Probleme avec un virus
Résolu
Rachidess
Messages postés
36
Statut
Membre
-
Destrio5 Messages postés 99820 Statut Modérateur -
Destrio5 Messages postés 99820 Statut Modérateur -
Bonjour,
Mon probleme c'est que je peux pas lancer mon antivirus ni installer et je peux même pas demmérer windows en mode sans échec, Que fais-je ? Merci
Mon probleme c'est que je peux pas lancer mon antivirus ni installer et je peux même pas demmérer windows en mode sans échec, Que fais-je ? Merci
A voir également:
- Probleme avec un virus
- Virus mcafee - Accueil - Piratage
- Virus facebook demande d'amis - Accueil - Facebook
- Virus informatique - Guide
- Panda anti virus gratuit - Télécharger - Antivirus & Antimalwares
- Undisclosed-recipients virus - Guide
29 réponses
Essaie de réparer le mode sans échec avec ceci :
https://download.bleepingcomputer.com/sUBs/SafeBootKeyRepair.exe
Si ça ne fonctionne pas, fais le scan AVPTool en mode normal.
https://download.bleepingcomputer.com/sUBs/SafeBootKeyRepair.exe
Si ça ne fonctionne pas, fais le scan AVPTool en mode normal.
- Télécharge Random's System Information Tool (RSIT) (par random/random) sur ton Bureau.
- Double-clique sur RSIT.exe afin de lancer le programme.
- Clique sur Continue à l'écran Disclaimer.
- Si l'outil HijackThis (version à jour) n'est pas présent ou non détecté sur l'ordinateur, RSIT le téléchargera (autorise l'accès dans ton pare-feu, si demandé) et tu devras accepter la licence.
- Lorsque l'analyse sera terminée, deux fichiers texte s'ouvriront. Poste le contenu de log.txt (c'est celui qui apparaît à l'écran) ainsi que de info.txt (que tu verras dans la barre des tâches).
Note : Les rapports sont sauvegardés dans le dossier C:\rsit.
- Double-clique sur RSIT.exe afin de lancer le programme.
- Clique sur Continue à l'écran Disclaimer.
- Si l'outil HijackThis (version à jour) n'est pas présent ou non détecté sur l'ordinateur, RSIT le téléchargera (autorise l'accès dans ton pare-feu, si demandé) et tu devras accepter la licence.
- Lorsque l'analyse sera terminée, deux fichiers texte s'ouvriront. Poste le contenu de log.txt (c'est celui qui apparaît à l'écran) ainsi que de info.txt (que tu verras dans la barre des tâches).
Note : Les rapports sont sauvegardés dans le dossier C:\rsit.
Non, je ne t'expliquerai pas car ça ne s'explique pas comme ça en deux minutes et je n'ai pas que toi à m'occuper.
Fais plutôt ceci, je pense que tu auras moins peur :
---> Télécharge Malwarebytes' Anti-Malware (MBAM) sur ton Bureau.
---> Double-clique sur le fichier téléchargé pour lancer le processus d'installation.
---> Dans l'onglet Mise à jour, clique sur le bouton Recherche de mise à jour : si le pare-feu demande l'autorisation à MBAM de se connecter à Internet, accepte.
---> Une fois la mise à jour terminée, rends-toi dans l'onglet Recherche.
---> Sélectionne Exécuter un examen rapide.
---> Clique sur Rechercher. L'analyse démarre.
A la fin de l'analyse, un message s'affiche :
L'examen s'est terminé normalement. Cliquez sur 'Afficher les résultats' pour afficher tous les objets trouvés.
---> Clique sur OK pour poursuivre. Si MBAM n'a rien trouvé, il te le dira aussi.
---> Ferme tes navigateurs.
Si des malwares ont été détectés, clique sur Afficher les résultats.
---> Sélectionne tout (ou laisse coché) et clique sur Supprimer la sélection, MBAM va détruire les fichiers et clés de registre infectés et en mettre une copie dans la quarantaine.
---> MBAM va ouvrir le Bloc-notes et y copier le rapport d'analyse. Copie-colle ce rapport dans ta prochaine réponse.
Fais plutôt ceci, je pense que tu auras moins peur :
---> Télécharge Malwarebytes' Anti-Malware (MBAM) sur ton Bureau.
---> Double-clique sur le fichier téléchargé pour lancer le processus d'installation.
---> Dans l'onglet Mise à jour, clique sur le bouton Recherche de mise à jour : si le pare-feu demande l'autorisation à MBAM de se connecter à Internet, accepte.
---> Une fois la mise à jour terminée, rends-toi dans l'onglet Recherche.
---> Sélectionne Exécuter un examen rapide.
---> Clique sur Rechercher. L'analyse démarre.
A la fin de l'analyse, un message s'affiche :
L'examen s'est terminé normalement. Cliquez sur 'Afficher les résultats' pour afficher tous les objets trouvés.
---> Clique sur OK pour poursuivre. Si MBAM n'a rien trouvé, il te le dira aussi.
---> Ferme tes navigateurs.
Si des malwares ont été détectés, clique sur Afficher les résultats.
---> Sélectionne tout (ou laisse coché) et clique sur Supprimer la sélection, MBAM va détruire les fichiers et clés de registre infectés et en mettre une copie dans la quarantaine.
---> MBAM va ouvrir le Bloc-notes et y copier le rapport d'analyse. Copie-colle ce rapport dans ta prochaine réponse.
Vous n’avez pas trouvé la réponse que vous recherchez ?
Posez votre question
Logfile of random's system information tool 1.05 (written by random/random)
Run by Administrateur at 2009-02-17 20:44:55
Microsoft Windows XP Professionnel Service Pack 3
System drive C: has 16 GB (81%) free of 20 GB
Total RAM: 503 MB (45% free)
Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 20:44:59, on 17/02/2009
Platform: Windows XP SP3 (WinNT 5.01.2600)
MSIE: Internet Explorer v7.00 (7.00.6000.20661)
Boot mode: Normal
Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\system32\inetsrv\inetinfo.exe
C:\Program Files\Apoint2K\Apoint.exe
C:\WINDOWS\VistaDrive\VistaDrive.exe
C:\Program Files\Java\jre1.6.0_01\bin\jusched.exe
C:\WINDOWS\system32\hkcmd.exe
C:\Program Files\Windows Live\Messenger\MsnMsgr.Exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\Messenger\msmsgs.exe
C:\Program Files\Menara\dslmon.exe
C:\Program Files\Apoint2K\Apntex.exe
C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winawstri.exe
C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winndltxi.exe
C:\Program Files\Windows Live\Messenger\usnsvc.exe
C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\tpcldc.exe
C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\wingevmh.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Program Files\Windows Media Player\wmplayer.exe
C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\xajbb.exe
C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winypwrs.exe
C:\Documents and Settings\Administrateur\Local Settings\Temporary Internet Files\Content.IE5\CJ20RKQ8\RSIT[1].exe
C:\Program Files\trend micro\Administrateur.exe
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://www.google.fr/keyword/%s
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Bar = https://www.google.fr/?gws_rd=ssl
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = https://www.google.fr/?gws_rd=ssl
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = https://www.google.fr/?gws_rd=ssl
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = https://www.msn.com/fr-fr/?ocid=iehp
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = https://www.bing.com/?toHttps=1&redig=5FC791212101479BAFBE1A679848B1AF
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = https://www.bing.com/?toHttps=1&redig=5FC791212101479BAFBE1A679848B1AF
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = https://www.msn.com/fr-fr/?ocid=iehp
R1 - HKCU\Software\Microsoft\Internet Connection Wizard,ShellNext = https://www.menara.ma/
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Window Title = Menara
R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName = Liens
O2 - BHO: IEVkbdBHO - {59273AB4-E7D3-40F9-A1A8-6FA9CCA1862C} - C:\Program Files\Kaspersky Lab\Kaspersky Anti-Virus 2009\ievkbd.dll
O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre1.6.0_01\bin\ssv.dll
O2 - BHO: (no name) - {7E853D72-626A-48EC-A868-BA8D5E23E045} - (no file)
