cjoint

Publicité


Publicité

Format du document : text/plain

Prévisualisation

Malwarebytes Anti-Malware
www.malwarebytes.org

Date de l'analyse: 29/08/2015
Heure de l'analyse: 11:05
Fichier journal: mbam.txt
Administrateur: Oui

Version: 2.1.8.1057
Base de données de programmes malveillants: v2015.08.29.01
Base de données de rootkits: v2015.08.16.01
Licence: Essai
Protection contre les programmes malveillants: Activé
Protection contre les sites Web malveillants: Activé
Autoprotection: Désactivé

Système d'exploitation: Windows 7 Service Pack 1
Processeur: x64
Système de fichiers: NTFS
Utilisateur: sabine

Type d'analyse: Analyse des menaces
Résultat: Terminé
Objets analysés: 592628
Temps écoulé: 31 min, 50 s

Mémoire: Activé
Démarrage: Activé
Système de fichiers: Activé
Archives: Activé
Rootkits: Activé
Heuristique: Activé
PUP: Activé
PUM: Activé

Processus: 0
(Aucun élément malveillant détecté)

Modules: 0
(Aucun élément malveillant détecté)

Clés du registre: 21
PUP.Optional.FunMoods.A, HKU\S-1-5-21-1202070769-4007419787-388287912-1000\SOFTWARE\MICROSOFT\INTERNET EXPLORER\SEARCHSCOPES\{B7971660-A1CE-4FDD-B9E0-2C37D77AFB0B}, En quarantaine, [7025739b0f7cdf57473e3e94eb179868],
PUM.Security.Hijack.DisableChromeUpdates, HKLM\SOFTWARE\POLICIES\GOOGLE\UPDATE, En quarantaine, [f79e2ee08704de58bcc0a90017edc53b],
PUP.Optional.MediaPlayerAlpha.A, HKLM\SOFTWARE\WOW6432NODE\MediaPlayerV1alpha176, En quarantaine, [2273848a583355e13a08dc8b07fc629e],
PUP.Optional.MediaViewer.A, HKLM\SOFTWARE\WOW6432NODE\MediaViewerV1alpha1653, En quarantaine, [ddb8d23c078484b24ec73d2746bd27d9],
PUP.Optional.BetterSurf.A, HKLM\SOFTWARE\WOW6432NODE\GOOGLE\CHROME\EXTENSIONS\dedmngkbaffkenlfdcbganndoghblmap, En quarantaine, [c3d210fec7c4ba7cc846da8042c1629e],
PUP.Optional.BetterSurf.A, HKLM\SOFTWARE\WOW6432NODE\GOOGLE\CHROME\EXTENSIONS\poheodfamflhhhdcmjfeggbgigeefaco, En quarantaine, [d5c01cf2890267cf685ebea2db28ac54],
PUP.Optional.MediaViewer.A, HKLM\SOFTWARE\WOW6432NODE\GOOGLE\CHROME\EXTENSIONS\JIIDMDMMHIONIDDDCLDDCGLAMELLHNED, En quarantaine, [9ef760ae4a4177bf3cdc2504976c649c],
PUP.Optional.VideoPlayer.A, HKLM\SOFTWARE\WOW6432NODE\GOOGLE\CHROME\EXTENSIONS\PKLHIOFMDMFBNICHBLODJKOPFLOKECKN, En quarantaine, [870e6aa40784f04676a946e38f74f50b],
