Aller au contenu

Goy3n70

Membres
  • Compteur de contenus

    73
  • Inscription

  • Dernière visite

Tout ce qui a été posté par Goy3n70

  1. Logfile of Trend Micro HijackThis v2.0.2 Scan saved at 14:16:51, on 22/09/2009 Platform: Windows XP SP2 (WinNT 5.01.2600) MSIE: Internet Explorer v8.00 (8.00.6001.18702) Boot mode: Normal Running processes: C:\WINDOWS\System32\smss.exe C:\WINDOWS\system32\winlogon.exe C:\WINDOWS\system32\services.exe C:\WINDOWS\system32\lsass.exe C:\WINDOWS\system32\svchost.exe C:\WINDOWS\System32\svchost.exe C:\WINDOWS\system32\spoolsv.exe C:\Program Files\MSI\Bluetooth Software\bin\btwdins.exe C:\WINDOWS\system32\nvsvc32.exe C:\WINDOWS\system32\svchost.exe C:\WINDOWS\RTHDCPL.EXE C:\WINDOWS\system32\RUNDLL32.EXE C:\Program Files\SFR\Kit\WiFi\9wifi.exe C:\WINDOWS\system32\LVCOMSX.EXE C:\Program Files\Logitech\Video\LogiTray.exe C:\Program Files\Nokia\Nokia PC Suite 6\LaunchApplication.exe C:\Program Files\Electronic Arts\EADM\Core.exe C:\Program Files\Messenger\msmsgs.exe C:\PROGRA~1\FICHIE~1\PCSuite\Services\SERVIC~1.EXE C:\Program Files\Nokia\Nokia PC Suite 6\PcSync2.exe C:\Program Files\Logitech\Video\FxSvr2.exe C:\Program Files\MSI\Bluetooth Software\BTTray.exe C:\PROGRA~1\FICHIE~1\Nokia\MPAPI\MPAPI3s.exe C:\WINDOWS\system32\ctfmon.exe C:\WINDOWS\system32\wuauclt.exe C:\WINDOWS\explorer.exe C:\Program Files\Internet Explorer\iexplore.exe C:\Program Files\Internet Explorer\iexplore.exe C:\Program Files\Kaspersky Lab\Kaspersky Anti-Virus 2010\klwtblfs.exe C:\WINDOWS\system32\wscntfy.exe C:\Program Files\trend micro\HijackThis\HijackThis.exe R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://google.fr/ R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157 R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896 R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896 R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?LinkId=69157 R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName = Liens O2 - BHO: AcroIEHelperStub - {18DF081C-E8AD-4283-A596-FA578C2EBDC3} - C:\Program Files\Fichiers communs\Adobe\Acrobat\ActiveX\AcroIEHelperShim.dll O2 - BHO: IEVkbdBHO - {59273AB4-E7D3-40F9-A1A8-6FA9CCA1862C} - C:\Program Files\Kaspersky Lab\Kaspersky Anti-Virus 2010\ievkbd.dll O2 - BHO: Programme d'aide de l'Assistant de connexion Windows Live - {9030D464-4C02-4ABF-8ECC-5164760863C6} - C:\Program Files\Fichiers communs\Microsoft Shared\Windows Live\WindowsLiveLogin.dll O2 - BHO: Java Plug-In 2 SSV Helper - {DBC80044-A445-435b-BC74-9C25C1C588A9} - C:\Program Files\Java\jre6\bin\jp2ssv.dll O2 - BHO: link filter bho - {E33CF602-D945-461A-83F0-819F76A199F8} - C:\Program Files\Kaspersky Lab\Kaspersky Anti-Virus 2010\klwtbbho.dll O2 - BHO: EpsonToolBandKicker Class - {E99421FB-68DD-40F0-B4AC-B7027CAE2F1A} - C:\Program Files\EPSON\EPSON Web-To-Page\EPSON Web-To-Page.dll O3 - Toolbar: EPSON Web-To-Page - {EE5D279F-081B-4404-994D-C6B60AAEBA6D} - C:\Program Files\EPSON\EPSON Web-To-Page\EPSON Web-To-Page.dll O4 - HKLM\..\Run: [RTHDCPL] RTHDCPL.EXE O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE C:\WINDOWS\system32\NvCpl.dll,NvStartup O4 - HKLM\..\Run: [nwiz] nwiz.exe /install O4 - HKLM\..\Run: [NvMediaCenter] RUNDLL32.EXE C:\WINDOWS\system32\NvMcTray.dll,NvTaskbarInit O4 - HKLM\..\Run: [Autoconfigurateur WiFi SFR] "C:\Program Files\SFR\Kit\WiFi\9wifi.exe" O4 - HKLM\..\Run: [LVCOMSX] C:\WINDOWS\system32\LVCOMSX.EXE O4 - HKLM\..\Run: [LogitechVideoRepair] C:\Program Files\Logitech\Video\ISStart.exe O4 - HKLM\..\Run: [LogitechVideoTray] C:\Program Files\Logitech\Video\LogiTray.exe O4 - HKLM\..\Run: [DataLayer] C:\Program Files\Fichiers communs\PCSuite\DataLayer\DataLayer.exe O4 - HKLM\..\Run: [PCSuiteTrayApplication] C:\Program Files\Nokia\Nokia PC Suite 6\LaunchApplication.exe -onlytray O4 - HKLM\..\Run: [avp] "C:\Program Files\Kaspersky Lab\Kaspersky Anti-Virus 2010\avp.exe" O4 - HKCU\..\Run: [LogitechSoftwareUpdate] "C:\Program Files\Logitech\Video\ManifestEngine.exe" boot O4 - HKCU\..\Run: [EA Core] "C:\Program Files\Electronic Arts\EADM\Core.exe" -silent O4 - HKCU\..\Run: [MSMSGS] "C:\Program Files\Messenger\msmsgs.exe" /background O4 - HKCU\..\Run: [PcSync] C:\Program Files\Nokia\Nokia PC Suite 6\PcSync2.exe /NoDialog O4 - HKCU\..\Run: [msnmsgr] "C:\Program Files\Windows Live\Messenger\msnmsgr.exe" /background O4 - HKUS\S-1-5-18\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'SYSTEM') O4 - HKUS\.DEFAULT\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'Default user') O4 - Global Startup: BTTray.lnk = ? O4 - Global Startup: Logitech Desktop Messenger.lnk = C:\Program Files\Logitech\Desktop Messenger\8876480\Program\LDMConf.exe O4 - Global Startup: Ralink Wireless Utility.lnk = C:\Program Files\RALINK\Common\RaUI.exe O8 - Extra context menu item: Add to Google Photos Screensa&ver - res://C:\WINDOWS\system32\GPhotos.scr/200 O8 - Extra context menu item: Send To &Bluetooth - C:\Program Files\MSI\Bluetooth Software\btsendto_ie_ctx.htm O9 - Extra button: Clavier &virtuel - {4248FE82-7FCB-46AC-B270-339F08212110} - C:\Program Files\Kaspersky Lab\Kaspersky Anti-Virus 2010\klwtbbho.dll O9 - Extra button: (no name) - {85d1f590-48f4-11d9-9669-0800200c9a66} - C:\WINDOWS\bdoscandel.exe O9 - Extra 'Tools' menuitem: Uninstall BitDefender Online Scanner v8 - {85d1f590-48f4-11d9-9669-0800200c9a66} - C:\WINDOWS\bdoscandel.exe O9 - Extra button: @btrez.dll,-4015 - {CCA281CA-C863-46ef-9331-5C8D4460577F} - C:\Program Files\MSI\Bluetooth Software\btsendto_ie.htm O9 - Extra 'Tools' menuitem: @btrez.dll,-4017 - {CCA281CA-C863-46ef-9331-5C8D4460577F} - C:\Program Files\MSI\Bluetooth Software\btsendto_ie.htm O9 - Extra button: Analyse des &liens - {CCF151D8-D089-449F-A5A4-D9909053F20F} - C:\Program Files\Kaspersky Lab\Kaspersky Anti-Virus 2010\klwtbbho.dll O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe O9 - Extra button: (no name) - {3CA1D406-30D8-4DBC-8EE6-0E2C05F78864} - (no file) (HKCU) O16 - DPF: {0CCA191D-13A6-4E29-B746-314DEE697D83} (Facebook Photo Uploader 5 Control) - http://upload.facebook.com/controls/2008.1...toUploader5.cab O16 - DPF: {5D6F45B3-9043-443D-A792-115447494D24} (UnoCtrl Class) - http://messenger.zone.msn.com/MessengerGam...1/GAME_UNO1.cab O16 - DPF: {5D86DDB5-BDF9-441B-9E9E-D4730F4EE499} (BDSCANONLINE Control) - http://www.zebulon.fr/scan8/oscan8.cab O16 - DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} (WUWebControl Class) - http://update.microsoft.com/windowsupdate/...b?1251969744265 O16 - DPF: {644E432F-49D3-41A1-8DD5-E099162EEEC5} (Symantec RuFSI Utility Class) - http://security.symantec.com/sscv6/SharedC...n/bin/cabsa.cab O16 - DPF: {67DABFBF-D0AB-41FA-9C46-CC0F21721616} - http://go.divx.com/plugin/DivXBrowserPlugin.cab O16 - DPF: {C3F79A2B-B9B4-4A66-B012-3EE46475B072} (MessengerStatsClient Class) - http://messenger.zone.msn.com/binary/Messe...nt.cab56907.cab O16 - DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} (Shockwave Flash Object) - http://fpdownload2.macromedia.com/get/shoc...ash/swflash.cab O16 - DPF: {E2883E8F-472F-4FB0-9522-AC9BF37916A7} - http://platformdl.adobe.com/NOS/getPlusPlus/1.6/gp.cab O23 - Service: Kaspersky Anti-Virus (AVP) - Kaspersky Lab - C:\Program Files\Kaspersky Lab\Kaspersky Anti-Virus 2010\avp.exe O23 - Service: Bluetooth Service (btwdins) - WIDCOMM, Inc. - C:\Program Files\MSI\Bluetooth Software\bin\btwdins.exe O23 - Service: Firebird Server - MAGIX Instance (FirebirdServerMAGIXInstance) - MAGIX® - C:\Program Files\ALDI Service Photo\Common\Database\bin\fbserver.exe O23 - Service: Google Software Updater (gusvc) - Google - C:\Program Files\Google\Common\Google Updater\GoogleUpdaterService.exe O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Fichiers communs\InstallShield\Driver\11\Intel 32\IDriverT.exe O23 - Service: NVIDIA Display Driver Service (NVSvc) - NVIDIA Corporation - C:\WINDOWS\system32\nvsvc32.exe -- End of file - 8410 bytes
  2. voici le rapport de combofix : ComboFix 09-09-21.01 - goyen70 22/09/2009 13:42.2.1 - NTFSx86 Microsoft Windows XP Professionnel 5.1.2600.2.1252.33.1036.18.1983.1537 [GMT 2:00] Lancé depuis: c:\documents and settings\goyen70\Bureau\ComboFix.exe AV: Kaspersky Anti-Virus *On-access scanning disabled* (Updated) {2C4D4BC6-0793-4956-A9F9-E252435469C0} . (((((((((((((((((((((((((((((((((((( Autres suppressions )))))))))))))))))))))))))))))))))))))))))))))))) . c:\program files\driver c:\windows\ALCMTR.EXE c:\windows\Downloaded Program Files\bdcore.dll c:\windows\Downloaded Program Files\libfn.dll D:\autorun.inf E:\Autorun.inf . ((((((((((((((((((((((((((((((((((((((( Pilotes/Services ))))))))))))))))))))))))))))))))))))))))))))))))) . -------\Legacy_driverdrv ((((((((((((((((((((((((((((( Fichiers créés du 2009-08-22 au 2009-09-22 )))))))))))))))))))))))))))))))))))) . 2009-09-22 11:17 . 2009-09-22 11:41 -------- d-----w- c:\windows\system32\CatRoot2 2009-09-22 11:05 . 2009-09-22 11:05 -------- d-sh--w- c:\documents and settings\LocalService\IETldCache 2009-09-22 09:47 . 2009-09-22 09:47 -------- d-----w- c:\program files\VirginMega 2009-09-22 09:47 . 2009-09-22 09:47 -------- d-----w- c:\documents and settings\All Users\Application Data\Downloaded Installations 2009-09-22 09:46 . 2004-08-04 04:54 221184 ----a-w- c:\windows\system32\wmpns.dll 2009-09-22 09:46 . 2009-09-22 09:46 -------- d-----w- c:\program files\Windows Media Connect 2 2009-09-22 09:45 . 2009-09-22 09:45 -------- d-----w- c:\windows\system32\drivers\UMDF 2009-09-22 09:45 . 2009-09-22 09:45 -------- d-----w- c:\windows\system32\LogFiles 2009-09-22 08:26 . 2009-09-22 08:26 -------- d--h--w- c:\windows\msdownld.tmp 2009-09-22 08:25 . 2009-09-22 08:25 -------- dc-h--w- c:\windows\ie8 2009-09-22 08:12 . 2009-09-22 08:12 -------- d-sh--w- c:\documents and settings\goyen70\IECompatCache 2009-09-22 08:11 . 2009-09-22 08:11 -------- d-sh--w- c:\documents and settings\goyen70\PrivacIE 2009-09-22 08:10 . 2009-09-22 08:10 -------- d-sh--w- c:\documents and settings\goyen70\IETldCache 2009-09-22 08:09 . 2009-09-22 08:25 -------- d-----w- c:\windows\system32\fr-FR 2009-09-21 21:54 . 2009-09-21 21:54 604140 --sha-w- c:\windows\system32\drivers\ISwift3.dat 2009-09-21 21:52 . 2009-09-21 22:15 95259 ----a-w- c:\windows\system32\drivers\klick.dat 2009-09-21 21:52 . 2009-09-21 22:15 107547 ----a-w- c:\windows\system32\drivers\klin.dat 2009-09-21 21:52 . 2009-09-22 11:40 -------- d-----w- c:\documents and settings\All Users\Application Data\Kaspersky Lab 2009-09-21 21:52 . 2009-09-21 21:52 -------- d-----w- c:\program files\Kaspersky Lab 2009-09-21 21:51 . 2009-09-21 21:51 -------- d-----w- c:\documents and settings\All Users\Application Data\Kaspersky Lab Setup Files 2009-09-21 18:21 . 2009-09-10 12:54 38224 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys 2009-09-21 18:21 . 2009-09-21 18:21 -------- d-----w- c:\program files\Malwarebytes' Anti-Malware 2009-09-21 18:21 . 2009-09-10 12:53 19160 ----a-w- c:\windows\system32\drivers\mbam.sys 2009-09-21 16:07 . 2009-09-21 17:00 -------- d-----w- C:\Lop SD 2009-09-21 15:36 . 2009-09-21 15:49 -------- d---a-w- c:\documents and settings\All Users\Application Data\TEMP 2009-09-21 12:23 . 2009-07-28 14:33 55656 ----a-w- c:\windows\system32\drivers\avgntflt.sys 2009-09-21 12:06 . 2009-09-21 12:06 -------- d-----w- c:\program files\Enigma Software Group 2009-09-21 11:11 . 2009-09-21 11:11 -------- d--h--w- c:\windows\system32\GroupPolicy 2009-09-21 08:59 . 2009-09-21 18:47 -------- d-sh--w- c:\documents and settings\All Users\Application Data\85f016b 2009-09-18 08:25 . 2009-09-18 08:28 -------- d-----w- c:\program files\Miranda-IM 2009-09-18 08:19 . 2009-09-18 08:22 -------- d-----w- c:\documents and settings\goyen70\Application Data\.purple 2009-09-18 08:17 . 2009-09-18 08:17 -------- d-----w- c:\program files\Fichiers communs\GTK 2009-09-17 15:04 . 2009-09-17 15:16 -------- d-----w- c:\program files\Windows Live 2009-09-17 11:48 . 2009-09-17 14:51 -------- d-----w- c:\windows\SxsCaPendDel 2009-09-16 16:49 . 2009-09-16 16:49 -------- d-----w- c:\program files\MSBuild 2009-09-16 16:49 . 2009-09-16 16:49 96496 ----a-w- c:\documents and settings\LocalService\Local Settings\Application Data\FontCache3.0.0.0.dat 2009-09-16 16:47 . 2009-09-16 16:47 -------- d-----w- c:\windows\system32\XPSViewer 2009-09-16 16:47 . 2009-09-16 16:47 -------- d-----w- c:\program files\Reference Assemblies 2009-09-16 16:46 . 2006-06-29 11:07 14048 ------w- c:\windows\system32\spmsg2.dll 2009-09-16 15:27 . 2009-09-16 15:27 -------- d-----w- c:\program files\Microsoft Silverlight 2009-09-16 15:24 . 2006-11-29 11:06 3426072 ----a-w- c:\windows\system32\d3dx9_32.dll 2009-09-16 12:15 . 2009-09-16 12:15 -------- d-----w- c:\program files\Microsoft 2009-09-13 13:15 . 2007-12-24 15:37 138384 ----a-w- c:\windows\system32\drivers\tmcomm.sys 2009-09-13 11:02 . 2009-09-13 11:02 -------- d-----w- c:\program files\Alwil Software 2009-09-03 15:08 . 2009-09-13 10:05 -------- d-----w- c:\documents and settings\goyen70\Contacts 2009-09-03 15:07 . 2009-09-16 10:58 -------- d-----w- c:\program files\MSN Messenger 2009-09-03 15:04 . 2009-09-03 15:04 -------- d-----w- c:\documents and settings\goyen70\Application Data\MSNInstaller 2009-09-03 12:37 . 2009-09-03 12:37 -------- d-----w- c:\program files\Windows Installer Clean Up 2009-09-03 12:36 . 2009-09-03 12:36 -------- d-----w- c:\program files\MSECACHE 2009-08-29 23:18 . 2009-08-29 23:18 -------- d-----w- c:\windows\system32\wbem\Repository 2009-08-23 22:16 . 2009-08-23 22:16 -------- d-----w- c:\program files\GIMP-2.0 . (((((((((((((((((((((((((((((((((( Compte-rendu de Find3M )))))))))))))))))))))))))))))))))))))))))))))))) . 2009-09-22 09:38 . 2009-06-19 21:12 -------- d-----w- c:\program files\Java 2009-09-22 09:33 . 2009-06-19 21:08 -------- d-----w- c:\program files\Fichiers communs\Adobe 2009-09-21 16:13 . 2009-06-17 09:52 -------- d-----w- c:\program files\trend micro 2009-09-21 13:37 . 2009-08-08 13:57 -------- d-----w- c:\documents and settings\goyen70\Application Data\HouseCall 6.6 2009-09-18 08:21 . 2009-08-22 11:15 -------- d-----w- c:\documents and settings\goyen70\Application Data\gtk-2.0 2009-09-18 07:26 . 2001-10-14 22:44 79028 ----a-w- c:\windows\system32\perfc00C.dat 2009-09-18 07:26 . 2001-10-14 22:44 494650 ----a-w- c:\windows\system32\perfh00C.dat 2009-09-16 22:32 . 2009-03-07 18:41 31856 ----a-w- c:\documents and settings\goyen70\Local Settings\Application Data\GDIPFONTCACHEV1.DAT 2009-09-13 19:14 . 2009-03-07 18:34 -------- d-----w- c:\program files\adslTV 2009-08-22 10:50 . 2009-08-22 10:00 -------- d-----w- c:\program files\Icon Constructor 3 2009-08-22 10:00 . 2009-08-22 10:00 -------- d-----w- c:\documents and settings\All Users\Application Data\Icon Constructor 3 2009-07-31 13:23 . 2009-04-30 07:31 411368 ----a-w- c:\windows\system32\deploytk.dll 2009-07-31 10:13 . 2009-07-31 10:13 -------- d-----w- c:\documents and settings\goyen70\Application Data\Nokia Multimedia Player 2009-07-28 08:45 . 2009-03-07 18:25 -------- d--h--w- c:\program files\InstallShield Installation Information 2009-07-27 15:38 . 2009-07-27 15:38 -------- d-----w- c:\documents and settings\goyen70\Application Data\Nokia 2009-07-27 15:38 . 2009-07-27 15:38 -------- d-----w- c:\documents and settings\goyen70\Application Data\Datalayer 2009-07-27 15:34 . 2009-07-27 15:34 -------- d-----w- c:\documents and settings\goyen70\Application Data\PC Suite 2009-07-27 15:34 . 2009-07-27 15:34 -------- d-----w- c:\program files\Nokia 2009-07-27 15:34 . 2009-07-27 15:34 -------- d-----w- c:\program files\Fichiers communs\PCSuite 2009-07-27 15:34 . 2009-07-27 15:34 -------- d-----w- c:\program files\Fichiers communs\Nokia 2009-07-27 15:21 . 2009-07-27 15:21 -------- d-----w- c:\program files\LG PC Suite II 2009-07-26 14:44 . 2009-07-26 14:44 48448 ----a-w- c:\windows\system32\sirenacm.dll 2009-07-03 13:48 . 2009-07-03 13:48 219664 ----a-w- c:\windows\system32\klogon.dll 2009-07-03 13:45 . 2009-07-03 13:45 27507 ----a-w- c:\windows\system32\drivers\klopp.dat . ((((((((((((((((((((((((((((((((( Points de chargement Reg )))))))))))))))))))))))))))))))))))))))))))))))) . . *Note* les éléments vides & les éléments initiaux légitimes ne sont pas listés REGEDIT4 [HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] "LogitechSoftwareUpdate"="c:\program files\Logitech\Video\ManifestEngine.exe" [2004-06-01 196608] "EA Core"="c:\program files\Electronic Arts\EADM\Core.exe" [2009-02-06 3325952] "MSMSGS"="c:\program files\Messenger\msmsgs.exe" [2004-08-04 1667584] "PcSync"="c:\program files\Nokia\Nokia PC Suite 6\PcSync2.exe" [2005-06-24 860160] "msnmsgr"="c:\program files\Windows Live\Messenger\msnmsgr.exe" [2009-07-26 3883856] "ctfmon.exe"="c:\windows\system32\ctfmon.exe" [2004-08-04 15360] [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] "NvCplDaemon"="c:\windows\system32\NvCpl.dll" [2008-02-25 8491008] "NvMediaCenter"="c:\windows\system32\NvMcTray.dll" [2008-02-25 81920] "Autoconfigurateur WiFi SFR"="c:\program files\SFR\Kit\WiFi\9wifi.exe" [2008-11-18 304448] "LVCOMSX"="c:\windows\system32\LVCOMSX.EXE" [2004-05-21 221184] "LogitechVideoRepair"="c:\program files\Logitech\Video\ISStart.exe" [2004-06-01 458752] "LogitechVideoTray"="c:\program files\Logitech\Video\LogiTray.exe" [2004-06-01 217088] "DataLayer"="c:\program files\Fichiers communs\PCSuite\DataLayer\DataLayer.exe" [2005-06-07 819712] "PCSuiteTrayApplication"="c:\program files\Nokia\Nokia PC Suite 6\LaunchApplication.exe" [2005-06-29 176128] "avp"="c:\program files\Kaspersky Lab\Kaspersky Anti-Virus 2010\avp.exe" [2009-07-03 303376] "RTHDCPL"="RTHDCPL.EXE" - c:\windows\RTHDCPL.EXE [2008-04-10 16861184] "nwiz"="nwiz.exe" - c:\windows\system32\nwiz.exe [2008-02-25 1626112] [HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run] "CTFMON.EXE"="c:\windows\system32\CTFMON.EXE" [2004-08-04 15360] c:\documents and settings\All Users\Menu D‚marrer\Programmes\D‚marrage\ BTTray.lnk - c:\program files\MSI\Bluetooth Software\BTTray.exe [2004-3-31 507965] Logitech Desktop Messenger.lnk - c:\program files\Logitech\Desktop Messenger\8876480\Program\LDMConf.exe [2009-3-8 450560] Ralink Wireless Utility.lnk - c:\program files\RALINK\Common\RaUI.exe [2009-3-7 614400] [HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\KasperskyAntiVirus] "DisableMonitoring"=dword:00000001 [HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List] "e:\\eChanblard\\emule.exe"= "c:\\Program Files\\adslTV\\adsltv.exe"= "c:\\Program Files\\Electronic Arts\\EADM\\Core.exe"= "c:\\WINDOWS\\system32\\sessmgr.exe"= "c:\\Program Files\\Windows Live\\Messenger\\wlcsdk.exe"= "c:\\Program Files\\Windows Live\\Messenger\\msnmsgr.exe"= R0 klbg;Kaspersky Lab Boot Guard Driver;c:\windows\system32\drivers\klbg.sys [15/12/2008 20:41 33808] R0 pavboot;pavboot;c:\windows\system32\drivers\pavboot.sys [08/08/2009 15:34 28544] R3 klim5;Kaspersky Anti-Virus NDIS Filter;c:\windows\system32\drivers\klim5.sys [13/05/2009 17:46 31760] R3 klmouflt;Kaspersky Lab KLMOUFLT;c:\windows\system32\drivers\klmouflt.sys [16/05/2009 20:59 19472] S3 FirebirdServerMAGIXInstance;Firebird Server - MAGIX Instance;c:\program files\ALDI Service Photo\Common\Database\bin\fbserver.exe [29/04/2009 22:37 1527900] S3 PID_0920;Logitech QuickCam Express(PID_0920);c:\windows\system32\drivers\LV532AV.SYS [08/03/2009 23:36 163328] . . ------- Examen supplémentaire ------- . uStart Page = hxxp://google.fr/ uSearchURL,(Default) = hxxp://www.google.com/search?q=%s IE: Add to Google Photos Screensa&ver - c:\windows\system32\GPhotos.scr/200 IE: Send To &Bluetooth - c:\program files\MSI\Bluetooth Software\btsendto_ie_ctx.htm DPF: {5D86DDB5-BDF9-441B-9E9E-D4730F4EE499} - hxxp://www.zebulon.fr/scan8/oscan8.cab . ************************************************************************** catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net Rootkit scan 2009-09-22 13:47 Windows 5.1.2600 Service Pack 2 NTFS Recherche de processus cachés ... Recherche d'éléments en démarrage automatique cachés ... Recherche de fichiers cachés ... Scan terminé avec succès Fichiers cachés: 0 ************************************************************************** . --------------------- CLES DE REGISTRE BLOQUEES --------------------- [HKEY_USERS\S-1-5-21-1645522239-2111687655-839522115-1003\Software\SecuROM\!CAUTION! NEVER A OR CHANGE ANY KEY*] "??"=hex:30,9e,d0,3b,9c,3c,e3,dd,ee,7c,a0,01,ad,2f,c8,22,f9,d1,57,bf,8c,79,2b, 0b,2c,a5,7c,08,06,0d,e4,cc,5d,f3,34,76,b3,a1,41,6c,6a,68,ca,b2,4b,36,1f,d9,\ "??"=hex:c7,34,ec,79,a7,d1,a8,d5,24,e2,1e,b6,f5,53,5c,85 [HKEY_LOCAL_MACHINE\software\Classes\CLSID\{19114156-8E9A-4D4E-9EE9-17A0E48D3BBB}] @Denied: (A 2) (Everyone) @="FlashBroker" "LocalizedString"="@c:\\WINDOWS\\system32\\Macromed\\Flash\\FlashUtil10c.exe,-101" [HKEY_LOCAL_MACHINE\software\Classes\CLSID\{19114156-8E9A-4D4E-9EE9-17A0E48D3BBB}\Elevation] "Enabled"=dword:00000001 [HKEY_LOCAL_MACHINE\software\Classes\CLSID\{19114156-8E9A-4D4E-9EE9-17A0E48D3BBB}\LocalServer32] @="c:\\WINDOWS\\system32\\Macromed\\Flash\\FlashUtil10c.exe" [HKEY_LOCAL_MACHINE\software\Classes\CLSID\{19114156-8E9A-4D4E-9EE9-17A0E48D3BBB}\TypeLib] @="{FAB3E735-69C7-453B-A446-B6823C6DF1C9}" [HKEY_LOCAL_MACHINE\software\Classes\Interface\{1D4C8A81-B7AC-460A-8C23-98713C41D6B3}] @Denied: (A 2) (Everyone) @="IFlashBroker3" [HKEY_LOCAL_MACHINE\software\Classes\Interface\{1D4C8A81-B7AC-460A-8C23-98713C41D6B3}\ProxyStubClsid32] @="{00020424-0000-0000-C000-000000000046}" [HKEY_LOCAL_MACHINE\software\Classes\Interface\{1D4C8A81-B7AC-460A-8C23-98713C41D6B3}\TypeLib] @="{FAB3E735-69C7-453B-A446-B6823C6DF1C9}" "Version"="1.0" . --------------------- DLLs chargées dans les processus actifs --------------------- - - - - - - - > 'explorer.exe'(2740) c:\windows\system32\msi.dll c:\windows\system32\webcheck.dll c:\windows\system32\IEFRAME.dll c:\windows\system32\WPDShServiceObj.dll c:\windows\system32\btncopy.dll c:\program files\Nokia\Nokia PC Suite 6\PhoneBrowser.dll c:\windows\system32\ConnAPI.DLL c:\program files\Nokia\Nokia PC Suite 6\PCSCM.dll c:\program files\Nokia\Nokia PC Suite 6\Lang\PhoneBrowser_fre.nlr c:\program files\Nokia\Nokia PC Suite 6\Resource\PhoneBrowser_Nokia.ngr c:\windows\system32\PortableDeviceTypes.dll c:\windows\system32\PortableDeviceApi.dll . ------------------------ Autres processus actifs ------------------------ . c:\program files\MSI\Bluetooth Software\bin\btwdins.exe c:\windows\system32\nvsvc32.exe c:\windows\system32\rundll32.exe c:\progra~1\FICHIE~1\PCSuite\Services\SERVIC~1.EXE c:\program files\Logitech\Video\FxSvr2.exe c:\progra~1\FICHIE~1\Nokia\MPAPI\MPAPI3s.exe . ************************************************************************** . Heure de fin: 2009-09-22 13:49 - La machine a redémarré ComboFix-quarantined-files.txt 2009-09-22 11:49 Avant-CF: 32 314 974 208 octets libres Après-CF: 32 447 143 936 octets libres 218
