cjoint

Publicité


Publicité

Format du document : text/plain

Prévisualisation

Malwarebytes Anti-Malware
www.malwarebytes.org

Date de l'analyse: 01/03/2016
Heure de l'analyse: 10:46
Fichier journal: anti-malware.txt
Administrateur: Oui

Version: 2.2.0.1024
Base de données de programmes malveillants: v2016.03.01.03
Base de données de rootkits: v2016.02.27.01
Licence: Gratuit
Protection contre les programmes malveillants: Désactivé
Protection contre les sites Web malveillants: Désactivé
Autoprotection: Désactivé

Système d'exploitation: Windows 7 Service Pack 1
Processeur: x64
Système de fichiers: NTFS
Utilisateur: user

Type d'analyse: Analyse des menaces
Résultat: Terminé
Objets analysés: 356224
Temps écoulé: 4 min, 4 s

Mémoire: Activé
Démarrage: Activé
Système de fichiers: Activé
Archives: Activé
Rootkits: Désactivé
Heuristique: Activé
PUP: Activé
PUM: Activé

Processus: 0
(Aucun élément malveillant détecté)

Modules: 0
(Aucun élément malveillant détecté)

Clés du Registre: 10
PUP.Optional.VBates, HKLM\SOFTWARE\CLASSES\APPID\{94CB6BE7-AE1A-4751-AE74-1EDD6B567264}, En quarantaine, [781f99e980197abc0bee3387ed15b24e],
PUP.Optional.VBates, HKLM\SOFTWARE\WOW6432NODE\CLASSES\APPID\{94CB6BE7-AE1A-4751-AE74-1EDD6B567264}, En quarantaine, [781f99e980197abc0bee3387ed15b24e],
PUP.Optional.VBates, HKLM\SOFTWARE\CLASSES\WOW6432NODE\APPID\{94CB6BE7-AE1A-4751-AE74-1EDD6B567264}, En quarantaine, [781f99e980197abc0bee3387ed15b24e],
Trojan.ProxyHijacker, HKLM\SOFTWARE\CLASSES\setup.DynamicNS, En quarantaine, [63346b17346592a4c9cd09b260a22ad6],
Trojan.ProxyHijacker, HKLM\SOFTWARE\WOW6432NODE\CLASSES\setup.DynamicNS, En quarantaine, [3f5885fd54456cca474fb8033dc523dd],
Trojan.ProxyHijacker, HKLM\SOFTWARE\CLASSES\WOW6432NODE\setup.DynamicNS, En quarantaine, [3f5885fd54456cca474fb8033dc523dd],
PUP.Optional.YesSearches, HKLM\SOFTWARE\MOZILLA\FIREFOX\{EB52F1AB-3C2B-424F-9794-833C687025CF}, En quarantaine, [7423e49e4c4da096186b9471b1528977],
PUP.Optional.YesSearches, HKLM\SOFTWARE\WOW6432NODE\MOZILLA\FIREFOX\{EB52F1AB-3C2B-424F-9794-833C687025CF}, En quarantaine, [66312e544a4f3ff7c5be70957f84cd33],
PUP.Optional.Tuto4PC, HKU\S-1-5-21-3560094298-2498374330-2714465468-1000\SOFTWARE\MICROSOFT\OTUT, En quarantaine, [99fe0e74d4c5c96ddee2660eed17916f],
PUP.Optional.YesSearches, HKU\S-1-5-21-3560094298-2498374330-2714465468-1000\SOFTWARE\MOZILLA\FIREFOX\{EB52F1AB-3C2B-424F-9794-833C687025CF}, En quarantaine, [05922062673241f51345244ae61ece32],