O4 - HKLM\..\Run: [Apoint] C:\Program Files\Apoint2K\Apoint.exe
O4 - HKLM\..\Run: [VistaDrive] C:\WINDOWS\VistaDrive\VistaDrive.exe
O4 - HKLM\..\Run: [SunJavaUpdateSched] "C:\Program Files\Java\jre1.6.0_01\bin\jusched.exe"
O4 - HKLM\..\Run: [IgfxTray] C:\WINDOWS\system32\igfxtray.exe
O4 - HKLM\..\Run: [HotKeysCmds] C:\WINDOWS\system32\hkcmd.exe
O4 - HKLM\..\Run: [AVP] "C:\Program Files\Kaspersky Lab\Kaspersky Anti-Virus 2009\avp.exe"
O4 - HKCU\..\Run: [MsnMsgr] "C:\Program Files\Windows Live\Messenger\MsnMsgr.Exe" /background
O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
O4 - HKCU\..\Run: [MSMSGS] "C:\Program Files\Messenger\msmsgs.exe" /background
O4 - HKCU\..\Run: [Debug more] C:\DOCUME~1\ADMINI~1\APPLIC~1\TEAMOK~1\MessHtm.exe
O4 - HKCU\..\Run: [cdoosoft] C:\WINDOWS\system32\olhrwef.exe
O4 - HKUS\S-1-5-19\..\Run: [MsnMsgr] "C:\Program Files\Windows Live\Messenger\MsnMsgr.Exe" /background (User 'SERVICE LOCAL')
O4 - HKUS\S-1-5-19\..\RunOnce: [nltide_3] rundll32 advpack.dll,LaunchINFSectionEx nLite.inf,C,,4,N (User 'SERVICE LOCAL')
O4 - HKUS\S-1-5-20\..\Run: [MsnMsgr] "C:\Program Files\Windows Live\Messenger\MsnMsgr.Exe" /background (User 'SERVICE RÉSEAU')
O4 - HKUS\S-1-5-20\..\RunOnce: [nltide_3] rundll32 advpack.dll,LaunchINFSectionEx nLite.inf,C,,4,N (User 'SERVICE RÉSEAU')
O4 - HKUS\S-1-5-18\..\Run: [MsnMsgr] "C:\Program Files\Windows Live\Messenger\MsnMsgr.Exe" /background (User 'SYSTEM')
O4 - HKUS\S-1-5-18\..\RunOnce: [nltide_3] rundll32 advpack.dll,LaunchINFSectionEx nLite.inf,C,,4,N (User 'SYSTEM')
O4 - HKUS\.DEFAULT\..\Run: [MsnMsgr] "C:\Program Files\Windows Live\Messenger\MsnMsgr.Exe" /background (User 'Default user')
O4 - HKUS\.DEFAULT\..\RunOnce: [nltide_3] rundll32 advpack.dll,LaunchINFSectionEx nLite.inf,C,,4,N (User 'Default user')
O4 - Global Startup: DSLMON.lnk = C:\Program Files\Menara\dslmon.exe
O7 - HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System, DisableRegedit=1
O9 - Extra button: Statistiques de la protection du trafic Internet - {1F460357-8A94-4D71-9CA3-AA4ACF32ED8E} - C:\Program Files\Kaspersky Lab\Kaspersky Anti-Virus 2009\SCIEPlgn.dll
O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O17 - HKLM\System\CCS\Services\Tcpip\..\{E9D08D56-30A0-4648-BFF9-6388EE3BE4A8}: NameServer = 212.217.0.13 212.217.1.17
O20 - AppInit_DLLs: C:\PROGRA~1\KASPER~1\KASPER~1\mzvkbd.dll,C:\PROGRA~1\KASPER~1\KASPER~1\mzvkbd3.dll
Run by Administrateur at 2009-02-17 20:44:55
Microsoft Windows XP Professionnel Service Pack 3
System drive C: has 16 GB (81%) free of 20 GB
Total RAM: 503 MB (45% free)
Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 20:44:59, on 17/02/2009
Platform: Windows XP SP3 (WinNT 5.01.2600)
MSIE: Internet Explorer v7.00 (7.00.6000.20661)
Boot mode: Normal
Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\system32\inetsrv\inetinfo.exe
C:\Program Files\Apoint2K\Apoint.exe
C:\WINDOWS\VistaDrive\VistaDrive.exe
C:\Program Files\Java\jre1.6.0_01\bin\jusched.exe
C:\WINDOWS\system32\hkcmd.exe
C:\Program Files\Windows Live\Messenger\MsnMsgr.Exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\Messenger\msmsgs.exe
C:\Program Files\Menara\dslmon.exe
C:\Program Files\Apoint2K\Apntex.exe
C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winawstri.exe
C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winndltxi.exe
C:\Program Files\Windows Live\Messenger\usnsvc.exe
C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\tpcldc.exe
C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\wingevmh.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Program Files\Windows Media Player\wmplayer.exe
C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\xajbb.exe
C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winypwrs.exe
C:\Documents and Settings\Administrateur\Local Settings\Temporary Internet Files\Content.IE5\CJ20RKQ8\RSIT[1].exe
C:\Program Files\trend micro\Administrateur.exe
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://www.google.fr/keyword/%s
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Bar = https://www.google.fr/?gws_rd=ssl
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = https://www.google.fr/?gws_rd=ssl
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = https://www.google.fr/?gws_rd=ssl
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = https://www.msn.com/fr-fr/?ocid=iehp
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = https://www.bing.com/?toHttps=1&redig=5FC791212101479BAFBE1A679848B1AF
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = https://www.bing.com/?toHttps=1&redig=5FC791212101479BAFBE1A679848B1AF
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = https://www.msn.com/fr-fr/?ocid=iehp
R1 - HKCU\Software\Microsoft\Internet Connection Wizard,ShellNext = https://www.menara.ma/
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Window Title = Menara
R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName = Liens
O2 - BHO: IEVkbdBHO - {59273AB4-E7D3-40F9-A1A8-6FA9CCA1862C} - C:\Program Files\Kaspersky Lab\Kaspersky Anti-Virus 2009\ievkbd.dll
O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre1.6.0_01\bin\ssv.dll
O2 - BHO: (no name) - {7E853D72-626A-48EC-A868-BA8D5E23E045} - (no file)
O4 - HKLM\..\Run: [Apoint] C:\Program Files\Apoint2K\Apoint.exe
O4 - HKLM\..\Run: [VistaDrive] C:\WINDOWS\VistaDrive\VistaDrive.exe
O4 - HKLM\..\Run: [SunJavaUpdateSched] "C:\Program Files\Java\jre1.6.0_01\bin\jusched.exe"
O4 - HKLM\..\Run: [IgfxTray] C:\WINDOWS\system32\igfxtray.exe
O4 - HKLM\..\Run: [HotKeysCmds] C:\WINDOWS\system32\hkcmd.exe
O4 - HKLM\..\Run: [AVP] "C:\Program Files\Kaspersky Lab\Kaspersky Anti-Virus 2009\avp.exe"
O4 - HKCU\..\Run: [MsnMsgr] "C:\Program Files\Windows Live\Messenger\MsnMsgr.Exe" /background
O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
O4 - HKCU\..\Run: [MSMSGS] "C:\Program Files\Messenger\msmsgs.exe" /background
O4 - HKCU\..\Run: [Debug more] C:\DOCUME~1\ADMINI~1\APPLIC~1\TEAMOK~1\MessHtm.exe
O4 - HKCU\..\Run: [cdoosoft] C:\WINDOWS\system32\olhrwef.exe
O4 - HKUS\S-1-5-19\..\Run: [MsnMsgr] "C:\Program Files\Windows Live\Messenger\MsnMsgr.Exe" /background (User 'SERVICE LOCAL')
O4 - HKUS\S-1-5-19\..\RunOnce: [nltide_3] rundll32 advpack.dll,LaunchINFSectionEx nLite.inf,C,,4,N (User 'SERVICE LOCAL')
O4 - HKUS\S-1-5-20\..\Run: [MsnMsgr] "C:\Program Files\Windows Live\Messenger\MsnMsgr.Exe" /background (User 'SERVICE RÉSEAU')
O4 - HKUS\S-1-5-20\..\RunOnce: [nltide_3] rundll32 advpack.dll,LaunchINFSectionEx nLite.inf,C,,4,N (User 'SERVICE RÉSEAU')
O4 - HKUS\S-1-5-18\..\Run: [MsnMsgr] "C:\Program Files\Windows Live\Messenger\MsnMsgr.Exe" /background (User 'SYSTEM')
O4 - HKUS\S-1-5-18\..\RunOnce: [nltide_3] rundll32 advpack.dll,LaunchINFSectionEx nLite.inf,C,,4,N (User 'SYSTEM')
O4 - HKUS\.DEFAULT\..\Run: [MsnMsgr] "C:\Program Files\Windows Live\Messenger\MsnMsgr.Exe" /background (User 'Default user')
O4 - HKUS\.DEFAULT\..\RunOnce: [nltide_3] rundll32 advpack.dll,LaunchINFSectionEx nLite.inf,C,,4,N (User 'Default user')
O4 - Global Startup: DSLMON.lnk = C:\Program Files\Menara\dslmon.exe
O7 - HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System, DisableRegedit=1
O9 - Extra button: Statistiques de la protection du trafic Internet - {1F460357-8A94-4D71-9CA3-AA4ACF32ED8E} - C:\Program Files\Kaspersky Lab\Kaspersky Anti-Virus 2009\SCIEPlgn.dll
O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O17 - HKLM\System\CCS\Services\Tcpip\..\{E9D08D56-30A0-4648-BFF9-6388EE3BE4A8}: NameServer = 212.217.0.13 212.217.1.17
O20 - AppInit_DLLs: C:\PROGRA~1\KASPER~1\KASPER~1\mzvkbd.dll,C:\PROGRA~1\KASPER~1\KASPER~1\mzvkbd3.dll
Je vois les infections maintenant.
---> Télécharge Lop S&D sur ton Bureau.
---> Double-clique dessus pour lancer l'installation.
