cjoint

Publicité


Publicité

Format du document : text/plain

Prévisualisation

Malwarebytes Anti-Malware
www.malwarebytes.org

Date de l'analyse: 16/08/2015
Heure de l'analyse: 18:19
Fichier journal: Journal d'analyse MBAM.txt
Administrateur: Oui

Version: 2.1.8.1057
Base de données de programmes malveillants: v2015.08.16.02
Base de données de rootkits: v2015.08.06.01
Licence: Essai
Protection contre les programmes malveillants: Activé
Protection contre les sites Web malveillants: Activé
Autoprotection: Désactivé

Système d'exploitation: Windows 8.1
Processeur: x64
Système de fichiers: NTFS
Utilisateur: grand_000

Type d'analyse: Analyse des menaces
Résultat: Terminé
Objets analysés: 347656
Temps écoulé: 28 min, 57 s

Mémoire: Activé
Démarrage: Activé
Système de fichiers: Activé
Archives: Activé
Rootkits: Désactivé
Heuristique: Activé
PUP: Activé
PUM: Activé

Processus: 3
Adware.PennyBee, C:\ProgramData\QongaMiwe\voeiaqi.exe, 1912, Supprimer au redémarrage, [166c2bde3e4dea4cbcffcef9bf4244bc]
Adware.PennyBee, C:\ProgramData\QongaMiwe\voeiwqi.exe, 2052, Supprimer au redémarrage, [057d0108f09ba98dcdeee3e425dcff01]
PUP.Optional.EORezo, C:\Users\grand_000\AppData\Local\gmsd_fr_005010061\upgmsd_fr_005010061.exe, 2500, Supprimer au redémarrage, [f09258b159320c2a396ebdc8aa5bf907]

Modules: 0
(Aucun élément malveillant détecté)

Clés du registre: 13
Adware.PennyBee, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\giskouo, En quarantaine, [166c2bde3e4dea4cbcffcef9bf4244bc],
Adware.PennyBee, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\witwachet, En quarantaine, [057d0108f09ba98dcdeee3e425dcff01],
PUP.Optional.ABengine.A, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\acwfp, En quarantaine, [96ec8d7c09820d29ad6c04b055afdf21],
PUP.Optional.AnyProtect.A, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\TREE\APSnotifierPP1, Supprimer au redémarrage, [235f2bdeb8d383b363f84ecb54af47b9],
PUP.Optional.AnyProtect.A, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\TREE\APSnotifierPP2, Supprimer au redémarrage, [0c76cb3e2764989ea2b9da3f04ffca36],
PUP.Optional.AnyProtect.A, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\TREE\APSnotifierPP3, Supprimer au redémarrage, [463c5dacc9c2c076c794e1385aa9be42],
PUP.Optional.TempoRunner.A, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\TREE\Tempo Runner voeidqi, Supprimer au redémarrage, [31514abff596f73f33b027f1b64dd729],
PUP.Optional.Shopperz.A, HKU\S-1-5-18\SOFTWARE\{98AD4C4E-92AB-47B9-A529-A437E2E545E0}, En quarantaine, [6121d3362665cb6b492cc7e7c242ae52],
PUP.Optional.Shopperz.A, HKU\S-1-5-19\SOFTWARE\{98AD4C4E-92AB-47B9-A529-A437E2E545E0}, En quarantaine, [eb97ca3f2d5e5adc472eb0fe7e8658a8],
PUP.Optional.Shopperz.A, HKU\S-1-5-20\SOFTWARE\{98AD4C4E-92AB-47B9-A529-A437E2E545E0}, En quarantaine, [7c0651b85d2eff376f060ca245bfcd33],
PUP.Optional.OutBrowse.A, HKU\S-1-5-21-463824160-1797773122-1175763634-1001\SOFTWARE\OB, En quarantaine, [7d057f8a9cefb2848c96c6edb84c9b65],
PUP.Optional.Tuto4PC.A, HKU\S-1-5-21-463824160-1797773122-1175763634-1001\SOFTWARE\TUTORIALS\updatetutorialeshp, En quarantaine, [e0a2aa5ff49762d43b6c40e9c14216ea],
PUP.Optional.Shopperz.A, HKU\S-1-5-21-463824160-1797773122-1175763634-1001\SOFTWARE\{98AD4C4E-92AB-47B9-A529-A437E2E545E0}, En quarantaine, [334f2cdd1972f73f6114bfefc24236ca],