Valeurs du Registre: 17
PUP.Optional.YesSearches, HKLM\SOFTWARE\MOZILLA\FIREFOX\{EB52F1AB-3C2B-424F-9794-833C687025CF}|hp, http://www.yessearches.com/?ts=AHEpBXMqB3QtAE..&v=20160202&uid=7702E6FC0C489CFA0DE46CFCCCB57ABC&ptid=wak&mode=ffsengext, En quarantaine, [7423e49e4c4da096186b9471b1528977]
PUP.Optional.YesSearches, HKLM\SOFTWARE\MOZILLA\FIREFOX\{EB52F1AB-3C2B-424F-9794-833C687025CF}|tab, http://www.yessearches.com/?ts=AHEpBXMqB3QtAE..&v=20160202&uid=7702E6FC0C489CFA0DE46CFCCCB57ABC&ptid=wak&mode=ffsengext, En quarantaine, [baddd5ad1e7b3204fc8746bf11f2bf41]
PUP.Optional.YesSearches, HKLM\SOFTWARE\MOZILLA\FIREFOX\{EB52F1AB-3C2B-424F-9794-833C687025CF}|sp, http://www.yessearches.com/chrome.php?uid=7702E6FC0C489CFA0DE46CFCCCB57ABC&ptid=wak&q={searchTerms}&ts=AHEpBXMqB3QtAE..&v=20160202&mode=ffsengext, En quarantaine, [aceb8ff3a3f6db5b4c37cd3853b006fa]
PUP.Optional.YesSearches, HKLM\SOFTWARE\MOZILLA\FIREFOX\{EB52F1AB-3C2B-424F-9794-833C687025CF}|surl, http://www.yessearches.com/chrome.php?uid=7702E6FC0C489CFA0DE46CFCCCB57ABC&ptid=wak&ts=AHEpBXMqB3QtAE..&v=20160202&mode=ffexttoolbar&q=, En quarantaine, [f5a26919a7f24beb750e1de87b88946c]
PUP.Optional.GamesDesktop, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN|gmsd_fr_021010252, En quarantaine, [2275b2d0bcdd2a0cb3893eba92716e92],
PUP.Optional.MBot, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN|mbot_en_037050252, "C:\Program Files (x86)\mbot_en_037050252\mbot_en_037050252.exe", En quarantaine, [9afd235ffd9c42f460da20e219eb827e]
PUP.Optional.YesSearches, HKLM\SOFTWARE\WOW6432NODE\MOZILLA\FIREFOX\{EB52F1AB-3C2B-424F-9794-833C687025CF}|hp, http://www.yessearches.com/?ts=AHEpBXMqB3QtAE..&v=20160202&uid=7702E6FC0C489CFA0DE46CFCCCB57ABC&ptid=wak&mode=ffsengext, En quarantaine, [66312e544a4f3ff7c5be70957f84cd33]
PUP.Optional.YesSearches, HKLM\SOFTWARE\WOW6432NODE\MOZILLA\FIREFOX\{EB52F1AB-3C2B-424F-9794-833C687025CF}|tab, http://www.yessearches.com/?ts=AHEpBXMqB3QtAE..&v=20160202&uid=7702E6FC0C489CFA0DE46CFCCCB57ABC&ptid=wak&mode=ffsengext, En quarantaine, [2a6d384a1584d95d5c27e4216e9553ad]
PUP.Optional.YesSearches, HKLM\SOFTWARE\WOW6432NODE\MOZILLA\FIREFOX\{EB52F1AB-3C2B-424F-9794-833C687025CF}|sp, http://www.yessearches.com/chrome.php?uid=7702E6FC0C489CFA0DE46CFCCCB57ABC&ptid=wak&q={searchTerms}&ts=AHEpBXMqB3QtAE..&v=20160202&mode=ffsengext, En quarantaine, [494eb7cbb3e61323f09343c2bb4838c8]