---> Puis double-clique sur le raccourci Lop S&D présent sur ton Bureau.
---> Sélectionne la langue souhaitée, puis choisis l'option 1 (Recherche).
---> Patiente jusqu'à la fin du scan.
---> Poste le rapport généré (C:\lopR.txt).
---> Télécharge Lop S&D sur ton Bureau.
---> Double-clique dessus pour lancer l'installation.
---> Puis double-clique sur le raccourci Lop S&D présent sur ton Bureau.
---> Sélectionne la langue souhaitée, puis choisis l'option 1 (Recherche).
---> Patiente jusqu'à la fin du scan.
---> Poste le rapport généré (C:\lopR.txt).
--------------------\\ Lop S&D 4.2.5-0 XP/Vista
Microsoft Windows XP Professionnel ( v5.1.2600 ) Service Pack 3
X86-based PC ( Uniprocessor Free : Intel(R) Pentium(R) 4 CPU 2.66GHz )
BIOS : 786B2 v1.11
USER : Administrateur ( Administrator )
BOOT : Normal boot
Antivirus : Kaspersky Anti-Virus 8.0.0.506 (Not Activated)
A:\ (USB)
C:\ (Local Disk) - NTFS - Total:19 Go (Free:15 Go)
D:\ (Local Disk) - FAT32 - Total:17 Go (Free:14 Go)
E:\ (CD or DVD)
"C:\Lop SD" ( MAJ : 19-12-2008|23:40 )
Option : [1] ( 17/02/2009|21:00 )
--------------------\\ Listing des dossiers dans APPLIC~1
[16/02/2009|23:29] C:\DOCUME~1\ADMINI~1\APPLIC~1\Adobe
[16/02/2009|23:17] C:\DOCUME~1\ADMINI~1\APPLIC~1\Identities
[16/02/2009|23:29] C:\DOCUME~1\ADMINI~1\APPLIC~1\Macromedia
[17/02/2009|17:33] C:\DOCUME~1\ADMINI~1\APPLIC~1\Malwarebytes
[16/02/2009|23:27] C:\DOCUME~1\ADMINI~1\APPLIC~1\Media Player Classic
[17/02/2009|12:44] C:\DOCUME~1\ADMINI~1\APPLIC~1\Microsoft
[16/02/2009|23:10] C:\DOCUME~1\ADMINI~1\APPLIC~1\Real
[16/02/2009|23:12] C:\DOCUME~1\ADMINI~1\APPLIC~1\Sun
[17/02/2009|15:03] C:\DOCUME~1\ADMINI~1\APPLIC~1\teamokayvga
[17/02/2009|16:41] C:\DOCUME~1\ALLUSE~1\APPLIC~1\Kaspersky Lab
[17/02/2009|17:33] C:\DOCUME~1\ALLUSE~1\APPLIC~1\Malwarebytes
[17/02/2009|15:34] C:\DOCUME~1\ALLUSE~1\APPLIC~1\Messenger Plus!
[17/02/2009|10:44] C:\DOCUME~1\ALLUSE~1\APPLIC~1\Microsoft
[16/02/2009|23:07] C:\DOCUME~1\DEFAUL~1\APPLIC~1\Microsoft
[16/02/2009|23:12] C:\DOCUME~1\DEFAUL~1\APPLIC~1\Sun
[17/02/2009|12:46] C:\DOCUME~1\LOCALS~1\APPLIC~1\Microsoft
[16/02/2009|23:16] C:\DOCUME~1\NETWOR~1\APPLIC~1\Microsoft
--------------------\\ Tâches planifiées dans C:\WINDOWS\tasks
[17/02/2009 18:11][--ah-----] C:\WINDOWS\tasks\SA.DAT
[28/08/2001 14:00][-r-h-----] C:\WINDOWS\tasks\desktop.ini
--------------------\\ Listing des dossiers dans C:\Program Files
[17/02/2009|15:59] C:\Program Files\Alwil Software
[16/02/2009|22:59] C:\Program Files\Apoint2K
[17/02/2009|15:02] C:\Program Files\Circle Devlopement
[16/02/2009|23:04] C:\Program Files\ComPlus Applications
[17/02/2009|08:40] C:\Program Files\Dofus
[16/02/2009|23:20] C:\Program Files\Fichiers communs
[16/02/2009|23:11] C:\Program Files\Foxit
[16/02/2009|23:25] C:\Program Files\InstallShield Installation Information
[16/02/2009|23:08] C:\Program Files\Internet Explorer
[16/02/2009|23:12] C:\Program Files\Java
[17/02/2009|16:41] C:\Program Files\Kaspersky Lab
[16/02/2009|23:25] C:\Program Files\Menara
[16/02/2009|23:03] C:\Program Files\Messenger
[17/02/2009|15:02] C:\Program Files\Messenger Plus! Live
[16/02/2009|23:12] C:\Program Files\microsoft frontpage
[16/02/2009|23:05] C:\Program Files\Movie Maker
[16/02/2009|23:11] C:\Program Files\Mozilla Firefox
[16/02/2009|23:02] C:\Program Files\MSN
[16/02/2009|23:03] C:\Program Files\MSN Gaming Zone
[16/02/2009|23:05] C:\Program Files\NetMeeting
[16/02/2009|23:03] C:\Program Files\Online Services
[16/02/2009|23:05] C:\Program Files\Outlook Express
[16/02/2009|23:06] C:\Program Files\Services en ligne
[17/02/2009|15:02] C:\Program Files\teamokayvga
[17/02/2009|20:44] C:\Program Files\trend micro
[16/02/2009|23:17] C:\Program Files\Uninstall Information
[16/02/2009|23:11] C:\Program Files\Windows Live
[16/02/2009|23:03] C:\Program Files\Windows Media Connect 2
[16/02/2009|23:07] C:\Program Files\Windows Media Player
[16/02/2009|23:02] C:\Program Files\Windows NT
[16/02/2009|23:06] C:\Program Files\WindowsUpdate
[16/02/2009|23:11] C:\Program Files\WinRAR
[16/02/2009|23:12] C:\Program Files\xerox
--------------------\\ Listing des dossiers dans C:\Program Files\Fichiers communs
[16/02/2009|23:20] C:\Program Files\Fichiers communs\InstallShield
[16/02/2009|23:12] C:\Program Files\Fichiers communs\Java
[16/02/2009|23:17] C:\Program Files\Fichiers communs\Microsoft Shared
[16/02/2009|23:05] C:\Program Files\Fichiers communs\MSSoap
[16/02/2009|23:27] C:\Program Files\Fichiers communs\Nero
[16/02/2009|22:57] C:\Program Files\Fichiers communs\ODBC
[16/02/2009|23:05] C:\Program Files\Fichiers communs\Services
[16/02/2009|22:57] C:\Program Files\Fichiers communs\SpeechEngines
[16/02/2009|23:05] C:\Program Files\Fichiers communs\System
--------------------\\ Process
( 36 Processes )
iexplore.exe ~ [PID:284]
--------------------\\ Recherche avec S_Lop
Aucun fichier / dossier Lop trouvé !
--------------------\\ Recherche de Fichiers / Dossiers Lop
Aucun fichier / dossier Lop trouvé !
--------------------\\ Verification du Registre
..... OK !
--------------------\\ Verification du fichier Hosts
Fichier Hosts PROPRE
--------------------\\ Recherche de fichiers avec Catchme
catchme 0.3.1353 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2009-02-17 21:02:01
Windows 5.1.2600 Service Pack 3 NTFS
scanning hidden processes ...
scanning hidden files ...
scan completed successfully
hidden processes: 0
hidden files: 0
--------------------\\ Recherche d'autres infections
Aucune autre infection trouvée !
[F:318][D:44]-> C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp
[F:86][D:0]-> C:\DOCUME~1\ADMINI~1\Cookies
[F:333][D:4]-> C:\DOCUME~1\ADMINI~1\LOCALS~1\TEMPOR~1\content.IE5
1 - "C:\Lop SD\LopR_1.txt" - 17/02/2009|21:03 - Option : [1]
--------------------\\ Fin du rapport a 21:03:01
Microsoft Windows XP Professionnel ( v5.1.2600 ) Service Pack 3
X86-based PC ( Uniprocessor Free : Intel(R) Pentium(R) 4 CPU 2.66GHz )
BIOS : 786B2 v1.11
USER : Administrateur ( Administrator )
BOOT : Normal boot
Antivirus : Kaspersky Anti-Virus 8.0.0.506 (Not Activated)
A:\ (USB)
C:\ (Local Disk) - NTFS - Total:19 Go (Free:15 Go)
D:\ (Local Disk) - FAT32 - Total:17 Go (Free:14 Go)
E:\ (CD or DVD)
"C:\Lop SD" ( MAJ : 19-12-2008|23:40 )
Option : [1] ( 17/02/2009|21:00 )
--------------------\\ Listing des dossiers dans APPLIC~1
[16/02/2009|23:29] C:\DOCUME~1\ADMINI~1\APPLIC~1\Adobe
[16/02/2009|23:17] C:\DOCUME~1\ADMINI~1\APPLIC~1\Identities
[16/02/2009|23:29] C:\DOCUME~1\ADMINI~1\APPLIC~1\Macromedia
[17/02/2009|17:33] C:\DOCUME~1\ADMINI~1\APPLIC~1\Malwarebytes
[16/02/2009|23:27] C:\DOCUME~1\ADMINI~1\APPLIC~1\Media Player Classic
[17/02/2009|12:44] C:\DOCUME~1\ADMINI~1\APPLIC~1\Microsoft
[16/02/2009|23:10] C:\DOCUME~1\ADMINI~1\APPLIC~1\Real
[16/02/2009|23:12] C:\DOCUME~1\ADMINI~1\APPLIC~1\Sun
[17/02/2009|15:03] C:\DOCUME~1\ADMINI~1\APPLIC~1\teamokayvga
[17/02/2009|16:41] C:\DOCUME~1\ALLUSE~1\APPLIC~1\Kaspersky Lab
[17/02/2009|17:33] C:\DOCUME~1\ALLUSE~1\APPLIC~1\Malwarebytes
[17/02/2009|15:34] C:\DOCUME~1\ALLUSE~1\APPLIC~1\Messenger Plus!
