Tout plein de virus!!
Résolu
Bones
-
Utilisateur anonyme -
Utilisateur anonyme -
Bonjour,
J'ai plein de virus sur mon PC, et j'aimerais savoir comment m'en débarasser. Je n'ai plus accès au Gestionnaire des tâches et j'ai essayé par tous les moyens de l'ouvrir (Ctrl+Alt+suppr, avec la barre des tâches, avec l'application "Exécuter"...) et aucun des antivirus que je télécharge ne fonctionne. J'ai essayé un scan en ligne avec Spybot Search & Destroy qui ne marche pas non plus. Mon ancien Antivirus refuse de s'ouvrir et même si je fais tout ça en mode sans échec, rien ne marche. De plus, je reçoit des avertissements d'un Antivirus que je n'ai jamais télécharger. J'ai essayé de le supprimer de mon ordinateur, sans succès, et je me doute bien que la source du virus est là.
Il ne me reste donc, j'espère, qu'un tout dernier espoir, avant de devoir réinstaller Windows au complet: le Registre.
Comme je n'ai aucune idée de la façon dont il fonctionne, je voudrais savoir s'il est possible de supprimer des fichiers dangereux à partir du Registre.
Si vous avez d'autres suggestions de solutions à mon problème, merci de les écrire.
J'ai plein de virus sur mon PC, et j'aimerais savoir comment m'en débarasser. Je n'ai plus accès au Gestionnaire des tâches et j'ai essayé par tous les moyens de l'ouvrir (Ctrl+Alt+suppr, avec la barre des tâches, avec l'application "Exécuter"...) et aucun des antivirus que je télécharge ne fonctionne. J'ai essayé un scan en ligne avec Spybot Search & Destroy qui ne marche pas non plus. Mon ancien Antivirus refuse de s'ouvrir et même si je fais tout ça en mode sans échec, rien ne marche. De plus, je reçoit des avertissements d'un Antivirus que je n'ai jamais télécharger. J'ai essayé de le supprimer de mon ordinateur, sans succès, et je me doute bien que la source du virus est là.
Il ne me reste donc, j'espère, qu'un tout dernier espoir, avant de devoir réinstaller Windows au complet: le Registre.
Comme je n'ai aucune idée de la façon dont il fonctionne, je voudrais savoir s'il est possible de supprimer des fichiers dangereux à partir du Registre.
Si vous avez d'autres suggestions de solutions à mon problème, merci de les écrire.
A voir également:
- Tout plein de virus!!
- Virus mcafee - Accueil - Piratage
- Virus facebook demande d'amis - Accueil - Facebook
- Undisclosed-recipients virus - Guide
- Panda anti virus gratuit - Télécharger - Antivirus & Antimalwares
- Impossible de terminer l'opération car le fichier contient un virus - Forum Virus
27 réponses
Bonjour
Tu as un rogue dans ton PC
Télécharge rkill depuis l'un des liens ci-dessous:
http://download.bleepingcomputer.com/grinler/rkill.pif
https://download.bleepingcomputer.com/grinler/rkill.scr
https://download.bleepingcomputer.com/grinler/rkill.com
https://download.bleepingcomputer.com/grinler/rkill.exe
Enregistre le fichier sur le Bureau.
Désactive le module résident de l'antivirus et celui de l'antispyware.
Faire un double clic sur le fichier rkill téléchargé pour lancer l'outil.
Pour Vista, faire un clic droit sur le fichier [b]rkill/b téléchargé puis choisir "Exécuter en tant qu'Administrateur" pour lancer l'outil.
Une fenêtre à fond noir va apparaître brièvement, puis disparaître.
Si rien ne se passe, ou si l'outil ne se lance pas, télécharger l'outil depuis un autre des quatre liens ci-dessus et faire une nouvelle tentative d'exécution
Télécharge malwarebytes' anti-malware
http://mbam.malwarebytes.org/program/mbam-setup.exe
Enregistre le sur le bureau
Double-clique sur l'icône Download_mbam-setup.exe pour lancer le processus d'installation
Si la pare-feu demande l'autorisation de se connecter pour malwarebytes, accepte
Il va se mettre à jour une fois faite
Va dans l'onglet recherche
Sélectionne exécuter un examen complet
Clique sur rechercher
Le scan démarre
A la fin de l'analyse, le message s'affiche: L'examen s'est terminé normalement.
Clique sur afficher les résultats pour afficher les objets trouvés
Clique sur OK pour pousuivre
Si des malwares ont été détectés, cliquer sur afficher les résultats
Sélectionne tout (ou laisser coché)
Clique sur supprimer la sélection
Malwarebytes va détruire les fichiers et les clés de registre et en mettre une
copie dans la quarantaine
Malewarebytes va ouvrir le bloc-note et y copier le rapport
Redémarre le PC
Une fois redémarré, double-clique sur Malewarebytes
Va dans l'onglet rapport/log
Clique dessus pour l'afficher une fois affiché, cliquer sur édition en haut du
bloc-note puis sur sélectionner tout
Revient sur édition, puis sur copier et revient sur le forum et dans ta réponse
Clic droit dans le cadre de la réponse et coller
Tu as un rogue dans ton PC
Télécharge rkill depuis l'un des liens ci-dessous:
http://download.bleepingcomputer.com/grinler/rkill.pif
https://download.bleepingcomputer.com/grinler/rkill.scr
https://download.bleepingcomputer.com/grinler/rkill.com
https://download.bleepingcomputer.com/grinler/rkill.exe
Enregistre le fichier sur le Bureau.
Désactive le module résident de l'antivirus et celui de l'antispyware.
Faire un double clic sur le fichier rkill téléchargé pour lancer l'outil.
Pour Vista, faire un clic droit sur le fichier [b]rkill/b téléchargé puis choisir "Exécuter en tant qu'Administrateur" pour lancer l'outil.
Une fenêtre à fond noir va apparaître brièvement, puis disparaître.
Si rien ne se passe, ou si l'outil ne se lance pas, télécharger l'outil depuis un autre des quatre liens ci-dessus et faire une nouvelle tentative d'exécution
Télécharge malwarebytes' anti-malware
http://mbam.malwarebytes.org/program/mbam-setup.exe
Enregistre le sur le bureau
Double-clique sur l'icône Download_mbam-setup.exe pour lancer le processus d'installation
Si la pare-feu demande l'autorisation de se connecter pour malwarebytes, accepte
Il va se mettre à jour une fois faite
Va dans l'onglet recherche
Sélectionne exécuter un examen complet
Clique sur rechercher
Le scan démarre
A la fin de l'analyse, le message s'affiche: L'examen s'est terminé normalement.
Clique sur afficher les résultats pour afficher les objets trouvés
Clique sur OK pour pousuivre
Si des malwares ont été détectés, cliquer sur afficher les résultats
Sélectionne tout (ou laisser coché)
Clique sur supprimer la sélection
Malwarebytes va détruire les fichiers et les clés de registre et en mettre une
copie dans la quarantaine
Malewarebytes va ouvrir le bloc-note et y copier le rapport
Redémarre le PC
Une fois redémarré, double-clique sur Malewarebytes
Va dans l'onglet rapport/log
Clique dessus pour l'afficher une fois affiché, cliquer sur édition en haut du
bloc-note puis sur sélectionner tout
Revient sur édition, puis sur copier et revient sur le forum et dans ta réponse
Clic droit dans le cadre de la réponse et coller
Bones
Le lien pour malwarebytes' anti-malware ne fonctionne pas.. Y a-t-il une autre manière d'y accéder? Puis quand je clique sur le fichier rkill, la fenêtre noire apparaît et disparaît, puis une page du bloc note s'ouvre. Es-ce normal?
Ne redémarre surtout pas ton PC
Avant de commencer, fait une sauvegarde de tous tes documents
Attention, cet outil n'est pas à utiliser à la légère, et doit
être recommandé que par une personne formée à cet outil
Imprime la procédure
Télécharge ComboFix renommé Bones de sUBs sur ton Bureau :
http://sd-1.archive-host.com/membres/up/203669918515832581/Bones.exe
tutoriel pour bien utiliser l'outil
http://www.bleepingcomputer.com/combofix/fr/comment-utiliser-combofix
/!\ Déconnecte-toi du net et DESACTIVE TOUTES LES DEFENSES, antivirus et antispyware y compris /!\
---> Double-clique sur Bones.exe
Un "pop-up" va apparaître qui dit que ComboFix est utilisé à vos risques et avec aucune garantie... Clique sur oui pour accepter
Surtout, accepte d'installer la console de récupération
---> Mets-le en langue française F
Tape sur la touche 1 (Yes) pour démarrer le scan.
Ne touche à rien(souris, clavier) tant que le scan n'est pas terminé, car tu risques de figer ton PC
En fin de scan, il est possible que ComboFix ait besoin de redémarrer le PC pour finaliser la désinfection, laisse-le faire.
Une fois le scan achevé, un rapport va s'afficher : Poste son contenu
/!\ Réactive la protection en temps réel de ton antivirus et de ton antispyware avant de te reconnecter à Internet. /!\
Note : Le rapport se trouve également là : C:\ComboFix.txt
Avant de commencer, fait une sauvegarde de tous tes documents
Attention, cet outil n'est pas à utiliser à la légère, et doit
être recommandé que par une personne formée à cet outil
Imprime la procédure
Télécharge ComboFix renommé Bones de sUBs sur ton Bureau :
http://sd-1.archive-host.com/membres/up/203669918515832581/Bones.exe
tutoriel pour bien utiliser l'outil
http://www.bleepingcomputer.com/combofix/fr/comment-utiliser-combofix
/!\ Déconnecte-toi du net et DESACTIVE TOUTES LES DEFENSES, antivirus et antispyware y compris /!\
---> Double-clique sur Bones.exe
Un "pop-up" va apparaître qui dit que ComboFix est utilisé à vos risques et avec aucune garantie... Clique sur oui pour accepter
Surtout, accepte d'installer la console de récupération
---> Mets-le en langue française F
Tape sur la touche 1 (Yes) pour démarrer le scan.
Ne touche à rien(souris, clavier) tant que le scan n'est pas terminé, car tu risques de figer ton PC
En fin de scan, il est possible que ComboFix ait besoin de redémarrer le PC pour finaliser la désinfection, laisse-le faire.
