Aller au contenu
  • Pas encore inscrit ?

    Pourquoi ne pas vous inscrire ? C'est simple, rapide et gratuit.
    Pour en savoir plus, lisez Les avantages de l'inscription... et la Charte de Zébulon.
    De plus, les messages que vous postez en tant qu'invité restent invisibles tant qu'un modérateur ne les a pas validés. Inscrivez-vous, ce sera un gain de temps pour tout le monde, vous, les helpeurs et les modérateurs ! :wink:

Messages recommandés

Posté(e)

Bonjour a vous,

 

cela faisait longtemps mais je viens vers vous pour savoir si ce PC est en bonne santé, des Pop Up envahisse tout le temps ce PC qui n'est pas très rapide et donc ralentie d'autant plus ces capacités.

 

Rapport Hijackthis après pré-nétoyage :

 

Logfile of Trend Micro HijackThis v2.0.2

Scan saved at 16:14:17, on 30/11/2008

Platform: Windows XP SP2 (WinNT 5.01.2600)

MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)

Boot mode: Normal

 

Running processes:

C:\WINDOWS\System32\smss.exe

C:\WINDOWS\system32\winlogon.exe

C:\WINDOWS\system32\services.exe

C:\WINDOWS\system32\lsass.exe

C:\WINDOWS\system32\svchost.exe

C:\WINDOWS\System32\svchost.exe

C:\WINDOWS\system32\spoolsv.exe

C:\Program Files\Avira\AntiVir PersonalEdition Classic\sched.exe

C:\Program Files\Avira\AntiVir PersonalEdition Classic\avguard.exe

C:\Program Files\Fichiers communs\LogiShrd\LVCOMSER\LVComSer.exe

C:\Program Files\Fichiers communs\LogiShrd\LVMVFM\LVPrcSrv.exe

C:\WINDOWS\system32\nvsvc32.exe

C:\WINDOWS\system32\oodag.exe

C:\WINDOWS\system32\svchost.exe

C:\Program Files\Fichiers communs\BitDefender\BitDefender Communicator\xcommsvr.exe

C:\Program Files\Fichiers communs\BitDefender\BitDefender Update Service\livesrv.exe

C:\Program Files\BitDefender\BitDefender 2008\vsserv.exe

C:\WINDOWS\System32\svchost.exe

C:\WINDOWS\Explorer.EXE

C:\WINDOWS\system32\wuauclt.exe

C:\Program Files\Java\jre1.6.0_07\bin\jusched.exe

C:\windows\system\hpsysdrv.exe

C:\WINDOWS\system32\hphmon06.exe

C:\Program Files\Fichiers communs\InstallShield\UpdateService\issch.exe

C:\WINDOWS\AGRSMMSG.exe

C:\WINDOWS\ALCXMNTR.EXE

C:\WINDOWS\system32\rundll32.exe

C:\Program Files\Fichiers communs\LogiShrd\LComMgr\Communications_Helper.exe

C:\Program Files\Logitech\QuickCam\Quickcam.exe

C:\Program Files\BitDefender\BitDefender 2008\bdagent.exe

C:\Program Files\Avira\AntiVir PersonalEdition Classic\avgnt.exe

C:\WINDOWS\system32\ctfmon.exe

C:\Program Files\Windows Live\Messenger\msnmsgr.exe

C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe

C:\Program Files\Microsoft ActiveSync\wcescomm.exe

C:\Program Files\HP\Digital Imaging\bin\hpqtra08.exe

C:\Program Files\Logitech\Desktop Messenger\8876480\Program\LogitechDesktopMessenger.exe

C:\Program Files\NETGEAR\WG111v3\WG111v3.exe

C:\PROGRA~1\MI3AA1~1\rapimgr.exe

C:\WINDOWS\System32\svchost.exe

C:\WINDOWS\system32\HPZipm12.exe

C:\Program Files\Fichiers communs\Logishrd\LQCVFX\COCIManager.exe

C:\Program Files\Fichiers communs\Microsoft Shared\Windows Live\WLLoginProxy.exe

C:\Program Files\iPod\bin\iPodService.exe

c:\program files\logitech\quickcam\lu\lulnchr.exe

c:\program files\logitech\quickcam\lu\LogitechUpdate.exe

C:\Program Files\HijackThis\HijackThis.exe

 

R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://ie.redirect.hp.com/svs/rdr?TYPE=3&a...&pf=desktop

R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://ie.redirect.hp.com/svs/rdr?TYPE=3&a...&pf=desktop

R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.msn.fr/

R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Bar = http://ie.redirect.hp.com/svs/rdr?TYPE=3&a...&pf=desktop

R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://ie.redirect.hp.com/svs/rdr?TYPE=3&a...&pf=desktop

R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName = Liens

O2 - BHO: AcroIEHlprObj Class - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 7.0\ActiveX\AcroIEHelper.dll

O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre1.6.0_07\bin\ssv.dll

O2 - BHO: (no name) - {7E853D72-626A-48EC-A868-BA8D5E23E045} - (no file)

O2 - BHO: Programme d'aide de l'Assistant de connexion Windows Live - {9030D464-4C02-4ABF-8ECC-5164760863C6} - C:\Program Files\Fichiers communs\Microsoft Shared\Windows Live\WindowsLiveLogin.dll

O2 - BHO: Google Toolbar Helper - {AA58ED58-01DD-4d91-8333-CF10577473F7} - c:\program files\google\googletoolbar2.dll

O2 - BHO: Google Toolbar Notifier BHO - {AF69DE43-7D58-4638-B6FA-CE66B5AD205D} - C:\Program Files\Google\GoogleToolbarNotifier\3.1.807.1746\swg.dll

O3 - Toolbar: Vue HP - {B2847E28-5D7D-4DEB-8B67-05D28BCF79F5} - c:\Program Files\HP\Digital Imaging\bin\HPDTLK02.dll

O3 - Toolbar: &Google - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - c:\program files\google\googletoolbar2.dll

O3 - Toolbar: BitDefender Toolbar - {381FFDE8-2394-4f90-B10D-FC6124A40F8C} - C:\Program Files\BitDefender\BitDefender 2008\IEToolbar.dll

O4 - HKLM\..\Run: [sunJavaUpdateSched] "C:\Program Files\Java\jre1.6.0_07\bin\jusched.exe"

O4 - HKLM\..\Run: [hpsysdrv] c:\windows\system\hpsysdrv.exe

O4 - HKLM\..\Run: [igfxTray] C:\WINDOWS\system32\igfxtray.exe

O4 - HKLM\..\Run: [HPHUPD06] c:\Program Files\HP\{AAC4FC36-8F89-4587-8DD3-EBC57C83374D}\hphupd06.exe

O4 - HKLM\..\Run: [HPHmon06] C:\WINDOWS\system32\hphmon06.exe

O4 - HKLM\..\Run: [iSUSPM Startup] C:\PROGRA~1\FICHIE~1\INSTAL~1\UPDATE~1\ISUSPM.exe -startup

O4 - HKLM\..\Run: [iSUSScheduler] "C:\Program Files\Fichiers communs\InstallShield\UpdateService\issch.exe" -start

O4 - HKLM\..\Run: [Recguard] C:\WINDOWS\SMINST\RECGUARD.EXE

O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE C:\WINDOWS\system32\NvCpl.dll,NvStartup

O4 - HKLM\..\Run: [nwiz] nwiz.exe /installquiet /keeploaded /nodetect

O4 - HKLM\..\Run: [VTTimer] VTTimer.exe

O4 - HKLM\..\Run: [siSPower] Rundll32.exe SiSPower.dll,ModeAgent

O4 - HKLM\..\Run: [AGRSMMSG] AGRSMMSG.exe

O4 - HKLM\..\Run: [AlcxMonitor] ALCXMNTR.EXE

O4 - HKLM\..\Run: [LSBWatcher] c:\hp\drivers\hplsbwatcher\lsburnwatcher.exe

O4 - HKLM\..\Run: [bm] "C:\Program Files\Fichiers communs\WinSecureAv\bm.exe" dm=http://winsecureav.com ad=http://winsecureav.com sd=http://ykeeper.winsecureav.com

O4 - HKLM\..\Run: [ptask] C:\Program Files\WinSecureAv\ptask.exe

O4 - HKLM\..\Run: [REGSHAVE] C:\Program Files\REGSHAVE\REGSHAVE.EXE /AUTORUN

O4 - HKLM\..\Run: [RavAV] C:\WINDOWS\RavMonE.exe

O4 - HKLM\..\Run: [LogitechCommunicationsManager] "C:\Program Files\Fichiers communs\LogiShrd\LComMgr\Communications_Helper.exe"

O4 - HKLM\..\Run: [LogitechQuickCamRibbon] "C:\Program Files\Logitech\QuickCam\Quickcam.exe" /hide

O4 - HKLM\..\Run: [bitDefender Antiphishing Helper] "C:\Program Files\BitDefender\BitDefender 2008\IEShow.exe"

O4 - HKLM\..\Run: [bDAgent] "C:\Program Files\BitDefender\BitDefender 2008\bdagent.exe"

O4 - HKLM\..\Run: [OODefragTray] C:\WINDOWS\system32\oodtray.exe

O4 - HKLM\..\Run: [avgnt] "C:\Program Files\Avira\AntiVir PersonalEdition Classic\avgnt.exe" /min

O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe

O4 - HKCU\..\Run: [MsnMsgr] "C:\Program Files\Windows Live\Messenger\msnmsgr.exe" /background

O4 - HKCU\..\Run: [WinSpywareProtect] "C:\Documents and Settings\All Users\Application Data\ADSL Software Ltd\WinSpywareProtect\winspywareprotect.exe" /autorun

O4 - HKCU\..\Run: [ieosyqs] "c:\documents and settings\hp_propriétaire\local settings\application data\ieosyqs.exe" ieosyqs

O4 - HKCU\..\Run: [swg] C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe

O4 - HKCU\..\Run: [H/PC Connection Agent] "C:\Program Files\Microsoft ActiveSync\wcescomm.exe"

O4 - HKLM\..\Policies\Explorer\Run: [some] C:\Program Files\NetProject\scit.exe

O4 - HKUS\S-1-5-19\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'SERVICE LOCAL')

O4 - HKUS\S-1-5-20\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'SERVICE RÉSEAU')

O4 - HKUS\S-1-5-18\..\RunOnce: [WUAppSetup] C:\Program Files\Fichiers communs\logishrd\WUApp32.exe -v 0x046d -p 0x08da -f video -m logitech -d 11.5.0.1145 (User 'SYSTEM')

O4 - HKUS\.DEFAULT\..\RunOnce: [WUAppSetup] C:\Program Files\Fichiers communs\logishrd\WUApp32.exe -v 0x046d -p 0x08da -f video -m logitech -d 11.5.0.1145 (User 'Default user')

O4 - Global Startup: HP Digital Imaging Monitor.lnk = C:\Program Files\HP\Digital Imaging\bin\hpqtra08.exe

O4 - Global Startup: Lancement rapide d'Adobe Reader.lnk = C:\Program Files\Adobe\Acrobat 7.0\Reader\reader_sl.exe

O4 - Global Startup: Logitech Desktop Messenger.lnk = C:\Program Files\Logitech\Desktop Messenger\8876480\Program\LogitechDesktopMessenger.exe

O4 - Global Startup: NETGEAR WG111v3 Smart Wizard.lnk = C:\Program Files\NETGEAR\WG111v3\WG111v3.exe

O8 - Extra context menu item: E&xporter vers Microsoft Excel - res://C:\PROGRA~1\MICROS~4\Office12\EXCEL.EXE/3000

O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_07\bin\ssv.dll

O9 - Extra 'Tools' menuitem: Console Java (Sun) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_07\bin\ssv.dll

