Guide de suppression de Trojan Generic

Niveau de menace :
10/10
Noter cet article :
Commentaires (0)
Consultations de l'article : 88809

Trojan Generic est un parasite de l'ordinateur qui a été détecté en 2008 pour la première fois et depuis a été infecter et qui sévit dans nombre d'ordinateurs dans le monde entier. Ce cheval de Troie est un cas plutôt délicat de la sécurité informatique, car son nom est aussi fréquemment utilisé par rogue antispyware dans les messages d'alerte sécurité faux que le voleur envoie à l'utilisateur de l'ordinateur sans méfiance.

Cependant, Trojan Generic peut aussi être un véritable cheval de Troie qui pourrait causer des dommages extrême à votre ordinateur. Les avertissements qui proviennent de votre système informatique sur toute activité suspecte peuvent être indiquant la présence de ce cheval de Troie. D'autres symptômes de l'infection comprennent également, détournement de navigateur et de redirection énergique de plantage d'applications et de logiciels malveillants des sites lorsque vous n'êtes pas capable d'exécuter vos programmes de la façon dont vous êtes habitué.

Inutile de dire que la façon dont vous faites affaire avec cette infection dépend du type de l'infection. Si Trojan Generic n'est qu'une partie des voyous antispyware fake notifications d'alerte, alors vous devez supprimer la rogue lui-même, car dans ce cas Trojan Generic n'existe pas dans votre ordinateur. Vous devez prendre cette infection plus sérieusement si vous sont infectés par le real Trojan Generic.

Lorsque Trojan Generic est installé et en cours d'exécution, elle laisse ces fichiers dans votre système :

.Tt19AD.tmp.exe [-HT_2]
. tt1B5.tmp.exe
. tt1C.tmp.exe
. tt38.tmp.exe

Vous devriez également vérifier, s'il y a ces processus s'exécutant dans votre gestionnaire de tâches Windows mhtiedmsika.exe, MapDrive.exe, kuxuy.exe, kqfrybpdlta.exe. Ils sont associés avec Trojan Generic, et c'est juste une petite partie des fichiers que le cheval de Troie conserve en cours d'exécution à l'arrière-plan de votre système. C'est également une des raisons pourquoi il est difficile de supprimer manuellement les Trojan Generic – il y a de nombreux fichiers et processus de tuer et de supprimer.

Télécharger de quoi supprimer Trojan Generic *
* L'analyseur SpyHunter à télécharger depuis ce site est destiné à être utilisé comme outil de détection uniquement. Pour utiliser la fonction de suppression, il vous faudra acheter la version complète de SpyHunter.

Informations techniques sur Trojan Generic pour sa suppression manuelle :

Fichiers modifiés/créés dans le système :