PUP.Optional.Bandoo.A, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\INTERNET EXPLORER\LOW RIGHTS\ELEVATIONPOLICY\{55D266F8-D1CB-4EC7-8104-B4554A3F2B6F}, En quarantaine, [b1e4ce400b80082ebf9e426ddf2542be],
PUM.Security.Hijack.DisableChromeUpdates, HKLM\SOFTWARE\WOW6432NODE\POLICIES\GOOGLE\UPDATE, En quarantaine, [e7aec84690fb46f081fb6346818302fe],
PUP.Optional.DataMngr.A, HKU\S-1-5-21-1202070769-4007419787-388287912-1000\SOFTWARE\DataMngr, En quarantaine, [f3a2c44adbb0ce68b6183b3e6e96ce32],
PUP.Optional.SProtector.A, HKU\S-1-5-21-1202070769-4007419787-388287912-1000\SOFTWARE\APPDATALOW\SProtector, En quarantaine, [9500ed21fa911b1b0353d9a3bb49ea16],
PUP.Optional.Conduit.A, HKU\S-1-5-21-1202070769-4007419787-388287912-1000\SOFTWARE\APPDATALOW\SOFTWARE\ConduitSearchScopes, En quarantaine, [00950fff59321323adfe56e68c77b24e],
PUP.Optional.PriceGong.A, HKU\S-1-5-21-1202070769-4007419787-388287912-1000\SOFTWARE\APPDATALOW\SOFTWARE\PriceGong, En quarantaine, [40558e8052393afc88abfa43778c5ca4],
PUP.Optional.Conduit.A, HKU\S-1-5-21-1202070769-4007419787-388287912-1000\SOFTWARE\CONDUIT\FF, En quarantaine, [761fcc42b6d5d95d66cd4e314eb6c838],
PUP.Optional.SearchResults.A, HKU\S-1-5-21-1202070769-4007419787-388287912-1000\SOFTWARE\MICROSOFT\INTERNET EXPLORER\SEARCHSCOPES\{10739061-D81C-46A5-9A56-0A5462B7A9DB}, En quarantaine, [3c5937d7fb90063098d232f41fe424dc],
PUP.Optional.Tuto4PC.A, HKU\S-1-5-21-1202070769-4007419787-388287912-1000\SOFTWARE\TUTORIALS\updatetutorialshp, En quarantaine, [1382e02ea3e860d6e397b37ec142cf31],
Trojan.Zaccess, HKU\S-1-5-21-1202070769-4007419787-388287912-1000_Classes\CLSID\{42AEDC87-2188-41FD-B9A3-0C966FEABEC1}\INPROCSERVER32, En quarantaine, [1c7944ca9eed3cfa752681bf92729c64],
Trojan.Zaccess, HKU\S-1-5-21-1202070769-4007419787-388287912-1000_Classes\CLSID\{42AEDC87-2188-41FD-B9A3-0C966FEABEC1}, En quarantaine, [1c7944ca9eed3cfa752681bf92729c64],
Trojan.Zaccess, HKLM\SOFTWARE\WOW6432NODE\CLASSES\CLSID\{42AEDC87-2188-41FD-B9A3-0C966FEABEC1}, Supprimer au redémarrage, [1c7944ca9eed3cfa752681bf92729c64],
Trojan.Zaccess, HKLM\SOFTWARE\CLASSES\WOW6432NODE\CLSID\{42AEDC87-2188-41FD-B9A3-0C966FEABEC1}, Supprimer au redémarrage, [1c7944ca9eed3cfa752681bf92729c64],