[17/02/2009|10:44] C:\DOCUME~1\ALLUSE~1\APPLIC~1\Microsoft
[16/02/2009|23:07] C:\DOCUME~1\DEFAUL~1\APPLIC~1\Microsoft
[16/02/2009|23:12] C:\DOCUME~1\DEFAUL~1\APPLIC~1\Sun
[17/02/2009|12:46] C:\DOCUME~1\LOCALS~1\APPLIC~1\Microsoft
[16/02/2009|23:16] C:\DOCUME~1\NETWOR~1\APPLIC~1\Microsoft
--------------------\\ Tâches planifiées dans C:\WINDOWS\tasks
[17/02/2009 18:11][--ah-----] C:\WINDOWS\tasks\SA.DAT
[28/08/2001 14:00][-r-h-----] C:\WINDOWS\tasks\desktop.ini
--------------------\\ Listing des dossiers dans C:\Program Files
[17/02/2009|15:59] C:\Program Files\Alwil Software
[16/02/2009|22:59] C:\Program Files\Apoint2K
[17/02/2009|15:02] C:\Program Files\Circle Devlopement
[16/02/2009|23:04] C:\Program Files\ComPlus Applications
[17/02/2009|08:40] C:\Program Files\Dofus
[16/02/2009|23:20] C:\Program Files\Fichiers communs
[16/02/2009|23:11] C:\Program Files\Foxit
[16/02/2009|23:25] C:\Program Files\InstallShield Installation Information
[16/02/2009|23:08] C:\Program Files\Internet Explorer
[16/02/2009|23:12] C:\Program Files\Java
[17/02/2009|16:41] C:\Program Files\Kaspersky Lab
[16/02/2009|23:25] C:\Program Files\Menara
[16/02/2009|23:03] C:\Program Files\Messenger
[17/02/2009|15:02] C:\Program Files\Messenger Plus! Live
[16/02/2009|23:12] C:\Program Files\microsoft frontpage
[16/02/2009|23:05] C:\Program Files\Movie Maker
[16/02/2009|23:11] C:\Program Files\Mozilla Firefox
[16/02/2009|23:02] C:\Program Files\MSN
[16/02/2009|23:03] C:\Program Files\MSN Gaming Zone
[16/02/2009|23:05] C:\Program Files\NetMeeting
[16/02/2009|23:03] C:\Program Files\Online Services
[16/02/2009|23:05] C:\Program Files\Outlook Express
[16/02/2009|23:06] C:\Program Files\Services en ligne
[17/02/2009|15:02] C:\Program Files\teamokayvga
[17/02/2009|20:44] C:\Program Files\trend micro
[16/02/2009|23:17] C:\Program Files\Uninstall Information
[16/02/2009|23:11] C:\Program Files\Windows Live
[16/02/2009|23:03] C:\Program Files\Windows Media Connect 2
[16/02/2009|23:07] C:\Program Files\Windows Media Player
[16/02/2009|23:02] C:\Program Files\Windows NT
[16/02/2009|23:06] C:\Program Files\WindowsUpdate
[16/02/2009|23:11] C:\Program Files\WinRAR
[16/02/2009|23:12] C:\Program Files\xerox
--------------------\\ Listing des dossiers dans C:\Program Files\Fichiers communs
[16/02/2009|23:20] C:\Program Files\Fichiers communs\InstallShield
[16/02/2009|23:12] C:\Program Files\Fichiers communs\Java
[16/02/2009|23:17] C:\Program Files\Fichiers communs\Microsoft Shared
[16/02/2009|23:05] C:\Program Files\Fichiers communs\MSSoap
[16/02/2009|23:27] C:\Program Files\Fichiers communs\Nero
[16/02/2009|22:57] C:\Program Files\Fichiers communs\ODBC
[16/02/2009|23:05] C:\Program Files\Fichiers communs\Services
[16/02/2009|22:57] C:\Program Files\Fichiers communs\SpeechEngines
[16/02/2009|23:05] C:\Program Files\Fichiers communs\System
--------------------\\ Process
( 36 Processes )
iexplore.exe ~ [PID:284]
--------------------\\ Recherche avec S_Lop
Aucun fichier / dossier Lop trouvé !
--------------------\\ Recherche de Fichiers / Dossiers Lop
Aucun fichier / dossier Lop trouvé !
--------------------\\ Verification du Registre
..... OK !
--------------------\\ Verification du fichier Hosts
Fichier Hosts PROPRE
--------------------\\ Recherche de fichiers avec Catchme
catchme 0.3.1353 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2009-02-17 21:02:01
Windows 5.1.2600 Service Pack 3 NTFS
scanning hidden processes ...
scanning hidden files ...
scan completed successfully
hidden processes: 0
hidden files: 0
--------------------\\ Recherche d'autres infections
Aucune autre infection trouvée !
[F:318][D:44]-> C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp
[F:86][D:0]-> C:\DOCUME~1\ADMINI~1\Cookies
[F:333][D:4]-> C:\DOCUME~1\ADMINI~1\LOCALS~1\TEMPOR~1\content.IE5
1 - "C:\Lop SD\LopR_1.txt" - 17/02/2009|21:03 - Option : [1]
--------------------\\ Fin du rapport a 21:03:01
---> Désactive ton antivirus le temps de la manipulation car OTMoveIt3 est détecté comme une infection à tort.
---> Télécharge OTMoveIt3 (OldTimer) sur ton Bureau.
---> Double-clique sur OTMoveIt3.exe afin de le lancer.
---> Copie (Ctrl+C) le texte suivant ci-dessous :
:processes
explorer.exe
:files
C:\Program Files\Circle Devlopement
C:\Documents and Settings\Administrateur\Application Data\teamokayvga
C:\Program Files\teamokayvga
C:\WINDOWS\system32\Cache
C:\hyetn1i.exe
C:\WINDOWS\system32\nmdfgds1.dll
C:\qphdin.com
C:\WINDOWS\system32\nmdfgds0.dll
C:\WINDOWS\system32\olhrwef.exe
C:\cv22.cmd
D:\hyetn1i.exe
:reg
[-HKEY_CURRENT_USER\software\microsoft\windows\currentversion\explorer\mountpoints2\{a666ab4c-fc7b-11dd-981f-806d6172696f}]
[-HKEY_CURRENT_USER\software\microsoft\windows\currentversion\explorer\mountpoints2\{a666ab4d-fc7b-11dd-981f-806d6172696f}]
[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run]
"Debug more"=-
"cdoosoft"=-
[HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\standardprofile\authorizedapplications\list]
"C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\acis.exe"=-
"C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\pxwwry.exe"=-
"C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winhuti.exe"=-
"C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winvuqv.exe"=-
"C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winnbwr.exe"=-
"C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\xdysip.exe"=-
"C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\wintcwv.exe"=-
"C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winetmon.exe"=-
"C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\cqkka.exe"=-
"C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\avqxoq.exe"=-
"C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winbtjow.exe"=-
"C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winkwgyif.exe"=-
"C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winfoxlk.exe"=-
"C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winbvothb.exe"=-
"C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\windrbhsa.exe"=-
"C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winhccpe.exe"=-
"C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\pxqnw.exe"=-
"C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winwawkj.exe"=-
"C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\pnpm.exe"=-
"C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winnatsu.exe"=-
"C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\gfjf.exe"=-
"C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winxkeihu.exe"=-
"C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winbofwon.exe"=-
"C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\kwqi.exe"=-
"C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winmxkrn.exe"=-
"C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\vnnr.exe"=-
"C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winkubnl.exe"=-
"C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\iciiq.exe"=-
"C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winisusg.exe"=-
"C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winxisrh.exe"=-
"C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\mbklc.exe"=-"
"C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\windyak.exe"=-
"C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winfqnefc.exe"=-
"C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winwflxwf.exe"=-
"C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winlkrge.exe"=-
"C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winqhkjb.exe"=-
"C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\bkjwr.exe"=-
"C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winhcxswt.exe"=-
"C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winextup.exe"=-
"C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\jljkq.exe"=-
"C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winteehgu.exe"=-
"C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\bhujj.exe"=-
"C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winpropo.exe"=-
"C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\jphm.exe"=-
"C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\lnuui.exe"=-
"C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\eahwd.exe"=-
"C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winhcjo.exe"=-
"C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\qdvu.exe"=-
"C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\hlygbi.exe"=-
"C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\jrxhm.exe"=-
"C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winllgy.exe"=-
"C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\qedm.exe"=-
"C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winngdi.exe"=-
"C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winrltxjr.exe"=-
"C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\wingqfwa.exe"=-
"C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winwjsad.exe"=-
"C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\stop.exe"=-
"C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\wintwkn.exe"=-
"C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winubkwf.exe"=-
"C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winljfoly.exe"=-
"C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winwvmrm.exe"=-
"C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winqeaisr.exe"=-
"C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\eelx.exe"=-
"C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\jahdmr.exe"=-
"C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winvtlypf.exe"=-
"C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winfnlipd.exe"=-
"C:\DOCUME~1\ADMINI~1\APPLIC~1\TEAMOK~1\MessHtm.exe"=-
"C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winawstri.exe"=-
"C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winesmf.exe"=-
"C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winvtro.exe"=-
"C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winndltxi.exe"=-
"C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winxlytle.exe"=-
"C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\outmvl.exe"=-
"C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winmumkmw.exe"=-
"C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winikivdq.exe"=-
"C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winntunh.exe"=-
"C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winhstcli.exe"=-
"C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winwrbh.exe"=-
"C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\iqmp.exe"=-
"C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winyjfjcp.exe"=-
"C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winouqx.exe"=-
"C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winbhut.exe"=-
"C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winixkcw.exe"=-
"C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winybtwxy.exe"=-
"C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\wincmleo.exe"=-
"C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winfnxmde.exe"=-
"C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winajhak.exe"=-
:commands
[purity]
[emptytemp]
[reboot]
---> Colle (Ctrl+V) le texte précédemment copié dans le cadre Paste Instructions for Items to be Moved.
