Aller au contenu
  • Pas encore inscrit ?

    Pourquoi ne pas vous inscrire ? C'est simple, rapide et gratuit.
    Pour en savoir plus, lisez Les avantages de l'inscription... et la Charte de Zébulon.
    De plus, les messages que vous postez en tant qu'invité restent invisibles tant qu'un modérateur ne les a pas validés. Inscrivez-vous, ce sera un gain de temps pour tout le monde, vous, les helpeurs et les modérateurs ! :wink:

Messages recommandés

Posté(e)

Bonjour,

 

Mon Pc est infecté par plusieurs virus. Les résultats de mes recherches sur google ne sont pas en rapports avec liens, des sons bizarres bref voici le résultat du log HiJackThis…..Merci de votre aide.

 

 

 

 

 

 

Logfile of Trend Micro HijackThis v2.0.2

Scan saved at 23:32:44, on 17/01/2009

Platform: Windows XP SP3 (WinNT 5.01.2600)

MSIE: Internet Explorer v7.00 (7.00.6000.16762)

Boot mode: Normal

 

Running processes:

C:\WINDOWS\System32\smss.exe

C:\WINDOWS\system32\winlogon.exe

C:\WINDOWS\system32\services.exe

C:\WINDOWS\system32\lsass.exe

C:\WINDOWS\system32\svchost.exe

C:\WINDOWS\System32\svchost.exe

C:\WINDOWS\system32\svchost.exe

C:\WINDOWS\system32\spoolsv.exe

C:\Program Files\Avira\AntiVir PersonalEdition Classic\sched.exe

C:\WINDOWS\system32\afisicx.exe

C:\Program Files\Avira\AntiVir PersonalEdition Classic\avguard.exe

C:\Program Files\B54GT Wireless Monitor\WLService.exe

C:\Program Files\B54GT Wireless Monitor\WLanCfgG.exe

C:\Program Files\Java\jre6\bin\jqs.exe

C:\WINDOWS\system32\mabidwe.exe

C:\WINDOWS\system32\noytcyr.exe

C:\WINDOWS\system32\roytctm.exe

C:\WINDOWS\system32\soxpeca.exe

C:\WINDOWS\system32\svchost.exe

C:\WINDOWS\system32\tdydowkc.exe

C:\WINDOWS\system32\wsldoekd.exe

C:\WINDOWS\Explorer.EXE

C:\Program Files\CyberLink\PowerDVD\PDVDServ.exe

C:\Acer\Empowering Technology\eRecovery\Monitor.exe

C:\WINDOWS\sm56hlpr.exe

C:\WINDOWS\system32\VTTimer.exe

C:\WINDOWS\system32\VTtrayp.exe

C:\WINDOWS\SOUNDMAN.EXE

C:\Program Files\B54GT Wireless Monitor\InfoMyCa.exe

C:\Program Files\Java\jre6\bin\jusched.exe

C:\Program Files\Avira\AntiVir PersonalEdition Classic\avgnt.exe

C:\Program Files\Windows Live\Messenger\MsnMsgr.Exe

C:\WINDOWS\system32\ctfmon.exe

C:\Program Files\Windows Live\Messenger\usnsvc.exe

C:\Program Files\Internet Explorer\IEXPLORE.EXE

C:\Program Files\Common Files\Microsoft Shared\Windows Live\WLLoginProxy.exe

C:\Documents and Settings\amadou\Desktop\HiJackThis.exe

 

R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157

R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896

R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896

R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?LinkId=69157

R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyOverride = *.local

O1 - Hosts: 82.98.86.162 stopjuggling.com

O2 - BHO: Adobe PDF Reader Link Helper - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 7.0\ActiveX\AcroIEHelper.dll (file missing)

O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre6\bin\ssv.dll

O2 - BHO: (no name) - {7E853D72-626A-48EC-A868-BA8D5E23E045} - (no file)

O2 - BHO: Windows Live Sign-in Helper - {9030D464-4C02-4ABF-8ECC-5164760863C6} - C:\Program Files\Common Files\Microsoft Shared\Windows Live\WindowsLiveLogin.dll

O2 - BHO: Java Plug-In 2 SSV Helper - {DBC80044-A445-435b-BC74-9C25C1C588A9} - C:\Program Files\Java\jre6\bin\jp2ssv.dll

O2 - BHO: JQSIEStartDetectorImpl - {E7E6F031-17CE-4C07-BC86-EABFE594F69C} - C:\Program Files\Java\jre6\lib\deploy\jqs\ie\jqs_plugin.dll

O4 - HKLM\..\Run: [LaunchApp] Alaunch

O4 - HKLM\..\Run: [RemoteControl] "C:\Program Files\CyberLink\PowerDVD\PDVDServ.exe"

O4 - HKLM\..\Run: [iMJPMIG8.1] "C:\WINDOWS\IME\imjp8_1\IMJPMIG.EXE" /Spoil /RemAdvDef /Migration32

O4 - HKLM\..\Run: [MSPY2002] C:\WINDOWS\system32\IME\PINTLGNT\ImScInst.exe /SYNC

O4 - HKLM\..\Run: [PHIME2002ASync] C:\WINDOWS\system32\IME\TINTLGNT\TINTSETP.EXE /SYNC

O4 - HKLM\..\Run: [PHIME2002A] C:\WINDOWS\system32\IME\TINTLGNT\TINTSETP.EXE /IMEName

O4 - HKLM\..\Run: [sMSERIAL] sm56hlpr.exe

O4 - HKLM\..\Run: [VTTimer] VTTimer.exe

O4 - HKLM\..\Run: [VTTrayp] VTtrayp.exe

O4 - HKLM\..\Run: [eRecoveryService] C:\Acer\Empowering Technology\eRecovery\Monitor.exe

O4 - HKLM\..\Run: [Cmaudio] RunDll32 cmicnfg.cpl,CMICtrlWnd

O4 - HKLM\..\Run: [soundMan] SOUNDMAN.EXE

O4 - HKLM\..\Run: [ACU] "C:\Program Files\TRENDware\TEW444UB\ACU.exe" -nogui

O4 - HKLM\..\Run: [infoMyCa.exe] C:\Program Files\B54GT Wireless Monitor\InfoMyCa.exe

O4 - HKLM\..\Run: [Athan] C:\Program Files\Athan\Athan.exe

O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime

O4 - HKLM\..\Run: [sunJavaUpdateSched] "C:\Program Files\Java\jre6\bin\jusched.exe"

O4 - HKLM\..\Run: [avgnt] "C:\Program Files\Avira\AntiVir PersonalEdition Classic\avgnt.exe" /min

O4 - HKCU\..\Run: [bitTorrent] "C:\Program Files\BitTorrent\bittorrent.exe" --force_start_minimized

O4 - HKCU\..\Run: [MsnMsgr] "C:\Program Files\Windows Live\Messenger\MsnMsgr.Exe" /background

O4 - HKCU\..\Run: [mschkdsk.exe] C:\WINDOWS\system32\mschkdsk.exe

O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe

O4 - HKCU\..\Run: [sqlserv] "C:\Documents and Settings\All Users\Application Data\sqlserv.exe"

O4 - HKUS\S-1-5-18\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'SYSTEM')

O4 - HKUS\.DEFAULT\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'Default user')

O4 - Global Startup: Adobe Reader Speed Launch.lnk = C:\Program Files\Adobe\Acrobat 7.0\Reader\reader_sl.exe

O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~2\OFFICE11\EXCEL.EXE/3000

O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~2\OFFICE11\REFIEBAR.DLL

O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe

O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe

O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe

O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe

O10 - Unknown file in Winsock LSP: c:\windows\system32\nwprovau.dll

O16 - DPF: {17492023-C23A-453E-A040-C7C580BBF700} (Windows Genuine Advantage Validation Tool) - http://go.microsoft.com/fwlink/?linkid=39204

O16 - DPF: {6E32070A-766D-4EE6-879C-DC1FA91D2FC3} (MUWebControl Class) - http://www.update.microsoft.com/microsoftu...b?1196738371271

O18 - Protocol: skype4com - {FFC8B962-9B40-4DFF-9458-1830C7DD7F5D} - C:\PROGRA~1\COMMON~1\Skype\SKYPE4~1.DLL

O20 - AppInit_DLLs: C:\Program,Files\RelevantKnowledge\rlai.dll,C:\Program Files\RelevantKnowledge\rlai.dll

O23 - Service: afinding Service (afinding) - Unknown owner - C:\WINDOWS\system32\AFinding.exe (file missing)

O23 - Service: afisicx Manages messages (afisicx) - Unknown owner - C:\WINDOWS\system32\afisicx.exe

O23 - Service: Avira AntiVir Personal - Free Antivirus Scheduler (AntiVirScheduler) - Avira GmbH - C:\Program Files\Avira\AntiVir PersonalEdition Classic\sched.exe

O23 - Service: Avira AntiVir Personal - Free Antivirus Guard (AntiVirService) - Avira GmbH - C:\Program Files\Avira\AntiVir PersonalEdition Classic\avguard.exe

O23 - Service: 802.11g Wireless Network Adapter (B54GT Wireless Service) - Unknown owner - C:\Program Files\B54GT Wireless Monitor\WLService.exe

O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Common Files\InstallShield\Driver\1150\Intel 32\IDriverT.exe

O23 - Service: Java Quick Starter (JavaQuickStarterService) - Sun Microsystems, Inc. - C:\Program Files\Java\jre6\bin\jqs.exe

O23 - Service: mabidwe Service (mabidwe) - Unknown owner - C:\WINDOWS\system32\mabidwe.exe

O23 - Service: macidwe Service (macidwe) - Unknown owner - C:\WINDOWS\system32\macidwe.exe (file missing)

O23 - Service: nobicyt Service (nobicyt) - Unknown owner - C:\WINDOWS\system32\Nobicyt.exe (file missing)

O23 - Service: noxtcyr Event propagation service (noxtcyr) - Unknown owner - C:\WINDOWS\system32\noxtcyr.exe (file missing)

O23 - Service: noytcyr Service (noytcyr) - Unknown owner - C:\WINDOWS\system32\noytcyr.exe

O23 - Service: routing Service (routing) - Unknown owner - C:\WINDOWS\system32\routing.exe (file missing)

O23 - Service: roxtctm Portable Media Serial Service (roxtctm) - Unknown owner - C:\WINDOWS\system32\roxtctm.exe (file missing)

O23 - Service: roytctm Service (roytctm) - Unknown owner - C:\WINDOWS\system32\roytctm.exe

O23 - Service: sobicyt Service (sobicyt) - Unknown owner - C:\WINDOWS\system32\sobicyt.exe (file missing)

O23 - Service: sotpeca Corporation inc. (sotpeca) - Unknown owner - C:\WINDOWS\system32\sotpeca.exe (file missing)

O23 - Service: soxpeca Service (soxpeca) - Unknown owner - C:\WINDOWS\system32\soxpeca.exe

O23 - Service: tdxdowkc Service (tdxdowkc) - Unknown owner - C:\WINDOWS\system32\tdxdowkc.exe (file missing)

O23 - Service: tdydowkc Service (tdydowkc) - Unknown owner - C:\WINDOWS\system32\tdydowkc.exe

O23 - Service: Windowhelp - Unknown owner - c:\Recycler\svchost.exe (file missing)

O23 - Service: wserving Service (wserving) - Unknown owner - C:\WINDOWS\system32\WServing.exe (file missing)

O23 - Service: wsldoekd Co. Ltd. (wsldoekd) - Unknown owner - C:\WINDOWS\system32\wsldoekd.exe

 

--

End of file - 9136 bytes

Posté(e)

Bonjour,

 

# vous devez désactiver la protection en temps réel, de votre antivirus qui détecte certains composants de ce logiciel comme néfastes.

* Pour cela, faites un clic droit sur l'icône en bas à droite à côté de l'horloge.

Si vous utilisez Spybot

Pour désactiver TeaTimer qui ne set à rien et peut faire échouer une désinfection:!

Afficher d'abord le Mode Avancé dans SpyBot

->Options Avancées :

- >menu Mode, Mode Avancé.

Une colonne de menus apparaît dans la partie gauche :

- >cliquer sur Outils,

- >cliquer sur Résident,

Dans Résident :

- >décocher Résident "TeaTimer" pour le désactiver.

Télécharger SDFix par AndyManchesta

et le sauvegarder sur le Bureau.

Double cliquer sur SDFix.exe et choisir Install pour l'extraire

SDFix s'installe à la racine de la partition système (par défaut, Généralement C:). .

 

Redémarrer en mode sans échec

 

* Ouvrir le dossier SDFix qui vient d'être créé dans le répertoire C:\ et double clic sur RunThis.bat pour lancer le script.

* Appuyer sur Y pour commencer le processus de nettoyage.

* Il va supprimer les services et les entrées du Registre de certains trojans trouvés puis demandera d'appuyer sur une touche pour redémarrer.

 

Si Sdfix ne se lance pas

1)Démarrer->Exécuter

Copiez/collez :

%systemroot%\system32\cmd.exe /K %systemdrive%\SDFix\apps\FixPath.exe

cliquez ok, et validez.

Redémarrez et essayez de nouveau de lancer Sdfix.

 

2)Si vous avez le message Cette commande a été désactivée par votre Administrateur

Appuyez sur une touche pour continuer:

Démarrer->Exécuter

Copiez/Collez

%systemdrive%\SDFix\apps\swreg IMPORT %systemdrive%\SDFix\apps\Enable_Command_Prompt.reg

Validez

Relancez Sdfix

 

* Le redémarrage sera plus lent qu'à l'accoutumée car l'outil va continuer à s'exécuter et supprimer des fichiers.

* Après le chargement du Bureau, l'outil terminera son travail et affichera Finished.

* Appuyer sur une touche pour finir l'exécution du script et charger les icônes du Bureau.

* Les icônes du Bureau affichées, le rapport SDFix s'ouvrira à l'écran et s'enregistrera aussi dans le dossier SDFix sous le nom Report.txt

* Postez le rapport ici.

 

Cet outil est conçu pour traiter les infections de type "Lop , Cid, Trojan Swizzor" , il peut indiquer des Fichiers / Dossiers légitimes !

 

Désactiver les protections résidentes ( Antivirus, etc...), vous les réactiverez ensuite,

Si vous utilisez Spybot

Pour désactiver TeaTimer qui ne set à rien et peut faire échouer une désinfection:!

Afficher d'abord le Mode Avancé dans SpyBot

->Options Avancées :

- >menu Mode, Mode Avancé.

Une colonne de menus apparaît dans la partie gauche :

- >cliquer sur Outils,

- >cliquer sur Résident,

Dans Résident :

- >décocher Résident "TeaTimer" pour le désactiver.

Télécharger Lop S&D de Eric71

sur le bureau,

 

* Double-cliquer dessus pour lancer l'installation

* Puis double-cliquer sur le raccourci Lop S&D présent sur le bureau

* Séléctionner la langue souhaitée , puis choisir l'Option 1:Recherche

* En cas de blocage au démarrage

Démarrer / Exécuter / cmd

Copiez/collez, dans la fenêtre del /Q "%systemdrive%\Lop SD\osv.exe" & "%systemdrive%\Lop SD\lopsd.cmd"

et valider , il devrait se lancer tout seul ,

* Patienter jusqu'à la fin du scan

* Poster le rapport généré (C:\lopR.txt)

( Si le Bureau ne réapparait pas

presser Ctrl + Alt + Suppr , Onglet Fichier , Nouvelle tâche , taper explorer.exe et valider )

Relancer Lop S&D

* Choisir l'Option 2 :Suppression

* Ne fermez pas la fenêtre lors de la suppression !

* Poster le rapport généré (C:\lopR.txt)

(Si le Bureau ne réapparaît pas presser Ctrl + Alt + Suppr , Onglet Fichier , Nouvelle tâche , taper explorer.exe et valider)

 

 

"En cas de réticenses(Nouveau->Lopscript):

Sélectionner entièrement l'encadré ci-dessous , puis clic droit et choisir Copier

(exemple fichiers non détéctés)

C:\ProgramData\HECKMEALJUMP

C:\Program Files\HECKMEALJUMP

C:\ProgramData\third lies itch ford\Book dupe.exe

C:\ProgramData\third lies itch ford

ici ce qui est à supprimer

 

Relancer Lop S&D

Cliquer sur Option 4 : LopScript

Une page blanche va s'ouvrir , cliquer droit dessus et choisir Coller

Fermer la page , il sera demandé de l'enregistrer , cliquer sur [Enregistrer]

Ne fermez pas la fenêtre lors de la suppression !

Postez le rapport généré ( C:\lopR.txt )

( Si le Bureau ne réapparaît pas presser Ctrl + Alt + Suppr , Onglet Fichier , Nouvelle tâche , taper explorer.exe et valider )

Posté(e)

Bonsoir, voici le rapport SDFix

 

 

Checking Files :

 

Trojan Files Found:

 

C:\Documents and Settings\amadou\Application Data\Adobe\crc.dat - Deleted

 

 

 

 

 

Removing Temp Files

 

ADS Check :

 

 

 

Final Check :

 

catchme 0.3.1361.2 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net

Rootkit scan 2009-01-21 22:52:50

Windows 5.1.2600 Service Pack 3 NTFS

 

scanning hidden processes ...

 

scanning hidden services & system hive ...

 

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\sptd\Cfg]

"s1"=dword:f5da4ee6

"s2"=dword:2183c18d

"h0"=dword:00000002

 

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\sptd\Cfg\0D79C293C1ED61418462E24595C90D04]

"h0"=dword:00000000

"ujdew"=hex:99,24,88,e4,a0,c7,33,b3,86,93,9a,f5,30,c9,1a,a8,4f,36,4d,ee,4e,..

 

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4]

"h0"=dword:00000001

"khjeh"=hex:66,52,03,dc,b6,2f,85,9e,0c,ed,62,99,d9,2b,ec,97,8f,04,7a,e9,c6,..

 

scanning hidden registry entries ...

 

scanning hidden files ...

 

scan completed successfully

hidden processes: 0

hidden services: 0

hidden files: 0

 

 

Remaining Services :

 

 

 

 

Authorized Application Key Export:

 

[HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\standardprofile\authorizedapplications\list]

"C:\\Program Files\\Acer\\Acer eConsole\\MediaServerService.exe"="C:\\Program Files\\Acer\\Acer eConsole\\MediaServerService.exe:LocalSubNet:Enabled:Acer Media Server"

"C:\\Documents and Settings\\amadou\\Desktop\\utorrent.exe"="C:\\Documents and Settings\\amadou\\Desktop\\utorrent.exe:*:Enabled:æTorrent"

"C:\\Program Files\\Utorrent\\utorrent.exe"="C:\\Program Files\\Utorrent\\utorrent.exe:*:Enabled:æTorrent"

"C:\\Documents and Settings\\amadou\\Desktop\\utorrent-1.6.1-beta-build-483.exe"="C:\\Documents and Settings\\amadou\\Desktop\\utorrent-1.6.1-beta-build-483.exe:*:Enabled:æTorrent"

"C:\\Program Files\\Internet Explorer\\iexplore.exe"="C:\\Program Files\\Internet Explorer\\iexplore.exe:*:Enabled:Internet Explorer"

"C:\\Program Files\\Mozilla Firefox\\firefox.exe"="C:\\Program Files\\Mozilla Firefox\\firefox.exe:*:Enabled:Firefox"

"%windir%\\Network Diagnostic\\xpnetdiag.exe"="%windir%\\Network Diagnostic\\xpnetdiag.exe:*:Enabled:@xpsp3res.dll,-20000"

"C:\\Program Files\\BitTorrent\\bittorrent.exe"="C:\\Program Files\\BitTorrent\\bittorrent.exe:*:Disabled:BitTorrent"

"C:\\Program Files\\Bonjour\\mDNSResponder.exe"="C:\\Program Files\\Bonjour\\mDNSResponder.exe:*:Disabled:Bonjour"

"C:\\Program Files\\Acer\\Acer eConsole\\eConsole.exe"="C:\\Program Files\\Acer\\Acer eConsole\\eConsole.exe:LocalSubNet:Disabled:eConsole"

"C:\\Program Files\\Acer\\Acer eConsole\\MediaSync.exe"="C:\\Program Files\\Acer\\Acer eConsole\\MediaSync.exe:LocalSubNet:Disabled:Media Synchoronizer"

"C:\\WINDOWS\\system32\\sessmgr.exe"="C:\\WINDOWS\\system32\\sessmgr.exe:*:Disabled:@xpsp2res.dll,-22019"

"C:\\Program Files\\Messenger\\msmsgs.exe"="C:\\Program Files\\Messenger\\msmsgs.exe:*:Disabled:Windows Messenger"

"%windir%\\system32\\sessmgr.exe"="%windir%\\system32\\sessmgr.exe:*:enabled:@xpsp2res.dll,-22019"

"C:\\Program Files\\Windows Live\\Messenger\\msnmsgr.exe"="C:\\Program Files\\Windows Live\\Messenger\\msnmsgr.exe:*:Enabled:Windows Live Messenger"

"C:\\Program Files\\Windows Live\\Messenger\\livecall.exe"="C:\\Program Files\\Windows Live\\Messenger\\livecall.exe:*:Enabled:Windows Live Messenger (Phone)"

"C:\\Program Files\\Skype\\Phone\\Skype.exe"="C:\\Program Files\\Skype\\Phone\\Skype.exe:*:Enabled:Skype"

"C:\\Program Files\\Java\\jre6\\bin\\java.exe"="C:\\Program Files\\Java\\jre6\\bin\\java.exe:*:Enabled:Java Platform SE binary"

"C:\\Program Files\\Real\\RealPlayer\\realplay.exe"="C:\\Program Files\\Real\\RealPlayer\\realplay.exe:*:Enabled:RealPlayer"

"C:\\Program Files\\Windows Media Player\\wmplayer.exe"="C:\\Program Files\\Windows Media Player\\wmplayer.exe:*:Enabled:wmplayer"

 

[HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\domainprofile\authorizedapplications\list]

"%windir%\\system32\\sessmgr.exe"="%windir%\\system32\\sessmgr.exe:*:enabled:@xpsp2res.dll,-22019"

"%windir%\\Network Diagnostic\\xpnetdiag.exe"="%windir%\\Network Diagnostic\\xpnetdiag.exe:*:Enabled:@xpsp3res.dll,-20000"

"C:\\Program Files\\Windows Live\\Messenger\\msnmsgr.exe"="C:\\Program Files\\Windows Live\\Messenger\\msnmsgr.exe:*:Enabled:Windows Live Messenger"

"C:\\Program Files\\Windows Live\\Messenger\\livecall.exe"="C:\\Program Files\\Windows Live\\Messenger\\livecall.exe:*:Enabled:Windows Live Messenger (Phone)"

 

Remaining Files :

 

 

File Backups: - C:\SDFix\backups\backups.zip

 

Files with Hidden Attributes :

 

Sun 13 Apr 2008 60,416 A.SH. --- "C:\Program Files\Outlook Express\msimn.exe"

Wed 6 Aug 2003 24,576 A..H. --- "C:\WINDOWS\system32\KCMDNIns.exe"

Tue 6 Dec 2005 1,024 A..HR --- "C:\WINDOWS\system32\NTIBUN4.dll"

Tue 6 Dec 2005 1,024 A..HR --- "C:\WINDOWS\system32\NTICDMK7.dll"

Tue 6 Dec 2005 1,024 A..HR --- "C:\WINDOWS\system32\NTIFCD3.dll"

Tue 7 Aug 2007 1,024 A..HR --- "C:\WINDOWS\system32\NTIMP3.dll"

Tue 6 Dec 2005 1,024 A..HR --- "C:\WINDOWS\system32\NTIMPEG2.dll"

Thu 7 Aug 2003 24,576 A..H. --- "C:\WINDOWS\system32\reboot.exe"

Mon 30 Aug 2004 44,032 A..H. --- "C:\WINDOWS\system32\rescan.exe"

Fri 2 Feb 2007 616,448 A.SH. --- "C:\WINDOWS\temp\18yokz4b.TMP"

Fri 6 Jul 2007 616,448 A.SH. --- "C:\WINDOWS\temp\6arl3syh.TMP"

Mon 26 Nov 2007 616,448 A.SH. --- "C:\WINDOWS\temp\pgdx0fnn.TMP"

Fri 8 Sep 2006 4,348 ..SH. --- "C:\Documents and Settings\All Users\DRM\DRMv1.bak"

Sun 13 Apr 2008 60,416 A.SH. --- "C:\WINDOWS\BricoPacks\SysFiles\69_msimn.exe"

Mon 12 Jan 2009 0 A.SH. --- "C:\Documents and Settings\All Users\DRM\Cache\Indiv02.tmp"

Mon 11 Feb 2008 25,088 ...H. --- "C:\Documents and Settings\amadou\My Documents\UdeM\Hiver 08\~WRL0005.tmp"

Wed 5 Dec 2007 33,792 ...H. --- "C:\Documents and Settings\amadou\My Documents\UdeM\Automne 07\POL 3241\~WRL1183.tmp"

Thu 11 Dec 2008 27,136 ...H. --- "C:\Documents and Settings\amadou\My Documents\UdeM\Automne 08\PPL 3060\~WRL0210.tmp"

Tue 25 Nov 2008 50,176 ...H. --- "C:\Documents and Settings\amadou\My Documents\UdeM\Automne 08\PPL 3060\~WRL3496.tmp"

 

Finished!

Posté(e)

Bonjour,

 

Vous allez télécharger Combofix.

 

Renommer ComboFix seulement si on vous le demande

Dans certains cas, Ver Bagle, Rootkit Tdss par exemple,il est nécessaire de renommer ComboFix.exe avant le téléchargement pour traiter l' infection.

Désinstallez Combofix, s'il est sur votre machine.

Démarrer > Exécuter ->combofix.exe /u

Valider par OK

ComboFix démarre et affiche un message disant que ComboFix est bien éliminé: cliquer sur OK.

Attention, par défaut, Firefox ne permet pas le renommage avant sauvegarde, utiliser plutôt IE

Pour le renommer:

Clic droit sur http://download.bleepingcomputer.com/sUBs/ComboFix.exe

Choisir "Enregistrer la cible du lien..sous....votre nom.exe ( par exemple dupont.exe)

Choisir le bureau

En bas, à Nom du Fichier:

Vous devez obtenir -> votre nom.exe

Cliquez enfin sur -> Enregistrer

Lancez votrenom.exe

En cas de problème, :

méthode illustrée

 

Ce logiciel est très puissant et ne doit pas être utilisé sans une aide compétente sous peine de risquer des dommages irréversibles.

Veuillez noter que ce logiciel est régulièrement mis à jour et que la version que vous allez charger sera obsolète dans quelques jours.

Avant de l'installer,lisez ce Mode opératoire:

Ensuite

Télécharger combofix.exe de sUBs

et sauvegardez le sur le bureau

 

Fermez ou désactivez tous les programmes Antivirus, Antispyware, Pare-feu actifs car ils pourraient perturber le fonctionnement de cet outil

Cela est absolument nécessaire au succès de la procédure.

Bien évidemment, vous les rétablirez ensuite.

 

*Double cliquer sur combofix.exe pour le lancer.

Ne pas fermer la fenêtre qui vient de s'ouvrir , le bureau serait vide et cela pourrait entraîner un plantage du programme!

Pour lancer le scan

Connecter tous les disques amovibles (disque dur externe, clé USB).

* Taper sur la touche 1 pour démarrer le scan.

Si pour une raison quelconque, Vista par exemple, combofix ne se lançait pas,

Démarrez en mode sans échec, choisissez le compte Administrateur, lancez Combofix

Lorsque ComboFix tourne, ne touchez plus du tout à votre ordinateur, vous risqueriez de planter le programme.

 

* Le scan pourrait prendre un certain temps:Soyez patient!

A la fin,,un rapport sera généré : postez en le contenu dans un prochain message.

* Si le rapport est trop long, postez le en deux fois.

Il se trouve à c:\combofix.txt

Posté(e)

Bonjour,

Voici le rapport combofix en 2 partie (1/2) :

 

ComboFix 09-01-21.04 - amadou 2009-01-22 22:58:11.1 - NTFSx86

Microsoft Windows XP Home Edition 5.1.2600.3.1252.1.1033.18.447.209 [GMT -5:00]

Running from: c:\documents and settings\amadou\Desktop\ComboFix.exe

AV: Avira AntiVir PersonalEdition *On-access scanning disabled* (Updated)

* Created a new restore point

.

 

((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))

.