# Nom du fichier Taille du fichier (en octets) Hash du fichier
1pjdeya.exe597504 bytesMD5: 5d4743a302e76421c449e8cfc2d8be2f
2zs880000[1].exe108032 bytes
3%UserProfile%\Application Data\whc?????????
4ree2.exe748032 bytes
5dxva2C.dll62464 bytesMD5: 41cb45cccc9897274d77c847ba946b6d
6dmutil32.dll198656 bytes
7alivevukov.dll179712 bytesMD5: 64b417db53c23d036d2843b44c22bb7c
8%UserProfile%\Application Data\lphc?????????
9kory.exe92672 bytesMD5: 0db0abdcf82af6f56402d11cca6ad0dd
10DisplaySwitch.exe118272 bytesMD5: dde7ef6358e594956b13fc291d92e52a
11uzewerilupavid.dll186368 bytesMD5: fa537293c1587d408722591ed4020a20
12mafuyiha.dll106496 bytes
13VCL.dll335064 bytesMD5: 85e369896d7049fa73dff2064a9df4db
14vupesasu.dll64512 bytesMD5: b5b5cc712268472c9e92b81f54a385c4
15yovalono.dll49664 bytes
16pujosove.dll48640 bytes
17penis.exe90112 bytes
18dijipire.dll70144 bytes
19ope2314.exe 401920 bytesMD5: 64e9e281d180395b1f60872930a8d19a
20xoipk.exe142848 bytesMD5: 97c65e1c3df2ea29ceb58b3390bd0b37
21%UserProfile%\phc?????????
22hepigalo.exe
23idolowun.dll180736 bytesMD5: 15689f041fb926413e423597a913f5e2
24zarebeba.dll50688 bytes
25%SystemRoot%\System32\blphc?????????
26cmdial3.dll122368 bytes
27luyehije.dll87552 bytes
28ClipHelp3xx.dll86016 bytesMD5: 0a102507a28680434a8231199c7ac913
29hekeyapi.dll89088 bytes
30iyupodovujepope.dll194048 bytesMD5: 20df5aee46a31774c749f9945b711641
31hovebipu.dll48640 bytes
32nl4.exe668160 bytes
33%SystemRoot%\System32\whc?????????
34dot3cfg32.dll119808 bytes
35zorihali.dll109281 bytes
36ijusuyanami.dll266240 bytesMD5: 39c5f01af18aa97ace2b61ff4040d4e6
37cajiw.exe557056 bytesMD5: 6222d185dbfd393c9208e3e19cd3eee1
38uyuhapuhid.dll195072 bytesMD5: 5f6b1405d57dc8df91144601b605e3ae
39oyuwopoze.dll183296 bytesMD5: d49dfd4cf9dd4128c42423d2809f24dd
40zesanido.dll50176 bytes
41udihozazohec.dll197632 bytesMD5: 8e4bd6bf49fa29c52b564f0c3255cfed
42tipiyipo.dll89600 bytes
43pivumedo.dll190976 bytes
44xydzyh.exe45056 bytes
45doriyubi.dll49152 bytes
46yosineku.dll89600 bytes
47lewiyidi.dll49664 bytes
48AdobeSoftVaallupjhn.exe507840 bytesMD5: 86c6ad598623186d95a83b4b86180ab4
49oviyukebicitaq.dll189952 bytesMD5: 26e0901133821a1a844fdf9f376a2220
50uclyv.exe100352 bytesMD5: 904c33d27f3b145fbb9506955049d90b
51bisevona.dll78848 bytes
52sujibiwi.dll50176 bytes
53beipq.exe169472 bytesMD5: ac12fcef12aec513bd5e8e8fcf389e1f
54mutelupo.dll69632 bytes
55%ProgramFiles%\thc?????????
56ixelinet.dll182272 bytesMD5: a1b569c180afb2dd878a45bba9c078d4
57unapatax.dll182272 bytesMD5: 13c74cdba40b44b226697a503a1efe5f
58ptidle.exe56832 bytes
59muyinepa.dll80896 bytes
60kurtapt24@yahoo.com9458 bytesMD5: 2e124646bd0fbe6838796bd181df0eef
61nobajanu.dll81408 bytes
62mivi.exe171520 bytesMD5: 947f14f76240dc31ff436dc3ff906114
63RqAds.exe135168 bytes
64jimofiji.dll49152 bytes
65%ProgramFiles%\blphc?????????
66pokumala.dll107520 bytes
67nsx23.dll1351680 bytes
68tijawani.dll50688 bytes
69hehoyoze.dll50688 bytes
70delidubu.dll89600 bytes
71PowerJa.ask70777 bytes
72bufezeza.dll80384 bytes
73nupotuku.dll48640 bytes
74debodoro.dll71168 bytes
