Aller au contenu
  • Pas encore inscrit ?

    Pourquoi ne pas vous inscrire ? C'est simple, rapide et gratuit.
    Pour en savoir plus, lisez Les avantages de l'inscription... et la Charte de Zébulon.
    De plus, les messages que vous postez en tant qu'invité restent invisibles tant qu'un modérateur ne les a pas validés. Inscrivez-vous, ce sera un gain de temps pour tout le monde, vous, les helpeurs et les modérateurs ! :wink:

Messages recommandés

Posté(e) (modifié)

:P à tous

 

Un copain de classe de ma fille lui a envoyé un fichier à téléchargé sur windows live messenger et voilà le résultat. (dans le titre)

 

J'ai fais un nettoyage complet. Je joint le log hijackthis

 

Logfile of HijackThis v1.99.1

Scan saved at 21:23:01, on 14/06/2007

Platform: Windows XP (WinNT 5.01.2600)

MSIE: Internet Explorer v6.00 (6.00.2600.0000)

 

Running processes:

D:\WINDOWS\System32\smss.exe

D:\WINDOWS\system32\winlogon.exe

D:\WINDOWS\system32\services.exe

D:\WINDOWS\system32\savedump.exe

D:\WINDOWS\system32\lsass.exe

D:\WINDOWS\system32\svchost.exe

D:\WINDOWS\System32\svchost.exe

C:\smc.exe

D:\WINDOWS\Explorer.EXE

D:\WINDOWS\system32\spoolsv.exe

C:\ad aware\aawservice.exe

C:\avast\aswUpdSv.exe

C:\avast\ashServ.exe

D:\WINDOWS\htpatch.exe

C:\avast\ashDisp.exe

D:\WINDOWS\System32\RunDll32.exe

C:\Adobe\Reader\Reader_sl.exe

C:\avg\AVG Anti-Spyware 7.5\guard.exe

D:\Program Files\Fichiers communs\EPSON\eEBAPI\SAgent2.exe

C:\avast\ashMaiSv.exe

C:\avast\ashWebSv.exe

C:\Hijackthis Version Française\VERSION TRADUITE ORIGINALE.EXE

 

R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://fr.msn.com/

R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Local Page =

R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Local Page =

R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName = Liens

R3 - URLSearchHook: Yahoo! Toolbar avec bloqueur de fenêtres pop-up - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - D:\Program Files\Yahoo!\Companion\Installs\cpn\yt.dll

O2 - BHO: Yahoo! Toolbar Helper - {02478D38-C3F9-4EFB-9B51-7695ECA05670} - D:\Program Files\Yahoo!\Companion\Installs\cpn\yt.dll

O2 - BHO: Aide pour le lien d'Adobe PDF Reader - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - D:\Program Files\Fichiers communs\Adobe\Acrobat\ActiveX\AcroIEHelper.dll

O2 - BHO: (no name) - {53707962-6F74-2D53-2644-206D7942484F} - C:\SPYBOT~1\SDHelper.dll

O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - D:\Program Files\Java\jre1.6.0_01\bin\ssv.dll

O2 - BHO: Windows Live Sign-in Helper - {9030D464-4C02-4ABF-8ECC-5164760863C6} - D:\Program Files\Fichiers communs\Microsoft Shared\Windows Live\WindowsLiveLogin.dll

O3 - Toolbar: &Radio - {8E718888-423F-11D2-876E-00A0C9082467} - D:\WINDOWS\System32\msdxm.ocx

O3 - Toolbar: Yahoo! Toolbar avec bloqueur de fenêtres pop-up - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - D:\Program Files\Yahoo!\Companion\Installs\cpn\yt.dll

O4 - HKLM\..\Run: [HTpatch] D:\WINDOWS\htpatch.exe

O4 - HKLM\..\Run: [siSUSBRG] D:\WINDOWS\SiSUSBrg.exe

O4 - HKLM\..\Run: [avast!] C:\avast\ashDisp.exe

O4 - HKLM\..\Run: [NvMediaCenter] RunDLL32.exe NvMCTray.dll,NvTaskbarInit

O4 - HKLM\..\Run: [Cmaudio] RunDll32 cmicnfg.cpl,CMICtrlWnd

O4 - HKLM\..\Run: [Adobe Reader Speed Launcher] "C:\Adobe\Reader\Reader_sl.exe"

O4 - HKLM\..\Run: [KernelFaultCheck] %systemroot%\system32\dumprep 0 -k

O4 - HKLM\..\Run: [smcService] C:\smc.exe -startgui

O4 - Startup: ERUNT AutoBackup.lnk = C:\ERUNT\AUTOBACK.EXE

O8 - Extra context menu item: E&xporter vers Microsoft Excel - res://C:\office\OFFICE11\EXCEL.EXE/3000

O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - D:\Program Files\Java\jre1.6.0_01\bin\ssv.dll

O9 - Extra 'Tools' menuitem: Console Java (Sun) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - D:\Program Files\Java\jre1.6.0_01\bin\ssv.dll

O9 - Extra button: Recherche - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\office\OFFICE11\REFIEBAR.DLL

O16 - DPF: {0EB0E74A-2A76-4AB3-A7FB-9BD8C29F7F75} (CKAVWebScan Object) - http://webscanner.kaspersky.fr/kavwebscan_unicode.cab

O16 - DPF: {30528230-99f7-4bb4-88d8-fa1d4f56a2ab} (YInstStarter Class) - D:\Program Files\Yahoo!\Common\yinsthelper.dll

O16 - DPF: {644E432F-49D3-41A1-8DD5-E099162EEEC5} (Symantec RuFSI Utility Class) - http://security.symantec.com/sscv6/SharedC...n/bin/cabsa.cab

O16 - DPF: {9A9307A0-7DA4-4DAF-B042-5009F29E09E1} (ActiveScan Installer Class) - http://acs.pandasoftware.com/activescan/as5free/asinst.cab

O16 - DPF: {B8BE5E93-A60C-4D26-A2DC-220313175592} (MSN Games - Installer) - http://messenger.zone.msn.com/binary/ZIntro.cab56649.cab

O16 - DPF: {C3F79A2B-B9B4-4A66-B012-3EE46475B072} (MessengerStatsClient Class) - http://messenger.zone.msn.com/binary/Messe...nt.cab56907.cab

O17 - HKLM\System\CCS\Services\Tcpip\..\{2C5183F9-8146-4E23-911B-8FC6C2B6D930}: NameServer = 86.64.145.140 84.103.237.140

O18 - Protocol: livecall - {828030A1-22C1-4009-854F-8E305202313F} - D:\PROGRA~1\MSNMES~1\MSGRAP~1.DLL

O18 - Protocol: msnim - {828030A1-22C1-4009-854F-8E305202313F} - D:\PROGRA~1\MSNMES~1\MSGRAP~1.DLL

O21 - SSODL: syshelps - {041EEA36-0614-44B3-BEF6-27EA7349A966} - syshelps.dll (file missing)

O23 - Service: Ad-Aware 2007 Service (aawservice) - Lavasoft AB - C:\ad aware\aawservice.exe

O23 - Service: avast! iAVS4 Control Service (aswUpdSv) - ALWIL Software - C:\avast\aswUpdSv.exe

O23 - Service: avast! Antivirus - ALWIL Software - C:\avast\ashServ.exe

O23 - Service: avast! Mail Scanner - Unknown owner - C:\avast\ashMaiSv.exe" /service (file missing)

O23 - Service: avast! Web Scanner - Unknown owner - C:\avast\ashWebSv.exe" /service (file missing)

O23 - Service: AVG Anti-Spyware Guard - Anti-Malware Development a.s. - C:\avg\AVG Anti-Spyware 7.5\guard.exe

O23 - Service: EPSON Printer Status Agent2 (EPSONStatusAgent2) - SEIKO EPSON CORPORATION - D:\Program Files\Fichiers communs\EPSON\eEBAPI\SAgent2.exe

O23 - Service: Sygate Personal Firewall (SmcService) - Sygate Technologies, Inc. - C:\smc.exe

 

Merci

Modifié par nyny34

Posté(e)

Salut !

 

 

-Redémarrer en mode sans échec :

(En mode sans échec : seul les processus systèmes sont lancés il est donc plus facile de supprimer ce qui est infecté.)

Au redémarrage de l'ordinateur, une fois le chargement du BIOS terminé,

Il y a un écran noir qui apparaît rapidement, appuyer sur la touche [F8] ou [F5] jusqu'à l'affichage du menu des options avancées de Windows. Sélectionner "Mode sans échec"et appuyer sur [Entrée].

NB:Si problème aller voir ici: http://service1.symantec.com/support/inter...020905112131924

 

Lancer HijackThis, (scan only ou scanner seulement) cocher les lignes suivantes si présentes:

 

O21 - SSODL: syshelps - {5FC499D3-FFD2-4122-8C80-0EE4C8B22899} - syshelps.dll (file missing)

 

 

Fermer tous les programmes et navigateur, et Cliquer sur Fix Checked

 

Clique sur démarrer/executer/

Copie/colle

Rentre le chemin indiqué en rouge %System%

Le dossier va s'ouvrir

Supprime le fichier indiqué en gras si présent:

syshelps.dll(clique droit /supprimer)

 

Vide la corbeille redémarre

 

 

Ensuite fais un scan en ligne ici stp :

http://www.kaspersky.com/virusscanner

tuto d'aide ici

http://www.malekal.com/scan_Av_en_ligne.html

 

A plus.

Posté(e)

Bonjour Régis56, WawaSeb

 

 

Clique sur démarrer/executer/

Copie/colle

Rentre le chemin indiqué en rouge %System%

Le dossier va s'ouvrir

Supprime le fichier indiqué en gras si présent:

syshelps.dll(clique droit /supprimer)

 

J'ai fait exécuter, %System%, mais ça me dit que ça n'existe pas. :P

Pour syshelps.dll j'ai fait une rechercher : RIEN

 

Je te mets le rapport de kaspersky

 

KASPERSKY ONLINE SCANNER REPORT

Friday, June 15, 2007 1:53:35 PM

Operating System: Microsoft Windows XP Professional, (Build 2600)

Kaspersky Online Scanner version: 5.0.83.0

Kaspersky Anti-Virus database last update: 15/06/2007

Kaspersky Anti-Virus database records: 325561

Scan Settings

Scan using the following antivirus database standard

Scan Archives true

Scan Mail Bases true

Scan Target My Computer

A:\

C:\

D:\

E:\

F:\

G:\

Scan Statistics

Total number of scanned objects 26207

Number of viruses found 1

Number of infected objects 2 / 0

Number of suspicious objects 0

Duration of the scan process 00:34:34

 