  3. re, sa ne fonctionne toujours pas [Numéro d'erreur : 0x8024D007]
  4. j'ai ete sur se site la ces le bon ? http://update.microsoft.com/windowsupdate/...ault.aspx?ln=fr et sa ma dit : erreur : 0x8024D007
  5. Voila j'ai fais tout se que tu ma demandé
  6. j'ai tout mis a jours normalement^^ voici le rapport que tu ma demandé : Logfile of Trend Micro HijackThis v2.0.2 Scan saved at 11:49:23, on 22/09/2009 Platform: Windows XP SP2 (WinNT 5.01.2600) MSIE: Internet Explorer v8.00 (8.00.6001.18702) Boot mode: Normal Running processes: C:\WINDOWS\System32\smss.exe C:\WINDOWS\system32\winlogon.exe C:\WINDOWS\system32\services.exe C:\WINDOWS\system32\lsass.exe C:\WINDOWS\system32\svchost.exe C:\WINDOWS\System32\svchost.exe C:\WINDOWS\system32\spoolsv.exe C:\WINDOWS\Explorer.EXE C:\Program Files\MSI\Bluetooth Software\bin\btwdins.exe C:\WINDOWS\system32\nvsvc32.exe C:\WINDOWS\system32\svchost.exe C:\WINDOWS\RTHDCPL.EXE C:\WINDOWS\system32\RUNDLL32.EXE C:\Program Files\SFR\Kit\WiFi\9wifi.exe C:\WINDOWS\system32\LVCOMSX.EXE C:\Program Files\Logitech\Video\LogiTray.exe C:\Program Files\Fichiers communs\PCSuite\DataLayer\DataLayer.exe C:\Program Files\Nokia\Nokia PC Suite 6\LaunchApplication.exe C:\WINDOWS\system32\ctfmon.exe C:\Program Files\Messenger\msmsgs.exe C:\Program Files\Nokia\Nokia PC Suite 6\PcSync2.exe C:\Program Files\Windows Live\Messenger\msnmsgr.exe C:\Program Files\MSI\Bluetooth Software\BTTray.exe C:\Program Files\RALINK\Common\RaUI.exe C:\PROGRA~1\FICHIE~1\PCSuite\Services\SERVIC~1.EXE C:\Program Files\Logitech\Video\FxSvr2.exe C:\PROGRA~1\FICHIE~1\Nokia\MPAPI\MPAPI3s.exe C:\Program Files\Kaspersky Lab\Kaspersky Anti-Virus 2010\klwtblfs.exe C:\WINDOWS\system32\msiexec.exe C:\Program Files\Java\jre6\bin\jqs.exe C:\Program Files\Internet Explorer\iexplore.exe C:\Program Files\Internet Explorer\iexplore.exe C:\Program Files\trend micro\HijackThis\HijackThis.exe R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157 R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://google.fr/ R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157 R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896 R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896 R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?LinkId=69157 R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName = Liens O1 - Hosts: 74.125.45.100 4-open-davinci.com O1 - Hosts: 74.125.45.100 securitysoftwarepayments.com O1 - Hosts: 74.125.45.100 privatesecuredpayments.com O1 - Hosts: 74.125.45.100 secure.privatesecuredpayments.com O1 - Hosts: 74.125.45.100 getantivirusplusnow.com O1 - Hosts: 74.125.45.100 secure-plus-payments.com O1 - Hosts: 74.125.45.100 www.getantivirusplusnow.com O1 - Hosts: 74.125.45.100 www.secure-plus-payments.com O1 - Hosts: 74.125.45.100 www.getavplusnow.com O1 - Hosts: 74.125.45.100 www.securesoftwarebill.com O1 - Hosts: 74.125.45.100 secure.paysecuresystem.com O1 - Hosts: 74.125.45.100 paysoftbillsolution.com O1 - Hosts: 206.53.61.77 google.ae O1 - Hosts: 206.53.61.77 google.as O1 - Hosts: 206.53.61.77 google.at O1 - Hosts: 206.53.61.77 google.az O1 - Hosts: 206.53.61.77 google.ba O1 - Hosts: 206.53.61.77 google.be O1 - Hosts: 206.53.61.77 google.bg O1 - Hosts: 206.53.61.77 google.bs O1 - Hosts: 206.53.61.77 google.ca O1 - Hosts: 206.53.61.77 google.cd O1 - Hosts: 206.53.61.77 google.com.gh O1 - Hosts: 206.53.61.77 google.com.hk O1 - Hosts: 206.53.61.77 google.com.jm O1 - Hosts: 206.53.61.77 google.com.mx O1 - Hosts: 206.53.61.77 google.com.my O1 - Hosts: 206.53.61.77 google.com.na O1 - Hosts: 206.53.61.77 google.com.nf O1 - Hosts: 206.53.61.77 google.com.ng O1 - Hosts: 206.53.61.77 google.ch O1 - Hosts: 206.53.61.77 google.com.np O1 - Hosts: 206.53.61.77 google.com.pr O1 - Hosts: 206.53.61.77 google.com.qa O1 - Hosts: 206.53.61.77 google.com.sg O1 - Hosts: 206.53.61.77 google.com.tj O1 - Hosts: 206.53.61.77 google.com.tw O1 - Hosts: 206.53.61.77 google.dj O1 - Hosts: 206.53.61.77 google.de O1 - Hosts: 206.53.61.77 google.dk O1 - Hosts: 206.53.61.77 google.dm O1 - Hosts: 206.53.61.77 google.ee O1 - Hosts: 206.53.61.77 google.fi O1 - Hosts: 206.53.61.77 google.fm O1 - Hosts: 206.53.61.77 google.fr O1 - Hosts: 206.53.61.77 google.ge O1 - Hosts: 206.53.61.77 google.gg O1 - Hosts: 206.53.61.77 google.gm O1 - Hosts: 206.53.61.77 google.gr O1 - Hosts: 206.53.61.77 google.ht O1 - Hosts: 206.53.61.77 google.ie O1 - Hosts: 206.53.61.77 google.im O1 - Hosts: 206.53.61.77 google.in O1 - Hosts: 206.53.61.77 google.it O1 - Hosts: 206.53.61.77 google.ki O1 - Hosts: 206.53.61.77 google.la O1 - Hosts: 206.53.61.77 google.li O1 - Hosts: 206.53.61.77 google.lv O1 - Hosts: 206.53.61.77 google.ma O1 - Hosts: 206.53.61.77 google.ms O1 - Hosts: 206.53.61.77 google.mu O1 - Hosts: 206.53.61.77 google.mw O1 - Hosts: 206.53.61.77 google.nl O1 - Hosts: 206.53.61.77 google.no O1 - Hosts: 206.53.61.77 google.nr O1 - Hosts: 206.53.61.77 google.nu O1 - Hosts: 206.53.61.77 google.pl O1 - Hosts: 206.53.61.77 google.pn O1 - Hosts: 206.53.61.77 google.pt O1 - Hosts: 206.53.61.77 google.ro O1 - Hosts: 206.53.61.77 google.ru O1 - Hosts: 206.53.61.77 google.rw O1 - Hosts: 206.53.61.77 google.sc O1 - Hosts: 206.53.61.77 google.se O1 - Hosts: 206.53.61.77 google.sh O1 - Hosts: 206.53.61.77 google.si O1 - Hosts: 206.53.61.77 google.sm O1 - Hosts: 206.53.61.77 google.sn O1 - Hosts: 206.53.61.77 google.st O1 - Hosts: 206.53.61.77 google.tl O1 - Hosts: 206.53.61.77 google.tm O1 - Hosts: 206.53.61.77 google.tt O1 - Hosts: 206.53.61.77 google.us O1 - Hosts: 206.53.61.77 google.vu O1 - Hosts: 206.53.61.77 google.ws O1 - Hosts: 206.53.61.77 google.co.ck O1 - Hosts: 206.53.61.77 google.co.id O1 - Hosts: 206.53.61.77 google.co.il O1 - Hosts: 206.53.61.77 google.co.in O1 - Hosts: 206.53.61.77 google.co.jp O1 - Hosts: 206.53.61.77 google.co.kr O1 - Hosts: 206.53.61.77 google.co.ls O1 - Hosts: 206.53.61.77 google.co.ma O1 - Hosts: 206.53.61.77 google.co.nz O1 - Hosts: 206.53.61.77 google.co.tz O1 - Hosts: 206.53.61.77 google.co.ug O1 - Hosts: 206.53.61.77 google.co.uk O1 - Hosts: 206.53.61.77 google.co.za O1 - Hosts: 206.53.61.77 google.co.zm O1 - Hosts: 206.53.61.77 google.com O1 - Hosts: 206.53.61.77 google.com.af O2 - BHO: AcroIEHelperStub - {18DF081C-E8AD-4283-A596-FA578C2EBDC3} - C:\Program Files\Fichiers communs\Adobe\Acrobat\ActiveX\AcroIEHelperShim.dll O2 - BHO: IEVkbdBHO - {59273AB4-E7D3-40F9-A1A8-6FA9CCA1862C} - C:\Program Files\Kaspersky Lab\Kaspersky Anti-Virus 2010\ievkbd.dll O2 - BHO: (no name) - {5C255C8A-E604-49b4-9D64-90988571CECB} - (no file) O2 - BHO: Programme d'aide de l'Assistant de connexion Windows Live - {9030D464-4C02-4ABF-8ECC-5164760863C6} - C:\Program Files\Fichiers communs\Microsoft Shared\Windows Live\WindowsLiveLogin.dll O2 - BHO: Java Plug-In 2 SSV Helper - {DBC80044-A445-435b-BC74-9C25C1C588A9} - C:\Program Files\Java\jre6\bin\jp2ssv.dll O2 - BHO: link filter bho - {E33CF602-D945-461A-83F0-819F76A199F8} - C:\Program Files\Kaspersky Lab\Kaspersky Anti-Virus 2010\klwtbbho.dll O2 - BHO: JQSIEStartDetectorImpl - {E7E6F031-17CE-4C07-BC86-EABFE594F69C} - C:\Program Files\Java\jre6\lib\deploy\jqs\ie\jqs_plugin.dll O2 - BHO: EpsonToolBandKicker Class - {E99421FB-68DD-40F0-B4AC-B7027CAE2F1A} - C:\Program Files\EPSON\EPSON Web-To-Page\EPSON Web-To-Page.dll O3 - Toolbar: EPSON Web-To-Page - {EE5D279F-081B-4404-994D-C6B60AAEBA6D} - C:\Program Files\EPSON\EPSON Web-To-Page\EPSON Web-To-Page.dll O4 - HKLM\..\Run: [RTHDCPL] RTHDCPL.EXE O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE C:\WINDOWS\system32\NvCpl.dll,NvStartup O4 - HKLM\..\Run: [nwiz] nwiz.exe /install O4 - HKLM\..\Run: [NvMediaCenter] RUNDLL32.EXE C:\WINDOWS\system32\NvMcTray.dll,NvTaskbarInit O4 - HKLM\..\Run: [Autoconfigurateur WiFi SFR] "C:\Program Files\SFR\Kit\WiFi\9wifi.exe" O4 - HKLM\..\Run: [LVCOMSX] C:\WINDOWS\system32\LVCOMSX.EXE O4 - HKLM\..\Run: [LogitechVideoRepair] C:\Program Files\Logitech\Video\ISStart.exe O4 - HKLM\..\Run: [LogitechVideoTray] C:\Program Files\Logitech\Video\LogiTray.exe O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime O4 - HKLM\..\Run: [DataLayer] C:\Program Files\Fichiers communs\PCSuite\DataLayer\DataLayer.exe O4 - HKLM\..\Run: [PCSuiteTrayApplication] C:\Program Files\Nokia\Nokia PC Suite 6\LaunchApplication.exe -onlytray O4 - HKLM\..\Run: [Malwarebytes Anti-Malware (reboot)] "C:\Program Files\Malwarebytes' Anti-Malware\mbam.exe" /runcleanupscript O4 - HKLM\..\Run: [AVP] "C:\Program Files\Kaspersky Lab\Kaspersky Anti-Virus 2010\avp.exe" O4 - HKLM\..\Run: [Adobe Reader Speed Launcher] "C:\Program Files\Adobe\Reader 9.0\Reader\Reader_sl.exe" O4 - HKLM\..\Run: [sunJavaUpdateSched] "C:\Program Files\Java\jre6\bin\jusched.exe" O4 - HKLM\..\RunOnce: [uninstall Adobe Download Manager] "C:\WINDOWS\system32\rundll32.exe" "C:\Program Files\NOS\bin\getPlus_Helper.dll",Uninstall /Get1noarp O4 - HKLM\..\RunOnce: [KB926239] rundll32.exe apphelp.dll,ShimFlushCache O4 - HKCU\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\ctfmon.exe O4 - HKCU\..\Run: [LogitechSoftwareUpdate] "C:\Program Files\Logitech\Video\ManifestEngine.exe" boot O4 - HKCU\..\Run: [EA Core] "C:\Program Files\Electronic Arts\EADM\Core.exe" -silent O4 - HKCU\..\Run: [MSMSGS] "C:\Program Files\Messenger\msmsgs.exe" /background O4 - HKCU\..\Run: [PcSync] C:\Program Files\Nokia\Nokia PC Suite 6\PcSync2.exe /NoDialog O4 - HKCU\..\Run: [msnmsgr] "C:\Program Files\Windows Live\Messenger\msnmsgr.exe" /background O4 - HKUS\S-1-5-18\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'SYSTEM') O4 - HKUS\.DEFAULT\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'Default user') O4 - Global Startup: BTTray.lnk = ? O4 - Global Startup: Logitech Desktop Messenger.lnk = C:\Program Files\Logitech\Desktop Messenger\8876480\Program\LDMConf.exe O4 - Global Startup: Microsoft Office.lnk = C:\Program Files\Microsoft Office\Office\OSA9.EXE O4 - Global Startup: Ralink Wireless Utility.lnk = C:\Program Files\RALINK\Common\RaUI.exe O8 - Extra context menu item: Add to Google Photos Screensa&ver - res://C:\WINDOWS\system32\GPhotos.scr/200 O8 - Extra context menu item: Send To &Bluetooth - C:\Program Files\MSI\Bluetooth Software\btsendto_ie_ctx.htm O9 - Extra button: Clavier &virtuel - {4248FE82-7FCB-46AC-B270-339F08212110} - C:\Program Files\Kaspersky Lab\Kaspersky Anti-Virus 2010\klwtbbho.dll O9 - Extra button: (no name) - {85d1f590-48f4-11d9-9669-0800200c9a66} - C:\WINDOWS\bdoscandel.exe O9 - Extra 'Tools' menuitem: Uninstall BitDefender Online Scanner v8 - {85d1f590-48f4-11d9-9669-0800200c9a66} - C:\WINDOWS\bdoscandel.exe O9 - Extra button: @btrez.dll,-4015 - {CCA281CA-C863-46ef-9331-5C8D4460577F} - C:\Program Files\MSI\Bluetooth Software\btsendto_ie.htm O9 - Extra 'Tools' menuitem: @btrez.dll,-4017 - {CCA281CA-C863-46ef-9331-5C8D4460577F} - C:\Program Files\MSI\Bluetooth Software\btsendto_ie.htm O9 - Extra button: Analyse des &liens - {CCF151D8-D089-449F-A5A4-D9909053F20F} - C:\Program Files\Kaspersky Lab\Kaspersky Anti-Virus 2010\klwtbbho.dll O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe O9 - Extra button: (no name) - {3CA1D406-30D8-4DBC-8EE6-0E2C05F78864} - (no file) (HKCU) O16 - DPF: {0CCA191D-13A6-4E29-B746-314DEE697D83} (Facebook Photo Uploader 5 Control) - http://upload.facebook.com/controls/2008.1...toUploader5.cab O16 - DPF: {215B8138-A3CF-44C5-803F-8226143CFC0A} (Trend Micro ActiveX Scan Agent 6.6) - http://ushousecall02.trendmicro.com/housec...ivex/hcImpl.cab O16 - DPF: {2BC66F54-93A8-11D3-BEB6-00105AA9B6AE} (Symantec AntiVirus scanner) - http://security.symantec.com/sscv6/SharedC...bin/AvSniff.cab O16 - DPF: {2D8ED06D-3C30-438B-96AE-4D110FDC1FB8} (ActiveScan 2.0 Installer Class) - http://acs.pandasoftware.com/activescan/cabs/as2stubie.cab O16 - DPF: {5D6F45B3-9043-443D-A792-115447494D24} (UnoCtrl Class) - http://messenger.zone.msn.com/MessengerGam...1/GAME_UNO1.cab O16 - DPF: {5D86DDB5-BDF9-441B-9E9E-D4730F4EE499} (BDSCANONLINE Control) - http://www.zebulon.fr/scan8/oscan8.cab O16 - DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} (WUWebControl Class) - http://update.microsoft.com/windowsupdate/...b?1251969744265 O16 - DPF: {644E432F-49D3-41A1-8DD5-E099162EEEC5} (Symantec RuFSI Utility Class) - http://security.symantec.com/sscv6/SharedC...n/bin/cabsa.cab O16 - DPF: {67DABFBF-D0AB-41FA-9C46-CC0F21721616} - http://go.divx.com/plugin/DivXBrowserPlugin.cab O16 - DPF: {C3F79A2B-B9B4-4A66-B012-3EE46475B072} (MessengerStatsClient Class) - http://messenger.zone.msn.com/binary/Messe...nt.cab56907.cab O16 - DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} (Shockwave Flash Object) - http://fpdownload2.macromedia.com/get/shoc...ash/swflash.cab O16 - DPF: {E2883E8F-472F-4FB0-9522-AC9BF37916A7} (get_atlcom Class) - http://platformdl.adobe.com/NOS/getPlusPlus/1.6/gp.cab O20 - AppInit_DLLs: C:\PROGRA~1\KASPER~1\KASPER~1\mzvkbd3.dll O23 - Service: Kaspersky Anti-Virus (AVP) - Kaspersky Lab - C:\Program Files\Kaspersky Lab\Kaspersky Anti-Virus 2010\avp.exe O23 - Service: Service de transfert intelligent en arrière-plan (BITS) - Unknown owner - C:\WINDOWS\ O23 - Service: Bluetooth Service (btwdins) - WIDCOMM, Inc. - C:\Program Files\MSI\Bluetooth Software\bin\btwdins.exe O23 - Service: Firebird Server - MAGIX Instance (FirebirdServerMAGIXInstance) - MAGIX® - C:\Program Files\ALDI Service Photo\Common\Database\bin\fbserver.exe O23 - Service: Google Software Updater (gusvc) - Google - C:\Program Files\Google\Common\Google Updater\GoogleUpdaterService.exe O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Fichiers communs\InstallShield\Driver\11\Intel 32\IDriverT.exe O23 - Service: Java Quick Starter (JavaQuickStarterService) - Sun Microsystems, Inc. - C:\Program Files\Java\jre6\bin\jqs.exe O23 - Service: NVIDIA Display Driver Service (NVSvc) - NVIDIA Corporation - C:\WINDOWS\system32\nvsvc32.exe O23 - Service: Mises à jour automatiques (wuauserv) - Unknown owner - C:\WINDOWS\ -- End of file - 14476 bytes
  7. re nan je n'ai pas modifier le fichier hosts tu pense qu'il y a un soucis ma machine marche bien pour te dire j'avais des petits soucis avec Windows live messenger 2009 j'avais un message qui s'affichais a chaque connection windows live communications platform a rencontré un problème et doit fermer et quand je cliquais sur ne pas envoyé sa me deconnectais et bien plus de probleme avec sa donc ces cool aussi bon je vais faire se que tu me demande a plus tard
  8. Bonjour Apollo super antivirus il a l'air d'avoir fait du tres bon boulot, tout se que tu ma fait faire a largement amelioré " la qualité de mon pc " y marche mieux merci j'ai installé internet explorer 8 sa ces bien passé j'ai restaurer le systeme comme tu me l'a demandé, et j'ai effectuer un test avc MBAM voici le rapport : Malwarebytes' Anti-Malware 1.41 Version de la base de données: 2841 Windows 5.1.2600 Service Pack 2 22/09/2009 10:55:21 mbam-log-2009-09-22 (10-55-21).txt Type de recherche: Examen complet (A:\|C:\|D:\|E:\|F:\|G:\|) Eléments examinés: 153774 Temps écoulé: 11 minute(s), 37 second(s) Processus mémoire infecté(s): 0 Module(s) mémoire infecté(s): 0 Clé(s) du Registre infectée(s): 3 Valeur(s) du Registre infectée(s): 0 Elément(s) de données du Registre infecté(s): 2 Dossier(s) infecté(s): 0 Fichier(s) infecté(s): 0 Processus mémoire infecté(s): (Aucun élément nuisible détecté) Module(s) mémoire infecté(s): (Aucun élément nuisible détecté) Clé(s) du Registre infectée(s): HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avguard.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avscan.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sched.exe (Security.Hijack) -> Quarantined and deleted successfully. Valeur(s) du Registre infectée(s): (Aucun élément nuisible détecté) et mon rapport Hijackthis : Logfile of Trend Micro HijackThis v2.0.2 Scan saved at 11:01:03, on 22/09/2009 Platform: Windows XP SP2 (WinNT 5.01.2600) MSIE: Internet Explorer v8.00 (8.00.6001.18702) Boot mode: Normal Running processes: C:\WINDOWS\System32\smss.exe C:\WINDOWS\system32\winlogon.exe C:\WINDOWS\system32\services.exe C:\WINDOWS\system32\lsass.exe C:\WINDOWS\system32\svchost.exe C:\WINDOWS\System32\svchost.exe C:\WINDOWS\Explorer.EXE C:\WINDOWS\system32\spoolsv.exe C:\Program Files\MSI\Bluetooth Software\bin\btwdins.exe C:\Program Files\Java\jre6\bin\jqs.exe C:\WINDOWS\system32\nvsvc32.exe C:\WINDOWS\system32\svchost.exe C:\WINDOWS\RTHDCPL.EXE C:\WINDOWS\system32\RUNDLL32.EXE C:\Program Files\SFR\Kit\WiFi\9wifi.exe C:\WINDOWS\system32\LVCOMSX.EXE C:\Program Files\Logitech\Video\LogiTray.exe C:\Program Files\Java\jre6\bin\jusched.exe C:\Program Files\Fichiers communs\PCSuite\DataLayer\DataLayer.exe C:\Program Files\Nokia\Nokia PC Suite 6\LaunchApplication.exe C:\WINDOWS\system32\ctfmon.exe C:\Program Files\Electronic Arts\EADM\Core.exe C:\Program Files\Messenger\msmsgs.exe C:\Program Files\Nokia\Nokia PC Suite 6\PcSync2.exe C:\Program Files\Windows Live\Messenger\msnmsgr.exe C:\Program Files\MSI\Bluetooth Software\BTTray.exe C:\Program Files\Logitech\Video\FxSvr2.exe C:\PROGRA~1\FICHIE~1\PCSuite\Services\SERVIC~1.EXE C:\PROGRA~1\FICHIE~1\Nokia\MPAPI\MPAPI3s.exe C:\Program Files\RALINK\Common\RaUI.exe C:\Program Files\Internet Explorer\iexplore.exe C:\Program Files\Internet Explorer\iexplore.exe C:\Program Files\Kaspersky Lab\Kaspersky Anti-Virus 2010\klwtblfs.exe C:\Program Files\Malwarebytes' Anti-Malware\mbam.exe C:\Program Files\Java\jre6\bin\jucheck.exe C:\WINDOWS\system32\NOTEPAD.EXE C:\Program Files\trend micro\HijackThis\HijackThis.exe R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157 R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://google.fr/ R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157 R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896 R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896 R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?LinkId=69157 R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName = Liens O1 - Hosts: 74.125.45.100 4-open-davinci.com O1 - Hosts: 74.125.45.100 securitysoftwarepayments.com O1 - Hosts: 74.125.45.100 privatesecuredpayments.com O1 - Hosts: 74.125.45.100 secure.privatesecuredpayments.com O1 - Hosts: 74.125.45.100 getantivirusplusnow.com O1 - Hosts: 74.125.45.100 secure-plus-payments.com O1 - Hosts: 74.125.45.100 www.getantivirusplusnow.com O1 - Hosts: 74.125.45.100 www.secure-plus-payments.com O1 - Hosts: 74.125.45.100 www.getavplusnow.com O1 - Hosts: 74.125.45.100 www.securesoftwarebill.com O1 - Hosts: 74.125.45.100 secure.paysecuresystem.com O1 - Hosts: 74.125.45.100 paysoftbillsolution.com O1 - Hosts: 206.53.61.77 google.ae O1 - Hosts: 206.53.61.77 google.as O1 - Hosts: 206.53.61.77 google.at O1 - Hosts: 206.53.61.77 google.az O1 - Hosts: 206.53.61.77 google.ba O1 - Hosts: 206.53.61.77 google.be O1 - Hosts: 206.53.61.77 google.bg O1 - Hosts: 206.53.61.77 google.bs O1 - Hosts: 206.53.61.77 google.ca O1 - Hosts: 206.53.61.77 google.cd O1 - Hosts: 206.53.61.77 google.com.gh O1 - Hosts: 206.53.61.77 google.com.hk O1 - Hosts: 206.53.61.77 google.com.jm O1 - Hosts: 206.53.61.77 google.com.mx O1 - Hosts: 206.53.61.77 google.com.my O1 - Hosts: 206.53.61.77 google.com.na O1 - Hosts: 206.53.61.77 google.com.nf O1 - Hosts: 206.53.61.77 google.com.ng O1 - Hosts: 206.53.61.77 google.ch O1 - Hosts: 206.53.61.77 google.com.np O1 - Hosts: 206.53.61.77 google.com.pr O1 - Hosts: 206.53.61.77 google.com.qa O1 - Hosts: 206.53.61.77 google.com.sg O1 - Hosts: 206.53.61.77 google.com.tj O1 - Hosts: 206.53.61.77 google.com.tw O1 - Hosts: 206.53.61.77 google.dj O1 - Hosts: 206.53.61.77 google.de O1 - Hosts: 206.53.61.77 google.dk O1 - Hosts: 206.53.61.77 google.dm O1 - Hosts: 206.53.61.77 google.ee O1 - Hosts: 206.53.61.77 google.fi O1 - Hosts: 206.53.61.77 google.fm O1 - Hosts: 206.53.61.77 google.fr O1 - Hosts: 206.53.61.77 google.ge O1 - Hosts: 206.53.61.77 google.gg O1 - Hosts: 206.53.61.77 google.gm O1 - Hosts: 206.53.61.77 google.gr O1 - Hosts: 206.53.61.77 google.ht O1 - Hosts: 206.53.61.77 google.ie O1 - Hosts: 206.53.61.77 google.im O1 - Hosts: 206.53.61.77 google.in O1 - Hosts: 206.53.61.77 google.it O1 - Hosts: 206.53.61.77 google.ki O1 - Hosts: 206.53.61.77 google.la O1 - Hosts: 206.53.61.77 google.li O1 - Hosts: 206.53.61.77 google.lv O1 - Hosts: 206.53.61.77 google.ma O1 - Hosts: 206.53.61.77 google.ms O1 - Hosts: 206.53.61.77 google.mu O1 - Hosts: 206.53.61.77 google.mw O1 - Hosts: 206.53.61.77 google.nl O1 - Hosts: 206.53.61.77 google.no O1 - Hosts: 206.53.61.77 google.nr O1 - Hosts: 206.53.61.77 google.nu O1 - Hosts: 206.53.61.77 google.pl O1 - Hosts: 206.53.61.77 google.pn O1 - Hosts: 206.53.61.77 google.pt O1 - Hosts: 206.53.61.77 google.ro O1 - Hosts: 206.53.61.77 google.ru O1 - Hosts: 206.53.61.77 google.rw O1 - Hosts: 206.53.61.77 google.sc O1 - Hosts: 206.53.61.77 google.se O1 - Hosts: 206.53.61.77 google.sh O1 - Hosts: 206.53.61.77 google.si O1 - Hosts: 206.53.61.77 google.sm O1 - Hosts: 206.53.61.77 google.sn O1 - Hosts: 206.53.61.77 google.st O1 - Hosts: 206.53.61.77 google.tl O1 - Hosts: 206.53.61.77 google.tm O1 - Hosts: 206.53.61.77 google.tt O1 - Hosts: 206.53.61.77 google.us O1 - Hosts: 206.53.61.77 google.vu O1 - Hosts: 206.53.61.77 google.ws O1 - Hosts: 206.53.61.77 google.co.ck O1 - Hosts: 206.53.61.77 google.co.id O1 - Hosts: 206.53.61.77 google.co.il O1 - Hosts: 206.53.61.77 google.co.in O1 - Hosts: 206.53.61.77 google.co.jp O1 - Hosts: 206.53.61.77 google.co.kr O1 - Hosts: 206.53.61.77 google.co.ls O1 - Hosts: 206.53.61.77 google.co.ma O1 - Hosts: 206.53.61.77 google.co.nz O1 - Hosts: 206.53.61.77 google.co.tz O1 - Hosts: 206.53.61.77 google.co.ug O1 - Hosts: 206.53.61.77 google.co.uk O1 - Hosts: 206.53.61.77 google.co.za O1 - Hosts: 206.53.61.77 google.co.zm O1 - Hosts: 206.53.61.77 google.com O1 - Hosts: 206.53.61.77 google.com.af O2 - BHO: AcroIEHelperStub - {18DF081C-E8AD-4283-A596-FA578C2EBDC3} - C:\Program Files\Fichiers communs\Adobe\Acrobat\ActiveX\AcroIEHelperShim.dll O2 - BHO: IEVkbdBHO - {59273AB4-E7D3-40F9-A1A8-6FA9CCA1862C} - C:\Program Files\Kaspersky Lab\Kaspersky Anti-Virus 2010\ievkbd.dll O2 - BHO: (no name) - {5C255C8A-E604-49b4-9D64-90988571CECB} - (no file) O2 - BHO: Programme d'aide de l'Assistant de connexion Windows Live - {9030D464-4C02-4ABF-8ECC-5164760863C6} - C:\Program Files\Fichiers communs\Microsoft Shared\Windows Live\WindowsLiveLogin.dll O2 - BHO: Java Plug-In 2 SSV Helper - {DBC80044-A445-435b-BC74-9C25C1C588A9} - C:\Program Files\Java\jre6\bin\jp2ssv.dll O2 - BHO: link filter bho - {E33CF602-D945-461A-83F0-819F76A199F8} - C:\Program Files\Kaspersky Lab\Kaspersky Anti-Virus 2010\klwtbbho.dll O2 - BHO: JQSIEStartDetectorImpl - {E7E6F031-17CE-4C07-BC86-EABFE594F69C} - C:\Program Files\Java\jre6\lib\deploy\jqs\ie\jqs_plugin.dll O2 - BHO: EpsonToolBandKicker Class - {E99421FB-68DD-40F0-B4AC-B7027CAE2F1A} - C:\Program Files\EPSON\EPSON Web-To-Page\EPSON Web-To-Page.dll O3 - Toolbar: EPSON Web-To-Page - {EE5D279F-081B-4404-994D-C6B60AAEBA6D} - C:\Program Files\EPSON\EPSON Web-To-Page\EPSON Web-To-Page.dll O4 - HKLM\..