Aller au contenu

oo_achille_oo

Membres
  • Compteur de contenus

    17
  • Inscription

  • Dernière visite

oo_achille_oo's Achievements

Junior Member

Junior Member (3/12)

0

Réputation sur la communauté

  1. bonjour tonton et merci d'avance pour ton aide, voici le lien Cjoint que tu m'ad demandé: © CJoint.com, 2012 +Ach
  2. Bonjour, Merci d'avance pour votre aide (elle ma deja bien servie par le passe) Voici mon probleme: ma connection est devenu tres lentes (chargment des video sur youtube et en streaming tres tres lent meme les clips de 2 - 3 minutes) le chargement des pages firefox (qui est à jour) sont lentes aussi. j'ai fait des scan complet avec: Kaspersky, Malwarebytes, Spybot S&D, test connection sur Zebulon, ainsi qu'un test de vulnérabitlié (ports) sur Zebulon. aucun de ses test et scan n'a resolu mon probleme. J'ai telephone a mon FAI et chez eux, tous mes niveaux sont bons sauf que j'upload trop apparement.... le fait est que je n'upload pas (enfin en premier plan) j'ai desactive tous ce qui est torrent etc et rien ni fait. j'ai une saloperie qui me bouffe ma connection internet (qui est securisé bien entendu^^) Voici ma config : CM: Asus P8Z77 M Pro Proco: I5 2500k @ 4.2Ghz Ventirad: Noctua Nh u9b se2 Ram: 2x8Go corsair vengeance DDR3 CG: Nvidia GTX 560 HDD: western black 1To 6gb/s boitier; Antec Nine Hundred Two Alim: Aerocool 700w Voici mon rapport Hijackthis qui j'espere vous aideras afin de m'aider UN IMMENSE MERCI D AVANCE!!!! Logfile of Trend Micro HijackThis v2.0.2 Scan saved at 12:30:23, on 6/11/2012 Platform: Unknown Windows (WinNT 6.01.3505 SP1) MSIE: Internet Explorer v9.00 (9.00.8112.16450) Boot mode: Normal Running processes: C:\Program Files (x86)\MSI Afterburner\MSIAfterburner.exe C:\Program Files (x86)\iTunes\iTunesHelper.exe C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe C:\Program Files (x86)\Kaspersky Lab\Kaspersky Anti-Virus 2013\avp.exe C:\Users\Jonathan\Downloads\01net_HijackThis.exe C:\Users\Jonathan\AppData\Local\Temp\nse27AD.tmp\ProxyInstaller.exe C:\Users\Jonathan\AppData\Local\Temp\nse27AD.tmp\SecondOffer1.exe C:\Users\Jonathan\AppData\Local\Temp\nse7955.tmp\stub.exe C:\Users\Jonathan\AppData\Local\Temp\conduitinstaller.exe c:\users\jonathan\appdata\local\temp\nse7955.tmp\ffpath.exe C:\Users\Jonathan\AppData\Local\Temp\CT3128284\spff.exe C:\Users\Jonathan\Downloads\HiJackThis.exe R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = Bing R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = Rechercher R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = Bing R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = about:blank R0 - HKLM\Software\Microsoft\Internet Explorer\Search,SearchAssistant = R0 - HKLM\Software\Microsoft\Internet Explorer\Search,CustomizeSearch = R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Local Page = C:\Windows\SysWOW64\blank.htm R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName = R3 - URLSearchHook: BittorrentBar_FR Toolbar - {ef79f67a-6ad7-4715-a0f8-932fca442023} - C:\Program Files (x86)\BittorrentBar_FR\prxtbBitt.dll O2 - BHO: AcroIEHelperStub - {18DF081C-E8AD-4283-A596-FA578C2EBDC3} - C:\Program Files (x86)\Common Files\Adobe\Acrobat\ActiveX\AcroIEHelperShim.dll O2 - BHO: QFX Software KeyScrambler - {2B9F5787-88A5-4945-90E7-C4B18563BC5E} - C:\Program Files (x86)\KeyScrambler\KeyScramblerIE.dll O2 - BHO: ContentBlockerBrowserHelperObject - {5564CC73-EFA7-4CBF-918A-5CF7FBBFFF4F} - C:\Program Files (x86)\Kaspersky Lab\Kaspersky Anti-Virus 2013\IEExt\ContentBlocker\ie_content_blocker_plugin.dll O2 - BHO: Groove GFS Browser Helper - {72853161-30C5-4D22-B7F9-0BBC1D38A37E} - C:\PROGRA~2\MICROS~1\Office14\GROOVEEX.DLL O2 - BHO: VirtualKeyboardBrowserHelperObject - {73455575-E40C-433C-9784-C78DC7761455} - C:\Program Files (x86)\Kaspersky Lab\Kaspersky Anti-Virus 2013\IEExt\VirtualKeyboard\ie_virtual_keyboard_plugin.dll O2 - BHO: Java Plug-In SSV Helper - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files (x86)\Java\jre7\bin\ssv.dll O2 - BHO: URLRedirectionBHO - {B4F3A835-0E21-4959-BA22-42B3008E02FF} - C:\PROGRA~2\MICROS~1\Office14\URLREDIR.DLL O2 - BHO: Java Plug-In 2 SSV Helper - {DBC80044-A445-435b-BC74-9C25C1C588A9} - C:\Program Files (x86)\Java\jre7\bin\jp2ssv.dll O2 - BHO: link filter bho - {E33CF602-D945-461A-83F0-819F76A199F8} - C:\Program Files (x86)\Kaspersky Lab\Kaspersky Anti-Virus 2013\IEExt\UrlAdvisor\klwtbbho.dll O2 - BHO: BittorrentBar_FR - {ef79f67a-6ad7-4715-a0f8-932fca442023} - C:\Program Files (x86)\BittorrentBar_FR\prxtbBitt.dll O3 - Toolbar: BittorrentBar_FR Toolbar - {ef79f67a-6ad7-4715-a0f8-932fca442023} - C:\Program Files (x86)\BittorrentBar_FR\prxtbBitt.dll O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files (x86)\QuickTime\QTTask.exe" -atboottime O4 - HKLM\..\Run: [switchBoard] C:\Program Files (x86)\Common Files\Adobe\SwitchBoard\SwitchBoard.exe O4 - HKLM\..\Run: [iTunesHelper] "C:\Program Files (x86)\iTunes\iTunesHelper.exe" O4 - HKLM\..\Run: [sunJavaUpdateSched] "C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe" O4 - HKLM\..\Run: [Adobe ARM] "C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\AdobeARM.exe" O4 - HKLM\..\Run: [AVP] "C:\Program Files (x86)\Kaspersky Lab\Kaspersky Anti-Virus 2013\avp.exe" O4 - HKCU\..\Run: [bitTorrent] "C:\Program Files (x86)\BitTorrent\BitTorrent.exe" /MINIMIZED O4 - HKCU\..\Run: [DAEMON Tools Lite] "C:\Program Files (x86)\DAEMON Tools Lite\DTLite.exe" -autorun O4 - HKCU\..\Run: [sidebar] C:\Program Files\Windows Sidebar\sidebar.exe /autoRun O4 - HKCU\..\Run: [spybotSD TeaTimer] C:\Program Files (x86)\Spybot - Search & Destroy\TeaTimer.exe O4 - HKUS\S-1-5-19\..\Run: [sidebar] %ProgramFiles%\Windows Sidebar\Sidebar.exe /autoRun (User 'SERVICE LOCAL') O4 - HKUS\S-1-5-19\..\RunOnce: [mctadmin] C:\Windows\System32\mctadmin.exe (User 'SERVICE LOCAL') O4 - HKUS\S-1-5-20\..\Run: [sidebar] %ProgramFiles%\Windows Sidebar\Sidebar.exe /autoRun (User 'SERVICE RÉSEAU') O4 - HKUS\S-1-5-20\..\RunOnce: [mctadmin] C:\Windows\System32\mctadmin.exe (User 'SERVICE RÉSEAU') O4 - HKUS\S-1-5-21-1860856908-2409763522-3188507559-1003\..\Run: [sidebar] %ProgramFiles%\Windows Sidebar\Sidebar.exe /autoRun (User 'UpdatusUser') O4 - HKUS\S-1-5-21-1860856908-2409763522-3188507559-1003\..\RunOnce: [mctadmin] C:\Windows\System32\mctadmin.exe (User 'UpdatusUser') O8 - Extra context menu item: &Envoyer à OneNote - res://C:\PROGRA~2\MICROS~1\Office14\ONBttnIE.dll/105 O8 - Extra context menu item: E&xporter vers Microsoft Excel - res://C:\PROGRA~2\MICROS~1\Office14\EXCEL.EXE/3000 O9 - Extra button: Virtual Keyboard - {0C4CC089-D306-440D-9772-464E226F6539} - C:\Program Files (x86)\Kaspersky Lab\Kaspersky Anti-Virus 2013\IEExt\VirtualKeyboard\ie_virtual_keyboard_plugin.dll O9 - Extra button: Envoyer à OneNote - {2670000A-7350-4f3c-8081-5663EE0C6C49} - C:\Program Files (x86)\Microsoft Office\Office14\ONBttnIE.dll O9 - Extra 'Tools' menuitem: &Envoyer à OneNote - {2670000A-7350-4f3c-8081-5663EE0C6C49} - C:\Program Files (x86)\Microsoft Office\Office14\ONBttnIE.dll O9 - Extra button: (no name) - {5C106A59-CC3C-4caa-81A4-6D909B5ACE23} - C:\Program Files (x86)\KeyScrambler\KeyScramblerIE.dll O9 - Extra 'Tools' menuitem: &KeyScrambler Options - {5C106A59-CC3C-4caa-81A4-6D909B5ACE23} - C:\Program Files (x86)\KeyScrambler\KeyScramblerIE.dll O9 - Extra button: Notes &liées OneNote - {789FE86F-6FC4-46A1-9849-EDE0DB0C95CA} - C:\Program Files (x86)\Microsoft Office\Office14\ONBttnIELinkedNotes.dll O9 - Extra 'Tools' menuitem: Notes &liées OneNote - {789FE86F-6FC4-46A1-9849-EDE0DB0C95CA} - C:\Program Files (x86)\Microsoft Office\Office14\ONBttnIELinkedNotes.dll O9 - Extra button: URLs check - {CCF151D8-D089-449F-A5A4-D9909053F20F} - C:\Program Files (x86)\Kaspersky Lab\Kaspersky Anti-Virus 2013\IEExt\UrlAdvisor\klwtbbho.dll O11 - Options group: [ACCELERATED_GRAPHICS] Accelerated graphics O13 - Gopher Prefix: O18 - Filter hijack: text/xml - {807573E5-5146-11D5-A672-00B0D022E945} - C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLMF.DLL O23 - Service: Adobe Acrobat Update Service (AdobeARMservice) - Adobe Systems Incorporated - C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe O23 - Service: Adobe Flash Player Update Service (AdobeFlashPlayerUpdateSvc) - Adobe Systems Incorporated - C:\Windows\SysWOW64\Macromed\Flash\FlashPlayerUpdateService.exe O23 - Service: @%SystemRoot%\system32\Alg.exe,-112 (ALG) - Unknown owner - C:\Windows\System32\alg.exe (file missing) O23 - Service: Apple Mobile Device - Apple Inc. - C:\Program Files (x86)\Common Files\Apple\Mobile Device Support\AppleMobileDeviceService.exe O23 - Service: ASUS Com Service (asComSvc) - Unknown owner - C:\Program Files (x86)\ASUS\AXSP\1.00.19\atkexComSvc.exe O23 - Service: ASUS HM Com Service (asHmComSvc) - ASUSTeK Computer Inc. - C:\Program Files (x86)\ASUS\AAHM\1.00.20\aaHMSvc.exe O23 - Service: ASUS System Control Service (AsSysCtrlService) - ASUSTeK Computer Inc. - C:\Program Files (x86)\ASUS\AsSysCtrlService\1.00.13\AsSysCtrlService.exe O23 - Service: Kaspersky Anti-Virus Service (AVP) - Kaspersky Lab ZAO - C:\Program Files (x86)\Kaspersky Lab\Kaspersky Anti-Virus 2013\avp.exe O23 - Service: Service Bonjour (Bonjour Service) - Apple Inc. - C:\Program Files\Bonjour\mDNSResponder.exe O23 - Service: @%SystemRoot%\system32\efssvc.dll,-100 (EFS) - Unknown owner - C:\Windows\System32\lsass.exe (file missing) O23 - Service: @%systemroot%\system32\fxsresm.dll,-118 (Fax) - Unknown owner - C:\Windows\system32\fxssvc.exe (file missing) O23 - Service: FileZilla Server FTP server (FileZilla Server) - FileZilla Project - C:\Program Files (x86)\FileZilla Server\FileZilla Server.exe O23 - Service: Futuremark SystemInfo Service - Futuremark Corporation - C:\Program Files (x86)\Futuremark\Futuremark SystemInfo\FMSISvc.exe O23 - Service: Service Google Update (gupdate) (gupdate) - Google Inc. - C:\Program Files (x86)\Google\Update\GoogleUpdate.exe O23 - Service: Service Google Update (gupdatem) (gupdatem) - Google Inc. - C:\Program Files (x86)\Google\Update\GoogleUpdate.exe O23 - Service: Intel® Rapid Storage Technology (IAStorDataMgrSvc) - Intel Corporation - C:\Program Files (x86)\Intel\Intel® Rapid Storage Technology\IAStorDataMgrSvc.exe O23 - Service: Intel® Capability Licensing Service Interface - Intel® Corporation - C:\Program Files\Intel\iCLS Client\HeciServer.exe O23 - Service: Service de l’iPod (iPod Service) - Apple Inc. - C:\Program Files\iPod\bin\iPodService.exe O23 - Service: Intel® Dynamic Application Loader Host Interface Service (jhi_service) - Intel Corporation - C:\Program Files (x86)\Intel\Intel® Management Engine Components\DAL\jhi_service.exe O23 - Service: @keyiso.dll,-100 (KeyIso) - Unknown owner - C:\Windows\system32\lsass.exe (file missing) O23 - Service: Intel® Management and Security Application Local Management Service (LMS) - Intel Corporation - C:\Program Files (x86)\Intel\Intel® Management Engine Components\LMS\LMS.exe O23 - Service: Ma-Config Service (maconfservice) - CybelSoft - C:\Program Files\ma-config.com\x64\maconfservice.exe O23 - Service: MBAMScheduler - Malwarebytes Corporation - C:\Program Files (x86)\Malwarebytes' Anti-Malware\mbamscheduler.exe O23 - Service: MBAMService - Malwarebytes Corporation - C:\Program Files (x86)\Malwarebytes' Anti-Malware\mbamservice.exe O23 - Service: Mozilla Maintenance Service (MozillaMaintenance) - Mozilla Foundation - C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe O23 - Service: @comres.dll,-2797 (MSDTC) - Unknown owner - C:\Windows\System32\msdtc.exe (file missing) O23 - Service: @%SystemRoot%\System32\netlogon.dll,-102 (Netlogon) - Unknown owner - C:\Windows\system32\lsass.exe (file missing) O23 - Service: NetLimiter (nlsvc) - Locktime Software - C:\Program Files (x86)\NetLimiter 2 Pro\nlsvc.exe O23 - Service: Performance Service (nTuneService) - NVIDIA - C:\Program Files (x86)\NVIDIA Corporation\nTune\nTuneService.exe O23 - Service: NVIDIA Display Driver Service (nvsvc) - Unknown owner - C:\Windows\system32\nvvsvc.exe (file missing) O23 - Service: NVIDIA Update Service Daemon (nvUpdatusService) - NVIDIA Corporation - C:\Program Files (x86)\NVIDIA Corporation\NVIDIA Update Core\daemonu.exe O23 - Service: PnkBstrA - Unknown owner - C:\Windows\system32\PnkBstrA.exe O23 - Service: PnkBstrB - Unknown owner - C:\Windows\system32\PnkBstrB.exe O23 - Service: @%systemroot%\system32\psbase.dll,-300 (ProtectedStorage) - Unknown owner - C:\Windows\system32\lsass.exe (file missing) O23 - Service: ProtexisLicensing - Unknown owner - C:\Windows\SysWOW64\PSIService.exe O23 - Service: Protexis Licensing V2 (PSI_SVC_2) - Protexis Inc. - c:\Program Files (x86)\Common Files\Protexis\License Service\PsiService_2.exe O23 - Service: @%systemroot%\system32\Locator.exe,-2 (RpcLocator) - Unknown owner - C:\Windows\system32\locator.exe (file missing) O23 - Service: @%SystemRoot%\system32\samsrv.dll,-1 (SamSs) - Unknown owner - C:\Windows\system32\lsass.exe (file missing) O23 - Service: @%SystemRoot%\system32\snmptrap.exe,-3 (SNMPTRAP) - Unknown owner - C:\Windows\System32\snmptrap.exe (file missing) O23 - Service: @%systemroot%\system32\spoolsv.exe,-1 (Spooler) - Unknown owner - C:\Windows\System32\spoolsv.exe (file missing) O23 - Service: @%SystemRoot%\system32\sppsvc.exe,-101 (sppsvc) - Unknown owner - C:\Windows\system32\sppsvc.exe (file missing) O23 - Service: Steam Client Service - Valve Corporation - C:\Program Files (x86)\Common Files\Steam\SteamService.exe O23 - Service: NVIDIA Stereoscopic 3D Driver Service (Stereo Service) - NVIDIA Corporation - C:\Program Files (x86)\NVIDIA Corporation\3D Vision\nvSCPAPISvr.exe O23 - Service: SwitchBoard - Adobe Systems Incorporated - C:\Program Files (x86)\Common Files\Adobe\SwitchBoard\SwitchBoard.exe O23 - Service: TeamViewer 7 (TeamViewer7) - TeamViewer GmbH - C:\Program Files (x86)\TeamViewer\Version7\TeamViewer_Service.exe O23 - Service: @%SystemRoot%\system32\ui0detect.exe,-101 (UI0Detect) - Unknown owner - C:\Windows\system32\UI0Detect.exe (file missing) O23 - Service: Intel® Management and Security Application User Notification Service (UNS) - Intel Corporation - C:\Program Files (x86)\Intel\Intel® Management Engine Components\UNS\UNS.exe O23 - Service: Update Center Service (UpdateCenterService) - NVIDIA - C:\Program Files (x86)\NVIDIA Corporation\System Update\UpdateCenterService.exe O23 - Service: @%SystemRoot%\system32\vaultsvc.dll,-1003 (VaultSvc) - Unknown owner - C:\Windows\system32\lsass.exe (file missing) O23 - Service: @%SystemRoot%\system32\vds.exe,-100 (vds) - Unknown owner - C:\Windows\System32\vds.exe (file missing) O23 - Service: @%systemroot%\system32\vssvc.exe,-102 (VSS) - Unknown owner - C:\Windows\system32\vssvc.exe (file missing) O23 - Service: @%SystemRoot%\system32\Wat\WatUX.exe,-601 (WatAdminSvc) - Unknown owner - C:\Windows\system32\Wat\WatAdminSvc.exe (file missing) O23 - Service: @%systemroot%\system32\wbengine.exe,-104 (wbengine) - Unknown owner - C:\Windows\system32\wbengine.exe (file missing) O23 - Service: @%Systemroot%\system32\wbem\wmiapsrv.exe,-110 (wmiApSrv) - Unknown owner - C:\Windows\system32\wbem\WmiApSrv.exe (file missing) O23 - Service: @%PROGRAMFILES%\Windows Media Player\wmpnetwk.exe,-101 (WMPNetworkSvc) - Unknown owner - C:\Program Files (x86)\Windows Media Player\wmpnetwk.exe (file missing) -- End of file - 14258 bytes Ach.
  3. bonjour à tous, voila, j'ai une vieille 8800gt o/c et j'aimerais changer pour une gtx295, je voudrais savoir si mon alimentation actuelle est suffisante pour alimenter la bete. Merci de vos reponses CM: Asus m4A785TM PROC: AMD phenom 2 X4 945 + ventirad Noctua nh u9b se2 (o/c 3.01Ghz =>3.6ghz actuellement) HDD en IDE 5200trs/min 250Gb Boitier: antec nine hundred two RAM: 2X4Gb Corsair Vengeance 1600 Graveur DVD +/- RW CG: Nvidia Gtx295 Alim: Trust 570W Pro PSU Dual fan Donc voila, j'aimerais juste l'avis de professionel pour savoir si mon alimentation Trust pourra faire tourner ma gtx295 avec le reste de ma config sans risque de tout griller. Merci d'avance,
  4. Salut tomtom95 et merci pour ton aide précieuse voici le rapport zhpfix: Windows Registry Editor Version 5.00 [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center] "cval"=dword:00000000 "AntiVirusDisableNotify"="0" "AntiVirusOverride"=dword:00000001 "FirewallDisableNotify"=dword:00000000 "FirewallOverride"=dword:00000001 "FirstRunDisabled"=dword:00000001 "UpdatesDisableNotify"="0" "AntiSpyWareDisableNotify"=dword:00000001 "UacDisableNotify"=dword:00000001 [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Monitoring] [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Svc] "VistaSp1"=hex(b):19,0d,da,5d,3f,04,ca,01 "AntiVirusOverride"=dword:00000000 "AntiSpywareOverride"=dword:00000000 "FirewallOverride"=dword:00000000 Windows Registry Editor Version 5.00 [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center] "cval"=dword:00000000 "AntiVirusDisableNotify"="0" "AntiVirusOverride"=dword:00000000 "FirewallDisableNotify"=dword:00000000 "FirewallOverride"=dword:00000001 "FirstRunDisabled"=dword:00000001 "UpdatesDisableNotify"="0" "AntiSpyWareDisableNotify"=dword:00000001 "UacDisableNotify"=dword:00000001 [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Monitoring] [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Svc] "VistaSp1"=hex(b):19,0d,da,5d,3f,04,ca,01 "AntiVirusOverride"=dword:00000000 "AntiSpywareOverride"=dword:00000000 "FirewallOverride"=dword:00000000 Windows Registry Editor Version 5.00 [HKEY_CURRENT_USER\Software\TBSB07458] [HKEY_CURRENT_USER\Software\TBSB07458\Toolbar] "basis"="" "additional_xml"="" "Height"=dword:00000016 "toolbar_id"="{1F8B60B2-4C93-4EA5-9325-E30DF4CA1BB9}" "mac_id"="000cf66d2ab3" "CurrentLayout"=dword:00000000 "SendReports"=dword:00000000 "ToolbarSkin"="" "OpenNew"="0" "AutoComplete"="1" "KeepHistory"="1" "RunSearchAutomatically"="1" "RunSearchDragAutomatically"="1" "DescriptiveText"="1" "ShowHighlightButton"="1" "ShowFindButtons"="0" "UpdateAutomatically"="0" "OldAssitant1"="http://roonic.com/results.html?q=%s&sa=Search&cx=partner-pub-0345395751421741:y8d2vrh2u6t&cof=FORID:10&ie=UTF-8"'>http://roonic.com/results.html?q=%s&sa=Search&cx=partner-pub-0345395751421741:y8d2vrh2u6t&cof=FORID:10&ie=UTF-8"'>http://roonic.com/results.html?q=%s&sa=Search&cx=partner-pub-0345395751421741:y8d2vrh2u6t&cof=FORID:10&ie=UTF-8"'>http://roonic.com/results.html?q=%s&sa=Search&cx=partner-pub-0345395751421741:y8d2vrh2u6t&cof=FORID:10&ie=UTF-8" "OldAssitant2"="http://roonic.com/results.html?q=%s&sa=Search&cx=partner-pub-0345395751421741:y8d2vrh2u6t&cof=FORID:10&ie=UTF-8" "OldAssitant3"="http://roonic.com/results.html?q=%s&sa=Search&cx=partner-pub-0345395751421741:y8d2vrh2u6t&cof=FORID:10&ie=UTF-8" "OldAssitant4"="http://roonic.com/results.html?q=%s&sa=Search&cx=partner-pub-0345395751421741:y8d2vrh2u6t&cof=FORID:10&ie=UTF-8" "OldAssitant5"="no" "AutoSearch"="http://www.gooofullsearch.com/google?cx=partner-pub-6446514721158383:do3tst-6a03&cof=FORID%3A10&ie=UTF-8&hl=es&q=%s" "AutoWild"="" "Toolbar Path"="C:\\Users\\Jonathan\\AppData\\LocalLow\\Toolbar4\\{C86FF9FA-AEED-451B-A9CC-39A53173AE2E}\\" "blockPopups"=dword:00000000 "updateXML"="1" "TBShow"="1" "TBBreak"=dword:00000001 "TBPos"=dword:00000000 "firstTime"="0" "CountOS"=dword:00000000 "LastQAScriptCheckTime"=dword:4e1782b7 "TBWidth"=dword:0000053e [HKEY_CURRENT_USER\Software\TBSB07458\Toolbar\History] [HKEY_CURRENT_USER\Software\TBSB07458\Toolbar\History\tbs_combo_001441] [HKEY_CURRENT_USER\Software\TBSB07458\Toolbar\tb_items] "tbs_button_013854"=dword:00000001 "tbs_button_031659"=dword:00000001 "tbs_combo_001441"=dword:00000001 "tbs_space_028391"=dword:00000001 "tbs_button_006887"=dword:00000001 "tbs_separator_017060"=dword:00000001 "tbs_banner_004234"=dword:00000001 "tbs_separator_025955"=dword:00000001 "tbs_button_032196"=dword:00000001 "tbs_separator_001799"=dword:00000001 "tbs_banner_016076"=dword:00000001 "tbs_separator_021618"=dword:00000001 "tbs_button_017740"=dword:00000001 "tbs_separator_023259"=dword:00000001 "tbs_button_027417"=dword:00000001 "tbs_button_008831"=dword:00000001 Windows Registry Editor Version 5.00 [HKEY_CURRENT_USER\Software\cacaoweb] @="C:\\Users\\Jonathan\\AppData\\Roaming\\cacaoweb\\cacaoweb.exe" Windows Registry Editor Version 5.00 [HKEY_LOCAL_MACHINE\Software\MediaGet] @="C:\\Users\\Jonathan\\AppData\\Local\\MediaGet2\\mediaget.exe" Windows Registry Editor Version 5.00 [HKEY_LOCAL_MACHINE\Software\Classes\urlsearchhook.toolbarurlsearchhook] @="ToolbarURLSearchHook Class" [HKEY_LOCAL_MACHINE\Software\Classes\urlsearchhook.toolbarurlsearchhook\CLSID] @="{CA3EB689-8F09-4026-AA10-B9534C691CE0}" Windows Registry Editor Version 5.00 [HKEY_LOCAL_MACHINE\Software\Classes\urlsearchhook.toolbarurlsearchhook.1] @="ToolbarURLSearchHook Class" [HKEY_LOCAL_MACHINE\Software\Classes\urlsearchhook.toolbarurlsearchhook.1\CLSID] @="{CA3EB689-8F09-4026-AA10-B9534C691CE0}" Windows Registry Editor Version 5.00 [HKEY_LOCAL_MACHINE\Software\Classes\Interface\{2a42d13c-d427-4787-821b-cf6973855778}] @="IPosBHO" [HKEY_LOCAL_MACHINE\Software\Classes\Interface\{2a42d13c-d427-4787-821b-cf6973855778}\ProxyStubClsid] @="{00020424-0000-0000-C000-000000000046}" [HKEY_LOCAL_MACHINE\Software\Classes\Interface\{2a42d13c-d427-4787-821b-cf6973855778}\ProxyStubClsid32] @="{00020424-0000-0000-C000-000000000046}" [HKEY_LOCAL_MACHINE\Software\Classes\Interface\{2a42d13c-d427-4787-821b-cf6973855778}\TypeLib] @="{EC4085F2-8DB3-45A6-AD0B-CA289F3C5D7E}" "Version"="1.0" Windows Registry Editor Version 5.00 [HKEY_LOCAL_MACHINE\Software\Classes\TypeLib\{2D5E2D34-BED5-4B9F-9793-A31E26E6806E}] [HKEY_LOCAL_MACHINE\Software\Classes\TypeLib\{2D5E2D34-BED5-4B9F-9793-A31E26E6806E}\5.0] @="Redemption Outlook and MAPI COM Library" [HKEY_LOCAL_MACHINE\Software\Classes\TypeLib\{2D5E2D34-BED5-4B9F-9793-A31E26E6806E}\5.0\0] [HKEY_LOCAL_MACHINE\Software\Classes\TypeLib\{2D5E2D34-BED5-4B9F-9793-A31E26E6806E}\5.0\0\win32] @="C:\\Program Files\\AVAST Software\\Avast\\redemption.dll" [HKEY_LOCAL_MACHINE\Software\Classes\TypeLib\{2D5E2D34-BED5-4B9F-9793-A31E26E6806E}\5.0\FLAGS] @="0" [HKEY_LOCAL_MACHINE\Software\Classes\TypeLib\{2D5E2D34-BED5-4B9F-9793-A31E26E6806E}\5.0\HELPDIR] @="C:\\Program Files\\AVAST Software\\Avast\\" Windows Registry Editor Version 5.00 [HKEY_LOCAL_MACHINE\Software\Classes\Interface\{3d8478aa-7b88-48a9-8bcb-b85d594411ec}] @="IToolbarObj" [HKEY_LOCAL_MACHINE\Software\Classes\Interface\{3d8478aa-7b88-48a9-8bcb-b85d594411ec}\ProxyStubClsid] @="{00020424-0000-0000-C000-000000000046}" [HKEY_LOCAL_MACHINE\Software\Classes\Interface\{3d8478aa-7b88-48a9-8bcb-b85d594411ec}\ProxyStubClsid32] @="{00020424-0000-0000-C000-000000000046}" [HKEY_LOCAL_MACHINE\Software\Classes\Interface\{3d8478aa-7b88-48a9-8bcb-b85d594411ec}\TypeLib] @="{EC4085F2-8DB3-45A6-AD0B-CA289F3C5D7E}" "Version"="1.0" Windows Registry Editor Version 5.00 [HKEY_LOCAL_MACHINE\Software\Classes\TypeLib\{4509D3CC-B642-4745-B030-645B79522C6D}] [HKEY_LOCAL_MACHINE\Software\Classes\TypeLib\{4509D3CC-B642-4745-B030-645B79522C6D}\1.0] @="URLSearchHook 1.0 Type Library" [HKEY_LOCAL_MACHINE\Software\Classes\TypeLib\{4509D3CC-B642-4745-B030-645B79522C6D}\1.0\0] [HKEY_LOCAL_MACHINE\Software\Classes\TypeLib\{4509D3CC-B642-4745-B030-645B79522C6D}\1.0\0\win32] @="C:\\Program Files\\Audiosurf\\mybarnsm3028.tmp\\tbhelper.dll" [HKEY_LOCAL_MACHINE\Software\Classes\TypeLib\{4509D3CC-B642-4745-B030-645B79522C6D}\1.0\FLAGS] @="0" [HKEY_LOCAL_MACHINE\Software\Classes\TypeLib\{4509D3CC-B642-4745-B030-645B79522C6D}\1.0\HELPDIR] @="C:\\Program Files\\Audiosurf\\mybarnsm3028.tmp" Windows Registry Editor Version 5.00 [HKEY_LOCAL_MACHINE\Software\Classes\Interface\{4897bba6-48d9-468c-8efa-846275d7701b}] @="IToolbarURLSearchHook" [HKEY_LOCAL_MACHINE\Software\Classes\Interface\{4897bba6-48d9-468c-8efa-846275d7701b}\ProxyStubClsid] @="{00020424-0000-0000-C000-000000000046}" [HKEY_LOCAL_MACHINE\Software\Classes\Interface\{4897bba6-48d9-468c-8efa-846275d7701b}\ProxyStubClsid32] @="{00020424-0000-0000-C000-000000000046}" [HKEY_LOCAL_MACHINE\Software\Classes\Interface\{4897bba6-48d9-468c-8efa-846275d7701b}\TypeLib] @="{4509D3CC-B642-4745-B030-645B79522C6D}" "Version"="1.0" Windows Registry Editor Version 5.00 [HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer] "NoDriveTypeAutoRun"=dword:00000091 "LinkResolveIgnoreLinkInfo"=dword:00000001 "NoResolveSearch"=dword:00000001 "NoResolveTrack"=dword:00000001 "NoInternetOpenWith"=dword:00000001 Windows Registry Editor Version 5.00 [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{64182481-4F71-486b-A045-B233BD0DA8FC}] [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{64182481-4F71-486b-A045-B233BD0DA8FC}\iexplore] "Type"=dword:00000003 "Flags"=dword:00000000 "Count"=dword:00000009 "Time"=hex:db,07,05,00,04,00,0c,00,0c,00,08,00,12,00,f4,00 "LoadTime"=dword:00000061 Windows Registry Editor Version 5.00 [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Settings\{64182481-4F71-486b-A045-B233BD0DA8FC}] "VerCache"=hex:00,c4,69,a8,23,75,cb,01,00,c4,69,a8,23,75,cb,01,00,00,00,00,00,\ 00,04,00,04,00,01,00,00,00,11,00,04,00,01,00,00,00,11,00,09,04,00,00 Windows Registry Editor Version 5.00 [HKEY_LOCAL_MACHINE\Software\Classes\Interface\{A9379648-F6EB-4F65-A624-1C10411A15D0}] @="IescrtHlpr" [HKEY_LOCAL_MACHINE\Software\Classes\Interface\{A9379648-F6EB-4F65-A624-1C10411A15D0}\ProxyStubClsid] @="{00020424-0000-0000-C000-000000000046}" [HKEY_LOCAL_MACHINE\Software\Classes\Interface\{A9379648-F6EB-4F65-A624-1C10411A15D0}\ProxyStubClsid32] @="{00020424-0000-0000-C000-000000000046}" [HKEY_LOCAL_MACHINE\Software\Classes\Interface\{A9379648-F6EB-4F65-A624-1C10411A15D0}\TypeLib] @="{09C554C3-109B-483C-A06B-F14172F1A947}" "Version"="1.0" Windows Registry Editor Version 5.00 [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{DB4E9724-F518-4dfd-9C7C-78B52103CAB9}] [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{DB4E9724-F518-4dfd-9C7C-78B52103CAB9}\iexplore] "Type"=dword:00000002 "Flags"=dword:00000000 "Count"=dword:00000013 "Time"=hex:db,07,05,00,04,00,0c,00,0c,00,08,00,12,00,8c,00 "LoadTime"=dword:00000039 Windows Registry Editor Version 5.00 [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Settings\{DB4E9724-F518-4dfd-9C7C-78B52103CAB9}] "VerCache"=hex:00,c4,69,a8,23,75,cb,01,00,c4,69,a8,23,75,cb,01,00,00,00,00,00,\ 50,03,00,04,00,01,00,00,00,11,00,04,00,01,00,00,00,11,00,09,04,00,00 Windows Registry Editor Version 5.00 [HKEY_LOCAL_MACHINE\Software\Classes\Interface\{F16AB1DB-15C0-4456-A29E-4DF24FB9E3D2}] @="IescrtBtn" [HKEY_LOCAL_MACHINE\Software\Classes\Interface\{F16AB1DB-15C0-4456-A29E-4DF24FB9E3D2}\ProxyStubClsid] @="{00020424-0000-0000-C000-000000000046}" [HKEY_LOCAL_MACHINE\Software\Classes\Interface\{F16AB1DB-15C0-4456-A29E-4DF24FB9E3D2}\ProxyStubClsid32] @="{00020424-0000-0000-C000-000000000046}" [HKEY_LOCAL_MACHINE\Software\Classes\Interface\{F16AB1DB-15C0-4456-A29E-4DF24FB9E3D2}\TypeLib] @="{09C554C3-109B-483C-A06B-F14172F1A947}" "Version"="1.0" Windows Registry Editor Version 5.00 [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{FCBCCB87-9224-4B8D-B117-F56D924BEB18}] [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{FCBCCB87-9224-4B8D-B117-F56D924BEB18}\iexplore] "Type"=dword:00000003 "Flags"=dword:00000004 "Count"=dword:00000089 "Time"=hex:db,07,07,00,04,00,0e,00,11,00,2d,00,29,00,54,01 "LoadTime"=dword:0000001a "Blocked"=dword:00000001 Windows Registry Editor Version 5.00 [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Settings\{FCBCCB87-9224-4B8D-B117-F56D924BEB18}] "VerCache"=hex:00,0f,5d,81,ff,0e,cb,01,00,0f,5d,81,ff,0e,cb,01,00,00,00,00,00,\ bc,27,00,02,00,04,00,27,00,00,00,02,00,04,00,27,00,00,00,09,04,00,00 "Flags"=dword:00000001 "Version"="*" Windows Registry Editor Version 5.00 [HKEY_LOCAL_MACHINE\Software\Classes\CLSID\{FCBCCB87-9224-4B8D-B117-F56D924BEB18}] @="TBSB07458 Class" [HKEY_LOCAL_MACHINE\Software\Classes\CLSID\{FCBCCB87-9224-4B8D-B117-F56D924BEB18}\InprocServer32] @="C:\\Program Files\\Audiosurf\\mybarnsm3028.tmp\\tbcore3.dll" "ThreadingModel"="Apartment" [HKEY_LOCAL_MACHINE\Software\Classes\CLSID\{FCBCCB87-9224-4B8D-B117-F56D924BEB18}\ProgID] @="Toolbar3.TBSB07458.1" [HKEY_LOCAL_MACHINE\Software\Classes\CLSID\{FCBCCB87-9224-4B8D-B117-F56D924BEB18}\Programmable] [HKEY_LOCAL_MACHINE\Software\Classes\CLSID\{FCBCCB87-9224-4B8D-B117-F56D924BEB18}\TypeLib] @="{EC4085F2-8DB3-45a6-AD0B-CA289F3C5D7E}" [HKEY_LOCAL_MACHINE\Software\Classes\CLSID\{FCBCCB87-9224-4B8D-B117-F56D924BEB18}\VersionIndependentProgID] @="Toolbar3.TBSB07458" Windows Registry Editor Version 5.00 [HKEY_LOCAL_MACHINE\Software\Microsoft\Shared Tools\MSConfig\startupreg\cacaoweb] "key"="SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Run" "item"="cacaoweb" "hkey"="HKCU" "command"="\"C:\\Users\\Jonathan\\AppData\\Roaming\\cacaoweb\\cacaoweb.exe\" -noplayer" "inimapping"="0" "YEAR"=dword:000007db "MONTH"=dword:00000005 "DAY"=dword:00000010 "HOUR"=dword:00000015 "MINUTE"=dword:00000035 "SECOND"=dword:0000000c Windows Registry Editor Version 5.00 [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{761497BB-D6F0-462C-B6EB-D4DAF1D92D43}] "NoExplorer"=dword:00000001 Windows Registry Editor Version 5.00 [HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c9e4f3da-7a89-11e0-9021-90e6ba3674ae}] [HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c9e4f3da-7a89-11e0-9021-90e6ba3674ae}\Name] "SetWorkingDirectoryFromTarget"="" @="SHIFT 2 UNLEASHED" [HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c9e4f3da-7a89-11e0-9021-90e6ba3674ae}\shell] @="AutoRun" [HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c9e4f3da-7a89-11e0-9021-90e6ba3674ae}\shell\Autoplay] "MUIVerb"="@shell32.dll,-8507" [HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c9e4f3da-7a89-11e0-9021-90e6ba3674ae}\shell\Autoplay\DropTarget] "CLSID"="{F26A669A-BCBB-4E37-ABF9-7325DA15F931}" [HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c9e4f3da-7a89-11e0-9021-90e6ba3674ae}\shell\AutoRun] @="Installer ou exécuter un programme depuis son support" "SetWorkingDirectoryFromTarget"="" [HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c9e4f3da-7a89-11e0-9021-90e6ba3674ae}\shell\AutoRun\command] @="G:\\setup\\rsrc\\Autorun.exe" [HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c9e4f3da-7a89-11e0-9021-90e6ba3674ae}\shell\dinstall] "SetWorkingDirectoryFromTarget"="" @="DirectX®..." [HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c9e4f3da-7a89-11e0-9021-90e6ba3674ae}\shell\dinstall\command] @="G:\\Directx\\dxsetup.exe" [HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c9e4f3da-7a89-11e0-9021-90e6ba3674ae}\_Autorun] [HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c9e4f3da-7a89-11e0-9021-90e6ba3674ae}\_Autorun\DefaultIcon] @="G:\\Setup\\rsrc\\CoD4.ico" Windows Registry Editor Version 5.00 [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Shared Tools\MSConfig\startupreg\Babylon Client] "key"="SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Run" "item"="Babylon Client" "hkey"="HKLM" "command"="C:\\Program Files\\Babylon\\Babylon-Pro\\Babylon.exe -AutoStart" "inimapping"="0" "YEAR"=dword:000007db "MONTH"=dword:00000005 "DAY"=dword:00000010 "HOUR"=dword:00000015 "MINUTE"=dword:00000035 "SECOND"=dword:0000000c Windows Registry Editor Version 5.00 [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Shared Tools\MSConfig\startupreg\MediaGet2] "key"="SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Run" "item"="MediaGet2" "hkey"="HKCU" "command"="C:\\Users\\Jonathan\\AppData\\Local\\MediaGet2\\mediaget.exe --minimized" "inimapping"="0" "YEAR"=dword:000007db "MONTH"=dword:00000005 "DAY"=dword:00000010 "HOUR"=dword:00000015 "MINUTE"=dword:00000035 "SECOND"=dword:0000000c Windows Registry Editor Version 5.00 [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Shared Tools\MSConfig\startupreg\Windows Update] "key"="SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Run" "item"="Windows Update" "hkey"="HKCU" "command"="C:\\Users\\Jonathan\\AppData\\Local\\Temp\\Keygen.exe" "inimapping"="0" "YEAR"=dword:000007db "MONTH"=dword:00000006 "DAY"=dword:0000000a "HOUR"=dword:00000015 "MINUTE"=dword:00000016 "SECOND"=dword:00000030 Windows Registry Editor Version 5.00 [HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\SearchScopes\{0D7562AE-8EF6-416d-A838-AB665251703A}] "URL"="http://start.facemoods.com/?a=ddrnw&s={searchTerms}&f=4" "DisplayName"="Facemoods Search" Windows Registry Editor Version 5.00 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\FirewallRules] "SSTP-IN-TCP"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=6|LPort=443|App=System|[email protected],-35002|[email protected],-35003|[email protected],-35001|" "Netlogon-NamedPipe-In"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=6|LPort=445|App=System|[email protected],-1003|[email protected],-1006|[email protected],-1010|" "SNMPTRAP-In-UDP"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=17|Profile=Private|Profile=Public|LPort=162|RA4=LocalSubnet|RA6=LocalSubnet|App=%SystemRoot%\\system32\\snmptrap.exe|Svc=SNMPTRAP|[email protected],-7|[email protected],-8|[email protected],-3|" "SNMPTRAP-In-UDP-NoScope"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=17|Profile=Domain|LPort=162|App=%SystemRoot%\\system32\\snmptrap.exe|Svc=SNMPTRAP|[email protected],-7|[email protected],-8|[email protected],-3|" "WMP-In-UDP"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=17|App=%ProgramFiles%\\Windows Media Player\\wmplayer.exe|[email protected],-31003|[email protected],-31006|[email protected],-31002|" "WMP-Out-UDP"="v2.10|Action=Allow|Active=FALSE|Dir=Out|Protocol=17|App=%ProgramFiles%\\Windows Media Player\\wmplayer.exe|[email protected],-31007|[email protected],-31010|[email protected],-31002|" "WMP-Out-TCP"="v2.10|Action=Allow|Active=FALSE|Dir=Out|Protocol=6|App=%ProgramFiles%\\Windows Media Player\\wmplayer.exe|[email protected],-31011|[email protected],-31014|[email protected],-31002|" "WMPNSS-QWave-In-UDP-NoScope"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=17|Profile=Domain|LPort=2177|App=%SystemRoot%\\system32\\svchost.exe|Svc=Qwave|[email protected],-31253|[email protected],-31256|[email protected],-31252|" "WMPNSS-QWave-Out-UDP-NoScope"="v2.10|Action=Allow|Active=FALSE|Dir=Out|Protocol=17|Profile=Domain|RPort=2177|App=%SystemRoot%\\system32\\svchost.exe|Svc=Qwave|[email protected],-31257|[email protected],-31260|[email protected],-31252|" "WMPNSS-QWave-In-TCP-NoScope"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=6|Profile=Domain|LPort=2177|App=%SystemRoot%\\system32\\svchost.exe|Svc=Qwave|[email protected],-31261|[email protected],-31264|[email protected],-31252|" "WMPNSS-QWave-Out-TCP-NoScope"="v2.10|Action=Allow|Active=FALSE|Dir=Out|Protocol=6|Profile=Domain|RPort=2177|App=%SystemRoot%\\system32\\svchost.exe|Svc=Qwave|[email protected],-31265|[email protected],-31268|[email protected],-31252|" "WMPNSS-HTTPSTR-In-TCP-NoScope"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=6|Profile=Domain|LPort=10243|App=System|[email protected],-31285|[email protected],-31288|[email protected],-31252|" "WMPNSS-HTTPSTR-Out-TCP-NoScope"="v2.10|Action=Allow|Active=FALSE|Dir=Out|Protocol=6|Profile=Domain|RPort=10243|App=System|[email protected],-31289|[email protected],-31292|[email protected],-31252|" "WMPNSS-WMP-In-UDP-NoScope"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=17|Profile=Domain|App=%PROGRAMFILES%\\Windows Media Player\\wmplayer.exe|[email protected],-31293|[email protected],-31296|[email protected],-31252|" "WMPNSS-WMP-Out-UDP-NoScope"="v2.10|Action=Allow|Active=FALSE|Dir=Out|Protocol=17|Profile=Domain|App=%PROGRAMFILES%\\Windows Media Player\\wmplayer.exe|[email protected],-31297|[email protected],-31300|[email protected],-31252|" "WMPNSS-WMP-Out-TCP-NoScope"="v2.10|Action=Allow|Active=FALSE|Dir=Out|Protocol=6|Profile=Domain|App=%PROGRAMFILES%\\Windows Media Player\\wmplayer.exe|[email protected],-31301|[email protected],-31304|[email protected],-31252|" "WMPNSS-In-UDP-NoScope"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=17|Profile=Domain|App=%PROGRAMFILES%\\Windows Media Player\\wmpnetwk.exe|[email protected],-31305|[email protected],-31308|[email protected],-31252|" "WMPNSS-Out-UDP-NoScope"="v2.10|Action=Allow|Active=FALSE|Dir=Out|Protocol=17|Profile=Domain|App=%PROGRAMFILES%\\Windows Media Player\\wmpnetwk.exe|[email protected],-31309|[email protected],-31312|[email protected],-31252|" "WMPNSS-In-TCP-NoScope"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=6|Profile=Domain|App=%PROGRAMFILES%\\Windows Media Player\\wmpnetwk.exe|[email protected],-31313|[email protected],-31316|[email protected],-31252|" "WMPNSS-Out-TCP-NoScope"="v2.10|Action=Allow|Active=FALSE|Dir=Out|Protocol=6|Profile=Domain|App=%PROGRAMFILES%\\Windows Media Player\\wmpnetwk.exe|[email protected],-31317|[email protected],-31320|[email protected],-31252|" "WMPNSS-QWave-In-UDP"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=17|Profile=Private|Profile=Public|LPort=2177|RA4=LocalSubnet|RA6=LocalSubnet|App=%SystemRoot%\\system32\\svchost.exe|Svc=Qwave|[email protected],-31253|[email protected],-31256|[email protected],-31252|" "WMPNSS-QWave-Out-UDP"="v2.10|Action=Allow|Active=FALSE|Dir=Out|Protocol=17|Profile=Private|Profile=Public|RPort=2177|RA4=LocalSubnet|RA6=LocalSubnet|App=%SystemRoot%\\system32\\svchost.exe|Svc=Qwave|[email protected],-31257|[email protected],-31260|[email protected],-31252|" "WMPNSS-QWave-In-TCP"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=6|Profile=Private|Profile=Public|LPort=2177|RA4=LocalSubnet|RA6=LocalSubnet|App=%SystemRoot%\\system32\\svchost.exe|Svc=Qwave|[email protected],-31261|[email protected],-31264|[email protected],-31252|" "WMPNSS-QWave-Out-TCP"="v2.10|Action=Allow|Active=FALSE|Dir=Out|Protocol=6|Profile=Private|Profile=Public|RPort=2177|RA4=LocalSubnet|RA6=LocalSubnet|App=%SystemRoot%\\system32\\svchost.exe|Svc=Qwave|[email protected],-31265|[email protected],-31268|[email protected],-31252|" "WMPNSS-SSDPSrv-In-UDP"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=17|LPort=1900|RA4=LocalSubnet|RA6=LocalSubnet|App=%SystemRoot%\\system32\\svchost.exe|Svc=ssdpsrv|[email protected],-31269|[email protected],-31272|[email protected],-31252|" "WMPNSS-SSDPSrv-Out-UDP"="v2.10|Action=Allow|Active=FALSE|Dir=Out|Protocol=17|RPort=1900|RA4=LocalSubnet|RA6=LocalSubnet|App=%SystemRoot%\\system32\\svchost.exe|Svc=ssdpsrv|[email protected],-31273|[email protected],-31276|[email protected],-31252|" "WMPNSS-UPnPHost-In-TCP"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=6|LPort=2869|RA4=LocalSubnet|RA6=LocalSubnet|App=System|[email protected],-31277|[email protected],-31280|[email protected],-31252|" "WMPNSS-UPnPHost-Out-TCP"="v2.10|Action=Allow|Active=FALSE|Dir=Out|Protocol=6|RA4=LocalSubnet|RA6=LocalSubnet|App=System|[email protected],-31281|[email protected],-31284|[email protected],-31252|" "WMPNSS-HTTPSTR-In-TCP"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=6|Profile=Private|Profile=Public|LPort=10243|RA4=LocalSubnet|RA6=LocalSubnet|App=System|[email protected],-31285|[email protected],-31288|[email protected],-31252|" "WMPNSS-HTTPSTR-Out-TCP"="v2.10|Action=Allow|Active=FALSE|Dir=Out|Protocol=6|Profile=Private|Profile=Public|RPort=10243|RA4=LocalSubnet|RA6=LocalSubnet|App=System|[email protected],-31289|[email protected],-31292|[email protected],-31252|" "WMPNSS-WMP-In-UDP"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=17|Profile=Private|Profile=Public|RA4=LocalSubnet|RA6=LocalSubnet|App=%PROGRAMFILES%\\Windows Media Player\\wmplayer.exe|[email protected],-31293|[email protected],-31296|[email protected],-31252|" "WMPNSS-WMP-Out-UDP"="v2.10|Action=Allow|Active=FALSE|Dir=Out|Protocol=17|Profile=Private|Profile=Public|RA4=LocalSubnet|RA6=LocalSubnet|App=%PROGRAMFILES%\\Windows Media Player\\wmplayer.exe|[email protected],-31297|[email protected],-31300|[email protected],-31252|" "WMPNSS-WMP-Out-TCP"="v2.10|Action=Allow|Active=FALSE|Dir=Out|Protocol=6|Profile=Private|Profile=Public|RA4=LocalSubnet|RA6=LocalSubnet|App=%PROGRAMFILES%\\Windows Media Player\\wmplayer.exe|[email protected],-31301|[email protected],-31304|[email protected],-31252|" "WMPNSS-In-UDP"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=17|Profile=Private|Profile=Public|RA4=LocalSubnet|RA6=LocalSubnet|App=%PROGRAMFILES%\\Windows Media Player\\wmpnetwk.exe|[email protected],-31305|[email protected],-31308|[email protected],-31252|" "WMPNSS-Out-UDP"="v2.10|Action=Allow|Active=FALSE|Dir=Out|Protocol=17|Profile=Private|Profile=Public|RA4=LocalSubnet|RA6=LocalSubnet|App=%PROGRAMFILES%\\Windows Media Player\\wmpnetwk.exe|[email protected],-31309|[email protected],-31312|[email protected],-31252|" "WMPNSS-In-TCP"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=6|Profile=Private|Profile=Public|RA4=LocalSubnet|RA6=LocalSubnet|App=%PROGRAMFILES%\\Windows Media Player\\wmpnetwk.exe|[email protected],-31313|[email protected],-31316|[email protected],-31252|" "WMPNSS-Out-TCP"="v2.10|Action=Allow|Active=FALSE|Dir=Out|Protocol=6|Profile=Private|Profile=Public|RA4=LocalSubnet|RA6=LocalSubnet|App=%PROGRAMFILES%\\Windows Media Player\\wmpnetwk.exe|[email protected],-31317|[email protected],-31320|[email protected],-31252|" "WMPNSS-UPnP-Out-TCP"="v2.10|Action=Allow|Active=FALSE|Dir=Out|Protocol=6|RA4=LocalSubnet|RA6=LocalSubnet|App=%SystemRoot%\\system32\\svchost.exe|Svc=upnphost|[email protected],-31321|[email protected],-31322|[email protected],-31252|" "WMPNSS-RME-HTTP-In-TCP"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=6|Profile=Domain|Profile=Private|LPort=10245|App=System|[email protected],-31501|[email protected],-31502|[email protected],-31500|Edge=TRUE|Defer=App|" "Microsoft-Windows-HomeGroup-ProvSvc-TCP3587-In"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=6|Profile=Private|LPort=3587|RA4=LocalSubnet|RA6=LocalSubnet|App=%systemroot%\\system32\\svchost.exe|Svc=p2psvc|Name=@%systemroot%\\system32\\provsvc.dll,-200|Desc=@%systemroot%\\system32\\provsvc.dll,-201|EmbedCtxt=@%systemroot%\\system32\\provsvc.dll,-202|" "Microsoft-Windows-HomeGroup-ProvSvc-TCP3587-Out"="v2.10|Action=Allow|Active=FALSE|Dir=Out|Protocol=6|Profile=Private|RPort=3587|RA4=LocalSubnet|RA6=LocalSubnet|App=%systemroot%\\system32\\svchost.exe|Svc=p2psvc|Name=@%systemroot%\\system32\\provsvc.dll,-203|Desc=@%systemroot%\\system32\\provsvc.dll,-204|EmbedCtxt=@%systemroot%\\system32\\provsvc.dll,-202|" "Microsoft-Windows-HomeGroup-ProvSvc-UDP3540-In"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=17|Profile=Private|LPort=3540|RA4=LocalSubnet|RA6=LocalSubnet|App=%systemroot%\\system32\\svchost.exe|Svc=pnrpsvc|Name=@%systemroot%\\system32\\provsvc.dll,-205|Desc=@%systemroot%\\system32\\provsvc.dll,-206|EmbedCtxt=@%systemroot%\\system32\\provsvc.dll,-202|" "Microsoft-Windows-HomeGroup-ProvSvc-UDP3540-Out"="v2.10|Action=Allow|Active=FALSE|Dir=Out|Protocol=17|Profile=Private|RPort=3540|RA4=LocalSubnet|RA6=LocalSubnet|App=%systemroot%\\system32\\svchost.exe|Svc=pnrpsvc|Name=@%systemroot%\\system32\\provsvc.dll,-207|Desc=@%systemroot%\\system32\\provsvc.dll,-208|EmbedCtxt=@%systemroot%\\system32\\provsvc.dll,-202|" "Collab-P2PHost-In-TCP"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=6|App=%SystemRoot%\\system32\\p2phost.exe|[email protected],-32003|[email protected],-32006|[email protected],-32002|Edge=TRUE|Defer=App|" "Collab-P2PHost-Out-TCP"="v2.10|Action=Allow|Active=FALSE|Dir=Out|Protocol=6|App=%SystemRoot%\\system32\\p2phost.exe|[email protected],-32007|[email protected],-32010|[email protected],-32002|" "Collab-P2PHost-WSD-In-UDP"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=17|LPort=3702|RA4=LocalSubnet|RA6=LocalSubnet|App=%SystemRoot%\\system32\\p2phost.exe|[email protected],-32011|[email protected],-32014|[email protected],-32002|" "Collab-P2PHost-WSD-Out-UDP"="v2.10|Action=Allow|Active=FALSE|Dir=Out|Protocol=17|RPort=3702|RA4=LocalSubnet|RA6=LocalSubnet|App=%SystemRoot%\\system32\\p2phost.exe|[email protected],-32015|[email protected],-32018|[email protected],-32002|" "Collab-PNRP-In-UDP"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=17|LPort=3540|App=%SystemRoot%\\system32\\svchost.exe|Svc=PNRPSvc|[email protected],-32019|[email protected],-32022|[email protected],-32002|Edge=TRUE|Defer=App|" "Collab-PNRP-Out-UDP"="v2.10|Action=Allow|Active=FALSE|Dir=Out|Protocol=17|RPort=3540|App=%SystemRoot%\\system32\\svchost.exe|Svc=PNRPSvc|[email protected],-32023|[email protected],-32026|[email protected],-32002|" "Collab-PNRP-SSDPSrv-In-UDP"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=17|LPort=1900|RA4=LocalSubnet|RA6=LocalSubnet|App=%SystemRoot%\\system32\\svchost.exe|Svc=Ssdpsrv|[email protected],-32027|[email protected],-32030|[email protected],-32002|" "Collab-PNRP-SSDPSrv-Out-UDP"="v2.10|Action=Allow|Active=FALSE|Dir=Out|Protocol=17|RPort=1900|RA4=LocalSubnet|RA6=LocalSubnet|App=%SystemRoot%\\system32\\svchost.exe|Svc=Ssdpsrv|[email protected],-32031|[email protected],-32034|[email protected],-32002|" "RemoteAssistance-In-TCP-EdgeScope"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=6|Profile=Public|App=%SystemRoot%\\system32\\msra.exe|[email protected],-33003|[email protected],-33006|[email protected],-33002|Edge=TRUE|Defer=App|" "RemoteAssistance-Out-TCP"="v2.10|Action=Allow|Active=FALSE|Dir=Out|Protocol=6|Profile=Public|App=%SystemRoot%\\system32\\msra.exe|[email protected],-33007|[email protected],-33010|[email protected],-33002|" "RemoteAssistance-PnrpSvc-UDP-In-EdgeScope"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=17|Profile=Public|LPort=3540|App=%systemroot%\\system32\\svchost.exe|Svc=pnrpsvc|[email protected],-33039|[email protected],-33040|[email protected],-33002|Edge=TRUE|Defer=App|" "RemoteAssistance-PnrpSvc-UDP-OUT"="v2.10|Action=Allow|Active=FALSE|Dir=Out|Protocol=17|Profile=Public|App=%systemroot%\\system32\\svchost.exe|Svc=pnrpsvc|[email protected],-33037|[email protected],-33038|[email protected],-33002|" "RemoteAssistance-RAServer-In-TCP-NoScope-Active"="v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=6|Profile=Domain|App=%SystemRoot%\\system32\\raserver.exe|[email protected],-33011|[email protected],-33014|[email protected],-33002|" "RemoteAssistance-RAServer-Out-TCP-NoScope-Active"="v2.10|Action=Allow|Active=TRUE|Dir=Out|Protocol=6|Profile=Domain|App=%SystemRoot%\\system32\\raserver.exe|[email protected],-33015|[email protected],-33018|[email protected],-33002|" "RemoteAssistance-DCOM-In-TCP-NoScope-Active"="v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=6|Profile=Domain|LPort=135|App=%SystemRoot%\\system32\\svchost.exe|Svc=rpcss|[email protected],-33035|[email protected],-33036|[email protected],-33002|" "RemoteAssistance-In-TCP-EdgeScope-Active"="v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=6|Profile=Domain|Profile=Private|App=%SystemRoot%\\system32\\msra.exe|[email protected],-33003|[email protected],-33006|[email protected],-33002|Edge=TRUE|Defer=App|" "RemoteAssistance-Out-TCP-Active"="v2.10|Action=Allow|Active=TRUE|Dir=Out|Protocol=6|Profile=Domain|Profile=Private|App=%SystemRoot%\\system32\\msra.exe|[email protected],-33007|[email protected],-33010|[email protected],-33002|" "RemoteAssistance-SSDPSrv-In-UDP-Active"="v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=17|Profile=Domain|Profile=Private|LPort=1900|RA4=LocalSubnet|RA6=LocalSubnet|App=%SystemRoot%\\system32\\svchost.exe|Svc=Ssdpsrv|[email protected],-33019|[email protected],-33022|[email protected],-33002|" "RemoteAssistance-SSDPSrv-Out-UDP-Active"="v2.10|Action=Allow|Active=TRUE|Dir=Out|Protocol=17|Profile=Domain|Profile=Private|RPort=1900|RA4=LocalSubnet|RA6=LocalSubnet|App=%SystemRoot%\\system32\\svchost.exe|Svc=Ssdpsrv|[email protected],-33023|[email protected],-33026|[email protected],-33002|" "RemoteAssistance-SSDPSrv-In-TCP-Active"="v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=6|Profile=Domain|Profile=Private|LPort=2869|RA4=LocalSubnet|RA6=LocalSubnet|App=%SystemRoot%\\system32\\svchost.exe|Svc=Ssdpsrv|[email protected],-33027|[email protected],-33030|[email protected],-33002|" "RemoteAssistance-SSDPSrv-Out-TCP-Active"="v2.10|Action=Allow|Active=TRUE|Dir=Out|Protocol=6|Profile=Domain|Profile=Private|RA4=LocalSubnet|RA6=LocalSubnet|App=%SystemRoot%\\system32\\svchost.exe|Svc=Ssdpsrv|[email protected],-33031|[email protected],-33034|[email protected],-33002|" "RemoteAssistance-PnrpSvc-UDP-In-EdgeScope-Active"="v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=17|Profile=Domain|Profile=Private|LPort=3540|App=%systemroot%\\system32\\svchost.exe|Svc=pnrpsvc|[email protected],-33039|[email protected],-33040|[email protected],-33002|Edge=TRUE|Defer=App|" "RemoteAssistance-PnrpSvc-UDP-OUT-Active"="v2.10|Action=Allow|Active=TRUE|Dir=Out|Protocol=17|Profile=Domain|Profile=Private|App=%systemroot%\\system32\\svchost.exe|Svc=pnrpsvc|[email protected],-33037|[email protected],-33038|[email protected],-33002|" "FPS-NB_Session-In-TCP-NoScope"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=6|Profile=Domain|LPort=139|App=System|[email protected],-28503|[email protected],-28506|[email protected],-28502|" "FPS-NB_Session-Out-TCP-NoScope"="v2.10|Action=Allow|Active=FALSE|Dir=Out|Protocol=6|Profile=Domain|RPort=139|App=System|[email protected],-28507|[email protected],-28510|[email protected],-28502|" "FPS-SMB-In-TCP-NoScope"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=6|Profile=Domain|LPort=445|App=System|[email protected],-28511|[email protected],-28514|[email protected],-28502|" "FPS-SMB-Out-TCP-NoScope"="v2.10|Action=Allow|Active=FALSE|Dir=Out|Protocol=6|Profile=Domain|RPort=445|App=System|[email protected],-28515|[email protected],-28518|[email protected],-28502|" "FPS-NB_Name-In-UDP-NoScope"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=17|Profile=Domain|LPort=137|App=System|[email protected],-28519|[email protected],-28522|[email protected],-28502|" "FPS-NB_Name-Out-UDP-NoScope"="v2.10|Action=Allow|Active=FALSE|Dir=Out|Protocol=17|Profile=Domain|RPort=137|App=System|[email protected],-28523|[email protected],-28526|[email protected],-28502|" "FPS-NB_Datagram-In-UDP-NoScope"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=17|Profile=Domain|LPort=138|App=System|[email protected],-28527|[email protected],-28530|[email protected],-28502|" "FPS-NB_Datagram-Out-UDP-NoScope"="v2.10|Action=Allow|Active=FALSE|Dir=Out|Protocol=17|Profile=Domain|RPort=138|App=System|[email protected],-28531|[email protected],-28534|[email protected],-28502|" "FPS-SpoolSvc-In-TCP-NoScope"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=6|Profile=Domain|LPort=RPC|App=%SystemRoot%\\system32\\spoolsv.exe|Svc=Spooler|[email protected],-28535|[email protected],-28538|[email protected],-28502|" "FPS-RPCSS-In-TCP-NoScope"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=6|Profile=Domain|LPort=RPC-EPMap|Svc=Rpcss|[email protected],-28539|[email protected],-28542|[email protected],-28502|" "FPS-ICMP4-ERQ-In-NoScope"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=1|Profile=Domain|ICMP4=8:*|[email protected],-28543|[email protected],-28547|[email protected],-28502|" "FPS-ICMP4-ERQ-Out-NoScope"="v2.10|Action=Allow|Active=FALSE|Dir=Out|Protocol=1|Profile=Domain|ICMP4=8:*|[email protected],-28544|[email protected],-28547|[email protected],-28502|" "FPS-ICMP6-ERQ-In-NoScope"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=58|Profile=Domain|ICMP6=128:*|[email protected],-28545|[email protected],-28547|[email protected],-28502|" "FPS-ICMP6-ERQ-Out-NoScope"="v2.10|Action=Allow|Active=FALSE|Dir=Out|Protocol=58|Profile=Domain|ICMP6=128:*|[email protected],-28546|[email protected],-28547|[email protected],-28502|" "FPS-NB_Session-In-TCP"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=6|Profile=Private|LPort=139|RA4=LocalSubnet|RA6=LocalSubnet|App=System|[email protected],-28503|[email protected],-28506|[email protected],-28502|" "FPS-NB_Session-Out-TCP"="v2.10|Action=Allow|Active=FALSE|Dir=Out|Protocol=6|Profile=Private|RPort=139|RA4=LocalSubnet|RA6=LocalSubnet|App=System|[email protected],-28507|[email protected],-28510|[email protected],-28502|" "FPS-SMB-In-TCP"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=6|Profile=Private|LPort=445|RA4=LocalSubnet|RA6=LocalSubnet|App=System|[email protected],-28511|[email protected],-28514|[email protected],-28502|" "FPS-SMB-Out-TCP"="v2.10|Action=Allow|Active=FALSE|Dir=Out|Protocol=6|Profile=Private|RPort=445|RA4=LocalSubnet|RA6=LocalSubnet|App=System|[email protected],-28515|[email protected],-28518|[email protected],-28502|" "FPS-NB_Name-In-UDP"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=17|Profile=Private|LPort=137|RA4=LocalSubnet|RA6=LocalSubnet|App=System|[email protected],-28519|[email protected],-28522|[email protected],-28502|" "FPS-NB_Name-Out-UDP"="v2.10|Action=Allow|Active=FALSE|Dir=Out|Protocol=17|Profile=Private|RPort=137|RA4=LocalSubnet|RA6=LocalSubnet|App=System|[email protected],-28523|[email protected],-28526|[email protected],-28502|" "FPS-NB_Datagram-In-UDP"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=17|Profile=Private|LPort=138|RA4=LocalSubnet|RA6=LocalSubnet|App=System|[email protected],-28527|[email protected],-28530|[email protected],-28502|" "FPS-NB_Datagram-Out-UDP"="v2.10|Action=Allow|Active=FALSE|Dir=Out|Protocol=17|Profile=Private|RPort=138|RA4=LocalSubnet|RA6=LocalSubnet|App=System|[email protected],-28531|[email protected],-28534|[email protected],-28502|" "FPS-SpoolSvc-In-TCP"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=6|Profile=Private|LPort=RPC|RA4=LocalSubnet|RA6=LocalSubnet|App=%SystemRoot%\\system32\\spoolsv.exe|Svc=Spooler|[email protected],-28535|[email protected],-28538|[email protected],-28502|" "FPS-RPCSS-In-TCP"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=6|Profile=Private|LPort=RPC-EPMap|RA4=LocalSubnet|RA6=LocalSubnet|Svc=Rpcss|[email protected],-28539|[email protected],-28542|[email protected],-28502|" "FPS-ICMP4-ERQ-In"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=1|Profile=Private|ICMP4=8:*|RA4=LocalSubnet|[email protected],-28543|[email protected],-28547|[email protected],-28502|" "FPS-ICMP4-ERQ-Out"="v2.10|Action=Allow|Active=FALSE|Dir=Out|Protocol=1|Profile=Private|ICMP4=8:*|RA4=LocalSubnet|[email protected],-28544|[email protected],-28547|[email protected],-28502|" "FPS-ICMP6-ERQ-In"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=58|Profile=Private|ICMP6=128:*|RA6=LocalSubnet|[email