Valeurs du registre: 13
PUP.Optional.EORezo, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\RUNONCE|upgmsd_fr_005010061.exe, C:\Users\grand_000\AppData\Local\gmsd_fr_005010061\upgmsd_fr_005010061.exe -runonce, En quarantaine, [f09258b159320c2a396ebdc8aa5bf907]
PUP.Optional.Shopperz.A, HKU\S-1-5-18\SOFTWARE\{98ad4c4e-92ab-47b9-a529-a437e2e545e0}|Name, C:\Program Files\shopperz12082015\Tuejet.exe, En quarantaine, [6121d3362665cb6b492cc7e7c242ae52]
PUP.Optional.Shopperz.A, HKU\S-1-5-19\SOFTWARE\{98ad4c4e-92ab-47b9-a529-a437e2e545e0}|Name, C:\Program Files\shopperz12082015\Tuejet.exe, En quarantaine, [eb97ca3f2d5e5adc472eb0fe7e8658a8]
PUP.Optional.Shopperz.A, HKU\S-1-5-20\SOFTWARE\{98ad4c4e-92ab-47b9-a529-a437e2e545e0}|Name, C:\Program Files\shopperz12082015\Tuejet.exe, En quarantaine, [7c0651b85d2eff376f060ca245bfcd33]
PUP.Optional.OutBrowse.A, HKU\S-1-5-21-463824160-1797773122-1175763634-1001\SOFTWARE\OB|monitype12, 8/13/15 22:41:53, En quarantaine, [7d057f8a9cefb2848c96c6edb84c9b65]
PUP.Optional.OutBrowse.A, HKU\S-1-5-21-463824160-1797773122-1175763634-1001\SOFTWARE\OB|monitype1, 8/13/15 22:42:17, En quarantaine, [0b77da2f870494a23ae8e2d1c044b24e]
PUP.Optional.OutBrowse.A, HKU\S-1-5-21-463824160-1797773122-1175763634-1001\SOFTWARE\OB|monitype19, 8/13/15 22:42:17, En quarantaine, [4e34df2a226953e380a205aea85cb050]
PUP.Optional.OutBrowse.A, HKU\S-1-5-21-463824160-1797773122-1175763634-1001\SOFTWARE\OB|monitype20, 8/13/15 22:42:17, En quarantaine, [d1b1be4b325969cd65bd1c97d03438c8]
PUP.Optional.OutBrowse.A, HKU\S-1-5-21-463824160-1797773122-1175763634-1001\SOFTWARE\OB|monitype21, 8/13/15 22:42:17, En quarantaine, [770b0aff3f4c330339e96f4437cd827e]
PUP.Optional.OutBrowse.A, HKU\S-1-5-21-463824160-1797773122-1175763634-1001\SOFTWARE\OB|monitype15, 8/13/15 22:42:29, En quarantaine, [e39f60a933583bfb6bb7486b4bb97789]
PUP.Optional.OutBrowse.A, HKU\S-1-5-21-463824160-1797773122-1175763634-1001\SOFTWARE\OB|monitype10, 8/13/15 22:43:15, En quarantaine, [99e974955e2dd75f7ca607ac4cb838c8]
PUP.Optional.OutBrowse.A, HKU\S-1-5-21-463824160-1797773122-1175763634-1001\SOFTWARE\OB|monitype6, 8/13/15 22:44:3, En quarantaine, [166cf61395f6f244a47ecbe8df253ac6]
PUP.Optional.Shopperz.A, HKU\S-1-5-21-463824160-1797773122-1175763634-1001\SOFTWARE\{98ad4c4e-92ab-47b9-a529-a437e2e545e0}|Name, C:\Program Files\shopperz12082015\Tuejet.exe, En quarantaine, [334f2cdd1972f73f6114bfefc24236ca]

Données du registre: 6
PUP.Optional.Qone8, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\INTERNET EXPLORER\SEARCHSCOPES|DefaultScope, {33BB0A4E-99AF-4226-BDF6-49120163DE86}, Bon : ({0633EE93-D776-472f-A0FF-E1416B8B2E3A}), Mauvais : ({33BB0A4E-99AF-4226-BDF6-49120163DE86}),Remplacé,[f58d08010586d95d868dbb9749bcda26]
Trojan.DNSChanger, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\TCPIP\PARAMETERS\Interfaces\{33654C8F-3E49-4092-AEA4-3E40A042C801}|NameServer, 52.17.204.69,8.8.8.8, Bon : (), Mauvais : (52.17.204.69,8.8.8.8),Remplacé,[0e743fca1774a492f7b2b59fb1545ca4]
Trojan.DNSChanger, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\TCPIP\PARAMETERS\Interfaces\{989F0A17-E0D6-497D-A863-585C87C8FE98}|NameServer, 52.17.204.69,8.8.8.8, Bon : (), Mauvais : (52.17.204.69,8.8.8.8),Remplacé,[c3bf7b8ea2e982b4d1d86de761a4ff01]
Trojan.DNSChanger, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\TCPIP\PARAMETERS\Interfaces\{bbed3e08-0b41-11e3-8249-806e6f6e6963}|NameServer, 52.17.204.69,8.8.8.8, Bon : (), Mauvais : (52.17.204.69,8.8.8.8),Remplacé,[265c2fda0f7cfc3a1297bf9527de22de]
Trojan.DNSChanger, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\TCPIP\PARAMETERS\Interfaces\{C842CC2C-532D-4DA0-99D6-9729876308B6}|NameServer, 52.17.204.69,8.8.8.8, Bon : (), Mauvais : (52.17.204.69,8.8.8.8),Remplacé,[72100aff008b989e9c0d4a0ad62f1be5]
Trojan.DNSChanger, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\TCPIP\PARAMETERS\Interfaces\{EA279222-7B69-4AE7-8F5D-24B377A885AD}|NameServer, 52.17.204.69,8.8.8.8, Bon : (), Mauvais : (52.17.204.69,8.8.8.8),Remplacé,[245eab5eec9f11251891f65e798cad53]