---> Clique maintenant sur le bouton MoveIt! puis ferme OTMoveIt3.
Si un fichier ou dossier ne peut pas être supprimé immédiatement, le logiciel te demandera de redémarrer.
Accepte en cliquant sur YES.
---> Poste le rapport situé dans ce dossier : C:\_OTMoveIt\MovedFiles\
Le nom du rapport correspond au moment de sa création : date_heure.log
---> Télécharge OTMoveIt3 (OldTimer) sur ton Bureau.
---> Double-clique sur OTMoveIt3.exe afin de le lancer.
---> Copie (Ctrl+C) le texte suivant ci-dessous :
:processes
explorer.exe
:files
C:\Program Files\Circle Devlopement
C:\Documents and Settings\Administrateur\Application Data\teamokayvga
C:\Program Files\teamokayvga
C:\WINDOWS\system32\Cache
C:\hyetn1i.exe
C:\WINDOWS\system32\nmdfgds1.dll
C:\qphdin.com
C:\WINDOWS\system32\nmdfgds0.dll
C:\WINDOWS\system32\olhrwef.exe
C:\cv22.cmd
D:\hyetn1i.exe
:reg
[-HKEY_CURRENT_USER\software\microsoft\windows\currentversion\explorer\mountpoints2\{a666ab4c-fc7b-11dd-981f-806d6172696f}]
[-HKEY_CURRENT_USER\software\microsoft\windows\currentversion\explorer\mountpoints2\{a666ab4d-fc7b-11dd-981f-806d6172696f}]
[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run]
"Debug more"=-
"cdoosoft"=-
[HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\standardprofile\authorizedapplications\list]
"C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\acis.exe"=-
"C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\pxwwry.exe"=-
"C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winhuti.exe"=-
"C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winvuqv.exe"=-
"C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winnbwr.exe"=-
"C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\xdysip.exe"=-
"C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\wintcwv.exe"=-
"C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winetmon.exe"=-
"C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\cqkka.exe"=-
"C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\avqxoq.exe"=-
"C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winbtjow.exe"=-
"C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winkwgyif.exe"=-
"C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winfoxlk.exe"=-
"C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winbvothb.exe"=-
"C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\windrbhsa.exe"=-
"C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winhccpe.exe"=-
"C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\pxqnw.exe"=-
"C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winwawkj.exe"=-
"C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\pnpm.exe"=-
"C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winnatsu.exe"=-
"C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\gfjf.exe"=-
"C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winxkeihu.exe"=-
"C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winbofwon.exe"=-
"C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\kwqi.exe"=-
"C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winmxkrn.exe"=-
"C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\vnnr.exe"=-
"C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winkubnl.exe"=-
"C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\iciiq.exe"=-
"C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winisusg.exe"=-
"C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winxisrh.exe"=-
"C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\mbklc.exe"=-"
"C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\windyak.exe"=-
"C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winfqnefc.exe"=-
"C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winwflxwf.exe"=-
"C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winlkrge.exe"=-
"C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winqhkjb.exe"=-
"C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\bkjwr.exe"=-
"C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winhcxswt.exe"=-
"C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winextup.exe"=-
"C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\jljkq.exe"=-
"C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winteehgu.exe"=-
"C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\bhujj.exe"=-
"C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winpropo.exe"=-
"C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\jphm.exe"=-
"C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\lnuui.exe"=-
"C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\eahwd.exe"=-
"C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winhcjo.exe"=-
"C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\qdvu.exe"=-
"C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\hlygbi.exe"=-
"C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\jrxhm.exe"=-
"C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winllgy.exe"=-
"C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\qedm.exe"=-
"C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winngdi.exe"=-
"C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winrltxjr.exe"=-
"C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\wingqfwa.exe"=-
"C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winwjsad.exe"=-
"C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\stop.exe"=-
"C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\wintwkn.exe"=-
"C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winubkwf.exe"=-
"C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winljfoly.exe"=-
"C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winwvmrm.exe"=-
"C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winqeaisr.exe"=-
"C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\eelx.exe"=-
"C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\jahdmr.exe"=-
"C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winvtlypf.exe"=-
"C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winfnlipd.exe"=-
"C:\DOCUME~1\ADMINI~1\APPLIC~1\TEAMOK~1\MessHtm.exe"=-
"C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winawstri.exe"=-
"C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winesmf.exe"=-
"C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winvtro.exe"=-
"C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winndltxi.exe"=-
"C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winxlytle.exe"=-
"C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\outmvl.exe"=-
"C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winmumkmw.exe"=-
"C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winikivdq.exe"=-
"C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winntunh.exe"=-
"C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winhstcli.exe"=-
"C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winwrbh.exe"=-
"C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\iqmp.exe"=-
"C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winyjfjcp.exe"=-
"C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winouqx.exe"=-
"C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winbhut.exe"=-
"C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winixkcw.exe"=-
"C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winybtwxy.exe"=-
"C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\wincmleo.exe"=-
"C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winfnxmde.exe"=-
"C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winajhak.exe"=-
:commands
[purity]
[emptytemp]
[reboot]
---> Colle (Ctrl+V) le texte précédemment copié dans le cadre Paste Instructions for Items to be Moved.
---> Clique maintenant sur le bouton MoveIt! puis ferme OTMoveIt3.
Si un fichier ou dossier ne peut pas être supprimé immédiatement, le logiciel te demandera de redémarrer.
Accepte en cliquant sur YES.
---> Poste le rapport situé dans ce dossier : C:\_OTMoveIt\MovedFiles\
Le nom du rapport correspond au moment de sa création : date_heure.log
========== PROCESSES ==========
Process explorer.exe killed successfully.
========== FILES ==========
C:\Program Files\Circle Devlopement moved successfully.
C:\Documents and Settings\Administrateur\Application Data\teamokayvga moved successfully.
C:\Program Files\teamokayvga moved successfully.
C:\WINDOWS\system32\Cache moved successfully.
C:\hyetn1i.exe moved successfully.
DllUnregisterServer procedure not found in C:\WINDOWS\system32\nmdfgds1.dll
C:\WINDOWS\system32\nmdfgds1.dll NOT unregistered.
C:\WINDOWS\system32\nmdfgds1.dll moved successfully.
C:\qphdin.com moved successfully.
DllUnregisterServer procedure not found in C:\WINDOWS\system32\nmdfgds0.dll
C:\WINDOWS\system32\nmdfgds0.dll NOT unregistered.
C:\WINDOWS\system32\nmdfgds0.dll moved successfully.
C:\WINDOWS\system32\olhrwef.exe moved successfully.
C:\cv22.cmd moved successfully.
D:\hyetn1i.exe moved successfully.
========== REGISTRY ==========
Registry key HKEY_CURRENT_USER\software\microsoft\windows\currentversion\explorer\mountpoints2\{a666ab4c-fc7b-11dd-981f-806d6172696f}\\ deleted successfully.
Registry key HKEY_CURRENT_USER\software\microsoft\windows\currentversion\explorer\mountpoints2\{a666ab4d-fc7b-11dd-981f-806d6172696f}\\ deleted successfully.