O9 - Extra button: Create Mobile Favorite - {2EAF5BB1-070F-11D3-9307-00C04FAE2D4F} - C:\PROGRA~1\MI3AA1~1\INetRepl.dll

O9 - Extra button: (no name) - {2EAF5BB2-070F-11D3-9307-00C04FAE2D4F} - C:\PROGRA~1\MI3AA1~1\INetRepl.dll

O9 - Extra 'Tools' menuitem: Créer un Favori de l'appareil mobile... - {2EAF5BB2-070F-11D3-9307-00C04FAE2D4F} - C:\PROGRA~1\MI3AA1~1\INetRepl.dll

O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~4\Office12\REFIEBAR.DLL

O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe

O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe

O16 - DPF: {304171C0-65EA-4B51-B5D9-93A311E26EB1} (MxPEG_ActiveX Control) - http://www.lessablesdolonne.com/webcam/MxPEG_ActiveX.cab

O16 - DPF: {7FC1B346-83E6-4774-8D20-1A6B09B0E737} (Windows Live Photo Upload Control) - http://cid-44ed0404cd5dd804.spaces.live.co...ad/MsnPUpld.cab

O17 - HKLM\System\CS1\Services\Tcpip\Parameters: NameServer = 85.255.115.70 85.255.112.189

O17 - HKLM\System\CCS\Services\Tcpip\Parameters: NameServer = 85.255.115.70 85.255.112.189

O18 - Protocol: bwfile-8876480 - {9462A756-7B47-47BC-8C80-C34B9B80B32B} - C:\Program Files\Logitech\Desktop Messenger\8876480\Program\GAPlugProtocol-8876480.dll

O20 - Winlogon Notify: awtqonNg - awtqonNg.dll (file missing)

O23 - Service: Avira AntiVir Personal - Free Antivirus Scheduler (AntiVirScheduler) - Avira GmbH - C:\Program Files\Avira\AntiVir PersonalEdition Classic\sched.exe

O23 - Service: Avira AntiVir Personal - Free Antivirus Guard (AntiVirService) - Avira GmbH - C:\Program Files\Avira\AntiVir PersonalEdition Classic\avguard.exe

O23 - Service: Google Updater Service (gusvc) - Google - C:\Program Files\Google\Common\Google Updater\GoogleUpdaterService.exe

O23 - Service: iPod Service (iPodService) - Apple Computer, Inc. - C:\Program Files\iPod\bin\iPodService.exe

O23 - Service: BitDefender Desktop Update Service (LIVESRV) - BitDefender SRL - C:\Program Files\Fichiers communs\BitDefender\BitDefender Update Service\livesrv.exe

O23 - Service: LVCOMSer - Logitech Inc. - C:\Program Files\Fichiers communs\LogiShrd\LVCOMSER\LVComSer.exe

O23 - Service: Process Monitor (LVPrcSrv) - Logitech Inc. - C:\Program Files\Fichiers communs\LogiShrd\LVMVFM\LVPrcSrv.exe

O23 - Service: NVIDIA Display Driver Service (NVSvc) - NVIDIA Corporation - C:\WINDOWS\system32\nvsvc32.exe

O23 - Service: O&O Defrag - O&O Software GmbH - C:\WINDOWS\system32\oodag.exe

O23 - Service: Pml Driver HPZ12 - HP - C:\WINDOWS\system32\HPZipm12.exe

O23 - Service: BitDefender Virus Shield (VSSERV) - BitDefender S.R.L. - C:\Program Files\BitDefender\BitDefender 2008\vsserv.exe

O23 - Service: BitDefender Communicator (XCOMM) - BitDefender - C:\Program Files\Fichiers communs\BitDefender\BitDefender Communicator\xcommsvr.exe

 

--

End of file - 11581 bytes

 

 

 

merci d'avance. :P

Posté(e)

Bonjour, la machine est très infectée.

 

  • Télécharge SmitFraudFix de S!Ri sur le bureau :
    http://siri.urz.free.fr/Fix/SmitfraudFix.exe
  • Note: si tu as une version de SmitfraudFix, ne l'utilise pas, élimine là et télécharge la dernière version.
  • Double-clique sur smitfraudfix.exe
  • Choisis l'option 1 pour créer un rapport des fichiers responsables de l'infection.
  • Poste le rapport sur le forum dans ta prochaine réponse. (si tu ne le trouves pas, il est dans "C:\rapport.txt")

 

Si un virus est détecté par ton antivirus ou un autre logiciel (genre riskTool.win32.reboot), n'en tiens pas compte (choisis d'ignorer) et ne bloque pas le fichier, il faut partie de l'outil et des antivirus qui y voient un danger potentiel.

Posté(e)
Bonjour, la machine est très infectée.

 

  • Télécharge SmitFraudFix de S!Ri sur le bureau :
    http://siri.urz.free.fr/Fix/SmitfraudFix.exe
  • Note: si tu as une version de SmitfraudFix, ne l'utilise pas, élimine là et télécharge la dernière version.
  • Double-clique sur smitfraudfix.exe
  • Choisis l'option 1 pour créer un rapport des fichiers responsables de l'infection.
  • Poste le rapport sur le forum dans ta prochaine réponse. (si tu ne le trouves pas, il est dans "C:\rapport.txt")

 

Si un virus est détecté par ton antivirus ou un autre logiciel (genre riskTool.win32.reboot), n'en tiens pas compte (choisis d'ignorer) et ne bloque pas le fichier, il faut partie de l'outil et des antivirus qui y voient un danger potentiel.

 

Infectés je m'en doutais

 

Voila le résultat que tu m'as demandé

 

 

 

SmitFraudFix v2.379

 

Rapport fait à 16:55:22,96, 30/11/2008

Executé à partir de G:\Logiciel\SmitfraudFix

OS: Microsoft Windows XP [version 5.1.2600] - Windows_NT

Le type du système de fichiers est NTFS

Fix executé en mode normal

 

»»»»»»»»»»»»»»»»»»»»»»»» Process

 

C:\WINDOWS\System32\smss.exe

C:\WINDOWS\system32\winlogon.exe

C:\WINDOWS\system32\services.exe

C:\WINDOWS\system32\lsass.exe

C:\WINDOWS\system32\svchost.exe

C:\WINDOWS\System32\svchost.exe

C:\WINDOWS\system32\spoolsv.exe

C:\Program Files\Fichiers communs\LogiShrd\LVCOMSER\LVComSer.exe

C:\Program Files\Fichiers communs\LogiShrd\LVMVFM\LVPrcSrv.exe

C:\WINDOWS\system32\nvsvc32.exe

C:\WINDOWS\system32\oodag.exe

C:\WINDOWS\system32\svchost.exe

C:\Program Files\Fichiers communs\BitDefender\BitDefender Communicator\xcommsvr.exe

C:\Program Files\Fichiers communs\BitDefender\BitDefender Update Service\livesrv.exe

C:\Program Files\BitDefender\BitDefender 2008\vsserv.exe

C:\WINDOWS\System32\svchost.exe

C:\WINDOWS\Explorer.EXE

C:\Program Files\Java\jre1.6.0_07\bin\jusched.exe

C:\windows\system\hpsysdrv.exe

C:\WINDOWS\system32\hphmon06.exe

C:\Program Files\Fichiers communs\InstallShield\UpdateService\issch.exe

C:\WINDOWS\AGRSMMSG.exe

C:\WINDOWS\ALCXMNTR.EXE

C:\WINDOWS\system32\rundll32.exe

C:\Program Files\Fichiers communs\LogiShrd\LComMgr\Communications_Helper.exe

C:\Program Files\Logitech\QuickCam\Quickcam.exe

C:\Program Files\BitDefender\BitDefender 2008\bdagent.exe

C:\WINDOWS\system32\ctfmon.exe

C:\Program Files\Windows Live\Messenger\msnmsgr.exe

C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe

C:\Program Files\Microsoft ActiveSync\wcescomm.exe

C:\documents and settings\hp_propriétaire\local settings\application data\oysgw.exe

C:\Program Files\HP\Digital Imaging\bin\hpqtra08.exe

C:\Program Files\Logitech\Desktop Messenger\8876480\Program\LogitechDesktopMessenger.exe

C:\Program Files\NETGEAR\WG111v3\WG111v3.exe

C:\PROGRA~1\MI3AA1~1\rapimgr.exe

C:\WINDOWS\System32\svchost.exe

C:\WINDOWS\system32\HPZipm12.exe

C:\Program Files\Fichiers communs\Logishrd\LQCVFX\COCIManager.exe

C:\Program Files\iPod\bin\iPodService.exe

c:\program files\logitech\quickcam\lu\lulnchr.exe

c:\program files\logitech\quickcam\lu\LogitechUpdate.exe

C:\Program Files\Internet Explorer\iexplore.exe

C:\Program Files\Fichiers communs\Microsoft Shared\Windows Live\WLLoginProxy.exe

G:\Logiciel\SmitfraudFix\Policies.exe

C:\WINDOWS\system32\cmd.exe

 

»»»»»»»»»»»»»»»»»»»»»»»» hosts

 

 

»»»»»»»»»»»»»»»»»»»»»»»» C:\

 

 

»»»»»»»»»»»»»»»»»»»»»»»» C:\WINDOWS

 

 

»»»»»»»»»»»»»»»»»»»»»»»» C:\WINDOWS\system

 

 

»»»»»»»»»»»»»»»»»»»»»»»» C:\WINDOWS\Web

 

 

»»»»»»»»»»»»»»»»»»»»»»»» C:\WINDOWS\system32

 

 

»»»»»»»»»»»»»»»»»»»»»»»» C:\WINDOWS\system32\LogFiles

 

 

»»»»»»»»»»»»»»»»»»»»»»»» C:\Documents and Settings\HP_Propri‚taire

 

 

»»»»»»»»»»»»»»»»»»»»»»»» C:\DOCUME~1\HP_PRO~1\LOCALS~1\Temp

 

 

»»»»»»»»»»»»»»»»»»»»»»»» C:\Documents and Settings\HP_Propri‚taire\Application Data

 

 

»»»»»»»»»»»»»»»»»»»»»»»» Menu Démarrer

 

 

»»»»»»»»»»»»»»»»»»»»»»»» C:\DOCUME~1\HP_PRO~1\Favoris

 

C:\DOCUME~1\HP_PRO~1\Favoris\Online Security Test.url PRESENT !

 

»»»»»»»»»»»»»»»»»»»»»»»» Bureau

 

 

»»»»»»»»»»»»»»»»»»»»»»»» C:\Program Files

 

C:\Program Files\Video Add-on\ PRESENT !

 

»»»»»»»»»»»»»»»»»»»»»»»» Clés corrompues

 

 

»»»»»»»»»»»»»»»»»»»»»»»» Eléments du bureau

 

[HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Desktop\Components\0]

"Source"="About:Home"

"SubscribedURL"="About:Home"

"FriendlyName"="Ma page d'accueil"

 

 

»»»»»»»»»»»»»»»»»»»»»»»» o4Patch

!!!Attention, les clés qui suivent ne sont pas forcément infectées!!!

 

o4Patch

Credits: Malware Analysis & Diagnostic

Code: S!Ri

 

 

 

»»»»»»»»»»»»»»»»»»»»»»»» IEDFix

!!!Attention, les clés qui suivent ne sont pas forcément infectées!!!

 

IEDFix

Credits: Malware Analysis & Diagnostic

Code: S!Ri

 

 

 

»»»»»»»»»»»»»»»»»»»»»»»» VACFix

!!!Attention, les clés qui suivent ne sont pas forcément infectées!!!

 

VACFix

Credits: Malware Analysis & Diagnostic

Code: S!Ri

 

 

»»»»»»»»»»»»»»»»»»»»»»»» 404Fix

!!!Attention, les clés qui suivent ne sont pas forcément infectées!!!

