Privacy protection. Amandine.
Résolu
Amandine
-
juju666 Messages postés 35446 Date d'inscription Statut Contributeur sécurité Dernière intervention -
juju666 Messages postés 35446 Date d'inscription Statut Contributeur sécurité Dernière intervention -
Bonjour,
Je suis emmmmmm---betée par "privacy protection"
J'ai trouvé un message sur ce forum, disant d'installer PreScan,
puis de mettre le rapport sur ci-joint
voici le lien (je copie d'un ordi a un autre, j'espere ne pas faire d'erreurs.. )
http://www.cijoint.fr/cjlink.php?file=cj201111/cijWfwkn1K.txt
que faire maintenant???
Je suis emmmmmm---betée par "privacy protection"
J'ai trouvé un message sur ce forum, disant d'installer PreScan,
puis de mettre le rapport sur ci-joint
voici le lien (je copie d'un ordi a un autre, j'espere ne pas faire d'erreurs.. )
http://www.cijoint.fr/cjlink.php?file=cj201111/cijWfwkn1K.txt
que faire maintenant???
A voir également:
- Privacy protection. Amandine.
- K9 web protection - Télécharger - Contrôle parental
- Qwant privacy - Guide
- Protection cellule excel - Guide
- Sentinel protection installer - Télécharger - Antivirus & Antimalwares
- Enlever protection hdcp - Forum Montage et acquisition vidéo
57 réponses
ca vient doucement.
Comment faire pour se proteger de ce genre de trucs? j'ai pas l'impressionn d'avoir telechargé quoique ce soit de zarbi...
Dis, je viens de regarder ton profil.. Tu as vraiment l'age que tu annonces???
Si oui, wao, je suis impressionnée....
Comment faire pour se proteger de ce genre de trucs? j'ai pas l'impressionn d'avoir telechargé quoique ce soit de zarbi...
Dis, je viens de regarder ton profil.. Tu as vraiment l'age que tu annonces???
Si oui, wao, je suis impressionnée....
Malwarebytes' Anti-Malware 1.51.2.1300
www.malwarebytes.org
Database version: 8127
Windows 6.1.7600
Internet Explorer 8.0.7600.16385
09/11/2011 19:21:56
mbam-log-2011-11-09 (19-21-56).txt
Scan type: Quick scan
Objects scanned: 244486
Time elapsed: 3 minute(s), 54 second(s)
Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 2
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 13
Memory Processes Infected:
(No malicious items detected)
Memory Modules Infected:
(No malicious items detected)
Registry Keys Infected:
(No malicious items detected)
Registry Values Infected:
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell (Backdoor.Agent) -> Value: Shell -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyServer (PUM.Bad.Proxy) -> Value: ProxyServer -> Quarantined and deleted successfully.
Registry Data Items Infected:
(No malicious items detected)
Folders Infected:
(No malicious items detected)
Files Infected:
c:\Users\Jacques\AppData\Roaming\5D0F.tmp (Exploit.Drop.Gen) -> Quarantined and deleted successfully.
c:\Users\Jacques\AppData\Roaming\privacy.exe (Exploit.Drop.Gen) -> Quarantined and deleted successfully.
c:\Users\Amandine\AppData\Local\Temp\0.2653240128209501.exe (Trojan.Inject.adb) -> Quarantined and deleted successfully.
c:\Users\Amandine\AppData\Local\Temp\0.38619619462459054.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
c:\Users\Amandine\AppData\Local\Temp\0.4831599768502617df35.exe (Trojan.Inject.adb) -> Quarantined and deleted successfully.
c:\Users\Jacques\AppData\Local\Temp\0.36412060538462776df35.exe (Trojan.Inject.adb) -> Quarantined and deleted successfully.
c:\Users\Jacques\AppData\Local\Temp\0.6776514901528916.exe (Trojan.Inject.adb) -> Quarantined and deleted successfully.
c:\Users\Jacques\AppData\Local\Temp\5CE0.tmp (Exploit.Drop.Gen) -> Quarantined and deleted successfully.
c:\Users\Jacques\AppData\Local\Temp\627D.tmp (Exploit.Drop.Gen) -> Quarantined and deleted successfully.