 

c:\documents and settings\All Users\Application Data\autorun.inf

c:\windows\2.exe

c:\windows\Install.txt

c:\windows\system32\_004424_.tmp.dll

c:\windows\system32\_004425_.tmp.dll

c:\windows\system32\_004426_.tmp.dll

c:\windows\system32\_004427_.tmp.dll

c:\windows\system32\_004434_.tmp.dll

c:\windows\system32\_004435_.tmp.dll

c:\windows\system32\_004436_.tmp.dll

c:\windows\system32\_004437_.tmp.dll

c:\windows\system32\_004438_.tmp.dll

c:\windows\system32\_004439_.tmp.dll

c:\windows\system32\_004440_.tmp.dll

c:\windows\system32\_004441_.tmp.dll

c:\windows\system32\_004442_.tmp.dll

c:\windows\system32\_004443_.tmp.dll

c:\windows\system32\_004444_.tmp.dll

c:\windows\system32\_004445_.tmp.dll

c:\windows\system32\_004446_.tmp.dll

c:\windows\system32\_004447_.tmp.dll

c:\windows\system32\_004449_.tmp.dll

c:\windows\system32\_004452_.tmp.dll

c:\windows\system32\_004453_.tmp.dll

c:\windows\system32\_004457_.tmp.dll

c:\windows\system32\_004458_.tmp.dll

c:\windows\system32\_004459_.tmp.dll

c:\windows\system32\_004460_.tmp.dll

c:\windows\system32\_004461_.tmp.dll

c:\windows\system32\_004462_.tmp.dll

c:\windows\system32\_004463_.tmp.dll

c:\windows\system32\_004465_.tmp.dll

c:\windows\system32\_004466_.tmp.dll

c:\windows\system32\_004467_.tmp.dll

c:\windows\system32\_004468_.tmp.dll

c:\windows\system32\_004469_.tmp.dll

c:\windows\system32\_004470_.tmp.dll

c:\windows\system32\_004471_.tmp.dll

c:\windows\system32\_004472_.tmp.dll

c:\windows\system32\_004473_.tmp.dll

c:\windows\system32\_004474_.tmp.dll

c:\windows\system32\_004475_.tmp.dll

c:\windows\system32\_004478_.tmp.dll

c:\windows\system32\_004479_.tmp.dll

c:\windows\system32\_004480_.tmp.dll

c:\windows\system32\_004482_.tmp.dll

c:\windows\system32\_004483_.tmp.dll

c:\windows\system32\_004484_.tmp.dll

c:\windows\system32\_004485_.tmp.dll

c:\windows\system32\_004487_.tmp.dll

c:\windows\system32\_004490_.tmp.dll

c:\windows\system32\_004491_.tmp.dll

c:\windows\system32\_004495_.tmp.dll

c:\windows\system32\_004496_.tmp.dll

c:\windows\system32\_004498_.tmp.dll

c:\windows\system32\_004501_.tmp.dll

c:\windows\system32\_004503_.tmp.dll

c:\windows\system32\_004504_.tmp.dll

c:\windows\system32\_004505_.tmp.dll

c:\windows\system32\_004506_.tmp.dll

c:\windows\system32\_004509_.tmp.dll

c:\windows\system32\_004510_.tmp.dll

c:\windows\system32\_004511_.tmp.dll

c:\windows\system32\_004512_.tmp.dll

c:\windows\system32\_004513_.tmp.dll

c:\windows\system32\_004518_.tmp.dll

c:\windows\system32\_004520_.tmp.dll

c:\windows\system32\_004705_.tmp.dll

c:\windows\system32\_004706_.tmp.dll

c:\windows\system32\_004707_.tmp.dll

c:\windows\system32\_004708_.tmp.dll

c:\windows\system32\_004715_.tmp.dll

c:\windows\system32\_004716_.tmp.dll

c:\windows\system32\_004717_.tmp.dll

c:\windows\system32\_004718_.tmp.dll

c:\windows\system32\_004719_.tmp.dll

c:\windows\system32\_004720_.tmp.dll

c:\windows\system32\_004721_.tmp.dll

c:\windows\system32\_004722_.tmp.dll

c:\windows\system32\_004723_.tmp.dll

c:\windows\system32\_004724_.tmp.dll

c:\windows\system32\_004725_.tmp.dll

c:\windows\system32\_004726_.tmp.dll

c:\windows\system32\_004727_.tmp.dll

c:\windows\system32\_004728_.tmp.dll

c:\windows\system32\_004729_.tmp.dll

c:\windows\system32\_004730_.tmp.dll

c:\windows\system32\_004731_.tmp.dll

c:\windows\system32\_004732_.tmp.dll

c:\windows\system32\_004733_.tmp.dll

c:\windows\system32\_004734_.tmp.dll

c:\windows\system32\_004735_.tmp.dll

c:\windows\system32\_004736_.tmp.dll

c:\windows\system32\_004737_.tmp.dll

c:\windows\system32\_004738_.tmp.dll

c:\windows\system32\_004739_.tmp.dll

c:\windows\system32\_004740_.tmp.dll

c:\windows\system32\_004741_.tmp.dll

c:\windows\system32\_004742_.tmp.dll

c:\windows\system32\_004743_.tmp.dll

c:\windows\system32\_004744_.tmp.dll

c:\windows\system32\_004745_.tmp.dll

c:\windows\system32\_004746_.tmp.dll

c:\windows\system32\_004747_.tmp.dll

c:\windows\system32\_004748_.tmp.dll

c:\windows\system32\_004749_.tmp.dll

c:\windows\system32\_004750_.tmp.dll

c:\windows\system32\_004751_.tmp.dll

c:\windows\system32\_004752_.tmp.dll

c:\windows\system32\_004753_.tmp.dll

c:\windows\system32\_004754_.tmp.dll

c:\windows\system32\_004755_.tmp.dll

c:\windows\system32\_004756_.tmp.dll

c:\windows\system32\_004757_.tmp.dll

c:\windows\system32\_004758_.tmp.dll

c:\windows\system32\_004759_.tmp.dll

c:\windows\system32\_004760_.tmp.dll

c:\windows\system32\_004761_.tmp.dll

c:\windows\system32\_004762_.tmp.dll

c:\windows\system32\_004763_.tmp.dll

c:\windows\system32\_004764_.tmp.dll

c:\windows\system32\_004765_.tmp.dll

c:\windows\system32\_004766_.tmp.dll

c:\windows\system32\_004767_.tmp.dll

c:\windows\system32\_004768_.tmp.dll

c:\windows\system32\_004769_.tmp.dll

c:\windows\system32\_004770_.tmp.dll

c:\windows\system32\_004771_.tmp.dll

c:\windows\system32\_004772_.tmp.dll

c:\windows\system32\_004773_.tmp.dll

c:\windows\system32\_004774_.tmp.dll

c:\windows\system32\_004775_.tmp.dll

c:\windows\system32\_004776_.tmp.dll

c:\windows\system32\_004777_.tmp.dll

c:\windows\system32\_004778_.tmp.dll

c:\windows\system32\_004779_.tmp.dll

c:\windows\system32\_004780_.tmp.dll

c:\windows\system32\_004781_.tmp.dll

c:\windows\system32\_004782_.tmp.dll

c:\windows\system32\_004783_.tmp.dll

c:\windows\system32\_004784_.tmp.dll

c:\windows\system32\_004785_.tmp.dll

c:\windows\system32\_004786_.tmp.dll

c:\windows\system32\_004787_.tmp.dll

c:\windows\system32\_004788_.tmp.dll

c:\windows\system32\_004789_.tmp.dll

c:\windows\system32\_004790_.tmp.dll

c:\windows\system32\_004791_.tmp.dll

c:\windows\system32\_004792_.tmp.dll

c:\windows\system32\_004793_.tmp.dll

c:\windows\system32\_004794_.tmp.dll

c:\windows\system32\_004795_.tmp.dll

c:\windows\system32\_004796_.tmp.dll

c:\windows\system32\_004797_.tmp.dll

c:\windows\system32\_004798_.tmp.dll

c:\windows\system32\_004799_.tmp.dll

c:\windows\system32\_004800_.tmp.dll

c:\windows\system32\_004801_.tmp.dll

c:\windows\system32\_004802_.tmp.dll

c:\windows\system32\_004803_.tmp.dll

c:\windows\system32\_004804_.tmp.dll

c:\windows\system32\_004805_.tmp.dll

c:\windows\system32\_004806_.tmp.dll

c:\windows\system32\_004807_.tmp.dll

c:\windows\system32\_004808_.tmp.dll

c:\windows\system32\_004809_.tmp.dll

c:\windows\system32\_004810_.tmp.dll

c:\windows\system32\_004811_.tmp.dll

c:\windows\system32\_004812_.tmp.dll

c:\windows\system32\_004813_.tmp.dll

c:\windows\system32\_004814_.tmp.dll

c:\windows\system32\_004815_.tmp.dll

c:\windows\system32\_004816_.tmp.dll

c:\windows\system32\_004817_.tmp.dll

c:\windows\system32\_004818_.tmp.dll

c:\windows\system32\_004819_.tmp.dll

c:\windows\system32\_004820_.tmp.dll

c:\windows\system32\_004821_.tmp.dll

c:\windows\system32\_004822_.tmp.dll

c:\windows\system32\_004823_.tmp.dll

c:\windows\system32\_004824_.tmp.dll

c:\windows\system32\_004825_.tmp.dll

c:\windows\system32\_004826_.tmp.dll

c:\windows\system32\_004827_.tmp.dll

c:\windows\system32\_004828_.tmp.dll

c:\windows\system32\_004829_.tmp.dll

c:\windows\system32\_004830_.tmp.dll

c:\windows\system32\_004831_.tmp.dll

c:\windows\system32\_004832_.tmp.dll

c:\windows\system32\_004833_.tmp.dll

c:\windows\system32\_004834_.tmp.dll

c:\windows\system32\_004835_.tmp.dll

c:\windows\system32\_004836_.tmp.dll

c:\windows\system32\_004837_.tmp.dll

c:\windows\system32\_004838_.tmp.dll

c:\windows\system32\_004839_.tmp.dll

c:\windows\system32\_004840_.tmp.dll

c:\windows\system32\_004841_.tmp.dll

c:\windows\system32\_004842_.tmp.dll

c:\windows\system32\_004843_.tmp.dll

c:\windows\system32\_004844_.tmp.dll

c:\windows\system32\_004845_.tmp.dll

c:\windows\system32\_004846_.tmp.dll

c:\windows\system32\_004847_.tmp.dll

c:\windows\system32\_004848_.tmp.dll

c:\windows\system32\_004849_.tmp.dll

c:\windows\system32\_004850_.tmp.dll

c:\windows\system32\_004851_.tmp.dll

c:\windows\system32\_004852_.tmp.dll

c:\windows\system32\_004853_.tmp.dll

c:\windows\system32\_004854_.tmp.dll

c:\windows\system32\_004855_.tmp.dll

c:\windows\system32\_004856_.tmp.dll

c:\windows\system32\_004857_.tmp.dll

c:\windows\system32\_004858_.tmp.dll

c:\windows\system32\_004859_.tmp.dll

c:\windows\system32\_004860_.tmp.dll

c:\windows\system32\_004861_.tmp.dll

c:\windows\system32\_004862_.tmp.dll

c:\windows\system32\_004863_.tmp.dll

c:\windows\system32\_004864_.tmp.dll

c:\windows\system32\_004865_.tmp.dll

c:\windows\system32\_004866_.tmp.dll

c:\windows\system32\_004867_.tmp.dll

c:\windows\system32\_004868_.tmp.dll

c:\windows\system32\_004869_.tmp.dll

c:\windows\system32\_004870_.tmp.dll

c:\windows\system32\_004871_.tmp.dll

c:\windows\system32\_004872_.tmp.dll

c:\windows\system32\_004873_.tmp.dll

c:\windows\system32\_004874_.tmp.dll

c:\windows\system32\_004875_.tmp.dll

c:\windows\system32\_004876_.tmp.dll

c:\windows\system32\_004877_.tmp.dll

c:\windows\system32\_004878_.tmp.dll

c:\windows\system32\_004879_.tmp.dll

c:\windows\system32\_004880_.tmp.dll

c:\windows\system32\_004881_.tmp.dll

c:\windows\system32\_004882_.tmp.dll

c:\windows\system32\_004883_.tmp.dll

c:\windows\system32\_004884_.tmp.dll

c:\windows\system32\_004885_.tmp.dll

c:\windows\system32\_004886_.tmp.dll

c:\windows\system32\_004887_.tmp.dll

c:\windows\system32\_004888_.tmp.dll

c:\windows\system32\_004889_.tmp.dll

c:\windows\system32\_004890_.tmp.dll

c:\windows\system32\_004891_.tmp.dll

c:\windows\system32\_004892_.tmp.dll

c:\windows\system32\_004893_.tmp.dll

c:\windows\system32\_004894_.tmp.dll

c:\windows\system32\_004895_.tmp.dll

c:\windows\system32\_004896_.tmp.dll

c:\windows\system32\_004897_.tmp.dll

c:\windows\system32\_004898_.tmp.dll

c:\windows\system32\_004899_.tmp.dll

c:\windows\system32\_004900_.tmp.dll

c:\windows\system32\_004901_.tmp.dll

c:\windows\system32\_004902_.tmp.dll

c:\windows\system32\_004903_.tmp.dll

c:\windows\system32\_004904_.tmp.dll

c:\windows\system32\_004905_.tmp.dll

c:\windows\system32\_004906_.tmp.dll

c:\windows\system32\_004907_.tmp.dll

c:\windows\system32\_004908_.tmp.dll

c:\windows\system32\_004909_.tmp.dll

c:\windows\system32\_004910_.tmp.dll

c:\windows\system32\_004911_.tmp.dll

c:\windows\system32\_004912_.tmp.dll

c:\windows\system32\_004913_.tmp.dll

c:\windows\system32\_004914_.tmp.dll

c:\windows\system32\_004915_.tmp.dll

c:\windows\system32\_004916_.tmp.dll

c:\windows\system32\_004917_.tmp.dll

c:\windows\system32\_004918_.tmp.dll

c:\windows\system32\_004919_.tmp.dll

c:\windows\system32\_004920_.tmp.dll

c:\windows\system32\_004921_.tmp.dll

c:\windows\system32\_004922_.tmp.dll

c:\windows\system32\_004923_.tmp.dll

c:\windows\system32\_004924_.tmp.dll

c:\windows\system32\_004925_.tmp.dll

c:\windows\system32\_004926_.tmp.dll

c:\windows\system32\_004927_.tmp.dll

c:\windows\system32\_004928_.tmp.dll

c:\windows\system32\_004929_.tmp.dll

c:\windows\system32\_004930_.tmp.dll

c:\windows\system32\_004931_.tmp.dll

c:\windows\system32\_004932_.tmp.dll

c:\windows\system32\_004933_.tmp.dll

c:\windows\system32\_004934_.tmp.dll

c:\windows\system32\_004935_.tmp.dll

c:\windows\system32\_004936_.tmp.dll

c:\windows\system32\_004937_.tmp.dll

c:\windows\system32\_004938_.tmp.dll

c:\windows\system32\_004939_.tmp.dll

c:\windows\system32\_004940_.tmp.dll

c:\windows\system32\_004941_.tmp.dll

c:\windows\system32\_004942_.tmp.dll

c:\windows\system32\_004943_.tmp.dll

c:\windows\system32\_004945_.tmp.dll

c:\windows\system32\_004946_.tmp.dll

c:\windows\system32\_004947_.tmp.dll

c:\windows\system32\_004948_.tmp.dll

c:\windows\system32\_004949_.tmp.dll

c:\windows\system32\_004950_.tmp.dll

c:\windows\system32\_004951_.tmp.dll

c:\windows\system32\_004953_.tmp.dll

c:\windows\system32\_004954_.tmp.dll

c:\windows\system32\_004955_.tmp.dll

c:\windows\system32\_004956_.tmp.dll

c:\windows\system32\_004957_.tmp.dll

c:\windows\system32\_004958_.tmp.dll

c:\windows\system32\_004959_.tmp.dll

c:\windows\system32\_004960_.tmp.dll

c:\windows\system32\_004961_.tmp.dll

c:\windows\system32\_004962_.tmp.dll

c:\windows\system32\_004963_.tmp.dll

c:\windows\system32\_004964_.tmp.dll

c:\windows\system32\_004965_.tmp.dll

c:\windows\system32\_004966_.tmp.dll

c:\windows\system32\_004967_.tmp.dll

c:\windows\system32\_004968_.tmp.dll

c:\windows\system32\_004970_.tmp.dll

c:\windows\system32\_004971_.tmp.dll

c:\windows\system32\_004972_.tmp.dll

c:\windows\system32\_004973_.tmp.dll

c:\windows\system32\_004975_.tmp.dll

c:\windows\system32\_004977_.tmp.dll

c:\windows\system32\_004978_.tmp.dll

c:\windows\system32\_004979_.tmp.dll

c:\windows\system32\_004980_.tmp.dll

c:\windows\system32\_004981_.tmp.dll

c:\windows\system32\_004982_.tmp.dll

c:\windows\system32\_004983_.tmp.dll

c:\windows\system32\_004985_.tmp.dll

c:\windows\system32\_004986_.tmp.dll

c:\windows\system32\_004987_.tmp.dll

c:\windows\system32\_004988_.tmp.dll

c:\windows\system32\_004989_.tmp.dll

c:\windows\system32\_004990_.tmp.dll

c:\windows\system32\_004991_.tmp.dll

c:\windows\system32\_004992_.tmp.dll

c:\windows\system32\_004993_.tmp.dll

c:\windows\system32\_004994_.tmp.dll

c:\windows\system32\_004995_.tmp.dll

c:\windows\system32\_004996_.tmp.dll

c:\windows\system32\_004997_.tmp.dll

c:\windows\system32\_004998_.tmp.dll

c:\windows\system32\_004999_.tmp.dll

c:\windows\system32\_005000_.tmp.dll

c:\windows\system32\_005001_.tmp.dll

c:\windows\system32\_005003_.tmp.dll

c:\windows\system32\_005004_.tmp.dll

c:\windows\system32\_005005_.tmp.dll

c:\windows\system32\_005006_.tmp.dll

c:\windows\system32\_005007_.tmp.dll

c:\windows\system32\_005010_.tmp.dll

c:\windows\system32\_005011_.tmp.dll

c:\windows\system32\_005012_.tmp.dll

c:\windows\system32\_005013_.tmp.dll

c:\windows\system32\_005014_.tmp.dll

c:\windows\system32\_005015_.tmp.dll

c:\windows\system32\_005016_.tmp.dll

c:\windows\system32\_005018_.tmp.dll

c:\windows\system32\_005019_.tmp.dll

c:\windows\system32\_005020_.tmp.dll

c:\windows\system32\_005021_.tmp.dll

c:\windows\system32\_005022_.tmp.dll

c:\windows\system32\_005023_.tmp.dll

c:\windows\system32\_005024_.tmp.dll

c:\windows\system32\_005025_.tmp.dll

c:\windows\system32\_005027_.tmp.dll

c:\windows\system32\_005028_.tmp.dll

c:\windows\system32\_005029_.tmp.dll

c:\windows\system32\_005032_.tmp.dll

c:\windows\system32\_005033_.tmp.dll

c:\windows\system32\_005037_.tmp.dll

c:\windows\system32\_005038_.tmp.dll

c:\windows\system32\_005040_.tmp.dll

c:\windows\system32\_005043_.tmp.dll

c:\windows\system32\_005045_.tmp.dll

c:\windows\system32\_005046_.tmp.dll

c:\windows\system32\_005047_.tmp.dll

c:\windows\system32\_005048_.tmp.dll

c:\windows\system32\_005051_.tmp.dll

c:\windows\system32\_005052_.tmp.dll

c:\windows\system32\_005053_.tmp.dll

c:\windows\system32\_005054_.tmp.dll

c:\windows\system32\_005055_.tmp.dll

c:\windows\system32\_005060_.tmp.dll

c:\windows\system32\_005062_.tmp.dll

c:\windows\system32\_005063_.tmp.dll

c:\windows\system32\_007582_.tmp.dll

c:\windows\system32\_007583_.tmp.dll

c:\windows\system32\_007584_.tmp.dll

c:\windows\system32\_007585_.tmp.dll

c:\windows\system32\_007592_.tmp.dll

c:\windows\system32\_007593_.tmp.dll

c:\windows\system32\_007594_.tmp.dll

c:\windows\system32\_007596_.tmp.dll

c:\windows\system32\_007597_.tmp.dll

c:\windows\system32\_007600_.tmp.dll

c:\windows\system32\_007601_.tmp.dll

c:\windows\system32\_007603_.tmp.dll

c:\windows\system32\_007604_.tmp.dll

c:\windows\system32\_007605_.tmp.dll

c:\windows\system32\_007607_.tmp.dll

c:\windows\system32\_007610_.tmp.dll

c:\windows\system32\_007611_.tmp.dll

c:\windows\system32\_007615_.tmp.dll

c:\windows\system32\_007616_.tmp.dll

c:\windows\system32\_007618_.tmp.dll

c:\windows\system32\_007621_.tmp.dll

c:\windows\system32\_007623_.tmp.dll

c:\windows\system32\_007624_.tmp.dll

c:\windows\system32\_007625_.tmp.dll

c:\windows\system32\_007626_.tmp.dll

c:\windows\system32\_007629_.tmp.dll

c:\windows\system32\_007630_.tmp.dll

c:\windows\system32\_007631_.tmp.dll

c:\windows\system32\_007632_.tmp.dll

c:\windows\system32\_007633_.tmp.dll

c:\windows\system32\_007638_.tmp.dll

c:\windows\system32\_007640_.tmp.dll

c:\windows\system32\1.ico

c:\windows\system32\afisicx.exe

c:\windows\system32\comsa32.sys

c:\windows\system32\Install.txt

c:\windows\system32\mabidwe.exe

c:\windows\system32\noytcyr.exe

c:\windows\system32\roytctm.exe

c:\windows\system32\soxpeca.exe

c:\windows\system32\tmp0_10000209578.bk

c:\windows\system32\tmp0_104047217955.bk

c:\windows\system32\tmp0_109396535051.bk

c:\windows\system32\tmp0_115587196142.bk

c:\windows\system32\tmp0_11640693428.bk

c:\windows\system32\tmp0_11846456381.bk

c:\windows\system32\tmp0_118703489196.bk

c:\windows\system32\tmp0_120028499051.bk

c:\windows\system32\tmp0_121621539056.bk

c:\windows\system32\tmp0_123752115065.bk

c:\windows\system32\tmp0_123981389532.bk

c:\windows\system32\tmp0_129676141744.bk

c:\windows\system32\tmp0_129767804416.bk

c:\windows\system32\tmp0_130427742228.bk

c:\windows\system32\tmp0_131704112054.bk

c:\windows\system32\tmp0_134879193046.bk

c:\windows\system32\tmp0_143574139726.bk

c:\windows\system32\tmp0_144668152609.bk

c:\windows\system32\tmp0_145382321891.bk

c:\windows\system32\tmp0_145424152092.bk

c:\windows\system32\tmp0_145607582229.bk

c:\windows\system32\tmp0_147213274134.bk

c:\windows\system32\tmp0_149033592970.bk

c:\windows\system32\tmp0_149563231129.bk

c:\windows\system32\tmp0_150836354984.bk

c:\windows\system32\tmp0_157608671529.bk

c:\windows\system32\tmp0_158915656583.bk

c:\windows\system32\tmp0_160765849977.bk

c:\windows\system32\tmp0_167341429725.bk

c:\windows\system32\tmp0_170275391232.bk

c:\windows\system32\tmp0_172124763609.bk

c:\windows\system32\tmp0_172492163268.bk

c:\windows\system32\tmp0_17418058825.bk

c:\windows\system32\tmp0_175184719119.bk

c:\windows\system32\tmp0_17522478201.bk

c:\windows\system32\tmp0_176060756120.bk

c:\windows\system32\tmp0_18444167834.bk

c:\windows\system32\tmp0_185188552099.bk

c:\windows\system32\tmp0_18624613459.bk

c:\windows\system32\tmp0_186412556503.bk

c:\windows\system32\tmp0_186667386876.bk

c:\windows\system32\tmp0_190996714367.bk

c:\windows\system32\tmp0_193330416074.bk

c:\windows\system32\tmp0_195430854563.bk

c:\windows\system32\tmp0_19569509578.bk

c:\windows\system32\tmp0_197408417082.bk

c:\windows\system32\tmp0_19790248615.bk

c:\windows\system32\tmp0_200043743837.bk

c:\windows\system32\tmp0_200406881670.bk

c:\windows\system32\tmp0_200932837360.bk

c:\windows\system32\tmp0_207135570914.bk

c:\windows\system32\tmp0_211205414811.bk

c:\windows\system32\tmp0_212200469032.bk

c:\windows\system32\tmp0_215190676464.bk

c:\windows\system32\tmp0_215429740383.bk

c:\windows\system32\tmp0_21758618210.bk

c:\windows\system32\tmp0_218138392311.bk

c:\windows\system32\tmp0_220250616697.bk

c:\windows\system32\tmp0_224946320102.bk

c:\windows\system32\tmp0_230401536511.bk

c:\windows\system32\tmp0_236131498596.bk

c:\windows\system32\tmp0_23653647389.bk

c:\windows\system32\tmp0_237289328514.bk

c:\windows\system32\tmp0_241506645560.bk

c:\windows\system32\tmp0_245054424510.bk

c:\windows\system32\tmp0_247112440230.bk

c:\windows\system32\tmp0_248164733483.bk

c:\windows\system32\tmp0_251668752906.bk

c:\windows\system32\tmp0_252293220770.bk

c:\windows\system32\tmp0_254783687404.bk

c:\windows\system32\tmp0_260091510597.bk

c:\windows\system32\tmp0_262382162009.bk

c:\windows\system32\tmp0_265603142228.bk

c:\windows\system32\tmp0_26880754068.bk

c:\windows\system32\tmp0_269123523823.bk

c:\windows\system32\tmp0_269485653580.bk

c:\windows\system32\tmp0_270143373455.bk

c:\windows\system32\tmp0_271172853419.bk

c:\windows\system32\tmp0_272784715926.bk

c:\windows\system32\tmp0_27738792683.bk

c:\windows\system32\tmp0_277785232870.bk

c:\windows\system32\tmp0_282822584644.bk

c:\windows\system32\tmp0_283050708238.bk

c:\windows\system32\tmp0_289067475672.bk

c:\windows\system32\tmp0_289751626145.bk

c:\windows\system32\tmp0_29101624017.bk

c:\windows\system32\tmp0_291549604462.bk

c:\windows\system32\tmp0_295449687235.bk

c:\windows\system32\tmp0_295578153604.bk

c:\windows\system32\tmp0_296464870.bk

c:\windows\system32\tmp0_297821766649.bk

c:\windows\system32\tmp0_298592491716.bk

c:\windows\system32\tmp0_30265767848.bk

c:\windows\system32\tmp0_306036591793.bk

c:\windows\system32\tmp0_310357283459.bk

c:\windows\system32\tmp0_310642853659.bk

c:\windows\system32\tmp0_310915352806.bk

c:\windows\system32\tmp0_31641893785.bk

c:\windows\system32\tmp0_316893712694.bk

c:\windows\system32\tmp0_316946268512.bk

c:\windows\system32\tmp0_31737808107.bk

c:\windows\system32\tmp0_323227509869.bk

c:\windows\system32\tmp0_329325582696.bk

c:\windows\system32\tmp0_335748829452.bk

c:\windows\system32\tmp0_336976826744.bk

c:\windows\system32\tmp0_336989221883.bk

c:\windows\system32\tmp0_337340718476.bk

c:\windows\system32\tmp0_3401673571.bk

c:\windows\system32\tmp0_341091170201.bk

c:\windows\system32\tmp0_347555346208.bk

c:\windows\system32\tmp0_34960432243.bk

c:\windows\system32\tmp0_351491265221.bk

c:\windows\system32\tmp0_351981746137.bk

c:\windows\system32\tmp0_353079818810.bk

c:\windows\system32\tmp0_35725023681.bk

c:\windows\system32\tmp0_35742739125.bk

c:\windows\system32\tmp0_358538553729.bk

c:\windows\system32\tmp0_358978412736.bk

c:\windows\system32\tmp0_362503761561.bk

c:\windows\system32\tmp0_362844281543.bk

c:\windows\system32\tmp0_368317240630.bk

c:\windows\system32\tmp0_373117307823.bk

c:\windows\system32\tmp0_373448178972.bk

c:\windows\system32\tmp0_373830854590.bk

c:\windows\system32\tmp0_378567251780.bk

c:\windows\system32\tmp0_383880273280.bk

c:\windows\system32\tmp0_385849191890.bk

c:\windows\system32\tmp0_385866365790.bk

c:\windows\system32\tmp0_387736874263.bk

c:\windows\system32\tmp0_391393352568.bk

c:\windows\system32\tmp0_397425863401.bk

c:\windows\system32\tmp0_39920838845.bk

c:\windows\system32\tmp0_400155452977.bk

c:\windows\system32\tmp0_400842588208.bk

c:\windows\system32\tmp0_404024867880.bk

c:\windows\system32\tmp0_404790679269.bk

c:\windows\system32\tmp0_407826274771.bk

c:\windows\system32\tmp0_41468409587.bk

c:\windows\system32\tmp0_41586250515.bk

c:\windows\system32\tmp0_421846748061.bk

c:\windows\system32\tmp0_422813553874.bk

c:\windows\system32\tmp0_42334631247.bk

c:\windows\system32\tmp0_42592329857.bk

c:\windows\system32\tmp0_42739359512.bk

c:\windows\system32\tmp0_427691512339.bk

c:\windows\system32\tmp0_428787638968.bk

c:\windows\system32\tmp0_429780533082.bk

c:\windows\system32\tmp0_429812676327.bk

c:\windows\system32\tmp0_431915332599.bk

c:\windows\system32\tmp0_434276108930.bk

c:\windows\system32\tmp0_434409733483.bk

c:\windows\system32\tmp0_434953546568.bk

c:\windows\system32\tmp0_437225251285.bk

c:\windows\system32\tmp0_438383398353.bk

c:\windows\system32\tmp0_440231343172.bk

c:\windows\system32\tmp0_441554426689.bk

c:\windows\system32\tmp0_443099594232.bk

c:\windows\system32\tmp0_445145699510.bk

c:\windows\system32\tmp0_44539891478.bk

c:\windows\system32\tmp0_446764144572.bk

c:\windows\system32\tmp0_447026306947.bk

c:\windows\system32\tmp0_449609461836.bk

c:\windows\system32\tmp0_455588296705.bk

c:\windows\system32\tmp0_458704410722.bk

c:\windows\system32\tmp0_460908856381.bk