 

404Fix

Credits: Malware Analysis & Diagnostic

Code: S!Ri

 

 

»»»»»»»»»»»»»»»»»»»»»»»» Sharedtaskscheduler

!!!Attention, les clés qui suivent ne sont pas forcément infectées!!!

 

SrchSTS.exe by S!Ri

Search SharedTaskScheduler's .dll

 

 

»»»»»»»»»»»»»»»»»»»»»»»» AppInit_DLLs

!!!Attention, les clés qui suivent ne sont pas forcément infectées!!!

 

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows]

"AppInit_DLLs"=""

 

 

»»»»»»»»»»»»»»»»»»»»»»»» Winlogon

!!!Attention, les clés qui suivent ne sont pas forcément infectées!!!

 

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon]

"Userinit"="C:\\WINDOWS\\system32\\userinit.exe,"

"System"="kdgil.exe"

 

kdgil.exe détecté !

 

 

»»»»»»»»»»»»»»»»»»»»»»»» RK

 

 

 

»»»»»»»»»»»»»»»»»»»»»»»» DNS

 

Description: NETGEAR WG111v3 54Mbps Wireless USB 2.0 Adapter - Miniport d'ordonnancement de paquets

DNS Server Search Order: 192.168.1.1

 

HKLM\SYSTEM\CCS\Services\Tcpip\..\{73FFDD76-B4E0-4629-A3C7-95732BB63E07}: DhcpNameServer=192.168.1.1

HKLM\SYSTEM\CS1\Services\Tcpip\..\{73FFDD76-B4E0-4629-A3C7-95732BB63E07}: DhcpNameServer=192.168.1.1

HKLM\SYSTEM\CS3\Services\Tcpip\..\{73FFDD76-B4E0-4629-A3C7-95732BB63E07}: DhcpNameServer=192.168.1.1

HKLM\SYSTEM\CCS\Services\Tcpip\Parameters: DhcpNameServer=192.168.1.1

HKLM\SYSTEM\CCS\Services\Tcpip\Parameters: NameServer=85.255.115.70 85.255.112.189

HKLM\SYSTEM\CS1\Services\Tcpip\Parameters: DhcpNameServer=192.168.1.1

HKLM\SYSTEM\CS1\Services\Tcpip\Parameters: NameServer=85.255.115.70 85.255.112.189

HKLM\SYSTEM\CS3\Services\Tcpip\Parameters: DhcpNameServer=192.168.1.1

HKLM\SYSTEM\CS3\Services\Tcpip\Parameters: NameServer=85.255.115.70 85.255.112.189

 

 

»»»»»»»»»»»»»»»»»»»»»»»» Recherche infection wininet.dll

 

 

»»»»»»»»»»»»»»»»»»»»»»»» Fin

Posté(e)

  • Double-clique sur smitfraudfix.exe
  • Choisis l'option 2 pour créer un rapport des fichiers responsables de l'infection.
  • Aux questions posées par le programme répondre O (oui) pour effectuer les nettoyages et désinfections proposées.
  • Le fond d'écran peut être supprimé.
     
  • Poste le rapport sur le forum dans ta prochaine réponse.

Posté(e)
  • Double-clique sur smitfraudfix.exe
  • Choisis l'option 2 pour créer un rapport des fichiers responsables de l'infection.
  • Aux questions posées par le programme répondre O (oui) pour effectuer les nettoyages et désinfections proposées.
  • Le fond d'écran peut être supprimé.
     
  • Poste le rapport sur le forum dans ta prochaine réponse.

 

Voila ce que tu me demande

 

SmitFraudFix v2.379

 

Rapport fait à 17:07:11,54, 30/11/2008

Executé à partir de G:\Logiciel\SmitfraudFix

OS: Microsoft Windows XP [version 5.1.2600] - Windows_NT

Le type du système de fichiers est NTFS

Fix executé en mode normal

 

»»»»»»»»»»»»»»»»»»»»»»»» SharedTaskScheduler Avant SmitFraudFix

!!!Attention, les clés qui suivent ne sont pas forcément infectées!!!

 

SrchSTS.exe by S!Ri

Search SharedTaskScheduler's .dll

 

»»»»»»»»»»»»»»»»»»»»»»»» Arret des processus

 

 

»»»»»»»»»»»»»»»»»»»»»»»» hosts

 

 

127.0.0.1 localhost

127.0.0.1 update.bitdefender.com127.0.0.1 update.bitdefender.com127.0.0.1 update.bitdefender.com127.0.0.1 update.bitdefender.com127.0.0.1 update.bitdefender.com

 

»»»»»»»»»»»»»»»»»»»»»»»» VACFix

 

VACFix

Credits: Malware Analysis & Diagnostic

Code: S!Ri

 

 

»»»»»»»»»»»»»»»»»»»»»»»» Winsock2 Fix

 

S!Ri's WS2Fix: LSP not Found.

 

 

»»»»»»»»»»»»»»»»»»»»»»»» Generic Renos Fix

 

GenericRenosFix by S!Ri

 

 

»»»»»»»»»»»»»»»»»»»»»»»» Suppression des fichiers infectés

 

C:\DOCUME~1\HP_PRO~1\Favoris\Online Security Test.url supprimé

C:\Program Files\Video Add-on\ supprimé

 

»»»»»»»»»»»»»»»»»»»»»»»» IEDFix

 

IEDFix

Credits: Malware Analysis & Diagnostic

Code: S!Ri

 

 

 

»»»»»»»»»»»»»»»»»»»»»»»» 404Fix

 

404Fix

Credits: Malware Analysis & Diagnostic

Code: S!Ri

 

 

»»»»»»»»»»»»»»»»»»»»»»»» RK

 

 

»»»»»»»»»»»»»»»»»»»»»»»» DNS

 

Description: NETGEAR WG111v3 54Mbps Wireless USB 2.0 Adapter - Miniport d'ordonnancement de paquets

DNS Server Search Order: 192.168.1.1

 

HKLM\SYSTEM\CCS\Services\Tcpip\..\{73FFDD76-B4E0-4629-A3C7-95732BB63E07}: DhcpNameServer=192.168.1.1

HKLM\SYSTEM\CS1\Services\Tcpip\..\{73FFDD76-B4E0-4629-A3C7-95732BB63E07}: DhcpNameServer=192.168.1.1

HKLM\SYSTEM\CS3\Services\Tcpip\..\{73FFDD76-B4E0-4629-A3C7-95732BB63E07}: DhcpNameServer=192.168.1.1

HKLM\SYSTEM\CCS\Services\Tcpip\Parameters: DhcpNameServer=192.168.1.1

HKLM\SYSTEM\CCS\Services\Tcpip\Parameters: NameServer=85.255.115.70 85.255.112.189

HKLM\SYSTEM\CS1\Services\Tcpip\Parameters: DhcpNameServer=192.168.1.1

HKLM\SYSTEM\CS1\Services\Tcpip\Parameters: NameServer=85.255.115.70 85.255.112.189

HKLM\SYSTEM\CS3\Services\Tcpip\Parameters: DhcpNameServer=192.168.1.1

HKLM\SYSTEM\CS3\Services\Tcpip\Parameters: NameServer=85.255.115.70 85.255.112.189

 

 

»»»»»»»»»»»»»»»»»»»»»»»» Suppression Fichiers Temporaires

 

 

»»»»»»»»»»»»»»»»»»»»»»»» Winlogon.System

!!!Attention, les clés qui suivent ne sont pas forcément infectées!!!

 

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon]

"System"="kdgil.exe"

 

»»»»»»»»»»»»»»»»»»»»»»»» Nettoyage du registre

 

Nettoyage terminé.

 

»»»»»»»»»»»»»»»»»»»»»»»» SharedTaskScheduler Après SmitFraudFix

!!!Attention, les clés qui suivent ne sont pas forcément infectées!!!

 

SrchSTS.exe by S!Ri

Search SharedTaskScheduler's .dll

 

 

»»»»»»»»»»»»»»»»»»»»»»»» Reboot

 

C:\WINDOWS\system32\kdgil.exe non trouvé

 

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon]

"System"=""

 

 

»»»»»»»»»»»»»»»»»»»»»»»» Fin

Posté(e)

Télécharge Malwarebytes' Anti-Malware (MBAM)

 

  • Double clique sur le fichier téléchargé pour lancer le processus d'installation.
  • Dans l'onglet "Mise à jour", clique sur le bouton "Recherche de mise à jour": si le pare-feu demande l'autorisation à MBAM de se connecter, accepte.
  • Une fois la mise à jour terminée, rends-toi dans l'onglet "Recherche".
  • Sélectionne "Exécuter un examen rapide"
  • Clique sur "Rechercher"
  • L'analyse démarre, le scan est relativement long, c'est normal.
  • A la fin de l'analyse, un message s'affiche :
    L'examen s'est terminé normalement. Clique sur 'Afficher les résultats' pour afficher tous les objets trouvés.
    Clique sur "Ok" pour poursuivre. Si MBAM n'a rien trouvé, il te le dira aussi.
  • Ferme tes navigateurs.
  • Si des malwares ont été détectés, clique sur Afficher les résultats.
    Sélectionne tout (ou laisse coché) et clique sur Supprimer la sélection, MBAM va détruire les fichiers et clés de registre et en mettre une copie dans la quarantaine.
  • MBAM va ouvrir le Bloc-notes et y copier le rapport d'analyse. Copie-colle ce rapport et poste-le dans ta prochaine réponse.

 

NB : Si MBAM te demande à redémarrer, fais-le.

Posté(e)
Télécharge Malwarebytes' Anti-Malware (MBAM)

 

  • Double clique sur le fichier téléchargé pour lancer le processus d'installation.
  • Dans l'onglet "Mise à jour", clique sur le bouton "Recherche de mise à jour": si le pare-feu demande l'autorisation à MBAM de se connecter, accepte.
  • Une fois la mise à jour terminée, rends-toi dans l'onglet "Recherche".
  • Sélectionne "Exécuter un examen rapide"
  • Clique sur "Rechercher"
  • L'analyse démarre, le scan est relativement long, c'est normal.
  • A la fin de l'analyse, un message s'affiche :
     
    Clique sur "Ok" pour poursuivre. Si MBAM n'a rien trouvé, il te le dira aussi.
  • Ferme tes navigateurs.
  • Si des malwares ont été détectés, clique sur Afficher les résultats.
    Sélectionne tout (ou laisse coché) et clique sur Supprimer la sélection, MBAM va détruire les fichiers et clés de registre et en mettre une copie dans la quarantaine.
  • MBAM va ouvrir le Bloc-notes et y copier le rapport d'analyse. Copie-colle ce rapport et poste-le dans ta prochaine réponse.

 

NB : Si MBAM te demande à redémarrer, fais-le.

 

 

Voila la suite de ta demande ( nb je relance le pc).

 

 

Malwarebytes' Anti-Malware 1.30

Version de la base de données: 1437

Windows 5.1.2600 Service Pack 2

 

30/11/2008 17:39:06

mbam-log-2008-11-30 (17-39-06).txt

 

Type de recherche: Examen rapide

Eléments examinés: 60073

Temps écoulé: 6 minute(s), 33 second(s)

 

Processus mémoire infecté(s): 0

Module(s) mémoire infecté(s): 0

Clé(s) du Registre infectée(s): 129

Valeur(s) du Registre infectée(s): 7

Elément(s) de données du Registre infecté(s): 3

Dossier(s) infecté(s): 45

Fichier(s) infecté(s): 321

 

Processus mémoire infecté(s):

(Aucun élément nuisible détecté)

 

Module(s) mémoire infecté(s):

(Aucun élément nuisible détecté)

 

Clé(s) du Registre infectée(s):

HKEY_CLASSES_ROOT\ask.enginelistener (Rogue.AntiSpyKit) -> Quarantined and deleted successfully.