Dossiers: 21
PUP.Optional.SmartWeb, C:\Users\grand_000\AppData\LocalLow\SmartWeb\Data, En quarantaine, [ef9334d58a019e980578822c18ecc13f],
PUP.Optional.SmartWeb, C:\Users\grand_000\AppData\LocalLow\SmartWeb, En quarantaine, [ef9334d58a019e980578822c18ecc13f],
PUP.Optional.GlobalUpdate.A, C:\Users\grand_000\AppData\Local\Temp\comh.153776, En quarantaine, [354d49c03f4cd2643cc138becc364eb2],
PUP.Optional.GlobalUpdate.A, C:\Users\grand_000\AppData\Local\Temp\comh.32091, En quarantaine, [d3afeb1e3b504aec7e7f8670d72b956b],
PUP.Optional.GlobalUpdate.A, C:\Users\grand_000\AppData\Local\Temp\comh.357236, En quarantaine, [30528485dead7abc6a930beb09f9f709],
PUP.Optional.OneSoftPerDay.A, C:\Users\grand_000\AppData\Local\ospd_us_013010060, En quarantaine, [88fa0dfcb0db54e2b054db23c939936d],
PUP.Optional.GamesDesktop.A, C:\Users\grand_000\AppData\Local\gmsd_fr_005010061, Supprimer au redémarrage, [94eeff0a7714f541d0cb0afbc83b06fa],
PUP.Optional.AnyProtect.A, C:\Users\grand_000\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\AnyProtect PC Backup, En quarantaine, [98ea18f1aae170c6edc8f8178b78659b],
PUP.Optional.Shopperz.A, C:\Program Files\shopperz12082015, En quarantaine, [60221feafe8de6504ef2e72e1ce7f60a],
PUP.Optional.ProtectWindowsManager.F, C:\ProgramData\5WinManPro5, En quarantaine, [aed460a94546171f8b98e531aa5925db],
PUP.Optional.ProtectWindowsManager.F, C:\ProgramData\5WinManPro5\update, En quarantaine, [aed460a94546171f8b98e531aa5925db],
PUP.Optional.ProtectWindowsManager.F, C:\ProgramData\9WinManPro9, En quarantaine, [245e50b9d9b2191d39ea3bdb9a6944bc],
PUP.Optional.ProtectWindowsManager.F, C:\ProgramData\9WinManPro9\update, En quarantaine, [245e50b9d9b2191d39ea3bdb9a6944bc],
PUP.Optional.ProtectWindowsManager.F, C:\ProgramData\iWinManProi, En quarantaine, [7c0614f5c1caa195b66d48cee1229e62],
PUP.Optional.ProtectWindowsManager.F, C:\ProgramData\iWinManProi\update, En quarantaine, [7c0614f5c1caa195b66d48cee1229e62],
PUP.Optional.ProtectWindowsManager.F, C:\ProgramData\SWinManProS, En quarantaine, [dda5be4b2665cd6975ae72a4a55e52ae],
PUP.Optional.ProtectWindowsManager.F, C:\ProgramData\vWinManProv, En quarantaine, [f48e0108f9926cca1c076ea8bd469967],
PUP.Optional.ProtectWindowsManager.F, C:\ProgramData\vWinManProv\update, En quarantaine, [f48e0108f9926cca1c076ea8bd469967],
PUP.Optional.ProtectWindowsManager.F, C:\ProgramData\ZWinManProZ, En quarantaine, [9be784850e7d96a09f8432e430d3e21e],
PUP.Optional.ProtectWindowsManager.F, C:\ProgramData\nWinManPron, En quarantaine, [cfb319f07b108aac220150c654af0000],
PUP.Optional.ProtectWindowsManager.F, C:\ProgramData\nWinManPron\update, En quarantaine, [cfb319f07b108aac220150c654af0000],