PUP.Optional.YesSearches, HKLM\SOFTWARE\WOW6432NODE\MOZILLA\FIREFOX\{EB52F1AB-3C2B-424F-9794-833C687025CF}|surl, http://www.yessearches.com/chrome.php?uid=7702E6FC0C489CFA0DE46CFCCCB57ABC&ptid=wak&ts=AHEpBXMqB3QtAE..&v=20160202&mode=ffexttoolbar&q=, En quarantaine, [b4e3aed4891085b11271f312798ad52b]
PUP.Optional.Tuto4PC, HKU\S-1-5-21-3560094298-2498374330-2714465468-1000\SOFTWARE\MICROSOFT\OTUT|product, tutoproduct, En quarantaine, [99fe0e74d4c5c96ddee2660eed17916f]
PUP.Optional.Tuto4PC, HKU\S-1-5-21-3560094298-2498374330-2714465468-1000\SOFTWARE\MICROSOFT\OTUT|partner, tuto, En quarantaine, [26710a7842576ec8b907155f5aaaef11]
PUP.Optional.RestoreSearch.ChrPRST, HKU\S-1-5-21-3560094298-2498374330-2714465468-1000\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN|C, cmd /c(@attrib -H -R -S C:\Windows\system32\GroupPolicy\Machine\Registry.pol >nul)&(@copy/b/y C:\Windows\system32\GroupPolicy\Machine\R C:\Windows\system32\GroupPolicy\Machine\Registry.pol >nul)&(@attrib +R C:\Windows\system32\GroupPolicy\Machine\Registry.pol >nul)&(@start/b gpupdate.exe /Force >L), En quarantaine, [e1b67e043168191d57247004b94bfe02]
PUP.Optional.YesSearches, HKU\S-1-5-21-3560094298-2498374330-2714465468-1000\SOFTWARE\MOZILLA\FIREFOX\{EB52F1AB-3C2B-424F-9794-833C687025CF}|hp, http://www.yessearches.com/?ts=AHEpBXMqB3QtAE..&v=20160202&uid=7702E6FC0C489CFA0DE46CFCCCB57ABC&ptid=wak&mode=ffsengext, En quarantaine, [05922062673241f51345244ae61ece32]
PUP.Optional.YesSearches, HKU\S-1-5-21-3560094298-2498374330-2714465468-1000\SOFTWARE\MOZILLA\FIREFOX\{EB52F1AB-3C2B-424F-9794-833C687025CF}|tab, http://www.yessearches.com/?ts=AHEpBXMqB3QtAE..&v=20160202&uid=7702E6FC0C489CFA0DE46CFCCCB57ABC&ptid=wak&mode=ffsengext, En quarantaine, [e6b15a28227793a35dfb5c12a262f907]
PUP.Optional.YesSearches, HKU\S-1-5-21-3560094298-2498374330-2714465468-1000\SOFTWARE\MOZILLA\FIREFOX\{EB52F1AB-3C2B-424F-9794-833C687025CF}|sp, http://www.yessearches.com/chrome.php?uid=7702E6FC0C489CFA0DE46CFCCCB57ABC&ptid=wak&q={searchTerms}&ts=AHEpBXMqB3QtAE..&v=20160202&mode=ffsengext, En quarantaine, [b8df7b07742575c1471188e6d92bf40c]
PUP.Optional.YesSearches, HKU\S-1-5-21-3560094298-2498374330-2714465468-1000\SOFTWARE\MOZILLA\FIREFOX\{EB52F1AB-3C2B-424F-9794-833C687025CF}|surl, http://www.yessearches.com/chrome.php?uid=7702E6FC0C489CFA0DE46CFCCCB57ABC&ptid=wak&ts=AHEpBXMqB3QtAE..&v=20160202&mode=ffexttoolbar&q=, En quarantaine, [f7a031511881003626320965dc28d030]