HKEY_CLASSES_ROOT\ask.enginelistener.1 (Rogue.AntiSpyKit) -> Quarantined and deleted successfully.

HKEY_CLASSES_ROOT\ask.scanner (Rogue.AntiSpyKit) -> Quarantined and deleted successfully.

HKEY_CLASSES_ROOT\ask.scanner.1 (Rogue.AntiSpyKit) -> Quarantined and deleted successfully.

HKEY_CLASSES_ROOT\ask.threatcollection (Rogue.AntiSpyKit) -> Quarantined and deleted successfully.

HKEY_CLASSES_ROOT\ask.threatcollection.1 (Rogue.AntiSpyKit) -> Quarantined and deleted successfully.

HKEY_CLASSES_ROOT\coresrv.coreservices (Adware.Zango) -> Quarantined and deleted successfully.

HKEY_CLASSES_ROOT\coresrv.coreservices.1 (Adware.Zango) -> Quarantined and deleted successfully.

HKEY_CLASSES_ROOT\coresrv.lfgax (Adware.Zango) -> Quarantined and deleted successfully.

HKEY_CLASSES_ROOT\coresrv.lfgax.1 (Adware.Zango) -> Quarantined and deleted successfully.

HKEY_CLASSES_ROOT\hbmain.commband (Adware.Zango) -> Quarantined and deleted successfully.

HKEY_CLASSES_ROOT\hbmain.commband.1 (Adware.Zango) -> Quarantined and deleted successfully.

HKEY_CLASSES_ROOT\hbr.hbmain (Adware.Zango) -> Quarantined and deleted successfully.

HKEY_CLASSES_ROOT\hbr.hbmain.1 (Adware.Zango) -> Quarantined and deleted successfully.

HKEY_CLASSES_ROOT\hostie.bho (Adware.Zango) -> Quarantined and deleted successfully.

HKEY_CLASSES_ROOT\hostie.bho.1 (Adware.Zango) -> Quarantined and deleted successfully.

HKEY_CLASSES_ROOT\hostol.mailanim (Adware.Zango) -> Quarantined and deleted successfully.

HKEY_CLASSES_ROOT\hostol.mailanim.1 (Adware.Zango) -> Quarantined and deleted successfully.

HKEY_CLASSES_ROOT\hostol.webmailsend (Adware.Zango) -> Quarantined and deleted successfully.

HKEY_CLASSES_ROOT\hostol.webmailsend.1 (Adware.Zango) -> Quarantined and deleted successfully.

HKEY_CLASSES_ROOT\instie.hbinstobj (Adware.Zango) -> Quarantined and deleted successfully.

HKEY_CLASSES_ROOT\instie.hbinstobj.1 (Adware.Zango) -> Quarantined and deleted successfully.

HKEY_CLASSES_ROOT\seekmo.desktopflash (Adware.Seekmo) -> Quarantined and deleted successfully.

HKEY_CLASSES_ROOT\seekmo.desktopflash.1 (Adware.Seekmo) -> Quarantined and deleted successfully.

HKEY_CLASSES_ROOT\seekmoax.clientdetector (Adware.Seekmo) -> Quarantined and deleted successfully.

HKEY_CLASSES_ROOT\seekmoax.clientdetector.1 (Adware.Seekmo) -> Quarantined and deleted successfully.

HKEY_CLASSES_ROOT\seekmoax.userprofiles (Adware.Seekmo) -> Quarantined and deleted successfully.

HKEY_CLASSES_ROOT\seekmoax.userprofiles.1 (Adware.Seekmo) -> Quarantined and deleted successfully.

HKEY_CLASSES_ROOT\srv.coreservices (Adware.Zango) -> Quarantined and deleted successfully.

HKEY_CLASSES_ROOT\srv.coreservices.1 (Adware.Zango) -> Quarantined and deleted successfully.

HKEY_CLASSES_ROOT\toolbar.htmlmenuui (Adware.Zango) -> Quarantined and deleted successfully.

HKEY_CLASSES_ROOT\toolbar.htmlmenuui.1 (Adware.Zango) -> Quarantined and deleted successfully.

HKEY_CLASSES_ROOT\toolbar.toolbarctl (Adware.Zango) -> Quarantined and deleted successfully.

HKEY_CLASSES_ROOT\toolbar.toolbarctl.1 (Adware.Zango) -> Quarantined and deleted successfully.

HKEY_CLASSES_ROOT\Interface\{00b77587-be1b-4201-b8e9-09fcf50ab771} (Adware.Zango) -> Quarantined and deleted successfully.

HKEY_CLASSES_ROOT\Interface\{016998bb-c153-4bc9-8ea0-d8ebab843641} (Rogue.AntiSpyKit) -> Quarantined and deleted successfully.

HKEY_CLASSES_ROOT\Interface\{067c6a37-72ea-4437-863a-5be20c246f3c} (Adware.Seekmo) -> Quarantined and deleted successfully.

HKEY_CLASSES_ROOT\Interface\{1230cf51-6bc4-4a23-b3f1-c7cf0afed619} (Adware.Zango) -> Quarantined and deleted successfully.

HKEY_CLASSES_ROOT\Interface\{1a2af056-1fe1-47ca-993d-5d09d18e674e} (Adware.Seekmo) -> Quarantined and deleted successfully.

HKEY_CLASSES_ROOT\Interface\{1d33825d-31d6-4064-920c-af1a11acf5d9} (Rogue.AntiSpyKit) -> Quarantined and deleted successfully.

HKEY_CLASSES_ROOT\Interface\{1d436319-1b6f-4116-a2ae-479b5e5f58f7} (Rogue.AntiSpyKit) -> Quarantined and deleted successfully.

HKEY_CLASSES_ROOT\Interface\{23202b12-d1f9-41ef-b684-e0e0c025c5e4} (Rogue.AntiSpyKit) -> Quarantined and deleted successfully.

HKEY_CLASSES_ROOT\Interface\{2b81f920-6660-4f76-93bf-b1c67bf5d1a0} (Adware.Zango) -> Quarantined and deleted successfully.

HKEY_CLASSES_ROOT\Interface\{2e623b96-b166-4c70-8169-820761794299} (Adware.Zango) -> Quarantined and deleted successfully.

HKEY_CLASSES_ROOT\Interface\{34e29700-0d13-46aa-b9a5-ace68e21a091} (Adware.Zango) -> Quarantined and deleted successfully.

HKEY_CLASSES_ROOT\Interface\{3661af2d-c27b-499c-9bcf-66c8502a3806} (Adware.Zango) -> Quarantined and deleted successfully.

HKEY_CLASSES_ROOT\Interface\{3c8d07ad-db5c-444b-984e-6b619e3f90e0} (Rogue.AntiSpyKit) -> Quarantined and deleted successfully.

HKEY_CLASSES_ROOT\Interface\{3f0915b8-b238-4c2d-ad1e-60db1e14d27a} (Adware.Zango) -> Quarantined and deleted successfully.

HKEY_CLASSES_ROOT\Interface\{49155dae-c471-40fa-98ee-b2b3cad115ce} (Adware.Zango) -> Quarantined and deleted successfully.

HKEY_CLASSES_ROOT\Interface\{4d783385-0dda-4188-a529-c97dc3d67cbd} (Adware.Zango) -> Quarantined and deleted successfully.

HKEY_CLASSES_ROOT\Interface\{4e8b851b-05b0-4baf-b24d-d0dfe88dded3} (Adware.Zango) -> Quarantined and deleted successfully.

HKEY_CLASSES_ROOT\Interface\{50c3e2b3-4fd7-4cb9-91f9-641a6e6b3689} (Adware.Zango) -> Quarantined and deleted successfully.

HKEY_CLASSES_ROOT\Interface\{5a4737a8-b92a-4e54-970e-c2891d98ce3f} (Adware.Zango) -> Quarantined and deleted successfully.

HKEY_CLASSES_ROOT\Interface\{62b0b239-f9ac-4a5b-bfae-62c7a23f7627} (Adware.Zango) -> Quarantined and deleted successfully.

HKEY_CLASSES_ROOT\Interface\{6e10479b-31e8-4a3b-81b1-ddaf39097f19} (Adware.Zango) -> Quarantined and deleted successfully.

HKEY_CLASSES_ROOT\Interface\{726f0ab9-b842-4ae4-90c7-230e233e6a99} (Adware.Zango) -> Quarantined and deleted successfully.

HKEY_CLASSES_ROOT\Interface\{778c6547-2567-4177-ba41-63e420843e29} (Rogue.AntiSpyKit) -> Quarantined and deleted successfully.

HKEY_CLASSES_ROOT\Interface\{7b79f338-0a8d-44af-a809-4e34b47e0bf8} (Rogue.AntiSpyKit) -> Quarantined and deleted successfully.

HKEY_CLASSES_ROOT\Interface\{7d9745a5-5c08-441c-b809-264bba43cb19} (Rogue.AntiSpyKit) -> Quarantined and deleted successfully.

HKEY_CLASSES_ROOT\Interface\{99123ac9-7dda-4c82-b252-44c2804bf392} (Adware.Zango) -> Quarantined and deleted successfully.

HKEY_CLASSES_ROOT\Interface\{a3c744fa-9a23-4ac2-b167-658458764982} (Rogue.AntiSpyKit) -> Quarantined and deleted successfully.

HKEY_CLASSES_ROOT\Interface\{ace99e77-aa2a-43c2-8c9d-caf2020fdf2b} (Adware.Zango) -> Quarantined and deleted successfully.

HKEY_CLASSES_ROOT\Interface\{b247f5bf-bd9d-4ecd-8fc1-365f36a1fda1} (Adware.Seekmo) -> Quarantined and deleted successfully.

HKEY_CLASSES_ROOT\Interface\{b68de76d-f354-4a0d-96de-b3c4726b0874} (Rogue.AntiSpyKit) -> Quarantined and deleted successfully.

HKEY_CLASSES_ROOT\Interface\{b9cc2b92-5611-453f-8381-8b6f72d9c0b8} (Adware.Zango) -> Quarantined and deleted successfully.

HKEY_CLASSES_ROOT\Interface\{bbbfb891-98ae-4678-86f3-bd5a2eed86c9} (Adware.Seekmo) -> Quarantined and deleted successfully.

HKEY_CLASSES_ROOT\Interface\{bd5258af-20ae-4bd3-b748-b2851aca7335} (Adware.Seekmo) -> Quarantined and deleted successfully.

HKEY_CLASSES_ROOT\Interface\{c29d7379-4f31-4b46-971f-7c94b15c709e} (Rogue.AntiSpyKit) -> Quarantined and deleted successfully.

HKEY_CLASSES_ROOT\Interface\{c4543e64-1498-410d-8e72-4744eea99ab9} (Adware.Zango) -> Quarantined and deleted successfully.

HKEY_CLASSES_ROOT\Interface\{cce1768a-3fff-49c4-8c48-2daed860d118} (Rogue.AntiSpyKit) -> Quarantined and deleted successfully.

HKEY_CLASSES_ROOT\Interface\{e0fb1610-b25b-49f6-be20-751b2f230e6f} (Adware.Zango) -> Quarantined and deleted successfully.

HKEY_CLASSES_ROOT\Interface\{e2cb4866-da3d-4158-af12-e296fb8de109} (Rogue.AntiSpyKit) -> Quarantined and deleted successfully.

HKEY_CLASSES_ROOT\Interface\{e420a65f-9984-4b8c-9fa9-1ed69d3b0a13} (Adware.Zango) -> Quarantined and deleted successfully.

HKEY_CLASSES_ROOT\Interface\{e85fff2f-d5c5-43df-85e8-2258857f596c} (Rogue.AntiSpyKit) -> Quarantined and deleted successfully.