75emihotepopeg.dll187392 bytesMD5: 0df79c59f0e032e5bc995786d5815461
76asade.exe133120 bytesMD5: c5ed7ab3a7f1b367bc77480907a71274
77ugavisidu.dll180224 bytesMD5: 6aa2d902c4637662f7dac98aabf95544
78verabija.dll88064 bytes
79bdaplgini.dll84992 bytesMD5: deacbaa2ddf8597cdf1985e2950034d6
80zogonaha.dll108544 bytes
81%SystemRoot%\System32\bpph??????????
82UnLoad.exe37888 bytesMD5: 437f7b6ff7982015788b28d66f49ba2a
83fozusayo.dll49152 bytes
84%UserProfile%\thc?????????
85juriyuyi.dll50688 bytes
86onifr.exe147454 bytesMD5: 055c5d04c1cb3c4945637d38c7ba9933
87zelovumi.dll49152 bytes
88%UserProfile%\lphc?????????
89%UserProfile%\Application Data\thc?????????
90robejaku.dll88064 bytes
91atl7.dll122368 bytes
92Lxh.exe169472 bytesMD5: 9f4ab3be9eaba698dc0e0f7c73a95558
93relereni.dll87552 bytes
94ufimixefenoy.dll257536 bytesMD5: b9407a6531a93d27f4a970f3b849ee9e
95tikatabi.dll80384 bytes
96%UserProfile%\blphc?????????
97lebenesa.dll78848 bytes
98ree1.exe646656 bytes
99topapope.dll80384 bytes
100ufdsvc.exe69632 bytesMD5: 99184adc5b7fab997146971f20afff18
101kylo.exe116736 bytesMD5: 9393917d6f87dadf94d2ccaead23f380
102bdsl2.dll86016 bytes
103digiwet.dll17920 bytes
104jahasike.dll48128 bytes
105ofriasc.dll79360 bytesMD5: 158568bd1c1926d357b66f18397c4c11
106%UserProfile%\Application Data\pphc?????????
107stuvwxy.exe
108nl3.exe1891840 bytes
109uheludeje.dll173056 bytesMD5: b34cdd55229d93f43cebd8bac52597e6
110%UserProfile%\pphc?????????
111penipure.dll50688 bytes
112irxoe.exe116736 bytesMD5: 4f883bd12740c865a1765183767f979a
113kdpini.dll192528 bytes
114nupanogo.dll107520 bytes
115%UserProfile%\Application Data
116eloheseweriquyi.dll182272 bytesMD5: 351a14711242221e54e0a1920a82f4de
117nahatona.dll106496 bytes
118poqii.exe147445 bytesMD5: 9372599a17d10580496c99fb50c62fdf
119hnwqrys.exe368896 bytesMD5: 3603e534db5178036425c5e6bcca8ee4
120kulo.exe118850 bytesMD5: 8a37ecc0344edbdcff843f01e4db160a
121yatodimi.dll70144 bytes
122irulusasiyuwam.dll178176 bytesMD5: 066db90be6f45540e15d1d928ab7f21d
123KBDURsr.dll62976 bytesMD5: e3beace9fb53c4ea2a2a5517d76b5b38
124rexsvc32.exe1735854 bytesMD5: 5b0a5c74d78559d8a7367c9719cd40e5
125refobaju.dll50688 bytes
126sysrc32.exe12288 bytes
127mejiyolo.dll88064 bytes
128pehuraba.dll88064 bytes
129nl5.exe1464320 bytes
130afitegef.dll181248 bytesMD5: 561281ee46cf4df81d610382a80ec6aa
131fwtrtuqtssd.exe262144 bytesMD5: f3992fde36ff8e1ebb24d1e0f3cb95ea
132%TEMP%
133vabofoka.dll48128 bytes
134logomafe.dll88576 bytes
135%ProgramFiles%\bpph??????????
136Warn Support.exe704512 bytes
137%UserProfile%\Application Data\rhc?????????
138mukejowe.dll89600 bytes
139bdsyslink.dll86016 bytes
140kavumefe.dll81920 bytes
141ibitolet.dll189952 bytesMD5: 233dc9f067988cb5a89f47f62276fc3f
142sonuleme.dll88064 bytes
143vubabuku.dll48128 bytes
144sekisahi.dll48128 bytes
145%SystemRoot%\System32\pphc?????????
146fechme.exe32768 bytes
147%SystemRoot%\System32\rhc?????????
148photo_id.exe27755 bytes
149rigiwoti.dll81920 bytes
150mcfg.exe15360 bytesMD5: 3026b2ce720126c88cb8831e002a7f42
151ehczrw312.exe1150976 bytes
152wehebopa.dll50176 bytes