Valeurs du registre: 17
PUP.Optional.uTorrentBar.A, HKU\S-1-5-21-1202070769-4007419787-388287912-1000\SOFTWARE\MICROSOFT\INTERNET EXPLORER\TOOLBAR\WEBBROWSER\{05EEB91A-AEF7-4F8A-978F-FB83E7B03F8E}, En quarantaine, [3a5bc9458b00280e13eefea2f012c43c],
PUP.Optional.uTorrentBar.A, HKU\S-1-5-21-1202070769-4007419787-388287912-1000\SOFTWARE\MICROSOFT\INTERNET EXPLORER\TOOLBAR\WEBBROWSER|{05EEB91A-AEF7-4F8A-978F-FB83E7B03F8E}, ¹î ÷®ŠO—ûƒç°?Ž, En quarantaine, [3a5bc9458b00280e13eefea2f012c43c]
PUP.Optional.Iminent.A, HKU\S-1-5-21-1202070769-4007419787-388287912-1000\SOFTWARE\MICROSOFT\INTERNET EXPLORER\TOOLBAR\WEBBROWSER\{977AE9CC-AF83-45E8-9E03-E2798216E2D5}, En quarantaine, [2174917d28635adc2fea577dd23025db],
PUP.Optional.Iminent.A, HKU\S-1-5-21-1202070769-4007419787-388287912-1000\SOFTWARE\MICROSOFT\INTERNET EXPLORER\TOOLBAR\WEBBROWSER|{977AE9CC-AF83-45E8-9E03-E2798216E2D5}, Ìéz—ƒ¯èEž ây‚ âÕ, En quarantaine, [2174917d28635adc2fea577dd23025db]
PUM.Security.Hijack.DisableChromeUpdates, HKLM\SOFTWARE\POLICIES\GOOGLE\UPDATE|DisableAutoUpdateChecksCheckboxValue, 1, En quarantaine, [f79e2ee08704de58bcc0a90017edc53b]
PUP.Optional.MediaViewer.A, HKLM\SOFTWARE\WOW6432NODE\GOOGLE\CHROME\EXTENSIONS\jiidmdmmhionidddclddcglamellhned|path, C:\Program Files (x86)\MediaViewerV1\MediaViewerV1alpha1653\ch\MediaViewerV1alpha1653.crx, En quarantaine, [9ef760ae4a4177bf3cdc2504976c649c]
PUP.Optional.VideoPlayer.A, HKLM\SOFTWARE\WOW6432NODE\GOOGLE\CHROME\EXTENSIONS\pklhiofmdmfbnichblodjkopflokeckn|path, C:\Program Files (x86)\VideoPlayerV3\VideoPlayerV3beta10582\ch\VideoPlayerV3beta10582.crx, En quarantaine, [870e6aa40784f04676a946e38f74f50b]
PUP.Optional.Bandoo.A, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\INTERNET EXPLORER\LOW RIGHTS\ELEVATIONPOLICY\{55D266F8-D1CB-4EC7-8104-B4554A3F2B6F}|AppPath, C:\PROGRA~2\SEARCH~1\Datamngr\ToolBar, En quarantaine, [b1e4ce400b80082ebf9e426ddf2542be]
PUP.Optional.BetterSurf.A, HKLM\SOFTWARE\WOW6432NODE\MOZILLA\FIREFOX\EXTENSIONS|12x3q4@3244516.com, C:\Program Files (x86)\Better-Surf\ff, En quarantaine, [3f56cf3f117a70c68e3b163cec178b75]