Une fois le scan achevé, un rapport va s'afficher : Poste son contenu
/!\ Réactive la protection en temps réel de ton antivirus et de ton antispyware avant de te reconnecter à Internet. /!\
Note : Le rapport se trouve également là : C:\ComboFix.txt
Malwarebytes' Anti-Malware 1.46
www.malwarebytes.org
Version de la base de données: 4052
Windows 5.1.2600 Service Pack 3
Internet Explorer 8.0.6001.18702
2010-08-12 09:53:56
mbam-log-2010-08-12 (09-53-56).txt
Type d'examen: Examen complet (A:\|C:\|D:\|)
Elément(s) analysé(s): 170502
Temps écoulé: 29 minute(s), 50 seconde(s)
Processus mémoire infecté(s): 0
Module(s) mémoire infecté(s): 0
Clé(s) du Registre infectée(s): 765
Valeur(s) du Registre infectée(s): 17
Elément(s) de données du Registre infecté(s): 9
Dossier(s) infecté(s): 1
Fichier(s) infecté(s): 3
Processus mémoire infecté(s):
(Aucun élément nuisible détecté)
Module(s) mémoire infecté(s):
(Aucun élément nuisible détecté)
www.malwarebytes.org
Version de la base de données: 4052
Windows 5.1.2600 Service Pack 3
Internet Explorer 8.0.6001.18702
2010-08-12 09:53:56
mbam-log-2010-08-12 (09-53-56).txt
Type d'examen: Examen complet (A:\|C:\|D:\|)
Elément(s) analysé(s): 170502
Temps écoulé: 29 minute(s), 50 seconde(s)
Processus mémoire infecté(s): 0
Module(s) mémoire infecté(s): 0
Clé(s) du Registre infectée(s): 765
Valeur(s) du Registre infectée(s): 17
Elément(s) de données du Registre infecté(s): 9
Dossier(s) infecté(s): 1
Fichier(s) infecté(s): 3
Processus mémoire infecté(s):
(Aucun élément nuisible détecté)
Module(s) mémoire infecté(s):
(Aucun élément nuisible détecté)
Clé(s) du Registre infectée(s):
HKEY_LOCAL_MACHINE\SOFTWARE\avsuite (Rogue.AntivirusSuite) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\Software\avsuite (Rogue.AntivirusSuite) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\avsoft (Trojan.Fraudpack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\brastk.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AgentSvr.exe (Trojan.Agent) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ccSvcHst.exe (Trojan.Agent) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\XML (Trojan.FakeAlert) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\init32.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ozn695m5.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\pctsAuxs.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\pctsGui.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\pctsSvc.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\pctsTray.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\pdfndr.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rwg (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rwg.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\smart.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\_avp32.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\_avpcc.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\_avpm.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\~1.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\~2.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\a.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\aavgapi.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\aawtray.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\about.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ackwin32.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ad-aware.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\adaware.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\advxdwin.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\adwareprj.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\agent.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\agentw.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\alertsvc.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\alevir.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\alogserv.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\aluschedulersvc.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\avsuite (Rogue.AntivirusSuite) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\Software\avsuite (Rogue.AntivirusSuite) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\avsoft (Trojan.Fraudpack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\brastk.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AgentSvr.exe (Trojan.Agent) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ccSvcHst.exe (Trojan.Agent) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\XML (Trojan.FakeAlert) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\init32.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ozn695m5.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\pctsAuxs.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\pctsGui.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\pctsSvc.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\pctsTray.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\pdfndr.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rwg (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rwg.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\smart.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\_avp32.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\_avpcc.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\_avpm.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\~1.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\~2.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\a.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\aavgapi.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\aawtray.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\about.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ackwin32.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ad-aware.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\adaware.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\advxdwin.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\adwareprj.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\agent.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\agentw.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\alertsvc.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\alevir.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\alogserv.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\aluschedulersvc.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\amon9x.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\anti-trojan.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\antivirus.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\antivirus_pro.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\antivirusplus (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\antivirusplus.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\antivirusxp (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\antivirusxp.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\antivirusxppro2009.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ants.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\apimonitor.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\aplica32.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\apvxdwin.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\arr.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ashavast.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ashbug.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ashchest.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ashcnsnt.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ashdisp.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ashlogv.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ashmaisv.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ashpopwz.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ashquick.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ashserv.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ashsimp2.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ashsimpl.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ashskpcc.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ashskpck.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ashupd.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ashwebsv.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\aswchlic.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\aswregsvr.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\aswrundll.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\aswupdsv.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\atcon.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\atguard.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\atro55en.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\atupdater.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\atwatch.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\au.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\aupdate.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\auto-protect.nav80try.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\anti-trojan.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\antivirus.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\antivirus_pro.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\antivirusplus (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\antivirusplus.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\antivirusxp (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\antivirusxp.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\antivirusxppro2009.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ants.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\apimonitor.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\aplica32.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\apvxdwin.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\arr.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ashavast.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ashbug.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ashchest.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ashcnsnt.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ashdisp.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ashlogv.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ashmaisv.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ashpopwz.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ashquick.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ashserv.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ashsimp2.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ashsimpl.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ashskpcc.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ashskpck.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ashupd.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ashwebsv.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\aswchlic.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\aswregsvr.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\aswrundll.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\aswupdsv.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\atcon.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\atguard.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\atro55en.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\atupdater.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\atwatch.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\au.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\aupdate.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\auto-protect.nav80try.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\auto-protect.nav80try.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\autodown.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\autotrace.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\autoupdate.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\av360.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avadmin.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avcare.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avcenter.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avciman.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avconfig.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avconsol.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ave32.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avengine.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avgcc32.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avgchk.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avgcmgr.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avgcsrvx.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avgctrl.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avgdumpx.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avgemc.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avgiproxy.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avgnsx.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avgnt.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avgrsx.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avgscanx.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avgserv.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avgserv9.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avgsrmax.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avgtray.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avgui.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avgupd.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avgw.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avgwdsvc.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avkpop.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avkserv.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avkservice.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avkwctl9.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avltmain.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avmailc.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avmcdlg.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avnotify.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avnt.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avp32.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avpcc.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avpdos32.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avpm.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avptc32.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avpupd.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avsched32.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avsynmgr.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avupgsvc.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avwebgrd.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avwin.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avwin95.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avwinnt.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avwsc.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avwupd.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avwupd32.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avwupsrv.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avxmonitor9x.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\autodown.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\autotrace.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\autoupdate.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\av360.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avadmin.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avcare.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avcenter.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avciman.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avconfig.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avconsol.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ave32.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avengine.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avgcc32.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avgchk.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avgcmgr.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avgcsrvx.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avgctrl.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avgdumpx.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avgemc.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avgiproxy.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avgnsx.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avgnt.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avgrsx.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avgscanx.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avgserv.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avgserv9.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avgsrmax.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avgtray.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avgui.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avgupd.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avgw.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avgwdsvc.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avkpop.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avkserv.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avkservice.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avkwctl9.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avltmain.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avmailc.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avmcdlg.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avnotify.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avnt.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avp32.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avpcc.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avpdos32.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avpm.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avptc32.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avpupd.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avsched32.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avsynmgr.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avupgsvc.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avwebgrd.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avwin.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avwin95.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avwinnt.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avwsc.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avwupd.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avwupd32.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avwupsrv.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avxmonitor9x.exe (Security.Hijack) -> Quarantined and deleted successfully.
Vous n’avez pas trouvé la réponse que vous recherchez ?
Posez votre question
Tu avais fait le plein de nuisibles, en plus un détournement DNS
Tu vas plutôt me faire ceci
* Télécharge ZHPDiag (de Nicolas Coolman)
https://www.zebulon.fr/telechargements/securite/systeme/zhpdiag.html
* Laisse toi guider lors de l'installation, il se lancera automatiquement à la fin.
* Clique sur l'icône représentant une loupe (« Lancer le diagnostic »)
* Enregistre le rapport sur ton Bureau à l'aide de l'icône représentant une disquette
Héberge le rapport ICI
Tu vas plutôt me faire ceci
* Télécharge ZHPDiag (de Nicolas Coolman)
https://www.zebulon.fr/telechargements/securite/systeme/zhpdiag.html
* Laisse toi guider lors de l'installation, il se lancera automatiquement à la fin.
* Clique sur l'icône représentant une loupe (« Lancer le diagnostic »)
* Enregistre le rapport sur ton Bureau à l'aide de l'icône représentant une disquette
Héberge le rapport ICI
On va faire le nettoyage en 2 étapes
Copie les lignes suivantes en gras ci dessous, c'est à dire
que tu sélectionnes les lignes indiquées en gras avec ta souris, tu fait
clic droit dessus>copier
O4 - HKCU\..\Run: [WindowsSysControl] C:\Documents and Settings\Stephanie\Application Data\winscdrn.exe (.not file.)
O4 - HKCU\..\Run: [EBUNWVLUMV] C:\DOCUME~1\STEPHA~1\LOCALS~1\Temp\Hvh.exe (.not file.)
O4 - HKCU\..\Run: [Security Master AV] . (.Pas de propriétaire - Pas de description.) -- C:\Documents and Settings\All Users\Application Data\12ba556\SM12ba_302.exe
O4 - HKUS\S-1-5-21-1085031214-1547161642-682003330-1004\..\Run: [WindowsSysControl] C:\Documents and Settings\Stephanie\Application Data\winscdrn.exe (.not file.)
O4 - HKUS\S-1-5-21-1085031214-1547161642-682003330-1004\..\Run: [Security Master AV] . (.Pas de propriétaire - Pas de description.) -- C:\Documents and Settings\All Users\Application Data\12ba556\SM12ba_302.exe
O39 - APT:Automatic Planified Task - C:\WINDOWS\Tasks\{8C3FDD81-7AE0-4605-A46A-2488B179F2A3}.job
[HKCU\Software\EBUNWVLUMV]
[HKCU\Software\V71IQL7HI7]
O47 - AAKE:Key Export SP - "C:\Documents and Settings\Stephanie\Application Data\winscdrn.exe" [Enabled] .(.Pas de propriétaire - Pas de description.) (.not file.) -- C:\Documents and Settings\Stephanie\Application Data\winscdrn.exe
O47 - AAKE:Key Export SP - "C:\Documents and Settings\All Users\Application Data\12ba556\SM12ba_302.exe" [Enabled] .(.Pas de propriétaire - .) (.not file.) -- C:\Documents and Settings\All Users\Application Data\12ba556\SM12ba_302.exe
HOSTFix
* Lance ZHPFix, soit à partir d'un raccourci sur le bureau, soit à partir de
ZHPDiag (avec Vista/Seven, clic droit dessus, et sur exécuter en
tant qu'administrateur)
* Clique sur l'icône représentant la lettre H, cela collera les lignes que tu
as mis en mémoire
* Clique sur OK, sur Tous, puis sur Nettoyer
* Copie/colle la totalité du rapport dans ta prochaine réponse
Copie les lignes suivantes en gras ci dessous, c'est à dire
que tu sélectionnes les lignes indiquées en gras avec ta souris, tu fait
clic droit dessus>copier
O4 - HKCU\..\Run: [WindowsSysControl] C:\Documents and Settings\Stephanie\Application Data\winscdrn.exe (.not file.)
O4 - HKCU\..\Run: [EBUNWVLUMV] C:\DOCUME~1\STEPHA~1\LOCALS~1\Temp\Hvh.exe (.not file.)
O4 - HKCU\..\Run: [Security Master AV] . (.Pas de propriétaire - Pas de description.) -- C:\Documents and Settings\All Users\Application Data\12ba556\SM12ba_302.exe
O4 - HKUS\S-1-5-21-1085031214-1547161642-682003330-1004\..\Run: [WindowsSysControl] C:\Documents and Settings\Stephanie\Application Data\winscdrn.exe (.not file.)