protected],-28545|[email protected],-28547|[email protected],-28502|" "FPS-ICMP6-ERQ-Out"="v2.10|Action=Allow|Active=FALSE|Dir=Out|Protocol=58|Profile=Private|ICMP6=128:*|RA6=LocalSubnet|[email protected],-28546|[email protected],-28547|[email protected],-28502|" "FPS-LLMNR-In-UDP"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=17|Profile=Domain|Profile=Private|LPort=5355|RA4=LocalSubnet|RA6=LocalSubnet|App=%SystemRoot%\\system32\\svchost.exe|Svc=dnscache|[email protected],-28548|[email protected],-28549|[email protected],-28502|" "FPS-LLMNR-Out-UDP"="v2.10|Action=Allow|Active=FALSE|Dir=Out|Protocol=17|Profile=Domain|Profile=Private|RPort=5355|RA4=LocalSubnet|RA6=LocalSubnet|App=%SystemRoot%\\system32\\svchost.exe|Svc=dnscache|[email protected],-28550|[email protected],-28551|[email protected],-28502|" "CoreNet-ICMP6-DU-In"="v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=58|ICMP6=1:*|App=System|[email protected],-25110|[email protected],-25112|[email protected],-25000|Edge=TRUE|" "CoreNet-ICMP6-PTB-In"="v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=58|ICMP6=2:*|App=System|[email protected],-25001|[email protected],-25007|[email protected],-25000|Edge=TRUE|" "CoreNet-ICMP6-PTB-Out"="v2.10|Action=Allow|Active=TRUE|Dir=Out|Protocol=58|ICMP6=2:*|[email protected],-25002|[email protected],-25007|[email protected],-25000|" "CoreNet-ICMP6-TE-In"="v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=58|ICMP6=3:*|App=System|[email protected],-25113|[email protected],-25115|[email protected],-25000|Edge=TRUE|" "CoreNet-ICMP6-TE-Out"="v2.10|Action=Allow|Active=TRUE|Dir=Out|Protocol=58|ICMP6=3:*|[email protected],-25114|[email protected],-25115|[email protected],-25000|" "CoreNet-ICMP6-PP-In"="v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=58|ICMP6=4:*|App=System|[email protected],-25116|[email protected],-25118|[email protected],-25000|Edge=TRUE|" "CoreNet-ICMP6-PP-Out"="v2.10|Action=Allow|Active=TRUE|Dir=Out|Protocol=58|ICMP6=4:*|[email protected],-25117|[email protected],-25118|[email protected],-25000|" "CoreNet-ICMP6-NDS-In"="v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=58|ICMP6=135:*|App=System|[email protected],-25019|[email protected],-25025|[email protected],-25000|Edge=TRUE|" "CoreNet-ICMP6-NDS-Out"="v2.10|Action=Allow|Active=TRUE|Dir=Out|Protocol=58|ICMP6=135:*|[email protected],-25020|[email protected],-25025|[email protected],-25000|" "CoreNet-ICMP6-NDA-In"="v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=58|ICMP6=136:*|App=System|[email protected],-25026|[email protected],-25032|[email protected],-25000|Edge=TRUE|" "CoreNet-ICMP6-NDA-Out"="v2.10|Action=Allow|Active=TRUE|Dir=Out|Protocol=58|ICMP6=136:*|[email protected],-25027|[email protected],-25032|[email protected],-25000|" "CoreNet-ICMP6-RA-In"="v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=58|ICMP6=134:*|RA6=fe80::/64|App=System|[email protected],-25012|[email protected],-25018|[email protected],-25000|" "CoreNet-ICMP6-RA-Out"="v2.10|Action=Allow|Active=TRUE|Dir=Out|Protocol=58|ICMP6=134:*|LA6=fe80::/64|RA6=LocalSubnet|RA6=fe80::/64|RA6=ff02::1|[email protected],-25013|[email protected],-25018|[email protected],-25000|" "CoreNet-ICMP6-RS-In"="v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=58|ICMP6=133:*|App=System|[email protected],-25009|[email protected],-25011|[email protected],-25000|" "CoreNet-ICMP6-RS-Out"="v2.10|Action=Allow|Active=TRUE|Dir=Out|Protocol=58|ICMP6=133:*|RA6=LocalSubnet|RA6=fe80::/64|RA6=ff02::2|[email protected],-25008|[email protected],-25011|[email protected],-25000|" "CoreNet-ICMP6-LQ-In"="v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=58|ICMP6=130:*|RA6=LocalSubnet|App=System|[email protected],-25061|[email protected],-25067|[email protected],-25000|" "CoreNet-ICMP6-LQ-Out"="v2.10|Action=Allow|Active=TRUE|Dir=Out|Protocol=58|ICMP6=130:*|RA6=LocalSubnet|[email protected],-25062|[email protected],-25067|[email protected],-25000|" "CoreNet-ICMP6-LR-In"="v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=58|ICMP6=131:*|RA6=LocalSubnet|App=System|[email protected],-25068|[email protected],-25074|[email protected],-25000|" "CoreNet-ICMP6-LR-Out"="v2.10|Action=Allow|Active=TRUE|Dir=Out|Protocol=58|ICMP6=131:*|RA6=LocalSubnet|[email protected],-25069|[email protected],-25074|[email protected],-25000|" "CoreNet-ICMP6-LR2-In"="v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=58|ICMP6=143:*|RA6=LocalSubnet|App=System|[email protected],-25075|[email protected],-25081|[email protected],-25000|" "CoreNet-ICMP6-LR2-Out"="v2.10|Action=Allow|Active=TRUE|Dir=Out|Protocol=58|ICMP6=143:*|RA6=LocalSubnet|[email protected],-25076|[email protected],-25081|[email protected],-25000|" "CoreNet-ICMP6-LD-In"="v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=58|ICMP6=132:*|RA6=LocalSubnet|App=System|[email protected],-25082|[email protected],-25088|[email protected],-25000|" "CoreNet-ICMP6-LD-Out"="v2.10|Action=Allow|Active=TRUE|Dir=Out|Protocol=58|ICMP6=132:*|RA6=LocalSubnet|[email protected],-25083|[email protected],-25088|[email protected],-25000|" "CoreNet-ICMP4-DUFRAG-In"="v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=1|ICMP4=3:4|App=System|[email protected],-25251|[email protected],-25257|[email protected],-25000|" "CoreNet-IGMP-In"="v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=2|App=System|[email protected],-25376|[email protected],-25382|[email protected],-25000|" "CoreNet-IGMP-Out"="v2.10|Action=Allow|Active=TRUE|Dir=Out|Protocol=2|App=System|[email protected],-25377|[email protected],-25382|[email protected],-25000|" "CoreNet-DHCP-In"="v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=17|LPort=68|RPort=67|App=%SystemRoot%\\system32\\svchost.exe|Svc=dhcp|[email protected],-25301|[email protected],-25303|[email protected],-25000|" "CoreNet-DHCP-Out"="v2.10|Action=Allow|Active=TRUE|Dir=Out|Protocol=17|LPort=68|RPort=67|App=%SystemRoot%\\system32\\svchost.exe|Svc=dhcp|[email protected],-25302|[email protected],-25303|[email protected],-25000|" "CoreNet-DHCPV6-In"="v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=17|LPort=546|RPort=547|App=%SystemRoot%\\system32\\svchost.exe|Svc=dhcp|[email protected],-25304|[email protected],-25306|[email protected],-25000|" "CoreNet-DHCPV6-Out"="v2.10|Action=Allow|Active=TRUE|Dir=Out|Protocol=17|LPort=546|RPort=547|App=%SystemRoot%\\system32\\svchost.exe|Svc=dhcp|[email protected],-25305|[email protected],-25306|[email protected],-25000|" "CoreNet-Teredo-In"="v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=17|LPort=Teredo|App=%SystemRoot%\\system32\\svchost.exe|Svc=iphlpsvc|[email protected],-25326|[email protected],-25332|[email protected],-25000|" "CoreNet-Teredo-Out"="v2.10|Action=Allow|Active=TRUE|Dir=Out|Protocol=17|App=%SystemRoot%\\system32\\svchost.exe|Svc=iphlpsvc|[email protected],-25327|[email protected],-25333|[email protected],-25000|" "CoreNet-IPHTTPS-In"="v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=6|LPort2_10=IPTLSIn|LPort2_10=IPHTTPSIn|App=System|[email protected],-25426|[email protected],-25428|[email protected],-25000|" "CoreNet-IPHTTPS-Out"="v2.10|Action=Allow|Active=TRUE|Dir=Out|Protocol=6|RPort2_10=IPTLSOut|RPort2_10=IPHTTPSOut|App=%SystemRoot%\\system32\\svchost.exe|Svc=iphlpsvc|[email protected],-25427|[email protected],-25429|[email protected],-25000|" "CoreNet-IPv6-In"="v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=41|App=System|[email protected],-25351|[email protected],-25357|[email protected],-25000|" "CoreNet-IPv6-Out"="v2.10|Action=Allow|Active=TRUE|Dir=Out|Protocol=41|App=System|[email protected],-25352|[email protected],-25358|[email protected],-25000|" "CoreNet-GP-NP-Out-TCP"="v2.10|Action=Allow|Active=TRUE|Dir=Out|Protocol=6|Profile=Domain|RPort=445|App=System|[email protected],-25401|[email protected],-25401|[email protected],-25000|" "CoreNet-GP-Out-TCP"="v2.10|Action=Allow|Active=TRUE|Dir=Out|Protocol=6|Profile=Domain|App=%SystemRoot%\\system32\\svchost.exe|[email protected],-25403|[email protected],-25404|[email protected],-25000|" "CoreNet-DNS-Out-UDP"="v2.10|Action=Allow|Active=TRUE|Dir=Out|Protocol=17|RPort=53|App=%SystemRoot%\\system32\\svchost.exe|Svc=dnscache|[email protected],-25405|[email protected],-25406|[email protected],-25000|" "CoreNet-GP-LSASS-Out-TCP"="v2.10|Action=Allow|Active=TRUE|Dir=Out|Protocol=6|Profile=Domain|App=%SystemRoot%\\system32\\lsass.exe|[email protected],-25407|[email protected],-25408|[email protected],-25000|" "NETDIS-UPnPHost-In-TCP-NoScope"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=6|Profile=Domain|LPort=2869|App=System|[email protected],-32761|[email protected],-32764|[email protected],-32752|" "NETDIS-UPnPHost-Out-TCP-NoScope"="v2.10|Action=Allow|Active=FALSE|Dir=Out|Protocol=6|Profile=Domain|App=System|[email protected],-32765|[email protected],-32768|[email protected],-32752|" "NETDIS-NB_Name-In-UDP-NoScope"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=17|Profile=Domain|LPort=137|App=System|[email protected],-32769|[email protected],-32772|[email protected],-32752|" "NETDIS-NB_Name-Out-UDP-NoScope"="v2.10|Action=Allow|Active=FALSE|Dir=Out|Protocol=17|Profile=Domain|RPort=137|App=System|[email protected],-32773|[email protected],-32776|[email protected],-32752|" "NETDIS-NB_Datagram-In-UDP-NoScope"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=17|Profile=Domain|LPort=138|App=System|[email protected],-32777|[email protected],-32780|[email protected],-32752|" "NETDIS-NB_Datagram-Out-UDP-NoScope"="v2.10|Action=Allow|Active=FALSE|Dir=Out|Protocol=17|Profile=Domain|RPort=138|App=System|[email protected],-32781|[email protected],-32784|[email protected],-32752|" "NETDIS-WSDEVNTS-In-TCP-NoScope"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=6|Profile=Domain|LPort=5358|App=System|[email protected],-32813|[email protected],-32814|[email protected],-32752|" "NETDIS-WSDEVNTS-Out-TCP-NoScope"="v2.10|Action=Allow|Active=FALSE|Dir=Out|Protocol=6|Profile=Domain|RPort=5358|App=System|[email protected],-32815|[email protected],-32816|[email protected],-32752|" "NETDIS-WSDEVNT-In-TCP-NoScope"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=6|Profile=Domain|LPort=5357|App=System|[email protected],-32817|[email protected],-32818|[email protected],-32752|" "NETDIS-WSDEVNT-Out-TCP-NoScope"="v2.10|Action=Allow|Active=FALSE|Dir=Out|Protocol=6|Profile=Domain|RPort=5357|App=System|[email protected],-32819|[email protected],-32820|[email protected],-32752|" "NETDIS-SSDPSrv-In-UDP-Active"="v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=17|Profile=Private|LPort=1900|RA4=LocalSubnet|RA6=LocalSubnet|App=%SystemRoot%\\system32\\svchost.exe|Svc=Ssdpsrv|[email protected],-32753|[email protected],-32756|[email protected],-32752|" "NETDIS-SSDPSrv-Out-UDP-Active"="v2.10|Action=Allow|Active=TRUE|Dir=Out|Protocol=17|Profile=Private|RPort=1900|RA4=LocalSubnet|RA6=LocalSubnet|App=%SystemRoot%\\system32\\svchost.exe|Svc=Ssdpsrv|[email protected],-32757|[email protected],-32760|[email protected],-32752|" "NETDIS-UPnPHost-In-TCP-Active"="v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=6|Profile=Private|LPort=2869|RA4=LocalSubnet|RA6=LocalSubnet|App=System|[email protected],-32761|[email protected],-32764|[email protected],-32752|" "NETDIS-UPnPHost-Out-TCP-Active"="v2.10|Action=Allow|Active=TRUE|Dir=Out|Protocol=6|Profile=Private|RA4=LocalSubnet|RA6=LocalSubnet|App=System|[email protected],-32765|[email protected],-32768|[email protected],-32752|" "NETDIS-UPnP-Out-TCP-Active"="v2.10|Action=Allow|Active=TRUE|Dir=Out|Protocol=6|Profile=Private|RA4=LocalSubnet|RA6=LocalSubnet|App=%SystemRoot%\\system32\\svchost.exe|Svc=upnphost|[email protected],-32821|[email protected],-32822|[email protected],-32752|" "NETDIS-NB_Name-In-UDP-Active"="v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=17|Profile=Private|LPort=137|RA4=LocalSubnet|RA6=LocalSubnet|App=System|[email protected],-32769|[email protected],-32772|[email protected],-32752|" "NETDIS-NB_Name-Out-UDP-Active"="v2.10|Action=Allow|Active=TRUE|Dir=Out|Protocol=17|Profile=Private|RPort=137|RA4=LocalSubnet|RA6=LocalSubnet|App=System|[email protected],-32773|[email protected],-32776|[email protected],-32752|" "NETDIS-NB_Datagram-In-UDP-Active"="v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=17|Profile=Private|LPort=138|RA4=LocalSubnet|RA6=LocalSubnet|App=System|[email protected],-32777|[email protected],-32780|[email protected],-32752|" "NETDIS-NB_Datagram-Out-UDP-Active"="v2.10|Action=Allow|Active=TRUE|Dir=Out|Protocol=17|Profile=Private|RPort=138|RA4=LocalSubnet|RA6=LocalSubnet|App=System|[email protected],-32781|[email protected],-32784|[email protected],-32752|" "NETDIS-FDPHOST-In-UDP-Active"="v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=17|Profile=Private|LPort=3702|RA4=LocalSubnet|RA6=LocalSubnet|App=%SystemRoot%\\system32\\svchost.exe|Svc=fdphost|[email protected],-32785|[email protected],-32788|[email protected],-32752|" "NETDIS-FDPHOST-Out-UDP-Active"="v2.10|Action=Allow|Active=TRUE|Dir=Out|Protocol=17|Profile=Private|RPort=3702|RA4=LocalSubnet|RA6=LocalSubnet|App=%SystemRoot%\\system32\\svchost.exe|Svc=fdphost|[email protected],-32789|[email protected],-32792|[email protected],-32752|" "NETDIS-LLMNR-In-UDP-Active"="v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=17|Profile=Private|LPort=5355|RA4=LocalSubnet|RA6=LocalSubnet|App=%SystemRoot%\\system32\\svchost.exe|Svc=dnscache|[email protected],-32801|[email protected],-32804|[email protected],-32752|" "NETDIS-LLMNR-Out-UDP-Active"="v2.10|Action=Allow|Active=TRUE|Dir=Out|Protocol=17|Profile=Private|RPort=5355|RA4=LocalSubnet|RA6=LocalSubnet|App=%SystemRoot%\\system32\\svchost.exe|Svc=dnscache|[email protected],-32805|[email protected],-32808|[email protected],-32752|" "NETDIS-FDRESPUB-WSD-In-UDP-Active"="v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=17|Profile=Private|LPort=3702|RA4=LocalSubnet|RA6=LocalSubnet|App=%SystemRoot%\\system32\\svchost.exe|Svc=fdrespub|[email protected],-32809|[email protected],-32810|[email protected],-32752|" "NETDIS-FDRESPUB-WSD-Out-UDP-Active"="v2.10|Action=Allow|Active=TRUE|Dir=Out|Protocol=17|Profile=Private|RPort=3702|RA4=LocalSubnet|RA6=LocalSubnet|App=%SystemRoot%\\system32\\svchost.exe|Svc=fdrespub|[email protected],-32811|[email protected],-32812|[email protected],-32752|" "NETDIS-WSDEVNTS-In-TCP-Active"="v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=6|Profile=Private|LPort=5358|RA4=LocalSubnet|RA6=LocalSubnet|App=System|[email protected],-32813|[email protected],-32814|[email protected],-32752|" "NETDIS-WSDEVNTS-Out-TCP-Active"="v2.10|Action=Allow|Active=TRUE|Dir=Out|Protocol=6|Profile=Private|RPort=5358|RA4=LocalSubnet|RA6=LocalSubnet|App=System|[email protected],-32815|[email protected],-32816|[email protected],-32752|" "NETDIS-WSDEVNT-In-TCP-Active"="v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=6|Profile=Private|LPort=5357|RA4=LocalSubnet|RA6=LocalSubnet|App=System|[email protected],-32817|[email protected],-32818|[email protected],-32752|" "NETDIS-WSDEVNT-Out-TCP-Active"="v2.10|Action=Allow|Active=TRUE|Dir=Out|Protocol=6|Profile=Private|RPort=5357|RA4=LocalSubnet|RA6=LocalSubnet|App=System|[email protected],-32819|[email protected],-32820|[email protected],-32752|" "NETDIS-SSDPSrv-In-UDP"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=17|Profile=Domain|LPort=1900|RA4=LocalSubnet|RA6=LocalSubnet|App=%SystemRoot%\\system32\\svchost.exe|Svc=Ssdpsrv|[email protected],-32753|[email protected],-32756|[email protected],-32752|" "NETDIS-SSDPSrv-Out-UDP"="v2.10|Action=Allow|Active=FALSE|Dir=Out|Protocol=17|Profile=Domain|RPort=1900|RA4=LocalSubnet|RA6=LocalSubnet|App=%SystemRoot%\\system32\\svchost.exe|Svc=Ssdpsrv|[email protected],-32757|[email protected],-32760|[email protected],-32752|" "NETDIS-UPnP-Out-TCP"="v2.10|Action=Allow|Active=FALSE|Dir=Out|Protocol=6|Profile=Domain|RA4=LocalSubnet|RA6=LocalSubnet|App=%SystemRoot%\\system32\\svchost.exe|Svc=upnphost|[email protected],-32821|[email protected],-32822|[email protected],-32752|" "NETDIS-UPnPHost-In-TCP"="v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=6|Profile=Public|LPort=2869|RA4=LocalSubnet|RA6=LocalSubnet|App=System|[email protected],-32761|[email protected],-32764|[email protected],-32752|" "NETDIS-UPnPHost-Out-TCP"="v2.10|Action=Allow|Active=TRUE|Dir=Out|Protocol=6|Profile=Public|RA4=LocalSubnet|RA6=LocalSubnet|App=System|[email protected],-32765|[email protected],-32768|[email protected],-32752|" "NETDIS-NB_Name-In-UDP"="v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=17|Profile=Public|LPort=137|RA4=LocalSubnet|RA6=LocalSubnet|App=System|[email protected],-32769|[email protected],-32772|[email protected],-32752|" "NETDIS-NB_Name-Out-UDP"="v2.10|Action=Allow|Active=TRUE|Dir=Out|Protocol=17|Profile=Public|RPort=137|RA4=LocalSubnet|RA6=LocalSubnet|App=System|[email protected],-32773|[email protected],-32776|[email protected],-32752|" "NETDIS-NB_Datagram-In-UDP"="v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=17|Profile=Public|LPort=138|RA4=LocalSubnet|RA6=LocalSubnet|App=System|[email protected],-32777|[email protected],-32780|[email protected],-32752|" "NETDIS-NB_Datagram-Out-UDP"="v2.10|Action=Allow|Active=TRUE|Dir=Out|Protocol=17|Profile=Public|RPort=138|RA4=LocalSubnet|RA6=LocalSubnet|App=System|[email protected],-32781|[email protected],-32784|[email protected],-32752|" "NETDIS-FDPHOST-In-UDP"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=17|Profile=Domain|LPort=3702|RA4=LocalSubnet|RA6=LocalSubnet|App=%SystemRoot%\\system32\\svchost.exe|Svc=fdphost|[email protected],-32785|[email protected],-32788|[email protected],-32752|" "NETDIS-FDPHOST-Out-UDP"="v2.10|Action=Allow|Active=FALSE|Dir=Out|Protocol=17|Profile=Domain|RPort=3702|RA4=LocalSubnet|RA6=LocalSubnet|App=%SystemRoot%\\system32\\svchost.exe|Svc=fdphost|[email protected],-32789|[email protected],-32792|[email protected],-32752|" "NETDIS-LLMNR-In-UDP"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=17|Profile=Domain|LPort=5355|RA4=LocalSubnet|RA6=LocalSubnet|App=%SystemRoot%\\system32\\svchost.exe|Svc=dnscache|[email protected],-32801|[email protected],-32804|[email protected],-32752|" "NETDIS-LLMNR-Out-UDP"="v2.10|Action=Allow|Active=FALSE|Dir=Out|Protocol=17|Profile=Domain|RPort=5355|RA4=LocalSubnet|RA6=LocalSubnet|App=%SystemRoot%\\system32\\svchost.exe|Svc=dnscache|[email protected],-32805|[email protected],-32808|[email protected],-32752|" "NETDIS-FDRESPUB-WSD-In-UDP"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=17|Profile=Domain|LPort=3702|RA4=LocalSubnet|RA6=LocalSubnet|App=%SystemRoot%\\system32\\svchost.exe|Svc=fdrespub|[email protected],-32809|[email protected],-32810|[email protected],-32752|" "NETDIS-FDRESPUB-WSD-Out-UDP"="v2.10|Action=Allow|Active=FALSE|Dir=Out|Protocol=17|Profile=Domain|RPort=3702|RA4=LocalSubnet|RA6=LocalSubnet|App=%SystemRoot%\\system32\\svchost.exe|Svc=fdrespub|[email protected],-32811|[email protected],-32812|[email protected],-32752|" "NETDIS-WSDEVNTS-In-TCP"="v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=6|Profile=Public|LPort=5358|RA4=LocalSubnet|RA6=LocalSubnet|App=System|[email protected],-32813|[email protected],-32814|[email protected],-32752|" "NETDIS-WSDEVNTS-Out-TCP"="v2.10|Action=Allow|Active=TRUE|Dir=Out|Protocol=6|Profile=Public|RPort=5358|RA4=LocalSubnet|RA6=LocalSubnet|App=System|[email protected],-32815|[email protected],-32816|[email protected],-32752|" "NETDIS-WSDEVNT-In-TCP"="v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=6|Profile=Public|LPort=5357|RA4=LocalSubnet|RA6=LocalSubnet|App=System|[email protected],-32817|[email protected],-32818|[email protected],-32752|" "NETDIS-WSDEVNT-Out-TCP"="v2.10|Action=Allow|Active=TRUE|Dir=Out|Protocol=6|Profile=Public|RPort=5357|RA4=LocalSubnet|RA6=LocalSubnet|App=System|[email protected],-32819|[email protected],-32820|[email protected],-32752|" "MsiScsi-In-TCP-NoScope"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=6|Profile=Domain|App=%SystemRoot%\\system32\\svchost.exe|Svc=Msiscsi|[email protected],-29003|[email protected],-29006|[email protected],-29002|" "MsiScsi-Out-TCP-NoScope"="v2.10|Action=Allow|Active=FALSE|Dir=Out|Protocol=6|Profile=Domain|App=%SystemRoot%\\system32\\svchost.exe|Svc=Msiscsi|[email protected],-29007|[email protected],-29010|[email protected],-29002|" "MsiScsi-In-TCP"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=6|Profile=Private|Profile=Public|RA4=LocalSubnet|RA6=LocalSubnet|App=%SystemRoot%\\system32\\svchost.exe|Svc=Msiscsi|[email protected],-29003|[email protected],-29006|[email protected],-29002|" "MsiScsi-Out-TCP"="v2.10|Action=Allow|Active=FALSE|Dir=Out|Protocol=6|Profile=Private|Profile=Public|RA4=LocalSubnet|RA6=LocalSubnet|App=%SystemRoot%\\system32\\svchost.exe|Svc=Msiscsi|[email protected],-29007|[email protected],-29010|[email protected],-29002|" "MSDTC-In-TCP-NoScope"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=6|Profile=Domain|App=%SystemRoot%\\system32\\msdtc.exe|[email protected],-33503|[email protected],-33506|[email protected],-33502|" "MSDTC-Out-TCP-NoScope"="v2.10|Action=Allow|Active=FALSE|Dir=Out|Protocol=6|Profile=Domain|App=%SystemRoot%\\system32\\msdtc.exe|[email protected],-33507|[email protected],-33510|[email protected],-33502|" "MSDTC-KTMRM-In-TCP-NoScope"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=6|Profile=Domain|LPort=RPC|App=%SystemRoot%\\system32\\svchost.exe|Svc=ktmrm|[email protected],-33511|[email protected],-33512|[email protected],-33502|" "MSDTC-RPCSS-In-TCP-NoScope"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=6|Profile=Domain|LPort=RPC-EPMap|App=%SystemRoot%\\system32\\svchost.exe|Svc=RPCSS|[email protected],-33513|[email protected],-33514|[email protected],-33502|" "MSDTC-In-TCP"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=6|Profile=Private|Profile=Public|RA4=LocalSubnet|RA6=LocalSubnet|App=%SystemRoot%\\system32\\msdtc.exe|[email protected],-33503|[email protected],-33506|[email protected],-33502|" "MSDTC-Out-TCP"="v2.10|Action=Allow|Active=FALSE|Dir=Out|Protocol=6|Profile=Private|Profile=Public|RA4=LocalSubnet|RA6=LocalSubnet|App=%SystemRoot%\\system32\\msdtc.exe|[email protected],-33507|[email protected],-33510|[email protected],-33502|" "MSDTC-KTMRM-In-TCP"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=6|Profile=Private|Profile=Public|LPort=RPC|RA4=LocalSubnet|RA6=LocalSubnet|App=%SystemRoot%\\system32\\svchost.exe|Svc=ktmrm|[email protected],-33511|[email protected],-33512|[email protected],-33502|" "MSDTC-RPCSS-In-TCP"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=6|Profile=Private|Profile=Public|LPort=RPC-EPMap|RA4=LocalSubnet|RA6=LocalSubnet|App=%SystemRoot%\\system32\\svchost.exe|Svc=RPCSS|[email protected],-33513|[email protected],-33514|[email protected],-33502|" "RemoteSvcAdmin-In-TCP-NoScope"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=6|Profile=Domain|LPort=RPC|App=%SystemRoot%\\system32\\services.exe|[email protected],-29503|[email protected],-29506|[email protected],-29502|" "RemoteSvcAdmin-NP-In-TCP-NoScope"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=6|Profile=Domain|LPort=445|App=System|[email protected],-29507|[email protected],-29510|[email protected],-29502|" "RemoteSvcAdmin-RPCSS-In-TCP-NoScope"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=6|Profile=Domain|LPort=RPC-EPMap|App=%SystemRoot%\\system32\\svchost.exe|Svc=RPCSS|[email protected],-29515|[email protected],-29518|[email protected],-29502|" "RemoteSvcAdmin-In-TCP"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=6|Profile=Private|Profile=Public|LPort=RPC|RA4=LocalSubnet|RA6=LocalSubnet|App=%SystemRoot%\\system32\\services.exe|[email protected],-29503|[email protected],-29506|[email protected],-29502|" "RemoteSvcAdmin-NP-In-TCP"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=6|Profile=Private|Profile=Public|LPort=445|RA4=LocalSubnet|RA6=LocalSubnet|App=System|[email protected],-29507|[email protected],-29510|[email protected],-29502|" "RemoteSvcAdmin-RPCSS-In-TCP"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=6|Profile=Private|Profile=Public|LPort=RPC-EPMap|RA4=LocalSubnet|RA6=LocalSubnet|App=%SystemRoot%\\system32\\svchost.exe|Svc=RPCSS|[email protected],-29515|[email protected],-29518|[email protected],-29502|" "PerfLogsAlerts-PLASrv-In-TCP"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=6|Profile=Private|Profile=Public|RA4=LocalSubnet|RA6=LocalSubnet|App=%systemroot%\\system32\\plasrv.exe|[email protected],-34753|[email protected],-34754|[email protected],-34752|" "PerfLogsAlerts-DCOM-In-TCP"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=6|Profile=Private|Profile=Public|LPort=135|RA4=LocalSubnet|RA6=LocalSubnet|App=%systemroot%\\system32\\svchost.exe|Svc=rpcss|[email protected],-34755|[email protected],-34756|[email protected],-34752|" "PerfLogsAlerts-PLASrv-In-TCP-NoScope"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=6|Profile=Domain|App=%systemroot%\\system32\\plasrv.exe|[email protected],-34753|[email protected],-34754|[email protected],-34752|" "PerfLogsAlerts-DCOM-In-TCP-NoScope"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=6|Profile=Domain|LPort=135|App=%systemroot%\\system32\\svchost.exe|Svc=rpcss|[email protected],-34755|[email protected],-34756|[email protected],-34752|" "WMI-RPCSS-In-TCP-NoScope"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=6|Profile=Domain|LPort=135|App=%SystemRoot%\\system32\\svchost.exe|Svc=rpcss|[email protected],-34252|[email protected],-34253|[email protected],-34251|" "WMI-WINMGMT-In-TCP-NoScope"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=6|Profile=Domain|App=%SystemRoot%\\system32\\svchost.exe|Svc=winmgmt|[email protected],-34254|[email protected],-34255|[email protected],-34251|" "WMI-WINMGMT-Out-TCP-NoScope"="v2.10|Action=Allow|Active=FALSE|Dir=Out|Protocol=6|Profile=Domain|App=%SystemRoot%\\system32\\svchost.exe|Svc=winmgmt|[email protected],-34258|[email protected],-34259|[email protected],-34251|" "WMI-ASYNC-In-TCP-NoScope"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=6|Profile=Domain|App=%systemroot%\\system32\\wbem\\unsecapp.exe|[email protected],-34256|[email protected],-34257|[email protected],-34251|" "WMI-RPCSS-In-TCP"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=6|Profile=Private|Profile=Public|LPort=135|RA4=LocalSubnet|RA6=LocalSubnet|App=%SystemRoot%\\system32\\svchost.exe|Svc=rpcss|[email protected],-34252|[email protected],-34253|[email protected],-34251|" "WMI-WINMGMT-In-TCP"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=6|Profile=Private|Profile=Public|RA4=LocalSubnet|RA6=LocalSubnet|App=%SystemRoot%\\system32\\svchost.exe|Svc=winmgmt|[email protected],-34254|[email protected],-34255|[email protected],-34251|" "WMI-WINMGMT-Out-TCP"="v2.10|Action=Allow|Active=FALSE|Dir=Out|Protocol=6|Profile=Private|Profile=Public|RA4=LocalSubnet|RA6=LocalSubnet|App=%SystemRoot%\\system32\\svchost.exe|Svc=winmgmt|[email protected],-34258|[email protected],-34259|[email protected],-34251|" "WMI-ASYNC-In-TCP"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=6|Profile=Private|Profile=Public|RA4=LocalSubnet|RA6=LocalSubnet|App=%systemroot%\\system32\\wbem\\unsecapp.exe|[email protected],-34256|[email protected],-34257|[email protected],-34251|" "PNRPMNRS-PNRP-In-UDP"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=17|LPort=3540|App=%SystemRoot%\\system32\\svchost.exe|Svc=PNRPSvc|[email protected],-34003|[email protected],-34004|[email protected],-34002|Edge=TRUE|Defer=App|" "PNRPMNRS-PNRP-Out-UDP"="v2.10|Action=Allow|Active=FALSE|Dir=Out|Protocol=17|RPort=3540|App=%SystemRoot%\\system32\\svchost.exe|Svc=PNRPSvc|[email protected],-34005|[email protected],-34006|[email protected],-34002|" "PNRPMNRS-SSDPSrv-In-UDP"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=17|LPort=1900|RA4=LocalSubnet|RA6=LocalSubnet|App=%SystemRoot%\\system32\\svchost.exe|Svc=Ssdpsrv|[email protected],-34007|[email protected],-34008|[email protected],-34002|" "PNRPMNRS-SSDPSrv-Out-UDP"="v2.10|Action=Allow|Active=FALSE|Dir=Out|Protocol=17|RPort=1900|RA4=LocalSubnet|RA6=LocalSubnet|App=%SystemRoot%\\system32\\svchost.exe|Svc=Ssdpsrv|[email protected],-34009|[email protected],-34010|[email protected],-34002|" "RemoteEventLogSvc-In-TCP-NoScope"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=6|Profile=Domain|LPort=RPC|App=%SystemRoot%\\system32\\svchost.exe|Svc=Eventlog|[email protected],-29253|[email protected],-29256|[email protected],-29252|" "RemoteEventLogSvc-NP-In-TCP-NoScope"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=6|Profile=Domain|LPort=445|App=System|[email protected],-29257|[email protected],-29260|[email protected],-29252|" "RemoteEventLogSvc-RPCSS-In-TCP-NoScope"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=6|Profile=Domain|LPort=RPC-EPMap|App=%SystemRoot%\\system32\\svchost.exe|Svc=RPCSS|[email protected],-29265|[email protected],-29268|[email protected],-29252|" "RemoteEventLogSvc-In-TCP"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=6|Profile=Private|Profile=Public|LPort=RPC|RA4=LocalSubnet|RA6=LocalSubnet|App=%SystemRoot%\\system32\\svchost.exe|Svc=Eventlog|[email protected],-29253|[email protected],-29256|[email protected],-29252|" "RemoteEventLogSvc-NP-In-TCP"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=6|Profile=Private|Profile=Public|LPort=445|RA4=LocalSubnet|RA6=LocalSubnet|App=System|[email protected],-29257|[email protected],-29260|[email protected],-29252|" "RemoteEventLogSvc-RPCSS-In-TCP"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=6|Profile=Private|Profile=Public|LPort=RPC-EPMap|RA4=LocalSubnet|RA6=LocalSubnet|App=%SystemRoot%\\system32\\svchost.exe|Svc=RPCSS|[email protected],-29265|[email protected],-29268|[email protected],-29252|" "RemoteTask-In-TCP-NoScope"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=6|Profile=Domain|LPort=RPC|App=%SystemRoot%\\system32\\svchost.exe|Svc=schedule|[email protected],-33253|[email protected],-33256|[email protected],-33252|" "RemoteTask-RPCSS-In-TCP-NoScope"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=6|Profile=Domain|LPort=RPC-EPMap|App=%SystemRoot%\\system32\\svchost.exe|Svc=RPCSS|[email protected],-33257|[email protected],-33260|[email protected],-33252|" "RemoteTask-In-TCP"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=6|Profile=Private|Profile=Public|LPort=RPC|RA4=LocalSubnet|RA6=LocalSubnet|App=%SystemRoot%\\system32\\svchost.exe|Svc=schedule|[email protected],-33253|[email protected],-33256|[email protected],-33252|" "RemoteTask-RPCSS-In-TCP"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=6|Profile=Private|Profile=Public|LPort=RPC-EPMap|RA4=LocalSubnet|RA6=LocalSubnet|App=%SystemRoot%\\system32\\svchost.exe|Svc=RPCSS|[email protected],-33257|[email protected],-33260|[email protected],-33252|" "WINRM-HTTP-In-TCP-NoScope"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=6|Profile=Domain|LPort=5985|App=System|[email protected],-30253|[email protected],-30256|[email protected],-30252|" "WINRM-HTTP-In-TCP"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=6|Profile=Private|Profile=Public|LPort=5985|RA4=LocalSubnet|RA6=LocalSubnet|App=System|[email protected],-30253|[email protected],-30256|[email protected],-30252|" "WINRM-HTTP-Compat-In-TCP-NoScope"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=6|Profile=Domain|LPort=80|App=System|[email protected],-35001|[email protected],-35002|[email protected],-30252|" "WINRM-HTTP-Compat-In-TCP"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=6|Profile=Private|Profile=Public|LPort=80|RA4=LocalSubnet|RA6=LocalSubnet|App=System|[email protected],-35001|[email protected],-35002|[email protected],-30252|" "RemoteFwAdmin-In-TCP-NoScope"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=6|Profile=Domain|LPort=RPC|App=%SystemRoot%\\system32\\svchost.exe|Svc=policyagent|[email protected],-30003|[email protected],-30006|[email protected],-30002|" "RemoteFwAdmin-RPCSS-In-TCP-NoScope"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=6|Profile=Domain|LPort=RPC-EPMap|App=%SystemRoot%\\system32\\svchost.exe|Svc=RPCSS|[email protected],-30007|[email protected],-30010|[email protected],-30002|" "RemoteFwAdmin-In-TCP"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=6|Profile=Private|Profile=Public|LPort=RPC|RA4=LocalSubnet|RA6=LocalSubnet|App=%SystemRoot%\\system32\\svchost.exe|Svc=policyagent|[email protected],-30003|[email protected],-30006|[email protected],-30002|" "RemoteFwAdmin-RPCSS-In-TCP"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=6|Profile=Private|Profile=Public|LPort=RPC-EPMap|RA4=LocalSubnet|RA6=LocalSubnet|App=%SystemRoot%\\system32\\svchost.exe|Svc=RPCSS|[email protected],-30007|[email protected],-30010|[email protected],-30002|" "RRAS-GRE-In"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=47|App=System|[email protected],-33769|[email protected],-33772|[email protected],-33752|" "RRAS-GRE-Out"="v2.10|Action=Allow|Active=FALSE|Dir=Out|Protocol=47|App=System|[email protected],-33773|[email protected],-33776|[email protected],-33752|" "RRAS-L2TP-In-UDP"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=17|LPort=1701|App=System|[email protected],-33753|[email protected],-33756|[email protected],-33752|" "RRAS-L2TP-Out-UDP"="v2.10|Action=Allow|Active=FALSE|Dir=Out|Protocol=17|RPort=1701|App=System|[email protected],-33757|[email protected],-33760|[email protected],-33752|" "RRAS-PPTP-In-TCP"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=6|LPort=1723|App=System|[email protected],-33765|[email protected],-33768|[email protected],-33752|" "RRAS-PPTP-Out-TCP"="v2.10|Action=Allow|Active=FALSE|Dir=Out|Protocol=6|RPort=1723|App=System|[email protected],-33761|[email protected],-33764|[email protected],-33752|" "RVM-VDS-In-TCP-NoScope"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=6|Profile=Domain|LPort=RPC|App=%SystemRoot%\\system32\\vds.exe|Svc=vds|[email protected],-34502|[email protected],-34503|[email protected],-34501|" "RVM-VDSLDR-In-TCP-NoScope"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=6|Profile=Domain|LPort=RPC|App=%SystemRoot%\\system32\\vdsldr.exe|[email protected],-34504|[email protected],-34505|[email protected],-34501|" "RVM-RPCSS-In-TCP-NoScope"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=6|Profile=Domain|LPort=RPC-EPMap|App=%SystemRoot%\\system32\\svchost.exe|Svc=RPCSS|[email protected],-34506|[email protected],-34507|[email protected],-34501|" "RVM-VDS-In-TCP"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=6|Profile=Private|Profile=Public|LPort=RPC|RA4=LocalSubnet|RA6=LocalSubnet|App=%SystemRoot%\\system32\\vds.exe|Svc=vds|[email protected],-34502|[email protected],-34503|[email protected],-34501|" "RVM-VDSLDR-In-TCP"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=6|Profile=Private|Profile=Public|LPort=RPC|RA4=LocalSubnet|RA6=LocalSubnet|App=%SystemRoot%\\system32\\vdsldr.exe|[email protected],-34504|[email protected],-34505|[email protected],-34501|" "RVM-RPCSS-In-TCP"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=6|Profile=Private|Profile=Public|LPort=RPC-EPMap|RA4=LocalSubnet|RA6=LocalSubnet|App=%SystemRoot%\\system32\\svchost.exe|Svc=RPCSS|[email protected],-34506|[email protected],-34507|[email protected],-34501|" "MCX-SSDPSrv-In-UDP"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=17|LPort=1900|RA4=LocalSubnet|RA6=LocalSubnet|App=%SystemRoot%\\system32\\svchost.exe|Svc=Ssdpsrv|[email protected],-30753|[email protected],-30756|[email protected],-30752|" "MCX-SSDPSrv-Out-UDP"="v2.10|Action=Allow|Active=FALSE|Dir=Out|Protocol=17|RPort=1900|RA4=LocalSubnet|RA6=LocalSubnet|App=%SystemRoot%\\system32\\svchost.exe|Svc=Ssdpsrv|[email protected],-30757|[email protected],-30760|[email protected],-30752|" "MCX-In-TCP"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=6|LPort=554|LPort=8554|LPort=8555|LPort=8556|LPort=8557|LPort=8558|RA4=LocalSubnet|RA6=LocalSubnet|App=%SystemRoot%\\ehome\\ehshell.exe|[email protected],-30761|[email protected],-30764|[email protected],-30752|" "MCX-Out-TCP"="v2.10|Action=Allow|Active=FALSE|Dir=Out|Protocol=6|RA4=LocalSubnet|RA6=LocalSubnet|App=%SystemRoot%\\ehome\\ehshell.exe|[email protected],-30765|[email protected],-30768|[email protected],-30752|" "MCX-QWave-In-UDP"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=17|LPort=2177|RA4=LocalSubnet|RA6=LocalSubnet|App=%SystemRoot%\\system32\\svchost.exe|Svc=Qwave|[email protected],-30769|[email protected],-30772|[email protected],-30752|" "MCX-QWave-Out-UDP"="v2.10|Action=Allow|Active=FALSE|Dir=Out|Protocol=17|RPort=2177|RA4=LocalSubnet|RA6=LocalSubnet|App=%SystemRoot%\\system32\\svchost.exe|Svc=Qwave|[email protected],-30773|[email protected],-30776|[email protected],-30752|" "MCX-QWave-In-TCP"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=6|LPort=2177|RA4=LocalSubnet|RA6=LocalSubnet|App=%SystemRoot%\\system32\\svchost.exe|Svc=Qwave|[email protected],-30777|[email protected],-30780|[email protected],-30752|" "MCX-QWave-Out-TCP"="v2.10|Action=Allow|Active=FALSE|Dir=Out|Protocol=6|RPort=2177|RA4=LocalSubnet|RA6=LocalSubnet|App=%SystemRoot%\\system32\\svchost.exe|Svc=Qwave|[email protected],-30781|[email protected],-30784|[email protected],-30752|" "MCX-HTTPSTR-In-TCP"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=6|LPort=10244|RA4=LocalSubnet|RA6=LocalSubnet|App=System|[email protected],-30785|[email protected],-30788|[email protected],-30752|" "MCX-TERMSRV-In-TCP"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=6|LPort=3390|RA4=LocalSubnet|RA6=LocalSubnet|App=System|[email protected],-30793|[email protected],-30796|[email protected],-30752|" "MCX-In-UDP"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=17|LPort=7777|LPort=7778|LPort=7779|LPort=7780|LPort=7781|LPort=5004|LPort=5005|LPort=50004|LPort=50005|LPort=50006|LPort=50007|LPort=50008|LPort=50009|LPort=50010|LPort=50011|LPort=50012|LPort=50013|RA4=LocalSubnet|RA6=LocalSubnet|App=%SystemRoot%\\ehome\\ehshell.exe|[email protected],-30801|[email protected],-30804|[email protected],-30752|" "MCX-Out-UDP"="v2.10|Action=Allow|Active=FALSE|Dir=Out|Protocol=17|RA4=LocalSubnet|RA6=LocalSubnet|App=%SystemRoot%\\ehome\\ehshell.exe|[email protected],-30805|[email protected],-30808|[email protected],-30752|" "MCX-MCX2SVC-Out-TCP"="v2.10|Action=Allow|Active=FALSE|Dir=Out|Protocol=6|RA4=LocalSubnet|RA6=LocalSubnet|App=%SystemRoot%\\system32\\svchost.exe|Svc=mcx2svc|[email protected],-30810|[email protected],-30811|[email protected],-30752|" "MCX-Prov-Out-TCP"="v2.10|Action=Allow|Active=FALSE|Dir=Out|Protocol=6|App=%SystemRoot%\\ehome\\mcx2prov.exe|[email protected],-30812|[email protected],-30813|[email protected],-30752|" "MCX-PlayTo-In-TCP"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=6|LPort=2869|RA4=LocalSubnet|RA6=LocalSubnet|App=System|[email protected],-30814|[email protected],-30815|[email protected],-30752|" "MCX-PlayTo-Out-TCP"="v2.10|Action=Allow|Active=FALSE|Dir=Out|Protocol=6|RA4=LocalSubnet|RA6=LocalSubnet|App=%SystemRoot%\\system32\\svchost.exe|Svc=upnphost|[email protected],-30816|[email protected],-30817|[email protected],-30752|" "MCX-McrMgr-Out-TCP"="v2.10|Action=Allow|Active=FALSE|Dir=Out|Protocol=6|App=%SystemRoot%\\ehome\\mcrmgr.exe|[email protected],-30818|[email protected],-30819|[email protected],-30752|" "MCX-PlayTo-Out-UDP"="v2.10|Action=Allow|Active=FALSE|Dir=Out|Protocol=17|LPort=1900|RA4=LocalSubnet|RA6=LocalSubnet|App=%SystemRoot%\\system32\\svchost.exe|Svc=Ssdpsrv|[email protected],-30820|[email protected],-30821|[email protected],-30752|" "MCX-FDPHost-Out-TCP"="v2.10|Action=Allow|Active=FALSE|Dir=Out|Protocol=6|RA4=LocalSubnet|RA6=LocalSubnet|App=%SystemRoot%\\system32\\svchost.exe|Svc=fdphost|[email protected],-30822|[email protected],-30823|[email protected],-30752|" "RemoteDesktop-In-TCP"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=6|LPort=3389|App=System|[email protected],-28753|[email protected],-28756|[email protected],-28752|" "WPDMTP-Out-TCP-NoScope"="v2.10|Action=Allow|Active=FALSE|Dir=Out|Protocol=6|Profile=Domain|App=%SystemRoot%\\system32\\wudfhost.exe|[email protected],-30503|[email protected],-30506|[email protected],-30502|" "WPDMTP-Out-TCP"="v2.10|Action=Allow|Active=FALSE|Dir=Out|Protocol=6|Profile=Private|Profile=Public|RA4=LocalSubnet|RA6=LocalSubnet|App=%SystemRoot%\\system32\\wudfhost.exe|[email protected],-30503|[email protected],-30506|[email protected],-30502|" "WPDMTP-SSDPSrv-In-UDP"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=17|LPort=1900|RA4=LocalSubnet|RA6=LocalSubnet|App=%SystemRoot%\\system32\\svchost.exe|Svc=Ssdpsrv|[email protected],-30507|[email protected],-30510|[email protected],-30502|" "WPDMTP-SSDPSrv-Out-UDP"="v2.10|Action=Allow|Active=FALSE|Dir=Out|Protocol=17|RPort=1900|RA4=LocalSubnet|RA6=LocalSubnet|App=%SystemRoot%\\system32\\svchost.exe|Svc=Ssdpsrv|[email protected],-30511|[email protected],-30514|[email protected],-30502|" "WPDMTP-UPnPHost-In-TCP"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=6|LPort=2869|RA4=LocalSubnet|RA6=LocalSubnet|App=System|[email protected],-30515|[email protected],-30518|[email protected],-30502|" "WPDMTP-UPnPHost-Out-TCP"="v2.10|Action=Allow|Active=FALSE|Dir=Out|Protocol=6|RA4=LocalSubnet|RA6=LocalSubnet|App=%SystemRoot%\\system32\\svchost.exe|Svc=fdphost|[email protected],-30519|[email protected],-30522|[email protected],-30502|" "WPDMTP-UPnP-Out-TCP"="v2.10|Action=Allow|Active=FALSE|Dir=Out|Protocol=6|RA4=LocalSubnet|RA6=LocalSubnet|App=%SystemRoot%\\system32\\svchost.exe|Svc=upnphost|[email protected],-30523|[email protected],-30524|[email protected],-30502|" "Microsoft-Windows-PeerDist-HttpTrans-In"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=6|LPort=80|App=SYSTEM|[email protected],-10000|[email protected],-11000|[email protected],-9000|" "Microsoft-Windows-PeerDist-HttpTrans-Out"="v2.10|Action=Allow|Active=FALSE|Dir=Out|Protocol=6|RPort=80|App=SYSTEM|[email protected],-10001|[email protected],-11001|[email protected],-9000|" "Microsoft-Windows-PeerDist-WSD-In"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=17|LPort=3702|RA4=LocalSubnet|RA6=LocalSubnet|App=%systemroot%\\system32\\svchost.exe|Svc=PeerDistSvc|[email protected],-10002|[email protected],-11002|[email protected],-9001|" "Microsoft-Windows-PeerDist-WSD-Out"="v2.10|Action=Allow|Active=FALSE|Dir=Out|Protocol=17|RPort=3702|RA4=LocalSubnet|RA6=LocalSubnet|App=%systemroot%\\system32\\svchost.exe|Svc=PeerDistSvc|[email protected],-10003|[email protected],-11003|[email protected],-9001|" "Microsoft-Windows-PeerDist-HostedServer-In"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=6|LPort=443|App=SYSTEM|[email protected],-10004|[email protected],-11004|[email protected],-9002|" "Microsoft-Windows-PeerDist-HostedServer-Out"="v2.10|Action=Allow|Active=FALSE|Dir=Out|Protocol=6|LPort=443|App=SYSTEM|[email protected],-10005|[email protected],-11005|[email protected],-9002|" "Microsoft-Windows-PeerDist-HostedClient-Out"="v2.10|Action=Allow|Active=FALSE|Dir=Out|Protocol=6|RPort=443|App=SYSTEM|[email protected],-10006|[email protected],-11006|[email protected],-9003|" "NetPres-In-TCP-NoScope"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=6|Profile=Domain|App=%SystemRoot%\\system32\\netproj.exe|[email protected],-31761|[email protected],-31764|[email protected],-31752|" "NetPres-Out-TCP-NoScope"="v2.10|Action=Allow|Active=FALSE|Dir=Out|Protocol=6|Profile=Domain|App=%SystemRoot%\\system32\\netproj.exe|[email protected],-31765|[email protected],-31768|[email protected],-31752|" "NetPres-WSDEVNT-In-TCP-NoScope"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=6|Profile=Domain|LPort=5357|App=System|[email protected],-31769|[email protected],-31770|[email protected],-31752|" "NetPres-WSDEVNT-Out-TCP-NoScope"="v2.10|Action=Allow|Active=FALSE|Dir=Out|Protocol=6|Profile=Domain|RPort=5357|App=System|[email protected],-31771|[email protected],-31772|[email protected],-31752|" "NetPres-WSDEVNTS-In-TCP-NoScope"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=6|Profile=Domain|LPort=5358|App=System|[email protected],-31773|[email protected],-31774|[email protected],-31752|" "NetPres-WSDEVNTS-Out-TCP-NoScope"="v2.10|Action=Allow|Active=FALSE|Dir=Out|Protocol=6|Profile=Domain|RPort=5358|App=System|[email protected],-31775|[email protected],-31776|[email protected],-31752|" "NetPres-WSD-In-UDP"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=17|LPort=3702|RA4=LocalSubnet|RA6=LocalSubnet|App=%SystemRoot%\\system32\\netproj.exe|[email protected],-31753|[email protected],-31756|[email protected],-31752|" "NetPres-WSD-Out-UDP"="v2.10|Action=Allow|Active=FALSE|Dir=Out|Protocol=17|RPort=3702|RA4=LocalSubnet|RA6=LocalSubnet|App=%SystemRoot%\\system32\\netproj.exe|[email protected],-31757|[email protected],-31760|[email protected],-31752|" "NetPres-In-TCP"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=6|Profile=Private|Profile=Public|RA4=LocalSubnet|RA6=LocalSubnet|App=%SystemRoot%\\system32\\netproj.exe|[email protected],-31761|[email protected],-31764|[email protected],-31752|" "NetPres-Out-TCP"="v2.10|Action=Allow|Active=FALSE|Dir=Out|Protocol=6|Profile=Private|Profile=Public|RA4=LocalSubnet|RA6=LocalSubnet|App=%SystemRoot%\\system32\\netproj.exe|[email protected],-31765|[email protected],-31768|[email protected],-31752|" "NetPres-WSDEVNT-In-TCP"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=6|Profile=Private|Profile=Public|LPort=5357|RA4=LocalSubnet|RA6=LocalSubnet|App=System|[email protected],-31769|[email protected],-31770|[email protected],-31752|" "NetPres-WSDEVNT-Out-TCP"="v2.10|Action=Allow|Active=FALSE|Dir=Out|Protocol=6|Profile=Private|Profile=Public|RPort=5357|RA4=LocalSubnet|RA6=LocalSubnet|App=System|[email protected],-31771|[email protected],-31772|[email protected],-31752|" "NetPres-WSDEVNTS-In-TCP"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=6|Profile=Private|Profile=Public|LPort=5358|RA4=LocalSubnet|RA6=LocalSubnet|App=System|[email protected],-31773|[email protected],-31774|[email protected],-31752|" "NetPres-WSDEVNTS-Out-TCP"="v2.10|Action=Allow|Active=FALSE|Dir=Out|Protocol=6|Profile=Private|Profile=Public|RPort=5358|RA4=LocalSubnet|RA6=LocalSubnet|App=System|[email protected],-31775|[email protected],-31776|[email protected],-31752|" "{64609CB3-3A8D-43CF-99CD-05D2B15630D5}"="v2.10|Action=Allow|Active=TRUE|Dir=Out|Protocol=17|Profile=Public|RPort=5355|RA4=LocalSubnet|RA6=LocalSubnet|App=%SystemRoot%\\system32\\svchost.exe|Svc=dnscache|[email protected],-28550|[email protected],-28551|[email protected],-28502|" "{59F87332-EC35-4472-A75E-B4F2EA12CAC0}"="v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=17|Profile=Public|LPort=5355|RA4=LocalSubnet|RA6=LocalSubnet|App=%SystemRoot%\\system32\\svchost.exe|Svc=dnscache|[email protected],-28548|[email protected],-28549|[email protected],-28502|" "{3CC447EA-73C1-4A4E-B7EB-792A369CBE75}"="v2.10|Action=Allow|Active=TRUE|Dir=Out|Protocol=58|Profile=Public|ICMP6=128:*|RA6=LocalSubnet|[email protected],-28546|[email protected],-28547|[email protected],-28502|" "{7B962AC2-695A-4D2E-BDB1-AF74B7BA4C39}"="v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=58|Profile=Public|ICMP6=128:*|RA6=LocalSubnet|[email protected],-28545|[email protected],-28547|[email protected],-28502|" "{BF48EA8E-8CC0-4C72-9535-5D17C067DE92}"="v2.10|Action=Allow|Active=TRUE|Dir=Out|Protocol=1|Profile=Public|ICMP4=8:*|RA4=LocalSubnet|[email protected],-28544|[email protected],-28547|[email protected],-28502|" "{51022ED7-18B8-4BB3-AAA9-AE33412AC4BD}"="v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=1|Profile=Public|ICMP4=8:*|RA4=LocalSubnet|[email protected],-28543|[email protected],-28547|[email protected],-28502|" "{7F8ED1A5-1C58-4AC4-874F-CCCE45F8414C}"="v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=6|Profile=Public|LPort=RPC-EPMap|RA4=LocalSubnet|RA6=LocalSubnet|Svc=Rpcss|[email protected],-28539|[email protected],-28542|[email protected],-28502|" "{ABED00A7-8CF8-4322-8315-E09F6393A30A}"="v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=6|Profile=Public|LPort=RPC|RA4=LocalSubnet|RA6=LocalSubnet|App=%SystemRoot%\\system32\\spoolsv.exe|Svc=Spooler|[email protected],-28535|[email protected],-28538|[email protected],-28502|" "{0DC458DE-8515-402C-A420-FF3EE3D3B577}"="v2.10|Action=Allow|Active=TRUE|Dir=Out|Protocol=17|Profile=Public|RPort=138|RA4=LocalSubnet|RA6=LocalSubnet|App=System|[email protected],-28531|[email protected],-28534|[email protected],-28502|" "{F6048220-4C0D-489E-A12A-9D184AF53572}"="v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=17|Profile=Public|LPort=138|RA4=LocalSubnet|RA6=LocalSubnet|App=System|[email protected],-28527|[email protected],-28530|[email protected],-28502|" "{7E77CFC9-AAB5-4E67-B5E9-03244D0B7658}"="v2.10|Action=Allow|Active=TRUE|Dir=Out|Protocol=17|Profile=Public|RPort=137|RA4=LocalSubnet|RA6=LocalSubnet|App=System|[email protected],-28523|[email protected],-28526|[email protected],-28502|" "{6BA67014-A584-42CB-A9A9-0097FF01EDFD}"="v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=17|Profile=Public|LPort=137|RA4=LocalSubnet|RA6=LocalSubnet|App=System|[email protected],-28519|[email protected],-28522|[email protected],-28502|" "{D880386E-9027-4971-A8BD-EF50DC5590B4}"="v2.10|Action=Allow|Active=TRUE|Dir=Out|Protocol=6|Profile=Public|RPort=445|RA4=LocalSubnet|RA6=LocalSubnet|App=System|[email protected],-28515|[email protected],-28518|[email protected],-28502|" "{32E0C13E-8444-438C-B2A7-616B34426C5B}"="v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=6|Profile=Public|LPort=445|RA4=LocalSubnet|RA6=LocalSubnet|App=System|[email protected],-28511|[email protected],-28514|[email protected],-28502|" "{92B94D80-7A6C-44B8-959F-75D15945507A}"="v2.10|Action=Allow|Active=TRUE|Dir=Out|Protocol=6|Profile=Public|RPort=139|RA4=LocalSubnet|RA6=LocalSubnet|App=System|[email protected],-28507|[email protected],-28510|[email protected],-28502|" "{465D707F-AC00-4A11-AE0F-7460C2FD397D}"="v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=6|Profile=Public|LPort=139|RA4=LocalSubnet|RA6=LocalSubnet|App=System|[email protected],-28503|[email protected],-28506|[email protected],-28502|" "{6E2D3200-DDBE-45DF-81D5-A07F8FDF55AF}"="v2.10|Action=Allow|Active=TRUE|Dir=Out|Protocol=17|Profile=Public|RPort=3702|RA4=LocalSubnet|RA6=LocalSubnet|App=%SystemRoot%\\system32\\svchost.exe|Svc=fdrespub|[email protected],-32811|[email protected],-32812|[email protected],-32752|" "{E4C56B38-D76C-47EB-B6FA-09C0C91228B1}"="v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=17|Profile=Public|LPort=3702|RA4=LocalSubnet|RA6=LocalSubnet|App=%SystemRoot%\\system32\\svchost.exe|Svc=fdrespub|[email protected],-32809|[email protected],-32810|[email protected],-32752|" "{673A68AE-B76C-4AD9-80BC-B36E40DAD91D}"="v2.10|Action=Allow|Active=TRUE|Dir=Out|Protocol=17|Profile=Public|RPort=5355|RA4=LocalSubnet|RA6=LocalSubnet|App=%SystemRoot%\\system32\\svchost.exe|Svc=dnscache|[email protected],-32805|[email protected],-32808|[email protected],-32752|" "{15761724-1194-44DB-B2E9-E70F81272EED}"="v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=17|Profile=Public|LPort=5355|RA4=LocalSubnet|RA6=LocalSubnet|App=%SystemRoot%\\system32\\svchost.exe|Svc=dnscache|[email protected],-32801|[email protected],-32804|[email protected],-32752|" "{6C5F8ECE-0B6B-458E-9EC8-A62553806361}"="v2.10|Action=Allow|Active=TRUE|Dir=Out|Protocol=17|Profile=Public|RPort=3702|RA4=LocalSubnet|RA6=LocalSubnet|App=%SystemRoot%\\system32\\svchost.exe|Svc=fdphost|[email protected],-32789|[email protected],-32792|[email protected],-32752|" "{94D21BAE-0484-465E-97BD-053097E326B6}"="v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=17|Profile=Public|LPort=3702|RA4=LocalSubnet|RA6=LocalSubnet|App=%SystemRoot%\\system32\\svchost.exe|Svc=fdphost|[email protected],-32785|[email protected],-32788|[email protected],-32752|" "{21BCFC10-6C72-44EE-970F-A4D8BDEB2CF2}"="v2.10|Action=Allow|Active=TRUE|Dir=Out|Protocol=6|Profile=Public|RA4=LocalSubnet|RA6=LocalSubnet|App=%SystemRoot%\\system32\\svchost.exe|Svc=upnphost|[email protected],-32821|[email protected],-32822|[email protected],-32752|" "{B295023D-95E9-49B9-BC54-8B8DC41611B7}"="v2.10|Action=Allow|Active=TRUE|Dir=Out|Protocol=17|Profile=Public|RPort=1900|RA4=LocalSubnet|RA6=LocalSubnet|App=%SystemRoot%\\system32\\svchost.exe|Svc=Ssdpsrv|[email protected],-32757|[email protected],-32760|[email protected],-32752|" "{67EBD724-4C6B-43F2-B814-73EEAC55B99C}"="v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=17|Profile=Public|LPort=1900|RA4=LocalSubnet|RA6=LocalSubnet|App=%SystemRoot%\\system32\\svchost.exe|Svc=Ssdpsrv|[email protected],-32753|[email protected],-32756|[email protected],-32752|" "{DAAB1D69-66AD-43DE-9286-E2E79E841E9A}"="v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=6|Profile=Public|LPort=48113|RA4=LocalSubnet|RA6=LocalSubnet|Name=maconfig_tcp|" "{95DAC414-1DF3-4920-BE23-B8CD1AC828F7}"="v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=17|Profile=Public|LPort=48113|RA4=LocalSubnet|RA6=LocalSubnet|Name=maconfig_udp|" "TCP Query User{B6E3DCA5-EB1F-42E4-AB9A-73CF1B9D1DD9}D:\\activision\\call of duty 1.4\\codmp.exe"="v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=6|Profile=Public|App=D:\\activision\\call of duty 1.4\\codmp.exe|Name=CoDMP|Desc=CoDMP|Defer=User|" "UDP Query User{108B467F-98E3-4D2A-8FC2-C6E0458D6AA7}D:\\activision\\call of duty 1.4\\codmp.exe"="v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=17|Profile=Public|App=D:\\activision\\call of duty 1.4\\codmp.exe|Name=CoDMP|Desc=CoDMP|Defer=User|" "{FF1C7038-F742-40DC-8297-1FD2EB55B56C}"="v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=6|Profile=Public|App=C:\\Windows\\System32\\PnkBstrA.exe|Name=PnkBstrA|" "{64F38761-3BFC-4A19-A777-3E2BC5634B97}"="v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=17|Profile=Public|App=C:\\Windows\\System32\\PnkBstrA.exe|Name=PnkBstrA|" "{E0B51A29-75B1-44A2-93FA-D32465C6D3B0}"="v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=6|Profile=Public|App=C:\\Windows\\System32\\PnkBstrB.exe|Name=PnkBstrB|" "{A5573362-AFDB-4D0F-9DB3-A740F4A0F51D}"="v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=17|Profile=Public|App=C:\\Windows\\System32\\PnkBstrB.exe|Name=PnkBstrB|" "TCP Query User{24832265-F141-4B71-9131-2DCD15F58992}D:\\activision\\call