Fichiers: 132
Adware.PennyBee, C:\ProgramData\QongaMiwe\voeiaqi.exe, Supprimer au redémarrage, [166c2bde3e4dea4cbcffcef9bf4244bc],
Adware.PennyBee, C:\ProgramData\QongaMiwe\voeiwqi.exe, Supprimer au redémarrage, [057d0108f09ba98dcdeee3e425dcff01],
PUP.Optional.EORezo, C:\Users\grand_000\AppData\Local\gmsd_fr_005010061\upgmsd_fr_005010061.exe, Supprimer au redémarrage, [f09258b159320c2a396ebdc8aa5bf907],
PUP.Optional.WProtectManager.A, C:\ProgramData\5WinManPro5\ProtectWindowsManager.exe, En quarantaine, [dda516f37b102511802b4442729302fe],
PUP.Optional.WProtectManager.A, C:\ProgramData\9WinManPro9\ProtectWindowsManager.exe, En quarantaine, [fb878c7dd2b94ee8f7b40f77ca3b3bc5],
PUP.Optional.WProtectManager.A, C:\ProgramData\iWinManProi\ProtectWindowsManager.exe, En quarantaine, [91f1d039dcaf3cfa79320a7cdb2ab050],
Adware.PennyBee, C:\ProgramData\QongaMiwe\voei6qi.dll, Supprimer au redémarrage, [622010f93a51d6608f2a8641af52ff01],
Adware.PennyBee, C:\ProgramData\QongaMiwe\voei6qid.dll, En quarantaine, [7c06ca3f404be84efabfb7107d841be5],
PUP.Optional.WProtectManager.A, C:\ProgramData\SWinManProS\ProtectWindowsManager.exe, En quarantaine, [641e42c7cbc0dc5a7f2cee98f31253ad],
PUP.Optional.WProtectManager.A, C:\ProgramData\vWinManProv\ProtectWindowsManager.exe, En quarantaine, [b4ce7792890270c6decd4343d72e36ca],
PUP.Optional.WProtectManager.A, C:\ProgramData\ZWinManProZ\ProtectWindowsManager.exe, En quarantaine, [d4ae19f06b2076c01c8f0e78a164ab55],
PUP.Optional.WProtectManager.A, C:\ProgramData\nWinManPron\ProtectWindowsManager.exe, En quarantaine, [394929e05437f640703ba6e03cc9fd03],
PUP.Optional.Amonetize.A, C:\Users\grand_000\AppData\Roaming\ZHP\Quarantine\delphi keygen activator 2013 3_10924_i43991390_il345.exe.VIR, En quarantaine, [7012e3264c3f3303e1e5424331d4f50b],
PUP.Optional.PhraseProfessor.A, C:\Users\grand_000\AppData\Roaming\ZHP\Quarantine\ppfd_vt_1_10_0_21.sys.VIR, En quarantaine, [047ea2678902231331208007de27738d],
PUP.Optional.PhraseProfessor.A, C:\Users\grand_000\AppData\Roaming\ZHP\Quarantine\ppfd_vw_1_10_0_21.sys.VIR, En quarantaine, [e69c5cad57348da977da9ceb0104e61a],
PUP.Optional.CheckOffer, C:\Users\grand_000\AppData\Roaming\ZHP\Quarantine\vuupc_vo2_8907[1].exe.VIR, En quarantaine, [7d0541c85c2fbf77eaf6485de31e17e9],
Adware.ConvertAd, C:\Users\grand_000\AppData\Roaming\ZHP\Quarantine\2E3E2BD0-1439736840-81E3-3ACD-20256445D541.DIR\hnsg74F1.tmp, En quarantaine, [84fe0ffaaedd38fec6c9b215fc050af6],
Adware.ConvertAd, C:\Users\grand_000\AppData\Roaming\ZHP\Quarantine\2E3E2BD0-1439736840-81E3-3ACD-20256445D541.DIR\jnsu5977.tmp, En quarantaine, [e0a2ab5e38531f17cec2dee9db268c74],
PUP.Optional.AnyProtect.A, C:\Users\grand_000\AppData\Roaming\ZHP\Quarantine\AnyProtectEx.DIR\AnyProtect.exe, En quarantaine, [047e5eabec9f3afc9ebdef9451b4d12f],
PUP.Optional.Crossrider, C:\Users\grand_000\AppData\Roaming\ZHP\Quarantine\b863b1ac-3b43-4a39-9223-8d0cab4be350.DIR\a56dc94e-a6fd-4c75-9eb2-15f28f3c54e2.dll, En quarantaine, [c3bfaf5a5239ef47d2e7c0ec4cb516ea],
PUP.Optional.Nova.A, C:\Users\grand_000\AppData\Roaming\ZHP\Quarantine\b863b1ac-3b43-4a39-9223-8d0cab4be350.DIR\cfe26a81-5e07-437d-a745-3b6e972d09be.dll, En quarantaine, [f78bf6136a218ea866734f0a2bd6c937],
PUP.Optional.Crossrider, C:\Users\grand_000\AppData\Roaming\ZHP\Quarantine\bb59d1f1-3150-430a-9359-54d8a3288fa2.DIR\658039df-efdb-49c3-9257-86232c87a7e1.dll, En quarantaine, [483a1eeb7b102b0b7841f6b6a75a3cc4],
PUP.Optional.Nova.A, C:\Users\grand_000\AppData\Roaming\ZHP\Quarantine\bb59d1f1-3150-430a-9359-54d8a3288fa2.DIR\d0eb409d-9ce1-4214-8303-af8f200140cc.dll, En quarantaine, [3a48b158c5c6bb7b23b64217f60ba25e],