c:\Users\Jacques\AppData\Local\Temp\BF77.tmp (Exploit.Drop.Gen) -> Quarantined and deleted successfully.
c:\Users\Jacques\AppData\Local\Temp\C6C8.tmp (Exploit.Drop.Gen) -> Quarantined and deleted successfully.
c:\Users\Jacques\AppData\Local\Temp\~!#5B0D.tmp (Trojan.Agent) -> Quarantined and deleted successfully.
c:\Users\Jacques\AppData\Local\Temp\~!#BD18.tmp (Trojan.Agent) -> Quarantined and deleted successfully.
www.malwarebytes.org
Database version: 8127
Windows 6.1.7600
Internet Explorer 8.0.7600.16385
09/11/2011 19:21:56
mbam-log-2011-11-09 (19-21-56).txt
Scan type: Quick scan
Objects scanned: 244486
Time elapsed: 3 minute(s), 54 second(s)
Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 2
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 13
Memory Processes Infected:
(No malicious items detected)
Memory Modules Infected:
(No malicious items detected)
Registry Keys Infected:
(No malicious items detected)
Registry Values Infected:
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell (Backdoor.Agent) -> Value: Shell -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyServer (PUM.Bad.Proxy) -> Value: ProxyServer -> Quarantined and deleted successfully.
Registry Data Items Infected:
(No malicious items detected)
Folders Infected:
(No malicious items detected)
Files Infected:
c:\Users\Jacques\AppData\Roaming\5D0F.tmp (Exploit.Drop.Gen) -> Quarantined and deleted successfully.
c:\Users\Jacques\AppData\Roaming\privacy.exe (Exploit.Drop.Gen) -> Quarantined and deleted successfully.
c:\Users\Amandine\AppData\Local\Temp\0.2653240128209501.exe (Trojan.Inject.adb) -> Quarantined and deleted successfully.
c:\Users\Amandine\AppData\Local\Temp\0.38619619462459054.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
c:\Users\Amandine\AppData\Local\Temp\0.4831599768502617df35.exe (Trojan.Inject.adb) -> Quarantined and deleted successfully.
c:\Users\Jacques\AppData\Local\Temp\0.36412060538462776df35.exe (Trojan.Inject.adb) -> Quarantined and deleted successfully.
c:\Users\Jacques\AppData\Local\Temp\0.6776514901528916.exe (Trojan.Inject.adb) -> Quarantined and deleted successfully.
c:\Users\Jacques\AppData\Local\Temp\5CE0.tmp (Exploit.Drop.Gen) -> Quarantined and deleted successfully.
c:\Users\Jacques\AppData\Local\Temp\627D.tmp (Exploit.Drop.Gen) -> Quarantined and deleted successfully.
c:\Users\Jacques\AppData\Local\Temp\BF77.tmp (Exploit.Drop.Gen) -> Quarantined and deleted successfully.
c:\Users\Jacques\AppData\Local\Temp\C6C8.tmp (Exploit.Drop.Gen) -> Quarantined and deleted successfully.
c:\Users\Jacques\AppData\Local\Temp\~!#5B0D.tmp (Trojan.Agent) -> Quarantined and deleted successfully.
c:\Users\Jacques\AppData\Local\Temp\~!#BD18.tmp (Trojan.Agent) -> Quarantined and deleted successfully.
Oui j'ai 18 ans :-)
Nickel pour MBAM.
Nous allons effectuer un diagnostic de ton PC:
▶ Télécharge ZHPDiag
▶ Laisse toi guider lors de l'installation,coche "Ajouter une icône sur le bureau" et "Exécuter ZHPDiag"
▶ Clique sur l'icône représentant un tournevis vert et coche tout, puis sur l'icone représentant une loupe (« Lancer le diagnostic »)
▶ Une fois le scan aux 100%, ferme ZHPDiag. Héberge le rapport ZHPDiag.txt présent sur ton bureau.
Voici comment procéder
▶ Rends toi sur pjjoint.malekal.com
▶ Clique sur le bouton Parcourir
▶ Sélectionne le fichier que tu veux héberger et clique sur Ouvrir
▶ Clique sur le bouton Envoyer
▶ Un message de confirmation s'affiche (L'upload a réussi ! - Le lien à transmettre à vos correspondant pour visualiser le fichier est : https://pjjoint.malekal.com/files.php?id=df5ea299241015
▶ Copie le lien dans ta prochaine réponse.
