Mon PC rame enormement.
Fermé
jcproux
Messages postés
6
Date d'inscription
lundi 21 avril 2014
Statut
Membre
Dernière intervention
21 avril 2014
-
21 avril 2014 à 16:29
ArnaudLy6 Messages postés 4412 Date d'inscription samedi 22 mai 2010 Statut Membre Dernière intervention 13 février 2016 - 22 avril 2014 à 18:13
ArnaudLy6 Messages postés 4412 Date d'inscription samedi 22 mai 2010 Statut Membre Dernière intervention 13 février 2016 - 22 avril 2014 à 18:13
A voir également:
- Mon PC rame enormement.
- Mon pc rame que faire - Guide
- Test performance pc - Guide
- Reinitialiser pc - Guide
- Mon pc s'allume mais ne démarre pas windows 10 - Guide
- Plus de son sur mon pc - Guide
3 réponses
ArnaudLy6
Messages postés
4412
Date d'inscription
samedi 22 mai 2010
Statut
Membre
Dernière intervention
13 février 2016
189
21 avril 2014 à 16:38
21 avril 2014 à 16:38
Salut,
Lance le suppression avec AdwCleaner et suis ces étapes :
Télécharge Malwarebytes Anti-Malware : https://www.commentcamarche.net/telecharger/securite/14361-malwarebytes-anti-malware/
- Décoche "Activer l'essai gratuit de Malwarebytes Anti-Malware Premium"
- Lance MalwareBytes
- Dans l'onglet Tableau de Bord, clique sur Mettre à jour
- Clique ensuite sur l'onglet " Examen "
- Coche " Examen Menaces "
- Clique sur " Examiner maintenant "
- Attends la fin de l'analyse
- Une fois l'analyse terminée, clique sur " Tout mettre en quarantaine "
- Accepte le redémarrage du PC
Une fois que ton ordinateur a redémarré, relance Malwarebytes Anti-Malware et cette fois-ci rends toi dans l'onglet " Historique ",
puis " Journaux de l'application ".
Sélectionne le rapport le plus récent, ouvre-le et clique en bas sur Coller dans le presse-papier.
Il ne te reste plus qu'à coller le rapport dans ton prochain message.
Lance le suppression avec AdwCleaner et suis ces étapes :
Télécharge Malwarebytes Anti-Malware : https://www.commentcamarche.net/telecharger/securite/14361-malwarebytes-anti-malware/
- Décoche "Activer l'essai gratuit de Malwarebytes Anti-Malware Premium"
- Lance MalwareBytes
- Dans l'onglet Tableau de Bord, clique sur Mettre à jour
- Clique ensuite sur l'onglet " Examen "
- Coche " Examen Menaces "
- Clique sur " Examiner maintenant "
- Attends la fin de l'analyse
- Une fois l'analyse terminée, clique sur " Tout mettre en quarantaine "
- Accepte le redémarrage du PC
Une fois que ton ordinateur a redémarré, relance Malwarebytes Anti-Malware et cette fois-ci rends toi dans l'onglet " Historique ",
puis " Journaux de l'application ".
Sélectionne le rapport le plus récent, ouvre-le et clique en bas sur Coller dans le presse-papier.
Il ne te reste plus qu'à coller le rapport dans ton prochain message.
cabrier
Messages postés
5591
Date d'inscription
dimanche 7 août 2011
Statut
Contributeur sécurité
Dernière intervention
27 octobre 2020
702
21 avril 2014 à 16:38
21 avril 2014 à 16:38
Et bien il y avait du monde !
Continue par :
Utilise cet autre outil pour vérification :Télécharge: Junkware Removal Tool à partir ce lien : JRT
!!! Ne clique pas sur Download !!! , attends simplement que la fenêtre de téléchargement arrive pour confirmation
* Enregistre ce fichier sur le bureau et ferme tous tes navigateurs
Sous XP, double-clique sur l'icône et presse une touche lorsque cela te sera demandé.
Sous Vista/7/8, clic droit et Exécuter en temps qu'administrateur.
* NB: Le bureau disparaitra un instant, c'est normal.
* Laisse le programme travailler ne touche à rien
* Poste le rapport généré à la fin de l'analyse.
Tuto : http://hackinginterdit.blogspot.fr/2013/02/junkware-removal-tool.html
A+
Continue par :
Utilise cet autre outil pour vérification :Télécharge: Junkware Removal Tool à partir ce lien : JRT
!!! Ne clique pas sur Download !!! , attends simplement que la fenêtre de téléchargement arrive pour confirmation
* Enregistre ce fichier sur le bureau et ferme tous tes navigateurs
Sous XP, double-clique sur l'icône et presse une touche lorsque cela te sera demandé.
Sous Vista/7/8, clic droit et Exécuter en temps qu'administrateur.
* NB: Le bureau disparaitra un instant, c'est normal.
* Laisse le programme travailler ne touche à rien
* Poste le rapport généré à la fin de l'analyse.
Tuto : http://hackinginterdit.blogspot.fr/2013/02/junkware-removal-tool.html
A+
jcproux
Messages postés
6
Date d'inscription
lundi 21 avril 2014
Statut
Membre
Dernière intervention
21 avril 2014
21 avril 2014 à 16:42
21 avril 2014 à 16:42
Bonjour à vous 2 et merci bp.
Je vais essayer ça de suite et je reviens vers vous.
Je vais essayer ça de suite et je reviens vers vous.
cabrier
Messages postés
5591
Date d'inscription
dimanche 7 août 2011
Statut
Contributeur sécurité
Dernière intervention
27 octobre 2020
702
21 avril 2014 à 17:15
21 avril 2014 à 17:15
@ ArnaudLy +1 --- Bien vu, j'ai tellement l'habitude de faire lancer AdwCleaner en Nettoyage que je n'avais pas vu que son rapport était en [Recherche]
Je te laisse continuer, j'ai d'autres sujets .....!
Bonne chasse.
Je te laisse continuer, j'ai d'autres sujets .....!
Bonne chasse.