153wisegava.dll50688 bytes
154%UserProfile%\bpph??????????
155sesanujo.dll70144 bytes
156%ProgramFiles%\pphc?????????
157fezahoyu.dll81920 bytes
158%UserProfile%\Application Data\bpph??????????
159evejubet.dll194048 bytesMD5: 73b599d33ae2f39ef880ac2195ea6ce9
160kbdnet.dll30720 bytes
161viyiyini.dll88064 bytes
162rdolib.dll30720 bytes
163oqifubeqixi.dll188416 bytesMD5: 611049af410f7421a4aa95dfaff83a06
164uvumaxeqa.dll186368 bytesMD5: 1d2f7578eeee5cd17d39e57dd6de31b0
165vopereso.dll49152 bytes
166%ProgramFiles%\643f??????????
167sdasda.exe66560 bytes
168obaluqizevax.dll182784 bytesMD5: e18c0753f6729408f93832496a7085be
169%ProgramFiles%
170bujiwofi.dll70144 bytes
171baka6.exe144384 bytesMD5: c95ecdad9b7dabf9eb81b4cf50a1aa59
172207163515.exe892416 bytesMD5: 695a8155cf64fa91f33241cb825a78c4
173kusers.dll205840 bytes
174fejolave.dll50688 bytes
175uqogumamumuse.dll183808 bytesMD5: f9dbaec1d7f298488edd7340029f808d
176dodohovo.dll107520 bytes
177uqiwaceh.dll187392 bytesMD5: d7c17417a83ab2c658cb5c025f8f2500
178barijatu.dll50176 bytes
179SerialsWorld.exe1075712 bytes
180kekasika.dll49664 bytes
181jelayube.dll72861 bytes
182asvdxl.dll79872 bytesMD5: bc2780a2a6d2c21b76c8716975c10813
183bopufeto.dll50176 bytes
184%SystemRoot%\System32\643f??????????
185junefare.dll50688 bytes
186icaqx.exe124414 bytesMD5: 36547fb1efeb3d949032ab5bf8040c76
187csrcs.exe20480 bytesMD5: fb52692745918a67cbd7e9cc26982627
188sogidona.dll89088 bytes
189powamahe.dll109056 bytes
190akihovojamaz.dll180224 bytesMD5: 859e7381425e73ec2d908216567448e4
191vcnews.exe2784256 bytesMD5: c8009d121e537630ee9d97578c4249e8
192etomemap.dll179200 bytesMD5: 637e74ea2f3f3b948ca58a3f9fa9da53
193ajuquqoqepoqu.dll179200 bytesMD5: 101c7b1219b42021916ee9f7b7836b23
194uyefesujoxumu.dll182784 bytesMD5: f42cc970e73eaee3d6419c9be9ced491
195%ProgramFiles%\rhc?????????
196zemupalu.dll89600 bytes
197kafunepi.dll80384 bytes
198wirepots.exe8704 bytesMD5: 4c1fd02d449c708d7708deb17f9dc6c5
199hoyuvuki.dll50176 bytes
200nevoputo.dll89600 bytes
201%UserProfile%
202AcroIEHelpe022.dll216400 bytesMD5: 417958dc10a28999d539ca25fb35f884
203akuzivazoveraxif.dll185344 bytesMD5: 8ccb115f9ae7f00b03e5fe57313915c9
204wisysvi.dll67072 bytesMD5: cd5ecd06b63492fbcb6509dc20442631
205%SystemRoot%\System32\thc?????????
206miduyevu.dll89600 bytes
2071361163109.exe991232 bytesMD5: 9fcf0e8c39b00227ba76a1bdaee25480
208%UserProfile%\whc?????????
209weluyiki.dll107520 bytes
210pascmgp.exe438272 bytesMD5: e18777a913aa00cdf543c89bd3e271cb
211%UserProfile%\rhc?????????
212flsysio.exe371200 bytesMD5: 386e79decf1debf931692da686d2941f
213%ProgramFiles%\lphc?????????
214oderobifamaves.dll181248 bytesMD5: bcb38a3af170849ed800813980c098c5
215aboheraj.dll187904 bytesMD5: f9412fbd4707eca38cb794f439af6294
216Ffodoa.exe163840 bytesMD5: a5690ed0f4f2a3184fd469d5be888072
217idojapimogudoray.dll185344 bytesMD5: 6b08c208052f9e5cc2190d6801ac1b9e
218wujiwibe.dll88064 bytes
219winlo.exe1220215 bytes
220%UserProfile%\643f??????????
221lopibeki.dll70144 bytes
222kufefele.dll50688 bytes
223realsvc.exe143537 bytes