A bientôt.
Nickel pour MBAM.
Nous allons effectuer un diagnostic de ton PC:
▶ Télécharge ZHPDiag
▶ Laisse toi guider lors de l'installation,coche "Ajouter une icône sur le bureau" et "Exécuter ZHPDiag"
▶ Clique sur l'icône représentant un tournevis vert et coche tout, puis sur l'icone représentant une loupe (« Lancer le diagnostic »)
▶ Une fois le scan aux 100%, ferme ZHPDiag. Héberge le rapport ZHPDiag.txt présent sur ton bureau.
Voici comment procéder
▶ Rends toi sur pjjoint.malekal.com
▶ Clique sur le bouton Parcourir
▶ Sélectionne le fichier que tu veux héberger et clique sur Ouvrir
▶ Clique sur le bouton Envoyer
▶ Un message de confirmation s'affiche (L'upload a réussi ! - Le lien à transmettre à vos correspondant pour visualiser le fichier est : https://pjjoint.malekal.com/files.php?id=df5ea299241015
▶ Copie le lien dans ta prochaine réponse.
A bientôt.
Vous n’avez pas trouvé la réponse que vous recherchez ?
Posez votre question
ca me demande un login et un mot de passe pour un serveur.
j'ai pas du trouver le bon lien :/
Deux fois plus que ton age, mais loin d'etre aussi douée pour gerer mon ordi...
j'ai pas du trouver le bon lien :/
Deux fois plus que ton age, mais loin d'etre aussi douée pour gerer mon ordi...
mdr non du as pris l'analyseur de rapport, pas le logiciel de diagnostic ^^
ftp://zebulon.fr/ZHPDiag2.exe
ftp://zebulon.fr/ZHPDiag2.exe
nan, mais attends, je dois etre sacrement neuneu, ca me demande un login et un mot de passe.
Je me mets tetre en anonyme
(j'aurais ptetre pas du prendre d'apero, moi... :/
Je me mets tetre en anonyme
(j'aurais ptetre pas du prendre d'apero, moi... :/
bref ^^
▶ Télécharge http://www.geekstogo.com/forum/files/file/398-otl-oldtimers-list-it/ sur ton bureau.
(Sous Vista/Win7, il faut cliquer droit sur OTL et choisir Exécuter en tant qu''administrateur)
▶ Lance OTL
▶ Sous Personnalisation, copie-colle ce qu''il y a dans le cadre ci-dessous :
▶ Clique sur le bouton Analyse.
▶ Quand le scan est fini, utilise le site http://pjjoint.malekal.com/ pour envoyer les rapports.
Donnes le liens pjjoint ici ensuite pour pouvoir être consultés.
▶ Télécharge http://www.geekstogo.com/forum/files/file/398-otl-oldtimers-list-it/ sur ton bureau.
(Sous Vista/Win7, il faut cliquer droit sur OTL et choisir Exécuter en tant qu''administrateur)
▶ Lance OTL
▶ Sous Personnalisation, copie-colle ce qu''il y a dans le cadre ci-dessous :
netsvcs msconfig safebootminimal safebootnetwork activex drivers32 %ALLUSERSPROFILE%\Application Data\*. %ALLUSERSPROFILE%\Application Data\*.exe /s %APPDATA%\*. %APPDATA%\*.exe /s %temp%\*.exe /s %SYSTEMDRIVE%\*.exe %systemroot%\*. /mp /s %systemroot%\system32\*.dll /lockedfiles %systemroot%\Tasks\*.job /lockedfiles %systemroot%\system32\drivers\*.sys /lockedfiles %systemroot%\System32\config\*.sav /md5start explorer.exe winlogon.exe wininit.exe /md5stop CREATERESTOREPOINT nslookup www.google.fr /c
▶ Clique sur le bouton Analyse.
▶ Quand le scan est fini, utilise le site http://pjjoint.malekal.com/ pour envoyer les rapports.