ArnaudLy6
Messages postés
4412
Date d'inscription
samedi 22 mai 2010
Statut
Membre
Dernière intervention
13 février 2016
189
21 avril 2014 à 17:16
21 avril 2014 à 17:16
Pas de problème !
jcproux
Messages postés
6
Date d'inscription
lundi 21 avril 2014
Statut
Membre
Dernière intervention
21 avril 2014
21 avril 2014 à 20:10
21 avril 2014 à 20:10
re bonjour,
voilà le rapport :
Malwarebytes Anti-Malware
www.malwarebytes.org
Date de l'examen: 18/04/2014
Heure de l'examen: 11:46:11
Fichier journal:
Administrateur: Oui
Version: 2.00.1.1004
Base de données Malveillants: v2014.04.21.05
Base de données Rootkits: v2014.03.27.01
Licence: Gratuite
Protection contre les malveillants: Désactivé(e)
Protection contre les sites Web malveillants: Désactivé(e)
Chameleon: Désactivé(e)
Système d'exploitation: Windows 7 Service Pack 1
Processeur: x64
Système de fichiers: NTFS
Utilisateur: jcrico
Type d'examen: Examen "Menaces"
Résultat: Terminé
Objets analysés: 296037
Temps écoulé: 1192 h, 55 min, 46 sec
Mémoire: Activé(e)
Démarrage: Activé(e)
Système de fichiers: Activé(e)
Archives: Activé(e)
Rootkits: Désactivé(e)
Shuriken: Activé(e)
PUP: Activé(e)
PUM: Activé(e)
Processus: 1
PUP.Optional.PCPowerSpeed.A, C:\Program Files (x86)\PCPowerSpeed\PCPowerTray.exe, 4060, Supprimé-au-redémarrage, [2acf909c4d2e2b0bf43fe1bb5fa450b0]
Modules: 0
(No malicious items detected)
Clés du Registre: 16
PUP.Optional.MindSpark.A, HKLM\SOFTWARE\WOW6432NODE\CLASSES\CLSID\{1e91a655-bb4b-4693-a05e-2edebc4c9d89}, Mis en quarantaine, [d92073b90774e2541b8bef27ec16fe02],
PUP.Optional.MindSpark.A, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\BROWSER HELPER OBJECTS\{1E91A655-BB4B-4693-A05E-2EDEBC4C9D89}, Mis en quarantaine, [d92073b90774e2541b8bef27ec16fe02],
PUP.Optional.MindSpark.A, HKU\S-1-5-21-608392418-1027056679-4062015191-1001-{ED1FC765-E35E-4C3D-BF15-2C2B11260CE4}-0\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXT\STATS\{1E91A655-BB4B-4693-A05E-2EDEBC4C9D89}, Mis en quarantaine, [d92073b90774e2541b8bef27ec16fe02],
PUP.Optional.MindSpark.A, HKLM\SOFTWARE\WOW6432NODE\CLASSES\CLSID\{71c1d63a-c944-428a-a5bd-ba513190e5d2}, Mis en quarantaine, [e1187eae572453e3b6f519fd788ab54b],
PUP.Optional.MindSpark.A, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\BROWSER HELPER OBJECTS\{71C1D63A-C944-428A-A5BD-BA513190E5D2}, Mis en quarantaine, [e1187eae572453e3b6f519fd788ab54b],
PUP.Optional.MindSpark.A, HKU\S-1-5-21-608392418-1027056679-4062015191-1001-{ED1FC765-E35E-4C3D-BF15-2C2B11260CE4}-0\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXT\STATS\{71C1D63A-C944-428A-A5BD-BA513190E5D2}, Mis en quarantaine, [e1187eae572453e3b6f519fd788ab54b],
PUP.Optional.InboxToolBar.A, HKLM\SOFTWARE\CLASSES\Inbox.WS.com IE Toolbar, Mis en quarantaine, [9f5a919bf586e15532e482cc38cab050],
PUP.Optional.InboxToolBar.A, HKLM\SOFTWARE\WOW6432NODE\CLASSES\Inbox.WS.com IE Toolbar, Mis en quarantaine, [db1eee3ee39802347b9b53fb847e8a76],
PUP.Optional.FunWebProducts.A, HKLM\SOFTWARE\CLASSES\MapsGalaxy_39.SkinLauncherSettings, Mis en quarantaine, [db1e5ad2d7a4ed493af2fe507e84f20e],
PUP.Optional.FunWebProducts.A, HKLM\SOFTWARE\CLASSES\MapsGalaxy_39.SkinLauncherSettings.1, Mis en quarantaine, [de1b86a6720948ee1d0f58f6a959758b],
PUP.Optional.FunWebProducts.A, HKLM\SOFTWARE\WOW6432NODE\CLASSES\MapsGalaxy_39.SkinLauncherSettings, Mis en quarantaine, [de1b86a6720948ee1d0f58f6a959758b],
PUP.Optional.FunWebProducts.A, HKLM\SOFTWARE\WOW6432NODE\CLASSES\MapsGalaxy_39.SkinLauncherSettings.1, Mis en quarantaine, [de1b86a6720948ee1d0f58f6a959758b],
PUP.Optional.PCPowerSpeed.A, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\UNINSTALL\{B0C56FD7-493D-44DD-B007-BBB5117D6E6F}_is1, Mis en quarantaine, [2acf909c4d2e2b0bf43fe1bb5fa450b0],
PUP.Optional.PCPowerSpeed.A, HKLM\SOFTWARE\WOW6432NODE\PCPOWERSPEED, Mis en quarantaine, [f0095dcf8deed46243f2d4c8b15237c9],
PUP.Optional.Pricora.A, HKU\S-1-5-18-{ED1FC765-E35E-4C3D-BF15-2C2B11260CE4}-0\SOFTWARE\APPDATALOW\SOFTWARE\Pricora 1.1, Mis en quarantaine, [1adf0f1dc2b993a3728096e441c150b0],
PUP.Optional.PCPowerSpeed.A, HKU\S-1-5-21-608392418-1027056679-4062015191-1001-{ED1FC765-E35E-4C3D-BF15-2C2B11260CE4}-0\SOFTWARE\PCPOWERSPEED, Mis en quarantaine, [bf3a989448337cba1321d7c5d0336b95],
Valeurs du Registre: 8
PUP.Optional.MindSpark.A, HKU\S-1-5-21-608392418-1027056679-4062015191-1001-{ED1FC765-E35E-4C3D-BF15-2C2B11260CE4}-0\SOFTWARE\MICROSOFT\INTERNET EXPLORER\URLSEARCHHOOKS\{26842a09-ffa8-4e2c-ae12-0c80f01c3295}, Mis en quarantaine, [7980d95387f4ed493473b264f40e6898],