Registry value HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run\\Debug more not found.
Registry value HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run\\cdoosoft not found.
Registry value HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\standardprofile\authorizedapplications\list\\C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\acis.exe deleted successfully.
Registry value HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\standardprofile\authorizedapplications\list\\C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\pxwwry.exe deleted successfully.
Registry value HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\standardprofile\authorizedapplications\list\\C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winhuti.exe deleted successfully.
Registry value HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\standardprofile\authorizedapplications\list\\C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winvuqv.exe deleted successfully.
Registry value HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\standardprofile\authorizedapplications\list\\C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winnbwr.exe deleted successfully.
Registry value HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\standardprofile\authorizedapplications\list\\C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\xdysip.exe deleted successfully.
Registry value HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\standardprofile\authorizedapplications\list\\C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\wintcwv.exe deleted successfully.
Registry value HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\standardprofile\authorizedapplications\list\\C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winetmon.exe deleted successfully.
Registry value HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\standardprofile\authorizedapplications\list\\C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\cqkka.exe deleted successfully.
Registry value HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\standardprofile\authorizedapplications\list\\C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\avqxoq.exe deleted successfully.
Registry value HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\standardprofile\authorizedapplications\list\\C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winbtjow.exe deleted successfully.
Registry value HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\standardprofile\authorizedapplications\list\\C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winkwgyif.exe deleted successfully.
Registry value HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\standardprofile\authorizedapplications\list\\C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winfoxlk.exe deleted successfully.
Registry value HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\standardprofile\authorizedapplications\list\\C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winbvothb.exe deleted successfully.
Registry value HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\standardprofile\authorizedapplications\list\\C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\windrbhsa.exe deleted successfully.
Registry value HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\standardprofile\authorizedapplications\list\\C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winhccpe.exe deleted successfully.
Registry value HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\standardprofile\authorizedapplications\list\\C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\pxqnw.exe deleted successfully.
Registry value HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\standardprofile\authorizedapplications\list\\C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winwawkj.exe deleted successfully.
Registry value HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\standardprofile\authorizedapplications\list\\C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\pnpm.exe deleted successfully.
Registry value HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\standardprofile\authorizedapplications\list\\C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winnatsu.exe deleted successfully.
Registry value HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\standardprofile\authorizedapplications\list\\C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\gfjf.exe deleted successfully.
Registry value HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\standardprofile\authorizedapplications\list\\C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winxkeihu.exe deleted successfully.
Registry value HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\standardprofile\authorizedapplications\list\\C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winbofwon.exe deleted successfully.
Registry value HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\standardprofile\authorizedapplications\list\\C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\kwqi.exe deleted successfully.
Registry value HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\standardprofile\authorizedapplications\list\\C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winmxkrn.exe deleted successfully.
Registry value HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\standardprofile\authorizedapplications\list\\C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\vnnr.exe deleted successfully.
Registry value HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\standardprofile\authorizedapplications\list\\C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winkubnl.exe deleted successfully.
Registry value HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\standardprofile\authorizedapplications\list\\C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\iciiq.exe deleted successfully.
Registry value HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\standardprofile\authorizedapplications\list\\C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winisusg.exe deleted successfully.
Registry value HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\standardprofile\authorizedapplications\list\\C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winxisrh.exe deleted successfully.
HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\standardprofile\authorizedapplications\list\\"C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\mbklc.exe"|-" /E : value set successfully!
Registry value HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\standardprofile\authorizedapplications\list\\C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\windyak.exe deleted successfully.
Registry value HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\standardprofile\authorizedapplications\list\\C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winfqnefc.exe deleted successfully.
Registry value HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\standardprofile\authorizedapplications\list\\C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winwflxwf.exe deleted successfully.
Registry value HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\standardprofile\authorizedapplications\list\\C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winlkrge.exe deleted successfully.
Registry value HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\standardprofile\authorizedapplications\list\\C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winqhkjb.exe deleted successfully.
Registry value HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\standardprofile\authorizedapplications\list\\C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\bkjwr.exe deleted successfully.
Registry value HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\standardprofile\authorizedapplications\list\\C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winhcxswt.exe deleted successfully.
Registry value HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\standardprofile\authorizedapplications\list\\C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winextup.exe deleted successfully.
Registry value HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\standardprofile\authorizedapplications\list\\C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\jljkq.exe deleted successfully.
Registry value HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\standardprofile\authorizedapplications\list\\C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winteehgu.exe deleted successfully.
Registry value HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\standardprofile\authorizedapplications\list\\C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\bhujj.exe deleted successfully.
Registry value HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\standardprofile\authorizedapplications\list\\C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winpropo.exe deleted successfully.
Registry value HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\standardprofile\authorizedapplications\list\\C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\jphm.exe deleted successfully.
Registry value HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\standardprofile\authorizedapplications\list\\C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\lnuui.exe deleted successfully.
Registry value HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\standardprofile\authorizedapplications\list\\C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\eahwd.exe deleted successfully.
Registry value HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\standardprofile\authorizedapplications\list\\C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winhcjo.exe deleted successfully.
Registry value HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\standardprofile\authorizedapplications\list\\C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\qdvu.exe deleted successfully.
Registry value HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\standardprofile\authorizedapplications\list\\C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\hlygbi.exe deleted successfully.
Registry value HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\standardprofile\authorizedapplications\list\\C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\jrxhm.exe deleted successfully.
Registry value HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\standardprofile\authorizedapplications\list\\C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winllgy.exe deleted successfully.
Registry value HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\standardprofile\authorizedapplications\list\\C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\qedm.exe deleted successfully.
Registry value HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\standardprofile\authorizedapplications\list\\C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winngdi.exe deleted successfully.
Registry value HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\standardprofile\authorizedapplications\list\\C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winrltxjr.exe deleted successfully.
Registry value HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\standardprofile\authorizedapplications\list\\C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\wingqfwa.exe deleted successfully.
Registry value HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\standardprofile\authorizedapplications\list\\C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winwjsad.exe deleted successfully.
Registry value HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\standardprofile\authorizedapplications\list\\C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\stop.exe deleted successfully.
Registry value HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\standardprofile\authorizedapplications\list\\C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\wintwkn.exe deleted successfully.
Registry value HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\standardprofile\authorizedapplications\list\\C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winubkwf.exe deleted successfully.
Registry value HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\standardprofile\authorizedapplications\list\\C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winljfoly.exe deleted successfully.
Registry value HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\standardprofile\authorizedapplications\list\\C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winwvmrm.exe deleted successfully.
Registry value HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\standardprofile\authorizedapplications\list\\C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winqeaisr.exe deleted successfully.
Registry value HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\standardprofile\authorizedapplications\list\\C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\eelx.exe deleted successfully.
Registry value HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\standardprofile\authorizedapplications\list\\C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\jahdmr.exe deleted successfully.
Registry value HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\standardprofile\authorizedapplications\list\\C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winvtlypf.exe deleted successfully.
Registry value HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\standardprofile\authorizedapplications\list\\C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winfnlipd.exe deleted successfully.
Registry value HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\standardprofile\authorizedapplications\list\\C:\DOCUME~1\ADMINI~1\APPLIC~1\TEAMOK~1\MessHtm.exe deleted successfully.
Registry value HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\standardprofile\authorizedapplications\list\\C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winawstri.exe deleted successfully.
Registry value HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\standardprofile\authorizedapplications\list\\C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winesmf.exe deleted successfully.
Registry value HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\standardprofile\authorizedapplications\list\\C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winvtro.exe deleted successfully.
Registry value HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\standardprofile\authorizedapplications\list\\C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winndltxi.exe deleted successfully.
Registry value HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\standardprofile\authorizedapplications\list\\C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winxlytle.exe deleted successfully.
Registry value HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\standardprofile\authorizedapplications\list\\C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\outmvl.exe deleted successfully.
Registry value HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\standardprofile\authorizedapplications\list\\C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winmumkmw.exe deleted successfully.
Registry value HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\standardprofile\authorizedapplications\list\\C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winikivdq.exe deleted successfully.
Registry value HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\standardprofile\authorizedapplications\list\\C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winntunh.exe deleted successfully.
Registry value HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\standardprofile\authorizedapplications\list\\C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winhstcli.exe deleted successfully.
Registry value HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\standardprofile\authorizedapplications\list\\C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winwrbh.exe deleted successfully.
Registry value HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\standardprofile\authorizedapplications\list\\C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\iqmp.exe deleted successfully.
Registry value HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\standardprofile\authorizedapplications\list\\C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winyjfjcp.exe deleted successfully.
Registry value HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\standardprofile\authorizedapplications\list\\C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winouqx.exe deleted successfully.
Registry value HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\standardprofile\authorizedapplications\list\\C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winbhut.exe deleted successfully.
Registry value HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\standardprofile\authorizedapplications\list\\C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winixkcw.exe deleted successfully.
Registry value HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\standardprofile\authorizedapplications\list\\C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winybtwxy.exe deleted successfully.
Registry value HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\standardprofile\authorizedapplications\list\\C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\wincmleo.exe deleted successfully.