c:\windows\system32\tmp0_461137220025.bk

c:\windows\system32\tmp0_470214126799.bk

c:\windows\system32\tmp0_47232470274.bk

c:\windows\system32\tmp0_473010373020.bk

c:\windows\system32\tmp0_477001194183.bk

c:\windows\system32\tmp0_477843767661.bk

c:\windows\system32\tmp0_487140209804.bk

c:\windows\system32\tmp0_488985816278.bk

c:\windows\system32\tmp0_489471444933.bk

c:\windows\system32\tmp0_491108709905.bk

c:\windows\system32\tmp0_496630175250.bk

c:\windows\system32\tmp0_496781473073.bk

c:\windows\system32\tmp0_496894600119.bk

c:\windows\system32\tmp0_496917703366.bk

c:\windows\system32\tmp0_496975707523.bk

c:\windows\system32\tmp0_497340135697.bk

c:\windows\system32\tmp0_500024363288.bk

c:\windows\system32\tmp0_502781546720.bk

c:\windows\system32\tmp0_502808554925.bk

c:\windows\system32\tmp0_502943827192.bk

c:\windows\system32\tmp0_515061549770.bk

c:\windows\system32\tmp0_517985329884.bk

c:\windows\system32\tmp0_52127145440.bk

c:\windows\system32\tmp0_521986897926.bk

c:\windows\system32\tmp0_52201196459.bk

c:\windows\system32\tmp0_52358695674.bk

c:\windows\system32\tmp0_526302634990.bk

c:\windows\system32\tmp0_52718669558.bk

c:\windows\system32\tmp0_528041607105.bk

c:\windows\system32\tmp0_530923211735.bk

c:\windows\system32\tmp0_533862720816.bk

c:\windows\system32\tmp0_544336595680.bk

c:\windows\system32\tmp0_547974793410.bk

c:\windows\system32\tmp0_549114331536.bk

c:\windows\system32\tmp0_549393619807.bk

c:\windows\system32\tmp0_5521729299.bk

c:\windows\system32\tmp0_55533929175.bk

c:\windows\system32\tmp0_556360222689.bk

c:\windows\system32\tmp0_557423177699.bk

c:\windows\system32\tmp0_558169651088.bk

c:\windows\system32\tmp0_558540391424.bk

c:\windows\system32\tmp0_55883837865.bk

c:\windows\system32\tmp0_559706468968.bk

c:\windows\system32\tmp0_564400271936.bk

c:\windows\system32\tmp0_565300514517.bk

c:\windows\system32\tmp0_566230151434.bk

c:\windows\system32\tmp0_568050523659.bk

c:\windows\system32\tmp0_570285711495.bk

c:\windows\system32\tmp0_574788337921.bk

c:\windows\system32\tmp0_576330651684.bk

c:\windows\system32\tmp0_57786368125.bk

c:\windows\system32\tmp0_579198214411.bk

c:\windows\system32\tmp0_580100145413.bk

c:\windows\system32\tmp0_581555593035.bk

c:\windows\system32\tmp0_581611715761.bk

c:\windows\system32\tmp0_584874149801.bk

c:\windows\system32\tmp0_586553176213.bk

c:\windows\system32\tmp0_586756801085.bk

c:\windows\system32\tmp0_58894055760.bk

c:\windows\system32\tmp0_589743272802.bk

c:\windows\system32\tmp0_592116722644.bk

c:\windows\system32\tmp0_592835550540.bk

c:\windows\system32\tmp0_594630776469.bk

c:\windows\system32\tmp0_59527652806.bk

c:\windows\system32\tmp0_59713445643.bk

c:\windows\system32\tmp0_599098475790.bk

c:\windows\system32\tmp0_602746730478.bk

c:\windows\system32\tmp0_60290576142.bk

c:\windows\system32\tmp0_604835591945.bk

c:\windows\system32\tmp0_605514695364.bk

c:\windows\system32\tmp0_61035552238.bk

c:\windows\system32\tmp0_615065677912.bk

c:\windows\system32\tmp0_615736175335.bk

c:\windows\system32\tmp0_61668549015.bk

c:\windows\system32\tmp0_616777127087.bk

c:\windows\system32\tmp0_617545766751.bk

c:\windows\system32\tmp0_623165479665.bk

c:\windows\system32\tmp0_624649766523.bk

c:\windows\system32\tmp0_629310626500.bk

c:\windows\system32\tmp0_634636313872.bk

c:\windows\system32\tmp0_635692450969.bk

c:\windows\system32\tmp0_637651738702.bk

c:\windows\system32\tmp0_6498628488.bk

c:\windows\system32\tmp0_650210182119.bk

c:\windows\system32\tmp0_651065573664.bk

c:\windows\system32\tmp0_651738835503.bk

c:\windows\system32\tmp0_651958403206.bk

c:\windows\system32\tmp0_65249400079.bk

c:\windows\system32\tmp0_653906417040.bk

c:\windows\system32\tmp0_656517875476.bk

c:\windows\system32\tmp0_656522676296.bk

c:\windows\system32\tmp0_663611530488.bk

c:\windows\system32\tmp0_665395180096.bk

c:\windows\system32\tmp0_66758456206.bk

c:\windows\system32\tmp0_669754608134.bk

c:\windows\system32\tmp0_672629164013.bk

c:\windows\system32\tmp0_675820296866.bk

c:\windows\system32\tmp0_677967787018.bk

c:\windows\system32\tmp0_678943194874.bk

c:\windows\system32\tmp0_680345356426.bk

c:\windows\system32\tmp0_685901229743.bk

c:\windows\system32\tmp0_686032105254.bk

c:\windows\system32\tmp0_68646819190.bk

c:\windows\system32\tmp0_687392450227.bk

c:\windows\system32\tmp0_687416218151.bk

c:\windows\system32\tmp0_68771232287.bk

c:\windows\system32\tmp0_688255753537.bk

c:\windows\system32\tmp0_688457716731.bk

c:\windows\system32\tmp0_69281676959.bk

c:\windows\system32\tmp0_694129364644.bk

c:\windows\system32\tmp0_694758466022.bk

c:\windows\system32\tmp0_707904599320.bk

c:\windows\system32\tmp0_70860273842.bk

c:\windows\system32\tmp0_714118202742.bk

c:\windows\system32\tmp0_714630254806.bk

c:\windows\system32\tmp0_72513158939.bk

c:\windows\system32\tmp0_728985692069.bk

c:\windows\system32\tmp0_73549753478.bk

c:\windows\system32\tmp0_73592621879.bk

c:\windows\system32\tmp0_739124106479.bk

c:\windows\system32\tmp0_739544170931.bk

c:\windows\system32\tmp0_743992304379.bk

c:\windows\system32\tmp0_745819122633.bk

c:\windows\system32\tmp0_74623523623.bk

c:\windows\system32\tmp0_751331116726.bk

c:\windows\system32\tmp0_754244167668.bk

c:\windows\system32\tmp0_761334689785.bk

c:\windows\system32\tmp0_762305163797.bk

c:\windows\system32\tmp0_764709539133.bk

c:\windows\system32\tmp0_766854875611.bk

c:\windows\system32\tmp0_767552735812.bk

c:\windows\system32\tmp0_76786568102.bk

c:\windows\system32\tmp0_773096444323.bk

c:\windows\system32\tmp0_778017431516.bk

c:\windows\system32\tmp0_778043480645.bk

c:\windows\system32\tmp0_778818500783.bk

c:\windows\system32\tmp0_781290860823.bk

c:\windows\system32\tmp0_787827316209.bk

c:\windows\system32\tmp0_792144577134.bk

c:\windows\system32\tmp0_793765106999.bk

c:\windows\system32\tmp0_794961534475.bk

c:\windows\system32\tmp0_797456785801.bk

c:\windows\system32\tmp0_799238191735.bk

c:\windows\system32\tmp0_80060653731.bk

c:\windows\system32\tmp0_800873783846.bk

c:\windows\system32\tmp0_80108518498.bk

c:\windows\system32\tmp0_801200883708.bk

c:\windows\system32\tmp0_803618461764.bk

c:\windows\system32\tmp0_805125315973.bk

c:\windows\system32\tmp0_809397278837.bk

c:\windows\system32\tmp0_811309324565.bk

c:\windows\system32\tmp0_815243482009.bk

c:\windows\system32\tmp0_815857363770.bk

c:\windows\system32\tmp0_816032285911.bk

c:\windows\system32\tmp0_816657127113.bk

c:\windows\system32\tmp0_820119404857.bk

c:\windows\system32\tmp0_820475717239.bk

c:\windows\system32\tmp0_8210041265.bk

c:\windows\system32\tmp0_826267792970.bk

c:\windows\system32\tmp0_827000398305.bk

c:\windows\system32\tmp0_827870544781.bk

c:\windows\system32\tmp0_829376812793.bk

c:\windows\system32\tmp0_83624664852.bk

c:\windows\system32\tmp0_836941126820.bk

c:\windows\system32\tmp0_836968727810.bk

c:\windows\system32\tmp0_83755415818.bk

c:\windows\system32\tmp0_839211375486.bk

c:\windows\system32\tmp0_842860230935.bk

c:\windows\system32\tmp0_843839170673.bk

c:\windows\system32\tmp0_850793662587.bk

c:\windows\system32\tmp0_85223129187.bk

c:\windows\system32\tmp0_854233229975.bk

c:\windows\system32\tmp0_857004154365.bk

c:\windows\system32\tmp0_865289845393.bk

c:\windows\system32\tmp0_865543777157.bk

c:\windows\system32\tmp0_865786851330.bk

c:\windows\system32\tmp0_86960174024.bk

c:\windows\system32\tmp0_871415328902.bk

c:\windows\system32\tmp0_87291120663.bk

c:\windows\system32\tmp0_873178361295.bk

c:\windows\system32\tmp0_878527529292.bk

c:\windows\system32\tmp0_880768840319.bk

c:\windows\system32\tmp0_881677135370.bk

c:\windows\system32\tmp0_884905380284.bk

c:\windows\system32\tmp0_89252748186.bk

c:\windows\system32\tmp0_894326171221.bk

c:\windows\system32\tmp0_89550473321.bk

c:\windows\system32\tmp0_897549656830.bk

c:\windows\system32\tmp0_899523182309.bk

c:\windows\system32\tmp0_90961148580.bk

c:\windows\system32\tmp0_92342626903.bk

c:\windows\system32\tmp0_94575385836.bk

c:\windows\system32\tmp0_95148115157.bk

c:\windows\system32\tmp0_95820609770.bk

c:\windows\system32\tmp0_97435644148.bk

c:\windows\system32\tmp0_99956538043.bk

c:\windows\system32\tmp1_103360504012.bk

c:\windows\system32\tmp1_104559414326.bk

c:\windows\system32\tmp1_11049120344.bk

c:\windows\system32\tmp1_110688278276.bk

c:\windows\system32\tmp1_110908127698.bk

c:\windows\system32\tmp1_111165556614.bk

c:\windows\system32\tmp1_112771397617.bk

c:\windows\system32\tmp1_115195218078.bk

c:\windows\system32\tmp1_11997587214.bk

c:\windows\system32\tmp1_122460193154.bk

c:\windows\system32\tmp1_127136823022.bk

c:\windows\system32\tmp1_128943818828.bk

c:\windows\system32\tmp1_129297427425.bk

c:\windows\system32\tmp1_129495639685.bk

c:\windows\system32\tmp1_129769704558.bk

c:\windows\system32\tmp1_130401182053.bk

c:\windows\system32\tmp1_134231456925.bk

c:\windows\system32\tmp1_144449460657.bk

c:\windows\system32\tmp1_147075615790.bk

c:\windows\system32\tmp1_148647178991.bk

c:\windows\system32\tmp1_154102853060.bk

c:\windows\system32\tmp1_16054523959.bk

c:\windows\system32\tmp1_161028854368.bk

c:\windows\system32\tmp1_161426361009.bk

c:\windows\system32\tmp1_161470408394.bk

c:\windows\system32\tmp1_163585627014.bk

c:\windows\system32\tmp1_170273780644.bk

c:\windows\system32\tmp1_173839426520.bk

c:\windows\system32\tmp1_177560792712.bk

c:\windows\system32\tmp1_179217820900.bk

c:\windows\system32\tmp1_180255489806.bk

c:\windows\system32\tmp1_182709501219.bk

c:\windows\system32\tmp1_188101555038.bk

c:\windows\system32\tmp1_18963104780.bk

c:\windows\system32\tmp1_189963290623.bk

c:\windows\system32\tmp1_199850386134.bk

c:\windows\system32\tmp1_200385399886.bk

c:\windows\system32\tmp1_201412138184.bk

c:\windows\system32\tmp1_201613405309.bk

c:\windows\system32\tmp1_206752149232.bk

c:\windows\system32\tmp1_21328198711.bk

c:\windows\system32\tmp1_213527809738.bk

c:\windows\system32\tmp1_214560637359.bk

c:\windows\system32\tmp1_222725588266.bk

c:\windows\system32\tmp1_223242113769.bk

c:\windows\system32\tmp1_22336856632.bk

c:\windows\system32\tmp1_223707230989.bk

c:\windows\system32\tmp1_224193749359.bk

c:\windows\system32\tmp1_224444606310.bk

c:\windows\system32\tmp1_226413530358.bk

c:\windows\system32\tmp1_227126237351.bk

c:\windows\system32\tmp1_232847826074.bk

c:\windows\system32\tmp1_2375798003.bk

c:\windows\system32\tmp1_238618164389.bk

c:\windows\system32\tmp1_242064426403.bk

c:\windows\system32\tmp1_245924558118.bk

c:\windows\system32\tmp1_245932286403.bk

c:\windows\system32\tmp1_247875754053.bk

c:\windows\system32\tmp1_248549620746.bk

c:\windows\system32\tmp1_24880937471.bk

c:\windows\system32\tmp1_250005595280.bk

c:\windows\system32\tmp1_250227462441.bk

c:\windows\system32\tmp1_252202232512.bk

c:\windows\system32\tmp1_255101294348.bk

c:\windows\system32\tmp1_257661821123.bk

c:\windows\system32\tmp1_261306382257.bk

c:\windows\system32\tmp1_262145870690.bk

c:\windows\system32\tmp1_263209885412.bk

c:\windows\system32\tmp1_27495227005.bk

c:\windows\system32\tmp1_2751770046.bk

c:\windows\system32\tmp1_275207355413.bk

c:\windows\system32\tmp1_280550111607.bk

c:\windows\system32\tmp1_281515182395.bk

c:\windows\system32\tmp1_282213368632.bk

c:\windows\system32\tmp1_28534412991.bk

c:\windows\system32\tmp1_289607168687.bk

c:\windows\system32\tmp1_291710300684.bk

c:\windows\system32\tmp1_296604390298.bk

c:\windows\system32\tmp1_304543195936.bk

c:\windows\system32\tmp1_310106134613.bk

c:\windows\system32\tmp1_311676664801.bk

c:\windows\system32\tmp1_314481725729.bk

c:\windows\system32\tmp1_319281572426.bk

c:\windows\system32\tmp1_32097324244.bk

c:\windows\system32\tmp1_324538668139.bk

c:\windows\system32\tmp1_325832790218.bk

c:\windows\system32\tmp1_326988509783.bk

c:\windows\system32\tmp1_33027415833.bk

c:\windows\system32\tmp1_332064547079.bk

c:\windows\system32\tmp1_333877694668.bk

c:\windows\system32\tmp1_341809613686.bk

c:\windows\system32\tmp1_343112115616.bk

c:\windows\system32\tmp1_344457376044.bk

c:\windows\system32\tmp1_345452858929.bk

c:\windows\system32\tmp1_346780462247.bk

c:\windows\system32\tmp1_3479879336.bk

c:\windows\system32\tmp1_354558244927.bk

c:\windows\system32\tmp1_3558170609.bk

c:\windows\system32\tmp1_356185846391.bk

c:\windows\system32\tmp1_357175311415.bk

c:\windows\system32\tmp1_364614348659.bk

c:\windows\system32\tmp1_367213616335.bk

c:\windows\system32\tmp1_368640809464.bk

c:\windows\system32\tmp1_370543249306.bk

c:\windows\system32\tmp1_370712803359.bk

c:\windows\system32\tmp1_37111740176.bk

c:\windows\system32\tmp1_371759527175.bk

c:\windows\system32\tmp1_378409618499.bk

c:\windows\system32\tmp1_378441146155.bk

c:\windows\system32\tmp1_378970606589.bk

c:\windows\system32\tmp1_383834591859.bk

c:\windows\system32\tmp1_38606367704.bk

c:\windows\system32\tmp1_387956356540.bk

c:\windows\system32\tmp1_388074324115.bk

c:\windows\system32\tmp1_393193373933.bk

c:\windows\system32\tmp1_395713582287.bk

c:\windows\system32\tmp1_398230534798.bk

c:\windows\system32\tmp1_398416642369.bk

c:\windows\system32\tmp1_400847274254.bk

c:\windows\system32\tmp1_40387842500.bk

c:\windows\system32\tmp1_405018892973.bk

c:\windows\system32\tmp1_408674327476.bk

c:\windows\system32\tmp1_408922726330.bk

c:\windows\system32\tmp1_416428866257.bk

c:\windows\system32\tmp1_416704741107.bk

c:\windows\system32\tmp1_417779339995.bk

c:\windows\system32\tmp1_418212174215.bk

c:\windows\system32\tmp1_419987701596.bk

c:\windows\system32\tmp1_421202885964.bk

c:\windows\system32\tmp1_421671829258.bk

c:\windows\system32\tmp1_423899512086.bk

c:\windows\system32\tmp1_426433670832.bk

c:\windows\system32\tmp1_428192582104.bk

c:\windows\system32\tmp1_42944359005.bk

c:\windows\system32\tmp1_430165413265.bk

c:\windows\system32\tmp1_431482237066.bk

c:\windows\system32\tmp1_4339278152.bk

c:\windows\system32\tmp1_43536333111.bk

c:\windows\system32\tmp1_436726117279.bk

c:\windows\system32\tmp1_4368211352.bk

c:\windows\system32\tmp1_438220385844.bk

c:\windows\system32\tmp1_43992294512.bk

c:\windows\system32\tmp1_441292828453.bk

c:\windows\system32\tmp1_445765886245.bk

c:\windows\system32\tmp1_446180369738.bk

c:\windows\system32\tmp1_452417476589.bk

c:\windows\system32\tmp1_454705851742.bk

c:\windows\system32\tmp1_454754380750.bk

c:\windows\system32\tmp1_459241674987.bk

c:\windows\system32\tmp1_460515665708.bk

c:\windows\system32\tmp1_460969180411.bk

c:\windows\system32\tmp1_463856149945.bk

c:\windows\system32\tmp1_471396299764.bk

c:\windows\system32\tmp1_471574809975.bk

c:\windows\system32\tmp1_471654175309.bk

c:\windows\system32\tmp1_47665764673.bk

c:\windows\system32\tmp1_477697538754.bk

c:\windows\system32\tmp1_480567166631.bk

c:\windows\system32\tmp1_483199614057.bk

c:\windows\system32\tmp1_48546676663.bk

c:\windows\system32\tmp1_48836486621.bk

c:\windows\system32\tmp1_495112661735.bk

c:\windows\system32\tmp1_496697386754.bk

c:\windows\system32\tmp1_496847591425.bk

c:\windows\system32\tmp1_498754482811.bk

c:\windows\system32\tmp1_503377355731.bk

c:\windows\system32\tmp1_503615420459.bk

c:\windows\system32\tmp1_504899110414.bk

c:\windows\system32\tmp1_506031811315.bk

c:\windows\system32\tmp1_508125217083.bk

c:\windows\system32\tmp1_514285345026.bk

c:\windows\system32\tmp1_514746452506.bk

c:\windows\system32\tmp1_517077624663.bk

c:\windows\system32\tmp1_517292554564.bk

c:\windows\system32\tmp1_518749506186.bk

c:\windows\system32\tmp1_519270220466.bk

c:\windows\system32\tmp1_520141772747.bk

c:\windows\system32\tmp1_521977710230.bk

c:\windows\system32\tmp1_52223199718.bk

c:\windows\system32\tmp1_522448800064.bk

c:\windows\system32\tmp1_523942399249.bk

c:\windows\system32\tmp1_525664593551.bk

c:\windows\system32\tmp1_527797187813.bk

c:\windows\system32\tmp1_532080891712.bk

c:\windows\system32\tmp1_533025385356.bk

c:\windows\system32\tmp1_533310161685.bk

c:\windows\system32\tmp1_534353103984.bk

c:\windows\system32\tmp1_535978136734.bk

c:\windows\system32\tmp1_536327120397.bk

c:\windows\system32\tmp1_537798804247.bk

c:\windows\system32\tmp1_537839178594.bk

c:\windows\system32\tmp1_540681119804.bk

c:\windows\system32\tmp1_542180192177.bk

c:\windows\system32\tmp1_542222196568.bk

c:\windows\system32\tmp1_543146236661.bk

c:\windows\system32\tmp1_543435763564.bk

c:\windows\system32\tmp1_549789826926.bk

c:\windows\system32\tmp1_550423162589.bk

c:\windows\system32\tmp1_55617322000.bk

c:\windows\system32\tmp1_558933353415.bk

c:\windows\system32\tmp1_561651351854.bk

c:\windows\system32\tmp1_562019385354.bk

c:\windows\system32\tmp1_563220485363.bk

c:\windows\system32\tmp1_564763107292.bk

c:\windows\system32\tmp1_564969208459.bk

c:\windows\system32\tmp1_565739546532.bk

c:\windows\system32\tmp1_567866772138.bk

c:\windows\system32\tmp1_56930451549.bk

c:\windows\system32\tmp1_572979511434.bk

c:\windows\system32\tmp1_578998824482.bk

c:\windows\system32\tmp1_582101569.bk

c:\windows\system32\tmp1_582971539861.bk

c:\windows\system32\tmp1_583104811888.bk

c:\windows\system32\tmp1_585116143745.bk

c:\windows\system32\tmp1_58748231118.bk

c:\windows\system32\tmp1_589334814609.bk

c:\windows\system32\tmp1_591282577011.bk

c:\windows\system32\tmp1_591809226078.bk

c:\windows\system32\tmp1_592284338629.bk

c:\windows\system32\tmp1_595367302485.bk

c:\windows\system32\tmp1_596122239400.bk

c:\windows\system32\tmp1_60039197695.bk

c:\windows\system32\tmp1_603079673561.bk

c:\windows\system32\tmp1_606239174171.bk

c:\windows\system32\tmp1_61725194806.bk

c:\windows\system32\tmp1_618520665356.bk

c:\windows\system32\tmp1_61985888765.bk

c:\windows\system32\tmp1_628345816672.bk

c:\windows\system32\tmp1_631294222745.bk

c:\windows\system32\tmp1_632050550605.bk

c:\windows\system32\tmp1_632571668807.bk

c:\windows\system32\tmp1_633512582720.bk

c:\windows\system32\tmp1_634263544220.bk

c:\windows\system32\tmp1_641756851111.bk

c:\windows\system32\tmp1_64402576633.bk

c:\windows\system32\tmp1_646802744999.bk

c:\windows\system32\tmp1_64680817943.bk

c:\windows\system32\tmp1_647594502079.bk

c:\windows\system32\tmp1_648924315096.bk

c:\windows\system32\tmp1_652159180634.bk

c:\windows\system32\tmp1_65288519462.bk

c:\windows\system32\tmp1_653680211357.bk

c:\windows\system32\tmp1_653925235153.bk

c:\windows\system32\tmp1_65415823426.bk

c:\windows\system32\tmp1_656248887300.bk

c:\windows\system32\tmp1_661388696133.bk

c:\windows\system32\tmp1_66201102690.bk

c:\windows\system32\tmp1_66372564205.bk

c:\windows\system32\tmp1_66399868103.bk

c:\windows\system32\tmp1_668902668778.bk

c:\windows\system32\tmp1_670804801855.bk

c:\windows\system32\tmp1_673836704363.bk

c:\windows\system32\tmp1_675967387201.bk

c:\windows\system32\tmp1_676254584895.bk

c:\windows\system32\tmp1_67792413296.bk

c:\windows\system32\tmp1_681073344716.bk

c:\windows\system32\tmp1_684833125534.bk

c:\windows\system32\tmp1_686630587115.bk

c:\windows\system32\tmp1_688219750701.bk

c:\windows\system32\tmp1_692829811987.bk

c:\windows\system32\tmp1_69975536447.bk

c:\windows\system32\tmp1_700718601183.bk

c:\windows\system32\tmp1_701975887186.bk

c:\windows\system32\tmp1_702782640398.bk

c:\windows\system32\tmp1_703008859408.bk

c:\windows\system32\tmp1_704050344857.bk

c:\windows\system32\tmp1_704126496258.bk

c:\windows\system32\tmp1_707406303237.bk

c:\windows\system32\tmp1_708640372784.bk

c:\windows\system32\tmp1_711473256041.bk

c:\windows\system32\tmp1_713531250653.bk

c:\windows\system32\tmp1_72075398303.bk

c:\windows\system32\tmp1_723031805452.bk

c:\windows\system32\tmp1_724816546166.bk

c:\windows\system32\tmp1_725163815617.bk

c:\windows\system32\tmp1_72823931809.bk

c:\windows\system32\tmp1_728480371846.bk

c:\windows\system32\tmp1_73132274896.bk

c:\windows\system32\tmp1_73376910184.bk

c:\windows\system32\tmp1_738512477681.bk

c:\windows\system32\tmp1_74133345338.bk

c:\windows\system32\tmp1_743153517903.bk

c:\windows\system32\tmp1_74352512161.bk

c:\windows\system32\tmp1_745601813736.bk

c:\windows\system32\tmp1_748926332534.bk

c:\windows\system32\tmp1_748982552262.bk

c:\windows\system32\tmp1_74931472902.bk

c:\windows\system32\tmp1_75319668858.bk

c:\windows\system32\tmp1_764695226146.bk

c:\windows\system32\tmp1_767711577959.bk

c:\windows\system32\tmp1_769037107592.bk

c:\windows\system32\tmp1_769833641442.bk

c:\windows\system32\tmp1_770027808181.bk

c:\windows\system32\tmp1_772497590678.bk

c:\windows\system32\tmp1_77446312782.bk

c:\windows\system32\tmp1_775580505239.bk

c:\windows\system32\tmp1_778061300914.bk

c:\windows\system32\tmp1_778520470184.bk

c:\windows\system32\tmp1_781150393158.bk

c:\windows\system32\tmp1_784959486032.bk

c:\windows\system32\tmp1_78538724700.bk

c:\windows\system32\tmp1_786903591811.bk

c:\windows\system32\tmp1_790995248219.bk

c:\windows\system32\tmp1_792927710767.bk

c:\windows\system32\tmp1_793485482025.bk

c:\windows\system32\tmp1_799562665449.bk

c:\windows\system32\tmp1_802257191044.bk

c:\windows\system32\tmp1_805673163999.bk

c:\windows\system32\tmp1_80765421695.bk

c:\windows\system32\tmp1_81386250356.bk

c:\windows\system32\tmp1_816088332150.bk

c:\windows\system32\tmp1_81651426027.bk

c:\windows\system32\tmp1_818373298621.bk

c:\windows\system32\tmp1_819635462980.bk

c:\windows\system32\tmp1_824265844246.bk

c:\windows\system32\tmp1_824278705525.bk

c:\windows\system32\tmp1_827258736.bk

c:\windows\system32\tmp1_827813489175.bk

c:\windows\system32\tmp1_828717117778.bk

c:\windows\system32\tmp1_8290655006.bk

c:\windows\system32\tmp1_834046319371.bk

c:\windows\system32\tmp1_834141044.bk

c:\windows\system32\tmp1_834283106177.bk

c:\windows\system32\tmp1_835274547392.bk

c:\windows\system32\tmp1_845792153487.bk

c:\windows\system32\tmp1_846417493109.bk

c:\windows\system32\tmp1_8464312652.bk

c:\windows\system32\tmp1_848528655035.bk

c:\windows\system32\tmp1_852630861219.bk

c:\windows\system32\tmp1_85471854978.bk

c:\windows\system32\tmp1_855260445694.bk

c:\windows\system32\tmp1_85610248952.bk

c:\windows\system32\tmp1_857688484170.bk

c:\windows\system32\tmp1_860357818071.bk

c:\windows\system32\tmp1_865698365508.bk

c:\windows\system32\tmp1_866361522899.bk

c:\windows\system32\tmp1_866495351776.bk

c:\windows\system32\tmp1_868204569249.bk

c:\windows\system32\tmp1_869298564658.bk

c:\windows\system32\tmp1_869590719405.bk

c:\windows\system32\tmp1_871599791264.bk

c:\windows\system32\tmp1_873251189089.bk

c:\windows\system32\tmp1_874020782095.bk

c:\windows\system32\tmp1_875577592169.bk

c:\windows\system32\tmp1_875904739630.bk

c:\windows\system32\tmp1_876787897480.bk

c:\windows\system32\tmp1_88516626934.bk

c:\windows\system32\tmp1_887284651594.bk

c:\windows\system32\tmp1_89328230315.bk

c:\windows\system32\tmp1_893904214462.bk

c:\windows\system32\tmp1_896578841169.bk

c:\windows\system32\tmp1_897266410806.bk

c:\windows\system32\tmp1_89861214643.bk

c:\windows\system32\tmp1_899374451448.bk

c:\windows\system32\tmp1_899580129685.bk

c:\windows\system32\tmp1_90105484946.bk

c:\windows\system32\tmp1_90811172886.bk

c:\windows\system32\tmp1_93057122065.bk

c:\windows\system32\tmp1_93853437815.bk

c:\windows\system32\tmp1_95794876391.bk

Posté(e)

2e partie (2/2). Merci pour votre aide.

 