PUP.Optional.MindSpark.A, HKU\S-1-5-21-608392418-1027056679-4062015191-1001-{ED1FC765-E35E-4C3D-BF15-2C2B11260CE4}-0\SOFTWARE\MICROSOFT\INTERNET EXPLORER\URLSEARCHHOOKS|{26842A09-FFA8-4E2C-AE12-0C80F01C3295}, Mis en quarantaine, [7980d95387f4ed493473b264f40e6898],
PUP.Optional.PCPowerSpeed.A, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN|PCPowerSpeed, "C:\Program Files (x86)\PCPowerSpeed\PCPowerTray.exe" /startup, Mis en quarantaine, [2acf909c4d2e2b0bf43fe1bb5fa450b0]
PUP.Optional.MindSpark.A, HKLM\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN|MapsGalaxy Home Page Guard 64 bit, "C:\PROGRA~2\MAPSGA~2\bar\2.bin\AppIntegrator64.exe", Mis en quarantaine, [2bce51db0b704fe74bf23a3859a937c9]
PUP.Optional.PCPowerSpeed.A, HKLM\SOFTWARE\WOW6432NODE\PCPOWERSPEED|PHONE_NUMBER, +1 561-948-2946, Mis en quarantaine, [f0095dcf8deed46243f2d4c8b15237c9]
PUM.UserWLoad, HKU\S-1-5-21-608392418-1027056679-4062015191-1001-{ED1FC765-E35E-4C3D-BF15-2C2B11260CE4}-0\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINDOWS|Load, C:\Users\jcrico\LOCALS~1\Temp\msykoy.cmd, Mis en quarantaine, [8b6ee74503780234b8b50c7ca75b1ce4]
Trojan.Ransom, HKU\S-1-5-21-608392418-1027056679-4062015191-1001-{ED1FC765-E35E-4C3D-BF15-2C2B11260CE4}-0\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINDOWS|Load, C:\Users\jcrico\LOCALS~1\Temp\msykoy.cmd, Mis en quarantaine, [a752cb610a714ee8050b3f4db54d32ce]
PUP.Optional.PCPowerSpeed.A, HKU\S-1-5-21-608392418-1027056679-4062015191-1001-{ED1FC765-E35E-4C3D-BF15-2C2B11260CE4}-0\SOFTWARE\PCPOWERSPEED|LAST_CMS_UPDATE,  Éâ'¬opbä@, Mis en quarantaine, [bf3a989448337cba1321d7c5d0336b95]
Données du Registre: 0
(No malicious items detected)
Dossiers: 6
PUP.Optional.PCPowerSpeed.A, C:\ProgramData\PCPowerSpeed, Mis en quarantaine, [a85135f76d0e72c430028319b0538c74],
PUP.Optional.PCPowerSpeed.A, C:\ProgramData\PCPowerSpeed\Backup, Mis en quarantaine, [a85135f76d0e72c430028319b0538c74],
PUP.Optional.PCPowerSpeed.A, C:\ProgramData\PCPowerSpeed\Startup, Mis en quarantaine, [a85135f76d0e72c430028319b0538c74],
PUP.Optional.PCPowerSpeed.A, C:\ProgramData\PCPowerSpeed\Translate, Mis en quarantaine, [a85135f76d0e72c430028319b0538c74],
PUP.Optional.PCPowerSpeed.A, C:\Program Files (x86)\PCPowerSpeed, Supprimé-au-redémarrage, [2acf909c4d2e2b0bf43fe1bb5fa450b0],
PUP.Optional.PCPowerSpeed.A, C:\Program Files (x86)\PCPowerSpeed\Update, Mis en quarantaine, [2acf909c4d2e2b0bf43fe1bb5fa450b0],
Fichiers: 15
Trojan.Banker.Kreapixel, C:\Users\jcrico\AppData\Roaming\~pqtafql.exe, Mis en quarantaine, [f00946e62a51d2647c42de599c655ca4],
PUP.Optional.InstallIQ.A, C:\Users\mauricette et jc\Desktop\FinalMediaPlayerSetup.exe, Mis en quarantaine, [28d1f735d7a4db5bf26922ef719018e8],
PUP.Optional.Babylon.A, C:\Users\jcrico\AppData\Local\Temp\MyBabylonTB.exe, Mis en quarantaine, [a455200c80fb62d48e2b1509f10fcd33],
Trojan.Agent, C:\Users\jcrico\AppData\Local\Temp\ch8l0.exe, Mis en quarantaine, [ca2f95979be0a49275379fe540c0827e],
PUP.Optional.BubbleDock.A, C:\Users\jcrico\AppData\Local\Temp\1422014142834\Uninstall Bubble Dock.exe, Mis en quarantaine, [fdfc0824e596dd59b3f579bc9e6350b0],
PUP.Optional.Bubbledock.A, C:\Users\jcrico\AppData\Roaming\Bubble Dock.boostrap.log, Mis en quarantaine, [80795cd06813dd59cea37d02639fa858],
PUP.Optional.Searchqu.A, C:\Users\jcrico\AppData\Roaming\Mozilla\Extensions\{1FD91A9C-410C-4090-BBCC-55D3450EF433}, Mis en quarantaine, [43b6cc60ef8c39fd1890b2e4c43f9d63],
PUP.Optional.PCFixSpeed, C:\Users\Public\Desktop\Optimisez votre PC.lnk, Mis en quarantaine, [37c297953c3f5ed8736e1484d62d15eb],
PUP.Optional.PCPowerSpeed.A, C:\ProgramData\PCPowerSpeed\addons.xml, Mis en quarantaine, [a85135f76d0e72c430028319b0538c74],
PUP.Optional.PCPowerSpeed.A, C:\ProgramData\PCPowerSpeed\Translate\lng.ini, Mis en quarantaine, [a85135f76d0e72c430028319b0538c74],
PUP.Optional.PCPowerSpeed.A, C:\Program Files (x86)\PCPowerSpeed\unins000.msg, Mis en quarantaine, [2acf909c4d2e2b0bf43fe1bb5fa450b0],
PUP.Optional.PCPowerSpeed.A, C:\Program Files (x86)\PCPowerSpeed\PCPowerSpeed.exe, Mis en quarantaine, [2acf909c4d2e2b0bf43fe1bb5fa450b0],
PUP.Optional.PCPowerSpeed.A, C:\Program Files (x86)\PCPowerSpeed\PCPowerTray.exe, Supprimé-au-redémarrage, [2acf909c4d2e2b0bf43fe1bb5fa450b0],
PUP.Optional.PCPowerSpeed.A, C:\Program Files (x86)\PCPowerSpeed\unins000.dat, Mis en quarantaine, [2acf909c4d2e2b0bf43fe1bb5fa450b0],
PUP.Optional.PCPowerSpeed.A, C:\Program Files (x86)\PCPowerSpeed\unins000.exe, Mis en quarantaine, [2acf909c4d2e2b0bf43fe1bb5fa450b0],
Secteurs physiques: 0
(No malicious items detected)
(end)
voilà le rapport :
Malwarebytes Anti-Malware
www.malwarebytes.org
Date de l'examen: 18/04/2014
Heure de l'examen: 11:46:11
Fichier journal:
Administrateur: Oui
Version: 2.00.1.1004