of duty\\codmp.exe"="v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=6|Profile=Public|App=D:\\activision\\call of duty\\codmp.exe|Name=CoDMP|Desc=CoDMP|Defer=User|" "UDP Query User{811061FF-7FB7-4308-A6A6-E355A14518F9}D:\\activision\\call of duty\\codmp.exe"="v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=17|Profile=Public|App=D:\\activision\\call of duty\\codmp.exe|Name=CoDMP|Desc=CoDMP|Defer=User|" "TCP Query User{3A8830B6-B0BB-4A12-A8D8-C0CF58B8E1A7}C:\\program files\\xfire\\xfire.exe"="v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=6|Profile=Public|App=C:\\program files\\xfire\\xfire.exe|Name=Xfire|Desc=Xfire|Defer=User|" "UDP Query User{B8DA853E-0DAE-42BB-929F-7B1D3ADAFC9E}C:\\program files\\xfire\\xfire.exe"="v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=17|Profile=Public|App=C:\\program files\\xfire\\xfire.exe|Name=Xfire|Desc=Xfire|Defer=User|" "TCP Query User{7C2AA5B5-5DBD-4557-A499-0B768E46E68F}D:\\telechargement jdownloader\\shift2u.exe"="v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=6|Profile=Public|App=D:\\telechargement jdownloader\\shift2u.exe|Name=SHIFT 2 UNLEASHED™|Desc=SHIFT 2 UNLEASHED™|Defer=User|" "UDP Query User{63112237-34C5-4D37-AEF7-0B13294CD0D2}D:\\telechargement jdownloader\\shift2u.exe"="v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=17|Profile=Public|App=D:\\telechargement jdownloader\\shift2u.exe|Name=SHIFT 2 UNLEASHED™|Desc=SHIFT 2 UNLEASHED™|Defer=User|" "TCP Query User{91A3FFC0-A9C4-4343-AD6F-717F892E19FD}D:\\activision\\call of duty 1.3\\codmp.exe"="v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=6|Profile=Public|App=D:\\activision\\call of duty 1.3\\codmp.exe|Name=CoDMP|Desc=CoDMP|Defer=User|" "UDP Query User{FDF9EBAB-23C0-4CDA-B447-8B16195716A8}D:\\activision\\call of duty 1.3\\codmp.exe"="v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=17|Profile=Public|App=D:\\activision\\call of duty 1.3\\codmp.exe|Name=CoDMP|Desc=CoDMP|Defer=User|" "TCP Query User{AB1C29E7-C625-42CC-9096-A1FEA461421B}C:\\users\\jonathan\\appdata\\local\\mediaget2\\mediaget.exe"="v2.10|Action=Block|Active=TRUE|Dir=In|Protocol=6|Profile=Public|App=C:\\users\\jonathan\\appdata\\local\\mediaget2\\mediaget.exe|Name=mediaget.exe|Desc=mediaget.exe|" "UDP Query User{978A710A-8021-4121-A6B5-BF784A95B846}C:\\users\\jonathan\\appdata\\local\\mediaget2\\mediaget.exe"="v2.10|Action=Block|Active=TRUE|Dir=In|Protocol=17|Profile=Public|App=C:\\users\\jonathan\\appdata\\local\\mediaget2\\mediaget.exe|Name=mediaget.exe|Desc=mediaget.exe|" "{385E05E8-B904-4156-A594-79F64019D2D0}"="v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=6|Profile=Public|App=C:\\Program Files\\Bonjour\\mDNSResponder.exe|Name=Service Bonjour|" "{E666EE7B-5C61-48BB-8957-546C7A61FB92}"="v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=17|Profile=Public|App=C:\\Program Files\\Bonjour\\mDNSResponder.exe|Name=Service Bonjour|" "{175F4202-E126-4A32-80C8-54945176CC02}"="v2.10|Action=Allow|Active=TRUE|Dir=In|App=C:\\Program Files\\iTunes\\iTunes.exe|Name=iTunes|Edge=TRUE|" "TCP Query User{E21BBBE0-88B6-4A3D-9E8A-90B5BF808789}D:\\cod2\\cod2mp_s.exe"="v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=6|Profile=Public|App=D:\\cod2\\cod2mp_s.exe|Name=CoD2MP_s|Desc=CoD2MP_s|Defer=User|" "UDP Query User{13E0DC0A-F2AD-4BD5-A4B5-23AEF18DF206}D:\\cod2\\cod2mp_s.exe"="v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=17|Profile=Public|App=D:\\cod2\\cod2mp_s.exe|Name=CoD2MP_s|Desc=CoD2MP_s|Defer=User|" "TCP Query User{ED89BB92-8A84-4D8D-B68D-80B19B0C2B9C}D:\\cod4\\iw3mp.exe"="v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=6|Profile=Public|App=D:\\cod4\\iw3mp.exe|Name=iw3mp|Desc=iw3mp|Defer=User|" "UDP Query User{06DA0470-C137-4086-8206-A5999088C0BF}D:\\cod4\\iw3mp.exe"="v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=17|Profile=Public|App=D:\\cod4\\iw3mp.exe|Name=iw3mp|Desc=iw3mp|Defer=User|" "{883E3477-D228-440F-956E-CB3D128DD037}"="v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=6|Profile=Public|App=C:\\Program Files\\TeamViewer\\Version6\\TeamViewer.exe|Name=Teamviewer Remote Control Application|" "{4DCEA8A4-CAC8-40B0-8A7B-E0B5BEF0EA58}"="v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=17|Profile=Public|App=C:\\Program Files\\TeamViewer\\Version6\\TeamViewer.exe|Name=Teamviewer Remote Control Application|" "{7C6F2F27-FF65-4095-B6A6-BBF1B9B390D7}"="v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=6|Profile=Public|App=C:\\Program Files\\TeamViewer\\Version6\\TeamViewer_Service.exe|Name=Teamviewer Remote Control Service|" "{F9B2BBD3-697F-41F9-9AAC-FCA64195E17C}"="v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=17|Profile=Public|App=C:\\Program Files\\TeamViewer\\Version6\\TeamViewer_Service.exe|Name=Teamviewer Remote Control Service|" "{69AF1787-3710-4EF6-A50C-5FE13E4AB141}"="v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=6|Profile=Public|RA4=LocalSubnet|RA6=LocalSubnet|App=C:\\Program Files\\ma-config.com\\maconfservice.exe|Name=maconfservice|" "{DD955206-F227-4686-8047-6E25003F14F0}"="v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=17|Profile=Public|RA4=LocalSubnet|RA6=LocalSubnet|App=C:\\Program Files\\ma-config.com\\maconfservice.exe|Name=maconfservice|" "{B0FD53C2-1E03-479C-B73A-8E5A1FBFC3FF}"="v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=6|LPort=808|App=C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\SMSvcHost.exe|Svc=NetTcpActivator|Name=@C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\\\ServiceModelEvents.dll,-2000|Desc=@C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\\\ServiceModelEvents.dll,-2001|EmbedCtxt=@C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\\\ServiceModelEvents.dll,-2002|" Windows Registry Editor Version 5.00 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\FirewallRules] "SSTP-IN-TCP"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=6|LPort=443|App=System|[email protected],-35002|[email protected],-35003|[email protected],-35001|" "Netlogon-NamedPipe-In"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=6|LPort=445|App=System|[email protected],-1003|[email protected],-1006|[email protected],-1010|" "SNMPTRAP-In-UDP"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=17|Profile=Private|Profile=Public|LPort=162|RA4=LocalSubnet|RA6=LocalSubnet|App=%SystemRoot%\\system32\\snmptrap.exe|Svc=SNMPTRAP|[email protected],-7|[email protected],-8|[email protected],-3|" "SNMPTRAP-In-UDP-NoScope"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=17|Profile=Domain|LPort=162|App=%SystemRoot%\\system32\\snmptrap.exe|Svc=SNMPTRAP|[email protected],-7|[email protected],-8|[email protected],-3|" "WMP-In-UDP"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=17|App=%ProgramFiles%\\Windows Media Player\\wmplayer.exe|[email protected],-31003|[email protected],-31006|[email protected],-31002|" "WMP-Out-UDP"="v2.10|Action=Allow|Active=FALSE|Dir=Out|Protocol=17|App=%ProgramFiles%\\Windows Media Player\\wmplayer.exe|[email protected],-31007|[email protected],-31010|[email protected],-31002|" "WMP-Out-TCP"="v2.10|Action=Allow|Active=FALSE|Dir=Out|Protocol=6|App=%ProgramFiles%\\Windows Media Player\\wmplayer.exe|[email protected],-31011|[email protected],-31014|[email protected],-31002|" "WMPNSS-QWave-In-UDP-NoScope"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=17|Profile=Domain|LPort=2177|App=%SystemRoot%\\system32\\svchost.exe|Svc=Qwave|[email protected],-31253|[email protected],-31256|[email protected],-31252|" "WMPNSS-QWave-Out-UDP-NoScope"="v2.10|Action=Allow|Active=FALSE|Dir=Out|Protocol=17|Profile=Domain|RPort=2177|App=%SystemRoot%\\system32\\svchost.exe|Svc=Qwave|[email protected],-31257|[email protected],-31260|[email protected],-31252|" "WMPNSS-QWave-In-TCP-NoScope"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=6|Profile=Domain|LPort=2177|App=%SystemRoot%\\system32\\svchost.exe|Svc=Qwave|[email protected],-31261|[email protected],-31264|[email protected],-31252|" "WMPNSS-QWave-Out-TCP-NoScope"="v2.10|Action=Allow|Active=FALSE|Dir=Out|Protocol=6|Profile=Domain|RPort=2177|App=%SystemRoot%\\system32\\svchost.exe|Svc=Qwave|[email protected],-31265|[email protected],-31268|[email protected],-31252|" "WMPNSS-HTTPSTR-In-TCP-NoScope"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=6|Profile=Domain|LPort=10243|App=System|[email protected],-31285|[email protected],-31288|[email protected],-31252|" "WMPNSS-HTTPSTR-Out-TCP-NoScope"="v2.10|Action=Allow|Active=FALSE|Dir=Out|Protocol=6|Profile=Domain|RPort=10243|App=System|[email protected],-31289|[email protected],-31292|[email protected],-31252|" "WMPNSS-WMP-In-UDP-NoScope"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=17|Profile=Domain|App=%PROGRAMFILES%\\Windows Media Player\\wmplayer.exe|[email protected],-31293|[email protected],-31296|[email protected],-31252|" "WMPNSS-WMP-Out-UDP-NoScope"="v2.10|Action=Allow|Active=FALSE|Dir=Out|Protocol=17|Profile=Domain|App=%PROGRAMFILES%\\Windows Media Player\\wmplayer.exe|[email protected],-31297|[email protected],-31300|[email protected],-31252|" "WMPNSS-WMP-Out-TCP-NoScope"="v2.10|Action=Allow|Active=FALSE|Dir=Out|Protocol=6|Profile=Domain|App=%PROGRAMFILES%\\Windows Media Player\\wmplayer.exe|[email protected],-31301|[email protected],-31304|[email protected],-31252|" "WMPNSS-In-UDP-NoScope"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=17|Profile=Domain|App=%PROGRAMFILES%\\Windows Media Player\\wmpnetwk.exe|[email protected],-31305|[email protected],-31308|[email protected],-31252|" "WMPNSS-Out-UDP-NoScope"="v2.10|Action=Allow|Active=FALSE|Dir=Out|Protocol=17|Profile=Domain|App=%PROGRAMFILES%\\Windows Media Player\\wmpnetwk.exe|[email protected],-31309|[email protected],-31312|[email protected],-31252|" "WMPNSS-In-TCP-NoScope"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=6|Profile=Domain|App=%PROGRAMFILES%\\Windows Media Player\\wmpnetwk.exe|[email protected],-31313|[email protected],-31316|[email protected],-31252|" "WMPNSS-Out-TCP-NoScope"="v2.10|Action=Allow|Active=FALSE|Dir=Out|Protocol=6|Profile=Domain|App=%PROGRAMFILES%\\Windows Media Player\\wmpnetwk.exe|[email protected],-31317|[email protected],-31320|[email protected],-31252|" "WMPNSS-QWave-In-UDP"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=17|Profile=Private|Profile=Public|LPort=2177|RA4=LocalSubnet|RA6=LocalSubnet|App=%SystemRoot%\\system32\\svchost.exe|Svc=Qwave|[email protected],-31253|[email protected],-31256|[email protected],-31252|" "WMPNSS-QWave-Out-UDP"="v2.10|Action=Allow|Active=FALSE|Dir=Out|Protocol=17|Profile=Private|Profile=Public|RPort=2177|RA4=LocalSubnet|RA6=LocalSubnet|App=%SystemRoot%\\system32\\svchost.exe|Svc=Qwave|[email protected],-31257|[email protected],-31260|[email protected],-31252|" "WMPNSS-QWave-In-TCP"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=6|Profile=Private|Profile=Public|LPort=2177|RA4=LocalSubnet|RA6=LocalSubnet|App=%SystemRoot%\\system32\\svchost.exe|Svc=Qwave|[email protected],-31261|[email protected],-31264|[email protected],-31252|" "WMPNSS-QWave-Out-TCP"="v2.10|Action=Allow|Active=FALSE|Dir=Out|Protocol=6|Profile=Private|Profile=Public|RPort=2177|RA4=LocalSubnet|RA6=LocalSubnet|App=%SystemRoot%\\system32\\svchost.exe|Svc=Qwave|[email protected],-31265|[email protected],-31268|[email protected],-31252|" "WMPNSS-SSDPSrv-In-UDP"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=17|LPort=1900|RA4=LocalSubnet|RA6=LocalSubnet|App=%SystemRoot%\\system32\\svchost.exe|Svc=ssdpsrv|[email protected],-31269|[email protected],-31272|[email protected],-31252|" "WMPNSS-SSDPSrv-Out-UDP"="v2.10|Action=Allow|Active=FALSE|Dir=Out|Protocol=17|RPort=1900|RA4=LocalSubnet|RA6=LocalSubnet|App=%SystemRoot%\\system32\\svchost.exe|Svc=ssdpsrv|[email protected],-31273|[email protected],-31276|[email protected],-31252|" "WMPNSS-UPnPHost-In-TCP"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=6|LPort=2869|RA4=LocalSubnet|RA6=LocalSubnet|App=System|[email protected],-31277|[email protected],-31280|[email protected],-31252|" "WMPNSS-UPnPHost-Out-TCP"="v2.10|Action=Allow|Active=FALSE|Dir=Out|Protocol=6|RA4=LocalSubnet|RA6=LocalSubnet|App=System|[email protected],-31281|[email protected],-31284|[email protected],-31252|" "WMPNSS-HTTPSTR-In-TCP"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=6|Profile=Private|Profile=Public|LPort=10243|RA4=LocalSubnet|RA6=LocalSubnet|App=System|[email protected],-31285|[email protected],-31288|[email protected],-31252|" "WMPNSS-HTTPSTR-Out-TCP"="v2.10|Action=Allow|Active=FALSE|Dir=Out|Protocol=6|Profile=Private|Profile=Public|RPort=10243|RA4=LocalSubnet|RA6=LocalSubnet|App=System|[email protected],-31289|[email protected],-31292|[email protected],-31252|" "WMPNSS-WMP-In-UDP"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=17|Profile=Private|Profile=Public|RA4=LocalSubnet|RA6=LocalSubnet|App=%PROGRAMFILES%\\Windows Media Player\\wmplayer.exe|[email protected],-31293|[email protected],-31296|[email protected],-31252|" "WMPNSS-WMP-Out-UDP"="v2.10|Action=Allow|Active=FALSE|Dir=Out|Protocol=17|Profile=Private|Profile=Public|RA4=LocalSubnet|RA6=LocalSubnet|App=%PROGRAMFILES%\\Windows Media Player\\wmplayer.exe|[email protected],-31297|[email protected],-31300|[email protected],-31252|" "WMPNSS-WMP-Out-TCP"="v2.10|Action=Allow|Active=FALSE|Dir=Out|Protocol=6|Profile=Private|Profile=Public|RA4=LocalSubnet|RA6=LocalSubnet|App=%PROGRAMFILES%\\Windows Media Player\\wmplayer.exe|[email protected],-31301|[email protected],-31304|[email protected],-31252|" "WMPNSS-In-UDP"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=17|Profile=Private|Profile=Public|RA4=LocalSubnet|RA6=LocalSubnet|App=%PROGRAMFILES%\\Windows Media Player\\wmpnetwk.exe|[email protected],-31305|[email protected],-31308|[email protected],-31252|" "WMPNSS-Out-UDP"="v2.10|Action=Allow|Active=FALSE|Dir=Out|Protocol=17|Profile=Private|Profile=Public|RA4=LocalSubnet|RA6=LocalSubnet|App=%PROGRAMFILES%\\Windows Media Player\\wmpnetwk.exe|[email protected],-31309|[email protected],-31312|[email protected],-31252|" "WMPNSS-In-TCP"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=6|Profile=Private|Profile=Public|RA4=LocalSubnet|RA6=LocalSubnet|App=%PROGRAMFILES%\\Windows Media Player\\wmpnetwk.exe|[email protected],-31313|[email protected],-31316|[email protected],-31252|" "WMPNSS-Out-TCP"="v2.10|Action=Allow|Active=FALSE|Dir=Out|Protocol=6|Profile=Private|Profile=Public|RA4=LocalSubnet|RA6=LocalSubnet|App=%PROGRAMFILES%\\Windows Media Player\\wmpnetwk.exe|[email protected],-31317|[email protected],-31320|[email protected],-31252|" "WMPNSS-UPnP-Out-TCP"="v2.10|Action=Allow|Active=FALSE|Dir=Out|Protocol=6|RA4=LocalSubnet|RA6=LocalSubnet|App=%SystemRoot%\\system32\\svchost.exe|Svc=upnphost|[email protected],-31321|[email protected],-31322|[email protected],-31252|" "WMPNSS-RME-HTTP-In-TCP"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=6|Profile=Domain|Profile=Private|LPort=10245|App=System|[email protected],-31501|[email protected],-31502|[email protected],-31500|Edge=TRUE|Defer=App|" "Microsoft-Windows-HomeGroup-ProvSvc-TCP3587-In"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=6|Profile=Private|LPort=3587|RA4=LocalSubnet|RA6=LocalSubnet|App=%systemroot%\\system32\\svchost.exe|Svc=p2psvc|Name=@%systemroot%\\system32\\provsvc.dll,-200|Desc=@%systemroot%\\system32\\provsvc.dll,-201|EmbedCtxt=@%systemroot%\\system32\\provsvc.dll,-202|" "Microsoft-Windows-HomeGroup-ProvSvc-TCP3587-Out"="v2.10|Action=Allow|Active=FALSE|Dir=Out|Protocol=6|Profile=Private|RPort=3587|RA4=LocalSubnet|RA6=LocalSubnet|App=%systemroot%\\system32\\svchost.exe|Svc=p2psvc|Name=@%systemroot%\\system32\\provsvc.dll,-203|Desc=@%systemroot%\\system32\\provsvc.dll,-204|EmbedCtxt=@%systemroot%\\system32\\provsvc.dll,-202|" "Microsoft-Windows-HomeGroup-ProvSvc-UDP3540-In"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=17|Profile=Private|LPort=3540|RA4=LocalSubnet|RA6=LocalSubnet|App=%systemroot%\\system32\\svchost.exe|Svc=pnrpsvc|Name=@%systemroot%\\system32\\provsvc.dll,-205|Desc=@%systemroot%\\system32\\provsvc.dll,-206|EmbedCtxt=@%systemroot%\\system32\\provsvc.dll,-202|" "Microsoft-Windows-HomeGroup-ProvSvc-UDP3540-Out"="v2.10|Action=Allow|Active=FALSE|Dir=Out|Protocol=17|Profile=Private|RPort=3540|RA4=LocalSubnet|RA6=LocalSubnet|App=%systemroot%\\system32\\svchost.exe|Svc=pnrpsvc|Name=@%systemroot%\\system32\\provsvc.dll,-207|Desc=@%systemroot%\\system32\\provsvc.dll,-208|EmbedCtxt=@%systemroot%\\system32\\provsvc.dll,-202|" "Collab-P2PHost-In-TCP"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=6|App=%SystemRoot%\\system32\\p2phost.exe|[email protected],-32003|[email protected],-32006|[email protected],-32002|Edge=TRUE|Defer=App|" "Collab-P2PHost-Out-TCP"="v2.10|Action=Allow|Active=FALSE|Dir=Out|Protocol=6|App=%SystemRoot%\\system32\\p2phost.exe|[email protected],-32007|[email protected],-32010|[email protected],-32002|" "Collab-P2PHost-WSD-In-UDP"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=17|LPort=3702|RA4=LocalSubnet|RA6=LocalSubnet|App=%SystemRoot%\\system32\\p2phost.exe|[email protected],-32011|[email protected],-32014|[email protected],-32002|" "Collab-P2PHost-WSD-Out-UDP"="v2.10|Action=Allow|Active=FALSE|Dir=Out|Protocol=17|RPort=3702|RA4=LocalSubnet|RA6=LocalSubnet|App=%SystemRoot%\\system32\\p2phost.exe|[email protected],-32015|[email protected],-32018|[email protected],-32002|" "Collab-PNRP-In-UDP"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=17|LPort=3540|App=%SystemRoot%\\system32\\svchost.exe|Svc=PNRPSvc|[email protected],-32019|[email protected],-32022|[email protected],-32002|Edge=TRUE|Defer=App|" "Collab-PNRP-Out-UDP"="v2.10|Action=Allow|Active=FALSE|Dir=Out|Protocol=17|RPort=3540|App=%SystemRoot%\\system32\\svchost.exe|Svc=PNRPSvc|[email protected],-32023|[email protected],-32026|[email protected],-32002|" "Collab-PNRP-SSDPSrv-In-UDP"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=17|LPort=1900|RA4=LocalSubnet|RA6=LocalSubnet|App=%SystemRoot%\\system32\\svchost.exe|Svc=Ssdpsrv|[email protected],-32027|[email protected],-32030|[email protected],-32002|" "Collab-PNRP-SSDPSrv-Out-UDP"="v2.10|Action=Allow|Active=FALSE|Dir=Out|Protocol=17|RPort=1900|RA4=LocalSubnet|RA6=LocalSubnet|App=%SystemRoot%\\system32\\svchost.exe|Svc=Ssdpsrv|[email protected],-32031|[email protected],-32034|[email protected],-32002|" "RemoteAssistance-In-TCP-EdgeScope"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=6|Profile=Public|App=%SystemRoot%\\system32\\msra.exe|[email protected],-33003|[email protected],-33006|[email protected],-33002|Edge=TRUE|Defer=App|" "RemoteAssistance-Out-TCP"="v2.10|Action=Allow|Active=FALSE|Dir=Out|Protocol=6|Profile=Public|App=%SystemRoot%\\system32\\msra.exe|[email protected],-33007|[email protected],-33010|[email protected],-33002|" "RemoteAssistance-PnrpSvc-UDP-In-EdgeScope"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=17|Profile=Public|LPort=3540|App=%systemroot%\\system32\\svchost.exe|Svc=pnrpsvc|[email protected],-33039|[email protected],-33040|[email protected],-33002|Edge=TRUE|Defer=App|" "RemoteAssistance-PnrpSvc-UDP-OUT"="v2.10|Action=Allow|Active=FALSE|Dir=Out|Protocol=17|Profile=Public|App=%systemroot%\\system32\\svchost.exe|Svc=pnrpsvc|[email protected],-33037|[email protected],-33038|[email protected],-33002|" "RemoteAssistance-RAServer-In-TCP-NoScope-Active"="v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=6|Profile=Domain|App=%SystemRoot%\\system32\\raserver.exe|[email protected],-33011|[email protected],-33014|[email protected],-33002|" "RemoteAssistance-RAServer-Out-TCP-NoScope-Active"="v2.10|Action=Allow|Active=TRUE|Dir=Out|Protocol=6|Profile=Domain|App=%SystemRoot%\\system32\\raserver.exe|[email protected],-33015|[email protected],-33018|[email protected],-33002|" "RemoteAssistance-DCOM-In-TCP-NoScope-Active"="v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=6|Profile=Domain|LPort=135|App=%SystemRoot%\\system32\\svchost.exe|Svc=rpcss|[email protected],-33035|[email protected],-33036|[email protected],-33002|" "RemoteAssistance-In-TCP-EdgeScope-Active"="v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=6|Profile=Domain|Profile=Private|App=%SystemRoot%\\system32\\msra.exe|[email protected],-33003|[email protected],-33006|[email protected],-33002|Edge=TRUE|Defer=App|" "RemoteAssistance-Out-TCP-Active"="v2.10|Action=Allow|Active=TRUE|Dir=Out|Protocol=6|Profile=Domain|Profile=Private|App=%SystemRoot%\\system32\\msra.exe|[email protected],-33007|[email protected],-33010|[email protected],-33002|" "RemoteAssistance-SSDPSrv-In-UDP-Active"="v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=17|Profile=Domain|Profile=Private|LPort=1900|RA4=LocalSubnet|RA6=LocalSubnet|App=%SystemRoot%\\system32\\svchost.exe|Svc=Ssdpsrv|[email protected],-33019|[email protected],-33022|[email protected],-33002|" "RemoteAssistance-SSDPSrv-Out-UDP-Active"="v2.10|Action=Allow|Active=TRUE|Dir=Out|Protocol=17|Profile=Domain|Profile=Private|RPort=1900|RA4=LocalSubnet|RA6=LocalSubnet|App=%SystemRoot%\\system32\\svchost.exe|Svc=Ssdpsrv|[email protected],-33023|[email protected],-33026|[email protected],-33002|" "RemoteAssistance-SSDPSrv-In-TCP-Active"="v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=6|Profile=Domain|Profile=Private|LPort=2869|RA4=LocalSubnet|RA6=LocalSubnet|App=%SystemRoot%\\system32\\svchost.exe|Svc=Ssdpsrv|[email protected],-33027|[email protected],-33030|[email protected],-33002|" "RemoteAssistance-SSDPSrv-Out-TCP-Active"="v2.10|Action=Allow|Active=TRUE|Dir=Out|Protocol=6|Profile=Domain|Profile=Private|RA4=LocalSubnet|RA6=LocalSubnet|App=%SystemRoot%\\system32\\svchost.exe|Svc=Ssdpsrv|[email protected],-33031|[email protected],-33034|[email protected],-33002|" "RemoteAssistance-PnrpSvc-UDP-In-EdgeScope-Active"="v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=17|Profile=Domain|Profile=Private|LPort=3540|App=%systemroot%\\system32\\svchost.exe|Svc=pnrpsvc|[email protected],-33039|[email protected],-33040|[email protected],-33002|Edge=TRUE|Defer=App|" "RemoteAssistance-PnrpSvc-UDP-OUT-Active"="v2.10|Action=Allow|Active=TRUE|Dir=Out|Protocol=17|Profile=Domain|Profile=Private|App=%systemroot%\\system32\\svchost.exe|Svc=pnrpsvc|[email protected],-33037|[email protected],-33038|[email protected],-33002|" "FPS-NB_Session-In-TCP-NoScope"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=6|Profile=Domain|LPort=139|App=System|[email protected],-28503|[email protected],-28506|[email protected],-28502|" "FPS-NB_Session-Out-TCP-NoScope"="v2.10|Action=Allow|Active=FALSE|Dir=Out|Protocol=6|Profile=Domain|RPort=139|App=System|[email protected],-28507|[email protected],-28510|[email protected],-28502|" "FPS-SMB-In-TCP-NoScope"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=6|Profile=Domain|LPort=445|App=System|[email protected],-28511|[email protected],-28514|[email protected],-28502|" "FPS-SMB-Out-TCP-NoScope"="v2.10|Action=Allow|Active=FALSE|Dir=Out|Protocol=6|Profile=Domain|RPort=445|App=System|[email protected],-28515|[email protected],-28518|[email protected],-28502|" "FPS-NB_Name-In-UDP-NoScope"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=17|Profile=Domain|LPort=137|App=System|[email protected],-28519|[email protected],-28522|[email protected],-28502|" "FPS-NB_Name-Out-UDP-NoScope"="v2.10|Action=Allow|Active=FALSE|Dir=Out|Protocol=17|Profile=Domain|RPort=137|App=System|[email protected],-28523|[email protected],-28526|[email protected],-28502|" "FPS-NB_Datagram-In-UDP-NoScope"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=17|Profile=Domain|LPort=138|App=System|[email protected],-28527|[email protected],-28530|[email protected],-28502|" "FPS-NB_Datagram-Out-UDP-NoScope"="v2.10|Action=Allow|Active=FALSE|Dir=Out|Protocol=17|Profile=Domain|RPort=138|App=System|[email protected],-28531|[email protected],-28534|[email protected],-28502|" "FPS-SpoolSvc-In-TCP-NoScope"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=6|Profile=Domain|LPort=RPC|App=%SystemRoot%\\system32\\spoolsv.exe|Svc=Spooler|[email protected],-28535|[email protected],-28538|[email protected],-28502|" "FPS-RPCSS-In-TCP-NoScope"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=6|Profile=Domain|LPort=RPC-EPMap|Svc=Rpcss|[email protected],-28539|[email protected],-28542|[email protected],-28502|" "FPS-ICMP4-ERQ-In-NoScope"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=1|Profile=Domain|ICMP4=8:*|[email protected],-28543|[email protected],-28547|[email protected],-28502|" "FPS-ICMP4-ERQ-Out-NoScope"="v2.10|Action=Allow|Active=FALSE|Dir=Out|Protocol=1|Profile=Domain|ICMP4=8:*|[email protected],-28544|[email protected],-28547|[email protected],-28502|" "FPS-ICMP6-ERQ-In-NoScope"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=58|Profile=Domain|ICMP6=128:*|[email protected],-28545|[email protected],-28547|[email protected],-28502|" "FPS-ICMP6-ERQ-Out-NoScope"="v2.10|Action=Allow|Active=FALSE|Dir=Out|Protocol=58|Profile=Domain|ICMP6=128:*|[email protected],-28546|[email protected],-28547|[email protected],-28502|" "FPS-NB_Session-In-TCP"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=6|Profile=Private|LPort=139|RA4=LocalSubnet|RA6=LocalSubnet|App=System|[email protected],-28503|[email protected],-28506|[email protected],-28502|" "FPS-NB_Session-Out-TCP"="v2.10|Action=Allow|Active=FALSE|Dir=Out|Protocol=6|Profile=Private|RPort=139|RA4=LocalSubnet|RA6=LocalSubnet|App=System|[email protected],-28507|[email protected],-28510|[email protected],-28502|" "FPS-SMB-In-TCP"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=6|Profile=Private|LPort=445|RA4=LocalSubnet|RA6=LocalSubnet|App=System|[email protected],-28511|[email protected],-28514|[email protected],-28502|" "FPS-SMB-Out-TCP"="v2.10|Action=Allow|Active=FALSE|Dir=Out|Protocol=6|Profile=Private|RPort=445|RA4=LocalSubnet|RA6=LocalSubnet|App=System|[email protected],-28515|[email protected],-28518|[email protected],-28502|" "FPS-NB_Name-In-UDP"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=17|Profile=Private|LPort=137|RA4=LocalSubnet|RA6=LocalSubnet|App=System|[email protected],-28519|[email protected],-28522|[email protected],-28502|" "FPS-NB_Name-Out-UDP"="v2.10|Action=Allow|Active=FALSE|Dir=Out|Protocol=17|Profile=Private|RPort=137|RA4=LocalSubnet|RA6=LocalSubnet|App=System|[email protected],-28523|[email protected],-28526|[email protected],-28502|" "FPS-NB_Datagram-In-UDP"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=17|Profile=Private|LPort=138|RA4=LocalSubnet|RA6=LocalSubnet|App=System|[email protected],-28527|[email protected],-28530|[email protected],-28502|" "FPS-NB_Datagram-Out-UDP"="v2.10|Action=Allow|Active=FALSE|Dir=Out|Protocol=17|Profile=Private|RPort=138|RA4=LocalSubnet|RA6=LocalSubnet|App=System|[email protected],-28531|[email protected],-28534|[email protected],-28502|" "FPS-SpoolSvc-In-TCP"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=6|Profile=Private|LPort=RPC|RA4=LocalSubnet|RA6=LocalSubnet|App=%SystemRoot%\\system32\\spoolsv.exe|Svc=Spooler|[email protected],-28535|[email protected],-28538|[email protected],-28502|" "FPS-RPCSS-In-TCP"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=6|Profile=Private|LPort=RPC-EPMap|RA4=LocalSubnet|RA6=LocalSubnet|Svc=Rpcss|[email protected],-28539|[email protected],-28542|[email protected],-28502|" "FPS-ICMP4-ERQ-In"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=1|Profile=Private|ICMP4=8:*|RA4=LocalSubnet|[email protected],-28543|[email protected],-28547|[email protected],-28502|" "FPS-ICMP4-ERQ-Out"="v2.10|Action=Allow|Active=FALSE|Dir=Out|Protocol=1|Profile=Private|ICMP4=8:*|RA4=LocalSubnet|[email protected],-28544|[email protected],-28547|[email protected],-28502|" "FPS-ICMP6-ERQ-In"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=58|Profile=Private|ICMP6=128:*|RA6=LocalSubnet|[email protected],-28545|[email protected],-28547|[email protected],-28502|" "FPS-ICMP6-ERQ-Out"="v2.10|Action=Allow|Active=FALSE|Dir=Out|Protocol=58|Profile=Private|ICMP6=128:*|RA6=LocalSubnet|[email protected],-28546|[email protected],-28547|[email protected],-28502|" "FPS-LLMNR-In-UDP"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=17|Profile=Domain|Profile=Private|LPort=5355|RA4=LocalSubnet|RA6=LocalSubnet|App=%SystemRoot%\\system32\\svchost.exe|Svc=dnscache|[email protected],-28548|[email protected],-28549|[email protected],-28502|" "FPS-LLMNR-Out-UDP"="v2.10|Action=Allow|Active=FALSE|Dir=Out|Protocol=17|Profile=Domain|Profile=Private|RPort=5355|RA4=LocalSubnet|RA6=LocalSubnet|App=%SystemRoot%\\system32\\svchost.exe|Svc=dnscache|[email protected],-28550|[email protected],-28551|[email protected],-28502|" "CoreNet-ICMP6-DU-In"="v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=58|ICMP6=1:*|App=System|[email protected],-25110|[email protected],-25112|[email protected],-25000|Edge=TRUE|" "CoreNet-ICMP6-PTB-In"="v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=58|ICMP6=2:*|App=System|[email protected],-25001|[email protected],-25007|[email protected],-25000|Edge=TRUE|" "CoreNet-ICMP6-PTB-Out"="v2.10|Action=Allow|Active=TRUE|Dir=Out|Protocol=58|ICMP6=2:*|[email protected],-25002|[email protected],-25007|[email protected],-25000|" "CoreNet-ICMP6-TE-In"="v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=58|ICMP6=3:*|App=System|[email protected],-25113|[email protected],-25115|[email protected],-25000|Edge=TRUE|" "CoreNet-ICMP6-TE-Out"="v2.10|Action=Allow|Active=TRUE|Dir=Out|Protocol=58|ICMP6=3:*|[email protected],-25114|[email protected],-25115|[email protected],-25000|" "CoreNet-ICMP6-PP-In"="v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=58|ICMP6=4:*|App=System|[email protected],-25116|[email protected],-25118|[email protected],-25000|Edge=TRUE|" "CoreNet-ICMP6-PP-Out"="v2.10|Action=Allow|Active=TRUE|Dir=Out|Protocol=58|ICMP6=4:*|[email protected],-25117|[email protected],-25118|[email protected],-25000|" "CoreNet-ICMP6-NDS-In"="v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=58|ICMP6=135:*|App=System|[email protected],-25019|[email protected],-25025|[email protected],-25000|Edge=TRUE|" "CoreNet-ICMP6-NDS-Out"="v2.10|Action=Allow|Active=TRUE|Dir=Out|Protocol=58|ICMP6=135:*|[email protected],-25020|[email protected],-25025|[email protected],-25000|" "CoreNet-ICMP6-NDA-In"="v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=58|ICMP6=136:*|App=System|[email protected],-25026|[email protected],-25032|[email protected],-25000|Edge=TRUE|" "CoreNet-ICMP6-NDA-Out"="v2.10|Action=Allow|Active=TRUE|Dir=Out|Protocol=58|ICMP6=136:*|[email protected],-25027|[email protected],-25032|[email protected],-25000|" "CoreNet-ICMP6-RA-In"="v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=58|ICMP6=134:*|RA6=fe80::/64|App=System|[email protected],-25012|[email protected],-25018|[email protected],-25000|" "CoreNet-ICMP6-RA-Out"="v2.10|Action=Allow|Active=TRUE|Dir=Out|Protocol=58|ICMP6=134:*|LA6=fe80::/64|RA6=LocalSubnet|RA6=fe80::/64|RA6=ff02::1|[email protected],-25013|[email protected],-25018|[email protected],-25000|" "CoreNet-ICMP6-RS-In"="v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=58|ICMP6=133:*|App=System|[email protected],-25009|[email protected],-25011|[email protected],-25000|" "CoreNet-ICMP6-RS-Out"="v2.10|Action=Allow|Active=TRUE|Dir=Out|Protocol=58|ICMP6=133:*|RA6=LocalSubnet|RA6=fe80::/64|RA6=ff02::2|[email protected],-25008|[email protected],-25011|[email protected],-25000|" "CoreNet-ICMP6-LQ-In"="v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=58|ICMP6=130:*|RA6=LocalSubnet|App=System|[email protected],-25061|[email protected],-25067|[email protected],-25000|" "CoreNet-ICMP6-LQ-Out"="v2.10|Action=Allow|Active=TRUE|Dir=Out|Protocol=58|ICMP6=130:*|RA6=LocalSubnet|[email protected],-25062|[email protected],-25067|[email protected],-25000|" "CoreNet-ICMP6-LR-In"="v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=58|ICMP6=131:*|RA6=LocalSubnet|App=System|[email protected],-25068|[email protected],-25074|[email protected],-25000|" "CoreNet-ICMP6-LR-Out"="v2.10|Action=Allow|Active=TRUE|Dir=Out|Protocol=58|ICMP6=131:*|RA6=LocalSubnet|[email protected],-25069|[email protected],-25074|[email protected],-25000|" "CoreNet-ICMP6-LR2-In"="v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=58|ICMP6=143:*|RA6=LocalSubnet|App=System|[email protected],-25075|[email protected],-25081|[email protected],-25000|" "CoreNet-ICMP6-LR2-Out"="v2.10|Action=Allow|Active=TRUE|Dir=Out|Protocol=58|ICMP6=143:*|RA6=LocalSubnet|[email protected],-25076|[email protected],-25081|[email protected],-25000|" "CoreNet-ICMP6-LD-In"="v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=58|ICMP6=132:*|RA6=LocalSubnet|App=System|[email protected],-25082|[email protected],-25088|[email protected],-25000|" "CoreNet-ICMP6-LD-Out"="v2.10|Action=Allow|Active=TRUE|Dir=Out|Protocol=58|ICMP6=132:*|RA6=LocalSubnet|[email protected],-25083|[email protected],-25088|[email protected],-25000|" "CoreNet-ICMP4-DUFRAG-In"="v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=1|ICMP4=3:4|App=System|[email protected],-25251|[email protected],-25257|[email protected],-25000|" "CoreNet-IGMP-In"="v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=2|App=System|[email protected],-25376|[email protected],-25382|[email protected],-25000|" "CoreNet-IGMP-Out"="v2.10|Action=Allow|Active=TRUE|Dir=Out|Protocol=2|App=System|[email protected],-25377|[email protected],-25382|[email protected],-25000|" "CoreNet-DHCP-In"="v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=17|LPort=68|RPort=67|App=%SystemRoot%\\system32\\svchost.exe|Svc=dhcp|[email protected],-25301|[email protected],-25303|[email protected],-25000|" "CoreNet-DHCP-Out"="v2.10|Action=Allow|Active=TRUE|Dir=Out|Protocol=17|LPort=68|RPort=67|App=%SystemRoot%\\system32\\svchost.exe|Svc=dhcp|[email protected],-25302|[email protected],-25303|[email protected],-25000|" "CoreNet-DHCPV6-In"="v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=17|LPort=546|RPort=547|App=%SystemRoot%\\system32\\svchost.exe|Svc=dhcp|[email protected],-25304|[email protected],-25306|[email protected],-25000|" "CoreNet-DHCPV6-Out"="v2.10|Action=Allow|Active=TRUE|Dir=Out|Protocol=17|LPort=546|RPort=547|App=%SystemRoot%\\system32\\svchost.exe|Svc=dhcp|[email protected],-25305|[email protected],-25306|[email protected],-25000|" "CoreNet-Teredo-In"="v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=17|LPort=Teredo|App=%SystemRoot%\\system32\\svchost.exe|Svc=iphlpsvc|[email protected],-25326|[email protected],-25332|[email protected],-25000|" "CoreNet-Teredo-Out"="v2.10|Action=Allow|Active=TRUE|Dir=Out|Protocol=17|App=%SystemRoot%\\system32\\svchost.exe|Svc=iphlpsvc|[email protected],-25327|[email protected],-25333|[email protected],-25000|" "CoreNet-IPHTTPS-In"="v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=6|LPort2_10=IPTLSIn|LPort2_10=IPHTTPSIn|App=System|[email protected],-25426|[email protected],-25428|[email protected],-25000|" "CoreNet-IPHTTPS-Out"="v2.10|Action=Allow|Active=TRUE|Dir=Out|Protocol=6|RPort2_10=IPTLSOut|RPort2_10=IPHTTPSOut|App=%SystemRoot%\\system32\\svchost.exe|Svc=iphlpsvc|[email protected],-25427|[email protected],-25429|[email protected],-25000|" "CoreNet-IPv6-In"="v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=41|App=System|[email protected],-25351|[email protected],-25357|[email protected],-25000|" "CoreNet-IPv6-Out"="v2.10|Action=Allow|Active=TRUE|Dir=Out|Protocol=41|App=System|[email protected],-25352|[email protected],-25358|[email protected],-25000|" "CoreNet-GP-NP-Out-TCP"="v2.10|Action=Allow|Active=TRUE|Dir=Out|Protocol=6|Profile=Domain|RPort=445|App=System|[email protected],-25401|[email protected],-25401|[email protected],-25000|" "CoreNet-GP-Out-TCP"="v2.10|Action=Allow|Active=TRUE|Dir=Out|Protocol=6|Profile=Domain|App=%SystemRoot%\\system32\\svchost.exe|[email protected],-25403|[email protected],-25404|[email protected],-25000|" "CoreNet-DNS-Out-UDP"="v2.10|Action=Allow|Active=TRUE|Dir=Out|Protocol=17|RPort=53|App=%SystemRoot%\\system32\\svchost.exe|Svc=dnscache|[email protected],-25405|[email protected],-25406|[email protected],-25000|" "CoreNet-GP-LSASS-Out-TCP"="v2.10|Action=Allow|Active=TRUE|Dir=Out|Protocol=6|Profile=Domain|App=%SystemRoot%\\system32\\lsass.exe|[email protected],-25407|[email protected],-25408|[email protected],-25000|" "NETDIS-UPnPHost-In-TCP-NoScope"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=6|Profile=Domain|LPort=2869|App=System|[email protected],-32761|[email protected],-32764|[email protected],-32752|" "NETDIS-UPnPHost-Out-TCP-NoScope"="v2.10|Action=Allow|Active=FALSE|Dir=Out|Protocol=6|Profile=Domain|App=System|[email protected],-32765|[email protected],-32768|[email protected],-32752|" "NETDIS-NB_Name-In-UDP-NoScope"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=17|Profile=Domain|LPort=137|App=System|[email protected],-32769|[email protected],-32772|[email protected],-32752|" "NETDIS-NB_Name-Out-UDP-NoScope"="v2.10|Action=Allow|Active=FALSE|Dir=Out|Protocol=17|Profile=Domain|RPort=137|App=System|[email protected],-32773|[email protected],-32776|[email protected],-32752|" "NETDIS-NB_Datagram-In-UDP-NoScope"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=17|Profile=Domain|LPort=138|App=System|[email protected],-32777|[email protected],-32780|[email protected],-32752|" "NETDIS-NB_Datagram-Out-UDP-NoScope"="v2.10|Action=Allow|Active=FALSE|Dir=Out|Protocol=17|Profile=Domain|RPort=138|App=System|[email protected],-32781|[email protected],-32784|[email protected],-32752|" "NETDIS-WSDEVNTS-In-TCP-NoScope"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=6|Profile=Domain|LPort=5358|App=System|[email protected],-32813|[email protected],-32814|[email protected],-32752|" "NETDIS-WSDEVNTS-Out-TCP-NoScope"="v2.10|Action=Allow|Active=FALSE|Dir=Out|Protocol=6|Profile=Domain|RPort=5358|App=System|[email protected],-32815|[email protected],-32816|[email protected],-32752|" "NETDIS-WSDEVNT-In-TCP-NoScope"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=6|Profile=Domain|LPort=5357|App=System|[email protected],-32817|[email protected],-32818|[email protected],-32752|" "NETDIS-WSDEVNT-Out-TCP-NoScope"="v2.10|Action=Allow|Active=FALSE|Dir=Out|Protocol=6|Profile=Domain|RPort=5357|App=System|[email protected],-32819|[email protected],-32820|[email protected],-32752|" "NETDIS-SSDPSrv-In-UDP-Active"="v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=17|Profile=Private|LPort=1900|RA4=LocalSubnet|RA6=LocalSubnet|App=%SystemRoot%\\system32\\svchost.exe|Svc=Ssdpsrv|[email protected],-32753|[email protected],-32756|[email protected],-32752|" "NETDIS-SSDPSrv-Out-UDP-Active"="v2.10|Action=Allow|Active=TRUE|Dir=Out|Protocol=17|Profile=Private|RPort=1900|RA4=LocalSubnet|RA6=LocalSubnet|App=%SystemRoot%\\system32\\svchost.exe|Svc=Ssdpsrv|[email protected],-32757|[email protected],-32760|[email protected],-32752|" "NETDIS-UPnPHost-In-TCP-Active"="v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=6|Profile=Private|LPort=2869|RA4=LocalSubnet|RA6=LocalSubnet|App=System|[email protected],-32761|[email protected],-32764|[email protected],-32752|" "NETDIS-UPnPHost-Out-TCP-Active"="v2.10|Action=Allow|Active=TRUE|Dir=Out|Protocol=6|Profile=Private|RA4=LocalSubnet|RA6=LocalSubnet|App=System|[email protected],-32765|[email protected],-32768|[email protected],-32752|" "NETDIS-UPnP-Out-TCP-Active"="v2.10|Action=Allow|Active=TRUE|Dir=Out|Protocol=6|Profile=Private|RA4=LocalSubnet|RA6=LocalSubnet|App=%SystemRoot%\\system32\\svchost.exe|Svc=upnphost|[email protected],-32821|[email protected],-32822|[email protected],-32752|" "NETDIS-NB_Name-In-UDP-Active"="v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=17|Profile=Private|LPort=137|RA4=LocalSubnet|RA6=LocalSubnet|App=System|[email protected],-32769|[email protected],-32772|[email protected],-32752|" "NETDIS-NB_Name-Out-UDP-Active"="v2.10|Action=Allow|Active=TRUE|Dir=Out|Protocol=17|Profile=Private|RPort=137|RA4=LocalSubnet|RA6=LocalSubnet|App=System|[email protected],-32773|[email protected],-32776|[email protected],-32752|" "NETDIS-NB_Datagram-In-UDP-Active"="v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=17|Profile=Private|LPort=138|RA4=LocalSubnet|RA6=LocalSubnet|App=System|[email protected],-32777|[email protected],-32780|[email protected],-32752|" "NETDIS-NB_Datagram-Out-UDP-Active"="v2.10|Action=Allow|Active=TRUE|Dir=Out|Protocol=17|Profile=Private|RPort=138|RA4=LocalSubnet|RA6=LocalSubnet|App=System|[email protected],-32781|[email protected],-32784|[email protected],-32752|" "NETDIS-FDPHOST-In-UDP-Active"="v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=17|Profile=Private|LPort=3702|RA4=LocalSubnet|RA6=LocalSubnet|App=%SystemRoot%\\system32\\svchost.exe|Svc=fdphost|[email protected],-32785|[email protected],-32788|[email protected],-32752|" "NETDIS-FDPHOST-Out-UDP-Active"="v2.10|Action=Allow|Active=TRUE|Dir=Out|Protocol=17|Profile=Private|RPort=3702|RA4=LocalSubnet|RA6=LocalSubnet|App=%SystemRoot%\\system32\\svchost.exe|Svc=fdphost|[email protected],-32789|[email protected],-32792|[email protected],-32752|" "NETDIS-LLMNR-In-UDP-Active"="v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=17|Profile=Private|LPort=5355|RA4=LocalSubnet|RA6=LocalSubnet|App=%SystemRoot%\\system32\\svchost.exe|Svc=dnscache|[email protected],-32801|[email protected],-32804|[email protected],-32752|" "NETDIS-LLMNR-Out-UDP-Active"="v2.10|Action=Allow|Active=TRUE|Dir=Out|Protocol=17|Profile=Private|RPort=5355|RA4=LocalSubnet|RA6=LocalSubnet|App=%SystemRoot%\\system32\\svchost.exe|Svc=dnscache|[email protected],-32805|[email protected],-32808|[email protected],-32752|" "NETDIS-FDRESPUB-WSD-In-UDP-Active"="v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=17|Profile=Private|LPort=3702|RA4=LocalSubnet|RA6=LocalSubnet|App=%SystemRoot%\\system32\\svchost.exe|Svc=fdrespub|[email protected],-32809|[email protected],-32810|[email protected],-32752|" "NETDIS-FDRESPUB-WSD-Out-UDP-Active"="v2.10|Action=Allow|Active=TRUE|Dir=Out|Protocol=17|Profile=Private|RPort=3702|RA4=LocalSubnet|RA6=LocalSubnet|App=%SystemRoot%\\system32\\svchost.exe|Svc=fdrespub|[email protected],-32811|[email protected],-32812|[email protected],-32752|" "NETDIS-WSDEVNTS-In-TCP-Active"="v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=6|Profile=Private|LPort=5358|RA4=LocalSubnet|RA6=LocalSubnet|App=System|[email protected],-32813|[email protected],-32814|[email protected],-32752|" "NETDIS-WSDEVNTS-Out-TCP-Active"="v2.10|Action=Allow|Active=TRUE|Dir=Out|Protocol=6|Profile=Private|RPort=5358|RA4=LocalSubnet|RA6=LocalSubnet|App=System|[email protected],-32815|[email protected],-32816|[email protected],-32752|" "NETDIS-WSDEVNT-In-TCP-Active"="v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=6|Profile=Private|LPort=5357|RA4=LocalSubnet|RA6=LocalSubnet|App=System|[email protected],-32817|[email protected],-32818|[email protected],-32752|" "NETDIS-WSDEVNT-Out-TCP-Active"="v2.10|Action=Allow|Active=TRUE|Dir=Out|Protocol=6|Profile=Private|RPort=5357|RA4=LocalSubnet|RA6=LocalSubnet|App=System|[email protected],-32819|[email protected],-32820|[email protected],-32752|" "NETDIS-SSDPSrv-In-UDP"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=17|Profile=Domain|LPort=1900|RA4=LocalSubnet|RA6=LocalSubnet|App=%SystemRoot%\\system32\\svchost.exe|Svc=Ssdpsrv|[email protected],-32753|[email protected],-32756|[email protected],-32752|" "NETDIS-SSDPSrv-Out-UDP"="v2.10|Action=Allow|Active=FALSE|Dir=Out|Protocol=17|Profile=Domain|RPort=1900|RA4=LocalSubnet|RA6=LocalSubnet|App=%SystemRoot%\\system32\\svchost.exe|Svc=Ssdpsrv|[email protected],-32757|[email protected],-32760|[email protected],-32752|" "NETDIS-UPnP-Out-TCP"="v2.10|Action=Allow|Active=FALSE|Dir=Out|Protocol=6|Profile=Domain|RA4=LocalSubnet|RA6=LocalSubnet|App=%SystemRoot%\\system32\\svchost.exe|Svc=upnphost|[email protected],-32821|[email protected],-32822|[email protected],-32752|" "NETDIS-UPnPHost-In-TCP"="v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=6|Profile=Public|LPort=2869|RA4=LocalSubnet|RA6=LocalSubnet|App=System|[email protected],-32761|[email protected],-32764|[email protected],-32752|" "NETDIS-UPnPHost-Out-TCP"="v2.10|Action=Allow|Active=TRUE|Dir=Out|Protocol=6|Profile=Public|RA4=LocalSubnet|RA6=LocalSubnet|App=System|[email protected],-32765|[email protected],-32768|[email protected],-32752|" "NETDIS-NB_Name-In-UDP"="v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=17|Profile=Public|LPort=137|RA4=LocalSubnet|RA6=LocalSubnet|App=System|[email protected],-32769|[email protected],-32772|[email protected],-32752|" "NETDIS-NB_Name-Out-UDP"="v2.10|Action=Allow|Active=TRUE|Dir=Out|Protocol=17|Profile=Public|RPort=137|RA4=LocalSubnet|RA6=LocalSubnet|App=System|[email protected],-32773|[email protected],-32776|[email protected],-32752|" "NETDIS-NB_Datagram-In-UDP"="v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=17|Profile=Public|LPort=138|RA4=LocalSubnet|RA6=LocalSubnet|App=System|[email protected],-32777|[email protected],-32780|[email protected],-32752|" "NETDIS-NB_Datagram-Out-UDP"="v2.10|Action=Allow|Active=TRUE|Dir=Out|Protocol=17|Profile=Public|RPort=138|RA4=LocalSubnet|RA6=LocalSubnet|App=System|[email protected],-32781|[email protected],-32784|[email protected],-32752|" "NETDIS-FDPHOST-In-UDP"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=17|Profile=Domain|LPort=3702|RA4=LocalSubnet|RA6=LocalSubnet|App=%SystemRoot%\\system32\\svchost.exe|Svc=fdphost|[email protected],-32785|[email protected],-32788|[email protected],-32752|" "NETDIS-FDPHOST-Out-UDP"="v2.10|Action=Allow|Active=FALSE|Dir=Out|Protocol=17|Profile=Domain|RPort=3702|RA4=LocalSubnet|RA6=LocalSubnet|App=%SystemRoot%\\system32\\svchost.exe|Svc=fdphost|[email protected],-32789|[email protected],-32792|[email protected],-32752|" "NETDIS-LLMNR-In-UDP"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=17|Profile=Domain|LPort=5355|RA4=LocalSubnet|RA6=LocalSubnet|App=%SystemRoot%\\system32\\svchost.exe|Svc=dnscache|[email protected],-32801|[email protected],-32804|[email protected],-32752|" "NETDIS-LLMNR-Out-UDP"="v2.10|Action=Allow|Active=FALSE|Dir=Out|Protocol=17|Profile=Domain|RPort=5355|RA4=LocalSubnet|RA6=LocalSubnet|App=%SystemRoot%\\system32\\svchost.exe|Svc=dnscache|[email protected],-32805|[email protected],-32808|[email protected],-32752|" "NETDIS-FDRESPUB-WSD-In-UDP"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=17|Profile=Domain|LPort=3702|RA4=LocalSubnet|RA6=LocalSubnet|App=%SystemRoot%\\system32\\svchost.exe|Svc=fdrespub|[email protected],-32809|[email protected],-32810|[email protected],-32752|" "NETDIS-FDRESPUB-WSD-Out-UDP"="v2.10|Action=Allow|Active=FALSE|Dir=Out|Protocol=17|Profile=Domain|RPort=3702|RA4=LocalSubnet|RA6=LocalSubnet|App=%SystemRoot%\\system32\\svchost.exe|Svc=fdrespub|[email protected],-32811|[email protected],-32812|[email protected],-32752|" "NETDIS-WSDEVNTS-In-TCP"="v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=6|Profile=Public|LPort=5358|RA4=LocalSubnet|RA6=LocalSubnet|App=System|[email protected],-32813|[email protected],-32814|[email protected],-32752|" "NETDIS-WSDEVNTS-Out-TCP"="v2.10|Action=Allow|Active=TRUE|Dir=Out|Protocol=6|Profile=Public|RPort=5358|RA4=LocalSubnet|RA6=LocalSubnet|App=System|[email protected],-32815|[email protected],-32816|[email protected],-32752|" "NETDIS-WSDEVNT-In-TCP"="v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=6|Profile=Public|LPort=5357|RA4=LocalSubnet|RA6=LocalSubnet|App=System|[email protected],-32817|[email protected],-32818|[email protected],-32752|" "NETDIS-WSDEVNT-Out-TCP"="v2.10|Action=Allow|Active=TRUE|Dir=Out|Protocol=6|Profile=Public|RPort=5357|RA4=LocalSubnet|RA6=LocalSubnet|App=System|[email protected],-32819|[email protected],-32820|[email protected],-32752|" "MsiScsi-In-TCP-NoScope"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=6|Profile=Domain|App=%SystemRoot%\\system32\\svchost.exe|Svc=Msiscsi|[email protected],-29003|[email protected],-29006|[email protected],-29002|" "MsiScsi-Out-TCP-NoScope"="v2.10|Action=Allow|Active=FALSE|Dir=Out|Protocol=6|Profile=Domain|App=%SystemRoot%\\system32\\svchost.exe|Svc=Msiscsi|[email protected],-29007|[email protected],-29010|[email protected],-29002|" "MsiScsi-In-TCP"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=6|Profile=Private|Profile=Public|RA4=LocalSubnet|RA6=LocalSubnet|App=%SystemRoot%\\system32\\svchost.exe|Svc=Msiscsi|[email protected],-29003|[email protected],-29006|[email protected],-29002|" "MsiScsi-Out-TCP"="v2.10|Action=Allow|Active=FALSE|Dir=Out|Protocol=6|Profile=Private|Profile=Public|RA4=LocalSubnet|RA6=LocalSubnet|App=%SystemRoot%\\system32\\svchost.exe|Svc=Msiscsi|[email protected],-29007|[email protected],-29010|[email protected],-29002|" "MSDTC-In-TCP-NoScope"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=6|Profile=Domain|App=%SystemRoot%\\system32\\msdtc.exe|[email protected],-33503|[email protected],-33506|[email protected],-33502|" "MSDTC-Out-TCP-NoScope"="v2.10|Action=Allow|Active=FALSE|Dir=Out|Protocol=6|Profile=Domain|App=%SystemRoot%\\system32\\msdtc.exe|[email protected],-33507|[email protected],-33510|[email protected],-33502|" "MSDTC-KTMRM-In-TCP-NoScope"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=6|Profile=Domain|LPort=RPC|App=%SystemRoot%\\system32\\svchost.exe|Svc=ktmrm|[email protected],-33511|[email protected],-33512|[email protected],-33502|" "MSDTC-RPCSS-In-TCP-NoScope"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=6|Profile=Domain|LPort=RPC-EPMap|App=%SystemRoot%\\system32\\svchost.exe|Svc=RPCSS|[email protected],-33513|[email protected],-33514|[email protected],-33502|" "MSDTC-In-TCP"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=6|Profile=Private|Profile=Public|RA4=LocalSubnet|RA6=LocalSubnet|App=%SystemRoot%\\system32\\msdtc.exe|[email protected],-33503|[email protected],-33506|[email protected],-33502|" "MSDTC-Out-TCP"="v2.10|Action=Allow|Active=FALSE|Dir=Out|Protocol=6|Profile=Private|Profile=Public|RA4=LocalSubnet|RA6=LocalSubnet|App=%SystemRoot%\\system32\\msdtc.exe|[email protected],-33507|[email protected],-33510|[email protected],-33502|" "MSDTC-KTMRM-In-TCP"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=6|Profile=Private|Profile=Public|LPort=RPC|RA4=LocalSubnet|RA6=LocalSubnet|App=%SystemRoot%\\system32\\svchost.exe|Svc=ktmrm|[email protected],-33511|[email protected],-33512|[email protected],-33502|" "MSDTC-RPCSS-In-TCP"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=6|Profile=Private|Profile=Public|LPort=RPC-EPMap|RA4=LocalSubnet|RA6=LocalSubnet|App=%SystemRoot%\\system32\\svchost.exe|Svc=RPCSS|[email protected],-33513|[email protected],-33514|[email protected],-33502|" "RemoteSvcAdmin-In-TCP-NoScope"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=6|Profile=Domain|LPort=RPC|App=%SystemRoot%\\system32\\services.exe|[email protected],-29503|[email protected],-29506|[email protected],-29502|" "RemoteSvcAdmin-NP-In-TCP-NoScope"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=6|Profile=Domain|LPort=445|App=System|[email protected],-29507|[email protected],-29510|[email protected],-29502|" "RemoteSvcAdmin-RPCSS-In-TCP-NoScope"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=6|Profile=Domain|LPort=RPC-EPMap|App=%SystemRoot%\\system32\\svchost.exe|Svc=RPCSS|[email protected],-29515|[email protected],-29518|[email protected],-29502|" "RemoteSvcAdmin-In-TCP"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=6|Profile=Private|Profile=Public|LPort=RPC|RA4=LocalSubnet|RA6=LocalSubnet|App=%SystemRoot%\\system32\\services.exe|[email protected],-29503|[email protected],-29506|[email protected],-29502|" "RemoteSvcAdmin-NP-In-TCP"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=6|Profile=Private|Profile=Public|LPort=445|RA4=LocalSubnet|RA6=LocalSubnet|App=System|[email protected],-29507|[email protected],-29510|[email protected],-29502|" "RemoteSvcAdmin-RPCSS-In-TCP"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=6|Profile=Private|Profile=Public|LPort=RPC-EPMap|RA4=LocalSubnet|RA6=LocalSubnet|App=%SystemRoot%\\system32\\svchost.exe|Svc=RPCSS|[email protected],-29515|[email protected],-29518|[email protected],-29502|" "PerfLogsAlerts-PLASrv-In-TCP"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=6|Profile=Private|Profile=Public|RA4=LocalSubnet|RA6=LocalSubnet|App=%systemroot%\\system32\\plasrv.exe|[email protected],-34753|[email protected],-34754|[email protected],-34752|" "PerfLogsAlerts-DCOM-In-TCP"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=6|Profile=Private|Profile=Public|LPort=135|RA4=LocalSubnet|RA6=LocalSubnet|App=%systemroot%\\system32\\svchost.exe|Svc=rpcss|[email protected],-34755|[email protected],-34756|[email protected],-34752|" "PerfLogsAlerts-PLASrv-In-TCP-NoScope"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=6|Profile=Domain|App=%systemroot%\\system32\\plasrv.exe|[email protected],-34753|[email protected],-34754|[email protected],-34752|" "PerfLogsAlerts-DCOM-In-TCP-NoScope"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=6|Profile=Domain|LPort=135|App=%systemroot%\\system32\\svchost.exe|Svc=rpcss|[email protected],-34755|[email protected],-34756|[email protected],-34752|" "WMI-RPCSS-In-TCP-NoScope"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=6|Profile=Domain|LPort=135|App=%SystemRoot%\\system32\\svchost.exe|Svc=rpcss|[email protected],-34252|[email protected],-34253|[email protected],-34251|" "WMI-WINMGMT-In-TCP-NoScope"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=6|Profile=Domain|App=%SystemRoot%\\system32\\svchost.exe|Svc=winmgmt|[email protected],-34254|[email protected],-34255|[email protected],-34251|" "WMI-WINMGMT-Out-TCP-NoScope"="v2.10|Action=Allow|Active=FALSE|Dir=Out|Protocol=6|Profile=Domain|App=%SystemRoot%\\system32\\svchost.exe|Svc=winmgmt|[email protected],-34258|[email protected],-34259|[email protected],-34251|" "WMI-ASYNC-In-TCP-NoScope"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=6|Profile=Domain|App=%systemroot%\\system32\\wbem\\unsecapp.exe|[email protected],-34256|[email protected],-34257|[email protected],-34251|" "WMI-RPCSS-In-TCP"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=6|Profile=Private|Profile=Public|LPort=135|RA4=LocalSubnet|RA6=LocalSubnet|App=%SystemRoot%\\system32\\svchost.exe|Svc=rpcss|[email protected],-34252|[email protected],-34253|[email