Données du Registre: 0
(Aucun élément malveillant détecté)

Dossiers: 5
PUP.Optional.VBates, C:\Users\user\AppData\LocalLow\Company\Product\1.0, En quarantaine, [cbcc4e34a5f46ec8c0caac8126de18e8],
PUP.Optional.VBates, C:\Users\user\AppData\LocalLow\Company\Product, En quarantaine, [cbcc4e34a5f46ec8c0caac8126de18e8],
PUP.Optional.VBates.WnskRST, C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\{D2020D47-707D-4E26-B4D9-739C4F4C2E9A}, En quarantaine, [0295730fa9f01125cd106598639f26da],
PUP.Optional.VBates.WnskRST, C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\{D2020D47-707D-4E26-B4D9-739C4F4C2E9A}\{FBC0652C-7B29-4FB6-8ADA-91F54B267AD4}, En quarantaine, [0295730fa9f01125cd106598639f26da],
PUP.Optional.VBates.WnskRST, C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\{D2020D47-707D-4E26-B4D9-739C4F4C2E9A}\{FBC0652C-7B29-4FB6-8ADA-91F54B267AD4}\1.5, En quarantaine, [0295730fa9f01125cd106598639f26da],

Fichiers: 88
PUP.Optional.Nosibay, C:\Users\user\AppData\Roaming\ZHP\Quarantine\Bubble Dock Uninstall.exe, En quarantaine, [ecab8ef4b9e0b68026c5f52a54b11be5],
PUP.Optional.Clara, C:\Users\user\AppData\Roaming\ZHP\Quarantine\437.exe, En quarantaine, [0691eb976336b68024bdc972bb468878],
PUP.Optional.Nosibay, C:\Users\user\AppData\Roaming\ZHP\Quarantine\62793.WindApp.MON001.no.exe, En quarantaine, [c6d1eb979108cf67707b3ee129dc639d],
PUP.Optional.BubbleDock, C:\Users\user\AppData\Roaming\ZHP\Quarantine\63100.Bubble_Dock.BBD023.no.exe, En quarantaine, [dfb8a8dae0b9e74fad01da69c14002fe],
PUP.Optional.Nosibay, C:\Users\user\AppData\Roaming\ZHP\Quarantine\64762.Selection_Tools.ALT001.no.exe, En quarantaine, [d2c5206218810f270edd120d40c5fe02],
PUP.Optional.Nosibay, C:\Users\user\AppData\Roaming\ZHP\Quarantine\BBLK5N8H9.exe, En quarantaine, [5f38e39f5445ef474d9e5bc4cc397c84],
PUP.Optional.Nosibay, C:\Users\user\AppData\Roaming\ZHP\Quarantine\Bubble Dock BSetup.exe, En quarantaine, [eaadb6cc3c5d62d4ea0141dea362946c],
PUP.Optional.YourSearching.ShrtCln, C:\Users\user\AppData\Roaming\ZHP\Quarantine\itr_yoursearching.exe, En quarantaine, [eaad1e64cfca2511c98b869b798c50b0],
PUP.Optional.Nosibay, C:\Users\user\AppData\Roaming\ZHP\Quarantine\V55M2C110.exe, En quarantaine, [a9eed3af782187af648725fa8c79827e],
PUP.Optional.Wajam, C:\Users\user\AppData\Roaming\ZHP\Quarantine\wajam_install.exe, En quarantaine, [9bfc9ee428711d19bdff649ad8291ce4],
PUP.Optional.Nosibay, C:\Users\user\AppData\Roaming\ZHP\Quarantine\WindApp Uninstall.exe, En quarantaine, [385f22609cfda6907d6e130c3bca946c],
Adware.EoRezo, C:\Users\user\AppData\Roaming\ZHP\Quarantine\SunnyDay13\predm.exe, En quarantaine, [7e196d151b7e5bdba87065f537c9a55b],
Adware.EoRezo, C:\Users\user\AppData\Roaming\ZHP\Quarantine\SunnyDay13\SunnyDay.exe, En quarantaine, [deb94f336e2b71c5b53a5e314eb3d828],
PUP.Optional.SpaceSoundPro, C:\Program Files (x86)\Hostify\uninstaller.exe, En quarantaine, [0295fe843f5ab68029a2569cd62b7a86],
PUP.Optional.BundleInstaller, C:\Users\user\AppData\Local\Temp\49CF.tmp.exe, En quarantaine, [a6f17a08ecad4ee835e0362a53adcc34],
PUP.Optional.BundleInstaller, C:\Users\user\AppData\Local\Temp\4EF0.tmp.exe, En quarantaine, [bed982005d3c79bdd342045c27d9e818],