Base de données Malveillants: v2014.04.21.05
Base de données Rootkits: v2014.03.27.01
Licence: Gratuite
Protection contre les malveillants: Désactivé(e)
Protection contre les sites Web malveillants: Désactivé(e)
Chameleon: Désactivé(e)
Système d'exploitation: Windows 7 Service Pack 1
Processeur: x64
Système de fichiers: NTFS
Utilisateur: jcrico
Type d'examen: Examen "Menaces"
Résultat: Terminé
Objets analysés: 296037
Temps écoulé: 1192 h, 55 min, 46 sec
Mémoire: Activé(e)
Démarrage: Activé(e)
Système de fichiers: Activé(e)
Archives: Activé(e)
Rootkits: Désactivé(e)
Shuriken: Activé(e)
PUP: Activé(e)
PUM: Activé(e)
Processus: 1
PUP.Optional.PCPowerSpeed.A, C:\Program Files (x86)\PCPowerSpeed\PCPowerTray.exe, 4060, Supprimé-au-redémarrage, [2acf909c4d2e2b0bf43fe1bb5fa450b0]
Modules: 0
(No malicious items detected)
Clés du Registre: 16
PUP.Optional.MindSpark.A, HKLM\SOFTWARE\WOW6432NODE\CLASSES\CLSID\{1e91a655-bb4b-4693-a05e-2edebc4c9d89}, Mis en quarantaine, [d92073b90774e2541b8bef27ec16fe02],
PUP.Optional.MindSpark.A, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\BROWSER HELPER OBJECTS\{1E91A655-BB4B-4693-A05E-2EDEBC4C9D89}, Mis en quarantaine, [d92073b90774e2541b8bef27ec16fe02],
PUP.Optional.MindSpark.A, HKU\S-1-5-21-608392418-1027056679-4062015191-1001-{ED1FC765-E35E-4C3D-BF15-2C2B11260CE4}-0\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXT\STATS\{1E91A655-BB4B-4693-A05E-2EDEBC4C9D89}, Mis en quarantaine, [d92073b90774e2541b8bef27ec16fe02],
PUP.Optional.MindSpark.A, HKLM\SOFTWARE\WOW6432NODE\CLASSES\CLSID\{71c1d63a-c944-428a-a5bd-ba513190e5d2}, Mis en quarantaine, [e1187eae572453e3b6f519fd788ab54b],
PUP.Optional.MindSpark.A, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\BROWSER HELPER OBJECTS\{71C1D63A-C944-428A-A5BD-BA513190E5D2}, Mis en quarantaine, [e1187eae572453e3b6f519fd788ab54b],
PUP.Optional.MindSpark.A, HKU\S-1-5-21-608392418-1027056679-4062015191-1001-{ED1FC765-E35E-4C3D-BF15-2C2B11260CE4}-0\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXT\STATS\{71C1D63A-C944-428A-A5BD-BA513190E5D2}, Mis en quarantaine, [e1187eae572453e3b6f519fd788ab54b],
PUP.Optional.InboxToolBar.A, HKLM\SOFTWARE\CLASSES\Inbox.WS.com IE Toolbar, Mis en quarantaine, [9f5a919bf586e15532e482cc38cab050],
PUP.Optional.InboxToolBar.A, HKLM\SOFTWARE\WOW6432NODE\CLASSES\Inbox.WS.com IE Toolbar, Mis en quarantaine, [db1eee3ee39802347b9b53fb847e8a76],
PUP.Optional.FunWebProducts.A, HKLM\SOFTWARE\CLASSES\MapsGalaxy_39.SkinLauncherSettings, Mis en quarantaine, [db1e5ad2d7a4ed493af2fe507e84f20e],
PUP.Optional.FunWebProducts.A, HKLM\SOFTWARE\CLASSES\MapsGalaxy_39.SkinLauncherSettings.1, Mis en quarantaine, [de1b86a6720948ee1d0f58f6a959758b],
PUP.Optional.FunWebProducts.A, HKLM\SOFTWARE\WOW6432NODE\CLASSES\MapsGalaxy_39.SkinLauncherSettings, Mis en quarantaine, [de1b86a6720948ee1d0f58f6a959758b],
PUP.Optional.FunWebProducts.A, HKLM\SOFTWARE\WOW6432NODE\CLASSES\MapsGalaxy_39.SkinLauncherSettings.1, Mis en quarantaine, [de1b86a6720948ee1d0f58f6a959758b],
PUP.Optional.PCPowerSpeed.A, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\UNINSTALL\{B0C56FD7-493D-44DD-B007-BBB5117D6E6F}_is1, Mis en quarantaine, [2acf909c4d2e2b0bf43fe1bb5fa450b0],
PUP.Optional.PCPowerSpeed.A, HKLM\SOFTWARE\WOW6432NODE\PCPOWERSPEED, Mis en quarantaine, [f0095dcf8deed46243f2d4c8b15237c9],
PUP.Optional.Pricora.A, HKU\S-1-5-18-{ED1FC765-E35E-4C3D-BF15-2C2B11260CE4}-0\SOFTWARE\APPDATALOW\SOFTWARE\Pricora 1.1, Mis en quarantaine, [1adf0f1dc2b993a3728096e441c150b0],
PUP.Optional.PCPowerSpeed.A, HKU\S-1-5-21-608392418-1027056679-4062015191-1001-{ED1FC765-E35E-4C3D-BF15-2C2B11260CE4}-0\SOFTWARE\PCPOWERSPEED, Mis en quarantaine, [bf3a989448337cba1321d7c5d0336b95],
Valeurs du Registre: 8
PUP.Optional.MindSpark.A, HKU\S-1-5-21-608392418-1027056679-4062015191-1001-{ED1FC765-E35E-4C3D-BF15-2C2B11260CE4}-0\SOFTWARE\MICROSOFT\INTERNET EXPLORER\URLSEARCHHOOKS\{26842a09-ffa8-4e2c-ae12-0c80f01c3295}, Mis en quarantaine, [7980d95387f4ed493473b264f40e6898],
PUP.Optional.MindSpark.A, HKU\S-1-5-21-608392418-1027056679-4062015191-1001-{ED1FC765-E35E-4C3D-BF15-2C2B11260CE4}-0\SOFTWARE\MICROSOFT\INTERNET EXPLORER\URLSEARCHHOOKS|{26842A09-FFA8-4E2C-AE12-0C80F01C3295}, Mis en quarantaine, [7980d95387f4ed493473b264f40e6898],
PUP.Optional.PCPowerSpeed.A, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN|PCPowerSpeed, "C:\Program Files (x86)\PCPowerSpeed\PCPowerTray.exe" /startup, Mis en quarantaine, [2acf909c4d2e2b0bf43fe1bb5fa450b0]
PUP.Optional.MindSpark.A, HKLM\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN|MapsGalaxy Home Page Guard 64 bit, "C:\PROGRA~2\MAPSGA~2\bar\2.bin\AppIntegrator64.exe", Mis en quarantaine, [2bce51db0b704fe74bf23a3859a937c9]