\Run: [RTHDCPL] RTHDCPL.EXE O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE C:\WINDOWS\system32\NvCpl.dll,NvStartup O4 - HKLM\..\Run: [nwiz] nwiz.exe /install O4 - HKLM\..\Run: [NvMediaCenter] RUNDLL32.EXE C:\WINDOWS\system32\NvMcTray.dll,NvTaskbarInit O4 - HKLM\..\Run: [Autoconfigurateur WiFi SFR] "C:\Program Files\SFR\Kit\WiFi\9wifi.exe" O4 - HKLM\..\Run: [LVCOMSX] C:\WINDOWS\system32\LVCOMSX.EXE O4 - HKLM\..\Run: [LogitechVideoRepair] C:\Program Files\Logitech\Video\ISStart.exe O4 - HKLM\..\Run: [LogitechVideoTray] C:\Program Files\Logitech\Video\LogiTray.exe O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime O4 - HKLM\..\Run: [Adobe Reader Speed Launcher] "C:\Program Files\Adobe\Reader 9.0\Reader\Reader_sl.exe" O4 - HKLM\..\Run: [sunJavaUpdateSched] "C:\Program Files\Java\jre6\bin\jusched.exe" O4 - HKLM\..\Run: [DataLayer] C:\Program Files\Fichiers communs\PCSuite\DataLayer\DataLayer.exe O4 - HKLM\..\Run: [PCSuiteTrayApplication] C:\Program Files\Nokia\Nokia PC Suite 6\LaunchApplication.exe -onlytray O4 - HKLM\..\Run: [Malwarebytes Anti-Malware (reboot)] "C:\Program Files\Malwarebytes' Anti-Malware\mbam.exe" /runcleanupscript O4 - HKLM\..\Run: [AVP] "C:\Program Files\Kaspersky Lab\Kaspersky Anti-Virus 2010\avp.exe" O4 - HKCU\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\ctfmon.exe O4 - HKCU\..\Run: [LogitechSoftwareUpdate] "C:\Program Files\Logitech\Video\ManifestEngine.exe" boot O4 - HKCU\..\Run: [EA Core] "C:\Program Files\Electronic Arts\EADM\Core.exe" -silent O4 - HKCU\..\Run: [MSMSGS] "C:\Program Files\Messenger\msmsgs.exe" /background O4 - HKCU\..\Run: [PcSync] C:\Program Files\Nokia\Nokia PC Suite 6\PcSync2.exe /NoDialog O4 - HKCU\..\Run: [msnmsgr] "C:\Program Files\Windows Live\Messenger\msnmsgr.exe" /background O4 - HKUS\S-1-5-18\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'SYSTEM') O4 - HKUS\.DEFAULT\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'Default user') O4 - Global Startup: BTTray.lnk = ? O4 - Global Startup: Logitech Desktop Messenger.lnk = C:\Program Files\Logitech\Desktop Messenger\8876480\Program\LDMConf.exe O4 - Global Startup: Microsoft Office.lnk = C:\Program Files\Microsoft Office\Office\OSA9.EXE O4 - Global Startup: Ralink Wireless Utility.lnk = C:\Program Files\RALINK\Common\RaUI.exe O8 - Extra context menu item: Add to Google Photos Screensa&ver - res://C:\WINDOWS\system32\GPhotos.scr/200 O8 - Extra context menu item: Send To &Bluetooth - C:\Program Files\MSI\Bluetooth Software\btsendto_ie_ctx.htm O9 - Extra button: Clavier &virtuel - {4248FE82-7FCB-46AC-B270-339F08212110} - C:\Program Files\Kaspersky Lab\Kaspersky Anti-Virus 2010\klwtbbho.dll O9 - Extra button: (no name) - {85d1f590-48f4-11d9-9669-0800200c9a66} - C:\WINDOWS\bdoscandel.exe O9 - Extra 'Tools' menuitem: Uninstall BitDefender Online Scanner v8 - {85d1f590-48f4-11d9-9669-0800200c9a66} - C:\WINDOWS\bdoscandel.exe O9 - Extra button: @btrez.dll,-4015 - {CCA281CA-C863-46ef-9331-5C8D4460577F} - C:\Program Files\MSI\Bluetooth Software\btsendto_ie.htm O9 - Extra 'Tools' menuitem: @btrez.dll,-4017 - {CCA281CA-C863-46ef-9331-5C8D4460577F} - C:\Program Files\MSI\Bluetooth Software\btsendto_ie.htm O9 - Extra button: Analyse des &liens - {CCF151D8-D089-449F-A5A4-D9909053F20F} - C:\Program Files\Kaspersky Lab\Kaspersky Anti-Virus 2010\klwtbbho.dll O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe O9 - Extra button: (no name) - {3CA1D406-30D8-4DBC-8EE6-0E2C05F78864} - (no file) (HKCU) O16 - DPF: {0CCA191D-13A6-4E29-B746-314DEE697D83} (Facebook Photo Uploader 5 Control) - http://upload.facebook.com/controls/2008.1...toUploader5.cab O16 - DPF: {215B8138-A3CF-44C5-803F-8226143CFC0A} (Trend Micro ActiveX Scan Agent 6.6) - http://ushousecall02.trendmicro.com/housec...ivex/hcImpl.cab O16 - DPF: {2BC66F54-93A8-11D3-BEB6-00105AA9B6AE} (Symantec AntiVirus scanner) - http://security.symantec.com/sscv6/SharedC...bin/AvSniff.cab O16 - DPF: {2D8ED06D-3C30-438B-96AE-4D110FDC1FB8} (ActiveScan 2.0 Installer Class) - http://acs.pandasoftware.com/activescan/cabs/as2stubie.cab O16 - DPF: {5D6F45B3-9043-443D-A792-115447494D24} (UnoCtrl Class) - http://messenger.zone.msn.com/MessengerGam...1/GAME_UNO1.cab O16 - DPF: {5D86DDB5-BDF9-441B-9E9E-D4730F4EE499} (BDSCANONLINE Control) - http://www.zebulon.fr/scan8/oscan8.cab O16 - DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} (WUWebControl Class) - http://update.microsoft.com/windowsupdate/...b?1251969744265 O16 - DPF: {644E432F-49D3-41A1-8DD5-E099162EEEC5} (Symantec RuFSI Utility Class) - http://security.symantec.com/sscv6/SharedC...n/bin/cabsa.cab O16 - DPF: {67DABFBF-D0AB-41FA-9C46-CC0F21721616} - http://go.divx.com/plugin/DivXBrowserPlugin.cab O16 - DPF: {C3F79A2B-B9B4-4A66-B012-3EE46475B072} (MessengerStatsClient Class) - http://messenger.zone.msn.com/binary/Messe...nt.cab56907.cab O16 - DPF: {E2883E8F-472F-4FB0-9522-AC9BF37916A7} - http://platformdl.adobe.com/NOS/getPlusPlus/1.6/gp.cab O20 - AppInit_DLLs: C:\PROGRA~1\KASPER~1\KASPER~1\mzvkbd3.dll O23 - Service: Kaspersky Anti-Virus (AVP) - Kaspersky Lab - C:\Program Files\Kaspersky Lab\Kaspersky Anti-Virus 2010\avp.exe O23 - Service: Service de transfert intelligent en arrière-plan (BITS) - Unknown owner - C:\WINDOWS\ O23 - Service: Bluetooth Service (btwdins) - WIDCOMM, Inc. - C:\Program Files\MSI\Bluetooth Software\bin\btwdins.exe O23 - Service: Firebird Server - MAGIX Instance (FirebirdServerMAGIXInstance) - MAGIX® - C:\Program Files\ALDI Service Photo\Common\Database\bin\fbserver.exe O23 - Service: Google Software Updater (gusvc) - Google - C:\Program Files\Google\Common\Google Updater\GoogleUpdaterService.exe O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Fichiers communs\InstallShield\Driver\11\Intel 32\IDriverT.exe O23 - Service: Java Quick Starter (JavaQuickStarterService) - Sun Microsystems, Inc. - C:\Program Files\Java\jre6\bin\jqs.exe O23 - Service: NVIDIA Display Driver Service (NVSvc) - NVIDIA Corporation - C:\WINDOWS\system32\nvsvc32.exe O23 - Service: Mises à jour automatiques (wuauserv) - Unknown owner - C:\WINDOWS\ -- End of file - 14264 bytes
  9. Analyse Complète: arrêtée : il y a 43 minutes (événements : 3, objets : 190, durée : 00:00:06) 22/09/2009 00:00:05 Tâche arrêtée 22/09/2009 00:00:05 Erreur de traitement c:\WINDOWS\system32\mmc.exe Erreur de lecture 21/09/2009 23:59:59 Lancement de la tâche Analyse Complète: terminée : il y a 12 minutes (événements : 278, objets : 149795, durée : 00:30:16) 22/09/2009 00:00:23 Lancement de la tâche 22/09/2009 00:16:29 Détectés: Packed.Win32.Tdss.c c:\program files\GIMP-2.0\lib\gimp\2.0\plug-ins\video.exe 22/09/2009 00:16:43 Supprimés: Packed.Win32.Tdss.c c:\program files\GIMP-2.0\lib\gimp\2.0\plug-ins\video.exe 22/09/2009 00:19:16 Détectés: Trojan-GameThief.Win32.Magania.cbmt c:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP100\A0010352.inf 22/09/2009 00:19:24 Supprimés: Trojan-GameThief.Win32.Magania.cbmt c:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP100\A0010352.inf 22/09/2009 00:19:39 Détectés: Trojan-GameThief.Win32.Magania.cbmt c:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP100\A0010697.inf 22/09/2009 00:19:40 Supprimés: Trojan-GameThief.Win32.Magania.cbmt c:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP100\A0010697.inf 22/09/2009 00:19:44 Détectés: Trojan-GameThief.Win32.Magania.cbow c:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP102\A0010825.inf 22/09/2009 00:19:44 Détectés: Trojan-GameThief.Win32.Magania.cbow c:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP102\A0010939.inf 22/09/2009 00:19:44 Supprimés: Trojan-GameThief.Win32.Magania.cbow c:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP102\A0010825.inf 22/09/2009 00:19:44 Supprimés: Trojan-GameThief.Win32.Magania.cbow c:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP102\A0010939.inf 22/09/2009 00:20:00 Détectés: Trojan-GameThief.Win32.Magania.cbow c:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP102\A0011282.inf 22/09/2009 00:20:00 Supprimés: Trojan-GameThief.Win32.Magania.cbow c:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP102\A0011282.inf 22/09/2009 00:20:00 Détectés: Trojan-GameThief.Win32.Magania.cbow c:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP102\A0011314.inf 22/09/2009 00:20:00 Supprimés: Trojan-GameThief.Win32.Magania.cbow c:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP102\A0011314.inf 22/09/2009 00:20:16 Détectés: Trojan-GameThief.Win32.Magania.cbow c:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP102\A0011640.inf 22/09/2009 00:20:16 Supprimés: Trojan-GameThief.Win32.Magania.cbow c:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP102\A0011640.inf 22/09/2009 00:20:17 Détectés: Trojan-GameThief.Win32.Magania.cbus c:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP103\A0011678.inf 22/09/2009 00:20:17 Supprimés: Trojan-GameThief.Win32.Magania.cbus c:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP103\A0011678.inf 22/09/2009 00:20:18 Détectés: Trojan-GameThief.Win32.Magania.cbus c:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP103\A0011736.inf 22/09/2009 00:20:18 Supprimés: Trojan-GameThief.Win32.Magania.cbus c:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP103\A0011736.inf 22/09/2009 00:20:25 Détectés: Trojan-GameThief.Win32.Magania.cbus c:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP104\A0011746.inf 22/09/2009 00:20:25 Détectés: Trojan-GameThief.Win32.Magania.cbus c:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP104\A0011760.inf 22/09/2009 00:20:35 Supprimés: Trojan-GameThief.Win32.Magania.cbus c:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP104\A0011746.inf 22/09/2009 00:20:35 Supprimés: Trojan-GameThief.Win32.Magania.cbus c:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP104\A0011760.inf 22/09/2009 00:20:36 Détectés: Trojan-GameThief.Win32.Magania.cbus c:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP104\A0011939.inf 22/09/2009 00:20:36 Détectés: Trojan-GameThief.Win32.Magania.cbus c:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP104\A0011960.inf 22/09/2009 00:20:36 Supprimés: Trojan-GameThief.Win32.Magania.cbus c:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP104\A0011939.inf 22/09/2009 00:20:36 Supprimés: Trojan-GameThief.Win32.Magania.cbus c:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP104\A0011960.inf 22/09/2009 00:20:37 Détectés: Trojan-GameThief.Win32.Magania.cbzd c:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP106\A0012052.exe 22/09/2009 00:20:38 Supprimés: Trojan-GameThief.Win32.Magania.cbzd c:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP106\A0012052.exe 22/09/2009 00:20:38 Détectés: Trojan-GameThief.Win32.Magania.cafe c:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP107\A0012092.bat 22/09/2009 00:20:40 Supprimés: Trojan-GameThief.Win32.Magania.cafe c:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP107\A0012092.bat 22/09/2009 00:20:41 Détectés: Trojan-GameThief.Win32.Magania.cbzd c:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP108\A0012200.exe 22/09/2009 00:20:42 Supprimés: Trojan-GameThief.Win32.Magania.cbzd c:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP108\A0012200.exe 22/09/2009 00:22:21 Détectés: Trojan-GameThief.Win32.Magania.bzms c:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP77\A0008017.inf 22/09/2009 00:22:21 Détectés: Trojan-GameThief.Win32.Magania.bzwv c:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP78\A0008035.inf 22/09/2009 00:22:29 Détectés: Trojan-GameThief.Win32.Magania.bzwv c:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP78\A0008176.inf 22/09/2009 00:22:32 Supprimés: Trojan-GameThief.Win32.Magania.bzwv c:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP78\A0008176.inf 22/09/2009 00:22:32 Supprimés: Trojan-GameThief.Win32.Magania.bzwv c:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP78\A0008035.inf 22/09/2009 00:22:32 Supprimés: Trojan-GameThief.Win32.Magania.bzms c:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP77\A0008017.inf 22/09/2009 00:22:38 Détectés: Trojan.Win32.AutoRun.bh c:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP79\A0008310.inf 22/09/2009 00:22:38 Supprimés: Trojan.Win32.AutoRun.bh c:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP79\A0008310.inf 22/09/2009 00:22:40 Détectés: Trojan.Win32.AutoRun.bh c:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP79\A0008346.inf 22/09/2009 00:22:41 Supprimés: Trojan.Win32.AutoRun.bh c:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP79\A0008346.inf 22/09/2009 00:22:44 Détectés: Trojan.Win32.AutoRun.bh c:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP80\A0008511.inf 22/09/2009 00:22:45 Supprimés: Trojan.Win32.AutoRun.bh c:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP80\A0008511.inf 22/09/2009 00:22:45 Détectés: Trojan.Win32.AutoRun.bh c:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP81\A0008518.inf 22/09/2009 00:22:45 Supprimés: Trojan.Win32.AutoRun.bh c:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP81\A0008518.inf 22/09/2009 00:22:55 Détectés: Trojan.Win32.AutoRun.bh c:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP81\A0008589.inf 22/09/2009 00:22:55 Détectés: Trojan.Win32.AutoRun.bh c:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP82\A0008598.inf 22/09/2009 00:22:55 Supprimés: Trojan.Win32.AutoRun.bh c:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP81\A0008589.inf 22/09/2009 00:22:55 Supprimés: Trojan.Win32.AutoRun.bh c:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP82\A0008598.inf 22/09/2009 00:23:07 Détectés: Trojan.Win32.AutoRun.bh c:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP82\A0008824.inf 22/09/2009 00:23:07 Supprimés: Trojan.Win32.AutoRun.bh c:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP82\A0008824.inf 22/09/2009 00:23:16 Détectés: Trojan.Win32.AutoRun.bh c:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP83\A0008981.inf 22/09/2009 00:23:16 Supprimés: Trojan.Win32.AutoRun.bh c:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP83\A0008981.inf 22/09/2009 00:23:18 Détectés: Trojan.Win32.AutoRun.bh c:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP83\A0009015.inf 22/09/2009 00:23:18 Supprimés: Trojan.Win32.AutoRun.bh c:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP83\A0009015.inf 22/09/2009 00:23:20 Détectés: Trojan.Win32.AutoRun.bh c:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP84\A0009036.inf 22/09/2009 00:23:20 Supprimés: Trojan.Win32.AutoRun.bh c:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP84\A0009036.inf 22/09/2009 00:23:20 Détectés: Trojan.Win32.AutoRun.bh c:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP85\A0009051.inf 22/09/2009 00:23:21 Supprimés: Trojan.Win32.AutoRun.bh c:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP85\A0009051.inf 22/09/2009 00:23:27 Détectés: Trojan.Win32.AutoRun.bh c:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP85\A0009129.inf 22/09/2009 00:23:28 Détectés: Trojan.Win32.AutoRun.bj c:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP87\A0009197.inf 22/09/2009 00:23:28 Détectés: Trojan.Win32.AutoRun.bj c:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP87\A0009216.inf 22/09/2009 00:23:30 Supprimés: Trojan.Win32.AutoRun.bj c:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP87\A0009216.inf 22/09/2009 00:23:31 Supprimés: Trojan.Win32.AutoRun.bh c:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP85\A0009129.inf 22/09/2009 00:23:31 Supprimés: Trojan.Win32.AutoRun.bj c:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP87\A0009197.inf 22/09/2009 00:23:31 Détectés: Trojan-GameThief.Win32.Magania.cafe c:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP88\A0009248.inf 22/09/2009 00:23:31 Détectés: Trojan-GameThief.Win32.Magania.cafe c:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP88\A0009257.inf 22/09/2009 00:23:31 Supprimés: Trojan-GameThief.Win32.Magania.cafe c:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP88\A0009248.inf 22/09/2009 00:23:31 Supprimés: Trojan-GameThief.Win32.Magania.cafe c:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP88\A0009257.inf 22/09/2009 00:23:31 Détectés: Trojan-GameThief.Win32.Magania.caln c:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP90\A0009393.inf 22/09/2009 00:23:31 Supprimés: Trojan-GameThief.Win32.Magania.caln c:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP90\A0009393.inf 22/09/2009 00:23:35 Détectés: Trojan.Win32.AutoRun.cc c:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP92\A0009443.inf 22/09/2009 00:23:35 Détectés: Trojan.Win32.AutoRun.cc c:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP92\A0009454.inf 22/09/2009 00:23:38 Détectés: Trojan-GameThief.Win32.Magania.cayk c:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP95\A0009748.inf 22/09/2009 00:23:43 Supprimés: Trojan-GameThief.Win32.Magania.cayk c:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP95\A0009748.inf 22/09/2009 00:23:43 Supprimés: Trojan.Win32.AutoRun.cc c:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP92\A0009443.inf 22/09/2009 00:23:43 Détectés: Trojan-GameThief.Win32.Magania.cayk c:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP95\A0009779.inf 22/09/2009 00:23:43 Supprimés: Trojan.Win32.AutoRun.cc c:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP92\A0009454.inf 22/09/2009 00:23:43 Supprimés: Trojan-GameThief.Win32.Magania.cayk c:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP95\A0009779.inf 22/09/2009 00:23:59 Détectés: Trojan-GameThief.Win32.Magania.cbmt c:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP97\A0010012.inf 22/09/2009 00:23:59 Supprimés: Trojan-GameThief.Win32.Magania.cbmt c:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP97\A0010012.inf 22/09/2009 00:24:05 Détectés: Trojan-GameThief.Win32.Magania.cbmt c:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP98\A0010085.inf 22/09/2009 00:24:06 Supprimés: Trojan-GameThief.Win32.Magania.cbmt c:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP98\A0010085.inf 22/09/2009 00:24:09 Détectés: Trojan-GameThief.Win32.Magania.cbmt c:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP98\A0010157.inf 22/09/2009 00:24:10 Supprimés: Trojan-GameThief.Win32.Magania.cbmt c:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP98\A0010157.inf 22/09/2009 00:28:45 Détectés: Trojan-GameThief.Win32.Magania.cbmt D:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP100\A0010354.inf 22/09/2009 00:28:47 Détectés: Trojan-GameThief.Win32.Magania.cbmt D:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP100\A0010699.inf 22/09/2009 00:28:49 Détectés: Trojan-GameThief.Win32.Magania.cbow D:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP102\A0010827.inf 22/09/2009 00:28:57 Supprimés: Trojan-GameThief.Win32.Magania.cbow D:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP102\A0010827.inf 22/09/2009 00:28:57 Supprimés: Trojan-GameThief.Win32.Magania.cbmt D:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP100\A0010354.inf 22/09/2009 00:28:57 Supprimés: Trojan-GameThief.Win32.Magania.cbmt D:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP100\A0010699.inf 22/09/2009 00:28:57 Détectés: Trojan-GameThief.Win32.Magania.cbow D:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP102\A0010941.inf 22/09/2009 00:28:57 Supprimés: Trojan-GameThief.Win32.Magania.cbow D:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP102\A0010941.inf 22/09/2009 00:28:57 Détectés: Trojan-GameThief.Win32.Magania.cbow D:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP102\A0011284.inf 22/09/2009 00:28:57 Détectés: Trojan-GameThief.Win32.Magania.cbow D:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP102\A0011316.inf 22/09/2009 00:28:57 Supprimés: Trojan-GameThief.Win32.Magania.cbow D:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP102\A0011284.inf 22/09/2009 00:28:57 Supprimés: Trojan-GameThief.Win32.Magania.cbow D:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP102\A0011316.inf 22/09/2009 00:28:57 Détectés: Trojan-GameThief.Win32.Magania.cbow D:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP102\A0011642.inf 22/09/2009 00:28:57 Supprimés: Trojan-GameThief.Win32.Magania.cbow D:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP102\A0011642.inf 22/09/2009 00:28:57 Détectés: Trojan-GameThief.Win32.Magania.cbus D:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP103\A0011680.inf 22/09/2009 00:28:58 Supprimés: Trojan-GameThief.Win32.Magania.cbus D:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP103\A0011680.inf 22/09/2009 00:29:02 Détectés: Trojan-GameThief.Win32.Magania.cbus D:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP104\A0011748.inf 22/09/2009 00:29:02 Détectés: Trojan-GameThief.Win32.Magania.cbus D:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP104\A0011762.inf 22/09/2009 00:29:02 Supprimés: Trojan-GameThief.Win32.Magania.cbus D:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP104\A0011748.inf 22/09/2009 00:29:02 Supprimés: Trojan-GameThief.Win32.Magania.cbus D:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP104\A0011762.inf 22/09/2009 00:29:02 Détectés: Trojan-GameThief.Win32.Magania.cbus D:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP103\A0011738.inf 22/09/2009 00:29:02 Détectés: Trojan-GameThief.Win32.Magania.cbus D:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP104\A0011941.inf 22/09/2009 00:29:02 Supprimés: Trojan-GameThief.Win32.Magania.cbus D:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP103\A0011738.inf 22/09/2009 00:29:02 Détectés: Trojan-GameThief.Win32.Magania.cbus D:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP104\A0011962.inf 22/09/2009 00:29:02 Supprimés: Trojan-GameThief.Win32.Magania.cbus D:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP104\A0011941.inf 22/09/2009 00:29:02 Détectés: Trojan-GameThief.Win32.Magania.cbzd D:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP106\A0012054.exe 22/09/2009 00:29:02 Supprimés: Trojan-GameThief.Win32.Magania.cbus D:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP104\A0011962.inf 22/09/2009 00:29:02 Supprimés: Trojan-GameThief.Win32.Magania.cbzd D:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP106\A0012054.exe 22/09/2009 00:29:02 Détectés: Trojan-GameThief.Win32.Magania.camn D:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP107\A0012093.bat 22/09/2009 00:29:02 Supprimés: Trojan-GameThief.Win32.Magania.camn D:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP107\A0012093.bat 22/09/2009 00:29:02 Détectés: Trojan-GameThief.Win32.Magania.bzxr D:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP107\A0012094.bat 22/09/2009 00:29:02 Détectés: Trojan-GameThief.Win32.OnLineGames.bmti D:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP107\A0012095.bat 22/09/2009 00:29:02 Supprimés: Trojan-GameThief.Win32.Magania.bzxr D:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP107\A0012094.bat 22/09/2009 00:29:02 Détectés: Trojan-GameThief.Win32.Magania.cafe D:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP107\A0012098.bat 22/09/2009 00:29:02 Supprimés: Trojan-GameThief.Win32.OnLineGames.bmti D:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP107\A0012095.bat 22/09/2009 00:29:02 Détectés: Trojan-GameThief.Win32.Magania.cbzd D:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP108\A0012136.exe 22/09/2009 00:29:02 Supprimés: Trojan-GameThief.Win32.Magania.cafe D:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP107\A0012098.bat 22/09/2009 00:29:02 Supprimés: Trojan-GameThief.Win32.Magania.cbzd D:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP108\A0012136.exe 22/09/2009 00:29:02 Détectés: Trojan-GameThief.Win32.Magania.cbzd D:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP110\A0012689.exe 22/09/2009 00:29:03 Supprimés: Trojan-GameThief.Win32.Magania.cbzd D:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP110\A0012689.exe 22/09/2009 00:29:03 Détectés: Trojan-GameThief.Win32.Magania.bzms D:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP77\A0008019.inf 22/09/2009 00:29:03 Supprimés: Trojan-GameThief.Win32.Magania.bzms D:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP77\A0008019.inf 22/09/2009 00:29:03 Détectés: Trojan-GameThief.Win32.Magania.bzwv D:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP78\A0008037.inf 22/09/2009 00:29:03 Supprimés: Trojan-GameThief.Win32.Magania.bzwv D:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP78\A0008037.inf 22/09/2009 00:29:03 Détectés: Trojan-GameThief.Win32.Magania.bzwv D:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP78\A0008179.inf 22/09/2009 00:29:03 Détectés: Trojan.Win32.AutoRun.bh D:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP79\A0008312.inf 22/09/2009 00:29:03 Supprimés: Trojan-GameThief.Win32.Magania.bzwv D:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP78\A0008179.inf 22/09/2009 00:29:03 Supprimés: Trojan.Win32.AutoRun.bh D:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP79\A0008312.inf 22/09/2009 00:29:03 Détectés: Trojan.Win32.AutoRun.bh D:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP79\A0008348.inf 22/09/2009 00:29:03 Supprimés: Trojan.Win32.AutoRun.bh D:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP79\A0008348.inf 22/09/2009 00:29:03 Détectés: Trojan.Win32.AutoRun.bh D:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP80\A0008513.inf 22/09/2009 00:29:03 Supprimés: Trojan.Win32.AutoRun.bh D:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP80\A0008513.inf 22/09/2009 00:29:03 Détectés: Trojan.Win32.AutoRun.bh D:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP81\A0008520.inf 22/09/2009 00:29:03 Supprimés: Trojan.Win32.AutoRun.bh D:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP81\A0008520.inf 22/09/2009 00:29:03 Détectés: Trojan.Win32.AutoRun.bh D:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP81\A0008591.inf 22/09/2009 00:29:03 Détectés: Trojan.Win32.AutoRun.bh D:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP82\A0008600.inf 22/09/2009 00:29:03 Supprimés: Trojan.Win32.AutoRun.bh D:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP81\A0008591.inf 22/09/2009 00:29:03 Supprimés: Trojan.Win32.AutoRun.bh D:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP82\A0008600.inf 22/09/2009 00:29:03 Détectés: Trojan.Win32.AutoRun.bh D:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP82\A0008826.inf 22/09/2009 00:29:03 Supprimés: Trojan.Win32.AutoRun.bh D:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP82\A0008826.inf 22/09/2009 00:29:04 Détectés: Trojan.Win32.AutoRun.bh D:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP83\A0008983.inf 22/09/2009 00:29:04 Détectés: Trojan.Win32.AutoRun.bh D:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP83\A0009017.inf 22/09/2009 00:29:04 Supprimés: Trojan.Win32.AutoRun.bh D:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP83\A0008983.inf 22/09/2009 00:29:04 Supprimés: Trojan.Win32.AutoRun.bh D:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP83\A0009017.inf 22/09/2009 00:29:04 Détectés: Trojan.Win32.AutoRun.bh D:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP84\A0009038.inf 22/09/2009 00:29:04 Supprimés: Trojan.Win32.AutoRun.bh D:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP84\A0009038.inf 22/09/2009 00:29:04 Détectés: Trojan.Win32.AutoRun.bh D:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP85\A0009053.inf 22/09/2009 00:29:04 Détectés: Trojan.Win32.AutoRun.bh D:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP85\A0009131.inf 22/09/2009 00:29:04 Supprimés: Trojan.Win32.AutoRun.bh D:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP85\A0009053.inf 22/09/2009 00:29:04 Détectés: Trojan.Win32.AutoRun.bj D:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP87\A0009199.inf 22/09/2009 00:29:04 Supprimés: Trojan.Win32.AutoRun.bh D:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP85\A0009131.inf 22/09/2009 00:29:04 Supprimés: Trojan.Win32.AutoRun.bj D:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP87\A0009199.inf 22/09/2009 00:29:04 Détectés: Trojan.Win32.AutoRun.bj D:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP87\A0009218.inf 22/09/2009 00:29:04 Supprimés: Trojan.Win32.AutoRun.bj D:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP87\A0009218.inf 22/09/2009 00:29:04 Détectés: Trojan-GameThief.Win32.Magania.cafe D:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP88\A0009250.inf 22/09/2009 00:29:04 Supprimés: Trojan-GameThief.Win32.Magania.cafe D:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP88\A0009250.inf 22/09/2009 00:29:04 Détectés: Trojan-GameThief.Win32.Magania.cafe D:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP88\A0009259.inf 22/09/2009 00:29:05 Détectés: Trojan-GameThief.Win32.Magania.caln D:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP90\A0009395.inf 22/09/2009 00:29:05 Supprimés: Trojan-GameThief.Win32.Magania.cafe D:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP88\A0009259.inf 22/09/2009 00:29:05 Supprimés: Trojan-GameThief.Win32.Magania.caln D:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP90\A0009395.inf 22/09/2009 00:29:05 Détectés: Trojan.Win32.AutoRun.cc D:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP92\A0009445.inf 22/09/2009 00:29:05 Supprimés: Trojan.Win32.AutoRun.cc D:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP92\A0009445.inf 22/09/2009 00:29:05 Détectés: Trojan.Win32.AutoRun.cc D:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP92\A0009456.inf 22/09/2009 00:29:05 Détectés: Trojan-GameThief.Win32.Magania.cayk D:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP95\A0009750.inf 22/09/2009 00:29:05 Supprimés: Trojan.Win32.AutoRun.cc D:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP92\A0009456.inf 22/09/2009 00:29:05 Détectés: Trojan-GameThief.Win32.Magania.cayk D:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP95\A0009781.inf 22/09/2009 00:29:05 Supprimés: Trojan-GameThief.Win32.Magania.cayk D:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP95\A0009750.inf 22/09/2009 00:29:05 Supprimés: Trojan-GameThief.Win32.Magania.cayk D:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP95\A0009781.inf 22/09/2009 00:29:05 Détectés: Trojan-GameThief.Win32.Magania.cbmt D:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP97\A0010014.inf 22/09/2009 00:29:05 Supprimés: Trojan-GameThief.Win32.Magania.cbmt D:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP97\A0010014.inf 22/09/2009 00:29:05 Détectés: Trojan-GameThief.Win32.Magania.cbmt D:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP98\A0010087.inf 22/09/2009 00:29:05 Détectés: Trojan-GameThief.Win32.Magania.cbmt D:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP98\A0010159.inf 22/09/2009 00:29:05 Supprimés: Trojan-GameThief.Win32.Magania.cbmt D:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP98\A0010087.inf 22/09/2009 00:29:05 Supprimés: Trojan-GameThief.Win32.Magania.cbmt D:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP98\A0010159.inf 22/09/2009 00:30:05 Détectés: Trojan-GameThief.Win32.Magania.cbmt E:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP100\A0010356.inf 22/09/2009 00:30:05 Détectés: Trojan-GameThief.Win32.Magania.cbmt E:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP100\A0010701.inf 22/09/2009 00:30:06 Détectés: Trojan-GameThief.Win32.Magania.cbow E:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP102\A0010829.inf 22/09/2009 00:30:20 Supprimés: Trojan-GameThief.Win32.Magania.cbmt E:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP100\A0010356.inf 22/09/2009 00:30:20 Supprimés: Trojan-GameThief.Win32.Magania.cbow E:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP102\A0010829.inf 22/09/2009 00:30:20 Supprimés: Trojan-GameThief.Win32.Magania.cbmt E:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP100\A0010701.inf 22/09/2009 00:30:23 Détectés: Trojan-GameThief.Win32.Magania.cbow E:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP102\A0010943.inf 22/09/2009 00:30:23 Détectés: Trojan-GameThief.Win32.Magania.cbow E:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP102\A0011286.inf 22/09/2009 00:30:23 Supprimés: Trojan-GameThief.Win32.Magania.cbow E:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP102\A0010943.inf 22/09/2009 00:30:23 Détectés: Trojan-GameThief.Win32.Magania.cbow E:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP102\A0011318.inf 22/09/2009 00:30:23 Supprimés: Trojan-GameThief.Win32.Magania.cbow E:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP102\A0011286.inf 22/09/2009 00:30:23 Détectés: Trojan-GameThief.Win32.Magania.cbow E:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP102\A0011644.inf 22/09/2009 00:30:23 Supprimés: Trojan-GameThief.Win32.Magania.cbow E:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP102\A0011318.inf 22/09/2009 00:30:23 Détectés: Trojan-GameThief.Win32.Magania.cbus E:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP103\A0011682.inf 22/09/2009 00:30:23 Supprimés: Trojan-GameThief.Win32.Magania.cbow E:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP102\A0011644.inf 22/09/2009 00:30:23 Détectés: Trojan-GameThief.Win32.Magania.cbus E:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP103\A0011740.inf 22/09/2009 00:30:23 Supprimés: Trojan-GameThief.Win32.Magania.cbus E:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP103\A0011682.inf 22/09/2009 00:30:23 Détectés: Trojan-GameThief.Win32.Magania.cbus E:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP104\A0011750.inf 22/09/2009 00:30:24 Supprimés: Trojan-GameThief.Win32.Magania.cbus E:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP103\A0011740.inf 22/09/2009 00:30:24 Détectés: Trojan-GameThief.Win32.Magania.cbus E:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP104\A0011764.inf 22/09/2009 00:30:24 Supprimés: Trojan-GameThief.Win32.Magania.cbus E:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP104\A0011750.inf 22/09/2009 00:30:24 Détectés: Trojan-GameThief.Win32.Magania.cbus E:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP104\A0011943.inf 22/09/2009 00:30:24 Supprimés: Trojan-GameThief.Win32.Magania.cbus E:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP104\A0011764.inf 22/09/2009 00:30:24 Détectés: Trojan-GameThief.Win32.Magania.cbus E:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP104\A0011964.inf 22/09/2009 00:30:24 Supprimés: Trojan-GameThief.Win32.Magania.cbus E:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP104\A0011943.inf 22/09/2009 00:30:24 Détectés: Trojan-GameThief.Win32.Magania.cbzd E:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP106\A0012056.exe 22/09/2009 00:30:24 Supprimés: Trojan-GameThief.Win32.Magania.cbus E:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP104\A0011964.inf 22/09/2009 00:30:24 Détectés: Trojan-GameThief.Win32.Magania.camn E:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP107\A0012099.bat 22/09/2009 00:30:24 Supprimés: Trojan-GameThief.Win32.Magania.cbzd E:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP106\A0012056.exe 22/09/2009 00:30:25 Détectés: Trojan-GameThief.Win32.Magania.bzxr E:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP107\A0012100.bat 22/09/2009 00:30:25 Supprimés: Trojan-GameThief.Win32.Magania.camn E:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP107\A0012099.bat 22/09/2009 00:30:25 Détectés: Trojan-GameThief.Win32.OnLineGames.bmti E:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP107\A0012101.bat 22/09/2009 00:30:25 Supprimés: Trojan-GameThief.Win32.Magania.bzxr E:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP107\A0012100.bat 22/09/2009 00:30:25 Supprimés: Trojan-GameThief.Win32.OnLineGames.bmti E:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP107\A0012101.bat 22/09/2009 00:30:25 Détectés: Trojan-GameThief.Win32.Magania.cafe E:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP107\A0012104.bat 22/09/2009 00:30:25 Détectés: Trojan-GameThief.Win32.Magania.cbzd E:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP108\A0012138.exe 22/09/2009 00:30:26 Supprimés: Trojan-GameThief.Win32.Magania.cafe E:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP107\A0012104.bat 22/09/2009 00:30:26 Détectés: Trojan-GameThief.Win32.Magania.cbzd E:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP110\A0012690.exe 22/09/2009 00:30:26 Supprimés: Trojan-GameThief.Win32.Magania.cbzd E:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP108\A0012138.exe 22/09/2009 00:30:26 Supprimés: Trojan-GameThief.Win32.Magania.cbzd E:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP110\A0012690.exe 22/09/2009 00:30:27 Détectés: Trojan-GameThief.Win32.Magania.bzms E:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP77\A0008021.inf 22/09/2009 00:30:27 Supprimés: Trojan-GameThief.Win32.Magania.bzms E:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP77\A0008021.inf 22/09/2009 00:30:27 Détectés: Trojan-GameThief.Win32.Magania.bzwv E:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP78\A0008039.inf 22/09/2009 00:30:27 Détectés: Trojan-GameThief.Win32.Magania.bzwv E:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP78\A0008181.inf 22/09/2009 00:30:27 Supprimés: Trojan-GameThief.Win32.Magania.bzwv E:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP78\A0008039.inf 22/09/2009 00:30:27 Supprimés: Trojan-GameThief.Win32.Magania.bzwv E:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP78\A0008181.inf 22/09/2009 00:30:27 Détectés: Trojan.Win32.AutoRun.bh E:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP79\A0008314.inf 22/09/2009 00:30:27 Détectés: Trojan.Win32.AutoRun.bh E:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP79\A0008350.inf 22/09/2009 00:30:27 Supprimés: Trojan.Win32.AutoRun.bh E:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP79\A0008314.inf 22/09/2009 00:30:27 Supprimés: Trojan.Win32.AutoRun.bh E:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP79\A0008350.inf 22/09/2009 00:30:27 Détectés: Trojan.Win32.AutoRun.bh E:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP80\A0008515.inf 22/09/2009 00:30:27 Supprimés: Trojan.Win32.AutoRun.bh E:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP80\A0008515.inf 22/09/2009 00:30:27 Détectés: Trojan.Win32.AutoRun.bh E:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP81\A0008522.inf 22/09/2009 00:30:27 Supprimés: Trojan.Win32.AutoRun.bh E:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP81\A0008522.inf 22/09/2009 00:30:27 Détectés: Trojan.Win32.AutoRun.bh E:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP81\A0008593.inf 22/09/2009 00:30:27 Supprimés: Trojan.Win32.AutoRun.bh E:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP81\A0008593.inf 22/09/2009 00:30:27 Détectés: Trojan.Win32.AutoRun.bh E:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP82\A0008602.inf 22/09/2009 00:30:27 Supprimés: Trojan.Win32.AutoRun.bh E:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP82\A0008602.inf 22/09/2009 00:30:27 Détectés: Trojan.Win32.AutoRun.bh E:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP82\A0008828.inf 22/09/2009 00:30:27 Supprimés: Trojan.Win32.AutoRun.bh E:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP82\A0008828.inf 22/09/2009 00:30:27 Détectés: Trojan.Win32.AutoRun.bh E:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP83\A0008985.inf 22/09/2009 00:30:28 Détectés: Trojan.Win32.AutoRun.bh E:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP83\A0009019.inf 22/09/2009 00:30:28 Supprimés: Trojan.Win32.AutoRun.bh E:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP83\A0008985.inf 22/09/2009 00:30:28 Détectés: Trojan.Win32.AutoRun.bh E:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP84\A0009040.inf 22/09/2009 00:30:28 Supprimés: Trojan.Win32.AutoRun.bh E:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP83\A0009019.inf 22/09/2009 00:30:28 Supprimés: Trojan.Win32.AutoRun.bh E:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP84\A0009040.inf 22/09/2009 00:30:28 Détectés: Trojan.Win32.AutoRun.bh E:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP85\A0009055.inf 22/09/2009 00:30:28 Supprimés: Trojan.Win32.AutoRun.bh E:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP85\A0009055.inf 22/09/2009 00:30:28 Détectés: Trojan.Win32.AutoRun.bh E:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP85\A0009133.inf 22/09/2009 00:30:28 Supprimés: Trojan.Win32.AutoRun.bh E:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP85\A0009133.inf 22/09/2009 00:30:28 Détectés: Trojan.Win32.AutoRun.bj E:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP87\A0009201.inf 22/09/2009 00:30:28 Détectés: Trojan.Win32.AutoRun.bj E:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP87\A0009220.inf 22/09/2009 00:30:28 Supprimés: Trojan.Win32.AutoRun.bj E:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP87\A0009201.inf 22/09/2009 00:30:28 Supprimés: Trojan.Win32.AutoRun.bj E:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP87\A0009220.inf 22/09/2009 00:30:28 Détectés: Trojan-GameThief.Win32.Magania.cafe E:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP88\A0009252.inf 22/09/2009 00:30:28 Supprimés: Trojan-GameThief.Win32.Magania.cafe E:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP88\A0009252.inf 22/09/2009 00:30:28 Détectés: Trojan-GameThief.Win32.Magania.cafe E:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP88\A0009261.inf 22/09/2009 00:30:28 Détectés: Trojan-GameThief.Win32.Magania.caln E:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP90\A0009397.inf 22/09/2009 00:30:28 Supprimés: Trojan-GameThief.Win32.Magania.cafe E:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP88\A0009261.inf 22/09/2009 00:30:28 Supprimés: Trojan-GameThief.Win32.Magania.caln E:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP90\A0009397.inf 22/09/2009 00:30:28 Détectés: Trojan.Win32.AutoRun.cc E:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP92\A0009447.inf 22/09/2009 00:30:28 Détectés: Trojan.Win32.AutoRun.cc E:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP92\A0009458.inf 22/09/2009 00:30:28 Supprimés: Trojan.Win32.AutoRun.cc E:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP92\A0009447.inf 22/09/2009 00:30:28 Supprimés: Trojan.Win32.AutoRun.cc E:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP92\A0009458.inf 22/09/2009 00:30:29 Détectés: Trojan-GameThief.Win32.Magania.cayk E:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP95\A0009752.inf 22/09/2009 00:30:29 Supprimés: Trojan-GameThief.Win32.Magania.cayk E:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP95\A0009752.inf 22/09/2009 00:30:29 Détectés: Trojan-GameThief.Win32.Magania.cayk E:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP95\A0009783.inf 22/09/2009 00:30:29 Supprimés: Trojan-GameThief.Win32.Magania.cayk E:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP95\A0009783.inf 22/09/2009 00:30:29 Détectés: Trojan-GameThief.Win32.Magania.cbmt E:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP97\A0010016.inf 22/09/2009 00:30:29 Supprimés: Trojan-GameThief.Win32.Magania.cbmt E:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP97\A0010016.inf 22/09/2009 00:30:29 Détectés: Trojan-GameThief.Win32.Magania.cbmt E:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP98\A0010089.inf 22/09/2009 00:30:29 Détectés: Trojan-GameThief.Win32.Magania.cbmt E:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP98\A0010161.inf 22/09/2009 00:30:29 Supprimés: Trojan-GameThief.Win32.Magania.cbmt E:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP98\A0010089.inf 22/09/2009 00:30:29 Supprimés: Trojan-GameThief.Win32.Magania.cbmt E:\System Volume Information\_restore{42DF1DFB-304B-4517-A855-1EE068EB5139}\RP98\A0010161.inf 22/09/2009 00:30:39 Fin de la tâche Recherche d'outils de dissimulation d'activité: terminée : il y a 15 minutes (événements : 2, objets : 535, durée : 00:03:45) 22/09/2009 00:28:11 Fin de la tâche 22/09/2009 00:24:26 Lancement de la tâche
  10. re, donc avast bien viré, pc bien redemarré, et en se qui concerne antivir j'ai fais tout se que tu ma dis mais sa me dit sa quand j'installe la mise a jour : echec de l'actualisation de fichier de définitions des virus
  11. ok d'accord je vais ne plus flood donc pour RHosts ne fonctionne pas toujour, erreur : c:\Windows\systems32\drivers\etc\hosts et pour antivir toujour au même point avec se message la quand je veux faire la mise a jour : le planificateur n'a pas été demarré voila qu'en pense tu ?