Infected Object Name Virus Name Last Action

C:\avast\DATA\aswResp.dat Object is locked skipped

C:\avast\DATA\Avast4.db Object is locked skipped

C:\avast\DATA\log\AshWebSv.ws Object is locked skipped

C:\avast\DATA\log\aswMaiSv.log Object is locked skipped

C:\avast\DATA\log\nshield.log Object is locked skipped

C:\avast\DATA\report\Protection résidente.txt Object is locked skipped

C:\debug.log Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\1394bus.sy_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\61883.sys Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\6to4svc.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ac97ali.sys Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ac97via.sys Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\acgenral.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\aclayers.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\aclua.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\acpi.sy_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\acspecfc.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\activ.ht_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\activsvc.ht_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\actlan.ht_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\actshell.ht_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\acverfyr.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\acxtrnal.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\adeskerr.ht_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\admin.dll Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\admin.exe Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\admjoy.sys Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\adsldp.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\adsldpc.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\adsmsext.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\adsnt.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\advapi32.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\advpack.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\aec.sys Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\afd.sy_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ahui.ex_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\alg.ex_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\amdk6.sys Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\amdk7.sys Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\an983.sys Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\apphelp.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\apphelp.sd_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\apps.ch_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\appwiz.cp_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\arial.tt_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\arp1394.sys Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\asctrls.oc_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\asferror.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\asfsipc.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\asms\10100\msft\windows\gdiplus\gdiplus.cat Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\asms\10100\msft\windows\gdiplus\gdiplus.dll Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\asms\10100\msft\windows\gdiplus\gdiplus.man Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\asms\10100\policy\msft\windows\gdiplus\gdiplus.cat Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\asms\10100\policy\msft\windows\gdiplus\gdiplus.man Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\asms\60100\msft\windows\common\controls\comctl32.dll Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\asms\60100\msft\windows\common\controls\controls.cat Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\asms\60100\msft\windows\common\controls\controls.man Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\asms\60100\policy\60100\comctl\comctl.cat Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\asms\60100\policy\60100\comctl\comctl.man Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\asms\70100\msft\windows\mswincrt\msvcirt.dll Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\asms\70100\msft\windows\mswincrt\msvcrt.dll Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\asms\70100\msft\windows\mswincrt\mswincrt.cat Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\asms\70100\msft\windows\mswincrt\mswincrt.man Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\asms\70100\policy\msft\mswincrt\mswincrt.cat Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\asms\70100\policy\msft\mswincrt\mswincrt.man Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\at.ex_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\atapi.sy_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\atiradn1.in_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\atl.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\atmlane.sy_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\audiosrv.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\author.dll Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\author.exe Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\autochk.exe Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\autolfn.ex_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\auupdate.ex_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\avc.sys Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\avifil32.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\basesrv.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\batt.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\bridge.sy_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\browselc.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\browser.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\browseui.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\browsewm.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\cabinet.dll Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\callcont.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\catsrvut.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ccdecode.sys Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\cdfs.sy_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\cdm.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\cdrom.sy_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\certcli.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\cewmdm.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\cfgbkend.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\cfgwiz.exe Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\cimwin32.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ciodm.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\classpnp.sy_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\clipbrd.ex_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\clusapi.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\cmbatt.sys Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\cmdial32.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\cmdl32.ex_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\comadmin.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\comctl32.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\comdlg32.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\compatui.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\compdata\drvmain.chm Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\compdata\drvmain.inf Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\compdata\krnlchk.htm Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\compdata\krnlchk.txt Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\compdata\nv_agp.htm Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\compdata\nv_agp.txt Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\comsvcs.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\conf.ex_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\conime.ex_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\copymar.ex_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\courtney.ac_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\credui.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\crusoe.sys Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\crypt32.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\cryptdlg.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\cryptsvc.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\cryptui.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\cscui.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\csrsrv.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ctfmon.ex_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\custdial.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\d3d8.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\danim.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\dbghelp.dll Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\dbmsadsn.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\dbmsrpcn.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\dbmsvinn.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\dbnetlib.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\dbnmpntw.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\dcache.bi_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\dcap32.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ddraw.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\defrag.ex_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\desk.cp_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\devmgr.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\dfrgfat.ex_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\dfrgntfs.ex_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\dfrgsnap.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\dfrgui.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\dfsshlex.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\dgnet.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\dhcpcsvc.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\dhtmled.oc_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\digest.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\dinput.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\dinput8.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\disk.sy_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\diskdump.sy_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\dlimport.ex_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\dmband.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\dmcompos.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\dmime.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\dmloader.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\dmscript.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\dmstyle.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\dmusic.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\dnsapi.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\docprop2.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\dpnet.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\dpnhpast.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\dpnhupnp.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\dpvoice.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\dpvsetup.ex_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\dpwsockx.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\drmclien.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\drmk.sys Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\drmkaud.sys Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\drmstor.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\drmv2clt.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\drvmain.sdb Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\drw\dwwin.exe Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ds32gt.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\dshowext.ax Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\dsprop.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\dsquery.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\dssenh.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\dumprep.ex_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\duser.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\dw.ex_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\dwwin.ex_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\dxdiag.ex_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\dxg.sy_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\dxmasf.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\dxmrtp.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\dxtmsft.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\dxtrans.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\earl.ac_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\els.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ersvc.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\es.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\esscli.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\essm2e.sys Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\eudcedit.ex_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\eventlog.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\evntrprv.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\explorer.ex_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\expsrv.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\fastfat.sy_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\fastprox.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\faultrep.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\filelist.xm_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\fldrclnr.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\flpydisk.sy_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\fontview.ex_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\fp4.ca_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\fp40ext.cab Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\fp40ext.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\fp40ext.in_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\fp4amsft.dll Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\fp4anscp.dll Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\fp4apws.dll Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\fp4areg.dll Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\fp4atxt.dll Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\fp4autl.dll Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\fp4avnb.dll Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\fp4avss.dll Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\fp4awebs.dll Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\fp4awel.dll Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\fp98sadm.exe Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\fp98swin.exe Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\fpadmcgi.exe Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\fpadmdll.dll Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\fpcount.exe Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\fpencode.dll Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\fpexedll.dll Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\fpmmc.dll Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\fpmmcsat.dll Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\fpremadm.exe Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\fpsrvadm.exe Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\framebuf.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ftp.ex_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\fxsapi.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\fxsclnt.ex_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\fxscomex.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\fxscover.ex_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\fxsdrv.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\fxsext32.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\fxsocm.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\fxsocm.in_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\fxsperf.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\fxsres.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\fxsst.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\fxssvc.ex_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\fxst30.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\fxstiff.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\fxsui.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\fxswzrd.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\fxsxp32.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\g400.in_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\gameenum.sys Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\gckernel.sys Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\gdi32.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\georgia.tt_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\guitrn.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\guitrn_a.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\h323cc.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\hal.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\halaacpi.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\halacpi.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\halapic.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\halmacpi.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\halmps.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\helpctr.ex_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\helpsvc.ex_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\hh.ex_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\hhctrl.oc_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\hhsetup.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\hidclass.sy_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\hidserv.dll Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\highcont.ma_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\hmmapi.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\hnetcfg.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\homepage.in_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\i8042prt.sy_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ic\acpi.in_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ic\au.in_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ic\battery.in_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ic\bda.in_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ic\biosinfo.inf Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ic\cdrom.in_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ic\compdata\drvmain.chm Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ic\compdata\drvmain.inf Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ic\compdata\ntcompat.inf Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ic\cpu.in_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ic\disk.in_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ic\dosnet.inf Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ic\dpcdll.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ic\dpup.in_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ic\drvindex.inf Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ic\hiddigi.in_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ic\hidserv.in_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ic\hivedef.inf Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ic\hivesft.inf Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ic\hivesys.inf Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ic\ie.in_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ic\ieaccess.in_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ic\iis.in_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ic\input.in_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ic\intl.inf Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ic\keyboard.in_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ic\kscaptur.in_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ic\layout.inf Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ic\miscp.ch_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ic\mshdc.in_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ic\msoe50.in_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ic\netip6.in_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ic\netoc.in_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ic\netrass.in_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ic\nt5inf.ca_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ic\ntprint.inf Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ic\pchdt_p3.ca_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ic\pchealth.in_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ic\pidgen.dll Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ic\pnpscsi.in_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ic\rinorprt.si_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ic\ristndrd.si_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ic\scsi.in_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ic\setupreg.hiv Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ic\swflash.in_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ic\sysoc.in_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ic\syssetup.in_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ic\tape.in_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ic\tsoc.in_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ic\txtsetup.sif Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ic\usbport.in_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ic\whatnewp.ch_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ic\win9xupg\migdb.inf Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ic\win9xupg\vscandb.inf Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ic\win9xupg\win95upg.inf Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ic\winnt32.msi Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ic\wkstamig.in_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\icaapi.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\icm32.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\icsmgr.js_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\icwconn1.ex_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\idq.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ie4uinit.ex_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ieakeng.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ieaksie.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\iedkcs32.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\iepeers.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\iesetup.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ieuinit.in_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\iexplore.ex_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\iis.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ils.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\imaadp32.ac_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\imagehlp.dll Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\imapi.ex_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\imapi.sy_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\imeshare.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\imgutil.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\imm32.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ims.in_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\inetcomm.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\inetcpl.cp_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\input.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\inseng.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\instcat.sq_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\intelide.sy_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\intl.cp_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ip\acpi.in_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ip\adsiis51.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ip\appmgmts.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ip\appmgr.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ip\asp51.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ip\asr_pfu.ex_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ip\au.in_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ip\battery.in_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ip\bda.in_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ip\biosinfo.inf Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ip\cdrom.in_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ip\coadmin.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ip\compdata\drvmain.chm Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ip\compdata\drvmain.inf Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ip\compdata\ntcompat.inf Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ip\cpu.in_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ip\default.as_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ip\disk.in_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ip\dosnet.inf Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ip\dpcdll.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ip\drvindex.inf Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ip\dwup.in_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ip\fdeploy.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ip\ftpsv251.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ip\gprslt.ex_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ip\gptext.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ip\hiddigi.in_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ip\hidserv.in_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ip\hivedef.inf Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ip\hivesft.inf Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ip\hivesys.inf Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ip\httpext.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ip\httpod51.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ip\ie.in_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ip\ieaccess.in_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ip\iis.in_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ip\iislog51.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ip\inetres.ad_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ip\infocomm.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ip\input.in_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ip\intl.inf Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ip\irbus.sy_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ip\keyboard.in_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ip\kscaptur.in_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ip\layout.inf Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ip\login.cm_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ip\md5filt.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ip\medctroc.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ip\miscw.ch_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ip\mqac.sy_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ip\mqad.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ip\mqise.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ip\mqqm.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ip\mqrt.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ip\mqsec.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ip\mqsnap.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ip\mqtrig.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ip\mqutil.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ip\mshdc.in_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ip\msmqocm.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ip\msoe50.in_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ip\netfxocm.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ip\netfxocm.in_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ip\netip6.in_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ip\netoc.in_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ip\netrass.in_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ip\nt5inf.ca_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ip\ntprint.inf Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ip\nwrdr.sy_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ip\nwwks.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ip\pchdt_w3.ca_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ip\pchealth.in_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ip\pidgen.dll Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ip\pnpscsi.in_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ip\policman.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ip\query.as_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ip\rinorprt.si_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ip\ristndrd.si_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ip\rsnotify.ex_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ip\scsi.in_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ip\sctasks.ex_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ip\search.as_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ip\setupreg.hiv Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ip\spiisupd.ex_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ip\ssinc51.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ip\swflash.in_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ip\sysoc.in_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ip\syssetup.in_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ip\system.ad_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ip\system.ch_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ip\tabletoc.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ip\tabletpc.ca_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ip\tabletpc.in_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ip\tape.in_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ip\termcap._ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ip\tlntadmn.ex_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ip\tlntsess.ex_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ip\tlntsvr.ex_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ip\tlntsvrp.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ip\tracerpt.ex_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ip\tsoc.in_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ip\txtsetup.sif Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ip\usbport.in_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ip\w3svc.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ip\whatneww.ch_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ip\win9xupg\migdb.inf Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ip\win9xupg\vscandb.inf Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ip\win9xupg\win95upg.inf Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ip\winnt32.msi Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ip\wkstamig.in_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ip\wmic.ex_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ip\wsecedit.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ipconfig.ex_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ipevldpc.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ipevlpid.dll Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\iphlpapi.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ipmntdpc.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ipnat.sy_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ipnathlp.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ippromon.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ipp_0001.as_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ipp_0002.as_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ipp_0004.as_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ipp_0006.as_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ipp_0013.as_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ipp_0014.as_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ipp_util.in_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ipsec.sy_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ipsecsvc.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ipseldpc.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ipselpid.dll Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ipv6.ex_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ipv6mon.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\irmon.dll Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\itircl.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\itss.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\iuctl.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\iuengine.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ixsso.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\joy.cp_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\kbdclass.sy_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\kd1394.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\kerberos.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\kernel32.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\keyboard.sy_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\kmixer.sys Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ks.sys Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ksxbar.ax Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\l3codeca.ac_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\lang\chajei.im_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\lang\chtmbx.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\lang\chtskdic.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\lang\chtskf.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\lang\cintime.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\lang\cintlgnt.im_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\lang\cintsetp.ex_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\lang\cplexe.ex_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\lang\dayi.im_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\lang\imekr61.im_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\lang\imekrcic.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\lang\imjp81.im_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\lang\imjp81k.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\lang\imjpcd.di_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\lang\imjpcic.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\lang\imjpcus.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\lang\imjpdct.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\lang\imjpdct.ex_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\lang\imjpdsvr.ex_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\lang\imjpinst.ex_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\lang\imjpinst.in_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\lang\imjpmig.ex_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\lang\imjprw.ex_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\lang\imjputy.ex_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\lang\imjputyc.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\lang\imlang.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\lang\imscinst.ex_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\lang\miniime.tp_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\lang\padrs404.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\lang\padrs804.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\lang\phon.im_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\lang\pintlcsa.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\lang\pintlcsd.di_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\lang\pintlcsd.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\lang\pintlcsk.di_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\lang\pintlgc.im_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\lang\pintlgd.im_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\lang\pintlgdx.im_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\lang\pintlgi.im_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\lang\pintlgix.im_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\lang\pintlgl.im_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\lang\pintlgne.ch_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\lang\pintlgnt.ch_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\lang\pintlgnt.im_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\lang\pintlgr.im_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\lang\pintlgs.im_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\lang\pintlphr.ex_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\lang\pmigrate.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\lang\quick.im_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\lang\romanime.im_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\lang\tintlgnt.im_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\lang\tintlphr.ex_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\lang\tintsetp.ex_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\lang\tmigrate.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\lang\unicdime.im_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\lang\uniime.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\lang\voicepad.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\lang\voicesub.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\lang\winar30.im_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\lang\winime.im_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\laprxy.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\lcladvd.xm_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\lcldocs.xm_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\licdll.dll Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\licdll.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\license.ch_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\licmgr10.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\licwmi.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\licwmi.mf_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\licwmi.mof Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\licwmi.mo_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\lmrt.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\locale.nl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\localspl.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\localui.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\log.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\logagent.ex_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\logon.sc_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\logonmgr.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\logonui.ex_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\lsasrv.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\lsass.ex_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ltmdmnt.sys Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ltmdmntt.sys Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ltotape.sys Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\lvback.gif Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\lwadihid.sys Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\mail.ma_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\mailtmpl.txt Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\manifest.xm_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\market.ma_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\mdmetech.in_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\mdmlt3.in_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\mdmrpci.in_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\mdmsuprv.in_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\memstpci.sys Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\migapp.in_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\migism.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\migism.in_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\migism_a.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\migload.ex_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\migrate.js_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\migrate.ob_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\migsys.in_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\migwiz.ex_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\migwiz.in_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\migwiz_a.ex_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\mindex.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\mmcndmgr.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\mmssetup.cab Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\mnmdd.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\mobsync.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\mofcomp.ex_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\mofd.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\moricons.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\mouclass.sys Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\moviemk.ex_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\mpg2splt.ax_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\mpg4dmod.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\mpg4ds32.ax_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\mplay32.ex_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\mplayer2.ex_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\mrxsmb.sy_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\msadce.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\msadcf.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\msadco.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\msadcs.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\msadds.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\msadds32.ax_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\msado15.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\msado20.tl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\msado21.tl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\msado25.tl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\msado26.tl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\msadomd.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\msador15.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\msadox.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\msadp32.ac_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\msadrh15.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\msaud32.ac_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\mscandui.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\mscms.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\msconf.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\msconfig.ex_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\mscpx32r.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\msctf.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\msctfp.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\msdadc.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\msdaenum.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\msdaer.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\msdaipp.dll Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\msdaora.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\msdaosp.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\msdaprst.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\msdaps.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\msdarem.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\msdart.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\msdasc.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\msdasql.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\msdatl3.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\msdatsrc.tl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\msdatt.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\msdaurl.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\msdbx.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\msdfmap.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\msdtcprx.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\msdtctr.mo_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\msdxm.oc_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\msdxmlc.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\msexch40.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\msexcl40.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\msgina.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\msgrocm.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\msgsc.dll Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\msgslang.dll Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\msh261.dr_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\msh263.drv Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\mshtml.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\mshtml.tl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\mshtmled.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\mshtmler.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\msi.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\msieftp.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\msiexec.ex_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\msihnd.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\msimain.sd_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\msimg32.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\msimn.ex_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\msimtf.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\msisam11.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\msjet40.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\msjetol1.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\msjro.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\msjtes40.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\mskssrv.sys Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\mslbui.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\msltus40.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\msmom.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\msmsgs.ca_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\msmsgs.exe Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\msmsgs.in_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\msmsgsin.exe Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\msn.in_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\msn36.ma_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\msn6.ex_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\msnetobj.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\msnmetal.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\msnmigr.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\msnmsn.in_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\msnmtllc.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\msnntmig.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\msnspell.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\msnsspc.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\msnunin.ex_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\msnupgrd.in_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\msobcomm.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\msobmain.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\msobshel.ht_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\msoe.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\msoeacct.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\msoert2.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\msorcl32.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\mspaint.ex_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\mspbde40.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\mspmsp.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\msrating.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\msrd2x40.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\msrdp.ca_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\msrdp.ocx Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\msrepl40.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\msrle32.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\msscds32.ax_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\msscp.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\msscript.oc_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\mst120.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\mst123.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\mstask.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\mstee.sys Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\mstext40.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\mstime.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\mstinit.ex_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\mstsc.ch_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\mstsc.ex_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\mstscax.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\mstsweb.ca_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\msuni11.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\msutb.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\msv1_0.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\msvcp60.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\msvcrt.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\msvfw32.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\msvidctl.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\mswebdvd.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\msxactps.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\msxbde40.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\msxml2.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\msxml3.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\muisetup.ex_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\mup.sy_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\nac.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ncobjapi.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ncprov.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\nddenb32.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ndis.sy_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ndisnpp.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ndisuio.sys Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ndiswan.sy_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\net.ex_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\net1.ex_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\netapi32.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\netbios.sy_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\netbt.sy_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\netcfgx.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\netdde.ex_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\netklsi.in_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\netlogon.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\netman.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\netnm.in_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\netoc.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\netplwiz.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\netrtsnt.in_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\netsetup.exe Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\netshell.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\netwlan.in_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\netwlan2.in_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\netwlan5.img Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\netwlan5.sys Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\netwv48.in_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\new\apph_sp.sd_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\new\apps_sp.ch_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\new\ati2dvaa.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\new\ati2dvag.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\new\ati2mtaa.sy_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\new\ati2mtag.sy_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\new\ati3d1ag.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\new\ati3d2ag.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\new\atiixpaa.in_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\new\atiixpag.in_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\new\atinbtxx.sy_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\new\atinmdxx.sy_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\new\atinpdxx.sy_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\new\atinraxx.sy_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\new\atinrvxx.sy_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\new\atinsnxx.sy_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\new\atinttxx.sy_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\new\atintuxx.sy_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\new\atinxbxx.sy_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\new\atinxsxx.sy_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\new\ativdaxx.ax_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\new\ativmvxx.ax_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\new\atixpwdm.in_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\new\c_28603.nl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\new\dsprpres.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\new\encapi.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\new\encdec.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\new\faxpatch.ex_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\new\hccoin.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\new\hidir.sy_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\new\hscupd.ex_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\new\hscxpsp1.cab Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\new\irbus.in_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\new\logo.gi_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\new\logowin.gi_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\new\medctrro.ex_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\new\msctfime.im_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\new\msftedit.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\new\mssap.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\new\mutohpen.sy_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\new\netbeac.in_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\new\nettun.in_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\new\nv4_disp.in_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\new\nvct.in_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\new\nvdm.in_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\new\nvts.in_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\new\oeaccess.in_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\new\osloader.nt_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\new\ramdisk.in_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\new\rtcimsp.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\new\sbe.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\new\sbeio.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\new\secupd.dat Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\new\secupd.sig Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\new\smtpsvc.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\new\snchk.ex_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\new\sp1.cab Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\new\spgrmr.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\new\sprs040c.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\new\usbehci.sy_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\new\wacompen.sy_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\new\winbrand.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\new\winhttp.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\new\wmaccess.in_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\new\wmpocm.in_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\new\wmvcore2.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\new\wuau.ad_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\new\wuauhelp.ch_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\newalert.wa_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\newdev.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\newemail.wa_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\neweula.ht_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\nic1394.sys Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\nlhtml.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\nmas.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\nmasnt.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\nmchat.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\nmcom.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\nmft.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\nmmkcert.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\nmnt.sy_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\nmoldwb.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\nmpgmgrp.ex_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\nmwb.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\npdrmv2.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\npdsplay.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\nppagent.ex_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\npptools.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\npwmsdrm.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\nt5.ca_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ntdetect.com Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ntdll.dll Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ntfs.sys Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ntio.sy_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ntkrnlmp.ex_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ntkrnlpa.exe Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ntkrpamp.exe Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ntlanman.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ntldr Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ntmarta.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ntmsapi.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ntmsdba.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ntmssvc.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ntoskrnl.ex_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ntprint.cat Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ntprint.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ntshrui.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ntvdm.ex_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\nv4_disp.dll Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\nv4_mini.sys Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\nwprovau.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\oakley.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\obeip.du_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ocgen.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ocmsn.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\odbc32.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\odbc32gt.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\odbcad32.ex_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\odbcbcp.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\odbcconf.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\odbcconf.ex_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\odbcconf.rs_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\odbccp32.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\odbccr32.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\odbccu32.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\odbcp32r.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\odbctrac.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\offfilt.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ohci1394.sy_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ole32.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\oleaut32.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\oledb32.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\oleprn.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\online.wa_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\oobebaln.ex_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\opengl32.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\oschoice.ex_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\osk.ex_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\osloader.ex_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\p3.sys Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\packager.ex_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\page1.as_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\parport.sys Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\pautoenr.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\pchshell.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\pchsvc.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\pci.sy_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\pciidex.sy_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\pcmcia.sy_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\pcx500.sys Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\pdh.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\perm2.sys Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\perm2dll.dll Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\perm3.sys Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\perm3dd.dll Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\phone.ic_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\phone.in_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\phone.ob_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\pid.dll Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ping.ex_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\pngfilt.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\popc.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\portcls.sys Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ppa3.sys Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\printui.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\privacy.ht_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\processr.sys Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\proctexe.oc_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ps5ui.dll Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\psapi.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\psbase.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\psched.sy_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\pscript5.dll Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ptpusd.dll Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\qcap.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\qdvd.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\qedit.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\qmgr.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\qmgrprxy.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\quartz.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\query.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ramdisk.sy_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\rasapi32.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\raschap.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\rasdlg.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\rasl2tp.sy_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\rasman.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\rasmans.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\rasppp.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\raspptp.sy_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\rassapi.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\rastapi.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\rastls.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\rcimlby.ex_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\rdbss.sy_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\rdchost.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\rdpclip.ex_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\rdpdd.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\rdpdr.sys Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\rdpsnd.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\rdpwd.sy_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\rdpwsx.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\rdsaddin.ex_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\readmesp.htm Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\redbook.sys Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\redir.ex_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\reg.ex_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\regapi.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\regedit.exe Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\remotepg.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\repdrvfs.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\riched20.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\root\ic\win51ic.SP1 Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\root\ip\win51ip.SP1 Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\root\spnotes.htm Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\rpcrt4.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\rpcss.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\rrcm.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\rsaenh.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\rshx32.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\rstrui.ex_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\rtcdll.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\rtcshare.ex_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\runonce.ex_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\samlib.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\sapi.cp_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\sapi.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\savedump.ex_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\sbp2port.sy_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\sccbase.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\sccsccp.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\scecli.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\scesrv.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\schannel.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\schedsvc.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\script.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\script_a.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\scrnsave.sc_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\scsiport.sy_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\sdbinst.ex_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\secdrv.sy_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\secur32.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\sens.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\sensapi.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\serial.sy_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\sessmgr.ex_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\setup.ex_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\setup50.ex_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\setupapi.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\setupdd.sy_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\setupldr.bin Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\setupldr.ex_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\setupqry.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\setupqry.in_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\setuptxt\winxp_logo_horiz_sm.gif Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\setup_wm.ex_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\sfcfiles.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\sfc_os.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\sfloppy.sy_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\shdocvw.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\shell32.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\shfolder.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\shgina.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\shimeng.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\shimgvw.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\shlwapi.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\shmgrate.ex_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\shsvcs.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\shtml.dll Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\shtml.exe Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\signup.ma_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\sigtab.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\sigverif.ex_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\simpdata.tl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\skeys.ex_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\sla30nd5.sys Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\slayerxp.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\sl_anet.ac_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\smbali.sys Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\smbbatt.sys Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\smbclass.sys Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\smi2smir.ex_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\smlogcfg.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\smlogsvc.ex_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\smss.ex_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\snmp.ex_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\snmpapi.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\snmpcl.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\snmpincl.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\snmpsmir.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\snmpthrd.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\softkbd.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\sonydcam.sys Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\spcmdcon.sys Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\spider.ex_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\splitter.sys Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\spmsg.dll Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\spoolss.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\sptip.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\spuninst.exe Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\sqloledb.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\sqlsrv32.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\sqlxmlx.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\sr.sy_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\srchui.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\srclient.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\srrstr.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\srsvc.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ss3dfo.sc_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ssbezier.sc_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ssdpapi.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ssdpsrv.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ssflwbox.sc_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ssmarque.sc_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ssmyst.sc_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\sspipes.sc_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ssstars.sc_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\sstext3d.sc_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\stdprov.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\sti.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\sti_ci.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\stobject.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\storprop.dll Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\stream.sys Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\strmdll.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\stub_fpsrvadm.exe Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\stub_fpsrvwin.exe Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\swflash.oc_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\sxs.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\sysaudio.sys Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\sysdm.cp_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\sysmain.sd_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\sysmod.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\sysmod_a.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\sysmon.oc_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\syssetup.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\system32\ntdll.dll Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\system32\smss.exe Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\tagfile.1 Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\tahoma.tt_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\tahomabd.tt_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\tape.sy_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\tapi32.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\tapisrv.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\taskmgr.ex_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\tcpip.sy_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\tcpip6.sy_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\tcptest.exe Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\tcptsat.dll Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\telnet.exe Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\termdd.sys Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\termsrv.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\tffsport.sy_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\themedef.ma_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\themeui.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\Thumbs.db Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\times.tt_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\tracert.ex_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\trebuc.tt_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\triedit.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\trkwks.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\tscfgwmi.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\tscfgwmi.mf_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\tscfgwmi.mo_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\tscupgrd.ex_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\tshoot.ch_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\tsoc.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\tsweb1.ht_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\tunmp.sys Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\type.wav Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\udfs.sy_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\udhisapi.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ui.ma_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\umandlg.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\umpnpmgr.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\unidrv.dll Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\unidrvui.dll Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\unregmp2.ex_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\untfs.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\update\eula.txt Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\update\SP1.CAT Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\update\spcustom.dll Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\update\update.exe Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\update\update.inf Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\update\update.msi Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\update\update.ver Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\upnp.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\upnphost.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\upnpui.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\ups.ex_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\url.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\urlmon.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\usb101et.sys Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\usbaudio.sys Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\usbccgp.sy_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\usbhub.sy_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\usbintel.sys Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\usbohci.sy_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\usbport.sy_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\usbprint.sys Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\usbscan.sys Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\usbstor.sy_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\usbuhci.sy_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\user32.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\userenv.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\userinit.ex_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\usmtdef.in_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\usp10.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\utilman.ex_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\uxtheme.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\vbisurf.ax_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\vbscript.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\vdmredir.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\verdana.tt_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\vfwwdm32.dll Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\vga.sy_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\vgx.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\viaide.sy_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\videoprt.sy_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\vssapi.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\w32time.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\w95upgnt.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\wab32.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\wab32res.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\watchdog.sy_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\wbemcomn.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\wbemcore.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\wbemess.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\wbemprox.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\wbemupgd.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\wdmaud.sys Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\wdma_ali.in_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\wdma_int.in_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\wdma_via.in_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\webcheck.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\webclnt.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\webfldrs.ms_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\webvw.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\wextract.ex_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\wiadss.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\wiaservc.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\win32k.sy_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\win32spl.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\win9xmig\acrobat\migrate.dll Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\win9xmig\cmmgr\migrate.dll Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\win9xmig\devupgrd\migrate.dll Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\win9xmig\dmicall\migrate.dll Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\win9xmig\dvd\migrate.dll Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\win9xmig\eastman\migrate.dll Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\win9xmig\fax\migrate.dll Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\win9xmig\hptools\migrate.dll Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\win9xmig\ibmav\migrate.dll Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\win9xmig\icm\migrate.dll Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\win9xmig\iemig\migrate.dll Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\win9xmig\mapi\dll\migrate.dll Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\win9xmig\modems\migrate.dll Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\win9xmig\msgqueue\migrate.dll Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\win9xmig\msi\migrate.dll Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\win9xmig\msnexplr\migrate.dll Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\win9xmig\msp\migrate.dll Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\win9xmig\neckbd\migrate.dll Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\win9xmig\necpa\migrate.dll Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\win9xmig\necwps\migrate.dll Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\win9xmig\octopus\migrate.dll Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\win9xmig\oewab\migrate.dll Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\win9xmig\print\migrate.dll Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\win9xmig\pws\migrate.dll Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\win9xmig\rumba\migrate.dll Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\win9xmig\setup\migrate.dll Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\win9xmig\transact\migrate.dll Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\win9xmig\wia\migrate.dll Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\win9xmig\wmp\migrate.dll Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\win9xupg\cabinet.dll Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\win9xupg\imagehlp.dll Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\win9xupg\msvcrt.dll Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\win9xupg\setupapi.dll Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\win9xupg\w95upg.dll Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\winhlp32.ex_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\wininet.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\winlogon.ex_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\winmm.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\winnt.exe Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\winnt32.exe Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\winnt32a.dll Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\winnt32u.dll Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\winntupg\netupgrd.dll Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\winntupg\setupapi.dll Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\winspool.dr_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\winsrv.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\winsta.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\winxp_logo_horiz_sm.gif Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\wldap32.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\wlluc48.sys Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\wlnotify.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\wmadmod.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\wmadmoe.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\wmasf.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\wmi.mo_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\wmicookr.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\wmidcprv.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\wmidx.oc_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\wmipcima.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\wmiprov.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\wmiprvsd.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\wmiprvse.ex_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\wmipsess.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\wmisvc.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\wmiutils.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\wmmfilt.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\wmmres.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\wmmutil.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\wmnetmgr.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\wmp.in_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\wmp.oc_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\wmpcd.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\wmpcore.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\wmplayer.ex_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\wmploc.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\wmpshell.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\wmpstub.ex_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\wmpui.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\wmpvis.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\wmsdmod.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\wmsdmoe.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\wmstream.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\wmv8dmod.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\wmv8ds32.ax_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\wmvcore.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\wmvdmod.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\wmvdmoe.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\wmvds32.ax_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\wordpad.ex_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\wow32.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\wsdueng.dll Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\wship6.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\wsnmp32.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\wtsapi32.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\wuauclt.ex_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\wuaueng.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\wuauserv.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\wzcdlg.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\wzcsapi.dll Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\wzcsvc.dll Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\xactsrv.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\xenroll.dl_ Object is locked skipped