PUP.Optional.PCPowerSpeed.A, HKLM\SOFTWARE\WOW6432NODE\PCPOWERSPEED|PHONE_NUMBER, +1 561-948-2946, Mis en quarantaine, [f0095dcf8deed46243f2d4c8b15237c9]
PUM.UserWLoad, HKU\S-1-5-21-608392418-1027056679-4062015191-1001-{ED1FC765-E35E-4C3D-BF15-2C2B11260CE4}-0\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINDOWS|Load, C:\Users\jcrico\LOCALS~1\Temp\msykoy.cmd, Mis en quarantaine, [8b6ee74503780234b8b50c7ca75b1ce4]
Trojan.Ransom, HKU\S-1-5-21-608392418-1027056679-4062015191-1001-{ED1FC765-E35E-4C3D-BF15-2C2B11260CE4}-0\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINDOWS|Load, C:\Users\jcrico\LOCALS~1\Temp\msykoy.cmd, Mis en quarantaine, [a752cb610a714ee8050b3f4db54d32ce]
PUP.Optional.PCPowerSpeed.A, HKU\S-1-5-21-608392418-1027056679-4062015191-1001-{ED1FC765-E35E-4C3D-BF15-2C2B11260CE4}-0\SOFTWARE\PCPOWERSPEED|LAST_CMS_UPDATE,  Éâ'¬opbä@, Mis en quarantaine, [bf3a989448337cba1321d7c5d0336b95]
Données du Registre: 0
(No malicious items detected)
Dossiers: 6
PUP.Optional.PCPowerSpeed.A, C:\ProgramData\PCPowerSpeed, Mis en quarantaine, [a85135f76d0e72c430028319b0538c74],
PUP.Optional.PCPowerSpeed.A, C:\ProgramData\PCPowerSpeed\Backup, Mis en quarantaine, [a85135f76d0e72c430028319b0538c74],
PUP.Optional.PCPowerSpeed.A, C:\ProgramData\PCPowerSpeed\Startup, Mis en quarantaine, [a85135f76d0e72c430028319b0538c74],
PUP.Optional.PCPowerSpeed.A, C:\ProgramData\PCPowerSpeed\Translate, Mis en quarantaine, [a85135f76d0e72c430028319b0538c74],
PUP.Optional.PCPowerSpeed.A, C:\Program Files (x86)\PCPowerSpeed, Supprimé-au-redémarrage, [2acf909c4d2e2b0bf43fe1bb5fa450b0],
PUP.Optional.PCPowerSpeed.A, C:\Program Files (x86)\PCPowerSpeed\Update, Mis en quarantaine, [2acf909c4d2e2b0bf43fe1bb5fa450b0],
Fichiers: 15
Trojan.Banker.Kreapixel, C:\Users\jcrico\AppData\Roaming\~pqtafql.exe, Mis en quarantaine, [f00946e62a51d2647c42de599c655ca4],
PUP.Optional.InstallIQ.A, C:\Users\mauricette et jc\Desktop\FinalMediaPlayerSetup.exe, Mis en quarantaine, [28d1f735d7a4db5bf26922ef719018e8],
PUP.Optional.Babylon.A, C:\Users\jcrico\AppData\Local\Temp\MyBabylonTB.exe, Mis en quarantaine, [a455200c80fb62d48e2b1509f10fcd33],
Trojan.Agent, C:\Users\jcrico\AppData\Local\Temp\ch8l0.exe, Mis en quarantaine, [ca2f95979be0a49275379fe540c0827e],
PUP.Optional.BubbleDock.A, C:\Users\jcrico\AppData\Local\Temp\1422014142834\Uninstall Bubble Dock.exe, Mis en quarantaine, [fdfc0824e596dd59b3f579bc9e6350b0],
PUP.Optional.Bubbledock.A, C:\Users\jcrico\AppData\Roaming\Bubble Dock.boostrap.log, Mis en quarantaine, [80795cd06813dd59cea37d02639fa858],
PUP.Optional.Searchqu.A, C:\Users\jcrico\AppData\Roaming\Mozilla\Extensions\{1FD91A9C-410C-4090-BBCC-55D3450EF433}, Mis en quarantaine, [43b6cc60ef8c39fd1890b2e4c43f9d63],
PUP.Optional.PCFixSpeed, C:\Users\Public\Desktop\Optimisez votre PC.lnk, Mis en quarantaine, [37c297953c3f5ed8736e1484d62d15eb],
PUP.Optional.PCPowerSpeed.A, C:\ProgramData\PCPowerSpeed\addons.xml, Mis en quarantaine, [a85135f76d0e72c430028319b0538c74],
PUP.Optional.PCPowerSpeed.A, C:\ProgramData\PCPowerSpeed\Translate\lng.ini, Mis en quarantaine, [a85135f76d0e72c430028319b0538c74],
PUP.Optional.PCPowerSpeed.A, C:\Program Files (x86)\PCPowerSpeed\unins000.msg, Mis en quarantaine, [2acf909c4d2e2b0bf43fe1bb5fa450b0],
PUP.Optional.PCPowerSpeed.A, C:\Program Files (x86)\PCPowerSpeed\PCPowerSpeed.exe, Mis en quarantaine, [2acf909c4d2e2b0bf43fe1bb5fa450b0],
PUP.Optional.PCPowerSpeed.A, C:\Program Files (x86)\PCPowerSpeed\PCPowerTray.exe, Supprimé-au-redémarrage, [2acf909c4d2e2b0bf43fe1bb5fa450b0],
PUP.Optional.PCPowerSpeed.A, C:\Program Files (x86)\PCPowerSpeed\unins000.dat, Mis en quarantaine, [2acf909c4d2e2b0bf43fe1bb5fa450b0],
PUP.Optional.PCPowerSpeed.A, C:\Program Files (x86)\PCPowerSpeed\unins000.exe, Mis en quarantaine, [2acf909c4d2e2b0bf43fe1bb5fa450b0],
Secteurs physiques: 0
(No malicious items detected)
(end)
ArnaudLy6
Messages postés
4412
Date d'inscription
samedi 22 mai 2010
Statut
Membre
Dernière intervention
13 février 2016
189
21 avril 2014 à 20:19
21 avril 2014 à 20:19
Ok, suis les étapes données par cabrier
jcproux
Messages postés
6
Date d'inscription
lundi 21 avril 2014
Statut
Membre
Dernière intervention
21 avril 2014
21 avril 2014 à 21:02
21 avril 2014 à 21:02
voilà le dernier rapport ( encore merci de votre aide)
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Junkware Removal Tool (JRT) by Thisisu
Version: 6.1.4 (04.06.2014:1)
OS: Windows 7 Home Premium x64
Ran by jcrico on 21/04/2014 at 20:07:08,41
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
~~~ Services
~~~ Registry Values