  12. probleme avec antivir je ne peux pas le faire fonctionner les 3 premieres options on des rectangle rouge avec des panneaux triangulaire sauf le dernier rectangle vert avc un V surment pour dire que ces ok que dois-je faire ?
  13. avast et avitir ( si sa s'ecrit comme sa ) refonctionne d'apres se que j'ai vu
  14. Logfile of Trend Micro HijackThis v2.0.2 Scan saved at 20:52:16, on 21/09/2009 Platform: Windows XP SP2 (WinNT 5.01.2600) MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180) Boot mode: Normal Running processes: C:\WINDOWS\System32\smss.exe C:\WINDOWS\system32\winlogon.exe C:\WINDOWS\system32\services.exe C:\WINDOWS\system32\lsass.exe C:\WINDOWS\system32\svchost.exe C:\WINDOWS\System32\svchost.exe C:\Program Files\Alwil Software\Avast4\aswUpdSv.exe C:\WINDOWS\Explorer.EXE C:\Program Files\Alwil Software\Avast4\ashServ.exe C:\WINDOWS\system32\spoolsv.exe C:\Program Files\MSI\Bluetooth Software\bin\btwdins.exe C:\Program Files\Java\jre6\bin\jqs.exe C:\WINDOWS\system32\nvsvc32.exe C:\WINDOWS\system32\svchost.exe C:\Program Files\Alwil Software\Avast4\ashMaiSv.exe C:\Program Files\Alwil Software\Avast4\ashWebSv.exe C:\WINDOWS\RTHDCPL.EXE C:\WINDOWS\system32\RUNDLL32.EXE C:\Program Files\SFR\Kit\WiFi\9wifi.exe C:\WINDOWS\system32\LVCOMSX.EXE C:\Program Files\Logitech\Video\LogiTray.exe C:\Program Files\Adobe\Reader 9.0\Reader\Reader_sl.exe C:\Program Files\Java\jre6\bin\jusched.exe C:\Program Files\Fichiers communs\PCSuite\DataLayer\DataLayer.exe C:\Program Files\Nokia\Nokia PC Suite 6\LaunchApplication.exe C:\PROGRA~1\ALWILS~1\Avast4\ashDisp.exe C:\Program Files\Avira\AntiVir Desktop\avgnt.exe C:\WINDOWS\system32\ctfmon.exe C:\PROGRA~1\FICHIE~1\PCSuite\Services\SERVIC~1.EXE C:\Program Files\Electronic Arts\EADM\Core.exe C:\Program Files\Messenger\msmsgs.exe C:\Program Files\Logitech\Video\FxSvr2.exe C:\Program Files\Nokia\Nokia PC Suite 6\PcSync2.exe C:\Program Files\Windows Live\Messenger\msnmsgr.exe C:\PROGRA~1\FICHIE~1\Nokia\MPAPI\MPAPI3s.exe C:\Program Files\MSI\Bluetooth Software\BTTray.exe C:\Program Files\RALINK\Common\RaUI.exe C:\Program Files\Avira\AntiVir Desktop\avcenter.exe C:\Program Files\Internet Explorer\IEXPLORE.EXE C:\Program Files\Alwil Software\Avast4\setup\avast.setup C:\Program Files\trend micro\HijackThis\HijackThis.exe R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Bar = http://search.msn.fr/spbasic.htm R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = www.google.fr/ R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157 R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896 R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName = Liens O1 - Hosts: 74.125.45.100 4-open-davinci.com O1 - Hosts: 74.125.45.100 securitysoftwarepayments.com O1 - Hosts: 74.125.45.100 privatesecuredpayments.com O1 - Hosts: 74.125.45.100 secure.privatesecuredpayments.com O1 - Hosts: 74.125.45.100 getantivirusplusnow.com O1 - Hosts: 74.125.45.100 secure-plus-payments.com O1 - Hosts: 74.125.45.100 www.getantivirusplusnow.com O1 - Hosts: 74.125.45.100 www.secure-plus-payments.com O1 - Hosts: 74.125.45.100 www.getavplusnow.com O1 - Hosts: 74.125.45.100 www.securesoftwarebill.com O1 - Hosts: 74.125.45.100 secure.paysecuresystem.com O1 - Hosts: 74.125.45.100 paysoftbillsolution.com O1 - Hosts: 206.53.61.77 google.ae O1 - Hosts: 206.53.61.77 google.as O1 - Hosts: 206.53.61.77 google.at O1 - Hosts: 206.53.61.77 google.az O1 - Hosts: 206.53.61.77 google.ba O1 - Hosts: 206.53.61.77 google.be O1 - Hosts: 206.53.61.77 google.bg O1 - Hosts: 206.53.61.77 google.bs O1 - Hosts: 206.53.61.77 google.ca O1 - Hosts: 206.53.61.77 google.cd O1 - Hosts: 206.53.61.77 google.com.gh O1 - Hosts: 206.53.61.77 google.com.hk O1 - Hosts: 206.53.61.77 google.com.jm O1 - Hosts: 206.53.61.77 google.com.mx O1 - Hosts: 206.53.61.77 google.com.my O1 - Hosts: 206.53.61.77 google.com.na O1 - Hosts: 206.53.61.77 google.com.nf O1 - Hosts: 206.53.61.77 google.com.ng O1 - Hosts: 206.53.61.77 google.ch O1 - Hosts: 206.53.61.77 google.com.np O1 - Hosts: 206.53.61.77 google.com.pr O1 - Hosts: 206.53.61.77 google.com.qa O1 - Hosts: 206.53.61.77 google.com.sg O1 - Hosts: 206.53.61.77 google.com.tj O1 - Hosts: 206.53.61.77 google.com.tw O1 - Hosts: 206.53.61.77 google.dj O1 - Hosts: 206.53.61.77 google.de O1 - Hosts: 206.53.61.77 google.dk O1 - Hosts: 206.53.61.77 google.dm O1 - Hosts: 206.53.61.77 google.ee O1 - Hosts: 206.53.61.77 google.fi O1 - Hosts: 206.53.61.77 google.fm O1 - Hosts: 206.53.61.77 google.fr O1 - Hosts: 206.53.61.77 google.ge O1 - Hosts: 206.53.61.77 google.gg O1 - Hosts: 206.53.61.77 google.gm O1 - Hosts: 206.53.61.77 google.gr O1 - Hosts: 206.53.61.77 google.ht O1 - Hosts: 206.53.61.77 google.ie O1 - Hosts: 206.53.61.77 google.im O1 - Hosts: 206.53.61.77 google.in O1 - Hosts: 206.53.61.77 google.it O1 - Hosts: 206.53.61.77 google.ki O1 - Hosts: 206.53.61.77 google.la O1 - Hosts: 206.53.61.77 google.li O1 - Hosts: 206.53.61.77 google.lv O1 - Hosts: 206.53.61.77 google.ma O1 - Hosts: 206.53.61.77 google.ms O1 - Hosts: 206.53.61.77 google.mu O1 - Hosts: 206.53.61.77 google.mw O1 - Hosts: 206.53.61.77 google.nl O1 - Hosts: 206.53.61.77 google.no O1 - Hosts: 206.53.61.77 google.nr O1 - Hosts: 206.53.61.77 google.nu O1 - Hosts: 206.53.61.77 google.pl O1 - Hosts: 206.53.61.77 google.pn O1 - Hosts: 206.53.61.77 google.pt O1 - Hosts: 206.53.61.77 google.ro O1 - Hosts: 206.53.61.77 google.ru O1 - Hosts: 206.53.61.77 google.rw O1 - Hosts: 206.53.61.77 google.sc O1 - Hosts: 206.53.61.77 google.se O1 - Hosts: 206.53.61.77 google.sh O1 - Hosts: 206.53.61.77 google.si O1 - Hosts: 206.53.61.77 google.sm O1 - Hosts: 206.53.61.77 google.sn O1 - Hosts: 206.53.61.77 google.st O1 - Hosts: 206.53.61.77 google.tl O1 - Hosts: 206.53.61.77 google.tm O1 - Hosts: 206.53.61.77 google.tt O1 - Hosts: 206.53.61.77 google.us O1 - Hosts: 206.53.61.77 google.vu O1 - Hosts: 206.53.61.77 google.ws O1 - Hosts: 206.53.61.77 google.co.ck O1 - Hosts: 206.53.61.77 google.co.id O1 - Hosts: 206.53.61.77 google.co.il O1 - Hosts: 206.53.61.77 google.co.in O1 - Hosts: 206.53.61.77 google.co.jp O1 - Hosts: 206.53.61.77 google.co.kr O1 - Hosts: 206.53.61.77 google.co.ls O1 - Hosts: 206.53.61.77 google.co.ma O1 - Hosts: 206.53.61.77 google.co.nz O1 - Hosts: 206.53.61.77 google.co.tz O1 - Hosts: 206.53.61.77 google.co.ug O1 - Hosts: 206.53.61.77 google.co.uk O1 - Hosts: 206.53.61.77 google.co.za O1 - Hosts: 206.53.61.77 google.co.zm O1 - Hosts: 206.53.61.77 google.com O1 - Hosts: 206.53.61.77 google.com.af O2 - BHO: AcroIEHelperStub - {18DF081C-E8AD-4283-A596-FA578C2EBDC3} - C:\Program Files\Fichiers communs\Adobe\Acrobat\ActiveX\AcroIEHelperShim.dll O2 - BHO: (no name) - {5C255C8A-E604-49b4-9D64-90988571CECB} - (no file) O2 - BHO: Programme d'aide de l'Assistant de connexion Windows Live - {9030D464-4C02-4ABF-8ECC-5164760863C6} - C:\Program Files\Fichiers communs\Microsoft Shared\Windows Live\WindowsLiveLogin.dll O2 - BHO: Java Plug-In 2 SSV Helper - {DBC80044-A445-435b-BC74-9C25C1C588A9} - C:\Program Files\Java\jre6\bin\jp2ssv.dll O2 - BHO: JQSIEStartDetectorImpl - {E7E6F031-17CE-4C07-BC86-EABFE594F69C} - C:\Program Files\Java\jre6\lib\deploy\jqs\ie\jqs_plugin.dll O2 - BHO: EpsonToolBandKicker Class - {E99421FB-68DD-40F0-B4AC-B7027CAE2F1A} - C:\Program Files\EPSON\EPSON Web-To-Page\EPSON Web-To-Page.dll O3 - Toolbar: EPSON Web-To-Page - {EE5D279F-081B-4404-994D-C6B60AAEBA6D} - C:\Program Files\EPSON\EPSON Web-To-Page\EPSON Web-To-Page.dll O4 - HKLM\..\Run: [RTHDCPL] RTHDCPL.EXE O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE C:\WINDOWS\system32\NvCpl.dll,NvStartup O4 - HKLM\..\Run: [nwiz] nwiz.exe /install O4 - HKLM\..\Run: [NvMediaCenter] RUNDLL32.EXE C:\WINDOWS\system32\NvMcTray.dll,NvTaskbarInit O4 - HKLM\..\Run: [Autoconfigurateur WiFi SFR] "C:\Program Files\SFR\Kit\WiFi\9wifi.exe" O4 - HKLM\..\Run: [LVCOMSX] C:\WINDOWS\system32\LVCOMSX.EXE O4 - HKLM\..\Run: [LogitechVideoRepair] C:\Program Files\Logitech\Video\ISStart.exe O4 - HKLM\..\Run: [LogitechVideoTray] C:\Program Files\Logitech\Video\LogiTray.exe O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime O4 - HKLM\..\Run: [Adobe Reader Speed Launcher] "C:\Program Files\Adobe\Reader 9.0\Reader\Reader_sl.exe" O4 - HKLM\..\Run: [sunJavaUpdateSched] "C:\Program Files\Java\jre6\bin\jusched.exe" O4 - HKLM\..\Run: [DataLayer] C:\Program Files\Fichiers communs\PCSuite\DataLayer\DataLayer.exe O4 - HKLM\..\Run: [PCSuiteTrayApplication] C:\Program Files\Nokia\Nokia PC Suite 6\LaunchApplication.exe -onlytray O4 - HKLM\..\Run: [avast!] C:\PROGRA~1\ALWILS~1\Avast4\ashDisp.exe O4 - HKLM\..\Run: [avgnt] "C:\Program Files\Avira\AntiVir Desktop\avgnt.exe" /min O4 - HKLM\..\Run: [Malwarebytes Anti-Malware (reboot)] "C:\Program Files\Malwarebytes' Anti-Malware\mbam.exe" /runcleanupscript O4 - HKCU\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\ctfmon.exe O4 - HKCU\..\Run: [LogitechSoftwareUpdate] "C:\Program Files\Logitech\Video\ManifestEngine.exe" boot O4 - HKCU\..\Run: [EA Core] "C:\Program Files\Electronic Arts\EADM\Core.exe" -silent O4 - HKCU\..\Run: [MSMSGS] "C:\Program Files\Messenger\msmsgs.exe" /background O4 - HKCU\..\Run: [PcSync] C:\Program Files\Nokia\Nokia PC Suite 6\PcSync2.exe /NoDialog O4 - HKCU\..\Run: [msnmsgr] "C:\Program Files\Windows Live\Messenger\msnmsgr.exe" /background O4 - HKUS\S-1-5-18\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'SYSTEM') O4 - HKUS\.DEFAULT\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'Default user') O4 - Global Startup: BTTray.lnk = ? O4 - Global Startup: Logitech Desktop Messenger.lnk = C:\Program Files\Logitech\Desktop Messenger\8876480\Program\LDMConf.exe O4 - Global Startup: Microsoft Office.lnk = C:\Program Files\Microsoft Office\Office\OSA9.EXE O4 - Global Startup: Ralink Wireless Utility.lnk = C:\Program Files\RALINK\Common\RaUI.exe O8 - Extra context menu item: Add to Google Photos Screensa&ver - res://C:\WINDOWS\system32\GPhotos.scr/200 O8 - Extra context menu item: Send To &Bluetooth - C:\Program Files\MSI\Bluetooth Software\btsendto_ie_ctx.htm O9 - Extra button: (no name) - {85d1f590-48f4-11d9-9669-0800200c9a66} - C:\WINDOWS\bdoscandel.exe O9 - Extra 'Tools' menuitem: Uninstall BitDefender Online Scanner v8 - {85d1f590-48f4-11d9-9669-0800200c9a66} - C:\WINDOWS\bdoscandel.exe O9 - Extra button: @btrez.dll,-4015 - {CCA281CA-C863-46ef-9331-5C8D4460577F} - C:\Program Files\MSI\Bluetooth Software\btsendto_ie.htm O9 - Extra 'Tools' menuitem: @btrez.dll,-4017 - {CCA281CA-C863-46ef-9331-5C8D4460577F} - C:\Program Files\MSI\Bluetooth Software\btsendto_ie.htm O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe O9 - Extra button: (no name) - {3CA1D406-30D8-4DBC-8EE6-0E2C05F78864} - (no file) (HKCU) O16 - DPF: {0CCA191D-13A6-4E29-B746-314DEE697D83} (Facebook Photo Uploader 5 Control) - http://upload.facebook.com/controls/2008.1...toUploader5.cab O16 - DPF: {215B8138-A3CF-44C5-803F-8226143CFC0A} (Trend Micro ActiveX Scan Agent 6.6) - http://ushousecall02.trendmicro.com/housec...ivex/hcImpl.cab O16 - DPF: {2BC66F54-93A8-11D3-BEB6-00105AA9B6AE} (Symantec AntiVirus scanner) - http://security.symantec.com/sscv6/SharedC...bin/AvSniff.cab O16 - DPF: {2D8ED06D-3C30-438B-96AE-4D110FDC1FB8} (ActiveScan 2.0 Installer Class) - http://acs.pandasoftware.com/activescan/cabs/as2stubie.cab O16 - DPF: {5D6F45B3-9043-443D-A792-115447494D24} (UnoCtrl Class) - http://messenger.zone.msn.com/MessengerGam...1/GAME_UNO1.cab O16 - DPF: {5D86DDB5-BDF9-441B-9E9E-D4730F4EE499} (BDSCANONLINE Control) - http://www.zebulon.fr/scan8/oscan8.cab O16 - DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} (WUWebControl Class) - http://update.microsoft.com/windowsupdate/...b?1251969744265 O16 - DPF: {644E432F-49D3-41A1-8DD5-E099162EEEC5} (Symantec RuFSI Utility Class) - http://security.symantec.com/sscv6/SharedC...n/bin/cabsa.cab O16 - DPF: {67DABFBF-D0AB-41FA-9C46-CC0F21721616} - http://go.divx.com/plugin/DivXBrowserPlugin.cab O16 - DPF: {C3F79A2B-B9B4-4A66-B012-3EE46475B072} (MessengerStatsClient Class) - http://messenger.zone.msn.com/binary/Messe...nt.cab56907.cab O16 - DPF: {E2883E8F-472F-4FB0-9522-AC9BF37916A7} - http://platformdl.adobe.com/NOS/getPlusPlus/1.6/gp.cab O23 - Service: Avira AntiVir Planificateur (AntiVirSchedulerService) - Avira GmbH - C:\Program Files\Avira\AntiVir Desktop\sched.exe O23 - Service: Avira AntiVir Guard (AntiVirService) - Avira GmbH - C:\Program Files\Avira\AntiVir Desktop\avguard.exe O23 - Service: avast! iAVS4 Control Service (aswUpdSv) - ALWIL Software - C:\Program Files\Alwil Software\Avast4\aswUpdSv.exe O23 - Service: avast! Antivirus - ALWIL Software - C:\Program Files\Alwil Software\Avast4\ashServ.exe O23 - Service: avast! Mail Scanner - ALWIL Software - C:\Program Files\Alwil Software\Avast4\ashMaiSv.exe O23 - Service: avast! Web Scanner - ALWIL Software - C:\Program Files\Alwil Software\Avast4\ashWebSv.exe O23 - Service: Service de transfert intelligent en arrière-plan (BITS) - Unknown owner - C:\WINDOWS\ O23 - Service: Bluetooth Service (btwdins) - WIDCOMM, Inc. - C:\Program Files\MSI\Bluetooth Software\bin\btwdins.exe O23 - Service: Firebird Server - MAGIX Instance (FirebirdServerMAGIXInstance) - MAGIX® - C:\Program Files\ALDI Service Photo\Common\Database\bin\fbserver.exe O23 - Service: Google Software Updater (gusvc) - Google - C:\Program Files\Google\Common\Google Updater\GoogleUpdaterService.exe O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Fichiers communs\InstallShield\Driver\11\Intel 32\IDriverT.exe O23 - Service: Java Quick Starter (JavaQuickStarterService) - Sun Microsystems, Inc. - C:\Program Files\Java\jre6\bin\jqs.exe O23 - Service: NVIDIA Display Driver Service (NVSvc) - NVIDIA Corporation - C:\WINDOWS\system32\nvsvc32.exe O23 - Service: Mises à jour automatiques (wuauserv) - Unknown owner - C:\WINDOWS\ -- End of file - 14226 bytes
  15. Malwarebytes' Anti-Malware 1.41 Version de la base de données: 2837 Windows 5.1.2600 Service Pack 2 21/09/2009 20:47:57 mbam-log-2009-09-21 (20-47-57).txt Type de recherche: Examen rapide Eléments examinés: 108755 Temps écoulé: 3 minute(s), 45 second(s) Processus mémoire infecté(s): 0 Module(s) mémoire infecté(s): 0 Clé(s) du Registre infectée(s): 734 Valeur(s) du Registre infectée(s): 2 Elément(s) de données du Registre infecté(s): 11 Dossier(s) infecté(s): 2 Fichier(s) infecté(s): 10 Processus mémoire infecté(s): (Aucun élément nuisible détecté) Module(s) mémoire infecté(s): (Aucun élément nuisible détecté) Clé(s) du Registre infectée(s): HKEY_CLASSES_ROOT\CLSID\MADOWN (Worm.Magania) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\_avp32.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\_avpcc.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\_avpm.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\~1.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\~2.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\a.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\aAvgApi.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AAWTray.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\About.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ackwin32.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Ad-Aware.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\adaware.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\advxdwin.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AdwarePrj.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Agent.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Agentsvr.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Agentw.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\alertsvc.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\alevir.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\alogserv.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AluSchedulerSvc.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\amon9x.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\anti-Trojan.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\antiVirus.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AntiVirus_Pro.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AntiVirusPlus (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AntiVirusPlus.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AntiVirusXP (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AntiVirusXP.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\antiVirusxppro2009.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ants.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\apimonitor.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\aplica32.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\apvxdwin.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\arr.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Arrakis3.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ashAvast.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ashBug.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ashChest.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ashCnsnt.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ashDisp.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ashLogV.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ashMaiSv.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ashPopWz.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ashQuick.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ashServ.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ashSimp2.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ashSimpl.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ashSkPcc.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ashSkPck.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ashUpd.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ashWebSv.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\aswChLic.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\aswRegSvr.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\aswRunDll.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\aswUpdSv.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\atcon.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\atguard.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\atro55en.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\atupdater.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\atwatch.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\au.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\aupdate.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\auto-protect.nav80try.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\autodown.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\autoTrace.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\autoupdate.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\av360.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avadmin.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AVCare.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avcenter.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avciman.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avconfig.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avconsol.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ave32.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AVENGINE.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avgcc32.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avgchk.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avgcmgr.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avgcsrvx.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avgctrl.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avgdumpx.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avgemc.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avgiproxy.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avgnsx.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avgnt.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avgrsx.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avgscanx.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avgserv.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avgserv9.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avgsrmax.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avgtray.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avguard.exe (Security.Hijack) -> Delete on reboot. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avgui.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avgupd.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avgw.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avgwdsvc.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avkpop.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avkserv.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avkservice.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avkwctl9.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avltmain.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avmailc.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avmcdlg.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avnotify.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avnt.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avp.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avp32.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avpcc.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avpdos32.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avpm.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avptc32.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avpupd.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avscan.exe (Security.Hijack) -> Delete on reboot. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avsched32.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avsynmgr.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avupgsvc.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avwebgrd.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avwin.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avwin95.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avwinnt.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avwsc.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avwupd.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avwupd32.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avwupsrv.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avxmonitor9x.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avxmonitornt.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avxquar.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\b.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\backweb.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bargains.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bd_professional.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bdAgent.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bdfvcl.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bdfvwiz.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\BDInProcPatch.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bdmcon.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\BDMsnScan.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bdreinit.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bdsubwiz.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\BDSurvey.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bdtkexec.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bdwizreg.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\beagle.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\belt.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bidef.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bidserver.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bipcp.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bipcpevalsetup.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bisp.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\blackd.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\blackice.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\blink.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\blss.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bootconf.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bootwarn.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\borg2.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bpc.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\brasil.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\brw.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bs120.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bspatch.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bundle.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bvt.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\c.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cavscan.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ccapp.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ccevtmgr.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ccpxysvc.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ccSvcHst.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cdp.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cfd.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cfgwiz.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cfiadmin.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cfiaudit.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cfinet.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cfinet32.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cfp.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cfpconfg.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cfplogvw.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cfpupdat.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Cl.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\claw95.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\claw95cf.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\clean.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cleaner.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cleaner3.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cleanIELow.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cleanpc.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\click.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cmd32.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cmdAgent.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cmesys.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cmgrdian.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cmon016.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\connectionmonitor.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\control (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cpd.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cpf9x206.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cpfnt206.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\crashrep.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cssconfg.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cssupdat.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cssurf.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ctrl.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cv.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cwnb181.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cwntdwmo.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\d.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\datemanager.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\dcomx.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\defalert.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\defscangui.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\defwatch.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\deloeminfs.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\deputy.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\divx.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\dllcache.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\dllreg.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\doors.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\dop.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\dpf.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\dpfsetup.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\dpps2.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\driverctrl.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\drwatson.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\drweb32.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\drwebupw.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\dssAgent.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\dvp95.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\dvp95_0.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ecengine.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\efpeadm.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\egui.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ekrn.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\emsw.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ent.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\esafe.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\escanhnt.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\escanv95.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\espwatch.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ethereal.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\etrustcipe.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\evpn.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\exantiVirus-cnet.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\exe.avxw.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\expert.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\explore.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\f-agnt95.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\f-prot.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\f-prot95.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\f-stopw.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\fact.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\fameh32.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\fast.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\fch32.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\fih32.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\findviru.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\firewall.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\fixcfg.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\fixfp.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SaveDefense.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\fnrb32.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\fp-win.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\fp-win_trial.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\fprot.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\frmwrk32.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\frw.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\fsaa.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\fsav.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\fsav32.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\fsav530stbyb.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\fsav530wtbyb.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\fsav95.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\fsgk32.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\fsm32.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\fsma32.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\fsmb32.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\gator.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\gbmenu.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\gbpoll.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\generics.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\gmt.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\guard.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\guarddog.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\guardgui.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\hackTracersetup.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\hbinst.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\hbsrv.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\History.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\homeav2010.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\hotactio.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\hotpatch.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\htlog.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\htpatch.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\hwpe.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\hxdl.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\hxiul.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\iamapp.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\iamserv.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\iamstats.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ibmasn.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ibmavsp.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\icload95.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\icloadnt.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\icmon.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\icsupp95.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\icsuppnt.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Identity.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\idle.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\iedll.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\iedriver.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\IEShow.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\iface.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ifw2000.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\inetlnfo.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\infus.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\infwin.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\init.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\intdel.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\intren.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\iomon98.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\istsvc.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\jammer.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\jdbgmrg.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\jedi.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\JsRcGen.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kavlite40eng.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kavpers40eng.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kavpf.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kazza.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\keenvalue.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kerio-pf-213-en-win.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kerio-wrl-421-en-win.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kerio-wrp-421-en-win.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\killprocesssetup161.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\launcher.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ldnetmon.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ldpro.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ldpromenu.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ldscan.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\licmgr.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\livesrv.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\lnetinfo.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\loader.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\localnet.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\lockdown.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\lockdown2000.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\lookout.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\lordpe.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\lsetup.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\luall.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\luau.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\lucomserver.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\luinit.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\luspt.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MalwareRemoval.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mapisvc32.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mcAgent.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mcmnhdlr.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mcmscsvc.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mcnasvc.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mcproxy.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\McSACore.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mcshell.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mcshield.