C:\ec3fa4ad9c6a83e21220eb243233bf87\zipfldr.dl_ Object is locked skipped

C:\rawlog.log Object is locked skipped

C:\seclog.log Object is locked skipped

C:\syslog.log Object is locked skipped

C:\System Volume Information\_restore{555EF5E0-D329-44AB-B330-864330A16C9A}\RP2\change.log Object is locked skipped

C:\tralog.log Object is locked skipped

D:\Documents and Settings\LocalService\Local Settings\Application Data\Microsoft\Windows\UsrClass.dat Object is locked skipped

D:\Documents and Settings\LocalService\Local Settings\Application Data\Microsoft\Windows\UsrClass.dat.LOG Object is locked skipped

D:\Documents and Settings\LocalService\NTUSER.DAT Object is locked skipped

D:\Documents and Settings\LocalService\ntuser.dat.LOG Object is locked skipped

D:\Documents and Settings\tania\Application Data\Mozilla\Firefox\Profiles\vukr4gm1.default\history.dat Object is locked skipped

D:\Documents and Settings\tania\Application Data\Mozilla\Firefox\Profiles\vukr4gm1.default\parent.lock Object is locked skipped

D:\Documents and Settings\tania\Cookies\index.dat Object is locked skipped

D:\Documents and Settings\tania\Local Settings\Application Data\Microsoft\Windows\UsrClass.dat Object is locked skipped

D:\Documents and Settings\tania\Local Settings\Application Data\Microsoft\Windows\UsrClass.dat.LOG Object is locked skipped

D:\Documents and Settings\tania\Local Settings\Application Data\Mozilla\Firefox\Profiles\vukr4gm1.default\Cache\_CACHE_001_ Object is locked skipped

D:\Documents and Settings\tania\Local Settings\Application Data\Mozilla\Firefox\Profiles\vukr4gm1.default\Cache\_CACHE_002_ Object is locked skipped

D:\Documents and Settings\tania\Local Settings\Application Data\Mozilla\Firefox\Profiles\vukr4gm1.default\Cache\_CACHE_003_ Object is locked skipped

D:\Documents and Settings\tania\Local Settings\Application Data\Mozilla\Firefox\Profiles\vukr4gm1.default\Cache\_CACHE_MAP_ Object is locked skipped

D:\Documents and Settings\tania\Local Settings\Historique\History.IE5\index.dat Object is locked skipped

D:\Documents and Settings\tania\Local Settings\Historique\History.IE5\MSHist012007061520070616\index.dat Object is locked skipped

D:\Documents and Settings\tania\Local Settings\Temporary Internet Files\Content.IE5\index.dat Object is locked skipped

D:\Documents and Settings\tania\NTUSER.DAT Object is locked skipped

D:\Documents and Settings\tania\NTUSER.DAT.LOG Object is locked skipped

D:\Documents and Settings\tania\UserData\index.dat Object is locked skipped

D:\System Volume Information\_restore{555EF5E0-D329-44AB-B330-864330A16C9A}\RP2\change.log Object is locked skipped

D:\WINDOWS\Debug\PASSWD.LOG Object is locked skipped

D:\WINDOWS\photos.zip/webcam_photos-2007-06.scr Infected: Backdoor.Win32.IRCBot.aaq skipped

D:\WINDOWS\photos.zip ZIP: infected - 1 skipped

D:\WINDOWS\system32\config\Antivirus.Evt Object is locked skipped

D:\WINDOWS\system32\config\AppEvent.Evt Object is locked skipped

D:\WINDOWS\system32\config\default Object is locked skipped

D:\WINDOWS\system32\config\default.LOG Object is locked skipped

D:\WINDOWS\system32\config\SAM Object is locked skipped

D:\WINDOWS\system32\config\SAM.LOG Object is locked skipped

D:\WINDOWS\system32\config\SecEvent.Evt Object is locked skipped

D:\WINDOWS\system32\config\SECURITY Object is locked skipped

D:\WINDOWS\system32\config\SECURITY.LOG Object is locked skipped

D:\WINDOWS\system32\config\software Object is locked skipped

D:\WINDOWS\system32\config\software.LOG Object is locked skipped

D:\WINDOWS\system32\config\SysEvent.Evt Object is locked skipped

D:\WINDOWS\system32\config\system Object is locked skipped

D:\WINDOWS\system32\config\system.LOG Object is locked skipped

D:\WINDOWS\system32\config\systemprofile\Cookies\index.dat Object is locked skipped

D:\WINDOWS\system32\config\systemprofile\Local Settings\Historique\History.IE5\index.dat Object is locked skipped

D:\WINDOWS\system32\config\systemprofile\Local Settings\Temporary Internet Files\Content.IE5\index.dat Object is locked skipped

D:\WINDOWS\system32\h323log.txt Object is locked skipped

D:\WINDOWS\system32\wbem\Repository\FS\INDEX.BTR Object is locked skipped

D:\WINDOWS\system32\wbem\Repository\FS\OBJECTS.DATA Object is locked skipped

D:\WINDOWS\Temp\Perflib_Perfdata_5a8.dat Object is locked skipped

D:\WINDOWS\Temp\_avast4_\Webshlock.txt Object is locked skipped

Scan process completed.