c:\windows\system32\tmp2_102919366382.bk

c:\windows\system32\tmp2_10505715514.bk

c:\windows\system32\tmp2_106879505944.bk

c:\windows\system32\tmp2_106882520290.bk

c:\windows\system32\tmp2_109921246848.bk

c:\windows\system32\tmp2_110125410855.bk

c:\windows\system32\tmp2_111496549615.bk

c:\windows\system32\tmp2_112661686148.bk

c:\windows\system32\tmp2_11728075539.bk

c:\windows\system32\tmp2_122017309515.bk

c:\windows\system32\tmp2_12420722201.bk

c:\windows\system32\tmp2_129576213830.bk

c:\windows\system32\tmp2_135641525745.bk

c:\windows\system32\tmp2_14199265651.bk

c:\windows\system32\tmp2_142083245222.bk

c:\windows\system32\tmp2_143489882763.bk

c:\windows\system32\tmp2_148398370931.bk

c:\windows\system32\tmp2_149190418966.bk

c:\windows\system32\tmp2_151487341376.bk

c:\windows\system32\tmp2_154333652042.bk

c:\windows\system32\tmp2_154727733085.bk

c:\windows\system32\tmp2_155411893788.bk

c:\windows\system32\tmp2_155966354953.bk

c:\windows\system32\tmp2_163001582333.bk

c:\windows\system32\tmp2_167121285660.bk

c:\windows\system32\tmp2_168892352371.bk

c:\windows\system32\tmp2_169588127660.bk

c:\windows\system32\tmp2_170102437130.bk

c:\windows\system32\tmp2_171942344589.bk

c:\windows\system32\tmp2_18231216861.bk

c:\windows\system32\tmp2_184166652231.bk

c:\windows\system32\tmp2_186437304019.bk

c:\windows\system32\tmp2_190378575363.bk

c:\windows\system32\tmp2_191217808973.bk

c:\windows\system32\tmp2_193968847352.bk

c:\windows\system32\tmp2_198029830343.bk

c:\windows\system32\tmp2_201555186444.bk

c:\windows\system32\tmp2_202552308158.bk

c:\windows\system32\tmp2_202760778003.bk

c:\windows\system32\tmp2_203168865166.bk

c:\windows\system32\tmp2_203420687223.bk

c:\windows\system32\tmp2_208561889988.bk

c:\windows\system32\tmp2_210674528264.bk

c:\windows\system32\tmp2_214314697642.bk

c:\windows\system32\tmp2_216256708038.bk

c:\windows\system32\tmp2_217476240654.bk

c:\windows\system32\tmp2_22110338888.bk

c:\windows\system32\tmp2_22161122960.bk

c:\windows\system32\tmp2_221921839519.bk

c:\windows\system32\tmp2_2223881647.bk

c:\windows\system32\tmp2_22611412271.bk

c:\windows\system32\tmp2_228399775600.bk

c:\windows\system32\tmp2_22863650014.bk

c:\windows\system32\tmp2_228989743140.bk

c:\windows\system32\tmp2_233240663520.bk

c:\windows\system32\tmp2_23355729427.bk

c:\windows\system32\tmp2_233697364767.bk

c:\windows\system32\tmp2_23497091835.bk

c:\windows\system32\tmp2_235426242666.bk

c:\windows\system32\tmp2_235697746760.bk

c:\windows\system32\tmp2_236944188532.bk

c:\windows\system32\tmp2_237891715037.bk

c:\windows\system32\tmp2_244542148206.bk

c:\windows\system32\tmp2_245034597270.bk

c:\windows\system32\tmp2_247484765999.bk

c:\windows\system32\tmp2_248272605091.bk

c:\windows\system32\tmp2_248677812629.bk

c:\windows\system32\tmp2_252730628683.bk

c:\windows\system32\tmp2_254664809643.bk

c:\windows\system32\tmp2_257420888292.bk

c:\windows\system32\tmp2_25917973217.bk

c:\windows\system32\tmp2_262912556671.bk

c:\windows\system32\tmp2_264430543514.bk

c:\windows\system32\tmp2_266812163828.bk

c:\windows\system32\tmp2_277366328175.bk

c:\windows\system32\tmp2_281536468181.bk

c:\windows\system32\tmp2_28567278496.bk

c:\windows\system32\tmp2_286279877148.bk

c:\windows\system32\tmp2_2877840968.bk

c:\windows\system32\tmp2_306875309858.bk

c:\windows\system32\tmp2_307947507592.bk

c:\windows\system32\tmp2_309395588669.bk

c:\windows\system32\tmp2_310153503963.bk

c:\windows\system32\tmp2_312953844058.bk

c:\windows\system32\tmp2_31389769256.bk

c:\windows\system32\tmp2_313956326485.bk

c:\windows\system32\tmp2_320052484956.bk

c:\windows\system32\tmp2_32050218106.bk

c:\windows\system32\tmp2_321300459178.bk

c:\windows\system32\tmp2_323096780010.bk

c:\windows\system32\tmp2_323536260995.bk

c:\windows\system32\tmp2_32808170795.bk

c:\windows\system32\tmp2_329409280817.bk

c:\windows\system32\tmp2_33435218127.bk

c:\windows\system32\tmp2_33727750276.bk

c:\windows\system32\tmp2_3384427178.bk

c:\windows\system32\tmp2_339352380997.bk

c:\windows\system32\tmp2_340019471992.bk

c:\windows\system32\tmp2_342888323409.bk

c:\windows\system32\tmp2_343673688198.bk

c:\windows\system32\tmp2_346648744665.bk

c:\windows\system32\tmp2_347199508447.bk

c:\windows\system32\tmp2_348346456166.bk

c:\windows\system32\tmp2_350440593532.bk

c:\windows\system32\tmp2_351439188717.bk

c:\windows\system32\tmp2_353657879355.bk

c:\windows\system32\tmp2_356953470099.bk

c:\windows\system32\tmp2_357356694171.bk

c:\windows\system32\tmp2_360095793221.bk

c:\windows\system32\tmp2_360711701014.bk

c:\windows\system32\tmp2_36131671264.bk

c:\windows\system32\tmp2_363882863426.bk

c:\windows\system32\tmp2_366662794778.bk

c:\windows\system32\tmp2_367938218100.bk

c:\windows\system32\tmp2_367954662602.bk

c:\windows\system32\tmp2_368122894121.bk

c:\windows\system32\tmp2_372700440038.bk

c:\windows\system32\tmp2_37746380712.bk

c:\windows\system32\tmp2_37934045499.bk

c:\windows\system32\tmp2_379372494504.bk

c:\windows\system32\tmp2_381464451356.bk

c:\windows\system32\tmp2_383995386835.bk

c:\windows\system32\tmp2_384490386097.bk

c:\windows\system32\tmp2_386774330518.bk

c:\windows\system32\tmp2_387049756398.bk

c:\windows\system32\tmp2_38734636323.bk

c:\windows\system32\tmp2_388502888729.bk

c:\windows\system32\tmp2_388692742847.bk

c:\windows\system32\tmp2_389631542905.bk

c:\windows\system32\tmp2_390778150724.bk

c:\windows\system32\tmp2_392943603996.bk

c:\windows\system32\tmp2_39610779724.bk

c:\windows\system32\tmp2_396278373593.bk

c:\windows\system32\tmp2_3971845424.bk

c:\windows\system32\tmp2_402471250630.bk

c:\windows\system32\tmp2_404404222079.bk

c:\windows\system32\tmp2_40541487877.bk

c:\windows\system32\tmp2_406317231622.bk

c:\windows\system32\tmp2_406942374359.bk

c:\windows\system32\tmp2_412755381949.bk

c:\windows\system32\tmp2_416095334831.bk

c:\windows\system32\tmp2_416652196012.bk

c:\windows\system32\tmp2_416727163397.bk

c:\windows\system32\tmp2_41809938689.bk

c:\windows\system32\tmp2_418292241559.bk

c:\windows\system32\tmp2_418722811394.bk

c:\windows\system32\tmp2_419974106082.bk

c:\windows\system32\tmp2_421774856244.bk

c:\windows\system32\tmp2_421965314406.bk

c:\windows\system32\tmp2_424129709957.bk

c:\windows\system32\tmp2_430479248331.bk

c:\windows\system32\tmp2_432621397269.bk

c:\windows\system32\tmp2_435831741981.bk

c:\windows\system32\tmp2_439536188997.bk

c:\windows\system32\tmp2_441745809110.bk

c:\windows\system32\tmp2_44237238647.bk

c:\windows\system32\tmp2_446648156317.bk

c:\windows\system32\tmp2_448536135629.bk

c:\windows\system32\tmp2_449188868371.bk

c:\windows\system32\tmp2_45004606527.bk

c:\windows\system32\tmp2_451423668951.bk

c:\windows\system32\tmp2_451627451194.bk

c:\windows\system32\tmp2_45261067021.bk

c:\windows\system32\tmp2_45646269461.bk

c:\windows\system32\tmp2_457299210083.bk

c:\windows\system32\tmp2_458115497269.bk

c:\windows\system32\tmp2_459528372915.bk

c:\windows\system32\tmp2_463624282364.bk

c:\windows\system32\tmp2_467980358499.bk

c:\windows\system32\tmp2_469838174641.bk

c:\windows\system32\tmp2_469854515705.bk

c:\windows\system32\tmp2_471304519431.bk

c:\windows\system32\tmp2_472395592758.bk

c:\windows\system32\tmp2_47254356635.bk

c:\windows\system32\tmp2_47352397703.bk

c:\windows\system32\tmp2_47586279770.bk

c:\windows\system32\tmp2_477252839403.bk

c:\windows\system32\tmp2_478616629037.bk

c:\windows\system32\tmp2_481355560035.bk

c:\windows\system32\tmp2_48267785788.bk

c:\windows\system32\tmp2_483995808708.bk

c:\windows\system32\tmp2_485119609026.bk

c:\windows\system32\tmp2_486119275446.bk

c:\windows\system32\tmp2_487468486493.bk

c:\windows\system32\tmp2_49406511722.bk

c:\windows\system32\tmp2_49529145310.bk

c:\windows\system32\tmp2_496479812748.bk

c:\windows\system32\tmp2_496979701353.bk

c:\windows\system32\tmp2_497474851355.bk

c:\windows\system32\tmp2_499462147380.bk

c:\windows\system32\tmp2_500407149729.bk

c:\windows\system32\tmp2_500880826987.bk

c:\windows\system32\tmp2_508524863415.bk

c:\windows\system32\tmp2_512527848684.bk

c:\windows\system32\tmp2_512681524967.bk

c:\windows\system32\tmp2_514467251652.bk

c:\windows\system32\tmp2_517666131556.bk

c:\windows\system32\tmp2_518329255212.bk

c:\windows\system32\tmp2_521681876867.bk

c:\windows\system32\tmp2_522965419419.bk

c:\windows\system32\tmp2_524075699867.bk

c:\windows\system32\tmp2_526186689246.bk

c:\windows\system32\tmp2_53135434115.bk

c:\windows\system32\tmp2_538404864462.bk

c:\windows\system32\tmp2_53903934010.bk

c:\windows\system32\tmp2_541112710691.bk

c:\windows\system32\tmp2_543015745310.bk

c:\windows\system32\tmp2_543834616834.bk

c:\windows\system32\tmp2_5455344916.bk

c:\windows\system32\tmp2_546460169948.bk

c:\windows\system32\tmp2_550907613466.bk

c:\windows\system32\tmp2_551971287644.bk

c:\windows\system32\tmp2_553252438923.bk

c:\windows\system32\tmp2_554283365757.bk

c:\windows\system32\tmp2_5543621838.bk

c:\windows\system32\tmp2_555731288367.bk

c:\windows\system32\tmp2_558624315426.bk

c:\windows\system32\tmp2_560305126561.bk

c:\windows\system32\tmp2_562063730127.bk

c:\windows\system32\tmp2_562470453242.bk

c:\windows\system32\tmp2_56489179055.bk

c:\windows\system32\tmp2_56854409285.bk

c:\windows\system32\tmp2_568841432585.bk

c:\windows\system32\tmp2_576460882523.bk

c:\windows\system32\tmp2_579951306782.bk

c:\windows\system32\tmp2_582138494515.bk

c:\windows\system32\tmp2_58214668022.bk

c:\windows\system32\tmp2_584389502729.bk

c:\windows\system32\tmp2_596178148467.bk

c:\windows\system32\tmp2_596344146434.bk

c:\windows\system32\tmp2_59719082297.bk

c:\windows\system32\tmp2_602683462404.bk

c:\windows\system32\tmp2_606224502269.bk

c:\windows\system32\tmp2_609902884991.bk

c:\windows\system32\tmp2_61251619848.bk

c:\windows\system32\tmp2_612966854498.bk

c:\windows\system32\tmp2_61562314259.bk

c:\windows\system32\tmp2_616282700094.bk

c:\windows\system32\tmp2_620369365069.bk

c:\windows\system32\tmp2_63562973320.bk

c:\windows\system32\tmp2_635797247655.bk

c:\windows\system32\tmp2_636967486138.bk

c:\windows\system32\tmp2_639274130181.bk

c:\windows\system32\tmp2_639430764076.bk

c:\windows\system32\tmp2_640280399072.bk

c:\windows\system32\tmp2_641333194442.bk

c:\windows\system32\tmp2_642937663124.bk

c:\windows\system32\tmp2_643025114116.bk

c:\windows\system32\tmp2_645803176720.bk

c:\windows\system32\tmp2_647823248134.bk

c:\windows\system32\tmp2_654648183765.bk

c:\windows\system32\tmp2_660713454220.bk

c:\windows\system32\tmp2_662348832027.bk

c:\windows\system32\tmp2_66300964732.bk

c:\windows\system32\tmp2_668893616209.bk

c:\windows\system32\tmp2_67623882268.bk

c:\windows\system32\tmp2_678004719747.bk

c:\windows\system32\tmp2_679352795022.bk

c:\windows\system32\tmp2_68189634721.bk

c:\windows\system32\tmp2_682524763373.bk

c:\windows\system32\tmp2_684111514370.bk

c:\windows\system32\tmp2_685752106296.bk

c:\windows\system32\tmp2_68847604240.bk

c:\windows\system32\tmp2_695451225432.bk

c:\windows\system32\tmp2_695944641056.bk

c:\windows\system32\tmp2_696278846689.bk

c:\windows\system32\tmp2_696385704433.bk

c:\windows\system32\tmp2_697735572320.bk

c:\windows\system32\tmp2_700676862141.bk

c:\windows\system32\tmp2_701098752294.bk

c:\windows\system32\tmp2_702105514012.bk

c:\windows\system32\tmp2_704281279611.bk

c:\windows\system32\tmp2_709090523515.bk

c:\windows\system32\tmp2_711031316859.bk

c:\windows\system32\tmp2_711667418687.bk

c:\windows\system32\tmp2_713669853662.bk

c:\windows\system32\tmp2_71436387697.bk

c:\windows\system32\tmp2_715092727922.bk

c:\windows\system32\tmp2_715395678688.bk

c:\windows\system32\tmp2_715420239332.bk

c:\windows\system32\tmp2_715770820814.bk

c:\windows\system32\tmp2_71582433582.bk

c:\windows\system32\tmp2_716091626634.bk

c:\windows\system32\tmp2_71967094911.bk

c:\windows\system32\tmp2_723109395944.bk

c:\windows\system32\tmp2_732593198676.bk

c:\windows\system32\tmp2_7329170887.bk

c:\windows\system32\tmp2_73438872908.bk

c:\windows\system32\tmp2_740510890530.bk

c:\windows\system32\tmp2_741412641203.bk

c:\windows\system32\tmp2_742109645415.bk

c:\windows\system32\tmp2_743753691981.bk

c:\windows\system32\tmp2_74647545078.bk

c:\windows\system32\tmp2_748458450002.bk

c:\windows\system32\tmp2_748800496296.bk

c:\windows\system32\tmp2_74993493396.bk

c:\windows\system32\tmp2_75221921199.bk

c:\windows\system32\tmp2_752652114335.bk

c:\windows\system32\tmp2_753891524931.bk

c:\windows\system32\tmp2_756810301848.bk

c:\windows\system32\tmp2_758841610385.bk

c:\windows\system32\tmp2_759483359732.bk

c:\windows\system32\tmp2_760323746720.bk

c:\windows\system32\tmp2_762062412321.bk

c:\windows\system32\tmp2_766186713327.bk

c:\windows\system32\tmp2_76759421878.bk

c:\windows\system32\tmp2_76834497856.bk

c:\windows\system32\tmp2_768459858579.bk

c:\windows\system32\tmp2_769193548935.bk

c:\windows\system32\tmp2_77088611487.bk

c:\windows\system32\tmp2_773716635796.bk

c:\windows\system32\tmp2_774964580080.bk

c:\windows\system32\tmp2_776230812524.bk

c:\windows\system32\tmp2_777023171012.bk

c:\windows\system32\tmp2_779236309525.bk

c:\windows\system32\tmp2_780945387835.bk

c:\windows\system32\tmp2_789858491370.bk

c:\windows\system32\tmp2_796875203660.bk

c:\windows\system32\tmp2_799105409648.bk

c:\windows\system32\tmp2_804685892763.bk

c:\windows\system32\tmp2_805021155316.bk

c:\windows\system32\tmp2_80593737736.bk

c:\windows\system32\tmp2_808894474936.bk

c:\windows\system32\tmp2_810643898050.bk

c:\windows\system32\tmp2_81233583729.bk

c:\windows\system32\tmp2_812753249845.bk

c:\windows\system32\tmp2_815772318966.bk

c:\windows\system32\tmp2_829196247608.bk

c:\windows\system32\tmp2_829342801500.bk

c:\windows\system32\tmp2_830189274156.bk

c:\windows\system32\tmp2_830918439219.bk

c:\windows\system32\tmp2_831014180698.bk

c:\windows\system32\tmp2_83412341946.bk

c:\windows\system32\tmp2_837594170474.bk

c:\windows\system32\tmp2_837754143141.bk

c:\windows\system32\tmp2_839572185806.bk

c:\windows\system32\tmp2_83966561456.bk

c:\windows\system32\tmp2_841372745760.bk

c:\windows\system32\tmp2_847428252157.bk

c:\windows\system32\tmp2_85318352584.bk

c:\windows\system32\tmp2_855555233614.bk

c:\windows\system32\tmp2_859736826501.bk

c:\windows\system32\tmp2_86111810969.bk

c:\windows\system32\tmp2_86740890086.bk

c:\windows\system32\tmp2_871865141670.bk

c:\windows\system32\tmp2_872547624830.bk

c:\windows\system32\tmp2_877230565656.bk

c:\windows\system32\tmp2_877853526478.bk

c:\windows\system32\tmp2_878780278440.bk

c:\windows\system32\tmp2_885406239838.bk

c:\windows\system32\tmp2_886757549311.bk

c:\windows\system32\tmp2_887695281472.bk

c:\windows\system32\tmp2_88822349535.bk

c:\windows\system32\tmp2_89369418886.bk

c:\windows\system32\tmp2_898149790040.bk

c:\windows\system32\tmp2_899866269013.bk

c:\windows\system32\tmp2_90600843923.bk

c:\windows\system32\tmp2_9873468461.bk

c:\windows\system32\tmp3_100366219075.bk

c:\windows\system32\tmp3_100455362734.bk

c:\windows\system32\tmp3_103012209578.bk

c:\windows\system32\tmp3_107061351939.bk

c:\windows\system32\tmp3_108056442588.bk

c:\windows\system32\tmp3_114041378893.bk

c:\windows\system32\tmp3_123101590829.bk

c:\windows\system32\tmp3_123705527014.bk

c:\windows\system32\tmp3_123880682925.bk

c:\windows\system32\tmp3_12485143673.bk

c:\windows\system32\tmp3_126972715315.bk

c:\windows\system32\tmp3_131103553619.bk

c:\windows\system32\tmp3_13241071887.bk

c:\windows\system32\tmp3_139131312411.bk

c:\windows\system32\tmp3_139621737839.bk

c:\windows\system32\tmp3_141913270845.bk

c:\windows\system32\tmp3_14272641734.bk

c:\windows\system32\tmp3_142922200451.bk

c:\windows\system32\tmp3_148479659659.bk

c:\windows\system32\tmp3_15103723240.bk

c:\windows\system32\tmp3_152790457145.bk

c:\windows\system32\tmp3_156451268183.bk

c:\windows\system32\tmp3_156570837670.bk

c:\windows\system32\tmp3_157450828682.bk

c:\windows\system32\tmp3_158076381217.bk

c:\windows\system32\tmp3_160317869881.bk

c:\windows\system32\tmp3_16191380830.bk

c:\windows\system32\tmp3_16193139061.bk

c:\windows\system32\tmp3_162477693840.bk

c:\windows\system32\tmp3_163089891569.bk

c:\windows\system32\tmp3_166380220387.bk

c:\windows\system32\tmp3_170199466707.bk

c:\windows\system32\tmp3_1719103065.bk

c:\windows\system32\tmp3_17716129693.bk

c:\windows\system32\tmp3_183971817424.bk

c:\windows\system32\tmp3_187424805733.bk

c:\windows\system32\tmp3_187489764273.bk

c:\windows\system32\tmp3_192382788332.bk

c:\windows\system32\tmp3_193840660907.bk

c:\windows\system32\tmp3_194843789802.bk

c:\windows\system32\tmp3_195290200726.bk

c:\windows\system32\tmp3_196776640557.bk

c:\windows\system32\tmp3_197311258572.bk

c:\windows\system32\tmp3_198827141.bk

c:\windows\system32\tmp3_200258225905.bk

c:\windows\system32\tmp3_203720256201.bk

c:\windows\system32\tmp3_211723282205.bk

c:\windows\system32\tmp3_213574765394.bk

c:\windows\system32\tmp3_2145622104.bk

c:\windows\system32\tmp3_216200584962.bk

c:\windows\system32\tmp3_217732252538.bk

c:\windows\system32\tmp3_218992633925.bk

c:\windows\system32\tmp3_228234581931.bk

c:\windows\system32\tmp3_230595752545.bk

c:\windows\system32\tmp3_232452277600.bk

c:\windows\system32\tmp3_237429339275.bk

c:\windows\system32\tmp3_238775452891.bk

c:\windows\system32\tmp3_239759243740.bk

c:\windows\system32\tmp3_242291364527.bk

c:\windows\system32\tmp3_24401642962.bk

c:\windows\system32\tmp3_24405636800.bk

c:\windows\system32\tmp3_246828282378.bk

c:\windows\system32\tmp3_248113532620.bk

c:\windows\system32\tmp3_249427708925.bk

c:\windows\system32\tmp3_250321269102.bk

c:\windows\system32\tmp3_251345502218.bk

c:\windows\system32\tmp3_252422375877.bk

c:\windows\system32\tmp3_252859252576.bk

c:\windows\system32\tmp3_257050103299.bk

c:\windows\system32\tmp3_262573448827.bk

c:\windows\system32\tmp3_263764467084.bk

c:\windows\system32\tmp3_26579311664.bk

c:\windows\system32\tmp3_26874580893.bk

c:\windows\system32\tmp3_27102739856.bk

c:\windows\system32\tmp3_273700698306.bk

c:\windows\system32\tmp3_277161198308.bk

c:\windows\system32\tmp3_279516874134.bk

c:\windows\system32\tmp3_281631826299.bk

c:\windows\system32\tmp3_290168500419.bk

c:\windows\system32\tmp3_29679071845.bk

c:\windows\system32\tmp3_298882382973.bk

c:\windows\system32\tmp3_299754374399.bk

c:\windows\system32\tmp3_300776462376.bk

c:\windows\system32\tmp3_30095429258.bk

c:\windows\system32\tmp3_301749193848.bk

c:\windows\system32\tmp3_30201390546.bk

c:\windows\system32\tmp3_304645126674.bk

c:\windows\system32\tmp3_304801604739.bk

c:\windows\system32\tmp3_305119249160.bk

c:\windows\system32\tmp3_312680686867.bk

c:\windows\system32\tmp3_312806735012.bk

c:\windows\system32\tmp3_313078489091.bk

c:\windows\system32\tmp3_314973208778.bk

c:\windows\system32\tmp3_314977727979.bk

c:\windows\system32\tmp3_316613606907.bk

c:\windows\system32\tmp3_317441788756.bk

c:\windows\system32\tmp3_31935643383.bk

c:\windows\system32\tmp3_32379190963.bk

c:\windows\system32\tmp3_325996690405.bk

c:\windows\system32\tmp3_32804746983.bk

c:\windows\system32\tmp3_331160293007.bk

c:\windows\system32\tmp3_331804614810.bk

c:\windows\system32\tmp3_337550686936.bk

c:\windows\system32\tmp3_34021325834.bk

c:\windows\system32\tmp3_342453649678.bk

c:\windows\system32\tmp3_344014837797.bk

c:\windows\system32\tmp3_346272399625.bk

c:\windows\system32\tmp3_347668465715.bk

c:\windows\system32\tmp3_35788305478.bk

c:\windows\system32\tmp3_35826843806.bk

c:\windows\system32\tmp3_359465833753.bk

c:\windows\system32\tmp3_361847339807.bk

c:\windows\system32\tmp3_363034424164.bk

c:\windows\system32\tmp3_364657138287.bk

c:\windows\system32\tmp3_36602855299.bk

c:\windows\system32\tmp3_366702350908.bk

c:\windows\system32\tmp3_366729535054.bk

c:\windows\system32\tmp3_367327882139.bk

c:\windows\system32\tmp3_36800481208.bk

c:\windows\system32\tmp3_368397218510.bk

c:\windows\system32\tmp3_370884467611.bk

c:\windows\system32\tmp3_371774133708.bk

c:\windows\system32\tmp3_375654192653.bk

c:\windows\system32\tmp3_377604735435.bk

c:\windows\system32\tmp3_384331591953.bk

c:\windows\system32\tmp3_387040408836.bk

c:\windows\system32\tmp3_389665156119.bk

c:\windows\system32\tmp3_396321783789.bk

c:\windows\system32\tmp3_397587654176.bk

c:\windows\system32\tmp3_399980438167.bk

c:\windows\system32\tmp3_400790468438.bk

c:\windows\system32\tmp3_405966391433.bk

c:\windows\system32\tmp3_406146765358.bk

c:\windows\system32\tmp3_40625675883.bk

c:\windows\system32\tmp3_40642374463.bk

c:\windows\system32\tmp3_409856271114.bk

c:\windows\system32\tmp3_413350190369.bk

c:\windows\system32\tmp3_416512395168.bk

c:\windows\system32\tmp3_418603811484.bk

c:\windows\system32\tmp3_419370753797.bk

c:\windows\system32\tmp3_41966742621.bk

c:\windows\system32\tmp3_420540290916.bk

c:\windows\system32\tmp3_424646566879.bk

c:\windows\system32\tmp3_424666652039.bk

c:\windows\system32\tmp3_425770372286.bk

c:\windows\system32\tmp3_42625786554.bk

c:\windows\system32\tmp3_427266190754.bk

c:\windows\system32\tmp3_428017390817.bk

c:\windows\system32\tmp3_42855443936.bk

c:\windows\system32\tmp3_432021140161.bk

c:\windows\system32\tmp3_43609891749.bk

c:\windows\system32\tmp3_43953641649.bk

c:\windows\system32\tmp3_441942312629.bk

c:\windows\system32\tmp3_448271410079.bk

c:\windows\system32\tmp3_448677339531.bk

c:\windows\system32\tmp3_449807680585.bk

c:\windows\system32\tmp3_451543284941.bk

c:\windows\system32\tmp3_457775830475.bk

c:\windows\system32\tmp3_458135680778.bk

c:\windows\system32\tmp3_458380550146.bk

c:\windows\system32\tmp3_461739713728.bk

c:\windows\system32\tmp3_46364179939.bk

c:\windows\system32\tmp3_46520628210.bk

c:\windows\system32\tmp3_467126105899.bk

c:\windows\system32\tmp3_468674688318.bk

c:\windows\system32\tmp3_46961229830.bk

c:\windows\system32\tmp3_470971330651.bk

c:\windows\system32\tmp3_47396726138.bk

c:\windows\system32\tmp3_481991477388.bk

c:\windows\system32\tmp3_483447730250.bk

c:\windows\system32\tmp3_483558803721.bk

c:\windows\system32\tmp3_494102878482.bk

c:\windows\system32\tmp3_497645637165.bk

c:\windows\system32\tmp3_502454260796.bk

c:\windows\system32\tmp3_504685767456.bk

c:\windows\system32\tmp3_507080581812.bk

c:\windows\system32\tmp3_509177930.bk

c:\windows\system32\tmp3_510575449376.bk

c:\windows\system32\tmp3_512928141635.bk

c:\windows\system32\tmp3_513674390193.bk

c:\windows\system32\tmp3_514853352169.bk

c:\windows\system32\tmp3_514908253106.bk

c:\windows\system32\tmp3_515402196398.bk

c:\windows\system32\tmp3_516992228491.bk

c:\windows\system32\tmp3_517694180871.bk

c:\windows\system32\tmp3_521523195187.bk

c:\windows\system32\tmp3_522234484252.bk

c:\windows\system32\tmp3_52440328348.bk

c:\windows\system32\tmp3_524416503319.bk

c:\windows\system32\tmp3_524494328577.bk

c:\windows\system32\tmp3_524857818586.bk

c:\windows\system32\tmp3_525140339905.bk

c:\windows\system32\tmp3_526210176150.bk

c:\windows\system32\tmp3_527342438694.bk

c:\windows\system32\tmp3_527848502584.bk

c:\windows\system32\tmp3_529546141636.bk

c:\windows\system32\tmp3_531792854748.bk

c:\windows\system32\tmp3_533307610732.bk

c:\windows\system32\tmp3_533821260111.bk

c:\windows\system32\tmp3_53495687176.bk

c:\windows\system32\tmp3_535201339009.bk

c:\windows\system32\tmp3_536423366139.bk

c:\windows\system32\tmp3_536651382204.bk

c:\windows\system32\tmp3_538358766896.bk

c:\windows\system32\tmp3_538698665064.bk

c:\windows\system32\tmp3_538780482105.bk

c:\windows\system32\tmp3_539234609246.bk

c:\windows\system32\tmp3_54341873179.bk

c:\windows\system32\tmp3_546321757706.bk

c:\windows\system32\tmp3_55489713748.bk

c:\windows\system32\tmp3_556739596158.bk

c:\windows\system32\tmp3_56161778198.bk

c:\windows\system32\tmp3_56577525803.bk

c:\windows\system32\tmp3_57138620874.bk

c:\windows\system32\tmp3_578624514896.bk

c:\windows\system32\tmp3_587103553592.bk

c:\windows\system32\tmp3_589443803168.bk

c:\windows\system32\tmp3_592253168083.bk

c:\windows\system32\tmp3_593687855235.bk

c:\windows\system32\tmp3_597704124667.bk

c:\windows\system32\tmp3_611751638092.bk

c:\windows\system32\tmp3_614161892725.bk

c:\windows\system32\tmp3_619062499471.bk

c:\windows\system32\tmp3_621621699620.bk

c:\windows\system32\tmp3_622106759040.bk

c:\windows\system32\tmp3_62245629115.bk

c:\windows\system32\tmp3_624958395205.bk

c:\windows\system32\tmp3_627856538834.bk

c:\windows\system32\tmp3_631026389292.bk

c:\windows\system32\tmp3_631449271152.bk

c:\windows\system32\tmp3_631996112853.bk

c:\windows\system32\tmp3_634981365332.bk

c:\windows\system32\tmp3_637239475388.bk

c:\windows\system32\tmp3_638032702887.bk

c:\windows\system32\tmp3_638534581689.bk

c:\windows\system32\tmp3_64129706263.bk

c:\windows\system32\tmp3_64255646234.bk

c:\windows\system32\tmp3_643858605195.bk

c:\windows\system32\tmp3_64585869231.bk

c:\windows\system32\tmp3_646700314036.bk

c:\windows\system32\tmp3_648538640550.bk

c:\windows\system32\tmp3_648560843252.bk

c:\windows\system32\tmp3_652154437643.bk

c:\windows\system32\tmp3_654908345712.bk

c:\windows\system32\tmp3_65883735841.bk

c:\windows\system32\tmp3_661845558538.bk

c:\windows\system32\tmp3_662084508549.bk

c:\windows\system32\tmp3_66385588151.bk

c:\windows\system32\tmp3_664847513339.bk

c:\windows\system32\tmp3_665450621481.bk

c:\windows\system32\tmp3_665505550014.bk

c:\windows\system32\tmp3_66631451227.bk

c:\windows\system32\tmp3_666921517598.bk

c:\windows\system32\tmp3_66880109051.bk

c:\windows\system32\tmp3_6720186840.bk

c:\windows\system32\tmp3_678101555373.bk

c:\windows\system32\tmp3_679840886207.bk

c:\windows\system32\tmp3_685002696252.bk

c:\windows\system32\tmp3_690866563459.bk

c:\windows\system32\tmp3_690926134938.bk

c:\windows\system32\tmp3_692727747524.bk

c:\windows\system32\tmp3_693065864011.bk

c:\windows\system32\tmp3_69712397665.bk

c:\windows\system32\tmp3_69947647052.bk

c:\windows\system32\tmp3_699585581940.bk

c:\windows\system32\tmp3_70022970512.bk

c:\windows\system32\tmp3_708366254119.bk

c:\windows\system32\tmp3_709216582537.bk

c:\windows\system32\tmp3_710458803352.bk

c:\windows\system32\tmp3_717589277774.bk

c:\windows\system32\tmp3_71763483412.bk

c:\windows\system32\tmp3_718467243509.bk

c:\windows\system32\tmp3_723723815002.bk

c:\windows\system32\tmp3_725838607597.bk

c:\windows\system32\tmp3_727650591981.bk

c:\windows\system32\tmp3_730312260066.bk

c:\windows\system32\tmp3_734965576769.bk

c:\windows\system32\tmp3_738525660497.bk

c:\windows\system32\tmp3_739626440893.bk

c:\windows\system32\tmp3_742984784967.bk

c:\windows\system32\tmp3_74336543454.bk

c:\windows\system32\tmp3_743633511907.bk

c:\windows\system32\tmp3_747290151829.bk

c:\windows\system32\tmp3_747542845643.bk

c:\windows\system32\tmp3_747849578922.bk

c:\windows\system32\tmp3_749535382837.bk

c:\windows\system32\tmp3_749754487837.bk

c:\windows\system32\tmp3_750384415025.bk

c:\windows\system32\tmp3_759032664374.bk

c:\windows\system32\tmp3_760342668971.bk

c:\windows\system32\tmp3_761925873216.bk

c:\windows\system32\tmp3_764161291923.bk

c:\windows\system32\tmp3_768221153466.bk

c:\windows\system32\tmp3_76899574663.bk

c:\windows\system32\tmp3_76920657995.bk

c:\windows\system32\tmp3_770499843709.bk

c:\windows\system32\tmp3_771442406573.bk

c:\windows\system32\tmp3_773307841096.bk

c:\windows\system32\tmp3_775617470248.bk

c:\windows\system32\tmp3_77658536151.bk

c:\windows\system32\tmp3_777989132116.bk

c:\windows\system32\tmp3_780685586599.bk

c:\windows\system32\tmp3_783734753170.bk

c:\windows\system32\tmp3_7839664570.bk

c:\windows\system32\tmp3_79753552884.bk

c:\windows\system32\tmp3_798712545897.bk

c:\windows\system32\tmp3_79995162391.bk

c:\windows\system32\tmp3_803398215312.bk

c:\windows\system32\tmp3_80349298922.bk

c:\windows\system32\tmp3_804769129482.bk

c:\windows\system32\tmp3_805899746466.bk

c:\windows\system32\tmp3_81065644395.bk

c:\windows\system32\tmp3_818653895453.bk

c:\windows\system32\tmp3_821542403662.bk

c:\windows\system32\tmp3_822587136581.bk

c:\windows\system32\tmp3_824553370217.bk

c:\windows\system32\tmp3_827210760806.bk

c:\windows\system32\tmp3_829347817029.bk

c:\windows\system32\tmp3_8307758253.bk

c:\windows\system32\tmp3_831325662209.bk

c:\windows\system32\tmp3_831802819099.bk

c:\windows\system32\tmp3_834264116971.bk

c:\windows\system32\tmp3_840408744619.bk

c:\windows\system32\tmp3_840431141468.bk

c:\windows\system32\tmp3_841678163803.bk

c:\windows\system32\tmp3_844469638441.bk

c:\windows\system32\tmp3_850485447904.bk

c:\windows\system32\tmp3_852886220200.bk

c:\windows\system32\tmp3_854280473730.bk

c:\windows\system32\tmp3_857441101467.bk

c:\windows\system32\tmp3_85755544683.bk

c:\windows\system32\tmp3_858107851962.bk

c:\windows\system32\tmp3_85969125524.bk

c:\windows\system32\tmp3_859778573564.bk

c:\windows\system32\tmp3_859966330842.bk

c:\windows\system32\tmp3_86083646259.bk

c:\windows\system32\tmp3_8613723014.bk

c:\windows\system32\tmp3_863005289179.bk

c:\windows\system32\tmp3_87014372809.bk

c:\windows\system32\tmp3_874326330712.bk

c:\windows\system32\tmp3_875928357622.bk

c:\windows\system32\tmp3_876773788272.bk

c:\windows\system32\tmp3_878740189510.bk

c:\windows\system32\tmp3_8790093079.bk

c:\windows\system32\tmp3_880165239842.bk

c:\windows\system32\tmp3_880210416158.bk

c:\windows\system32\tmp3_881241276627.bk

c:\windows\system32\tmp3_889156397316.bk

c:\windows\system32\tmp3_893677896907.bk

c:\windows\system32\tmp3_894883473988.bk

