79CB23E7}\RP440\A0293777.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.
E:\System Volume Information\_restore{33D2830F-39C5-4015-9ED8-330B79CB23E7}\RP441\A0293784.exe (Worm.Taterf) -> Quarantined and deleted successfully.
E:\System Volume Information\_restore{33D2830F-39C5-4015-9ED8-330B79CB23E7}\RP441\A0293787.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.
E:\System Volume Information\_restore{33D2830F-39C5-4015-9ED8-330B79CB23E7}\RP442\A0293857.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.
E:\System Volume Information\_restore{33D2830F-39C5-4015-9ED8-330B79CB23E7}\RP442\A0293881.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.
E:\System Volume Information\_restore{33D2830F-39C5-4015-9ED8-330B79CB23E7}\RP442\A0293896.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.
E:\System Volume Information\_restore{33D2830F-39C5-4015-9ED8-330B79CB23E7}\RP443\A0293903.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.
E:\System Volume Information\_restore{33D2830F-39C5-4015-9ED8-330B79CB23E7}\RP443\A0294896.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.
E:\System Volume Information\_restore{33D2830F-39C5-4015-9ED8-330B79CB23E7}\RP443\A0294899.exe (Worm.Taterf) -> Quarantined and deleted successfully.
E:\System Volume Information\_restore{33D2830F-39C5-4015-9ED8-330B79CB23E7}\RP444\A0294904.exe (Worm.Taterf) -> Quarantined and deleted successfully.
E:\System Volume Information\_restore{33D2830F-39C5-4015-9ED8-330B79CB23E7}\RP444\A0294905.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.
E:\System Volume Information\_restore{33D2830F-39C5-4015-9ED8-330B79CB23E7}\RP444\A0294924.exe (Worm.Taterf) -> Quarantined and deleted successfully.
E:\System Volume Information\_restore{33D2830F-39C5-4015-9ED8-330B79CB23E7}\RP444\A0294925.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.
E:\System Volume Information\_restore{33D2830F-39C5-4015-9ED8-330B79CB23E7}\RP444\A0295924.exe (Worm.Taterf) -> Quarantined and deleted successfully.
E:\System Volume Information\_restore{33D2830F-39C5-4015-9ED8-330B79CB23E7}\RP444\A0295925.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.
E:\System Volume Information\_restore{33D2830F-39C5-4015-9ED8-330B79CB23E7}\RP445\A0295939.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.
E:\System Volume Information\_restore{33D2830F-39C5-4015-9ED8-330B79CB23E7}\RP445\A0295942.exe (Worm.Taterf) -> Quarantined and deleted successfully.
E:\System Volume Information\_restore{33D2830F-39C5-4015-9ED8-330B79CB23E7}\RP445\A0295945.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.
E:\System Volume Information\_restore{33D2830F-39C5-4015-9ED8-330B79CB23E7}\RP445\A0295946.exe (Worm.Taterf) -> Quarantined and deleted successfully.
E:\System Volume Information\_restore{33D2830F-39C5-4015-9ED8-330B79CB23E7}\RP445\A0296923.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.
E:\System Volume Information\_restore{33D2830F-39C5-4015-9ED8-330B79CB23E7}\RP445\A0296926.exe (Worm.Taterf) -> Quarantined and deleted successfully.
E:\System Volume Information\_restore{33D2830F-39C5-4015-9ED8-330B79CB23E7}\RP445\A0298924.exe (Worm.Taterf) -> Quarantined and deleted successfully.
E:\System Volume Information\_restore{33D2830F-39C5-4015-9ED8-330B79CB23E7}\RP445\A0298925.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.
E:\System Volume Information\_restore{33D2830F-39C5-4015-9ED8-330B79CB23E7}\RP445\A0299922.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.
E:\System Volume Information\_restore{33D2830F-39C5-4015-9ED8-330B79CB23E7}\RP445\A0299924.exe (Worm.Taterf) -> Quarantined and deleted successfully.
C:\Documents and Settings\personne\Application Data\Icones\icones_pa.ico (Adware.GibMedia) -> Quarantined and deleted successfully.
C:\hyetn1i.exe (Trojan.Agent) -> Quarantined and deleted successfully.
C:\ljnhwt.bat (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\Documents and Settings\personne\Menu Démarrer\Pages Annuaire.lnk (Adware.GibMedia) -> Quarantined and deleted successfully.
C:\WINDOWS\AhnRpta.exe (Trojan.Backdoor) -> Quarantined and deleted successfully.
taz66410
Apprenti(e)
Apprenti(e)
 