 

 

Je te met aussi un nouveau log hijackthis

 

Logfile of HijackThis v1.99.1

Scan saved at 14:26:26, on 15/06/2007

Platform: Windows XP (WinNT 5.01.2600)

MSIE: Internet Explorer v6.00 (6.00.2600.0000)

 

Running processes:

D:\WINDOWS\System32\smss.exe

D:\WINDOWS\system32\winlogon.exe

D:\WINDOWS\system32\services.exe

D:\WINDOWS\system32\lsass.exe

D:\WINDOWS\system32\svchost.exe

D:\WINDOWS\System32\svchost.exe

C:\smc.exe

D:\WINDOWS\Explorer.EXE

D:\WINDOWS\system32\spoolsv.exe

C:\ad aware\aawservice.exe

C:\avast\aswUpdSv.exe

C:\avast\ashServ.exe

D:\WINDOWS\htpatch.exe

C:\avast\ashDisp.exe

D:\WINDOWS\System32\RunDll32.exe

C:\avg\AVG Anti-Spyware 7.5\guard.exe

D:\Program Files\Fichiers communs\EPSON\eEBAPI\SAgent2.exe

C:\avast\ashWebSv.exe

C:\avast\ashMaiSv.exe

C:\Mozilla Firefox\firefox.exe

C:\Hijackthis Version Française\VERSION TRADUITE ORIGINALE.EXE

 

R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://fr.msn.com/

R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Local Page =

R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Local Page =

R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName = Liens

R3 - URLSearchHook: Yahoo! Toolbar avec bloqueur de fenêtres pop-up - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - D:\Program Files\Yahoo!\Companion\Installs\cpn\yt.dll

O2 - BHO: Yahoo! Toolbar Helper - {02478D38-C3F9-4EFB-9B51-7695ECA05670} - D:\Program Files\Yahoo!\Companion\Installs\cpn\yt.dll

O2 - BHO: Aide pour le lien d'Adobe PDF Reader - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - D:\Program Files\Fichiers communs\Adobe\Acrobat\ActiveX\AcroIEHelper.dll

O2 - BHO: (no name) - {53707962-6F74-2D53-2644-206D7942484F} - C:\SPYBOT~1\SDHelper.dll

O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - D:\Program Files\Java\jre1.6.0_01\bin\ssv.dll

O2 - BHO: Windows Live Sign-in Helper - {9030D464-4C02-4ABF-8ECC-5164760863C6} - D:\Program Files\Fichiers communs\Microsoft Shared\Windows Live\WindowsLiveLogin.dll

O3 - Toolbar: &Radio - {8E718888-423F-11D2-876E-00A0C9082467} - D:\WINDOWS\System32\msdxm.ocx

O3 - Toolbar: Yahoo! Toolbar avec bloqueur de fenêtres pop-up - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - D:\Program Files\Yahoo!\Companion\Installs\cpn\yt.dll

O4 - HKLM\..\Run: [HTpatch] D:\WINDOWS\htpatch.exe

O4 - HKLM\..\Run: [siSUSBRG] D:\WINDOWS\SiSUSBrg.exe

O4 - HKLM\..\Run: [avast!] C:\avast\ashDisp.exe

O4 - HKLM\..\Run: [NvMediaCenter] RunDLL32.exe NvMCTray.dll,NvTaskbarInit

O4 - HKLM\..\Run: [Cmaudio] RunDll32 cmicnfg.cpl,CMICtrlWnd

O4 - HKLM\..\Run: [Adobe Reader Speed Launcher] "C:\Adobe\Reader\Reader_sl.exe"

O4 - HKLM\..\Run: [KernelFaultCheck] %systemroot%\system32\dumprep 0 -k

O4 - HKLM\..\Run: [smcService] C:\smc.exe -startgui

O4 - Startup: ERUNT AutoBackup.lnk = C:\ERUNT\AUTOBACK.EXE

O8 - Extra context menu item: E&xporter vers Microsoft Excel - res://C:\office\OFFICE11\EXCEL.EXE/3000

O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - D:\Program Files\Java\jre1.6.0_01\bin\ssv.dll

O9 - Extra 'Tools' menuitem: Console Java (Sun) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - D:\Program Files\Java\jre1.6.0_01\bin\ssv.dll

O9 - Extra button: Recherche - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\office\OFFICE11\REFIEBAR.DLL

O16 - DPF: {0EB0E74A-2A76-4AB3-A7FB-9BD8C29F7F75} (CKAVWebScan Object) - http://webscanner.kaspersky.fr/kavwebscan_unicode.cab

O16 - DPF: {30528230-99f7-4bb4-88d8-fa1d4f56a2ab} (YInstStarter Class) - D:\Program Files\Yahoo!\Common\yinsthelper.dll

O16 - DPF: {644E432F-49D3-41A1-8DD5-E099162EEEC5} (Symantec RuFSI Utility Class) - http://security.symantec.com/sscv6/SharedC...n/bin/cabsa.cab

O16 - DPF: {9A9307A0-7DA4-4DAF-B042-5009F29E09E1} (ActiveScan Installer Class) - http://acs.pandasoftware.com/activescan/as5free/asinst.cab

O16 - DPF: {B8BE5E93-A60C-4D26-A2DC-220313175592} (MSN Games - Installer) - http://messenger.zone.msn.com/binary/ZIntro.cab56649.cab

O16 - DPF: {C3F79A2B-B9B4-4A66-B012-3EE46475B072} (MessengerStatsClient Class) - http://messenger.zone.msn.com/binary/Messe...nt.cab56907.cab

O17 - HKLM\System\CCS\Services\Tcpip\..\{2C5183F9-8146-4E23-911B-8FC6C2B6D930}: NameServer = 84.103.237.144 86.64.145.144

O18 - Protocol: livecall - {828030A1-22C1-4009-854F-8E305202313F} - D:\PROGRA~1\MSNMES~1\MSGRAP~1.DLL

O18 - Protocol: msnim - {828030A1-22C1-4009-854F-8E305202313F} - D:\PROGRA~1\MSNMES~1\MSGRAP~1.DLL

O23 - Service: Ad-Aware 2007 Service (aawservice) - Lavasoft AB - C:\ad aware\aawservice.exe

O23 - Service: avast! iAVS4 Control Service (aswUpdSv) - ALWIL Software - C:\avast\aswUpdSv.exe

O23 - Service: avast! Antivirus - ALWIL Software - C:\avast\ashServ.exe

O23 - Service: avast! Mail Scanner - Unknown owner - C:\avast\ashMaiSv.exe" /service (file missing)

O23 - Service: avast! Web Scanner - Unknown owner - C:\avast\ashWebSv.exe" /service (file missing)

O23 - Service: AVG Anti-Spyware Guard - Anti-Malware Development a.s. - C:\avg\AVG Anti-Spyware 7.5\guard.exe

O23 - Service: EPSON Printer Status Agent2 (EPSONStatusAgent2) - SEIKO EPSON CORPORATION - D:\Program Files\Fichiers communs\EPSON\eEBAPI\SAgent2.exe

O23 - Service: Sygate Personal Firewall (SmcService) - Sygate Technologies, Inc. - C:\smc.exe

 

 

Une question la ligne O4 - HKLM\..\Run: [KernelFaultCheck] %systemroot%\system32\dumprep 0 -k à été fixé il y a quelque jours et elle est revenue. Est ce que je la refixe??

 

Merci

 

WawaSeb

 

Pour la réinfection tu n'y es pour rien, c'est une m.... qui se propage via msn. :P

Posté(e) (modifié)

SAlut !

 

voici ce que tu vas faire stp :

 

Télécharge la dernière version de Killbox -> http://www.downloads.subratam.org/KillBox.zip

Place le programme dans le répertoire qui te plaît (pas d'installation Windows)

 

- redémarre l'ordinateur en mode sans échec

 

- lance Pocket Killbox

--- choisis l'option Delete on Reboot

--- copie la liste ci-dessous, des fichiers à supprimer (Ctrl-C) et File / Paste from Clipboard

c:\windows\system32\syshelps.dll

D:\WINDOWS\photos.zip

* les boutons "Single File" et "All Files" deviennent actifs mais "Single File" est activé par défaut.

Il faut alors impérativement activer (cliquer sur) "All Files", impérativement, sinon seul le premier de la liste sera supprimé.

--- vérifie que tous les fichiers sont enregistrés, par la liste déroulante "Full Path of File to Delete"

--- /!\ ATTENTION si un ou des fichiers ".dll" sont présents dans la liste les mettrent en début de liste , et coche "Unregister .dll Before Deleting".

--- clique sur la croix blanche sur fond rouge (Delete File) :

 

- "File will be Removed on Reboot, Do you want to reboot now?", réponds OUI si tu es prêt à procéder

 

Si Pocket KillBox ne fait pas redémarrer le PC, redémarre le toi même.

 

Tu pourras trouver un tutorial complet et détaillé par Jesses : http://perso.wanadoo.fr/jesses/Docs/Logiciels/KillBox.htm

 

Refait un scan en ligne en suite ici

 

A plus-Faire un scan antivirus en ligne à titre de vérification

http://housecall65.trendmicro.com/ (fire fox ou IE)

Eventuellement faire celui-ci

http://www.trendmicro.com/spyware-scan/ (IE avec active x seulement)

 

A la fin du scan, sauvegarder le rapport sur le Bureau.(cliquer sur l'onglet Résultats/ puis cliquer sur Edition/tout sélectionner/copier puis ouvrir un fichier texte et coller la sélection dedans)

 

-Poster le(s) rapport(s) trendmicro .

 

A plus.

Modifié par regis56
Posté(e)

re

 

Ca y est c'est fait, j'ai un peu galéré pour le fichier dll car je comprenais pas mais apparemment c'est bon. Je te met le rapport comme ça tu me diras (j'ai recommencé plusieurs fois :P )

 

Pocket Killbox version 2.0.0.648

Running on Windows XP

was started @ vendredi, juin 15, 2007, 8:49 PM

 

# 1 [Delete on Reboot]

Path = D:\WINDOWS\photos.zip

 

 

# 2 [Delete on Reboot]

Path = D:\WINDOWS\photos.zip

 

 

I Rebooted @ 9:00:59 PM

Killbox Closed(Exit) @ 9:01:03 PM

__________________________________________________

 

Pocket Killbox version 2.0.0.648

Running on Windows XP

was started @ vendredi, juin 15, 2007, 9:02 PM

 

# 1 [Delete on Reboot]

Path = d:\windows\system32\syshelps.dll

 

 

PendingFileRenameOperations Registry Data has been Removed by External Process! @ 9:05:13 PM

# 2 [Delete on Reboot]

Path = d:\windows\system32\syshelps.dll

 

 

PendingFileRenameOperations Registry Data has been Removed by External Process! @ 9:05:55 PM

Killbox Closed(Exit) @ 9:05:56 PM

__________________________________________________

 

Pocket Killbox version 2.0.0.648

Running on Windows XP a

was started @ vendredi, juin 15, 2007, 9:15 PM

 

Killbox Closed(Exit) @ 9:16:07 PM

__________________________________________________

 

Pocket Killbox version 2.0.0.648

Running on Windows XP a

was started @ vendredi, juin 15, 2007, 9:58 PM

 

 

J'ai fais les 2 scan trend mais ce sont les mêmes alors je te met le rapport du premier

Il y avait un cookie mais je l'ai supprimé

 

Sur...

Résultats

 

 

Encyclopédie

 

 

 

0 Infections

 

 

Transfert d'informations supplémentaires sur ce programme malveillant...

Informations générales sur ce type de programme malveillant.

Il n'existe actuellement aucune information supplémentaire concernant ce programme malveillant...

Informations générales sur ce type de programme malveillant.

Alias-Noms: aucun autre nom connu

Plate-forme: Aucune indication donnée

Réception des premières occurences le: Aucune indication donnée Degré de risque général Très faible Faible Moyen Élevé

 

 

Informations générales sur ce type de programme malveillant.

 

0 Signatures

 

 

0 Infections

 

 

Transfert d'informations sur ce grayware/programme espion...

Informations générales sur ce type de grayware/programme espion.

Il n'existe actuellement aucune information supplémentaire concernant ce grayware/programme espion...

Informations générales sur ce type de grayware/programme espion.

Alias-Noms: aucun autre nom connu

Plate-forme: Aucune indication donnée

Réception des premières occurences le: Aucune indication donnée Degré de risque général Très faible Faible Moyen Élevé

 

 

Informations générales sur ce type de grayware/programme espion.

Failles de sécurité détectées

 

Windows Media Player .ASF Processor Contains Unchecked Buffer

 

Une erreur est survenue lors de la tentative d'obtention d'informations supplémentaires sur ces failles de sécurité. Aucune autre information supplémentaire n'est disponible pour le moment.

This vulnerability enables a remote attacker to execute arbitrary code through the use of a malformed Advanced Streaming Format (ASF) file. It is caused by a ...

Informations supplémentaires sur cette faille de sécurité et sa suppression.

Programmes et services concernés: Windows Media Player 6.4

Windows Media Player 7

Windows Media Player 7.1

Windows Media Player for Windows XP

Programme malveillant expoitant cette faille de sécurité: ASF_MANYMIZE.A, WORM_MANYMIZE.A

 

 

 

 

 

13 December 2001 Cumulative Patch for IE

 

Une erreur est survenue lors de la tentative d'obtention d'informations supplémentaires sur ces failles de sécurité. Aucune autre information supplémentaire n'est disponible pour le moment.

This vulnerability enables a remote attacker to execute arbitrary codes on the user’s system. It is caused by Internet Explorer 6.0 believing that the file to be opened is...

Informations supplémentaires sur cette faille de sécurité et sa suppression.

Programmes et services concernés: Microsoft Internet Explorer 5.5

Microsoft Internet Explorer 6.0

Programme malveillant expoitant cette faille de sécurité: PHP_BOOSTAP.A

This vulnerability enables a remote attacker to execute arbitrary codes on the user’s system. It is caused by Internet Explorer 6.0 believing that the file to be opened is safe to open without user confirmation, due to some changes made in the HTML header.;This vulnerability enables a remote attacker to read any file contained in the user’s system that could be opened through Internet Explorer 5.5 or 6.0.;This vulnerability enables a remote attacker to represent the file name in the File Download dialogue box of Internet Explorer 5.5 or 6.0 with a different name that could fool users into thinking that the said file is safe to download.

Informations supplémentaires sur cette faille de sécurité et sa suppression.

 

 

 

 

Unchecked Buffer in Universal Plug and Play can Lead to System Compromise

 

Une erreur est survenue lors de la tentative d'obtention d'informations supplémentaires sur ces failles de sécurité. Aucune autre information supplémentaire n'est disponible pour le moment.

This vulnerability allows a remote attacker to execute arbitrary code via a NOTIFY directive with a long Location URL when the buffer overflow in Uni...

Informations supplémentaires sur cette faille de sécurité et sa suppression.

Programmes et services concernés: Microsoft Windows 98

Microsoft Windows 98SE

Microsoft Windows ME

Microsoft Windows XP

Programme malveillant expoitant cette faille de sécurité: WORM_AGOBOT.GH, WORM_AGOBOT.WR, WORM_KIBUV.B, WORM_SPYBOT.CG

This vulnerability allows a remote attacker to execute arbitrary code via a NOTIFY directive with a long Location URL when the buffer overflow in Universal Plug and Play (UPnP) on Windows 98, 98SE, ME, and XP is triggered.;The Universal Plug and Play (UPnP) on Windows 98, 98SE, ME, and XP could allow a remote attacker to cause a denial of service via a spoofed SSDP advertisement or a spoofed SSDP announcement to broadcast or multicast addresses. The former could cause the client to connect to a service on another machine that generates a large amount of traffic, while the latter could cause all UPnP clients to send traffic to a single target system.

Informations supplémentaires sur cette faille de sécurité et sa suppression.

 

 

 

 

11 February 2002 Cumulative Patch for Internet Explorer

 

Une erreur est survenue lors de la tentative d'obtention d'informations supplémentaires sur ces failles de sécurité. Aucune autre information supplémentaire n'est disponible pour le moment.

This vulnerability allows a remote attacker to execute arbitrary code via a web page that specifies embedded ActiveX controls in a way that causes 2 Unicode strings to be concaten...

Informations supplémentaires sur cette faille de sécurité et sa suppression.

Programmes et services concernés: Microsoft Internet Explorer 5.01

Microsoft Internet Explorer 5.5

Microsoft Internet Explorer 6.0

Programme malveillant expoitant cette faille de sécurité: inconnu

This vulnerability allows a remote attacker to execute arbitrary code via a web page that specifies embedded ActiveX controls in a way that causes 2 Unicode strings to be concatenated when buffer overflow in the implementation of an HTML directive in mshtml.dll in Internet Explorer 5.5 and 6.0 is triggered.;A remote attacker could read arbitrary files via malformed requests to the GetObject function because Internet Explorer 5.01, 5.5 and 6.0 bypass some of GetObject's security checks.;File Download box in Internet Explorer 5.01, 5.5 and 6.0 allows the modification of the displayed name of the file through Content-Disposition and Content-Type HTML header fields, which could allow an attacker to trick a user into believing that a file is safe to download.;Because Internet Explorer 5.01, 5.5 and 6.0 does not properly handle the Content-Type HTML header field, a remote attacker is allowed to modify which application is used to process a document.;Internet Explorer 5.5 and 6.0 bypass restrictions for executing scripts via an object that processes asynchronous events after the initial security checks have been made, which could allow a remote attacker to compromise user system through the said vulnerability.;Internet Explorer 5.5 and 6.0 allows the reading of certain files and spoofing of the URL in the address bar through the Document.open function, which could allow a remote attacker to compromise user system through the said vulnerability.;This vulnerability allows a remote attacker to read arbitrary files by specifying a local file as an XML Data Source. This is caused by the XMLHTTP control found in Microsoft XML Core Services 2.6 and later not properly handling Internet Explorer Security Zone settings.