PUP.Optional.SoftwareUpdate.A, C:\Users\grand_000\AppData\Roaming\ZHP\Quarantine\Software.DIR\Update\SoftwareUpdate.exe, En quarantaine, [f092a861eba0bc7a47233913d829e51b],
PUP.Optional.Shopperz.A, C:\Program Files\shopperz12082015\Yyoihge.dll, En quarantaine, [4d355dac6823ba7c0d53a3e4dd2817e9],
PUP.Optional.Shopperz.A, C:\Program Files\shopperz12082015\Yyoihge64.dll, En quarantaine, [c7bb927796f5f541a3bd3354f80def11],
PUP.Optional.CrossRider.A, C:\Windows\SysWOW64\481.exe, En quarantaine, [067cc643157689ad84dc8e0d9e6350b0],
PUP.Optional.WordSurfer.A, C:\Windows\System32\drivers\wsafd_1_10_0_19.sys, En quarantaine, [0d7530d9a5e64de9be675b2c24e145bb],
PUP.Optional.MyStartSearch.ShrtCln, C:\Users\grand_000\AppData\Local\Temp\nsa6F9C.tmp, En quarantaine, [364c08017912d85efdc3641f669f3fc1],
PUP.Optional.CheckOffer, C:\Users\grand_000\AppData\Local\Temp\nscABA1.tmp, En quarantaine, [6a18bb4e2269181e6d73980df70a6c94],
PUP.Optional.IStartSurf.ShrtCln, C:\Users\grand_000\AppData\Local\Temp\nsd6301.tmp, En quarantaine, [97eb57b28605df5769ce4c37b84d08f8],
PUP.Optional.MyStartSearch.ShrtCln, C:\Users\grand_000\AppData\Local\Temp\nsx80F3.tmp, En quarantaine, [e39f9673167554e2823ef88bda2ba15f],
PUP.Optional.Komodia, C:\Users\grand_000\AppData\Local\Temp\oprun24940.exe, En quarantaine, [453d76935b30e452ab0df3db3fc212ee],
PUP.Optional.IStartSurf.ShrtCln, C:\Users\grand_000\AppData\Local\Temp\nsq917E.tmp, En quarantaine, [255dea1f4942ed49f542b8cbce37b749],
PUP.Optional.Amonentize.A, C:\Users\grand_000\AppData\Local\Temp\nsq9523.tmp, En quarantaine, [4b3738d1c5c69b9b6e547e25ef12f10f],
PUP.Optional.MyStartSearch.ShrtCln, C:\Users\grand_000\AppData\Local\Temp\nsq9E30.tmp, En quarantaine, [92f0c3467912fd3927992d56dd282bd5],
PUP.Optional.MultiPlug, C:\Users\grand_000\AppData\Local\Temp\nsuA050.tmp.exe, En quarantaine, [5a289574d8b34aec016e616eb94815eb],
PUP.Optional.Amonentize.A, C:\Users\grand_000\AppData\Local\Temp\nsuC28D.tmp, En quarantaine, [542e59b06a218fa7754df2b1f20f6d93],
Adware.Imali, C:\Users\grand_000\AppData\Local\Temp\fsd8D8D.exe, En quarantaine, [19694fba078468ced8db14bab64b15eb],
PUP.Optional.IStartSurf.ShrtCln, C:\Users\grand_000\AppData\Local\Temp\nsl85E5.tmp, En quarantaine, [31517891fd8e6accd2654142ab5a57a9],
Trojan.Agent, C:\Users\grand_000\AppData\Local\Temp\nsm90EE.tmp, En quarantaine, [d4aeb851b8d3c175be50ec54a06511ef],
PUP.Optional.AnyProtect, C:\Users\grand_000\AppData\Local\Temp\nsuFBF.tmp, En quarantaine, [60229d6c1b7089ad67add1b406fcee12],
PUP.Optional.Nosibay.A, C:\Users\grand_000\AppData\Local\Temp\1682015155336\Selection Tools Uninstall.exe, En quarantaine, [e49e977298f3ed491596ee9736cfa759],
PUP.Optional.OfferInstaller.C, C:\Users\grand_000\AppData\Local\Temp\f9626892-7a78-3199-abd2-97bbce96297b\OfferInstaller.exe, En quarantaine, [b9c90bfe2d5e70c6a82f8ef4f908936d],
PUP.Optional.Tuto4PC.A, C:\Users\grand_000\AppData\Local\Temp\is-9J951.tmp\gentlemjmp_ieu.exe, En quarantaine, [245e67a2ed9ee1550b8c790c2cd959a7],
Adware.EoRezo, C:\Users\grand_000\AppData\Local\Temp\is-QIUE3.tmp\package_airwebbar_installer_multilang.exe, En quarantaine, [424039d04546f541b849d48ad7297f81],
Adware.EoRezo, C:\Users\grand_000\AppData\Local\Temp\is-QOMBS.tmp\package_airwebbar_installer_multilang.exe, En quarantaine, [f2907b8e791282b44ab781dda15f718f],
PUP.Optional.CheckOffer, C:\Users\grand_000\AppData\Local\Temp\nsqE305.tmp\nsCBHTML5.dll, En quarantaine, [8bf78e7bfb902e0828b85c49ce337888],
PUP.Optional.CheckOffer, C:\Users\grand_000\AppData\Local\Temp\nsoE5C5.tmp\nsCBHTML5.dll, En quarantaine, [285a30d94744a88ea33d5253a55c57a9],
PUP.Optional.RegCleanPro, C:\Users\grand_000\AppData\Local\Temp\nsoE5C5.tmp\rcpsetup_17970.exe, En quarantaine, [d1b125e4bad1a88e23bf15373fc1cb35],