Successfully deleted: [Registry Value] HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\\inboxtoolbar
~~~ Registry Keys
Successfully deleted: [Registry Key] HKEY_CLASSES_ROOT\mapsgalaxy_39.dynamicbarbutton
Successfully deleted: [Registry Key] HKEY_CLASSES_ROOT\mapsgalaxy_39.dynamicbarbutton.1
Successfully deleted: [Registry Key] HKEY_CLASSES_ROOT\mapsgalaxy_39.feedmanager
Successfully deleted: [Registry Key] HKEY_CLASSES_ROOT\mapsgalaxy_39.feedmanager.1
Successfully deleted: [Registry Key] HKEY_CLASSES_ROOT\mapsgalaxy_39.htmlmenu
Successfully deleted: [Registry Key] HKEY_CLASSES_ROOT\mapsgalaxy_39.htmlmenu.1
Successfully deleted: [Registry Key] HKEY_CLASSES_ROOT\mapsgalaxy_39.htmlpanel
Successfully deleted: [Registry Key] HKEY_CLASSES_ROOT\mapsgalaxy_39.htmlpanel.1
Successfully deleted: [Registry Key] HKEY_CLASSES_ROOT\mapsgalaxy_39.multiplebutton
Successfully deleted: [Registry Key] HKEY_CLASSES_ROOT\mapsgalaxy_39.multiplebutton.1
Successfully deleted: [Registry Key] HKEY_CLASSES_ROOT\mapsgalaxy_39.pseudotransparentplugin
Successfully deleted: [Registry Key] HKEY_CLASSES_ROOT\mapsgalaxy_39.pseudotransparentplugin.1
Successfully deleted: [Registry Key] HKEY_CLASSES_ROOT\mapsgalaxy_39.radio
Successfully deleted: [Registry Key] HKEY_CLASSES_ROOT\mapsgalaxy_39.radio.1
Successfully deleted: [Registry Key] HKEY_CLASSES_ROOT\mapsgalaxy_39.radiosettings
Successfully deleted: [Registry Key] HKEY_CLASSES_ROOT\mapsgalaxy_39.radiosettings.1
Successfully deleted: [Registry Key] HKEY_CLASSES_ROOT\mapsgalaxy_39.scriptbutton
Successfully deleted: [Registry Key] HKEY_CLASSES_ROOT\mapsgalaxy_39.scriptbutton.1
Successfully deleted: [Registry Key] HKEY_CLASSES_ROOT\mapsgalaxy_39.settingsplugin
Successfully deleted: [Registry Key] HKEY_CLASSES_ROOT\mapsgalaxy_39.settingsplugin.1
Successfully deleted: [Registry Key] HKEY_CLASSES_ROOT\mapsgalaxy_39.skinlauncher
Successfully deleted: [Registry Key] HKEY_CLASSES_ROOT\mapsgalaxy_39.skinlauncher.1
Successfully deleted: [Registry Key] HKEY_CLASSES_ROOT\mapsgalaxy_39.thirdpartyinstaller
Successfully deleted: [Registry Key] HKEY_CLASSES_ROOT\mapsgalaxy_39.thirdpartyinstaller.1
Successfully deleted: [Registry Key] HKEY_CLASSES_ROOT\mapsgalaxy_39.urlalertbutton
Successfully deleted: [Registry Key] HKEY_CLASSES_ROOT\mapsgalaxy_39.urlalertbutton.1
Successfully deleted: [Registry Key] HKEY_CLASSES_ROOT\mapsgalaxy_39.xmlsessionplugin
Successfully deleted: [Registry Key] HKEY_CLASSES_ROOT\mapsgalaxy_39.xmlsessionplugin.1
Successfully deleted: [Registry Key] HKEY_CLASSES_ROOT\CLSID\{1241CEBD-9777-4BC6-AAE5-2A77E25DB246}
Successfully deleted: [Registry Key] HKEY_CLASSES_ROOT\CLSID\{173A5778-34BF-48A2-8A5E-6963CE922FED}
Successfully deleted: [Registry Key] HKEY_CLASSES_ROOT\CLSID\{1796EC91-D094-4A5F-B681-E16015D1CEAC}
Successfully deleted: [Registry Key] HKEY_CLASSES_ROOT\CLSID\{26842A09-FFA8-4E2C-AE12-0C80F01C3295}
Successfully deleted: [Registry Key] HKEY_CLASSES_ROOT\CLSID\{37ED966D-4D0E-4D66-9633-BEA542C92860}
Successfully deleted: [Registry Key] HKEY_CLASSES_ROOT\CLSID\{3ED5E5EC-0965-4DD3-B7D8-DBC48A1172B9}
Successfully deleted: [Registry Key] HKEY_CLASSES_ROOT\CLSID\{4B7D0B0C-CFF3-49C5-9BC3-FFABC031C822}
Successfully deleted: [Registry Key] HKEY_CLASSES_ROOT\CLSID\{4F28FA5F-7D15-4753-B4FC-D548A0F02BFB}
Successfully deleted: [Registry Key] HKEY_CLASSES_ROOT\CLSID\{5E1BDCF6-DD5F-4DD3-8783-B1454AEF1830}
Successfully deleted: [Registry Key] HKEY_CLASSES_ROOT\CLSID\{7D4DFAF7-F2CE-4C91-91A4-514C9612914D}
Successfully deleted: [Registry Key] HKEY_CLASSES_ROOT\CLSID\{9B58A6CE-B337-43D5-9C2F-8C6D92FBA094}
Successfully deleted: [Registry Key] HKEY_CLASSES_ROOT\CLSID\{A083C35D-61A9-4625-BBB6-FB54E71B8527}
Successfully deleted: [Registry Key] HKEY_CLASSES_ROOT\CLSID\{A35FF019-6DBE-4044-B080-6F3FA78A947F}
Successfully deleted: [Registry Key] HKEY_CLASSES_ROOT\CLSID\{B70E008C-967B-4104-BC7B-6F7C77DBC38D}
Successfully deleted: [Registry Key] HKEY_CLASSES_ROOT\CLSID\{C4A25B73-8EF5-4282-9D21-C8920DD577A1}
Successfully deleted: [Registry Key] HKEY_CLASSES_ROOT\CLSID\{CAE88E60-CEA5-4FCB-B611-54EA6305D8AB}
Successfully deleted: [Registry Key] HKEY_CLASSES_ROOT\CLSID\{DB1384D8-1BDA-4C8D-A743-E9CA671FEB00}
Successfully deleted: [Registry Key] HKEY_CLASSES_ROOT\CLSID\{E045DF14-BF1D-405C-A37B-A75C1551AD17}
Successfully deleted: [Registry Key] HKEY_CLASSES_ROOT\CLSID\{F3477E9D-D2F6-49F0-9B23-854D7958D07E}
Successfully deleted: [Registry Key] HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\InternetRegistry\REGISTRY\USER\S-1-5-21-608392418-1027056679-4062015191-1001\Software\babylon