PUP.Optional.BundleInstaller, C:\Users\user\AppData\Local\Temp\532B.tmp.exe, En quarantaine, [c6d1e0a29cfd003620f5f46c7a8655ab],
PUP.Optional.BundleInstaller, C:\Users\user\AppData\Local\Temp\5504.tmp.exe, En quarantaine, [197e483a96034ceabe573e228878c53b],
PUP.Optional.BundleInstaller, C:\Users\user\AppData\Local\Temp\564.tmp.exe, En quarantaine, [9afdcfb39cfd76c09f7669f70bf5f907],
PUP.Optional.BundleInstaller, C:\Users\user\AppData\Local\Temp\5726.tmp.exe, En quarantaine, [f1a6c1c184159a9cc15482de31cfda26],
PUP.Optional.BundleInstaller, C:\Users\user\AppData\Local\Temp\58C3.tmp.exe, En quarantaine, [5542c2c0d4c5ed4971a40060d03027d9],
PUP.Optional.BundleInstaller, C:\Users\user\AppData\Local\Temp\5E22.tmp.exe, En quarantaine, [682f8af87c1df1454cc993cd7d83e31d],
PUP.Optional.BundleInstaller, C:\Users\user\AppData\Local\Temp\648E.tmp.exe, En quarantaine, [52455a2842570a2c62b3ce926a963ac6],
PUP.Optional.BundleInstaller, C:\Users\user\AppData\Local\Temp\E8.tmp.exe, En quarantaine, [d2c51a68980151e549ccb9a76e9244bc],
PUP.Optional.BundleInstaller, C:\Users\user\AppData\Local\Temp\EBD4.tmp.exe, En quarantaine, [3265552d6831ec4abf56fb65d927847c],
PUP.Optional.BundleInstaller, C:\Users\user\AppData\Local\Temp\FC58.tmp.exe, En quarantaine, [fe99f1915445ea4c28edabb52cd438c8],
PUP.Optional.BundleInstaller, C:\Users\user\AppData\Local\Temp\4843.tmp.exe, En quarantaine, [534498ea1683023436dffa66926ef709],
PUP.Optional.BundleInstaller, C:\Users\user\AppData\Local\Temp\142D.tmp.exe, En quarantaine, [0493671b9702ce688d88174951af2ed2],
PUP.Optional.BundleInstaller, C:\Users\user\AppData\Local\Temp\1824.tmp.exe, En quarantaine, [a1f6fb871e7b3ef834e14e126f917a86],
PUP.Optional.BundleInstaller, C:\Users\user\AppData\Local\Temp\1CED.tmp.exe, En quarantaine, [fe9983ffeeabaa8c16ff2b3545bbb34d],
PUP.Optional.BundleInstaller, C:\Users\user\AppData\Local\Temp\207.tmp.exe, En quarantaine, [b8dffc8608914aec9e7793cda95722de],
PUP.Optional.BundleInstaller, C:\Users\user\AppData\Local\Temp\BEE2.tmp.exe, En quarantaine, [5d3ad9a9b1e8f4420b0a87d92ad67d83],
PUP.Optional.BundleInstaller, C:\Users\user\AppData\Local\Temp\CB78.tmp.exe, En quarantaine, [7027453d9405ff37b1642040a45c25db],
PUP.Optional.BundleInstaller, C:\Users\user\AppData\Local\Temp\CCDA.tmp.exe, En quarantaine, [36613f43f5a4da5cba5badb318e813ed],
PUP.Optional.BundleInstaller, C:\Users\user\AppData\Local\Temp\D904.tmp.exe, En quarantaine, [1d7af78b336650e695805f01d7290cf4],
PUP.Optional.BundleInstaller, C:\Users\user\AppData\Local\Temp\DD93.tmp.exe, En quarantaine, [1a7d453d8019e94de33275ebc53b9d63],
PUP.Optional.BundleInstaller, C:\Users\user\AppData\Local\Temp\DEF1.tmp.exe, En quarantaine, [fb9c86fc26730e28d3420f51ce320bf5],
PUP.Optional.BundleInstaller, C:\Users\user\AppData\Local\Temp\E2A1.tmp.exe, En quarantaine, [eea9532f4c4d4aecd342f967a65a669a],
PUP.Optional.BundleInstaller, C:\Users\user\AppData\Local\Temp\8EE5.tmp.exe, En quarantaine, [5542037f57423df9d342213f8c744bb5],
PUP.Optional.BundleInstaller, C:\Users\user\AppData\Local\Temp\95A9.tmp.exe, En quarantaine, [a4f3f88ad5c491a51bfa98c8a95739c7],
PUP.Optional.BundleInstaller, C:\Users\user\AppData\Local\Temp\96AA.tmp.exe, En quarantaine, [ebacd9a93564043233e2de8213edd12f],
PUP.Optional.BundleInstaller, C:\Users\user\AppData\Local\Temp\9965.tmp.exe, En quarantaine, [badded95ff9a64d2d93cbaa67e823cc4],