protected],-34251|" "WMI-WINMGMT-In-TCP"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=6|Profile=Private|Profile=Public|RA4=LocalSubnet|RA6=LocalSubnet|App=%SystemRoot%\\system32\\svchost.exe|Svc=winmgmt|[email protected],-34254|[email protected],-34255|[email protected],-34251|" "WMI-WINMGMT-Out-TCP"="v2.10|Action=Allow|Active=FALSE|Dir=Out|Protocol=6|Profile=Private|Profile=Public|RA4=LocalSubnet|RA6=LocalSubnet|App=%SystemRoot%\\system32\\svchost.exe|Svc=winmgmt|[email protected],-34258|[email protected],-34259|[email protected],-34251|" "WMI-ASYNC-In-TCP"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=6|Profile=Private|Profile=Public|RA4=LocalSubnet|RA6=LocalSubnet|App=%systemroot%\\system32\\wbem\\unsecapp.exe|[email protected],-34256|[email protected],-34257|[email protected],-34251|" "PNRPMNRS-PNRP-In-UDP"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=17|LPort=3540|App=%SystemRoot%\\system32\\svchost.exe|Svc=PNRPSvc|[email protected],-34003|[email protected],-34004|[email protected],-34002|Edge=TRUE|Defer=App|" "PNRPMNRS-PNRP-Out-UDP"="v2.10|Action=Allow|Active=FALSE|Dir=Out|Protocol=17|RPort=3540|App=%SystemRoot%\\system32\\svchost.exe|Svc=PNRPSvc|[email protected],-34005|[email protected],-34006|[email protected],-34002|" "PNRPMNRS-SSDPSrv-In-UDP"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=17|LPort=1900|RA4=LocalSubnet|RA6=LocalSubnet|App=%SystemRoot%\\system32\\svchost.exe|Svc=Ssdpsrv|[email protected],-34007|[email protected],-34008|[email protected],-34002|" "PNRPMNRS-SSDPSrv-Out-UDP"="v2.10|Action=Allow|Active=FALSE|Dir=Out|Protocol=17|RPort=1900|RA4=LocalSubnet|RA6=LocalSubnet|App=%SystemRoot%\\system32\\svchost.exe|Svc=Ssdpsrv|[email protected],-34009|[email protected],-34010|[email protected],-34002|" "RemoteEventLogSvc-In-TCP-NoScope"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=6|Profile=Domain|LPort=RPC|App=%SystemRoot%\\system32\\svchost.exe|Svc=Eventlog|[email protected],-29253|[email protected],-29256|[email protected],-29252|" "RemoteEventLogSvc-NP-In-TCP-NoScope"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=6|Profile=Domain|LPort=445|App=System|[email protected],-29257|[email protected],-29260|[email protected],-29252|" "RemoteEventLogSvc-RPCSS-In-TCP-NoScope"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=6|Profile=Domain|LPort=RPC-EPMap|App=%SystemRoot%\\system32\\svchost.exe|Svc=RPCSS|[email protected],-29265|[email protected],-29268|[email protected],-29252|" "RemoteEventLogSvc-In-TCP"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=6|Profile=Private|Profile=Public|LPort=RPC|RA4=LocalSubnet|RA6=LocalSubnet|App=%SystemRoot%\\system32\\svchost.exe|Svc=Eventlog|[email protected],-29253|[email protected],-29256|[email protected],-29252|" "RemoteEventLogSvc-NP-In-TCP"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=6|Profile=Private|Profile=Public|LPort=445|RA4=LocalSubnet|RA6=LocalSubnet|App=System|[email protected],-29257|[email protected],-29260|[email protected],-29252|" "RemoteEventLogSvc-RPCSS-In-TCP"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=6|Profile=Private|Profile=Public|LPort=RPC-EPMap|RA4=LocalSubnet|RA6=LocalSubnet|App=%SystemRoot%\\system32\\svchost.exe|Svc=RPCSS|[email protected],-29265|[email protected],-29268|[email protected],-29252|" "RemoteTask-In-TCP-NoScope"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=6|Profile=Domain|LPort=RPC|App=%SystemRoot%\\system32\\svchost.exe|Svc=schedule|[email protected],-33253|[email protected],-33256|[email protected],-33252|" "RemoteTask-RPCSS-In-TCP-NoScope"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=6|Profile=Domain|LPort=RPC-EPMap|App=%SystemRoot%\\system32\\svchost.exe|Svc=RPCSS|[email protected],-33257|[email protected],-33260|[email protected],-33252|" "RemoteTask-In-TCP"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=6|Profile=Private|Profile=Public|LPort=RPC|RA4=LocalSubnet|RA6=LocalSubnet|App=%SystemRoot%\\system32\\svchost.exe|Svc=schedule|[email protected],-33253|[email protected],-33256|[email protected],-33252|" "RemoteTask-RPCSS-In-TCP"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=6|Profile=Private|Profile=Public|LPort=RPC-EPMap|RA4=LocalSubnet|RA6=LocalSubnet|App=%SystemRoot%\\system32\\svchost.exe|Svc=RPCSS|[email protected],-33257|[email protected],-33260|[email protected],-33252|" "WINRM-HTTP-In-TCP-NoScope"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=6|Profile=Domain|LPort=5985|App=System|[email protected],-30253|[email protected],-30256|[email protected],-30252|" "WINRM-HTTP-In-TCP"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=6|Profile=Private|Profile=Public|LPort=5985|RA4=LocalSubnet|RA6=LocalSubnet|App=System|[email protected],-30253|[email protected],-30256|[email protected],-30252|" "WINRM-HTTP-Compat-In-TCP-NoScope"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=6|Profile=Domain|LPort=80|App=System|[email protected],-35001|[email protected],-35002|[email protected],-30252|" "WINRM-HTTP-Compat-In-TCP"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=6|Profile=Private|Profile=Public|LPort=80|RA4=LocalSubnet|RA6=LocalSubnet|App=System|[email protected],-35001|[email protected],-35002|[email protected],-30252|" "RemoteFwAdmin-In-TCP-NoScope"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=6|Profile=Domain|LPort=RPC|App=%SystemRoot%\\system32\\svchost.exe|Svc=policyagent|[email protected],-30003|[email protected],-30006|[email protected],-30002|" "RemoteFwAdmin-RPCSS-In-TCP-NoScope"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=6|Profile=Domain|LPort=RPC-EPMap|App=%SystemRoot%\\system32\\svchost.exe|Svc=RPCSS|[email protected],-30007|[email protected],-30010|[email protected],-30002|" "RemoteFwAdmin-In-TCP"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=6|Profile=Private|Profile=Public|LPort=RPC|RA4=LocalSubnet|RA6=LocalSubnet|App=%SystemRoot%\\system32\\svchost.exe|Svc=policyagent|[email protected],-30003|[email protected],-30006|[email protected],-30002|" "RemoteFwAdmin-RPCSS-In-TCP"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=6|Profile=Private|Profile=Public|LPort=RPC-EPMap|RA4=LocalSubnet|RA6=LocalSubnet|App=%SystemRoot%\\system32\\svchost.exe|Svc=RPCSS|[email protected],-30007|[email protected],-30010|[email protected],-30002|" "RRAS-GRE-In"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=47|App=System|[email protected],-33769|[email protected],-33772|[email protected],-33752|" "RRAS-GRE-Out"="v2.10|Action=Allow|Active=FALSE|Dir=Out|Protocol=47|App=System|[email protected],-33773|[email protected],-33776|[email protected],-33752|" "RRAS-L2TP-In-UDP"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=17|LPort=1701|App=System|[email protected],-33753|[email protected],-33756|[email protected],-33752|" "RRAS-L2TP-Out-UDP"="v2.10|Action=Allow|Active=FALSE|Dir=Out|Protocol=17|RPort=1701|App=System|[email protected],-33757|[email protected],-33760|[email protected],-33752|" "RRAS-PPTP-In-TCP"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=6|LPort=1723|App=System|[email protected],-33765|[email protected],-33768|[email protected],-33752|" "RRAS-PPTP-Out-TCP"="v2.10|Action=Allow|Active=FALSE|Dir=Out|Protocol=6|RPort=1723|App=System|[email protected],-33761|[email protected],-33764|[email protected],-33752|" "RVM-VDS-In-TCP-NoScope"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=6|Profile=Domain|LPort=RPC|App=%SystemRoot%\\system32\\vds.exe|Svc=vds|[email protected],-34502|[email protected],-34503|[email protected],-34501|" "RVM-VDSLDR-In-TCP-NoScope"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=6|Profile=Domain|LPort=RPC|App=%SystemRoot%\\system32\\vdsldr.exe|[email protected],-34504|[email protected],-34505|[email protected],-34501|" "RVM-RPCSS-In-TCP-NoScope"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=6|Profile=Domain|LPort=RPC-EPMap|App=%SystemRoot%\\system32\\svchost.exe|Svc=RPCSS|[email protected],-34506|[email protected],-34507|[email protected],-34501|" "RVM-VDS-In-TCP"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=6|Profile=Private|Profile=Public|LPort=RPC|RA4=LocalSubnet|RA6=LocalSubnet|App=%SystemRoot%\\system32\\vds.exe|Svc=vds|[email protected],-34502|[email protected],-34503|[email protected],-34501|" "RVM-VDSLDR-In-TCP"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=6|Profile=Private|Profile=Public|LPort=RPC|RA4=LocalSubnet|RA6=LocalSubnet|App=%SystemRoot%\\system32\\vdsldr.exe|[email protected],-34504|[email protected],-34505|[email protected],-34501|" "RVM-RPCSS-In-TCP"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=6|Profile=Private|Profile=Public|LPort=RPC-EPMap|RA4=LocalSubnet|RA6=LocalSubnet|App=%SystemRoot%\\system32\\svchost.exe|Svc=RPCSS|[email protected],-34506|[email protected],-34507|[email protected],-34501|" "MCX-SSDPSrv-In-UDP"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=17|LPort=1900|RA4=LocalSubnet|RA6=LocalSubnet|App=%SystemRoot%\\system32\\svchost.exe|Svc=Ssdpsrv|[email protected],-30753|[email protected],-30756|[email protected],-30752|" "MCX-SSDPSrv-Out-UDP"="v2.10|Action=Allow|Active=FALSE|Dir=Out|Protocol=17|RPort=1900|RA4=LocalSubnet|RA6=LocalSubnet|App=%SystemRoot%\\system32\\svchost.exe|Svc=Ssdpsrv|[email protected],-30757|[email protected],-30760|[email protected],-30752|" "MCX-In-TCP"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=6|LPort=554|LPort=8554|LPort=8555|LPort=8556|LPort=8557|LPort=8558|RA4=LocalSubnet|RA6=LocalSubnet|App=%SystemRoot%\\ehome\\ehshell.exe|[email protected],-30761|[email protected],-30764|[email protected],-30752|" "MCX-Out-TCP"="v2.10|Action=Allow|Active=FALSE|Dir=Out|Protocol=6|RA4=LocalSubnet|RA6=LocalSubnet|App=%SystemRoot%\\ehome\\ehshell.exe|[email protected],-30765|[email protected],-30768|[email protected],-30752|" "MCX-QWave-In-UDP"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=17|LPort=2177|RA4=LocalSubnet|RA6=LocalSubnet|App=%SystemRoot%\\system32\\svchost.exe|Svc=Qwave|[email protected],-30769|[email protected],-30772|[email protected],-30752|" "MCX-QWave-Out-UDP"="v2.10|Action=Allow|Active=FALSE|Dir=Out|Protocol=17|RPort=2177|RA4=LocalSubnet|RA6=LocalSubnet|App=%SystemRoot%\\system32\\svchost.exe|Svc=Qwave|[email protected],-30773|[email protected],-30776|[email protected],-30752|" "MCX-QWave-In-TCP"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=6|LPort=2177|RA4=LocalSubnet|RA6=LocalSubnet|App=%SystemRoot%\\system32\\svchost.exe|Svc=Qwave|[email protected],-30777|[email protected],-30780|[email protected],-30752|" "MCX-QWave-Out-TCP"="v2.10|Action=Allow|Active=FALSE|Dir=Out|Protocol=6|RPort=2177|RA4=LocalSubnet|RA6=LocalSubnet|App=%SystemRoot%\\system32\\svchost.exe|Svc=Qwave|[email protected],-30781|[email protected],-30784|[email protected],-30752|" "MCX-HTTPSTR-In-TCP"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=6|LPort=10244|RA4=LocalSubnet|RA6=LocalSubnet|App=System|[email protected],-30785|[email protected],-30788|[email protected],-30752|" "MCX-TERMSRV-In-TCP"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=6|LPort=3390|RA4=LocalSubnet|RA6=LocalSubnet|App=System|[email protected],-30793|[email protected],-30796|[email protected],-30752|" "MCX-In-UDP"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=17|LPort=7777|LPort=7778|LPort=7779|LPort=7780|LPort=7781|LPort=5004|LPort=5005|LPort=50004|LPort=50005|LPort=50006|LPort=50007|LPort=50008|LPort=50009|LPort=50010|LPort=50011|LPort=50012|LPort=50013|RA4=LocalSubnet|RA6=LocalSubnet|App=%SystemRoot%\\ehome\\ehshell.exe|[email protected],-30801|[email protected],-30804|[email protected],-30752|" "MCX-Out-UDP"="v2.10|Action=Allow|Active=FALSE|Dir=Out|Protocol=17|RA4=LocalSubnet|RA6=LocalSubnet|App=%SystemRoot%\\ehome\\ehshell.exe|[email protected],-30805|[email protected],-30808|[email protected],-30752|" "MCX-MCX2SVC-Out-TCP"="v2.10|Action=Allow|Active=FALSE|Dir=Out|Protocol=6|RA4=LocalSubnet|RA6=LocalSubnet|App=%SystemRoot%\\system32\\svchost.exe|Svc=mcx2svc|[email protected],-30810|[email protected],-30811|[email protected],-30752|" "MCX-Prov-Out-TCP"="v2.10|Action=Allow|Active=FALSE|Dir=Out|Protocol=6|App=%SystemRoot%\\ehome\\mcx2prov.exe|[email protected],-30812|[email protected],-30813|[email protected],-30752|" "MCX-PlayTo-In-TCP"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=6|LPort=2869|RA4=LocalSubnet|RA6=LocalSubnet|App=System|[email protected],-30814|[email protected],-30815|[email protected],-30752|" "MCX-PlayTo-Out-TCP"="v2.10|Action=Allow|Active=FALSE|Dir=Out|Protocol=6|RA4=LocalSubnet|RA6=LocalSubnet|App=%SystemRoot%\\system32\\svchost.exe|Svc=upnphost|[email protected],-30816|[email protected],-30817|[email protected],-30752|" "MCX-McrMgr-Out-TCP"="v2.10|Action=Allow|Active=FALSE|Dir=Out|Protocol=6|App=%SystemRoot%\\ehome\\mcrmgr.exe|[email protected],-30818|[email protected],-30819|[email protected],-30752|" "MCX-PlayTo-Out-UDP"="v2.10|Action=Allow|Active=FALSE|Dir=Out|Protocol=17|LPort=1900|RA4=LocalSubnet|RA6=LocalSubnet|App=%SystemRoot%\\system32\\svchost.exe|Svc=Ssdpsrv|[email protected],-30820|[email protected],-30821|[email protected],-30752|" "MCX-FDPHost-Out-TCP"="v2.10|Action=Allow|Active=FALSE|Dir=Out|Protocol=6|RA4=LocalSubnet|RA6=LocalSubnet|App=%SystemRoot%\\system32\\svchost.exe|Svc=fdphost|[email protected],-30822|[email protected],-30823|[email protected],-30752|" "RemoteDesktop-In-TCP"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=6|LPort=3389|App=System|[email protected],-28753|[email protected],-28756|[email protected],-28752|" "WPDMTP-Out-TCP-NoScope"="v2.10|Action=Allow|Active=FALSE|Dir=Out|Protocol=6|Profile=Domain|App=%SystemRoot%\\system32\\wudfhost.exe|[email protected],-30503|[email protected],-30506|[email protected],-30502|" "WPDMTP-Out-TCP"="v2.10|Action=Allow|Active=FALSE|Dir=Out|Protocol=6|Profile=Private|Profile=Public|RA4=LocalSubnet|RA6=LocalSubnet|App=%SystemRoot%\\system32\\wudfhost.exe|[email protected],-30503|[email protected],-30506|[email protected],-30502|" "WPDMTP-SSDPSrv-In-UDP"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=17|LPort=1900|RA4=LocalSubnet|RA6=LocalSubnet|App=%SystemRoot%\\system32\\svchost.exe|Svc=Ssdpsrv|[email protected],-30507|[email protected],-30510|[email protected],-30502|" "WPDMTP-SSDPSrv-Out-UDP"="v2.10|Action=Allow|Active=FALSE|Dir=Out|Protocol=17|RPort=1900|RA4=LocalSubnet|RA6=LocalSubnet|App=%SystemRoot%\\system32\\svchost.exe|Svc=Ssdpsrv|[email protected],-30511|[email protected],-30514|[email protected],-30502|" "WPDMTP-UPnPHost-In-TCP"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=6|LPort=2869|RA4=LocalSubnet|RA6=LocalSubnet|App=System|[email protected],-30515|[email protected],-30518|[email protected],-30502|" "WPDMTP-UPnPHost-Out-TCP"="v2.10|Action=Allow|Active=FALSE|Dir=Out|Protocol=6|RA4=LocalSubnet|RA6=LocalSubnet|App=%SystemRoot%\\system32\\svchost.exe|Svc=fdphost|[email protected],-30519|[email protected],-30522|[email protected],-30502|" "WPDMTP-UPnP-Out-TCP"="v2.10|Action=Allow|Active=FALSE|Dir=Out|Protocol=6|RA4=LocalSubnet|RA6=LocalSubnet|App=%SystemRoot%\\system32\\svchost.exe|Svc=upnphost|[email protected],-30523|[email protected],-30524|[email protected],-30502|" "Microsoft-Windows-PeerDist-HttpTrans-In"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=6|LPort=80|App=SYSTEM|[email protected],-10000|[email protected],-11000|[email protected],-9000|" "Microsoft-Windows-PeerDist-HttpTrans-Out"="v2.10|Action=Allow|Active=FALSE|Dir=Out|Protocol=6|RPort=80|App=SYSTEM|[email protected],-10001|[email protected],-11001|[email protected],-9000|" "Microsoft-Windows-PeerDist-WSD-In"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=17|LPort=3702|RA4=LocalSubnet|RA6=LocalSubnet|App=%systemroot%\\system32\\svchost.exe|Svc=PeerDistSvc|[email protected],-10002|[email protected],-11002|[email protected],-9001|" "Microsoft-Windows-PeerDist-WSD-Out"="v2.10|Action=Allow|Active=FALSE|Dir=Out|Protocol=17|RPort=3702|RA4=LocalSubnet|RA6=LocalSubnet|App=%systemroot%\\system32\\svchost.exe|Svc=PeerDistSvc|[email protected],-10003|[email protected],-11003|[email protected],-9001|" "Microsoft-Windows-PeerDist-HostedServer-In"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=6|LPort=443|App=SYSTEM|[email protected],-10004|[email protected],-11004|[email protected],-9002|" "Microsoft-Windows-PeerDist-HostedServer-Out"="v2.10|Action=Allow|Active=FALSE|Dir=Out|Protocol=6|LPort=443|App=SYSTEM|[email protected],-10005|[email protected],-11005|[email protected],-9002|" "Microsoft-Windows-PeerDist-HostedClient-Out"="v2.10|Action=Allow|Active=FALSE|Dir=Out|Protocol=6|RPort=443|App=SYSTEM|[email protected],-10006|[email protected],-11006|[email protected],-9003|" "NetPres-In-TCP-NoScope"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=6|Profile=Domain|App=%SystemRoot%\\system32\\netproj.exe|[email protected],-31761|[email protected],-31764|[email protected],-31752|" "NetPres-Out-TCP-NoScope"="v2.10|Action=Allow|Active=FALSE|Dir=Out|Protocol=6|Profile=Domain|App=%SystemRoot%\\system32\\netproj.exe|[email protected],-31765|[email protected],-31768|[email protected],-31752|" "NetPres-WSDEVNT-In-TCP-NoScope"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=6|Profile=Domain|LPort=5357|App=System|[email protected],-31769|[email protected],-31770|[email protected],-31752|" "NetPres-WSDEVNT-Out-TCP-NoScope"="v2.10|Action=Allow|Active=FALSE|Dir=Out|Protocol=6|Profile=Domain|RPort=5357|App=System|[email protected],-31771|[email protected],-31772|[email protected],-31752|" "NetPres-WSDEVNTS-In-TCP-NoScope"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=6|Profile=Domain|LPort=5358|App=System|[email protected],-31773|[email protected],-31774|[email protected],-31752|" "NetPres-WSDEVNTS-Out-TCP-NoScope"="v2.10|Action=Allow|Active=FALSE|Dir=Out|Protocol=6|Profile=Domain|RPort=5358|App=System|[email protected],-31775|[email protected],-31776|[email protected],-31752|" "NetPres-WSD-In-UDP"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=17|LPort=3702|RA4=LocalSubnet|RA6=LocalSubnet|App=%SystemRoot%\\system32\\netproj.exe|[email protected],-31753|[email protected],-31756|[email protected],-31752|" "NetPres-WSD-Out-UDP"="v2.10|Action=Allow|Active=FALSE|Dir=Out|Protocol=17|RPort=3702|RA4=LocalSubnet|RA6=LocalSubnet|App=%SystemRoot%\\system32\\netproj.exe|[email protected],-31757|[email protected],-31760|[email protected],-31752|" "NetPres-In-TCP"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=6|Profile=Private|Profile=Public|RA4=LocalSubnet|RA6=LocalSubnet|App=%SystemRoot%\\system32\\netproj.exe|[email protected],-31761|[email protected],-31764|[email protected],-31752|" "NetPres-Out-TCP"="v2.10|Action=Allow|Active=FALSE|Dir=Out|Protocol=6|Profile=Private|Profile=Public|RA4=LocalSubnet|RA6=LocalSubnet|App=%SystemRoot%\\system32\\netproj.exe|[email protected],-31765|[email protected],-31768|[email protected],-31752|" "NetPres-WSDEVNT-In-TCP"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=6|Profile=Private|Profile=Public|LPort=5357|RA4=LocalSubnet|RA6=LocalSubnet|App=System|[email protected],-31769|[email protected],-31770|[email protected],-31752|" "NetPres-WSDEVNT-Out-TCP"="v2.10|Action=Allow|Active=FALSE|Dir=Out|Protocol=6|Profile=Private|Profile=Public|RPort=5357|RA4=LocalSubnet|RA6=LocalSubnet|App=System|[email protected],-31771|[email protected],-31772|[email protected],-31752|" "NetPres-WSDEVNTS-In-TCP"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=6|Profile=Private|Profile=Public|LPort=5358|RA4=LocalSubnet|RA6=LocalSubnet|App=System|[email protected],-31773|[email protected],-31774|[email protected],-31752|" "NetPres-WSDEVNTS-Out-TCP"="v2.10|Action=Allow|Active=FALSE|Dir=Out|Protocol=6|Profile=Private|Profile=Public|RPort=5358|RA4=LocalSubnet|RA6=LocalSubnet|App=System|[email protected],-31775|[email protected],-31776|[email protected],-31752|" "{64609CB3-3A8D-43CF-99CD-05D2B15630D5}"="v2.10|Action=Allow|Active=TRUE|Dir=Out|Protocol=17|Profile=Public|RPort=5355|RA4=LocalSubnet|RA6=LocalSubnet|App=%SystemRoot%\\system32\\svchost.exe|Svc=dnscache|[email protected],-28550|[email protected],-28551|[email protected],-28502|" "{59F87332-EC35-4472-A75E-B4F2EA12CAC0}"="v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=17|Profile=Public|LPort=5355|RA4=LocalSubnet|RA6=LocalSubnet|App=%SystemRoot%\\system32\\svchost.exe|Svc=dnscache|[email protected],-28548|[email protected],-28549|[email protected],-28502|" "{3CC447EA-73C1-4A4E-B7EB-792A369CBE75}"="v2.10|Action=Allow|Active=TRUE|Dir=Out|Protocol=58|Profile=Public|ICMP6=128:*|RA6=LocalSubnet|[email protected],-28546|[email protected],-28547|[email protected],-28502|" "{7B962AC2-695A-4D2E-BDB1-AF74B7BA4C39}"="v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=58|Profile=Public|ICMP6=128:*|RA6=LocalSubnet|[email protected],-28545|[email protected],-28547|[email protected],-28502|" "{BF48EA8E-8CC0-4C72-9535-5D17C067DE92}"="v2.10|Action=Allow|Active=TRUE|Dir=Out|Protocol=1|Profile=Public|ICMP4=8:*|RA4=LocalSubnet|[email protected],-28544|[email protected],-28547|[email protected],-28502|" "{51022ED7-18B8-4BB3-AAA9-AE33412AC4BD}"="v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=1|Profile=Public|ICMP4=8:*|RA4=LocalSubnet|[email protected],-28543|[email protected],-28547|[email protected],-28502|" "{7F8ED1A5-1C58-4AC4-874F-CCCE45F8414C}"="v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=6|Profile=Public|LPort=RPC-EPMap|RA4=LocalSubnet|RA6=LocalSubnet|Svc=Rpcss|[email protected],-28539|[email protected],-28542|[email protected],-28502|" "{ABED00A7-8CF8-4322-8315-E09F6393A30A}"="v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=6|Profile=Public|LPort=RPC|RA4=LocalSubnet|RA6=LocalSubnet|App=%SystemRoot%\\system32\\spoolsv.exe|Svc=Spooler|[email protected],-28535|[email protected],-28538|[email protected],-28502|" "{0DC458DE-8515-402C-A420-FF3EE3D3B577}"="v2.10|Action=Allow|Active=TRUE|Dir=Out|Protocol=17|Profile=Public|RPort=138|RA4=LocalSubnet|RA6=LocalSubnet|App=System|[email protected],-28531|[email protected],-28534|[email protected],-28502|" "{F6048220-4C0D-489E-A12A-9D184AF53572}"="v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=17|Profile=Public|LPort=138|RA4=LocalSubnet|RA6=LocalSubnet|App=System|[email protected],-28527|[email protected],-28530|[email protected],-28502|" "{7E77CFC9-AAB5-4E67-B5E9-03244D0B7658}"="v2.10|Action=Allow|Active=TRUE|Dir=Out|Protocol=17|Profile=Public|RPort=137|RA4=LocalSubnet|RA6=LocalSubnet|App=System|[email protected],-28523|[email protected],-28526|[email protected],-28502|" "{6BA67014-A584-42CB-A9A9-0097FF01EDFD}"="v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=17|Profile=Public|LPort=137|RA4=LocalSubnet|RA6=LocalSubnet|App=System|[email protected],-28519|[email protected],-28522|[email protected],-28502|" "{D880386E-9027-4971-A8BD-EF50DC5590B4}"="v2.10|Action=Allow|Active=TRUE|Dir=Out|Protocol=6|Profile=Public|RPort=445|RA4=LocalSubnet|RA6=LocalSubnet|App=System|[email protected],-28515|[email protected],-28518|[email protected],-28502|" "{32E0C13E-8444-438C-B2A7-616B34426C5B}"="v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=6|Profile=Public|LPort=445|RA4=LocalSubnet|RA6=LocalSubnet|App=System|[email protected],-28511|[email protected],-28514|[email protected],-28502|" "{92B94D80-7A6C-44B8-959F-75D15945507A}"="v2.10|Action=Allow|Active=TRUE|Dir=Out|Protocol=6|Profile=Public|RPort=139|RA4=LocalSubnet|RA6=LocalSubnet|App=System|[email protected],-28507|[email protected],-28510|[email protected],-28502|" "{465D707F-AC00-4A11-AE0F-7460C2FD397D}"="v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=6|Profile=Public|LPort=139|RA4=LocalSubnet|RA6=LocalSubnet|App=System|[email protected],-28503|[email protected],-28506|[email protected],-28502|" "{6E2D3200-DDBE-45DF-81D5-A07F8FDF55AF}"="v2.10|Action=Allow|Active=TRUE|Dir=Out|Protocol=17|Profile=Public|RPort=3702|RA4=LocalSubnet|RA6=LocalSubnet|App=%SystemRoot%\\system32\\svchost.exe|Svc=fdrespub|[email protected],-32811|[email protected],-32812|[email protected],-32752|" "{E4C56B38-D76C-47EB-B6FA-09C0C91228B1}"="v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=17|Profile=Public|LPort=3702|RA4=LocalSubnet|RA6=LocalSubnet|App=%SystemRoot%\\system32\\svchost.exe|Svc=fdrespub|[email protected],-32809|[email protected],-32810|[email protected],-32752|" "{673A68AE-B76C-4AD9-80BC-B36E40DAD91D}"="v2.10|Action=Allow|Active=TRUE|Dir=Out|Protocol=17|Profile=Public|RPort=5355|RA4=LocalSubnet|RA6=LocalSubnet|App=%SystemRoot%\\system32\\svchost.exe|Svc=dnscache|[email protected],-32805|[email protected],-32808|[email protected],-32752|" "{15761724-1194-44DB-B2E9-E70F81272EED}"="v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=17|Profile=Public|LPort=5355|RA4=LocalSubnet|RA6=LocalSubnet|App=%SystemRoot%\\system32\\svchost.exe|Svc=dnscache|[email protected],-32801|[email protected],-32804|[email protected],-32752|" "{6C5F8ECE-0B6B-458E-9EC8-A62553806361}"="v2.10|Action=Allow|Active=TRUE|Dir=Out|Protocol=17|Profile=Public|RPort=3702|RA4=LocalSubnet|RA6=LocalSubnet|App=%SystemRoot%\\system32\\svchost.exe|Svc=fdphost|[email protected],-32789|[email protected],-32792|[email protected],-32752|" "{94D21BAE-0484-465E-97BD-053097E326B6}"="v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=17|Profile=Public|LPort=3702|RA4=LocalSubnet|RA6=LocalSubnet|App=%SystemRoot%\\system32\\svchost.exe|Svc=fdphost|[email protected],-32785|[email protected],-32788|[email protected],-32752|" "{21BCFC10-6C72-44EE-970F-A4D8BDEB2CF2}"="v2.10|Action=Allow|Active=TRUE|Dir=Out|Protocol=6|Profile=Public|RA4=LocalSubnet|RA6=LocalSubnet|App=%SystemRoot%\\system32\\svchost.exe|Svc=upnphost|[email protected],-32821|[email protected],-32822|[email protected],-32752|" "{B295023D-95E9-49B9-BC54-8B8DC41611B7}"="v2.10|Action=Allow|Active=TRUE|Dir=Out|Protocol=17|Profile=Public|RPort=1900|RA4=LocalSubnet|RA6=LocalSubnet|App=%SystemRoot%\\system32\\svchost.exe|Svc=Ssdpsrv|[email protected],-32757|[email protected],-32760|[email protected],-32752|" "{67EBD724-4C6B-43F2-B814-73EEAC55B99C}"="v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=17|Profile=Public|LPort=1900|RA4=LocalSubnet|RA6=LocalSubnet|App=%SystemRoot%\\system32\\svchost.exe|Svc=Ssdpsrv|[email protected],-32753|[email protected],-32756|[email protected],-32752|" "{DAAB1D69-66AD-43DE-9286-E2E79E841E9A}"="v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=6|Profile=Public|LPort=48113|RA4=LocalSubnet|RA6=LocalSubnet|Name=maconfig_tcp|" "{95DAC414-1DF3-4920-BE23-B8CD1AC828F7}"="v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=17|Profile=Public|LPort=48113|RA4=LocalSubnet|RA6=LocalSubnet|Name=maconfig_udp|" "TCP Query User{B6E3DCA5-EB1F-42E4-AB9A-73CF1B9D1DD9}D:\\activision\\call of duty 1.4\\codmp.exe"="v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=6|Profile=Public|App=D:\\activision\\call of duty 1.4\\codmp.exe|Name=CoDMP|Desc=CoDMP|Defer=User|" "UDP Query User{108B467F-98E3-4D2A-8FC2-C6E0458D6AA7}D:\\activision\\call of duty 1.4\\codmp.exe"="v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=17|Profile=Public|App=D:\\activision\\call of duty 1.4\\codmp.exe|Name=CoDMP|Desc=CoDMP|Defer=User|" "{FF1C7038-F742-40DC-8297-1FD2EB55B56C}"="v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=6|Profile=Public|App=C:\\Windows\\System32\\PnkBstrA.exe|Name=PnkBstrA|" "{64F38761-3BFC-4A19-A777-3E2BC5634B97}"="v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=17|Profile=Public|App=C:\\Windows\\System32\\PnkBstrA.exe|Name=PnkBstrA|" "{E0B51A29-75B1-44A2-93FA-D32465C6D3B0}"="v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=6|Profile=Public|App=C:\\Windows\\System32\\PnkBstrB.exe|Name=PnkBstrB|" "{A5573362-AFDB-4D0F-9DB3-A740F4A0F51D}"="v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=17|Profile=Public|App=C:\\Windows\\System32\\PnkBstrB.exe|Name=PnkBstrB|" "TCP Query User{24832265-F141-4B71-9131-2DCD15F58992}D:\\activision\\call of duty\\codmp.exe"="v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=6|Profile=Public|App=D:\\activision\\call of duty\\codmp.exe|Name=CoDMP|Desc=CoDMP|Defer=User|" "UDP Query User{811061FF-7FB7-4308-A6A6-E355A14518F9}D:\\activision\\call of duty\\codmp.exe"="v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=17|Profile=Public|App=D:\\activision\\call of duty\\codmp.exe|Name=CoDMP|Desc=CoDMP|Defer=User|" "TCP Query User{3A8830B6-B0BB-4A12-A8D8-C0CF58B8E1A7}C:\\program files\\xfire\\xfire.exe"="v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=6|Profile=Public|App=C:\\program files\\xfire\\xfire.exe|Name=Xfire|Desc=Xfire|Defer=User|" "UDP Query User{B8DA853E-0DAE-42BB-929F-7B1D3ADAFC9E}C:\\program files\\xfire\\xfire.exe"="v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=17|Profile=Public|App=C:\\program files\\xfire\\xfire.exe|Name=Xfire|Desc=Xfire|Defer=User|" "TCP Query User{7C2AA5B5-5DBD-4557-A499-0B768E46E68F}D:\\telechargement jdownloader\\shift2u.exe"="v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=6|Profile=Public|App=D:\\telechargement jdownloader\\shift2u.exe|Name=SHIFT 2 UNLEASHED™|Desc=SHIFT 2 UNLEASHED™|Defer=User|" "UDP Query User{63112237-34C5-4D37-AEF7-0B13294CD0D2}D:\\telechargement jdownloader\\shift2u.exe"="v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=17|Profile=Public|App=D:\\telechargement jdownloader\\shift2u.exe|Name=SHIFT 2 UNLEASHED™|Desc=SHIFT 2 UNLEASHED™|Defer=User|" "TCP Query User{91A3FFC0-A9C4-4343-AD6F-717F892E19FD}D:\\activision\\call of duty 1.3\\codmp.exe"="v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=6|Profile=Public|App=D:\\activision\\call of duty 1.3\\codmp.exe|Name=CoDMP|Desc=CoDMP|Defer=User|" "UDP Query User{FDF9EBAB-23C0-4CDA-B447-8B16195716A8}D:\\activision\\call of duty 1.3\\codmp.exe"="v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=17|Profile=Public|App=D:\\activision\\call of duty 1.3\\codmp.exe|Name=CoDMP|Desc=CoDMP|Defer=User|" "UDP Query User{978A710A-8021-4121-A6B5-BF784A95B846}C:\\users\\jonathan\\appdata\\local\\mediaget2\\mediaget.exe"="v2.10|Action=Block|Active=TRUE|Dir=In|Protocol=17|Profile=Public|App=C:\\users\\jonathan\\appdata\\local\\mediaget2\\mediaget.exe|Name=mediaget.exe|Desc=mediaget.exe|" "{385E05E8-B904-4156-A594-79F64019D2D0}"="v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=6|Profile=Public|App=C:\\Program Files\\Bonjour\\mDNSResponder.exe|Name=Service Bonjour|" "{E666EE7B-5C61-48BB-8957-546C7A61FB92}"="v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=17|Profile=Public|App=C:\\Program Files\\Bonjour\\mDNSResponder.exe|Name=Service Bonjour|" "{175F4202-E126-4A32-80C8-54945176CC02}"="v2.10|Action=Allow|Active=TRUE|Dir=In|App=C:\\Program Files\\iTunes\\iTunes.exe|Name=iTunes|Edge=TRUE|" "TCP Query User{E21BBBE0-88B6-4A3D-9E8A-90B5BF808789}D:\\cod2\\cod2mp_s.exe"="v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=6|Profile=Public|App=D:\\cod2\\cod2mp_s.exe|Name=CoD2MP_s|Desc=CoD2MP_s|Defer=User|" "UDP Query User{13E0DC0A-F2AD-4BD5-A4B5-23AEF18DF206}D:\\cod2\\cod2mp_s.exe"="v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=17|Profile=Public|App=D:\\cod2\\cod2mp_s.exe|Name=CoD2MP_s|Desc=CoD2MP_s|Defer=User|" "TCP Query User{ED89BB92-8A84-4D8D-B68D-80B19B0C2B9C}D:\\cod4\\iw3mp.exe"="v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=6|Profile=Public|App=D:\\cod4\\iw3mp.exe|Name=iw3mp|Desc=iw3mp|Defer=User|" "UDP Query User{06DA0470-C137-4086-8206-A5999088C0BF}D:\\cod4\\iw3mp.exe"="v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=17|Profile=Public|App=D:\\cod4\\iw3mp.exe|Name=iw3mp|Desc=iw3mp|Defer=User|" "{883E3477-D228-440F-956E-CB3D128DD037}"="v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=6|Profile=Public|App=C:\\Program Files\\TeamViewer\\Version6\\TeamViewer.exe|Name=Teamviewer Remote Control Application|" "{4DCEA8A4-CAC8-40B0-8A7B-E0B5BEF0EA58}"="v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=17|Profile=Public|App=C:\\Program Files\\TeamViewer\\Version6\\TeamViewer.exe|Name=Teamviewer Remote Control Application|" "{7C6F2F27-FF65-4095-B6A6-BBF1B9B390D7}"="v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=6|Profile=Public|App=C:\\Program Files\\TeamViewer\\Version6\\TeamViewer_Service.exe|Name=Teamviewer Remote Control Service|" "{F9B2BBD3-697F-41F9-9AAC-FCA64195E17C}"="v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=17|Profile=Public|App=C:\\Program Files\\TeamViewer\\Version6\\TeamViewer_Service.exe|Name=Teamviewer Remote Control Service|" "{69AF1787-3710-4EF6-A50C-5FE13E4AB141}"="v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=6|Profile=Public|RA4=LocalSubnet|RA6=LocalSubnet|App=C:\\Program Files\\ma-config.com\\maconfservice.exe|Name=maconfservice|" "{DD955206-F227-4686-8047-6E25003F14F0}"="v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=17|Profile=Public|RA4=LocalSubnet|RA6=LocalSubnet|App=C:\\Program Files\\ma-config.com\\maconfservice.exe|Name=maconfservice|" "{B0FD53C2-1E03-479C-B73A-8E5A1FBFC3FF}"="v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=6|LPort=808|App=C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\SMSvcHost.exe|Svc=NetTcpActivator|Name=@C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\\\ServiceModelEvents.dll,-2000|Desc=@C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\\\ServiceModelEvents.dll,-2001|EmbedCtxt=@C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\\\ServiceModelEvents.dll,-2002|" Windows Registry Editor Version 5.00 [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{DBC80044-A445-435b-BC74-9C25C1C588A9}] "NoExplorer"=dword:00000001 Windows Registry Editor Version 5.00 [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{FCBCCB87-9224-4B8D-B117-F56D924BEB18}] @="TBSB07458" "NoExplorer"=dword:00000001 Windows Registry Editor Version 5.00 [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Toolbar] "{8E5E2654-AD2D-48bf-AC2D-D17F00898D06}"=hex: "{C86FF9FA-AEED-451B-A9CC-39A53173AE2E}"=hex:00 Windows Registry Editor Version 5.00 [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Extensions\{C86FF9FA-AEED-451B-A9CC-39A53173AE2E}] "ButtonText"="Free software Gooofull toolbar" "CLSID"="{1FBA04EE-3024-11d2-8F1F-0000F87ABD16}" "Default Visible"="yes" "HotIcon"="C:\\Program Files\\Audiosurf\\mybarnsm3028.tmp\\favicon.ico" "Icon"="C:\\Program Files\\Audiosurf\\mybarnsm3028.tmp\\favicon.ico" "MenuStatusBar"="Free software Gooofull toolbar" "MenuText"="Free software Gooofull toolbar" "ClsidExtension"="{C86FF9FA-AEED-451B-A9CC-39A53173AE2E}" Windows Registry Editor Version 5.00 [HKEY_CURRENT_USER\Software\AVG] [HKEY_CURRENT_USER\Software\AVG\AVG10] "VerChe"=dword:00000006 [HKEY_CURRENT_USER\Software\AVG\AVG10\config] "dialog.shown"=dword:00000001 [HKEY_CURRENT_USER\Software\AVG\AVG10\Dialogs] [HKEY_CURRENT_USER\Software\AVG\AVG10\Dialogs\Layout] "COnDemandMulti"=hex:2c,00,00,00,00,00,00,00,01,00,00,00,ff,ff,ff,ff,ff,ff,ff,\ ff,ff,ff,ff,ff,ff,ff,ff,ff,58,01,00,00,b4,00,00,00,a8,03,00,00,e4,02,00,00 [HKEY_CURRENT_USER\Software\AVG\AVG10\Dialogs\ListCtrl] [HKEY_CURRENT_USER\Software\AVG\AVG10\Dialogs\ListCtrl\ondemandmulti] "ColumnSize"=hex:3f,01,00,00,b4,00,00,00,64,00,00,00 [HKEY_CURRENT_USER\Software\AVG\AVG10\Dialogs\ListCtrl\resultinfections] "ColumnSize"=hex:14,00,00,00,2c,01,00,00,c8,00,00,00,90,01,00,00 [HKEY_CURRENT_USER\Software\AVG\AVG10\MainWnd] "WndPos"=hex:2c,00,00,00,02,00,00,00,03,00,00,00,ff,ff,ff,ff,ff,ff,ff,ff,ff,ff,\ ff,ff,ff,ff,ff,ff,c6,00,00,00,aa,00,00,00,9a,04,00,00,4d,03,00,00,16,71,f0,\ 4f Windows Registry Editor Version 5.00 [HKEY_LOCAL_MACHINE\Software\AVG] [HKEY_LOCAL_MACHINE\Software\AVG\AVG IDS] [HKEY_LOCAL_MACHINE\Software\AVG\AVG IDS\IDS] "PersistentHandler"=hex:ab,00,02,8d,32,8c,11,50,d6,0d,b4,4d,3c,64,8a,fa,f8,5d,\ dc,12,43,01,3e,a2 "PersistentState"=dword:00000001 "protectDate"="March 25, 2011" "detectionSync"="10.0.0.367" "ConfigurationHandler"=hex:ab,00,02,8d,32,a5,11,50,d6,0d,b4,4d,3c,64,8a,fa,f8,\ 5d,42,12,43,ef,3e,a2 [HKEY_LOCAL_MACHINE\Software\AVG\AVG IDS\IDS\config] "3833790902"=dword:615306c3 "286555046"=dword:d7f5f90a "3916498261"=dword:89d21e99 "1738336256"=dword:08a67f83 "2508776083"=dword:4b5c52f3 "3419267315"=dword:f885246c "636049564"=dword:617908ad [HKEY_LOCAL_MACHINE\Software\AVG\AVG IDS\IDS\UI] quand au programme TFC, il ne veut pas se lancer erreur java runtime... ca m'est deja arrivé au part avant avec certains logiciel rien a faire, j'ai bon désinstaller tout les java, le re-telecharger sur le site officiel, il me met des erreur lors de l'instalation "neither command line parameter specified is an existing directory" meme avec la version OFFLINE --' impossible de l'instaler ce %µ$*()"@ de java
  5. Bonsoir a toi et merci pour ta réponse, (deso mais bcp de travail :/) voici le rapport AD-R: ======= RAPPORT D'AD-REMOVER 2.0.0.2,G | UNIQUEMENT XP/VISTA/7 ======= Mis à jour par TeamXscript le 12/04/11 Contact: AdRemover[DOT]contact[AT]gmail[DOT]com Site web: http://www.teamxscript.org C:\Program Files\Ad-Remover\main.exe (CLEAN [1]) -> Lancé à 02:20:47 le 16/07/2011, Mode normal Microsoft Windows 7 Édition Intégrale (X86) Jonathan@JONATHAN-PC (System manufacturer System Product Name) ============== ACTION(S) ============== Dossier supprimé: C:\Users\Jonathan\AppData\LocalLow\Toolbar4 (!) -- Fichiers temporaires supprimés. Clé supprimée: HKLM\Software\Conduit Clé supprimée: HKCU\Software\Conduit Clé supprimée: HKCU\Software\Microsoft\Internet Explorer\SearchScopes\{0ECDF796-C2DC-4d79-A620-CCE0C0A66CC9} Valeur supprimée: HKCU\Software\Microsoft\Internet Explorer\URLSearchHooks|{CA3EB689-8F09-4026-AA10-B9534C691CE0} ============== SCAN ADDITIONNEL ============== **** Mozilla Firefox Version [5.0 (fr)] **** HKLM_MozillaPlugins\@nvidia.com/3DVision (x) HKLM_MozillaPlugins\@nvidia.com/3DVisionStreaming (x) HKLM_MozillaPlugins\Adobe Reader (x) Searchplugins\bing.xml ( hxxp://www.bing.com/search) Components\browsercomps.dll (Mozilla Foundation) -- C:\Users\Jonathan\AppData\Roaming\Mozilla\FireFox\Profiles\ag3yf7dt.default -- Extensions\[email protected] (cacaoweb) Prefs.js - browser.download.dir, C:\\Users\\Jonathan\\Desktop Prefs.js - browser.download.lastDir, C:\\Users\\Jonathan\\Desktop Prefs.js - browser.search.defaultenginename, Facemoods Search Prefs.js - browser.search.selectedEngine, Google Prefs.js - browser.startup.homepage, hxxp://www.google.be/ Prefs.js - browser.startup.homepage_override.buildID, 20110615151330 Prefs.js - browser.startup.homepage_override.mstone, rv:5.0 Prefs.js - keyword.URL, hxxp://www.gooofullsearch.com/google?cx=partner-pub-6446514721158383:do3tst-6a03&cof=FORID%3A10&ie=UTF-8&hl... ======================================== **** Internet Explorer Version [8.0.7600.16385] **** HKCU_Main|Default_Page_URL - hxxp://www.microsoft.com/isapi/redir.dll?prd=ie&pver=6&ar=msnhome HKCU_Main|Default_Search_URL - hxxp://www.microsoft.com/isapi/redir.dll?prd=ie&ar=iesearch HKCU_Main|SearchAssistant - hxxp://roonic.com/results.html?q=%s&sa=Search&cx=partner-pub-0345395751421741:y8d2vrh2u6t&cof=FORID:10&ie=UTF-8 HKCU_Main|Search bar - hxxp://go.microsoft.com/fwlink/?linkid=54896 HKCU_Main|Start Page - hxxp://fr.msn.com/ HKLM_Main|Default_Page_URL - hxxp://go.microsoft.com/fwlink/?LinkId=54896 HKLM_Main|Default_Search_URL - hxxp://www.microsoft.com/isapi/redir.dll?prd=ie&ar=iesearch HKLM_Main|Search bar - hxxp://search.msn.com/spbasic.htm HKLM_Main|Search Page - hxxp://www.microsoft.com/isapi/redir.dll?prd=ie&ar=iesearch HKLM_Main|Start Page - hxxp://fr.msn.com/ HKCU_SearchScopes\{0633EE93-1111-472f-A0FF-E1416B8B2E3B} - "Google Customized Web Search" (hxxp://www.gooofullsearch.com/google?q={searchTerms}) HKCU_SearchScopes\{0D7562AE-8EF6-416d-A838-AB665251703A} - "Facemoods Search" (hxxp://start.facemoods.com/?a=ddrnw&s={searchTerms}&f=4) HKCU_Toolbar\WebBrowser|{C86FF9FA-AEED-451B-A9CC-39A53173AE2E} (C:\Program Files\Audiosurf\mybarnsm3028.tmp\tbcore3.dll) HKLM_Toolbar|{8E5E2654-AD2D-48bf-AC2D-D17F00898D06} (C:\Program Files\AVAST Software\Avast\aswWebRepIE.dll) HKLM_Toolbar|{C86FF9FA-AEED-451B-A9CC-39A53173AE2E} (C:\Program Files\Audiosurf\mybarnsm3028.tmp\tbcore3.dll) HKLM_ElevationPolicy\{07d873dc-b9b9-44f5-af0b-fb59fa54fb7a} - C:\Windows\System32\wpcer.exe (x) HKLM_ElevationPolicy\{0a402d70-1f10-4ae7-bec9-286a98240695} - C:\Windows\System32\winfxdocobj.exe (x) HKLM_ElevationPolicy\{11AF66E1-6BDE-4AA0-A061-65188608936B} - C:\Program Files\Audiosurf\mybarnsm3028.tmp\PlayerPlug.exe (?) HKLM_ElevationPolicy\{3B9A6E32-36C9-4946-B78C-3F58E3785EC1} - D:\bin\unpack200.exe (x) HKLM_ElevationPolicy\{44D1B085-E495-4b5f-9EE6-34795C46E7E7} - D:\bin\jp2launcher.exe (x) HKLM_ElevationPolicy\{5852F5ED-8BF4-11D4-A245-0080C6F74284} - D:\bin\javaws.exe (x) HKLM_ElevationPolicy\{628F3201-34D0-49C0-BB9A-82A26AEFB291} - C:\Program Files\Audiosurf\mybarnsm3028.tmp\TbHelper2.exe (?) HKLM_ElevationPolicy\{70f641fd-9ffc-4d5b-a4dc-962af4ed7999} - C:\Program Files\Internet Explorer\iedw.exe (x) HKLM_ElevationPolicy\{973F1DA1-9BE8-49C1-A68D-EAA0D9847898} - C:\Program Files\Audiosurf\mybarnsm3028.tmp\PropMgrAsync.exe (?) HKLM_ElevationPolicy\{dc6bf185-7ae4-444e-8c35-e447b0d2bd1e} - C:\Windows\System32\notepad.exe (?) HKLM_Extensions\{11F19C45-9675-488A-A8E0-8E8234DC245D} - "Download Video" (C:\Program Files\Tomato\FLV Player\MDIEEx.dll,201) HKLM_Extensions\{C86FF9FA-AEED-451B-A9CC-39A53173AE2E} - "Free software Gooofull toolbar" (C:\Program Files\Audiosurf\mybarnsm3028.tmp\favicon.ico) BHO\{761497BB-D6F0-462C-B6EB-D4DAF1D92D43} (?) BHO\{8E5E2654-AD2D-48bf-AC2D-D17F00898D06} - "avast! WebRep" (C:\Program Files\AVAST Software\Avast\aswWebRepIE.dll) BHO\{DBC80044-A445-435b-BC74-9C25C1C588A9} (?) BHO\{FCBCCB87-9224-4B8D-B117-F56D924BEB18} - "TBSB07458 Class" (C:\Program Files\Audiosurf\mybarnsm3028.tmp\tbcore3.dll) ======================================== C:\Program Files\Ad-Remover\Quarantine: 3 Fichier(s) C:\Program Files\Ad-Remover\Backup: 14 Fichier(s) C:\Ad-Report-CLEAN[1].txt - 16/07/2011 02:20:59 (5261 Octet(s)) Fin à: 02:21:29, 16/07/2011 ============== E.O.F ============== RAPPORT ZHPDIAG: Rapport de ZHPDiag v1.27.2405 par Nicolas Coolman, Update du 08/07/2011 Run by Jonathan at 16/07/2011 02:26:20 Web site : ZHPDiag Outil de diagnostic ---\\ Web Browser MSIE: Internet Explorer v8.0.7600.16385 MFIE: Mozilla Firefox 5.0 v (Defaut) GCIE: Google Chrome v12.0.742.122 ---\\ System Information Windows 7 Ultimate Edition, 32-bit (Build 7600) Processor: x86 Family 16 Model 4 Stepping 2, AuthenticAMD Operating System: 32 Bits Boot mode: Normal (Normal boot) Total RAM: 3071 MB (72% free) System Restore: Désactivé (Disabled) System drive C: has 7 GB (24%) free of 30 GB ---\\ Logged in mode Computer Name: JONATHAN-PC User Name: Jonathan All Users Names: Jonathan, Administrateur, Admin, Unselected Option: None Logged in as Administrator ---\\ Environnement Variables ~ %AppData%=C:\Users\Jonathan\AppData\Roaming\ ~ %Desktop%=C:\Users\Jonathan\Desktop\ ~ %Favorites%=C:\Users\Jonathan\Favorites\ ~ %LocalAppData%=C:\Users\Jonathan\AppData\Local\ ~ %StartMenu%=C:\Users\Jonathan\AppData\Roaming\Microsoft\Windows\Start Menu\ ---\\ DOS/Devices C:\ Hard drive, Flash drive, Thumb drive (Free 7 Go of 30 Go) D:\ Hard drive, Flash drive, Thumb drive (Free 158 Go of 203 Go) E:\ Hard drive, Flash drive, Thumb drive (Free 0 Go of 0 Go) F:\ CD-ROM drive (Not Inserted) G:\ CD-ROM drive (Not Inserted) ---\\ Security Center & Tools Informations [HKLM\SOFTWARE\Microsoft\Security Center] AntiSpywareOverride: OK [HKLM\SOFTWARE\Microsoft\Security Center] AntiVirusOverride: Modified [HKLM\SOFTWARE\Microsoft\Security Center] FirewallDisableNotify: OK [HKLM\SOFTWARE\Microsoft\Security Center] FirewallOverride: Modified [HKLM\SOFTWARE\Microsoft\Security Center] UacDisableNotify: Modified [HKLM\SOFTWARE\Microsoft\Security Center\Svc] AntiSpywareOverride: OK [HKLM\SOFTWARE\Microsoft\Security Center\Svc] AntiVirusOverride: OK [HKLM\SOFTWARE\Microsoft\Security Center\Svc] AntiVirusDisableNotify: OK [HKLM\SOFTWARE\Microsoft\Security Center\Svc] FirewallDisableNotify: OK [HKLM\SOFTWARE\Microsoft\Security Center\Svc] FirewallOverride: OK [HKLM\SOFTWARE\Microsoft\Security Center\Svc] UpdatesDisableNotify: OK [HKLM\SOFTWARE\Microsoft\Security Center\Svc] UacDisableNotify: OK [HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System] NoActiveDesktopChanges: OK [HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer] NoFolderOptions: OK [HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer] NoDesktop: OK [HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer] NoStartMenuSubFolder: OK [HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer] NoResolveSearch: Modified [HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer] NoClose: OK [HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system] DisableTaskMgr: OK [HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system] DisableRegistryTools: OK [HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system] NoDispScrSavPage: OK [HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Folder\Hidden\NOHIDDEN] CheckedValue: OK [HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced] Start_ShowSearch: OK [HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings] WarnOnHTTPSToHTTPRedirect: OK [HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Folder\Hidden\SHOWALL] CheckedValue: OK [HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system] EnableLUA: OK [HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Associations] Application: OK [HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon] Shell: OK ---\\ Recherche particulière de fichiers génériques [MD5.2626FC9755BE22F805D3CFA0CE3EE727] - (.Microsoft Corporation - Explorateur Windows.) (.25/03/2011 - 06:45:39.) -- C:\Windows\Explorer.exe [2614272] [MD5.B5C5DCAD3899512020D135600129D665] - (.Microsoft Corporation - Application de démarrage de Windows.) (.14/07/2009 - 02:14:45.) -- C:\Windows\system32\Wininit.exe [96256] [MD5.27CDAF355CCE3762C7F13719E814418B] - (.Microsoft Corporation - Extensions Internet pour Win32.) (.9/07/2011 - 20:31:50.) -- C:\Windows\system32\wininet.dll [981504] [MD5.37CDB7E72EB66BA85A87CBE37E7F03FD] - (.Microsoft Corporation - Application d’ouverture de session Windows.) (.25/03/2011 - 07:17:59.) -- C:\Windows\system32\Winlogon.exe [285696] [MD5.338C86357871C167A96AB976519BF59E] - (.Microsoft Corporation - ATAPI IDE Miniport Driver.) (.14/07/2009 - 02:26:15.) -- C:\Windows\system32\drivers\atapi.sys [21584] [MD5.3795DCD21F740EE799FB7223234215AF] - (.Microsoft Corporation - Pilote du système de fichiers NT.) (.14/07/2009 - 02:20:44.) -- C:\Windows\system32\drivers\ntfs.sys [1210432] ---\\ Etat des fichiers cachés (Caché/Total) ~ Mes images (My Pictures) : 1/150 ~ Mes musiques (My Musics) : 3/8 ~ Mes Videos (My Videos) : 1/2 ~ Mes Favoris (My Favorites) : 6/23 ~ Mes Documents (My Documents) : 1/81 ~ Mon Bureau (My Desktop) : 1/198 ~ Menu demarrer (Programs) : 7/29 ---\\ Processus lancés [MD5.51138BEEA3E2C21EC44D0932C71762A8] - (...) -- C:\Windows\System32\rundll32.exe [44544] [MD5.4C6898F15701AE7C41775C14E423FE25] - (.AVAST Software - avast! Antivirus.) -- C:\Program Files\AVAST Software\Avast\AvastUI.exe [3459712] [MD5.6C9CD3ECBA6732661C8BBE37A877A2BD] - (.Mozilla Corporation - Firefox.) -- C:\Program Files\Mozilla Firefox\firefox.exe [924632] [MD5.4486AD32BB05628967695FCA1BADD46E] - (.Mozilla Corporation - Plugin Container for Firefox.) -- C:\Program Files\Mozilla Firefox\plugin-container.exe [16856] [MD5.5FE2221EC55549B52427BF37E9173E47] - (.Nicolas Coolman - Diagnostic Tool.) -- C:\Program Files\ZHPDiag\ZHPDiag.exe [656384] [MD5.B0DA80FF42A0819D162A86612896AAF2] - (.Microsoft Corporation - Windows Update.) -- C:\Windows\system32\wuauclt.exe [47104] ---\\ Mozilla Firefox, Plugins,Demarrage,Recherche,Extensions (P2,M0,M1,M2,M3) C:\Users\Jonathan\AppData\Roaming\Mozilla\Firefox\Profiles\ag3yf7dt.default\prefs.js M3 - MFPP: Plugins - [Jonathan] -- C:\Program Files\Mozilla FireFox\searchplugins\amazon-france.xml M3 - MFPP: Plugins - [Jonathan] -- C:\Program Files\Mozilla FireFox\searchplugins\bing.xml M3 - MFPP: Plugins - [Jonathan] -- C:\Program Files\Mozilla FireFox\searchplugins\cnrtl-tlfi-fr.xml M3 - MFPP: Plugins - [Jonathan] -- C:\Program Files\Mozilla FireFox\searchplugins\eBay-france.xml M3 - MFPP: Plugins - [Jonathan] -- C:\Program Files\Mozilla FireFox\searchplugins\google.xml M3 - MFPP: Plugins - [Jonathan] -- C:\Program Files\Mozilla FireFox\searchplugins\wikipedia-fr.xml M3 - MFPP: Plugins - [Jonathan] -- C:\Program Files\Mozilla FireFox\searchplugins\yahoo-france.xml P2 - FPN: [HKLM] [@adobe.com/FlashPlayer] - (...) -- C:\Windows\system32\Macromed\Flash\NPSWF32.dll P2 - FPN: [HKLM] [@Apple.com/iTunes,version=1.0] - (...) -- C:\Program Files\iTunes\Mozilla Plugins\npitunes.dll P2 - FPN: [HKLM] [@java.com/JavaPlugin] - (...) -- D:\bin\new_plugin\npjp2.dll (.not file.) P2 - FPN: [HKLM] [@ma-config.com/HardwareDetection] - (.Cybelsoft - Plugin NPAPI Ma-Config.com.) -- C:\Program Files\ma-config.com\nphardwaredetection.dll P2 - FPN: [HKLM] [@nvidia.com/3DVision] - (.NVIDIA Corporation - NVIDIA 3D Vision plugin for Mozilla browsers.) -- C:\Program Files\NVIDIA Corporation\3D Vision\npnv3dv.dll P2 - FPN: [HKLM] [@nvidia.com/3DVisionStreaming] - (.NVIDIA Corporation - NVIDIA 3D Vision Streaming plugin for Mozilla browsers.) -- C:\Program Files\NVIDIA Corporation\3D Vision\npnv3dvstreaming.dll P2 - FPN: [HKLM] [@tools.google.com/Google Update;version=3] - (.Google Inc. - Google Update.) -- C:\Program Files\Google\Update\1.3.21.57\npGoogleUpdate3.dll P2 - FPN: [HKLM] [@tools.google.com/Google Update;version=9] - (.Google Inc. - Google Update.) -- C:\Program Files\Google\Update\1.3.21.57\npGoogleUpdate3.dll P2 - FPN: [HKLM] [Adobe Reader] - (.Adobe Systems Inc. - Adobe PDF Plug-In For Firefox and Netscape 10.1.0.) -- C:\Program Files\Adobe\Reader 10.0\Reader\AIR\nppdf32.dll M0 - MFSP: prefs.js [Jonathan - ag3yf7dt.default] Google M2 - MFEP: prefs.js [Jonathan - ag3yf7dt.default\[email protected]] [] cacaoweb v1.0.15 (.http://www.cacaoweb.org/.) ---\\ Google Chrome, Démarrage,Recherche,Extensions (G0,G1,G2) C:\Users\Jonathan\AppData\Local\Google\Chrome\User Data\Default\Preferences G0 - GCSP: Preference [user Data\Default][HomePage] Google ---\\ Internet Explorer, Démarrage,Recherche,URLSearchHook, Phishing (R0,R1,R3,R4) R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = MSN : Hotmail, Messenger, Bing, Actualité et Sport R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = MSN : Hotmail, Messenger, Bing, Actualité et Sport R0 - HKUS\S-1-5-21-1279632309-2292724093-604940192-1000\Software\Microsoft\Internet Explorer\Main,Start Page = MSN : Hotmail, Messenger, Bing, Actualité et Sport R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = Microsoft Corporation R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = Microsoft Corporation R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = Microsoft Corporation R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = Search Microsoft.com R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = Microsoft Corporation R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Extensions Off Page = about:noadd-ons R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Security Risk Page = about:securityrisk R4 - HKLM\SOFTWARE\Microsoft\Internet Explorer\PhishingFilter,EnabledV8 = 0 R4 - HKCU\SOFTWARE\Microsoft\Internet Explorer\PhishingFilter,Enabled = 2 ---\\ Internet Explorer, Proxy Management (R5) R5 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyOverride = *.local R5 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyServer = no key R5 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyEnable = 0 R5 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,MigrateProxy = 1 R5 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,EnableHttp1_1 = 1 R5 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,AutoConfigProxy = wininet.dll ---\\ ---\\ Modification d'une valeur Ini (Changed inifile value, mapped to Registry) (F2) F2 - REG:system.ini: UserInit=userinit.exe, F2 - REG:system.ini: VMApplet=C:\WINDOWS\system32\SystemPropertiesPerformance.exe ---\\ Browser Helper Objects de navigateur (O2) O2 - BHO: AcroIEHelperStub - {18DF081C-E8AD-4283-A596-FA578C2EBDC3} . (.Adobe Systems Incorporated - Adobe PDF Helper for Internet Explorer.) -- C:\Program Files\Common Files\Adobe\Acrobat\ActiveX\AcroIEHelperShim.dll O2 - BHO: (no name) - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} Clé orpheline O2 - BHO: avast! WebRep - {8E5E2654-AD2D-48bf-AC2D-D17F00898D06} . (.AVAST Software - avast! WebRep Plugin.) -- C:\Program Files\AVAST Software\Avast\aswWebRepIE.dll O2 - BHO: (no name) - {DBC80044-A445-435b-BC74-9C25C1C588A9} Clé orpheline O2 - BHO: TBSB07458 - {FCBCCB87-9224-4B8D-B117-F56D924BEB18} . (.Pas de propriétaire - IE Toolbar Engine.) -- C:\Program Files\Audiosurf\mybarnsm3028.tmp\tbcore3.dll ---\\ Internet Explorer Toolbars (O3) O3 - Toolbar: avast! WebRep - {8E5E2654-AD2D-48bf-AC2D-D17F00898D06} . (.AVAST Software - avast! WebRep Plugin.) -- C:\Program Files\AVAST Software\Avast\aswWebRepIE.dll O3 - Toolbar: Free software Gooofull toolbar - {C86FF9FA-AEED-451B-A9CC-39A53173AE2E} . (.Pas de propriétaire - IE Toolbar Engine.) -- C:\Program Files\Audiosurf\mybarnsm3028.tmp\tbcore3.dll ---\\ ---\\ Applications démarrées par registre & par dossier (O4) O4 - HKLM\..\Run: [avast] . (.AVAST Software - avast! Antivirus.) -- C:\Program Files\AVAST Software\Avast\avastUI.exe O4 - HKLM\..\Run: [Adobe ARM] . (.Adobe Systems Incorporated - Adobe Reader and Acrobat Manager.) -- C:\Program Files\Common Files\Adobe\ARM\1.0\AdobeARM.exe O4 - HKLM\..\Run: [Malwarebytes' Anti-Malware] . (.Malwarebytes Corporation - Malwarebytes' Anti-Malware.) -- C:\Program Files\Malwarebytes' Anti-Malware\mbamgui.exe O4 - HKLM\..\Run: [Malwarebytes' Anti-Malware (reboot)] . (.Malwarebytes Corporation - Malwarebytes' Anti-Malware.) -- C:\Program Files\Malwarebytes' Anti-Malware\mbam.exe O4 - HKUS\S-1-5-19\..\Run: [sidebar] C:\Program Files\Windows Sidebar\Sidebar.exe (.not file.) O4 - HKUS\S-1-5-20\..\Run: [sidebar] C:\Program Files\Windows Sidebar\Sidebar.exe (.not file.) O4 - HKUS\S-1-5-19\..\RunOnce: [mctadmin] . (.Microsoft Corporation - MCTAdmin.) -- C:\Windows\System32\mctadmin.exe O4 - HKUS\S-1-5-20\..