224nuviyapi.dll49152 bytes
225dijoromo.dll50176 bytes
226%SystemRoot%\System32\lphc?????????
227kifupiza.dll50176 bytes
228omshtup.dll74752 bytesMD5: 5c4a9189143898c880c685baefe0949f
229mivalivo.dll49664 bytes
230balomane.dll80384 bytes
231ovamudutibofe.dll195584 bytesMD5: 636d4967bd46a237f681c8339559688c
232evizavohiyesupa.dll186880 bytesMD5: 93e22d9b2653be354a9214a8d1915d47
233%SystemRoot%\System32
234pofolehe.dll51200 bytes
235lepopoka.dll50688 bytes
236dizubure.dll66560 bytes
237qycu.exe133632 bytesMD5: 4f78005695709f8a9b48ec2598301d7d
238sgpron.dll62464 bytesMD5: 261b36cee988614c50f1d17100409f3d
239comparevers.exe455575 bytesMD5: 832ffbc37551be1f9b14dd44a462d3a8
240uqojanecatevih.dll182784 bytesMD5: 8a9effc288c73c50e8ccbd76f29f4f8f
241kozeyizu.dll89088 bytes
242kusewovi.dll69120 bytes
243xipr.exe184848 bytes
244srenum.sys36480 bytes
245palowaru.dll48640 bytes
246potibubi.dll50176 bytes
247ijucahalevet.dll181760 bytesMD5: a4687240401c1d4ef8e1bead595cbca3
248nl2.exe1918976 bytes
249vybi.exe115200 bytesMD5: dbdf452705cb7e45fee3063e1e12f99b
250uhoyureg.dll182272 bytesMD5: e27f0bd6b5d9af43fd35abaa37123f54
251livukafa.dll49664 bytes
252zyex.exe132608 bytesMD5: 1879ac641af2e71f26905cb048a07857
253bupuyafo.dll89088 bytes
254SystemAutorun.exe377344 bytesMD5: a1451e7535d918f60a31409acb76186a
255nl6.exe1453056 bytes
256iksuy.exe140151 bytesMD5: cfc995ef0b0728896b5120c5adf214e0
257eruzurow.dll180224 bytesMD5: 63178a01d821357152f686e70909bf3e
258dwm.exe318464 bytesMD5: b9ec59d036d43e1302083ef3e48b1311
259MySelf.exe571392 bytesMD5: 6e01f914fa6edf1df717b293d2265d68
260zezowawi.dll106496 bytes
261%SystemRoot%\System32\phc?????????
262%UserProfile%\Application Data\phc?????????
263iqugumamu.dll183296 bytesMD5: 3a18d024f36469eed2cc3ef1e6648725
264asycfil.dll123904 bytes
265fahokipa.dll86528 bytes
266yowujeje.dll48640 bytes
267tipifipo.dll109056 bytes
268caese.exe116736 bytesMD5: a3e5d6733da460ebf9d0c4332bb95f37
269bawawaza.dll78848 bytes
270winmyy32.dll39424 bytes
271reqi.exe116224 bytesMD5: fb482abc534c45584bfab8e7c621b2e6
272hesudobu.dll104960 bytes
273roam five.exe700416 bytes
274svcchosst.exe101376 bytes
275odbn0.exe295424 bytes
276uvojigulukacega.dll181760 bytesMD5: 8ba96641c0cf6ba391ad8b6081ba36e7
277zipavagi.dll50688 bytes
278nageduge.dll50688 bytes
279pulobuha.dll109056 bytes
280togojaze.dll50176 bytes
281icocalolacihir.dll182272 bytesMD5: a0f9b695b2711007dc5201a98de184f4
282yopalimi.dll106496 bytes
283%UserProfile%\Application Data\643f??????????
284papororo.dll88576 bytes
285yamanewa.dll80384 bytes
286%UserProfile%\Application Data\blphc?????????
287idumowapupiy.dll183296 bytesMD5: 039e2ad7866d29aa5751b3810fd015fc
288%ProgramFiles%\phc?????????
289sihosido.dll108032 bytes
290pcpriv.exe397824 bytes
291sumonibe.dll49152 bytes
292dx8vb32.dll139264 bytes
293dowikabu.dll87552 bytes
294aim remote.exe683520 bytes
295wahayaga.dll49664 bytes
296fenofaki.dll87040 bytes
297itufijorece.dll207360 bytesMD5: 3334de88ae7ce7034ff0b075ec923599
298%ProgramFiles%\whc?????????
299zofowoda.dll50688 bytes
300bovekafu.dll89600 bytes