Donnes le liens pjjoint ici ensuite pour pouvoir être consultés.
bon, tout comme l'autre soir.
OTL se bloque et ne repond plus.
j'ai une fenetre de commande qui s'ouvre
C:\Users\Amandine\Desktop\NSLOOKUP WWW.GOOGLE.FR 1>"C:\Users\Amandine\Desktop\cmd.txt"
et une fenetre d'erreur avec comme titre nslookup.exe l'ordinal est introuvable
et comme texte : l'ordinal 1108 est introuvable dans la bibliotheque de liens dynamiques WSOCK32.dll
OTL se bloque et ne repond plus.
j'ai une fenetre de commande qui s'ouvre
C:\Users\Amandine\Desktop\NSLOOKUP WWW.GOOGLE.FR 1>"C:\Users\Amandine\Desktop\cmd.txt"
et une fenetre d'erreur avec comme titre nslookup.exe l'ordinal est introuvable
et comme texte : l'ordinal 1108 est introuvable dans la bibliotheque de liens dynamiques WSOCK32.dll
fais ce script :
netsvcs msconfig safebootminimal safebootnetwork activex drivers32 %ALLUSERSPROFILE%\Application Data\*. %ALLUSERSPROFILE%\Application Data\*.exe /s %APPDATA%\*. %APPDATA%\*.exe /s %temp%\*.exe /s %SYSTEMDRIVE%\*.exe %systemroot%\*. /mp /s %systemroot%\system32\*.dll /lockedfiles %systemroot%\Tasks\*.job /lockedfiles %systemroot%\system32\drivers\*.sys /lockedfiles %systemroot%\System32\config\*.sav /md5start explorer.exe winlogon.exe wininit.exe /md5stop CREATERESTOREPOINT
y'a a nouveau une mise a jour qui a voulu se faire
avec ouvertur en parallele de mozilla sur ce site
famous****searchsystem , sans les etoiles, bien sur....
avec ouvertur en parallele de mozilla sur ce site
famous****searchsystem , sans les etoiles, bien sur....
(j'ai testé de mettre un mdp, c'est ton pseudo ici)
http://pjjoint.malekal.com/files.php?id=y7j14x10y9w8u10b12p12l13h7q11c14b13c11i9p5l14k14x14p8
http://pjjoint.malekal.com/files.php?id=t6m119w9y15c14h7w15v6n6u9h9t7q15s14r7y9u15s5i11
http://pjjoint.malekal.com/files.php?id=y7j14x10y9w8u10b12p12l13h7q11c14b13c11i9p5l14k14x14p8
http://pjjoint.malekal.com/files.php?id=t6m119w9y15c14h7w15v6n6u9h9t7q15s14r7y9u15s5i11
ah ben mince alors...
http://pjjoint.malekal.com/files.php?id=p7q15o7i9d6c15e12y10b11y15i9l10t13o11h8k13k7g5p78
http://pjjoint.malekal.com/files.php?id=t7q11l7q6r15m14w13v6f5l13e13o5q9g7d10m11l12s99i5
http://pjjoint.malekal.com/files.php?id=p7q15o7i9d6c15e12y10b11y15i9l10t13o11h8k13k7g5p78
http://pjjoint.malekal.com/files.php?id=t7q11l7q6r15m14w13v6f5l13e13o5q9g7d10m11l12s99i5
c est un bug chez malekal ;)
'ATTENTION !!! : Script personnalisé pour cette machine uniquement , ne pas reproduire !!
si tu as XP => double clique
si tu as Vista ou windows 7 => clic droit "executer en tant que...."
sur OTL.exe pour le lancer.
▶ Copie/colle les lignes suivantes en gras et place les dans la zone "personnalisation" :
:OTL
FF - prefs.js..browser.search.defaultenginename: "Durable"
FF - prefs.js..browser.search.defaulturl: "http://www.durable.com/result?cx=partner-pub-7902900401080901%3Azbljezwsgul&cof=FORID%3A10&ie=UTF-8&q="
:commands
[emptytemp]
▶ Clique sur « Correction » et laisse l''outil travailler. L''ordinateur redémarre.
▶ Copie/colle la totalité du rapport dans ta prochaine réponse.