PUP.Optional.VideoPlayer.A, HKLM\SOFTWARE\WOW6432NODE\MOZILLA\FIREFOX\EXTENSIONS|ext@VideoPlayerV3beta10582.net, C:\Program Files (x86)\VideoPlayerV3\VideoPlayerV3beta10582\ff, En quarantaine, [4f4624ea8a012e081124bea20102629e]
PUP.Optional.MediaPlayerAlpha.A, HKLM\SOFTWARE\WOW6432NODE\MOZILLA\FIREFOX\EXTENSIONS|ext@MediaPlayerV1alpha176.net, C:\Program Files (x86)\MediaPlayerV1\MediaPlayerV1alpha176\ff, En quarantaine, [e1b4cb43a0eb23135ee5c7a03fc4a65a]
PUP.Optional.MediaViewer.A, HKLM\SOFTWARE\WOW6432NODE\MOZILLA\FIREFOX\EXTENSIONS|ext@MediaViewerV1alpha1653.net, C:\Program Files (x86)\MediaViewerV1\MediaViewerV1alpha1653\ff, En quarantaine, [167fe6281d6e2214e92dbfa5f60d669a]
PUM.Security.Hijack.DisableChromeUpdates, HKLM\SOFTWARE\WOW6432NODE\POLICIES\GOOGLE\UPDATE|DisableAutoUpdateChecksCheckboxValue, 1, En quarantaine, [e7aec84690fb46f081fb6346818302fe]
PUP.Optional.ConduitSearchProtect, HKU\S-1-5-18\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN|SearchProtect, \SearchProtect\bin\cltmng.exe, En quarantaine, [f69fa569d9b289add45790e78d778b75]
PUP.Optional.SearchResults.A, HKU\S-1-5-21-1202070769-4007419787-388287912-1000\SOFTWARE\MICROSOFT\INTERNET EXPLORER\SEARCHSCOPES\{10739061-D81C-46A5-9A56-0A5462B7A9DB}|URL, http://dts.search-results.com/sr?src=ieb&appid=0&systemid=410&sr=0&q={searchTerms}, En quarantaine, [3c5937d7fb90063098d232f41fe424dc]
PUP.Optional.SearchQu.A, HKU\S-1-5-21-1202070769-4007419787-388287912-1000\SOFTWARE\MICROSOFT\INTERNET EXPLORER\SEARCHSCOPES\{10739061-D81C-46A5-9A56-0A5462B7A9DB}|SuggestionsURL_JSON, http://www.searchqu.com/suggest.php?src=ieb&appid=0&systemid=410&qu={searchTerms}&ft=json, En quarantaine, [1b7aeb230487b18543046f34669e5ba5]
Trojan.Zaccess, HKU\S-1-5-21-1202070769-4007419787-388287912-1000_Classes\CLSID\{42AEDC87-2188-41FD-B9A3-0C966FEABEC1}\INPROCSERVER32, C:\Users\user\AppData\Local\{5cdd7930-f78a-5f46-24b5-e846d199ad20}\n., En quarantaine, [1c7944ca9eed3cfa752681bf92729c64]