O4 - HKUS\S-1-5-21-1085031214-1547161642-682003330-1004\..\Run: [Security Master AV] . (.Pas de propriétaire - Pas de description.) -- C:\Documents and Settings\All Users\Application Data\12ba556\SM12ba_302.exe
O39 - APT:Automatic Planified Task - C:\WINDOWS\Tasks\{8C3FDD81-7AE0-4605-A46A-2488B179F2A3}.job
[HKCU\Software\EBUNWVLUMV]
[HKCU\Software\V71IQL7HI7]
O47 - AAKE:Key Export SP - "C:\Documents and Settings\Stephanie\Application Data\winscdrn.exe" [Enabled] .(.Pas de propriétaire - Pas de description.) (.not file.) -- C:\Documents and Settings\Stephanie\Application Data\winscdrn.exe
O47 - AAKE:Key Export SP - "C:\Documents and Settings\All Users\Application Data\12ba556\SM12ba_302.exe" [Enabled] .(.Pas de propriétaire - .) (.not file.) -- C:\Documents and Settings\All Users\Application Data\12ba556\SM12ba_302.exe
HOSTFix
* Lance ZHPFix, soit à partir d'un raccourci sur le bureau, soit à partir de
ZHPDiag (avec Vista/Seven, clic droit dessus, et sur exécuter en
tant qu'administrateur)
* Clique sur l'icône représentant la lettre H, cela collera les lignes que tu
as mis en mémoire
* Clique sur OK, sur Tous, puis sur Nettoyer
* Copie/colle la totalité du rapport dans ta prochaine réponse
Je crois que j'ai trouvé une solution.. Dis moi si c'est correct:
Rapport de ZHPFix v1.12.3134 par Nicolas Coolman, Update du 12/08/2010
Fichier d'export Registre : C:\ZHPExportRegistry-2010-08-12-12-09-29.txt
Run by Stephanie at 2010-08-12 12:09:29
Web site : http://www.premiumorange.com/zeb-help-process/zhpfix.html
Contact : nicolascoolman@yahoo.fr
========== Clé(s) du Registre ==========
HKCU\Software\EBUNWVLUMV => Clé absente
HKCU\Software\V71IQL7HI7 => Clé absente
========== Valeur(s) du Registre ==========
O4 - HKCU\..\Run: [WindowsSysControl] C:\Documents and Settings\Stephanie\Application Data\winscdrn.exe (.not file.) => Valeur absente
O4 - HKCU\..\Run: [EBUNWVLUMV] C:\DOCUME~1\STEPHA~1\LOCALS~1\Temp\Hvh.exe (.not file.) => Valeur absente
O4 - HKCU\..\Run: [Security Master AV] . (.Pas de propriétaire - Pas de description.) -- C:\Documents and Settings\All Users\Application Data\12ba556\SM12ba_302.exe => Valeur absente
O4 - HKUS\S-1-5-21-1085031214-1547161642-682003330-1004\..\Run: [WindowsSysControl] C:\Documents and Settings\Stephanie\Application Data\winscdrn.exe (.not file.) => Valeur absente
O4 - HKUS\S-1-5-21-1085031214-1547161642-682003330-1004\..\Run: [Security Master AV] . (.Pas de propriétaire - Pas de description.) -- C:\Documents and Settings\All Users\Application Data\12ba556\SM12ba_302.exe => Valeur absente
O47 - AAKE:Key Export SP - "C:\Documents and Settings\Stephanie\Application Data\winscdrn.exe" [Enabled] .(.Pas de propriétaire - Pas de description.) (.not file.) -- C:\Documents and Settings\Stephanie\Application Data\winscdrn.exe => Valeur absente
O47 - AAKE:Key Export SP - "C:\Documents and Settings\All Users\Application Data\12ba556\SM12ba_302.exe" [Enabled] .(.Pas de propriétaire - .) (.not file.) -- C:\Documents and Settings\All Users\Application Data\12ba556\SM12ba_302.exe => Valeur absente
========== Fichier(s) ==========
c:\windows\tasks\{8c3fdd81-7ae0-4605-a46a-2488b179f2a3}.job => Fichier absent
========== Récapitulatif ==========
2 : Clé(s) du Registre
7 : Valeur(s) du Registre
1 : Fichier(s)
End of the scan
Rapport de ZHPFix v1.12.3134 par Nicolas Coolman, Update du 12/08/2010
Fichier d'export Registre : C:\ZHPExportRegistry-2010-08-12-12-09-29.txt
Run by Stephanie at 2010-08-12 12:09:29
Web site : http://www.premiumorange.com/zeb-help-process/zhpfix.html
Contact : nicolascoolman@yahoo.fr
========== Clé(s) du Registre ==========
HKCU\Software\EBUNWVLUMV => Clé absente
HKCU\Software\V71IQL7HI7 => Clé absente
========== Valeur(s) du Registre ==========
O4 - HKCU\..\Run: [WindowsSysControl] C:\Documents and Settings\Stephanie\Application Data\winscdrn.exe (.not file.) => Valeur absente
O4 - HKCU\..\Run: [EBUNWVLUMV] C:\DOCUME~1\STEPHA~1\LOCALS~1\Temp\Hvh.exe (.not file.) => Valeur absente
O4 - HKCU\..\Run: [Security Master AV] . (.Pas de propriétaire - Pas de description.) -- C:\Documents and Settings\All Users\Application Data\12ba556\SM12ba_302.exe => Valeur absente
O4 - HKUS\S-1-5-21-1085031214-1547161642-682003330-1004\..\Run: [WindowsSysControl] C:\Documents and Settings\Stephanie\Application Data\winscdrn.exe (.not file.) => Valeur absente
O4 - HKUS\S-1-5-21-1085031214-1547161642-682003330-1004\..\Run: [Security Master AV] . (.Pas de propriétaire - Pas de description.) -- C:\Documents and Settings\All Users\Application Data\12ba556\SM12ba_302.exe => Valeur absente
O47 - AAKE:Key Export SP - "C:\Documents and Settings\Stephanie\Application Data\winscdrn.exe" [Enabled] .(.Pas de propriétaire - Pas de description.) (.not file.) -- C:\Documents and Settings\Stephanie\Application Data\winscdrn.exe => Valeur absente
O47 - AAKE:Key Export SP - "C:\Documents and Settings\All Users\Application Data\12ba556\SM12ba_302.exe" [Enabled] .(.Pas de propriétaire - .) (.not file.) -- C:\Documents and Settings\All Users\Application Data\12ba556\SM12ba_302.exe => Valeur absente
========== Fichier(s) ==========
c:\windows\tasks\{8c3fdd81-7ae0-4605-a46a-2488b179f2a3}.job => Fichier absent
========== Récapitulatif ==========
2 : Clé(s) du Registre
7 : Valeur(s) du Registre
1 : Fichier(s)
End of the scan
Copie les lignes suivantes en gras ci dessous, c'est à dire
que tu sélectionnes les lignes indiquées en gras avec ta souris, tu fait
clic droit dessus>copier
O50 - IFEO:Image File Execution Options - a.exe - svchost.exe
O50 - IFEO:Image File Execution Options - aAvgApi.exe - svchost.exe
O50 - IFEO:Image File Execution Options - AAWTray.exe - svchost.exe
O50 - IFEO:Image File Execution Options - About.exe - svchost.exe
O50 - IFEO:Image File Execution Options - ackwin32.exe - svchost.exe
O50 - IFEO:Image File Execution Options - Ad-Aware.exe - svchost.exe
O50 - IFEO:Image File Execution Options - adaware.exe - svchost.exe
O50 - IFEO:Image File Execution Options - advxdwin.exe - svchost.exe
O50 - IFEO:Image File Execution Options - AdwarePrj.exe - svchost.exe
O50 - IFEO:Image File Execution Options - agent.exe - svchost.exe
O50 - IFEO:Image File Execution Options - agentsvr.exe - svchost.exe
O50 - IFEO:Image File Execution Options - agentw.exe - svchost.exe
O50 - IFEO:Image File Execution Options - alertsvc.exe - svchost.exe
O50 - IFEO:Image File Execution Options - alevir.exe - svchost.exe
O50 - IFEO:Image File Execution Options - alogserv.exe - svchost.exe
O50 - IFEO:Image File Execution Options - AlphaAV - svchost.exe
O50 - IFEO:Image File Execution Options - AlphaAV.exe - svchost.exe
O50 - IFEO:Image File Execution Options - AluSchedulerSvc.exe - svchost.exe
O50 - IFEO:Image File Execution Options - amon9x.exe - svchost.exe
O50 - IFEO:Image File Execution Options - anti-trojan.exe - svchost.exe
O50 - IFEO:Image File Execution Options - Anti-Virus Professional.exe - svchost.exe
O50 - IFEO:Image File Execution Options - AntispywarXP2009.exe - svchost.exe
O50 - IFEO:Image File Execution Options - antivirus.exe - svchost.exe
O50 - IFEO:Image File Execution Options - AntivirusPlus - svchost.exe
O50 - IFEO:Image File Execution Options - AntivirusPlus.exe - svchost.exe
O50 - IFEO:Image File Execution Options - AntivirusPro_2010.exe - svchost.exe
O50 - IFEO:Image File Execution Options - AntivirusXP - svchost.exe
O50 - IFEO:Image File Execution Options - AntivirusXP.exe - svchost.exe
O50 - IFEO:Image File Execution Options - antivirusxppro2009.exe - svchost.exe
O50 - IFEO:Image File Execution Options - AntiVirus_Pro.exe - svchost.exe
O50 - IFEO:Image File Execution Options - ants.exe - svchost.exe
O50 - IFEO:Image File Execution Options - apimonitor.exe - svchost.exe
O50 - IFEO:Image File Execution Options - aplica32.exe - svchost.exe
O50 - IFEO:Image File Execution Options - apvxdwin.exe - svchost.exe
O50 - IFEO:Image File Execution Options - arr.exe - svchost.exe
O50 - IFEO:Image File Execution Options - Arrakis3.exe - svchost.exe
O50 - IFEO:Image File Execution Options - ashAvast.exe - svchost.exe
O50 - IFEO:Image File Execution Options - ashBug.exe - svchost.exe
O50 - IFEO:Image File Execution Options - ashChest.exe - svchost.exe
O50 - IFEO:Image File Execution Options - ashCnsnt.exe - svchost.exe
O50 - IFEO:Image File Execution Options - ashDisp.exe - svchost.exe
O50 - IFEO:Image File Execution Options - ashLogV.exe - svchost.exe
O50 - IFEO:Image File Execution Options - ashMaiSv.exe - svchost.exe
O50 - IFEO:Image File Execution Options - ashPopWz.exe - svchost.exe
O50 - IFEO:Image File Execution Options - ashQuick.exe - svchost.exe
O50 - IFEO:Image File Execution Options - ashServ.exe - svchost.exe
O50 - IFEO:Image File Execution Options - ashSimp2.exe - svchost.exe
O50 - IFEO:Image File Execution Options - ashSimpl.exe - svchost.exe
O50 - IFEO:Image File Execution Options - ashSkPcc.exe - svchost.exe
O50 - IFEO:Image File Execution Options - ashSkPck.exe - svchost.exe
O50 - IFEO:Image File Execution Options - ashUpd.exe - svchost.exe
O50 - IFEO:Image File Execution Options - ashWebSv.exe - svchost.exe
O50 - IFEO:Image File Execution Options - aswChLic.exe - svchost.exe
O50 - IFEO:Image File Execution Options - aswRegSvr.exe - svchost.exe
O50 - IFEO:Image File Execution Options - aswRunDll.exe - svchost.exe
O50 - IFEO:Image File Execution Options - aswUpdSv.exe - svchost.exe
O50 - IFEO:Image File Execution Options - atcon.exe - svchost.exe
O50 - IFEO:Image File Execution Options - atguard.exe - svchost.exe
O50 - IFEO:Image File Execution Options - atro55en.exe - svchost.exe
O50 - IFEO:Image File Execution Options - atupdater.exe - svchost.exe
O50 - IFEO:Image File Execution Options - atwatch.exe - svchost.exe
O50 - IFEO:Image File Execution Options - au.exe - svchost.exe
O50 - IFEO:Image File Execution Options - aupdate.exe - svchost.exe
O50 - IFEO:Image File Execution Options - auto-protect.nav80try.exe - svchost.exe
O50 - IFEO:Image File Execution Options - autodown.exe - svchost.exe
O50 - IFEO:Image File Execution Options - autotrace.exe - svchost.exe
O50 - IFEO:Image File Execution Options - autoupdate.exe - svchost.exe
O50 - IFEO:Image File Execution Options - av360.exe - svchost.exe
O50 - IFEO:Image File Execution Options - avadmin.exe - svchost.exe
O50 - IFEO:Image File Execution Options - AVCare.exe - svchost.exe
O50 - IFEO:Image File Execution Options - avcenter.exe - svchost.exe
O50 - IFEO:Image File Execution Options - avciman.exe - svchost.exe
O50 - IFEO:Image File Execution Options - avconfig.exe - svchost.exe
O50 - IFEO:Image File Execution Options - avconsol.exe - svchost.exe
O50 - IFEO:Image File Execution Options - ave32.exe - svchost.exe
O50 - IFEO:Image File Execution Options - AVENGINE.EXE - svchost.exe
O50 - IFEO:Image File Execution Options - avgcc32.exe - svchost.exe
O50 - IFEO:Image File Execution Options - avgchk.exe - svchost.exe
O50 - IFEO:Image File Execution Options - avgcmgr.exe - svchost.exe
O50 - IFEO:Image File Execution Options - avgcsrvx.exe - svchost.exe
O50 - IFEO:Image File Execution Options - avgctrl.exe - svchost.exe
O50 - IFEO:Image File Execution Options - avgdumpx.exe - svchost.exe
O50 - IFEO:Image File Execution Options - avgemc.exe - svchost.exe
O50 - IFEO:Image File Execution Options - avgiproxy.exe - svchost.exe
O50 - IFEO:Image File Execution Options - avgnsx.exe - svchost.exe
O50 - IFEO:Image File Execution Options - avgnt.exe - svchost.exe
O50 - IFEO:Image File Execution Options - avgrsx.exe - svchost.exe
O50 - IFEO:Image File Execution Options - avgscanx.exe - svchost.exe
O50 - IFEO:Image File Execution Options - avgserv.exe - svchost.exe
O50 - IFEO:Image File Execution Options - avgserv9.exe - svchost.exe
O50 - IFEO:Image File Execution Options - avgsrmax.exe - svchost.exe
O50 - IFEO:Image File Execution Options - avgtray.exe - svchost.exe
O50 - IFEO:Image File Execution Options - avgui.exe - svchost.exe
O50 - IFEO:Image File Execution Options - avgupd.exe - svchost.exe
O50 - IFEO:Image File Execution Options - avgw.exe - svchost.exe
O50 - IFEO:Image File Execution Options - avgwdsvc.exe - svchost.exe
O50 - IFEO:Image File Execution Options - avkpop.exe - svchost.exe
O50 - IFEO:Image File Execution Options - avkserv.exe - svchost.exe
O50 - IFEO:Image File Execution Options - avkservice.exe - svchost.exe
O50 - IFEO:Image File Execution Options - avkwctl9.exe - svchost.exe
O50 - IFEO:Image File Execution Options - avltmain.exe - svchost.exe
O50 - IFEO:Image File Execution Options - avmailc.exe - svchost.exe
O50 - IFEO:Image File Execution Options - avmcdlg.exe - svchost.exe
O50 - IFEO:Image File Execution Options - avnotify.exe - svchost.exe
O50 - IFEO:Image File Execution Options - avnt.exe - svchost.exe
O50 - IFEO:Image File Execution Options - avp32.exe - svchost.exe
O50 - IFEO:Image File Execution Options - avpcc.exe - svchost.exe
O50 - IFEO:Image File Execution Options - avpdos32.exe - svchost.exe
O50 - IFEO:Image File Execution Options - avpm.exe - svchost.exe
O50 - IFEO:Image File Execution Options - avptc32.exe - svchost.exe
O50 - IFEO:Image File Execution Options - avpupd.exe - svchost.exe
O50 - IFEO:Image File Execution Options - avsched32.exe - svchost.exe
O50 - IFEO:Image File Execution Options - avsynmgr.exe - svchost.exe
O50 - IFEO:Image File Execution Options - avupgsvc.exe - svchost.exe
O50 - IFEO:Image File Execution Options - AVWEBGRD.EXE - svchost.exe
O50 - IFEO:Image File Execution Options - avwin.exe - svchost.exe
O50 - IFEO:Image File Execution Options - avwin95.exe - svchost.exe
O50 - IFEO:Image File Execution Options - avwinnt.exe - svchost.exe
O50 - IFEO:Image File Execution Options - avwsc.exe - svchost.exe
O50 - IFEO:Image File Execution Options - avwupd.exe - svchost.exe
O50 - IFEO:Image File Execution Options - avwupd32.exe - svchost.exe
O50 - IFEO:Image File Execution Options - avwupsrv.exe - svchost.exe
O50 - IFEO:Image File Execution Options - avxmonitor9x.exe - svchost.exe
O50 - IFEO:Image File Execution Options - avxmonitornt.exe - svchost.exe
O50 - IFEO:Image File Execution Options - avxquar.exe - svchost.exe
O50 - IFEO:Image File Execution Options - b.exe - svchost.exe
O50 - IFEO:Image File Execution Options - backweb.exe - svchost.exe
O50 - IFEO:Image File Execution Options - bargains.exe - svchost.exe
O50 - IFEO:Image File Execution Options - bdagent.exe - svchost.exe
O50 - IFEO:Image File Execution Options - bdfvcl.exe - svchost.exe
O50 - IFEO:Image File Execution Options - bdfvwiz.exe - svchost.exe
O50 - IFEO:Image File Execution Options - BDInProcPatch.exe - svchost.exe
O50 - IFEO:Image File Execution Options - bdmcon.exe - svchost.exe
O50 - IFEO:Image File Execution Options - BDMsnScan.exe - svchost.exe
O50 - IFEO:Image File Execution Options - bdreinit.exe - svchost.exe
O50 - IFEO:Image File Execution Options - bdsubwiz.exe - svchost.exe
O50 - IFEO:Image File Execution Options - BDSurvey.exe - svchost.exe
O50 - IFEO:Image File Execution Options - bdtkexec.exe - svchost.exe
O50 - IFEO:Image File Execution Options - bdwizreg.exe - svchost.exe
O50 - IFEO:Image File Execution Options - bd_professional.exe - svchost.exe
O50 - IFEO:Image File Execution Options - beagle.exe - svchost.exe
O50 - IFEO:Image File Execution Options - belt.exe - svchost.exe
O50 - IFEO:Image File Execution Options - bidef.exe - svchost.exe
O50 - IFEO:Image File Execution Options - bidserver.exe - svchost.exe
O50 - IFEO:Image File Execution Options - bipcp.exe - svchost.exe
O50 - IFEO:Image File Execution Options - bipcpevalsetup.exe - svchost.exe
O50 - IFEO:Image File Execution Options - bisp.exe - svchost.exe
O50 - IFEO:Image File Execution Options - blackd.exe - svchost.exe
O50 - IFEO:Image File Execution Options - blackice.exe - svchost.exe
O50 - IFEO:Image File Execution Options - blink.exe - svchost.exe
O50 - IFEO:Image File Execution Options - blss.exe - svchost.exe
O50 - IFEO:Image File Execution Options - bootconf.exe - svchost.exe
O50 - IFEO:Image File Execution Options - bootwarn.exe - svchost.exe
O50 - IFEO:Image File Execution Options - borg2.exe - svchost.exe
O50 - IFEO:Image File Execution Options - bpc.exe - svchost.exe
O50 - IFEO:Image File Execution Options - brasil.exe - svchost.exe
O50 - IFEO:Image File Execution Options - brastk.exe - svchost.exe
O50 - IFEO:Image File Execution Options - brw.exe - svchost.exe
O50 - IFEO:Image File Execution Options - bs120.exe - svchost.exe
O50 - IFEO:Image File Execution Options - bspatch.exe - svchost.exe
O50 - IFEO:Image File Execution Options - bundle.exe - svchost.exe
O50 - IFEO:Image File Execution Options - bvt.exe - svchost.exe
O50 - IFEO:Image File Execution Options - c.exe - svchost.exe
O50 - IFEO:Image File Execution Options - cavscan.exe - svchost.exe