'ATTENTION !!! : Script personnalisé pour cette machine uniquement , ne pas reproduire !!
si tu as XP => double clique
si tu as Vista ou windows 7 => clic droit "executer en tant que...."
sur OTL.exe pour le lancer.
▶ Copie/colle les lignes suivantes en gras et place les dans la zone "personnalisation" :
:OTL
FF - prefs.js..browser.search.defaultenginename: "Durable"
FF - prefs.js..browser.search.defaulturl: "http://www.durable.com/result?cx=partner-pub-7902900401080901%3Azbljezwsgul&cof=FORID%3A10&ie=UTF-8&q="
:commands
[emptytemp]
▶ Clique sur « Correction » et laisse l''outil travailler. L''ordinateur redémarre.
▶ Copie/colle la totalité du rapport dans ta prochaine réponse.
All processes killed
========== OTL ==========
Prefs.js: "Durable" removed from browser.search.defaultenginename
Prefs.js: "http://www.durable.com/result?cx=partner-pub-7902900401080901%3Azbljezwsgul&cof=FORID%3A10&ie=UTF-8&q=" removed from browser.search.defaulturl
========== COMMANDS ==========
[EMPTYTEMP]
User: All Users
User: Amandine
->Temp folder emptied: 665185372 bytes
->Temporary Internet Files folder emptied: 488882172 bytes
->Java cache emptied: 8675524 bytes
->FireFox cache emptied: 53819072 bytes
->Flash cache emptied: 83427 bytes
User: Célian
->Temp folder emptied: 144836 bytes
->Temporary Internet Files folder emptied: 48976251 bytes
->Java cache emptied: 0 bytes
->Flash cache emptied: 2752 bytes
User: Default
->Temp folder emptied: 0 bytes
->Temporary Internet Files folder emptied: 0 bytes
User: Default User
->Temp folder emptied: 0 bytes
->Temporary Internet Files folder emptied: 0 bytes
User: Fabien
User: Invité
->Temp folder emptied: 100147 bytes
->Temporary Internet Files folder emptied: 42240042 bytes
->Java cache emptied: 0 bytes
->FireFox cache emptied: 32408697 bytes
->Flash cache emptied: 922 bytes
User: Jacques
->Temp folder emptied: 3865538 bytes
->Temporary Internet Files folder emptied: 88967766 bytes
->Java cache emptied: 1040758 bytes
->FireFox cache emptied: 59472690 bytes
->Flash cache emptied: 11017 bytes
User: Lise
->Temp folder emptied: 45894 bytes
->Temporary Internet Files folder emptied: 10028606 bytes
->Java cache emptied: 0 bytes
->Flash cache emptied: 683 bytes
User: Public
%systemdrive% .tmp files removed: 0 bytes
%systemroot% .tmp files removed: 0 bytes
%systemroot%\System32 .tmp files removed: 0 bytes
%systemroot%\System32 (64bit) .tmp files removed: 0 bytes
%systemroot%\System32\drivers .tmp files removed: 0 bytes
Windows Temp folder emptied: 227330535 bytes
%systemroot%\sysnative\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files folder emptied: 64925934 bytes
RecycleBin emptied: 2497620510 bytes
Total Files Cleaned = 4 095,00 mb
OTL by OldTimer - Version 3.2.31.0 log created on 11092011_215204
Files\Folders moved on Reboot...
C:\Users\Amandine\AppData\Local\Temp\Low\{E9C1E1AC-C9B2-4c85-94DE-9C1518918D02}.tlb moved successfully.
C:\Users\Amandine\AppData\Local\Temp\FXSAPIDebugLogFile.txt moved successfully.
C:\Users\Amandine\AppData\Local\Temp\{E9C1E1AC-C9B2-4c85-94DE-9C1518918D02}.tlb moved successfully.
C:\Users\Amandine\AppData\Local\Temp\{E9C1E1AC-C9B2-4c85-94DE-9C1518918D12}.tlb moved successfully.
C:\Users\Amandine\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\RKJNFWOW\ads[1].htm moved successfully.
C:\Users\Amandine\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\RKJNFWOW\aiCAODVUIH.htm moved successfully.