HKEY_CLASSES_ROOT\Interface\{e9b4ddb2-a1db-49c1-a1d3-05cc43b12e10} (Rogue.AntiSpyKit) -> Quarantined and deleted successfully.

HKEY_CLASSES_ROOT\Interface\{ea58c2ea-be26-49dd-9b9a-c8e4e5ca7791} (Adware.Zango) -> Quarantined and deleted successfully.

HKEY_CLASSES_ROOT\Interface\{fca28ac5-c1e1-4d67-a5ae-c44d6c374d9f} (Adware.Zango) -> Quarantined and deleted successfully.

HKEY_CLASSES_ROOT\Interface\{fd849917-2cc9-4e7a-a7bf-6e825315a749} (Rogue.AntiSpyKit) -> Quarantined and deleted successfully.

HKEY_CLASSES_ROOT\CLSID\{24e9519b-3f70-429b-99bc-4b2b49b96f66} (Trojan.Vundo) -> Quarantined and deleted successfully.

HKEY_CLASSES_ROOT\CLSID\{3935B537-3E6D-04ED-ABB3-ACB16A699E3B} (Rogue.Multiple) -> Quarantined and deleted successfully.

HKEY_CLASSES_ROOT\CLSID\{9c87cb31-93d0-4f3e-a360-4a91ff77aeb7} (Trojan.Zlob) -> Quarantined and deleted successfully.

HKEY_CLASSES_ROOT\CLSID\{07aa283a-43d7-4cbe-a064-32a21112d94d} (Adware.Zango) -> Quarantined and deleted successfully.

HKEY_CLASSES_ROOT\CLSID\{5b2e150d-4c8a-40e4-8c36-dd9c02771c67} (Adware.Zango) -> Quarantined and deleted successfully.

HKEY_CLASSES_ROOT\CLSID\{627d894a-8a77-416e-b522-432eaf2c818e} (Adware.Zango) -> Quarantined and deleted successfully.

HKEY_CLASSES_ROOT\CLSID\{7138f250-5b72-48dd-adfb-9a83b429dd9e} (Adware.Zango) -> Quarantined and deleted successfully.

HKEY_CLASSES_ROOT\CLSID\{8971cb48-9fca-445a-be77-e8e8a4cc9df7} (Adware.Zango) -> Quarantined and deleted successfully.

HKEY_CLASSES_ROOT\CLSID\{93b0fa7b-50f6-41b4-ac7e-612a72ce8c3c} (Adware.Zango) -> Quarantined and deleted successfully.

HKEY_CLASSES_ROOT\CLSID\{b0cb585f-3271-4e42-88d9-ae5c9330d554} (Adware.Zango) -> Quarantined and deleted successfully.

HKEY_CLASSES_ROOT\CLSID\{b88e4484-3ff6-4ea9-815b-a54fe20d4387} (Adware.Zango) -> Quarantined and deleted successfully.

HKEY_CLASSES_ROOT\CLSID\{bf1bf02c-5a86-4ecf-adac-472c54c4d21e} (Adware.Zango) -> Quarantined and deleted successfully.

HKEY_CLASSES_ROOT\CLSID\{bfc08cff-c737-4433-bd5a-0ee7efcfee54} (Adware.Zango) -> Quarantined and deleted successfully.

HKEY_CLASSES_ROOT\CLSID\{d2221ccb-f2bb-4858-aad4-57c754153603} (Adware.Zango) -> Quarantined and deleted successfully.

HKEY_CLASSES_ROOT\CLSID\{ea0b6a1a-6a59-4a58-9c41-9966504898a5} (Adware.Zango) -> Quarantined and deleted successfully.

HKEY_CLASSES_ROOT\CLSID\{914a8f99-38e4-47ec-b875-2b0653516030} (Adware.Seekmo) -> Quarantined and deleted successfully.

HKEY_CLASSES_ROOT\CLSID\{1f158a1e-a687-4a11-9679-b3ac64b86a1c} (Adware.Seekmo) -> Quarantined and deleted successfully.

HKEY_CLASSES_ROOT\CLSID\{e313f5dc-cfe7-4568-84a4-c76653547571} (Adware.Seekmo) -> Quarantined and deleted successfully.

HKEY_CLASSES_ROOT\CLSID\{3ec8e606-d9b3-4f96-b59d-9bd6ee759846} (Rogue.AntiSpyKit) -> Quarantined and deleted successfully.

HKEY_CLASSES_ROOT\CLSID\{dfb5633d-510e-46b2-8711-5f4697b8e69e} (Rogue.AntiSpyKit) -> Quarantined and deleted successfully.

HKEY_CLASSES_ROOT\CLSID\{fc7cfd2a-d27d-4eb1-9435-42e76072434a} (Rogue.AntiSpyKit) -> Quarantined and deleted successfully.

HKEY_CLASSES_ROOT\Typelib\{08755390-f46d-4d09-968c-3430166b3189} (Adware.Zango) -> Quarantined and deleted successfully.

HKEY_CLASSES_ROOT\Typelib\{087c4054-0a2b-4f35-b0db-bed3e21650f4} (Adware.Zango) -> Quarantined and deleted successfully.

HKEY_CLASSES_ROOT\Typelib\{0923208c-e259-4ed5-a778-cb607da350ad} (Adware.Zango) -> Quarantined and deleted successfully.

HKEY_CLASSES_ROOT\Typelib\{229d2451-a617-4b30-b5e8-8138694240cb} (Adware.Zango) -> Quarantined and deleted successfully.

HKEY_CLASSES_ROOT\Typelib\{9720de03-5820-4059-b4a4-639d5e52bd09} (Adware.Zango) -> Quarantined and deleted successfully.

HKEY_CLASSES_ROOT\Typelib\{c23fa5a4-1fea-419f-8b14-f7465df062bc} (Adware.Zango) -> Quarantined and deleted successfully.

HKEY_CLASSES_ROOT\Typelib\{ccc6e232-aa4c-4813-a019-9c14b27776b6} (Adware.Zango) -> Quarantined and deleted successfully.

HKEY_CLASSES_ROOT\Typelib\{995e885e-3ff5-4f66-a107-8bfb3a0f8f12} (Adware.Seekmo) -> Quarantined and deleted successfully.

HKEY_CLASSES_ROOT\Typelib\{fbb40fdf-b715-4342-ab82-244ecc66e979} (Adware.Seekmo) -> Quarantined and deleted successfully.

HKEY_CLASSES_ROOT\Typelib\{4946cbc5-dc18-4c7a-bc4d-299203c80602} (Rogue.AntiSpyKit) -> Quarantined and deleted successfully.

HKEY_CLASSES_ROOT\AppID\{4a40e8fc-c7e4-4f57-9fa4-85dd77402897} (Adware.Seekmo) -> Quarantined and deleted successfully.

HKEY_CLASSES_ROOT\AppID\{860b20f5-12c2-44ee-befe-7cd167a7a98e} (Rogue.Multiple) -> Quarantined and deleted successfully.

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\PreApproved\{54a3f8b7-228e-4ed8-895b-de832b2c3959} (Adware.Zango) -> Quarantined and deleted successfully.

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\PreApproved\{914a8f99-38e4-47ec-b875-2b0653516030} (Adware.Seekmo) -> Quarantined and deleted successfully.

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\PreApproved\{1f158a1e-a687-4a11-9679-b3ac64b86a1c} (Adware.Seekmo) -> Quarantined and deleted successfully.

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\PreApproved\{e313f5dc-cfe7-4568-84a4-c76653547571} (Adware.Seekmo) -> Quarantined and deleted successfully.

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{eddbb5ee-bb64-4bfc-9dbe-e7c85941335b} (Adware.Zango) -> Quarantined and deleted successfully.

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{914a8f99-38e4-47ec-b875-2b0653516030} (Adware.Seekmo) -> Quarantined and deleted successfully.

HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\Explorer Bars\{93b0fa7b-50f6-41b4-ac7e-612a72ce8c3c} (Adware.Zango) -> Quarantined and deleted successfully.

HKEY_CURRENT_USER\SOFTWARE\Microsoft\Installer\Products\568267acfc5644dab06f058006ddbae3 (Adware.Zango) -> Quarantined and deleted successfully.

HKEY_CURRENT_USER\SOFTWARE\Microsoft\Installer\Features\9ee2330ae5f4470cac801baac83818c9 (Adware.Zango) -> Quarantined and deleted successfully.

HKEY_CLASSES_ROOT\AppID\seekmo.desktopflash (Adware.Seekmo) -> Quarantined and deleted successfully.

HKEY_CLASSES_ROOT\AppID\seekmo.desktopflash.1 (Adware.Seekmo) -> Quarantined and deleted successfully.

HKEY_CLASSES_ROOT\AppID\seekmoax.clientdetector (Adware.Seekmo) -> Quarantined and deleted successfully.

HKEY_CLASSES_ROOT\AppID\seekmoax.clientdetector.1 (Adware.Seekmo) -> Quarantined and deleted successfully.

HKEY_CLASSES_ROOT\AppID\seekmoax.userprofiles (Adware.Seekmo) -> Quarantined and deleted successfully.

HKEY_CLASSES_ROOT\AppID\seekmoax.userprofiles.1 (Adware.Seekmo) -> Quarantined and deleted successfully.

HKEY_CURRENT_USER\SOFTWARE\seekmosa (Adware.Seekmo) -> Quarantined and deleted successfully.

HKEY_CLASSES_ROOT\AppID\AntiSpyKit.EXE (Rogue.AntiSpyKit) -> Quarantined and deleted successfully.

HKEY_CURRENT_USER\SOFTWARE\Adsl Software Ltd (Trojan.FakeAlert) -> Quarantined and deleted successfully.

 

Valeur(s) du Registre infectée(s):

HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\Toolbar\WebBrowser\{07aa283a-43d7-4cbe-a064-32a21112d94d} (Adware.Zango) -> Quarantined and deleted successfully.

HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\Extensions\CmdMapping\{9034a523-d068-4be8-a284-9df278be776e} (Trojan.Zlob) -> Quarantined and deleted successfully.

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\ShellExecuteHooks\{24e9519b-3f70-429b-99bc-4b2b49b96f66} (Trojan.Vundo) -> Quarantined and deleted successfully.

HKEY_LOCAL_MACHINE\SOFTWARE\Products\rdomain (Rogue.PCVirusless) -> Quarantined and deleted successfully.

HKEY_LOCAL_MACHINE\SOFTWARE\Products\prodname (Rogue.PCVirusless) -> Quarantined and deleted successfully.

HKEY_LOCAL_MACHINE\SOFTWARE\Products\compname (Rogue.PCVirusless) -> Quarantined and deleted successfully.

HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\winspywareprotect (Rogue.WinSpywareProtect) -> Quarantined and deleted successfully.

 

Elément(s) de données du Registre infecté(s):

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters\NameServer (Trojan.DNSChanger) -> Data: 85.255.115.70 85.255.112.189 -> Quarantined and deleted successfully.

HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\Tcpip\Parameters\NameServer (Trojan.DNSChanger) -> Data: 85.255.115.70 85.255.112.189 -> Quarantined and deleted successfully.

HKEY_LOCAL_MACHINE\SYSTEM\ControlSet003\Services\Tcpip\Parameters\NameServer (Trojan.DNSChanger) -> Data: 85.255.115.70 85.255.112.189 -> Quarantined and deleted successfully.

 

Dossier(s) infecté(s):

C:\Program Files\Seekmo (Adware.180Solutions) -> Quarantined and deleted successfully.

C:\Program Files\Seekmo\bin (Adware.180Solutions) -> Quarantined and deleted successfully.

C:\Program Files\Seekmo\bin\10.0.406.0 (Adware.180Solutions) -> Quarantined and deleted successfully.

C:\Program Files\Seekmo\bin\10.0.406.0\firefox (Adware.180Solutions) -> Quarantined and deleted successfully.