Données du registre: 1
Trojan.DNSChanger, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\TCPIP\PARAMETERS\Interfaces\{C6FF82F5-AF88-4A04-8420-523FA81D011B}|NameServer, 199.203.131.145,82.163.143.167, Bon : (), Mauvais : (199.203.131.145,82.163.143.167),Remplacé,[efa6c549aae1251125dbb3ade0257b85]

Dossiers: 18
PUP.Optional.ConduitTB.Gen, C:\Users\user\AppData\Local\CRE, En quarantaine, [97fe50be404ba195ac329492d42f7987],
PUP.Optional.OffersWizard.A, C:\Program Files (x86)\Common Files\Config, En quarantaine, [dbba31ddbccf9b9b81704e000cf7ef11],
Trojan.EoRezo, C:\Users\user\AppData\Local\tuto4pc_fr_5, En quarantaine, [e5b063ab63281f173849d6e451b326da],
Trojan.EoRezo, C:\Users\user\AppData\Local\tuto4pc_fr_5\Download, En quarantaine, [e5b063ab63281f173849d6e451b326da],
Trojan.EoRezo, C:\Users\user\AppData\Local\tuto4pc_fr_5\tuto4pc_fr_5, En quarantaine, [e5b063ab63281f173849d6e451b326da],
Trojan.EoRezo, C:\Users\user\AppData\Local\tuto4pc_fr_5\tuto4pc_fr_5\1.0, En quarantaine, [e5b063ab63281f173849d6e451b326da],
PUP.Optional.BrowserAdBlocker.A, C:\ProgramData\Browser AdBlocker, En quarantaine, [65302fdf4b40f145290935d0966d08f8],
PUP.Optional.MiniAdblocker.A, C:\ProgramData\Mini - Adblocker, En quarantaine, [fa9b3dd193f8280e61d78481917225db],
PUP.Optional.SupremeAdblocker.A, C:\ProgramData\Supreme AdBlocker, En quarantaine, [455077976e1d5adcc73d92748182e31d],
PUP.Optional.TheAdBlock.A, C:\ProgramData\TheAdBlock, En quarantaine, [10852be38dfef34347fee91daf54f010],
PUP.Optional.RandomPrice.A, C:\ProgramData\RanDomPriCe, En quarantaine, [cacb010d8209c373dc2a8b7c13f0cb35],
PUP.Optional.EnjoyCoupon.A, C:\ProgramData\EnjOyCOupon, En quarantaine, [63326da190fbc175ca4abb4d699ac937],
PUP.Optional.RedAdBlocker.A, C:\ProgramData\Red AdBlocker, En quarantaine, [494c729cd4b7fe38af40937642c111ef],
PUP.Optional.ProtectedSearch.A, C:\Windows\System32\Tasks\ProtectedSearch, En quarantaine, [692c9e7006852b0bdf832ced13f0659b],
PUP.Optional.DataMngr.A, C:\Users\user\AppData\LocalLow\DataMngr, En quarantaine, [f69fe02e2e5d78beb6ab2bf10af904fc],
Trojan.Siredef.C, C:\$Recycle.Bin\S-1-5-21-1202070769-4007419787-388287912-1000\$5cdd7930f78a5f4624b5e846d199ad20\U, En quarantaine, [fb9a1af41e6d89ad180f11f0ae52fd03],
Trojan.Siredef.C, C:\$Recycle.Bin\S-1-5-21-1202070769-4007419787-388287912-1000\$5cdd7930f78a5f4624b5e846d199ad20\L, En quarantaine, [10855faf1477ce689b8ee61b837d7e82],
Trojan.Siredef.C, C:\$Recycle.Bin\S-1-5-21-1202070769-4007419787-388287912-1000\$5cdd7930f78a5f4624b5e846d199ad20, En quarantaine, [9df81ef042493bfb8aa0fe035ca4cc34],