C:\Users\Amandine\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\RKJNFWOW\ai[6].htm moved successfully.
C:\Users\Amandine\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\RKJNFWOW\ai[7].htm moved successfully.
C:\Users\Amandine\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\RKJNFWOW\map2_iframe[1].htm moved successfully.
C:\Users\Amandine\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\RKJNFWOW\spip[1].htm moved successfully.
C:\Users\Amandine\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\O7AK0UGV\ai[10].htm moved successfully.
C:\Users\Amandine\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\O7AK0UGV\ai[7].htm moved successfully.
C:\Users\Amandine\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\O7AK0UGV\ai[8].htm moved successfully.
C:\Users\Amandine\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\O7AK0UGV\ai[9].htm moved successfully.
C:\Users\Amandine\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\O7AK0UGV\facebook_comCACWLI6D.htm moved successfully.
C:\Users\Amandine\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\7V2IV2CK\12[1].htm moved successfully.
C:\Users\Amandine\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\7V2IV2CK\ads[3].htm moved successfully.
C:\Users\Amandine\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\7V2IV2CK\ai[10].htm moved successfully.
C:\Users\Amandine\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\7V2IV2CK\ai[11].htm moved successfully.
C:\Users\Amandine\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\7V2IV2CK\ai[9].htm moved successfully.
C:\Users\Amandine\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\7V2IV2CK\generic[1].htm moved successfully.
C:\Users\Amandine\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\7V2IV2CK\grab[1].cur moved successfully.
C:\Users\Amandine\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\7V2IV2CK\marches-histoire_fr[1] moved successfully.
C:\Users\Amandine\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\7V2IV2CK\search[1].htm moved successfully.
C:\Users\Amandine\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\7LBC9E95\affich-23599265-privacy-protection-amandine[1].txt moved successfully.
C:\Users\Amandine\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\7LBC9E95\ai[11].htm moved successfully.
C:\Users\Amandine\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\7LBC9E95\ai[4].htm moved successfully.
C:\Users\Amandine\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\7LBC9E95\ai[5].htm moved successfully.
C:\Users\Amandine\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\7LBC9E95\calendrier[1].htm moved successfully.
C:\Users\Amandine\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\MSIMGSIZ.DAT moved successfully.
C:\Windows\temp\{E9C1E1AC-C9B2-4c85-94DE-9C1518918D02}.tlb moved successfully.
C:\Windows\temp\{E9C1E1AC-C9B2-4c85-94DE-9C1518918D12}.tlb moved successfully.
Registry entries deleted on Reboot...
========== OTL ==========
Prefs.js: "Durable" removed from browser.search.defaultenginename
Prefs.js: "http://www.durable.com/result?cx=partner-pub-7902900401080901%3Azbljezwsgul&cof=FORID%3A10&ie=UTF-8&q=" removed from browser.search.defaulturl
========== COMMANDS ==========
[EMPTYTEMP]
User: All Users
User: Amandine
->Temp folder emptied: 665185372 bytes
->Temporary Internet Files folder emptied: 488882172 bytes
->Java cache emptied: 8675524 bytes
->FireFox cache emptied: 53819072 bytes
->Flash cache emptied: 83427 bytes
User: Célian
->Temp folder emptied: 144836 bytes
->Temporary Internet Files folder emptied: 48976251 bytes
->Java cache emptied: 0 bytes
->Flash cache emptied: 2752 bytes
User: Default
->Temp folder emptied: 0 bytes
->Temporary Internet Files folder emptied: 0 bytes
User: Default User
->Temp folder emptied: 0 bytes
->Temporary Internet Files folder emptied: 0 bytes
User: Fabien
User: Invité
->Temp folder emptied: 100147 bytes
->Temporary Internet Files folder emptied: 42240042 bytes
->Java cache emptied: 0 bytes
->FireFox cache emptied: 32408697 bytes
->Flash cache emptied: 922 bytes
User: Jacques
->Temp folder emptied: 3865538 bytes
->Temporary Internet Files folder emptied: 88967766 bytes
->Java cache emptied: 1040758 bytes
->FireFox cache emptied: 59472690 bytes
->Flash cache emptied: 11017 bytes
User: Lise
->Temp folder emptied: 45894 bytes
->Temporary Internet Files folder emptied: 10028606 bytes
->Java cache emptied: 0 bytes
->Flash cache emptied: 683 bytes
User: Public
%systemdrive% .tmp files removed: 0 bytes
%systemroot% .tmp files removed: 0 bytes
%systemroot%\System32 .tmp files removed: 0 bytes
%systemroot%\System32 (64bit) .tmp files removed: 0 bytes
%systemroot%\System32\drivers .tmp files removed: 0 bytes
Windows Temp folder emptied: 227330535 bytes
%systemroot%\sysnative\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files folder emptied: 64925934 bytes
RecycleBin emptied: 2497620510 bytes
Total Files Cleaned = 4 095,00 mb
OTL by OldTimer - Version 3.2.31.0 log created on 11092011_215204
Files\Folders moved on Reboot...