PUP.Optional.CheckOffer, C:\Users\grand_000\AppData\Local\Temp\nsvB2E4.tmp\nsCBHTML5.dll, En quarantaine, [b2d019f0503bd36314cc396ca75ae41c],
PUP.Optional.ModGoog, C:\Users\grand_000\AppData\Local\Temp\comh.153776\globalupdateBroker.exe, En quarantaine, [c4be60a9503bc274680deca3629f9769],
PUP.Optional.ModGoog, C:\Users\grand_000\AppData\Local\Temp\comh.153776\globalupdateOnDemand.exe, En quarantaine, [b8ca32d7612a45f1a7ce3d52bf42738d],
PUP.Optional.ModGoog, C:\Users\grand_000\AppData\Local\Temp\comh.153776\goopdate.dll, En quarantaine, [740e45c4f79449ede88d0a85d72a2bd5],
PUP.Optional.ModGoog, C:\Users\grand_000\AppData\Local\Temp\comh.153776\psmachine.dll, En quarantaine, [e0a2c742f893112576ffeca3db2658a8],
PUP.Optional.ModGoog, C:\Users\grand_000\AppData\Local\Temp\comh.153776\psuser.dll, En quarantaine, [e89a68a1adde62d4264f513ea8599d63],
PUP.Optional.ModGoog, C:\Users\grand_000\AppData\Local\Temp\comh.32091\globalupdateBroker.exe, En quarantaine, [235ff811d0bbb086096c0788cb368977],
PUP.Optional.ModGoog, C:\Users\grand_000\AppData\Local\Temp\comh.32091\globalupdateOnDemand.exe, En quarantaine, [c7bbd138cfbceb4b81f49ff01be6c43c],
PUP.Optional.ModGoog, C:\Users\grand_000\AppData\Local\Temp\comh.32091\goopdate.dll, En quarantaine, [008241c83f4c3bfb4a2b2768b64bf808],
PUP.Optional.ModGoog, C:\Users\grand_000\AppData\Local\Temp\comh.32091\psmachine.dll, En quarantaine, [eb977792c0cb2115cda84c4378898977],
PUP.Optional.ModGoog, C:\Users\grand_000\AppData\Local\Temp\comh.32091\psuser.dll, En quarantaine, [9be7d435692256e097de9ff0dc2531cf],
PUP.Optional.ModGoog, C:\Users\grand_000\AppData\Local\Temp\comh.357236\globalupdateBroker.exe, En quarantaine, [e89a9475ff8ce3530075642be31e31cf],
PUP.Optional.ModGoog, C:\Users\grand_000\AppData\Local\Temp\comh.357236\globalupdateOnDemand.exe, En quarantaine, [60224abfaddef83e7cf9d0bf7e83b34d],
PUP.Optional.ModGoog, C:\Users\grand_000\AppData\Local\Temp\comh.357236\goopdate.dll, En quarantaine, [99e993760a81b284b0c59af53bc68977],
PUP.Optional.ModGoog, C:\Users\grand_000\AppData\Local\Temp\comh.357236\psmachine.dll, En quarantaine, [b9c931d896f576c02451e6a958a99a66],
PUP.Optional.ModGoog, C:\Users\grand_000\AppData\Local\Temp\comh.357236\psuser.dll, En quarantaine, [daa89871a5e6b2848ee7f19e8e739070],
Trojan.MSIL.Dropper, C:\Users\grand_000\Downloads\Autocom-Delphi+Keygen+2013.3+illimité.rar, En quarantaine, [6a1890791f6c21158cb02095ca373dc3],
PUP.Optional.AnyProtect, C:\Users\grand_000\AppData\Local\nsfF7B6.tmp, En quarantaine, [641e63a65b3053e3db3900852dd5f30d],
PUP.Optional.AnyProtect, C:\Users\grand_000\AppData\Local\nsh3389.tmp, En quarantaine, [b6ccf5140d7e82b420f4e99c768c5ba5],
PUP.Optional.AnyProtect, C:\Users\grand_000\AppData\Local\nsk75CB.tmp, En quarantaine, [5d25de2b2d5ea49254c0553023df6898],
PUP.Optional.AnyProtect, C:\Users\grand_000\AppData\Local\nsuFBF.tmp, En quarantaine, [b4ce44c5612aef47f91bd3b2a959ac54],
PUP.Optional.AnyProtect, C:\Users\grand_000\AppData\Local\nsw27BA.tmp, En quarantaine, [681aae5b107bf343ce46a1e415ed669a],
PUP.Optional.AnyProtect, C:\Users\grand_000\AppData\Local\nszCBC7.tmp, En quarantaine, [a2e099701a71e74f948053321de5a858],
PUP.Optional.EORezo, C:\Users\grand_000\AppData\Local\ospd_us_013010060\upospd_us_013010060.exe, En quarantaine, [e59d53b6c8c3f83eacfb0d78b352837d],
PUP.Optional.Winsock.HijackBoot, C:\Windows\SysWOW64\Uiviuuj.ini, En quarantaine, [592955b4bdce5cda7181f323e61dc838],
PUP.Optional.Winsock.HijackBoot, C:\Windows\System32\UiviuujOff.ini, En quarantaine, [c2c0c74236555cda6193987e0201b54b],
PUP.Optional.Winsock.HijackBoot, C:\Windows\SysWOW64\UiviuujOff.ini, En quarantaine, [562c9871a1ea181e28cc8f8755ae966a],