\RunOnce: [mctadmin] . (.Microsoft Corporation - MCTAdmin.) -- C:\Windows\System32\mctadmin.exe O4 - Global Startup: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\firefox_reload.lnk . (...) -- C:\Program Files\Mozilla Firefox\management\MFsurf1.exe (.not file.) ---\\ ---\\ Autres liens utilisateurs (O4) O4 - Global Startup: C:\Users\Jonathan\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Internet Explorer.lnk . (.Microsoft Corporation.) -- C:\Program Files\Internet Explorer\iexplore.exe O4 - Global Startup: C:\Users\Jonathan\Desktop\AD-R.lnk . (...) -- C:\Program Files\Ad-Remover\main.exe O4 - Global Startup: C:\Users\Jonathan\Desktop\CoD-1.5.lnk . (...) -- D:\activision\Call of Duty\CoDMP.exe O4 - Global Startup: C:\Users\Jonathan\Desktop\CoD2MP_s.exe.lnk . (...) -- D:\COD2\CoD2MP_s.exe O4 - Global Startup: C:\Users\Jonathan\Desktop\CoDMP-1.1.lnk . (...) -- D:\activision\Call of Duty 1.3\CoDMP.exe O4 - Global Startup: C:\Users\Jonathan\Desktop\CoDMP.exe.lnk . (...) -- D:\activision\Call of Duty 1.4\CoDMP.exe O4 - Global Startup: C:\Users\Jonathan\Desktop\Corel Paint Shop Pro Photo.exe.lnk . (.Corel, Inc..) -- C:\Program Files\Corel\Corel Paint Shop Pro Photo X2\Corel Paint Shop Pro Photo.exe O4 - Global Startup: C:\Users\Jonathan\Desktop\Fraps.lnk . (.Beepa P/L.) -- C:\Fraps\fraps.exe O4 - Global Startup: C:\Users\Jonathan\Desktop\iw3mp.exe.lnk . (...) -- D:\COD4\iw3mp.exe O4 - Global Startup: C:\Users\Jonathan\Desktop\Notepad++.lnk . (.Don HO [email protected].) -- C:\Program Files\Notepad++\notepad++.exe O4 - Global Startup: C:\Users\Jonathan\Desktop\Seismovision 3.lnk . (.© NuGardt Software.) -- D:\activision\Seismovision3.exe O4 - Global Startup: C:\Users\Jonathan\Desktop\shift2u.exe.lnk . (.Electronic Arts Inc..) -- D:\telechargement Jdownloader\shift2u.exe O4 - Global Startup: C:\Users\Jonathan\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\Corel Paint Shop Pro Photo X2.lnk . (.Corel, Inc..) -- C:\Program Files\Corel\Corel Paint Shop Pro Photo X2\Corel Paint Shop Pro Photo.exe O4 - Global Startup: C:\Users\Jonathan\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\Google Chrome.lnk . (.Google Inc..) -- C:\Program Files\Google\Chrome\Application\chrome.exe O4 - Global Startup: C:\Users\Jonathan\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\Launch Internet Explorer Browser.lnk . (.Microsoft Corporation.) -- C:\Program Files\Internet Explorer\iexplore.exe O4 - Global Startup: C:\Users\Jonathan\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\MediaGet.lnk . (.MediaGet LLC.) -- C:\Users\Jonathan\AppData\Local\MediaGet2\mediaget.exe O4 - Global Startup: C:\Users\Jonathan\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\Seismovision 3.lnk . (.© NuGardt Software.) -- D:\activision\Seismovision3.exe O4 - Global Startup: C:\Users\Jonathan\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\Xfire.lnk . (.Xfire Inc..) -- C:\Program Files\Xfire\Xfire.exe ---\\ Lignes supplémentaires dans le menu contextuel d'Internet Explorer (O8) O8 - Extra context menu item: Download Video on This Page . (.Tomato - YouTube Video Downloader Internet Explorer Extension.) -- C:\Program Files\Tomato\FLV Player\MDIEEx.dll O8 - Extra context menu item: Download Video This Links To . (.Tomato - YouTube Video Downloader Internet Explorer Extension.) -- C:\Program Files\Tomato\FLV Player\MDIEEx.dll ---\\ Boutons situés sur la barre d'outils principale d'Internet Explorer (O9) O9 - Extra button: Download Video on This Page - {11F19C45-9675-488A-A8E0-8E8234DC245D} . (.Tomato - YouTube Video Downloader Internet Explorer Extension.) -- C:\Program Files\Tomato\FLV Player\MDIEEx.dll O9 - Extra button: Free software Gooofull toolbar - {C86FF9FA-AEED-451B-A9CC-39A53173AE2E} . (...) -- C:\Program Files\Audiosurf\mybarnsm3028.tmp\favicon.ico ---\\ Winsock hijacker (Layered Service Provider) (O10) O10 - WLSP:\000000000001\Winsock LSP File . (.Microsoft Corporation - Network Location Awareness 2.) -- C:\Windows\system32\NLAapi.dll O10 - WLSP:\000000000002\Winsock LSP File . (.Microsoft Corporation - Fournisseur de service Sockets 2.0 de Microsoft Windows.) -- C:\Windows\system32\mswsock.dll O10 - WLSP:\000000000003\Winsock LSP File . (.Microsoft Corporation - LDAP RnR Provider DLL.) -- C:\Windows\system32\winrnr.dll O10 - WLSP:\000000000004\Winsock LSP File . (.Microsoft Corporation - Fournisseur Shim d’affectation de noms de messagerie.) -- C:\Windows\system32\napinsp.dll O10 - WLSP:\000000000005\Winsock LSP File . (.Microsoft Corporation - Fournisseur d’espace de noms PNRP.) -- C:\Windows\system32\pnrpnsp.dll O10 - WLSP:\000000000006\Winsock LSP File . (.Microsoft Corporation - Fournisseur d’espace de noms PNRP.) -- C:\Windows\system32\pnrpnsp.dll O10 - WLSP:\000000000007\Winsock LSP File . (.Apple Inc. - Bonjour Namespace Provider.) -- C:\Program Files\Bonjour\mdnsNSP.dll ---\\ Objets ActiveX (Downloaded Program Files)(O16) O16 - DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} (Shockwave Flash Object) - http://fpdownload2.macromedia.com/get/shockwave/cabs/flash/swflash.cab ---\\ Modification Domaine/Adresses DNS (O17) O17 - HKLM\System\CCS\Services\Tcpip\..\{F2C887EA-F03B-4F53-B9F3-E7599F8B9677}: DhcpNameServer = 192.168.0.1 O17 - HKLM\System\CS1\Services\Tcpip\..\{F2C887EA-F03B-4F53-B9F3-E7599F8B9677}: DhcpNameServer = 192.168.0.1 O17 - HKLM\System\CS2\Services\Tcpip\..\{F2C887EA-F03B-4F53-B9F3-E7599F8B9677}: DhcpNameServer = 192.168.0.1 O17 - HKLM\System\CCS\Services\Tcpip\..\{F2C887EA-F03B-4F53-B9F3-E7599F8B9677}: DhcpDomain = sitecomwl614 O17 - HKLM\System\CS1\Services\Tcpip\..\{F2C887EA-F03B-4F53-B9F3-E7599F8B9677}: DhcpDomain = sitecomwl614 O17 - HKLM\System\CS2\Services\Tcpip\..\{F2C887EA-F03B-4F53-B9F3-E7599F8B9677}: DhcpDomain = sitecomwl614 O17 - HKLM\System\CCS\Services\Tcpip\Parameters: DhcpNameServer = 192.168.0.1 ---\\ Clé de Registre autorun ShellServiceObjectDelayLoad (SSO/SSODL) (O21) O21 - SSODL: WebCheck - {E6FB5E20-DE35-11CF-9C87-00AA005127ED} - CLSID or File not found. ---\\ Liste des services NT non Microsoft et non désactivés (O23) O23 - Service: Adobe Acrobat Update Service (AdobeARMservice) . (.Adobe Systems Incorporated - Adobe Acrobat Update Service.) - C:\Program Files\Common Files\Adobe\ARM\1.0\armsvc.exe O23 - Service: Apple Mobile Device (Apple Mobile Device) . (.Apple Inc. - MobileDeviceService.) - C:\Program Files\Common Files\Apple\Mobile Device Support\AppleMobileDeviceService.exe O23 - Service: avast! Antivirus (avast! Antivirus) . (.AVAST Software - avast! Service.) - C:\Program Files\AVAST Software\Avast\AvastSvc.exe O23 - Service: avast! Firewall (avast! Firewall) . (.AVAST Software - avast! firewall service.) - C:\Program Files\AVAST Software\Avast\afwServ.exe O23 - Service: Service Bonjour (Bonjour Service) . (.Apple Inc. - Bonjour Service.) - C:\Program Files\Bonjour\mDNSResponder.exe O23 - Service: Service Google Update (gupdate) (gupdate) . (.Google Inc. - Programme d'installation de Google.) - C:\Program Files\Google\Update\GoogleUpdate.exe O23 - Service: (MBAMService) . (.Malwarebytes Corporation - Malwarebytes' Anti-Malware.) - C:\Program Files\Malwarebytes' Anti-Malware\mbamservice.exe O23 - Service: C:\Program Files\Nero\Update\NASvc.exe (NAUpdate) . (.Nero AG - NeroUpdate.) - C:\Program Files\Nero\Update\NASvc.exe O23 - Service: NVIDIA Driver Helper Service (NVSvc) . (.NVIDIA Corporation - NVIDIA Driver Helper Service, Version 266.5.) - C:\Windows\system32\nvvsvc.exe O23 - Service: PnkBstrA (PnkBstrA) . (...) - C:\Windows\system32\PnkBstrA.exe O23 - Service: PnkBstrB (PnkBstrB) . (...) - C:\Windows\system32\PnkBstrB.exe O23 - Service: ProtexisLicensing (ProtexisLicensing) . (.Pas de propriétaire - nTitles PSIService.) - C:\Windows\system32\PSIService.exe O23 - Service: SRS HDAudio Lab Service (SRSHDAudioService) . (.SRS Labs, Inc. - SRSAudioLabService.) - C:\Program Files\Common Files\SRS Labs\SRS HD Audio Lab Service\SRSAudioLabService.exe O23 - Service: NVIDIA Stereoscopic 3D Driver Service (Stereo Service) . (.NVIDIA Corporation - Stereo Vision Control Panel API Server.) - C:\Program Files\NVIDIA Corporation\3D Vision\nvSCPAPISvr.exe O23 - Service: TeamViewer 6 (TeamViewer6) . (.TeamViewer GmbH - TeamViewer Remote Control Application.) - C:\Program Files\TeamViewer\Version6\TeamViewer_Service.exe ---\\ Enumération Active Desktop & MHTML Editor (O24) O24 - Default MHTML Editor: Last - .(...) - (.not file.) ---\\ Tâches planifiées en automatique (O39) O39 - APT:Automatic Planified Task - C:\Windows\Tasks\GoogleUpdateTaskMachineCore.job O39 - APT:Automatic Planified Task - C:\Windows\Tasks\GoogleUpdateTaskMachineUA.job [MD5.F02A533F517EB38333CB12A9E8963773] [APT] [GoogleUpdateTaskMachineCore] (.Google Inc..) -- C:\Program Files\Google\Update\GoogleUpdate.exe [MD5.F02A533F517EB38333CB12A9E8963773] [APT] [GoogleUpdateTaskMachineUA] (.Google Inc..) -- C:\Program Files\Google\Update\GoogleUpdate.exe [MD5.00000000000000000000000000000000] [APT] [{0A3082A8-2460-4BA0-92BA-9F40FDCA4372}] (...) -- C:\Users\Jonathan\Desktop\cod1-rconDLD.exe (.not file.) [MD5.34EBD4FF6A24D86BB4716D6AFCC1A89B] [APT] [AppleSoftwareUpdate] (.Apple Inc..) -- C:\Program Files\Apple Software Update\SoftwareUpdate.exe ---\\ Pilotes lancés au démarrage (O41) O41 - Driver: C:\Windows\system32\drivers\afd.sys (AFD) . (.Microsoft Corporation - Ancillary Function Driver for WinSock.) - C:\Windows\system32\drivers\afd.sys O41 - Driver: (blbdrive) . (.Microsoft Corporation - BLB Drive Driver.) - C:\Windows\System32\DRIVERS\blbdrive.sys O41 - Driver: (cdrom) . (.Microsoft Corporation - SCSI CD-ROM Driver.) - C:\Windows\System32\DRIVERS\cdrom.sys O41 - Driver: C:\Windows\system32\cscsvc.dll (CSC) . (.Microsoft Corporation - Windows Client Side Caching Driver.) - C:\Windows\System32\drivers\csc.sys O41 - Driver: C:\Windows\system32\drivers\dfsc.sys (DfsC) . (.Microsoft Corporation - DFS Namespace Client Driver.) - C:\Windows\System32\Drivers\dfsc.sys O41 - Driver: C:\Windows\system32\drivers\discache.sys (discache) . (.Microsoft Corporation - System Indexer/Cache Driver.) - C:\Windows\System32\drivers\discache.sys O41 - Driver: (dtsoftbus01) . (.DT Soft Ltd - DAEMON Tools Virtual Bus Driver.) - C:\Windows\System32\DRIVERS\dtsoftbus01.sys O41 - Driver: (mssmbios) . (.Microsoft Corporation - System Management BIOS Driver.) - C:\Windows\System32\DRIVERS\mssmbios.sys O41 - Driver: (NetBIOS) . (.Microsoft Corporation - NetBIOS interface driver.) - C:\Windows\System32\DRIVERS\netbios.sys O41 - Driver: C:\Windows\system32\drivers\netbt.sys (NetBT) . (.Microsoft Corporation - MBT Transport driver.) - C:\Windows\System32\DRIVERS\netbt.sys O41 - Driver: C:\Windows\system32\drivers\nsiproxy.sys (nsiproxy) . (.Microsoft Corporation - NSI Proxy.) - C:\Windows\System32\drivers\nsiproxy.sys O41 - Driver: C:\Windows\system32\drivers\pacer.sys (Psched) . (.Microsoft Corporation - Planificateur de paquets QoS.) - C:\Windows\System32\DRIVERS\pacer.sys O41 - Driver: C:\Windows\system32\wkssvc.dll (rdbss) . (.Microsoft Corporation - Pilote du sous-système de mise en mémoire t.) - C:\Windows\System32\DRIVERS\rdbss.sys O41 - Driver: C:\Windows\system32\DRIVERS\RDPCDD.sys (RDPCDD) . (.Microsoft Corporation - RDP Miniport.) - C:\Windows\System32\DRIVERS\RDPCDD.sys O41 - Driver: C:\Windows\system32\drivers\RDPENCDD.sys (RDPENCDD) . (.Microsoft Corporation - RDP Encoder Miniport.) - C:\Windows\System32\drivers\rdpencdd.sys O41 - Driver: C:\Windows\system32\drivers\RdpRefMp.sys (RDPREFMP) . (.Microsoft Corporation - RDP Reflector Driver Miniport.) - C:\Windows\System32\drivers\rdprefmp.sys O41 - Driver: (Serial) . (.Microsoft Corporation - Pilote de périphérique série.) - C:\Windows\System32\DRIVERS\serial.sys O41 - Driver: C:\Windows\system32\tcpipcfg.dll (tdx) . (.Microsoft Corporation - TDI Translation Driver.) - C:\Windows\System32\DRIVERS\tdx.sys O41 - Driver: (TermDD) . (.Microsoft Corporation - Remote Desktop Server Driver.) - C:\Windows\System32\DRIVERS\termdd.sys O41 - Driver: (VgaSave) . (.Microsoft Corporation - VGA/Super VGA Video Driver.) - C:\Windows\system32\drivers\vga.sys O41 - Driver: (vwififlt) . (.Microsoft Corporation - Virtual WiFi Filter Driver.) - C:\Windows\System32\DRIVERS\vwififlt.sys O41 - Driver: C:\Windows\system32\rascfg.dll (Wanarpv6) . (.Microsoft Corporation - MS Remote Access and Routing ARP Driver.) - C:\Windows\System32\DRIVERS\wanarp.sys O41 - Driver: (WfpLwf) . (.Microsoft Corporation - WFP NDIS 6.20 Lightweight Filter Driver.) - C:\Windows\System32\DRIVERS\wfplwf.sys ---\\ Logiciels installés (O42) O42 - Logiciel: AVI ReComp 1.4.5 - (.Mateusz Gola (aka Prozac).) [HKLM] -- AVI ReComp O42 - Logiciel: Adaptateur Bewan Wi-Fi 802.11n - (.Bewan.) [HKLM] -- {28DA7D8B-F9A4-4F18-8AA0-551B1E084D0D} O42 - Logiciel: Adobe Flash Player 10 ActiveX - (.Adobe Systems Incorporated.) [HKLM] -- Adobe Flash Player ActiveX O42 - Logiciel: Adobe Flash Player 10 Plugin - (.Adobe Systems Incorporated.) [HKLM] -- Adobe Flash Player Plugin O42 - Logiciel: Adobe Reader X (10.1.0) - Français - (.Adobe Systems Incorporated.) [HKLM] -- {AC76BA86-7AD7-1036-7B44-AA1000000001} O42 - Logiciel: Apple Application Support - (.Apple Inc..) [HKLM] -- {B3575D00-27EF-49C2-B9E0-14B3D954E992} O42 - Logiciel: Apple Mobile Device Support - (.Apple Inc..) [HKLM] -- {C23CD6DA-1958-43A5-ADD0-59396572E02E} O42 - Logiciel: Apple Software Update - (.Apple Inc..) [HKLM] -- {C6579A65-9CAE-4B31-8B6B-3306E0630A66} O42 - Logiciel: AviSynth 2.5 - (.Pas de propriétaire.) [HKLM] -- Avisynth O42 - Logiciel: Bonjour - (.Apple Inc..) [HKLM] -- {C2E4B5BD-32DB-4817-A060-341AB17C3F90} O42 - Logiciel: CCleaner - (.Piriform.) [HKLM] -- CCleaner O42 - Logiciel: Call of Duty® 2 - (.Activision.) [HKLM] -- InstallShield_{D0A05794-48C2-4424-A15A-9F20FCFDD374} O42 - Logiciel: Call of Duty® 4 - Modern Warfare - (.Activision.) [HKLM] -- InstallShield_{E48469CC-635E-4FD5-A122-1497C286D217} O42 - Logiciel: Call of Duty® 4 - Modern Warfare 1.6 Patch - (.Pas de propriétaire.) [HKLM] -- InstallShield_{8A15B7D9-908A-4EF9-BA84-5AEDE61743EE} O42 - Logiciel: Call of Duty® 4 - Modern Warfare 1.7 Patch - (.Pas de propriétaire.) [HKLM] -- InstallShield_{931C37FC-594D-43A9-B10F-A2F2B1F03498} O42 - Logiciel: Corel Paint Shop Pro Photo X2 - (.Corel Corporation.) [HKLM] -- {64E72FB1-2343-4977-B4A8-262CD53D0BD3} O42 - Logiciel: DAEMON Tools Lite - (.DT Soft Ltd.) [HKLM] -- DAEMON Tools Lite O42 - Logiciel: Diaporama version 3.0.0.1 - (.Pas de propriétaire.) [HKLM] -- Diaporama_is1 O42 - Logiciel: Easy GIF Animator 5.21 - (.Karlis Blumentals.) [HKLM] -- Easy GIF Animator_is1 O42 - Logiciel: Engine Analyzer v3.4 - (.Performance Trends.) [HKLM] -- {FE1F501D-27BA-4C44-A552-52B02250EC58} O42 - Logiciel: EnhanceMySe7en - (.SeriousBit.) [HKLM] -- EnhanceMySe7en_is1 O42 - Logiciel: FLV Player 2.6.4 - (.Tomato.) [HKLM] -- FLV Player_is1 O42 - Logiciel: FileZilla Client 3.5.0 - (.Pas de propriétaire.) [HKLM] -- FileZilla Client O42 - Logiciel: Fraps - (.Pas de propriétaire.) [HKLM] -- Fraps O42 - Logiciel: Google Chrome - (.Google Inc..) [HKLM] -- Google Chrome O42 - Logiciel: Google Update Helper - (.Google Inc..) [HKLM] -- {A92DAB39-4E2C-4304-9AB6-BC44E68B55E2} O42 - Logiciel: High-Definition Video Playback 10 - (.Nero AG.) [HKLM] -- {237CCB62-8454-43E3-B158-3ACD0134852E} O42 - Logiciel: ImageShack Uploader 2.2.0 - (.ImageShack Corp..) [HKLM] -- {8BCD7AE7-F713-4D50-BAB9-7839B9386870} O42 - Logiciel: JDownloader 0.9 - (.AppWork GmbH.) [HKLM] -- 1489-3350-5074-6281 O42 - Logiciel: MAGIX Screenshare 4.3.6.1987 (US) - (.MAGIX AG.) [HKLM] -- MAGIX Screenshare US O42 - Logiciel: MSXML 4.0 SP2 (KB954430) - (.Microsoft Corporation.) [HKLM] -- {86493ADD-824D-4B8E-BD72-8C5DCDC52A71} O42 - Logiciel: MSXML 4.0 SP2 (KB973688) - (.Microsoft Corporation.) [HKLM] -- {F662A8E6-F4DC-41A2-901E-8C11F044BDEC} O42 - Logiciel: Ma-Config.com - (.Cybelsoft.) [HKLM] -- {7DB4CB30-B94A-4282-AC8A-C86F615AA45B} O42 - Logiciel: Malwarebytes' Anti-Malware version 1.51.0.1200 - (.Malwarebytes Corporation.) [HKLM] -- Malwarebytes' Anti-Malware_is1 O42 - Logiciel: MediaGet2 version 2.1.538.0 - (.MediaGet LLC.) [HKLM] -- {9193306E-5935-47E0-B458-2548778C1614}_is1 O42 - Logiciel: Microsoft .NET Framework 4 Client Profile - (.Microsoft Corporation.) [HKLM] -- Microsoft .NET Framework 4 Client Profile O42 - Logiciel: Microsoft .NET Framework 4 Client Profile - (.Microsoft Corporation.) [HKLM] -- {3C3901C5-3455-3E0A-A214-0B093A5070A6} O42 - Logiciel: Microsoft .NET Framework 4 Client Profile FRA Language Pack - (.Microsoft Corporation.) [HKLM] -- {0F5B4A82-9DAF-3D13-8CB8-AEB25E4A614E} O42 - Logiciel: Microsoft .NET Framework 4 Extended - (.Microsoft Corporation.) [HKLM] -- Microsoft .NET Framework 4 Extended O42 - Logiciel: Microsoft .NET Framework 4 Extended - (.Microsoft Corporation.) [HKLM] -- {0A0CADCF-78DA-33C4-A350-CD51849B9702} O42 - Logiciel: Microsoft .NET Framework 4 Extended FRA Language Pack - (.Microsoft Corporation.) [HKLM] -- {043F86B7-EE12-3399-B2CA-D0B603D87963} O42 - Logiciel: Microsoft LifeChat - (.Microsoft.) [HKLM] -- {3D4D4CBF-79F3-4E38-A1DC-30646F030443} O42 - Logiciel: Microsoft Primary Interoperability Assemblies 2005 - (.Microsoft Corporation.) [HKLM] -- {D24DB8B9-BB6C-4334-9619-BA1C650E13D3} O42 - Logiciel: Microsoft Visual C++ 2005 Redistributable - (.Microsoft Corporation.) [HKLM] -- {837b34e3-7c30-493c-8f6a-2b0f04e2912c} O42 - Logiciel: Microsoft Visual C++ 2008 Redistributable - x86 9.0.21022 - (.Microsoft Corporation.) [HKLM] -- {FF66E9F6-83E7-3A3E-AF14-8DE9A809A6A4} O42 - Logiciel: Microsoft Visual C++ 2008 Redistributable - x86 9.0.30729.17 - (.Microsoft Corporation.) [HKLM] -- {9A25302D-30C0-39D9-BD6F-21E6EC160475} O42 - Logiciel: Microsoft Visual C++ 2008 Redistributable - x86 9.0.30729.4148 - (.Microsoft Corporation.) [HKLM] -- {1F1C2DFC-2D24-3E06-BCB8-725134ADF989} O42 - Logiciel: Module linguistique Microsoft .NET Framework 4 Client Profile FRA - (.Microsoft Corporation.) [HKLM] -- Microsoft .NET Framework 4 Client Profile FRA Language Pack O42 - Logiciel: Module linguistique Microsoft .NET Framework 4 Extended FRA - (.Microsoft Corporation.) [HKLM] -- Microsoft .NET Framework 4 Extended FRA Language Pack O42 - Logiciel: Mozilla Firefox 5.0 (x86 fr) - (.Mozilla.) [HKLM] -- Mozilla Firefox 5.0 (x86 fr) O42 - Logiciel: Mumble and Murmur - (.Mumble.) [HKLM] -- Mumble O42 - Logiciel: NVIDIA Logiciel système PhysX 9.10.0514 - (.NVIDIA Corporation.) [HKLM] -- {B2FE1952-0186-46C3-BAEC-A80AA35AC5B8}_Display.PhysX O42 - Logiciel: NVIDIA Photoshop Plug-ins - (.Pas de propriétaire.) [HKLM] -- {23F79416-CAD1-41BF-99A3-040F6C814AAA} O42 - Logiciel: NVIDIA PhysX - (.NVIDIA Corporation.) [HKLM] -- {B9DB4C76-01A4-46D5-8910-F7AA6376DBAF} O42 - Logiciel: NVIDIA Pilote 3D Vision 266.58 - (.NVIDIA Corporation.) [HKLM] -- {B2FE1952-0186-46C3-BAEC-A80AA35AC5B8}_Display.3DVision O42 - Logiciel: NVIDIA Pilote graphique 266.58 - (.NVIDIA Corporation.) [HKLM] -- {B2FE1952-0186-46C3-BAEC-A80AA35AC5B8}_Display.Driver O42 - Logiciel: NVIDIA Stereoscopic 3D Driver - (.NVIDIA Corporation.) [HKLM] -- NVIDIAStereo O42 - Logiciel: Nero 10 Menu TemplatePack Basic - (.Nero AG.) [HKLM] -- {63AA3EAB-23BB-48B2-9AD0-44F878075604} O42 - Logiciel: Nero 10 Movie ThemePack Basic - (.Nero AG.) [HKLM] -- {F5CB822F-B365-43D1-BCC0-4FDA1A2017A7} O42 - Logiciel: Nero BackItUp 10 - (.Nero AG.) [HKLM] -- {68AB6930-5BFF-4FF6-923B-516A91984FE6} O42 - Logiciel: Nero BackItUp 10 Help (CHM) - (.Nero AG.) [HKLM] -- {08C8666B-C502-4AB3-B4CB-D74AC42D14FE} O42 - Logiciel: Nero BurnRights 10 - (.Nero AG.) [HKLM] -- {943CFD7D-5336-47AF-9418-E02473A5A517} O42 - Logiciel: Nero BurnRights 10 Help (CHM) - (.Nero AG.) [HKLM] -- {555868C6-49FB-484F-BB43-8980651A1B00} O42 - Logiciel: Nero Burning ROM 10 - (.Nero AG.) [HKLM] -- {7A5D731D-B4B3-490E-B339-75685712BAAB} O42 - Logiciel: Nero BurningROM 10 Help (CHM) - (.Nero AG.) [HKLM] -- {9B6B24BE-80E7-46C4-9FA5-B167D5E0F345} O42 - Logiciel: Nero Control Center 10 - (.Nero AG.) [HKLM] -- {6DFB899F-17A2-48F0-A533-ED8D6866CF38} O42 - Logiciel: Nero ControlCenter 10 Help (CHM) - (.Nero AG.) [HKLM] -- {523B2B1B-D8DB-4B41-90FF-C4D799E2758A} O42 - Logiciel: Nero Core Components 10 - (.Nero AG.) [HKLM] -- {2436F2A8-4B7E-4B6C-AE4E-604C84AA6A4F} O42 - Logiciel: Nero CoverDesigner 10 - (.Nero AG.) [HKLM] -- {FCF00A6E-FB58-477A-ABE9-232907105521} O42 - Logiciel: Nero CoverDesigner 10 Help (CHM) - (.Nero AG.) [HKLM] -- {C3273C55-E1E4-41FF-8D69-0158090DB8D8} O42 - Logiciel: Nero DiscCopy Gadget 10 - (.Nero AG.) [HKLM] -- {92EC1A84-7FFC-42DF-A8F6-79C21C4765A5} O42 - Logiciel: Nero DiscCopyGadget 10 Help (CHM) - (.Nero AG.) [HKLM] -- {5F548A02-80BC-404D-BAE6-F05F9BF6B449} O42 - Logiciel: Nero DiscSpeed 10 - (.Nero AG.) [HKLM] -- {34490F4E-48D0-492E-8249-B48BECF0537C} O42 - Logiciel: Nero DiscSpeed 10 Help (CHM) - (.Nero AG.) [HKLM] -- {C18A0418-442A-4186-AF98-D08F5054A2FC} O42 - Logiciel: Nero Dolby Files 10 - (.Nero AG.) [HKLM] -- {C3580AC4-C827-4332-B935-9A282ED5BB97} O42 - Logiciel: Nero Express 10 - (.Nero AG.) [HKLM] -- {70550193-1C22-445C-8FA4-564E155DB1A7} O42 - Logiciel: Nero Express 10 Help (CHM) - (.Nero AG.) [HKLM] -- {33643918-7957-4839-92C7-EA96CB621A98} O42 - Logiciel: Nero InfoTool 10 - (.Nero AG.) [HKLM] -- {F412B4AF-388C-4FF5-9B2F-33DB1C536953} O42 - Logiciel: Nero InfoTool 10 Help (CHM) - (.Nero AG.) [HKLM] -- {66049135-9659-4AAD-9169-9CCA269EBB3E} O42 - Logiciel: Nero MediaHub 10 - (.Nero AG.) [HKLM] -- {1F7FB68F-52F6-46A3-B42F-38CE46295AE5} O42 - Logiciel: Nero MediaHub 10 Help (CHM) - (.Nero AG.) [HKLM] -- {F467862A-D9CA-47ED-8D81-B4B3C9399272} O42 - Logiciel: Nero Multimedia Suite 10 - (.Nero AG.) [HKLM] -- {277C1559-4CF7-44FF-8D07-98AA9C13AABD} O42 - Logiciel: Nero Recode 10 - (.Nero AG.) [HKLM] -- {8ECEC853-5C3D-4B10-B5C7-FF11FF724807} O42 - Logiciel: Nero Recode 10 Help (CHM) - (.Nero AG.) [HKLM] -- {DB7C1D4A-08BA-4C7E-A8AA-B7F9BB372DCF} O42 - Logiciel: Nero RescueAgent 10 - (.Nero AG.) [HKLM] -- {E337E787-CF61-4B7B-B84F-509202A54023} O42 - Logiciel: Nero RescueAgent 10 Help (CHM) - (.Nero AG.) [HKLM] -- {92E25238-61A3-4ACD-A407-3C480EEF47A7} O42 - Logiciel: Nero SoundTrax 10 - (.Nero AG.) [HKLM] -- {E1EE5339-5D32-458F-BAAB-B19F6301BCE2} O42 - Logiciel: Nero SoundTrax 10 Help (CHM) - (.Nero AG.) [HKLM] -- {16987E99-C95C-4513-9239-7B44A0A71DB5} O42 - Logiciel: Nero StartSmart 10 - (.Nero AG.) [HKLM] -- {F61D489E-6C44-49AC-AD02-7DA8ACA73A65} O42 - Logiciel: Nero StartSmart 10 Help (CHM) - (.Nero AG.) [HKLM] -- {F6117F9C-ADB5-4590-9BE4-12C7BEC28702} O42 - Logiciel: Nero Update - (.Nero AG.) [HKLM] -- {65BB0407-4CC8-4DC7-952E-3EEFDF05602A} O42 - Logiciel: Nero Vision 10 - (.Nero AG.) [HKLM] -- {9A4297F3-2A51-4ED9-92CA-4BCB8380947E} O42 - Logiciel: Nero Vision 10 Help (CHM) - (.Nero AG.) [HKLM] -- {329411A0-19F3-4740-874F-17400B126F27} O42 - Logiciel: Nero WaveEditor 10 - (.Nero AG.) [HKLM] -- {EDCDFAD5-DF80-4600-A493-E9DAD6810230} O42 - Logiciel: Nero WaveEditor 10 Help (CHM) - (.Nero AG.) [HKLM] -- {7A295D8F-484B-4FFB-89AB-C1FD497591FE} O42 - Logiciel: Notepad++ - (.Pas de propriétaire.) [HKLM] -- Notepad++ O42 - Logiciel: PowerISO - (.PowerISO Computing, Inc..) [HKLM] -- PowerISO O42 - Logiciel: QuickTime - (.Apple Inc..) [HKLM] -- {57752979-A1C9-4C02-856B-FBB27AC4E02C} O42 - Logiciel: Realtek Ethernet Controller Driver - (.Realtek.) [HKLM] -- {8833FFB6-5B0C-4764-81AA-06DFEED9A476} O42 - Logiciel: SHIFT 2 UNLEASHED™ - (.Electronic Arts.) [HKLM] -- {E8C37E27-5205-4C8A-BECB-B00533045AAE} O42 - Logiciel: SRS HD Audio Lab - (.SRS Labs, Inc..) [HKLM] -- {D6F32584-C1F1-4798-B7F2-1DD78146C916} O42 - Logiciel: Security Update for Microsoft .NET Framework 4 Client Profile (KB2446708) - (.Microsoft Corporation.) [HKLM] -- {3C3901C5-3455-3E0A-A214-0B093A5070A6}.KB2446708 O42 - Logiciel: Security Update for Microsoft .NET Framework 4 Extended (KB2416472) - (.Microsoft Corporation.) [HKLM] -- {0A0CADCF-78DA-33C4-A350-CD51849B9702}.KB2416472 O42 - Logiciel: Seismovision 3 (remove only) - (.Pas de propriétaire.) [HKLM] -- Seismovision 3 O42 - Logiciel: Songr - (.http://at-my-window.blogspot.com/?page=songr.) [HKLM] -- Songr O42 - Logiciel: TeamSpeak 3 Client - (.TeamSpeak Systems GmbH.) [HKLM] -- TeamSpeak 3 Client O42 - Logiciel: TeamViewer 6 - (.TeamViewer GmbH.) [HKLM] -- TeamViewer 6 O42 - Logiciel: Universal AntiCheat 3 v1.035 - (.DExUS.) [HKLM] -- {99BEB67F-B288-44F5-8B2A-23F5A52FA1AE}_is1 O42 - Logiciel: Update for Microsoft .NET Framework 4 Client Profile (KB2473228) - (.Microsoft Corporation.) [HKLM] -- {3C3901C5-3455-3E0A-A214-0B093A5070A6}.KB2473228 O42 - Logiciel: VIA Gestionnaire de périphériques de plate-forme - (.VIA Technologies, Inc..) [HKLM] -- InstallShield_{20D4A895-748C-4D88-871C-FDB1695B0169} O42 - Logiciel: VLC media player 1.1.9 - (.VideoLAN.) [HKLM] -- VLC media player O42 - Logiciel: VideoPad - Logiciel de montage vidéo - (.NCH Software.) [HKLM] -- VideoPad O42 - Logiciel: WinRAR 4.00 (32 bits) - (.win.rar GmbH.) [HKLM] -- WinRAR archiver O42 - Logiciel: Windows Media Player Firefox Plugin - (.Microsoft Corp.) [HKLM] -- {69FDFBB6-351D-4B8C-89D8-867DC9D0A2A4} O42 - Logiciel: Windows Movie Maker 2.6 - (.Microsoft Corporation.) [HKLM] -- {B3DAF54F-DB25-4586-9EF1-96D24BB14088} O42 - Logiciel: Xfire (remove only) - (.Pas de propriétaire.) [HKLM] -- Xfire O42 - Logiciel: Xvid 1.2.1 - (.Koepi's build.) [HKLM] -- Xvid_is1 O42 - Logiciel: YouTUBE movie downloader - (.FENERIS tech.) [HKLM] -- {2F8BE445-D14C-40E2-AF62-E43539FD1500} O42 - Logiciel: avast! Internet Security - (.AVAST Software.) [HKLM] -- avast O42 - Logiciel: iTunes - (.Apple Inc..) [HKLM] -- {D6B5B017-7643-46A5-AC4D-E58A7B4798A0} ---\\ HKCU & HKLM Software Keys [HKCU\Software\ALWIL Software] [HKCU\Software\AVAST Software] [HKCU\Software\AVG] [HKCU\Software\AVI ReComp] [HKCU\Software\Ad-Remover] [HKCU\Software\Adobe] [HKCU\Software\AppDataLow] [HKCU\Software\Apple Computer, Inc.] [HKCU\Software\Apple Inc.] [HKCU\Software\Audacity] [HKCU\Software\Classes] [HKCU\Software\Clients] [HKCU\Software\Corel] [HKCU\Software\DT Soft] [HKCU\Software\Electronic Arts] [HKCU\Software\Fraps3] [HKCU\Software\Freeware] [HKCU\Software\GNU] [HKCU\Software\Gabest] [HKCU\Software\GoldWave] [HKCU\Software\Google] [HKCU\Software\ImageShack Corp.] [HKCU\Software\ImageShack] [HKCU\Software\JEDI-VCL] [HKCU\Software\JavaSoft] [HKCU\Software\Karlis Blumentals] [HKCU\Software\Lavalys] [HKCU\Software\Local AppWizard-Generated Applications] [HKCU\Software\Macromedia] [HKCU\Software\Magix] [HKCU\Software\Malwarebytes' Anti-Malware] [HKCU\Software\MozillaPlugins] [HKCU\Software\Mozilla] [HKCU\Software\Mumble] [HKCU\Software\NCH Software] [HKCU\Software\NCH Swift Sound] [HKCU\Software\NVIDIA Corporation] [HKCU\Software\Nero] [HKCU\Software\Netscape] [HKCU\Software\NuGardt Software] [HKCU\Software\Piriform] [HKCU\Software\Policies] [HKCU\Software\PowerISO] [HKCU\Software\SG-1] [HKCU\Software\SRS Labs] [HKCU\Software\SeriousBit] [HKCU\Software\SimonTatham] [HKCU\Software\Softonic] [HKCU\Software\TBSB07458] [HKCU\Software\TeamSpeak 3 Client] [HKCU\Software\TeamViewer] [HKCU\Software\Tomato] [HKCU\Software\Trolltech] [HKCU\Software\VB and VBA Program Settings] [HKCU\Software\WinRAR SFX] [HKCU\Software\WinRAR] [HKCU\Software\Xfire] [HKCU\Software\YahooPartnerToolbar] [HKCU\Software\antiufo] [HKCU\Software\cacaoweb] [HKCU\Software\cybelsoft] [HKCU\Software\ej-technologies] [HKLM\Software\AGEIA Technologies] [HKLM\Software\ALWIL Software] [HKLM\Software\ATI Technologies] [HKLM\Software\AVAST Software] [HKLM\Software\AVG] [HKLM\Software\Activision] [HKLM\Software\Adobe] [HKLM\Software\Apple Computer, Inc.] [HKLM\Software\Apple Inc.] [HKLM\Software\AviSynth] [HKLM\Software\Bewan] [HKLM\Software\Classes] [HKLM\Software\Clients] [HKLM\Software\Corel] [HKLM\Software\DT Soft] [HKLM\Software\Electronic Arts] [HKLM\Software\Even Balance] [HKLM\Software\FileZilla 3] [HKLM\Software\Fraps2] [HKLM\Software\GEAR Software] [HKLM\Software\Google] [HKLM\Software\InstallShield] [HKLM\Software\Intel] [HKLM\Software\JavaSoft] [HKLM\Software\JreMetrics] [HKLM\Software\Khronos] [HKLM\Software\Macromedia] [HKLM\Software\Macrovision] [HKLM\Software\Magix] [HKLM\Software\Malwarebytes' Anti-Malware] [HKLM\Software\MediaGet] [HKLM\Software\MozillaPlugins] [HKLM\Software\Mozilla] [HKLM\Software\NCH Software] [HKLM\Software\NCH Swift Sound] [HKLM\Software\NVIDIA Corporation] [HKLM\Software\Nero] [HKLM\Software\NuGardt Software] [HKLM\Software\ODBC] [HKLM\Software\Performance Trends] [HKLM\Software\Piriform] [HKLM\Software\Policies] [HKLM\Software\Protexis] [HKLM\Software\QSound Labs, Inc.] [HKLM\Software\RTLSetup] [HKLM\Software\Realtek] [HKLM\Software\RegisteredApplications] [HKLM\Software\SoftAssist] [HKLM\Software\Sonic] [HKLM\Software\Sun Microsystems] [HKLM\Software\TeamViewer] [HKLM\Software\VIA Technologies, Inc] [HKLM\Software\VideoLAN] [HKLM\Software\WinRAR] [HKLM\Software\Windows] [HKLM\Software\Wow6432Node] [HKLM\Software\cybelsoft] [HKLM\Software\ej-technologies] [HKLM\Software\id] [HKLM\Software\mozilla.org] ---\\ Contenu des dossiers Programs/ProgramFiles/ProgramData/AppData (O43) O43 - CFD: 16/07/2011 - 02:20:48 - [58697043] ----D- C:\Program Files\Ad-Remover O43 - CFD: 19/06/2011 - 10:12:20 - [164206100] ----D- C:\Program Files\Adobe O43 - CFD: 10/06/2011 - 21:15:36 - [0] ----D- C:\Program Files\Alwil Software O43 - CFD: 7/06/2011 - 18:26:34 - [2307582] ----D- C:\Program Files\Apple Software Update O43 - CFD: 8/07/2011 - 14:54:02 - [8686641] ----D- C:\Program Files\Audiosurf O43 - CFD: 10/05/2011 - 00:14:02 - [321450837] ----D- C:\Program Files\AVAST Software O43 - CFD: 23/04/2011 - 00:19:42 - [6145366] ----D- C:\Program Files\AVI ReComp O43 - CFD: 23/04/2011 - 00:19:30 - [4859898] ----D- C:\Program Files\AviSynth 2.5 O43 - CFD: 7/06/2011 - 18:26:18 - [621186] ----D- C:\Program Files\Bonjour O43 - CFD: 9/07/2011 - 13:36:20 - [3753504] ----D- C:\Program Files\CCleaner O43 - CFD: 23/06/2011 - 17:47:14 - [212988558] ----D- C:\Program Files\Common Files O43 - CFD: 25/03/2011 - 03:12:52 - [439290991] ----D- C:\Program Files\Corel O43 - CFD: 10/05/2011 - 13:50:04 - [17268545] ----D- C:\Program Files\DAEMON Tools Lite O43 - CFD: 25/03/2011 - 13:36:36 - [14397273] ----D- C:\Program Files\DExUS O43 - CFD: 14/07/2009 - 11:01:32 - [83226132] ----D- C:\Program Files\DVD Maker O43 - CFD: 21/06/2011 - 15:30:54 - [11410092] ----D- C:\Program Files\Easy GIF Animator O43 - CFD: 7/04/2011 - 18:31:26 - [28795409] ----D- C:\Program Files\EnhanceMySe7en O43 - CFD: 25/03/2011 - 01:33:04 - [0] -SH-D- C:\Program Files\Fichiers communs O43 - CFD: 13/06/2011 - 12:24:16 - [17053952] ----D- C:\Program Files\FileZilla FTP Client O43 - CFD: 9/07/2011 - 13:36:14 - [257177345] ----D- C:\Program Files\Google O43 - CFD: 8/04/2011 - 22:55:28 - [27631682] ----D- C:\Program Files\ImageShack Uploader O43 - CFD: 13/06/2011 - 02:52:06 - [27626006] --H-D- C:\Program Files\InstallShield Installation Information O43 - CFD: 9/07/2011 - 13:12:14 - [5805737] ----D- C:\Program Files\Internet Explorer O43 - CFD: 7/06/2011 - 18:26:54 - [1856627] ----D- C:\Program Files\iPod O43 - CFD: 7/06/2011 - 18:27:06 - [128332815] ----D- C:\Program Files\iTunes O43 - CFD: 10/05/2011 - 13:57:08 - [57876266] ----D- C:\Program Files\JDownloader O43 - CFD: 25/03/2011 - 15:50:20 - [0] ----D- C:\Program Files\JMHL Loader O43 - CFD: 23/06/2011 - 17:03:10 - [6093848] ----D- C:\Program Files\ma-config.com O43 - CFD: 9/07/2011 - 14:43:12 - [7566409] ----D- C:\Program Files\Malwarebytes' Anti-Malware O43 - CFD: 14/07/2009 - 11:01:22 - [147506226] ----D- C:\Program Files\Microsoft Games O43 - CFD: 25/03/2011 - 15:43:32 - [26630994] ----D- C:\Program Files\Microsoft IntelliPoint O43 - CFD: 23/06/2011 - 16:03:48 - [4823401] ----D- C:\Program Files\Microsoft LifeChat O43 - CFD: 6/07/2011 - 17:19:48 - [8175999] ----D- C:\Program Files\Microsoft.NET O43 - CFD: 12/05/2011 - 18:19:38 - [9336778] ----D- C:\Program Files\Movie Maker 2.6 O43 - CFD: 9/07/2011 - 13:25:50 - [34243306] ----D- C:\Program Files\Mozilla Firefox O43 - CFD: 14/07/2009 - 06:52:32 - [25757] ----D- C:\Program Files\MSBuild O43 - CFD: 25/03/2011 - 13:42:34 - [0] ----D- C:\Program Files\MSXML 4.0 O43 - CFD: 27/05/2011 - 11:06:46 - [18315542] ----D- C:\Program Files\NCH Software O43 - CFD: 25/03/2011 - 15:59:18 - [1399631335] ----D- C:\Program Files\Nero O43 - CFD: 18/06/2011 - 02:02:26 - [11461559] ----D- C:\Program Files\Notepad++ O43 - CFD: 22/04/2011 - 18:02:48 - [324977591] ----D- C:\Program Files\NVIDIA Corporation O43 - CFD: 9/05/2011 - 21:06:24 - [132473] ----D- C:\Program Files\Performance Trends O43 - CFD: 7/06/2011 - 18:26:46 - [76322555] ----D- C:\Program Files\QuickTime O43 - CFD: 25/03/2011 - 04:01:56 - [2378473] ----D- C:\Program Files\Realtek O43 - CFD: 14/07/2009 - 06:52:32 - [38597377] ----D- C:\Program Files\Reference Assemblies O43 - CFD: 13/06/2011 - 01:39:16 - [6233328] ----D- C:\Program Files\Songr O43 - CFD: 23/06/2011 - 17:47:12 - [34001772] ----D- C:\Program Files\SRS Labs O43 - CFD: 9/05/2011 - 22:49:48 - [29072679] ----D- C:\Program Files\TeamSpeak 3 Client O43 - CFD: 14/06/2011 - 19:26:02 - [16012168] ----D- C:\Program Files\TeamViewer O43 - CFD: 12/05/2011 - 14:06:00 - [3856925] ----D- C:\Program Files\Tomato O43 - CFD: 14/07/2009 - 06:53:24 - [0] --H-D- C:\Program Files\Uninstall Information O43 - CFD: 25/03/2011 - 04:04:16 - [76384102] ----D- C:\Program Files\VIA O43 - CFD: 23/04/2011 - 00:21:42 - [82676131] ----D- C:\Program Files\VideoLAN O43 - CFD: 14/07/2009 - 10:39:40 - [3049984] ----D- C:\Program Files\Windows Defender O43 - CFD: 25/03/2011 - 14:23:30 - [6180864] ----D- C:\Program Files\Windows Mail O43 - CFD: 25/03/2011 - 14:23:30 - [6607787] ----D- C:\Program Files\Windows Media Player O43 - CFD: 25/03/2011 - 01:33:04 - [12197556] ----D- C:\Program Files\Windows NT O43 - CFD: 14/07/2009 - 10:39:40 - [4417800] ----D- C:\Program Files\Windows Photo Viewer O43 - CFD: 14/07/2009 - 06:52:34 - [189440] ----D- C:\Program Files\Windows Portable Devices O43 - CFD: 10/05/2011 - 00:05:34 - [23955898] ----D- C:\Program Files\Windows Sidebar O43 - CFD: 25/03/2011 - 03:28:22 - [4055847] ----D- C:\Program Files\WinRAR O43 - CFD: 21/04/2011 - 18:10:50 - [19244148] ----D- C:\Program Files\Xfire O43 - CFD: 16/05/2011 - 22:36:58 - [126291] ----D- C:\Program Files\Xvid O43 - CFD: 16/07/2011 - 02:26:26 - [4040071] ----D- C:\Program Files\ZHPDiag O43 - CFD: 19/06/2011 - 10:12:22 - [3606170] ----D- C:\Program Files\Common Files\Adobe O43 - CFD: 7/06/2011 - 18:26:54 - [92090316] ----D- C:\Program Files\Common Files\Apple O43 - CFD: 25/03/2011 - 03:13:08 - [6294936] ----D- C:\Program Files\Common Files\Corel O43 - CFD: 22/04/2011 - 18:01:02 - [6550334] ----D- C:\Program Files\Common Files\InstallShield O43 - CFD: 8/07/2011 - 12:32:58 - [1247175] ----D- C:\Program Files\Common Files\Java O43 - CFD: 23/06/2011 - 17:47:14 - [1045475] ----D- C:\Program Files\Common Files\Macrovision Shared O43 - CFD: 25/03/2011 - 15:43:08 - [16615076] ----D- C:\Program Files\Common Files\microsoft shared O43 - CFD: 25/03/2011 - 15:55:48 - [19958275] ----D- C:\Program Files\Common Files\Nero O43 - CFD: 14/07/2009 - 04:37:06 - [2702] ----D- C:\Program Files\Common Files\Services O43 - CFD: 14/07/2009 - 04:37:06 - [41103783] ----D- C:\Program Files\Common Files\SpeechEngines O43 - CFD: 23/06/2011 - 17:47:14 - [6615769] ----D- C:\Program Files\Common Files\SRS Labs O43 - CFD: 14/07/2009 - 10:39:40 - [10102259] ----D- C:\Program Files\Common Files\System O43 - CFD: 12/05/2011 - 14:06:00 - [7756288] ----D- C:\Program Files\Common Files\Tomato O43 - CFD: 19/06/2011 - 10:12:20 - [479] ----D- C:\ProgramData\Adobe O43 - CFD: 10/06/2011 - 22:38:00 - [0] ----D- C:\ProgramData\Alwil Software O43 - CFD: 7/06/2011 - 18:26:32 - [31625760] ----D- C:\ProgramData\Apple O43 - CFD: 7/06/2011 - 18:26:54 - [66643567] ----D- C:\ProgramData\Apple Computer O43 - CFD: 14/07/2009 - 06:53:56 - [0] -SH-D- C:\ProgramData\Application Data O43 - CFD: 12/06/2011 - 11:44:50 - [74545533] ----D- C:\ProgramData\AVAST Software O43 - CFD: 10/05/2011 - 00:13:06 - [17848] ----D- C:\ProgramData\AVG10 O43 - CFD: 25/03/2011 - 04:05:42 - [2578745] ----D- C:\ProgramData\Bewan Driver O43 - CFD: 25/03/2011 - 01:33:04 - [0] -SH-D- C:\ProgramData\Bureau O43 - CFD: 25/03/2011 - 04:45:32 - [96] --H-D- C:\ProgramData\Common Files O43 - CFD: 25/03/2011 - 03:13:26 - [1969117] ----D- C:\ProgramData\Corel O43 - CFD: 13/06/2011 - 02:21:24 - [2132] ----D- C:\ProgramData\DAEMON Tools Lite O43 - CFD: 14/07/2009 - 06:53:56 - [0] -SH-D- C:\ProgramData\Desktop O43 - CFD: 14/07/2009 - 06:53:56 - [0] -SH-D- C:\ProgramData\Documents O43 - CFD: 25/03/2011 - 01:33:04 - [0] -SH-D- C:\ProgramData\Favoris O43 - CFD: 14/07/2009 - 06:53:56 - [0] -SH-D- C:\ProgramData\Favorites O43 - CFD: 23/06/2011 - 17:48:48 - [17870] ----D- C:\ProgramData\FLEXnet O43 - CFD: 23/06/2011 - 17:03:10 - [1237592] ----D- C:\ProgramData\ma-config.com O43 - CFD: 14/06/2011 - 18:13:10 - [554345] ----D- C:\ProgramData\MAGIX O43 - CFD: 9/07/2011 - 14:43:12 - [16497670] ----D- C:\ProgramData\Malwarebytes O43 - CFD: 16/05/2011 - 19:39:44 - [833] ----D- C:\ProgramData\Media Get LLC O43 - CFD: 25/03/2011 - 01:33:04 - [0] -SH-D- C:\ProgramData\Menu Démarrer O43 - CFD: 9/05/2011 - 23:56:26 - [27360137] ----D- C:\ProgramData\MFAData O43 - CFD: 13/06/2011 - 01:47:08 - [769144506] -S--D- C:\ProgramData\Microsoft O43 - CFD: 25/03/2011 - 01:33:04 - [0] -SH-D- C:\ProgramData\Modèles O43 - CFD: 27/05/2011 - 11:07:18 - [0] ----D- C:\ProgramData\NCH Software O43 - CFD: 25/03/2011 - 15:59:20 - [2638271] ----D- C:\ProgramData\Nero O43 - CFD: 16/07/2011 - 02:22:44 - [2053053] ----D- C:\ProgramData\NVIDIA O43 - CFD: 25/03/2011 - 03:50:12 - [562761] ----D- C:\ProgramData\NVIDIA Corporation O43 - CFD: 10/05/2011 - 13:53:58 - [2722] ----D- C:\ProgramData\Solidshield O43 - CFD: 14/07/2009 - 06:53:56 - [0] -SH-D- C:\ProgramData\Start Menu O43 - CFD: 26/04/2011 - 23:52:22 - [84] ----D- C:\ProgramData\Sun O43 - CFD: 14/07/2009 - 06:53:56 - [0] -SH-D- C:\ProgramData\Templates O43 - CFD: 9/07/2011 - 11:45:42 - [3645568] ----D- C:\ProgramData\Xfire O43 - CFD: 7/06/2011 - 18:27:06 - [542915] ----D- C:\ProgramData\{429CAD59-35B1-4DBC-BB6D-1DB246563521} O43 - CFD: 7/04/2011 - 01:02:12 - [1871927] ----D- C:\Users\Jonathan\AppData\Roaming\Adobe O43 - CFD: 7/06/2011 - 18:52:24 - [2750460854] ----D- C:\Users\Jonathan\AppData\Roaming\Apple Computer O43 - CFD: 27/05/2011 - 13:16:24 - [1371] ----D- C:\Users\Jonathan\AppData\Roaming\Audacity O43 - CFD: 25/03/2011 - 04:45:52 - [4054] ----D- C:\Users\Jonathan\AppData\Roaming\AVG10 O43 - CFD: 23/04/2011 - 01:34:08 - [942] ----D- C:\Users\Jonathan\AppData\Roaming\AVI ReComp O43 - CFD: 16/05/2011 - 16:26:26 - [111667874] ----D- C:\Users\Jonathan\AppData\Roaming\cacaoweb O43 - CFD: 25/03/2011 - 03:13:52 - [14845793] ----D- C:\Users\Jonathan\AppData\Roaming\Corel O43 - CFD: 10/05/2011 - 13:51:50 - [1658] ----D- C:\Users\Jonathan\AppData\Roaming\DAEMON Tools Lite O43 - CFD: 9/07/2011 - 13:39:32 - [40978] ----D- C:\Users\Jonathan\AppData\Roaming\FileZilla O43 - CFD: 25/03/2011 - 01:33:26 - [0] ----D- C:\Users\Jonathan\AppData\Roaming\Identities O43 - CFD: 25/03/2011 - 03:09:34 - [0] ----D- C:\Users\Jonathan\AppData\Roaming\InstallShield O43 - CFD: 25/03/2011 - 13:37:02 - [1747] ----D- C:\Users\Jonathan\AppData\Roaming\Macromedia O43 - CFD: 9/07/2011 - 14:43:14 - [73242] ----D- C:\Users\Jonathan\AppData\Roaming\Malwarebytes O43 - CFD: 14/07/2009 - 11:00:34 - [0] ----D- C:\Users\Jonathan\AppData\Roaming\Media Center Programs O43 - CFD: 16/05/2011 - 19:39:42 - [1495] ----D- C:\Users\Jonathan\AppData\Roaming\Media Get LLC O43 - CFD: 12/05/2011 - 18:18:28 - [837693] -S--D- C:\Users\Jonathan\AppData\Roaming\Microsoft O43 - CFD: 25/03/2011 - 02:59:00 - [17469691] ----D- C:\Users\Jonathan\AppData\Roaming\Mozilla O43 - CFD: 16/07/2011 - 00:35:42 - [677260] ----D- C:\Users\Jonathan\AppData\Roaming\Mumble O43 - CFD: 27/05/2011 - 12:57:04 - [432102] ----D- C:\Users\Jonathan\AppData\Roaming\NCH Software O43 - CFD: 25/03/2011 - 15:59:44 - [1349325] ----D- C:\Users\Jonathan\AppData\Roaming\Nero O43 - CFD: 18/06/2011 - 02:04:08 - [342450] ----D- C:\Users\Jonathan\AppData\Roaming\Notepad++ O43 - CFD: 10/05/2011 - 14:11:18 - [0] ----D- C:\Users\Jonathan\AppData\Roaming\NVIDIA O43 - CFD: 8/07/2011 - 14:45:56 - [452] ----D- C:\Users\Jonathan\AppData\Roaming\PlayerPlug O43 - CFD: 8/07/2011 - 14:45:56 - [1988] ----D- C:\Users\Jonathan\AppData\Roaming\PropMgrAsync O43 - CFD: 7/04/2011 - 18:31:28 - [5324] ----D- C:\Users\Jonathan\AppData\Roaming\SeriousBit O43 - CFD: 14/06/2011 - 19:49:24 - [540] ----D- C:\Users\Jonathan\AppData\Roaming\TeamViewer O43 - CFD: 12/05/2011 - 14:09:00 - [25602] ----D- C:\Users\Jonathan\AppData\Roaming\Tomato O43 - CFD: 12/07/2011 - 12:27:08 - [1191345] ----D- C:\Users\Jonathan\AppData\Roaming\TS3Client O43 - CFD: 20/06/2011 - 23:12:42 - [1093386] ----D- C:\Users\Jonathan\AppData\Roaming\vlc O43 - CFD: 10/06/2011 - 19:14:14 - [233977] ----D- C:\Users\Jonathan\AppData\Roaming\Win32I O43 - CFD: 25/03/2011 - 03:35:54 - [12] ----D- C:\Users\Jonathan\AppData\Roaming\WinRAR O43 - CFD: 16/07/2011 - 02:20:42 - [7424] ----D- C:\Users\Jonathan\AppData\Roaming\Xfire O43 - CFD: 7/04/2011 - 01:02:12 - [15093494] ----D- C:\Users\Jonathan\AppData\Local\Adobe O43 - CFD: 7/06/2011 - 18:26:34 - [0] ----D- C:\Users\Jonathan\AppData\Local\Apple O43 - CFD: 7/06/2011 - 18:27:10 - [7893175] ----D- C:\Users\Jonathan\AppData\Local\Apple Computer O43 - CFD: 25/03/2011 - 01:33:16 - [0] -SH-D- C:\Users\Jonathan\AppData\Local\Application Data O43 - CFD: 14/07/2011 - 19:43:32 - [746911] ----D- C:\Users\Jonathan\AppData\Local\Corel O43 - CFD: 27/06/2011 - 18:05:52 - [669497] ----D- C:\Users\Jonathan\AppData\Local\Diagnostics O43 - CFD: 9/07/2011 - 13:36:22 - [189414] ----D- C:\Users\Jonathan\AppData\Local\Google O43 - CFD: 25/03/2011 - 01:33:16 - [0] -SH-D- C:\Users\Jonathan\AppData\Local\Historique O43 - CFD: 16/05/2011 - 19:39:42 - [378] ----D- C:\Users\Jonathan\AppData\Local\Media Get LLC O43 - CFD: 16/05/2011 - 19:39:46 - [21461637] ----D- C:\Users\Jonathan\AppData\Local\MediaGet2 O43 - CFD: 30/05/2011 - 17:31:16 - [670684065] ----D- C:\Users\Jonathan\AppData\Local\Microsoft O43 - CFD: 25/03/2011 - 02:58:54 - [235951277] ----D- C:\Users\Jonathan\AppData\Local\Mozilla O43 - CFD: 25/03/2011 - 03:02:56 - [0] ----D- C:\Users\Jonathan\AppData\Local\Mumble O43 - CFD: 12/05/2011 - 18:04:24 - [6462130] ----D- C:\Users\Jonathan\AppData\Local\Nero O43 - CFD: 12/05/2011 - 18:03:04 - [4871] ----D- C:\Users\Jonathan\AppData\Local\Nero_AG O43 - CFD: 13/06/2011 - 03:09:58 - [7544280] ----D- C:\Users\Jonathan\AppData\Local\PunkBuster O43 - CFD: 3/04/2011 - 11:55:18 - [16920] ----D- C:\Users\Jonathan\AppData\Local\Songr O43 - CFD: 8/07/2011 - 12:22:18 - [13910016] ----D- C:\Users\Jonathan\AppData\Local\Sun O43 - CFD: 16/07/2011 - 02:24:02 - [8283427] ----D- C:\Users\Jonathan\AppData\Local\Temp O43 - CFD: 25/03/2011 - 01:33:16 - [0] -SH-D- C:\Users\Jonathan\AppData\Local\Temporary Internet Files O43 - CFD: 25/03/2011 - 04:44:28 - [10301430] ----D- C:\Users\Jonathan\AppData\Local\VirtualStore O43 - CFD: 26/05/2011 - 18:58:16 - [0] ----D- C:\Users\Jonathan\AppData\Local\WMTools Downloaded Files ---\\ Derniers fichiers modifiés ou crées sous Windows et System32 (O44) O44 - LFC:[MD5.677DC167EA76828E54DC81172B9D02FD] - 5/07/2011 - 16:49:55 ---A- . (...) -- C:\Windows\System32\PnkBstrB.xtr [271200] O44 - LFC:[MD5.D41D8CD98F00B204E9800998ECF8427E] - 8/07/2011 - 11:22:42 ---A- . (...) -- C:\Windows\System32\RENBB53.tmp [0] O44 - LFC:[MD5.D41D8CD98F00B204E9800998ECF8427E] - 8/07/2011 - 11:22:42 ---A- . (...) -- C:\Windows\System32\RENBB54.tmp [0] O44 - LFC:[MD5.D41D8CD98F00B204E9800998ECF8427E] - 8/07/2011 - 11:22:42 ---A- . (...) -- C:\Windows\System32\RENBB55.tmp [0] O44 - LFC:[MD5.6B3856B8F7D5B1EE5C7B8C532703C880] - 8/07/2011 - 11:22:42 ---A- . (...) -- C:\Windows\System32\jupdate-1.5.0_22-b03.log [11287] O44 - LFC:[MD5.D41D8CD98F00B204E9800998ECF8427E] - 8/07/2011 - 11:32:52 ---A- . (...) -- C:\Windows\System32\RENAFBE.tmp [0] O44 - LFC:[MD5.D41D8CD98F00B204E9800998ECF8427E] - 8/07/2011 - 11:32:52 ---A- . (...) -- C:\Windows\System32\RENAFBF.tmp [0] O44 - LFC:[MD5.D41D8CD98F00B204E9800998ECF8427E] - 8/07/2011 - 11:32:52 ---A- . (...) -- C:\Windows\System32\RENAFC0.tmp [0] O44 - LFC:[MD5.56455C3CB114EB236AA85AC8FA1CDCEC] - 8/07/2011 - 11:54:13 ---A- . (...) -- C:\Windows\System32\jupdate-1.6.0_26-b03.log [176] O44 - LFC:[MD5.D592AAA377748FC50E34D731F0D0D7B8] - 9/07/2011 - 12:06:20 ---A- . (.Adobe Systems - Windows NT OpenType/Type 1 API Library..) -- C:\Windows\System32\atmlib.dll [34304] O44 - LFC:[MD5.7D643BB2B21B22621D76BE185AE9F7F8] - 9/07/2011 - 12:06:20 ---A- . (.Adobe Systems Incorporated - Windows NT OpenType/Type 1 Font Driver.) -- C:\Windows\System32\atmfd.dll [294912] O44 - LFC:[MD5.A60DC2BDCEEEB426A87D00517AD92955] - 9/07/2011 - 12:13:24 ---A- . (...) -- C:\Windows\System32\FNTCACHE.DAT [297848] O44 - LFC:[MD5.3D2C13377763EEAC0CA6FB46F57217ED] - 9/07/2011 - 13:43:07 ---A- . (.Malwarebytes Corporation - Malwarebytes' Anti-Malware.) -- C:\Windows\System32\drivers\mbam.sys [22712] O44 - LFC:[MD5.B309912717C29FC67E1BA4730A82B6DD] - 9/07/2011 - 13:43:10 ---A- . (.Malwarebytes Corporation - Malwarebytes' Anti-Malware.) -- C:\Windows\System32\drivers\mbamswissarmy.sys [39984] O44 - LFC:[MD5.12C9B055F8F7C7955110038720E3628F] - 9/07/2011 - 13:48:56 ---A- . (...) -- C:\Windows\PFRO.log [304] O44 - LFC:[MD5.D41D8CD98F00B204E9800998ECF8427E] - 9/07/2011 - 13:49:04 ---A- . (...) -- C:\Windows\setuperr.log [0] O44 - LFC:[MD5.08EF1200FEFFFFFF57494E444F577E31] - 16/07/2011 - 01:26:02 ---A- . (...) -- C:\Windows\WindowsUpdate.log [1800730] O44 - LFC:[MD5.C756130463679FD9DAA95AB5CB7CC481] - 16/07/2011 - 01:22:28 ---A- . (...) -- C:\Windows\setupact.log [560] O44 - LFC:[MD5.DB73DA4DF804B7CD1103B92C64763595] - 16/07/2011 - 01:22:25 -S-A- . (...) -- C:\Windows\bootstat.dat [67584] O44 - LFC:[MD5.D0C866BE624C401F384CC2EB236DD450] - 16/07/2011 - 01:21:29 ---A- . (...) -- C:\Ad-Report-CLEAN[1].txt [5400] O44 - LFC:[MD5.D9145F60012289421F1B2DEE4945C845] - 16/07/2011 - 00:10:37 ---A- . (...) -- C:\Windows\System32\drivers\PnkBstrK.sys [138376] O44 - LFC:[MD5.C7563C787DF06BE97EC2B0DCB25CCA15] - 16/07/2011 - 00:10:29 ---A- . (...) -- C:\Windows\System32\PnkBstrB.ex0 [202448] O44 - LFC:[MD5.C7563C787DF06BE97EC2B0DCB25CCA15] - 16/07/2011 - 00:10:29 ---A- . (...) -- C:\Windows\System32\PnkBstrB.exe [202448] O44 - LFC:[MD5.BC2D74FEA446D58B1E6A25F5CFBC5F92] - 15/07/2011 - 18:22:39 ---A- . (...) -- C:\Windows\System32\PerfStringBackup.INI [5242] O44 - LFC:[MD5.7F5BCB88391B96983BA3A08D381F17A5] - 15/07/2011 - 18:22:39 ---A- . (...) -- C:\Windows\System32\perfc009.dat [138628] O44 - LFC:[MD5.D90FC16599F13C52BB849B5912B2E66E] - 15/07/2011 - 18:22:39 ---A- . (...) -- C:\Windows\System32\perfc00C.dat [168610] O44 - LFC:[MD5.F2772AEFC69C120BD8792DB27B6FBCFA] - 15/07/2011 - 18:22:39 ---A- . (...) -- C:\Windows\System32\perfh009.dat [654852] O44 - LFC:[MD5.47B4926D1897428569CBC72D024625C1] - 15/07/2011 - 18:22:39 ---A- . (...) -- C:\Windows\System32\perfh00C.dat [816350] O44 - LFC:[MD5.E6E0E42BC4F64F4D7D05DCBE7BB77D84] - 10/07/2011 - 16:53:47 ---A- . (...) -- C:\PhysicalDisk0_MBR.bin [512] O44 - LFC:[MD5.3A2BDD76E7D2A5F40A7174793D1BA794] - 24/06/2011 - 16:51:44 ---A- . (...) -- C:\Windows\System32\PnkBstrA.exe [75136] O44 - LFC:[MD5.959F0206D46CE43F1EB0A5B4D508B35F] - 23/06/2011 - 16:47:19 ---A- . (.Pas de propriétaire - SRS Premium Sound driver.) -- C:\Windows\System32\drivers\SRS_HDAL_i386.sys [390944] O44 - LFC:[MD5.B8ED065497C4B949F0605AF9304CA7F3] - 23/06/2011 - 16:15:24 ---A- . (.VIA Technologies, Inc. - VIA LFX/GFX DSP UI component.) -- C:\Windows\System32\VIAPPExt.dll [733184] ---\\ Derniers fichiers créés dans Windows Prefetcher (O45) O45 - LFCP:[MD5.2589629893055F9B56D0EACBEF9FD80E] - 25/03/2011 - 00:56:08 ---A- - C:\Windows\Prefetch\AgGlFaultHistory.db O45 - LFCP:[MD5.1014B89096FA1ECA9F1CEB1A4A1FA97C] - 25/03/2011 - 00:56:08 ---A- - C:\Windows\Prefetch\AgGlFgAppHistory.db O45 - LFCP:[MD5.40A400375D38EAD3CF1C1676EB79B886] - 25/03/2011 - 00:56:08 ---A- - C:\Windows\Prefetch\AgGlGlobalHistory.db O45 - LFCP:[MD5.EF34A1658585DD06CE059369FFC1F983] - 25/03/2011 - 00:56:08 ---A- - C:\Windows\Prefetch\AgRobust.db O45 - LFCP:[MD5.65BCBE01EF541263E48DDD8E90BA0660] - 25/03/2011 - 01:21:47 ---A- - C:\Windows\Prefetch\PfSvPerfStats.bin O45 - LFCP:[MD5.C4BFD579A6BA8D8842FC4A38C274A190] - 25/03/2011 - 18:19:01 ---A- - C:\Windows\Prefetch\NTOSBOOT-B00DFAAD.pf O45 - LFCP:[MD5.D93EFF77B75C00203B0518C11DFF2D25] - 25/03/2011 - 18:57:26 ---A- - C:\Windows\Prefetch\Layout.ini ---\\ Contrôle du Safe Boot (CSB) (O49) O49 - CSB:Control Safe Boot HKLM\...\CCS\Minimal\sermouse.sys . (.Microsoft Corporation - Pilote de filtre souris série.) -- C:\Windows\System32\Drivers\sermouse.sys O49 - CSB:Control Safe Boot HKLM\...\CCS\Minimal\vga.sys . (.Microsoft Corporation - VGA/Super VGA Video Driver.) -- C:\Windows\System32\Drivers\vga.sys O49 - CSB:Control Safe Boot HKLM\...\CCS\Minimal\vgasave.sys . (...) -- C:\Windows\System32\Drivers\vgasave.sys (.not file.) O49 - CSB:Control Safe Boot HKLM\...\CCS\Minimal\volmgr.sys . (.Microsoft Corporation - Volume Manager Driver.) -- C:\Windows\System32\Drivers\volmgr.sys O49 - CSB:Control Safe Boot HKLM\...\CCS\Minimal\volmgrx.sys . (.Microsoft Corporation - Pilote d’extension du gestionnaire de volumes.) -- C:\Windows\System32\Drivers\volmgrx.sys O49 - CSB:Control Safe Boot HKLM\...\CCS\Network\ipnat.sys . (.Microsoft Corporation - IP Network Address Translator.) -- C:\Windows\System32\Drivers\ipnat.sys O49 - CSB:Control Safe Boot HKLM\...\CCS\Network\nsiproxy.sys . (.Microsoft Corporation - NSI Proxy.) -- C:\Windows\System32\Drivers\nsiproxy.sys O49 - CSB:Control Safe Boot HKLM\...\CCS\Network\rdpencdd.sys . (.Microsoft Corporation - RDP Encoder Miniport.) -- C:\Windows\System32\Drivers\rdpencdd.sys O49 - CSB:Control Safe Boot HKLM\...\CCS\Network\sermouse.sys . (.Microsoft Corporation - Pilote de filtre souris série.) -- C:\Windows\System32\Drivers\sermouse.sys O49 - CSB:Control Safe Boot HKLM\...\CCS\Network\vga.sys . (.Microsoft Corporation - VGA/Super VGA Video Driver.) -- C:\Windows\System32\Drivers\vga.sys O49 - CSB:Control Safe Boot HKLM\...\CCS\Network\vgasave.sys . (...) -- C:\Windows\System32\Drivers\vgasave.sys (.not file.) O49 - CSB:Control Safe Boot HKLM\...\CCS\Network\volmgr.sys . (.Microsoft Corporation - Volume Manager Driver.) -- C:\Windows\System32\Drivers\volmgr.sys O49 - CSB:Control Safe Boot HKLM\...\CCS\Network\volmgrx.sys . (.Microsoft Corporation - Pilote d’extension du gestionnaire de volumes.) -- C:\Windows\System32\Drivers\volmgrx.sys ---\\ MountPoints2 Shell Key (O51) O51 - MPSK:{c9e4f3da-7a89-11e0-9021-90e6ba3674ae}\AutoRun\command. (...) -- G:\setup\rsrc\Autorun.exe (.not file.) ---\\ Trojan Driver Search Data (HKLM) (O52) O52 - TDSD: \Drivers32\"msacm.l3acm"="C:\Windows\System32\l3codeca.acm" . (.Fraunhofer Institut Integrierte Schaltungen - MPEG Layer-3 Audio Codec for MSACM.) -- C:\Windows\System32\l3codeca.acm O52 - TDSD: \Drivers32\"vidc.cvid"="iccvid.dll" . (.Radius Inc. - Codec Cinepak®.) -- C:\Windows\System32\iccvid.dll O52 - TDSD: \Drivers32\"VIDC.XFR1"="xfcodec.dll" . (.Pas de propriétaire - Xfire Video Codec.) -- C:\Windows\System32\xfcodec.dll O52 - TDSD: \Drivers32\"vidc.xvid"="xvidvfw.dll" . (...) -- C:\Windows\System32\xvidvfw.dll O52 - TDSD: \Drivers32\"VIDC.FPS1"="frapsvid.dll" . (.Beepa P/L - Fraps.) -- C:\Windows\System32\frapsvid.dll O52 - TDSD: \drivers.desc\"C:\Windows\System32\l3codeca.acm"="Fraunhofer IIS MPEG Layer-3 Codec" . (.Fraunhofer Institut Integrierte Schaltungen - MPEG Layer-3 Audio Codec for MSACM.) -- C:\Windows\System32\l3codeca.acm O52 - TDSD: \drivers.desc\"xfcodec.dll"="Xfire video codec [XFR1]" . (.Pas de propriétaire - Xfire Video Codec.) -- C:\Windows\System32\xfcodec.dll O52 - TDSD: \drivers.desc\"frapsvid.dll"="Fraps Video Decompressor" . (.Beepa P/L - Fraps.) -- C:\Windows\System32\frapsvid.dll ---\\ ShareTools MSconfig StartupReg (O53) O53 - SMSR:HKLM\...\startupreg\Babylon Client [Key] . (...) -- C:\Program Files\Babylon\Babylon-Pro\Babylon.exe (.not file.) O53 - SMSR:HKLM\...\startupreg\cacaoweb [Key] . (...) -- C:\Users\Jonathan\AppData\Roaming\cacaoweb\cacaoweb.exe O53 - SMSR:HKLM\...\startupreg\Corel Photo Downloader [Key] . (.Corel, Inc. - Corel Photo Downloader.) -- C:\Program Files\Common Files\Corel\Corel PhotoDownloader\Corel Photo Downloader.exe O53 - SMSR:HKLM\...\startupreg\DAEMON Tools Lite [Key] . (.DT Soft Ltd - DAEMON Tools Lite.) -- C:\Program Files\DAEMON Tools Lite\DTLite.exe O53 - SMSR:HKLM\...\startupreg\HDAudDeck [Key] . (.VIA - VIA HD Audio CPL.) -- C:\Program Files\VIA\VIAudioi\VDeck\VDeck.exe O53 - SMSR:HKLM\...\startupreg\IntelliPoint [Key] . (.Microsoft Corporation - IPoint.exe.) -- C:\Program Files\Microsoft IntelliPoint\ipoint.exe O53 - SMSR:HKLM\...\startupreg\iTunesHelper [Key] . (.Apple Inc. - iTunesHelper.) -- C:\Program Files\iTunes\iTunesHelper.exe O53 - SMSR:HKLM\...\startupreg\LifeChat [Key] . (.Microsoft Corporation - LifeChat.exe.) -- C:\Program Files\Microsoft LifeChat\LifeChat.exe O53 - SMSR:HKLM\...\startupreg\MediaGet2 [Key] . (.MediaGet LLC - MediaGet torrent client.) -- C:\Users\Jonathan\AppData\Local\MediaGet2\mediaget.exe O53 - SMSR:HKLM\...\startupreg\NBAgent [Key] . (.Nero AG - Nero BackItUp.) -- C:\Program Files\Nero\Nero 10\Nero BackItUp\NBAgent.exe O53 - SMSR:HKLM\...\startupreg\PWRISOVM.EXE [Key] . (.PowerISO Computing, Inc. - PowerISO Virtual Drive Manager.) -- D:\PowerISO\PWRISOVM.exe O53 - SMSR:HKLM\...\startupreg\QuickTime Task [Key] . (.Apple Inc. - QuickTime Task.) -- C:\Program Files\QuickTime\QTTask.exe O53 - SMSR:HKLM\...\startupreg\SRSHDAudioLab [Key] . (.SRS Labs, Inc. - SRS HD Audio Lab.) -- C:\Program Files\SRS Labs\SRS HD Audio Lab\HDAL.exe O53 - SMSR:HKLM\...\startupreg\Windows Update [Key] . (...) -- C:\Users\Jonathan\AppData\Local\Temp\Keygen.exe (.not file.) ---\\ Microsoft Control Security Providers (O54) O54 - MCSP:[HKLM\...\CurrentControlSet\Control] - (SecurityProviders) - (.Microsoft Corporation - Credential Delegation Security Package.) -- C:\Windows\system32\credssp.dll O54 - MCSP:[HKLM\...\ControlSet001\Control] - (SecurityProviders) - (.Microsoft Corporation - Credential Delegation Security Package.) -- C:\Windows\system32\credssp.dll ---\\ Microsoft Windows Policies System (O55) O55 - MWPS:[HKLM\...\Policies\System] - "ConsentPromptBehaviorAdmin"=5 O55 - MWPS:[HKLM\...\Policies\System] - "ConsentPromptBehaviorUser"=3 O55 - MWPS:[HKLM\...\Policies\System] - "EnableInstallerDetection"=1 O55 - MWPS:[HKLM\...