Modifications du registre :

Les clés de registre suivantes ont été créées :

  • SOFTWARE\Microsoft\Internet Explorer\Toolbar {3B4EFB6A-06FD-40AC-B072-1FB7D1D456E8}
  • \YUR10.exe
  • SOFTWARE\Microsoft\Internet Explorer\Toolbar {8E21DC20-6E4E-42B3-9796-244EC9385CEF}
  • cokx
  • {157627A6-2A10-4aa1-B97F-90B8DC6F24AC}
  • \YUR130.exe
  • cont_mxlivemedia
  • Sys1.exe
  • FixCamera
  • \Win12.exe
  • \YUR2A.exe
  • hlpproc
  • C:\WINDOWS\System32\kdmsh.exe
  • vmdetdhc.exe
  • SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer\Run xqe6lJLnN1
  • SerialsWorld
  • Sys2.exe
  • \YUR2.exe
  • Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler {B2BA40A2-74F0-42BD-F434-12345A2C8953}
  • \YUR12.exe
  • \Win11.exe
  • Long Internet Team Stupid
  • SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUNONCE gi985993737
  • \YUR131.exe
  • Software\Microsoft\Windows\CurrentVersion kdid
  • \YUR2D.exe
  • Software\Microsoft\Windows\CurrentVersion kdmsh.exe
  • SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\ShellExecuteHooks {C14E6230-757D-4246-81CE-B34E2940C722}
  • SOFTWARE\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad fdxbameg
  • Facegame
  • \YUR5.exe
  • GetPack21
  • \YURC.exe
  • \YUR15.exe
  • SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\ShellExecuteHooks {BB4C402F-882A-4526-8C08-51278EA437C1}
  • Software\Microsoft\Internet Explorer\Explorer Bars {C2EC2654-52F0-3E63-9017-D0FA8FA79271}
  • software\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad tfnslopk
  • \VIE2.exe
  • advap32
  • SOFTWARE\Microsoft\Internet Explorer\Toolbar {57776700-7BC8-47AC-B43E-99C24B015570}
  • \YUR12E.exe
  • SOFTWARE\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad xrdwbfgn
  • {E4785213-3EFE-4c26-A9B4-332440E31F6F}
  • \YURA.exe
  • software\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad xokvrpwg
  • bone thunk axis copy
  • \YUR18.exe
  • GetPack19
  • Online Alert Manager
  • \VIE3.exe
  • \YUR11.exe
  • \VIE14.exe
  • lljyn_df
  • \YUR2C.exe
  • \YUR9.exe
  • SOFTWARE\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad rwlfsdmk
  • {09E23F2C-ED1E-43FC-9AA1-1332162A35AE}
  • Sys4.exe
  • \YUR1.exe
  • Microsoft\Windows NT\CurrentVersion\Winlogon\Notify __c0040F39
  • Microsoft\Windows NT\CurrentVersion\Winlogon\Notify nnnkiGvV
  • SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\ShellExecuteHooks {D3CCFAF7-DF03-4E73-95EC-E5E139CC2BF2}
  • \YUR30.exe
  • \YUR12F.exe
  • \VIE2F.exe
  • Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run andfor
  • \YURD.exe
  • Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run servises
  • Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler {0ba3e00d-b660-46e6-a2db-2672ee82dc98}
  • \YUR8.exe
  • \YUR14.exe
  • penis.exe
  • \YUR3.exe
  • \YUR6.exe
  • \Win10.exe
  • \YUR2B.exe
  • \YUR13.exe
  • Software\Microsoft\Internet Explorer\Explorer Bars {EB9539EB-598E-BCA7-3D4A-82F4F26E9738}
  • C:\WINDOWS\system32\kdswe.exe
  • \YURE.exe
  • %windir%\System32\kdmsh.exe
  • ROAD ITCH AMOK PING
  • ptidle
  • Captcha5
  • \VIE5.exe
  • {4D4DB474-8435-4FA1-8D91-512C0CE1E931}
  • xydzyh
  • Microsoft\Windows NT\CurrentVersion\Winlogon\Notify cxqmyibm
  • {3BCF8450-D134-427E-AE9C-2A42CE8215CC}
  • \YUR20.exe
  • 515.tmp
  • \YUR4.exe
  • \YURB.exe
  • {0389E53C-62CF-4CD6-9F4E-955A740E4385}
  • Cognac
  • %windir%\System32\kdwls.exe
  • \Win14.exe
  • SmartMon
  • memo site kind that
  • Software\Microsoft\Internet Explorer\Explorer Bars {9CDB6E2A-B859-45BB-8F05-AF684301AB41}
  • Somefox
  • C:\WINDOWS\System32\kdwls.exe
  • Software\Microsoft\Internet Explorer\Explorer Bars {FCDEE81D-95A3-AE8A-D4FB-5A9FB8E32860}
  • BIND SUPPORT SEEK FIRST
  • F5JMWNZTHI
  • \Win13.exe
  • \YURF.exe
  • {78B578D7-BCE1-4d83-9CD4-195BC34D8CB3}
  • SOFTWARE\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad fsrpknov
  • Sys3.exe
  • Microsoft\Windows NT\CurrentVersion\Winlogon\Notify ssqPhEVM
  • %windir%\system32\kdswe.exe
  • Software\Microsoft\Windows\CurrentVersion kdksc.exe

Réponse

Votre adresse e-mail ne sera pas publiée.

Nom
Site Web
Commentaire

Entrez les chiffres dans la boîte à droite *