c:\windows\system32\tmp3_897684845368.bk

c:\windows\system32\tmp3_89801814312.bk

c:\windows\system32\tmp3_93397755924.bk

c:\windows\system32\tmp3_939097703.bk

c:\windows\system32\tmp3_9488341523.bk

c:\windows\system32\tmp3_97940795970.bk

c:\windows\system32\tmp3_98012703752.bk

c:\windows\system32\tmp3_98589509528.bk

c:\windows\system32\tmp4_109234886778.bk

c:\windows\system32\tmp4_113277629317.bk

c:\windows\system32\tmp4_113883162007.bk

c:\windows\system32\tmp4_125267640770.bk

c:\windows\system32\tmp4_134344615900.bk

c:\windows\system32\tmp4_141415432477.bk

c:\windows\system32\tmp4_143335871724.bk

c:\windows\system32\tmp4_144676840879.bk

c:\windows\system32\tmp4_14845832752.bk

c:\windows\system32\tmp4_159082387745.bk

c:\windows\system32\tmp4_160092622869.bk

c:\windows\system32\tmp4_161087672298.bk

c:\windows\system32\tmp4_163324787468.bk

c:\windows\system32\tmp4_165603851083.bk

c:\windows\system32\tmp4_167985141487.bk

c:\windows\system32\tmp4_172439792167.bk

c:\windows\system32\tmp4_177306836744.bk

c:\windows\system32\tmp4_188088455305.bk

c:\windows\system32\tmp4_188329240680.bk

c:\windows\system32\tmp4_188443649040.bk

c:\windows\system32\tmp4_19011327263.bk

c:\windows\system32\tmp4_198193424256.bk

c:\windows\system32\tmp4_198681742023.bk

c:\windows\system32\tmp4_200369575603.bk

c:\windows\system32\tmp4_211548500869.bk

c:\windows\system32\tmp4_212037268307.bk

c:\windows\system32\tmp4_21307150438.bk

c:\windows\system32\tmp4_222472282705.bk

c:\windows\system32\tmp4_222688744706.bk

c:\windows\system32\tmp4_2319714517.bk

c:\windows\system32\tmp4_23280223094.bk

c:\windows\system32\tmp4_234330832613.bk

c:\windows\system32\tmp4_235945527387.bk

c:\windows\system32\tmp4_24925271446.bk

c:\windows\system32\tmp4_254818726426.bk

c:\windows\system32\tmp4_255600809122.bk

c:\windows\system32\tmp4_263769357072.bk

c:\windows\system32\tmp4_2649107181.bk

c:\windows\system32\tmp4_272088167873.bk

c:\windows\system32\tmp4_285115321615.bk

c:\windows\system32\tmp4_288427867262.bk

c:\windows\system32\tmp4_29073684277.bk

c:\windows\system32\tmp4_29157933583.bk

c:\windows\system32\tmp4_304647262982.bk

c:\windows\system32\tmp4_308008795887.bk

c:\windows\system32\tmp4_318131646733.bk

c:\windows\system32\tmp4_319919793033.bk

c:\windows\system32\tmp4_32592831861.bk

c:\windows\system32\tmp4_329466221409.bk

c:\windows\system32\tmp4_331712313899.bk

c:\windows\system32\tmp4_341520766986.bk

c:\windows\system32\tmp4_34743673008.bk

c:\windows\system32\tmp4_347647179283.bk

c:\windows\system32\tmp4_354897789377.bk

c:\windows\system32\tmp4_356322359596.bk

c:\windows\system32\tmp4_362346706237.bk

c:\windows\system32\tmp4_36407449345.bk

c:\windows\system32\tmp4_380241869771.bk

c:\windows\system32\tmp4_3828716838.bk

c:\windows\system32\tmp4_383005841178.bk

c:\windows\system32\tmp4_384345197599.bk

c:\windows\system32\tmp4_38683520536.bk

c:\windows\system32\tmp4_389520791726.bk

c:\windows\system32\tmp4_397809776565.bk

c:\windows\system32\tmp4_402120592411.bk

c:\windows\system32\tmp4_403088457695.bk

c:\windows\system32\tmp4_412027558777.bk

c:\windows\system32\tmp4_416762498866.bk

c:\windows\system32\tmp4_423594411389.bk

c:\windows\system32\tmp4_441844505004.bk

c:\windows\system32\tmp4_445156815885.bk

c:\windows\system32\tmp4_448311211152.bk

c:\windows\system32\tmp4_449377761366.bk

c:\windows\system32\tmp4_455029188994.bk

c:\windows\system32\tmp4_45773460105.bk

c:\windows\system32\tmp4_46767695754.bk

c:\windows\system32\tmp4_47568160585.bk

c:\windows\system32\tmp4_481791873101.bk

c:\windows\system32\tmp4_494966271910.bk

c:\windows\system32\tmp4_500434648628.bk

c:\windows\system32\tmp4_50330845691.bk

c:\windows\system32\tmp4_507577479870.bk

c:\windows\system32\tmp4_508517707891.bk

c:\windows\system32\tmp4_511765504463.bk

c:\windows\system32\tmp4_514102486271.bk

c:\windows\system32\tmp4_518771860569.bk

c:\windows\system32\tmp4_519198451443.bk

c:\windows\system32\tmp4_52017792822.bk

c:\windows\system32\tmp4_524829437852.bk

c:\windows\system32\tmp4_529470143317.bk

c:\windows\system32\tmp4_532297497406.bk

c:\windows\system32\tmp4_532701228737.bk

c:\windows\system32\tmp4_554835567678.bk

c:\windows\system32\tmp4_557723302281.bk

c:\windows\system32\tmp4_558083179075.bk

c:\windows\system32\tmp4_562406662403.bk

c:\windows\system32\tmp4_567323116073.bk

c:\windows\system32\tmp4_568048797761.bk

c:\windows\system32\tmp4_572396798468.bk

c:\windows\system32\tmp4_583460523408.bk

c:\windows\system32\tmp4_58364345091.bk

c:\windows\system32\tmp4_594845333031.bk

c:\windows\system32\tmp4_59756470695.bk

c:\windows\system32\tmp4_60686188803.bk

c:\windows\system32\tmp4_62720878185.bk

c:\windows\system32\tmp4_64349847203.bk

c:\windows\system32\tmp4_6439408783.bk

c:\windows\system32\tmp4_64398241066.bk

c:\windows\system32\tmp4_644720307348.bk

c:\windows\system32\tmp4_645352198.bk

c:\windows\system32\tmp4_647580130804.bk

c:\windows\system32\tmp4_65616513489.bk

c:\windows\system32\tmp4_66061724353.bk

c:\windows\system32\tmp4_661066878200.bk

c:\windows\system32\tmp4_662982589272.bk

c:\windows\system32\tmp4_664718573696.bk

c:\windows\system32\tmp4_667373323419.bk

c:\windows\system32\tmp4_668180356709.bk

c:\windows\system32\tmp4_670700391168.bk

c:\windows\system32\tmp4_670745489893.bk

c:\windows\system32\tmp4_671005283940.bk

c:\windows\system32\tmp4_672813708059.bk

c:\windows\system32\tmp4_67382128728.bk

c:\windows\system32\tmp4_67559717652.bk

c:\windows\system32\tmp4_679565715852.bk

c:\windows\system32\tmp4_680148182180.bk

c:\windows\system32\tmp4_683572732778.bk

c:\windows\system32\tmp4_684764438918.bk

c:\windows\system32\tmp4_685829276999.bk

c:\windows\system32\tmp4_685930298010.bk

c:\windows\system32\tmp4_687154675457.bk

c:\windows\system32\tmp4_687292462087.bk

c:\windows\system32\tmp4_691923775588.bk

c:\windows\system32\tmp4_710479372858.bk

c:\windows\system32\tmp4_712055589093.bk

c:\windows\system32\tmp4_718972512632.bk

c:\windows\system32\tmp4_720710123259.bk

c:\windows\system32\tmp4_720737678587.bk

c:\windows\system32\tmp4_722081396684.bk

c:\windows\system32\tmp4_72514968366.bk

c:\windows\system32\tmp4_725985827915.bk

c:\windows\system32\tmp4_727838826330.bk

c:\windows\system32\tmp4_738928547012.bk

c:\windows\system32\tmp4_74801191720.bk

c:\windows\system32\tmp4_749963289001.bk

c:\windows\system32\tmp4_752741495211.bk

c:\windows\system32\tmp4_759250213584.bk

c:\windows\system32\tmp4_760432702649.bk

c:\windows\system32\tmp4_770087397025.bk

c:\windows\system32\tmp4_771316665992.bk

c:\windows\system32\tmp4_773121338378.bk

c:\windows\system32\tmp4_77435781240.bk

c:\windows\system32\tmp4_786199330388.bk

c:\windows\system32\tmp4_797016523868.bk

c:\windows\system32\tmp4_809674444883.bk

c:\windows\system32\tmp4_811457161314.bk

c:\windows\system32\tmp4_811913336186.bk

c:\windows\system32\tmp4_813829148758.bk

c:\windows\system32\tmp4_815349597782.bk

c:\windows\system32\tmp4_824973644290.bk

c:\windows\system32\tmp4_833969280642.bk

c:\windows\system32\tmp4_83435048885.bk

c:\windows\system32\tmp4_835775835258.bk

c:\windows\system32\tmp4_84004790137.bk

c:\windows\system32\tmp4_84014376734.bk

c:\windows\system32\tmp4_840185626081.bk

c:\windows\system32\tmp4_853606411040.bk

c:\windows\system32\tmp4_85719551880.bk

c:\windows\system32\tmp4_858138828447.bk

c:\windows\system32\tmp4_861107144089.bk

c:\windows\system32\tmp4_861351560394.bk

c:\windows\system32\tmp4_862757442482.bk

c:\windows\system32\tmp4_869600850398.bk

c:\windows\system32\tmp4_874204138875.bk

c:\windows\system32\tmp4_880723394964.bk

c:\windows\system32\tmp4_885305218476.bk

c:\windows\system32\tmp4_892483200362.bk

c:\windows\system32\tmp4_892553216996.bk

c:\windows\system32\tmp4_896414795089.bk

c:\windows\system32\tmp4_89652667742.bk

c:\windows\system32\tmp4_897021655697.bk

c:\windows\system32\tmp4_94854224632.bk

c:\windows\system32\tmp4_96622848729.bk

c:\windows\system32\tmp4_9855305492.bk

c:\windows\system32\tmp5_111879483644.bk

c:\windows\system32\tmp5_124631562096.bk

c:\windows\system32\tmp5_130322726096.bk

c:\windows\system32\tmp5_13090982007.bk

c:\windows\system32\tmp5_131212461895.bk

c:\windows\system32\tmp5_135182829858.bk

c:\windows\system32\tmp5_161043330918.bk

c:\windows\system32\tmp5_179289631493.bk

c:\windows\system32\tmp5_18139730229.bk

c:\windows\system32\tmp5_19394057608.bk

c:\windows\system32\tmp5_195288846066.bk

c:\windows\system32\tmp5_22111076413.bk

c:\windows\system32\tmp5_254618361947.bk

c:\windows\system32\tmp5_262177370400.bk

c:\windows\system32\tmp5_282181723916.bk

c:\windows\system32\tmp5_282309549354.bk

c:\windows\system32\tmp5_287821230335.bk

c:\windows\system32\tmp5_327883870561.bk

c:\windows\system32\tmp5_334994267363.bk

c:\windows\system32\tmp5_376914579129.bk

c:\windows\system32\tmp5_378496799448.bk

c:\windows\system32\tmp5_404572153923.bk

c:\windows\system32\tmp5_407539795753.bk

c:\windows\system32\tmp5_42329152018.bk

c:\windows\system32\tmp5_446716456881.bk

c:\windows\system32\tmp5_479904548583.bk

c:\windows\system32\tmp5_493260440371.bk

c:\windows\system32\tmp5_4952446601.bk

c:\windows\system32\tmp5_508062113318.bk

c:\windows\system32\tmp5_518110628519.bk

c:\windows\system32\tmp5_532562268913.bk

c:\windows\system32\tmp5_547334744464.bk

c:\windows\system32\tmp5_555852189009.bk

c:\windows\system32\tmp5_57528751340.bk

c:\windows\system32\tmp5_591303618905.bk

c:\windows\system32\tmp5_658129532509.bk

c:\windows\system32\tmp5_682372710251.bk

c:\windows\system32\tmp5_688008118112.bk

c:\windows\system32\tmp5_693657486291.bk

c:\windows\system32\tmp5_70110194176.bk

c:\windows\system32\tmp5_719487219032.bk

c:\windows\system32\tmp5_73592589009.bk

c:\windows\system32\tmp5_74314161147.bk

c:\windows\system32\tmp5_744377675498.bk

c:\windows\system32\tmp5_751476737387.bk

c:\windows\system32\tmp5_772830842727.bk

c:\windows\system32\tmp5_79973103922.bk

c:\windows\system32\tmp5_806295493421.bk

c:\windows\system32\tmp5_80672648660.bk

c:\windows\system32\tmp5_817753713152.bk

c:\windows\system32\tmp5_8330552131.bk

c:\windows\system32\tmp5_871034547036.bk

c:\windows\system32\tmp5_886849668197.bk

c:\windows\system32\tmp6_213546369341.bk

c:\windows\system32\udxfytw.sys

 

.

((((((((((((((((((((((((((((((((((((((( Drivers/Services )))))))))))))))))))))))))))))))))))))))))))))))))

.

 

-------\Legacy_AFINDING

-------\Legacy_AFISICX

-------\Legacy_MABIDWE

-------\Legacy_MACIDWE

-------\Legacy_NOBICYT

-------\Legacy_NOXTCYR

-------\Legacy_NOYTCYR

-------\Legacy_PERFS

-------\Legacy_ROUTING

-------\Legacy_ROXTCTM

-------\Legacy_ROYTCTM

-------\Legacy_SOBICYT

-------\Legacy_SOTPECA

-------\Legacy_SOXPECA

-------\Legacy_TDXDOWKC

-------\Legacy_TDYDOWKC

-------\Legacy_WSERVING

-------\Legacy_WSLDOEKD

-------\Service_afisicx

-------\Service_mabidwe

-------\Service_noxtcyr

-------\Service_noytcyr

-------\Service_roxtctm

-------\Service_roytctm

-------\Service_sotpeca

-------\Service_soxpeca

-------\Service_tdydowkc

-------\Service_wsldoekd

 

 

((((((((((((((((((((((((( Files Created from 2008-12-23 to 2009-01-23 )))))))))))))))))))))))))))))))

.

 

2009-01-21 22:46 . 2009-01-21 22:46 <DIR> d-------- c:\windows\ERUNT

2009-01-18 22:45 . 2009-01-21 22:57 <DIR> d-------- C:\SDFix

2009-01-16 08:10 . 2009-01-16 08:10 <DIR> d-------- c:\program files\Microsoft Silverlight

2009-01-15 20:40 . 2009-01-15 20:39 8,509,952 --a------ c:\windows\system\SHELL32.dll

2009-01-14 12:30 . 2009-01-14 12:59 <DIR> d-------- c:\program files\Avira

2009-01-14 12:30 . 2009-01-14 12:30 <DIR> d-------- c:\documents and settings\All Users\Application Data\Avira

2009-01-12 22:42 . 2009-01-13 20:31 <DIR> d-------- c:\program files\Lavasoft

2009-01-12 22:11 . 2009-01-12 22:15 955 --a------ c:\windows\BricoPackFoldersDelete.cmd

2009-01-11 22:41 . 2009-01-11 22:41 2,560 --a------ c:\windows\_MSRSTRT.EXE

2009-01-09 04:30 . 2009-01-09 04:32 <DIR> d-------- c:\windows\ServicePackFiles

2009-01-09 04:03 . 2009-01-09 04:03 <DIR> d-------- c:\program files\Windows Resource Kits

2009-01-09 03:20 . 2009-01-14 09:40 <DIR> d-------- c:\program files\Google

2009-01-08 19:26 . 2008-08-14 05:11 2,189,184 --a------ c:\windows\system32\ntoskrnl.exe

2009-01-01 14:58 . 2009-01-13 21:57 <DIR> d-------- c:\documents and settings\amadou\Application Data\skypePM

2009-01-01 14:58 . 2009-01-01 14:58 56 --ah----- c:\windows\system32\ezsidmv.dat

2009-01-01 14:57 . 2009-01-01 14:57 <DIR> d-------- c:\program files\Common Files\Skype

2009-01-01 14:57 . 2009-01-01 14:58 <DIR> d-------- c:\documents and settings\All Users\Application Data\Skype

 

.

(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))

.

2009-01-16 01:19 --------- d-----w c:\program files\XviD

2009-01-14 04:25 --------- d-----w c:\documents and settings\amadou\Application Data\Skype

2009-01-13 04:07 --------- d-----w c:\documents and settings\amadou\Application Data\uTorrent

2009-01-13 03:15 48,807 -c--a-w c:\windows\BricoPackUninst.cmd

2009-01-13 02:57 --------- d---a-w c:\documents and settings\All Users\Application Data\TEMP

2009-01-12 03:45 --------- d-----w c:\program files\Common Files\Stardock

2009-01-08 23:43 --------- d-----w c:\program files\Java

2009-01-08 23:32 --------- d-----w c:\program files\DivX

2009-01-08 20:36 --------- d-----w c:\program files\Windows Media Connect 2

2009-01-01 19:58 --------- d-----w c:\program files\Skype

2008-12-11 10:57 333,952 ----a-w c:\windows\system32\drivers\srv.sys

2008-04-14 00:12 60,416 --sha-w c:\windows\BricoPacks\SysFiles\69_msimn.exe

2008-09-22 04:01 32,768 -csha-w c:\windows\system32\config\systemprofile\Local Settings\History\History.IE5\MSHist012008091520080922\index.dat

2008-09-22 17:15 32,768 -csha-w c:\windows\system32\config\systemprofile\Local Settings\History\History.IE5\MSHist012008092220080923\index.dat

2008-09-23 15:32 32,768 -csha-w c:\windows\system32\config\systemprofile\Local Settings\History\History.IE5\MSHist012008092320080924\index.dat

2008-09-24 22:41 32,768 -csha-w c:\windows\system32\config\systemprofile\Local Settings\History\History.IE5\MSHist012008092420080925\index.dat

.

 

((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))

.

.

*Note* empty entries & legit default entries are not shown

REGEDIT4

 

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]

"MsnMsgr"="c:\program files\Windows Live\Messenger\MsnMsgr.Exe" [2007-10-18 5724184]

"ctfmon.exe"="c:\windows\system32\ctfmon.exe" [2008-04-13 15360]

 

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]

"LaunchApp"="Alaunch" [X]

"RemoteControl"="c:\program files\CyberLink\PowerDVD\PDVDServ.exe" [2004-11-02 32768]

"IMJPMIG8.1"="c:\windows\IME\imjp8_1\IMJPMIG.EXE" [2004-08-04 208952]

"MSPY2002"="c:\windows\system32\IME\PINTLGNT\ImScInst.exe" [2004-08-04 59392]

"PHIME2002ASync"="c:\windows\system32\IME\TINTLGNT\TINTSETP.EXE" [2004-08-04 455168]

"PHIME2002A"="c:\windows\system32\IME\TINTLGNT\TINTSETP.EXE" [2004-08-04 455168]

"eRecoveryService"="c:\acer\Empowering Technology\eRecovery\Monitor.exe" [2005-11-16 397312]

"InfoMyCa.exe"="c:\program files\B54GT Wireless Monitor\InfoMyCa.exe" [2004-04-19 45056]

"Athan"="c:\program files\Athan\Athan.exe" [2007-09-06 1003520]

"QuickTime Task"="c:\program files\QuickTime\qttask.exe" [2008-09-25 413696]

"SunJavaUpdateSched"="c:\program files\Java\jre6\bin\jusched.exe" [2008-12-03 136600]

"avgnt"="c:\program files\Avira\AntiVir PersonalEdition Classic\avgnt.exe" [2008-06-12 266497]

"SMSERIAL"="sm56hlpr.exe" [2005-06-06 c:\windows\sm56hlpr.exe]

"VTTimer"="VTTimer.exe" [2005-05-13 c:\windows\system32\VTTimer.exe]

"VTTrayp"="VTtrayp.exe" [2005-05-13 c:\windows\system32\VTTrayp.exe]

"SoundMan"="SOUNDMAN.EXE" [2006-08-03 c:\windows\soundman.exe]

 

[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run]

"CTFMON.EXE"="c:\windows\system32\CTFMON.EXE" [2008-04-13 15360]

 

c:\documents and settings\All Users\Start Menu\Programs\Startup\

Adobe Reader Speed Launch.lnk - c:\program files\Adobe\Acrobat 7.0\Reader\reader_sl.exe [2008-04-23 29696]

 

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\drivers32]

"vidc.X264"= x264vfw.dll

"aux"= wdmaud.sys

 

[HKEY_LOCAL_MACHINE\software\microsoft\security center]

"AntiVirusDisableNotify"=dword:00000001

 

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile]

"EnableFirewall"= 0 (0x0)

 

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]

"c:\\Program Files\\Utorrent\\utorrent.exe"=

"c:\\Program Files\\Mozilla Firefox\\firefox.exe"=

"%windir%\\Network Diagnostic\\xpnetdiag.exe"=

"c:\\WINDOWS\\system32\\sessmgr.exe"=

"c:\\Program Files\\Messenger\\msmsgs.exe"=

"%windir%\\system32\\sessmgr.exe"=

"c:\\Program Files\\Windows Live\\Messenger\\msnmsgr.exe"=

"c:\\Program Files\\Windows Live\\Messenger\\livecall.exe"=

"c:\\Program Files\\Skype\\Phone\\Skype.exe"=

"c:\\Program Files\\Java\\jre6\\bin\\java.exe"=

"c:\\Program Files\\Real\\RealPlayer\\realplay.exe"=

"c:\\Program Files\\Windows Media Player\\wmplayer.exe"=

 

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\GloballyOpenPorts\List]

"67:UDP"= 67:UDP:*:Disabled:Service de découverte DHCP

 

R4 B54GT Wireless Service;802.11g Wireless Network Adapter;c:\program files\B54GT Wireless Monitor\WLService.exe [2007-08-18 49152]

R4 NwSapAgent;SAP Agent;c:\windows\system32\svchost.exe -k netsvcs [2004-08-04 14336]

S3 ATHFMWDL;802.11 USB Wireless Adapter Bootloader driver;c:\windows\system32\Drivers\ATHFMWDL.sys --> c:\windows\system32\Drivers\ATHFMWDL.sys [?]

S4 Windowhelp;Windowhelp;c:\recycler\svchost.exe --> c:\recycler\svchost.exe [?]

 

[HKEY_CURRENT_USER\software\microsoft\windows\currentversion\explorer\mountpoints2\J]

\Shell\AutoRun\command - c:\windows\system32\RunDLL32.EXE Shell32.DLL,ShellExec_RunDLL copy.exe

 

[HKEY_CURRENT_USER\software\microsoft\windows\currentversion\explorer\mountpoints2\K]

\Shell\AutoRun\command - K:\Autorun.exe

 

[HKEY_CURRENT_USER\software\microsoft\windows\currentversion\explorer\mountpoints2\L]

\Shell\AutoRun\command - c:\windows\system32\RunDLL32.EXE Shell32.DLL,ShellExec_RunDLL copy.exe

 

[HKEY_CURRENT_USER\software\microsoft\windows\currentversion\explorer\mountpoints2\{fd8f6bb4-945b-11db-9528-00155825d787}]

\Shell\AutoRun\command - J:\NFLHeadCoach.exe

.

Contents of the 'Scheduled Tasks' folder

 

2009-01-13 c:\windows\Tasks\AppleSoftwareUpdate.job

- c:\program files\Apple Software Update\SoftwareUpdate.exe []

.

- - - - ORPHANS REMOVED - - - -

 

HKCU-Run-BitTorrent - c:\program files\BitTorrent\bittorrent.exe

HKCU-Run-mschkdsk.exe - c:\windows\system32\mschkdsk.exe

HKCU-Run-sqlserv - c:\documents and settings\All Users\Application Data\sqlserv.exe

HKLM-Run-ACU - c:\program files\TRENDware\TEW444UB\ACU.exe

HKLM-Run-Cmaudio - cmicnfg.cpl

 

 

.

------- Supplementary Scan -------

.

uStart Page = hxxp://www.google.com/

uInternet Settings,ProxyOverride = *.local

IE: E&xport to Microsoft Excel - c:\progra~1\MICROS~2\OFFICE11\EXCEL.EXE/3000

FF - ProfilePath - c:\documents and settings\amadou\Application Data\Mozilla\Firefox\Profiles\a6d4kr98.default\

FF - prefs.js: browser.startup.homepage - hxxp://www.google.ca

FF - plugin: c:\program files\Mozilla Firefox\plugins\npmozax.dll

.

 

**************************************************************************

 

catchme 0.3.1367 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net

Rootkit scan 2009-01-22 23:11:44

Windows 5.1.2600 Service Pack 3 NTFS

 

scanning hidden processes ...

 

scanning hidden autostart entries ...

 

scanning hidden files ...

 

scan completed successfully

hidden files: 0

 

**************************************************************************

.

--------------------- LOCKED REGISTRY KEYS ---------------------

 

[HKEY_USERS\S-1-5-21-2802647075-2522260647-943742319-1006\Software\Microsoft\SystemCertificates\AddressBook*]

@Allowed: (Read) (RestrictedCode)

@Allowed: (Read) (RestrictedCode)

.

------------------------ Other Running Processes ------------------------

.

c:\program files\Avira\AntiVir PersonalEdition Classic\sched.exe

c:\program files\Avira\AntiVir PersonalEdition Classic\avguard.exe

c:\program files\B54GT Wireless Monitor\WLanCfgG.exe

c:\program files\Java\jre6\bin\jqs.exe

c:\program files\Windows Live\Messenger\usnsvc.exe

c:\windows\system32\wscntfy.exe

.

**************************************************************************

.

Completion time: 2009-01-22 23:14:41 - machine was rebooted

ComboFix-quarantined-files.txt 2009-01-23 04:13:46

 

Pre-Run: 19 234 852 864 bytes free

Post-Run: 23,932,833,792 bytes free

 

WindowsXP-KB310994-SP2-Home-BootDisk-ENU.exe

[boot loader]

timeout=2

default=multi(0)disk(0)rdisk(0)partition(2)\WINDOWS

[operating systems]

c:\cmdcons\BOOTSECT.DAT="Microsoft Windows Recovery Console" /cmdcons

multi(0)disk(0)rdisk(0)partition(2)\WINDOWS="Microsoft Windows XP Home Edition" /noexecute=optin /fastdetect

 

2309 --- E O F --- 2009-01-12 13:27:40

Posté(e)

Bonjour,

 

 

 

 

 

Rendez vous à cette addresse:

http://www.virustotal.com/fr/

 

Cliquez sur parcourir pour trouver ce fichier,

c:\windows\_MSRSTRT.EXE

 

et cliquez sur "envoyer le fichier"

Copiez /collez la réponse dans votre prochain message.

 

Combo, Nettoyage

Déconnectez-vous du net et désactivez l'antivirus (juste le temps de la procédure !)

Connecter tous les disques amovibles (disque dur externe, clé USB).

Dans certaines circonstances , le Mode sans échec peut être nécessaire

Ouvrez Combofix

# Dans le bloc-note ,copiez-collez ces lignes :

 

KillAll::

 

File::

c:\windows\system32\ezsidmv.dat

 

 

* Attention, ce code a été rédigé spécialement pour cet utilisateur, il serait dangereux de le réutiliser dans d'autres cas !

Enregistrez-le en lui donnant le nom CFScript.txt

* Faire un glisser/déposer de ce fichier CFScript sur le fichier ComboFix.exe

img-191202xzrpd.gif

* Au message qui apparait dans une fenêtre bleue ( Type 1 to continue, or 2 to abort) , taper 1 puis valider.

* Patienter le temps du scan.Le bureau va disparaitre à plusieurs reprises: c'est normal!

Ne toucher à rien tant que le scan n'est pas terminé.

* Une fois le scan achevé, un rapport va s'afficher: poster son contenu.

* Si le fichier n'apparait pas, il se trouve ici > C:\ComboFix.txt

 

Scan en ligne

NOTE: Le scan en ligne sera à faire avec Internet Explorer.

Désactiver l'antivirus actuel

Kaspersky

Sous Vista,il faut désactiver l'UAC, et cliquer droit sur Internet Explorer / Exécuter en tant qu'administrateur et coller l'URL de Kaspersky

http://www.kaspersky.com/kos/eng/partner/d...kavwebscan.html

Vider la corbeille.

* Cliquer sur Accept

* Une barre jaune va demander d'accepter l'installation de Kavwebscan_Unicode.cab, installer l'Active X.

* cliquer une nouvelle fois sur "Accept"

* Les bases de mises à jour vont s'installer, patienter un moment

* Cliquer sur Next.

* Cliquer sur My Computer, le scan se met en route;

attendre la fin du scan sans fermer la fenêtre sinon il s'arrêtera.

A la fin du scan, si des objets infectés sont découverts, cliquer sur Save report as... Choisirr bureau et nommer le rapport "rapport Kaspersky" et dans le champ d'enregistrement, choisir "fichiers texte" enregistrer le rapport.

Copier/coller l'entièreté du fichier texte ouvert, par clic droit dessus, sélectionner tout/copier.

Coller ce rapport dans la réponse sur le forum.

Aide en cas de problème

Cybersécurité

 

Téléchargez Hijackthis de TrendMicro.

* Décompressez le dans un dossier à la racine du disque dur

Mais jamais dans un dossier temporaire

renommer ce dossier par exemple Karcher

Sous Vista,,il faut faire clic-droit >> "Exécuter en tant qu'Administrateur" sur Hijackthis.exe sinon HJT tourne mais ne fixe rien.

* Lancer le fichier Hijackthis.exe

* Cliquer sur Do a system scan and save a log file

* Poster le rapport dans un nouveau message

Posté(e)

Bonjour, j'ai effectué toutes les démarches mais je n'ai pas pu réaliser le Kaspersky online scan à cause de ce message. (You need to install Java version 1.5 or later to run Kaspersky Online Scanner 7.0) J'ai réinstallé a plusieurs reprises sans succès. Merci

 

rapport virus total :

 

MD5: 815372073da85b2098a37ded84083c8a

First received: 2006.05.27 07:29:44 (CET)

Date 2009.01.23 11:16:57 (CET) [<1D]

Résultats 1/39

Permalink: analisis/1fa27ba2ef00733a0aeeb238a420090a

 

Fichier _MSRSTRT.EXE reçu le 2009.01.23 11:16:57 (CET)

Situation actuelle: terminé

Résultat: 1/39 (2.56%)

Formaté Formaté

Impression des résultats Impression des résultats

Antivirus Version Dernière mise à jour Résultat

a-squared - - -

AhnLab-V3 - - -

AntiVir - - -

Authentium - - -

Avast - - -

AVG - - -

BitDefender - - -

CAT-QuickHeal - - -

ClamAV - - -

Comodo - - -

DrWeb - - -

eSafe - - -

eTrust-Vet - - -

F-Prot - - -

F-Secure - - -

Fortinet - - -

GData - - -

Ikarus - - -

K7AntiVirus - - -

Kaspersky - - -

McAfee - - -

McAfee+Artemis - - -

Microsoft - - -

NOD32 - - -

Norman - - -

nProtect - - -

Panda - - -

PCTools - - -

Prevx1 - - -

Rising - - -

SecureWeb-Gateway - - -

Sophos - - -

Sunbelt - - -

Symantec - - -

TheHacker - - -

TrendMicro - - -

VBA32 - - -

ViRobot - - Not_a_virus:RiskTool.Reboot.2560

VirusBuster - - -

Information additionnelle

MD5: 815372073da85b2098a37ded84083c8a

SHA1: 0a70574450bee11c9c09f25f082e0253aa32ceaa

SHA256: 166e8fe44186f356e162ceac313100d0992b70d3a6a029906c2242afc8691c85

SHA512: 2847b1284f86bfe8717148dfa2b22d4bb092252fbe9356c49d86a5c0a76df7d5833f725a9126a361

3678c6e19bc26e53ba4a538e7902d1c87cbd33854950804e

 

 

rapport combofix :

 

ComboFix 09-01-21.04 - amadou 2009-01-23 23:11:08.3 - NTFSx86

Microsoft Windows XP Home Edition 5.1.2600.3.1252.1.1033.18.447.189 [GMT -5:00]

Running from: c:\documents and settings\amadou\Desktop\ComboFix.exe

Command switches used :: c:\documents and settings\amadou\Desktop\CFScript.txt

AV: Avira AntiVir PersonalEdition *On-access scanning disabled* (Updated)

* Created a new restore point

 

FILE ::

c:\windows\system32\ezsidmv.dat

.

 

((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))

.

 

c:\windows\system32\ezsidmv.dat

 

.

((((((((((((((((((((((((( Files Created from 2008-12-24 to 2009-01-24 )))))))))))))))))))))))))))))))

.

 

2009-01-21 22:46 . 2009-01-21 22:46 <DIR> d-------- c:\windows\ERUNT

2009-01-18 22:45 . 2009-01-21 22:57 <DIR> d-------- C:\SDFix

2009-01-16 08:10 . 2009-01-16 08:10 <DIR> d-------- c:\program files\Microsoft Silverlight

2009-01-15 20:40 . 2009-01-15 20:39 8,509,952 --a------ c:\windows\system\SHELL32.dll

2009-01-14 12:30 . 2009-01-14 12:59 <DIR> d-------- c:\program files\Avira

2009-01-14 12:30 . 2009-01-14 12:30 <DIR> d-------- c:\documents and settings\All Users\Application Data\Avira

2009-01-12 22:42 . 2009-01-13 20:31 <DIR> d-------- c:\program files\Lavasoft

2009-01-12 22:11 . 2009-01-12 22:15 955 --a------ c:\windows\BricoPackFoldersDelete.cmd

2009-01-11 22:41 . 2009-01-11 22:41 2,560 --a------ c:\windows\_MSRSTRT.EXE

2009-01-09 04:30 . 2009-01-09 04:32 <DIR> d-------- c:\windows\ServicePackFiles

2009-01-09 04:03 . 2009-01-09 04:03 <DIR> d-------- c:\program files\Windows Resource Kits

2009-01-09 03:20 . 2009-01-14 09:40 <DIR> d-------- c:\program files\Google

2009-01-08 19:26 . 2008-08-14 05:11 2,189,184 --a------ c:\windows\system32\ntoskrnl.exe

2009-01-01 14:58 . 2009-01-13 21:57 <DIR> d-------- c:\documents and settings\amadou\Application Data\skypePM

2009-01-01 14:57 . 2009-01-01 14:57 <DIR> d-------- c:\program files\Common Files\Skype

2009-01-01 14:57 . 2009-01-01 14:58 <DIR> d-------- c:\documents and settings\All Users\Application Data\Skype

 

.

(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))

.

2009-01-16 01:19 --------- d-----w c:\program files\XviD

2009-01-14 04:25 --------- d-----w c:\documents and settings\amadou\Application Data\Skype

2009-01-13 04:07 --------- d-----w c:\documents and settings\amadou\Application Data\uTorrent

2009-01-13 03:15 48,807 -c--a-w c:\windows\BricoPackUninst.cmd

2009-01-13 02:57 --------- d---a-w c:\documents and settings\All Users\Application Data\TEMP

2009-01-12 03:45 --------- d-----w c:\program files\Common Files\Stardock

2009-01-08 23:43 --------- d-----w c:\program files\Java

2009-01-08 23:32 --------- d-----w c:\program files\DivX

2009-01-08 20:36 --------- d-----w c:\program files\Windows Media Connect 2

2009-01-01 19:58 --------- d-----w c:\program files\Skype

2008-12-11 10:57 333,952 ----a-w c:\windows\system32\drivers\srv.sys

2008-04-14 00:12 60,416 --sha-w c:\windows\BricoPacks\SysFiles\69_msimn.exe

2008-09-22 04:01 32,768 -csha-w c:\windows\system32\config\systemprofile\Local Settings\History\History.IE5\MSHist012008091520080922\index.dat

2008-09-22 17:15 32,768 -csha-w c:\windows\system32\config\systemprofile\Local Settings\History\History.IE5\MSHist012008092220080923\index.dat

2008-09-23 15:32 32,768 -csha-w c:\windows\system32\config\systemprofile\Local Settings\History\History.IE5\MSHist012008092320080924\index.dat

2008-09-24 22:41 32,768 -csha-w c:\windows\system32\config\systemprofile\Local Settings\History\History.IE5\MSHist012008092420080925\index.dat

.

 

((((((((((((((((((((((((((((( snapshot@2009-01-22_23.12.41.56 )))))))))))))))))))))))))))))))))))))))))

.

+ 2009-01-24 04:14:25 16,384 ----atw c:\windows\temp\Perflib_Perfdata_4b4.dat

.

((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))

.

.