Successfully deleted: [Registry Key] HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\InternetRegistry\REGISTRY\USER\S-1-5-21-608392418-1027056679-4062015191-1001\Software\sweetim
Successfully deleted: [Registry Key] HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\SearchScopes\{AC11C58E-424C-478A-8632-BD6A8501B3E3}
~~~ Files
Successfully deleted: [File] C:\Windows\syswow64\sho3081.tmp
Successfully deleted: [File] C:\Windows\syswow64\shoCA12.tmp
~~~ Folders
Successfully deleted: [Folder] "C:\Users\jcrico\AppData\Roaming\pcpowerspeed"
Successfully deleted: [Folder] "C:\Users\jcrico\appdata\locallow\datamngr"
Successfully deleted: [Empty Folder] C:\Users\jcrico\appdata\local\{08E242F6-9DC9-4D9B-884C-291D6C68B8F3}
Successfully deleted: [Empty Folder] C:\Users\jcrico\appdata\local\{11AA3175-8BCC-43B0-B025-23255879FC27}
Successfully deleted: [Empty Folder] C:\Users\jcrico\appdata\local\{42F744A8-CCE0-47EF-8018-E5836B2EEF59}
Successfully deleted: [Empty Folder] C:\Users\jcrico\appdata\local\{455719C3-6D08-4147-9692-B400494B116C}
Successfully deleted: [Empty Folder] C:\Users\jcrico\appdata\local\{472D09CF-52F1-4556-A168-2077546AA42D}
Successfully deleted: [Empty Folder] C:\Users\jcrico\appdata\local\{47F74F84-5ADA-4995-95C5-B8EF27AFF789}
Successfully deleted: [Empty Folder] C:\Users\jcrico\appdata\local\{531E83F1-F441-48EE-8DA8-7A341EACB70D}
Successfully deleted: [Empty Folder] C:\Users\jcrico\appdata\local\{59DFEB9B-1B8A-442F-9787-E727B2945969}
Successfully deleted: [Empty Folder] C:\Users\jcrico\appdata\local\{7AD72011-8F01-4427-B314-40E253E0712B}
Successfully deleted: [Empty Folder] C:\Users\jcrico\appdata\local\{86985285-B22F-4FBC-938F-F4B1BB0CB6B5}
Successfully deleted: [Empty Folder] C:\Users\jcrico\appdata\local\{B97F766A-0A6F-4D78-AB5B-A644AAA45840}
Successfully deleted: [Empty Folder] C:\Users\jcrico\appdata\local\{BB7E5FCF-BDD4-486D-B974-3AED23279FC7}
Successfully deleted: [Empty Folder] C:\Users\jcrico\appdata\local\{FC9F33B2-272C-4AC6-AD2B-847AB9AF741A}
~~~ FireFox
Successfully deleted: [File] C:\user.js
~~~ Event Viewer Logs were cleared
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Scan was completed on 21/04/2014 at 20:36:02,47
End of JRT log
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Junkware Removal Tool (JRT) by Thisisu
Version: 6.1.4 (04.06.2014:1)
OS: Windows 7 Home Premium x64
Ran by jcrico on 21/04/2014 at 20:07:08,41
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
~~~ Services
~~~ Registry Values
Successfully deleted: [Registry Value] HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\\inboxtoolbar
~~~ Registry Keys
Successfully deleted: [Registry Key] HKEY_CLASSES_ROOT\mapsgalaxy_39.dynamicbarbutton
Successfully deleted: [Registry Key] HKEY_CLASSES_ROOT\mapsgalaxy_39.dynamicbarbutton.1
Successfully deleted: [Registry Key] HKEY_CLASSES_ROOT\mapsgalaxy_39.feedmanager
Successfully deleted: [Registry Key] HKEY_CLASSES_ROOT\mapsgalaxy_39.feedmanager.1
Successfully deleted: [Registry Key] HKEY_CLASSES_ROOT\mapsgalaxy_39.htmlmenu
Successfully deleted: [Registry Key] HKEY_CLASSES_ROOT\mapsgalaxy_39.htmlmenu.1
Successfully deleted: [Registry Key] HKEY_CLASSES_ROOT\mapsgalaxy_39.htmlpanel
Successfully deleted: [Registry Key] HKEY_CLASSES_ROOT\mapsgalaxy_39.htmlpanel.1
Successfully deleted: [Registry Key] HKEY_CLASSES_ROOT\mapsgalaxy_39.multiplebutton
Successfully deleted: [Registry Key] HKEY_CLASSES_ROOT\mapsgalaxy_39.multiplebutton.1
Successfully deleted: [Registry Key] HKEY_CLASSES_ROOT\mapsgalaxy_39.pseudotransparentplugin
Successfully deleted: [Registry Key] HKEY_CLASSES_ROOT\mapsgalaxy_39.pseudotransparentplugin.1
Successfully deleted: [Registry Key] HKEY_CLASSES_ROOT\mapsgalaxy_39.radio
Successfully deleted: [Registry Key] HKEY_CLASSES_ROOT\mapsgalaxy_39.radio.1
Successfully deleted: [Registry Key] HKEY_CLASSES_ROOT\mapsgalaxy_39.radiosettings
Successfully deleted: [Registry Key] HKEY_CLASSES_ROOT\mapsgalaxy_39.radiosettings.1
Successfully deleted: [Registry Key] HKEY_CLASSES_ROOT\mapsgalaxy_39.scriptbutton
Successfully deleted: [Registry Key] HKEY_CLASSES_ROOT\mapsgalaxy_39.scriptbutton.1
Successfully deleted: [Registry Key] HKEY_CLASSES_ROOT\mapsgalaxy_39.settingsplugin
Successfully deleted: [Registry Key] HKEY_CLASSES_ROOT\mapsgalaxy_39.settingsplugin.1
Successfully deleted: [Registry Key] HKEY_CLASSES_ROOT\mapsgalaxy_39.skinlauncher
Successfully deleted: [Registry Key] HKEY_CLASSES_ROOT\mapsgalaxy_39.skinlauncher.1
Successfully deleted: [Registry Key] HKEY_CLASSES_ROOT\mapsgalaxy_39.thirdpartyinstaller
Successfully deleted: [Registry Key] HKEY_CLASSES_ROOT\mapsgalaxy_39.thirdpartyinstaller.1
Successfully deleted: [Registry Key] HKEY_CLASSES_ROOT\mapsgalaxy_39.urlalertbutton