\Policies\System] - "EnableLUA"=1 O55 - MWPS:[HKLM\...\Policies\System] - "EnableSecureUIAPaths"=1 O55 - MWPS:[HKLM\...\Policies\System] - "EnableUIADesktopToggle"=0 O55 - MWPS:[HKLM\...\Policies\System] - "EnableVirtualization"=1 O55 - MWPS:[HKLM\...\Policies\System] - "PromptOnSecureDesktop"=1 O55 - MWPS:[HKLM\...\Policies\System] - "ValidateAdminCodeSignatures"=0 O55 - MWPS:[HKLM\...\Policies\System] - "dontdisplaylastusername"=0 O55 - MWPS:[HKLM\...\Policies\System] - "legalnoticecaption"= O55 - MWPS:[HKLM\...\Policies\System] - "legalnoticetext"= O55 - MWPS:[HKLM\...\Policies\System] - "scforceoption"=0 O55 - MWPS:[HKLM\...\Policies\System] - "shutdownwithoutlogon"=1 O55 - MWPS:[HKLM\...\Policies\System] - "undockwithoutlogon"=1 O55 - MWPS:[HKLM\...\Policies\System] - "FilterAdministratorToken"=0 O55 - MWPS:[HKLM\...\Policies\System] - "VerboseStatus"=1 O55 - MWPS:[HKLM\...\Policies\System] - "RunLogonScriptSync"=1 O55 - MWPS:[HKLM\...\Policies\System] - "SynchronousMachineGroupPolicy"=0 O55 - MWPS:[HKLM\...\Policies\System] - "SynchronousUserGroupPolicy"=0 O55 - MWPS:[HKLM\...\Policies\System] - "EnableLinkedConnections"=1 O55 - MWPS:[HKCU\...\Policies\System] - "EnableLUA"=0 ---\\ Microsoft Windows Policies Explorer (O56) O56 - MWPE:[HKCU\...\policies\Explorer] - "NoDriveTypeAutoRun"=145 O56 - MWPE:[HKCU\...\policies\Explorer] - "LinkResolveIgnoreLinkInfo"=1 O56 - MWPE:[HKCU\...\policies\Explorer] - "NoResolveSearch"=1 O56 - MWPE:[HKCU\...\policies\Explorer] - "NoResolveTrack"=1 O56 - MWPE:[HKCU\...\policies\Explorer] - "NoInternetOpenWith"=1 ---\\ Liste des Drivers Système (O58) O58 - SDL:[MD5.21E785EBD7DC90A06391141AAC7892FB] - 10/06/2009 - 02:26:15 ---A- . (.Adaptec, Inc. - Adaptec Windows SAS/SATA Storport Driver.) -- C:\Windows\system32\drivers\adp94xx.sys [422976] O58 - SDL:[MD5.0C676BC278D5B59FF5ABD57BBE9123F2] - 14/07/2009 - 02:26:17 ---A- . (.Adaptec, Inc. - Adaptec Windows SATA Storport Driver.) -- C:\Windows\system32\drivers\adpahci.sys [297552] O58 - SDL:[MD5.7C7B5EE4B7B822EC85321FE23A27DB33] - 14/07/2009 - 02:26:15 ---A- . (.Adaptec, Inc. - Adaptec StorPort Ultra320 SCSI Driver.) -- C:\Windows\system32\drivers\adpu320.sys [146512] O58 - SDL:[MD5.0D40BCF52EA90FC7DF2AEAB6503DEA44] - 14/07/2009 - 02:26:15 ---A- . (.Acer Laboratories Inc. - ALi mini IDE Driver.) -- C:\Windows\system32\drivers\aliide.sys [14400] O58 - SDL:[MD5.2101A86C25C154F8314B24EF49D7FBC2] - 10/06/2009 - 02:26:15 ---A- . (.Advanced Micro Devices - AHCI 1.2 Device Driver.) -- C:\Windows\system32\drivers\amdsata.sys [79952] O58 - SDL:[MD5.EA43AF0C423FF267355F74E7A53BDABA] - 10/06/2009 - 02:26:15 ---A- . (.AMD Technologies Inc. - AMD Technology AHCI Compatible Controller Driver for Windows fa.) -- C:\Windows\system32\drivers\amdsbs.sys [159312] O58 - SDL:[MD5.B81C2B5616F6420A9941EA093A92B150] - 14/07/2009 - 02:26:15 ---A- . (.Advanced Micro Devices - Storage Filter Driver.) -- C:\Windows\system32\drivers\amdxata.sys [23616] O58 - SDL:[MD5.2932004F49677BD84DBC72EDB754FFB3] - 14/07/2009 - 02:26:15 ---A- . (.Adaptec, Inc. - Adaptec RAID Storport Driver.) -- C:\Windows\system32\drivers\arc.sys [76368] O58 - SDL:[MD5.5D6F36C46FD283AE1B57BD2E9FEB0BC7] - 14/07/2009 - 02:26:15 ---A- . (.Adaptec, Inc. - Adaptec SAS RAID WS03 Driver.) -- C:\Windows\system32\drivers\arcsas.sys [86608] O58 - SDL:[MD5.7F08D9C504B015D81A8ABD75C80028C5] - 12/06/2011 - 12:59:35 ---A- . (.AVAST Software - avast! File System Access Blocking Driver.) -- C:\Windows\system32\drivers\aswFsBlk.sys [19544] O58 - SDL:[MD5.7C561E8E168BCF8D834B7D4A6A40DCBF] - 12/06/2011 - 13:04:46 ---A- . (.AVAST Software - avast! Filtering TDI driver.) -- C:\Windows\system32\drivers\aswFW.sys [102232] O58 - SDL:[MD5.9BDC8E9CE17B773F69D2C6696C768C4F] - 12/06/2011 - 12:59:44 ---A- . (.AVAST Software - avast! File System Minifilter for Windows 2003/Vista.) -- C:\Windows\system32\drivers\aswMonFlt.sys [53592] O58 - SDL:[MD5.7B948E3657BEA62E437BC46CA6EF6012] - 10/05/2011 - 12:40:58 ---A- . (.ALWIL Software - avast! Filtering NDIS driver.) -- C:\Windows\system32\drivers\aswNdis.sys [12112] O58 - SDL:[MD5.5CB9CC0220A9522B449B56E2260D9020] - 12/06/2011 - 13:03:31 ---A- . (.AVAST Software - avast! Filtering NDIS driver.) -- C:\Windows\system32\drivers\aswNdis2.sys [192984] O58 - SDL:[MD5.AC48BDD4CD5D44AF33087C06D6E9511C] - 12/06/2011 - 12:59:56 ---A- . (.AVAST Software - avast! TDI RDR Driver.) -- C:\Windows\system32\drivers\aswRdr.sys [25432] O58 - SDL:[MD5.B64134316FCD1F20E0F10EF3E65BD522] - 12/06/2011 - 13:03:54 ---A- . (.AVAST Software - avast! Virtualization Driver.) -- C:\Windows\system32\drivers\aswSnx.sys [441176] O58 - SDL:[MD5.D6788E3211AFA9951ED7A4D617F68A4F] - 12/06/2011 - 13:03:44 ---A- . (.AVAST Software - avast! self protection module.) -- C:\Windows\system32\drivers\aswSP.sys [307928] O58 - SDL:[MD5.4D100C45517809439C7B6DD98997FA00] - 12/06/2011 - 13:02:37 ---A- . (.AVAST Software - avast! TDI Filter Driver.) -- C:\Windows\system32\drivers\aswTdi.sys [49240] O58 - SDL:[MD5.D30B785AB801A0E2B0AD922D66F971F3] - 25/03/2011 - 04:34:02 ---A- . (.AVG Technologies CZ, s.r.o. - AVG Filter Driver.) -- C:\Windows\system32\drivers\avgfwd6x.sys [54112] O58 - SDL:[MD5.BD8869EB9CDE6BBE4508D869929869EE] - 14/07/2009 - 23:02:49 ---A- . (.Broadcom Corporation - Pilote unifié NDIS6.x Broadcom NetXtreme Gigabit Ethernet..) -- C:\Windows\system32\drivers\b57nd60x.sys [229888] O58 - SDL:[MD5.9F9ACC7F7CCDE8A15C282D3F88B43309] - 14/07/2009 - 23:53:28 ---A- . (.Brother Industries, Ltd. - Windows ME USB Mass-Storage Bulk-Only Lower Filter Driver.) -- C:\Windows\system32\drivers\BrFiltLo.sys [13568] O58 - SDL:[MD5.56801AD62213A41F6497F96DEE83755A] - 14/07/2009 - 23:53:28 ---A- . (.Brother Industries, Ltd. - Windows ME USB Mass-Storage Bulk-Only Upper Filter Driver.) -- C:\Windows\system32\drivers\BrFiltUp.sys [5248] O58 - SDL:[MD5.845B8CE732E67F3B4133164868C666EA] - 14/07/2009 - 01:57:25 ---A- . (.Brother Industries Ltd. - Pilote Brother Série I/F (WDM).) -- C:\Windows\system32\drivers\BrSerId.sys [272128] O58 - SDL:[MD5.203F0B1E73ADADBBB7B7B1FABD901F6B] - 14/07/2009 - 23:53:32 ---A- . (.Brother Industries Ltd. - Brother Serial driver (WDM version).) -- C:\Windows\system32\drivers\BrSerWdm.sys [62336] O58 - SDL:[MD5.BD456606156BA17E60A04E18016AE54B] - 14/07/2009 - 23:53:33 ---A- . (.Brother Industries Ltd. - Brother USB MDM Driver.) -- C:\Windows\system32\drivers\BrUsbMdm.sys [12160] O58 - SDL:[MD5.AF72ED54503F717A43268B3CC5FAEC2E] - 14/07/2009 - 23:53:33 ---A- . (.Brother Industries Ltd. - Brother USB Serial Driver.) -- C:\Windows\system32\drivers\BrUsbSer.sys [11904] O58 - SDL:[MD5.1A231ABEC60FD316EC54C66715543CEC] - 10/06/2009 - 23:02:48 ---A- . (.Broadcom Corporation - Broadcom NetXtreme II GigE VBD.) -- C:\Windows\system32\drivers\bxvbdx.sys [430080] O58 - SDL:[MD5.C537B1DB64D495B9B4717B4D6D9EDBF2] - 14/07/2009 - 02:26:21 ---A- . (.CMD Technology, Inc. - CMD PCI IDE Bus Driver.) -- C:\Windows\system32\drivers\cmdide.sys [15952] O58 - SDL:[MD5.8B30250D573A8F6B4BD23195160D8707] - 10/06/2009 - 02:20:28 ---A- . (.Adaptec, Inc. - Adaptec Ultra SCSI miniport.) -- C:\Windows\system32\drivers\djsvs.sys [70720] O58 - SDL:[MD5.555E54AC2F601A8821CEF58961653991] - 10/05/2011 - 12:50:02 ---A- . (.DT Soft Ltd - DAEMON Tools Virtual Bus Driver.) -- C:\Windows\system32\drivers\dtsoftbus01.sys [218688] O58 - SDL:[MD5.0ED67910C8C326796FAA00B2BF6D9D3C] - 10/06/2009 - 02:20:28 ---A- . (.Emulex - Storport Miniport Driver for LightPulse HBAs.) -- C:\Windows\system32\drivers\elxstor.sys [453712] O58 - SDL:[MD5.024E1B5CAC09731E4D868E64DBFB4AB0] - 10/06/2009 - 23:02:48 ---A- . (.Broadcom Corporation - Broadcom NetXtreme II 10 GigE VBD.) -- C:\Windows\system32\drivers\evbdx.sys [3100160] O58 - SDL:[MD5.8182FF89C65E4D38B2DE4BB0FB18564E] - 7/06/2011 - 12:17:00 ---A- . (.GEAR Software Inc. - CD DVD Filter.) -- C:\Windows\system32\drivers\GEARAspiWDM.sys [26600] O58 - SDL:[MD5.C44E3C2BAB6837DB337DDEE7544736DB] - 14/07/2009 - 23:54:14 ---A- . (.Hauppauge Computer Works, Inc. - Hauppauge WinTV 885 Consumer IR Driver for eHome.) -- C:\Windows\system32\drivers\hcw85cir.sys [26624] O58 - SDL:[MD5.295FDC419039090EB8B49FFDBB374549] - 14/07/2009 - 02:20:28 ---A- . (.Hewlett-Packard Company - Smart Array SAS/SATA Controller Media Driver.) -- C:\Windows\system32\drivers\HpSAMD.sys [67152] O58 - SDL:[MD5.934AF4D7C5F457B9F0743F4299B77B67] - 10/06/2009 - 02:20:36 ---A- . (.Intel Corporation - Intel Matrix Storage Manager driver - ia32.) -- C:\Windows\system32\drivers\iaStorV.sys [332352] O58 - SDL:[MD5.4173FF5708F3236CF25195FECD742915] - 14/07/2009 - 02:20:36 ---A- . (.Intel Corp./ICP vortex GmbH - Intel/ICP Raid Storport Driver.) -- C:\Windows\system32\drivers\iirsp.sys [41040] O58 - SDL:[MD5.EB119A53CCF2ACC000AC71B065B78FEF] - 14/07/2009 - 02:20:36 ---A- . (.LSI Corporation - LSI Fusion-MPT FC Driver (StorPort).) -- C:\Windows\system32\drivers\lsi_fc.sys [95824] O58 - SDL:[MD5.8ADE1C877256A22E49B75D1CC9161F9C] - 14/07/2009 - 02:20:37 ---A- . (.LSI Corporation - LSI Fusion-MPT SAS Driver (StorPort).) -- C:\Windows\system32\drivers\lsi_sas.sys [89168] O58 - SDL:[MD5.DC9DC3D3DAA0E276FD2EC262E38B11E9] - 14/07/2009 - 02:20:36 ---A- . (.LSI Corporation - LSI SAS Gen2 Driver (StorPort).) -- C:\Windows\system32\drivers\lsi_sas2.sys [54864] O58 - SDL:[MD5.0A036C7D7CAB643A7F07135AC47E0524] - 14/07/2009 - 02:20:36 ---A- . (.LSI Corporation - LSI Fusion-MPT SCSI Driver (StorPort).) -- C:\Windows\system32\drivers\lsi_scsi.sys [96848] O58 - SDL:[MD5.3D2C13377763EEAC0CA6FB46F57217ED] - 9/07/2011 - 08:11:20 ---A- . (.Malwarebytes Corporation - Malwarebytes' Anti-Malware.) -- C:\Windows\system32\drivers\mbam.sys [22712] O58 - SDL:[MD5.B309912717C29FC67E1BA4730A82B6DD] - 9/07/2011 - 08:11:30 ---A- . (.Malwarebytes Corporation - Malwarebytes' Anti-Malware.) -- C:\Windows\system32\drivers\mbamswissarmy.sys [39984] O58 - SDL:[MD5.0FFF5B045293002AB38EB1FD1FC2FB74] - 10/06/2009 - 02:20:36 ---A- . (.LSI Corporation - MEGASAS RAID Controller Driver for Windows 7 for x86.) -- C:\Windows\system32\drivers\megasas.sys [30800] O58 - SDL:[MD5.DCBAB2920C75F390CAF1D29F675D03D6] - 14/07/2009 - 02:20:36 ---A- . (.LSI Corporation, Inc. - LSI MegaRAID Software RAID Driver.) -- C:\Windows\system32\drivers\MegaSR.sys [235584] O58 - SDL:[MD5.954E3565A7D6951AF3DA5B0F649E42FB] - 25/03/2011 - 12:36:26 ---A- . (.Ralink Technology Corp. - Ralink 802.11n Wireless Adapter Driver.) -- C:\Windows\system32\drivers\netr28u.sys [807936] O58 - SDL:[MD5.27EE4B406E2F26F6117A9A420BD4CB65] - 10/06/2009 - 23:02:53 ---A- . (.Ralink Technology Corp. - Ralink 802.11n Wireless Adapter Driver.) -- C:\Windows\system32\drivers\netr28u.sysinbox [657408] O58 - SDL:[MD5.1D85C4B390B0EE09C7A46B91EFB2C097] - 14/07/2009 - 02:20:44 ---A- . (.IBM Corporation - IBM ServeRAID Controller Driver.) -- C:\Windows\system32\drivers\nfrd960.sys [44624] O58 - SDL:[MD5.73A70F1D89C942EEDD99A3F10459B051] - 25/03/2011 - 04:27:00 ---A- . (.NVIDIA Corporation - NVIDIA Windows Kernel Mode Driver, Version 266.58.) -- C:\Windows\system32\drivers\nvlddmkm.sys [10467656] O58 - SDL:[MD5.3F3D04B1D08D43C16EA7963954EC768D] - 14/07/2009 - 02:20:44 ---A- . (.NVIDIA Corporation - NVIDIA® nForce RAID Driver.) -- C:\Windows\system32\drivers\nvraid.sys [117312] O58 - SDL:[MD5.C99F251A5DE63C6F129CF71933ACED0F] - 10/06/2009 - 02:20:44 ---A- . (.NVIDIA Corporation - NVIDIA® nForce Sata Performance Driver.) -- C:\Windows\system32\drivers\nvstor.sys [142416] O58 - SDL:[MD5.D9145F60012289421F1B2DEE4945C845] - 25/03/2011 - 00:10:37 ---A- . (...) -- C:\Windows\system32\drivers\PnkBstrK.sys [138376] O58 - SDL:[MD5.AB95ECF1F6659A60DDC166D8315B0751] - 10/06/2009 - 02:19:04 ---A- . (.QLogic Corporation - QLogic Fibre Channel Stor Miniport Driver.) -- C:\Windows\system32\drivers\ql2300.sys [1383488] O58 - SDL:[MD5.B4DD51DD25182244B86737DC51AF2270] - 14/07/2009 - 02:19:04 ---A- . (.QLogic Corporation - QLogic iSCSI Storport Miniport Driver.) -- C:\Windows\system32\drivers\ql40xx.sys [106064] O58 - SDL:[MD5.F83FEAF4C5A3A559A6CC98E112B62744] - 25/03/2011 - 03:45:54 ---A- . (.Realtek - Realtek 8101E/8168/8169 NDIS 6.20 32-bit Driver.) -- C:\Windows\system32\drivers\Rt86win7.sys [327784] O58 - SDL:[MD5.20B2751CD4C8F3FD989739CA661B9F30] - 13/06/2011 - 09:44:34 ---A- . (.PowerISO Computing, Inc. - PowerISO Virtual Drive.) -- C:\Windows\system32\drivers\scdemu.sys [59388] O58 - SDL:[MD5.90A3935D05B494A5A39D37E71F09A677] - 14/07/2009 - 21:50:20 ---A- . (.Macrovision Corporation, Macrovision Europe - Macrovision SECURITY Driver.) -- C:\Windows\system32\drivers\secdrv.sys [20480] O58 - SDL:[MD5.A9F0486851BECB6DDA1D89D381E71055] - 10/06/2009 - 02:19:04 ---A- . (.Silicon Integrated Systems Corp. - SiS RAID Stor Miniport Driver.) -- C:\Windows\system32\drivers\sisraid2.sys [40016] O58 - SDL:[MD5.3727097B55738E2F554972C3BE5BC1AA] - 14/07/2009 - 02:19:04 ---A- . (.Silicon Integrated Systems - SiS AHCI Stor-Miniport Driver.) -- C:\Windows\system32\drivers\sisraid4.sys [77888] O58 - SDL:[MD5.959F0206D46CE43F1EB0A5B4D508B35F] - 23/06/2011 - 13:29:02 ---A- . (.Pas de propriétaire - SRS Premium Sound driver.) -- C:\Windows\system32\drivers\SRS_HDAL_i386.sys [390944] O58 - SDL:[MD5.DB32D325C192B801DF274BFD12A7E72B] - 14/07/2009 - 02:19:04 ---A- . (.Promise Technology - Promise SuperTrak EX Series Driver for Windows.) -- C:\Windows\system32\drivers\stexstor.sys [21072] O58 - SDL:[MD5.83CAFCB53201BBAC04D822F32438E244] - 7/06/2011 - 07:06:08 ---A- . (.Apple, Inc. - Apple Mobile Device USB Driver.) -- C:\Windows\system32\drivers\usbaapl.sys [42496] O58 - SDL:[MD5.0F0C96A570AB2B0164E04AB22CC8676A] - 25/03/2011 - 21:17:00 ---A- . (.VIA Technologies, Inc. - VIA High Definition Audio Function Driver.) -- C:\Windows\system32\drivers\viahduaa.sys [1143920] O58 - SDL:[MD5.E43574F6A56A0EE11809B48C09E4FD3C] - 14/07/2009 - 02:19:10 ---A- . (.VIA Technologies, Inc. - VIA Generic PCI IDE Bus Driver.) -- C:\Windows\system32\drivers\viaide.sys [16976] O58 - SDL:[MD5.9DFA0CC2F8855A04816729651175B631] - 10/06/2009 - 02:19:11 ---A- . (.VIA Technologies Inc.,Ltd - VIA RAID DRIVER FOR AMD-X86-64.) -- C:\Windows\system32\drivers\vsmraid.sys [141904] O58 - SDL:[MD5.432097846F5AAFDE2CD75C96757D7E39] - 25/03/2011 - 21:59:51 RSH-- . (...) -- C:\Windows\system32\989893A5FE.sys [88] O58 - SDL:[MD5.8AAD333C876590293F72B315E162BCC7] - 13/07/2009 - 22:40:41 ---A- . (...) -- C:\Windows\system32\ANSI.SYS [9029] O58 - SDL:[MD5.0FE9F16075C9ACB941C957B7C649176E] - 13/07/2009 - 22:40:44 ---A- . (...) -- C:\Windows\system32\country.sys [27097] O58 - SDL:[MD5.E6BC0F98FECEF245A0010D350C1A0B9B] - 13/07/2009 - 22:40:40 ---A- . (...) -- C:\Windows\system32\HIMEM.SYS [4768] O58 - SDL:[MD5.492090267B9608C62B956CD29BE3AFB7] - 13/07/2009 - 22:40:43 ---A- . (...) -- C:\Windows\system32\KEY01.SYS [42809] O58 - SDL:[MD5.FBBCFEC1379C5C02D88A361993EDF1B8] - 13/07/2009 - 22:40:43 ---A- . (...) -- C:\Windows\system32\KEYBOARD.SYS [42537] O58 - SDL:[MD5.BE9B82C5FB64CFD5ACC4E36721A983F3] - 25/03/2011 - 22:01:19 -SHA- . (...) -- C:\Windows\system32\KGyGaAvL.sys [2828] O58 - SDL:[MD5.FFFF296A08DBF2AC0126C62E3778AC0D] - 13/07/2009 - 22:40:23 ---A- . (...) -- C:\Windows\system32\NTDOS.SYS [27866] O58 - SDL:[MD5.CF9ED169FF86D935E47999E82359E898] - 13/07/2009 - 22:40:31 ---A- . (...) -- C:\Windows\system32\NTDOS404.SYS [29146] O58 - SDL:[MD5.03B945AC0481CD8BB161C3569D8ED1C3] - 13/07/2009 - 22:40:35 ---A- . (...) -- C:\Windows\system32\NTDOS411.SYS [29370] O58 - SDL:[MD5.BBC957DC18C17CC027EB80B7C77F2AEA] - 13/07/2009 - 22:40:39 ---A- . (...) -- C:\Windows\system32\NTDOS412.SYS [29274] O58 - SDL:[MD5.3CFFAEFFF23B0D208214A6D3061A5B1B] - 13/07/2009 - 22:40:27 ---A- . (...) -- C:\Windows\system32\NTDOS804.SYS [29146] O58 - SDL:[MD5.2E4112FB7D1B76E11ADFD7487B5D0E95] - 13/07/2009 - 22:40:11 ---A- . (...) -- C:\Windows\system32\NTIO.SYS [33952] O58 - SDL:[MD5.A98EBD4C2DF983665BF2D1AF49949974] - 13/07/2009 - 22:40:15 ---A- . (...) -- C:\Windows\system32\NTIO404.SYS [34672] O58 - SDL:[MD5.3F7E6406EDEF197C5CAAB2240EEF6F48] - 13/07/2009 - 22:40:17 ---A- . (...) -- C:\Windows\system32\NTIO411.SYS [35776] O58 - SDL:[MD5.3E64D681B776CC57BDC38A46D881F85B] - 13/07/2009 - 22:40:19 ---A- . (...) -- C:\Windows\system32\NTIO412.SYS [35536] O58 - SDL:[MD5.D86B6435729231C171432B4E77801BDB] - 13/07/2009 - 22:40:13 ---A- . (...) -- C:\Windows\system32\NTIO804.SYS [34672] ---\\ Derniers fichiers modifiés ou crées (Utilisateur) (O61) O61 - LFC:Last File Created 10/05/2011 - 00:54:45 ---A- C:\Users\Jonathan\AppData\Roaming\TS3Client\urls.ini [1211] O61 - LFC:Last File Created 10/05/2011 - 01:22:32 ---A- C:\Users\All Users\AVAST Software\Avast\fw\config.xml [2864] O61 - LFC:Last File Created 10/05/2011 - 01:22:35 ---A- C:\Users\All Users\AVAST Software\Avast\avast5.ini [8368] O61 - LFC:Last File Created 10/05/2011 - 01:25:42 ---A- C:\Users\All Users\AVAST Software\Avast\fw\networks.xml [1436] O61 - LFC:Last File Created 10/05/2011 - 01:25:42 ---A- C:\Users\All Users\AVAST Software\Avast\fw\ports.xml [11906] O61 - LFC:Last File Created 10/05/2011 - 01:25:42 ---A- C:\Users\All Users\AVAST Software\Avast\fw\rules.xml [192352] O61 - LFC:Last File Created 10/05/2011 - 19:56:59 ---A- C:\Users\Jonathan\AppData\Roaming\TS3Client\chats\dUtDUjlZOFkxb2llMzlFQURoK0dVM2F0SXJ3PQ==\channel.txt [2230] O61 - LFC:Last File Created 10/05/2011 - 23:17:47 ---A- C:\Users\Jonathan\AppData\Roaming\TS3Client\chats\dUtDUjlZOFkxb2llMzlFQURoK0dVM2F0SXJ3PQ==\server.html [613441] O61 - LFC:Last File Created 12/06/2011 - 01:21:09 ---A- C:\Users\All Users\AVAST Software\Avast\URL.db [761856] O61 - LFC:Last File Created 12/06/2011 - 01:21:47 ---A- C:\Users\All Users\AVAST Software\Avast\Fw.db [29696] O61 - LFC:Last File Created 12/06/2011 - 01:21:47 ---A- C:\Users\All Users\AVAST Software\Avast\Log.db [157696] O61 - LFC:Last File Created 12/06/2011 - 01:21:47 ---A- C:\Users\All Users\AVAST Software\Avast\db1cbea7ad29ba6e9-9e74cd2e.dat [1833240] O61 - LFC:Last File Created 12/06/2011 - 01:22:17 ---A- C:\Users\All Users\AVAST Software\Avast\snx_lconfig.xml [444] O61 - LFC:Last File Created 12/06/2011 - 01:22:35 ---A- C:\Users\All Users\AVAST Software\Avast\log\Chest.log [2146] O61 - LFC:Last File Created 12/06/2011 - 01:22:35 ---A- C:\Users\All Users\AVAST Software\Avast\log\Mail.log [56609] O61 - LFC:Last File Created 12/06/2011 - 01:22:36 ---A- C:\Users\All Users\AVAST Software\Avast\Spamconf\rkd [3435] O61 - LFC:Last File Created 12/06/2011 - 01:22:36 ---A- C:\Users\All Users\AVAST Software\Avast\report\BehaviorShield.txt [12925] O61 - LFC:Last File Created 12/06/2011 - 01:22:36 ---A- C:\Users\All Users\AVAST Software\Avast\report\EmailShield.txt [5002] O61 - LFC:Last File Created 12/06/2011 - 01:22:36 ---A- C:\Users\All Users\AVAST Software\Avast\report\FileSystemShield.txt [7512] O61 - LFC:Last File Created 12/06/2011 - 01:22:36 ---A- C:\Users\All Users\AVAST Software\Avast\report\IMShield.txt [5002] O61 - LFC:Last File Created 12/06/2011 - 01:22:36 ---A- C:\Users\All Users\AVAST Software\Avast\report\NetworkShield.txt [5002] O61 - LFC:Last File Created 12/06/2011 - 01:22:36 ---A- C:\Users\All Users\AVAST Software\Avast\report\P2PShield.txt [5002] O61 - LFC:Last File Created 12/06/2011 - 01:22:36 ---A- C:\Users\All Users\AVAST Software\Avast\report\ScriptShield.txt [5002] O61 - LFC:Last File Created 12/06/2011 - 01:22:36 ---A- C:\Users\All Users\AVAST Software\Avast\report\WebShield.txt [9745] O61 - LFC:Last File Created 12/06/2011 - 01:22:37 ---A- C:\Users\All Users\AVAST Software\Avast\Spamconf\sc1.bin.tmp [0] O61 - LFC:Last File Created 12/06/2011 - 01:23:22 ---A- C:\Users\All Users\AVAST Software\Avast\log\Setup.log [1243904] O61 - LFC:Last File Created 12/06/2011 - 01:23:45 ---A- C:\Users\All Users\AVAST Software\Avast\log\usntr.log [1724058] O61 - LFC:Last File Created 12/06/2011 - 01:25:40 ---A- C:\Users\All Users\AVAST Software\Avast\log\autosandbox.log [313360] O61 - LFC:Last File Created 12/06/2011 - 18:26:18 ---A- C:\Users\All Users\AVAST Software\Avast\log\aswAr.log [60014] O61 - LFC:Last File Created 12/06/2011 - 22:13:18 ---A- C:\Users\All Users\AVAST Software\Avast\log\Firewall.log [1981] O61 - LFC:Last File Created 12/06/2011 - 23:43:05 ---A- C:\Users\All Users\AVAST Software\Avast\db1cbea96e86ba8fb-2c58a82d.dat [173496] O61 - LFC:Last File Created 12/07/2011 - 00:20:15 ---A- C:\Users\Jonathan\AppData\Roaming\TS3Client\logs\ts3client_2011-07-12__12_26_59.295019.log [1326] O61 - LFC:Last File Created 12/07/2011 - 18:43:31 ----- C:\Users\Jonathan\AppData\Local\Temp\Twain001.Mtx [2] O61 - LFC:Last File Created 12/07/2011 - 23:17:46 ---A- C:\Users\Jonathan\AppData\Roaming\TS3Client\cache\dUtDUjlZOFkxb2llMzlFQURoK0dVM2F0SXJ3PQ==\channels\cache.dat [4] O61 - LFC:Last File Created 12/07/2011 - 23:17:46 ---A- C:\Users\Jonathan\AppData\Roaming\TS3Client\cache\dUtDUjlZOFkxb2llMzlFQURoK0dVM2F0SXJ3PQ==\perm.dat [76522] O61 - LFC:Last File Created 13/07/2011 - 00:20:54 ---A- C:\Users\All Users\Malwarebytes\Malwarebytes' Anti-Malware\Logs\protection-log-2011-07-13.txt [466] O61 - LFC:Last File Created 14/07/2011 - 18:35:14 ---A- C:\Users\All Users\AVAST Software\Avast\Spamconf\sc17.bin.incr.2011.07.13.20.01.01 [4104] O61 - LFC:Last File Created 14/07/2011 - 20:43:23 ---A- C:\Users\All Users\Malwarebytes\Malwarebytes' Anti-Malware\Logs\protection-log-2011-07-14.txt [246] O61 - LFC:Last File Created 14/07/2011 - 21:13:48 ----- C:\Users\Jonathan\AppData\Local\Temp\~DF2A9F106E57AD8289.TMP [16384] O61 - LFC:Last File Created 14/07/2011 - 23:17:47 ---A- C:\Users\Jonathan\AppData\Roaming\TS3Client\logs\ts3client_2011-07-14__20_56_43.520402.log [1031] O61 - LFC:Last File Created 15/07/2011 - 18:18:04 ---A- C:\Users\All Users\AVAST Software\Avast\log\AshWebSv.ws [0] O61 - LFC:Last File Created 15/07/2011 - 18:18:23 ---A- C:\Users\All Users\NVIDIA\Resource.old [1026397] O61 - LFC:Last File Created 15/07/2011 - 18:57:53 ----- C:\Users\Jonathan\AppData\Local\Temp\~DF5A2ACD1B423F7A34.TMP [16384] O61 - LFC:Last File Created 15/07/2011 - 19:36:46 ----- C:\Users\Jonathan\AppData\Local\Temp\~DF82E0D69B69AE3A04.TMP [16384] O61 - LFC:Last File Created 15/07/2011 - 20:43:26 ---A- C:\Users\All Users\Malwarebytes\Malwarebytes' Anti-Malware\Logs\protection-log-2011-07-15.txt [132] O61 - LFC:Last File Created 15/07/2011 - 20:43:26 ---A- C:\Users\All Users\Malwarebytes\Malwarebytes' Anti-Malware\mbam-setup.exe [9466208] O61 - LFC:Last File Created 16/06/2011 - 00:54:39 ---A- C:\Users\Jonathan\AppData\Roaming\TS3Client\chats\Rit2bWN4THpNL0swdThkNWRpVlVGaS9PRnhvPQ==\server.html [31127] O61 - LFC:Last File Created 16/06/2011 - 00:54:45 ---A- C:\Users\Jonathan\AppData\Roaming\TS3Client\chats\Rit2bWN4THpNL0swdThkNWRpVlVGaS9PRnhvPQ==\channel.html [1717] O61 - LFC:Last File Created 16/06/2011 - 23:34:43 ---A- C:\Users\Jonathan\AppData\Roaming\TS3Client\chats\Rit2bWN4THpNL0swdThkNWRpVlVGaS9PRnhvPQ==\channel.txt [74] O61 - LFC:Last File Created 16/07/2011 - 00:54:38 ---A- C:\Users\Jonathan\AppData\Roaming\TS3Client\cache\Rit2bWN4THpNL0swdThkNWRpVlVGaS9PRnhvPQ==\channels\cache.dat [4] O61 - LFC:Last File Created 16/07/2011 - 00:54:38 ---A- C:\Users\Jonathan\AppData\Roaming\TS3Client\cache\Rit2bWN4THpNL0swdThkNWRpVlVGaS9PRnhvPQ==\perm.dat [79436] O61 - LFC:Last File Created 16/07/2011 - 01:20:41 ---A- C:\Users\Jonathan\AppData\Roaming\Xfire\xig.ini [1444] O61 - LFC:Last File Created 16/07/2011 - 01:22:36 ---A- C:\Users\All Users\AVAST Software\Avast\Spamconf\scdns.bin [108] O61 - LFC:Last File Created 16/07/2011 - 01:22:37 ---A- C:\Users\All Users\AVAST Software\Avast\Spamconf\sc1.bin [728082] O61 - LFC:Last File Created 16/07/2011 - 01:22:37 ---A- C:\Users\All Users\AVAST Software\Avast\Spamconf\sc2.bin [9990] O61 - LFC:Last File Created 16/07/2011 - 01:22:43 ---A- C:\Users\All Users\NVIDIA\Resource.dat [1026397] O61 - LFC:Last File Created 16/07/2011 - 01:23:07 ---A- C:\Users\Jonathan\AppData\Local\Temp\AdobeARM.log [868] O61 - LFC:Last File Created 16/07/2011 - 23:34:43 ---A- C:\Users\Jonathan\AppData\Roaming\TS3Client\cache\Rit2bWN4THpNL0swdThkNWRpVlVGaS9PRnhvPQ==\icons\icon_1949973610 [822] O61 - LFC:Last File Created 16/07/2011 - 23:34:43 ---A- C:\Users\Jonathan\AppData\Roaming\TS3Client\cache\remote\maxrate.pl\images\banner1.png%3Fsuid%3DF%2BvmcxLzM%2FK0u8d5diVUFi%2FOFxo%3D [10592] O61 - LFC:Last File Created 16/07/2011 - 23:34:43 ---A- C:\Users\Jonathan\AppData\Roaming\TS3Client\logs\ts3client_2011-07-16__00_34_09.248190.log [935] O61 - LFC:Last File Created 16/07/2011 - 23:35:01 ---A- C:\Users\Jonathan\AppData\Roaming\TS3Client\cache\Rit2bWN4THpNL0swdThkNWRpVlVGaS9PRnhvPQ==\icons\dummy.png [93] O61 - LFC:Last File Created 21/04/2011 - 00:03:17 ---A- C:\Users\All Users\Xfire\channels\channel1000.ini [324] O61 - LFC:Last File Created 21/04/2011 - 00:04:41 ---A- C:\Users\All Users\Xfire\downloads\metadata\fileids.ini [114] O61 - LFC:Last File Created 21/04/2011 - 01:20:38 ---A- C:\Users\Jonathan\AppData\Roaming\Xfire\status.ini [371] O61 - LFC:Last File Created 21/04/2011 - 01:20:41 ---A- C:\Users\Jonathan\AppData\Roaming\Xfire\XfireUser.ini [5609] O61 - LFC:Last File Created 21/04/2011 - 23:30:19 ---A- C:\Users\All Users\Xfire\Xfire.ini [486] O61 - LFC:Last File Created 25/03/2011 - 00:10:29 ---A- C:\Users\Jonathan\AppData\Local\PunkBuster\COD\pb\PnkBstrB.exe [202448] O61 - LFC:Last File Created 25/03/2011 - 00:10:37 ---A- C:\Users\Jonathan\AppData\Local\PunkBuster\COD\pb\PnkBstrK.sys [138376] O61 - LFC:Last File Created 25/03/2011 - 00:44:26 ---A- C:\Users\Jonathan\AppData\Local\PunkBuster\COD\pb\pbcl.db [2451] O61 - LFC:Last File Created 25/03/2011 - 18:43:32 ---A- C:\Users\Jonathan\AppData\Local\Corel\LastDBFilter.PspCache [4] O61 - LFC:Last File Created 25/03/2011 - 18:43:48 ---A- C:\Users\Jonathan\AppData\Local\Corel\ImageDB.db [62464] O61 - LFC:Last File Created 25/03/2011 - 18:43:48 ---A- C:\Users\Jonathan\AppData\Roaming\Corel\Paint Shop Pro Photo\Cache\USE.PspCache [16435] O61 - LFC:Last File Created 25/03/2011 - 23:12:22 ---A- C:\Users\Jonathan\AppData\Roaming\Mumble\mumble.sqlite [27648] O61 - LFC:Last File Created 25/03/2011 - 23:12:23 ---A- C:\Users\Jonathan\AppData\Roaming\Mumble\Console.txt [620971] O61 - LFC:Last File Created 9/05/2011 - 00:54:45 ---A- C:\Users\Jonathan\AppData\Roaming\TS3Client\ts3clientui_qt.conf [3060] O61 - LFC:Last File Created 9/05/2011 - 23:17:46 ---A- C:\Users\Jonathan\AppData\Roaming\TS3Client\bookmarks.ini [1505] O61 - LFC:Last File Created 9/05/2011 - 23:17:47 ---A- C:\Users\Jonathan\AppData\Roaming\TS3Client\chats\dUtDUjlZOFkxb2llMzlFQURoK0dVM2F0SXJ3PQ==\channel.html [42365] O61 - LFC:Last File Created 9/05/2011 - 23:34:42 ---A- C:\Users\Jonathan\AppData\Roaming\TS3Client\ts3clientui_qt.secrets.conf [930] O61 - LFC:Last File Created 9/07/2011 - 01:21:44 --HA- C:\Users\Jonathan\AppData\Local\IconCache.db [1659244] O61 - LFC:Last File Created 9/07/2011 - 20:43:19 ---A- C:\Users\All Users\Malwarebytes\Malwarebytes' Anti-Malware\Configuration\local.conf [438] O61 - LFC:Last File Created 9/07/2011 - 20:43:19 ---A- C:\Users\All Users\Malwarebytes\Malwarebytes' Anti-Malware\Configuration\news.conf [250] O61 - LFC:Last File Created 9/07/2011 - 20:43:22 ---A- C:\Users\All Users\Malwarebytes\Malwarebytes' Anti-Malware\rules.ref [7017624] O61 - LFC:Last File Created 9/07/2011 - 20:43:26 ---A- C:\Users\All Users\Malwarebytes\Malwarebytes' Anti-Malware\Configuration\build.conf [267] O61 - LFC:Last File Created 9/07/2011 - 23:18:29 ---A- C:\Users\All Users\AVAST Software\Avast\log\AshWebSv.ws.ori [1602] ---\\ Alternate Data Stream File (O62) O62 - ADS:Alternate Data Stream File - C:\Windows\System32\pbsvc.exe:Zone.Identifier ---\\ Liste des outils de nettoyage (O63) O63 - Logiciel: Ad-Remover par C_XX - (.C_XX.) [HKLM] -- Ad-Remover O63 - Logiciel: ZHPDiag 1.27 - (.Nicolas Coolman.) [HKLM] -- ZHPDiag_is1 ---\\ Liste des fichiers non signés (O65) O65 - LUF:27/04/2007 (.Pas de propriétaire - DLLDEV32i.) (3, 7, 0, 12) - c:\windows\system32\DLLDEV32i.dll ---\\ Observateur d'évènement d'application (O66) O66 - EventLog: ID=1000 (Application Error) - (...) -- D:\activision\Call of Duty 1.4\CoDMP.exe O66 - EventLog: ID=1000 (Application Error) - (.Microsoft Corporation - Explorateur Windows.) -- C:\Windows\Explorer.EXE O66 - EventLog: ID=1002 (Application Hang) - (...) -- C:\Program Files O66 - EventLog: ID=1000 (Application Error) - (.Microsoft Corporation - COM Surrogate.) -- C:\Windows\system32\DllHost.exe ---\\ File Associations Shell Spawning (O67) O67 - Shell Spawning: <.bat> <batfile>[HKLM\..\open\Command] (...) -- "%1" %* O67 - Shell Spawning: <.cpl> <cplfile>[HKLM\..\cplopen\Command] (.Microsoft Corporation - Windows Control Panel.) -- C:\Windows\System32\control.exe O67 - Shell Spawning: <.cmd> <cmdfile>[HKLM\..\open\Command] (.Microsoft Corporation - Windows Control Panel.) -- "%1" %* O67 - Shell Spawning: <.com> <comfile>[HKLM\..\open\Command] (.Microsoft Corporation - Windows Control Panel.) -- "%1" %* O67 - Shell Spawning: <.exe> <exefile>[HKLM\..\open\Command] (...) -- "%1" %* O67 - Shell Spawning: <.html> <ChromeHTML>[HKLM\..\open\Command] (.Google Inc. - Google Chrome.) -- C:\Program Files\Google\Chrome\Application\chrome.exe O67 - Shell Spawning: <.js> <JSFile>[HKLM\..\open\Command] (.Microsoft Corporation - Microsoft ® Windows Based Script Host.) -- C:\Windows\System32\WScript.exe O67 - Shell Spawning: <.reg> <regfile>[HKLM\..\open\Command] (.Microsoft Corporation - Éditeur du Registre.) -- C:\Windows\regedit.exe O67 - Shell Spawning: <.html> <FirefoxHTML>[HKCU\..\open\Command] (.Mozilla Corporation - Firefox.) -- C:\Program Files\Mozilla Firefox\firefox.exe O67 - Shell Spawning: <.bat> <batfile>[HKCR\..\open\Command] (...) -- "%1" %* O67 - Shell Spawning: <.cpl> <cplfile>[HKCR\..\cplopen\Command] (.Microsoft Corporation - Windows Control Panel.) -- C:\Windows\System32\control.exe O67 - Shell Spawning: <.cmd> <cmdfile>[HKCR\..\open\Command] (.Microsoft Corporation - Windows Control Panel.) -- "%1" %* O67 - Shell Spawning: <.com> <comfile>[HKCR\..\open\Command] (.Microsoft Corporation - Windows Control Panel.) -- "%1" %* O67 - Shell Spawning: <.exe> <exefile>[HKCR\..\open\Command] (...) -- "%1" %* O67 - Shell Spawning: <.html> <FirefoxHTML>[HKCR\..\open\Command] (.Mozilla Corporation - Firefox.) -- C:\Program Files\Mozilla Firefox\firefox.exe O67 - Shell Spawning: <.js> <JSFile>[HKCR\..\open\Command] (.Microsoft Corporation - Microsoft ® Windows Based Script Host.) -- C:\Windows\System32\WScript.exe O67 - Shell Spawning: <.reg> <regfile>[HKCR\..\open\Command] (.Microsoft Corporation - Éditeur du Registre.) -- C:\Windows\regedit.exe ---\\ Start Menu Internet (O68) O68 - StartMenuInternet: <FIREFOX.EXE> <Mozilla Firefox>[HKLM\..\Shell\open\Command] (.Mozilla Corporation - Firefox.) -- C:\Program Files\Mozilla Firefox\firefox.exe O68 - StartMenuInternet: <Google Chrome> <Google Chrome>[HKLM\..\Shell\open\Command] (.Google Inc. - Google Chrome.) -- C:\Program Files\Google\Chrome\Application\chrome.exe O68 - StartMenuInternet: <IEXPLORE.EXE> <Internet Explorer>[HKLM\..\Shell\open\Command] (.Microsoft Corporation - Internet Explorer.) -- C:\Program Files\Internet Explorer\iexplore.exe ---\\ Search Browser Infection (O69) O69 - SBI: SearchScopes [HKCU] ${searchCLSID} [DefaultScope] - (@ieframe.dll,-12512) - Bing O69 - SBI: SearchScopes [HKCU] {0633EE93-1111-472f-A0FF-E1416B8B2E3B} - (Google Customized Web Search) - Gooofullsearch.com O69 - SBI: SearchScopes [HKCU] {0633EE93-D776-472f-A0FF-E1416B8B2E3A} - (Bing) - Bing O69 - SBI: SearchScopes [HKCU] {0D7562AE-8EF6-416d-A838-AB665251703A} - (Facemoods Search) - Facemoods Search O69 - SBI: SearchScopes [HKCU] {F0A826C1-9BD8-4DBE-B05D-E56A75C77ACC} - (Google) - Google ---\\ Recherche particuliere à la racine de certains dossiers (O84) [MD5.49914E66B170F952AEB9E82F93C9259F] [sPRF][25/08/2010] (.GoldWave Inc. - Uninstaller Program.) -- C:\Users\Jonathan\AppData\Local\Temp\gwunstal.exe [133120] [MD5.15DF8B49D8A7632F9B1EA08FD1CFC43B] [sPRF][9/07/2011] (.MAGIX AG - unwise_adf.) -- C:\Users\Jonathan\AppData\Local\Temp\unwise.exe [153056] [MD5.A719B9EE6116B496F4000C0B1311EA13] [sPRF][3/06/2011] (...) -- C:\Users\Jonathan\AppData\Roaming\PnkBstrK.sys [22328] [MD5.E8269245566BE948F6A219135B434160] [sPRF][9/07/2011] (.Trend Micro Inc. - HijackThis.) -- C:\Users\Jonathan\Desktop\HiJackThis.exe [401720] [MD5.9B0EEDE0731D10F482E72BAC24A059CD] [sPRF][10/07/2011] (.Nicolas Coolman - ZHPDiag.) -- C:\Users\Jonathan\Desktop\ZHPDiag2.exe [2538818] [MD5.7D7B1F8578F2F946A61A015AA44ADCF5] [sPRF][10/03/2011] (.Adobe Systems, Inc. - Adobe® Flash® Player Installer/Uninstaller 10.2 r153.) -- C:\Windows\Downloaded Program Files\FP_AX_CAB_INSTALLER.exe [2872992] ---\\ Firewall Active Exception List (FirewallRules) (O87) O87 - FAEL: "FPS-SpoolSvc-In-TCP-NoScope" | In - Domain - P6 - FALSE | .(.Microsoft Corporation - Application sous-système spouleur.) -- C:\Windows\system32\spoolsv.exe O87 - FAEL: "FPS-SpoolSvc-In-TCP" | In - Private - P6 - FALSE | .(.Microsoft Corporation - Application sous-système spouleur.) -- C:\Windows\system32\spoolsv.exe O87 - FAEL: "CoreNet-GP-LSASS-Out-TCP" | Out - Domain - P6 - TRUE | .(.Microsoft Corporation - Local Security Authority Process.) -- C:\Windows\system32\lsass.exe O87 - FAEL: "RemoteSvcAdmin-In-TCP-NoScope" | In - Domain - P6 - FALSE | .(.Microsoft Corporation - Applications Services et Contrôleur.) -- C:\Windows\system32\services.exe O87 - FAEL: "RemoteSvcAdmin-In-TCP" | In - Public - P6 - FALSE | .(.Microsoft Corporation - Applications Services et Contrôleur.) -- C:\Windows\system32\services.exe O87 - FAEL: "NetPres-In-TCP-NoScope" | In - Domain - P6 - FALSE | .(.Microsoft Corporation - Connect to a Network Projector.) -- C:\Windows\system32\netproj.exe O87 - FAEL: "NetPres-Out-TCP-NoScope" | Out - Domain - P6 - FALSE | .(.Microsoft Corporation - Connect to a Network Projector.) -- C:\Windows\system32\netproj.exe O87 - FAEL: "NetPres-WSD-In-UDP" | In - None - P17 - FALSE | .(.Microsoft Corporation - Connect to a Network Projector.) -- C:\Windows\system32\netproj.exe O87 - FAEL: "NetPres-WSD-Out-UDP" | Out - None - P17 - FALSE | .(.Microsoft Corporation - Connect to a Network Projector.) -- C:\Windows\system32\netproj.exe O87 - FAEL: "NetPres-In-TCP" | In - Public - P6 - FALSE | .(.Microsoft Corporation - Connect to a Network Projector.) -- C:\Windows\system32\netproj.exe O87 - FAEL: "NetPres-Out-TCP" | Out - Public - P6 - FALSE | .(.Microsoft Corporation - Connect to a Network Projector.) -- C:\Windows\system32\netproj.exe O87 - FAEL: "{ABED00A7-8CF8-4322-8315-E09F6393A30A}" | In - Public - P6 - TRUE | .(.Microsoft Corporation - Application sous-système spouleur.) -- C:\Windows\system32\spoolsv.exe O87 - FAEL: "TCP Query User{B6E3DCA5-EB1F-42E4-AB9A-73CF1B9D1DD9}D:\activision\call of duty 1.4\codmp.exe" | In - Public - P6 - TRUE | .(...) -- D:\activision\call of duty 1.4\codmp.exe O87 - FAEL: "UDP Query User{108B467F-98E3-4D2A-8FC2-C6E0458D6AA7}D:\activision\call of duty 1.4\codmp.exe" | In - Public - P17 - TRUE | .(...) -- D:\activision\call of duty 1.4\codmp.exe O87 - FAEL: "{FF1C7038-F742-40DC-8297-1FD2EB55B56C}" | In - Public - P6 - TRUE | .(...) -- C:\Windows\System32\PnkBstrA.exe O87 - FAEL: "{64F38761-3BFC-4A19-A777-3E2BC5634B97}" | In - Public - P17 - TRUE | .(...) -- C:\Windows\System32\PnkBstrA.exe O87 - FAEL: "{E0B51A29-75B1-44A2-93FA-D32465C6D3B0}" | In - Public - P6 - TRUE | .(...) -- C:\Windows\System32\PnkBstrB.exe O87 - FAEL: "{A5573362-AFDB-4D0F-9DB3-A740F4A0F51D}" | In - Public - P17 - TRUE | .(...) -- C:\Windows\System32\PnkBstrB.exe O87 - FAEL: "TCP Query User{24832265-F141-4B71-9131-2DCD15F58992}D:\activision\call of duty\codmp.exe" | In - Public - P6 - TRUE | .(...) -- D:\activision\call of duty\codmp.exe O87 - FAEL: "UDP Query User{811061FF-7FB7-4308-A6A6-E355A14518F9}D:\activision\call of duty\codmp.exe" | In - Public - P17 - TRUE | .(...) -- D:\activision\call of duty\codmp.exe O87 - FAEL: "TCP Query User{3A8830B6-B0BB-4A12-A8D8-C0CF58B8E1A7}C:\program files\xfire\xfire.exe" | In - Public - P6 - TRUE | .(.Xfire Inc. - Xfire.) -- C:\program files\xfire\xfire.exe O87 - FAEL: "UDP Query User{B8DA853E-0DAE-42BB-929F-7B1D3ADAFC9E}C:\program files\xfire\xfire.exe" | In - Public - P17 - TRUE | .(.Xfire Inc. - Xfire.) -- C:\program files\xfire\xfire.exe O87 - FAEL: "TCP Query User{7C2AA5B5-5DBD-4557-A499-0B768E46E68F}D:\telechargement jdownloader\shift2u.exe" | In - Public - P6 - TRUE | .(.Electronic Arts Inc. - SHIFT 2 UNLEASHED™.) -- D:\telechargement jdownloader\shift2u.exe O87 - FAEL: "UDP Query User{63112237-34C5-4D37-AEF7-0B13294CD0D2}D:\telechargement jdownloader\shift2u.exe" | In - Public - P17 - TRUE | .(.Electronic Arts Inc. - SHIFT 2 UNLEASHED™.) -- D:\telechargement jdownloader\shift2u.exe O87 - FAEL: "TCP Query User{91A3FFC0-A9C4-4343-AD6F-717F892E19FD}D:\activision\call of duty 1.3\codmp.exe" | In - Public - P6 - TRUE | .(...) -- D:\activision\call of duty 1.3\codmp.exe O87 - FAEL: "UDP Query User{FDF9EBAB-23C0-4CDA-B447-8B16195716A8}D:\activision\call of duty 1.3\codmp.exe" | In - Public - P17 - TRUE | .(...) -- D:\activision\call of duty 1.3\codmp.exe O87 - FAEL: "TCP Query User{AB1C29E7-C625-42CC-9096-A1FEA461421B}C:\users\jonathan\appdata\local\mediaget2\mediaget.exe" | In - Public - P6 - TRUE | .(.MediaGet LLC.) -- C:\users\jonathan\appdata\local\mediaget2\mediaget.exe O87 - FAEL: "UDP Query User{978A710A-8021-4121-A6B5-BF784A95B846}C:\users\jonathan\appdata\local\mediaget2\mediaget.exe" | In - Public - P17 - TRUE | .(.MediaGet LLC.) -- C:\users\jonathan\appdata\local\mediaget2\mediaget.exe O87 - FAEL: "{385E05E8-B904-4156-A594-79F64019D2D0}" | In - Public - P6 - TRUE | .(.Apple Inc. - Bonjour Service.) -- C:\Program Files\Bonjour\mDNSResponder.exe O87 - FAEL: "{E666EE7B-5C61-48BB-8957-546C7A61FB92}" | In - Public - P17 - TRUE | .(.Apple Inc. - Bonjour Service.) -- C:\Program Files\Bonjour\mDNSResponder.exe O87 - FAEL: "{175F4202-E126-4A32-80C8-54945176CC02}" | In - None - P17 - TRUE | .(.Apple Inc. - iTunes.) -- C:\Program Files\iTunes\iTunes.exe O87 - FAEL: "TCP Query User{E21BBBE0-88B6-4A3D-9E8A-90B5BF808789}D:\cod2\cod2mp_s.exe" | In - Public - P6 - TRUE | .(...) -- D:\cod2\cod2mp_s.exe O87 - FAEL: "UDP Query User{13E0DC0A-F2AD-4BD5-A4B5-23AEF18DF206}D:\cod2\cod2mp_s.exe" | In - Public - P17 - TRUE | .(...) -- D:\cod2\cod2mp_s.exe O87 - FAEL: "TCP Query User{ED89BB92-8A84-4D8D-B68D-80B19B0C2B9C}D:\cod4\iw3mp.exe" | In - Public - P6 - TRUE | .(...) -- D:\cod4\iw3mp.exe O87 - FAEL: "UDP Query User{06DA0470-C137-4086-8206-A5999088C0BF}D:\cod4\iw3mp.exe" | In - Public - P17 - TRUE | .(...) -- D:\cod4\iw3mp.exe O87 - FAEL: "{883E3477-D228-440F-956E-CB3D128DD037}" | In - Public - P6 - TRUE | .(.TeamViewer GmbH - TeamViewer Remote Control Application.) -- C:\Program Files\TeamViewer\Version6\TeamViewer.exe O87 - FAEL: "{4DCEA8A4-CAC8-40B0-8A7B-E0B5BEF0EA58}" | In - Public - P17 - TRUE | .(.TeamViewer GmbH - TeamViewer Remote Control Application.) -- C:\Program Files\TeamViewer\Version6\TeamViewer.exe O87 - FAEL: "{7C6F2F27-FF65-4095-B6A6-BBF1B9B390D7}" | In - Public - P6 - TRUE | .(.TeamViewer GmbH - TeamViewer Remote Control Application.) -- C:\Program Files\TeamViewer\Version6\TeamViewer_Service.exe O87 - FAEL: "{F9B2BBD3-697F-41F9-9AAC-FCA64195E17C}" | In - Public - P17 - TRUE | .(.TeamViewer GmbH - TeamViewer Remote Control Application.) -- C:\Program Files\TeamViewer\Version6\TeamViewer_Service.exe O87 - FAEL: "{69AF1787-3710-4EF6-A50C-5FE13E4AB141}" | In - Public - P6 - TRUE | .(.CybelSoft - Service de détection matériel.) -- C:\Program Files\ma-config.com\maconfservice.exe O87 - FAEL: "{DD955206-F227-4686-8047-6E25003F14F0}" | In - Public - P17 - TRUE | .(.CybelSoft - Service de détection matériel.) -- C:\Program Files\ma-config.com\maconfservice.exe ---\\ Scan Additionnel (O88) Database Version : 8520 - (08/07/2011) Clés trouvées (Keys found) : 20 Valeurs trouvées (Values found) : 0 Dossiers trouvés (Folders found) : 9 Fichiers trouvés (Files found) : 0 [HKLM\Software\Classes\urlsearchhook.toolbarurlsearchhook] =>Adware.Agent [HKLM\Software\Classes\urlsearchhook.toolbarurlsearchhook.1] =>Adware.Agent [HKLM\Software\Classes\Interface\{2a42d13c-d427-4787-821b-cf6973855778}] =>Adware.Agent [HKLM\Software\Classes\TypeLib\{2D5E2D34-BED5-4B9F-9793-A31E26E6806E}] =>Adware.Hotbar [HKLM\Software\Classes\Interface\{3d8478aa-7b88-48a9-8bcb-b85d594411ec}] =>Adware.Agent [HKLM\Software\Classes\TypeLib\{4509D3CC-B642-4745-B030-645B79522C6D}] =>Toolbar.Conduit [HKLM\Software\Classes\Interface\{4897bba6-48d9-468c-8efa-846275d7701b}] =>Adware.Agent [HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{64182481-4F71-486b-A045-B233BD0DA8FC}] =>Toolbar.Facemood [HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Settings\{64182481-4F71-486b-A045-B233BD0DA8FC}] =>Toolbar.Facemood [HKLM\Software\Classes\Interface\{A9379648-F6EB-4F65-A624-1C10411A15D0}] =>Toolbar.Facemood [HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{DB4E9724-F518-4dfd-9C7C-78B52103CAB9}] =>Toolbar.Facemood [HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Settings\{DB4E9724-F518-4dfd-9C7C-78B52103CAB9}] =>Toolbar.Facemood [HKLM\Software\Classes\Interface\{F16AB1DB-15C0-4456-A29E-4DF24FB9E3D2}] =>Toolbar.Facemood [HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{FCBCCB87-9224-4B8D-B117-F56D924BEB18}] =>Adware.Softomate [HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Settings\{FCBCCB87-9224-4B8D-B117-F56D924BEB18}] =>Adware.Softomate [HKLM\Software\Classes\CLSID\{FCBCCB87-9224-4B8D-B117-F56D924BEB18}] =>Adware.Softomate [HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{FCBCCB87-9224-4B8D-B117-F56D924BEB18}] =>Adware.Softomate [HKCU\Software\cacaoweb] =>PUP.CacaoWeb [HKLM\Software\Microsoft\Shared Tools\MSConfig\startupreg\cacaoweb] =>PUP.CacaoWeb [HKLM\Software\MediaGet] =>PUP.MediaGet C:\Program Files\JMHL Loader =>Trojan.Dropper C:\ProgramData\Media Get LLC =>PUP.MediaGet C:\ProgramData\Microsoft\Windows\Start Menu\Programs\MediaGet2 =>PUP.MediaGet C:\Users\Jonathan\AppData\Roaming\cacaoweb =>PUP.CacaoWeb C:\Users\Jonathan\AppData\Roaming\Media Get LLC =>PUP.MediaGet C:\Users\Jonathan\AppData\Local\Media Get LLC =>PUP.MediaGet C:\Users\Jonathan\AppData\Local\MediaGet2 =>PUP.MediaGet C:\Users\Jonathan\AppData\Local\Media Get LLC =>PUP.MediaGet C:\Users\Jonathan\AppData\Local\MediaGet2 =>PUP.MediaGet ---\\ Etat général des services non Microsoft (EGS) (SR=Running, SS=Stopped) SR - | Auto 19/06/2011 64952 | (AdobeARMservice) . (.Adobe Systems Incorporated.) - C:\Program Files\Common Files\Adobe\ARM\1.0\armsvc.exe SR - | Auto 7/06/2011 37664 | (Apple Mobile Device) . (.Apple Inc..) - C:\Program Files\Common Files\Apple\Mobile Device Support\AppleMobileDeviceService.exe SR - | Auto 10/05/2011 42184 | (avast! Antivirus) . (.AVAST Software.) - C:\Program Files\AVAST Software\Avast\AvastSvc.exe SR - | Auto 10/05/2011 121000 | (avast! Firewall) . (.AVAST Software.) - C:\Program Files\AVAST Software\Avast\afwServ.exe SR - | Auto 7/06/2011 349472 | (Bonjour Service) . (.Apple Inc..) - C:\Program Files\Bonjour\mDNSResponder.exe SS - | Demand 23/06/2011 1045256 | (FLEXnet Licensing Service) . (.Acresso Software Inc..) - C:\Program Files\Common Files\Macrovision Shared\FLEXnet Publisher\FNPLicensingService.exe SS - | Auto 9/07/2011 136176 | (gupdate) . (.Google Inc..) - C:\Program Files\Google\Update\GoogleUpdate.exe SS - | Demand 9/07/2011 136176 | (gupdatem) . (.Google Inc..) - C:\Program Files\Google\Update\GoogleUpdate.exe SS - | Demand 7/06/2011 820520 | (iPod Service) . (.Apple Inc..) - C:\Program Files\iPod\bin\iPodService.exe SS - | Demand 23/06/2011 311744 | (maconfservice) . (.CybelSoft.) - C:\Program Files\ma-config.com\maconfservice.exe SR - | Auto 9/07/2011 366640 | (MBAMService) . (.Malwarebytes Corporation.) - C:\Program Files\Malwarebytes' Anti-Malware\mbamservice.exe SR - | Auto 25/03/2011 490280 | C:\Program Files\Nero\Update\NASvc.exe (NAUpdate) . (.Nero AG.) - C:\Program Files\Nero\Update\NASvc.exe SR - | Auto 25/03/2011 608872 | (NVSvc) . (.NVIDIA Corporation.) - C:\Windows\system32\nvvsvc.exe SR - | Auto 25/03/2011 75136 | (PnkBstrA) . (...) - C:\Windows\system32\PnkBstrA.exe SR - | Auto 16/07/2011 202448 | (PnkBstrB) . (...) - C:\Windows\system32\PnkBstrB.exe SR - | Auto 25/03/2011 177704 | (ProtexisLicensing) . (...) - C:\Windows\system32\PSIService.exe SR - | Auto 23/06/2011 12648 | (SRSHDAudioService) . (.SRS Labs, Inc..) - C:\Program Files\Common Files\SRS Labs\SRS HD Audio Lab Service\SRSAudioLabService.exe SR - | Auto 25/03/2011 378984 | (Stereo Service) . (.NVIDIA Corporation.) - C:\Program Files\NVIDIA Corporation\3D Vision\nvSCPAPISvr.exe SR - | Auto 14/06/2011 2337144 | (TeamViewer6) . (.TeamViewer GmbH.) - C:\Program Files\TeamViewer\Version6\TeamViewer_Service.exe SR - | Auto 14/07/2009 20992 | C:\Windows\system32\wuaueng.dll (wuauserv) . (.Microsoft Corporation.) - C:\Windows\system32\svchost.exe ---\\ Recherche Master Boot Record Infection (MBR)(O80) Stealth MBR rootkit/Mebroot/Sinowal/TDL4 detector 0.4.2 by Gmer, GMER - Rootkit Detector and Remover Run by Jonathan at 16/07/2011 02:29:50 device: opened successfully user: MBR read successfully Disk trace: called modules: ntkrnlpa.exe CLASSPNP.SYS disk.sys ACPI.sys halmacpi.dll ataport.SYS pciide.sys PCIIDEX.SYS atapi.sys 1 ntkrnlpa!IofCallDriver[0x82A46428] -> \Device\Harddisk0\DR0[0x85E4F858] 3 CLASSPNP[0x8B1C459E] -> ntkrnlpa!IofCallDriver[0x82A46428] -> [0x85CD6918] 5 ACPI[0x8AC2C3B2] -> ntkrnlpa!IofCallDriver[0x82A46428] -> \Device\Ide\IdeDeviceP0T0L0-0[0x84FE2610] kernel: MBR read successfully user & kernel MBR OK ---\\ Recherche Master Boot Record Infection (MBRCheck)(O80) Written by ad13, http://ad13.geekstog Run by Jonathan at 16/07/2011 02:29:52 ********* Dump file Name ********* C:\PhysicalDisk0_MBR.bin ---\\ Liste des émulateurs de CD/DVD (Hook du MBR) O42 - Logiciel: DAEMON Tools Lite - (.DT Soft Ltd.) [HKLM] -- DAEMON Tools Lite End of the scan (1263 lines in 03mn 32s)(0)
  6. Bonjour a vous, j'ai ouvert un post dans réseaux et il s'est avérer que mon probleme ne se situait pas dans la bonne catégorie, voici le lien vers mon probleme déja expliqué: http://forum.zebulon.fr/findpost-t186489-p1562060.html le lien ZHPDiag: Cijoint.fr - Service gratuit de dépôt de fichiers En esperant avoir de vos nouvelles bientot, merci d'avance Achille,
  7. Merci beaucoup pour ton aiguillage Tonton Achille,
  8. Merci pour ta réponse TonTon, Voici le lien vers le fichier .txt PS: j'était déja inscrit au part avant mais avait oublié mon Pseudo^^ PS2: ce que je ne comprend pas, c'est que j'ai réussi a dl ton fichier sans probleme... mais autrement impossible --' Cijoint.fr - Service gratuit de dépôt de fichiers
  9. Salut, voila j'ai tester et plus rien en surfant....juste en allant sur un forum de partage, j'ai des pubs (les memes)... mais ailleurs, plus rien!!! voici le code source de la page web pour la pub de poker peut etre que ca peut t'aider?? : <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml"> <head> <meta http-equiv="Content-Type" content="text/html; charset=ISO-8859-1" /> <title>PartyPoker.com</title> <META NAME="ROBOTS" CONTENT="NOINDEX, NOFOLLOW"> <META NAME="SmartView_Page" CONTENT="1"> <style type="text/css"> img {padding:0; margin:0; border:none;} #redstripe {width:100%; background: url(http://www.partypoker.com/images/base/mainbackground/bg-red-stripe.jpg) repeat-x center 320px; height:500; } #greenbg{width:100%; background: url(images/bg_2.jpg) no-repeat center 0;} body {background-color:#084b06; padding:0; margin:0;} #toplogo{ width:834px; /*this centers the div */ margin:auto; margin-top:3px; padding-bottom:5px; padding-top:0px; padding-left:0px; padding-right:0px; } #bgflash { width:834px; height:603px; margin-top:12px; background-image: url(images/bg_red.gif); margin:auto; background-repeat: no-repeat; background-position: center; } #container { width:806px; height:572px; padding-top:14px; margin:auto; } #minimum { width:808px; margin:auto; font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 10px; color: #FFFFFF; padding: 10px 0px 10px 0px; } #minimum a{ font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 10px; color: #ff9900; text-decoration: underline; } #minimum a:hover{ font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 10px; color: #f3be57; text-decoration: underline; } .footer1 { font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 10px; color: #FFFFFF; } .footerbold { font-family: Arial, Helvetica, sans-serif; font-size: 12px; font-weight: bold; color: #FF9900; } a { font-family: Arial, Helvetica, sans-serif; font-size: 12px; color: #FFFFFF; } a:link { text-decoration: none; } a:visited { text-decoration: none; color: #FFFFFF; } a:hover { text-decoration: underline; color: #FF6600; } a:active { text-decoration: none; color: #FFFFFF; } </style> <script type="text/JavaScript"> <!-- function MM_preloadImages() { //v3.0 var d=document; if(d.images){ if(!d.MM_p) d.MM_p=new Array(); var i,j=d.MM_p.length,a=MM_preloadImages.arguments; for(i=0; i<a.length; i++) if (a.indexOf("#")!=0){ d.MM_p[j]=new Image; d.MM_p[j++].src=a;}} } function MM_swapImgRestore() { //v3.0 var i,x,a=document.MM_sr; for(i=0;a&&i<a.length&&(x=a)&&x.oSrc;i++) x.src=x.oSrc; } function MM_findObj(n, d) { //v4.01 var p,i,x; if(!d) d=document; if((p=n.indexOf("?"))>0&&parent.frames.length) { d=parent.frames[n.substring(p+1)].document; n=n.substring(0,p);} if(!(x=d[n])&&d.all) x=d.all[n]; for (i=0;!x&&i<d.forms.length;i++) x=d.forms[n]; for(i=0;!x&&d.layers&&i<d.layers.length;i++) x=MM_findObj(n,d.layers.document); if(!x && d.getElementById) x=d.getElementById(n); return x; } function MM_swapImage() { //v3.0 var i,j=0,x,a=MM_swapImage.arguments; document.MM_sr=new Array; for(i=0;i<(a.length-2);i+=3) if ((x=MM_findObj(a))!=null){document.MM_sr[j++]=x; if(!x.oSrc) x.oSrc=x.src; x.src=a[i+2];} } //--> </script> <script language="JavaScript"> <!-- var x = window.screen.availWidth; var y = window.screen.availHeight; window.moveTo(0,0); window.resizeTo(x,y); //--> </script> </head> <body onload="MM_preloadImages('images/download2.gif')" onbeforeunload="maximise();"> <div id="greenbg"> <div id="redstripe"> <div id="toplogo"> <a href="http://www.partypoker.com/" onclick="dcsMultiTrack('DCS.dcssip', 'www.partypoker.com', 'DCSext.buttons', ' Logo%20button');"><img src="images/logo.jpg" alt="logo" width="575" height="90" /></a><a href="http://www.partypoker.com/download"'>http://www.partypoker.com/download" onclick="dcsMultiTrack('DCS.dcssip', 'www.partypoker.com', 'DCSext.buttons', 'MainPage%20-%20Download%20now'); return iedl();"><img src="images/download1.gif" alt="download now" width="259" height="90" border="0" id="Image1" onmouseover="MM_swapImage('Image1','','images/download2.gif',1)" onmouseout="MM_swapImgRestore()" /></a> </div> <div id ="bgflash"> <div id="container"> <object classid="clsid:D27CDB6E-AE6D-11cf-96B8-444553540000" codebase="http://download.macromedia.com/pub/shockwave/cabs/flash/swflash.cab#version=7,0,19,0" width="806" height="572"> <param name="movie" value="images/V6.swf" /> <param name="quality" value="high" /> <embed src="images/V6.swf" quality="high" pluginspage="http://www.macromedia.com/go/getflashplayer" type="application/x-shockwave-flash" width="806" height="572"></embed> </object> </div> </div> <div id="minimum"> *Minimum deposit required and wagering restrictions apply. For more information read our <a href="http://www.partypoker.com/news/items/supersignup.html">terms and conditions</a></div> <table width="100%" border="0" cellspacing="0" cellpadding="0"> <tr> <td align="center" bgcolor="#2A6506" ><img src="images/spacer.gif" width="1" height="8" /><img src="images/spacer.gif" width="1" height="8" /> <table width="800" border="0" cellspacing="0" cellpadding="0"> <tr> <td height="24"><p><span class="footerbold">Main Menu :</span> <span class="footer1"><a href="http://www.partypoker.com/download" onclick="dcsMultiTrack('DCS.dcssip', 'www.partypoker.com', 'DCSext.buttons', 'MainMenu%20-%20Download%20Link'); return iedl();">Download</a> | <a href="http://www.partypoker.com/how_to_play/" target="_blank" onclick="dcsMultiTrack('DCS.dcssip', 'www.partypoker.com', 'DCSext.buttons', 'MainMenu%20-%20How%20to%20play%20Link');">How to Play</a> | <a href="http://www.partypoker.com/news/" target="_blank" onclick="dcsMultiTrack('DCS.dcssip', 'www.partypoker.com', 'DCSext.buttons', 'MainMenu%20-%20News%20and%20Promotions%20Link');">News and Promotions</a> | <a href="http://www.partypoker.com/tournaments/" target="_blank" onclick="dcsMultiTrack('DCS.dcssip', 'www.partypoker.com', 'DCSext.buttons', 'MainMenu%20-%20Tournaments%20Link');">Tournaments</a> | <a href="https://secure.partyaccount.com/poker/tell_a_friend/index.do" target="_blank" onclick="dcsMultiTrack('DCS.dcssip', 'www.partypoker.com', 'DCSext.buttons', 'MainMenu%20-%20Tell%20a%20friend%20Link');">Tell-a-Friend</a> | <a href="https://www.partypartners.com/index.do" target="_blank" onclick="dcsMultiTrack('DCS.dcssip', 'www.partypoker.com', 'DCSext.buttons', 'MainMenu%20-%20Affiliates%20Link');">Affiliates</a> | <a href="http://www.partypoker.com/about_us/" target="_blank" onclick="dcsMultiTrack('DCS.dcssip', 'www.partypoker.com', 'DCSext.buttons', 'MainMenu%20-%20About%20us%20link');">About Us</a> | <a href="https://secure.partyaccount.com/about/legal_information_s.do" target="_blank" onclick="dcsMultiTrack('DCS.dcssip', 'www.partypoker.com', 'DCSext.buttons', 'MainMenu%20-%20T%20and%20C');">Terms and Conditions of Use</a> | <a href="https://secure.partyaccount.com/about/privacy_s.do" target="_blank" onclick="dcsMultiTrack('DCS.dcssip', 'www.partypoker.com', 'DCSext.buttons', 'MainMenu%20-%20Privacy%20policy%20Link');">Privacy Policy</a> | <a href="https://secure.partyaccount.com/about/privacy_s.do#cookies" target="_blank" onclick="dcsMultiTrack('DCS.dcssip', 'www.partypoker.com', 'DCSext.buttons', 'MainMenu%20-%20Cookie%20policy%20%20Link');">Cookie Policy</a> | <a href="http://www.partypoker.com/help/site_map.html" target="_blank" onclick="dcsMultiTrack('DCS.dcssip', 'www.partypoker.com', 'DCSext.buttons', 'MainMenu%20-%20Site%20map%20Link');">Site Map</a></span></p> <p><img src="images/footer.gif" width="800" height="58" border="0" usemap="#Map" /></p> <p class="footer1">We are licensed and regulated by the Alderney Gambling Control Commission and the Government of Gibraltar, and our games are tested by iTech Labs, an independent tester of gaming and wagering devices to ensure that the games are fair and operate correctly.<br /> © 2008 WPC Productions Limited. All Rights Reserved.</p></td> </tr> </table> <br /></td> </tr> </table> </div> </div> <map name="Map" id="Map"> <area shape="rect" coords="613,10,649,49" href="http://www.partypoker.com/responsible_gaming/"'>http://www.partypoker.com/responsible_gaming/" target="_blank" alt="Over 18" /> <area shape="rect" coords="547,9,608,52" href="http://www.partypoker.com/responsible_gaming/gamcare.html" target="_blank" alt="GamCare Certificate" /> <area shape="rect" coords="493,8,537,51" href="http://www.gamblingtherapy.org/" target="_blank" alt="Gambling Therapy" /> <area shape="rect" coords="426,11,485,53" href="http://www.partypoker.com/responsible_gaming/" target="_blank" alt="Know Your Limits" /> <area shape="rect" coords="367,23,424,52" href="http://www.gra.gi/index.php?site=gambling" target="_blank" alt="Gibraltar Regulatory Authority" /> <area shape="rect" coords="311,4,365,51" href="http://www.egba.eu/en/" target="_blank" alt="EGBA" /> <area shape="rect" coords="657,6,692,49" href="http://www.gamblingcontrol.org/" target="_blank" alt="Alderney Gambling Control Commission" /> <area shape="rect" coords="212,11,301,49" href="http://www.partypoker.com" target="_blank" alt="iTech Labs" /> <area shape="rect" coords="78,-2,206,55" href="http://www.partygaming.com/" target="_blank" alt="PartyGaming" /> </map> <img src="https://secure.partyaccount.com/earlyexp/setTDUID.do?TDUID=_p175025_l1062643_v6668483_r2220378_d0_c!!!" height="1" width="1" border="0" /> <!-- THIS GOES BEFORE THE END BODY TAG --> <!-- START OF SmartSource Data Collector TAG --> <!-- Copyright © 1996-2009 WebTrends Inc. All rights reserved. --> <!-- Version: 8.6.2 --> <!-- Tag Builder Version: 3.0 --> <!-- Created: 9/28/2009 3:49:44 PM --> <script src="/js/webtrends.js" type="text/javascript"></script> <!-- ----------------------------------------------------------------------------------- --> <!-- Warning: The two script blocks below must remain inline. Moving them to an external --> <!-- JavaScript include file can cause serious problems with cross-domain tracking. --> <!-- ----------------------------------------------------------------------------------- --> <script type="text/javascript"> //<![CDATA[ var _tag=new WebTrends(); _tag.dcsGetId(); //]]>> </script> <script type="text/javascript"> //<![CDATA[ // Add custom parameters here. //_tag.DCSext.param_name=param_value; _tag.dcsCollect(); //]]>> </script> <noscript> <div><img alt="DCSIMG" id="DCSIMG" width="1" height="1" src="http://statse.webtrendslive.com/dcs9u0ga210000slvggr2q2ax_4c6h/njs.gif?dcsuri=/nojavascript&WT.js=No&WT.tv=8.6.2"/></div> </noscript> <!-- END OF SmartSource Data Collector TAG --> </body> </html>