PUP.Optional.BundleInstaller, C:\Users\user\AppData\Local\Temp\9E3A.tmp.exe, En quarantaine, [088f93ef9bfe2115898cec74b64a9070],
PUP.Optional.BundleInstaller, C:\Users\user\AppData\Local\Temp\AC17.tmp.exe, En quarantaine, [0493542e18817abc26ef1848ce321fe1],
PUP.Optional.BundleInstaller, C:\Users\user\AppData\Local\Temp\B383.tmp.exe, En quarantaine, [890e3d45316842f41ef78bd529d76f91],
PUP.Optional.BundleInstaller, C:\Users\user\AppData\Local\Temp\B72F.tmp.exe, En quarantaine, [2671e39f64351a1cbc59352b28d8f20e],
PUP.Optional.BundleInstaller, C:\Users\user\AppData\Local\Temp\2ECA.tmp.exe, En quarantaine, [f99e7111dfba5cda1500144ca858b44c],
PUP.Optional.BundleInstaller, C:\Users\user\AppData\Local\Temp\3032.tmp.exe, En quarantaine, [6e291f6394050d2974a14a16fa065ba5],
PUP.Optional.BundleInstaller, C:\Users\user\AppData\Local\Temp\379D.tmp.exe, En quarantaine, [84131b672871e5513fd6560a916fe41c],
PUP.Optional.BundleInstaller, C:\Users\user\AppData\Local\Temp\3FB6.tmp.exe, En quarantaine, [187f6c16c3d62e08ad68da86669a01ff],
PUP.Optional.BundleInstaller, C:\Users\user\AppData\Local\Temp\65E9.tmp.exe, En quarantaine, [088fe1a12c6d6acca96c9ac6728ee11f],
PUP.Optional.BundleInstaller, C:\Users\user\AppData\Local\Temp\6912.tmp.exe, En quarantaine, [6b2c2e54346587af8d88144c2fd137c9],
PUP.Optional.BundleInstaller, C:\Users\user\AppData\Local\Temp\6B4C.tmp.exe, En quarantaine, [92050e7456431e18ef262a36ef113fc1],
PUP.Optional.BundleInstaller, C:\Users\user\AppData\Local\Temp\6E71.tmp.exe, En quarantaine, [8611265c0396eb4b4bcace92cf31966a],
PUP.Optional.BundleInstaller, C:\Users\user\AppData\Local\Temp\6EC9.tmp.exe, En quarantaine, [f0a7b7cbedac93a39e77ed733ec2ca36],
PUP.Optional.BundleInstaller, C:\Users\user\AppData\Local\Temp\7381.tmp.exe, En quarantaine, [1f78513118810f27f32292ce6b95659b],
PUP.Optional.BundleInstaller, C:\Users\user\AppData\Local\Temp\7388.tmp.exe, En quarantaine, [dbbc6220089112245cb999c741bf6997],
PUP.Optional.BundleInstaller, C:\Users\user\AppData\Local\Temp\7400.tmp.exe, En quarantaine, [d7c0a3dfaeebf640a57078e8e31dbb45],
PUP.Optional.BundleInstaller, C:\Users\user\AppData\Local\Temp\74C5.tmp.exe, En quarantaine, [0196ccb6e6b36dc9888d69f76c94c13f],
PUP.Optional.BundleInstaller, C:\Users\user\AppData\Local\Temp\79CB.tmp.exe, En quarantaine, [2770641e6930ea4cb65f421ec43cf20e],
Adware.EoRezo.Gen, C:\Users\user\AppData\Local\Temp\64DE06E6-39E8-4408-9998-6C6AABEC3941\setup_dpcc_en.exe, En quarantaine, [cccbd7ab2574f83e0269c518a75aaf51],
PUP.Optional.PennyBee, C:\Users\user\AppData\Local\Temp\H6NUPUYPG\H6NUPUYPG.exe, En quarantaine, [0a8d4c36debb4aecfc1892373bc6c13f],
PUP.Optional.YourSearching.ShrtCln, C:\Users\user\AppData\Local\Temp\is-GK84Q.tmp\brd_yoursearching.exe, En quarantaine, [494eec96dbbed95d381ca57c1de8bc44],
PUP.Optional.YourSearching.ShrtCln, C:\Users\user\AppData\Local\Temp\is-QCFBK.tmp\brd_yoursearching.exe, En quarantaine, [b6e16c161b7e95a1ce865bc61bea7d83],
Adware.ConvertAd, C:\Users\user\AppData\Local\Temp\0E973E2A-F95F-47D2-BFAD-1E8388BCCD02\ASIns.exe, En quarantaine, [5542c9b92673bd79a07b8c7081808080],
Adware.EoRezo.Gen, C:\Users\user\AppData\Local\Temp\OSQ8RE0W6\OSQ8RE0W6.exe, En quarantaine, [4e4985fdecadf5412711f8e1a25f5aa6],