Successfully deleted: [Registry Key] HKEY_CLASSES_ROOT\mapsgalaxy_39.urlalertbutton.1
Successfully deleted: [Registry Key] HKEY_CLASSES_ROOT\mapsgalaxy_39.xmlsessionplugin
Successfully deleted: [Registry Key] HKEY_CLASSES_ROOT\mapsgalaxy_39.xmlsessionplugin.1
Successfully deleted: [Registry Key] HKEY_CLASSES_ROOT\CLSID\{1241CEBD-9777-4BC6-AAE5-2A77E25DB246}
Successfully deleted: [Registry Key] HKEY_CLASSES_ROOT\CLSID\{173A5778-34BF-48A2-8A5E-6963CE922FED}
Successfully deleted: [Registry Key] HKEY_CLASSES_ROOT\CLSID\{1796EC91-D094-4A5F-B681-E16015D1CEAC}
Successfully deleted: [Registry Key] HKEY_CLASSES_ROOT\CLSID\{26842A09-FFA8-4E2C-AE12-0C80F01C3295}
Successfully deleted: [Registry Key] HKEY_CLASSES_ROOT\CLSID\{37ED966D-4D0E-4D66-9633-BEA542C92860}
Successfully deleted: [Registry Key] HKEY_CLASSES_ROOT\CLSID\{3ED5E5EC-0965-4DD3-B7D8-DBC48A1172B9}
Successfully deleted: [Registry Key] HKEY_CLASSES_ROOT\CLSID\{4B7D0B0C-CFF3-49C5-9BC3-FFABC031C822}
Successfully deleted: [Registry Key] HKEY_CLASSES_ROOT\CLSID\{4F28FA5F-7D15-4753-B4FC-D548A0F02BFB}
Successfully deleted: [Registry Key] HKEY_CLASSES_ROOT\CLSID\{5E1BDCF6-DD5F-4DD3-8783-B1454AEF1830}
Successfully deleted: [Registry Key] HKEY_CLASSES_ROOT\CLSID\{7D4DFAF7-F2CE-4C91-91A4-514C9612914D}
Successfully deleted: [Registry Key] HKEY_CLASSES_ROOT\CLSID\{9B58A6CE-B337-43D5-9C2F-8C6D92FBA094}
Successfully deleted: [Registry Key] HKEY_CLASSES_ROOT\CLSID\{A083C35D-61A9-4625-BBB6-FB54E71B8527}
Successfully deleted: [Registry Key] HKEY_CLASSES_ROOT\CLSID\{A35FF019-6DBE-4044-B080-6F3FA78A947F}
Successfully deleted: [Registry Key] HKEY_CLASSES_ROOT\CLSID\{B70E008C-967B-4104-BC7B-6F7C77DBC38D}
Successfully deleted: [Registry Key] HKEY_CLASSES_ROOT\CLSID\{C4A25B73-8EF5-4282-9D21-C8920DD577A1}
Successfully deleted: [Registry Key] HKEY_CLASSES_ROOT\CLSID\{CAE88E60-CEA5-4FCB-B611-54EA6305D8AB}
Successfully deleted: [Registry Key] HKEY_CLASSES_ROOT\CLSID\{DB1384D8-1BDA-4C8D-A743-E9CA671FEB00}
Successfully deleted: [Registry Key] HKEY_CLASSES_ROOT\CLSID\{E045DF14-BF1D-405C-A37B-A75C1551AD17}
Successfully deleted: [Registry Key] HKEY_CLASSES_ROOT\CLSID\{F3477E9D-D2F6-49F0-9B23-854D7958D07E}
Successfully deleted: [Registry Key] HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\InternetRegistry\REGISTRY\USER\S-1-5-21-608392418-1027056679-4062015191-1001\Software\babylon
Successfully deleted: [Registry Key] HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\InternetRegistry\REGISTRY\USER\S-1-5-21-608392418-1027056679-4062015191-1001\Software\sweetim
Successfully deleted: [Registry Key] HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\SearchScopes\{AC11C58E-424C-478A-8632-BD6A8501B3E3}
~~~ Files
Successfully deleted: [File] C:\Windows\syswow64\sho3081.tmp
Successfully deleted: [File] C:\Windows\syswow64\shoCA12.tmp
~~~ Folders
Successfully deleted: [Folder] "C:\Users\jcrico\AppData\Roaming\pcpowerspeed"
Successfully deleted: [Folder] "C:\Users\jcrico\appdata\locallow\datamngr"
Successfully deleted: [Empty Folder] C:\Users\jcrico\appdata\local\{08E242F6-9DC9-4D9B-884C-291D6C68B8F3}
Successfully deleted: [Empty Folder] C:\Users\jcrico\appdata\local\{11AA3175-8BCC-43B0-B025-23255879FC27}
Successfully deleted: [Empty Folder] C:\Users\jcrico\appdata\local\{42F744A8-CCE0-47EF-8018-E5836B2EEF59}
Successfully deleted: [Empty Folder] C:\Users\jcrico\appdata\local\{455719C3-6D08-4147-9692-B400494B116C}
Successfully deleted: [Empty Folder] C:\Users\jcrico\appdata\local\{472D09CF-52F1-4556-A168-2077546AA42D}
Successfully deleted: [Empty Folder] C:\Users\jcrico\appdata\local\{47F74F84-5ADA-4995-95C5-B8EF27AFF789}
Successfully deleted: [Empty Folder] C:\Users\jcrico\appdata\local\{531E83F1-F441-48EE-8DA8-7A341EACB70D}
Successfully deleted: [Empty Folder] C:\Users\jcrico\appdata\local\{59DFEB9B-1B8A-442F-9787-E727B2945969}
Successfully deleted: [Empty Folder] C:\Users\jcrico\appdata\local\{7AD72011-8F01-4427-B314-40E253E0712B}
Successfully deleted: [Empty Folder] C:\Users\jcrico\appdata\local\{86985285-B22F-4FBC-938F-F4B1BB0CB6B5}
Successfully deleted: [Empty Folder] C:\Users\jcrico\appdata\local\{B97F766A-0A6F-4D78-AB5B-A644AAA45840}
Successfully deleted: [Empty Folder] C:\Users\jcrico\appdata\local\{BB7E5FCF-BDD4-486D-B974-3AED23279FC7}
Successfully deleted: [Empty Folder] C:\Users\jcrico\appdata\local\{FC9F33B2-272C-4AC6-AD2B-847AB9AF741A}
~~~ FireFox
Successfully deleted: [File] C:\user.js
~~~ Event Viewer Logs were cleared
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Scan was completed on 21/04/2014 at 20:36:02,47
End of JRT log
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~