Informations supplémentaires sur cette faille de sécurité et sa suppression.

 

 

 

 

28 March 2002 Cumulative Patch for Internet Explorer

 

Une erreur est survenue lors de la tentative d'obtention d'informations supplémentaires sur ces failles de sécurité. Aucune autre information supplémentaire n'est disponible pour le moment.

This vulnerability enables a remote attacker to run scripts in the Local Computer zone. This is done via a script that is embedded in a cookie that would be sav...

Informations supplémentaires sur cette faille de sécurité et sa suppression.

Programmes et services concernés: Microsoft Internet Explorer 5.01

Microsoft Internet Explorer 5.5

Microsoft Internet Explorer 6.0

Programme malveillant expoitant cette faille de sécurité: BKDR_LORRAC.A, JS_CBASE.EXP1, JS_SEFEX.A, VBS_DAOL.A, WORM_CASPID.B, WORM_DARBY.C, WORM_DARBY.D, WORM_MIMAIL.A, WORM_MIMAIL.D

This vulnerability enables a remote attacker to run scripts in the Local Computer zone. This is done via a script that is embedded in a cookie that would be saved to the user’s system.;This vulnerability enables a remote attacker to invoke an executable on the user’s system via an HTML web page that includes an object tag.

Informations supplémentaires sur cette faille de sécurité et sa suppression.

 

 

 

 

Unchecked Buffer in Network Share Provider Can Lead to Denial of Service

 

Une erreur est survenue lors de la tentative d'obtention d'informations supplémentaires sur ces failles de sécurité. Aucune autre information supplémentaire n'est disponible pour le moment.

This vulnerability allows an attacker to cause a denial of service attack to a target server machine. This is caused by a buffer overflow in SMB protocol in...

Informations supplémentaires sur cette faille de sécurité et sa suppression.

Programmes et services concernés: Microsoft Windows NT 4.0 Workstation

Microsoft Windows NT 4.0 Server

Microsoft Windows NT 4.0 Server

Terminal Server Edition

Microsoft Windows 2000 Professional

Microsoft Windows 2000 Server

Microsoft Windows 2000 Advanced Server

Windows XP Professional

Programme malveillant expoitant cette faille de sécurité: TROJ_SMBNUKE.A

This vulnerability allows an attacker to cause a denial of service attack to a target server machine. This is caused by a buffer overflow in SMB protocol in Microsoft Windows NT, Windows 2000, and Windows XP.

Informations supplémentaires sur cette faille de sécurité et sa suppression.

 

 

 

 

Unchecked Buffer in Windows Shell Could Enable System Compromise

 

Une erreur est survenue lors de la tentative d'obtention d'informations supplémentaires sur ces failles de sécurité. Aucune autre information supplémentaire n'est disponible pour le moment.

This vulnerability enables a remote attacker to execute arbitrary code by creating an .MP3 or .WMA file that contains a corrupt custom attribute. This is caused b...

Informations supplémentaires sur cette faille de sécurité et sa suppression.

Programmes et services concernés: Windows XP Home Edition

Windows XP Professional

Windows XP Tablet PC Edition

Windows XP Media Center Edition

Programme malveillant expoitant cette faille de sécurité: inconnu

This vulnerability enables a remote attacker to execute arbitrary code by creating an .MP3 or .WMA file that contains a corrupt custom attribute. This is caused by a buffer overflow in the Windows Shell function in Microsoft Windows XP.

Informations supplémentaires sur cette faille de sécurité et sa suppression.

 

 

 

 

Unchecked Buffer in Locator Service Could Lead to Code Execution

 

Une erreur est survenue lors de la tentative d'obtention d'informations supplémentaires sur ces failles de sécurité. Aucune autre information supplémentaire n'est disponible pour le moment.

This vulnerability enables local users to execute arbitrary code through an RPC call. This is caused by a buffer overflow in the RPC Locator service for W...

Informations supplémentaires sur cette faille de sécurité et sa suppression.

Programmes et services concernés: Microsoft Windows NT 4.0

Microsoft Windows NT 4.0

Terminal Server Edition

Microsoft Windows 2000

Microsoft Windows XP

Programme malveillant expoitant cette faille de sécurité: AGOBOT FAMILY, WORM_GAOBOT.AC, WORM_MUMU.C, WORM_NACHI.B, WORM_NACHI.C, WORM_NACHI.D, WORM_NACHI.F, WORM_NACHI.G, WORM_NACHI.I, WORM_NACHI.K, WORM_RBOT.AA, WORM_RBOT.AB, WORM_RBOT.AF, WORM_RBOT.BZ, WORM_RBOT.R, WORM_RBOT.TW, WORM_RBOT.W, WORM_RBOT.WU, WORM_SDBOT.BV, WORM_SDBOT.DZ, WORM_SDBOT.FB, WORM_SDBOT.FC, WORM_SDBOT.FD, WORM_SDBOT.FE, WORM_SDBOT.FQ, WORM_SDBOT.G, WORM_SDBOT.GO, WORM_SDBOT.IG, WORM_SDBOT.IY, WORM_SDBOT.JG, WORM_SDBOT.JS, WORM_SDBOT.JY, WORM_SDBOT.K, WORM_SDBOT.KY, WORM_SDBOT.M, WORM_SDBOT.ZY, WORM_SPYBOT.AP, WORM_SPYBOTER.CY, WORM_SPYBOTER.CZ

This vulnerability enables local users to execute arbitrary code through an RPC call. This is caused by a buffer overflow in the RPC Locator service for Windows NT 4.0, Windows NT 4.0 Terminal Server Edition, Windows 2000, and Windows XP.

Informations supplémentaires sur cette faille de sécurité et sa suppression.

 

 

 

 

Unchecked Buffer In Windows Component Could Cause Server Compromise

 

Une erreur est survenue lors de la tentative d'obtention d'informations supplémentaires sur ces failles de sécurité. Aucune autre information supplémentaire n'est disponible pour le moment.

This vulnerability enables a remote attacker to execute arbitrary code through a WebDAV request to IIS 5.0. This is caused by a buffer overflow in N...

Informations supplémentaires sur cette faille de sécurité et sa suppression.

Programmes et services concernés: Microsoft Windows NT 4.0

Microsoft Windows NT 4.0

Terminal Server Edition

Microsoft Windows 2000

Microsoft Windows XP

Programme malveillant expoitant cette faille de sécurité: AGOBOT FAMILY, BKDR_RBOT.B, BKDR_SDBOT.CC, TROJ_KAHT.A, TROJ_ROLARK.A, TROJ_WCOT.A, WORM_GAOBOT.AC, WORM_KIBUV.B, WORM_MUMU.C, WORM_NACHI.A, WORM_NACHI.B, WORM_NACHI.C, WORM_NACHI.D, WORM_NACHI.F, WORM_NACHI.G, WORM_NACHI.I, WORM_NACHI.K, WORM_RBOT.AA, WORM_RBOT.AB, WORM_RBOT.AE, WORM_RBOT.AF, WORM_RBOT.AJ, WORM_RBOT.BZ, WORM_RBOT.CC, WORM_RBOT.EM, WORM_RBOT.R, WORM_RBOT.TW, WORM_RBOT.W, WORM_RBOT.WU, WORM_RBOT.ZA, WORM_SDBOT.BV, WORM_SDBOT.CC, WORM_SDBOT.DZ, WORM_SDBOT.FB, WORM_SDBOT.FC, WORM_SDBOT.FD, WORM_SDBOT.FE, WORM_SDBOT.FQ, WORM_SDBOT.G, WORM_SDBOT.GO, WORM_SDBOT.IG, WORM_SDBOT.IY, WORM_SDBOT.JG, WORM_SDBOT.JS, WORM_SDBOT.JT, WORM_SDBOT.JY, WORM_SDBOT.K, WORM_SDBOT.KY, WORM_SDBOT.M, WORM_SDBOT.MD, WORM_SDBOT.MG, WORM_SDBOT.MH, WORM_SDBOT.PF, WORM_SDBOT.WY, WORM_SDBOT.ZY, WORM_SPYBOT.AP, WORM_SPYBOT.CG, WORM_SPYBOTER.CY, WORM_SPYBOTER.CZ

This vulnerability enables a remote attacker to execute arbitrary code through a WebDAV request to IIS 5.0. This is caused by a buffer overflow in NTDLL.DLL on Windows NT 4.0, Windows NT 4.0 Terminal Server Edition, Windows 2000, and Windows XP.

Informations supplémentaires sur cette faille de sécurité et sa suppression.

 

 

 

 

Cumulative Patch for Outlook Express (330994)

 

Une erreur est survenue lors de la tentative d'obtention d'informations supplémentaires sur ces failles de sécurité. Aucune autre information supplémentaire n'est disponible pour le moment.

This vulnerability enables a remote attacker to execute any file that can be rendered as text, and be opened as part of a page in Internet Explorer.

Informations supplémentaires sur cette faille de sécurité et sa suppression.

Programmes et services concernés: Microsoft Outlook Express 5.5

Microsoft Outlook Express 6.0

Programme malveillant expoitant cette faille de sécurité: BKDR_LORRAC.A, JS_CBASE.EXP1, JS_SEFEX.A, WORM_BUGBEAR.C, WORM_CASPID.A, WORM_CASPID.B, WORM_DARBY.C, WORM_DARBY.D, WORM_LORAC.A, WORM_MIMAIL.A, WORM_MIMAIL.D

This vulnerability enables a remote attacker to execute any file that can be rendered as text, and be opened as part of a page in Internet Explorer.

Informations supplémentaires sur cette faille de sécurité et sa suppression.

 

 

 

 

Buffer Overrun In HTML Converter Could Allow Code Execution

 

Une erreur est survenue lors de la tentative d'obtention d'informations supplémentaires sur ces failles de sécurité. Aucune autre information supplémentaire n'est disponible pour le moment.

This vulnerability enables a remote attacker to cause a denial of service and execute arbitrary code through a specially formed web page or HTML e-mail. This is caused by a fl...

Informations supplémentaires sur cette faille de sécurité et sa suppression.

Programmes et services concernés: Microsoft Windows 98

Microsoft Windows 98 Second Edition

Microsoft Windows Me

Microsoft Windows NT 4.0 Server

Microsoft Windows NT 4.0 Terminal Server Edition

Microsoft Windows 2000

Microsoft Windows XP

Microsoft Windows Server 2003

Programme malveillant expoitant cette faille de sécurité: inconnu

This vulnerability enables a remote attacker to cause a denial of service and execute arbitrary code through a specially formed web page or HTML e-mail. This is caused by a flaw in the way the HTML converter for Microsoft Windows handles a conversion request during a cut-and-paste operation.

Informations supplémentaires sur cette faille de sécurité et sa suppression.

 

 

 

 

Buffer Overrun In RPC Interface Could Allow Code Execution

 

Une erreur est survenue lors de la tentative d'obtention d'informations supplémentaires sur ces failles de sécurité. Aucune autre information supplémentaire n'est disponible pour le moment.

This vulnerability enables a remote attacker to execute arbitrary code through a malformed message. This is caused by a buffer overflow in certain DCOM inte...

Informations supplémentaires sur cette faille de sécurité et sa suppression.

Programmes et services concernés: Microsoft Windows NT 4.0

Microsoft Windows NT 4.0 Terminal Services Edition

Microsoft Windows 2000

Microsoft Windows XP

Microsoft Windows Server 2003

Programme malveillant expoitant cette faille de sécurité: AGOBOT FAMILY, BKDR_CIREBOT.A, BKDR_DONK.O, BKDR_RBOT.B, BKDR_RPCBOT.D, BKDR_SDBOT.CC, BKDR_SDBOT.GV, HKTL_DCOM.AI, HKTL_DCOM.L, HKTL_DCOM.U, HKTL_DCOM.V, HKTL_DCOM.X, HKTL_DCOM.Y, HKTL_DCOMDOS.A, HKTL_RPCDCOM.A, TROJ_EXPLTDCOM.A, WORM_BOBAX.C, WORM_BOLGI.A, WORM_DINKDINK.B, WORM_DONK.B, WORM_DONK.C, WORM_DONK.L, WORM_DONK.M, WORM_FRANCETTE.C, WORM_FRANCETTE.D, WORM_FRANCETTE.F, WORM_FRANCETTE.G, WORM_FRANCETTE.H, WORM_GAOBOT.AC, WORM_KIBUV.B, WORM_MSBLAST.A, WORM_MSBLAST.B, WORM_MSBLAST.C, WORM_MSBLAST.D, WORM_MSBLAST.E, WORM_MSBLAST.F, WORM_MSBLAST.G, WORM_MSBLAST.H, WORM_MSBLAST.I, WORM_MUMU.C, WORM_NACHI.A, WORM_NACHI.B, WORM_NACHI.C, WORM_NACHI.D, WORM_NACHI.F, WORM_NACHI.G, WORM_NACHI.I, WORM_NACHI.K, WORM_PLEXUS.B, WORM_RALEKA.A, WORM_RALEKA.B, WORM_RALEKA.C, WORM_RBOT.AA, WORM_RBOT.AB, WORM_RBOT.AE, WORM_RBOT.AF, WORM_RBOT.AJ, WORM_RBOT.BZ, WORM_RBOT.CC, WORM_RBOT.EM, WORM_RBOT.R, WORM_RBOT.TW, WORM_RBOT.W, WORM_RBOT.WU, WORM_RBOT.ZA, WORM_RPCDCOM.B, WORM_RPCSDBOT.A, WORM_RPCSDBOT.B, WORM_SDBOT.BV, WORM_SDBOT.CC, WORM_SDBOT.DZ, WORM_SDBOT.FB, WORM_SDBOT.FC, WORM_SDBOT.FD, WORM_SDBOT.FE, WORM_SDBOT.FQ, WORM_SDBOT.G, WORM_SDBOT.GO, WORM_SDBOT.IG, WORM_SDBOT.IY, WORM_SDBOT.JG, WORM_SDBOT.JS, WORM_SDBOT.JT, WORM_SDBOT.JY, WORM_SDBOT.K, WORM_SDBOT.KY, WORM_SDBOT.L, WORM_SDBOT.M, WORM_SDBOT.MD, WORM_SDBOT.MG, WORM_SDBOT.MH, WORM_SDBOT.PF, WORM_SDBOT.WY, WORM_SDBOT.ZY, WORM_SPYBOT.AP, WORM_SPYBOT.CG, WORM_SPYBOT.S, WORM_SPYBOTER.CY, WORM_SPYBOTER.CZ

This vulnerability enables a remote attacker to execute arbitrary code through a malformed message. This is caused by a buffer overflow in certain DCOM interface for RPC in Microsoft Windows NT 4.0, 2000, XP, and Server 2003.

Informations supplémentaires sur cette faille de sécurité et sa suppression.

 

 

 

 

Buffer Overrun In RPCSS Service Could Allow Code Execution

 

Une erreur est survenue lors de la tentative d'obtention d'informations supplémentaires sur ces failles de sécurité. Aucune autre information supplémentaire n'est disponible pour le moment.

This vulnerability could allow a remote attacker to execute arbitrary code via a malformed RPC request with a long filename parameter. This is caused by a heap-bas...

Informations supplémentaires sur cette faille de sécurité et sa suppression.