  10. Salut apres avoir fini le scan de 1H50 avec Antivir, j'ai ouvert une page internet et la, qu'est ce que je vois....des pubs, apres j'ai fixer les 4 ligne que tu m'a dit et je test et te dit quoi... Dois-je Rebooter???? ENCORE UN GRAND MERCI
  11. Avira AntiVir Personal Date de création du fichier de rapport : mardi 10 novembre 2009 11:10 La recherche porte sur 1878510 souches de virus. Détenteur de la licence : Avira AntiVir Personal - FREE Antivirus Numéro de série : 0000149996-ADJIE-0000001 Plateforme : Windows Vista Version de Windows : (plain) [6.1.7600] Mode Boot : Démarré normalement Identifiant : Système Nom de l'ordinateur : JON-PC Informations de version : BUILD.DAT : 9.0.0.70 18071 Bytes 25/09/2009 12:03:00 AVSCAN.EXE : 9.0.3.7 466689 Bytes 21/07/2009 13:35:43 AVSCAN.DLL : 9.0.3.0 49409 Bytes 3/03/2009 10:21:02 LUKE.DLL : 9.0.3.2 209665 Bytes 20/02/2009 11:35:11 LUKERES.DLL : 9.0.2.0 13569 Bytes 3/03/2009 10:21:31 ANTIVIR0.VDF : 7.1.0.0 15603712 Bytes 27/10/2008 12:30:36 ANTIVIR1.VDF : 7.1.4.132 5707264 Bytes 24/06/2009 09:21:42 ANTIVIR2.VDF : 7.1.6.160 5413376 Bytes 28/10/2009 10:03:14 ANTIVIR3.VDF : 7.1.6.211 430592 Bytes 10/11/2009 10:03:16 Version du moteur : 8.2.1.61 AEVDF.DLL : 8.1.1.2 106867 Bytes 10/11/2009 10:03:34 AESCRIPT.DLL : 8.1.2.44 586107 Bytes 10/11/2009 10:03:33 AESCN.DLL : 8.1.2.5 127346 Bytes 10/11/2009 10:03:31 AERDL.DLL : 8.1.3.2 479604 Bytes 10/11/2009 10:03:30 AEPACK.DLL : 8.2.0.3 422261 Bytes 10/11/2009 10:03:28 AEOFFICE.DLL : 8.1.0.38 196987 Bytes 23/07/2009 09:59:39 AEHEUR.DLL : 8.1.0.180 2093432 Bytes 10/11/2009 10:03:26 AEHELP.DLL : 8.1.7.0 237940 Bytes 10/11/2009 10:03:20 AEGEN.DLL : 8.1.1.71 364916 Bytes 10/11/2009 10:03:19 AEEMU.DLL : 8.1.1.0 393587 Bytes 10/11/2009 10:03:17 AECORE.DLL : 8.1.8.2 184694 Bytes 10/11/2009 10:03:17 AEBB.DLL : 8.1.0.3 53618 Bytes 9/10/2008 14:32:40 AVWINLL.DLL : 9.0.0.3 18177 Bytes 12/12/2008 08:47:30 AVPREF.DLL : 9.0.3.0 44289 Bytes 10/11/2009 10:04:53 AVREP.DLL : 8.0.0.3 155905 Bytes 20/01/2009 14:34:28 AVREG.DLL : 9.0.0.0 36609 Bytes 7/11/2008 15:24:42 AVARKT.DLL : 9.0.0.3 292609 Bytes 24/03/2009 15:05:22 AVEVTLOG.DLL : 9.0.0.7 167169 Bytes 30/01/2009 10:36:37 SQLITE3.DLL : 3.6.1.0 326401 Bytes 28/01/2009 15:03:49 SMTPLIB.DLL : 9.2.0.25 28417 Bytes 2/02/2009 08:20:57 NETNT.DLL : 9.0.0.0 11521 Bytes 7/11/2008 15:40:59 RCIMAGE.DLL : 9.0.0.25 2438913 Bytes 17/06/2009 13:44:26 RCTEXT.DLL : 9.0.37.0 88321 Bytes 15/04/2009 10:07:05 Configuration pour la recherche actuelle : Nom de la tâche...............................: Contrôle intégral du système Fichier de configuration......................: c:\program files\avira\antivir desktop\sysscan.avp Documentation.................................: bas Action principale.............................: interactif Action secondaire.............................: ignorer Recherche sur les secteurs d'amorçage maître..: marche Recherche sur les secteurs d'amorçage.........: marche Secteurs d'amorçage...........................: C:, Recherche dans les programmes actifs..........: marche Recherche en cours sur l'enregistrement.......: marche Recherche de Rootkits.........................: marche Contrôle d'intégrité de fichiers système......: arrêt Fichier mode de recherche.....................: Tous les fichiers Recherche sur les archives....................: marche Limiter la profondeur de récursivité..........: 20 Archive Smart Extensions......................: marche Heuristique de macrovirus.....................: marche Heuristique fichier...........................: moyen Début de la recherche : mardi 10 novembre 2009 11:10 La recherche d'objets cachés commence. '26646' objets ont été contrôlés, '0' objets cachés ont été trouvés. La recherche sur les processus démarrés commence : Processus de recherche 'avscan.exe' - '1' module(s) sont contrôlés Processus de recherche 'avscan.exe' - '1' module(s) sont contrôlés Processus de recherche 'avcenter.exe' - '1' module(s) sont contrôlés Processus de recherche 'avguard.exe' - '1' module(s) sont contrôlés Processus de recherche 'avcenter.exe' - '1' module(s) sont contrôlés Processus de recherche 'avgnt.exe' - '1' module(s) sont contrôlés Processus de recherche 'sched.exe' - '1' module(s) sont contrôlés Processus de recherche 'wuauclt.exe' - '1' module(s) sont contrôlés Processus de recherche 'wmpnetwk.exe' - '1' module(s) sont contrôlés Processus de recherche 'svchost.exe' - '1' module(s) sont contrôlés Processus de recherche 'mscorsvw.exe' - '1' module(s) sont contrôlés Processus de recherche 'firefox.exe' - '1' module(s) sont contrôlés Processus de recherche 'SearchIndexer.exe' - '1' module(s) sont contrôlés Processus de recherche 'msnmsgr.exe' - '1' module(s) sont contrôlés Processus de recherche 'sidebar.exe' - '1' module(s) sont contrôlés Processus de recherche 'jusched.exe' - '1' module(s) sont contrôlés Processus de recherche 'explorer.exe' - '1' module(s) sont contrôlés Processus de recherche 'dwm.exe' - '1' module(s) sont contrôlés Processus de recherche 'taskhost.exe' - '1' module(s) sont contrôlés Processus de recherche 'svchost.exe' - '1' module(s) sont contrôlés Processus de recherche 'svchost.exe' - '1' module(s) sont contrôlés Processus de recherche 'TUProgSt.exe' - '1' module(s) sont contrôlés Processus de recherche 'svchost.exe' - '1' module(s) sont contrôlés Processus de recherche 'PSIService.exe' - '1' module(s) sont contrôlés Processus de recherche 'NBService.exe' - '1' module(s) sont contrôlés Processus de recherche 'a2service.exe' - '1' module(s) sont contrôlés Processus de recherche 'svchost.exe' - '1' module(s) sont contrôlés Processus de recherche 'spoolsv.exe' - '1' module(s) sont contrôlés Processus de recherche 'svchost.exe' - '1' module(s) sont contrôlés Processus de recherche 'svchost.exe' - '1' module(s) sont contrôlés Processus de recherche 'svchost.exe' - '1' module(s) sont contrôlés Processus de recherche 'svchost.exe' - '1' module(s) sont contrôlés Processus de recherche 'svchost.exe' - '1' module(s) sont contrôlés Processus de recherche 'svchost.exe' - '1' module(s) sont contrôlés Processus de recherche 'svchost.exe' - '1' module(s) sont contrôlés Processus de recherche 'svchost.exe' - '1' module(s) sont contrôlés Processus de recherche 'lsm.exe' - '1' module(s) sont contrôlés Processus de recherche 'lsass.exe' - '1' module(s) sont contrôlés Processus de recherche 'services.exe' - '1' module(s) sont contrôlés Processus de recherche 'winlogon.exe' - '1' module(s) sont contrôlés Processus de recherche 'wininit.exe' - '1' module(s) sont contrôlés Processus de recherche 'csrss.exe' - '1' module(s) sont contrôlés Processus de recherche 'csrss.exe' - '1' module(s) sont contrôlés Processus de recherche 'smss.exe' - '1' module(s) sont contrôlés '44' processus ont été contrôlés avec '44' modules La recherche sur les secteurs d'amorçage maître commence : Secteur d'amorçage maître HD0 [iNFO] Aucun virus trouvé ! La recherche sur les secteurs d'amorçage commence : Secteur d'amorçage 'C:\' [iNFO] Aucun virus trouvé ! La recherche sur les renvois aux fichiers exécutables (registre) commence : Le registre a été contrôlé ( '25' fichiers). La recherche sur les fichiers sélectionnés commence : Recherche débutant dans 'C:\' C:\hiberfil.sys [AVERTISSEMENT] Impossible d'ouvrir le fichier ! [REMARQUE] Ce fichier est un fichier système Windows. [REMARQUE] Il est correct que ce fichier ne puisse pas être ouvert pour la recherche. C:\pagefile.sys [AVERTISSEMENT] Impossible d'ouvrir le fichier ! [REMARQUE] Ce fichier est un fichier système Windows. [REMARQUE] Il est correct que ce fichier ne puisse pas être ouvert pour la recherche. C:\Users\Jon\Documents\LimeWire\Incomplete\Preview-T-5188355-angie b new hot single.au [RESULTAT] Contient le modèle de détection de l'exploit EXP/ASF.GetCodec.Gen C:\Users\Jon\Documents\LimeWire\Incomplete\Preview-T-5862587-angie b.au [RESULTAT] Contient le modèle de détection de l'exploit EXP/ASF.GetCodec.Gen C:\Users\Jon\Downloads\bws-0434.rar [0] Type d'archive: RAR --> bws-a434\brewers.exe [RESULTAT] Contient le cheval de Troie TR/Crypt.UPKM.Gen --> bws-b434\brewers.exe [RESULTAT] Contient le cheval de Troie TR/Crypt.UPKM.Gen C:\Users\Jon\Downloads\Car_Radio_Code_Calculator.eng.rar.part [0] Type d'archive: RAR --> Car_Radio_Code_Calculator\Daewoo Car Radio Decoding Software\DAEWOO Serials Calculator v1.00.exe [RESULTAT] Contient le cheval de Troie TR/Agent.blfs --> Car_Radio_Code_Calculator\Philips Car Radio Decoding Software\Philips Car Radio Decoding Software\Ccr600 v1.2d.exe [RESULTAT] Contient le cheval de Troie TR/Crypt.ASPM.Gen --> Car_Radio_Code_Calculator\Philips Car Radio Decoding Software\Philips Car Radio Decoding Software\Ccr600 v1.2.exe [RESULTAT] Contient le cheval de Troie TR/Generic.77006 C:\Users\Jon\Downloads\Car_Radio_Code_Calculator.rar.part [0] Type d'archive: RAR --> Car_Radio_Code_Calculator\Daewoo Car Radio Decoding Software\DAEWOO Serials Calculator v1.00.exe [RESULTAT] Contient le cheval de Troie TR/Agent.blfs --> Car_Radio_Code_Calculator\Philips Car Radio Decoding Software\Philips Car Radio Decoding Software\Ccr600 v1.2.exe [RESULTAT] Contient le cheval de Troie TR/Generic.77006 --> Car_Radio_Code_Calculator\Philips Car Radio Decoding Software\Philips Car Radio Decoding Software\Ccr600 v1.2d.exe [RESULTAT] Contient le cheval de Troie TR/Crypt.ASPM.Gen C:\Users\Jon\Downloads\gamingharbor_installer.exe [RESULTAT] Contient le modèle de détection du logiciel espion ou publicitaire ADSPY/PopMenu.B.1 C:\Users\Jon\Downloads\Nero.v9.4.13.2c.Multilanguage.WinALL.Incl.Clean.Keymaker-DTC.zip [0] Type d'archive: ZIP --> Nero.v9.4.13.2c.Multilanguage.WinALL.Incl.Clean.Keymaker-DTC/Utils/keymaker.exe [RESULTAT] Contient le cheval de Troie TR/ATRAPS.Gen C:\Users\Jon\Downloads\PhotoshopPortable.exe [0] Type d'archive: 7-Zip --> PhotoshopPortable/PhotoshopPortable.exe --> Object [RESULTAT] Contient le cheval de Troie TR/PSW.Agent.man C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\OHLXH44T\upgrade[1].cab [0] Type d'archive: CAB (Microsoft) --> upgrade.exe [1] Type d'archive: NSIS --> [unknownDir]/queryservice.dll [RESULTAT] Contient le modèle de détection du logiciel publicitaire ADWARE/Zwangi.p C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\P17N3CJO\upgrade[1].cab [0] Type d'archive: CAB (Microsoft) --> upgrade.exe [1] Type d'archive: NSIS --> [unknownDir]/queryservice.dll [RESULTAT] Contient le modèle de détection du logiciel publicitaire ADWARE/Zwangi.q C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\VKP899UT\upgrade[1].cab [0] Type d'archive: CAB (Microsoft) --> upgrade.exe [1] Type d'archive: NSIS --> [unknownDir]/queryservice.dll [RESULTAT] Contient le modèle de détection du logiciel publicitaire ADWARE/Zwangi.p C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\VKP899UT\upgrade[2].cab [0] Type d'archive: CAB (Microsoft) --> upgrade.exe [1] Type d'archive: NSIS --> [unknownDir]/queryservice.exe [RESULTAT] Contient le modèle de détection du logiciel espion ou publicitaire ADSPY/Zwangi.AE.2 C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZBO6V23K\upgrade[1].cab [0] Type d'archive: CAB (Microsoft) --> upgrade.exe [1] Type d'archive: NSIS --> [unknownDir]/queryservice.dll [RESULTAT] Contient le modèle de détection du logiciel publicitaire ADWARE/Zwangi.p C:\Windows\System32\drivers\sptd.sys [AVERTISSEMENT] Impossible d'ouvrir le fichier ! Début de la désinfection : C:\Users\Jon\Documents\LimeWire\Incomplete\Preview-T-5188355-angie b new hot single.au [RESULTAT] Contient le modèle de détection de l'exploit EXP/ASF.GetCodec.Gen [REMARQUE] Le fichier a été déplacé dans le répertoire de quarantaine sous le nom '4b5e57ce.qua' ! C:\Users\Jon\Documents\LimeWire\Incomplete\Preview-T-5862587-angie b.au [RESULTAT] Contient le modèle de détection de l'exploit EXP/ASF.GetCodec.Gen [REMARQUE] Le fichier a été déplacé dans le répertoire de quarantaine sous le nom '4813aedf.qua' ! C:\Users\Jon\Downloads\bws-0434.rar [REMARQUE] Le fichier a été déplacé dans le répertoire de quarantaine sous le nom '4b6c57d3.qua' ! C:\Users\Jon\Downloads\Car_Radio_Code_Calculator.eng.rar.part [REMARQUE] Le fichier a été déplacé dans le répertoire de quarantaine sous le nom '4b6b57bd.qua' ! C:\Users\Jon\Downloads\Car_Radio_Code_Calculator.rar.part [REMARQUE] Le fichier a été déplacé dans le répertoire de quarantaine sous le nom '4b6b57be.qua' ! C:\Users\Jon\Downloads\gamingharbor_installer.exe [RESULTAT] Contient le modèle de détection du logiciel espion ou publicitaire ADSPY/PopMenu.B.1 [REMARQUE] Le fichier a été déplacé dans le répertoire de quarantaine sous le nom '4b6657bf.qua' ! C:\Users\Jon\Downloads\Nero.v9.4.13.2c.Multilanguage.WinALL.Incl.Clean.Keymaker-DTC.zip [AVERTISSEMENT] Erreur lors de la création d'une copie de sécurité du fichier. Le fichier n'a pas été supprimé. Code d'erreur : 26001 [AVERTISSEMENT] Erreur dans l'initialisation de la quarantaine ! [REMARQUE] Tentative en cours d'exécuter l'action à l'aide de la bibliothèque ARK. [REMARQUE] Le fichier a été déplacé dans le répertoire de quarantaine sous le nom '4831793c.qua' ! C:\Users\Jon\Downloads\PhotoshopPortable.exe [REMARQUE] Le fichier a été déplacé dans le répertoire de quarantaine sous le nom '4b685801.qua' ! C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\OHLXH44T\upgrade[1].cab [REMARQUE] Le fichier a été déplacé dans le répertoire de quarantaine sous le nom '4b60580b.qua' ! C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\P17N3CJO\upgrade[1].cab [REMARQUE] Le fichier a été déplacé dans le répertoire de quarantaine sous le nom '483141e4.qua' ! C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\VKP899UT\upgrade[1].cab [REMARQUE] Le fichier a été déplacé dans le répertoire de quarantaine sous le nom '4d9135cc.qua' ! C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\VKP899UT\upgrade[2].cab [REMARQUE] Le fichier a été déplacé dans le répertoire de quarantaine sous le nom '4d93255c.qua' ! C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZBO6V23K\upgrade[1].cab [REMARQUE] Le fichier a été déplacé dans le répertoire de quarantaine sous le nom '4b60580c.qua' ! Fin de la recherche : mardi 10 novembre 2009 13:07 Temps nécessaire: 1:55:38 Heure(s) La recherche a été effectuée intégralement 17263 Les répertoires ont été contrôlés 532870 Des fichiers ont été contrôlés 18 Des virus ou programmes indésirables ont été trouvés 0 Des fichiers ont été classés comme suspects 0 Des fichiers ont été supprimés 0 Des virus ou programmes indésirables ont été réparés 13 Les fichiers ont été déplacés dans la quarantaine 0 Les fichiers ont été renommés 3 Impossible de contrôler des fichiers 532849 Fichiers non infectés 4269 Les archives ont été contrôlées 4 Avertissements 15 Consignes 26646 Des objets ont été contrôlés lors du Rootkitscan 0 Des objets cachés ont été trouvés
  12. Bonjour, et encore merci beaucoup pour ton aide... voici le rapport hijackthis apres la manip et le reboot : Logfile of Trend Micro HijackThis v2.0.2 Scan saved at 10:36:56, on 10/11/2009 Platform: Unknown Windows (WinNT 6.01.3504) MSIE: Internet Explorer v8.00 (8.00.7600.16385) Boot mode: Normal Running processes: C:\Windows\system32\taskhost.exe C:\Windows\system32\Dwm.exe C:\Windows\Explorer.EXE C:\Windows\system32\taskeng.exe C:\Program Files\Java\jre6\bin\jusched.exe C:\Program Files\Alwil Software\Avast4\ashDisp.exe C:\Program Files\Adobe\Reader 9.0\Reader\reader_sl.exe C:\Program Files\Common Files\Corel\Corel PhotoDownloader\Corel Photo Downloader.exe C:\Program Files\Windows Sidebar\sidebar.exe C:\Users\Jon\AppData\Local\Temp\wlsetup-cvr.exe C:\Program Files\Mozilla Firefox\firefox.exe C:\Windows\system32\wuauclt.exe C:\Windows\system32\SearchProtocolHost.exe C:\Windows\system32\SearchFilterHost.exe C:\Program Files\Trend Micro\HijackThis\HijackThis.exe R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896 R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.google.fr R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157 R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896 R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896 R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?LinkId=69157 R0 - HKLM\Software\Microsoft\Internet Explorer\Search,SearchAssistant = R0 - HKLM\Software\Microsoft\Internet Explorer\Search,CustomizeSearch = R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyOverride = local R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName = O2 - BHO: AcroIEHelperStub - {18DF081C-E8AD-4283-A596-FA578C2EBDC3} - C:\Program Files\Common Files\Adobe\Acrobat\ActiveX\AcroIEHelperShim.dll O2 - BHO: Programme d'aide de l'Assistant de connexion Windows Live - {9030D464-4C02-4ABF-8ECC-5164760863C6} - C:\Program Files\Common Files\Microsoft Shared\Windows Live\WindowsLiveLogin.dll O2 - BHO: Java Plug-In 2 SSV Helper - {DBC80044-A445-435b-BC74-9C25C1C588A9} - C:\Program Files\Java\jre6\bin\jp2ssv.dll O4 - HKLM\..\Run: [sunJavaUpdateSched] "C:\Program Files\Java\jre6\bin\jusched.exe" O4 - HKLM\..\Run: [avast!] "C:\Program Files\Alwil Software\Avast4\ashDisp.exe" O4 - HKLM\..\Run: [Adobe Reader Speed Launcher] "C:\Program Files\Adobe\Reader 9.0\Reader\Reader_sl.exe" O4 - HKLM\..\Run: [Adobe ARM] "C:\Program Files\Common Files\Adobe\ARM\1.0\AdobeARM.exe" O4 - HKLM\..\Run: [Malwarebytes Anti-Malware (reboot)] "C:\Program Files\Malwarebytes' Anti-Malware\mbam.exe" /runcleanupscript O4 - HKLM\..\Run: [Corel Photo Downloader] "C:\Program Files\Common Files\Corel\Corel PhotoDownloader\Corel Photo Downloader.exe" -startup O4 - HKCU\..\Run: [sidebar] C:\Program Files\Windows Sidebar\sidebar.exe /autoRun O4 - HKCU\..\Run: [msnmsgr] "C:\Program Files\Windows Live\Messenger\msnmsgr.exe" /background O4 - HKUS\S-1-5-19\..\Run: [sidebar] %ProgramFiles%\Windows Sidebar\Sidebar.exe /autoRun (User 'SERVICE LOCAL') O4 - HKUS\S-1-5-19\..\RunOnce: [mctadmin] C:\Windows\System32\mctadmin.exe (User 'SERVICE LOCAL') O4 - HKUS\S-1-5-20\..\Run: [sidebar] %ProgramFiles%\Windows Sidebar\Sidebar.exe /autoRun (User 'SERVICE RÉSEAU') O4 - HKUS\S-1-5-20\..\RunOnce: [mctadmin] C:\Windows\System32\mctadmin.exe (User 'SERVICE RÉSEAU') O8 - Extra context menu item: E&xporter vers Microsoft Excel - res://C:\PROGRA~1\MICROS~2\OFFICE11\EXCEL.EXE/3000 O9 - Extra button: PokerStars - {3AD14F0C-ED16-4e43-B6D8-661B03F6A1EF} - C:\Program Files\PokerStars\PokerStarsUpdate.exe O9 - Extra button: Recherche - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~2\OFFICE11\REFIEBAR.DLL O13 - Gopher Prefix: O16 - DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} (Shockwave Flash Object) - http://fpdownload2.macromedia.com/get/shoc...ash/swflash.cab O23 - Service: a-squared Free Service (a2free) - Emsi Software GmbH - C:\Program Files\a-squared Free\a2service.exe O23 - Service: avast! iAVS4 Control Service (aswUpdSv) - ALWIL Software - C:\Program Files\Alwil Software\Avast4\aswUpdSv.exe O23 - Service: avast! Antivirus - ALWIL Software - C:\Program Files\Alwil Software\Avast4\ashServ.exe O23 - Service: avast! Mail Scanner - ALWIL Software - C:\Program Files\Alwil Software\Avast4\ashMaiSv.exe O23 - Service: avast! Web Scanner - ALWIL Software - C:\Program Files\Alwil Software\Avast4\ashWebSv.exe O23 - Service: Service Google Update (gupdate1ca1d3ca40cd04e) (gupdate1ca1d3ca40cd04e) - Google Inc. - C:\Program Files\Google\Update\GoogleUpdate.exe O23 - Service: Nero BackItUp Scheduler 4.0 - Nero AG - C:\Program Files\Common Files\Nero\Nero BackItUp 4\NBService.exe O23 - Service: ProtexisLicensing - Unknown owner - C:\Windows\system32\PSIService.exe O23 - Service: @%SystemRoot%\System32\TuneUpDefragService.exe,-1 (TuneUp.Defrag) - TuneUp Software - C:\Windows\System32\TuneUpDefragService.exe O23 - Service: @%SystemRoot%\System32\TUProgSt.exe,-1 (TuneUp.ProgramStatisticsSvc) - TuneUp Software - C:\Windows\System32\TUProgSt.exe -- End of file - 5326 bytes
  13. voici celui de hijackthis: Logfile of Trend Micro HijackThis v2.0.2 Scan saved at 23:53:41, on 9/11/2009 Platform: Unknown Windows (WinNT 6.01.3504) MSIE: Internet Explorer v8.00 (8.00.7600.16385) Boot mode: Normal Running processes: C:\Windows\system32\taskhost.exe C:\Windows\system32\Dwm.exe C:\Windows\Explorer.EXE C:\Windows\system32\taskeng.exe C:\Program Files\Java\jre6\bin\jusched.exe C:\Program Files\Alwil Software\Avast4\ashDisp.exe C:\Program Files\Adobe\Reader 9.0\Reader\reader_sl.exe C:\Program Files\Common Files\Corel\Corel PhotoDownloader\Corel Photo Downloader.exe C:\Program Files\Windows Sidebar\sidebar.exe C:\Program Files\Windows Live\Messenger\msnmsgr.exe C:\Windows\system32\SearchProtocolHost.exe C:\Windows\system32\SearchFilterHost.exe C:\Program Files\Trend Micro\HijackThis\HijackThis.exe R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896 R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://home.gamingharbor.com R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157 R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896 R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896 R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?LinkId=69157 R0 - HKLM\Software\Microsoft\Internet Explorer\Search,SearchAssistant = R0 - HKLM\Software\Microsoft\Internet Explorer\Search,CustomizeSearch = R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyOverride = local R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName = O2 - BHO: AcroIEHelperStub - {18DF081C-E8AD-4283-A596-FA578C2EBDC3} - C:\Program Files\Common Files\Adobe\Acrobat\ActiveX\AcroIEHelperShim.dll O2 - BHO: Programme d'aide de l'Assistant de connexion Windows Live - {9030D464-4C02-4ABF-8ECC-5164760863C6} - C:\Program Files\Common Files\Microsoft Shared\Windows Live\WindowsLiveLogin.dll O2 - BHO: Java Plug-In 2 SSV Helper - {DBC80044-A445-435b-BC74-9C25C1C588A9} - C:\Program Files\Java\jre6\bin\jp2ssv.dll O4 - HKLM\..\Run: [sunJavaUpdateSched] "C:\Program Files\Java\jre6\bin\jusched.exe" O4 - HKLM\..\Run: [avast!] "C:\Program Files\Alwil Software\Avast4\ashDisp.exe" O4 - HKLM\..\Run: [Adobe Reader Speed Launcher] "C:\Program Files\Adobe\Reader 9.0\Reader\Reader_sl.exe" O4 - HKLM\..\Run: [Adobe ARM] "C:\Program Files\Common Files\Adobe\ARM\1.0\AdobeARM.exe" O4 - HKLM\..\Run: [Corel Photo Downloader] "C:\Program Files\Common Files\Corel\Corel PhotoDownloader\Corel Photo Downloader.exe" -startup O4 - HKLM\..\Run: [Malwarebytes Anti-Malware (reboot)] "C:\Program Files\Malwarebytes' Anti-Malware\mbam.exe" /runcleanupscript O4 - HKCU\..\Run: [sidebar] C:\Program Files\Windows Sidebar\sidebar.exe /autoRun O4 - HKCU\..\Run: [msnmsgr] "C:\Program Files\Windows Live\Messenger\msnmsgr.exe" /background O4 - HKUS\S-1-5-19\..\Run: [sidebar] %ProgramFiles%\Windows Sidebar\Sidebar.exe /autoRun (User 'SERVICE LOCAL') O4 - HKUS\S-1-5-19\..\RunOnce: [mctadmin] C:\Windows\System32\mctadmin.exe (User 'SERVICE LOCAL') O4 - HKUS\S-1-5-20\..\Run: [sidebar] %ProgramFiles%\Windows Sidebar\Sidebar.exe /autoRun (User 'SERVICE RÉSEAU') O4 - HKUS\S-1-5-20\..\RunOnce: [mctadmin] C:\Windows\System32\mctadmin.exe (User 'SERVICE RÉSEAU') O8 - Extra context menu item: E&xporter vers Microsoft Excel - res://C:\PROGRA~1\MICROS~2\OFFICE11\EXCEL.EXE/3000 O9 - Extra button: PokerStars - {3AD14F0C-ED16-4e43-B6D8-661B03F6A1EF} - C:\Program Files\PokerStars\PokerStarsUpdate.exe O9 - Extra button: Recherche - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~2\OFFICE11\REFIEBAR.DLL O13 - Gopher Prefix: O16 - DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} (Shockwave Flash Object) - http://fpdownload2.macromedia.com/get/shoc...ash/swflash.cab O23 - Service: a-squared Free Service (a2free) - Emsi Software GmbH - C:\Program Files\a-squared Free\a2service.exe O23 - Service: avast! iAVS4 Control Service (aswUpdSv) - ALWIL Software - C:\Program Files\Alwil Software\Avast4\aswUpdSv.exe O23 - Service: avast! Antivirus - ALWIL Software - C:\Program Files\Alwil Software\Avast4\ashServ.exe O23 - Service: avast! Mail Scanner - ALWIL Software - C:\Program Files\Alwil Software\Avast4\ashMaiSv.exe O23 - Service: avast! Web Scanner - ALWIL Software - C:\Program Files\Alwil Software\Avast4\ashWebSv.exe O23 - Service: Service Google Update (gupdate1ca1d3ca40cd04e) (gupdate1ca1d3ca40cd04e) - Google Inc. - C:\Program Files\Google\Update\GoogleUpdate.exe O23 - Service: Nero BackItUp Scheduler 4.0 - Nero AG - C:\Program Files\Common Files\Nero\Nero BackItUp 4\NBService.exe O23 - Service: ProtexisLicensing - Unknown owner - C:\Windows\system32\PSIService.exe O23 - Service: @%SystemRoot%\System32\TuneUpDefragService.exe,-1 (TuneUp.Defrag) - TuneUp Software - C:\Windows\System32\TuneUpDefragService.exe O23 - Service: @%SystemRoot%\System32\TUProgSt.exe,-1 (TuneUp.ProgramStatisticsSvc) - TuneUp Software - C:\Windows\System32\TUProgSt.exe -- End of file - 5258 bytes
  14. voila, apres plus de 40 minutes le resultat est de 684 infections, voici le rapport MBAM: Malwarebytes' Anti-Malware 1.41 Version de la base de données: 3136 Windows 6.1.7600 9/11/2009 23:46:31 mbam-log-2009-11-09 (23-46-30).txt Type de recherche: Examen complet (C:\|) Eléments examinés: 226414 Temps écoulé: 42 minute(s), 40 second(s) Processus mémoire infecté(s): 2 Module(s) mémoire infecté(s): 2 Clé(s) du Registre infectée(s): 48 Valeur(s) du Registre infectée(s): 3 Elément(s) de données du Registre infecté(s): 1 Dossier(s) infecté(s): 63 Fichier(s) infecté(s): 567 Processus mémoire infecté(s): C:\ProgramData\QueryService\queryservice125.exe (Adware.Queryservice) -> Unloaded process successfully. C:\Program Files\QueryService\queryservice.exe (Adware.Queryservice) -> Unloaded process successfully. Module(s) mémoire infecté(s): C:\Program Files\Windows Live\Messenger\msimg32.dll (Adware.MyWebSearch) -> Delete on reboot. C:\Program Files\QueryService\queryservice.dll (Adware.OneStep) -> Delete on reboot. Clé(s) du Registre infectée(s): HKEY_CLASSES_ROOT\explorerbar.funexplorer (Adware.DoubleD) -> Quarantined and deleted successfully. HKEY_CLASSES_ROOT\TypeLib\{ac5ab953-ed25-4f9c-87f0-b086b0178ffa} (Adware.DoubleD) -> Quarantined and deleted successfully. HKEY_CLASSES_ROOT\Interface\{6160f76a-1992-4b17-a32d-0c706d159105} (Adware.DoubleD) -> Quarantined and deleted successfully. HKEY_CLASSES_ROOT\CLSID\{25b8d58c-b0cb-46b0-ba64-05b3804e4e86} (Adware.DoubleD) -> Quarantined and deleted successfully. HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{25b8d58c-b0cb-46b0-ba64-05b3804e4e86} (Adware.DoubleD) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{25b8d58c-b0cb-46b0-ba64-05b3804e4e86} (Adware.DoubleD) -> Quarantined and deleted successfully. HKEY_CLASSES_ROOT\explorerbar.funexplorer.1 (Adware.DoubleD) -> Quarantined and deleted successfully. HKEY_CLASSES_ROOT\explorerbar.funredirector (Adware.DoubleD) -> Quarantined and deleted successfully. HKEY_CLASSES_ROOT\TypeLib\{883dfc00-8a21-411d-956c-73a4e4b7d16f} (Adware.DoubleD) -> Quarantined and deleted successfully. HKEY_CLASSES_ROOT\Interface\{480098c6-f6ad-4c61-9b5c-2bae228a34d1} (Adware.DoubleD) -> Quarantined and deleted successfully. HKEY_CLASSES_ROOT\CLSID\{cdbfb47b-58a8-4111-bf95-06178dce326d} (Adware.DoubleD) -> Quarantined and deleted successfully. HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{cdbfb47b-58a8-4111-bf95-06178dce326d} (Adware.DoubleD) -> Quarantined and deleted successfully. HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{cdbfb47b-58a8-4111-bf95-06178dce326d} (Adware.DoubleD) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{cdbfb47b-58a8-4111-bf95-06178dce326d} (Adware.DoubleD) -> Quarantined and deleted successfully. HKEY_CLASSES_ROOT\explorerbar.funredirector.1 (Adware.DoubleD) -> Quarantined and deleted successfully. HKEY_CLASSES_ROOT\Interface\{2e9937fc-cf2f-4f56-af54-5a6a3dd375cc} (Adware.MyWebSearch) -> Quarantined and deleted successfully. HKEY_CLASSES_ROOT\Interface\{741de825-a6f0-4497-9aa6-8023cf9b0fff} (Adware.MyWebSearch) -> Quarantined and deleted successfully. HKEY_CLASSES_ROOT\Interface\{877f3eab-4462-44df-8475-6064eafd7fbf} (Adware.DoubleD) -> Quarantined and deleted successfully. HKEY_CLASSES_ROOT\Interface\{cf54be1c-9359-4395-8533-1657cf209cfe} (Adware.MyWebSearch) -> Quarantined and deleted successfully. HKEY_CLASSES_ROOT\AppID\{57aba38e-6535-48f3-99fd-efdc62137c78} (Adware.DoubleD) -> Quarantined and deleted successfully. HKEY_CLASSES_ROOT\CLSID\{35b8d58c-b0cb-46b0-ba64-05b3804e4e86} (Adware.DoubleD) -> Quarantined and deleted successfully. HKEY_CLASSES_ROOT\TypeLib\{c28a0312-c403-417b-a425-a915bc0519cd} (Adware.DoubleD) -> Quarantined and deleted successfully. HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{35b8d58c-b0cb-46b0-ba64-05b3804e4e86} (Adware.DoubleD) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{35b8d58c-b0cb-46b0-ba64-05b3804e4e86} (Adware.DoubleD) -> Quarantined and deleted successfully. HKEY_CLASSES_ROOT\CLSID\{147a976f-eee1-4377-8ea7-4716e4cdd239} (Adware.MyWebSearch) -> Quarantined and deleted successfully. HKEY_CLASSES_ROOT\Typelib\{d518921a-4a03-425e-9873-b9a71756821e} (Adware.MyWebSearch) -> Quarantined and deleted successfully. HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{56256a51-b582-467e-b8d4-7786eda79ae0} (Trojan.Vundo) -> Quarantined and deleted successfully. HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{00a6faf1-072e-44cf-8957-5838f569a31d} (Adware.MyWebSearch) -> Quarantined and deleted successfully. HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{07b18ea1-a523-4961-b6bb-170de4475cca} (Adware.MyWebSearch) -> Quarantined and deleted successfully. HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{07b18ea9-a523-4961-b6bb-170de4475cca} (Adware.MyWebSearch) -> Quarantined and deleted successfully. HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{07b18eab-a523-4961-b6bb-170de4475cca} (Adware.MyWebSearch) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{56256a51-b582-467e-b8d4-7786eda79ae0} (Trojan.Vundo) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\queryservice (Adware.Queryservice) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\QueryService (Adware.OneStep) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\QueryService Service (Adware.OneStep) -> Quarantined and deleted successfully. HKEY_CLASSES_ROOT\AppID\AIMActiveXDLL.dll (Adware.DoubleD) -> Quarantined and deleted successfully. HKEY_CURRENT_USER\{5617ECA9-488D-4BA2-8562-9710B9AB78D2} (Adware.DoubleD) -> Quarantined and deleted successfully. HKEY_CURRENT_USER\SOFTWARE\DoubleD (Adware.DoubleD) -> Quarantined and deleted successfully. HKEY_CURRENT_USER\SOFTWARE\Internet Saving Optimizer (Adware.DoubleD) -> Quarantined and deleted successfully. HKEY_CURRENT_USER\SOFTWARE\Media Access Startup (Adware.DoubleD) -> Quarantined and deleted successfully. HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\Outlook\Addins\OEActiveXDLL.DesktopOEAddin1 (Adware.DoubleD) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\DoubleD (Adware.DoubleD) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Internet Saving Optimizer (Adware.DoubleD) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Media Access Startup (Adware.DoubleD) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\RunDll32Policy\f3ScrCtr.dll (Adware.MyWebSearch) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Multimedia\WMPlayer\Schemes\f3pss (Adware.MyWebSearch) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{16b6279b-9ff5-41fb-8bf9-404324f5dd1f}}_is1 (Adware.DoubleD) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{c5096216-7703-409e-b85a-8a6ee7395128}}_is1 (Adware.DoubleD) -> Quarantined and deleted successfully. Valeur(s) du Registre infectée(s): HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Toolbar\{5617eca9-488d-4ba2-8562-9710b9ab78d2} (Adware.DoubleD) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Mozilla\Firefox\Extensions\{0ba0192d-94a5-45e3-b2b8-3ec5a1a0b5ec} (Adware.DoubleD) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Mozilla\Firefox\Extensions\{2224e955-00e9-4613-a844-ce69fccaae91} (Adware.DoubleD) -> Quarantined and deleted successfully. Elément(s) de données du Registre infecté(s): HKEY_CLASSES_ROOT\regfile\shell\open\command\(default) (Broken.OpenCommand) -> Bad: ("regedit.exe" "%1") Good: (regedit.exe "%1") -> Quarantined and deleted successfully. Dossier(s) infecté(s): C:\Program Files\Internet Saving Optimizer (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Program Files\Internet Saving Optimizer\3.8.1.4690 (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Program Files\Internet Saving Optimizer\3.8.1.4690\Data (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Program Files\Internet Saving Optimizer\3.8.1.4690\FF (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Program Files\Internet Saving Optimizer\3.8.1.4690\FF\chrome (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Program Files\Internet Saving Optimizer\3.8.1.4690\FF\chrome\content (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Program Files\Internet Saving Optimizer\3.8.1.4690\FF\components (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Program Files\Media Access Startup (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Program Files\Media Access Startup\2.1.0.1170 (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Program Files\Media Access Startup\2.1.0.1170\Data (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Program Files\Media Access Startup\2.1.0.1170\FF (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Program Files\Media Access Startup\2.1.0.1170\FF\chrome (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Program Files\Media Access Startup\2.1.0.1170\FF\chrome\content (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Program Files\Media Access Startup\2.1.0.1170\FF\components (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Program Files\System Search Dispatcher (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Program Files\System Search Dispatcher\1.4.3.1040 (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Program Files\System Search Dispatcher\1.4.3.1040\Data (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\DoubleD (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\DoubleD\GamingHarbor Toolbar (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\DoubleD\GamingHarbor Toolbar\0.0.0.0 (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\DoubleD\GamingHarbor Toolbar\0.0.0.0\Cache (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\DoubleD\GamingHarbor Toolbar\0.0.0.0\Cache\[ (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\DoubleD\GamingHarbor Toolbar\0.0.0.0\Cache\¥ (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\DoubleD\GamingHarbor Toolbar\0.0.0.0\Cache\È (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\DoubleD\GamingHarbor Toolbar\0.0.0.0\Cache\i (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\DoubleD\GamingHarbor Toolbar\0.0.0.0\Cache\? (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\DoubleD\GamingHarbor Toolbar\0.0.0.0\Data (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\DoubleD\GamingHarbor Toolbar\0.0.0.0\Data\[ (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\DoubleD\GamingHarbor Toolbar\0.0.0.0\Data\¥ (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\DoubleD\GamingHarbor Toolbar\0.0.0.0\Data\È (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\DoubleD\GamingHarbor Toolbar\0.0.0.0\Data\i (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\DoubleD\GamingHarbor Toolbar\0.0.0.0\Data\? (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\DoubleD\GamingHarbor Toolbar\0.0.0.0\Icons (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\DoubleD\GamingHarbor Toolbar\0.0.0.0\Icons\[ (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\DoubleD\GamingHarbor Toolbar\0.0.0.0\Icons\¥ (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\DoubleD\GamingHarbor Toolbar\0.0.0.0\Icons\È (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\DoubleD\GamingHarbor Toolbar\0.0.0.0\Icons\i (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\DoubleD\GamingHarbor Toolbar\0.0.0.0\Icons\? (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\DoubleD\GamingHarbor Toolbar\0.0.0.0\Skins (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\DoubleD\GamingHarbor Toolbar\0.0.0.0\Skins\[ (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\DoubleD\GamingHarbor Toolbar\0.0.0.0\Skins\¥ (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\DoubleD\GamingHarbor Toolbar\0.0.0.0\Skins\È (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\DoubleD\GamingHarbor Toolbar\0.0.0.0\Skins\i (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\DoubleD\GamingHarbor Toolbar\0.0.0.0\Skins\? (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\DoubleD\GamingHarbor Toolbar\4.2.7.25320 (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\DoubleD\GamingHarbor Toolbar\4.2.7.25320\bin (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\DoubleD\GamingHarbor Toolbar\4.2.7.25320\Cache (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\DoubleD\GamingHarbor Toolbar\4.2.7.25320\Data (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\DoubleD\GamingHarbor Toolbar\4.2.7.25320\Icons (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\DoubleD\GamingHarbor Toolbar\4.2.7.25320\Skins (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Internet Saving Optimizer (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Internet Saving Optimizer\3.8.1.4690 (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Media Access Startup (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Media Access Startup\2.1.0.1170 (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Temporary Internet Files\{5617ECA9-488D-4BA2-8562-9710B9AB78D2} (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Temporary Internet Files\{5617ECA9-488D-4BA2-8562-9710B9AB78D2}\Data (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Temporary Internet Files\{5617ECA9-488D-4BA2-8562-9710B9AB78D2}\TDF (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Temporary Internet Files\{5617ECA9-488D-4BA2-8562-9710B9AB78D2}\TDF\Cache (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Temporary Internet Files\{5617ECA9-488D-4BA2-8562-9710B9AB78D2}\TDF\Data (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Temporary Internet Files\{5617ECA9-488D-4BA2-8562-9710B9AB78D2}\TDF\Icons (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Temporary Internet Files\{5617ECA9-488D-4BA2-8562-9710B9AB78D2}\TDF\Skins (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Program Files\QueryService (Adware.OneStep) -> Delete on reboot. C:\ProgramData\QueryService (Adware.OneStep) -> Quarantined and deleted successfully. Fichier(s) infecté(s): C:\ProgramData\QueryService\queryservice125.exe (Adware.Queryservice) -> Quarantined and deleted successfully. C:\Program Files\Windows Live\Messenger\msimg32.dll (Adware.MyWebSearch) -> Delete on reboot. C:\Program Files\QueryService\queryservice.exe (Adware.Queryservice) -> Quarantined and deleted successfully. C:\Program Files\Media Access Startup\2.1.0.1170\HPIEAddOn.dll (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Program Files\System Search Dispatcher\1.4.3.1040\ssd.dll (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Program Files\Internet Saving Optimizer\3.8.1.4690\NPIEAddOn.dll (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Downloads\CursorManiaSetup2.3.50.53.ZCfox000.exe (Adware.MyWebSearch) -> Quarantined and deleted successfully. C:\Program Files\Uninstall Fun Web Products.dll (Adware.MyWebSearch) -> Quarantined and deleted successfully. C:\Program Files\Windows Live\Messenger\riched20.dll (Adware.MyWebSearch) -> Quarantined and deleted successfully. C:\Program Files\QueryService\uninstall.exe (Adware.Queryservice) -> Quarantined and deleted successfully. C:\Windows\Temp\QUE1240.tmp\upgrade.exe (Adware.Queryservice) -> Quarantined and deleted successfully. C:\Program Files\Internet Saving Optimizer\3.8.1.4690\adwpx.exe (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Program Files\Internet Saving Optimizer\3.8.1.4690\NPCommon.dll (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Program Files\Internet Saving Optimizer\3.8.1.4690\unins000.dat (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Program Files\Internet Saving Optimizer\3.8.1.4690\unins000.exe (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Program Files\Internet Saving Optimizer\3.8.1.4690\Data\config.md (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Program Files\Internet Saving Optimizer\3.8.1.4690\FF\chrome.manifest (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Program Files\Internet Saving Optimizer\3.8.1.4690\FF\install.rdf (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Program Files\Internet Saving Optimizer\3.8.1.4690\FF\chrome\NPAddOn.jar (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Program Files\Internet Saving Optimizer\3.8.1.4690\FF\chrome\content\NPAddOn.js (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Program Files\Internet Saving Optimizer\3.8.1.4690\FF\chrome\content\NPAddOn.xul (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Program Files\Internet Saving Optimizer\3.8.1.4690\FF\components\NPFFAddOn.dll (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Program Files\Internet Saving Optimizer\3.8.1.4690\FF\components\NPFFAddOn.xpt (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Program Files\Internet Saving Optimizer\3.8.1.4690\FF\components\NPFFHelperComponent.js (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Program Files\Media Access Startup\2.1.0.1170\HPCommon.dll (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Program Files\Media Access Startup\2.1.0.1170\hppx.exe (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Program Files\Media Access Startup\2.1.0.1170\MAHelper.exe (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Program Files\Media Access Startup\2.1.0.1170\unins000.dat (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Program Files\Media Access Startup\2.1.0.1170\unins000.exe (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Program Files\Media Access Startup\2.1.0.1170\Data\config.md (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Program Files\Media Access Startup\2.1.0.1170\FF\chrome.manifest (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Program Files\Media Access Startup\2.1.0.1170\FF\install.rdf (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Program Files\Media Access Startup\2.1.0.1170\FF\chrome\HPAddOn.jar (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Program Files\Media Access Startup\2.1.0.1170\FF\chrome\content\HPAddOn.js (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Program Files\Media Access Startup\2.1.0.1170\FF\chrome\content\HPAddOn.xul (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Program Files\Media Access Startup\2.1.0.1170\FF\components\HPFFAddOn.dll (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Program Files\Media Access Startup\2.1.0.1170\FF\components\HPFFAddOn.xpt (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Program Files\Media Access Startup\2.1.0.1170\FF\components\HPFFHelperComponent.js (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Program Files\System Search Dispatcher\1.4.3.1040\unins000.dat (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Program Files\System Search Dispatcher\1.4.3.1040\unins000.exe (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Program Files\System Search Dispatcher\1.4.3.1040\Data\eacore.mx (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Program Files\System Search Dispatcher\1.4.3.1040\Data\URLDynamic.mx (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Program Files\System Search Dispatcher\1.4.3.1040\Data\URLStatic.mx (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\DoubleD\GamingHarbor Toolbar\4.2.7.25320\bin\stbup.exe (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\DoubleD\GamingHarbor Toolbar\4.2.7.25320\Cache\248d6576afce4ee94af42d7350131106.gif (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\DoubleD\GamingHarbor Toolbar\4.2.7.25320\Cache\24a70fb875fab686b6b3c217612bc07c.gif (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\DoubleD\GamingHarbor Toolbar\4.2.7.25320\Cache\2afcf6f3f2e19cc42d7f72f3b18b26ef.gif (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\DoubleD\GamingHarbor Toolbar\4.2.7.25320\Cache\50bffa6936b3e661971a58e3c8bdf4cb.gif (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\DoubleD\GamingHarbor Toolbar\4.2.7.25320\Cache\default1.dat (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\DoubleD\GamingHarbor Toolbar\4.2.7.25320\Cache\loading.dat (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\DoubleD\GamingHarbor Toolbar\4.2.7.25320\Cache\loading.gif (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\DoubleD\GamingHarbor Toolbar\4.2.7.25320\Data\Module_Cursor.mx (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\DoubleD\GamingHarbor Toolbar\4.2.7.25320\Data\Module_DailyVideo.mx (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\DoubleD\GamingHarbor Toolbar\4.2.7.25320\Data\Module_Game.mx (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\DoubleD\GamingHarbor Toolbar\4.2.7.25320\Data\Module_Glitter.mx (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\DoubleD\GamingHarbor Toolbar\4.2.7.25320\Data\Module_Logo.mx (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\DoubleD\GamingHarbor Toolbar\4.2.7.25320\Data\Module_Option.mx (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\DoubleD\GamingHarbor Toolbar\4.2.7.25320\Data\Module_Recipe.mx (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\DoubleD\GamingHarbor Toolbar\4.2.7.25320\Data\Module_Ringtone.mx (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\DoubleD\GamingHarbor Toolbar\4.2.7.25320\Data\Module_Screensaver.mx (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\DoubleD\GamingHarbor Toolbar\4.2.7.25320\Data\Module_Search.mx (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\DoubleD\GamingHarbor Toolbar\4.2.7.25320\Data\Module_Smiley.mx (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\DoubleD\GamingHarbor Toolbar\4.2.7.25320\Data\Module_Smiley_Config.mx (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\DoubleD\GamingHarbor Toolbar\4.2.7.25320\Data\Module_Smiley_TellAFriend.mx (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\DoubleD\GamingHarbor Toolbar\4.2.7.25320\Data\Module_Wallpaper.mx (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\DoubleD\GamingHarbor Toolbar\4.2.7.25320\Data\Module_Web.mx (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\DoubleD\GamingHarbor Toolbar\4.2.7.25320\Data\Module_WebDropdown_01.mx (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\DoubleD\GamingHarbor Toolbar\4.2.7.25320\Data\Module_WebDropdown_02.mx (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\DoubleD\GamingHarbor Toolbar\4.2.7.25320\Data\Module_WebDropdown_03.mx (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\DoubleD\GamingHarbor Toolbar\4.2.7.25320\Data\Module_WebDropdown_04.mx (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\DoubleD\GamingHarbor Toolbar\4.2.7.25320\Data\Module_WebDropdown_05.mx (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\DoubleD\GamingHarbor Toolbar\4.2.7.25320\Data\Module_WebDropdown_06.mx (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\DoubleD\GamingHarbor Toolbar\4.2.7.25320\Data\Module_WebDropdown_07.mx (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\DoubleD\GamingHarbor Toolbar\4.2.7.25320\Data\pixel.mx (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\DoubleD\GamingHarbor Toolbar\4.2.7.25320\Data\ProductInfo.mx (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\DoubleD\GamingHarbor Toolbar\4.2.7.25320\Data\profile.mx (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\DoubleD\GamingHarbor Toolbar\4.2.7.25320\Data\SearchEngineList.mx (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\DoubleD\GamingHarbor Toolbar\4.2.7.25320\Data\tbcore.mx (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\DoubleD\GamingHarbor Toolbar\4.2.7.25320\Data\ToolbarLayout.mx (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\DoubleD\GamingHarbor Toolbar\4.2.7.25320\Data\UpdateCentre.mx (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\DoubleD\GamingHarbor Toolbar\4.2.7.25320\Data\UpdateCentreBk.mx (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\DoubleD\GamingHarbor Toolbar\4.2.7.25320\Data\URLDynamic.mx (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\DoubleD\GamingHarbor Toolbar\4.2.7.25320\Data\URLStatic.mx (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\DoubleD\GamingHarbor Toolbar\4.2.7.25320\Icons\About.mg (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\DoubleD\GamingHarbor Toolbar\4.2.7.25320\Icons\Component_ComboBox.mg (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\DoubleD\GamingHarbor Toolbar\4.2.7.25320\Icons\Module_Cursor.mg (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\DoubleD\GamingHarbor Toolbar\4.2.7.25320\Icons\Module_Cursor.png (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\DoubleD\GamingHarbor Toolbar\4.2.7.25320\Icons\Module_DailyVideo.mg (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\DoubleD\GamingHarbor Toolbar\4.2.7.25320\Icons\Module_Game.mg (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\DoubleD\GamingHarbor Toolbar\4.2.7.25320\Icons\Module_Glitter.mg (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\DoubleD\GamingHarbor Toolbar\4.2.7.25320\Icons\Module_Glitter.png (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\DoubleD\GamingHarbor Toolbar\4.2.7.25320\Icons\Module_Logo.mg (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\DoubleD\GamingHarbor Toolbar\4.2.7.25320\Icons\Module_Option.mg (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\DoubleD\GamingHarbor Toolbar\4.2.7.25320\Icons\Module_Recipe.mg (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\DoubleD\GamingHarbor Toolbar\4.2.7.25320\Icons\Module_Ringtone.mg (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\DoubleD\GamingHarbor Toolbar\4.2.7.25320\Icons\Module_Screensaver.mg (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\DoubleD\GamingHarbor Toolbar\4.2.7.25320\Icons\Module_Search.mg (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\DoubleD\GamingHarbor Toolbar\4.2.7.25320\Icons\Module_Smiley.mg (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\DoubleD\GamingHarbor Toolbar\4.2.7.25320\Icons\Module_Smiley.png (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\DoubleD\GamingHarbor Toolbar\4.2.7.25320\Icons\Module_Wallpaper.mg (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\DoubleD\GamingHarbor Toolbar\4.2.7.25320\Icons\Module_Web.mg (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\DoubleD\GamingHarbor Toolbar\4.2.7.25320\Icons\Module_WebDropdown_01.mg (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\DoubleD\GamingHarbor Toolbar\4.2.7.25320\Icons\Module_WebDropdown_01.png (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\DoubleD\GamingHarbor Toolbar\4.2.7.25320\Icons\Module_WebDropdown_02.mg (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\DoubleD\GamingHarbor Toolbar\4.2.7.25320\Icons\Module_WebDropdown_02.png (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\DoubleD\GamingHarbor Toolbar\4.2.7.25320\Icons\Module_WebDropdown_03.mg (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\DoubleD\GamingHarbor Toolbar\4.2.7.25320\Icons\Module_WebDropdown_03.png (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\DoubleD\GamingHarbor Toolbar\4.2.7.25320\Icons\Module_WebDropdown_04.mg (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\DoubleD\GamingHarbor Toolbar\4.2.7.25320\Icons\Module_WebDropdown_04.png (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\DoubleD\GamingHarbor Toolbar\4.2.7.25320\Icons\Module_WebDropdown_05.mg (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\DoubleD\GamingHarbor Toolbar\4.2.7.25320\Icons\Module_WebDropdown_05.png (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\DoubleD\GamingHarbor Toolbar\4.2.7.25320\Icons\Module_WebDropdown_06.mg (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\DoubleD\GamingHarbor Toolbar\4.2.7.25320\Icons\Module_WebDropdown_06.png (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\DoubleD\GamingHarbor Toolbar\4.2.7.25320\Icons\Module_WebDropdown_07.mg (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\DoubleD\GamingHarbor Toolbar\4.2.7.25320\Icons\Module_WebDropdown_07.png (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\DoubleD\GamingHarbor Toolbar\4.2.7.25320\Icons\TBBtnDefault.png (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\DoubleD\GamingHarbor Toolbar\4.2.7.25320\Icons\TBBtnDisplay.bmp (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\DoubleD\GamingHarbor Toolbar\4.2.7.25320\Icons\TBBtnDisplay.png (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\DoubleD\GamingHarbor Toolbar\4.2.7.25320\Icons\TBBtnDisplay18.bmp (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\DoubleD\GamingHarbor Toolbar\4.2.7.25320\Icons\TBBtnDisplay20.bmp (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\DoubleD\GamingHarbor Toolbar\4.2.7.25320\Icons\TBBtnGlitters.bmp (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\DoubleD\GamingHarbor Toolbar\4.2.7.25320\Icons\TBBtnGlitters.png (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\DoubleD\GamingHarbor Toolbar\4.2.7.25320\Icons\TBBtnGlitters18.bmp (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\DoubleD\GamingHarbor Toolbar\4.2.7.25320\Icons\TBBtnGlitters20.bmp (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\DoubleD\GamingHarbor Toolbar\4.2.7.25320\Icons\TBBtnOption.png (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\DoubleD\GamingHarbor Toolbar\4.2.7.25320\Icons\TBBtnSmiley.bmp (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\DoubleD\GamingHarbor Toolbar\4.2.7.25320\Icons\TBBtnSmiley.png (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\DoubleD\GamingHarbor Toolbar\4.2.7.25320\Icons\TBBtnSmiley18.bmp (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\DoubleD\GamingHarbor Toolbar\4.2.7.25320\Icons\TBBtnSmiley20.bmp (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\DoubleD\GamingHarbor Toolbar\4.2.7.25320\Icons\TBBtnTellFd.bmp (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\DoubleD\GamingHarbor Toolbar\4.2.7.25320\Icons\TBBtnTellFd.png (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\DoubleD\GamingHarbor Toolbar\4.2.7.25320\Icons\TBBtnTellFd18.bmp (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\DoubleD\GamingHarbor Toolbar\4.2.7.25320\Icons\TBBtnTellFd20.bmp (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\DoubleD\GamingHarbor Toolbar\4.2.7.25320\Icons\TBBtnWink.bmp (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\DoubleD\GamingHarbor Toolbar\4.2.7.25320\Icons\TBBtnWink.png (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\DoubleD\GamingHarbor Toolbar\4.2.7.25320\Icons\TBBtnWink18.bmp (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\DoubleD\GamingHarbor Toolbar\4.2.7.25320\Icons\TBBtnWink20.bmp (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\DoubleD\GamingHarbor Toolbar\4.2.7.25320\Skins\myskin1.skf (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\DoubleD\GamingHarbor Toolbar\4.2.7.25320\Skins\myskin2.skf (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\DoubleD\GamingHarbor Toolbar\4.2.7.25320\Skins\myskin3.skf (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\DoubleD\GamingHarbor Toolbar\4.2.7.25320\Skins\myskin4.skf (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\DoubleD\GamingHarbor Toolbar\4.2.7.25320\Skins\TellafriendSkin.skf (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\DoubleD\GamingHarbor Toolbar\4.2.7.25320\Skins\TellafriendSkin_s.skf (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\DoubleD\GamingHarbor Toolbar\4.2.7.25320\Skins\ToastSkin.skf (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Internet Saving Optimizer\3.8.1.4690\config.md (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Internet Saving Optimizer\3.8.1.4690\ipdata.md (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Internet Saving Optimizer\3.8.1.4690\NP_20090929-154106.339.