Registry value HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\standardprofile\authorizedapplications\list\\C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winfnxmde.exe deleted successfully.
Registry value HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\standardprofile\authorizedapplications\list\\C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winajhak.exe deleted successfully.
========== COMMANDS ==========
File delete failed. C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winxbgtni.exe scheduled to be deleted on reboot.
User's Temp folder emptied.
User's Temporary Internet Files folder emptied.
User's Internet Explorer cache folder emptied.
Local Service Temp folder emptied.
File delete failed. C:\Documents and Settings\LocalService\Local Settings\Temporary Internet Files\Content.IE5\index.dat scheduled to be deleted on reboot.
Local Service Temporary Internet Files folder emptied.
File delete failed. C:\WINDOWS\temp\Perflib_Perfdata_d64.dat scheduled to be deleted on reboot.
Windows Temp folder emptied.
Temp folders emptied.
OTMoveIt3 by OldTimer - Version 1.0.8.0 log created on 02182009_102559
Files moved on Reboot...
C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winxbgtni.exe moved successfully.
File move failed. C:\Documents and Settings\LocalService\Local Settings\Temporary Internet Files\Content.IE5\index.dat scheduled to be moved on reboot.
C:\WINDOWS\temp\Perflib_Perfdata_d64.dat moved successfully.
Process explorer.exe killed successfully.
========== FILES ==========
C:\Program Files\Circle Devlopement moved successfully.
C:\Documents and Settings\Administrateur\Application Data\teamokayvga moved successfully.
C:\Program Files\teamokayvga moved successfully.
C:\WINDOWS\system32\Cache moved successfully.
C:\hyetn1i.exe moved successfully.
DllUnregisterServer procedure not found in C:\WINDOWS\system32\nmdfgds1.dll
C:\WINDOWS\system32\nmdfgds1.dll NOT unregistered.
C:\WINDOWS\system32\nmdfgds1.dll moved successfully.
C:\qphdin.com moved successfully.
DllUnregisterServer procedure not found in C:\WINDOWS\system32\nmdfgds0.dll
C:\WINDOWS\system32\nmdfgds0.dll NOT unregistered.
C:\WINDOWS\system32\nmdfgds0.dll moved successfully.
C:\WINDOWS\system32\olhrwef.exe moved successfully.
C:\cv22.cmd moved successfully.
D:\hyetn1i.exe moved successfully.
========== REGISTRY ==========
Registry key HKEY_CURRENT_USER\software\microsoft\windows\currentversion\explorer\mountpoints2\{a666ab4c-fc7b-11dd-981f-806d6172696f}\\ deleted successfully.
Registry key HKEY_CURRENT_USER\software\microsoft\windows\currentversion\explorer\mountpoints2\{a666ab4d-fc7b-11dd-981f-806d6172696f}\\ deleted successfully.
Registry value HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run\\Debug more not found.
Registry value HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run\\cdoosoft not found.
Registry value HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\standardprofile\authorizedapplications\list\\C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\acis.exe deleted successfully.
Registry value HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\standardprofile\authorizedapplications\list\\C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\pxwwry.exe deleted successfully.
Registry value HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\standardprofile\authorizedapplications\list\\C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winhuti.exe deleted successfully.
Registry value HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\standardprofile\authorizedapplications\list\\C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winvuqv.exe deleted successfully.
Registry value HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\standardprofile\authorizedapplications\list\\C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winnbwr.exe deleted successfully.
Registry value HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\standardprofile\authorizedapplications\list\\C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\xdysip.exe deleted successfully.
Registry value HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\standardprofile\authorizedapplications\list\\C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\wintcwv.exe deleted successfully.
Registry value HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\standardprofile\authorizedapplications\list\\C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winetmon.exe deleted successfully.
Registry value HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\standardprofile\authorizedapplications\list\\C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\cqkka.exe deleted successfully.
Registry value HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\standardprofile\authorizedapplications\list\\C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\avqxoq.exe deleted successfully.
Registry value HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\standardprofile\authorizedapplications\list\\C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winbtjow.exe deleted successfully.
Registry value HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\standardprofile\authorizedapplications\list\\C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winkwgyif.exe deleted successfully.
Registry value HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\standardprofile\authorizedapplications\list\\C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winfoxlk.exe deleted successfully.
Registry value HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\standardprofile\authorizedapplications\list\\C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winbvothb.exe deleted successfully.
Registry value HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\standardprofile\authorizedapplications\list\\C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\windrbhsa.exe deleted successfully.
Registry value HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\standardprofile\authorizedapplications\list\\C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winhccpe.exe deleted successfully.
Registry value HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\standardprofile\authorizedapplications\list\\C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\pxqnw.exe deleted successfully.
Registry value HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\standardprofile\authorizedapplications\list\\C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winwawkj.exe deleted successfully.
Registry value HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\standardprofile\authorizedapplications\list\\C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\pnpm.exe deleted successfully.
Registry value HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\standardprofile\authorizedapplications\list\\C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winnatsu.exe deleted successfully.
Registry value HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\standardprofile\authorizedapplications\list\\C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\gfjf.exe deleted successfully.
Registry value HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\standardprofile\authorizedapplications\list\\C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winxkeihu.exe deleted successfully.
Registry value HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\standardprofile\authorizedapplications\list\\C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winbofwon.exe deleted successfully.
Registry value HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\standardprofile\authorizedapplications\list\\C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\kwqi.exe deleted successfully.
Registry value HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\standardprofile\authorizedapplications\list\\C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winmxkrn.exe deleted successfully.
Registry value HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\standardprofile\authorizedapplications\list\\C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\vnnr.exe deleted successfully.
Registry value HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\standardprofile\authorizedapplications\list\\C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winkubnl.exe deleted successfully.
Registry value HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\standardprofile\authorizedapplications\list\\C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\iciiq.exe deleted successfully.
Registry value HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\standardprofile\authorizedapplications\list\\C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winisusg.exe deleted successfully.
Registry value HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\standardprofile\authorizedapplications\list\\C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winxisrh.exe deleted successfully.
HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\standardprofile\authorizedapplications\list\\"C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\mbklc.exe"|-" /E : value set successfully!
Registry value HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\standardprofile\authorizedapplications\list\\C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\windyak.exe deleted successfully.
Registry value HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\standardprofile\authorizedapplications\list\\C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winfqnefc.exe deleted successfully.
Registry value HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\standardprofile\authorizedapplications\list\\C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winwflxwf.exe deleted successfully.
Registry value HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\standardprofile\authorizedapplications\list\\C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winlkrge.exe deleted successfully.
Registry value HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\standardprofile\authorizedapplications\list\\C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winqhkjb.exe deleted successfully.
Registry value HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\standardprofile\authorizedapplications\list\\C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\bkjwr.exe deleted successfully.
Registry value HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\standardprofile\authorizedapplications\list\\C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winhcxswt.exe deleted successfully.
Registry value HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\standardprofile\authorizedapplications\list\\C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winextup.exe deleted successfully.
Registry value HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\standardprofile\authorizedapplications\list\\C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\jljkq.exe deleted successfully.
Registry value HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\standardprofile\authorizedapplications\list\\C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winteehgu.exe deleted successfully.
Registry value HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\standardprofile\authorizedapplications\list\\C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\bhujj.exe deleted successfully.
Registry value HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\standardprofile\authorizedapplications\list\\C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winpropo.exe deleted successfully.
Registry value HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\standardprofile\authorizedapplications\list\\C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\jphm.exe deleted successfully.
Registry value HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\standardprofile\authorizedapplications\list\\C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\lnuui.exe deleted successfully.
Registry value HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\standardprofile\authorizedapplications\list\\C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\eahwd.exe deleted successfully.
Registry value HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\standardprofile\authorizedapplications\list\\C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winhcjo.exe deleted successfully.
Registry value HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\standardprofile\authorizedapplications\list\\C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\qdvu.exe deleted successfully.
Registry value HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\standardprofile\authorizedapplications\list\\C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\hlygbi.exe deleted successfully.
Registry value HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\standardprofile\authorizedapplications\list\\C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\jrxhm.exe deleted successfully.
Registry value HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\standardprofile\authorizedapplications\list\\C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winllgy.exe deleted successfully.
Registry value HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\standardprofile\authorizedapplications\list\\C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\qedm.exe deleted successfully.
Registry value HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\standardprofile\authorizedapplications\list\\C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winngdi.exe deleted successfully.
Registry value HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\standardprofile\authorizedapplications\list\\C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winrltxjr.exe deleted successfully.
Registry value HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\standardprofile\authorizedapplications\list\\C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\wingqfwa.exe deleted successfully.
Registry value HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\standardprofile\authorizedapplications\list\\C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winwjsad.exe deleted successfully.
Registry value HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\standardprofile\authorizedapplications\list\\C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\stop.exe deleted successfully.
Registry value HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\standardprofile\authorizedapplications\list\\C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\wintwkn.exe deleted successfully.
Registry value HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\standardprofile\authorizedapplications\list\\C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winubkwf.exe deleted successfully.