O50 - IFEO:Image File Execution Options - ccapp.exe - svchost.exe
O50 - IFEO:Image File Execution Options - ccevtmgr.exe - svchost.exe
O50 - IFEO:Image File Execution Options - ccpxysvc.exe - svchost.exe
O50 - IFEO:Image File Execution Options - ccSvcHst.exe - svchost.exe
O50 - IFEO:Image File Execution Options - cdp.exe - svchost.exe
O50 - IFEO:Image File Execution Options - cfd.exe - svchost.exe
O50 - IFEO:Image File Execution Options - cfgwiz.exe - svchost.exe
O50 - IFEO:Image File Execution Options - cfiadmin.exe - svchost.exe
O50 - IFEO:Image File Execution Options - cfiaudit.exe - svchost.exe
O50 - IFEO:Image File Execution Options - cfinet.exe - svchost.exe
O50 - IFEO:Image File Execution Options - cfinet32.exe - svchost.exe
O50 - IFEO:Image File Execution Options - cfp.exe - svchost.exe
O50 - IFEO:Image File Execution Options - cfpconfg.exe - svchost.exe
O50 - IFEO:Image File Execution Options - cfplogvw.exe - svchost.exe
O50 - IFEO:Image File Execution Options - cfpupdat.exe - svchost.exe
O50 - IFEO:Image File Execution Options - Cl.exe - svchost.exe
O50 - IFEO:Image File Execution Options - claw95.exe - svchost.exe
O50 - IFEO:Image File Execution Options - claw95cf.exe - svchost.exe
O50 - IFEO:Image File Execution Options - clean.exe - svchost.exe
O50 - IFEO:Image File Execution Options - cleaner.exe - svchost.exe
O50 - IFEO:Image File Execution Options - cleaner3.exe - svchost.exe
O50 - IFEO:Image File Execution Options - cleanIELow.exe - svchost.exe
O50 - IFEO:Image File Execution Options - cleanpc.exe - svchost.exe
O50 - IFEO:Image File Execution Options - click.exe - svchost.exe
O50 - IFEO:Image File Execution Options - cmd32.exe - svchost.exe
O50 - IFEO:Image File Execution Options - cmdagent.exe - svchost.exe
O50 - IFEO:Image File Execution Options - cmesys.exe - svchost.exe
O50 - IFEO:Image File Execution Options - cmgrdian.exe - svchost.exe
O50 - IFEO:Image File Execution Options - cmon016.exe - svchost.exe
O50 - IFEO:Image File Execution Options - connectionmonitor.exe - svchost.exe
O50 - IFEO:Image File Execution Options - control - svchost.exe
O50 - IFEO:Image File Execution Options - cpd.exe - svchost.exe
O50 - IFEO:Image File Execution Options - cpf9x206.exe - svchost.exe
O50 - IFEO:Image File Execution Options - cpfnt206.exe - svchost.exe
O50 - IFEO:Image File Execution Options - crashrep.exe - svchost.exe
O50 - IFEO:Image File Execution Options - csc.exe - svchost.exe
O50 - IFEO:Image File Execution Options - cssconfg.exe - svchost.exe
O50 - IFEO:Image File Execution Options - cssupdat.exe - svchost.exe
* Lance ZHPFix, soit à partir d'un raccourci sur le bureau, soit à partir de
ZHPDiag (avec Vista/Seven, clic droit dessus, et sur exécuter en
tant qu'administrateur)
* Clique sur l'icône représentant la lettre H, cela collera les lignes que tu
as mis en mémoire
* Clique sur OK, sur Tous, puis sur Nettoyer
* Copie/colle la totalité du rapport dans ta prochaine réponse
que tu sélectionnes les lignes indiquées en gras avec ta souris, tu fait
clic droit dessus>copier
O50 - IFEO:Image File Execution Options - a.exe - svchost.exe
O50 - IFEO:Image File Execution Options - aAvgApi.exe - svchost.exe
O50 - IFEO:Image File Execution Options - AAWTray.exe - svchost.exe
O50 - IFEO:Image File Execution Options - About.exe - svchost.exe
O50 - IFEO:Image File Execution Options - ackwin32.exe - svchost.exe
O50 - IFEO:Image File Execution Options - Ad-Aware.exe - svchost.exe
O50 - IFEO:Image File Execution Options - adaware.exe - svchost.exe
O50 - IFEO:Image File Execution Options - advxdwin.exe - svchost.exe
O50 - IFEO:Image File Execution Options - AdwarePrj.exe - svchost.exe
O50 - IFEO:Image File Execution Options - agent.exe - svchost.exe
O50 - IFEO:Image File Execution Options - agentsvr.exe - svchost.exe
O50 - IFEO:Image File Execution Options - agentw.exe - svchost.exe
O50 - IFEO:Image File Execution Options - alertsvc.exe - svchost.exe
O50 - IFEO:Image File Execution Options - alevir.exe - svchost.exe
O50 - IFEO:Image File Execution Options - alogserv.exe - svchost.exe
O50 - IFEO:Image File Execution Options - AlphaAV - svchost.exe
O50 - IFEO:Image File Execution Options - AlphaAV.exe - svchost.exe
O50 - IFEO:Image File Execution Options - AluSchedulerSvc.exe - svchost.exe
O50 - IFEO:Image File Execution Options - amon9x.exe - svchost.exe
O50 - IFEO:Image File Execution Options - anti-trojan.exe - svchost.exe
O50 - IFEO:Image File Execution Options - Anti-Virus Professional.exe - svchost.exe
O50 - IFEO:Image File Execution Options - AntispywarXP2009.exe - svchost.exe
O50 - IFEO:Image File Execution Options - antivirus.exe - svchost.exe
O50 - IFEO:Image File Execution Options - AntivirusPlus - svchost.exe
O50 - IFEO:Image File Execution Options - AntivirusPlus.exe - svchost.exe
O50 - IFEO:Image File Execution Options - AntivirusPro_2010.exe - svchost.exe
O50 - IFEO:Image File Execution Options - AntivirusXP - svchost.exe
O50 - IFEO:Image File Execution Options - AntivirusXP.exe - svchost.exe
O50 - IFEO:Image File Execution Options - antivirusxppro2009.exe - svchost.exe
O50 - IFEO:Image File Execution Options - AntiVirus_Pro.exe - svchost.exe
O50 - IFEO:Image File Execution Options - ants.exe - svchost.exe
O50 - IFEO:Image File Execution Options - apimonitor.exe - svchost.exe
O50 - IFEO:Image File Execution Options - aplica32.exe - svchost.exe
O50 - IFEO:Image File Execution Options - apvxdwin.exe - svchost.exe
O50 - IFEO:Image File Execution Options - arr.exe - svchost.exe
O50 - IFEO:Image File Execution Options - Arrakis3.exe - svchost.exe
O50 - IFEO:Image File Execution Options - ashAvast.exe - svchost.exe
O50 - IFEO:Image File Execution Options - ashBug.exe - svchost.exe
O50 - IFEO:Image File Execution Options - ashChest.exe - svchost.exe
O50 - IFEO:Image File Execution Options - ashCnsnt.exe - svchost.exe
O50 - IFEO:Image File Execution Options - ashDisp.exe - svchost.exe
O50 - IFEO:Image File Execution Options - ashLogV.exe - svchost.exe
O50 - IFEO:Image File Execution Options - ashMaiSv.exe - svchost.exe
O50 - IFEO:Image File Execution Options - ashPopWz.exe - svchost.exe
O50 - IFEO:Image File Execution Options - ashQuick.exe - svchost.exe
O50 - IFEO:Image File Execution Options - ashServ.exe - svchost.exe
O50 - IFEO:Image File Execution Options - ashSimp2.exe - svchost.exe
O50 - IFEO:Image File Execution Options - ashSimpl.exe - svchost.exe
O50 - IFEO:Image File Execution Options - ashSkPcc.exe - svchost.exe
O50 - IFEO:Image File Execution Options - ashSkPck.exe - svchost.exe
O50 - IFEO:Image File Execution Options - ashUpd.exe - svchost.exe
O50 - IFEO:Image File Execution Options - ashWebSv.exe - svchost.exe
O50 - IFEO:Image File Execution Options - aswChLic.exe - svchost.exe
O50 - IFEO:Image File Execution Options - aswRegSvr.exe - svchost.exe
O50 - IFEO:Image File Execution Options - aswRunDll.exe - svchost.exe
O50 - IFEO:Image File Execution Options - aswUpdSv.exe - svchost.exe
O50 - IFEO:Image File Execution Options - atcon.exe - svchost.exe
O50 - IFEO:Image File Execution Options - atguard.exe - svchost.exe
O50 - IFEO:Image File Execution Options - atro55en.exe - svchost.exe
O50 - IFEO:Image File Execution Options - atupdater.exe - svchost.exe
O50 - IFEO:Image File Execution Options - atwatch.exe - svchost.exe
O50 - IFEO:Image File Execution Options - au.exe - svchost.exe
O50 - IFEO:Image File Execution Options - aupdate.exe - svchost.exe
O50 - IFEO:Image File Execution Options - auto-protect.nav80try.exe - svchost.exe
O50 - IFEO:Image File Execution Options - autodown.exe - svchost.exe
O50 - IFEO:Image File Execution Options - autotrace.exe - svchost.exe
O50 - IFEO:Image File Execution Options - autoupdate.exe - svchost.exe
O50 - IFEO:Image File Execution Options - av360.exe - svchost.exe
O50 - IFEO:Image File Execution Options - avadmin.exe - svchost.exe
O50 - IFEO:Image File Execution Options - AVCare.exe - svchost.exe
O50 - IFEO:Image File Execution Options - avcenter.exe - svchost.exe
O50 - IFEO:Image File Execution Options - avciman.exe - svchost.exe
O50 - IFEO:Image File Execution Options - avconfig.exe - svchost.exe
O50 - IFEO:Image File Execution Options - avconsol.exe - svchost.exe
O50 - IFEO:Image File Execution Options - ave32.exe - svchost.exe
O50 - IFEO:Image File Execution Options - AVENGINE.EXE - svchost.exe
O50 - IFEO:Image File Execution Options - avgcc32.exe - svchost.exe
O50 - IFEO:Image File Execution Options - avgchk.exe - svchost.exe
O50 - IFEO:Image File Execution Options - avgcmgr.exe - svchost.exe
O50 - IFEO:Image File Execution Options - avgcsrvx.exe - svchost.exe
O50 - IFEO:Image File Execution Options - avgctrl.exe - svchost.exe
O50 - IFEO:Image File Execution Options - avgdumpx.exe - svchost.exe
O50 - IFEO:Image File Execution Options - avgemc.exe - svchost.exe
O50 - IFEO:Image File Execution Options - avgiproxy.exe - svchost.exe
O50 - IFEO:Image File Execution Options - avgnsx.exe - svchost.exe
O50 - IFEO:Image File Execution Options - avgnt.exe - svchost.exe
O50 - IFEO:Image File Execution Options - avgrsx.exe - svchost.exe
O50 - IFEO:Image File Execution Options - avgscanx.exe - svchost.exe
O50 - IFEO:Image File Execution Options - avgserv.exe - svchost.exe
O50 - IFEO:Image File Execution Options - avgserv9.exe - svchost.exe
O50 - IFEO:Image File Execution Options - avgsrmax.exe - svchost.exe
O50 - IFEO:Image File Execution Options - avgtray.exe - svchost.exe
O50 - IFEO:Image File Execution Options - avgui.exe - svchost.exe
O50 - IFEO:Image File Execution Options - avgupd.exe - svchost.exe
O50 - IFEO:Image File Execution Options - avgw.exe - svchost.exe
O50 - IFEO:Image File Execution Options - avgwdsvc.exe - svchost.exe
O50 - IFEO:Image File Execution Options - avkpop.exe - svchost.exe
O50 - IFEO:Image File Execution Options - avkserv.exe - svchost.exe
O50 - IFEO:Image File Execution Options - avkservice.exe - svchost.exe
O50 - IFEO:Image File Execution Options - avkwctl9.exe - svchost.exe
O50 - IFEO:Image File Execution Options - avltmain.exe - svchost.exe
O50 - IFEO:Image File Execution Options - avmailc.exe - svchost.exe
O50 - IFEO:Image File Execution Options - avmcdlg.exe - svchost.exe
O50 - IFEO:Image File Execution Options - avnotify.exe - svchost.exe
O50 - IFEO:Image File Execution Options - avnt.exe - svchost.exe
O50 - IFEO:Image File Execution Options - avp32.exe - svchost.exe
O50 - IFEO:Image File Execution Options - avpcc.exe - svchost.exe
O50 - IFEO:Image File Execution Options - avpdos32.exe - svchost.exe
O50 - IFEO:Image File Execution Options - avpm.exe - svchost.exe
O50 - IFEO:Image File Execution Options - avptc32.exe - svchost.exe
O50 - IFEO:Image File Execution Options - avpupd.exe - svchost.exe
O50 - IFEO:Image File Execution Options - avsched32.exe - svchost.exe
O50 - IFEO:Image File Execution Options - avsynmgr.exe - svchost.exe
O50 - IFEO:Image File Execution Options - avupgsvc.exe - svchost.exe
O50 - IFEO:Image File Execution Options - AVWEBGRD.EXE - svchost.exe
O50 - IFEO:Image File Execution Options - avwin.exe - svchost.exe
O50 - IFEO:Image File Execution Options - avwin95.exe - svchost.exe
O50 - IFEO:Image File Execution Options - avwinnt.exe - svchost.exe
O50 - IFEO:Image File Execution Options - avwsc.exe - svchost.exe
O50 - IFEO:Image File Execution Options - avwupd.exe - svchost.exe
O50 - IFEO:Image File Execution Options - avwupd32.exe - svchost.exe
O50 - IFEO:Image File Execution Options - avwupsrv.exe - svchost.exe
O50 - IFEO:Image File Execution Options - avxmonitor9x.exe - svchost.exe
O50 - IFEO:Image File Execution Options - avxmonitornt.exe - svchost.exe
O50 - IFEO:Image File Execution Options - avxquar.exe - svchost.exe
O50 - IFEO:Image File Execution Options - b.exe - svchost.exe
O50 - IFEO:Image File Execution Options - backweb.exe - svchost.exe
O50 - IFEO:Image File Execution Options - bargains.exe - svchost.exe
O50 - IFEO:Image File Execution Options - bdagent.exe - svchost.exe
O50 - IFEO:Image File Execution Options - bdfvcl.exe - svchost.exe
O50 - IFEO:Image File Execution Options - bdfvwiz.exe - svchost.exe
O50 - IFEO:Image File Execution Options - BDInProcPatch.exe - svchost.exe
O50 - IFEO:Image File Execution Options - bdmcon.exe - svchost.exe
O50 - IFEO:Image File Execution Options - BDMsnScan.exe - svchost.exe
O50 - IFEO:Image File Execution Options - bdreinit.exe - svchost.exe
O50 - IFEO:Image File Execution Options - bdsubwiz.exe - svchost.exe
O50 - IFEO:Image File Execution Options - BDSurvey.exe - svchost.exe
O50 - IFEO:Image File Execution Options - bdtkexec.exe - svchost.exe
O50 - IFEO:Image File Execution Options - bdwizreg.exe - svchost.exe
O50 - IFEO:Image File Execution Options - bd_professional.exe - svchost.exe
O50 - IFEO:Image File Execution Options - beagle.exe - svchost.exe
O50 - IFEO:Image File Execution Options - belt.exe - svchost.exe
O50 - IFEO:Image File Execution Options - bidef.exe - svchost.exe
O50 - IFEO:Image File Execution Options - bidserver.exe - svchost.exe
O50 - IFEO:Image File Execution Options - bipcp.exe - svchost.exe
O50 - IFEO:Image File Execution Options - bipcpevalsetup.exe - svchost.exe
O50 - IFEO:Image File Execution Options - bisp.exe - svchost.exe
O50 - IFEO:Image File Execution Options - blackd.exe - svchost.exe
O50 - IFEO:Image File Execution Options - blackice.exe - svchost.exe
O50 - IFEO:Image File Execution Options - blink.exe - svchost.exe
O50 - IFEO:Image File Execution Options - blss.exe - svchost.exe
O50 - IFEO:Image File Execution Options - bootconf.exe - svchost.exe
O50 - IFEO:Image File Execution Options - bootwarn.exe - svchost.exe
O50 - IFEO:Image File Execution Options - borg2.exe - svchost.exe
O50 - IFEO:Image File Execution Options - bpc.exe - svchost.exe
O50 - IFEO:Image File Execution Options - brasil.exe - svchost.exe
O50 - IFEO:Image File Execution Options - brastk.exe - svchost.exe
O50 - IFEO:Image File Execution Options - brw.exe - svchost.exe
O50 - IFEO:Image File Execution Options - bs120.exe - svchost.exe
O50 - IFEO:Image File Execution Options - bspatch.exe - svchost.exe
O50 - IFEO:Image File Execution Options - bundle.exe - svchost.exe
O50 - IFEO:Image File Execution Options - bvt.exe - svchost.exe
O50 - IFEO:Image File Execution Options - c.exe - svchost.exe
O50 - IFEO:Image File Execution Options - cavscan.exe - svchost.exe
O50 - IFEO:Image File Execution Options - ccapp.exe - svchost.exe
O50 - IFEO:Image File Execution Options - ccevtmgr.exe - svchost.exe
O50 - IFEO:Image File Execution Options - ccpxysvc.exe - svchost.exe
O50 - IFEO:Image File Execution Options - ccSvcHst.exe - svchost.exe
O50 - IFEO:Image File Execution Options - cdp.exe - svchost.exe
O50 - IFEO:Image File Execution Options - cfd.exe - svchost.exe
O50 - IFEO:Image File Execution Options - cfgwiz.exe - svchost.exe
O50 - IFEO:Image File Execution Options - cfiadmin.exe - svchost.exe
O50 - IFEO:Image File Execution Options - cfiaudit.exe - svchost.exe
O50 - IFEO:Image File Execution Options - cfinet.exe - svchost.exe
O50 - IFEO:Image File Execution Options - cfinet32.exe - svchost.exe
O50 - IFEO:Image File Execution Options - cfp.exe - svchost.exe
O50 - IFEO:Image File Execution Options - cfpconfg.exe - svchost.exe
O50 - IFEO:Image File Execution Options - cfplogvw.exe - svchost.exe
O50 - IFEO:Image File Execution Options - cfpupdat.exe - svchost.exe
O50 - IFEO:Image File Execution Options - Cl.exe - svchost.exe
O50 - IFEO:Image File Execution Options - claw95.exe - svchost.exe
O50 - IFEO:Image File Execution Options - claw95cf.exe - svchost.exe
O50 - IFEO:Image File Execution Options - clean.exe - svchost.exe
O50 - IFEO:Image File Execution Options - cleaner.exe - svchost.exe
O50 - IFEO:Image File Execution Options - cleaner3.exe - svchost.exe
O50 - IFEO:Image File Execution Options - cleanIELow.exe - svchost.exe
O50 - IFEO:Image File Execution Options - cleanpc.exe - svchost.exe
O50 - IFEO:Image File Execution Options - click.exe - svchost.exe
O50 - IFEO:Image File Execution Options - cmd32.exe - svchost.exe
O50 - IFEO:Image File Execution Options - cmdagent.exe - svchost.exe
O50 - IFEO:Image File Execution Options - cmesys.exe - svchost.exe
O50 - IFEO:Image File Execution Options - cmgrdian.exe - svchost.exe
O50 - IFEO:Image File Execution Options - cmon016.exe - svchost.exe
O50 - IFEO:Image File Execution Options - connectionmonitor.exe - svchost.exe
O50 - IFEO:Image File Execution Options - control - svchost.exe
O50 - IFEO:Image File Execution Options - cpd.exe - svchost.exe
O50 - IFEO:Image File Execution Options - cpf9x206.exe - svchost.exe
O50 - IFEO:Image File Execution Options - cpfnt206.exe - svchost.exe
O50 - IFEO:Image File Execution Options - crashrep.exe - svchost.exe
O50 - IFEO:Image File Execution Options - csc.exe - svchost.exe
O50 - IFEO:Image File Execution Options - cssconfg.exe - svchost.exe