Fichiers: 47
PUP.Optional.MultiPlug.Uns, C:\ProgramData\Browser AdBlocker\Browser AdBlocker.exe, En quarantaine, [197cf816d0bb989ebe4bb3d2c63c0000],
PUP.Optional.MultiPlug.Uns, C:\ProgramData\Mini - Adblocker\Mini - Adblocker.exe, En quarantaine, [d7be64aa791282b42cddb8cd1de57987],
PUP.Optional.MultiPlug.Uns, C:\ProgramData\TheAdBlock\TheAdBlock.exe, En quarantaine, [276edd316625b185e623226328da4bb5],
PUP.Optional.InstallRex.A, C:\ProgramData\InstallMate\{FCA0FE59-3307-4549-A7A2-7B252743DCAF}\Custom.dll, En quarantaine, [771ebf4fb6d5bf775f14203fc63a5ba5],
PUP.Optional.MultiPlug.Uns, C:\ProgramData\Red AdBlocker\Red AdBlocker.exe, En quarantaine, [890c8a84e1aa0a2cbe4bbec77c8655ab],
PUP.Optional.SuperOptimizer.A, C:\Users\sabine\AppData\Local\Temp\supoptsetup.exe, En quarantaine, [009554bab7d4d5612ee8a6fb2dd46d93],
PUP.Optional.SearchProtect.A, C:\Users\sabine\AppData\Local\Temp\Runner.exe, En quarantaine, [c7ce60ae1e6d033336d187a69e634ab6],
PUP.Optional.SuperOptimizer.A, C:\Users\sabine\AppData\Local\Temp\0d756505\270861.ftf, En quarantaine, [f69f848aa0eb55e1b5007e2344bd8c74],
PUP.Optional.DNSUnlocker.BrwsrFlsh, C:\Users\sabine\AppData\Local\Temp\157a08eb\272830.ftf, En quarantaine, [296c24ea5d2e54e218de421c2ad6e21e],
PUP.Optional.DNSUnlocker.BrwsrFlsh, C:\Users\sabine\AppData\Local\Temp\20362460\227503.ftf, En quarantaine, [ace9d8365a31f83e51a591cdea166a96],
PUP.Optional.SuperOptimizer.A, C:\Users\sabine\AppData\Local\Temp\2e42e1cf\266358.ftf, En quarantaine, [a4f14ec0810aee48c9eca10027dafe02],
PUP.Optional.DNSUnlocker.BrwsrFlsh, C:\Users\sabine\AppData\Local\Temp\3affecfa\385232.ftf, En quarantaine, [593c808e8407320415e1a9b5936d24dc],
PUP.Optional.Conduit.A, C:\Users\user\AppData\Local\Temp\nsq9EE1.exe, En quarantaine, [068f0d01a1eada5cd529af466b955da3],
PUP.Optional.Conduit, C:\Users\user\AppData\Local\Temp\tbDVD0.dll, En quarantaine, [e8ad0b03741741f545d736fa3ac69b65],
PUP.Optional.Conduit.A, C:\Users\user\AppData\Local\Temp\ToolbarHelper.exe, En quarantaine, [b1e49a741d6e84b282e8c55a639d60a0],
PUP.Optional.Amonetize, C:\Users\user\AppData\Local\Temp\srv83025.exe, En quarantaine, [554078965e2ddd594893276943be7c84],
PUP.Optional.Amonetize, C:\Users\user\AppData\Local\Temp\upd8506.exe, En quarantaine, [c4d11fef92f93006bd8f61deb64bf30d],
PUP.Optional.Amonetize.A, C:\Users\user\AppData\Local\Temp\Updater.exe, En quarantaine, [7421dc322566999d375ef00258a8b14f],
PUP.Optional.Amonetize, C:\Users\user\AppData\Local\Temp\updr27577.exe, En quarantaine, [1d7813fbaedd63d37902abe526db6d93],
PUP.Optional.Amonetize, C:\Users\user\AppData\Local\Temp\updtr26400.exe, En quarantaine, [950048c6d2b9e94d0d6e4d4332cfff01],
PUP.Optional.Amonetize, C:\Users\user\AppData\Local\Temp\updtr37707.exe, En quarantaine, [7e173ad48a01b383bdbeabe5ef129967],
PUP.Optional.Conduit.A, C:\Users\user\AppData\Local\Temp\ct2269050\ffLogic.exe, En quarantaine, [b1e4010d8dfeff37c50ef10325db1de3],
PUP.Optiona.ConduitTB.Gen, C:\Users\user\AppData\Local\Temp\ct2269050\ieLogic.exe, En quarantaine, [c2d3878778136bcbc79c0b8446bfa55b],
PUP.Optional.Conduit.A, C:\Users\user\AppData\Local\Temp\ct2269050\statisticsStub.exe, En quarantaine, [bed7c44a77149d99447a28be8b751be5],