PUP.Optional.AnyProtect.A, C:\Windows\Tasks\APSnotifierPP1.job, En quarantaine, [5032d831bad1bd79f789cf522dd6669a],
PUP.Optional.AnyProtect.A, C:\Windows\Tasks\APSnotifierPP2.job, En quarantaine, [8ef4808995f6171fc2be8b96da296d93],
PUP.Optional.AnyProtect.A, C:\Windows\Tasks\APSnotifierPP3.job, En quarantaine, [c8ba9d6c8b00b87e2e527da4dc27b64a],
PUP.Optional.AnyProtect.A, C:\Windows\System32\Tasks\APSnotifierPP1, En quarantaine, [ed956a9fadde6dc985fcb46d4ab92cd4],
PUP.Optional.AnyProtect.A, C:\Windows\System32\Tasks\APSnotifierPP2, En quarantaine, [0280db2e375469cdfa87da474eb511ef],
PUP.Optional.AnyProtect.A, C:\Windows\System32\Tasks\APSnotifierPP3, En quarantaine, [bac84abff596fb3b89f8fc2531d243bd],
PUP.Optional.AnyProtect.A, C:\Users\grand_000\Desktop\AnyProtect.lnk, En quarantaine, [86fc61a86c1fb680ec961e039370f20e],
Trojan.Agent, C:\Users\grand_000\AppData\Local\Temp\oprun24940.exe, En quarantaine, [1a681fea0f7c7cbaf8b577457c876e92],
PUP.Optional.TempoRunner.A, C:\Windows\System32\Tasks\Tempo Runner voei3qi, En quarantaine, [1a68c5446f1ca88ea811960b37cdcd33],
PUP.Optional.TempoRunner.A, C:\Windows\System32\Tasks\Tempo Runner voeidqi, En quarantaine, [740ead5ce4a7b18597226e33798ba15f],
PUP.Optional.TempoRunner.A, C:\Windows\Tasks\Tempo Runner voei3qi.job, En quarantaine, [cbb7c445e8a395a101b9069b61a3c43c],
PUP.Optional.TempoRunner.A, C:\Windows\Tasks\Tempo Runner voeidqi.job, En quarantaine, [ef937099d4b7fb3bab0f950cef15b54b],
PUP.Optional.SmartWeb, C:\Users\grand_000\AppData\LocalLow\SmartWeb\Data\wlu.txt, En quarantaine, [ef9334d58a019e980578822c18ecc13f],
PUP.Optional.SmartWeb, C:\Users\grand_000\AppData\LocalLow\SmartWeb\Data\1.txt, En quarantaine, [ef9334d58a019e980578822c18ecc13f],
PUP.Optional.SmartWeb, C:\Users\grand_000\AppData\LocalLow\SmartWeb\Data\21356.txt, En quarantaine, [ef9334d58a019e980578822c18ecc13f],
PUP.Optional.SmartWeb, C:\Users\grand_000\AppData\LocalLow\SmartWeb\Data\2229.txt, En quarantaine, [ef9334d58a019e980578822c18ecc13f],
PUP.Optional.SmartWeb, C:\Users\grand_000\AppData\LocalLow\SmartWeb\Data\2259.txt, En quarantaine, [ef9334d58a019e980578822c18ecc13f],
PUP.Optional.SmartWeb, C:\Users\grand_000\AppData\LocalLow\SmartWeb\Data\40245.txt, En quarantaine, [ef9334d58a019e980578822c18ecc13f],
PUP.Optional.SmartWeb, C:\Users\grand_000\AppData\LocalLow\SmartWeb\Data\a.txt, En quarantaine, [ef9334d58a019e980578822c18ecc13f],
PUP.Optional.SmartWeb, C:\Users\grand_000\AppData\LocalLow\SmartWeb\Data\b.txt, En quarantaine, [ef9334d58a019e980578822c18ecc13f],
PUP.Optional.SmartWeb, C:\Users\grand_000\AppData\LocalLow\SmartWeb\Data\c.txt, En quarantaine, [ef9334d58a019e980578822c18ecc13f],
PUP.Optional.SmartWeb, C:\Users\grand_000\AppData\LocalLow\SmartWeb\Data\d.txt, En quarantaine, [ef9334d58a019e980578822c18ecc13f],
PUP.Optional.SmartWeb, C:\Users\grand_000\AppData\LocalLow\SmartWeb\Data\e.txt, En quarantaine, [ef9334d58a019e980578822c18ecc13f],
PUP.Optional.SmartWeb, C:\Users\grand_000\AppData\LocalLow\SmartWeb\Data\f.txt, En quarantaine, [ef9334d58a019e980578822c18ecc13f],
PUP.Optional.SmartWeb, C:\Users\grand_000\AppData\LocalLow\SmartWeb\Data\g.txt, En quarantaine, [ef9334d58a019e980578822c18ecc13f],
PUP.Optional.SmartWeb, C:\Users\grand_000\AppData\LocalLow\SmartWeb\Data\h.txt, En quarantaine, [ef9334d58a019e980578822c18ecc13f],
PUP.Optional.SmartWeb, C:\Users\grand_000\AppData\LocalLow\SmartWeb\Data\i.txt, En quarantaine, [ef9334d58a019e980578822c18ecc13f],
PUP.Optional.SmartWeb, C:\Users\grand_000\AppData\LocalLow\SmartWeb\Data\j.txt, En quarantaine, [ef9334d58a019e980578822c18ecc13f],
PUP.Optional.SmartWeb, C:\Users\grand_000\AppData\LocalLow\SmartWeb\Data\k.txt, En quarantaine, [ef9334d58a019e980578822c18ecc13f],