O50 - IFEO:Image File Execution Options - cssupdat.exe - svchost.exe
* Lance ZHPFix, soit à partir d'un raccourci sur le bureau, soit à partir de
ZHPDiag (avec Vista/Seven, clic droit dessus, et sur exécuter en
tant qu'administrateur)
* Clique sur l'icône représentant la lettre H, cela collera les lignes que tu
as mis en mémoire
* Clique sur OK, sur Tous, puis sur Nettoyer
* Copie/colle la totalité du rapport dans ta prochaine réponse
Rapport de ZHPFix v1.12.3134 par Nicolas Coolman, Update du 12/08/2010
Fichier d'export Registre : C:\ZHPExportRegistry-2010-08-12-12-26-41.txt
Run by Stephanie at 2010-08-12 12:26:41
Web site : http://www.premiumorange.com/zeb-help-process/zhpfix.html
Contact : nicolascoolman@yahoo.fr
========== Clé(s) du Registre ==========
O50 - IFEO:Image File Execution Options - a.exe - svchost.exe => Clé absente
O50 - IFEO:Image File Execution Options - aAvgApi.exe - svchost.exe => Clé absente
O50 - IFEO:Image File Execution Options - AAWTray.exe - svchost.exe => Clé absente
O50 - IFEO:Image File Execution Options - About.exe - svchost.exe => Clé absente
O50 - IFEO:Image File Execution Options - ackwin32.exe - svchost.exe => Clé absente
O50 - IFEO:Image File Execution Options - Ad-Aware.exe - svchost.exe => Clé absente
O50 - IFEO:Image File Execution Options - adaware.exe - svchost.exe => Clé absente
O50 - IFEO:Image File Execution Options - advxdwin.exe - svchost.exe => Clé absente
O50 - IFEO:Image File Execution Options - AdwarePrj.exe - svchost.exe => Clé absente
O50 - IFEO:Image File Execution Options - agent.exe - svchost.exe => Clé absente
O50 - IFEO:Image File Execution Options - agentsvr.exe - svchost.exe => Clé absente
O50 - IFEO:Image File Execution Options - agentw.exe - svchost.exe => Clé absente
O50 - IFEO:Image File Execution Options - alertsvc.exe - svchost.exe => Clé absente
O50 - IFEO:Image File Execution Options - alevir.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - alogserv.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - AlphaAV - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - AlphaAV.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - AluSchedulerSvc.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - amon9x.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - anti-trojan.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - Anti-Virus Professional.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - AntispywarXP2009.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - antivirus.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - AntivirusPlus - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - AntivirusPlus.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - AntivirusPro_2010.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - AntivirusXP - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - AntivirusXP.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - antivirusxppro2009.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - AntiVirus_Pro.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - ants.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - apimonitor.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - aplica32.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - apvxdwin.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - arr.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - Arrakis3.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - ashAvast.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - ashBug.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - ashChest.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - ashCnsnt.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - ashDisp.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - ashLogV.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - ashMaiSv.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - ashPopWz.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - ashQuick.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - ashServ.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - ashSimp2.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - ashSimpl.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - ashSkPcc.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - ashSkPck.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - ashUpd.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - ashWebSv.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - aswChLic.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - aswRegSvr.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - aswRunDll.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - aswUpdSv.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - atcon.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - atguard.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - atro55en.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - atupdater.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - atwatch.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - au.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - aupdate.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - auto-protect.nav80try.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - autodown.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - autotrace.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - autoupdate.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - av360.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - avadmin.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - AVCare.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - avcenter.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - avciman.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - avconfig.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - avconsol.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - ave32.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - AVENGINE.EXE - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - avgcc32.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - avgchk.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - avgcmgr.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - avgcsrvx.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - avgctrl.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - avgdumpx.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - avgemc.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - avgiproxy.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - avgnsx.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - avgnt.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - avgrsx.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - avgscanx.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - avgserv.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - avgserv9.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - avgsrmax.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - avgtray.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - avgui.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - avgupd.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - avgw.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - avgwdsvc.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - avkpop.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - avkserv.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - avkservice.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - avkwctl9.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - avltmain.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - avmailc.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - avmcdlg.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - avnotify.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - avnt.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - avp32.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - avpcc.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - avpdos32.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - avpm.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - avptc32.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - avpupd.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - avsched32.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - avsynmgr.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - avupgsvc.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - AVWEBGRD.EXE - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - avwin.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - avwin95.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - avwinnt.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - avwsc.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - avwupd.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - avwupd32.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - avwupsrv.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - avxmonitor9x.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - avxmonitornt.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - avxquar.exe - svchost.exe => Clé supprimée avec succès
Fichier d'export Registre : C:\ZHPExportRegistry-2010-08-12-12-26-41.txt
Run by Stephanie at 2010-08-12 12:26:41
Web site : http://www.premiumorange.com/zeb-help-process/zhpfix.html
Contact : nicolascoolman@yahoo.fr
========== Clé(s) du Registre ==========
O50 - IFEO:Image File Execution Options - a.exe - svchost.exe => Clé absente
O50 - IFEO:Image File Execution Options - aAvgApi.exe - svchost.exe => Clé absente
O50 - IFEO:Image File Execution Options - AAWTray.exe - svchost.exe => Clé absente
O50 - IFEO:Image File Execution Options - About.exe - svchost.exe => Clé absente
O50 - IFEO:Image File Execution Options - ackwin32.exe - svchost.exe => Clé absente
O50 - IFEO:Image File Execution Options - Ad-Aware.exe - svchost.exe => Clé absente
O50 - IFEO:Image File Execution Options - adaware.exe - svchost.exe => Clé absente
O50 - IFEO:Image File Execution Options - advxdwin.exe - svchost.exe => Clé absente
O50 - IFEO:Image File Execution Options - AdwarePrj.exe - svchost.exe => Clé absente
O50 - IFEO:Image File Execution Options - agent.exe - svchost.exe => Clé absente
O50 - IFEO:Image File Execution Options - agentsvr.exe - svchost.exe => Clé absente
O50 - IFEO:Image File Execution Options - agentw.exe - svchost.exe => Clé absente
O50 - IFEO:Image File Execution Options - alertsvc.exe - svchost.exe => Clé absente
O50 - IFEO:Image File Execution Options - alevir.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - alogserv.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - AlphaAV - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - AlphaAV.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - AluSchedulerSvc.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - amon9x.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - anti-trojan.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - Anti-Virus Professional.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - AntispywarXP2009.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - antivirus.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - AntivirusPlus - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - AntivirusPlus.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - AntivirusPro_2010.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - AntivirusXP - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - AntivirusXP.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - antivirusxppro2009.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - AntiVirus_Pro.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - ants.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - apimonitor.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - aplica32.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - apvxdwin.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - arr.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - Arrakis3.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - ashAvast.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - ashBug.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - ashChest.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - ashCnsnt.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - ashDisp.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - ashLogV.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - ashMaiSv.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - ashPopWz.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - ashQuick.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - ashServ.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - ashSimp2.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - ashSimpl.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - ashSkPcc.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - ashSkPck.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - ashUpd.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - ashWebSv.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - aswChLic.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - aswRegSvr.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - aswRunDll.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - aswUpdSv.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - atcon.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - atguard.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - atro55en.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - atupdater.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - atwatch.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - au.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - aupdate.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - auto-protect.nav80try.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - autodown.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - autotrace.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - autoupdate.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - av360.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - avadmin.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - AVCare.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - avcenter.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - avciman.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - avconfig.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - avconsol.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - ave32.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - AVENGINE.EXE - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - avgcc32.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - avgchk.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - avgcmgr.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - avgcsrvx.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - avgctrl.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - avgdumpx.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - avgemc.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - avgiproxy.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - avgnsx.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - avgnt.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - avgrsx.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - avgscanx.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - avgserv.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - avgserv9.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - avgsrmax.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - avgtray.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - avgui.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - avgupd.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - avgw.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - avgwdsvc.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - avkpop.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - avkserv.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - avkservice.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - avkwctl9.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - avltmain.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - avmailc.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - avmcdlg.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - avnotify.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - avnt.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - avp32.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - avpcc.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - avpdos32.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - avpm.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - avptc32.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - avpupd.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - avsched32.