PUP.Optional.PennyBee, C:\Users\user\AppData\Local\Temp\LDAFVIPYV\LDAFVIPYV.exe, En quarantaine, [cdcae2a06138d561938174551ee3f808],
Adware.EoRezo.Gen, C:\Users\user\AppData\Local\Temp\SXFNUIYBG\SXFNUIYBG.exe, En quarantaine, [2176dba7960365d1370137a2ca37ae52],
Adware.EoRezo.Gen, C:\Users\user\AppData\Local\Temp\T8HKEOERX\T8HKEOERX.exe, En quarantaine, [91069ce69dfccf670434c910fa0749b7],
Adware.ConvertAd, C:\Users\user\AppData\Local\Temp\3955670\ic-0.421a828da6ed5c.exe, En quarantaine, [098e9ee41980a393ad6e817bf30ee41c],
PUP.Optional.Wajam, C:\Users\user\AppData\Local\Temp\3955670\ic-0.5d8ce53352477.exe, En quarantaine, [95020a78abeee3533b81fe0021e0f808],
Adware.EoRezo, C:\Users\user\AppData\Local\Temp\3955670\ic-0.e46b840809c21.exe, En quarantaine, [d8bfd1b1c2d7270fbf405d761ee3f709],
PUP.Optional.ConvertAd, C:\Windows\Temp\3EFA.tmp, En quarantaine, [3067c3bf0792af8718b9bf1b54ad25db],
Adware.ConvertAd, C:\Windows\Temp\3EFD.tmp, En quarantaine, [6d2adfa3bcddd26450a4b03a64a0d030],
Adware.ConvertAd, C:\Windows\Temp\9BD2.tmp, En quarantaine, [f3a4d4ae5940b5811fd5ac3e798b56aa],
PUP.Optional.ConvertAd, C:\Windows\Temp\9BE8.tmp, En quarantaine, [bbdcabd73b5ea195864b85555aa727d9],
PUP.Optional.ConvertAd, C:\Windows\Temp\A1EC.tmp, En quarantaine, [cfc84240f0a97fb7e0f15d7dce336a96],
Adware.ConvertAd, C:\Windows\Temp\A1EE.tmp, En quarantaine, [8512156dd8c1b08611e312d87f8508f8],
PUP.Optional.Bundler, C:\Users\user\Downloads\Virtual Audio Cable 4.14 Full Version.zip, En quarantaine, [c6d1582aa8f166d01cd41ed561a035cb],
PUP.Optional.Boxore.WnskRST, C:\Windows\Installer\dc354.msi, En quarantaine, [cfc8532f17823bfb12b9fe21bc4936ca],
PUP.Optional.CrossAd.Gen, C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\CCACCBF1-7AB4-4CF5-B32D-668C686A539F\extensions\@E9438230-A7DF-4D1F-8F2D-CA1D0F0F7924.xpi, En quarantaine, [6334077b782157dfffad857e18ebc23e],
Trojan.Agent.E, C:\Users\user\AppData\Local\Temp\6.tmp.exe, En quarantaine, [e4b3cfb31485e650242041e7b153ef11],
PUP.Optional.VBates, C:\Users\user\AppData\LocalLow\Company\Product\1.0\localStorageIE.txt, En quarantaine, [cbcc4e34a5f46ec8c0caac8126de18e8],
PUP.Optional.VBates, C:\Users\user\AppData\LocalLow\Company\Product\1.0\localStorageIE_backup.txt, En quarantaine, [cbcc4e34a5f46ec8c0caac8126de18e8],
PUP.Optional.CrossRider, C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Storage\http_q2u3z6t7.ssl.hwcdn.net_0.localstorage, En quarantaine, [6d2afb87386170c6c33e1359d1330bf5],
PUP.Optional.CrossRider, C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Storage\http_q2u3z6t7.ssl.hwcdn.net_0.localstorage-journal, En quarantaine, [d4c33b47e1b8ab8b29d8c8a4ae56bf41],
PUP.Optional.VBates.WnskRST, C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\{D2020D47-707D-4E26-B4D9-739C4F4C2E9A}\{FBC0652C-7B29-4FB6-8ADA-91F54B267AD4}\1.5\config.js, En quarantaine, [0295730fa9f01125cd106598639f26da],
PUP.Optional.YesSearches, C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\CCACCBF1-7AB4-4CF5-B32D-668C686A539F\searchplugins\DD1B66D4.xml, En quarantaine, [6b2c0e74bfda0f27404b55d6cd38e41c],

Secteurs physiques: 0
(Aucun élément malveillant détecté)


(end)

Publicité


Signaler le contenu de ce document

Publicité