Programmes et services concernés: Microsoft Windows NT Workstation 4.0

Microsoft Windows NT Server 4.0

Microsoft Windows NT Server 4.0

Terminal Server Edition

Microsoft Windows 2000

Microsoft Windows XP

Microsoft Windows Server 2003

Programme malveillant expoitant cette faille de sécurité: WORM_AGOBOT.AA, WORM_NEXIV.A

This vulnerability could allow a remote attacker to execute arbitrary code via a malformed RPC request with a long filename parameter. This is caused by a heap-based buffer overflow found in the Distributed Component Object Model (DCOM) interface in the RPCSS Service.;This vulnerability could allow a remote attacker to cause a denial of service attack, which could allow local attackers to gain privileges via certain messages sent to the __RemoteGetClassObject interface.;This vulnerability could allow a remote attacker to execute arbitrary code via a malformed activation request packet with modified length fields. This is caused by a heap-based buffer overflow in the Distributed Component Object Model (DCOM) interface in the RPCSS Service.;This vulnerability could allow a remote attacker to cause a denial of service attack. This is caused by two threads processing the same RPC request, which will lead to its using memory after it has been freed.;This vulnerability could allow a remote attacker to cause a denial of service attack via a queue registration request. This is caused by a buffer overflow in the Microsoft Message Queue Manager.

Informations supplémentaires sur cette faille de sécurité et sa suppression.

 

 

 

 

Cumulative Patch for Internet Explorer (828750)

 

Une erreur est survenue lors de la tentative d'obtention d'informations supplémentaires sur ces failles de sécurité. Aucune autre information supplémentaire n'est disponible pour le moment.

These vulnerabilities, which are due to Internet Explorer not properly determining an object type returned from a Web server in a popup window or during XML data binding, ...

Informations supplémentaires sur cette faille de sécurité et sa suppression.

Programmes et services concernés: Internet Explorer 5.01

Internet Explorer 5.5

Internet Explorer 6.0

Internet Explorer 6.0 for Windows Server 2003

Programme malveillant expoitant cette faille de sécurité: BKDR_LIDUAN.A, HTML_ALPHX.A, HTML_ALPHX.C, HTML_ALPHX.E, HTML_BAGLE.Q-1, HTML_DELPLAYER.A, HTML_IWILL.D, HTML_LEGENDMIR.I, HTML_MINIT.A, HTML_OBJECTTAG.A, HTML_SNAPPER.A, PE_BAGLE.Q, PE_BAGLE.R, PE_BAGLE.S, PE_BAGLE.T, TROJ_MINIT.A, TROJ_QHOSTS.A, VBS_DELUD.A, VBS_SHOWPOP.A, WORM_ALPHX.A, WORM_NETSKY.V, WORM_SNAPPER.A

These vulnerabilities, which are due to Internet Explorer not properly determining an object type returned from a Web server in a popup window or during XML data binding, respectively, could allow an attacker to run arbitrary code on a user's system.

Informations supplémentaires sur cette faille de sécurité et sa suppression.

 

 

 

 

Vulnerability in Authenticode Verification Could Allow Remote Code Execution (823182)

 

Une erreur est survenue lors de la tentative d'obtention d'informations supplémentaires sur ces failles de sécurité. Aucune autre information supplémentaire n'est disponible pour le moment.

This vulnerability allows a remote attacker to execute arbitrary code without user approval. This is caused by the authenticode capability in Microsoft Windows NT through S...

Informations supplémentaires sur cette faille de sécurité et sa suppression.

Programmes et services concernés: Microsoft Windows NT Workstation 4.0

Service Pack 6a

Microsoft Windows NT Server 4.0

Service Pack 6a

Microsoft Windows NT Server 4.0

Terminal Server Edition

Service Pack 6

Microsoft Windows 2000

Service Pack 2

Microsoft Windows 2000

Service Pack 3

Service Pack 4

Microsoft Windows XP Gold

Service Pack 1

Microsoft Windows XP 64-bit Edition

Microsoft Windows XP 64-bit Edition Version 2003

Microsoft Windows Server 2003

Microsoft Windows Server 2003 64-bit Edition

Programme malveillant expoitant cette faille de sécurité: inconnu

This vulnerability allows a remote attacker to execute arbitrary code without user approval. This is caused by the authenticode capability in Microsoft Windows NT through Server 2003 not prompting the user to download and install ActiveX controls when system is low on memory.

Informations supplémentaires sur cette faille de sécurité et sa suppression.

 

 

 

 

Buffer Overrun in Messenger Service Could Allow Code Execution (828035)

 

Une erreur est survenue lors de la tentative d'obtention d'informations supplémentaires sur ces failles de sécurité. Aucune autre information supplémentaire n'est disponible pour le moment.

This vulnerability allows a remote attacker to execute arbitrary code on the affected system. This is caused of a buffer overflow in the Messenger Service f...

Informations supplémentaires sur cette faille de sécurité et sa suppression.

Programmes et services concernés: Microsoft Windows NT Workstation 4.0

Service Pack 6a

Microsoft Windows NT Server 4.0

Service Pack 6a

Microsoft Windows NT Server 4.0

Terminal Server Edition

Service Pack 6

Microsoft Windows 2000

Service Pack 2

Service Pack 3

Service Pack 4

Microsoft Windows XP Gold

Service Pack 1

Microsoft Windows XP 64-bit Edition

Microsoft Windows XP 64-bit Edition Version 2003

Microsoft Windows Server 2003

Microsoft Windows Server 2003 64-bit Edition

Programme malveillant expoitant cette faille de sécurité: WORM_KIBUV.B

This vulnerability allows a remote attacker to execute arbitrary code on the affected system. This is caused of a buffer overflow in the Messenger Service for Windows NT through Server 2003.

Informations supplémentaires sur cette faille de sécurité et sa suppression.

 

 

 

 

Buffer Overrun in the ListBox and in the ComboBox Control Could Allow Code Execution (824141)

 

Une erreur est survenue lors de la tentative d'obtention d'informations supplémentaires sur ces failles de sécurité. Aucune autre information supplémentaire n'est disponible pour le moment.

This vulnerability is due to a buffer overrun in the ListBox and ComboBox controls found in User32.dll. Any program that implements the ListBox control or the ComboBox contro...

Informations supplémentaires sur cette faille de sécurité et sa suppression.

Programmes et services concernés: Microsoft Windows NT Workstation 4.0 Service Pack 6a

Microsoft Windows NT Server 4.0 Service Pack 6a

Microsoft Windows NT Server 4.0 Terminal Server Edition Service Pack 6

Microsoft Windows 2000 Service Pack 2

Microsoft Windows 2000 Service Pack 3

Microsoft Windows 2000 Service Pack 4

Microsoft Windows XP Gold

Service Pack 1

Microsoft Windows XP 64 bit Edition

Microsoft Windows XP 64 bit Edition Version 2003

Microsoft Windows Server 2003

Microsoft Windows Server 2003 64 bit Edition

Programme malveillant expoitant cette faille de sécurité: inconnu

This vulnerability is due to a buffer overrun in the ListBox and ComboBox controls found in User32.dll. Any program that implements the ListBox control or the ComboBox control could allow arbitrary code to be executed at the same privilege level. This vulnerability cannot be exploited remotely.

Informations supplémentaires sur cette faille de sécurité et sa suppression.

 

 

 

 

Cumulative Security Update for Internet Explorer (832894)

 

Une erreur est survenue lors de la tentative d'obtention d'informations supplémentaires sur ces failles de sécurité. Aucune autre information supplémentaire n'est disponible pour le moment.

This vulnerability could allow an attacker to access information from other Web sites, access files on a user's system, and run arbitrary code on a user's system, wherein this ...

Informations supplémentaires sur cette faille de sécurité et sa suppression.

Programmes et services concernés: Microsoft Windows NT Workstation 4.0 Service Pack 6a

Microsoft Windows NT Server 4.0 Service Pack 6a

Microsoft Windows NT Server 4.0 Terminal Server Edition

Service Pack 6

Microsoft Windows 2000 Service Pack 2

Service Pack 3

Service Pack 4

Microsoft Windows XP

Microsoft Windows XP Service Pack 1

Microsoft Windows XP 64-Bit Edition

Microsoft Windows XP 64-Bit Edition Service Pack 1

Microsoft Windows XP 64-Bit Edition Version 2003

Microsoft Windows Server 2003

Microsoft Windows Server 2003

64-Bit Edition

Internet Explorer 6 Service Pack 1

Internet Explorer 6 Service Pack 1 (64-Bit Edition)

Internet Explorer 6 for Windows Server 2003

Internet Explorer 6 for Windows Server 2003 (64-Bit Edition)

Internet Explorer 6

Internet Explorer 5.5 Service Pack 2

Internet Explorer 5.01 Service Pack 4

Internet Explorer 5.01 Service Pack 3

Internet Explorer 5.01 Service Pack 2

Programme malveillant expoitant cette faille de sécurité: HTML_BAYFRAUD.B, HTML_GOLDFRAUD.A, HTML_PACHFRAUD.A, HTML_PAYPFRAUD.A, HTML_PAYPFRAUD.B, HTML_SWENFRAUD.A, HTML_VISAFRAUD.A, TROJ_STRTPAGE.FI

This vulnerability could allow an attacker to access information from other Web sites, access files on a user's system, and run arbitrary code on a user's system, wherein this is executed under the security context of the currently logged on user.;This vulnerability could allow an attacker to save a file on the user’s system. This is due to dynamic HTML events related to the drag-and-drop of Internet Explorer.;This vulnerability, which is due to the incorrect parsing of URLs which contain special characters, could allow an attacker to trick a user by presenting one URL in the address bar, wherein it actually contains the content of another web site of the attacker’s choice.

Informations supplémentaires sur cette faille de sécurité et sa suppression.

 

 

 

 

Security Update for Microsoft Windows (835732)

 

Une erreur est survenue lors de la tentative d'obtention d'informations supplémentaires sur ces failles de sécurité. Aucune autre information supplémentaire n'est disponible pour le moment.

The LSASS buffer overrun vulnerability allows remote code execution.;The LDAP vulnerability is a denial of service vulnerability that causes the service in a ...

Informations supplémentaires sur cette faille de sécurité et sa suppression.

Programmes et services concernés: Microsoft Windows NT® Workstation 4.0 Service Pack 6a

Microsoft Windows NT Server 4.0 Service Pack 6a

Microsoft Windows NT Server 4.0 Terminal Server

Microsoft Windows 2000 Service Pack 2

Microsoft Windows 2000 Service Pack 3

Microsoft Windows 2000 Service Pack 4

Microsoft Windows XP

Microsoft Windows XP Service Pack 1

Microsoft Windows XP 64-Bit Edition Service Pack 1

Microsoft Windows XP 64-Bit Edition Version 2003

Microsoft Windows Server 2003

Microsoft Windows Server 2003 64-Bit Edition

Microsoft NetMeeting

Microsoft Windows 98

Microsoft Windows 98 Second Edition (SE)

Microsoft Windows Millennium Edition (ME)

Programme malveillant expoitant cette faille de sécurité: WORM_AGOBOT.IM, WORM_AGOBOT.JF, WORM_AGOBOT.RZ, WORM_AGOBOT.TG, WORM_AGOBOT.WW, WORM_AGOBOT.YG, WORM_BOBAX.A, WORM_BOBAX.B, WORM_BOBAX.C, WORM_BOBAX.D, WORM_CYCLE.A, WORM_KIBUV.A, WORM_KIBUV.B, WORM_KORGO.A, WORM_KORGO.B, WORM_KORGO.C, WORM_KORGO.D, WORM_KORGO.E, WORM_KORGO.F, WORM_KORGO.GEN, WORM_KORGO.H, WORM_KORGO.I, WORM_PLEXUS.B, WORM_RBOT.AE, WORM_RBOT.AF, WORM_RBOT.BZ, WORM_RBOT.CC, WORM_RBOT.EM, WORM_SASSER-1, WORM_SASSER.A, WORM_SASSER.B, WORM_SASSER.C, WORM_SASSER.D, WORM_SASSER.E, WORM_SASSER.F, WORM_SASSER.GEN, WORM_SDBOT.KW, WORM_SDBOT.WY, WORM_SPYBOT.CG

The LSASS buffer overrun vulnerability allows remote code execution.;The LDAP vulnerability is a denial of service vulnerability that causes the service in a Windows 2000 domain controller in an Active Directory domain to stop responding.;The PCT vulnerability is a buffer overrun vulnerability in the Private Communications Transport protocol, that allows remote code execution.;The Winlogon vulnerability is a buffer overrun vulnerability in the Windows logon process that allows remote code execution.;The Metafile vulnerability is a buffer overrun vulnerability that exists in the rendering of Windows Metafile (WMF) and Enhanced Metafile (EMF) image formats.;The Help and Support Center vulnerability allows remote code execution due to the way Help and Support Center handles HCP URL validation.;The Utility Manager vulnerability is a privilege elevation vulnerability that exists due to the way that Utility Manager launches applications.;The Windows Management vulnerability is a privilege elevation vulnerability that could allow a local attacker to take complete control of a system by executing commands with system privilege level.;The Local Descriptor Table vulnerability could allow a local attacker to take complete control of a system by executing commands with system privileges.;This H.323 buffer overrun vulnerability could allow attackers to gain full control of a system by arbitrarily executing commands with system privileges.;Virtual DOS Machine vulnerability could allow a local attacker to gain full control of a system by executing certain commands;This Negotiate SSP buffer overrun vulnerability that exists in Microsoft's Negotiate Security Service Provider interface could allow remote code execution.;This SSL vulnerability exists due to the way SSL packets are handled and can cause the affected systems to stop responding to SSL connection requests.;The ASN.1 Double-Free vulnerability exists in Microsoft's Abstract Syntax Notation One Library and allows remote code execution with system privilege level.

Informations supplémentaires sur cette faille de sécurité et sa suppression.

 

 

 

 

Cumulative Update for Microsoft RPC/DCOM (828741)

 

Une erreur est survenue lors de la tentative d'obtention d'informations supplémentaires sur ces failles de sécurité. Aucune autre information supplémentaire n'est disponible pour le moment.

The RPC Runtime Library vulnerability is a remote code execution vulnerability that results from a race condition when the RPC Runtime Library processes specially crafted ...

Informations supplémentaires sur cette faille de sécurité et sa suppression.

Programmes et services concernés: Microsoft Windows NT® Workstation 4.0 Service Pack 6a

Microsoft Windows NT Server 4.0 Service Pack 6a

Microsoft Windows NT Server 4.0 Terminal Server Edition Service Pack 6

Microsoft Windows 2000 Service Pack 2

Microsoft Windows 2000 Service Pack 3

Microsoft Windows 2000 Service Pack 4

Microsoft Windows XP and Microsoft Windows XP Service Pack 1

Microsoft Windows XP 64-Bit Edition Service Pack 1

Microsoft Windows XP 64-Bit Edition Version 2003

Microsoft Windows Server 2003

Microsoft Windows Server 2003 64-Bit Edition

Microsoft Windows 98

Microsoft Windows 98 Second Edition (SE)

Microsoft Windows Millennium Edition (ME)

Programme malveillant expoitant cette faille de sécurité: inconnu

The RPC Runtime Library vulnerability is a remote code execution vulnerability that results from a race condition when the RPC Runtime Library processes specially crafted messages. An attacker who successfully exploits this vulnerability could take complete control of an affected system.;The RPCSS Service denial of service (DoS) vulnerability allows a malicious user or malware to send specially-crafted messages to a vulnerable system, which causes the RPCSS Service to stop responding.;The RPC Over HTTP vulnerability may be used to launch a denial of service (DoS) attack against a system with CIS or RPC over HTTP Proxy enabled.;When successfully exploited, the Object Identity vulnerability allows an attacker to force currently running applications to open network communication ports, thereby opening a system to remote attacks.

Informations supplémentaires sur cette faille de sécurité et sa suppression.

 

 

 

 

Cumulative Security Update for Outlook Express (837009)

 

Une erreur est survenue lors de la tentative d'obtention d'informations supplémentaires sur ces failles de sécurité. Aucune autre information supplémentaire n'est disponible pour le moment.

The MHTML URL Processing Vulnerability allows remote attackers to bypass domain restrictions and execute arbitrary code via script in a compiled help (CHM) file that ...

Informations supplémentaires sur cette faille de sécurité et sa suppression.