PUP.Optional.Conduit.A, C:\Users\Public\AutoUpdate.exe, En quarantaine, [8a0bf01e3a5177bf6e908471837d6799],
PUP.Optional.Amonetize, C:\Users\user\AppData\Local\7648\Updater.exe, En quarantaine, [682d2ce2107b2b0b56f67fc0000155ab],
PUP.Optional.Tuto4PC.A, C:\Users\user\AppData\Local\tuto4pc_fr_5\upt4pc_fr_5.exe, En quarantaine, [068f12fcd3b860d64cc12170a461768a],
Adware.EoRezo, C:\Users\user\AppData\Local\tuto4pc_fr_5\Download\majt4pcfr.exe, En quarantaine, [2372be50c8c3f2443a63824c8c75867a],
Adware.EoRezo, C:\Users\user\AppData\Local\tuto4pc_fr_5\Download\majt4pcfr_im.exe, En quarantaine, [266f6ba3fb9003338d10dcf2fc0509f7],
Adware.EoRezo, C:\Users\user\AppData\Local\tuto4pc_fr_5\Download\majt4pcfr_waj_im.exe, En quarantaine, [049116f8eba061d5801d9b3336cbbd43],
Adware.EoRezo, C:\Users\user\AppData\Local\tuto4pc_fr_5\Download\majt4pc_fr.exe, En quarantaine, [20757a94395284b2a2fbd7f71de4e818],
Adware.EoRezo, C:\Users\user\AppData\Local\tuto4pc_fr_5\Download\majtuto4pcfrdyn.exe, En quarantaine, [6035b35bd5b665d1efafdfef5ba63cc4],
Backdoor.0Access, C:\Windows\Installer\{5cdd7930-f78a-5f46-24b5-e846d199ad20}\L\00000004.@, En quarantaine, [573e9a74c3c8cf674c421fe1c63a3bc5],
PUP.Optional.ConduitTB.Gen, C:\Users\user\AppData\Local\CRE\plmlpkfpkijnlijgalnjaacllnjmoamo.crx, En quarantaine, [97fe50be404ba195ac329492d42f7987],
PUP.Optional.ContinueToSave.A, C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Storage\http_continuetosave.info_0.localstorage, En quarantaine, [deb74ac4d7b4a294a2c187c5a65db54b],
PUP.Optional.ContinueToSave.A, C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Storage\http_continuetosave.info_0.localstorage-journal, En quarantaine, [7520ff0f98f3cc6ac89b99b3d72cc33d],
PUP.Optional.OffersWizard.A, C:\Program Files (x86)\Common Files\Config\ver.xml, En quarantaine, [dbba31ddbccf9b9b81704e000cf7ef11],
Exploit.Drop.UR.2, C:\Users\user\0.4437204750329582.exe, En quarantaine, [455019f53d4e9d99d30ab20bc63d946c],
Trojan.Agent, C:\Users\user\ms.exe, En quarantaine, [4d48f915870453e381b878c86e96f010],
Trojan.EoRezo, C:\Users\user\AppData\Local\tuto4pc_fr_5\user_profil.cyp, En quarantaine, [e5b063ab63281f173849d6e451b326da],
Trojan.EoRezo, C:\Users\user\AppData\Local\tuto4pc_fr_5\upt4pc_fr_5.cyp, En quarantaine, [e5b063ab63281f173849d6e451b326da],
Trojan.EoRezo, C:\Users\user\AppData\Local\tuto4pc_fr_5\upt4pc_fr_5.exe, En quarantaine, [e5b063ab63281f173849d6e451b326da],
Trojan.EoRezo, C:\Users\user\AppData\Local\tuto4pc_fr_5\tuto4pc_fr_5\1.0\ads.cyl, En quarantaine, [e5b063ab63281f173849d6e451b326da],
Trojan.EoRezo, C:\Users\user\AppData\Local\tuto4pc_fr_5\tuto4pc_fr_5\1.0\conf.cyl, En quarantaine, [e5b063ab63281f173849d6e451b326da],
PUP.Optional.EnjoyCoupon.A, C:\ProgramData\EnjOyCOupon\SzrIB2ZnjUgnpJ.dat, En quarantaine, [63326da190fbc175ca4abb4d699ac937],
PUP.Optional.EnjoyCoupon.A, C:\ProgramData\EnjOyCOupon\SzrIB2ZnjUgnpJ.tlb, En quarantaine, [63326da190fbc175ca4abb4d699ac937],
PUP.Optional.DataMngr.A, C:\Users\user\AppData\LocalLow\DataMngr\{7CA1F051-A4FB-4143-B263-02B41E571EED}, En quarantaine, [f69fe02e2e5d78beb6ab2bf10af904fc],

Secteurs physiques: 0
(Aucun élément malveillant détecté)


(end)

Publicité


Signaler le contenu de ce document

Publicité