*Note* empty entries & legit default entries are not shown

REGEDIT4

 

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]

"MsnMsgr"="c:\program files\Windows Live\Messenger\MsnMsgr.Exe" [2007-10-18 5724184]

"ctfmon.exe"="c:\windows\system32\ctfmon.exe" [2008-04-13 15360]

 

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]

"LaunchApp"="Alaunch" [X]

"RemoteControl"="c:\program files\CyberLink\PowerDVD\PDVDServ.exe" [2004-11-02 32768]

"IMJPMIG8.1"="c:\windows\IME\imjp8_1\IMJPMIG.EXE" [2004-08-04 208952]

"MSPY2002"="c:\windows\system32\IME\PINTLGNT\ImScInst.exe" [2004-08-04 59392]

"PHIME2002ASync"="c:\windows\system32\IME\TINTLGNT\TINTSETP.EXE" [2004-08-04 455168]

"PHIME2002A"="c:\windows\system32\IME\TINTLGNT\TINTSETP.EXE" [2004-08-04 455168]

"eRecoveryService"="c:\acer\Empowering Technology\eRecovery\Monitor.exe" [2005-11-16 397312]

"InfoMyCa.exe"="c:\program files\B54GT Wireless Monitor\InfoMyCa.exe" [2004-04-19 45056]

"Athan"="c:\program files\Athan\Athan.exe" [2007-09-06 1003520]

"QuickTime Task"="c:\program files\QuickTime\qttask.exe" [2008-09-25 413696]

"SunJavaUpdateSched"="c:\program files\Java\jre6\bin\jusched.exe" [2008-12-03 136600]

"avgnt"="c:\program files\Avira\AntiVir PersonalEdition Classic\avgnt.exe" [2008-06-12 266497]

"SMSERIAL"="sm56hlpr.exe" [2005-06-06 c:\windows\sm56hlpr.exe]

"VTTimer"="VTTimer.exe" [2005-05-13 c:\windows\system32\VTTimer.exe]

"VTTrayp"="VTtrayp.exe" [2005-05-13 c:\windows\system32\VTTrayp.exe]

"SoundMan"="SOUNDMAN.EXE" [2006-08-03 c:\windows\soundman.exe]

 

[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run]

"CTFMON.EXE"="c:\windows\system32\CTFMON.EXE" [2008-04-13 15360]

 

c:\documents and settings\All Users\Start Menu\Programs\Startup\

Adobe Reader Speed Launch.lnk - c:\program files\Adobe\Acrobat 7.0\Reader\reader_sl.exe [2008-04-23 29696]

 

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\drivers32]

"vidc.X264"= x264vfw.dll

"aux"= wdmaud.sys

 

[HKEY_LOCAL_MACHINE\software\microsoft\security center]

"AntiVirusDisableNotify"=dword:00000001

 

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile]

"EnableFirewall"= 0 (0x0)

 

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]

"c:\\Program Files\\Utorrent\\utorrent.exe"=

"c:\\Program Files\\Mozilla Firefox\\firefox.exe"=

"%windir%\\Network Diagnostic\\xpnetdiag.exe"=

"c:\\WINDOWS\\system32\\sessmgr.exe"=

"c:\\Program Files\\Messenger\\msmsgs.exe"=

"%windir%\\system32\\sessmgr.exe"=

"c:\\Program Files\\Windows Live\\Messenger\\msnmsgr.exe"=

"c:\\Program Files\\Windows Live\\Messenger\\livecall.exe"=

"c:\\Program Files\\Skype\\Phone\\Skype.exe"=

"c:\\Program Files\\Java\\jre6\\bin\\java.exe"=

"c:\\Program Files\\Real\\RealPlayer\\realplay.exe"=

"c:\\Program Files\\Windows Media Player\\wmplayer.exe"=

 

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\GloballyOpenPorts\List]

"67:UDP"= 67:UDP:*:Disabled:Service de découverte DHCP

 

R4 B54GT Wireless Service;802.11g Wireless Network Adapter;c:\program files\B54GT Wireless Monitor\WLService.exe [2007-08-18 49152]

R4 NwSapAgent;SAP Agent;c:\windows\system32\svchost.exe -k netsvcs [2004-08-04 14336]

S3 ATHFMWDL;802.11 USB Wireless Adapter Bootloader driver;c:\windows\system32\Drivers\ATHFMWDL.sys --> c:\windows\system32\Drivers\ATHFMWDL.sys [?]

S4 Windowhelp;Windowhelp;c:\recycler\svchost.exe --> c:\recycler\svchost.exe [?]

 

[HKEY_CURRENT_USER\software\microsoft\windows\currentversion\explorer\mountpoints2\J]

\Shell\AutoRun\command - c:\windows\system32\RunDLL32.EXE Shell32.DLL,ShellExec_RunDLL copy.exe

 

[HKEY_CURRENT_USER\software\microsoft\windows\currentversion\explorer\mountpoints2\K]

\Shell\AutoRun\command - K:\Autorun.exe

 

[HKEY_CURRENT_USER\software\microsoft\windows\currentversion\explorer\mountpoints2\L]

\Shell\AutoRun\command - c:\windows\system32\RunDLL32.EXE Shell32.DLL,ShellExec_RunDLL copy.exe

 

[HKEY_CURRENT_USER\software\microsoft\windows\currentversion\explorer\mountpoints2\{fd8f6bb4-945b-11db-9528-00155825d787}]

\Shell\AutoRun\command - J:\NFLHeadCoach.exe

.

Contents of the 'Scheduled Tasks' folder

 

2009-01-13 c:\windows\Tasks\AppleSoftwareUpdate.job

- c:\program files\Apple Software Update\SoftwareUpdate.exe []

.

.

------- Supplementary Scan -------

.

uStart Page = hxxp://www.google.com/

uInternet Settings,ProxyOverride = *.local

IE: E&xport to Microsoft Excel - c:\progra~1\MICROS~2\OFFICE11\EXCEL.EXE/3000

FF - ProfilePath - c:\documents and settings\amadou\Application Data\Mozilla\Firefox\Profiles\a6d4kr98.default\

FF - prefs.js: browser.startup.homepage - hxxp://www.google.ca

FF - plugin: c:\program files\Mozilla Firefox\plugins\npmozax.dll

.

 

**************************************************************************

 

catchme 0.3.1367 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net

Rootkit scan 2009-01-23 23:23:17

Windows 5.1.2600 Service Pack 3 NTFS

 

scanning hidden processes ...

 

scanning hidden autostart entries ...

 

scanning hidden files ...

 

scan completed successfully

hidden files: 0

 

**************************************************************************

.

--------------------- LOCKED REGISTRY KEYS ---------------------

 

[HKEY_USERS\S-1-5-21-2802647075-2522260647-943742319-1006\Software\Microsoft\SystemCertificates\AddressBook*]

@Allowed: (Read) (RestrictedCode)

@Allowed: (Read) (RestrictedCode)

.

------------------------ Other Running Processes ------------------------

.

c:\program files\Avira\AntiVir PersonalEdition Classic\sched.exe

c:\program files\Avira\AntiVir PersonalEdition Classic\avguard.exe

c:\program files\B54GT Wireless Monitor\WLanCfgG.exe

c:\program files\Java\jre6\bin\jqs.exe

c:\windows\system32\wscntfy.exe

c:\program files\Windows Live\Messenger\usnsvc.exe

.

**************************************************************************

.

Completion time: 2009-01-23 23:26:15 - machine was rebooted

ComboFix-quarantined-files.txt 2009-01-24 04:25:25

ComboFix2.txt 2009-01-24 04:07:05

ComboFix3.txt 2009-01-23 04:14:43

 

Pre-Run: 24 032 358 400 bytes free

Post-Run: 24,029,605,888 bytes free

 

166 --- E O F --- 2009-01-12 13:27:40

 

 

rapport HiJackThis :

 

Logfile of Trend Micro HijackThis v2.0.2

Scan saved at 23:58:41, on 23/01/2009

Platform: Windows XP SP3 (WinNT 5.01.2600)

MSIE: Internet Explorer v7.00 (7.00.6000.16762)

Boot mode: Normal

 

Running processes:

C:\WINDOWS\System32\smss.exe

C:\WINDOWS\system32\winlogon.exe

C:\WINDOWS\system32\services.exe

C:\WINDOWS\system32\lsass.exe

C:\WINDOWS\system32\svchost.exe

C:\WINDOWS\System32\svchost.exe

C:\WINDOWS\system32\svchost.exe

C:\WINDOWS\system32\spoolsv.exe

C:\Program Files\Avira\AntiVir PersonalEdition Classic\sched.exe

C:\Program Files\Avira\AntiVir PersonalEdition Classic\avguard.exe

C:\Program Files\B54GT Wireless Monitor\WLService.exe

C:\Program Files\B54GT Wireless Monitor\WLanCfgG.exe

C:\WINDOWS\system32\svchost.exe

C:\WINDOWS\system32\wscntfy.exe

C:\Program Files\CyberLink\PowerDVD\PDVDServ.exe

C:\Acer\Empowering Technology\eRecovery\Monitor.exe

C:\WINDOWS\sm56hlpr.exe

C:\WINDOWS\system32\VTTimer.exe

C:\WINDOWS\system32\VTtrayp.exe

C:\WINDOWS\SOUNDMAN.EXE

C:\Program Files\B54GT Wireless Monitor\InfoMyCa.exe

C:\Program Files\Avira\AntiVir PersonalEdition Classic\avgnt.exe

C:\WINDOWS\System32\svchost.exe

C:\WINDOWS\system32\ctfmon.exe

C:\Program Files\Windows Live\Messenger\usnsvc.exe

C:\WINDOWS\explorer.exe

C:\Program Files\Internet Explorer\iexplore.exe

C:\WINDOWS\system32\msiexec.exe

C:\Program Files\Java\jre6\bin\jqs.exe

C:\Program Files\Karcher\HiJackThis.exe

 

R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157

R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896

R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896

R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?LinkId=69157

R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyOverride = *.local

O2 - BHO: Adobe PDF Reader Link Helper - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 7.0\ActiveX\AcroIEHelper.dll (file missing)

O2 - BHO: Java Plug-In SSV Helper - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre6\bin\ssv.dll

O2 - BHO: (no name) - {7E853D72-626A-48EC-A868-BA8D5E23E045} - (no file)

O2 - BHO: Windows Live Sign-in Helper - {9030D464-4C02-4ABF-8ECC-5164760863C6} - C:\Program Files\Common Files\Microsoft Shared\Windows Live\WindowsLiveLogin.dll

O2 - BHO: Java Plug-In 2 SSV Helper - {DBC80044-A445-435b-BC74-9C25C1C588A9} - C:\Program Files\Java\jre6\bin\jp2ssv.dll

O2 - BHO: JQSIEStartDetectorImpl - {E7E6F031-17CE-4C07-BC86-EABFE594F69C} - C:\Program Files\Java\jre6\lib\deploy\jqs\ie\jqs_plugin.dll

O4 - HKLM\..\Run: [LaunchApp] Alaunch

O4 - HKLM\..\Run: [RemoteControl] "C:\Program Files\CyberLink\PowerDVD\PDVDServ.exe"

O4 - HKLM\..\Run: [iMJPMIG8.1] "C:\WINDOWS\IME\imjp8_1\IMJPMIG.EXE" /Spoil /RemAdvDef /Migration32

O4 - HKLM\..\Run: [MSPY2002] C:\WINDOWS\system32\IME\PINTLGNT\ImScInst.exe /SYNC

O4 - HKLM\..\Run: [PHIME2002ASync] C:\WINDOWS\system32\IME\TINTLGNT\TINTSETP.EXE /SYNC

O4 - HKLM\..\Run: [PHIME2002A] C:\WINDOWS\system32\IME\TINTLGNT\TINTSETP.EXE /IMEName

O4 - HKLM\..\Run: [sMSERIAL] sm56hlpr.exe

O4 - HKLM\..\Run: [VTTimer] VTTimer.exe

O4 - HKLM\..\Run: [VTTrayp] VTtrayp.exe

O4 - HKLM\..\Run: [eRecoveryService] C:\Acer\Empowering Technology\eRecovery\Monitor.exe

O4 - HKLM\..\Run: [soundMan] SOUNDMAN.EXE

O4 - HKLM\..\Run: [infoMyCa.exe] C:\Program Files\B54GT Wireless Monitor\InfoMyCa.exe

O4 - HKLM\..\Run: [Athan] C:\Program Files\Athan\Athan.exe

O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime

O4 - HKLM\..\Run: [avgnt] "C:\Program Files\Avira\AntiVir PersonalEdition Classic\avgnt.exe" /min

O4 - HKLM\..\Run: [sunJavaUpdateSched] "C:\Program Files\Java\jre6\bin\jusched.exe"

O4 - HKCU\..\Run: [MsnMsgr] "C:\Program Files\Windows Live\Messenger\MsnMsgr.Exe" /background

O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe

O4 - HKUS\S-1-5-18\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'SYSTEM')

O4 - HKUS\.DEFAULT\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'Default user')

O4 - Global Startup: Adobe Reader Speed Launch.lnk = C:\Program Files\Adobe\Acrobat 7.0\Reader\reader_sl.exe

O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~2\OFFICE11\EXCEL.EXE/3000

O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~2\OFFICE11\REFIEBAR.DLL

O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe

O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe

O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe

O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe

O10 - Unknown file in Winsock LSP: c:\windows\system32\nwprovau.dll

O16 - DPF: {17492023-C23A-453E-A040-C7C580BBF700} (Windows Genuine Advantage Validation Tool) - http://go.microsoft.com/fwlink/?linkid=39204

O16 - DPF: {6E32070A-766D-4EE6-879C-DC1FA91D2FC3} (MUWebControl Class) - http://www.update.microsoft.com/microsoftu...b?1196738371271

O18 - Protocol: skype4com - {FFC8B962-9B40-4DFF-9458-1830C7DD7F5D} - C:\PROGRA~1\COMMON~1\Skype\SKYPE4~1.DLL

O23 - Service: Avira AntiVir Personal - Free Antivirus Scheduler (AntiVirScheduler) - Avira GmbH - C:\Program Files\Avira\AntiVir PersonalEdition Classic\sched.exe

O23 - Service: Avira AntiVir Personal - Free Antivirus Guard (AntiVirService) - Avira GmbH - C:\Program Files\Avira\AntiVir PersonalEdition Classic\avguard.exe

O23 - Service: 802.11g Wireless Network Adapter (B54GT Wireless Service) - Unknown owner - C:\Program Files\B54GT Wireless Monitor\WLService.exe

O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Common Files\InstallShield\Driver\1150\Intel 32\IDriverT.exe

O23 - Service: Java Quick Starter (JavaQuickStarterService) - Sun Microsystems, Inc. - C:\Program Files\Java\jre6\bin\jqs.exe

O23 - Service: Windowhelp - Unknown owner - c:\Recycler\svchost.exe (file missing)

 

--

End of file - 6469 bytes

Posté(e)

Bonjour,

 

Télécharger sur le bureauOTMoveIt3 by OldTimer .

Double-clic sur OTMoveIt3.exe pour le lancer.

Sous Vista,Clic droit sur le fichier ->Choisir Exécuter en tant qu' Administrateur

Vérifier que Unregister Dll's and Ocx's soit coché.

* Copiez /Collez les lignes ci dessous):

 

:Processes

explorer.exe

:Files

c:\recycler\svchost.exe

:Reg

[-HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Windowhelp]

:Commands

[purity]

[emptytemp]

[start explorer]

[Reboot]

Revenez dans OTMoveIt3,

Clic droit sur la fenêtre "Paste Instructions for Items to be Moved" sous la barre jaune et choisir Coller(Paste).

* Click le bouton rouge Moveit!

* Fermez OTMoveIt3

Votre Pc va redémarrer.

Rendez vous dans le dossier C:\_OTMoveIt\MovedFiles ,

ouvrez le dernier fichier .log

Copiez/collez en le contenu dans votre prochaine réponse

 

Dans Hijackthis,cochez ces lignes puis clic sur Fix checked

O2 - BHO: Adobe PDF Reader Link Helper - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 7.0\ActiveX\AcroIEHelper.dll (file missing)

O2 - BHO: (no name) - {7E853D72-626A-48EC-A868-BA8D5E23E045} - (no file)

O4 - HKLM\..\Run: [soundMan] SOUNDMAN.EXE

O4 - HKLM\..\Run: [RemoteControl] "C:\Program Files\CyberLink\PowerDVD\PDVDServ.exe"

O4 - HKLM\..\Run: [iMJPMIG8.1] "C:\WINDOWS\IME\imjp8_1\IMJPMIG.EXE" /Spoil /RemAdvDef /Migration32

O4 - HKLM\..\Run: [MSPY2002] C:\WINDOWS\system32\IME\PINTLGNT\ImScInst.exe /SYNC

O4 - HKLM\..\Run: [PHIME2002ASync] C:\WINDOWS\system32\IME\TINTLGNT\TINTSETP.EXE /SYNC

O4 - HKLM\..\Run: [PHIME2002A] C:\WINDOWS\system32\IME\TINTLGNT\TINTSETP.EXE /IMEName

O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime

O4 - HKLM\..\Run: [sunJavaUpdateSched] "C:\Program Files\Java\jre6\bin\jusched.exe"

O4 - HKCU\..\Run: [MsnMsgr] "C:\Program Files\Windows Live\Messenger\MsnMsgr.Exe" /background

O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe

O4 - HKUS\S-1-5-18\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'SYSTEM')

O4 - HKUS\.DEFAULT\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'Default user')

O4 - Global Startup: Adobe Reader Speed Launch.lnk = C:\Program Files\Adobe\Acrobat 7.0\Reader\reader_sl.exe

 

Téléchargez Malwarebytes' Anti-Malware (MBAM)

[branchez tous les supports amovibles avant de faire ce scan (clé usb/disque dur externe etc)

Si vous utilisez Spybot

Pour désactiver TeaTimer qui ne set à rien et peut faire échouer une désinfection:!

Afficher d'abord le Mode Avancé dans SpyBot

->Options Avancées :

- >menu Mode, Mode Avancé.

Une colonne de menus apparaît dans la partie gauche :

- >cliquer sur Outils,

- >cliquer sur Résident,

Dans Résident :

- >décocher Résident "TeaTimer" pour le désactiver.

* Double cliquez sur l'icône Download_mbam-setup.exe pour lancer le processus d'installation.

Enregistrez le sur le bureau .

Fermer toutes les fenêtres et programmes

Suivez les indications (en particulier le choix de la langue et l'autorisation d'accession à Internet)

N'apportez aucune modification aux réglages par défaut et, en fin d'installation,

Vérifiez que les options Update Malwarebytes' Anti-Malware et Launch Malwarebytes' Anti-Malware sont cochées

MBAM démarrera automatiquement et enverra un message demandant à mettre à jour le programme avant de lancer une analyse.

cliquer sur OK pour fermer la boîte de dialogue..

* Dans l'onglet "mise à jour", cliquez sur le bouton Recherche de mise à jour:

Si le pare-feu demande l'autorisation à MBAM de se connecter, acceptez.

* Une fois la mise à jour terminée, allez dans l'onglet Recherche.

* Sélectionnez "Exécuter un examen complet"

* Cliquez sur "Rechercher"

* .L' analyse prendra un certain temps, soyez patient !

* A la fin , un message affichera :

L'examen s'est terminé normalement.

 

*Si MBAM n'a rien trouvé, il le dira aussi.

Cliquez sur "Ok" pour poursuivre.

*Fermez les navigateurs.

Cliquez sur Afficher les résultats .

 

*Sélectionnez tout et cliquez sur Supprimer la sélection ,

MBAM va détruire les fichiers et clés de registre et en mettre une copie dans la quarantaine.

puis ouvrir le Bloc-notes et y copier le rapport d'analyse qui peut être retrouvé sous l'onglet Rapports/logs.

* Copiez-collez ce rapport dans la prochaine réponse.

 

 

Lancez Antivir et postez le rapport

Posté(e)

Bonjour, voici les rapports, merci

 

rapport OTMoveIt3:

 

Process explorer.exe killed successfully.

========== FILES ==========

File/Folder c:\recycler\svchost.exe not found.

========== REGISTRY ==========

Registry key HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Windowhelp\\ deleted successfully.

========== COMMANDS ==========

File delete failed. C:\DOCUME~1\amadou\LOCALS~1\Temp\etilqs_ie4iWSyyu4go8Pf9yZSW scheduled to be deleted on reboot.

File delete failed. C:\DOCUME~1\amadou\LOCALS~1\Temp\~DF1620.tmp scheduled to be deleted on reboot.

File delete failed. C:\DOCUME~1\amadou\LOCALS~1\Temp\~DF1633.tmp scheduled to be deleted on reboot.

File delete failed. C:\DOCUME~1\amadou\LOCALS~1\Temp\~DFEED1.tmp scheduled to be deleted on reboot.

File delete failed. C:\DOCUME~1\amadou\LOCALS~1\Temp\~DFEEE3.tmp scheduled to be deleted on reboot.

User's Temp folder emptied.

User's Temporary Internet Files folder emptied.

User's Internet Explorer cache folder emptied.

File delete failed. C:\Documents and Settings\LocalService\Local Settings\Temp\Temporary Internet Files\Content.IE5\index.dat scheduled to be deleted on reboot.

File delete failed. C:\Documents and Settings\LocalService\Local Settings\Temp\History\History.IE5\index.dat scheduled to be deleted on reboot.

File delete failed. C:\Documents and Settings\LocalService\Local Settings\Temp\Cookies\index.dat scheduled to be deleted on reboot.

Local Service Temp folder emptied.

Local Service Temporary Internet Files folder emptied.

File delete failed. C:\WINDOWS\temp\Perflib_Perfdata_340.dat scheduled to be deleted on reboot.

Windows Temp folder emptied.

Java cache emptied.

File delete failed. C:\Documents and Settings\amadou\Local Settings\Application Data\Mozilla\Firefox\Profiles\a6d4kr98.default\Cache\_CACHE_001_ scheduled to be deleted on reboot.

File delete failed. C:\Documents and Settings\amadou\Local Settings\Application Data\Mozilla\Firefox\Profiles\a6d4kr98.default\Cache\_CACHE_002_ scheduled to be deleted on reboot.

File delete failed. C:\Documents and Settings\amadou\Local Settings\Application Data\Mozilla\Firefox\Profiles\a6d4kr98.default\Cache\_CACHE_003_ scheduled to be deleted on reboot.

File delete failed. C:\Documents and Settings\amadou\Local Settings\Application Data\Mozilla\Firefox\Profiles\a6d4kr98.default\Cache\_CACHE_MAP_ scheduled to be deleted on reboot.

File delete failed. C:\Documents and Settings\amadou\Local Settings\Application Data\Mozilla\Firefox\Profiles\a6d4kr98.default\urlclassifier3.sqlite scheduled to be deleted on reboot.

FireFox cache emptied.

Temp folders emptied.

Explorer started successfully

 

OTMoveIt3 by OldTimer - Version 1.0.8.0 log created on 01242009_225426

 

Files moved on Reboot...

File C:\DOCUME~1\amadou\LOCALS~1\Temp\etilqs_ie4iWSyyu4go8Pf9yZSW not found!

File C:\DOCUME~1\amadou\LOCALS~1\Temp\~DF1620.tmp not found!

File C:\DOCUME~1\amadou\LOCALS~1\Temp\~DF1633.tmp not found!

File C:\DOCUME~1\amadou\LOCALS~1\Temp\~DFEED1.tmp not found!

File C:\DOCUME~1\amadou\LOCALS~1\Temp\~DFEEE3.tmp not found!

File move failed. C:\Documents and Settings\LocalService\Local Settings\Temp\Temporary Internet Files\Content.IE5\index.dat scheduled to be moved on reboot.

File move failed. C:\Documents and Settings\LocalService\Local Settings\Temp\History\History.IE5\index.dat scheduled to be moved on reboot.

File move failed. C:\Documents and Settings\LocalService\Local Settings\Temp\Cookies\index.dat scheduled to be moved on reboot.

File C:\WINDOWS\temp\Perflib_Perfdata_340.dat not found!

C:\Documents and Settings\amadou\Local Settings\Application Data\Mozilla\Firefox\Profiles\a6d4kr98.default\Cache\_CACHE_001_ moved successfully.

C:\Documents and Settings\amadou\Local Settings\Application Data\Mozilla\Firefox\Profiles\a6d4kr98.default\Cache\_CACHE_002_ moved successfully.

C:\Documents and Settings\amadou\Local Settings\Application Data\Mozilla\Firefox\Profiles\a6d4kr98.default\Cache\_CACHE_003_ moved successfully.

C:\Documents and Settings\amadou\Local Settings\Application Data\Mozilla\Firefox\Profiles\a6d4kr98.default\Cache\_CACHE_MAP_ moved successfully.

C:\Documents and Settings\amadou\Local Settings\Application Data\Mozilla\Firefox\Profiles\a6d4kr98.default\urlclassifier3.sqlite moved successfully.

 

 

rapport Malwarebytes :

 

Malwarebytes' Anti-Malware 1.33

Version de la base de données: 1691

Windows 5.1.2600 Service Pack 3

 

24/01/2009 23:48:57

mbam-log-2009-01-24 (23-48-57).txt

 

Type de recherche: Examen complet (C:\|D:\|)

Eléments examinés: 111232

Temps écoulé: 31 minute(s), 14 second(s)

 

Processus mémoire infecté(s): 0

Module(s) mémoire infecté(s): 0

Clé(s) du Registre infectée(s): 0

Valeur(s) du Registre infectée(s): 0

Elément(s) de données du Registre infecté(s): 0

Dossier(s) infecté(s): 3

Fichier(s) infecté(s): 494

 

Processus mémoire infecté(s):

(Aucun élément nuisible détecté)

 

Module(s) mémoire infecté(s):

(Aucun élément nuisible détecté)

 

Clé(s) du Registre infectée(s):

(Aucun élément nuisible détecté)

 

Valeur(s) du Registre infectée(s):

(Aucun élément nuisible détecté)

 

Elément(s) de données du Registre infecté(s):

(Aucun élément nuisible détecté)

 

Dossier(s) infecté(s):

C:\Documents and Settings\amadou\Application Data\SpywareRemover (Rogue.Spyware.Remover) -> Quarantined and deleted successfully.

C:\Documents and Settings\amadou\Application Data\SpywareRemover\Log (Rogue.Spyware.Remover) -> Quarantined and deleted successfully.

C:\Documents and Settings\amadou\Application Data\SpywareRemover\Settings (Rogue.Spyware.Remover) -> Quarantined and deleted successfully.

 

Fichier(s) infecté(s):

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp0_129676141744.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp0_130427742228.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp0_131704112054.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp0_145607582229.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp0_149563231129.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp0_170275391232.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp0_172492163268.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp0_175184719119.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp0_17522478201.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp0_185188552099.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp0_195430854563.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp0_200406881670.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp0_212200469032.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp0_215190676464.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp0_21758618210.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp0_230401536511.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp0_241506645560.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp0_252293220770.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp0_262382162009.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp0_269123523823.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp0_270143373455.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp0_272784715926.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp0_277785232870.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp0_283050708238.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp0_289751626145.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp0_295449687235.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp0_310357283459.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp0_310915352806.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp0_31737808107.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp0_323227509869.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp0_329325582696.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp0_336989221883.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp0_3401673571.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp0_34960432243.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp0_351981746137.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp0_35742739125.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp0_362844281543.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp0_378567251780.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp0_385849191890.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp0_397425863401.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp0_400155452977.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp0_41586250515.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp0_42739359512.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp0_429812676327.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp0_434276108930.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp0_52718669558.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp0_605514695364.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp0_707904599320.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp0_797456785801.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp0_816032285911.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp0_438383398353.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp0_441554426689.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp0_473010373020.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp0_488985816278.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp0_491108709905.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp0_496630175250.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp0_496894600119.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp0_496917703366.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp0_517985329884.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp0_526302634990.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp0_549114331536.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp0_55533929175.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp0_556360222689.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp0_557423177699.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp0_574788337921.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp0_579198214411.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp0_586553176213.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp0_58894055760.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp0_616777127087.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp0_629310626500.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp0_635692450969.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp0_637651738702.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp0_651738835503.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp0_656517875476.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp0_656522676296.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp0_665395180096.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp0_672629164013.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp0_678943194874.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp0_68646819190.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp0_69281676959.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp0_70860273842.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp0_73549753478.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp0_743992304379.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp0_745819122633.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp0_754244167668.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp0_766854875611.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp0_76786568102.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp0_773096444323.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp0_778017431516.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp0_778818500783.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp0_792144577134.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp0_80060653731.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp0_801200883708.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp0_815857363770.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp0_8210041265.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp0_83755415818.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp0_839211375486.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp0_842860230935.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp0_854233229975.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp0_865543777157.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp0_865786851330.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp0_86960174024.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp0_89252748186.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp0_94575385836.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp0_884905380284.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp1_170273780644.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp1_27495227005.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp1_311676664801.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp1_3479879336.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp1_43536333111.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp1_471396299764.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp1_134231456925.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp1_161426361009.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp1_161470408394.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp1_163585627014.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp1_180255489806.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp1_22336856632.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp1_223707230989.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp1_224444606310.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp1_227126237351.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp1_232847826074.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp1_242064426403.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp1_245932286403.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp1_24880937471.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp1_250227462441.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp1_2751770046.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp1_275207355413.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp1_280550111607.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp1_282213368632.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp1_291710300684.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp1_304543195936.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp1_32097324244.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp1_333877694668.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp1_343112115616.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp1_3558170609.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp1_356185846391.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp1_371759527175.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp1_387956356540.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp1_395713582287.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp1_398230534798.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp1_398416642369.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp1_400847274254.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp1_40387842500.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp1_405018892973.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp1_416704741107.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp1_417779339995.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp1_421671829258.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp1_426433670832.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp1_42944359005.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp1_431482237066.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp1_436726117279.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp1_483199614057.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp1_496847591425.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp1_503615420459.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp1_508125217083.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp1_514285345026.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp1_517077624663.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp1_517292554564.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp1_518749506186.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp1_52223199718.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp1_533310161685.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp1_534353103984.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp1_537798804247.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp1_550423162589.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp1_563220485363.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp1_564969208459.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp1_58748231118.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp1_603079673561.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp1_606239174171.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp1_618520665356.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp1_632050550605.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp1_632571668807.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp1_633512582720.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp1_634263544220.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp1_646802744999.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp1_65288519462.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp1_656248887300.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp1_66201102690.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp1_668902668778.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp1_67792413296.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp1_684833125534.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp1_692829811987.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp0_282822584644.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp0_306036591793.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp1_708640372784.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp1_723031805452.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp1_724816546166.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp1_728480371846.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp1_73132274896.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp1_74931472902.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp1_764695226146.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp1_767711577959.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp1_775580505239.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp1_778061300914.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp1_778520470184.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp1_78538724700.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp1_786903591811.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp1_81386250356.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp1_8290655006.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp1_834283106177.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp1_835274547392.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp1_846417493109.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp1_8464312652.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp1_848528655035.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp1_85471854978.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp1_855260445694.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp1_865698365508.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp1_873251189089.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp1_874020782095.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp1_875577592169.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp1_875904739630.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp1_89328230315.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp1_897266410806.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp2_106879505944.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp2_109921246848.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp2_110125410855.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp2_111496549615.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp2_11728075539.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp2_12420722201.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp2_129576213830.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp2_14199265651.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp2_154727733085.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp2_155966354953.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp2_163001582333.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp2_168892352371.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp2_169588127660.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp1_834046319371.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp2_186437304019.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp2_193968847352.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp2_201555186444.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp2_203420687223.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp2_214314697642.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp2_216256708038.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp2_228399775600.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp2_228989743140.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp2_235697746760.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp2_236944188532.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp2_254664809643.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp2_25917973217.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp2_281536468181.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp2_28567278496.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp2_310153503963.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp2_312953844058.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp2_321300459178.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp2_323096780010.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp2_340019471992.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp2_348346456166.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp2_360095793221.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp2_367938218100.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp2_372700440038.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp2_37746380712.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp2_379372494504.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp2_384490386097.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp2_386774330518.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp2_387049756398.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp2_38734636323.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp2_389631542905.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp2_39610779724.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp2_402471250630.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp2_404404222079.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp2_406942374359.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp2_418722811394.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp2_421965314406.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp2_44237238647.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp2_448536135629.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp2_457299210083.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp2_458115497269.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp2_467980358499.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp2_472395592758.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp2_47254356635.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp2_478616629037.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp2_481355560035.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp2_49406511722.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp2_49529145310.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp2_512527848684.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp2_517666131556.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp2_543015745310.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp2_5455344916.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp2_606224502269.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp2_612966854498.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp2_616282700094.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp2_635797247655.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp2_208561889988.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp2_367954662602.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp2_390778150724.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp2_416652196012.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp2_5543621838.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp2_596344146434.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp2_639430764076.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp2_641333194442.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp2_642937663124.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp2_68189634721.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp2_684111514370.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp2_68847604240.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp2_696278846689.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp2_697735572320.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp2_709090523515.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp2_711667418687.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp2_715420239332.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp2_723109395944.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp2_732593198676.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp2_73438872908.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp2_743753691981.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp2_74647545078.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp2_758841610385.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp2_766186713327.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp2_769193548935.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp2_774964580080.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp2_779236309525.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp2_789858491370.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp2_799105409648.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp2_80593737736.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp2_808894474936.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp2_81233583729.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp2_829342801500.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp2_83966561456.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp2_847428252157.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp2_859736826501.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp2_886757549311.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp2_9873468461.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp3_100455362734.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp3_103012209578.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp3_123101590829.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp3_12485143673.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp3_131103553619.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp3_139131312411.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp3_139621737839.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp3_156451268183.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp3_16191380830.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp3_16193139061.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp3_170199466707.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp3_1719103065.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp3_187489764273.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp3_195290200726.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp3_197311258572.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp3_203720256201.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp3_211723282205.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp3_232452277600.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp3_246828282378.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp3_252422375877.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp3_252859252576.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp3_26579311664.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp3_27102739856.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp3_273700698306.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp3_281631826299.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp3_301749193848.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp3_312680686867.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp2_899866269013.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp3_192382788332.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp3_314973208778.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp3_317441788756.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp3_31935643383.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp3_32379190963.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp3_342453649678.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp3_347668465715.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp3_35788305478.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp3_366729535054.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp3_375654192653.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp3_397587654176.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp3_406146765358.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp3_428017390817.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp3_43609891749.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp3_441942312629.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp3_448271410079.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp3_449807680585.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp3_451543284941.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp3_470971330651.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp3_483558803721.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp3_494102878482.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp3_509177930.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp3_512928141635.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp3_513674390193.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp3_514908253106.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp3_517694180871.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp3_527848502584.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp3_531792854748.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp3_533307610732.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp3_53495687176.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp3_536651382204.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp3_56577525803.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp3_592253168083.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp3_597704124667.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp3_611751638092.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp3_614161892725.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp3_619062499471.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp3_621621699620.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp3_624958395205.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp3_627856538834.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp3_64255646234.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp3_643858605195.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp3_652154437643.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp3_654908345712.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp3_662084508549.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp3_665505550014.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp3_6720186840.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp3_679840886207.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp3_69712397665.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp3_709216582537.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp3_71763483412.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp3_739626440893.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp3_742984784967.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp3_74336543454.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp3_749535382837.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp3_749754487837.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp3_750384415025.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp3_764161291923.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp3_773307841096.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp3_77658536151.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp3_79753552884.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp3_313078489091.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp3_346272399625.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp3_467126105899.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp3_507080581812.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp3_538780482105.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp3_730312260066.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp3_804769129482.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp3_805899746466.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp3_821542403662.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp3_824553370217.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp3_8307758253.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp3_840408744619.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp3_840431141468.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp3_85755544683.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp3_859778573564.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp3_86083646259.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp3_8613723014.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp3_89801814312.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp3_98589509528.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp4_141415432477.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp4_144676840879.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp4_161087672298.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp4_177306836744.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp4_19011327263.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp4_21307150438.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp4_234330832613.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp4_254818726426.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp4_2649107181.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp4_272088167873.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp4_308008795887.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp4_32592831861.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp4_331712313899.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp4_34743673008.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp4_354897789377.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp4_389520791726.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp4_403088457695.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp4_412027558777.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp4_449377761366.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp4_45773460105.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp4_481791873101.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp4_511765504463.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp4_529470143317.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp4_557723302281.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp4_558083179075.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp4_64349847203.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp4_644720307348.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp4_645352198.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp4_662982589272.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp4_670700391168.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp4_670745489893.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp4_672813708059.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp4_67382128728.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp4_67559717652.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp4_679565715852.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp4_680148182180.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp4_685930298010.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp4_880723394964.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp5_57528751340.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp4_720710123259.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp4_738928547012.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp4_771316665992.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp4_809674444883.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp4_840185626081.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp4_85719551880.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp4_874204138875.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp4_885305218476.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp4_892553216996.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp4_896414795089.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp4_9855305492.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp5_124631562096.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp5_13090982007.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp5_376914579129.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp5_407539795753.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp5_42329152018.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp5_479904548583.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp5_493260440371.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp5_591303618905.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp5_751476737387.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp6_213546369341.bk.vir (Trojan.Agent) -> Quarantined and deleted successfully.