Messages: 39
Inscription: 14 Nov 2010 23:21
 

Re: page publicitaire qui s'ouvre

Message le 15 Nov 2010 17:04

Les concepteurs de virus ont de beaux jours devant eux... :lol: :roll:
Avatar de l'utilisateur
H3bus
Moderateur
Moderateur
 
Messages: 12195
Inscription: 08 Avr 2008 15:13
Localisation: /home/h3bus
 

Suivante


Sujets similaires

Message lien publicitaire supprimé
lien publicitaire supprimé
Réponses: 0

Message [réglé ailleurs] Ouvrir Word sur page d'accueil, possible ?
Bonsoir,Souhaitant ouvrir tout nouveau document sur la page Accueil dans Word 2013, elle s'ouvre systématiquement sur la page Fichier.Ne sachant pas si c'était la solution, je suis allé dans Fichier/Options/Général/Options de démarrage où j'ai décoché la case Afficher l'écran de démarrage au lanceme ...
Réponses: 5

Message Traduire en français fenètre qui s'ouvre
Bonsoir Daniel, routman54 a écrit:Re,C'est peut être parce que je suis sous W11. Puis comme c'est une fenêtre contextuelle à moins de la copier depuis une VM, on ne peut pas le faire depuis le même appareil.La touche Impr Ecran le permet. Après il faut ouvrir paint et enregistrer la copie d'écran e ...
Réponses: 11

Message [Réglé] Convertisseur ide-sata n'ouvre pas dd 3To
Bonjour à tous,Je viens d'aquérrir un covertisseur ide-sata sans alim car j'en possedait une déjà.Cet accéssoire fonctionne très bien avec un dd 500 Mo +alim 3A et s'ouvre bien, s'affiche dans périphériques et lecteurs de w11.Avec un dd 3To, il ne s'ouvre pas malgré l'alim 3A, il ne s'affiche pas da ...
Réponses: 5

Message Invite de commande se ferme dès que je l'ouvre + clef windo
Bonjour,Depuis quelques semaines mon ordinateur ouvre et ferme la console au démarrage et ne me laisse pas y accéder. Il s'agit d'une grosse configuration que j'ai faite il y a maintenant plus de 3ans et je voulais récupérer ma clef windows pour l'installer sur un SSD plus gros. Mais voilà que mon o ...
Réponses: 1

Message [Réglé] page internet sui s ouvre en plus
bonjoura chaque puverture d'une page internet j'ai ce lien qui s'ouvre dans une nouvelle page :http://159.223.178.162/werrx01/?phone=0 ... EifQ%3D%3D
Réponses: 26

Message Brouillon Tiktok ne s'ouvre plus
Bonjour,Depuis quelques jours l'un de mes brouillons Tiktok ne s'ouvre plus... Lorsque je clique dessus je suis directement redirigée vers la page d'accueil noire avec le logo Tiktok puis je retombe sur la page des Pour Toi comme si je venais de démarrer l'application...J'ai essayé de fermer puis ré ...
Réponses: 0


Qui est en ligne

Utilisateurs parcourant ce forum: Aucun utilisateur enregistré et 11 invités


.: Nous contacter :: Flux RSS :: Données personnelles :.