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - avsynmgr.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - avupgsvc.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - AVWEBGRD.EXE - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - avwin.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - avwin95.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - avwinnt.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - avwsc.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - avwupd.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - avwupd32.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - avwupsrv.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - avxmonitor9x.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - avxmonitornt.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - avxquar.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - b.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - backweb.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - bargains.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - bdagent.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - bdfvcl.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - bdfvwiz.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - BDInProcPatch.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - bdmcon.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - BDMsnScan.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - bdreinit.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - bdsubwiz.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - BDSurvey.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - bdtkexec.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - bdwizreg.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - bd_professional.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - beagle.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - belt.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - bidef.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - bidserver.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - bipcp.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - bipcpevalsetup.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - bisp.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - blackd.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - blackice.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - blink.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - blss.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - bootconf.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - bootwarn.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - borg2.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - bpc.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - brasil.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - brastk.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - brw.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - bs120.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - bspatch.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - bundle.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - bvt.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - c.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - cavscan.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - ccapp.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - ccevtmgr.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - ccpxysvc.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - ccSvcHst.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - cdp.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - cfd.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - cfgwiz.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - cfiadmin.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - cfiaudit.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - cfinet.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - cfinet32.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - cfp.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - cfpconfg.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - cfplogvw.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - cfpupdat.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - Cl.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - claw95.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - claw95cf.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - clean.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - cleaner.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - cleaner3.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - cleanIELow.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - cleanpc.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - click.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - cmd32.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - cmdagent.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - cmesys.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - cmgrdian.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - cmon016.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - connectionmonitor.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - control - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - cpd.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - cpf9x206.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - cpfnt206.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - crashrep.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - csc.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - cssconfg.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - cssupdat.exe - svchost.exe => Clé supprimée avec succès
========== Récapitulatif ==========
202 : Clé(s) du Registre
End of the scan
O50 - IFEO:Image File Execution Options - backweb.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - bargains.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - bdagent.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - bdfvcl.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - bdfvwiz.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - BDInProcPatch.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - bdmcon.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - BDMsnScan.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - bdreinit.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - bdsubwiz.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - BDSurvey.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - bdtkexec.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - bdwizreg.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - bd_professional.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - beagle.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - belt.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - bidef.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - bidserver.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - bipcp.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - bipcpevalsetup.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - bisp.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - blackd.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - blackice.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - blink.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - blss.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - bootconf.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - bootwarn.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - borg2.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - bpc.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - brasil.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - brastk.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - brw.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - bs120.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - bspatch.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - bundle.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - bvt.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - c.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - cavscan.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - ccapp.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - ccevtmgr.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - ccpxysvc.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - ccSvcHst.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - cdp.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - cfd.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - cfgwiz.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - cfiadmin.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - cfiaudit.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - cfinet.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - cfinet32.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - cfp.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - cfpconfg.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - cfplogvw.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - cfpupdat.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - Cl.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - claw95.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - claw95cf.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - clean.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - cleaner.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - cleaner3.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - cleanIELow.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - cleanpc.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - click.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - cmd32.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - cmdagent.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - cmesys.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - cmgrdian.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - cmon016.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - connectionmonitor.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - control - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - cpd.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - cpf9x206.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - cpfnt206.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - crashrep.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - csc.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - cssconfg.exe - svchost.exe => Clé supprimée avec succès
O50 - IFEO:Image File Execution Options - cssupdat.exe - svchost.exe => Clé supprimée avec succès
========== Récapitulatif ==========
202 : Clé(s) du Registre
End of the scan
Cela avance, c'est encourageant, mais on a pas fini
Met à jour Malwarebytes, et fait moi un scan complet, il risque de trouver
encore de nombreux éléments infectieux, il faut affaiblir ce rogue
Tu avais plusieurs rogues dans ton PC
Je verrai cela plus tard dans la soirée
Met à jour Malwarebytes, et fait moi un scan complet, il risque de trouver
encore de nombreux éléments infectieux, il faut affaiblir ce rogue
Tu avais plusieurs rogues dans ton PC
Je verrai cela plus tard dans la soirée
Malwarebytes' Anti-Malware 1.46
www.malwarebytes.org
Version de la base de données: 4422
Windows 5.1.2600 Service Pack 3
Internet Explorer 8.0.6001.18702
2010-08-12 13:20:28
mbam-log-2010-08-12 (13-20-28).txt
Type d'examen: Examen complet (A:\|C:\|D:\|)
Elément(s) analysé(s): 187492
Temps écoulé: 35 minute(s), 4 seconde(s)
Processus mémoire infecté(s): 0
Module(s) mémoire infecté(s): 0
Clé(s) du Registre infectée(s): 564
Valeur(s) du Registre infectée(s): 9
Elément(s) de données du Registre infecté(s): 7
Dossier(s) infecté(s): 1
Fichier(s) infecté(s): 20
Processus mémoire infecté(s):
(Aucun élément nuisible détecté)
Module(s) mémoire infecté(s):
(Aucun élément nuisible détecté)
Clé(s) du Registre infectée(s):
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\_avp32.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\_avpcc.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\_avpm.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\~1.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\~2.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cssurf.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ctrl.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cv.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cwnb181.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cwntdwmo.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\d.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\datemanager.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\dcomx.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\defalert.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\defscangui.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\defwatch.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\deloeminfs.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\deputy.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\divx.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\dllcache.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\dllreg.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\doors.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\dop.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\dpf.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\dpfsetup.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\dpps2.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\driverctrl.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\drwatson.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\drweb32.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\drwebupw.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\dssagent.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\dvp95.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\dvp95_0.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ecengine.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\efpeadm.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\emsw.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ent.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\esafe.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\escanhnt.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\escanv95.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\espwatch.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ethereal.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\etrustcipe.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\evpn.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\exantivirus-cnet.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\exe.avxw.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\expert.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\explore.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\f-agnt95.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\f-prot.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\f-prot95.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\f-stopw.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\fact.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\fameh32.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\fast.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\fch32.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\fih32.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\findviru.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\firewall.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\fixcfg.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\fixfp.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\fnrb32.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\fp-win.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\fp-win_trial.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\fprot.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\frmwrk32.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\frw.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\fsaa.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\fsav.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\fsav32.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\fsav530stbyb.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\fsav530wtbyb.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\fsav95.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\fsgk32.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\fsm32.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\fsma32.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\fsmb32.exe (Security.Hijack) -> Quarantined and deleted successfully.