C:\Users\Amandine\AppData\Local\Temp\Low\{E9C1E1AC-C9B2-4c85-94DE-9C1518918D02}.tlb moved successfully.
C:\Users\Amandine\AppData\Local\Temp\FXSAPIDebugLogFile.txt moved successfully.
C:\Users\Amandine\AppData\Local\Temp\{E9C1E1AC-C9B2-4c85-94DE-9C1518918D02}.tlb moved successfully.
C:\Users\Amandine\AppData\Local\Temp\{E9C1E1AC-C9B2-4c85-94DE-9C1518918D12}.tlb moved successfully.
C:\Users\Amandine\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\RKJNFWOW\ads[1].htm moved successfully.
C:\Users\Amandine\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\RKJNFWOW\aiCAODVUIH.htm moved successfully.
C:\Users\Amandine\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\RKJNFWOW\ai[6].htm moved successfully.
C:\Users\Amandine\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\RKJNFWOW\ai[7].htm moved successfully.
C:\Users\Amandine\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\RKJNFWOW\map2_iframe[1].htm moved successfully.
C:\Users\Amandine\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\RKJNFWOW\spip[1].htm moved successfully.
C:\Users\Amandine\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\O7AK0UGV\ai[10].htm moved successfully.
C:\Users\Amandine\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\O7AK0UGV\ai[7].htm moved successfully.
C:\Users\Amandine\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\O7AK0UGV\ai[8].htm moved successfully.
C:\Users\Amandine\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\O7AK0UGV\ai[9].htm moved successfully.
C:\Users\Amandine\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\O7AK0UGV\facebook_comCACWLI6D.htm moved successfully.
C:\Users\Amandine\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\7V2IV2CK\12[1].htm moved successfully.
C:\Users\Amandine\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\7V2IV2CK\ads[3].htm moved successfully.
C:\Users\Amandine\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\7V2IV2CK\ai[10].htm moved successfully.
C:\Users\Amandine\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\7V2IV2CK\ai[11].htm moved successfully.
C:\Users\Amandine\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\7V2IV2CK\ai[9].htm moved successfully.
C:\Users\Amandine\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\7V2IV2CK\generic[1].htm moved successfully.
C:\Users\Amandine\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\7V2IV2CK\grab[1].cur moved successfully.
C:\Users\Amandine\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\7V2IV2CK\marches-histoire_fr[1] moved successfully.
C:\Users\Amandine\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\7V2IV2CK\search[1].htm moved successfully.
C:\Users\Amandine\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\7LBC9E95\affich-23599265-privacy-protection-amandine[1].txt moved successfully.
C:\Users\Amandine\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\7LBC9E95\ai[11].htm moved successfully.
C:\Users\Amandine\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\7LBC9E95\ai[4].htm moved successfully.
C:\Users\Amandine\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\7LBC9E95\ai[5].htm moved successfully.
C:\Users\Amandine\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\7LBC9E95\calendrier[1].htm moved successfully.
C:\Users\Amandine\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\MSIMGSIZ.DAT moved successfully.
C:\Windows\temp\{E9C1E1AC-C9B2-4c85-94DE-9C1518918D02}.tlb moved successfully.
C:\Windows\temp\{E9C1E1AC-C9B2-4c85-94DE-9C1518918D12}.tlb moved successfully.
Registry entries deleted on Reboot...