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mcsysmon.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mctool.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mcupdate.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mcvsrte.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mcvsshld.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\md.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mfin32.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mfw2en.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mfweng3.02d30.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mgavrtcl.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mgavrte.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mghtml.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mgui.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\minilog.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mmod.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\monitor.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\moolive.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mostat.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mpfAgent.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mpfservice.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MpfSrv.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mpftray.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mrflux.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msa.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msapp.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MSASCui.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msbb.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msblast.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mscache.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msccn32.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mscman.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msconfig (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msdm.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msdos.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msiexec16.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mslaugh.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msmgt.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msmsgri32.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mssmmc32.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mssys.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msvxd.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mu0311ad.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mwatch.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\n32scanw.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\nav.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\navap.navapsvc.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\navapsvc.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\navapw32.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\navdx.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\navlu32.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\navnt.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\navstub.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\navw32.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\navwnt.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\nc2000.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ncinst4.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ndd32.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\neomonitor.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\neowatchlog.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\netarmor.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\netd32.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\netinfo.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\netmon.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\netscanpro.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\netspyhunter-1.2.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\netutils.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\nisserv.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\nisum.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\nmain.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\nod32.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\normist.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\norton_Internet_secu_3.0_407.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\notstart.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\npf40_tw_98_nt_me_2k.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\npfmessenger.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\nprotect.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\npscheck.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\npssvc.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\nsched32.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\nssys32.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\nstask32.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\nsupdate.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\nt.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ntrtscan.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ntvdm.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ntxconfig.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\nui.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\nupgrade.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\nvarch16.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\nvc95.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\nvsvc32.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\nwinst4.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\nwservice.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\nwtool16.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\OAcat.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\OAhlp.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\OAReg.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\oasrv.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\oaui.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\oaview.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ODSW.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ollydbg.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\onsrvr.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\optimize.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ostronet.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\otfix.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\outpost.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\outpostinstall.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\outpostproinstall.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\padmin.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\panixk.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\patch.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\pav.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\pavcl.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\PavFnSvr.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\pavproxy.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\pavprsrv.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\pavsched.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\pavsrv51.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\pavw.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\pc.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\PC_AntiSpyware2010.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\pccwin98.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\pcfwallicon.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\pcip10117_0.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\pcscan.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\pdsetup.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\PerAvir.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\periscope.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\persfw.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\perswf.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\pf2.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\pfwadmin.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\pgmonitr.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\pingscan.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\platin.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\pop3trap.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\poproxy.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\popscan.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\portdetective.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\portmonitor.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\powerscan.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ppinupdt.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\pptbc.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ppvstop.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\prizesurfer.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\prmt.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\prmvr.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\procdump.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\processmonitor.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\procExplorerv1.0.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\programauditor.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\proport.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\protector.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\protectx.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\PSANCU.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\PSANHost.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\PSANToManager.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\PsCtrls.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\PsImSvc.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\PskSvc.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\pspf.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\PSUNMain.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\purge.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\qconsole.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\qh.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\qserver.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Quick Heal.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rapapp.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rav7.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rav7win.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rav8win32eng.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ray.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rb32.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rcsync.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\realmon.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\reged.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regedt32.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rescue.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rescue32.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rrguard.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rscdwld.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rshell.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rtvscan.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rtvscn95.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rulaunch.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\safeweb.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sahAgent.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\save.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SaveKeep.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\savenow.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sbserv.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sc.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\scam32.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\scan32.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\scan95.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\scanpm.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sched.exe (Security.Hijack) -> Delete on reboot. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\scrscan.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\seccenter.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Security Center.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\serv95.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\setloadorder.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\setup_flowprotector_us.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\setupvameeval.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sgssfw32.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sh.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\shellspyinstall.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\shield.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\shn.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\showbehind.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\signcheck.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\smartdefender.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\smartprotector.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\smc.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\smrtdefp.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sms.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\smss32.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\snetcfg.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\soap.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sofi.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sperm.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\spf.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sphinx.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\spoler.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\spoolcv.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\spoolsv32.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Spywarexpguard.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\spyxx.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\srexe.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\srng.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ss3edit.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ssg_4104.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ssgrate.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\st2.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\start.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\stcloader.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\supftrl.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\support.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\supporter5.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\svc.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\svchostc.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\svchosts.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\svshost.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sweep95.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sweepnet.sweepsrv.sys.swnetsup.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\symlcsvc.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\symproxysvc.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\symtray.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\System.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\System32.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sysupd.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\tapinstall.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taumon.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\tbscan.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\tc.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\tca.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\tcm.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\tds-3.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\tds2-98.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\tds2-nt.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\teekids.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\tfak.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\tfak5.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\tgbob.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\titanin.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\titaninxp.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\TPSrv.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\trickler.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\trjscan.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\trjsetup.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Trojantrap3.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\tsadbot.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\TSC.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\tvmd.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\tvtmd.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\uiscan.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\undoboot.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\updat.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\upgrad.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\upgrepl.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\utpost.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\vbcmserv.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\vbcons.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\vbust.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\vbwin9x.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\vbwinntw.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\vcsetup.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\vet32.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\vet95.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\vettray.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\vfsetup.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\vir-help.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Virusmdpersonalfirewall.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\VisthAux.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\VisthLic.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\VisthUpd.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\vnlan300.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\vnpc3000.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\vpc32.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\vpc42.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\vpfw30s.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\vptray.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\vscan40.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\vscenu6.02d30.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\vsched.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\vsecomr.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\vshwin32.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\vsisetup.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\vsmain.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\vsmon.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\vsserv.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\vsstat.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\vswin9xe.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\vswinntse.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\vswinperse.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\w32dsm89.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\W3asbas.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\w9x.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\watchdog.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\webdav.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WebProxy.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\webscanx.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\webtrap.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wfindv32.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\whoswatchingme.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wimmun32.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\win-bugsfix.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\win32.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\win32us.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\winactive.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\winav.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\windll32.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\window.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Windows.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wininetd.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wininitx.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\winlogin.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\winmain.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\winppr32.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\winrecon.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\winservn.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\winssk32.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\winstart.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\winstart001.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wintsk32.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\winupdate.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wkufind.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wnad.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wnt.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wradmin.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wrctrl.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wsbgate.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wscfxas.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wscfxav.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wscfxfw.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wsctool.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wupdater.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wupdt.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wyvernworksfirewall.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\xpdeluxe.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\xpf202en.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\zapro.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\zapsetup3001.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\zatutor.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\zonalm2601.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\zonealarm.exe (Security.Hijack) -> Quarantined and deleted successfully. Valeur(s) du Registre infectée(s): HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows PC Defender (Rogue.WindowsPCDefender) -> Quarantined and deleted successfully. HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cdoosoft (Spyware.OnlineGames) -> Quarantined and deleted successfully. Elément(s) de données du Registre infecté(s): HKEY_CURRENT_USER\SOFTWARE\Classes\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\URL (Hijack.SearchPage) -> Bad: (http://search-gala.com/?&uid=7&q={searchTerms}'>http://search-gala.com/?&uid=7&q={searchTerms}'>http://search-gala.com/?&uid=7&q={searchTerms}'>http://search-gala.com/?&uid=7&q={searchTerms}'>http://search-gala.com/?&uid=7&q={searchTerms}'>http://search-gala.com/?&uid=7&q={searchTerms}'>http://search-gala.com/?&uid=7&q={searchTerms}'>http://search-gala.com/?&uid=7&q={searchTerms}) Good: (http://www.Google.com/'>http://www.Google.com/'>http://www.Google.com/'>http://www.Google.com/'>http://www.Google.com/'>http://www.Google.com/'>http://www.Google.com/'>http://www.Google.com/) -> Quarantined and deleted successfully. HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\URL (Hijack.SearchPage) -> Bad: (http://search-gala.com/?&uid=7&q={searchTerms}) Good: (http://www.Google.com/) -> Quarantined and deleted successfully. HKEY_USERS\.DEFAULT\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\URL (Hijack.SearchPage) -> Bad: (http://search-gala.com/?&uid=7&q={searchTerms}) Good: (http://www.Google.com/) -> Quarantined and deleted successfully. HKEY_USERS\S-1-5-18\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\URL (Hijack.SearchPage) -> Bad: (http://search-gala.com/?&uid=7&q={searchTerms}) Good: (http://www.Google.com/) -> Quarantined and deleted successfully. HKEY_USERS\S-1-5-19\SOFTWARE\Classes\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\URL (Hijack.SearchPage) -> Bad: (http://search-gala.com/?&uid=7&q={searchTerms}) Good: (http://www.Google.com/) -> Quarantined and deleted successfully. HKEY_USERS\S-1-5-19\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\URL (Hijack.SearchPage) -> Bad: (http://search-gala.com/?&uid=7&q={searchTerms}) Good: (http://www.Google.com/) -> Quarantined and deleted successfully. HKEY_USERS\S-1-5-20\SOFTWARE\Classes\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\URL (Hijack.SearchPage) -> Bad: (http://search-gala.com/?&uid=7&q={searchTerms}) Good: (http://www.Google.com/) -> Quarantined and deleted successfully. HKEY_USERS\S-1-5-20\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\URL (Hijack.SearchPage) -> Bad: (http://search-gala.com/?&uid=7&q={searchTerms}) Good: (http://www.Google.com/) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Folder\Hidden\SHOWALL\CheckedValue (Hijack.System.Hidden) -> Bad: (0) Good: (1) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\BITS\ImagePath (Hijack.WindowsUpdates) -> Bad: (%fystemRoot%\system32\svchost.exe -k netsvcs) Good: (%SystemRoot%\System32\svchost.exe -k netsvcs) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\wuauserv\ImagePath (Hijack.WindowsUpdates) -> Bad: (%fystemroot%\system32\svchost.exe -k netsvcs) Good: (%SystemRoot%\System32\svchost.exe -k netsvcs) -> Quarantined and deleted successfully. Dossier(s) infecté(s): C:\Documents and Settings\goyen70\Application Data\Windows PC Defender (Rogue.WindowsPCDefender) -> Quarantined and deleted successfully. C:\Documents and Settings\All Users\Application Data\WPCDSys (Rogue.WindowsPCDefender) -> Quarantined and deleted successfully. Fichier(s) infecté(s): C:\Documents and Settings\goyen70\Application Data\Windows PC Defender\cookies.sqlite (Rogue.WindowsPCDefender) -> Quarantined and deleted successfully. C:\Documents and Settings\goyen70\Application Data\Windows PC Defender\Instructions.ini (Rogue.WindowsPCDefender) -> Quarantined and deleted successfully. C:\Documents and Settings\All Users\Application Data\WPCDSys\wpcd.cfg (Rogue.WindowsPCDefender) -> Quarantined and deleted successfully. C:\Documents and Settings\goyen70\Bureau\Windows PC Defender.lnk (Rogue.WindowsPCDefender) -> Quarantined and deleted successfully. C:\Documents and Settings\goyen70\Menu Démarrer\Programmes\Windows PC Defender.lnk (Rogue.WindowsPCDefender) -> Quarantined and deleted successfully. C:\Documents and Settings\goyen70\Menu Démarrer\Windows PC Defender.lnk (Rogue.WindowsPCDefender) -> Quarantined and deleted successfully. C:\Documents and Settings\goyen70\Application Data\Microsoft\Internet Explorer\Quick Launch\Windows PC Defender.lnk (Rogue.WindowsPCDefender) -> Quarantined and deleted successfully. C:\Documents and Settings\All Users\Application Data\85f016b\WP85f0.exe (Rogue.WindowsPCDefender) -> Quarantined and deleted successfully. C:\autorun.inf (SuspectAutorun.Rootdrive.H) -> Quarantined and deleted successfully. C:\Documents and Settings\goyen70\Local Settings\temp\cvasds1.dll (Spyware.OnlineGames) -> Quarantined and deleted successfully.
  16. et impossible d'ouvrir antivir
  17. impossible de deseinstaller avast je telecharge antivir sa mais un peu de temp mais disont qu'avec les soucis que j'ai depuis se matin mon ordi a vachement ralenti
  18. je n'ai pas plus utiliser avast dans les deux cas que tu ma dit que faire ?
  19. --------------------\\ Lop S&D 4.2.5-0 XP/Vista Microsoft Windows XP Professionnel ( v5.1.2600 ) Service Pack 2 X86-based PC ( Uniprocessor Free : AMD Athlon Processor LE-1640 ) BIOS : Default System BIOS USER : goyen70 ( Administrator ) BOOT : Normal boot Antivirus : avast! antivirus 4.8.1351 [VPS 090920-0] 4.8.1351 (Activated) Firewall : Windows PC Defender (Activated) A:\ (USB) C:\ (Local Disk) - NTFS - Total:48 Go (Free:28 Go) D:\ (Local Disk) - NTFS - Total:39 Go (Free:37 Go) E:\ (Local Disk) - NTFS - Total:40 Go (Free:38 Go) F:\ (CD or DVD) "C:\Lop SD" ( MAJ : 19-12-2008|23:40 ) Option : [2] ( 21/09/2009|18:59 ) \\\\\\\\\\\\\\\\\\\\\\\\\\\\\\ SUPPRESSION Supprime! - C:\DOCUME~1\goyen70\LOCALS~1\Temp\msgpl_2d51.exe Supprime! - C:\DOCUME~1\goyen70\LOCALS~1\Temp\stadistic.log Supprime! - C:\DOCUME~1\goyen70\Cookies\goyen70@advertising[2].txt - [ Fichier Hosts ] .. Restaure! \\\\\\\\\\\\\\\\\\\\\\\\\\\\\\ --------------------\\ Listing des dossiers dans APPLIC~1 [28/03/2009|17:04] C:\DOCUME~1\ADMINI~1\APPLIC~1\Microsoft [21/09/2009|15:09] C:\DOCUME~1\ALLUSE~1\APPLIC~1\85f016b [19/06/2009|23:08] C:\DOCUME~1\ALLUSE~1\APPLIC~1\Adobe [10/03/2009|11:39] C:\DOCUME~1\ALLUSE~1\APPLIC~1\Electronic Arts [20/03/2009|11:45] C:\DOCUME~1\ALLUSE~1\APPLIC~1\EPSON [22/08/2009|12:00] C:\DOCUME~1\ALLUSE~1\APPLIC~1\Icon Constructor 3 [29/04/2009|22:37] C:\DOCUME~1\ALLUSE~1\APPLIC~1\MAGIX [17/06/2009|13:17] C:\DOCUME~1\ALLUSE~1\APPLIC~1\Malwarebytes [16/09/2009|17:25] C:\DOCUME~1\ALLUSE~1\APPLIC~1\Microsoft [29/06/2009|10:30] C:\DOCUME~1\ALLUSE~1\APPLIC~1\NOS [21/09/2009|17:49] C:\DOCUME~1\ALLUSE~1\APPLIC~1\TEMP [20/03/2009|11:49] C:\DOCUME~1\ALLUSE~1\APPLIC~1\UDL [21/09/2009|10:59] C:\DOCUME~1\ALLUSE~1\APPLIC~1\WPCDSys [07/03/2009|20:17] C:\DOCUME~1\DEFAUL~1\APPLIC~1\Microsoft [18/09/2009|10:22] C:\DOCUME~1\goyen70\APPLIC~1\.purple [13/03/2009|13:44] C:\DOCUME~1\goyen70\APPLIC~1\Adobe [27/07/2009|17:38] C:\DOCUME~1\goyen70\APPLIC~1\Datalayer [12/06/2009|00:25] C:\DOCUME~1\goyen70\APPLIC~1\DivX [01/04/2009|18:10] C:\DOCUME~1\goyen70\APPLIC~1\EPSON [08/03/2009|23:37] C:\DOCUME~1\goyen70\APPLIC~1\FotoWire [28/06/2009|16:18] C:\DOCUME~1\goyen70\APPLIC~1\Google [18/09/2009|10:21] C:\DOCUME~1\goyen70\APPLIC~1\gtk-2.0 [17/07/2009|10:04] C:\DOCUME~1\goyen70\APPLIC~1\Help [21/09/2009|15:37] C:\DOCUME~1\goyen70\APPLIC~1\HouseCall 6.6 [07/03/2009|20:21] C:\DOCUME~1\goyen70\APPLIC~1\Identities [07/03/2009|20:25] C:\DOCUME~1\goyen70\APPLIC~1\InstallShield [17/07/2009|16:58] C:\DOCUME~1\goyen70\APPLIC~1\LG Electronics [07/03/2009|20:38] C:\DOCUME~1\goyen70\APPLIC~1\Macromedia [17/06/2009|13:17] C:\DOCUME~1\goyen70\APPLIC~1\Malwarebytes [21/09/2009|11:07] C:\DOCUME~1\goyen70\APPLIC~1\Microsoft [09/03/2009|00:37] C:\DOCUME~1\goyen70\APPLIC~1\Microsoft Web Folders [28/03/2009|17:04] C:\DOCUME~1\goyen70\APPLIC~1\Mozilla [03/09/2009|17:04] C:\DOCUME~1\goyen70\APPLIC~1\MSNInstaller [27/07/2009|17:38] C:\DOCUME~1\goyen70\APPLIC~1\Nokia [31/07/2009|12:13] C:\DOCUME~1\goyen70\APPLIC~1\Nokia Multimedia Player [27/07/2009|17:34] C:\DOCUME~1\goyen70\APPLIC~1\PC Suite [09/03/2009|18:27] C:\DOCUME~1\goyen70\APPLIC~1\SecuROM [30/04/2009|09:30] C:\DOCUME~1\goyen70\APPLIC~1\Sun [06/06/2009|11:31] C:\DOCUME~1\goyen70\APPLIC~1\temp [07/03/2009|20:34] C:\DOCUME~1\goyen70\APPLIC~1\vlc [21/09/2009|11:00] C:\DOCUME~1\goyen70\APPLIC~1\Windows PC Defender [07/03/2009|21:02] C:\DOCUME~1\goyen70\APPLIC~1\WinRAR [07/03/2009|20:17] C:\DOCUME~1\LOCALS~1\APPLIC~1\Microsoft [07/03/2009|20:17] C:\DOCUME~1\NETWOR~1\APPLIC~1\Microsoft --------------------\\ Tâches planifiées dans C:\WINDOWS\tasks [21/09/2009 17:50][--ah-----] C:\WINDOWS\tasks\SA.DAT [15/10/2001 00:44][-r-h-----] C:\WINDOWS\tasks\desktop.ini --------------------\\ Listing des dossiers dans C:\Program Files [19/06/2009|23:08] C:\Program Files\Adobe [13/09/2009|21:14] C:\Program Files\adslTV [08/03/2009|17:13] C:\Program Files\AIDA32 - Enterprise System Information [29/04/2009|22:37] C:\Program Files\ALDI [30/04/2009|13:07] C:\Program Files\ALDI Service Photo [13/09/2009|13:02] C:\Program Files\Alwil Software [07/03/2009|20:25] C:\Program Files\AMD [19/03/2009|14:00] C:\Program Files\AtomixMP3 [07/03/2009|20:15] C:\Program Files\ComPlus Applications [12/06/2009|12:20] C:\Program Files\DivX [30/07/2009|11:51] C:\Program Files\driver [09/03/2009|18:23] C:\Program Files\EA SPORTS [09/03/2009|18:27] C:\Program Files\Electronic Arts [21/09/2009|14:06] C:\Program Files\Enigma Software Group [20/03/2009|11:48] C:\Program Files\epson [21/09/2009|17:50] C:\Program Files\Fichiers communs [24/08/2009|00:16] C:\Program Files\GIMP-2.0 [29/06/2009|10:30] C:\Program Files\Google [22/08/2009|12:50] C:\Program Files\Icon Constructor 3 [28/07/2009|10:45] C:\Program Files\InstallShield Installation Information [16/09/2009|17:25] C:\Program Files\Internet Explorer [19/06/2009|23:12] C:\Program Files\Java [27/07/2009|17:21] C:\Program Files\LG PC Suite II [08/03/2009|23:37] C:\Program Files\Logitech [28/07/2009|22:10] C:\Program Files\Malwarebytes' Anti-Malware [07/03/2009|20:15] C:\Program Files\Messenger [16/09/2009|14:15] C:\Program Files\Microsoft [09/03/2009|00:37] C:\Program Files\microsoft frontpage [09/03/2009|00:37] C:\Program Files\Microsoft Office [16/09/2009|17:27] C:\Program Files\Microsoft Silverlight [09/03/2009|00:38] C:\Program Files\Microsoft Visual Studio [18/09/2009|10:28] C:\Program Files\Miranda-IM [08/09/2009|19:46] C:\Program Files\Movie Maker [28/03/2009|17:04] C:\Program Files\Mozilla Firefox(2) [16/09/2009|18:49] C:\Program Files\MSBuild [03/09/2009|14:36] C:\Program Files\MSECACHE [04/06/2009|11:59] C:\Program Files\MSI [03/09/2009|17:04] C:\Program Files\MSN [07/03/2009|20:15] C:\Program Files\MSN Gaming Zone [16/09/2009|12:58] C:\Program Files\MSN Messenger [27/07/2009|18:09] C:\Program Files\NetMeeting [27/07/2009|17:34] C:\Program Files\Nokia [29/06/2009|10:30] C:\Program Files\NOS [07/03/2009|20:15] C:\Program Files\Online Services [07/03/2009|20:16] C:\Program Files\Outlook Express [13/03/2009|16:42] C:\Program Files\PhotoFiltre [03/06/2009|22:24] C:\Program Files\QuickTime [07/03/2009|20:28] C:\Program Files\RALINK [16/09/2009|18:47] C:\Program Files\Reference Assemblies [07/03/2009|20:17] C:\Program Files\Services en ligne [07/03/2009|20:31] C:\Program Files\SFR [07/03/2009|20:35] C:\Program Files\SLD Codec Pack [21/09/2009|18:13] C:\Program Files\trend micro [07/03/2009|20:21] C:\Program Files\Uninstall Information [03/09/2009|14:37] C:\Program Files\Windows Installer Clean Up [17/09/2009|17:16] C:\Program Files\Windows Live [09/03/2009|17:27] C:\Program Files\Windows Media Player [07/03/2009|20:15] C:\Program Files\Windows NT [07/03/2009|20:17] C:\Program Files\WindowsUpdate [07/03/2009|20:34] C:\Program Files\WinRAR [07/03/2009|20:18] C:\Program Files\xerox --------------------\\ Listing des dossiers dans C:\Program Files\Fichiers communs [19/06/2009|23:08] C:\Program Files\Fichiers communs\Adobe [09/03/2009|00:38] C:\Program Files\Fichiers communs\Designer [08/03/2009|23:37] C:\Program Files\Fichiers communs\FotoWire [18/09/2009|10:17] C:\Program Files\Fichiers communs\GTK [20/03/2009|11:49] C:\Program Files\Fichiers communs\InstallShield [08/03/2009|23:36] C:\Program Files\Fichiers communs\Logitech [18/09/2009|10:00] C:\Program Files\Fichiers communs\Microsoft Shared [07/03/2009|20:16] C:\Program Files\Fichiers communs\MSSoap [27/07/2009|17:34] C:\Program Files\Fichiers communs\Nokia [07/03/2009|21:11] C:\Program Files\Fichiers communs\ODBC [27/07/2009|17:34] C:\Program Files\Fichiers communs\PCSuite [07/03/2009|20:16] C:\Program Files\Fichiers communs\Services [07/03/2009|21:11] C:\Program Files\Fichiers communs\SpeechEngines [09/03/2009|00:38] C:\Program Files\Fichiers communs\System [07/03/2009|20:45] C:\Program Files\Fichiers communs\Windows Live --------------------\\ Process ( 34 Processes ) ... OK ! --------------------\\ Recherche avec S_Lop Aucun fichier / dossier Lop trouvé ! --------------------\\ Recherche de Fichiers / Dossiers Lop Aucun fichier / dossier Lop trouvé ! --------------------\\ Verification du Registre ..... OK ! --------------------\\ Verification du fichier Hosts Fichier Hosts PROPRE --------------------\\ Recherche de fichiers avec Catchme catchme 0.3.1353 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net Rootkit scan 2009-09-21 18:59:58 Windows 5.1.2600 Service Pack 2 NTFS scanning hidden processes ... scanning hidden files ... scan completed successfully hidden processes: 0 hidden files: 0 --------------------\\ Recherche d'autres infections Aucune autre infection trouvée ! [F:3052][D:102]-> C:\DOCUME~1\goyen70\LOCALS~1\Temp [F:90][D:0]-> C:\DOCUME~1\goyen70\Cookies [F:3279][D:32]-> C:\DOCUME~1\goyen70\LOCALS~1\TEMPOR~1\content.IE5 1 - "C:\Lop SD\LopR_1.txt" - 21/09/2009|18:09 - Option : [1] 2 - "C:\Lop SD\LopR_2.txt" - 21/09/2009|19:00 - Option : [2] --------------------\\ Fin du rapport a 19:00:32
  20. re pour se que tu ma demander au debut sa me dit impossible de cree le fichier C:\Windows\systems32\drivers\etc\hosts :s que dois-je faire ?