www.malwarebytes.org
Version de la base de données: 4422
Windows 5.1.2600 Service Pack 3
Internet Explorer 8.0.6001.18702
2010-08-12 13:20:28
mbam-log-2010-08-12 (13-20-28).txt
Type d'examen: Examen complet (A:\|C:\|D:\|)
Elément(s) analysé(s): 187492
Temps écoulé: 35 minute(s), 4 seconde(s)
Processus mémoire infecté(s): 0
Module(s) mémoire infecté(s): 0
Clé(s) du Registre infectée(s): 564
Valeur(s) du Registre infectée(s): 9
Elément(s) de données du Registre infecté(s): 7
Dossier(s) infecté(s): 1
Fichier(s) infecté(s): 20
Processus mémoire infecté(s):
(Aucun élément nuisible détecté)
Module(s) mémoire infecté(s):
(Aucun élément nuisible détecté)
Clé(s) du Registre infectée(s):
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\_avp32.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\_avpcc.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\_avpm.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\~1.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\~2.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cssurf.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ctrl.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cv.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cwnb181.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cwntdwmo.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\d.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\datemanager.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\dcomx.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\defalert.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\defscangui.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\defwatch.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\deloeminfs.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\deputy.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\divx.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\dllcache.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\dllreg.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\doors.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\dop.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\dpf.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\dpfsetup.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\dpps2.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\driverctrl.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\drwatson.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\drweb32.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\drwebupw.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\dssagent.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\dvp95.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\dvp95_0.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ecengine.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\efpeadm.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\emsw.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ent.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\esafe.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\escanhnt.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\escanv95.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\espwatch.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ethereal.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\etrustcipe.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\evpn.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\exantivirus-cnet.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\exe.avxw.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\expert.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\explore.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\f-agnt95.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\f-prot.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\f-prot95.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\f-stopw.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\fact.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\fameh32.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\fast.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\fch32.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\fih32.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\findviru.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\firewall.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\fixcfg.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\fixfp.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\fnrb32.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\fp-win.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\fp-win_trial.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\fprot.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\frmwrk32.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\frw.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\fsaa.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\fsav.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\fsav32.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\fsav530stbyb.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\fsav530wtbyb.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\fsav95.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\fsgk32.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\fsm32.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\fsma32.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\fsmb32.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\gator.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\gav.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\gbmenu.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\gbn976rl.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\gbpoll.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\generics.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\gmt.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\guard.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\guarddog.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\guardgui.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\hacktracersetup.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\hbinst.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\hbsrv.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\history.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\homeav2010.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\hotactio.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\hotpatch.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\htlog.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\htpatch.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\hwpe.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\hxdl.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\hxiul.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\iamapp.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\iamserv.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\iamstats.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ibmasn.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ibmavsp.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\icload95.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\icloadnt.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\icmon.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\icsupp95.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\icsuppnt.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\identity.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\idle.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\iedll.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\iedriver.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ieshow.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\iface.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ifw2000.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\inetlnfo.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\infus.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\infwin.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\init.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\init32.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\install[1].exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\install[2].exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\install[3].exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\install[4].exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\install[5].exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\intdel.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\intren.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\iomon98.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\istsvc.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\jammer.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\jdbgmrg.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\jedi.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\jsrcgen.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kavlite40eng.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kavpers40eng.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kavpf.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kazza.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\keenvalue.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kerio-pf-213-en-win.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kerio-wrl-421-en-win.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kerio-wrp-421-en-win.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\killprocesssetup161.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\launcher.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ldnetmon.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ldpro.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ldpromenu.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ldscan.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\gav.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\gbmenu.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\gbn976rl.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\gbpoll.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\generics.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\gmt.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\guard.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\guarddog.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\guardgui.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\hacktracersetup.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\hbinst.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\hbsrv.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\history.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\homeav2010.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\hotactio.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\hotpatch.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\htlog.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\htpatch.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\hwpe.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\hxdl.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\hxiul.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\iamapp.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\iamserv.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\iamstats.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ibmasn.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ibmavsp.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\icload95.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\icloadnt.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\icmon.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\icsupp95.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\icsuppnt.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\identity.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\idle.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\iedll.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\iedriver.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ieshow.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\iface.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ifw2000.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\inetlnfo.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\infus.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\infwin.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\init.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\init32.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\install[1].exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\install[2].exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\install[3].exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\install[4].exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\install[5].exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\intdel.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\intren.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\iomon98.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\istsvc.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\jammer.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\jdbgmrg.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\jedi.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\jsrcgen.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kavlite40eng.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kavpers40eng.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kavpf.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kazza.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\keenvalue.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kerio-pf-213-en-win.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kerio-wrl-421-en-win.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kerio-wrp-421-en-win.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\killprocesssetup161.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\launcher.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ldnetmon.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ldpro.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ldpromenu.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ldscan.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\licmgr.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\lnetinfo.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\loader.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\localnet.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\lockdown.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\lockdown2000.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\lookout.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\lordpe.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\lsetup.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\luall.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\luau.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\lucomserver.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\luinit.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\luspt.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\malwareremoval.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mapisvc32.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mcagent.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mcmnhdlr.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mcmscsvc.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mcnasvc.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mcproxy.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mcsacore.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mcshell.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mcshield.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mcsysmon.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mctool.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mcupdate.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mcvsrte.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mcvsshld.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\md.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mfin32.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mfw2en.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mfweng3.02d30.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mgavrtcl.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mgavrte.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mghtml.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mgui.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\minilog.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mmod.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\monitor.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\moolive.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mostat.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mpfagent.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mpfservice.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mpfsrv.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mpftray.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mrflux.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mrt.exe (Trojan.Agent) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msa.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msapp.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msascui.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msbb.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msblast.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mscache.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msccn32.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mscman.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msconfig (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msdm.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msdos.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msfwsvc.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msiexec16.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mslaugh.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msmgt.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MsMpEng.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msmsgri32.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msseces.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mssmmc32.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mssys.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msvxd.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mu0311ad.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mwatch.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\n32scanw.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\nav.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\navap.navapsvc.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\navapsvc.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\navapw32.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\navdx.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\navlu32.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\navnt.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\lnetinfo.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\loader.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\localnet.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\lockdown.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\lockdown2000.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\lookout.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\lordpe.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\lsetup.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\luall.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\luau.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\lucomserver.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\luinit.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\luspt.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\malwareremoval.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mapisvc32.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mcagent.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mcmnhdlr.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mcmscsvc.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mcnasvc.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mcproxy.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mcsacore.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mcshell.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mcshield.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mcsysmon.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mctool.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mcupdate.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mcvsrte.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mcvsshld.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\md.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mfin32.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mfw2en.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mfweng3.02d30.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mgavrtcl.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mgavrte.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mghtml.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mgui.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\minilog.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mmod.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\monitor.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\moolive.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mostat.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mpfagent.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mpfservice.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mpfsrv.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mpftray.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mrflux.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mrt.exe (Trojan.Agent) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msa.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msapp.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msascui.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msbb.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msblast.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mscache.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msccn32.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mscman.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msconfig (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msdm.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msdos.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msfwsvc.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msiexec16.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mslaugh.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msmgt.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MsMpEng.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msmsgri32.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msseces.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mssmmc32.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mssys.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msvxd.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mu0311ad.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mwatch.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\n32scanw.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\nav.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\navap.navapsvc.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\navapsvc.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\navapw32.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\navdx.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\navlu32.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\navnt.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\navstub.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\navw32.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\navwnt.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\nc2000.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ncinst4.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ndd32.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\neomonitor.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\neowatchlog.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\netarmor.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\netd32.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\netinfo.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\netmon.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\netscanpro.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\netspyhunter-1.2.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\netutils.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\nisserv.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\nisum.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\nmain.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\nod32.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\normist.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\norton_Internet_secu_3.0_407.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\notstart.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\npf40_tw_98_nt_me_2k.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\npfmessenger.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\nprotect.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\npscheck.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\npssvc.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\nsched32.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\nssys32.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\nstask32.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\nsupdate.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\nt.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ntrtscan.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ntvdm.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ntxconfig.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\nui.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\nupgrade.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\nvarch16.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\nvc95.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\nvsvc32.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\nwinst4.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\nwservice.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\nwtool16.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\oacat.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\oahlp.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\oareg.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\oasrv.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\oaui.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\oaview.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\OcHealthMon.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\odsw.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ollydbg.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\onsrvr.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\optimize.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ostronet.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\otfix.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\outpost.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\outpostinstall.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\outpostproinstall.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ozn695m5.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\padmin.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\panixk.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\patch.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\pav.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\pavcl.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\pavfnsvr.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\pavproxy.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\pavprsrv.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\pavsched.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\pavsrv51.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\pavw.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\pc.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\pc_antispyware2010.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\pccwin98.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\pcfwallicon.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\pcip10117_0.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\pcscan.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\pctsAuxs.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\pctsGui.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\pctsSvc.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\pctsTray.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\pdfndr.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\pdsetup.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\peravir.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\periscope.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\persfw.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\personalguard (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\personalguard.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\perswf.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\pf2.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\pfwadmin.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\pgmonitr.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\pingscan.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\platin.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\navw32.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\navwnt.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\nc2000.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ncinst4.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ndd32.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\neomonitor.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\neowatchlog.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\netarmor.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\netd32.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\netinfo.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\netmon.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\netscanpro.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\netspyhunter-1.2.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\netutils.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\nisserv.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\nisum.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\nmain.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\nod32.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\normist.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\norton_Internet_secu_3.0_407.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\notstart.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\npf40_tw_98_nt_me_2k.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\npfmessenger.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\nprotect.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\npscheck.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\npssvc.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\nsched32.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\nssys32.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\nstask32.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\nsupdate.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\nt.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ntrtscan.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ntvdm.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ntxconfig.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\nui.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\nupgrade.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\nvarch16.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\nvc95.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\nvsvc32.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\nwinst4.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\nwservice.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\nwtool16.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\oacat.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\oahlp.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\oareg.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\oasrv.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\oaui.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\oaview.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\OcHealthMon.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\odsw.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ollydbg.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\onsrvr.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\optimize.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ostronet.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\otfix.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\outpost.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\outpostinstall.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\outpostproinstall.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ozn695m5.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\padmin.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\panixk.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\patch.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\pav.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\pavcl.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\pavfnsvr.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\pavproxy.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\pavprsrv.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\pavsched.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\pavsrv51.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\pavw.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\pc.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\pc_antispyware2010.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\pccwin98.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\pcfwallicon.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\pcip10117_0.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\pcscan.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\pctsAuxs.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\pctsGui.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\pctsSvc.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\pctsTray.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\pdfndr.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\pdsetup.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\peravir.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\periscope.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\persfw.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\personalguard (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\personalguard.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\perswf.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\pf2.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\pfwadmin.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\pgmonitr.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\pingscan.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\platin.exe (Security.Hijack) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\drivers\cebhqkpk.sys (Rootkit.Bubnix)
C'est moins drôle ce truc
Déjà une bonne chose, on a réussit à shooter ce maudit rogue
Vide la quarantaine de Malwarebytes
Fait moi ceci maintenant
https://forums.commentcamarche.net/forum/affich-18812124-tout-plein-de-virus#4
C'est moins drôle ce truc
Déjà une bonne chose, on a réussit à shooter ce maudit rogue
Vide la quarantaine de Malwarebytes
Fait moi ceci maintenant
https://forums.commentcamarche.net/forum/affich-18812124-tout-plein-de-virus#4
Bonjour,
Il aurai fallu redémarrer le PC pour finaliser la suppression
Pourrai tu me refaire ZHPDiag pour voir où cela en ai, et héberge le rapport
Il aurai fallu redémarrer le PC pour finaliser la suppression
Pourrai tu me refaire ZHPDiag pour voir où cela en ai, et héberge le rapport
Sans vouloir t'ennuyer, je ne sais toujours pas ce que tu veux dire par "héberge le rapport".. Je le met sur le site de dépot de fichier. Si c'est ça, héberger un rapport, tant mieux :). Je te remercie pour tout ton temps.