Registry value HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\standardprofile\authorizedapplications\list\\C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winljfoly.exe deleted successfully.
Registry value HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\standardprofile\authorizedapplications\list\\C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winwvmrm.exe deleted successfully.
Registry value HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\standardprofile\authorizedapplications\list\\C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winqeaisr.exe deleted successfully.
Registry value HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\standardprofile\authorizedapplications\list\\C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\eelx.exe deleted successfully.
Registry value HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\standardprofile\authorizedapplications\list\\C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\jahdmr.exe deleted successfully.
Registry value HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\standardprofile\authorizedapplications\list\\C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winvtlypf.exe deleted successfully.
Registry value HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\standardprofile\authorizedapplications\list\\C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winfnlipd.exe deleted successfully.
Registry value HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\standardprofile\authorizedapplications\list\\C:\DOCUME~1\ADMINI~1\APPLIC~1\TEAMOK~1\MessHtm.exe deleted successfully.
Registry value HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\standardprofile\authorizedapplications\list\\C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winawstri.exe deleted successfully.
Registry value HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\standardprofile\authorizedapplications\list\\C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winesmf.exe deleted successfully.
Registry value HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\standardprofile\authorizedapplications\list\\C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winvtro.exe deleted successfully.
Registry value HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\standardprofile\authorizedapplications\list\\C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winndltxi.exe deleted successfully.
Registry value HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\standardprofile\authorizedapplications\list\\C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winxlytle.exe deleted successfully.
Registry value HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\standardprofile\authorizedapplications\list\\C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\outmvl.exe deleted successfully.
Registry value HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\standardprofile\authorizedapplications\list\\C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winmumkmw.exe deleted successfully.
Registry value HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\standardprofile\authorizedapplications\list\\C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winikivdq.exe deleted successfully.
Registry value HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\standardprofile\authorizedapplications\list\\C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winntunh.exe deleted successfully.
Registry value HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\standardprofile\authorizedapplications\list\\C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winhstcli.exe deleted successfully.
Registry value HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\standardprofile\authorizedapplications\list\\C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winwrbh.exe deleted successfully.
Registry value HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\standardprofile\authorizedapplications\list\\C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\iqmp.exe deleted successfully.
Registry value HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\standardprofile\authorizedapplications\list\\C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winyjfjcp.exe deleted successfully.
Registry value HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\standardprofile\authorizedapplications\list\\C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winouqx.exe deleted successfully.
Registry value HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\standardprofile\authorizedapplications\list\\C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winbhut.exe deleted successfully.
Registry value HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\standardprofile\authorizedapplications\list\\C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winixkcw.exe deleted successfully.
Registry value HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\standardprofile\authorizedapplications\list\\C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winybtwxy.exe deleted successfully.
Registry value HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\standardprofile\authorizedapplications\list\\C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\wincmleo.exe deleted successfully.
Registry value HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\standardprofile\authorizedapplications\list\\C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winfnxmde.exe deleted successfully.
Registry value HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\standardprofile\authorizedapplications\list\\C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winajhak.exe deleted successfully.
========== COMMANDS ==========
File delete failed. C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winxbgtni.exe scheduled to be deleted on reboot.
User's Temp folder emptied.
User's Temporary Internet Files folder emptied.
User's Internet Explorer cache folder emptied.
Local Service Temp folder emptied.
File delete failed. C:\Documents and Settings\LocalService\Local Settings\Temporary Internet Files\Content.IE5\index.dat scheduled to be deleted on reboot.
Local Service Temporary Internet Files folder emptied.
File delete failed. C:\WINDOWS\temp\Perflib_Perfdata_d64.dat scheduled to be deleted on reboot.
Windows Temp folder emptied.
Temp folders emptied.
OTMoveIt3 by OldTimer - Version 1.0.8.0 log created on 02182009_102559
Files moved on Reboot...
C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winxbgtni.exe moved successfully.
File move failed. C:\Documents and Settings\LocalService\Local Settings\Temporary Internet Files\Content.IE5\index.dat scheduled to be moved on reboot.
C:\WINDOWS\temp\Perflib_Perfdata_d64.dat moved successfully.
---> Désactive ton antivirus le temps de la manipulation car OTMoveIt3 est détecté comme une infection à tort.
---> Télécharge OTMoveIt3 (OldTimer) sur ton Bureau.
---> Double-clique sur OTMoveIt3.exe afin de le lancer.
---> Copie (Ctrl+C) le texte suivant ci-dessous :
:processes
explorer.exe
:files
D:\m0vnonh.bat
D:\1utbfd.bat
D:\qphdin.com
D:\a2h2.com
D:\ur0.com
D:\pook.com
D:\w98.com
D:\hl80c6b1.com
D:\j60osk9.cmd
D:\uvsqfgwd.cmd
D:\gy.exe
D:\2aaxaiy.exe
:commands
[purity]
[emptytemp]
[reboot]
---> Colle (Ctrl+V) le texte précédemment copié dans le cadre Paste Instructions for Items to be Moved.
---> Clique maintenant sur le bouton MoveIt! puis ferme OTMoveIt3.
Si un fichier ou dossier ne peut pas être supprimé immédiatement, le logiciel te demandera de redémarrer.
Accepte en cliquant sur YES.
---> Poste le rapport situé dans ce dossier : C:\_OTMoveIt\MovedFiles\
Le nom du rapport correspond au moment de sa création : date_heure.log
---> Télécharge OTMoveIt3 (OldTimer) sur ton Bureau.
---> Double-clique sur OTMoveIt3.exe afin de le lancer.
---> Copie (Ctrl+C) le texte suivant ci-dessous :
:processes
explorer.exe
:files
D:\m0vnonh.bat
D:\1utbfd.bat
D:\qphdin.com
D:\a2h2.com
D:\ur0.com
D:\pook.com
D:\w98.com
D:\hl80c6b1.com
D:\j60osk9.cmd
D:\uvsqfgwd.cmd
D:\gy.exe
D:\2aaxaiy.exe
:commands
[purity]
[emptytemp]
[reboot]
---> Colle (Ctrl+V) le texte précédemment copié dans le cadre Paste Instructions for Items to be Moved.
---> Clique maintenant sur le bouton MoveIt! puis ferme OTMoveIt3.
Si un fichier ou dossier ne peut pas être supprimé immédiatement, le logiciel te demandera de redémarrer.
Accepte en cliquant sur YES.
---> Poste le rapport situé dans ce dossier : C:\_OTMoveIt\MovedFiles\
Le nom du rapport correspond au moment de sa création : date_heure.log
========== PROCESSES ==========
Process explorer.exe killed successfully.
========== FILES ==========
D:\m0vnonh.bat moved successfully.
D:\1utbfd.bat moved successfully.
D:\qphdin.com moved successfully.
D:\a2h2.com moved successfully.
D:\ur0.com moved successfully.
D:\pook.com moved successfully.
D:\w98.com moved successfully.
D:\hl80c6b1.com moved successfully.
D:\j60osk9.cmd moved successfully.
D:\uvsqfgwd.cmd moved successfully.
D:\gy.exe moved successfully.
D:\2aaxaiy.exe moved successfully.
========== COMMANDS ==========
User's Temp folder emptied.
User's Temporary Internet Files folder emptied.
User's Internet Explorer cache folder emptied.
Local Service Temp folder emptied.
File delete failed. C:\Documents and Settings\LocalService\Local Settings\Temporary Internet Files\Content.IE5\index.dat scheduled to be deleted on reboot.
Local Service Temporary Internet Files folder emptied.
Windows Temp folder emptied.
Temp folders emptied.
OTMoveIt3 by OldTimer - Version 1.0.8.0 log created on 02202009_105221
Files moved on Reboot...
File move failed. C:\Documents and Settings\LocalService\Local Settings\Temporary Internet Files\Content.IE5\index.dat scheduled to be moved on reboot.
Process explorer.exe killed successfully.
========== FILES ==========
D:\m0vnonh.bat moved successfully.
D:\1utbfd.bat moved successfully.
D:\qphdin.com moved successfully.
D:\a2h2.com moved successfully.
D:\ur0.com moved successfully.
D:\pook.com moved successfully.
D:\w98.com moved successfully.
D:\hl80c6b1.com moved successfully.
D:\j60osk9.cmd moved successfully.
D:\uvsqfgwd.cmd moved successfully.
D:\gy.exe moved successfully.
D:\2aaxaiy.exe moved successfully.
========== COMMANDS ==========
User's Temp folder emptied.
User's Temporary Internet Files folder emptied.
User's Internet Explorer cache folder emptied.
Local Service Temp folder emptied.
File delete failed. C:\Documents and Settings\LocalService\Local Settings\Temporary Internet Files\Content.IE5\index.dat scheduled to be deleted on reboot.
Local Service Temporary Internet Files folder emptied.
Windows Temp folder emptied.
Temp folders emptied.
OTMoveIt3 by OldTimer - Version 1.0.8.0 log created on 02202009_105221
Files moved on Reboot...
File move failed. C:\Documents and Settings\LocalService\Local Settings\Temporary Internet Files\Content.IE5\index.dat scheduled to be moved on reboot.