C:\Program Files\Seekmo\bin\10.0.406.0\firefox\extensions (Adware.180Solutions) -> Quarantined and deleted successfully.

C:\Program Files\Seekmo\bin\10.0.406.0\firefox\extensions\components (Adware.180Solutions) -> Quarantined and deleted successfully.

C:\Program Files\Seekmo\bin\10.0.406.0\firefox\extensions\plugins (Adware.180Solutions) -> Quarantined and deleted successfully.

C:\Program Files\WinSecureAv (Rogue.WinSecureAv) -> Quarantined and deleted successfully.

C:\Program Files\AntiSpyKit 5.3 (Rogue.AntiSpyKit) -> Quarantined and deleted successfully.

C:\Program Files\AntiSpyKit 5.3\Logs (Rogue.AntiSpyKit) -> Quarantined and deleted successfully.

C:\WinSecureAv (Rogue.WinSecureAv) -> Quarantined and deleted successfully.

C:\WinSecureAv\AVQuar (Rogue.WinSecureAv) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\375013 (Trojan.Zlob) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\215651 (Trojan.BHO) -> Quarantined and deleted successfully.

C:\Documents and Settings\All Users\Application Data\SalesMon (Rogue.Multiple) -> Quarantined and deleted successfully.

C:\Documents and Settings\All Users\Application Data\SalesMon\Data (Rogue.Multiple) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\WinSecureAv (Rogue.WinSecureAv) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\WinSecureAv\Logs (Rogue.WinSecureAv) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo (Adware.Agent) -> Delete on reboot.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\eskin (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\IESkins (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0 (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\HostOI (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\HostOI\dynamic (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\HostOI\static (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\HostOL (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\HostOL\dynamic (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\HostOL\static (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\dynamic (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\dynamic\TooltipXML (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\dynamic\TooltipXML (Adware.Agent) -> Files: 595 -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\dynamic\ustat (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\static (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\static\1 (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\static\2 (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\static\DownLoad (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\All Users\Application Data\SeekmoSA (Adware.Seekmo) -> Quarantined and deleted successfully.

C:\Documents and Settings\All Users\Application Data\2ACA5CC3-0F83-453D-A079-1076FE1A8B65 (Adware.Seekmo) -> Quarantined and deleted successfully.

C:\Documents and Settings\All Users\Application Data\ADSL Software Ltd (Rogue.Multiple) -> Quarantined and deleted successfully.

C:\Documents and Settings\All Users\Application Data\ADSL Software Ltd\WinSpywareProtect (Rogue.Multiple) -> Quarantined and deleted successfully.

C:\Documents and Settings\All Users\Application Data\ADSL Software Ltd\WinSpywareProtect\BASE (Rogue.Multiple) -> Quarantined and deleted successfully.

C:\Documents and Settings\All Users\Application Data\ADSL Software Ltd\WinSpywareProtect\DELETED (Rogue.Multiple) -> Quarantined and deleted successfully.

C:\Documents and Settings\All Users\Application Data\ADSL Software Ltd\WinSpywareProtect\LOG (Rogue.Multiple) -> Quarantined and deleted successfully.

C:\Documents and Settings\All Users\Application Data\ADSL Software Ltd\WinSpywareProtect\SAVED (Rogue.Multiple) -> Quarantined and deleted successfully.

 

Fichier(s) infecté(s):

C:\Documents and Settings\HP_Propriétaire\Local Settings\Application Data\ieosyqs_navps.dat (Adware.Navipromo.H) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Local Settings\Application Data\ieosyqs_nav.dat (Adware.Navipromo.H) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Local Settings\Application Data\ieosyqs.dat (Adware.Navipromo.H) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Local Settings\Application Data\oysgw_navps.dat (Adware.Navipromo.H) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Local Settings\Application Data\oysgw_nav.dat (Adware.Navipromo.H) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Local Settings\Application Data\oysgw.dat (Adware.Navipromo.H) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Local Settings\Application Data\oysgw.exe (Adware.Navipromo.H) -> Delete on reboot.

C:\Program Files\Seekmo\bin\10.0.406.0\arrow.ico (Adware.180Solutions) -> Quarantined and deleted successfully.

C:\Program Files\Seekmo\bin\10.0.406.0\copyright.txt (Adware.180Solutions) -> Quarantined and deleted successfully.

C:\Program Files\Seekmo\bin\10.0.406.0\link.ico (Adware.180Solutions) -> Quarantined and deleted successfully.

C:\Program Files\Seekmo\bin\10.0.406.0\firefox\extensions\chrome.manifest (Adware.180Solutions) -> Quarantined and deleted successfully.

C:\Program Files\Seekmo\bin\10.0.406.0\firefox\extensions\install.rdf (Adware.180Solutions) -> Quarantined and deleted successfully.

C:\Program Files\Seekmo\bin\10.0.406.0\firefox\extensions\components\npclntax.xpt (Adware.180Solutions) -> Quarantined and deleted successfully.

C:\Program Files\WinSecureAv\history.db (Rogue.WinSecureAv) -> Quarantined and deleted successfully.

C:\Program Files\AntiSpyKit 5.3\db.dat (Rogue.AntiSpyKit) -> Quarantined and deleted successfully.

C:\Program Files\AntiSpyKit 5.3\DbgHelp.Dll (Rogue.AntiSpyKit) -> Quarantined and deleted successfully.

C:\Program Files\AntiSpyKit 5.3\Logs\scan_log_04022008-145000.html (Rogue.AntiSpyKit) -> Quarantined and deleted successfully.

C:\Program Files\AntiSpyKit 5.3\Logs\scan_log_04022008-150157.html (Rogue.AntiSpyKit) -> Quarantined and deleted successfully.

C:\Program Files\AntiSpyKit 5.3\Logs\scan_log_04022008-185616.html (Rogue.AntiSpyKit) -> Quarantined and deleted successfully.

C:\Program Files\AntiSpyKit 5.3\Logs\scan_log_04022008-202837.html (Rogue.AntiSpyKit) -> Quarantined and deleted successfully.

C:\Program Files\AntiSpyKit 5.3\Logs\scan_log_04042008-180851.html (Rogue.AntiSpyKit) -> Quarantined and deleted successfully.

C:\Program Files\AntiSpyKit 5.3\Logs\scan_log_04042008-185321.html (Rogue.AntiSpyKit) -> Quarantined and deleted successfully.