C:\System Volume Information\_restore{AA9B38FB-1993-42C2-A0DD-3F494A22996B}\RP684\A0275954.old (Trojan.Agent) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\tmp5_203143817920.bk.old (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\amadou\Application Data\SpywareRemover\rs.dat (Rogue.Spyware.Remover) -> Quarantined and deleted successfully.

C:\Documents and Settings\amadou\Application Data\SpywareRemover\Log\2008 Sep 23 - 01_18_21 AM_375.log (Rogue.Spyware.Remover) -> Quarantined and deleted successfully.

C:\Documents and Settings\amadou\Application Data\SpywareRemover\Settings\ScanResults.pie (Rogue.Spyware.Remover) -> Quarantined and deleted successfully.

C:\WINDOWS\KBPK080605.log (Trojan.Agent) -> Quarantined and deleted successfully.

 

 

rapport antivir :

 

 

 

Avira AntiVir Personal

Report file date: samedi 24 janvier 2009 23:59

 

Scanning for 1274398 virus strains and unwanted programs.

 

Licensed to: Avira AntiVir PersonalEdition Classic

Serial number: 0000149996-ADJIE-0001

Platform: Windows XP

Windows version: (Service Pack 3) [5.1.2600]

Boot mode: Normally booted

Username: SYSTEM

Computer name: AMAD

 

Version information:

BUILD.DAT : 8.2.0.337 16934 Bytes 11/18/2008 13:05:00

AVSCAN.EXE : 8.1.4.10 315649 Bytes 11/18/2008 14:21:26

AVSCAN.DLL : 8.1.4.0 40705 Bytes 5/26/2008 13:56:40

LUKE.DLL : 8.1.4.5 164097 Bytes 6/12/2008 18:44:19

LUKERES.DLL : 8.1.4.0 12033 Bytes 5/26/2008 13:58:52

ANTIVIR0.VDF : 7.1.0.0 15603712 Bytes 10/27/2008 17:30:36

ANTIVIR1.VDF : 7.1.1.113 2817536 Bytes 1/14/2009 17:36:48

ANTIVIR2.VDF : 7.1.1.172 958464 Bytes 1/23/2009 03:42:10

ANTIVIR3.VDF : 7.1.1.175 29696 Bytes 1/24/2009 03:41:55

Engineversion : 8.2.0.60

AEVDF.DLL : 8.1.0.6 102772 Bytes 10/14/2008 16:05:56

AESCRIPT.DLL : 8.1.1.32 340347 Bytes 1/23/2009 03:43:14

AESCN.DLL : 8.1.1.5 123251 Bytes 11/7/2008 21:06:41

AERDL.DLL : 8.1.1.3 438645 Bytes 11/4/2008 19:58:38

AEPACK.DLL : 8.1.3.5 393588 Bytes 1/14/2009 17:37:34

AEOFFICE.DLL : 8.1.0.33 196987 Bytes 1/14/2009 17:37:26

AEHEUR.DLL : 8.1.0.86 1552759 Bytes 1/23/2009 03:43:10

AEHELP.DLL : 8.1.2.0 119159 Bytes 1/14/2009 17:37:00

AEGEN.DLL : 8.1.1.10 323957 Bytes 1/17/2009 03:42:29

AEEMU.DLL : 8.1.0.9 393588 Bytes 10/14/2008 16:05:56

AECORE.DLL : 8.1.5.2 172405 Bytes 1/14/2009 17:36:54

AEBB.DLL : 8.1.0.3 53618 Bytes 10/14/2008 16:05:56

AVWINLL.DLL : 1.0.0.12 15105 Bytes 7/9/2008 14:40:05

AVPREF.DLL : 8.0.2.0 38657 Bytes 5/16/2008 15:28:01

AVREP.DLL : 8.0.0.2 98344 Bytes 7/31/2008 18:02:15

AVREG.DLL : 8.0.0.1 33537 Bytes 5/9/2008 17:26:40

AVARKT.DLL : 1.0.0.23 307457 Bytes 2/12/2008 14:29:23

AVEVTLOG.DLL : 8.0.0.16 119041 Bytes 6/12/2008 18:27:49

SQLITE3.DLL : 3.3.17.1 339968 Bytes 1/22/2008 23:28:02

SMTPLIB.DLL : 1.2.0.23 28929 Bytes 6/12/2008 18:49:40

NETNT.DLL : 8.0.0.1 7937 Bytes 1/25/2008 18:05:10

RCIMAGE.DLL : 8.0.0.51 2371841 Bytes 6/12/2008 19:48:07

RCTEXT.DLL : 8.0.52.0 86273 Bytes 6/27/2008 19:34:37

 

Configuration settings for the scan:

Jobname..........................: Complete system scan

Configuration file...............: c:\program files\avira\antivir personaledition classic\sysscan.avp

Logging..........................: low

Primary action...................: interactive

Secondary action.................: ignore

Scan master boot sector..........: on

Scan boot sector.................: on

Boot sectors.....................: C:, D:,

Process scan.....................: on

Scan registry....................: on

Search for rootkits..............: off

Scan all files...................: Intelligent file selection

Scan archives....................: on

Recursion depth..................: 20

Smart extensions.................: on

Macro heuristic..................: on

File heuristic...................: medium

 

Start of the scan: samedi 24 janvier 2009 23:59

 

The scan of running processes will be started

Scan process 'avscan.exe' - '1' Module(s) have been scanned

Scan process 'avcenter.exe' - '1' Module(s) have been scanned

Scan process 'wmplayer.exe' - '1' Module(s) have been scanned

Scan process 'firefox.exe' - '1' Module(s) have been scanned

Scan process 'explorer.exe' - '1' Module(s) have been scanned

Scan process 'usnsvc.exe' - '1' Module(s) have been scanned

Scan process 'avgnt.exe' - '1' Module(s) have been scanned

Scan process 'InfoMyCa.exe' - '1' Module(s) have been scanned

Scan process 'VTTrayp.exe' - '1' Module(s) have been scanned

Scan process 'VTTimer.exe' - '1' Module(s) have been scanned

Scan process 'sm56hlpr.exe' - '1' Module(s) have been scanned

Scan process 'Monitor.exe' - '1' Module(s) have been scanned

Scan process 'alg.exe' - '1' Module(s) have been scanned

Scan process 'svchost.exe' - '1' Module(s) have been scanned

Scan process 'jqs.exe' - '1' Module(s) have been scanned

Scan process 'WLanCfgG.exe' - '1' Module(s) have been scanned

Scan process 'WLService.exe' - '1' Module(s) have been scanned

Scan process 'avguard.exe' - '1' Module(s) have been scanned

Scan process 'sched.exe' - '1' Module(s) have been scanned

Scan process 'spoolsv.exe' - '1' Module(s) have been scanned

Scan process 'svchost.exe' - '1' Module(s) have been scanned

Scan process 'svchost.exe' - '1' Module(s) have been scanned

Scan process 'svchost.exe' - '1' Module(s) have been scanned

Scan process 'svchost.exe' - '1' Module(s) have been scanned

Scan process 'svchost.exe' - '1' Module(s) have been scanned

Scan process 'svchost.exe' - '1' Module(s) have been scanned

Scan process 'lsass.exe' - '1' Module(s) have been scanned

Scan process 'services.exe' - '1' Module(s) have been scanned

Scan process 'winlogon.exe' - '1' Module(s) have been scanned

Scan process 'csrss.exe' - '1' Module(s) have been scanned

Scan process 'smss.exe' - '1' Module(s) have been scanned

31 processes with 31 modules were scanned

 

Starting master boot sector scan:

Master boot sector HD0

[iNFO] No virus was found!

Master boot sector HD1

[iNFO] No virus was found!

[WARNING] System error [21]: The device is not ready.

Master boot sector HD2

[iNFO] No virus was found!

[WARNING] System error [21]: The device is not ready.

Master boot sector HD3

[iNFO] No virus was found!

[WARNING] System error [21]: The device is not ready.

Master boot sector HD4

[iNFO] No virus was found!

[WARNING] System error [21]: The device is not ready.

 

Start scanning boot sectors:

Boot sector 'C:\'

[iNFO] No virus was found!

Boot sector 'D:\'

[iNFO] No virus was found!

 

Starting to scan the registry.

The registry was scanned ( '64' files ).

 

 

Starting the file scan:

 

Begin scan in 'C:\' <ACER>

C:\hiberfil.sys

[WARNING] The file could not be opened!

C:\pagefile.sys

[WARNING] The file could not be opened!

C:\Documents and Settings\amadou\Desktop\ComboFix.exe

[0] Archive type: RAR SFX (self extracting)

--> 32788R22FWJFW\catchme.cfexe

[DETECTION] Is the TR/Murdak.A.36 Trojan

[WARNING] The file was ignored!

C:\Qoobox\Quarantine\C\WINDOWS\system32\afisicx.exe.vir

[DETECTION] Is the TR/Agent2.CN.16 Trojan

[NOTE] The file was moved to '49e4f61c.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\mabidwe.exe.vir

[DETECTION] Is the TR/Agent2.BV Trojan

[NOTE] The file was moved to '49ddf624.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\noytcyr.exe.vir

[DETECTION] Is the TR/Agent2.CN.18 Trojan

[NOTE] The file was moved to '49f4f632.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\roytctm.exe.vir

[DETECTION] Is the TR/Agent2.CN.21 Trojan

[NOTE] The file was moved to '4a2958bb.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp0_10000209578.bk.vir

[DETECTION] Is the TR/Dldr.Delf.rec Trojan

[NOTE] The file was moved to '49ebf631.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp0_109396535051.bk.vir

[DETECTION] Is the TR/Dldr.Delf.red Trojan

[NOTE] The file was moved to '4a3658ba.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp0_115587196142.bk.vir

[DETECTION] Is the TR/Dldr.Delf.rec Trojan

[NOTE] The file was moved to '49ebf633.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp0_11846456381.bk.vir

[DETECTION] Is the TR/Dldr.Delf.red Trojan

[NOTE] The file was moved to '49ebf632.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp0_118703489196.bk.vir

[DETECTION] Is the TR/Dldr.Delf.rdn Trojan

[NOTE] The file was moved to '4a3658bb.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp0_121621539056.bk.vir

[DETECTION] Is the TR/Dldr.Delf.rgm Trojan

[NOTE] The file was moved to '49ebf634.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp0_123981389532.bk.vir

[DETECTION] Is the TR/Dldr.Delf.rdn Trojan

[NOTE] The file was moved to '4a3658bc.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp0_129767804416.bk.vir

[DETECTION] Is the TR/Dldr.Delf.red Trojan

[NOTE] The file was moved to '49ebf635.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp0_134879193046.bk.vir

[DETECTION] Is the TR/Dldr.Delf.rgm Trojan

[NOTE] The file was moved to '4a3658bd.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp0_144668152609.bk.vir

[DETECTION] Is the TR/Dldr.Delf.red Trojan

[NOTE] The file was moved to '49ebf636.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp0_145382321891.bk.vir

[DETECTION] Is the TR/Dldr.Delf.rec Trojan

[NOTE] The file was moved to '4a3658bf.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp0_145424152092.bk.vir

[DETECTION] Is the TR/Dldr.Delf.red Trojan

[NOTE] The file was moved to '49ebf648.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp0_157608671529.bk.vir

[DETECTION] Is the TR/Dldr.Delf.red Trojan

[NOTE] The file was moved to '4a3658be.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp0_17418058825.bk.vir

[DETECTION] Is the TR/Dldr.Delf.red Trojan

[NOTE] The file was moved to '4a3658c1.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp0_18624613459.bk.vir

[DETECTION] Is the TR/Dldr.Delf.red Trojan

[NOTE] The file was moved to '49ebf64a.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp0_19569509578.bk.vir

[DETECTION] Is the TR/Dldr.Delf.rdj Trojan

[NOTE] The file was moved to '49ebf637.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp0_19790248615.bk.vir

[DETECTION] Is the TR/Dldr.Delf.rec Trojan

[NOTE] The file was moved to '4a3658b0.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp0_200043743837.bk.vir

[DETECTION] Is the TR/Dldr.Delf.rgm Trojan

[NOTE] The file was moved to '49ebf638.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp0_236131498596.bk.vir

[DETECTION] Is the TR/Dldr.Delf.rgl Trojan

[NOTE] The file was moved to '4a3658b1.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp0_23653647389.bk.vir

[DETECTION] Is the TR/Dldr.Delf.red Trojan

[NOTE] The file was moved to '49ebf639.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp0_254783687404.bk.vir

[DETECTION] Is the TR/Dldr.Delf.rec Trojan

[NOTE] The file was moved to '4a3658b2.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp0_260091510597.bk.vir

[DETECTION] Is the TR/Dldr.Delf.rgl Trojan

[NOTE] The file was moved to '49ebf63a.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp0_269485653580.bk.vir

[DETECTION] Is the TR/Dldr.Delf.rec Trojan

[NOTE] The file was moved to '4a3658b3.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp0_29101624017.bk.vir

[DETECTION] Is the TR/Dldr.Delf.rec Trojan

[NOTE] The file was moved to '49ebf63b.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp0_291549604462.bk.vir

[DETECTION] Is the TR/Dldr.Delf.rec Trojan

[NOTE] The file was moved to '4a3658b4.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp0_297821766649.bk.vir

[DETECTION] Is the TR/Dldr.Delf.red Trojan

[NOTE] The file was moved to '49ebf63d.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp0_30265767848.bk.vir

[DETECTION] Is the TR/Dldr.Delf.rec Trojan

[NOTE] The file was moved to '49ebf63c.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp0_310642853659.bk.vir

[DETECTION] Is the TR/Dldr.Delf.red Trojan

[NOTE] The file was moved to '4a3658b5.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp0_335748829452.bk.vir

[DETECTION] Is the TR/Dldr.Delf.red Trojan

[NOTE] The file was moved to '49ebf63e.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp0_373117307823.bk.vir

[DETECTION] Is the TR/Dldr.Delf.red Trojan

[NOTE] The file was moved to '4a3658b7.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp0_387736874263.bk.vir

[DETECTION] Is the TR/Dldr.Delf.rec Trojan

[NOTE] The file was moved to '49ebf630.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp0_421846748061.bk.vir

[DETECTION] Is the TR/Dldr.Delf.red Trojan

[NOTE] The file was moved to '49ebf63f.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp0_428787638968.bk.vir

[DETECTION] Is the TR/Dldr.Delf.red Trojan

[NOTE] The file was moved to '49ebf640.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp0_434409733483.bk.vir

[DETECTION] Is the TR/Dldr.Delf.red Trojan

[NOTE] The file was moved to '4a3658c9.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp0_437225251285.bk.vir

[DETECTION] Is the TR/Dldr.Delf.red Trojan

[NOTE] The file was moved to '49ebf641.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp0_44539891478.bk.vir

[DETECTION] Is the TR/Dldr.Delf.rdj Trojan

[NOTE] The file was moved to '49ebf642.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp0_446764144572.bk.vir

[DETECTION] Is the TR/Dldr.Delf.rgm Trojan

[NOTE] The file was moved to '4a3658cb.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp0_447026306947.bk.vir

[DETECTION] Is the TR/Dldr.Delf.rec Trojan

[NOTE] The file was moved to '49ebf643.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp0_455588296705.bk.vir

[DETECTION] Is the TR/Dldr.Delf.rec Trojan

[NOTE] The file was moved to '4a3658cc.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp0_515061549770.bk.vir

[DETECTION] Is the TR/Dldr.Delf.rdk Trojan

[NOTE] The file was moved to '49ebf644.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp0_52127145440.bk.vir

[DETECTION] Is the TR/Dldr.Delf.rec Trojan

[NOTE] The file was moved to '49ebf645.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp0_52201196459.bk.vir

[DETECTION] Is the TR/Dldr.Delf.rec Trojan

[NOTE] The file was moved to '4a3658ce.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp0_528041607105.bk.vir

[DETECTION] Is the TR/Dldr.Delf.red Trojan

[NOTE] The file was moved to '49ebf647.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp0_544336595680.bk.vir

[DETECTION] Is the TR/Dldr.Delf.red Trojan

[NOTE] The file was moved to '49ebf646.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp0_558169651088.bk.vir

[DETECTION] Is the TR/Dldr.Delf.rgm Trojan

[NOTE] The file was moved to '4a3658cf.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp0_568050523659.bk.vir

[DETECTION] Is the TR/Dldr.Delf.rec Trojan

[NOTE] The file was moved to '4a3658c0.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp0_580100145413.bk.vir

[DETECTION] Is the TR/Dldr.Delf.rec Trojan

[NOTE] The file was moved to '4a3658c3.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp0_592835550540.bk.vir

[DETECTION] Is the TR/Dldr.Delf.rgl Trojan

[NOTE] The file was moved to '49ebf64c.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp0_61035552238.bk.vir

[DETECTION] Is the TR/Dldr.Delf.rdk Trojan

[NOTE] The file was moved to '49ebf649.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp0_663611530488.bk.vir

[DETECTION] Is the TR/Dldr.Delf.rdk Trojan

[NOTE] The file was moved to '49ebf64b.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp0_669754608134.bk.vir

[DETECTION] Is the TR/Dldr.Delf.red Trojan

[NOTE] The file was moved to '4a3658c4.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp0_677967787018.bk.vir

[DETECTION] Is the TR/Dldr.Delf.rgl Trojan

[NOTE] The file was moved to '49ebf64d.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp0_680345356426.bk.vir

[DETECTION] Is the TR/Dldr.Delf.red Trojan

[NOTE] The file was moved to '4a3658c5.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp0_686032105254.bk.vir

[DETECTION] Is the TR/Dldr.Delf.rdn Trojan

[NOTE] The file was moved to '49ebf64e.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp0_74623523623.bk.vir

[DETECTION] Is the TR/Dldr.Delf.red Trojan

[NOTE] The file was moved to '4a3658c6.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp0_787827316209.bk.vir

[DETECTION] Is the TR/Dldr.Delf.rdj Trojan

[NOTE] The file was moved to '4a3658c7.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp0_805125315973.bk.vir

[DETECTION] Is the TR/Dldr.Delf.rec Trojan

[NOTE] The file was moved to '49ebf650.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp0_815243482009.bk.vir

[DETECTION] Is the TR/Dldr.Delf.rec Trojan

[NOTE] The file was moved to '4a3658d9.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp0_820475717239.bk.vir

[DETECTION] Is the TR/Dldr.Delf.red Trojan

[NOTE] The file was moved to '49ebf652.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp0_827000398305.bk.vir

[DETECTION] Is the TR/Dldr.Delf.rec Trojan

[NOTE] The file was moved to '49ebf651.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp0_83624664852.bk.vir

[DETECTION] Is the TR/Dldr.Delf.red Trojan

[NOTE] The file was moved to '4a3658da.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp0_843839170673.bk.vir

[DETECTION] Is the TR/Dldr.Delf.rec Trojan

[NOTE] The file was moved to '4a3658db.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp0_850793662587.bk.vir

[DETECTION] Is the TR/Dldr.Delf.rgl Trojan

[NOTE] The file was moved to '486d52db.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp0_857004154365.bk.vir

[DETECTION] Is the TR/Dldr.Delf.rec Trojan

[NOTE] The file was moved to '49ebf654.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp0_873178361295.bk.vir

[DETECTION] Is the TR/Dldr.Delf.rec Trojan

[NOTE] The file was moved to '486d52dd.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp0_881677135370.bk.vir

[DETECTION] Is the TR/Dldr.Delf.rec Trojan

[NOTE] The file was moved to '49ebf656.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp0_897549656830.bk.vir

[DETECTION] Is the TR/Dldr.Delf.rec Trojan

[NOTE] The file was moved to '49ebf655.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp0_90961148580.bk.vir

[DETECTION] Is the TR/Dldr.Delf.red Trojan

[NOTE] The file was moved to '486d52de.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp0_92342626903.bk.vir

[DETECTION] Is the TR/Dldr.Delf.rec Trojan

[NOTE] The file was moved to '49ebf657.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp1_110688278276.bk.vir

[DETECTION] Is the TR/Dldr.Delf.rgl Trojan

[NOTE] The file was moved to '486d52df.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp1_110908127698.bk.vir

[DETECTION] Is the TR/Dldr.Delf.red Trojan

[NOTE] The file was moved to '49ebf668.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp1_111165556614.bk.vir

[DETECTION] Is the TR/Dldr.Delf.red Trojan

[NOTE] The file was moved to '486d52e1.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp1_148647178991.bk.vir

[DETECTION] Is the TR/Dldr.Delf.rec Trojan

[NOTE] The file was moved to '49ebf658.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp1_201613405309.bk.vir

[DETECTION] Is the TR/Dldr.Delf.red Trojan

[NOTE] The file was moved to '49ebf65b.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp1_214560637359.bk.vir

[DETECTION] Is the TR/Dldr.Delf.rec Trojan

[NOTE] The file was moved to '49ebf65c.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp1_224193749359.bk.vir

[DETECTION] Is the TR/Dldr.Delf.rec Trojan

[NOTE] The file was moved to '49ebf65e.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp1_252202232512.bk.vir

[DETECTION] Is the TR/Dldr.Delf.rec Trojan

[NOTE] The file was moved to '49ebf660.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp1_255101294348.bk.vir

[DETECTION] Is the TR/Dldr.Delf.red Trojan

[NOTE] The file was moved to '49ebf661.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp1_261306382257.bk.vir

[DETECTION] Is the TR/Dldr.Delf.red Trojan

[NOTE] The file was moved to '486d52ea.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp1_262145870690.bk.vir

[DETECTION] Is the TR/Dldr.Delf.rec Trojan

[NOTE] The file was moved to '49ebf662.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp1_296604390298.bk.vir

[DETECTION] Is the TR/Dldr.Delf.rec Trojan

[NOTE] The file was moved to '486d52eb.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp1_319281572426.bk.vir

[DETECTION] Is the TR/Dldr.Delf.rec Trojan

[NOTE] The file was moved to '49ebf663.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp1_324538668139.bk.vir

[DETECTION] Is the TR/Dldr.Delf.red Trojan

[NOTE] The file was moved to '486d52ec.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp1_325832790218.bk.vir

[DETECTION] Is the TR/Dldr.Delf.rec Trojan

[NOTE] The file was moved to '49ebf665.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp1_345452858929.bk.vir

[DETECTION] Is the TR/Dldr.Delf.red Trojan

[NOTE] The file was moved to '49ebf664.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp1_346780462247.bk.vir

[DETECTION] Is the TR/Dldr.Delf.red Trojan

[NOTE] The file was moved to '486d52ed.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp1_357175311415.bk.vir

[DETECTION] Is the TR/Dldr.Delf.rec Trojan

[NOTE] The file was moved to '49ebf666.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp1_370543249306.bk.vir

[DETECTION] Is the TR/Dldr.Delf.rdk Trojan

[NOTE] The file was moved to '486d52ee.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp1_378970606589.bk.vir

[DETECTION] Is the TR/Dldr.Delf.red Trojan

[NOTE] The file was moved to '486d52ef.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp1_388074324115.bk.vir

[DETECTION] Is the TR/Dldr.Delf.red Trojan

[NOTE] The file was moved to '49ebf678.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp1_393193373933.bk.vir

[DETECTION] Is the TR/Dldr.Delf.red Trojan

[NOTE] The file was moved to '49ebf667.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp1_428192582104.bk.vir

[DETECTION] Is the TR/Dldr.Delf.rec Trojan

[NOTE] The file was moved to '486d52e0.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp1_438220385844.bk.vir

[DETECTION] Is the TR/Dldr.Delf.rdk Trojan

[NOTE] The file was moved to '49ebf66a.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp1_452417476589.bk.vir

[DETECTION] Is the TR/Dldr.Delf.rec Trojan

[NOTE] The file was moved to '486d52e3.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp1_459241674987.bk.vir

[DETECTION] Is the TR/Dldr.Delf.red Trojan

[NOTE] The file was moved to '49ebf669.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp1_460515665708.bk.vir

[DETECTION] Is the TR/Dldr.Delf.rec Trojan

[NOTE] The file was moved to '49ebf66c.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp1_460969180411.bk.vir

[DETECTION] Is the TR/Dldr.Delf.rdk Trojan

[NOTE] The file was moved to '486d52e5.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp1_47665764673.bk.vir

[DETECTION] Is the TR/Dldr.Delf.rec Trojan

[NOTE] The file was moved to '49ebf66b.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp1_496697386754.bk.vir

[DETECTION] Is the TR/Dldr.Delf.rdn Trojan

[NOTE] The file was moved to '49ebf66e.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp1_506031811315.bk.vir

[DETECTION] Is the TR/Dldr.Delf.rgl Trojan

[NOTE] The file was moved to '486d52e7.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp1_519270220466.bk.vir

[DETECTION] Is the TR/Dldr.Delf.rgl Trojan

[NOTE] The file was moved to '49ebf66d.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp1_520141772747.bk.vir

[DETECTION] Is the TR/Dldr.Delf.rec Trojan

[NOTE] The file was moved to '486d52e9.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp1_525664593551.bk.vir

[DETECTION] Is the TR/Dldr.Delf.rec Trojan

[NOTE] The file was moved to '486d52f1.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp1_55617322000.bk.vir

[DETECTION] Is the TR/Dldr.Delf.rec Trojan

[NOTE] The file was moved to '49ebf670.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp1_558933353415.bk.vir

[DETECTION] Is the TR/Dldr.Delf.rec Trojan

[NOTE] The file was moved to '49ebf671.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp1_561651351854.bk.vir

[DETECTION] Is the TR/Dldr.Delf.rec Trojan

[NOTE] The file was moved to '486d52fa.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp1_567866772138.bk.vir

[DETECTION] Is the TR/Dldr.Delf.rdj Trojan

[NOTE] The file was moved to '49ebf672.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp1_582101569.bk.vir

[DETECTION] Is the TR/Dldr.Delf.rec Trojan

[NOTE] The file was moved to '486d52fb.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp1_591282577011.bk.vir

[DETECTION] Is the TR/Dldr.Delf.rgm Trojan

[NOTE] The file was moved to '49ebf673.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp1_61725194806.bk.vir

[DETECTION] Is the TR/Dldr.Delf.rgm Trojan

[NOTE] The file was moved to '486d52fc.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp1_64402576633.bk.vir

[DETECTION] Is the TR/Dldr.Delf.red Trojan

[NOTE] The file was moved to '49ebf674.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp1_64680817943.bk.vir

[DETECTION] Is the TR/Dldr.Delf.red Trojan

[NOTE] The file was moved to '486d52fd.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp1_652159180634.bk.vir

[DETECTION] Is the TR/Dldr.Delf.red Trojan

[NOTE] The file was moved to '49ebf676.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp1_65415823426.bk.vir

[DETECTION] Is the TR/Dldr.Delf.red Trojan

[NOTE] The file was moved to '49ebf675.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp1_66372564205.bk.vir

[DETECTION] Is the TR/Dldr.Delf.rdj Trojan

[NOTE] The file was moved to '486d52ff.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp1_66399868103.bk.vir

[DETECTION] Is the TR/Dldr.Delf.red Trojan

[NOTE] The file was moved to '49ebf788.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp1_670804801855.bk.vir

[DETECTION] Is the TR/Dldr.Delf.rec Trojan

[NOTE] The file was moved to '486d5301.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp1_675967387201.bk.vir

[DETECTION] Is the TR/Dldr.Delf.red Trojan

[NOTE] The file was moved to '49ebf677.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp1_676254584895.bk.vir

[DETECTION] Is the TR/Dldr.Delf.red Trojan

[NOTE] The file was moved to '486d52f0.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp1_701975887186.bk.vir

[DETECTION] Is the TR/Dldr.Delf.rgm Trojan

[NOTE] The file was moved to '49ebf67a.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp1_704050344857.bk.vir

[DETECTION] Is the TR/Dldr.Delf.rdn Trojan

[NOTE] The file was moved to '486d52f3.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp1_713531250653.bk.vir

[DETECTION] Is the TR/Dldr.Delf.red Trojan

[NOTE] The file was moved to '49ebf679.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp1_72823931809.bk.vir

[DETECTION] Is the TR/Dldr.Delf.rec Trojan

[NOTE] The file was moved to '486d52f2.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp1_73376910184.bk.vir

[DETECTION] Is the TR/Dldr.Delf.rdj Trojan

[NOTE] The file was moved to '49ebf67c.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp1_74133345338.bk.vir

[DETECTION] Is the TR/Dldr.Delf.rgm Trojan

[NOTE] The file was moved to '486d52f5.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp1_772497590678.bk.vir

[DETECTION] Is the TR/Dldr.Delf.rgl Trojan

[NOTE] The file was moved to '49ebf67b.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp1_77446312782.bk.vir

[DETECTION] Is the TR/Dldr.Delf.rec Trojan

[NOTE] The file was moved to '486d52f4.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp1_799562665449.bk.vir

[DETECTION] Is the TR/Dldr.Delf.rgl Trojan

[NOTE] The file was moved to '49ebf67e.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp1_819635462980.bk.vir

[DETECTION] Is the TR/Dldr.Delf.rec Trojan

[NOTE] The file was moved to '49ebf67d.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp1_827813489175.bk.vir

[DETECTION] Is the TR/Dldr.Delf.red Trojan

[NOTE] The file was moved to '486d52f7.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp1_834141044.bk.vir

[DETECTION] Is the TR/Dldr.Delf.rgm Trojan

[NOTE] The file was moved to '486d52f9.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp1_852630861219.bk.vir

[DETECTION] Is the TR/Dldr.Delf.red Trojan

[NOTE] The file was moved to '49ebf78a.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp1_857688484170.bk.vir

[DETECTION] Is the TR/Dldr.Delf.rec Trojan

[NOTE] The file was moved to '49ebf67f.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp1_866361522899.bk.vir

[DETECTION] Is the TR/Dldr.Delf.red Trojan

[NOTE] The file was moved to '486d5208.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp1_869590719405.bk.vir

[DETECTION] Is the TR/Dldr.Delf.rdn Trojan

[NOTE] The file was moved to '49ebf680.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp1_871599791264.bk.vir