  21. voila se que tu ma demander pour infos j'ai un gros probleme avec mon ordi se matin en naviguant sur le net j'ai ete sur un site et j'ai ete infecté de virus ( je n'ai pas d'anti-virus ) et depuis j'ai toutes les 10 min plusieur message qui s'affiche du genre j'ai tant de virus ou bien comme quoi on essaye de rentre dans mon pc y a mon adresse ip et celle d'une autre personne enfin bref pas symaps du tt et on ma proposer un truc qui etait du genre gratuit a la base windows pc defender et je crois ces sa qui bloque tout car les messages viennes par rapport a sa dsl si je me suis mal exprimer et si tu veut je te redirai sa plus clairement du moins j'essairai merci de m'aider Logfile of Trend Micro HijackThis v2.0.2 Scan saved at 18:13:34, on 21/09/2009 Platform: Windows XP SP2 (WinNT 5.01.2600) MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180) Boot mode: Normal Running processes: C:\WINDOWS\System32\smss.exe C:\WINDOWS\system32\winlogon.exe C:\WINDOWS\system32\services.exe C:\WINDOWS\system32\lsass.exe C:\WINDOWS\system32\svchost.exe C:\WINDOWS\System32\svchost.exe C:\WINDOWS\Explorer.EXE C:\WINDOWS\system32\spoolsv.exe C:\Program Files\MSI\Bluetooth Software\bin\btwdins.exe C:\Program Files\Java\jre6\bin\jqs.exe C:\WINDOWS\system32\svchost.exe C:\WINDOWS\RTHDCPL.EXE C:\WINDOWS\system32\RUNDLL32.EXE C:\Program Files\SFR\Kit\WiFi\9wifi.exe C:\WINDOWS\system32\LVCOMSX.EXE C:\Program Files\Logitech\Video\LogiTray.exe C:\Program Files\Java\jre6\bin\jusched.exe C:\Program Files\Fichiers communs\PCSuite\DataLayer\DataLayer.exe C:\Program Files\Nokia\Nokia PC Suite 6\LaunchApplication.exe C:\Documents and Settings\All Users\Application Data\85f016b\WP85f0.exe C:\WINDOWS\system32\ctfmon.exe C:\Program Files\Electronic Arts\EADM\Core.exe C:\Program Files\Messenger\msmsgs.exe C:\Program Files\Nokia\Nokia PC Suite 6\PcSync2.exe C:\Program Files\Windows Live\Messenger\msnmsgr.exe C:\PROGRA~1\FICHIE~1\PCSuite\Services\SERVIC~1.EXE C:\Program Files\MSI\Bluetooth Software\BTTray.exe C:\Program Files\Logitech\Video\FxSvr2.exe C:\PROGRA~1\FICHIE~1\Nokia\MPAPI\MPAPI3s.exe C:\Program Files\RALINK\Common\RaUI.exe C:\Program Files\Java\jre6\bin\jucheck.exe C:\Program Files\internet explorer\iexplore.exe C:\WINDOWS\system32\cmd.exe C:\WINDOWS\system32\NOTEPAD.EXE C:\Program Files\Trend Micro\HijackThis\HijackThis.exe R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Bar = http://search.msn.fr/spbasic.htm R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = www.google.fr/ R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157 R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896 R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName = Liens O1 - Hosts: 74.125.45.100 4-open-davinci.com O1 - Hosts: 74.125.45.100 securitysoftwarepayments.com O1 - Hosts: 74.125.45.100 privatesecuredpayments.com O1 - Hosts: 74.125.45.100 secure.privatesecuredpayments.com O1 - Hosts: 74.125.45.100 getantivirusplusnow.com O1 - Hosts: 74.125.45.100 secure-plus-payments.com O1 - Hosts: 74.125.45.100 www.getantivirusplusnow.com O1 - Hosts: 74.125.45.100 www.secure-plus-payments.com O1 - Hosts: 74.125.45.100 www.getavplusnow.com O1 - Hosts: 74.125.45.100 www.securesoftwarebill.com O1 - Hosts: 74.125.45.100 secure.paysecuresystem.com O1 - Hosts: 74.125.45.100 paysoftbillsolution.com O1 - Hosts: 206.53.61.77 google.ae O1 - Hosts: 206.53.61.77 google.as O1 - Hosts: 206.53.61.77 google.at O1 - Hosts: 206.53.61.77 google.az O1 - Hosts: 206.53.61.77 google.ba O1 - Hosts: 206.53.61.77 google.be O1 - Hosts: 206.53.61.77 google.bg O1 - Hosts: 206.53.61.77 google.bs O1 - Hosts: 206.53.61.77 google.ca O1 - Hosts: 206.53.61.77 google.cd O1 - Hosts: 206.53.61.77 google.com.gh O1 - Hosts: 206.53.61.77 google.com.hk O1 - Hosts: 206.53.61.77 google.com.jm O1 - Hosts: 206.53.61.77 google.com.mx O1 - Hosts: 206.53.61.77 google.com.my O1 - Hosts: 206.53.61.77 google.com.na O1 - Hosts: 206.53.61.77 google.com.nf O1 - Hosts: 206.53.61.77 google.com.ng O1 - Hosts: 206.53.61.77 google.ch O1 - Hosts: 206.53.61.77 google.com.np O1 - Hosts: 206.53.61.77 google.com.pr O1 - Hosts: 206.53.61.77 google.com.qa O1 - Hosts: 206.53.61.77 google.com.sg O1 - Hosts: 206.53.61.77 google.com.tj O1 - Hosts: 206.53.61.77 google.com.tw O1 - Hosts: 206.53.61.77 google.dj O1 - Hosts: 206.53.61.77 google.de O1 - Hosts: 206.53.61.77 google.dk O1 - Hosts: 206.53.61.77 google.dm O1 - Hosts: 206.53.61.77 google.ee O1 - Hosts: 206.53.61.77 google.fi O1 - Hosts: 206.53.61.77 google.fm O1 - Hosts: 206.53.61.77 google.fr O1 - Hosts: 206.53.61.77 google.ge O1 - Hosts: 206.53.61.77 google.gg O1 - Hosts: 206.53.61.77 google.gm O1 - Hosts: 206.53.61.77 google.gr O1 - Hosts: 206.53.61.77 google.ht O1 - Hosts: 206.53.61.77 google.ie O1 - Hosts: 206.53.61.77 google.im O1 - Hosts: 206.53.61.77 google.in O1 - Hosts: 206.53.61.77 google.it O1 - Hosts: 206.53.61.77 google.ki O1 - Hosts: 206.53.61.77 google.la O1 - Hosts: 206.53.61.77 google.li O1 - Hosts: 206.53.61.77 google.lv O1 - Hosts: 206.53.61.77 google.ma O1 - Hosts: 206.53.61.77 google.ms O1 - Hosts: 206.53.61.77 google.mu O1 - Hosts: 206.53.61.77 google.mw O1 - Hosts: 206.53.61.77 google.nl O1 - Hosts: 206.53.61.77 google.no O1 - Hosts: 206.53.61.77 google.nr O1 - Hosts: 206.53.61.77 google.nu O1 - Hosts: 206.53.61.77 google.pl O1 - Hosts: 206.53.61.77 google.pn O1 - Hosts: 206.53.61.77 google.pt O1 - Hosts: 206.53.61.77 google.ro O1 - Hosts: 206.53.61.77 google.ru O1 - Hosts: 206.53.61.77 google.rw O1 - Hosts: 206.53.61.77 google.sc O1 - Hosts: 206.53.61.77 google.se O1 - Hosts: 206.53.61.77 google.sh O1 - Hosts: 206.53.61.77 google.si O1 - Hosts: 206.53.61.77 google.sm O1 - Hosts: 206.53.61.77 google.sn O1 - Hosts: 206.53.61.77 google.st O1 - Hosts: 206.53.61.77 google.tl O1 - Hosts: 206.53.61.77 google.tm O1 - Hosts: 206.53.61.77 google.tt O1 - Hosts: 206.53.61.77 google.us O1 - Hosts: 206.53.61.77 google.vu O1 - Hosts: 206.53.61.77 google.ws O1 - Hosts: 206.53.61.77 google.co.ck O1 - Hosts: 206.53.61.77 google.co.id O1 - Hosts: 206.53.61.77 google.co.il O1 - Hosts: 206.53.61.77 google.co.in O1 - Hosts: 206.53.61.77 google.co.jp O1 - Hosts: 206.53.61.77 google.co.kr O1 - Hosts: 206.53.61.77 google.co.ls O1 - Hosts: 206.53.61.77 google.co.ma O1 - Hosts: 206.53.61.77 google.co.nz O1 - Hosts: 206.53.61.77 google.co.tz O1 - Hosts: 206.53.61.77 google.co.ug O1 - Hosts: 206.53.61.77 google.co.uk O1 - Hosts: 206.53.61.77 google.co.za O1 - Hosts: 206.53.61.77 google.co.zm O1 - Hosts: 206.53.61.77 google.com O1 - Hosts: 206.53.61.77 google.com.af O2 - BHO: AcroIEHelperStub - {18DF081C-E8AD-4283-A596-FA578C2EBDC3} - C:\Program Files\Fichiers communs\Adobe\Acrobat\ActiveX\AcroIEHelperShim.dll O2 - BHO: (no name) - {5C255C8A-E604-49b4-9D64-90988571CECB} - (no file) O2 - BHO: Programme d'aide de l'Assistant de connexion Windows Live - {9030D464-4C02-4ABF-8ECC-5164760863C6} - C:\Program Files\Fichiers communs\Microsoft Shared\Windows Live\WindowsLiveLogin.dll O2 - BHO: Java Plug-In 2 SSV Helper - {DBC80044-A445-435b-BC74-9C25C1C588A9} - C:\Program Files\Java\jre6\bin\jp2ssv.dll O2 - BHO: JQSIEStartDetectorImpl - {E7E6F031-17CE-4C07-BC86-EABFE594F69C} - C:\Program Files\Java\jre6\lib\deploy\jqs\ie\jqs_plugin.dll O2 - BHO: EpsonToolBandKicker Class - {E99421FB-68DD-40F0-B4AC-B7027CAE2F1A} - C:\Program Files\EPSON\EPSON Web-To-Page\EPSON Web-To-Page.dll O3 - Toolbar: EPSON Web-To-Page - {EE5D279F-081B-4404-994D-C6B60AAEBA6D} - C:\Program Files\EPSON\EPSON Web-To-Page\EPSON Web-To-Page.dll O4 - HKLM\..\Run: [RTHDCPL] RTHDCPL.EXE O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE C:\WINDOWS\system32\NvCpl.dll,NvStartup O4 - HKLM\..\Run: [nwiz] nwiz.exe /install O4 - HKLM\..\Run: [NvMediaCenter] RUNDLL32.EXE C:\WINDOWS\system32\NvMcTray.dll,NvTaskbarInit O4 - HKLM\..\Run: [Autoconfigurateur WiFi SFR] "C:\Program Files\SFR\Kit\WiFi\9wifi.exe" O4 - HKLM\..\Run: [LVCOMSX] C:\WINDOWS\system32\LVCOMSX.EXE O4 - HKLM\..\Run: [LogitechVideoRepair] C:\Program Files\Logitech\Video\ISStart.exe O4 - HKLM\..\Run: [LogitechVideoTray] C:\Program Files\Logitech\Video\LogiTray.exe O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime O4 - HKLM\..\Run: [Adobe Reader Speed Launcher] "C:\Program Files\Adobe\Reader 9.0\Reader\Reader_sl.exe" O4 - HKLM\..\Run: [sunJavaUpdateSched] "C:\Program Files\Java\jre6\bin\jusched.exe" O4 - HKLM\..\Run: [DataLayer] C:\Program Files\Fichiers communs\PCSuite\DataLayer\DataLayer.exe O4 - HKLM\..\Run: [PCSuiteTrayApplication] C:\Program Files\Nokia\Nokia PC Suite 6\LaunchApplication.exe -onlytray O4 - HKLM\..\Run: [Windows PC Defender] "C:\Documents and Settings\All Users\Application Data\85f016b\WP85f0.exe" /s /d O4 - HKLM\..\Run: [avast!] C:\PROGRA~1\ALWILS~1\Avast4\ashDisp.exe O4 - HKCU\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\ctfmon.exe O4 - HKCU\..\Run: [LogitechSoftwareUpdate] "C:\Program Files\Logitech\Video\ManifestEngine.exe" boot O4 - HKCU\..\Run: [EA Core] "C:\Program Files\Electronic Arts\EADM\Core.exe" -silent O4 - HKCU\..\Run: [MSMSGS] "C:\Program Files\Messenger\msmsgs.exe" /background O4 - HKCU\..\Run: [PcSync] C:\Program Files\Nokia\Nokia PC Suite 6\PcSync2.exe /NoDialog O4 - HKCU\..\Run: [msnmsgr] "C:\Program Files\Windows Live\Messenger\msnmsgr.exe" /background O4 - HKCU\..\Run: [cdoosoft] C:\DOCUME~1\goyen70\LOCALS~1\Temp\herss.exe O4 - HKUS\S-1-5-18\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'SYSTEM') O4 - HKUS\.DEFAULT\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'Default user') O4 - Global Startup: BTTray.lnk = ? O4 - Global Startup: Logitech Desktop Messenger.lnk = C:\Program Files\Logitech\Desktop Messenger\8876480\Program\LDMConf.exe O4 - Global Startup: Microsoft Office.lnk = C:\Program Files\Microsoft Office\Office\OSA9.EXE O4 - Global Startup: Ralink Wireless Utility.lnk = C:\Program Files\RALINK\Common\RaUI.exe O8 - Extra context menu item: Add to Google Photos Screensa&ver - res://C:\WINDOWS\system32\GPhotos.scr/200 O8 - Extra context menu item: Send To &Bluetooth - C:\Program Files\MSI\Bluetooth Software\btsendto_ie_ctx.htm O9 - Extra button: (no name) - {85d1f590-48f4-11d9-9669-0800200c9a66} - C:\WINDOWS\bdoscandel.exe O9 - Extra 'Tools' menuitem: Uninstall BitDefender Online Scanner v8 - {85d1f590-48f4-11d9-9669-0800200c9a66} - C:\WINDOWS\bdoscandel.exe O9 - Extra button: @btrez.dll,-4015 - {CCA281CA-C863-46ef-9331-5C8D4460577F} - C:\Program Files\MSI\Bluetooth Software\btsendto_ie.htm O9 - Extra 'Tools' menuitem: @btrez.dll,-4017 - {CCA281CA-C863-46ef-9331-5C8D4460577F} - C:\Program Files\MSI\Bluetooth Software\btsendto_ie.htm O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe O9 - Extra button: (no name) - {3CA1D406-30D8-4DBC-8EE6-0E2C05F78864} - (no file) (HKCU) O16 - DPF: {0CCA191D-13A6-4E29-B746-314DEE697D83} (Facebook Photo Uploader 5 Control) - http://upload.facebook.com/controls/2008.1...toUploader5.cab O16 - DPF: {215B8138-A3CF-44C5-803F-8226143CFC0A} (Trend Micro ActiveX Scan Agent 6.6) - http://ushousecall02.trendmicro.com/housec...ivex/hcImpl.cab O16 - DPF: {2BC66F54-93A8-11D3-BEB6-00105AA9B6AE} (Symantec AntiVirus scanner) - http://security.symantec.com/sscv6/SharedC...bin/AvSniff.cab O16 - DPF: {2D8ED06D-3C30-438B-96AE-4D110FDC1FB8} (ActiveScan 2.0 Installer Class) - http://acs.pandasoftware.com/activescan/cabs/as2stubie.cab O16 - DPF: {5D6F45B3-9043-443D-A792-115447494D24} (UnoCtrl Class) - http://messenger.zone.msn.com/MessengerGam...1/GAME_UNO1.cab O16 - DPF: {5D86DDB5-BDF9-441B-9E9E-D4730F4EE499} (BDSCANONLINE Control) - http://www.zebulon.fr/scan8/oscan8.cab O16 - DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} (WUWebControl Class) - http://update.microsoft.com/windowsupdate/...b?1251969744265 O16 - DPF: {644E432F-49D3-41A1-8DD5-E099162EEEC5} (Symantec RuFSI Utility Class) - http://security.symantec.com/sscv6/SharedC...n/bin/cabsa.cab O16 - DPF: {67DABFBF-D0AB-41FA-9C46-CC0F21721616} - http://go.divx.com/plugin/DivXBrowserPlugin.cab O16 - DPF: {C3F79A2B-B9B4-4A66-B012-3EE46475B072} (MessengerStatsClient Class) - http://messenger.zone.msn.com/binary/Messe...nt.cab56907.cab O16 - DPF: {E2883E8F-472F-4FB0-9522-AC9BF37916A7} - http://platformdl.adobe.com/NOS/getPlusPlus/1.6/gp.cab O23 - Service: avast! iAVS4 Control Service (aswUpdSv) - ALWIL Software - C:\Program Files\Alwil Software\Avast4\aswUpdSv.exe O23 - Service: avast! Antivirus - ALWIL Software - C:\Program Files\Alwil Software\Avast4\ashServ.exe O23 - Service: avast! Mail Scanner - ALWIL Software - C:\Program Files\Alwil Software\Avast4\ashMaiSv.exe O23 - Service: avast! Web Scanner - ALWIL Software - C:\Program Files\Alwil Software\Avast4\ashWebSv.exe O23 - Service: Service de transfert intelligent en arrière-plan (BITS) - Unknown owner - C:\WINDOWS\ O23 - Service: Bluetooth Service (btwdins) - WIDCOMM, Inc. - C:\Program Files\MSI\Bluetooth Software\bin\btwdins.exe O23 - Service: Firebird Server - MAGIX Instance (FirebirdServerMAGIXInstance) - MAGIX® - C:\Program Files\ALDI Service Photo\Common\Database\bin\fbserver.exe O23 - Service: Google Software Updater (gusvc) - Google - C:\Program Files\Google\Common\Google Updater\GoogleUpdaterService.exe O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Fichiers communs\InstallShield\Driver\11\Intel 32\IDriverT.exe O23 - Service: Java Quick Starter (JavaQuickStarterService) - Sun Microsystems, Inc. - C:\Program Files\Java\jre6\bin\jqs.exe O23 - Service: NVIDIA Display Driver Service (NVSvc) - NVIDIA Corporation - C:\WINDOWS\system32\nvsvc32.exe O23 - Service: Mises à jour automatiques (wuauserv) - Unknown owner - C:\WINDOWS\ -- End of file - 13633 bytes voila se que tu m'avais demander au debut désolé --------------------\\ Lop S&D 4.2.5-0 XP/Vista Microsoft Windows XP Professionnel ( v5.1.2600 ) Service Pack 2 X86-based PC ( Uniprocessor Free : AMD Athlon Processor LE-1640 ) BIOS : Default System BIOS USER : goyen70 ( Administrator ) BOOT : Normal boot Antivirus : avast! antivirus 4.8.1351 [VPS 090920-0] 4.8.1351 (Activated) Firewall : Windows PC Defender (Activated) A:\ (USB) C:\ (Local Disk) - NTFS - Total:48 Go (Free:28 Go) D:\ (Local Disk) - NTFS - Total:39 Go (Free:37 Go) E:\ (Local Disk) - NTFS - Total:40 Go (Free:38 Go) F:\ (CD or DVD) "C:\Lop SD" ( MAJ : 19-12-2008|23:40 ) Option : [1] ( 21/09/2009|18:08 ) --------------------\\ Listing des dossiers dans APPLIC~1 [28/03/2009|17:04] C:\DOCUME~1\ADMINI~1\APPLIC~1\Microsoft [21/09/2009|15:09] C:\DOCUME~1\ALLUSE~1\APPLIC~1\85f016b [19/06/2009|23:08] C:\DOCUME~1\ALLUSE~1\APPLIC~1\Adobe [10/03/2009|11:39] C:\DOCUME~1\ALLUSE~1\APPLIC~1\Electronic Arts [20/03/2009|11:45] C:\DOCUME~1\ALLUSE~1\APPLIC~1\EPSON [22/08/2009|12:00] C:\DOCUME~1\ALLUSE~1\APPLIC~1\Icon Constructor 3 [29/04/2009|22:37] C:\DOCUME~1\ALLUSE~1\APPLIC~1\MAGIX [17/06/2009|13:17] C:\DOCUME~1\ALLUSE~1\APPLIC~1\Malwarebytes [16/09/2009|17:25] C:\DOCUME~1\ALLUSE~1\APPLIC~1\Microsoft [29/06/2009|10:30] C:\DOCUME~1\ALLUSE~1\APPLIC~1\NOS [21/09/2009|17:49] C:\DOCUME~1\ALLUSE~1\APPLIC~1\TEMP [20/03/2009|11:49] C:\DOCUME~1\ALLUSE~1\APPLIC~1\UDL [21/09/2009|10:59] C:\DOCUME~1\ALLUSE~1\APPLIC~1\WPCDSys [07/03/2009|20:17] C:\DOCUME~1\DEFAUL~1\APPLIC~1\Microsoft [18/09/2009|10:22] C:\DOCUME~1\goyen70\APPLIC~1\.purple [13/03/2009|13:44] C:\DOCUME~1\goyen70\APPLIC~1\Adobe [27/07/2009|17:38] C:\DOCUME~1\goyen70\APPLIC~1\Datalayer [12/06/2009|00:25] C:\DOCUME~1\goyen70\APPLIC~1\DivX [01/04/2009|18:10] C:\DOCUME~1\goyen70\APPLIC~1\EPSON [08/03/2009|23:37] C:\DOCUME~1\goyen70\APPLIC~1\FotoWire [28/06/2009|16:18] C:\DOCUME~1\goyen70\APPLIC~1\Google [18/09/2009|10:21] C:\DOCUME~1\goyen70\APPLIC~1\gtk-2.0 [17/07/2009|10:04] C:\DOCUME~1\goyen70\APPLIC~1\Help [21/09/2009|15:37] C:\DOCUME~1\goyen70\APPLIC~1\HouseCall 6.6 [07/03/2009|20:21] C:\DOCUME~1\goyen70\APPLIC~1\Identities [07/03/2009|20:25] C:\DOCUME~1\goyen70\APPLIC~1\InstallShield [17/07/2009|16:58] C:\DOCUME~1\goyen70\APPLIC~1\LG Electronics [07/03/2009|20:38] C:\DOCUME~1\goyen70\APPLIC~1\Macromedia [17/06/2009|13:17] C:\DOCUME~1\goyen70\APPLIC~1\Malwarebytes [21/09/2009|11:07] C:\DOCUME~1\goyen70\APPLIC~1\Microsoft [09/03/2009|00:37] C:\DOCUME~1\goyen70\APPLIC~1\Microsoft Web Folders [28/03/2009|17:04] C:\DOCUME~1\goyen70\APPLIC~1\Mozilla [03/09/2009|17:04] C:\DOCUME~1\goyen70\APPLIC~1\MSNInstaller [27/07/2009|17:38] C:\DOCUME~1\goyen70\APPLIC~1\Nokia [31/07/2009|12:13] C:\DOCUME~1\goyen70\APPLIC~1\Nokia Multimedia Player [27/07/2009|17:34] C:\DOCUME~1\goyen70\APPLIC~1\PC Suite [09/03/2009|18:27] C:\DOCUME~1\goyen70\APPLIC~1\SecuROM [30/04/2009|09:30] C:\DOCUME~1\goyen70\APPLIC~1\Sun [06/06/2009|11:31] C:\DOCUME~1\goyen70\APPLIC~1\temp [07/03/2009|20:34] C:\DOCUME~1\goyen70\APPLIC~1\vlc [21/09/2009|11:00] C:\DOCUME~1\goyen70\APPLIC~1\Windows PC Defender [07/03/2009|21:02] C:\DOCUME~1\goyen70\APPLIC~1\WinRAR [07/03/2009|20:17] C:\DOCUME~1\LOCALS~1\APPLIC~1\Microsoft [07/03/2009|20:17] C:\DOCUME~1\NETWOR~1\APPLIC~1\Microsoft --------------------\\ Tâches planifiées dans C:\WINDOWS\tasks [21/09/2009 17:50][--ah-----] C:\WINDOWS\tasks\SA.DAT [15/10/2001 00:44][-r-h-----] C:\WINDOWS\tasks\desktop.ini --------------------\\ Listing des dossiers dans C:\Program Files [19/06/2009|23:08] C:\Program Files\Adobe [13/09/2009|21:14] C:\Program Files\adslTV [08/03/2009|17:13] C:\Program Files\AIDA32 - Enterprise System Information [29/04/2009|22:37] C:\Program Files\ALDI [30/04/2009|13:07] C:\Program Files\ALDI Service Photo [13/09/2009|13:02] C:\Program Files\Alwil Software [07/03/2009|20:25] C:\Program Files\AMD [19/03/2009|14:00] C:\Program Files\AtomixMP3 [07/03/2009|20:15] C:\Program Files\ComPlus Applications [12/06/2009|12:20] C:\Program Files\DivX [30/07/2009|11:51] C:\Program Files\driver [09/03/2009|18:23] C:\Program Files\EA SPORTS [09/03/2009|18:27] C:\Program Files\Electronic Arts [21/09/2009|14:06] C:\Program Files\Enigma Software Group [20/03/2009|11:48] C:\Program Files\epson [21/09/2009|17:50] C:\Program Files\Fichiers communs [24/08/2009|00:16] C:\Program Files\GIMP-2.0 [29/06/2009|10:30] C:\Program Files\Google [22/08/2009|12:50] C:\Program Files\Icon Constructor 3 [28/07/2009|10:45] C:\Program Files\InstallShield Installation Information [16/09/2009|17:25] C:\Program Files\Internet Explorer [19/06/2009|23:12] C:\Program Files\Java [27/07/2009|17:21] C:\Program Files\LG PC Suite II [08/03/2009|23:37] C:\Program Files\Logitech [28/07/2009|22:10] C:\Program Files\Malwarebytes' Anti-Malware [07/03/2009|20:15] C:\Program Files\Messenger [16/09/2009|14:15] C:\Program Files\Microsoft [09/03/2009|00:37] C:\Program Files\microsoft frontpage [09/03/2009|00:37] C:\Program Files\Microsoft Office [16/09/2009|17:27] C:\Program Files\Microsoft Silverlight [09/03/2009|00:38] C:\Program Files\Microsoft Visual Studio [18/09/2009|10:28] C:\Program Files\Miranda-IM [08/09/2009|19:46] C:\Program Files\Movie Maker [28/03/2009|17:04] C:\Program Files\Mozilla Firefox(2) [16/09/2009|18:49] C:\Program Files\MSBuild [03/09/2009|14:36] C:\Program Files\MSECACHE [04/06/2009|11:59] C:\Program Files\MSI [03/09/2009|17:04] C:\Program Files\MSN [07/03/2009|20:15] C:\Program Files\MSN Gaming Zone [16/09/2009|12:58] C:\Program Files\MSN Messenger [27/07/2009|18:09] C:\Program Files\NetMeeting [27/07/2009|17:34] C:\Program Files\Nokia [29/06/2009|10:30] C:\Program Files\NOS [07/03/2009|20:15] C:\Program Files\Online Services [07/03/2009|20:16] C:\Program Files\Outlook Express [13/03/2009|16:42] C:\Program Files\PhotoFiltre [03/06/2009|22:24] C:\Program Files\QuickTime [07/03/2009|20:28] C:\Program Files\RALINK [16/09/2009|18:47] C:\Program Files\Reference Assemblies [07/03/2009|20:17] C:\Program Files\Services en ligne [07/03/2009|20:31] C:\Program Files\SFR [07/03/2009|20:35] C:\Program Files\SLD Codec Pack [17/06/2009|20:12] C:\Program Files\trend micro [07/03/2009|20:21] C:\Program Files\Uninstall Information [03/09/2009|14:37] C:\Program Files\Windows Installer Clean Up [17/09/2009|17:16] C:\Program Files\Windows Live [09/03/2009|17:27] C:\Program Files\Windows Media Player [07/03/2009|20:15] C:\Program Files\Windows NT [07/03/2009|20:17] C:\Program Files\WindowsUpdate [07/03/2009|20:34] C:\Program Files\WinRAR [07/03/2009|20:18] C:\Program Files\xerox --------------------\\ Listing des dossiers dans C:\Program Files\Fichiers communs [19/06/2009|23:08] C:\Program Files\Fichiers communs\Adobe [09/03/2009|00:38] C:\Program Files\Fichiers communs\Designer [08/03/2009|23:37] C:\Program Files\Fichiers communs\FotoWire [18/09/2009|10:17] C:\Program Files\Fichiers communs\GTK [20/03/2009|11:49] C:\Program Files\Fichiers communs\InstallShield [08/03/2009|23:36] C:\Program Files\Fichiers communs\Logitech [18/09/2009|10:00] C:\Program Files\Fichiers communs\Microsoft Shared [07/03/2009|20:16] C:\Program Files\Fichiers communs\MSSoap [27/07/2009|17:34] C:\Program Files\Fichiers communs\Nokia [07/03/2009|21:11] C:\Program Files\Fichiers communs\ODBC [27/07/2009|17:34] C:\Program Files\Fichiers communs\PCSuite [07/03/2009|20:16] C:\Program Files\Fichiers communs\Services [07/03/2009|21:11] C:\Program Files\Fichiers communs\SpeechEngines [09/03/2009|00:38] C:\Program Files\Fichiers communs\System [07/03/2009|20:45] C:\Program Files\Fichiers communs\Windows Live --------------------\\ Process ( 36 Processes ) iexplore.exe ~ [PID:3132] --------------------\\ Recherche avec S_Lop Aucun fichier / dossier Lop trouvé ! --------------------\\ Recherche de Fichiers / Dossiers Lop C:\DOCUME~1\goyen70\LOCALS~1\Temp\msgpl_2d51.exe C:\DOCUME~1\goyen70\LOCALS~1\Temp\stadistic.log C:\DOCUME~1\goyen70\Cookies\goyen70@advertising[2].txt --------------------\\ Verification du Registre ..... OK ! --------------------\\ Verification du fichier Hosts Fichier Hosts PROPRE --------------------\\ Recherche de fichiers avec Catchme catchme 0.3.1353 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net Rootkit scan 2009-09-21 18:09:07 Windows 5.1.2600 Service Pack 2 NTFS scanning hidden processes ... scanning hidden files ... scan completed successfully hidden processes: 0 hidden files: 0 --------------------\\ Recherche d'autres infections Aucune autre infection trouvée ! [F:3054][D:102]-> C:\DOCUME~1\goyen70\LOCALS~1\Temp [F:83][D:0]-> C:\DOCUME~1\goyen70\Cookies [F:2621][D:32]-> C:\DOCUME~1\goyen70\LOCALS~1\TEMPOR~1\content.IE5 1 - "C:\Lop SD\LopR_1.txt" - 21/09/2009|18:09 - Option : [1] --------------------\\ Fin du rapport a 18:09:36
  22. bonjour a tous j'aurai besoin d'aide d'une personne si connaissant et qui pourrait m'aider a comprendre mon rapport hijackthis, pour infos je suis quelqu'un qui s'y connais peut en informatique et je ces pas si c'etait prudent d'utiliser se logiciel merci de votre aide Logfile of HijackThis v1.99.1 Scan saved at 13:23:40, on 21/09/2009 Platform: Windows XP SP2 (WinNT 5.01.2600) MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180) Running processes: C:\WINDOWS\System32\smss.exe C:\WINDOWS\system32\winlogon.exe C:\WINDOWS\system32\services.exe C:\WINDOWS\system32\lsass.exe C:\WINDOWS\system32\svchost.exe C:\WINDOWS\System32\svchost.exe C:\WINDOWS\Explorer.EXE C:\WINDOWS\system32\spoolsv.exe C:\WINDOWS\RTHDCPL.EXE C:\Program Files\MSI\Bluetooth Software\bin\btwdins.exe C:\Program Files\Java\jre6\bin\jqs.exe C:\WINDOWS\system32\RUNDLL32.EXE C:\Program Files\SFR\Kit\WiFi\9wifi.exe C:\WINDOWS\system32\LVCOMSX.EXE C:\Program Files\Logitech\Video\LogiTray.exe C:\Program Files\Java\jre6\bin\jusched.exe C:\Program Files\Fichiers communs\PCSuite\DataLayer\DataLayer.exe C:\Program Files\Nokia\Nokia PC Suite 6\LaunchApplication.exe C:\Documents and Settings\All Users\Application Data\85f016b\WP85f0.exe C:\WINDOWS\system32\ctfmon.exe C:\Program Files\Electronic Arts\EADM\Core.exe C:\WINDOWS\system32\svchost.exe C:\Program Files\Messenger\msmsgs.exe C:\Program Files\Nokia\Nokia PC Suite 6\PcSync2.exe C:\Program Files\Windows Live\Messenger\msnmsgr.exe C:\Program Files\MSI\Bluetooth Software\BTTray.exe C:\Program Files\RALINK\Common\RaUI.exe C:\PROGRA~1\FICHIE~1\Nokia\MPAPI\MPAPI3s.exe C:\PROGRA~1\FICHIE~1\PCSuite\Services\SERVIC~1.EXE C:\Program Files\Logitech\Video\FxSvr2.exe C:\Program Files\Java\jre6\bin\jucheck.exe C:\Program Files\Internet Explorer\IEXPLORE.EXE C:\Program Files\Internet Explorer\IEXPLORE.EXE C:\Program Files\Internet Explorer\IEXPLORE.EXE C:\Program Files\Java\jre6\bin\java.exe C:\Program Files\Internet Explorer\IEXPLORE.EXE C:\Program Files\WinRAR\WinRAR.exe C:\DOCUME~1\goyen70\LOCALS~1\Temp\Rar$EX00.125\HijackThis.exe R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Bar = http://search.msn.fr/spbasic.htm R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.google.fr/ R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157 R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896 R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName = Liens O1 - Hosts: 74.125.45.100 4-open-davinci.com O1 - Hosts: 74.125.45.100 securitysoftwarepayments.com O1 - Hosts: 74.125.45.100 privatesecuredpayments.com O1 - Hosts: 74.125.45.100 secure.privatesecuredpayments.com O1 - Hosts: 74.125.45.100 getantivirusplusnow.com O1 - Hosts: 74.125.45.100 secure-plus-payments.com O1 - Hosts: 74.125.45.100 www.getantivirusplusnow.com O1 - Hosts: 74.125.45.100 www.secure-plus-payments.com O1 - Hosts: 74.125.45.100 www.getavplusnow.com O1 - Hosts: 74.125.45.100 www.securesoftwarebill.com O1 - Hosts: 74.125.45.100 secure.paysecuresystem.com O1 - Hosts: 74.125.45.100 paysoftbillsolution.com O1 - Hosts: 206.53.61.77 google.ae O1 - Hosts: 206.53.61.77 google.as O1 - Hosts: 206.53.61.77 google.at O1 - Hosts: 206.53.61.77 google.az O1 - Hosts: 206.53.61.77 google.ba O1 - Hosts: 206.53.61.77 google.be O1 - Hosts: 206.53.61.77 google.bg O1 - Hosts: 206.53.61.77 google.bs O1 - Hosts: 206.53.61.77 google.ca O1 - Hosts: 206.53.61.77 google.cd O1 - Hosts: 206.53.61.77 google.com.gh O1 - Hosts: 206.53.61.77 google.com.hk O1 - Hosts: 206.53.61.77 google.com.jm O1 - Hosts: 206.53.61.77 google.com.mx O1 - Hosts: 206.53.61.77 google.com.my O1 - Hosts: 206.53.61.77 google.com.na O1 - Hosts: 206.53.61.77 google.com.nf O1 - Hosts: 206.53.61.77 google.com.ng O1 - Hosts: 206.53.61.77 google.ch O1 - Hosts: 206.53.61.77 google.com.np O1 - Hosts: 206.53.61.77 google.com.pr O1 - Hosts: 206.53.61.77 google.com.qa O1 - Hosts: 206.53.61.77 google.com.sg O1 - Hosts: 206.53.61.77 google.com.tj O1 - Hosts: 206.53.61.77 google.com.tw O1 - Hosts: 206.53.61.77 google.dj O1 - Hosts: 206.53.61.77 google.de O1 - Hosts: 206.53.61.77 google.dk O1 - Hosts: 206.53.61.77 google.dm O1 - Hosts: 206.53.61.77 google.ee O1 - Hosts: 206.53.61.77 google.fi O1 - Hosts: 206.53.61.77 google.fm O1 - Hosts: 206.53.61.77 google.fr O1 - Hosts: 206.53.61.77 google.ge O1 - Hosts: 206.53.61.77 google.gg O1 - Hosts: 206.53.61.77 google.gm O1 - Hosts: 206.53.61.77 google.gr O1 - Hosts: 206.53.61.77 google.ht O1 - Hosts: 206.53.61.77 google.ie O1 - Hosts: 206.53.61.77 google.im O1 - Hosts: 206.53.61.77 google.in O1 - Hosts: 206.53.61.77 google.it O1 - Hosts: 206.53.61.77 google.ki O1 - Hosts: 206.53.61.77 google.la O1 - Hosts: 206.53.61.77 google.li O1 - Hosts: 206.53.61.77 google.lv O1 - Hosts: 206.53.61.77 google.ma O1 - Hosts: 206.53.61.77 google.ms O1 - Hosts: 206.53.61.77 google.mu O1 - Hosts: 206.53.61.77 google.mw O1 - Hosts: 206.53.61.77 google.nl O1 - Hosts: 206.53.61.77 google.no O1 - Hosts: 206.53.61.77 google.nr O1 - Hosts: 206.53.61.77 google.nu O1 - Hosts: 206.53.61.77 google.pl O1 - Hosts: 206.53.61.77 google.pn O1 - Hosts: 206.53.61.77 google.pt O1 - Hosts: 206.53.61.77 google.ro O1 - Hosts: 206.53.61.77 google.ru O1 - Hosts: 206.53.61.77 google.rw O1 - Hosts: 206.53.61.77 google.sc O1 - Hosts: 206.53.61.77 google.se O1 - Hosts: 206.53.61.77 google.sh O1 - Hosts: 206.53.61.77 google.si O1 - Hosts: 206.53.61.77 google.sm O1 - Hosts: 206.53.61.77 google.sn O1 - Hosts: 206.53.61.77 google.st O1 - Hosts: 206.53.61.77 google.tl O1 - Hosts: 206.53.61.77 google.tm O1 - Hosts: 206.53.61.77 google.tt O1 - Hosts: 206.53.61.77 google.us O1 - Hosts: 206.53.61.77 google.vu O1 - Hosts: 206.53.61.77 google.ws O1 - Hosts: 206.53.61.77 google.co.ck O1 - Hosts: 206.53.61.77 google.co.id O1 - Hosts: 206.53.61.77 google.co.il O1 - Hosts: 206.53.61.77 google.co.in O1 - Hosts: 206.53.61.77 google.co.jp O1 - Hosts: 206.53.61.77 google.co.kr O1 - Hosts: 206.53.61.77 google.co.ls O1 - Hosts: 206.53.61.77 google.co.ma O1 - Hosts: 206.53.61.77 google.co.nz O1 - Hosts: 206.53.61.77 google.co.tz O1 - Hosts: 206.53.61.77 google.co.ug O1 - Hosts: 206.53.61.77 google.co.uk O1 - Hosts: 206.53.61.77 google.co.za O1 - Hosts: 206.53.61.77 google.co.zm O1 - Hosts: 206.53.61.77 google.com O1 - Hosts: 206.53.61.77 google.com.af O2 - BHO: AcroIEHelperStub - {18DF081C-E8AD-4283-A596-FA578C2EBDC3} - C:\Program Files\Fichiers communs\Adobe\Acrobat\ActiveX\AcroIEHelperShim.dll O2 - BHO: (no name) - {5C255C8A-E604-49b4-9D64-90988571CECB} - (no file) O2 - BHO: Programme d'aide de l'Assistant de connexion Windows Live - {9030D464-4C02-4ABF-8ECC-5164760863C6} - C:\Program Files\Fichiers communs\Microsoft Shared\Windows Live\WindowsLiveLogin.dll O2 - BHO: Java Plug-In 2 SSV Helper - {DBC80044-A445-435b-BC74-9C25C1C588A9} - C:\Program Files\Java\jre6\bin\jp2ssv.dll O2 - BHO: JQSIEStartDetectorImpl - {E7E6F031-17CE-4C07-BC86-EABFE594F69C} - C:\Program Files\Java\jre6\lib\deploy\jqs\ie\jqs_plugin.dll O2 - BHO: EpsonToolBandKicker Class - {E99421FB-68DD-40F0-B4AC-B7027CAE2F1A} - C:\Program Files\EPSON\EPSON Web-To-Page\EPSON Web-To-Page.dll O3 - Toolbar: EPSON Web-To-Page - {EE5D279F-081B-4404-994D-C6B60AAEBA6D} - C:\Program Files\EPSON\EPSON Web-To-Page\EPSON Web-To-Page.dll O4 - HKLM\..\Run: [RTHDCPL] RTHDCPL.EXE O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE C:\WINDOWS\system32\NvCpl.dll,NvStartup O4 - HKLM\..\Run: [nwiz] nwiz.exe /install O4 - HKLM\..\Run: [NvMediaCenter] RUNDLL32.EXE C:\WINDOWS\system32\NvMcTray.dll,NvTaskbarInit O4 - HKLM\..\Run: [Autoconfigurateur WiFi SFR] "C:\Program Files\SFR\Kit\WiFi\9wifi.exe" O4 - HKLM\..\Run: [LVCOMSX] C:\WINDOWS\system32\LVCOMSX.EXE O4 - HKLM\..\Run: [LogitechVideoRepair] C:\Program Files\Logitech\Video\ISStart.exe O4 - HKLM\..\Run: [LogitechVideoTray] C:\Program Files\Logitech\Video\LogiTray.exe O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime O4 - HKLM\..\Run: [Adobe Reader Speed Launcher] "C:\Program Files\Adobe\Reader 9.0\Reader\Reader_sl.exe" O4 - HKLM\..\Run: [sunJavaUpdateSched] "C:\Program Files\Java\jre6\bin\jusched.exe" O4 - HKLM\..\Run: [DataLayer] C:\Program Files\Fichiers communs\PCSuite\DataLayer\DataLayer.exe O4 - HKLM\..\Run: [PCSuiteTrayApplication] C:\Program Files\Nokia\Nokia PC Suite 6\LaunchApplication.exe -onlytray O4 - HKLM\..\Run: [Windows PC Defender] "C:\Documents and Settings\All Users\Application Data\85f016b\WP85f0.exe" /s /d O4 - HKLM\..\Run: [avast!] C:\PROGRA~1\ALWILS~1\Avast4\ashDisp.exe O4 - HKCU\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\ctfmon.exe O4 - HKCU\..\Run: [LogitechSoftwareUpdate] "C:\Program Files\Logitech\Video\ManifestEngine.exe" boot O4 - HKCU\..\Run: [EA Core] "C:\Program Files\Electronic Arts\EADM\Core.exe" -silent O4 - HKCU\..\Run: [MSMSGS] "C:\Program Files\Messenger\msmsgs.exe" /background O4 - HKCU\..\Run: [PcSync] C:\Program Files\Nokia\Nokia PC Suite 6\PcSync2.exe /NoDialog O4 - HKCU\..\Run: [msnmsgr] "C:\Program Files\Windows Live\Messenger\msnmsgr.exe" /background O4 - Global Startup: BTTray.lnk = ? O4 - Global Startup: Logitech Desktop Messenger.lnk = C:\Program Files\Logitech\Desktop Messenger\8876480\Program\LDMConf.exe O4 - Global Startup: Microsoft Office.lnk = C:\Program Files\Microsoft Office\Office\OSA9.EXE O4 - Global Startup: Ralink Wireless Utility.lnk = C:\Program Files\RALINK\Common\RaUI.exe O8 - Extra context menu item: Add to Google Photos Screensa&ver - res://C:\WINDOWS\system32\GPhotos.scr/200 O8 - Extra context menu item: Send To &Bluetooth - C:\Program Files\MSI\Bluetooth Software\btsendto_ie_ctx.htm O9 - Extra button: (no name) - {85d1f590-48f4-11d9-9669-0800200c9a66} - %windir%\bdoscandel.exe (file missing) O9 - Extra 'Tools' menuitem: Uninstall BitDefender Online Scanner v8 - {85d1f590-48f4-11d9-9669-0800200c9a66} - %windir%\bdoscandel.exe (file missing) O9 - Extra button: @btrez.dll,-4015 - {CCA281CA-C863-46ef-9331-5C8D4460577F} - C:\Program Files\MSI\Bluetooth Software\btsendto_ie.htm O9 - Extra 'Tools' menuitem: @btrez.dll,-4017 - {CCA281CA-C863-46ef-9331-5C8D4460577F} - C:\Program Files\MSI\Bluetooth Software\btsendto_ie.htm O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe O9 - Extra button: (no name) - {3CA1D406-30D8-4DBC-8EE6-0E2C05F78864} - (no file) (HKCU) O16 - DPF: {0CCA191D-13A6-4E29-B746-314DEE697D83} (Facebook Photo Uploader 5 Control) - http://upload.facebook.com/controls/2008.1...toUploader5.cab O16 - DPF: {215B8138-A3CF-44C5-803F-8226143CFC0A} (Trend Micro ActiveX Scan Agent 6.6) - http://ushousecall02.trendmicro.com/housec...ivex/hcImpl.cab O16 - DPF: {2BC66F54-93A8-11D3-BEB6-00105AA9B6AE} (Symantec AntiVirus scanner) - http://security.symantec.com/sscv6/SharedC...bin/AvSniff.cab O16 - DPF: {2D8ED06D-3C30-438B-96AE-4D110FDC1FB8} (ActiveScan 2.0 Installer Class) - http://acs.pandasoftware.com/activescan/cabs/as2stubie.cab O16 - DPF: {5D6F45B3-9043-443D-A792-115447494D24} (UnoCtrl Class) - http://messenger.zone.msn.com/MessengerGam...1/GAME_UNO1.cab O16 - DPF: {5D86DDB5-BDF9-441B-9E9E-D4730F4EE499} (BDSCANONLINE Control) - http://www.zebulon.fr/scan8/oscan8.cab O16 - DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} (WUWebControl Class) - http://update.microsoft.com/windowsupdate/...b?1251969744265 O16 - DPF: {644E432F-49D3-41A1-8DD5-E099162EEEC5} (Symantec RuFSI Utility Class) - http://security.symantec.com/sscv6/SharedC...n/bin/cabsa.cab O16 - DPF: {67DABFBF-D0AB-41FA-9C46-CC0F21721616} - http://go.divx.com/plugin/DivXBrowserPlugin.cab O16 - DPF: {C3F79A2B-B9B4-4A66-B012-3EE46475B072} (MessengerStatsClient Class) - http://messenger.zone.msn.com/binary/Messe...nt.cab56907.cab O16 - DPF: {E2883E8F-472F-4FB0-9522-AC9BF37916A7} - http://platformdl.adobe.com/NOS/getPlusPlus/1.6/gp.cab O18 - Protocol: livecall - {828030A1-22C1-4009-854F-8E305202313F} - C:\PROGRA~1\WINDOW~4\MESSEN~1\MSGRAP~1.DLL O18 - Protocol: msnim - {828030A1-22C1-4009-854F-8E305202313F} - C:\PROGRA~1\WINDOW~4\MESSEN~1\MSGRAP~1.DLL O18 - Protocol: wlmailhtml - {03C514A3-1EFB-4856-9F99-10D7BE1653C0} - C:\Program Files\Windows Live\Mail\mailcomm.dll O23 - Service: avast! iAVS4 Control Service (aswUpdSv) - ALWIL Software - C:\Program Files\Alwil Software\Avast4\aswUpdSv.exe O23 - Service: avast! Antivirus - ALWIL Software - C:\Program Files\Alwil Software\Avast4\ashServ.exe O23 - Service: avast! Mail Scanner - Unknown owner - C:\Program Files\Alwil Software\Avast4\ashMaiSv.exe" /service (file missing) O23 - Service: avast! Web Scanner - Unknown owner - C:\Program Files\Alwil Software\Avast4\ashWebSv.exe" /service (file missing) O23 - Service: Service de transfert intelligent en arrière-plan (BITS) - Unknown owner - %fystemRoot%\system32\svchost.exe (file missing) O23 - Service: Bluetooth Service (btwdins) - WIDCOMM, Inc. - C:\Program Files\MSI\Bluetooth Software\bin\btwdins.exe O23 - Service: Firebird Server - MAGIX Instance (FirebirdServerMAGIXInstance) - MAGIX® - C:\Program Files\ALDI Service Photo\Common\Database\bin\fbserver.exe O23 - Service: Google Software Updater (gusvc) - Google - C:\Program Files\Google\Common\Google Updater\GoogleUpdaterService.exe O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Fichiers communs\InstallShield\Driver\11\Intel 32\IDriverT.exe O23 - Service: Java Quick Starter (JavaQuickStarterService) - Unknown owner - C:\Program Files\Java\jre6\bin\jqs.exe" -service -config "C:\Program Files\Java\jre6\lib\deploy\jqs\jqs.conf (file missing) O23 - Service: NVIDIA Display Driver Service (NVSvc) - NVIDIA Corporation - C:\WINDOWS\system32\nvsvc32.exe O23 - Service: Mises à jour automatiques (wuauserv) - Unknown owner - %fystemroot%\system32\svchost.exe (file missing) Résolu
  23. bonjour a tous je n'ai pas d'anti virus sur mon pc deja depuis un moment, je ces pas tres prudent :s aujourd'hui en naviguant un peu sur le net sur un site de l'actualité people j'ai eu une case qui ces ouverte sur le bureau de l'ordi qui m'indiquai que j'avais plusieur virus qui allai venir et le poste de travaille ces ouvert et des tonnes de virus se sont introduit et maintenant j'ai windows pc defender qui s'affiche tout les 10 min pour me dire que j'ai des trojan etc..qui infecte mon pc j'aurai besoin de quelqu'un pour m'aider a faire un bon netoyage de mon ordi svp
  24. en posant la question a mon pere il ma dit qu'on avait pas le pack de sécurité Neuf / SFR et je ne vois pas ou est le probleme alors
  25. je vais te redire sa des que j'ai la rep je te la fai parvenir
×
×
  • Créer...