C:\Program Files\AntiSpyKit 5.3\Logs\scan_log_04042008-191811.html (Rogue.AntiSpyKit) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\WinSecureAv\Logs\threats.log (Rogue.WinSecureAv) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\WinSecureAv\Logs\update.log (Rogue.WinSecureAv) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\eskin\empty_bg_st.htm (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\eskin\FileManager.txt (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\dynamic\1.sdf (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\dynamic\1003320.sdf (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\dynamic\1036580.sdf (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\dynamic\1042745.sdf (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\dynamic\1054344.sdf (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\dynamic\1055783.sdf (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\dynamic\1056250.sdf (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\dynamic\1057726.sdf (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\dynamic\1058273.sdf (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\dynamic\1060233.sdf (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\dynamic\1063780.sdf (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\dynamic\1065003.sdf (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\dynamic\1065005.sdf (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\dynamic\1067059.sdf (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\dynamic\1155100.sdf (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\dynamic\1225072.sdf (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\dynamic\127757.sdf (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\dynamic\1383356.sdf (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\dynamic\1383609.sdf (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\dynamic\1383771.sdf (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\dynamic\1384139.sdf (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\dynamic\1384147.sdf (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\dynamic\1384284.sdf (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\dynamic\1384577.sdf (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\dynamic\1384736.sdf (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\dynamic\1384900.sdf (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\dynamic\1385400.sdf (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\dynamic\1385464.sdf (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\dynamic\1385508.sdf (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\dynamic\1386103.sdf (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\dynamic\1387224.sdf (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\dynamic\1388730.sdf (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\dynamic\1388868.sdf (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\dynamic\1389403.sdf (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\dynamic\1389593.sdf (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\dynamic\1390006.sdf (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\dynamic\1390732.sdf (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\dynamic\1391472.sdf (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\dynamic\1392932.sdf (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\dynamic\1394204.sdf (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\dynamic\1396684.sdf (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\dynamic\1396993.sdf (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\dynamic\1397883.sdf (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\dynamic\1398013.sdf (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\dynamic\1398044.sdf (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\dynamic\1402657.sdf (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\dynamic\1404068.sdf (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\dynamic\1404802.sdf (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\dynamic\1405854.sdf (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\dynamic\1406766.sdf (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\dynamic\1408056.sdf (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\dynamic\1408249.sdf (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\dynamic\1409200.sdf (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\dynamic\1409240.sdf (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\dynamic\1425141.sdf (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\dynamic\1484571.sdf (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\dynamic\1496573.sdf (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\dynamic\1594427.sdf (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\dynamic\1866764.sdf (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\dynamic\1958163.sdf (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\dynamic\200620.sdf (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\dynamic\2066842.sdf (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\dynamic\218441.sdf (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\dynamic\2208944.sdf (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\dynamic\2208948.sdf (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\dynamic\221540.sdf (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\dynamic\225343.sdf (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\dynamic\2344198.sdf (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\dynamic\2373025.sdf (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\dynamic\2386467.sdf (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\dynamic\2401216.sdf (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\dynamic\2423514.sdf (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\dynamic\2423777.sdf (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\dynamic\2442543.sdf (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\dynamic\2487526.sdf (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\dynamic\2515796.sdf (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\dynamic\2572057.sdf (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\dynamic\2621078.sdf (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\dynamic\2722488.sdf (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\dynamic\286345.sdf (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\dynamic\2872521.sdf (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\dynamic\2883915.sdf (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\dynamic\2899627.sdf (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\dynamic\29242.sdf (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\dynamic\3251993.sdf (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\dynamic\3283716.sdf (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\dynamic\3385108.sdf (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\dynamic\3422833.sdf (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\dynamic\343252.sdf (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\dynamic\3469510.sdf (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\dynamic\368333.sdf (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\dynamic\3732162.sdf (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\dynamic\3735999.sdf (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\dynamic\3736273.sdf (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\dynamic\3736917.sdf (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\dynamic\3742613.sdf (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\dynamic\3748274.sdf (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\dynamic\3752022.sdf (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\dynamic\3755917.sdf (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\dynamic\3756119.sdf (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\dynamic\3756136.sdf (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\dynamic\3771540.sdf (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\dynamic\3781353.sdf (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\dynamic\3786197.sdf (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\dynamic\3786240.sdf (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\dynamic\3786291.sdf (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\dynamic\3852296.sdf (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\dynamic\3852407.sdf (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\dynamic\3852962.sdf (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\dynamic\3862410.sdf (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\dynamic\3893094.sdf (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\dynamic\3893192.sdf (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\dynamic\3893199.sdf (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\dynamic\3893213.sdf (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\dynamic\3893245.sdf (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\dynamic\3893390.sdf (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\dynamic\3893398.sdf (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\dynamic\3893426.sdf (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\dynamic\3893498.sdf (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\dynamic\3893670.sdf (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\dynamic\3893865.sdf (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\dynamic\3894124.sdf (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\dynamic\403100.sdf (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\dynamic\406631.sdf (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\dynamic\407824.sdf (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\dynamic\442905.sdf (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\dynamic\48657.sdf (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\dynamic\522602.sdf (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\dynamic\549620.sdf (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\dynamic\58648.sdf (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\dynamic\608910.sdf (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\dynamic\609636.sdf (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\dynamic\625696.sdf (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\dynamic\645857.sdf (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\dynamic\661127.sdf (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\dynamic\753170.sdf (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\dynamic\801700.sdf (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\dynamic\803422.sdf (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\dynamic\805478.sdf (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\dynamic\819382.sdf (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\dynamic\890068.sdf (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\dynamic\934538.sdf (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\dynamic\941965.sdf (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\dynamic\949763.sdf (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\dynamic\domains.txt (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\dynamic\ustat\3686.dat (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\static\1\btntrans.idx (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\static\1\btntrans1.dat (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\static\1\buttondir.txt (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\static\1\components.cdf (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\static\1\cursors.res (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\static\1\default.cdf (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\static\1\Default_511745-514279.mnu (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\static\1\Default_categorize.mnu (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\static\1\Default_comparison.mnu (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\static\1\Default_explorer-Mails.mnu (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\static\1\Default_explorer-people.mnu (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\static\1\Default_favorites.mnu (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\static\1\Default_Games.mnu (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\static\1\Default_Hide.mnu (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\static\1\Default_hotbarcom.mnu (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\static\1\Default_Hotmail.mnu (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\static\1\Default_hsskin.mnu (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\static\1\Default_Mails.mnu (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\static\1\Default_new.mnu (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\static\1\Default_premium.mnu (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\static\1\Default_searchfor.mnu (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\static\1\Default_searchgo.mnu (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\static\1\Default_weather.mnu (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\static\1\Default_yellowpages.mnu (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\static\1\d_icons_buttons_1000.res (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\static\1\d_icons_buttons_2000.res (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\static\1\d_icons_buttons_3000.res (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\static\1\d_icons_buttons_bar.res (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\static\1\d_icons_buttons_bbar1.res (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\static\1\d_icons_buttons_logos.res (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\static\1\d_icons_buttons_other.res (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\static\1\d_icons_weather.res (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\static\1\email-def-511724-548964.mnu (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\static\1\email-def-511724-9595.mnu (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\static\1\email-t1-bg.res (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\static\1\icons2.res (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\static\1\ie_games_icon.res (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\static\1\ie_video.res (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\static\1\keywords.idx (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\static\1\keywords1.dat (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\static\1\layout.cdf (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\static\1\linkpathlegal.txt (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\static\1\progress.res (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\static\1\sales_buttons.res (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\static\1\seekmo.res (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\static\1\seekmo_ie_menu.res (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\static\1\s_icons_buttons.res (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\static\1\t2_bg.res (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\static\1\theweb.mnu (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\static\1\top7.cdf (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\static\1\Top7_theweb.mnu (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\static\1\tsd_bg.res (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\static\2\btntrans.idx (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\static\2\btntrans1.dat (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\static\2\buttondir.txt (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\static\2\components.cdf (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\static\2\cursors.res (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\static\2\default.cdf (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\static\2\Default_511745-514279.mnu (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\static\2\Default_categorize.mnu (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\static\2\Default_comparison.mnu (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\static\2\Default_explorer-Mails.mnu (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\static\2\Default_explorer-people.mnu (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\static\2\Default_favorites.mnu (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\static\2\Default_Games.mnu (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\static\2\Default_Hide.mnu (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\static\2\Default_hotbarcom.mnu (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\static\2\Default_Hotmail.mnu (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\static\2\Default_hsskin.mnu (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\static\2\Default_Mails.mnu (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\static\2\Default_new.mnu (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\static\2\Default_premium.mnu (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\static\2\Default_searchfor.mnu (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\static\2\Default_searchgo.mnu (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\static\2\Default_weather.mnu (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\static\2\Default_yellowpages.mnu (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\static\2\d_icons_buttons_1000.res (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\static\2\d_icons_buttons_2000.res (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\static\2\d_icons_buttons_3000.res (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\static\2\d_icons_buttons_bar.res (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\static\2\d_icons_buttons_bbar1.res (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\static\2\d_icons_buttons_logos.res (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\static\2\d_icons_buttons_other.res (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\static\2\d_icons_weather.res (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\static\2\email-def-511724-548964.mnu (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\static\2\email-def-511724-9595.mnu (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\static\2\email-t1-bg.res (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\static\2\icons2.res (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\static\2\ie_games_icon.res (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\static\2\ie_video.res (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\static\2\keywords.idx (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\static\2\keywords1.dat (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\static\2\layout.cdf (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\static\2\linkpathlegal.txt (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\static\2\progress.res (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\static\2\sales_buttons.res (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\static\2\seekmo.res (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\static\2\seekmo_ie_menu.res (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\static\2\s_icons_buttons.res (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\static\2\t2_bg.res (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\static\2\theweb.mnu (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\static\2\top7.cdf (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\static\2\Top7_theweb.mnu (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\static\2\tsd_bg.res (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\static\DownLoad\BtnTrans.xip (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\static\DownLoad\BtnTrans1.xip (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\static\DownLoad\buttondir.xip (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\static\DownLoad\cursors.xip (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\static\DownLoad\default.xip (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\static\DownLoad\d_icons_buttons_1000.xip (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\static\DownLoad\d_icons_buttons_2000.xip (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\static\DownLoad\d_icons_buttons_3000.xip (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\static\DownLoad\d_icons_buttons_bar.xip (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\static\DownLoad\d_icons_buttons_bbar1.xip (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\static\DownLoad\d_icons_buttons_logos.xip (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\static\DownLoad\d_icons_buttons_other.xip (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\static\DownLoad\d_icons_weather.xip (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\static\DownLoad\email-t1-bg.xip (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\static\DownLoad\icons2.xip (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\static\DownLoad\ie_games_icon.xip (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\static\DownLoad\ie_video.xip (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\static\DownLoad\keywords.xip (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\static\DownLoad\keywords1.xip (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\static\DownLoad\layout.xip (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\static\DownLoad\linkpathlegal.xip (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\static\DownLoad\progress.xip (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\static\DownLoad\sales_buttons.xip (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\static\DownLoad\samplegroups2.txt (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\static\DownLoad\samplegroups2.xip (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\static\DownLoad\seekmo.xip (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\static\DownLoad\seekmo_ie_menu.xip (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\static\DownLoad\s_icons_buttons.xip (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\static\DownLoad\t2_bg.xip (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\static\DownLoad\top7.xip (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\HP_Propriétaire\Application Data\Seekmo\v3.0\Seekmo\static\DownLoad\tsd_bg.xip (Adware.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\All Users\Application Data\SeekmoSA\SeekmoSA.dat (Adware.Seekmo) -> Quarantined and deleted successfully.

C:\Documents and Settings\All Users\Application Data\SeekmoSA\SeekmoSAAbout.mht (Adware.Seekmo) -> Quarantined and deleted successfully.

C:\Documents and Settings\All Users\Application Data\SeekmoSA\SeekmoSAau.dat (Adware.Seekmo) -> Quarantined and deleted successfully.

C:\Documents and Settings\All Users\Application Data\SeekmoSA\SeekmoSAEULA.mht (Adware.Seekmo) -> Quarantined and deleted successfully.

C:\Documents and Settings\All Users\Application Data\SeekmoSA\SeekmoSA_kyf.dat (Adware.Seekmo) -> Quarantined and deleted successfully.

C:\Documents and Settings\All Users\Application Data\ADSL Software Ltd\WinSpywareProtect\LOG\20080622004721218.log (Rogue.Multiple) -> Quarantined and deleted successfully.

C:\Documents and Settings\All Users\Application Data\ADSL Software Ltd\WinSpywareProtect\LOG\20080622103718125.log (Rogue.Multiple) -> Quarantined and deleted successfully.

C:\Documents and Settings\All Users\Application Data\ADSL Software Ltd\WinSpywareProtect\LOG\20080623071040031.log (Rogue.Multiple) -> Quarantined and deleted successfully.

C:\Documents and Settings\All Users\Application Data\ADSL Software Ltd\WinSpywareProtect\LOG\20080623184345562.log (Rogue.Multiple) -> Quarantined and deleted successfully.

C:\Documents and Settings\All Users\Application Data\ADSL Software Ltd\WinSpywareProtect\LOG\20080624192802484.log (Rogue.Multiple) -> Quarantined and deleted successfully.

C:\Documents and Settings\All Users\Application Data\ADSL Software Ltd\WinSpywareProtect\LOG\20080625202337156.log (Rogue.Multiple) -> Quarantined and deleted successfully.

C:\Documents and Settings\All Users\Application Data\ADSL Software Ltd\WinSpywareProtect\LOG\20080627164241218.log (Rogue.Multiple) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\nvs2.inf (Adware.EGDAccess) -> Quarantined and deleted successfully.

Posté(e)
Redémarre, et poste un nouveau rapport HijackThis stp.

 

 

Voila le rapport Hijackthis après redemarrage

 

Logfile of Trend Micro HijackThis v2.0.2

Scan saved at 17:46:58, on 30/11/2008

Platform: Windows XP SP2 (WinNT 5.01.2600)

MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)

Boot mode: Normal

 

Running processes:

C:\WINDOWS\System32\smss.exe

C:\WINDOWS\system32\winlogon.exe

C:\WINDOWS\system32\services.exe

C:\WINDOWS\system32\lsass.exe

C:\WINDOWS\system32\svchost.exe

C:\WINDOWS\System32\svchost.exe

C:\WINDOWS\system32\spoolsv.exe

C:\Program Files\Fichiers communs\LogiShrd\LVCOMSER\LVComSer.exe

C:\Program Files\Fichiers communs\LogiShrd\LVMVFM\LVPrcSrv.exe

C:\WINDOWS\system32\nvsvc32.exe

C:\WINDOWS\system32\oodag.exe

C:\WINDOWS\system32\svchost.exe

C:\Program Files\Fichiers communs\BitDefender\BitDefender Communicator\xcommsvr.exe

C:\Program Files\Fichiers communs\BitDefender\BitDefender Update Service\livesrv.exe

C:\Program Files\BitDefender\BitDefender 2008\vsserv.exe

C:\WINDOWS\System32\svchost.exe

C:\WINDOWS\system32\wuauclt.exe

C:\WINDOWS\Explorer.EXE

C:\Program Files\Java\jre1.6.0_07\bin\jusched.exe

C:\windows\system\hpsysdrv.exe

C:\WINDOWS\system32\hphmon06.exe

C:\Program Files\Fichiers communs\InstallShield\UpdateService\issch.exe

C:\WINDOWS\AGRSMMSG.exe

C:\WINDOWS\ALCXMNTR.EXE

C:\Program Files\Fichiers communs\LogiShrd\LComMgr\Communications_Helper.exe

C:\Program Files\Logitech\QuickCam\Quickcam.exe

C:\Program Files\BitDefender\BitDefender 2008\bdagent.exe

C:\WINDOWS\system32\rundll32.exe

C:\WINDOWS\system32\ctfmon.exe

C:\Program Files\Windows Live\Messenger\msnmsgr.exe

C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe

C:\Program Files\Microsoft ActiveSync\wcescomm.exe

C:\Program Files\HP\Digital Imaging\bin\hpqtra08.exe

C:\Program Files\Adobe\Acrobat 7.0\Reader\reader_sl.exe

C:\Program Files\Logitech\Desktop Messenger\8876480\Program\LogitechDesktopMessenger.exe

C:\Program Files\NETGEAR\WG111v3\WG111v3.exe

C:\PROGRA~1\MI3AA1~1\rapimgr.exe

C:\Program Files\Fichiers communs\Logishrd\LQCVFX\COCIManager.exe

C:\WINDOWS\system32\HPZipm12.exe

C:\WINDOWS\System32\svchost.exe

C:\Program Files\Internet Explorer\iexplore.exe

C:\Program Files\Fichiers communs\Microsoft Shared\Windows Live\WLLoginProxy.exe

C:\PROGRA~1\FICHIE~1\INSTAL~1\UPDATE~1\agent.exe

C:\Program Files\HijackThis\HijackThis.exe

 

R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName = Liens

O2 - BHO: AcroIEHlprObj Class - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 7.0\ActiveX\AcroIEHelper.dll