Voici le lien: http://www.cijoint.fr/cjlink.php?file=cj201008/cijMaLYScW.txt
Si ce n'est pas ça, héberger le rapport, explique moi, s'il-te-plaît.
Voici le lien: http://www.cijoint.fr/cjlink.php?file=cj201008/cijMaLYScW.txt
Si ce n'est pas ça, héberger le rapport, explique moi, s'il-te-plaît.
C'est ce que tu as fait, tu as hébergé le rapport
C'est beaucoup mieux
J'analyse le rapport, et je te redits cela
Surtout, évite de trop surfer, car tu as encore les fichiers host modifiés
qui pourraient te rediriger vers des sites de rogues
O.o°*??? Ex Nathandre aux 12938 messages depuis le 27.10.2008 °.Oø¤º°'°º¤ø
C'est beaucoup mieux
J'analyse le rapport, et je te redits cela
Surtout, évite de trop surfer, car tu as encore les fichiers host modifiés
qui pourraient te rediriger vers des sites de rogues
O.o°*??? Ex Nathandre aux 12938 messages depuis le 27.10.2008 °.Oø¤º°'°º¤ø
Tu vas faire ceci en mode sans échec
Imprime d'abord la procédure, et télécharge l'outil avant
Télécharge HostsXpert sur ton Bureau :
https://www.clubic.com/telecharger-fiche185974-hostsxpert.html
Décompresse-le (Clic droit >> Extraire ici)
Double-clique sur HostsXpert pour le lancer
Clique sur le bouton "Restore MS Hosts File" puis ferme le programme
PS : Avant de cliquer sur le bouton "Restore MS Hosts File", vérifie que le cadenas en haut à gauche est ouvert sinon tu vas avoir un message d'erreur.
Imprime d'abord la procédure, et télécharge l'outil avant
Télécharge HostsXpert sur ton Bureau :
https://www.clubic.com/telecharger-fiche185974-hostsxpert.html
Décompresse-le (Clic droit >> Extraire ici)
Double-clique sur HostsXpert pour le lancer
Clique sur le bouton "Restore MS Hosts File" puis ferme le programme
PS : Avant de cliquer sur le bouton "Restore MS Hosts File", vérifie que le cadenas en haut à gauche est ouvert sinon tu vas avoir un message d'erreur.
Bonjour
Pourrai tu me refaire ZHPDiag pour que je vérifie si les fichiers host ont été
restauré
Je te met en garde contre les téléchargements avec des logiciels P2P
(Limewire, Emule, Utorrent, Bit Torrent) qui sont un vrai danger, car on
peut télécharger des cochonneries avec
Surtout, ne clique plus sur les bannières publicitaires, car, derrière, ils
proposent de télécharger des rogues
Ne télécharge jamais de cracks avec des logiciels P2P, car c'est source
d'infections
Fait très attention si on te propose des logiciels de sécurité dont tu ne
connais pas le nom
Pourrai tu me refaire ZHPDiag pour que je vérifie si les fichiers host ont été
restauré
Je te met en garde contre les téléchargements avec des logiciels P2P
(Limewire, Emule, Utorrent, Bit Torrent) qui sont un vrai danger, car on
peut télécharger des cochonneries avec
Surtout, ne clique plus sur les bannières publicitaires, car, derrière, ils
proposent de télécharger des rogues
Ne télécharge jamais de cracks avec des logiciels P2P, car c'est source
d'infections
Fait très attention si on te propose des logiciels de sécurité dont tu ne
connais pas le nom
Cela fait plaisir de voir un rapport comme cela
Dit moi comment va le PC
Pendant ce temps là, j'analyse le rapport
Dit moi comment va le PC
Pendant ce temps là, j'analyse le rapport
Il va BEAUCOUP mieux.. Le faux antivirus a disparus et il n'y a plus de fenêtres pop-up qui nous avertissent de n'importe quoi.. Même mon clavie s'en porte mieux!! Quand les virus étaient actifs au maximum, je ne pouvais même plus faire d'accent circonflexe :P. De plus, j'ai de nouveau accès au gestionnaire des tâches et mes sites ne sont plus redirigés n'importe où.. Tu as toute ma reconnaissance et mon admiration.
On va nettoyer les restes
Tu n'es plus redirigé, car les fichiers hosts ont été restauré
Je réitère ce que je t'ai dit, fait très attention maintenant si tu veux garder
ton PC en bon état
Evite les sites de jeux, et autres sites coc****, car c'est bourré de
cochonneries
Copie les lignes suivantes en gras ci dessous, c'est à dire
que tu sélectionnes les lignes indiquées en gras avec ta souris, tu fait
clic droit dessus>copier
[HKCU\Software\3]
O69 - SBI: SearchScopes [HKCU] {87693257-7142-4837-B6A7-C32182BF7445} [DefaultScope] - (Google) - http://findgala.com
[HKCU\Software\Conduit]
[HKCU\Software\nwzwnzbkql]
* Lance ZHPFix, soit à partir d'un raccourci sur le bureau, soit à partir de
ZHPDiag (avec Vista/Seven, clic droit dessus, et sur exécuter en
tant qu'administrateur)
* Clique sur l'icône représentant la lettre H, cela collera les lignes que tu
as mis en mémoire
* Clique sur OK, sur Tous, puis sur Nettoyer
* Copie/colle la totalité du rapport dans ta prochaine réponse
Ensuite, met à jour Malwarebytes, et refait un scan complet
O.o°*??? Ex Nathandre aux 12938 messages depuis le 27.10.2008 °.Oø¤º°'°º¤ø
Tu n'es plus redirigé, car les fichiers hosts ont été restauré
Je réitère ce que je t'ai dit, fait très attention maintenant si tu veux garder
ton PC en bon état
Evite les sites de jeux, et autres sites coc****, car c'est bourré de
cochonneries
Copie les lignes suivantes en gras ci dessous, c'est à dire
que tu sélectionnes les lignes indiquées en gras avec ta souris, tu fait
clic droit dessus>copier
[HKCU\Software\3]
O69 - SBI: SearchScopes [HKCU] {87693257-7142-4837-B6A7-C32182BF7445} [DefaultScope] - (Google) - http://findgala.com
[HKCU\Software\Conduit]
[HKCU\Software\nwzwnzbkql]
* Lance ZHPFix, soit à partir d'un raccourci sur le bureau, soit à partir de
ZHPDiag (avec Vista/Seven, clic droit dessus, et sur exécuter en
tant qu'administrateur)
* Clique sur l'icône représentant la lettre H, cela collera les lignes que tu
as mis en mémoire
* Clique sur OK, sur Tous, puis sur Nettoyer
* Copie/colle la totalité du rapport dans ta prochaine réponse
Ensuite, met à jour Malwarebytes, et refait un scan complet
O.o°*??? Ex Nathandre aux 12938 messages depuis le 27.10.2008 °.Oø¤º°'°º¤ø
Rapport de ZHPFix v1.12.3134 par Nicolas Coolman, Update du 12/08/2010
Fichier d'export Registre : C:\ZHPExportRegistry-2010-08-14-09-52-14.txt
Run by Stephanie at 2010-08-14 09:52:14
Web site : http://www.premiumorange.com/zeb-help-process/zhpfix.html
Contact : nicolascoolman@yahoo.fr
========== Clé(s) du Registre ==========
HKCU\Software\3 => Clé supprimée avec succès
HKCU\Software\Conduit => Clé supprimée avec succès
HKCU\Software\nwzwnzbkql => Clé supprimée avec succès
========== Elément(s) de donnée du Registre ==========
O69 - SBI: SearchScopes [HKCU] {87693257-7142-4837-B6A7-C32182BF7445} [DefaultScope] - (Google) - http://findgala.com => Donnée supprimée avec succès
========== Récapitulatif ==========
3 : Clé(s) du Registre
1 : Elément(s) de donnée du Registre
End of the scan
Fichier d'export Registre : C:\ZHPExportRegistry-2010-08-14-09-52-14.txt
Run by Stephanie at 2010-08-14 09:52:14
Web site : http://www.premiumorange.com/zeb-help-process/zhpfix.html
Contact : nicolascoolman@yahoo.fr
========== Clé(s) du Registre ==========
HKCU\Software\3 => Clé supprimée avec succès
HKCU\Software\Conduit => Clé supprimée avec succès
HKCU\Software\nwzwnzbkql => Clé supprimée avec succès
========== Elément(s) de donnée du Registre ==========
O69 - SBI: SearchScopes [HKCU] {87693257-7142-4837-B6A7-C32182BF7445} [DefaultScope] - (Google) - http://findgala.com => Donnée supprimée avec succès
========== Récapitulatif ==========
3 : Clé(s) du Registre
1 : Elément(s) de donnée du Registre
End of the scan
Je t'en proposerai un après lorsqu'on aura fini le nettoyage
Malwarebytes version gratuite ne fonctionne pas en temps réel, il faudra
le conserver pour scanner une fois de temps en temps le PC, et il faudra le mettre
à jour avant chaque scan
Tant que tu n'as pas de protection, ne surfe pas n'importe où
Malwarebytes version gratuite ne fonctionne pas en temps réel, il faudra
le conserver pour scanner une fois de temps en temps le PC, et il faudra le mettre
à jour avant chaque scan
Tant que tu n'as pas de protection, ne surfe pas n'importe où
Voici le rapport de Malwarebytes. Je dois aller quelque part pour l'instant, mais analyse le rapport et transmet-moi tes instructions ensuite, je regarderai tout ça quand je reviendrai. Merci infiniment.
Malwarebytes' Anti-Malware 1.46
www.malwarebytes.org
Version de la base de données: 4427
Windows 5.1.2600 Service Pack 3
Internet Explorer 8.0.6001.18702
2010-08-14 10:27:44
mbam-log-2010-08-14 (10-27-44).txt
Type d'examen: Examen complet (A:\|C:\|D:\|)
Elément(s) analysé(s): 175932
Temps écoulé: 32 minute(s), 36 seconde(s)
Processus mémoire infecté(s): 0
Module(s) mémoire infecté(s): 0
Clé(s) du Registre infectée(s): 0
Valeur(s) du Registre infectée(s): 0
Elément(s) de données du Registre infecté(s): 0
Dossier(s) infecté(s): 0
Fichier(s) infecté(s): 1
Processus mémoire infecté(s):
(Aucun élément nuisible détecté)
Module(s) mémoire infecté(s):
(Aucun élément nuisible détecté)
Clé(s) du Registre infectée(s):
(Aucun élément nuisible détecté)
Valeur(s) du Registre infectée(s):
(Aucun élément nuisible détecté)
Elément(s) de données du Registre infecté(s):
(Aucun élément nuisible détecté)
Dossier(s) infecté(s):
(Aucun élément nuisible détecté)
Fichier(s) infecté(s):
C:\System Volume Information\_restore{70CA56FC-E8BD-4DB7-9E5B-B1CFF250DC02}\RP23\A0004049.exe (Trojan.Agent) -> Quarantined and deleted successfully.
Malwarebytes' Anti-Malware 1.46
www.malwarebytes.org
Version de la base de données: 4427
Windows 5.1.2600 Service Pack 3
Internet Explorer 8.0.6001.18702
2010-08-14 10:27:44
mbam-log-2010-08-14 (10-27-44).txt
Type d'examen: Examen complet (A:\|C:\|D:\|)
Elément(s) analysé(s): 175932
Temps écoulé: 32 minute(s), 36 seconde(s)
Processus mémoire infecté(s): 0
Module(s) mémoire infecté(s): 0
Clé(s) du Registre infectée(s): 0
Valeur(s) du Registre infectée(s): 0
Elément(s) de données du Registre infecté(s): 0
Dossier(s) infecté(s): 0
Fichier(s) infecté(s): 1
Processus mémoire infecté(s):
(Aucun élément nuisible détecté)
Module(s) mémoire infecté(s):
(Aucun élément nuisible détecté)
Clé(s) du Registre infectée(s):
(Aucun élément nuisible détecté)
Valeur(s) du Registre infectée(s):
(Aucun élément nuisible détecté)
Elément(s) de données du Registre infecté(s):
(Aucun élément nuisible détecté)
Dossier(s) infecté(s):
(Aucun élément nuisible détecté)
Fichier(s) infecté(s):
C:\System Volume Information\_restore{70CA56FC-E8BD-4DB7-9E5B-B1CFF250DC02}\RP23\A0004049.exe (Trojan.Agent) -> Quarantined and deleted successfully.