Programmes et services concernés: Microsoft Windows NT® Workstation 4.0 Service Pack 6a

Microsoft Windows NT Server 4.0 Service Pack 6a

Microsoft Windows NT Server 4.0 Terminal Server Edition Service Pack 6

Microsoft Windows 2000 Service Pack 2

Microsoft Windows 2000 Service Pack 3

Microsoft Windows 2000 Service Pack 4

Microsoft Windows XP

Microsoft Windows XP Service Pack 1

Microsoft Windows XP 64-Bit Edition Service Pack 1

Microsoft Windows XP 64-Bit Edition Version 2003

Microsoft Windows Server 2003

Microsoft Windows Server 2003 64-Bit Edition

Microsoft Windows 98

Microsoft Windows 98 Second Edition (SE)

Microsoft Windows Millennium Edition (ME)

Microsoft Outlook Express 5.5 SP2

Microsoft Outlook Express 6

Microsoft Outlook Express 6 SP1

Microsoft Outlook Express 6 SP1 (64 bit Edition)

Microsoft Outlook Express 6 on Windows Server 2003

Microsoft Outlook Express 6 on Windows Server 2003 (64 bit edition)

Programme malveillant expoitant cette faille de sécurité: BKDR_ZGOO.A, HTML_JACKLER.A, HTML_MHTREDIR.B, HTML_MHTREDIR.C, HTML_MHTREDIR.D, HTML_REDIR.AC, HTML_REDIR.B, VBS_PSYME.E, WORM_WALLON.A

The MHTML URL Processing Vulnerability allows remote attackers to bypass domain restrictions and execute arbitrary code via script in a compiled help (CHM) file that references the InfoTech Storage (ITS) protocol handlers.This could allow an attacker to take complete control of an affected system.

Informations supplémentaires sur cette faille de sécurité et sa suppression.

 

 

 

 

Vulnerability in Help and Support Center Could Allow Remote Code Execution

 

Une erreur est survenue lors de la tentative d'obtention d'informations supplémentaires sur ces failles de sécurité. Aucune autre information supplémentaire n'est disponible pour le moment.

This vulnerability exists in the Help and Support Center (HCP) and is due to the way it handles HCP URL validation. This vulnerability could allow an attack...

Informations supplémentaires sur cette faille de sécurité et sa suppression.

Programmes et services concernés: Microsoft Windows XP

Microsoft Windows XP Service Pack 1

Microsoft Windows XP 64-Bit Edition Service Pack 1

Microsoft Windows XP 64-Bit Edition Version 2003

Microsoft Windows Server 2003

Microsoft Windows Server 2003 64-Bit Edition

Programme malveillant expoitant cette faille de sécurité: inconnu

This vulnerability exists in the Help and Support Center (HCP) and is due to the way it handles HCP URL validation. This vulnerability could allow an attacker to remotely execute arbitrary code with Local System privileges.

Informations supplémentaires sur cette faille de sécurité et sa suppression.

 

 

 

 

Cumulative Security Update for Outlook Express (823353)

 

Une erreur est survenue lors de la tentative d'obtention d'informations supplémentaires sur ces failles de sécurité. Aucune autre information supplémentaire n'est disponible pour le moment.

A denial of service (DoS) vulnerability exists in Outlook Express that could cause the said program to fail. The malformed email should be removed before restartin...

Informations supplémentaires sur cette faille de sécurité et sa suppression.

Programmes et services concernés: Microsoft Windows NT Workstation 4.0 Service Pack 6a

Microsoft Windows NT Server 4.0 Service Pack 6a

Microsoft Windows NT Server 4.0 Terminal Server Edition Service Pack 6

Microsoft Windows 2000 Service Pack 2

Microsoft Windows 2000 Service Pack 3

Microsoft Windows 2000 Service Pack 4

Microsoft Windows XP and Microsoft Windows XP Service Pack 1

Microsoft Windows XP 64-Bit Edition Service Pack 1

Microsoft Windows XP 64-Bit Edition Version 2003

Microsoft Windows Server 2003

Microsoft Windows Server 2003 64-Bit Edition

Microsoft Windows Millennium Edition (Me)

Microsoft Outlook Express 5.5 Service Pack 2

Microsoft Outlook Express 6

Microsoft Outlook Express 6 Service Pack 1

Microsoft Outlook Express 6 Service Pack 1 (64 bit Edition)

Microsoft Outlook Express 6 on Windows Server 2003

Microsoft Outlook Express 6 on Windows Server 2003 (64 bit edition)

Microsoft Windows 98

Microsoft Windows 98 Second Edition (SE)

Programme malveillant expoitant cette faille de sécurité: inconnu

A denial of service (DoS) vulnerability exists in Outlook Express that could cause the said program to fail. The malformed email should be removed before restarting Outlook Express in order to regain its normal operation.

Informations supplémentaires sur cette faille de sécurité et sa suppression.

 

 

 

 

Vulnerability in Task Scheduler Could Allow Code Execution

 

Une erreur est survenue lors de la tentative d'obtention d'informations supplémentaires sur ces failles de sécurité. Aucune autre information supplémentaire n'est disponible pour le moment.

This vulnerability lies in an unchecked buffer within the Task Scheduler component. When exploited, it allows the attacker to execute arbitrary code on the affected mac...

Informations supplémentaires sur cette faille de sécurité et sa suppression.

Programmes et services concernés: Microsoft Windows 2000 Service Pack 2

Microsoft Windows 2000 Service Pack 3

Microsoft Windows 2000 Service Pack 4

Microsoft Windows XP

Microsoft Windows XP Service Pack 1

Microsoft Windows XP 64-Bit Edition Service Pack 1

Internet Explorer 6 when installed on Windows NT 4.0 SP6a

Programme malveillant expoitant cette faille de sécurité: inconnu

This vulnerability lies in an unchecked buffer within the Task Scheduler component. When exploited, it allows the attacker to execute arbitrary code on the affected machine with the same privileges as the currently logged on user.

Informations supplémentaires sur cette faille de sécurité et sa suppression.

 

 

 

 

Vulnerability in HTML Help Could Allow Code Execution

 

Une erreur est survenue lors de la tentative d'obtention d'informations supplémentaires sur ces failles de sécurité. Aucune autre information supplémentaire n'est disponible pour le moment.

An attacker who successfully exploits this vulnerability could gain the same privileges as that of the currently logged on user. If the user is logged in with administrative privileges, the a...

Informations supplémentaires sur cette faille de sécurité et sa suppression.

Programmes et services concernés: Microsoft Windows NT Workstation 4.0

Service Pack 6a

Microsoft Windows NT Server 4.0 Service Pack 6a

Microsoft Windows NT Server 4.0 Terminal Server Edition Service Pack 6

Microsoft Windows 2000 Service Pack 2

Microsoft Windows 2000 Service Pack 3

Microsoft Windows 2000 Service Pack 4

Microsoft Windows XP and Microsoft Windows XP Service Pack 1

Microsoft Windows XP 64-Bit Edition Service Pack 1

Microsoft Windows XP 64-Bit Edition Version 2003

Microsoft Windows Server 2003

Microsoft Windows Server 2003 64-Bit Edition

Microsoft Windows 98

Microsoft Windows 98 Second Edition (SE)

Microsoft Windows Millennium Edition (ME)

Programme malveillant expoitant cette faille de sécurité: inconnu

An attacker who successfully exploits this vulnerability could gain the same privileges as that of the currently logged on user. If the user is logged in with administrative privileges, the attacker could take complete control of the system. User accounts with fewer privileges are at less risk than users with administrative privileges.

Informations supplémentaires sur cette faille de sécurité et sa suppression.

 

 

 

 

Cumulative Security Update for Internet Explorer (867801)

 

Une erreur est survenue lors de la tentative d'obtention d'informations supplémentaires sur ces failles de sécurité. Aucune autre information supplémentaire n'est disponible pour le moment.

The Navigation Method Cross-Domain Vulnerability is a remote execution vulnerability that exists in Internet Explorer because of the way that it handles navigation methods. An attacker...

Informations supplémentaires sur cette faille de sécurité et sa suppression.

Programmes et services concernés: Microsoft Windows NT Workstation 4.0 Service Pack 6a

Microsoft Windows NT Server 4.0 Service Pack 6a

Microsoft Windows NT Server 4.0 Terminal Server Edition Service Pack 6

Microsoft Windows 2000 Service Pack 2

Microsoft Windows 2000 Service Pack 3

Microsoft Windows 2000 Service Pack 4

Microsoft Windows XP and Microsoft Windows XP Service Pack 1

Microsoft Windows XP 64-Bit Edition Service Pack 1

Microsoft Windows XP 64-Bit Edition Version 2003

Microsoft Windows Server 2003

Microsoft Windows Server 2003 64-Bit Edition

Microsoft Windows 98

Microsoft Windows 98 Second Edition (SE)

Microsoft Windows Millennium Edition (Me)

Internet Explorer 5.01 Service Pack 2

Internet Explorer 5.01 Service Pack 3

Internet Explorer 5.01 Service Pack 4

Internet Explorer 5.5 Service Pack 2

Internet Explorer 6

Internet Explorer 6 Service Pack 1

Internet Explorer 6 Service Pack 1 (64-Bit Edition)

Internet Explorer 6 for Windows Server 2003

Internet Explorer 6 for Windows Server 2003 (64-Bit Edition)

Programme malveillant expoitant cette faille de sécurité: inconnu

The Navigation Method Cross-Domain Vulnerability is a remote execution vulnerability that exists in Internet Explorer because of the way that it handles navigation methods. An attacker could exploit this vulnerability by constructing a malicious Web page that could potentially allow remote code execution if a user visits a malicious Web site.;The Malformed BMP File Buffer Overrun Vulnerability exists in the processing of BMP image file formats that could allow remote code execution on an affected system.;The Malformed GIF File Double Free Vulnerability is a buffer overrun vulnerability that exists in the processing of GIF image file formats that could allow remote code execution on an affected system.

Informations supplémentaires sur cette faille de sécurité et sa suppression.

 

 

 

 

Buffer Overrun in JPEG Processing (GDI+) Could Allow Code Execution (833987)

 

Une erreur est survenue lors de la tentative d'obtention d'informations supplémentaires sur ces failles de sécurité. Aucune autre information supplémentaire n'est disponible pour le moment.

This vulnerability lies in the way the affected components process JPEG image files. An unchecked buffer within this process is the cause of the vulnera...

Informations supplémentaires sur cette faille de sécurité et sa suppression.

Programmes et services concernés: Microsoft Windows XP and Microsoft Windows XP Service Pack 1

Microsoft Windows XP 64-Bit Edition Service Pack 1

Microsoft Windows XP 64-Bit Edition Version 2003

Microsoft Windows Server 2003

Microsoft Windows Server 2003 64-Bit Edition

Microsoft Project 2002 (All Versions)

Microsoft Project 2003 (All Versions)

Microsoft Visio 2002 (All Versions)

Microsoft Visio 2003 (All Versions)

Microsoft Office XP Service Pack 3

Microsoft Office System 2003

Visual Basic .NET Standard 2002

Visual C# .NET Standard 2002

Visual C++ .NET Standard 2002

Visual Basic .NET Standard 2003

Visual C# .NET Standard 2003

Visual C++ .NET Standard 2003

Visual J# .NET Standard 2003

Visual Studio .NET 2002

Visual Studio .NET 2003

Microsoft .NET Framework

Version 1.0 SDK

Microsoft Picture It! 2002 (All Versions)

Microsoft Greetings 2002

Microsoft Picture It! version 7.0 (All Versions)

Microsoft Digital Image Pro version 7.0

Microsoft Picture It! version 9 (All Versions

including Picture It! Library)

Digital Image Pro version 9

Digital Image Suite version 9

Microsoft Producer for Microsoft Office PowerPoint (All Versions)

Platform SDK Redistributable: GDI+

Programme malveillant expoitant cette faille de sécurité: inconnu

This vulnerability lies in the way the affected components process JPEG image files. An unchecked buffer within this process is the cause of the vulnerability.;This remote code execution vulnerability could allow a malicious user or a malware to take complete control of the affected system if the affected user is currently logged on with administrative privileges. The malicious user or malware can execute arbitrary code on the system giving them the ability to install or run programs and view or edit data with full privileges. Thus, this vulnerability can conceivably be used by a malware for replication purposes.

Informations supplémentaires sur cette faille de sécurité et sa suppression.

 

 

 

 

Vulnerability in NetDDE Could Allow Remote Code Execution (841533)

 

Une erreur est survenue lors de la tentative d'obtention d'informations supplémentaires sur ces failles de sécurité. Aucune autre information supplémentaire n'est disponible pour le moment.

An unchecked buffer exists in the NetDDE services that could allow remote code execution. An attacker who is able to successfully exploit this vulnerability is capable of gaining complete control over an affected syste...

Informations supplémentaires sur cette faille de sécurité et sa suppression.

Programmes et services concernés: Microsoft Windows NT Server 4.0 Service Pack 6a

Microsoft Windows NT Server 4.0 Terminal Server Edition Service Pack 6

Microsoft Windows 2000 Service Pack 3 and Microsoft Windows 2000 Service Pack 4

Microsoft Windows XP and Microsoft Windows XP Service Pack 1

Microsoft Windows XP 64-Bit Edition Service Pack 1

Microsoft Windows XP 64-Bit Edition Version 2003

Microsoft Windows Server 2003

Microsoft Windows Server 2003 64-Bit Edition

Microsoft Windows 98

Microsoft Windows 98 Second Edition (SE)

and Microsoft Windows Millennium Edition (ME)

Programme malveillant expoitant cette faille de sécurité: inconnu

An unchecked buffer exists in the NetDDE services that could allow remote code execution. An attacker who is able to successfully exploit this vulnerability is capable of gaining complete control over an affected system. However, the NetDDe services are not automatically executed, and so would then have to be manually started for an attacker to exploit this vulnerability. This vulnerability also allows attackers to perform a local elevation of privilege, or a remote denial of service (DoS) attack.

Informations supplémentaires sur cette faille de sécurité et sa suppression.

 

 

 

 

Security Update for Microsoft Windows (840987)

 

Une erreur est survenue lors de la tentative d'obtention d'informations supplémentaires sur ces failles de sécurité. Aucune autre information supplémentaire n'est disponible pour le moment.

This cumulative release from Microsoft covers four newly discovered vulnerabilities: Windows Management Vulnerability, Virtual DOS Machine Vulnerability...

Informations supplémentaires sur cette faille de sécurité et sa suppression.

Programmes et services concernés: Microsoft Windows NT Server 4.0 Service Pack 6a

Microsoft Windows NT Server 4.0 Terminal Server Edition Service Pack 6

Microsoft Windows 2000 Service Pack 3 and Microsoft Windows 2000 Service Pack 4

Microsoft Windows XP and Microsoft Windows XP Service Pack 1

Microsoft Windows XP 64-Bit Edition Service Pack 1

Microsoft Windows XP 64-Bit Edition Version 2003

Microsoft Windows Server 2003

Microsoft Windows Server 2003 64-Bit Edition

Microsoft Windows 98

Microsoft Windows 98 Second Edition (SE)

and Microsoft Windows Millennium Edition (ME)

Programme malveillant expoitant cette faille de sécurité: inconnu

This cumulative release from Microsoft covers four newly discovered vulnerabilities: Windows Management Vulnerability, Virtual DOS Machine Vulnerability, Graphics Rendering Engine Vulnerability, and Windows Kernel Vulnerability.

Informations supplémentaires sur cette faille de sécurité et sa suppression.

 

 

 

 

Vulnerability in Compressed (zipped) Folders Could Allow Remote Code Execution (873376)

 

Une erreur est survenue lors de la tentative d'obtention d'informations supplémentaires sur ces failles de sécurité. Aucune autre information supplémentaire n'est disponible pour le moment.

This is another privately reported vulnerability about Windows Compressed Folders. There is vulnerability on the way that Windows processes Compressed (Zipped) Folders that could lead to remote code ex...

Informations supplémentaires sur cette faille de sécurité et sa suppression.

Programmes et services concernés: Microsoft Windows XP and Microsoft Windows XP Service Pack 1

Microsoft Windows XP 64-Bit Edition Service Pack 1

Microsoft Windows XP 64-Bit Edition Version 2003

Microsoft Windows Server 2003

Microsoft Windows Server 2003 64-Bit Edition

Programme malveillant expoitant cette faille de sécurité: inconnu

This is another privately reported vulnerability about Windows Compressed Folders. There is vulnerability on the way that Windows processes Compressed (Zipped) Folders that could lead to remote code execution. Windows can not properly handle the extraction of the ZIP folder with a very long file name. Opening a specially crafted compressed file, a stack-based overflow occurs, enabling the remote user to execute arbitrary code.