O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre1.6.0_07\bin\ssv.dll

O2 - BHO: (no name) - {7E853D72-626A-48EC-A868-BA8D5E23E045} - (no file)

O2 - BHO: Programme d'aide de l'Assistant de connexion Windows Live - {9030D464-4C02-4ABF-8ECC-5164760863C6} - C:\Program Files\Fichiers communs\Microsoft Shared\Windows Live\WindowsLiveLogin.dll

O2 - BHO: Google Toolbar Helper - {AA58ED58-01DD-4d91-8333-CF10577473F7} - c:\program files\google\googletoolbar2.dll

O2 - BHO: Google Toolbar Notifier BHO - {AF69DE43-7D58-4638-B6FA-CE66B5AD205D} - C:\Program Files\Google\GoogleToolbarNotifier\3.1.807.1746\swg.dll

O3 - Toolbar: Vue HP - {B2847E28-5D7D-4DEB-8B67-05D28BCF79F5} - c:\Program Files\HP\Digital Imaging\bin\HPDTLK02.dll

O3 - Toolbar: &Google - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - c:\program files\google\googletoolbar2.dll

O3 - Toolbar: BitDefender Toolbar - {381FFDE8-2394-4f90-B10D-FC6124A40F8C} - C:\Program Files\BitDefender\BitDefender 2008\IEToolbar.dll

O4 - HKLM\..\Run: [sunJavaUpdateSched] "C:\Program Files\Java\jre1.6.0_07\bin\jusched.exe"

O4 - HKLM\..\Run: [hpsysdrv] c:\windows\system\hpsysdrv.exe

O4 - HKLM\..\Run: [igfxTray] C:\WINDOWS\system32\igfxtray.exe

O4 - HKLM\..\Run: [HPHUPD06] c:\Program Files\HP\{AAC4FC36-8F89-4587-8DD3-EBC57C83374D}\hphupd06.exe

O4 - HKLM\..\Run: [HPHmon06] C:\WINDOWS\system32\hphmon06.exe

O4 - HKLM\..\Run: [iSUSPM Startup] C:\PROGRA~1\FICHIE~1\INSTAL~1\UPDATE~1\ISUSPM.exe -startup

O4 - HKLM\..\Run: [iSUSScheduler] "C:\Program Files\Fichiers communs\InstallShield\UpdateService\issch.exe" -start

O4 - HKLM\..\Run: [Recguard] C:\WINDOWS\SMINST\RECGUARD.EXE

O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE C:\WINDOWS\system32\NvCpl.dll,NvStartup

O4 - HKLM\..\Run: [nwiz] nwiz.exe /installquiet /keeploaded /nodetect

O4 - HKLM\..\Run: [VTTimer] VTTimer.exe

O4 - HKLM\..\Run: [siSPower] Rundll32.exe SiSPower.dll,ModeAgent

O4 - HKLM\..\Run: [AGRSMMSG] AGRSMMSG.exe

O4 - HKLM\..\Run: [AlcxMonitor] ALCXMNTR.EXE

O4 - HKLM\..\Run: [LSBWatcher] c:\hp\drivers\hplsbwatcher\lsburnwatcher.exe

O4 - HKLM\..\Run: [bm] "C:\Program Files\Fichiers communs\WinSecureAv\bm.exe" dm=http://winsecureav.com ad=http://winsecureav.com sd=http://ykeeper.winsecureav.com

O4 - HKLM\..\Run: [ptask] C:\Program Files\WinSecureAv\ptask.exe

O4 - HKLM\..\Run: [REGSHAVE] C:\Program Files\REGSHAVE\REGSHAVE.EXE /AUTORUN

O4 - HKLM\..\Run: [RavAV] C:\WINDOWS\RavMonE.exe

O4 - HKLM\..\Run: [LogitechCommunicationsManager] "C:\Program Files\Fichiers communs\LogiShrd\LComMgr\Communications_Helper.exe"

O4 - HKLM\..\Run: [LogitechQuickCamRibbon] "C:\Program Files\Logitech\QuickCam\Quickcam.exe" /hide

O4 - HKLM\..\Run: [bitDefender Antiphishing Helper] "C:\Program Files\BitDefender\BitDefender 2008\IEShow.exe"

O4 - HKLM\..\Run: [bDAgent] "C:\Program Files\BitDefender\BitDefender 2008\bdagent.exe"

O4 - HKLM\..\Run: [OODefragTray] C:\WINDOWS\system32\oodtray.exe

O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe

O4 - HKCU\..\Run: [MsnMsgr] "C:\Program Files\Windows Live\Messenger\msnmsgr.exe" /background

O4 - HKCU\..\Run: [ieosyqs] "c:\documents and settings\hp_propriétaire\local settings\application data\ieosyqs.exe" ieosyqs

O4 - HKCU\..\Run: [swg] C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe

O4 - HKCU\..\Run: [H/PC Connection Agent] "C:\Program Files\Microsoft ActiveSync\wcescomm.exe"

O4 - HKCU\..\Run: [oysgw] "c:\documents and settings\hp_propriétaire\local settings\application data\oysgw.exe" oysgw

O4 - HKUS\S-1-5-19\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'SERVICE LOCAL')

O4 - HKUS\S-1-5-20\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'SERVICE RÉSEAU')

O4 - HKUS\S-1-5-18\..\RunOnce: [WUAppSetup] C:\Program Files\Fichiers communs\logishrd\WUApp32.exe -v 0x046d -p 0x08da -f video -m logitech -d 11.5.0.1145 (User 'SYSTEM')

O4 - HKUS\.DEFAULT\..\RunOnce: [WUAppSetup] C:\Program Files\Fichiers communs\logishrd\WUApp32.exe -v 0x046d -p 0x08da -f video -m logitech -d 11.5.0.1145 (User 'Default user')

O4 - Global Startup: HP Digital Imaging Monitor.lnk = C:\Program Files\HP\Digital Imaging\bin\hpqtra08.exe

O4 - Global Startup: Lancement rapide d'Adobe Reader.lnk = C:\Program Files\Adobe\Acrobat 7.0\Reader\reader_sl.exe

O4 - Global Startup: Logitech Desktop Messenger.lnk = C:\Program Files\Logitech\Desktop Messenger\8876480\Program\LogitechDesktopMessenger.exe

O4 - Global Startup: NETGEAR WG111v3 Smart Wizard.lnk = C:\Program Files\NETGEAR\WG111v3\WG111v3.exe

O8 - Extra context menu item: E&xporter vers Microsoft Excel - res://C:\PROGRA~1\MICROS~4\Office12\EXCEL.EXE/3000

O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_07\bin\ssv.dll

O9 - Extra 'Tools' menuitem: Console Java (Sun) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_07\bin\ssv.dll

O9 - Extra button: Create Mobile Favorite - {2EAF5BB1-070F-11D3-9307-00C04FAE2D4F} - C:\PROGRA~1\MI3AA1~1\INetRepl.dll

O9 - Extra button: (no name) - {2EAF5BB2-070F-11D3-9307-00C04FAE2D4F} - C:\PROGRA~1\MI3AA1~1\INetRepl.dll

O9 - Extra 'Tools' menuitem: Créer un Favori de l'appareil mobile... - {2EAF5BB2-070F-11D3-9307-00C04FAE2D4F} - C:\PROGRA~1\MI3AA1~1\INetRepl.dll

O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~4\Office12\REFIEBAR.DLL

O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe

O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe

O16 - DPF: {304171C0-65EA-4B51-B5D9-93A311E26EB1} (MxPEG_ActiveX Control) - http://www.lessablesdolonne.com/webcam/MxPEG_ActiveX.cab

O16 - DPF: {7FC1B346-83E6-4774-8D20-1A6B09B0E737} (Windows Live Photo Upload Control) - http://cid-44ed0404cd5dd804.spaces.live.co...ad/MsnPUpld.cab

O18 - Protocol: bwfile-8876480 - {9462A756-7B47-47BC-8C80-C34B9B80B32B} - C:\Program Files\Logitech\Desktop Messenger\8876480\Program\GAPlugProtocol-8876480.dll

O20 - Winlogon Notify: awtqonNg - awtqonNg.dll (file missing)

O23 - Service: Google Updater Service (gusvc) - Google - C:\Program Files\Google\Common\Google Updater\GoogleUpdaterService.exe

O23 - Service: iPod Service (iPodService) - Apple Computer, Inc. - C:\Program Files\iPod\bin\iPodService.exe

O23 - Service: BitDefender Desktop Update Service (LIVESRV) - BitDefender SRL - C:\Program Files\Fichiers communs\BitDefender\BitDefender Update Service\livesrv.exe

O23 - Service: LVCOMSer - Logitech Inc. - C:\Program Files\Fichiers communs\LogiShrd\LVCOMSER\LVComSer.exe

O23 - Service: Process Monitor (LVPrcSrv) - Logitech Inc. - C:\Program Files\Fichiers communs\LogiShrd\LVMVFM\LVPrcSrv.exe

O23 - Service: NVIDIA Display Driver Service (NVSvc) - NVIDIA Corporation - C:\WINDOWS\system32\nvsvc32.exe

O23 - Service: O&O Defrag - O&O Software GmbH - C:\WINDOWS\system32\oodag.exe

O23 - Service: Pml Driver HPZ12 - HP - C:\WINDOWS\system32\HPZipm12.exe

O23 - Service: BitDefender Virus Shield (VSSERV) - BitDefender S.R.L. - C:\Program Files\BitDefender\BitDefender 2008\vsserv.exe

O23 - Service: BitDefender Communicator (XCOMM) - BitDefender - C:\Program Files\Fichiers communs\BitDefender\BitDefender Communicator\xcommsvr.exe

 

--

End of file - 9910 bytes

Posté(e)

Oki, on continue.

 

Branche tes clés USB et/ou disques durs externes : tes périphériques amovibles de stockage de données quoi.

 

Le logiciel qui suit n'est à utiliser que prescrit par un helper qualifié et formé à l'outil.

Ne pas utiliser en dehors de ce cas de figure ou seul : dangereux.

 

Télécharge combofix.exe de sUBs et sauvegarde le sur ton bureau (et pas ailleurs).

  • Assure toi que tous les programmes sont fermés avant de commencer.
  • Double-clique combofix.exe afin de l'exécuter.
  • Clique sur "Oui" au message de Limitation de Garantie qui s'affiche.
  • On va te proposer de télécharger et installer la console de récupération, clique sur "Oui" au message, autorise le téléchargement dans ton firewall si demandé, puis accepte le message de contrat utilisateur final.
  • Le bureau disparaît, c'est normal, et il va revenir.
  • Ne ferme pas la fenêtre qui s'ouvre, tu te retrouverais avec un bureau vide.
  • Lorsque l'analyse sera terminée, un rapport apparaîtra.
  • Copie-colle ce rapport dans ta prochaine réponse.
    Le rapport se trouve dans : C:\Combofix.txt (si jamais).

Rejoindre la conversation

Vous pouvez publier maintenant et vous inscrire plus tard. Si vous avez un compte, connectez-vous maintenant pour publier avec votre compte.
Remarque : votre message nécessitera l’approbation d’un modérateur avant de pouvoir être visible.

Invité
Répondre à ce sujet…

×   Collé en tant que texte enrichi.   Coller en tant que texte brut à la place

  Seulement 75 émoticônes maximum sont autorisées.

×   Votre lien a été automatiquement intégré.   Afficher plutôt comme un lien

×   Votre contenu précédent a été rétabli.   Vider l’éditeur

×   Vous ne pouvez pas directement coller des images. Envoyez-les depuis votre ordinateur ou insérez-les depuis une URL.

  • En ligne récemment   0 membre est en ligne

    • Aucun utilisateur enregistré regarde cette page.
×
×
  • Créer...