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Internet Saving Optimizer\3.8.1.4690\NP_20090929-155158.273.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Internet Saving Optimizer\3.8.1.4690\NP_20090929-203221.775.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Internet Saving Optimizer\3.8.1.4690\NP_20090929-203222.837.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Internet Saving Optimizer\3.8.1.4690\NP_20090929-203240.923.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Internet Saving Optimizer\3.8.1.4690\NP_20090929-203328.019.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Internet Saving Optimizer\3.8.1.4690\NP_20090929-203409.838.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Internet Saving Optimizer\3.8.1.4690\NP_20090929-203525.800.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Internet Saving Optimizer\3.8.1.4690\NP_20090929-203527.611.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Internet Saving Optimizer\3.8.1.4690\NP_20091001-020842.898.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Internet Saving Optimizer\3.8.1.4690\NP_20091001-020845.300.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Internet Saving Optimizer\3.8.1.4690\NP_20091001-162654.314.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Internet Saving Optimizer\3.8.1.4690\NP_20091001-170641.666.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Internet Saving Optimizer\3.8.1.4690\NP_20091003-123446.921.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Internet Saving Optimizer\3.8.1.4690\NP_20091004-131211.795.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Internet Saving Optimizer\3.8.1.4690\NP_20091004-131214.261.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Internet Saving Optimizer\3.8.1.4690\NP_20091005-162457.436.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Internet Saving Optimizer\3.8.1.4690\NP_20091006-015758.725.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Internet Saving Optimizer\3.8.1.4690\NP_20091006-022134.771.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Internet Saving Optimizer\3.8.1.4690\NP_20091006-115833.116.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Internet Saving Optimizer\3.8.1.4690\NP_20091006-183051.274.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Internet Saving Optimizer\3.8.1.4690\NP_20091006-192802.264.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Internet Saving Optimizer\3.8.1.4690\NP_20091006-193249.647.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Internet Saving Optimizer\3.8.1.4690\NP_20091006-210128.897.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Internet Saving Optimizer\3.8.1.4690\NP_20091007-103811.850.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Internet Saving Optimizer\3.8.1.4690\NP_20091007-122847.112.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Internet Saving Optimizer\3.8.1.4690\NP_20091007-173547.324.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Internet Saving Optimizer\3.8.1.4690\NP_20091008-001641.106.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Internet Saving Optimizer\3.8.1.4690\NP_20091008-001909.837.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Internet Saving Optimizer\3.8.1.4690\NP_20091008-105548.133.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Internet Saving Optimizer\3.8.1.4690\NP_20091008-193938.407.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Internet Saving Optimizer\3.8.1.4690\NP_20091008-193941.013.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Internet Saving Optimizer\3.8.1.4690\NP_20091008-202434.970.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Internet Saving Optimizer\3.8.1.4690\NP_20091008-202454.362.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Internet Saving Optimizer\3.8.1.4690\NP_20091008-203856.341.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Internet Saving Optimizer\3.8.1.4690\NP_20091008-204234.819.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Internet Saving Optimizer\3.8.1.4690\NP_20091008-205713.845.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Internet Saving Optimizer\3.8.1.4690\NP_20091008-232407.430.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Internet Saving Optimizer\3.8.1.4690\NP_20091009-184642.296.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Internet Saving Optimizer\3.8.1.4690\NP_20091009-184739.673.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Internet Saving Optimizer\3.8.1.4690\NP_20091009-184830.674.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Internet Saving Optimizer\3.8.1.4690\NP_20091009-203125.384.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Internet Saving Optimizer\3.8.1.4690\NP_20091009-210534.040.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Internet Saving Optimizer\3.8.1.4690\NP_20091009-211302.722.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Internet Saving Optimizer\3.8.1.4690\NP_20091010-022445.228.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Internet Saving Optimizer\3.8.1.4690\NP_20091010-134210.529.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Internet Saving Optimizer\3.8.1.4690\NP_20091010-195930.894.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Internet Saving Optimizer\3.8.1.4690\NP_20091011-125459.017.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Internet Saving Optimizer\3.8.1.4690\NP_20091012-000405.985.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Internet Saving Optimizer\3.8.1.4690\NP_20091015-112920.780.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Internet Saving Optimizer\3.8.1.4690\NP_20091015-150602.562.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Internet Saving Optimizer\3.8.1.4690\NP_20091015-152657.274.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Internet Saving Optimizer\3.8.1.4690\NP_20091015-173449.086.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Internet Saving Optimizer\3.8.1.4690\NP_20091015-173656.132.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Internet Saving Optimizer\3.8.1.4690\NP_20091015-173853.604.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Internet Saving Optimizer\3.8.1.4690\NP_20091016-032736.512.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Internet Saving Optimizer\3.8.1.4690\NP_20091016-152855.421.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Internet Saving Optimizer\3.8.1.4690\NP_20091016-171052.264.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Internet Saving Optimizer\3.8.1.4690\NP_20091016-171747.847.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Internet Saving Optimizer\3.8.1.4690\NP_20091017-141328.368.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Internet Saving Optimizer\3.8.1.4690\NP_20091017-152443.405.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Internet Saving Optimizer\3.8.1.4690\NP_20091017-174925.657.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Internet Saving Optimizer\3.8.1.4690\NP_20091017-220731.515.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Internet Saving Optimizer\3.8.1.4690\NP_20091017-222553.485.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Internet Saving Optimizer\3.8.1.4690\NP_20091017-222957.782.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Internet Saving Optimizer\3.8.1.4690\NP_20091018-131355.077.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Internet Saving Optimizer\3.8.1.4690\NP_20091018-220702.170.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Internet Saving Optimizer\3.8.1.4690\NP_20091019-010020.021.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Internet Saving Optimizer\3.8.1.4690\NP_20091019-101414.733.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Internet Saving Optimizer\3.8.1.4690\NP_20091019-160744.423.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Internet Saving Optimizer\3.8.1.4690\NP_20091020-125658.363.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Internet Saving Optimizer\3.8.1.4690\NP_20091020-133929.045.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Internet Saving Optimizer\3.8.1.4690\NP_20091020-144021.401.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Internet Saving Optimizer\3.8.1.4690\NP_20091020-151434.563.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Internet Saving Optimizer\3.8.1.4690\NP_20091020-184440.064.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Internet Saving Optimizer\3.8.1.4690\NP_20091020-201823.989.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Internet Saving Optimizer\3.8.1.4690\NP_20091020-213634.388.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Internet Saving Optimizer\3.8.1.4690\NP_20091021-004356.687.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Internet Saving Optimizer\3.8.1.4690\NP_20091023-200248.873.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Internet Saving Optimizer\3.8.1.4690\NP_20091023-200249.700.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Internet Saving Optimizer\3.8.1.4690\NP_20091023-200539.086.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Internet Saving Optimizer\3.8.1.4690\NP_20091023-214605.142.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Internet Saving Optimizer\3.8.1.4690\NP_20091023-220116.447.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Internet Saving Optimizer\3.8.1.4690\NP_20091024-000757.045.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Internet Saving Optimizer\3.8.1.4690\NP_20091024-120548.688.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Internet Saving Optimizer\3.8.1.4690\NP_20091025-102152.454.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Internet Saving Optimizer\3.8.1.4690\NP_20091025-104605.274.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Internet Saving Optimizer\3.8.1.4690\NP_20091026-102115.322.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Internet Saving Optimizer\3.8.1.4690\NP_20091027-113917.580.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Internet Saving Optimizer\3.8.1.4690\NP_20091029-002216.624.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Internet Saving Optimizer\3.8.1.4690\NP_20091029-131946.413.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Internet Saving Optimizer\3.8.1.4690\NP_20091029-131948.067.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Internet Saving Optimizer\3.8.1.4690\NP_20091029-182646.094.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Internet Saving Optimizer\3.8.1.4690\NP_20091029-200921.619.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Internet Saving Optimizer\3.8.1.4690\NP_20091029-200924.028.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Internet Saving Optimizer\3.8.1.4690\NP_20091030-011330.203.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Internet Saving Optimizer\3.8.1.4690\NP_20091030-012424.434.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Internet Saving Optimizer\3.8.1.4690\NP_20091030-025605.048.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Internet Saving Optimizer\3.8.1.4690\NP_20091030-143802.342.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Internet Saving Optimizer\3.8.1.4690\NP_20091030-143829.565.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Internet Saving Optimizer\3.8.1.4690\NP_20091030-215355.786.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Internet Saving Optimizer\3.8.1.4690\NP_20091030-220612.079.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Internet Saving Optimizer\3.8.1.4690\NP_20091030-220616.210.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Internet Saving Optimizer\3.8.1.4690\NP_20091030-221305.238.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Internet Saving Optimizer\3.8.1.4690\NP_20091030-222507.520.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Internet Saving Optimizer\3.8.1.4690\NP_20091030-222740.511.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Internet Saving Optimizer\3.8.1.4690\NP_20091030-223205.324.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Internet Saving Optimizer\3.8.1.4690\NP_20091030-224355.362.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Internet Saving Optimizer\3.8.1.4690\NP_20091030-225350.082.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Internet Saving Optimizer\3.8.1.4690\NP_20091030-225351.144.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Internet Saving Optimizer\3.8.1.4690\NP_20091031-003558.339.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Internet Saving Optimizer\3.8.1.4690\NP_20091031-003600.056.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Internet Saving Optimizer\3.8.1.4690\NP_20091031-010019.170.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Internet Saving Optimizer\3.8.1.4690\NP_20091031-140158.217.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Internet Saving Optimizer\3.8.1.4690\NP_20091031-151230.272.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Internet Saving Optimizer\3.8.1.4690\NP_20091031-153444.618.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Internet Saving Optimizer\3.8.1.4690\NP_20091031-174633.218.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Internet Saving Optimizer\3.8.1.4690\NP_20091031-201811.053.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Internet Saving Optimizer\3.8.1.4690\NP_20091031-204825.550.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Internet Saving Optimizer\3.8.1.4690\NP_20091101-111047.918.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Internet Saving Optimizer\3.8.1.4690\NP_20091102-111238.398.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Internet Saving Optimizer\3.8.1.4690\NP_20091102-120929.963.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Internet Saving Optimizer\3.8.1.4690\NP_20091102-125039.947.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Internet Saving Optimizer\3.8.1.4690\NP_20091102-142241.794.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Internet Saving Optimizer\3.8.1.4690\NP_20091102-144108.722.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Internet Saving Optimizer\3.8.1.4690\NP_20091102-145925.578.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Internet Saving Optimizer\3.8.1.4690\NP_20091102-151931.325.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Internet Saving Optimizer\3.8.1.4690\NP_20091102-175844.489.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Internet Saving Optimizer\3.8.1.4690\NP_20091102-180932.890.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Internet Saving Optimizer\3.8.1.4690\NP_20091102-183437.418.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Internet Saving Optimizer\3.8.1.4690\NP_20091103-111540.351.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Internet Saving Optimizer\3.8.1.4690\NP_20091103-115556.677.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Internet Saving Optimizer\3.8.1.4690\NP_20091103-224850.577.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Internet Saving Optimizer\3.8.1.4690\NP_20091103-224933.617.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Internet Saving Optimizer\3.8.1.4690\NP_20091103-224955.490.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Internet Saving Optimizer\3.8.1.4690\NP_20091103-235407.461.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Internet Saving Optimizer\3.8.1.4690\NP_20091103-235410.691.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Internet Saving Optimizer\3.8.1.4690\NP_20091103-235801.934.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Internet Saving Optimizer\3.8.1.4690\NP_20091103-235803.167.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Internet Saving Optimizer\3.8.1.4690\NP_20091104-121528.115.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Internet Saving Optimizer\3.8.1.4690\NP_20091105-101517.146.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Internet Saving Optimizer\3.8.1.4690\NP_20091105-114422.511.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Internet Saving Optimizer\3.8.1.4690\NP_20091105-142719.819.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Internet Saving Optimizer\3.8.1.4690\NP_20091105-183829.057.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Internet Saving Optimizer\3.8.1.4690\NP_20091106-172135.041.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Internet Saving Optimizer\3.8.1.4690\NP_20091107-151443.038.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Internet Saving Optimizer\3.8.1.4690\NP_20091107-160931.630.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Internet Saving Optimizer\3.8.1.4690\NP_20091108-044327.625.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Internet Saving Optimizer\3.8.1.4690\NP_20091108-173210.697.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Internet Saving Optimizer\3.8.1.4690\NP_20091109-010655.536.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Internet Saving Optimizer\3.8.1.4690\NP_20091109-124940.229.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Internet Saving Optimizer\3.8.1.4690\NP_20091109-135025.116.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Internet Saving Optimizer\3.8.1.4690\NP_20091109-150256.278.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Internet Saving Optimizer\3.8.1.4690\NP_20091109-160826.271.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Internet Saving Optimizer\3.8.1.4690\NP_20091109-160835.772.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Internet Saving Optimizer\3.8.1.4690\NP_20091109-161031.488.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Internet Saving Optimizer\3.8.1.4690\NP_20091109-164920.910.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Internet Saving Optimizer\3.8.1.4690\NP_20091109-165527.779.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Internet Saving Optimizer\3.8.1.4690\NP_20091109-170931.968.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Internet Saving Optimizer\3.8.1.4690\NP_20091109-185726.435.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Internet Saving Optimizer\3.8.1.4690\NP_20091109-185740.975.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Internet Saving Optimizer\3.8.1.4690\NP_20091109-185758.854.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Internet Saving Optimizer\3.8.1.4690\NP_20091109-190046.099.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Internet Saving Optimizer\3.8.1.4690\NP_20091109-192811.549.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Internet Saving Optimizer\3.8.1.4690\rstatus.md (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Media Access Startup\2.1.0.1170\config.md (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Media Access Startup\2.1.0.1170\HJHP_20090929-153932.973.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Media Access Startup\2.1.0.1170\HJHP_20090929-154106.260.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Media Access Startup\2.1.0.1170\HJHP_20090929-155158.257.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Media Access Startup\2.1.0.1170\HJHP_20090929-203221.712.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Media Access Startup\2.1.0.1170\HJHP_20090929-203222.837.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Media Access Startup\2.1.0.1170\HJHP_20090929-203240.892.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Media Access Startup\2.1.0.1170\HJHP_20090929-203327.941.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Media Access Startup\2.1.0.1170\HJHP_20090929-203409.838.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Media Access Startup\2.1.0.1170\HJHP_20090929-203525.785.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Media Access Startup\2.1.0.1170\HJHP_20090929-203527.611.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Media Access Startup\2.1.0.1170\HJHP_20091001-020842.340.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Media Access Startup\2.1.0.1170\HJHP_20091001-020845.294.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Media Access Startup\2.1.0.1170\HJHP_20091001-162653.963.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Media Access Startup\2.1.0.1170\HJHP_20091001-170641.656.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Media Access Startup\2.1.0.1170\HJHP_20091003-123446.656.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Media Access Startup\2.1.0.1170\HJHP_20091004-131211.702.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Media Access Startup\2.1.0.1170\HJHP_20091004-131214.245.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Media Access Startup\2.1.0.1170\HJHP_20091005-162457.358.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Media Access Startup\2.1.0.1170\HJHP_20091006-015758.647.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Media Access Startup\2.1.0.1170\HJHP_20091006-022134.771.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Media Access Startup\2.1.0.1170\HJHP_20091006-115833.038.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Media Access Startup\2.1.0.1170\HJHP_20091006-183051.211.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Media Access Startup\2.1.0.1170\HJHP_20091006-192802.264.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Media Access Startup\2.1.0.1170\HJHP_20091006-193249.569.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Media Access Startup\2.1.0.1170\HJHP_20091006-210128.835.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Media Access Startup\2.1.0.1170\HJHP_20091007-103811.756.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Media Access Startup\2.1.0.1170\HJHP_20091007-122847.112.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Media Access Startup\2.1.0.1170\HJHP_20091007-173547.230.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Media Access Startup\2.1.0.1170\HJHP_20091008-001640.996.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Media Access Startup\2.1.0.1170\HJHP_20091008-001909.822.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Media Access Startup\2.1.0.1170\HJHP_20091008-105548.039.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Media Access Startup\2.1.0.1170\HJHP_20091008-193938.188.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Media Access Startup\2.1.0.1170\HJHP_20091008-193940.997.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Media Access Startup\2.1.0.1170\HJHP_20091008-202434.955.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Media Access Startup\2.1.0.1170\HJHP_20091008-202454.362.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Media Access Startup\2.1.0.1170\HJHP_20091008-203856.154.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Media Access Startup\2.1.0.1170\HJHP_20091008-204234.663.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Media Access Startup\2.1.0.1170\HJHP_20091008-205713.829.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Media Access Startup\2.1.0.1170\HJHP_20091008-232407.368.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Media Access Startup\2.1.0.1170\HJHP_20091009-184642.249.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Media Access Startup\2.1.0.1170\HJHP_20091009-184739.658.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Media Access Startup\2.1.0.1170\HJHP_20091009-184830.658.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Media Access Startup\2.1.0.1170\HJHP_20091009-203125.337.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Media Access Startup\2.1.0.1170\HJHP_20091009-210533.977.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Media Access Startup\2.1.0.1170\HJHP_20091009-211302.706.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Media Access Startup\2.1.0.1170\HJHP_20091010-022445.165.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Media Access Startup\2.1.0.1170\HJHP_20091010-134210.238.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Media Access Startup\2.1.0.1170\HJHP_20091010-195930.863.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Media Access Startup\2.1.0.1170\HJHP_20091011-125458.845.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Media Access Startup\2.1.0.1170\HJHP_20091012-000405.938.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Media Access Startup\2.1.0.1170\HJHP_20091015-112920.655.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Media Access Startup\2.1.0.1170\HJHP_20091015-150602.500.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Media Access Startup\2.1.0.1170\HJHP_20091015-152657.258.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Media Access Startup\2.1.0.1170\HJHP_20091015-173449.070.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Media Access Startup\2.1.0.1170\HJHP_20091015-173656.100.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Media Access Startup\2.1.0.1170\HJHP_20091015-173853.588.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Media Access Startup\2.1.0.1170\HJHP_20091016-032736.356.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Media Access Startup\2.1.0.1170\HJHP_20091016-152855.343.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Media Access Startup\2.1.0.1170\HJHP_20091016-171052.232.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Media Access Startup\2.1.0.1170\HJHP_20091016-171747.819.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Media Access Startup\2.1.0.1170\HJHP_20091017-141328.212.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Media Access Startup\2.1.0.1170\HJHP_20091017-152443.396.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Media Access Startup\2.1.0.1170\HJHP_20091017-174925.602.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Media Access Startup\2.1.0.1170\HJHP_20091017-220731.422.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Media Access Startup\2.1.0.1170\HJHP_20091017-222553.407.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Media Access Startup\2.1.0.1170\HJHP_20091017-222957.767.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Media Access Startup\2.1.0.1170\HJHP_20091018-131354.968.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Media Access Startup\2.1.0.1170\HJHP_20091018-220702.107.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Media Access Startup\2.1.0.1170\HJHP_20091019-010019.927.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Media Access Startup\2.1.0.1170\HJHP_20091019-101414.655.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Media Access Startup\2.1.0.1170\HJHP_20091019-160744.345.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Media Access Startup\2.1.0.1170\HJHP_20091020-125658.176.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Media Access Startup\2.1.0.1170\HJHP_20091020-133928.998.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Media Access Startup\2.1.0.1170\HJHP_20091020-144021.401.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Media Access Startup\2.1.0.1170\HJHP_20091020-151434.548.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Media Access Startup\2.1.0.1170\HJHP_20091020-184439.971.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Media Access Startup\2.1.0.1170\HJHP_20091020-201823.973.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Media Access Startup\2.1.0.1170\HJHP_20091020-213634.310.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Media Access Startup\2.1.0.1170\HJHP_20091021-004356.625.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Media Access Startup\2.1.0.1170\HJHP_20091023-200248.826.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Media Access Startup\2.1.0.1170\HJHP_20091023-200249.700.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Media Access Startup\2.1.0.1170\HJHP_20091023-200539.086.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Media Access Startup\2.1.0.1170\HJHP_20091023-214605.110.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Media Access Startup\2.1.0.1170\HJHP_20091023-220116.432.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Media Access Startup\2.1.0.1170\HJHP_20091024-000756.982.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Media Access Startup\2.1.0.1170\HJHP_20091024-120548.595.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Media Access Startup\2.1.0.1170\HJHP_20091025-102152.283.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Media Access Startup\2.1.0.1170\HJHP_20091025-104605.258.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Media Access Startup\2.1.0.1170\HJHP_20091026-102115.259.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Media Access Startup\2.1.0.1170\HJHP_20091027-113917.455.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Media Access Startup\2.1.0.1170\HJHP_20091029-002216.530.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Media Access Startup\2.1.0.1170\HJHP_20091029-131946.319.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Media Access Startup\2.1.0.1170\HJHP_20091029-131948.036.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Media Access Startup\2.1.0.1170\HJHP_20091029-182646.033.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Media Access Startup\2.1.0.1170\HJHP_20091029-200921.532.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Media Access Startup\2.1.0.1170\HJHP_20091029-200924.018.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Media Access Startup\2.1.0.1170\HJHP_20091030-011330.006.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Media Access Startup\2.1.0.1170\HJHP_20091030-012424.309.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Media Access Startup\2.1.0.1170\HJHP_20091030-025604.970.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Media Access Startup\2.1.0.1170\HJHP_20091030-143802.232.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Media Access Startup\2.1.0.1170\HJHP_20091030-143829.502.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Media Access Startup\2.1.0.1170\HJHP_20091030-215355.677.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Media Access Startup\2.1.0.1170\HJHP_20091030-220611.931.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Media Access Startup\2.1.0.1170\HJHP_20091030-220616.197.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Media Access Startup\2.1.0.1170\HJHP_20091030-221305.224.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Media Access Startup\2.1.0.1170\HJHP_20091030-222507.509.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Media Access Startup\2.1.0.1170\HJHP_20091030-222740.496.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Media Access Startup\2.1.0.1170\HJHP_20091030-223205.308.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Media Access Startup\2.1.0.1170\HJHP_20091030-224355.081.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Media Access Startup\2.1.0.1170\HJHP_20091030-225350.082.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Media Access Startup\2.1.0.1170\HJHP_20091030-225351.144.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Media Access Startup\2.1.0.1170\HJHP_20091031-003558.246.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Media Access Startup\2.1.0.1170\HJHP_20091031-003600.041.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Media Access Startup\2.1.0.1170\HJHP_20091031-010019.154.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Media Access Startup\2.1.0.1170\HJHP_20091031-140158.092.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Media Access Startup\2.1.0.1170\HJHP_20091031-151230.256.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Media Access Startup\2.1.0.1170\HJHP_20091031-153444.493.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Media Access Startup\2.1.0.1170\HJHP_20091031-174633.203.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Media Access Startup\2.1.0.1170\HJHP_20091031-201810.895.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Media Access Startup\2.1.0.1170\HJHP_20091031-204825.425.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Media Access Startup\2.1.0.1170\HJHP_20091101-111047.855.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Media Access Startup\2.1.0.1170\HJHP_20091102-111238.320.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Media Access Startup\2.1.0.1170\HJHP_20091102-120929.963.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Media Access Startup\2.1.0.1170\HJHP_20091102-125039.938.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Media Access Startup\2.1.0.1170\HJHP_20091102-142241.732.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Media Access Startup\2.1.0.1170\HJHP_20091102-144108.706.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Media Access Startup\2.1.0.1170\HJHP_20091102-145925.578.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Media Access Startup\2.1.0.1170\HJHP_20091102-151931.310.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Media Access Startup\2.1.0.1170\HJHP_20091102-175844.302.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Media Access Startup\2.1.0.1170\HJHP_20091102-180932.765.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Media Access Startup\2.1.0.1170\HJHP_20091102-183437.418.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Media Access Startup\2.1.0.1170\HJHP_20091103-111540.335.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Media Access Startup\2.1.0.1170\HJHP_20091103-115556.649.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Media Access Startup\2.1.0.1170\HJHP_20091103-224850.530.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Media Access Startup\2.1.0.1170\HJHP_20091103-224933.586.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Media Access Startup\2.1.0.1170\HJHP_20091103-224955.458.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Media Access Startup\2.1.0.1170\HJHP_20091103-235407.336.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Media Access Startup\2.1.0.1170\HJHP_20091103-235410.660.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Media Access Startup\2.1.0.1170\HJHP_20091103-235801.902.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Media Access Startup\2.1.0.1170\HJHP_20091103-235803.151.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Media Access Startup\2.1.0.1170\HJHP_20091104-121527.990.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Media Access Startup\2.1.0.1170\HJHP_20091105-101517.021.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Media Access Startup\2.1.0.1170\HJHP_20091105-114422.386.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Media Access Startup\2.1.0.1170\HJHP_20091105-142719.741.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Media Access Startup\2.1.0.1170\HJHP_20091105-183829.011.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Media Access Startup\2.1.0.1170\HJHP_20091106-172134.982.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Media Access Startup\2.1.0.1170\HJHP_20091107-151442.741.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Media Access Startup\2.1.0.1170\HJHP_20091107-160931.474.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Media Access Startup\2.1.0.1170\HJHP_20091108-044327.385.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Media Access Startup\2.1.0.1170\HJHP_20091108-173210.526.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Media Access Startup\2.1.0.1170\HJHP_20091109-010655.426.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Media Access Startup\2.1.0.1170\HJHP_20091109-124940.166.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Media Access Startup\2.1.0.1170\HJHP_20091109-135024.819.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Media Access Startup\2.1.0.1170\HJHP_20091109-150256.200.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Media Access Startup\2.1.0.1170\HJHP_20091109-160826.178.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Media Access Startup\2.1.0.1170\HJHP_20091109-160835.756.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Media Access Startup\2.1.0.1170\HJHP_20091109-161031.457.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Media Access Startup\2.1.0.1170\HJHP_20091109-164920.785.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Media Access Startup\2.1.0.1170\HJHP_20091109-165527.607.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Media Access Startup\2.1.0.1170\HJHP_20091109-170931.952.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Media Access Startup\2.1.0.1170\HJHP_20091109-185726.326.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Media Access Startup\2.1.0.1170\HJHP_20091109-185740.944.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Media Access Startup\2.1.0.1170\HJHP_20091109-185758.839.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Media Access Startup\2.1.0.1170\HJHP_20091109-190046.099.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Media Access Startup\2.1.0.1170\HJHP_20091109-192811.539.log (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Media Access Startup\2.1.0.1170\ipdata.md (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Application Data\Media Access Startup\2.1.0.1170\rstatus.md (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Temporary Internet Files\{5617ECA9-488D-4BA2-8562-9710B9AB78D2}\bg.jpg (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Temporary Internet Files\{5617ECA9-488D-4BA2-8562-9710B9AB78D2}\CurrentVersion.xml (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Temporary Internet Files\{5617ECA9-488D-4BA2-8562-9710B9AB78D2}\ExtractZipFile.zip (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Temporary Internet Files\{5617ECA9-488D-4BA2-8562-9710B9AB78D2}\icon.ico (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Temporary Internet Files\{5617ECA9-488D-4BA2-8562-9710B9AB78D2}\productinfo.dll (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Temporary Internet Files\{5617ECA9-488D-4BA2-8562-9710B9AB78D2}\stbup.exe (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Temporary Internet Files\{5617ECA9-488D-4BA2-8562-9710B9AB78D2}\tdf.dat (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Temporary Internet Files\{5617ECA9-488D-4BA2-8562-9710B9AB78D2}\Data\ProductInfo.mx (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Temporary Internet Files\{5617ECA9-488D-4BA2-8562-9710B9AB78D2}\TDF\Cache\248d6576afce4ee94af42d7350131106.gif (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Temporary Internet Files\{5617ECA9-488D-4BA2-8562-9710B9AB78D2}\TDF\Cache\24a70fb875fab686b6b3c217612bc07c.gif (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Temporary Internet Files\{5617ECA9-488D-4BA2-8562-9710B9AB78D2}\TDF\Cache\2afcf6f3f2e19cc42d7f72f3b18b26ef.gif (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Temporary Internet Files\{5617ECA9-488D-4BA2-8562-9710B9AB78D2}\TDF\Cache\50bffa6936b3e661971a58e3c8bdf4cb.gif (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Temporary Internet Files\{5617ECA9-488D-4BA2-8562-9710B9AB78D2}\TDF\Cache\default1.dat (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Temporary Internet Files\{5617ECA9-488D-4BA2-8562-9710B9AB78D2}\TDF\Cache\loading.dat (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Temporary Internet Files\{5617ECA9-488D-4BA2-8562-9710B9AB78D2}\TDF\Cache\loading.gif (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Temporary Internet Files\{5617ECA9-488D-4BA2-8562-9710B9AB78D2}\TDF\Data\Module_Cursor.mx (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Temporary Internet Files\{5617ECA9-488D-4BA2-8562-9710B9AB78D2}\TDF\Data\Module_DailyVideo.mx (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Temporary Internet Files\{5617ECA9-488D-4BA2-8562-9710B9AB78D2}\TDF\Data\Module_Game.mx (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Temporary Internet Files\{5617ECA9-488D-4BA2-8562-9710B9AB78D2}\TDF\Data\Module_Glitter.mx (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Temporary Internet Files\{5617ECA9-488D-4BA2-8562-9710B9AB78D2}\TDF\Data\Module_Logo.mx (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Temporary Internet Files\{5617ECA9-488D-4BA2-8562-9710B9AB78D2}\TDF\Data\Module_Option.mx (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Temporary Internet Files\{5617ECA9-488D-4BA2-8562-9710B9AB78D2}\TDF\Data\Module_Recipe.mx (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Temporary Internet Files\{5617ECA9-488D-4BA2-8562-9710B9AB78D2}\TDF\Data\Module_Ringtone.mx (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Temporary Internet Files\{5617ECA9-488D-4BA2-8562-9710B9AB78D2}\TDF\Data\Module_Screensaver.mx (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Temporary Internet Files\{5617ECA9-488D-4BA2-8562-9710B9AB78D2}\TDF\Data\Module_Search.mx (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Temporary Internet Files\{5617ECA9-488D-4BA2-8562-9710B9AB78D2}\TDF\Data\Module_Smiley.mx (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Temporary Internet Files\{5617ECA9-488D-4BA2-8562-9710B9AB78D2}\TDF\Data\Module_Smiley_Config.mx (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Temporary Internet Files\{5617ECA9-488D-4BA2-8562-9710B9AB78D2}\TDF\Data\Module_Smiley_TellAFriend.mx (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Temporary Internet Files\{5617ECA9-488D-4BA2-8562-9710B9AB78D2}\TDF\Data\Module_Wallpaper.mx (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Temporary Internet Files\{5617ECA9-488D-4BA2-8562-9710B9AB78D2}\TDF\Data\Module_Web.mx (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Temporary Internet Files\{5617ECA9-488D-4BA2-8562-9710B9AB78D2}\TDF\Data\pixel.mx (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Temporary Internet Files\{5617ECA9-488D-4BA2-8562-9710B9AB78D2}\TDF\Data\ProductInfo.mx (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Temporary Internet Files\{5617ECA9-488D-4BA2-8562-9710B9AB78D2}\TDF\Data\profile.mx (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Temporary Internet Files\{5617ECA9-488D-4BA2-8562-9710B9AB78D2}\TDF\Data\SearchEngineList.mx (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Temporary Internet Files\{5617ECA9-488D-4BA2-8562-9710B9AB78D2}\TDF\Data\tbcore.mx (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Temporary Internet Files\{5617ECA9-488D-4BA2-8562-9710B9AB78D2}\TDF\Data\ToolbarLayout.mx (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Temporary Internet Files\{5617ECA9-488D-4BA2-8562-9710B9AB78D2}\TDF\Data\UpdateCentre.mx (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Temporary Internet Files\{5617ECA9-488D-4BA2-8562-9710B9AB78D2}\TDF\Data\UpdateCentreBk.mx (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Temporary Internet Files\{5617ECA9-488D-4BA2-8562-9710B9AB78D2}\TDF\Data\URLDynamic.mx (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Temporary Internet Files\{5617ECA9-488D-4BA2-8562-9710B9AB78D2}\TDF\Data\URLStatic.mx (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Temporary Internet Files\{5617ECA9-488D-4BA2-8562-9710B9AB78D2}\TDF\Icons\About.mg (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Temporary Internet Files\{5617ECA9-488D-4BA2-8562-9710B9AB78D2}\TDF\Icons\Component_ComboBox.mg (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Temporary Internet Files\{5617ECA9-488D-4BA2-8562-9710B9AB78D2}\TDF\Icons\Module_Cursor.mg (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Temporary Internet Files\{5617ECA9-488D-4BA2-8562-9710B9AB78D2}\TDF\Icons\Module_Cursor.png (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Temporary Internet Files\{5617ECA9-488D-4BA2-8562-9710B9AB78D2}\TDF\Icons\Module_DailyVideo.mg (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Temporary Internet Files\{5617ECA9-488D-4BA2-8562-9710B9AB78D2}\TDF\Icons\Module_Game.mg (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Temporary Internet Files\{5617ECA9-488D-4BA2-8562-9710B9AB78D2}\TDF\Icons\Module_Glitter.mg (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Temporary Internet Files\{5617ECA9-488D-4BA2-8562-9710B9AB78D2}\TDF\Icons\Module_Glitter.png (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Temporary Internet Files\{5617ECA9-488D-4BA2-8562-9710B9AB78D2}\TDF\Icons\Module_Logo.mg (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Temporary Internet Files\{5617ECA9-488D-4BA2-8562-9710B9AB78D2}\TDF\Icons\Module_Option.mg (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Temporary Internet Files\{5617ECA9-488D-4BA2-8562-9710B9AB78D2}\TDF\Icons\Module_Recipe.mg (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Temporary Internet Files\{5617ECA9-488D-4BA2-8562-9710B9AB78D2}\TDF\Icons\Module_Ringtone.mg (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Temporary Internet Files\{5617ECA9-488D-4BA2-8562-9710B9AB78D2}\TDF\Icons\Module_Screensaver.mg (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Temporary Internet Files\{5617ECA9-488D-4BA2-8562-9710B9AB78D2}\TDF\Icons\Module_Search.mg (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Temporary Internet Files\{5617ECA9-488D-4BA2-8562-9710B9AB78D2}\TDF\Icons\Module_Smiley.mg (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Temporary Internet Files\{5617ECA9-488D-4BA2-8562-9710B9AB78D2}\TDF\Icons\Module_Smiley.png (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Temporary Internet Files\{5617ECA9-488D-4BA2-8562-9710B9AB78D2}\TDF\Icons\Module_Wallpaper.mg (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Temporary Internet Files\{5617ECA9-488D-4BA2-8562-9710B9AB78D2}\TDF\Icons\Module_Web.mg (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Temporary Internet Files\{5617ECA9-488D-4BA2-8562-9710B9AB78D2}\TDF\Icons\TBBtnDefault.png (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Temporary Internet Files\{5617ECA9-488D-4BA2-8562-9710B9AB78D2}\TDF\Icons\TBBtnDisplay.bmp (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Temporary Internet Files\{5617ECA9-488D-4BA2-8562-9710B9AB78D2}\TDF\Icons\TBBtnDisplay.png (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Temporary Internet Files\{5617ECA9-488D-4BA2-8562-9710B9AB78D2}\TDF\Icons\TBBtnDisplay18.bmp (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Temporary Internet Files\{5617ECA9-488D-4BA2-8562-9710B9AB78D2}\TDF\Icons\TBBtnDisplay20.bmp (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Temporary Internet Files\{5617ECA9-488D-4BA2-8562-9710B9AB78D2}\TDF\Icons\TBBtnGlitters.bmp (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Temporary Internet Files\{5617ECA9-488D-4BA2-8562-9710B9AB78D2}\TDF\Icons\TBBtnGlitters.png (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Temporary Internet Files\{5617ECA9-488D-4BA2-8562-9710B9AB78D2}\TDF\Icons\TBBtnGlitters18.bmp (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Temporary Internet Files\{5617ECA9-488D-4BA2-8562-9710B9AB78D2}\TDF\Icons\TBBtnGlitters20.bmp (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Temporary Internet Files\{5617ECA9-488D-4BA2-8562-9710B9AB78D2}\TDF\Icons\TBBtnOption.png (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Temporary Internet Files\{5617ECA9-488D-4BA2-8562-9710B9AB78D2}\TDF\Icons\TBBtnSmiley.bmp (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Temporary Internet Files\{5617ECA9-488D-4BA2-8562-9710B9AB78D2}\TDF\Icons\TBBtnSmiley.png (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Temporary Internet Files\{5617ECA9-488D-4BA2-8562-9710B9AB78D2}\TDF\Icons\TBBtnSmiley18.bmp (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Temporary Internet Files\{5617ECA9-488D-4BA2-8562-9710B9AB78D2}\TDF\Icons\TBBtnSmiley20.bmp (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Temporary Internet Files\{5617ECA9-488D-4BA2-8562-9710B9AB78D2}\TDF\Icons\TBBtnTellFd.bmp (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Temporary Internet Files\{5617ECA9-488D-4BA2-8562-9710B9AB78D2}\TDF\Icons\TBBtnTellFd.png (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Temporary Internet Files\{5617ECA9-488D-4BA2-8562-9710B9AB78D2}\TDF\Icons\TBBtnTellFd18.bmp (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Temporary Internet Files\{5617ECA9-488D-4BA2-8562-9710B9AB78D2}\TDF\Icons\TBBtnTellFd20.bmp (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Temporary Internet Files\{5617ECA9-488D-4BA2-8562-9710B9AB78D2}\TDF\Icons\TBBtnWink.bmp (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Temporary Internet Files\{5617ECA9-488D-4BA2-8562-9710B9AB78D2}\TDF\Icons\TBBtnWink.png (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Temporary Internet Files\{5617ECA9-488D-4BA2-8562-9710B9AB78D2}\TDF\Icons\TBBtnWink18.bmp (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Temporary Internet Files\{5617ECA9-488D-4BA2-8562-9710B9AB78D2}\TDF\Icons\TBBtnWink20.bmp (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Temporary Internet Files\{5617ECA9-488D-4BA2-8562-9710B9AB78D2}\TDF\Skins\myskin1.skf (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Temporary Internet Files\{5617ECA9-488D-4BA2-8562-9710B9AB78D2}\TDF\Skins\myskin2.skf (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Temporary Internet Files\{5617ECA9-488D-4BA2-8562-9710B9AB78D2}\TDF\Skins\myskin3.skf (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Temporary Internet Files\{5617ECA9-488D-4BA2-8562-9710B9AB78D2}\TDF\Skins\myskin4.skf (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Temporary Internet Files\{5617ECA9-488D-4BA2-8562-9710B9AB78D2}\TDF\Skins\TellafriendSkin.skf (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Temporary Internet Files\{5617ECA9-488D-4BA2-8562-9710B9AB78D2}\TDF\Skins\TellafriendSkin_s.skf (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Users\Jon\Local Settings\Temporary Internet Files\{5617ECA9-488D-4BA2-8562-9710B9AB78D2}\TDF\Skins\ToastSkin.skf (Adware.DoubleD) -> Quarantined and deleted successfully. C:\Program Files\QueryService\queryservice.dll (Adware.OneStep) -> Delete on reboot.
×
×
  • Créer...