[DETECTION] Is the TR/Dldr.Delf.red Trojan

[NOTE] The file was moved to '486d5209.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp1_893904214462.bk.vir

[DETECTION] Is the TR/Dldr.Delf.rec Trojan

[NOTE] The file was moved to '49ebf682.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp1_899580129685.bk.vir

[DETECTION] Is the TR/Dldr.Delf.red Trojan

[NOTE] The file was moved to '49ebf681.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp2_10505715514.bk.vir

[DETECTION] Is the TR/Dldr.Delf.rec Trojan

[NOTE] The file was moved to '486d520b.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp2_143489882763.bk.vir

[DETECTION] Is the TR/Dldr.Delf.red Trojan

[NOTE] The file was moved to '49ebf684.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp2_149190418966.bk.vir

[DETECTION] Is the TR/Dldr.Delf.rec Trojan

[NOTE] The file was moved to '486d520d.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp2_154333652042.bk.vir

[DETECTION] Is the TR/Dldr.Delf.red Trojan

[NOTE] The file was moved to '49ebf683.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp2_167121285660.bk.vir

[DETECTION] Is the TR/Dldr.Delf.rdj Trojan

[NOTE] The file was moved to '486d520c.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp2_170102437130.bk.vir

[DETECTION] Is the TR/Dldr.Delf.rdk Trojan

[NOTE] The file was moved to '49ebf685.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp2_190378575363.bk.vir

[DETECTION] Is the TR/Dldr.Delf.rdn Trojan

[NOTE] The file was moved to '49ebf686.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp2_198029830343.bk.vir

[DETECTION] Is the TR/Dldr.Delf.rdn Trojan

[NOTE] The file was moved to '486d520f.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp2_203168865166.bk.vir

[DETECTION] Is the TR/Dldr.Delf.rgm Trojan

[NOTE] The file was moved to '486d520e.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp2_233697364767.bk.vir

[DETECTION] Is the TR/Dldr.Delf.rec Trojan

[NOTE] The file was moved to '49ebf698.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp2_248677812629.bk.vir

[DETECTION] Is the TR/Dldr.Delf.red Trojan

[NOTE] The file was moved to '486d5211.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp2_252730628683.bk.vir

[DETECTION] Is the TR/Dldr.Delf.rec Trojan

[NOTE] The file was moved to '49ebf687.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp2_257420888292.bk.vir

[DETECTION] Is the TR/Dldr.Delf.rec Trojan

[NOTE] The file was moved to '486d5200.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp2_262912556671.bk.vir

[DETECTION] Is the TR/Dldr.Delf.rec Trojan

[NOTE] The file was moved to '49ebf689.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp2_266812163828.bk.vir

[DETECTION] Is the TR/Dldr.Delf.rec Trojan

[NOTE] The file was moved to '49ebf688.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp2_277366328175.bk.vir

[DETECTION] Is the TR/Dldr.Delf.rec Trojan

[NOTE] The file was moved to '486d5201.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp2_286279877148.bk.vir

[DETECTION] Is the TR/Dldr.Delf.rec Trojan

[NOTE] The file was moved to '49ebf68a.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp2_31389769256.bk.vir

[DETECTION] Is the TR/Dldr.Delf.rdn Trojan

[NOTE] The file was moved to '486d5202.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp2_320052484956.bk.vir

[DETECTION] Is the TR/Dldr.Delf.red Trojan

[NOTE] The file was moved to '486d5203.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp2_343673688198.bk.vir

[DETECTION] Is the TR/Dldr.Delf.red Trojan

[NOTE] The file was moved to '49ebf68c.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp2_346648744665.bk.vir

[DETECTION] Is the TR/Dldr.Delf.rec Trojan

[NOTE] The file was moved to '49ebf68b.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp2_360711701014.bk.vir

[DETECTION] Is the TR/Dldr.Delf.rec Trojan

[NOTE] The file was moved to '486d5205.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp2_36131671264.bk.vir

[DETECTION] Is the TR/Dldr.Delf.rgm Trojan

[NOTE] The file was moved to '49ebf68e.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp2_396278373593.bk.vir

[DETECTION] Is the TR/Dldr.Delf.rec Trojan

[NOTE] The file was moved to '49ebf68d.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp2_40541487877.bk.vir

[DETECTION] Is the TR/Dldr.Delf.red Trojan

[NOTE] The file was moved to '486d5206.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp2_406317231622.bk.vir

[DETECTION] Is the TR/Dldr.Delf.red Trojan

[NOTE] The file was moved to '49ebf68f.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp2_416095334831.bk.vir

[DETECTION] Is the TR/Dldr.Delf.red Trojan

[NOTE] The file was moved to '486d5207.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp2_418292241559.bk.vir

[DETECTION] Is the TR/Dldr.Delf.rec Trojan

[NOTE] The file was moved to '49ebf69a.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp2_421774856244.bk.vir

[DETECTION] Is the TR/Dldr.Delf.rec Trojan

[NOTE] The file was moved to '486d5213.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp2_432621397269.bk.vir

[DETECTION] Is the TR/Dldr.Delf.rgm Trojan

[NOTE] The file was moved to '486d5218.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp2_435831741981.bk.vir

[DETECTION] Is the TR/Dldr.Delf.red Trojan

[NOTE] The file was moved to '49ebf691.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp2_446648156317.bk.vir

[DETECTION] Is the TR/Dldr.Delf.red Trojan

[NOTE] The file was moved to '486d521a.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp2_449188868371.bk.vir

[DETECTION] Is the TR/Dldr.Delf.red Trojan

[NOTE] The file was moved to '49ebf690.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp2_451627451194.bk.vir

[DETECTION] Is the TR/Dldr.Delf.rgm Trojan

[NOTE] The file was moved to '486d5219.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp2_463624282364.bk.vir

[DETECTION] Is the TR/Dldr.Delf.rdk Trojan

[NOTE] The file was moved to '49ebf693.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp2_486119275446.bk.vir

[DETECTION] Is the TR/Dldr.Delf.rdj Trojan

[NOTE] The file was moved to '486d521c.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp2_500407149729.bk.vir

[DETECTION] Is the TR/Dldr.Delf.rec Trojan

[NOTE] The file was moved to '49ebf692.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp2_521681876867.bk.vir

[DETECTION] Is the TR/Dldr.Delf.rec Trojan

[NOTE] The file was moved to '49ebf695.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp2_524075699867.bk.vir

[DETECTION] Is the TR/Dldr.Delf.red Trojan

[NOTE] The file was moved to '486d521e.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp2_538404864462.bk.vir

[DETECTION] Is the TR/Dldr.Delf.rec Trojan

[NOTE] The file was moved to '49ebf694.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp2_53903934010.bk.vir

[DETECTION] Is the TR/Dldr.Delf.rec Trojan

[NOTE] The file was moved to '486d521d.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp2_541112710691.bk.vir

[DETECTION] Is the TR/Dldr.Delf.red Trojan

[NOTE] The file was moved to '49ebf696.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp2_555731288367.bk.vir

[DETECTION] Is the TR/Dldr.Delf.rec Trojan

[NOTE] The file was moved to '49ebf697.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp2_56854409285.bk.vir

[DETECTION] Is the TR/Dldr.Delf.rec Trojan

[NOTE] The file was moved to '486d521f.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp2_568841432585.bk.vir

[DETECTION] Is the TR/Dldr.Delf.rgl Trojan

[NOTE] The file was moved to '49ebf6a8.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp2_579951306782.bk.vir

[DETECTION] Is the TR/Dldr.Delf.red Trojan

[NOTE] The file was moved to '486d5221.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp2_584389502729.bk.vir

[DETECTION] Is the TR/Dldr.Delf.rec Trojan

[NOTE] The file was moved to '486d5210.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp2_59719082297.bk.vir

[DETECTION] Is the TR/Dldr.Delf.rgl Trojan

[NOTE] The file was moved to '49ebf69c.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp2_61562314259.bk.vir

[DETECTION] Is the TR/Dldr.Delf.red Trojan

[NOTE] The file was moved to '486d5215.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp2_668893616209.bk.vir

[DETECTION] Is the TR/Dldr.Delf.rec Trojan

[NOTE] The file was moved to '49ebf699.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp2_696385704433.bk.vir

[DETECTION] Is the TR/Dldr.Delf.red Trojan

[NOTE] The file was moved to '49ebf69e.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp2_71436387697.bk.vir

[DETECTION] Is the TR/Dldr.Delf.rgl Trojan

[NOTE] The file was moved to '49ebf69b.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp2_715092727922.bk.vir

[DETECTION] Is the TR/Dldr.Delf.rec Trojan

[NOTE] The file was moved to '486d5214.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp2_71582433582.bk.vir

[DETECTION] Is the TR/Dldr.Delf.red Trojan

[NOTE] The file was moved to '486d5217.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp2_740510890530.bk.vir

[DETECTION] Is the TR/Dldr.Delf.rec Trojan

[NOTE] The file was moved to '486d521b.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp2_742109645415.bk.vir

[DETECTION] Is the TR/Dldr.Delf.rgl Trojan

[NOTE] The file was moved to '49ebf6aa.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp2_75221921199.bk.vir

[DETECTION] Is the TR/Dldr.Delf.rgl Trojan

[NOTE] The file was moved to '49ebf69d.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp2_759483359732.bk.vir

[DETECTION] Is the TR/Dldr.Delf.rdj Trojan

[NOTE] The file was moved to '486d5223.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp2_762062412321.bk.vir

[DETECTION] Is the TR/Dldr.Delf.red Trojan

[NOTE] The file was moved to '49ebf69f.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp2_777023171012.bk.vir

[DETECTION] Is the TR/Dldr.Delf.red Trojan

[NOTE] The file was moved to '49ebf6a0.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp2_780945387835.bk.vir

[DETECTION] Is the TR/Dldr.Delf.red Trojan

[NOTE] The file was moved to '486d5229.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp2_796875203660.bk.vir

[DETECTION] Is the TR/Dldr.Delf.red Trojan

[NOTE] The file was moved to '49ebf6a1.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp2_830189274156.bk.vir

[DETECTION] Is the TR/Dldr.Delf.red Trojan

[NOTE] The file was moved to '486d522a.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp2_831014180698.bk.vir

[DETECTION] Is the TR/Dldr.Delf.rdk Trojan

[NOTE] The file was moved to '49ebf6a2.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp2_86740890086.bk.vir

[DETECTION] Is the TR/Dldr.Delf.rec Trojan

[NOTE] The file was moved to '486d522b.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp2_877230565656.bk.vir

[DETECTION] Is the TR/Dldr.Delf.red Trojan

[NOTE] The file was moved to '49ebf6a3.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp2_89369418886.bk.vir

[DETECTION] Is the TR/Dldr.Delf.red Trojan

[NOTE] The file was moved to '486d522c.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp2_898149790040.bk.vir

[DETECTION] Is the TR/Dldr.Delf.red Trojan

[NOTE] The file was moved to '49ebf6a5.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp3_123705527014.bk.vir

[DETECTION] Is the TR/Dldr.Delf.rec Trojan

[NOTE] The file was moved to '49ebf6a4.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp3_126972715315.bk.vir

[DETECTION] Is the TR/Dldr.Delf.rec Trojan

[NOTE] The file was moved to '486d522d.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp3_141913270845.bk.vir

[DETECTION] Is the TR/Dldr.Delf.red Trojan

[NOTE] The file was moved to '486d522e.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp3_156570837670.bk.vir

[DETECTION] Is the TR/Dldr.Delf.rec Trojan

[NOTE] The file was moved to '49ebf6a7.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp3_157450828682.bk.vir

[DETECTION] Is the TR/Dldr.Delf.rdj Trojan

[NOTE] The file was moved to '49ebf6a6.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp3_160317869881.bk.vir

[DETECTION] Is the TR/Dldr.Delf.rec Trojan

[NOTE] The file was moved to '486d522f.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp3_183971817424.bk.vir

[DETECTION] Is the TR/Dldr.Delf.red Trojan

[NOTE] The file was moved to '486d5220.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp3_187424805733.bk.vir

[DETECTION] Is the TR/Dldr.Delf.red Trojan

[NOTE] The file was moved to '49ebf6a9.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp3_194843789802.bk.vir

[DETECTION] Is the TR/Dldr.Delf.rec Trojan

[NOTE] The file was moved to '486d5222.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp3_196776640557.bk.vir

[DETECTION] Is the TR/Dldr.Delf.red Trojan

[NOTE] The file was moved to '49ebf6ac.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp3_198827141.bk.vir

[DETECTION] Is the TR/Dldr.Delf.rgl Trojan

[NOTE] The file was moved to '486d5225.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp3_200258225905.bk.vir

[DETECTION] Is the TR/Dldr.Delf.red Trojan

[NOTE] The file was moved to '49ebf6ae.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp3_218992633925.bk.vir

[DETECTION] Is the TR/Dldr.Delf.rec Trojan

[NOTE] The file was moved to '49ebf6ab.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp3_251345502218.bk.vir

[DETECTION] Is the TR/Dldr.Delf.rec Trojan

[NOTE] The file was moved to '486d5227.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp3_263764467084.bk.vir

[DETECTION] Is the TR/Dldr.Delf.red Trojan

[NOTE] The file was moved to '49ebf6b8.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp3_290168500419.bk.vir

[DETECTION] Is the TR/Dldr.Delf.rgm Trojan

[NOTE] The file was moved to '486d5224.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp3_299754374399.bk.vir

[DETECTION] Is the TR/Dldr.Delf.rdj Trojan

[NOTE] The file was moved to '49ebf6ad.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp3_30095429258.bk.vir

[DETECTION] Is the TR/Dldr.Delf.rgl Trojan

[NOTE] The file was moved to '486d5226.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp3_30201390546.bk.vir

[DETECTION] Is the TR/Dldr.Delf.rec Trojan

[NOTE] The file was moved to '486d5231.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp3_305119249160.bk.vir

[DETECTION] Is the TR/Dldr.Delf.rec Trojan

[NOTE] The file was moved to '49ebf6ba.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp3_314977727979.bk.vir

[DETECTION] Is the TR/Dldr.Delf.red Trojan

[NOTE] The file was moved to '486d5233.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp3_325996690405.bk.vir

[DETECTION] Is the TR/Dldr.Delf.rec Trojan

[NOTE] The file was moved to '49ebf6af.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp3_344014837797.bk.vir

[DETECTION] Is the TR/Dldr.Delf.rec Trojan

[NOTE] The file was moved to '486d5238.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp3_35826843806.bk.vir

[DETECTION] Is the TR/Dldr.Delf.rec Trojan

[NOTE] The file was moved to '49ebf6bc.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp3_361847339807.bk.vir

[DETECTION] Is the TR/Dldr.Delf.rgm Trojan

[NOTE] The file was moved to '486d5235.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp3_366702350908.bk.vir

[DETECTION] Is the TR/Dldr.Delf.rec Trojan

[NOTE] The file was moved to '49ebf6be.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp3_36800481208.bk.vir

[DETECTION] Is the TR/Dldr.Delf.red Trojan

[NOTE] The file was moved to '49ebf6b1.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp3_370884467611.bk.vir

[DETECTION] Is the TR/Dldr.Delf.rdk Trojan

[NOTE] The file was moved to '486d523a.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp3_384331591953.bk.vir

[DETECTION] Is the TR/Dldr.Delf.rdk Trojan

[NOTE] The file was moved to '49ebf6b0.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp3_399980438167.bk.vir

[DETECTION] Is the TR/Dldr.Delf.red Trojan

[NOTE] The file was moved to '486d5239.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp3_400790468438.bk.vir

[DETECTION] Is the TR/Dldr.Delf.red Trojan

[NOTE] The file was moved to '49ebf6b3.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp3_40642374463.bk.vir

[DETECTION] Is the TR/Dldr.Delf.red Trojan

[NOTE] The file was moved to '49ebf6b2.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp3_413350190369.bk.vir

[DETECTION] Is the TR/Dldr.Delf.red Trojan

[NOTE] The file was moved to '486d523c.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp3_419370753797.bk.vir

[DETECTION] Is the TR/Dldr.Delf.red Trojan

[NOTE] The file was moved to '49ebf6b4.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp3_424666652039.bk.vir

[DETECTION] Is the TR/Dldr.Delf.rec Trojan

[NOTE] The file was moved to '486d523d.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp3_432021140161.bk.vir

[DETECTION] Is the TR/Dldr.Delf.red Trojan

[NOTE] The file was moved to '49ebf6b5.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp3_43953641649.bk.vir

[DETECTION] Is the TR/Dldr.Delf.rdj Trojan

[NOTE] The file was moved to '49ebf6b6.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp3_458135680778.bk.vir

[DETECTION] Is the TR/Dldr.Delf.rgm Trojan

[NOTE] The file was moved to '486d523f.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp3_461739713728.bk.vir

[DETECTION] Is the TR/Dldr.Delf.rgl Trojan

[NOTE] The file was moved to '49ebf6c8.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp3_46520628210.bk.vir

[DETECTION] Is the TR/Dldr.Delf.rec Trojan

[NOTE] The file was moved to '49ebf6b7.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp3_468674688318.bk.vir

[DETECTION] Is the TR/Dldr.Delf.rec Trojan

[NOTE] The file was moved to '486d5230.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp3_47396726138.bk.vir

[DETECTION] Is the TR/Dldr.Delf.rgm Trojan

[NOTE] The file was moved to '49ebf6b9.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp3_483447730250.bk.vir

[DETECTION] Is the TR/Dldr.Delf.rgl Trojan

[NOTE] The file was moved to '486d5237.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp3_516992228491.bk.vir

[DETECTION] Is the TR/Dldr.Delf.rec Trojan

[NOTE] The file was moved to '486d523b.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp3_524857818586.bk.vir

[DETECTION] Is the TR/Dldr.Delf.rgl Trojan

[NOTE] The file was moved to '486d5232.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp3_556739596158.bk.vir

[DETECTION] Is the TR/Dldr.Delf.rdn Trojan

[NOTE] The file was moved to '49ebf6bb.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp3_589443803168.bk.vir

[DETECTION] Is the TR/Dldr.Delf.red Trojan

[NOTE] The file was moved to '486d5234.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp3_64129706263.bk.vir

[DETECTION] Is the TR/Dldr.Delf.rdn Trojan

[NOTE] The file was moved to '486d5241.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp3_664847513339.bk.vir

[DETECTION] Is the TR/Dldr.Delf.red Trojan

[NOTE] The file was moved to '49ebf6ca.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp3_665450621481.bk.vir

[DETECTION] Is the TR/Dldr.Delf.red Trojan

[NOTE] The file was moved to '49ebf6bf.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp3_66631451227.bk.vir

[DETECTION] Is the TR/Dldr.Delf.red Trojan

[NOTE] The file was moved to '486d5248.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp3_666921517598.bk.vir

[DETECTION] Is the TR/Dldr.Delf.red Trojan

[NOTE] The file was moved to '49ebf6c1.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp3_678101555373.bk.vir

[DETECTION] Is the TR/Dldr.Delf.rec Trojan

[NOTE] The file was moved to '49ebf6c0.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp3_690926134938.bk.vir

[DETECTION] Is the TR/Dldr.Delf.rec Trojan

[NOTE] The file was moved to '486d5249.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp3_70022970512.bk.vir

[DETECTION] Is the TR/Dldr.Delf.red Trojan

[NOTE] The file was moved to '49ebf6c2.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp3_747542845643.bk.vir

[DETECTION] Is the TR/Dldr.Delf.rec Trojan

[NOTE] The file was moved to '486d524a.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp3_747849578922.bk.vir

[DETECTION] Is the TR/Dldr.Delf.red Trojan

[NOTE] The file was moved to '486d524b.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp3_76899574663.bk.vir

[DETECTION] Is the TR/Dldr.Delf.red Trojan

[NOTE] The file was moved to '49ebf6c4.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp3_76920657995.bk.vir

[DETECTION] Is the TR/Dldr.Delf.rdn Trojan

[NOTE] The file was moved to '486d524d.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp3_770499843709.bk.vir

[DETECTION] Is the TR/Dldr.Delf.red Trojan

[NOTE] The file was moved to '49ebf6c3.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp3_831802819099.bk.vir

[DETECTION] Is the TR/Dldr.Delf.red Trojan

[NOTE] The file was moved to '49ebf6c6.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp3_850485447904.bk.vir

[DETECTION] Is the TR/Dldr.Delf.rec Trojan

[NOTE] The file was moved to '49ebf6c5.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp3_852886220200.bk.vir

[DETECTION] Is the TR/Dldr.Delf.red Trojan

[NOTE] The file was moved to '486d524e.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp3_874326330712.bk.vir

[DETECTION] Is the TR/Dldr.Delf.rec Trojan

[NOTE] The file was moved to '486d524f.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp3_875928357622.bk.vir

[DETECTION] Is the TR/Dldr.Delf.rec Trojan

[NOTE] The file was moved to '49ebf6d8.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp3_876773788272.bk.vir

[DETECTION] Is the TR/Dldr.Delf.rec Trojan

[NOTE] The file was moved to '49ebf6c7.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp3_897684845368.bk.vir

[DETECTION] Is the TR/Dldr.Delf.rec Trojan

[NOTE] The file was moved to '486d5243.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp3_9488341523.bk.vir

[DETECTION] Is the TR/Dldr.Delf.rdk Trojan

[NOTE] The file was moved to '49ebf6cc.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp4_143335871724.bk.vir

[DETECTION] Is the TR/Dldr.Delf.rgm Trojan

[NOTE] The file was moved to '49ebf6c9.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp4_188088455305.bk.vir

[DETECTION] Is the TR/Dldr.Delf.rgl Trojan

[NOTE] The file was moved to '486d5242.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp4_198681742023.bk.vir

[DETECTION] Is the TR/Dldr.Delf.rdn Trojan

[NOTE] The file was moved to '486d5245.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp4_212037268307.bk.vir

[DETECTION] Is the TR/Dldr.Delf.rdn Trojan

[NOTE] The file was moved to '49ebf6ce.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp4_2319714517.bk.vir

[DETECTION] Is the TR/Dldr.Delf.rdk Trojan

[NOTE] The file was moved to '49ebf6cb.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp4_341520766986.bk.vir

[DETECTION] Is the TR/Dldr.Delf.rdk Trojan

[NOTE] The file was moved to '486d5247.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp4_416762498866.bk.vir

[DETECTION] Is the TR/Dldr.Delf.rdk Trojan

[NOTE] The file was moved to '49ebf6cd.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp4_46767695754.bk.vir

[DETECTION] Is the TR/Dldr.Delf.rgl Trojan

[NOTE] The file was moved to '486d5251.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp4_508517707891.bk.vir

[DETECTION] Is the TR/Dldr.Delf.rgm Trojan

[NOTE] The file was moved to '49ebf6cf.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp4_519198451443.bk.vir

[DETECTION] Is the TR/Dldr.Delf.rdn Trojan

[NOTE] The file was moved to '486d5258.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp4_562406662403.bk.vir

[DETECTION] Is the TR/Dldr.Delf.rgl Trojan

[NOTE] The file was moved to '49ebf6d0.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp4_668180356709.bk.vir

[DETECTION] Is the TR/Dldr.Delf.rgl Trojan

[NOTE] The file was moved to '49ebf6d2.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp4_710479372858.bk.vir

[DETECTION] Is the TR/Dldr.Delf.rdj Trojan

[NOTE] The file was moved to '486d525b.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp4_712055589093.bk.vir

[DETECTION] Is the TR/Dldr.Delf.rdj Trojan

[NOTE] The file was moved to '49ebf6d3.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp4_749963289001.bk.vir

[DETECTION] Is the TR/Dldr.Delf.rgl Trojan

[NOTE] The file was moved to '49ebf6d4.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp4_759250213584.bk.vir

[DETECTION] Is the TR/Dldr.Delf.rgm Trojan

[NOTE] The file was moved to '486d525d.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp4_824973644290.bk.vir

[DETECTION] Is the TR/Dldr.Delf.rdj Trojan

[NOTE] The file was moved to '49ebf6d5.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp4_861107144089.bk.vir

[DETECTION] Is the TR/Dldr.Delf.rgm Trojan

[NOTE] The file was moved to '49ebf6d6.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp5_19394057608.bk.vir

[DETECTION] Is the TR/Dldr.Delf.rdj Trojan

[NOTE] The file was moved to '49ebf6d7.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp5_22111076413.bk.vir

[DETECTION] Is the TR/Dldr.Delf.rdn Trojan

[NOTE] The file was moved to '49ebf6da.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp5_282181723916.bk.vir

[DETECTION] Is the TR/Dldr.Delf.rdk Trojan

[NOTE] The file was moved to '486d5253.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp5_547334744464.bk.vir

[DETECTION] Is the TR/Dldr.Delf.rdn Trojan

[NOTE] The file was moved to '49ebf6d9.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp5_555852189009.bk.vir

[DETECTION] Is the TR/Dldr.Delf.rdj Trojan

[NOTE] The file was moved to '49ebf6dc.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp5_682372710251.bk.vir

[DETECTION] Is the TR/Dldr.Delf.rdk Trojan

[NOTE] The file was moved to '486d5255.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp5_70110194176.bk.vir

[DETECTION] Is the TR/Dldr.Delf.rdk Trojan

[NOTE] The file was moved to '49ebf6db.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp5_74314161147.bk.vir

[DETECTION] Is the TR/Dldr.Delf.rdn Trojan

[NOTE] The file was moved to '486d5254.qua'!

C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp5_8330552131.bk.vir

[DETECTION] Is the TR/Dldr.Delf.rdj Trojan

[NOTE] The file was moved to '49ebf6de.qua'!

C:\System Volume Information\_restore{AA9B38FB-1993-42C2-A0DD-3F494A22996B}\RP684\A0276038.exe

[DETECTION] Is the TR/Agent2.CN.17 Trojan

[NOTE] The file was moved to '49adf776.qua'!

C:\System Volume Information\_restore{AA9B38FB-1993-42C2-A0DD-3F494A22996B}\RP685\A0276111.sys

[DETECTION] Contains recognition pattern of the RKIT/11362.A root kit

[NOTE] The file was moved to '49adf780.qua'!

C:\System Volume Information\_restore{AA9B38FB-1993-42C2-A0DD-3F494A22996B}\RP685\A0276197.exe

[0] Archive type: RAR SFX (self extracting)

--> 32788R22FWJFW\catchme.cfexe

[DETECTION] Is the TR/Murdak.A.36 Trojan

[NOTE] The file was moved to '49adf784.qua'!

C:\System Volume Information\_restore{AA9B38FB-1993-42C2-A0DD-3F494A22996B}\RP686\A0276206.exe

[DETECTION] Is the TR/Agent2.CN.16 Trojan

[NOTE] The file was moved to '49adf786.qua'!

C:\System Volume Information\_restore{AA9B38FB-1993-42C2-A0DD-3F494A22996B}\RP686\A0276208.exe

[DETECTION] Is the TR/Agent2.BV Trojan

[NOTE] The file was moved to '482ee00f.qua'!

C:\System Volume Information\_restore{AA9B38FB-1993-42C2-A0DD-3F494A22996B}\RP686\A0276209.exe

[DETECTION] Is the TR/Agent2.CN.18 Trojan

[NOTE] The file was moved to '49adf798.qua'!

C:\System Volume Information\_restore{AA9B38FB-1993-42C2-A0DD-3F494A22996B}\RP686\A0276210.exe

[DETECTION] Is the TR/Agent2.CN.21 Trojan

[NOTE] The file was moved to '482ee011.qua'!

C:\System Volume Information\_restore{AA9B38FB-1993-42C2-A0DD-3F494A22996B}\RP691\A0277167.old

[DETECTION] Is the TR/Trash.Gen Trojan

[NOTE] The file was moved to '49adf7a6.qua'!

C:\WINDOWS\system32\tmp6_317390268752.bk.old

[DETECTION] Is the TR/Dldr.Delf.rdn Trojan

[NOTE] The file was moved to '49ebfaa5.qua'!

C:\WINDOWS\system32\tmpxr_115019844811.bk

[DETECTION] Is the TR/Agent.bhmj Trojan

[NOTE] The file was moved to '4869f54e.qua'!

C:\WINDOWS\system32\tmpxr_185428699935.bk

[DETECTION] Is the TR/Agent2.CN.20 Trojan

[NOTE] The file was moved to '49ebfaa7.qua'!

C:\WINDOWS\system32\tmpxr_238031264341.bk

[DETECTION] Is the TR/Dldr.Agent.bcyh.1 Trojan

[NOTE] The file was moved to '49ebfaa6.qua'!

C:\WINDOWS\system32\tmpxr_315652620758.bk

[DETECTION] Is the TR/Agent.bhmj Trojan

[NOTE] The file was moved to '4869f54f.qua'!

C:\WINDOWS\system32\tmpxr_32914328957.bk

[DETECTION] Is the TR/Agent.bhmi Trojan

[NOTE] The file was moved to '4869f540.qua'!

C:\WINDOWS\system32\tmpxr_348801795269.bk

[DETECTION] Is the TR/Agent2.BW Trojan

[NOTE] The file was moved to '49ebfaa9.qua'!

C:\WINDOWS\system32\tmpxr_364305614898.bk

[DETECTION] Is the TR/Agent.bhmj Trojan

[NOTE] The file was moved to '49ebfaa8.qua'!

C:\WINDOWS\system32\tmpxr_379200871471.bk

[DETECTION] Is the TR/Agent.bhxv.8 Trojan

[NOTE] The file was moved to '4869f541.qua'!

C:\WINDOWS\system32\tmpxr_53978899067.bk

[DETECTION] Is the TR/Agent.bhxv.8 Trojan

[NOTE] The file was moved to '4869f542.qua'!

C:\WINDOWS\system32\tmpxr_582981264591.bk

[DETECTION] Is the TR/Agent.bhxv.8 Trojan

[NOTE] The file was moved to '49ebfaab.qua'!

C:\WINDOWS\system32\tmpxr_588181490114.bk

[DETECTION] Is the TR/Dldr.Agent.bcyh.1 Trojan

[NOTE] The file was moved to '49ebfaaa.qua'!

C:\WINDOWS\system32\tmpxr_588585445926.bk

[DETECTION] Is the TR/Agent.bhlo Trojan

[NOTE] The file was moved to '4869f543.qua'!

C:\WINDOWS\system32\tmpxr_629908699001.bk

[DETECTION] Is the TR/Agent.bhmj Trojan

[NOTE] The file was moved to '49ebfaac.qua'!

C:\WINDOWS\system32\tmpxr_676467845382.bk

[DETECTION] Is the TR/Agent.bhmi Trojan

[NOTE] The file was moved to '4869f545.qua'!

C:\WINDOWS\system32\tmpxr_736404314486.bk

[DETECTION] Is the TR/Agent.bhmi Trojan

[NOTE] The file was moved to '4869f544.qua'!

C:\WINDOWS\system32\tmpxr_765958546280.bk

[DETECTION] Is the TR/Agent2.CN.22 Trojan

[NOTE] The file was moved to '49ebfaad.qua'!

C:\WINDOWS\system32\tmpxr_869159704933.bk

[DETECTION] Is the TR/Agent.bhlo Trojan

[NOTE] The file was moved to '49ebfaae.qua'!

C:\WINDOWS\system32\tmpxr_873455128506.bk

[DETECTION] Is the TR/Agent2.BV Trojan

[NOTE] The file was moved to '4869f547.qua'!

C:\WINDOWS\system32\tmpxr_95433155490.bk

[DETECTION] Is the TR/Agent.bhmi Trojan

[NOTE] The file was moved to '49ebfaa0.qua'!

C:\WINDOWS\system32\drivers\sptd.sys

[WARNING] The file could not be opened!

Begin scan in 'D:\' <ACERDATA>

 

 

End of the scan: dimanche 25 janvier 2009 00:38

Used time: 39:28 Minute(s)

 

The scan has been done completely.

 

6032 Scanning directories

208559 Files were scanned

334 viruses and/or unwanted programs were found

0 Files were classified as suspicious:

0 files were deleted

0 files were repaired

333 files were moved to quarantine

0 files were renamed

3 Files cannot be scanned

208222 Files not concerned

6790 Archives were scanned

8 Warnings

333 Notes

Rejoindre la conversation

Vous pouvez publier maintenant et vous inscrire plus tard. Si vous avez un compte, connectez-vous maintenant pour publier avec votre compte.
Remarque : votre message nécessitera l’approbation d’un modérateur avant de pouvoir être visible.

Invité
Répondre à ce sujet…

×   Collé en tant que texte enrichi.   Coller en tant que texte brut à la place

  Seulement 75 émoticônes maximum sont autorisées.

×   Votre lien a été automatiquement intégré.   Afficher plutôt comme un lien

×   Votre contenu précédent a été rétabli.   Vider l’éditeur

×   Vous ne pouvez pas directement coller des images. Envoyez-les depuis votre ordinateur ou insérez-les depuis une URL.

  • En ligne récemment   0 membre est en ligne

    • Aucun utilisateur enregistré regarde cette page.
×
×
  • Créer...