PUP.Optional.SmartWeb, C:\Users\grand_000\AppData\LocalLow\SmartWeb\Data\l.txt, En quarantaine, [ef9334d58a019e980578822c18ecc13f],
PUP.Optional.SmartWeb, C:\Users\grand_000\AppData\LocalLow\SmartWeb\Data\m.txt, En quarantaine, [ef9334d58a019e980578822c18ecc13f],
PUP.Optional.SmartWeb, C:\Users\grand_000\AppData\LocalLow\SmartWeb\Data\n.txt, En quarantaine, [ef9334d58a019e980578822c18ecc13f],
PUP.Optional.SmartWeb, C:\Users\grand_000\AppData\LocalLow\SmartWeb\Data\o.txt, En quarantaine, [ef9334d58a019e980578822c18ecc13f],
PUP.Optional.SmartWeb, C:\Users\grand_000\AppData\LocalLow\SmartWeb\Data\p.txt, En quarantaine, [ef9334d58a019e980578822c18ecc13f],
PUP.Optional.SmartWeb, C:\Users\grand_000\AppData\LocalLow\SmartWeb\Data\q.txt, En quarantaine, [ef9334d58a019e980578822c18ecc13f],
PUP.Optional.SmartWeb, C:\Users\grand_000\AppData\LocalLow\SmartWeb\Data\r.txt, En quarantaine, [ef9334d58a019e980578822c18ecc13f],
PUP.Optional.SmartWeb, C:\Users\grand_000\AppData\LocalLow\SmartWeb\Data\s.txt, En quarantaine, [ef9334d58a019e980578822c18ecc13f],
PUP.Optional.SmartWeb, C:\Users\grand_000\AppData\LocalLow\SmartWeb\Data\t.txt, En quarantaine, [ef9334d58a019e980578822c18ecc13f],
PUP.Optional.SmartWeb, C:\Users\grand_000\AppData\LocalLow\SmartWeb\Data\u.txt, En quarantaine, [ef9334d58a019e980578822c18ecc13f],
PUP.Optional.SmartWeb, C:\Users\grand_000\AppData\LocalLow\SmartWeb\Data\v.txt, En quarantaine, [ef9334d58a019e980578822c18ecc13f],
PUP.Optional.SmartWeb, C:\Users\grand_000\AppData\LocalLow\SmartWeb\Data\w.txt, En quarantaine, [ef9334d58a019e980578822c18ecc13f],
PUP.Optional.SmartWeb, C:\Users\grand_000\AppData\LocalLow\SmartWeb\Data\x.txt, En quarantaine, [ef9334d58a019e980578822c18ecc13f],
PUP.Optional.SmartWeb, C:\Users\grand_000\AppData\LocalLow\SmartWeb\Data\y.txt, En quarantaine, [ef9334d58a019e980578822c18ecc13f],
PUP.Optional.SmartWeb, C:\Users\grand_000\AppData\LocalLow\SmartWeb\Data\z.txt, En quarantaine, [ef9334d58a019e980578822c18ecc13f],
PUP.Optional.ABengine.A, C:\Windows\System32\drivers\acwfp64.sys, En quarantaine, [96ec8d7c09820d29ad6c04b055afdf21],
PUP.Optional.GlobalUpdate.A, C:\Users\grand_000\AppData\Local\Temp\comh.153776\globalupdateHelper.msi, En quarantaine, [354d49c03f4cd2643cc138becc364eb2],
PUP.Optional.GlobalUpdate.A, C:\Users\grand_000\AppData\Local\Temp\comh.32091\globalupdateHelper.msi, En quarantaine, [d3afeb1e3b504aec7e7f8670d72b956b],
PUP.Optional.GlobalUpdate.A, C:\Users\grand_000\AppData\Local\Temp\comh.357236\globalupdateHelper.msi, En quarantaine, [30528485dead7abc6a930beb09f9f709],
PUP.Optional.AnyProtect.A, C:\Users\grand_000\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\AnyProtect PC Backup\AnyProtect.lnk, En quarantaine, [98ea18f1aae170c6edc8f8178b78659b],
PUP.Optional.AnyProtect.A, C:\Users\grand_000\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\AnyProtect PC Backup\Uninstall.lnk, En quarantaine, [98ea18f1aae170c6edc8f8178b78659b],
PUP.Optional.ProtectWindowsManager.F, C:\ProgramData\5WinManPro5\updateconf, En quarantaine, [aed460a94546171f8b98e531aa5925db],
PUP.Optional.ProtectWindowsManager.F, C:\ProgramData\9WinManPro9\updateconf, En quarantaine, [245e50b9d9b2191d39ea3bdb9a6944bc],
PUP.Optional.ProtectWindowsManager.F, C:\ProgramData\iWinManProi\updateconf, En quarantaine, [7c0614f5c1caa195b66d48cee1229e62],
PUP.Optional.ProtectWindowsManager.F, C:\ProgramData\vWinManProv\updateconf, En quarantaine, [f48e0108f9926cca1c076ea8bd469967],
PUP.Optional.ProtectWindowsManager.F, C:\ProgramData\nWinManPron\updateconf, En quarantaine, [cfb319f07b108aac220150c654af0000],

Secteurs physiques: 0
(Aucun élément malveillant détecté)


(end)

Publicité


Signaler le contenu de ce document

Publicité