Informations supplémentaires sur cette faille de sécurité et sa suppression.

 

 

 

 

Vulnerability in Windows Shell Could Allow Remote Code Execution (841356)

 

Une erreur est survenue lors de la tentative d'obtention d'informations supplémentaires sur ces failles de sécurité. Aucune autre information supplémentaire n'est disponible pour le moment.

This security bulletin focuses on the following vulnerabilities: Shell Vulnerability (CAN-2004-0214), and Program Group Converter Vulnerability (CAN-2004-0572). Shell vulnerability exists on the way Windows Shell launches applications that could en...

Informations supplémentaires sur cette faille de sécurité et sa suppression.

Programmes et services concernés: Microsoft Windows NT Server 4.0 Service Pack 6a

Microsoft Windows NT Server 4.0 Terminal Server Edition Service Pack 6

Microsoft Windows 2000 Service Pack 3 and Microsoft Windows 2000 Service Pack 4

Microsoft Windows XP and Microsoft Windows XP Service Pack 1

Microsoft Windows XP 64-Bit Edition Service Pack 1

Microsoft Windows XP 64-Bit Edition Version 2003

Microsoft Windows Server 2003

Microsoft Windows Server 2003 64-Bit Edition

Microsoft Windows 98

Microsoft Windows 98 Second Edition (SE)

and Microsoft Windows Millennium Edition (ME)

Programme malveillant expoitant cette faille de sécurité: inconnu

This security bulletin focuses on the following vulnerabilities: Shell Vulnerability (CAN-2004-0214), and Program Group Converter Vulnerability (CAN-2004-0572). Shell vulnerability exists on the way Windows Shell launches applications that could enable remote malicious user or malware to execute arbitrary code. Windows Shell function does not properly check the length of the message before copying to the allocated buffer. Program Group Converter is an application used to convert Program Manager Group files that were produced in Windows 3.1, Windows 3.11, Windows for Workgroups 3.1, and Windows for Workgroups 3.11 so that they can still be used by later operating systems. The vulnerability lies in an unchecked buffer within the Group Converter Utility.

Informations supplémentaires sur cette faille de sécurité et sa suppression.

 

 

 

 

Cumulative Security Update for Internet Explorer (834707)

 

Une erreur est survenue lors de la tentative d'obtention d'informations supplémentaires sur ces failles de sécurité. Aucune autre information supplémentaire n'est disponible pour le moment.

This is a remote code execution vulnerability that exists in the Internet Explorer. It allows remote code execution on an affected system. An attacker could exploit this vulnerability by constructing a malicious Web Pa...

Informations supplémentaires sur cette faille de sécurité et sa suppression.

Programmes et services concernés: Microsoft Windows NT Server 4.0 Service Pack 6a

Microsoft Windows 2000 Service Pack 3 and Microsoft Windows 2000 Service Pack 4

Microsoft Windows XP

Microsoft Windows XP Service Pack 1

and Microsoft Windows XP Service Pack 2

Microsoft Windows XP 64-Bit Edition Service Pack 1

Microsoft Windows XP 64-Bit Edition Version 2003

Microsoft Windows Server 2003

Microsoft Windows Server 2003 64-Bit Edition

Microsoft Windows 98

Microsoft Windows 98 Second Edition (SE)

and Microsoft Windows Millennium Edition (Me)

Internet Explorer 5.01 Service Pack 3 on Windows 2000 SP3

Internet Explorer 5.01 Service Pack 4 on Windows 2000 SP4

Internet Explorer 5.5 Service Pack 2 on Microsoft Windows Me

Internet Explorer 6 on Windows XP

Internet Explorer 6 Service Pack 1 on Microsoft Windows 2000 Service Pack 3

on Microsoft Windows 2000 Service Pack 4

on Microsoft Windows XP

or on Microsoft Windows XP Service Pack 1

Internet Explorer 6 Service Pack 1 on Microsoft Windows NT Server 4.0 Service Pack 6a

on Microsoft Windows NT Server 4.0 Terminal Service Edition Service Pack 6

on Microsoft Windows 98

on Microsoft Windows 98 SE

or on Microsoft Windows Me

Internet Explorer 6 for Windows XP Service Pack 1 (64-Bit Edition)

Internet Explorer 6 for Windows Server 2003

Internet Explorer 6 for Windows Server 2003 64-Bit Edition and Windows XP 64-Bit Edition Version 2003

Internet Explorer 6 for Windows XP Service Pack 2

Microsoft Windows NT Server 4.0 Terminal Server Edition Service Pack 6

Programme malveillant expoitant cette faille de sécurité: inconnu

This is a remote code execution vulnerability that exists in the Internet Explorer. It allows remote code execution on an affected system. An attacker could exploit this vulnerability by constructing a malicious Web Page. The said routine could allow remote code execution if a user visited a malicious Web site. An attacker who successfully exploited this vulnerability could take complete control of an affected system. However, significant user interaction is required to exploit this vulnerability.

Informations supplémentaires sur cette faille de sécurité et sa suppression.

 

 

 

 

Transfert d'informations supplémentaires sur ces failles de sécurité...

Une erreur est survenue lors de la tentative d'obtention d'informations supplémentaires sur ces failles de sécurité. Aucune autre information supplémentaire n'est disponible pour le moment.

Informations supplémentaires sur cette faille de sécurité et sa suppression.

Programmes et services concernés: inconnu

Programme malveillant expoitant cette faille de sécurité: inconnu

Informations supplémentaires sur cette faille de sécurité et sa suppression.

 

Transfert d'informations supplémentaires sur ce port...

Une erreur est survenue lors de la tentative d'obtention des informations supplémentaires sur ce port. Aucune autre information supplémentaire n'est disponible pour le moment.

Services courants sur ce port: inconnu

Programme malveillant utilisant le port de manière abusive: inconnu

 

Voilou, bonne lecture :P

 

Si tu veux un log hijackthis tu me le dis

Posté(e)

Salut !

 

Nan je pense que c'est bon

 

Quelques conseils :

 

Avant tout supprimer les outils qui nous ont servit pendant la désinfection !

HijackThis tu n'en a plus besoin sauf si tu veut le garder ! sinon lance hijackthis puis open the misc tools section/misc tools,en bas y'a l'onglet uninstal hijackthis & exit

 

Killbox tu n'en a plus besoin !

 

-Rétablir l'affichage :

Démarrer, Poste de travail ou autre dossier, Menu Outils, Options des dossiers, onglet Affichage :

Activer l'option : Ne pas afficher les fichiers et dossiers cachés

Activer l'option : Masquer les fichiers protégés du système d'exploitation

Laisser désactivé : Masquer les extensions des fichiers dont le type est connu

 

-Créer un point de restauration et supprimer les anciens !: (aide visuelle http://assiste.free.fr/p/comment/comment_a...stauration.html )

Cliquer avec le bouton droit sur l'icône Poste de travail, puis cliquer sur Propriétés.

Cliquer sur l'onglet «Restauration du système».

Sélectionner «Désactiver la Restauration du système» ou «Désactiver la Restauration du système sur tous les lecteurs»

Cliquer sur Appliquer.

Comme le dit le message, ceci supprimera tous les points de restauration existants. Pour faire cela, cliquer sur Oui.

Cliquer sur OK, redémarrer le PC. Faire l'opération inverse, et réactiver la restauration:un nouveau point sera automatiquement créé.

 

1/ La mise à jour du système :

Je te conseille vivement de mettre à jour ton système !

(Démarrer/Windows Update)

Le fait de mettre ton système à jour corrigera toutes les failles de sécurité utilisées par les virus et autres malwares !

Pour mettre en automatique faire ceci :

 

Démarrer > Exécuter et taper Services.msc puis OK

Choisir le mode "Etendu" (onglets inférieurs)

Grâce à la barre de défilement (à droite) rechercher le service suivant:

 

Mises à jour automatiques

 

Quand le service est trouvé, pointer dessus, double-cliquer (bouton gauche).

Dans la fenêtre suivante qui apparait, sous l'onglet Général cliquer sur le bouton Démarrer,

puis dérouler le Type de Démarrage pour le modifier en Automatique

Cliquer sur Appliquer puis OK

 

 

2/ L'antivirus :

Installer un antivirus plus efficace que morton tel que AVAST ou Antivir

Un antivirus est un logiciel censé protéger un micro-ordinateur contre les programmes néfastes appelés virus, vers, macrovirus, etc.

 

Les principaux antivirus du marché se fondent sur des fichiers de signatures et comparent alors la signature génétique du virus aux codes à vérifier. Certains programmes appliquent également la méthode dite heuristique tendant à découvrir un code malveillant par son comportement. Autre méthode, l'analyse de forme repose sur du filtrage basé entre des règles regexp ou autres, mises dans un fichier junk. Cette dernière méthode peut être très efficace pour les serveurs de courriels supportant les regexp type postfix puisqu'elle ne repose pas sur un fichier de signatures.

 

Lire l'article dans le prochain lien qui donne en autres toutes les informations pour trouver et télécharger un antivirus et les adresses pour scanner en lignes !

http://forum.zebulon.fr/index.php?s=&s...st&p=487252

 

 

3/ le pare-feu :

Installer un firewall autre que celui proposé par XP Choisir JETICO avec Avast et Zone Alarme pour Antivir (C'est des exemples tu peut choisir ce que tu veut ! Mais éviter l'association Avast avec Zone alarme)

En informatique, un pare-feu est un dispositif logiciel ou matériel qui filtre le flux de données sur un réseau informatique. Il est parfois appelé coupe-feu ou encore firewall.

 

-pour télécharger zone alarm:

http://telechargement.zebulon.fr/58-zonealarm-60-fr.html

-son tutorial:

http://www.zebulon.fr/articles/configurationZA_1.php

 

-pour télécharger Kério (version trial 30jours puis passe en free)

http://www.sunbelt-software.com/Kerio.cfm

-son tutorial:

http://www.vulgarisation-informatique.com/kerio.php

 

-pour télécharger JETICO ( utilisateur expérimenté conseillé ) :

http://www.trad-fr.com/Fiches/fiche_Jetico.htm

-à parcourrir

http://www.open-files.com/article0386.html

-son tutorial:

http://www.malekal.com/tutorial_JeticoFirewall.php

 

4/ Le navigateur internet :

Utiliser un navigateur sécurisé tel que FIRE FOX drapeaufirefox9px.gif

http://telechargement.zebulon.fr/license-1-100.html

 

Et le sécuriser encore plus en allant voir le lien ici:

http://forum.zebulon.fr/index.php?showtopic=69628

 

Si jamais Internet Explorer est gardé

 

Utiliser IE-SPYAD:(Ajoute plus de 5000 sites à la zone de restriction pour te protéger lorsque tu attéris sur un site douteux)

Pour Internet Explorer uniquement ! ( Une fois l'utilitaire dé-zippé dans son dossier, cliquer sur le fichier ie-ads.reg:

les modifications ne sont pas visibles mais l'effet est garanti par le message qui suit! )

http://www.spywarewarrior.com/uiuc/resource.htm

Un conseil important:

Dans Internet Explorer, il faut mieux gérer les contrôles ActiveX:

Ce qu'ils sont: http://assiste.free.fr/p/abc/a/activex_dangers.html

S'en protéger: http://assiste.free.fr/p/abc/c/anti_activex.html

 

Un conseil:

Il faudrait modifier la gestion des cookies, et ne plus accepter n'importe quoi.

Dans Firefox, Outils--->Options, Menu Vie privée, Onglet Cookies, si "Autoriser les sites à créer des cookies" est coché, cocher la case devant "pour le site Web d'origine seulement".

Dans IE, Outils--->Options internet, Onglet Confidentialité, Bouton Avancé dans le paragraphe Paramètres. Cocher "Ignorer la gestion automatique des cookies", cocher "Demander" pour les cookies internes, et cocher "Refuser" pour les Cookies tierce partie.

 

Un conseil:

Vérifié que tout votre système est à jour en allant faire un audit ici

http://secunia.com/software_inspector/

 

5/ Les systèmes de protections annexes :

 

Télécharger et installer Zeb'Protect dans son répertoire

(Programme fermant certains ports sensibles aux attaques venant d'Internet.)

http://telechargement.zebulon.fr/license-1-123.html

Un tutorial sur lutilisation de Zeb Protect est disponible ici:

http://www.zebulon.fr/articles/zebprotect.php

 

télécharger Ad-Aware SE Personal et installer dans son répertoire

(Programme faisant partie des anti-malwares )

http://telechargement.zebulon.fr/license-1-36.html

Son tuto

http://home.tiscali.be/schouppeguy/adawarese/adawase.htm

 

télécharger Spybot - Search & Destroy et installer dans son répertoire

(Programme faisant partie des anti-malwares )

http://telechargement.zebulon.fr/license-1-79.html

Pour une utilisation approfondie de ce logiciel, consulter l'article Configurer Spybot-Search & Destroy.

http://www.zebulon.fr/articles/spybot_1.php

 

6/ Le comportement :

Avoir une attitude responsable devant l'outil Internet

(Eviter les sources d'infections telle que sites XXX/warez et les logiciels de p2p)

 

7/ La maintenance :

Faire la maintenance de son Pc

-Une fois par semaine Scanner avec Ewido ou ad-aware ou Spybot et Nettoyer avec Easycleaner(sans toucher à la fonction doublon).

(En suivant les instructions données précédemment)

-Une fois par mois défragmenter les Disques Durs.

-Une fois par mois Scanner avec un antivirus en ligne.

 

8/ La prévention :

Rapporte ton infection pour faire condamner les auteurs sur Malware-Complaints. Pour faire entendre notre voix, nous devons être le plus nombreux possibles, alors rapporte ton infection :

- Voir les règles de Malware-Complaints

- Enregistre sur le forum à partir du bouton register en haut :

Si tu as plus de 13 ans, choisir : I Agree to these terms and am over or exactly 13 years of age

Si tu as moins, clic sur : I Agree to these terms and am under 13 years of age

 

Après t'être enregistré, tu as sous forme de liste les types d'infection (Look2Me, Smitfraud, SpywareQuake etc..) : http://www.malwarecomplaints.info/viewforu...e115fda8cee41a4

 

Si le malware que tu as eu n'apparaît pas dans la liste, ou si tu ne sais pas quelle infection tu as eu, créé un message dans le sujet "Autres infections" conforme au règle du forum (age, ville, département etc..) : http://www.malwarecomplaints.info/viewforum.php?f=10

 

Si tu as des questions ou des problèmes, n'hésites pas à me demander ici ou à contacter un des modérateurs du forum : Kimberly, AgnesD ou ipl_001.

 

9/ Pour finir :

Si tu pense que ton problème est résolu peut tu marquer résolu devant le titre de ton sujet ?

 

Tu va sur ton premier message ici

http://forum.zebulon.fr/index.php?s=&s...t&p=1023336

 

Tu clic sur le bouton en bas à droite Editer tu choisi Edition complète et tu pourra changer le titre

 

Au revoir et à bientôt sur zéb !!

Posté(e)

Bonjour Régis56

 

Je pense aussi que c'est bon. J'ai viré avast et remis antivir. J'ai viré sygate et j'essaie zone alarm. Voila

 

Je te remercie pour ton aide et je te souhaite une bonne continuation.

 

:P Amicalement

Rejoindre la conversation

Vous pouvez publier maintenant et vous inscrire plus tard. Si vous avez un compte, connectez-vous maintenant pour publier avec votre compte.
Remarque : votre message nécessitera l’approbation d’un modérateur avant de pouvoir être visible.

Invité
Répondre à ce sujet…

×   Collé en tant que texte enrichi.   Coller en tant que texte brut à la place

  Seulement 75 émoticônes maximum sont autorisées.

×   Votre lien a été automatiquement intégré.   Afficher plutôt comme un lien

×   Votre contenu précédent a été rétabli.   Vider l’éditeur

×   Vous ne pouvez pas directement coller des images. Envoyez-les depuis votre ordinateur ou insérez-les depuis une URL.

  • En ligne récemment   0 membre est en ligne

    • Aucun utilisateur enregistré regarde cette page.
×
×
  • Créer...